Briefing Session on 2013 HKDSE ICT Exam. 22/23 Nov 2013

Size: px
Start display at page:

Download "Briefing Session on 2013 HKDSE ICT Exam. 22/23 Nov 2013"

Transcription

1 Briefing Session on 2013 HKDSE ICT Exam 22/23 Nov

2 Breakdown of elective No. of candidates No. of schools 1 7, A B C 5, D 1,

3 Options offered No. of options No. of schools

4 Popularity Combination No. of schools C 314 D 64 A 39 CD 31 4

5 Interesting Figures (1) Paper Max Mark A 54 2B 49 2C 48 2D 55 5

6 Interesting Figures (2) Selection of Prog Lang (2D) Total % Pascal C Visual Basic Java ,

7 Performance Compulsory Part Average no. of MC items correct = 23 High correlation with Paper 2s and SBA 7

8 Performance Elective Part Equating performance of candidates (Elective Part) can be reflected on the same scale (Equipercentile method ) Performance (Paper 1) of students in 2D > 2A > 2B > 2C Refer to Grading Procedures & standards-referenced Reporting in the HKDSE Exam (HKEAA) 8

9 Grading Procedures Sample script selection Standardisation Post-marking exercise Panel of judges grading meeting Internal meeting Public Exam Board meeting Refer to Grading Procedures & standards-referenced Reporting in the HKDSE Exam (HKEAA) 9

10 ICT (All candidates) Level % 5** 0.7 5*

11 Levels attained HKDSE Level 4 comparable to HKAL Grade D L5** Top 10% of L5 L5*+ Top 40% of L5 (L5* = next 30%) 11

12 SBA No major irregularity cases 12

13 SBA Reminders Students have to complete their reports on their own acknowledge sources properly in their work to avoid plagiarism New measures: Prevention & handling of Malpractice 13

14 2013 ICT Exemplars Exemplars with annotated notes P1B 1 language P2 selected levels Uploaded to 14

15 Assessing Student Learning for the ICT Curriculum Briefing Session on 2013 HKDSE ICT Examination [ 1B & 2B ]

16 Paper 1B Qu 1 ~ (a) (i) John connects the printer to the network at P instead of Q. What is the advantage and disadvantage of this? Adv : easy to control Disadv : can be used only when the desktop computer is on Student Performance : OK

17 Paper 1B Qu 1 ~ (a) (ii) The printer is equipped with RAM and ROM. When John prints a document, what will the RAM and ROM store? Student Performance : RAM: print data ROM: printer s firmware OK, some not know printer has RAM and ROM, and their functions Reflection for T&L: RAM & ROM are generic main storage, not only for computer

18 Paper 1B Qu 1 ~ (b) (i) Suggest two possible ways to link up the desktop computer and the smartphone. Student Performance : Good WiFi network Bluetooth USB cable

19 Paper 1B Qu 1 ~ (b) (ii) X and Z are two different cables. What is the major difference in functional characteristic between them? Student Performance : data transfer rate Max. length cable segment Not good, some talk about analog and digital signal Reflection for T&L: Teach student what is the meaning of functional characteristics

20 Paper 1B Qu 1 ~ (c) The rear part of the router is shown in the diagram below. Mark X and Y on the diagram to indicate where the cables X and Y should be connected. X LAN Y WAN

21 Paper 1B Qu 1 ~ (d) Someone suggests that John build a Domain Name System (DNS) to improve his network services. John disagrees with this suggestion. (i) What network service does a DNS mainly provide? (ii) Do you agree with John s view? Explain briefly. (i) DNS resolves domain names into IP (ii) He does not need DNS because it is just a LAN Student Performance :Good

22 Paper 1B Qu 2 ~ (a) Janice is planning the annual Charity Run for her school. She uses graphics software to create a map with the route of the Charity Run and posts it on the school s web site. Janice decides to store the map as MAP.JPG instead of MAP.BMP. Give one benefit of her decision. smaller file size/ supported by many browsers Student Performance :Good

23 Paper 1B Qu 2 ~ (b) Suggest two protocols for receiving that Janice may use POP3, IMAP Janice finds that the client program classifies Alan s as spam. What does she need to do to prevent this happening again? Add his address in non-spam list Janice tries to reply to all the accounts involved Student Performance :Good Alan and Betty

24 Paper 1B Qu 2 ~ (c) The notebook computer is equipped with a solidstate drive (SSD) instead of a general hard disk. Give two benefits to Janice of using a SSD. higher data transfer rate. consumes less electricity. smaller in size. better shock resistance. Lighter more durable. Student Performance : Good

25 Paper 1B Qu 2 ~ (c) Janice uploads the videos and pictures to the school s web site and the web site includes a statement All rights reserved. If the statement were removed, would the school own the copyright of the web site? Explain briefly. Yes, copyright ownership does not require any registration or declaration.

26 Paper 1B Qu 2 ~ (d) (i) To promote the Charity Run, Janice writes an article in the school newsletter and inserts the following code for linking to the school s web site. Give one advantage of using this code over a bar code. store more data. a higher error correction capability. can be scanned in different orientation. be made up of more types of data Student Performance : OK, but some show no experience in it Reflection for T&L: More actual demo to student

27 Paper 1B Qu 2 ~ (d) (ii) What is the benefit of using this code in the school newsletter? faster to input the URL reduce typing errors Student Performance : OK, but some of the answer are too simple (e.g. convenience) Reflection for T&L: More concrete answer, higher level questioning at lessons

28 Paper 1B Qu 2 ~ (d) (iii) Describe another kind of use of this code. Student Performance : Good phone number / product information.

29 Paper 1B Qu 3 Amy, Billy and Charles work in different offices in a company. Read their conversation about using computers and answer the questions below. Amy: Charles, your office does not have a good ergonomic environment. Billy: Charles, you have installed a Bit Torrent (BT) program on your computer. You should delete it. Charles: No, I will still keep the BT program and use it. Amy: Charles, we installed the same anti-virus software at the same time but only your computer is infected.

30 Paper 1B Qu 3 ~ (a) Give two possible features of the setup of Charles office that could easily lead to eye strain when using the computer. improper viewing angle of the monitor / improper height of the monitor / distance from the monitor to his eyes too close / insufficient light / close to the window without curtain Student Performance : Good, but some state features not related to set-up, or not related to eye strain Reflection for T&L: Care about EVERY word in the question

31 Paper 1B Qu 3 ~ (b) Billy and Charles have different views on the use of the BT program. (i) Give a reason to support Billy s recommendation. (ii) Give a reason to support Charles decision. (i) Charles would download some software that the sources come from unidentified individual users; the software might be privacy copies. (ii) Charles can share working files with other colleagues efficiently. Student Performance :OK, but some student think BT is fast / illegal / virus Reflection for T&L: Clear general misconception of their usual experience

32 Paper 1B Qu 3 ~ (c) Why is only Charles computer infected? Give two possible reasons. Student Performance : infected with new computer virus deactivates his anti-virus software. does not regularly update the definition database of the anti-virus software. Good, but some state their Anti-virus software are different Reflection for T&L: Care about EVERY word in the question

33 Paper 1B Qu 3 Charles: The operating system of my computer uses Unicode instead of Big-5 code and GB code. Billy: Unicode only includes around 20,000 Chinese characters. Amy: Not any more. As of September 2012, Unicode includes more than 110,000 characters.

34 Paper 1B Qu 3 ~ (d) (ii) Referring to Amy s comment, do the 110,000 characters include traditional and simplified Chinese characters only? Explain briefly. Other than the Chinese characters, there are characters of other languages Student Performance : Good, but some mentioned the following only Number Character English character Reflection for T&L: State more related examples

35 Paper 1B Qu 3 ~ (d) (i) To represent a set of 20,000 characters using binary code, what is the minimum number of bits required? Show your calculation < 20,000 < bits are needed. Student Performance : Good

36 Paper 1B Qu 3 ~ (d) (ii) Referring to Amy s comment, do the 110,000 characters include traditional and simplified Chinese characters only? Explain briefly. Other than the Chinese characters, there are characters of other languages Student Performance : Good, but some mentioned the following only Number Character English character Reflection for T&L: State more related examples

37 Paper 1B Qu 3 Amy, Billy and Charles go to a public library and want to use workstations. Amy: There is an empty seat but the workstation has not been logged out. Charles: The account has not been logged out. There is a coupon attached to the . Let me print it so we can use it. Billy: The security of the workstations is very low. Secure Sockets Layer (SSL) should be used.

