英语人>网络例句>系统文件 相关的搜索结果
网络例句

系统文件

与 系统文件 相关的网络例句 [注:此内容来源于网络,仅供参考]

Start and shut down your computer when the system always prompts:"Saving System Settings", mainly because of the system after the document is loaded too much, resulting in a short period of time the system is running too many documents could not be suspended, we can use "Ctrl + Alt + Del" keys out of "Windows Task Manager", click "process" can view the currently running file.

启动和关闭计算机时系统总是提示:"正在保存系统设置",这主要是因为系统运行后加载的文件太多了,导致系统在短时间内运行太多的文件而不能中止,我们可以用"Ctrl+Alt+Del"键调出"Windows任务管理器",单击"进程"就可以查看当前运行的文件。

In a distributed computer system, an automated document annotation system and method adds hypertext cross-references to a set of known information sources into documents requested by a client computer in such a way that the merged document is displayable by existing Web browsers. The distributed computer network incorporates a plurality of servers to store documents. Each stored document has a unique document identifier and is viewable from a client computer having a browser configured to request and receive documents over the network. An annotation proxy, which is a software procedure configured to merge a requested document from a first server with hypertext links to documents containing associated supplemental information.

一自动化的文件注释系统和方法,将一组已知信息源的超级文本交叉参考加到由客户计算机请求的文件中,以使现存的Web浏览器显示该合并文件,该分布式计算机网络含有许多用于存储文件的服备器,每个存储的文件具有一唯一文件标识符并且可从具有一浏览器的客户计算机上观看,其中的浏览器用于在整个网络范围内请求和接收文件,一个注释代理是一软件过程,用于将来自第一服务器的一被请求文件与对含有相关增补信息的文件的超级文本链接合并。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

However, the performance of conventional network file system or distributed file system is limited by the low usage of the file system cache and can not meet the application demand.

现有的网络文件系统或分布式文件系统已无法满足应用需求,因此需要对进一步提高机群文件系统性能的技术进行深入研究。

In fact, NT system architecture (refer to Windows NT/2000/XP/2003) for each user of the system to establish their own recycle bin files, if file system partition is NTFS, will be kept in the "Recycler" the document folder, respectively, to each user's SID (user security identifiers, used to represent users, any two users of the identifier is different) the name of the Recycle Bin so that a similar "S-1-5-21-559421022 -1101046446-1443909855-1003 "This kind of name.

实际上,NT架构的系统(指Windows NT/2000/XP/2003)会为系统中的每个用户建立各自的回收站文件,如果分区文件系统是NTFS,则会保存在"Recycler"这个文件夹中,分别以每个用户的SID(用户安全标识符,用来代表用户,任何两个用户的标识符都不一样)做回收站的名字,就是类似"S-1-5-21-559421022-1101046446-1443909855-1003"这样的名字。

NFS goes to great lengths to make sure file handles are unique; it adds generation numbers for inodes and a file system ID to the filehandle in addition to the inode number.

网络文件系统花尽心思以确保文件标签file handle是独一无二;它为资讯编码inode添加每代的号码;此外,文件标签除了资讯编号外,还加上文件系统身份号ID。

The contents andcontributions of this dissertation are as follows:(1) Research on service capacity of BitTorrent-like P2P file sharing systems:the filedistribution performance of BitTorrent-like systems is analyzed through an architecturemodel based on parallel treen, also the file availability and effectiveness of file sharing inBitTorrent-like systems is studied. Moreover, an optimized neighbor selection strategy isproposed in this dissertation.

本文的主要研究内容和贡献如下:(1)BitTorrent对等网文件共享系统服务能力的研究:利用n叉树的结构模型分析了BitTorrent系统的文件分布性能,进一步研究了BitTorrent系统的文件可获得性和文件共享效力,并提出了一个优化的邻居结点选择策略。

For the coherence in metadata, a serverless architecture model based on all the data and metadata is adopted because they can be storaged in all place and can be dynamicly transferred; The associative mode of the disc metadata's journal structure and the memory metadata's journal structure can turn away the timing waste in scanning the enormous file system by fsck; Afterwards a intercalating checkpoint algorithm and a rollback recovery algorithm based on the metadata fault tolerance in cluster file system is implemented; A fetched stochastic process model is setup to analyze availability of this system, it can reduce the inspecting fault time and then they support high availability.

为了达到复杂的元数据管理一致性,采用了一个无集中式服务器的体系结构,保证所有的数据和元数据能够存放到系统的任意地方,并且在操作的过程中可以动态迁移;采用元数据的磁盘日志结构和内存日志结构相结合的方式对元数据进行管理,减少了fsck对庞大的文件系统中元数据的扫描时间;为了实现故障恢复,提出了元数据容错的设置检查点算法和回卷恢复的算法,提高了文件系统元数据服务的可用性;给出了基于元数据故障的随机过程模型,可以通过减少检错时间提高文件系统的可用度。

Windows encryption can collate documents and compressed file can be automatically analyzed disk file system, regardless of disk file system is FAT16 or NTFS format can be safe, fast and finishing under optimal performance, or may choose to complete only finishing finishing usable space, and maintain the continuous disk file, speed up file access efficient, finishing disk scheduling function can set the timetable for finishing disk, a time may help you to do automatic disk maintenance.

能整理Windows 加密文件和压缩的文件,可自动分析磁盘文件系统,无论磁盘文件系统是 FAT16 或 NTFS 格式皆可安全、快速和最佳效能状态下整理,可选择完整整理或仅整理可用空间,保持磁盘文件的连续,加快文件存取效率,有排程整理磁盘功能,可以设定整理磁盘的时间表,时间一到即可帮你自动做磁盘维护工作。

This research program "network application system of digital map ." serving as a segment of the main program "the digital map making system map maker", which is a research subject of the general section of weapon and equipments, is based on the thoughts of software engineering, and after systematically analyzed and designed by the means of UML( unify to set up the mold language), linked with C++ in general use, are able to directly converts the map data in DXF form into data in unified and open SVG form( the flexible form that can be updated), and realizes to view and interact SVG document accordingly via the JavaScript foot script language on the web page.

本课题作为总装预研项目&全数字地图制图系统Map Maker&的一个组成部分,即数字地图网络应用子系统,它根据软件工程的思想,经UML进行系统分析和设计后,通过C++通用接口,将存储为DXF格式的地图数据文件直接地转换为统一、开放的SVG格式文件(即可升级的矢量图形格式文件),并且利用JavaScript脚本语言在网页上实现了对SVG文件的浏览和交互操作。

第8/100页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.

每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。

Maybe they'll disappear into a pothole.

也许他们将在壶穴里消失

But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.

但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。