授權碼 的英文怎麼說

中文拼音 [shòuquán]
授權碼 英文
authorization code
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 授權 : empower; authorize; warrant
  1. ( guard ) you have to give me your authorization password

    那你要先告訴我
  2. Code - centric authorization access permissions as typed objects

    以代為中心的
  3. Unless authorized by law, no data user may compulsorily require an individual to furnish his identity card number

    除獲法律外,資料使用者不能強制要求任何個人提供身分證號
  4. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保數據傳輸的安全性,運用流密對數據進行加密傳輸,防止外來者的攻擊,未經進行非法數據讀寫操作。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. Flag of germany, the perfect example for run - length encoding. flag courtesy of ita ' s flags of all countries, used with permission

    《德國國旗》長度編的絕佳例子,此由ita (獨立電視管理局)的各國國旗提供。
  7. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將指令載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  8. These certificates may be used to perform commercial operations which require the use of digital signatures of the authorised users

    用戶可用此等證書從事使用數簽署的商務運作。
  9. Common crimes related to online games include unauthorised change of other online game players account passwords resulting in loss of control over their accounts, theft of virtual weapons from other online game players accounts, and refusal to pay or hand over virtual weapons after a virtual weapon transaction

    常見與網上游戲有關的罪行包括未獲更改他人網上游戲帳戶密令其失去帳戶的操控、盜取他人網上游戲帳戶內的虛擬武器,以及在虛擬武器交易后拒絕付款或交出有關的虛擬武器等。
  10. Certain specified individuals who are expressly authorized by an agreement between the sarc product manager and sarc development manager may give, receive or exchange viruses or virus source code with other bona fide virus researchers and anti - virus product developers, whose trustworthiness has been established by experience or analysis, provided that this activity is well supervised, monitored, and logged

    某些通過sarc產品經理和開發經理之間簽訂協議而獲得明確的指定個人可以與其他誠實信用的病毒研究人員和反病毒產品開發商進行病毒或病毒源代的收發或交換活動,只要這些活動被嚴格監督、監控,並完備地進行了記錄備案。
  11. Please fill out the above information factually. after identifying, we will send the password to you in 24 hours

    請確實填寫以上資料,本公司於24小時內經確認后,會將臨時授權碼寄到您的電子信箱。
  12. This code creates an authorization token for the user that s being retrieved. it obtains the user id from this authorization token, because this id is what the profile manager needs to retrieve the jive user object

    這段代為被檢索的用戶創建了一個令牌,這個令牌中包含了一個用戶id ,因為代理用這個id來檢索jive用戶對象。
  13. Fmcad download for valve design,

    Gmcad 2000試用盤的用戶授權碼均為:
  14. Copy / paste the authorization code and press " authorize "

    將算出的授權碼復制/粘貼到授權碼框。
  15. The authorization number is supplied by chin hsiang light ray co., ltd

    4授權碼由慶祥光波股份有限公司提供。
  16. Sure, but it ' s so complicated. they asked for my credit card authorization number

    看了,不過太復雜了。它們還要我的信用卡授權碼
  17. B : sure, but it ' s so complicated. they asked for my credit card authorization number

    看了,不過太復雜了。它們還要我的信用卡授權碼
  18. When the evaluation version times out, the edition that will be activated will be determined by the full purchase license key that you acquire

    您下載的是完整版本,可以在過期后使用購買的授權碼(針對所需的用戶數)來解鎖而不必卸載或重新安裝它。
  19. Note : this reportpack is an add - on to the gfi eventsmanager software ; please download and install gfi eventsmanager before installing the reportpack

    您下載的是完整版本,可以在過期后使用購買的授權碼(針對所需的用戶數)來解鎖而不必卸載或重新安裝它。
  20. This option is called the database partitioning feature in version 8 and is offered as a separate feature whose cost is added to the per processor cost of your db2 ese server this option does not require any sort of installation, just the addition of a license key ; in other words, the dpf feature is built into db2 ese v8 and needs to be licensed for use

    該選項就是所謂的database partitioning feature ( dpf ) ,它被作為獨立的產品提供,並被添加到db2 ese服務器上每個處理器的成本當中(這個選項不需要任何類型的安裝,它只是授權碼( license key )的附屬物。換句話說, dpf特性被內置在db2 ese v8中,需要得到許可才能使用)
分享友人