go top

access context

  • 存取上下文;访问上下文

网络释义专业释义

  访问上下文

... access configuration 访问配置 access context 访问上下文 Access Control Engine 访问控制引擎 ...

基于12个网页-相关网页

  存取上下文

... 存取约束 access constraint 存取上下文 access context 存取控制位 access control bit ...

基于8个网页-相关网页

短语

file access context 档案存取上下文

Context Based Access Control 上下文的访问控制 ; 上下文为基的存取控制 ; 基于上下文的拜候节制 ; 节制

Access Control Context 访问控制上下文

context-dependent access [计] 上下文相关存取

Context-Dependent Access Control 上下文相关访问控制

Context Aware Access Control 上下文相关访问控制

Context Access Control 上下文访问控制

Context-Base Access Control 文的访问列表

context sensitive access control 上下文访问控制

 更多收起网络短语
  • 存取上下文
  • 存取上下文

·2,447,543篇论文数据,部分数据来源于NoteExpress

双语例句权威例句

  • The MessageContext provides a means to access context properties.

    MessageContext提供访问上下文属性的方法

    youdao

  • While working in the product, you can access context-sensitive help by pressing F1.

    产品工作时,您可以通过f1来访问内容敏感帮助文件。

    youdao

  • We'll cover that in the next section because it illustrates how to access context in advice.

    我们在下一涉及它因为说明了如何Advice访问上下文

    youdao

更多双语例句
  • The lack of information resources is particular glaring in the context of access to the Internet and computers in Nepal, where the International Telecommunications Union estimates that only 6, 9 percent of the population has access to the networks.

    UNESCO: OFFICE IN KATHMANDU

  • In other words, it is not enough that the United States is already largely committed to putting American taxpayers at risk in the context of restored access to Export-Import Bank credits in the event that a Soviet emigration bill is passed, pressures on the Baltic nations are eased, and a U.S.-Soviet trade agreement is approved by the Congress.

    CENTERFORSECURITYPOLICY: Center for Security Policy | Read The President��s Lips: ��No U.S. Taxpayer Aid To Gorbachev��

  • By transforming complex application and infrastructure entitlements into a simple business view of access across the enterprise, this type of approach provides the line of business with full visibility of access to their applications, and allows businesses to provide the context required to make the most efficient and effective identity and access management decisions.

    FORBES: Recent IT Security Breaches Make Enterprises Review Their IAM Strategies

更多权威例句
$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定