訪問保護 的英文怎麼說

中文拼音 [fǎngwènbǎo]
訪問保護 英文
protected access
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. The delegation also met with other hong kong governments officials to exchange views on china s accession to the world trade organisation and the opportunities for hong kong ; hong kong s role and prospects in the economic development of the pearl river delta ; as well as business opportunities arising from hong kong s transport infrastructure and environmental projects

    團並與香港政府其他代表會晤及交流經驗,議題包括中國加入世界貿易組織為香港帶來的機遇、香港在珠江三角洲經濟發展所扮演的角色及前景、以及香港運輸基建及環境計劃所帶來的商機。
  2. Determines access to securable objects

    確定對可對象的權限。
  3. 395 - 3230 deputy ustr shiner to visit china november 15 - 19 ipr enforcement, wto implementation to top agenda

    率代表團於11月15日至19日中國,就知識產權和中國履行世界貿易組織承諾等題舉行會談。
  4. How is data protected from unauthorized access

    如何數據不受未授權的
  5. Is the allocation attribute and desired access protection flags

    是分配屬性以及希望的訪問保護標志。
  6. If page - aligned memory is not a requirement and the default access protection of

    如果不需要按頁對的內存,而且默認的訪問保護標志
  7. Is the set of flags describing the allocation attributes and desired access protection

    是一組標志,描述內存分配屬性,以及希望的訪問保護
  8. Is a set of flags specifying commitment or decommitment, and desired access protection

    是一組標志,指定內存提交或回收,以及希望的訪問保護
  9. Is the set of attribute flags that specify the desired access protection for the shared memory object

    是屬性標志,它說明了希望該共享內存對象的訪問保護模式。
  10. A committed page has its access controlled by an access protection attribute. these protection attributes are read protection

    對已提交頁的由一個訪問保護屬性進行控制;屬性有讀
  11. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目標包括控制對數據的原始內核和系統軟體的完整性、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。
  12. Since this server component is provided as a premium service for windows server 2003, a windows rms client access license is required for each user publishing and or consuming rights management services - protected content

    由於此服務器組件是以windows server 2003的高級服務提供的,因此,要求發布和或使用受rights management services rms的內容的每個用戶具有windows rms客戶端許可證cal 。
  13. Given a scenario, write code that makes appropriate use of object locking to protect static or instance variables from concurrent access problems

    在給定的條件下,寫出正確使用對象鎖靜態或實例變量不會產生並發題的代碼
  14. On may 3, invited by the institutes deputy directors liu xiaobing and hu naizhe, dr. mclaughlin visited the experimental park in harbin and the black soil ecological experiment station in hailun. with deputy director liu xiaobing and the research fellow zhang xingyi, he had an in - depth discussion of some issues of common interest to both sides, like the deterioration and management of black soil, conservation farming, compacting of soil

    5月3日, neil博士應劉曉冰副所長和胡乃哲副所長的邀請,了我所哈爾濱園區以及海倫黑土生態實驗站,與劉副所長張興義研究員等圍繞黑土退化與管理性耕作土壤壓實等雙方感興趣的題進行了深入的交流。
  15. In this model we divide system into several sub - layers, and strictly control visiting popedom in order to assure the system ' s high cohesion low coupling, good maintainability, easy expansibility, being good transplantable, etc

    該模式對系統的層次進行了詳細的劃分,並對各層次之間的權限進行了嚴格的控制。確系統具有高內聚、低耦合、易維性、可擴展性和可移植性強等特點。
  16. Abstract : the happenning process and cause as well as causing catastrophy of muddebris flow were anlysissed and evaluated based on sitting inspect and visit of minjiang longtanbao muddebris flow. the proposal of reducing and defencing catastrophy and protecting ecological envirenment

    文摘:通過岷江龍潭堡泥石流現場考察、,對這次泥石流的發生過程及造成的災害進行分析和評價,對泥石流發生的原因做出初步分析,並提出減災、防災、生態環境的建議。
  17. Cs0122 : method inaccessible due to its protection level

    Cs0122 :方法的級別導致無法方法
  18. Password protecting, redirect users automatically, error pages, change file extensions, block certain ip addresses, or allows certain sessions to view certain pages

    密碼,自動跳轉頁面,找不到頁面,改變文件的擴展名,過濾指定的ip地址,允許指定的繪畫程序指定頁面。
  19. Longgang nature reserve plays an important role in preserving two langur species of both white - headed langur and francois langur. interview and field survey methods were used to survey the distribution and population size of these two langurs in this natural reserve from december 2001 to january 2002. the result indicated that the reserve has 8 groups of white - headed langur with 68 individuals in longrui and 10 groups of francois langur with 75 individuals in longgang. the distribution area and population size of both of the two langurs in this reserve have greatly declined in the past decades. they are seriously threatened and have high risk of disappearance from this reserve if no effective measures are to be taken at once

    為了確定弄崗自然區內白頭葉猴的種群數量,彌補黑葉猴種群數量的空白,掌握此區葉猴的生存現狀,採用法和實地數量統計法相結合的方法對弄崗自然區的弄崗、隴瑞和弄呼3個部分進行深入的調查研究.調查結果表明,在隴瑞片范圍內,共有8群白頭葉猴,種群大小在68隻左右,和20世紀80年代末的244隻相比,數量下降相當驚人;在弄崗片內,共記錄到黑葉猴群10群,最大的種群為11隻個體,最小的種群是4隻個體,共計約有75隻黑葉猴(絕對數量統計) ;弄呼的黑葉猴種群已經于上個世紀的晚期消失.造成目前狀況的因素主要是過度狩獵和其他形式的過度干擾.弄崗自然區的葉猴種群數量已經接近可持續繁殖種群的最低水平,如不採取有效的措施,這個種群將很可能在短期內消失
  20. However, measures taken to protect data integrity on a physical level include, among other things, restricting access to computers, keeping transmission media such as cables and connectors protected, and avoiding power outages and electrostatic discharges read " building the ideal web hosting facility : a physical security perspective " ; see

    無論如何,除了其他方法之外,在物理層上採取的數據的措施包括,限制對計算機的持對傳輸媒介(比如電纜和連接器)的,以及避免停電和靜電釋放(閱讀「 building the ideal web hosting facility : a physical security perspective 」 ,參閱
分享友人