英语人>网络例句>permissions 相关的网络例句
permissions相关的网络例句

查询词典 permissions

与 permissions 相关的网络例句 [注:此内容来源于网络,仅供参考]

C. Delete the Geof user account, create a new user account for Alix, and assign it the same permissions that Geof's account was assigned.

C。 删除Geof使用者帐户,为Alix建立新的使用者帐户并指派与Geof帐户相同的权限。

D. Disable the Geof user account, create a new user account for Alix, and assign it the same permissions that the Geof user account was assigned.

D。 停用Geof使用者帐户,为Alix建立新的使用者帐户并指派与Geof帐户相同的权限。

Associated with each segment is a base address, size, permissions, and other meta-data.

与每个分段相关联的信息有基地址、大小、权限和其他中间数据。

This first set of permissions is created by Samba in exactly the same way as normal file permissions are, described above, and is displayed in the same way.

第一组权限设定由samba以和普通文件权限一样的方法来建立、描述和显示。

In the opening session I had a question in regards to item level permissions and anonymous access, for instance if you break inheritance at a folder level to assign unique permissions you will not be able to allow anonymous access from that point on.

在开幕会议上,我遇到一个关于项目级权限和匿名访问的问题,例如如果你断开一个项目与父文件夹层的继承关系,而赋予它独有权限,那么你就不能使得这个项目被匿名访问。

Permissions can be inherited, and sometimes to open a file security label attribute may not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents", the documents can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

Permissions can be inherited, and sometimes to open a file security label attribute may in Figure 4 does not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents ", the document can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能在图4不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

When a user attempt s to perform an operation on a database object that employs security features, that user′s set of permissions are based on the intersection of that user′s explicit and implicit permissions.

当用户要对使用了安全功能的数据库对象执行操作时,该用户所具有的权限基于他的显式和隐式权限的交集。

When a user attempts to perform an operation on a database object that employs security features, that user′s set of permissions are based on the intersection of that user′s explicit and implicit permissions.

当用户要对使用了安全功能的数据库对象执行操作时,该用户所具有的权限基于他的显式和隐式权限的交集。

The article improved and expanded the threshold access control model based on quantified permissions, solved the problems of access control system deduced by introducing permission quantity into permission concept, such as huge quantity of permissions and vales, heavy administration load, and inadequation to deal with the dynamic quantity evolution.

对基于量化权限的门限访问控制方案进行了改进与扩展,解决了权限概念引入权限量后导致的访问控制系统权限及角色数量巨大、管理负荷沉重以及不适应权限量动态演化的问题。

第1/11页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。