Operating system examples include file access and network access.
操作系统的示例包括文件访问权和网络访问权。
Linux USES file access rights to determine if a file is an executable.
Linux通过文件访问权限来判断文件是否为可执行文件。
The logical file system interface supports UNIX-type file access semantics.
逻辑文件系统接口支持UNIX类型的文件访问语义。
In addition to providing file access, these IResources give the workspace structure.
除了提供对文件的访问外,这些IResource还提供了工作空间的结构。
This is achieved by low-level file access which is reliable, robust and fail-safe .
要实现这个目标,低层次的档案存取,这是可靠的,稳健和故障安全。
Much less code needs modification regarding database access and uploaded file access.
对于数据库和向上负载的文件的接触所需的改进大大减少。
For example, coordinating file access is critical when your app adopts iCloud storage.
例如,当你使用iCloud存储时,协调文件访问尤为关键。
Figure 6 demonstrates how a write mode time queue for file access can improve data consistency
图6显示了文件访问的写模式时间队列如何改善数据一致性
Higher space efficiency means files are less fragmented and provide better sequential file access.
较高的空间效率意味着文件的碎片较少,能够提供更好的顺序文件访问。
For this decision, you might use criteria such as ease of file access and frequency of updates.
为进行此项决策,您可以使用条件,如易于访问文件和更新频率。
Imagine if a set of users does not have Windows-level file access to C:\Inetput\wwwroot\info\employee.
假设一组用户对C:\Inetput\wwwroot\info\employee.aspx没有 Windows 级别的文件访问权限,并要尝试访问 /info/employee.aspx?
Why can function defined in a different file access variables defined in that file without extern?
为什么在不同的文件中定义的函数访问变量定义在文件没有外面的吗?。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Represents the permissions that can be granted for file access and operations on memory-mapped files.
表示允许对记忆体对应档进行档案存取及作业的可授与权限。
Longer actions, such as doing file access, require separate threads, but that is the subject of a future installment.
更长时间的操作(比如访问文件)需要单独的线程,但那是以后某期文章的主题。
These operating systems can actually manage the ownership and permission for file access with an ID rather than with a name.
这些操作系统可以使用 ID(而不是名称)实际管理所有权和文件访问权限。
The server side can perform database or file access, process the data, then format the data and return it back to the browser.
服务器端可以执行数据库或文件访问,处理数据,然后格式化数据,并将其返回给浏览器。
This means that certain features of your application, such as file access, are likely to begin causing security exceptions.
这意味着您的应用程序的某种特性,比如文件访问,将可能造成安全性异常。
Moreover, the article describes the prototype implementation-BW1K networked storage system and the file access mechanism in it.
同时,文中给出了其原型系统BW1K网络存储系统的实现描述和文件访问机制。
A higher sequentiality tells you that the files are more contiguously allocated, which will also be better for sequential file access.
较高的顺序性意味着文件的分配更连续,这也对顺序文件访问有利。
Use of file access system routines (specifying how many times per second several of the system file access routines have been called)
文件访问系统例程的使用(说明几个系统文件访问例程每秒被调用多少次)
Checking file access permissions by adding the launching user to the machine's administrators group and auditing failed object access.
通过添加启动用户机器的管理员组和审计失败的对象访问检查文件访问权限。
In the case that the network or remote data point is unavailable, a developer might choose to use local file access to present alternative data.
在网络或者远程数据点不可用时,开发者可以选择使用本地的文件访问来提供可替代数据。
Newer methods such as Representational State Transfer (ReST) provide managed file access using URLs to specify the location, object, and method.
一些较新的方法,如具象状态传输(ReST),使用URL指定位置、对象和方法,提供受控制的文件访问。
The user must use the host systems file access controls on the directory configured for user Exits Path to ensure that the library is not vulnerable.
用户必须在为用户出口路径配置的目录上使用主机系统文件访问控制,以确保库不容易受到攻击。
However, there are situations when the standard file access does have limitations; this can arise with application access or security related products.
但是,在某些情况下,标准的文件权限有局限性;与应用程序访问或安全性相关的产品可能会出现这种情况。
The experiment in this dissertation shows that ABL can effectively degrade the latency of file access and greatly improve the performance of file system.
本文的实验表明,ABL可以有效降低热文件的访问延迟,提高文件系统性能。
It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more.
他是半信任代码的基础并且不受限于文件访问,但是对于通过网络访问窗口或者其他的任何情况都有相当的影响。
This paper analyses the storage structure of database files based on file access, and then out - lines the general encryption methods on such database files.
本文的分析基于文件存取的数据库文件的存储结构,阐述了针对数据库文件结构的加密一般方法。在此基础上。
To reduce database contention independent of making disk configuration changes, try approaches that may reduce database access contention or improve file access time.
如果希望减少数据库争用,但是不愿意修改磁盘配置,那么应该尝试减少数据库访问争用或改进文件访问时间的措施。
应用推荐