在计算机系统中,硬件提供基本的计算资源。
In a computer system the hardware provides the basic computing resources.
BIOS在计算机系统中扮演着重要的作用。
翻译为:在计算机系统中的最小单位的信息被称为一个字节。
The smallest unit of information in a computer system is called a byte.
信息安全在计算机系统中,尤其在分布式系统中是至关重要的。
Security is very important in the computer systems, especially in the distributed systems.
在计算机系统中建立规避机制很困难,因为它需要一个能力更强大的界面。
Fudgeability can be difficult to build into a computer system because it demands a considerably more capable interface.
时钟电路在计算机系统中起着非常重要的作用,是保证系统正常工作的基础。
The clock electric circuit is playing the extremely vital role in the computer system, is guarantees the system normal work the foundation.
是在计算机系统中同时存在多个程序,宏观上看,这些程序是同时向前推进的。
In the computer systems co-exist in a number of procedures, macro perspective, these procedures are also to move forward.
在计算机系统中,我们认为“策略是根据给定的条件从候选过程中选择行动过程”。
In computer systems we assert a clarification that a policy is a "course of action selected from alternatives in light of given conditions".
网络游戏是属于虚拟现实模拟系统的一种,它们都具有在计算机系统中创建出具有沉浸性、真实感的场景的强大功能。
Online games are a kind of virtual reality simulation system; they all have the strong ability to create a computer system with immersive, realistic scenes.
美国在这方面,有着众多的法律,比如萨班斯法案,健康保险流通与责任法案以及其它的法律,它们都对存储在计算机系统中的数据的安全性有着相应的要求。
There are many laws in effect here in the United States such as Sarbanes-Oxley, HIPPA and many others that require data stored in computer systems to be secured.
在计算机系统环境中,物理标记的一个问题是必须为系统的每个客户机提供某类输入设备。
In the context of computer systems, one problem with physical tokens is that some sort of input device is necessary for every client to the system.
您是否将您的顾客,客户,供应商,厂商及雇员的信息存储在一个计算机系统中呢?
Do you store information about your customers, clients, suppliers, vendors, and your employees on a computer system?
书面贷款申请首先转到数据验证员,验证员在遗留计算机系统中查找客户信息,并将这些信息与书面申请中的内容相比较。
A paper loan application first goes to a data validator who looks up the customer information in a legacy computer system, and compares it to what is on the paper application.
在硬件虚拟化中,hypervisor向访客操作系统提供底层计算机系统的虚拟化抽象。
In hardware virtualization, the hypervisor provides the virtualization abstraction of the underlying computer system to the guest operating systems.
在一个研究中,参与者被要求在电脑上做一项数学测试,事先已告诉他们,测试中,计算机系统会对测试进行干扰。
In one study, participants took a maths test on a computer after being warned there were glitches in the system.
Baldwin和Clark12似乎是最早发现模块化在(计算机系统)设计中的价值可以作为选项被建模的人。
Baldwin and Clark 12 appear to have been the first to observe that the value of modularity in design (of computer systems) can be modeled as options.
单片机是将运算器、存储器、定时器、模数转换器和串行通信接口等集成在一个芯片上的小型计算机系统,它可以被嵌入到各种自动控制器和智能电子产品中。
Microcontroller is a small computer system that integrates ALU, memory, timer, ADC, UART, etc in one chip. it can be embedded into many kinds of controllers and intelligent electronic products.
在传统的医学模式中,病历(在纸上或专有的计算机系统中)只能由医生或其他医疗专家访问。
Traditional models of medicine had patient records (held on paper or a proprietary computer system) that could only be accessed by a physician or other medical professional.
分析了干扰在弹上计算机系统中的不同作用机理和影响,研究了两种不同作用效果下的抗干扰设计的解决办法。
This paper analyzed the different mechanism of interference and its effect in Missile-borne computer, and studies solution anti-interference design under two aspects of different mechanism.
在多计算机系统中,通信对性能的影响是至关重要的。
The performance of a multicomputer is greatly affected by communication overhead.
在个人计算机系统中,常用的输出设备是显示屏和台式打印机。
In personal computer systems, display screen and desktop printers are popular output devices.
该文介绍了如何使用虚拟机软件,在计算机教学中为学生演示计算机系统的底层设置和操作系统地安装。
The essay presents how to use Virtual Machine software to demonstrate the setup of computer system bottom layer and the installation of operating system to students in teaching.
在客户计算机系统中包括网络适配器。
A network adapter is included within the client computer system.
分析计算机系统安全标准的演化过程,以及安全评价标准在安全产品评价中的实际应用情况。
The evolution history of computer security evaluation criteria and the application of security evaluation criteria to the evaluation of security products are analyzed.
计算机虚拟化的进程中运行两个或更多的合乎逻辑的计算机系统在一套物理硬件。
Computer virtualization is the process of running two or more logical computer systems on one set of physical hardware.
然后,概括地介绍了系统的入侵检测技术,其中包括神经网络、专家系统等人工智能技术在计算机系统入侵检测中的应用。
Then, several intrusion detection techniques are presented, in which artificial intelligent techniques such as neural networks and expert systems are included.
随着信息技术的飞速发展,存储系统在整个计算机系统中的地位日益突出,而存储“瓶颈”问题却日益严峻。
With the development of information technology, storage subsystem is becoming more and more outstanding in the whole computer system, but the problem of storage bottleneck is becoming acute.
随着信息技术的飞速发展,存储系统在整个计算机系统中的地位日益突出,而存储“瓶颈”问题却日益严峻。
With the development of information technology, storage subsystem is becoming more and more outstanding in the whole computer system, but the problem of storage bottleneck is becoming acute.
应用推荐