remote user to 3
[H3C] local-user aaa
[H3C-luser-aaa] pa
[H3C-luser-aaa] password si
The [H3C-luser-aaa] password simple aaa
[H3C-luser-aaa] ser
[H3C-luser-aaa] service-
archives.After this operation, 1,201 kB of additional disk space will be used.Do you want to continue [Y/n]? 2. Configure msmtp and mutt
2.1 configure msmtpCreate the msmtp log File ". msmtp. log" and specify it in. msmtprc. Note that "." indicates a hidden file and the content is empty.
$ sudo vim ~/.msmtp.log
Configure the msmtp Configuration File ". msmtprc"
#Accounts will inherit settings from this sectiondefaults# A first gmail addressaccount gmailhost smtp.gmail.comport
located in a type of file system that are typically found in the configuration file/etc/fstab, which contains information about the file system in the system.-mount does not cross the file system mount point when locating files.-follow If the find command encounters a symbolic link file, it tracks to the file that the link points to.1. Find/directory files starting with a[Email protected] ~]# Find/-name a.*/a.txt[Email protected] ~]#2. Find files with file permissions of 644 in the current di
The Os.walk method is used primarily to traverse subdirectories and sub-files within a directory.Can get a ternary tupple (Dirpath, Dirnames, filenames),The first is the starting path, the second is the folder under the starting path, and the third is the file under the starting path.Dirpath is a string that represents the path to the directory,Dirnames is a list that contains the names of all subdirectories under Dirpath.Filenames is a list that contains the name of a non-directory file.These n
Tags: style color io ar using strong SP data ArtBefore using Oracle, think of its recursive query is very useful, the study of SQL Server, found that it also supports recursive query in SQLTo illustrate:The SqlServer2005 version of SQL is as follows:For example, a table with ID and PID fields, ID is the primary key, PID represents its ancestor node, table structure and data:CREATE TABLE [AAA] ([ID] [int] NULL,[PID] [INT] Null[Name] [NCHAR] (10))GOINSE
": "222"} {ToJSON is the same as ToString, but should use ToString instead of ToJSON if possible, because ToJSON is also calling ToString and reallocating memory}J.free; EndTjsonarray procedure Tform1.button2click (sender:tobject); var A:tjsonarray; Begin A: = Tjsonarray.create; A.add (1); Tjsonarray is not like a traditional array, it can accept several different types of values, which should be considered as an extension of the Delphi array function. A.add (2); A.add ('
match multiple times
{N ,}?
Lazy match N-multiple times
{M, n }?
Lazy Match m-N times
Quantifiers:
Posite Word Table:
Syntax
Description
? +
Occupy matching 0-1 times
++
Possession Matching 1-multiple times
* +
Possession matches 0-multiple times
{N} +
Possession matching multiple times
{N ,}+
Possession match N-multiple times
{M, n} +
Occupy M-N times
Ex
has been created. When you use the + sign to stitch a string, a new string object is automatically generated instead of appending content to the original string object.7.String Pool (string pooling):8.String s = "AAA";1) Look for the "AAA" object in the string pool, if it does not exist, create an "AAA" object in the string pool, and then return the address of t
Don't understand the data structure bitter AH
The Union occupies only one memory space in memory, the size of which is determined by the largest data type in the Union, and when the Union is initialized, the value of the Union is determined by the last valid parameter
' Created on
2012-9-9
@author: Jincheng ' '
ctypes import *
print "AAA:"
value = Raw_ Input ()
V=int (value)
Vv=long (value)
Vvv=value
Class aaa
this method in each class in theForObjectClass ofequals ()method, it is the judgment callequals ()The reference to the method and the incoming citationUse consistency, that is, whether the two references point to the same object. ForObjectClass ofequals ()Partymethod, it is equivalent to==。A .ForStringClass ofequals ()method, it is the content that determines the current string and the string passed inare consistent.25. For the equality judgment of a String object, use the Equals () method inst
.button1click (Sender:tobject);varJ:tjsonobject;beginJ: = Tjsonobject.create; J.addpair (' AA ',' 111 '); J.addpair (' BB ',' 222 ');//Output stringMemo1.text: = j.tostring;//Result: {"AA": "111", "BB": "222"}{ToJSON is the same as ToString, but should try to use ToString instead of ToJSON, because ToJSON is also calling ToString and reallocating memory}J.free;End;//tjsonarrayprocedureTform1.button2click (Sender:tobject);varA:tjsonarray;beginA: = Tjsonarray.create; A.add (1);//tjsonarray is not
The two look very much alike.Functions declaration: Function Function name () {}Functional Expressions: Function name (writable and not writable) () {}: Named function expression/anonymous function expressionFor a few examples:function aaa () {}: Functions declarationvar a=function aaa () {}: named function expressionvar a = function () {}: an anonymous function expression;(function
red. Because the number of bytes returned by the first query exceeds max_length_for_sort_data, the sorting adopts regular sorting. in this case, MYSQL sorts rowid and converts random IO to sequential IO, therefore, the return value is 5 before and 6 after, while the second query uses optimized sorting, without the second data retrieval process, keeping the relative position of the record after sorting. If you want to optimize the sorting of the first statement, set max_length_for_sort_data to a
) if the object is created with new, The Destructor is automatically called when you delete it.
Syntax: no return type, no parameter, function name is added before class name "~ "
Code:
class X { public: X() { } ~X() { } };
Note:
1. Why should I define a destructor as a virtual function?Because: virtual functions are designed to support polymorphism ,... Add later
Problems encountered
# Include
Using namespace std; class
First of all declare: Database master Please go away, you saw an eyesore ah.
Sometimes when the query, Ah, a field in, and not in simply can not meet the requirements, very much like more than one field in the, not in, but many databases do not support more than one field in the, not in (DB2 is supported), it is estimated that many friends are depressed bar! But it doesn't matter, I do not write the article, hehe.
I used the database has Access,sql server,db2, laughed at AH. In fact also on th
Command operations for Linux1. Daily Operation Command* * View your current working directoryPwd* * Time to view current systemDate* * See who is online (who logged in to the server)Who view current onlineLast view recent log in history2. File System operation**LS/view child nodes (folders and files) information in the root directoryLs-al-a is show hidden file-L is displayed in a more detailed list form* * Switch DirectoriesCd/home* * Create Foldermkdir AAA
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.