設備拒絕 的英文怎麼說

中文拼音 [shèbèijué]
設備拒絕 英文
frj facility reject
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : Ⅰ動詞1 (具備; 具有) have; be equipped with 2 (準備) prepare; provide with; get ready 3 (防備...
  • : 動詞1. (抵抗; 抵擋) resist; repel 2. (拒絕) refuse; reject
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • 設備 : equipment; device; facility; implementor; apparatus; installation; appointment; furnishing; setou...
  • 拒絕 : refuse; reject; turn down; decline; in one's refusal to do; give sb. a flat refusal; repel; pass up
  1. On the evening of april 23 speer made a full confession of his insubordination in refusing to carry out the wanton destruction of germany's remaining installations.

    在4月23日那天晚上,斯佩爾全部坦白了他執行盲目破壞德國的殘余
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶置及使用權限、口令管理、審計和監控、份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Shipowner refuse as port facilities extremely poor try panama or greek

    因港口極為簡陋,船主,請另選巴拿馬船或希臘船。
  4. This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed

    具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護進行橫向隔離以抵禦非法訪問、服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。
  5. The remote machine rejected the connection attempt

    遠程設備拒絕連接請求。
  6. Save to the extent permitted by this agreement and by law, you will not reverse engineer, disassemble or decompile any of our content or transmit software that may cause damage to or failure of our computer equipment or data or that of any other persons, including without limitation using the service to upload a computer virus or any harmful software application or engage in denial of service attacks

    除本協議及法例許可者外,閣下或任何人士不得顛倒計、將吾等之任何內容拆離或解裝或傳送軟體而導致吾等之電腦或數據遭受破壞或出現故障,包括但不限於使用服務上載電腦病毒或任何有害軟體應用或參與服務攻擊之事宜;
  7. As ma ' s we need to identify the cost drivers, in a similar manner as abc costing. these being costs of, capital equipment, volumes of production, down time due to changes in production, wage rates, and rates of rejection due to quality defects

    馬的損害,損害我們必須確定司機的費用,在同樣的abc成本.而這些費用,資本、生產量、降低生產變動由於時間、工資、率因質量缺陷
  8. Whenever we reject the null hypothesis, the conclusion we do accept is called the alternative hypothesis.

    無論何時,無效假時,我們所接受的結論叫做擇假
  9. Ups will not transport any goods that are prohibited by law or regulation of any federal, state or local government in the origin or destination countries, or that may breach any applicable export, import or other laws or endanger the safety of our employees, agents and subcontractors or the means of transportation or, that in our opinion, soil, taint or otherwise damage other goods or equipment or that are economically or operationally impractical to transport

    Ups運輸所有來源地或目的地國家的任何聯邦州政府或當地政府法例禁止的貨件,或違反任何適用的出口進口或其他法例,或危及我們員工代理及轉包商運輸工具的貨件,或對我們來說,會弄臟污染或損壞其他貨件或,或實際上無法進行運輸的貨件。
  10. A9. there could be several reasons that an application for a qpme label could be refused. the possible ones are that equipment certificates attached do not meet with eu or mlit japanese standards ; the output power of excavator, loader and dozer is equal to or more than 500 kw or that of generator is equal to or more than 400 kw ; insufficient or missing information in the application form ; or the supporting documents are missing or incomplete

    答9發出優質機動標簽的理由有多個,最常見的是1有關機動的證明文件不符合歐盟和日本國土交通省兩國制度的相關要求2挖土機搬土機及推土機的輸出功率相等或高於500千瓦,而發電機的輸出功率則相等或高於400千瓦3申請表所載資料不足或有缺漏或4證明文件有缺漏或不全。
  11. The key obstacles : not only must the system provide a penetrating view of “ denied ” territory from a great distance, well above where an airplane can fly, but it must also be integrated with existing communications equipment so that information can be instantly relayed to forces on the ground and in the air

    最主要的障礙是,這個系統不僅必須從遠遠高於飛機飛行高度的位置對「進入」的領土進行遠距離透視,而且還必須與現有的通訊整合,使信息能夠立即傳送給地面和空中部隊。
  12. By maintaining a low false reject rate ( the probability that the device will reject an authorized user ), while maintaining a high deterrent to unauthorized access, rsi ' s units process large numbers of people with minimal delays

    由此維持很低識率(可能一個授權的用戶) ,當維持很低誤識率, rsi的最小延誤大數量人的處理時間。
  13. The netscreen - idp 100 also successfully passed all device integrity - checking tests, demonstrating that it can withstand potential attempted compromises and denial of service attacks aimed at the system itself

    Idp 100也成功地通過了與各種的集成檢測測試,並證明了它能夠抵擋潛在的危險攻擊和針對自身的服務式攻擊。
  14. Seller expressly disclaims all warranties, express or implied including any warranties of merchantability or fitness for a particular purpose, with respect to equipment, including repair and replacement parts not manufactured and designed by seller even though such equipment and / or parts may be sold by, or operated with equipment designed and manufactured by seller

    對于非賣方計、製造的,包括維修或更換部件,即使此類和/或部件由賣方出售或此類和/部件與賣方計、製造的同時運行,賣方承擔所有明確或隱含但包責任,其中包括對任何用於某一特定用途的適銷性或適用性的擔保。
  15. The guests are request to obey the direction of attendants when you attend any activities, and accept the inspect when it is necessary

    遊客參與游樂項目,必須聽從現場工作人員的指揮,按要求的事項乘坐使用。接受保險裝置檢查。違反要求的將被乘坐。
分享友人