非法操作 的英文怎麼說

中文拼音 [fēicāozuò]
非法操作 英文
illegal operation
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • 非法 : illegal; unlawful; illicit
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保數據傳輸的安全性,運用流密碼對數據進行加密傳輸,防止外來者的攻擊,未經授權進行數據讀寫
  2. Describes the intricacies of the method that is central to beginning a drag operation

    描述對于開始拖動常重要的方的復雜性。
  3. The most important is to prelect the benefits of creditors. however in practice, the phenomenon of violating creditor ' s rights is always happened. the abusing of rights of bankruptcy is a illegal act. nowadays, the bankruptcy liquidation system of our country is not so perfect, which leads to no particular law to practice. there are enterprises take advantage of it, so they can evade their debts. this phenomenon influences the rights of creditors badly. this essay firstly introduces the expression of damaging the rights of creditors in enterprise bankruptcy, and then further analyses it. this essay analyses the protection of the rights of creditors from these aspects that system of bankruptcy truslee, creditor autonomy, discontinuation of execution, legal responsibility. by seting up a perfect system of bankruptcy truslee, we can contral insolvent properties efficiently

    破產是一種保護,破產的基本原則是既保護債權人也保護債務人的利益,其中重在保護債權人的利益,而實踐中由於種種原因,債權人的利益被侵犯的不正常情形屢屢發生,其中破產權利的濫用更是一種惡意逃債的違行為。目前我國的破產清算制度和律體系還很不完善,尤其是全民所有制企業人的破產清算制度尚未完全建立,實踐中普遍缺乏可供律、規的具體規定,從而導致了利用公司破產、被吊銷等以達到逃避債務目的的現象常普遍,嚴重損害了債權人的利益。本文從企業破產過程中損害債權人利益的表現入手,對我國企業破產實踐中的損害債權人利益的原因進行剖析。
  4. There are many reasons such as the outburst of gas, penetrator, wrong operation, disabled monitor and malfunction from equipments etc. except man - made and outburst accidents, equipments malfunction takes great proportionment. therefore, a complete security and real - time monitor system of a coal mine based on large equipment is urgent to be development for high frequency of mine accidents

    近年來,我國煤礦安全事故頻頻發生,原因有瓦斯突出、透水滲水、非法操作、監控失效和設備故障等造成,除了人為和突發事件外,設備故障引起的事故也占不小的比例,因此建立完整的煤礦大型設備實時監測系統常必要。
  5. The non - simp chinese system player, if you can not run the setup, youcan try to rename the setup programs name to anything you want. example : change it to a number, then you can run the set up

    簡體中文系統的玩家,如果無運行安裝,可以嘗試將安裝程序隨意更改一個文件名,比如一個數字之類,這樣就能正常安裝了,謝謝支持! !
  6. Introduction : naiwan very fun and the combat game, you will drive your weijia desert and the enemies of combat, kill them all is the only way clearance operation guide : start explaining options for the beginning new nagames successor mission contime training model tutor ial efforts produced lists credits in addition to the training mode after entering the menu is as follows : - please select tasks of the mission on the bottom - armored and armed adjustment can chang enter the name of the game : welcome 4455 miniclip games network, the site domain name to remember : 4455. cc and 3839. cc

    常好玩而且耐玩的戰游戲,你將駕駛著你的機甲和沙漠的敵人們展開戰,把他們全部幹掉是唯一的過關方指南:解說開始選項為最初開始new game接續任務contime訓練模式tutorial協力製名單credits除了訓練模式外進入后選單如下: -任務選擇請于下方的任務介紹-裝甲能調整以及武裝變更set up武裝切換weapons裝甲切換armor噴射方式jump mode微調噴射charge強噴射trigger調整內容為customize持有cp custom point裝甲調整aamor耐久提升max裝甲提升defense移動提升nbsp
  7. Normally, a dom implementation must verify the correctness of operations and throw an exception if an application passes the wrong parameters or performs an illegal operation

    一般情況下, dom實現必須檢驗的正確性,並在應用程序傳遞錯誤參數或者執行非法操作時拋出異常。
  8. For example, if your program attempts to perform an illegal operation, such as converting a non - numeric string to a numeric value, a run - time error occurs

    例如,如果程序試圖執行非法操作(如將一個數值字元串轉換為一個數值) ,就會發生運行時錯誤。
  9. Allows the code in the assembly to perform illegal operations against the sql server process space and hence can potentially compromise the robustness and scalability of sql server

    如果指定unsafe ,將允許程序集中的代碼對sql server進程空間執行非法操作,因此可能會影響sql server的性能和可縮放性。
  10. But the cctv was rigged with a fluctuating log - on, and -

    但是cctv有時候會發生非法操作的錯誤還有
  11. But the cctv was rigged with a fluctuating log - on, and - -

    但是cctv有時候會發生非法操作的錯誤還有. .
  12. Mister kerviel was charged with breach of trust and illegal computer activity

    科維爾先生被控違犯信任及計算機非法操作
  13. The user requested an illegal operation, such as spawning a class from an instance

    用戶請求了非法操作,如從實例生成類。
  14. The justice department has charged the five with operating illegally as venezuelan government agents

    部門指控這五人身為委內瑞拉政府職員進行非法操作
  15. It can not only cope with external attacks but also detect the misuse of the legitimate users

    它不僅幫助系統對付外來網路攻擊,還可以查知內部合用戶的非法操作,擴展了系統管理員的安全管理能力。
  16. For example, a user might perform an illegal operation in a system without the ability to trace the prohibited operations

    例如,如果沒有跟蹤被禁止的的功能,用戶可能會在系統中執行非法操作
  17. Application isolation in this context is fundamentally about preventing the illicit actions of one application from harming another

    在此上下文中的應用程序隔離基本上是關于如何防止一個應用程序的非法操作對另一個應用程序造成傷害。
  18. Intrusive action or the illegal operation of possibly occurring is distinguished to the various states that the main engine intruding checkout system can monitor the main engine at real time, and voluntarily stops the illegal operation when intruding the action to occur, and the protection main engine system is not intruded

    摘要主機入侵檢測系統可以實時監測主機的各種狀態,辨別可能發生的入侵行為或非法操作,在入侵行為發生的時候自動阻斷非法操作,保護主機系統不受入侵。
  19. Since it will never return a pointer value that is already in use in the current program unless you are doing something illegal, such as using memory after it has been freed

    的c運行時庫實現,因為它決不會返回已經在當前程序中使用的指針值(除您執行某個非法操作,如在內存已被釋放之後使用它) 。
  20. As a part of is ( information security ), also one of the standard security services established by iso ( international standard organization ). access control is used to protect important resources, for instance, prohibits illegal user ’ s access to the confidential resources, restricts legal users ’ operation in their permitted set of operation and prevents resources from damages due to carelessness

    為信息安全體系的一部分,同時也是國際化標準組織定義的五項標準安全服務之一,訪問控制在保護重要資源方面有相當重要的用,包括防止用戶訪問機密信息,限制合用戶的非法操作,以及由於疏忽所造成的誤對資源的破壞。
分享友人