計算機的代 的英文怎麼說

中文拼音 [suàndedài]
計算機的代 英文
generation of computers
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Abbreviated names and opaque string formats are a relic of the era when supercomputers had 32k of memory and speeds measured in kilohertz

    縮寫名稱和含糊字元串格式是只有32k內存、速度數千赫茲超級遺留問題。
  2. Modern control theory has arisen with the advent of high - speed digital computers and characterized by the state variable concept with emphasis on matrix algebra and with analysis and design principally in the time domain

    控制理論是隨著高速數字出現而產生,主要特點是使用狀態變量概念並強調矩陣數和主要在時間域進行分析和設
  3. Therefore, it is necessary for modern enterprises to supply reliable and real - time information and services by utilizing computer systems, more and more departments especially those pivotal departments have been unprecedentedly relied on computer systems, however, it is unavoidable for the hardware and software of a computer to have a breakdown, which may certainly results in unmeasured losses

    對現企業來說,利用系統來提供及時可靠信息和服務是必不可少,越來越多行業、部門,尤其是關鍵部門,對系統呈現出前所未有依賴性。但是硬體和軟體都不可避免地會發生故障,會帶來無可估量損失。
  4. Typewriters and computer keyboards will be replaced by microphones and memory chips that can accept dictation

    打字鍵盤將被可接受口授話筒及存儲器晶元所取
  5. In the days of mainframe computers, networks were simply the wires that co ected the dumb terminals to the big box in the basement

    在大型,網路不過是把啞終端連到地下室里大盒子上電線而已。
  6. In the days of mainframe computers, networks were simply the wires that connected the dumb terminals to the big box in the basement

    在大型,網路不過是把啞終端連到地下室里大盒子上電線而已。
  7. First - generation computers were characterized by the use of vacuum tubes as their principal electronic component

    第一特色是使用真空管為其主要電子器件。
  8. Along with the environmental formation in the scope of world, the world is entering a ages that regards network internet as the central calculator. webgis can be defined in brief for the gis on web

    隨著世界范圍環境形成,全球正進入一個以網路internet為中心。 webgis可以簡單定義為在web上gis 。
  9. These days, automatic measuring system has new approach for the computers a great deal application. improving the precision and speed of motor test, carrying motor identity testing and adopting new testing method becomes feasibility because of the technique of electron developed rapidly in latter - day

    近年來,大量推廣應用為自動測試系統發展開拓了新途徑,近電子技術迅速發展又為提高電試驗精度和速度、進行電特性測試及採用新測試方法提供了可能性,進一步推動了電測試技術發展。
  10. Computer aided design ( cad ) coming up with the development of computer and the modern industry, today it is still regarding geometric modeling of industry product as its research object

    輔助設( cad )是隨著航天航空、汽車、船舶和器製造業等現工業發展和出現而產生與發展
  11. One of the great advances in modern technology has been the invention of computers.

    科技所取得最大進展之一是發明。
  12. Hence, with second - generation computers, the size and cost of computers decreased, their speed increased, and their air - conditioning needs were reduced

    因此,隨著第二出現,體積和成本降低、速度提高,且它們對空調需要減少。
  13. The times of information economics has come now. the world economy has connected by the computers and the internet as a whole. all the countries are looking for the new way to take the priority

    今天,以廣泛應用為信息經濟時已經來臨,通過因特網連接起來全球經濟網路正在形成,怎樣在新經濟運作模式下發揮自己優勢占領先,成為擺在各個國家特別是發展中國家面前一道難題。
  14. The default value is the code page of the local computer

    默認值為本地計算機的代碼頁。
  15. Code from the local computer

    (來自本地計算機的代碼)
  16. For example, code that originates from the local computer is assigned to the my computer zone and receives full trust by default

    例如,源自本地計算機的代碼被分配給「我電腦區域」 ,默認情況下會獲得完全信任權限。
  17. The code access security policy of your computer is used to determine the restricted permissions based on where the xslt style sheet is located

    計算機的代碼訪問安全策略用於根據xslt樣式表所處位置確定受限權限。
  18. That is, the code access security policy of your computer is used to determine the restricted permissions based on where the xslt style sheet is located

    沙盒型;即,計算機的代碼訪問安全策略用於根據xslt樣式表所處位置確定受限權限。
  19. Code that does not originate from the local computer and is therefore likely to be less trustworthy receives restricted access to protected resources under the default security policy

    在默認安全策略下,不是出自本地計算機的代碼(因而可信任度可能較低)會收到對受保護資源受限制訪問權。
  20. By default, the code from the local computer is granted the full trust permission set, code from a local network is granted the local intranet permission set, and code from the internet is granted the internet permission set

    默認情況下,來自本地計算機的代碼被授予「完全信任」權限集,來自本地網路碼被授予「本地intranet 」權限集,而來自internet碼被授予「 internet 」權限集。
分享友人