on a set of信息详情
在一组
on a set───在片场
a set of───一套,一伙; 樘;一套;一组;一副
set of───一套…
set a───n.[动]刚毛;刺毛;n.(Seta)人名;(西、法、塞、波)塞塔
set on fire───焚烧;使情绪激昂;使燃烧; 使情绪激动; 放火; 燔
set eyes on───v.看到;望见;v.<口>看到,瞧见
on the set───在片场
set free on───释放
set off on───启动
Switch the Push and Pull signs on a set of doors.───把门上的“推”和“拉”标志互换。
Their reasoning was based on a set of unstated assumptions.───他们的推理是以一系列未说明的假定为基础的。
T-Bag's foot steps on a set of keys.───T - Bag的脚踩到了一串钥匙上。
his many dedicated followers are forever trying to get the U. S. Postal Service to put his image on a set of commemorative postage stamps.───他众多忠实的追随者不断恳请美国邮政局将他的肖像加入到纪念邮票系列中去。
COSCO her eyes on a set of two-bay house, the owner of a Wenzhou investors.───中远她的眼睛了一套两湾房子的业主,温州的投资者。
Plastic Man also was one of 10 DC Comics characters featured on a set of US Postal Service stamps in 2006.───塑料的10人也被DC漫画人物之一精选对美国邮政服务在2006年邮票。
The SOA depends on a set of data schemas that are used to describe the messages that flow around the SOA ecosystem.───SOA依赖于一组用于描述在SOA生态系统中传递的消息的数据模式。
Hence, the product requirements are typically laid out on a set of requirement diagrams.───因此,产品需求一般规定为一组需求图。
A special case of the session locking pattern, mentioned above, is the need for a single lock on a set of tables.───如前面所提到的,会话锁定模式中的一个特例是需要对表集合施加单一的锁。
This is his centennial year and he's been granted the ultimate accolade - his face on a set of three postage stamps.
Your argument is based on a set of questionable assumptions.
We started the meeting by agreeing on a set of objectives.
It is necessary to perform an computation repeatedly, composed of a series of ordered operations on a set of ordered data.
Their reasoning was based on a set of unstated assumptions.
His eye fell on a set of chessmen ranged on a table in a far corner.
Leading zeros anticipatory logic is implemented based on a set of unified product rule, which can diminish the potential one bit error of original ones.
You cannot just quickly tack on a set of robust and reliable relational constraints to the representation in XML that, really, is closer to a different modeling paradigm.
The supposed inviolability of quantum cryptography rests on a set of assumptions that do not necessarily carry over into the real world.
- self-loop
- microphone cord
- quantum computation
- pork steak
- rear waves
- paper cat
- quantum computer ga
- quantum computer machine
- permanent setting
- productivity tip
- plastic stocking
- shock-heated air
- microphone effect
- may god bless you
- reservoir oil pressure
- permanent settled population
- pork steaks
- productivity tool
- rooted forever
- monocerosngc
- self-lubricate