this procedure is simulated document management system disk space management, Disk Management, directory management (single-level directory) of a simulation program, as well as university computer courses on operating system design a case, we only reference
標簽: management Management procedure simulated
上傳時間: 2017-02-05
上傳用戶:zhuoying119
學(xué)生成績查詢系統(tǒng),運用結(jié)構(gòu)體,struct ,sort ,Clrscr(),textcolor()函數(shù),用for()循環(huán)語句,switch和ifelse作為條件測試語句。 程序?qū)崿F(xiàn)了學(xué)生成績查詢功能,有20個我們班學(xué)生的數(shù)據(jù)信息,每個包含: 學(xué)號 — num [10](字符串)、姓名(拼音)— name[25](字符串)、 性別 — sex(字符,M或W)、年齡 — age(整型)、 三門課程成績(高數(shù)、英語、計算機)— score [3 ](單精度)。設(shè)計一個系統(tǒng): 定義及輸出。用結(jié)構(gòu)體類型數(shù)據(jù)及其賦初值的方法把學(xué)生的數(shù)據(jù)送到結(jié)構(gòu)體數(shù)組中(第一個數(shù)據(jù)用自己的真實數(shù)據(jù),其它數(shù)據(jù)自定,但注意要是合法數(shù)據(jù)),然后把它們輸出顯示;計算并排序。計算每個學(xué)生三門課程的總分(sum,單精度)及平均分(aver,單精度,輸出一位小數(shù)),還有他們成績的排名,將包括所有數(shù)據(jù)的結(jié)構(gòu)體數(shù)組元素按總分從大到小的順序排序打印出來; 運行程序,進入主界面!可輸入1—輸出所有學(xué)生的成績,輸入2—計算和排列學(xué)生的成績,輸入3—查詢學(xué)生個人成績,輸入4—退出查詢。 在進行學(xué)生個人成績個人查詢可以實現(xiàn)多次查詢——進入學(xué)生個人查詢,輸入1回車實現(xiàn)多次查詢。 運行環(huán)境為TURBOC ,WINDOWSXP。
標簽: 成績查詢系統(tǒng)
上傳時間: 2014-01-01
上傳用戶:cx111111
Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or hard drive. * Encrypts a partition or drive where Windows is installed (pre-boot authentication). * Encryption is automatic, real-time (on-the-fly) and transparent. * Provides two levels of plausible deniability, in case an adversary forces you to reveal the password: 1) Hidden volume (steganography) and hidden operating system. 2) No TrueCrypt volume can be identified (volumes cannot be distinguished from random data). * Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS. Further information regarding features of the software may be found in the:http://www.truecrypt.org/
標簽: open-source encryption Features software
上傳時間: 2013-12-20
上傳用戶:123啊
The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the USB DPLL. Since the APLL is inherently more noise tolerant and has less long-term jitter than the DPLL, it is recommended that you switch to it for any USB operations.
標簽: USB peripherals the clocked
上傳時間: 2014-01-01
上傳用戶:yuzsu
This book uses the Python language to teach pro - gramming concepts and problem -solving skills, without assuming any previous program- ming experience. With easy-to-understand examples, pseudocode, flowcharts, and other tools, the student learns how to design the logic of programs and then implement those programs using Python. This book is ideal for an introductory programming course or a programming logic and design course using Python as the language. As with all the boolts in the Starting Out With series, the hallmark of this text is its clear, friendly, and easy -to-understand writing. In addition, it is rich in example programs that are concise and practical. The programs in this book include short examples that highlight specific programming topics, as well as more involved examples that focus on problem solving. Each chapter provides one or more case studies that provide step -by-step analysis of a specific problem and shows the student how to solve it.
標簽: language gramming concepts problem
上傳時間: 2014-01-12
上傳用戶:獨孤求源
Instead of finding the longest common subsequence, let us try to determine the length of the LCS. Then tracking back to find the LCS. Consider a1a2…am and b1b2…bn. Case 1: am=bn. The LCS must contain am, we have to find the LCS of a1a2…am-1 and b1b2…bn-1. Case 2: am≠bn. Wehave to find the LCS of a1a2…am-1 and b1b2…bn, and a1a2…am and b b b b1b2…bn-1 Let A = a1 a2 … am and B = b1 b2 … bn Let Li j denote the length of the longest i,g g common subsequence of a1 a2 … ai and b1 b2 … bj. Li,j = Li-1,j-1 + 1 if ai=bj max{ L L } a≠b i-1,j, i,j-1 if ai≠j L0,0 = L0,j = Li,0 = 0 for 1≤i≤m, 1≤j≤n.
標簽: the subsequence determine Instead
上傳時間: 2013-12-17
上傳用戶:evil
xyzzy is a program for the Nintendo Wii which will read a console s OTP key storage and dump out the private encryption keys to screen and to SD card. This is useful information in case your Wii ever gets bricked and you need to re-initialize the firmware.
標簽: the Nintendo console program
上傳時間: 2013-12-19
上傳用戶:清風冷雨
Last week I posted an article on a simple C++ template class, XYDataArray, I used in my system development tool. The main purpose of this template class is to store and sort general data types. I needed to implement the same thing in Java, since the tool I developed has a compatible Java version. I checked the Java SDK documentation before writing my own code, and found that almost everything I needed is already there, like the C++ case.
標簽: XYDataArray template article posted
上傳時間: 2017-03-03
上傳用戶:問題問題
"Readers can pick up this book and become familiar with C++ in a short time. Stan has taken a very broad and complicated topic and reduced it to the essentials that budding C++ programmers need to know to write real programs. His case study is effective and provides a familiar thread throughout the book.
標簽: familiar Readers become short
上傳時間: 2014-01-19
上傳用戶:luke5347
實現(xiàn)FPGA和上位機的串口通信,里面由波特率發(fā)生器,移位寄存器,計數(shù)器,detecter,switch,switch_bus等功能塊綜合而成。
上傳時間: 2017-03-22
上傳用戶:dongqiangqiang
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1