Examples of using Examples include in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Examples include employee access control badges used for payment in cafeterias or vending machines, and even mobile phones can provide credentials for secure access or payment with NFC technology.
Examples include Jean-Pierre Jeunet and Marc Caro's The City of Lost Children(1995), Turn A Gundam(1999- 2000), Trigun,[79] and Disney's film Treasure Planet(2002).
Other examples include Android, Chromium, and many of the technologies that underpin the rising popularity of Linux containers(including memcg, the Go programming language in which Docker is written, cgroups, and cadvisor).
Examples include a private defect report submitted on the web using HTTPS(TLS) or an email encrypted using OpenPGP.
SiC-MOSFET Application Example 2: Pulse Power Pulse power is a system which supplies power instantaneously for short periods of time; application examples include gas lasers, accelerators, X-ray sources, plasma power supplies, and the like.
Other examples include telling the user that a useful update is available on a web app via system notifications(see the Notifications API) or vibration hardware see the Vibration API.
Familiar examples include an electronic document, an image, a service(e.g.,"today's weather report for Los Angeles"), and a collection of other resources.
Examples include application hosters, storage providers, and providers of cloud services like backupPersonal data"Any information relating to an identified or identifiable natural person.
Examples include spicy, fatty, or greasy foods, cured or smoked meats, and dairy products for those with a lactose intolerance.
Forgery examples include reimbursement checks stolen from mailboxes, submission of false building permits and receipts for claims, forged insurance and federal emergency assistance checks, and fraudulent damage reports.
Some examples include new pharmaceuticals to fight disease, industrial catalysts for efficient manufacturing, and leading- edge nanotechnologies to change the world we live in.
Common examples include selecting player character types, speed settings(slow, medium, fast, etc), preset colors and days of the week.
Examples include the surface finish of plasma coating, the homogeneity of an inductively melted material, the properties of a welded joint, or medical examination methods with low side effects, such as CT(computer tomography) and MRI magnetic resonance imaging.
In the context of DKIM, examples include author, author's organization, an ISP along the handling path, an independent trust assessment service, and a mailing list operator.
Examples include OLTP Workloads(tpc), sysbench, pgbench, netperf(< 256 byte), and fio(random I/O to NvME).
Examples include: An undetected variation in the hardness of the raw material may increase the wear of the cutting tool, leading to insufficient surface quality.
Typical examples include mentioning obvious weaknesses of the other parent and blaming those as the major source of difficulty between the parents.
Some examples include: A nonlinear transfer function(e.g., gamma correction) can be implemented by using the DS3906 variable resistor with the correct transfer function implemented in the embedded lookup tables.
Examples include digital media archives, financial and healthcare records, raw genomic sequence data, long-term database backups, and data that must be retained for regulatory compliance.
Some examples include satellite services in the communication, navigation and remote sensing fields, aerospace transportation, space tourism or the future mining of extraterrestrial materials.