「FILEs」の共起表現(1語右で並び替え)6ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

「FILEs」の共起表現一覧(1語右で並び替え)6ページ目

該当件数 : 1457



ll RDO file and then request the larger bitmap files only when necessary: This allows a full job sp
d and of hackers who try to break in and steal files only to have the prisoners try to break out vi
first version ran under PHP 3.x and ran on DBM files only.
other Unix operating systems to transfer audio files onto their iPod Classic, iPod Nano, iPod Shuff
Design files, or DGN files (*.dgn) are binary files with va
ould be assumed that either there were no more files, or the link was broken anyway.
User Friendly - No configuration files or quirky command lines have to be run to use
d on home servers, offer large images or movie files or have inefficiently generated dynamic conten
sites to take advantage of better calibration files or software.
files or updating existing ones as necessary.
typically an action executed on a file, set of files or directory.
files or SQL-based DBMS such as MySQL, PostgreSQL/Po
The mappings can be defined using either XML files or metadata annotations .
s that require system privileges for accessing files or other resources.
Matching wildcard patterns to multiple files or paths is referred to as glob expansion.
hich the customers can themselves use to store files or data objects.
tives to proprietary formats like Autodesk DWG files or ESRI Shapefiles.
For downloads, the client sends a request for files or directories to be downloaded.
truments that undergo evolution of calibration files or calibration software often required users t
r to retrieve references and corresponding PDF files or web pages, or to obtain references for arti
instead of synchronizing) copy, move or delete files or to flatten a directory structure into a sin
that may include multiple procedures, multiple files, or the entire program.
ents or when handling I/O on a large number of files or sockets.
Biological data are commonly stored in files or databases.
rocessors can output to other formats like RTF files or even just a window in the user's GUI displa
The element matrices are read from files or created as needed and discarded.
e from Z80 sources in binary format as DOS COM files or in CP/M-86 CMD format.
eviously-saved image that contains no personal files or information.
cal view of a file system, allowing individual files or directories to be previewed or retrieved on
Jungle Disk can periodically back up selected files or folders.
ive (or full text on the web) through links to files or by inserting copies of PDFs.
ide cross-users deduplication so shared common files or byte sequences are synchronized without act
Data can also be imported from CSV files or spreadsheets (Microsoft Excel, OpenOffice.o
Web-based programs that try to access files or computer registries are stopped from leavin
rs - a Windows application that imports GEDCOM files or comma-separated values (CSV) files and conv
n, like opening and then automatically closing files or freeing up memory.
such as creating new diagrams, saving them as files or adding objects to the modeling canvas, ARIS
Inclusion list ( files or folders)
documents, randomly deleting sets of data from files, or, at the worst, making them completely usel
frastructure), Legal implementation (the telex files), Organisations (locoregional teams) and Wisdo
template classes to process template and list files, organised in a template class hierarchy that
ies resulting from the project are simply text files; other programs are needed to search and displ
These websites create NZB files out of what is needed to be downloaded.
thorough defragmention, and the ability to lay files out on disk exactly where required, sorted by
Files outside their zone are moved to their zone.
ned for sending confidential messages or large files over the internet instantly.
It can edit remote files over FTP.
d at an early stage, but a program to transfer files over parallel or serial cables was developed a
a service which allowed users to back up their files over the Internet.
d the theoretical framework to distribute data files over an RSS channel, anticipating what is now
algorithms called P4P researchers have shared files over the internet 20% faster and using 5 times
client to access other website configurations, files, passwords and the like.
Import notes functionality for Word, image files, pdf files.
omated Backup with Multiple, Historical Backup Files per Network Device)
able program reads parameter values from input files, performs the simulation and writes requested
mounted volumes for changes and copies changed files periodically to a specially-designated volume
Files pertaining to the holders of the British Natio
was followed in 2002 by a sequel, The Cameron Files: Pharaoh's Curse.
duct, My Gigmax, is an application which syncs files, photos and media among multiple computers and
The Files portion is a regular FTP, SFTP, FTP+SSL, and W
estors is an application for converting GEDCOM files produced by genealogy software into Keyhole Ma
can also convert comma-separated values (CSV) files produced by spreadsheet or database software i
Like a modem init string, modem scripts files provide modem configuration settings.
Two key files provide most of the test framework functionali
-generated links to songs and other multimedia files provided by Internet content providers.
ons, such as running tasks, moving and copying files, providing high-level recoverability.
ntaining command directives and correspondence files; providing duplicating services and messenger
ian Andy Worthington, author of The Guantanamo Files, published a letter from Montalvo's colleague
hould investigate claims of abuse contained in files published on the Wikileaks website".
