「FILEs」の共起表現一覧(1語右で並び替え)6ページ目
該当件数 : 1457件
ll RDO file and then request the larger bitmap | files only when necessary: This allows a full job sp |
d and of hackers who try to break in and steal | files only to have the prisoners try to break out vi |
first version ran under PHP 3.x and ran on DBM | files only. |
other Unix operating systems to transfer audio | files onto their iPod Classic, iPod Nano, iPod Shuff |
Design | files, or DGN files (*.dgn) are binary files with va |
ould be assumed that either there were no more | files, or the link was broken anyway. |
User Friendly - No configuration | files or quirky command lines have to be run to use |
d on home servers, offer large images or movie | files or have inefficiently generated dynamic conten |
sites to take advantage of better calibration | files or software. |
files or updating existing ones as necessary. | |
typically an action executed on a file, set of | files or directory. |
files or SQL-based DBMS such as MySQL, PostgreSQL/Po | |
The mappings can be defined using either XML | files or metadata annotations . |
s that require system privileges for accessing | files or other resources. |
Matching wildcard patterns to multiple | files or paths is referred to as glob expansion. |
hich the customers can themselves use to store | files or data objects. |
tives to proprietary formats like Autodesk DWG | files or ESRI Shapefiles. |
For downloads, the client sends a request for | files or directories to be downloaded. |
truments that undergo evolution of calibration | files or calibration software often required users t |
r to retrieve references and corresponding PDF | files or web pages, or to obtain references for arti |
instead of synchronizing) copy, move or delete | files or to flatten a directory structure into a sin |
that may include multiple procedures, multiple | files, or the entire program. |
ents or when handling I/O on a large number of | files or sockets. |
Biological data are commonly stored in | files or databases. |
rocessors can output to other formats like RTF | files or even just a window in the user's GUI displa |
The element matrices are read from | files or created as needed and discarded. |
e from Z80 sources in binary format as DOS COM | files or in CP/M-86 CMD format. |
eviously-saved image that contains no personal | files or information. |
cal view of a file system, allowing individual | files or directories to be previewed or retrieved on |
Jungle Disk can periodically back up selected | files or folders. |
ive (or full text on the web) through links to | files or by inserting copies of PDFs. |
ide cross-users deduplication so shared common | files or byte sequences are synchronized without act |
Data can also be imported from CSV | files or spreadsheets (Microsoft Excel, OpenOffice.o |
Web-based programs that try to access | files or computer registries are stopped from leavin |
rs - a Windows application that imports GEDCOM | files or comma-separated values (CSV) files and conv |
n, like opening and then automatically closing | files or freeing up memory. |
such as creating new diagrams, saving them as | files or adding objects to the modeling canvas, ARIS |
Inclusion list ( | files or folders) |
documents, randomly deleting sets of data from | files, or, at the worst, making them completely usel |
frastructure), Legal implementation (the telex | files), Organisations (locoregional teams) and Wisdo |
template classes to process template and list | files, organised in a template class hierarchy that |
ies resulting from the project are simply text | files; other programs are needed to search and displ |
These websites create NZB | files out of what is needed to be downloaded. |
thorough defragmention, and the ability to lay | files out on disk exactly where required, sorted by |
Files outside their zone are moved to their zone. | |
ned for sending confidential messages or large | files over the internet instantly. |
It can edit remote | files over FTP. |
d at an early stage, but a program to transfer | files over parallel or serial cables was developed a |
a service which allowed users to back up their | files over the Internet. |
d the theoretical framework to distribute data | files over an RSS channel, anticipating what is now |
algorithms called P4P researchers have shared | files over the internet 20% faster and using 5 times |
client to access other website configurations, | files, passwords and the like. |
Import notes functionality for Word, image | files, pdf files. |
omated Backup with Multiple, Historical Backup | Files per Network Device) |
able program reads parameter values from input | files, performs the simulation and writes requested |
mounted volumes for changes and copies changed | files periodically to a specially-designated volume |
Files pertaining to the holders of the British Natio | |
was followed in 2002 by a sequel, The Cameron | Files: Pharaoh's Curse. |
duct, My Gigmax, is an application which syncs | files, photos and media among multiple computers and |
The | Files portion is a regular FTP, SFTP, FTP+SSL, and W |
estors is an application for converting GEDCOM | files produced by genealogy software into Keyhole Ma |
can also convert comma-separated values (CSV) | files produced by spreadsheet or database software i |
Like a modem init string, modem scripts | files provide modem configuration settings. |
Two key | files provide most of the test framework functionali |
-generated links to songs and other multimedia | files provided by Internet content providers. |
ons, such as running tasks, moving and copying | files, providing high-level recoverability. |
ntaining command directives and correspondence | files; providing duplicating services and messenger |
