有奖纠错
| 划词

Data confidence, integrity, nonrepudiation, identity and access control are the five key factors to protect online bank, stock, tax from attacks.

数据机、防抵赖、身份识别、访问控制五个关键全问题是保证网上银行、网上证券、网上报典型的网上交易系统全运行的基础。

评价该例句:好评差评指正

用户正在搜索


aldrin, Aldrosol, Aldur, aldural, Aldurbra, Aldurol, ale, aleak, aleatoric, aleatorism,

相似单词


3G, 401(K), a,

声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。

BBC随身英语(版)

Control of access to flight paths will also need to be worked out.

还需要解对飞行路径的访问

评价该例句:好评差评指正
科技 Crash Course

There are many other models for access control – like the Chinese Wall model and Biba model.

还有许多其他的访问模型——比如 Chinese Wall 模型和 Biba 模型。

评价该例句:好评差评指正
科技 Crash Course

To solve this problem, Ethernet requires that each computer has a unique Media Access Control address, or MAC address.

为了解这个问题,以太要求每台计算机都有一个唯一的媒体访问地址,即 MAC 地址。

评价该例句:好评差评指正
科技 Crash Course

This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.

这是通过权限或访问表 (ACL) 完成的,它描述了每个用户对计算机上的每个文件、文件夹和程序的访问权限。

评价该例句:好评差评指正
科技 Crash Course

For organizations with users at different levels of access privilege – like a spy agency – it's especially important for Access Control Lists to be configured correctly to ensure secrecy, integrity and availability.

对于拥有不同级别访问权限的用户的组织(如间谍机构),正确配置访问表以确保保密性、完整性和可用性尤为重要。

评价该例句:好评差评指正

用户正在搜索


alegar, Alegria, alehouse, Aleichem, Aleixandre, Aleksandropol, Aleksandrovsk, Alemanni, Alemannic, Alembert,

相似单词


3G, 401(K), a,
  • 微信二维码

    关注我们的微信

  • 手机客户端二维码

    下载手机客户端

赞助商链接