• For example, a trusted context could have a default role, ROLE_A.

    例如可信上下文可能一个默认角色ROLE_A。

    youdao

  • This puts you in the role of a trusted advisor who can observe and analyze business strategies and decisions as they occur.

    使成为一个受信任顾问能够业务战略决策出现时对其进行观察分析

    youdao

  • This means that the privileges of the default role associated with the trusted context are available to any individual who USES a trusted connection as defined by the trusted context.

    意味着可信上下文关联默认角色特权用于使用有可信上下文定义的可信连接任何个人

    youdao

  • When employees are trusted to play an active role in their organization’s leadership, they’ll naturally respond by taking a personal interest in the quality of their work.

    雇员信任各自部分中发挥积极作用的时候,他们自然提高工作质量看成是自己的事。

    youdao

  • To be more explicit, while brand advertisers have historically trusted people as consumers, they do not trust them in the new role of producer (e.g. uncontrollable content).

    说的明确一些尽管历史上,品牌广告商对于消费者具有信任,但对于同样的人群,把他们作为广告制作者他们并不信任(例如对内容无法控制)。

    youdao

  • Irrespective of whether or not the architect role is fulfilled by a team, it is often the case that an architect is supported by a number of "trusted advisors."

    无论构架师角色个人还是一个小组担当,他们背后都值得信赖顾问”的支持

    youdao

  • In traditional society people trusted that moral played a key role in state's organism, so moral education also played a great, even decisive role in social cultivation and social stability.

    传统社会,由于道德国家建制中举足轻重,道德教育社会教化维护社会稳定方面有着重要甚至决定性作用

    youdao

  • In the trade of e-business the trusted third party (TTP) plays an important role in order to avoid trade disavowing and to ensure the square deal.

    电子商务交易中,为了防止交易抵赖保证买卖双方在交易时的公平性,可信任第三(简称ttp)担任重要角色

    youdao

  • The process that fills this role is often not trusted or seen as worthy of attention, for when we do engage it, we may make mistakes in perception or in decision making.

    意见通常认为是可信不值得被关注我们当真了,倒是形成错觉或做出错误决定

    youdao

  • In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    youdao

  • In this system, many new techniques are adopted, for example, mechanism of the chain of trust, role-based access control model, two-level of logs, trusted authorization and so on.

    系统采用了信任机制、基于角色访问控制模型、两日志可信认证技术,同时给出了可信分布式计算机系统中的实现技术途径。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定