數據名 的英文怎麼說
中文拼音 [shǔjùmíng]
數據名
英文
data name-
After several years development, sem. test gets our independent standardized laboratory recognized by the authoritative certification institution of tuv rhineland timco engineering and ul etc. the founding of sem. test compliance is to apply professional product emc, rf, safety and rohs testing and certification service for product quality meeting the standard s requirements
3 .先進的實驗設備sem . test測試設備來自專業的世界知名品牌,主要有美國agilent , hp , ketherly ,丹麥k b ,德國r s和中國的aino系列品牌,為測試的精確性提供可靠的數據保障。The recommended approach for accessing resources outside the database under an impersonation context is to use certificates and signatures as apposed to the
在模擬上下文內訪問數據庫以外資源的建議方法是使用證書和簽名替代For example, in html you use tags to tell the browser to display data as bold or italic ; in xml you use tags only to describe data, such as city name, temperature, and barometric pressure
例如,在html中,使用標記來告訴瀏覽器將數據顯示為粗體或斜體;而在xml中,標記只用於描述數據,例如城市名、溫度和大氣壓。Fsmail adopts and implements the asynchronous event driven mechanism, with all those network i / o operations in the server working under the non - blocking style ; accomplishes object - oriented heap with the dynamic array, adapted to any type of data ; adopts the multi - queue scheduling mechanism based on a fsm, easily to fulfill the extentions of delivery funtions ; fulfills the non - blocking domain name resolvement mechanism and the caching of the resolved results ; implements the non - blocking user database management and the caching of the user data recently accessed ; uses the unified memory pool management, avoiding the memory leakage and improving the performance of the fsmail server ; lastly, implements the log management server based on the c / s mode, eliminating the inconsistency of the logging metadata and being adapted to any kind of application logging
Fsmail採用並實現了異步事件驅動機制,所有網路i o的實現使用了非阻塞方式;以動態數組實現了基於面向對象的堆隊列,屏蔽了堆數據的非一致性;使用了基於有限狀態機的多隊列郵件調度機制,為后續版本的擴展性提供了良好的介面機制;服務器內部實現了非阻塞的域名解析機制,並實現域名地址緩存;實現了非阻塞的用戶數據庫管理模塊,並實現用戶數據緩存;使用了統一的內存池管理機制,既防止了內存泄漏,又提高了服務器的性能;最後,還實現了基於c s模式的日誌管理服務器,屏蔽了日誌數據元的非一致性。The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data
數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk
從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。Four databases contained are as follows : student information database stores the school ' s section ( including school and department, specialty, class, etc ) ; as well as undergraduates " information ( including student ' s serial number, name, score in each academic year and semester, class curriculum schedule, teacher curriculum schedule, etc )
本系統共有四個數據庫,分別是學生信息庫:保存學校的部門信息(院系、專業、班級等) ;在校本科生的信息(學號、姓名、各學年成績、班級課表、教師課表等) 。While agreeing with this basic analysis, noted long time csicop psychic debunker ray hyman suggested the results were not enough on their own, and a wider data set was required
而當與這個基礎分析形成一致意見之後,著名的超常現象科學調查委員會( csicop )的長期精神分析專家雷海曼暗示了他們自己的結果並不足夠,需要更廣泛的數據。Edi. message. passenger list message paxlst
電子數據交換.報文.旅客名單報文In cobol, a word or a punctuation character that associates a data name or paragraph name with its qualifier, links two or more operands in a series, or forms a conditional expression
在cobol語言中的一個字或一個標點符號,它把數據名或程序段名和其限定詞建立聯系,連接兩個或更多的串列操作數,或構成一個條件表達式。Creates an object file containing machine code, linker directives, sections, external references, and function data names for the selected file
創建一個對象文件,在其中包含選定文件的機器碼、鏈接器指令、節、外部引用以及函數名或數據名。In code, you can use bi - directional languages for the names of variables, classes, object, attributes, metadata, and other elements
在代碼中,可針對變量名、類名、對象名、屬性名、元數據名和其他元素名使用雙向語言。A listing provided by a compiler to enable a programmer to relate data names to the main addresses within the program
編譯程序提供的一個列表,使程序員可將數據名與程序內部的主存地址聯系起來。Describes the compiler, which creates an object file containing machine code, linker directives, sections, external references, and function data names
描述編譯器,編譯器用於創建一個包含機器碼、鏈接器指令、節、外部引用和函數/數據名的對象文件。The other kind of arguments are those that are not options, in other words, they do not really modify the behavior of the program, but are more like data names
另一類參數是那些不是選項的參數,也就是說,它們並不真正更改程序的行為,而更象是數據名稱。Multiple metadata name value pairs should be separated with a semicolon
多個元數據名稱/值對之間應使用分號分隔。Specify the metadata name and value for the item with the following syntax
按照下面的語法為該項指定元數據名稱和值:The item metadata name
項元數據名稱。Item metadata is declared in the project file by creating an element with the name of the metadata as a child element of the item
項元數據是通過創建作為該項的子元素的具有元數據名稱的元素在項目文件中聲明的。分享友人