查询词典 use a computer
- 与 use a computer 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Although it is the earliest-issued thesis on the study of computer radiation safety, people paid little attention. In 1983, a Swedish scientist published a pamphlet named Compromising Computer, in which the radiation leakage of computer was mentioned once again. In 1985, a Netherlandish scholar named Ike issued his study report on electromagnetic radiation from video display units of computers at the Third Conference on Computer Communication Safety Protection. At the same time he demonstrated how to use a black and white TV set to receive signals from a computer with radiation leakage.
这是最早发表的研究计算机辐射安全的论文,但当时没有引起人们的注意。1983年,瑞典的一位科学家发表了壹本名叫《泄密的计算机》的小册子,其中再次提到计算机的辐射泄漏问题。1985年,荷兰学者艾克在第三届计算机通信安全防护大会上,公开发表了他的有关计算机视频显示单元电磁辐射的研究报告,同时在现场作了用一台黑白电视机接收计算机辐射泄漏信号的演示。
-
Although it is the earliest-issued thesis on the study of computer radiation safety, people paid little attention. In 1983, a Swedish scientist published a pamphlet named Compromising Computer, in which the radiation leakage of computer was mentioned once again. In 1985, a Netherlandish scholar named Ike issued his study report on electromagnetic radiation from video display units of computers at the Third Conference on Computer Communication Safety Protection. At the same time he demonstrated how to use a black and white TV set to receive signals from a computer with radiation leakage.
这是最早发表的研究计算机辐射安全的论文,但当时没有引起人们的注意。1983年,瑞典的一位科学家发表了一本名叫《泄密的计算机》的小册子,其中再次提到计算机的辐射泄漏问题。1985年,荷兰学者艾克在第三届计算机通信安全防护大会上,公开发表了他的有关计算机视频显示单元电磁辐射的研究报告,同时在现场作了用一台黑白电视机接收计算机辐射泄漏信号的演示。
-
Although it is the earliest-issued thesis on the study of computer radiation safety, people paid little attention. In 1983, a Swedish scientist published a pamphlet named Compromising Computer, in which the radiation leakageof computer was mentioned once again. In 1985, a Netherlandish scholar named Ike issued his study report on electromagnetic radiation from video display units of computers at the Third Conference on Computer Communication Safety Protection. At the same time he demonstrated how to use a black and whiteTV set to receive signals from a computer with radiation leakage. His report caused a great reverberation in the world. From then on people began to treat this problem seriously.
这是最早发表的研究计算机辐射安全的论文,但当时没有引起人们的注意。1983年,瑞典的一位科学家发表了一本名叫《泄密的计算机》的小册子,其中再次提到计算机的辐射泄漏问题。1985年,荷兰学者艾克在第三届计算机通信安全防护大会上,公开发表了他的有关计算机视频显示单元电磁辐射的研究报告,同时在现场作了用一台黑白电视机接收计算机辐射泄漏信号的演示。
-
On the base of the advanced theories, research methods from home and abroad, intensive use of urban land on the connotation and extension have been defined, also the driving factors of intensive use land in Xinjiang have been analyzed. As the case of nineteen cities of the Xinjiang Uygur Autonomous Region, from the land input level, the extent of land use, land-use efficiency and land use in four areas of eco-environmental quality, the establishment of a level of intensive use of urban land evaluation system has been done in this ***. Using the methods of Principal component analysis, Spearman rank correlation coefficient and ArcGIS, calculate the principal city of the intensive use of urban land points between 2001-2006, the municipalities of urban Land Use Composite Index, build the three-dimensional display model of Intensive use level of urban land, then analyses the characteristics of spatial-temporal variance of the urban land intensively utilization. Finally, analysis propose measures and advices.
本文反在呼取海外外相闭实际和研讨方式的基本上,闭于城市土地集约当用的外涵及外延入行了界订,并闭于旧疆土地集约当用的驱动果荤入行了剖析,然后以旧疆19个从要城市为研讨区域,自土地投入火平、土地当用火平、土地当用效力和土地当用生态环境量量四个方里,树立了城市土地集约当用火平评价指本体解,采取从败开剖析法闭于旧疆2001—2006暮年城市土地集约当用火平入行了评价,盘算各从要市的城市土地集约当用得开,用秩相闭解数闭于所盘算出的各市的城市土地集约当用综开得开入行时光特征剖析;还帮ArcGIS软件,剖析旧疆城市土地集约当用火平的空间格局;自城市非工业己口、投入、产出取用地删加弹性三个方里剖析城市土地分体集约当用收铺趋背;最初降出了土地集约当用的闭于策建议。
-
China Computer Correspondence School was established in 1984, in 1987 the State Council Leading Group for Science and Technology approved to engage in a nationwide computer professional higher education institutions, the country developed a computer application more than 500,000 people, known as the "National flagship computer education ", on behalf of the State Education Department the authority of an independent computer certificate issued under the" country "brand name college.
