設置用戶信息 的英文怎麼說

中文拼音 [shèzhìyòngxìn]
設置用戶信息 英文
set user information
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • 設置 : 1. (設立) set up; put up 2. (設置) install; fit
  • 用戶 : user; subscriber; consumer; party; purchasers; abonement
  1. In this paper, a safe, reliable, and intellectual control plan is provided aiming at the heat charge for dwelling district, which contains epigynous machine responsible for data processing and hypogynous mahcine responsible for unlocking the valve, by means of serial communication between them, combining homemade three - channel valve, to adminstrate the charge data and the valve efficiently. the main idea is based on the homemade three - channel valve. the vavle is locked at peacetime, while it is opened with the help of open tool and a water flow in the caliduct. as soon as the flow stops, the valve locks automatically. the open tool has data in its memory, and implement function by lcd and keyborad. so it can identify data and drive motor, to open the valve intellectually. the epigynous machine database manage system administrator the dweller information, standard heat charge and payment infomation etc, including store, configure, query, print etc, then store in the memory of open tool. as a result, the plan can do well in the experiment

    此閥平時是鎖閉的,只有開啟器配以暖氣片中的水流才可打開,一旦水流斷開,則此閥會自會鎖閉。而開啟器則是根據其存儲器中的數據配以液晶顯示及小鍵盤,完成數據確認及電機驅動,自動對相應的三通閥打開特定角度,完成開啟任務。上位機數據庫管理系統完成對、熱費標準、繳費等原始數據的常規管理,包括存儲、、查詢、列印等,最後將處理后的數據傳到開啟器中存儲。
  2. Virtual reality technology can provide " participants " with a feeling of being personally on the scene. as a main actor in the virtual environment, userscan control any objects in the virtual environment arbitrarily and can get reaction in time. in the hyperspace of the information, he can get acknowledge with their own percipience and cognition, and, seek the solutin, and form the new conception. the association of the virtual reality technology and java technology intensify the interaction between the users and viryual reality technology. with the interface provided by java, the user can control any objecs and change the attributes ( such as position, angle, color and etc. ). this paper formulizes application of the virtual reality technology in the system of the building seilling which uses the real three dimensions models to replace of static picture ' s and word ' s description. in the process of the practice, the paper analyses the difference between javascript, java claa and java applet, and formulize the their applications in this system

    在多維空間中,依靠自己的感知和認知能力全方位地獲取知識,發揮主觀能動性,尋求解答,形成新的概念。虛擬現實技術與java技術的結合增加了虛擬現實技術與的交互功能,可以通過java提供的界面,操縱場景中的任何物體,並改變相應的屬性(如:位,角度,顏色等等) 。本篇論文闡述了虛擬現實技術應在售樓系統中,真實的三維模型來代替原有的靜態圖片及文字描述,在實踐過程中,分析了javascript , java類,及javaapplet實現功能中的利弊,分別闡述了它們在本系統中的應,從理論上講,本課題所研究的虛擬現實技術不只適於售樓系統的電子商務中,同樣可於軍事和演習、醫學、教育、娛樂和工程計等領域。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定的權力和責任,包括帳使方式、資源訪問權限、口令應以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配、帳及使權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配、管理和應方面提供了基本的框架。
  4. Above all, this paper discusses the frame, system functions, user demands, construction preconditions and conformity planning based on the introduction of study and application situation ; then, planning project, planning process and foundation of guidance system in grades, including guidance strategy in four grades are studied ; whereafter, the thesis analyzes setting requirements and modes, installation angle, dimension and colour, display contents and arranging sequence and fonts of parking guidance sign, it is mainly studied that calculational method of distance between the variable message signs

    本論文首先在介紹停車誘導系統研究與應情況的基礎之上,論述系統框架結構、系統功能、需求、建停車誘導系統的條件與停車誘導系統與智能交通系統的整合規劃等問題;接下來制定了停車誘導系統規劃方案,提出區域性停車誘導系統規劃步驟,研究分級誘導體系的建立方法,提出四級誘導策略;然後分析停車誘導標志布的具體要求、方式、安裝角度、尺寸與顏色、顯示內容及排列順序、字體等問題,重點研究並給出可變間距的計算方法。
  5. The editing system interface of media asset management system integrates the user authority identification, the module of downloading and uploading, the selection of programs and advertisements, the configuration of transferring data information, the display of downloading stuff information, the restriction of system requirement, audio formats ’ selectivity conversion and other functions

    媒體資產管理系統的編輯系統介面里,集成了權限識別、導入導出模塊、節目廣告分選、上傳素材、下載素材顯示、系統要求限定、音頻格式可選擇性轉換等功能。
  6. The design process of the proposed method is described as follows : the user inputs the 3d sketch of a welded machine, and the geometry and topology information of the members in the welded machine are established automatically. the design information is acquired by the means of man - computer interaction. according to the knowledge of design and welding, the rules of bar orientation, joint processing and welding sequence are established

    在autocad中輸入焊接機架的線框簡圖,提取出機架結構的幾何和拓撲,然後通過人機交互輸入,並根據機架的計知識與焊接知識,建立機架的桿件方位布規則、節點處理規則與焊接順序自動確定規則,最後在autocad中生成經過節點處理的機架三維實體,並提供一套合理的焊接順序。
  7. The common information they need are various types of job standards, operation regulations and working data. operators need telephone number list, formulated vocabulary, problem process program, while technicians need the working status information of the equipment ( normal, abnormal, busy, idle ), exception handles, routine maintenance procedures and the equipment configure data. the users of controlling layer are directors in charge of administration or technology who concerned with the operation of ccs

    他們所需的主要有:各類工作標準、操作規程、業務資料,如話務員需要電話號碼簿、接轉規范語、疑難問題處理程序及案例;糾察員需要話務員接續過程錄音、申告內容和糾察評分標準;技術員需要備工作狀態(正常、異常、繁忙、空閑)、故障處理程序、例行維護程序、備配資料;受訓人員需要訓練課程計劃、教學課件等。
  8. The goal of this paper, is to research one kind of intelligent electronic appliances network which has the following characters : the connection between the electronic appliances or between the electronic appliance and the inter net is realizable ; the operation methods of all kinds of electronic appliances which locate at home, can be set by the user through the pcs at home or outside home which can access to internet ; the electronic appliances can acquire the information and the services from the service provider web stations automatically when the operations is required ; the new composed electronic appliances network or the electronic appliances which are just to join the network, can be " plug & play " without user " s setting, the electronic appliances themselves accomplish all the settings

    本文撰寫的目的,就是研究和探討一種智能化的家電網路,使其具備以下特點:家電與家電以及家電與網際網路的相互連接成為可能;各種家電的運作方式,可以由家庭內部以及連接到網際網路上的計算機隨時定;隨著運行工作的需要,家電能夠自動向各種服務提供網站獲取相關以及服務;新組建的家電網路以及新加入家電網路中的家電,無須定,接上電源后即可投入工作,一切參數的均由家電獨立完成。
  9. Super - encrypt from keyboard to end user, set up a virtual private network for you and yours, and anyone who cracks the 802. 11 transmissions will sniff garbage

    從鍵盤到最終的超級加密為您虛擬專網路,破壞802 . 11傳輸的任何人都將嗅探無
  10. By using it, the section mapping drawings of multi - types & complex pipeline system can be automatically generated through the entity crossing operation. this method composes of the following three key steps. in the first, different graphic entities are identified from the complex pipelines drawing in terms of the layer information they owned, then the correspondent information is to be encapsulated to keep the spatial data completeness of the graphic symbols

    該方法通過管線系統計圖中的圖形實體的分層處理與封裝,首先實現了復雜管線實體的自動識別並確保了圖形實體具有對應管線實體對象的完備空間;在此基礎上,根據給出的任意位截切線,構造隱式描述的截切面並與隱式描述的管線實體進行求交運算;最後通過對求交結果的坐標變換,生成能夠直觀反映出多類型復雜管線系統空間分佈的截切面映射圖。
  11. For information on adding user settings, see

    有關添加,請參見
  12. Accountant report calculates change and manual fiscal distinguishs main show to be in the following respects : ( 1 ) operation tool is different ; ( 2 ) the carrier of accountant data and information is different ; ( 3 ) data processing speed, accuracy and deepness development are used different ; ( 4 ) book - keeping regulation and correct wrong method differs ; ( 5 ) program of zhang wu processing is different ; ( 6 ) the method of account setting and zhang book that register is different ; ( 7 ) the constituent system that the accountant works is different ; ( 8 ) money is met the quality of personnel is different ; ( 9 ) built - in control system is different

    會計電算化和手工會計的區別主要表現在以下幾個方面: ( 1 )運算工具不同; ( 2 )會計數據與的載體不同; ( 3 )數據處理速度、準確性與深度開發利不同; ( 4 )簿記規則與更正錯誤的方法不同; ( 5 )賬務處理程序不同; ( 6 )賬和賬簿登記方法不同; ( 7 )會計工作的組織體制不同; ( 8 )財會人員的素質不同; ( 9 )內部控制制度不同。
  13. Gets or sets the error message displayed when the user enters a user name that is already in use in the membership provider

    獲取或輸入成員資格提供程序中已使名時所顯示的錯誤
  14. Gets or sets the error message displayed when the user enters an e - mail address that is already in use in the membership provider

    獲取或輸入成員資格提供程序中已使的電子郵件地址時所顯示的錯誤
  15. In the interface of function, pi1 provide four ways of information embed, user definition, directly into information, copy stop and investigation, user can select different ways according to the requirement

    在功能定界面中, pi1為提供了四種埋入的方式,其中包括自定義,列印提示埋入文件,防止拷貝和追跡,可以根據自己的情況選擇不同的方式。
  16. The main function of the ec system are scanning the information of products online, user registering, modifying the registering information, searching products, purchasing products, orders online, confirmed the orders, check out, feedbacking information, logouting of the system and the security of system

    在電子商務系統中主要實現的功能有商品瀏覽、注冊、注冊修改、商品搜索、商品購買、網上訂單、訂單確認、支付、反饋、退出系統和系統安全等主要功能。
  17. Yes. registered users who are logged in to my ups can select the set preferences link in the area at the right of the track by freight shipment reference page to set their preferences

    是的,登錄「我的ups 」的注冊可選擇「通過包裹相關追蹤」頁面右側區域的「首選項」鏈接來其首選項。
  18. This paper emphasize on the research of security strategy of large rdb based on b / s three - tier system structure, and discuss of the data security management strategy from every side of account management, authority management, view management, rule management, audit monitor, data dictionary track. this paper, which use orient - object model designing idea, design and realize a common data security control of application system

    本論文側重研究基於b s三層體系結構下的大型關系數據庫的安全機制,從管理、授權機制、靜態、角色管理、審計監控、數據跟蹤,多側面、多角度討論了數據安全管理策略,並且利面向對象建模思想,在《龍口港系統》中構建並實現這種通模型? ?數據庫安全控制器dbsc的計理念。
  19. For information about how client and server search time - outs work with query paging in the directory, see the documentation of the search methods for the provider for active directory

    有關客端和服務器搜索超時如何與目錄中查詢分頁配合使,請參見有關active directory提供程序的搜索方法的文檔。
  20. An important aspect of the membership system is that you never need to explicitly perform any low - level database functions to get or set user information

    成員資格系統的一個重要方面是無需顯式執行任何低級數據庫函數就可以獲取或設置用戶信息。例如,通過調成員資格
分享友人