扫描,指通过电子束、无线电波等的左右移动在屏幕上显示出画面或图形。那么你知道扫描的英语单词是什么吗?下面来学习一下吧。
医生给他做了脑部超声波扫描检查。
The doctors gave him an ultrasonic brain scan.
我在用扫描仪把照片扫描进电脑里。
I am using the scanner to scan the pictures into the computer.
扫描电子显微镜是通过扫描聚焦在物体上的电子束来工作的。
The microscope works by scanning a focused beam of electrons across an object.
扫描部分相对于光盘的可记录表面扫描激光束。
A scanning section scans the laser beam relative to the optical disk.
采用合成后 的扫描图像作为扫描范围设置用的图像。
The superimposed scanogram is used as an image for setting a scanning range.
通常向前扫描字符串比反向扫描更安全。
It is usually safer to scan a string forward rather than in reverse.
这种分区排除既适用于索引扫描,也适用于表扫描。
This partition elimination applies to both index scans and table scans.
把扫描物体放在激光扫描头下!
Put the part beneath the laser probe!
端口探测是一个扫描服务器上所有能访问互联网的可用端口的过程。
Port probing is a process that involves scanning all available ports on your server that are accessible to the Internet.
罗杰斯表示,就整体而言,指纹扫描技术的安全系数要高于传统的四位解锁码。
As for the tech itself, Rogers explains fingerprint scanning as a whole is more secure than the four-digit passcode.
他被火速送往医院做脑部扫描。
He was rushed to hospital for a brain scan.
如果扫描时间很长,则应考虑缩小堆的大小或者采用gencon策略。
If the sweep times are very long, consider reducing the size of the heap or switching to the gencon policy.
说不定这项技术将来可以帮助医生只通过扫描患者的一小块皮肤就能诊断疾病。
One day such techniques may even help doctors diagnose illnesses by scanning a portion of the skin of their patients.
对于应用程序或网站上的每一�
For each change in application or website behavior, developers should conduct on-demand vulnerability detection, scanning, and remediation.
这里存放着有关各种安全工具的信息,分为13类,包括分析、认证、审计、扫描和隧道。
There's information on various security tools, grouped into13 categories that include analysis, auditing, scanning, and tunneling.
在Solaris中,snoop工具可以执行类似的操作,像Ethereal这样的第三方工具也提供了扫描功能。
On Solaris, the snoop tool performs a similar purpose, while third-party tools like Ethereal also provide the scanning ability.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
漏洞攻击扫描有助于识别操作系统或Lotus Domino配置中潜在的安全漏洞。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
这种方法所带来的缺点是,处理以更高的速率扫描所有协议控制块(PCB)的开销。
The drawback with this approach is handling the overhead of scanning all the protocol control blocks ( PCBs) a higher rate.
利用多次垂直扫描来重显一幅完整图象的扫描技术。电视中使用2:1的交错率,即每帧分两场,垂直扫描两次,一场扫描奇数行,另一场扫描偶数行。
In scanning, the technique of using more than one vertical scan to reproduce a complete image. In television, 2:1 interlace is used, giving two vertical scans(fields) per frame; one field scans odd lines, and one field scans the even lines of the frame.
在系统中等待处理的一组或一队列新信息,主调度程序对该队列及其它队列进行扫描,使之顺序进入处理状态。
A queue of new messages(or a group) within a system that are awaiting processing. The main scheduling routine will scan them along with other queues and order them into processing in order.