词语站>英语词典>accesses翻译和用法

accesses

英 [ˈæksesɪz]

美 [ˈæksesɪz]

v.  访问,存取(计算机文件); 到达; 进入; 使用
access的第三人称单数

柯林斯词典

  • N-UNCOUNT 进入(权);通道;入径
    If you haveaccess toa building or other place, you are able or allowed to go into it.
    1. The facilities have been adapted to give access to wheelchair users.
      这些设施已经改造过以方便轮椅使用者进入。
    2. Scientists have only recently been able to gain access to the area...
      科学家直到最近才得以进入该地区。
    3. The Mortimer Hotel offers easy access to central London.
      从莫蒂默旅馆去往伦敦市中心交通近便。
  • N-UNCOUNT 查阅(或使用)的机会(或权利)
    If you haveaccess tosomething such as information or equipment, you have the opportunity or right to see it or use it.
    1. ...a Code of Practice that would give patients right of access to their medical records.
      允许病人查看自己病历的职业准则
    2. ...whether one has access to a dish and the other accoutrements needed to watch satellite TV.
      是否能使用碟型卫星天线以及其他观看卫星电视所需要的装备
  • N-UNCOUNT 接近(或面见)的机会(或权利)
    If you haveaccess toa person, you have the opportunity or right to see them or meet them.
    1. He was not allowed access to a lawyer.
      他未被获准见律师。
    2. My ex-wife deliberately sabotages my access to the children.
      我的前妻蓄意阻挠我见孩子。
  • VERB 存取,访问(计算机信息)
    If youaccesssomething, especially information held on a computer, you succeed in finding or obtaining it.
    1. You've illegally accessed and misused confidential security files.
      你已经非法访问并盗用了机密的安全文件。

双语例句

  • This method accesses data entered through UI Textfields.
    这个方法访问通过UITextfields字段输入的数据。
  • To accomplish this, the JIT compiler examines the assembly metadata for any illegal accesses and handles violations appropriately.
    为此,JIT编译器检查程序集元数据中是否有非法访问和句柄的冲突。
  • When a user program accesses system calls, it does so in kernel mode, not user mode.
    当用户程序访问系统调用时,它将在内核模式而不是用户模式下进行。
  • You can also specify a callback for whenever a script accesses any object property.
    你同样可以指定一个回调函数给一个脚本访问任意对象的属性时被调用。
  • These accesses of his disorder might come upon him at any moment.
    他的疾病随时都可能发作。
  • When enabled, text log files are generated whenever an application accesses the CLI driver.
    启用时,无论应用程序何时访问cli驱动程序,都将生成文本日志文件。
  • EDM pool includes cache blocks for catalog accesses, dynamic SQL, plans/ packages, and cursors.
    EDM池包括用于目录访问、动态SQL、计划/包和游标的缓存块。
  • As it runs, the program accesses data files.
    当工资程序执行时,程序存取数据文件。
  • These credentials determine the permissions that are in effect when the program accesses directory objects.
    这些凭据确定了在程序访问目录对象时生效的权限。
  • Once the application is deployed, you need to consider how the application stores and accesses data.
    部署应用程序后,您需要考虑应用程序如何存储和访问数据。