數據的保護 的英文怎麼說
中文拼音 [shǔjùdebǎohù]
數據的保護
英文
protected of data- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 的 : 4次方是 The fourth power of 2 is direction
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 護 : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
- 數據 : data; record; information
-
Form. taxus chinensis var. mairei is protecting plant in the first class, which is a precious and endangering plant in china in this paper, the quantitative characterics of form. taxus chinensis vsr. mairei population including age structure, spatial distribution pattern, growth dynamics of tree basal area, niche characterics, fractal dimension and competition between specises were studied using methods of mathematics ecology from the angle of population ecology of form. taxus chinensis var. mairei, then the prent state and the endangering causes were analysed. this research offers gist to protecting and enlarging the crude resourse of form. taxus chinensis vsr. mairei population, afforesting plantation and sustainable utilize for us
本文從南方紅豆杉種群生態學的角度、主要應用數學生態學的方法探討南方紅豆杉種群的數量特徵,包括南方紅豆杉種群年齡結構、種群空間格局(探討分佈格局動態規律與生境相互關系) 、不同立地條件下種群優勢度增長趨勢、生態位寬度、生態位相似比例、生態位重疊、空間占據能力及種間競爭等,分析其目前現狀及瀕危原因,期望為南方紅豆杉野生資源的保護和擴大、營造人工林及可持續利用提供理論基礎,也為瀕危植物種群生態學的研究提供參考。Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data
數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。According to trusted compeer seeffiity evaluation standard ( tgskt ), tfae security level of ^ armostall dbms is c2, and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource
按照可信計算機評估標準tcsec看,當前多數dbms系統只具備c2級安全性,這種安全性對數據的保護是不夠的。提供一個可靠的mlsdbms系統來保護系統信息資源是必要的,迫切的。Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed
以明文形式存放的數據,即使置於口令、防火墻和入侵檢測系統的保護之下,也很容易被竊取、盜用和破壞。These character based on sichuan power network ' s practice operation experience, in allusion to the config of the carrier wave protection in bypass breaker operating, through the study of protection ' s typical config : one side lfp - 902a, one side csl - 101a, proceeded comprehensive act module test, noted plenty of first hand test data and wave picture, proceeded detailed theory analyses, plenitude demonstration atresic type carrier wave distance protection when twain side atresic type logic is not completely same, basically can fill power network ' s requirement to relay of reliability selectivity speedly and sensitively
本文結合四川電網的實際運行經驗,針對旁路開關代路運行時的保護配置情況,通過對旁路代路時保護典型配對組合:一側lfp - 902a ,一側csl - 101a的保護配置情況的深入研究,做了全面的動模試驗,記錄了大量的第一手試驗數據和波形,進行了詳細的原理分析,充分驗證了高頻閉鎖式距離零序保護在兩側閉鎖式邏輯不盡一致的情況下,基本能夠滿足電網對繼電保護的可靠性、選擇性、快速性以及靈敏性的要求。It integrates the functions of servo amplifier, dynamic operator, position transmitter and remote communication. many new functions have added to its original ones, such as the real - time logical judgment, malfunctions self - diagnosis, alarm & protection, led display, on - line setting and adjustment of functional parameter and position transmitter, power - absence data auto - protection, watchdog system protection, and the long - range communication with pc
系統集伺服放大器、電動操作器、位置發送器及遠程網路式通信功能於一體,在保留對應部分原有功能的同時,還新增了邏輯實時判斷、故障實時監控、 led動態顯示數據、功能參數設置、掉電數據自保護、 「看門狗」電路保護、位置發送器在線調節、與遠程工控機數據通信等眾多功能。Can be subsumed under data security
等配置數據的保護可以歸類為數據安全。Third, this thesis presents a fault location method on two point ' s different phase short circuit fault. this method only uses relaying data
