After learning English for so many years, I feel like a cup. I can't say that I can't write it. Even though I 've passed both levels, it's a float cloud. Computer technology is becoming faster and faster. Chinese computer books are lagging behind in publishing, and many software materials are in English. Recently, MATLAB has been used, although it has been mastered 5 years ago, but five years have passed, and many things have been forgotten, but their thoughts are still there, so they can be quickly picked up. It is not a simple application to use MATLAB. Of course, it is not advanced, but at least there are almost no domestic resources and few cases, such as mixed programming, matlab Web development. In this case, you have to study English. Unfortunately, the level is limited. Therefore, I made up my mind to make good use of computer English. Although I am a programmer and don't rely on it for dinner, I can find fun and enjoy it. I think that's enough. I think it will improve. Time flies fast every day, so I spend time learning to complain and watch news. Of course, all my English resources come from the internet. I will try to translate them later. Hehe also made some contributions to the network.
I want to learn a few things every day. I am a little skilled and refuse to copy them. I also hope that some netizens will point out the mistakes and explain the words as follows:
1. Access Control List
Example: The agent is not the same as the others, it is made of client proxy, server proxy and access control list.
This security proxy technology is different from common proxy technology. It consists of Agent clients, proxy servers, security control lists, and other key components.
Access Control List can be used to filter away dangerous packets and give some level of protection to the network.
The access control list can filter out harmful packets in the network and provide a relatively safe protection for the network.
2. Access Token: (token)
Example: The LSA generates an access token for valid users.
Lsa creates an access token for a valid user.
3. A few simple examples: Accounts account, adapter, Administrator Account, AlgorithmAlgorithm, Alias, allocation location, allocation, API applicationProgramProgramming Interface, attack, border boundary, Border Gateway boundary gateway, cipher password, cipher text ciphertext, Client client, client, breakable, COM port comport, communication port, cryptanalysis password analysis, directory, decryption, domain, domain name, filter Filter
4. GDI (graphical device interface) Graphical device interface; GUI graphical user interface, HTTP Hypertext Transfer Protocol, IIS Information Server, telnet remote logon, virturl Server Virtual Server, subnet, strong Password, subnet mask, subdirectory, thread, vnlnerability vulnerability, workstation Workstation
Source: http://ite.educity.cn/zt/cihui/ and youdao dictionary, If you infringe your copyright, please contact me promptly Delete Processing
Programmers are interested in. NET software development, Matlab programming, and network technology.
Welcome to my cnblog blog: http://www.cnblogs.com/asxinyu/
Welcome to exchange, QQ: 1287263703; MSN: dong.binhui@hotmail.com
E-mail: asxinyu@qq.com, asxinyu@126.com
Tag tags: MATLAB, Matlab hybrid programming, C #. NET development, Matlab source code, winform development, web development, Computer English, software applications