intimity 中文意思是什麼

intimity 解釋
n. 名詞 1. 秘密,親密。
2. 本質,本性。

  1. The students of arts thought more of " intimity " and " learning " than the students of science

    情境模擬控制兩個變量,即「信息公開與否」和「是否與己有關」 。
  2. Firstly, the surface characteristic of polystyrene particle is changed from water detesting to water intimity by using special techniques and admixtures so mat the compound quality with inorganic materials is insured. secondly, the contradiction between the weight and strength is solved through optimizing the particle size and using composite fiber and the best heat conductivity is achieved under the condition that the necessary strength is met. in the research process, the author solved the problem of fiber dispersing in insulating materials so that the contraction of the material is controlled

    課題研究中,首先採用特殊的改性工藝及外加劑實現對聚苯乙烯顆粒表面的成功改性,使其表面由憎水轉化為完全親水,確保與無機材料的復合質量;其次,通過採用優化骨料級配及使用復合纖維等措施解決了保溫材料的輕質與強度的矛盾,使保溫材料在滿足必要的強度的前提下,導熱系數降至最小;並且,課題研究中成功解決了纖維在保溫材料中均勻分散的問題,達到了抑制保溫材料收縮的目的;最後,通過採用復合外加劑、合適的膠凝材料及合理的配比等措施確保該保溫材料具有良好的和易性,滿足施工的要求。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
分享友人