程序口令 的英文怎麼說

中文拼音 [chéngkǒulìng]
程序口令 英文
program password
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • : Ⅰ名詞1 (人或動物進飲食的器官; 嘴) mouth 2 (容器通外面的地方) mouth; rim 3 (出入通過的地方) ...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. However the db2 universal driver that network server uses does require a userid and password. since the initial verification done by the db2 universal driver must be passed, these values are required

    然而db2通用驅動需要userid和,因為必須通過db2通用驅動的初始身份驗證,所以需要這些值。
  2. Keystroke loggers or trojan viruses are disabled and prevented from recording keystrokes as users input their passwords

    當用啟輸入時,按鍵記錄或木馬病毒被禁用並防止記錄擊鍵。
  3. In addition, the need to verify the identity of the applicant must be understood, and training should be given in the institution s account opening and customer client verification procedures

    此外,機構必須他們了解查證申請人身分的需要,並就機構的開設戶和客戶身分查證給予訓練。
  4. For the real time performance need of the low speed speech compress algorithm and the asic implement of the transfer process between programs, the design is put forward in the paper, in which state registers control the cross access between operator and memory, register windows are used for the parameters transfer, and the technique of hardware controlling is used to avoid pipeline conflict, so that the main problems of the transfer process in tr600 are solved effectively

    摘要針對低速率語音壓縮演算法對處理器系統實時處理復雜運算的性能要求,就調用過的asic實現問題進行了對比與分析,進而提出了用層次狀態寄存器控制存取運算元對存儲體交叉訪問的方法,並結合運用寄存器窗傳遞參數的功能,以及利用空指硬布線處理流水線沖突的方法,有效地解決了tr600晶元中調用過存在的主要問題。
  5. User name, password : these can be any values needed to pass db2 universal driver security, mentioned earlier

    用戶名、:這些是任意值(如前面提到的,需要通過db2通用驅動安全性) 。
  6. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。
  7. This problem led to the development of the shadow password suite

    這一個問題導致了影子[字]組的發展。
  8. A path is an instruction sequence that threads through the program from entry to final exit

    路徑是從入到退出的指
  9. Mallory s program kept creating and removing many different symlinks pointing to the same special file : etc passwd, the password file

    ) mallory的不停地創建和刪除很多指向同一特殊文件( / etc / passwd ,文件)的不同符號鏈接文件。
  10. The shadow password suite was created to provide an additional layer of protection

    影子[字]組被建立提供一個保護的另外層。
  11. Security can be enhanced if you configure users and groups in the shadow password suite

    如果你在影子[字]組中配置使用者和組,安全[性]能被提高。
  12. Standard commands for creating new users and groups automatically set up encrypted passwords in the shadow password suite files

    自動地創造新的使用者和組的標準的指在陰影[字]組文件中建立密碼化的[字] 。
  13. Window to view the assembly instructions. use the

    使用「反匯編」窗查看集指
  14. With regard to the distributed computer control system, the paper gives a minute description on the hardware structure of the control computer, what ' s more, it provides a full and accurate supplement about the software design of the control computer system : data acquisition program, asynchronous serial communication program, command processing program, da output program etc. in addition, according to the standard of rs232, it works out and realizes a convenient protocol which suits the asynchronous serial communication between the acquisition computer and the control computer

    在分散式計算機控制系統方面,文中詳細介紹了下位控制計算機系統的硬體結構和軟體發計,包括數據採集、串列通訊、命處理、控制輸出的設計。此外,本文基於rs232標準,設計了簡便的適合於本系統的串通訊協議,並從軟體上給予了實現。論文通過機理分析的方法建立了系統模型。
  15. Provides short instructions on using the disassembly window to view the assembly instructions and the registers window to view register contents and provides links to topics regarding those windows

    提供有關使用「反匯編」窗查看集指和使用「寄存器」窗查看寄存器內容的簡短說明,並提供指向關于這些窗的主題的鏈接。
  16. It throws up alerts for staff to follow up and then adjusts its screening processes in the light of their response

    一旦發現異常現象,它就會顯示一個警告窗,提示工作人員進行調查,然後根據他們的指調整審核
  17. Use the two v4 migration tools, waspreupgrade and waspostupgrade, from a command window to migrate your applications and domain configuration after v4 is installed

    使用兩個v4遷移工具, waspreupgrade和waspostupgrade ,在v4安裝完之後,在命中遷移您的應用和域配置。
  18. Procedures for the submission of import and export declarations were streamlined during the year by the introduction of edi

    年內,由於實施電子資料聯通,進出報關的得以簡化。
  19. The simulation of the addressing mode provides the possibility for the instruction simulation, and the simulation of the interrupt, timer and serial port lets the simulator implement the functions of the interrupt, timer and serial like a processor, and the program control simulation provides the possibility for running the program. this function is also the base for debugging program, which can set step running mode, set break points by using this program

    尋址方式的模擬為指的模擬提供了可能,中斷、定時器和串列的模擬使模擬器可以象處理器一樣完成中斷功能、定時功能和串列通訊功能,控制的模擬為運行提供了可能,這一功能又是調試的基礎,通過這個可以單步執行,設斷點執行。
  20. Japan has 3 forms of pretrial procedures : prepared oral debate, debate preparation procedure and written procedure. the judge makes decisions accordingly. the system of secretary ' s commanding orders and the clients note is enacted

    日本的審前準備採用三種不同的方式:準備性頭辯論、辯論準備、書面準備,由法官依具體情況決定,設立了文書提出命和當事人照會制度。
分享友人