From professional translators, enterprises, web pages and freely available translation repositories.
one is enough
one is enough
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
处理器% 1% 1 is one of the cpu policies
processor %1
Last Update: 2011-10-23
Usage Frequency: 3
Quality:
criteria can be one (and only one) of the following:
criteria can be one (and only one) of the following:
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
if a static variable is unset() inside of a function, unset() destroyes the variable and all its references.
if a static variable is unset() inside of a function, unset() destroyes the variable and all its references.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
该列表显示有关选中的类别的系统信息 。% 1 is one of the modules of the kinfocenter, cpu info, os info, etc
this list displays system information on the selected category.
Last Update: 2011-10-23
Usage Frequency: 3
Quality:
默认文件夹% 1 is one of the messages with context 'type of folder content'
default folder
Last Update: 2011-10-23
Usage Frequency: 3
Quality:
sets how installed files will be laid out. type is one of php (default) or gnu.
if this is enabled, the php cgi binary can safely be placed outside of the web tree and people will not be able to circumvent .htaccess security.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
with php security, there are two sides to error reporting. one is beneficial to increasing security, the other is detrimental.
for example, if an attacker had gleaned information about a page based on a prior form submission, they may attempt to override variables, or modify them:
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
each pair of escape sequences partitions the complete set of characters into two disjoint sets. any given character matches one, and only one, of each pair.
at each iteration of the subpattern, the back reference matches the character string corresponding to the previous iteration.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
in general, security by obscurity is one of the weakest forms of security. but in some cases, every little bit of extra security is desirable.
but in some cases, every little bit of extra security is desirable.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
if you find yourself using this function all the time, a much better way to define the encoding is to set ps.default_encoding in the configuration file to point to the right encoding file and all fonts you load will automatically have the right encoding.
if you find yourself using this function all the time, a much better way to define the encoding is to set ps.default_encoding in the configuration file to point to the right encoding file and all fonts you load will automatically have the right encoding.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
this example opens a zip file archive, reads each file in the archive and prints out its contents. the test2.zip archive used in this example is one of the test archives in the zziplib source distribution.
the test2.zip archive used in this example is one of the test archives in the zziplib source distribution.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
there are two ways to set up php to work with apache 2.0 on windows. one is to use the cgi binary the other is to use the apache module dll. in either case you need to stop the apache server, and edit your httpd.conf to configure apache to work with php.
download the most recent version of apache 2.0 and a fitting php version from the above mentioned places.
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
this function should be called after you initialize a curl session and all the options for the session are set. its purpose is simply to execute the predefined curl session (given by the ch).
its purpose is simply to execute the predefined curl session (given by the ch).
Last Update: 2011-10-24
Usage Frequency: 1
Quality:
the thesis that underlies this book can be reduced to an extremely simple formula: death is the origin and the center of culture. my aim is to illustrate this thesis employing ancient egyptian culture as my example. when it comes to the importance of death, this culture is admittedly an extreme example. but this has largely to do with the fact that we view ancient egypt from the standpoint of a culture that is equally extreme, but in the opposite direction. from the point of view of comparative anthropology, it is we, not the ancient egyptians, who are the exception. few cultures in this world exclude death and the dead from their reality as radically as we do. living with the dead and with death is one of the most normal manifestations of human culture, and it presumably lies at the heart of the stuff of human existence. in this book, i thus pursue three matters of concern. one, and this is the most important, is to supply an introduction to the conceptual world of ancient egyptian mortuary religion, to which the unusually large number of preserved texts afford us a privileged entrée. in ancient egypt, mortuary religion was not simply one area of cultural praxis among others, such as the cult of the gods, economy, law, politics, literature, and so forth. rather, in this case, we are dealing with a center of cultural consciousness, one that radiated out into many—we might almost say, in
the thesis that underlies this book can be reduced to an extremely simple formula: death is the origin and the center of culture. my aim is to illustrate this thesis employing ancient egyptian culture as my example. when it comes to the importance of death, this culture is admittedly an extreme example. but this has largely to do with the fact that we view ancient egypt from the standpoint of a culture that is equally extreme, but in the opposite direction. from the point of view of comparative
Last Update: 2023-11-20
Usage Frequency: 2
Quality: