系统文件
- 与 系统文件 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This paper discusses the definition of computer auditing, and expounds the pressingness,the tentative idea and the feasibility study of computer auditing in shipbuilding enterprises. That computer auditing is composed of the general control auditing, application control auditing, system development auditing and application program auditing of the computerized information systems, the coincidence test of internal systems, as well as the substantiality test of data files.
通过对电算化审计概念的讨论,阐述了开展船舶行业电算化审计工作的迫切性,提出了船舶行业电算化审计的构想,它包括:电算化信息系统的一般控制审计、应用控制审计、开发审计和应用程序测试,以及内部系统的符合性测试和数据文件的实质性测试等,最后对开展电算化审计工作进行了可行性研究。
-
The simulation experiment and practical system show that our reputation system can control the pollution prolification effectively at a low cost.And it can punish the free-riding behavior,and cope with various attack situations.
通过仿真实验和实际系统验证,该信誉系统以较低开销有效抑制了污染文件在网络中的传播,并且能够惩罚搭便车行为,应对各种攻击情形。
-
In the part of system migration and driver development, the Windows CEs architecture and driver model is deeply studied. Then the driver model of Micro-Control Unit, keyboard, radio is designed and the rull of communication between the PXA255and Micro-Control Unit is defined.
在系统移植与驱动开发部分,着重研究了其系统架构和驱动模型,并在此基础上设计了微控制器、收音机和键盘的驱动模型,定义了微控制器与核心处理器之间的通讯规则,配置了Windows CE的相关文件及环境变量。
-
Program module of the system cons ists of file service module,parameter setup module,adjustin g module,in-situ data acquisition module,data processing module,help mod ule and so on.
系统的功能模块主要包括:文件服务模块、测试设置模块、系统调整模块、实时采集模块、数据处理模块、帮助模块等几个部分。
-
There are a couple of problems with this method: first, if one of those files (usually filled with random gibberish so as to make them "unguessable") is damaged it can render the whole system useless until a restore operation is performed and how often do YOU backup your system?
这种方式下有许多问题:首先,一旦这些文件之一(通常填充以随机的无用信息以使得它们&不可推测&)被损坏,会致使整个系统不可用,直到执行了恢复操作(而你每多长时间备份你的系统呢?)。
-
For the former, we can continue to use the Windows System Encrypting File System.
对于前者,大家可以在Windows系统中持续使用加密文件系统。
-
That's why it's wise to let the system automatically detect the filesystem type of media such as floppies and cdroms.
这是为什么要让系统自动检测像CD-ROM和软盘等介质的文件系统。
-
To prevent such an outbreak from happening, it is imperative that administrators refrain from logging onto a suspect machine using their own accounts. Logging on using the workstation's local administrator account can also have the same effect; most corporate workstations are ghosted from the same image and could have the same local admin account and password.
要防止此类病毒爆发事件的发生,紧急的办法是不要实用管理员自己的用户名和密码登陆系统,用工作站的本地管理员用户一样也会有此类事件发生,很多的工作站的系统都是通过同一个镜像文件并利用ghost方式进行的安装,因此用户名和密码相同也是肯定的
-
Cutwail slips into your system via a file-sharing network, then nestles into your system using root kit techniques.
Cutwail滑入您的系统通过文件共享网络,然后到您的系统内,使用根工具包的技术。
-
Interesting that your computer anti-virus software also does the same thing when it can't eliminate a virus from the system, it "quarantines" it away so it does not damage the operating system or other critical files.
有趣的是,你的电脑防病毒软件也同样的事情时,它并不能消除病毒从系统中,它的&隔离&,它距离,因此不会破坏作业系统或其他重要文件。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。