单词 | user_access | ||||||||||||
释义 | user_access
更多释义 收起释义 例句释义: 用户接入,用户终端设施,用户共享权限设置 1. This user access key is nothing but a hash of a user-defined password (either login password or another password specific to EFS). 用户访问密钥只是用户定义的密码(登录密码或EFS专用的另一个密码)的散列。 www.ibm.com 2. User access in the branches is often centrally managed. 分支中的用户访问通常是集中管理的。 www.ibm.com 3. RSGs enable you to recover data from a backup or copy of a database without disturbing user access to current data . RSG还使您可以通过数据库的备份或副本来恢复数据,而不会干扰用户对当前数据的访问。 www.bing.com 4. You might have to manually set up MySQL user access permissions again, depending on the setup. 你可能需要再次手动设置MySQL的用户访问权限,这取决于设置。 wiki.wasai.org 5. Super-User access must be created where my sales people can log in and create quotes on behalf of their business customers. 超级用户访问必须建立在我的销售人员可以登录并增加了对他们的业务代表客户报价。 www.bing.com 6. Although ALEXA to rank high do not represent flow is very big, but at least means there are so many webmaster user access. 虽然ALEXA排名高不代表流量就很大,但至少说明有非常多的站长用户访问。 www.82g.com.cn 7. A profile consists of settings that define the reports that you see. These include user access, goals, and filter settings. 配置包括设定,定义的报告,你看。这些问题包括用户访问,目标和过滤器设置。 www.zishu.cn 8. The system used the data dictionary on user access control, data meaning translating, and page dynamic customization. 系统通过数据字典技术进行用户访问控制、数据语义规格化和显示页面动态定制等工作。 www.ceps.com.tw 9. Does a user access all the files in a system in the same manner, regardless of whether they reside at the same or different sites? 不管这些文件是储存在同一位置还是不同位置,用户是否可以用同一方式在系统中存取所有文件? www.ebigear.com 10. The game platform is the end-user access device to the game, also technically known as the client side. 游戏平台就是最终用户用来访问游戏的设备,在技术上也称为客户端(clientside)。 www.ibm.com 1. Windows SteadyState also enables you to restrict user access to local programs. 通过WindowsSteadyState,您还可以限制用户访问本地程序。 www.microsoft.com 2. User access rights can be specified for individual items, and metadata can be removed from documents prior to final publication. 可以为单个项目指定用户访问权限,并且可以在最终发布文档之前从文档中删除元数据。 office.microsoft.com 3. One of its strengths is the ability to control user access to certain content. 其优势之一是具备控制用户访问某些内容的能力。 www-128.ibm.com 4. It also addresses OAM issues as they relate to the reference configuration at the user access and to the interface specifications. 当OAM与在用户接入的参考配置和接口规范有关时,本建议也谈到OAM问题。 www.ptsn.net.cn 5. This strategy helps protect confidential information while reducing the administrative overhead of managing user access to the deployment. 这种策略可协助保护机密资讯,同时减少管理使用者对部署之存取权的管理额外负荷。 technet.microsoft.com 6. The report is stored in a partially compiled intermediate format that prepares it for report user access. 报表以部分编译的中间格式存储,以便报表用户访问。 msdn2.microsoft.com 7. To deny a user access to a shared folder, make sure that the user is not on either permission list. 如果要禁止用户访问共享文件夹,请确认两个权限列表均未列出该用户。 blog.csdn.net 8. Modifies the user access control list (ACL) and displays authorization settings for an item under version control . 修改用户访问控制列表(ACL)并显示受版本控制的项的授权设置。 www.bing.com 9. Access control is used to restrict user access to Message Queuing objects, and is implemented by assigning security descriptors to objects. 访问控制用于限制用户对“消息队列”对象的访问,并通过为对象指派安全描述符来实现。 msdn2.microsoft.com 10. The recommended user access to the catalog is through a set of views with the schema of SYSCAT. 