数据完整性

shù jù wán zhěnɡ xìnɡ
  • data integrity
数据完整性数据完整性
  1. 移动agent系统中的数据完整性分析

    Data Integrity Analysis of a Mobile Agent System

  2. SqlServer数据库系统中的数据完整性控制方法

    The Method of Data Integrity Control in SQL Server Database System

  3. ACCESS中数据完整性的实现

    Implement of Data 's Integrity in ACCESS

  4. 基于SqlServer触发器的数据完整性应用

    Application of Data Integrity Based on SQL Server Trigger

  5. 对于非原子Web流还是强烈推荐使用乐观锁来保护每个用户操作的数据完整性。

    Optimistic locking is still highly recommended for non-atomic Web flows to protect the data integrity of each user action .

  6. 这种做法的目的在于保持数据完整性(如果State值发生了变化,City值很可能不再有效)。

    This is done to preserve data integrity ( if the State value is change , the City value likely won 't be valid ) .

  7. 本文探讨了VISUALFOXPRO的数据完整性机制及其应用。

    This paper inquires about data completeness mechanism and application of Visual FoxPro .

  8. EnterpriseReplication的改进简化了管理、提高了数据完整性,并允许进行其他SQL操作。

    The Enterprise Replication enhancements ease administration , improve data integrity , and allow additional SQL operations .

  9. 电厂MIS系统环境下的数据完整性

    Data integrity on power plant MIS

  10. 日志分析是DB2RecoveryExpert的一个强大组件,可帮助您在保持数据完整性的情况下维护高可用性和完全控制。

    Log analysis is a powerful component of DB2 Recovery Expert that helps you maintain high availability and complete control over data integrity .

  11. 在本文中涉及的安全性的三个需求包括:(a)验证(authentication)、(b)数据完整性(dataintegrity)和(c)数据机密性(dataconfidentiality)。

    The security triad covered in this article comprises : ( a ) authentication ,( b ) data integrity , and ( c ) data confidentiality .

  12. ORACLE系统数据完整性控制的方法及其实现策略分析

    The Analysis of the Approach to Data Integrity Control and Its Implementation Strategies in Oracle Database System

  13. 基于VFP之DBMS数据完整性分析与应用

    The Analysis and Applications Base on DBMS Data Integrality of VFP

  14. 如果定义包含数据库引擎因其无法再保证数据完整性的表达式,则可禁用check约束。

    A check constraint may be disabled if the definition contains an expression for which the database engine can no longer guarantee the integrity of the data .

  15. 触发器是DBMS中提供的一种用来维护数据完整性的机制。

    The trigger is a mechanism offered by DBMS to keep the integrity of data .

  16. IPSec协议无缝地为IP引入安全特性,同时提供了身份验证、数据完整性、机密性和抗攻击性。

    IPSec protocols " seamless " introduce of security features for IP , while providing authentication , data integrity , confidentiality and anti-aggressive .

  17. 通过修改隔离级别,J2EE开发人员或部署人员可以在性能的约束下平衡数据完整性,从而对应用程序进行调整。

    By changing the isolation level , the J2EE developer or deployer can balance data integrity against performance constraints to performance tune the application .

  18. WAP中WTLS层数据完整性的实现

    HASH Function Implementation of the Integrity of Data in WAP 's WTLS

  19. 研究了数据库技术及其发展情况,根据ACCESS数据库的特点,选用了适合本系统的开发软件,探讨了ACCESS环境下的数据完整性的保护及建立安全的ACCESS数据库的问题。

    Database technology and its development are studied . According to its characteristics , the system selects ACCESS as the development tool . The data completeness and database safety technologies in ACCESS are also discussed .

  20. 浅析VFP的数据完整性

    An analysis of VFP data integrity

  21. 而函数依赖对于数据完整性、查询优化和数据集成等都具有非常重要的作用,对XML函数依赖的研究是进行XML数据库技术中其他相关研究的基础。

    The Functional dependency plays an important role in data integrity , query performance and data completion . Research of the XML Functional dependency is the foundation for other XML database technologies .

  22. 触发器是SqlServer为应用程序开发人员提供的一种保证数据库中数据完整性的方法,它是一种特殊的存储过程。

    Trigger is a kind of method that SQL server provides for application developer to assurance database in the data integrity , it is a kind of special stored procedure .

  23. Hash函数是密码学一个重要组成部分,主要应用于数字签名、数据完整性校验和身份认证等领域中。

    Hash function is an important part of Cryptography , it is widely used in digital signatures , data integrity detection and authentication .

  24. DB2既可阻止此类操作被执行,也尝试以这种保护数据完整性的方式执行这些操作。

    DB2 can either prevent such operations from being performed , or it can attempt to perform these actions in a way that will safeguard data integrity .

  25. IPSec作为一种实施于网络层(IP)的安全协议,具有抗攻击、保护数据完整性、保护数据机密性和完美向前保密的诸多特性。

    Of the TCP / IP model , IPSec has the advantages such as anti-attack , identity authorization , data integrity and confidentiality and perfect forward security .

  26. 数据完整性我们的MySQL数据库表格基于非事务性MyISAM引擎。

    Data integrity Our MySQL database tables were based on the non-transactional MyISAM engine .

  27. 使用一个RI约束的主要原因是,确保当一个表引用另一个表时数据完整性得到维护。

    The primary reason for using an RI constraint is to ensure that data integrity is maintained whenever one table references another .

  28. 现有的多级安全系统一般采用BellLapadula(BLP)模型,但是BLP模型的“向下读,向上写”的访问规则严重影响了系统的可用性、灵活性,破坏了数据完整性。

    Most of current multilevel secure systems adopted Bell LaPadula ( BLP ) Model .

  29. 除非有着足够的数据完整性和私密性保护措施(如TLS或IPSEC),否则不应使用简单认证。

    Simple authentication should not be used unless adequate data integrity and confidentiality protections are in place ( e.g.TLS or IPSEC ) .

  30. 因为在本质上不具有内在的ACID性质,所以MyISAM存储引擎的备份和恢复可以用来执行版本级恢复,但是不保证数据完整性。

    Though inherently non-ACID by nature , MyISAM storage engine backup and recovery can be exercised to the level of version recovery without the data integrity promise .