valid access 中文意思是什麼

valid access 解釋
有效存取
  • valid : adj 1 (理由、證據等)有確實根據的,確鑿的;正確的;健全的,站得住的。2 【法律】(契約、選舉等)...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. A program may access memory within a valid block buffer

    一個程式可以存取在正確的區塊緩沖區中的記憶體
  2. Your client access licenses are already at or above the number that this disk is valid for

    您的客戶端訪問許可證已經等於或大於該磁盤的有效數目。
  3. A term indicating conformance to standards or criteria ; for example, “ valid data ” is data that has been checked for errors ( and corrected if necessary ) and a “ valid reference ” is a reference that correctly ? identifies ? a storage location in an area to which a program has access rights

    指出與標準或準則的一致性而用的術語,例如, 「有效數據」指經過差錯校驗的數據(如果需要,已經過糾正) ,而「有效引用」是一種引用,它正確地標識出程序可以訪問的區域內的一個存儲單元。
  4. Article 13 when applying to access units for international networking, subscribers shall submit valid identification papers and other supporting documents and fill in subscribers ' registration forms

    第十三條用戶向接入單位申請國際聯網時,應當提供有效身份證明或者其他證明文件,並填寫用戶登記表。
  5. It also enables them to access information on various databases, including the enhanced police operational nominal index computer system eponics for wanted or missing person checks ; transport department s driver licence integrated data system valid for vehicle information and stolen vehicle checks ; and immigration department s registration of persons system for forged id card checks

    警務人員亦可利用手提無線電通訊機和流動數據終端機登入多個數據庫,如在第二代警務處姓名索引電腦系統中檢索通緝或失蹤人士資料運輸署的車輛牌照及駕駛執照綜合資料電腦系統中檢索失車資料,以及入境事務處的人事登記系統中檢索偽造身份證資料。
  6. The highlighted section of access road to from the shenzhen bay port is a closed road. except taxis, only vehicles with a valid closed road permit are allowed to enter the closed road

    圖中著色部份往來深圳灣口岸的道路屬于封閉道路,除的士外,進入該路段的車輛必須持有有效封閉道路通行許可證。
  7. The general public, including those who have already been granted valid permits to mai po, will be prohibited access to the restricted area of the nature reserve

    所有市民,包括已獲得進入米埔許可證的人士,一律禁止進入自然保護區的禁區范圍。
  8. In order to obtain an access key, you must have a valid developer s key

    為了獲得訪問密鑰,您必須擁有有效的開發者密鑰。
  9. If you are using default security, each user who requires access to a report server must have a valid windows user account or be a member of a windows group account

    如果您使用默認安全性,則需要訪問報表服務器的每個用戶都必須擁有有效的windows用戶帳戶或是windows組帳戶的成員。
  10. The hksar passport is valid for travel to all countries in the world. over 130 countries or territories have granted visa - free access or visa - on - arrival to hksar passport holders

    香港特別行政區護照在全球有效,現時已有超過一百三十個國家和地區給予香港特別行政區護照持有人免簽證或落地簽證安排。
  11. You can refer to a valid nis netgroup or unix group by appending an " @ " to the group name. valid users example to allow drobbins and the members of the wheel group access to the shares

    雖然我最先是用expect編寫dom 2監視程序,但隨后的實例將使用python來編寫,這只是為了強調其中的這些觀念適用於很多不同的語言。
  12. And design the acl valid check algorithm and acl access check algorithm

    設計了訪問控製表有效性判斷策略和訪問控制規則檢查策略。
  13. However, developers will still push the real estate investment 20 percent plus higher although the policy of cooling down the redhot sector will remain valid such as strict control on demolition, difficult access to credit, and more implementation of land control policy. this, plus the effect of the interest rate hike last october, is expected to work

    石家莊到太原線路由石家莊運輸總公司河北省高客公司石家莊裕通有限公司聯合運營,是近年來石家莊高速客運市場首次批量換車,作為石家莊運輸市場的形象工程,市委市政府對此線路的改造非常重視,對投入運營的車輛要求相當嚴格。
  14. Parameter is not a valid index in this access control list

    參數在此訪問控制列表中不是有效索引。
  15. No valid access point defined. define now

    沒有定義有效的通路點。現在定義
  16. Unless we have a valid access code, this isn ' t gonna work

    除非我們有一個有效的通行密碼,要不這樣不行的。
  17. In addition, certain data access operations may only be valid if run under the caller s context

    此外,某些數據訪問操作可能只有在調用方的上下文中運行時才有效。
  18. Force user is one of my favorite parameters. it forces all file modifications to be performed by the account of a single user. you ll want to use the valid users option often with this one so that you can limit access to select users

    盡管很多開發者都想要這樣一個應用程序(我已經做出了四種不同的解決方案) ,但似乎很少web工作者知道如何為他們自己編寫此類監視程序的代碼。
  19. It is composed of two aspects : first, it uses the java sandbox to control the access of host resource, thus it can prevent the host resource from being accessed by agents without authority ; second, it adopts a authentication based mobile agent transfer protocol to control the transfer of agents in order to refuse the transfer request of invalid agent. thus, it can guarantee that the agent running in the host is valid, in other words, it avoids performing the illegal agent in the host. further more, it can be sure that the agent status data have n ' t been tampered or replaced in the course of transfer

    該方案主要包括兩個方面內容:一、利用java2沙箱控制主機資源的存取,防止主機資源被移動代理非授權訪問;二、採用一種基於證書的移動代理遷移協議,對移動代理的遷移過程進行控制,拒絕不合法移動代理遷移至主機的請求,確保主機上運行的移動代理具有合法身份,並且確保移動代理遷移狀態數據在遷移過程中不被篡改或替換。
  20. In this model, a local voice server is used to compound voice, broadcast voice, receive dual tone multi frequency ( dtmf ) code and perform concurrent working ; in the meantime, some mature internet technologies such as routing, virtual private network ( vpn ) along with thread technology are also used to carry out valid, reliable access to remote database

    在這個模型中,用本地的語音服務器進行語音的合成與播放、接收雙音多頻碼和實現并行工作,同時利用internet中成熟的路由及安全加密等技術對異地數據庫進行有效和可靠的訪問,以獲得語音服務所需要的數據。
分享友人