英语人>词典>汉英 : 计算机系统 的英文翻译,例句
计算机系统 的英文翻译、例句

计算机系统

词组短语
computer system · computing system
更多网络例句与计算机系统相关的网络例句 [注:此内容来源于网络,仅供参考]

According to introducing, the meeting after these baleful trojan programs affect tube-shaped part of computer science department undertakes to the system of a lot of destroy, be like: Without the license of computer user bowdlerism or it is file of the mass data in replacing interconnected system of computer science department, cause the important data in maintaining existence system to the file is lost or be distorted.

据介绍,这些恶意木马程序感染计算机系统后会对系统进行很多的破坏,如:未经计算机用户的许可而任意删除或是替换计算机系统中大量数据文件,造成保存在系统中重要的数据文件丢失或被篡改。

The meeting after these baleful trojan programs affect tube-shaped part of computer science department undertakes destructive to the system, like the license without computer user bowdlerism or it is file of the mass data in replacing interconnected system of computer science department, cause the important data in maintaining existence system to the file is lost or be distorted.

这些恶意木马程序感染计算机系统后会对系统进行破坏,如未经计算机用户的许可而任意删除或是替换计算机系统中大量数据文件,造成保存在系统中重要的数据文件丢失或被篡改。

The biggest difference between an embedded system and a general purpose computer platform is that the former would use specific hardware and specific software to meet the special requirements of the application for embedded system's volume, function, reliability, costs and so on.

嵌入式系统就是以应用为中心、以计算机技术为基础的专用计算机系统,它与通用计算机技术最大的差异是硬件的专用性和软件的专用性,并以此适应应用系统对体积、功能、功耗、可靠性、成本等的特殊要求。

The configuration and development of simulation computer system, especially the special purpose centralized computer system for the hardware-inthe-loop simulation and general purpose distributed computer system for the operator-in-the-loop simulation, are reviewed.

回顾了仿真计算机系统的结构和发展,特别是面向半实物仿真应用的专用集中式计算机系统和面向人在回路仿真应用的通用分布式计算机系统的结构和发展。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

XXV. All the computers of the company are under central management by the computer technical center. Operators should observe the management system. Access and password to the computer system should be under strict control.

第二十五条全公司计算机系统由计算机技术中心统一管理,操作者遵守计算机的管理制度,进入计算机系统或其他应用系统的所有口令严格控制知悉范围。

Aiming at ceaseless development of computer technique,it introduces the approach of thunder s intruding computery across voltage,bring forward the preventing measures of thunder s intruding computery across voltage,at the same time discuss the character of mutual earthing system,to give some help in the lightningproof work of computery.

针对计算机技术的不断发展,介绍了雷电过电压侵入计算机系统的途径,提出了由线路进入系统过电压的防护措施,同时探讨了共用接地系统的特点,以帮助人们做好计算机系统的防雷工作。

Shanghai principle light software company Respective profession: Computer software Software test software engineer Mainly is engaged in the printer driver the test The Shanghai negotiable securities Times panoram network sponsor network starts off develops Respective profession: Computer software Does not have other The road develops the personnel Education experience Shanghai electrical machinery institute computer application technical college Programming language - familiar C, object-oriented language and so on programming C++, VB, java, assembly Computer network - computer network principle, website construction and maintenance Database - Access Computer application - computer assembly and service, construction of data The operating system - skilled grasps the Windows all operating system, has the certain foundation to Linux Charting - Auto CAD intermediate, PhotoShop, Flash, multimedia technical Authorware The science and technology manages the school computer application specialized middle school Computer network technology, computer composition principle, visible programming VB, Computer operation system, computer operation technology, homepage manufacture, network security, Computer system maintenance, microcomputer principle and assembly language, office automation and so on.

