Đặt câu với từ "computer network"

1. Cyberspace - a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange internet , net computer network - (computer science) a network of computers

2. Network-General Computer (Tower

3. LAN [local area network] access points for connecting network computer users

4. Design and development of computer software, computer network architectures, computer systems interfacing and integration

5. Cybersecurity-major s tudents in the CIS Cybersecurity track will learn about computer network configuration, computer network and data security, network intrusion prevention and detection, computer networking forensics and digital forensics.

6. Computer software, Computer programs for accessing and using the Internet, Computer programs for network management

7. Computer software for accessing information directories downloadable from the global computer network

8. Computer software for accessing, aggregating and indexing data from a global computer network

9. 13 With the popularization and application of the computer network and distributed computer, the security of network becomes more and more important.

10. Online advertising on a computer network and website

11. Computer software that synchronizes data and computer software applications within a local area network or online computer system

12. Computer software for controlling network alarms and performance indicators

13. Computer network security administration services for Internet service providers

14. Computer network adapters, server adapters, switches, routers and hubs

15. Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network

16. Configuration, programming, systems administration, and support of computer hardware delivered over a global computer network

17. Computer games for the casino industry and amusement arcades playable via a global computer network

18. A computer network browser, capable of accessing Web sites.

19. Providing computer software to enable internet and peer-to-peer communications via a computer network

20. They're accessing the police computer network to steal information

21. Your computer cannot connect to other computers on the network: If you assign an incorrect subnet mask address to the network Adapter, the computer is effectively located on a different network

22. Computer software for purposes of electronic direct-response marketing via an on-line global computer network

23. Video and movie broadcasting services via a global computer network

24. Computer hardware, including, file servers, filers, storage appliances, network attached storage (NAS), storage area network (SAN)

25. A Broadcast is a multipoint connection in a computer network

26. Who would have access to top secret computer network codes?

27. Computer software and hardware for controlling and managing network user access and for enforcement of network policies

28. Communications services, namely, providing network access points through which information on the global computer information network passes

29. A network bridge is a computer networking device that creates a single, aggregate network from multiple communication networks or network segments.This function is called network Bridging

30. Providing user access to a global computer network (service providers), namely the Internet, Intranet, Extranet, computer networks

31. 10 Computer Application Technology colleges and universities graduate courses will a short break, senior computer network programming.

32. The attacker can steal network information, update database, forge user certification, destroy network node, release computer virus, even make the network paralyzed.

33. Computer system that can be connected to a data transmission network

34. Computer programs for network administration - monitoring function of servers and networks

35. A network Administrator is responsible for keeping an organization’s computer network up-to-date and operating as intended

36. Data transmission acceleration services via an on-line global computer network

37. Providing access via the global computer network (Internet) to online publications

38. Switching method for network interfaces, access device and computer storage medium

39. Her neural network is the most sophisticated learning computer on earth.

40. One computer must be set aside as a dedicated network server.

41. This record is replicated on every computer that uses the network.

42. In one embodiment, addressing information identifying a location in a computer network is received in a computer (110).

43. Computer peripheral equipment for providing access to the Internet, namely, computer network adapters, switches, routers, hubs and modems

44. One embodiment includes a server connected to a network and a first peer computer connected to the network.

45. Providing access to a network of marketing and advertising campaigns and ad placements through a global computer network

46. Computer add-on cards, namely, video graphic adaptor cards, audio cards, LAN (local area network) cards, modem cards, network control cards and SCSI (small computer systems interface) cards

47. A computer virus can spread through shared computer soft ware, through an on-line service, or through a network.

48. This particular computer was one of the 15 nodes on ARPANET, the computer network that would become the Internet.

49. The network will provide the gamut of computer services to your home.

50. We need cooperation between you and the computing network and the computer.

51. Network Booting, shortened netboot, is the process of Booting a computer from a network rather than a local drive

52. Computer software that allows network administrators to remotely manage client computers, devices, workstations and embedded system on a network

53. Access control for a decentralized or emergent model on a computer network

54. IPv6 routes computer network traffic amongst a 128-bit range of addresses.

55. 22 Unlawful incursion has been threatening the safety of computer network system.

56. They seem to have the most secure computer network in the universe.

57. SuperSet Software created Snipes, a text-mode networked computer game in 1983 to test a new IBM Personal Computer–based computer network and demonstrate its abilities.

58. Publication of the editorial content of sites accessible via a global computer network

59. Online advertising on a computer network, Copywriting, Graphic advertising services and Advertisement layout

60. Efficiency experts, Business appraisals, Professional business consultancy, online advertising on a computer network

61. The configuring subsystem is connected to a computer network such as the Internet.

62. A host is a computer connected to the Internet or other large network.

63. We had -- quite a few our colleagues were connected by a computer network.

64. Ray must have connected the prototype's computer to the company's local area network.

65. Computer software and hardware in the field of controlling network functions and access in the field of network and server security

66. Cyclades is (was) a packet-switching network developed in 1972 that had many of the attributes of a modern computer network

67. A Client is a small computer that accesses a server through a network

68. Method for interruption affinity binding of virtual network interface card, and computer device

69. In computer networking, the Network Access Identifier (NAI) is a standard way of identifying users who request access to a network.

70. Bandwidth, in computer networking terms, is the data transfer capacity of a network

71. A technique efficiently notifies EIGRP neighbors when destroying adjacencies in a computer network.

72. Route prefix aggregation using reachable and non-reachable addresses in a computer network

73. Computer networking devices, namely, network interface controllers, routers, hubs, bridges, switches and repeaters

74. Publication and dissemination of sites relating to energy, accessible via a global computer network

75. Computer software in the field of network-based operational control of electronic airfield signs

76. The network Adapter is an essential component in both wired and wireless computer networking

77. Providing a high speed access to area networks and a global computer information network

78. Computer software for controlling access to and the use of scanners in a network

79. System and method for adding context to prevent data leakage over a computer network

80. Computer add-on cards, namely video graphic cards, audio cards, local area network cards