聯系記錄 的英文怎麼說

中文拼音 [lián]
聯系記錄 英文
relationship record
  • : Ⅰ動詞(聯結; 聯合) unite; join Ⅱ名詞(對聯) antithetical couplet
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ動詞1 (把印象保持在腦子里) remember; bear in mind; commit to memory 2 (記錄; 記載;登記) writ...
  • : Ⅰ名1 (用做記載物的名稱) record; register; collection; selections 2 (姓氏) a surname Ⅱ動詞1 (...
  • 記錄 : 1 (寫下來) take notes; keep the minutes; record; write down; log; enter; read in 2 (當場記錄下...
  1. Sure. i ' ve written down yur questions. please give me your phone number for further contace, can i ger bace to you right after i speak to my supervisor

    魏:可以.你提的問題我已作了,請留下電話.我請示后給您答復好嗎
  2. This paper introduces some ways to implement expert database systems in relational database and suggests some ways to think about expert database systems in flight record data analysis

    文中介紹了基於關資料庫的專家資料庫統的實現方法,給出了在飛行資料分析中應用專家資料庫統的思路。
  3. Implementation of government office automation with the introduction of intranet in archsd, more and more office information are disseminated electronically, eg. office circulars, minutes of meeting etc

    隨著建築署內網的使用,越來越多政府部門的資料經由電腦統于內部傳送,例如政府部門通告、會議等。
  4. Guide for coordination of clinical laboratory services within the electronic health record environment and networked architectures

    電子健康環境和網體結構中臨床實驗室業務的協調指南
  5. In addition, the unit supports a call history log, which stores the last 32 incoming and outgoing calls so that the user can readily select and dial a recent contact

    此外,該裝置支援呼叫,可以存儲最後32個呼入呼出電話,由此用戶可以很容易的選擇並撥出最近過的絡人
  6. Once has the bandits and thieves to intrude guards against the place, the detector launches the wireless coded signal immediately, the networking center number which installs when is apart from defense area 150 meter within the main engine to send out the police whistle sound to report to the police immediately, reports to the police dials to establish in advance or reports to the police the telephone, the handset number, answers in the police telephone to return puts user pre - record to report to the police the pronunciation, long - distance reports to the police, simultaneously comes the real - time transmission through the internet to deploy troops for defense, to withdraw from a defended position, to report to the police and so on the condition, inquires the historic record through the computer network

    統還採用美國進口原裝晶元與先進的無線數字高頻技術微電腦cpu控制器主機組成。在防範地點安裝好主機后,並設置在布防狀態。一旦有盜賊闖入防範地點,探測器立刻發射無線編碼信號,安裝在距防區150米以內的主機立即發出警笛聲報警,報警時撥打預先設定的網中心號碼或報警電話手機號碼,接警電話里回放用戶預的報警語音,遠程報警,同時通過網際網路來實時傳遞布防撤防報警等狀態,通過電腦網路來查詢歷史
  7. A person who works in an office performing such tasks as keeping records, attending to correspondence, or filing

    職員在辦公室工作的人員,從事諸如保管檔案、保持通信或歸檔備案等工作
  8. The shot that the gvg system get can increase and verify the precision of interpretation of remote sensing images

    在gvg拍攝采樣點圖像的同時了采樣點的經緯度坐標信息,可以與遙感解譯圖像建立
  9. In addition to logging incidents, the system serves to record, update, and allow for retrieval of press enquiry records, emergency operations manuals, contact lists, records of exercises and operation of the combined information centre

    統除了意外事故,亦和更新查詢詳情以及緊急運作手冊通訊合新聞中心的工作和運作詳情等資料,更備有資料檢索功能。
  10. The web page can then be shared by all users or by a specific set of users

    訪問internet上被邀請者閑/忙信息的路徑( url )存儲於此人在outlook中的中。
  11. In relationship with banks : orders bank checks & forms, give application forms for bank transfers, fill bank book ( must know the bank balance at anytime )

    和銀行:定購銀行支票和表格,製作銀行轉帳申請表格,銀行賬目(必須在任何時間保證收支平衡) 。
  12. The author sets up a diskless honeypot in chroot environment, and relates the system root directory to chroot directory with nfs, so in such a honeypot, the hackers " file access will be recorded by means of capturing network packets

    作者設置了一個更改根目( chroot )環境下的無盤蜜罐,利用nfs把統根目與更改根目起來,採集網路數據包就能黑客在蜜罐內對文件的訪問活動。
  13. You can share email, chat messages, files, and shared screens, associating related information together as activities

    您可以共享電子郵件、聊天、文件和屏幕,將相關的信息和活動在一起。
  14. Small to your doubt 2 proposals you are strict according to pay treasure regulation to do business, you are asked during trading active connection buys the home, pay close attention to overtime time, had kept at the same time trade bilaterally chatting record of flourishing of the proof, flourishing that clean out treasure

    對于您的疑問小二建議您嚴格按照支付寶規則進行交易,交易期間請您積極買家,關注超時時間,同時保管好雙方的交易憑證、淘寶旺旺聊天
  15. For example, many programs that you write might involve peoplean address - book program for keeping track of your friends, a contact - manager program for your business contacts, or a program for tracking employees

    例如,您編寫的很多程序可能都涉及到人用於朋友方式的地址簿程序、用於業務的人管理器程序、或員工情況的程序等。
  16. Here is my contact info for your address book

    這是我的信息,請到你的地址簿。
  17. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見統的日誌文件,確保統被入侵攻擊前的日誌文件不被篡改、刪除,使得入侵者在入侵攻擊統前留下的「痕跡」能被完整的下來,作為取證人員重要的調查線索和證據來源; 2 )對各類統不同日誌文件組成日誌文件庫,為獲取和分析日誌文件的提供支持; 3 )對各類日誌文件的採用關分析,更有效的提取潛在的計算機犯罪線索。
  18. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根據以往的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測統把這部分異常以一定的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids統難以判斷的,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方法,代替人工檢查分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意義。
  19. Smartreader 3 is a data logger for easy recording of electric current. you can use this logger with up to three external current probes for recording three - phase systems or related equipment simultaneously

    使用這個儀你能夠用達叄個外部電流探針為同時叄相的統或者的設備
  20. Answer : preparative job includes : understands workplace one, the moving circumstance of 2 equipment, this job has with moving equipment without direct connection, have the job that cooperates without need with other team and group ; makes working priority discipline and the blemish that prepare to solve and weak point ; the staff member makes clear to divide the work and be familiar with the concerned data such as blueprint and test gauge cheng ; should be had the blueprint that agrees with actual state, record that examines last, newest rectify spare parts of the instrument that decides requisition, test gauge cheng, qualification, machine parts or tools kept in reserve, tool and join lead to wait ; is a few righter important equipment, especially complex protector or couplet jumps loop protector, should weave test program, working controller should fill in ticket of protection safety precaution, examine and approve via technical chief, just can carry out

    答:預備的工作包括:了解工作地點一、二次設備的運行情況,本工作與運行設備有無直接,與其他班組有無需要配合的工作;制定工作重點項目及預備解決的缺陷和薄弱環節;工作人員明確分工並熟悉圖紙與檢驗規程等有關資料;應具備與實際狀況一致的圖紙、上次檢驗的、最新整定通知單、檢驗規程、合格的儀器、備品備件、工具和連接導線等;對一些重要設備,非凡是復雜保護裝置或有跳迴路保護裝置,應編制試驗方案,工作負責人應填寫繼電保護安全措施票,並經技術負責人審批,方能實施。
分享友人