access codes 中文意思是什麼

access codes 解釋
密碼功能
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • codes : 規范
  1. We need your milsat access codes. you either give it to us now,

    我們需要你的milsat通行密碼。你要麼現在給我們,
  2. Access codes for the operational archives

    進入任務檔案的編碼
  3. You can screen for denied parties, check import compliance, harmonise tariff codes, estimate landed cost and access shipping forms

    您可以篩除被拒貿易方核查遵守進口規定情況協調關稅號碼估計登陸費用,以及使用托運表格。
  4. And, at least in japan, using phones to access additional information is already pretty commonplace, with cellphone - readable bar codes used to provide links to bus timetables, product and allergy information and details in magazine and billboard advertisements

    不過?至少在日本?用手機來獲取更多信息的做法已經相當常見?一些手機通過讀取代碼能鏈結到公交時刻表、產品資訊、雜志的詳細內容以及路牌廣告等。
  5. Manage the movement of international goods in a timely, efficient, and compliant manner. you can screen for denied parties, check import compliance, harmonize tariff codes, estimate landed cost, and access shipping forms

    有效,快捷及稱心地管理國際貨件的運送過程,您可以流覽拒絕名單,檢查入口狀況,查閱統一關稅編碼,預計登陸稅及下?托運表格。
  6. Attackers know that the simplest way to break into a computer system is not to " crack " passwords or access codes

    攻擊者知道,侵入計算機系統的最簡單的方式不是「破解」密碼或訪問碼。
  7. Conventional detector ( single - user matched filter ) distinguishes each user by the crosscorrelation of their spread - spectrum codes. in practice, however, its performance is much deteriorated due to the existence of noise in channel and strong multi - access interference, i. e. near for effect. a new method using independent component analysis is proposed in this paper. the - received energy of signals is controlled effectively, thus the near - far effect is overcome as much as possible ; moreover, the effect that noise imposed on the detector is mostly reduced. simulations verify the effectiveness of this method

    傳統檢測器(單用戶匹配濾波)利用擴頻碼之間的互相關特性來區分各用戶信號.而在實際應用中,通道噪聲和近距離用戶對遠距離用戶的強多址干擾即遠近效應,使得接收機的性能受到很大影響.本文將獨立分量分析法引入傳統接收機,有效控制接收信號的能量,從而極大地提高了接收機的抗遠近性能,同時噪聲的影響被盡可能消除.模擬結果表明了該方法的有效性和可行性
  8. Suitable methods of deterring unauthorised entry of data include the use of keys, pass cards, personal codes and restricted access to computer terminals

    應當採取措施來杜絕未經許可輸入數據、鑰匙的使用、密碼卡、個人密碼和限制計算機終端的訪問。
  9. The 3rd generation ( 3g ) mobile communications system and part of the 2nd generation ( 2g ) mobile communications use pn sequences or walsh codes as spread codes, and their system capacities are limited by the multiple access interference ( mai ) from asynchronous transmitted signals

    採用pn序列和walsh碼進行直序列擴頻的第三代和部分第二代cdma移動通信系統,其容量受到異步傳輸時多址干擾的限制,其數據率因在n個碼片的時間內只能傳輸一個數據符號而受限。
  10. The mis manager will maintain a list of administrative access codes and passwords and keep this list in a secure area

    Mis經理負責維護一份行政進入代碼和密碼的清單並保存該清單于安全區域。
  11. The 1998 child online protection act would have required adults to use access codes or other ways of registering before they could see objectionable material online, and it would have punished violators with fines up to $ 50, 000 or jail time

    1998年的兒童在線保護法案要求成人在瀏覽令人反感的內容前輸入密碼或採用其他注冊方法,對違反者可以處以多達5萬美元罰款或入獄服刑。
  12. If the correlation of fferent spread spectruin codes is not zero, ther would be multi - access interference. additionally, cdma conunwhcation system is a intefference - limited system, tha is to say that the interference directly influences the capabi1ity of dris system and the qos of the user in the system. in order to rid the nearfar problem and muti - access intehae, power control plays an impohan role

    若用戶間的互相關不為零,則會導致多址干擾的產生;另一方面,由於cdma系統是干擾受限的系統,即干擾程度直接影響到系統軟容量和系統內用戶服務質量的高低,為了有效地克服遠近效應和多址干擾的影響,採用一定的功率控制技術則顯得尤其重要。
  13. If the assigned spreading codes are orthogonal and signals are transmitted through a flat fading channel, there will be no multiple access interference ( mai )

    如果所有用戶採用理想正交擴頻碼並且通過同步平坦衰落通道,系統中將不會存在多址干擾( mai : multipleaccessinterference ) 。
  14. When ccc are used for spreading codes, multiple access interference ( mai ) is zero theoretically even under asynchronous transmission. if cc / ccc are used for spreading codes, one data symbol could be transmitted during one - chip duration

    若採用互補碼作為擴頻碼,理論上而言,不管在同步模式還是異步模式下,都不存在多址干擾;又可用特殊的調制方式做到在1個碼片的時間內傳輸一個數據符號。
  15. Usb tokens rather than typing in passwords to access a system, users can rely on tokens that can be plugged into usb ports, putting token codes directly into the user ' s computer

    萬用串列總線表徵並非在密碼中打字存取一個系統,使用者能仰賴能被將萬用串列總線港口插電,進入使用者的計算機之內直接地放表徵密碼的表徵。
  16. Only russian military officials have access codes to those. hence the word access

    只有俄國的軍官才有通行密碼。因此才會叫「通行」 。
  17. Audit codes identify events that contain auditable information such as login attempts, access security violations, and authorization violations

    審核代碼標識包含可審核信息的事件,這些信息包括登錄嘗試、違反訪問安全性和違反授權等等。
  18. 3 the company shall provide the client with access codes and guarantee security and confidentiality of the access codes

    3公司給顧客提供進入密碼並保證保守進入密碼的秘密。
  19. Contact them. i want access codes

    呼叫他們,我要確認密碼
分享友人