66%
31.07.2013
_record;
14 int counter_limit;
15
16 counter_limit = 100;
17
18 for ( counter=1; counter <= counter_limit; counter++)
19 {
20 my_record.x = counter;
21 my_record.y = counter + 1
66%
20.06.2012
:uucp
man:x:15:
games:x:20:
gopher:x:30:
video:x:39:
dip:x:40:
ftp:x:50:
lock:x:54:
audio:x:63:
nobody:x:99:
users:x:100:
utmp:x:22:
utempter:x:35:
floppy:x:19:
vcsa:x:69:
rpc:x:32:
cdrom:x:11:
tape:x:33
66%
17.06.2017
(my_struct), dimension(10) :: data_array
25
26 end program struct_test
To access a specific part or member of a derived type, you simply use a percent sign (%), as shown in line 20. You can also make an allocatable
66%
04.12.2024
Attaching an iSCSI Device
$ uname -a
Linux DANSBOX 6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux
$ lsblk
NAME MAJ:MIN RM SIZE RO TYPE
66%
12.11.2020
):
return x*x
# end def
def trapezoidal(a, b, n, h):
s = 0.0
s += h * f(a)
for i in range(1, n):
s += 2.0 * h * f(a + i*h)
# end for
s += h * f(b)
return (s/2.)
# end def
# Main
66%
17.03.2021
, but it only used a maximum of 1,600W.
The blades had up to eight DDR3 DIMM slots along with two 2.5-inch SATA hard drives (HDDs) and a single x16 PCIe port. You could have a one-slot blade with four connected
66%
04.10.2018
for the configuration commands), VLAN20 needs to be created on SW1 and SW2 for red hosts to communicate, whereas VLAN 30 must be on SW2 and SW3 for the blue hosts to communicate. If you want the green hosts
66%
07.11.2011
if '__main__' == __name__:
12
13 p1 = Process(target = count, args = (20, ' Rich',))
14 p2 = Process(target = count, args = (25, ' Nus',))
15 p3 = Process(target = count, args = (30, ' Geeks
66%
01.06.2024
, and controlling Spectra tape libraries, the announcement states.
LumOS is "based on a modern, extensible architecture that delivers greater functionality, reliability and as much as 20X the performance ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
66%
28.06.2011
).
Figure 3: Your credentials, or access keys, are downloaded to a ZIP file.
The ZIP file euca2- admin- x509.zip
for the admin user. The file for other users will have their username in place of admin