監視配置 的英文怎麼說

中文拼音 [jiānshìpèizhì]
監視配置 英文
monitoring configuration
  • : 監名詞1. (古代官府名) an imperial office 2. (姓氏) a surname
  • : Ⅰ動詞1. (看) look at 2. (看待) regard; look upon 3. (考察) inspect; watch Ⅱ名詞(姓氏) a surname
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • 監視 : keep watch on; keep a lookout over; guard; monitoring; surveillance
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  1. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有分析用戶和系統的行為、審計系統和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地、審計、評估自己的系統。
  2. Blocked process threshold uses the deadlock monitor background thread to walk through the list of tasks waiting for a time greater than or multiples of the configured threshold

    阻塞的進程閾值使用死鎖器后臺線程等待時間大於(或數倍于)的閾值的任務列表。
  3. Websphere application server allows for four administrative roles : administrator, operator, monitor, and configurator

    Websphere application server允許四種管理角色:管理員、操作員、人員和人員。
  4. Every administrator has equal administrative authority within their assigned authority of administrator, configurator, operator, or monitor to the entire cell

    每個管理員對于整個計算單元都具有相同的管理權限(在其分的管理角色內:管理員、人員、操作員或人員) 。
  5. Health - monitoring configuration settings are contained in the

    運行狀況監視配置包含在文件的
  6. Chapter 1, we introduce this paper. chapter 2, we anatomy active signaling and probe particularly. active signaling protocol ( asp ) is an important application in active network. probe is a model to debug and inspect active environment. furthermore, we analyse rsvp and its employmet process. chapter 3, we bring forward the active signaling and probe model to scout the network state. chapter 4, we analysys key class and object in the model. chapter 5, we design programmes for user and deploy it to linux 9. 0 operating system so we can experiment partly. chapter 6, we sum up and analysis work for later

    在第三章中,我們提出了主動信令和探針的結合模型,並用主動探針對網路狀態進行。在第四章中,我們對于模型中的關鍵類和對象進行了分析。第五章我們對探針程序及用戶端程序進行了設計,並在linux9 . 0中ee環境,對本文提出的處理模式進行了部分實驗。
  7. After analyzing, it is determined that an embedded - data - monitoring system, instead of the traditional communication card that links the ipc and monitoring center, can be put into practice to directly join together with the switched ethernet control network, so that the user can monitor the industrial field using internet / intranet conveniently

    經過分析,決定用嵌入式的數據系統取代傳統的鋼廠薄板工段數據系統典型中的通信網卡,以便直接接入交換式以太控制網路,用戶可以用internet intranet技術工業現場,而不僅限於原來的控室。
  8. Few of them are discussed from the point of legal power, especially legal power disposing of banking supervision

    本文突破以往論著對金融管研究的窠臼,嘗試從法權的角,尤其是從法權的全新角來剖析、審目前的銀行業管變革。
  9. 1 this product may with many cameras, the image picture division processor, the television or the monitoring device disposition, may combine the usability to be strong, the price inexpensive center small supermarket factory workshop monitoring photographs the security alarm system ; with the 2. 4g wireless picture receiving and dispatching system disposition, a monitoring device may the simultaneous reception four wireless cameras picture signals, use automatic, the manual way perform handover or photograph, realizes to the different place surveillance, security, the video recording ; this product and the telephone security digit dialing disposition, after garrisons may automatically dial to save the telephone to report to the police in advance

    該產品可與多臺攝像機圖象畫面分割處理器電機或,可組合成實用性強價格低廉的中小超市工廠車間控拍照防盜報警系統與2 . 4g無線圖像收發系統,一臺器可同時接收四臺無線攝像機的圖像訊號,採用自動手動方式進行切換或拍照,實現對不同地點的防盜錄像;該產品與電話防盜撥號器,設防后可自動撥打預存電話報警。
  10. Our system consists of two parts which are maids and maids _ station. maids is the console of our system through which we can configure and control our system

    Maids是系統的管理端,對系統進行及管理,主要功能包括代理的管理,對被的網路的管理及接受報警信息,日誌等功能。
  11. Patterns of manchu culture is divided into an introduction and eight chapters, these contents include as follows : the houses of manchu families and their surroundings, the structure of rooms and their furnishings, own their characteristics, and they give the important influences in the behaviors, mentality, concept of value of manchu people, in men environment, manchu people highly value the groups, pay attention to the differences between ourselves and strangers, hygiene, open to the community, value public opinions, and broadly admitting the new members and forgive others

    ) uwenimuru )共分八章,其中包含的主要觀點如下:滿族家庭的住宅結構、房間和環境的特點,對滿族人的行為方式、心理意識、價值觀念有很大影響,在這樣的環境中,滿族形成了重群體的意識、內外有別意識、衛生意識、社會開放心理、公共督意識、包容與吸納心理。
  12. Describes the health monitoring configuration section

    描述運行狀況監視配置節。
  13. Configures an application for health monitoring

    針對運行狀況監視配置應用程序。
  14. Instructs the host to monitor an associated

    指示主機監視配置文件中關聯
  15. Instructs the host object to stop monitoring an associated

    指示主機對象停止監視配置文件中關聯
  16. Secure health monitoring configuration

    保護運行狀況監視配置
  17. Health - monitoring configuration element, you can optionally specify an event - code range

    狀況監視配置元素中,可以根據需要指定事件代碼范圍。
  18. For more information about health monitoring configuration settings and their default values, see

    有關運行狀況監視配置及其默認值的更多信息,請參見
  19. Upon receipt of the work order, your network management system would then provision and schedule all the configuration and deployment changes for you across the cluster, monitor progress, and adaptively tune your system over time to achieve your objectives

    收到了工作訂單后,網路管理系統就會在整個群集中準備並規劃對所有和部署所做的更改,然後進程,並隨時間的推移相應地調整系統,以實現您的目標。
  20. Mibs are specifications containing definitions of management information so that the network can be remotely monitored, configured, and controlled

    管理信息庫是包含用於和控制網路系統的管理信息定義的規范,是網路管理標準的重要組成部分。
分享友人