table access

英 [ˈteɪbl ˈækses] 美 [ˈteɪbl ˈækses]

网络  表访问; 中表的扫描方式; 学校管理系统

计算机



双语例句

  1. For particularly easy longer-term monitoring, consider using the SQL table functions to access snapshot data.
    针对更长期的监控,可以考虑使用SQL表函数访问快照数据。
  2. There are two options for user access to a table while a RUNSTATS is running against that table: allow read access and allow write access.
    当对一个表运行RUNSTATS时,有两种用户访问选项:允许读访问和允许写访问。
  3. Because locks are not persistent, the load utility also uses table states to control access to tables; these states remain in effect even if a load operation aborts.
    因为锁不是持久的,所以load工具也使用表状态来控制对表的访问;即使加载操作中断,这些状态仍然有效。
  4. You can obtain the statistics from the table descriptor of the table node in the underlying access path graph.
    您可以从基础访问路径图中的表节点的表描述符处获得该统计信息。
  5. To realize Flitter, you must extend the Drupal database to include a new Flitter table; permissions to access Flitter data, or flits; a form to edit a flit; and some code to manipulate the database.
    要实现Flitter,必须扩展Drupal数据库,以便包含一个新的Flitter表;访问Flitter数据的权限,或flit;编辑flit的表单;操作数据库的代码。
  6. The following code creates a table for Dreamweaver's access control management.
    下面的代码将为Dreamweaver的访问控制管理创建一个表。
  7. This locking was done for both index scans and table access whether or not the row of data was committed or whether it would have been excluded based on the statement's predicates.
    不管数据行是否被提交,以及根据语句的谓词它是否被排除,对于索引扫描和表访问都执行这样的锁定操作。
  8. The algorithm by which a table is scanned ( access method)
    被扫描的表的算法(访问方法)
  9. There is no FETCH or table node shown in the access path graph because it is an index-only scan.
    因为其是一个唯一索引扫描,所以在访问路径图中不显示FETCH或表节点。
  10. Furthermore, deleted rows are skipped unconditionally on table scan access, while deleted keys are not skipped for type-2 index scans ( unless you also set the DB2_SKIPDELETED registry variable).
    而且,在表扫描访问中,被删除行被无条件忽略,而对于type-2索引扫描,被删除的键不会被忽略(除非您还设置DB2SKIPDELETED注册表变量)。
  11. Support of external table creation, access, load, and unload from within the stored procedures makes it easier to perform the batch load and unload operations.
    存储过程中的外部表创建、访问、加载和卸载支持允许您更轻松地执行批加载和卸载操作。
  12. DB2 and IDS uses the statistics information in the catalog table to derive the best access plan.
    DB2和IDS使用目录表中的统计信息来制定最佳访问计划。
  13. To see the table descriptor, right-click the table node in the access path graph.
    为了查看表描述符,请右键单击访问路径图上的表节点。
  14. As was mentioned in the previous article, for single table access, there are two types of access methods: table space scan ( TBSCAN) and index scan ( IXSCAN).
    在第1部分中提到过,有两种类型访问方法:表空间扫描(TBSCAN)和索引扫描(IXSCAN)。
  15. The product documentation contains a table titled "Access required to the SYSTEM queues by WebSphere MQ" with details about which users need which level of access to the SYSTEM queues.
    产品文档包含一个标题为“AccessrequiredtotheSYSTEMqueuesbyWebSphereMQ”的表,列示了哪些用户需要哪个级别的SYSTEM队列访问。
  16. DB2's cost-based optimizer decides which table to scan and which table to access through the index.
    DB2的基于成本的优化器决定了要扫描的表以及通过索引要访问的内容。
  17. An Index only scan is an index access that is not followed by a table access because the index itself contains all the requested data.
    仅扫描索引是未包含表访问的索引访问,因为索引本身包含了所有被请求的数据。
  18. Dropping a column requires table reorganization before further table access is allowed.
    删除列之后要求进行表重组,然后才允许进行进一步的表访问。
  19. This means that the table creator will have access to the external table and must also have appropriate access to the data file ( s) associated with the external table.
    这意味着表创建者将拥有对外部表的访问权限,还必须拥有对与外部表关联的数据文件的适当访问权限。
  20. First, you must create an association rule model which is stored as PMML from which you can extract the rules into a database table for later Cognos access.
    首先,必须创建一个关联规则模型,该模型被存储为PMML,从中可以提取这些规则并将其放入一个数据库表以供日后的Cognos访问。
  21. Use list management, pivot table, and data access facilities
    使用数据库记录单、数据透视表、和数据管理
  22. To see the names of the fields, open the table in design view in access.
    要查看字段的名称,请在access的设计视图中打开表。
  23. The following table lists the object-specific access rights.
    下表列出了特定对象的拜会权限。
  24. When you add validation rules to a table and you then import data into that table, access applies your validation rules to the imported data.
    如果向表中添加有效性规则,然后将数据导入到该表中,则access会对导入的数据应用有效性规则。
  25. Saving trace results to a table allows the same access as saving the trace to a file plus you can query the table to search for specific events.
    将跟踪结果保存到表中后,可以与将跟踪保存到文件中后一样进行访问,另外还可以查询表以搜索特定事件。
  26. In addition to the amount of data table, the table different access patterns may also affect the performance and availability.
    除了表的数据量外,对表不同的访问模式也可能会影响性能和可用性。
  27. Table 1 Security Access Control Model Using Fast Table for PKI and PMI
    一个基于快表的PMI+PKI访问控制框架
  28. When designing and implementing the ARP protocol in high-end routers, we must deal with three key issues: consistency of the ARP table, ARP access failure and ARP security.
    在高性能路由器上设计与实现ARP协议时存在三个关键问题:ARP表的一致性、ARP表访问失效和ARP协议的安全。
  29. This limit the user's visit to the database table of Access only in subschema. It enhances the security coefficient of database and atonement the security problem of Access.
    文章在Access2000中实现了限制有关用户只能使用子模式对数据表的访问,增加了数据库的安全系数,弥补了Access2000安全上的不足。
  30. The design of database is based on the theory of relational database system. The ways of maintaining integrality of database and using transaction in multiple table access to guarantee the consistency and recoverability of database are discussed in the thesis.
    以关系数据库系统理论为基础进行了数据库设计,并讨论了保证数据完整性、在多数据表操作中应用事务处理等问题。