发zhòngyīngguànyònglìgōu:
| - zhè xiē huā sàn fā chū xiāng wèi。
The flowers send forth fragrance. - fā chū xìn hào
To send out a signal. - shuí shì fā xìn rén?
Who is the sender? - yóu fā xìn rén fù kuǎn de yóu jì。
having the postage paid by the sender. - fā jiàn rén yù fù huí fù fèi yòng de。
with cost of reply prepaid by sender. - bào wén zhāi yào shì yòng fā sòng zhě de mì mì yàoshì jiā mì de。
The message digest is encrypted with sender's private key.- jiē shōu zhě yǔn xǔ fā sòng zhě jì xù fā sòng de yī zhǒng xiǎng yìng lèi xíng。
A type of response by a receiver that permits a sender to continue.- dāng fā sòng fāng hé jiē shōu fāng hù xiāng bù rèn shí shí, kě xìn dù zuì chéng wèn tí。
Authenticity becomes most problematic when the sender and recipient do not know each other.- bù guò jí shǐ miàn duì zhè yàng de yǐn yòu, shù yǐ bǎi wàn jì shēn 'ān jì suàn jī de diàn nǎo shǐ yòng zhě yě hěn kě néng jiāng qí kàn zuò shì cóng mǒu wèi bù zhī míng de fā sòng zhě fā lái de lā jī yóu jiàn 'ér bù yú lǐ cǎi。
Even with that come?on, millions of computer?savvy people would likely have ignored it as junk mail from an unknown sender.- cǐ wài, tā hái shuō, jīng lǐ yīnggāi jiǎn chá yòng yú ipsec de suàn fǎ yǐ jí tí gōng xiāo xī wán zhěng xìng hé fā sòng zhě rèn zhèng de cuò shī。
In addition, he says, managers should look at the algorithms used with IPsec and provisions for message integrity and sender authentication.- rú guǒ bào wén jiē shōu fāng yě néng kěn dìng gōng kāi mì yào shǔ yú zhèng què de fā sòng zhě, wén dàng yě néng bèi rèn wéi shì kě xìn de。
If the message recipient is also certain that the public key belongs to the right sender, the document can be considered authentic.- huí shēng dìng wèi fǎ yī zhǒng tōng guò xiān fā chū shēng yīn, rán hòu fēn xī bèi wù tǐ fǎn shè huí fā sòng zhě de shēng bō bìng jué dìng wù tǐ fāng wèi de fāng fǎ
A process for determining the location of objects by emitting sound waves and analyzing the waves reflected back to the sender by the object.- yóu yú yìng yòng chéng xù dài lǐ xū yào dài biǎo fā sòng zhě jìn xíng tōng xìn, suǒ yǐ tā xū yào dǒng dé yǔ tè dìng yìng yòng chéng xù xiāng lián de jù tǐ yǔ yán huò xié yì。
Since an application proxy needs to communicate on behalf of the sender, it needs to understand the specific language or protocols associated with a particular application.- rán hòu, jiē shōu jié diǎn jiù tōng zhī fā sòng fāng: yào qiú de dài kuān yǐ bèi fēn pèi、 duì shēng yīn、 shì pín huò shù jù de chuán shū kě yǐ kāi shǐ liǎo。
Then, the receiving node notifies the sender that the requested capacity has been allocated and the transmission -- voice, video or data -- can then begin.- jiē shōu zhě lì yòng fā sòng zhě de gōng kāi mì yào hé tā men zì jǐ de mì mì mì yào de jié hé, jiě kāi gāi bào wén de mì mì biān mǎ, bìng jiě mì zhī。
Receivers use a combination of the sender's public key and their own private encryption key to unlock the secret code for that message and decipher it.- bǎo mì xìng héng héng què bǎo zhǐ yòu fā sòng zhě hé yù qī de jiē shōu zhě néng gòu dú qǔ xiāo xī de nèi róng ( bǐ rú xìn yòng kǎ hào、 zhàng hào děng )
Privacy – ensure that only the sender and the intended recipient can read the contents of a message (such as credit card numbers, account numbers, etc)- ip wèi yú xià yī céng, zài osi de wǎng luò céng, jí dì sān céng, bǎ měi gè bāo de fā sòng zhě hé jiē shōu zhě dì zhǐ gào sù yī lù shàng gè gè lù yóu qì。
