幫忙翻譯成計(jì)算機(jī)的英文啊,要專業(yè)點(diǎn)的 幫我翻譯成英語(yǔ),計(jì)算機(jī)方面的。專業(yè)一點(diǎn)的說(shuō)
Single Sign-on
Single sign-on is not only a safe solution but also a solution that can increase system availability. In view of so many current computer applications that computer users generally have too much identification information (username or user ID) and too much authentication information (password), single sign-on comes into being.
單點(diǎn)登錄的存在不是基于安全技術(shù)層次的原因,而是因?yàn)橛脩舻男袨椋沟脝吸c(diǎn)登錄不得不存在。如果對(duì)于每一個(gè)應(yīng)用或數(shù)據(jù)庫(kù),用戶的身份識(shí)別信息各不相同,密碼也各不相同,那么用戶就必須擁有超凡的記憶力才能記住如此多的身份識(shí)別信息和密碼。用戶管理如此多的用戶名和密碼的惟一的方法是把這些用戶名和密碼寫在一張紙上,這雖然比把用戶名和密碼放在他們自己的腦袋中要省事得多,但是卻大大增加了安全風(fēng)險(xiǎn)。
The existence of single sign-on which has to come true is not because of the level of security technology, but due to users' behaviour. Regarding each application or database, because users' identifiable information varies from person to person and so do passwords, users must have exceptional memories to remember so much identification information and so many passwords. Although the only way that users manage so many usernames and passwords is to take them down on paper, which is much more convenient than to keep them in mind, it greatly increases security risk.
解決這個(gè)問(wèn)題的一個(gè)方法,就是把所有的用戶名以及(或)密碼都設(shè)置成相同的。雖然這樣可以解決需要記憶眾多用戶名和密碼的問(wèn)題,但卻讓計(jì)算機(jī)環(huán)境的可用性降低。一遍又一遍地輸入用戶名和密碼是很枯燥的任務(wù),尤其是當(dāng)需要輸入包含很多字母、數(shù)字、標(biāo)志符的高強(qiáng)度密碼時(shí),情況更是如此。
One way of solving this problem is to identically set all usernames and passwords. Although the problem is solved, the availability of the computer environment is reduced. It is a dull job to enter usernames and passwords again and again, especially in the case of entering the high-intensity password which contains a lot of letters, figures, and signs.
因此,正如其名字所示,單點(diǎn)登錄將使得計(jì)算環(huán)境更加可用。也就是說(shuō),用戶僅需要認(rèn)證他們自身一次,而不管他們需要訪問(wèn)多少次的應(yīng)用。這樣也可以維護(hù)良好的安全性,因?yàn)橛脩糁挥形┮坏挠脩裘兔艽a。密碼的管理也很簡(jiǎn)單,因?yàn)槊艽a僅需要被更改一次,而不管有多少的應(yīng)用。
Therefore, as what its name implies, single sign-on computing environment will be more available. That is to say, a user needs to authenticate one's own ID only one time, regardless of how many times one needs access to applications. Thus users can use exclusive ID to maintain a good security. With easy management of ID, which is only changed once, users can have unlimited access to applications.
可以有很多方法實(shí)現(xiàn)單點(diǎn)登錄,根據(jù)用戶提供的識(shí)別信息的不同,各方法有很大不同,而且用來(lái)完成單點(diǎn)登錄這一任務(wù)的方法也各不一樣。目前使用最為廣泛的是Kerberos、DCE和基于PKI的方案。單點(diǎn)登錄的實(shí)質(zhì)是確保其一致性,不管如何具體實(shí)現(xiàn),目的則是在一個(gè)應(yīng)用與另一個(gè)應(yīng)用之間安全地傳播用戶的識(shí)別信息,從而不會(huì)每次都讓用戶費(fèi)心。當(dāng)正確使用后,單點(diǎn)登錄既可以提高可用性,又是安全的解決方案。
There may be many ways to sign in with single sign-on. According to different information users provide, the ways differ from one another and the way to finish single sign-on also veries from person to person. At present, the most widely used way is Kerberos, DCE and the PKI-based program. The essence of sigle sign-on is to guarantee the consistency, regardless of how to concretely realize it, aimed at disseminating the user's identification information safely in one application and another so that each time the user will not need to take a lot of trouble. When used correctly, not only can single sign-on improve the availability, but it is also a safe solution.
