英语人>词典>汉英 : 权限 的英文翻译,例句
权限 的英文翻译、例句

权限

基本解释 (translations)
popedom  ·  purview

词组短语
terms of reference · within the power or right of
更多网络例句与权限相关的网络例句 [注:此内容来源于网络,仅供参考]

To compare with the investigating judge system in Germany, there are some problems in the court system in the criminal investigating procedure in Taiwan. For a court to command a coercive means in the criminal investigating procedure, the legal rules in our Criminal Procedure Law are insufficient. Therefore, the jurisdiction of the court and the process in jurisdictional dispute in the criminal investigating procedure are not clear and definite. The organization of the court in the criminal investigating procedure still is an issue. Also, the order of the authority distribution is not formed yet in our criminal investigating procedure. The limits of authority of the court are indefinite. Even on the form of the court's decision and the grievance procedure, there are different opinions in practice and theory.

就我国侦查中法院之运作而言,对於侦查程序中强制处分及证据保全之权限分配,我国刑事诉讼制度其实亦不乏明文规定,但是,在侦查法官之引进空间下,检视我国侦查程序之现况,可以发现,就强制处分之监督功能而言,由於现行法在制度面上规范之不足,我国侦查中法院之运作,对於其管辖权之划分标准及管辖权错误之处理,产生法律适用之疑虑;法院组织之方式及法院事务分配规则之适用上发生争议;而对於侦查权限之分配,亦存在著法官保留范围狭隘及法院审查权限不明确之问题;甚至,对於侦查中法院之裁判形式及其救济途径之选择,仍有不同之意见,以致於造成我国侦查中法院运作之困难。

Permissions can be inherited, and sometimes to open a file security label attribute may not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents", the documents can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

Permissions can be inherited, and sometimes to open a file security label attribute may in Figure 4 does not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents ", the document can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能在图4不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

Rights can be inherited, and sometimes open a file security attributes labels, in Figure 4 may not have "refused to delete" competence, but if its parent folder settings "refused to delete subfolders and documents "That document or can not be deleted, solution is to file permissions will be set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能在图4不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

The module of users management expands the the range of users -to the alliance enterprise,which makes the alliance enterprise paticipate in the cooperative design by PLM. The module of right management researches the control method of functional right and the entity data right, and brings forward the functional right and the entity data right based on projection role and identity role, which realizes the right management about dynamic data and static data.

用户管理模块将用户的范围扩展到联盟企业,使得各联盟企业通过PLM可以参与协同设计,权限管理模块研究了数据对象的功能型权限和实体型权限的控制方法,同时提出了一种基于项目角色和身份角色的实体型数据权限,实现了动态数据和静态数据的权限管理。

In order to fulfill with the need of software internationalization standard and the requirement of the enterprise, it is realized that customer safety and power authorization. Customers who have different priority are different from system interface. Only administrator has the right to setup or modify operator's name and password.

为了符合软件的国际化标准和企业的需要,实现了用户安全与权限认证,不同权限的用户进入系统后的用户界面不同,操作员管理只有系统管理员才有权限设置或修改。

The demonstrate in can asking to develop a process of course (safeguard a map by development staff for example, a of the ID interfacial element and tiring-room or correspondence of a group of operations rises), what I need to solve now is how to let the system discovers automatically and maintain these relationships Read above oneself problem, discovery had a direct result to be told to the system,"Authority " the ID that is an interface element and the URL that a group of tiring-room serve (take no account of data to visit attributive temporarily), attributive ={id, comId, urls, desc} such, how can problem translate into realize the definition of attributive, let him user input ComId, Urls?

当然可以要求开发过程中指明(例如由开发人员维护一个映射,把界面元素的ID和后台的一个或者一组操作对应起来),我现在需要解决的是如何让系统自动发现和维护这些关系读了上面自己的问题,发现有了个直观的答案对于系统来讲,&权&就是一个界面元素的ID和一组后台服务的URL(暂时不考虑数据访问权限),权限={id,comId,urls,desc}这样,问题转化为如何能够实现权限的定义,让用户自己输入comId、urls吗?

