英语人>网络例句>permissions 相关的网络例句
permissions相关的网络例句

查询词典 permissions

与 permissions 相关的网络例句 [注:此内容来源于网络,仅供参考]

C. Delete the Geof user account, create a new user account for Alix, and assign it the same permissions that Geof's account was assigned.

C。 删除Geof使用者帐户,为Alix建立新的使用者帐户并指派与Geof帐户相同的权限。

D. Disable the Geof user account, create a new user account for Alix, and assign it the same permissions that the Geof user account was assigned.

D。 停用Geof使用者帐户,为Alix建立新的使用者帐户并指派与Geof帐户相同的权限。

Associated with each segment is a base address, size, permissions, and other meta-data.

与每个分段相关联的信息有基地址、大小、权限和其他中间数据。

This first set of permissions is created by Samba in exactly the same way as normal file permissions are, described above, and is displayed in the same way.

第一组权限设定由samba以和普通文件权限一样的方法来建立、描述和显示。

In the opening session I had a question in regards to item level permissions and anonymous access, for instance if you break inheritance at a folder level to assign unique permissions you will not be able to allow anonymous access from that point on.

在开幕会议上,我遇到一个关于项目级权限和匿名访问的问题,例如如果你断开一个项目与父文件夹层的继承关系,而赋予它独有权限,那么你就不能使得这个项目被匿名访问。

Permissions can be inherited, and sometimes to open a file security label attribute may not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents", the documents can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

Permissions can be inherited, and sometimes to open a file security label attribute may in Figure 4 does not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents ", the document can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能在图4不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

When a user attempt s to perform an operation on a database object that employs security features, that user′s set of permissions are based on the intersection of that user′s explicit and implicit permissions.

当用户要对使用了安全功能的数据库对象执行操作时,该用户所具有的权限基于他的显式和隐式权限的交集。

When a user attempts to perform an operation on a database object that employs security features, that user′s set of permissions are based on the intersection of that user′s explicit and implicit permissions.

当用户要对使用了安全功能的数据库对象执行操作时,该用户所具有的权限基于他的显式和隐式权限的交集。

The article improved and expanded the threshold access control model based on quantified permissions, solved the problems of access control system deduced by introducing permission quantity into permission concept, such as huge quantity of permissions and vales, heavy administration load, and inadequation to deal with the dynamic quantity evolution.

对基于量化权限的门限访问控制方案进行了改进与扩展,解决了权限概念引入权限量后导致的访问控制系统权限及角色数量巨大、管理负荷沉重以及不适应权限量动态演化的问题。

第1/11页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

It is also known as one of the most poisonous naturally occurring substances.

它也被称为一个最自然发生的有毒物质。

The greatest stress is found at the location on the cross section where V is the largest.

最大应力出现在横截面上V为最大的地方。

It is the most important three water problem which our country faces in the 21st century that flood and waterlog, drought and shortage of water, the deterioration of water environment.

洪涝灾害、干旱缺水、水环境恶化是二十一世纪我国面临的三大水问题。