授權的用戶 的英文怎麼說

中文拼音 [shòuquándeyòng]
授權的用戶 英文
authorized user
  • : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
  • 授權 : empower; authorize; warrant
  • 用戶 : user; subscriber; consumer; party; purchasers; abonement
  1. A flaw could make it possible for an unprivileged user to cause the handler routine to run in the security context of localsystem

    缺陷可使未授權的用戶能夠在「 localsystem 」安全環境中運行處理程序常式。
  2. And can be modified only by authorized users

    ,只能由已經授權的用戶修改。
  3. Also, the key must be kept secret from unauthorized users

    並且,密鑰必須對未經授權的用戶保密。
  4. An unauthorized user id must not be able to launch an application

    未經授權的用戶id必須禁止啟動應程序。
  5. This will deny unauthenticated users the right to access the report server

    這將拒絕未授權的用戶對報表服務器訪問。
  6. Caching may allow unauthorized users or processes to read sensitive data

    緩存可能允許未經授權的用戶或進程讀取敏感數據。
  7. Cleverlearn grants users free access to selected online english learning products

    Cleverlearn授權的用戶可以免費選擇網上英語學習產品
  8. How can i restrict access for a single web service to authorized users roles

    :我怎樣才能把對單個web服務訪問限制到經過授權的用戶角色?
  9. This backdoor capability allows unauthorized users to access and manipulate infected systems

    后門功能可使未經授權的用戶訪問並控制受感染機器。
  10. These features block unauthorized users from making changes to protected parts of a document

    這些功能可以阻止未經授權的用戶更改文檔中受保護部分。
  11. The asp. net configuration system helps protect configuration files from access by unauthorized users

    Asp . net配置系統有助於防止未經授權的用戶訪問配置文件。
  12. Like employees, these authorized users may obtain confidential passwords or find other ways of committing computer crimes

    像雇員一樣,這些授權的用戶可能獲取秘密口令,或者找到進行計算機犯罪其他途徑。
  13. A unique string of characters input by an authorized user in order to gain access to a system or to protected information in the system. passwords are usually not displayed on terminal screen upon input, in order to preserve their secrecy

    授權的用戶為取得對系統或系統中被保護信息存取而輸入給系統專門字元串。為使口令字保密,輸入時口令字一般不在終端屏幕上顯示出來。
  14. In data security, the transmission of data to unauthorized users by processes with legitimate access to data. a compiler, for example, could leak a proprietary program whilst it is being compiled

    在數據保密學中,通過合法訪問數據進程將數據傳輸給未授權的用戶過程。例如,編譯程序在編譯期間便可能泄漏專程序。
  15. Code - access - permission objects are used to protect resources and operations from use by unauthorized users

    代碼訪問限對象於保護資源和操作,以免被未經授權的用戶使
  16. When you use the export feature of web parts, sensitive data could potentially be exported to unauthorized users

    使web部件導出功能時,可能會將敏感數據導出給未經授權的用戶
  17. In data security, the transmission of data to unauthorized users by processes with legitimate access to data

    在數據保密學中,通過合法訪問數據進程將數據傳輸給未授權的用戶過程。
  18. By maintaining a low false reject rate ( the probability that the device will reject an authorized user ), while maintaining a high deterrent to unauthorized access, rsi ' s units process large numbers of people with minimal delays

    由此維持很低拒識率(設備可能拒絕一個授權的用戶) ,當維持很低誤識率, rsi設備最小延誤大數量人處理時間。
  19. In our weblog, for instance, visitors should be able to read entries and perhaps submit feedback, but only authorized users should be able to post new entries or edit existing content

    例如,在我們weblog中,訪問者應該能夠閱讀各項,也許還應該能夠提交反饋,但只有經過授權的用戶才能公布新項,或編輯已有內容。
  20. Three means exists in current defencing the overrun of stack : overwriting contents in stack with too long arguments is not allowed ; overwriting is allowed but unauthorized change of control flow is not allowed ; change of control flow is allowed but execution of injected code is prevented

    在理論上存在三類方法檢測堆棧溢出:不允許超長輸入參數覆蓋返回地址;允許返回地址被覆蓋,但不允許控制流轉向非授權的用戶;允許控制流轉向非授權的用戶,但不允許其可執行代碼被運行。
分享友人