代码搜索:Exec

找到约 10,000 项符合「Exec」的源代码

代码结果 10,000
www.eeworm.com/read/372508/9506888

asm exec067.asm

www.eeworm.com/read/372508/9506891

asm exec065.asm

ORG 0000H AJMP START ORG 30H START: MOV SP,#5FH MOV TMOD,#00000110B ;定时/计数器1作计数用,0不用全置0 SETB TR0 ;启动计数器1开始运行. LOOP: MOV A,TL0 CPL A MOV P1,A AJMP LOOP
www.eeworm.com/read/372508/9506894

asm exec81.asm

FIRST EQU P2.7 ;第一位数码管的位控制 SECOND EQU P2.6 ;第二位数码管的位控制 DISPBUFF EQU 5AH ;显示缓冲区为5AH和5BH ORG 0000H AJMP START ORG 30H START: MOV SP,#5FH ;设置堆栈 MOV P1,#0FFH MOV P0,#0FFH MOV P2,#0FFH
www.eeworm.com/read/372508/9506897

hex exec064.hex

www.eeworm.com/read/372508/9506900

hex exec82.hex

:020000000130CD :02000B00016092 :1000300075815F7590FF7580FF75A0FF75890175EB :100040008CF8758A30D28CD2AFD2A9755900755A06 :10005000007400F55B04120096B40AF774000153B3 :10006000C0E0C0D0758CF8758A30D2
www.eeworm.com/read/372147/9519496

tcl ssh_exec.tcl

[root@auto4 ~]# cat ssh_exec.tcl #!/usr/bin/tclsh package req Expect if {$argc
www.eeworm.com/read/176032/9521364

m exec_bouncing.m

function exec_bouncing(x) %隶属于 BALL_BOUNCE,计算实际小球谈跳的过程。 k=1; uu=get(gcf,'UserData'); if nargin==0, [x,y,k]=ginput(1); uu{3}=x; set(gcf,'UserData',uu); end if k==1 if x
www.eeworm.com/read/371500/9551431

c exec1.c

#include #include #include "ourhdr.h" char *env_init[] = { "USER=unknown", "PATH=/tmp", NULL }; int main(void) { pid_t pid; if ( (pid =
www.eeworm.com/read/371500/9551473

c exec2.c

#include #include #include "ourhdr.h" int main(void) { pid_t pid; if ( (pid = fork()) < 0) err_sys("fork error"); else if (pid ==
www.eeworm.com/read/175022/9562809

asp before_exec.asp