英语人>网络例句>unauthorized 相关的网络例句
unauthorized相关的网络例句

查询词典 unauthorized

与 unauthorized 相关的网络例句 [注:此内容来源于网络,仅供参考]

Further, the Reserve Bank of Malawi wishes to advise all local importers and the general public that dealing in foreign currency with unauthorized persons, including intersectional corporations and non-governmental organizations, is also a violation of Exchange Control Regulations.

此外,马拉维储备银行奉劝本地进口商和公众、包括国际公司和非政府组织,所有与未经政府授权的人进行外汇交易的行为,均属违反《外汇管制条例》。

The following text will briefly introduce common interferences from adjacent satellite , cross-polarization and inter-modulation , and the carrier interference caused by uplink device , and also launched unauthorized even intrusively .

下文将粗略介绍常见的邻星干扰、反极化干扰、互调干扰、由上行设备引起的载波干扰、以及非授权使用和恶意干扰等星上干扰,并对相关的分析处理方法作经验探讨。

An unauthorized or unofficial court, usually self constituted, as a mock court by prisoners in a jail or a frontier court:…shot down over North Korea in 1952 and condemned to prison by a Red kangaroo court.

以前在Kangaroo州,法官巡回各地办案,由这跑到那,很像袋鼠跳来跳去,所以叫袋鼠法庭。

The user will be held liable for the consequences of any unauthorized conversions or modifications to the machine.

该用户将被追究法律责任的后果,任何未经授权的转换或修改机器

Prevention of the illicit transfer and unauthorized access to and use of man-portable air defence systems

62/40。防止非法转让和擅自获取及使用单兵携带防空系统

Recognizing the threat to civil aviation, peacekeeping, crisis management and security posed by the illicit transfer and unauthorized access to and use of man-portable air defence systems

认识到非法转让、擅自获取和使用单兵携带防空系统对民航、维持和平、危机管理和安全构成的威胁

Acknowledging the role of the unauthorized transfer of relevant materials and information in assisting the illicit manufacture and illicit transfer of man-portable air defence systems and related components

承认擅自转让有关材料和资料在协助非法制造和非法转让单兵携带防空系统及相关部件方面的作用

Recognizing the threat posed to civil aviation, peacekeeping, crisis management and security by the illicit transfer and unauthorized access to and use of man-portable air defence systems

认识到非法转让和擅自获取及使用单兵携带防空系统对民航、维持和平、危机管理和安全构成的威胁

With nodes of the vast network , more and more sensitive information is being stored and manipulated online , the computer network is more vulnerable to miscellaneously malicious or unauthorized actions , network security is becoming increasingly important .

而在网络增长的同时,越来越多的敏感信息被在线存储和管理,使网络更加脆弱,更容易受到网络上各种恶意或非法用户的攻击,因此网络安全已变得越来越重要。

Loss or damage caused by unauthorized usage or misusage of the applicant's account; d.

由於未被授权者使用或误用申请人的帐号引起的损失或责任; d。

第6/19页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
相关中文对照歌词
U.B.R. (Unauthorized Biography Of Rakim)
Library Card
Freak In The Bed
H2O Gate Blues
Intro
Stay Out Here
Callin' Out Names
The Adventures In Wonderland
In Black And White
推荐网络例句

Liapunov—Schmidt method is one of the most important method in the bifurcation theory.

Liapunov—Schmidt方法是分叉理论的最重要方法之一。

Be courteous -- even when people are most discourteous to you .

要有礼貌──即使当別人对你最不礼貌的时候。

I think we have to be very careful in answering these questions, because nothing is really so simple.

我认为,我们在回答这些问题的时候应该非常谨慎,因为事情远没有那么简单。