use visual c++ to solve math problem ,Chengbihong,people post pre
标签: Chengbihong problem people visual
上传时间: 2013-12-20
上传用户:hgy9473
This product has been manufactured to your company’s specifications a part for use in your company’s general electronic products. It is guaranteed to perform according to delivery specifications. For any other use apart from general electronic equipment, we cannot take responsibility if the product is used in medical devices, nuclear power control equipment, aerospace equipment, fire and security systems, or any other applications in which there is a direct risk to human life and where extremely high levels of reliability are required. If the product is to be used in any of the above applications, we will need to enter into a separate product liability agreement.
标签: company your specifications manufactured
上传时间: 2017-02-19
上传用户:haohaoxuexi
how to have a free premium account it is legal and easy french language
标签: language account premium french
上传时间: 2014-01-20
上传用户:woshini123456
it a channel for the wii. We can play game backup with softchip.dol and we can use this channel to load the latest version of softchip
标签: channel can softchip backup
上传时间: 2017-03-01
上传用户:asdfasdfd
El Judge MIPT solutions to some easy problems, I hope be usefull to you...
标签: solutions problems usefull Judge
上传时间: 2017-03-01
上传用户:来茴
The I2C driver use to control LCD momo that using I2C driver.
上传时间: 2014-10-14
上传用户:gengxiaochao
You use variables in your program to hold data which may be in different type, such as characters, numbers, date and time etc.
标签: characters different variables program
上传时间: 2017-03-07
上传用户:xaijhqx
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2014-01-10
上传用户:yyq123456789
This code can use to multiply two matrices in Parallel computer enviroment.c
标签: enviroment Parallel multiply matrices
上传时间: 2013-12-16
上传用户:xiaoyunyun