「FILE」の共起表現(1語右で並び替え)5ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

「FILE」の共起表現一覧(1語右で並び替え)5ページ目

該当件数 : 2010



Barman became the first undertrial prisoner to file his nomination papers for a parliamentary elect
ctions, FTP with timestamp support, WebDAV, and file history recovery are available through paid sub
Over the winter of 2007, the CBC aired Fashion File Host Hunt, a short-run reality show in which te
The Rankin File hosted by Bruce Rankin
ound the world, offering free mail accounts and file hosting services.
A comparison of file hosting services.
In July 2010, Zombie Studios revealed to file hosting site Big Download that the team was alr
shows Jdownloader usability with different free file hosting services.
Drew Houston, co-founder of popular file hosting service, Dropbox
he compilation by posting the collection to the file hosting service Sharebee.
Badongo is a one-click hosting (and file hosting) service, based in the USA.
The music file housing the Blaine Music Collection was complet
limitations allowed Drivon and other lawyers to file hundreds of new lawsuits.
sman Hays sexual favors: "I can't type, I can't file, I can't even answer the phone."
fast asynchronous file I/O functions and file notifications
ed many features, including better mass storage file I/O and even virtual variable memory!
(or the file icon is double-clicked), it runs immediately.
located in the C:\\DOS directory (creating the file if it does not exist), as well as one EXE file
* Save it and overwrite the file if it exists
group ids - a process has access to a database file if and only if the ownership and permissions of
Examples include file, image and database resources.
Again in that year and their latest album Last File in 1999.
the Local Computer Zone by addressing the local file in cache.
the programming language C, fenv.h is a header file in the standard library, containing various fun
e name is derived from the name of the compiled file in Ultima VII.
ctual returns are documents a government has to file in response to habeas corpus petitions.
ver on the internet, or by uploading a suitable file in one of the supported formats, such as BED or
When the user clicks on a (text) file in the remote file manager, it transfers the fi
rsuivant of Arms at Yale university, and now on file in the office of the City register is approved,
number of unique IP addresses that retrieve the file in a given period.
A prefix header differs from a normal header file in that it is automatically included at the beg
Wubi also creates a swap file in the Windows file system (c:\\ubuntu\\disks\\
The virus first locates an uninfected EXE file in the current directory and creates a correspo
ability to keep multiple older versions of each file in the backup.
Ubuntu is installed within a file in the Windows file system (c:\\ubuntu\\disks\\
r, and his account for services rendered, is on file in the archives at Boston, MA.
lso be uncompressed, unencrypted, and the first file in the ZIP archive.
are aware of all of the parameters of the XSLT file in question and provides for visual editing of
a moniker synonymous with "boogeyman", after a file in every Palm City precinct containing unusual
"functions" which can be applied to a FID data file in any sequence, by using UNIX pipes.
itute raster for scalable fonts in a postscript file in a situation where the original dvi file is u
oank software counts the number of times that a file in the Noank catalog is played and periodically
Due to a bug in the virus, only the first EXE file in any directory is infected.
e the hydrothecae are arranged in a neat single file; in either case they are not set on stalks but
il is completed with the trojan dropping a text file in each directory, with instructions to the vic
User Guide CD (User guide file in PDF format)
conditions with randomized-evidence studies on file in connection with serratiopeptidase, trial qua
Document on file in the Department of Criminal Justice at Jackso
he programming language C, wctype.h is a header file in the standard library, containing various fun
wchar.h is a header file in the C Standard Library, part of a 1995 exten
Among the people named in the file in connection with this group are President Fra
l - for example, if a prompt is asked for every file in a batch delete, one may be tempted to simply
port can be changed via the torrc configuration file in the Tor section of the program.
