From professional translators, enterprises, web pages and freely available translation repositories.
soft computing
pengkomputeran lembut
Last Update: 2016-06-14
Usage Frequency: 1
Quality:
Reference:
human centered computing issue
isu pengkomputeran berpusatkan manusia
Last Update: 2020-10-31
Usage Frequency: 1
Quality:
Reference:
failed to read while computing md5
gagal membaca semasa mengira md5
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
Reference:
backend for the r project for statistical computing
name
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
Reference:
r software environment for statistical computing and graphics
persekitaran perisian r untuk pengiraan statistik dan grafik
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
Reference:
graphical interface to the r environment for statistical computing
antaramuka bergrafik bagi persekitaran r untuk pengiraan statistik
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
Reference:
enter the name of a function to skip when computing profiles
masukkan nama fungsi untuk dilangkah bila mengkomput profil
Last Update: 2014-08-20
Usage Frequency: 1
Quality:
Reference:
color field based on computing decaying sinusoidal waves. written by hannu mallat; 1998.
warna medan yang berasaskan pada pengiraan gelombang sinusoid yang menyusut. ditulis oleh hannu mallat; 1998.
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
Reference:
cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. it is also known as information technology security or electronic information security. the term is used in a variety of contexts, from business to mobile computing, and can be divided into a number of common categories.
organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. the general security objectives comprise the following: availability; integrity, which may include authenticity and non-repudiation; confi dentiality”.
Last Update: 2022-06-27
Usage Frequency: 1
Quality:
Reference: