unauthorized computer software 中文意思是什麼

unauthorized computer software 解釋
未獲授權使用的電腦軟體
  • unauthorized : adj. 未被授權的;越權的;未經許可的,未經批準的;沒有根據的。 make an unauthorized change 擅自更改[修改]。
  • computer : n. 1. 計算者。2. (電子)計算機;計量器。-ism 電子計算機主義〈認為電子計算機萬能等〉。-erite, -nik 計算機專家;計算機工作者。
  • software : (電腦的)軟體,軟設備;程序設備;語言設備;程度系統;設計電腦方法;計算程序;程序編排手段;方案;資料圖紙;【航空】軟體〈指乘員、載重及燃料等,不包括機械硬體設備〉。
  1. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  2. Not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    ( 8 )每位用戶都不得利用慧學英語軟體和服務發連環信、垃圾郵件、惡意郵件攻擊、不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  3. H not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    8每位用戶都不得利用cleverlearn軟體和服務發連環信垃圾郵件惡意郵件攻擊不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  4. In data security, the unauthorized searching of data held on a computer for information ( e. g. confidential data or proprietary software )

    在數據保密技術中,未經許可而對保存在計算機中的數據(例如機密數據或有專利權的軟體)進行搜索,以求獲取信息。
  5. The thesis analyses the principles of the physical layer and data link layer of gsm system and the signal processing theories of gsm under unauthorized circumstances. computer simulations are given to show the feasibility of these theories. the design of real - time processing system of gsm signal is introduced, which includes a real - time processing circuit, a dsp software system and a computer monitor platform

    本文分析了gsm系統無線介面的物理層和數據鏈路層的工作原理;詳細闡述了非正常接入條件下的gsm信號處理理論,並給出模擬結果;介紹了gsm信號實時處理系統的設計,包括實時處理電路和dsp軟體系統的開發,以及主機監控平臺的設計。
分享友人