英语人>网络例句>security guard 相关的网络例句
security guard相关的网络例句

查询词典 security guard

与 security guard 相关的网络例句 [注:此内容来源于网络,仅供参考]

On guard , on one's guard , on your guard , upon one's guard

导航:英语在线翻译|日语在线翻译,如有疑问欢迎联系我们

According to the research results, the source of ritual instruments of temple's honor guard contains not only the origin of national ceremony system in China's feudal ages but also the conception of "honor guard of gods","parades of effigies","Nuo plays", and the prodding of "honor guard in sacrificial rites","knighting for gods from government","folk drama". Under these processes of development, the ritual instruments of temple's honor guard were spread widely in folk temples, and were introduced into Taiwan in early Ching dynasty.

研究结果发现,寺庙仪仗器物的产生渊源乃由国家仪仗礼制所发展而来,但这并非是唯一的源头,中间尚包含了由国家仪仗礼制所发展出来的「仙仗」概念以及「行像」、「傩戏」等俗作为概念根基,以及「官方祀典仪仗」、「官方封赐神明的风潮」、「民间戏曲」等现象的推波助澜,始让中国民间寺庙使用仪仗器物之俗有所普及并流传发展至今,而大约在清代中叶,随著中国移民前来拓垦,将此俗正式带入台湾。

1 A cord set may not be deemed "passing" if any of the following conditions occur:(1) cord guard becomes torn;(2) cord guard pulls out of the housing;(3) cord pulls out of the cord guard/housing;(4) cord slips more than 2 mm from beneath the cord clamp (for cord sets employing a clamping system);(5) cord slips more than 2 mm from inside the cord guard; either cord conductor slips more than 5mm into the cord jacket; and (6) there is evidence of an electrical arc discharge (short circuit of the cord conductors).

如果发生以下情况,此样品认为&不合格&(1)尾档破损(2)尾档拉出机架(3)电线拉出尾档或机架(4)电线从夹具上滑移大于2mm (对于采用夹住方法的插头)(5)电线滑进尾档大于2mm:有一电线导体滑进外被超过5mm

In order to improve the condition of guide device of 3 500 mm finish mill and reduce the failure rate,a series measures were adopted: ameliorating hanging position of the guard plate,optimizing occlusal surface parameter of the uide wien guard tlate,altering guard plate location mode when changing roll,redesigning the bottom of guard sheet.

为改善3 500 mm精轧机导卫装置设备状况,减少故障,改进了护板吊挂方式,优化了导板与护板咬合面参数,改变了换辊时护板定位方式,重新设计了护板底部形状,消除了安全隐患,满足了高质量快节奏生产的要求。

Guard duties at fixed points chiefly mean, among others, security guard, watch and ward, prison and detention guard, escort and patrol.

固定目标执勤,主要是担负警卫、守卫、守护、看押、看守和巡逻等勤务。看守人;守护人;照料者

The first guard line is a proactive intrusion response method based on intrusion graph, which can make proactive reactions in the forepart in order to prevent the final attacking goals from realizing, furthermore, to protect systems security. The second guard line is an intrusion response method based on damage containment techniques. This guard line will contain damaged data quickly and precisely, then release correct data contained mistakenly just now, which can maintain basic service functions for legal users even though intrusion response has been disabled.

一方面,利用基于入侵攻击图的先应式入侵响应方法,在检测到入侵行为的前期进行防御,在入侵者的攻击目的完全实现之前给予响应,尽量阻止其攻击目的的实现,并采用博弈方法进行策略分析,使系统的响应成本达到最低;同时利用基于数据破坏隔离技术的入侵响应方法作为第二道防线,在前期的入侵响应失效、关键数据已经被破坏的情况下,利用破坏隔离技术精确定位被破坏的数据并迅速释放被误隔离的数据,最大限度地提高数据利用率,从而保证系统向用户提供不问断的服务。

Our country'S traditional social security fund raises the mode,does not divide the nature of ensuring the proj ect,the accounting on a cash basis of implementation without exception,one that is with the reform of the social security system and social security system is sound,range and enlargement of scale of social security,single accounting on a cash basis already unbearable social security complicated request of situation.

我国传统的社会保障基金筹集模式,不分保障项目的性质,无一例外地实行现收现付制,随着社会保障制度的改革和社会保障体系的健全,社会保障的范围和规模的扩大,单一的现收现付制已难以应付社会保障复杂情况的要求。

The major part of security information consists carpophore security , operations security , information security and security personnel .

计算机信息网络的安全主要是指实体安全,运行安全,信息安全,和安全人员。

It is known that the security defense intensity of the information system depends on the weakest part of Maginot line. If there is no appropriate security architecture as a guide, it is difficult for the various security components in the information system to coordinate with each other and to work in order. Then, it often appears the "safety shortcomings" phenomenon, resulting in the vulnerability in the security and all the protection efforts in the information system are in vain. 2 Trusted computing and security mechanisms come apart.

众所周知,信息系统的安全防护强度取决于"马奇诺防线"中最为薄弱的环节,如果没有合理的安全体系结构作为指导,信息系统中各安全部件就难以相互协调、有序工作,就很容易出现"安全短板"现象,从而导致信息系统安全防护不堪一击,所有的努力功亏一篑。2可信计算和安全机制相脱节。

This article first has carded on the limits to the spirit security concept,then discusses in this foundation by the Mallow's Hierarchy of Needs theory,social safety-valve theory, harmonious society theory as theoretical stupors of spirit protection,Pointed out that the spiritual security supply and demand contradictory prominent,the spiritual security emergency lag is the existence subject matter in our country spirit security development.The reasons are manifold.If we want to achieve the spirit protection,we must steps in the multiple participation,the system design recuperation,the theoretical research strengthen and the integration of multiple resources. Only in this way,Social security can play the role of social safety net and truly promote social harmony.

本文首先对精神保障的概念进行了界定,并在此基础上以马斯洛需求层次论、社会安全阀理论、和谐社会理论等作为支撑,对我国精神保障的发展现状进行了分析,指出精神保障供求矛盾突出、精神保障应急滞后是目前我国精神保障发展存在的主要问题,而其原因是多方面的,所以一定要通过多元主体的参与、制度设计的调理、理论研究的强化、多方资源的整合等才能达成精神保障的发展,才能更好的发挥社会保障的安全网作用,真正促进社会和谐。

第3/500页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Raleigh Soliloquy Pt. II
Nothing To Dismay
Security
Guard Your Grill
Security
Fuck Da Security
Security
True Security
Guardian Angel
Dude (Skit)
推荐网络例句

Salt is good, but if the salt becomes flat and tasteless, with what do you season it?

14:33 盐本是好的,盐若失了味,可用什么叫它再咸呢?

He reiterated that the PLA is an army of the people under the leadership of the Communist Party of China.

他重申,人民解放军是在中国共产党领导下的人民军队。

After five years at the Laue-Langevin Institute in Grenoble, France, Jolie turned his focus to experimental work when, in 1992, he accepted a position at the University of Fribourg in Switzerland.

他在法国格赫诺柏的劳厄–蓝吉分研究所工作了五年之后,1992年转往瑞士夫里堡大学从事实验研究。