中国计算机函授学院组建于1984年,1987年经国务院科技领导小组批准的一所面向全国从事计算机普及教育的高等专业院校,为国家培养了五十多万计算机应用人才,被誉为"全国电脑普及教育的旗舰",代表国家教育部门独立颁发计算机权威证书,属"国"字号品牌学院。
-
The computer aid animation is a high and new technique; it is the thing that combines the art and the computer graphics together. Accompanying with the high speed devolvement of computer hardware and graphic arithmetic , it synthesize the computer science, art, mathematics, physics with the knowledge of the other and related course, the computer aid animation make abundance sequence virtual real images on the screen.
计算机动画是计算机图形学和艺术相结合的产物,是伴随着计算机硬件和图形算法高速发展起来的一门高新技术,它综合利用了计算机科学、艺术、数学、物理学和其它相关学科的知识,在计算机上生成绚丽多彩的连续的虚拟真实画面。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
This paper introduces the development process of wastewater disposal,it's auto control system,the level of nowadays and several new techniques of China and foreign countries. The immanent structure,control rules,main features and design methods of auto control systems in wastewater disposal process are studied in this paper. Aiming at four typical parameters,such as temperature,dissolved oxygen,PH and the planes of water,the Distributed Control System is designed,composed by PC called epigyny computer and SCM 8098 called hypogyny computer,and some sensors,shift deliver utensils and related meet orifices of parameters gathering and figures communication. The idea and work processes of some program modules are also introduced here. The programs in epigyny computer include the program of mutual interface between operator and computer,figure disposal program and chart output program,which are exploited with Visual Basic 6.0. And the programs in hypogyny computer are composed by figure gathering program,the progr am of supervision and control of system,communication program and meet orifice program between assemble language and VB,which are designed with assemble language.
本文介绍了国内外污水处理及其自动控制系统的发展过程、当今水平和提高自动化程度的若干新技术;研究了污水处理自动控制系统的内在结构、控制规律、主要特点和设计方法;选取污水处理中的典型参数温度、溶解氧、PH值和液位等为控制对象,设计了以个人计算机为上位机、以8098单片机为下位机,并辅之以传感器、变送器及相关接口单元所构成的二级集散控制系统;介绍了几个主要程序模块的设计思路、工作过程,这些程序模块是:用高级语言Visual Basic6.0开发的上位机人机交互界面程序、数据处理和图表输出程序,用执行效率高的汇编语言开发的下位机数据采集与系统监控程序、上位机与下位机之间的数据通信程序,汇编语言与VB之间的转接程序,等等。
-
This paper introduces the development process of wastewater disposal,its auto control system,the level of nowadays and several new techniques of China and foreign countries. The immanent structure,control rules,main features and design methods of auto control systems in wastewater disposal process are studied in this paper. Aiming at four typical parameters,such as temperature,dissolved oxygen,PH and the planes of water,the Distributed Control System is designed,composed by PC called epigyny computer and SCM 8098 called hypogyny computer,and some sensors,shift deliver utensils and related meet orifices of parameters gathering and figures communication. The idea and work processes of some program modules are also introduced here. The programs in epigyny computer include the program of mutual interface between operator and computer,figure disposal program and chart output program,which are exploited with Visual Basic 6.0. And the programs in hypogyny computer are composed by figure gathering program,the program of supervision and control of system,communication program and meet orifice program between assemble language and VB,which are designed with assemble language.
本文介绍了国内外污水处理及其自动控制系统的发展过程、当今水平和提高自动化程度的若干新技术;研究了污水处理自动控制系统的内在结构、控制规律、主要特点和设计方法;选取污水处理中的典型参数温度、溶解氧、PH值和液位等为控制对象,设计了以个人计算机为上位机、以8098单片机为下位机,并辅之以传感器、变送器及相关接口单元所构成的二级集散控制系统;介绍了几个主要程序模块的设计思路、工作过程,这些程序模块是:用高级语言Visual Basic6.0开发的上位机人机交互界面程序、数据处理和图表输出程序,用执行效率高的汇编语言开发的下位机数据采集与系统监控程序、上位机与下位机之间的数据通信程序,汇编语言与VB之间的转接程序,等等。
-
Including TCSEC (Trusted Computer System Evaluation Criteria; commonly called the "Orange Book"), which is a standard for computer security issued by the US government; ITSEC(the Information Technology Security Evaluation Criteria), which is a standard for computer security that was issued by the Europe, CC, which is a world standard for computer security; GB 17859-1999, which classified criteria for security protection of Computer information system in China.
本文论述了计算机网络安全现状、评价现状,以及网络信息安全评估标准,包括美国可信计算机安全评价标准,欧洲的安全评价标准,国际通用准则(CC,等同GB 18336),我国计算机信息系统安全保护等级划分准则(GB 17859-1999)。
- 相关中文对照歌词
- Computer Age
- The Thrill Is Gone
- Computer Love
- My Computer
- CPU
- Use Me To Use You
- Long Way To Go
- Computer Cowboy
- Computer Assisted Design
- Use What I Got
- 推荐网络例句
-
You can do some assertiveness training.
你可以进行一些自信训练。
-
We were well on the path to making a rear-wheel-drive global platform," says Mays."
我们正致力于建立一个后轮驱动的平台,"Mays这样说道。"
-
F: I think the oval shape suits you well.
我觉得这副椭圆形的可能很适合你。