access controls 中文意思是什麼

access controls 解釋
存取監控
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • controls : 操縱件
  1. The central control room of the branch is located in the bank of communications plaza in the lujiazui, shanghai, which adopts the xbrother developed professional security and facility control system which monitors and controls 10 subsystems in the central control room, including : the ups control system ; the coulometer control system ; the leaking control system ; the temperature and humidity control system ; the air conditioning control system ; the video surveillance system ; the sensor of in out water temperature control system ; the access control system ; the switch control system and ; the fire alarm system

    交通銀行機房位於上海浦東新區陸家嘴金融中心的交銀金融大廈內,其機房監控系統採用我司自主研製的專業機房監控系統。對機房內的ups監控系統電量儀監測系統漏水監控系統溫濕度監控系統空調監控系統視頻監控系統進出水溫傳感器監測系統門禁監控系統開關狀態監控系統消防監控系統等10個子系統進行集中監控,對所有的設備和系統進行工作狀態運行參數報警處理等監視和管理。
  2. Hotel kunlun s guestrooms and suites feature the following amenities and services : high - speed broadband internet access international domestic direct dial fold - out make - up shaving mirror coffee tea - making facilities electronic safe mini bar satellite cable television voice mail bathrobe slippers hairdryer wake - up calls room service bed - side control panel in - room temperature controls shoeshine service

    昆侖客房和套間提供下列物品及服務:高速寬頻上網國內外直播電話折疊式化裝鏡電子保險箱小酒吧有線衛星電視語音信箱浴衣拖鞋吹風機叫醒服務房間送餐服務床頭控制面板溫度調節擦鞋服務
  3. Internet security - controls user access to sites or internet, can give different access privileges

    因特網安全-控制訪問站點或網路的用戶,可授予不同的訪問權限。
  4. The scope of china s accession agreement provides u. s. businesses the opportunity for significantly greater market access to a broad range of goods and services in sectors that are of key importance to u. s. businesses. first, china has committed to reducing or eliminating tariffs, quotas, price controls, and other barriers on more than 7, 000 agricultural and industrial products

    中國的加入協定涉及的范圍向美國企業提供了機會,極大地擴大了美國工商界關鍵部門一系列廣泛的商品和服務的市場準入程度。首先,中國已承諾削減或撤銷7000多種農業和工業產品的關稅、配額、價格管制和其他壁壘。
  5. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web數據庫訪問技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web數據庫訪問方案的優缺點,結合在三層次的c / s系統中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致數據訪問技術,利用ado控制項,結合當前的asp語言,底層數據庫採用了sqlserver7 . 0的存儲過程技術,設計了一種自己的web數據庫訪問方案,即在browser / server系統當中,客戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接數據庫,數據的處理利用了存儲在數據庫內部執行,實現對後端數據庫的高效訪問,並且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路數據流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。
  6. Controls give developers access to the powerful features of the j2ee platform ( security, transactions, asynchrony ) in a simple, graphical environment with methods, events and properties

    控制項使程序員可以在簡單、圖形化開發環境中用方法、事件和屬性訪問j2ee開發平臺的強大功能(安全、處理、異時) 。
  7. How to : create access keys with windows forms label controls

    >如何:使用windows窗體label控制項創建訪問鍵
  8. Research and application of dynamic access controls

    動態訪問控制技術的研究與應用
  9. Install the unit so that the monitor when opened up will not block access to the hazard switch or other important controls

    安裝本裝置,使監視器打開時不應妨礙危急開關或其它重要控制部件的使用。
  10. Dimension data access controls which dimension attributes can be accessed by members of a role

    維度數據訪問權限控制角色成員可以訪問哪些維度屬性。
  11. The authors want mandatory access controls in the linux kernel and that s the idea behind se linux

    完成上述操作后,必須重新引導才能正確地安裝這些服務。
  12. The mis system administrator shall be responsible for the administration of access controls to all company computer systems

    Mis管理員負責進入所有公司計算機系統的進入密碼控制監督。
  13. Remote access controls logins from remote servers

    控制遠程服務器的登錄。
  14. Information maintenance module is based on the client / server structure. according to the analysis of the requirement of the fire - fighting bureau, make the daily grind be standardization and by using network application program deal with all kinds of operations logical and access controls and complex logical rules

    信息維護模塊採用client server體系的兩層應用結構,根據軟體工程的開發標準,分析公安消防部隊幹部信息管理實際需求,建成規范化的、標準化的信息管理系統。
  15. Customers concerned about the security of their information in these systems should secure it by activating passwords and using physical access controls

    如果客戶關注系統中信息的安全,就應設置密碼,並將系統置於限制進出的地點。
  16. Some information about ups customers and their packages is stored in shipping systems located on customer premises. customers concerned about the security of their information in these systems should secure it by activating passwords and using physical access controls

    有些客戶資料及包裹資料會存儲在客戶地點的遞送系統中,若客戶關注系統中資料的安全,應設置密碼,並將系統置於限制進出之地點。
  17. The encrypting file system ( efs ) in windows 2000 complements existing access controls and adds a new level of protection for your data

    Windows2000的加密文件系統( efs )補充了現有的訪問權限控制,並為數據添加了一級新的保護措施。
  18. For the first time, the modem idea combines the two main techniques to make a publish system in www world be enable. the publishing information that is formed by java servlets which realize the combination of information node document and structure document and access controls dynamic returns to the browser. dynamic the content is refreshed with script tag or function

    信息發布模塊基於web的browser server體系的三層或多層應用結構,採用了java組件技術同domino群件技術結合開發方法,實現公安消防部隊信息的動態發布,信息內容的收集整理和起草編輯功能,發布信息的安全管理和控制功能,提供網路用戶安全的訪問控制,建成動態的、結構化的信息發布平臺。
  19. There will be several different security domains, each of which have different access controls and restrictions

    存在幾種不同的安全領域,每個領域都有不同的訪問控制和限制。
  20. In data security, an unauthorized user who tries to gain entry to a computer network by defeating the system ' s access controls

    在數據安全領域,一種未經授權、又企圖躲過系統存取控製程序的檢查而進入計算機網路的用戶。
分享友人