英語 での Can be configured の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Receivers can be configured from the transmitter menu.
Power capability is 4 W at 85°C. Devices can be configured for parallel operation of IGBT modules using one central driver.
PHP tries to send email using sendmail on the local system, which can be configured in PHP's php . ini file.
Two of these ports can be configured to provide an internal crossover connection to an associated additional Cisco Catalyst Blade Switch 3020.
So the answer change as engine and address can be configured using the so-called Audi Drive System touch of a switch on the center console.
From chemical processing and manure wastewater to pure drinking water, VSEP systems can be configured to meet the needs of virtually any industry application.
Routing is often handled by devices on the network dedicated to routing(although any device can be configured to perform routing).
Editing Responses The following options can be configured on each response: Source- The source to determine if the Check has been triggered.
For example, an agent can be configured to initiate an authentication trap if an unrecognized management computer sends a request for information.
Password properties such as minimum length, required types of characters, password history to prevent re-use and so on can be configured to match your security requirements.
The PureVPN apps are compatible with all the most important services and the connection can be configured on almost every router.
With the minimum system changes, a system can be configured in which the business logic is completely separated from the presentation layer.
Updates to Office 2019, such as security updates and bug fixes, can be configured to be automatically downloaded and installed from the Office CDN.
Freely programmable multicolor function keys can be configured for a variety of one-touch telephony functions such as speed dial, busy lamp field or presence indication.
The MAX6964 is controlled through a 2-wire I2C serial interface, and can be configured to one of four I2C addresses.
Squid can be configured to work this way, and it is called redirection or transparent proxying under previous Linux versions.
H2 database can be configured to run as in-memory database, which means that data will not persist on the disk.
Lock screen apps can be configured to run code periodically using a time trigger with a minimum interval of 15 minutes.
An interrupt(active-low INTK) output can be configured to alert keypresses, as they occur, or at maximum rate.
The process is aided by the use of shadow appliances-placeholders for real gateways-that can be configured right down to the port level.