IP, located one layer down, at the OSI network layer, or Layer 3, communicates the addresses of each packet's sender and receiver to the routers along the way.- sè cǎi fāng 'àn hé zì tǐ xuǎn zé gěi yòng hù de xiāo xī zēng tiān liǎo gè xìng, zǔ zhǐ bù xiǎng jiē chù de rén de lái hán hé yǐ jù zhù tí hé fā sòng zhě xìn xī guò lǜ xiāo xī de néng lì dū fēi cháng yòu yòng。
Color schemes and font options add individuality to users' messages, and the ability to block unwanted contacts and to filter messages based on subject and sender information are quite useful.- rú guǒ fā sòng duān zhàn què dìng mùdì dì zhǐ bù zài běn dì, gāi bāo jiù bèi sòng dào dì yī tiào lù yóu qì, yī bān lái shuō, gāi lù yóu qì shì zài fù jìn de, bìng yǐ bèi yù xiān fēn pèijǐ fā sòng zhě。
If the sending endstation determines that the destination address is not local, the packet goes to a first-hop router, typically one that is close and has been preassigned to the sender.- xìn xī fā sòng fāng yòu zé rèn bǎo liú shì shí jì lù hé fā sòng xiáng qíng, yǐ bèi xiāng guān de gè fāng diào chá bìng kě zuò wéi bào gào yǐ jù。
It shall be the responsibility of the sender to retain records of the fact and circumstances of sending, which shall be available for inspection by affected parties and for reporting purposes.- jiē shōu jì suàn jī kě yǐ 'àn yǐ xià fāng fǎ jiǎn chá bào wén de wán zhěng xìng: shǒu xiān jì suàn tóng yī bào wén zhāi yào, rán hòu yòng fā sòng zhě de gōng kāi mì yào duì suí wén dàng yī qǐ fā sòng de bào wén zhāi yào jiě mì。
The receiving computer can check a message's integrity by first calculating the same message digest.Then it can use the sender's public key to decrypt the message digest sent along with the document.- shù zì bāo zhuāng qì zuì bèi rèn kě de xíng shì shì shù zì xìn fēng, zhè xiē dài mǎ zhù yào wán chéng diàn zǐ yóu jiàn de jiā mì, bǎ xiǎng dǎ kāi xìn fēng 'ér méi yòu zhèng què shù zì mì yào de rù qīn zhě dǎng zài wài miàn, shù zì xìn fēng zhù yào yóu tōng guò mì mǎ jiā mì huò ruǎn jiàn suàn fǎ jiā mì de dài mǎ zǔ chéng, yùn zài zhe néng zhèng què ràng jiē shōu fāng shí bié fā sòng fāng shēn fèn de shù zì qiān míng。
The most recognized form of digital wrappers are digital envelopes.Those pieces of code are the workhorses of e-mail encryption, locking out intruders who don't have the right digital key to open the envelope.The digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient.- · tōng huà chǔlǐ luó ji, fù zé guǎn lǐ tōng huà de jiàn lì、 jìn xíng hé jié shù yǐ jí jù tǐ zī yuán de fēn pèi hé shǐ yòng, rú dān shēng fā sòng qì hé jiē shōu qì。
·Call processing logic, which manages the set-up, progress and take-down of calls as well as the allocation and use of specific resources, such as tone senders and receivers.- fā sòng wú xiàn qǐng qiú
Sending a Wireless Request - fā bào qì diàn bào jī zhōng fā shè xìn hào de yí qì
A telegraphic sending instrument.- tā jiàn yì bǎ tōng zhī fā chū qù。
He suggested sending out circulars.- tóng shí xiàng suǒ yòu jiē shōu zhàn fā sòng xìn xī bāo de tōng xùn fāng shì。
Sending a packet to all destinations simultaneously.- shù mù zài chōu yá fā yè。
The trees are sending out new leaves. - tā zài fēn fā yī fèn jī jīn qǐng qiú。
he is sending around an appeal for funds.- duì xìn xī jìn xíng gé shì biān pái hé fā sòng de guò chéng。
The process of formatting and sending a message.- zhè tiáo chuán zhèng fā chū hū jiù xìn hào。
The ship is sending out an SOS signal.- qǐng gěi wǒ yī fèn fā diàn bào de biǎo gé hǎo má?
May I have a form for sending a cable?
|
|
|