file protection

英 [faɪl prəˈtekʃn] 美 [faɪl prəˈtekʃn]

文件保护

计算机



双语例句

  1. Establish file protection for the newly created web2.0 directory.
    对新创建的web2.0目录建立文件保护。
  2. If the system finds a key matching the file protection, the process is able to decrypt the file key and file content.
    如果系统找到一个匹配文件保护的密钥,那么这个进程就可以对文件密钥和文件内容进行解密。
  3. On the Basics tab of the File Protection document, accept the default options and modify the access control list to make sure that the domino/ html/ web2.0 directory is specified as the Path.
    在FileProtection文档的Basics附签上,接受默认的选项并修改accesscontrol列表以确保将domino/html/web2.0目录指定为Path。
  4. The test shows that the schema is indeed effective in achieving file security protection.
    经测实验证,该方案确实能有效实现文件的安全保护。
  5. Research on Digital Watermarking and Digital Fingerprinting Algorithm for Important Electronic File Protection
    用于重要电子文件保护的数字水印和数字指纹算法研究
  6. A connection could not be established with the windows file protection server.
    无法为windows文件保护服务器建立连接。
  7. To their credit, however, the operating system group did introduce the concept of "System File Protection", which eliminated DLL Hell.
    为了声誉,操作系统团队的确引入了“系统文件保护”的理念,当然也是为了消除DLLHell。
  8. NTFS helps provide file protection based on users and groups, and only allows users with administrative privileges for a particular level to edit security configuration files.
    ntfs帮助提供基于用户和组的文件保护,并且只允许具有特定级别的管理特权的用户来编辑安全配置文件。
  9. This paper will discuss the sorting, file and protection of the electronic documents in hospital.
    本文将从医院的角度分析电子文件的整理、归档和保护。
  10. The changes to windows file protection settings do not take effect until the next restart.
    在下次重新启动之前,对windows文件保护设置所作的改动不会生效。
  11. Windows file protection is not active on this system.
    这个系统上没有运行windows文件保护。
  12. Research and analysis of the characteristics and tendency of the development of our file protection technique is a historical task of file and material workers in China.
    研究和分析我国档案保护技术的发展特点与趋势,是我国从事档案和资料管理工作部门诸同志肩负的历史使命。
  13. As the registry monitoring software is becoming more and more popular and meanwhile the system file protection is enhanced, how to startup Trojan horse when system boots troubles us.
    随着注册表监视软件的普及以及系统文件保护机制的增强,木马如何安全隐蔽的随机自启动成为一个挑战。
  14. Because the website needs to be visited by the public exposes on Internet, it is easy to become hacker's attack goal, therefore needs a special website file protection system to safeguard the security of the website content.
    网站因需要被公众访问而暴露于因特网上,容易成为黑客的攻击目标,因此需要专门的网站文件保护系统来保障网站内容的安全。
  15. Integrity-Based File Protection
    基于完整性的文件保护
  16. In this paper, the occlusion is selected artificially and meet a certain geometry conditions, this is because in the practical application the occlusion is distinctive and can be determined by a few physical and chemical methods of file protection.
    在文中,图像遮挡区域的选取是人为指定的,并且让其满足一定的几何条件,这是因为在实际应用中,遮挡部分有明显特征,可以通过一些档案保护学的物理或化学方法指定。
  17. The file protection system thought.
    档案保护制度思想。
  18. This paper has a detailed explanation for implementations and algorithm of "Cyclic Redundancy Check", and it's application in file protection.
    详细介绍了循环冗余校验CRC(CyclicRedundancyCheck)差错控制原理、算法实现及其在文件保护中的应用。
  19. A File Protection Scheme Based on Eulers Theorem
    基于欧拉定理的文件保护方案
  20. Study on the File Protection Technology of Ancient China
    中国古代档案保护科技探源
  21. Research of File Protection with Cyclic Redundancy Check
    循环冗余校验CRC在文件保护中的研究
  22. This article is about the problem of the file protection system or the Physical Box. It analysis the structure of the system and the basic principle of the system. It discusses the realized method of the system and running method of the system.
    文章介绍了一种实用的基于MS-DOS6.2上的软件医疗箱&文件保护系统的结构和基本原理,并给出了具体的使用方法与实现方法,最后讨论了其优越性或特色。
  23. Primary Research for File Protection and Recovery Technology
    文件保护与恢复技术初探
  24. And, the prototype system can also be expanded into a network file protection and sharing platform.
    并且,此原型系统以后还可以扩展成一个网络文件保护和共享的平台。
  25. We mainly through file encryption and rights of employees assigned to implement the file access control, using transparent paper encryption and decryption to avoid the impact on employees. Finally, it provides innovative key management model to meet the practical needs of enterprise file protection.
    我们主要通过文件的加密和企业员工的权限分配来实现文件的访问控制,采用透明的文件加解密来避免对企业员工造成的影响,并提出创新的密钥管理模型应对企业文件保护的实际需要。
  26. In the present national minority file protection flood tide, with the development of national culture, archives and cultural industries tightly linked together.
    在目前的少数民族档案保护大潮中,随着民族文化产业发展,档案和文化产业紧紧的联系在了一起。
  27. A test environment is built, and file protection system performance is tested.
    搭建测试环境,通过对文件防护系统进行的性能测试,给出了测试分析结论。
  28. To sum up, the main work is as follows: 1. Starting from the ground up, to maximize the improvement of the reliability of file protection system, A file protection system based on Windows file system filter driver is proposed.
    概括起来,主要工作如下:1.提出基于Windows文件系统过滤驱动来实现文件防护系统,从底层出发,最大限度的提高文件防护系统的可靠性。
  29. The tests show that the implemented file protection system can effectively prohibit all unauthorized operation and provide users with flexible security settings.
    经测试表明,论文实现的文件防护系统可有效禁止各种非授权操作,并为用户提供灵活多变的安全设置。
  30. Parameter management model completes the functional of calculation of input and output parameters, parameter modification, display and archive parameters, parameters file protection.
    参数管理模块完成计算参数的输入输出、参数修改、参数的显示和存档、参数文件保护等功能。