• Data is organized in a number of categories - Sales, Security, Computer, Internet, Communication, Financial Management, Training, etc. -, each category being further organized in sub-categories.

    同时还数据对进行了分门别类管理类别销售安全计算机因特网通信金融管理和培训每个分类又有进一步子分类

    youdao

  • Thus, you have an opportunity to install on your computer and use a special program, which would play a role of a "second echelon" for your data security.

    这样机会可以安装计算机上使用一个特殊计划计划发挥作用的“第二梯队”,您的数据安全。

    youdao

  • Delete important information or destroy data, improve system security, the password does not meet the requirements of computer networking in the block after repeated warnings.

    删除重要信息破坏数据提高系统安全行,密码符合要求计算机多次警告阻断连网

    youdao

  • In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.

    计算机安全学中,处理操作后,消磁重写数据留在存储器中的数据。

    youdao

  • Security of data in computer system is put forward and system frame design, function design, principle and method of core modules implement are all mentioned.

    提出实现了一种数据安全管理系统,对系统设计目标、框架设计、功能设计以及核心模块的实现原理方法进行了详细的论述。

    youdao

  • The paper discusses the state of existence of data in computer and the security problem in stored procedures, and carries out the exploration on data security and protection.

    本文从各类数据计算机存在状态以及存储过程中的安全问题数据的安全性保护性进行论证。

    youdao

  • Some literature named this technology of protection data and prevention of the illegal data accessing as the computer security or the system security technology.

    有些文献这些保护数据阻挡非法数据访问技术统称计算机安全系统安全技术。

    youdao

  • With the rapid development of computer networks, network data security problem becomes more serious.

    随着计算机网络飞速发展网络数据传输的安全问题也变的日趋严重。

    youdao

  • Network is faced with various security threats, and it is important to effectively protect crucial data and to improve the security of computer networks.

    通信网络面临多种多样安全威胁如何有效地保护重要数据信息提高通信网络的安全性已经成为一个日益重要的迫切任务。

    youdao

  • They also study the legal and ethical aspects of computer operation, including privacy issues and data security.

    他们必须学习关于计算机操作法律道德方面的知识,其中包括个人隐私数据安全的问题。

    youdao

  • Using the technologies such as hook, network communication, data encrypting and database, computer operation analyzing and data security managing system has been implemented.

    综合运用系统钩子网络通信数据加密数据库多种技术计算机操作行为分析数据安全管理系统的功能已经基本实现

    youdao

  • As the important line of defense of data security, network backup has been a key issue reinserted in network computer architecture.

    作为数据安全重要防线网络备份成为项被纳入网络计算机体系结构的关键问题

    youdao

  • 1 strengthen security awareness training, so that each staff to understand the importance of data security information, understanding of data security is to ensure the safety of all computer users.

    1加强安全意识培训每个工作人员明白数据信息安全重要性理解保证数据信息安全所有计算机使用者共同的责任

    youdao

  • At present, the security problem of enormous data storage in computer, the problems of data store steal and distort have been paid much attention by people.

    目前计算机大批量数据存储安全问题、敏感数据窃取篡改问题越来越引起人们的重视

    youdao

  • Since the rapidly development of the computer network and communication technology, the security of data that transfer on the network attracts more and more attentions.

    计算机网络通讯技术飞速发展今天,网络传输数据安全性成为人们日益关注的问题。

    youdao

  • It brings us a problem of data security. Factors against the safety of computer data consist in hardware, software and data input, processing, output, storage, transmission, transfer and others.

    电脑数据安全性问题随即产生包含电脑硬件软件之中,也存在于数据输入加工输出存储传输转储等的环节上。

    youdao

  • The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.

    发明属于计算机信息安全处理系统尤其属于一种外置式计算机硬盘数据加密方法及其装置。

    youdao

  • One example: She led an initiative to create a centralized data center, allowing campuses to reduce operating costs, increase computer security, and open valuable physical space on their campuses.

    一个例子是:推动集中信息中心建立使校区能够减少成本提高计算机安全性解放了各校区宝贵的实际空间

    youdao

  • In computer and data security, the person who attempts to overcome the computer or data security measures.

    计算机数据安全学中,试图攻破计算机数据安全措施

    youdao

  • The size of computer networks has made network security a critical issue. Protocol security and algorithm security are two fundamental aspects of network data security.

    网络普及使得网络安全问题日益重要协议安全性密码算法的安全性网络数据安全的两个最基本的概念。

    youdao

  • At the same time, some key problems, such as human computer interface, product engineering data modeling and description and security of the distributed system, are analyzed and described.

    同时也对人机接口产品工程数据建模以及分布式安全协同设计中关键问题解决进行了分析说明。

    youdao

  • This article analyses the process and the character of the hacker attacking the computer and the hidden troubles in the library computer data, in order to protect computer 's security.

    一则真实入侵实例分析黑客人侵过程、常用手段、特征图书馆数据安全存在隐患、危害及防范措施。

    youdao

  • Intentional delete or accidental delete always leads to computer data loss. Data recovery plays an important role in information security protection.

    恶意删除数据现象时常发生,数据恢复成败关系信息安全

    youdao

  • It destroyed the security of one's communication in Internet and the data in computer. Moreover, it disturbed the peace of personal life.

    破坏个人通信安全性、个人数据资料的安全和个人生活安宁

    youdao

  • This Trojan includes a keylogger and allows attackers to access your computer, stealing passwords and personal data. It is a registered security risk and should be removed immediately.

    木马包括键盘记录功能,允许攻击访问计算机窃取密码个人数据。

    youdao

  • In computer security, data left in storage after processing operations and before degaussing or rewriting has taken place.

    程序设计数据送入存储器工作寄存器。

    youdao

  • The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".

    研究来源于自然科学基金课题“计算机通信网络结构数据加密安全研究”。

    youdao

  • The research is from Fujian provincial natural science fund subject: "Computer & Communication Network Variable Structure Data Encryption and Security Research".

    研究来源于自然科学基金课题“计算机通信网络结构数据加密安全研究”。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定