在 英语 中使用 To a system 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
But there's a reason no one can connect the dots from unceasing interventions to a system of law and order.
It determines whether a user has access to a system and the level of access that user has permission to utilize.
The Russian Federation was migrating to a system of long-term assignment of fishery quotas, for periods of 10 years, in order to promote rationalized resource use.
The exhaustive application of such an organon would give rise to a system of pure reason.
Initially created to compile ES6, it became a much more generic tool that can accomplish any code transformation, thanks to a system of plugins.
Members of the newly-founded IMF agreed to a system of fixed exchange rates, which would stay in place until the early 1970s.
New Zealand has given strong support to a system of strengthened IAEA safeguards, including in regional disarmament discussions.
The protection of workers, assistance to the poor, and the right to a system of social insurance are safeguarded(Art. 9 of the Constitution).
The representatives also noted that the OPCAT refers to a system of regular visits but it does stipulate how often such visits should take place.
Backdoor- An application which communicates with remote attackers, allowing them to gain access to a system and to take control of it.
At present, posts in United Nations peace operations are not subject to a system of desirable geographical ranges.
Indeed, 24 states, representing 30 percent of the population have already agreed to a system that that provides the software for free.
Usually, launchers use nontraditional techniques to launch other malicious programs in order to ensure stealth or greater access to a system.
Sacrifices belonged to a temporary economy, to a system of types and emblems which served their purposes and have now passed away.
For hundreds of years, the Old Testament people of Israel were bound to a system of animal sacrifices to atone for their sins.
If remote access capabilities are not adequately monitored and controlled, unauthorized users can gain access to a system or the entire ICS network.
Note that I didn't say accurate, because you can easily authenticate bad data when it's introduced to a system.
Bad passwords are one of the easiest ways for an attacker to gain access to a system.
After an attacker gets full access to a system, it is simple to modify the event logs to cover his tracks.