有限訪問數據 的英文怎麼說

中文拼音 [yǒuxiànfǎngwènshǔ]
有限訪問數據 英文
limited access data
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 有限 : limited; restricted; finite; a little; not much
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 數據 : data; record; information
  1. Limited metadata accessibility means the following

    的元性意味著:
  2. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目標包括控制對的原始、保護內核和系統軟體的完整性、防止特權的進程執行危險的代碼,以及制由特權的進程缺陷所導致的傷害。
  3. 6 ) fsca picks the control of connection access and management of right, so fsca system fully ensured that legality when users access data

    6 )採用嚴格的控制方式與權管理機制。 fsca系統充分保證了用戶的合法性與效性。
  4. It is important to set up the acl to databases with the proper access

    設置acl ,使之具適當的權庫,這非常重要。
  5. Some data access methods perform very well, but are only useful in a limited number of scenarios

    一些方法執行得很好,但是這僅僅是在某些量的場合中蔡用。
  6. If a programming element represents proprietary functionality, or contains confidential data, you usually want to limit access to it as strictly as possible

    如果編程元素表示專功能或包含機密,則通常需要盡最大可能嚴格制對它的
  7. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    通過ah和esp協議來以下的安全服務:控制,無連接完整性,源認證,重放攻擊保護,機密性和的通信流保密性。
  8. Users that have no access to system tables or database files cannot retrieve the obfuscated text

    對系統表或庫文件沒的用戶不能檢索模糊文本。
  9. It gives users secure access to data, it resources, transactions, and processing power that were previously locked up in proprietary systems, so they can better address their clients needs.

    它使用戶可以安全地、 it資源、事務以及先前被制在私系統上的處理能力,因此,那些公司可以更好地滿足客戶的需求。 」
  10. For more information about specifying mining structure access, see granting mining structure and mining model permissions to database roles

    關指定挖掘結構的詳細信息,請參閱「授予庫角色挖掘結構和挖掘模型的權」 。
  11. As a practice of above idea and theory, this paper rewrites a structure analysis of finite element program which based on the object - oriented programming technology. using current popular visual c + + developing tool and odbc database connectivity technology, this paper develops a data management program fedms of cae software pre - processing and post - processing data. the program realizes data management using engineering database, visual i / o method and promotes the integration of cae software into civil engineering cad system

    此外,作為上述理論和方法的實踐,重寫了一個採用面向對象技術和元方法的通用平面桿系結構分析程序finite ,應用當前比較流行的visualc + +開發工具的odbc庫連接技術,研製了一個后臺基於microsoftaccess庫的cae軟體前後處理系統fedms ( finiteelementdatamanagementsystem ) ,對結構分析計算中的前後處理進行了效的管理。
  12. When you are detaching or attaching a database, the database engine tries to impersonate the windows account of the connection performing the operation to guarantee that the account has permission to access the database and log files

    分離或附加庫時,庫引擎嘗試模擬執行該操作的連接的windows帳戶,從而保證該帳戶具庫和日誌文件的權
  13. There is, however, a built - in access control list mechanism involving flat files or databases

    但是,一個內建的對普通文件和的權控制機制。
  14. For more information about specifying dimension data access for a role, see specifying attribute permissions in a dimension

    關為角色指定維度的詳細信息,請參閱「在維度中指定屬性權」 。
  15. For more information about specifying dimension access for a role, see granting dimension - level permissions to database roles

    關為角色指定維度的詳細信息,請參閱「授予庫角色維度級別的權」 。
  16. With isolated storage, your code no longer needs unique paths to specify safe locations in the file system and data is protected from other applications that only have isolated storage access

    通過獨立存儲,代碼不再需要使用唯一的路徑來指定文件系統中的安全位置,同時可以保護免遭只具獨立存儲的其他應用程序的損壞。
  17. Even though the user eileen has the proper privilege to access a nickname, the underlying remote object privilege will be rechecked by the remote data source against the remote user id that the federated system uses to establish the connection on behalf of eileen

    即使用戶eileen具一個昵稱的適當權,遠程源仍將對聯邦系統用來代表eileen建立連接的遠程用戶id進行底層遠程對象權的檢查。
  18. This paper focuses on the main limitation - unable to share the data surely and effectively - of the existing systems. on the basis of the computer making train diagram system ver2. 0, brings fonvard the new style system of making diagram with computer based on the b / s architecture. in the paper, the author makes studies on the data permission security and transport security problems of the train diagram system that is based on computer networks and distributed system

    0 》的基礎上,針對目前國內計算機編圖系統的主要不足? ?無法安全效的實現信息共享,提出基於b s體系架構的新型編圖系統整體方案,並對處于網路互聯狀態下、分散式處理系統的列車運行圖以及傳輸安全題進行深入的研究。
  19. The encrypting file system ( efs ) in windows 2000 complements existing access controls and adds a new level of protection for your data

    Windows2000的加密文件系統( efs )補充了現控制,並為添加了一級新的保護措施。
  20. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括在傳輸中可能被竊取和篡改,惡意代碼,和拒絕服務( dos ) ;內部威脅包括了對系統代碼的竊取和修改,員工意和無意的、修改一些他們沒
分享友人