The KeyedFile class represents a system file that has access by key while the SequentialFile class represents a system file that has access by record number.
Keyed file类表示一个通过密钥访问的系统文件,而sequentialfile类表示一个通过记录编号访问的系统文件。
Private objects are protected by user access key.
私有对象由用户访问密钥保护。
We want to document these, because by documenting and carefully analyzing the barriers to women's participation in these key markets, we can identify policy levers to increase that access.
我们想要把这些记录在案,因为通过记录和认真分析在这些关键性的市场对妇女参与设置的障碍,我们就能搞清楚改进获取渠道的政策杠杆。
Simple access is a little slower than a simple query (find a single object by primary key) to a database.
对数据库的简单访问要比对数据库的查询(通过主键找到一个单一对象)慢一些。
By clicking to Rational SCM functions right from this ide, they can get transparent access to key project tasks and assets that actually reside on Linux.
他们可以通过这种IDE点击RationalSCM程序,这样可以实现对驻留在Linux上的主任务和资源的透明访问。
This command sequence specifies an initial password of "jamespass" required by subsequent commands to access the private key associated with the alias "james" in the keystore "jamesKeyStore."
这个命令序列指定了一个初始密码“jamespass”,后续的命令在访问keystore “jamesKeyStore”中与别名“james”相关联的私钥时,就需要这个密码。
The domain's support provides this key feature to augment the functionality provided by the Role Based Access Control (RBAC).
对域的支持提供这个关键特性,以此补充RoleBasedAccessControl (RBAC)提供的功能。
The Linux key retention service is a new mechanism introduced to hold security-related information for fast access by the Linux kernel.
Linux密钥保留服务是一种新的机制,其用途是保存与安全相关的信息,让Linux内核可以快速地访问这些信息。
The simplest way to access persistent data is by using the find method. Here is an example of an application using the entity manager to find an object by its primary key.
最简单的访问持久性数据的方法是使用find方法。
Anyone with access to the public key can use it to encrypt messages, which can then be decrypted only by the key owner.
任何访问这个公开密匙的人都可以用它加密消息,而只有密匙所有者才能够对消息解密。
You can manually launch the console any time by holding down the Ctrl key while clicking the Domino Web Access logo.
您可以在任何时候手动地启动控制台,即按住ctrl键并单击DominoWebAccess徽标。
One of the key design concepts behind Percolator was to provide random access to the repository to process documents individually, and thus avoiding the global processing required by MapReduce.
Percolator的一个关键设计理念是:提供对库中文档的随机访问,以实现对单个文档的处理,从而避免了像MapReduce那样对文档全集进行处理。
In all cases, the return value of the method can be processed using a foreach loop, and you can also access specific values by key as needed.
所有方法的返回值都可用foreach循环来处理,需要的话也可按键访问特定的值。
You will need to obtain your access keys, which you can access from your Web Services Account information page by selecting View access key Identifiers.
需要获得自己的访问键,可以通过在WebServicesAccountinformation页面上选择ViewAccess Key Identifiers获得访问键。
Instead of clicking on the Voice Control icon on your Home screen you can also access Voice Control by holding in the pause key.
除了点按主屏幕上的语音控制图标外,您也可以长按开始/暂停键来开启语音控制。
Red key Under normal state, press red key to access to information of current channel, other functions are decided by specific applications.
红色键在正常状态下,按下红色键调出当前频道的信息,其它功能由具体应用决定。
By analyzing the FTP protocol, the article classifies the FTP statistical methods into three key issues, which are random port access, DPID processing and FTP port flux collection.
本文通过对FTP协议的分析,将FTP流量统计的方法归结为三个关键问题随机端口的获取、DPID的处理、FTP端口流量的采集。
Each center is guarded by multiple security procedures, including biometric identification, key card access, elevator lock outs and human verification.
每个中心采用多种安全手段以保证安全,包括生物识别、门禁卡、电梯锁和人工检查。
Data storage and management, and the external user how to access data are all depend on the functions provided by database, so spatial database functions is the key part of the spatial database.
空间数据库功能是数据库的关键部分,数据库内部的数据存储与管理,外部用户如何使用这些数据,都是靠功能来实现的。
Note that the container is stored in a regular operating system file and access to the encryption key is being regulated by the ACLs on the file.
注意,容器存储在常规操作系统文件中,对加密密钥的访问受该文件上的ACL控制。
The field trip, as a method of qualitative research, is widely applied by Chinese and overseas scholars, and its key link is smooth access and ways of access to the spot.
田野调查作为一种定性研究方式,被中外学者广泛使用。而研究者能否顺利以及如何进入现场则是田野调查中异常关键的环节。
The user might not be able to access the intended control by using the access key and a control other than the one that is intended might be enabled.
使用者可能会无法使用便捷键存取所要的控制项,而且可能会启用不想要的控制项。
By database encrypting, and key management and users access control, we can protect the database from destroying.
通过数据加密、密钥管理、用户拜访控制等一系列的手腕来维护数据库内部数据的安全。
File service is provided that encrypts data of file transparently for users. Each user has a different key for encryption, users access the storage system by network driver mapping.
系统为用户提供了透明的文件加解密服务,用户通过映射网络驱动器的方式访问自己的存储空间。
An access key allows a user to select the other control by pressing the ALT key with the access key.
访问键允许用户通过按alt键和访问键来选择另一个控件。
This paper presents a multi-group access control scheme that achieves multi-privileged access by combining the centralized and distributed key management scheme.
该文提出了一种多重组的访问控制方案,该方案使用集中式与分布协同式相结合的密钥更新算法实现了多权限的控制。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
In order to design a prototype for the cross-domain access control (XDAC) system, a PKI approach is used, in which users are identified by using public key certificates.
为了设计一种交叉域访问控制(XDAC)系统模型,采用了一种利用公钥证书鉴别用户的PK I方法。
应用推荐