Two-thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want, so that they can control their own fertility.
这些文盲中有三分之二是女性,大约有2亿至2.5亿妇女无法获得她们想要的节育措施,这样她们就可以控制自己的生育能力。
Two thirds of those people who are illiterate are women and about 200 to 250 million women don't have access to birth control they want.
这些文盲中有三分之二是妇女,大约有2亿至2.5亿妇女无法获得她们想要的节育措施。
The startup's product, SentabTV, enables older adults who may not be comfortable with computers to access email, video chat, and social media using just their televisions and remote control.
这家新兴公司的产品SentabTV 可以让那些不太习惯使用电脑的老年人只用电视和遥控器就能收发电子邮件、进行视频聊天和使用社交媒体。
The startup's product enables older adults who may not be comfortable with computers to access email, video chat and social media using just their televisions and a remote control.
这家初创公司的产品可以让可能不习惯使用电脑的老年人只用电视机和遥控器就能收发电子邮件、视频聊天和使用社交媒体。
For some organizations, access control to projects may not be a significant issue.
对于一些组织,对项目访问控制也许不是一个重要问题。
Each application assigns one or more administrators to control user access to its functions.
每个应用程序分配一个或多个管理员来控制用户对其功能的访问。
Both the deployment infrastructure and the registry also need access control, to prevent misuse.
为了防止误用,部署基础设施和注册中心也都需要访问控制。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
As a best practice, consider using stored procedures as a way to control access to your data.
作为一项最佳实践,应考虑使用存储过程来控制对数据的访问。
Once all required database objects and packages are created, use group membership and group privileges to control access to the created database objects and packages.
创建好所有必需的数据库对象和包之后,使用组成员关系和组特权来控制对所创建的数据库对象和包的访问。
The movie and recording industry, online music stores, and electronic book publishers all use their own specific DRM technology to control access to their data.
电影以及唱片行业、在线音乐商店以及电子书籍出版商都会使用其特定的DRM技术来控制对其数据的访问。
You can also control access to stored procedures through GRANT and REVOKE statements.
还可以通过GRANT和revoke语句控制对存储过程的访问。
Locking is the mechanism that the database manager USES to control concurrent access to data in the database by multiple applications.
锁定是数据库管理器用来控制多个应用程序并发访问数据库中数据的机制。
It enables you to rectify the problem by providing you with secure access to and control of all servers, routers, switches, and power devices in your remote data centers.
它使您可以安全访问和控制远程数据中心的所有服务器、路由器、交换机和电源设备,让您能够纠正问题。
The post identifies some of the “gaps” in existing identity solutions especially related to access control.
文中还指出了一些已有的身份识别解决方案的缺陷,尤其在访问控制方面。
If access to projects is a concern, then you can create security policies that control access to certain groups.
如果对项目的访问是您所关注的,那么您应该创建一个安全策略来控制一定的组能够访问项目。
As a best practice, consider using LBAC as a way to control access to sensitive data.
作为一项最佳实践,应考虑使用LBAC作为控制对敏感数据的访问的一种方法。
In the standard JDK distribution, the mechanism to control access to code source is turned off by default.
在标准JD k分发版中,控制代码源访问的机制缺省情况下是关闭的。
Middleware technology is available to orchestrate services and control access to specific functionalities in the service.
可以使用中间件技术对服务进行组合,并对服务中的特定功能进行访问控制。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Specify the administrative DN, which not subject to access control or restrictions for operations on this database.
指定管理DN,它不用于访问控制或限制数据库的操作。
Security policy defines the composition of the security labels and specifies the rules used to control access to sensitive data.
安全策略定义安全标签的组成,并指定控制敏感数据的访问的规则。
The purpose of authorization is to control access to resources on a per-ID, per-role, or per-profile basis.
授权的目的是对每个ID、每个角色、或者每个概要进行访问控制。
The method implementation uses the JTA API to start local transactions that control access to EIS1 and EIS2.
该方法用JTAAPI启动控制EIS1和EIS2 的访问的本地事务。
Access to the administrator control panel from the dashboard for administrators.
从管理员指示板到管理员控制面板的访问。
They may even filter requests by incoming IP addresses or set up a cookie to control access to the form.
他们甚至会按照传入IP地址对请求进行筛选,或设置Cookie来控制对表单的访问。
The service provider USES the management UI to control access to the Web service.
服务提供者使用管理UI来控制对Web服务的访问。
Using sugroups enables system administrators to control access to individual user accounts by group membership.
使用sugroup 让系统管理员能够通过组成员关系控制对各个用户账户的访问。
Security Settings to control user access to different areas of the Web site.
控制用户访问Web站点的不同领域的安全设置。
This process configures Tivoli access Manager to update access control lists to allow the service subscriber to invoke the subscribed service.
该流程可配置TivoliAccessManager来更新访问控制列表,以允许服务订阅者调用所订阅的服务。
应用推荐