計算機的代 的英文怎麼說
中文拼音 [jìsuànjīdedài]
計算機的代
英文
generation of computers- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 機 : machineengine
- 的 : 4次方是 The fourth power of 2 is direction
- 代 : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
- 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
- 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
-
Abbreviated names and opaque string formats are a relic of the era when supercomputers had 32k of memory and speeds measured in kilohertz
縮寫名稱和含糊的字元串格式是只有32k內存、速度數千赫茲的超級計算機時代的遺留問題。Modern control theory has arisen with the advent of high - speed digital computers and characterized by the state variable concept with emphasis on matrix algebra and with analysis and design principally in the time domain
現代控制理論是隨著高速數字計算機的出現而產生的,主要特點是使用狀態變量的概念並強調矩陣代數和主要在時間域進行分析和設計。Therefore, it is necessary for modern enterprises to supply reliable and real - time information and services by utilizing computer systems, more and more departments especially those pivotal departments have been unprecedentedly relied on computer systems, however, it is unavoidable for the hardware and software of a computer to have a breakdown, which may certainly results in unmeasured losses
對現代企業來說,利用計算機系統來提供及時可靠的信息和服務是必不可少的,越來越多的行業、部門,尤其是關鍵部門,對計算機系統呈現出前所未有的依賴性。但是計算機的硬體和軟體都不可避免地會發生故障,會帶來無可估量的損失。Typewriters and computer keyboards will be replaced by microphones and memory chips that can accept dictation
打字機和計算機的鍵盤將被可接受口授的話筒及存儲器晶元所取代。In the days of mainframe computers, networks were simply the wires that co ected the dumb terminals to the big box in the basement
在大型計算機時代,網路不過是把啞終端連到地下室里的大盒子上的電線而已。In the days of mainframe computers, networks were simply the wires that connected the dumb terminals to the big box in the basement
在大型計算機時代,網路不過是把啞終端連到地下室里的大盒子上的電線而已。First - generation computers were characterized by the use of vacuum tubes as their principal electronic component
第一代計算機的特色是使用真空管為其主要電子器件。Along with the environmental formation in the scope of world, the world is entering a ages that regards network internet as the central calculator. webgis can be defined in brief for the gis on web
隨著世界范圍環境的形成,全球正進入一個以網路internet為中心的計算機時代。 webgis可以簡單定義為在web上的gis 。These days, automatic measuring system has new approach for the computers a great deal application. improving the precision and speed of motor test, carrying motor identity testing and adopting new testing method becomes feasibility because of the technique of electron developed rapidly in latter - day
近年來,計算機的大量推廣應用為自動測試系統的發展開拓了新的途徑,近代電子技術的迅速發展又為提高電機試驗的精度和速度、進行電機特性測試及採用新的測試方法提供了可能性,進一步推動了電機測試技術的發展。Computer aided design ( cad ) coming up with the development of computer and the modern industry, today it is still regarding geometric modeling of industry product as its research object
計算機輔助設計( cad )是隨著航天航空、汽車、船舶和機器製造業等現代工業的發展和計算機的出現而產生與發展的。One of the great advances in modern technology has been the invention of computers.
現代科技所取得的最大進展之一是計算機的發明。Hence, with second - generation computers, the size and cost of computers decreased, their speed increased, and their air - conditioning needs were reduced
因此,隨著第二代計算機的出現,計算機的體積和成本降低、速度提高,且它們對空調的需要減少。The times of information economics has come now. the world economy has connected by the computers and the internet as a whole. all the countries are looking for the new way to take the priority
今天,以計算機的廣泛應用為代表的信息經濟時代已經來臨,通過因特網連接起來的全球經濟網路正在形成,怎樣在新的經濟運作模式下發揮自己的優勢占領先機,成為擺在各個國家特別是發展中國家面前的一道難題。The default value is the code page of the local computer
默認值為本地計算機的代碼頁。Code from the local computer
(來自本地計算機的代碼)For example, code that originates from the local computer is assigned to the my computer zone and receives full trust by default
例如,源自本地計算機的代碼被分配給「我的電腦區域」 ,默認情況下會獲得完全信任權限。The code access security policy of your computer is used to determine the restricted permissions based on where the xslt style sheet is located
計算機的代碼訪問安全策略用於根據xslt樣式表所處的位置確定受限的權限。That is, the code access security policy of your computer is used to determine the restricted permissions based on where the xslt style sheet is located
沙盒型;即,計算機的代碼訪問安全策略用於根據xslt樣式表所處的位置確定受限的權限。Code that does not originate from the local computer and is therefore likely to be less trustworthy receives restricted access to protected resources under the default security policy
在默認安全策略下,不是出自本地計算機的代碼(因而可信任度可能較低)會收到對受保護資源的受限制的訪問權。By default, the code from the local computer is granted the full trust permission set, code from a local network is granted the local intranet permission set, and code from the internet is granted the internet permission set
默認情況下,來自本地計算機的代碼被授予「完全信任」權限集,來自本地網路的代碼被授予「本地intranet 」權限集,而來自internet的代碼被授予「 internet 」權限集。分享友人