查询词典 computer resource
- 与 computer resource 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
While library resource sharing is shifting to the new networking environment era, it is also in face of a lot of new challenges and"Access versus Assets"is becoming the new theme of the resource sharing in this new networking era, based on this point this thesis studies the development and the transformation of the resource sharing both in practice and in theory in the networking environment, particularly focus on a serial of issues, including the construction of resource sharing system, digital information resource, digital library, interlibrary loan, document delivery service and collection development etc. The writer also analyzes the coexsitence of the traditional resource sharing and modernizational resource sharing and the relationship between them in 21st, explores the revolutionary changes of resource sharing as the"Assets"model is driving to the"Access"model, discusses the development of specific collection for a single library and how to construct a seamless integrated information resource system in the networking environment, systematically studies and introduces the new organization model of resource sharing, especially emphases that document delivery is the key of the success in resource sharing, and finally tries to outline the main trends which will influence resource sharing.
本文立足于网络环境下资源共享的新主题:存取与拥有,研究和分析了网络环境下资源共享及其体系建设,包括电子信息资源、数字图书馆建设、馆际互借、文献传递服务、文献资源建设等几方面在理论和实践中的发展和变革;论述了21世纪初网络环境下传统型和现代型两种层次并存的资源共享;探讨了文献资源建设从"拥有"模式到"存取"模式的重大转变、特色馆藏建设和无缝一体的网络信息资源体系的建设途径;较为全面、系统地研究和介绍了网络环境下资源共享的新型组织模式的形成及其特点;强调了文献传递是实现资源共享的关键;并试图准确把握网络环境下资源共享研究和实践的发展趋势。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
Shanghai principle light software company Respective profession: Computer software Software test software engineer Mainly is engaged in the printer driver the test The Shanghai negotiable securities Times panoram network sponsor network starts off develops Respective profession: Computer software Does not have other The road develops the personnel Education experience Shanghai electrical machinery institute computer application technical college Programming language - familiar C, object-oriented language and so on programming C++, VB, java, assembly Computer network - computer network principle, website construction and maintenance Database - Access Computer application - computer assembly and service, construction of data The operating system - skilled grasps the Windows all operating system, has the certain foundation to Linux Charting - Auto CAD intermediate, PhotoShop, Flash, multimedia technical Authorware The science and technology manages the school computer application specialized middle school Computer network technology, computer composition principle, visible programming VB, Computer operation system, computer operation technology, homepage manufacture, network security, Computer system maintenance, microcomputer principle and assembly language, office automation and so on.
上海理光软件公司所属行业:计算机软件软件测试软件工程师主要从事打印机驱动程序的测试上海证券时报全景网络主办网上路演所属行业:计算机软件无其他路演人员教育经历上海电机学院计算机应用大专编程语言——熟悉C,面向对象程序设计C++、VB、java、汇编等语言计算机网络——计算机网络原理、网站建设与维护数据库——Access 计算机应用——计算机组装与维修、数据结构操作系统——熟练掌握Windows所有操作系统、对Linux有一定基础制图——Auto CAD中级、PhotoShop、Flash、多媒体技术Authorware科技管理学校计算机应用中专计算机网络技术,计算机组成原理,可视化程序设计VB,计算机操作系统,计算机操作技术,网页制作,网络安全,计算机系统维护,微机原理和汇编语言,办公自动化等等。
-
Based on this,the relationships among the five kinds of motive of strategic alliances forming were disussed firstly.Secondly,this paper discussed the qualification on resource with which companies could coalize,defining the concept of strategic resource, following the way of seeking for resource gap and combining the characteristics of resource.Thirdly,company resource were classified into property right-based resource and knowledge-based resource in terms of inimitable barrier and thus how the resource types of partner firms would determine their structural preferences in terms of four major categories of alliances was discussed.
首先,探讨了联盟形成的五种动机之间的关系;其次,在界定了战略性资源概念的基础上,遵循寻找资源缺口的思路和方法,结合企业资源的特征,探讨了企业进入联盟所需的资源条件;接着,在可模仿性壁垒概念的基础上,将企业资源分为基于产权的和基于知识的资源,并探讨了根据双方的资源类型如何在四种联盟结构中作出选择。
-
To be able to grasp more opportunities for sex crimes at the same time the relatively high use of three-station configuration, to operate a computer, here are divided into A Computer, B Computer and C computers, computer A computer-based operations, the main task is to buy and sell orders operations and holdings of individual stocks that have been tracked so that the best point and fled the country, late in the day or night, werewolves are the technical stock selection, with the potential to become a dark horse, or it is possible to start the second Stock elected, put into the C computer Optional Share Lane, B computer is a laptop, while wirelessly with a broadband connection, broadband and sometimes dropped to avoid or segment of electricity causes can not be traded, the general cases, the task of the computer B is always concerned about the A shares and Hong Kong stock market trend in broader market, in the opening period of time, C is Optional Share computer display, and interface options with the four shares of K-line column, and set to automatically turn the industry, so that If the C Optional Share computer technology, there are individual stocks will soon reach the selling points, werewolves can be found in the first time and simultaneously enter the code in the A computer, using keyboard shortcuts with the fastest speed for the next single!
