首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
介绍了基于以太局域网技术、运行Windows 2000 Server网络操作系统的数字图书馆网络连通性故障检测方法,针
对不同类型故障,分别分析了产生原因,探讨了排除方法。对数字图书馆网络管理和维护工作具有一定借鉴意义  相似文献   

2.
总线型拓朴结构的局域网因其结构简单、灵活、便于扩充、易于实现等特点,被许多单位选择利用.我馆1993年建成总线结构的NOVELL网,网络版本采用Novell netware V3 11,网卡采用NE2000,网线采用50欧姆的同轴电缆.笔者总结了此网的几种常见故障,介绍其相应的排除方法,供维护同类网的同行们参考.  相似文献   

3.
新时期高校图书馆局域网建设管见   总被引:2,自引:0,他引:2  
杨勇 《图书馆学研究》2001,(3):45-48,25
介绍了图书馆局域网建设中的硬件配置、网络操作系统的选择以及网络通信协议的选取,论述了网络的安全管理与维护在图书馆局域网建设中的重要作用。  相似文献   

4.
局域网的维护是一项重要而又繁琐的工作,需要长期的经验积累和知识储备。本文结合本人工作实际介绍了局域网的一些常见故障并给出了解决方案,供网络管理人员参考。  相似文献   

5.
本通过对我馆网络与光盘检索实验室公共机房软硬件系统的维护实践,简单阐述了公共机房硬件常见故障及排除方法,并对公共机房软件系统维护,升级的几种不同方法进行了比较。  相似文献   

6.
网络安全一直都是局域网中常见的安全问题,因此,局域网的安全与维护是网络安全运行的根本.本文通过对局域网中经常出现的问题进行研究与分析,提出了改善局域网安全措施的有效方案.  相似文献   

7.
介绍了计算机局域网的组建,阐述了计算机局域网组建遇到的问题和处理,以及网络维护和安全的重要性。  相似文献   

8.
图书馆局域网内计算机病毒的防治   总被引:5,自引:0,他引:5  
针对办公自动化时代计算机维护的特点,阐述了计算机病毒的危害、分类、特点和发展,结合工作实践探讨了网络环境下图书馆局域网内计算机病毒防治的对策。  相似文献   

9.
Win 2K环境下图书馆局域网的安全配置   总被引:1,自引:0,他引:1  
文章从Win 2K安装、帐户安全管理与设置、网络安全设置三个方面,论述了维护图书馆局域网的安全配置。  相似文献   

10.
图书馆局域网内网络病毒的分析与防治   总被引:2,自引:0,他引:2  
网络病毒对图书馆局域网的安全造成极大的危害,本对图书馆局域网常见的网络病毒类型及主要攻击方式和部位进行了分析,并介绍了几种有效的防治方法。  相似文献   

11.
《文献管理集成系统》因其具有良好的通用性和开放性而拥有众多的用户。在使用该系统的过程中,必须在软硬件的升级和操作员的培训、数据库的管理和操作、网络病毒的防范等方面进行科学、规范的管理和维护。对该系统因操作不当而在采编、流通、检索、借阅等环节所造成的故障,应及时找出原因并加以排除。文章是笔者对几年来使用该系统的一次比较全面的经验总结。  相似文献   

12.
本文阐述和分析了几种不同类型复印机故障发生的原因与机理, 并提出了排除这些机器故障的途径和方式方法。  相似文献   

13.
地方文献数据库检索系统建立之设想   总被引:10,自引:0,他引:10  
建立检索系统是地方文献数据库的重要内容, 检索系统的好坏直接影响数据库的整体质量。根据地方文献本身及其用户群的特点, 本着方便读者、有效利用地方文献数据库的原则, 笔者提出了建立“学科分类检索子系统”、“地名归类检索子系统”、“著述形式检索子系统”等具体构想。  相似文献   

14.
Uncommitted voters in pre-election polls include both thosewho have not yet made their choices (undecided voters) and thosewho have already made their choices but do not disclose them,for any reason (undeclared voters). The voting patterns of theseuncommitted voters are critical, especially in cases in whichthe size of the group is greater than the gap between the twoleading runners in an electoral race. In the present study,discriminant analysis was applied to predict the voting patternsof the uncommitted voters in two different election situations:the 1992 presidential election in the state of North Carolina,USA, and the 1992 presidential election in South Korea. Theadjusted percentage breakdown, which was created after discriminantanalysis assigned the uncommitted voters for each candidate,appeared noticeably closer to the actual results than the simplepercentage breakdown with the uncommitted voters excluded fromthe analysis. Discriminant analysis was also applied to predictthe effect of one candidate's possible withdrawal from electionswith several candidates. By treating the former supporters ofthe withdrawing candidate as another uncommitted group, discriminantanalysis provided a new percentage breakdown among the remainingcandidates; the result was consistent with experts' intuitiveprediction.  相似文献   

15.
A major part of Congressional publishing, though not the whole conspectus of it, is the U.S. Congressional Serial Set. After a quick review of the history of the Serial Set, the formal categories of publications are discussed with their statistical breakdown followed by salient examples from some of the various genres of Serial Set publications.  相似文献   

16.
范妍妍  顾天明 《大观周刊》2012,(40):119-119
电梯的故障可以分为机械系统故障和电气系统故障。其中电气系统故障是指由于电气控制系统中的元件发生异常,导致电梯不能正常工作或严重影响乘坐舒适感,甚至造成人身伤害或设备事故的现象。文章重点就高层电梯电气故障原因及处理方法进行了探讨和分析。  相似文献   

17.
《The Reference Librarian》2013,54(40):121-129
A bibliography of articles and books concerning the fee versus free issue spans the last ten years and includes practical information for the implementation of fee-based services, as well as ethical issues which must be addressed. This is followed by a breakdown, state by state, of the progress of the "Private Enterprise Law," which would prevent state-supported libraries from offering these services. Arguments for the defense in the Arizona State University case are included.  相似文献   

18.
Many academic libraries are adopting 3D printing programs and researching, writing, and implementing policies for these programs. This article analyzes the content of 50 academic library 3D printing policies looking for commonalities. Five major themes emerged from the analysis: the policy's purpose, potential users of the 3D printers, 3D printing procedures, the acceptable uses of the 3D printers, and user privacy considerations. This article provides a breakdown of these five major themes.  相似文献   

19.
ABSTRACT

It has been said that there must be a breakdown before there can be a breakthrough. If true, America's suburbs might lead the way toward city renewal. Because problems know no boundaries, suburbs are now facing what cities have known for decades. Growth and change eventually cause pain. The author, with insight from a political thinker and worker, suggests that this might bring suburbs and cities together in a joint partnership.  相似文献   

20.
网络出版的编辑技术初探   总被引:10,自引:3,他引:7  
周荣庭 《编辑学报》2001,13(1):38-40
提出了网络编辑技术的概念,归纳出适合于因特网的网络编辑技术的5大特点。从Web出版、电子函件出版总结了网络编辑技术的发展过程和发展趋势,并对网络编辑技术所产生的编辑培养、编辑环境和技术管理等问题作了简要的分析。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号