Covered List Software Best Practices
Microsoft Word 2016 Microsoft Word 2016
tags: Array
(
[0] => Array
(
[url_sha] => c837b6e95ea15dc64812bf4c6c5cc20f27e8839942199e9ff0d72d820549fbd0
[source] => fccid
[url] => https://apps.fcc.gov/eas/GetApplicationAttachment.html?id=8153919
[href_text] => Covered List Software Best Practices
[href_description] => Yulong Computer Telecommunication Scientific (Shenzhen) Co. LTD YLCPK16 Smart Phone R38YLCPK16 R38YLCPK16 ylcpk16
[http_status] => 200
[http_lastmod] => 0000-00-00 00:00:00
[http_contenttype] =>
[http_filename] => GetApplicationAttachment.html?id=8153919
[http_size] => 25495
[file_sha256] => df10fc4763c902c1b8c324846138df10f23bef1bec4c9b4b015209f8d1b72ae1
[domain] => document.fccid
)
[1] => Array
(
[url_sha] => 5826de800add24c47825d2b7265d3f2ef5ada01fd9ebb550eafde3ee8c78f1f9
[source] => fccid
[url] => https://apps.fcc.gov/eas/GetApplicationAttachment.html?id=8154000
[href_text] => Covered List Software Best Practices
[href_description] => Yulong Computer Telecommunication Scientific (Shenzhen) Co. LTD YLCPK16 Smart Phone R38YLCPK16 R38YLCPK16 ylcpk16
[http_status] => 200
[http_lastmod] => 0000-00-00 00:00:00
[http_contenttype] =>
[http_filename] => GetApplicationAttachment.html?id=8154000
[http_size] => 25495
[file_sha256] => df10fc4763c902c1b8c324846138df10f23bef1bec4c9b4b015209f8d1b72ae1
[domain] => document.fccid
)
[2] => Array
(
[url_sha] => 5bce9192c7057faeb5514157da1e024f904fed9e720a681b5b9411343c955ab3
[source] => fccid
[url] => https://apps.fcc.gov/eas/GetApplicationAttachment.html?id=8155024
[href_text] => Covered List Software Best Practices
[href_description] => Yulong Computer Telecommunication Scientific (Shenzhen) Co. LTD YLCPK16 Smart Phone R38YLCPK16 R38YLCPK16 ylcpk16
[http_status] => 200
[http_lastmod] => 0000-00-00 00:00:00
[http_contenttype] =>
[http_filename] => GetApplicationAttachment.html?id=8155024
[http_size] => 25495
[file_sha256] => df10fc4763c902c1b8c324846138df10f23bef1bec4c9b4b015209f8d1b72ae1
[domain] => document.fccid
)
)
Array
(
[0] => Array
(
[id] => 8153919
[file_sha256] =>
[applicationId] => FG9GcD0lm/1n6KwJU/ts8g==
[description] => Covered List Software Best Practices
[shortTermConfidential] => No
[permanentConfidential] => No
[supercede] => No
[exhibitType] => Cover Letter(s)
[fileType] => Adobe Acrobat PDF
[displayType] => pdf
[fileSize] => 25496
[submissionDate] => 2025-03-28 00:00:00
[dateAvailable] => 2025-03-31 00:00:00
[creationDate] =>
[producer] =>
[modDate] =>
[title] =>
[creator] =>
[author] =>
[pages] =>
[realSize] =>
[html] => 0
[png] => 0
[txt] => 0
[version] => 0
[source] => 0
[fccId] => R38YLCPK16
[cleanFccId] => R38YLCPK16
[exif] => 0
)
)