{"id":2498,"date":"2011-01-22T17:59:08","date_gmt":"2011-01-22T09:59:08","guid":{"rendered":"http:\/\/www.i-garden.org\/blog\/?p=2498"},"modified":"2011-02-01T08:37:57","modified_gmt":"2011-02-01T00:37:57","slug":"ict-glossary","status":"publish","type":"post","link":"https:\/\/www.i-garden.org\/blog\/2011\/01\/22\/ict-glossary\/","title":{"rendered":"\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59 \uff08\u7db2\u9801\u7248\uff09NSS ICT Glossary"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2011\/01\/glossary_01.png\" target=\"_blank\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\" alignleft\" style=\"margin: 20px;\" title=\"\u6309\u5716\u653e\u5927\" src=\"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2011\/01\/glossary_01-300x288.png?resize=300%2C288\" alt=\"\u6309\u5716\u653e\u5927\" width=\"300\" height=\"288\" \/><\/a><\/p>\n<p>iGardener\u8001\u5e2b\u7d93\u5e38\u63d0\u9192\u5b78\u751f\uff0c\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u7b54\u984c\u5207\u5fcc\u7528\u592a\u591a\u5546\u696d\u6216\u6d41\u884c\u574a\u9593\u8fad\u5f59\uff08\u6211\u7b11\u7a31\u4e4b\u70ba<a href=\"http:\/\/www.e-zone.com.hk\">ezone<\/a>\u8a9e\u8a00\uff0cezone\u7de8\u8f2f\u5011\u4e0d\u8981\u4ecb\u610f\u554a\uff01\uff09\uff0c\u7562\u7adf\u8a66\u5377\u662f\u6839\u64da<a href=\"http:\/\/www.edb.gov.hk\/index.aspx?nodeID=3372&amp;langno=2\">\u6559\u80b2\u5c40<\/a>\u7684<a href=\"http:\/\/www.edb.gov.hk\/FileManager\/EN\/Content_3139\/ict_glossary_071130.pdf\" target=\"_blank\">\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59<\/a>\u70ba\u6e96\u3002<\/p>\n<p>\u70ba\u4e86\u65b9\u4fbf\u81ea\u5df1\u6559\u5b78\u53ca\u5927\u5bb6\u53c3\u8003\uff0ciGardener\u8001\u5e2b\u7279\u5225\u5c07\u6559\u80b2\u5c40\u7db2\u7ad9\u5167\u7684<a href=\"http:\/\/www.edb.gov.hk\/FileManager\/EN\/Content_3139\/ict_glossary_071130.pdf\" target=\"_blank\">\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59<\/a>PDF\u6a94\u6848\u5167\u7684\u6587\u5b57\u62bd\u4e86\u51fa\u4f86\uff0c\u7279\u5225\u9cf4\u8b1d\u4e2d\u4e94\u6607\u6607\u540c\u5b78\u548c\u4e2d\u4e09\u7199\u7199\u540c\u5b78\u7684\u4fee\u8a02\u6574\u7406\uff0c\u4fbf\u653e\u5728\u6b64\u6587\u4e2d\uff0c\u5927\u5bb6\u53ea\u9808\u4f7f\u7528\u700f\u89bd\u5668\u5167\u7684\u641c\u5c0b\u529f\u80fd(\u4f8b\uff1aFirefox &amp; Chrome \u6309 Ctrl-F)\uff0c\u4fbf\u53ef\u4ee5\u98db\u5feb\u5730\u641c\u5230\u4e2d\u82f1\u6587\u7684\u8fad\u5f59\u4e86\uff08\u5de6\u5716\u4e2d\u53f3\u9762scroll bar\u7684\u9ec3\u8272\u6a6b\u7dda\u5373\u9078\u5b57\u7684\u51fa\u73fe\u4f4d\u7f6e\uff09\u3002<\/p>\n<p>\u5e0c\u671b\u4e5f\u80fd\u5920\u5e6b\u5230\u5927\u5bb6\uff01<\/p>\n<p>\u8fad\u5f59\u4f86\u6e90\uff1a<a href=\"http:\/\/www.edb.gov.hk\/FileManager\/EN\/Content_3139\/ict_glossary_071130.pdf\" target=\"_blank\">\u6559\u80b2\u5c40\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1-\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59<\/a><\/p>\n<p>A<\/p>\n<p>Accelerated Graphics Port (AGP) \u5716\u5f62\u52a0\u901f\u57e0<\/p>\n<p>Access Point (AP) \u7db2\u7d61\u63a5\u9054\u9ede<\/p>\n<p>accumulator \u7d2f\u52a0\u5668<\/p>\n<p>actual argument \u5be6\u969b\u8b8a\u5143<\/p>\n<p>actual parameter \u5be6\u969b\u53c3\u6578<\/p>\n<p>adapter \u9069\u914d\u5668<\/p>\n<p>adder \u52a0\u6cd5\u5668<\/p>\n<p>address \u4f4d\u5740\uff1b\u5730\u5740<\/p>\n<p>addressing mode \u5c0b\u5740\u6a21\u5f0f\uff1b\u7de8\u5740\u6a21\u5f0f<\/p>\n<p>Advanced Research Project Agency Network \u7f8e\u570b\u570b\u9632\u90e8\u9ad8\u7d1a\u7814\u7a76\u8a08\u5283\u5c40\u7db2\u7d61(ARPANET)<\/p>\n<p>adware \u5ee3\u544a\u7a0b\u5f0f\uff1b\u5ee3\u544a\u8edf\u4ef6<\/p>\n<p>aggregate function \u96c6\u5408\u51fd\u6578<\/p>\n<p>algorithm\u7b97\u6cd5<\/p>\n<p>aliasing \u968e\u68af\u6548\u61c9\uff1b\u5716\u5f62\u5931\u771f<\/p>\n<p>American National Standards Institute (ANSI) \u7f8e\u570b\u570b\u5bb6\u6a19\u6e96\u5b78\u6703<\/p>\n<p>American Standard Code for Information \u7f8e\u570b\u4fe1\u606f\u4ea4\u63db\u6a19\u6e96\u78bc<\/p>\n<p>Interchange (ASCII [code])<\/p>\n<p>analog \/ analogue \u6a21\u64ec<\/p>\n<p>Analog Digital Converter (ADC) \u6a21\u64ec\u6578\u78bc\u8f49\u63db\u5668<\/p>\n<p>anchor \u9328\u9ede\uff1b\u9396\u5b9a\u9ede<\/p>\n<p>applet \u5fae\u61c9\u7528\u7a0b\u5f0f\uff1b\u5fae\u61c9\u7528\u7a0b\u5e8f<\/p>\n<p>application layer \u61c9\u7528\u5c64<\/p>\n<p>Application Service Provider (ASP) \u61c9\u7528\u670d\u52d9\u4f9b\u61c9\u5546<\/p>\n<p>argument \u8b8a\u5143<\/p>\n<p>Arithmetic and Logic Unit (ALU) \u7b97\u8853\u53ca\u908f\u8f2f\u904b\u7b97\u90e8\u4ef6<\/p>\n<p>array \u9663\u5217<\/p>\n<p>Artificial Intelligence (AI) \u4eba\u5de5\u667a\u80fd<\/p>\n<p>assembler \u532f\u7de8\u7a0b\u5f0f\uff1b\u532f\u7de8\u7a0b\u5e8f<\/p>\n<p>assembly language \u532f\u7de8\u8a9e\u8a00<\/p>\n<p>assignment statement \u8ce6\u503c\u8a9e\u53e5<\/p>\n<p>Asymmetric Digital Subscriber Line (ADSL) \u4e0d\u5c0d\u7a31\u6578\u78bc\u7528\u6236\u7dda\uff1b\u975e\u5c0d\u7a31\u6578\u78bc\u7528\u6236\u7dda<\/p>\n<p>asynchronous transfer mode \u7570\u6b65\u50b3\u8f38\u6a21\u5f0f\uff1b\u7570\u6b65\u50b3\u8f38\u5f62\u5f0f<\/p>\n<p>attenuation\u8870\u6e1b<\/p>\n<p>attribute \u5c6c\u6027<\/p>\n<p>Audio Video Interleave (AVI) \u97f3\u983b\u8996\u983b\u4ea4\u66ff\u683c\u5f0f.<\/p>\n<p>authoring tool \u7de8\u5beb\u5de5\u5177<\/p>\n<p>Automatic Teller Machine (ATM) \u81ea\u52d5\u6ac3\u54e1\u6a5f<\/p>\n<p><!--more--><\/p>\n<p>B<\/p>\n<p>back pointer \u53cd\u5411\u6307\u793a\u5b57\uff1b\u53cd\u5411\u6307\u793a\u6a19<\/p>\n<p>backbone \u4e3b\u5e79<\/p>\n<p>Backus-Naur Form (BNF) \u5df4\u79d1\u65af\u8afe\u723e\u7bc4\u5f0f<\/p>\n<p>bandwidth \u983b\u5e36\u5bec\u5ea6\uff1b\u983b\u5bec<\/p>\n<p>bar code \u689d\u78bc<\/p>\n<p>baseband \u57fa\u5e36<\/p>\n<p>Basic Input \/ Output System (BIOS) \u57fa\u672c\u8f38\u5165\u8f38\u51fa\u7cfb\u7d71<\/p>\n<p>batch processing \u6210\u6279\u8655\u7406\uff1b\u6574\u6279\u8655\u7406<\/p>\n<p>baud \u6ce2\u7279<\/p>\n<p>Beginner&#8217;s All-Purpose Symbolic Instruction\u00a0Code (BASIC) Language\u00a0\u521d\u5b78\u8005\u901a\u7528\u7b26\u865f\u6307\u4ee4\u8a9e\u8a00<\/p>\n<p>Beginning Of File (BOF) \u6a94\u8d77\u59cb<\/p>\n<p>BIG-5 code \u5927\u4e94\u78bc<\/p>\n<p>Binary Coded Decimal (BCD) \u4e8c\u9032\u5236\u7de8\u78bc\u5341\u9032\u5236<\/p>\n<p>binary digit (bit) \u4f4d\u5143\uff1b\u4e8c\u9032\u5236\u4f4d<\/p>\n<p>binary file \u4e8c\u9032\u5236\u6a94<\/p>\n<p>binary relationship \u4e8c\u5143\u95dc\u4fc2<\/p>\n<p>binary search \u5c0d\u5206\u6aa2\u7d22\uff1b\u4e8c\u5206\u6aa2\u7d22<\/p>\n<p>binary tree \u4e8c\u53c9\u6a39<\/p>\n<p>bitmap \u9ede\u9663\u5716\uff1b\u4f4d\u5716<\/p>\n<p>bits per second (bps) \u6bcf\u79d2\u4f4d\u5143<\/p>\n<p>bitwise complement \u9806\u4f4d\u5143\u65b9\u5f0f\u4e92\u88dc<\/p>\n<p>block diagram \u65b9\u584a\u5716<\/p>\n<p>blog \u7db2\u8a8c\uff1b\u7db2\u4e0a\u65e5\u8a8c<\/p>\n<p>Boolean \u5e03\u723e<\/p>\n<p>boot \u555f\u52d5<\/p>\n<p>bootstrap \u555f\u52d5\u7a0b\u5f0f\uff1b\u555f\u52d5\u7a0b\u5e8f\uff1b\u5f15\u5c0e\u7a0b\u5f0f\uff1b\u5f15\u5c0e\u7a0b\u5e8f<\/p>\n<p>breadth-first search \u5bec\u5ea6\u512a\u5148\u641c\u7d22<\/p>\n<p>broadband \u5bec\u983b<\/p>\n<p>bubble sort \u5192\u6ce1\u6392\u5e8f\u6cd5<\/p>\n<p>buffer (1) \u7de9\u885d\u5668\uff0c(2) \u7de9\u885d\u5340<\/p>\n<p>bug \u932f\u8aa4<\/p>\n<p>Bulletin Board System (BBS) \u96fb\u5b50\u5e03\u544a\u677f\u7cfb\u7d71<\/p>\n<p>bundled software \u9644\u96a8\u8edf\u4ef6<\/p>\n<p>bus \u532f\u6d41\u6392\uff1b\u7e3d\u7dda<\/p>\n<p>byte \u5b57\u7bc0<\/p>\n<p>C<\/p>\n<p>cache \u5feb\u53d6\u8a18\u61b6\u9ad4\uff1b\u9ad8\u901f\u7de9\u885d\u5668<\/p>\n<p>call by address \u4f4d\u5740\u8abf\u7528<\/p>\n<p>call by reference \u6309\u5740\u8abf\u7528\uff1b\u5f15\u5740\u8abf\u7528<\/p>\n<p>call by result \u7d50\u679c\u8abf\u7528<\/p>\n<p>call by value\u6309\u503c\u8abf\u7528\uff1b\u5f15\u503c\u8abf\u7528<\/p>\n<p>candidate key \u5019\u9078\u9375\u78bc<\/p>\n<p>Carrier Sense Multiple Access with Collision\u00a0Avoidance (CSMA\/CA)\u00a0\u00a0\u5e36\u6709\u907f\u514d\u885d\u7a81\u7684\u8f09\u6ce2\u5075\u807d\u591a\u5740\u63a5\u9054<\/p>\n<p>Carrier Sense Multiple Access with Collision\u00a0Detect (CSMA\/CD)\u00a0\u5e36\u6709\u6aa2\u6e2c\u885d\u7a81\u7684\u8f09\u6ce2\u5075\u807d\u591a\u5740\u63a5\u9054<\/p>\n<p>Cascading Style Sheet (CSS) \u7d1a\u806f\u5f0f\u9801\u9762\uff1b\u5c64\u758a\u6a23\u5f0f\u8868<\/p>\n<p>Central Processing Unit (CPU) \u4e2d\u592e\u8655\u7406\u5668<\/p>\n<p>Certificate Authority (CA) \u6838\u8b49\u6a5f\u95dc<\/p>\n<p>character \u5b57\u7b26\uff1b\u5b57\u5143<\/p>\n<p>character head \u5b57\u9996<\/p>\n<p>check box \u8907\u9078\u6846<\/p>\n<p>check digit \u6aa2\u67e5\u6578\u4f4d<\/p>\n<p>checksum\u6aa2\u67e5\u548c<\/p>\n<p>Chinese Character Code for Information \u4e2d\u6587\u4fe1\u606f\u4ea4\u63db\u78bcInterchange (CCCII [code])<\/p>\n<p>chip \u6676\u7247<\/p>\n<p>circuit switch\u96fb\u8def\u5207\u63db<\/p>\n<p>client-side \u5ba2\u6236\u7aef<\/p>\n<p>cluster \u7fa4\u96c6<\/p>\n<p>coaxial cable \u540c\u8ef8\u96fb\u7e9c<\/p>\n<p>code (1)\u7de8\u78bc\uff0c(2)\u4ee3\u78bc<\/p>\n<p>coder-decoder \u7de8\u78bc\uff0d\u8b6f\u78bc\u5668\uff1b\u7de8\u78bc\uff0d\u89e3\u78bc\u5668<\/p>\n<p>Colour Graphics Adapter (CGA) \u8272\u5f69\u5716\u5f62\u9069\u914d\u5668<\/p>\n<p>command line interface\u547d\u4ee4\u884c\u754c\u9762<\/p>\n<p>Common Business-Oriented Language (COBOL)\u901a\u7528\u5546\u696d\u8a9e\u8a00<\/p>\n<p>Common Gateway Interface (CGI) \u901a\u7528\u63a5\u99c1\u754c\u9762\uff1b\u5171\u7528\u7db2\u9593\u9023\u63a5\u754c\u9762<\/p>\n<p>communication port \u901a\u8a0a\u57e0\uff1b\u901a\u8a0a\u9023\u63a5\u57e0<\/p>\n<p>Compact Disc (CD [disc]) \u5149\u789f<\/p>\n<p>Compact Disc Interactive (CD-I [disc]) \u4e92\u52d5\u5f0f\u5149\u789f\uff1b\u4ea4\u4e92\u5f0f\u5149\u789f<\/p>\n<p>Compact Disc Read-Only Memory (CD-ROM \u552f\u8b80\u5149\u789f[disc] )<\/p>\n<p>Compact Disc Recordable (CD-R [disc]) \u53ef\u8a18\u9304\u5149\u789f<\/p>\n<p>Compact Disc Rewritable (CD-RW [disc]) \u5fa9\u5beb\u5149\u789f\uff1b\u53ef\u91cd\u5beb\u5149\u789f<\/p>\n<p>compiler \u7de8\u8b6f\u7a0b\u5f0f\uff1b\u7de8\u8b6f\u7a0b\u5e8f\uff1b\u7de8\u8b6f\u5668<\/p>\n<p>Complementary Metal-Oxide Semiconductor \u4e92\u88dc\u91d1\u5c6c\u6c27\u5316\u7269\u534a\u5c0e\u9ad4(CMOS)<\/p>\n<p>Complex Instruction Set Computer (CISC) \u8907\u96dc\u6307\u4ee4\u96c6\u96fb\u8166<\/p>\n<p>computer \u96fb\u8166\uff1b\u8a08\u7b97\u6a5f<\/p>\n<p>Computer Aided Design (CAD) \u96fb\u8166\u8f14\u52a9\u8a2d\u8a08<\/p>\n<p>Computer Aided Instruction (CAI) \u96fb\u8166\u8f14\u52a9\u6307\u4ee4<\/p>\n<p>Computer Aided Manufacturing (CAM) \u96fb\u8166\u8f14\u52a9\u88fd\u9020<\/p>\n<p>Computer Aided Software Engineering (CASE) \u96fb\u8166\u8f14\u52a9\u8edf\u4ef6\u5de5\u7a0b<\/p>\n<p>Computer Assisted Learning (CAL) \u96fb\u8166\u8f14\u52a9\u5b78\u7fd2<\/p>\n<p>Computer Based Training (CBT) \u96fb\u8166\u8f14\u52a9\u8a13\u7df4\uff1b\u96fb\u8166\u8f14\u52a9\u57f9\u8a13<\/p>\n<p>console \u63a7\u5236\u53f0<\/p>\n<p>constant \u5e38\u6578\uff1b\u5e38\u91cf<\/p>\n<p>coprocessor \u5354\u8655\u7406\u5668<\/p>\n<p>cracking \u7834\u89e3<\/p>\n<p>cryptography \u5bc6\u78bc\u5b78<\/p>\n<p>Current Instruction Register (CIR) \u73fe\u884c\u6307\u4ee4\u5bc4\u5b58\u5668<\/p>\n<p>cursor \u5149\u6a19\uff1b\u6e38\u6a19<\/p>\n<p>Cyclic Redundancy Check (CRC) \u5faa\u74b0\u5197\u9918\u6838\u5c0d<\/p>\n<p>cylinder \u78c1\u9053\u67f1\u9762<\/p>\n<p>D<\/p>\n<p>Data Definition Language (DDL) \u6578\u64da\u5b9a\u7fa9\u8a9e\u8a00<\/p>\n<p>data dependence \u6578\u64da\u76f8\u95dc\u6027<\/p>\n<p>data description language \u6578\u64da\u63cf\u8ff0\u8a9e\u8a00<\/p>\n<p>Data Flow Diagram (DFD) \u6578\u64da\u6d41\u7a0b\u5716<\/p>\n<p>data link layer \u6578\u64da\u93c8\u8def\u5c64\uff1b\u6578\u64da\u9023\u8def\u5c64<\/p>\n<p>Data Manipulation Language \uff08DML\uff09\u6578\u64da\u64cd\u4f5c\u8a9e\u8a00\uff1b\u6578\u64da\u8655\u7406\u8a9e\u8a00<\/p>\n<p>data mining \u6578\u64da\u958b\u63a1<\/p>\n<p>data redundancy \u6578\u64da\u5197\u9918\u5ea6\uff1b\u6578\u64da\u5197\u9918\u6027<\/p>\n<p>data sink \u6578\u64da\u63a5\u6536\u5668\uff1b\u6578\u64da\u5bbf<\/p>\n<p>data structure \u6578\u64da\u7d50\u69cb<\/p>\n<p>data warehouse \u6578\u64da\u5009<\/p>\n<p>database \u6578\u64da\u5eab<\/p>\n<p>Database Administrator (DBA) \u6578\u64da\u5eab\u7ba1\u7406\u54e1<\/p>\n<p>Database Management System (DBMS) \u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71<\/p>\n<p>database query language \u6578\u64da\u5eab\u67e5\u8a62\u8a9e\u8a00<\/p>\n<p>deadlock \u6b7b\u9396<\/p>\n<p>debug \u9664\u932f\uff1b\u79fb\u9664\u932f\u8aa4<\/p>\n<p>Decision Support System (DSS) \u6c7a\u7b56\u652f\u63f4\u7cfb\u7d71<\/p>\n<p>declarative language \u5ba3\u544a\u6027\u8a9e\u8a00\uff1b\u9673\u8ff0\u6027\u8a9e\u8a00<\/p>\n<p>decode \u8b6f\u78bc\uff1b\u89e3\u78bc<\/p>\n<p>decryption \u89e3\u5bc6<\/p>\n<p>defragmentation software \u78c1\u789f\u91cd\u7d44\u8edf\u4ef6<\/p>\n<p>delimiter \u5b9a\u754c\u7b26\u865f<\/p>\n<p>Denial of Service (DoS) \u62d2\u7d55\u670d\u52d9<\/p>\n<p>depth-first search \u6df1\u5ea6\u512a\u5148\u641c\u7d22<\/p>\n<p>Desktop Publishing (DTP) \u684c\u4e0a\u6392\u7248<\/p>\n<p>Digital Analog Converter (DAC) \u6578\u78bc\u6a21\u64ec\u8f49\u63db\u5668<\/p>\n<p>Digital Audio Tape (DAT) \u6578\u78bc\u8072\u5e36<\/p>\n<p>digital divide \u6578\u78bc\u9694\u95a1\uff1b\u6578\u78bc\u9d3b\u6e9d<\/p>\n<p>Digital Subscriber Line (DSL) \u6578\u78bc\u7528\u6236\u7dda<\/p>\n<p>Digital Versatile Disc (DVD [disc]) \u6578\u78bc\u591a\u7528\u9014\u5149\u789f<\/p>\n<p>direct cutover conversion \u76f4\u63a5\u5207\u5165\u5f0f\u8f49\u63db\uff1b\u76f4\u63a5\u63a5\u5165\u8f49\u63db<\/p>\n<p>Direct Memory Access (DMA) \u76f4\u63a5\u8a18\u61b6\u9ad4\u5b58\u53d6<\/p>\n<p>directory \u76ee\u9304<\/p>\n<p>diskette \u8edf\u78c1\u789f<\/p>\n<p>distributed