点击切换搜索课件文库搜索结果(259)
文档格式:PPT 文档大小:421KB 文档页数:72
The memory of a typical computer: A register area; Addressable Random access memory (RAM): A code area; A data area. The code area is fixed prior to execution, and can be visualized as follows:
文档格式:PDF 文档大小:131.4KB 文档页数:2
Bell Labs, Lucent Technologies, Crawford Hill Lab, Holmdel, NJ 07733, USA: herwig@lucent.com Abstract Optical communication has advanced into the tera-era deploying 1/2 terameter of fiber and carrying several Tb/s per fiber. Remaining challenges include extending the success of point-to-point long-haul to metropolitan networks and broadband access applications. Introduction Reflecting on the past 15 years of optical communication, one can only marvel at the amazing advances in this technology and in its applications
文档格式:PDF 文档大小:291.37KB 文档页数:29
This work is distributed as a Discussion Paper by the STANFORD INSTITUTE FOR ECONOMIC POLICY RESEARCH SIEPR Discussion Paper No. 03- Confusing Success with Access: “Correctly” Measuring Concentration of Ownership and Control in Mass Media and Online Services
文档格式:PPT 文档大小:1.58MB 文档页数:126
教学主要内容 –记录的查找及排序 –查询对象及使用 –窗体对象的使用 –报表对象的使用
文档格式:PDF 文档大小:262.47KB 文档页数:35
Carrier Sense Multiple Access (CSMA) In certain situations nodes can hear each other by listening to the channel “Carrier Sensing” CSMA: Polite version of Aloha
文档格式:PDF 文档大小:311.23KB 文档页数:26
Fundamental aspects of network Design and Analysis: – Architecture Layering Topology design – Protocols Pt.-to-Pt. Multiple access End-to-end
文档格式:PDF 文档大小:1.74MB 文档页数:65
Thermal Oxidation. Diffusion. Ion Implantation.Deposition. Harold G. Parks Lithography and Pattern Transfer The University of Arizona, Tucson 23.2 Testing Built-In Self-Test- Scan. Direct Access Testing ng· Joint TestAction
文档格式:PPT 文档大小:318KB 文档页数:36
现有的数据库软件有很多,如大型数据库 Oracle、 SQL Server,小数据库 Access等,都支持关系模型
文档格式:PPT 文档大小:1.08MB 文档页数:31
一、数据库系统概述 二、数据模型 三、SQL语言简介 四、数据库设计初步 五、Access数据库管理系统
文档格式:PPT 文档大小:1.54MB 文档页数:43
什么是防火墙 防火墙是一种功能,它使得内部网络和外部网络或 Internet互相隔离,以此来保护内部网络或主机。简单的 防火墙可以由 Router,3 Layer Switch的ACL(access control list)来充当,也可以用一台主机,甚至是一个子 网来实现。复杂的可以购买专门的硬件防火墙或软件防火墙来实现
首页上页1617181920212223下页末页
热门关键字
搜索一下,找到相关课件或文库资源 259 个  
©2008-现在 cucdc.com 高等教育资讯网 版权所有