她问安德鲁:“先生,你能把这些花都买下来吗?它们只要十美元。我已经三天没吃饭了。”
She asked Andrew, "Sir, could you please buy all these flowers? They are only ten dollars. I haven't had a meal for three days."
公共关系顾问安德莉亚·帕斯说,一个学识渊博的人也可能是一个无聊的人。
It's possible to be a fountain of knowledge and a boring person, says public relations consultant Andrea Pass.
1997年,威尔士王妃戴安娜访问安哥拉,支持红十字会发起的全面禁用杀伤性地雷的活动,人们对此感到有些惊讶。
It came as something of a surprise when Diana, Princess of Wales, made a trip to Angola in 1997, to support the Red Cross's campaign for a total ban on all anti-personnel landmines.
Windows无法访问安装源。
首先,我没有解决构建服务器的访问安全问题。
First, I haven't tried to address the issues of securing access to the server that you build.
之后,Acegi允许用户访问安全bean。
After checking, Acegi allows the user to access the secure bean.
还可利用内建在 CLR中的代码访问安全性。
You can also take advantage of the code access security that's built into the CLR.
例如你可以礼貌地向老师问安,让学弟学妹们效法。
For instance, you can greet your teachers politely and they may follow.
提供数据治理功能,实现并审计事务和数据访问安全。
Provide data governance capabilities to enforce and audit both transaction and data access security.
因为你问安的声音一入我耳,我腹里的胎就欢喜跳动。
44as soon as the sound of your greeting reached my ears, the baby in my womb leaped for joy.
数据库访问安全依赖于JDBC驱动程序和数据库实现。
Security of the database access relies on a JDBC driver and a database implementation.
只有确认了适当的权限后,用户才可以访问安全的系统或者资源。
Only after the appropriate rights have been confirmed will the user be granted access to secured systems or resources.
定义Basic或Digest授权方法,在访问安全url时使用。
Defines the Basic or Digest authorization method, used when accessing secured URLs.
若要以这种方式来使用[role],请考虑需要访问安全文档的组。
To use [roles] in this way, think of the group or groups that need access to your secured documents. Suppose the groups are as follows.
在本例中,Acegi首先检查用户是否经过授权来访问安全bean。
In this case, Acegi first checks whether the user is authorized to access the secure bean.
另一个常见的趋势是,应用服务网关模式来为服务端点提供增强的访问安全。
Another common trend is the application of service gateway patterns to provide enhanced access security for service endpoints.
虽然受限于此,但是代码访问安全将根据这个文件的来源重新对其进行约束。
Although restricted by this, code access security further restricts the application depending on where it came from.
“我数到三,咱们一起跳,行吗?”茱莉亚问安娜贝利——她正盯着自己的鞋带。
"When I count to three, jump, alright?" Julia asked Annabel, who was looking at her shoelaces.
访问安全bean的用户不会占用远程应用程序要求访问用户所具备的业务角色。
The user accessing your secure bean will not possess the business role that the remote application expects from a user trying to access it.
如果未选中无提示选项,安装程序将询问安装位置并将下面的位置作为默认位置。
If the silent option is not selected, setup will prompt for a location and use the location below as the default.
为即将到访的顾问安排进入设备时所用的适当凭证,不要每天都把时间浪费在进入设备上。
Arrange for the consultants you are expecting to have appropriate credentials for entering your facility so that time is not spent every day trying to get in the building.
玛丽安的救命恩人(这是玛格·丽特对威洛比言过其实的尊称),第二天一早即来登门问安。
Marianne's preserver, as Margaret, with more elegance than precision, styled Willoughby, called at the cottage early the next morning to make his personal enquiries.
当它询问安装数量时,我输入“1”,这将很好的工作(你可能想首先测试这个是否正常。)
When it asks for the installation number, I put in "1", and it worked fine (you may want to test this first to be sure.)
如果用户是特定组的成员,则可以给组分配一个角色,该角色有权访问安全性策略允许的资源。
When a user is a member of a specific group, then that group can be assigned to a role that is entitled to access resources for which the security policies allow.
允许Bob访问下载区域,但是由于他不是管理员用户或者根用户,所以禁止他访问安全目录。
Bob is allowed access to the downloads area, but because he isn't the admin or root user, he is forbidden access to the security directory.
浓浓的情谊与祝福,绵绵的思念与问安,在这美好的日子,愿祝愿随着卡片带给你!新年快乐!
Thick friendship and blessing, continuous yearning and greeting, in this beautiful day, may wish to you with CARDS! Happy New year!
用户可访问安全门户来检查其计算机,扫描的结果可以在门户上获得,也可以通过电子邮件获得。
Users access the security portal to check their computers, and they get the results either on the portal or through email.
在导出项中可以指定IP地址而不是 *,这样只有指定的 IP 地址可以访问安装存储库。
You can specify an IP address instead of * in the export entry so that only the specified IP address can access the installation repository.
JAAS提供了一种灵活的、说明性的机制,用于对用户进行认证并验证他们访问安全资源的能力。
JAAS provides a flexible, declarative mechanism for authenticating users and verifying their ability to access secure resources.
JAAS提供了一种灵活的、说明性的机制,用于对用户进行认证并验证他们访问安全资源的能力。
JAAS provides a flexible, declarative mechanism for authenticating users and verifying their ability to access secure resources.
应用推荐