{"id":2623,"date":"2011-02-01T08:38:46","date_gmt":"2011-02-01T00:38:46","guid":{"rendered":"http:\/\/www.i-garden.org\/blog\/nss-ictglossary"},"modified":"2018-05-01T23:50:51","modified_gmt":"2018-05-01T15:50:51","slug":"hkdse-ict-glossary","status":"publish","type":"page","link":"https:\/\/www.i-garden.org\/blog\/hkdse-ict-glossary\/","title":{"rendered":"Glossary"},"content":{"rendered":"<p style=\"text-align: right;\">Last updated: <span style=\"color: #ff0000;\">23\/12\/2016<\/span><\/p>\n<p>\u4ee5\u4e0b\u5217\u51fa\u4e00\u4e9b\u6839\u64da<a href=\"http:\/\/www.edb.gov.hk\/index.aspx?nodeID=3372&amp;langno=2\">\u6559\u80b2\u5c40<\/a>\u7684<a href=\"http:\/\/www.edb.gov.hk\/tc\/curriculum-development\/kla\/technology-edu\/resources\/computer-edu\/glossary.html\">\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59<\/a>\u3002\u5927\u5bb6\u53ea\u9808\u4f7f\u7528\u700f\u89bd\u5668\u5167\u7684\u641c\u5c0b\u529f\u80fd(\u4f8b\uff1aChrome or Firefox \u00a0\u6309<span style=\"color: #ff0000;\"> Ctrl-F<\/span>)\uff0c\u4fbf\u53ef\u4ee5\u98db\u5feb\u5730\u641c\u5230\u4e2d\u82f1\u6587\u7684\u8fad\u5f59\u4e86\uff08\u5716\u4e2d\u53f3\u9762scroll bar\u7684\u9ec3\u8272\u6a6b\u7dda\u5373\u9078\u5b57\u7684\u51fa\u73fe\u4f4d\u7f6e\uff09\u3002\u5e0c\u671b\u4e5f\u80fd\u5920\u5e6b\u5230\u5927\u5bb6\uff01<\/p>\n<p>iGardener\u8001\u5e2b\u6703\u5b9a\u671f\u66f4\u65b0\u5176\u4ed6\u8fad\u5f59\uff0c\u65b9\u4fbf\u5927\u5bb6\u53c3\u95b1\u3002<\/p>\n<div>\n<p style=\"text-align: center;\"><a href=\"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2011\/01\/glossary_01.png\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"\u6309\u5716\u653e\u5927\" src=\"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2011\/01\/glossary_01-300x288.png?resize=300%2C288\" alt=\"\u6309\u5716\u653e\u5927\" width=\"300\" height=\"288\" \/><\/a><\/p>\n<p>\u8fad\u5f59\u4f86\u6e90\uff1a<a href=\"http:\/\/www.edb.gov.hk\/tc\/curriculum-development\/kla\/technology-edu\/resources\/computer-edu\/glossary.html\" target=\"_blank\" rel=\"noopener\"><br \/>\n<\/a><a href=\"http:\/\/www.edb.gov.hk\/attachment\/tc\/curriculum-development\/kla\/technology-edu\/resources\/computer-edu\/ICT_glossary_Dec_2016.pdf\" target=\"_blank\" rel=\"noopener\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6097 size-full\" src=\"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/icon_pdf.png?resize=48%2C48\" alt=\"\" width=\"48\" height=\"48\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.edb.gov.hk\/tc\/curriculum-development\/kla\/technology-edu\/resources\/computer-edu\/glossary.html\" target=\"_blank\" rel=\"noopener\">\u6559\u80b2\u5c40\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1-\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59<\/a>\u3000\uff08\u6700\u5f8c\u66f4\u65b0\uff1a2016\u5e7412\u6708\uff09<\/p>\n<p>&nbsp;<\/p>\n<p>\u9cf4\u8b1d\uff1a\u555f\u7199\u540c\u5b78(&#8217;14)\u3001\u4fca\u6607\u540c\u5b78(&#8217;13)\u6574\u7406\u7b2c\u4e00\u7248<\/p>\n<table>\n<tbody>\n<tr>\n<td>Accelerated Graphics Port (AGP)<\/td>\n<td>\u5716\u5f62\u52a0\u901f\u57e0<\/td>\n<\/tr>\n<tr>\n<td>Access Point (AP)<\/td>\n<td>\u7db2\u7d61\u63a5\u9054\u9ede<\/td>\n<\/tr>\n<tr>\n<td>accumulator<\/td>\n<td>\u7d2f\u52a0\u5668<\/td>\n<\/tr>\n<tr>\n<td>actual argument<\/td>\n<td>\u5be6\u969b\u8b8a\u5143<\/td>\n<\/tr>\n<tr>\n<td>actual parameter<\/td>\n<td>\u5be6\u969b\u53c3\u6578<\/td>\n<\/tr>\n<tr>\n<td>adapter<\/td>\n<td>\u9069\u914d\u5668<\/td>\n<\/tr>\n<tr>\n<td>adder<\/td>\n<td>\u52a0\u6cd5\u5668<\/td>\n<\/tr>\n<tr>\n<td>address<\/td>\n<td>\u4f4d\u5740\uff1b\u5730\u5740<\/td>\n<\/tr>\n<tr>\n<td>addressing mode<\/td>\n<td>\u5c0b\u5740\u6a21\u5f0f\uff1b\u7de8\u5740\u6a21\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Advanced Research Project Agency Network (ARPANET)<\/td>\n<td>\u7f8e\u570b\u570b\u9632\u90e8\u9ad8\u7d1a\u7814\u7a76\u8a08\u5283\u5c40\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>adware<\/td>\n<td>\u5ee3\u544a\u7a0b\u5f0f\uff1b\u5ee3\u544a\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>aggregate function<\/td>\n<td>\u96c6\u5408\u51fd\u6578<\/td>\n<\/tr>\n<tr>\n<td>algorithm<\/td>\n<td>\u7b97\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>aliasing<\/td>\n<td>\u968e\u68af\u6548\u61c9\uff1b\u5716\u5f62\u5931\u771f<\/td>\n<\/tr>\n<tr>\n<td>American National Standards Institute (ANSI)<\/td>\n<td>\u7f8e\u570b\u570b\u5bb6\u6a19\u6e96\u5b78\u6703<\/td>\n<\/tr>\n<tr>\n<td>American Standard Code for Information Interchange (ASCII)<\/td>\n<td>\u7f8e\u570b\u4fe1\u606f\u4ea4\u63db\u6a19\u6e96\u78bc<\/td>\n<\/tr>\n<tr>\n<td>analog \/ analogue<\/td>\n<td>\u6a21\u64ec<\/td>\n<\/tr>\n<tr>\n<td>Analog Digital Converter (ADC)<\/td>\n<td>\u6a21\u64ec\u6578\u78bc\u8f49\u63db\u5668<\/td>\n<\/tr>\n<tr>\n<td>anchor<\/td>\n<td>\u9328\u9ede\uff1b\u9396\u5b9a\u9ede<\/td>\n<\/tr>\n<tr>\n<td>applet<\/td>\n<td>\u5fae\u61c9\u7528\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>application layer<\/td>\n<td>\u61c9\u7528\u5c64<\/td>\n<\/tr>\n<tr>\n<td>Application Service Provider (ASP)<\/td>\n<td>\u61c9\u7528\u670d\u52d9\u4f9b\u61c9\u5546<\/td>\n<\/tr>\n<tr>\n<td>argument<\/td>\n<td>\u8b8a\u5143<\/td>\n<\/tr>\n<tr>\n<td>Arithmetic and Logic Unit (ALU)<\/td>\n<td>\u7b97\u8853\u53ca\u908f\u8f2f\u904b\u7b97\u90e8\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>array<\/td>\n<td>\u9663\u5217<\/td>\n<\/tr>\n<tr>\n<td>Artificial Intelligence (AI)<\/td>\n<td>\u4eba\u5de5\u667a\u80fd<\/td>\n<\/tr>\n<tr>\n<td>assembler<\/td>\n<td>\u532f\u7de8\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>assembly language<\/td>\n<td>\u532f\u7de8\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>assignment statement<\/td>\n<td>\u8ce6\u503c\u8a9e\u53e5<\/td>\n<\/tr>\n<tr>\n<td>Asymmetric Digital Subscriber Line (ADSL)<\/td>\n<td>\u4e0d\u5c0d\u7a31\u6578\u78bc\u7528\u6236\u7dda\uff1b\u975e\u5c0d\u7a31\u6578\u78bc\u7528\u6236\u7dda<\/td>\n<\/tr>\n<tr>\n<td>asynchronous transfer mode<\/td>\n<td>\u7570\u6b65\u50b3\u8f38\u6a21\u5f0f\uff1b\u7570\u6b65\u50b3\u8f38\u5f62\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>attenuation<\/td>\n<td>\u8870\u6e1b\uff1b\u8870\u6e1b\u4f5c\u7528<\/td>\n<\/tr>\n<tr>\n<td>attribute<\/td>\n<td>\u5c6c\u6027<\/td>\n<\/tr>\n<tr>\n<td>Audio Video Interleave (AVI)<\/td>\n<td>\u97f3\u983b\u8996\u983b\u4ea4\u66ff\u683c\u5f0f\ue088<\/td>\n<\/tr>\n<tr>\n<td>Augmented Reality (AR)<\/td>\n<td>\u64f4\u589e\u5be6\u5883<\/td>\n<\/tr>\n<tr>\n<td>Automatic Teller Machine (ATM)<\/td>\n<td>\u81ea\u52d5\u6ac3\u54e1\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>back pointer<\/td>\n<td>\u53cd\u5411\u6307\u793a\u5b57\uff1b\u53cd\u5411\u6307\u793a\u6a19<\/td>\n<\/tr>\n<tr>\n<td>backbone<\/td>\n<td>\u4e3b\u5e79<\/td>\n<\/tr>\n<tr>\n<td>Backus-Naur Form (BNF)<\/td>\n<td>\u5df4\u79d1\u65af\u8afe\u723e\u7bc4\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>bandwidth<\/td>\n<td>\u983b\u5bec<\/td>\n<\/tr>\n<tr>\n<td>bar code<\/td>\n<td>\u689d\u78bc<\/td>\n<\/tr>\n<tr>\n<td>baseband<\/td>\n<td>\u57fa\u5e36<\/td>\n<\/tr>\n<tr>\n<td>Basic Input \/ Output System (BIOS)<\/td>\n<td>\u57fa\u672c\u8f38\u5165\u8f38\u51fa\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>batch processing<\/td>\n<td>\u6210\u6279\u8655\u7406\uff1b\u6574\u6279\u8655\u7406\uff1b\u6210\u6279\u5de5\u4ef6\u8655\u7406<\/td>\n<\/tr>\n<tr>\n<td>baud<\/td>\n<td>\u6ce2\u7279<\/td>\n<\/tr>\n<tr>\n<td>Beginner&#8217;s All-Purpose Symbolic Instruction Code (BASIC) Language<\/td>\n<td>\u521d\u5b78\u8005\u901a\u7528\u7b26\u865f\u6307\u4ee4\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Beginning Of File (BOF)<\/td>\n<td>\u6a94\u8d77\u59cb<\/td>\n<\/tr>\n<tr>\n<td>BIG-5 code<\/td>\n<td>\u5927\u4e94\u78bc<\/td>\n<\/tr>\n<tr>\n<td>Binary Coded Decimal (BCD)<\/td>\n<td>\u4e8c\u9032\u5236\u7de8\u78bc\u5341\u9032\u5236<\/td>\n<\/tr>\n<tr>\n<td>bit<\/td>\n<td>\u4f4d\u5143\uff1b\u4e8c\u9032\u5236\u4f4d<\/td>\n<\/tr>\n<tr>\n<td>binary file<\/td>\n<td>\u4e8c\u9032\u5236\u6a94<\/td>\n<\/tr>\n<tr>\n<td>binary relationship<\/td>\n<td>\u4e8c\u5143\u95dc\u4fc2<\/td>\n<\/tr>\n<tr>\n<td>binary search<\/td>\n<td>\u5c0d\u5206\u6aa2\u7d22\uff1b\u4e8c\u5206\u6aa2\u7d22<\/td>\n<\/tr>\n<tr>\n<td>binary tree<\/td>\n<td>\u4e8c\u53c9\u6a39<\/td>\n<\/tr>\n<tr>\n<td>bitmap<\/td>\n<td>\u9ede\u9663\u5716\uff1b\u4f4d\u5716<\/td>\n<\/tr>\n<tr>\n<td>bits per second (bps)<\/td>\n<td>\u6bcf\u79d2\u4f4d\u5143<\/td>\n<\/tr>\n<tr>\n<td>bitwise complement<\/td>\n<td>\u9806\u4f4d\u5143\u65b9\u5f0f\u4e92\u88dc<\/td>\n<\/tr>\n<tr>\n<td>block diagram<\/td>\n<td>\u65b9\u584a\u5716<\/td>\n<\/tr>\n<tr>\n<td>blog<\/td>\n<td>\u7db2\u8a8c\uff1b\u7db2\u4e0a\u65e5\u8a8c<\/td>\n<\/tr>\n<tr>\n<td>Bluetooth<\/td>\n<td>\u85cd\u7259<\/td>\n<\/tr>\n<tr>\n<td>Boolean<\/td>\n<td>\u5e03\u723e<\/td>\n<\/tr>\n<tr>\n<td>boot<\/td>\n<td>\u555f\u52d5<\/td>\n<\/tr>\n<tr>\n<td>bootstrap<\/td>\n<td>\u555f\u52d5\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>breadth-first search<\/td>\n<td>\u5bec\u5ea6\u512a\u5148\u641c\u7d22<\/td>\n<\/tr>\n<tr>\n<td>broadband<\/td>\n<td>\u5bec\u983b<\/td>\n<\/tr>\n<tr>\n<td>bubble sort<\/td>\n<td>\u5192\u6ce1\u6392\u5e8f\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>buffer<\/td>\n<td>(1) \u7de9\u885d\u5668\uff0c(2) \u7de9\u885d\u5340<\/td>\n<\/tr>\n<tr>\n<td>bug<\/td>\n<td>\u932f\u8aa4<\/td>\n<\/tr>\n<tr>\n<td>Bulletin Board System (BBS)<\/td>\n<td>\u96fb\u5b50\u5e03\u544a\u677f\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>bundled software<\/td>\n<td>\u9644\u96a8\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>bus<\/td>\n<td>\u532f\u6d41\u6392\uff1b\u7e3d\u7dda<\/td>\n<\/tr>\n<tr>\n<td>byte<\/td>\n<td>\u5b57\u7bc0\uff1b\u4f4d\u5143\u7d44<\/td>\n<\/tr>\n<tr>\n<td>cache<\/td>\n<td>\u5feb\u53d6\u8a18\u61b6\u9ad4\uff1b\u9ad8\u901f\u7de9\u885d\u5668<\/td>\n<\/tr>\n<tr>\n<td>call