风风一样的自由
可以有以下三种写法,具体看你们的参考文献格式要求:
意思是该参考文献来自国外。
参考文献是在学术研究过程中,对某一著作或论文的整体的参考或借鉴。征引过的文献在注释中已注明,不再出现于文后参考文献中。
按照字面的意思,参考文献是文章或著作等写作过程中参考过的文献。然而,按照GB/T 7714-2015《信息与文献 参考文献著录规则》”的定义,文后参考文献是指:“为撰写或编辑论文和著作而引用的有关文献信息资源。
参考文献的正确运用对学术论文的整体质量而言是至关重要的,但是,参考文献引用不当的问题还是层出不穷,严重影响了论文本身的质量,降低了基于此的各类评价指标的客观性和可信度。
扩展资料
参考文献的功能
参考文献是学术论文的重要组成部分,对于其本身有着不可替代的作用,相关论述已非常充分,在此不一一赘述了,只重申一下重点。
与作者而言,参考文献是论文科学选题的前提,是论证观点的有力支撑,是继承和传播前人研究成果的有效方式,保护和评价他人的劳动成果。
与学术期刊而言,参考文献可为编者审稿选稿提供参考借鉴,为自身的影响力扩散打造有利条件,可完成不同期刊之间的学术成果传递,节约宝贵有限的版面。
参考资料来源:百度百科-参考文献
参考资料来源:人民网-关于参考文献不当引用的表现及控制探析
Computer network virus and precautions With the new network technology and application of the continuous rapid development of the computer network should Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human More inseparable from the lives of the community's reliance on them will keep growing. With With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be Will become increasingly important. A computer virus The definition of computer virus computer virus (Computer Virus) in the "people's republic of China The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or Computer program inserted in the damage or destruction of computer data functions, affecting computer use Self-replication and can a group of computer instructions, or code. " Second, network virus With the development of network and the Internet, a wider spread, the greater New harm The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional The virus was not classified network virus this concept, because the development of networks, the traditional virus The network also has a number of characteristics. Today's Internet virus is a broad notion of a As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as: "Love the back door", "Panda burning incense." Third, network virus and the distinction between computer virus The original common computer virus is nothing more than the devastating formatted hard drive, delete system With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection Mutual copy of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems The pilot virus and infected executable file virus, in addition to a network virus These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer Source collapse of the network server worm. Fourth, the network against virus Network destructive virus, will directly affect the work of the network, ranging from lowering speed video Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan, But this figure is constantly rising year by year. The next few years, the size of the market will reach Security 60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine For infection, it can spread through the entire network instant, or even within a very short period of time can be infected Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network More on the computer network the greater the harm caused by the virus. V. network transmission of the virus Features 1. Infection fast: single machine environment, the virus can only be passed from one computer diskette To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement Set against a typical PC network use in normal circumstances, once a computer workstation sick Drugs, and will be online within 10 minutes in the several hundreds of all infected computers. 2. Proliferation of a wide range: in the network due to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬 Inter spread to thousands of miles away. 3. Dissemination in the form of complex and varied: computer viruses in general through the network " Station server workstation "channels of communication, but in the form of complex and diverse communication. 