國文屋

位置:首頁 > 造句 > 

“descriptor”造句,怎麼用descriptor造句

造句2.53W

You'll refer to this name in Part 2 when you write a deployment descriptor for your workflow.

You can obtain the statistics from the table descriptor of the table node in the underlying access path graph.

Using declarative security, you can define security roles in the assembly descriptor of the EJB Module and assign method permissions to each role.

The security descriptor is too short.

We define this mapping in the deployment descriptor of the enterprise application.

The primary advantage of descriptor methods over introspective approaches is the ability to provide more specific messages.

If you specify the name of the resource reference in this page of the wizard, the J2C tools will create the resource reference and update the application descriptor for us automatically.

In some cases, you can also map a file descriptor to a plain file or another device into memory.

descriptor造句

An example of the document descriptor they used and an example stub on the server end that matches the descriptor is given in the Resources section.

You can see in Listing 3 that some elements in the deployment descriptor correspond to the JMS concepts of acknowledge mode, subscription durability, and message selector.

標籤:descriptor 造句