There is a permit to allow members of group sun to read and execute.
permit 规则允许sun组的成员读和执行。
Thus, this command enables read and execute for all three constituencies.
因此,这个命令为所有的三类用户设置了读和执行权限。
chmod go+rx IBM: This command enables the read and execute privileges for group and others.
chmod go+rxIBM:这个命令为组和其他用户设置了读和执行权限。
You may also need to restore read and execute permissions to the contents of the ARQ bin directory.
可能还需要恢复ARQbin目录的读取和执行权限。
User Greg's home directory has read and execute permission for members of the development group, so users Tom and Ian can list the directory.
用户greg的主目录有development组成员的读和写权限,因此用户tom和ian能够列出目录。
In the previous example, user xray, is denied a write, but the permit rule allows a read and execute. This operation could also be accomplished as one permit rule, like so.
在这个示例中,拒绝用户xray写,但是permit规则允许读和执行。
The directories in the example above have the permission set 755, which is common for web-available directories, in which the user has full privileges while others have read and execute only;
上述例子中的目录,将权限设置为755,对于网络上可以使用的目录,这个权限非常常见,用户拥有所有的特权,而其他人只有阅读和执行的权限;
The described operations may be implemented as code maintained in a "computer readable medium", where one or more processors may read and execute the code from one or more computer readable media.
所述操作可实现为“计算机可读介质”内包含的代码,其中一个或多个处理器可从一个或多个计算机可读介质中读取并执行代码。
Each of these three digits is constructed by adding the desired permissions Settings: read (4), write (2), and execute (1).
这三个数字中的每一个都通过添加所需的权限设置来构建:读(4),写(2)和执行(1)。
Within each set, you have three access bits: read, write, and execute.
每个权限集中都有三个访问位:读、写和执行。
A LISP program can read LISP statements from a text file and execute them as if they were part of the original program.
LISP程序可以从文本文件中读取语句,并且好像它们是原始程序一部分一样执行它们。
The next three bits (in green) represent a group's right to read, write, and execute the file.
接下来的三位(用绿色表示的)表示组对该文件的读、写和执行权限。
The permissions define who can access a given file, who can read it, who can write to it, and who can execute it.
权限定义谁可以访问给定文件、谁可以读取它、谁可以向其写入,以及谁可以执行它。
This way, all of the read operations and corresponding processing execute outside of a transaction's context, and consequently do not hold locks in the database for the duration of the transaction.
通过这种方法,所有读取操作和相应的处理将在事务的上下文之外执行,因此不会在事务持续时间内在数据库中保持锁。
The first group indicates the read, write, and execute permissions for the file's owner.
第一组表示文件所有者的读、写和执行权限。
The second group indicates the read, write, and execute permissions for the file's group.
第二组表示文件组的读、写和执行权限。
The permissions are read (r), write (w), and execute (x).
这些权限就是读(r),写(w)和执行(x)。
Now, the ACL is defined to give the root user read, write, and execute permissions, but not the deletion (that is, the "d") permission bit.
现在,ACL 已定义成赋予根用户读、写和执行权限,但没有删除权限位(即 “d”)。
For example, using chmod + RWX would set all the read, write, and execute permissions for a file.
例如,使用chmod +rwx将会设置文件的所有读、写和执行权限。
First, we change the access rights for the.ssh directory so that only the owner has read, write, and execute privileges.
首先我们更改.ssh目录的访问权,只允许所有者拥有读取、写入和执行的权限。
You must make sure that your ASP.NET worker process has permissions to read, execute, and write to it.
你必须确信你的ASP.NET工作进程拥有读取、执行和写入的权限。
While you're welcome just to read the code listings, you'll enjoy them much more if you can execute them for yourself, and, even better, change them to experiment according to your own ideas.
虽然大家会乐意阅读代码清单,但如果能亲自执行代码则更好,而根据自己的想法对代码进行更改并实验,这样将会甚至更佳。
Programs should be written for people to read, and only incidentally for machines to execute.
程序应该被写来让人们阅读,只是顺便为了机器执行。
When you type them into the Python interpreter (or if you save them in a file and execute them as a Python program), the statements are read starting on the left side and progressing to the right.
当把它们键入Python解释器中(或者将它们保存在一个文件中,并作为一个Python程序来执行)时,读取语句的顺序是从左到右。
Each mapped page is restricted in the types of operations that may be performed on its contents: read, write, and instruction fetch (also called execute).
每个被映射的页面都有读、写以及取指令(也叫执行)的限制。
In computer security, a description of the type of authorized interactions a subject can have with an object. Permissions include: read, write, execute, add, modify and delete.
在计算机安全学中,一个主体对一个客体的合法作用类型,包括读、写、执行、添加、修改和删除。
Read a remote invocation from the request, execute it, and write the remote invocation result to the response.
从请求中读取远程调用,执行调用,然后将调用结果写到响应中去。
Read a remote invocation from the request, execute it, and write the remote invocation result to the response.
从请求中读取远程调用,执行调用,然后将调用结果写到响应中去。
应用推荐