32. PERFORMING KEY LOCK.......................................................................................................128
34. USING CHECK PROGRAM......................................................................................................132
............................................................................................................ 122
.............................................................................................................. 137
......................................................................................................... 138
.......................................................................................................... 141
/
/
/
........................................................................................... 147
........................................................................................................... 149
..................................................................................... 132
............................................................................... 134
.............................................................................. 140
........................................................................ 142
/
........................................................... 144
.................................................................................... 145
................................................................................ 146
..................................................................... 151
3
........................................ 143