backup data 中文意思是什麼

backup data 解釋
備查資料
  • backup : n. 后補物,替代物,備用物;支持;阻塞;【計算機】備份。2. adj. 后補的,副(手)的,替代的,備用的;支持性的;伴奏的(a back pilot 副領航員,助航員)。
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. Throughout the history of gyro testing on servo runs, these timers have proven irreplaceable for backup data behind far more complex timing devices.

    從整個伺服運轉的陀螺試驗過程來看,證明不能用后來更復雜的記時裝置代替這種記時器來得到輔助數據。
  2. For the first sunday, a base level 0 backup is taken, all data blocks are copied

    對于第一個星期天,採用基本級別0備份來復制所有數據塊。
  3. The second part introduces the hardware design of the whole instrument in the first period, which is based on the isa interface, hi this period the equipment precedes its operation and safe detection mainly by the isa interface card. also the patients " data, the setting of the blood flux and the display and backup of data are all executed on the computer

    然後介紹了整臺設備在第一階段基於isa介面硬體設計,此階段儀器主要是通過isa介面卡來控制設備的運行與安全檢測,其病人數據資料,血液流量設置,數據的顯示以及數據的備份全部在計算機上操作。
  4. Can control the data backup technique, use the saving equipments of network to carry on the fast network disaster and machines breakdown ' s instauration

    掌握數據備份技術,能使用網路存儲設備進行快速網路災難與機器崩潰恢復。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. If data bulk is very great, can reserve base expresses backup, reshipment hind undertakes extracting, ( professional personage ability undertakes this, discreet ) can reduce a few workload

    假如數據量很大,可以吧庫存基礎表備份,重裝后進行提取, (這個是專業人士才能進行的,慎重)可以減少一些工作量。
  7. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終端的晶元模擬網路實驗系統應用程序為前臺;中間層為dcom應用程序服務器,負責處理前臺應用程序與后臺數據庫的通信和數據傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連接,在中間層操作數據即可,與后臺數據庫的連接和操作由應用程序服務器來統一管理操作。后臺數據庫只負責數據的存取操作。本論文實施的晶元模擬網路實驗系統模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,數據總線,地址總線和控制總線,及其它相關晶元。
  8. Press release : data backup for the year 2000 problem

    新聞稿:電腦公元二千年數位問題的數據備份指引
  9. At same time, it has perfect exception handling mechanism and can find hardware, wireless link and tcp connection exception efficiently with the help of hardware watch dog. it can backup data during exception period by backup link and resending mechanism ; can make the whole system run continuously and stably by exception handling. thus, limited hardware resources are saved

    同時設備具有完善的異常監測機制,配合硬體看門狗能夠及時並有效地發現硬體異常、無線鏈路異常、 tcp連接故障;通過備份鏈路和重發機制,對發生異常期間的數據進行有效的備份;通過異常處理機制使整個系統能夠持續、穩定地運行,並節省了寶貴的系統硬體資源。
  10. An external data carrier in the form of a compact flash card stores production and backup data for the applications

    。它以小型閃存卡作為外部數據載體為過程應用存儲生產和備份數據。
  11. Saved in this mobile assistantframe and all the data can be kept as backup data for a long time. 2 data copying : when the mobile sim card is changed, or

    產品說明:可將手機sim卡中,電話號碼等通信錄資料轉存在"手機備份器"中,作為備份資料長期保存
  12. All data and applications will be lost. please backup data before the installation. reinstallation of third - party applications will be required

    所有的數據和程序都將丟失。請在安裝前備份好數據。這需要第三方程序的重新設置。
  13. Built - in data replicator easy to backup data restore 4

    4 .內置data replicator輕松為資料備份及還原
  14. Is a fully functional stand - by recovery site equipped with the necessary backup data and equipment established

    有否設立全功能后備運作復原地點,包括所需的備份數據及設備?
  15. Stuudy on the scheme of backup data and recovery in public health information system

    公共衛生信息系統中數據備份與恢復方案的探討
  16. This will result in enormous redo logs to be generated for online backup data files

    對于聯機備份數據文件,這將導致生成大量的重做日誌。
  17. Storing backup data on computer disks that have larger volume and durability than magnetic tapes

    -使用容量和壽命都較磁帶優勝的電腦磁碟貯存備份資料。
  18. It does not prevent the reading of the backup data by other means or the replacement of the password

    但是不能防止通過其他方式或通過替換密碼來讀取備份數據。
  19. When alter tablespace ts name end backup is issued, again a checkpoint scn is recorded at the headers of online backup data files

    當發出「 alter tablespace ts _ name end backup 」時,在聯機備份數據文件的的文件頭中再次記錄了檢查點scn 。
  20. The restoration of backup data recovery needs after re - run update, although we would still be prompted to update, but will skip the 20 mb data for the virus

    恢復備份的數據恢復后需要重新運行更新程序,雖然還是會提示更新,但是會跳過20mb的病毒庫數據。
分享友人