Open up any file in IDEA using a FishEye URL
, commissions and public trusts are required to file in the Office of the Secretary of State all mee
ew variety in any union member country, and can file in as many countries as desired without waiting
e subverted PC (by putting its own SHIMGAPI.DLL file in the system32 directory and launching it as a
expert on the mission to destroy an information file in the highly secure corporate building in Buen
by an administrator (by directly moving the RCS file in the repository, provided that the administra
The Silvermaster file in combination with other secret proofs such as
Enter file in which to save the key (/home/axl/.ssh/id_rsa
of object was actually implemented as a plugin file in an "Objects" folder.
chael, Encyclopedia of Gods, New York, Facts On File, Inc. 1993, p. 204
New York: Facts on File, Inc., 1994
yclopedia of American Crime, New York, Facts on File Inc., 1982
The following new features added by this update file include "Replay Upload" and "Theatre of Legends
Help file included [French only at the moment, English tr
x containing some pages from the actual Gestapo file, including mug shots, signed confessions, polic
e of the RAF's heroes, idolised by the rank and file, including famously the Australian Keith Miller
(local file inclusion vulnerability)
e (blind) SQL injections, OS commanding, remote file inclusions (PHP), cross-site scripting (XSS), a
framework, incorporating Strigi as a full-text file indexing service, and NEPOMUK with KDE integrat
The scores of letters in the Sternberger file indicate that several of Jakob's friends and fa
While the designation file indicates that the route enters Cooke County, t
he creator of the smallest DOS-based, parasitic file infecter.
AGENA is a memory resident, file infecting computer virus which infects .COM and
ed in April 1993, is an encrypted, overwriting, file infecting computer virus which infects .COM and
AGI-Plan was a memory resident DOS file infector first isolated at the Agiplan software
leevix is an unremarkable direct action Windows file infector virus.
Ontario.512 is an encrypting DOS file infector.
2048 is an encrypting, polymorphic, stealth DOS file infector.
Solano 2000 is a standard DOS file infector.
Unlike other generic file infectors, AIDS II was the first known virus to
filesystem's creation time is displayed as the file info.
Having this file initiated can wreak havoc on computers and netw
File input and output is sequential and record-orien
file input and output
Norton File Insight
The conclusions of this work, titled Rank and File, inspired Lynd to study law in order to assist
file installation program that used the Company's Na
void realdprintf (char const *file, int line, ...);
Verisys is a commercial file integrity monitoring solution for Windows based
(Johnson Library, National Security File, Intelligence File, Guerrilla Problem in Latin
sed images are usually stored in the JFIF (JPEG File Interchange Format) file format.
as this file internally sub includes stddef.h.
The file interpret.p
FBI has any information on Allen: the resulting file intimates that Allen holds substantial funds in
After the meal students file into Guinn Auditorium for a Christmas presentat
me activities, watching thousands of spectators file into and out of the stadium on Sunday, February
sed to parse the XML code orientation of an SVG file into a form that can be accessed quickly by the
T is used to transfer another file into the one being edited, with this syntax: [l
e townspeople (and Marjorie) turn into zombies, file into trucks and head out of town.
cilitates the splitting and re-joining of large file into a collection of smaller files.
Combine each newly created PDF file into the one PDF.
Include the EPS file into the LaTeX document using \\includegraphics
ipt to convert molecular coordinates from a PDB file into the formats it uses internally.
ims to convert all of the code of an executable file into code that runs on the target architecture
sheriff's deputy Jaye Winston brings McCaleb a file involving a murder scene filled with exotic ele
er several participants said they wanted to use file IO (perhaps implying this way that the rule was
classes for signal processing, audio, MIDI and file IO and is available, cross-platform, for Linux,
The Displaced file is being held by a renegade 'special forces' le
The native TMX file is for use in OmegaT projects.
Later, if an infected file is executed, it infects the .COM files in the c
The file is simply a text file of either 68 or 70 bytes
PDF) is linked from a mind map and the same file is linked in the bibliographic database (BibTeX
Once the file is opened, the virus locates the victim's brows
ange in the value of one of the keys on which a file is sorted which requires some extra processing.
This file is typically encrypted.
When a file is recovered successfully, PhotoRec checks the
If a file is executed exactly six months to the hour afte
Canada File is a Canadian documentary television series whi
rus will reside in the memory after an infected file is run and will infect any other .COM files exe
tested with mixed results, as the intended AVI file is rarely the desired video file.
where a program file is being edited and can be sent to the attached
The small single file is a result of compilation and minification of
The message audio file is usually stored as the primary standard emerg
If an internal file is a scalar, it has a single record whose lengt
file is several hundred kilobytes in size, while inc
Transputting a file is essentially sequential.
Each time an infected file is executed, Acme may infect an EXE in the curr
However, when the file is unpacked its contents are more than the syst
This file is still available for download on various webs
ver names “Myrna”; Umnitsa, “Clever Girl”), the file is also known as the Bentley file or Gregory fi
This file is then loaded into a file preparation software
n such a way that the original transmitter of a file is indistinguishable from those who are merely
When the infected file is run, it displays a message in German.
during extraction, it is difficult to see which file is being copied, and thus to avoid copying file
ith the file-modified time) is destroyed if the file is moved between the phone and the card, causin
For Microsoft Excel, at least, the data file is amended each time the file is opened, even i
ocument should be generated by default when the file is saved.
The number of runs in each file is related to Fibonacci numbers and Fibonacci n
a web page along with its resources as an MHTML file is not standardized.
A file is a military term for a number of troops drawn
An SDRF file is a tab-delimited file describing the relation
The purpose of this file is to provide a more reliable way for applicati
A Soma File is a proprietary XML based language that is use
The file is self replicating and is modified on a regula
ple experimental designs, constructing the SDRF file is straightforward, and even complex loop desig
is determined dynamically at the time when the file is scheduled to be broadcast.)
If file is not present, omitting the file parameter or
However, this rare file is still circulated on file sharing networks.
Each time an infected file is executed, Acid infects all of the .EXE files
The Lucinda File is unmasked to be a log of the events of the in
Whenever a .EXE file is run, 5lo will infect it (and another .EXE fi
If the data of the recovered file is not correct, parts of the file may still be
This saved text file is the last official posting of this FAQ by Dav
The map file is UTM projected and georeferenced to the surfa
An indexed file is a computer file with an index that allows ea
EOVERFLOW - if the file is a regular file and the size of the file cann
When an "infected" file is executed, since a corresponding COM file exi
the virus, either LIST.DOC or another infected file, is downloaded and opened, then the macro in th
This file is seen by Ubuntu as additional RAM.
When the infected file is run, and the picture is closed, the worm run
This file is seen by Linux as a real hard disk.
file is created and sent to the machine's software.
When a file is open, type L to list the contents.
mani Kolacase (translated as Chinthamani Murder File) is a Malayalam movie loosely based on an Engli
A special plaintext file is created and encrypted with the encryption me
Well Manufacturing Storyboard - this Adobe PDF file is a basic flow diagram of the fictitious pharm
If a separate interface declaration file is needed, it is created by stripping the code
Each time an infected file is executed, Abraxas infects the copy of dosshe
ation, where access to the server configuration file is not routinely needed.
A tab-separated values file is a simple text format for a database table.
This file is typically located in the root directory of t
The International Shark Attack File is a global database of shark attacks.
The file is accessible only to scientists whose access i
hing together in one or more files in which the file is significantly longer than the width of ranks
Crawl File is the first compilation album of songs release
Stored inside the file is a mono copy of the song playable in standard
ch feeds in an RSS editor application, the feed file is usually transmitted via FTP to the web serve
Crime File is a 1999 Malayalam film by K. Madhu starring S
le is that of a data carousel, where some large file is continuously broadcast to a set of receivers
s a named event opened and checks it whenever a file is opened.
The default data stream of a regular file is a stream of type $DATA but with an anonymous
This password file is readable by anyone who has physical access t
pies of files on a local Hard disk so that if a file is accessed again, it can be done locally at mu
A parish history file is held in Holsworthy Library.
When a database file is journaled, updates are written to journal fi
The FBI's Silvermaster file is a 162-volume compendium of some 26,000 pages
y, most antivirus programs can detect whether a file is a zip bomb and so avoid unpacking it.
user interaction, regardless where the shortcut file is located.
The Encyclopedia of the McCarthy Era, Facts on File, ISBN 0816030979 .
l control on their data) importer can enter and file ISF entries directly with customs.
e collecting several coins scattered throughout File Island.
Most any multimedia file it can get libavformat to read and libavcodec t
hin any routine defined within that same source file, it will maintain its life for the duration of
If PhotoRec has already started to recover a file, it stops its recovery, checks the consistency
ed voter qualifications, required candidates to file itemized expense statement, required primary el
he Federal Communications Commission and had to file its own tariffs, although progressive deregulat
Married couples may file joint returns, in which case $2,500 of the coup
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS