Position: Home page » Currency » Change currency number to capital

Change currency number to capital

Publish: 2021-05-16 15:26:48
1. Directly use the replacement function of word. A total of 10 numbers, one by one to replace it. Or use the following methods:
1. Select the lowercase number to be converted, and then click Insert, and then click symbol, and then click No.
2. In the pop-up numbering dialog box, select the entry of uppercase number
3. When you go back to the document, you will find that the lowercase number has become uppercase number
of course, There are also some input methods that support the conversion of number case. For example, Sogou input method and so on.
2. There is no best financial proct, only suitable for you. For example, if your capital is inflexible, you can only consider short-term investment. If you can't use spare money in the short term, you can make long-term investment
now P2P financing is a good way of financing, with high income, low threshold, flexible and simple investment. Platform security can be comprehensively selected by examining the basic information of the platform (online time, registered capital, platform background and project situation), platform risk control guarantee system (fund management, risk control guarantee mode), income range, capital liquidity and other factors.
3. Hello
virtual currency? Corporate currency? Cryptocurrency? Virtual currency is pure deceptive currency; Enterprise currency is similar to enterprise points and game currency (such as Tencent's q-coin) issued in the name of enterprise; Encrypted digital currency is a digital currency based on blockchain Technology (such as bitcoin and Leyte coin). What kind of Sheng Baolin coin does it belong to
if you have any questions, please ask.
4. I've been an Internet bar technician for more than 4 years. I've done all kinds of Internet bars, including the largest 300 computers and the smallest 5 computers

this line is suitable for young people under 24 years old. After 24 years old, you have to consider your own way out. It's OK to enter the company or start your own business, because you can't stay in the Internet bar for a lifetime

take the technician of 200 Internet cafes with disk as an example, which is basically the following five requirements (also the key and difficult points):

1. Be able to make master disk and gram disk (i.e. netgram), both of which have detailed online tutorials
2. Can do at least two kinds of soft routing, mainly Routeros. Others such as smoothwall, ipcop, sea spider, etc. will be at least one of them
3. Be familiar with and master at least two sets of mainstream Internet bar game update management software, such as xinhaoyi company's flash 2008 (charging version is Xintuo 2008), Shunwang company's webmaster, Wangsheng technology's "Internet bar game management update system", Hubei Shengtian nettech company's Yiyou 2008, etc
4. Be familiar with and master at least two sets of mainstream Internet bar charging systems, including Vientiane 2004, 2008 and pubwin 2007. Almost all Internet bars have these two systems, and the others are rarely used
5. At least one movie on demand system will be set up, such as the ancient streaming media system. But now the movies in Internet cafes are all in the charge of the film company, and the film and television system is also installed by the film company<

the above five points are very important,
other technologies, such as virtual disk technology, are brought with you by the masters of easy travel and network maintenance, and are not difficult to master. Commonly used virtual disk software, such as okstor, ccdisk, Netcom (including Linux version), is not difficult to master, the official has a detailed tutorial, just follow the tutorial
there are also ARP two-way binding, traffic restrictions, firewalls and so on, which are not the key points, but also require you to know them. You will encounter all these things in actual work. Of course, there are also a lot of searches on the Internet
as for repairing computers and the like, it's not very demanding to know which part is broken

the reward you offered is too little, so you can only write so much.
5. I hope the following answers are helpful for you to learn /
become a network administrator learning content:
Part I: computer structure and working principle, performance parameters and mainstream brands of various spare parts, computer hardware assembly, CMOS settings, hard disk partition, formatting, Windows 98 / 2000 / XP installation Installation of hardware drivers and applications, structure of Windows registry, backup and application of windows kernel: allocation of CPU, memory and hard disk, optimization of software and hardware system, performance evaluation of the whole machine, principle and prevention of computer virus, causes of common software and hardware failures, phenomenon and solution, and correct identification of fake and parallel procts in the market, Sales skills of hardware and software procts
the second part: the basic structure, development and topology design of the network, the construction and implementation of 10Base-T LAN, the structure and characteristics of various servers, Ethernet peer-to-peer network and other ways. The similarities and differences between the four layer model of TCP / IP and the seven layer model of OSI, the analysis of TCP / IP protocol, how to set IP address, subnet mask, default gateway, distinguish subnet and network segment and hub, switch and router, RJ45 network cable proction and the construction and maintenance of Internet cafes, NT, Win2000 Server and Linux server, The third part: WIN2000 configuration, user and authority, file and folder management, new features, active directory management, group policy. Network resources monitoring, system environment setting, disk system management. Installation, configuration and management of web, FTP, DNS, DHCP, wins and other servers. Exchange mail server software is used to realize the establishment and management of personal email server, bulletin board server, website email server and chat server. SQL Server database creation, table creation and publishing, database backup and recovery, table import and export and a series of maintenance and management methods. The basic principle of proxy server. Using Microsoft proxy as an example to realize the setting and management of proxy server

