數據名 的英文怎麼說

中文拼音 [shǔmíng]
數據名 英文
data name
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • 數據 : data; record; information
  1. After several years development, sem. test gets our independent standardized laboratory recognized by the authoritative certification institution of tuv rhineland timco engineering and ul etc. the founding of sem. test compliance is to apply professional product emc, rf, safety and rohs testing and certification service for product quality meeting the standard s requirements

    3 .先進的實驗設備sem . test測試設備來自專業的世界知品牌,主要有美國agilent , hp , ketherly ,丹麥k b ,德國r s和中國的aino系列品牌,為測試的精確性提供可靠的保障。
  2. The recommended approach for accessing resources outside the database under an impersonation context is to use certificates and signatures as apposed to the

    在模擬上下文內訪問庫以外資源的建議方法是使用證書和簽替代
  3. For example, in html you use tags to tell the browser to display data as bold or italic ; in xml you use tags only to describe data, such as city name, temperature, and barometric pressure

    例如,在html中,使用標記來告訴瀏覽器將顯示為粗體或斜體;而在xml中,標記只用於描述,例如城市、溫度和大氣壓。
  4. Fsmail adopts and implements the asynchronous event driven mechanism, with all those network i / o operations in the server working under the non - blocking style ; accomplishes object - oriented heap with the dynamic array, adapted to any type of data ; adopts the multi - queue scheduling mechanism based on a fsm, easily to fulfill the extentions of delivery funtions ; fulfills the non - blocking domain name resolvement mechanism and the caching of the resolved results ; implements the non - blocking user database management and the caching of the user data recently accessed ; uses the unified memory pool management, avoiding the memory leakage and improving the performance of the fsmail server ; lastly, implements the log management server based on the c / s mode, eliminating the inconsistency of the logging metadata and being adapted to any kind of application logging

    Fsmail採用並實現了異步事件驅動機制,所有網路i o的實現使用了非阻塞方式;以動態組實現了基於面向對象的堆隊列,屏蔽了堆的非一致性;使用了基於有限狀態機的多隊列郵件調度機制,為后續版本的擴展性提供了良好的介面機制;服務器內部實現了非阻塞的域解析機制,並實現域地址緩存;實現了非阻塞的用戶庫管理模塊,並實現用戶緩存;使用了統一的內存池管理機制,既防止了內存泄漏,又提高了服務器的性能;最後,還實現了基於c s模式的日誌管理服務器,屏蔽了日誌元的非一致性。
  5. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了字簽的概念及原理,並以bolero為例介紹了字簽的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  6. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    字簽是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽,來代替書寫簽或印章,確認簽者的身份、來源和完整性,防止被竊取、篡改和破壞,從而達到保護的目的。
  7. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝、網上鄰居字列表等的讀寫操作,從而很方便的根控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  8. Four databases contained are as follows : student information database stores the school ' s section ( including school and department, specialty, class, etc ) ; as well as undergraduates " information ( including student ' s serial number, name, score in each academic year and semester, class curriculum schedule, teacher curriculum schedule, etc )

    本系統共有四個庫,分別是學生信息庫:保存學校的部門信息(院系、專業、班級等) ;在校本科生的信息(學號、姓、各學年成績、班級課表、教師課表等) 。
  9. While agreeing with this basic analysis, noted long time csicop psychic debunker ray hyman suggested the results were not enough on their own, and a wider data set was required

    而當與這個基礎分析形成一致意見之後,著的超常現象科學調查委員會( csicop )的長期精神分析專家雷海曼暗示了他們自己的結果並不足夠,需要更廣泛的
  10. Edi. message. passenger list message paxlst

    電子交換.報文.旅客單報文
  11. In cobol, a word or a punctuation character that associates a data name or paragraph name with its qualifier, links two or more operands in a series, or forms a conditional expression

    在cobol語言中的一個字或一個標點符號,它把數據名或程序段和其限定詞建立聯系,連接兩個或更多的串列操作,或構成一個條件表達式。
  12. Creates an object file containing machine code, linker directives, sections, external references, and function data names for the selected file

    創建一個對象文件,在其中包含選定文件的機器碼、鏈接器指令、節、外部引用以及函數據名
  13. In code, you can use bi - directional languages for the names of variables, classes, object, attributes, metadata, and other elements

    在代碼中,可針對變量、類、對象、屬性、元數據名和其他元素使用雙向語言。
  14. A listing provided by a compiler to enable a programmer to relate data names to the main addresses within the program

    編譯程序提供的一個列表,使程序員可將數據名與程序內部的主存地址聯系起來。
  15. Describes the compiler, which creates an object file containing machine code, linker directives, sections, external references, and function data names

    描述編譯器,編譯器用於創建一個包含機器碼、鏈接器指令、節、外部引用和函/數據名的對象文件。
  16. The other kind of arguments are those that are not options, in other words, they do not really modify the behavior of the program, but are more like data names

    另一類參是那些不是選項的參,也就是說,它們並不真正更改程序的行為,而更象是數據名稱。
  17. Multiple metadata name value pairs should be separated with a semicolon

    多個元數據名稱/值對之間應使用分號分隔。
  18. Specify the metadata name and value for the item with the following syntax

    按照下面的語法為該項指定元數據名稱和值:
  19. The item metadata name

    項元數據名稱。
  20. Item metadata is declared in the project file by creating an element with the name of the metadata as a child element of the item

    項元是通過創建作為該項的子元素的具有元數據名稱的元素在項目文件中聲明的。
分享友人