操作日誌 的英文怎麼說

中文拼音 [cāozuòzhì]
操作日誌 英文
operational logbook
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 日誌 : daily record; journal
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理為一種先進易用的防火墻技術的原理,闡述了linux系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. Use the qms, the email system administrators can effective manage the qmail, for example, send email, incept email, check maillog, etc. in a word, the qms not only reduces the email system administrators " labor intensity, but also promotes their work efficiency, and then promotes the enterprise ' s economic benefit

    應用qms使得大容量郵件系統的和管理更加有效,郵件系統管理員無需深刻了解qmail的運行機制即可靈活管理qmail ,方便地發送郵件、接收郵件,查看郵件服務器,完成用戶id的維護等工
  3. Jfs logging semantics are such that, when a file system operation involving meta - data changes - that is, unlink - returns a successful return code, the effects of the operation have been committed to the file system and will be seen even if the system crashes

    Jfs記錄的語義如下:當涉及元數據更改的文件系統- -例如, unlink ( ) - -返回成功執行的返回碼時,的結果已經提交到文件系統,即使系統崩潰了也可以發現。
  4. If any log is waiting in the redo queue, the mirror server finishes rolling forward the mirror database

    如果重做隊列中有任何等待的,則鏡像服務器將完成前滾鏡像數據庫的
  5. These failures are handled much the same way in db2 udb and oracle, by restoring either offline or online backups and using roll forward operations to recover the logs

    在db2 udb和oracle中,這些失敗的處理方式大致是一樣的,都是通過脫機或聯機備份並使用前滾恢復來完成的。
  6. 7 ) in fsca, all operations of managers are recorded in system log, and digital watermark technology is used to ensure authoritativeness, accountability, integrity of the log

    7 )採用數字水印技術。 fsca系統嚴格記錄管理員的操作日誌,並且採用數字水印技術保證其權威性、不可否認性和完整性。
  7. The logging style introduces a synchronous write to the log disk into each inode or vfs operation that modifies meta - data

    記錄風格將同步寫入磁盤引入每個修改元數據的inode或vfs
  8. Journaling coerage is being implemented in stages, on a per - application basis

    用在進程和每個基礎
  9. The operating system stores event logs as files

    系統將事件存儲為文件。
  10. The article elaborates on medical treatment insurance integrated services network mis at last, especially details the issues in actualizing it : the strategy of network security, the technique of popedom management, the technique of multilayer - distributing bases on groupware, encrpytion checkout, the mode of popedom management bases on roles, audit and control of operation - log, and theory of closed loop safety control

    文章最後結合醫保綜合業務網路管理信息系統實例加以詳細說明,尤其在實施過程中採用了網路安全策略,權限管理技術,基於組件的多層分散式技術,加密校驗,基於角色的權限管理方式,操作日誌審計監控,閉環安全控制理論等問題進行了詳細的探討。
  11. The following table shows interop logging of a platform invoke

    下表顯示平臺調用的互操作日誌記錄。
  12. The following table shows interop logging of a delegate callback

    下表顯示委託回調的互操作日誌記錄。
  13. The second line of the interop log file represents the managed signature

    操作日誌文件的第二行表示託管簽名。
  14. Also describes how to set a registry key to perform interop logging

    同時還描述了如何設置注冊表項以執行互操作日誌記錄。
  15. Interop log files

    操作日誌文件
  16. For more information about how the recovery model affects logging of index operations, see

    有關恢復模式如何影響索引操作日誌的詳細信息,請參閱
  17. Describes how to use the. net framework when creating and manipulating logs or tracing

    描述在創建和操作日誌或進行跟蹤時如何使用. net framework 。
  18. The information security administration code of internet service business site - part 8 : code of operation of system operation log

    網際網路上網服務營業場所信息安全管理代碼.第8部分:系統操作日誌行為代碼
  19. The interop log file can help determine the cause of these problems when a detailed error message is not provided with the managed exception

    操作日誌文件可以幫助您確定未隨託管異常提供詳細錯誤信息時出現這些問題的原因。
  20. The output for interop logging consists of the signatures of the interop function calls as they occur at run time, with any error messages

    操作日誌記錄的輸出包括在運行時進行互函數調用時互函數調用的簽名,還包括任何錯誤信息。
分享友人