Part Four: the basic principle of proxy server. Using Microsoft proxy as an example to realize the setting and management of proxy server. The configuration, use and management skills of Cisco work2000, a popular network management software, manage all routers and switches in the network on a monitoring computer, monitor network traffic in real time, and discover network problems in time. Routing and switching technology: explain the principle of routing, and master the common configuration commands and configuration of Cisco router by learning the router configuration examples. The explanation of switch principle, through the learning of switch configuration examples, master the common configuration commands and configuration of switch

Part Five: system manual customization, system performance testing management, kernel setting and compilation. FTP service, samba service and other services, such as DHCP, NFS, etc. Web services. Including: Apache service configuration and security settings. The introction of other web service software. DNS technology and application. Some simple routing technology, some simple load balancing technology. Mail network service. Including: the configuration and use of sendmail, the configuration and use of qmail. The use of some mail client programs

Part 6: the basic overview of network security, the introction of network protocol, the basic knowledge of conventional encryption, the basic knowledge of public key encryption and digital signature, the identity is difficult to verify, using PGP and digital certificate to carry out mail encryption experiment, comprehensively talking about the implementation of network security countermeasures under the environment, various vulnerabilities under Windows 98 Attack type, defense method and security configuration scheme (system security, ie security, outlook security, etc.). Combined with the hacker attack process, this paper comprehensively describes the implementation of network security countermeasures in
Windows NT environment. Various vulnerabilities, attack types, defense methods and security configuration schemes under Windows NT are described. The implementation of network security countermeasures under Windows 2000 environment, log security and web security of windows system, and implementation of software firewall are comprehensively described. Various vulnerabilities, attack types, defense methods and security configuration schemes under Windows 2000

Part 7: Linux administrator part
1. Basic applications
1. Introction to GNU / Linux and installation of RedHat Linux
2. System knowledge (shell, file system, pipeline and redirection, process concept), introction of common system commands (LS, CP, MKDIR, RM, VI, man, Chmod, etc.)
3. Basic system management (including: introction of system startup process, disk management, user management, log view, use of tar / GZ package, RPM package management, etc.)< 2. Basic system services (including graphics terminal and basic network services) (9 class hours)
1. Configuration and use of graphics terminal (i.e. X-window). Around KDE and / or gnome, the friendly interface of UNIX system is displayed
2. Simple shell textbook writing method, environment variables
3. Basic configuration of IP network under Linux (IP address, gateway, name)
4. Configuration and use of network services under Linux (including basic configuration of FTP, DNS, Apache, sendmail, samba). This paper introces the setup and linuxconf based on RedHat. The introction of webmin management tool< 3. Prerequisite (background course)
1. Introction
2. Advanced system management. Including: manual customization of the system (inetd, service, ntsysv), system performance detection management (PS, top, tail, dmesg, / proc)
3. Kernel Setting and compilation< 4. Advanced network applications 1. FTP service, samba service and other services, such as DHCP, NFS, etc
2. Web services. Including: Apache service configuration and security settings. The introction of other web service software. DNS technology and application
3. Some simple routing technologies
4. Some simple load balancing technologies
5. Mail network service. Including: the configuration and use of sendmail, the configuration and use of qmail. The use of some mail client programs

v. system network security
1. Theory and application of packet filtering firewall (NAT technology, kernel architecture, use of ipchains / IPtable), introction of other non nuclear firewalls
2. System security. SSH configuration and use. Intrusion detection system and checkpoint technology and application
3. Theory and application of VPN (virtual gateway). Including: IPSec, PPTP, authentication, key exchange protocol and other technologies< 6. Sum up
build a secure network service system by mixing
(be sure to adopt me! ~)
6. Repair machine is generally done by network management, technician is mainly responsible for network maintenance of Internet bar, such as server, LAN, router, etc. You have to be able to install the system, redo the system, set up the LAN, use and maintain the game update software and charging software, set up and maintain the router, set up and maintain the Internet bar network security, etc.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750