非法機密 的英文怎麼說

中文拼音 [fēi]
非法機密 英文
dark blue
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 非法 : illegal; unlawful; illicit
  • 機密 : 1 (重要而秘密的) secret; classified; confidential; privacy 2 (機密的事)secret:泄漏機密divulge...
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算網路傳輸數據日益增加,其中包含了各種信息(例如軍事信息、商業信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被竊取和修改,因而極大地限制了計算網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加措施
  2. The administrative authorities for copyright and for industry and commerce at various levels should cooperate closely, intensify their inspections and deal seriously with piratical acts of illegally copying audio - visual products and computer soft - ware

    各級著作權行政管理部門和工商行政管理部門要切配合,加強檢查,嚴肅處理復制音像製品和計算軟體的盜版行為。
  3. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算輸出的控制信號加處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片尋址控制部分。單片尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對授權用戶或者用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  4. Cia spokeswoman disputes that the agency is trying to keep information from the public, telling voa that it works closely with the national archives and has released 26 million pages of declassified documents to the archives since 1998

    一位中情局的女發言人否認中情局試圖阻止公眾了解這些信息的說,她在voa聲稱,中情局與國家檔案館緊合作,自1998年已經向國家檔案館提供了26 , 000 , 000頁的文件。
  5. A cia spokeswoman disputes that the agency is trying to keep information from the public, telling voa that it works closely with the national archives and has released 26 million pages of declassified documents to the archives since 1998

    一位中情局的女發言人否認中情局試圖阻止公眾了解這些信息的說,她在voa聲稱,中情局與國家檔案館緊合作,自1998年已經向國家檔案館提供了26 , 000 , 000頁的文件。
  6. Divulging the secrets of military installations, or stealing, spying on, buying or illegally providing secrets on military installations for agencies, organizations or individuals abroad

    三)泄露軍事設施秘的,或者為境外的構、組織、人員竊取、刺探、收買、提供軍事設施秘的。
  7. You acknowledge and confirm that the internet is not a secure medium where privacy can be ensured, and that complete security and confidentiality over the internet is not possible at this time

    閣下表示知悉並確認,網際網路並可以確保穩私的安全媒介,且目前網上無做到完全安全及保。本公司並不能保證使用本網站之性。
  8. Shrimp farms have resulted in social conflict throughout the developing world, hundreds of thousands of people have been displaced, people have died in at least 11 countries over 150 in bangladesh alone, illegal land seizure is common, and children risk their health and education working in unsanitary processing factories

    度養蝦場在第三世界引發社會沖突,萬千人民的生計被剝奪,至少11個國家的人民在沖突中死亡,單在孟加拉,死亡人數已高達150人。侵佔土地事件無日無之。為了討生活,小童被迫犧牲健康和學習會,在衛生條件惡劣的加工工場中幹活。
  9. Illegal pyramid selling is connected to some unhealthy culture, certain period of development in economy, certain defects in some people, lag in legislation and no - administration

    傳銷具有其內在的生成制,它與我國的某些文化陋習、我國所處的特殊經濟發展階段、某些特定群體的人性弱點、立滯后、行政不作為緊相關。
  10. Visa applications for persons to study or work in certain sensitive scientific and technical fields are also subject to an interagency clearance in washington, d. c. since 1998, this clearance process has been used to screen against the illegal transfer of technology

    某些簽證申請者所學習或研究項目含有高度的科學與科技領域,也需要華盛頓政府部門的批準。自1998年,批準程序是?了防止轉移科技。
  11. Not discuss with or disclose to any third party any findings or confidential information relating to any assessment activity unless required by law or with written consent of both hkas executive and the assessed organisation

    不把任何和評審工作有關的結果或資料向第三者披露或與之進行討論,除例規定或獲得香港認可處執行關及接受評審構的書面同意。
  12. After deeply studying all kinds of problems of current actualization methods, we put forward to a new actualization method of the technology of physical isolation on the base of cpld. we make a lot of research on data encryption and describe the design method of the encryption chip on the base of lfsr ( linear feedback shift register ). after putting forward to the whole design procedure, we design an encryption chip on the base of lfsr, which can provide the high - quantity data stream of encrtption

