文件讀取權限 的英文怎麼說

中文拼音 [wénjiàndòuquánxiàn]
文件讀取權限 英文
file reservation
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : 讀名詞(語句中的停頓) a slight pause in reading
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  • 讀取 : fetch讀取穿孔裝置 read punch unit; 讀取磁帶 [計算機] a read magnetic tape; 讀取規則 fetch rule; f...
  • 權限 : limits of authority [powers]; power; authority; within the power or right of; jurisdiction; compe...
  1. The emphasis is, however, put upon the analysis of the solution and the objectives of the design, the techniques of general and detailed design of the system. the terminal server supporting to three - layer c / s structure of the microsoft is applied in the construction of the system. the terminal server can make the numerous customer to register the server togather, and just like working on the server at the same time

    該系統運用microsoft的terminalserver系統支持,實現了三層c s結構,使眾多的客戶端可以同時登錄到服務器上,彷彿同時在服務器上工作一樣;並解決了一些實際問題,如工程間傳參問題,遠程客戶機軟驅數據問題;設計了四層安全認證模式,實現以個人的身份進行系統的分配;進行了與企業運營相關的優化,包括倉儲操作優化、裝配車優化等
  2. The primary risk here is that users might export sensitive data out of the application and into the description file, which is a simple text file that anyone with the proper permissions could read

    )此處的主要風險在於用戶可能會將敏感數據從應用程序導出到說明,而說明是一個簡單的,具有適當的任何人都可以它。
  3. Read access to read from a file or directory

    或目錄中的訪問
  4. By loading the hiw reader restriction in the archive, we can control conveniently the archive reader group, in addition, we can realize the following operations : forbidding the screen copy operaion and restricting the number of the printing copies whe the documents are accessed

    通過在檔中加載隱藏的者域,實現了者群的控制。另外,還實現了禁止拷屏操作和列印份數定、不同身份用戶設定不同存和角色以及在審批過程中不能擅自修改審批意見等安全控制。
  5. Read permissions on all the configuration files

    對所有配置
  6. Read permissions on all the parent configuration files

    對所有父級配置進行
  7. Read permission on the configuration file at the current configuration hierarchy level

    在當前配置層次結構級別下對配置
  8. Verify that users who will subsequently view the reports in the shared folder have read permission

    驗證隨后將查看共享夾中報表的用戶是否具有
  9. For example, a file system watcher event provider needs read access to an xml schema definition file that describes the event schema and read and modify access to the folder where event files are dropped

    例如,系統觀察器事提供程序需要對描述事架構的xml架構定義( xsd ),以及對放置事夾的和修改
  10. For applications using a file system watcher event provider, the event provider must be able to read and rename files in the folder where events are dropped, and must have read access to the event schema file. xsd

    對于使用系統觀察器事提供程序的應用程序,事提供程序必須能夠和重命名刪除事夾中的,並且必須具有對事架構( . xsd )的
  11. The user account used by sql server must have been granted the permissions required for reading the file on the remote disk

    必須授予sql server所用的用戶帳戶遠程磁盤上的所需的
  12. As for writing files to the local hard disk, the user account used by sql server must have been granted the permissions required for reading or writing to a file on the remote disk

    為了向本地硬盤中寫入, sql server使用的用戶帳戶必須被授予在遠程磁盤上或寫入所需的
分享友人