Da traduttori professionisti, imprese, pagine web e archivi di traduzione disponibili gratuitamente al pubblico.
soft computing
pengkomputeran lembut
Ultimo aggiornamento 2016-06-14
Frequenza di utilizzo: 1
Qualità:
Riferimento:
human centered computing issue
isu pengkomputeran berpusatkan manusia
Ultimo aggiornamento 2020-10-31
Frequenza di utilizzo: 1
Qualità:
Riferimento:
failed to read while computing md5
gagal membaca semasa mengira md5
Ultimo aggiornamento 2014-08-15
Frequenza di utilizzo: 1
Qualità:
Riferimento:
backend for the r project for statistical computing
name
Ultimo aggiornamento 2011-10-23
Frequenza di utilizzo: 1
Qualità:
Riferimento:
r software environment for statistical computing and graphics
persekitaran perisian r untuk pengiraan statistik dan grafik
Ultimo aggiornamento 2014-08-15
Frequenza di utilizzo: 1
Qualità:
Riferimento:
graphical interface to the r environment for statistical computing
antaramuka bergrafik bagi persekitaran r untuk pengiraan statistik
Ultimo aggiornamento 2014-08-15
Frequenza di utilizzo: 1
Qualità:
Riferimento:
enter the name of a function to skip when computing profiles
masukkan nama fungsi untuk dilangkah bila mengkomput profil
Ultimo aggiornamento 2014-08-20
Frequenza di utilizzo: 1
Qualità:
Riferimento:
color field based on computing decaying sinusoidal waves. written by hannu mallat; 1998.
warna medan yang berasaskan pada pengiraan gelombang sinusoid yang menyusut. ditulis oleh hannu mallat; 1998.
Ultimo aggiornamento 2014-08-15
Frequenza di utilizzo: 1
Qualità:
Riferimento:
cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks. it is also known as information technology security or electronic information security. the term is used in a variety of contexts, from business to mobile computing, and can be divided into a number of common categories.
organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. the general security objectives comprise the following: availability; integrity, which may include authenticity and non-repudiation; confi dentiality”.
Ultimo aggiornamento 2022-06-27
Frequenza di utilizzo: 1
Qualità:
Riferimento: