• The ideas of order, security, family, religion and country had the same resonance for them as for Michael.

    秩序安全家庭宗教国家这些概念他们心里产生了迈克尔一样共鸣

    《柯林斯英汉双解大词典》

  • Security forces are allowed to use what's called "necessary force" to maintain order and can search people and premises without a warrant.

    安保部队允许使用所谓的“必要武力维持秩序,他们可以在没有搜查令的情况下搜查人员房屋

    youdao

  • As Apple and several security experts have argued, an order compelling Apple to write software that gives the FBI access to the iPhone in question would establish an unsettling precedent.

    正如苹果公司几位安全专家主张的,强迫苹果公司编写软件联邦调查局访问某 iPhone指令,树立起一个令人不安的先例。

    youdao

  • As Apple and several security experts have argued, an order compelling Apple to write software that gives the F.B.I. access to the iPhone in question would establish an unsettling precedent.

    正如苹果公司几位安全专家主张的那样,强迫苹果公司编写软件联邦调查局访问iPhone 的指令,树立起一个令人不安的先例。

    youdao

  • Because without such an international order, the forces of instability and disorder will undermine global security.

    因为,如果没有这样国际秩序不稳定混乱力量就会破坏全球安全

    youdao

  • Security guards at the Xilai Ranch maintain order at the cricket-fighting tournament.

    西来农庄保安人员,他们负责维持蟋蟀比赛的现场秩序

    youdao

  • He insisted that a security plan developed with the public order ministry, despite delays, will ' 'provide the highest protection and security "for all transit."

    坚称,会同公共秩序制定形成安全计划尽管一再拖延,但所有交通运输系统提供最好保护安全。”

    youdao

  • However, the two sides share many common or similar views on the concept of international order and global security.

    双方国际秩序观、安全观都有着许多相同相似看法

    youdao

  • Security labels are applied to data in order to protect the data.

    安全标签应用数据上,保护数据。

    youdao

  • This is basically all that is needed to be done in order to set up the security.

    基本上建立安全性所需所有内容。

    youdao

  • According to the site, vulnerability phyla are classified into "seven plus one" pernicious kingdoms presented in the order of importance to software security

    根据这个站点分类,任何漏洞可以归类下面这个”7+1“个的致命“,下面的些”界“的先后顺序是按照影响软件安全的程度从高到低排序的。

    youdao

  • Thus, in order to configure any kind of security for the IBM Cognos environment, a security provider must be configured.

    因此要想为IBMCognos环境配置任何类型安全性,就必须配置安全性提供者

    youdao

  • You can edit the agent.conf files to configure the order in which the security server is chosen.

    可以编辑agent.conf文件配置选择安全服务器次序

    youdao

  • In order to keep this discussion focused, let me ignore all security aspects.

    为了保持此次讨论重点请让忽视所有安全方面的内容。

    youdao

  • The philosopher stressed that good order is the basis of prosperity and security.

    这位哲学家强调良好秩序应建立在繁荣安定之上。

    youdao

  • In contrast, a system may require identifying information in order to handle matters such as security or quality of service.

    相比而言,为了处理诸如安全服务质量之类事情系统需要标识信息了。

    youdao

  • CGBS is required if you run the secure proxy server in medium security mode in order to dynamically obtain routing information.

    如果为了动态获得路由信息中级安全模式下运行安全代理服务器,那么需要使用CGBS。

    youdao

  • It can respond automatically and work around problems, security threats, and system failures in order to be self-healing.

    可以自动响应围绕着问题安全威胁以及系统故障而工作实现自修复。

    youdao

  • When Yasser Arafat returned to Gaza in 1994 to set up the Palestinian Authority, he brought a sense of order, security and hope.

    1994年亚西尔·阿拉法特回到加沙成立巴勒斯坦民族权力机构时,带来了一种秩序安全和希望感觉

    youdao

  • The container uses the proxy to wrap the actual endpoint in order to provide services such as transactions and security.

    容器使用代理包装实际端点以便提供事务安全性这样服务

    youdao

  • Nonetheless, we will briefly justify security in order to introduce some common ways of thinking about it.

    尽管如此,为了引入一些理解安全性常用方法我们简要介绍一下安全性。

    youdao

  • Architects, however, need to understand the physical layer in order to avoid network bottlenecks and security exposures.

    但是架构需要了解物理层避免网络瓶颈安全暴露

    youdao

  • The two men then agreed that I could decide the order in which the issues-including borders, security, water, and peace-would be discussed.

    于是,他们俩同意决定什么样顺序来讨论边界安全水源和平等问题。

    youdao

  • Administrative and application security both need to be enabled in order for security roles be enforced.

    强制实施安全性需要同时启用管理应用程序安全性。

    youdao

  • That information has to be processed for security people in order to improve their situational awareness.

    那些信息必须经过处理,才能提高人们的情境意识,保障人们安全。

    youdao

  • The increased transparency of XML data requires an increased transparency of application processing workflow in order to mitigate problems from security to state control.

    XML数据所带来透明性要求应用程序处理工作流的透明性也相应增加从而减少安全性状态控制方面的问题

    youdao

  • A: a responsible Government will take certain necessary and appropriate measures to ensure security and safeguard law and order during the National day Holiday.

    国庆期间加强安保采取一些必要适当的措施维护良好的社会秩序负责任的做法。

    youdao

  • Therefore, in order to validate a system's security, you have to think about it at every level of abstraction: at the highest architectural level, but also as the lowest level of detail.

    因此为了验证系统安全性必须每个抽象级别上考虑最高架构最低详细实现层。

    youdao

  • Therefore, in order to validate a system's security, you have to think about it at every level of abstraction: at the highest architectural level, but also as the lowest level of detail.

    因此为了验证系统安全性必须每个抽象级别上考虑最高架构最低详细实现层。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定