configuration database 中文意思是什麼

configuration database 解釋
配置數據庫
  • configuration : n. 1. 結構;構造;圓形,外形。2. 組合,布置;配置。3. 地形;【天文學】(行星等的)相對位置,方位;【化學】(分子中原子的)組態,排列;【物理學】位形;組態。
  1. Based on the principle of advance, adaptive, reliability, high efficiency and flexibility, the general configuration strategy and the key technology has been deeply analyzed and optimized with the systematic and community in general and adaptive and contraposition in detail. the harmonic in both respects has been realized technically and the contradiction between adaptive and community solved. with the synthetic developing tool based on the database, the capp system called synthetic development capp ( sd - capp ) which is of the properties of synthetic, modular redeveloped and integrated has been developed

    本論文以提高系統的先進性和實用性以及高效,靈活為基本原則,對capp的總體構成策略及其關鍵技術進行了深入地分析和優化,宏觀上充分體現系統性和通用性,微觀上切實體現針對性和適應性,技術上實現二者的協調統一,較好地處理了適應性與通用性這對既相互關聯、又相互制約的矛盾;採用基於數據庫的綜合開發工具模式,研究並開發了綜合式、模塊化、具有二次開發和一定集成功能的capp系統? ?基於數據庫的典型零件capp綜合開發系統( syntheticdevelopmentcapp ) ( sd - capp ) 。
  2. This feature saves administrators from the gruelling task of finding the right configuration parameters that best suit a database

    這一特性就避免了管理員費盡心思地去尋找最適合數據庫的配置參數。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. 1. comparing reservoir beds in details step by step, we have divided and compared the deposition time unit in guan 3 - 6 sandstone bed sets, which has been divided into 20 small beds, 30 time units : rebuilding oil sandstone body data table, building graph database, further analyzing the level and section plane configuration and combination pattern of sandstone, and deducing the maze reservoir geology model of river sandstone, are the most important basis for oil reservoir description and residual oil distribution study

    1 、採用儲層逐級細分對比方法,對館3 - 6砂層組進行了沉積時間單元的劃分對比,共劃分出20個小層、 30個時間單元;重新編制了油砂體數據表,建立了圖表數據庫,並進一步分析了單層砂體平面、剖面形態以及砂體組合模式,總結出河道砂體屬迷宮式儲層地質模型,這是精細油藏描述及剩餘油分佈研究的最重要基礎。
  5. In this paper, the main content includes three parts. firstly, some compounds such as i / o blocks and algebraic and logic blocks and pid blocks are exploited. secondly, the software of configuration could configurate online or offline, and debug and diagnose the control systems. thirdly, management system disposes the exchange of data, and executes strategy of control, manages the real - time database

    該軟體以i / a系列dcs為主要參照對象,它將整個系統的控制與模型本身分離開來,其控制部分的組態在操作站管理系統進行,不用加入模型,也不用生成控制源代碼,因此很自然的就實現了在線調整、實時控制等類同於實際現場的模式。
  6. Available from the windows start menu and from the db2 control center, the configuration assistant tool will enable you to " add database using wizard " or modify connection properties for an existing database

    可以從windows的開始菜單中以及從db2控制中心中獲得configuration assistant工具,它允許您「用向導添加數據庫( add database using wizard ) 」或者為現有數據庫修改連接屬性。
  7. However, the farther analysis in the paper indicates that the strategy of parameter configuration in current connection pool technique is static state with 1 - order enactment while initializes connection pool without self - optimized adjustment according as the variety of application demand, the operation results of high use frequency database are not cached and users visit the same database independently. the multi - propose connection strategy cannot control the database operation for the same transaction and cannot ensure the acid attribute, etc. in according with the defections mentioned above, the service technique of self - optimized connection pool is presented in this paper and the composing structure for self - optimized connection pool is designed, then, some strategy in dynamic parameters adjustment, transaction management and data cache for connection pool is improved

