英语人>网络例句>计算机系统 相关的搜索结果
网络例句

计算机系统

与 计算机系统 相关的网络例句 [注:此内容来源于网络,仅供参考]

According to introducing, the meeting after these baleful trojan programs affect tube-shaped part of computer science department undertakes to the system of a lot of destroy, be like: Without the license of computer user bowdlerism or it is file of the mass data in replacing interconnected system of computer science department, cause the important data in maintaining existence system to the file is lost or be distorted.

据介绍,这些恶意木马程序感染计算机系统后会对系统进行很多的破坏,如:未经计算机用户的许可而任意删除或是替换计算机系统中大量数据文件,造成保存在系统中重要的数据文件丢失或被篡改。

The meeting after these baleful trojan programs affect tube-shaped part of computer science department undertakes destructive to the system, like the license without computer user bowdlerism or it is file of the mass data in replacing interconnected system of computer science department, cause the important data in maintaining existence system to the file is lost or be distorted.

这些恶意木马程序感染计算机系统后会对系统进行破坏,如未经计算机用户的许可而任意删除或是替换计算机系统中大量数据文件,造成保存在系统中重要的数据文件丢失或被篡改。

The biggest difference between an embedded system and a general purpose computer platform is that the former would use specific hardware and specific software to meet the special requirements of the application for embedded system's volume, function, reliability, costs and so on.

嵌入式系统就是以应用为中心、以计算机技术为基础的专用计算机系统,它与通用计算机技术最大的差异是硬件的专用性和软件的专用性,并以此适应应用系统对体积、功能、功耗、可靠性、成本等的特殊要求。

The configuration and development of simulation computer system, especially the special purpose centralized computer system for the hardware-inthe-loop simulation and general purpose distributed computer system for the operator-in-the-loop simulation, are reviewed.

回顾了仿真计算机系统的结构和发展,特别是面向半实物仿真应用的专用集中式计算机系统和面向人在回路仿真应用的通用分布式计算机系统的结构和发展。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

XXV. All the computers of the company are under central management by the computer technical center. Operators should observe the management system. Access and password to the computer system should be under strict control.

第二十五条全公司计算机系统由计算机技术中心统一管理,操作者遵守计算机的管理制度,进入计算机系统或其他应用系统的所有口令严格控制知悉范围。

Aiming at ceaseless development of computer technique,it introduces the approach of thunder s intruding computery across voltage,bring forward the preventing measures of thunder s intruding computery across voltage,at the same time discuss the character of mutual earthing system,to give some help in the lightningproof work of computery.

针对计算机技术的不断发展,介绍了雷电过电压侵入计算机系统的途径,提出了由线路进入系统过电压的防护措施,同时探讨了共用接地系统的特点,以帮助人们做好计算机系统的防雷工作。

Shanghai principle light software company Respective profession: Computer software Software test software engineer Mainly is engaged in the printer driver the test The Shanghai negotiable securities Times panoram network sponsor network starts off develops Respective profession: Computer software Does not have other The road develops the personnel Education experience Shanghai electrical machinery institute computer application technical college Programming language - familiar C, object-oriented language and so on programming C++, VB, java, assembly Computer network - computer network principle, website construction and maintenance Database - Access Computer application - computer assembly and service, construction of data The operating system - skilled grasps the Windows all operating system, has the certain foundation to Linux Charting - Auto CAD intermediate, PhotoShop, Flash, multimedia technical Authorware The science and technology manages the school computer application specialized middle school Computer network technology, computer composition principle, visible programming VB, Computer operation system, computer operation technology, homepage manufacture, network security, Computer system maintenance, microcomputer principle and assembly language, office automation and so on.

上海理光软件公司所属行业:计算机软件软件测试软件工程师主要从事打印机驱动程序的测试上海证券时报全景网络主办网上路演所属行业:计算机软件无其他路演人员教育经历上海电机学院计算机应用大专编程语言——熟悉C,面向对象程序设计C++、VB、java、汇编等语言计算机网络——计算机网络原理、网站建设与维护数据库——Access 计算机应用——计算机组装与维修、数据结构操作系统——熟练掌握Windows所有操作系统、对Linux有一定基础制图——Auto CAD中级、PhotoShop、Flash、多媒体技术Authorware科技管理学校计算机应用中专计算机网络技术,计算机组成原理,可视化程序设计VB,计算机操作系统,计算机操作技术,网页制作,网络安全,计算机系统维护,微机原理和汇编语言,办公自动化等等。

The computer monitoring and control system bases on the technology of computer and network, which combines micro computers, digital signal processing, integrated circuit and computer communication, and recombines and interlinks the original two systems of substation as a new computer system.

变电站计算机监控系统是以计算机和网络技术为核心,将微计算机、集成路电、数字信号处理和计算机通信等新学科在变电站的集中应用,通过将变电站原来的二次系统重新组合、互连而形成的一个新的计算机系统

In computer security, a procedure established for positively identifying a terminal dialing into a computer system by disconnecting the calling terminal and reestablishing the connection by the computer system's dialing the telephone number of the calling terminal.

在计算机安全学中,为了确认一个终端叫通了计算机系统,而先切断该呼叫终端与计算机系统的连接,再由计算机系统呼叫该终端的电话号码来重建连接的过程。

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。