Thursday, 19 April 2018 20:46 | Bulgaria
Tuesday, 17 April 2018 07:46 | Germany
I really wanted to possess have a good time this artifact, but my *** <a href=http://essay-job.cf/>essay</a> give it ruins all my plans
Tuesday, 10 April 2018 17:00 | Bolivia
Что за ошибка частотника?
Доброго времени суток!
Вылезла неисправность f123 на частотнике TMVRXE18-1000-4160-12. Подобные приборы ATV61ES5C31N4, CIMR-G7C41P51B, EI-P7002-400H на вентиляции без неисправностей.
Инструкцию нашел через bing по запросу "Ремонт частотного преобразователя Altivar atv12h018f1" prom-electric.ru/articles/1/350/ . Заменил ключевой транзистор.
Saturday, 07 April 2018 13:05 | Sierra Leone
Ошибка частотника насоса
seeing the acknowledgment, the transmitting computer knows itвЂ™s OK to send the rest of the data. Error Checking A receiver can use error checking to verify that all data arrived correctly. Ways to check a message for errors include parity bits, checksums, and sending duplicate data. As described earlier in this chapter, a parity bit in each transmitted word enables the receiving computer to detect most errors introduced between the transmitter and receiver. When using .NETвЂ™s SerialPort class or other serial-port classes or libraries for PC applications, the application only needs to select a parity type. The software automatically calculates and places the correct parity bit in each transmitted word and can raise an error on receiving data with incorrect parity. Microcontroller hardware and software may require the firmware to calculate and set or check the parity bit for each transmitted and received word. A checksum is an error-checking value obtained by performing mathematical or logical operations on the contents of a block of data. Applications can choose from a variety of methods to calculate checksums. A basic checksum calculation adds the values of the bytes in a block and uses the lowest byte of the result as the checksum. A checksum for ASCII Hex data 29 Chapter 2 can add the values represented by each pair of characters. Intel Hex and Motorola S-Record are two data formats that uses checksums on ASCII Hex data. The cyclic redundancy check CRC method uses more complex calculations to obtain checksum values. Protocols that use CRC values include the file-transfer protocols Kermit, XModem, YModem, and ZModem. Hash values are very secure checksums produced by message detection code MDC hash functions. To use hash values, the sender and receiver must share a key, which is a value used in creating the hash value and in verifying the received data. A computer that receives data with a checksum can repeat the calculation to obtain the checksum. If the checksu prom-electric.ru
Wednesday, 04 April 2018 04:24 | Colombia