首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
当今社会科学技术不断地发展 ,电脑普及率逐年提高 ,并进入了寻常百姓家。虽给学习和娱乐带来了方便 ,也带来了一些技术上的烦恼 ,因此掌握家用电脑的基本维护技巧是必要的。计算机的故障种类繁多 ,如平时不注意维护和保养 ,问题可能会集中爆发 ,造成不必要的损失 ,使日积月累的数据丢失。如去年 4月 2 6日发作的CIH病毒 ,造成约四十万台电脑的BIOS损坏 ,使计算机无法启动 ,C盘 (启动盘 )数据被破坏 ,造成严重的经济损失。如果平时注意保养 ,防患于未然 ,是可以确保电脑正常工作的。下面 ,我结合自己的理论知识和实践经验 ,谈谈家用…  相似文献   

2.
3.
4.
5.
As an addition to the report by McDonough in CHum,II (1967), 37–40, Delatte lists the operations of the Laboratoire d'Analyse statistique des Langues Anciennes at Liège. He describes eight programs for automatic processing, automatic composition and printing of concordances, and various statistical operations. Forty-three Latin works and five Greek, totaling approximately 600,000 words, are catalogued.  相似文献   

6.
Processor allocation and job scheduling are two complementary techniques for improving the performance of multiprocessors. It has been observed that all the hypercube allocation policies with the FCFS scheduling provide only incremental performance improvement. A greater impact on the performance can be obtained by efficient job scheduling. This paper presents an effort in that direction by introducing a new scheduling algorithm called lazy scheduling for hypercubes, The motivation of this scheme is to eliminate the limitations of the FCFS scheduling. This is done by maintaining separate queues for different job sizes and delaying the allocation of a job if any other job(s) of the same dimension is(are) running in the system. Processor allocation is done using the buddy strategy. The scheduling and allocation complexity is O(n) for an n-cube. Simulation studies show that the performance is dramatically enhanced by using the lazy scheduling scheme as compared to the FCFS scheduling. Comparison with a recently proposed scheme called scan indicates that the lazy scheme performs better than the scan scheduling under a wide range of workloads.  相似文献   

7.
The rôle of the computer as a number-crunching device in operations research (OR) is first investigated including techniques like simulation, etc. The developments in speed, size and costs of the central processor and memory are studied, and also means of reducing software cost; see section 2. Heuristics and interactive man-computer systems are examined, especially their rôles in model formulation, scope, and solution. The discussion includes the various degrees of possible computerization, and the practicality gap between management science and management practice; section 3. The data input into management models can be provided by on-line data-capture (point-of-sale terminals), data bases and Management Information Systems; section 4. The quantification of financial benefits of computerized information systems is examined in section 5. OR may be used to improve the design and use of computer systems; section 6. Conclusions are summarized in section 7. 45 selected references are given for further study.  相似文献   

8.
9.
10.
Clary  J.B. Sacane  R.A. 《Computer》1979,12(10):49-59
Built-in-test techniques exploit hardware redundancy to provide continuous on-line monitoring of computer performance. Hardware's declining cost makes these techniques attractive, especially for modular computers.  相似文献   

11.
Stack Computers     
《Computer》1977,10(5):14-16
Those of us who have worked with stack computers for several years have found an unending source of amazement –and some consternation–in how few computer professionals there are who seem aware that there is an entirely different approach to computer architecture from the familiar von Neumann model. Sometimes when such phrases as "zero-address machine" have dropped from my lips, and I see that the phrase had about as much meaning for the listeners as "zero-bit word" might have, I have wished that knowledge of stack machines were more widely spread. Fortunately Jack Grimes, the technical editor of Computer, had the same desire and suggested that an issue be devoted to the subject.  相似文献   

12.
The results of a study of elementary and secondary school usage of microcomputers for one southern state are reported. In addition to summarizing the availability of hardware, software, and personnel resources, evidence is presented to suggest that various sub-groups of students, particularly the “regular” classroom student and the socioeconomically disadvantaged, are severely limited in their access to computer technology, and that access, when afforded, is restricted to drill and practice applications. School-, district-, and state-level recommendations are provided to address these inequities.  相似文献   

13.
本文根据目前国内校园网建设中普遍存在的问题,在异种机互联、PC机对等通信方面进行了探讨,提出了利用现有成熟软件和开发网络应用程序相结合的办法。  相似文献   

14.
15.
Typical of many attempts to classify the role of computers in education is the attempt to formalize it within a number of acronyms such as CAI (computer assisted instruction). This has more to do with technical aspects than with eduational values. In this paper Taylor's model of tutor, tool. tutee is used as a framework in which to discuss the different ways in which computers can be used in the classroom.In the tutor model the computer, programmed by experts, presents subject material to which the student responds. A number of advantages, and general criticisms, of this model are quoted. Author languages, designed to be used by subject experts rather than professional programmers provide an alternative approach. Some writers see it as being very straightforward, in contrast to others who argue that the creation of a dialogue between student and computer is a complex process requiring a degree of expertise not commonly found in professional programmers. A number of authors expect the thrust of computer based education to be in the area of expert systems and artificial intelligence, but there is a list of unsolved problems related to the development of expert system tutors.The tool model is one in which the computer has practical utility by taking on routine tasks, enhancing human creative skills, saving time and preserving intellectual energy. The statement is quoted that few educators are aware of the wide range of powerful general-purpose tools available, and of the consequences for the world of their students. The word processor has been seen as one such tool for children, as has access to history databases.Work with the Logo language has been essential to the development of the tutee model, one in which the child teaches the computer. A child building a computer program to carry out a process develops a complete understanding of the process described. In building computational models, the child will be expected to make mistakes, and seeking bugs will lead to making new hypotheses, devising test strategies, and explaining unexpected results. A development of the tutee model, at upper secondary school level, is the idea of computing with ideas, and the view that computer programming is a means of abstracting ideas. Such approaches have little chance of widespread acceptance against the prevailing conservatism of computer science educators. Papert is quoted as seeing the danger that experiments with computing and learning will be seen as failures; they are either trivial or unscientific.  相似文献   

16.
17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号