acls

acls

1. Reconstructed ACLs were reevaluated arthroscopically in 9 patients, in whom, 6 had good remodeling of ACLs.

9例术后关节镜观察重建前交叉韧带的形态结构 ,7例塑形改建良好。

2. An ACL makes routing decisions based on source address, destination address, protocols, and upper-layer port numbers.

ACL依据来源位址、目的地位址、协定和上层埠号作路由决定。

3. The ACLs can be inherited from the folder where the file is created.

ACL可以从创建该文件的文件夹继承。

4. An ACL is made up of statements that define whether packets are accepted or rejected at inbound and outbound interfaces.

ACL是由定义进入和流出介面上的封包是否被接受或拒绝的叙述所组成。

5. The proportion of ACL group which UCVA of postoperation reach or exceed BCVA of preoperation is 93.2%, LASIK group is 66.7% after 6 months.

ACL术后6个月达到和超过术前最佳矫正视力的比例是93.2%,而LASIK是66.7%;

6. ACLs can restrict the delivery of routing updates.

ACL能限制路由更新的传送。

7. Active Directory uses a protection mechanism to make sure that ACLs are set correctly for members of sensitive groups.

Active Directory使用保护机制来确保为敏感组中的成员正确设置ACL。

8. Five people were found positive with aCL and aPI,six with aPA and aPE,three e with aPS and aPC,the positive rate was 6.1% ,7.32% and 3. 66% respectively.

aPA和 aPE 6人阳性,阳性率为 7.32%; aPS和 aPC 3人阳性,阳性率为 3.66%。

9. Link-4A is mainly used to transmit interceptive target information from the command control station to the campaign plane,used widely ACLS,ATC,AIC and STK etc.

Link-4A主要用于把指挥控制站所截获的目标信息和指令传输给作战飞机。

10. MRI and KT2000arthrometer would help to evaluate the injured position degrees, and the influence on knee function in ACL injured knees.

MRI、KT-2000有助于判断ACL损伤的范围、部位和对膝关节功能的影响。

11. NT will correctly deal with the ACL regardless of the sequence order.

NT将不管顺序命令准确地处理存取控制清单。

12. Samba synthesises these inherited permissions for nt by returning as an nt acl the unix permission mode that a new file created by samba on this share would receive.

samba通过建立一个可以在共享资源上得到的新文件来返回类似于nt acl一样的。

13. "Beyond the ACLS Report: An Interview with John Unsworth," with Kevin Guthrie. Academic Commons, December 2007 (Special Cyberinfrastructure Issue).

“在ACLS报道之外:采访约翰昂斯沃斯”,凯文卡斯瑞。学术常规,2007年12月(数字基础结构特刊)

14. After one hour, the SDProp thread will apply the change made to the ACLs of the adminSDHolder container to all the members of protected groups.

一个小时后,SDProp线程会将对adminSDHolder容器的ACL所做的更改应用到受保护组的所有成员。

15. A teen wolf?) so of course he landed the wrong way in an NCAA tourney game and tore his ACL.

一头年轻的狼?)所以当他在NCAA的比赛里由于落地不稳而导致膝盖前十字韧带撕裂。

16. Once a match is found in the list, the accept or reject action is performed and no other ACL statements are checked.

一旦发现清单中有符合的条件,接受或拒绝动作被执行,之后的其它ACL叙述就不再检查。

17. Third, presents a method to put ACL on the abstract layer of Extended Attribute (EA) Mechanism. The ACLs are passed in the EA system calls.

三、对文件系统的扩展属性机制进行研究,并利用文件系统的扩展属性(EA)机制传递、存储和保护访问控制表。

18. How about when he tore his ACL last season? Everyone shrugged their shoulders, as if it didn't matter.

上赛季他左膝受伤之后怎样呢?说有人都耸了耸肩,好像并没有什么大碍。

19. Each of these resources has several classes that you can use to create and modify ACLs.

上述每个资源都有几个用于创建和修改ACL的类。

20. The next page will describe how ACLs are created.

下一页将描述ACL如何建立。

21. The next page will describe how ACLs work.

下一页将描述ACL如何运作。

22. The next page will teach students how to verify ACLs.

下一页将教学生如何来验证ACL。

23. The next page will discuss the placement of ACLs.

下一页将讨论ACL的安放位置。

24. The following table lists the ACLs that should be set on Web. Config files and on any files listed in configSource attributes.

