单词 | permission |
释义 | permissions是permission的复数
复数:permissions 过去分词:permissioned 现在分词:permissioning v. n. give permission,get permission,grant permission,need permission,ask permission adj. n. special permission,write permission,official permission 例句释义: 许可,权限,许可权,访问权限 1. Users trying to encrypt or decrypt with the specified key must have the required permissions to access the key container. 尝试用指定密钥进行加密或解密的用户必须具有访问密钥容器的所需权限。 msdn2.microsoft.com 2. SQLite has no concept of user accounts, and instead relies on the file system for all database permissions. SQLite没有用户帐户概念,而是根据文件系统确定所有数据库的权限。 www.ibm.com 3. If multiple users have identical files, they may be unable to restore a file, as their file permissions do not allow this. 如果多个使用者拥有完全相同的文件,他们可能因为「他们的文件权限的不允许」而无法回复一个文件。 www.gnu.org 4. If the database being restored does not exist, the user must have CREATE DATABASE permissions to be able to execute RESTORE. 如果不存在要还原的数据库,则用户必须有CREATEDATABASE权限才能执行RESTORE。 msdn2.microsoft.com 5. The change and write permissions are quite well handled in Microsoft Active Directory, so please do not worry about this for now. 写入和修改权限的问题在MSAD中很好的解决了,所以现在不用为这个烦恼了。 www.bing.com 6. Now that you can add or remove permissions, you may wonder how to set just a specific set of permissions. 现在已经可以添加或者删除权限了,您可能会想,怎样才能只设置一些特殊权限。 www.ibm.com 7. The right to read permissions on this object, write all the properties on this object, and perform all validated writes to this object. 读取此对象上的权限、写入此对象上的全部属性以及执行此对象所有已验证写入的权限。 msdn2.microsoft.com 8. If this is possible, the infrastructure team can place in the app. policy file the default permissions for all applications on that node. 如果不可能这样做,基础设施团队可以在app.policy文件中设置该节点上所有应用程序的缺省权限集。 www.ibm.com 9. Clearly, it must be possible to uniquely identify a piece of running code to ensure that there is no confusion as to its access permissions. 显然,一定要能惟一地标识一段运行代码以保证它的访问权限没有冲突。 www-128.ibm.com 10. It is quite easy to grant a user all database permissions and authorities using the Control Center, as is shown in Figure 1. 通过使用ControlCenter,很容易为一个用户授予所有数据库许可和权限,如图1所示。 www.ibm.com 1. Sharing permissions can be granted to an individual or to a group of users on the same network. 可以将共享权限授予同一网络中的单个用户或一组用户。 windowshelp.microsoft.com 2. It is often useful to have remote procedures to identify the caller and to run with the permissions associated with that identity. 通常让远程过程标识调用方并采用与该标识关联的权限运行是很有用的。 msdn2.microsoft.com 3. By default, at least one of these permissions is granted to members of the Contributor, Web Designer, and Administrator site groups. 默认情况下,至少会向参与者、网站设计者和管理员网站组的成员授予其中一种权限。 office.microsoft.com 4. The account must have Full Mailbox Access permissions to all mailboxes for the tool to be able to update the mailboxes. 帐户必须具有针对所有邮箱的完全邮箱访问权限,这样工具才能更新邮箱。 support.microsoft.com 5. An error occurred while trying to copy files . Check for adequate disk space and valid permissions on the destination directory . 在尝试复制文件时出现错误。请检查磁盘空间是否够用并且在目标目录上有足够的权限。 www.bing.com 6. However, it is often unreasonable for your caller to have such powerful permissions. 然而,调用方具有如此强大的权限常常是不合理的。 msdn2.microsoft.com 7. Note that this tool only shows permissions that have been explicitly requested by the application using declarative syntax. 注意,该工具仅显示由应用程序使用声明式语法显式请求的权限。 msdn2.microsoft.com 8. This code group does not grant any permissions to the folder; it is just a container for the next code group. 此代码组不授予该文件夹任何权限;它只作为下一个代码组的容器。 msdn2.microsoft.com 9. The permissions established for a directory also apply to its subdirectories, unless configuration files in a subdirectory override them. 为目录建立的权限也会应用到其子目录,除非子目录中的配置文件重写这些权限。 msdn2.microsoft.com 10. Be aware that SQLite relies solely on the file system for its database permissions and has no concept of user accounts. 要知道,SQLite的数据库权限只依赖于文件系统,没有用户帐户的概念。 www-128.ibm.com 1. This behavior is different to that of stored procedures, which execute with the permissions of the owner. 此行为与存储过程的行为不同,执行存储过程需要所有者权限。 www.ianywhere.com 2. Specifies the name of a column in a table on which permissions are being revoked. 指定表中将撤消其权限的列的名称。 msdn2.microsoft.com 3. It is the application responsibility to check the permissions of the remote host trying to connect to a listening socket. 应用程序负责检查尝试连接到侦听套接字的远程主机的权限。 technet.microsoft.com 4. Specifies the name of a column in a table on which permissions are being granted. 指定表中将授予其权限的列的名称。 msdn2.microsoft.com 5. Notice that, in the case of remote host resource, no check is performed to see that Connect permissions exist. 注意,在远端主机资源的情况下,不会执行检查来查看连接使用权限是否存在。 technet.microsoft.com 6. Specifies the name of a column in a table on which permissions are being denied. 指定拒绝将其权限授予他人的表中的列名。 msdn2.microsoft.com 7. All default groups are created with a specific set of permissions, which might or might not suit the business needs of your organization. 所有默认组都是使用特定权限集创建的,这些权限可能适合您组织的业务需求,也可能不适合。 technet.microsoft.com 8. If you specify a path to a different computer, you must have sufficient permissions to be able to read and write to the target location. 如果您指定通往其他电脑的路径,您必须具有足够权限才能够读写目标位置。 technet.microsoft.com 9. Permissions model: The permissions model allows user roles to be applied to any in the system. 权限模型:权限模型允许对系统中的任何内容应用用户角色。 