He's addicted to computer games.
他迷上了电脑游戏。
Thanks to computer cameras, he is also able to see and react to students physical actions.
多亏了电脑摄像头,他还能看到学生的身体动作,并对此做出回应。
This danger can be avoided, according to computer science professor Stuart Russell, if we figure out how to turn human values into a programmable code.
根据计算机科学教授斯图尔特·拉塞尔的说法,如果我们弄清楚如何将人类价值观转化为可编程代码,则可以避免这种危险。
For all those efforts, though, the real limits to computer security may lie in human nature.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
That's not much compared to computer chips, but Tour says this tag is just a "proof of concept."
和计算机芯片相比,这算不了什么。不过图尔称,这种新标签还仅仅处于“验证设想”阶段。
According to computer scientists, the interconnect is one of the most difficult pieces to build.
根据计算机科学家们的说法,Interconnect是最困难的部分之一。
Books and faculties range from learning languages to computer science, from organic chemistry to law.
书籍和学科涵盖了各种内容,包括学习语言、计算机科学、有机化学和法律等。
Instead, it's a bug in Windows XP that started years ago and has spread computer to computer, like a virus.
反而几年前在WindowsXP成为一个bug,像病毒一样在计算机间蔓延。
Since the late 1990s, engineers have sought ways to apply open source concepts to computer and electronic hardware.
自20世纪90年代末,工程师们就已经想到了一些方法来将开源的概念应用于计算机和电子硬件。
It is primarily used for linking laptops or for connecting equipment like video or photo cameras to computer systems.
主要用于连接膝上电脑或者将录像机或照相机这样的设备连接到计算机系统。
The company was started by a Swede and a Dane who contracted out much of their work to computer programmers in Estonia.
这家公司最初由一个瑞典人和一个丹麦人发起设立,他们把许多工作外包给爱沙尼亚的计算机程序员。
Notice that the examples above refer to computer code that does not run under control of the z/OS operating system.
注意,上面那些例子指的是不在z/OS 操作系统控制下运行的计算机代码。
Both the WS-Eventing specification and the WS-Notification standard are applicable to computer management scenarios.
WS - Eventing规范和WS -Notification标准均适用于计算机管理场景。
Computer users in general want to computer applications in a particular environment with good performance (i.e. speed).
计算机用户一般都希望计算机在特定应用环境下具有良好的性能(例如速度快)。
Or maybe we’re somehow transformed over time by our darkened working environments and exposure to computer screen radiation.
也许我们某种程度上就是被漆黑的工作环境和电脑辐射慢慢变得奇怪的。
This is because the Blackberry handsets automatically send the encrypted data to computer servers outside of the two countries.
这是因为黑莓手机自动向两国境外服务器发送加密数据。
Software included computer programs, procedures, rules, and possibly associated documentation pertaining to computer system operation.
软件包括了计算机程序,过程,规则,和适合计算机系统操作的可能有关的文档。
All such effects are ultimately grounded in mathematics, which provides a critical translation from the physical world to computer simulations.
这些特效根本上是建立于数学之上,数学为电脑模拟真实世界提供了重要的途径。
The main question is: under what conditions can a quasi-monopoly such as Intel give discounts and rebates to computer-makers and retailers?
主要的问题在于:在什么条件下像英特尔向电脑制造商和零售商提供折扣和部分退款算的上是垄断呢?
I've long been a sceptic of systems that try to couple the identities of non-information resources too closely to computer representations.
在很长一段时间内,我一直质疑尝试将非信息资源实体与计算机表示密切配合使用的系统。
Regulators claim that Intel has offered discounts and rebates to computer makers that were often conditional on the exclusion of its rival, AMD.
监管机构称,英特尔对电脑制造商提供了折扣及返利,而这些优惠通常都是建立在电脑厂商拒绝公司竞争对手超微的基础之上。
So if you wanna go to computer science, you can go to University Waterloo; if you want to study liquid physics, Mc Gill University is in schedule.
如果你想学的是计算机科学,那么你应该选择滑铁卢大学;
In contrast, 82 percent of Hewlett-Packard's 2010 semiconductor spending was dedicated to computer products like desktops, notebooks and servers.
相比之下,惠普公司2010年半导体支出中的82%都用到了计算机类产品上,如台式机、笔记本和服务器等。
Similar to an easily spread disease, a computer virus goes from computer to computer, either adding to or changing the tasks a program is designed to do.
和容易蔓延的疾病一样,电脑病毒由一个计算机传到另一个计算机,增加或改变原程序所执行的任务。
That might be about to change, now that US researchers have discovered a fresh approach to computer security that takes real-life bugs as its inspiration.
鉴于美国研究人员受来自现实生活中昆虫的灵感激发,发现了令计算机安全的一种新方法,这种反应可能会发生变化。
That might be about to change, now that US researchers have discovered a fresh approach to computer security that takes real-life bugs as its inspiration.
鉴于美国研究人员受来自现实生活中昆虫的灵感激发,发现了令计算机安全的一种新方法,这种反应可能会发生变化。
应用推荐