英语人>网络例句>software 相关的网络例句
software相关的网络例句

查询词典 software

与 software 相关的网络例句 [注:此内容来源于网络,仅供参考]

The system MCU to the C language software design, an increase of the readability and portability procedures, in order to facilitate the expansion and changes, the software design is modular structure, so that the logic of relations between the design process more concise.

帮帮忙。非常急,帮忙翻译一段中译英?本系统以单片机的C语言进行软件设计,增加了程序的可读性和可移植性,为了便于扩展和更改,软件的设计采用模块化结构,使程序设计的逻辑关系更加简洁明了。

Here are some trouble in the design of electric industrial remote monitoring system, such as the rapid rising of software cost, high complexity, without a logic system for the product; the reason is: in the developing process, requirement is not clear; lack of methods and tools; the expanding of software scale; the enhance of complexity.

这主要是因为:在软件开发过程中,用户需求不明确;缺乏有力的方法学和工具方面的支持;随着软件应用范围的扩大,软件规模愈来愈大;其复杂性也在急剧地增加。

OBJECTIVE The similar formulas were deduced that samples and standards were normal distribution and lognormal distribution.The software was programmed through VB software.

目的研究了样品、标准品的数据均符合正态分布、对数正态分布时的数理相似度计算公式并通过VB编程予以实现。

Long-day business and finance and foreign hotel management companiesto establish a long-term close cooperation in the management consultancy, catering to more than 1,000 managers who wisdom into day-long financial business management software for up to 10,000 restaurants and entertainment service providing an effective management solution to help create a large numberof enterprise-class brands, Enterprise Information Management leads the restaurant, and entertainment development process.Add: Rm612 South Building B Tiancai Software Building , Huayuan New technology industry park, Tianjin

天财商龙与国内外知名的酒店管理公司建立了长期的紧密的顾问合作管理,将千余位餐饮管理者的智慧结晶融入天财商龙的管理软件,为上万家餐饮娱乐服务型企业提供行之有效的管理解决方案,帮助众多企业打造了一流的品牌,引领着餐饮娱乐企业信息化管理发展的进程。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

PVC Card - Business card printing 】If the computer is a fangzheng system of typesetting software, can be very simple to solve the problem of Chinese phonetic alphabet, but if you PC or Mac machines pageMaker software are in trouble, now provides an introduction to the manufacturing process: the case of a PC, first select the 区位码 input method, open the soft keyboard and click the right mouse button to eject a series of Arrange menu, select "" pinyinhome, in which case the menu appears on the soft keyboard such as iūǖā Osaka macron, and so on, the initial consonant of the four pinyinhome to enter the double-click its initials to PageMaker.

如果电脑是耿介编制的排版软件,能很单一不天处置汉语拼音题目,而如果在PC或Mac机的pageMaker软件洋则是较便当的事,不隐简略引见其制作历程:如是PC机,首不后拔取区位码不输入法,敞开软键盘并点击鼠标右键,弹出一系列摆列菜单,拔取"拼音"菜单,这时软键盘上出不隐如āōēiūǖ等不韵母的四声拼音,双击其不韵母即可不输入到PageMaker洋。

Terra Vista software and Creator software are used to madding the terrain and buildings.

应用地形自动建模软件Terra Vista和地物建模软件Creator,完成了大范围地形地物数据的建模。

By this control system and the software, we achieved the AFM image of CD-R substrate. The meliorative AFM control system and the software can be used to test the distribution of the magnetic domain on samples.

实验得到了CD盘基的图像,由于AD/DA卡的分辨率限制,改进的原子力显微镜系统的分辨率不高,但是对于基于AD/DA卡控制系统的原子力显微镜的实验是一个很好的尝试,为改进此针尖扫描式原子力显微镜使其能检测样品的磁畴打下了基础。

This System enables one to four persons to work simultaneously and input and output conveniently many kinds of data and images Corresponding to the four hardware subsystems, its software is composed of four software packages: magnetic tape recorder data collecting package, image displaying package thematic mapping package and remote sensing image applied processing package.

它的硬件部分以四台微机为主,采用分布式联接,组成四个子系统,可供1—4人同时操作,能方便地输入输出多种数据和图像。该系统的软件部分,由对应硬件子系统的四个软件包组成,即磁带机数据采集软件包,图像显示软件包,专题制图软件包及遥感应用处理软件包。

This article detailed introduction system each hardware performance and function, as well as software design mentality and main software module flow chart.

本文详细的介绍了系统各个硬件的性能和作用,以及软件设计思路和主要软件模块的流程图。

第74/100页 首页 < ... 70 71 72 73 74 75 76 77 78 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。