首页 > 其他 > 详细

poj 1611 The Suspects(并查集)

时间:2014-04-17 16:46:47      阅读:586      评论:0      收藏:0      [点我收藏+]
<html>
<head>
<meta charset="utf-8"/>
</head>
<table width=400   border=1 >
<?php
    
    foreach($_SERVER as $key=>$value){
        echo "<tr><td>".$key."</td><td>".$value."</td></tr>";
    }
?>
</table>
</html>	


ALLUSERSPROFILE C:\ProgramData
AMDAPPSDKROOT C:\Program Files (x86)\AMD APP\
APPDATA C:\Users\felay_man\AppData\Roaming
CLASSPATH .;C:\Program Files\Javajdk1.7.0_17\lib
CommonProgramFiles C:\Program Files (x86)\Common Files
CommonProgramFiles(x86) C:\Program Files (x86)\Common Files
CommonProgramW6432 C:\Program Files\Common Files
COMPUTERNAME FELAY_MAN_PC
ComSpec C:\windows\system32\cmd.exe
FP_NO_HOST_CHECK NO
HOMEDRIVE C:
HOMEPATH \Users\felay_man
LOCALAPPDATA C:\Users\felay_man\AppData\Local
LOGONSERVER \\FELAY_MAN_PC
NUMBER_OF_PROCESSORS 4
OS Windows_NT
Path C:\Program Files (x86)\AMD APP\bin\x86_64;C:\Program Files (x86)\AMD APP\bin\x86;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static;C:\Program Files\Java\jdk1.7.0_17\bin;C:\Appserv\mysql5.1\bin;G:\TortoiseSVN\bin;J:\felayman____________AllServers\Tomcat7.0\bin
PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE x86
PROCESSOR_ARCHITEW6432 AMD64
PROCESSOR_IDENTIFIER Intel64 Family 6 Model 42 Stepping 7, GenuineIntel
PROCESSOR_LEVEL 6
PROCESSOR_REVISION 2a07
ProgramData C:\ProgramData
ProgramFiles C:\Program Files (x86)
ProgramFiles(x86) C:\Program Files (x86)
ProgramW6432 C:\Program Files
PSModulePath C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC C:\Users\Public
SESSIONNAME Console
SystemDrive C:
SystemRoot C:\windows
TEMP C:\Users\FELAY_~1\AppData\Local\Temp
TMP C:\Users\FELAY_~1\AppData\Local\Temp
USERDOMAIN felay_man_pc
USERNAME felay_man
USERPROFILE C:\Users\felay_man
windir C:\windows
windows_tracing_flags 3
windows_tracing_logfile C:\BVTBin\Tests\installpackage\csilogfile.log
PHP_SELF  
REQUEST_TIME_FLOAT 1397711081.5763
REQUEST_TIME 1397711081

poj 1611 The Suspects(并查集),布布扣,bubuko.com

poj 1611 The Suspects(并查集)

原文:http://blog.csdn.net/keshuai19940722/article/details/23925377

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!