1. Get the ID number of the lost pet. 获取丢失宠物的ID号码。
2. Now, if we try to sneak in a new employee's computer with an invalid network ID, our application knows not to accept it. 现在,如果我们试图用一个无效的网络ID潜入新员工的计算机,我们的应用程序不会允许。
3. This RA can register users and manage certificate requests without having direct access to the certifier ID and password. 这个 RA 可以注册用户并管理证书请求,而不需要直接访问证明者 ID 和口令。
4. The system login uses information such as source ID (SID), domain and system user name for authentication, so it is considered secure. 系统登录会使用到诸如源 ID(安全识别符),域和系统用户名等信息进行身份验证,因此被认为是安全的。