Ví dụ về việc sử dụng Access privileges trong Tiếng anh và bản dịch của chúng sang Tiếng việt
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Recognize users and user access privileges.
Access Privileges can only be set by Adobe Acrobat not by Adobe Reader.
Allow collaborators to change access privileges for others.
By default, scans are done in Normal mode, hiding files- such as other user folders-you don't have sufficient access privileges to.
Internal accounts with different access privileges can be created in the management console.
This will allow XPressEntry to have a copy of the Cardholders andCards and their access privileges from EBI.
You can also assign a group specific access privileges for each of your shared folders.
Automatic reset function: After turnstile opened not pass within a specified period of time,the system will automatically cancel the access privileges of users.
You can limit the right to use a computer, internet access privileges and even all aseptic both online and offline.
As a result, access privileges are granted to the users according to the interpretation of policy rules, which are then enforced by a sequence of authentication, authorization and auditing functions.
When creating albums,administrators will be able to configure access privileges to the album for other users.
It could also provide different access privileges, for example, if your child had an iPhone, that would only be enabled so as to unlock the back seat of the car, and not to start the engine.
By setting up authentication,you can monitor server access and restrict file access privileges to users you select.
For example, you can grant a group specific access privileges for a folder or a file, and all members of the group have access. .
Operations Security- used to identify the controls over hardware,media and the operators with access privileges to any of these resources.
Remove, and share files, and make changes based on the access privileges set by you(if you are administering the server) or by your server administrator.
While the Windows 9x series offered the option of having profiles for multiple users,they had no concept of access privileges, and did not allow concurrent access; .
More particularly, access privileges to a document for a user are determined based on geographical location information of the user and based on access rights possessed for the document.
But if you're the type who needs to be surrounded by crowds and in the center of all the action, you might want to think twice- or, as Smith suggests,book a villa either within a resort or with access privileges.
Here we will call the folder"appdata" and for the"Configure access privileges for users" we want to give our new user full read/write access to this folder.
No constraints on time commitment or other cumbersome procedures, Tourist sim will give customers the opportunity to enjoy international calls,domestic contacts as well as high-speed 3G access privileges each day.
According to one aspect, a method includes determining access privileges to a document for a user based on geographical location information of the user and based on access rights possessed for the document.
The user's proof of identification is verified, along with, optionally, other information related to the request, such as the user's network address or phone number, account status,and specific network service access privileges.
While the Windows 9x series offered the option of having profiles for multiple users,they had no concept of access privileges, and did not allow concurrent access; and so were not true multi-user operating systems.
With Bridgestream's expertise in the area of ERM(enterprise role management) software, Oracle aims to help companies meet compliance regulations, such as the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act, which have created a need to control access to sensitive systems andmonitor access privileges.
The use of electronicsystems allows an administrator to precisely define access privileges for each user and also instantly update them within the system, which is much more convenient than granting or revoking key privileges. .
An MSP can identify specific roles an actor might play either within the scope of the organization the MSP represents(e.g., admins, or as members of a sub-organization group),and sets the basis for defining access privileges in the context of a network and channele.g., channel admins, readers.
It functions without the need for an agent or any particular access privileges and allows Active Directory users to ensure the resistance of their infrastructure against cyber-risks without the need for any specific knowledge of security techniques.
As part of the core data processing and storage access control systems,access control card reader assume includes setting permissions and access privileges throughout the access control system, the monitoring of the state of the entrance, access control events and recorded with other systems such as alarm, fire linkage system important functions.