computer network造句31, In recent year, the application of computer network technology in virtual instrument testing makes remote testing possible.
32, This paper introduces the characteristics of library catalogue based on computer network, analyzes the potential problems and probes into the ways how to deal with the new situation.
33, In a computer network, a node at which data processing equipment is located.
34, Objective To develop a port expander for simple network cable tester, which can raise the testing efficiency of the computer network twisted-pair.
35, Yu An Building Pudong , Security Portection, Broadcasting, CATV, Computer Network.
36, In a computer network, this coherence, model, and software are absent.
37, In recent years, the information technology taking computer network as the centre is developed rapidly, and permeate through each field in life.
38, Computer network for transferring grid real—time data is an important part of the grid automatic dispatching system.
39, For example, a diagram of a simple computer network can tell the user if adding that additional server will exceed the total bandwidth of the network.
40, This paper, using the transmission line theory, analyzes the effect of transmission line terminal load of coaxial cable in regional computer network on the performance of the computer network.
41, The framework clarifies, for instance, that the military needs presidential authorization to penetrate a foreign computer network and leave a cyber-virus that can be activated later.
42, Along with the development of the computer network technology, DIS (Distributed Interactive Simulation) is becoming one of the modern concurrent simulation technologies and is applied widely.
43, With the popularization and application of the computer network and distributed computer, the security of network becomes more and more important.
44, Local-Area Network (LAN) A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings.
45, Network security protocol is important factor in computer network security.
46, Experiment is an indispensible course for the major of Computer Network.
47, A computer network set up by Advanced Research Project Agency of the U.S.
48, CAI and computer network is applied more and more extensively in teaching.
49, The application of EMR is to build a health information storage and retrieval system in an organization based on computer network for patient-centric data integration and browse.
50, According to a report released by the National Computer Network Emergency Response Coordination Center of China, Xinhua said, the hacker industry in China caused losses of CNY7.6 billion in 2009.
51, Mobile Ad hoc network is a crossbred of computer network and wireless communication.
52, A computer network is supposed to operate 24 hours a day, 365 days a year.
53, The computer network will realize the resource sharing effectively, but the resource-sharing and information security is a pair of contradictions.
54, A NIC is a special hardware card within any networked device (computer, printer, router, etc.) that handles all the technical aspects of sending and receiving data packets over a computer network.
55, Computer Application Technology colleges and universities graduate courses will a short break, senior computer network programming.
56, It provides real time protection for computer network and computer system by monitoring to prevent them from internal attack, outside attack and misoperation.
57, Computer network were built among dispatching center, immediate power station and substation. Oscillate data is translated to dispatching center through public telephone network or other channels.
58, Continues the computer network engineering project and the technology advisory service.
59, Computer network security has been a topic of wide concern.
60, A computer network card to obtain the physical address of the only ( MAC ) of the source.