Program Call the class indexaction extends action {Public Function Index () {// default access controller method of TP. You can set echo 'HTTP: // blog.csdn.net/ljfbest is my blog '; // enter http: // localhost/TP/in the address bar, and the result
Finally, you have time.AlgorithmThe estimated time is not long ,(~ O ~)~ ZZ, decide to stick to AC no matter how many learning tasks are involved in the future, (=@__ @ =) and work hard !!!
# Include # include # include # include using
I wrote it once before, and I wrote it again n times wrong. It's not good ...... Poor ~~~~ (>_
# Include # include using namespace STD; int dis [105]; int mat [105] [105]; int visit [105]; int n, m; const int max = 999999; void Dijkstra () {int
# Include # include char STR [100000]; char str1 [100000]; char str2 [200000]; int next [100000]; void getnext (INT m) {int I = 1, j = 0; while (I = m) puts ("yes"); else puts ("no") ;}int main () {int M, N; while (gets (STR )) {gets (str1);
Square
Time Limit: 10000/5000 MS (Java/Others) Memory Limit: 65536/32768 K (Java/Others)Total Submission (s): 5893 Accepted Submission (s): 1878Problem DescriptionGiven a set of sticks of various lengths, is it possible to join them end-to-end to
Color the ball
Time Limit: 9000/3000 MS (Java/Others) Memory Limit: 32768/32768 K (Java/Others)Total Submission (s): 5864 Accepted Submission (s): 3122Problem DescriptionN balloons are arranged in a row, numbered 1, 2, 3 .... n. given two integers
Soldiers (2) time limit: 1000 MS | memory limit: 65535 KB difficulty: 5
Description
There are N soldiers under general Nan, numbered 1 to N respectively. The number of these soldiers killing the enemy is known.
The minor
Ranking
Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/32768 K (Java/Others)Total Submission (s): 12784 Accepted Submission (s): 4765Problem DescriptionAlthough today's computer test has a real-time Ranklist, the above ranking is only
N queen's question
Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 32768/32768 K (Java/Others)Total Submission (s): 5526 Accepted Submission (s): 2507Problem Description places N queens on the square board of N * N so that they do not attack
Common Subsequence
Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/32768 K (Java/Others)Total Submission (s): 17779 Accepted Submission (s): 7485Problem DescriptionA subsequence of a given sequence is the given sequence with some
Struts2 supports some basic type conversions. If not, you can define some types of converters by yourself.
For example, to implement the following functions:
The input format of the birthday (Date type) is required to be the above. The format
Struts2 provides server-side and client-side input verification
1. Rewrite the validate () method:
When the verification fails, the Action returns the logic view named input, and the error message can be output through in this view. Note that the
Triangle Area time limit: 3000 MS | memory limit: 65535 KB
Difficulty: 2
Description
Three vertices are provided to represent the three vertices of a triangle. Now your task is to find the area of the triangle.
Input
Each row is a
1. s: fielderror: output the specified error message instead of all error messages.
In the struts2 framework, for example, if an error message occurs during data type conversion and data validation, we will use the addFieldError method in the
Binary Tree Traversals
Time Limit: 1000/1000 MS (Java/Others) Memory Limit: 32768/32768 K (Java/Others)Total Submission (s): 2468 Accepted Submission (s): 1072Problem DescriptionA binary tree is a finite set of vertices that is either empty or
I searched this knowledge from the Internet and sorted it out as follows:
Generally, when writing bean components, you must write the setter and getter methods. Of course, if we already know the attributes and methods of bean, bean writing is
Struts2 provides the dependency injection function for the attributes in the Action. In the struts2 configuration file, we can easily inject values for the attributes in the Action. The property must provide the setter method.Several Methods for
The pdo technology will be fully used in php6. It seems that this technology must have its extraordinary advantages. After reading it, I learned it and recorded the notes, but it was not so vulnerable ~ \ (Too many rows )/~ La la
0); // tem
How Many Tables
Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/32768 K (Java/Others)Total Submission (s): 9284 Accepted Submission (s): 4568Problem DescriptionToday is Ignatius 'birthday. he invites a lot of friends. now it's dinner
Red and Black
Time Limit: 2000/1000 MS (Java/Others) Memory Limit: 65536/32768 K (Java/Others)Total Submission (s): 6598 Accepted Submission (s): 4187Problem DescriptionThere is a rectangular room, covered with square tiles. each tile is colored
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service