security restore 中文意思是什麼

security restore 解釋
安全恢復程序
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • restore : vt 1 拿回原處,恢復原狀;復舊;恢復;復活,復興,再興(制度、習慣等),使復位,使復職,使復辟。2 ...
  1. Israel, palestinians restore security link

    以色列巴勒斯坦重回安全臨界線。
  2. The security council can restore the rights of a suspended member state.

    安全理事會可恢復會員國被中止的權利。
  3. Where the value of the mortgaged property has declined, the mortgagee shall be entitled to demand that the mortgagor restore the original value of the mortgaged property or provide security corresponding to the amount of the lost value

    抵押物價值減少時,抵押權人有權要求抵押人恢復抵押物的價值,或者提供與減少的價值相當的擔保。
  4. The president says 30, 000 additional u. s. troops deserve the chance to show that they can help restore security and aid iraq ' s government in protecting its own people

    總統說增兵3萬可以維持其自身安全還會幫助伊拉克政府保護其人民的安全。
  5. The president says 30, 000 additional us troops deserve chance to show they can help ( restore ) the security and aid iraq government ' s ( in ) protecting its own people

    總統說3萬名補充部隊的士兵值得看到他們可以幫助伊拉克恢復安全並且幫助伊拉克政府保護他們的人民
  6. The writer thinks : one concept should be use to express the various statuses of validity of contract brought from rescinding contract in part or whole ; at first, the right to decide whether to restore the original status belongs to parties of contract, then it belongs to judge or arbitrator, however, when decided, they should be bound by following actors : performance and character of contract, provisions in law, dealing security of a third, opinions of superior department, purpose of system of rescinding contract and principles of fairness and benefit, etc

    本文認為,應使用「合同解除」一個概念表述合同效力部分或全部消滅的各種形態;合同解除是否溯及既往,首先是當事人的權利,其次是載判者的權力,但無論如何,都應受到如下因素的限制,即合同性質、履行狀態、法律規定、第三人的交易安全、主管部門的意見、合同解除的規范目的和公平與效率原則等。
  7. My net assistant can optimize settiongs automatically, if you are an advanced user, you can optimize settings manually ; backup and restore with the optimization, the ones that can make users relaxed will resume the state before optimized, in order to ensure the system security. 2. maxmtu automatically discovery : specifies whether microsoft tcp ip will attempt to discover the largest packet size the mtu over the path to a remote computer

    1 .領先的網路優化項目,全面提升網路性能:軟體開發組通過對windows操作系統環境9x me nt 2000 xp 2003下的500臺電腦的實際評測分析,自主分析評測出絕對領先的多達29項的網路優化項目,通過智能化的自動優化向導,將網路系統參數設置得更合理,讓用戶的網路性能發揮到最高點為方便高級用戶,軟體內置了詳細的自定義手工優化系統,可以更精確的設置各個項目最安全最先進的系統同步備份與還原功能,可以讓用戶輕松的將系統恢復到優化以前的狀態,以保障系統的優化安全。
  8. Tools : backup, process, memory boosters, monitoring connection, uninstall utilities, autorun, shutdown utilities, system locking, time synchronizers etc. really accomplishing have can use it 9. backup and restore with the optimization : the ones that can make users relaxed will resume the state before optimized, in order to ensure the system security

    9 .最安全最先進的系統同步備份與還原功能:由軟體開發組獨創的最安全最先進的系統同步備份與還原功能,可以讓用戶輕松的將系統恢復到優化與設置以前的狀態,以保障系統的優化與設置安全。
  9. Security considerations for backup and restore

    恢復數據庫后,不得再還原任何備份。
  10. But, we can use information assurance to improve the network ' s security. information assurance focus on the system ' s intrusion detection ability, event reaction ability and the quick restore ability when system has been intruded

    信息保障強調為了保障信息安全,除了要進行信息的安全保護,還應該重視提高系統的入侵檢測能力,系統的事件反應能力和系統遭到入侵引起破壞的快速恢復能力。
  11. The model integrates one backup - restore and data mining module for the data of security audit

    該模型針對安全審計數據,融合了一個備份恢復和數據挖掘模塊。
  12. " in accordance with the established adjustment mechanism based on the movements of the specially compiled social security assistance index of prices, the proposed adjustment is meant to restore the purchasing power of the recipients to maintain the standard of living intended by the cssa scheme

    楊醫生說:根據既定的調整機制,即特設的社會保障援助物價指數的變動來建議作出調整,是要把金額回復到可維持受助人基本生活水平的原有購買力。
  13. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  14. Malware incidents can cause extensive damage and disruption to a network, and they require costly efforts to restore system security and user confidence

    惡意軟體事故可對網路造成大范圍的危害和分裂,並且需要極大的努力來恢復系統安全和用戶信任
  15. You can choose whether to restore existing security information or skip security membership information

    可以選擇是還原現有安全信息還是跳過安全成員身份信息。
分享友人