SOURCE program:#include #include #include void Main (){Char cmd[20][20]={"CD", "dir", "CLS", "RD", "MD", "Date", "Time", "Ren", "Copy", "Help", "quit"};Char str[20]; This is an array of definitions, and the required commands are stored in the array
Experiment 1 The programming of the command interpreter one, the experimental purpose(1) Master the Principle of command interpretation procedure;(2) Master the simple Dos call method;(3) Master C language programming preliminary.Second, the
Program Source code:#include #includestring.h>intMain () {Chars2[ -][ -]={"dir","CD","MD","Rd","CLS","Date", " Time","Ren","Copy"," Help","quit"}; //defines the array, stores the required commands in the array, and calls the Chars1[ -];
Experiment one, the writing Experiment of command explanation programFirst, the purpose of the experiment(1) Master the Principle of command interpretation procedure;(2) Master the simple Dos call method;(3) Master C language programming preliminary.
One, find instructions--Search Instructions
most commonly used parameters:
"-name"Find by name
"-iname"Find by name and ignore case differences
most commonly used commands:
"Find directory name-name file or directory name"Find a file or directory
Unix operating commands
Pan lei, Institute of Theoretical Physics, Chinese Emy of Sciences
Chapter 1 logon and exit
Before you log on, you must first apply for a user registration name from the system administrator. No matter which
A simple navigation bar program written in PHP. A simple navigation bar program written in PHP? Php navigation bar configuration description: by default, the directory name is displayed. if you do not want to use the directory name, remove the
Tar is commonly used on Linux packaging, compression, compression tools, he has a lot of parameters, folding only to enumerate the commonly used compression and decompression parametersParameters:-c:create set up the parameters of compressed
Beginners Linux System, looking at the bird Brother's Linux Private dishes Basic Learning Chapter (third edition), still in the reading stage, the feeling is the command and parameters do not remember, there are various permissions settings, the
To create a full-text search by way of command
The SQL2005 system database provides us with a complete set of stored procedures related to full-text retrieval, and learning to call with less effort.
Enable and disable full-text indexing
1, the
One uses the FSO class, the previous article also mentioned. Here are a few more examples.
Dim MyfilefolderSet Myfilefolder = New filefoldercls' Response.Write myfilefolder.moveafile ("F:\123\4561.exe", "F:\123\4562.txt")' Response.Write
Run programs & Run command assist Options Access.cplAdd Hardware Wizard Hdwwiz.cplAdd or Remove Programs appwiz.cplManagement Tools Control AdminToolsAutomatic Update w pl.cpl bltooth File Transfer Wizard FsquirtCalculator CalcCertificate Management
There is no rule in the meaning of a standard, and it cannot be a square. We should be familiar with this and analyze our previous server usage situations. The common phenomenon is that we are very casual about the use of servers, and there is no
NET use $ ">\\ip\ipc$Content$nbsp;" "/USER:" "establishing an IPC NULL linkNET use $ ">\\ip\ipc$Content$nbsp;" Password "/user:" username "establish IPC non-null linkNET use H: $ ">\\ip\c$Content$nbsp;" Password "/user:" User name "directly after
Unix operating system kernel structure report1 , There is a code for the program as follows:Main (){int i;for (i=0; iFork ();}How many processes has the program been set up to run? Use the process family tree to draw a relationship between parent
Hacker Common Command DaquanNET user Heibai Lovechina/add plus one heibai password for Lovechinanet localgroup Administrators heibai/add him into the administrator groupnet start Telnet on each other's Telnet serviceNET use z:\127.0.0.1c$ map each
Recently, I have been attacking Asp.net and have no time to write things. Some FSO functions in ASP have been sorted out and my application is outdated.
'// ====================================================== File operation = ====================
Run the command:./**. Sh
1. if the login succeeds, we will get shell (shell is a program used to interact with users, it is like the command in DOS. com, but in Linux, there can be a variety of shells to choose from, such as Bash, CSH, KSh, etc.).
Summary of common Linux commands
LS command:1. ls // list the files and folders in the current directory2. ls-A // list the files and folders in the current directory, including hidden files3. ls-l // list details4. ls directory // list files under
Organize some Linux commands
I. File directory commands
1. Create a directory: mkdir directory name
2. Delete the empty directory: rmdir directory name
3. Delete the subdirectory unconditionally: rm-rf directory name
4. Change the current directory:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.