computer technology books

Learn about computer technology books, we have the largest and most updated computer technology books information on alibabacloud.com

A little experience in the learning method of computer Application technology!

I use the computer than to learn the time to spend more time, here, some of their own experience posted to us. One: The source of information is very important, I learned every useful technology, is a high man or network know the name, and then find the relevant book information in the system of detailed learning. (Tall Man and network) Second: It is important to start the theory, to work with the example

Analysis of ten important relationships in computer technology

Author: Yi Hongwei, Yi Tang Information Technology Service Co., Ltd. Abstract: This paper systematically summarizes ten important relationships in computer technology, analyzes these technical elements and their relationships, and illustrates them through a large number of typical examples. Understanding these relationships can improve the reader's overall grasp

General clearing technology for computer viruses

General clearing technology for computer virusesHttp://www.williamlong.info/archives/456.html This is the second article I wrote in a magazine 10 years ago. Published in the third phase of the 1997 microcomputer world. At that time, I was very interested in computer viruses. When I first went to college in year 92, I didn't actually have any idea about

Study on grading standard of computer Products evaluation technology

is essential. As each manufacturer in each package in the packaging of the number of chips and packaging technology, resulting in a CPU represents a different meaning, the operation speed is also a great difference. With the development of CPU technology, the number of CPUs on each computer is increasing rapidly, and the 32-core and 64-core machines are becoming

Application Analysis of data encryption technology in computer security

With the rapid development of modern computers, computer network knowledge has been popularized among the masses, which has led to a further development of computer networks, but it is precisely because of the rapid development of computer networks, it also caused a series of problems, such as the arbitrary theft of network information on various websites and the

Application of ATM technology in computer Communication Networks

The computer communication network involves two fields of communication network computers. The communication network provides necessary means for data transmission and exchange between computers. Computer technology permeate the communication network and improves the performance of the latter. As a mature technology, I

Why computer students want to learn Linux open source Technology

by Falcon of Tinylab.org2013/08/25Linux open source related technology is very important for students, especially computer majors, the following are discussed in several aspects:Research platformBecause of the advantages of open source, there are a lot of open copy can be consulted, there are many interesting ideas can be used to do in-depth research. Any point dug in is a piece of heaven and earth.Professi

Solid state storage technology affects the entire computer field

Solid state storage not only changes the storage industry, but also affects the entire computer field. We have seen that flash memory has completely changed the consumer electronics field, replacing rotating disk drives in almost every category of consumer electronics.This enthusiasm is also extending to the data center. Database Administrators, System administrators, and application system owners have begun to realize the benefits of solid state stor

English name of the national computer and software technology qualification (level) Examination

I found a great meal on the Internet and kept it for use in e-paper resume. The computer technology and software professional technical qualification (level) Examination (computer and software examination) is the perfection and development of the original China Computer Software professional technical qualification

Integrated examination system of computer culture base based on database, OLE and VBA technology

Data | database Integrated examination system of computer culture base based on database, OLE and VBA technology Chen Cli Content Summary: This paper introduces the integration examination system developed by using database technology, Object linking technology (OLE) and VBA programming in VB, so as to realize the pa

From SOA to cloud computing: An overview of the course of computer technology development

There has been a world-wide discussion, whether the computer can surpass human intelligence in the future, whether the robot can in turn dominate human beings, when people put their emotional capacity to the computer, the computer also has a "life", then the robot can also have the rights of people? Computer as a tool

How to connect the computer with Le technology mini

How to connect the computer with Le technology mini glasses? According to the small series, the VR glasses can not be connected to the computer, so said, le technology Mini is also not possible. What would it take to have VR products connected to a computer? As far as the s

Computer bus technology Basics

. A Microcomputer acts as a device to exchange information and data with other devices, it is used for device-level interconnection. ---- In a broad sense, computer communication methods can be divided into parallel communication and serial communication. The corresponding communication bus is called parallel bus and serial bus. Parallel Communication is fast and real-time, but it is not suitable for small-sized products due to the large number of por

Computer system knowledge--input and output technology

corresponding signal to the peripheral; 5. After the DMA sends out the signal, it realizes the data exchange between memory and peripheral, or memory and memory. 6, Dmac after the execution of external tasks, through the CPU to send hold signal, REVOKE the DMA request. the above is a full DMA mode of data exchange. input and output technology can be said to realize the important channel of human-computer

The two major areas of computer operating system and IT technology

The computer's operating systemAt first, when there was no computer, von Neumann in 1946, the 5 parts of the computer are "arithmetic, controller, memory, input device, output device" Until now has not been broken, then the computer appeared, succeeded in accordance with the von Neumann prophecy. The computer was not d

Core Journals of computing technology and computer science

Core Journals of computing technology and computer science Serial number Publication name Serial number Publication name Serial number Publication name 1 Computer Journal 9 Microelectronics and Computer 17 Scientific Bulletin 2 Journal

Network Technology and Application Study Notes-Overview of Computer Network Basics

3640 Vswitch: Cisco 3560, Cisco 3750, and Huawei 9306 Switches 2Network Security Device Firewall:Attackers can defend against attacks from the company's internal and external networks. Cisco ASA 5505, 5510, 5520, 5540, 5550, 5580 VPNDevice:Virtual Private channel through the Internet 3And wireless network devices:Wireless Router (TP-LINK), wireless network card, Wireless Bridge 4Network device manufacturer:CiscoCompanies, Huawei companies Vi. Network Topology 1) Star-based topology Advantages:

Super pixel Segmentation technology development (superpixel segmentation)-Computer Vision Topic 3

Development of hyper-pixel Segmentation technology(SuperpixelSegmentation) Sason @ csdn Current update date: 2013.05.12. 1. Graph-based algorithms ): 1. Normalized cuts, 2000. Jianbo Shi and Jitendra Malik. Normalized cuts and image segmentation. IEEE Transactions on Pattern Analysis and machine intelligence (PAMI), 22 (8): 888-905,200 0. T. Cour, F. benezit, and J. Shi. spectral segmentation with multiscale Graph Decomposition. in I

How to read Burmese on a computer using ABBYY OCR recognition technology

Union Of Myanmar Republic, formerly known as Burma, is a country in Southeast Asia, and from 1962 to 2010 Burma has been ruled by the junta after the coup, and it has been open to outsiders for the last 5 years and has established trade and cultural ties with other countries. Burmese is made up of many dialects, but all dialects share a core alphabet, which is mainly used in formal and print media, with 33 consonants and 12 auxiliary characters, and regional dialects may also use other characte

20 Very useful computer technology

memory, and you can open Registry Editor and set key values: HKEY_LOCAL_MACHINE\Software \microsoft\windows\currentversion\explorer\alwaysunloaddll=dword:1 it to 0, this feature will be turned off. Note: The computer needs to be restarted in order for the settings to take effect. 11. XP uses pre-read to set up this new technology to improve system speed. If you have PIII, 512M memory above, recommend mod

Total Pages: 7 1 .... 3 4 5 6 7 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.