• RDF is a global leader in the field of financial data management, including data architecture, reference data, data models and security master software.

    RDF管理财务数据领域拥有全球领先的地位,包括数据结构参考数据、数据模型安全软件

    youdao

  • You can also assign a Master Password that you must enter in order to "unlock" the rest of your passwords for some added security.

    可以设置一个管理密码这样必须先输入密码解锁其余安全密码。

    youdao

  • These security policies are defined using the master data in the system. The policies require no customer development.

    使用系统中的数据定义这些安全策略客户需要开发它们。

    youdao

  • On the technical side, companies address master data quality issues to many point-to-point connections and similar complexities between systems and security issues for master data.

    技术角度看公司能够解决数据质量问题,比如许多对点连接问题系统安全性之间复杂性问题。

    youdao

  • There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.

    用户可以安全策略创建两种类型规则,从而防止泄露事件数据管理数据。

    youdao

  • Business services that are enabled to implement authorization on service and attribute level, supporting privacy and security aspects of the master data since it needs to secured and governed.

    服务属性级别上启用身份验证业务服务支持数据私密性安全性因为需要保护和治理。

    youdao

  • The Master or SSO are responsible for submitting security incident reports to the CSO within 24 hours of the discovery of any unlawful act.

    24小时之内船长船舶保安员(SSO负责公司保安员(CSO)提交发现任何非法行为保安事件报告

    youdao

  • Master cylinder for the speed of access restrictions and security through the trip exchanging to control switches.

    速度安全行程限制通过行程开关控制

    youdao

  • Master bedroom is has a very inviting feel to it, special light colored wood flooring, glass block wall which allows plenty of light with security.

    卧室让人感觉很舒服特别浅色木地板玻璃砖围墙大量光线安全。

    youdao

  • The domain is governed by two security structures: The user registry, such as LDAP, Lotus Domino, or Microsoft Active Directory, and a master authorization policy database.

    这个两个安全结构主导用户注册表比如LDAPLotusDominoMicrosoftActiveDirectory一个授权策略数据库

    youdao

  • Therefore, in the process of civil deep foundation, construction workers must master and apply this technology to ensure the security of the whole of the building.

    因此土建工程基坑过程施工人员必须要掌握应用好这项技术保证建筑物整体安全性

    youdao

  • To record and strictly control the issuing of all master keys within the hotel and to report any discrepancy immediately to Security Manager.

    记录严格控制酒店所有万能钥匙,如发生任何异常情况应立即报告安全部经理

    youdao

  • The master and all crewmembers should give effect to those requirements stipulated in the Ship Security Plan and should be familiar with their duties.

    船长全体船员按照船舶保安计划实行熟悉他们的职责。

    youdao

  • They should also undergo necessary training given by the master or ship security officer designated by the company.

    他们接受船长或者公司指派船舶保安员的必要训练

    youdao

  • 3the Master control staff immediately sets security cordon in the accident area and wears gas mask and protective jump suit etc. protective equipments or safeguards to examine the leaking point.

    主控人员立即事故发生地点区域设置安全警戒戴上防毒面具、连体防护防护用品设施,对泄漏进行检查

    youdao

  • If you want to control who can modify the master pages, you can set security permissions on the directory that contains the master pages.

    如果控制能够修改页面的人员,可以包含主版页面目录设定安全性权限

    youdao

  • Participate in the making of corporate management systems and security systems, (have) three years' experience in the use of ERP, skillfully master office software.

    参与制定公司管理制度安全制度,ERP使用经验熟练掌握办公软件

    youdao

  • We may be young, but we are in the "road security art master" is always full of confidence, ebullience.

    我们或许年轻我们安防艺术大师路上始终热情洋溢、信心满怀。

    youdao

  • Therefore, we should master the rule of legislation, elevate the legislation level, complete the legal system and improve legislation techniques in the legislation of rural area medical security.

    对此我们深刻把握立法规律提高立法层次完善法规体系改进立法技术,积极推进我国农村医疗保障立法进程。

    youdao

  • The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.

    信息安全核心技术在于攻防”,即攻击技术防御技术,只有掌握攻击技术才能更好做到安全防御。

    youdao

  • The documents detailed police security concernsand also reflected officials' desire to impress both U. S. visitors and onlookers in Britain, Ireland's colonial master until 1922.

    资料详细列出了警察安全担心——并且反映了官方渴望同时给来自美国访问者英国旁观者们留下印象,英国一直殖民统治爱尔兰到1922年。

    youdao

  • Such research in this paper is helpful for human to master the trust mechanism, construct a trustable interaction environment, and guarantee the network security in a virtual social.

    研究有助于人类更好的认识和掌握虚拟社会中的信任机制构建一个可信网络交易环境确保虚拟社会的网络安全

    youdao

  • The master ordered that the plaintiff shall deposit $2, 000 as security for the defendant 's cost.

    命令原告必须存放2,000美元保证金作为被告费用担保

    youdao

  • A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.

    各种入侵思路技术漏洞利用交流成为脚本安全攻防高手

    youdao

  • A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.

    各种入侵思路技术漏洞利用交流成为脚本安全攻防高手

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定