system\u5206\u5e03\u5f0f\u7cfb\u7d71<\/p>\n<p>domain integrity \u57df\u5b8c\u6574\u6027<\/p>\n<p>Domain Name System (DNS) \u7db2\u57df\u540d\u7a31\u7cfb\u7d71\uff1b\u9818\u57df\u540d\u7a31\u7cfb\u7d71\uff1b\u7db2\u57df\u7cfb\u7d71\uff1b\u57df\u540d\u7cfb\u7d71<\/p>\n<p>dot matrix \u9ede\u9663<\/p>\n<p>dot pitch \u9ede\u5bc6\u5ea6<\/p>\n<p>Double-Byte Character Set (DBCS) \u96d9\u5b57\u7bc0\u5b57\u7b26\u96c6\uff1b\u96d9\u5b57\u7bc0\u5b57\u5143\u96c6<\/p>\n<p>Double-Data-Rate Synchronous Dynamic\u00a0Random Access Memory (DDR SDRAM)\u00a0\u96d9\u901a\u9053\u540c\u6b65\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/p>\n<p>driver (1)\u9a45\u52d5\u5668\uff0c(2)\u9a45\u52d5\u7a0b\u5f0f\uff1b\u9a45\u52d5\u7a0b\u5e8f<\/p>\n<p>Dual In-line Memory Module (DIMM) \u96d9\u5217\u76f4\u63d2\u5f0f\u8a18\u61b6\u9ad4\u6a21\u7d44<\/p>\n<p>dummy argument \u865b\u8b8a\u5143<\/p>\n<p>duplex \u96d9\u5411<\/p>\n<p>Dynamic Host Configuration Protocol (DHCP) \u52d5\u614b\u4e3b\u6a5f\u914d\u7f6e\u5354\u5b9a<\/p>\n<p>Dynamic Hypertext Markup Language (DHTML)\u52d5\u614b\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00<\/p>\n<p>Dynamic Link Library (DLL) \u52d5\u614b\u9023\u7d50\u5eab\uff1b\u52d5\u614b\u9023\u7d50\u5eab\u5b58<\/p>\n<p>Dynamic Random Access Memory (DRAM) \u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/p>\n<p>E<\/p>\n<p>Electrically Erasable Programmable Read Only\u00a0Memory (EEPROM)\u00a0\u53ef\u96fb\u522a\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4<\/p>\n<p>Electronic Data Interchange (EDI) \u96fb\u5b50\u6578\u64da\u806f\u901a\uff1b\u96fb\u5b50\u6578\u64da\u4ea4\u63db<\/p>\n<p>Electronic Data Processing (EDP) \u96fb\u5b50\u6578\u64da\u8655\u7406<\/p>\n<p>Electronic Fund Transfer (EFT) \u96fb\u5b50\u8f49\u5e33<\/p>\n<p>Electronic Payment System\u96fb\u5b50\u4ed8\u6b3e\u7cfb\u7d71<\/p>\n<p>Electronic Service Delivery (ESD) \u516c\u5171\u670d\u52d9\u96fb\u5b50\u5316<\/p>\n<p>embedded system\u5d4c\u5165\u5f0f\u7cfb\u7d71<\/p>\n<p>encode \u7de8\u78bc<\/p>\n<p>encryption \u52a0\u5bc6<\/p>\n<p>End Of File (EOF) \u6a94\u5c3e<\/p>\n<p>Enhanced Graphics Adapter (EGA) \u52a0\u5f37\u5716\u5f62\u9069\u914d\u5668<\/p>\n<p>entity integrity \u5be6\u9ad4\u5b8c\u6574\u6027<\/p>\n<p>Entity Relationship Diagram (ERD) \u5be6\u9ad4\u95dc\u4fc2\u5716<\/p>\n<p>equi-join \u7b49\u9023\u63a5\uff1b\u7b49\u806f\u7d50<\/p>\n<p>Erasable Programmable Read Only Memory (EPROM)\u00a0\u53ef\u522a\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4<\/p>\n<p>ergonomics \u4eba\u9ad4\u5de5\u7a0b\u5b78\uff1b\u4eba\u9ad4\u5de5\u5b78<\/p>\n<p>Ethernet \u4ee5\u592a\u7db2\uff1b\u4e59\u592a\u7db2<\/p>\n<p>exception handling \u7570\u5e38\u8655\u7406<\/p>\n<p>explicit declaration \u986f\u5f0f\u8aaa\u660e<\/p>\n<p>expression \u7b97\u5f0f<\/p>\n<p>Extended Binary Coded Decimal Interchange\u00a0Code (EBCDIC [code])\u00a0\u00a0\u64f4\u5145\u4e8c\/\u5341\u9032\u5236\u4ea4\u63db\u4ee3\u78bc<\/p>\n<p>Extended Graphics Array (XGA) \u64f4\u5145\u5716\u5f62\u9663\u5217<\/p>\n<p>Extended Industry Standard Architecture (EISA)\u5ef6\u4f38\u5de5\u696d\u6a19\u6e96\u67b6\u69cb\uff1b\u5ef6\u4f38\u5de5\u696d\u6a19\u6e96\u529f\u80fd\u7d50\u69cb<\/p>\n<p>Extensible Hypertext Markup Language \u53ef\u64f4\u5145\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00\uff1b\u53ef\u64f4\u5c55\u8d85\u6587\u672c(XHTML) \u6a19\u8a18\u8a9e\u8a00<\/p>\n<p>Extensible Markup Language (XML) \u53ef\u64f4\u5145\u6a19\u793a\u8a9e\u8a00<\/p>\n<p>F<\/p>\n<p>fault tolerant\u5bb9\u932f\uff1b\u6545\u969c\u5bb9\u5fcd<\/p>\n<p>fetch-decode-execute cycle \u63d0\u53d6\uff0d\u8b6f\u78bc\uff0d\u57f7\u884c\u5468\u671f\uff1b\u63d0\u53d6\uff0d\u8b6f\u78bc\u00a0\u57f7\u884c\u5faa\u74b0<\/p>\n<p>Fibre Distributed Data Interface (FDDI) \u5149\u7e96\u5206\u5e03\u5f0f\u6578\u64da\u754c\u9762<\/p>\n<p>field \u5b57\u6bb5\uff1b\u6b04<\/p>\n<p>File Allocation Table (FAT) \u6a94\u6848\u914d\u7f6e\u8868<\/p>\n<p>File Control Block (FCB) \u6a94\u6848\u63a7\u5236\u6bb5<\/p>\n<p>File Transfer Protocol (FTP) \u6a94\u6848\u50b3\u8f38\u5354\u5b9a<\/p>\n<p>firewall \u9632\u706b\u7246<\/p>\n<p>firewire \u706b\u7dda<\/p>\n<p>firmware \u97cc\u9ad4\uff1b\u56fa\u4ef6<\/p>\n<p>First Normal Form (1NF) \u7b2c\u4e00\u7bc4\u5f0f<\/p>\n<p>First-In First-Out (FIFO) \u5148\u9032\u5148\u51fa\u6cd5<\/p>\n<p>flag \u6a19\u8a18\uff1b\u65d7\u6a19<\/p>\n<p>flash memory \u5feb\u9583\u8a18\u61b6\u9ad4<\/p>\n<p>flip-flop \u89f8\u767c\u5668\uff1b\u6b63\u53cd\u5668<\/p>\n<p>floppy disk \u8edf\u78c1\u789f<\/p>\n<p>flowchart \u6d41\u7a0b\u5716<\/p>\n<p>footer \u9801\u5c3e\uff1b\u8a3b\u8173<\/p>\n<p>foreign key \u5916\u9375\u78bc<\/p>\n<p>formal argument \u5f62\u5f0f\u8b8a\u5143<\/p>\n<p>formal parameter \u5f62\u5f0f\u53c3\u6578<\/p>\n<p>frame (1)\u5e40\uff1b\u5f71\u683c\uff0c(2)\u6846<\/p>\n<p>Frame Check Sequence (FCS) \u5e40\u6aa2\u9a57\u5e8f\u5217<\/p>\n<p>freeware \u514d\u8cbb\u8edf\u4ef6<br \/>\nG<\/p>\n<p>Gantt chart \u7518\u7279\u5716<\/p>\n<p>Garbage-In Garbage-Out (GIGO) \u7121\u7528\u8f38\u5165\u7121\u7528\u8f38\u51fa<\/p>\n<p>gateway \u7db2\u9593\u9023\u63a5\u5668\uff1b\u901a\u8a0a\u9598<\/p>\n<p>Geographic Information System (GIS) \u5730\u7406\u4fe1\u606f\u7cfb\u7d71<\/p>\n<p>Gigabit (Gb) \u5341\u5104\u4f4d\u5143\uff1b\u5343\u5146\u4f4d\u5143<\/p>\n<p>GigaByte (GB) \u5341\u5104\u5b57\u7bc0\uff1b\u5343\u5146\u5b57\u7bc0<\/p>\n<p>Gigahertz (GHz ) \u5341\u5104\u8d6b\uff1b\u5343\u5146\u8d6b<\/p>\n<p>Global Positioning System (GPS) \u5168\u7403\u5b9a\u4f4d\u7cfb\u7d71<\/p>\n<p>global variable \u5168\u7a0b\u8b8a\u91cf<\/p>\n<p>grandfather-father-son technique \u4e09\u4ee3\u5099\u4efd\u5132\u5b58\u6cd5<\/p>\n<p>Graphical User Interface (GUI) \u5716\u5f62\u7528\u6236\u754c\u9762<\/p>\n<p>Graphics Interchange Format (GIF) \u5716\u5f62\u4e92\u63db\u683c\u5f0f<\/p>\n<p>Guo Biao (GB) code \u570b\u6a19\u78bc\uff1b\u570b\u5bb6\u6a19\u6e96\u78bc<\/p>\n<p>H<\/p>\n<p>hacking \u9ed1\u5ba2\u5165\u4fb5\uff1b\u99ed\u5ba2\u5165\u4fb5<\/p>\n<p>handshaking \u4fe1\u865f\u4ea4\u63db<\/p>\n<p>hang \u66ab\u505c\uff1b\u4e2d\u6b62\uff1b\u7576\u6a5f<\/p>\n<p>hard disk \u786c\u789f\uff1b\u786c\u78c1\u789f<\/p>\n<p>hardware \u786c\u4ef6<\/p>\n<p>header \u9801\u9996\uff1b\u9996\u6a19\uff1b\u8868\u982d<\/p>\n<p>hierarchical model \u5206\u7d1a\u6a21\u578b\uff1b\u5206\u5c64\u6a21\u578b<\/p>\n<p>high level language \u9ad8\u7d1a\u8a9e\u8a00\uff1b\u9ad8\u968e\u8a9e\u8a00<\/p>\n<p>homepage \u4e3b\u7db2\u9801\uff1b\u672c\u9801<\/p>\n<p>Hong Kong Public key Infrastructure(HONGKONG PKI)\u00a0\u9999\u6e2f\u516c\u958b\u5bc6\u78bc\u5319\u57fa\u790e\u5efa\u8a2d<\/p>\n<p>Hong Kong Supplementary Character Set \u9999\u6e2f\u589e\u88dc\u5b57\u7b26\u96c6\uff1b\u9999\u6e2f\u589e\u88dc\u5b57\u5143\u96c6(HKSCS)<\/p>\n<p>hub \u96c6\u7dda\u5668<\/p>\n<p>Human Computer Interface (HCI) \u4eba\u6a5f\u754c\u9762<\/p>\n<p>hyperlink \u8d85\u9023\u7d50\uff1b\u8d85\u6587\u672c\u9023\u7d50<\/p>\n<p>Hypertext Markup Language (HTML) \u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00<\/p>\n<p>Hypertext Transfer Protocol (HTTP) \u8d85\u6587\u672c\u50b3\u8f38\u5354\u5b9a<\/p>\n<p>I<\/p>\n<p>icon \u5716\u793a\uff1b\u5716\u6a19<\/p>\n<p>identifier \u8b58\u5225\u7b26\uff1b\u6a19\u8b58\u7b26<\/p>\n<p>implicit declaration \u96b1\u5f0f\u8aaa\u660e<\/p>\n<p>index key \u7d22\u5f15\u9375\u78bc<\/p>\n<p>Industry Standard Architecture (ISA) \u5de5\u696d\u6a19\u6e96\u7d50\u69cb\uff1b\u5de5\u696d\u6a19\u6e96\u529f\u80fd\u7d50\u69cb<\/p>\n<p>information \u8cc7\u8a0a\uff1b\u4fe1\u606f<\/p>\n<p>Infrared Data Association port (IrDA) \u7d05\u5916\u7dda\u6578\u64da\u57e0\uff1b\u7d05\u5916\u7dda\u6578\u64da\u9023\u63a5\u57e0<\/p>\n<p>initial program load \u521d\u59cb\u7a0b\u5f0f\u8f09\u5165\uff1b\u521d\u59cb\u7a0b\u5e8f\u8f09\u5165<\/p>\n<p>initialisation\u521d\u59cb\u5316<\/p>\n<p>inorder transversal \u4e2d\u5e8f\u904d\u6b77<\/p>\n<p>Input\/Output (I\/O) device \u8f38\u5165\/\u8f38\u51fa\u8a2d\u5099\uff1b\u8f38\u5165\/\u8f38\u51fa\u88dd\u7f6e<\/p>\n<p>Input-Process-Output cycle \u8f38\u5165\uff0d\u8655\u7406\uff0d\u8f38\u51fa\u5468\u671f\uff1b\u8f38\u5165\uff0d\u8655\u7406\u00a0\u8f38\u51fa\u5faa\u74b0<\/p>\n<p>insertion sort\u63d2\u5165\u6392\u5e8f\u6cd5<\/p>\n<p>instance \u5be6\u4f8b<\/p>\n<p>Institute of Electrical and Electronic Engineer \u96fb\u6a5f\u53ca\u96fb\u5b50\u5de5\u7a0b\u5e2b\u5b78\u6703\u00a0(IEEE)<\/p>\n<p>Instruction Register (IR) \u6307\u4ee4\u5bc4\u5b58\u5668<\/p>\n<p>Integrated Circuit (IC) \u96c6\u6210\u96fb\u8def<\/p>\n<p>Integrated Drive Electronics (IDE) \u96c6\u6210\u96fb\u5b50\u88dd\u7f6e<\/p>\n<p>Integrated Services Digital Network (ISDN) \u7d9c\u5408\u670d\u52d9\u6578\u78bc\u7db2\u7d61<\/p>\n<p>International Organisation for Standardisation \u570b\u969b\u6a19\u6e96\u5316\u7d44\u7e54\u00a0(ISO)<\/p>\n<p>Internet \u4e92\u806f\u7db2<\/p>\n<p>Internet Control Message Protocol (ICMP) \u7db2\u7d61\u63a7\u5236\u4fe1\u606f\u5354\u5b9a<\/p>\n<p>Internet Message Access Protocol (IMAP) \u7db2\u7d61\u4fe1\u606f\u63a5\u9054\u5354\u5b9a<\/p>\n<p>internet Network Information Center (interNIC) \u4e92\u806f\u7db2\u8cc7\u8a0a\u4e2d\u5fc3<\/p>\n<p>Internet Protocol (IP) \u7db2\u7d61\u5354\u5b9a\uff1b\u4e92\u806f\u7db2\u5354\u5b9a<\/p>\n<p>Internet Service Provider (ISP) \u4e92\u806f\u7db2\u670d\u52d9\u4f9b\u61c9\u5546<\/p>\n<p>interoperability \u4e92\u7528\u6027\uff1b\u76f8\u4e92\u64cd\u4f5c\u6027<\/p>\n<p>interpreter \u89e3\u8b6f\u7a0b\u5f0f\uff1b\u89e3\u8b6f\u7a0b\u5e8f\uff1b\u89e3\u8b6f\u5668<\/p>\n<p>interrupt handler \u4e2d\u65b7\u8655\u7406\u7a0b\u5f0f\uff1b\u4e2d\u65b7\u8655\u7406\u7a0b\u5e8f<\/p>\n<p>Interrupt Request (IRQ) \u4e2d\u65b7\u8acb\u6c42<\/p>\n<p>intranet \u5167\u806f\u7db2<\/p>\n<p>IPsec \u4e92\u806f\u7db2\u7d61\u5354\u5b9a\u5b89\u5168<\/p>\n<p>iteration \u8fed\u4ee3\uff1b\u5faa\u74b0<br \/>\nJ<\/p>\n<p>Joint Photographic Experts Group (JPEG) \u806f\u5408\u5f71\u50cf\u5c08\u5bb6\u7fa4\u7d44<\/p>\n<p>jumper \u8de8\u63a5\u5668<\/p>\n<p>K<\/p>\n<p>kernel \u6838\u5fc3<\/p>\n<p>Kilobit (Kb)\u5343\u4f4d\u5143<\/p>\n<p>KiloByte (KB) \u5343\u5b57\u7bc0<\/p>\n<p>kiloHertz (kHz) \u5343\u8d6b<\/p>\n<p>L<\/p>\n<p>Large Scale Integration (LSI) \u5927\u898f\u6a21\u96c6\u6210\u6280\u8853<\/p>\n<p>Last-In First-Out (LIFO) \u5f8c\u9032\u5148\u51fa\u6cd5<\/p>\n<p>latency \u6642\u5ef6<\/p>\n<p>leased line \u5c08\u7dda<\/p>\n<p>lexical analysis \u8a9e\u53e5\u5206\u6790\uff1b\u8a5e\u6cd5\u5206\u6790<\/p>\n<p>Line Feed (LF) \u63db\u884c<\/p>\n<p>linear linked list \u7dda\u6027\u93c8\u8868\uff1b\u7dda\u6027\u9023\u63a5\u8868<\/p>\n<p>linear search\u7dda\u6027\u6aa2\u7d22<\/p>\n<p>linked list \u93c8\u8868\uff1b\u9023\u63a5\u8868<\/p>\n<p>linker \u9023\u63a5\u7a0b\u5f0f\uff1b\u9023\u63a5\u7a0b\u5e8f<\/p>\n<p>loader \u8f09\u5165\u7a0b\u5f0f\uff1b\u8f09\u5165\u7a0b\u5e8f<\/p>\n<p>Local Area Network (LAN) \u5c40\u90e8\u5340\u57df\u7db2\u7d61\uff1b\u5340\u57df\u7db2\u7d61<\/p>\n<p>local variable \u5c40\u90e8\u8b8a\u91cf<\/p>\n<p>loop \u5faa\u74b0<\/p>\n<p>low level language \u4f4e\u968e\u8a9e\u8a00\uff1b\u4f4e\u7d1a\u8a9e\u8a00<\/p>\n<p>M<\/p>\n<p>machine language \u6a5f\u5668\u8a9e\u8a00<\/p>\n<p>magnetic core memory\u78c1\u854a\u8a18\u61b6\u9ad4<\/p>\n<p>Magnetic Ink Character Recognition (MICR) \u78c1\u58a8\u5b57\u7b26\u8b58\u5225\uff1b\u78c1\u58a8\u6c34\u5b57\u5143\u8b58\u5225<\/p>\n<p>Magneto-Optical (MO) disk \u78c1\u5149\u789f<\/p>\n<p>mail merge\u90f5\u4ef6\u5408\u4f75\uff1b\u5408\u4f75\u5217\u5370<\/p>\n<p>main memory\u4e3b\u8a18\u61b6\u9ad4<\/p>\n<p>mainframe computer \u5927\u578b\u96fb\u8166\uff1b\u4e3b\u6a5f\u96fb\u8166<\/p>\n<p>malware \u60e1\u610f\u8edf\u4ef6\uff1b\u60e1\u6027\u7a0b\u5f0f<\/p>\n<p>Management Information System (MIS) \u7ba1\u7406\u8cc7\u8a0a\u7cfb\u7d71<\/p>\n<p>mask\u906e\u7f69\uff1b\u5c4f\u853d\uff1b\u63a9\u78bc<\/p>\n<p>master-slave \u4e3b\u5f9e\uff1b\u4e3b\u5f9e\u5f0f<\/p>\n<p>Media Access Control (MAC) \u5a92\u4ecb\u63a5\u9054\u63a7\u5236<\/p>\n<p>Megabit (Mb) \u767e\u842c\u4f4d\u5143\uff1b\u5146\u4f4d\u5143<\/p>\n<p>Megabits per second (Mbps) \u6bcf\u79d2\u767e\u842c\u4f4d\u5143\uff1b\u6bcf\u79d2\u5146\u4f4d\u5143<\/p>\n<p>MegaByte (MB) \u767e\u842c\u5b57\u7bc0\uff1b\u5146\u5b57\u7bc0<\/p>\n<p>MegaHertz (MHz) \u767e\u842c\u8d6b\uff1b\u5146\u8d6b<\/p>\n<p>Memory Address Register (MAR) \u8a18\u61b6\u9ad4\u4f4d\u5740\u5bc4\u5b58\u5668<\/p>\n<p>Memory Data Register (MDR) \u8a18\u61b6\u9ad4\u6578\u64da\u5bc4\u5b58\u5668<\/p>\n<p>menu \u9078\u55ae\uff1b\u9078\u9805\u55ae\uff1b\u529f\u80fd\u9078\u64c7\u8868<\/p>\n<p>merge sort\u5408\u4f75\u6392\u5e8f\u6cd5<\/p>\n<p>metadata \u5143\u6578\u64da<\/p>\n<p>Metropolitan Area Network (MAN) \u57ce\u5e02\u5340\u57df\u7db2\u7d61\uff1b\u57ce\u57df\u7db2\u7d61<\/p>\n<p>microcomputer \u5fae\u578b\u96fb\u8166\uff1b\u5fae\u8a08\u7b97\u6a5f<\/p>\n<p>microsecond (\u03bcs) \u5fae\u79d2<\/p>\n<p>Million Instructions Per Second (MIPS) \u6bcf\u79d2\u767e\u842c\u6307\u4ee4<\/p>\n<p>millisecond (ms) \u6beb\u79d2<\/p>\n<p>minicomputer \u5c0f\u578b\u96fb\u8166\uff1b\u5c0f\u578b\u8a08\u7b97\u6a5f<\/p>\n<p>mirror \u93e1\u50cf\uff1b\u6620\u7167<\/p>\n<p>mnemonic \u52a9\u8a18\u64cd\u4f5c\u78bc\uff1b\u52a9\u8a18\u78bc<\/p>\n<p>modularity \u6a21\u7d44\u6027<\/p>\n<p>modulator-demodulator (modem)\u6578\u64da\u6a5f\uff1b\u8abf\u89e3\u5668\uff1b\u8abf\u5236\u89e3\u8abf\u5668<\/p>\n<p>morphing \u8b8a\u5f62<\/p>\n<p>Motion Picture Experts Group (MPEG) \u52d5\u756b\u5c08\u5bb6\u7fa4\u7d44<\/p>\n<p>multicast \u591a\u5740\u5ee3\u64ad\uff1b\u591a\u4fe1\u9053\u5ee3\u64ad<\/p>\n<p>multiplexing\u591a\u8def\u8f49\u63a5\uff1b\u591a\u8def\u50b3\u8f38<\/p>\n<p>multiprocessing \u591a\u9053\u8655\u7406<\/p>\n<p>Multipurpose Internet Mail Extension (MIME) \u591a\u529f\u80fd\u4e92\u806f\u7db2\u90f5\u905e\u4f38\u5ef6<\/p>\n<p>multitasking\u591a\u5de5\u4f5c\u696d\uff1b\u591a\u5de5\u8655\u7406<\/p>\n<p>multithreading \u591a\u7dda\u904b\u4f5c<\/p>\n<p>Musical