global level i .Each cycle, the value of i the variable will change, and within the loop is assigned to the inside of the a function of the array, the console.log(i) inside of the i point is the global i . That is, all of the a members of the array i , pointing to the same i , whether the loop to the first several times, resulting in the output of the runtime is the last round of the i value, that is, 10.var a=10function aaa (a) {alert (a);}function
When using dom4j, we cannot obtain an element across layers. it must be obtained at one layer, which is very troublesome.
Why xpath?
When using dom4j, we cannot obtain an element across layers. it must be obtained at one layer, which is very troublesome.Therefore, we can use the xpath technology to access a node more conveniently, which allows us to conveniently read the specified node.
Xpath is usually used in combination with dom4j, and if you want to use xpath, you need to introduce a new
the directory tree"MkDir" Create a Directorymkdir./AAA Create an AAA directory in the current directory (only one level of directory can be created)Mkdir-p./AAA/BBB/CCC Creating multiple directories (you can create multi-tiered catalogs)[[email protected] admin]# mkdir/aaa[[email protected] admin]# rm/aaarm: Cannot de
still very natural and harmonious, from where to obtain, constant filtration conditions, to choose the same or different, the order, that only know how to take the first few. That being the case, let's take a step-by-step look at the details.preparatory work1. Create a test databaseCreate DATABASE Testquery2. Create a test tableCREATE TABLE table1 ( uid varchar) NOT NULL, name VARCHAR (TEN) not NULL, PRIMARY KEY (UID)) Engine=innodb DEFAULT Charset=utf8; CREATE TABLE table2 ( oid IN
-xr-x. 1 root root 5307 11 7 08:01 vhost.sh-rwxr-xr-x. 1 root root 1930 11 7 08:00 lnmp-rw-------. 1 root root 1383 11 7 05:25 anaconda-ks.cfg
[Tree] print the directory structure using the directory tree
[Mkdir] create a directory
Mkdir./aaa create an aaa directory under the current directory (only one directory can be created)
Mkdir-p./aaa/bbb/ccc c
Tstringlist class is a pair of the most factory used in Delphi, we look at the detailed usage of tstringlist here together.
Let's start by listing several properties to be discussed:1, CommaText2, Delimiter Delimitedtext3, Names Values Valuefromindex
Tstrings is an abstract class that, in actual development, is the most applied except for the basic type.
Tstringlist Common Methods and properties:
Var
List:tstringlist;
I:integer;
Begin
List: = tstringlist.create;
List.add (' Strings1 '); Add
P2 values less than (11),Partition P3 values less than (16));Then, create the local index:Create INDEX IDX_TP2_C2 on TP2 (C2) local;Because the primary key is a global index, you do not need to create another global indexes, we insert the data:INSERT into TP2 values (1, ' AAA ', ' AAA ');INSERT into TP2 values (2, ' AAA ', '
Java code
String STR = new string ("AAA ");
How many string objects have been created in this line of code? The answer is 2, not 3. Because new string ("AAA") is equivalent to "AAA" and the original Instance Object created when it is placed in the heap, and the other is the "AAA" object in the constant pool, of cour
Java code
String str=New string ("AAA");
How many string objects does this line of code create? The answer is 2 instead of 3. Since the new String ("AAA") is equivalent to "AAA" and one is the original instance object that was created when placed in the heap, and the other is the "AAA" object placed in th
The Callbacks tool method, which functions as a unified management of function callbacks Jquery.callbacks = function (options) {} is used: Similar to event binding, after fire, the previously bound method is executed. Viewer mode. function aaa () {alert (1); } function bbb () {alert (2); } function CCC () {alert (3)} var cb = $. Callbacks (); Cb.add (AAA); Cb.add (BBB); Cb.add (CCC); Cb
instanceofDetects if an object is an array; (used to deal with complex data types;)Simple data type typeof;A instanceof b//A is not made of B;Cases:var arr = [n/a];Console.log (arr instanceof Array); The arr genus is not of type array;Array.isarray ()Array.isarray (parameter); Determines whether the parameter is an array, returns a Boolean value;Cases:var arr = [n/a];var num = 123;Console.log (Array.isarray (arr)); TrueConsole.log (Array.isarray (num)); FalseToString ()Array. toString (); Turns
to indicate the queue size, the inner elements are stored in FIFO (first-in, in-order) sequence, and are often used to implement a bounded cache.( 2 ) Linkedblockingqueue : Based on the chain list of blocking queue implementation, the size is not fixed , if its constructor with a specified size parameter, then the resulting blockingqueue has a size limit, if no size parameter, the size of the generated blockingqueue by Integer.max_ Value to determine that the inner elements are stored in FIFO
view, export lists, and import policies.
1. Security log settings: Because the security log is an important means of recording a system, you can view some of the running state of the system through the log, while the default installation of Windows 2000 does not open any security audits, so you need to open the appropriate audit in the local security policy → Audit policy. Click "Start → control Panel → admin tools → local security policy → Left local policy → Audit Policy", see "Audit policy
policies.
1. Security log settings: Because the security log is an important means of recording a system, you can view some of the running state of the system through the log, while the default installation of Windows 2000 does not open any security audits, so you need to open the appropriate audit in the local security policy → Audit policy. Click "Start → control Panel → admin tools → local security policy → Left local policy → Audit Policy", see "Audit policy change" in right column ... Fo
Deferred Helper (3132)When is a helper method for delaying object deferred. var DFD = $. Deferred (); Create a deferred object DFD. Done (); Dfd.fail (); Used: $.when (). done (); $.when (). fail ();The return value of when, is a lingering object.Source: Return Deferred.promise ();As an example: when you can wait for multiple lingering objects to succeed, the trigger succeeds.Example: (1)Success must be successful for more than one. function
Array API
Api:application programming Interface, application programming interface;
JS in the object provided by the method is called the API;
instanceof检测一个对象是否是数组;(用来对付复杂数据类型;)// 简单数据类型 typeof ;A instanceof B // A是不是B造出来的;例: var arr = [1,2,3]; console.log(arr instanceof Array); //arr属不属于Array类型;Array.isarray ()Array.isArray(参数); // 判断参数是不是数组,返回布尔值;例: var arr = [1,2,3]; var num = 123; console.log(Array.isArray(arr)); //true console.log(Array.isArray(num)); /
Internet password locking allows administrators to set a threshold for the Internet password authentication failures of Lotus Domino application users, including Lotus Domino Web Access. When a user fails to log on in a preset logon count, the user is locked out, helping to prevent a user's Internet account from being subjected to brute-force cracking and dictionary attacks. Information about authentication failures and locks is stored in an Internet lockout
1. What is a function declaration, function expressionFunctions declaration: Function Function name () {}Functional expression: Function name () {}. The function name can be written without writing. Written, is named function expression, do not write is anonymous function expressionExample:function aaa () {};var a=function aaa () {}; named function expressionvar a=function () {}; anonymous function expressi
1. Topology diagramDescription: The configuration will eventually be able to log on to R4 via R5 with the Telnet protocol and rename R4 to R442. R4 Configurationsysenter system View, return user view with Ctrl+z.[huawei]sysname R4[r4]user-inch[R4]user-interface Vty [R4]user-interface vty0 4[R4-ui-vty0-4]au [R4-ui-vty0-4]authentication-mode AAA[R4-ui-vty0-4]Q[R4]AAA[R4-A
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.