單點(diǎn)登錄并不是缺乏挑戰(zhàn)的。當(dāng)試圖組合由不同商家提供的平臺(tái)和產(chǎn)品時(shí),就面臨著實(shí)現(xiàn)可實(shí)用的單點(diǎn)登錄這一挑戰(zhàn)。使用既定事實(shí)的或工業(yè)的標(biāo)準(zhǔn),例如Kerberos和PKI,則有助于解決互操作問(wèn)題。
Single sign-on does not have lack of challenges. When platforms and products provided by different businesses are tried to combine, single sign-on is faced with the challenges of practical realization. The use of the standard of an established fact or the industry, for example, Kerberos and PKI, is very helpful in the solution of interoperability.
當(dāng)用戶登錄他們的單點(diǎn)登錄環(huán)境,并離開(kāi)從而留下開(kāi)放并經(jīng)過(guò)認(rèn)證的終端時(shí),會(huì)產(chǎn)生單點(diǎn)登錄的安全風(fēng)險(xiǎn)。此時(shí),如果有惡意的用戶或好奇的同事決定對(duì)這開(kāi)放的、并經(jīng)過(guò)認(rèn)證的終端探究一番時(shí),很可能就是一場(chǎng)災(zāi)難。他們不僅僅只是得到一個(gè)應(yīng)用的授權(quán),而是得到了所有應(yīng)用的授權(quán)。
When users log on their single sign-on environments, and then leave and let open the certified terminal, the security risks of single sign-on will take place. During this time, if a user with evil intention or a curious colleague is determined to probe into the open and certified terminal, probably it will be a destruction. They obtain not only one authorized application but all ones.
可以有幾個(gè)方法解決上述問(wèn)題:首先,用戶應(yīng)該在離開(kāi)計(jì)算機(jī)系統(tǒng)前有意識(shí)地鎖定計(jì)算機(jī);其次,計(jì)算機(jī)應(yīng)該被設(shè)置為在空閑一段時(shí)間后能自動(dòng)鎖定;最后,單點(diǎn)登錄的服務(wù)可以讓不活躍的對(duì)話超時(shí)退出。使用上述三個(gè)方法,提供了深度防御的保護(hù),從而確保安全風(fēng)險(xiǎn)不會(huì)真正產(chǎn)生實(shí)際的安全事故。
There are several ways to avoid the above problems. Firstly, when the user leaves one's computer system, one should lock the computer system consciously. Secondly, the computer should be set to lock itself automatically after a period of idle time. Finally, the service of single sign-on can make the inactive conversation overtime and exit. With the above three ways used and defense-in-depth protection provided, security risks are ensured to be unable to produce the actual security accidents really.
與認(rèn)證用戶同樣重要的是讓用戶退出認(rèn)證的能力。為了確保其他用戶不能進(jìn)入閑置的已經(jīng)通過(guò)認(rèn)證的計(jì)算機(jī),并重用經(jīng)過(guò)認(rèn)證的會(huì)話,給予用戶登出系統(tǒng)的能力也是非常重要的。監(jiān)測(cè)用戶已登出單點(diǎn)登錄系統(tǒng)環(huán)境是簡(jiǎn)單、有效的方法,可以確保部署的單點(diǎn)登錄方案不會(huì)被那些未授權(quán)訪問(wèn)者、竊賊或數(shù)據(jù)破壞者利用。
It is equally important for the authenticated user to have the right to exit from the certification. In order not to allow unauthenticated users to probe into the certificated computer, it is very important to reuse the certified conversations to authorize the user the ability to log off the system. It is a very easy and effective way to monitor a user who has exited from the single sign-on system. By monitoring the user of single sign-on, the deployment of single sign-on program will not be made use of by unauthorized visitors, burglars or data destroyers.
