access address 中文意思是什麼

access address 解釋
存取地址
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • address : n 1 (信上的)稱呼,姓名;地址。2 致辭;寒喧;演說;正式請願。3 談吐,風度。4 〈pl 〉 求愛,獻殷...
  1. To our access to information officer at the following address

    向公開資料主任索取。
  2. Finaiiy, the paper also has introduced the virtua1 worid of windows rs ; j { ? # - - lase / and how to map the 1ogica1 address to physica1 address in protected mode and the interrupt mechanism of protected mode, then the paper has i11ustrated that it is necessary to write virtua1 device driver ( vxd ) in order to access hardware device from the third leve1

    最後,在介紹了windows的虛擬世界,和在保護模式下如何將邏輯地址映射成物理地址,以及保護模式下的中斷機制的基礎上,闡明了在保護模式下應用程序對硬體設備操作驅動程序的必需的中間橋梁作用。
  3. Basis " orders of sell of access of land of shenzhen special economic zone " the seventeenth regulation, contract of sell one ' s own things should have the following and main provision : ( one ) the full name of bilateral party or name, address ; ( 2 ) a ground date of access of land of sell one ' s own things, area ; ( 3 ) land is used year period reach case stop time ; ( 4 ) the amount of gold of land access sell one ' s own things, money is planted, pay kind and time ; ( 5 ) the time of consign land ; ( 6 ) point of program, municipal design ; ( 7 ) project complete is referred check and accept time ; ( 8 ) municipal facilities form a complete set builds obligation ; ( 9 ) land of use photograph adjacent and viatic limitation ; ( 10 ) the project that builds accessary, add establishment and obligation ; ( 11 ) responsibility of breach of contract ; ( 12 ) party thinks necessary other item

    根據《深圳經濟特區土地使用權出讓條例》第十七條的規定,出讓合同應具備以下主要條款: (一)雙方當事人的姓名或者名稱、地址; (二)出讓土地使用權的宗地號、面積; (三)土地使用年期及起止時間; (四)土地使用權出讓金的數額、幣種、交付方式及時間; (五)交付土地的時間; (六)規劃、市政設計要點; (七)項目竣工提交驗收時間; (八)市政設施配套建設義務; (九)使用相鄰土地和道路的限制; (十)建設附屬、附加設施的項目及義務; (十一)違約責任; (十二)當事人認為必要的其他條款。
  4. It is also possible to set up an authorized access list based on the end user s mac address

    還可以根據最終用戶的mac地址建立一個授權訪問列表。
  5. The globus toolkit has been developed since the late 1990s to support the development of service - oriented distributed computing applications and infrastructures. core gt components address, within a common framework, fundamental issues relating to security, resource access, resource management, data movement, resource discovery, and so forth. these components enable a broader " globus ecosystem " of tools and components that build on, or interoperate with, gt functionality to provide a wide range of useful application - level functions

    Gt globus toolkit是面向服務的分散式計算應用和基礎設施的開發工具,它以上世紀九十年代以來的許多分散式系統和技術為基礎,其中較有影響的是過去十幾年的metacomputing , legion和i - way等創新項目,以及當前的web service ,虛擬機和peer - to - peer架構等技術。
  6. Contact manager using random access file - this is a simple address book that uses random access files instead of a database to store information

    這是一個簡單的地址簿,使用隨機存取文件來代替一個數據庫儲存信息。
  7. Otherwise, the legacy disk access interface is used as a fall - back, and it cannot be used to address any location on the disk higher than the 1023rd cylinder

    否則會使用舊的傳統磁盤訪問介面,而且不能找到任何大於1023的柱面。
  8. Last week, along with secretary of labor elaine chao, i led the president s export council to china to advance economic engagement, expand access for u. s. exports and address areas of trade concern

    一起出訪中國,爭取促進經濟交往,擴大美國對中國的出口,並提出與貿易有關的關注。
  9. The insurance manager further sent both insurance policies to the address of the complainant s friend, without keeping the complainant s policy in a separate envelope, thereby allowing access to the complainant s personal data as contained on her policy to her friend

    保險公司經理其後更把投訴人及其友人的保險單,置於同一信封內,一併寄給投訴人的友人,因而令她的友人得知載于保險單上有關投訴人的個人資料。
  10. Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example, station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address. " see ieee 802. 1x specifications, page 21, section 7. 9, lines 34 - 39, available to link to in the

    在不支持使用安全關聯的共享媒體環境中進行使用eapol的嘗試會導致基於埠的網路訪問控制極易受到攻擊;例如,工作站a只要發出一個使用工作站b的個體mac地址的eapol - logoff包,就能夠在工作站b上掛裝一個成功的拒絕服務攻擊。 」
  11. Introduce the multi - direction accessing schedule named " transparent mapping of the memory address ", which supports the direct access to sram of multi - dsp

