她问安德鲁:“先生,你能把这些花都买下来吗?它们只要十美元。我已经三天没吃饭了。”
She asked Andrew, "Sir, could you please buy all these flowers? They are only ten dollars. I haven't had a meal for three days."
这是您的访问安排。
公共关系顾问安德莉亚·帕斯说,一个学识渊博的人也可能是一个无聊的人。
It's possible to be a fountain of knowledge and a boring person, says public relations consultant Andrea Pass.
1997年,威尔士王妃戴安娜访问安哥拉,支持红十字会发起的全面禁用杀伤性地雷的活动,人们对此感到有些惊讶。
It came as something of a surprise when Diana, Princess of Wales, made a trip to Angola in 1997, to support the Red Cross's campaign for a total ban on all anti-personnel landmines.
现在,安装向导询问安装目录。
At this point, you will be asked for the installation directory.
Windows无法访问安装源。
首先,我没有解决构建服务器的访问安全问题。
First, I haven't tried to address the issues of securing access to the server that you build.
之后,Acegi允许用户访问安全bean。
After checking, Acegi allows the user to access the secure bean.
还可利用内建在 CLR中的代码访问安全性。
You can also take advantage of the code access security that's built into the CLR.
我保罗亲笔问安。
提供数据治理功能,实现并审计事务和数据访问安全。
Provide data governance capabilities to enforce and audit both transaction and data access security.
因为你问安的声音一入我耳,我腹里的胎就欢喜跳动。
44as soon as the sound of your greeting reached my ears, the baby in my womb leaped for joy.
数据库访问安全依赖于JDBC驱动程序和数据库实现。
Security of the database access relies on a JDBC driver and a database implementation.
销售顾问安排了一切,让我们一家人独自分享这一特别的时光。
Our sales consultant had arranged it so that we could share the moment alone.
这不是一件简单的事情,尤其是数据和访问安全处于危险境地时。
This has not always been an easy job, especially when data and access security was at stake.
最后,DOM实现通常包括许多同步代码以使多线程化访问安全。
Finally, DOM implementations generally include a lot of synchronization code to make multithreaded access safe.
只有确认了适当的权限后,用户才可以访问安全的系统或者资源。
Only after the appropriate rights have been confirmed will the user be granted access to secured systems or resources.
Geronimo通过一系列文件保证敏感数据的目录访问安全。
Geronimo secures directory access to sensitive data through a series of files.
定义Basic或Digest授权方法,在访问安全url时使用。
Defines the Basic or Digest authorization method, used when accessing secured URLs.
若要以这种方式来使用[role],请考虑需要访问安全文档的组。
To use [roles] in this way, think of the group or groups that need access to your secured documents. Suppose the groups are as follows.
在本例中,Acegi首先检查用户是否经过授权来访问安全bean。
In this case, Acegi first checks whether the user is authorized to access the secure bean.
另一个常见的趋势是,应用服务网关模式来为服务端点提供增强的访问安全。
Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.
不存在访问安全性问题,因为命令行应用程序运行的时候通常不带安全管理器。
Has no access security issues, because command line applications generally run without a security manager?
“我数到三,咱们一起跳,行吗?”茱莉亚问安娜贝利——她正盯着自己的鞋带。
"When I count to three, jump, alright?" Julia asked Annabel, who was looking at her shoelaces.
访问安全bean的用户不会占用远程应用程序要求访问用户所具备的业务角色。
The user accessing your secure bean will not possess the business role that the remote application expects from a user trying to access it.
为即将到访的顾问安排进入设备时所用的适当凭证,不要每天都把时间浪费在进入设备上。
Arrange for the consultants you are expecting to have appropriate credentials for entering your facility so that time is not spent every day trying to get in the building.
玛丽安的救命恩人(这是玛格·丽特对威洛比言过其实的尊称),第二天一早即来登门问安。
Marianne's preserver, as Margaret, with more elegance than precision, styled Willoughby, called at the cottage early the next morning to make his personal enquiries.
当它询问安装数量时,我输入“1”,这将很好的工作(你可能想首先测试这个是否正常。)
When it asks for the installation number, I put in "1", and it worked fine (you may want to test this first to be sure.)
如果用户是特定组的成员,则可以给组分配一个角色,该角色有权访问安全性策略允许的资源。
When a user is a member of a specific group, then that group can be assigned to a role that is entitled to access resources for which the security policies allow.
如果用户是特定组的成员,则可以给组分配一个角色,该角色有权访问安全性策略允许的资源。
When a user is a member of a specific group, then that group can be assigned to a role that is entitled to access resources for which the security policies allow.
应用推荐