用戶標識碼 的英文怎麼說
中文拼音 [yònghùbiāozhìmǎ]
用戶標識碼
英文
covering works- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 戶 : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
- 標 : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
- 識 : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 用戶 : user; subscriber; consumer; party; purchasers; abonement
- 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
-
The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os
擴展后的標識鑒別機制增加了新的用戶安全屬性,即安全標簽和審計掩碼,以增加對安全操作系統下強制存取訪問控制和審計機制的支持。So some numbers dialed will be redialed by the mcu through the gsm modem according to customers " will, also the ip number can be added automatically, which not only reduce call fees but also make convenience and improve efficiency for customers : we design the hardware circuits first
撥號時,在不改變使用習慣的前提下按用戶意願將部分所撥號碼從無線系統中旁路出去,在用戶端即可完成電信網路的自動路由選擇。並可在撥號過程中自動加入網路標識碼,既節約費用,還方便用戶,提高效率。This reference number could be a purchase order number, a customer s job number or a group of words that identifies that shipment - - such as " 10 widgets " or " gift for mum.
此參考編碼可以是采購訂單編號、客戶作業編號或用於標識貨件的一組詞,例如「 10widgets 」或「 giftformom 」 。Represents a combination of a user s identity, an access mask, and an access control type allow or deny
表示用戶的標識、訪問掩碼和訪問控制類型(允許或拒絕)的組合。There is a coded fake - preventing identifier on all the products and clients can inquire genuine or fake by means of calling, mobile phone message and internet browse so as to avoid imitations and truly provide users with quality and safe products and carry out smaller, lighter and safer
本廠產品均有電碼防偽標識,可通過電話手機簡訊上網查詢真偽,以防假冒。真正為用戶提供優質安全產品,並真正做到「更小更輕更安全」 。For example, the user interface in visual studio 2005 supports shortcut keys for users who cannot use a mouse, text labels that describe functionality otherwise expressed by color coding, to help users who cannot recognize colors, and alternative text for graphical elements, to help users who use a screen reader
例如, visual studio 2005中的用戶界面支持快捷鍵,供不能使用鼠標的用戶使用;支持文本標簽以代替顏色代碼來說明功能,以幫助無法識別顏色的用戶;支持圖形元素的替代文本,以幫助使用屏幕閱讀器的用戶。Returns the view - state information, which combines private view state and an identifier for application view state, to write to the client in encoded form
返回視圖狀態信息(將私有視圖狀態和應用程序視圖狀態的標識符結合起來)以便以編碼形式寫入客戶端。Represents a combination of a user s identity and an access mask
表示用戶的標識和訪問掩碼的組合。An audit rule represents a combination of a user s identity and an access mask
審核規則表示用戶的標識和訪問掩碼的組合。The core algorithms in the candidate set creating function module are code pretreatment algorithm and candidate set creating algorithm. candidate list creating function module is the most important module, its core algorithms include candidate list adjusting algorithm, candidate matrix creating algorithm, original word lattice creating algorithm, language element node creating algorithm, optimal candidate words searching algorithm and candidate list creating without code algorithm which
候選列表生成模塊是整個系統最主要的模塊,主要核心演算法包括候選字詞調整演算法、候選矩陣生成演算法、初步詞網格生成演算法、語言元素結點的生成演算法、尋找最佳語句候選演算法以及無編碼候選列生成演算法,無編碼候選列生成演算法利用對用戶已輸入的漢字進行切分標注,通過系統中的知識庫信息在沒有輸入編碼的情況下預測后續的輸入。After you are connected, you will receive a user id and password from the service provider.
連接建立之後,您將收到服務提供商所提供的用戶標識和密碼。If your application must use sensitive information for user identification, such as social security numbers, you may want to provide the user with a non - sensitive user id and then use a lookup table in the database to match the sensitive information
如果您的應用程序必須使用用戶標識的敏感信息,如身份證號碼,則您可能需要向用戶提供非敏感的用戶id ,然後使用數據庫中的查找表來匹配該敏感信息。Your user account identifies your user name and password, the groups you ' re a member of, which network resources you have access to, and your personal files and settings
用戶帳戶標識了您的用戶名和密碼、所在的工作組、可以訪問哪些網路資源以及您的個人文件和設置。The userid and password of a portal user with manage rights for " any portal "
對「任何門戶」都有管理權限的門戶用戶的用戶標識( userid )和密碼( password ) 。In a universal data link file. udls are stored in clear text and cannot be encrypted. a udl file is an external file - based resource to your application, and it cannot be secured or encrypted using the. net framework
如果在建立連接時必須提供用戶標識和密碼,最安全的方法是在使用信息打開連接后丟棄這些信息,在persist security info設置為false或no時會發生這種情況。Login with userid root and password passw0rd
使用用戶標識root和密碼pass0rd登錄。Inputs login values, typically a userid and password
輸入登錄值,通常是用戶標識和密碼。Interfaces allow the application server and the resource adapter to handle signing on to an eis - by implicitly passing along a user id and password combination to the back end on behalf of the client, for example
介面允許應用程序服務器和資源適配器處理在eis上的登錄例如,通過隱式方法把用戶標識和密碼組合發送到代表客戶機的後端。While many speech recognition products have large vocabularies, the variety of words on the web, as well as many pseudo - words such as acronyms and other made - up words like passwords and user ids, prevents products from being able to cover all of the words in product vocabularies
雖然許多語音識別產品都有很大的詞匯表,但web上的詞各種各樣,另外還有許多假字(比如只取首字母的縮寫詞和其他合成詞,比如密碼和用戶標識) ,使得這些產品無法在產品詞匯表中涵蓋所有的詞。分享友人