38 Paper 1B Qu 3 ~ (e) (i) Describe two illegal offences that Charles would do if he accessed the and printed the coupon. Student Performance : He accesses the account without authorization. He steals the coupon. Good, especially in THEFT offences. But some mentioned privacy instead of illegal access Reflection for T&L: A good example to show illegal access vs privacy

39 Paper 1B Qu 3 ~ (e) (ii) Can SSL prevent Charles from accessing the account mentioned above? Explain briefly. Student Performance : No, SSL is used to secure the data transmission. (encryption) Good, except some only mentioned more secure, which is not acceptable Reflection for T&L: Don t simply repeat wordings in the question

40 Paper 1B Qu 4 Sarah is a librarian in a secondary school. She uses a table in a database, LOAN, to store the book circulation records.

41 Paper 1B Qu 4 ~ (a) Suggest a primary key for LOAN. Suggest a validation check on each of the following fields. Student Performance : Good, except some not using question example for answer reference Reflection for T&L: Give explanation with reference to question scenario

42 Paper 1B Qu 4 ~ (b) Sarah executes a SQL command on LOAN with four records, as shown below. SELECT STUID, COUNT(*) FROM LOAN GROUP BY STUID Student Performance : Good

43 Paper 1B Qu 4 ~ (c) Sarah wants to send a reminder to the students whose fines total more than $10. She uses column E to store Y if the is needed, and N otherwise. She enters a formula into E2 and then copies it to the other cells in column E. Write the formula in E2.Suggest a validation check on each of the following fields. Sarah enters the following formula into H3 and then copies it into H4:H5 so as to calculate the sum of all fines in each form. =SUMIF(C2:C160,$G$3, $D$2:$D$160) Student Performance : Poor, especially in Relative & Absolute Addressing Reflection for T&L: More effort on Excel Addressing

44 Paper 1B Qu 4 ~ (d) Sarah copies the worksheet into a document in a word processor by creating a dynamic link. For each of the following actions, is there any change in the worksheet? If yes, describe the change Student Performance : Good

45 Paper 1B Qu 4 ~ (e) Sarah creates a presentation file with hyperlinks and multimedia elements and posts it on the school s web site. A student downloads and opens the file. He finds some technical problems regarding the hyperlinks and multimedia elements. Describe two possible technical problems. Student Performance : Good

46 Paper 1B Qu 5 ~ (a) Student Performance : Good, student understand need of initialization, and some basic operation

47 Paper 1B Qu 5 ~ (a) Student Performance : Not good, some student not good in explaining change Reflection for T&L: More practice in describing change

48 Paper 1B Qu 5 ~ (c) In this sales promotion, ALG3 is used to calculate the actual payment, PAYMENT, for Mary. ALG3 includes ALG1 and ALG2. Complete ALG3. Student Performance : OK, but some not good in subprogram / modularizing the program Reflection for T&L: More practice in subprogram / modularizing the program

49 Paper 1B Qu 5 ~ (d) The department store has another sales promotion. The 20 members with the highest total spending each month can enjoy 20% off all year round. A computer application system is used to find these 20 members. Should the system be a single-user system or a multi-user system? Explain briefly. Should the system be a batch processing system or a real-time system? Explain briefly. Student Performance : Good

50 Briefing Session on 2013 HKDSE ICT Exam Paper 2A

51 Question 1

52 Question 1 Candidate Performance : (a) Very Good. (b) Satisfactory. (c) Satisfactory. Most candidates are able to manage simple SQL statements involving filtering, ordering and grouping. * Accept grouping field(s) is/are not the same as the field(s) in the select clause. * Accept TRUE, TRUE, TRUE and.t. to represent boolean data type.

53 Question 1 Candidate Performance : (d) Fair. (e) (i) Fair. (ii) Poor. (d) Some candidates cannot handle this more complicated SQL statement. Some of them cannot distinguish the usage of where clause and having clause and put aggregate function in the where clause. * Not Accept YEAR( ) = 2012 since the return of the function YEAR() is an integer. (e)(i) Some candidates directly explain the working flow of this SQL statement, but cannot show the background purpose of it. (e)(ii) Many candidates don t know how to use outer join. *Accept left outer join and left join *Not accept = NULL

54 Question 1 Candidate Performance : (e) (iii) Poor. Only a few candidates can answer MINUS / EXCEPT. Some candidates understand this question is asking for combining two SQL statements, but they only know the word UNION.

55 Question 2 Candidate Performance : (a) Fair. Some candidates don t know how to determine which is foreign key.

56 Question 2 Candidate Performance : (b) Poor. Many candidates don t know the usage of data dictionary.

57 Question 2 Candidate Performance : (c) Satisfactory Many candidates don t know why SQL View can be used to protect the data privacy.

58 Question 2 Candidate Performance : (d) Satisfactory (i) Most candidates can explain the problem, but they don t know the term referential integrity and the concept related to foreign key.

59 Question 3 Candidate Performance : Fair This is a very traditional question, but some candidates still don t understand the difference of usage between database and spreadsheet

60 Question 3 Candidate Performance : (b) Excellent Some candidate are weak at data representation, e.g. use 888 for an integer. * Accept , , 20/03/2013,#20/03/2013#,{20/03/2013} and * Not Accept 20/03/2013,

61 Question 3 Candidate Performance : (c) Satisfactory Many candidates know this suggestion can reduce the required storage size, but not many of them can answer the potential disadvantage with the concept of data validation.

62 Question 3 Candidate Performance : (d) Fair Most candidates don t know what should be done before data migration.

63 Question 4 Candidate Performance : (a) Good. Some candidates cannot identify the job title. Some candidates wrongly think programmer is responsible for designing the conceptual database schema.

64 Question 4 Candidate Performance : (b) Good * Get 1 mark when one of the entities is correct * Get 1 mark when one of the relationship is correct * Get 1 mark when one of the cardinality is correct

65 Question 4 Candidate Performance : (c) Satisfactory Many candidates can answer both advantage and disadvantage of the combination.

66 Question 4

67 Question 4 Candidate Performance : (d) Satisfactory (i) Most candidates know that the system should not disclose the name of buyers. (ii) Some candidates only concentrate on the ordering and don t know the provide proper information means to protect data privacy. MID should not be selected.

68 Question 4 Candidate Performance : (e) Satisfactory The majority of the candidates can answer correct subquery. (f) Fair Many candidates can answer this question.

69 Paper 2B Qu 1

70 Paper 2B Qu 1 (a) What does the value 80 after the colon in the URL mean? Network mask: Default gateway: Student Performance : Good, except some wrote 埠 wrongly Reflection for T&L: More practice in keywords

71 Paper 2B Qu 1 (b) function of the gateway benefit to Vicky of enabling VPN DHCP is used in the network. How does this help the network connection Student Performance : Poor, especially in VPN and DHCP. Some wrote their definition but not benefit Reflection for T&L: Clear concept between difference of definition vs advantage in using

72 Paper 2B Qu 1 (c) Suggest two changes in the settings of the router which would improve the security Vicky finds that the tablet computer is out of order. She buys a new one which is of the same model and uses the same settings as the old one. However she cannot connect it to the WiFi network. Why? What change in the settings of the router should she make? Student Performance : Good, knowing MAC is unique

73 Paper 2B Qu 1 (d) Vicky enables automatic channel selection instead of the fixed channels for the router. Why? Student Performance : Poor, most simply mentioned the benefit is automatics Reflection for T&L: Don t simply repeat wordings in the question

74 Paper 2B Qu 1 (e) Vicky has a notebook computer. The network supports wired and wireless connections. Vicky decides to use the wired connection for the notebook computer. Apart from bandwidth, suggest and describe two reasons to support her decision. Student Performance : Good

75 Paper 2B Qu 2

76 Paper 2B Qu 2 (a) Give an example of the analog data. Give an example of the digital data. Where does the conversion from analog data to digital data take place? Where does the conversion from digital data to analog data take place? Student Performance : Good

77 Paper 2B Qu 2 (b) Briefly describe the data flow in these cameras to illustrate the simplex mode. The security system uses synchronous transmission. Give one advantage and one disadvantage of using synchronous transmission. Student Performance : Poor, cannot well describe Reflection for T&L: Concept is simple, need more practice in describe

78 Paper 2B Qu 2 (c) Data captured by the cameras is stored on the server. Optical fibre instead of CAT5 cable is used for the new cameras but the network throughput does not improve. Give two upgrade suggestions for improving the network throughput Briefly describe the data flow in the new IP cameras, to illustrate the duplex mode. Student Performance : Good

79 Paper 2B Qu 2 (d) In each of the following cases, which protocol, UDP or TCP, should be used? Explain briefly. The visual images are sent to a server for storage. Security officers can instantly view the visual images of the lobby. Student Performance : Poor, cannot well describe Reflection for T&L: Need more practice in describe

80 Paper 2B Qu 3

81 Paper 2B Qu 3 (a) Describe two network tests that Mr Chan has to do during the testing stage. The museum plans to allow visitors to use their own mobile devices. Give two considerations that the museum should bear in mind before implementing this plan. Student Performance : Good, students show good ability in design test plan if objectives are clear For museum consideration, students answers are too technical

82 Paper 2B Qu 3 (b) One day, four APs are out of order. Problem encounter Relocation? Student Performance : Good

83 Paper 2B Qu 3 (c) An IT company will donate as many as APs Mr Chan wants. Someone suggests that Mr Chan should mount more APs, for example, one AP every 5 m2. Give two disadvantages of this suggestion Student Performance : Good, except some wrote need budget to buy Reflection for T&L: Care about EVERY word in the question

84 Paper 2B Qu 3 (d) Mr Chan needs to install Y instead of network cables for connecting X1 and X2 to the server. Give one reason to explain why network cables should not be used. What major task will X1 perform when interacting with the other five APs in the hall? Student Performance : Good

85 Paper 2B Qu 4

86 Paper 2B Qu 4 (a) Patients medical data is sent from the server to doctors messaging devices through the hospital s WiFi network instead of the public mobile network. Give two reasons to support the use of the WiFi network. Student Performance : Good

87 Paper 2B Qu 4 (b) Patients medical data collected from the medical sensors is sent to doctors messaging devices via the server. What are the major functions of the server regarding network management? Give two examples. Student Performance : Good

88 Paper 2B Qu 4 (c) Packet switching is used for the data transmission between the server and doctors messaging devices. Circuit switching should not be used in this case. Why not? Describe the packet switching mechanism for the data transmission. Student Performance : Poor, cannot well describe, and also not clear in packet vs circuit switching Reflection for T&L: Need more practice in describe, and more teaching in packet vs circuit switching

89 Paper 2B Qu 4 (d) The network design uses Cloud storage, that is, online storage managed by third parties through the Internet. Give two benefits of using Cloud storage Give two potential problems of using Cloud storage. Student Performance : Good

90 Paper 2B Qu 4 (e) The bedside device is a mobile device which allows a patient to move around the hospital with the device. It forms a personal area network (PAN) with medical sensors for communication, as shown below. Student Performance : Poor, student not have good knowledge in PAN Reflection for T&L: Need more teaching in PAN

91 2013 ICT Paper 2C

92 毋須安裝 / 可利用瀏覽器觀看電影 / 跨平台 ( 附註解 ) 下載 串流傳輸 網上觀看 容易發放更新版本 / 跨平台 ( 附註解 ) 有效管理客戶或電影記錄 / 防止電影被下載

93 兼容很多常用視像放器 / 毋須額外 Codec / 質量較佳 ( 需要較少壓縮 ) 毋須 Codec 檔案較大 / 不支援串流傳輸

94 較短等候時間 節省時間 ( 硬件 ) 圖形顯示卡的運算能力差 / 沒有足夠記憶體 沒有更新 不夠好 ( 網絡 ) 顧客電腦的網絡頻寬不足 / 伺服器因繁忙未及回應 / 網絡十分繁忙

95 / 200 或 60 8 / 200 = bit/s 或 2.4 Mbps (2.5Mbps)

96 MP4 / MKV / AVI (H264, AVCHD) / WMV / FLV / MOV (, ) codec, FFmpeg, DivX, Xvid, x264, mpeg

97 每秒掃瞄行數 ( 高度 ) 解像度 每秒掃瞄像素數目 / 幀數目 像素寬度 在逐行視像中, 幀內所有行線逐行更新 逐行更新 在交錯視像中, 幀內所有行線隔行更新 一個一個 ( 層 ) 改變

98 Q.2 是 否 是 是 否 否

99

100 這兩個瀏覽器對某些 HTML 編碼的翻譯不同 / 這兩個瀏覽器於墊或邊界的設定不同 表格 / 幀 (frame) / CSS / 圖像 / 層面 (layer) (, )

101 搜尋器加入搜尋索引時採用這些數據 / 彼得打算增加被搜尋器搜尋得到的機會 / 定義字符編碼格式 網頁 / 關鍵字 / 標題 / 作者 / 版權 / 產生日期 / 字符編碼 / 網頁更新 / 轉發 (, ) ( 附描述 ) ( 其他可行用途 )

102 位元 = 51 / 51.3 / MB 幀速率 / 解像度 / 檔案格式 / 過渡效果 / 音效 / 字幕 (,, )

103 HKDSE ICT Paper 2C Q.3-4

104 防止傀儡程式讀取這些文字 / 確保這項回應是由真人發出 / 防止註冊或輸入資料由軟件自動產生 ( 防止點客攻擊 / 防止複製及貼上 )

105 它可由布拉耶 / 布萊葉閱讀器 / 讀屏軟件讀取 ( 盲人可使用替換文字 ) 透過聲效讀出驗證碼內容 ( 聲效驗證 )

106 ( 電腦 / 瀏覽器 ) 向用戶名稱 ( 或其他輸入欄 ) 採用客戶端手稿程式 ( 本機 / JavaScript),(1) 以檢測其輸入是否空白 (+1) 向用戶名稱 ( 或其他輸入欄 ) 採用伺服器端手稿程式 ( 數據庫 ), (1) 以檢驗客戶的真確性 / 使用者名稱與密碼是否有效 (+1)

107

108 缺點 1: 用戶可沒有正確輸入歌曲的代碼 (1) 方案 1: 當按下表單上的歌曲時將代碼自動加入 / 在每一行歌上加入一個 加入購物籃 按鈕 / 在歌曲側加入一個複選框 (+1) ( 利用下拉式選單 ) 缺點 2: 用戶所揀選的歌曲沒有顯示, 他不能刪除或修改 / 用戶未能檢視所選購的歌曲 (1) 方案 2: 加入一個表格來展示所揀選的歌曲, 並容許作任何修改 (+1) ( 加入一個重設 / 復原按鈕 ) 其他可行答案 : 歌曲不是順序排列 (1) 加入一項排序功能 / 搜尋功能 (+1)

109 ( 缺點 : 用戶每次只可輸入一個代碼 / 該文字欄太短 / 繼續購買 按鈕沒有用處 / 用戶每次只可購買一首歌曲 / 不能自動運算總金額 只有歌曲名稱, 不清楚由那個歌手唱 方案 : 加入一個數量欄 / 加入一個歌手欄 / 加入試聽連結 )

110 在一秒內取出 44,100 個樣本 ( ) 每個樣本由 16 個位元數據組成 / 每個樣本大小為 16 個位元 它可產生從四方收集的聲音, 如自然發出的聲音, 富人性化 / 利用兩個聲道 ( 左右兩邊 ) 收錄聲音 可播放出栩栩如生的歌曲 / 錄播的歌曲接近真人現場演唱 ( 質量較佳 / 聲音佳 / 清晰地收錄聲音 / 有兩道聲道 )

111 相位 phase 振幅 Amplitude / 聲量 loudness / volume ( 檔案類型 / 檔案格式 / 壓縮方法 / 時段 / 長度 )

112

113 有一些活動的名稱冗長, 它們可清楚地展示出來 / 寬度 / 顯示面積較細, 適合於手提電話 / 流動裝置使用 (2) 當有很多不同活動時, 此項設計可固定所展示活動清單的長度, 以供選擇 / 所選擇的活動可清楚地展示 (2) 顯示一對話框來確認有關選擇 (1)

114 加入一個 取消勾選 / 重設 按鈕, (1) 取消所選擇的項目, 讓用戶可簡單地重新選擇 / 減少重新載入此網頁的時間 (+1)

115

116

117 2013 HKDSE ICT-D workshop

118 Q1

119 Q1

120 Q1

121 Q1

122 Q2

123 Q2

124 Q2

125 Q2

126 Q3

127 Q3

128 Q3

129 Q3

130 Q4

131 Q4

132 Q4

133 Q4

Oxford isolution. 下載及安裝指南 Download and Installation Guide

Oxford isolution. 下載及安裝指南 Download and Installation Guide Oxford isolution 下載及安裝指南 Download and Installation Guide 系統要求 個人電腦 Microsoft Windows 10 (Mobile 除外 ) Microsoft Windows 8 (RT 除外 ) 或 Microsoft Windows 7 (SP1 或更新版本 ) ( 網上下載 : http://eresources.oupchina.com.hk/oxfordisolution/download/index.html)

More information

桌上電腦及筆記本電腦安裝 Acrobat Reader 應用程式

桌上電腦及筆記本電腦安裝 Acrobat Reader 應用程式 On a desktop or notebook computer Installing Acrobat Reader to read the course materials The Course Guide, study units and other course materials are provided in PDF format, but to read them you need a

More information

港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統.

港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統. 港專單一登入系統 (SSO) 讓本校的同學, 全日制及兼職老師只要一個登入帳戶, 便可同時使用由本校提供的網上系統及服務, 包括 Blackboard 網上學習平台, 港專電郵服務, 圖書館電子資料庫及其他教學行政系統. 港專單一登入網站網址 http://portal.hkct.edu.hk (HKCT 之教職員, 學生 ) http://portal.ctihe.edu.hk (CTIHE 之教職員,

More information

SSL VPN User Manual (SSL VPN 連線使用手冊 )

SSL VPN User Manual (SSL VPN 連線使用手冊 ) SSL VPN User Manual (SSL VPN 連線使用手冊 ) 目錄 前言 (Preface) 1. ACMICPC 2018 VPN 連線說明 -- Pulse Secure for Windows ( 中文版 ):... 2 2. ACMICPC 2018 VPN 連線說明 -- Pulse Secure for Linux ( 中文版 )... 7 3. ACMICPC 2018

More information

PC Link Mode. Terminate PC Link? Esc. [GO]/[Esc] - - [GO]/[Esc] 轉接座未放滿. Make auto accord with socket mounted? [GO]/[Esc] Copy to SSD E0000

PC Link Mode. Terminate PC Link? Esc. [GO]/[Esc] - - [GO]/[Esc] 轉接座未放滿. Make auto accord with socket mounted? [GO]/[Esc] Copy to SSD E0000 Start SU-6808 EMMC Programmer V.0bd7 [ ]Link PC / [ ]Menu [ ] >.Select project.make new project.engineer mode.reset counter 5.Link to PC [ ] PC disconnected PC connected Select project SEM0G9C_A.prj Terminate

More information

2009 OB Workshop: Structural Equation Modeling. Changya Hu, Ph.D. NCCU 2009/07/ /07/03

2009 OB Workshop: Structural Equation Modeling. Changya Hu, Ph.D. NCCU 2009/07/ /07/03 Amos Introduction 2009 OB Workshop: Structural Equation Modeling Changya Hu, Ph.D. NCCU 2009/07/02- 2 Contents Amos Basic Functions Observed Variable Path Analysis Confirmatory Factor Analysis Full Model

More information

一般來說, 安裝 Ubuntu 到 USB 上, 不外乎兩種方式 : 1) 將電腦上的硬碟排線先予以排除, 將 USB 隨身碟插入主機, 以一般光碟安裝方式, 將 Ubuntu 安裝到 USB

一般來說, 安裝 Ubuntu 到 USB 上, 不外乎兩種方式 : 1) 將電腦上的硬碟排線先予以排除, 將 USB 隨身碟插入主機, 以一般光碟安裝方式, 將 Ubuntu 安裝到 USB Ubuntu 是新一代的 Linux 作業系統, 最重要的是, 它完全免費, 不光是作業系統, 連用軟體都不必錢 為什麼要裝在 USB 隨身碟上? 因為, 你可以把所有的軟體帶著走, 不必在每一台電腦上重新來一次, 不必每一套軟體裝在每一台電腦上都要再一次合法授權 以下安裝方式寫的是安裝完整的 Ubuntu- 企業雲端版本 V. 11.10 的安裝過程, 若是要安裝 Desktop 版本, 由於牽涉到

More information

Figure 1 Microsoft Visio

Figure 1 Microsoft Visio Pattern-Oriented Software Design (Fall 2013) Homework #1 (Due: 09/25/2013) 1. Introduction Entity relation (ER) diagrams are graphical representations of data models of relation databases. In the Unified

More information

Twin API Guide. How to use Twin

Twin API Guide. How to use Twin Twin API Guide How to use Twin 1 目錄 一 Cycle Job------------------------------------------------------------------------------------P3 二 Twin Action Table-----------------------------------------------------------------------P4-5

More information

購票流程說明 How To purchase The Ticket?

購票流程說明 How To purchase The Ticket? 購票流程說明 How To purchase The Ticket? 步驟 1: 點選 登入 Click 登入 Login (You have to login before purchasing.) 步驟 2: 若已是會員請填寫會員帳號 密碼, 點選 登入 若非會員請點選 註冊 If you are the member of PB+, Please login. If not, please register.

More information

RENESAS BLE 實作課程 Jack Chen Victron Technology CO., LTD 2015 Renesas Electronics Corporation. All rights reserved.

RENESAS BLE 實作課程 Jack Chen Victron Technology CO., LTD 2015 Renesas Electronics Corporation. All rights reserved. RENESAS BLE 實作課程 2016-01-21 Jack Chen Jack.chen@victron.com.tw Victron Technology CO., LTD AGENDA CS+ & Renesas Flash Programmer 安裝 3 Renesas Flash Programmer 燒錄介紹 6 CS+ 介面介紹 11 CS+ 開啟 Project & 使用教學 14

More information

UAK1-C01 USB Interface Data Encryption Lock USB 資料加密鎖. Specifications for Approval

UAK1-C01 USB Interface Data Encryption Lock USB 資料加密鎖. Specifications for Approval Product Definition C-MING Product Semi-finished Product OEM/ODM Product Component USB Interface Data Encryption Lock USB 資料加密鎖 Specifications for Approval Approval Manager Issued By Revision History Revision

More information

The notice regarding Participation Ways of our global distributor video conference on Feb. 5.

The notice regarding Participation Ways of our global distributor video conference on Feb. 5. The notice regarding Participation Ways of our global distributor video conference on Feb. 5. On Feb.5, 2010 Los Angeles time, between 5:00 PM - 7:00 PM, we will convene an important global distributor

More information

外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System. [ 中文版 ] [English Version]

外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System. [ 中文版 ] [English Version] 外薦交換生線上申請系統操作說明 Instruction on Exchange Student Online Application System [ 中文版 ] [English Version] 線上申請流程說明 申請系統網址 : http://schwebap.nccu.edu.tw/zeweb/exgstdapply/ 1. 建立新帳號 : 請輸入姓名 生日 email 做為未來登入系統用

More information

全面強化電路設計與模擬驗證. Addi Lin / Graser 2 / Sep / 2016

全面強化電路設計與模擬驗證. Addi Lin / Graser 2 / Sep / 2016 全面強化電路設計與模擬驗證 Addi Lin / Graser 2 / Sep / 2016 Agenda OrCAD Design Solution OrCAD Capture 功能應用 OrCAD Capture CIS 介紹 OrCAD PSpice 模擬與驗證 OrCAD Design Solution Powerful and Widely Used Design Solution Front-to-Back

More information

Version Control with Subversion

Version Control with Subversion Version Control with Subversion 指導教授郭忠義 邱茂森 95598051 1 Table of contents (1) Basic concepts of subversion (1)What is Subversion (2)Version Control System (3)Branching and tagging (4) Repository and Working

More information

Protech RMA Request Form

Protech RMA Request Form Applied Company: Contact Person: E-mail: DOA NO. (BY PROTECH BU): Serial Warrant No. Model Number y Status 1 2 3 4 5 6 7 Protech RMA Request Form *Defect Description Date: Page:1 of 1 DOA Regular RMA Environmen

More information

English G H. Package Contents. Hardware Requirements. Technical Specifications. Device Overview. MSI DS502 GAMING HEADSET User Guide

English G H. Package Contents. Hardware Requirements. Technical Specifications. Device Overview. MSI DS502 GAMING HEADSET User Guide Package Contents MSI DS502 GAMING HEADSET User Guide Hardware Requirements PC with USB port Windows 8.1/8/7/XP English Technical Specifications Headphones * Drivers : Ø40mm * Sensitivity (S.P.L) : 105

More information

Digital imaging & free fall of immersed sphere with wall effects

Digital imaging & free fall of immersed sphere with wall effects 量測原理與機工實驗 ( 下 ) 熱流實驗 ( 一 ) Digital imaging & free fall of immersed sphere with wall effects May 14-18, 2012 Objective: This week s lab work has two parts: (1) how to record digital video and convert it

More information

Chapter 7. Digital Arithmetic and Arithmetic Circuits. Signed/Unsigned Binary Numbers

Chapter 7. Digital Arithmetic and Arithmetic Circuits. Signed/Unsigned Binary Numbers Chapter 7 Digital Arithmetic and Arithmetic Circuits Signed/Unsigned Binary Numbers Signed Binary Number: A binary number of fixed length whose sign (+/ ) is represented by one bit (usually MSB) and its

More information

Increase Productivity and Quality by New Layout Flow

Increase Productivity and Quality by New Layout Flow Increase Productivity and Quality by New Layout Flow Jonathan / Graser 16 / Oct / 2015 Design Process Introduction CONSTRAINTS PLACEMENT FANOUT BREAKOUT ROUTING DELAY (ATE) NET-GROUP Topology & Delay Physical

More information

C B A B B C C C C A B B A B C D A D D A A B D C C D D A B D A D C D B D A C A B

C B A B B C C C C A B B A B C D A D D A A B D C C D D A B D A D C D B D A C A B 高雄市立右昌國中 106 學年度第二學期第二次段考三年級考科答案 國文科 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. C B D C A C B A D B 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. D C B A D C A B D B 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. C B D C B B C

