數據名字 的英文怎麼說

中文拼音 [shǔmíng]
數據名字 英文
data name
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 數據 : data; record; information
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了的概念及原理,並以bolero為例介紹了的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  2. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽,來代替書寫簽或印章,確認簽者的身份、來源和完整性,防止被竊取、篡改和破壞,從而達到保護的目的。
  3. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝、網上鄰居列表等的讀寫操作,從而很方便的根控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  4. Uh, a name keeps coming up in your data - " mockingbird.

    有一個「嘲鳥」一直出現在你的
  5. Uh, a name keeps coming up in your data - - " mockingbird.

    有一個「嘲鳥」一直出現在你的
  6. Anything ( a program, letter, digital, photograph, song, etc ) stored on a storage medium is referred to us as a file, data files are also sometimes called documents, when you save a document just created ( such as a memo or letter in a word processing program ), it is stored in a new file on the designated storage medium, during the storage process, the user is required to give the file a name, called a filename, that name is used when the user required to see the document at a later time, naming files and retrieving stored document are discussed further in other textbooks

    任何(節目,信件,式,相片、歌曲,等)被存放在存儲介質指我們文件,文件有時也叫做文件,當您保存一個文件被創造(譬如一封備忘錄或信件在文處理程序) ,它被存放在一個新文件在選定的存儲介質,在存貯過程期間,用戶必需給文件,稱文件被使用當用戶被要求看文件在最新時光,文件和檢索被存儲的文件被談論進一步在其它課本。
  7. The system was designed by dynamic asp ( active server page ), secure socket layer, digital signature and certification technologies

    系統應用了動態asp技術和庫技術、安全套接協議、和身份認證技術。
  8. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured

    本課題中設計了一種擁有自主知識產權的橢圓曲線和驗證演算法,並在微機上進行了實現,確保了的完整性和用戶身份真實性。
  9. Because of the grammar of the system information, keywords and data source names cannot contain the backslash character

    由於系統信息語法的緣故,關鍵稱不能包含反斜杠( )元。
  10. Parameter must contain a valid database name, and cannot contain a null value, an empty string, or a string with only blank characters

    必須包含有效的稱,不能包含空值、空元串( " )或只有空白元的元串。
  11. An alphanumeric term that identifies a data set, a statement, a program, or a cataloged procedure. the first character of the name must be alphabetic

    一種項,用於標識某個集、語句、程序或已編目的過程。的首元必須是母。
  12. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的通信網路中,作為認證技術中的一項關鍵技術,可以解決否認、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  13. Key numbers of chinese names first names today

    今天庫共有中國
  14. Further more, the thesis lucubrates some key techniques : aiming at the management of the distributed objects, we skillfully construct the isomorphic project object tree for the real projects structure by using the corba naming service, and laconically and effectively implement the management of the services and modules by using the location service. and we also propose a design which uses corba event service and borland midas to implement the distributed data service in a creative way and analyze the advantages and disadvantages of this design at the same time

    並針對一些關鍵技術做了深入的討論和分析,例如針對整個系統的分散式對象的管理,巧妙地借用corba的服務構造了同構于實際工程組織的工程對象樹,同時使用定位服務簡潔而有效的實現了對服務和模塊的管理;針對分散式庫的實現,創造性地提出了一種使用corba事件服務和borlandmidas組件來實現分散式服務的設計,並實現了這個設計,同時分析了這種設計的優劣。
  15. In cobol, a word or a punctuation character that associates a data name or paragraph name with its qualifier, links two or more operands in a series, or forms a conditional expression

    在cobol語言中的一個或一個標點符號,它把或程序段和其限定詞建立聯系,連接兩個或更多的串列操作,或構成一個條件表達式。
  16. The data structure type was built for the photograph data, the international calculation criteria were adopted for the numeric data, the specific file table and file explanation was established for the text data, the date express type was established for the date data, and the definition of any specialty words and phrases was kept consistent

    其中,對圖片確定結構類型;對統一採用國際標準的計量單位;對文擬定具體的文檔編碼表及文檔說明;對日期型確定日期表達的形式;任何專業詞、術語的定義都嚴格保持概念的一致。
  17. Consumers checking their credit - card balance could be routed seamlessly to call centers like this one in india, where operators identify themselves with made - up american names

    消費者查看他們信用卡上的資金量的時候,將通行無阻地傳輸到設在印度等地的電話中心,在那裡,接線員使用自己起的美國
  18. Free internet service. the internet wire is on the writing desk. virtually dial to the internet with idsl. the user ' s name and password are pasted on the modem

    免費寬帶網。網線設在寫桌上邊,使用idsl虛擬拔號上網,用戶稱和密碼貼在「機」上。
  19. Users can select a continent from the world map of the main page, enter the desired country and click the red dot next to the name of a city to view the corresponding summary of climatological information

    網頁使用人士可從主網頁的地圖上選擇各大洲,進入其中一國家,然後按城市旁的紅色圓點選擇瀏覽該城?的氣象列表。
  20. You can either perform a lookup on a particular parameter by name

    可以根對一個特定的參完成一個查找(
分享友人