虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

PADS-POwer

  • 此文档英文原文摘自www.cppreference.com 以下C-Free的支持者

    此文档英文原文摘自www.cppreference.com 以下C-Free的支持者,为文档的翻译做出贡献,特此感谢: Dreamby , sirius , Vic Zhang , Lauren.Jc , Rexzhou , power , littlestone  

    标签: cppreference C-Free www com

    上传时间: 2016-12-04

    上传用户:cx111111

  • 您需要安装 MS SQL Server 2000 以及 Visual Basic 6.0 SP6

    您需要安装 MS SQL Server 2000 以及 Visual Basic 6.0 SP6 ,否则也许会有某些地方出现问题,甚至无法调试。另外,您还需要进行以下步骤,才能顺利地调试源代码: 1) 进入“数据新建”目录,运行程序 数据新建.exe。该程序提供了一个简单的方法去新建程序需要的数据库和测试数据。在程序中填写正确的SQL服务器信息即可。 2) 前台程序不是我开发的,是一个刚学习VB的同学开发的。我个人建议前台不用去看了,没有值得花费时间的地方。 3) 进入“后台管理”目录,先注册 XPMenu.ocx,否则代码运行时会发生错误哟。方法:运行 注册.bat 。调试的时候,必须在登陆界面设置 SQL 服务器地址,否则会连接不上,出现假死哟(因为没有加超时控制^_^)。其他的不再多说,学习过VB的朋友自然知道怎么办。 默认管理员帐号:admin 密码:admin 4) 文档里面有完整的需求说明书,详细设计说明书,测试文档等,另外附带有活动、时序图的源设计文件,需要 Power Designer 11 才能打开。

    标签: Server Visual Basic 2000

    上传时间: 2016-12-07

    上传用户:wanghui2438

  • The FM24C256/C256L/C256LZ devices are 256 Kbits CMOS nonvolatile electrically erasable memory. Thes

    The FM24C256/C256L/C256LZ devices are 256 Kbits CMOS nonvolatile electrically erasable memory. These devices offer the designer different low voltage and low power options. They conform to all requirements in the Extended IIC 2-wire protocol. Furthermore, they are designed to minimize device pin count and simplify PC board layout requirements.

    标签: 256 electrically nonvolatile erasable

    上传时间: 2016-12-11

    上传用户:lps11188

  • The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of dig

    The TMS320LF240xA and TMS320LC240xA devices, new members of the TMS320C24x generation of digital signal processor (DSP) controllers, are part of the TMS320C2000 platform of fixed-point DSPs. The 240xA devices offer the enhanced TMS320 DSP architectural design of the C2xx core CPU for low-cost, low-power, and high-performance processing capabilities. Several advanced peripherals, optimized for digital motor and motion control applications, have been integrated to provide a true single-chip DSP controller. While code-compatible with the existing C24x DSP controller devices, the 240xA offers increased processing performance (40 MIPS) and a higher level of peripheral integration. See the TMS320x240xA Device Summary section for device-specific features.

    标签: TMS 320 generation 240

    上传时间: 2013-12-16

    上传用户:GavinNeko

  • Origin 拟合曲线教程 Contents 1. ORIGIN BASIC FUNCTIONS 2. CHROMATOGRAPHY FUNCTIONS 3. EXPONENTIAL FU

    Origin 拟合曲线教程 Contents 1. ORIGIN BASIC FUNCTIONS 2. CHROMATOGRAPHY FUNCTIONS 3. EXPONENTIAL FUNCTIONS 4. GROWTH/SIGMOIDAL 5. HYPERBOLA FUNCTIONS 6. LOGARITHM FUNCTIONS 7. PEAK FUNCTIONS93 8. PHARMACOLOGY FUNCTIONS 9. POWER FUNCTIONS 10. RATIONAL FUNCTIONS140 11. SPECTROSCOPY FUNCTIONS155 12. WAVEFORM FUNCTIONS....................................................................................................................... 163

    标签: FUNCTIONS CHROMATOGRAPHY EXPONENTIAL Contents

    上传时间: 2016-12-15

    上传用户:qazxsw

  • 手机基本原理: ETACS、GSM蜂窝手机是一个工作在双工状态下的收发信机。一部移动电话包括无线接收机(Receiver)、发射机(Transmitter)、控制模块(Controller)及人机界面

    手机基本原理: ETACS、GSM蜂窝手机是一个工作在双工状态下的收发信机。一部移动电话包括无线接收机(Receiver)、发射机(Transmitter)、控制模块(Controller)及人机界面部分(Interface)和电源(Power Supply)。

    标签: Transmitter Controller Receiver ETACS

    上传时间: 2014-01-04

    上传用户:wang5829

  • Java is the first language to provide a cross-platform I/O library that is powerful enough to handle

    Java is the first language to provide a cross-platform I/O library that is powerful enough to handle all these diverse tasks. Java is the first programming language with a modern, object-oriented approach to input and output. Java s I/O model is more powerful and more suited to real-world tasks than any other major language used today. Java I/O is the first and still the only book to fully expose the power and sophistication of this library.

    标签: cross-platform language powerful provide

    上传时间: 2014-01-07

    上传用户:pompey

  • 学生信息管理系统

    学生信息管理系统,Power builder

    标签: 信息管理系统

    上传时间: 2014-01-23

    上传用户:来茴

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    标签: technologies and standards Edition

    上传时间: 2014-01-05

    上传用户:hj_18

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211