    在深入研究了常見物理隔離技術實現方案中存在的各種問題后,提出了一種基於cpld的全新實現方案;同時,對于存儲信息的加也進行了研究,詳細闡述了基於移位寄存器的線性組合序列碼的設計方,提出了完整的設計流程,並設計了一個基於fpga的線性組合反饋序列碼晶元,該晶元能提供高質量的偽隨鑰流。
  13. The bureau works closely with mainland and overseas agencies to contain the activities of hong kong - connected syndicates operating in other jurisdictions. it also investigates money laundering and terrorist financing

    該科亦與內地和海外執關緊合作,遏止與香港有關的集團在其他司管轄區的活動。
  14. The bureau takes direct enforcement action against criminals operating within the hksar and works closely with mainland and overseas agencies to contain the activities of hong kong - connected syndicates operating in other jurisdictions

    該科除直接採取執行動打擊香港的罪犯外,亦與內地和海外執關緊合作,遏止與香港有關連的集團在其他司管轄區的活動。
  15. Whoever steals, spies into or buys military secrets for or illegally offers such secrets to the agencies, organizations or individuals outside the territory of china shall be sentenced to fixed - term imprisonment of not less than 10 years, life imprisonment or death

    為境外的構、組織、人員竊取、刺探、收買、提供軍事秘的,處十年以上有期徒刑、無期徒刑或者死刑。
  16. Article 111 whoever steals, spies into, buys or unlaw - fully supplies state secrets or intelligence for an organ, organization or individual outside the territory of china shall be sentenced to fixed - term imprisonment of not less than five years but not more than 10 years ; if the circumstances are especially serious, he shall be sentenced to fixed - term imprisonment of not less than 10 years or life imprisonment ; if the circumstances are minor, he shall be sentenced to fixed - term imprisonment of not more than five years, criminal detention, public surveillance or deprivation of political rights

    第一百一十一條為境外的構、組織、人員竊取、刺探、收買、提供國家秘或者情報的,處五年以上十年以下有期徒刑;情節特別嚴重的,處十年以上有期徒刑或者無期徒刑;情節較輕的,處五年以下有期徒刑、拘役、管制或者剝奪政治權利。
  17. The proposals in respect of the unauthorized disclosure of state secrets are consistent with this principle. the categories of information to be protected are specifically set out and are narrow

    有關披露國家的建議符合這項原則,具體訂明了受保護的資料類別,而且涵蓋范圍狹窄。
  18. Article 32. persons who steal, spy on, buy or illegally provide state secrets for institutions, organizations and people outside the country shall be investigated for criminal responsibility in accordance with law

    第三十二條為境外的構、組織、人員竊取、刺探、收買、提供國家秘的,依追究刑事責任。
  19. Best mind control information document : a declassified cia mind control document describes an experiment involving two women with relevance to the creation of unsuspecting assassins : " miss [ whited out ] was instructed ( having previously expressed a fear of firearms ) that she would use every method at her disposal to awaken miss [ whited out ] ( now in a deep hypnotic sleep )

    最好的精神控制信息文件:一份已的cia精神控制文件,描述了一個實驗,它捲入了2個女人,與建立一個毫不猶豫的刺殺有關: 「 [空白]小姐,曾經表示過她害怕槍支,被命令,她要用任何方盡她所能去喚醒[空白]小姐(現在正處于深度催眠睡眠中) 。
  20. Today, oop and com technique is used widely in software area. in this paper, on the basis of nonlinear transient electromagnetic field analysis, oop technique is applied to build the basic class library of machine, and the store of large sparse matrix was combined with related algorithm closely, which save the cpu time obviously

    目前面向對象編程技術( oop )和組件技術( com )已在軟體領域得到廣泛應用,本文在進行線性瞬態電磁場理論分析的基礎上,採用oop技術,進行了電求解的基本類庫的構建,將大型稀疏矩陣的存儲與有關演算耦合,顯著提高了運算速度,並形成了用於求解線性瞬態電磁場的軟體包。
分享友人