Inside the computer screen is a virtual 1950's office, with paper documents, filing cabinets, and a garbage can.
计算机显示屏内实际上就是一间20世纪50年代的办公室,里面有文件、文件夹和一个垃圾箱。
Microsoft Corp. : U. s. computer firm, the leading developer of personal-computer software systems and applications.
微软公司:美国计算机公司,是个人计算机软件系统与应用的主要研发公司。
Network attackers steal other 's private information, attack other people' s computer system and even commit a crime by network.
网络攻击者通过网络窃取别人的个人信息、攻击别人的系统,甚至利用网络攻击进行犯罪。
The computer systems design and related services industry is expecting 45 percent job growth from 2008 to 2018, according to the U. S. Department of Labor.
根据美国劳工部门的消息,计算机系统设计和相关服务产业的就业率在2008年至2018年期间有望增长45%。
The pair, who are both sons of professors, met at Stanford University while pursuing Ph.D.'s in computer science and dropped out together when they were just 25 to start Google.
都是教授儿子的他们俩,在Stanford University攻读哲学博士的电脑课上认识,然后一齐在他们刚满25岁的时候辍学并创立Google。
Basic professional ethics would instead require him to write a DestroyCity procedure, to which Baghdad could be given as a parameter. — Nathaniel S. Borenstein, computer scientist.
然而基本的职业道德却可以要求他们开发出“摧毁城市”的程序,巴格达只是这个程序的一个参数。
Its bus, which became the S-100, was extensible enough that numerous vendors developed CARDS for the 18-slot system (such as serial CARDS and disk controllers), making it a useful computer.
其总线(变成了S- 100)扩展到足够大量供应商为18槽系统开发卡片(如串口卡和磁盘控制器),并使其成为一台有用的计算机。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
The main program is the installation program that performs the installation of your application (s) on target computer.
主程序(main program)为安装程序,执行将您的应用程序安装到目标计算机上的过程。
This page-window format is known as Window-Icon-Mouse-Pointer, or WIMP, which, due to monopoly forces, has been the universal paradigm since the 1980’s – ancient history in computer years.
这个页面视窗格式被称为视窗-图标-鼠标-指针(Window-Icon-Mouse-PointerWIMP),它是完全控制命令的产物,自20世纪80年代(计算机时代的古老历史)以来一直是通用的范例。
He was also asked about how Apple Inc. 's iPad tablet computer could change the online media equation.
他还被问及苹果公司的ipad平板电脑如何会改变在线媒体的平衡。
In December 2008, for example, 1.2 million Los Angeles citizens thought that the entire Web had gone offline, because of a crashed Time Warner D. N. S. computer.
例如2008年12月,由于时代华纳域名系统一台电脑损坏,导致120万洛杉矶人觉得整个网络都断了。
Whereas most internet entrepreneurs are geeks (think of Yahoo!’s or Google’s founders), Mr Ma first touched a computer in 1995 on a trip to Seattle.
不象其他的互联网公司的创始人是技术发烧友(想想雅虎和Google的创始人),马云在1995年去西雅图的一次旅行中才首次接触电脑。
Whereas most Internet entrepreneurs are geeks (think of Yahoo! 's or Google's founders), Mr Ma first touched a computer in 1995 on a trip to Seattle.
大多数互联网创业人士都是行家里手(比如雅虎和Google的创始人),可马云却是在1995年前往西雅图的旅途中才第一次接触电脑。
I had used Apple products in the 80's and 90's (my primary computer in my Uni years in the early 90's was a Macintosh).
80年代和90年代我也曾用过Apple的产品(90年代我上大学的时候,第一台电脑就是Macintosh)。
Desktop publishing, for example, is fundamentally not different from computer typesetting, which dates back to the mid 1960's at least.
例如,至少可追溯到1960年中期的桌面印刷,在本质上并没有不同于计算机排版。
Because hackers and identity thieves learn new ways to infiltrate computers everyday, ita s important to make your computer as hacker - and identity theft-proof as possible.
因为黑客和身份小偷每天都会学习用新的方式去渗透电脑,所以,使你的电脑能尽可能的收集到黑客和身份小偷的证据是很重要的。
A friendly technician told me to introduce the computer to the bridge first, and then the S5's.
一位好心的技术员告诉我首先要使电脑识别桥接器,然后才是S5。
This could have resulted in freed memory that an attacker could write to before it is reused, and then run arbitrary code on the victim s computer.
这可能导致攻击者可在释放内存再用前对其进行写操作,然后在用户电脑商运行任意代码。
Star Wars, Superman and Tron were among the first films to use the technique they invented, while the hand animation itself got a cameo role in 1976's Futureworld, alongside a computer generated face.
《星球大战》、《超人》和《电子世界争霸战》是第一批运用这一技术的动画片,然而其实一只动画绘制成的手在1976年的《未来世界》就得到一个“配角”角色——出现在由计算机生成的脸旁边。
A computer virus that logs keystrokes has infected computers used in Nevada to remotely pilot U. s. drones over Afghanistan and other war zones, Wired reports.
据报道近期一种能够记录敲击记录的病毒感染了内华达的美空军计算机,这些计算机用于为阿富汗及其他战区的无人机提供导航。
The factory bought a new computer made in the U. S. a.
这家工厂购置了一台美国制造的新电脑。
So rather than tell the computer in 1's and 0's ('0101010' say) to put a particular set of values into a particular circuit, you could use the phrase 'LET X=2' to mean the same.
所以,当你告诉计算机,对某个电路开关进行特定的赋值时,相比使用一串1和0的序列,比如“0101010”,你可以使用短语“LETX=2”,同样达到相同的目的。
Oracle's acquisition this year of Sun Microsystems thrust it into the computer hardware business, one of H.P. 's strong suits.
甲骨文今年收购了Sun Microsystems,标志其进军计算机硬件业务,而这正是惠普的强项之一。
这电脑是干什么的?
When she passes by a programmer, she takes a look at the codes on the programmer`s computer and kindly reminds him: "Beware, the stack is overfilled!"
很偶然地,当她经过一个程序员的身边,扫了一眼屏幕上的代码,善意地提醒他说:“小心,栈溢出了!”
When she passes by a programmer, she takes a look at the codes on the programmer`s computer and kindly reminds him: "Beware, the stack is overfilled!"
很偶然地,当她经过一个程序员的身边,扫了一眼屏幕上的代码,善意地提醒他说:“小心,栈溢出了!”
应用推荐