zhòngyīngguànyònglìgōu:
  • zài dòu liú hěn suànchū hěn xiǎo fèi yòng jiù bàn tiān dǎo yóu huì péi zhe cān guān zhěng jiā tài
    It's very cheap staying in Tunis; for a small consideration you can hire a guide for half a day, and he'll show you round the whole of Carthage.
  • suàn gōng chéng shī jiāng lái fǎng rén lèi zhì jiù xiàng yīng guó shù xué jiā 'ài lún · líng 50 nián qián chū de yàngwèn shì fǒu néng fēn qīng rén duì huà hái shì duì huà
    Computer engineers will continue to measure their efforts to mimic human intelligence, as British mathematician Alan Turing suggested 50 years ago, by asking you whether you're talking to a person or a machine.
  • suàn míng nián jìn yán jiū suǒzhè xiē zào fǎn zhě suàn zào chéng sāo dònghùn luàn
    He plans to be in graduate school next year; The rebels had planned turmoil and confusion.
  • qiē quán shǐ yòng de suàn tǒng qiē quán tóu shǐ yòng de fáng qiē quán tóu chǎn de gōng chǎng
    A turnkey computer system; a turnkey housing project; a turnkey factory.
  • men de suàn shì nián de yíng 'é
    We based our calculation on last year's turnover.
  • wēi xíng suàn zhǒng lèi fán duō
    There are many types of microcomputers.
  • suàn zài sān zhǒng tóng de luó ji diàn shàng yùn xíng , zhè sān zhǒng diàn chēng zuò and,not or。 ibm de not shì qián wéi yòng tàn guǎn zhì zào chū lái de luó ji diàn
    And while computers run on three different types of logic circuits -- called And, Not, and Or gates -- IBM's Not gate is the only type that has yet been created from carbon nanotubes.
  • xīzàng bàozàngwén bǎn měi tiān chū bǎn liàng gǎo jiàn zhí jiē yòng zàngyǔ wén cǎi xiěbiān ji wài hái tóu jiàn liǎo suàn zàngwén biān ji pái bǎn tǒngjié shù liǎo qiān pái bǎn de shǐ
    The Tibetan edition of the Tibet Daily is published every day, with a large number of articles and news dispatches written or edited in the Tibetan language directly. The newspaper has said good-bye to sort typesetting by investing a considerable sum of money to establish Tibetan computer editing and typesetting systems.
  • dāng zǒu jìn shí chǐ zuǒ yòu shí huì yáo dòng de wěi guǒ tíng zhù jiǎoqīng qīng pāi pāi huì gāo xīng tiào liǎo láibìng qiě duì biǎo shì shì de huān ér qiě zhī dàozài zhè yàng qīn de biǎo shì hòubìng méi yòu de suàn shì xiǎng mài gěi kuài gèng shì suàn yào gēn jié hūn
    When you get within ten feet of him, he will begin to wag his tail. If you stop and pat him, he will almost jump out of his skin to show you how much he likes you. And you know that behind this show of affection on his part, there are no ulterior motives: he doesn t want to sell you any real estate, and he doesn’ t want to marry you.
  • céng guàn de kuài duō zhǒng duō yàng tóng xún cháng de shí xún cháng de jié jiǎn de suàn
    an unaccustomed pleasure; many varieties of unaccustomed foods; a new budget of unaccustomed austerity.
  • rén mín dài biǎo huì zhì tōng guò liǎo suàn
    The People's Congress unanimously adopted the budget.
  • rén mín dài biǎo huì zhì tōng guò liǎo suàn
    The People 's Congress unanimously adopted the budget.
  • zài shù xué tǒng zhōng de yuán yùn suàn yuán wǎng wǎng zhǐ chǎn shēng dān de jiēguǒ
    in a unary operation in a mathematical system one element is used to yield a single result.
  • zài suàn 'ān quán xué zhōngchéng gōng fēi jìn dòng shù chǔlǐ tǒng
    In computer security, a successful unauthorized access to an ADP system.
  • zài shù 'ān quán lǐng zhǒng wèi jīng shòu quányòu duǒ guò tǒng cún kòng zhì chéng de jiǎn chá 'ér jìn suàn wǎng luò de yòng
    In data security, an unauthorized user who tries to gain entry to a computer network by defeating the system's access controls.