More information

CLAD 考前準備 與 LabVIEW 小技巧

CLAD 考前準備 與 LabVIEW 小技巧 CLAD 考前準備 與 LabVIEW 小技巧 NI 技術行銷工程師 柯璟銘 (Jimmy Ko) jimmy.ko@ni.com LabVIEW 認證 Certified LabVIEW Associate Developer (LabVIEW 基礎認證 ) Certified LabVIEW Associate Developer LabVIEW 全球認證 40 題 (37 題單選,3 題複選

More information

Multimedia Service Support and Session Management 鍾國麟

Multimedia Service Support and Session Management 鍾國麟 Multimedia Service Support and Session Management 鍾國麟 2003-9-31 1 1 Agenda Introduction What is Session? Definition Functions Why need Session Management 2G,Internet,3G SIP Basic Operation User Location

More information

Frame Relay 訊框中繼 FRSW S0/0 S0/1

Frame Relay 訊框中繼 FRSW S0/0 S0/1 Frame Relay 訊框中繼 將路由器設定為訊框中繼交換器以進行 frame relay 實驗 : 首先練習設定兩個埠的 frame relay switch FRSW S0/0 S0/1 介面 S0/0 介面 S0/1 102 201 DLI 102 DLI 201 Router(config)# hostname FRSW FRSW(config)# frame-relay switching

More information

What is a Better Program?

What is a Better Program? 軟體的特性 What is a Better Program? 軟體之所謂軟 因為沒有 硬性 不可變 不可挑戰的規則 好處 : 彈性很大, 山不轉路轉, 沒有標準答案, 正常運作就好 C++ Object Oriented Programming 壞處 : 很多小問題合在一起不斷放大, 到處藏污納垢, 沒有標準答案, 不知道到底對了沒有 解決方法 Pei-yih Ting Coding styles

More information

購票流程說明 How To purchase The Ticket?

購票流程說明 How To purchase The Ticket? 購票流程說明 How To purchase The Ticket? 步驟 1: 已是會員請點選 登入, 選擇 2016 WTA 臺灣公開賽 Taiwan Open tickets Step1:If You are the member, please Click 登入 Click to the column: 2016 WTA 臺灣公開賽 Taiwan Open tickets Click 登入

More information

Lotusphere Comes to You 輕鬆打造 Web 2.0 入口網站 IBM Corporation

Lotusphere Comes to You 輕鬆打造 Web 2.0 入口網站 IBM Corporation 輕鬆打造 Web 2.0 入口網站 2007 IBM Corporation 議程 Web 2.0 新特性一覽 Web 2.0 入口網站主題開發 用戶端聚合技術 PortalWeb2 主題 開發 AJAX portlets 程式 總結 JSR 286 及 WSRP 2.0 對 AJAX 的支援 AJAX 代理 用戶端 portlet 編程模型 Web 2.0 特性一覽 WP 6.1 提供的 Web

More information

Preamble Ethernet packet Data FCS

Preamble Ethernet packet Data FCS Preamble Ethernet. packet Data FCS Destination Address Source Address EtherType Data ::: Preamble. bytes. Destination Address. bytes. The address(es) are specified for a unicast, multicast (subgroup),

More information

Java 程式設計基礎班 (7) 莊坤達台大電信所網路資料庫研究室. Java I/O. Class 7 1. Class 7 2

Java 程式設計基礎班 (7) 莊坤達台大電信所網路資料庫研究室. Java I/O.   Class 7 1. Class 7 2 Java 程式設計基礎班 (7) 莊坤達台大電信所網路資料庫研究室 Email: doug@arbor.ee.ntu.edu.tw Class 7 1 回顧 Java I/O Class 7 2 Java Data Structure 動態資料結構 Grow and shrink at execution time Several types Linked lists Stacks Queues Binary

More information

Software Architecture Case Study: Applying Layer in SyncFree

Software Architecture Case Study: Applying Layer in SyncFree Software Architecture Case Study: Applying Layer in SyncFree Chien-Tsun Chen Department of Computer Science and Information Engineering National Taipei University of Technology, Taipei 06, Taiwan ctchen@ctchen.idv.tw

More information

微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹

微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹 微軟商務用 Skype 雲端視訊會議及與所需頻寬介紹 傳統視訊會議 : 視訊會議解決方案 以硬體設備為主, 內建專屬視訊會議軟體, 要增加連線數量就必須加購昂貴的 MCU Server, 整套設備的價格多在數百萬之譜 軟體式視訊會議 : 在現有的基礎設備上, 強化整合通訊功能 (UC), 再結合視訊會議功能 (VC, Video Conference), 對於公司的網路系統或是通訊系統做更有效率的運用

More information

Quick Installation Guide for Connectivity Adapter Cable CA-42

Quick Installation Guide for Connectivity Adapter Cable CA-42 9235663_CA42_1_en.fm Page 1 Monday, September 13, 2004 11:26 AM Quick Installation Guide for Connectivity Adapter Cable CA-42 9235645 Issue 1 Nokia, Nokia Connecting People and Pop-Port are registered

More information

EZCast Docking Station

EZCast Docking Station EZCast Docking Station Quick Start Guide Rev. 2.00 Introduction Thanks for choosing EZCast! The EZCast Docking Station contains the cutting-edge EZCast technology, and firmware upgrade will be provided

More information

EZCast Wire User s Manual

EZCast Wire User s Manual EZCast Wire User s Manual Rev. 2.01 Introduction Thanks for choosing EZCast! The EZCast Wire contains the cutting-edge EZCast technology, and firmware upgrade will be provided accordingly in order to compatible

More information

Invitation to Computer Science 5 th Edition. Chapter 8 Information Security

Invitation to Computer Science 5 th Edition. Chapter 8 Information Security Invitation to Computer Science 5 th Edition Chapter 8 Information Security CIA Triad of Information Security Ensuring that data can be modified only by appropriate mechanisms Ensuring that data is protected

More information

Java 程式設計基礎班 (7) 劉根豪台大電機所網路資料庫研究室. Java I/O. Class 7 1. Class 7

Java 程式設計基礎班 (7) 劉根豪台大電機所網路資料庫研究室. Java I/O.   Class 7 1. Class 7 Java 程式設計基礎班 (7) 劉根豪台大電機所網路資料庫研究室 Email: kenliu@arbor.ee.ntu.edu.tw 1 回顧 Java I/O 2 1 Java Data Structure 動態資料結構 執行的時候可以動態變大或縮小 類型 Linked lists Stacks Queues Binary trees 3 自我參考類別 (self-referential classes)

More information

黃河凱. Kaiser Huang 巨匠電腦北區 / 新竹認證中心認證講師國立新竹教育大學數位學習科技研究所在職生微軟原廠認證講師 MCT

黃河凱. Kaiser Huang 巨匠電腦北區 / 新竹認證中心認證講師國立新竹教育大學數位學習科技研究所在職生微軟原廠認證講師 MCT 黃河凱 Kaiser Huang 巨匠電腦北區 / 新竹認證中心認證講師國立新竹教育大學數位學習科技研究所在職生微軟原廠認證講師 MCT 2007-2014 微軟嵌入式系統 TTT 教育認證講師 kai168@gmail.com. MCT, MCITP-SA/EA, MCTS-WS2008/CE6/XPe, LPIC 第一堂 : 系統安裝與升級設定的簡介 全新式安裝的步驟與方法 從 DVD 或 USB

More information

Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP)

Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP) Chapter 4 (Part IV) The Processor: Datapath and Control (Parallelism and ILP) 陳瑞奇 (J.C. Chen) 亞洲大學資訊工程學系 Adapted from class notes by Prof. M.J. Irwin, PSU and Prof. D. Patterson, UCB 4.10 Instruction-Level

More information

InTANK ir2771-s3 ir2772-s3. User Manual

InTANK ir2771-s3 ir2772-s3. User Manual InTANK ir2771-s3 ir2772-s3 User Manual » InTANK...1» InTANK ir2771-s3 & ir2772-s3 產品使用說明... 10 V1.1 Introduction Thank you for purchasing RAIDON products. This manual will introduce the InTANK ir2771-s3

More information

EZCast Wire. User s Manual. Rev. 2.00

EZCast Wire. User s Manual. Rev. 2.00 EZCast Wire User s Manual Rev. 2.00 Introduction Thanks for choosing EZCast! The EZCast Wire contains the cutting-edge EZCast technology, and firmware upgrade will be provided accordingly in order to compatible

More information

Chapter 7. Signed/Unsigned Binary Numbers. Digital Arithmetic and Arithmetic Circuits. Unsigned Binary Arithmetic. Basic Rules (Unsigned)