www.ibm.com 10. They may be a lot nicer with your permissions if you help them out with protecting the servers they're responsible for. 如果您能帮助保护他们负责的服务器,那么他们可能会更乐于为您提供所需的更多权限。 www.ibm.com 1. She wants user Scott to be able to truncate the table, but Scott has no direct permissions on the table. 她想使用户Scott能够截断该表,但Scott不具有该表的直接权限。 msdn2.microsoft.com 2. With your practice site set up, you're ready to manage the users and permissions on the site. 建立了练习网站后,您就可以管理网站上的用户和权限了。 office.microsoft.com 3. Files in the folder "%B" cannot be deleted because you do not have permissions to see them. 文件夹“%B”中的文件无法删除,因为您没有读取它的权限。 translations.launchpad.net 4. Files in the folder "%B" cannot be handled because you do not have permissions to see them. 无法处理资料夹“%B”中的档案,因为您没有权限读取它们。 translations.launchpad.net 5. Notification Services grants some of the permissions necessary to run condition actions to this database user. NotificationServices将运行条件操作所需的部分权限授予此数据库用户。 msdn2.microsoft.com 6. Even though you are not the database owner, you will still be able to use any tables that you have permissions to see. 即使不是数据库所有者,您仍能使用对其有查看权限的任何表。 msdn2.microsoft.com 7. To provide an endpoint for a specific application, DENY CONNECT permissions to all users except the users for that application. 若要为特定应用程序提供端点,请授予除使用该应用程序的所有用户DENYCONNECT权限。 msdn2.microsoft.com 8. The default selection is Allow this workflow to be manually started by an authenticated user with Edit Items Permissions . 默认选择为“允许已验证用户手动启动此工作流”。 www.bing.com 9. You can parse the statement text to determine which permissions were applied to which columns. 可以分析语句文本来确定各列所应用权限的情况。 msdn2.microsoft.com 10. To carry out these actions using the REST API, you must be a user with at least Cloud Administration role permissions. 要使用RESTAPI执行这些操作,您必须是一个至少拥有CloudAdministration角色权限的用户。 www.ibm.com 1. The actual permissions of a user are the union of permissions granted to each role to which the user belongs. 用户的实际权限是授予用户所属每个角色的权限的联合。 msdn2.microsoft.com 2. Sufficient permissions to be able to create and run Windows Forms application projects on the computer where Visual Studio is installed. 足够的权限,以便能够在安装VisualStudio的计算机上创建并运行Windows窗体应用程序项目。 msdn2.microsoft.com 3. Note that the command line above is for a Linux machine, and that you may need to run tcpdump with root or administrator permissions. 请注意,上面的命令行适用于Linux机器,并且您可能需要拥有root权限或管理员权限才能运行tcpdump。 www.ibm.com 4. Access denied creating the conference. It is possible that the specified security permissions could not be authenticated! 创建会话时访问被拒绝。可能指定的安全许可不能被身份验证! www.fan6.net 5. If it does, the managed code wrapping it must demand the necessary permissions before allowing it to be entered. 如果是,则包装它的托管代码必须请求所需的权限,才能输入代码访问安全性。 msdn2.microsoft.com 6. To call the OpenFile method, your assembly requires a privilege level granted by the System. Security. Permissions. FileIOPermission class. 若要调用OpenFile方法,程序集要求有System.Security.Permissions.FileIOPermission类授予的权限级别。 msdn2.microsoft.com 7. Revoking permissions will protect the source team project from any further changes and enable you to save it for historical reference . 撤消权限将保护源团队项目避免任何进一步的更改,并且使您可以保存它以用于历史参考。 www.bing.com 8. Like a changeset, a shelveset can be retrieved from the server into a local workspace by any user who has sufficient permissions. 与变更集类似,搁置集可以由具有足够权限的使用者从伺服器撷取到本机工作区。 msdn.microsoft.com 9. Isolated storage is an attempt to solve problems created when working with files where the user or code may lack necessary permissions . 独立存储的用途是尝试解决在处理用户或代码可能对其缺少必要的权限的文件时所产生的问题。 www.bing.com 10. If not, or if it still is not accessible, please check your audio setup, the permissions and that the device is not busy. 如果不是,或还是无法访问,请检查您的音频设置,权限以及设备是否忙。 translations.launchpad.net 1. However, the user policy level is allowed to decrease permissions, which might potentially cause applications to stop functioning properly. 但是允许用户策略级别减少权限,减少权限有可能导致应用程序无法正常工作。 msdn2.microsoft.com 2. Establish permissions for specified users to be able to run the build type created. 建立权限使指定用户能够运行创建的生成类型。 msdn2.microsoft.com 3. Members of other database roles can only view or update the data objects to which they have specifically been granted such permissions. 其他数据库角色的成员仅可以查看或更新那些针对其专门授予角色相应权限的数据对象。 msdn2.microsoft.com 4. Each database role has a customized set of permissions to let users access data and perform tasks within a particular database. 每个数据库角色都具有一组自定义的权限,以允许用户在特定数据库内访问数据以及执行任务。 msdn2.microsoft.com 5. Access Control List (ACL): An ACL is a data structure that associates to a set of principals a list of permissions for a service. 访问控制列表(ACL):ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。 www.ibm.com 6. A context switch to a database user does not inherit the server-level permissions of that user. 对数据库用户的上下文切换不会继承该用户的服务器级别权限。 technet.microsoft.com 7. Only grant permissions to specific project folders that contain assemblies you know are safe to execute. 仅将权限授予特定的项目文件夹,这些文件夹包含您确信可以安全运行的程序集。 msdn2.microsoft.com 8. Strong names are well suited to specifying code assemblies to which you give a rich set of powerful permissions. 强名称非常适合于指定您给予了大量的、非常大权限的代码程序集。 msdn2.microsoft.com 9. Requesting permissions increases the likelihood that your code will run properly if it is allowed to execute. 如果允许代码执行,则请求权限可增加代码正常运行的可能性。 msdn2.microsoft.com 10. The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules. 实际上,帐号、密码和权限只能在遵守固定规则的操作系统环境中保护您的数据。 www.ibm.com 1. Receive connectors grant permissions to security principals or to permission groups. 接收连接器将权限授予安全主体或权限组。 www.microsoft.com 2. Ensures that the user trying to access the resource has the permissions or rights to the resource. 确保试图访问资源的用户具有所需的权限。 www.ibm.com 3. The only other way to insure that unwanted permissions do not creep in is to dump them and compare them to your script. 确保不会出现不希望的权限设置的唯一其他方法是进行转储并与您的脚本进行比较。 www.ibm.com 4. Tuesday through Thursday expect new colleagues to ask for special permissions or acknowledgement. 从周二至周四期待新同事要求特别许可或承认。 www.douban.com 5. To which certain access permissions have been granted by the security policy . 安全策略对这个保护域授予了某种访问权限。 www.bing.com 6. Choose whether to use the same permissions as the parent site or to use unique permissions. 选择是使用与父网站相同的权限还是使用独有的权限。 office.microsoft.com 7. Correct permissions may not have been replicated to the domain controller that this Exchange server is trying to connect to. 可能未将正确的权限复制到此Exchange服务器尝试连接的域控制器。 www.microsoft.com 8. Set permissions within a report model (also referred to as model item security). 设置报表模型内的权限(也称为模型项安全性)。 technet.microsoft.com 9. The system sets permissions for all the files in an application so that only the user ID assigned to that application can access them. 应用中的所有文件访问许可都被系统设置了此ID,因此,只有被分配了该用户ID的应用可以访问这些文件。 www.cnblogs.com 10. You are now ready to mount the file systems, check permissions, and verify the file system contents. 现在已经可以加载文件系统了,检查权限并确认文件系统目录。 www.ibm.com 1. DECLARE CURSOR permissions default to any user that has SELECT permissions on the views, tables, and columns used in the cursor. 默认情况下,将DECLARECURSOR权限授予对游标中所使用的视图、表和列具有SELECT权限的任何用户。 msdn2.microsoft.com 2. There is usually no defense against malicious code if it is granted these permissions. 如果向恶意代码授予这些权限,通常就没有防范它的措施了。 msdn2.microsoft.com 3. Each S3 object has an access-control list (ACL) associated with it that explicitly identifies the grants and permissions for that resource. 每个S3对象有一个相关联的访问控制列表(ACL),ACL显式地指定此资源的授权。 www.ibm.com 4. When setting code access security permissions for a ClickOnce application, you need to start with a base set of permissions. 设置ClickOnce应用程序的代码访问安全权限时,需要从一个基本权限集开始。 msdn2.microsoft.com 5. Each type of permission clearly defines extreme states representing either all or none of the permissions expressible within the type. 每个权限类型均明确定义了极端的状态,表示该类型中可表现的所有权限或没有任何权限。 msdn2.microsoft.com 6. Code access permissions are permission objects that are used to help protect resources and operations from unauthorized use. 代码访问权限是用于帮助保护资源和操作不被未经授权地使用的权限对象。 msdn2.microsoft.com 7. The following example creates a function to return the name of the entity on which the permissions are checked . 以下示例创建函数以返回检查对其权限的实体的名称。 www.bing.com 8. Permissions for the various semantic categories (as in whether or not to redact) are specified for each role. 为每种角色指定各种语义类别的权限(即是否编校)。 www.ibm.com 9. RESTORE permissions are given to roles in which membership information is always readily available to the server. RESTORE权限被授予那些成员身份信息始终可由服务器使用的角色。 msdn2.microsoft.com 10. When a code group has this flag set, only the permissions associated with that code group are granted to code belonging to the code group. 当代码组设置此标志时,只将与该代码组关联的权限授予属于代码组的代码。 msdn2.microsoft.com 1. Code can also be granted special permissions if it is loaded into a sandbox. 程式码可以也被授与特殊权限如果载入沙箱。 msdn.microsoft.com 2. The probable cause is either that you do not have write permissions for the directory or that the directory does not exist. 可能的原因是您没有该目录的写权限或该目录不存在。 msdn2.microsoft.com 3. The installation program for the extension might be malicious and gain access to protected resources based on your installation permissions. 扩展的安装程序可能怀有恶意,并可能通过安装权限访问受保护的资源。 technet.microsoft.com 4. This is not to say that access permissions are not important but their use and implications can be applied incrementally. 这并不意味着访问权限不重要,而是说可以逐步了解它们的应用和含义。 www.ibm.com 5. If you want all members of the parent site to be members of this workspace, click Use same permissions as parent site. 如果希望父网站的所有成员都成为此工作区的成员,请单击“使用与父网站相同的权限”。 office.microsoft.com 6. Describes how to start with a base set of permissions and add the permissions required by your application one at a time . 介绍如何从基本权限集开始操作,逐项添加应用程序所需的权限。 www.bing.com 7. Starting with -all insures that the permissions listed are the only ones in force after the command line is executed. 从-all开始可以确保列出的权限仅为命令行执行之后的权限。 www.ibm.com 8. There are no requirements for the login to have other permissions or to own objects in any database. 该登录名无需具有其他权限,也无需拥有任何数据库中的对象。 msdn2.microsoft.com 9. it is also possible to delete an item is no longer used in the operation, so that the corresponding permissions should also be deleted. 也有可能删除一项不再被使用的操作,这样,对应的权限也应该被删除。 zhidao.baidu.com 10. If no security permission is specified, no permissions are checked and all callers are permitted to call the interface or operation. 如果没有指定安全许可,则没有许可检查,所有调用方都允许调用接口和操作。 www.ibm.com 1. When a new team project starts, the administrator maps process roles for that team project to specific security groups and permissions. 启动新的团队项目时,管理员会将该团队项目的过程角色映射到特定的安全组和权限。 