1.两个串相等的充要条件是()。
A.串长度相等B.串长度任意C.串中各位置字符任意D.串中各位置字符均对应相等2.对称矩阵的压缩存储:以行序为主序存储下三角中的元素,包括对角线上的元素。
二维下标为(i,j),存储空间的一维下标为k,给出k与i,j(i<j)的关系k=()(1<=i,j<=n,0<=k<n*(n+1)/2)。
A.i*(i-1)/2+j-1B.i*(i+1)/2+jC.j*(j-1)/2+i-1D.j*(j+1)/2+i3.二维数组A[7][8]以列序为主序的存储,计算数组元素A[5][3]的一维存储空间下标k=()。
A.38B.43C.26D.294.已知一维数组A采用顺序存储结构,每个元素占用4个存储单元,第9个元素的地址为144,则第一个元素的地址是()。
A.108B.180C.176D.1125.下面()不属于特殊矩阵。
A.对角矩阵B.三角矩阵C.稀疏矩阵D.对称矩阵6.假设二维数组M[1..3,1..3]无论采用行优先还是列优先存储,其基地址相同,那么在两种存储方式下有相同地址的元素有()个。
A.3B.2C.1D.07.若Tail(L)非空,Tail(Tail(L))为空,则非空广义表L的长度是()。
(其中Tail表示取非空广义表的表尾)A.3B.2C.1D.08.串的长度是()。
A.串中不同字母的个数B.串中不同字符的个数C.串中所含字符的个数,且大于0D.串中所含字符的个数9.已知广义表((),(a),(b,c,(d),((d,f)))),则以下说法正确的是()。
A.表长为3,表头为空表,表尾为((a),(b,c,(d),((d,f))))B.表长为3,表头为空表,表尾为(b,c,(d),((d,f)))C.表长为4,表头为空表,表尾为((d,f))D.表长为3,表头为(()),表尾为((a),(b,c,(d),((d,f))))10.广义表A=(a,b,c,(d,(e,f))),则Head(Tail(Tail(Tail(A))))的值为()。
(Head与Tail分别是取表头和表尾的函数)A.(d,(e,f))B.dC.fD.(e,f)二、填空题(每空2分,共8分)。
1.一个广义表为F=(a,(a,b),d,e,(i,j),k),则该广义表的长度为________________。
GetHead(GetTail(F))=_______________。
2.一个n*n的对称矩阵,如果以行或列为主序压缩存放入内存,则需要个存储单元。
3.有稀疏矩阵如下:005700-300040020它的三元组存储形式为:。
三、综合题(共22分)。
1.(共8分)稀疏矩阵如下图所示,描述其三元组的存储表示,以及转置后的三元组表示。
0-30004060000007015080转置前(4分):转置后(4分):2.(共14分)稀疏矩阵M的三元组表如下,请填写M的转置矩阵T的三元组表,并按要求完成算法。
(1)写出M矩阵转置后的三元组存储(6分):M的三元组表:T的三元组表:ije2133244254
1
时间--成本--质量(或特性)是评价软件项目成败的三个关键指标,这三个指标之间相互影响和制约,形成了所谓的“项目管理三角形”。
要提高质量或增加特性意味着成本和时间的增加,或两者都增加;
要在时间不变的前提下缩减开发成本或成本不变的前提下缩减时间则意味着质量的下降或特性的削减。
图1-1项目管理三角形上述分析其实只是理论上的“理想平衡”状态。
现实工作中往往出现的情形是:要么时间超过计划,要么成本超过预算,要么质量达不到要求,要么三个指标都达不到预期。
典型例子:由于客户的压力需要尽量缩减开发时间,由于企业间的竞争和盈利压力需要尽量节约成本,因此需要一个人做两个人的工作,一个月做两个月的工作,同时压缩需
2025/2/19 4:28:10 781KB 软件开发基本原则
1
计算机网络课程设计+源代码文件课程设计任务书 -3-一、设计任务与要求 -5-二、实验环境 -5-三、主要技术原理 -5-1.VLAN技术介绍 -5-2.DHCP技术介绍 -5-3.ACL协议介绍 -5-4.动态路由 -6-四、设计规划 -6-1、网络拓扑图 -6-2、划分ip -7-3.线缆使用 -7-4.交换机和路由器的配置 -8-五、模拟器下服务器的实现 -11-1、Web服务器 -11-2、DNS服务器 -11-3、DHCP服务器 -12-六、模拟器下的测试 -12-七、实体机上服务器配置(WEB、DNS、DHCP) -16-1、服务器拓扑结构图 -16-2、配置实体机DNS服务器 -16-1)DNS服务器工作原理 -16-2)实验步骤 -17-3、配置实体机Web服务器 -20-1)Web服务器工作原理 -20-2)实验步骤 -20-4、配置实体机DHCP服务器 -25-1)DHCP服务器工作原理 -25-2)实验步骤 -26-八、心得体会 -31-
1
是一套开源的在线HTML编辑器,主要用于让用户在网站上获得所见即所得编辑效果,开发人员可以用UEditor把传统的多行文本输入框(textarea)替换为可视化的富
2025/2/18 22:35:34 28KB ueditor-1.1.
