verification
英 [ˌvɛrɪfɪˈkeɪʃən]
美 [ˌvɛrəfəˈkeɪʃən]
n. 检验,检查,审核;验收;查证,证实,验证,核实;鉴定;查清; 宣誓证实; 核对(账目的)真实性
BNC.10537 / COCA.11069
柯林斯词典
- VERB 核实;查证;查清
If youverifysomething, you check that it is true by careful examination or investigation.- I verified the source from which I had that information...
我核实了我所获消息的来源。 - A clerk simply verifies that the payment and invoice amount match.
职员只是核实付款和发票上的数额是否一致。
- I verified the source from which I had that information...
- VERB 证实;证明
If youverifysomething, you state or confirm that it is true.- The government has not verified any of those reports...
政府还没有证实那些报告中的任何一个。 - I can verify that it takes about thirty seconds.
我能证明,这大约要用30秒的时间。
- The government has not verified any of those reports...
英英释义
noun
- additional proof that something that was believed (some fact or hypothesis or theory) is correct
- fossils provided further confirmation of the evolutionary theory
- (law) an affidavit attached to a statement confirming the truth of that statement
双语例句
- This allowed initial system testing and problem determination to be performed very shortly after functional verification completed.
这允许在功能验证完成之后不久执行最初的系统测试和问题确定。 - This cycle represents a widely accepted approach to validation and verification of software-intensive systems.
这个周期代表一种被广泛认可的软件密集型系统的检验和验证方法。 - The ratio of use cases to test cases will be one-to-many for the Function Verification Test.
对于功能验证测试,用例与测试用例的比率将是一对多。 - This will open the Verification Point and Action Wizard.
这将打开“验证点和动作”向导。 - Of those activities, client or skeleton code generation and response verification require the most effort.
在这些活动中,客户机或框架代码生成和响应验证需要进行的工作最多。 - Along with this, they can add verification points and drive data.
与这些一起,他们还可以添加验证点和驱动数据。 - Finally, a specific example of verification process simulation of embedded system illustrates the feasibility of the method.
最后,应用具体实例模拟嵌入式系统失效模型与分析过程,展示了该方法有效性。 - It also shows the total verification passed in the test.
它同时还显示了测试中通过的总验证数。 - This security policy performs digital signing and verification, encryption and decryption using asymmetric cryptography.
此安全策略使用非对称加密执行数字签名与验证、加密和解密。 - In this view, you can see the details of the returned envelope and the verification point.
在这个视图中,您可以看到返回信息包和验证点的详细情况。