進行全備份 的英文怎麼說

中文拼音 [jìnhángquánbèibīn]
進行全備份 英文
fully backup
  • : 進構詞成分。
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ動詞1 (具備; 具有) have; be equipped with 2 (準備) prepare; provide with; get ready 3 (防備...
  • 進行 : 1 (開展) be in progress; be underway; go on 2 (從事) carry on; carry out; conduct; make 3 (...
  1. The ultimate aim is to create a fully electronic environment which offers an alternative to the documents in use for international trade., . as long as our country is concerned, althrough we have set down some laws on e - commerce security, there are a lot of problems for us to solve

    三是bolero系統意圖建立一個電子交易社區,通過身認證,建立社區成員間的信任關系,保證成員間的電子商務能夠得到順利,具有較強的安性和獨立性,我國具條件的外貿和航運企業可以考慮加入。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立等;確定系統管理員的權力和責任,包括物理安、系統配置、帳戶設置及使用權限、口令管理、審計和監控、以及個人隱私等方面;一般性的安防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安、數據庫系統安、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安事故,如何協調解決安事故,如何避免安事故再次發生。總之,本文對信息系統安防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Back up often and keep your backups physically secure

    經常,並將存放在安的場所。
  4. We do data backup ' s but we can ' t really assure you for the data

    我們數據但不能絕對保證你的數據安
  5. We investigated the architectures of three typical computer fault - tolerant systems such as triple modular admixture redundancy system, buildup dual computer comparing system and dual computer comparing system with hot standby, and descript them with the markov model. the reliability and safety model of these fault - tolerant systems are acquired through theoretical analyzing and calculating. with analyzing, we defined the systems " task interval available time section in reason, compared their reliability and safety and evaluated their reliabilities

    具體針對三模混合冗餘、增強型雙機比較及帶熱的雙機比較三種典型體系結構的計算機容錯系統了研究,統一用馬爾可夫模型描述,通過理論分析和計算,獲得各體系結構容錯系統的可靠度與安度的數學模型;通過分析,合理定義了系統的任務工作期區間,並在此區間上比較分析了各體系結構容錯系統的可靠度與安度情況,從而對各系統的可靠性指標了評價;根據上述三種系統的數學模型,在考慮系統故障覆蓋率與維修率兩個參數對系統可靠度與安度影響的情況下,用matlab語言編制了計算機模擬程序。
  6. Updated message management adds practical features such as imputing, exporting, backup and search. all chatting records and user configuration files are optimized in their storage mode to facilitate users uploading

    方位增強的消息管理器,增加了導入導出查找等實用功能,所有聊天記錄和用戶配置文件都了優化存儲,方便用戶上傳攜帶
  7. Database plays a vital role in nmis, therefore the quality of database effects directly on the success of nmis or not. the whole process of database " development is described in detail. meanwhile, we also deeply discuss the databases " performance optimization, backup and restore scheme, the strategy of safe control, data exchange in new and old central blood mis and so on

    數據庫是整個mis大廈的基石,其設計的好壞直接影響到mis設計的成敗,因此,如何設計一個性能優良的數據庫便顯得至關重要,本文詳細地描述了山西省采供血網路管理系統數據庫的設計以及對其規范化和非規范化處理的整個過程,此外,文章對數據庫的性能優化、與恢復方案、安控制策略、中心血站新舊mis系統的數據交接等方面也了較為詳盡的分析和討論。
  8. The state - owned commercial bank having environmental conditions, we must carry out the reform greatly, step by step, in line with the successful experiences of the reform of the state - owned enterprises, taking the diversified network type of ownership of share structure as a basic model. we should build large, comprehensive, multinational group companies operated by transtrading with banking as their main business, gradually make the state - owned commercial bank suitable for the international financial system to strengthen their competition

    現階段對國有商業銀制改造已不存在理論和政策障礙,環境條件具,應借鑒國企改革成功經驗,大膽改革,分步實施,以多元化網路式股權結構作為基本模式,培育以銀業為主、跨業經營的大型綜合性跨國集團公司,逐步使國有商業銀與國際金融業制度對接,以面增強其競爭實力。
  9. To promote our state - owned enterprise to reform and develop actively through setting up the modern enterprise system ; in addition, share system is an inevitable tendency of enterprise reform. to speed the adjustment and the reform of the ownership system in order to set up a system which include many ownerships circling on the public ownership. to open market further, build and better market system into a unifying, fairly competitive and orderly standard way

    本文認為要做到以下幾個的制度創新:依靠改革拉動投資;依靠改革創造需求;積極推動國企改革與發展,建立現代企業制度,並按股制的要求對國有企業產權改革;加快所有制結構調整和改革,建立和完善以公有制為主體,多種所有制並存的制度;一步開放市場,建立和完善國統一、公平競爭、規范有序的市場體系:加強和改善宏觀調控;建立符合國際規范的經濟貿易體制和靈活的宏觀經濟管理機制,為加入wto做好制度準
  10. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀網路信息系統物理安、網路安、系統安、應用安、用戶安等方面出發,採用了成熟、適用的安技術措施,包括;身認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安審計、防黑客入侵、同城災難等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安職責了明確的界定;在管理體繫上,依據法律法規,制定了之有效的規章制度。
  11. The results were summarized as follows : ( 1 ) diamond - like carbon films could be fabricated by plasma source ion implantation ; it was found that different parameters such as the negative voltage, frequency, gas flux influenced sp3 bond ratio of dlcs, the paper described the effect in details and showed that diamond - like carbon films with increasing negative voltage, reducing frequency, appropriate gas flux got high proportion of sp3 bond ; dlcs prepared by psii contained a good deal of sic, the composition affected its properties ( such as the films hardness ) ; psii method could offer good adhesion to dlcs, but it caused the surface morphology to become asperity

    研究結果表明: ( 1 )用方位離子注入技術能夠制出類金剛石膜。在方位離子注入技術中,不同的偏壓、頻率、氣體流量都對薄膜中sp ~ 3鍵比例有所影響,文中對具體的影響了分析,發現偏壓增加、頻率降低和適中的氣體流量可以制出含sp ~ 3鍵較多的類金剛石膜;同時發現用方位離子注入技術制的類金剛石膜含有大量的sic成,這對薄膜的性能(例如硬度)影響很大;用方位離子注入制的薄膜其結合力得到增強,但薄膜的表面形貌差。
  12. Simple enough to destructively partition an existing drive, then reinstall os x to one of those new partitions ; but doing this means losing your existing data and system configuration backup restore might work, but can be tricky to get right

    ,破壞性地對已經存在的驅動器分區,再將os x重新安裝到其中一個新分區上是很簡單的;但是這樣做也意味著丟失了當前的數據和系統配置(/恢復可能會有幫助,但很難面恢復) 。
  13. The paper make certain the main work items and the relation of sequence preference. according to agricultural demand and the agricultural machinery in existence, it optimiz and equipping the agricultural machinery of zhengzhi village in term of main work items by the methods of expert recommendation and test and antitheses. at last, on the basis of optimizing and equipping, it bring out the model of rice mechanization and industrialization of zhengzhi village. this thesis comprehensively appraises the model, the conclusion is that favorable economic and social benefits can be received by setting up agricultural machinery joint share company

    文分以下幾個部分:首先,對政治村農業生產系統了環境辯識和問題診斷,明確了該村農業系統發展的優勢和基本問題,為農業產業結構調整指明了方向;其次,分析了該村水稻生產的工藝過程,確定了主要作業項目及優序關系,並根據農藝要求及該村現有的農業機械,運用試驗對比法和專家推薦法對政治村的農業機械按主要作業項目優化配;最後,在優化配的基礎上,提出了政治村水稻機械化產業化經營的模式,並對該經營模式了系統的綜合評價,得出結論:組建農機股作業公司可獲得良好的經濟效益和社會效益。
  14. The entire notion of online backup in oracle is that as users carry out transactions, all changes made to the database, either committed or uncommitted, are stored to the redo log buffer and subsequently are written to the online redo log files by the lgwr process

    在oracle中,聯機部思想是,當用戶執事務時,將對數據庫所做的所有更改(提交或未提交的)都存儲到重做日誌緩沖區中,隨後由lgwr程把它們寫到聯機重做日誌文件中。
  15. The study involved a nationwide telephone survey of 2, 581 respondents with researchers then examining the data and preparing the report which appears in the october issue of cns spectrums : the international journal of neuropsychiatric medicine

    這項研究包括對國2581名被訪者電話調查,然後由研究人員分析數據,準發表於10月號《國際神經精神病醫學雜志》上的分析報告。
  16. The study involved a nationwide telephone survey of 2, 581 respondents in the spring and summer of 2004 with researchers then examining the data and preparing the report which appears in the october issue of cns spectrums : the international journal of neuropsychiatric medicine

    這項研究包括在2004年春夏對國2581名被訪者電話調查,然後由研究人員分析數據,準發表於10月號國際神經精神病醫學月刊上的分析報告。
  17. Full - text index modified after transaction log backup

    >對事務日誌文索引被修改
  18. Secondly, the integer solution of government network security, which is classified as physical security, access controlling, communication secret, data protection, security audition, virus protection, security backup and security management, etc are analyzed. lastly, an integer solution of a unit ’ s network security sichuan through the analysis of risk and acquirement as an applying instance are briefly designed in the paper. the integer solution of government network security, which is analyzed in the paper, is essentiality to the aspect of security, integrality, usability, controlling, auditing of network system, also can be used to help building e - government in other cities

    首先對電子政務系統網路的安了分析,其中包括網路的安風險分析、安需求分析、安目標分析,以及電子政務的安策略分析;然後,從物理安、訪問控制、通信加密、數據保護、安審計、病毒防護、安和安管理等方面對電子政務網路安解決方案了分類研究;最後,作為一個研究應用工程實例,通過對綿陽市電子政務信息網路的風險分析及安需求分析,對其網路安的整體解決方案了詳細設計。
  19. This dissertation has studied some key technologies in the field of dpcs on av. first, this dissertation gives a summarize about the development status of the alteration and upgrade in the tv broadcasting system, in which a serious of key technologies of dpcs, including digital compression codec technology, large capacity storage and fault - tolerance technology, network connection technology, and systems security mode, are stressed

    論文首先對視頻廣播業數字化改造的現狀與趨勢綜述,重點討論了數字播控所涉及的若干關鍵技術的概況,包括數字壓縮編解碼技術、海量存儲與容錯技術、網路互連技術和系統安播出技術等,並對電視節目的制、編、播一體化網路展望。
  20. Supporting system backup and quick recovery, encrypting anf backuping entirely for system s data and allocation

    支持系統及快速恢復,對于系統的數據和配置加密完
分享友人