Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (4): 89-91    DOI:
Current Issue | Archive | Adv Search |
Research on the Design and Construction of Electronic Information System Room Engineering
Zhou Yongping
Ningxia Personnel Test Center
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Electronic information system room engineering is basic facility construction, providing efficient technology and equipment support for computers. This paper researches on the design and construction from security, power supply and air conditioning, hoping to provide a certain guidance for the construction of electronic information system room engineering.
Key wordselectronic information system      computer room engineering construction      design and construction      safety      power supply     
Published: 10 November 2017
ZTFLH:  TP308  

Cite this article:

Zhou Yongping. Research on the Design and Construction of Electronic Information System Room Engineering. Computer & Telecommunication, 2016, 1(4): 89-91.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I4/89

[1] SUN Wen-wen LIU Qing-liang WU Ruo-chen WANG Xin-tong DONGYE Sheng-yi CAO Lu WANG Xin-li. [J]. 电脑与电信, 2021, 1(4): 59-61.
[2] ZENG Su-qiong LIN Jian-bing LI Yu-peng. Design of Precision Control Drive Circuit for LED High Power Lamp[J]. 电脑与电信, 2020, 1(7): 47-50.
[3] SUN Guo-xian ZHAO Yong-chang. An Optimization Method forArming Power Signal Identification in ESAD[J]. 电脑与电信, 2020, 1(7): 58-61.
[4] ZHANG Shuang JI Miao-miao LI Yi-qian LI Zhu. Design of Stabilized Voltage Switching Power Supply Based on TL494[J]. 电脑与电信, 2019, 1(1-2): 9-12.
[5] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[6] YIN Zong-ping. Analysis and Design of the Security System of the University Apartment[J]. 电脑与电信, 2018, 1(3): 4-6.
[7] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
[8] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[9] Shen Si. Research on the Food Safety Event Data Cleaning Based on Ontology Construction Technology[J]. 电脑与电信, 2018, 1(11): 26-30.
[10] MA Yan. Application of Fast Switching Device in Multi-Power Supply System[J]. 电脑与电信, 2018, 1(11): 91-93.
[11] Xin Peng, Li Yintao, AnHuirong, Jia Xiaotie, YuanWeiguo, Lei Xueyi. Analysis of Power Mode for Tower-mounted Equipment of Transmission Line[J]. 电脑与电信, 2017, 1(5): 4-6.
[12] PENG Zhen-wu, ZHANG Jun-ling, HOU Run-jia, ZHU Ling-zhi. The Design and Research on School Bus Safety Monitoring and Management System[J]. 电脑与电信, 2017, 1(12): 14-16.
[13] Feng Xiaomei. Discussion on Mobile Security[J]. 电脑与电信, 2016, 1(9): 84-86.
[14] Chen Mingdong. Design and Research on the Security Protection of Big Database for the Smart Campus[J]. 电脑与电信, 2016, 1(4): 59-61.
[15] Ma Huanpeng, Ye Ronghua. Research of Access Control Model for SaaS System[J]. 电脑与电信, 2016, 1(1-2): 78-80.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd