My world command box brush
1. First of all, use stones or other blocks to place them as shown in the figure
tutorial time. The first thing to do is to brush out a sword. These instructions are best played in the command box. The command to draw a diamond sword is: give
@ P
minecraft:diamond_ Sword
1
0
activate this command after hitting it in the command box, and it will give players a common diamond sword/ I won't say more about the give command. It's more basic. Then add custom enchant to the sword. Very simple, just add a few NBTS. Instruction / give
@ P
minecraft:diamond_ sword
1
0{ench:[{id:16, lvl:5 }]}If this command is copied to the command box and activated, it will give the player a sharp sword of level 5:
explain NBT to you:
the NBT used for custom enchant is {ench}. If this NBT is used in the command box, it is to let the command box self define the enchant of the items. Explanation:
ench: user defined enchant. To customize enchant, you must hit this
ID: Enchant attribute ID. I will post the ID at the end of the post, and I will type the attribute ID of what I want to enchant
LVL: Enchant Level. If you don't play level and only play ID, you will brush a sword enchanted at level 0, which is meaningless. Level 10 is: lvl:10
these are the NBT of custom enchantment. Of course, not only swords, but also other equipment. If you want to customize enchant other equipment, change / give to brush other equipment.
so the command is / give @ a 276 1 0
that is to give all players a diamond sword, but the method after 1.8 is / give @ a diamond_ Sword 1 0
give: instructions for items
diamond_ Sword is the English ID of diamond sword. You must enter the English ID after 1.8. 1 is the quantity and 0 is the data label
you can type / give @ a diamond_ Sword 10 gives you a diamond sword with a sharp edge of 1000
168pin and 184pin interfaces are used in desktop memory. Corresponding to the different pin number of memory, the memory slot type is also different. At present, there are mainly three types of memory slots: SIMM, DIMM and RIMM in desktop computer system.
the main problems to be paid attention to in extending knowledge points to assemble computer configuration.
first of all, what kind of platform should be considered? Intel or AMD? Secondly, the platform should be determined to consider its actual use, and whether the hardware collocation is reasonable, Whether it can give full play to the maximum efficiency of each hardware. For more details, please refer to the library http://wenku..com/link?url=YY3MKslm45-_ ruk9wkhQ4WLJUjVzXu5JyBjaC_< br />
DS = 25V, I
d = 50a, P
tot = 63w (25
d = 50a) ° c06n03:v
ds=25v、i
d=50a、p
tot=83w25
° c) I also downloaded the PDF of 04n03: V
DS = 25V, I
d = 80A, P
tot = 107w (25 ° c) I found that the smaller the number in front of N03, the higher the power of this kind of tube. I don't know if it is. I heard from friends that when replacing MOS transistors, if different motherboards are all 775 CPUs, then MOS transistors can be interchanged. The upper transistors can also be mixed, and the lower transistors can also be mixed. It should be no problem to replace MOS transistors with this principle. In the post, we also see that the DS pole of MOS transistor can be reversed, because the DS pole of MOS transistor is symmetrically designed in the proction process. Then I don't understand, since it's symmetrical, why do I use a multimeter to measure s to d with 500 values, but d to s is infinite. Is there a master who can give us some advice?
primary, which is also an I / O domain. In addition, the control domain is also used as a service domain to provide virtual device services (virtual disk and virtual network) for the guest domain
as a service domain, the control domain provides the following virtual device services:
a virtual disk service (primary-vds0), which exports physical disks to the guest domain as virtual disks
a virtual console concentrator service (primary-vcc0) provides access to the guest domain virtual console. This service uses the port range 5000 – 5100
to access the virtual console
a virtual switch service (primary vsw0) is associated with the main network interface (nxge0)
software installation and configuration
follow these steps to configure your environment for real-time migration
installing Oracle Solaris
Oracle Solaris is pre installed on the new SPARC server. For these systems, ensure that the corresponding Oracle Solaris
version is installed, and verify that the required patches are applied
to re install Oracle
Solaris on SPARC system, please refer to Oracle
Solaris 10 documentation or Oracle
Solaris 11 documentation. In the example in this article, the operating system is installed on the first internal disk of the server
after installing Oracle Solaris, you can configure and enable the system to use Oracle VM server for SPARC 2.1 software
install Oracle VM
server for SPARC software
Oracle VM server for SPARC software is also pre installed on the new SPARC server. For these systems, ensure that the corresponding Oracle VM
server for SPARC version is installed, and verify that all necessary patches are applied
if you re install Oracle
Solaris on the server, you may have to re install the Oracle VM server for SPARC software. See Oracle
VM download page
the following example shows the operations performed on each physical server. Oracle Solaris and the required patches have been installed on each server
make sure that the system firmware matches the Oracle VM
server for SPARC version you plan to install. Refer to "required software and patches" in Oracle VM
server for SPARC 2.1 Version Description and "upgrading system firmware" in Oracle VM server for SPARC 2.1
Administration Guide