    並提出了vvp功能子系統「存儲區地址全透明映射」的多向訪問控制策略,以支持多層次插板模塊。
  12. ? answers : estate business contract ought to have the following article : 1 ? of ? the full name of party or name, address ; 2 ? of ? number of estate right certificate ; 3 ? of ? borderline of the position that estate reposes, area, the four boundaries of a piece of land or a construction site ; the property of access of date of ground of land an administrative unit in xizang, land mixes 4 ? of ? year period ; 5 ? of ? the utility of estate ; 6 ? of ? buy sale price money and terms of payment and date ; the date that pay of 7 ? estate uses ? ; the rights and interests of public share shares 8 ? of ? the right that reachs mutual person is compulsory ; 9 ? of ? responsibility of breach of contract ; 10 ? of ? the settlement of contract dispute method ; the condition of become effective of 11 ? contract reachs ? time ; 12 ? of ? are bilateral think essential any other business

    ?答:房地產買賣合同應當具備以下條款: ? 1 ?當事人的姓名或者名稱、地址; ? 2 ?房地產權利證書編號; ? 3 ?房地產座落的位置、面積、四至界線; ? 4 ?土地宗地號、土地使用權的性質和年期; ? 5 ?房地產的用途; ? 6 ?買賣價款及支付方式和日期; ? 7 ?房地產交付使用的日期; ? 8 ?公用部分的權益分享及共有人的權利義務; ? 9 ?違約責任; ? 10 ?合同糾紛的解決辦法; ? 11 ?合同生效的條件及時間; ? 12 ?雙方認為必要的其他事項。
  13. Abstract : a technical solution for the multi - channel random data stream by tsr receiving programming is presented. details about resident interrupt receiving, data buffer setup, data segment address keeping, buffer read / write operation and program resident / unresident are described , and information process programming with advanced language is discussed. the application of this technique in the control system for the automatic burdening of a cement production line is given. the debugging method and procedure is introduced. source program written in advanced language, include data buffer access and calling are listed

    文摘:給出了一種「多通道隨機數據流的中斷駐留接收技術方案」 ,詳細描述了內存駐留中斷接收、開設數據緩沖區、數據段地址保存、駐留/解除和數據緩沖區讀取,討論了高級語言程序信息處理,舉出了該技術方案在「水泥生產線微機全自動配料測控系統」中應用的實例,介紹了調試方法和步驟,給出了高級語言讀取數據緩沖區數據及調用源程序。
  14. This paper gives the general design of the administration system in the broadband man. it also explains the detail implementation, such as the modules of the traffic accounting and radius ( remote authentication dial in user service ) programs, the control of the layer 2 switch ports, the distribution of ip address, and so on. during the building of the system, we greatly unproved the efficiency of snmp ( simple networks manage protocol ) trap and achieved the access control hi the broadband man

    對以太網方式接入的用戶,利用802 . 1q 、 pvlan (私有虛擬局域網)等新技術實現了用戶數據隔離和安全性保證,並對用戶埠資源進行了統一管理和遠程自動控制,採用snmp (簡單網路管理協議)採集埠流量的方式實現了以太網用戶的按流量計費,詳細設計了具體的流量採集程序模塊組成和各部分的功能。
  15. For this reason, unauthorized access to sensitive data is a security risk that you must address

    出於這個原因,對敏感數據的未授權訪問是您必須解決的安全隱患。
  16. The average ipc speedup is 5. 9 %. 2. adaptive stack cache with fast address generation policy is proposed by investigating stack access behavior of programs

    2 .通過對棧訪問行為的分析,提出一種棧高速緩存方案? ?快速地址計算的自適應棧高速緩存組織方案。
  17. Adaptive stack cache with fast address generation policy decouples stack references from other data references, improves instruction - level parallelism, reduces data cache pollution, and decreases data cache miss ratio. stack access latency can be reduced by using fast address generation scheme proposed here

    該方案將棧訪問從數據高速緩存的訪問中分離出來,充分利用棧空間數據訪問的特點,提高指令級并行度,減少數據高速緩存污染,降低數據高速緩存失效率,並採用快速地址計算策略,減少棧訪問的命中時間。
  18. Object model guard prompts users with a dialog box when an external program attempts to access their outlook address book or send e - mail on their behalf, which is how insidious viruses such as iloveyou spread

    當外部程序試圖訪問用戶的outlook通訊簿或代替客戶發送電子郵件時(陰險的「愛蟲」病毒就是以這種方式傳播的) ,對象模型保護機制將通過對話框把這種情況提示給用戶。
  19. At the early age of embedded system history, many real - time operating system use multi - task sharing single address space mode, which means kernel and application run in the same priviledge and application can access the whose address space with full pomission, for the limited performance and hardware resource

    在嵌入式系統發展早期,由於硬體資源和性能有限,很多實時操作系統採用的是單地址多任務空間模式,即內核和應用都運行在同一特權級,應用程序可以無限制的訪問整個系統地址空間。
  20. For example, if an exchange administrator sets outlook to automatically deny all attempts to access address information using the outlook object model, then outlook will not allow the previous code example to access the

    例如,如果exchange管理員將outlook設置為自動拒絕所有試圖使用outlook對象模型來訪問地址信息的操作,則即使前面的代碼示例使用受信任的
分享友人