这是一个很棒的方法,可以限制用户哪些计算机程序可用而哪些不可以。
This is a nice feature for limiting what programs users can or cannot access on the computer.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
For all those efforts, though, the real limits to computer security may lie in human nature.
限制一下看电视,使用计算机或玩游戏的时间,如果一定要玩,尽量玩一些交互式的游戏,这样可以让你活动活动。
Limit your time watching TV, using the computer, or playing video games - and when you do play, try interactive games that get you moving.
信息的形式将会直接影响管理机制,也许还会将可能的解决方案限制到基于非计算机的管理。
The form of the information will directly influence the management mechanisms, perhaps limiting the possible solutions to non-computer-based management.
它不会跟计算机一样快,而且网络速度也有限制。
It isn't as fast as a computer and networks speed are also a limitation.
有时,我们可能想限制孩子使用计算机的总时间。
Sometime we may want to limit the amount of time that your children using the computer.
这种方法往往比通过“受限制的演示”模式试用软件更好,因为演示模式要求用户在桌面计算机上安装他们可能不会购买的应用程序。
This tends to be a preferred method of trying out software in "restricted demo" mode compared to having to install an application on your desktop that you may not end up buying.
计算机对于将基因组拼接成整体也没有限制。
要很好地完成视频通话,手机制造商需要允许与计算机用户进行视频聊天,并且,这种聊天不受手机品牌的限制。
For this to work correctly, mobile handset makers will need to allow video chats with computer users and across mobile handsets.
Timekpr让我们限制计算机的使用时间。
Timekpr allow us limit the computer usage time by time frame or time frame.
修复了MsSql 2005dialect在多个处理器的计算机上有限制的字符串排序不正确的问题。
Fixed an issue with limit string in MsSql2005 dialect sorting incorrectly on machines with multiple processors.
您需要限制对这些计算机的访问。
如果您的环境中不是这种情况,那么这些威胁很有可能会出现,应该首先限制对这些计算机的访问。
If this isn't the case in your environment, then these threats become very likely and you should first act to restrict access to those machines.
为了帮助扭转这一趋势,家长可以对孩子坐在电视机前的时间设定一个限制,或者限制他们用计算机娱乐的时间。
To help reverse the trend, parents can set a limit on how much time children spend sitting in front of the television or using their computers for entertainment.
对于受内部限制,不能通过HTTP代理连接到外部世界和公共网络上的设备的计算机,可以使用这种技术来在那些计算机之间构建一个虚拟网络。
You can use this to build a virtual network between computers that are limited internally to connect to the outside world through an HTTP proxy, through to devices outside the public network.
很多操作系统(以及构建于这些操作系统上的软件)都限制为任何时间整个计算机的连接数少于65,000个。
Many operating systems — and the software built on those operating systems — are limited to less than 65,000 connections across the entire machine at one time.
大多数学校在计算机上加入了阻止电子邮件、聊天、游戏和限制关键字搜索网页的配置。
Most schools configured the machines to block e-mail, chat, games and Web sites reached by searching on objectionable key words.
显然,没有任何计算机语言或计算机能够存储无限序列 ——它们能够存储的是惰性的和无限制的 序列。
Obviously, no computer language nor computer can store an infinite sequence -- what they can store is a lazy and unbounded sequence.
为了限制硬件成本,完全可以在单个计算机或LPAR上运行来自多个计算单元的多个节点。
To limit hardware costs, you can safely run nodes from multiple cells on a single machine or LPAR.
这一工具可以帮助系统管理员将问题限制到到适当的组件,开发人员可以在其计算机上很容易地重现分析结果。
This tool can help system administrators assign issues to the appropriate component where analysis results can easily be reproduced by developers on their machines.
基于计算机的威胁比网络威胁的可能性小,因为生产环境中的计算机通常是限制访问的。
Machine-based threats are less likely than network threats because access to the machine in production is usually restricted.
当然,PC制造商可以不理会什么规格限制,造出任意类型的便携式计算机,还能为其装配任何合法的操作系统。
Of course, PC manufacturers can make any type of portable PC they like, with whatever specification they want. They can load it with any operating system they choose, if it's legally available.
这种类型的数据采集系统是依赖于软件的,通道的数量受计算机中可用空间的限制。
This type of data acquisition system is software dependent, and the number of channels is limited by the space available in the computer.
在这个例子中,滚动速度将受到用户计算机能力的限制。
In this case, the scrolling speed is limited by the capabilities of the user's computer.
大家谁知道使用您的计算机,并限制未经授权的访问。
Know everyone who USES your computer and limit unauthorised access.
简要地说,DITA任务主题的内容被限制为一种计算机可识别的结构,叫做配方构造(recipe construct)。
Briefly, the contents of the DITA task topic are constrained to a computer-sensible structure, known as the recipe construct.
受限制的计算机、组件、应用程序或其他联机资源的无意中留下的不受保护的入口点。
An unintentionally unprotected entry point into an otherwise restricted computer, component, application, or other online resource.
这能帮助你限制的存取一在你的公司里面信赖少数像如此的计算机,或它能保护你免于你知道的计算机可能造成一个问题。
This can help you limit access to a trusted few computers such as those within your company, or it can protect you from computers that you know may pose a problem.
可以通过加密限制访问。只有在此计算机支持128位加密的情况下才选择此选项。
Access can also be limited by the strength of the encryption. Select this option only if 128-bit encryption is supported on this computer.
可以通过加密限制访问。只有在此计算机支持128位加密的情况下才选择此选项。
Access can also be limited by the strength of the encryption. Select this option only if 128-bit encryption is supported on this computer.
应用推荐