Page 10 - 计算机技术与人工智能
P. 10

第四章 计算机网络通信技术 ································································57

                 第一节 计算机网络通信技术概述 ····················································57
                 第二节 计算机数据通信技术基础 ····················································68

                 第三节 电力系统常用通信方式 ·······················································78

                 第四节 电力系统中网络通信技术的应用 ········································· 129
                 第五节 数据通信中的其他通信技术 ··············································· 144

             第五章 数据库基础 ·········································································· 155
                 第一节 数据库系统的基本概念 ····················································· 155

                 第二节 数据模型 ······································································· 158
                 第三节 关系数据库 ···································································· 160

                 第四节 实时数据库基础 ······························································ 163
                 第五节 数据库系统应用 ······························································ 164

                 第六节 常用的数据库管理系统简介 ··············································· 166
             第六章 信息技术 ············································································· 175

                 第一节 信息技术应用基础 ··························································· 175

                 第二节 信息的获取 ···································································· 180
                 第三节 信息的加工与表达 ··························································· 183

                 第四节 信息资源的管理 ······························································ 200
             第七章 信息安全 ············································································· 207

                 第一节 信息安全的含义 ······························································ 207
                 第二节 信息安全的发展历程 ························································ 208

                 第三节 信息安全的标准 ······························································ 211

                 第四节 信息安全的威胁 ······························································ 213
                 第五节 信息安全技术 ································································· 214
                 第六节 信息安全防护策略 ··························································· 217

                 第七节 建设安全、健康的大学生数字化生活 ··································· 220
   5   6   7   8   9   10   11   12   13   14   15