查询词典 Security
- 与 Security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Article 76 If in the process of examining and approving arrests, a people's procuratorate discovers illegalities in the investigatory activities of the public security organ, it shall notify the public security organ to make corrections, and the public security organ shall notify the people's procuratorate of what corrections have been made.
第七十六条人民检察院在审查批准逮捕工作中,如果发现公安机关的侦查活动有违法情况,应当通知公安机关予以纠正,公安机关应当将纠正情况通知人民检察院。
-
The problem with security mechanisms is balancing protection against user convenience. User complaints about Windows Vista\'\'s seemingly omnipresent UAC dialog box illustrate the frustrations that in-your-face security can present. In an attempt to enhance security without unduly inconveniencing users, Microsoft included a pre-approved list of controls that aren\'\'t automatically disabled by the Active X opt-in feature. These are commonly used controls that are known to be safe. Users won\'\'t be prompted before running those controls.
安全机制的问题是使防护与用户方便保持平衡用户抱怨Windows Vista看中去无处不在的用户帐户控制(User Account Control,UAC)会话框演绎着安全可出现的掉败为增强安全而又不过度地使用户感应坚苦,微软包含了一个预许列表,表中的控件不会被 Active X选择性插手特征自己主动克制这些个是已经知安全的经常使用控件在运行这些个控件前用户不会被提示
-
It is influenced by resources,the level of economic development,management,policy and other factors.The paper sets up indexs of assessing,and analyses the status of cultivated land resources quantity security on time and space.The result indicts that since the reform and open,the level of security ascended firstly then descended.From the point of view of regional distribution,the security standard o...
本文在分析耕地资源数量安全影响因素的基础上,构建其评价指标体系,并对我国耕地资源数量安全的时空差异规律进行了分析,结果表明,自改革开放以来,我国耕地资源数量安全状况呈先增后减的变化趋势;从安全水平的区域分布来看,北部和西部省份的安全水平普遍高于东部和南部省份,同时发现,区域安全水平与经济发展水平呈负相关关系。
-
6 Chapter 10 Computer and Network Security 10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches 10.1.2 KINDS OF SECURITY BREACHES A human who exploits a vulnerability perpetrates an attack on the system.
人可利用脆弱性对系统进行罪恶的攻击。人可利用脆弱性对系统进行罪恶的攻击。
-
As well as various deficiencies of the prevalent security technologies and measures, this paper intends to present a neotericarchitecture of network security - Embedded Firewall System'. This model, based on the Kerberos protocol, proffers a comprehensivesecurity solution integrated primary asPects of network security.
对现有安全技术普遍存在的若干隐患与不足进行了深入的探讨,并提出了一种用于构筑安全内部网的新型体系结构一嵌入式防火墙系统,该模型以Kerberos认证协议为核心,并集授权、安全数据传输和审计等机制于一体。
-
Our country's mortgage system was also produced on the base of economic developments in real estate industry and financial industry, whose main three bodies are the buyer、the property developer and the mortgage bank; the content includes three basic law relationships, which are the house buying and selling contract relationship、the borrow contract relationship and the charge security relationship; the purpose is to purchase the property; the target of the real estate buying and selling contract in the mortgage has identified with the one of the charge security contract; the mortgage becomes effective after the charge security target is gone through the registration form by the subjective government institutions; the mortgage title can be realized by receiving first recompenses.
我国的按揭制度也是以房地产业、金融业的发展为经济基础而产生的,其主体为购房人、房地产开发商及按揭银行三方主体;内容包括房屋买卖合同关系、借款合同关系、抵押担保关系三个基础法律关系;其目的是购置房地产;按揭中房地产买卖合同的标的与抵押担保合同的标的具有同一性;按揭在抵押担保标的向政府主管机关办理登记手续后方生效;按揭权通过优先受偿得以实现。
-
E.Public security authority shall quickly deal with the criminal and public security cases destroying foreign investment enterprises and foreign investors, strengthen the work of reconnoitering, protect the foreign investors' security of personal body and properties according to laws.
对侵害外商投资企业及外商的刑事、治安案件,公安机关要迅速接警、出警,并加大侦察工作力度,依法保护外商人身财物安全。
-
American supporters of Israel were delighted to learn that an Israeli company, Magal Security Systems-owned in part by the government of Israel-is in charge of security for the most sensitive nuclear power and weapons storage facilities in the United States.The largest perimeter security company in the world, Magal started out as a division of Israeli Aircraft Industries-which was owned in part ...
美国的支持者,以色列很高兴地获悉,一家以色列公司,马盖尔安全系统国有,部分由以色列政府-是在负责安全为最敏感的核电厂和武器储存设施,在美国states.the最大的周边安全公司在世界上,马盖尔开始作为一个分工,以色列飞机工业-这是在国有的一部分。。。
-
Its purposes is to convenient public security police process the computer management about call the police case, public security case, criminal case and can carry out quick searches and stat, the better service for realistic battle, solve bearing police security heavy load depend on handwork write in notes anciently, the use problem of a mass of manpower and material resources.
为了方便公安干警对报警案件、治安案件、刑事案件进行管理,实现快速检索和统计,更好地现实斗争服务,解决公安干警以往靠手工录入笔录所带来的工作量繁重、人力物力大量耗费等问题,运用先进的软件开发工具,开发犯罪现场笔录生成系统。
-
As soft switching technology based on the choice of network NGN IP network as a bearer network,network security is particularly prominent. IP Internet must adopt appropriate security strategy to ensure that the soft switch network Security.
由于基于软交换技术的NGN网选择了IP网作为承载网,网络安全问题尤其突出,必须在IP网上采用合适的安全策略,以保证软交换网的网络安全。
- 相关中文对照歌词
- Security
- The Security Of The Familiar, The Tranquility Of Repetition
- Security
- No Security
- True Security
- Security (Everybody Feels Better With)
- Security
- Security
- Security
- Fuck Da Security
- 推荐网络例句
-
In the negative and interrogative forms, of course, this is identical to the non-emphatic forms.
。但是,在否定句或疑问句里,这种带有"do"的方法表达的效果却没有什么强调的意思。
-
Go down on one's knees;kneel down
屈膝跪下。。。下跪祈祷
-
Nusa lembongan : Bali's sister island, coral and sand beaches, crystal clear water, surfing.
Nusa Dua :豪华度假村,冲浪和潜水,沙滩,水晶般晶莹剔透的水,网络冲浪。