Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (4): 89-91    DOI:
Current Issue | Archive | Adv Search |
Research on the Design and Construction of Electronic Information System Room Engineering
Zhou Yongping
Ningxia Personnel Test Center
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Electronic information system room engineering is basic facility construction, providing efficient technology and equipment support for computers. This paper researches on the design and construction from security, power supply and air conditioning, hoping to provide a certain guidance for the construction of electronic information system room engineering.
Key wordselectronic information system      computer room engineering construction      design and construction      safety      power supply     
Published: 10 November 2017
:  TP308  

Cite this article:

Zhou Yongping. Research on the Design and Construction of Electronic Information System Room Engineering. Computer & Telecommunication, 2016, 1(4): 89-91.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2016/V1/I4/89

[1] YANG Li-jia CHEN Xin-fang ZHAO Han-qing WANG Shi-wei. Water Quality Safety Modeling Prediction Based on Extra Tree Classifier[J]. 电脑与电信, 2024, 1(6): 57-.
[2] CAO Peng-fei. Exploration and Practice of Self-made Industrial Control Network Security Teaching Equipment[J]. 电脑与电信, 2024, 1(5): 108-.
[3] YAN Qing-feng.
Improved Design of a Linear Stabilized Power Supply
[J]. 电脑与电信, 2023, 1(3): 42-48.
[4] SUN Wen-wen LIU Qing-liang WU Ruo-chen WANG Xin-tong DONGYE Sheng-yi CAO Lu WANG Xin-li. [J]. 电脑与电信, 2021, 1(4): 59-61.
[5] ZHENG Rui YANG Peng ZHOU Su-xu LI Cheng.
Research on Safety Risk Monitoring and Early Warning System of Key Enterprises
in Industry and Trade
[J]. 电脑与电信, 2021, 1(12): 69-72.
[6] ZENG Su-qiong LIN Jian-bing LI Yu-peng. Design of Precision Control Drive Circuit for LED High Power Lamp[J]. 电脑与电信, 2020, 1(7): 47-50.
[7] SUN Guo-xian ZHAO Yong-chang. An Optimization Method forArming Power Signal Identification in ESAD[J]. 电脑与电信, 2020, 1(7): 58-61.
[8] ZHANG Shuang JI Miao-miao LI Yi-qian LI Zhu. Design of Stabilized Voltage Switching Power Supply Based on TL494[J]. 电脑与电信, 2019, 1(1-2): 9-12.
[9] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[10] YIN Zong-ping. Analysis and Design of the Security System of the University Apartment[J]. 电脑与电信, 2018, 1(3): 4-6.
[11] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
[12] WUWen-gang, ZHANG Xin. The Application of Penetration Test in Level Evaluation[J]. 电脑与电信, 2018, 1(1-2): 67-69.
[13] Shen Si. Research on the Food Safety Event Data Cleaning Based on Ontology Construction Technology[J]. 电脑与电信, 2018, 1(11): 26-30.
[14] MA Yan. Application of Fast Switching Device in Multi-Power Supply System[J]. 电脑与电信, 2018, 1(11): 91-93.
[15] Xin Peng, Li Yintao, AnHuirong, Jia Xiaotie, YuanWeiguo, Lei Xueyi. Analysis of Power Mode for Tower-mounted Equipment of Transmission Line[J]. 电脑与电信, 2017, 1(5): 4-6.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd