Examples of using The microcomputer in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
Such an application was the last element required to turn the microcomputer from a hobbyist's toy into a business machine.
It is clear that the memory card is protected without the security checking communication passing via the microcomputer, which is advantageous.
Jobs is widely recognized as a pioneer of the microcomputer revolution of the 1970s and 1980s, along with Apple co-founder Steve Wozniak….
The microcomputer technology that surfaced in the later half of the 1970s was effortlessly incorporated into items ranging from toys and cameras, to rice cookers, karaoke systems, health equipment, and industrial machinery.
But the microcomputer and its promise of being self-sufficient, unconnected to anything, was thought to be the future at the time.
Also, even while charging, you can use only the microcomputer if you connect the USB cable, you can check program operation during charging.
Steven is generally recognized as an explorer of the microcomputer revolution of the 1970s and 1980s, together with apple co-founder Steve Wozniak.
Take the microcomputer control, the steel barround bar, rebar for auto straightening, brake cut off(hydraulic). 2. Easy operation. 3. Digital electronic scale.
If the control program of the microcomputer is manipulated, then, first, the rewriteable memory is erased and a manipulated control program is overwritten.
Controlled by the microcomputer digital chips, giving the control unit multiple programmable modes including provision to interface with builidng security system, monitoring the doors position status, built-in UPS, etc.
The microcomputer of the automatic motor always detects the glass position and controls the amount of movement to the opposite direction from the pinching position.
The microcomputer control system can achieve manual and automatic control; various functions like formula storage, report forms printing, and automatic operation makes a reliable system;
instead of said security card communicating directly with the microcomputer, it will communicate with the mass memory card.
In this case, calculation of the hash value is performed up to 60 times and it is set to give up if the correct answer is not found, so the microcomputer on the right side failed“mining” and decided to adopt the information on the left side microcomputer. .
(3) Because different products need different speed, and the power and speed of the quadratic is proportional to, we can set the different time and different products required speed, the customer can freely set or select(through the microcomputer processor to fulfill).
This technology is the microcomputer.