-
-
[
Unix_Linux]
ARMmicroprocessorreigisterform.rar
ARM architecture includes a current program status register (CPSR) and five back-up procedures for status register (SPSRs). Backup procedures for status register used for exception handling. Here as an example to introduce procedures ARM9 Status Register ...
-
[
DOS]
vssback.rar
vss automatic backup and delete the file 14 days ago. very easy to use, so the liberation of labor management
-
[
SQL]
cangkuguanlixitong.rar
...
_RecordsetPtr m_pRecordset public:
ADOConn()
virtual ~ADOConn()
void OnInitADOConn()
_RecordsetPtr& GetRecordSet(_bstr_t bstrSQL)
BOOL ExecuteSQL(_bstr_t bstrSQL) _variant_t
void ExitConnect()
void Backup()
void Restore()
Category:
SQL Server Upload User:
zf0321525 Size:
247K
-
[
ASP/ASPX(.net)]
xueshengshetuanwangluoguanlipingtai.rar
... the selected information societies
5, pending the approval of the societies
6, modify administrator information
7, find the specified member information
8, defragment the database
9, the backup database
10, the management forum
11, publish notice
-
[
Others]
www.jobroon.cn.rar
... as our contact. Back-office functions include: website setup, e-mail, IP lock, publishing success stories, information dissemination of information, the user reply guestbook, database backup and other functions. Welcome to visit, address: www.jobroon.cn
-
-
[
PHP]
ebak2008os.rar
EmpireBak is a free open source, specifically for large data MYSQL Backup and stability designed into high-performance software, system backup and import sub-volumes, in theory, can be of any size database backup
-
-
[
C/C++]
3208LED.rar
... , week, temperature-wide information alternately shows that the required information at a glance.
★ professional clock chip DS1302 and backup battery, the clock continues to go down, the user setting the alarm time permanent preservation.
★ away ...
Category:
SCM Upload User:
miaotaozi Size:
172K
-
[
Visual C++ (VC++)]
WindowsNT_dre1.rar
... key solution to the problem, and then focuses on how to use it to achieve file access control, after the case file access auditing, document the dynamic encryption, and file backup of the mirror in the field of information security and key technologies.