assign different [...] in different symbol sets [...] with different access rights
to configure different [...] for different purposes [...] different symbol name
some variables of different [...] to the requirements of different [...] of different security
which occur differently [...] different access rights [...] of different sizes. FUNCTION
different network [...] different security mode
of different objects