查询词典 vulnerabilities
- 与 vulnerabilities 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is estimated that to repair and inspection system security vulnerabilities will spend millions of dollars, almost equivalent to the cost of construction.
据估计,要修复系统和检查安全漏洞将花费数百万美元,几乎相当于系统的建设成本。
-
The vulnerabilities of this system have been on display for the last several years, as a deep and persistent drought in northern Mexico, combined with an inadequate binational water management framework, led to a serious binational dispute over Mexico's water delivery obligations under the 1944 Treaty.
过去这几年,此系统已显得脆弱不堪,北墨西哥持续严重干旱,加上两国水源管理框架的不恰当,导致两国针对1944年条约中所规定墨西哥的供水责任起了严重争端。
-
Many times, vulnerabilities that affect the entire application, are introduced when building the SQL code.
大多数正是在建立SQL代码并在引用的时候,漏洞影响到了整个应用程序。
-
With its unique influence, NGO's help as a government, public utilities added more channels to raise social resources of the development process in the Haidian played a good bridge and a supervisory role, on the other NGO organizations have a civic-minded at the same time representation, to assist the Government in ensuring the deal with some issues in a fair and equitable decision-making also will be more mature and concrete, to avoid the Government's major policy decisions on the imbalances and vulnerabilities.
由于其独特的影响,非政府组织的帮助下作为一个政府,公共事业增加了更多的渠道,提高社会资源的发展进程中发挥了良好的海淀桥梁和监督作用,对其他非政府组织组织有公德心的同时代表,以协助该国政府在确保处理一些问题的公正和公平的决策也将更加成熟,具体,以避免政府的重大决策上的失衡和脆弱性。
-
But this concentration has created new vulnerabilities and forms of contagion risk.
但这种集中行动已带来了新的漏洞和风险蔓延形式。
-
The evaluation methods of propellant vulnerabilities in laboratory scale are screened out to evaluate heat endurance by analysis and classifying of potential contretemps during propellant development, production, storage, and transportation and in battlefields. Evaluation results indicate that the designed compositions show very good heat endurance.
同时,通过对发射药在研制、生产、贮存、运输和实际战场中可能遇到意外事故的分析、归类,结合实际,选择了以耐热性能作为评价目标的易损性实验室评价方法,采用该方法对所设计的发射药进行了耐热性试验,结果表明,该发射药具有优良的耐热性能。
-
Epidemical viruses and hacker invade attacks are mainly based on the vulnerabilities and flaws of the computer system or software.
完善的安全漏洞信息系统,对于提高系统安全性,减少安全事件发生具有重要意义。
-
Security vulnerabilities existing in computer systems are the main threats and hidden troubles to the security of current network. Epidemical viruses and hacker invade attacks are mainly based on the vulnerabilities and flaws of the computer system or software.
计算机系统存在的安全漏洞是当前网络的主要安全威胁和隐患,流行的病毒或者黑客入侵攻击多数是基于系统或软件中存在的漏洞的。
-
At present, computer viruses, network attacks, vulnerabilities, network Bukexiaoqu leak and other issues are also likely to face false information harmful, or even a network illegal and criminal activities.
目前,计算机病毒、网络攻击、系统漏洞、网络泄密等问题都不可小觑,还可能遭遇到虚假有害信息,甚至有网络违法犯罪行为。
-
The two vulnerabilities are nearly identical, with the differentiating factor being the value of a flag bit within a record of the file.
这两个弱点几乎是一样的,与分化的因素是价值旗位在一个记录文件。
- 推荐网络例句
-
It has been put forward that there exists single Ball point and double Ball points on the symmetrical connecting-rod curves of equilateral mechanisms.
从鲍尔点的形成原理出发,分析对称连杆曲线上鲍尔点的产生条件,提出等边机构的对称连杆曲线上有单鲍尔点和双鲍尔点。
-
The factory affiliated to the Group primarily manufactures multiple-purpose pincers, baking kits, knives, scissors, kitchenware, gardening tools and beauty care kits as well as other hardware tools, the annual production value of which reaches US$ 30 million dollars.
集团所属工厂主要生产多用钳、烤具、刀具、剪刀、厨具、花园工具、美容套等五金产品,年生产总值3000万美元,产品价廉物美、选料上乘、质量保证,深受国内外客户的青睐
-
The eˉtiology of hemospermia is complicate,but almost of hemospermia are benign.
血精的原因很,以良性病变为主。