下表列出了应当在Web.config文件以及configSource属性中列出的任何文件上设置的ACL。

25. The following table lists the recommended file access control list (ACL) permission settings (the Exchange_2003-Backend_V1_1. Inf file configures these settings automatically).

下表列出了推荐的文件访问控制列表(ACL)权限设置(Exchange_2003-Backend_V1_1.inf文件会自动配置这些设置)。

26. The following code example uses the GetAccessControl and the SetAccessControl methods to add an access control list (ACL) entry and then remove an ACL entry from a directory.

下面的代码示例使用GetAccessControl和SetAccessControl方法添加访问控制列表(ACL)项,然后从某个目录中移除一个ACL项。

27. Users that are not in the Exchange 5.5 Directory service, but belong to an access control list (ACL), become zombie users in an Exchange 2000 organization.

不在Exchange 5.5目录服务中但属于访问控制列表(ACL)的用户将成为Exchange 2000组织中的僵用户。

28. ACL View - View and edit file system ACLs in Windows XP Home without having to boot into safe mode.

不用启动到安全模式下就可以查看。

29. To mitigate this threat, maintain strong ACLs on browser definition files.

为了减轻该威胁,请在浏览器定义文件上保持强ACL。

30. MAIN OUTCOME MEASURES: The fiber changing features, cell counting and blood vessel density in the ACLs were observed through MASSON staining and haematoxylin-eosin staining.

主要观察指标:MASSON染色、苏木精-伊红染色观察前交叉韧带内部纤维的变化特点、细胞计数及血管密度。

31. The Interactive Media Activity will teach students where to place ACLs.

互动媒体活动将教每个学生安放ACL的地方。

32. Current literature also demonstrates that ACL is not the major structure of bearing knee valgus-varus moment and internal rotation moment loadings.

交叉韧带并不是承受膝关节内、外翻和内旋力矩的主要结构。

33. Removes all matching allow or deny access control list (ACL) permissions from the current file or directory.

从当前文件或目录移除所有匹配的允许或拒绝访问控制列表(ACL)权限。

34. DD>Removes the specified permission from this ACL entry.

从该ACL入口中删除指定的许可。

35. PAYMENT:100PCT FRT TO BE PAID THE OWNERS NOMINATED BANK W/I 3 BANKING DAYS ACL S/R BS/L MARKED FRT PREPAID AS PER CHARTER PARTY.BUT ALWAYS B.B.B.

付款方式:全部运费在装完货和签发预付运费提单后3个银行工作日内付至船东指定账户.

36. This determines whether the packet is passed or dropped when the ACL statement matches.

以此来决定当ACL叙述相符时,封包是否被传递或丢弃。

37. But here's the kicker: impersonation isn't necessary for ACL authorization.

但是存在以下隐患:对于ACL授权来说,模拟是不必要的。

38. More and more experiments have proved that the dose of epinephrine recommeded by the guide of ACLS is probably too small.

但越来越多的实验证实,现行高级生命复苏指南所推荐的肾上腺素的复苏剂量可能太小。

39. You must consider an ACL for multiple users with varying permissions to a component of a Web service, or to the same or similar component of multiple Web services.

你必须考虑到多个用户的ACL对于一个Web服务组件或对于相同或相似的多个Web服务组件将具有不同的权限许可。

40. You should also test how well the system is performing in a non-production environment to ensure an ACL is properly executed with varying user and group permission entries.

你还应当在一个非商业应用的环境中来测试系统性能来确保在用户和组许可条目变化的情况下ACL能够正常执行。

41. It is a good idea to use a text editor to create named ACLs.

使用文字编辑器来建立命名的ACL是一个好的观念。

42. Access to Windows resources protected using Access Control Lists (ACLs) is checked against the current Windows identity of the ASP.NET application.

