| 1. | Command - line switch to generate the order property automatically 元素的内容之间进行转换时的顺序。 |
| 2. | The resources are not necessarily written in the same order they were added 写入资源的顺序无须与添加时的顺序一样。 |
| 3. | Preserves the order in which the elements are entered in the collection , whereas an enumerator for a 的枚举数保留在集合中输入元素时的顺序,而 |
| 4. | Once complete , simply remount the partitions as read - only in the order that you mounted them 一旦完成,只需按安装时的顺序,以只读方式重新安装分区即可。 |
| 5. | Array , which is typically the order in which components are added to the container - unless you 数组)来工作,这个顺序通常就是将组件添加到容器中时的顺序除非您是用 |
| 6. | The command file is a text file that contains the input to bscmake in the same order as you would specify it on the command line 命令文件是文本文件,包含bscmake的输入,顺序和您在命令行上指定时的顺序相同。 |
| 7. | For maximum portability , result set columns within each row should be read in left - to - right order , and each column should be read only once 建议最好读取的时候按照记录检索时的顺序从左向右读取,而且只读取一次。 |
| 8. | As with authentication , the exact encryption method used for a connection depends on the order in which the methods are specified for the instance initiating the connection 与身份验证一样,具体用于连接的加密方法取决于为发起连接的实例指定这些方法时的顺序。 |
| 9. | Style rule hierarchy list in the order that you selected them , from top to bottom . you can rearrange entries by clicking the appropriate buttons , as shown in the following table 在“添加样式规则”对话框中添加的元素、类名和元素id ,在“样式规则层次结构”列表中按您选择它们时的顺序从上到下显示。 |
| 10. | When an endpoint specifies more than one authorization method , the exact authorization method used depends on the order in which the methods are specified for the instance initiating the connection 当端点指定多个身份验证方法时,具体使用哪个身份验证方法取决于为发起连接的实例指定这些方法时的顺序。 |