用户信息
- 与 用户信息 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Inodes provide important information on files such as user and group ownership, access mode (read, write, execute permissions) and type.
信息点提供了文件的重要信息,如用户和用户组的拥有权,访问方式和类型。
-
In other words , finding a relevant flight or piece of accommodation on the mobile meta site has the potential to descend into irrelevancy as the airline or hotel may not take mobile bookings , or the process is convoluted and not particularly good
换句话说,用户在移动元搜索网站上面发现有关的航班或一则酒店住宿信息后希望进行预订,但是或许航空公司或酒店都不提供手机预订服务或者处于探索运用的阶段,而且效果不佳,而这些都会让用户感到失望。
-
Figure 25-2: This is how most users perceive error message dialog boxes. They see them as Kafkaesque interrogations with each successive choice leading to a yet blacker pit of retribution and regret.
图25-2 这是大多数用户理解错误信息对话框的方式,用户把这当做卡夫卡式的审问,每个后续的选择都会导致惩罚和悔恨。
-
Users' certificates are signed by CA and then respectively sent to each user to keep.The message and its digital signature are encrypted to transmit in the network without disclosure.The scheme proposed provides mutual authentication between the sender and the recipient,and the confidentiality,integrity and nonrepudiation of the interchanged messages are ensured.
通信的各方产生自己的私钥和公钥对,用户的证书由CA签发后交给用户保存,交换的消息和其签名等信息采用压缩加密传输,避免了消息在传输的过程中被第三者窃取或篡改,保证了数据的机密性、完整性和不可否认性。
-
Should the law concerned not permit proprietorial rights, but grant the Principal/Supplier other rights of reservation of the goods, the Principal/Supplier is empowered to exercise all of the said rights.
注意:非注册用户没有发表信息的权利。登录点击(最多可以插入5张图片,未登陆状态请手工输入图片url )发言前,请仔细阅读并同意以下注意事项,未注册用户请返回社区首页注册。1。请尊重网上道德;2。遵守互联网电子公告服务管理规定及中华人民共和国其他各项有关法律法规
-
Revent Virus/hacker attacking to users' PC, check and prevent users using unauthorized software by IT.
对用户电脑反病毒和黑客袭击,核对和阻止用户使用盗版的信息技术软件。
-
The thesauri will be used to index and search domain information in systems, the main users will be public domain web users, the digital surface and visualization will be the main windows of thesauri.
叙词表主要用于计算机系统后台的标引和检索,用户主要为使用网络检索专业信息的普通用户,数字界面和可视化将是叙词表的主要表现形式。
-
Orc. This kind of vermian camouflage becomes the picture document of user scrapbook, in when other user visits scrapbook, can breed and travel, the hacker can be in this process purloin is private information.
Orc攻击。这种蠕虫伪装成用户剪贴簿的图片文件,在其他用户访问剪贴簿之时便可繁殖并传播,黑客可在此过程中盗取私人信息。
-
After decoding the user role encapsuled in active packet, we can obtain the method describing policy of access control in policy store, called capability.
在主动信包中封装用户角色信息,主动节点解析出用户角色后,依据它在策略库中匹配相应的描述控制访问权限策略的方法,即权能。
-
Note that these predictions are specific to the user, but use information gleaned from many users.
请注意,这些预测是特定的用户,但利用信息收集到许多用户。
- 推荐网络例句
-
According to the clear water experiment, aeration performance of the new equipment is good with high total oxygen transfer coefficient and oxygen utilization ratio.
曝气设备的动力效率在叶轮转速为120rpm~150rpm时取得最大值,此时氧利用率和充氧能力也具有较高值。
-
The environmental stability of that world - including its crushing pressures and icy darkness - means that some of its most famous inhabitants have survived for eons as evolutionary throwbacks, their bodies undergoing little change.
稳定的海底环境─包括能把人压扁的压力和冰冷的黑暗─意谓海底某些最知名的栖居生物已以演化返祖的样态活了万世,形体几无变化。
-
When I was in school, the rabbi explained everythingin the Bible two different ways.
当我上学的时候,老师解释《圣经》用两种不同的方法。