使用访问控制列表(ACL)对受保护Windows资源的访问将与ASP.NET应用程序的当前Windows标识进行对比检查。

43. The best practice for protecting backups is to store backup tapes in a secure location or back up to disk files that are protected by adequate access control lists (ACLs).

保护备份的最佳做法是将备份磁带存储在安全的位置,或者备份到由适当的访问控制列表(ACL)保护的磁盘文件。

44. If ACLs are not configured on the router, all packets that pass through the router will be permitted to access the entire network.

假如ACL在路由器上未被组态,传经路由器的所有封包将被允许存取整个网路。

45. If additional condition statements are needed in an access list, the entire ACL must be deleted and recreated with the new condition statements.

假如在存取清单内需要加入额外的条件叙述,整个ACL必须被删除且以新的条件叙述重新建立。

46. Zombie users are users that appear in an Access Control List (ACL) but not in Active Directory.

僵用户是出现在访问控制列表(ACL)中但不在Active Directory中的用户。

47. With the technology ofenciyption and digital signature, the signature is given to the ACL, secureproperty by the owner of the object in order to create a complete Secure-Object.

具体实现是结合数据加密技术和签名技术,对其中的访问控制表、安全属性等内容由对象拥有者进行数字签名保护,从而构造了完整的安全对象。

48. After analyzing the arithmetic of ACL(Access?Control?Lists), brings forward arithmetic of ACM(Access?Control?Matrix).

分析了ACL(Access?Control?Lists)算法,提出了ACM(Access?Control?Matrix)算法;

49. The anterior cruciate ligament (ACL) is a strong band of tissue that is located within the knee and connects the thighbone (femur) to the shinbone (tibia).

前交叉韧带(ACL)是一结实的组织,它位于膝关节内,连接大腿骨(股骨)和小腿骨(胫骨)。

50. The service access control list (ACLs) settings for front-end servers are identical to the service ACLs settings for back-end servers.

前端服务器的服务访问控制列表(ACL)设置与后端服务器的服务ACL设置完全相同。

51. InheritOnly, NoPropagateInherit, [F: System.Security.AccessControl.InheritanceFlags.ContainerInherit,] and ObjectInherit flags on all ACEs in leaf object ACLs are cleared.

叶对象ACL中的所有ACE上的InheritOnly、NoPropagateInherit、[F:System.Security.AccessControl.InheritanceFlags.ContainerInherit,]和ObjectInherit标志将被清除。

52. Named ACLs provide the ability to modify ACLs without deletion and reconfiguration.

命名的ACL提供不用删除及重新组态就能修改ACL的能力。

53. Therefore, it may be necessary to modify the ACL of those attributes to allow computer lists to read these added attributes.

因此,可能需要修改这些属性的ACL,以便使电脑列表能够读取这些添加的属性。

54. In ACL configuration mode, specify one or more conditions to be permitted or denied.

在ACL组态模式,指定一个或更多的条件来作允许或拒绝。

55. How can we set? up and use access control list (ACL) security modelfor a Journaled File System (JFS) in JFS release 3.3?

在JFS 3.3版中,如何设置和使用日志文件系统(JFS)下的访问控制列表(A CL)安全模型?

56. On Microsoft Windows NT, Microsoft Windows 2000, Windows XP, and Windows Vista, access control list (ACL) settings on the file can prevent you from accessing isolated storage.

在Microsoft Windows NT和Microsoft Windows 2000上,文件上的访问控制列表(ACL)设置可以防止您访问独立存储。

57. In the Windows authorization model, permissions are granted through an access control interaction that compares the access token to the access control lists (ACL).

在Windows授权模型中,权限授予方式是将访问令牌与访问控制列表(ACL)进行对比的访问控制交互。

58. Precompiling a site only for deployment or for deployment and update does not preserve file access control lists (ACLs) on target files and subdirectories.

在仅针对部署或同时针对部署和更新预编译网站时,将不保留目标文件和子目录上的文件访问控制列表(ACL)。

59. A game after the emotional letdown of Andrew Bynum's ACL injury, Kobe Bryant was completely ridiculous en route to an NBA season-high 61 points, all of which L.

在令人沮丧的拜纳姆受伤后的一场比赛,科比拿下了令人不可思议的61分,联盟本赛季最高得分。

60. A file to add or remove access control list (ACL) entries from.

在其中添加或移除访问控制列表(ACL)项的文件。

61. Multi-security policies(BLP,CW,ACL) are implemented in the kernel. It can protect the confidentiality and integrality of the information.

在安全内核中实现了多种安全策略(BLP,CW,ACL),通过这些安全策略的结合使用,保护内部信息的机密性和完整性,并执行用户的验证。

62. After completing this activity, the student will be able to create ACLs.

在完成这个活动之后,同学将能够建立ACL。

63. Named ACLs are not compatible with Cisco IOS releases prior to Release 11.2.

在实作命名的ACL之前考虑下列问题。

64. The Lab Activities on this page will help students plan, configure, and apply extended ACLs to filter network traffic.

在本页的实验活动将帮助学生规划、组态和应用延伸式ACL来过滤网路讯务交通。

65. Access control in real systems is always built on the access control matrix (ACM). The most common access control is access control lists (ACLs) and capability models.

在现实系统中的访问控制一般都是基于访问控制矩阵建立起来的 ,最普遍的访问控制是访问控制列表和能力模型。

66. ACLs can be configured at the router to control access to a network or subnet.

在路由器上可以设定ACL以控制网路或子网路的存取。

67. D uring the past 25 years,with fully support of our abundant customers, ACL wins a resplendent 25years ,huge achievement.

在过去的25年,力丰竭尽全力维护、支持我们的客户,25年来赢得了辉煌取得了巨大的成就。

68. In this lab, the student will create a named ACL to permit or deny specific traffic.

在这个实验,学生将建立一个命名的ACL来允许或拒绝特定的讯务。

69. In this lab, the students will practice using ACLs to filter IP traffic.

在这个实验,学生将练习使用ACL来过滤IP讯务。

70. In this lab, the student will configure and apply a standard ACL to permit or deny specific traffic.

在这个实验,学生将组态和应用标准的ACL以允许或拒绝特定的讯务。

71. In this case, the.NET Framework creates the needed key and related container with the ACLs of the current user.

在这种情况下,.NET Framework会创建所需的密钥及带有当前用户ACL的相关容器。

72. A sophisticated ACL (Access Control List) is used to ensure that the appropriate user is mapped to the desired information.

复杂而精密的ACL(访问控制列表)用于确保将适合的用户映射到所需要的信息。

73. A sophisticated ACL is used to ensure that the appropriate user is mapped to the desired information.

复杂而精密的acl用于确保将适合的用户映射到所需要的信息。

74. If you do not want to use ACLs for some repositories in a patched CVS server, set this keyword to no.The default is no.

如果你不想在一个打过CVSACL补丁的CVS 服务器为一些仓库使用 ACLs 作为控制, 则请将这一个关键字设定为no。

75. If an editor is not listed in the Readers field, the user with editor ACL access cannot read or edit the document.

如果在Readers字段中没有列出该编辑,那么具有编辑ACL访问权限的用户不能阅读和编辑这个文档。

76. If the parent's ACLs conflict with any ACL defined here, override the parent's ACL. Useful for overriding inheritance.

如果父对象的ACL同本地定义的ACL冲突,则覆盖父对象的ACL。可用于覆盖继承性。

77. They include the issues of specifying the maximum number of ACL entries for each Web service with SLA guarantees of uptime availability associated with interruption thresholds.

它们包括在与中断阀值相关的运行时性能的SLA保证的前提下定义ACL条目的最大数量的问题。

78. Security probes that verify a database ACL against a predetermined configuration and that check for inconsistencies in security configurations across multiple servers.

安全探测器,根据预先确定的配置来验证数据库ACL,检查多台服务器中不一致的安全配置。

79. The general rule is to put the extended ACLs as close as possible to the source of the traffic denied.

安放延伸式ACL的一般原则是尽可能接近被拒绝的讯务来源。

80. The Lab Activity will help students become more familiar with the syntax that is used to create an ACL.

实验活动将帮助学生更熟悉用来建立ACL的语法。

英语宝典
考试词汇表