1
大数据组件,官方版本:CDH5.9.0操作系统:CentOS7/RHEL7完整系列:CDH-5.9.0-1.cdh5.9.0.p0.23-el7.parcel(该文件被分割成三个压缩包,例如:.aa/.ab.ac)CDH-5.9.0-1.cdh5.9.0.p0.23-el7.parcel.sha由于CSDN资源文件大小的限制,分割成三个压缩文件了,下载后合并解压即可
2025/2/18 14:41:07 500MB CDH5.9.0 CDH 大数据
1
基于(ISC)2CISSPCommonBodyofKnowledge,可以辅助allinone加深对8个域知识点了解,最新的知识点已经在2018年4月15日CISSP考试中广泛体现。
本学习指南重点突出知识点概念并伴有相应测试题,结合allinone8后面测试题、光盘题和《CISSPOfficial(ISC)2PracticeTests2018年第二版》英文版&官方练习题及解题详解(1300题左右),备考题库已足够了解所有知识点本书含21章节,各域对应的章节如下:1-4章对应Domain1SecurityandRiskMgmt第5章对应Domain2Assetsecurity资产安全第6,7,8,9,10章对应Domain3安全架构与工程第11,12章,通讯与网络安全第13,14章,身份与访问管理IAM第15章对应域安全评估与测试第16,17,18,19章对应域7安全运维第20,21章软件开发安全DevelopmentEditor:KellyTalbotTechnicalEditors:JeffParker,BobSipes,andDavidSeidlCopyEditor:KimWimpsettEditorialManager:PeteGaughanProductionManager:KathleenwisorExecutiveeditor:imminatelProofreader:AmyschneiderIndexer:JohnnaVanHoosedinseProjectCoordinator,Cover:brentSavageCoverDesigner:wileyCoverImage:@JeremyWoodhouse/GettyImages,Inc.CopyrightC2018byJohnWileySons,InC,Indianapolis,IndianaPublishedsimultaneouslyinCanadaISBN:978-1-119-47593-4ISBN:978-1-119-47595-8(ebk)ISBN:978-1-119-47587-3(ebk)ManufacturedintheUnitedStatesofamericaNopartofthispublicationmaybereproduced,storedinaretrievalsystemortransmittedianyformorbyanymeans,electronic,mechanical,photocopying,recording,scanningorotherwise,exceptaspermittedunderSections107or108ofthe1976UnitedStatesCopyrightAct,withouteitherthepriorwrittenpermissionofthePublisher,orauthorizationthroughpaymentoftheappropriateper-copyfeetotheCopyrightClearanceCenter,222RosewoodDrive,Danvers,MAO1923,(978)750-8400,fax(978)646-8600RequeststothePublisherforpermissionshouldbeaddressedtothepermissionsDepartment,JohnWileysons,Inc.111RiverStreet,Hoboken,NJo7030,(201)748-6011,fax(201)748-6008,oronlineathttp://www.wiley.com/go/permissionsLimitofliability/DisclaimerofWarranty:Thepublisherandtheauthormakenorepresentationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthisworkandspecificallydisclaimallwarranties,includingwithoutlimitationwarrantiesoffitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedbysalesorpromotionalmaterials.Theadviceandstrategiescontainedhereinmaynotbesuitableforeverysituation.Thisworkissoldwiththeunderstandingthatthepublisherisnotengagedinrenderinglegal,accounting,orotherprofessionalservices.Ifprofessionalassistanceisrequiredtheservicesofacompetentprofessionalpersonshouldbesought.Neitherthepublishernortheauthorshallbeliablefordamagesarisingherefrom.ThefactthatanorganizationorWebsiteisreferredtointhisworkasacitationand/orapotentialsourceoffurtherinformationdoesnotmeanthattheauthororthepublisherendorsestheinformationtheorganizationorWebsitemayprovideorrecommendationsitmaymakeFurtherreadersshouldbeawarethatInternetWebsiteslistedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenandwhenitisreadForgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupportpleasecontactourCustomerCareDepartmentwithintheU.S.at(877)762-2974,outsidetheUS.at(317)5723993orfax(317)572-4002Wileypublishesinavarietyofprintandelectronicformatsandbyprint-on-demand.Somematerialincludedwithstandardprintversionsofthisbookmaynotbeincludedine-booksorinprint-On-demand.IfthisbookreferstomediasuchasaCDorDVdthatisnotincludedintheversionyoupurchasedyoumaydownloadthismaterialathttp://booksupport.wilev.comFormoreinformationaboutwileyproductsvisitwww.wiley.comLibraryofCongressControlNumber:2018933561TRADEMARKS:Wiley,theWileylogo,andtheSybexlogoaretrademarksorregisteredtrademarksofJohnWileySons,Incand/oritsaffiliates,intheUnitedStatesandothercountries,andmaynotbeusedwithoutwrittenpermission.CISSPisaregisteredtrademarkof(ISC)2,Inc.AllothertrademarksarethepropertyoftheirrespectiveownersJohnWileySons,Incisnotassociatedwithanyproductorvendormentionedinthisbook.ToDewittLatimer,mymentor,friend,andcolleague.Imissyoudearly.MikeChappleToCathy,yourperspectiveontheworldandlifeoftensurprisesme,challengesme,andmakesmeloveyouevenmoreJamesmichaelstewartToNimfa,thanksforsharingyourlifewithmeforthepast26yearsandlettingmeshareminewithyouDarrilgibsonDearFuture(ISC)2MemberCongratulationsonstartingyourjourneytoCISSPRcertificationEarningyourCISSPisanexcitingandrewardingmilestoneinyourcybersecuritycareer.Notonlydoesitdemonstrateyourabilitytodevelopandmanagenearlyallaspectsofanorganizationscybersecurityoperations,butyoualsosignaltoemployersyourcommitmenttolife-longlearningandtakinganactiveroleinfulfillingthe(isc)2visionofinspiringasafeandsecurecyberworldThematerialinthisstudyguideisbaseduponthe(isc)2cisspCommonBodyofKnowledge.ItwillhelpyoupreparefortheexamthatwillassessyourcompetencyinthefollowingeightdomainsaSecurityandriskmanagement■AssetsecuritySecurityArchitectureandengineeringaCommunicationandNetworksecurityaIdentityandAccessManagement(IAM)SecurityAssessmentandTesting■SecurityOperationsSoftwareDevelopmentSecurityWhilethisstudyguidewillhelpyouprepare,passingthecisspexamdependsonyourmasteryofthedomainscombinedwithyourabilitytoapplythoseconceptsusingyourreal-worldexperienceiwishyouthebestofluckasyoucontinueonyourpathtobecomeaCISSPandcertifiedmemberof(Isc)2Sincerely,Davidshearer.CISSPCEO(ISC)2Ackn。
w|edgmentsWe'dliketoexpressourthankstoSybexforcontinuingtosupportthisproject.Extrathankstotheeightheditiondevelopmentaleditor,kellyTalbot,andtechnicaleditors,JeffParker,BobSipes,andDavidSeidlwhoperformedamazingfeatsinguidingustoimprovethisbookThanksaswelltoouragent,CaroleJelen,forcontinuingtoassistinnailingdowntheseprojectsMikejames.anddarrilSpecialthanksgototheinformationsecurityteamattheUniversityofNotreDame,whoprovidedhoursofinterestingconversationanddebateonsecurityissuesthatinspiredandinformedmuchofthematerialinthisbookIwouldliketothanktheteamatwileywhoprovidedinvaluableassistancethroughoutthebookdevelopmentprocess.ialsooweadebtofgratitudetomyliteraryagent,CaroleJelenofWatersideProductions.Mycoauthors,JamesMichaelStewartanddarrilGibsonweregreatcollaborators.JeffParker,BobSipes,andDavidSeidl,ourdiligentandknowledgeabletechnicaleditors,providedvaluableinsightaswebroughtthiseditiontopressIdalsoliketothankthemanypeoplewhoparticipatedintheproductionofthisbookbutwhomIneverhadthechancetomeet:thegraphicsteam,theproductionstaff,andallofthoseinvolvedinbringingthisbooktopress-MikeChappleThankstoMikeChappleandDarrilGibsonforcontinuingtocontributetothisprojectThanksalsotoallmycisspcoursestudentswhohaveprovidedtheirinsightandinputtoimprovemytrainingcoursewareandultimatelythistome.Tomyadoringwife,CathyBuildingalifeandafamilytogetherhasbeenmorewonderfulthanIcouldhaveeverimagined.ToSlaydeandremi:youaregrowingupsofastandlearningatanoutstandingpace,andyoucontinuetodelightandimpressmedaily.YouarebothgrowingintoamazingindividualsTomymom,Johnnie:ItiswonderfultohaveyouclosebyToMarkNomatterhowmuchtimehaspassedorhowlittleweseeeachother,Ihavebeenandalwayswillbeyourfriend.andfinally,asalways,toElvis:Youwerewayaheadofthecurrentbaconobsessionwithyourpeanutbutter/banana/baconsandwich;ithinkthat'sproofyoutraveledthroughtimeJamesmichaelStewartThankstoJimMinatelandCaroleJelenforhelpinggetthisupdateinplacebefore(IsC)2releasedtheobjectives.Thishelpedusgetaheadstartonthisnewedition,andweappreciateyourefforts.It'sbeenapleasureworkingwithtalentedpeoplelikeJamesMichaelStewartandMikeChappleThankstobothofyouforallyourworkandcollaborativeeffortsonthisproject.Thetechnicaleditors,JeffParkerBobSipes,andDavidSeidl,provideduswithsomeoutstandingfeedback,andthisbookisbetterbecauseoftheireffortsThankstotheteamatSybex(includingprojectmanagers,editors,andgraphicsartists)foralltheworkyoudidhelpingusgetthisbooktoprint.Last,thankstomywife,Nimfa,forputtingupwithmyoddhoursasIworkedonthisbookDarrilgibsonAbouttheauthorsMikeChapple,CISSP,PhD,Security+,CISA,CySA+,isanassociateteachingprofessorofIT,analytics,andoperationsattheUniversityofNotreDame.InthepasthewaschiefinformationofficerofBrandInstituteandaninformationsecurityresearcherwiththenationalSecurityagencyandtheu.s.airForcehisprimaryareasofexpertiseincludenetworkintrusiondetectionandaccesscontrols.mikeisafrequentcontributortoTechTarget'sSearchSecuritysiteandtheauthorofmorethan25booksincludingthecompanionbooktothisstudyguide:CISSPOfficial(ISC)2PracticeTests,theCompTIACSA+StudyGuide,andCyberwarfare:InformationOperationsinaConnectedWorld.MikeoffersstudygroupsfortheCISSP,SSCP,Security+,andcSa+certificationsonhiswebsiteatwww.certmike.comJamesMichaelStewart,CISSP,CEH,ECSA,CHFI,Security+Network+,hasbeenwritingandtrainingformorethan20years,withacurrentfocusonsecurity.hehasbeenteachingCiSsPtrainingcoursessince2002,nottomentionothercoursesonInternetsecurityandethicalhacking/penetrationtestingHeistheauthorofandcontributortomorethan75booksandnumerouscoursewaresetsonsecuritycertification,Microsofttopics,andnetworkadministrationincludingtheSecurity+(SY0-501)Reviewguide.Moreinformationaboutmichaelcanbefoundathiswebsiteatwww.impactonline.comDarrilGibson,CISSP,Security+,CASP,istheCeoofYODa(shortforYouCanDoAnything),andhehasauthoredorcoauthoredmorethan40books.Darrilregularlywrites,consults,andteachesonawidevarietyoftechnicalandsecuritytopicsandholdsseveralcertificationsHeregularlypostsblogarticlesathttp://blogs.getcertifiedgetahead.com/aboutcertificationtopicsandusesthatsitetohelppeoplestayabreastofchangesincertificationexams.Heloveshearingfromreaders,especiallywhentheypassanexamafterusingoneofhisbooks,andyoucancontacthimthroughthelebloggingsite.
2025/2/15 1:12:56 17.84MB CISSP OSG OSG8 Official
1
构建CNNLayerBuilderbuilder=newLayerBuilder();builder.addLayer(Layer.buildInputLayer(newSize(28,28)));builder.addLayer(Layer.buildConvLayer(6,newSize(5,5)));builder.addLayer(Layer.buildSampLayer(newSize(2,2)));builder.addLayer(Layer.buildConvLayer(12,newSize(5,5)));builder.addLayer(Layer.buildSampLayer(newSize(2,2)));builder.addLayer(Layer.buildOutputLayer(10));CNNcnn=newCNN(builder,50);运行MNIST数据集StringfileName="data/train.format";Datasetdataset=Dataset.load(fileName,",",784);cnn.train(dataset,100);Datasettestset=Dataset.load("data/test.format",",",-1);cnn.predict(testset,"data/test.predict");计算精度可以达到97.8%。
2025/2/14 17:58:03 1.87MB 性别识别
1
1.首先,要获得Win10WindowsApps文件夹访问权限的具体操作方法如下:步骤:第一步:设置显示隐藏文件夹,打开C:\ProgramFiles文件夹,右击WindowsApps文件夹,选择“属性”,在安全里面选择“高级”第二步:更改所有者,为Everyone,确定。
第三步:最后会出现“Windows安全”窗口,等待系统设置好安全信息就可以了。
2.查:通过系统内置的WindowsPowerShellI命令,尝试解决Win10应用商店消失的问题。
一、在开始菜单,右键打开WindowsPowerShell(管理员),在WindowsPowerShell(管理员)页面,输入以下命令,获取您电脑所安装的Windows10内置程序的版本:Get-AppxPackage-allusers检查是否有附件中安装包,没有的话,下载附件,解压到WindowsApps文件夹:Name:Microsoft.WindowsStorePublisher:CN=MicrosoftCorporation,O=MicrosoftCorporation,L=Redmond,S=Washington,C=USArchitecture:X64ResourceId:Version:11811.1001.27.0PackageFullName:Microsoft.WindowsStore_11811.1001.27.0_x64__8wekyb3d8bbweInstallLocation:C:\ProgramFiles\WindowsApps\Microsoft.WindowsStore_11811.1001.27.0_x64__8wekyb3d8bbweIsFramework:FalsePackageFamilyName:Microsoft.WindowsStore_8wekyb3d8bbwePublisherId:8wekyb3d8bbwePackageUserInformation:{S-1-5-21-457848557-3406337263-1732915882-1001[ZunPC]:Installed}IsResourcePackage:FalseIsBundle:FalseIsDevelopmentMode:FalseNonRemovable:FalseDependencies:{Microsoft.NET.Native.Framework.1.7_1.7.27413.0_x64__8wekyb3d8bbwe,Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe,Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe,Microsoft.WindowsStore_11811.1001.27.0_neutral_split.scale-100_8wekyb3d8bbwe...}IsPartiallyStaged:FalseSignatureKind:StoreStatus:Ok3.安装依存的运行库Microsoft.NET.Native.Framework.1.7和Microsoft.VCLibs.140.00_14.0.27323.0_x64:在WindowsPowerShell(管理员)页面,输入以下命令,安装:Add-appxpackage-register"C:\ProgramFiles\WindowsApps\Microsoft.NET.Native.Framework.1.7_1.7.27413.0_x64__8wekyb3d8bbwe\appxmanifest.xml"-disabledevelopmentmode(黄色标识的部分,为第二部分中复制的内容)Add-ap
