配置碼 的英文怎麼說

中文拼音 [pèizhì]
配置碼 英文
configuration code
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  1. Remote configuration, caller id and distinctive ring service

    遠程,呼叫者號和鈴聲識別服務。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統、帳戶設及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在、管理和應用方面提供了基本的框架。
  3. And produce 100 lines of readable configuration code

    它產生100行可讀的
  4. In the array scheme of with the diaphragm, the optimization of semiconductor optoelectric devices array forms a sky screens. while the bullel passing through the sky screens, the outputs of optoelectronic devices are amplified and coded, and then transmitted to the computer for processing

    半導體光電件陣列方案是將半導體器件陣列和光闌合理,形成天幕,將彈丸過靶信號光電轉換、放大,經過編處理,最後送入計算機處理。
  5. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略目標包括控制對數據的原始訪問、保護內核和系統軟體的完整性、防止有特權的進程執行危險的代,以及限制由有特權的進程缺陷所導致的傷害。
  6. You should, of course, configure ssl from webseal to the application server to ensure that the secret password is not sent in cleartext

    當然,您應該從webseal到應用服務器的ssl以確保該機密密不會以明文方式發送。
  7. You might also check to make sure that you use " no codepage translation " within your client configuration

    還應該檢查以確保在客戶機內使用了「無代頁轉化」 。
  8. The following code example is a web. config configuration section that demonstrates how an

    下面的代示例是一個web . config節,它演示如何將一個
  9. How to : configure source control file encoding

    如何:源代管理的文件編
  10. Describes the steps used to configure custom check - in notes associated with team foundation source control check - ins

    描述用於與team foundation源代管理簽入關聯的自定義簽入說明的步驟。
  11. Describes the steps that are used to configure custom check - in notes associated with team foundation source control check - ins

    描述用於與team foundation源代管理簽入關聯的自定義簽入注釋的步驟。
  12. You should then install and configure the example code

    然後安裝並示例代
  13. Next, you need to configure the example code

    接下來,需要示例代
  14. This simulation training system has many excellent features, such as programming easily, comprehending facilely, maintaining conveniently, system functions extending simply. in the course of the design and implementation, the generalization of equipments, the verisimilitude of simulation, the flexibility of configuration, the intelligentization of training environment and the multimedia of feedback information are emphasized

    本模擬訓練系統具有易於代開發、易於理解、易於維護管理、易於系統功能擴展的特點。在系統的設計、實現過程中,特別突出了設備的通用性和典型性、模擬的逼真性、的靈活性、模擬環境的智能化和反饋信息的多媒體化。
  15. Compact design with powerful multiple functions that help you to create growth the full - configured document centre 186 156 is a digital multifunctional device with printing, copying, fax and e - mail functions

    的document centre 186 156是一款小而全的數多功能機器,有著出色的列印復印傳真和電子郵件功能。
  16. Configuration options are marked with letter codes as follows

    選項按以下字母代標記:
  17. The common information they need are various types of job standards, operation regulations and working data. operators need telephone number list, formulated vocabulary, problem process program, while technicians need the working status information of the equipment ( normal, abnormal, busy, idle ), exception handles, routine maintenance procedures and the equipment configure data. the users of controlling layer are directors in charge of administration or technology who concerned with the operation of ccs

    他們所需的信息主要有:各類工作標準、操作規程、業務資料,如話務員需要電話號簿、接轉規范用語、疑難問題處理程序及案例;糾察員需要話務員接續過程錄音、用戶申告內容和糾察評分標準;技術員需要設備工作狀態(正常、異常、繁忙、空閑)信息、故障處理程序、例行維護程序、設備資料;受訓人員需要訓練課程計劃、教學課件等。
  18. Will fail to retrieve the password from the profile

    將無法從文件檢索密
  19. Object containing the source code required to retrieve a connection string from the application s configuration file

    對象,包含從應用程序的文件檢索連接字元串所需的源代
  20. By using modern computer simulating technology, this paper develop computer simulating model and do a deep research on container terminal logistics system to provide quantitative support for the decision of the tian jin container terminal facility configuration, revealing the interactive relation among the components of the container terminal logistics system

    本文結合先進的計算機模擬研究技術,針對天津港2001年的港口運營資料開發出計算機模擬模型,對集裝箱頭物流系統進行了深入的研究,揭示了集裝箱頭物流系統內部元素之間的關系,為天津港頭設備的決策提供定量依據。
分享友人