Chapter 7. Signed/Unsigned Binary Numbers. Digital Arithmetic and Arithmetic Circuits. Unsigned Binary Arithmetic. Basic Rules (Unsigned) Chapter 7 Digital rithmetic and rithmetic Circuits igned/unsigned inary Numbers igned inary Number: binary number of fixed length whose sign (+/ ) is represented by one bit (usually M) and its magnitude

More information

DVS-8501E/DVS-8501E-H 單路 H.264 數位影像編碼器

DVS-8501E/DVS-8501E-H 單路 H.264 數位影像編碼器 DVS-8501E/DVS-8501E-H 單路 H.264 數位影像編碼器 1 LEGAL The information in this publication has been carefully checked and is believed to be entirely accurate at the time of publication. CTC Union Technologies

More information

DVS-8504E-H 四路 H.264 數位影像編碼器

DVS-8504E-H 四路 H.264 數位影像編碼器 DVS-8504E-H 四路 H.264 數位影像編碼器 1 LEGAL The information in this publication has been carefully checked and is believed to be entirely accurate at the time of publication. CTC Union Technologies assumes no

More information

EdConnect and EdDATA

EdConnect and EdDATA www.hkedcity.net Tryout Programme of Standardised Data Format for e-textbook and e-learning Platform EdConnect and EdDATA 5 December 2018 Agenda Introduction and background Try-out Programme Q&A 電子課本統一數據格式

More information

David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation

David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation David M. Kroenke and David J. Auer Database Processing Fundamentals, Design, and Implementation Chapter Six: Transforming Data Models into Database Designs 6-1 Chapter Objectives To understand how to transform

More information

用於網頁版權保護的資訊隱藏方法. A Steganographic Method for Copyright Protection of Web Pages

用於網頁版權保護的資訊隱藏方法. A Steganographic Method for Copyright Protection of Web Pages 用於網頁版權保護的資訊隱藏方法 A Steganographic Method for Copyright Protection of Web Pages Ya-Hui Chang( 張雅惠 ) and Wen-Hsiang Tsai( 蔡文祥 ) Department of Computer & Information Science National Chiao Tung University

More information

第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著

第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著 第九章結構化查詢語言 SQL - 資料定義語言 (DDL) 資料庫系統設計理論李紹綸著 SQL 的資料定義語言 本章內容 建立資料表 修改資料表 刪除資料表 FOREIGN KEY 外鍵條件約束與資料表關聯性 2 資料定義語言可分為下列三種 : SQL 的資料定義語言 CREATE TABLE 指令 : 用來建立一個基底關聯表, 和設定關聯表相關的完整性限制 CREATE VIEW 指令 : 用來建立一個視界,

More information

虛擬機 - 惡意程式攻防的新戰場. 講師簡介王大寶, 小時候大家叫他王小寶, 長大後就稱王大寶, 目前隸屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚上都在打 Game. 長期於系統最底層打滾, 熟悉 ASM,C/C++,

虛擬機 - 惡意程式攻防的新戰場. 講師簡介王大寶, 小時候大家叫他王小寶, 長大後就稱王大寶, 目前隸屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚上都在打 Game. 長期於系統最底層打滾, 熟悉 ASM,C/C++, 王大寶, PK 虛擬機 - 惡意程式攻防的新戰場 講師簡介王大寶, 小時候大家叫他王小寶, 長大後就稱王大寶, 目前隸屬一神祕單位. 雖然佯稱興趣在看書與聽音樂, 但是其實晚上都在打 Game. 長期於系統最底層打滾, 熟悉 ASM,C/C++, 對於資安毫無任何興趣, 也無經驗, 純粹是被某壞人騙上台, 可以說是不可多得的素人講師!! 議程大綱 : 現今的 CPU 都支援虛擬化專用指令集, 讓 VM

More information

Allegro SPB V16 Advance

Allegro SPB V16 Advance Allegro SPB V16 Advance Allegro SPB 16.2 Advance Import Logic Back Annotate Netlist Compare Advanced Placement Constraint Management Differential Pair Import Logic Other Cadence Import Logic Other 利用 Other

More information

BTC, EMPREX Wireless Keybaord +Mouse + USB dongle. 6309URF III Quick Installation Guide

BTC, EMPREX Wireless Keybaord +Mouse + USB dongle. 6309URF III Quick Installation Guide BTC, EMPREX 6309URF III Quick Installation Guide Hardware Installation 1. Plug the dongle receiver connector into your available USB port on PC. 2. Make sure the batteries of the keyboard and mouse are

More information

Briefing Session on 2014 HKDSE ICT Exam. 28/29 Nov 2014

Briefing Session on 2014 HKDSE ICT Exam. 28/29 Nov 2014 Briefing Session on 2014 HKDSE ICT Exam 28/29 Nov 2014 1 Programme Introduction Paper 1A, Paper 1B, Paper 2A Break Paper 2B, Paper 2C, Paper 2D Q & A 2 Breakdown of elective No. of candidates 1 7,400 2A

More information

JAVA Programming Language Homework V: Overall Review

JAVA Programming Language Homework V: Overall Review JAVA Programming Language Homework V: Overall Review ID: Name: 1. Given the following Java code: [5 points] 1. public class SimpleCalc { 2. public int value; 3. public void calculate(){ value = value +

More information

4Affirma Analog Artist Design Flow

4Affirma Analog Artist Design Flow 4Affirma Analog Artist Design Flow Getting Started 1. 登入工作站 : Username : trainaxx Password : train0xx 其中 XX 代表工作站名字的號碼, 例如工作站名字叫做 traina01 的話,XX 就是 01 2. 先確定是否進入 Solaris 作業系統的 Common Desktop Environment(CDE)

More information

使用 TensorFlow 設計矩陣乘法計算並轉移執行在 Android 上 建國科技大學資管系 饒瑞佶 2017/8

使用 TensorFlow 設計矩陣乘法計算並轉移執行在 Android 上 建國科技大學資管系 饒瑞佶 2017/8 使用 TensorFlow 設計矩陣乘法計算並轉移執行在 Android 上 建國科技大學資管系 饒瑞佶 2017/8 Python 設計 Model import tensorflow as tf from tensorflow.python.tools import freeze_graph from tensorflow.python.tools import optimize_for_inference_lib

More information

游家德 Jade Freeman 群智信息 / 敦群數位資深架構顧問

游家德 Jade Freeman 群智信息 / 敦群數位資深架構顧問 游家德 Jade Freeman 群智信息 / 敦群數位資深架構顧問 搜尋對企業的需求方案關係 微軟全面性的搜尋方案及應用價值 Enterprise Search 的基本架構 Microsoft Search Solution 物件模型與客製開發 Microsoft Search Solution 應用與案例 Q&A 每人每天會花 10 分鐘在找企業所需文件, 且還可能找不到! 整合的資料大都雜亂無章,

More information

InTANK ir2622 User Manual

InTANK ir2622 User Manual InTANK ir2622 User Manual » InTANK...1» InTANK ir2622 產品使用說明... 12 V1.2 » InTANK Introduction Thank you for purchasing RAIDON products. This manual will introduce the InTANK ir2622 Series. Before using

More information

Citrix CloudGateway. aggregate control. all apps and data to any device, anywhere

Citrix CloudGateway. aggregate control. all apps and data to any device, anywhere Citrix CloudGateway aggregate control all apps and data to any device, anywhere Agenda 1. What s Cloud Gateway? 2. Cloud Gateway Overview 3. How it works? What s Cloud Gateway? It s all about the apps

More information

Operating Systems 作業系統

Operating Systems 作業系統 Chapter 7 Operating Systems 作業系統 7.1 Source: Foundations of Computer Science Cengage Learning Objectives 學習目標 After studying this chapter, students should be able to: 7.2 Understand the role of the operating

More information

Quick Installation Guide

Quick Installation Guide WiPG-1500 Quick Installation Guide Version: 9.0 Date: Jul 11, 2013 1 1. Package Contents WiPG-1500 device Plug&Show USB token Power Adapter (DC +5V, 2.5A) Wi-Fi Antenna x 2 Wall-mount Kit (screw x4, bracket

More information

VB 拼圖應用 圖形式按鈕屬性 資科系 林偉川

VB 拼圖應用 圖形式按鈕屬性 資科系 林偉川 VB 拼圖應用 資科系 林偉川 圖形式按鈕屬性 Style 屬性 0 ( 標準外觀 ),1( 圖片外觀 ) Picture 屬性 圖形檔案 (VB6) image 屬性 圖形檔案 (VB.NET) Left=Top=0 Width=2052,Height=2052 共有九張圖 1.jpg 9.jpg Form1 執行時視窗為最大化 Windowstate 設為 2 2 1 執行結果 3 path$

More information

步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner.

步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner. 步驟 1: 首頁以 facebook 或 google 帳號登入, 並點選節目 Step 1:Log in with your facebook/google account, then click the show banner. 步驟 2: 填寫會員資料 Step 2:Fill out the membership form. Name ID No. Male/female Foreigner

More information

Mid-term EXAM. 11/14/2009

Mid-term EXAM. 11/14/2009 Mid-term EXAM. 11/14/2009 1. (15%) Data Compression a) Encode the following characters using Huffman coding with the given frequencies: A(12), B(8), C(9), D(20), E(31), F(14), G(8) (-1 point if theree

More information

InTANK ir2623-s3 User Manual

InTANK ir2623-s3 User Manual InTANK ir2623-s3 User Manual » InTANK...1» InTANK ir2623-s3 產品使用說明...12 V1.0 » InTANK Introduction Thank you for purchasing RAIDON products. This manual will introduce the IR2623-S3 Series. Before using

More information

MP3 Codec Design 吳炳飛教授. Chaotic Systems & Signal Processing Lab, CSSP Lab. CSSP Lab:

MP3 Codec Design 吳炳飛教授. Chaotic Systems & Signal Processing Lab, CSSP Lab. CSSP Lab: MP3 Codec Design 吳炳飛教授 國立交通大學 電機與控制工程學系 CSSP Lab: http://cssp.cn.nctu.edu.tw Chaotic Systems & Signal Processing Lab, CSSP Lab July 5, 2004 Chapter 1 Introduction to MP3 Chapter 1: Introduction to MP3

More information

AVG Anti-Virus User Manual. Document revision ( )

AVG Anti-Virus User Manual. Document revision ( ) AVG Anti-Virus 2012 User Manual Document revision 2012.01 (27.7.2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This product

More information

SOHOTANK PD3500+ User Manual

SOHOTANK PD3500+ User Manual SOHOTANK PD3500+ User Manual » SOHORAID SR2 Series User Manual.3» SOHORAID SR2 系列產品使 用說明.. 14 2 Introduction Thank you for purchasing STARDOM products. This manual will introduce the SOHOTANK PD3500+ Series.

More information

Important Safety Instructions

Important Safety Instructions Quick Start Guide It's important to read this user manual prior to using your new product for the first time. Important Safety Instructions Electrical Device Warning Do not use the laptop in the environment

More information

Scale of Fees (Applicable from 18 June 2017) Data Access Request consists of (i) Data Enquiry Request and (ii) Copy of Personal Medical Records

Scale of Fees (Applicable from 18 June 2017) Data Access Request consists of (i) Data Enquiry Request and (ii) Copy of Personal Medical Records Grantham Hospital Health Information & Records Office G/F, Main Block, 125 Wong Chuk Hang Road, Aberdeen, Hong Kong Tel.: 2518 2203 Fax: 2555 7319 Opening hours: Monday - Friday: 9 a.m. to 1 p.m. and 2:00

More information

Additional Information

Additional Information Additional Information Apple, ipad, iphone, ipod touch, Macintosh, Mac OS, OS X and Bonjour are trademarks of Apple Inc., registered in the U.S. and other countries. AirPrint and the AirPrint logo are

More information

利用數據與軟體瞭解 讀者行為使用分析與服務平台選項

利用數據與軟體瞭解 讀者行為使用分析與服務平台選項 By using the data and software analysis to study the user experience & the option for the service platform in library field. 利用數據與軟體瞭解 讀者行為使用分析與服務平台選項 周頡 Jeremy Chou EBSCO Information Services Sales Director

More information

無線寬頻的演進與數位匯流的大未來 台灣大哥大股份有限公司技術群阮得晉副總經理

無線寬頻的演進與數位匯流的大未來 台灣大哥大股份有限公司技術群阮得晉副總經理 無線寬頻的演進與數位匯流的大未來 台灣大哥大股份有限公司技術群阮得晉副總經理 Taiwan Mobile Co. Ltd 2 Global Mobile Broadband Market Example: AT&T AT&T 50x Mobile Data Traffic Increase in Past 3 Years (,000) 5,000 AT&T Mobile Data Traffic Growth,

More information

C A R I T A S M E D I C A L C E N T R E 明愛醫院 Rev. (A) (B) (C) (D) D A T A A C C E S S R E Q U E S T ( D A R ) 查閱資料要求申請須知

C A R I T A S M E D I C A L C E N T R E 明愛醫院 Rev. (A) (B) (C) (D) D A T A A C C E S S R E Q U E S T ( D A R ) 查閱資料要求申請須知 C A R I T A S M E D I C A L C E N T R E 明愛醫院 Rev. D A T A A C C E S S R E Q U E S T ( D A R ) 查閱資料要求申請須知 18 June 2017 (A) (B) (C) Under normal circumstances, the requested personal data will be sent to

More information

研華公司 H 營運成果與財務報告

研華公司 H 營運成果與財務報告 研華公司 2018 1H 營運成果與財務報告 2018 年 8 月 09 日綜合經營管理總經理陳清熙 Eric.chen@advantech.com.tw Safe Harbor Notice This presentation contains forward-looking statements and is subject to risks and uncertainties. Actual

More information

User s Manual / 使用手冊 Model : TIP-M200ST-BK

User s Manual / 使用手冊 Model : TIP-M200ST-BK User s Manual / 使用手冊 Model : TIP-M200ST-BK www.mukii.com.tw All Registered Trademarks Belong To Their Respective Companies Copyright 2010 MUKii Technology INC. All Rights Reserved. 01 PACKAGE INCLUDES...2

More information

The transformation relationship between defense enterprise architecture and C4ISR system architecture

The transformation relationship between defense enterprise architecture and C4ISR system architecture The transformation relationship between defense enterprise architecture and C4ISR system architecture Dr. Meng-chyi Harn 報告人 : 韓孟麒博士德明財經科技大學資訊科技系 C4ISR 研究中心 Introducing Takming Outline Introduction Fundamental

More information

Chinese (Traditional) Style Guide

Chinese (Traditional) Style Guide Chinese (Traditional) Style Guide Published: June, 2017 Microsoft Chinese (Traditional) Style Guide Contents 1 About this style guide... 4 1.1 Recommended style references... 4 2 Microsoft voice... 5 2.1

More information

// 範例 4-1: 連結資料庫 (connectdb.php) <?php mysql_connect("localhost", "student", "Asia2013"); mysql_select_db("student");?>

// 範例 4-1: 連結資料庫 (connectdb.php) <?php mysql_connect(localhost, student, Asia2013); mysql_select_db(student);?> // 範例 4-1: 連結資料庫 (connectdb.php) mysql_connect("localhost", "student", "Asia2013"); mysql_select_db("student"); // 範例 4-2: 以 PHP 建立資料表 (gbcreate.php) $aa=" create table gb ( gbprikey integer auto_increment

More information

Thomson Innovation Training

Thomson Innovation Training Thomson Innovation Training NTHU Renee Guan Customer Relationship Manager Tina Chao SOLUTION CONSULTANT April 30, 2015 THOMSON REUTERS TODAY LARGEST PROVIDER OF INTELLIGENT INFORMATION Thomson Reuters

More information

Registering ( 註冊新帳號 )

Registering ( 註冊新帳號 ) 證券市場發展季刊線上審稿系統註冊流程指南 Registering ( 註冊新帳號 ) Unregistered visitors to a journal can normally register as a Reader, Author, and/or Reviewer. Journal Managers are able to remove the ability for visitors to

More information

報告人 / 主持人 : 林寶樹 Colleges of Computer Science & ECE National Chiao Tung University

報告人 / 主持人 : 林寶樹 Colleges of Computer Science & ECE National Chiao Tung University 行動寬頻尖端技術跨校教學聯盟 - 行動寬頻網路與應用 MiIoT ( Mobile intelligent Internet of Things) 報告人 / 主持人 : 林寶樹 Colleges of Computer Science & ECE National Chiao Tung University Aug 14, 2015 課程簡介 課程綱要 實作平台評估 2 背景說明 目前雲端與行動寬頻緊密結合,

More information

描述性資料採礦 Descriptive Data Mining

描述性資料採礦 Descriptive Data Mining 描述性資料採礦 Descriptive Data Mining 李御璽 (Yue-Shi Lee) 銘傳大學資訊工程學系 leeys@mail.mcu.edu.tw Agenda Cluster Analysis ( 集群分析 ) 找出資料間的內部結構 Association Rules ( 關聯規則 ) 找出那些事件常常一起出現 Sequence Clustering ( 時序群集 ) Clustering

More information

MH-3621-U3 Clone Dual SATA HDD Docking System

MH-3621-U3 Clone Dual SATA HDD Docking System MH-3621-U3 Clone CONTENTS ABOUT THE DOCKING SYSTEM... 2 HARD DRIVE INSTALLATION GUIDE... 5 CLONE OPERATION GUIDE... 6 NOTE... 8 LIMITED WARRANTY... 10 1 Thank you for purchasing MH-3621-U3 from archgon.

More information

try { Intent intent5 = new Intent("android.intent.action.DIAL", Uri.parse(s1)); APIAdapter.a(a).startActivity(intent5); a.a(); }

try { Intent intent5 = new Intent(android.intent.action.DIAL, Uri.parse(s1)); APIAdapter.a(a).startActivity(intent5); a.a(); } 附錄 2 1) 我是谁 - 背影猜猜猜 ( 横扫疯狂猜歌, 疯狂猜图, 疯狂猜成语 ) com.ppgames.guesswhoami) (pname: 該應用程式包含 Android.Adware.Adwo Android.Trojan.Generic 該應用程式存在一些高風險行為, 如獲取 SIM 卡服服供應名稱 獲取 SIM 卡狀態 通過連接訪問網絡 撥打電話 傳送手機內容等行為 a) 獲取

More information

Gigabyte and Giga-byte are trademarks of Giga-byte Technology Co., Ltd. Microsoft and Windows XP are trademarks of Microsoft Corporation.

Gigabyte and Giga-byte are trademarks of Giga-byte Technology Co., Ltd. Microsoft and Windows XP are trademarks of Microsoft Corporation. Copyright Feb, 2006 This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the

More information

WIN Semiconductors. Wireless Information Networking 穩懋半導體 2014 年第四季法人說明會. p.0

WIN Semiconductors. Wireless Information Networking 穩懋半導體 2014 年第四季法人說明會. p.0 WIN Semiconductors Wireless Information Networking 穩懋半導體 2014 年第四季法人說明會 2015 年 3 月 p.0 免責聲明 本資料可能包含對於未來展望的表述 該類表述是基於對現況的 預期, 但同時受限於已知或未知風險或不確定性的影響 因此實 際結果將可能明顯不同於表述內容 除法令要求外, 公司並無義務因應新資訊的產生或未來事件的發生主動更新對未來展望的表述

More information

微算機原理與實驗 Principle of Microcomputer(UEE 2301/1071 )

微算機原理與實驗 Principle of Microcomputer(UEE 2301/1071 ) 微算機原理與實驗 (UEE 2301/1071 ) Chap 6. MCS-51 Instruction sets 宋開泰 Office:EE709 Phone:5731865( 校內分機 :31865) E-mail:ktsong@mail.nctu.edu.tw URL:http://isci.cn.nctu.edu.tw 1 Lab#3 5 x 7 單色點矩陣 LED(Dot Matrix)

More information

香港中文大學學生會計算機科學系會 圖書清單

香港中文大學學生會計算機科學系會 圖書清單 香港中文大學學生會計算機科學系會 圖書清單 100 Theory 120 CGI 140 Visual Basic 160 Other Programming Book 101 Program budgeting and benefit-cost analysis 102 Introduction to Algorithms 103 Introduction to Algorithms 104 Data

More information

打造新世代企業資料中心 Windows Server 2016 重裝登場. 馮立偉 Hybrid Cloud Lead Microsoft Taiwan

打造新世代企業資料中心 Windows Server 2016 重裝登場. 馮立偉 Hybrid Cloud Lead Microsoft Taiwan 打造新世代企業資料中心 Windows Server 2016 重裝登場 馮立偉 Hybrid Cloud Lead Microsoft Taiwan www.20yearsofwindowsserver.com Windows Server 2016 現今攻擊時程 第一個主機被滲透 網域管理者帳號被破解 攻擊者被發現 24 48 小時 超過 200 天 ( 每個產業不同 ) 攻擊目標及方向

More information

Ubiquitous Computing Using SIP B 朱文藝 B 周俊男 B 王雋伯

Ubiquitous Computing Using SIP B 朱文藝 B 周俊男 B 王雋伯 Ubiquitous Computing Using SIP B91902039 朱文藝 B91902069 周俊男 B91902090 王雋伯 Outline Ubiquitous Computing Using SIP 1. Introduction 2. Related Work 3. System Architecture 4. Service Example 1. Introduction

More information

SOHORAID ST8-TB3 User Manual

SOHORAID ST8-TB3 User Manual SOHORAID ST8-TB3 User Manual » ST8-TB3 User Manual...1 1. Environmental Requirements...1 2. Product Appearance and Packaging Content...1 3. Hardware Requirements and Precautions...2 4. Hardware Installation...3

More information

多元化資料中心 的保護策略 技術顧問 陳力維

多元化資料中心 的保護策略 技術顧問 陳力維 多元化資料中心 的保護策略 技術顧問 陳力維 現代化的資料保護架構 使用者自助服務 任何儲存設備 影響低 多種還原點選擇 (RPO) Application Server 完整全面的雲端整合 Network Disk Target 容易操作與深入各層的報表能力 管理快照與複製能力 Primary Storage 快速 可靠的還原 (RTO) 完整的磁帶 & 複製管理 單一整合的解決方案 企業級的擴充性

More information

私有雲公有雲的聯合出擊 領先的運算, 儲存與網路虛擬化技術 靈活的計費模式與經濟性 支援廣大的商業應用場景 涵蓋各類型雲服務 類標準的企業資料中心架構 全球規模與快速部署. 聯合設計的解決方案可為客戶提供最佳的 VMware 和 AWS

私有雲公有雲的聯合出擊 領先的運算, 儲存與網路虛擬化技術 靈活的計費模式與經濟性 支援廣大的商業應用場景 涵蓋各類型雲服務 類標準的企業資料中心架構 全球規模與快速部署. 聯合設計的解決方案可為客戶提供最佳的 VMware 和 AWS 私有雲公有雲的聯合出擊 領先的運算, 儲存與網路虛擬化技術 支援廣大的商業應用場景 類標準的企業資料中心架構 靈活的計費模式與經濟性 涵蓋各類型雲服務 全球規模與快速部署 聯合設計的解決方案可為客戶提供最佳的 VMware 和 AWS VMware Cloud on AWS 使用場景 A B C D 雲端遷移資料中心延伸災難備援次世代應用程式 Consolidate Migrate Maintain

More information

Lomographic Society Taiwan Institute of Creative Industry Design

Lomographic Society Taiwan Institute of Creative Industry Design Lomographic Society Taiwan Institute of Creative Industry Design On 2008.10.07 Allan, PA6971076 Contents 中文摘要 02 Short story of Lomographic Society 03 About Lomographic Society Taiwan 04 Lomo Spirit 06

More information

PUB. DIM Wi-Fi Basic Setup Guide. Wi-Fi 基本设置指南. Wi-Fi 基本設定指南 在使用本产品之前, 请务必先仔细阅读本使用说明书 请务必妥善保管好本书, 以便日后能随时查阅 ( 保留备用 ) 请在充分理解内容的基础上, 正确使用

PUB. DIM Wi-Fi Basic Setup Guide. Wi-Fi 基本设置指南. Wi-Fi 基本設定指南 在使用本产品之前, 请务必先仔细阅读本使用说明书 请务必妥善保管好本书, 以便日后能随时查阅 ( 保留备用 ) 请在充分理解内容的基础上, 正确使用 PUB. DIM-1076-000 Wi-Fi Basic Setup Guide Wi-Fi 基本设置指南 Wi-Fi 基本設定指南 EN ZH TC 在使用本产品之前, 请务必先仔细阅读本使用说明书 请务必妥善保管好本书, 以便日后能随时查阅 ( 保留备用 ) 请在充分理解内容的基础上, 正确使用 Table of Contents 2 Wi-Fi Functions 03 Getting Started

More information

Oracle Database 11g Overview

Oracle Database 11g Overview Oracle Database 11g Overview Charlie 廖志華倍力資訊資深系統顧問 Great Year for Oracle Database Database Market Database for SAP 14.3% 48.6% 9% 3% 17% 4% 15.0% 22.0% 67% Oracle IBM Microsoft Other

More information

Password Protection 此篇文章說明如何在程式中加入密碼保護的機制, 當程式開啟, 使用者必須先輸入使用者帳號及密碼, 若是合法使用者才能進入應用程式

Password Protection 此篇文章說明如何在程式中加入密碼保護的機制, 當程式開啟, 使用者必須先輸入使用者帳號及密碼, 若是合法使用者才能進入應用程式 Password Protection 此篇文章說明如何在程式中加入密碼保護的機制, 當程式開啟, 使用者必須先輸入使用者帳號及密碼, 若是合法使用者才能進入應用程式 Step 1. 使用 Visual C++ 6.0 產生一個 MFC Application 1) Project name: PasswordProtection 2) Project type: MFC AppWizard(exe)

More information

Chapter 1 Introduction to Computers, the Internet, and the Web

Chapter 1 Introduction to Computers, the Internet, and the Web Chapter 1 Introduction to Computers, the Internet, and the Web Java technologies are classified into three editions: 1. Standard (J2SE technology) 2. Micro (J2ME technology) 3. Enterprise (J2EE technology)

More information