Finally, you can compute the remainder“indirectly”(by first computing the quotient) but using 64-bit processor instructions.
但是使用像VPN这样的安全工具确保你不会成为一个简单的目标,或者被大规模监视。
However, using security tools like a VPN ensures that they are not an easy target or are being monitored by mass surveillance.
但是使用特斯拉作为例子,当一辆特斯拉学会新的习惯,那么所有的特斯拉都会立刻从它的智能获得收益。
But, using Teslas as an example, if one single Tesla learned something about a new condition every Tesla instantly gets the benefit of that intelligence.
但是使用像VPN这样的安全工具确保你不会成为一个简单的目标,或者被大规模监视。
But, using a VPN will help to ensure you won't be an easy target or get scooped up in mass surveillance.
但是使用这个机制意味着偏离了良好的预算做法和纪律,并且已经成为惯例。
However, the use of that mechanism represented a departure from good budget practice and discipline, and was being used too routinely.
这与HSG测试非常相似,但是使用声波来建立输卵管的图像。
This is kind of similar to the HSG test but it uses sound waves to build up a picture of the fallopian.
但是使用声波设备故意伤害外交人员将标志着骚扰的一个新阶段。
But the use of sonic devices to intentionally harm diplomats would mark a new phase in harassment.
但是使用assert()是保持SQLite可维护性的重要前提。
But the use of assert() is a vital part of keeping SQLite maintainable.
但是使用精灵,多声道声音处理器以及宝贵的64k内存足以让人头脑发热。
But the use of sprites, the multichannel sound processor, and that precious 64k of memory were enough to turn heads.
但是使用阶段至少同样重要--我们谈论的是必须持续五十年或更长时间的建筑。
But the use phase is at least as important- we're talking about buildings which have to last for fifty years or more.
但是使用军事力量总是极其困难的,我们认为风险很大。
But the use of the military is always extremely difficult and we see great risks.”.
单个象素之间的联系很少,但是使用密集的图,我们可以挖掘图像大的区域的信息;.
The connections between individual pixels are not very informative, but by using dense graphs, we can pool information from large regions of the image;
毛毡制品用起来确实是低碳环保,但是使用一段时间之后就会散发出一种难闻的气味,让人难以忍受。
Felt products are really low-carbon and environmentally friendly, but after using them for a while, they will emit an unpleasant smell, which is unbearable.
However the use of an ECD detector which just confirms the presence of a compound by retention time needs experience in understanding chromatographic fingerprints as detailed in Appendix 4(a).
Many COM applications include some security-specific code(for example, to call CoInitializeSecurity), but they use weak settings that allow unauthenticated access to the process.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt