「FILE」の共起表現一覧(1語右で並び替え)5ページ目
該当件数 : 2010件
Barman became the first undertrial prisoner to | file his nomination papers for a parliamentary elect |
ctions, FTP with timestamp support, WebDAV, and | file history recovery are available through paid sub |
Over the winter of 2007, the CBC aired Fashion | File Host Hunt, a short-run reality show in which te |
The Rankin | File hosted by Bruce Rankin |
ound the world, offering free mail accounts and | file hosting services. |
A comparison of | file hosting services. |
In July 2010, Zombie Studios revealed to | file hosting site Big Download that the team was alr |
shows Jdownloader usability with different free | file hosting services. |
Drew Houston, co-founder of popular | file hosting service, Dropbox |
he compilation by posting the collection to the | file hosting service Sharebee. |
Badongo is a one-click hosting (and | file hosting) service, based in the USA. |
The music | file housing the Blaine Music Collection was complet |
limitations allowed Drivon and other lawyers to | file hundreds of new lawsuits. |
sman Hays sexual favors: "I can't type, I can't | file, I can't even answer the phone." |
fast asynchronous | file I/O functions and file notifications |
ed many features, including better mass storage | file I/O and even virtual variable memory! |
(or the | file icon is double-clicked), it runs immediately. |
located in the C:\\DOS directory (creating the | file if it does not exist), as well as one EXE file |
* Save it and overwrite the | file if it exists |
group ids - a process has access to a database | file if and only if the ownership and permissions of |
Examples include | file, image and database resources. |
Again in that year and their latest album Last | File in 1999. |
the Local Computer Zone by addressing the local | file in cache. |
the programming language C, fenv.h is a header | file in the standard library, containing various fun |
e name is derived from the name of the compiled | file in Ultima VII. |
ctual returns are documents a government has to | file in response to habeas corpus petitions. |
ver on the internet, or by uploading a suitable | file in one of the supported formats, such as BED or |
When the user clicks on a (text) | file in the remote file manager, it transfers the fi |
rsuivant of Arms at Yale university, and now on | file in the office of the City register is approved, |
number of unique IP addresses that retrieve the | file in a given period. |
A prefix header differs from a normal header | file in that it is automatically included at the beg |
Wubi also creates a swap | file in the Windows file system (c:\\ubuntu\\disks\\ |
The virus first locates an uninfected EXE | file in the current directory and creates a correspo |
ability to keep multiple older versions of each | file in the backup. |
Ubuntu is installed within a | file in the Windows file system (c:\\ubuntu\\disks\\ |
r, and his account for services rendered, is on | file in the archives at Boston, MA. |
lso be uncompressed, unencrypted, and the first | file in the ZIP archive. |
are aware of all of the parameters of the XSLT | file in question and provides for visual editing of |
a moniker synonymous with "boogeyman", after a | file in every Palm City precinct containing unusual |
"functions" which can be applied to a FID data | file in any sequence, by using UNIX pipes. |
itute raster for scalable fonts in a postscript | file in a situation where the original dvi file is u |
oank software counts the number of times that a | file in the Noank catalog is played and periodically |
Due to a bug in the virus, only the first EXE | file in any directory is infected. |
e the hydrothecae are arranged in a neat single | file; in either case they are not set on stalks but |
il is completed with the trojan dropping a text | file in each directory, with instructions to the vic |
User Guide CD (User guide | file in PDF format) |
conditions with randomized-evidence studies on | file in connection with serratiopeptidase, trial qua |
Document on | file in the Department of Criminal Justice at Jackso |
he programming language C, wctype.h is a header | file in the standard library, containing various fun |
wchar.h is a header | file in the C Standard Library, part of a 1995 exten |
Among the people named in the | file in connection with this group are President Fra |
l - for example, if a prompt is asked for every | file in a batch delete, one may be tempted to simply |
port can be changed via the torrc configuration | file in the Tor section of the program. |
Open up any | file in IDEA using a FishEye URL |
, commissions and public trusts are required to | file in the Office of the Secretary of State all mee |
ew variety in any union member country, and can | file in as many countries as desired without waiting |
e subverted PC (by putting its own SHIMGAPI.DLL | file in the system32 directory and launching it as a |
expert on the mission to destroy an information | file in the highly secure corporate building in Buen |
by an administrator (by directly moving the RCS | file in the repository, provided that the administra |
The Silvermaster | file in combination with other secret proofs such as |
Enter | file in which to save the key (/home/axl/.ssh/id_rsa |
of object was actually implemented as a plugin | file in an "Objects" folder. |
chael, Encyclopedia of Gods, New York, Facts On | File, Inc. 1993, p. 204 |
New York: Facts on | File, Inc., 1994 |
yclopedia of American Crime, New York, Facts on | File Inc., 1982 |
The following new features added by this update | file include "Replay Upload" and "Theatre of Legends |
Help | file included [French only at the moment, English tr |
x containing some pages from the actual Gestapo | file, including mug shots, signed confessions, polic |
e of the RAF's heroes, idolised by the rank and | file, including famously the Australian Keith Miller |
(local | file inclusion vulnerability) |
e (blind) SQL injections, OS commanding, remote | file inclusions (PHP), cross-site scripting (XSS), a |
framework, incorporating Strigi as a full-text | file indexing service, and NEPOMUK with KDE integrat |
The scores of letters in the Sternberger | file indicate that several of Jakob's friends and fa |
While the designation | file indicates that the route enters Cooke County, t |
he creator of the smallest DOS-based, parasitic | file infecter. |
AGENA is a memory resident, | file infecting computer virus which infects .COM and |
ed in April 1993, is an encrypted, overwriting, | file infecting computer virus which infects .COM and |
AGI-Plan was a memory resident DOS | file infector first isolated at the Agiplan software |
leevix is an unremarkable direct action Windows | file infector virus. |
Ontario.512 is an encrypting DOS | file infector. |
2048 is an encrypting, polymorphic, stealth DOS | file infector. |
Solano 2000 is a standard DOS | file infector. |
Unlike other generic | file infectors, AIDS II was the first known virus to |
filesystem's creation time is displayed as the | file info. |
Having this | file initiated can wreak havoc on computers and netw |
File input and output is sequential and record-orien | |
file input and output | |
Norton | File Insight |
The conclusions of this work, titled Rank and | File, inspired Lynd to study law in order to assist |
file installation program that used the Company's Na | |
void realdprintf (char const | *file, int line, ...); |
Verisys is a commercial | file integrity monitoring solution for Windows based |
(Johnson Library, National Security | File, Intelligence File, Guerrilla Problem in Latin |
sed images are usually stored in the JFIF (JPEG | File Interchange Format) file format. |
as this | file internally sub includes stddef.h. |
The | file interpret.p |
FBI has any information on Allen: the resulting | file intimates that Allen holds substantial funds in |
After the meal students | file into Guinn Auditorium for a Christmas presentat |
me activities, watching thousands of spectators | file into and out of the stadium on Sunday, February |
sed to parse the XML code orientation of an SVG | file into a form that can be accessed quickly by the |
T is used to transfer another | file into the one being edited, with this syntax: [l |
e townspeople (and Marjorie) turn into zombies, | file into trucks and head out of town. |
cilitates the splitting and re-joining of large | file into a collection of smaller files. |
Combine each newly created PDF | file into the one PDF. |
Include the EPS | file into the LaTeX document using \\includegraphics |
ipt to convert molecular coordinates from a PDB | file into the formats it uses internally. |
ims to convert all of the code of an executable | file into code that runs on the target architecture |
sheriff's deputy Jaye Winston brings McCaleb a | file involving a murder scene filled with exotic ele |
er several participants said they wanted to use | file IO (perhaps implying this way that the rule was |
classes for signal processing, audio, MIDI and | file IO and is available, cross-platform, for Linux, |
The Displaced | file is being held by a renegade 'special forces' le |
The native TMX | file is for use in OmegaT projects. |
Later, if an infected | file is executed, it infects the .COM files in the c |
The | file is simply a text file of either 68 or 70 bytes |
PDF) is linked from a mind map and the same | file is linked in the bibliographic database (BibTeX |
Once the | file is opened, the virus locates the victim's brows |
ange in the value of one of the keys on which a | file is sorted which requires some extra processing. |
This | file is typically encrypted. |
When a | file is recovered successfully, PhotoRec checks the |
If a | file is executed exactly six months to the hour afte |
Canada | File is a Canadian documentary television series whi |
rus will reside in the memory after an infected | file is run and will infect any other .COM files exe |
tested with mixed results, as the intended AVI | file is rarely the desired video file. |
where a program | file is being edited and can be sent to the attached |
The small single | file is a result of compilation and minification of |
The message audio | file is usually stored as the primary standard emerg |
If an internal | file is a scalar, it has a single record whose lengt |
file is several hundred kilobytes in size, while inc | |
Transputting a | file is essentially sequential. |
Each time an infected | file is executed, Acme may infect an EXE in the curr |
However, when the | file is unpacked its contents are more than the syst |
This | file is still available for download on various webs |
ver names “Myrna”; Umnitsa, “Clever Girl”), the | file is also known as the Bentley file or Gregory fi |
This | file is then loaded into a file preparation software |
n such a way that the original transmitter of a | file is indistinguishable from those who are merely |
When the infected | file is run, it displays a message in German. |
during extraction, it is difficult to see which | file is being copied, and thus to avoid copying file |
ith the file-modified time) is destroyed if the | file is moved between the phone and the card, causin |
For Microsoft Excel, at least, the data | file is amended each time the file is opened, even i |
ocument should be generated by default when the | file is saved. |
The number of runs in each | file is related to Fibonacci numbers and Fibonacci n |
a web page along with its resources as an MHTML | file is not standardized. |
A | file is a military term for a number of troops drawn |
An SDRF | file is a tab-delimited file describing the relation |
The purpose of this | file is to provide a more reliable way for applicati |
A Soma | File is a proprietary XML based language that is use |
The | file is self replicating and is modified on a regula |
ple experimental designs, constructing the SDRF | file is straightforward, and even complex loop desig |
is determined dynamically at the time when the | file is scheduled to be broadcast.) |
If | file is not present, omitting the file parameter or |
However, this rare | file is still circulated on file sharing networks. |
Each time an infected | file is executed, Acid infects all of the .EXE files |
The Lucinda | File is unmasked to be a log of the events of the in |
Whenever a .EXE | file is run, 5lo will infect it (and another .EXE fi |
If the data of the recovered | file is not correct, parts of the file may still be |
This saved text | file is the last official posting of this FAQ by Dav |
The map | file is UTM projected and georeferenced to the surfa |
An indexed | file is a computer file with an index that allows ea |
EOVERFLOW - if the | file is a regular file and the size of the file cann |
When an "infected" | file is executed, since a corresponding COM file exi |
the virus, either LIST.DOC or another infected | file, is downloaded and opened, then the macro in th |
This | file is seen by Ubuntu as additional RAM. |
When the infected | file is run, and the picture is closed, the worm run |
This | file is seen by Linux as a real hard disk. |
file is created and sent to the machine's software. | |
When a | file is open, type L to list the contents. |
mani Kolacase (translated as Chinthamani Murder | File) is a Malayalam movie loosely based on an Engli |
A special plaintext | file is created and encrypted with the encryption me |
Well Manufacturing Storyboard - this Adobe PDF | file is a basic flow diagram of the fictitious pharm |
If a separate interface declaration | file is needed, it is created by stripping the code |
Each time an infected | file is executed, Abraxas infects the copy of dosshe |
ation, where access to the server configuration | file is not routinely needed. |
A tab-separated values | file is a simple text format for a database table. |
This | file is typically located in the root directory of t |
The International Shark Attack | File is a global database of shark attacks. |
The | file is accessible only to scientists whose access i |
hing together in one or more files in which the | file is significantly longer than the width of ranks |
Crawl | File is the first compilation album of songs release |
Stored inside the | file is a mono copy of the song playable in standard |
ch feeds in an RSS editor application, the feed | file is usually transmitted via FTP to the web serve |
Crime | File is a 1999 Malayalam film by K. Madhu starring S |
le is that of a data carousel, where some large | file is continuously broadcast to a set of receivers |
s a named event opened and checks it whenever a | file is opened. |
The default data stream of a regular | file is a stream of type $DATA but with an anonymous |
This password | file is readable by anyone who has physical access t |
pies of files on a local Hard disk so that if a | file is accessed again, it can be done locally at mu |
A parish history | file is held in Holsworthy Library. |
When a database | file is journaled, updates are written to journal fi |
The FBI's Silvermaster | file is a 162-volume compendium of some 26,000 pages |
y, most antivirus programs can detect whether a | file is a zip bomb and so avoid unpacking it. |
user interaction, regardless where the shortcut | file is located. |
The Encyclopedia of the McCarthy Era, Facts on | File, ISBN 0816030979 . |
l control on their data) importer can enter and | file ISF entries directly with customs. |
e collecting several coins scattered throughout | File Island. |
Most any multimedia | file it can get libavformat to read and libavcodec t |
hin any routine defined within that same source | file, it will maintain its life for the duration of |
If PhotoRec has already started to recover a | file, it stops its recovery, checks the consistency |
ed voter qualifications, required candidates to | file itemized expense statement, required primary el |
he Federal Communications Commission and had to | file its own tariffs, although progressive deregulat |
Married couples may | file joint returns, in which case $2,500 of the coup |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |