數據的保護 的英文怎麼說

中文拼音 [shǔdebǎo]
數據的保護 英文
protected of data
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • 數據 : data; record; information
  1. Form. taxus chinensis var. mairei is protecting plant in the first class, which is a precious and endangering plant in china in this paper, the quantitative characterics of form. taxus chinensis vsr. mairei population including age structure, spatial distribution pattern, growth dynamics of tree basal area, niche characterics, fractal dimension and competition between specises were studied using methods of mathematics ecology from the angle of population ecology of form. taxus chinensis var. mairei, then the prent state and the endangering causes were analysed. this research offers gist to protecting and enlarging the crude resourse of form. taxus chinensis vsr. mairei population, afforesting plantation and sustainable utilize for us

    本文從南方紅豆杉種群生態學角度、主要應用學生態學方法探討南方紅豆杉種群量特徵,包括南方紅豆杉種群年齡結構、種群空間格局(探討分佈格局動態規律與生境相互關系) 、不同立地條件下種群優勢度增長趨勢、生態位寬度、生態位相似比例、生態位重疊、空間占能力及種間競爭等,分析其目前現狀及瀕危原因,期望為南方紅豆杉野生資源和擴大、營造人工林及可持續利用提供理論基礎,也為瀕危植物種群生態學研究提供參考。
  2. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者身份、來源和完整性,防止被竊取、篡改和破壞,從而達到
  3. According to trusted compeer seeffiity evaluation standard ( tgskt ), tfae security level of ^ armostall dbms is c2, and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource

    按照可信計算機評估標準tcsec看,當前多dbms系統只具備c2級安全性,這種安全性對數據的保護是不夠。提供一個可靠mlsdbms系統來系統信息資源是必要,迫切
  4. Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed

    以明文形式存放,即使置於口令、防火墻和入侵檢測系統之下,也很容易被竊取、盜用和破壞。
  5. These character based on sichuan power network ' s practice operation experience, in allusion to the config of the carrier wave protection in bypass breaker operating, through the study of protection ' s typical config : one side lfp - 902a, one side csl - 101a, proceeded comprehensive act module test, noted plenty of first hand test data and wave picture, proceeded detailed theory analyses, plenitude demonstration atresic type carrier wave distance protection when twain side atresic type logic is not completely same, basically can fill power network ' s requirement to relay of reliability selectivity speedly and sensitively

    本文結合四川電網實際運行經驗,針對旁路開關代路運行時配置情況,通過對旁路代路時典型配對組合:一側lfp - 902a ,一側csl - 101a配置情況深入研究,做了全面動模試驗,記錄了大量第一手試驗和波形,進行了詳細原理分析,充分驗證了高頻閉鎖式距離零序在兩側閉鎖式邏輯不盡一致情況下,基本能夠滿足電網對繼電可靠性、選擇性、快速性以及靈敏性要求。
  6. It integrates the functions of servo amplifier, dynamic operator, position transmitter and remote communication. many new functions have added to its original ones, such as the real - time logical judgment, malfunctions self - diagnosis, alarm & protection, led display, on - line setting and adjustment of functional parameter and position transmitter, power - absence data auto - protection, watchdog system protection, and the long - range communication with pc

    系統集伺服放大器、電動操作器、位置發送器及遠程網路式通信功能於一體,在留對應部分原有功能同時,還新增了邏輯實時判斷、故障實時監控、 led動態顯示、功能參設置、掉電、 「看門狗」電路、位置發送器在線調節、與遠程工控機通信等眾多功能。
  7. Can be subsumed under data security

    等配置數據的保護可以歸類為安全。
  8. Third, this thesis presents a fault location method on two point ' s different phase short circuit fault. this method only uses relaying data

    再次,分析了異地異相故障,利用故障前信息,研究了此種類型測距演算法。
  9. Be responsible for all purchasing activities related to material planning and ordering, order confirmation following up, on time delivery scheduling / statistics, quality and quantity issue coordination, payment following up, lead the annual performance of suppliers, review new supplier ' s evaluation and purchasing system data maintenance, smooth purchasing job, so to fulfill production requirements

    負責所有采購相關事務,包括物料計劃及訂購,訂單確認跟蹤,按時交貨計劃及統計,供應商交貨之品質及量異常問題協調,付款跟蹤,主導對供應商進行年度評估,參與新供應商評估以及采購系統,確采購作業順利進行,滿足生產需求
  10. In the part of discussing legal way, not only relative rules of substantive law are introduced, but also the difficulties we may meet in internet cases are analyzed, such as law selecting, subject affirmation, confirming of court jurisdiction and the acquirement of electronic evidence ; the seventh is to analyze the imperfections in current internet copyright protection, three aspects are mainly discussed ; the lack of legislation ( one is no definite rules about database protection in copyright law, the other is the lack of regulations to the applying of technology measure ), the low quality of judges and the poor ability to execute law, the light consciousness of people to internet copyrig ht. and the author puts forward his own improving opinions about it

    在法律途徑中不僅介紹了有關實體法律規定,還對法律適用、主體認定、法院管轄權確定、電子證取得等網路訴訟中可能遇到難題作了論述分析;七是分析了當前網路著作權中存在問題,認為主要有立法上不足(包括著作權法沒有對作出明文規定,以及對技術措施採用缺乏規范兩方面) 、技術和設備上欠缺而導致執法能力低下、人們網路著作權意識淡薄三個方面,並從中提出了自己改進意見。
  11. The key technologies, in my research, include how to organize and implement " multi - layered " structures, how to achieve " work flow " in " office automatization ", how to implement the technology on the information communion, encryption and protection, the technology on business guidance and audit, and the technology on the information protection and sharing

    「 oracle分散式庫遠程和安全性研究」要解決關鍵技術有多層次架構實現與如何組織、工作流技術在辦公自動化中如何實現、信息加密與技術實現、業務監控與審計技術、信息和共享技術等地實現是解決這一問題基本要素。
  12. After switching, you need to take periodic data backups to protect your data and to truncate the inactive portion of the transaction log

    切換之後,需要定期備份,以並截斷事務日誌不活動部分。
  13. The installation of the system recovery card can protect and recover the data on hard disk in university public computer experiment room, it also can complete the system and software installation and maintenance in a short time, and make the hardware more effeciency

    通過在計算機上安裝還原卡,實現對高等院校公共機房中計算機進行數據的保護與還原,可在短時間內完成計算機操作系統和軟體安裝與維工作,極大提高了硬體運行和維效率。
  14. Unprotects data in memory that was protected using the

    方法內存中數據的保護
  15. Guideline 2, protection of global data, can be ensured in two ways

    準則2 ,全局數據的保護可以通過兩種方式得到證。
  16. Protected of data

    數據的保護
  17. In addition, we research the key technic of database backup and recovery, which is very important to database protection

    另外,對于庫系統數據的保護,探索了庫備份及恢復關鍵技術和基本實現方法。
  18. Lastly the management on data storage, variety of data, distribution in different places, the protection for important data needs advancing

    多樣化、地理上分散性、對重要數據的保護等等,都對合理使用和有效管理提出了新更高要求。
  19. Smart card is a plastic card with a microprocessor chip embedded in it, it ' s convenient to take, and it provides a larger data storage, what ' s more, it bears the ability of protecting internal data, namely, the protected data would not be accessed under unauthorized conditions

    智能卡( smartcard )是一種嵌入了微處理器晶元塑料卡,它便於攜帶,提供了較大存儲容量,更重要是,它具有對內部數據的保護功能,即在未認證情況下,受不會被非法訪問。
  20. Software engineers are constantly writing expensive and difficult - to - maintain custom software to keep the systems sharing data

    軟體工程師也在不停編寫那些昂貴且不易維定製軟體來使系統持共享。
分享友人