msdn2.microsoft.com 2. Adding users to a security group is an efficient way to grant a specific set of permissions to a group of users on your team project. 向安全组添加用户是向一组团队项目用户授予一组特定权限的有效方法。 msdn2.microsoft.com 3. It is not normally accessible to applications if Java 2 security is enabled and the default permissions have been used. 如果Java2安全性未启用,而使用缺省权限,则应用程序通常不用访问该别名。 www-128.ibm.com 4. Windows users and groups are included in the role by an administrator, who also defines permissions within the role. Windows用户和用户组由管理员包括在该角色中,管理员也可定义角色中的权限。 msdn2.microsoft.com 5. Grant EXECUTE permissions on the stored procedures for database roles you want to be able to access the data. 针对想要用来存取资料的资料库角色,授与预存程序上的EXECUTE权限。 technet.microsoft.com 6. Gets information describing permissions granted to an application and whether the application has a trust level that allows it to run. 获取说明授予应用程序的权限以及应用程序是否拥有允许其运行的信任级别的信息。 msdn2.microsoft.com 7. the system information management module was designed to set operating parameters, manage permissions and database. 系统信息管理模块主要进行系统的参数设置、权限管理、以及数据库管理。 www.fabiao.net 8. All code-access permissions can be requested by code; whether or not permissions are granted is determined by the runtime. 所有代码访问权限均可通过代码请求获得;而是否授予权限则由运行库决定。 msdn2.microsoft.com 9. If it has sufficient permissions, it runs properly; otherwise a security exception occurs. 如果应用程序具有足够的权限,它将正常运行;否则将发生安全异常。 msdn2.microsoft.com 10. You will also need sufficient permissions to be able to create XML Web Service projects on the computer where your Web server is. 要在Web服务器所在的计算机上创建XMLWebservices项目,您同样需要具有足够的权限。 msdn2.microsoft.com 1. Manage the degree to which managed code can access outside resources by regulating code access permissions . 通过控制代码访问权限,管理托管代码可以访问外部资源的等级。 www.bing.com 2. We're trying to get all of the permissions to get everything all set, to get it going. 我们正在尝试得到各方面的批准,做好各种准备,然后开始着手工作。 www.ted.com 3. For any other user that logs on to the mailbox, these permissions are not automatically defined, and you can grant them manually. 对于登录到邮箱的其他任何用户,将不自动定义这些权限,但您可以手动授予这些权限。 technet.microsoft.com 4. You can grant permissions for a shared resource to the only users of the virtual portal of choice. 您可以只对选择的虚拟门户用户授予访问共享资源的权限。 www.ibm.com 5. At load time, the runtime determines the set of permissions that each policy level allows the code to have. 加载时,运行库确定每个策略级别允许代码拥有的权限集。 msdn2.microsoft.com 6. To operate correctly, the service startup account must be configured to have the correct domain, file system, and registry permissions. 为了正常操作,必须对服务启动帐户进行配置,使其具有正确的域、文件系统和注册表权限。 msdn2.microsoft.com 7. The permissions on this certification authority do not allow the current user to enroll for certificates. 此证书颁发机构的权限不允许当前用户注册证书。 www.fan6.net 8. Permissions are requested by the application through the manifest file and granted or not granted by the user during installation. 权限在安装期间通过manifest文件由应用程序请求,由用户授予或不授予。 www.ibm.com 9. On the Security tab, configure the additional accounts and permissions that are minimally necessary to run the Web site, and then click OK. 在“安全”选项卡上,配置运行网站至少需要的其他帐户和权限,然后单击“确定”。 msdn2.microsoft.com 10. The operation did not complete because access is denied. Check your access permissions. 由于拒绝访问,操作没有完成。请检查您的访问权限。 www.fan6.net 1. To set permissions on this file, it must be on a drive formatted by the NTFS file system. 如果要设置该文件的访问权限,它必须位于由NTFS文件系统格式化的驱动器上。 finer2.com 2. Security transparent code should not be responsible for verifying the security of an operation, and therefore should not demand permissions. 安全透明代码不应负责验证某个操作的安全,因此不应要求权限。 technet.microsoft.com 3. You might have to manually set up MySQL user access permissions again, depending on the setup. 你可能需要再次手动设置MySQL的用户访问权限,这取决于设置。 wiki.wasai.org 4. In the Select User, Computer, or Group dialog box, click the account to which you want to grant related permissions, and then click OK. 在“选择用户、计算机或组”对话框中,单击想要对其授予相关权限的帐户,然后单击“确定”。 support.microsoft.com 5. If you do not allow or deny any permissions, the user or group will not be created, and will not appear after you click Close. 如果不允许也不拒绝任何权限,则不会创建该用户或组,单击“关闭”后将不再显示该用户或组。 msdn2.microsoft.com 6. Answer: The file permissions on bldrtn might have changed, depending on how you copied the files to your system. 解答:bldrtn文件的权限可能被更改过了,这与将文件复制到系统中的方法有关。 www.ibm.com 7. As an administrator, you control what users are allowed to do by specifying permissions. 作为管理员,通过指定权限可以控制允许用户执行的操作。 msdn2.microsoft.com 8. This action rebuilds all permissions on site content, and may be a lengthy process. This action cannot be undone. 这一操作将重建网站内容的所有权限,可能会需要很长时间才能完成。此操作无法回复! www.bp-one.com 9. An application attempted to perform an operation on a registry key to which the Standard User role does not have permissions. 应用程式尝试在「标准使用者」角色没有权限的登录机码上执行作业。 technet.microsoft.com 10. The build agents used by the lab workflow are not configured with the same permissions as the build agents used to compile a build. 实验室工作流使用的生成代理所配置的权限与用于编译生成的生成代理不同。 technet.microsoft.com 1. Invalid permissions setting. At least one role must be selected. 权限设置无效。至少应该选择一个角色。 www.dictall.com 2. The name of a user that the user executing the command has impersonate permissions for. 执行命令的用户拥有其模拟权限的用户的名称。 msdn2.microsoft.com 3. Note that unrestricted user and enterprise levels do not result in unrestricted permissions being granted to an assembly . 注意,不受限制的用户级别和企业级别并不会导致授予程序集不受限制的权限。 www.bing.com 4. With Windows SharePoint Services, you can set specific permissions for a list or document library, separate from the rest of the Web site. 使用WindowsSharePointServices,您可以独立于网站的其余部分,为列表或文档库设置特定权限。 office.microsoft.com 5. You do not have access permissions to start the Network Monitoring service. You will only be able to connect to remote agents for capturing. 没有启动网络监视器服务的访问权限。只能连接到远程捕获代理程序。 www.kuenglish.info 6. Publish permissions are provided through a role assignment that maps your user account to a role that includes publish operations. 发布权限通过角色分配提供,此角色分配将用户帐户映射到包括发布操作的角色。 technet.microsoft.com 7. Representative permissions enough, to this end agreed to purchase the examination and approval process. 代表权限足够同意采购,到此结束整个审批流程。 zhidao.baidu.com 8. Code that requires more permissions than policy will grant is not allowed to run. 对于要求的权限比策略允许的权限还要多的代码,将不允许它运行。 msdn2.microsoft.com 9. Add your users, configure permissions, and you're ready to start! 请添加您的用户、配置权限,您就可以开始了! www.ibm.com 10. Causes processing extensions and expressions to be run with limited permissions in an application domain. 使得处理扩展插件和表达式在权限受到限制的应用程序域中执行。 msdn2.microsoft.com 1. Causes processing extensions and expressions to be run in an application domain with limited permissions. 导致在具有有限权限的应用程序域中执行处理扩展插件和表达式。 msdn2.microsoft.com 2. 1 Font cannot be installed to the %2 registry location. This is usually because you do not have the correct security permissions. 无法将%1字体安装到%2注册表位置。通常是由于您没有适当的安全权限。 www.fan6.net 3. Also, you looked briefly at the permissions runtime APIs, which allow you to check, enforce, grant, and revoke permissions at runtime. 此外,您还简要了解了权限运行时API,这些API允许您在运行时检查、执行、授予和撤销权限。 www.ibm.com 4. Specifies the only permissions that do not cause the stack walk to fail. 仅指定不会导致堆栈遍历失败的权限。 msdn2.microsoft.com 5. Windows SharePoint Services provides 33 predefined permissions that you can combine into a permission level. WindowsSharePointServices提供33种预定义权限,您可以将其合并为一个权限级别。 msdn2.microsoft.com 6. For examples of MDX expressions used to set cell data permissions, see Using MDX Expressions to Set Cell Data Permissions. 有关用于设置单元数据权限的MDX表达式的示例,请参阅使用MDX表达式设置单元数据权限。 msdn2.microsoft.com 7. In cases where exact permission values cannot be determined, uses Internet zone permissions as an estimate. 在无法准确确定权限值的情况下,使用Internet区域权限作为估算值。 msdn2.microsoft.com 8. It contains the names of principals and the access permissions followed by an optional principal that the ACL applies. 它包含主体的名称和访问权限,然后是一个可选的用于ACL的主体。 www.ibm.com 9. An application attempted to perform an operation on a file to which the Standard User role does not have permissions. 应用程式尝试对「标准使用者」角色没有权限的档案执行作业。 technet.microsoft.com 10. Likewise, clearing a permission on which other permissions are dependent also clears the dependent permissions. 同样地,当清除一个其他权限所依赖的权限时,依赖的权限也会被清除。 office.microsoft.com 1. Next, you could have modified the dealer add action to grant create permissions for the dealer ACO to the user's ARO. 接下来,修改dealeradd操作,将经销商ACO的create权限授予用户的ARO。 www.ibm.com 2. Do not grant unnecessary permissions, and protect the user name and password used by subscription management interfaces. 不要授予不必要的权限,并保护订阅管理界面使用的用户名和密码。 msdn2.microsoft.com 3. Dropping unknown users means that if those users have Access or Deny permissions on public folders, those permissions might be lost. 放弃未知用户意味着如果这些用户在公用文件夹上拥有访问或拒绝权限,那么这些权限可能丢失。 technet.microsoft.com 4. None of the permissions entities allow the consumers to have "sharing" rights. 没有任何Permission项允许用户拥有“共享”权限。 www.ibm.com 5. A login is used for user authentication and a database user account is used for database access and permissions validation. 登录用于用户身份验证,而数据库用户帐户用于数据库访问和权限验证。 www.cnblogs.com 6. When you grant users permission to a list or document library, you do so by selecting the actual permissions you want them to have. 在授予用户对列表的权限时,请通过选择希望他们具有的实际权限来进行此操作。 office.microsoft.com 7. If you change the permission for a group, you will potentially affect the permissions for all of the users who are members of that group. 如果您变更群组的使用权限,有可能会影响到属于该群组成员的所有使用者的使用权限。 technet.microsoft.com 8. For a database principal to send messages to a service, that principal must have SEND permissions on the service. 对于要向某一服务发送消息的数据库主体,该主体必须具有对此服务的SEND权限。 msdn2.microsoft.com 9. for more information about specifying dimension data access for a role , see specifying attribute permissions in a dimension. 有关为角色指定维度数据访问权限的详细信息,请参阅“在维度中指定属性权限”。 www.ichacha.net 10. If you do not request the necessary permissions, you run the risk of your code not executing. 如果不请求必要的权限,将面临代码无法执行的风险。 msdn2.microsoft.com 1. If your code does not access protected resources or perform protected operations, you do not need to request any permissions. 如果您的代码不访问受保护的资源或执行受保护的操作,则不必请求任何权限。 msdn2.microsoft.com 2. On the Customize Incentives page, in the General Settings section, click Change permissions for this list. 在“自定义激励”页的“常规设置”部分中,单击“更改此列表的权限”。 office.microsoft.com 3. The right to read permissions on, and list the contents of, a container object. 读取容器对象上的权限以及列出其内容的权限。 