Examples of using Database access in English and their translations into Russian
{-}
-
Official
-
Colloquial
Direct database access ODBC, SQL statements.
Downsizing and liquidation-- database access-- UNOMIG.
Shared database access and number of shared reports/documentation.
In some instances, existing tools support database access.
Look up website reports in our extensive database, access our help section and help promote Web Security Guard.
People also translate
It is especially topical for complicated programs such as database access components.
We kindly ask you to ensure that your projects and database access is optimized, so that server stability can be guaranteed at any time.
These were expected to provide data and computer transfers, facsimile, Internet and World-Wide-Web services,video-conferencing facilities and remote database access.
It then goes on to show how we can use Mongoose to provide database access for the LocalLibrary website.
One, used with information regarding database access, is to track the IP address, but then replace it with a similar code, that will allow identification without violating privacy.
The data server provides the infrastructure andsupport functions needed for database access through network protocols.
Meanwhile the choice of Database Access Provider as the choice of Database itself is the application basis, which influences on efficiency, development rate, and even on the project success.
The number of national statistical web sites providing database access is in the ESCAP region minimal, namely three.
DAM demand is driven primarily by the need for privilegeduser monitoring to address compliance-related audit findings, and by threat-management requirements to monitor database access.
This talk explores the ways attackers with no authorized database access can steal Postgres passwords, see database queries and results, and even intercept database sessions and return false data.
On Windows 95, the MKDE interface(a Windows dynamic link library(DLL) called WBTRV32.DLL) determines what database access method is in use via the configuration file.
Examine database access control settings and database application configuration settings to verify that user direct access to or queries of databases are restricted to database administrators.
Implementation of the physical layer may use database specific APIs oruse the underlying language standard database access technology and the database's version SQL.
The new information technology has made it possible to create intelligent and safe database access systems, too: Net-Hilmo and Theme-Net, directed primarily to producers and municipalities, but also to ordinary citizens, Sotka, a statistical database or"library", directed mainly to the municipalities.
URLs occur most commonly to reference web pages(https), butare also used for file transfer(ftp), email(mailto), database access(JDBC), and many other applications.
It considered that security was implemented,in practice, at multiple levels(Network access, database access, DMS access, application access, function within the application, secure internet access) and was ultimately controlled and documented via Help Desk Requests(HDRs), which were kept for archival purposes.
The Secretariat has established a Help Desk to handle any technical problemswhich might arise in the use, by Member States, of any of the United Nations database access facilities.
In practice, security was implemented at multiple levels such as network access, database access, application access, security functions within the applications and secure Internet access. .
Most Parties gathered much of their data through meetings and workshops, as well as in direct contact with individual stakeholders, including interviews, meetings, email communication,structured questionnaires and direct database access.
Specialized firewalls for databases help to identify attacks on the database andattempts to use database access rights for other purposes by tracking and classifying millions of SQL queries, as well as by detecting abnormal behaviour.
The Department continued its phased programme to redesign its statistical databases through its UNESIS project(United Nations Economic andSocial Information System) and to apply new technologies in electronic publishing and networking for database access and dissemination.
With regard to self-represented accused, the Detention Unit ensured that they were provided with additional storage and office space,computer and database access tailored to the detention environment, and the ability to conduct witness interviews, whether in person or via videoconference.
Increased number of combined visits by working groups of experts of the Executive Directorate and the 1267 and 1540 Committees,shared database access, analyses, reports, documentation and information.
Some features of PiSi include:Uses the LZMA compression algorithm Written in Python Package sources are written in XML and Python Database access implemented with Berkeley DB Integrates low-level and high-level package operations(dependency resolution) Framework approach to build applications and tools upon A community fork of the old Pardus with PiSi package management exists, called PiSi Linux.
It is sometimes a difficult task to identify which part of the system represents this critical path, and some test tools include(or can have add-ons that provide) instrumentation that runs on the server(agents)and reports transaction times, database access times, network overhead, and other server monitors, which can be analyzed together with the raw performance statistics.