操作禁止 的英文怎麼說

中文拼音 [cāozuòjīnzhǐ]
操作禁止 英文
attendant exclusion
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 禁動詞1. (禁受; 耐) bear; stand; endure 2. (忍住) contain [restrain] oneself
  • : Ⅰ動詞1. (停止; 攔阻) stop; cut out 2. (截止) close; end Ⅱ副詞(僅; 只) only; just Ⅲ名詞(姓氏) a surname
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 禁止 : prohibitbanforbid
  1. These manipulative actions have been regulated in chinese securities legal system, which include wash sale, match orders, manipulation by actual purchases, pool operation, intentionally spread and fiction misleading information

    其實質是證券縱者利用信息優勢、經濟力量妨礙、限制、排斥競爭的行為,破壞了證券市場的秩序。或限制縱行為對發展一個良性的證券市場具有重要用。
  2. Apparatus with one or more particular functions for connection to public switched telephone networks run by certain public telecommunications operators - specification for apparatus with call barring facilities

    連接由某些公共長途電話接線員的公共開關電話網路用單功能或多種特別功能設備.第7部分:帶呼叫裝置的設備規范
  3. Hewlett - packard has abandoned its attempt to suppress security information via the digital millenium copyright act

    惠普公司放棄了利用《千禧年數字版權法》發布有關(其公司軟體的)安全情況的嘗試。
  4. Fortunately, there were some fundamental regulations in new exclusive law and subsequently in new brand law and new copyright law. on june 5, 2001, the supreme people court passed some statutes of how to apply clauses to stopping the infringed behave of patent right before lawsuit, which endued those abstract and fundamental items with maneuverability and practicability

    隨后,最高人民法院於2001年6月5日通過的針對專利權的《關于對訴前停侵犯專利行為適用法律問題的若干規定》中對訴前臨時令做了較為詳細的規定,使得抽象原則的法律條文具有了可性、司法實用性。
  5. So often you ' ll find they are not allowed

    因此,你通常發現這種是被的。
  6. The strategy currently used in the library is to raise exceptions for every disallowed action ; but wrapping this in more convenient apis might be possible

    當前在庫中使用的策略是對每個提出異常;但將這個異常包含在更簡便的api中是可能的。
  7. " the amendment ordinance introduces seven new offences relating to unruly or disruptive behaviour committed on board civil aircraft, including offences relating to obstruction of crew members in performing their duties ; failure to comply with instructions given by crew members ; disorderly behaviour ; tampering or interfering with aircraft component, apparatus, equipment or systems ; intoxication by alcohol, drug or other intoxicating substances ; smoking and the operation of electronic devices in the aircraft when it is prohibited, " a spokesman for the civil aviation department said

    民航處發言人說: 《修訂條例》就在民航飛機上的難受管束或擾亂秩序行為訂定七項新的罪行,包括妨礙機組成員履行其職責;不遵從機組成員發出的指令;擾亂秩序行為;干預或干擾飛機組件、儀器、設備或系統;因酒精、藥物或其他減低清醒程度的物質而致神智不清;在吸煙的情況下吸煙或在電子器材時該等器材。
  8. Make document content accessible to screen readers while still preventing copy and paste

    用屏幕閱讀器閱讀添加了輔助工具的文檔,但仍然復制和粘貼
  9. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全系統等,這些對系統非法入侵都起到一定的用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  10. For example, a user might perform an illegal operation in a system without the ability to trace the prohibited operations

    例如,如果沒有跟蹤被的功能,用戶可能會在系統中執行非法
  11. False statements from reports of some listed companies appear repeatedly, which is because regulations about false statement ' s civil liability in security law are too abstract and short of operation

    上市公司報告中虛假陳述現象屢。 《證券法》有關虛假陳述的民事責任的規定太抽象,缺乏性。
  12. China will ban government use of ms. win2000 ; instead, they will use red flag linux, developed by chinese researchers

    中國官方耶電腦用嘜踞落掃灰塗耶《暈兩千》系統;按算用中國研發耶《紅旗仔標》哩奴克思。
  13. Surface area reduction helps to improve security by providing fewer avenues for potential attacks on a system

    外圍應用減少將涉及停用未使用的組件以增加系統的安全性。
  14. By loading the hiw reader restriction in the archive, we can control conveniently the archive reader group, in addition, we can realize the following operations : forbidding the screen copy operaion and restricting the number of the printing copies whe the documents are accessed

    通過在文檔中加載隱藏的讀者域,實現了文檔讀者群的控制。另外,還實現了拷屏和列印文件份數限定、不同身份用戶設定不同存取權限和角色以及在文件審批過程中不能擅自修改審批意見等安全控制。
  15. Supplying an incorrect password will cause a service to fail to load during db2 udb start - up, and potentially prevent you from performing certain operations

    提供的口令不正確可能造成db2 udb啟動過程中不能加載某些服務,有可能執行特定的
  16. If access cannot be blocked for all external hosts, we recommend limiting access to only those hosts that require it for normal operation

    如果不能所有外來主機的存取,我們建議限制只允許日常所需的主機進行存取。
  17. A web service application, which uses wsdl, has to cater to this in its application logic above

    Wsdl不會以任何順序調用,使用wsdl的web服務應用程序必須在上面的邏輯應用中迎合這一特點。
  18. Password protection prevents unauthorized attempts at disabling protection or changing settings

    密碼保護功能阻未被授權的用戶完成用保護或更改設置的
  19. The hands - free and completely silent install options offer the ability to suppress either the prompting, the progress dialogs, or both

    使用無安裝和完全無提示安裝選項可以出現提示信息、進程對話框,或同時出現提示信息和進程對話框。
分享友人