英语人>网络例句>权限 相关的搜索结果
网络例句

权限

与 权限 相关的网络例句 [注:此内容来源于网络,仅供参考]

To compare with the investigating judge system in Germany, there are some problems in the court system in the criminal investigating procedure in Taiwan. For a court to command a coercive means in the criminal investigating procedure, the legal rules in our Criminal Procedure Law are insufficient. Therefore, the jurisdiction of the court and the process in jurisdictional dispute in the criminal investigating procedure are not clear and definite. The organization of the court in the criminal investigating procedure still is an issue. Also, the order of the authority distribution is not formed yet in our criminal investigating procedure. The limits of authority of the court are indefinite. Even on the form of the court's decision and the grievance procedure, there are different opinions in practice and theory.

就我国侦查中法院之运作而言,对於侦查程序中强制处分及证据保全之权限分配,我国刑事诉讼制度其实亦不乏明文规定,但是,在侦查法官之引进空间下,检视我国侦查程序之现况,可以发现,就强制处分之监督功能而言,由於现行法在制度面上规范之不足,我国侦查中法院之运作,对於其管辖权之划分标准及管辖权错误之处理,产生法律适用之疑虑;法院组织之方式及法院事务分配规则之适用上发生争议;而对於侦查权限之分配,亦存在著法官保留范围狭隘及法院审查权限不明确之问题;甚至,对於侦查中法院之裁判形式及其救济途径之选择,仍有不同之意见,以致於造成我国侦查中法院运作之困难。

Permissions can be inherited, and sometimes to open a file security label attribute may not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents", the documents can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

Permissions can be inherited, and sometimes to open a file security label attribute may in Figure 4 does not have "refused to delete" permissions, but if it is the parent folder set up a "refusal to delete sub-folders and documents ", the document can not be deleted or the solution is to file permissions set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能在图4不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

Rights can be inherited, and sometimes open a file security attributes labels, in Figure 4 may not have "refused to delete" competence, but if its parent folder settings "refused to delete subfolders and documents "That document or can not be deleted, solution is to file permissions will be set to full control.

1权限是可以继承的,有时候打开某个文件安全属性标签后,可能在图4不会有"拒绝删除"权限,但是如果它的父文件夹设置了"拒绝删除子文件夹及文件",该文件还是无法被删除的,解决方法是将文件权限设置为完全控制。

The module of users management expands the the range of users -to the alliance enterprise,which makes the alliance enterprise paticipate in the cooperative design by PLM. The module of right management researches the control method of functional right and the entity data right, and brings forward the functional right and the entity data right based on projection role and identity role, which realizes the right management about dynamic data and static data.

用户管理模块将用户的范围扩展到联盟企业,使得各联盟企业通过PLM可以参与协同设计,权限管理模块研究了数据对象的功能型权限和实体型权限的控制方法,同时提出了一种基于项目角色和身份角色的实体型数据权限,实现了动态数据和静态数据的权限管理。

In order to fulfill with the need of software internationalization standard and the requirement of the enterprise, it is realized that customer safety and power authorization. Customers who have different priority are different from system interface. Only administrator has the right to setup or modify operator's name and password.

为了符合软件的国际化标准和企业的需要,实现了用户安全与权限认证,不同权限的用户进入系统后的用户界面不同,操作员管理只有系统管理员才有权限设置或修改。

The demonstrate in can asking to develop a process of course (safeguard a map by development staff for example, a of the ID interfacial element and tiring-room or correspondence of a group of operations rises), what I need to solve now is how to let the system discovers automatically and maintain these relationships Read above oneself problem, discovery had a direct result to be told to the system,"Authority " the ID that is an interface element and the URL that a group of tiring-room serve (take no account of data to visit attributive temporarily), attributive ={id, comId, urls, desc} such, how can problem translate into realize the definition of attributive, let him user input ComId, Urls?

当然可以要求开发过程中指明(例如由开发人员维护一个映射,把界面元素的ID和后台的一个或者一组操作对应起来),我现在需要解决的是如何让系统自动发现和维护这些关系读了上面自己的问题,发现有了个直观的答案对于系统来讲,&权&就是一个界面元素的ID和一组后台服务的URL(暂时不考虑数据访问权限),权限={id,comId,urls,desc}这样,问题转化为如何能够实现权限的定义,让用户自己输入comId、urls吗?

Not be tweak Cucumber is written read above oneself problem, discovery had a direct result to be told to the system,"Authority " the ID that is an interface element and the URL that a group of tiring-room serve (take no account of data to visit attributive temporarily), attributive ={id, comId, urls, desc} such, how can problem translate into realize the definition of attributive, let him user input ComId, Urls?

不是好办法 cucumber 写道读了上面自己的问题,发现有了个直观的答案对于系统来讲,&权&就是一个界面元素的ID和一组后台服务的URL(暂时不考虑数据访问权限),权限={id,comId,urls,desc}这样,问题转化为如何能够实现权限的定义,让用户自己输入comId、urls吗?

Privilege view sub-model not only raises performance of privilege session but also forms a data abstract layer, so, other systems only access privilege system through privilege view without understanding details of privilege system.MISBAC has an important feature that it is the low couping in sub-models, so they are easy to restructure, and if privilege view sub-model is not changed, MISBAC can be restructure without destroying other modules of MIS.

权限视图子模型不但提升了权限会话的性能,更为重要的是它在权限管理系统中提供了一个数据抽象层,使得其他系统对权限系统的访问只需要通过权限视图,而不必深入到权限系统内部。

For access control, it builds a function set on the basis of user's departments, headships and roles.

提出了基于角色权限权限控制技术,实现了用户多重权限权限的批量授予。

第1/67页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

If you are unfortunate enough to the lovelorn, please tell me, I will help you out, really, please contact me!

如果你不幸失恋了,请告诉我,我会帮助你摆脱困境,真的,请联系我啦!

China's plan to cut energy intensity by 20 percent and pollutant discharges by 10 percent between 2006 and 2010 is a case in point.

中国计划在2006年到2010间降低20%的能源强度和减少10%的主要污染物排放,就是一个这样的例子。

Well, Jerry would rattle off all the details of that movie.

那么,杰瑞会急促背诵那部电影所有细节。