對(duì)于數(shù)據(jù)竊賊來(lái)說(shuō),集中的單點(diǎn)登錄服務(wù)將是他們最優(yōu)先的目標(biāo)。如果單點(diǎn)登錄服務(wù)的信息被竊取或泄露,那么黑客就可能獲取關(guān)于用戶的一大堆的敏感且有價(jià)值的信息。確保部署有效且成功的單點(diǎn)登錄的關(guān)鍵因素,是保護(hù)對(duì)服務(wù)以及服務(wù)內(nèi)部的訪問(wèn),并滿足高效的需求。
Regarding data burglars, the mass single sign-on services will be their highest priority objectives. If the information of single sign-on service is stolen or revealed, hackers will obtain a mass of a user's sensitive and valuable information. The key factor to ensure effective and successful deployment of single sign-on is the protection of services, as well as access to internal services, and to meet the demand for high-performance.
Single Sign - on
SSO (single sign-on) is a security solution, but also increase system availability solutions. Single Sign-gestation due to the current computer applications, for so many applications, it is generally have too much identification information (user name), as well as too many authentication information (password).
Single Sign-existence is not based on the level of security reasons, but because the user's behavior, have to make the existence of single sign. If for each application or database, the user identification information are different, different password, the user must have excellent memory to remember so many identification information and password. User Management so many user name and password the only way is to these user names and passwords written on a piece of paper, which although the user name and password on their own head to be much easier, but greatly increased the safety risk.
A solution to this problem is to put all the user name and (or) password are set to the same. While this can be solved need to remember many user names and passwords of the problem, but it reduced the availability of the computer environment. Again and again to enter a user name and password is a very boring task, especially when the need to enter contains a lot of letters, numbers, the high-intensity identifier code, the situation even more so.
Therefore, as its name implies, single sign-computing environment will allow more available. In other words, users need only a certification of their own, regardless of how many times they need to access applications. This can also maintain good security, because the user only the only user name and password. Password management is also very simple, because the password needs to be changed only once, regardless of the number of applications.
There are many ways to achieve single sign-on, based on user identification information provided by the different, the methods are very different, and used to complete this task single sign method also varies. At present, the most widely used is Kerberos, DCE and PKI based on the program. SSO is to ensure that the essence of consistency, regardless of how achieved, the purpose of an application is in another application and dissemination of security between the user's identification information, which does not allow users to worry about every time. When used correctly, the single sign can enhance the availability, it is safe solutions.
SSO is not the lack of challenges. When I try different combinations to provide a platform for businesses and products, it can be faced with the realization of practical single sign this challenge. The use of established facts or industry standards, such as Kerberos and PKI, will help solve the interoperability problem.
When users log on to their single sign-environment, and to leave in order to leave open the terminal and when certified, will have single sign-security risks. At this point, if there is a malicious user or curious colleagues decided to open, and has been certified into a terminal, it is probably a disaster. Their application is not just a mandate, but all applications have been authorized.
There are several ways to address these problems: First of all, users should leave the computer system in the pre-conscious to lock the computer; Secondly, the computer should be set to idle after a period of time can be automatically locked; Finally, the single sign of the service allows non-active overtime to withdraw from the dialogue. The use of the above three methods, provided a defense-in-depth protection to ensure that security risks do not really have a real security incidents.
And authentication of users is equally important is to allow users the ability to withdraw from the certification. In order to ensure that other users can not enter the idle computer has passed certification and re-certified by the conversation, to give users the ability to log off the system is also very important. Users have been sent to monitor the single sign-system environment is simple, effective way to ensure that the deployment of single sign program will not be those who have not authorized visitors, or data thieves use spoilers.
For data thieves, the focus on the single sign-services will be their top priority goals. If the single sign-services stolen or leaked, then the hacker could access on the user's a mass of sensitive and valuable information. To ensure effective and successful deployment of Single Sign-a critical factor in the protection of services, as well as access to internal services and to meet the demand for high-performance.
Single Sign -
SSO (single sign-on) is a security solution, but also increase system availability solutions. Single Sign-gestation due to the current computer applications, for so many applications, it is generally have too much identification information (user name), as well as too many authentication information (password).