    然而,通過本文的研究分析,現有數據庫連接池技術的參數配置策略是靜態的,連接池初始化時進行一次設定,不能根據應用需求的變化而動態調整;連接池的核心管理機制中,沒有對使用頻率較高的數據庫操作結果進行緩存,多個用戶依然各自獨立地完成相同的數據庫訪問;使用的連接復用策略無法控制屬于同一個事務的多個數據庫操作,不能保證事務的acid屬性等。
  8. Fitting currently district traffic control need digitizing, latticing, intelligentized, base on ic card and license plate identification technique, design develop latticing district vehicle pass in and out management system, specific analysis the system of basic function, performance index, software and hardware configuration, emphasize design database management system, last give the implement outline

    摘要為適應當前小區交通管理數字化、網路化、智能化的要求,基於ic卡與車牌識別技術,設計開發了網路化小區車輛進出管理系統,具體分析系統的基本功能、性能指標和軟、硬體配置,著重設計了數據庫管理系統,最後給出實施綱要。
  9. 4. analyze the configuration management method that used to resolve the phenomenon that the same aircraft model has multi - delivery states caused by customer ' s diversification requirement. from many aspect, such as assign production process task, simplify configuration, setup single product resource database, configuration database, product structure management and validity inspect etc, discuss the capp technique that is fit for configuration management

    針對目前因客戶需求的多樣化而產生的同種機型、多種交付狀態現象,分析了為解決這種現象所採用的構型管理方法,從生產過程作業流的劃分、簡化構型、建立單一產品數據源庫、構型庫、產品結構管理和有效性檢查等多方面,探討了適合於構型管理的capp技術。
  10. To update a database manager configuration parameter

    更新數據庫管理器的配置參數。
  11. From db2 instance owner, set federated parameter in database manager configuration to yes

    從db2實例所有者,將數據庫管理器配置中的federated參數設為yes 。
  12. The database manager configuration, database configuration and db2set registry variables are the same as in

    數據庫管理器配置、數據庫配置和db2set注冊表變量與上面
  13. Both services connect using the single database user account that you specify. to configure the connection, use the database setup page in thereporting services configuration tool. the tool automatically creates the login and database permissions for the account you specify

    如果用戶憑據不可用(比如,如果不是用戶而是報表服務器作為計劃操作運行報表) ,則報表服務器將使用在rsreportserver配置文件的無人參與執行帳戶設置中指定的憑據。
  14. In a log shipping configuration, database snapshots can be created only on the primary database, not on a secondary database

    在日誌傳送配置中,只能針對主數據庫,而不能針對輔助數據庫創建數據庫快照。
  15. Bob deletes a specific portal page using the manage pages portlet, which removes the selected page and all sub - pages from the portal configuration database

    刪除了特定的門戶頁面,這從門戶配置數據庫刪除了所選的頁面和全部子頁。
  16. Scheduled online offline backups at regular intervals, using this configuration database, can be restored to the state it was at the last successful backup

    定期調度的在線/離線備份。通過使用這種配置,可以將數據庫恢復到最後一次成功備份時的狀態。
  17. Pac depends on a fast, reliable connection to the configured user registry ldap and to the portal configuration database, as well as good performance of these systems

    Pac依賴于配置的用戶注冊中心( ldap )和門戶配置數據庫之間快速而可靠的連接,以及這些系統的良好性能。
  18. The frame of software configuration management system, structure of configuration database and basic operation arithmetic are given in the end of this paper

    論文最後給出基於umscm的軟體配置管理系統山太原理工大學碩士研究生論文的框架、配置庫的結構和基本操作演算法。
  19. The next time, the portal access control component requests this information, there will be a cache miss, and the most current information is read from the portal configuration database

    當門戶訪問控制組件下一次請求這一信息時,將有緩存丟失,並且最新的信息是從門戶配置數據庫中讀取的。
  20. Finally, the system has been tested with software running, the test result showed that the configuration database ’ s structure is correct, the prototype is perfect, and the system ’ s credibility is durable high

    系統經初步調試運行,表明組態數據庫結構合理,模型準確,系統工作可靠等。基本完成了指定的要求,達到了研製的目的。
分享友人