operating system 中文意思是什麼

operating system 解釋
操椎統
  • operating : adj 1 運行的;操作的;工作的。2 關于業務的;營業上的;關于收支的。operating expenses 業務開支;營...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. In soft, abnegating bald dos operating system, we will realize testing and displaying in real time on windows operating system. in hardware, we use computer as postposition cpu, monolithic processor as front cpu, and link them into simple network. in this way, we will realize a kind of distributing testing system providing with high precision and remote controlled ability

    軟體上,屏棄枯燥的D O S界面,使用windows平臺實現實時性很高的實測實顯任務;硬體上,將計算機作為上位機,單片機作下位機,連成簡單的網路,實現高精度的、具有遠程控制能力的一種分散式測試系統。
  2. There are more and more plants affiliated to their old " lords " have been peeled off, re - organized and have re - shaped their " operating system " to acclimatize themselves to market

    越來越來的原來在這些「大樹」下面過日子的機車配件生產企業紛紛被剝離、重組,並且他們也在重塑他們的「操作系統」以適應市場的變化。
  3. When you finish setting of all parameters and reboot your operating system, you will amazedly find the downloading speed is improved several times

    當設置好各個參數並重新啟動系統,你將會驚奇的發現下載速度提高了好幾倍。
  4. Amoeba distributed operating system

    阿米巴分散式操作系統
  5. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬體的基本軟體,其安全職能是其他軟體安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加密解密技術的安全性是得不到根本保障的。
  6. For example, we used brio to obtain the following operating system metrics for one of our lotus workplace servers

    比方說,我們使用brio獲得一臺lotus workplace服務器的下列操作系統數據:
  7. Take care to download the correct cdt for your operating system

    注意:請下載適合於您操作系統的正確的cdt 。
  8. He job of cache coherency is done partially by the hardware and partially by the operating system

    保證高速緩存一致性的工作由硬體和操作系統共同分擔。
  9. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  10. Operating system security conspectus

    操作系統安全三
  11. Information technology - portable operating system interface - technical corrigendum number 1

    信息技術.便攜式操作系統介面. 1號技術勘誤
  12. This design can resolve the question of costliness. embedded operating system is the core of embedded automobile navigation systems. it manages arm ’ s resource and is the base of application, so it will be discussed in detail in this artlcle

    這樣的設計,解決了單獨的基於pc機的導航系統和基於wince的嵌入式導航系統成本高或攜帶不便的問題,系統性價比高,可彌補傳統導航定位系統的不足。
  13. Operating system experiment system ( oses ) has been a old topic, but it developed slowly. so it is discommodity to go deep into study the principle of the operating system ( os ) for the learners, that most learners ca n ' t master the os

    「操作系統實驗系統」是一個較早的話題,可也是一個發展不夠充分的一項技術,這給深入學習操作系統的原理帶來了不便,以致絕大多數學習者對操作系統理解不透。
  14. Chengdu freight wagon factory, with rich manufacturing and maintaining experiences, is the large - scale factory, which manufactures railway freight wagon and freight engine in china. already turned deficits into surpluses, with the enforcement of raising speed strategy of railway cargo transportation and quickness of technique renew, cfwf ' s operating system is now facing great challenge of market opening. its preferred status on " ? re " product will also face big threaten

    成都機車車輛廠就是其中的一個典型,雖然成都廠是國內從事鐵路機車車輛維修和機車電機製造的大型企業,具有豐富的生產維修製造經驗,但隨著鐵路電氣化和提速戰略的實施,技術更新步伐的加快,成機廠的經營機制在幾年前就已面臨市場開放的巨大挑戰,核心產品上的優勢地位也受到很大威脅。
  15. Embedded system is an application specific computer system that focuses on the application and it is based on the computer technologyjts hardware and software is cuttable. the development of embedded systems is very fast during the last ten years, furthermore, as an important part of embedded system, embedded operating system is uesed in the embedded systems more and more, especially in handheld devices and electronic devices. but the design techniques of embedded system and embedd software is still germinant, and there are no standards and universal methods about it

    嵌入式系統是以應用為中心,以計算機技術為基礎,軟硬體可剪裁的專用計算機系統。近十幾年來,嵌入式系統的發展異常迅速,嵌入式操作系統作為嵌入式系統的核心,其應用也越來越廣泛,尤其在手持設備、信息家電領域更加突出。但嵌入式系統以及嵌入式軟體設計技術仍舊處于起步階段,仍舊未能形成一套完整、有效、通用的開發方法和規范。
  16. Debian gnu linux is the first choice as base operating system for innominate when developing standard and customized security appliances for a long time

    數年來, innominate在開發標準及特殊訂做的網路安全產品時, debian gnu linux一直是他們基礎操作系統的第一選擇。
  17. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  18. Users can use the resources distributing on isomerous network and operating system pellucidly with the support of middleware

    中間件支持用戶透明的使用分佈在異構網路和操作系統上的資源。
  19. Assuming the operating system can be trusted which is a laughably big assumption, we can assume our database of crypto hashed passphrases is correct

    假設作業系統是可信的(這是個可笑的大前提) ,我們可以假設我們的加密雜湊密碼的資料庫是正確的。
  20. Language much like a program in one ' s computer allows for an operating system through which earth and all sentient species therein functions as a living movie

    類似計算機里的程序,語言能允許地球和全部有覺知的物種通過一個操作系統活動,就像一部活電影。
分享友人