电子邮件
- 与 电子邮件 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
"Electronic mail" has gone from E-mail to e-mail to email, and it is regularly used as a countable noun.
电子邮件"从电子邮件去到电子邮件发电子邮件,并且它通常使用作为一个可数的名词。"
-
If you haven't has the particular email address set as a supported and verified email address which can be used as "Send Mail As" email address, Gmail will automatically prompt you to create one once Mail Fetcher setup completed.
如果您还没有具有特别的电子邮件地址设置为支持和验证的电子邮件地址可以被用来作为"发送邮件"的电子邮件地址, Gmail会自动提示您创建一个一旦邮件提取安装完成。
-
To set up mail fetcher to download and retrieve emails from external email accounts, simply click on "Add another mail account", and then enter the full email address of the account you'd like to access, then click Next Step.
设立邮件提取下载和检索电子邮件从外部的电子邮件帐户,只需点击"添加其他邮件帐户",然后输入完整的帐户的电子邮件地址您想要进入,然后点击下一步。
-
Mail Fetcher 邮件提取 allows users to directly import mail from a POP3 supported email service into GMail.
允许用户直接导入邮件从POP3支持的电子邮件服务到Gmail 。
-
In the part I, the concept, development and current lawmaking status of E-mail are introduced. In this part, the writer states the source, development and basic technical principals of E-mail and analyses its current application status and the importance of effectiveness identification of being evidence. Besides, related international laws on E-mail and lawmaking status in many countries are introduced. Present situation of our country's lawmaking and related model laws since the utilization of E-business and E-mail are also stated and discussed. Part II emphasizes on the differences between E-mail and traditional evidences and generalizes the characteristics of E-mail, i.e.: forgeability, changeability, dependence, uncertainty, duplicatability and transmission. Through the detailed analysis, the writer concludes that it is the above-mentioned characteristics to hinder E-mail becoming the effective evidence. Part III is the key one of this article and mainly discusses the effectiveness identification of E-mail as evidence. In this part, the writer states how the 5 characteristics of E-mail mentioned in Part II to affect the validity and authenticity of E-mail as evidence.
第一部分介绍了电子邮件的概念、发展及立法现状,在该部分中笔者详细阐述了电子邮件的产生、发展以及电子邮件运作的基本技术原理,论述了电子邮件目前的应用状况以及解决其作为证据被认定问题的重要性,同时还介绍了世界上与电子邮件有关的相关国际规范以及各国立法的情况,并讨论了我国自电子商务及电子邮件使用以来的立法现状以及相关的典型立法;第二部分重点阐述了电子邮件与传统证据的区别,并将这些区别归纳为电子邮件作为数据电文的一种类型所具有的特殊属性,即:易伪造性,易修改性,依附性,原件不确定性,易复制和传播性,通过对这些特性的详细阐述,得出了这些属性是导致电子邮件无法成为有效证据的主要障碍的这一结论;第三部分是本文的重点,着重讨论了电子邮件证据效力的认定问题,该部分主要阐述了第二部分提及的电子邮件的五个特性造成了电子邮件证据在合法性和真实性这二方面的障碍。
-
As to the procedure of obtaining evidence, the writer points out some procedures which are illegal and will result in the invalid of E-mail; as to the authenticity, several methods to identify were concluded and their advantages and disadvantages are also listed. In addition, the writer points out that the laws in force on the authenticity of E-mail were very macroscopic and vague. And there are not concrete laws in effect to identify the authenticity of E-mail without electronic signature and encryption. So the writer explains his views that each links of E-mail's lifecycle should be deeply analyzed and checked to exclude the possibilities of unauthenticity of E-mail.
就取证程序方面,该部分则指出了哪些取证程序是违反法律并可能会导致电子邮件无效;就电子邮件真实性的问题,本文主要从现有立法归纳出几种认定电子邮件真实性的具体方式,并阐述了这些方式的利弊,同时笔者还在该部分指出,现行法律对于电子邮件真实性问题的认识,仍仅停留在宏观层面,显得过于宽泛,尤其是针对未经签署电子签名和加密的电子邮件真实性的认定问题,现行法律没有进行具体规范。
-
Note that Amic Email Backup does not let you backup from one email program and restore to a different email program, they both have to be the same email client.
请注意, amic电子邮件备份,并不会让你备份从一个电子邮件程序和还原到不同的电子邮件程序,他们都必须相同的电子邮件客户端。
-
Amic Email Backup amic电子邮件备份 is cool because it can not only backup your email database, but it can also backup address books, settings, mail and news accounts, message rules, blocked senders lists and signatures all to a single, compact, compressed backup file that can be easily restored when necessary.
是冷静,因为它不仅可以备份您的电子邮件数据库,但它也可以备份地址簿,设置,邮件和新闻帐户,邮件规则,阻止发件人名单和签名,所有维持一个单一,结构紧凑,压缩备份文件可以很容易恢复必要时。
-
An integrity and security e-mail system resolution is provided, which is encrypted by user finger mark.
提出并实现了一种采用指纹加密的、安全的、完整的电子邮件解决方案,包括指纹加密电子邮件服务器、指纹加密电子邮件客户端、指纹加密电子邮件用户管理和一个遵循X.509v3规范的三级CA证书认证体系等4个部分。
-
Need it the most, since I'm subscribed to 5 mailing lists, which can be quite hectic to manage since hundreds of people can send hundreds of emails within an hour, imagine if u use the bb email system, it sure use up ur bb memory.with Gmail apps on bb, u can have separate email acct for each mailing list.
最需要的,因为我订阅的邮件列表5,可管理十分繁忙,因为数百人可以在一小时内发送了数百封电子邮件,想象如果u使用降B电子邮件系统,它肯定使用了乌拉圭回合降B BB型对memory.with的Gmail应用,u能有单独的每一个邮件列表的电子邮件会计。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。