授信程序 的英文怎麼說

中文拼音 [shòuxìnchéng]
授信程序 英文
credit granting process
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. “ you have to know or at least have a hypothesis why having a dog makes a good computer programmer, ” professor mumford said. “ if you ask whether someone started a club in high school, it is a clear indicator of leadership

    「你得知道或至少假設一下為什麼養狗的人就是一個好的員, 」邁克教說, 「但是如果問別人高中時是不是創建過什麼俱樂部,很明顯是想知道他的領導力方面的息。 」
  2. A former senior credit manager of a bank, wanted by the icac, voluntarily returned from canada to hong kong to face bribery charges in relation to a 460 million letters of credit scam

    一名銀行前高級經理,涉嫌收受利益,批出約四億六千萬港元用狀貸款,被廉政公署通緝多年,疑犯其後同意免卻引渡,自願由加拿大回港接受起訴。
  3. When a client accesses the deployment manifest for the first time, the trust manager must choose whether the clickonce application has been granted authority or not to run at a higher level of trust by an installed trusted publisher

    當客戶端首次訪問部署清單時,任關系管理器必須決定某個已安裝的受任發行者是否已向clickonce應用予以更高的任級別運行的權限。
  4. In addition, it displays the current state of the applications, license information, etc

    另外它還顯示應用的當前狀態,息等
  5. Credit granting process

    授信程序
  6. The main customers all concentrate on the state - owned enterprise, the asset - liability ratio of the state - owned enterprise is relatively high, the capital can ’ t be supplemented for a long time. ( 2 ) market risk, it means the proxy of the bank will fluctuate when the market price factor changes

    湖南工行的授信程序,存在貸審查報告流於形式問題;同時,大量受客戶具有相類似的風險特徵,主要客戶都集中於國有企業,國有企業的資產負債率較高,資本金長期以來得不到補充。
  7. If the trusted application domain host does not have permission to provide evidence, the assembly or application domain receives the permissions that have been granted to the host

    如果受任的應用域宿主沒有提供證據的權限,則集或應用域會收到已予宿主的權限。
  8. Office solutions that use managed code extensions add a custom security restriction of not accepting all code or zone - based evidence types, which means that microsoft office word 2003, microsoft office excel 2003, and microsoft office outlook 2003 will not run any assemblies that are on the local machine, the network, or the internet until the assembly is given permission granted trust in your security policy

    使用託管代碼擴展的office解決方案中新增了一個自定義安全限制,它不接受基於「所有代碼」或「區域」的證據類型,這意味著除非相應的集在您的安全策略中被予了權限(任) ,否則microsoft office word 2003 、 microsoft office excel 2003和microsoft office outlook 2003將不運行本地計算機、網路或internet上的任何集。
  9. The default low - trust policy file only gives an asp. net application read permission in its application directory

    默認的低任級別的策略文件僅予asp . net應用在其應用目錄中的讀權限。
  10. Space data and information transfer systems - standard formatted data units - control authority procedures

    航天數據和息發送系統.標準格式數據單元.控制
  11. The training on business management for small enterprises is intended to cope with the difficulties and challenges encountered by farmers in running their small enterprises, focusing on how to select the business products or services, how to identify the ways of making business, how to calculate the business expenditures, and on how to estimate the sales profits

    小企業經營管理教學模塊主要內容是幫助農牧民掌握有關產品及服務定位經營方式計算經營成本和利潤等方面的知識。小額貸教學模塊主要是傳給農牧民一些貸款政策申請貸款和利息計算等知識。
  12. Full trust. full - trust applications are granted unrestricted code access permissions by code access security policy

    代碼訪問安全策略為完全任級別的應用予的代碼訪問權限是沒有限制的。
  13. In a partial - trust environment, a non - full trust assembly can only use transactions within the application domain in this case, the only resource being protected is system memory, unless it is granted the

    在部分任的環境中,非完全集只能在應用域內使用事務(在此情況下,只有所保護的資源是系統內存) ,除非向它
  14. Objects rather than simply configuration data such as jdbc urls, can also enhance the security of the application, as the sensitive information such as authorization credentials are not directly available to the application

    對象,而不只是配置數據,比如jdbc url ,還可以增強應用的安全性,因為像權憑證這樣的敏感息不能被應用直接使用。
  15. Applications that receive less than full trust by the runtime code access security system are not allowed to call shared managed libraries unless the library writer specifically allows them to through the use of the

    不允許接收到低於完全任級別(該任級別是運行庫代碼訪問安全系統予的)的應用調用共享託管庫,除非庫編寫器通過使用
  16. The framework is quite generic, so any third - party applications that communicate through rpc or sockets can make use of this security layer to transport their home - grown authorization data through callbacks

    整個框架的通用性非常好,因此任何使用rpc或socket進行通的第三方應用都可以使用這個安全層來通過回調傳輸自己日益增長的權數據。
  17. Object with the trust level set to the

    對象予應用並將其任級別設置為
  18. The fully trusted assembly list grants its members full trust for the related policy level

    完全任的集列表為相關的策略級別向其成員予完全任。
  19. You must manually grant full trust to the assembly at the machine level

    必須以手動方式在計算機級別為予完全任。
  20. The fixed policy for clr assemblies and sql server system assemblies grants them full trust

    Clr集和sql server系統集的固定策略為予完全任的權限。
分享友人