- neutral keying
- 中性键控(法)
English-Chinese computer dictionary (英汉计算机词汇大词典). 2013.
English-Chinese computer dictionary (英汉计算机词汇大词典). 2013.
chemical bonding — ▪ chemistry Introduction any of the interactions that account for the association of atoms into molecules, ions, crystals, and other stable species that make up the familiar substances of the everyday world. When atoms approach one another … Universalium
Non-return-to-zero — The binary signal is encoded using rectangular pulse amplitude modulation with polar non return to zero code In telecommunication, a non return to zero (NRZ) line code is a binary code in which 1 s are represented by one significant condition… … Wikipedia
M-209 — can also refer to a highway in the U.S. state of Michigan; see M 209 (Michigan highway) In cryptography, the M 209, designated CSP 1500 by the Navy (C 38 by the manufacturer) is a portable, mechanical cipher machine used by the US military… … Wikipedia
AC power plugs and sockets — See also: Industrial and multiphase power plugs and sockets Plugs and sockets may sometimes combine male and female contacts, but t … Wikipedia
Industrial and multiphase power plugs and sockets — Industrial and multiphase plugs and sockets provide a connection to the electrical mains rated at higher voltages and currents than household plugs and sockets. They are generally used when more than two current carrying conductors (polyphase… … Wikipedia
China [2] — China (Gesch.). I. Mythische Zeit. A) Die 3 Kaiser bis 2940 v. Chr. Der geschichtliche Mythus beginnt mit Tian Hoang, Ti Hoang, Yin Hoang, dem himmlischen, dem irdischen, dem menschlichen Kaiser; sie lebten lange u. zeugten eine große Menge Söhne … Pierer's Universal-Lexikon
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium
Counter-intelligence — This article is a subset article of intelligence cycle security. National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process… … Wikipedia
Counterintelligence — This article is a subset article of intelligence cycle security. Counterintelligence or counter intelligence (see spelling differences) (CI) refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence… … Wikipedia
Clef — For other uses, see Clef (disambiguation). Treble and bass clefs shown with names of the notes. A clef (French: clef key ) is a musical symbol used to indicate the pitch of written notes.[1] … Wikipedia
List of electronics topics — Alphabetization has been neglected in some parts of this article (the b section in particular). You can help by editing it. This is a list of communications, computers, electronic circuits, fiberoptics, microelectronics, medical electronics,… … Wikipedia