This paper introduces the matters related to the certification of computer information system integration.
本文介绍计算机信息系统集成资质认证的有关事宜。
The Journal of Computer Information Systems also talks about the importance of trust in adoption of technology.
计算机信息系统刊物也谈到了信任在技术采纳过程中的重要性。
Any system which can transfer the computer information from one user's file to another and wait for collection.
可将计算机信息由一个用户传送至另一用户文件并等待收集的任何系统。
For non confidential computer information system, the attack success rate of 88%, was found only accounted for 5%.
对非保密的计算机信息系统来说,其攻击成功率达88%,被查出的仅占5%。
Goal is to provide users with a set of targeted and efficient computer information systems feasible overall solution.
目标是为用户提供一整套有针对性的、高效可行的计算机信息系统整体解决方案。
Only with the help of computer information system can the strategic goal of a higher customer satisfaction be achieved.
只有依靠电脑信息系统才有可能迎接挑战,从而实现提升客户满意度的战略目标。
Results With the application of computer information management system, the efficiency of donor recruiting was improved.
结果在计算机信息管理系统的应用下,提高了对单采献血者的招募效率。
In this background, information retrieval has become one of the hottest technologies in computer information dealing technology.
在这种背景下,信息检索技术已成为当今计算机信息处理领域最热门的技术之一。
TEMPEST ATTACK threat on the computer information security is analyzed. The fundamental electromagnetic radiation models are set up.
针对TEMPEST ATTACK对计算机信息安全构成的威胁,建立了基本的电磁辐射模型。
If the operation, then suddenly loses power in the computer information will be lost c, energized again also cannot fully recovered.
若运行中突然断电,则微机中c的信息会全部丢失,再次通电也不能完全恢复。
The article introduces the characteristics, formation and working process of Business Computer Information Integrated System (BCIIS).
文章介绍了企业计算机信息集成系统的特点、组成及运行过程。
METHODS Based on UV convolution spectrum with PLS method, we used convolution spectrometry of computer information process technology.
方法以紫外褶合光谱为基础,结合PLS法,利用计算机信息处理技术的褶合曲线分析法。
The methods of detection, evaluation and computer information management for expressway bridges in our province are introduced in this paper.
文章介绍了河南省通车运营的高速公路桥梁检测、评价和计算机信息管理的内容和方法。
Objective To investigate the application of computer information management system in the recruiting and reserving of apheresis platelets donors.
目的探讨计算机信息管理系统在单采血小板献血者招募和保留中的应用。
So any external network sees the NAT router's IP address and the port number assigned by the router as the source computer information on each packet.
这样任何一台处于外部网络的计算机都会在发送给它的数据包里找到NAT的IP地址和由路由器分配的端口号。
The item product is a process - powered system to through big China person computer information an electronic commerce a test alongside of suffer.
项目产品是经过大中华人电脑资讯部电子商务组测试并接受的流程引擎系统。
Under the task order, SAIC will provide command, control, communications, and computer information support for the entire U.S. Central command organization.
根据该任务定单,SAIC将为整个美国中央司令部组织提供指挥、控制、通信和计算机信息支持。
Methods Apheresis platelets donors were recruited through computer information management system, and the recruiting effect of the system was analyzed.
策略利用计算机信息管理系统招募单采血小板献血者,分析该策略应用的招募效果。
The item product is a business enterprise to through big China person computer information an electronic commerce a test alongside of suffer gate system.
项目产品是经过大中华人电脑资讯部电子商务组测试并接受的企业门户系统。
This paper introduces the routine encryption of computer information and the publicity key encryption mainly, and compares the both and their environment.
本文主要介绍了计算机信息的常规加密技术和公开密钥加密技术,并对两者的优缺点和应用环境作了比较。
Human flesh searches online will be seen as illegal in Xuzhou, according to a computer information protection law passed by Jiangsu Provincial CPC Committee Sunday.
18日,江苏省人大通过了《徐州市计算机信息系统安全保护条例》,该条例明确指出"人肉搜索"违法,将于2009年6月1日起生效。
Integrating APC, OPT and computer information network technique to carry out "management Control integration" can strengthen market competition power of petrochemical enterprises.
结合APC,OPT技术和计算机信息网络技术,实现“管控一体化”,能够有效增强石油化工企业的市场竞争能力。
The majority of my time on the Web involves looking up technical computer information, which I use for teaching Microsoft applications classes and providing technical advice at work.
在网络上我花了大部分时间查询计算机技术信息,我把这些信息用在微软应用课堂上并在工作上提出技术性建议。
This thesis thinks, the behavior of illegally invade the computer information system offense should include not full 16 the youth and should put the unit of this offense into practice.
本文认为,非法侵入计算机信息系统罪的犯罪主体应包括未满16周岁的少年以及实施本罪的单位。
The output of this project is a tested and deliverables Flow Engine System that was tested and accepted by Big China Area E-commerce Team belonging to the Computer Information Department.
项目产品是经过大中华人电脑资讯部电子商务组测试并接受的流程引擎系统。
Access networks refer to computer information networks which are connected with international networks through interconnected networks. Access networks can be those connected at multi-levels.
接入网络,是指通过接入互联网络进行国际联网的计算机信息网络;接入网络可以是多级联接的网络。
Access networks refer to computer information networks which are connected with international networks through interconnected networks. Access networks can be those connected at multi-levels.
接入网络,是指通过接入互联网络进行国际联网的计算机信息网络;接入网络可以是多级联接的网络。
应用推荐