跟蹤審計 的英文怎麼說

中文拼音 [gēnzōngshěn]
跟蹤審計 英文
follow-up auditing
  • : Ⅰ名詞(腳的後部或鞋襪 的後部) heel Ⅱ動詞1 (在後面緊接著行動) follow 2 (指嫁給某人) be marrie...
  • : 名詞(腳印; 蹤跡) footprint; track; trace; trail
  • : Ⅰ形容詞(詳細; 周密) careful Ⅱ動詞1 (審查) examine; go over 2 (審訊) interrogate; try 3 [書...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • 跟蹤 : follow the tracks of; tail after; following; follow up tracing; track; tracking; trail; lock on; ...
  1. The second passage of the article is the essential section, composed with macrocosm design, organization implement and feedback collection, designing and outlining the systemic model of certificate of leadership qualification, the whole assessment system pays attention not only to the macrocosm structure, proper and scientific frame, extensive applicability, but also to concrete steps, exiguous and intuitionistic programming, simple and convenient operation. the macrocosm design exerts modern examination theory and systemic project method to describe thoroughly the basic principles, applicable range, certificate categories, the setting of organization system, assessment target of leadership qualification, the choice of content and technology ; organization implement gives exiguous and concrete designs on the period of qualification examination, choosing time, confirmation of the certificate scale and qualification censor, written examination, interview, pub

    總體設中運用現代考試理論和系統工程的方法,適應形勢,結合實際,對認證制的基本原則、適用范圍(正副廳、正副處、正副科等三等六級) 、認證的分類、組織體系的設置、任職資格認證評價目標、內容和技術的選擇進行了宏觀全面地闡述;組織實施中對任職資格考試周期、時間的選擇、認證規模的確定以及資格查、筆試、面試、考察、公示的操作等進行了微觀具體地設;反饋迴流中對認證工作的檢驗和評估、任職資格的動態管理和認證制保障機制的建立進行了詳細說明。
  2. According to all discussed above, adopted typical mobile agent system ibm aglets to design a framework of mobile agent based intrusion detection system and various functional mobile agents, analyzed data collection, detection and tracing of intruding attacks of the concurrent multiple mobile agents. those mobile agents trace and watch the network equipments and hosts in real time, study net flow and status of the hosts, analyze and audit the outcome data, then give real time alarms for the aggressive activities

    在此基礎上,採用典型移動代理系統ibmaglets設了一種基於移動代理的入侵檢測系統框架,並設了不同功能的移動代理,分析多個移動代理協作進行數據採集與檢測入侵攻擊的過程,這些移動代理實時監視網路設備和主機,了解網路上的流量和主機的狀態,並對結果數據進行分析,做出一定的響應。
  3. This paper analyses some superiorities in the follow - up auditing process, then studies the follow - up ways and means of three phases, and finally points out three issues concerned

    文章剖析了建設項目跟蹤審計優勢,分別就建設項目三個階段的跟蹤審計內容和方法進行了闡述,並提出了跟蹤審計應注意的三個問題。
  4. With an audit trail, where the application or the job management software maintains a log of usage

    採用的方法,同時讓應用程序或作業管理軟體維護使用日誌。
  5. Establish, audit, track correlation response plan and repair measures by using key measurable and charts

    根據關鍵指標和各類報表,建立、核、相關反應劃和整改措施的實施。
  6. Review and prepare capital apporpriation request against plan and follow - up

    準備並核資本性立項支出,將此與劃預算對比並
  7. ( 2 ) takes part in the process of making decision and control, while provides information for company mergers involved in asset reorganization, ( 3 ) meets the demands for information of asset reorganization of creditors, state departments and other parties relating to the company. asset reorganization consists of preparing phase, implementing phase and integrating phase, and each phase concerns different accounting problems. chapter 3 " researching on basic theory of asset reorganization accounting " discusses the influence on accounting postulate and accounting principals caused by asset reorganization

    重組實施階段會工作的主要內容包括: ( 1 )在談判過程中,根據雙方的預測進行成本效益的分析,為決定是否接受對方的條件以及尋求各方能夠接受的條款提供依據; ( 2 )進行財產清查,並依法對資產價值進行評估或確認; ( 3 )進行兼并前的和調賬工作; ( 4 )依法對資產重組過程中的事項進行會處理並按規定進行信息披露。
  8. This paper emphasize on the research of security strategy of large rdb based on b / s three - tier system structure, and discuss of the data security management strategy from every side of account management, authority management, view management, rule management, audit monitor, data dictionary track. this paper, which use orient - object model designing idea, design and realize a common data security control of application system

    本論文側重研究基於b s三層體系結構下的大型關系數據庫的安全機制,從用戶管理、授權機制、靜態設置、角色管理、監控、數據,多側面、多角度討論了數據安全管理策略,並且利用面向對象建模思想,在《龍口港信息系統》中構建並實現這種通用模型? ?數據庫安全控制器dbsc的設理念。
  9. Review and track the localization plan of the import parts

    進口件的國產化劃評
  10. Audit trail on fixed asset investment project of construction project

    對建設工程固定資產投資項目的跟蹤審計
  11. Based on freeway track audit practice, this paper introduces the practical significance of the expressway audit tracking, points out the relations that should be well treated during the process of implementing, also it emphasizes the role and effect of tracking and auditing mechanisms in highway construction projects

    摘要結合某高速公路跟蹤審計實踐,提出跟蹤審計質量保證措施和風險防範對策,指出跟蹤審計實施過程中應處理好的幾個關系,強調跟蹤審計機制在高速公路建設項目中的作用及應用效果。
  12. In the past few years, such environmental issues has impeded its sustainable development and increased the plant ' s operation cost, which means reduced competitive ability. this paper first introduces the plant ' s current situation and environmental issues. then it pointes out that cleaner production will the right approach for the plant to initiate its own environmental program, especially its significance and urgence

    在此基礎上,運用清潔生產理論,指導企業實施清潔生產,並進行了清潔生產的全過程,對清潔生產的各階段工作進行了細致分析,總結出好的經驗和做法,指出不足和存在的問題,提出了解決問題的具體措施和建議。
  13. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行的安全技術,開發符合信息安全管理需要的工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自主知識產權且能與國際接軌的技術標準,以提高國內信息網路防禦能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國防建設、尖端科學技術等重要領域的算機信息系統的安全。
  14. On the keystone problems of the national construction items tailing after performance audit

    國家建設項目績效重點問題初探
  15. Information technology - open systems interconnection - systems management - part 8 : security audit trail function

    信息技術開放系統互連系統管理第8部分:安全功能
  16. Maintain an audit trail and documentation for system audits

    為系統保留和文檔。
  17. Drives, follows up and checks for efficiency all the action plans resulting from s / r audits

    推動、和檢查所有來自s / r核的所有行動劃的有效性。
  18. Follow up and checks for efficiency all the action plans resulting of the product and process audits

    並檢查由產品和過程核結果產生的所有行動劃的有效性。
  19. Secondly, the dissertation summarizes the reasons and purposes of design change, and amply discusses the design change entirely process and every item of the process, including change suggestion, change audit, change appeal, establishing change tasks, change executing, auditing and publishing change result, change notice, change perform and change track

    接著,論文歸納總結了設變更的原因與目的,詳細論述了設變更過程,就變更過程中的每一活動項,包括變更建議、變更評、變更申請、制定變更任務、執行變更、評發放變更、發放變更通知、變更實施和變更進行了闡述和分析。
分享友人