Single Sign-existence is not based on the level of security reasons, but because the user's behavior, have to make the existence of single sign. If for each application or database, the user identification information are different, different password, the user must have excellent memory to remember so many identification information and password. User Management so many user name and password the only way is to these user names and passwords written on a piece of paper, which although the user name and password on their own head to be much easier, but greatly increased the safety risk.
A solution to this problem is to put all the user name and (or) password are set to the same. While this can be solved need to remember many user names and passwords of the problem, but it reduced the availability of the computer environment. Again and again to enter a user name and password is a very boring task, especially when the need to enter contains a lot of letters, numbers, the high-intensity identifier code, the situation even more so.
Therefore, as its name implies, single sign-computing environment will allow more available. In other words, users need only a certification of their own, regardless of how many times they need to access applications. This can also maintain good security, because the user only the only user name and password. Password management is also very simple, because the password needs to be changed only once, regardless of the number of applications.
There are many ways to achieve single sign-on, based on user identification information provided by the different, the methods are very different, and used to complete this task single sign method also varies. At present, the most widely used is Kerberos, DCE and PKI based on the program. SSO is to ensure that the essence of consistency, regardless of how achieved, the purpose of an application is in another application and dissemination of security between the user's identification information, which does not allow users to worry about every time. When used correctly, the single sign can enhance the availability, it is safe solutions.
SSO is not the lack of challenges. When I try different combinations to provide a platform for businesses and products, it can be faced with the realization of practical single sign this challenge. The use of established facts or industry standards, such as Kerberos and PKI, will help solve the interoperability problem.
When users log on to their single sign-environment, and to leave in order to leave open the terminal and when certified, will have single sign-security risks. At this point, if there is a malicious user or curious colleagues decided to open, and has been certified into a terminal, it is probably a disaster. Their application is not just a mandate, but all applications have been authorized.
There are several ways to address these problems: First of all, users should leave the computer system in the pre-conscious to lock the computer; Secondly, the computer should be set to idle after a period of time can be automatically locked; Finally, the single sign of the service allows non-active overtime to withdraw from the dialogue. The use of the above three methods, provided a defense-in-depth protection to ensure that security risks do not really have a real security incidents.
And authentication of users is equally important is to allow users the ability to withdraw from the certification. In order to ensure that other users can not enter the idle computer has passed certification and re-certified by the conversation, to give users the ability to log off the system is also very important. Users have been sent to monitor the single sign-system environment is simple, effective way to ensure that the deployment of single sign program will not be those who have not authorized visitors, or data thieves use spoilers.
For data thieves, the focus on the single sign-services will be their top priority goals. If the single sign-services stolen or leaked, then the hacker could access on the user's a mass of sensitive and valuable information. To ensure effective and successful deployment of Single Sign-a critical factor in the protection of services, as well as access to internal services and to meet the demand for high-performance
single sign-on
SSO (single sign-on) is a security solution, but also increase system availability solutions. Single Sign-gestation due to the current computer applications, for so many applications, it is generally have too much identification information (user name), as well as too many authentication information (password).
Single Sign-existence is not based on the level of security reasons, but because the user's behavior, have to make the existence of single sign. If for each application or database, the user identification information are different, different password, the user must have excellent memory to remember so many identification information and password.User Management so many user name and password the only way is to these user names and passwords written on a piece of paper, which although the user name and password on their own head to be much easier, but greatly increased the safety risk.
A solution to this problem is to put all the user name and (or) password are set to the same. While this can be solved need to remember many user names and passwords of the problem, but it reduced the availability of the computer environment.Again and again to enter a user name and password is a very boring task, especially when the need to enter contains a lot of letters, numbers, the high-intensity identifier code, the situation even more so.
Therefore, as its name implies, single sign-computing environment will allow more available. In other words, users need only a certification of their own, regardless of how many times they need to access applications. This can also maintain good security, because the user only the only user name and password.Password management is also very simple, because the password needs to be changed only once, regardless of the number of applications. There are many ways to achieve single sign-on, based on user identification information provided by the different, the methods are very different, and used to complete this task single sign method also varies. At present, the most widely used is Kerberos, DCE and PKI based on the program. SSO is to ensure that the essence of consistency, regardless of how achieved, the purpose of an application is in another application and dissemination of security between the user's identification information, which does not allow users to worry about every time. When used correctly, the single sign can enhance the availability, it is safe solutions.
