如主機 的英文怎麼說

中文拼音 [zhǔ]
如主機 英文
computer
  1. If this load centroid is behind the elastic axis of the wing structure, then a nose-down twist of the main wing surface results.

    果該載荷重心在翼結構彈性軸之後,則引起翼表面前端向下的扭轉。
  2. When testing begins, the computer of the tested uav flight control system will be connected into the network as a slave. the master of the system will diagnose faults should there be any ; otherwise it will set flight parameters and load flight course data for the slave

    檢測時,無人的飛控系統計算作為從連入網路,果從的飛控系統沒有故障,將為從設置飛行參數和裝定航線數據;果有故障,則為從飛控系統診斷故障。
  3. If everything is peachy, the primary machine s log ha1 in this example should look something like the one shown in listing 3 some lines have been wrapped for layout purposes

    果一切順利,那麼器的日誌(本例中的ha1 )內容應該類似於清單3所示(出於版面方面考慮,省略了一些行) 。
  4. This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems

    本文描述何為aix 、 linux 、 solaris和hp - ux操作系統上基於和基於公鑰的認證配置openssh 。
  5. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    據統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手應用的普及,手存在的安全隱患及面臨的威脅日益突出(動竊聽、假冒站、藍牙連接、電磁波交換、手后門、手被盜、丟失或短時失控、手非話增值業務安全以及手病毒等) ,手安全問題已成為當前急需解決的重要問題。
  6. If the port is open, the target will send a syn | ack packet to the public host

    果埠是開的,目標將發送一個syn | ack包到公共
  7. Due to the continuous progress of techlnology and fast increment of information capacit } r, especially the development of network technology and multi - media technolog } r. data process has transformed from the traditional rnode to a nex ' ! - stvle mode. for instance svstematic structure transformed from terminal host computer rnode to client / server struct - ure mode, network circumstance transformed from lan to internet

    隨著技術的不斷進步和信息量成倍地增加,特別是網路技術和多媒體技術的發展,使信息處理從傳統模式向新型模式轉變,體系結構從終端方式到客戶服務器結構方式、網路環境從局域網到internet等開放網、信息結構從結構化到非結構化等,這些變化必將促使信息檢索技術的研究和不斷發展,以滿足人們對提高信息獲取能力的需要。
  8. In version 6, the companion application server toolkit enables customers to define websphere configuration elements, such as datasources and virtual hosts, as a part of the application

    在版本6中,伴隨的application server toolkit使用戶可以定義websphere配置元素,比數據源和虛擬,作為應用程序的一部分。
  9. Suitable for : bare - bone series, asus, gigabyte, epox designed usb connectors mainboard

    Usb接頭可適合:華升,華碩,技嘉, epox等專用usb插頭
  10. But the previous research works mainly focused on the screening of environment persistent pollutants, such as organochlorine insecticides and alkylphenol, to our knowledge, no report on the residual toxicity and environmental estrogens effects has been existed in the literature yet

    但目前為止,要集中於環境中持久性有污染物氯農藥和烷基酚類化合物的篩選上,而我國是農業大國,大量地使用了有磷農藥,其殘留毒性及環境雌激素效應的研究還尚未見報道。
  11. This is a free hosting service based in austria, so you shouldn t be surprised if the date format isn t familiar to your native language

    這是位於奧地利的一個免費服務,所以果日期格式與您的母語不相同時不要感到意外。
  12. For example, an attacker may break into a honeynet, then launch an outbound attack never seen before, successfully harming or compromising its intended victim

    說,一個攻擊者可能侵入蜜網,然後發起一次對外的以前從來沒見過的攻擊,成功的損害或攻陷了它的目標
  13. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,要表現在ip網路的開放性,來自外部的攻擊增多,dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,人員安全意識不強,安全制度不夠健全等多方面原因。
  14. If the host pulls clock low before the first high - to - low clock transition, or after the falling edge of the last clock pulse, the keyboard / mouse does not need to retransmit any data

    果在第一個高- >低時鐘跳變時, (或者在最後一個時鐘脈沖的下降沿之後)將時鐘拉低,鍵盤/鼠標不必重新傳輸任何數據。
  15. The entries are hierarchically organized so as to indicate a hierarchical organization of the entries as provided for retrieval fro m the remotely accessible server nodes which hierarchical order of retrieval is independent of a specific order of retrieval by the host node

    進入點是一個階層式的組織此去指示一個階層式有組織的進入點當作為了從遠端可擷取伺服器節點取得所提供的資料,此伺服器節點取得所提供的資料,此伺服器節點的階層式取得的命令是被節點將其取得的特別命令給獨立化。
  16. Other professional convention equipment and facilities such as an organiser office with amenities, registration counters, video wall, and an interpretation service are available upon request

    應個別會議需要,會展中心亦可提供其他專業會議設施及服務,例構辦公室、與會人士登記櫃位及即時傳譯服務等。
  17. The vary of the parameter of the steam ). the software provide function of " alert " if some parameters exceed the range of permission, and this may urge the operator to adjust operation condition and put right. meanwhile, this may promise the units under the conditions of optimization, and achieve lower net coal consumption rate of thermal power plant and higher generation efficiency

    同時,這套系統可以在線分析熱力系統的各小指標蒸汽參數、抽汽參數和排汽參數在偏離目標值時所引起的煤耗額外增加值,對于偏離目標值超過允許范圍時的參數提出報警,以提醒運行人員調整運行,糾正偏差,使各參數都運行在最佳狀態,從而降低煤耗,提高組的運行效率。
  18. As we know, pneumatic operation system for marine engine is an important component of the marine engine controlling system. without being manipulated properly and adroitly or failing to resolve relevant faults in time, the normal running of the shipping will be endangered

    眾所周之,船舶氣動操作模擬系統是控制系統中的一個重要的組成部分,未能正確熟練地對其進行操作或及時地排除相關故障將直接影響到船舶的運行安全。
  19. Parameters such as host session connection pooling are set up for the connection to the host application

    應用程序的連接設置如主機會話連接池等的參數。
  20. There can be other reasons, such as domain name lookup failure. try to use an explicit ip address if possible

    也可能還有其他原因,如主機名查找失敗。果可能,請盡量使用顯式的ip地址。
分享友人