首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对高校公共计算机房管理与维护上存在的问题进行分析,得出对硬盘进行保护是解决问题的有效方法,介绍了硬盘保护卡的主要功能,并侧重说明如何利用好硬盘保护卡来提高计算机房管理与维护的效率.  相似文献   

2.
公共计算机房学生用机的某些磁盘分布需要经常清理。本文介绍了利用WMI技术远程删除计算机磁盘文件夹及文件程序的具体实现。  相似文献   

3.
本文从公共计算机房现状,使用过程中存在的一些问题,讨论公共计算机房的管理模式,以及如何运用计算机技术、网络技术、校园一卡通等技术智能化管理公共计算机房,提高管理效率等方面进行探讨.  相似文献   

4.
当把优盘、移动硬盘或其它存储设备插入USB接口时,计算机磁盘盘符的数目会发生变化,本文根据这一特征开发了学生机客户端软件与教师机控制软件,达到了动态、灵活控制公共计算机房优盘使用的目的,在实际应用中起到了较好的效果。  相似文献   

5.
公共机房收费管理系统软件的开发   总被引:1,自引:0,他引:1  
公共计算机房传统的管理方式基本上为烦琐的手工模式 ,为此提出了一套基于 C/ S体系结构的适合公共机房管理的计时收费系统软件的设计方案 ,用以取代公共计算机房传统的手工管理模式。并对该系统软件进行了详细的论述  相似文献   

6.
该文分析了当前高校公共计算机房的发展状况及存在的问题,提出机房管理需要创新的观点,以我校的崇远机房管理系统为例,介绍了崇远系统的主要功能,可实现跨校园、校区的统一管理模式,自动控制课内外上机,并实现上机日志的数字化,为日后统计和查询上机情况提供可靠的依据,有效的提高了计算机房的科学管理水平。  相似文献   

7.
建设节约型大学,提高公共计算机房设备利用率   总被引:2,自引:0,他引:2  
本文针对目前高校普遍存在的计算机基础教学中心机房投资大且计算机服役期短、淘汰快的现状,结合我校公共计算机房在管理过程中的经验,提出了提高设备利用率的一些方法。  相似文献   

8.
该文分析了当前高校公共计算机房的发展状况及存在的问题,提出机房管理需要创新的观点,以我校的崇远机房管理系统为例,介绍了崇远系统的主要功能,可实现跨校园、校区的统一管理模式,自动控制课内外上机,并实现上机日志的数字化,为日后统计和查询上机情况提供可靠的依据,有效的提高了计算机房的科学管理水平。  相似文献   

9.
张盛  卢畅 《现代计算机》2011,(10):79-81,87
分析高等学校的公共计算机房特点,对其中的安全点进行研究和分析,并提出可行的而且已经被论证的措施来保障机房的安全稳定运行,为高校机房的建设和运作提供参考意见。  相似文献   

10.
现如今高校的教学工作大量使用了计算机,这不仅提高了教师的工作效率,同时也提高了教育教学效果。公共计算机房的建设是高校信息化发展的重要标志之一,机房的管理与维护水平直接关系到学校的教育教学工作。高标准的管理与维护措施,对于学校的不断发展有着重要的意义。  相似文献   

11.
A considerable degree of sophistication in terms of hardware and company structure is required to ensure the efficient maintenance of a continuously-operated computer bureau. Not only must a bureau be able to cope with the varying requirements of a large number of clients, but it must take steps to avoid any logistical problems. The importance of a computer bureau to certain companies and the management of a bureau are discussed with particular reference to the Allen Computers International datacentre.  相似文献   

12.
计算机的广泛应用把人类带入了一个全新的时代,特别是计算机网络的社会化,已经成为了信息时代的主要推动力。然而,另一方面由于网络的开放性,使得当前的计算机网络安全具有多方面的安全威胁。笔者对目前计算机网络安全存在的问题进行了分析,并探讨了针对计算机网络安全问题的防范策略。  相似文献   

