英语人>网络例句>database access 相关的网络例句
database access相关的网络例句

查询词典 database access

与 database access 相关的网络例句 [注:此内容来源于网络,仅供参考]

If you want to access a database multiple times, you should establish a connection using the Connection object. You can also make a connection to a database by passing a connection string via a Command or Recordset object.

如果你想多次访问数据库,你可以使用Connection对象建立一个连接;你也可以通过一个指令或记录对象传递一个连接字符串从而来创建一个到数据库的连接。

The method to access attribute database by Borland Database Engine in a complex way was provided in this thesis.

在对属性数据进行处理方面,利用Borland的数据库引擎BDE对属性数据库进行了多种形式的查询和修改。

The data transformation platform is designed in accordance with modularization, which masks the access from upper application by data wrapping module and submits DataSet objects to upper application. DataSet exchange module finishes heterogeneous data exchange by using XML capsulation of DataSet. For the synchronization process of heterogeneous data, it uses table trigger and Updates Information Table to capture change from source database table. The Update Information Table keeps the DML statements operated on tables which need to be synchronized. In the course of synchronization, synchronization module extracts DML operation field from Regenerate Information Table DataSet. At last, it updates the table fields of destination database by using command object.

数据转换平台的实现采用模块化设计,通过数据包装模块屏蔽上层应用对数据库的访问和将包装好的数据集对象提交给上层应用来实现,数据转换模块利用DataSet对XML的封装完成底层异构数据的交换;在异构数据同步的处理上,采用触发器结合更新信息表的方式获取源数据库上表内容的变化,更新信息表保存作用在同步表上的DML语句,然后在同步的过程中利用数据转换平台的同步模块对更新信息数据集中的DML操作字段进行数据抽取,最后通过命令对象将变化更新到目的数据库的表字段中。

For example, some ungranted users may intrude database through rounding the system access control mechanism, and get the data illegal;the lost of data storing medium could result in the data-leaking in the database;the internal manager do misfeasance utilizing his own purview.

某些非授权用户可能绕过体系的拜访控制机制入侵数据库,非法地获取数据;寄存数据的介质丢失,造成数据库中的数据泄露;内部管理人员应用其自身权限从事不当行为等等。

SQL Server database used by the query language called Transact-SQL, SQL Server is the core, Transact-SQL strengthen the original SQL keywords for data access, storage and handling, and other functions, Transact-SQL expanded Process control designation, so that you can facilitate the preparation of the powerful storage process, they kept in the server side, pre-compiled and that the implementation rate is very block, the trigger is a special storage process, SQL Server database to ensure the integrity of quote , You can create insert, delete and update the trigger to control the relevant data in the table shown in the insert, delete, and update, you can also use the rules, default and restrictions, to assist the new Numerical applied to the table!

SQL Server所使用的数据库查询语言称为Transact-SQL,它是SQL Server的核心,Transact-SQL强化了原有的SQL关键字以进行数据的存取,储存及处理等功能,Transact-SQL扩充了流程控制指定,可以使你方便的编写功能强大的存储过程,他们存放在服务器端,并预先编译过,执行速度非常块,触发是一种特殊的存储过程,用来确保SQL Server数据库引用的完整性,你可以建立插入,删除和更新触发以控制相关的表格中对数据列的插入,删除和更新,你还可以使用规则,缺省以及限制,来协助将新的数值套用到表格中去!

Given the overload of database, parallel access of multi-database is implemented.

考虑到数据库的负载,实现了多数据库并行存取技术。

This security database system can provide safe services with the granularity of the recording level. Simultaneously, its realization has not destroyed the access control mechanism of the original database system.

该安全数据库系统能够提供粒度为记录级的安全服务,同时,它的实现没有破坏原有数据库系统的访问控制机制,对于整个数据库的影响非常小。

By the application server of MS, CATV operators can access the database server to independently manage the users. The network bottleneck, performance descent brought by the overabundant connection of database and load balance of business process is solved effectively, and the response time of database and system security is improved.

各有线电视网络运营商可通过管理系统的应用服务器,访问数据库服务器,达到了用户的独立管理,有效地解决了网络瓶颈和数据库连接数量过多造成的数据库性能下降的问题,实现业务处理负载均衡,提高了数据库响应速度,同时使系统的安全性得到提高。

This paper completed software project management system, including the demand analysis, system design. The demand analysis includes demand research, flow analysis, usecase modeling, user interface design. The system design includes outline frame design (presentation layer, business layer, dataaccess layer), system function design, user interface design, database design, security design. Based on the design, the system implemented the task arrangement function and dayreport input function, dayreport postil function. During the process, using the iBATIS O/R mapping to access the database.

论文进行了软件项目管理系统的设计与实现工作,包括需求分析、系统设计和实现,其中需求分析包括需求调研、业务流程分析、用例建模和用例细化、交互建模、用户界面原型设计,系统设计部分包括总体框架设计(含显示层设计、事务逻辑层设计、数据访问层设计)、系统功能设计、用户界面设计、数据库设计、安全性设计,并在此基础上实现了任务安排、日报填写、日报审批等业务功能,采用iBATIS对象关系映射通用框架对数据库的底层进行访问和操作。

We used API offered by the corporation to access the Database ,to independent the system to database to boost up independency ,security ,and make the system more rationable.

同时在数据库访问过程中使用该公司提供的数据库访问API来访问该公司的数据库。

第11/22页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。