用者終端機 的英文怎麼說
中文拼音 [yòngzhězhōngduānjī]
用者終端機
英文
user terminal (ut)- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 者 : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
- 終 : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
- 端 : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
- 機 : machineengine
- 終端機 : terminal equipment
- 終端 : terminal; terminus; terminator; tag end; end; termination; trailing end; end point; terminating終...
-
The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal
前端數據調制器完成對計算機輸出的控制信號加密處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。Iptv has different business models from the old broadcast television because of its user - interactivity, extensibility and flexibility. iptv is indubitably going to make a big market in the future. in iptv system, users watch vod or seek infromation with set - top boxs
其中,作為iptv終端的ip機頂盒,是服務的主要體現者。音視頻是iptv目前的核心業務,為實現多樣的音視頻服務,機頂盒中的播放器起著關鍵作用。The system also provides the dynamic interface of setting the automobile type displaying terminals in the mode of parameterization so as to add and delete monitors on line. it uses update mechanism of dynamic database to monitor system running. it applies message maps mechanism of vc which enables workers interact with system by keyboard
系統採用了與多用戶windows2000系統應運而生的瘦客戶機/服務器體系架構,極大地增強了系統的集成性和可維護性;通過命令行參數提供設置車型顯示終端的動態介面,實現終端的在線添加和刪除;利用動態數據庫更新機制,實現對系統運行過程的動態監控;利用vc的消息映射機制,使操作者能夠通過鍵盤同系統進行交互。Local - area network ( lan ) a user - owned, user - operated, high - volume data transmission facility connecting a number of communicating devices ( e. g., computers, terminals, word processor, printers, and mass storage units ) within a single building or campus of buildings
區域網路一個使用者擁有,使用者操作在同一建築或組織園區中連接通信設施的高資料量傳輸設備(如電腦、終端機、文書處理器、印表機以及大量儲存設備) 。A term often used in preference to “ local terminal ” to denote an operator interface device that is part of ( or directly connected to ) a computer system
比「本地終端」更常用來表示操作員介面設備的一個詞,是指計算機系統的一部分或者直接連接到計算機系統上的一個部分。With my client and server running, every once in a while my local terminal updates with a list of a few surfers who have followed links to get to my web site
當客戶機和服務器都在運行時,我的本地終端不時會用一些網路沖浪者的列表更新自己,這些沖浪者根據鏈接訪問我的網站。Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too
但是系統安全不能單純依靠加密來保證,作者從信息系統安全體系的角度,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應用的鑒權、終端激活禁用、空中介面加密、端到端加密等安個機制進行了重點研究,同時針對實際應用中出現的安全性問題提出了解決方法。Addresses an issue that could produce an alert when creating disk images using disk utility or terminal
更正當使用磁碟工具或者終端機產生虛擬磁碟影像時的錯誤警報訊息。In computer security, the use of security personnel to patrol work areas, particularly outside normal working hours, to detect intruders and unauthorized use of terminals, to check for security violations
計算機安全學中,安全人員在工作間內巡邏,特別是在正常工作時間以外的時間里檢查入侵者、終端的非法使用及其它安全違章行為。Wto dispute settlement mechanism, which developed on the basis of gatt dispute settlement mechanism, established a unique operating method in which legal method and political method combine together. a dispute settlement case may be reviewed by < wp = 8 > double level panel and appealing branch. by though analysis, this part points that the major functions of dispute settlement mechanism are explanation, harmonization and punishment
指出wto爭端解決機制在對gatt爭端解決機制繼承、發展和完善的基礎上,確立了以法律方法為主,政治方法為輔,二者相結合的滾動式爭端解決程序以及專家組和上訴機構( ab )兩個層次類似二審終審的具體運作方式;本文認為, wto爭端解決機制在解決國際貿易爭端中的作用主要表現為解釋、協調和制裁。In this paper, according to the request of the subject, " application study of the network computer ( nc ) in the information project of the enterprise ", of 863 program, the computer software & hardware technology, author designed a kind of network computer based on the pxe technology and discussed the kind of network computer which is based on the embedded linux operating system. and then we choices the fujian furi electron company as demonstration pilot that nc is used in the enterprises and discuss the application of the nc in the enterprises. we designed the four hiberarchy of the application of the nc in the enterprises, reconstructed the network of the company and discussed the application model of the network computer
本文是作者結合國家863計劃計算機軟硬體技術主題「網路終端機nc在企業信息化中的應用」課題的研究工作,設計、探討了一種基於遠程調用技術的網路終端機nc ,並對基於嵌入式linux操作系統的網路終端機nc進行了研究,最後還以福建福日股份有限公司作為網路終端機nc在企業中應用的示範點,探討了網路終端機nc在企業應用的四層層次結構,重新設計了企業的網路結構,探討了網路終端機nc在企業中的應用模式,旨在應用推廣中不斷完善網路終端機nc ,從而進一步推動它的應用,最終推動國產軟硬體技術的不斷發展。Terminal equipment - telephony for hearing impaired people - characteristics of telephone sets that provide additional receiving amplification for the benefit of the hearing impaired
終端設備.聽覺損傷者用電話.使聽覺損傷者受益的提供附加聲音接收放大裝置的電話機組的特徵Borrowing library materials with the smart id card those who have applied to use their smart id cards for library services may borrow materials at counters and self - charging terminals
申請以智能身份證使用圖書館服務的讀者,可使用其智能身份證在圖書館櫃?及自助借書終端機外借圖書館資料。At some public libraries, you may also borrow and renew materials using your smart id card at self - charging terminals
在部分香港公共圖書館分館,讀者亦可使用其智能身份證在自助借書終端機外借和續借圖書館資料。If the user is in the office but the terminal indicates a remote dial - in connection, be suspicious
如果使用者在辦公室中,但是終端機指出一個遙遠的刻度盤-在連接中,是可疑的。Besides, with the quicker life rhythm of human being, rapid sell market exploring and gradually frozen chain perfecting, the industry itself has a specific development opportunity, moreover, the situation of mono product may give a specific opportunity for product variety. of course, the company also faces the challenge which arises from the threaten of replace product and newcomers, vicious competition, obvious differences between off and peak seasons, product life shortening, market elaborate division speeding up, heavy terminal sale cost expanding, etc
另外,隨著人們生活節奏的加快、賣場的快速擴張和冷凍鏈的逐步完善,行業本身有一定發展機會,產品品種相對單一的現狀也使得行業存在一定產品機會;當然企業也面臨著行業惡性競爭、淡旺季差別明顯、生命周期縮短、市場細分加速和終端營銷費用劇增等的挑戰,以及來自替代品和新進入者的威脅。It works like this : if a request to load an infected file comes from a network, an automatic action is taken and nothing is displayed. on the other hand, when the request comes from a local or terminal session, the usual interactive mode is used - as in desktop antivirus
告,它的操作原理是:如果網路請求加載一個被感染文件時,不會顯示警告,另一方面,如果本地或者終端會話發出加載請求時,使用互動模式-像單機版一樣Autosplice is a manufacturer of terminals, component assemblies and applicator systems providing automated solutions for creating electronic, electrical and mechanical interconnections
歐多詩貝亞州是終端的製造廠,為提工自動的解釋的組成部分集結和適用者系統建立電子,電氣和機械的相互連接分享友人