數據確認 的英文怎麼說

中文拼音 [shǔquèrèn]
數據確認 英文
data validation
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 形容詞1. (符合事實; 真實) true; reliable; authentic 2. (堅固; 堅定) firm
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • 數據 : data; record; information
  • 確認 : affirm; confirm; acknowledge; identification; corroboration
  1. If an addresser has received any confirmation of the addressee on the receiving, the data message shall be regarded as having been received

    發件人收到收件人的收訖時,電文視為已經收到。
  2. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,簽名者的身份、來源和完整性,防止被竊取、篡改和破壞,從而達到保護的目的。
  3. This fact warrants thorough follow - up of patients with high - risk bladder cancers and also whole - mount examination of the prostate after cystectomy to recognize the true incidence and extent of such tumor inolement

    通過對高風險膀胱癌患者膀胱切除術后隨訪以及前列腺整體檢查的事實數據確認這種腫瘤發生率及其范圍程度。
  4. In this paper, a safe, reliable, and intellectual control plan is provided aiming at the heat charge for dwelling district, which contains epigynous machine responsible for data processing and hypogynous mahcine responsible for unlocking the valve, by means of serial communication between them, combining homemade three - channel valve, to adminstrate the charge data and the valve efficiently. the main idea is based on the homemade three - channel valve. the vavle is locked at peacetime, while it is opened with the help of open tool and a water flow in the caliduct. as soon as the flow stops, the valve locks automatically. the open tool has data in its memory, and implement function by lcd and keyborad. so it can identify data and drive motor, to open the valve intellectually. the epigynous machine database manage system administrator the dweller information, standard heat charge and payment infomation etc, including store, configure, query, print etc, then store in the memory of open tool. as a result, the plan can do well in the experiment

    此閥平時是鎖閉的,只有用開啟器配以暖氣片中的水流才可打開,一旦水流斷開,則此閥會自會鎖閉。而開啟器則是根其存儲器中的配以液晶顯示及小鍵盤,完成數據確認及電機驅動,自動對相應用戶的三通閥打開特定角度,完成開啟任務。上位機庫管理系統完成對用戶信息、熱費標準、繳費信息等原始的常規管理,包括存儲、設置、查詢、列印等,最後將處理后的傳到開啟器中存儲。
  5. Notwithstanding these efforts, the hkma considers that given the importance of this issue for public confidence, authorized institutions should take extra care to ensure the integrity of customer data, e. g. by printing the data as hardcopy reports or copying the data onto a medium that is separate from their computer systems such as micro - fiche or cd - rom

    盡管如此,金管局為由於有關事項對公眾信心有重大影響,所以可機構應格外小心,保客戶整全,例如把列印,保存有關的列印本,或把復制至電腦系統以外的縮微菲林膠片或唯讀光碟等儲存媒體。
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  7. In this paper, the numerical harbor should include following contents : 1. database of wave field, tidal current field, sediment field in researched area ; 2. database of ship styles. 3. numerical model used to analysis data. 4. plans of outer dike, utilities of sea line, and selections of waterway, which based on the above databases

    本文為,對于港區而言,值化的內容應包括以下幾個方面: ( l )所研究港區的波浪場、潮流場及泥沙場等自然條件庫的建立; ( 2 )船型庫的建立; ( 3 )值分析模式的建立; ( 4 )提出建立在自然條件基礎之上的外堤布置、碼頭岸線利用策略及航道的擬定方案(即優化模式的建立) ; ( 5 )按照經濟最優原理快速準地提出碼頭裝卸的策略及當前方案。
  8. Amato himself has used such data to determine the origins of contraband cainian skins destined for fashion items and to identify bushmeat confiscated by u. s. customs officials

    阿馬托本人也運用這些用於時尚飾品的違禁寬吻鱷魚的來源和被海關人員沒收的小動物的來源。
  9. To facilitate these placement commitments, recognized electronic and print composition data should be reviewed on a regular basis ( at least annually ) in order to ensure that the audience composition data are current and appropriate

    為方便達成承諾,應該定期審核可的電子及印刷媒體的組成(至少每年一次) ,以保證受眾的組成是最新的、正的。
  10. Iftmbc edi. message. booking confirmation message iftmbc

    電子交換.報文.預定報文
  11. When a parrot whose origin is in question is confiscated, scientists can compare its dna to the compiled databank and tell whether the bird was bred in a licensed captive - breeding group

    來源受到質疑的鸚鵡被沒收后,科學家將它的dna與庫進行比較以該鳥是否是合法進行人工繁殖的鳥兒。
  12. In order to improve the quality of the western language cataloguing, using the free oclc data of original recordings, cataloguing data, rules and regulations should be carefully checked and revised so as to ensure the standard and normalization of cataloguing data

    摘要為了提高西文圖書的分編質量,我們利用oclc免費的書目庫的源記錄進行西文圖書套錄編目,從書目、編目規則、編目規范等方面真核對和修改,保編目的規范化、標準化。
  13. Multiple domain controllers provide automatic backup for user accounts and other active directory data, and they work together to support domain controller functions ( such as validating logons ).

    多個域控制器可以自動備份用戶帳戶和其他activedirectory,並一同支持域控制器的功能(例如登錄等) 。
  14. The system should record the identity of operators entering or confirming critical data

    計算機系統應當記錄下輸入或重要的人員身份。
  15. 2. geological observation data have the disunity and uncertainty characterastics. original data are the objective signs based on present understanding of geological phenomena

    2 、地質觀測具有不統一性和不定性,原始是人類在現有識水平上對地質觀察結果的一種客觀標度。
  16. The study on soil co2 concentration redounds to understanding and illustrating the inner mechanism of caco3 deposition process and provides experiment data for caco3 deposition model development. based on the two years located research and out - door investigation in zhuanyaogou watershed, hequ county, the north west of shanxi province

    研究土壤co _ 2濃度在剖面上的分佈和變化規律,有助於識和解釋黃土高原鈣積過程的內在機制,以土壤co _ 2濃度變化的實測,建立能更準描述鈣積過程的模型。
  17. Supposed the two nonreversible deformations both obey the drucker law, the plastic loading function was established based on experimental data and the plastic work was used as hardening parameter supposed loess damage is mostly due to shear and the damage potential function has the same form of the equivalent plastic strain line in the plastic part, the damage potential function was gained by fitting the test data

    假定兩類不可逆變形都服從drucker公設,根試驗定以塑性功為硬化參的塑性加載函為損傷主要由於剪切產生,假定損傷勢函與塑性部分的塑性剪應變等值線具有相同的形式,通過試驗擬合得到損傷勢函,然後根損傷理論推導建立q1黃土的彈塑性損傷本構模型。
  18. Tape data validation

    數據確認
  19. The scientists identified the genes by testing the dna of tens of thousands of people in several countries

    科學家測試了幾個國家萬人的dna出上述基因。
  20. As a rule, test techniques make use of functional descriptions, data validation, and screen layouts, and where to find these descriptions is less important

    通常,測試技術使用了功能描述、數據確認和屏幕布局,以及在哪裡找到這些描述是不重要的,
分享友人