SSO is not the lack of challenges. When I try different combinations to provide a platform for businesses and products, it can be faced with the realization of practical single sign this challenge. The use of established facts or industry standards, such as Kerberos and PKI, will help solve the interoperability problem.
When users log on to their single sign-environment, and to leave in order to leave open the terminal and when certified, will have single sign-security risks. At this point, if there is a malicious user or curious colleagues decided to open, and has been certified into a terminal, it is probably a disaster.
There are several ways to address these problems: First of all, users should leave the computer system in the pre-conscious to lock the computer; Secondly, the computer should be set to idle after a period of time can be automatically locked; Finally, the single sign of the service allows non-active overtime to withdraw from the dialogue.The use of the above three methods, provided a defense-in-depth protection to ensure that security risks do not really have a real security incidents. And authentication of users is equally important is to allow users the ability to withdraw from the certification. In order to ensure that other users can not enter the idle computer has passed certification and re-certified by the conversation, to give users the ability to log off the system is also very important. Users have been sent to monitor the single sign-system environment is simple, effective way to ensure that the deployment of single sign program will not be those who have not authorized visitors, or data thieves use spoilers.
For data thieves, the focus on the single sign-services will be their top priority goals. If the single sign-services stolen or leaked, then the hacker could access on the user's a mass of sensitive and valuable information.To ensure effective and successful deployment of Single Sign-a critical factor in the protection of services, as well as access to internal services and to meet the demand for high-performance.
Not only is single sign-on a security solving plan, it also a plan that would increase the system's usability. The creation of single sign-on was due to the great number of current application of computers which heavily burden users with too many identity recognition information (user name) and too many verification information (passwords).
The existence of single sign-on is not due to the security technological layers, but is the result of users' conduct which make the existence of single sign-on indispensible. If every application or data bank requires a user to have different recognition information and password every time he or she needs to gain access to the data bank, he or she would need to have an above average memory power to remember those identity recognition information and passwords, the only way for an user to manage such a great number of user names and passwords is to write all of them down on a sheet of paper, although it is far easier to write those user names and passwords down onto paper, however, by doing so would greatly increase the security risk.
One way of solving the problem is to make all user names and (or) passwords identical, although this would solve the problem of having to remember lots of user names and passwords, it has,however,
reduced the usability of computer environment.repeatedly logging in user names and passwords is a boring task, it is especially so when logging passwords containing many letters,numerals and symbols.
Therefore, just as its name suggests, single sign-on would increase the usability of computer environment. In other words, users only required to authenticate themselves once regardless of the number of application they use.In this way, good security also would be maintained, because user has only one user name and password. The management of password is also very simple, because password needs to be changed only once regardless of the number of usage.
There are many ways to achieve single sign-on, the methods vary according to users'different information of distinguishing supplied by the users, moreover, the method of completing the single sign-on loggin on procedure is also different. Currently Kerberos,DCE and PKI are the most widely used plans.The real essence of the single sign-on is the gaurantee of its nature of consistency, regardless of how specifically realized, it never let users down everytime.. Once used properly, single sign-on not only could increase usability, but also is a security solving plan.
It is not that single sign-on lacking in chellenge.When attempt was made to assemble platforms and products from various merchants, it was instantly faced with the chellenge of the realization of the practical usage of single sign-on. The usage confirms the standard of facts and industries, for instant,Kerberos and PKI are conducive to solving the problem of mutual operation.
When users log onto their single sign-on setting, and then leave the already authenticated end open and left their computers unattended,this action would cause security risk to the single sign-on plan. At this very moment, if an ill-intention user or a curious colleague decides to investigate this end bit which is open and authenticated, the outcome could be disastrous. Theey don't merely obtain one single application authorization, but all application authorization.
There are some methods to solve the problems mentioned above:
Firstly,users should consciously lock their computers before leaving their computer systems; next, computers should be set to automatically lock out after they have been idle for a period of time: finally,single sign-on servive is able to let inactive dialogues to be aborted if over the time limit set.Using the three methods mentioned above would provide a high degree of preventive protection, and thus ensure security risk would not really cause the real security incidents.
