私人計算機 的英文怎麼說
中文拼音 [sīrénjìsuànjī]
私人計算機
英文
intimate computer- 私 : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 機 : machineengine
- 私人 : 1. (個人的) private; personal 2. (自己的人) one's own man; personal friends or relatives
- 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
- 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
-
Cover 茨 to have ever studied in the common school of seattles with the private lake front high school, over there, he starts oneself s personal occupation of the calculator software experience, 13 years old start write calculator procedure
蓋茨曾就讀于西雅圖的公立小學和私立湖濱中學,在那裡,他開始了自己個人計算機軟體的職業經歷, 13歲就開始編寫計算機程序。With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。New personal computers are brought out almost daily.
幾乎每天都能生產出新的私人計算機。Furthermore, since computers have entered into all fields of people ' s life through network, when people use their computers consciously ( thinking of person ' s privacy as other working information and inputting them, such as home address, telephone numbers for shopping through network ), or unconsciously ( when using computers normally, people are not aware that he is putting his personal records into his computer, such as personal letters, diaries, etc. ), they expose their privacy to the network, providing the possibility for invaders to infringe upon their rights
而且,由於計算機在網路社會已經浸透到人們生活的各個領域,人們出於種種目的,將隱私自覺地(作為其他功能性信息的一部分寫入計算機,如網上購物時的家庭地址、電話等)或不自覺地(人們在正常利用計算機時,並未意識到自己將有隱私的記錄留在計算機里,如個人信件、日記等)暴露在網上,為擅自闖入者留下了侵權的可能。By the algorithm, we can make our life more automatical. encryption techniques of digital images are very practical and crucial techniques. this thesis makes a depth research on these two fields, and its major contributions are as follows : 1st
數字圖像加密技術是隨著計算機網路多媒體技術和現代電子商務的不斷發展,在機要、軍事、政府、金融和私人通信等領域中逐漸形成的一項非常實用又亟待快速發展的關鍵技術。If you have a fixed ip address, you give potential internet crackers all the time they need to search for entrances to your computer, and to store and share ( with other crackers ) information they might find about your unprotected private data
如果你的ip地址固定,那麼會給網路黑客可乘之機,他們會通過專門的入口進入你的計算機,並且在你的計算機上保存信息或共享你未經保護的私人數據。These systems tended to rely heavily on formula - based approaches to pay determination, and were often based on formal pay comparability with the private sector
這類制度一向非常倚賴以計算公式為本的薪酬釐定方法,而且一般重公務員薪酬與私人機構薪酬水平大致相若的原則。The products include commercial computer software that has been developed entirely at private expense and is regularly used for non - governmental purposes and licensed to the public
產品包括完全由私人經費開發、通常為非政府目的使用並許可給公眾的商用計算機軟體。The panel circulated to members a letter from the secretary for housing, planning and lands attaching the valuation report and estimates of premium on the hunghom peninsula private sector participation scheme development
事務委員會送交委員參閱,房屋及規劃地政局局長夾附紅灣半島私人機構參建居屋計劃發展項目的估價報告及補價預算的來函。The new encrypting file system ensures that information is completely private and secure, even for users who share a computer
即使多個用戶共享一臺計算機,全新的加密文件系統都能保證信息是完全私人的和安全的。That is because most digital signatures require the parties in a transaction to have compatible software ? the signer needs to have an encryption algorithm called a “ private key ” on his computer, and everybody else needs a “ public key ” to unlock the signature
這是因為大多數數字簽名要求交易的當事方具有可兼容的軟體,簽名者需要在他的計算機上具有稱為「私人秘鑰」的加密演算法,每個人同時還需要一個「公共秘鑰」來解開簽名。So the popularity of computers as a tool to record information becomes the possibility that people ' s privacy maybe be infringed upon and the unlimited network as a tool to spread information provides some favorable conditions for the outcome of tort to extend in a big range
因而,計算機作為信息記錄工具的普及性成為侵權人獲取他人隱私的可能性,而網路作為信息傳播工具的無界性又為侵權結果的大范圍擴散創造了便利。分享友人