当前位置:网站首页>China Unicom 22 spring Games Group
China Unicom 22 spring Games Group
2022-06-11 12:15:00 【YJ】
subject :
Will a 3.1 M truck , There may be one in the middle 3m The tunnel , Transport to the top of the mountain 5G Base station construction
problem :
1) design scheme , As perfect as possible
2) Don't consider , Corresponding time and cost
If possible , Choose a representative to make a concluding speech
summary :
It must have been given to the tunnel :
1) From the tunnel itself , Height limit 3m, however 3.1m Your car may also be able to pass ( Or reconstruct the tunnel )
2) From the car itself , Transform the vehicle , For example, deflate the tire , The chassis needs to be changed
3) From the goods themselves , Disassemble the goods , Then change the trolley to transport the obtained goods in batches , Then assemble ( Even not directly put the goods down , Move the goods manually )
Not necessarily through the tunnel :( The core point is to find another way )
sea route ( To make fun of )
land route : Open a bigger Tunnel , Other roads bypass the tunnel , A winding path ( So there is no height limit )
empty : Fly the plane directly , perfect
It's a pity that 2 There was no news after the meeting
边栏推荐
- C# 读取txt文件生成Word文档
- Error occurred when MySQL imported the database data in pagoda as 0000-00-00 and enum as null
- Flick controls window behavior (trigger, remover, allow delay, put late data into side output stream)
- Where is it safer to open an account for soda ash futures? How much capital is needed for a transaction?
- UnicodeDecodeError: ‘utf-8‘ codec can‘t decode byte 0xc5 in position 13: invalid continuation byte
- C reads TXT file to generate word document
- 2019 book list
- 微信web开发者,如何学习web开发
- Android 11+ 配置SqlServer2014+
- Flick grouping sets multidimensional aggregation and setting table state expiration time
猜你喜欢

When the security engineer finds a major vulnerability in the PS host, the CD can execute arbitrary code in the system

中国网络安全年会周鸿祎发言:360安全大脑构筑数据安全体系

Flick controls window behavior (trigger, remover, allow delay, put late data into side output stream)

When a pure data service machine calls in, it falls back to 2g/3g

Elk - x-pack set user password

深度学习与CV教程(14) | 图像分割 (FCN,SegNet,U-Net,PSPNet,DeepLab,RefineNet)

Error occurred when MySQL imported the database data in pagoda as 0000-00-00 and enum as null

Yapi installation

Installation and use of saltstack

Qt中radioButton使用
随机推荐
吊打面试官,涨姿势
Is reflection really time-consuming? How long does it take to reflect 100000 times.
gocron 定时任务管理平台
ObjectInputStream读取文件对象ObjectOutputStream写入文件对象
阶乘后的零(C语言)
Elk - elastalert largest pit
JMeter 学习心得
When I saw the sudden death of a 28 year old employee, I wanted to moisten
2019 book list
异或的妙用(C语言)
记一次codis内存清理
Golang uses XOR ^ to exchange two variables and encrypt / decrypt them
【LeetCode】1049. Weight of the last stone II (wrong question 2)
flink Window Join、Interval Join、Window CoGroup (两流匹配 指定key联结,开窗口进行窗口操作)
【LeetCode】494. Objective and (2 wrong questions)
刷题笔记(十四)--二叉树:层序遍历和DFS,BFS
flink 窗口表值函数
Pan domain SSL certificate, sectigo cheap wildcard certificate popularization plan
8、原子操作类之18罗汉增强
Zero after factorial (C language)