  • suàn 'ān quán xué zhōngān quán rén yuán zài gōng zuò jiān nèi xún luó bié shì zài zhèng cháng gōng zuò shí jiān wài de shí jiān jiǎn chá qīn zhězhōng duān de fēi shǐ yòng 'ān quán wéi zhāng xíng wéi
    In computer security, the use of security personnel to patrol work areas, particularly outside normal working hours, to detect intruders and unauthorized use of terminals, to check for security violations.
  • zài yùn suàn guò chéng zhōng suǒ shèng xià de biàn liàng chēng wéi suàn
    an operator that leaves unchanged the element on which it operates.
  • men duì xiāng gǎng de zhèng shí nián biàn men shuō zhè huà shì suàn shù de
    Our policies with regard to Hong Kong will remain unchanged for 50 years, and we mean this.
  • xiǎn shì chū zhè wèi shàn shè jiāo de zǒng cái yōng yòu de jìhuàzhì shǎo zuò wéi xiàn dài gōng de shǒu zhí xíng guān suàn yùn yòng cháng guī de cuò shī lái bǎo zhàng shì qíng de chéng gōng
    Turns out the socially awkward CEO had a real agenda, and he was prepared to use unconventional means -- at least for a Hyundai exec -- to ensure its success.
  • 50 nián dài zǎo de suàn páng áng guì 'ér qiě kào kào de zhù shǒu
    in the early 1950s computers were large and expensive and unreliable; an undependable assistant.
  • duì mǒu gōng shǎo suàn zhuāng yùn fèi
    undercharge a company for shipments
  • xià jié gòu shè suàn lùn
    theory and design of underground structure
  • yào xiǎo kàn rén lèi de zhì shì néng de héng héng guǒ jiù cóng de suàn
    It is impossible to underrate human intelligence héng beginning with one's own.
  • yào xiǎo kàn rén lèi de zhì shì néng de héng guǒ jiù cóng de suàn rén réndōu wéi cōng míng
    It is impossible to underrate human intelligence begin with one's own.
  • yào xiǎo kàn rén lèi de zhì shì néng de héng guǒ jiù cóng de suàn
    It is impossible to underrate human intelligence - begining with one 's own.
  • cóng shì shí yàn suàn
    undertake experiment and calculations
  • rén zhǐ yào jiāng de nǎo suàn lián jiē láijìn Cyberspace, jiù yàn zài gāi kōng jiān de qiē zāo
    Once his brain was linked with the computer, a man would undergo all experiences in??the space.
  • zhè yào bié zhǐ chū de shìsǔn biǎo chéng xiàn de shì gōng de kuàijì sǔn ér shìxiàn jīn shōu zhī”, zài suànkuàijì sǔn shíshòu chū chē shōu jìn de xiàn jīn bìng fēi yíng shōu ér shì shōu shōu ”, shǔ liú dòng zhài
    It must be pointed out that the net income shown in the income statement is an accounting profit, not cash flow. For instance, in the computation of accounting profit, cash receipts from selling fare cards are not recognized as revenue. Rather, they are "Unearned Revenue" classified under Current Liabilities.
  • jiù diàn 'ér yánzhè xiē huó dòng wǎng wǎng shì suàn de héng héng rén men rèn wéi zhǎn zhōng guó jiā yīnggāi yuán tóu dào zhè lǐng
    In terms of electricity produced, these activities often proved uneconomical - hardly, one might think, where a developing nation should be putting its resources.
  • men suàn xiàng 250 shī de nián qīng rén gōng jiù
    We intend to offer job to 250 unemployed young people.
  • 180 wàn jiù rén kǒu lái suànshī fàn wǎn de rén yòu néng chāo guò 12 wàn
    Given a workforce of 1.8 million, the number of unemployed could exceed 120,000.
  • zǒng zhī men jiāng jìn zuì wéi jiě jué suàn 2000 nián wèn shǐ guó néng píng 'ānshùn shí xiàn shì de kuà yuè 'ér fèn dǒu
    In conclusion, we will make every possible effort to solve the Y2K problem so as to achieve a smooth and uneventful cross-over for our country into the next century.