unix operating system造句
例句与造句
- In linux and unix operating systems , several user and group accounts are typically required to install and operate db2 udb
在linux和unix操作系统中,安装和操作db2 udb通常需要几个用户和组帐户: - The environment variable that must be set to enable this search are shown below for some of the common unix operating systems
下面展示了在一些常用的unix操作系统中启用该搜索必须设置的一些环境变量。 - For the unix operating system , the active environment will be derived from locale setting including language , territory , and code set
对于unix操作系统,将从地区设置推导出环境,包括语言、区域和编码集。 - The x protocol was developed in the mid 1980 ' s amid the need to provide a network transparent graphical user interface primarily for the unix operating system
协议最早于二十世纪八十年代开发出来,为unix用户提供网络透明的图形用户接口。 - In this dissertation the integrated and privilege - role extended unix operating system security model , which is based on the blp model , is discussed
在对blp模型进行分析的基础上,提出了以blp模型为基础的完整性和特权角色扩展的unix操作系统安全模型。 - It's difficult to find unix operating system in a sentence. 用unix operating system造句挺难的
- Previously , he was involved in writing fiber channel device drivers and developing network processor applications , as well as maintaining unix operating systems
以前,他从事的是编写光纤通道设备驱动程序和开发网络处理器应用程序,以及维护unix操作系统。 - It has been closely associated with the unix operating system where it was developed , since both the system and most of the programs that run on it are written in c
当它开发的时候是紧密的与unix系统结合在一起,直到系统和大多数在上面运行的程序都是用c写的 - More and more websphere applications are being migrated from a traditional unix operating system to linux for lower costs with similar performance
越来越多的websphere应用程序正在由传统的unix os向linux迁移,因为这样可以通过更少的费用而获得近乎同样的性能。 - This dissertation is focus on the research of the model of secure operating system and the implementation architecture of the security policy on unix operating system platform
本文以unix操作系统为平台,重点对安全操作系统模型和安全策略实现结构进行了研究。 - The berkeley software distribution family of operating systems can be traced back to the bsd unix operating system created and maintained at the university of california , berkeley , since the late 1970s
Berkeley software distribution ( bsd )系列操作系统的历史向前可以追溯到20世纪70年代后期由加利福尼亚大学berkeley创建和维护的bsd unix操作系统。 - In addition , the logical partitioning lpar capability of pseries servers makes it possible to run one or more instances of linux along with aix , ibms award - winning unix operating system , on a singler server
另外, pseries服务器所具有的逻辑分区( lpar )能力使它可以在一台服务器上在运行aix ( ibm获奖的操作系统)的同时,再运行一个或多个linux实例。 - After the analysis of the typical instance of the security attack on the unix operating system , it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix
本文通过重点分析针对unix操作系统的一些攻击实例,指出现有的unix操作系统自主访问机制和超级用户特权实现方式是最主要的安全问题。
更多例句: 上一页