by address<\/td>\n<td>\u4f4d\u5740\u8abf\u7528<\/td>\n<\/tr>\n<tr>\n<td>call by reference<\/td>\n<td>\u6309\u5740\u8abf\u7528\uff1b\u5f15\u5740\u8abf\u7528<\/td>\n<\/tr>\n<tr>\n<td>call by result<\/td>\n<td>\u7d50\u679c\u8abf\u7528<\/td>\n<\/tr>\n<tr>\n<td>call by value<\/td>\n<td>\u6309\u503c\u8abf\u7528\uff1b\u5f15\u503c\u8abf\u7528<\/td>\n<\/tr>\n<tr>\n<td>candidate key<\/td>\n<td>\u5019\u9078\u9375\u78bc<\/td>\n<\/tr>\n<tr>\n<td>Carrier Sense Multiple Access with Collision Avoidance (CSMA\/CA)<\/td>\n<td>\u5e36\u6709\u907f\u514d\u885d\u7a81\u7684\u8f09\u6ce2\u5075\u807d\u591a\u5740\u63a5\u9054<\/td>\n<\/tr>\n<tr>\n<td>Carrier Sense Multiple Access with Collision Detect (CSMA\/CD)<\/td>\n<td>\u5e36\u6709\u6aa2\u6e2c\u885d\u7a81\u7684\u8f09\u6ce2\u5075\u807d\u591a\u5740\u63a5\u9054<\/td>\n<\/tr>\n<tr>\n<td>Cascading Style Sheet (CSS)<\/td>\n<td>\u7d1a\u806f\u5f0f\u9801\u9762\uff1b\u5c64\u758a\u6a23\u5f0f\u8868<\/td>\n<\/tr>\n<tr>\n<td>Central Processing Unit (CPU)<\/td>\n<td>\u4e2d\u592e\u8655\u7406\u5668<\/td>\n<\/tr>\n<tr>\n<td>Certificate Authority (CA)<\/td>\n<td>\u6838\u8b49\u6a5f\u95dc<\/td>\n<\/tr>\n<tr>\n<td>character<\/td>\n<td>\u5b57\u7b26\uff1b\u5b57\u5143<\/td>\n<\/tr>\n<tr>\n<td>character head<\/td>\n<td>\u5b57\u9996<\/td>\n<\/tr>\n<tr>\n<td>check box<\/td>\n<td>\u8907\u9078\u6846<\/td>\n<\/tr>\n<tr>\n<td>check digit<\/td>\n<td>\u6aa2\u67e5\u6578\u4f4d<\/td>\n<\/tr>\n<tr>\n<td>checksum<\/td>\n<td>\u6aa2\u67e5\u548c<\/td>\n<\/tr>\n<tr>\n<td>Chinese Character Code for Information Interchange (CCCII)<\/td>\n<td>\u4e2d\u6587\u4fe1\u606f\u4ea4\u63db\u78bc<\/td>\n<\/tr>\n<tr>\n<td>chip<\/td>\n<td>\u6676\u7247<\/td>\n<\/tr>\n<tr>\n<td>circuit switch<\/td>\n<td>\u96fb\u8def\u5207\u63db<\/td>\n<\/tr>\n<tr>\n<td>client-side<\/td>\n<td>\u5ba2\u6236\u7aef<\/td>\n<\/tr>\n<tr>\n<td>cluster<\/td>\n<td>\u7fa4\u96c6<\/td>\n<\/tr>\n<tr>\n<td>coaxial cable<\/td>\n<td>\u540c\u8ef8\u96fb\u7e9c<\/td>\n<\/tr>\n<tr>\n<td>code<\/td>\n<td>(1)\u7de8\u78bc\uff0c(2)\u4ee3\u78bc<\/td>\n<\/tr>\n<tr>\n<td>coder-decoder (codec)<\/td>\n<td>\u7de8\u78bc\uff0d\u8b6f\u78bc\u5668\uff1b\u7de8\u78bc\uff0d\u89e3\u78bc\u5668<\/td>\n<\/tr>\n<tr>\n<td>Colour Graphics Adapter (CGA)<\/td>\n<td>\u8272\u5f69\u5716\u5f62\u9069\u914d\u5668<\/td>\n<\/tr>\n<tr>\n<td>command line interface<\/td>\n<td>\u547d\u4ee4\u884c\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>Common Business-Oriented Language (COBOL)<\/td>\n<td>\u901a\u7528\u5546\u696d\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Common Gateway Interface (CGI)<\/td>\n<td>\u901a\u7528\u63a5\u99c1\u754c\u9762\uff1b\u5171\u7528\u7db2\u9593\u9023\u63a5\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>communication port<\/td>\n<td>\u901a\u8a0a\u57e0<\/td>\n<\/tr>\n<tr>\n<td>Compact Disc (CD)<\/td>\n<td>\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>Compact Disc Interactive (CD-I)<\/td>\n<td>\u4e92\u52d5\u5f0f\u5149\u789f\uff1b\u4ea4\u4e92\u5f0f\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>Compact Disc Read-Only Memory (CD-ROM)<\/td>\n<td>\u552f\u8b80\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>Compact Disc Recordable (CD-R)<\/td>\n<td>\u53ef\u8a18\u9304\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>Compact Disc Rewritable (CD-RW)<\/td>\n<td>\u5fa9\u5beb\u5149\u789f\uff1b\u53ef\u91cd\u5beb\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>compiler<\/td>\n<td>\u7de8\u8b6f\u7a0b\u5f0f\uff1b\u7de8\u8b6f\u5668<\/td>\n<\/tr>\n<tr>\n<td>Complementary Metal-Oxide Semiconductor (CMOS)<\/td>\n<td>\u4e92\u88dc\u91d1\u5c6c\u6c27\u5316\u7269\u534a\u5c0e\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Complex Instruction Set Computer (CISC)<\/td>\n<td>\u8907\u96dc\u6307\u4ee4\u96c6\u96fb\u8166<\/td>\n<\/tr>\n<tr>\n<td>computer<\/td>\n<td>\u96fb\u8166\uff1b\u8a08\u7b97\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>Computer Aided Design (CAD)<\/td>\n<td>\u96fb\u8166\u8f14\u52a9\u8a2d\u8a08<\/td>\n<\/tr>\n<tr>\n<td>Computer Aided Instruction (CAI)<\/td>\n<td>\u96fb\u8166\u8f14\u52a9\u6307\u4ee4<\/td>\n<\/tr>\n<tr>\n<td>Computer Aided Manufacturing (CAM)<\/td>\n<td>\u96fb\u8166\u8f14\u52a9\u88fd\u9020<\/td>\n<\/tr>\n<tr>\n<td>Computer Aided Software Engineering (CASE)<\/td>\n<td>\u96fb\u8166\u8f14\u52a9\u8edf\u4ef6\u5de5\u7a0b<\/td>\n<\/tr>\n<tr>\n<td>Computer Assisted Learning (CAL)<\/td>\n<td>\u96fb\u8166\u8f14\u52a9\u5b78\u7fd2<\/td>\n<\/tr>\n<tr>\n<td>Computer Based Training (CBT)<\/td>\n<td>\u96fb\u8166\u8f14\u52a9\u8a13\u7df4\uff1b\u96fb\u8166\u8f14\u52a9\u57f9\u8a13<\/td>\n<\/tr>\n<tr>\n<td>console<\/td>\n<td>\u63a7\u5236\u53f0<\/td>\n<\/tr>\n<tr>\n<td>constant<\/td>\n<td>\u5e38\u6578\uff1b\u5e38\u91cf<\/td>\n<\/tr>\n<tr>\n<td>coprocessor<\/td>\n<td>\u5354\u8655\u7406\u5668<\/td>\n<\/tr>\n<tr>\n<td>cracking<\/td>\n<td>\u7834\u89e3<\/td>\n<\/tr>\n<tr>\n<td>cryptography<\/td>\n<td>\u5bc6\u78bc\u5b78<\/td>\n<\/tr>\n<tr>\n<td>Current Instruction Register (CIR)<\/td>\n<td>\u73fe\u884c\u6307\u4ee4\u5bc4\u5b58\u5668<\/td>\n<\/tr>\n<tr>\n<td>cursor<\/td>\n<td>\u5149\u6a19\uff1b\u6e38\u6a19<\/td>\n<\/tr>\n<tr>\n<td>Cyclic Redundancy Check (CRC)<\/td>\n<td>\u5faa\u74b0\u5197\u9918\u6838\u5c0d<\/td>\n<\/tr>\n<tr>\n<td>cylinder<\/td>\n<td>\u78c1\u9053\u67f1\u9762<\/td>\n<\/tr>\n<tr>\n<td>Data Definition Language (DDL)<\/td>\n<td>\u6578\u64da\u5b9a\u7fa9\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>data dependence<\/td>\n<td>\u6578\u64da\u76f8\u95dc\u6027<\/td>\n<\/tr>\n<tr>\n<td>data description language<\/td>\n<td>\u6578\u64da\u63cf\u8ff0\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Data Flow Diagram (DFD)<\/td>\n<td>\u6578\u64da\u6d41\u7a0b\u5716<\/td>\n<\/tr>\n<tr>\n<td>data link layer<\/td>\n<td>\u6578\u64da\u93c8\u8def\u5c64<\/td>\n<\/tr>\n<tr>\n<td>Data Manipulation Language (DML)<\/td>\n<td>\u6578\u64da\u64cd\u4f5c\u8a9e\u8a00\uff1b\u6578\u64da\u8655\u7406\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>data mining<\/td>\n<td>\u6578\u64da\u958b\u63a1<\/td>\n<\/tr>\n<tr>\n<td>data redundancy<\/td>\n<td>\u6578\u64da\u5197\u9918\u5ea6\uff1b\u6578\u64da\u5197\u9918\u6027<\/td>\n<\/tr>\n<tr>\n<td>data sink<\/td>\n<td>\u6578\u64da\u63a5\u6536\u5668\uff1b\u6578\u64da\u5bbf<\/td>\n<\/tr>\n<tr>\n<td>data structure<\/td>\n<td>\u6578\u64da\u7d50\u69cb<\/td>\n<\/tr>\n<tr>\n<td>data warehouse<\/td>\n<td>\u6578\u64da\u5009<\/td>\n<\/tr>\n<tr>\n<td>database<\/td>\n<td>\u6578\u64da\u5eab<\/td>\n<\/tr>\n<tr>\n<td>Database Administrator (DBA)<\/td>\n<td>\u6578\u64da\u5eab\u7ba1\u7406\u54e1<\/td>\n<\/tr>\n<tr>\n<td>Database Management System (DBMS)<\/td>\n<td>\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>database query language<\/td>\n<td>\u6578\u64da\u5eab\u67e5\u8a62\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>deadlock<\/td>\n<td>\u6b7b\u9396<\/td>\n<\/tr>\n<tr>\n<td>debug<\/td>\n<td>\u9664\u932f<\/td>\n<\/tr>\n<tr>\n<td>Decision Support System (DSS)<\/td>\n<td>\u6c7a\u7b56\u652f\u63f4\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>declarative language<\/td>\n<td>\u5ba3\u544a\u6027\u8a9e\u8a00\uff1b\u9673\u8ff0\u6027\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>decode<\/td>\n<td>\u8b6f\u78bc\uff1b\u89e3\u78bc<\/td>\n<\/tr>\n<tr>\n<td>decryption<\/td>\n<td>\u89e3\u5bc6<\/td>\n<\/tr>\n<tr>\n<td>defragmentation software<\/td>\n<td>\u78c1\u789f\u91cd\u7d44\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>delimiter<\/td>\n<td>\u5b9a\u754c\u7b26\u865f<\/td>\n<\/tr>\n<tr>\n<td>Denial of Service (DoS)<\/td>\n<td>\u62d2\u7d55\u670d\u52d9<\/td>\n<\/tr>\n<tr>\n<td>depth-first search<\/td>\n<td>\u6df1\u5ea6\u512a\u5148\u641c\u7d22<\/td>\n<\/tr>\n<tr>\n<td>Desktop Publishing (DTP)<\/td>\n<td>\u684c\u4e0a\u6392\u7248<\/td>\n<\/tr>\n<tr>\n<td>Digital Analog Converter (DAC)<\/td>\n<td>\u6578\u78bc\u6a21\u64ec\u8f49\u63db\u5668<\/td>\n<\/tr>\n<tr>\n<td>Digital Audio Tape (DAT)<\/td>\n<td>\u6578\u78bc\u8072\u5e36<\/td>\n<\/tr>\n<tr>\n<td>digital divide<\/td>\n<td>\u6578\u78bc\u9694\u95a1\uff1b\u6578\u78bc\u9d3b\u6e9d<\/td>\n<\/tr>\n<tr>\n<td>Digital Subscriber Line (DSL)<\/td>\n<td>\u6578\u78bc\u7528\u6236\u7dda<\/td>\n<\/tr>\n<tr>\n<td>Digital Versatile Disc (DVD)<\/td>\n<td>\u6578\u78bc\u591a\u7528\u9014\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>direct cutover conversion<\/td>\n<td>\u76f4\u63a5\u5207\u5165\u5f0f\u8f49\u63db\uff1b\u76f4\u63a5\u63a5\u5165\u8f49\u63db<\/td>\n<\/tr>\n<tr>\n<td>Direct Memory Access (DMA)<\/td>\n<td>\u76f4\u63a5\u8a18\u61b6\u9ad4\u5b58\u53d6<\/td>\n<\/tr>\n<tr>\n<td>directory<\/td>\n<td>\u76ee\u9304<\/td>\n<\/tr>\n<tr>\n<td>diskette<\/td>\n<td>\u8edf\u78c1\u789f<\/td>\n<\/tr>\n<tr>\n<td>distributed system<\/td>\n<td>\u5206\u5e03\u5f0f\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>domain integrity<\/td>\n<td>\u57df\u5b8c\u6574\u6027<\/td>\n<\/tr>\n<tr>\n<td>Domain Name System (DNS)<\/td>\n<td>\u7db2\u57df\u540d\u7a31\u7cfb\u7d71\uff1b\u7db2\u57df\u7cfb\u7d71\uff1b\u57df\u540d\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>dot matrix<\/td>\n<td>\u9ede\u9663<\/td>\n<\/tr>\n<tr>\n<td>dot pitch<\/td>\n<td>\u9ede\u5bc6\u5ea6<\/td>\n<\/tr>\n<tr>\n<td>Double-Byte Character Set (DBCS)<\/td>\n<td>\u96d9\u5b57\u7bc0\u5b57\u7b26\u96c6<\/td>\n<\/tr>\n<tr>\n<td>Double-Data-Rate Synchronous Dynamic Random Access Memory (DDR SDRAM)<\/td>\n<td>\u96d9\u901a\u9053\u540c\u6b65\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>driver<\/td>\n<td>\u9a45\u52d5\u7a0b\u5f0f\uff1b\u9a45\u52d5\u5668<\/td>\n<\/tr>\n<tr>\n<td>Dual In-line Memory Module (DIMM)<\/td>\n<td>\u96d9\u5217\u76f4\u63d2\u5f0f\u8a18\u61b6\u9ad4\u6a21\u7d44<\/td>\n<\/tr>\n<tr>\n<td>dummy