2025/2/14 4:33:43 20.35MB Win10 应用商店安装
1
具体详情https://gitee.com/wuburen/guns#GunsV2.1新版Guns基于SpringBoot全面升级,完美整合springmvc+shiro+mybatis-plus+beetl!在不用写xml配置(V1.0)的基础上进一步简化项目配置,让您更专注于业务开发!抛弃传统springxml的配置方式,利用springboot+javabean方式配置spring,极大简化了pom.xml配置和spring配置.Guns项目代码简洁,注释丰富,上手容易,同时Guns包含许多基础模块(用户管理,角色管理,部门管理,字典管理等10个模块),可以直接作为一个后台管理系统的脚手架.如果您不喜欢用SpringBoot,或者您是一个spring初学者,您可以切换到GunsV1.0(点击这里)分支,GunsV1.0基于spring的javabean方式配置项目,同样简洁易上手.注:SpringBoot强大的AutoConfig和统一的依赖管理极大的简化了spring配置和maven依赖,在不了解其都配置了哪些东西的基础上可能会对初学者有一定困扰,所以建议初学者先看GunsV1.0##功能简介用户管理角色管理部门管理菜单管理字典管理业务日志登录日志监控管理通知管理代码生成##使用说明导入sql/guns.sql文件到mysql数据库以maven方式导入项目到ide修改application.yml中的数据库相关的配置,改为您本机的数据库配置启动项目,管理员账号admin/密码111111###如何启动项目Guns目前支持三种启动方式:在IDE里运行GunsApplication类中的main方法启动执行如下maven命令cleanpackage-Dmaven.test.skip=true并从target目录中找到guns-1.0.0-SNAPSHOT.jar,并在jar包的目录下执行如下java命令java-jarguns-1.0.0-SNAPSHOT.jar修改pom.xml中如下片段jar改为war并打包放入到tomcat中执行##所用框架###前端Bootstrapv3.3.6jQueryv2.1.4bootstrap-tablev1.9.0layerv2.1zTreecorev3.5.28WebUploader0.1.5###后端SpringBoot1.5.3.RELEASEMyBatis-Plus2.0.8MyBatis3.4.4Spring4.3.8.RELEASEBeetl2.7.15hibernate-validator5.3.5.FinalEhcache3.3.1Kaptcha2.3.2Fastjson1.2.31Shiro1.4.0Druid1.0.31##项目包结构说明├─main│││├─java│││││├─com.stylefeng.guns----------------项目主代码│││││││├─common----------------项目公用的部分(业务中经常调用的类,例如常量,异常,实体,注解,分页类,节点类)│││││││├─config----------------项目配置代码(例如mybtais-plus配置,ehcache配置等)│││││││├─core----------------项目运行的核心依靠(例如aop日志记录,拦截器,监听器,guns模板引擎,shiro权限检查等)│││││││├─modular----------------项目业务代码│││││││├─GunsApplication类----------------以main方法启动springboot的类│││││││└─GunsServletInitializer类----------------用servlet容器启动springboot的核心类│││││
2025/2/13 0:12:08 70B java SpringBoot guns guns(收费)
1
PCL-1.8.0-AllInOne-msvc2015-win64.exe.从网址http://unanancyowen.com/en/pcl18/下载过来的。
分享给不能fq的朋友。
文件大小为357MB.
2025/2/12 21:32:30 357.65MB PCL
1
共 1000 条记录 首页 上一页 下一页 尾页
在日常工作中,钉钉打卡成了我生活中不可或缺的一部分。然而,有时候这个看似简单的任务却给我带来了不少烦恼。 每天早晚,我总是得牢记打开钉钉应用,点击"工作台",再找到"考勤打卡"进行签到。有时候因为工作忙碌,会忘记打卡,导致考勤异常,影响当月的工作评价。而且,由于我使用的是苹果手机,有时候系统更新后,钉钉的某些功能会出现异常,使得打卡变得更加麻烦。 另外,我的家人使用的是安卓手机,他们也经常抱怨钉钉打卡的繁琐。尤其是对于那些不太熟悉手机操作的长辈来说,每次打卡都是一次挑战。他们总是担心自己会操作失误,导致打卡失败。 为了解决这些烦恼,我开始思考是否可以通过编写一个全自动化脚本来实现钉钉打卡。经过一段时间的摸索和学习,我终于成功编写出了一个适用于苹果和安卓系统的钉钉打卡脚本。
2024-04-09 15:03 15KB 钉钉 钉钉打卡