Examples of using Requests can in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Multiple logical requests can be combined into a single I/O request. .
The initial handshake over HTTP ensures WebSocket requests can go through firewalls.
Servers can add a"realm=<desired realm>" header so that the two authentication requests can be disambiguated and run concurrently.
So, as load increases, additional machines can be added to a cluster, and Web service requests can be directed to those various servers.
Parallel requests can be handled over the same connection, removing the order and blocking constraints of the HTTP/1.x protocol.
The reason for this is that GET requests can be added to a user's bookmarks, and accessed without warning.
Requests can be transmitted by adequate telematic means, including telefax, subject to an agreement between the requesting and the request State.
Research, development and numerous laboratory tests guarantee that our clients' requests can be translated into new high-efficiency products.
For that case, we can warm up the connection and increase the TCP congestion window size, so that future requests can be completed faster.
The TLS handshake can be quite long but thanks to reduced latency and multiplexing, other requests can do their work without being blocked.
The big national retailers usually have electronic payment systems that are integrated with the Caixa Econômica Federal, and loan requests can be approved almost immediately.
(i) Undue hardship: Accommodation requests can be denied if they cause undue financial or administrative hardship where the cost of approving the accommodation is prohibitive;
Sometimes, these requests can be large in scope and require significant changes and testing such as hosting a new programming language or a new database.
In addition, countries need more timely and accurate information on data requests by international agencies so that such requests can be incorporated into their strategic planning processes;
Bytes of request can trigger a 134KB of response sent to the unfortunate target.
This certificate request can be signed by an external certification authority and the resulting X.
His delegation believed the request could not be justified.
The authorization request can be made directly to the Resource Owner(as shown), or preferably indirectly via the Authorization Server as an intermediary.
Such request can be sent to the buyer automatically, keeping both sides of the deal on track.
While normally an MLA request could have been answered within 8 to 12 months, this practice reduces the execution time to 2-3 months.