Andy Worthington, author of the The Guantanamo Files, Qalam was arrested in Kabul on September 3, 2
plementation of all components in the included files, rather than just their interfaces
be malicious if it attempts to modify certain files, read from or write to a sensitive area of the
The Walter A. Lundy Files, Red and Black (Fall 1953) Integration Issue P
Large files referred to as "space hogs" in the documentati
Many files regarding the home can be found at the Bedford
allow employees to access and manage corporate files regardless of the type of computing platform -
Certificates in the Village files register growth at smaller intervals than the
It modifies system files related to Outlook Express and Internet Explor
In 1932 Gustav also stole some FBI files related to the murders, which he later passed
5, the government admitted that almost all the files related to the SCOPG report had been destroyed
This is particularly apparent in his files relating to the second edition of his Guide to
isk, since users may not be aware that deleted files remain accessible.
However, the relevant files remain closed to historians.
Internet Explorer-created MHT files render perfectly, and rendering of the diverge
He regularly files reports on the game which are heard mainly on
pers consisting of correspondence, legislative files, Republican Party and campaign files, book res
ithout court approval, provided the government files required papers within a week.
from a computer's file system whether all the files required for a document to print are present a
These files resemble conventional AVI files, but are engin
August 18, 1917 - Doroshenko files resignation, Vynnychenko was offered to form a
l, she pulled all of Constable Benton Fraser's files, resulting in a rather negative initial opinio
Files retrieved 02-24-2007
erdict was later overturned on appeal, and the files returned.
"MI5 files reveal how 'King Kong' betrayed Allies", in: T
The files revealed that the fingerprints belonged to a 4
lace of Cutie Q, but an analysis of the disc's files reveals that Cutie Q's files are still present
s, patrol assembly, radio, record, and customs files rooms, a dormitory for immigration officers, a
o a Washington Post feature story, the Archive files roughly 2,000 FOIA requests annually, collecti
The Dresden Files RPG has expanded upon this law in its publicat
the proverb on the screen and then deletes all files running while the virus is a resident in the m
One of the interview subjects, James Files, said he was the gunman responsible for taking
Andy Worthington, author of the The Guantanamo Files, Salah Mohammad Ali is a Pakistani who grew up
Apple Writer II files saved as standard text files rather than the o
ion on the iPhone/iPod Touch/iPad a view shows files saved in the software.
MFO's archives (Activities report et archives files, Schaeffer in particular)
The Fitrakis Files: Schoolhouse Divided
orate schemes allowed users to download binary files, search gopherspace, and interact with distant
The Cameron Files: Secret at Loch Ness is an adventure video gam
rance in Small Favor, 10th book of the Dresden Files series by Jim Butcher
In the Dresden Files series of novels, by Jim Butcher, Nicodemus be
er, best known for creating the Kindaichi Case Files series.
Playing With Fire' and as part of the Forensic Files series.
005 and is the third installment in The Oregon Files series.
television shows America's Most Wanted and Fox Files several times in 1999 and arrested in Tampa, F
ket is running and configured to allow it, any files shared will be detectable on the local network
o access encrypted filesystems within ordinary files should occur as transparently as possible
le rules control which differences between two files should be flagged as such.
Church files show a baptism date of October 27 (November 8)
cture first used within IBM to store employees files since 2001.
Music files sold by Magnatune do not use any form of digit
as many options for inspecting or checking PDF files, some of which are useful primarily to PDF dev
Very often they have access to the files sometimes a few minutes before the opening of
The Ada virus mainly targets .COM files, specifically COMMAND.COM.
Andy Worthington, author of the The Guantanamo Files, speculated Pasta Khan might be "Masta Khan",
The Fitrakis Files: Spooks, Nukes and Nazis
Additionally, there are predesigned chip files stored on the various disks containing the gam
7 websites were targets in the attack based on files stored on compromised systems.
coordinate with 56 field offices and retrieve files stored in 265 locations nationwide.
Files stored in humyo can be shared with other users
r, and the game designer doesn't want the game files stored in an easily-accessed place where the u
The game allows custom soundtracks; MP3 files stored on the memory stick can be played in-ga
According to the files, Storey convinced the court to allow NRC to bo
vedrive app enables users to view any of their files, stream music and video on their iPhone, iPad
files submitted by developers.
Senuti is an application for transferring files, such as songs and videos, from an iPod or iPh
Seemingly desirable video files, such as recent movies, are released via BitTo
h systems, Strigi can extract information from files, such as the length of an audio clip, the cont
tant role when it comes to non-mergable binary files such as graphic assets.
e that allows you to stream or broadcast media files such as BMP, GIF, AVI and other video formats
nced the offering with 'sideloading' - storing files such as MP3s collected on the Web without the
"a dedicated search site to find downloadable files such as audio, video and documents".
bly detract from the image's quality, but JPEG files suffer generational degradation when repeatedl
ger is in love with Pop's daughter Barbara and files suit against Sarah in order to gain control of
ness Journal, April 4, 2003 Macintosh Retailer Files Suit, Says Apple Deal Turned Sour
ion compiled over 9,000 pages of investigative files, sworn statements by witnesses and status repo
e (both in the text editor and across multiple files), syntax highlighting and auto-completion for
When Gretchen Corbett left The Rockford Files television series in 1978, Hopkins as "John Co
rwhelmed with harness programs, test case data files, test result files, and so on.
It is able to recover files that have been "permanently" deleted and marke
The diff files that serve as input to patch are readable text
Memopal supports revision history; files that are deleted or overwritten may be recover
Musipedia locates the MIDI files that go into its search index by using the Ale
ar of gold and evidence taken from Hennessey's files that could clear Jones' name.
ut image quality was restricted by the size of files that could be posted.
It shows to the user files that exist, do not exist or have changed since
It contained numerous files that mentioned or implicated politicians and m
First it detects viruses and other files that have a suspicious behaviour (behaviour an
signs after Tom Lennox threatens to expose the files that show that her husband released Fayed who
Recording the names and locations of the files that comprise those objects.
Files that are totally compatible with Internet Expl
Files that are identical are hard linked, which uses
alog, having said this, you can still scan any files that you want to download by right-clicking on
rm spreads itself by dropping malicious script files that affect the behavior of popular IRC progra
This includes files that can be printed out to created a book cove
"SpyVampire will scan and remove any files that are infecting your PC with Adware/Spyware
ith the minimum being three, but even more for files that have high end-in demand or need more redu
Different files that can execute but do not necessarily confor
ar's Eve and finds a number of top secret NATO files that should not have been there.
the infected computer, counting the number of files that have been analyzed by the malicious code.
CIA files that were declassified in 2005 and then public
e are many different blocked executible (.exe) files that Your PC Protector protects a computer use
Because of this, an iPod cannot recognize files that have been copied directly into the low-le
nc, because of the Light-weight Sync, only the files that he or she modifies will be copied over.
order and released 53 portable document format files that contained several hundred Combatant Statu
icorruption Directorate, he started re-opening files that had been previously closed by the former
tkit hides the network traffic, processes, and files that an attacker decides to keep invisible to
st edition of his book and on the basis of MI5 files that she committed suicide; this statement was
ard also defines the systems to develop permit files that are delivered to end-users of ENC data en
his file contains the checksums for the update files that are verified on the client side, increasi
tion in the account) and sharer (for uploading files that are not necessarily the work of that pers
Files that are uploaded to omploader never expire, b
which reads in source code and produces object files that can subsequently be linked and run.
Users can attach files that may be relevant to that particular phone
i-virus software vendors can receive copies of files that were flagged by other scans but passed by
swfmill may be used to generate SWF files that contain library assets for use with MTASC
that many people have large collections of MP3 files that cannot be played on a conventional HiFi w
Files that need to be restored can be delivered in t
, including Love, American Style, The Rockford Files, The Interns, Mannix and Fantasy Island.
For exported files, the BlackBerry version allows files to be cop
he Wild Wild West, Fantasy Island,The Rockford Files The Love Boat, Sea Hunt, 77 Sunset Strip , Hav
ng of the Communist-era secret police informer files, the effect of that opening on the informers a
The Files: The Greatest Hits is a compilation album rele
RO/5 Data Server (a data server for PRO/5 data files), the BASIS ODBC Driver (a Microsoft Windows O
Aside from simple comparison of files, the program is capable of doing side-by-side
The Sledgehammer Files: The Best of Soilwork 1998-2008 by Soilwork
s the website or send company based emails and files, the pages would ether load extremely slowly o
and Sometimes Very Low), Buccaneer, The Enigma Files, The Chinese Detective, The Bill and Holby Cit
When writing external ActionScript 2.0 class files the above example could be written in a file n
After an exhaustive review of files, the study recommended that several black Dist
When a program comprises multiple object files, the linker combines these files into a unifie
                                                                                                   


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS