Computer English Learning

Source: Internet
Author: User
Tags strong password

After learning English for so many years, I feel like a cup. I can't say that I can't write it. Even though I 've passed both levels, it's a float cloud. Computer technology is becoming faster and faster. Chinese computer books are lagging behind in publishing, and many software materials are in English. Recently, MATLAB has been used, although it has been mastered 5 years ago, but five years have passed, and many things have been forgotten, but their thoughts are still there, so they can be quickly picked up. It is not a simple application to use MATLAB. Of course, it is not advanced, but at least there are almost no domestic resources and few cases, such as mixed programming, matlab Web development. In this case, you have to study English. Unfortunately, the level is limited. Therefore, I made up my mind to make good use of computer English. Although I am a programmer and don't rely on it for dinner, I can find fun and enjoy it. I think that's enough. I think it will improve. Time flies fast every day, so I spend time learning to complain and watch news. Of course, all my English resources come from the internet. I will try to translate them later. Hehe also made some contributions to the network.

I want to learn a few things every day. I am a little skilled and refuse to copy them. I also hope that some netizens will point out the mistakes and explain the words as follows:

1. Access Control List

Example: The agent is not the same as the others, it is made of client proxy, server proxy and access control list.

This security proxy technology is different from common proxy technology. It consists of Agent clients, proxy servers, security control lists, and other key components.

Access Control List can be used to filter away dangerous packets and give some level of protection to the network.

The access control list can filter out harmful packets in the network and provide a relatively safe protection for the network.

2. Access Token: (token)

Example: The LSA generates an access token for valid users.

Lsa creates an access token for a valid user.

3. A few simple examples: Accounts account, adapter, Administrator Account, AlgorithmAlgorithm, Alias, allocation location, allocation, API applicationProgramProgramming Interface, attack, border boundary, Border Gateway boundary gateway, cipher password, cipher text ciphertext, Client client, client, breakable, COM port comport, communication port, cryptanalysis password analysis, directory, decryption, domain, domain name, filter Filter

4. GDI (graphical device interface) Graphical device interface; GUI graphical user interface, HTTP Hypertext Transfer Protocol, IIS Information Server, telnet remote logon, virturl Server Virtual Server, subnet, strong Password, subnet mask, subdirectory, thread, vnlnerability vulnerability, workstation Workstation

 

Source: http://ite.educity.cn/zt/cihui/ and youdao dictionary, If you infringe your copyright, please contact me promptly Delete Processing

 

Programmers are interested in. NET software development, Matlab programming, and network technology.

Welcome to my cnblog blog: http://www.cnblogs.com/asxinyu/

Welcome to exchange, QQ: 1287263703; MSN: dong.binhui@hotmail.com

E-mail: asxinyu@qq.com, asxinyu@126.com

Tag tags: MATLAB, Matlab hybrid programming, C #. NET development, Matlab source code, winform development, web development, Computer English, software applications

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.