Instrument Digital Interface (MIDI) \u6a02\u5668\u6578\u4f4d\u754c\u9762\uff1b\u6a02\u5668\u6578\u78bc\u754c\u9762<br \/>\nN<\/p>\n<p>named constant \u8ce6\u540d\u5e38\u6578\uff1b\u547d\u540d\u5e38\u6578<\/p>\n<p>nanosecond (ns) \u7d0d\u79d2\uff1b\u6beb\u5fae\u79d2<\/p>\n<p>natural join\u81ea\u7136\u9023\u63a5\uff1b\u81ea\u7136\u806f\u7d50<\/p>\n<p>nested function \u5d4c\u5957\u51fd\u6578<\/p>\n<p>nested loop \u5d4c\u5957\u5faa\u74b0<\/p>\n<p>netiquette \u7db2\u4e0a\u79ae\u5100\uff1b\u7db2\u4e0a\u7684\u884c\u70ba\u898f\u7bc4<\/p>\n<p>Network Address Translation (NAT) \u7db2\u5740\u7aef\u8f49\u63db<\/p>\n<p>Network Interface Card (NIC) \u7db2\u7d61\u754c\u9762\u5361<\/p>\n<p>network layer \u7db2\u7d61\u5c64<\/p>\n<p>Network Time Protocol (NTP) \u7db2\u7d61\u6642\u9593\u5354\u5b9a<\/p>\n<p>network topology \u7db2\u7d61\u5e03\u5c40\uff1b\u7db2\u7d61\u4f48\u5c40<\/p>\n<p>node \u7bc0\u9ede<\/p>\n<p>normalisation \u898f\u7bc4\u5316\uff1b\u898f\u683c\u5316<\/p>\n<p>null \u7a7a\u503c<\/p>\n<p>O<\/p>\n<p>Object Linking and Embedding (OLE) \u7269\u4ef6\u9023\u63a5\u8207\u5d4c\u5165<\/p>\n<p>Object-Oriented Programming (OOP) \u7269\u4ef6\u5c0e\u5411\u7de8\u7a0b<\/p>\n<p>one-dimensional array \u55ae\u9663\u5217\uff1b\u4e00\u7dad\u9663\u5217<\/p>\n<p>one&#8217;s complement \u4e00\u88dc\u78bc<\/p>\n<p>open source software \u958b\u653e\u6e90\u78bc\u8edf\u4ef6<\/p>\n<p>Open System Interconnection (OSI) \u958b\u653e\u7cfb\u7d71\u4e92\u9023<\/p>\n<p>operand \u64cd\u4f5c\u6578<\/p>\n<p>Operating System (OS)\u64cd\u4f5c\u7cfb\u7d71<\/p>\n<p>operation code (op-code) \u64cd\u4f5c\u78bc<\/p>\n<p>operator (1)\u904b\u7b97\u7b26\uff0c(2)\u64cd\u4f5c\u54e1<\/p>\n<p>Optical Character Recognition (OCR) \u5149\u7b26\u8b58\u5225\uff1b\u5149\u5b78\u5b57\u7b26\u8b58\u5225\uff1b\u5149\u5b78\u5b57\u5143\u8b58\u5225<\/p>\n<p>Optical Mark Recognition (OMR) \u5149\u6a19\u8b58\u5225\uff1b\u5149\u5b78\u6a19\u8a18\u8b58\u5225<\/p>\n<p>outer join \u5916\u9023\u63a5\uff1b\u5916\u806f\u7d50<\/p>\n<p>overflow error \u4e0a\u6ea2\u932f\u8aa4<\/p>\n<p>P<\/p>\n<p>packet switching \u6578\u64da\u5305\u5207\u63db<\/p>\n<p>parallel conversion \u4e26\u884c\u5f0f\u8f49\u63db\uff1b\u5e73\u884c\u8f49\u63db<\/p>\n<p>parallel port \u4e26\u884c\u57e0\uff1b\u4e26\u884c\u9023\u63a5\u57e0<\/p>\n<p>parameter \u53c3\u6578<\/p>\n<p>parameter passing \u53c3\u6578\u50b3\u905e<\/p>\n<p>parity \u5947\u5076\u6027<\/p>\n<p>parity bit \u5947\u5076\u6aa2\u9a57\u4f4d<\/p>\n<p>parity check\u5947\u5076\u6aa2\u6e2c\uff1b\u5947\u5076\u6821\u9a57<\/p>\n<p>parser \u8a9e\u6cd5\u5206\u6790\u7a0b\u5f0f\uff1b\u8a9e\u6cd5\u5206\u6790\u7a0b\u5e8f<\/p>\n<p>partition \u5206\u5272\uff1b\u5206\u5340\uff1b\u5283\u5206<\/p>\n<p>PCMCIA card (PC card) \u624b\u63d0\u96fb\u8166\u7db2\u5361\uff1b\u96fb\u8166\u63d2\u5361<\/p>\n<p>Peer-to-Peer (P2P) file sharing software \u9ede\u5c0d\u9ede\u6a94\u6848\u5206\u4eab\u8edf\u4ef6<\/p>\n<p>Peer-to-Peer (P2P) network \u5c0d\u7b49\u7db2\u7d61<\/p>\n<p>Peripheral Component Interconnect (PCI) \u5468\u908a\u90e8\u4ef6\u4e92\u9023\uff1b\u5468\u908a\u7d44\u4ef6\u806f\u7e6b<\/p>\n<p>Personal Area Network (PAN) \u500b\u4eba\u5340\u57df\u7db2\u7d61<\/p>\n<p>Personal Digital Assistant (PDA) \u500b\u4eba\u6578\u78bc\u52a9\u7406<\/p>\n<p>Personal Identity Number (PIN) \u500b\u4eba\u8b58\u5225\u865f\u78bc<\/p>\n<p>phased conversion \u968e\u6bb5\u5f0f\u8f49\u63db\uff1b\u968e\u6bb5\u8f49\u63db<\/p>\n<p>phishing \u4eff\u5192\u8a50\u9a19<\/p>\n<p>physical layer \u5be6\u9ad4\u5c64<\/p>\n<p>picosecond (ps) \u76ae\u79d2\uff1b\u5fae\u5fae\u79d2<\/p>\n<p>picture element (pixel) \u5716\u50cf\u5143\u7d20\uff1b\u50cf\u7d20\uff1b\u5716\u7d20<\/p>\n<p>pilot conversion \u5f15\u5c0e\u5f0f\u8f49\u63db\uff1b\u5be6\u9a57\u8f49\u63db<\/p>\n<p>pipelining \u6d41\u6c34\u7dda\u64cd\u4f5c\uff1b\u6d41\u6c34\u7dda\u6280\u8853<\/p>\n<p>pitch (1)\u5b57\u5143\u9593\u8ddd\uff1b\u5b57\u5bec\uff0c(2)\u97f3\u8abf<\/p>\n<p>pivot table \u6a1e\u7d10\u5206\u6790\u8868<\/p>\n<p>Plug and Play (PnP) \u96a8\u63d2\u5373\u7528\uff1b\u5373\u88dd\u5373\u7528\uff1b\u5373\u63d2\u5373\u7528<\/p>\n<p>plug-in \u5916\u639b\u7a0b\u5f0f\uff1b\u63d2\u4ef6<\/p>\n<p>pointer \u6307\u793a\u5b57\uff1b\u6307\u793a\u6a19<\/p>\n<p>Point-Of-Sale (POS) terminal \u92b7\u552e\u9ede\u7d42\u7aef\u6a5f<\/p>\n<p>Point-to-Point Protocol (PPP) \u9ede\u5c0d\u9ede\u5354\u5b9a<\/p>\n<p>Point-to-Point Protocol over Ethernet (PPPoE) \u4ee5\u592a\u7db2\u5167\u9ede\u5c0d\u9ede\u50b3\u8f38\u5354\u5b9a<\/p>\n<p>Point-to-Point Tunneling Protocol (PPTP) \u9ede\u81f3\u9ede\u958b\u96a7\u5354\u5b9a<\/p>\n<p>Polish notation \u6ce2\u7fa9\u8868\u793a\u6cd5<\/p>\n<p>polling \u8f2a\u8a62\uff1b\u63a2\u8a62<\/p>\n<p>polymorphism \u591a\u5f62\u6027<\/p>\n<p>Portable Document Format (PDF) \u53ef\u651c\u5f0f\u6587\u4ef6\u683c\u5f0f<\/p>\n<p>Portable Network Graphics (PNG) \u4fbf\u651c\u5f0f\u7db2\u7d61\u5716\u5f62\u683c\u5f0f<\/p>\n<p>portal [site]\u5165\u9580\u7db2\u7ad9<\/p>\n<p>Post Office Protocol (POP) \u90f5\u5c40\u5354\u5b9a<\/p>\n<p>presentation layer \u8868\u793a\u5c64<\/p>\n<p>primary key \u4e3b\u95dc\u9375\u78bc<\/p>\n<p>private key \u79c1\u4eba\u5bc6\u78bc\u5319\uff1b\u79c1\u9470<\/p>\n<p>procedural language \u904e\u7a0b\u8a9e\u8a00<\/p>\n<p>procedure \u904e\u7a0b\uff1b\u7a0b\u5e8f<\/p>\n<p>program\u7a0b\u5f0f\uff1b\u7a0b\u5e8f<\/p>\n<p>Program Counter (PC) \u7a0b\u5f0f\u8a08\u6578\u5668\uff1b\u7a0b\u5e8f\u8a08\u6578\u5668<\/p>\n<p>Programmable Read Only Memory (PROM) \u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4<\/p>\n<p>protocol layer \u5354\u5b9a\u5c64<\/p>\n<p>prototyping \u539f\u578b\u958b\u767c\uff1b\u539f\u578b\u88fd\u4f5c<\/p>\n<p>proxy server \u4ee3\u7406\u4f3a\u670d\u5668<\/p>\n<p>pseudocode \u507d\u4ee3\u78bc<\/p>\n<p>public key \u516c\u958b\u5bc6\u78bc\u5319\uff1b\u516c\u9470<\/p>\n<p>Public Key Infrastructure (PKI) \u516c\u958b\u5bc6\u78bc\u5319\u57fa\u790e\u5efa\u8a2d\uff1b\u516c\u9470\u57fa\u790e\u5efa\u8a2d<\/p>\n<p>Public Non-exclusive Electronic Transmission \u516c\u5171\u975e\u5c08\u5229\u96fb\u8a0a\u670d\u52d9<\/p>\n<p>Services (PNETS)<\/p>\n<p>Q<\/p>\n<p>query by example \u7bc4\u4f8b\u67e5\u8a62\u6cd5<\/p>\n<p>queue \u968a\u5217<\/p>\n<p>quick sort \u5feb\u901f\u6392\u5e8f\u6cd5<\/p>\n<p>R<\/p>\n<p>radical \u90e8\u9996<\/p>\n<p>radio button \u55ae\u9078\u6309\u9215<\/p>\n<p>Random Access Memory (RAM) \u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/p>\n<p>Rapid Application Development (RAD) \u61c9\u7528\u7cfb\u7d71\u8fc5\u901f\u767c\u5c55\u6cd5<\/p>\n<p>Read-Only Memory (ROM) \u552f\u8b80\u8a18\u61b6\u9ad4<\/p>\n<p>Really Simple Syndication (RSS) \u7c21\u6613\u8cc7\u8a0a\u805a\u5408<\/p>\n<p>real-time processing \u5be6\u6642\u8655\u7406<\/p>\n<p>record \u8a18\u9304<\/p>\n<p>recursion \u905e\u6b78<\/p>\n<p>Reduced Instruction Set Computer (RISC) \u7cbe\u7c21\u6307\u4ee4\u96c6\u96fb\u8166<\/p>\n<p>Redundant Array of Independent Disks (RAID) \u5197\u9918\u78c1\u789f\u7d44\uff1b\u5197\u9918\u78c1\u789f\u9663<\/p>\n<p>referential integrity \u53c3\u7167\u5b8c\u6574\u6027<\/p>\n<p>register \u66ab\u5b58\u5668\uff1b\u5bc4\u5b58\u5668<\/p>\n<p>Relational Database Management System\u00a0(RDBMS) \u95dc\u806f\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71\uff1b\u95dc\u4fc2\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71<\/p>\n<p>Remote Procedure Call (RPC) \u9060\u7a0b\u7a0b\u5e8f\u8abf\u7528<\/p>\n<p>repeater \u8f49\u767c\u5668\uff1b\u4e2d\u7e7c\u5668\uff1b\u4e2d\u7e7c\u7ad9<\/p>\n<p>reserved word \u4fdd\u7559\u5b57<\/p>\n<p>resolution \u89e3\u50cf\u5ea6\uff1b\u89e3\u6790\u5ea6<\/p>\n<p>RGB monitor \u7d05\u7da0\u85cd\u986f\u793a\u5668<\/p>\n<p>Rich Text Format (RTF) \u591a\u6587\u672c\u683c\u5f0f<\/p>\n<p>root directory \u6839\u76ee\u9304<\/p>\n<p>rounding error \u6368\u5165\u8aa4\u5dee<\/p>\n<p>router \u8def\u7531\u5668<\/p>\n<p>Routing Information Protocol (RIP) \u8def\u5f91\u9078\u64c7\u8cc7\u8a0a\u5354\u5b9a<\/p>\n<p>run \u57f7\u884c\uff1b\u904b\u884c<\/p>\n<p>S<\/p>\n<p>scalar type \u6a19\u91cf\u985e\u5f62<\/p>\n<p>schema\u6a21\u5f0f<\/p>\n<p>scripting language \u624b\u7a3f\u7a0b\u5f0f\u8a9e\u8a00<\/p>\n<p>search engine\u641c\u5c0b\u5668\uff1b\u6aa2\u7d22\u5668<\/p>\n<p>Second Normal Form (2NF) \u7b2c\u4e8c\u7bc4\u5f0f<\/p>\n<p>secondary key \u8f14\u52a9\u95dc\u9375\u78bc<\/p>\n<p>secondary storage \u8f14\u52a9\u5132\u5b58\u5668\uff1b\u8f14\u52a9\u5b58\u8caf\u5668<\/p>\n<p>sector \u6247\u5340<\/p>\n<p>Secure Electronic Transaction (SET) \u4fdd\u5bc6\u96fb\u5b50\u4ea4\u6613<\/p>\n<p>Secure Sockets Layer (SSL) \u4fdd\u5bc6\u63d2\u53e3\u5c64<\/p>\n<p>segment \u6bb5\uff1b\u90e8\u5206<\/p>\n<p>serial port \u4e32\u884c\u57e0\uff1b\u4e32\u884c\u9023\u63a5\u57e0<\/p>\n<p>server-side \u4f3a\u670d\u5668\u7aef<\/p>\n<p>session layer \u8a71\u8def\u5c64\uff1b\u6703\u8a71\u5c64<\/p>\n<p>shareware \u5171\u4eab\u8edf\u4ef6<\/p>\n<p>Shielded Twisted Pair (STP) \u5c4f\u853d\u96d9\u626d\u7dda<\/p>\n<p>Short Message Service (SMS) \u77ed\u8a0a\u670d\u52d9<\/p>\n<p>Simple Mail Transfer Protocol (SMTP) \u7c21\u55ae\u90f5\u905e\u50b3\u9001\u5354\u5b9a<\/p>\n<p>Simple Network Management Protocol (SNMP) \u7c21\u55ae\u7db2\u7d61\u7ba1\u7406\u5354\u5b9a<\/p>\n<p>simplex \u55ae\u5411<\/p>\n<p>slot \u69fd<\/p>\n<p>Small Computer Systems Interface (SCSI) \u5c0f\u578b\u96fb\u8166\u7cfb\u7d71\u754c\u9762<\/p>\n<p>software \u8edf\u4ef6<\/p>\n<p>source code\u6e90\u78bc<\/p>\n<p>spamming \u6feb\u767c\u90f5\u4ef6<\/p>\n<p>spooling \u5047\u812b\u6a5f\u8f38\u5165\u8f38\u51fa<\/p>\n<p>spyware \u9593\u8adc\u7a0b\u5f0f\uff1b\u9593\u8adc\u8edf\u4ef6<\/p>\n<p>stack \u5806\u758a<\/p>\n<p>Static Random Access Memory (SRAM) \u975c\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/p>\n<p>Status Register (SR) \u72c0\u614b\u5bc4\u5b58\u5668<\/p>\n<p>stepwise refinement \u9010\u6b65\u6c42\u7cbe\u6cd5<\/p>\n<p>streaming \u4e32\u6d41\u50b3\u8f38\uff1b\u6d41\u5f0f\u50b3\u8f38<\/p>\n<p>string \u5b57\u4e32\uff1b\u5b57\u7b26\u4e32<\/p>\n<p>structure chart \u7d50\u69cb\u5716<\/p>\n<p>Structured Query Language (SQL) \u7d50\u69cb\u5316\u67e5\u8a62\u8a9e\u8a00<\/p>\n<p>stub \u5b50\u7a0b\u5f0f\u5b58\u6839\uff1b\u5b50\u7a0b\u5e8f\u5b58\u6839<\/p>\n<p>subdirectory \u5b50\u76ee\u9304<\/p>\n<p>subnet \u5b50\u7db2\u7d61<\/p>\n<p>subprogram\u5b50\u7a0b\u5f0f\uff1b\u5b50\u7a0b\u5e8f<\/p>\n<p>subroutine \u5b50\u7a0b\u5f0f\uff1b\u5b50\u7a0b\u5e8f<\/p>\n<p>Super Video Graphics Array (SVGA) \u8d85\u8996\u50cf\u5716\u5f62\u9663\u5217<\/p>\n<p>supercomputer \u8d85\u7d1a\u96fb\u8166<\/p>\n<p>switch \u4ea4\u63db\u5668<\/p>\n<p>Synchronous Data Link Control (SDLC) \u540c\u6b65\u6578\u64da\u93c8\u8def\u63a7\u5236\uff1b\u540c\u6b65\u6578\u64da\u9023\u7d50\u63a7\u5236<\/p>\n<p>Synchronous Dynamic Random Access Memory\u00a0(SDRAM)\u00a0\u540c\u6b65\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4<\/p>\n<p>syntax \u8a9e\u6cd5<\/p>\n<p>System Development Life Cycle (SDLC) \u7cfb\u7d71\u958b\u767c\u751f\u547d\u5468\u671f<\/p>\n<p>T<\/p>\n<p>Tagged Image File Format (TIFF) \u6a19\u8a18\u5716\u50cf\u6587\u4ef6\u683c\u5f0f<\/p>\n<p>telecommunication \u9060\u7a0b\u901a\u8a0a<\/p>\n<p>telecommuting \u9060\u7a0b\u901a\u52e4\uff1b\u96fb\u50b3\u901a\u52e4\uff1b\u96fb\u5b50\u901a\u52e4<\/p>\n<p>telnet\u9060\u7a0b\u767b\u9304\uff1b\u9060\u7aef\u767b\u5165<\/p>\n<p>terminal \u7d42\u7aef\u6a5f<\/p>\n<p>Thin-Film Transistor (TFT) \u8584\u819c\u6676\u9ad4\u7ba1<\/p>\n<p>Third Normal Form (3NF) \u7b2c\u4e09\u7bc4\u5f0f<\/p>\n<p>token \u6b0a\u6a19\uff1b\u4ee4\u724c<\/p>\n<p>token ring \u6b0a\u6a19\u74b0\uff1b\u4ee4\u724c\u74b0<\/p>\n<p>track \u78c1\u9053<\/p>\n<p>trailer \u8868\u5c3e<\/p>\n<p>transcription error \u8f49\u9304\u932f\u8aa4<\/p>\n<p>Transmission Control Protocol (TCP) \u50b3\u8f38\u63a7\u5236\u5354\u5b9a<\/p>\n<p>transport layer \u50b3\u8f38\u5c64<\/p>\n<p>traversal \u904d\u6b77<\/p>\n<p>tree structure \u6a39\u72c0\u7d50\u69cb<\/p>\n<p>trial-and-error approach \u8a66\u6e4a\u6cd5<\/p>\n<p>Trojan program\u6728\u99ac\u7a0b\u5f0f<\/p>\n<p>truncation error \u622a\u5c3e\u8aa4\u5dee<\/p>\n<p>truth table \u771f\u5047\u503c\u8868\uff1b\u771f\u503c\u8868<\/p>\n<p>tweening \u6f38\u8b8a\uff1b\u88dc\u9593<\/p>\n<p>twisted pair\u96d9\u626d\u7dda<\/p>\n<p>two-dimensional array \u96d9\u9663\u5217\uff1b\u4e8c\u7dad\u9663\u5217<\/p>\n<p>two&#8217;s complement \u4e8c\u88dc\u78bc<\/p>\n<p>U<\/p>\n<p>underflow error \u4e0b\u6ea2\u932f\u8aa4<\/p>\n<p>Unicode \u7d71\u4e00\u78bc<\/p>\n<p>Uniform Resource Locator (URL) \u5283\u4e00\u8cc7\u6e90\u5b9a\u4f4d<\/p>\n<p>Uninterruptible Power Supply (UPS) \u4e0d\u9593\u65b7\u96fb\u6e90\u4f9b\u61c9\u5668<\/p>\n<p>Universal Product Code (UPC) \u901a\u7528\u7522\u54c1\u78bc<\/p>\n<p>Universal Serial Bus (USB) \u901a\u7528\u4e32\u5217\u532f\u6d41\u6392\uff1b\u901a\u7528\u4e32\u884c\u7e3d\u7dda<\/p>\n<p>Unshielded Twisted Pair (UTP) \u7121\u5c4f\u853d\u96d9\u626d\u7dda<\/p>\n<p>User Datagram Protocol (UDP) \u7528\u6236\u6578\u64da\u5305\u5354\u5b9a<\/p>\n<p>utility software \u5be6\u7528\u8edf\u4ef6<\/p>\n<p>V<\/p>\n<p>validation \u6709\u6548\u6027\u6aa2\u9a57<\/p>\n<p>variable \u8b8a\u91cf<\/p>\n<p>verification\u6838\u5be6\uff1b\u9a57\u8b49\uff1b\u6821\u9a57<\/p>\n<p>Very Large Scale Integration (VLSI) \u8d85\u5927\u898f\u6a21\u96c6\u6210\u96fb\u8def<\/p>\n<p>Video Compact Disc (VCD [disc]) \u8996\u50cf\u5149\u789f<\/p>\n<p>Video Graphics Array (VGA) \u8996\u50cf\u5716\u5f62\u9663\u5217<\/p>\n<p>Video On Demand (VOD) \u81ea\u9078\u8996\u8a0a\u670d\u52d9<\/p>\n<p>Virtual Private Network (VPN) \u865b\u64ec\u79c1\u6709\u7db2\u7d61\uff1b\u865b\u64ec\u5c08\u7528\u7db2\u7d61<\/p>\n<p>Virtual Reality (VR) \u865b\u64ec\u771f\u5be6\uff1b\u865b\u64ec\u73fe\u5be6<\/p>\n<p>Virtual Reality Modeling Language (VRML) \u865b\u64ec\u771f\u5be6\u88fd\u6a21\u8a9e\u8a00\uff1b\u865b\u64ec\u73fe\u5be6\u5efa\u6a21\u8a9e\u8a00<\/p>\n<p>Visual Display Unit (VDU) \u986f\u793a\u5668<\/p>\n<p>volatility \u6613\u5931\u6027<\/p>\n<p>W<\/p>\n<p>waterfall model \u7011\u5e03\u6a21\u5f0f\uff1b\u7011\u5e03\u6a21\u578b<\/p>\n<p>what-if analysis \u5047\u8a2d\u5206\u6790<\/p>\n<p>Wide Area Network (WAN) \u5bec\u5ee3\u5340\u57df\u7db2\u7d61\uff1b\u5ee3\u57df\u7db2\u7d61<\/p>\n<p>Wired Equivalent Privacy (WEP) \u6709\u7dda\u7b49\u6548\u52a0\u5bc6<\/p>\n<p>Wireless Application Protocol (WAP) \u7121\u7dda\u61c9\u7528\u7cfb\u7d71\u5354\u5b9a<\/p>\n<p>Wireless Markup Language (WML) \u7121\u7dda\u6a19\u793a\u8a9e\u8a00<\/p>\n<p>World Wide Web (WWW) \u842c\u7dad\u7db2<\/p>\n<p>World Wide Web Consortium(W3C)\u842c\u7dad\u7db2\u806f\u76df<\/p>\n<p>worm\u8815\u87f2<\/p>\n<p>Write-Once Read-Many (WORM) \u55ae\u5beb\u591a\u8b80<\/p>\n<p>\u4e00\u756b<\/p>\n<p>\u4e00\u88dc\u78bc\u00a0one&#8217;s complement<\/p>\n<p>\u4e00\u7dad\u9663\u5217\u00a0one-dimensional array<\/p>\n<p>\u4e59\u592a\u7db2\u00a0Ethernet<\/p>\n<p>\u4e8c\u756b<\/p>\n<p>\u4e8c\u53c9\u6a39\u00a0binary tree<\/p>\n<p>\u4e8c\u5143\u95dc\u4fc2\u00a0binary relationship<\/p>\n<p>\u4e8c\u5206\u6aa2\u7d22\u00a0binary search<\/p>\n<p>\u4e8c\u9032\u5236\u4f4d\u00a0binary digit (bit)<\/p>\n<p>\u4e8c\u9032\u5236\u7de8\u78bc\u5341\u9032\u5236\u00a0Binary Coded Decimal (BCD)<\/p>\n<p>\u4e8c\u9032\u5236\u6a94\u00a0binary file<\/p>\n<p>\u4e8c\u88dc\u78bc\u00a0two&#8217;s complement<\/p>\n<p>\u4e8c\u7dad\u9663\u5217two-dimensional array<\/p>\n<p>\u4eba\u5de5\u667a\u80fdArtificial Intelligence (AI)<\/p>\n<p>\u4eba\u6a5f\u754c\u9762Human Computer Interface (HCI)<\/p>\n<p>\u4eba\u9ad4\u5de5\u7a0b\u5b78\u00a0ergonomics<\/p>\n<p>\u4eba\u9ad4\u5de5\u5b78\u00a0ergonomics<\/p>\n<p>\u5165\u9580\u7db2\u7ad9 portal [site]<\/p>\n<p>\u5341\u5104\u5b57\u7bc0\u00a0GigaByte (GB)<\/p>\n<p>\u5341\u5104\u4f4d\u5143\u00a0Gigabit (Gb)<\/p>\n<p>\u5341\u5104\u8d6b\u00a0Gigahertz (GHz )<\/p>\n<p>\u4e09\u756b<\/p>\n<p>\u4e09\u4ee3\u5099\u4efd\u5132\u5b58\u6cd5\u00a0grandfather-father-son technique<\/p>\n<p>\u4e0b\u6ea2\u932f\u8aa4\u00a0underflow error<\/p>\n<p>\u4e0a\u6ea2\u932f\u8aa4\u00a0overflow error<\/p>\n<p>\u5343\u5146\u5b57\u7bc0\u00a0GigaByte (GB)<\/p>\n<p>\u5343\u5146\u4f4d\u5143\u00a0Gigabit (Gb)<\/p>\n<p>\u5343\u5146\u8d6b\u00a0Gigahertz (GHz )<\/p>\n<p>\u5343\u5b57\u7bc0\u00a0KiloByte (KB)<\/p>\n<p>\u5343\u4f4d\u5143\u00a0Kilobit (Kb)<\/p>\n<p>\u5343\u8d6b\u00a0kiloHertz (kHz)<\/p>\n<p>\u5927\u4e94\u78bc\u00a0BIG-5 code<\/p>\n<p>\u5927\u578b\u96fb\u8166\u00a0mainframe computer<\/p>\n<p>\u5927\u898f\u6a21\u96c6\u6210\u6280\u8853\u00a0Large Scale Integration (LSI)<\/p>\n<p>\u5b50\u76ee\u9304\u00a0subdirectory<\/p>\n<p>\u5b50\u7a0b\u5f0f\u00a0subprogram ; subroutine<\/p>\n<p>\u5b50\u7a0b\u5f0f\u5b58\u6839\u00a0stub<\/p>\n<p>\u5b50\u7a0b\u5e8f\u00a0subprogram ; subroutine<\/p>\n<p>\u5b50\u7a0b\u5e8f\u5b58\u6839\u00a0stub<\/p>\n<p>\u5b50\u7db2\u7d61\u00a0subnet<\/p>\n<p>\u5c0f\u578b\u8a08\u7b97\u6a5f\u00a0minicomputer<\/p>\n<p>\u5c0f\u578b\u96fb\u8166\u00a0minicomputer<\/p>\n<p>\u5c0f\u578b\u96fb\u8166\u7cfb\u7d71\u754c\u9762\u00a0Small Computer Systems Interface (SCSI)<\/p>\n<p>\u5de5\u696d\u6a19\u6e96\u529f\u80fd\u7d50\u69cb\u00a0Industry Standard Architecture (ISA)<\/p>\n<p>\u5de5\u696d\u6a19\u6e96\u7d50\u69cb\u00a0Industry Standard Architecture (ISA)<\/p>\n<p>\u56db\u756b<\/p>\n<p>\u4e0d\u9593\u65b7\u96fb\u6e90\u4f9b\u61c9\u5668\u00a0Uninterruptible Power Supply (UPS)<\/p>\n<p>\u4e0d\u5c0d\u7a31\u6578\u78bc\u7528\u6236\u7dda\u00a0Asymmetric Digital Subscriber Line (ADSL)<\/p>\n<p>\u4e2d\u6587\u4fe1\u606f\u4ea4\u63db\u78bc\u00a0Chinese Character Code for Information\u00a0Interchange (CCCII [code])<\/p>\n<p>\u4e2d\u6b62\u00a0hang<\/p>\n<p>\u4e2d\u592e\u8655\u7406\u5668\u00a0Central Processing Unit (CPU)<\/p>\n<p>\u4e2d\u5e8f\u904d\u6b77\u00a0inorder transversal<\/p>\n<p>\u4e2d\u65b7\u8655\u7406\u7a0b\u5f0f\u00a0interrupt handler<\/p>\n<p>\u4e2d\u65b7\u8655\u7406\u7a0b\u5e8f\u00a0interrupt handler<\/p>\n<p>\u4e2d\u65b7\u8acb\u6c42\u00a0Interrupt Request (IRQ)<\/p>\n<p>\u4e2d\u7e7c\u7ad9\u00a0repeater<\/p>\n<p>\u4e2d\u7e7c\u5668\u00a0repeater<\/p>\n<p>\u4e92\u7528\u6027\u00a0interoperability<\/p>\n<p>\u4e92\u52d5\u5f0f\u5149\u789f\u00a0Compact Disc Interactive (CD-I [disc])<\/p>\n<p>\u4e92\u88dc\u91d1\u5c6c\u6c27\u5316\u7269\u534a\u5c0e\u9ad4\u00a0Complementary Metal-Oxide Semiconductor(CMOS)<\/p>\n<p>\u4e92\u806f\u7db2\u00a0Internet<\/p>\n<p>\u4e92\u806f\u7db2\u5354\u5b9a\u00a0Internet Protocol (IP)<\/p>\n<p>\u4e92\u806f\u7db2\u670d\u52d9\u4f9b\u61c9\u5546\u00a0Internet Service Provider (ISP)<\/p>\n<p>\u4e92\u806f\u7db2\u8cc7\u8a0a\u4e2d\u5fc3\u00a0internet Network Information Center (interNIC)<\/p>\n<p>\u4e92\u806f\u7db2\u7d61\u5354\u5b9a\u5b89\u5168\u00a0IPsec<\/p>\n<p>\u5143\u6578\u64da\u00a0metadata<\/p>\n<p>\u5167\u806f\u7db2\u00a0intranet<\/p>\n<p>\u516c\u5171\u670d\u52d9\u96fb\u5b50\u5316\u00a0Electronic Service Delivery (ESD)<\/p>\n<p>\u516c\u5171\u975e\u5c08\u5229\u96fb\u8a0a\u670d\u52d9\u00a0Public Non-exclusive Electronic Transmission\u00a0Services (PNETS)<\/p>\n<p>\u516c\u958b\u5bc6\u78bc\u5319\u00a0public key<\/p>\n<p>\u516c\u958b\u5bc6\u78bc\u5319\u57fa\u790e\u5efa\u8a2d\u00a0Public Key Infrastructure (PKI)<\/p>\n<p>\u516c\u9470\u00a0public key<\/p>\n<p>\u516c\u9470\u57fa\u790e\u5efa\u8a2d\u00a0Public Key Infrastructure (PKI)<\/p>\n<p>\u5197\u9918\u78c1\u789f\u9663\u00a0Redundant Array of Independent Disks (RAID)<\/p>\n<p>\u5197\u9918\u78c1\u789f\u7d44\u00a0Redundant Array of Independent Disks (RAID)<\/p>\n<p>\u5206\u5e03\u5f0f\u7cfb\u7d71\u00a0distributed system<\/p>\n<p>\u5206\u7d1a\u6a21\u578b\u00a0hierarchical model<\/p>\n<p>\u5206\u5340\u00a0partition<\/p>\n<p>\u5206\u5272\u00a0partition<\/p>\n<p>\u5206\u5c64\u6a21\u578b\u00a0hierarchical model<\/p>\n<p>\u53cd\u5411\u6307\u793a\u5b57\u00a0back pointer<\/p>\n<p>\u53cd\u5411\u6307\u793a\u6a19\u00a0back pointer<\/p>\n<p>\u5df4\u79d1\u65af\u8afe\u723e\u7bc4\u5f0f\u00a0Backus-Naur Form (BNF)<\/p>\n<p>\u5f15\u5740\u8abf\u7528\u00a0call by reference<\/p>\n<p>\u5f15\u503c\u8abf\u7528\u00a0call by value<\/p>\n<p>\u5f15\u5c0e\u5f0f\u8f49\u63db\u00a0pilot conversion<\/p>\n<p>\u5f15\u5c0e\u7a0b\u5f0f\u00a0bootstrap<\/p>\n<p>\u5f15\u5c0e\u7a0b\u5e8f\u00a0bootstrap<\/p>\n<p>\u624b\u63d0\u96fb\u8166\u7db2\u5361\u00a0PCMCIA card (PC card)<\/p>\n<p>\u624b\u7a3f\u7a0b\u5f0f\u8a9e\u8a00\u00a0scripting language<\/p>\n<p>\u65b9\u584a\u5716\u00a0block diagram<\/p>\n<p>\u6728\u99ac\u7a0b\u5f0f\u00a0Trojan program<\/p>\n<p>\u706b\u7dda\u00a0firewire<\/p>\n<p>\u4e94\u756b<\/p>\n<p>\u4e3b\u8a18\u61b6\u9ad4\u00a0main memory<\/p>\n<p>\u4e3b\u5f9e\u00a0master-slave<\/p>\n<p>\u4e3b\u5f9e\u5f0f\u00a0master-slave<\/p>\n<p>\u4e3b\u5e79\u00a0backbone<\/p>\n<p>\u4e3b\u7db2\u9801\u00a0homepage<\/p>\n<p>\u4e3b\u6a5f\u96fb\u8166\u00a0mainframe computer<\/p>\n<p>\u4e3b\u95dc\u9375\u78bc\u00a0primary key<\/p>\n<p>\u4ee5\u592a\u7db2\u00a0Ethernet<\/p>\n<p>\u4ee5\u592a\u7db2\u5167\u9ede\u5c0d\u9ede\u50b3\u8f38\u5354\u5b9a\u00a0Point-to-Point Protocol over Ethernet (PPPoE)<\/p>\n<p>\u4ee3\u7406\u4f3a\u670d\u5668\u00a0proxy server<\/p>\n<p>\u4ee3\u78bc\u00a0code<\/p>\n<p>\u4ee4\u724c\u00a0token<\/p>\n<p>\u4ee4\u724c\u74b0\u00a0token ring<\/p>\n<p>\u52a0\u6cd5\u5668\u00a0adder<\/p>\n<p>\u52a0\u5bc6\u00a0encryption<\/p>\n<p>\u52a0\u5f37\u5716\u5f62\u9069\u914d\u5668\u00a0Enhanced Graphics Adapter (EGA)<\/p>\n<p>\u529f\u80fd\u9078\u64c7\u8868\u00a0menu<\/p>\n<p>\u53ef\u522a\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4\u00a0Erasable Programmable Read Only Memory(EPROM)<\/p>\n<p>\u53ef\u91cd\u5beb\u5149\u789f\u00a0Compact Disc Rewritable (CD-RW [disc])<\/p>\n<p>\u53ef\u8a18\u9304\u5149\u789f\u00a0Compact Disc Recordable (CD-R [disc])<\/p>\n<p>\u53ef\u96fb\u522a\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4\u00a0Electrically Erasable Programmable Read Only\u00a0Memory (EEPROM)<\/p>\n<p>\u53ef\u7de8\u7a0b\u552f\u8b80\u8a18\u61b6\u9ad4\u00a0Programmable Read Only Memory (PROM)<\/p>\n<p>\u53ef\u64f4\u5145\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00\u00a0Extensible Hypertext Markup Language (XHTML)<\/p>\n<p>\u53ef\u64f4\u5145\u6a19\u793a\u8a9e\u8a00\u00a0Extensible Markup Language (XML)<\/p>\n<p>\u53ef\u64f4\u5c55\u8d85\u6587\u672c\u6a19\u8a18\u8a9e\u8a00\u00a0Extensible Hypertext Markup Language (XHTML)<\/p>\n<p>\u53ef\u651c\u5f0f\u6587\u4ef6\u683c\u5f0f\u00a0Portable Document Format (PDF)<\/p>\n<p>\u5916\u639b\u7a0b\u5f0f\u00a0plug-in<\/p>\n<p>\u5916\u9023\u63a5\u00a0outer join<\/p>\n<p>\u5916\u806f\u7d50\u00a0outer join<\/p>\n<p>\u5916\u9375\u78bc\u00a0foreign key<\/p>\n<p>\u5e03\u723e\u00a0Boolean<\/p>\n<p>\u5e73\u884c\u8f49\u63db\u00a0parallel conversion<\/p>\n<p>\u672c\u9801\u00a0homepage<\/p>\n<p>\u6b63\u53cd\u5668\u00a0flip-flop<\/p>\n<p>\u7518\u7279\u5716\u00a0Gantt chart<\/p>\n<p>\u7528\u6236\u6578\u64da\u5305\u5354\u5b9a\u00a0User Datagram Protocol (UDP)<\/p>\n<p>\u76ae\u79d2\u00a0picosecond (ps)<\/p>\n<p>\u76ee\u9304\u00a0directory<\/p>\n<p>\u516d\u756b<\/p>\n<p>\u4ea4\u4e92\u5f0f\u5149\u789f\u00a0Compact Disc Interactive (CD-I [disc])<\/p>\n<p>\u4ea4\u63db\u5668\u00a0switch<\/p>\n<p>\u4eff\u5192\u8a50\u9a19\u00a0phishing<\/p>\n<p>\u5149\u7b26\u8b58\u5225\u00a0Optical Character Recognition (OCR)<\/p>\n<p>\u5149\u789f\u00a0Compact Disc (CD [disc])<\/p>\n<p>\u5149\u6a19\u00a0cursor<\/p>\n<p>\u5149\u6a19\u8b58\u5225\u00a0Optical Mark Recognition (OMR)<\/p>\n<p>\u5149\u5b78\u5b57\u5143\u8b58\u5225\u00a0Optical Character Recognition (OCR)<\/p>\n<p>\u5149\u5b78\u5b57\u7b26\u8b58\u5225\u00a0Optical Character Recognition (OCR)<\/p>\n<p>\u5149\u5b78\u6a19\u8a18\u8b58\u5225\u00a0Optical Mark Recognition (OMR)<\/p>\n<p>\u5149\u7e96\u5206\u5e03\u5f0f\u6578\u64da\u754c\u9762\u00a0Fibre Distributed Data Interface (FDDI)<\/p>\n<p>\u5146\u5b57\u7bc0\u00a0MegaByte (MB)<\/p>\n<p>\u5146\u4f4d\u5143\u00a0Megabit (Mb)<\/p>\n<p>\u5146\u8d6b\u00a0MegaHertz (MHz)<\/p>\n<p>\u5148\u9032\u5148\u51fa\u6cd5\u00a0First-In First-Out (FIFO)<\/p>\n<p>\u5168\u7403\u5b9a\u4f4d\u7cfb\u7d71\u00a0Global Positioning System (GPS)<\/p>\n<p>\u5168\u7a0b\u8b8a\u91cf\u00a0global variable<\/p>\n<p>\u5171\u7528\u7db2\u9593\u9023\u63a5\u754c\u9762\u00a0Common Gateway Interface (CGI)<\/p>\n<p>\u5171\u4eab\u8edf\u4ef6\u00a0shareware<\/p>\n<p>\u540c\u6b65\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4\u00a0Synchronous Dynamic Random Access Memory\u00a0(SDRAM)<\/p>\n<p>\u540c\u6b65\u6578\u64da\u9023\u7d50\u63a7\u5236\u00a0Synchronous Data Link Control (SDLC)<\/p>\n<p>\u540c\u6b65\u6578\u64da\u93c8\u8def\u63a7\u5236Synchronous Data Link Control (SDLC)<\/p>\n<p>\u540c\u8ef8\u96fb\u7e9ccoaxial cable<\/p>\n<p>\u5408\u4f75\u5217\u5370mail merge<\/p>\n<div>\u5408\u4f75\u6392\u5e8f\u6cd5merge sort<\/div>\n<p>\u5730\u5740\u00a0address<\/p>\n<p>\u5730\u7406\u4fe1\u606f\u7cfb\u7d71\u00a0Geographic Information System (GIS)<\/p>\n<div>\u591a\u5de5\u4f5c\u696d\u00a0multitasking<\/div>\n<p>\u591a\u5de5\u8655\u7406\u00a0multitasking<\/p>\n<p>\u591a\u6587\u672c\u683c\u5f0f\u00a0Rich Text Format (RTF)<\/p>\n<div>\u591a\u529f\u80fd\u4e92\u806f\u7db2\u90f5\u905e\u4f38\u5ef6\u00a0Multipurpose Internet Mail Extension (MIME)<\/div>\n<p>\u591a\u5740\u5ee3\u64ad\u00a0multicast<\/p>\n<p>\u591a\u5f62\u6027\u00a0polymorphism<\/p>\n<p>\u591a\u4fe1\u9053\u5ee3\u64ad\u00a0multicast<\/p>\n<p>\u591a\u8def\u50b3\u8f38\u00a0multiplexing<\/p>\n<p>\u591a\u8def\u8f49\u63a5\u00a0multiplexing<\/p>\n<p>\u591a\u9053\u8655\u7406\u00a0multiprocessing<\/p>\n<p>\u591a\u7dda\u904b\u4f5c\u00a0multithreading<\/p>\n<p>\u5b57\u5143\u00a0character<\/p>\n<p>\u5b57\u5143\u9593\u8ddd\u00a0pitch<\/p>\n<p>\u5b57\u4e32\u00a0string<\/p>\n<p>\u5b57\u6bb5\u00a0field<\/p>\n<p>\u5b57\u9996\u00a0character head<\/p>\n<div>\u5b57\u7b26\u00a0character<\/div>\n<p>\u5b57\u7b26\u4e32\u00a0string<\/p>\n<p>\u5b57\u7bc0\u00a0byte<\/p>\n<p>\u5b57\u5bec\u00a0pitch<\/p>\n<p>\u6210\u6279\u8655\u7406\u00a0batch processing<\/p>\n<p>\u6709\u6548\u6027\u6aa2\u9a57\u00a0validation<\/p>\n<p>\u6709\u7dda\u7b49\u6548\u52a0\u5bc6\u00a0Wired Equivalent Privacy (WEP)<\/p>\n<div>\u6b7b\u9396\u00a0deadlock<\/div>\n<p>\u767e\u842c\u5b57\u7bc0\u00a0MegaByte (MB)<\/p>\n<div>\u767e\u842c\u4f4d\u5143\u00a0Megabit (Mb)<\/div>\n<div>\u767e\u842c\u8d6b\u00a0MegaHertz (MHz)<\/div>\n<div>\u81ea\u52d5\u6ac3\u54e1\u6a5fAutomatic Teller Machine (ATM)<\/div>\n<div>\u81ea\u7136\u9023\u63a5natural join<\/div>\n<div>\u81ea\u7136\u806f\u7d50natural join<\/div>\n<div>\u81ea\u9078\u8996\u8a0a\u670d\u52d9Video On Demand (VOD)<\/div>\n<p>\u8272\u5f69\u5716\u5f62\u9069\u914d\u5668Colour Graphics Adapter (CGA)<\/p>\n<p>\u4e03\u756b<\/p>\n<p>\u4e32\u884c\u57e0\u00a0serial port<\/p>\n<p>\u4e32\u884c\u9023\u63a5\u57e0\u00a0serial port<\/p>\n<p>\u4e32\u6d41\u50b3\u8f38\u00a0streaming<\/p>\n<p>\u4f4d\u5143\u00a0binary digit (bit)<\/p>\n<p>\u4f4d\u5740\u00a0address<\/p>\n<p>\u4f4d\u5740\u8abf\u7528\u00a0call by address<\/p>\n<p>\u4f4d\u5716\u00a0bitmap<\/p>\n<p>\u4f3a\u670d\u5668\u7aef\u00a0server-side<\/p>\n<p>\u4f4e\u7d1a\u8a9e\u8a00\u00a0low level language<\/p>\n<p>\u4f4e\u968e\u8a9e\u8a00\u00a0low level language<\/p>\n<p>\u514d\u8cbb\u8edf\u4ef6\u00a0freeware<\/p>\n<p>\u52a9\u8a18\u78bc\u00a0mnemonic<\/p>\n<p>\u52a9\u8a18\u64cd\u4f5c\u78bc\u00a0mnemonic<\/p>\n<p>\u5373\u63d2\u5373\u7528\u00a0Plug and Play (PnP)<\/p>\n<p>\u5373\u88dd\u5373\u7528\u00a0Plug and Play (PnP)<\/p>\n<p>\u5c40\u90e8\u5340\u57df\u7db2\u7d61\u00a0Local Area Network (LAN)<\/p>\n<p>\u5c40\u90e8\u8b8a\u91cf\u00a0local variable<\/p>\n<p>\u5f62\u5f0f\u53c3\u6578\u00a0formal parameter<\/p>\n<p>\u5f62\u5f0f\u8b8a\u5143\u00a0formal argument<\/p>\n<p>\u5feb\u53d6\u8a18\u61b6\u9ad4\u00a0cache<\/p>\n<p>\u5feb\u9583\u8a18\u61b6\u9ad4\u00a0flash memory<\/p>\n<p>\u5feb\u901f\u6392\u5e8f\u6cd5\u00a0quick sort<\/p>\n<p>\u6bcf\u79d2\u5146\u4f4d\u5143\u00a0Megabits per second (Mbps)<\/p>\n<p>\u6bcf\u79d2\u767e\u842c\u4f4d\u5143\u00a0Megabits per second (Mbps)<\/p>\n<p>\u6bcf\u79d2\u767e\u842c\u6307\u4ee4\u00a0Million Instructions Per Second (MIPS)<\/p>\n<p>\u6bcf\u79d2\u4f4d\u5143\u00a0bits per second (bps)<\/p>\n<p>\u6c7a\u7b56\u652f\u63f4\u7cfb\u7d71\u00a0Decision Support System (DSS)<\/p>\n<p>\u79c1\u4eba\u5bc6\u78bc\u5319\u00a0private key<\/p>\n<p>\u79c1\u9470\u00a0private key<\/p>\n<p>\u7cfb\u7d71\u958b\u767c\u751f\u547d\u5468\u671f\u00a0System Development Life Cycle (SDLC)<\/p>\n<p>\u9632\u706b\u7246firewall<\/p>\n<p>\u516b\u756b<\/p>\n<p>\u4e26\u884c\u5f0f\u8f49\u63db\u00a0parallel conversion<\/p>\n<p>\u4e26\u884c\u57e0\u00a0parallel port<\/p>\n<p>\u4e26\u884c\u9023\u63a5\u57e0\u00a0parallel port<\/p>\n<p>\u5354\u5b9a\u5c64\u00a0protocol layer<\/p>\n<p>\u5354\u8655\u7406\u5668\u00a0coprocessor<\/p>\n<p>\u5468\u908a\u7d44\u4ef6\u806f\u7e6b\u00a0Peripheral Component Interconnect (PCI)<\/p>\n<p>\u5468\u908a\u90e8\u4ef6\u4e92\u9023\u00a0Peripheral Component Interconnect (PCI)<\/p>\n<p>\u547d\u4ee4\u884c\u754c\u9762\u00a0command line interface<\/p>\n<p>\u547d\u540d\u5e38\u6578\u00a0named constant<\/p>\n<p>\u56fa\u4ef6\u00a0firmware<\/p>\n<p>\u5947\u5076\u6027\u00a0parity<\/p>\n<p>\u5947\u5076\u6821\u9a57\u00a0parity check<\/p>\n<p>\u5947\u5076\u6aa2\u6e2c\u00a0parity check<\/p>\n<p>\u5947\u5076\u6aa2\u9a57\u4f4d\u00a0parity bit<\/p>\n<p>\u5b9a\u754c\u7b26\u865f\u00a0delimiter<\/p>\n<p>\u5ef6\u4f38\u5de5\u696d\u6a19\u6e96\u529f\u80fd\u7d50\u69cb\u00a0Extended Industry Standard Architecture (EISA)<\/p>\n<p>\u5ef6\u4f38\u5de5\u696d\u6a19\u6e96\u67b6\u69cb\u00a0Extended Industry Standard Architecture (EISA)<\/p>\n<p>\u62d2\u7d55\u670d\u52d9 Denial of Service (DoS)<\/p>\n<p>\u6613\u5931\u6027\u00a0volatility<\/p>\n<p>\u6ce2\u7279baud<\/p>\n<p>\u6ce2\u7fa9\u8868\u793a\u6cd5\u00a0Polish notation<\/p>\n<p>\u7269\u4ef6\u9023\u63a5\u8207\u5d4c\u5165\u00a0Object Linking and Embedding (OLE)<\/p>\n<p>\u7269\u4ef6\u5c0e\u5411\u7de8\u7a0b\u00a0Object-Oriented Programming (OOP)<\/p>\n<p>\u72c0\u614b\u5bc4\u5b58\u5668\u00a0Status Register (SR)<\/p>\n<p>\u76f4\u63a5\u5207\u5165\u5f0f\u8f49\u63db\u00a0direct cutover conversion<\/p>\n<p>\u76f4\u63a5\u8a18\u61b6\u9ad4\u5b58\u53d6\u00a0Direct Memory Access (DMA)<\/p>\n<p>\u76f4\u63a5\u63a5\u5165\u8f49\u63db\u00a0direct cutover conversion<\/p>\n<p>\u7a7a\u503c\u00a0null<\/p>\n<p>\u521d\u59cb\u5316\u00a0initialisation<\/p>\n<p>\u521d\u59cb\u7a0b\u5f0f\u8f09\u5165\u00a0initial program load<\/p>\n<p>\u521d\u59cb\u7a0b\u5e8f\u8f09\u5165\u00a0initial program load<\/p>\n<p>\u521d\u5b78\u8005\u901a\u7528\u7b26\u865f\u6307\u4ee4\u8a9e\u8a00\u00a0Beginner&#8217;s All-Purpose Symbolic Instruction Code\u00a0(BASIC) Language<\/p>\n<p>\u8868\u793a\u5c64\u00a0presentation layer<\/p>\n<p>\u8868\u5c3e\u00a0trailer<\/p>\n<p>\u8868\u982d\u00a0header<\/p>\n<p>\u9644\u96a8\u8edf\u4ef6\u00a0bundled software<\/p>\n<p>\u975e\u5c0d\u7a31\u6578\u78bc\u7528\u6236\u7dda\u00a0Asymmetric Digital Subscriber Line (ADSL)<\/p>\n<p>\u4e5d\u756b<\/p>\n<p>\u4fe1\u606f\u00a0information<\/p>\n<p>\u4fe1\u865f\u4ea4\u63db\u00a0handshaking<\/p>\n<p>\u4fbf\u651c\u5f0f\u7db2\u7d61\u5716\u5f62\u683c\u5f0f\u00a0Portable Network Graphics (PNG)<\/p>\n<p>\u4fdd\u7559\u5b57\u00a0reserved word<\/p>\n<p>\u4fdd\u5bc6\u63d2\u53e3\u5c64\u00a0Secure Sockets Layer (SSL)<\/p>\n<p>\u4fdd\u5bc6\u96fb\u5b50\u4ea4\u6613\u00a0Secure Electronic Transaction (SET)<\/p>\n<p>\u5192\u6ce1\u6392\u5e8f\u6cd5\u00a0bubble sort<\/p>\n<p>\u57ce\u5e02\u5340\u57df\u7db2\u7d61\u00a0Metropolitan Area Network (MAN)<\/p>\n<p>\u57ce\u57df\u7db2\u7d61\u00a0Metropolitan Area Network (MAN)<\/p>\n<p>\u5ba3\u544a\u6027\u8a9e\u8a00\u00a0declarative language<\/p>\n<p>\u5ba2\u6236\u7aef\u00a0client-side<\/p>\n<p>\u5c4f\u853d\u00a0mask<\/p>\n<p>\u5c4f\u853d\u96d9\u626d\u7dda\u00a0Shielded Twisted Pair (STP)<\/p>\n<p>\u5f8c\u9032\u5148\u51fa\u6cd5\u00a0Last-In First-Out (LIFO)<\/p>\n<p>\u6309\u5740\u8abf\u7528\u00a0call by reference<\/p>\n<p>\u6309\u503c\u8abf\u7528\u00a0call by value<\/p>\n<p>\u6307\u4ee4\u5bc4\u5b58\u5668\u00a0Instruction Register (IR)<\/p>\n<p>\u6307\u793a\u5b57\u00a0pointer<\/p>\n<p>\u6307\u793a\u6a19\u00a0pointer<\/p>\n<p>\u6545\u969c\u5bb9\u5fcd\u00a0fault tolerant<\/p>\n<p>\u6620\u7167\u00a0mirror<\/p>\n<p>\u6bb5\u00a0segment<\/p>\n<p>\u6d41\u6c34\u7dda\u6280\u8853\u00a0pipelining<\/p>\n<p>\u6d41\u6c34\u7dda\u64cd\u4f5c\u00a0pipelining<\/p>\n<p>\u6d41\u5f0f\u50b3\u8f38\u00a0streaming<\/p>\n<p>\u6d41\u7a0b\u5716\u00a0flowchart<\/p>\n<p>\u76f8\u4e92\u64cd\u4f5c\u6027\u00a0interoperability<\/p>\n<p>\u7d05\u5916\u7dda\u6578\u64da\u57e0\u00a0Infrared Data Association port (IrDA)<\/p>\n<p>\u7d05\u5916\u7dda\u6578\u64da\u9023\u63a5\u57e0 Infrared Data Association port (IrDA)<\/p>\n<p>\u7d05\u7da0\u85cd\u986f\u793a\u5668\u00a0RGB monitor<\/p>\n<p>\u7f8e\u570b\u4fe1\u606f\u4ea4\u63db\u6a19\u6e96\u78bc\u00a0American Standard Code for Information\u00a0Interchange (ASCII [code])<\/p>\n<p>\u7f8e\u570b\u570b\u9632\u90e8\u9ad8\u7d1a\u7814\u7a76\u8a08\u5283\u5c40\u7db2\u7d61\u00a0Advanced Research Project Agency Network\u00a0(ARPANET)<\/p>\n<p>\u7f8e\u570b\u570b\u5bb6\u6a19\u6e96\u5b78\u6703\u00a0American National Standards Institute (ANSI)<\/p>\n<p>\u8a08\u7b97\u6a5f\u00a0computer<\/p>\n<p>\u8fed\u4ee3\u00a0iteration<\/p>\n<p>\u97f3\u8abf\u00a0pitch<\/p>\n<p>\u97f3\u983b\u8996\u983b\u4ea4\u66ff\u683c\u5f0f.\u00a0Audio Video Interleave (AVI)<\/p>\n<p>\u9801\u5c3e\u00a0footer<\/p>\n<p>\u9801\u9996 header<\/p>\n<p>\u9996\u6a19\u00a0header<\/p>\n<p>\u9999\u6e2f\u516c\u958b\u5bc6\u78bc\u5319\u57fa\u790e\u5efa\u8a2d\u00a0Hong Kong Public key Infrastructure(HONG\u00a0KONG PKI)<\/p>\n<p>\u9999\u6e2f\u589e\u88dc\u5b57\u5143\u96c6\u00a0Hong Kong Supplementary Character Set(HKSCS)<\/p>\n<p>\u9999\u6e2f\u589e\u88dc\u5b57\u7b26\u96c6\u00a0Hong Kong Supplementary Character Set(HKSCS)<\/p>\n<p>\u5341\u756b<\/p>\n<p>\u500b\u4eba\u5340\u57df\u7db2\u7d61\u00a0Personal Area Network (PAN)<\/p>\n<p>\u500b\u4eba\u6578\u78bc\u52a9\u7406\u00a0Personal Digital Assistant (PDA)<\/p>\n<p>\u500b\u4eba\u8b58\u5225\u865f\u78bc\u00a0Personal Identity Number (PIN)<\/p>\n<p>\u5019\u9078\u9375\u78bc\u00a0candidate key<\/p>\n<p>\u539f\u578b\u958b\u767c\u00a0prototyping<\/p>\n<p>\u539f\u578b\u88fd\u4f5c\u00a0prototyping<\/p>\n<p>\u5bb9\u932f\u00a0fault tolerant<\/p>\n<p>\u6247\u5340\u00a0sector<\/p>\n<p>\u6642\u5ef6\u00a0latency<\/p>\n<p>\u6821\u9a57\u00a0verification<\/p>\n<p>\u6838\u5fc3\u00a0kernel<\/p>\n<p>\u6838\u5be6\u00a0verification<\/p>\n<p>\u6838\u8b49\u6a5f\u95dc\u00a0Certificate Authority (CA)<\/p>\n<p>\u6846\u00a0frame<\/p>\n<p>\u6839\u76ee\u9304\u00a0root directory<\/p>\n<p>\u684c\u4e0a\u6392\u7248\u00a0Desktop Publishing (DTP)<\/p>\n<p>\u771f\u503c\u8868\u00a0truth table<\/p>\n<p>\u771f\u5047\u503c\u8868\u00a0truth table<\/p>\n<p>\u7834\u89e3\u00a0cracking<\/p>\n<p>\u7d22\u5f15\u9375\u78bc\u00a0index key<\/p>\n<p>\u7d1a\u806f\u5f0f\u9801\u9762\u00a0Cascading Style Sheet (CSS)<\/p>\n<p>\u7d0d\u79d2\u00a0nanosecond (ns)<\/p>\n<p>\u8870\u6e1b\u00a0attenuation<\/p>\n<p>\u8a18\u61b6\u9ad4\u4f4d\u5740\u5bc4\u5b58\u5668\u00a0Memory Address Register (MAR)<\/p>\n<p>\u8a18\u61b6\u9ad4\u6578\u64da\u5bc4\u5b58\u5668\u00a0Memory Data Register (MDR)<\/p>\n<p>\u8a18\u9304\u00a0record<\/p>\n<p>\u9663\u5217\u00a0array<\/p>\n<p>\u9664\u932f\u00a0debug<\/p>\n<p>\u9ad8\u7d1a\u8a9e\u8a00\u00a0high level language<\/p>\n<p>\u9ad8\u901f\u7de9\u885d\u5668\u00a0cache<\/p>\n<p>\u9ad8\u968e\u8a9e\u8a00\u00a0high level language<\/p>\n<p>\u5341\u4e00\u756b<\/p>\n<p>\u507d\u4ee3\u78bc\u00a0pseudocode<\/p>\n<p>\u5047\u812b\u6a5f\u8f38\u5165\u8f38\u51fa\u00a0spooling<\/p>\n<p>\u5047\u8a2d\u5206\u6790\u00a0what-if analysis<\/p>\n<p>\u52d5\u756b\u5c08\u5bb6\u7fa4\u7d44\u00a0Motion Picture Experts Group (MPEG)<\/p>\n<p>\u52d5\u614b\u4e3b\u6a5f\u914d\u7f6e\u5354\u5b9a\u00a0Dynamic Host Configuration Protocol (DHCP)<\/p>\n<p>\u52d5\u614b\u9023\u7d50\u5eab\u00a0Dynamic Link Library (DLL)<\/p>\n<p>\u52d5\u614b\u9023\u7d50\u5eab\u5b58\u00a0Dynamic Link Library (DLL)<\/p>\n<p>\u52d5\u614b\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00\u00a0Dynamic Hypertext Markup Language (DHTML)<\/p>\n<p>\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4\u00a0Dynamic Random Access Memory (DRAM)<\/p>\n<p>\u5340\u57df\u7db2\u7d61\u00a0Local Area Network (LAN)<\/p>\n<p>\u53c3\u7167\u5b8c\u6574\u6027\u00a0referential integrity<\/p>\n<p>\u53c3\u6578\u00a0parameter<\/p>\n<p>\u53c3\u6578\u50b3\u905e\u00a0parameter passing<\/p>\n<p>\u552f\u8b80\u5149\u789f\u00a0Compact Disc Read-Only Memory (CD-ROM[disc] )<\/p>\n<p>\u552f\u8b80\u8a18\u61b6\u9ad4\u00a0Read-Only Memory (ROM)<\/p>\n<p>\u570b\u5bb6\u6a19\u6e96\u78bc\u00a0Guo Biao (GB) code<\/p>\n<p>\u570b\u969b\u6a19\u6e96\u5316\u7d44\u7e54\u00a0International Organisation for Standardisation(ISO)<\/p>\n<p>\u570b\u6a19\u78bc Guo Biao (GB) code<\/p>\n<p>\u57df\u540d\u7cfb\u7d71\u00a0Domain Name System (DNS)<\/p>\n<p>\u57df\u5b8c\u6574\u6027\u00a0domain integrity<\/p>\n<p>\u5806\u758a\u00a0stack<\/p>\n<p>\u57fa\u672c\u8f38\u5165\u8f38\u51fa\u7cfb\u7d71\u00a0Basic Input \/ Output System (BIOS)<\/p>\n<p>\u57fa\u5e36\u00a0baseband<\/p>\n<p>\u57f7\u884c\u00a0run<\/p>\n<p>\u5bc4\u5b58\u5668\u00a0register<\/p>\n<p>\u5bc6\u78bc\u5b78\u00a0cryptography<\/p>\n<p>\u5c08\u7dda\u00a0leased line<\/p>\n<p>\u5e38\u91cf\u00a0constant<\/p>\n<p>\u5e38\u6578\u00a0constant<\/p>\n<p>\u5e36\u6709\u6aa2\u6e2c\u885d\u7a81\u7684\u8f09\u6ce2\u5075\u807d\u591a\u5740\u63a5\u9054\u00a0Carrier Sense Multiple Access with Collision\u00a0Detect (CSMA\/CD)<\/p>\n<p>\u5e36\u6709\u907f\u514d\u885d\u7a81\u7684\u8f09\u6ce2\u5075\u807d\u591a\u5740\u63a5\u9054\u00a0Carrier Sense Multiple Access with Collision\u00a0Avoidance (CSMA\/CA)<\/p>\n<p>\u63a7\u5236\u53f0\u00a0console<\/p>\n<p>\u63a2\u8a62\u00a0polling<\/p>\n<p>\u63a9\u78bc\u00a0mask<\/p>\n<p>\u6368\u5165\u8aa4\u5dee\u00a0rounding error<\/p>\n<p>\u555f\u52d5\u00a0boot<\/p>\n<p>\u555f\u52d5\u7a0b\u5f0f\u00a0bootstrap<\/p>\n<p>\u555f\u52d5\u7a0b\u5e8f\u00a0bootstrap<\/p>\n<p>\u689d\u78bc\u00a0bar code<\/p>\n<p>\u6beb\u79d2\u00a0millisecond (ms)<\/p>\n<p>\u6beb\u5fae\u79d2\u00a0nanosecond (ns)<\/p>\n<p>\u6df1\u5ea6\u512a\u5148\u641c\u7d22 depth-first search<\/p>\n<p>\u73fe\u884c\u6307\u4ee4\u5bc4\u5b58\u5668\u00a0Current Instruction Register (CIR)<\/p>\n<p>\u7570\u6b65\u50b3\u8f38\u5f62\u5f0f\u00a0asynchronous transfer mode<\/p>\n<p>\u7570\u6b65\u50b3\u8f38\u6a21\u5f0f\u00a0asynchronous transfer mode<\/p>\n<p>\u7570\u5e38\u8655\u7406\u00a0exception handling<\/p>\n<p>\u79fb\u9664\u932f\u8aa4\u00a0debug<\/p>\n<p>\u7b2c\u4e00\u7bc4\u5f0f\u00a0First Normal Form (1NF)<\/p>\n<p>\u7b2c\u4e8c\u7bc4\u5f0f\u00a0Second Normal Form (2NF)<\/p>\n<p>\u7b2c\u4e09\u7bc4\u5f0f\u00a0Third Normal Form (3NF)<\/p>\n<p>\u7d71\u4e00\u78bc\u00a0Unicode<\/p>\n<p>\u7d2f\u52a0\u5668\u00a0accumulator<\/p>\n<p>\u7d42\u7aef\u6a5f\u00a0terminal<\/p>\n<p>\u898f\u683c\u5316\u00a0normalisation<\/p>\n<p>\u898f\u7bc4\u5316\u00a0normalisation<\/p>\n<p>\u8edf\u4ef6\u00a0software<\/p>\n<p>\u8edf\u78c1\u789f\u00a0floppy disk ; diskette<\/p>\n<p>\u901a\u7528\u4e32\u5217\u532f\u6d41\u6392\u00a0Universal Serial Bus (USB)<\/p>\n<p>\u901a\u7528\u4e32\u884c\u7e3d\u7dda\u00a0Universal Serial Bus (USB)<\/p>\n<p>\u901a\u7528\u5546\u696d\u8a9e\u8a00\u00a0Common Business-Oriented Language (COBOL)<\/p>\n<p>\u901a\u7528\u63a5\u99c1\u754c\u9762\u00a0Common Gateway Interface (CGI)<\/p>\n<p>\u901a\u7528\u7522\u54c1\u78bc\u00a0Universal Product Code (UPC)<\/p>\n<p>\u901a\u8a0a\u57e0\u00a0communication port<\/p>\n<p>\u901a\u8a0a\u9023\u63a5\u57e0\u00a0communication port<\/p>\n<p>\u901a\u8a0a\u9598\u00a0gateway<\/p>\n<p>\u9023\u63a5\u8868\u00a0linked list<\/p>\n<p>\u9023\u63a5\u7a0b\u5f0f\u00a0linker<\/p>\n<p>\u9023\u63a5\u7a0b\u5e8f\u00a0linker<\/p>\n<p>\u9010\u6b65\u6c42\u7cbe\u6cd5\u00a0stepwise refinement<\/p>\n<p>\u90e8\u5206 segment<\/p>\n<p>\u90e8\u9996\u00a0radical<\/p>\n<p>\u9673\u8ff0\u6027\u8a9e\u8a00\u00a0declarative language<\/p>\n<p>\u5341\u4e8c\u756b<\/p>\n<p>\u55ae\u5411\u00a0simplex<\/p>\n<p>\u55ae\u9663\u5217\u00a0one-dimensional array<\/p>\n<p>\u55ae\u5beb\u591a\u8b80\u00a0Write-Once Read-Many (WORM)<\/p>\n<p>\u55ae\u9078\u6309\u9215\u00a0radio button<\/p>\n<p>\u5a92\u4ecb\u63a5\u9054\u63a7\u5236\u00a0Media Access Control (MAC)<\/p>\n<p>\u5c0b\u5740\u6a21\u5f0f\u00a0addressing mode<\/p>\n<p>\u5d4c\u5165\u5f0f\u7cfb\u7d71\u00a0embedded system<\/p>\n<p>\u5d4c\u5957\u51fd\u6578\u00a0nested function<\/p>\n<p>\u5d4c\u5957\u5faa\u74b0\u00a0nested loop<\/p>\n<p>\u5e40\u00a0frame<\/p>\n<p>\u5e40\u6aa2\u9a57\u5e8f\u5217\u00a0Frame Check Sequence (FCS)<\/p>\n<p>\u5fa9\u5beb\u5149\u789f\u00a0Compact Disc Rewritable (CD-RW [disc])<\/p>\n<p>\u5faa\u74b0\u00a0iteration ; loop<\/p>\n<p>\u5faa\u74b0\u5197\u9918\u6838\u5c0d Cyclic Redundancy Check (CRC)<\/p>\n<p>\u60e1\u6027\u7a0b\u5f0f\u00a0malware<\/p>\n<p>\u60e1\u610f\u8edf\u4ef6\u00a0malware<\/p>\n<p>\u63d2\u5165\u6392\u5e8f\u6cd5\u00a0insertion sort<\/p>\n<p>\u63d2\u4ef6\u00a0plug-in<\/p>\n<p>\u63d0\u53d6\uff0d\u8b6f\u78bc\uff0d\u57f7\u884c\u5468\u671f\u00a0fetch-decode-execute cycle<\/p>\n<p>\u63d0\u53d6\uff0d\u8b6f\u78bc\uff0d\u57f7\u884c\u5faa\u74b0\u00a0fetch-decode-execute cycle<\/p>\n<p>\u63db\u884c\u00a0Line Feed (LF)<\/p>\n<p>\u6676\u7247\u00a0chip<\/p>\n<p>\u6e38\u6a19\u00a0cursor<\/p>\n<p>\u7121\u7528\u8f38\u5165\u7121\u7528\u8f38\u51fa\u00a0Garbage-In Garbage-Out (GIGO)<\/p>\n<p>\u7121\u5c4f\u853d\u96d9\u626d\u7dda\u00a0Unshielded Twisted Pair (UTP)<\/p>\n<p>\u7121\u7dda\u6a19\u793a\u8a9e\u8a00\u00a0Wireless Markup Language (WML)<\/p>\n<p>\u7121\u7dda\u61c9\u7528\u7cfb\u7d71\u5354\u5b9a\u00a0Wireless Application Protocol (WAP)<\/p>\n<p>\u77ed\u8a0a\u670d\u52d9\u00a0Short Message Service (SMS)<\/p>\n<p>\u786c\u4ef6\u00a0hardware<\/p>\n<p>\u786c\u78c1\u789f\u00a0hard disk<\/p>\n<p>\u786c\u789f\u00a0hard disk<\/p>\n<p>\u7a0b\u5f0f\u00a0program<\/p>\n<p>\u7a0b\u5f0f\u8a08\u6578\u5668 Program Counter (PC)<\/p>\n<p>\u7a0b\u5e8f\u00a0(1) program , (2) procedure<\/p>\n<p>\u7a0b\u5e8f\u8a08\u6578\u5668\u00a0Program Counter (PC)<\/p>\n<p>\u7b49\u9023\u63a5\u00a0equi-join<\/p>\n<p>\u7b49\u806f\u7d50\u00a0equi-join<\/p>\n<p>\u7d50\u679c\u8abf\u7528\u00a0call by result<\/p>\n<p>\u7d50\u69cb\u5316\u67e5\u8a62\u8a9e\u8a00\u00a0Structured Query Language (SQL)<\/p>\n<p>\u7d50\u69cb\u5716\u00a0structure chart<\/p>\n<p>\u865b\u64ec\u79c1\u6709\u7db2\u7d61\u00a0Virtual Private Network (VPN)<\/p>\n<p>\u865b\u64ec\u771f\u5be6\u00a0Virtual Reality (VR)<\/p>\n<p>\u865b\u64ec\u771f\u5be6\u88fd\u6a21\u8a9e\u8a00\u00a0Virtual Reality Modeling Language (VRML)<\/p>\n<p>\u865b\u64ec\u5c08\u7528\u7db2\u7d61\u00a0Virtual Private Network (VPN)<\/p>\n<p>\u865b\u64ec\u73fe\u5be6\u00a0Virtual Reality (VR)<\/p>\n<p>\u865b\u64ec\u73fe\u5be6\u5efa\u6a21\u8a9e\u8a00\u00a0Virtual Reality Modeling Language (VRML)<\/p>\n<p>\u865b\u8b8a\u5143\u00a0dummy argument<\/p>\n<p>\u8996\u50cf\u5149\u789f\u00a0Video Compact Disc (VCD [disc])<\/p>\n<p>\u8996\u50cf\u5716\u5f62\u9663\u5217\u00a0Video Graphics Array (VGA)<\/p>\n<p>\u8a3b\u8173\u00a0footer<\/p>\n<p>\u8a5e\u6cd5\u5206\u6790\u00a0lexical analysis<\/p>\n<p>\u8d85\u5927\u898f\u6a21\u96c6\u6210\u96fb\u8def\u00a0Very Large Scale Integration (VLSI)<\/p>\n<p>\u8d85\u6587\u672c\u9023\u7d50\u00a0hyperlink<\/p>\n<p>\u8d85\u6587\u672c\u50b3\u8f38\u5354\u5b9a\u00a0Hypertext Transfer Protocol (HTTP)<\/p>\n<p>\u8d85\u6587\u672c\u6a19\u793a\u8a9e\u8a00\u00a0Hypertext Markup Language (HTML)<\/p>\n<p>\u8d85\u7d1a\u96fb\u8166\u00a0supercomputer<\/p>\n<p>\u8d85\u9023\u7d50\u00a0hyperlink<\/p>\n<p>\u8d85\u8996\u50cf\u5716\u5f62\u9663\u5217\u00a0Super Video Graphics Array (SVGA)<\/p>\n<p>\u90f5\u4ef6\u5408\u4f75\u00a0mail merge<\/p>\n<p>\u90f5\u5c40\u5354\u5b9a\u00a0Post Office Protocol (POP)<\/p>\n<p>\u958b\u653e\u7cfb\u7d71\u4e92\u9023\u00a0Open System Interconnection (OSI)<\/p>\n<p>\u958b\u653e\u6e90\u78bc\u8edf\u4ef6\u00a0open source software<\/p>\n<p>\u9593\u8adc\u8edf\u4ef6\u00a0spyware<\/p>\n<p>\u9593\u8adc\u7a0b\u5f0f\u00a0spyware<\/p>\n<p>\u968a\u5217\u00a0queue<\/p>\n<p>\u968e\u6bb5\u5f0f\u8f49\u63db\u00a0phased conversion<\/p>\n<p>\u968e\u6bb5\u8f49\u63db\u00a0phased conversion<\/p>\n<p>\u968e\u68af\u6548\u61c9\u00a0aliasing<\/p>\n<p>\u96c6\u5408\u51fd\u6578\u00a0aggregate function<\/p>\n<p>\u96c6\u6210\u96fb\u5b50\u88dd\u7f6e\u00a0Integrated Drive Electronics (IDE)<\/p>\n<p>\u96c6\u6210\u96fb\u8def\u00a0Integrated Circuit (IC)<\/p>\n<p>\u96c6\u7dda\u5668\u00a0hub<\/p>\n<p>\u97cc\u9ad4\u00a0firmware<\/p>\n<p>\u9806\u4f4d\u5143\u65b9\u5f0f\u4e92\u88dc\u00a0bitwise complement<\/p>\n<p>\u9ed1\u5ba2\u5165\u4fb5\u00a0hacking<\/p>\n<p>\u5341\u4e09\u756b<\/p>\n<p>\u50b3\u8f38\u63a7\u5236\u5354\u5b9a\u00a0Transmission Control Protocol (TCP)<\/p>\n<p>\u50b3\u8f38\u5c64\u00a0transport layer<\/p>\n<p>\u532f\u6d41\u6392\u00a0bus<\/p>\n<p>\u532f\u7de8\u7a0b\u5f0f\u00a0assembler<\/p>\n<p>\u532f\u7de8\u7a0b\u5e8f\u00a0assembler<\/p>\n<p>\u532f\u7de8\u8a9e\u8a00\u00a0assembly language<\/p>\n<p>\u5fae\u578b\u96fb\u8166\u00a0microcomputer<\/p>\n<p>\u5fae\u79d2\u00a0microsecond (\u03bcs)<\/p>\n<p>\u5fae\u8a08\u7b97\u6a5f\u00a0microcomputer<\/p>\n<p>\u5fae\u5fae\u79d2\u00a0picosecond (ps)<\/p>\n<p>\u5fae\u61c9\u7528\u7a0b\u5f0f\u00a0applet<\/p>\n<p>\u5fae\u61c9\u7528\u7a0b\u5e8f\u00a0applet<\/p>\n<p>\u641c\u5c0b\u5668\u00a0search engine<\/p>\n<p>\u6703\u8a71\u5c64\u00a0session layer<\/p>\n<p>\u6e90\u78bc\u00a0source code<\/p>\n<p>\u7576\u6a5f\u00a0hang<\/p>\n<p>\u842c\u7dad\u7db2\u00a0World Wide Web (WWW)<\/p>\n<p>\u842c\u7dad\u7db2\u806f\u76df\u00a0World Wide Web Consortium(W3C)<\/p>\n<p>\u7bc0\u9ede\u00a0node<\/p>\n<p>\u7fa4\u96c6\u00a0cluster<\/p>\n<p>\u88dc\u9593\u00a0tweening<\/p>\n<p>\u89e3\u6790\u5ea6\u00a0resolution<\/p>\n<p>\u89e3\u5bc6\u00a0decryption<\/p>\n<p>\u89e3\u50cf\u5ea6\u00a0resolution<\/p>\n<p>\u89e3\u78bc\u00a0decode<\/p>\n<p>\u89e3\u8b6f\u7a0b\u5f0f\u00a0interpreter<\/p>\n<p>\u89e3\u8b6f\u7a0b\u5e8f\u00a0interpreter<\/p>\n<p>\u89e3\u8b6f\u5668\u00a0interpreter<\/p>\n<p>\u8a66\u6e4a\u6cd5\u00a0trial-and-error approach<\/p>\n<p>\u8a71\u8def\u5c64\u00a0session layer<\/p>\n<p>\u8cc7\u8a0a\u00a0information<\/p>\n<p>\u8de8\u63a5\u5668\u00a0jumper<\/p>\n<p>\u8def\u7531\u5668\u00a0router<\/p>\n<p>\u8def\u5f91\u9078\u64c7\u8cc7\u8a0a\u5354\u5b9a\u00a0Routing Information Protocol (RIP)<\/p>\n<p>\u8f09\u5165\u7a0b\u5f0f loader<\/p>\n<p>\u8f09\u5165\u7a0b\u5e8f\u00a0loader<\/p>\n<p>\u904b\u884c\u00a0run<\/p>\n<p>\u904b\u7b97\u7b26\u00a0operator<\/p>\n<p>\u904e\u7a0b\u00a0procedure<\/p>\n<p>\u904e\u7a0b\u8a9e\u8a00\u00a0procedural language<\/p>\n<p>\u904d\u6b77\u00a0traversal<\/p>\n<p>\u96fb\u5b50\u4ed8\u6b3e\u7cfb\u7d71\u00a0Electronic Payment System<\/p>\n<p>\u96fb\u5b50\u5e03\u544a\u677f\u7cfb\u7d71\u00a0Bulletin Board System (BBS)<\/p>\n<p>\u96fb\u5b50\u901a\u52e4\u00a0telecommuting<\/p>\n<p>\u96fb\u5b50\u6578\u64da\u4ea4\u63db\u00a0Electronic Data Interchange (EDI)<\/p>\n<p>\u96fb\u5b50\u6578\u64da\u8655\u7406\u00a0Electronic Data Processing (EDP)<\/p>\n<p>\u96fb\u5b50\u6578\u64da\u806f\u901a\u00a0Electronic Data Interchange (EDI)<\/p>\n<p>\u96fb\u5b50\u8f49\u5e33\u00a0Electronic Fund Transfer (EFT)<\/p>\n<p>\u96fb\u50b3\u901a\u52e4\u00a0telecommuting<\/p>\n<p>\u96fb\u8166\u00a0computer<\/p>\n<p>\u96fb\u8166\u63d2\u5361\u00a0PCMCIA card (PC card)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u6307\u4ee4\u00a0Computer Aided Instruction (CAI)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u8a13\u7df4\u00a0Computer Based Training (CBT)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u57f9\u8a13\u00a0Computer Based Training (CBT)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u8a2d\u8a08\u00a0Computer Aided Design (CAD)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u8edf\u4ef6\u5de5\u7a0b\u00a0Computer Aided Software Engineering (CASE)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u88fd\u9020\u00a0Computer Aided Manufacturing (CAM)<\/p>\n<p>\u96fb\u8166\u8f14\u52a9\u5b78\u7fd2\u00a0Computer Assisted Learning (CAL)<\/p>\n<p>\u96fb\u8def\u5207\u63db\u00a0circuit switch<\/p>\n<p>\u96fb\u6a5f\u53ca\u96fb\u5b50\u5de5\u7a0b\u5e2b\u5b78\u6703\u00a0Institute of Electrical and Electronic Engineer\u00a0(IEEE)<\/p>\n<p>\u5341\u56db\u756b<\/p>\n<p>\u50cf\u7d20\u00a0picture element (pixel)<\/p>\n<p>\u5283\u4e00\u8cc7\u6e90\u5b9a\u4f4d\u00a0Uniform Resource Locator (URL)<\/p>\n<p>\u5283\u5206\u00a0partition<\/p>\n<p>\u5716\u793a\u00a0icon<\/p>\n<p>\u5716\u5f62\u4e92\u63db\u683c\u5f0f\u00a0Graphics Interchange Format (GIF)<\/p>\n<p>\u5716\u5f62\u52a0\u901f\u57e0\u00a0Accelerated Graphics Port (AGP)<\/p>\n<p>\u5716\u5f62\u5931\u771f\u00a0aliasing<\/p>\n<p>\u5716\u5f62\u7528\u6236\u754c\u9762 Graphical User Interface (GUI)<\/p>\n<p>\u5716\u7d20\u00a0picture element (pixel)<\/p>\n<p>\u5716\u50cf\u5143\u7d20\u00a0picture element (pixel)<\/p>\n<p>\u5716\u6a19\u00a0icon<\/p>\n<p>\u5be6\u7528\u8edf\u4ef6\u00a0utility software<\/p>\n<p>\u5be6\u4f8b\u00a0instance<\/p>\n<p>\u5be6\u6642\u8655\u7406\u00a0real-time processing<\/p>\n<p>\u5be6\u969b\u53c3\u6578\u00a0actual parameter<\/p>\n<p>\u5be6\u969b\u8b8a\u5143\u00a0actual argument<\/p>\n<p>\u5be6\u9a57\u8f49\u63db\u00a0pilot conversion<\/p>\n<p>\u5be6\u9ad4\u5b8c\u6574\u6027\u00a0entity integrity<\/p>\n<p>\u5be6\u9ad4\u5c64\u00a0physical layer<\/p>\n<p>\u5be6\u9ad4\u95dc\u4fc2\u5716\u00a0Entity Relationship Diagram (ERD)<\/p>\n<p>\u5c0d\u5206\u6aa2\u7d22\u00a0binary search<\/p>\n<p>\u5c0d\u7b49\u7db2\u7d61\u00a0Peer-to-Peer (P2P) network<\/p>\n<p>\u622a\u5c3e\u8aa4\u5dee\u00a0truncation error<\/p>\n<p>\u65d7\u6a19\u00a0flag<\/p>\n<p>\u6f38\u8b8a\u00a0tweening<\/p>\n<p>\u78c1\u5149\u789f\u00a0Magneto-Optical (MO) disk<\/p>\n<p>\u78c1\u9053\u00a0track<\/p>\n<p>\u78c1\u9053\u67f1\u9762\u00a0cylinder<\/p>\n<p>\u78c1\u789f\u91cd\u7d44\u8edf\u4ef6\u00a0defragmentation software<\/p>\n<p>\u78c1\u58a8\u6c34\u5b57\u5143\u8b58\u5225\u00a0Magnetic Ink Character Recognition (MICR)<\/p>\n<p>\u78c1\u58a8\u5b57\u7b26\u8b58\u5225\u00a0Magnetic Ink Character Recognition (MICR)<\/p>\n<p>\u78c1\u854a\u8a18\u61b6\u9ad4\u00a0magnetic core memory<\/p>\n<p>\u7ba1\u7406\u8cc7\u8a0a\u7cfb\u7d71\u00a0Management Information System (MIS)<\/p>\n<p>\u7b97\u5f0f\u00a0expression<\/p>\n<p>\u7b97\u6cd5\u00a0algorithm<\/p>\n<p>\u7b97\u8853\u53ca\u908f\u8f2f\u904b\u7b97\u90e8\u4ef6\u00a0Arithmetic and Logic Unit (ALU)<\/p>\n<p>\u7cbe\u7c21\u6307\u4ee4\u96c6\u96fb\u8166\u00a0Reduced Instruction Set Computer (RISC)<\/p>\n<p>\u7d9c\u5408\u670d\u52d9\u6578\u78bc\u7db2\u7d61\u00a0Integrated Services Digital Network (ISDN)<\/p>\n<p>\u7db2\u4e0a\u65e5\u8a8c\u00a0blog<\/p>\n<p>\u7db2\u4e0a\u7684\u884c\u70ba\u898f\u7bc4\u00a0netiquette<\/p>\n<p>\u7db2\u4e0a\u79ae\u5100 netiquette<\/p>\n<p>\u7db2\u5740\u7aef\u8f49\u63db\u00a0Network Address Translation (NAT)<\/p>\n<p>\u7db2\u57df\u540d\u7a31\u7cfb\u7d71\u00a0Domain Name System (DNS)<\/p>\n<p>\u7db2\u57df\u7cfb\u7d71\u00a0Domain Name System (DNS)<\/p>\n<p>\u7db2\u7d61\u5e03\u5c40\u00a0network topology<\/p>\n<p>\u7db2\u7d61\u4f48\u5c40\u00a0network topology<\/p>\n<p>\u7db2\u7d61\u5354\u5b9a\u00a0Internet Protocol (IP)<\/p>\n<p>\u7db2\u7d61\u4fe1\u606f\u63a5\u9054\u5354\u5b9a\u00a0Internet Message Access Protocol (IMAP)<\/p>\n<p>\u7db2\u7d61\u754c\u9762\u5361\u00a0Network Interface Card (NIC)<\/p>\n<p>\u7db2\u7d61\u6642\u9593\u5354\u5b9a\u00a0Network Time Protocol (NTP)<\/p>\n<p>\u7db2\u7d61\u63a7\u5236\u4fe1\u606f\u5354\u5b9a\u00a0Internet Control Message Protocol (ICMP)<\/p>\n<p>\u7db2\u7d61\u63a5\u9054\u9ede\u00a0Access Point (AP)<\/p>\n<p>\u7db2\u7d61\u5c64network layer<\/p>\n<p>\u7db2\u9593\u9023\u63a5\u5668\u00a0gateway<\/p>\n<p>\u7db2\u8a8c\u00a0blog<\/p>\n<p>\u8a9e\u53e5\u5206\u6790\u00a0lexical analysis<\/p>\n<p>\u8a9e\u6cd5\u00a0syntax<\/p>\n<p>\u8a9e\u6cd5\u5206\u6790\u7a0b\u5f0f\u00a0parser<\/p>\n<p>\u8a9e\u6cd5\u5206\u6790\u7a0b\u5e8f\u00a0parser<\/p>\n<p>\u8f14\u52a9\u5b58\u8caf\u5668\u00a0secondary storage<\/p>\n<p>\u8f14\u52a9\u5132\u5b58\u5668\u00a0secondary storage<\/p>\n<p>\u8f14\u52a9\u95dc\u9375\u78bc\u00a0secondary key<\/p>\n<p>\u9060\u7a0b\u901a\u8a0a\u00a0telecommunication<\/p>\n<p>\u9060\u7a0b\u901a\u52e4\u00a0telecommuting<\/p>\n<p>\u9060\u7a0b\u767b\u9304\u00a0telnet<\/p>\n<p>\u9060\u7a0b\u7a0b\u5e8f\u8abf\u7528\u00a0Remote Procedure Call (RPC)<\/p>\n<p>\u9060\u7aef\u767b\u5165\u00a0telnet<\/p>\n<p>\u905e\u6b78\u00a0recursion<\/p>\n<p>\u9818\u57df\u540d\u7a31\u7cfb\u7d71\u00a0Domain Name System (DNS)<\/p>\n<p>\u5341\u4e94\u756b<\/p>\n<p>\u5bec\u5ea6\u512a\u5148\u641c\u7d22\u00a0breadth-first search<\/p>\n<p>\u5bec\u5ee3\u5340\u57df\u7db2\u7d61\u00a0Wide Area Network (WAN)<\/p>\n<p>\u5bec\u983b\u00a0broadband<\/p>\n<p>\u5c64\u758a\u6a23\u5f0f\u8868 Cascading Style Sheet (CSS)<\/p>\n<p>\u5ee3\u544a\u8edf\u4ef6\u00a0adware<\/p>\n<p>\u5ee3\u544a\u7a0b\u5f0f\u00a0adware<\/p>\n<p>\u5ee3\u57df\u7db2\u7d61\u00a0Wide Area Network (WAN)<\/p>\n<p>\u5f71\u683c\u00a0frame<\/p>\n<p>\u6578\u78bc\u7528\u6236\u7dda\u00a0Digital Subscriber Line (DSL)<\/p>\n<p>\u6578\u78bc\u591a\u7528\u9014\u5149\u789f Digital Versatile Disc (DVD [disc])<\/p>\n<p>\u6578\u78bc\u9694\u95a1\u00a0digital divide<\/p>\n<p>\u6578\u78bc\u6a21\u64ec\u8f49\u63db\u5668\u00a0Digital Analog Converter (DAC)<\/p>\n<p>\u6578\u78bc\u8072\u5e36\u00a0Digital Audio Tape (DAT)<\/p>\n<p>\u6578\u78bc\u9d3b\u6e9d\u00a0digital divide<\/p>\n<p>\u6578\u64da\u5197\u9918\u6027\u00a0data redundancy<\/p>\n<p>\u6578\u64da\u5197\u9918\u5ea6\u00a0data redundancy<\/p>\n<p>\u6578\u64da\u5305\u5207\u63db\u00a0packet switching<\/p>\n<p>\u6578\u64da\u5b9a\u7fa9\u8a9e\u8a00\u00a0Data Definition Language (DDL)<\/p>\n<p>\u6578\u64da\u6d41\u7a0b\u5716\u00a0Data Flow Diagram (DFD)<\/p>\n<p>\u6578\u64da\u76f8\u95dc\u6027\u00a0data dependence<\/p>\n<p>\u6578\u64da\u5009\u00a0data warehouse<\/p>\n<p>\u6578\u64da\u5eab\u00a0database<\/p>\n<p>\u6578\u64da\u5eab\u67e5\u8a62\u8a9e\u8a00\u00a0database query language<\/p>\n<p>\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71\u00a0Database Management System (DBMS)<\/p>\n<p>\u6578\u64da\u5eab\u7ba1\u7406\u54e1\u00a0Database Administrator (DBA)<\/p>\n<p>\u6578\u64da\u5bbf\u00a0data sink<\/p>\n<p>\u6578\u64da\u63a5\u6536\u5668 data sink<\/p>\n<p>\u6578\u64da\u8655\u7406\u8a9e\u8a00\u00a0Data Manipulation Language \uff08DML\uff09<\/p>\n<p>\u6578\u64da\u9023\u8def\u5c64\u00a0data link layer<\/p>\n<p>\u6578\u64da\u63cf\u8ff0\u8a9e\u8a00\u00a0data description language<\/p>\n<p>\u6578\u64da\u7d50\u69cb\u00a0data structure<\/p>\n<p>\u6578\u64da\u958b\u63a1\u00a0data mining<\/p>\n<p>\u6578\u64da\u64cd\u4f5c\u8a9e\u8a00\u00a0Data Manipulation Language \uff08DML\uff09<\/p>\n<p>\u6578\u64da\u6a5f\u00a0modulator-demodulator (modem)<\/p>\n<p>\u6578\u64da\u93c8\u8def\u5c64\u00a0data link layer<\/p>\n<p>\u66ab\u5b58\u5668\u00a0register<\/p>\n<p>\u66ab\u505c hang<\/p>\n<p>\u6a1e\u7d10\u5206\u6790\u8868\u00a0pivot table<\/p>\n<p>\u6a19\u8a18\u00a0flag<\/p>\n<p>\u6a19\u8a18\u5716\u50cf\u6587\u4ef6\u683c\u5f0f\u00a0Tagged Image File Format (TIFF)<\/p>\n<p>\u6a19\u91cf\u985e\u5f62\u00a0scalar type<\/p>\n<p>\u6a19\u8b58\u7b26\u00a0identifier<\/p>\n<p>\u69fd\u00a0slot<\/p>\n<p>\u6a21\u5f0f\u00a0schema<\/p>\n<p>\u6a21\u7d44\u6027\u00a0modularity<\/p>\n<p>\u6a21\u64ec\u00a0analog \/ analogue<\/p>\n<p>\u6a21\u64ec\u6578\u78bc\u8f49\u63db\u5668\u00a0Analog Digital Converter (ADC)<\/p>\n<p>\u6a02\u5668\u6578\u4f4d\u754c\u9762\u00a0Musical Instrument Digital Interface (MIDI)<\/p>\n<p>\u6a02\u5668\u6578\u78bc\u754c\u9762\u00a0Musical Instrument Digital Interface (MIDI)<\/p>\n<p>\u7bc4\u4f8b\u67e5\u8a62\u6cd5\u00a0query by example<\/p>\n<p>\u7de8\u5740\u6a21\u5f0f\u00a0addressing mode<\/p>\n<p>\u7de8\u5beb\u5de5\u5177\u00a0authoring tool<\/p>\n<p>\u7de8\u78bc\u00a0encode ; code<\/p>\n<p>\u7de8\u78bc\uff0d\u89e3\u78bc\u5668\u00a0coder-decoder<\/p>\n<p>\u7de8\u78bc\uff0d\u8b6f\u78bc\u5668\u00a0coder-decoder<\/p>\n<p>\u7de8\u8b6f\u7a0b\u5f0f\u00a0compiler<\/p>\n<p>\u7de8\u8b6f\u7a0b\u5e8f\u00a0compiler<\/p>\n<p>\u7de8\u8b6f\u5668\u00a0compiler<\/p>\n<p>\u7dda\u6027\u9023\u63a5\u8868\u00a0linear linked list<\/p>\n<p>\u7dda\u6027\u6aa2\u7d22\u00a0linear search<\/p>\n<p>\u7dda\u6027\u93c8\u8868\u00a0linear linked list<\/p>\n<p>\u7de9\u885d\u5340\u00a0buffer<\/p>\n<p>\u7de9\u885d\u5668\u00a0buffer<\/p>\n<p>\u8907\u9078\u6846\u00a0check box<\/p>\n<p>\u8907\u96dc\u6307\u4ee4\u96c6\u96fb\u8166\u00a0Complex Instruction Set Computer (CISC)<\/p>\n<p>\u8abf\u5236\u89e3\u8abf\u5668\u00a0modulator-demodulator (modem)<\/p>\n<p>\u8abf\u89e3\u5668\u00a0modulator-demodulator (modem)<\/p>\n<p>\u8ce6\u540d\u5e38\u6578\u00a0named constant<\/p>\n<p>\u8ce6\u503c\u8a9e\u53e5\u00a0assignment statement<\/p>\n<p>\u8f2a\u8a62\u00a0polling<\/p>\n<p>\u9069\u914d\u5668\u00a0adapter<\/p>\n<p>\u906e\u7f69\u00a0mask<\/p>\n<p>\u92b7\u552e\u9ede\u7d42\u7aef\u6a5f\u00a0Point-Of-Sale (POS) terminal<\/p>\n<p>\u5341\u516d\u756b<\/p>\n<p>\u64cd\u4f5c\u7cfb\u7d71\u00a0Operating System (OS)<\/p>\n<p>\u64cd\u4f5c\u54e1\u00a0operator<\/p>\n<p>\u64cd\u4f5c\u6578\u00a0operand<\/p>\n<p>\u64cd\u4f5c\u78bc operation code (op-code)<\/p>\n<p>\u6574\u6279\u8655\u7406\u00a0batch processing<\/p>\n<p>\u6a39\u72c0\u7d50\u69cb\u00a0tree structure<\/p>\n<p>\u6a5f\u5668\u8a9e\u8a00\u00a0machine language<\/p>\n<p>\u8f38\u5165\/\u8f38\u51fa\u8a2d\u5099\u00a0Input\/Output (I\/O) device<\/p>\n<p>\u8f38\u5165\/\u8f38\u51fa\u88dd\u7f6e\u00a0Input\/Output (I\/O) device<\/p>\n<p>\u8f38\u5165\uff0d\u8655\u7406\uff0d\u8f38\u51fa\u5468\u671f\u00a0Input-Process-Output cycle<\/p>\n<p>\u8f38\u5165\uff0d\u8655\u7406\uff0d\u8f38\u51fa\u5faa\u74b0\u00a0Input-Process-Output cycle<\/p>\n<p>\u9078\u55ae\u00a0menu<\/p>\n<p>\u9078\u9805\u55ae\u00a0menu<\/p>\n<p>\u932f\u8aa4\u00a0bug<\/p>\n<p>\u96a8\u63d2\u5373\u7528\u00a0Plug and Play (PnP)<\/p>\n<p>\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4\u00a0Random Access Memory (RAM)<\/p>\n<p>\u975c\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4\u00a0Static Random Access Memory (SRAM)<\/p>\n<p>\u983b\u5e36\u5bec\u5ea6\u00a0bandwidth<\/p>\n<p>\u983b\u5bec\u00a0bandwidth<\/p>\n<p>\u99ed\u5ba2\u5165\u4fb5\u00a0hacking<\/p>\n<p>\u5341\u4e03\u756b<\/p>\n<p>\u61c9\u7528\u7cfb\u7d71\u8fc5\u901f\u767c\u5c55\u6cd5\u00a0Rapid Application Development (RAD)<\/p>\n<p>\u61c9\u7528\u670d\u52d9\u4f9b\u61c9\u5546\u00a0Application Service Provider (ASP)<\/p>\n<p>\u61c9\u7528\u5c64\u00a0application layer<\/p>\n<p>\u6a94\u5c3e\u00a0End Of File (EOF)<\/p>\n<p>\u6a94\u6848\u914d\u7f6e\u8868\u00a0File Allocation Table (FAT)<\/p>\n<p>\u6a94\u6848\u63a7\u5236\u6bb5\u00a0File Control Block (FCB)<\/p>\n<p>\u6a94\u6848\u50b3\u8f38\u5354\u5b9a\u00a0File Transfer Protocol (FTP)<\/p>\n<p>\u6a94\u8d77\u59cb\u00a0Beginning Of File (BOF)<\/p>\n<p>\u6aa2\u67e5\u548c checksum<\/p>\n<p>\u6aa2\u67e5\u6578\u4f4d\u00a0check digit<\/p>\n<p>\u6aa2\u7d22\u5668\u00a0search engine<\/p>\n<p>\u6feb\u767c\u90f5\u4ef6\u00a0spamming<\/p>\n<p>\u7e3d\u7dda\u00a0bus<\/p>\n<p>\u806f\u5408\u5f71\u50cf\u5c08\u5bb6\u7fa4\u7d44\u00a0Joint Photographic Experts Group (JPEG)<\/p>\n<p>\u8584\u819c\u6676\u9ad4\u7ba1\u00a0Thin-Film Transistor (TFT)<\/p>\n<p>\u9328\u9ede\u00a0anchor<\/p>\n<p>\u96b1\u5f0f\u8aaa\u660e\u00a0implicit declaration<\/p>\n<p>\u9ede\u81f3\u9ede\u958b\u96a7\u5354\u5b9a\u00a0Point-to-Point Tunneling Protocol (PPTP)<\/p>\n<p>\u9ede\u9663\u00a0dot matrix<\/p>\n<p>\u9ede\u9663\u5716\u00a0bitmap<\/p>\n<p>\u9ede\u5bc6\u5ea6\u00a0dot pitch<\/p>\n<p>\u9ede\u5c0d\u9ede\u5354\u5b9a\u00a0Point-to-Point Protocol (PPP)<\/p>\n<p>\u9ede\u5c0d\u9ede\u6a94\u6848\u5206\u4eab\u8edf\u4ef6\u00a0Peer-to-Peer (P2P) file sharing software<\/p>\n<p>\u5341\u516b\u756b<\/p>\n<p>\u64f4\u5145\u4e8c\/\u5341\u9032\u5236\u4ea4\u63db\u4ee3\u78bc\u00a0Extended Binary Coded Decimal Interchange Code(EBCDIC [code])<\/p>\n<p>\u64f4\u5145\u5716\u5f62\u9663\u5217\u00a0Extended Graphics Array (XGA)<\/p>\n<p>\u7011\u5e03\u6a21\u5f0f\u00a0waterfall model<\/p>\n<p>\u7011\u5e03\u6a21\u578b\u00a0waterfall model<\/p>\n<p>\u7c21\u6613\u8cc7\u8a0a\u805a\u5408\u00a0Really Simple Syndication (RSS)<\/p>\n<p>\u7c21\u55ae\u90f5\u905e\u50b3\u9001\u5354\u5b9a\u00a0Simple Mail Transfer Protocol (SMTP)<\/p>\n<p>\u7c21\u55ae\u7db2\u7d61\u7ba1\u7406\u5354\u5b9a\u00a0Simple Network Management Protocol (SNMP)<\/p>\n<p>\u8f49\u767c\u5668\u00a0repeater<\/p>\n<p>\u8f49\u9304\u932f\u8aa4\u00a0transcription error<\/p>\n<p>\u9396\u5b9a\u9ede\u00a0anchor<\/p>\n<p>\u96d9\u5217\u76f4\u63d2\u5f0f\u8a18\u61b6\u9ad4\u6a21\u7d44\u00a0Dual In-line Memory Module (DIMM)<\/p>\n<p>\u96d9\u5411\u00a0duplex<\/p>\n<p>\u96d9\u5b57\u7bc0\u5b57\u5143\u96c6\u00a0Double-Byte Character Set (DBCS)<\/p>\n<p>\u96d9\u5b57\u7bc0\u5b57\u7b26\u96c6\u00a0Double-Byte Character Set (DBCS)<\/p>\n<p>\u96d9\u626d\u7dda\u00a0twisted pair<\/p>\n<p>\u96d9\u9663\u5217\u00a0two-dimensional array<\/p>\n<p>\u96d9\u901a\u9053\u540c\u6b65\u52d5\u614b\u96a8\u6a5f\u5b58\u53d6\u8a18\u61b6\u9ad4\u00a0Double-Data-Rate Synchronous Dynamic Random\u00a0Access Memory (DDR SDRAM)<\/p>\n<p>\u5341\u4e5d\u756b<\/p>\n<p>\u8b58\u5225\u7b26\u00a0identifier<\/p>\n<p>\u93e1\u50cf\u00a0mirror<\/p>\n<p>\u93c8\u8868\u00a0linked list<\/p>\n<p>\u95dc\u4fc2\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71\u00a0Relational Database Management System(RDBMS)<\/p>\n<p>\u95dc\u806f\u6578\u64da\u5eab\u7ba1\u7406\u7cfb\u7d71\u00a0Relational Database Management System(RDBMS)<\/p>\n<p>\u5eff\u756b<\/p>\n<p>\u8815\u87f2\u00a0worm<\/p>\n<p>\u89f8\u767c\u5668\u00a0flip-flop<\/p>\n<p>\u8b6f\u78bc\u00a0decode<\/p>\n<p>\u5eff\u4e00\u756b<\/p>\n<p>\u5c6c\u6027\u00a0attribute<\/p>\n<p>\u6b04\u00a0field<\/p>\n<p>\u9a45\u52d5\u7a0b\u5f0f\u00a0driver<\/p>\n<p>\u9a45\u52d5\u7a0b\u5e8f\u00a0driver<\/p>\n<p>\u9a45\u52d5\u5668\u00a0driver<\/p>\n<p>\u5eff\u4e8c\u756b<\/p>\n<p>\u6b0a\u6a19\u00a0token<\/p>\n<p>\u6b0a\u6a19\u74b0\u00a0token ring<\/p>\n<p>\u5eff\u4e09\u756b<\/p>\n<p>\u8b8a\u5143\u00a0argument<\/p>\n<p>\u8b8a\u5f62\u00a0morphing<\/p>\n<p>\u8b8a\u91cf\u00a0variable<\/p>\n<p>\u986f\u793a\u5668\u00a0Visual Display Unit (VDU)<\/p>\n<p>\u986f\u5f0f\u8aaa\u660e\u00a0explicit declaration<\/p>\n<p>\u9a57\u8b49\u00a0verification<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iGardener\u8001\u5e2b\u7d93\u5e38\u63d0\u9192\u5b78\u751f\uff0c\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u7b54\u984c\u5207\u5fcc\u7528\u592a\u591a\u5546\u696d\u6216\u6d41\u884c\u574a\u9593\u8fad\u5f59\uff08\u6211\u7b11\u7a31\u4e4b\u70baezone\u8a9e\u8a00\uff0cezone\u7de8\u8f2f\u5011\u4e0d\u8981\u4ecb\u610f\u554a\uff01\uff09\uff0c\u7562\u7adf\u8a66\u5377\u662f\u6839\u64da\u6559\u80b2\u5c40\u7684\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59\u70ba\u6e96\u3002 \u70ba\u4e86\u65b9\u4fbf\u81ea\u5df1\u6559\u5b78\u53ca\u5927\u5bb6\u53c3\u8003\uff0ciGardener\u8001\u5e2b\u7279\u5225\u5c07\u6559\u80b2\u5c40\u7db2\u7ad9\u5167\u7684\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59PDF\u6a94\u6848\u5167\u7684\u6587\u5b57\u62bd\u4e86\u51fa\u4f86\uff0c\u7279\u5225\u9cf4\u8b1d\u4e2d\u4e94\u6607\u6607\u540c\u5b78\u548c\u4e2d\u4e09\u7199\u7199\u540c\u5b78\u7684\u4fee\u8a02\u6574\u7406\uff0c\u4fbf\u653e\u5728\u6b64\u6587\u4e2d\uff0c\u5927\u5bb6\u53ea\u9808\u4f7f\u7528\u700f\u89bd\u5668\u5167\u7684\u641c\u5c0b\u529f\u80fd(\u4f8b\uff1aFirefox &amp; Chrome \u6309 Ctrl-F)\uff0c\u4fbf\u53ef\u4ee5\u98db\u5feb\u5730\u641c\u5230\u4e2d\u82f1\u6587\u7684\u8fad\u5f59\u4e86\uff08\u5de6\u5716\u4e2d\u53f3\u9762scroll bar\u7684\u9ec3\u8272\u6a6b\u7dda\u5373\u9078\u5b57\u7684\u51fa\u73fe\u4f4d\u7f6e\uff09\u3002 \u5e0c\u671b\u4e5f\u80fd\u5920\u5e6b\u5230\u5927\u5bb6\uff01 \u8fad\u5f59\u4f86\u6e90\uff1a\u6559\u80b2\u5c40\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1-\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59 A Accelerated Graphics Port (AGP) \u5716\u5f62\u52a0\u901f\u57e0 Access Point (AP) \u7db2\u7d61\u63a5\u9054\u9ede accumulator \u7d2f\u52a0\u5668 actual argument \u5be6\u969b\u8b8a\u5143 actual parameter \u5be6\u969b\u53c3\u6578 adapter \u9069\u914d\u5668 adder \u52a0\u6cd5\u5668 address \u4f4d\u5740\uff1b\u5730\u5740 addressing mode \u5c0b\u5740\u6a21\u5f0f\uff1b\u7de8\u5740\u6a21\u5f0f Advanced Research Project Agency Network \u7f8e\u570b\u570b\u9632\u90e8\u9ad8\u7d1a\u7814\u7a76\u8a08\u5283\u5c40\u7db2\u7d61(ARPANET) adware \u5ee3\u544a\u7a0b\u5f0f\uff1b\u5ee3\u544a\u8edf\u4ef6 aggregate function \u96c6\u5408\u51fd\u6578 algorithm\u7b97\u6cd5 aliasing \u968e\u68af\u6548\u61c9\uff1b\u5716\u5f62\u5931\u771f American National Standards Institute (ANSI) &hellip; <a href=\"https:\/\/www.i-garden.org\/blog\/2011\/01\/22\/ict-glossary\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59 \uff08\u7db2\u9801\u7248\uff09NSS ICT Glossary<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[5,66],"tags":[250,29,249,15,12,252,253,254,251],"class_list":["post-2498","post","type-post","status-publish","format-standard","hentry","category-hkdse-nss-334","category-hkdse-ict-computer","tag-cdi","tag-edb","tag-glossary","tag-ict","tag-nss","tag-252","tag-253","tag-254","tag-251"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2025,"url":"https:\/\/www.i-garden.org\/blog\/2011\/01\/30\/innovative-series-of-multimedia-presentations-8-html5-origin-test-heading-google-translation\/","url_meta":{"origin":2498,"position":0},"title":"\u591a\u5a92\u9ad4\u6f14\u793a\u5275\u65b0\u7cfb\u5217(9) &#8211; W3C\u63a8\u51faHTML5\u7684\u6a19\u8a8c","author":"iGardener","date":"January 30, 2011","format":false,"excerpt":"\u7d93\u904e\u5927\u534a\u5e74\u7684\u5831\u5c0e\uff0c[W:HTML5]\u4f3c\u4e4e\u5df2\u7d93\u6210\u70ba[W:\u4e92\u806f\u7db2]\u6280\u8853\u7684\u5e38\u7528\u540d\u8a5e\uff0c\u5728[W:Google]\u7684\u652f\u6301\u4ee5\u53ca\u958b\u767c\u8005\u5011\u7684\u71b1\u60c5\u8ffd\u6367\u4e0b\uff0c[W:HTML5]\u4f3c\u4e4e\u5df2\u7d93\u6210\u70ba\u4e86\u89e3\u6c7a\u7db2\u7ad9\u958b\u767c\u4e2d\u4efb\u4f55\u554f\u984c\u7684\u826f\u85e5\u3002\u7121\u8ad6\u65b0\u9ad8\u4e2dICT\u7684\u8ab2\u7a0b\u7684\u4e2d\u5b78\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u5e38\u7528\u82f1\u6f22\u53ca\u6f22\u82f1\u8fad\u5f59\u662f\u5426\u5305\u542b\u9019\u8a5e\uff0c\u540c\u5b78\u5011\u4ea6\u8981\u8a8d\u8b58\u5b83\u3002 [W:W3C]\uff08World-Wide Web Consortium\uff0c\u842c\u7dad\u7db2\u806f\u76df\uff09\u5728\u4eca\u5e74\u4e00\u6708\u767c\u8868\u4e86[W:HTML5]\u7684\u5b98\u65b9\u65b0Logo\uff0c\u4e26\u5c0d\u9019\u7684\u7db2\u7d61\u958b\u767c\u6280\u8853\u505a\u51fa\u4e86\u65b0\u7684\u89e3\u91cb\uff1a HTML5\u7684\u516b\u5927\u6280\u8853\u7279\u9ede\uff1a [\u8cc7\u6599\u4f86\u6e90\uff1acnbeta] 1. \u8a9e\u7fa9\u5b78 \u4f5c\u70baHTML5\u7684\u524d\u7aef\u548c\u4e2d\u5fc3\uff0c\u8a9e\u7fa9\u5b78\u80fd\u5920\u8ce6\u4e88\u6846\u67b6\u7d50\u69cb\u4ee5\u610f\u7fa9\u3002\u66f4\u8a73\u76e1\u7684\u6a19\u7c3d\u7d44\u5408\u4ee5\u53ca\u8cc7\u6e90\u63cf\u8ff0\u6846\u67b6\uff0c\u5fae\u578b\u6578\u64da\u548c\u5fae\u578b\u683c\u5f0f\u5c07\u70ba\u4f60\u548c\u4f60\u7684\u7528\u6236\u6253\u9020\u4e00\u5957\u6578\u64da\u9a45\u52d5\u7684\u7db2\u7d61\u3002 2. \u672c\u6a5f\u5b58\u5132 \u5728\u61c9\u7528\u7de9\u5b58\uff0c\u672c\u6a5f\u5b58\u5132\uff0c\u7d22\u5f15\u6578\u64da\u5eab\u548c\u6587\u4ef6\u61c9\u7528\u7a0b\u5e8f\u63a5\u53e3\u7684\u5e6b\u52a9\u4e0b\uff0cHTML5\u61c9\u7528\u751a\u81f3\u80fd\u5728\u6c92\u6709\u7db2\u7d61\u9023\u63a5\u7684\u60c5\u6cc1\u4e0b\u5de5\u4f5c\u3002 3. \u8a2d\u5099\u8a2a\u554f \u5730\u7406\u5b9a\u4f4d\u53ea\u662f\u4e00\u500b\u958b\u59cb\uff0cHTML5\u80fd\u5920\u8b93\u61c9\u7528\u7a0b\u5e8f\u8a2a\u554f\u9023\u7d50\u5230\u4f60\u96fb\u8166\u4e0a\u7684\u4efb\u4f55\u8a2d\u5099\u3002 4. \u9023\u7d50\u6027 \u66f4\u6709\u6548\u7387\u7684\u9023\u7d50\u6027\u5c07\u80fd\u5e36\u4f86\u66f4\u5be6\u6642\u7684\u804a\u5929\uff0c\u66f4\u5feb\u7684\u6e38\u6232\u901f\u5ea6\u4ee5\u53ca\u66f4\u597d\u7684\u6e9d\u901a\u4ea4\u6d41\u3002\u670d\u52d9\u5668\u8207\u5ba2\u6236\u7aef\u4e4b\u9593\u7684\u7db2\u7d61\u5957\u63a5\u5b57\u548c\u90f5\u4ef6\u651d\u50cf\u982d\u5c07\u6bd4\u4ee5\u5f80\u66f4\u52a0\u4fbf\u6377\u3002 5. \u591a\u5a92\u9ad4 \u97f3\u983b\u548c\u8996\u983b\u53ef\u662fHTML5\u4e16\u754c\u7684\u4e00\u7b49\u516c\u6c11\uff0c\u4ed6\u5011\u5c07\u8207\u4f60\u7684\u61c9\u7528\u7a0b\u5e8f\u548c\u7db2\u7ad9\u548c\u7766\u5171\u8655\u3002\u71c8\u5149\uff0c\u651d\u5f71\uff0c\u958b\u59cb! 6. \u5e73\u9762\u548c\u4e09\u7dad\u6548\u679c \u5728SVG, Canvas, WebGL\u548cCSS3 3D\u6548\u679c\u9019\u4e9b\u7279\u6027\u4e4b\u9593\uff0c\u4f60\u4e00\u5b9a\u80fd\u627e\u5230\u8b93\u4f60\u7684\u7528\u6236\u773c\u82b1\u7e5a\u4e82\uff0c\u7f8e\u4e0d\u52dd\u6536\u7684\u5275\u610f\u3002 7. \u6027\u80fd\u548c\u96c6\u6210 \u4f7f\u4f60\u7684\u61c9\u7528\u7a0b\u5e8f\u548c\u7db2\u7d61\u5728\u5927\u91cf\u8af8\u5982Web Workers\u548cXML HttpRequest 2\u9019\u6a23\u7684\u6280\u8853\u4e0b\u66f4\u52a0\u5feb\u901f\u3002\u6c92\u6709\u4eba\u9858\u610f\u505c\u4e0b\u4e86\u7b49\u4f60\u8ddf\u9032\u7684\u3002 8. CSS3 \u5728\u4e0d\u72a7\u7272\u4f60\u7684\u8b1b\u7fa9\u7d50\u69cb\u548c\u6027\u80fd\u7684\u60c5\u6cc1\u4e0b\uff0cCSS3\u63d0\u4f9b\u4e86\u5927\u91cf\u7684\u6a23\u5f0f\u6548\u679c\u548c\u52a0\u5f37\u4f60\u7684\u7db2\u7d61\u61c9\u7528\u3002\u53e6\u5916WOFF(Web Open Font Format)\u63d0\u4f9b\u4e86\u524d\u6240\u672a\u6709\u7684\u5370\u5237\u9748\u6d3b\u6027\u63a7\u5236\u3002","rel":"","context":"In &quot;1C \u4e92\uf997\u7db2\u53ca\u5176\u61c9\u7528&quot;","block_context":{"text":"1C \u4e92\uf997\u7db2\u53ca\u5176\u61c9\u7528","link":"https:\/\/www.i-garden.org\/blog\/topics\/hkdse-ict-computer\/internet-application\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/2010\/06\/65604_1_1_l-207x300.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":5668,"url":"https:\/\/www.i-garden.org\/blog\/2015\/03\/16\/%e6%88%91%e5%80%91%e4%b8%8d%e6%9c%9f%e6%9c%9b-tvb-%e6%9c%83%e6%9c%89-bbc-%e7%9a%84%e8%a6%96%e9%87%8e%ef%bc%8c%e5%8f%aa%e5%b8%8c%e6%9c%9b%e5%8a%87%e9%9b%86%e4%b8%ad%e6%b8%9b%e5%b0%91%e8%aa%a4%e5%b0%8e\/","url_meta":{"origin":2498,"position":1},"title":"\u6211\u5011\u4e0d\u671f\u671b TVB \u6703\u6709 BBC \u7684\u8996\u91ce\uff0c\u53ea\u5e0c\u671b\u5287\u96c6\u4e2d\u6e1b\u5c11\u8aa4\u5c0e\u540c\u5b78\u7684\u96fb\u8166\u8fad\u5f59\u3002","author":"iGardener","date":"March 16, 2015","format":"link","excerpt":"\u6211\u5011\u4e0d\u671f\u671b TVB \u6703\u6709 BBC \u7684\u8996\u91ce\uff0c\u53ea\u5e0c\u671b\u5287\u96c6\u4e2d\u6e1b\u5c11\u8aa4\u5c0e\u540c\u5b78\u7684\u96fb\u8166\u8fad\u5f59\u3002","rel":"","context":"In &quot;HK ICT Network \u9999\u6e2f\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u7db2\u7d61&quot;","block_context":{"text":"HK ICT Network \u9999\u6e2f\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u7db2\u7d61","link":"https:\/\/www.i-garden.org\/blog\/topics\/hkict-network-%e9%a6%99%e6%b8%af%e8%b3%87%e8%a8%8a%e5%8f%8a%e9%80%9a%e8%a8%8a%e7%a7%91%e6%8a%80%e7%b6%b2%e7%b5%a1\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8907,"url":"https:\/\/www.i-garden.org\/blog\/2019\/03\/02\/%e8%b3%87%e8%a8%8a%e5%8f%8a%e9%80%9a%e8%a8%8a%e7%a7%91%e6%8a%80-%e7%a4%be%e6%9c%83%e8%ad%b0%e9%a1%8c-%e6%9c%aa%e4%be%86%e7%9a%84%e6%9c%aa%e4%be%86-10-jobs-for-the-future\/","url_meta":{"origin":2498,"position":2},"title":"\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u4e4b\u793e\u6703\u8b70\u984c\u7cfb\u5217 (3) \u2013 \u672a\u4f86\u7684\u672a\u4f86 (10 Jobs For The Future)","author":"iGardener","date":"March 2, 2019","format":false,"excerpt":"iGardener \u8001\u5e2b\u75311999\u5e74\u958b\u59cb\u5beb\u96fb\u8166\u6559\u80b2\u7db2\u7ad9\uff08\u7576\u5e74\u9084\u672a\u6709 \"blog\" \u9019\u500b\u8fad\u5f59\uff09\uff0c\u81f3\u4eca\u5df2\u63a5\u8fd1\u5eff\u5e74\uff0c\u7576\u5e74\u79d1\u7db2\u6f6e\u5927\u71b1\uff0c\u8b58\u7de8\u5beb [W:HTML] \u7db2\u7ad9\u7684\u96fb\u8166\u4eba\uff0c\u5df2\u7d93\u5f88\u300c\u6f6e\u300d\u5f88\u300c\u6436\u624b\u300d\u3002 \u4eca\u5929\u4e16\u754c\u6025\u901f\u8b8a\u5316\uff0c\u4e00\u4e9b\u8077\u696d\u770b\u4f3c\u300c\u7121\u7aef\u7aef\u300d\u5192\u51fa\u4f86\uff0c\u9019\u7a2e\u8b8a\u5316\u80af\u5b9a\u662f\u6b78\u56e0\u65bc\u79d1\u6280\u767c\u5c55\uff0c\u800c\u9019\u7a2e\u767c\u5c55\u53ea\u6703\u96a8\u8457\u6642\u9593\u800c\u589e\u52a0\u3002 \u6709\u5b78\u8005\u9810\u6e2c\uff1a\u300c\u672a\u4f86 10 \u5e74 6 \u6210\u6700\u5403\u9999\u7684\u8077\u696d\u6839\u672c\u672a\u5b58\u5728\u3002\u300d \u770b\u770b\u4e0b\u9762\u7684\u8cc7\u8a0a\u5716 (infographics) \u5427\uff0c\u5f88\u591a\u5c6c\u65bc\u672a\u4f86\u7684\u5de5\u4f5c\u3002 Source: www.kbs.edu.au","rel":"","context":"In &quot;1E ICT\u5c0d\u793e\u6703\u7684\u5f71\u97ff&quot;","block_context":{"text":"1E ICT\u5c0d\u793e\u6703\u7684\u5f71\u97ff","link":"https:\/\/www.i-garden.org\/blog\/topics\/hkdse-ict-computer\/ict-society\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/img_9338.png?fit=1200%2C629&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/img_9338.png?fit=1200%2C629&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/img_9338.png?fit=1200%2C629&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/img_9338.png?fit=1200%2C629&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/img_9338.png?fit=1200%2C629&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":12305,"url":"https:\/\/www.i-garden.org\/blog\/2021\/02\/09\/2022-hkdse-ict-sba-cancelled\/","url_meta":{"origin":2498,"position":3},"title":"[2022 ICT SBA \u53d6\u6d88]  2022\u5e74\u6587\u6191\u8a66\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u6821\u672c\u8a55\u6838\u53d6\u6d88 SBA of 2022 DSE ICT will be cancelled","author":"iGardener","date":"February 9, 2021","format":false,"excerpt":"\u7e7c 2021\u5e74\u6587\u6191\u8a66\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u53d6\u6d88\u6821\u672c\u8a55\u6838\u5f8c\uff0c\u6b63\u7576 iGardener \u8001\u5e2b\u300c\u601d\u8003\u300d\u4eca\u5e74\u4e2d\u4e94\uff082022\u5e74\u8003\u751f\uff09\u662f\u5426\u9700\u8981\u65b0\u5e74\u671f\u9593\u505a SBA (School-based Assessment) \u4e4b\u969b\uff0c\u4eca\u5929\u8003\u8a55\u5c40\u5df2\u6709\u6240\u5ba3\u4f48\uff0c\u6642\u9593\u5b89\u6392\u5728\u65b0\u5e74\u5047\u671f\u4e4b\u524d\uff0c\u7b97\u662f\u4ee5\u8003\u751f\u5229\u76ca\u70ba\u672c\uff0c\u9019\u4e00\u5e74\u4f86\u5be6\u5c6c\u96e3\u5f97\u3002 2022\u5e74\u6587\u6191\u8a66\u6821\u672c\u8a55\u6838\u7cbe\u7c21\u5b89\u6392\u56e0\u61c9\u75ab\u60c5\u53ca\u5b78\u6821\u505c\u8ab2\u7684\u5f71\u97ff\uff0c\u9999\u6e2f\u8003\u8a66\u53ca\u8a55\u6838\u5c40\uff08\u8003\u8a55\u5c40\uff09\u4eca\u65e5\uff082\u67089\u65e5\uff09\u5ba3\u5e03\uff0c\u516c\u958b\u8003\u8a66\u59d4\u54e1\u6703\u5df2\u8b70\u6c7a\u901a\u904e\uff0c\u7cbe\u7c21 2022\u5e74\u9999\u6e2f\u4e2d\u5b78\u6587\u6191\u8003\u8a66\uff08\u6587\u6191\u8a66\uff09\u7684\u6821\u672c\u8a55\u6838\u8981\u6c42\uff0c\u800c\u6709\u95dc\u5b89\u6392\u53ea\u9069\u7528\u65bc\u672c\u5b78\u5e74\u5c31\u8b80\u4e2d\u4e94\u7d1a\u7684\u5b78\u751f\u3002\u59d4\u54e1\u6703\u671f\u671b\u6709\u95dc\u5b89\u6392\u80fd\u91cb\u653e\u6559\u5b78\u7a7a\u9593\uff0c\u4e26\u6e1b\u5c11\u9700\u8981\u9762\u5c0d\u9762\u63a5\u89f8\u3001\u5728\u6821\u5167\u5b8c\u6210\u6216\u7531\u6559\u5e2b\u5bc6\u5207\u500b\u5225\u8f14\u5c0e\u7684\u8a55\u6838\u9805\u76ee\u3002\u57282022\u5e74\u6587\u6191\u8a66\uff0c\u5341\u500b\u79d1\u76ee\u5c07\u53d6\u6d88\u6821\u672c\u8a55\u6838\uff0c\u4e26\u7cbe\u7c21\u9918\u4e0b\u56db\u500b\u79d1\u76ee\u7684\u8a55\u6838\u8981\u6c42\uff0c\u8a73\u60c5\u5982\u4e0b\uff1a\u53d6\u6d88\u6821\u672c\u8a55\u6838(10 \u79d1)\u901a\u8b58\u6559\u80b2\u3001\u4e2d\u570b\u6587\u5b78\u3001\u82f1\u8a9e\u6587\u5b78\u3001\u751f\u7269\u3001\u5316\u5b78\u3001\u7269\u7406\u3001\u79d1\u5b78(\u7d44\u5408\u79d1\u5b78\/\u7d9c\u5408\u79d1\u5b78)\u3001\u79d1\u6280\u8207\u751f\u6d3b\u3001\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u3001\u5065\u5eb7\u7ba1\u7406\u8207\u793e\u6703\u95dc\u61f7...... https:\/\/www.hkeaa.edu.hk\/DocLibrary\/MainNews\/PR_2022DSE_SBA_Streamlining_chi.pdf 2022\u5e74\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1 SBA \u518d\u6b21\u53d6\u6d88\u4e86\u3002","rel":"","context":"In &quot;Freeware \u514d\u8cbb\u8cc7\u6e90&quot;","block_context":{"text":"Freeware \u514d\u8cbb\u8cc7\u6e90","link":"https:\/\/www.i-garden.org\/blog\/topics\/freeware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/20210209_IG_Featured_Image.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/20210209_IG_Featured_Image.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/20210209_IG_Featured_Image.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/20210209_IG_Featured_Image.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/20210209_IG_Featured_Image.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4646,"url":"https:\/\/www.i-garden.org\/blog\/2013\/05\/10\/the-2014-hkdse-ict-2014-hkdse-hong-kong-diploma-of-secondary-education-examination-2014-exam-schedule\/","url_meta":{"origin":2498,"position":4},"title":"2014\u5e74 HKDSE \u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1 (ICT) \u524d\u5f8c\u8003\u8a66\u6642\u9593\u8868","author":"iGardener","date":"May 10, 2013","format":false,"excerpt":"[W:\u9999\u6e2f\u8003\u8a55\u5c40]\u525b\u525b\u767c\u4f48\u4e862014\u5e74[W:\u9999\u6e2f\u4e2d\u5b78\u6587\u6191\u8003\u8a66]\u8003\u8a66\u6642\u9593\u8868\uff0c\u6bd4\u8f03\u7279\u5225\u662f\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u79d1\u8f03\u4ee5\u524d\u65e9\u8003\uff0c\u751a\u81f3\u6bd4\u6838\u5fc3\u79d1\u76ee\u9084\u65e9\uff0c\u5404\u4f4d\u8003\u751f\u5b9c\u53ca\u65e9\u6e96\u5099\uff01 2014 \u5e74 \u9999 \u6e2f \u4e2d \u5b78 \u6587 \u6191 \u8003 \u8a66 \u00a0HKDSE 2014\u00a0\u8003\u8a66\u6642\u9593\u8868\u00a0TIMETABLE \u56db\u6708\u4e09\u65e5\uff08\u661f\u671f\u56db\uff09 Thursday, 3rd April 08:30 - 10:30 ICT Paper 1 \u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280 \uff08\u5377\u4e00\uff09 11:15 - 12:45 ICT Paper 2 \u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280 \uff08\u5377\u4e8c\uff09 \u56db\u6708\u56db\u65e5\uff08\u661f\u671f\u4e94\uff09 Friday, 4th April 8:30 - 11:00 Biology 1 \u751f\u7269 \uff08\u4e00\uff09 11:45 - 12:45 Biology 2 \u751f\u7269\u2026","rel":"","context":"In &quot;2C \u591a\u5a92\u9ad4\u88fd\u4f5c\u53ca\u7db2\u7ad9\u5efa\u69cb&quot;","block_context":{"text":"2C \u591a\u5a92\u9ad4\u88fd\u4f5c\u53ca\u7db2\u7ad9\u5efa\u69cb","link":"https:\/\/www.i-garden.org\/blog\/topics\/hkdse-ict-computer\/multimedia\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/lh6.ggpht.com\/-Qp11U5vG_DQ\/UYz3xCHdhMI\/AAAAAAAAIrM\/jMehDWLrYAU\/s400\/ed0430e.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6503,"url":"https:\/\/www.i-garden.org\/blog\/2018\/02\/22\/%e9%81%8b%e7%ae%97%e6%80%9d%e7%b6%ad%e5%8f%8a%e7%a8%8b%e5%bc%8f%e7%b7%a8%e5%af%ab%e5%ad%b8%e7%bf%92%e7%b3%bb%e5%88%974-%e9%9b%bb%e8%85%a6%e7%b7%a8%e7%a8%8b%e9%a6%99%e6%b8%af%e7%9c%9f%e7%9a%84-2-2\/","url_meta":{"origin":2498,"position":5},"title":"\u904b\u7b97\u601d\u7dad\u53ca\u7a0b\u5f0f\u7de8\u5beb\u5b78\u7fd2\u7cfb\u5217 (5) &#8211; \u9999\u6e2f CIO \u5606\u6bd45\u5e74\u524d\u66f4\u96e3\u7269\u8272IT\u5c08\u696d\u4eba\u4ed5","author":"iGardener","date":"February 22, 2018","format":false,"excerpt":"\u5e0c\u671b\u8001\u5e2b\u8f49\u9054\u6b64\u6587\uff0c\u9f13\u52f5\u6b63\u5728\u6216\u8003\u616e\u4fee\u8b80 ICT \u7684\u5b78\u751f\uff0c\u9999\u6e2f IT\u9818\u57df\u5c31\u696d\u60c5\u6cc1\u6301\u7e8c\u84ec\u52c3\uff0c\u8b80\u597d ICT \u662f\u5341\u5206\u5403\u9999\u7684\uff01 \u64da\u62db\u8058\u516c\u53f8Robert Half\u767c\u8868\uff0c\u9ad8\u9054\u4e5d\u6210\u9999\u6e2f\u7684 CIO\uff08Chief Information Officer\uff09\u8868\u793a\uff0c\u73fe\u5728\u8f035\u5e74\u524d\u66f4\u96e3\u7269\u8272\u5230\u5408\u8cc7\u683c\u7684IT\u5c08\u696d\u4eba\u4ed5\u3002 \u6700\u8fd1\u4e00\u9805\u7814\u7a76\u4ea6\u767c\u73fe\uff0c\u9999\u6e2fCIO\u8868\u793aIT\u6559\u80b2\u6a5f\u69cb\u9808\u52a0\u5f37\u6559\u80b2\uff0c\u914d\u5408\u672a\u4f86IT\u8077\u4f4d\u7684\u9700\u8981\u3002 \/\/Robert Half\u9999\u6e2f\u57f7\u884c\u7e3d\u88c1Adam Johnston\u6307\u51fa\uff0cIT\u5c08\u696d\u4eba\u54e1\u7684\u6280\u80fd\u5fc5\u9808\u8207\u6642\u4e26\u9032\uff0c\u6559\u80b2\u754c\u8981\u78ba\u4fdd\u5176STEM\uff08\u79d1\u5b78\u3001\u79d1\u6280\u3001\u5de5\u7a0b\u53ca\u6578\u5b78\uff09\u7684\u8cc7\u683c\u3001\u8ab2\u7a0b\u53ca\u5b78\u4f4d\u80fd\u8ffd\u4e0a\u6642\u4ee3\u3002\/\/ \u57f9\u8a13\u4e0a\u5fc5\u9808\u7740\u91cd\u591a\u500b\u95dc\u9375\u7684IT\u9818\u57df\uff0c\u4f8b\u5982\u662f\u8edf\u4ef6\/\u61c9\u7528\u958b\u767c\u3001\u8cc7\u8a0a\u79d1\u6280\u4fdd\u5b89\u3001\u6578\u64da\/\u6578\u64da\u5eab\u7ba1\u7406\u53ca\u4f01\u696d\u8f49\u578b\u3002 \u9999\u6e2f\u4e2d\u5b78\u65b9\u9762\uff0ciGardener \u8001\u5e2b\u6b23\u898b\u904e\u53bb\u6578\u5e74\u6559\u80b2\u5c40\u3001\u8003\u8a55\u5c40\u3001\u5b78\u8005\u3001\u524d\u7dda\u8001\u5e2b\u5c31\u8457\u4fee\u8a02\u9999\u6e2f\u4e2d\u5b78\u6587\u6191\u8cc7\u8a0a\u53ca\u901a\u8a0a\u79d1\u6280\u8ab2\u7a0b\uff0c\u8b93\u8ab2\u7a0b\u5982\u4f55\u8207\u6642\u4e26\u9032\uff0c\u8ab2\u7a0b\u59d4\u54e1\u6703\u5927\u5c0f\u6703\u8b70\u983b\u983b\uff0c\u76f8\u4fe1\u7576\u4e2d\u7684\u8ab2\u7a0b\u4fee\u8a02\uff0c\u5df2\u56de\u61c9\u4e86CIO \u6240\u671f\u671b\u672a\u4f86IT\u8077\u5834\u7684\u9700\u8981\u3002 \u5712\u4e01\u4f5c\u70ba\u9999\u6e2f\u524d\u7ddaICT\u8001\u5e2b\uff0c\u9f13\u52f5\u5404\u4f4d\u9999\u6e2f ICT \u540c\u5de5\u7a4d\u6975\u53c3\u8207\u9019\u6578\u6708\u7684\u8ab2\u7a0b\u66f4\u65b0\u8aee\u8a62\uff0c\u5171\u540c\u512a\u5316\u9999\u6e2f\u4e2d\u5b78\u6587\u6191 ICT \u8ab2\u7a0b\u3002 \u53c3\u8003\u9023\u7d50: https:\/\/www.roberthalf.com.hk\/research-insights\/salary-guide\/it-technology","rel":"","context":"In &quot;1D \u57fa\u672c\u7a0b\u5f0f\u7de8\u5beb\u6982\u5ff5&quot;","block_context":{"text":"1D \u57fa\u672c\u7a0b\u5f0f\u7de8\u5beb\u6982\u5ff5","link":"https:\/\/www.i-garden.org\/blog\/topics\/hkdse-ict-computer\/programming-ict-computer\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/information_technology_1519133809.jpg?fit=1200%2C699&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/information_technology_1519133809.jpg?fit=1200%2C699&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/information_technology_1519133809.jpg?fit=1200%2C699&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/information_technology_1519133809.jpg?fit=1200%2C699&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.i-garden.org\/blog\/wp-content\/uploads\/information_technology_1519133809.jpg?fit=1200%2C699&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/pwqSM-Ei","_links":{"self":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/posts\/2498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/comments?post=2498"}],"version-history":[{"count":26,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/posts\/2498\/revisions"}],"predecessor-version":[{"id":2546,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/posts\/2498\/revisions\/2546"}],"wp:attachment":[{"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/media?parent=2498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/categories?post=2498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.i-garden.org\/blog\/wp-json\/wp\/v2\/tags?post=2498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}