网站首页  体育百科  体育词典  卡路里查询

请输入您要查询的词汇:

 

词汇 example_english_login
语种 英语、汉语、英汉翻译、汉英翻译
释义

Examples of login


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Each team receives unique login credentials, where solutions can be submitted and feedback received.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The message text was the word login; the l and the o letters were transmitted, but the system then crashed.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There are pre-setup login servers, or the play server's operators can opt to set up their own login server.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
When this event is detected, the kernel starts the trusted login processing.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Their already given answers will be saved and recalled when they login the next time.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Entrance is themeable, and is capable of launching different desktop environments from a list, as well as remembering users for auto-login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Afterwards, this combination is checked against an existing login-password validity record to check if the combination is authentic.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Pages typically prevented from being crawled include login specific pages such as shopping carts and user-specific content such as search results from internal searches.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A link allows users to login to ezboard.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Reviewers login to the server to view and interact with simulations.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The customer's login credentials may be stored in a database, and the web server accesses the database server as a client.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users, on login, are provided with a list of courses that matches their subscription level.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users can pick their session type on a per-login basis.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Similarly, the secure shell remote login program checks digital certificates at endpoints (if known) before proceeding with the session.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Investigators have blank entries for one specific login, leading to speculation that evidence has been deleted.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Note that users need not be able to login to a system or application.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A startup application manager was included in this release, allowing users to control which programs start at login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The experience and social class remain as advanced as they were when your last time login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Adaptive risk authentication determines, based on risk scoring, whether more information from a user is required when they login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Sites using social login in this manner typically offer social features such as commenting, sharing, reactions and gamification.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The message text was the word "login"; the "l" and the "o" letters were transmitted, but the system then crashed.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A startup application manager allows users to prevent applications from launching at login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
On each "virtual terminal", a getty process is run, which in turn runs "/bin/login" to authenticate a user.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The new release claimed to be faster and include a new login screen.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Additionally, a user can jump to other prioritized content such as login, search or forms.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Note that in the case of the common login prompt one sees when using telnet to access another computer system, the former general notion applies.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A victim who is lured to a fraudulent website then triggers the attack by entering the normal login credentials on the counterfeit website.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Login system has important security dimension by increasing the chance of organizer to prevent or discover attempts of frauds by decreased game speed too.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Cyber-security measures include firewalls, anti-virus software, intrusion detection and prevention systems, encryption and login passwords.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Many operating systems provide a mechanism to store and retrieve passwords by using the user's login password to unlock an encrypted password database.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Without it, anyone with network access and the right tools can monitor email and obtain login passwords.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The site administrator can adjust custom field support, user login, comments, search and other features.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Only few dozen government services have adopted it, and only one bank adopted it as login card to their netbank.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
While social login can be extended to corporate websites, the majority of social networks and consumer-based identity providers allow.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Instead, it prompts the user for their login name and password at the financial institution or permits the data to be entered by hand.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
If only registered (logged in) users can edit, the button should bring to the register/login form.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Such functionality includes social login, sharing, commenting, activity feeds, social identity storage, gamification and others.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Once the number is recognized, the account is temporarily activated for login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users must always be suspicious of login prompts that are displayed, without having pressed this key combination.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There is no login and no identity check.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A welcome screen displayed to users upon connecting to the network allows public sector staff to login, and access the internet at 1mb per second.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Finally, a set of pre-defined permissions and restrictions for that particular login name is assigned to this user, which completes the final step, authorization.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
On login, users define themselves as students or professionals.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There was no requirement for login or registration.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The service in social networks and videocommunities is free to use and requires no login or registration.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The utmp file keeps track of the current login state of each user.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Difference between deadlines of classical event and login event is, that classical event's deadline defines last moment, when predefined files may be submitted.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users should be instructed to report login prompts that appear without having pressed this secure attention sequence.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
One way this was accomplished was by having the user type a standard command such as login immediately after connecting.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Since its founding, it has published a technical journal entitled "; login:".
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
If the player gets disconnected, he/she then has 10 minutes to login before the system is reset.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
During the installation process the user login can be blocked for integrity reasons.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Tickets are earned for a variety of activities, such as when places are visited, as a daily login bonus, or for item sales including clothing.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Login sends out a precautionary message to internet users.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Various account types exist in the domain, the most basic is the guest or anonymous login account.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Their online-banking website uses the "identify" mode for login verification and the "sign" mode for transaction verification.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
An untrusted web application authenticates the end user against a trusted authentication server via a trusted login server.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The system linked the wiki login to the social network login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
To edit information on a certain social networking service account, the social networking sites require you to login or provide a password.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users must have an account and login to see the site.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Login names and passwords associated with the registered finger prints are stored in a database located in the user's computer.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Users must login to their website to download all formatted versions of the text.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The database can be searched online without login through a web frontend on the website.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Remote login handlers such as ssh and telnet servers play the same role but communicate with a remote user instead of a local one.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Even when altered, many are guessed quickly through dictionary attacks, since most consumer grade routers don't introduce timing penalties for incorrect login attempts.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Members looking for accommodation can search for hosts using several parameters such as age, location, gender and last login.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Usually, these scripts then present the user with a way to authenticate and thus login into the system.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
When users try to log in, the fake login program can then capture user passwords for later use.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The standard server stores user passwords and login information using a secure database that is managed internally by the company.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Once a recipient's application is approved and funding in place, he/she is provided a personalized login to order the medical supplies for their 40-foot shipping container.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
New applications are easily integrated and there is an extensive range of ready to use web applications that businesses are able to access upon their first login to the system.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The systems were automated; webmasters could sign up to the system online, and users accessing the websites would go through the payment or login system before being granted access.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Test data, such as a user login id and password values that were typed in by the user during the test, are stored in a spreadsheet like datapool.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The first line supports looking up the user by their login name and the second two allow it to look up information by the user's uid.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The btmp file records failed login attempts.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There is one of these per user; if a user has a roaming profile, then this file will be copied to and from a server at logout and login respectively.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
They must be defined before use, so it is common for many logical names to be defined in the system startup command file, as well as user login command files.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
If the domain login is successful, the roaming profile is copied from the central file server to the desktop computer, and a local account is created for the user.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
At that point, the network provided remote login, remote batch and file transfer user application services.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A further advantage is the fact that the administrator of the study can set an arbitrary time frame in which participants have to login and take part in the questionnaire.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Account registration and login were required.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
There is multilevel access and login options.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
随便看

 

体育网英语在线翻译词典收录了466383条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2002-2024 oscfc.com All Rights Reserved
更新时间:2025/12/16 2:06:01