英语人>网络例句>计算机 相关的搜索结果
网络例句

计算机

与 计算机 相关的网络例句 [注:此内容来源于网络,仅供参考]

Nouns can be divided into common noun(for example "汽车"、"计算机"、"老师"、"字典"and so on), proper noun( for example"中国"、"毛泽东"、"《子夜》"and so on), collective noun(for example"人口"、"车辆"、"河流"and so on), and abstract noun(for example"思想"、"意识"、"能力"and so on).

名词可以分为普通名词(如"汽车"、"计算机"、"老师"、"字典"等)、专有名词(如"中国"、"毛泽东"、"《子夜》"等)、集体名词(如"人口"、"车辆"、"河流"等)和抽象名词(如"思想"、"意识"、"能力"等)。

Computerese :计算机行话 Slang for computer jargon.

计算机专业术语的俚称。

Since doctor Adleman successfully gave the solution of directed Hamilton path about directed graph with DNA computing in 1994, there have been significant research efforts on the DNA computing and the DNA computer.

基于这一原因,科学家们正在寻找其他全新的计算机结构,如人工神经网络计算机、量子计算机、光学计算机以及DNA计算机模型等,其中DNA计算机在近几年倍受科学界的关注。

The confidentiality of the existing rules and regulations to conduct a comprehensive clean-up, failed to meet the job requirements of confidentiality under the new situation, the timely amendment, supplement; right not included in the management of classified computers within the LAN, it is necessary to develop practical management systems into effective Monitoring scope; the establishment of classified removable storage media, a registration system for the device model, hardware number, custodian, enable time registered in the books, and report to the offices of record; the establishment of classified computers, classified removable storage media to go out the registration ledger system; non-classified computer connected to the Internet is strictly prohibited non-classified computer and between computers with classified national security department without the approval of the removable storage media to transfer data directly; classified obsolete computers and removable storage media must be submitted to Council Committee for the record confidentiality, rosters later physical methods for destruction.

对现有的保密规章制度进行一次全面清理,对不适应新形势下保密工作要求的,及时进行修订、补充;对未纳入局域网内管理的涉密计算机,要制定切实可行的管理制度,纳入有效监控范围;建立涉密移动存储介质登记制度,将设备型号、硬件编号、保管人、启用时间等登记在册,并报局办公室备案;建立涉密计算机、涉密移动存储介质外出登记台账制度;严禁涉密计算机接入互联网,严禁非涉密计算机与涉密计算机之间用未经国家保密部门认可的移动存储介质直接传输数据;涉密计算机及移动存储介质报废,须报局保密委备案,登记造册后用物理方法进行销毁。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

Along with the rapid of computer computer domain enlarges, and many capabilities are good, and the meri can completely, and it is wide to apply the face, and the strong application software of is correspondingly introduced, and the visible computer has got application, almost various walks of life all concerned uses in the computer, and this makes that the has become the thing that universally exists in the society.

随着计算机科学的迅速发展,计算机应用领域的不断扩大,许多性能好,功能齐全,应用面广,兼容性强的应用软件相应推出,可见计算机已经得到了广泛的应用,几乎各行各业都有关于计算机的使用,这使得计算机已成为社会中普遍存在的事物。由于计算机的使用,使得人们在于管理、应用及服务等各个领域使用数据方面变得更加简洁,更加方便,大大提高了工作效率,产生了以计算机为主体,以人为辅助的局面。

By the research to computer virus characteristics,such as ruinousness, infectivity and uncertainty,according to the different classification of virus this paper analyzes the operating principle of computer virus respectively,and discusses some methods to clearing the computer virus.

因此,计算机病毒的防治对于维护系统的正常运行非常重要。1计算机病毒的特征计算机病毒是指编制或者在计算机程序中插入的破坏计算机功能或者毁坏数据,影响计算机使用,并能自我复制的一组计算机指令或者程序代码[1][2]。

Shanghai principle light software company Respective profession: Computer software Software test software engineer Mainly is engaged in the printer driver the test The Shanghai negotiable securities Times panoram network sponsor network starts off develops Respective profession: Computer software Does not have other The road develops the personnel Education experience Shanghai electrical machinery institute computer application technical college Programming language - familiar C, object-oriented language and so on programming C++, VB, java, assembly Computer network - computer network principle, website construction and maintenance Database - Access Computer application - computer assembly and service, construction of data The operating system - skilled grasps the Windows all operating system, has the certain foundation to Linux Charting - Auto CAD intermediate, PhotoShop, Flash, multimedia technical Authorware The science and technology manages the school computer application specialized middle school Computer network technology, computer composition principle, visible programming VB, Computer operation system, computer operation technology, homepage manufacture, network security, Computer system maintenance, microcomputer principle and assembly language, office automation and so on.

上海理光软件公司所属行业:计算机软件软件测试软件工程师主要从事打印机驱动程序的测试上海证券时报全景网络主办网上路演所属行业:计算机软件无其他路演人员教育经历上海电机学院计算机应用大专编程语言——熟悉C,面向对象程序设计C++、VB、java、汇编等语言计算机网络——计算机网络原理、网站建设与维护数据库——Access 计算机应用——计算机组装与维修、数据结构操作系统——熟练掌握Windows所有操作系统、对Linux有一定基础制图——Auto CAD中级、PhotoShop、Flash、多媒体技术Authorware科技管理学校计算机应用中专计算机网络技术,计算机组成原理,可视化程序设计VB,计算机操作系统,计算机操作技术,网页制作,网络安全,计算机系统维护,微机原理和汇编语言,办公自动化等等。

Palmtop 掌上计算机例句:A palmtops ancestry owes more to the electronic calculator bthan to the PC.

掌上计算机的祖先更象是电子计算器而非个人计算机。for the time be

D k E k (P=P 计算机专业英语 10-17 Chapter 10 Computer and Network Security 10.2 Modern Cryptography- Data Encryption DES has been studied by many of the world's leading cryptographers, but no weaknesses have been uncovered. To crack a DES-encrypted message a hacker or commercial spy would need to try 255 possible keys.

前略为了打开一个DES加密的报文,黑客或商业间谍需要试验前略为了打开一个DES加密的报文, DES加密的报文种可能的密钥, 255种可能的密钥,这种搜索在世界上最快的巨型机上也需好几天的计算机时间。

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

They go to town. Would you just ask them?

他们在城里你能问他们吗?

Ossein pretreated for a2 weeks period exhibited the maximum% yield incase of bone gelatin, while the yield from intact skin was higher than that realized incase of de-scaled skin.

预处理时间达2星期的骨胶原表现出最高的骨明胶百分产量,然而从未处理鱼皮中得到的产率比去鳞的鱼皮得到的要高。

Add in realistic voice acting, and you're about to get emotionally attached toa whole platoon of charactersEvery object on the battlefield is destructible - and once it's destroyed, it stays destroyedIn addition to the rich 1-player storyline, Pathway to Glory features the kind of multiplayer options that N-Gage was made for: go against another player using the same game deck with the Hot Seat option, or connect via Bluetooth technology and go head-to-head.

在现实的声音演戏方面增加,而且你正要拿个性的整个排给在情绪上附上的 toa在战场上的每个物体是可破坏的-而且一经资讯科技被破坏,它停留破坏发现你站着哪里:钮扣的推给你一个概览,如此你能很快地恢复一种不稳定的情形控制除了富有的 1个运动员的剧情之外,通往光荣的道路以可多人玩的选项类型为特色 N-规格被有益:去对抗和困境选项一起使用相同的游戏甲板的另外一个运动员,否则经由 Bluetooth 技术连接而且去头-到-头。