您要查找的是不是:
- All user permission, access control, and uniform resource locator (URL) management are easily configured. 所有的用户许可、存取控制和统一资源定位器(url)管理都很容易设置。
- All user permission,access control,and uniform resource locator (URL) management are easily configured. 所有的用户许可、存取控制和统一资源定位器(URL)管理都很容易设置。
- For example, a proprietary software license may grant a user permission to run a program, but not see its source code. 例如,一个专有软件许可可能允许用户运行程序,但不能查看源代码。
- The Run as administrator option elevates the user permissions. “以管理员的身份运行”选项可提升用户权限。
- A report server uses an internal security extension to verify user permissions. 报表服务器使用内部安全扩展插件来验证用户权限。
- The ability to perform management tasks depends on user permissions. 执行管理任务的能力取决于用户权限。
- Modify the workbook This password is not encrypted and is only meant to give specific users permission to edit workbook data and to save changes to the file. 修改工作簿此密码未加密,它仅仅表示授予特定用户编辑工作簿数据和保存对文件所做更改的权限。
- You can fine-tune user permissions by creating procedures that carry out actions on tables, and then granting users the permission to execute the procedure. 您可以调整用户权限,方法是创建对表执行操作的过程,然后授予用户执行该过程的权限。
- You can grant trust to a folder on your local computer at the User level with normal user permissions. 可以在用户级别使用普通用户权限,向本地计算机上的文件夹授予信任。
- Learn about administrative setup options and the user permissions that are required for installing. 了解安装所需的管理设置选项和用户权限。
- This groups are used mainly on systems outside of domains to simplify the administration of user permissions. 这个类别主要被使用在简化允许用户在领域外面对系统的管理。
- Add new users, change user accounts and passwords, manage user permissions. 添加新用户、更改用户帐号和密码、管理用户权限。
- Once become the good friend of the user permissibly, illegal element is met with " good friend " the identity demands money to other user. 一旦获准成为用户的好友,不法分子就会以“好友”的身份向其他用户索取钱财。
- You an also edit configuration settings, add filters, add or change user permissions, and add or remove profiles altogether. 您还修改配置设置,添加过滤器,添加或更改用户权限,并添加或删除概况完全。
- The land is to be sold with plan permission. 这块地与建筑许可证一并出售。
- So operating systems lack a consistent authentication authorization mechanism to judge the authenticity of user identity and dynamically authorize user permissions. 系统缺乏一致的认证授权体系,以判定用户身份的真实性,并动态决定用户能获得的权限。
- We were refused permission to enter. 我们被拒之门外。
- They entered the area without permission. 他们未经许可擅入该地。
- Industry is a heavy user of electric power. 工业需耗费大量的电力。
- It's illegal to read people's private letters without permission. 未经允许看别人的私人信件是不合法的。