授權代碼 的英文怎麼說

中文拼音 [shòuquándài]
授權代碼 英文
authorization code
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 授權 : empower; authorize; warrant
  1. Code - centric authorization access permissions as typed objects

    為中心的
  2. Certain specified individuals who are expressly authorized by an agreement between the sarc product manager and sarc development manager may give, receive or exchange viruses or virus source code with other bona fide virus researchers and anti - virus product developers, whose trustworthiness has been established by experience or analysis, provided that this activity is well supervised, monitored, and logged

    某些通過sarc產品經理和開發經理之間簽訂協議而獲得明確的指定個人可以與其他誠實信用的病毒研究人員和反病毒產品開發商進行病毒或病毒源的收發或交換活動,只要這些活動被嚴格監督、監控,並完備地進行了記錄備案。
  3. This code creates an authorization token for the user that s being retrieved. it obtains the user id from this authorization token, because this id is what the profile manager needs to retrieve the jive user object

    這段為被檢索的用戶創建了一個令牌,這個令牌中包含了一個用戶id ,因為理用這個id來檢索jive用戶對象。
  4. This default language code is established at the time that publishing credentials are established with an individual operator site

    當發布信息的證書在某個操作入口站點上建立的時候,與之相關聯的預設語言也同時被建立。
  5. The first is a time - based authorization mechanism and the second is the ability to be further expanded by other macros and code

    第一個特性是基於時間的機制,第二個特性是能夠由其他宏和進行進一步擴展。
  6. S, rather than granting such permissions to individual pieces of running code

    訪問限,而不是向單個的一段運行這種限。
  7. The number of requests that failed due to no authorization status code 401

    Requests not authorized (未經的請求數)由於沒有而失敗的(狀態401 )請求數。
  8. Authorization code is required when attempting to transfer a domain between registrars

    當域名要轉移注冊商時需要授權代碼
  9. Only when you finish payment of the domain and receive our email with subject ofdomain name is actived, your chosen domain name become valid

    ( ii )提供申訴方以及任何在行政訴訟中表申訴方的理的名稱、郵政地址、電子郵件地址、電話和傳真號
  10. Office solutions that use managed code extensions add a custom security restriction of not accepting all code or zone - based evidence types, which means that microsoft office word 2003, microsoft office excel 2003, and microsoft office outlook 2003 will not run any assemblies that are on the local machine, the network, or the internet until the assembly is given permission granted trust in your security policy

    使用託管擴展的office解決方案中新增了一個自定義安全限制,它不接受基於「所有」或「區域」的證據類型,這意味著除非相應的程序集在您的安全策略中被予了限(予信任) ,否則microsoft office word 2003 、 microsoft office excel 2003和microsoft office outlook 2003將不運行本地計算機、網路或internet上的任何程序集。
  11. So robots building robots. - authorization code, please

    所以是機器人在造機器人-請輸入授權代碼
  12. - so robots building robots. - authorization code, please

    -所以是機器人在造機器人-請輸入授權代碼
  13. Asset management ensures that only authorized persons can view or change project assets ; it also provides the ability to reliably recover work lost in the event of an authorized user s mistake, such as the accidental deletion or overwriting of source code files

    資產管理保證了只有被的人可以瀏覽或改變項目資產;它還提供了可靠的對被用戶錯誤操作事件的恢復能力,例如對源文件的意外刪除或該寫。
  14. Full trust. full - trust applications are granted unrestricted code access permissions by code access security policy

    訪問安全策略為完全信任級別的應用程序予的訪問限是沒有限制的。
  15. For their own interests, e - holders are advised to keep this pair of login id and password confidential and make it known to merely their authorised personnel (

    為本身利益著想,帳戶持有人請將登入號及密保密,並盡量只讓獲人員(請參閱上文
  16. For example, a computer s administrator can establish security policy that allows all code downloaded from a web site and signed by a given software company to access a database on a computer, but does not grant access to write to the computer s disk

    例如,一臺計算機的管理員可以建立這樣一種安全策略:它允許從某一網站下載由指定軟體公司簽發用以訪問計算機上的數據庫的所有,但不予對該計算機磁盤的寫訪問
  17. By default, the code from the local computer is granted the full trust permission set, code from a local network is granted the local intranet permission set, and code from the internet is granted the internet permission set

    默認情況下,來自本地計算機的予「完全信任」限集,來自本地網路的予「本地intranet 」限集,而來自internet的予「 internet 」限集。
  18. Insert a permission request for all the permissions your code must have, and handle up front the load - time failure that occurs if the permissions are not granted

    為您的必須具有的所有限插入限請求,並預先處理在未限時發生的加載時錯誤。
  19. Specifies the network resource access that is granted to code

    指定的網路資源訪問限。
  20. The local security settings on a particular computer ultimately control which permissions your code receives

    特定計算機上的本地安全設置最終控制限。
分享友人