上海理光软件公司所属行业:计算机软件软件测试软件工程师主要从事打印机驱动程序的测试上海证券时报全景网络主办网上路演所属行业:计算机软件无其他路演人员教育经历上海电机学院计算机应用大专编程语言——熟悉C,面向对象程序设计C++、VB、java、汇编等语言计算机网络——计算机网络原理、网站建设与维护数据库——Access 计算机应用——计算机组装与维修、数据结构操作系统——熟练掌握Windows所有操作系统、对Linux有一定基础制图——Auto CAD中级、PhotoShop、Flash、多媒体技术Authorware科技管理学校计算机应用中专计算机网络技术,计算机组成原理,可视化程序设计VB,计算机操作系统,计算机操作技术,网页制作,网络安全,计算机系统维护,微机原理和汇编语言,办公自动化等等。

The computer monitoring and control system bases on the technology of computer and network, which combines micro computers, digital signal processing, integrated circuit and computer communication, and recombines and interlinks the original two systems of substation as a new computer system.

变电站计算机监控系统是以计算机和网络技术为核心,将微计算机、集成路电、数字信号处理和计算机通信等新学科在变电站的集中应用,通过将变电站原来的二次系统重新组合、互连而形成的一个新的计算机系统

In computer security, a procedure established for positively identifying a terminal dialing into a computer system by disconnecting the calling terminal and reestablishing the connection by the computer system's dialing the telephone number of the calling terminal.

在计算机安全学中,为了确认一个终端叫通了计算机系统,而先切断该呼叫终端与计算机系统的连接,再由计算机系统呼叫该终端的电话号码来重建连接的过程。

更多网络解释与计算机系统相关的网络解释 [注:此内容来源于网络,仅供参考]

Computer Architecture:计算机系统结构

计算机系统结构(Computer Architecture)是高等院校计算机专业的一门专业主干课程. 由于提高计算机性能的主要推动力是发展计算机体系结构的并行性,因此,在计算机科学与技术高速发展的今天,讲授和学习计算机系统结构,应以计算机并行化的概念、方法和技术为主线,

computer system:计算机系统

计算机系统(computer system)由硬件(hardware)和软件(software)组成. 就象人们对广播体操的分解动作进行编号一样, 人们对计算机系统中数据处理部件(CPU)的各种操作("动作")也进行编号, 即形成该计算机系统的操作(动作)编号系统,

dual computer system:双并列计算机系统;复式计算机系统

DTA range,DTA,范围;差热分析范围 | dual computer system,双并列计算机系统;复式计算机系统 | cual-flame ionization detector,双火焰离子化检测器

dual computer system:双并列计算机系统

冗余计算机系统 redundancy computer system | 双计算机系统 duplexed computer system | 双并列计算机系统 dual computer system

large general purpose computer system:大型通用计算机系统

large displacement holography | 大位移全息照像术 | large general purpose computer system | 大型通用计算机系统 | large integrated monolithic array computer | 大规模集成化单片阵计算机

Host computer system:主控计算机系统

监控系统:Computer Supervisory Control System | 主控计算机系统:Host computer system | 微机监控系统:Computer control system

SIGCOSIMSIG on Computer System Installation Management:计算机系统安装管理专业组(美国计算机学会属下的)

12SIGCOMMSIG on data COMMunication数据通... | 13SIGCOSIMSIG on Computer System Installation Management计算机系统安装管理专业组(美国计算机学会属下的) | 14SIGCPRSIG on Computer Personnel Research计算机人...

Parallel Computer System:并行计算机系统

计算机监控系统:computer monitor system | 并行计算机系统:Parallel Computer System | 辅助教学系统:Computer-aided instruction system

portable computer systems:可携计算机系统

可携计算机 portable computer | 可携计算机系统 portable computer systems | 可携式数据撷取系统 portable data acquisition system,PODAS

computer systems analyst:计算机系统分析员

计算机系统分析员(Computer Systems Analyst) 应读专业:需要管理信息系统的学位. 前景:人们对电子商务和网络技术的依赖持续增长将为计算机系统分析员岗位带来近150000个新工作机会. 在2006年,应届毕业生在这领域里拿到的offer有将近50000美元的起始年薪.