建议用户通过一组SYSCAT模式的视图来访问编目。 www.ibm.com 1. Hypertext lets a user access words and sections in various, scattered documents or files without having to shut the file the user is in. 超级文本可使用户在各种各样、且分散的文档或文件中存取字和段,而不必关闭用户正处在其中的文件。 www2.ccw.com.cn 2. The company has a total of 4 factory staff, their existing ID management system to control user access has been faced with some problems. 该公司拥有4座工厂共900名员工,他们现有的ID管理系统在控制用户访问上一直面临着一些问题。 www.bing.com 3. Take measures to control user access to your data to help protect it . 控制用户对数据的访问权限以保护数据。 www.bing.com 4. Disabling an index prevents user access to the index, and for clustered indexes, to the underlying table data. 禁用索引可防止用户访问该索引,对于聚集索引,还可防止用户访问基础表数据。 msdn2.microsoft.com 5. With this capability , you can recover data from an older backup copy of the database without disturbing user access to current data . 此外,它还提供了一种复制管理机制,可以帮助您管理和访问数据集的副本。 www.bing.com 6. When a regular user needs to execute a privileged task, it becomes inevitable he or she receive super user access. 当普通用户需要执行特权任务时,他们不可避免地要接收超级用户访问。 www.ibm.com 7. User access to the FTP server directories and files is dependent on the permissions defined for the account used at login. 用户所访问FTP服务器中目录和文件的权限是根据登录时所用帐号来定义的。 translations.launchpad.net 8. The user access privileges provided by the Web services are consistent with those enforced by the Lotus Notes client. Web服务提供的用户访问权限与LotusNotes客户机施加的权限一致。 www.ibm.com 9. The identity offering provides policies and technologies to enable groups to control user access to critical resources. 标识项提供政策和技术,使这些群体能够控制用户访问重要资源。 www.21csp.com.cn 10. OmniFind also supports more fine-grained authentication methods, which restrict user access on the document level. OmniFind还支持更细粒度的身份验证方法,在文档级别上限制用户访问。 www-128.ibm.com 1. Authorization involves restricting user access to only those resources that are required. 授权涉及将用户访问范围仅限定为那些必需的资源。 msdn2.microsoft.com 2. This prevents all user access to the underlying table for the duration of the operation. 这样可以防止所有用户在操作期间访问基础表。 technet.microsoft.com 3. With our software you can lock or allowing software applications, filtering user access to computer software programs. 与我们的软件可以锁定或允许应用软件,过滤用户访问计算机的软件程序。 www.jisuxz.com 4. Simplifies user access to data by encapsulating a complex query in a table-valued function. 通过将复杂的查询封装到表值函数中,简化用户对数据的访问。 msdn2.microsoft.com 5. By managing security properties for objects, you can set permissions, assign ownership, and monitor user access. 通过管理对象的安全属性,可以设置权限、指派所有权并监视用户访问。 msdn2.microsoft.com 6. Online processing allows concurrent user access to the underlying data and to nonclustered indexes during the index operation. 在线处理使并发用户可以在索引操作期间访问基础数据和非聚集索引。 msdn2.microsoft.com 7. This thing issues and transforms claims, manages user access, and enables automated federation. 它对声明进行操作和转换,管理用户访问并可以实现自动化联邦。 www.infoq.com 8. The need for this feature has arisen from the globalization of system administration and user access. 由于系统管理和用户访问日益全球化,这个特性越来越必要了。 www.ibm.com 9. User access to the products is controlled by the Lotus Workplace administrator. 用户对产品的访问权由LotusWorkplace管理员控制。 www-128.ibm.com 10. This wizard will help you move a shared folder and preserve user access to that folder. 该向导将帮助您移动共享文件夹,并保留用户对该文件夹的访问权限。 finer2.com 1. These social networks involve a complex set of user access levels. 这些社交网络具备复杂的用户访问权限等级。 www.bing.com 2. The global user data object ($user) and the user_access function are used to accomplish this. 这需要使用全局的用户数据对象($user)和user_access函数。 www.ibm.com 3. I am looking for an extremely skilled and bright programmer to create a website that would allow high-volume user access. 我要寻找一个非常熟练的程序员创建和明亮的一个网站,使大批量用户的访问。 www.bing.com 4. You can disallow all user access to database tables , requiring users to manipulate data through views only . 可以禁止所有用户访问数据库表,而要求用户只能通过视图操作数据。 www.bing.com 5. This paper presents a method for session identification based on an analysis of intervals of user access logs. 针对网络日志挖掘中的会话切分问题,提出了一种基于时间间隔的方法。 www.dictall.com 6. Algorithmically, the program could order them by frequency of user access, but that won't always get the right results. 从算法方面来说,程序可以按照用户的使用频率排序,但那并不总是对的。 www.jukuu.com 7. A repository is a persistent store that coordinates multi-user access to projects and team streams. 一个资源库就是一个持久的存储器,它协调对项目和小组流的多用户访问。 www.ibm.com 8. For increased security, use a firewall to restrict user access to Analysis Services from the Internet. 为了提高安全性,请使用防火墙限制用户从Internet对AnalysisServices的权限。 msdn2.microsoft.com 9. A key challenge in auditing in the cloud is overcoming the lack of visibility into user access of SaaS apps. 在云端审计方面的一个关键挑战是要克服SaaS应用的用户访问缺乏可见性的问题。 www.infoq.com 10. In both the tree and network cases, the user (or his program) is required to exploit a collection of user access paths to the data. 在树上、网络案件用户(或其纲领)是利用收集用户所需的数据获取途径。 zhidao.baidu.com 1. Supervise the operation of the ERP system and control the user access rights. 管理ERP系统的运行,并控制用户权限。 www.gao8dou.com 2. The default user-access required to login to the portal is mentioned in the installation guide. 安装指南中提到了登录门户需要的默认用户访问权限。 www.ibm.com 3. Granting a user access to a database involves three steps. 授予用户访问数据库的权限涉及三个步骤。 technet.microsoft.com 4. Disabling a clustered index prevents user access to the underlying table data. 禁用聚集索引将阻止用户访问基础表数据。 technet.microsoft.com 5. There are two options for user access to a table while a RUNSTATS is running against that table: allow read access and allow write access. 当对一个表运行RUNSTATS时,有两种用户访问选项:允许读访问和允许写访问。 www.ibm.com 6. Using Outlook, a user can grant another user access to specific folders in their mailbox. 使用Outlook,用户可以授予另一个用户对其邮箱中的特定文件夹的访问权限。 technet.microsoft.com 7. Restrict user access to programs, settings, Start menu items, and options in Windows XP. 限制用户对程序、设置、“开始”菜单项及WindowsXP选项的访问。 www.microsoft.com 8. The DL does not support fine-grained, per user access control. DL不支持细粒度的用户访问控制。 www.ibm.com 9. A distributed system provides user access to various system resources. 分布式系统提供用户访问各种系统资源的手段。 csts.suda.edu.cn 10. Another major problem is that attempting to access each file to determine user access permission can result in a lot of failed accesses. 另一个主要问题是试图访问每个文件,以确定用户访问权限可能会导致大量的失败的访问。 technet.microsoft.com 1. SSH provides two mechanisms to restrict user access: Deny and Allow attributes. SSH提供两种限制用户访问的机制:Deny和Allow属性。 www.ibm.com 2. Select the folder to which you want to change user access. 选择要更改其用户访问权限的文件夹。 finer2.com 3. These users can create, manage, and set up user access to Rational System Architect encyclopedias. 这些用户可以创建、管理和构建用户对RationalSystemArchitect百科全书的访问。 www.ibm.com 4. Give anonymous user access to your custom login portlet. 向自定义登录Portlet授予匿名用户访问权限。 www.ibm.com 5. You can vary security at any branch to redefine user access down to the item level. 您可以更改任何分支的安全性,将用户访问权重新定义为项级别。 msdn2.microsoft.com 6. Clustering analysis is based on calculating the similarity degree of the user access paths. 对客户进行聚类分析是建立在对用户浏览路径进行相似程度计算的基础上的。 www.dictall.com 7. However, all we could use that information for is to give the user access. 但是,我们只能用此信息来给予用户访问权。 www.ibm.com 8. Assign rolebased user access to avoid the pain and expense of generating separate models or reports. 分配基于角色的访问权限可以避免生成单独的模型或报表。 www.ibm.com 9. Root exploits refer to techniques that gain super user access to the server. Rootexploits是指获取超级用户密码来访问系统的技术。 www.ibm.com 10. Unlike a typical Web server, the HTTP endpoints that are created for use by SQL Server do not permit anonymous user access. 和一般的Web服务器不同,为供SQLServer使用而创建的HTTP端点不允许匿名用户访问。 msdn2.microsoft.com 1. Manages transactions and uses locking to control concurrent user access to rows and schemas in the database. 管理事务并使用锁定来控制对数据库中的行和架构执行的并发用户访问。 msdn2.microsoft.com 2. CLC sends request to the user directory to verify user access to the file. CLC向用户目录发送请求来确认用户对文件的访问。 www.ibm.com 3. User access permissions are specified in the user account. 用户的访问许可在用户帐户中指定。 angel.w15.5tom.cn 4. You can also use segmentation to enable or disable user access to theme selection in Outlook Web Access options. 还可以使用分段启用或禁用用户对OutlookWebAccess选项中主题选择的访问。 technet.microsoft.com 5. SOA security helps restrict user access to services. SOA安全性帮助限制用户对服务的访问。 www.ibm.com 6. For this user, access to the SCA component is not authorized and so an error message displays. 对于此用户,未授权访问SCA组件,因此将显示一条错误消息。 www.ibm.com 7. Set the database to single user access mode by using ALTER DATABASE SET SINGLE_USER. 通过使用ALTERDATABASESETSINGLE_USER,将数据库设置为单用户访问模式。 technet.microsoft.com 8. You can grant user access level by following the preceding steps. 通过遵循上述步骤,您可以授予用户相应的访问级别。 www-128.ibm.com 9. They are responsible for the control of user access to the network. 他们的责任是控制用户对网络的访问。 www.ibm.com 10. Based on the user affiliation, VCL supports different LDAP services for separate user access. 根据用户的从属关系,VCL对不同的用户访问支持不同的LDAP服务。 www.ibm.com 1. Validates user access to schema objects. 确认用户可访问。 epub.itpub.net 2. Private objects are protected by user access key. 私有对象由用户访问密钥保护。 www.ibm.com 3. Describes how to use the ONLINE index option to provide user access to data during index operations. 说明执行索引操作期间如何使用ONLINE索引选项为用户提供数据访问权限。 technet.microsoft.com 4. Controls user access to the database. 控制用户对数据库的访问。 msdn2.microsoft.com 5. You can also use this cmdlet to show whether the mailbox or user access has been locked out. 还可以使用此cmdlet显示是否已锁定邮箱或用户访问。 technet.microsoft.com 6. As an administrator I want to run reports on user access and statistics on volume per specific page. 作为管理员我想运行在用户的访问和每个具体的打印量统计报告。 www.bing.com 7. Before you can connect to the database, you will either need to give a user access or add a password to the db2inst1 team. 在连接数据库之前,需要授予一个用户访问权或者给db2inst1团队设置密码。 www.ibm.com 8. An Ethernet access connection (102) connects a user access point (10) to an access node (12) in the network. 以太网接入连接(102)把用户接入点(10)连接到网络中的接入节点(12)。 ip.com 9. Which shared folders do you want to give this user access to? 您想让该用户有权访问哪些共享文件夹? blog.csdn.net 10. Which fax printers do you want to give this user access to? 您想让该用户能够访问哪些传真打印机? blog.csdn.net 1. A higher setting yields little benefit and could slow down user access to the server running Exchange Server 2003. 更高的设置带来的好处很少,并且可能会降低用户访问ExchangeServer2003服务器的速度。 technet.microsoft.com 2. Depending on the needs of your organization, you can use segmentation to configure the following restrictions for user access 根据组织的需要,您可以使用分段为用户访问配置以下限制 technet.microsoft.com 3. Providing user access to a global computer network [service providers] 提供全球计算机网络用户接入服务(服务商) www.21etm.com 4. Multi-user access control of substation remote maintenance system 变电站远程维护系统的多用户接入控制 www.ilib.cn 5. User access control for networked manufacturing system 面向网络化制造系统的用户访问控制研究 service.ilib.cn 6. The Engineering Design Standard for the user access network 用户接入网工程设计暂行规定 www.cnibt.com 7. Preprocess techniques of mining user access patterns at E-commerce sites 电子商务网站用户访问模式挖掘中的预处理技术 www.ilib.cn 8. Discussion on Developing Tactics of Xishan User Access Network 西山矿区用户接入网发展策略初探 www.ilib.cn 9. We can use Query Subject filters to restrict user access to the data source. 可以使用QuerySubject过滤器限制对数据源的用户访问。 www.ibm.com 10. Security management of corporation LAN user access 企业内部网用户接入的安全管理 ilib.cn 1. The Digital User Access Technology of Abbreviate ATM Switch 小型ATM交换机中的数字用户接入技术 service.ilib.cn 2. Requirement for Continuous User Access 连续用户访问要求 www.cbinews.com 3. Virtual Dial-Up and User Access Management 基于虚拟拨号的用户接入技术研究与实现 168.160.184.78 4. Research on Web User Access Path's Difference Measurement Web用户访问路径的差异性度量方法研究 www.ilib.cn 5. Restrict SSH access by controlling user access 通过控制用户访问限制SSH访问 www.ibm.com 6. MFP New Kind of Data Mining Method on Web User Access Pattern 一种挖掘Web用户访问模式的新方法 www.ilib.cn 7. There are several different levels at which you can grant a user access to another user's mailbox 可以在几个不同的级别授予用户对另一个用户的邮箱的访问权限 technet.microsoft.com 8. A Clustering Research for User Access Patterns in Web Logs Web日志中用户存取模式的聚类研究 www.ilib.cn 9. Some Technologies and Application about Broad Band User Access Network Based on Twisted-Pair 几种基于双绞线的宽带化接入网技术及其应用 service.ilib.cn 10. User Access Control Modeling for PDM Systems 产品数据管理系统的用户权限管理 ilib.cn 1. Configure user access to job scheduling 配置用户对作业调度的访问 www.ibm.com 2. Mining User Access Patterns at E-Commerce Sites 电子商务网站的用户访问模式挖掘 www.ilib.cn 3. Web page recommendation model based on analyzing user access pattern 基于用户访问路径分析的页面推荐模型 www.ilib.cn 4. An end-user access interface (web-based) 一个终端用户访问界面(基于web) www.ibm.com 5. Optimization of WWW Navigation Path Based on User Access Patterns 基于用户访问模式的WWW浏览路径优化 www.ilib.cn 6. Web user access patterns clustering based on interest degree 基于兴趣度的Web用户访问模式分析 www.ilib.cn 7. Welcome to the User Access Wizard 欢迎使用用户访问向导 blog.csdn.net 8. End-user access solution that is appropriate for the selected operating system 最终用户访问解决方案,与所选的操作系统相对应 www.ibm.com 9. Research on User Access Control and Billing Based on VLAN Technique 基于VLAN技术的用户访问控制和计费研究 www.ilib.cn 10. The inquiry about user access to net 关于用户接入网的探讨 www.ilib.cn 1. A Web Pre-Fetching Model Based on Analyzing User Access Pattern 基于用户访问路径分析的网页预取模型 www.ilib.cn 2. Administrator: Perform administration actions, such as setting up project and folders, manage user access, and so forth 管理员:执行管理性操作。例如创建项目和文件夹,管理用户的访问等等。 www.ibm.com |
||||||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。