• Secret passwords are often used to control access to computers.

    密码用来控制计算机访问

    youdao

  • Give Full control access to MQM and then click OK.

    mqm提供完全控制访问权,然后单击ok

    youdao

  • Administration: How do I control access to the service?

    管理如何控制服务访问

    youdao

  • A common way to control access to table data is using views.

    控制数据访问一种常见方法使用视图

    youdao

  • The game server can check authorization and control access to the media.

    游戏服务器可以检查授权控制媒体访问

    youdao

  • How do you intend to manage the ACLs which control access to the portlets?

    打算如何管理ACL控制portlet访问

    youdao

  • The service provider USES the management UI to control access to the Web service.

    服务提供者使用管理UI控制Web服务的访问

    youdao

  • You can also control access to stored procedures through GRANT and REVOKE statements.

    可以通过GRANTrevoke语句控制存储过程访问

    youdao

  • As a best practice, consider using LBAC as a way to control access to sensitive data.

    作为最佳实践应考虑使用LBAC作为控制敏感数据访问的一种方法

    youdao

  • For example, you need to control access to EJBs using a network-safe encrypted token.

    例如需要使用网络安全加密令牌控制ejb访问

    youdao

  • Singletons often control access to resources such as database connections or sockets.

    单例模式同样用于控制数据库连接或者sockets这样资源访问

    youdao

  • Second, an authorization mechanism is used to control access to application functionality.

    其次使用授权机制控制应用程序功能访问

    youdao

  • Enable host control access is the whole point of wrappers, so make sure it is uncommented.

    启用主机控制访问wrappers关键之处,所以确定注释。

    youdao

  • The system must provide security and control access to those functions based on permissions.

    系统必须提供安全性根据相应的权限控制这些功能访问

    youdao

  • In addition, the script can control access and filter information for delivery, as required.

    另外这个脚本根据需要控制访问权过滤交付信息

    youdao

  • As a best practice, consider using stored procedures as a way to control access to your data.

    作为一项最佳实践应考虑使用存储过程控制数据访问

    youdao

  • Singletons are a useful way to control access to a class, making sure that only one instance can exist.

    单例模式有用的控制访问途径他能保证只有个类实例存在。

    youdao

  • This requires RACF to use several different profiles in various classes to control access to a resource.

    要求RACF不同使用几个不同概要文件控制资源访问

    youdao

  • In the standard JDK distribution, the mechanism to control access to code source is turned off by default.

    标准JD k分发版中,控制代码访问机制缺省情况下关闭的。

    youdao

  • It makes for easier management of host and user control access from a system administrators point of view.

    系统管理员角度来看,这样容易管理主机用户访问控制

    youdao

  • The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.

    授权目的每个ID、每个角色、或者每个概要进行访问控制

    youdao

  • The method implementation uses the JTA API to start local transactions that control access to EIS1 and EIS2.

    方法JTAAPI启动控制EIS1EIS2访问本地事务

    youdao

  • Control access and visibility to business service models and policies within the business Services Repository.

    控制BusinessServicesRepository中的业务服务模型策略访问可视性

    youdao

  • Using sugroups enables system administrators to control access to individual user accounts by group membership.

    使用sugroup系统管理员能够通过组成员关系控制各个用户账户访问

    youdao

  • If access to projects is a concern, then you can create security policies that control access to certain groups.

    如果项目访问您所关注的,那么应该创建安全策略控制一定能够访问项目。

    youdao

  • As a best practice, use views to control access to tables when you want to hide a subset of table columns or rows.

    作为一项最佳实践隐藏中的部分行的时候,应该使用视图控制访问

    youdao

  • SQLJ provides the unique ability to develop using static SQL statements and control access at the DB2 package level.

    SQLJ提供独特的使用静态SQL语句进行开发以及DB2级别控制访问能力

    youdao

  • It also ensures that scripts are safe to execute and provides a sandbox to control access and modification of the DOM.

    确保脚本可以安全执行提供一个沙箱控制DOM访问修改

    youdao

  • Middleware technology is available to orchestrate services and control access to specific functionalities in the service.

    可以使用中间件技术服务进行组合,服务中的特定功能进行访问控制

    youdao

  • Information gathered by social network applications needs to be protected by policies which control access to information.

    应该使用控制信息访问策略保护社交网络应用程序收集到的信息。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定