快好知 kuaihz


dos造句
91 The transient portion of the DOS command processor contains all of the DOS internal commands. 92 ' Virginia Shea's book, Netiquette, lists a basic set of dos and don'ts for communicating appropriately with others in cyberspace. 93 John Dos Passos , shocked by Hemingway's condemnation of Grace , said he was " the only man I ever knew who really hated his mother ." 94 Listing 2 shows the series of commands that you can execute from a DOS prompt to achieve this. 95 This error generally occurs when an Add-in has been selected to be used from the Command prompt (DOS prompt) but the add-in does not list itself as safe for the command line. 96 This paper discusses the limitation of the real-time control to radar when using disk operating system(DOS)on personal computer(PC). 97 All results here are implemented under CC — DOS in IBM — PC. 98 Safety assessment of the combined device for catalytic cracking of dead oil was made using DOS method. 99 Attacks on a company or organization's computer systems take many different forms, such as spoofing, smurfing, and other types of Denial of Service (DoS) attacks. 100 The transient portion of the dos command processor contains all of the dos internal commands. 101 You can verify the active code page by typing chcp from the DOS prompt. 102 The command processor is the portion of DOS that invokes each of the commands you issue. 103 DOS system in the multitask processing parade C language source code. 104 An easy to use text editor for MS - DOS and compatible systems. 105 Manual pages come out best if printed with the DOS print command. 106 Disk Operating System (DOS) is a program that controls the transfer of data to and from a hard or floppy disk, frequently combined with the main operating system. 107 One of the basic programs is Disk Operating System, we call it DOS. Passage B A standard keyboard mainly consists of three functional groups. 108 A new system to defend DoS - Active DDoS Defense System ( ADDS ) - is presented in this paper. 109 Based on the structure of-WPS's file and file handles access in DOS, the paper gives a assembly language program, which is designed to find the cryptic code of the files encrypted in WPS. 110 This paper talks about a mothod of enlarging and displaying of uighur characters by using DOS. 111 When Windows first came out, Microsoft hoped the new DOS shell would one day ship on most PCs. 112 B : It's in DOS mode. You need to type in a command. 113 Low season Kanlou benefits dos: Yi found comfort issue price concessions! 114 No tenemos el cuarenta y dos de este color, s ? ? lo los tenemos en azul. 115 The first pocket-size computer he bought back in the late 1980s was a diminutive DOS machine made by Sharp of Japan. 116 DOS menu programmed by using Novell Netware principles is presented. 117 Angolan Prime Minister Fernando da Piedade Dias dos Santos held a grand ceremony to see him off at the parking apron of the airport. 118 For network security, it is important to defend from DOS attack. 119 By default, DOS uses the file COMMAND. COM as the command processor. 120 This pa- per introduces the data conversion system under DOS and XENIX operating systems.