• A private copy of all process data and control behavior defined within an event handler is provided to each instance of an event handler.

    事件处理程序每个实例提供该事件处理程序定义所有进程数据控制行为私有副本

    youdao

  • However, this centralization is risky for several reasons, not least of which is giving a third party total control over your access to services, and possibly your private data.

    然而由于种种原因这种集中非常危险,不仅是因为使第三完全控制服务访问并且可能控制您的私人数据。

    youdao

  • The intention of designing the private cloud is basically an organization that needs more control over their data than they can get by using a vendor hosted service.

    设计私有目的使组织能够获得使用供应商托管服务更多数据控制

    youdao

  • Traditional information security system can only safeguard information transmitting process, but can't control the decoded media data. So it can't prevent the illegal copy of the private.

    信息安全技术采取密码学技术因控制信息传布入程,对于解码后的媒体数据却难以控制,因而无法阻止合法使用者的非法拷贝传布

    youdao

  • Traditional information security system can only safeguard information transmitting process, but can't control the decoded media data. So it can't prevent the illegal copy of the private.

    信息安全技术采取密码学技术因控制信息传布入程,对于解码后的媒体数据却难以控制,因而无法阻止合法使用者的非法拷贝传布

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定