download the Oracle VM server for SPARC 2.1 software from the Oracle
VM download page
unzip the archive file
install sunwldm. V
package. See "installing Oracle VM server
for SPARC software on a new system" in the Oracle VM server for SPARC 2.1 administration guide< br />
primary# pkgadd -d OVM_ Server_ SPARC-2_ 1 / proct sunwldm. V
configure storage array
Sun storage 2540-m2 storage array is connected to the control domain, which exports two Lun (Lun 0 and Lun 1) to the guest domain as virtual disks
the guest domain uses the first Lun (Lun 0) as the system disk of the operating system and the second Lun (Lun 1) as the disk for storing Oracle database data files
configure control domain
after installing Oracle VM server for SPARC software, reconfigure the current system to become a control domain. Perform the following operations on each physical server:
create a virtual console concentrator (VCC)
service to be used by the virtual network terminal server daemons (vntd) and serve as a concentrator for all logical domain consoles
primary # LDM add VCC port range = 5000-5100 primary-vcc0 primary
create virtual disk server
(VDS)
primary # LDM add VDS primary-vds0 primary
create a virtual switch service (VSW)
for networking between virtual network (Vnet) devices in the logical domain
primary # LDM add VSW net dev = igb0 primary-vsw0 primary
use the LDM
list services command to verify that these services have been created, as shown in Listing 1
Listing 1. Validation services
primary # LDM list services primary
VDS
name volume options device
primary-vds0
VCC
name port-range
primary-vcc0 5000-5100
VSW
name MAC net-dev device mode
primary-vsw0 02:04:4f: FB: 9F: 0d nxge0 swit ch@0 prog, promisc
VCC
NAME LDOM PORT-RANGE
primary-vcc0 primary 5000-5100
VSW
NAME LDOM MAC NET-DEV ID DEVICE LINKPROP DEFAULT-VLAN-ID PVID VID ...
primary-vsw0 primary 00:14:4f:f8:28:c2 igb0 0 switch@0 1 1 1500 on
VDS
NAME Ldom volume options mpgroup device
primary-vds0 primary
Oracle VM server for SPARC uses SSL to encrypt migration traffic to protect sensitive data from utilization and eliminate the need for additional hardware and private network
when the primary domains on the source and target computers have assigned encryption units, the speed of migration operation increases. The reason for the increase in speed is that SSL operations can be shunted to the encryption unit
note: SPARC T4 CPU
has built-in encryption instructions, so you don't need to assign them to CPU
determine whether there are encryption devices in the control domain
primary # LDM list - O crypto primary
allocates encryption resources for the control domain
primary # LDM set crypto 1 primary
allocates CPU and memory for the control domain
you can rece the overall migration time by adding more CPUs to the primary domain on the source computer. It is best to allocate at least eight CPUs for each primary domain. For example, the following command allocates 8 CPUs and
4 GB of memory for the control domain
primary # LDM start reconf primary
primary # LDM set vcu8 primary
primary # LDM set memory 4G primary
restart the system.
-
there are requirements to meet the following two conditions:
1) platform (currently mainly AMD and Intel) and slot consistency
< 2) the function of the motherboard can meet some special functions of the CPU (such as overclocking)
-
detailed explanation: the CPU needs to connect with the motherboard through a certain interface to work. CPU after so many years of development, the interface mode has pin type, card type, contact type, pin type and so on. At present, the interface of CPU is pin type, and there are corresponding slot types on the motherboard. Different types of CPUs have different CPU slots, so to select a CPU, you must select the motherboard with the corresponding slot type. Motherboard CPU slot type is different, in the number of Jack, volume, shape has changed, so can not plug each other
-
the main problems that should be paid attention to when extending knowledge points to assemble computer configuration
firstly, what kind of platform should be considered? Intel or amd? Secondly, the platform should consider its actual use, whether the hardware collocation is reasonable, and whether it can give full play to the maximum efficiency of each hardware, More details can be found in the library http://wenku..com/link?url=YY3MKslm45-_ ruk9wkhQ4WLJUjVzXu5JyBjaC_
enter your own router, turn on the firewall switch, turn on the MAC address filtering, and set the MAC address in the list to access the Internet. Then, if your tenant wants to apply for a network cable from you, you need to manually enter his MAC address into your router's MAC address list before he can access the Internet. But the router has a function called MAC address cloning. If your tenant uses this function, he can also connect to the router.... This method may be very effective for Xiao and the like, and it is the same as IP address restriction... It's not very useful for people who know router
the best way is to find a better router to allocate network bandwidth. Turn off the DHCP function of the router, give the tenant's computer a fixed IP address, and enable the binding of IP address and MAC address. A certain bandwidth is given to the fixed IP address of the tenant. That's OK. The tenants below can connect the router and get WiFi. Anyway, the bandwidth is fixed, and they will give others free. When the time comes, if they don't want the card, they will stop.
if you don't have money, you can play body, 9 o'clock is full, and the equipment is mixed with physique and spirit
it's difficult to suggest that you only play body, 7 o'clock is full, and the equipment is full of intelligence. You can change it later