垃圾軟體 的英文怎麼說

中文拼音 [ruǎn]
垃圾軟體 英文
scumware
  • : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
  • : 體構詞成分。
  • 垃圾 : rubbish; garbage; refuse; breeze; [英國] dust; raffle; waste
  • 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
  1. A botnet is a network of computers that, unbeknownst to their users, forward transmissions, such as spam, viruses and malware, to other computers linked to the internet

    殭屍網「是指一個計算機網路,在它們用戶不知情的情況下,轉發傳送信息,例如:郵件、病毒和惡意給上網的其它用戶。
  2. The runtime s garbage collection algorithm is based on several generalizations that the computer software industry has discovered to be true by experimenting with garbage collection schemes

    運行時的回收演算法基於以下幾個普遍原理,這些回收方案的原理已在計算機業通過實驗得到了證實。
  3. B management procedures can be deleted directly by the 3, the software is simple and easy to use : handcuffs, application by the end of the menu can be closed useless files and transfer memory superfluous thread, through the installation of the signs option to check with the trash can directly choose to delete, delete the software in the analysis of these documents can be useful, so we do not have to worry about the deletion of useful documents, a bugs, the software can not understand this game cmr2005 part of the procedure documents, as garbage, if you install this procedure, please have your attention the original english software, and so on

    3使用說明:簡單容易上手,通過菜單可以結束應用程序關閉調入內存的無用文檔以及多餘的線程,通過安裝選項查看帶有桶標志的項目,可以直接選擇刪除,在刪除的時候可以分析這些文件是否有用,所以不用擔心刪除了有用的文件,一個bug ,不能認識cmr2005這個游戲的部分程序文件,會作為處理,如果您安裝有這個程序,請您注意原版英文就是如此,並非漢化和優化中才出現的。
  4. For the public, it was jaw - dropping : an america online engineer accused of entering his company ' s data banks and stealing 92 million e - mail addresses that allegedly were sold by a middleman to but for many on the front lines of

    當美國公眾對聽到美國在線公司america online的工程師闖入公司數據庫,盜走9200萬個電子郵箱地址,並通過中間人售給郵件發送者的消息后驚訝萬分。
  5. Not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    ( 8 )每位用戶都不得利用慧學英語和服務發連環信、郵件、惡意郵件攻擊、不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  6. H not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    8每位用戶都不得利用cleverlearn和服務發連環信郵件惡意郵件攻擊不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  7. Each time software engineers attack spam in some way, spammers find a way around their methods

    工程師每推出一種打擊郵件的方式,郵件寄送者就能找到一種避開攻擊的方法。
  8. Symbian uiq protective firewall software category name, cell phone software version 1. 0 describing its integrated cell phone virus killing. firewall, the filtering function of a new generation of mobile phone text messaging refuse security products

    名稱手機防護symbian uiq類別防火墻版本號1 . 0描述集成手機病毒查殺,防火墻,簡訊過濾功能的新一代手機安全產品。
  9. And then the intelligent garbage collection ( gc ) is given, which is extracted form the design of the real - time system. the general design, function modules and key algorithms of the software are described in chapter 4

    本文的第四章介紹了系統的總設計,以及各個功能模塊和設計中的關鍵演算法,最後給出了智能收集方案的應用。
  10. Some anti spam applications use black lists of servers that send spam messages, some use different algorithms to sort spam messages from normal ones

    一些防郵件使用了黑名單,一些使用了某種分類方法。
  11. In this paper, mechanism and construction practice of construction and demolition waste as pile filler in mollisol ground strengthening are explained, and eight examples of engineering application introduced

    闡述了建築作復合載夯擴樁填料加固士地基的機理和施工工藝,並列舉了8個工程應用實例,為建築找到一條合理的利用途徑。
  12. Time, bandwidth and memory resources are occupied to result in the link block as well as the deluge of unhealthy messages. currently, there are some mature filtering methods which adopt software automated filtering and user setting rules. most of the software has a constraint that they need manual setting, which requires some professional domain knowledge

    目前已有一些比較成熟的過濾方法採用通過自動過濾與用戶設定規則的方式,但這類存在著明顯的不足:它需要人工設定過濾規則,這要求用戶或管理員有較強的專業知識,還要求用戶能隨著郵件情況的變化不斷調整這些規則。
  13. Get windows running faster and more efficient by cleaning the registry. regvac has several tools to clean and repair the registry

    一款注冊表清理工具。用於清除系統注冊表中的錯誤和,加快系統運行速度。
  14. Apart from topics like intellectual property rights and software licensing, students will also be led to explore the impacts of certain online activities including unauthorised access, indecent and false information, spam and computer virus

    除了知識產權、許可證等課題外,學生會探討未經授權存取、不雅及虛假資料、郵件、電腦病毒等網上活動所帶來的影響。
  15. Warning : offering any pirated software, posting any cracked serial number, or spamming in any form will result in the termination of your account and a listing in the liste noir for at least 3 months

    警告:如果你發布盜版序列編碼或下載位置或訊息,一經發現,可遭撤消會籍並列入黑名單至少3個月。
  16. If you did not receive the email, please check and make sure you are not using any bulk mail blocking software that might prevent you from receiving any auto - generated messages, or that the email address you entered was incorrect and hence undeliverable

    您應于完成登記后2小時獲取有關確認電郵。如仍未能獲取,請查看您是否正使用任何堵截電郵之,令您未能獲取此自動發放的訊息。
分享友人