• If the trusted PC works the way it should, an inexperienced or lackadaisical administrator won't be able to unwittingly compromise system or network security through inefficient policies.

    如果信任电脑作品应该方式一个没有经验懒洋洋管理员不会能够无意中妥协通过低效系统网络安全政策

    youdao

  • With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.

    随着信息技术飞速发展可信计算机安全方面优越性越来越受到国内外计算机领域工作者的重视。

    youdao

  • Suggestions have been made that trusted computing is both a potential threat to user privacy and a threat to the ability of the owner of a PC to use it however he or she wishes.

    民众意见认为可信计算机处理器不但是个人用户潜在威胁还是所有个人电脑使用者期待怎么使用能力一种威胁。

    youdao

  • This paper mainly studies on the security and trusted status of a PC system, points out that we can setup a BIOS security subsystem to protect our PC.

    本文主要针对计算机系统安全性可信赖度进行了研究,提出利用BIOS实现系统的安全保护的观点。

    youdao

  • This paper mainly studies on the security and trusted status of a PC system, points out that we can setup a BIOS security subsystem to protect our PC.

    本文主要针对计算机系统安全性可信赖度进行了研究,提出利用BIOS实现系统的安全保护的观点。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定