4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal The work of a workstation is likely to be on-line by another workstation virus infection. Therefore, Only workstations in addition to killing viruses, and can not solve the virus harm to the network is. 6, the type of network virus As the network increasingly developed, the type of network virus has been increasing, generally summed up as The following categories: 1. Worm It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex A worm virus. The virus used Microsoft's Windows operating system, computer flu With this virus, will continue to automatically dial-up Internet access and use information in the document or the address Sharing network spreads, and ultimately undermine the most important user data. 2. Macro Virus Hong virus is a Storage in the document or template in the Acer computer virus. The prefix Macro, once open such documents, which Acer will be implemented, then the virus would Acer Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since The document will be kept moving "infection" that the Hong virus, and if other users opened the flu Documents with the virus, the Hong virus will be transferred to his computer. 3. Destructive procedures virus The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users Computer generated destruction. If C formatted disk (), the killer orders (Harm. ). 4. System virus The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file, And through these documents for dissemination. If the CIH virus. 5. Backdoor virus Backdoor virus prefix is Backdoor. The total of such virus through network - Sowing, opened the back door to the system to the user and potential safety problems. 6. Bundling machine virus Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use Specific procedures will be bundled with a number of applications such as QQ, IE bundled up on the surface It is normal to see the paper, when users run these bundled virus, will run these applications on the surface Procedures, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled Tied QQ (), the system killer (). 7. Script virus The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information, Computer user inconvenience caused. 8. Planting procedures virus virus This virus is of the public will run from the in vivo release of one or several new Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing (), MSN striker (). 9. Joke virus The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation, When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact The virus did not destroy any computer user. Such as: ghost () virus. 10. Trojan hacking virus Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world User information, hackers virus there is a visual interface to the user's computer remotely Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ News tail Trojan , there are big . Virus Form A PSW or anything like PWD general said that the virus has stolen password function, If some hacker programs, such as network枭雄. 7, the mode of transmission and network anti-virus Through the above, we can see that e-mail viruses spread Click homepage, users download, Others implant, implant, and other loopholes through five computer transmission, so long as holding these five A thoroughfare, we will be able to live better anti-virus network.
计算机类的论文一般要做实验,验证idea的有效性,然后根据实验结果进行分析,写成论文
论文标准格式模板:
举例说明:
关于XXX的研究 题目居中,三号黑体字
XXX XXX XXX 作者居中,其后标明工作单位,所在省、市,邮编,4号楷体字
摘 要:XXXXXXXXXXXXXX“摘要”两字5号黑体,其余5号宋体
关键词:XXXX XXXX(RS) YYYY“关键词”三字用5号黑体,其余宋体5号
#215;#215;#215;#215;#215;#215;#215;#215;#215; (英文题目)
#215;#215;#215;(#215;#215;#215;#215;) 英文作者姓名(单位、所在省、市,邮编)
【Abstract】 (英文摘要)
【Key words】 (英文关键词)
(正文)
一、XXXXXX一级标题用4号黑体字(序号用一、二……依此类推)
二级标题用4号宋体字(序号用1、2……依此类推)
⑴xxxxxxxxx三级标题用4号宋体字(序号用⑴、⑵、⑶……依此类推)
(正文内容)
yyyyyyyyyyyyyyyyyyyyyyyyy 正文用5号宋体
参考文献:用5号黑体字
[1]XXX,XYY,XXX,XXXX,《XXXXXXXX》,2008,(1)5号宋体
[2]Xxx、Xxx译,《XXXXXXXX》,XX教育出版社,1998. 5号宋体
作者简介:作者单位、电话、传真、电子信箱、通讯地址及邮政编码5号宋体
论文的格式包括以下几个方面:
1、论文题目格式
要求准确、简练、醒目、新颖。
2、目录
目录是论文中主要段落的简表。(短篇论文不必列目录)
3、内容提要
是文章主要内容的摘录,要求短、精、完整。字数少可几十字,多不超过三百字为宜。
4、关键词或主题词
关键词是从论文的题名、提要和正文中选取出来的,是对表述论文的中心内容有实质意义的词汇。关键词是用作计算机系统标引论文内容特征的词语,便于信息系统汇集,以供读者检索。每篇论文一般选3-8个词汇作为关键词,另起一行,排在“提要”的左下方。
5、论文正文
引言:引言又称前言、序言和导言,用在论文的开头。引言一般要概括地写出作者意图,说明选题的目的和意义,并指出论文写作的范围。引言要短小精悍、紧扣主题。论文正文:正文是论文的主体,正文应包括论点、论据、 论证过程和结论。
6、参考文献
一篇论文的参考文献是将论文在研究和写作中可参考或引证的主要文献资料,列于论文的末尾。
中文:标题--作者--出版物信息(版地、版者、版期)
英文:作者--标题--出版物信息
所列参考文献的要求是所列参考文献应是正式出版物,以便读者考证。所列举的参考文献要标明序号、著作或文章的标题、作者、出版物信息。