X

Sign in

Sign in to confirm

Have you forgotten your password?

... or login with Facebook:

Don't have an AndroidPIT account yet? Sign up

肥猫二维码扫描器,条形码条码扫描器-比价购物清单

  • Description

    V3.0疯狂颠覆之作【生活~钢需神器】速度性能内容-N倍飙升! ★极速扫条码二维码 模糊打码-照扫! ★超市便利淘宝网店 街边小铺-照比! ★超市海报精选促销 火星地球-照看! ★超炫滑动购物清单 一根手指-照列! 【扫条码二维码•比超市淘宝网店价格】 ▶全新V3动态扫描引擎,大幅优化模糊条码扫描,高速识别身边一切烂码! ▶扫描条形码 - 查全国超市、便利店、淘宝、网店最新价格,查厂家商家渠道信息,查本商品在周边促销活动,随手一键(摇动)加入购物清单; ▶扫描二维码 - ...Read more

App Questions

Do you have a question about this app?

ASK A QUESTION

Related Apps

Top Apps

App Details

  • UPDATED ON:
  • GRÖSSE: 6,815,744
  • INSTALLATIONS: 10,000 - 50,000
  • LATEST VERSION: 3.10
  • ERFORDERLICHE ANDROID-VERSION: 2.0 and up
  • Permissions
  • SYSTEM TOOLS
    • retrieve running applications
      Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
    • read system log files
      Allows an application to read from the systemʼs various log files. This allows it to discover general information about what you are doing with the phone, but should not contain any personal or private information.
    • change Wi-Fi state
      Allows an application to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks.
    • restart other applications
      Allows an application to forcibly restart other applications.
    • mount and unmount filesystems
      Allows the application to mount and unmount filesystems for removable storage.
    • change your UI settings
      Allows an application to change the current configuration, such as the locale or overall font size.
    • reorder running applications
      Allows an application to move tasks to the foreground and background. Malicious applications can force themselves to the front without your control.
  • YOUR PERSONAL INFORMATION
    • write contact data
      Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
  • YOUR LOCATION
    • coarse (network-based) location
      Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
    • fine (GPS) location
      Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
  • NETWORK COMMUNICATION
    • view network state
      Allows an application to view the state of all networks.
    • full Internet access
      Allows an application to create network sockets.
    • view Wi-Fi state
      Allows an application to view the information about the state of Wi-Fi.
  • STORAGE
    • modify/delete SD card contents
      Allows an application to write to the SD card.
  • PHONE CALLS
    • read phone state and identity
      Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
  • HARDWARE CONTROLS
    • take pictures
      Allows application to take pictures with the camera. This allows the application at any time to collect images the camera is seeing.
    • control flashlight
      Allows the application to control the flashlight.
    • control vibrator
      Allows the application to control the vibrator.
  • OTHER
    • android.permission.BAIDU_LOCATION_SERVICE
    • android.permission.READ_EXTERNAL_STORAGE
    • android.permission.WRITE_CALL_LOG