數據名字 的英文怎麼說
中文拼音 [shǔjùmíngzì]
數據名字
英文
data name- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 名 : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
- 字 : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
- 數據 : data; record; information
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data
數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk
從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。Uh, a name keeps coming up in your data - " mockingbird.
有一個名字「嘲鳥」一直出現在你的數據中Uh, a name keeps coming up in your data - - " mockingbird.
有一個名字「嘲鳥」一直出現在你的數據中Anything ( a program, letter, digital, photograph, song, etc ) stored on a storage medium is referred to us as a file, data files are also sometimes called documents, when you save a document just created ( such as a memo or letter in a word processing program ), it is stored in a new file on the designated storage medium, during the storage process, the user is required to give the file a name, called a filename, that name is used when the user required to see the document at a later time, naming files and retrieving stored document are discussed further in other textbooks
任何(節目,信件,數字式,相片、歌曲,等)被存放在存儲介質指我們文件,數據文件有時也叫做文件,當您保存一個文件被創造(譬如一封備忘錄或信件在文字處理程序) ,它被存放在一個新文件在選定的存儲介質,在存貯過程期間,用戶必需給文件名字,稱文件名,名字被使用當用戶被要求看文件在最新時光,名字文件和檢索被存儲的文件被談論進一步在其它課本。The system was designed by dynamic asp ( active server page ), secure socket layer, digital signature and certification technologies
系統應用了動態asp技術和數據庫技術、安全套接字協議、數字簽名和身份認證技術。A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured
本課題中設計了一種擁有自主知識產權的橢圓曲線數字簽名和驗證演算法,並在微機上進行了實現,確保了數據的完整性和用戶身份真實性。Because of the grammar of the system information, keywords and data source names cannot contain the backslash character
由於系統信息語法的緣故,關鍵字和數據源名稱不能包含反斜杠( )字元。Parameter must contain a valid database name, and cannot contain a null value, an empty string, or a string with only blank characters
參數必須包含有效的數據庫名稱,不能包含空值、空字元串( " )或只有空白字元的字元串。An alphanumeric term that identifies a data set, a statement, a program, or a cataloged procedure. the first character of the name must be alphabetic
一種字母數字項,用於標識某個數據集、語句、程序或已編目的過程。名的首字元必須是字母。As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp
在現代的數字通信網路中,數字簽名作為數據認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。Key numbers of chinese names first names today
今天數據庫共有中國名字數Further more, the thesis lucubrates some key techniques : aiming at the management of the distributed objects, we skillfully construct the isomorphic project object tree for the real projects structure by using the corba naming service, and laconically and effectively implement the management of the services and modules by using the location service. and we also propose a design which uses corba event service and borland midas to implement the distributed data service in a creative way and analyze the advantages and disadvantages of this design at the same time
並針對一些關鍵技術做了深入的討論和分析,例如針對整個系統的分散式對象的管理,巧妙地借用corba的名字服務構造了同構于實際工程組織的工程對象樹,同時使用定位服務簡潔而有效的實現了對服務和模塊的管理;針對分散式數據庫的實現,創造性地提出了一種使用corba事件服務和borlandmidas組件來實現分散式數據服務的設計,並實現了這個設計,同時分析了這種設計的優劣。In cobol, a word or a punctuation character that associates a data name or paragraph name with its qualifier, links two or more operands in a series, or forms a conditional expression
在cobol語言中的一個字或一個標點符號,它把數據名或程序段名和其限定詞建立聯系,連接兩個或更多的串列操作數,或構成一個條件表達式。The data structure type was built for the photograph data, the international calculation criteria were adopted for the numeric data, the specific file table and file explanation was established for the text data, the date express type was established for the date data, and the definition of any specialty words and phrases was kept consistent
其中,對圖片數據確定數據結構類型;對數值數據統一採用國際標準的計量單位;對文字數據擬定具體的文檔編碼表及文檔說明;對日期型數據確定日期表達的形式;任何專業名詞、術語的定義都嚴格保持概念的一致。Consumers checking their credit - card balance could be routed seamlessly to call centers like this one in india, where operators identify themselves with made - up american names
消費者查看他們信用卡上的資金數量的時候,數據將通行無阻地傳輸到設在印度等地的電話中心,在那裡,接線員使用自己起的美國名字。Free internet service. the internet wire is on the writing desk. virtually dial to the internet with idsl. the user ' s name and password are pasted on the modem
免費寬帶網。網線設在寫字桌上邊,使用idsl虛擬拔號上網,用戶名稱和密碼貼在「數據機」上。Users can select a continent from the world map of the main page, enter the desired country and click the red dot next to the name of a city to view the corresponding summary of climatological information
網頁使用人士可從主網頁的地圖上選擇各大洲,進入其中一國家,然後按城市名字旁的紅色圓點選擇瀏覽該城?的氣象數據列表。You can either perform a lookup on a particular parameter by name
可以根據名字對一個特定的參數完成一個查找(分享友人