英语人>网络例句>信息技术的 相关的搜索结果
网络例句

信息技术的

与 信息技术的 相关的网络例句 [注:此内容来源于网络,仅供参考]

In chapter 1, the reason for choosing the topic, the condition of the course integration of information technology and criminological technology, the items restricting integration of information technology and criminological technology is introduced, the meaning and way of the study.

第三章强调了信息技术与刑事技术课程整合的内涵,提出了信息技术与刑事技术整合应遵循的理念和适用的整合模式。第四章是基于信息技术环境下刑事技术的教学策略的研究。

It is chief goal of Education Bureau in elementary and middle schools which set up Information Technology curriculum and integrates Information Technology curriculum with other curriculum At the same time, They are also very important and undivided elements of Information Technology education According to the schedule of Education Bureau, Information Technology curriculum prevail in the whole state Under the situation, the current research and teaching method can not meet the practical requirement.

在中小学全面开设信息技术必修课,加快信息技术教育与其他学科课程的整合,是教育部确立的当前中小学信息技术教育的首要目标,也是信息技术教育不可分割的两个组成部分。

The breakthrough and the shortcoming of the classified search engine as well as the characteristics and the unacceptability of the network search tools based on traditional classification are discussed.

三。在网络信息资源分类组织的应用技术方面提出了一些新见解,即改进基于分类法的网络检索工具的技术要求、运用现代分类技术促进网络检索工具进一步完善、超文本技术在网络信息资源分类组织中的合理应用以及密切关注其它信息组织技术的研究进展。

It is concluded the factors of affecting information technology outsourcing decision-making into three aspects: technologic, economic, and strategic, and in-depth analyses outsourcing gaps which include technology gap, efficiency gap and strategic gap, and proposed a three-stage information technology outsourcing model, and identified technology gap, efficiency gap and strategic gap which are in the model, and in detail introduced using VENN diagram to identify technologic gap, and applied Technology Acceptance Model to perceive Information technology outsourcing.

通过对目前影响信息技术外包决策因素的相关研究进行综合分析,确定了影响信息技术外包决策的主要因素,将其归纳为技术、效益和策略三个方面,并对技术、效益和策略因素的缺口即外包缺口进行定义及分类,在此基础上,提出了一个三阶段的信息技术外包决策模型,并对该模型中的技术缺口、效益缺口和策略缺口识别方法进行了研究,其中重点探讨了基于VENN图解法的技术缺口识别方法。

Objectives: Produce academic work Offer courses in the field of law and technology Foster interdisciplinary contacts with other faculties at Dalhousie and elsewhere Produce the Canadian Journal of Law and Technology, a peer-reviewed national online journal providing coverage of legal issues relating to information technology from a Canadian and international perspective Organize seminars and colloquia.

信息与技术研究机构的主要活动包括:创作学术作品,提供信息与技术方面的课程,培养跨学科之间的联系与合作,制作加拿大信息技术与法专刊,这个刊物是在线的,主要是以加拿大实际与国际视野相结合,提供与信息技术相关的法律问题的报道,组织学术会议和专题座谈会。

Communication;Communication systems;Communication technology;Construction;Data;Data exchange;Data processing;Data processing system;Definition;Definitions;Earth's surface;Encoding;Geodesy;Geographic information;Geographical;Geography;Geology;Geomatics;Geotechnics;Information;Information technology;Modelling;Reference materials;Reference model;Standardizations;Unified Modeling Language

中文标题地理信息。参考模型中文主题词通信;通信系统;通信技术;建筑;数据;数据交换;数据处理;数据处理系统;定义;地球表面;编码;大地测量学;地理信息;地理的;地理;地质学;地理信息学;土工学;信息;信息技术;建立模型;参考材料;参考模型;标准化;统一建模语言

The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.

该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。

In addition, many information technology-based instructional strategies applied in classroom teaching and decision-making factor in the design process related with this study are analyzed and discussed. Chapter Three is about application of teacher survey and classroom observation to testing and emending the analytical framework for the information technology-based instructional strategies for elementary and secondary schools.

第三章主要介绍了应用教师问卷调查、课堂教学视频观察检验、修订课堂教学信息技术应用策略的分析框架;并在此基础上开发研究工具——课堂教学信息技术应用策略观察量表与教师焦点访谈大纲为课堂教学信息技术应用策略研究做准备。

The government in Contemporary China has sieved, classified, analyzed and edited public information on this basis.

当代中国政府公共信息服务的物理性技术主要有计算机技术、网络技术、信息安全技术、数字图书馆技术和印刷技术等。

Be in brief reviewing after the concept of the bag outside IT, driving force and lifecycle, gave out the risk management frame of the bag outside IT, element of risk of the bag outside putting forward an IT that is based on lifecycle next analyses frame, emphasize the main risk element that activity of the bag outside analysing IT may encounter in whole lifecycle.

在简要回顾信息技术外包的概念、驱动力和生命周期后,给出了信息技术外包的风险治理框架,然后提出了一个基于生命周期的信息技术外包风险因素分析框架,并着重分析了信息技术外包活动整个生命周期中可能碰到的主要风险因素。

第48/100页 首页 < ... 44 45 46 47 48 49 50 51 52 ... > 尾页
推荐网络例句

For a big chunk of credit-card losses; the number of filings (and thus charge-off rates) would be rising again, whether

年美国个人破产法的一个改动使得破产登记急速下降,而后引起了信用卡大规模的亏损。

Eph. 4:23 And that you be renewed in the spirit of your mind

弗四23 而在你们心思的灵里得以更新

Lao Qiu is the Chairman of China Qiuyang Translation Group and the head master of the Confucius School. He has committed himself to the research and promotion of the classics of China.

老秋先生为中国秋阳翻译集团的董事长和孔子商学院的院长,致力于国学的研究和推广。