文语站

位置:首页 > 造句 > 

descriptor造句

造句2.62W

The security descriptor is too short.

descriptor造句

An example of the document descriptor they used and an example stub on the server end that matches the descriptor is given in the Resources section.

We define this mapping in the deployment descriptor of the enterprise application.

In some cases, you can also map a file descriptor to a plain file or another device into memory.

You'll refer to this name in Part 2 when you write a deployment descriptor for your workflow.

The primary advantage of descriptor methods over introspective approaches is the ability to provide more specific messages.

You can obtain the statistics from the table descriptor of the table node in the underlying access path graph.

You can see in Listing 3 that some elements in the deployment descriptor correspond to the JMS concepts of acknowledge mode, subscription durability, and message selector.

Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.

If you specify the name of the resource reference in this page of the wizard, the J2C tools will create the resource reference and update the application descriptor for us automatically.

标签:descriptor 造句