It is just as important that authenticated users are given the ability to abort authentication, for the purpose of not letting other users to enter an unattended and authenticated computer, and put authenticated dialogues in key position,and to give users the ability to log out from the system is also very important. Monitoring users who have logged out from single sign-on system setting is a simple and effective way to ensure the set up of single sign-on plan would have no access to operation by to unauthorized visitors,thieves and data saboteurs.
As far as data thieves are concerned, top of their targets would be the concentrated single sign-on service.If single sign-on service's information is stolen or exposed, then the hacker would be able to obtain lots of sensitive and valuable informations.
The key factors of ensure protection for the set up and the success of logging onto the single sign-on facility is to protect the service and the visits to the interior of the service,and to meet the demand for high efficiency.
1、電子信息科學(xué)與技術(shù):電子信息科學(xué)與技術(shù)專業(yè)培養(yǎng)具備電子信息科學(xué)與技術(shù)的基本理論和基本知識(shí),受到嚴(yán)格的科學(xué)實(shí)驗(yàn)訓(xùn)練和科學(xué)研究初步訓(xùn)練,能在電子信息科學(xué)與技術(shù)、計(jì)算機(jī)科學(xué)與技術(shù)及相關(guān)領(lǐng)域和行政部門從事科學(xué)研究、教學(xué)、科技開(kāi)發(fā)、產(chǎn)品設(shè)計(jì)、生產(chǎn)技術(shù)管理工作的電子信息科學(xué)與技術(shù)高級(jí)專門人才。
2、信息科學(xué)技術(shù)專業(yè):信息科學(xué)技術(shù)專業(yè)是一個(gè)大學(xué)專業(yè),培養(yǎng)具有扎實(shí)的數(shù)學(xué)、物理、電子和計(jì)算機(jī)的基礎(chǔ)知識(shí),系統(tǒng)地掌握光學(xué)信息處理技術(shù)、現(xiàn)代電子學(xué)技術(shù)和計(jì)算機(jī)應(yīng)用技術(shù)的基本技能。
3、能在光通信、光學(xué)信息處理、以及相關(guān)的電子信息科學(xué)、計(jì)算機(jī)科學(xué)等信息技術(shù)領(lǐng)域、特別是光機(jī)電算一體化產(chǎn)業(yè)從事科學(xué)研究、產(chǎn)品設(shè)計(jì)和開(kāi)發(fā)、生產(chǎn)技術(shù)或管理的面向二十一世紀(jì)的高級(jí)專門人才。
4、數(shù)字媒體:數(shù)字媒體屬于工學(xué)學(xué)科門類,是指以二進(jìn)制數(shù)的形式記錄、處理、傳播、獲取過(guò)程的信息載體,這些載體包括數(shù)字化的文字、圖形、圖像、聲音、視頻影像和動(dòng)畫等感覺(jué)媒體,和表示這些感覺(jué)媒體的表示媒體(編碼)等,通稱為邏輯媒體,以及存儲(chǔ)、傳輸、顯示邏輯媒體的實(shí)物媒體
計(jì)算機(jī)專業(yè)一些專業(yè)俗語(yǔ)的英文縮寫
PC:個(gè)人計(jì)算機(jī)Personal Computer ·CPU:中央處理器Central Processing Unit ·CPU Fan:中央處理器的“散熱器”(Fan) ·MB:主機(jī)板MotherBoard ·RAM:內(nèi)存Random Access Memory,以PC-代號(hào)劃分規(guī)格,如PC-133,PC-1066,PC-2700 ·HDD:硬盤Hard Disk Drive ·FDD:軟盤Floopy Disk Drive ·CD-ROM:...
計(jì)算機(jī)的英文
計(jì)算機(jī)的英文是 "computer",它指的是一種用于處理數(shù)據(jù)和執(zhí)行指令的電子設(shè)備。下面是與 "computer" 相關(guān)的雙語(yǔ)例句:1. 我每天都使用計(jì)算機(jī)來(lái)完成工作任務(wù)。I use a computer every day to complete work tasks.2. 這臺(tái)計(jì)算機(jī)的處理速度非常快。This computer has a very fast processing speed.3. ...