为了能够把握更多的机会,狼人同时运用3台配置相对较高的电脑进行操作,这里分为A电脑、B电脑和C电脑,其中A电脑为主操作电脑,主要任务就是进行买卖下单操作和对已经持有的个股进行跟踪,以便在最佳点位出逃,在每天的盘后或者是晚上,狼人都会进行技术选股,把有可能成为黑马或者是有可能二次启动的股票选出,放入到C电脑的自选股里,B电脑是笔记本,同时以无线方式与宽带连接,避免了有时宽带掉线或者是段电的原因造成无法进行交易,一般情况下B电脑的任务是随时关注A股大盘和港股大盘走势,在开盘的时间内, C电脑显示为自选股,同时界面上选择4股K线同列,并设置为自动翻业,这样,如果在C电脑的自选股中有个股即将到达技术买点,狼人可以在第一时间发现并同时在A电脑中输入代码,使用键盘快捷方式以最快速度进行下单!
-
Other suggestions were made as followed:(1) Resource teachers should provide assessment service to regular students, and help handling students without the certificate of disability, but needed special attention;(2) Resource teachers should provide exceptional students more classes and coordinate with regular teachers in arranging class schedule;(3) When designing curriculum, resource teachers should consider students' abilities and the continuity of the curriculum;(4) Resource teachers should provide standard of scoring and students' scores to regular teachers, and also provide exceptional students supportive services during the exam;(5) Resource teachers should provide mainstreaming guideline for regular teachers and students, and also post-mainstreaming services as well;(6) Resource teachers should connect with regular teachers more often and actively to discuss the situation of the students, also provide assistance and counseling strategies to regular teachers when needed, in order to solve the problem of students with disabilities in regular classes;(7) Regular teachers felt positive regarding the services provided by resource teachers.
四、 开放性意见归纳如下:希望资源班教师为普通班学生进行鉴定服务,并服务未持有身心障碍手册的学生;能提供学生较多授课时数,排课时与导师或科任教师协调;依照学生能力设计课程,注意课程衔接问题;提供评分标准、学生成绩及考场支持服务;提供回归标准及回归学生的后续支持服务;主动与导师沟通,讨论学生状况,并能提供普通班教师适时协助及辅导策略,解决身心障碍学生在普通班的问题;普通班教师肯定资源班教师提供的支持服务。研究者根据研究结果提出建议,作为资源班教师、普通班教师、行政单位及未来研究之参考。
-
The proportion of rents that firms get depends on their network capability. This reveals the essential relationships between network resource, network rents and network capability: First of all, network rents come from the network resources. Furthermore, network rent is the representative of the competitive advantage and the value of the network resource. Second, network resource is the foundation of the network capability, the function of network capability is activated in the process of using network resource by firm. It enables the network resource to be a potential value resource of the competitive advantage. At last, network capability activates the network rents in the network resource, and make sure that the firm get the additional benefit;(4) the network capability can be classified as: network visioning capability, network constructing capability, network operating capability and network constructing capability. Some factors, such as maturity of IT, openness of culture, management system involved, experience of participation in network, have a positive effect on the network capability of the firm;(5) the impact of network capability on innovation performance is realized through knowledge transfer between network partners, namely, knowledge transfer is the mediator; and (6) the type of innovation network, exporation network or exploitation network, has moderator effect on the relationship of network capability and knowledge transfer, and network capability and innovation performance as well. In the exploration network, network constructing capability has more effect on the performance of the knowledge transfer and innovation. In the exploitation network, network operating capability has more effect on the performance of the knowledge transfer and innovation.
