英语人>网络例句>monitors 相关的网络例句
monitors相关的网络例句

查询词典 monitors

与 monitors 相关的网络例句 [注:此内容来源于网络,仅供参考]

Why don't you sell Croc Monitors?

为什麼不卖萨氏巨蜥?

It monitors the buffer data for presence of any four or more consecutive repetitions of the same character.

监察缓冲区的数据存在任何4个或更多的连续重复同一性质的。

In some low cost monitors without degauss buttons it is necessary to leave the power turned

在一些低成本方面监控没有

To correct this, all color CRT monitors automatically degauss at power-on and some also have a manual degaussing button.

改正 这,全部颜色CRT 监视器自动在通电消磁并且一些也有一本手册消磁钮扣。

In some low cost monitors without degauss buttons it is necessary to leave the power turned off for at least 20 minutes in order to get maximum degaussing.

在一些低成本方面监控没有消磁钮扣留下能力被关上是必要的为了拿到最大的消磁至少20 分钟以来。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Nowadays, Ms Warner thinks, people have become accustomed to a kind of permanent disembodiment, thanks to the ubiquity of digital representations of themselves, via digital cameras and CCTV monitors (and, though she does not mention it, internet video).

Ms Warner认为由于数码相机和电视摄像设备的广泛使用(网络摄像头虽然她并未提到,但其影响力我们可想而知),人类数字化了的形象变得随处可见。人们已经习惯了长期与现实脱离。在书中她还精彩的写道

Dockside - Dockside is a desktop companion application which provides quick access to a growing list of system and Internet information monitors through a familiar 'dock-like' user interface.

Dockside是一个桌面伴随应用程序,它提供了快速访问系统的一个成长目录和Internet 信息监控程序,这是通过一个熟悉的'dock-like'用户接口实现的。

Dr. Borak said that this dosimeter monitors doses of radiation a person receives, and transmits up-to-the-minute information to a computer.

博拉克博士说这种放射量测定器监控人体接收的辐射剂量,将信息即时传给计算机。

In monitors, the dot pitch is the distance between the holes in the shadow mask; the smaller the number, the sharper the image.

在监视器里,点距是距离(测量在彩色显象管阴罩过程中,在洞之间,用毫米);更小的数目,骗子这幅图像。

第5/37页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher