当前位置:网站首页>Operation of cmake under win
Operation of cmake under win
2022-07-01 18:20:00 【Super__ Idol】
Catalog
02. Generate and compile project files
01. establish Cmake Folder
It contains HelloWorld.cpp、CMakeLists.txt.
HelloWorld.cpp:
#include <iostream>
using namespace std;
int main() {
cout<<"HelloWorld"<<endl;
system("pause");
return 0;
}CMakeLists.txt:
cmake_minimum_required (VERSION 2.6)
project (HelloWorld)
add_executable (HelloWorld HelloWorld.cpp)02. Generate and compile project files
Get into cmake Folder Directory , Run the command
cmake .03. Compiler Engineering
Run the command ( notes : The default is Debug Pattern )
cmake --build .To run Release Pattern , Change it to the following order
cmake --build . -- /p:Configuration=Release04. Run the program
Enter with exe The catalog of ( stay Debug or Release Under the folder )
cd Debug // Or is it cd Releaseperform HelloWorld.exe
HelloWorld.exeOutput results :

边栏推荐
- Slider verification code identification gadget display
- 证券开户安全么,有没有什么样的危险呢
- Kernel stray cat stray dog pet adoption platform H5 source code
- From comedians to NBA Zhan Huang, check the encrypted advertisements during this super bowl
- golang中的select详解
- Terms related to K line
- Detailed explanation of select in golang
- 网上股票开户安全吗?是否可靠?
- Euler function: find the number of numbers less than or equal to N and coprime with n
- Oracle TRUNC function processing date format
猜你喜欢

Flex layout

Fresh, 2022 advanced Android interview must know 100 questions (interview questions + answer analysis)

Classpath classpath

t10_ Adapting to Market Participantsand Conditions

Mujoco's biped robot Darwin model

Replace UUID, nanoid is faster and safer!

June issue | antdb database participated in the preparation of the "Database Development Research Report" and appeared on the list of information technology and entrepreneurship industries

Heavy disclosure! Hundreds of important information systems have been invaded, and the host has become a key attack target

Check log4j problems using stain analysis

Good looking UI mall source code has been scanned, no back door, no encryption
随机推荐
[splishsplash] about how to receive / display user parameters, MVC mode and genparam on GUI and JSON
Product service, operation characteristics
DRF --- response rewrite
Code example of libcurl download file
MES production equipment manufacturing execution system software
Can hero sports go public against the wind?
February 16, 2022 Daily: graph neural network self training method under distribution and migration
Apk signature process introduction [easy to understand]
[2. Basics of Delphi grammar] 4 Object Pascal operators and expressions
EasyCVR通过国标GB28181协议接入设备,出现设备自动拉流是什么原因?
JS how to convert a string with a delimiter into an n-dimensional array
From comedians to NBA Zhan Huang, check the encrypted advertisements during this super bowl
Wechat applet blind box - docking wechat payment
What are the legal risks of NFT brought by stars such as curry and O'Neill?
Convert the robot's URDF file to mujoco model
Blackwich: the roadmap of decarbonization is the first step to realize the equitable energy transformation in Asia
Debiasing word embeddings | talking about word embedding and deviation removal # yyds dry goods inventory #
June issue | antdb database participated in the preparation of the "Database Development Research Report" and appeared on the list of information technology and entrepreneurship industries
Equipment simulation and deduction training system software
Flex layout