通过对创新网络环境下网络资源、网络租金和网络能力的概念界定和内涵分析,本研究辨析了三者之间以及它们与竞争优势之间的本质关系:首先,网络资源是网络租金的来源,而网络租金是企业竞争优势的表征,也是网络资源的价值体现;其次,网络资源是网络能力的基础,而网络能力在运用网络资源的过程中发挥其作用,实现了网络资源成为竞争优势源泉的内在价值;最后,网络能力激活了蕴涵在网络资源中的网络租金,并确定企业获得这种额外收益的份额,网络租金正是网络能力发挥作用的成果;(4)企业网络能力可以分成网络规划能力、网络配置能力、网络运作能力和网络占位能力四种,本研究的实证结果表明企业的IT成熟度、文化开放度、网络管理体系和网络活动经验都能够正向影响企业的网络能力水平,因而企业可以通过改善上述各种因素的水平来实现提升企业网络能力的水平;(5)企业网络能力对企业创新绩效的促进作用更多地是通过正向影响知识转移实现的,即知识转移在其中起到了中介作用;(6)创新网络的类型,即探索型创新网络和利用型创新网络,分别在网络配置能力和网络运作能力与知识转移之间的关系中,以及在网络配置能力和网络运作能力与创新绩效之间的关系中起到调节作用,在探索性创新网络中,企业的网络配置能力对提升企业获得的知识转移绩效和创新绩效更为重要;而在利用性创新网络中,企业的网络运作能力对提升企业获得的知识转移绩效和创新绩效更为重要。
-
Spyware is a kind of software that installed in computer user's computer, it installed by spyware user without computer user's consentment or although spyware user get computer user's consentment but the function of spyware is beyond the function which spyware user tell during the installment ,or use a fraud tell manner to tell the computer user, or force the spyware run , or dosen't offer computer user a method that can easily and fully uninstall all the module of the software ,and its function s are as follow: control、destroy computer software and hardware; force computer's behavior; scout computer user's behavior, steal or cheat computer user's private information.
间谍软件是指安装在用户计算机上的程序,此程序的安装未经用户的同意,或虽经用户的同意但超出了告知的功能范围,或采用欺诈的方式征得用户的同意,或者强行运行,或者不能简便地一次性彻底卸载所有功能模块;并且其具有如下功能:控制、破坏用户计算机软硬件;强制用户行为;监视用户行为、盗窃或以欺诈的形式骗取用户信息。
-
Concept; In 1989 GRiD Corporation promoted first section to havetouches the type screen then to take along the computer; In 1992,Microsoft has promoted "Windows for Pen", after but two years sufferthe elimination; In 1996 Palm developed the first section successapplication to touch the pen type computer; In 1997 Oracle joinedMicrosoft the ranks to start to study the dull technology; 2000 is oneof plate computer important turning points, Bill Gates starts by 2000,continuously at in two session of Comdex congress speech vigorouslyinitiates the plate computer; In 2002, in plate computer history amost important year, also is a year which most bustles about,This year in May, Gates brings 150 plates computers to attend theMicrosoft year CEO summit, meets in August, plate computer software isbeing open to the computer manufacturer, follows closely in November,the plate computer officially is going on the market, seven bigcomputers manufacturers develop this new product, in December theplate computer Chinese edition goes on the market.
概念;1989年GRiD公司推出第一款带有触摸式屏幕的便携电脑;1992年,微软推出了"Windows for Pen",但两年后遭淘汰;1996年Palm研制出第一款成功应用的触笔式电脑;1997年Oracle加入微软的行列开始研究平板技术;2000年是平板电脑的重要转折点之一,比尔盖茨由2000年开始,连续两届Comdex大会上的讲话中大力倡导平板电脑;2002年,平板电脑发展史上最重要的一年,也是最忙碌的一年,该年5月,盖茨带着150台平板电脑参加微软年度CEO峰会,接着8月份,平板电脑软件向电脑制造商开放,紧接着在11月份,平板电脑正式上市,七大电脑制造商开发这一新产品,12月平板电脑中文版上市。
-
The features of manufacture resource, the resource interface of manufacture grid, and grid resource management architectures are discussed. A GARA middleware model of manufacture grid resource management is given. The dynamic use of manufacture resource in the development of grid resource management systems is proposed.
论述了制造资源的特点,及其制造资源在制造网格上的接口规范技术,分析了网格资源管理的主要方法和动态使用网格资源的技术,根据制造资源共享的特点提出制造网格资源管理的GARA中间件模型,为制造资源的集成和动态共享技术研究提供了新的方向。
- 相关中文对照歌词
- Computer Age
- Computer Love
- My Computer
- CPU
- Cannibal Resource
- Long Way To Go
- Computer Cowboy
- Computer Assisted Design
- The Scientist
- The Summer Jam
- 推荐网络例句
-
In the days of sailing vessels the crew were afraid they would be becalmed on the ocean.
在使用帆船的时代,船员们担心他们会因为无风而无法在海洋上航行。
-
As long as foreign donors pay the PA's salary bill, few expect a new intifada.
只要外国继续为巴权力机构的薪水买单,希望发动新暴动的人便寥寥无几。
-
Speak with contempt of none,form slave to king,the meanest bee,and will use,a sting.
别用 言词贬低任何人,无论国王还是奴隶。最卑戝的蜜蜂也会用它的毒针蜇人。