msdn2.microsoft.com 4. This parameter can be used to specify the default permissions and authentication methods that are assigned to the Send connector. 此参数可以用于指定为发送连接器分配的默认权限和身份验证方法。 technet.microsoft.com 5. Sometimes, you might have to create multiple rules for the same folder in order to establish the correct permissions. 有时,可能需要为同一个文件夹创建多条规则,以便建立正确的权限。 msdn2.microsoft.com 6. Depending on your permissions, each item has common actions that are standard for items that are stored in a SharePoint library. 根据您拥有的权限,每个项都拥有一些共有的操作,这些操作是存储在SharePoint库中的项的标准操作。 technet.microsoft.com 7. The runtime determines whether the set of required permissions is a subset of the allowed permission set. 运行时确定必选权限集是否为允许的权限集的子集。 technet.microsoft.com 8. User accounts need access to most of the Active Directory with at least read permissions. 用户帐户必须以只读权限访问大部分AD信息。 www.bing.com 9. Information is not returned for any databases on which the user does not have the appropriate permissions, as described below. 如下所述,将不会返回用户对其不具有适当权限的任何数据库的信息。 msdn2.microsoft.com 10. Although identity permissions can be requested, they cannot be granted unless the code has the proper identity evidence. 虽然可以请求标识权限,但除非代码具有正确的标识证据,否则无法授予此权限。 technet.microsoft.com 1. The permissions to gain access to private data are referred to as Extended Permissions. 获得对私有数据进行访问的权限被称作扩展权限。 www.ibm.com 2. The link demand specifies only the permissions direct callers in the immediate calling assembly must have to link to your code. 连结要求只会指定立即呼叫组件中的直接呼叫端在连结至您的程式码时,所要具备的使用权限。 msdn.microsoft.com 3. Adding, modifying, and deleting role assignments does not affect permissions that are granted to members of the local Administrators group. 添加、修改和删除角色分配不会影响授予本地Administrators组成员的权限。 msdn2.microsoft.com 4. For the sake of simplicity, the examples do not account for checking and setting permissions on annotations. 为了简单起见,示例中并没有说明对于注释的检查和设置许可。 www-128.ibm.com 5. The intersection of two permissions is a permission that describes the set of operations they both describe in common . 两个权限对象的交集是描述它们共有的操作集合的权限。 www.bing.com 6. The permissions on the certificate template do not allow the current user to enroll for this type of certificate. 此证书模板上的权限不允许当前用户注册此类型的证书。 www.fan6.net 7. Only the user that the module is impersonating needs to have permissions on the objects accessed by the module. 只有模块模拟的用户需要具有模块所访问的对象的权限。 msdn2.microsoft.com 8. Make sure that this admin user has permissions to submit issues in ClearQuest. 确保此管理员用户在ClearQuest中有提交问题的权限。 msdn2.microsoft.com 9. This information schema view returns information about the objects to which the current user has permissions. 该信息架构视图返回当前用户对其拥有权限的对象的相关信息。 technet.microsoft.com 10. Since all user should be able to see the message thread and the message details, the permissions on line 43, 94, and 106 should become View. 由于所有用户都应该能看到消息线索和详细的消息,第43行、94行和106行的许可都应该是View。 wiki.ubuntu.org.cn 1. In a SQL Remote installation, each database receiving messages from the current database must be granted REMOTE permissions. 在SQLRemote安装中,每个从当前数据库接收消息的数据库都必须被授予REMOTE权限。 www.ianywhere.com 2. In the Add users and groups area, select Team Foundation Server group to set permissions for a Team Foundation Server group. 在“添加用户和组”区域中,选择“TeamFoundationServer组”,这将为某个TeamFoundationServer组设置权限。 msdn2.microsoft.com 3. Fixed database roles have a pre-defined set of permissions that are designed to allow you to easily manage groups of permissions. 固定资料库角色拥有预先定义的权限集合,其目的是让您可以轻松地管理权限群组。 technet.microsoft.com 4. Without these lines, the permissions and ownership of our pseudo-terminals would be preserved across reboots. 如果没有这几行,则在重引导系统之后,仍然会保留伪终端的许可权和所有权。 www.ibm.com 5. The folder "%B" cannot be copied because you do not have permissions to create it in the destination. 无法复制资料夹“%B”,因为您没有权限在目的地建立它。 translations.launchpad.net 6. Give permissions to Run scripts if the directory contains server response files and the ISAPI extension is registered as a script engine. 如果目录包含服务器响应文件,且ISAPI扩展注册为脚本引擎,则给予“运行脚本”权限。 msdn2.microsoft.com 7. In turn, you can assign permissions to roles or to users as necessary at runtime. 进而,你可以在运行时按需将权限分配给角色或用户。 www.infoq.com 8. This guarantee total more than the Board of Directors of permissions, you need to approve general meeting of shareholders of the company. 本次担保总额超过董事会的权限,需要公司股东大会审议通过。 www.bing.com 9. This means that after the context switch, any resource within the server that the impersonated login has permissions on can be accessed. 这意味着上下文切换后,可以访问模拟的登录帐户在服务器内具有权限的任何资源。 technet.microsoft.com 10. The Security permissions set on this key define what Users or Groups can connect to the system for remote Registry access. 在此项中设置的安全权限规定了哪些用户或组可以连接到系统以对注册表进行远程访问。 lyzh0703.blog.163.com 1. If the opening process is not running with administrative permissions, the system will prompt for credentials. 如果打开进程未使用管理权限运行,则系统将提示提供凭据。 technet.microsoft.com 2. As with the operating system permissions, the rights that you specifically deny to a user take precedence over those you allow. 与操作系统权限一样,特别地拒绝授予用户的权限优先于允许用户拥有的权限。 msdn2.microsoft.com 3. Default permissions cannot be set for that resource. 无法设置该资源的默认权限。 www.fan6.net 4. The permissions for the local user apply to any operation on behalf of the remote service. 本地用户的权限适于代表远程服务执行任何操作。 msdn2.microsoft.com 5. Specifies a default set of code-access security permissions to use as a starting point when configuring permissions. 指定默认的代码访问安全权限集以作为配置权限时的起点。 msdn2.microsoft.com 6. Determines whether the ClickOnce application has the appropriate permissions and platform dependencies to run on the local computer. 确定ClickOnce应用程序是否具有合适的权限和平台依赖项,以便在本地计算机上运行。 msdn2.microsoft.com 7. Server-level permissions cannot be granted directly to a certificate or asymmetric key. 不能向证书或非对称密钥直接授予服务器级权限。 msdn2.microsoft.com 8. This cmdlet allows you to retrieve the permissions set for an Active Directory object. 该cmdlet允许您为ActiveDirectory对象检索权限设置。 technet.microsoft.com 9. A permissions system lets the creator specify that their item is copyable and whether the next owner can modify it. 创建者可以通过权限系统指定他们的内容是否是可复制的,以及下一个所有者是否可以修改它。 www.ibm.com 10. Common errors that cause data not to be delivered include permissions issues and constraint violations. 导致数据无法传递的常见错误有权限问题和违反约束。 msdn2.microsoft.com 1. You can use Windows SharePoint Services administration tools to give project members distinct permissions on each of your project Web sites. 可以使用WindowsSharePointServices管理工具在每个项目网站上向项目成员授予不同的权限。 msdn2.microsoft.com 2. Security policy defines several code groups and associates each group with a set of permissions. 安全性原则会定义几个程式码群组,并将每个群组与一组使用权限相关联。 technet.microsoft.com 3. For more information about increasing security permissions for a ClickOnce application, see ClickOnce Deployment and Security. 有关增加ClickOnce应用程序的安全权限的更多信息,请参见ClickOnce部署和安全。 msdn2.microsoft.com 4. These will be referred to as the application's "permissions. " 将这些权限称为应用程序的“权限”。 www.ibm.com 5. Security policy is the configurable set of rules that the common language runtime follows when determining the permissions to grant to code. 安全策略是公共语言运行库在确定要授予代码的权限时遵循的可配置的一组规则。 msdn2.microsoft.com 6. The user and permissions information is appended to the bottom of the existing list. 时,用户信息和权限信息追加到现有列表的底部。 msdn2.microsoft.com 7. So, you can choose to have Snort log to directories you already have access to, and reduce some of the permissions issues. 因此,您可以选择使Snort登录您已经有权访问的目录,减少部分权限问题。 www.ibm.com 8. This information is then mapped using a code-access security policy to determine the set of permissions granted at run time. 然后,将使用代码访问安全策略映射此信息,以确定在运行时授予的权限集。 msdn2.microsoft.com 9. The SYSTEM and CREATOR OWNER accounts should be given FULL CONTROL permissions on the path where Microsoft Exchange is installed. 应授予系统帐户和创建者所有者帐户对安装MicrosoftExchange的路径的完全控制权限。 www.microsoft.com 10. To set the View Items permission on a list or library, the list or library must be using unique permissions. 要在列表或库上设置“查看项目”权限,该列表或库必须是使用独有权限的。 office.microsoft.com 1. A named permission set is a set of permissions that administrators can associate with a code group. 命名的权限集是管理员可以将其与某个代码组关联的权限集。 technet.microsoft.com 2. The intersection of two permissions is a permission that describes the set of operations they both hold in common. 两个权限的交集是这样一个权限,它描述这两个权限共同持有的一组操作。 msdn2.microsoft.com 3. Reformat the computer's hard drive Resource permissions have been set and the wizard will proceed to the next step. 已完成资源权限设置,向导将继续下一步骤。 blog.csdn.net 4. Ensure that this folder is already shared and has the appropriate permissions set. 请确保此文件夹已共享并设置了适当的权限。 technet.microsoft.com 5. Existing permissions on the view are maintained, and do not have to be reassigned. 维护视图的现有权限,不必重新分配。 www.ianywhere.com 6. Determines whether an application should be executed and which set of permissions should be granted to the application. 确定是否应执行应用程序以及应授予此应用程序哪个权限集。 msdn2.microsoft.com 7. Contains ASSL elements that define metadata for a database, including account types, translations, and database permissions. 包含了用于定义数据库的元数据(包括帐户类型、翻译和数据库权限)的ASSL元素。 technet.microsoft.com 8. Assign permissions and create a login used for the database connection. 分配权限和创建用于进行数据库连接的登录名。 msdn2.microsoft.com 9. Ensure that the database is not read-only and that you have the necessary permissions to make changes to it. 确保该数据库不是只读的且您拥有更改该数据库所需的必要权限。 office.microsoft.com 10. Granting a proxy access to a subsystem does not change the permissions for the principal specified in the proxy . 授权代理访问子系统将不更改代理中指定的主体服务器的权限。 www.bing.com 1. What if the permissions have been altered and you're unable to read the contents? 如果权限已被改变而无法读取其内容又当如何? www.ibm.com 2. The permissions of this database user are used for authorization in the database. 该数据库用户的权限用于在数据库中进行授权。 msdn2.microsoft.com 3. Adaptive Server Anywhere employs RESOURCE permissions to allow a user the right to create objects in a database. AdaptiveServerAnywhere使用RESOURCE权限来授予用户在数据库中创建对象的权限。 www.ianywhere.com 4. The Web server is active for the lifetime of the HttpListener object and runs within your application, with your application's permissions. 该Web服务器在HttpListener对象的生存期内是活动的,并以应用程序的权限在应用程序中运行。 msdn2.microsoft.com 5. The Prospective clients folder should have at least Reviewer permissions for other people to view the contents. “预期客户”文件夹至少应具有“校对”权限,其他用户才可以查看其中的内容。 office.microsoft.com 6. Client Permissions dialog box for a public folder in an application public folder hierarchy. 应用程序公用文件夹层次结构中公用文件夹的“客户端权限”对话框。 technet.microsoft.com 7. You need to be sure that when your application runs, it has sufficient permissions to read the XML file. 需要确保应用程序在运行时有足够的权限来读取XML文件。 msdn2.microsoft.com 8. Name of the principal to which permissions were granted. 被授予权限的主体的名称。 technet.microsoft.com 9. Clicking on the Permissions tab at the top of the site details will display the page you see here. 点击网站详情顶部的权限标签会展示你在这里看到的页面。 www.bing.com 10. Do not grant unnecessary permissions, and protect the user name and password used by non-hosted event providers. 不要授予不必要的权限,保护非宿主事件提供程序使用的用户名和密码。 msdn2.microsoft.com 1. To maintain a backup script that allows you to recreate all the database objects and permissions. 维护一个备份脚本,通过该脚本可以重新创建所有数据库对象和权限。 msdn2.microsoft.com 2. Delete operation failed. The policy for this container cannot be modified. Check permissions. 删除操作失败。无法修改这个容器的策略。请检查权限。 www.fan6.net 3. An Advanced Server will look at all of this information to determine if the client has permissions to complete the NET USE command. 一个高级服务器会根据所有这些信息来判断客户端是否有权限完成NETUSE命令。 0554.vipcn.com 4. You do not, however, need Administrator permissions to use Visual Studio after installation. 不过,在安装完成后,使用VisualStudio时不需要管理员权限。 msdn2.microsoft.com 5. Unable to create the spool directory %1. Check that you have the required permissions for that operation. 无法创建假脱机目录%1。请检查您是否具备该操作的权限。 translations.launchpad.net 6. The folder "%B" cannot be handled because you do not have permissions to read it. 无法处理文件夹“%B”,因为您没有读取它的权限。 translations.launchpad.net 7. You can add permissions, user guides, and general content, as well as customize the details of your image offerings. 您可以添加许可、用户指导、一般内容,也可以定制映像的细节。 www.ibm.com 8. S3 also offers the ability to specify owners and permissions for buckets and objects, as you can do for files and folders on a hard drive. S3还提供了指定存储段和对象的所有者和权限的能力,就像对待硬件的文件和文件夹一样。 www.ibm.com 9. Provides for setting a more granular set of auditing permissions to the existing account specified. 给指定的现有帐户设置更详细的一套审核权限。 angel.w15.5tom.cn 10. The user credentials do not provide the required permissions to read the file. 用户凭据不提供阅读文件所需的权限。 msdn2.microsoft.com 1. Fortunately, the WebSphere Application Server administrative tools warn the administrator when applications request additional permissions. 幸运的是,WebSphereApplicationServer管理工具会在应用程序请求其他权限时向管理员发出警告。 www-128.ibm.com 2. Add operation failed . The policy cannot be modified for this container . Check permissions. 添加操作失败。无法为这个容器修改策略。请检查权限。 www.bing.com 3. What permissions do I need to be able to configure routing groups and connectors? 需要什么权限才能配置路由组和连接器? technet.microsoft.com 4. Replace a user with a new user in the client permissions list for a public folder or public folder hierarchy. 在公用文件夹或公用文件夹层次结构的客户端权限列表中,使用新用户来替换某个用户。 technet.microsoft.com 5. The folder "%B" cannot be copied because you do not have permissions to read it. 无法复制资料夹“%B”,因为您没有权限读取它。 translations.launchpad.net 6. First, for a large set of environments, most applications will need a common set of additional permissions. 首先,对于很多环境而言,大部分应用程序都将需要一个公共的附加权限集。 www.ibm.com 7. for more information about specifying dimension access for a role , see granting dimension - level permissions to database roles. 有关为角色指定维度访问权限的详细信息,请参阅“授予数据库角色维度级别的权限”。 www.ichacha.net 8. There is no synchronization of permissions between a SharePoint site or farm and a report server. SharePoint站点或场与报表服务器之间不存在权限同步。 technet.microsoft.com 9. Property gets a path to an Active Directory node to which the permissions apply. 属性获取应用权限的ActiveDirectory节点的路径。 msdn2.microsoft.com 10. The "List Folder" permissions on the root drive do not have to be inherited by the subfolders. 子文件夹不必继承根驱动器的“列出文件夹”权限。 msdn2.microsoft.com 1. Returns a report that has information about user permissions for an object, or statement permissions, in the current database. 返回一个报表,报表中包含当前数据库中某对象的用户权限或语句权限的信息。 technet.microsoft.com 2. With a permissions password set, the PDF can be opened by anyone, but its permissions can be restricted. 当设置了权限密码后,文档能正常打开,但是某些操作将被限制。 zh.pingju.org 3. The file "%B" cannot be handled because you do not have permissions to read it. 无法处理档案“%B”,因为您没有权限读取它。 translations.launchpad.net 4. Row-level permissions are used for applications that store information in a single table. 行级权限用于在单个表中存储信息的应用程序。 technet.microsoft.com 5. The design and ongoing implementation and audit of roles and permissions should mirror the intent and requirements for your site. 设计、后续实现和角色和权限的审计都应该贴近站点的意图和需求。 www.ibm.com 6. Finally, in the products add method, you could have checked to make sure the user had permissions. 最后,在productsadd方法中进行检查以确保用户具有权限。 www.ibm.com 7. It does not specify the permissions all callers must have to run your code. 并不会指定所有呼叫端在执行您的程式码时所必须具备的使用权限。 msdn.microsoft.com 8. In most cases this is not a problem but on some systems the permissions may be altered the next time you login or restart your computer. 在大多数情况下,这并不会造成困扰,但是在某些系统中权限可能会在您下次登入或重新启动电脑后被篡改。 translations.launchpad.net 9. If you don't have the permissions you want, contact an administrator of your computer or the owner of the file or folder. 如果没有获取您想要的权限,请联系电脑的管理员、文件或文件夹的所有者。 docs.info.apple.com 10. If users can log on to a mailbox (they have Full Mailbox Access permissions), they may also have Send As permissions for the mailbox. 如果用户能够登录到邮箱(具有“邮箱完全控制”权限),则它们还可能拥有对该邮箱的“代理发送”权限。 technet.microsoft.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。