計(jì)算機(jī)應(yīng)用專業(yè)英文?
“計(jì)算機(jī)應(yīng)用技術(shù)”"puter applications"“計(jì)算機(jī)應(yīng)用技術(shù)” 這個(gè)專業(yè) "puter applications" This professional 『陸』 “計(jì)算機(jī)應(yīng)用技術(shù)”用英語(yǔ)怎么說(shuō) 計(jì)算機(jī)應(yīng)用技術(shù)要分好多種類的,有些比如像算法這類的,數(shù)學(xué)得好,但是還有好多方面和數(shù)學(xué)關(guān)系不是很大.英語(yǔ)也是的,學(xué)計(jì)算機(jī)的好牛人英語(yǔ)都是很爛的,這點(diǎn)你...
專業(yè)翻譯成英文怎么寫
在英文中,“專業(yè)”翻譯成“major”或“profession”取決于具體情境。如果你指的是大學(xué)本科或研究生階段的專業(yè)選擇,使用“major”更為合適。例如,可以說(shuō)“I am majoring in computer science.”如果你是在談?wù)撘粋€(gè)人的職業(yè)或職業(yè)領(lǐng)域,則使用“profession”更為恰當(dāng),如“Her profession is a doctor.”...
求助各英文高手,計(jì)算機(jī)方面的請(qǐng)求翻譯
C語(yǔ)言: C language 或者programming language C WINDOWS NT\/2000\/XP 操作系統(tǒng):WINDOWS NT\/2000\/XP operating system 計(jì)算機(jī)網(wǎng)絡(luò) :Computer Network 數(shù)據(jù)庫(kù)技術(shù): database Technology 面向?qū)ο蟮南到y(tǒng)分析與設(shè)計(jì) :object-oriented analysis and design Java語(yǔ)言 :java language 專業(yè)英語(yǔ): professional ...
幫忙翻譯下計(jì)算機(jī)專業(yè)英語(yǔ)
16歲。主要處理器。在一個(gè)多處理計(jì)算機(jī),主要的處理器。有時(shí)的同義詞。 17。操作數(shù)。這個(gè)部分的指令,指定寄存器和\/或內(nèi)存位置,參與操作。18歲。運(yùn)行代碼。這個(gè)部分的指令指定將要進(jìn)行的手術(shù);例如,加法,減法,等等。19。處理器。組件的計(jì)算機(jī)選擇并執(zhí)行指令。處理器包含一個(gè)時(shí)鐘,一條指令控制單元,一個(gè)...
計(jì)算機(jī)的英文怎么說(shuō)?
若計(jì)算機(jī)出現(xiàn)故障,我們可能會(huì)說(shuō)它c(diǎn)rashed,此時(shí)可能需要尋求computer service\/part的幫助。計(jì)算機(jī)人才是指在計(jì)算機(jī)領(lǐng)域內(nèi)具備專業(yè)技能的人,他們可以是general\/special purpose computer的專家。計(jì)算機(jī)已深深融入我們的生活,形成了computer era\/age。一些計(jì)算機(jī)設(shè)計(jì)用于執(zhí)行特定任務(wù),而另一些則更為通用,如all-in...
計(jì)算機(jī)專業(yè)英語(yǔ)翻譯
IC --integrated circuit --集成電路 LSI -- Large Scale Integration -大規(guī)模集成電路 SLSI -- Super-Large Scale Integration --超大規(guī)模集成電路 notetook -- A portable computer small enough to use on one's lap. --筆記本電腦 PDA -- personal digital assistant --個(gè)人數(shù)字助理 monnitor...
求英語(yǔ)高手幫忙翻譯幾個(gè)計(jì)算機(jī)專業(yè)英語(yǔ)單詞
1.Data Structures and Algorithmic 2.The Basic Java Programming 3.Operating System 4.Java Web Programming 5.DataBase Theory 6.Object Oriented Programming 7.Visual Basic Programming 8.C++ Programming 9.Advanced Mathematics 10.The Error Analysis and Maintain for PC 11.UNIX\/Linux Technology ...