argument<\/td>\n<td>\u865b\u8b8a\u5143<\/td>\n<\/tr>\n<tr>\n<td>duplex<\/td>\n<td>\u96d9\u5411<\/td>\n<\/tr>\n<tr>\n<td>Dynamic Host Configuration Protocol (DHCP)<\/td>\n<td>\u52d5\u614b\u4e3b\u6a5f\u914d\u7f6e\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Dynamic Hypertext Markup Language (DHTML)<\/td>\n<td>\u52d5\u614b\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Dynamic Link Library (DLL)<\/td>\n<td>\u52d5\u614b\u9023\u7d50\u5eab<\/td>\n<\/tr>\n<tr>\n<td>Dynamic Random Access Memory (DRAM)<\/td>\n<td>\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Electrically Erasable Programmable Read Only Memory (EEPROM)<\/td>\n<td>\u53ef\u96fb\u522a\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Electronic Data Interchange (EDI)<\/td>\n<td>\u96fb\u5b50\u6578\u64da\u806f\u901a\uff1b\u96fb\u5b50\u6578\u64da\u4ea4\u63db<\/td>\n<\/tr>\n<tr>\n<td>Electronic Data Processing (EDP)<\/td>\n<td>\u96fb\u5b50\u6578\u64da\u8655\u7406<\/td>\n<\/tr>\n<tr>\n<td>Electronic Fund Transfer (EFT)<\/td>\n<td>\u96fb\u5b50\u8f49\u5e33<\/td>\n<\/tr>\n<tr>\n<td>Electronic Payment System<\/td>\n<td>\u96fb\u5b50\u4ed8\u6b3e\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>Electronic Service Delivery (ESD)<\/td>\n<td>\u516c\u5171\u670d\u52d9\u96fb\u5b50\u5316<\/td>\n<\/tr>\n<tr>\n<td>embedded system<\/td>\n<td>\u5d4c\u5165\u5f0f\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>encode<\/td>\n<td>\u7de8\u78bc<\/td>\n<\/tr>\n<tr>\n<td>encryption<\/td>\n<td>\u52a0\u5bc6<\/td>\n<\/tr>\n<tr>\n<td>End Of File (EOF)<\/td>\n<td>\u6a94\u5c3e<\/td>\n<\/tr>\n<tr>\n<td>Enhanced Graphics Adapter (EGA)<\/td>\n<td>\u52a0\u5f37\u5716\u5f62\u9069\u914d\u5668<\/td>\n<\/tr>\n<tr>\n<td>entity integrity<\/td>\n<td>\u5be6\u9ad4\u5b8c\u6574\u6027<\/td>\n<\/tr>\n<tr>\n<td>Entity Relationship Diagram (ERD)<\/td>\n<td>\u5be6\u9ad4\u95dc\u4fc2\u5716<\/td>\n<\/tr>\n<tr>\n<td>equi-join<\/td>\n<td>\u7b49\u9023\u63a5\uff1b\u7b49\u806f\u7d50<\/td>\n<\/tr>\n<tr>\n<td>Erasable Programmable Read Only Memory (EPROM)<\/td>\n<td>\u53ef\u522a\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>ergonomics<\/td>\n<td>\u4eba\u9ad4\u5de5\u5b78\uff1b\u4eba\u9ad4\u5de5\u7a0b\u5b78\uff1b\u4eba\u6a5f\u5de5\u7a0b\u5b78<\/td>\n<\/tr>\n<tr>\n<td>ethernet<\/td>\n<td>\u4ee5\u592a\u7db2\uff1b\u4e59\u592a\u7db2<\/td>\n<\/tr>\n<tr>\n<td>exception handling<\/td>\n<td>\u7570\u5e38\u8655\u7406<\/td>\n<\/tr>\n<tr>\n<td>explicit declaration<\/td>\n<td>\u986f\u5f0f\u8aaa\u660e<\/td>\n<\/tr>\n<tr>\n<td>expression<\/td>\n<td>\u7b97\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Extended Binary Coded Decimal Interchange Code (EBCDIC)<\/td>\n<td>\u64f4\u5145\u4e8c\/\u5341\u9032\u5236\u4ea4\u63db\u4ee3\u78bc<\/td>\n<\/tr>\n<tr>\n<td>Extended Graphics Array (XGA)<\/td>\n<td>\u64f4\u5145\u5716\u5f62\u9663\u5217<\/td>\n<\/tr>\n<tr>\n<td>Extended Industry Standard Architecture (EISA)<\/td>\n<td>\u5ef6\u4f38\u5de5\u696d\u6a19\u6e96\u67b6\u69cb<\/td>\n<\/tr>\n<tr>\n<td>Extensible Hypertext Markup Language (XHTML)<\/td>\n<td>\u53ef\u64f4\u5145\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00\uff1b\u53ef\u64f4\u5c55\u8d85\u6587\u672c\u6a19\u8a18\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Extensible Markup Language (XML)<\/td>\n<td>\u53ef\u64f4\u5145\u6a19\u793a\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>fault tolerant<\/td>\n<td>\u5bb9\u932f<\/td>\n<\/tr>\n<tr>\n<td>fetch-decode-execute cycle<\/td>\n<td>\u63d0\u53d6\uff0d\u8b6f\u78bc\uff0d\u57f7\u884c\u5468\u671f\uff1b\u63d0\u53d6\uff0d\u8b6f\u78bc\uff0d\u57f7\u884c\u5faa\u74b0<\/td>\n<\/tr>\n<tr>\n<td>Fibre Distributed Data Interface (FDDI)<\/td>\n<td>\u5149\u7e96\u5206\u5e03\u5f0f\u6578\u64da\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>field<\/td>\n<td>\u6b04<\/td>\n<\/tr>\n<tr>\n<td>File Allocation Table (FAT)<\/td>\n<td>\u6a94\u6848\u914d\u7f6e\u8868<\/td>\n<\/tr>\n<tr>\n<td>File Control Block (FCB)<\/td>\n<td>\u6a94\u6848\u63a7\u5236\u6bb5<\/td>\n<\/tr>\n<tr>\n<td>File Transfer Protocol (FTP)<\/td>\n<td>\u6a94\u6848\u50b3\u8f38\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>firewall<\/td>\n<td>\u9632\u706b\u7246<\/td>\n<\/tr>\n<tr>\n<td>firewire<\/td>\n<td>\u706b\u7dda<\/td>\n<\/tr>\n<tr>\n<td>firmware<\/td>\n<td>\u97cc\u9ad4\uff1b\u56fa\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>First Normal Form (1NF)<\/td>\n<td>\u7b2c\u4e00\u7bc4\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>First-In First-Out (FIFO)<\/td>\n<td>\u5148\u9032\u5148\u51fa\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>flag<\/td>\n<td>\u6a19\u8a18\uff1b\u65d7\u6a19<\/td>\n<\/tr>\n<tr>\n<td>flash memory<\/td>\n<td>\u5feb\u9583\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>flip-flop<\/td>\n<td>\u89f8\u767c\u5668\uff1b\u6b63\u53cd\u5668<\/td>\n<\/tr>\n<tr>\n<td>floppy disk<\/td>\n<td>\u8edf\u78c1\u789f<\/td>\n<\/tr>\n<tr>\n<td>flowchart<\/td>\n<td>\u6d41\u7a0b\u5716<\/td>\n<\/tr>\n<tr>\n<td>footer<\/td>\n<td>(1)\u9801\u5c3e\uff0c(2)\u8868\u5c3e<\/td>\n<\/tr>\n<tr>\n<td>foreign key<\/td>\n<td>\u5916\u9375\u78bc<\/td>\n<\/tr>\n<tr>\n<td>formal argument<\/td>\n<td>\u5f62\u5f0f\u8b8a\u5143<\/td>\n<\/tr>\n<tr>\n<td>formal parameter<\/td>\n<td>\u5f62\u5f0f\u53c3\u6578<\/td>\n<\/tr>\n<tr>\n<td>frame<\/td>\n<td>(1)\u5e40\uff1b\u5f71\u683c\uff0c(2)\u6846<\/td>\n<\/tr>\n<tr>\n<td>Frame Check Sequence (FCS)<\/td>\n<td>\u5e40\u6aa2\u9a57\u5e8f\u5217<\/td>\n<\/tr>\n<tr>\n<td>freeware<\/td>\n<td>\u514d\u8cbb\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>Gantt chart<\/td>\n<td>\u7518\u7279\u5716<\/td>\n<\/tr>\n<tr>\n<td>Garbage-In Garbage-Out (GIGO)<\/td>\n<td>\u7121\u7528\u8f38\u5165\u7121\u7528\u8f38\u51fa<\/td>\n<\/tr>\n<tr>\n<td>gateway<\/td>\n<td>\u7db2\u9593\u9023\u63a5\u5668\uff1b\u901a\u8a0a\u9598<\/td>\n<\/tr>\n<tr>\n<td>Geographic Information System (GIS)<\/td>\n<td>\u5730\u7406\u4fe1\u606f\u7cfb\u7d71\uff1b\u5730\u7406\u8cc7\u8a0a\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>Global Positioning System (GPS)<\/td>\n<td>\u5168\u7403\u5b9a\u4f4d\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>global variable<\/td>\n<td>\u5168\u7a0b\u8b8a\u91cf<\/td>\n<\/tr>\n<tr>\n<td>grandfather-father-son technique<\/td>\n<td>\u4e09\u4ee3\u5099\u4efd\u5132\u5b58\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>Graphical User Interface (GUI)<\/td>\n<td>\u5716\u5f62\u7528\u6236\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>Graphics Interchange Format (GIF)<\/td>\n<td>\u5716\u5f62\u4e92\u63db\u683c\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Guo Biao (GB) code<\/td>\n<td>\u570b\u6a19\u78bc\uff1b\u570b\u5bb6\u6a19\u6e96\u78bc<\/td>\n<\/tr>\n<tr>\n<td>hacking<\/td>\n<td>\u9ed1\u5ba2\u5165\u4fb5\uff1b\u99ed\u5ba2\u5165\u4fb5<\/td>\n<\/tr>\n<tr>\n<td>handshaking<\/td>\n<td>\u4fe1\u865f\u4ea4\u63db<\/td>\n<\/tr>\n<tr>\n<td>hang<\/td>\n<td>\u66ab\u505c\uff1b\u4e2d\u6b62\uff1b\u7576\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>hard disk<\/td>\n<td>\u786c\u789f\uff1b\u786c\u78c1\u789f<\/td>\n<\/tr>\n<tr>\n<td>hardware<\/td>\n<td>\u786c\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>header<\/td>\n<td>(1)\u9801\u9996\uff0c(2)\u8868\u982d<\/td>\n<\/tr>\n<tr>\n<td>hierarchical model<\/td>\n<td>\u5206\u7d1a\u6a21\u578b\uff1b\u5206\u5c64\u6a21\u578b<\/td>\n<\/tr>\n<tr>\n<td>high level language<\/td>\n<td>\u9ad8\u7d1a\u8a9e\u8a00\uff1b\u9ad8\u968e\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>homepage<\/td>\n<td>\u4e3b\u7db2\u9801\uff1b\u9996\u9801<\/td>\n<\/tr>\n<tr>\n<td>Hong Kong Supplementary Character Set (HKSCS)<\/td>\n<td>\u9999\u6e2f\u589e\u88dc\u5b57\u7b26\u96c6\uff1b\u9999\u6e2f\u589e\u88dc\u5b57\u5143\u96c6<\/td>\n<\/tr>\n<tr>\n<td>hub<\/td>\n<td>\u96c6\u7dda\u5668<\/td>\n<\/tr>\n<tr>\n<td>Human Computer Interface (HCI)<\/td>\n<td>\u4eba\u6a5f\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>hyperlink<\/td>\n<td>\u8d85\u9023\u7d50\uff1b\u8d85\u6587\u672c\u9023\u7d50<\/td>\n<\/tr>\n<tr>\n<td>Hypertext Markup Language (HTML)<\/td>\n<td>\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Hypertext Transfer Protocol (HTTP)<\/td>\n<td>\u8d85\u6587\u672c\u50b3\u8f38\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>icon<\/td>\n<td>\u5716\u793a\uff1b\u5716\u6a19<\/td>\n<\/tr>\n<tr>\n<td>identifier<\/td>\n<td>\u8b58\u5225\u7b26\uff1b\u6a19\u8b58\u7b26<\/td>\n<\/tr>\n<tr>\n<td>implicit declaration<\/td>\n<td>\u96b1\u5f0f\u8aaa\u660e<\/td>\n<\/tr>\n<tr>\n<td>index key<\/td>\n<td>\u7d22\u5f15\u9375\u78bc<\/td>\n<\/tr>\n<tr>\n<td>Industry Standard Architecture (ISA)<\/td>\n<td>\u5de5\u696d\u6a19\u6e96\u7d50\u69cb<\/td>\n<\/tr>\n<tr>\n<td>Infrared Data Association (IrDA) port<\/td>\n<td>\u7d05\u5916\u7dda\u6578\u64da\u57e0\uff1b\u7d05\u5916\u7dda\u6578\u64da\u9023\u63a5\u57e0<\/td>\n<\/tr>\n<tr>\n<td>initial program load<\/td>\n<td>\u521d\u59cb\u7a0b\u5f0f\u8f09\u5165\uff1b\u521d\u59cb\u7a0b\u5e8f\u8f09\u5165<\/td>\n<\/tr>\n<tr>\n<td>initialisation<\/td>\n<td>\u521d\u59cb\u5316<\/td>\n<\/tr>\n<tr>\n<td>inorder transversal<\/td>\n<td>\u4e2d\u5e8f\u904d\u6b77<\/td>\n<\/tr>\n<tr>\n<td>Input\/Output (I\/O) device<\/td>\n<td>\u8f38\u5165\/\u8f38\u51fa\u8a2d\u5099\uff1b\u8f38\u5165\/\u8f38\u51fa\u88dd\u7f6e<\/td>\n<\/tr>\n<tr>\n<td>Input-Process-Output (IPO) cycle<\/td>\n<td>\u8f38\u5165\uff0d\u8655\u7406\uff0d\u8f38\u51fa\u5468\u671f\uff1b\u8f38\u5165\uff0d\u8655\u7406\uff0d\u8f38\u51fa\u5faa\u74b0<\/td>\n<\/tr>\n<tr>\n<td>insertion sort<\/td>\n<td>\u63d2\u5165\u6392\u5e8f\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>instance<\/td>\n<td>\u5be6\u4f8b<\/td>\n<\/tr>\n<tr>\n<td>Institute of Electrical and Electronic Engineer (IEEE)<\/td>\n<td>\u96fb\u6a5f\u53ca\u96fb\u5b50\u5de5\u7a0b\u5e2b\u5b78\u6703<\/td>\n<\/tr>\n<tr>\n<td>Instruction Register (IR)<\/td>\n<td>\u6307\u4ee4\u5bc4\u5b58\u5668<\/td>\n<\/tr>\n<tr>\n<td>Integrated Circuit (IC)<\/td>\n<td>\u96c6\u6210\u96fb\u8def<\/td>\n<\/tr>\n<tr>\n<td>Integrated Drive Electronics (IDE)<\/td>\n<td>\u96c6\u6210\u96fb\u5b50\u88dd\u7f6e<\/td>\n<\/tr>\n<tr>\n<td>Integrated Services Digital Network (ISDN)<\/td>\n<td>\u7d9c\u5408\u670d\u52d9\u6578\u78bc\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>International Organisation for Standardisation (ISO)<\/td>\n<td>\u570b\u969b\u6a19\u6e96\u5316\u7d44\u7e54<\/td>\n<\/tr>\n<tr>\n<td>Internet<\/td>\n<td>\u4e92\u806f\u7db2<\/td>\n<\/tr>\n<tr>\n<td>Internet Control Message Protocol (ICMP)<\/td>\n<td>\u7db2\u7d61\u63a7\u5236\u4fe1\u606f\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Internet Message Access Protocol (IMAP)<\/td>\n<td>\u7db2\u7d61\u4fe1\u606f\u5b58\u53d6\u5354\u5b9a\uff1b\u7db2\u7d61\u4fe1\u606f\u63a5\u9054\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Internet Network Information Center (InterNIC)<\/td>\n<td>\u4e92\u806f\u7db2\u8cc7\u8a0a\u4e2d\u5fc3<\/td>\n<\/tr>\n<tr>\n<td>Internet of things (IoT)<\/td>\n<td>\u7269\u806f\u7db2<\/td>\n<\/tr>\n<tr>\n<td>Internet Protocol (IP)<\/td>\n<td>\u7db2\u7d61\u5354\u5b9a\uff1b\u4e92\u806f\u7db2\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Internet Service Provider (ISP)<\/td>\n<td>\u4e92\u806f\u7db2\u670d\u52d9\u4f9b\u61c9\u5546<\/td>\n<\/tr>\n<tr>\n<td>interoperability<\/td>\n<td>\u4e92\u7528\u6027\uff1b\u76f8\u4e92\u64cd\u4f5c\u6027<\/td>\n<\/tr>\n<tr>\n<td>interpreter<\/td>\n<td>\u89e3\u8b6f\u7a0b\u5f0f\uff1b\u89e3\u8b6f\u7a0b\u5e8f\uff1b\u89e3\u8b6f\u5668<\/td>\n<\/tr>\n<tr>\n<td>interrupt handler<\/td>\n<td>\u4e2d\u65b7\u8655\u7406\u7a0b\u5f0f\uff1b\u4e2d\u65b7\u8655\u7406\u5668\u7a0b\u5e8f<\/td>\n<\/tr>\n<tr>\n<td>Interrupt Request (IRQ)<\/td>\n<td>\u4e2d\u65b7\u8acb\u6c42<\/td>\n<\/tr>\n<tr>\n<td>intranet<\/td>\n<td>\u5167\u806f\u7db2<\/td>\n<\/tr>\n<tr>\n<td>IPsec<\/td>\n<td>\u4e92\uf997\u7db2\u7d61\u5354\u5b9a\u5b89\u5168<\/td>\n<\/tr>\n<tr>\n<td>iteration<\/td>\n<td>\u8fed\u4ee3\uff1b\u5faa\u74b0<\/td>\n<\/tr>\n<tr>\n<td>Joint Photographic Experts Group (JPEG)<\/td>\n<td>\u806f\u5408\u5f71\u50cf\u5c08\u5bb6\u7fa4\u7d44<\/td>\n<\/tr>\n<tr>\n<td>jumper<\/td>\n<td>\u8de8\u63a5\u5668<\/td>\n<\/tr>\n<tr>\n<td>kernel<\/td>\n<td>\u6838\u5fc3<\/td>\n<\/tr>\n<tr>\n<td>Large Scale Integration (LSI)<\/td>\n<td>\u5927\u898f\u6a21\u96c6\u6210\u6280\u8853<\/td>\n<\/tr>\n<tr>\n<td>Last-In First-Out (LIFO)<\/td>\n<td>\u5f8c\u9032\u5148\u51fa\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>latency<\/td>\n<td>\u6642\u5ef6<\/td>\n<\/tr>\n<tr>\n<td>leased line<\/td>\n<td>\u5c08\u7dda<\/td>\n<\/tr>\n<tr>\n<td>lexical analysis<\/td>\n<td>\u8a9e\u53e5\u5206\u6790\uff1b\u8a5e\u6cd5\u5206\u6790<\/td>\n<\/tr>\n<tr>\n<td>Line Feed (LF)<\/td>\n<td>\u63db\u884c<\/td>\n<\/tr>\n<tr>\n<td>linear linked list<\/td>\n<td>\u7dda\u6027\u93c8\u8868\uff1b\u7dda\u6027\u9023\u63a5\u8868<\/td>\n<\/tr>\n<tr>\n<td>linear search<\/td>\n<td>\u7dda\u6027\u6aa2\u7d22<\/td>\n<\/tr>\n<tr>\n<td>linked list<\/td>\n<td>\u93c8\u8868\uff1b\u9023\u63a5\u8868<\/td>\n<\/tr>\n<tr>\n<td>linker<\/td>\n<td>\u9023\u63a5\u7a0b\u5f0f\uff1b\u9023\u63a5\u7a0b\u5e8f<\/td>\n<\/tr>\n<tr>\n<td>loader<\/td>\n<td>\u8f09\u5165\u7a0b\u5f0f\uff1b\u8f09\u5165\u7a0b\u5e8f<\/td>\n<\/tr>\n<tr>\n<td>Local Area Network (LAN)<\/td>\n<td>\u5c40\u90e8\u5340\u57df\u7db2\u7d61\uff1b\u5340\u57df\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>local variable<\/td>\n<td>\u5c40\u90e8\u8b8a\u91cf<\/td>\n<\/tr>\n<tr>\n<td>loop<\/td>\n<td>\u5faa\u74b0<\/td>\n<\/tr>\n<tr>\n<td>low level language<\/td>\n<td>\u4f4e\u968e\u8a9e\u8a00\uff1b\u4f4e\u7d1a\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>machine language<\/td>\n<td>\u6a5f\u5668\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>magnetic core memory<\/td>\n<td>\u78c1\u854a\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Magnetic Ink Character Recognition (MICR)<\/td>\n<td>\u78c1\u58a8\u5b57\u7b26\u8b58\u5225\uff1b\u78c1\u58a8\u6c34\u5b57\u5143\u8b58\u5225<\/td>\n<\/tr>\n<tr>\n<td>Magneto-Optical (MO) disk<\/td>\n<td>\u78c1\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>mail merge<\/td>\n<td>\u90f5\u4ef6\u5408\u4f75\uff1b\u5408\u4f75\u5217\u5370<\/td>\n<\/tr>\n<tr>\n<td>main memory<\/td>\n<td>\u4e3b\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>mainframe computer<\/td>\n<td>\u5927\u578b\u96fb\u8166\uff1b\u4e3b\u6a5f\u96fb\u8166<\/td>\n<\/tr>\n<tr>\n<td>malware<\/td>\n<td>\u60e1\u610f\u8edf\u4ef6\uff1b\u60e1\u6027\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Management Information System (MIS)<\/td>\n<td>\u7ba1\u7406\u8cc7\u8a0a\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>mask<\/td>\n<td>\u906e\u7f69\uff1b\u5c4f\u853d\uff1b\u63a9\u78bc<\/td>\n<\/tr>\n<tr>\n<td>master-slave<\/td>\n<td>\u4e3b\u5f9e\uff1b\u4e3b\u5f9e\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Media Access Control (MAC)<\/td>\n<td>\u5a92\u4ecb\u63a5\u9054\u63a7\u5236\uff1b\u5a92\u4ecb\u5b58\u53d6\u63a7\u5236<\/td>\n<\/tr>\n<tr>\n<td>Memory Address Register (MAR)<\/td>\n<td>\u8a18\u61b6\u9ad4\u4f4d\u5740\u5bc4\u5b58\u5668<\/td>\n<\/tr>\n<tr>\n<td>Memory Data Register (MDR)<\/td>\n<td>\u8a18\u61b6\u9ad4\u6578\u64da\u5bc4\u5b58\u5668<\/td>\n<\/tr>\n<tr>\n<td>menu<\/td>\n<td>\u9078\u55ae\uff1b\u9078\u9805\u55ae<\/td>\n<\/tr>\n<tr>\n<td>merge sort<\/td>\n<td>\u5408\u4f75\u6392\u5e8f\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>metadata<\/td>\n<td>\u5143\u6578\u64da<\/td>\n<\/tr>\n<tr>\n<td>Metropolitan Area Network (MAN)<\/td>\n<td>\u57ce\u5e02\u5340\u57df\u7db2\u7d61\uff1b\u57ce\u57df\u7db2<\/td>\n<\/tr>\n<tr>\n<td>microcomputer<\/td>\n<td>\u5fae\u578b\u96fb\u8166\uff1b\u5fae\u8a08\u7b97\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>minicomputer<\/td>\n<td>\u5c0f\u578b\u96fb\u8166\uff1b\u5c0f\u578b\u8a08\u7b97\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>mirror<\/td>\n<td>\u93e1\u50cf\uff1b\u6620\u7167<\/td>\n<\/tr>\n<tr>\n<td>mnemonic<\/td>\n<td>\u52a9\u8a18\u64cd\u4f5c\u78bc\uff1b\u52a9\u8a18\u78bc<\/td>\n<\/tr>\n<tr>\n<td>modularity<\/td>\n<td>\u6a21\u7d44\u6027<\/td>\n<\/tr>\n<tr>\n<td>modulator-demodulator (modem)<\/td>\n<td>\u6578\u64da\u6a5f\uff1b\u8abf\u89e3\u5668\uff1b\u8abf\u5236\u89e3\u8abf\u5668<\/td>\n<\/tr>\n<tr>\n<td>morphing<\/td>\n<td>\u8b8a\u5f62<\/td>\n<\/tr>\n<tr>\n<td>Motion Picture Experts Group (MPEG)<\/td>\n<td>\u52d5\u756b\u5c08\u5bb6\u7fa4\u7d44<\/td>\n<\/tr>\n<tr>\n<td>multicast<\/td>\n<td>\u591a\u5740\u5ee3\u64ad\uff1b\u591a\u4fe1\u9053\u5ee3\u64ad<\/td>\n<\/tr>\n<tr>\n<td>multiplexing<\/td>\n<td>\u591a\u8def\u8f49\u63a5\uff1b\u591a\u8def\u50b3\u8f38<\/td>\n<\/tr>\n<tr>\n<td>multiprocessing<\/td>\n<td>\u591a\u9053\u8655\u7406<\/td>\n<\/tr>\n<tr>\n<td>Multipurpose Internet Mail Extension (MIME)<\/td>\n<td>\u591a\u529f\u80fd\u4e92\u806f\u7db2\u90f5\u905e\u4f38\u5ef6<\/td>\n<\/tr>\n<tr>\n<td>multitasking<\/td>\n<td>\u591a\u5de5\u4f5c\u696d\uff1b\u591a\u5de5\u8655\u7406<\/td>\n<\/tr>\n<tr>\n<td>multithreading<\/td>\n<td>\u591a\u7dda\u904b\u4f5c<\/td>\n<\/tr>\n<tr>\n<td>Musical Instrument Digital Interface (MIDI)<\/td>\n<td>\u6a02\u5668\u6578\u4f4d\u754c\u9762\uff1b\u6a02\u5668\u6578\u78bc\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>natural<\/td>\n<td>\u81ea\u7136\u9023\u63a5\uff1b\u81ea\u7136\u806f\u7d50<\/td>\n<\/tr>\n<tr>\n<td>Near Field Communication (NFC)<\/td>\n<td>\u8fd1\u5834\u901a\u8a0a<\/td>\n<\/tr>\n<tr>\n<td>nested function<\/td>\n<td>\u5d4c\u5957\u51fd\u6578<\/td>\n<\/tr>\n<tr>\n<td>nested loop<\/td>\n<td>\u5d4c\u5957\u5faa\u74b0<\/td>\n<\/tr>\n<tr>\n<td>netiquette<\/td>\n<td>\u7db2\u4e0a\u79ae\u5100\uff1b\u7db2\u4e0a\u7684\u884c\u70ba\u898f\u7bc4<\/td>\n<\/tr>\n<tr>\n<td>Network Address Translation (NAT)<\/td>\n<td>\u7db2\u5740\u7aef\u8f49\u63db<\/td>\n<\/tr>\n<tr>\n<td>Network Interface Card (NIC)<\/td>\n<td>\u7db2\u7d61\u754c\u9762\u5361<\/td>\n<\/tr>\n<tr>\n<td>network layer<\/td>\n<td>\u7db2\u7d61\u5c64<\/td>\n<\/tr>\n<tr>\n<td>Network Time Protocol (NTP)<\/td>\n<td>\u7db2\u7d61\u6642\u9593\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>network topology<\/td>\n<td>\u7db2\u7d61\u5e03\u5c40\uff1b\u7db2\u7d61\u4f48\u5c40<\/td>\n<\/tr>\n<tr>\n<td>node<\/td>\n<td>\u7bc0\u9ede<\/td>\n<\/tr>\n<tr>\n<td>normalisation<\/td>\n<td>\u898f\u7bc4\u5316\uff1b\u898f\u683c\u5316<\/td>\n<\/tr>\n<tr>\n<td>null<\/td>\n<td>\u7a7a\u503c<\/td>\n<\/tr>\n<tr>\n<td>Object Linking and Embedding (OLE)<\/td>\n<td>\u7269\u4ef6\u9023\u63a5\u8207\u5d4c\u5165<\/td>\n<\/tr>\n<tr>\n<td>Object-Oriented Programming (OOP)<\/td>\n<td>\u7269\u4ef6\u5c0e\u5411\u7de8\u7a0b<\/td>\n<\/tr>\n<tr>\n<td>one-dimensional array<\/td>\n<td>\u4e00\u7dad\u9663\u5217\uff1b\u55ae\u9663\u5217<\/td>\n<\/tr>\n<tr>\n<td>one&#8217;s complement<\/td>\n<td>\u4e00\u88dc\u78bc<\/td>\n<\/tr>\n<tr>\n<td>open source software<\/td>\n<td>\u958b\u653e\u6e90\u78bc\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>Open System Interconnection (OSI)<\/td>\n<td>\u958b\u653e\u7cfb\u7d71\u4e92\u9023<\/td>\n<\/tr>\n<tr>\n<td>operand<\/td>\n<td>\u64cd\u4f5c\u6578<\/td>\n<\/tr>\n<tr>\n<td>Operating System (OS)<\/td>\n<td>\u64cd\u4f5c\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>operation code (op-code)<\/td>\n<td>\u64cd\u4f5c\u78bc<\/td>\n<\/tr>\n<tr>\n<td>operator<\/td>\n<td>(1)\u904b\u7b97\u7b26\uff0c(2)\u64cd\u4f5c\u54e1<\/td>\n<\/tr>\n<tr>\n<td>Optical Character Recognition (OCR)<\/td>\n<td>\u5149\u7b26\u8b58\u5225<\/td>\n<\/tr>\n<tr>\n<td>Optical Mark Recognition (OMR)<\/td>\n<td>\u5149\u6a19\u8b58\u5225\uff1b\u5149\u5b78\u6a19\u8a18\u8b58\u5225<\/td>\n<\/tr>\n<tr>\n<td>outer join<\/td>\n<td>\u5916\u9023\u63a5\uff1b\u5916\u806f\u7d50<\/td>\n<\/tr>\n<tr>\n<td>overflow error<\/td>\n<td>\u4e0a\u6ea2\u932f\u8aa4\uff1b\u6ea2\u51fa\u8aa4\u5dee<\/td>\n<\/tr>\n<tr>\n<td>packet switching<\/td>\n<td>\u6578\u64da\u5305\u5207\u63db<\/td>\n<\/tr>\n<tr>\n<td>parallel conversion<\/td>\n<td>\u4e26\u884c\u5f0f\u8f49\u63db\uff1b\u5e73\u884c\u8f49\u63db<\/td>\n<\/tr>\n<tr>\n<td>parallel port<\/td>\n<td>\u4e26\u884c\u57e0<\/td>\n<\/tr>\n<tr>\n<td>parameter<\/td>\n<td>\u53c3\u6578<\/td>\n<\/tr>\n<tr>\n<td>parameter passing<\/td>\n<td>\u53c3\u6578\u50b3\u905e<\/td>\n<\/tr>\n<tr>\n<td>parity<\/td>\n<td>\u5947\u5076\u6027<\/td>\n<\/tr>\n<tr>\n<td>parity bit<\/td>\n<td>\u5947\u5076\u6aa2\u9a57\u4f4d<\/td>\n<\/tr>\n<tr>\n<td>parity check<\/td>\n<td>\u5947\u5076\u6aa2\u6e2c<\/td>\n<\/tr>\n<tr>\n<td>parser<\/td>\n<td>\u8a9e\u6cd5\u5206\u6790\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>PCMCIA card (PC card)<\/td>\n<td>\u624b\u63d0\u96fb\u8166\u7db2\u5361\uff1b\u96fb\u8166\u63d2\u5361<\/td>\n<\/tr>\n<tr>\n<td>Peer-to-Peer (P2P) file sharing software<\/td>\n<td>\u9ede\u5c0d\u9ede\u6a94\u6848\u5206\u4eab\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>Peer-to-Peer (P2P) network<\/td>\n<td>\u5c0d\u7b49\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>Peripheral Component Interconnect (PCI)<\/td>\n<td>\u5468\u908a\u90e8\u4ef6\u4e92\u9023\uff1b\u5468\u908a\u7d44\u4ef6\u806f\u7e6b<\/td>\n<\/tr>\n<tr>\n<td>Personal Area Network (PAN)<\/td>\n<td>\u500b\u4eba\u5340\u57df\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>Personal Digital Assistant (PDA)<\/td>\n<td>\u500b\u4eba\u6578\u78bc\u52a9\u7406<\/td>\n<\/tr>\n<tr>\n<td>Personal Identity Number (PIN)<\/td>\n<td>\u500b\u4eba\u8b58\u5225\u865f\u78bc<\/td>\n<\/tr>\n<tr>\n<td>phased conversion<\/td>\n<td>\u968e\u6bb5\u5f0f\u8f49\u63db\uff1b\u968e\u6bb5\u8f49\u63db<\/td>\n<\/tr>\n<tr>\n<td>phishing<\/td>\n<td>\u4eff\u5192\u8a50\u9a19<\/td>\n<\/tr>\n<tr>\n<td>physical layer<\/td>\n<td>\u5be6\u9ad4\u5c64<\/td>\n<\/tr>\n<tr>\n<td>picture element (pixel)<\/td>\n<td>\u50cf\u7d20<\/td>\n<\/tr>\n<tr>\n<td>pilot conversion<\/td>\n<td>\u5f15\u5c0e\u5f0f\u8f49\u63db\uff1b\u5be6\u9a57\u8f49\u63db<\/td>\n<\/tr>\n<tr>\n<td>pipelining<\/td>\n<td>\u6d41\u6c34\u7dda\u64cd\u4f5c\uff1b\u6d41\u6c34\u7dda\u6280\u8853<\/td>\n<\/tr>\n<tr>\n<td>pitch<\/td>\n<td>(1)\u5b57\u5143\u9593\u8ddd\uff1b\u5b57\u5bec\uff0c(2)\u97f3\u8abf<\/td>\n<\/tr>\n<tr>\n<td>pivot table<\/td>\n<td>\u6a1e\u7d10\u5206\u6790\u8868<\/td>\n<\/tr>\n<tr>\n<td>Plug and Play (PnP)<\/td>\n<td>\u96a8\u63d2\u5373\u7528<\/td>\n<\/tr>\n<tr>\n<td>plug-in<\/td>\n<td>\u63d2\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>pointer<\/td>\n<td>\u6307\u793a\u5b57\uff1b\u6307\u793a\u6a19<\/td>\n<\/tr>\n<tr>\n<td>Point-Of-Sale (POS) terminal<\/td>\n<td>\u92b7\u552e\u9ede\u7d42\u7aef\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>Point-to-Point Protocol (PPP)<\/td>\n<td>\u9ede\u5c0d\u9ede\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Point-to-Point Protocol over Ethernet (PPPoE)<\/td>\n<td>\u4ee5\u592a\u7db2\u5167\u9ede\u5c0d\u9ede\u50b3\u8f38\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Point-to-Point Tunneling Protocol (PPTP)<\/td>\n<td>\u9ede\u81f3\u9ede\u958b\u96a7\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Polish notation<\/td>\n<td>\u6ce2\u7fa9\u8868\u793a\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>polling<\/td>\n<td>\u8f2a\u8a62\uff1b\u63a2\u8a62<\/td>\n<\/tr>\n<tr>\n<td>polymorphism<\/td>\n<td>\u591a\u5f62\u6027<\/td>\n<\/tr>\n<tr>\n<td>Portable Document Format (PDF)<\/td>\n<td>\u53ef\u651c\u5f0f\u6587\u4ef6\u683c\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Portable Network Graphics (PNG)<\/td>\n<td>\u4fbf\u651c\u5f0f\u7db2\u7d61\u5716\u5f62\u683c\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>portal<\/td>\n<td>\u5165\u9580\u7db2\u7ad9<\/td>\n<\/tr>\n<tr>\n<td>Post Office Protocol (POP)<\/td>\n<td>\u90f5\u5c40\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>presentation layer<\/td>\n<td>\u8868\u793a\u5c64<\/td>\n<\/tr>\n<tr>\n<td>primary key<\/td>\n<td>\u4e3b\u95dc\u9375\u78bc<\/td>\n<\/tr>\n<tr>\n<td>private key<\/td>\n<td>\u79c1\u4eba\u5bc6\u78bc\u5319\uff1b\u79c1\u9470<\/td>\n<\/tr>\n<tr>\n<td>procedural language<\/td>\n<td>\u904e\u7a0b\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>program<\/td>\n<td>\u7a0b\u5f0f\uff1b\u7a0b\u5e8f<\/td>\n<\/tr>\n<tr>\n<td>Program Counter (PC)<\/td>\n<td>\u7a0b\u5f0f\u8a08\u6578\u5668<\/td>\n<\/tr>\n<tr>\n<td>Programmable Read Only Memory (PROM)<\/td>\n<td>\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>protocol layer<\/td>\n<td>\u5354\u5b9a\u5c64<\/td>\n<\/tr>\n<tr>\n<td>prototype<\/td>\n<td>\u539f\u578b<\/td>\n<\/tr>\n<tr>\n<td>proxy server<\/td>\n<td>\u4ee3\u7406\u4f3a\u670d\u5668<\/td>\n<\/tr>\n<tr>\n<td>pseudocode<\/td>\n<td>\u507d\u4ee3\u78bc<\/td>\n<\/tr>\n<tr>\n<td>public key<\/td>\n<td>\u516c\u958b\u5bc6\u78bc\u5319\uff1b\u516c\u9470<\/td>\n<\/tr>\n<tr>\n<td>Public Key Infrastructure (PKI)<\/td>\n<td>\u516c\u958b\u5bc6\u78bc\u5319\u57fa\u790e\u5efa\u8a2d\uff1b\u516c\u9470\u57fa\u790e\u5efa\u8a2d<\/td>\n<\/tr>\n<tr>\n<td>Public Non-exclusive Electronic Transmission Services (PNETS)<\/td>\n<td>\u516c\u5171\u975e\u5c08\u5229\u96fb\u8a0a\u670d\u52d9<\/td>\n<\/tr>\n<tr>\n<td>query by example<\/td>\n<td>\u7bc4\u4f8b\u67e5\u8a62\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>queue<\/td>\n<td>\u968a\u5217<\/td>\n<\/tr>\n<tr>\n<td>quick sort<\/td>\n<td>\u5feb\u901f\u6392\u5e8f\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>radical<\/td>\n<td>\u90e8\u9996<\/td>\n<\/tr>\n<tr>\n<td>radio button<\/td>\n<td>\u55ae\u9078\u6309\u9215<\/td>\n<\/tr>\n<tr>\n<td>Radio Frequency Identification (RFID)<\/td>\n<td>\u7121\u7dda\u5c04\u983b\u8b58\u5225<\/td>\n<\/tr>\n<tr>\n<td>Random Access Memory (RAM)<\/td>\n<td>\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>ransomware<\/td>\n<td>\u52d2\u7d22\u8edf\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Rapid Application Development (RAD)<\/td>\n<td>\u61c9\u7528\u7cfb\u7d71\u8fc5\u901f\u767c\u5c55\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>Read-Only Memory (ROM)<\/td>\n<td>\u552f\u8b80\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Really Simple Syndication (RSS)<\/td>\n<td>\u7c21\u6613\u8cc7\u8a0a\u805a\u5408<\/td>\n<\/tr>\n<tr>\n<td>real-time processing<\/td>\n<td>\u5be6\u6642\u8655\u7406<\/td>\n<\/tr>\n<tr>\n<td>recursion<\/td>\n<td>\u905e\u6b78<\/td>\n<\/tr>\n<tr>\n<td>Reduced Instruction Set Computer (RISC)<\/td>\n<td>\u7cbe\u7c21\u6307\u4ee4\u96c6\u96fb\u8166<\/td>\n<\/tr>\n<tr>\n<td>Redundant Array of Independent Disks (RAID)<\/td>\n<td>\u5197\u9918\u78c1\u789f\u7d44\uff1b\u5197\u9918\u78c1\u789f\u9663<\/td>\n<\/tr>\n<tr>\n<td>referential integrity<\/td>\n<td>\u53c3\u7167\u5b8c\u6574\u6027<\/td>\n<\/tr>\n<tr>\n<td>register<\/td>\n<td>\u66ab\u5b58\u5668\uff1b\u5bc4\u5b58\u5668<\/td>\n<\/tr>\n<tr>\n<td>Relational Database Management System (RDBMS)<\/td>\n<td>\u95dc\u806f\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71\uff1b\u95dc\u4fc2\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71<\/td>\n<\/tr>\n<tr>\n<td>Remote Procedure Call (RPC)<\/td>\n<td>\u9060\u7a0b\u7a0b\u5e8f\u8abf\u7528<\/td>\n<\/tr>\n<tr>\n<td>repeater<\/td>\n<td>\u8f49\u767c\u5668\uff1b\u4e2d\u7e7c\u5668<\/td>\n<\/tr>\n<tr>\n<td>reserved word<\/td>\n<td>\u4fdd\u7559\u5b57<\/td>\n<\/tr>\n<tr>\n<td>resolution<\/td>\n<td>\u89e3\u50cf\u5ea6\uff1b\u89e3\u6790\u5ea6<\/td>\n<\/tr>\n<tr>\n<td>Rich Text Format (RTF)<\/td>\n<td>\u591a\u6587\u672c\u683c\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>root directory<\/td>\n<td>\u6839\u76ee\u9304<\/td>\n<\/tr>\n<tr>\n<td>rounding error<\/td>\n<td>\u6368\u5165\u8aa4\u5dee<\/td>\n<\/tr>\n<tr>\n<td>router<\/td>\n<td>\u8def\u7531\u5668<\/td>\n<\/tr>\n<tr>\n<td>Routing Information Protocol (RIP)<\/td>\n<td>\u8def\u5f91\u9078\u64c7\u8cc7\u8a0a\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>run<\/td>\n<td>\u57f7\u884c\uff1b\u904b\u884c<\/td>\n<\/tr>\n<tr>\n<td>scalar type<\/td>\n<td>\u6a19\u91cf\u985e\u5f62<\/td>\n<\/tr>\n<tr>\n<td>schema<\/td>\n<td>\u6a21\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>scripting language<\/td>\n<td>\u624b\u7a3f\u7a0b\u5f0f\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>search engine<\/td>\n<td>\u641c\u5c0b\u5668\uff1b\u6aa2\u7d22\u5668<\/td>\n<\/tr>\n<tr>\n<td>Second Normal Form (2NF)<\/td>\n<td>\u7b2c\u4e8c\u7bc4\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>secondary key<\/td>\n<td>\u8f14\u52a9\u95dc\u9375\u78bc<\/td>\n<\/tr>\n<tr>\n<td>secondary storage<\/td>\n<td>\u8f14\u52a9\u5132\u5b58\u5668\uff1b\u8f14\u52a9\u5b58\u8caf\u5668<\/td>\n<\/tr>\n<tr>\n<td>sector<\/td>\n<td>\u6247\u5340<\/td>\n<\/tr>\n<tr>\n<td>Secure Electronic Transaction (SET)<\/td>\n<td>\u4fdd\u5bc6\u96fb\u5b50\u4ea4\u6613<\/td>\n<\/tr>\n<tr>\n<td>Secure Sockets Layer (SSL)<\/td>\n<td>\u4fdd\u5bc6\u63d2\u53e3\u5c64<\/td>\n<\/tr>\n<tr>\n<td>segment<\/td>\n<td>\u6bb5\uff1b\u90e8\u5206<\/td>\n<\/tr>\n<tr>\n<td>serial port<\/td>\n<td>\u4e32\u884c\u57e0<\/td>\n<\/tr>\n<tr>\n<td>server-side<\/td>\n<td>\u4f3a\u670d\u5668\u7aef<\/td>\n<\/tr>\n<tr>\n<td>session layer<\/td>\n<td>\u8a71\u8def\u5c64\uff1b\u6703\u8a71\u5c64<\/td>\n<\/tr>\n<tr>\n<td>shareware<\/td>\n<td>\u5171\u4eab\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>Shielded Twisted Pair (STP)<\/td>\n<td>\u5c4f\u853d\u96d9\u626d\u7dda<\/td>\n<\/tr>\n<tr>\n<td>Short Message Service (SMS)<\/td>\n<td>\u77ed\u8a0a\u670d\u52d9<\/td>\n<\/tr>\n<tr>\n<td>Simple Mail Transfer Protocol (SMTP)<\/td>\n<td>\u7c21\u55ae\u90f5\u905e\u50b3\u9001\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Simple Network Management Protocol (SNMP)<\/td>\n<td>\u7c21\u55ae\u7db2\u7d61\u7ba1\u7406\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>simplex<\/td>\n<td>\u55ae\u5411<\/td>\n<\/tr>\n<tr>\n<td>slot<\/td>\n<td>\u69fd<\/td>\n<\/tr>\n<tr>\n<td>Small Computer Systems Interface (SCSI)<\/td>\n<td>\u5c0f\u578b\u96fb\u8166\u7cfb\u7d71\u754c\u9762<\/td>\n<\/tr>\n<tr>\n<td>software<\/td>\n<td>\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>source code<\/td>\n<td>\u6e90\u78bc<\/td>\n<\/tr>\n<tr>\n<td>spamming<\/td>\n<td>\u6feb\u767c\u90f5\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>spooling<\/td>\n<td>\u5047\u812b\u6a5f\u8f38\u5165\u8f38\u51fa<\/td>\n<\/tr>\n<tr>\n<td>spyware<\/td>\n<td>\u9593\u8adc\u7a0b\u5f0f\uff1b\u9593\u8adc\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>stack<\/td>\n<td>\u5806\u758a<\/td>\n<\/tr>\n<tr>\n<td>Static Random Access Memory (SRAM)<\/td>\n<td>\u975c\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>Status Register (SR)<\/td>\n<td>\u72c0\u614b\u5bc4\u5b58\u5668<\/td>\n<\/tr>\n<tr>\n<td>stepwise refinement<\/td>\n<td>\u9010\u6b65\u6c42\u7cbe\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>streaming<\/td>\n<td>\u4e32\u6d41\u50b3\u8f38\uff1b\u6d41\u5f0f\u50b3\u8f38<\/td>\n<\/tr>\n<tr>\n<td>string<\/td>\n<td>\u5b57\u4e32\uff1b\u5b57\u7b26\u4e32<\/td>\n<\/tr>\n<tr>\n<td>structure chart<\/td>\n<td>\u7d50\u69cb\u5716<\/td>\n<\/tr>\n<tr>\n<td>Structured Query Language (SQL)<\/td>\n<td>\u7d50\u69cb\u5316\u67e5\u8a62\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>stub<\/td>\n<td>\u5b50\u7a0b\u5f0f\u5b58\u6839\uff1b\u5b50\u7a0b\u5e8f\u5b58\u6839<\/td>\n<\/tr>\n<tr>\n<td>subdirectory<\/td>\n<td>\u5b50\u76ee\u9304<\/td>\n<\/tr>\n<tr>\n<td>subnet<\/td>\n<td>\u5b50\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>sub-program<\/td>\n<td>\u5b50\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>Super Video Graphics Array (SVGA)<\/td>\n<td>\u8d85\u8996\u50cf\u5716\u5f62\u9663\u5217<\/td>\n<\/tr>\n<tr>\n<td>supercomputer<\/td>\n<td>\u8d85\u7d1a\u96fb\u8166<\/td>\n<\/tr>\n<tr>\n<td>switch<\/td>\n<td>\u4ea4\u63db\u5668<\/td>\n<\/tr>\n<tr>\n<td>Synchronous Data Link Control (SDLC)<\/td>\n<td>\u540c\u6b65\u6578\u64da\u93c8\u8def\u63a7\u5236\uff1b\u540c\u6b65\u6578\u64da\u9023\u7d50\u63a7\u5236<\/td>\n<\/tr>\n<tr>\n<td>Synchronous Dynamic Random Access Memory (SDRAM)<\/td>\n<td>\u540c\u6b65\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/td>\n<\/tr>\n<tr>\n<td>syntax<\/td>\n<td>\u8a9e\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>System Development Life Cycle (SDLC)<\/td>\n<td>\u7cfb\u7d71\u958b\u767c\u751f\u547d\u5468\u671f<\/td>\n<\/tr>\n<tr>\n<td>Tagged Image File Format (TIFF)<\/td>\n<td>\u6a19\u8a18\u5716\u50cf\u6587\u4ef6\u683c\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>telecommunication<\/td>\n<td>\u9060\u7a0b\u901a\u8a0a<\/td>\n<\/tr>\n<tr>\n<td>telecommuting<\/td>\n<td>\u9060\u7a0b\u901a\u52e4\uff1b\u96fb\u50b3\u901a\u52e4\uff1b\u96fb\u5b50\u901a\u52e4<\/td>\n<\/tr>\n<tr>\n<td>telnet<\/td>\n<td>\u9060\u7a0b\u767b\u9304\uff1b\u9060\u7aef\u767b\u5165<\/td>\n<\/tr>\n<tr>\n<td>terminal<\/td>\n<td>\u7d42\u7aef\u6a5f<\/td>\n<\/tr>\n<tr>\n<td>Thin-Film Transistor (TFT)<\/td>\n<td>\u8584\u819c\u6676\u9ad4\u7ba1<\/td>\n<\/tr>\n<tr>\n<td>Third Normal Form (3NF)<\/td>\n<td>\u7b2c\u4e09\u7bc4\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>token<\/td>\n<td>\u6b0a\u6a19\uff1b\u4ee4\u724c<\/td>\n<\/tr>\n<tr>\n<td>token ring<\/td>\n<td>\u6b0a\u6a19\u74b0\uff1b\u4ee4\u724c\u74b0<\/td>\n<\/tr>\n<tr>\n<td>track<\/td>\n<td>\u78c1\u9053<\/td>\n<\/tr>\n<tr>\n<td>trailer<\/td>\n<td>\u8868\u5c3e<\/td>\n<\/tr>\n<tr>\n<td>transcription error<\/td>\n<td>\u8f49\u9304\u932f\u8aa4<\/td>\n<\/tr>\n<tr>\n<td>Transmission Control Protocol (TCP)<\/td>\n<td>\u50b3\u8f38\u63a7\u5236\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>transport layer<\/td>\n<td>\u50b3\u8f38\u5c64<\/td>\n<\/tr>\n<tr>\n<td>traversal<\/td>\n<td>\u904d\u6b77<\/td>\n<\/tr>\n<tr>\n<td>tree structure<\/td>\n<td>\u6a39\u72c0\u7d50\u69cb<\/td>\n<\/tr>\n<tr>\n<td>trial-and-error approach<\/td>\n<td>\u8a66\u6e4a\u6cd5<\/td>\n<\/tr>\n<tr>\n<td>Trojan program<\/td>\n<td>\u6728\u99ac\u7a0b\u5f0f<\/td>\n<\/tr>\n<tr>\n<td>truncation error<\/td>\n<td>\u622a\u5c3e\u8aa4\u5dee<\/td>\n<\/tr>\n<tr>\n<td>truth table<\/td>\n<td>\u771f\u503c\u8868\uff1b\u771f\u5047\u503c\u8868<\/td>\n<\/tr>\n<tr>\n<td>tweening<\/td>\n<td>\u6f38\u8b8a\uff1b\u88dc\u9593<\/td>\n<\/tr>\n<tr>\n<td>twisted pair<\/td>\n<td>\u96d9\u626d\u7dda<\/td>\n<\/tr>\n<tr>\n<td>two-dimensional array<\/td>\n<td>\u96d9\u9663\u5217\uff1b\u4e8c\u7dad\u9663\u5217<\/td>\n<\/tr>\n<tr>\n<td>two&#8217;s complement<\/td>\n<td>\u4e8c\u88dc\u78bc\uff1b\u4e8c\u9032\u5236\u88dc\u78bc<\/td>\n<\/tr>\n<tr>\n<td>underflow error<\/td>\n<td>\u4e0b\u6ea2\u932f\u8aa4\uff1b\u4e0b\u6ea2\u8aa4\u5dee<\/td>\n<\/tr>\n<tr>\n<td>Unicode<\/td>\n<td>\u7d71\u4e00\u78bc<\/td>\n<\/tr>\n<tr>\n<td>Uniform Resource Locator (URL)<\/td>\n<td>\u5283\u4e00\u8cc7\u6e90\u5b9a\u4f4d<\/td>\n<\/tr>\n<tr>\n<td>Uninterruptible Power Supply (UPS)<\/td>\n<td>\u4e0d\u9593\u65b7\u96fb\u6e90\u4f9b\u61c9\u5668<\/td>\n<\/tr>\n<tr>\n<td>Universal Product Code (UPC)<\/td>\n<td>\u901a\u7528\u7522\u54c1\u78bc<\/td>\n<\/tr>\n<tr>\n<td>Universal Serial Bus (USB)<\/td>\n<td>\u901a\u7528\u4e32\u5217\u532f\u6d41\u6392\uff1b\u901a\u7528\u4e32\u884c\u7e3d\u7dda<\/td>\n<\/tr>\n<tr>\n<td>Unshielded Twisted Pair (UTP)<\/td>\n<td>\u7121\u5c4f\u853d\u96d9\u626d\u7dda<\/td>\n<\/tr>\n<tr>\n<td>User Datagram Protocol (UDP)<\/td>\n<td>\u7528\u6236\u6578\u64da\u5305\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>utility software<\/td>\n<td>\u5be6\u7528\u8edf\u4ef6<\/td>\n<\/tr>\n<tr>\n<td>validation<\/td>\n<td>\u6709\u6548\u6027\u6aa2\u9a57<\/td>\n<\/tr>\n<tr>\n<td>variable<\/td>\n<td>\u8b8a\u91cf<\/td>\n<\/tr>\n<tr>\n<td>verification<\/td>\n<td>\u6821\u9a57\uff1b\u9a57\u8b49<\/td>\n<\/tr>\n<tr>\n<td>Very Large Scale Integration (VLSI)<\/td>\n<td>\u8d85\u5927\u898f\u6a21\u96c6\u6210\u96fb\u8def<\/td>\n<\/tr>\n<tr>\n<td>Video Compact Disc (VCD)<\/td>\n<td>\u8996\u50cf\u5149\u789f<\/td>\n<\/tr>\n<tr>\n<td>Video Graphics Array (VGA)<\/td>\n<td>\u8996\u50cf\u5716\u5f62\u9663\u5217<\/td>\n<\/tr>\n<tr>\n<td>Video On Demand (VOD)<\/td>\n<td>\u81ea\u9078\u8996\u8a0a\u670d\u52d9<\/td>\n<\/tr>\n<tr>\n<td>Virtual Private Network (VPN)<\/td>\n<td>\u865b\u64ec\u79c1\u6709\u7db2\u7d61\uff1b\u865b\u64ec\u5c08\u7528\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>Virtual Reality (VR)<\/td>\n<td>\u865b\u64ec\u5be6\u5883\uff1b\u865b\u64ec\u73fe\u5be6<\/td>\n<\/tr>\n<tr>\n<td>Virtual Reality Modeling Language (VRML)<\/td>\n<td>\u865b\u64ec\u5be6\u5883\u88fd\u6a21\u8a9e\u8a00\uff1b\u865b\u64ec\u73fe\u5be6\u5efa\u6a21\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>Visual Display Unit (VDU)<\/td>\n<td>\u986f\u793a\u5668<\/td>\n<\/tr>\n<tr>\n<td>volatility<\/td>\n<td>\u6613\u5931\u6027<\/td>\n<\/tr>\n<tr>\n<td>waterfall model<\/td>\n<td>\u7011\u5e03\u6a21\u5f0f\uff1b\u7011\u5e03\u6a21\u578b<\/td>\n<\/tr>\n<tr>\n<td>what-if analysis<\/td>\n<td>\u5047\u8a2d\u5206\u6790<\/td>\n<\/tr>\n<tr>\n<td>Wide Area Network (WAN)<\/td>\n<td>\u5bec\u5ee3\u5340\u57df\u7db2\u7d61\uff1b\u5ee3\u57df\u7db2\u7d61<\/td>\n<\/tr>\n<tr>\n<td>Wired Equivalent Privacy (WEP)<\/td>\n<td>\u6709\u7dda\u7b49\u6548\u52a0\u5bc6<\/td>\n<\/tr>\n<tr>\n<td>Wireless Application Protocol (WAP)<\/td>\n<td>\u7121\u7dda\u61c9\u7528\u7cfb\u7d71\u5354\u5b9a<\/td>\n<\/tr>\n<tr>\n<td>Wireless Markup Language (WML)<\/td>\n<td>\u7121\u7dda\u6a19\u793a\u8a9e\u8a00<\/td>\n<\/tr>\n<tr>\n<td>World Wide Web (WWW)<\/td>\n<td>\u842c\u7dad\u7db2<\/td>\n<\/tr>\n<tr>\n<td>World Wide Web Consortium (W3C)<\/td>\n<td>\u842c\u7dad\u7db2\u806f\u76df<\/td>\n<\/tr>\n<tr>\n<td>worm<\/td>\n<td>\u8815\u87f2<\/td>\n<\/tr>\n<tr>\n<td>Write-Once Read-Many (WORM)<\/td>\n<td>\u55ae\u5beb\u591a\u8b80<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last updated: 23\/12\/2016 \u4ee5\u4e0b\u5217\u51fa\u4e00\u4e9b\u6839\u64da\u6559\u80b2\u5c40\u7684\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59\u3002\u5927\u5bb6\u53ea\u9808\u4f7f\u7528\u700f\u89bd\u5668\u5167\u7684\u641c\u5c0b\u529f\u80fd(\u4f8b\uff1aChrome or Firefox \u00a0\u6309 Ctrl-F)\uff0c\u4fbf\u53ef\u4ee5\u98db\u5feb\u5730\u641c\u5230\u4e2d\u82f1\u6587\u7684\u8fad\u5f59\u4e86\uff08\u5716\u4e2d\u53f3\u9762scroll bar\u7684\u9ec3\u8272\u6a6b\u7dda\u5373\u9078\u5b57\u7684\u51fa\u73fe\u4f4d\u7f6e\uff09\u3002\u5e0c\u671b\u4e5f\u80fd\u5920\u5e6b\u5230\u5927\u5bb6\uff01 iGardener\u8001\u5e2b\u6703\u5b9a\u671f\u66f4\u65b0\u5176\u4ed6\u8fad\u5f59\uff0c\u65b9\u4fbf\u5927\u5bb6\u53c3\u95b1\u3002 \u8fad\u5f59\u4f86\u6e90\uff1a \u6559\u80b2\u5c40\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1-\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59\u3000\uff08\u6700\u5f8c\u66f4\u65b0\uff1a2016\u5e7412\u6708\uff09 &nbsp; \u9cf4\u8b1d\uff1a\u555f\u7199\u540c\u5b78(&#8217;14)\u3001\u4fca\u6607\u540c\u5b78(&#8217;13)\u6574\u7406\u7b2c\u4e00\u7248 Accelerated Graphics Port (AGP) \u5716\u5f62\u52a0\u901f\u57e0 Access Point (AP) \u7db2\u7d61\u63a5\u9054\u9ede accumulator \u7d2f\u52a0\u5668 actual argument \u5be6\u969b\u8b8a\u5143 actual parameter \u5be6\u969b\u53c3\u6578 adapter \u9069\u914d\u5668 adder \u52a0\u6cd5\u5668 address \u4f4d\u5740\uff1b\u5730\u5740 addressing mode \u5c0b\u5740\u6a21\u5f0f\uff1b\u7de8\u5740\u6a21\u5f0f Advanced Research Project Agency Network (ARPANET) \u7f8e\u570b\u570b\u9632\u90e8\u9ad8\u7d1a\u7814\u7a76\u8a08\u5283\u5c40\u7db2\u7d61 adware \u5ee3\u544a\u7a0b\u5f0f\uff1b\u5ee3\u544a\u8edf\u4ef6 aggregate function \u96c6\u5408\u51fd\u6578 algorithm \u7b97\u6cd5 aliasing &hellip; <a href=\"https:\/\/www.i-garden.org\/blog\/hkdse-ict-glossary\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Glossary<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-2623","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":547,"url":"https:\/\/www.i-garden.org\/blog\/ict-curriculum-assessment-guide\/","url_meta":{"origin":2623,"position":0},"title":"\u8ab2\u7a0b\u8cc7\u8a0a","author":"iGardener","date":"January 22, 2011","format":false,"excerpt":"Last updated: 1\/6\/2013 \u4ee5\u4e0b\u5217\u51fa\u4e00\u4e9b[W:\u9999\u6e2f\u4e2d\u5b78\u6587\u6191\u8a66]\u7684\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u8ab2\u7a0b\u7684\u7c21\u4ecb\u53ca\u6587\u4ef6\uff0ciGardener\u8001\u5e2b\u6703\u5b9a\u671f\u66f4\u65b0\uff0c\u65b9\u4fbf\u5927\u5bb6\u53c3\u95b1\u3002 \u8ab2\u7a0b\u7c21\u4ecb (Curriculum Outline) [W:\u9999\u6e2f\u4e2d\u5b78\u6587\u6191\u8a66] (HKDSE)\u7684\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1 (ICT)\u00a0\u7684\u516c\u958b\u8a66\u662f\u6839\u64da[W:\u9999\u6e2f\u6559\u80b2\u5c40] (EDB) \u8ab2\u7a0b\u767c\u5c55\u8b70\u6703\u53ca[W:\u9999\u6e2f\u8003\u8a66\u53ca\u8a55\u6838\u5c40]\u806f\u5408\u7de8\u8a02\u7684\u300a\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u8ab2\u7a0b\u53ca\u8a55\u4f30\u6307\u5f15\uff08\u4e2d\u56db\u81f3\u4e2d\u516d\uff09\u300b\u3002\u540c\u5b78\u5fc5\u9808\u719f\u8b80\u4e0a\u8ff0\u7684\u8ab2\u7a0b\u6307\u5f15\uff0c\u4ee5\u4e86\u89e3\u8003\u8a66\u5c0d\u8003\u751f\u8868\u9054\u7684\u77e5\u8b58\u3001\u7406\u89e3\u3001\u5171\u901a\u80fd\u529b\u53ca\u5be6\u7528\u6280\u8853\u7684\u8981\u6c42\u3002 5\u500b\u8a55\u6838\u76ee\u6a19 \u672c\u79d1\u7684\u516c\u958b\u8a66\u65e8\u5728\u8a55\u6838\u8003\u751f\u4e0b\u52175\u500b\u80fd\u529b\uff1a \u5c55\u793a\u5c0d[W:\u96fb\u8166\u7cfb\u7d71]\u7684\u7d44\u7e54\u548c\u7cfb\u5217\uff0c\u53ca\u5176\u8207[W:\u786c\u4ef6]\u3001[W:\u8edf\u4ef6]\u548c[W:\u6578\u64da]\u4e4b\u9593\u7684\u76f8\u4e92\u95dc\u4fc2\u7684\u8a8d\u8b58\u548c\u7406\u89e3\uff1b \u9ad4\u6703\u8207[W:\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280]\u904b\u7528\u6709\u95dc\u7684\u793e\u6703\u3001\u9053\u5fb7\u53ca\u6cd5\u5f8b\u554f\u984c\uff1b \u6709\u6548\u3001\u6709\u9053\u5fb7\u5730\u904b\u7528\u53ca\u8fa8\u8b58\u4e00\u7cfb\u5217\u7684[W:\u61c9\u7528\u8edf\u4ef6]\uff0c\u4ee5\u652f\u63f4\u8cc7\u8a0a\u8655\u7406\u53ca\u89e3\u6c7a\u554f\u984c\uff1b \u986f\u793a\u5c0d\u5206\u6790\u554f\u984c\u7684\u5404\u7a2e\u65b9\u6cd5\u7684\u7406\u89e3\uff0c\u4e26\u904b\u7528[W:\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280]\u4f86\u898f\u756b\u53ca\u5be6\u73fe\u65b9\u6848\uff1b \u9ad4\u6703[W:\u8cc7\u8a0a\u7d20\u990a]\u8207\u4f7f\u7528\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u4ee5\u5171\u4eab[W:\u77e5\u8b58]\u5982\u4f55\u5f71\u97ff\u4eba\u5011\u7684\u6c7a\u5b9a\u548c\u6539\u8b8a\u793e\u6703\u3002 2\u500b\u8a55\u6838\u6a21\u5f0f \u672c\u79d1\u7684\u516c\u958b\u8a55\u6838\uff0c\u5305\u62ec\u516c\u958b\u8003\u8a66\u53ca\u6821\u672c\u8a55\u6838\u5169\u90e8\u5206\uff1a 1. \u516c\u958b\u8003\u8a66\uff08\u66f8\u5beb\u70ba\u4e3b\uff09 \u5377\u4e00\u3000\u5fc5\u4fee\u90e8\u5206\u300055%\u30002\u5c0f\u6642 \u5377\u4e8c\u3000\u9078\u4fee\u90e8\u5206\uff08\u9078\u4fee\u5176\u4e2d\u4e00\u9805\uff0925%\u30001.5\u5c0f\u6642 2(A)[W:\u6578\u64da\u5eab] 2(B)\u6578\u64da\u901a\u8a0a\u53ca[W:\u5efa\u7db2] 2(C)[W:\u591a\u5a92\u9ad4]\u88fd\u4f5c\u53ca[W:\u7db2\u7ad9]\u5efa\u69cb 2(D)[W:\u8edf\u4ef6]\u958b\u767c \u6821\u672c\u8a55\u6838\u300020%\uff08\u6301\u7e8c\u8a55\u4f30\uff0c\u500b\u4eba\u7fd2\u4f5c\u5f62\u5f0f\uff09 \u516c\u958b\u8003\u8a66\u5377\u5225\u53ca\u984c\u578b \u5377\u4e00\uff1a\u672c\u8a66\u5377\u5206\u70ba\u5169\u90e8\u5206\uff1a \u7532\u90e8\uff0840%\uff09\u70ba40\u689d\u591a\u9805\u9078\u64c7\u984c \u4e59\u90e8\uff0860%\uff09\u70ba5\u689d\u7d50\u69cb\u5f0f\u8a66\u984c\u3002 \u8a66\u984c\u5167\u5bb9\u6db5\u84cb\u8ab2\u7a0b\u7684\u5fc5\u4fee\u90e8\u5206\uff0c\u5168\u90e8\u8a66\u984c\u5747\u9808\u4f5c\u7b54\u3002 \u5377\u4e8c\uff1a\u672c\u8a66\u5377\u70ba\u7d50\u69cb\u5f0f\u8a66\u984c\u3002\u8003\u751f\u9808\u5728\u4e0b\u5217\u9078\u4fee\u90e8\u5206\u9078\u64c7\u4e00\u9805\uff1a 2(A)[W:\u6578\u64da\u5eab] 2(B)\u6578\u64da\u901a\u8a0a\u53ca[W:\u5efa\u7db2] 2(C)[W:\u591a\u5a92\u9ad4]\u88fd\u4f5c\u53ca[W:\u7db2\u7ad9]\u5efa\u69cb 2(D)[W:\u8edf\u4ef6]\u958b\u767c \u8a66\u984c\u5167\u5bb9\u6db5\u84cb\u9078\u4fee\u90e8\u5206\uff0c\u8003\u751f\u9808\u878d\u5408\u5fc5\u4fee\u90e8\u5206\u7684\u77e5\u8b58\u548c\u6280\u80fd\uff0c\u4ee5\u5c55\u793a\u5c0d\u9078\u4fee\u90e8\u5206\u6709\u6df1\u5165\u7684\u8a8d\u8b58\u3002\u5168\u90e8\u8a66\u984c\u5747\u9808\u4f5c\u7b54\u3002 [W:\u6821\u672c\u8a55\u6838] (SBA) \u6240\u6709\u5b78\u6821\u7684\u8003\u751f\u5fc5\u9808\u53c3\u52a0\u6821\u672c\u8a55\u6838\uff0c\u8a55\u6838\u9805\u76ee\u5305\u62ec\u4e00\u4efd\u9805\u76ee\u7fd2\u4f5c\u3002 \u6ce8\u610f\u81ea2014\u5e74\u8003\u8a66\u8d77\uff0c\u79d1\u4efb\u6559\u5e2b\u5c07\u6703\u70ba\u8003\u751f\u63d0\u4f9b\u9078\u4fee\u90e8\u5206\u76f8\u95dc\u7fd2\u4f5c\u7684\u6821\u672c\u984c\u76ee\u3002 \u9805\u76ee\u7fd2\u4f5c\u5c07\u6839\u64da\u4e0b\u5217\u7bc4\u7587\u4f5c\u51fa\u8a55\u6838\uff1a 1. \u76ee\u7684\u8207\u5206\u6790 2. \u69cb\u601d\u8207\u61c9\u7528\u2026","rel":"","context":"In &quot;ICT \u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u8ab2\u7a0b&quot;","block_context":{"text":"ICT \u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u8ab2\u7a0b","link":"https:\/\/www.i-garden.org\/blog\/topics\/hkdse-ict-computer\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":29,"url":"https:\/\/www.i-garden.org\/blog\/igardener\/","url_meta":{"origin":2623,"position":1},"title":"iGardener","author":"iGardener","date":"March 30, 2009","format":false,"excerpt":"iGardener \u8001\u5e2b\uff0c\u524d\u7a31 \u300ci\u5712\u4e01\u300d\uff0c \u4f86\u81ea\u9999\u6e2f\u7684 ICT \u53ca EdTech \u6559\u80b2\u5de5\u4f5c\u8005\uff0c 1999\u5e74\u5efa\u7acb\u672c\u7db2\u7ad9 iGarden\uff0c\u81f3\u4eca\u903e 22\u5e74\uff0c \u4e43\u300c\u7121\u5b78\u6703\u3001\u7121\u5354\u6703\u3001\u7121\u806f\u6703\u300d\u4e4b\u300c\u4e09\u7121\u300d\u5712\u4e01\uff0c \u559c\u7368\u4f86\u7368\u5f80\uff0c \u537b\u6709\u5e78\u5728\u9999\u6e2f\u3001\u81fa\u7063\u3001\u6b50\u7f8e\u5b78\u754c\uff0c \u5ee3\u7d50\u5fd7\u540c\u9053\u5408 EdTech \u6559\u80b2\u5144\u5f1f\u59b9\u7684\u6d88\u9059\u6d3e\uff1b \u559c\u81ea\u5beb\u81ea\u8a71\uff0c \u537b\u6709\u8cf4\u5c0f\u5712\u4e01 DNA \u4f7f\u7136\uff1a \u7368\u8655\u800c\u4e0d\u5b64\u55ae\uff1b\u60b2\u89c0\u800c\u4e0d\u6d88\u6975\uff1b\u65c1\u89c0\u800c\u4e0d\u8896\u624b\uff1b\u6043\u8001\u800c\u4e0d\u8ce3\u8001\u3002 iGardener \u8001\u5e2b\u9664\u4e86\u64d4\u4efb\u9999\u6e2f\u7684\u96fb\u8166\u96dc\u8a8c\u300ae-zone\u300b\u6821\u5712\u7248\uff08\u5df2\u65bc2022\u5e74\u505c\u520a\uff09\u9867\u554f\u5916\uff0c\u904e\u53bb\u66fe\u7d93\u70ba\u300a\u660e\u5831\u5468\u520a\u300b\u3001\u300a\u661f\u5cf6\u65e5\u5831\u300b\u3001\u300aPCM\u300b\u3001\u300ae-zone@School\u300b\u3001\u300a\u4eca\u65e5\u6821\u5712\u300b\u7b49\u5a92\u9ad4\u64b0\u5beb\u6587\u7ae0\u548c\u63a5\u53d7\u8a2a\u554f\u3002 \uff08\u4e0b\u6587\u520a\u65bc 2003\u5e74 \u9999\u6e2f\u96fb\u8166\u6559\u80b2\u5b78\u6703 \u5e74\u520a\uff0c\u5370\u5237\u7248\u898b\u6b64\u9801\u5e95\uff09 \u60f3\u8207\u5927\u5bb6\u5206\u4eab\u4e00\u4e0b\uff0c\u9019\u6578\u5e74\u6211\u5728\u4e0d\u540c\u5c08\u696d\u4ea4\u6d41\u5834\u5408\u7684\u5c0d\u8a71\uff1a \u540c\u5de5\uff1a\u300c\u60a8\u597d\uff0c\u5982\u4f55\u7a31\u547c\u95a3\u4e0b\uff1f\u300d\u6211\u3000\uff1a\u300c\u6211\u53eb\u67d0\u67d0\u67d0\u8001\u5e2b\u3002\u300d\u540c\u5de5\uff1a\u300c\u2026\u2026\u300d\u6211\u3000\uff1a\u300c\u5373\u662f iGarden i\u5712\u4e01\u3002\u300d\u540c\u5de5\uff1a\u300c\u554a\uff01\u539f\u4f86\u4f60\u5c31\u662fi\u5712\u4e01\uff0c\u5e78\u6703\uff0c\u5e78\u6703\uff01\u300d \u6211\u5341\u5206\u6b23\u6170\u5225\u4eba\u8a8d\u8b58\u300ci\u5712\u4e01\u300d\u591a\u65bc\u81ea\u5df1\u7684\u771f\u6b63\u540d\u5b57\uff0c\u8b49\u660e\u9019\u4e94\u5e74\u4f86\u7684\u6211\u7684\u7db2\u7ad9\u662f\u5f97\u5230\u540c\u5de5\u8a8d\u540c\u7684\u3002\u76fc\u671b\u5728\u6b64\u4ee5\u6587\u5b57\uff0c\u8207\u5927\u5bb6\u5206\u4eab\u5efa\u7acbiGarden\u96fb\u8166\u79d1\u7db2\u7ad9\u7684\u5fc3\u8def\u6b77\u7a0b\u3002 What\uff1f iGarden(www.i-garden.org)\u662f\u500b\u96fb\u8166\u79d1\u53ca\u8cc7\u8a0a\u79d1\u6280\u6559\u80b2\u7db2\u7ad9\uff0c\u8457\u91cd\u5b78\u7fd2\u8cc7\u6e90\u7684\u5206\u4eab\uff0c\u4ea6\u8b93\u5b78\u79d1\u8001\u5e2b\u53ca\u5b78\u751f\u64c1\u6709\u4e00\u500b\u4ea4\u6d41\u7684\u5712\u5730\uff0c\u900f\u904e\u4e92\u806f\u7db2\u5efa\u7acb\u4e00\u500b\u79d1\u672c\u7684\u5b78\u7fd2\u793e\u7fa4\u3002 Why and When\uff1f \u56de\u60f31998\u5e74\uff0c\u5728\u5e02\u9762\u4e0a\u4ecd\u672a\u898b\u5230\u6709\u7cfb\u7d71\u7684\u96fb\u8166\u79d1\u7db2\u7ad9\uff0c\u540c\u5de5\u7e31\u6709\u5bf6\u8cb4\u7684\u5b78\u7fd2\u8cc7\u6e90\uff0c\u4ecd\u672a\u6709\u5206\u4eab\u7684\u7fd2\u6163\u3002\u6b64\u5916\uff0c\u7576\u5e74AS\u96fb\u8166\u61c9\u7528\u79d1\u4ea6\u958b\u59cb\u5be6\u65bdTAS\uff0c\u5948\u4f55\u7576\u6642\u6709\u95dc\u8cc7\u8a0a\u7684\u767c\u653e\u6b20\u7f3a\u6d41\u901a\uff0c\u76f8\u95dc\u6559\u6750\u4ea6\u6975\u4e4b\u7f3a\u4e4f\uff0c\u6211\u8207\u5176\u4ed6\u540c\u5de5\u4e00\u6a23\uff0c\u5728\u8ff7\u60d8\u4e2d\u958b\u5c55\u6821\u672c\u8a2d\u8a08\u6559\u6750\u53ca\u8a55\u5be9\u5377\u76ee\u7684\u96e3\u82e6\u65c5\u7a0b\u3002\u4ee5\u4e0a\u5169\u500b\u60c5\u5883\uff0c\u9a45\u4f7f\u6211\u6c7a\u5b9a\u5c07\u81ea\u5df1\u4ee5\u5f80\u88fd\u4f5c\u7684\u6559\u6750\uff0c\u7d44\u7e54\u6574\u7406\u3002\u4e26\u4ee5iGarden\u70ba\u540d\u7684\u7db2\u7ad9\uff0c\u5c07\u6559\u6750\u53ca\u8a55\u6838\u8cc7\u8a0a\u516c\u8af8\u540c\u597d\u3002 Where\uff1f \u7db2\u4e0a\uff1a\u300c\u5712\u4e01\u6b32\u683d\u7a2e\uff0c\u5e78\u5f97IT\u5730\u300d\uff0c\u5712\u4e01\u6191\u8457\u4e00\u80a1\u50bb\u52c1\uff0c\u4ed8\u51fa\u79c1\u4eba\u6642\u9593\u53bb\u5efa\u7acb\u7db2\u7ad9\uff0c\u8cc7\u6e90\u5341\u5206\u6709\u9650\uff0c\u5e78\u53d7\u60e0\u65bc\u7576\u5e74IT\u6559\u80b2\u958b\u5c55\uff0c\u6211\u4fbf\u4f7f\u7528\u8cc7\u8a0a\u6821\u5712(Cyber Campus)\u63d0\u4f9b\u4e88\u8001\u5e2b\u7684\u514d\u8cbb\u4e0a\u7db2\u53ca\u7db2\u9801\u7a7a\u9593\uff0c\u4e0a\u8f09iGarden\u7db2\u7ad9\uff0c\u914d\u5408\u514d\u8cbb\u7684\u7db2\u57df\u8f49\u5740i-garden.w3.to\uff0c\u7b2c\u4e00\u4ee3\u7684iGarden\u96db\u578b\u4fbf\u51fa\u73fe\u4e86\uff0c\u5f8c\u4f86\u6211\u7d22\u6027\u767b\u8a18\u7db2\u57df\uff0c\u64c1\u6709\u81ea\u5df1\u7684\u7db2\u7ad9\u540d\u7a31www.i-garden.org\u3002 \u7db2\u4e0b\uff1a\u5f88\u9ad8\u8208\u7db2\u7ad9\u80fd\u5920\u51dd\u805a\u4e00\u7fa4\u5e2b\u751f\uff0c\u6210\u70ba\u4e00\u500b\u7db2\u4e0a\u5b78\u7fd2\u793e\u7fa4\uff1b\u8207\u6b64\u540c\u6642\uff0c\u6211\u4ea6\u5f88\u8457\u91cd\u5728\u300c\u7db2\u4e0b\u300d\u3001\u9762\u5c0d\u9762\u7684\u5c08\u696d\u4ea4\u6d41\uff0c\u627f\u8499\u4e0d\u540c\u8cc7\u8a0a\u79d1\u6280\u6559\u80b2\u6a5f\u69cb\u7684\u9080\u8acb\uff0c\u4ee4\u5712\u4e01\u6709\u5e78\u66fe\u64d4\u4efb\u6559\u7d71\u5c40\u3001\u9999\u6e2f\u5927\u5b78\u6559\u80b2\u7cfb\u3001\u9999\u6e2f\u96fb\u8166\u6559\u80b2\u5b78\u6703\u3001\u8cc7\u8a0a\u79d1\u6280\u6559\u80b2\u5c55\u7b49\u7b49\u7684\u5c08\u984c\u8b1b\u54e1\uff0c\u5728\u9019\u4e9b\u5834\u5408\u8207\u65e9\u5728\u7db2\u4e0a\u7d50\u8b58\u7684\u540c\u5de5\u76f8\u9047\uff0c\u96d6\u7136\u4e00\u898b\uff0c\u6b32\u662f\u5982\u6545\uff01 Who\uff1f \u4e94\u5e74\u7684\u5efa\u7db2\u8def\uff0c\u5712\u4e01\u4e0d\u6642\u611f\u5230\u5b64\u55ae\u7684\u611f\u89ba\uff0c\u4f46\u6211\u4e0d\u6703\u5fd8\u8a18\u8def\u4e0a\u9047\u898b\u7684\u6709\u5fc3\u4eba\uff0c\u4ed6\u5011\u7684\u9f13\u52f5\u4ee4\u5712\u4e01\u5f97\u529b\u5f80\u524d\u8d70\u7684\uff1a 1. \u9ec3\u5bf6\u8ca1\u6559\u6388 iGarden\u521d\u521d\u9762\u4e16\u6642\uff0c\u559c\u5f97\u9ec3\u6559\u6388\u7684\u96fb\u90f5\u9f13\u52f5\u548c\u652f\u63f4\uff0c\u66f4\u5728\u8cc7\u8a0a\u6821\u5712\u7684\u9996\u9801\u4ecb\u7d39iGarden\u7db2\u7ad9\uff0c\u4ee4\u7db2\u7ad9\u5728\u77ed\u671f\u5167\u80fd\u5920\u5f97\u5230\u5f88\u591a\u540c\u5de5\u7684\u8a8d\u8b58\u3002 2. Patrick\u2026","rel":"","context":"With 4 comments","block_context":{"text":"With 4 comments","link":"https:\/\/www.i-garden.org\/blog\/igardener\/#comments"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2009\/04\/cybcamp.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2009\/04\/cybcamp.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2009\/04\/cybcamp.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2009\/04\/cybcamp.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2,"url":"https:\/\/www.i-garden.org\/blog\/about\/","url_meta":{"origin":2623,"position":2},"title":"About","author":"iGardener","date":"March 29, 2009","format":false,"excerpt":"1. \u5eff\u4e00\u8f09\u9a40\u7136\u56de\u9996 iGarden \u7db2\u7ad9 \u65bc 1999 \u5e74\u6210\u7acb\uff0c\u81f3\u4eca\u8f49\u773c\u903e\u5eff\u4e00\u8f09\u3002 \u7576\u5e74\u7684\u300ciGarden \u5ba3\u8a00\u300d\u5982\u4e0b \uff08\u539f\u6587\u520a\u65bc1999\u5e748\u670824\u65e5\u7684 iGarden \u9996\u9801\uff09\uff1a \u300ciGarden i\u5712\u5730\u300d\u662f\u70ba\u672c\u6e2f\u4e2d\u5b78\u96fb\u8166\u6559\u80b2\u7684\u65b0\u8ab2\u7a0b(1999)\u800c\u8a2d\uff0c\u7121\u8ad6\u662fAS-level\u3001\u6703\u8003\u3001\u521d\u4e2d\u96fb\u8166\u79d1\u7684\u5e2b\u751f\uff0c\u90fd\u53ef\u6709\u7cfb\u7d71\u5730\u627e\u5230\u4e00\u4e9b\u8ab2\u7a0b\u8cc7\u6599\u3001\u7b46\u8a18\u548c\u7db2\u4e0a\u8cc7\u6e90\u3002\uff1ai\u5712\u4e01\u76fc\u671b\u9019\u7db2\u7ad9\u80fd\u5920\u8b93\u96fb\u8166\u79d1\u5e2b\u751f\u6709\u4e00\u500b\u65b9\u4fbf\u300c\u843d\u8173\u300d\u7684\u5730\u65b9\u4e4b\u9918\uff0c\u66f4\u85c9\u8457\u4ed6\u5011\u7684\u53c3\u8207\u548c\u5206\u4eab\uff0c\u5728\u9019\u5712\u5730\u88e1\u51dd\u805a\u4e00\u80a1\u4e92\u52d5(interative)\u800c\u5bcc\u5275\u610f(innovative)\u7684\u6c23\u6c1b\uff01iGardener\u4e00\u4e5d\u4e5d\u4e5d\u5e74\u4e5d\u6708 1999\u5e74\uff08\u5143\u5e74\uff09\uff1a \u672c\u7ad9\u662f\u7576\u5e74\u5c11\u6578\u5168\u9762\u63d0\u4f9b\u6709\u95dc\u9999\u6e2f\u96fb\u8166\u79d1\u5404\u7d1a\u8ab2\u7a0b\u5927\u7db1\u53ca\u8cc7\u6e90\u7684\u6559\u5b78\u7db2\u7ad9\u3002iGardener\u8001\u5e2b\uff08i\u5712\u4e01\uff09\u628a\u4e00\u4e9b\u81ea\u5df1\u88fd\u4f5c\u7684\u7b46\u8a18\u53ca\u6559\u6750\u653e\u5230\u7db2\u7ad9\u4e0a\u4f5c\u70ba\u5206\u4eab\u7528\u9014\uff0c\u611f\u6069\u7684\u662f\u6536\u5230\u5f88\u591a\u540c\u5de5\u3001\u96fb\u8166\u79d1\u5b78\u751f\u3001\u5927\u5b78\u6559\u6388\u3001\u670b\u53cb\u53ca\u8a2a\u5ba2\u7684\u56de\u994b\uff0c\u7576\u4e2d\u66f4\u662f\u4e0d\u4e4f\u52c9\u52f5\u6027\u7684\u8a55\u8a9e\u53ca\u610f\u898b\u3002 \u88fd\u4f5c iGarden HTML\u7248\u7db2\u7ad9\u7684\u5fc3\u8840\u4ea6\u5f97\u5230\u8a8d\u540c\uff0c\u65bc2000\u5e74\u7372 \u9999\u6e2f\u8cc7\u8a0a\u6821\u5712(www.hkcampus.net) \u300a\u6559\u5b78\u8cc7\u6e90\u4e0a\u7db2\u734e\u52f5\u8a08\u5283\u300b\u9812\u767c\u9280\u734e\uff0c\u8f03\u8a73\u7d30\u6b77\u7a0b\u53ef\u53c3\u95b1\u53e6\u6587\u300ai\u5712\u4e01\u6b63\u50b3\u300b\u3002 \u60f3\u7576\u5e74\uff0ciGardener \u8001\u5e2b\u76fc\u671b\u85c9\u571f\u88fd HTML \u7248\u672c\uff0c\u6b64\u5712\u5730\u80fd\u5920\u70ba AS\u53ca\u6703\u8003\u96fb\u8166\u79d1\u7684\u540c\u5de5\u53ca\u540c\u5b78\u6253\u6253\u6c23\uff01 2009\u5e74\uff08\u5341\u9031\u5e74\uff09\uff1a 2009 \u5e74\u662f iGarden 10\u5468\u5e74\u7684\u65e5\u5b50\uff0c\u5341\u5e74\u9593\u500b\u4eba\u53ca\u8ab2\u7a0b\u5ba2\u89c0\u74b0\u5883\u8b8a\u5316\u4e0d\u5c11\uff0c\u5712\u4e01\u8d81\u9019\u65b0\u9ad8\u4e2d\u7684\u5927\u6642\u4ee3\uff0c\u5584\u7528web 2.0\u7684\u7db2\u8a8c\u5e73\u53f0\uff0c\u91cd\u65b0\u6574\u7406\u904e\u53bb\u5341\u5e74\u7684\u6750\u6599\u548c\u6559\u5b78\u4e0a\u7684\u8dcc\u78b0\u9ede\u6ef4\uff0c\u5c07\u904e\u53bb\u7db2\u7ad9\u5167\u5bb9\u4ee5\u9806\u6642\u5e8f\u65b9\u5f0f\u8f49\u70baposts\uff0c\u52a0\u4e0a\u8a18\u9304\u6700\u65b0\u8cc7\u8a0a\uff0c\u5305\u62ec\uff1a \u8fd1\u5e74\u5728\u4e0d\u540c\u5834\u5408\u7684\u5de5\u4f5c\u574a\u5206\u4eab\u5a92\u9ad4\u7684\u63a1\u8a2a\u9069\u5408\u5b78\u8207\u6559\u7684\u5f71\u7247\u514d\u8cbb\u6216\u958b\u6e90\u7684\u6559\u5b78\u8edf\u4ef6ICT\u5b78\u79d1\u8cc7\u8a0a\u751f\u6d3b\u96a8\u60f3\u5206\u4eabNSS 334 \u65b0\u9ad8\u4e2d \u60f3\u7576\u5e74\uff0ciGardener \u8001\u5e2b\u76fc\u671b\u85c9\u7db2\u8a8c (blog) \u7248\u672c\uff0c\u6b64\u5712\u5730\u80fd\u5920\u70ba\u525b\u958b\u59cb\u7684\u65b0\u9ad8\u4e2dICT\u6559\u80b2\uff08\u96fb\u8166\u6559\u80b2\u53ca\u8cc7\u8a0a\u79d1\u6280\u6559\u80b2\uff09\u7684\u540c\u5de5\u53ca\u540c\u5b78\u6253\u6253\u6c23\uff01 2019\u5e74\uff08\u5eff\u9031\u5e74\uff09\uff1a 2019 \u5e74\u662f iGarden 20\u5468\u5e74\u7684\u65e5\u5b50\uff0c\u672c\u662f\u503c\u5f97\u81ea\u6211\u9676\u9189\uff0c\u6176\u795d\u4e00\u4e0b\u3002 \u7136\u800c\uff0c2019\u5e74\u9999\u6e2f\u4eba\u6240\u9762\u5c0d\u7684\uff0c\u5be6\u5728\u6c92\u6709\u751a\u9ebc\u52d5\u6a5f\u548c\u5fc3\u60c5\u6176\u795d\u3002 \u4f5c\u70ba\u524d\u7dda\u8001\u5e2b\uff0ciGardener \u8001\u5e2b\u5fc3\u88e1\u8a18\u639b\u7684\uff0c\u4e00\u76f4\u5c31\u662f\u9999\u6e2f\u7684\u5e74\u9752\u4eba\u3002 \u4e0d\u904e\u57282019\u5e74\uff0c\u4e0d\u53ea\u662f\u95dc\u5fc3\u9999\u6e2f\u5e74\u9752\u4eba\u7684\u5b78\u7fd2\uff0c\u66f4\u662f\u4ed6\u5011\u7684\u8eab\u5fc3\u5b89\u5168\u3002 2020\u5e74\uff08\u75ab\u9031\u5e74\uff09\uff1a \u300c\u4f86\u81ea\u5916\u661f\u7684\u80ba\u708e\u300d\u8086\u8650\uff0c\u81f4\u9999\u6e2f\u505c\u8ab2\u9023\u9023\uff1a\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":418,"url":"https:\/\/www.i-garden.org\/blog\/freeware\/","url_meta":{"origin":2623,"position":3},"title":"\u514d\u8cbb\u6559\u5b78\u8edf\u4ef6","author":"iGardener","date":"May 10, 2009","format":false,"excerpt":"iGardener's Choice i\u5712\u4e01\u63a8\u4ecb \u4ee5\u4e0b\u5217\u51fa\u4e00\u4e9b\u5712\u4e01\u7cbe\u9078\u7684[W:\u8edf\u4ef6]\uff0c\u5168\u90e8\u90fd\u662f[W:\u514d\u8cbb\u8edf\u4ef6](freeware)\u6216[W:\u958b\u653e\u6e90\u4ee3\u78bc\u8edf\u4ef6](open source software)\uff0c\u9069\u5408\u5b78\u6821\u5168\u6821\u5b89\u88dd\u6216\u5b78\u751f\u5728\u5bb6\u5b89\u88dd\uff0c\u5712\u4e01\u5e0c\u671b\u53ef\u4ee5\u5b9a\u671f\u6574\u7406\u4e00\u4e0b\uff0c\u65b9\u4fbf\u5927\u5bb6\u4e0b\u8f09\u548c\u5b89\u88dd\u3002 (updated 20\/1\/2010) \u7cbe\u9078[W:\u514d\u8cbb\u8edf\u4ef6]\u7db2\u7ad9 (Freeware \/ Portable Software) FileHippo\uff08\u5305\u62ec\u820a\u8edf\u4ef6\u7248\u672c\uff09 PortableApps\uff08\u514d\u5b89\u88dd\u8edf\u4ef6\u7db2\uff09 PortableFreeware\uff08\u8001\u724c\u514d\u5b89\u88dd\u8edf\u4ef6\u7db2\uff09 \u963f\u69ae\u798f\u5229\u5473\uff08\u53f0\u7063\u514d\u5b89\u88dd\u8edf\u4ef6\u7db2\uff09 [W:\u7db2\u9801\u700f\u89bd\u5668] (Web Browser) Google Chrome \uff1a\u6b63\u5f0f\u7248 |\u00a0\u6e2c\u8a66\u7248 | \u514d\u5b89\u88dd\u7248 |Extensions Firefox Safari Opera Internet Explorer \u00a0\u7e41\u9ad4\u4e2d\u6587\u7248\uff08\u5509......\u7b97\u7f77\u4e86\uff01\uff09 [W:\u9632\u6bd2\u8edf\u9ad4] (Antivirus) AVG (Free Edition) [\u5c0f\u7d05\u5098] Avira AntiVir\u00a0 (FREE Antivirus) Avast! Antivirus 4.8 \u7e41\u9ad4\u4e2d\u6587\u7248 [W:\u8fa6\u516c\u5ba4\u8edf\u4ef6] (Office Software)\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/PwqSM-Gj","_links":{"self":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/pages\/2623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/comments?post=2623"}],"version-history":[{"count":20,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/pages\/2623\/revisions"}],"predecessor-version":[{"id":6103,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/pages\/2623\/revisions\/6103"}],"wp:attachment":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/media?parent=2623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}