訪問源 的英文怎麼說

中文拼音 [fǎngwènyuán]
訪問源 英文
access originator
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. For more information about ado. net and other types of data access programming, see the following online resources

    有關ado . net和其他類型的數據編程的更多信息,請參見以下聯機資
  2. The recommended approach for accessing resources outside the database under an impersonation context is to use certificates and signatures as apposed to the

    在模擬上下文內數據庫以外資的建議方法是使用證書和簽名替代
  3. The constraints are computable, but the resources required to check them are beyond the access of the program

    限定元素可以計算,但是程序無法檢查它們所需要的資
  4. To disallow access to the resource using that name

    禁止使用該名稱的資
  5. It implements web crawling through distributed technology, and builds index database through accidence analyzing chinese characters separating unuseful words deleting etyma extracting index words selecting and lexicon. the level system uses new model of web accessing and level computation to build web level system so that the requirement for computer resources is greatly reduced

    該搜索引擎使用分散式技術實現網頁獲取模塊;通過詞法分析、中文分詞、無用詞匯刪除、詞干提取、索引詞條選擇和詞典等技術建立索引數據庫;該搜索引擎的級別系統使用了新的網路模型和級別計算模型,大大降低了搜索引擎對于計算機資的要求。
  6. The resource is accessed through the gopher protocol

    通過gopher協議該資
  7. Hod 3270 resource adapter for access to host systems with 3270 screens

    用於帶3270屏幕的主機系統的hod 3270資適配器
  8. Through construction of the ods core data model, system supplied the sharing data which each subsystem needs to visit, improved the question that the data source was inconformity and data information was asynchronous in the old system because of independent construction of each subsystem

    通過建設ods核心數據模型,統一提供各個子系統需要的共享數據,改善了老系統中各個子系統獨立建設造成的數據來不一致,數據信息不同步的題。
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. Directive that points to the source page, you can access the source page s

    指令,則可以使用下面的代碼訪問源頁的
  11. The following figure illustrates a read operation on the snapshot that accesses a page after it has been updated in the source database

    下圖說明了對訪問源數據庫中更新頁的快照的讀操作。
  12. For conditional navigation, when you want to control when navigation takes place and you want access to the context of the source page

    用於條件導航,在需要控制何時導航和需要訪問源頁的上下文時使用。
  13. When you set up your data warehouse, you must define the agent sites that the warehouse will use to access source and target databases

    在設置數據倉庫時,必須定義倉庫將用來訪問源數據庫和目標數據庫的代理站點。
  14. In addition, if the source and target page are in the same web application, the target page can access public properties of the source page

    此外,如果頁和目標頁位於同一web應用程序中,則目標頁可以訪問源頁的公共屬性。
  15. Perhaps the most powerful aspect of an extension element is its ability to access the source document itself through the xsl processor context argument

    擴展元素最強大的方面可能是通過xsl處理器上下文參數訪問源文檔本身的能力。
  16. In addition, a cost model is built for evaluating the cost of query processing using materialized views and that of issuing queries to source database

    還建立查詢處理的代價模型,並比較分析了基於視圖的查詢處理代價和直接訪問源數據庫的查詢處理代價。
  17. In order for analysis services to reference multiple data sources in a single processing query such as for a snowflake dimension, the primary data source that you specify in the wizard must support

    選擇數據創建新數據視圖的第一步是指定數據,該數據定義了數據視圖用來訪問源數據的連接字元串。在數據視圖向導的
  18. Your ability to debug may be limited by whether the code was built with debug information, whether the debugger has access to the source code, and whether the common language runtime jit compiler is tracking debug information

    調試能力可能受到限制,限制因素包括:生成代碼時是否包含調試信息、調試器是否有權訪問源代碼,以及公共語言運行庫jit編譯器是否正在跟蹤調試信息。
  19. Your ability to inspect the program may be limited by whether the program was built with debug information, whether the debugger has access to the source code, and whether the common language runtime just - in - time compiler is tracking debug information

    檢查程序的能力可能會受以下幾種情況的限制:是否使用調試信息生成程序、調試器是否有權訪問源代碼以及公共語言運行庫just - in - time ( jit )編譯器是否正在跟蹤調試信息。
  20. It was easy for him to get access to source code and fixes from fellow developers, and before long he had tomcat commit access as well

    他很容易訪問源代碼和其他開發人員的修訂程序,並且不久就得到了tomcat提交權。
分享友人