用戶標識碼 的英文怎麼說

中文拼音 [yòngbiāozhì]
用戶標識碼 英文
covering works
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 用戶 : user; subscriber; consumer; party; purchasers; abonement
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定的權力和責任,包括帳使方式、資源訪問權限、口令應以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳設置及使權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應方面提供了基本的框架。
  2. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的鑒別機制增加了新的安全屬性,即安全簽和審計掩,以增加對安全操作系統下強制存取訪問控制和審計機制的支持。
  3. So some numbers dialed will be redialed by the mcu through the gsm modem according to customers " will, also the ip number can be added automatically, which not only reduce call fees but also make convenience and improve efficiency for customers : we design the hardware circuits first

    撥號時,在不改變使習慣的前提下按意願將部分所撥號從無線系統中旁路出去,在端即可完成電信網路的自動路由選擇。並可在撥號過程中自動加入網路,既節約費,還方便,提高效率。
  4. This reference number could be a purchase order number, a customer s job number or a group of words that identifies that shipment - - such as " 10 widgets " or " gift for mum.

    此參考編可以是采購訂單編號、客作業編號或貨件的一組詞,例如「 10widgets 」或「 giftformom 」 。
  5. Represents a combination of a user s identity, an access mask, and an access control type allow or deny

    表示、訪問掩和訪問控制類型(允許或拒絕)的組合。
  6. There is a coded fake - preventing identifier on all the products and clients can inquire genuine or fake by means of calling, mobile phone message and internet browse so as to avoid imitations and truly provide users with quality and safe products and carry out smaller, lighter and safer

    本廠產品均有電防偽,可通過電話手機簡訊上網查詢真偽,以防假冒。真正為提供優質安全產品,並真正做到「更小更輕更安全」 。
  7. For example, the user interface in visual studio 2005 supports shortcut keys for users who cannot use a mouse, text labels that describe functionality otherwise expressed by color coding, to help users who cannot recognize colors, and alternative text for graphical elements, to help users who use a screen reader

    例如, visual studio 2005中的界面支持快捷鍵,供不能使使;支持文本簽以代替顏色代來說明功能,以幫助無法別顏色的;支持圖形元素的替代文本,以幫助使屏幕閱讀器的
  8. Returns the view - state information, which combines private view state and an identifier for application view state, to write to the client in encoded form

    返回視圖狀態信息(將私有視圖狀態和應程序視圖狀態的符結合起來)以便以編形式寫入客端。
  9. Represents a combination of a user s identity and an access mask

    表示和訪問掩的組合。
  10. An audit rule represents a combination of a user s identity and an access mask

    審核規則表示和訪問掩的組合。
  11. The core algorithms in the candidate set creating function module are code pretreatment algorithm and candidate set creating algorithm. candidate list creating function module is the most important module, its core algorithms include candidate list adjusting algorithm, candidate matrix creating algorithm, original word lattice creating algorithm, language element node creating algorithm, optimal candidate words searching algorithm and candidate list creating without code algorithm which

    候選列表生成模塊是整個系統最主要的模塊,主要核心演算法包括候選字詞調整演算法、候選矩陣生成演算法、初步詞網格生成演算法、語言元素結點的生成演算法、尋找最佳語句候選演算法以及無編候選列生成演算法,無編候選列生成演算法利已輸入的漢字進行切分注,通過系統中的知庫信息在沒有輸入編的情況下預測后續的輸入。
  12. After you are connected, you will receive a user id and password from the service provider.

    連接建立之後,您將收到服務提供商所提供的和密
  13. If your application must use sensitive information for user identification, such as social security numbers, you may want to provide the user with a non - sensitive user id and then use a lookup table in the database to match the sensitive information

    如果您的應程序必須使的敏感信息,如身份證號,則您可能需要向提供非敏感的id ,然後使數據庫中的查找表來匹配該敏感信息。
  14. Your user account identifies your user name and password, the groups you ' re a member of, which network resources you have access to, and your personal files and settings

    了您的名和密、所在的工作組、可以訪問哪些網路資源以及您的個人文件和設置。
  15. The userid and password of a portal user with manage rights for " any portal "

    對「任何門」都有管理權限的門( userid )和密( password ) 。
  16. In a universal data link file. udls are stored in clear text and cannot be encrypted. a udl file is an external file - based resource to your application, and it cannot be secured or encrypted using the. net framework

    如果在建立連接時必須提供和密,最安全的方法是在使信息打開連接后丟棄這些信息,在persist security info設置為false或no時會發生這種情況。
  17. Login with userid root and password passw0rd

    使root和密pass0rd登錄。
  18. Inputs login values, typically a userid and password

    輸入登錄值,通常是和密
  19. Interfaces allow the application server and the resource adapter to handle signing on to an eis - by implicitly passing along a user id and password combination to the back end on behalf of the client, for example

    介面允許應程序服務器和資源適配器處理在eis上的登錄例如,通過隱式方法把和密組合發送到代表客機的後端。
  20. While many speech recognition products have large vocabularies, the variety of words on the web, as well as many pseudo - words such as acronyms and other made - up words like passwords and user ids, prevents products from being able to cover all of the words in product vocabularies

    雖然許多語音別產品都有很大的詞匯表,但web上的詞各種各樣,另外還有許多假字(比如只取首字母的縮寫詞和其他合成詞,比如密) ,使得這些產品無法在產品詞匯表中涵蓋所有的詞。
分享友人