Can't tell you about running it on a phone, But I can say that GNU COBOL's not at all what I expected a freeware compiler to be. It's quite advanced with many feats one would expect of the high $$$ compilers and more. It "ports" through c, and you can cause it to save (retain) the c source code...
Write the values to an indexed file that is indexed by the values. Any duplicate value will cause a data exception, the duplicate will not be written to the file. Once all values have been written to the file, use the file to load the table.
Steve
Quote "So I changed the driver "
I assume DataCard's driver: click around the settings and read carefully. It's been awhile since I've configured their windows drivers, but I seem to recall the "save" routine was a seperate proc from the "change" routine, and it was not very evident.
I'm an...
colin4228,
I was not aware of the version difference, however I should of figured Microsoft would do that as they no longer support Win 98 or 98se. Sorry 'bout that.
Anyway, to kill a process or process tree (win 98se), once you invoke process explorer, simply right click on the process...
Hmmm,,,,,
This is what viruses do:
1) They replicate quickly.
(Okay, Windows does that)
2) Viruses use up valuable system resources.
(Windows does that too)
3) Viruses usually trash your hard disk if they are not
controlled.
(Alright, alright, Windows does that too)
4)...
You can also create a shutdown (and for that matter, a reboot) icon via shell32.dll.
For the shutdown icon, create a shortcut (.lnk) on your desktop, right click on the shortcut icon, select "properties" and paste
"C:\WINDOWS\RUNDLL.EXE shell32.dll,SHExitWindowsEx 1"
(without the "s) into the...
For vastly improved control and display of "background" progs (actually all), go to
http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx
Download the freewware prog "Process Explorer." Besides the excellent detail it displays, Process Explorer has a great kill feature that allows you...
As of 09/12 AVG downloads are still running incredibly slow; on an 8. line that routinely does better than 500 kbyte/sec down, 17.9 kbyte/sec is the best so far. That translates to approximately 55 minutes for the version 8 installable (5.some megbyte file).
Steve
A hammer and some effort would do nicely, that is if one sufficiently mutilates the tape contained inside. May be a good way to relieve some of the job related stress too.
Steve
Webrabbit,
Correct on both counts; it was known as the "E" compiler, and I believe it was DOS release 23 for that systems final years.
Tom,
That compiler did run on the mod 30, and we had an "F" compiler that ran as well, that is "F" being Full American National Standard COBOL, although it...
webrabbit,
That sure goes back aways. From IBM System Reference Library, IBM system/360 Disk and Tape Operating Systems COBOL language Specifications (Fourth Edition, November 1966) File Number S360-24, Form C24-3433-3 Page 73;
This was my first encounter with COBOL, running on a 360 model 30...
I'll beat it one more time.
LawnBoy,
The definition of a diode is an electrical device that allows current to move through it in one direction with far greater ease than in the other. A forward biased diode allows current to pass through with some (usually minor) loss, a reverse-biased diode...
The “unplugme” is a classic sign that the psu's tripping one of it's overvolt/crowbar protection circuits. In the "old" days an overvolt/crowbar protector consisted of a silicon controlled rectifier (SCR) with it's cathode and anode wired across the particular direct current (D.C.) output's plus...
ABOzIT,
10 gig is a bit small these days. Here the primary partition size depends on the overall hd size, and the intended usage of the pc. Nevertheless, 16 gig is the smallest.
Steve
cdogg
fyi; ata ide cable master/slave connector position can be the opposite, e.g.; master in middle and slave at end, rather than master at end and slave in middle as you've described above. As there are a variety of ide cable configurations possible, it depends on how the manufacturer...
You can look up an IP at http://www.arin.net/whois/index.html however, if you are being "hacked," then the source ip may be spoofed, in other words the ip in your logs may not the ip of the attacker.
Steve
The 1-2-3 a-b-c relationship theory makes the most sense. As for keyboard ten-keys, the first application I know of was on the IBM model 029 card punch first released in the late 1950’s. It was not a separate keypad like today, but was built into the alphabetic keys in a diamond like pattern on...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.