Not be tweak Cucumber is written read above oneself problem, discovery had a direct result to be told to the system,"Authority " the ID that is an interface element and the URL that a group of tiring-room serve (take no account of data to visit attributive temporarily), attributive ={id, comId, urls, desc} such, how can problem translate into realize the definition of attributive, let him user input ComId, Urls?

不是好办法 cucumber 写道读了上面自己的问题,发现有了个直观的答案对于系统来讲,&权&就是一个界面元素的ID和一组后台服务的URL(暂时不考虑数据访问权限),权限={id,comId,urls,desc}这样,问题转化为如何能够实现权限的定义,让用户自己输入comId、urls吗?

Privilege view sub-model not only raises performance of privilege session but also forms a data abstract layer, so, other systems only access privilege system through privilege view without understanding details of privilege system.MISBAC has an important feature that it is the low couping in sub-models, so they are easy to restructure, and if privilege view sub-model is not changed, MISBAC can be restructure without destroying other modules of MIS.

权限视图子模型不但提升了权限会话的性能,更为重要的是它在权限管理系统中提供了一个数据抽象层,使得其他系统对权限系统的访问只需要通过权限视图,而不必深入到权限系统内部。

For access control, it builds a function set on the basis of user's departments, headships and roles.

提出了基于角色权限权限控制技术,实现了用户多重权限权限的批量授予。

更多网络解释与权限相关的网络解释 [注:此内容来源于网络,仅供参考]

ALTER SESSION:修改数据库会话的权限

alter sequence 修改拥有的序列权限 | alter session 修改数据库会话的权限 | alter sytem 修改数据库服务器设置的权限

Alter procedure:修改拥有的存储过程权限

alter database 修改数据库的权限 | alter procedure 修改拥有的存储过程权限 | alter profile 修改资源限制简表的权限

authorization:权限

一个AuthorizationObject的各个AuthorizationFields被分别赋予不同的值,就构成了一个权限(Authorization). R/3系统中的权限检查与控制,就是针对它(Authorization)而进行的. 同时,为了方便对于用户权限的管理和维护,

become user:切换用户状态的权限

backup any table 备份任意表的权限 | become user 切换用户状态的权限 | commit any table 提交表的权限

become user:转换用户状态的权限

backup any table 备份任意表的权限 | become user 转换用户状态的权限 | commit any table 提交表的权限

CREATE CLUSTER:为用户创建簇的权限

create any view 为任意用户创建视图的权限 | create cluster 为用户创建簇的权限 | create database link 为用户创建的权限

CREATE PROCEDURE:为用户创建存储过程的权限

create database link 为用户创建的权限 | create procedure 为用户创建存储过程的权限 | create profile 创建资源限制简表的权限

dequeue any queue:就是可以向所有队列使消息出队的权限

enqueue any queue 就是向所有队列中加入消息的权限; | dequeue any queue 就是可以向所有队列使消息出队的权限; | manage any queue 就是在所有所有方案下,允许运行DBMS_AQADM的权限

permission:权限

" 权限"(Permission)是针对资源而言的. 也就是说,设置权限只能是以资源为对象,即"设置某个文件夹有哪些用户可以拥有相应的权限",而不能是以用户为主,即"设置某个用户可以对哪些资源拥有权限". 这就意味着"权限"必须针对"资源"而言,

privileges:权限

的安全大门--权限(Privileges) 11.2.1 系统权限 11.2.2 对象权限 11.3 使权限管理变得更加容易--角色(Role) 11.4 限制用户的资源消耗--资源限制文件(Profile) 11.4.1 资源限制的级别 11.4.2 限制资源的参数 11.5 用户与权限管理 与疑难解析 11.5.1 用户管理 与疑难解析 11.5.2 权限管理 与疑难解析 11.5.3 角色管理 与疑难解