私人計算機 的英文怎麼說

中文拼音 [rénsuàn]
私人計算機 英文
intimate computer
  • : Ⅰ形容詞1 (個人的) personal; private 2 (自私) selfish 3 (暗地裡; 私下) secret; private 4 (...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • 私人 : 1. (個人的) private; personal 2. (自己的人) one's own man; personal friends or relatives
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Cover 茨 to have ever studied in the common school of seattles with the private lake front high school, over there, he starts oneself s personal occupation of the calculator software experience, 13 years old start write calculator procedure

    蓋茨曾就讀于西雅圖的公立小學和立湖濱中學,在那裡,他開始了自己個軟體的職業經歷, 13歲就開始編寫程序。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,們通過網路傳輸數據日益增加,其中包含了各種密信息(例如軍事密信息、商業密信息、個信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審和恢復、操作系統安全、數據庫系統安全、病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. New personal computers are brought out almost daily.

    幾乎每天都能生產出新的私人計算機
  5. Furthermore, since computers have entered into all fields of people ' s life through network, when people use their computers consciously ( thinking of person ' s privacy as other working information and inputting them, such as home address, telephone numbers for shopping through network ), or unconsciously ( when using computers normally, people are not aware that he is putting his personal records into his computer, such as personal letters, diaries, etc. ), they expose their privacy to the network, providing the possibility for invaders to infringe upon their rights

    而且,由於在網路社會已經浸透到們生活的各個領域,們出於種種目的,將隱自覺地(作為其他功能性信息的一部分寫入,如網上購物時的家庭地址、電話等)或不自覺地(們在正常利用時,並未意識到自己將有隱的記錄留在里,如個信件、日記等)暴露在網上,為擅自闖入者留下了侵權的可能。
  6. By the algorithm, we can make our life more automatical. encryption techniques of digital images are very practical and crucial techniques. this thesis makes a depth research on these two fields, and its major contributions are as follows : 1st

    數字圖像加密技術是隨著網路多媒體技術和現代電子商務的不斷發展,在要、軍事、政府、金融和通信等領域中逐漸形成的一項非常實用又亟待快速發展的關鍵技術。
  7. If you have a fixed ip address, you give potential internet crackers all the time they need to search for entrances to your computer, and to store and share ( with other crackers ) information they might find about your unprotected private data

    如果你的ip地址固定,那麼會給網路黑客可乘之,他們會通過專門的入口進入你的,並且在你的上保存信息或共享你未經保護的數據。
  8. These systems tended to rely heavily on formula - based approaches to pay determination, and were often based on formal pay comparability with the private sector

    這類制度一向非常倚賴以公式為本的薪酬釐定方法,而且一般重公務員薪酬與構薪酬水平大致相若的原則。
  9. The products include commercial computer software that has been developed entirely at private expense and is regularly used for non - governmental purposes and licensed to the public

    產品包括完全由經費開發、通常為非政府目的使用並許可給公眾的商用軟體。
  10. The panel circulated to members a letter from the secretary for housing, planning and lands attaching the valuation report and estimates of premium on the hunghom peninsula private sector participation scheme development

    事務委員會送交委員參閱,房屋及規劃地政局局長夾附紅灣半島構參建居屋劃發展項目的估價報告及補價預的來函。
  11. The new encrypting file system ensures that information is completely private and secure, even for users who share a computer

    即使多個用戶共享一臺,全新的加密文件系統都能保證信息是完全的和安全的。
  12. That is because most digital signatures require the parties in a transaction to have compatible software ? the signer needs to have an encryption algorithm called a “ private key ” on his computer, and everybody else needs a “ public key ” to unlock the signature

    這是因為大多數數字簽名要求交易的當事方具有可兼容的軟體,簽名者需要在他的上具有稱為「秘鑰」的加密演法,每個同時還需要一個「公共秘鑰」來解開簽名。
  13. So the popularity of computers as a tool to record information becomes the possibility that people ' s privacy maybe be infringed upon and the unlimited network as a tool to spread information provides some favorable conditions for the outcome of tort to extend in a big range

    因而,作為信息記錄工具的普及性成為侵權獲取他的可能性,而網路作為信息傳播工具的無界性又為侵權結果的大范圍擴散創造了便利。
分享友人