ian Andy Worthington, author of The Guantanamo | Files, published a letter from Montalvo's colleague |
hould investigate claims of abuse contained in | files published on the Wikileaks website". |
Andy Worthington, author of the The Guantanamo | Files, Qalam was arrested in Kabul on September 3, 2 |
plementation of all components in the included | files, rather than just their interfaces |
be malicious if it attempts to modify certain | files, read from or write to a sensitive area of the |
The Walter A. Lundy | Files, Red and Black (Fall 1953) Integration Issue P |
Large | files referred to as "space hogs" in the documentati |
Many | files regarding the home can be found at the Bedford |
allow employees to access and manage corporate | files regardless of the type of computing platform - |
Certificates in the Village | files register growth at smaller intervals than the |
It modifies system | files related to Outlook Express and Internet Explor |
In 1932 Gustav also stole some FBI | files related to the murders, which he later passed |
5, the government admitted that almost all the | files related to the SCOPG report had been destroyed |
This is particularly apparent in his | files relating to the second edition of his Guide to |
isk, since users may not be aware that deleted | files remain accessible. |
However, the relevant | files remain closed to historians. |
Internet Explorer-created MHT | files render perfectly, and rendering of the diverge |
He regularly | files reports on the game which are heard mainly on |
pers consisting of correspondence, legislative | files, Republican Party and campaign files, book res |
ithout court approval, provided the government | files required papers within a week. |
from a computer's file system whether all the | files required for a document to print are present a |
These | files resemble conventional AVI files, but are engin |
August 18, 1917 - Doroshenko | files resignation, Vynnychenko was offered to form a |
l, she pulled all of Constable Benton Fraser's | files, resulting in a rather negative initial opinio |
Files retrieved 02-24-2007 | |
erdict was later overturned on appeal, and the | files returned. |
"MI5 | files reveal how 'King Kong' betrayed Allies", in: T |
The | files revealed that the fingerprints belonged to a 4 |
lace of Cutie Q, but an analysis of the disc's | files reveals that Cutie Q's files are still present |
s, patrol assembly, radio, record, and customs | files rooms, a dormitory for immigration officers, a |
o a Washington Post feature story, the Archive | files roughly 2,000 FOIA requests annually, collecti |
The Dresden | Files RPG has expanded upon this law in its publicat |
the proverb on the screen and then deletes all | files running while the virus is a resident in the m |
One of the interview subjects, James | Files, said he was the gunman responsible for taking |
Andy Worthington, author of the The Guantanamo | Files, Salah Mohammad Ali is a Pakistani who grew up |
Apple Writer II | files saved as standard text files rather than the o |
ion on the iPhone/iPod Touch/iPad a view shows | files saved in the software. |
MFO's archives (Activities report et archives | files, Schaeffer in particular) |
The Fitrakis | Files: Schoolhouse Divided |
orate schemes allowed users to download binary | files, search gopherspace, and interact with distant |
The Cameron | Files: Secret at Loch Ness is an adventure video gam |
rance in Small Favor, 10th book of the Dresden | Files series by Jim Butcher |
In the Dresden | Files series of novels, by Jim Butcher, Nicodemus be |
er, best known for creating the Kindaichi Case | Files series. |
Playing With Fire' and as part of the Forensic | Files series. |
005 and is the third installment in The Oregon | Files series. |
television shows America's Most Wanted and Fox | Files several times in 1999 and arrested in Tampa, F |
ket is running and configured to allow it, any | files shared will be detectable on the local network |
o access encrypted filesystems within ordinary | files should occur as transparently as possible |
le rules control which differences between two | files should be flagged as such. |
Church | files show a baptism date of October 27 (November 8) |
cture first used within IBM to store employees | files since 2001. |
Music | files sold by Magnatune do not use any form of digit |
as many options for inspecting or checking PDF | files, some of which are useful primarily to PDF dev |
Very often they have access to the | files sometimes a few minutes before the opening of |
The Ada virus mainly targets .COM | files, specifically COMMAND.COM. |
Andy Worthington, author of the The Guantanamo | Files, speculated Pasta Khan might be "Masta Khan", |
The Fitrakis | Files: Spooks, Nukes and Nazis |
Additionally, there are predesigned chip | files stored on the various disks containing the gam |
7 websites were targets in the attack based on | files stored on compromised systems. |
coordinate with 56 field offices and retrieve | files stored in 265 locations nationwide. |
Files stored in humyo can be shared with other users | |
r, and the game designer doesn't want the game | files stored in an easily-accessed place where the u |
The game allows custom soundtracks; MP3 | files stored on the memory stick can be played in-ga |
According to the | files, Storey convinced the court to allow NRC to bo |
vedrive app enables users to view any of their | files, stream music and video on their iPhone, iPad |
files submitted by developers. | |
Senuti is an application for transferring | files, such as songs and videos, from an iPod or iPh |
Seemingly desirable video | files, such as recent movies, are released via BitTo |
h systems, Strigi can extract information from | files, such as the length of an audio clip, the cont |
