• An optional latch bolt monitoring switch provides status and facilitates use in access control systems.

    访问控制系统里面,一个可选的碰监测交换机提供状态帮助

    youdao

  • In proprietary access control systems, information about these entities and their attributes is kept in repositories.

    专有访问控制系统中这些实体及其属性信息保存资料库中

    youdao

  • Other costs include the office construction, the installation of security systems and access control systems, and design fees.

    其他费用包括办公场地建造保安系统出入控制系统安装设计费用

    youdao

  • With version 3, considered the current version since 2004, the standard was improved with explicit authentication and access control systems.

    对于版本3(自从2004年以来最新版本),标准通过显式身份验证访问控制系统进行了改进

    youdao

  • The main products have anti-theft intelligent building intercom systems, access control systems, alarm systems, intelligent home systems.

    主要产品智能楼宇防盗对讲系统门禁系统、报警系统、家居智能化系统等。

    youdao

  • Siemens VDO products for automobile chassis and bodies, such as airbags, antilock brakes and access control systems also help improve safety and security.

    汽车底盘车身设计的产品(安全气囊防抱死系统和进入控制系统)提高了汽车的安全性能。

    youdao

  • In this paper, we designed the whole system, including digital video systems, access control systems and anti-theft alarm system. The 3 separate subsystems are also interactive.

    本文首先对系统进行了总体设计包括数字视频监控系统门禁管理系统防盗报警系统共三个子系统。

    youdao

  • Once associated only with Banks, jewelry stores, or museums, access control systems are now playing a much greater role in the overall design of all types of commercial buildings.

    门禁控制系统以前只有银行珠宝商店博物馆才涉及到,但如今所有类型商业建筑总体设计中正扮演更加重要的角色。

    youdao

  • As the current M1 card access control systems commonly used by crack, existing access control system security is facing a severe test, so select CPU card is the best means out of this predicament.

    由于目前门禁系统常用M1破解现有门禁系统安全面临严峻考验选择CPU卡则摆脱这种困境最好手段

    youdao

  • This includes functions such as loading and removing classification systems, and setting up access control policies.

    包括诸如加载删除分类系统以及设置访问控制策略等功能

    youdao

  • The source data remains under the control of the source systems and is pulled on demand for federated access.

    数据仍然在源系统控制之下根据需要进行提取,以进行联合访问。

    youdao

  • Although this design is simple, it's can be inadequate, leading some UNIX-type systems to extend it through access control lists and other mechanisms.

    尽管设计非常简单,但它可能不够从而导致某些unix系统通过访问控制列表其他机制对其进行扩展

    youdao

  • Some file systems support advanced security features, such as access control lists (ACLs).

    某些文件系统支持高级安全特性比如访问控制列表(acl)。

    youdao

  • Both systems allow collecting users into groups so that access control can be done more easily without having to touch many users for each change.

    个操作系统允许用户分组管理简化访问控制,以避免众多用户分别设置权限。

    youdao

  • They also had detailed knowledge of Siemens’s industrial-production processes and control systems, and access to the target plant’s blueprints.

    他们掌握了西门子工业生产流程控制系统详细资料,可以看到目标工厂设计图

    youdao

  • Have security requirements like access control and data privacy been met in both existing and legacy systems?

    访问控制数据隐私等安全要求现有遗留系统得到满足了吗?

    youdao

  • A few years ago, many (if not most) shops did not have access to bug tracking systems, version control, and other such tools; it was just the developers and their IDE of choice.

    几年之前很多(如果不是大部分)团队都没有使用bug跟踪系统版本控制其他类似工具只有开发人员他们选择IDE

    youdao

  • Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.

    尽管这个文件 ACL (Access ControlList) 保护,允许根用户访问但是这对于安全性要求的系统可能不够

    youdao

  • Instead, NSA has long wanted operating systems to also support "mandatory access control" (MAC) mechanisms.

    取而代之的,NS a长期以来一直希望操作系统同样支持强制访问控制(mandatory access control)”(MAC)机制

    youdao

  • The NSA found that most operating systems' security mechanisms, including Windows and most UNIX and Linux systems, only implement "discretionary access control" (DAC) mechanisms.

    NSA发现大部分操作系统安全机制包括Windows大部分UNIXLinux系统,实现了“选择性访问控制(discretionary access control)”(DAC)机制。

    youdao

  • File systems on Linux, AIX, Windows, and other operating systems support access Control Lists (ACLs) to limit access to directories that contain repositories.

    Windows文件系统以及其它操作系统的文件系统均支持Access ControlLists (ACLs),限制包含资料库目录访问

    youdao

  • TAMOS addresses these concerns by providing operating system-level access control for UNIX and Linux operating systems.

    TAMOS通过 UNIXLinux提供操作系统级访问控制来解决这些问题

    youdao

  • Personal Privacy: People should have the right to access, manage and control the data they generate, given AI systems' power to analyze and utilize that data.

    个人隐私在给予人工智能系统分析使用数据能力时,人们应该拥有权力访问管理控制他们产生的数据。

    youdao

  • Figure 8 shows a protected version-control repository used to host files that only authorized people or systems should access.

    8展示了一个受保护版本控制储存库,它用于存放只有已授权人员系统可以访问文件

    youdao

  • Workflow technology is widely applied in e-government systems, but the access control problems in workflow system are still not received enough recognitions and not effectively resolved.

    工作流技术广泛应用电子政务系统中,工作流系统中的访问控制问题没有引起足够重视得到有效解决。

    youdao

  • An access control mechanism is given for the protection of the resource module in the object oriented programming systems.

    给出了用于保护面向对象编程系统资源模块访问控制机制

    youdao

  • By setting up fine-grained privileges and role-based access control HP protected systems reduces configuration time and required customer skill level.

    设置细颗粒度授权角色访问控制惠普保护系统减少了配置时间客户所需技能水平要求。

    youdao

  • In addition, the 24-hour security service, CCTV monitoring, alarm and access control precision control systems are effective in ensuring a high degree of tight security.

    另外24小时保安服务闭路电视监控精密警报出入管理控制系统有效确保高度严密保安。

    youdao

  • Personal Privacy: People should have the right to access, manage and control the data they generate, given AI systems 'power to analyze and utilize that data.

    个人隐私在给予人工智能系统分析使用数据能力时,人们应该拥有权力访问管理控制他们产生的数据。

    youdao

  • Personal Privacy: People should have the right to access, manage and control the data they generate, given AI systems 'power to analyze and utilize that data.

    个人隐私在给予人工智能系统分析使用数据能力时,人们应该拥有权力访问管理控制他们产生的数据。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定