• This minor change to the behavior is necessary to ensure the integrity of the system and to increase user confidence.

    行为一小小变化必要的,可以确保系统完整性从而增加用户满意度。

    youdao

  • Integrity: Only an authorized user is permitted to modify the messages/data over the network.

    完整性只有授权用户有权通过网络修改消息/数据

    youdao

  • You can enhance the user experience with client-side validation, while server-side validation provides the true maintenance of the application's inputted data integrity.

    利用客户验证可以增强用户体验服务器端验证能够真正维护应用程序输入数据完整性。

    youdao

  • If the parameters (or any of the participating artifacts) can be determined to be invalid early, this can save user time and preserve artifact integrity.

    如果早期确定参数(或者任意参与进来工件)的无效性,就能够节省用户时间保持工件的完整性。

    youdao

  • Optimistic locking is still highly recommended for non-atomic Web flows to protect the data integrity of each user action.

    对于原子we b还是强烈推荐使用乐观保护每个用户操作数据完整性

    youdao

  • This ability affects the user interface, business logic, and database; in addition, it is necessary to address issues regarding concurrency, data integrity, user transparency, and replication.

    这种能力包括使用用户界面业务逻辑和数据库的能力;此外必须解决与并发数据集成、用户透明度复制相关问题

    youdao

  • Support for validating XML data based on user-supplied schemas, which allows application developers and database administrators to enforce data integrity constraints for XML data stored in DB2.

    支持基于用户提供模式验证XML数据使得应用程序开发人员数据库管理员可以对DB2存储的 XML 数据实施数据完整性约束

    youdao

  • When a process is initialized, the User subsystem calls into the security subsystem to determine the desktop integrity level assigned in the process security access token.

    一个进程初始化时,用户子系统要求进入安全子系统,确认进程安全访问令牌分配桌面诚信级别

    youdao

  • Security: Ensure that the component or system maintains user confidentiality, data integrity, and authorized permissions.

    安全确保组件系统保证用户信息机密性数据完整性授权的允许性。

    youdao

  • And as a verified user of microblog, "Global Trend" doesn't seem too concerned about verifying the integrity of what it's about to advertise.

    作为一个博认证用户,“GlobalTrend似乎关注去检验即将宣传的东西的真实性。

    youdao

  • By applying carefully the database functions of transaction handling and concurrent access, the platform guarantees data reliability and data integrity in multi user network environment.

    该系统还利用数据库自身事务处理并发控制功能,解决了用户网络环境下数据完整性可靠性问题

    youdao

  • Companies adhering to the user as the core, integrity management, intentions to do pre-sale, sale, the after-sales service, so that users feel satisfied with.

    公司秉承用户核心诚信经营用心做好售前中、售后服务用户放心满意

    youdao

  • Essentially you're building in a failsafe that checks data integrity everytime a message is sent from the user.

    基本上正在构建安全检查数据完整性每次用户发送条消息

    youdao

  • In the design process, system security and data integrity are ensured by user authentication and encryption respectively.

    设计过程中通过对用户认证数据加密机制来确保系统安全性数据完整性

    youdao

  • The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.

    其中,基于主机完整性检测技术以及基于网络流量分析技术用户行为管理软件已经基本成熟用于商业用途。

    youdao

  • The company for the quality, integrity, the user first for the purpose, strict management, and excellence, while improving the professional quality of employees.

    公司优质诚信用户至上宗旨严格管理精益求精同时提高员工业务素质

    youdao

  • Companies rely on perfect quality system, strong technical strength, reliable integrity protection, has been recognized and praised the user.

    公司依靠完善的质量体系雄厚的技术实力可靠诚信保障得到用户认可好评

    youdao

  • However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.

    但是这种基于识别主机完整性信息网络用户行为管理技术不能识别出具有绕主机完整性检查攻击行为

    youdao

  • The system has the integrity user to increase, the deletion and the inquiry revision function.

    系统完整用户添加删除查询修改功能

    youdao

  • Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.

    一个后门妥协系统完整性使更改系统,允许使用恶意攻击者目的不明用户

    youdao

  • A Backdoor compromises system integrity by making changes to the system that allow it to by used by the attacker for malicious purposes unknown to the user.

    一个完整系统后门妥协改变允许系统使用攻击对于恶意用途不明用户

    youdao

  • It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.

    使用户方便地进行定义操纵数据维护数据安全性完整性以及用户并发控制恢复数据库等操作。

    youdao

  • User Response: Execute the SET INTEGRITY statement with the IMMEDIATE CHECKED option and ensure that the data satisfies all the constraints defined on the table or the table depending on it.

    用户响应立即执行SETINTEGRITY语句版本稍有选择的,确保数据满足所有约束定义桌子

    youdao

  • User Response: Execute the SET INTEGRITY statement with the IMMEDIATE CHECKED option and ensure that the data satisfies all the constraints defined on the table or the table depending on it.

    用户响应立即执行SETINTEGRITY语句版本稍有选择的,确保数据满足所有约束定义桌子

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定