拒絕數 的英文怎麼說

中文拼音 [juéshǔ]
拒絕數 英文
rejectance number
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • : 數副詞(屢次) frequently; repeatedly
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  1. For months the beleaguered garrison refused to surrender.

    一連月,被圍困的駐軍都投降。
  2. " you must decide for yourself, " said elizabeth, " and if, upon mature deliberation, you find that the misery of disobliging his two sisters is more than equivalent to the happiness of being his wife, i advise you by all means to refuse him.

    「那就得看你自己的主張如何, 」伊麗莎白說。 「如果你考慮成熟以後,認為得罪了他的姐妹們所招來的痛苦,比起做他的太太所得來的幸福還要大,那麼,我勸你決計了他算。 」
  3. The rejections of all my submissions by the journals controlled by the swedish academy of sciences are perhaps more unreassuring, because based on excessively transparent manipulations of scientific truths for excessively transparent political gains, as well as denoting the replacement by the swedish academy of sciences of the scientifically oppressive role played by italy during galilei ' s times, a sinister role which delayed the advancement of basic human knowledge for hundred of years

    瑞典科學院控制的刊物我提交的所有論文可能更為令人煩腦,因為過分明顯政治利益為目的而對科學事實過分明顯的操縱,以及指示用伽利略時代瑞典科學院對科學的壓製作用代替義大利的作用,該種險惡的作用導致對于基礎人類知識延遲了百年。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Some hard errors, such as network failures are reported immediately. however, in some cases, component - specific time - out periods can delay the reporting of some hard errors. for soft errors, the length of the mirroring time - out period determines the speed of error detection

    例如,當服務器實例嘗試與故障服務器實例的據庫鏡像埠通信,而故障實例的windows服務器因為此埠上未運行sql server而通信時,便會出現硬錯誤。
  6. No other candidate was tortured for years by the vietcong, or refused to be freed unless his fellow prisoners were freed too

    沒有一位候選人像他一樣曾被越共拷打年,或者出獄,除非他的同伴同時被釋放。
  7. Ultimately, many critics of the music business claim that its problems stem from an inability to produce a product that consumers want to buy, and that most illegal downloaders will flatly refuse to pay for unappetisingly packaged songs and films that they previously got for free

    最終,許多音樂商的批評聲稱,問題是它不能製造出消費者想要購買的產品,大多非法下載者支付那些以前免費得到現在令人乏味的一攬子的歌曲和電影。
  8. As was wuleihongding like the cecilia cheung, the marriage does not mind a few - also, after the outbreak of yanzhao, nicholas tse hiding in a day room stay up late playing video, she asked to play with him was also rejected, had been created with two children one topic, but he attitude of indifference, but also to her suffering statement

    至於有如被五雷轟頂的張柏芝,對于婚姻不保也心裏有,艷照爆發后,謝霆鋒每天躲在房間熬夜打電動,她要求陪他玩也被,只好不停拿小孩製造兩人話題,但他態度冷淡,也讓她有苦難言。
  9. But they turned down pennsylvania congressman john murtha, her choice for top lieutenant, instead picking maryland ' s steny hoyer to be the next majority leader

    但他們了南希推舉的多黨領袖的人選賓西法尼亞州議員約翰?莫薩,而選擇了馬里蘭州的霍伊爾就任該職。
  10. The study, which the interior department refused to release for more than a year, estimates that current inducements could allow drilling companies in the gulf of mexico to escape tens of billions of dollars in royalties that they would otherwise pay the government for oil and gas produced in areas that belong to american taxpayers

    美國內務部一年多來發表的一項研究報告估計,目前有種種原因導致多家石油公司在墨西哥灣地區的油氣開采逃避了應向政府繳納的百億美元的開採用地稅,而這些土地是屬於美國納稅人的。
  11. As usual when drafting speeches, he refused to answer the telephone for days on end.

    同往常一樣,他為了起草講話稿,接連接電話。
  12. To debit to our current account ( s ) ( as the case may be ) any cheques, bills of exchange, promissory notes or orders for payment drawn, accepted or made by us in accordance with our signing instructions overleaf and to carry out any instructions given by us in accordance with our signing instructions overleaf in connection with any account or accounts of any kind whatsoever on our behalf notwithstanding that any such debiting or carrying out may cause such account ( s ) to be overdrawn or any overdraft thereon to be increased but without prejudice to your right to refuse to allow any overdraft or increase of overdraft

    二.對于本人等之來往帳戶所發出之支票、匯票、本票或任何支付憑證,或其他書面指示,倘有本人等於前頁所列之有效簽署,均可由此帳戶支付;並得依照本人等於前頁所列之有效簽署之指示,處理一切與各該聯名帳戶有關之事宜,如因此而引致透支或增加透支之額,則貴行得保留透支或增加透支之權利。
  13. The agency warns the drive by industrialized countries to keep the number of asylum seekers as low as possible may result in some refugees being denied the protection they need

    代理處警告工業化國家,它們保持政治避難者的量盡可能的低的政策會導致一些難民的庇護申請被
  14. Licensed imports shall not be refused for minor variations in value, quantity or weight from the amount designated on the licence due to differences occurring during shipment, differences incidental to bulk loading and other minor differences consistent with normal commercial practice

    得到許可的進口產品不得由於運輸過程中產生的差異、散裝貨裝載時偶然產生的差異以及其他與正常商業做法一致的微小差異而導致貨物的價值、量或重量與許可證標明的額有微小差異而被
  15. It was after a long series of appeals to pedestrians, in which he had been refused and refused - every one hastening from contact

    這是在他無次地向行人求乞,一再遭到之後-人人都匆匆避開他。
  16. Since this was legally recognised as a cause of death in the 1980s, the number of cases submitted to the government for the designation has soared ; so has the number of court cases that result when the government refuses an application

    自80年代法律承認了過勞死是一種死因,提交給政府要求鑒別的案例量飆升;同樣的還有政府申請后的訴訟。
  17. The reasoning is simple enough : a business that deliberately offers shoddy service or uncompetitive prices to some customers, or that turns down smart minority applicants in favour of less - qualified white male applicants, is throwing money away

    論證過程非常簡單:如果一項業務故意向顧客提供劣等服務、沒有競爭力的價格,或聰明的少族裔應聘者、青睞不太合格的白人男性應聘者,那麼它就是在扔錢。
  18. Business data could be rejected when it goes against

    當業務據違背下列條件時將遭到
  19. The results suggested that decision in stage two be more consistent than that of stage one. framing effect was partly supported in the sense that interviewers under recommendation framing were risk seeking and used higher rejection threshold and accepted less applicants than under the rejection framing with risk avoiding implication

    推薦和淘汰分別有得益和損失含義,推薦框架下訣策者傾向于風險迴避,提高閾限,導致錄用人少一些,淘汰框架下,訣策者傾向于風險追尋,降低閾限,錄用人多一些。
  20. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法訪問、服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。
分享友人