tant role when it comes to non-mergable binary | files such as graphic assets. |
e that allows you to stream or broadcast media | files such as BMP, GIF, AVI and other video formats |
nced the offering with 'sideloading' - storing | files such as MP3s collected on the Web without the |
"a dedicated search site to find downloadable | files such as audio, video and documents". |
bly detract from the image's quality, but JPEG | files suffer generational degradation when repeatedl |
ger is in love with Pop's daughter Barbara and | files suit against Sarah in order to gain control of |
ness Journal, April 4, 2003 Macintosh Retailer | Files Suit, Says Apple Deal Turned Sour |
ion compiled over 9,000 pages of investigative | files, sworn statements by witnesses and status repo |
e (both in the text editor and across multiple | files), syntax highlighting and auto-completion for |
When Gretchen Corbett left The Rockford | Files television series in 1978, Hopkins as "John Co |
rwhelmed with harness programs, test case data | files, test result files, and so on. |
It is able to recover | files that have been "permanently" deleted and marke |
The diff | files that serve as input to patch are readable text |
Memopal supports revision history; | files that are deleted or overwritten may be recover |
Musipedia locates the MIDI | files that go into its search index by using the Ale |
ar of gold and evidence taken from Hennessey's | files that could clear Jones' name. |
ut image quality was restricted by the size of | files that could be posted. |
It shows to the user | files that exist, do not exist or have changed since |
It contained numerous | files that mentioned or implicated politicians and m |
First it detects viruses and other | files that have a suspicious behaviour (behaviour an |
signs after Tom Lennox threatens to expose the | files that show that her husband released Fayed who |
Recording the names and locations of the | files that comprise those objects. |
Files that are totally compatible with Internet Expl | |
Files that are identical are hard linked, which uses | |
alog, having said this, you can still scan any | files that you want to download by right-clicking on |
rm spreads itself by dropping malicious script | files that affect the behavior of popular IRC progra |
This includes | files that can be printed out to created a book cove |
"SpyVampire will scan and remove any | files that are infecting your PC with Adware/Spyware |
ith the minimum being three, but even more for | files that have high end-in demand or need more redu |
Different | files that can execute but do not necessarily confor |
ar's Eve and finds a number of top secret NATO | files that should not have been there. |
the infected computer, counting the number of | files that have been analyzed by the malicious code. |
CIA | files that were declassified in 2005 and then public |
e are many different blocked executible (.exe) | files that Your PC Protector protects a computer use |
Because of this, an iPod cannot recognize | files that have been copied directly into the low-le |
nc, because of the Light-weight Sync, only the | files that he or she modifies will be copied over. |
order and released 53 portable document format | files that contained several hundred Combatant Statu |
icorruption Directorate, he started re-opening | files that had been previously closed by the former |
tkit hides the network traffic, processes, and | files that an attacker decides to keep invisible to |
st edition of his book and on the basis of MI5 | files that she committed suicide; this statement was |
ard also defines the systems to develop permit | files that are delivered to end-users of ENC data en |
his file contains the checksums for the update | files that are verified on the client side, increasi |
tion in the account) and sharer (for uploading | files that are not necessarily the work of that pers |
Files that are uploaded to omploader never expire, b | |
which reads in source code and produces object | files that can subsequently be linked and run. |
Users can attach | files that may be relevant to that particular phone |
i-virus software vendors can receive copies of | files that were flagged by other scans but passed by |
swfmill may be used to generate SWF | files that contain library assets for use with MTASC |
that many people have large collections of MP3 | files that cannot be played on a conventional HiFi w |
Files that need to be restored can be delivered in t | |
, including Love, American Style, The Rockford | Files, The Interns, Mannix and Fantasy Island. |
For exported | files, the BlackBerry version allows files to be cop |
he Wild Wild West, Fantasy Island,The Rockford | Files The Love Boat, Sea Hunt, 77 Sunset Strip , Hav |
ng of the Communist-era secret police informer | files, the effect of that opening on the informers a |
The | Files: The Greatest Hits is a compilation album rele |
RO/5 Data Server (a data server for PRO/5 data | files), the BASIS ODBC Driver (a Microsoft Windows O |
Aside from simple comparison of | files, the program is capable of doing side-by-side |
The Sledgehammer | Files: The Best of Soilwork 1998-2008 by Soilwork |
s the website or send company based emails and | files, the pages would ether load extremely slowly o |
and Sometimes Very Low), Buccaneer, The Enigma | Files, The Chinese Detective, The Bill and Holby Cit |
When writing external ActionScript 2.0 class | files the above example could be written in a file n |
After an exhaustive review of | files, the study recommended that several black Dist |
When a program comprises multiple object | files, the linker combines these files into a unifie |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |