Page 10 - 计算机技术与人工智能
P. 10
第四章 计算机网络通信技术 ································································57
第一节 计算机网络通信技术概述 ····················································57
第二节 计算机数据通信技术基础 ····················································68
第三节 电力系统常用通信方式 ·······················································78
第四节 电力系统中网络通信技术的应用 ········································· 129
第五节 数据通信中的其他通信技术 ··············································· 144
第五章 数据库基础 ·········································································· 155
第一节 数据库系统的基本概念 ····················································· 155
第二节 数据模型 ······································································· 158
第三节 关系数据库 ···································································· 160
第四节 实时数据库基础 ······························································ 163
第五节 数据库系统应用 ······························································ 164
第六节 常用的数据库管理系统简介 ··············································· 166
第六章 信息技术 ············································································· 175
第一节 信息技术应用基础 ··························································· 175
第二节 信息的获取 ···································································· 180
第三节 信息的加工与表达 ··························································· 183
第四节 信息资源的管理 ······························································ 200
第七章 信息安全 ············································································· 207
第一节 信息安全的含义 ······························································ 207
第二节 信息安全的发展历程 ························································ 208
第三节 信息安全的标准 ······························································ 211
第四节 信息安全的威胁 ······························································ 213
第五节 信息安全技术 ································································· 214
第六节 信息安全防护策略 ··························································· 217
第七节 建设安全、健康的大学生数字化生活 ··································· 220

