查询词典 function key
- 与 function key 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
The software construction and hardware construction, the function, key technology and feature of this platform were discussed.
通过在自动售货机控制软件开发中的实际应用,说明了基于该模型的软件设计过程。
-
You will also see the corresponding function key.
你还可以看到相映的功能键。
-
"The present study suggests that progressive walking, simple strength training movements and stretching activities are effective at improving physical, emotional and social function, key symptoms and self-efficacy in women with fibromyalgia who are being actively treated with medication," the authors write.
"目前的研究表明,渐进式散步,简单的力量训练动作和伸展活动是有效改善体能,情绪和社会功能,主要症状及自我效能妇女与纤维肌痛,他们正在积极治疗与药物治疗,"研究报告的作者写的。
-
By the panel of "function" key, and click the "Select" button, select "Report", the content of print is still the all-black, according to copy when the first CIS scanner issued yellow green, that CIS is a good , which we can be sure of is the first record damage, the replacement of the recording head, the machine working properly, troubleshooting.
按面板上的"功能"键,再按"选择"键,选中"Report",打印出的内容仍为全黑,根据复印时扫描头CIS有黄绿光发出,说明CIS是好的,由此可肯定是记录头损坏,更换记录头后,机器工作正常,故障排除。
-
If you want to quit the game and return to menu screen push the right function key.
如果你想退出游戏,返回菜单画面推右功能键。
-
Logistics transports one of the main function key element being logistics , is main "third profit sources " wellhead.
物流运输是物流的主要功能要素之一,是"第三个利润源"的主要源泉。
-
Family is the cell of the society, with as marriage is the function key to making up family.
家庭是社会的细胞,婚姻则是维系家庭的核心。20世纪80年代以来,中国进行经济体制改革和对外开放,全球化浪潮把中国卷入了全球整体中,这使得中国社会生活、中国人的观念发生了深刻的变化。
-
Shunyi keyboard inherits the tradition and takes bold innovations. It is a product of first choice, which is protected by the patent. It has the features of less keys (83 keys), linear arrangement, reasonable layout, complete functions, concentrated function key arrangement, balanced left hand and right hand alternative use to realize fast blind typing and reduce mistyping to the most extend, small keyboard area, convenient carrying, wide application area, etc.
顺亿 键盘继承传统,大胆创新,是受专利保护的首选产品,具有键盘键粒少(83 个)、直线排列、布局合理、功能齐全;功能键集中,尽量均衡左右手交替使用,实现快速盲打,将误击率降至最低;键盘面积小、方便携带、使用范围广等特点。
-
According to password which establishes, uses two pressed keys realizations password the input function, after the password input is correct, locks opens, if inputs three passwords are not correct, locking presses a key 3 seconds, simultaneously discovered reports to the police the sound, after has not pressed a key presses down 3 kinds, only then opens the pressed key locking function; Otherwise still had the pressed key in 3 seconds to press down, relocked presses a key 3 seconds time and reports to the police
根据设定好的密码,采用二个按键实现密码的输入功能,当密码输入正确之后,锁就打开,如果输入的三次的密码不正确,就锁定按键3秒钟,同时发现报警声,直到没有按键按下3种后,才打开按键锁定功能;否则在3秒钟内仍有按键按下,就重新锁定按键3秒时间并报警
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力