| 1. | Searching the method of accessing object in relation environment are of great urgency now 而因,在现有关系系统环境下寻找对对象访问的方法已经刻不容缓。 |
| 2. | J2se provides the following two methods of accessing a relational database that has a jdbc - compliant driver J2se提供以下两种方法来访问带有jdbc兼容驱动程序的关系数据库: |
| 3. | Chapter two discusses the application and realization of odbc and ado , the methods of accessing to database 第二章:主要介绍了通过odbc和ado访问方式来访问数据库的使用示例及其相关的实现过程。 |
| 4. | 15 the preferred method of access and egress to a work platform is from a ladder which shall be fitted with an access gate panel 进出工作平台的优选方法是使用一架梯子,梯子上要配备一个进入板门。 |
| 5. | This paper studies the realization of communication and the method of accessing , analyzing and utilizing data acquisition 本文主要研究了馈线自动化系统中通信的实现及对采集数据进行存取、分析和利用的方法。 |
| 6. | A method of access in which data transfers through input / output channels are made only as and when called for in a user program 一种存取方法,只有当用户程序提出请求时,才能实现通过输入输出通道的数据传输。 |
| 7. | Electronic banking methods of accessing bank accounts through electronic terminals , atms , computers , land - lines , and mobile phones 电子银行客户通过电子终端如自动柜员机、计算机、固定电话线和移动电话操纵银行账户的方式。 |
| 8. | Users security model is put forward . the article mostly researched the method of access to web database using ado and groupware technology of asp 针对ncae系统用户的访问特点,建立了安全的用户访问模型,以确保系统的安全性。 |
| 9. | Therefore , it might be a good idea to restrict port knocking to situations in which alternative methods of access control are impossible to implement 因此,限定端口敲门于访问控制的可替代的方法到无法实现的的场合可能是好主意。 |
| 10. | The thesis emphasize further research on both identity identification and authorization access based on role access control . a new identity identification protocol and a new method of access authorization are presented 论文着重对身份认证和基于角色的存取控制授权访问进行了深入研究,并提出新的身份认证协议和访问授权方法。 |