13.
This paper describes a combination of approaches to provoke deeper comprehension in various topics in computer architecture details to computer science students. It also presents the outcome of this effort. The proposed educational approaches apply to a sequence of two courses on computer architecture and organization. The first course explains basic notions of execution on a processor, as well as hardware details. The tools used are simulation, assembly language and C programming. The second course deals with more advanced matters of computer organization. There, the authors introduced building a simple Linux device driver as a new approach for getting hands-on experience, on issues related to interactions of the operating system kernel with the memory, I/O, peripherals, and bus system components.  相似文献   

14.
Abstract The successful integration of computers in educational environments depends, to a great extent, on students' attitudes towards them. Widely used computer attitude scales (CASs) focus on the beliefs of typical computer users and do not reveal the more refined attitudes of groups that use computers extensively and develop unique relations with them. This study presents the development and validation of a CAS especially designed for computer science freshmen (CASF). The scale consists of five factors, namely, self-confidence in previous knowledge, hardware usage anxiety, computer engagement, fears of long-lasting negative consequences of computer use and evaluation of positive consequences of computers in personal and social life. Using an analytic computer experience construct, the scale's components were related to multiple aspects of students' computer experience. CASF responses can inform a variety of instructional decisions and classroom management strategies for the first phase of the students' studies.  相似文献   

15.
Ternary optical computer principle   总被引:21,自引:0,他引:21  
The fundamental principle and the characteristics of ternary optical computer, using horizontal polarized light, vertical polarized light and no-intensity to express information, are propounded in this paper. The practicability to make key parts of the ternary optical computer from modern micro or integrated optical devices, opto-electronic and electro-photonic elements is discussed. The principle can be applied in three-state optical fiber communication via horizontal and vertical polarized light.  相似文献   

16.
A practical intra-cellular biomolecular computer should work inside living cells without damaging them. The retrovirus-based biomolecular computer has been designed, by mimicking the natural processes of living cells, to enable the creation of a practical intra-cellular computer. Here, I review the idea of retrovirus-based computing, and examine its feasibility. This idea might lead to the development of new technologies not only for biological research, but also for medical purposes. In future, through the development of the in vivo retrovirus-based computer, gene diagnosis and gene therapy is expected to cooperatively work inside living cells, enabling intelligent gene therapy technology that uses biomolecular computing.  相似文献   

17.
GKS, which recently became the International Standards Organization (ISO) standard for computer graphics programming, is the first of a set of interlocking graphics standards. This paper outlines the important ideas behind GKS, describes its relationship with other standards and discusses the benefits of standardization.  相似文献   

18.
探讨了利用计算机实现工件自动分拣方法,包括机械部分的组成、控制系统的构建和控制软件的编制。  相似文献   

19.
计算机实验室是高校中重要的教学和实践场所,本文结合在计算机实验室管理工作中的实践情况,对实验室管理存在的问题进行了总结和分析,并对如何提高实验室管理质量进行了探讨.  相似文献   

20.
A Novel Computer Architecture to Prevent Destruction by Viruses   总被引:1,自引:0,他引:1       下载免费PDF全文
In today‘s Internet computing world,illegal activities by crackers pose a serious threat to computer security.It is well known that computer viruses,Trojan horses and other intrusive programs may cause sever and often catastrophic consequences. This paper proposes a novel secure computer architecture based on security-code.Every instruction/data word is added with a security-code denoting its security level.External programs and data are automatically addoed with security-code by hadware when entering a computer system.Instruction with lower security-code cannot run or process instruction/data with higher security level.Security-code cannot be modified by normal instruction.With minor hardware overhead,then new architecture can effectively protect the main computer system from destruction or theft by intrusive programs such as computer viruses.For most PC systems it includes an increase of word-length by 1 bit on register,the memory and the hard disk.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号