再次,分析了異地異相故障,利用故障前數據和保護信息,研究了此種類型的測距演算法。Be responsible for all purchasing activities related to material planning and ordering, order confirmation following up, on time delivery scheduling / statistics, quality and quantity issue coordination, payment following up, lead the annual performance of suppliers, review new supplier ' s evaluation and purchasing system data maintenance, smooth purchasing job, so to fulfill production requirements
負責所有采購相關事務,包括物料計劃及訂購,訂單確認跟蹤,按時交貨計劃及統計,供應商交貨之品質及數量異常問題協調,付款跟蹤,主導對供應商進行年度評估,參與新供應商評估以及采購系統數據的維護,確保采購作業順利進行,滿足生產需求In the part of discussing legal way, not only relative rules of substantive law are introduced, but also the difficulties we may meet in internet cases are analyzed, such as law selecting, subject affirmation, confirming of court jurisdiction and the acquirement of electronic evidence ; the seventh is to analyze the imperfections in current internet copyright protection, three aspects are mainly discussed ; the lack of legislation ( one is no definite rules about database protection in copyright law, the other is the lack of regulations to the applying of technology measure ), the low quality of judges and the poor ability to execute law, the light consciousness of people to internet copyrig ht. and the author puts forward his own improving opinions about it
在法律途徑中不僅介紹了有關的實體法律規定,還對法律適用、主體認定、法院管轄權的確定、電子證據的取得等網路訴訟中可能遇到的難題作了論述分析;七是分析了當前網路著作權保護中存在的問題,認為主要有立法上的不足(包括著作權法沒有對數據庫保護作出明文規定,以及對技術措施的採用缺乏規范兩方面) 、技術和設備上的欠缺而導致執法能力的低下、人們的網路著作權意識淡薄三個方面,並從中提出了自己的改進意見。The key technologies, in my research, include how to organize and implement " multi - layered " structures, how to achieve " work flow " in " office automatization ", how to implement the technology on the information communion, encryption and protection, the technology on business guidance and audit, and the technology on the information protection and sharing
「 oracle分散式數據庫遠程數據的維護和安全性的研究」要解決的關鍵技術有多層次架構的實現與如何組織、工作流技術在辦公自動化中如何實現、信息加密與保護技術的實現、業務監控與審計技術、信息保護和共享技術等地實現是解決這一問題的基本要素。After switching, you need to take periodic data backups to protect your data and to truncate the inactive portion of the transaction log
切換之後,需要定期備份數據,以保護數據並截斷事務日誌的不活動部分。The installation of the system recovery card can protect and recover the data on hard disk in university public computer experiment room, it also can complete the system and software installation and maintenance in a short time, and make the hardware more effeciency
通過在計算機上安裝還原卡,實現對高等院校公共機房中的計算機進行數據的保護與還原,可在短時間內完成計算機操作系統和軟體的安裝與維護工作,極大提高了硬體運行和維護效率。Unprotects data in memory that was protected using the
方法保護的內存中的數據的保護。Guideline 2, protection of global data, can be ensured in two ways
準則2 ,全局數據的保護可以通過兩種方式得到保證。Protected of data
數據的保護In addition, we research the key technic of database backup and recovery, which is very important to database protection
另外,對于數據庫系統數據的保護,探索了數據庫備份及恢復的關鍵技術和基本的實現方法。Lastly the management on data storage, variety of data, distribution in different places, the protection for important data needs advancing
數據的多樣化、地理上的分散性、對重要數據的保護等等,都對數據的合理使用和有效管理提出了新的更高的要求。Smart card is a plastic card with a microprocessor chip embedded in it, it ' s convenient to take, and it provides a larger data storage, what ' s more, it bears the ability of protecting internal data, namely, the protected data would not be accessed under unauthorized conditions
智能卡( smartcard )是一種嵌入了微處理器晶元的塑料卡,它便於攜帶,提供了較大的數據存儲容量,更重要的是,它具有對內部數據的保護功能,即在未認證情況下,受保護的數據不會被非法訪問。Software engineers are constantly writing expensive and difficult - to - maintain custom software to keep the systems sharing data
軟體工程師也在不停的編寫那些昂貴且不易維護的定製軟體來使系統數據的保持共享。分享友人