confirm that the image is installed on the computer. the simplest method for Net Framework is to find % SystemRoot % \ Microsoft. net \ framework folder.
You can paste the addresses of the listed frameworks into the address bar of Windows
Uses shellapi; // Open C drive procedure tform1.button1click (Sender: tobject); begin ShellExecute (handle, 'open', 'cmder.exe ', 'c: \', nil, sw_normal show ); end; // open my computer procedure tform1.button2click (Sender: tobject); begin
During this time, I can go back to my computer. I first sorted out the programming-related PDF files on my computer, and most of them were old.
If you have what you need, please tell me, if you have what I do not have, please tell me; there will
Obtain the client information (Database Name, computer name, user name, network interface card physical address, IP address,
Program Name)
Create proc p_getlinkinfo@ Dbname sysname = NULL, -- Name of the database to be queried. The connection
A brother called me two days ago. His problem was that he wanted to study computer programming technology, but he wanted to learn too much and didn't know where to start, what I learned is also unavailable at work. This is also a problem I have
1 , Machine-levelProgramMemory is considered as a very large byte array, called virtual memory ( Virtual Memory ). Each byte of the memory is identified by a unique number ( Address ) , A set of all possible addresses is called a virtual
1. When additional virtual memory is required, a dynamic memory distributor (Dynamic Memory Allocator) is used ). A dynamic memory distributor maintains a virtual memory area of a process, known as heap ). In most Unix systems, the heap is a region
1. Each network application is based on the client-server model. The basic operation in the client-server model is the transaction (here the transaction is different from the transaction in the database, there is no database transaction feature,
1 , CISC ( Complex Instruction Set Computing ), RISC ( CED instruction-set computer ), MIPS ( million instructions per second ).
2 , CISC the encoding is variable-length, ia32 can be 1 ~ 15 ; RISC encoding
1Compilation technology is divided into "machine-independent" and "machine-related. "It is not related to machines". When using these technologies, you may not consider executingCodeAnd "machine-related" means that these technologies depend on the
1. There are two types of locality: temporal locality and spatial locality ). InProgramThe memory location that has been referenced once is likely to be referenced multiple times in the near future. In a program with a good spatial locality, if a
1. Pentium address translation
1) page table
Each Pentium system uses two levels of page tables.
Each process has a unique page Directory and page table set. Page Directory base register (pdbr) points to the starting position of the page
1. set associative Cache)
1
2. fully associative Cache)
E = C/B
Because fully-connected high-speed cache requires parallel searches for many matched rows, it is relatively difficult to construct.
1. cache-friendlyCode
It is good to repeatedly reference local variables because the compiler can cache them in register files (Time locality ). (Internal loop)
The reference mode with a step of 1 is good, because the cache at all
1, System hardware composition
Figure1 hardware organization of a typical system. CPU: central processing unit, ALU: arithmetic/logic unit, PC: program counter, USB: Universal Serial Bus.
1)Bus
A set of electronic pipelines
When I was in high school and elementary college, there was always such an argument: Good computer companies like to recruit graduates from mathematics or physics, saying that they have a solid foundation in mathematics. One of my elders who studied
1. Installing too many operating systems on the same hard disk will cause the system to crash. 2. Do not overclock the CPU, display card, or other accessories. Pay attention to the temperature. Otherwise, it will be inexplicably restarted or
1. A process in a system shares CPU and primary memory resources with other processes.
2. Virtual Memory (Virtual Memory) is a complete interaction between hardware exceptions, hardware address translation, primary storage, disk files, and
1. If yourProgramThe required data is stored in the CPU register, so they can be accessed within zero period of execution. If it is stored in High-Speed buffering, 1 ~ 10 cycles. If it is stored in the primary storage, 50 ~ 100 cycles. If it is
1. If logical control flows overlap in time, they are concurrent. This phenomenon is called concurrency ( concurrency ).
2. To allow the server to serve a large number of clients at the same time, it is better to create a concurrent server
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.