用者終端機 的英文怎麼說

中文拼音 [yòngzhězhōngduān]
用者終端機 英文
user terminal (ut)
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : machineengine
  • 終端機 : terminal equipment
  • 終端 : terminal; terminus; terminator; tag end; end; termination; trailing end; end point; terminating終...
  1. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    數據調制器完成對計算輸出的控制信號加密處理,將指令碼載送到一指定頻率點。收費控制器解調出控制信號,送至單片尋址控制部分。單片尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利pin二極體的寬帶工作能力以及關斷特性,實現對非授權戶或非法戶的信號關斷,使之不能正常收視,繳費戶進行開通正常收視,達到控制戶通道的管理。
  2. Iptv has different business models from the old broadcast television because of its user - interactivity, extensibility and flexibility. iptv is indubitably going to make a big market in the future. in iptv system, users watch vod or seek infromation with set - top boxs

    其中,作為iptv的ip頂盒,是服務的主要體現。音視頻是iptv目前的核心業務,為實現多樣的音視頻服務,頂盒中的播放器起著關鍵作
  3. The system also provides the dynamic interface of setting the automobile type displaying terminals in the mode of parameterization so as to add and delete monitors on line. it uses update mechanism of dynamic database to monitor system running. it applies message maps mechanism of vc which enables workers interact with system by keyboard

    系統採了與多戶windows2000系統應運而生的瘦客戶/服務器體系架構,極大地增強了系統的集成性和可維護性;通過命令行參數提供設置車型顯示的動態介面,實現的在線添加和刪除;利動態數據庫更新制,實現對系統運行過程的動態監控;利vc的消息映射制,使操作能夠通過鍵盤同系統進行交互。
  4. Local - area network ( lan ) a user - owned, user - operated, high - volume data transmission facility connecting a number of communicating devices ( e. g., computers, terminals, word processor, printers, and mass storage units ) within a single building or campus of buildings

    區域網路一個使擁有,使操作在同一建築或組織園區中連接通信設施的高資料量傳輸設備(如電腦、、文書處理器、印表以及大量儲存設備) 。
  5. A term often used in preference to “ local terminal ” to denote an operator interface device that is part of ( or directly connected to ) a computer system

    比「本地」更常來表示操作員介面設備的一個詞,是指計算系統的一部分或直接連接到計算系統上的一個部分。
  6. With my client and server running, every once in a while my local terminal updates with a list of a few surfers who have followed links to get to my web site

    當客戶和服務器都在運行時,我的本地不時會一些網路沖浪的列表更新自己,這些沖浪根據鏈接訪問我的網站。
  7. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠加密來保證,作從信息系統安全體系的角度,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應的鑒權、激活禁、空中介面加密、加密等安個制進行了重點研究,同時針對實際應中出現的安全性問題提出了解決方法。
  8. Addresses an issue that could produce an alert when creating disk images using disk utility or terminal

    更正當使磁碟工具或產生虛擬磁碟影像時的錯誤警報訊息。
  9. In computer security, the use of security personnel to patrol work areas, particularly outside normal working hours, to detect intruders and unauthorized use of terminals, to check for security violations

    計算安全學中,安全人員在工作間內巡邏,特別是在正常工作時間以外的時間里檢查入侵的非法使及其它安全違章行為。
  10. Wto dispute settlement mechanism, which developed on the basis of gatt dispute settlement mechanism, established a unique operating method in which legal method and political method combine together. a dispute settlement case may be reviewed by < wp = 8 > double level panel and appealing branch. by though analysis, this part points that the major functions of dispute settlement mechanism are explanation, harmonization and punishment

    指出wto爭解決制在對gatt爭解決制繼承、發展和完善的基礎上,確立了以法律方法為主,政治方法為輔,二相結合的滾動式爭解決程序以及專家組和上訴構( ab )兩個層次類似二審審的具體運作方式;本文認為, wto爭解決制在解決國際貿易爭中的作主要表現為解釋、協調和制裁。
  11. In this paper, according to the request of the subject, " application study of the network computer ( nc ) in the information project of the enterprise ", of 863 program, the computer software & hardware technology, author designed a kind of network computer based on the pxe technology and discussed the kind of network computer which is based on the embedded linux operating system. and then we choices the fujian furi electron company as demonstration pilot that nc is used in the enterprises and discuss the application of the nc in the enterprises. we designed the four hiberarchy of the application of the nc in the enterprises, reconstructed the network of the company and discussed the application model of the network computer

    本文是作結合國家863計劃計算軟硬體技術主題「網路nc在企業信息化中的應」課題的研究工作,設計、探討了一種基於遠程調技術的網路nc ,並對基於嵌入式linux操作系統的網路nc進行了研究,最後還以福建福日股份有限公司作為網路nc在企業中應的示範點,探討了網路nc在企業應的四層層次結構,重新設計了企業的網路結構,探討了網路nc在企業中的應模式,旨在應推廣中不斷完善網路nc ,從而進一步推動它的應,最推動國產軟硬體技術的不斷發展。
  12. Terminal equipment - telephony for hearing impaired people - characteristics of telephone sets that provide additional receiving amplification for the benefit of the hearing impaired

    設備.聽覺損傷電話.使聽覺損傷受益的提供附加聲音接收放大裝置的電話組的特徵
  13. Borrowing library materials with the smart id card those who have applied to use their smart id cards for library services may borrow materials at counters and self - charging terminals

    申請以智能身份證使圖書館服務的讀,可使其智能身份證在圖書館櫃?及自助借書外借圖書館資料。
  14. At some public libraries, you may also borrow and renew materials using your smart id card at self - charging terminals

    在部分香港公共圖書館分館,讀亦可使其智能身份證在自助借書外借和續借圖書館資料。
  15. If the user is in the office but the terminal indicates a remote dial - in connection, be suspicious

    如果使在辦公室中,但是指出一個遙遠的刻度盤-在連接中,是可疑的。
  16. Besides, with the quicker life rhythm of human being, rapid sell market exploring and gradually frozen chain perfecting, the industry itself has a specific development opportunity, moreover, the situation of mono product may give a specific opportunity for product variety. of course, the company also faces the challenge which arises from the threaten of replace product and newcomers, vicious competition, obvious differences between off and peak seasons, product life shortening, market elaborate division speeding up, heavy terminal sale cost expanding, etc

    另外,隨著人們生活節奏的加快、賣場的快速擴張和冷凍鏈的逐步完善,行業本身有一定發展會,產品品種相對單一的現狀也使得行業存在一定產品會;當然企業也面臨著行業惡性競爭、淡旺季差別明顯、生命周期縮短、市場細分加速和營銷費劇增等的挑戰,以及來自替代品和新進入的威脅。
  17. It works like this : if a request to load an infected file comes from a network, an automatic action is taken and nothing is displayed. on the other hand, when the request comes from a local or terminal session, the usual interactive mode is used - as in desktop antivirus

    告,它的操作原理是:如果網路請求加載一個被感染文件時,不會顯示警告,另一方面,如果本地或會話發出加載請求時,使互動模式-像單版一樣
  18. Autosplice is a manufacturer of terminals, component assemblies and applicator systems providing automated solutions for creating electronic, electrical and mechanical interconnections

    歐多詩貝亞州是的製造廠,為提工自動的解釋的組成部分集結和適系統建立電子,電氣和械的相互連接
分享友人