我的專業(yè)是計(jì)算機(jī)的英語(yǔ)是“My major in”還是“I major in”?_百度...
I major in。詞匯:major 。adj. 重大的,主要的;嚴(yán)重的;(音樂(lè))大調(diào)的,大音階的; <舊>(公立學(xué)校中置于學(xué)生姓氏后,表示兩兄弟中)大的,年長(zhǎng)的;主修的;(邏)大(項(xiàng))的,大(前提)的 n. 主修科目,專業(yè);陸軍少校,(美國(guó))空軍少校;(某專業(yè)的)主修學(xué)生 詞語(yǔ)辨析 principal, ...
相關(guān)評(píng)說(shuō):
林西縣齒輪: ______ 邁克爾.J.弗林氏1972年提出的并行計(jì)算機(jī)構(gòu)架分類方法仍然是最通用的.弗林氏是根據(jù)數(shù)據(jù)存取和指令譯碼方式對(duì)計(jì)算機(jī)分類的.SISD計(jì)算機(jī)每次只對(duì)一條指令進(jìn)行譯碼,并且只對(duì)一個(gè)操作部件分配數(shù)據(jù).這是傳統(tǒng)的沃夫諾伊曼架構(gòu).然而對(duì)于misd構(gòu)架計(jì)算機(jī),一次對(duì)從內(nèi)存取出的同一數(shù)據(jù)按流水線方式執(zhí)行多條指令.不符合以上兩種構(gòu)架模式的計(jì)算機(jī)還沒(méi)有出現(xiàn).SISD單指令流單數(shù)據(jù)流 MISD 多指令流單數(shù)據(jù)流(Multiple Instruction Single Data ),MISD具有n個(gè)處理單元,按n條不同指令的要求對(duì)同一數(shù)據(jù)流及其中間結(jié)果進(jìn)行不同的處理.一個(gè)處理單元的輸出又作為另一個(gè)處理單元的輸入.
林西縣齒輪: ______ 計(jì)算機(jī)系計(jì)算機(jī)技術(shù)與應(yīng)用專業(yè) = Computer Technology and Application 至于“廣東職業(yè)技術(shù)師范學(xué)院”到底要怎樣翻譯,你最好就去他們的學(xué)校網(wǎng)站去看一下學(xué)校的英文名字怎樣翻譯.
林西縣齒輪: ______ CNKI對(duì)于計(jì)算機(jī)是比較好的翻譯軟件,不是軟件,就是在網(wǎng)業(yè)上弄的
林西縣齒輪: ______ PC:個(gè)人計(jì)算機(jī)Personal Computer CPU:中央處理器Central Processing Unit CPU Fan:中央處理器的“散熱器”(Fan) MB:主機(jī)板MotherBoard RAM:內(nèi)存Random Access Memory...
林西縣齒輪: ______[答案] Data of objective Data) is (the symbol, things in computer science is to show all can input to a computer by a computer program and the floorboard of the symbol processing. Data structure on the compu...
林西縣齒輪: ______ 計(jì)算機(jī)體系機(jī)構(gòu)是一門科學(xué).也是一門選擇并整合硬件設(shè)備以生成物美價(jià)廉,可以滿足我...
林西縣齒輪: ______ My name is XX, aged20, I graduated from Hebei University of Economics and Business in 2006. My major is computer science and technology. In 2006, I came to Beijing ...
林西縣齒輪: ______ his book includes computer basic knowledge of computer science, computer system structure, computer language and programming, software development, database, computer communication, computer network, Internet, computer culture, e-...
林西縣齒輪: ______ 完全,公共汽車是一套導(dǎo)線. 計(jì)算機(jī)的組分連接到公共汽車. 從一個(gè)組分寄發(fā)信息到另一個(gè),來(lái)源組分輸出數(shù)據(jù)公共汽車. 目的地組分然后輸入這數(shù)據(jù)從公共汽車. 當(dāng)計(jì)算機(jī)系統(tǒng)的復(fù)雜增加,它變得高效率(根據(jù)使減到最小的連接)在使用公...