Vim shortcut keys and vim common shortcut keys
1. vim ~ /. Vimrc enter the configuration file
If you do not know where the vimrc file is, you can use scriptnames to view it.
Set nu # row number
Set tabstop = 4 # A tab has four spaces.
Set ai # set automatic indent
Syntax on # Highlight
2. Basic
Move the Space key to the right
X Delete the following character X Delete the first character delete 3 character
Introduction to common Linux shortcut keys and linux shortcut keys
Back to the upper Directory: cd .. command Prompt: user @ ubuntu: @ is the current user ID name; @ is the host name before the colon (sudo): (Superusers Do) is executed by the super user in the relative path ,. indicates the current directory ,.. indicates that the upper-level directory pwd: (print working directory) of the current director
followed by functions.11.ALT+F1 you can position the element you are editing in each panel12.ctrl+p, can display parameter information13.ctrl+shift+insert can select Clipboard contents and insert14.alt+insert can generate constructors/getter/setter, etc.15.ctrl+alt+v can introduce variables. For example, to assign a variable to a SQL in parentheses16.ctrl+alt+t can wrap code inside a piece, such as Try/catch17.alt+up and Alt+down can be moved quickly between methods18. In some places, press Alt
PHP converts an array value into a key, and the PHP array is converted to a key
This example describes how PHP converts array values into keys. Share to everyone for your reference. Specific as follows:
function Values2keys ($arr, $value =1) { $new = array (); while (list ($k, $v) = each ($arr)) { $v = trim ($v); if ($v! = ") { $new [$v] = $value; } } return $new;}
I hope this article is helpful to everyone's PHP programming.
[Mysql] basic concepts of primary keys and Foreign keys for multi-table queries using inner join and nested queries
Although multi-table queries are required in computer science and databases, many teachers have not thoroughly explained this difficulty. It's confusing to have a bunch of things that are connected to the left and the right. The instructor will tell you all the multi-Table query methods, but o
123456789Ten One A theThe page has a div 100*100 color yellow press the keyboard and the left and right keys can operate div Mobile CTRL + keyboard up and down can zoom out CTRL + keyboard around keys can be randomly changed color
1, open 360 security Guardian main interface, click on the lower right corner of the functional encyclopedia next to more options.
2, into the functional encyclopedia in the lower left corner of the search box input game optimizer and search this function.
3, into the Game optimizer interface we can see the current game can be optimized options, two of which is shielding the left Windows key and shielding system sticky keys, these two
with a table without a primary key or unique key? If your table does not has a unique index (or a PRIMARY KEY constraint or UNIQUE key constraint, both of which create a U Nique index behind the scenes), then your dynamic cursor is converted to a static cursor. And all static cursors must is read only. If one of the tables referenced by the cursor has no unique index, the cursor would be converted to STATIC. And STATIC cursors is read-only. See Using implicit Cursor Conversions for more informa
symmetric KEY Testsymmetrickey decryption by CERTIFICATE Testcertificate;6, insert the encrypted data into the table person insert into person (ContactID, Efirstname, Emiddlename, Elastname) VALUES (1, EncryptByKey (Key_GUID ('Testsymmetrickey'),'Efirstname'), EncryptByKey (Key_GUID ('Testsymmetrickey'),'Emiddlename'), EncryptByKey (Key_GUID ('Testsymmetrickey'),'Elastname') )7, decrypt the data in 6 UPDATE person SET FirstName=CONVERT (Varchar,decryptbykey (Efirstname)), MiddleName=CONVERT (Va
In general, we can see that the terms ldquo; index rdquo; and ldquo; key rdquo; are used for exchange, but these two are actually different. An index is a physical knot stored in a database.
In general, we can see that the terms ldquo; index rdquo; and ldquo; key rdquo; are used for exchange, but these two are actually different. An index is a physical knot stored in a database.
Generally, we can see that the terms "Index" and "key" are used for exchange, but they are actually different. An
Linux terminal usage tips
Today, we found that Linux terminals have so many easy-to-use shortcut keys.
Shift + Ctrl + T: Create a tab
Shift + Ctrl + W: Close the tab
CTRL + Pageup: Previous Tab
CTRL + Pagedown: Next Tab
Shift + Ctrl + Pageup: tab left shift
Shift + Ctrl + Pagedown: Right Shift of the tab
Alt + 1: Switch to Tab 1
Alt + 2: Switch to Tab 2
Alt + 3: Switch to tab 3
Shift + Ctrl + N: New window
Shift + Ctrl + Q: C
Datatable: add columns, Set primary keys, Add rows, query, and update
There are too many materials for database operations and you are familiar with them.However, sometimes the data volume is small, but frequently updated variable operations usually use a custom structure, but the maintainability and flexibility of the custom structure is not as good as that of the temporary table, we can use datatable as a temporary memory table to flexibly add colu
Ps shortcut keys and ps common shortcut keysPs shortcut keys1. Toolbox (if multiple tools share one shortcut key, you can press Shift to add this shortcut key at the same time)Rectangular and elliptical box selection tool [M]Mobile tool [V]Loose, polygon, and magnetic loose [L]Magic wand tool [W]Cropping tool [C]Slicing tool and selecting tool [K]Spray gun tool [J]Paint Brush tools and pencil tools [B]Pictures and stamps (S]History paint tools, art hi
;
Win +↓: Restore/Minimize the current window;
Win +←: The current window to the left up and down to maximize;
Win +→: The current window to the right up and down to maximize;
Win + HOME: Minimize all windows except the current activation window;
Win + Pause: Displays the System Properties dialog box;
Win + TAB: Cycle through the program on the taskbar and use the Aero three-dimensional effect;
Win + Space (SPACEBAR): Desktop window transparent display desktop, using Aero Peek display des
UNIQUE Constraint
A unique constraint is essentially the same as creating a unique index, because when a unique constraint is created, the system creates a unique index that implements the constraint through a unique index. However, the unique constraint more intuitively expresses the uniqueness of the corresponding column, making the purpose of the corresponding index clearer, so it is generally recommended to create a unique constraint instead of just creating a unique index.
The operation t
Label:The role of foreign keys: Maintain data consistency, integrity, the primary purpose is to control the data stored in the Foreign key table. Make two tables associative, and foreign keys can only refer to the values of columns in the outside! For example: A B two tables Account number in Table A, customer name Each customer's order is stored in table B After having the foreign key You can only delete c
Common skills1. Bookmarks (Bookmarks)
Description: This is a useful feature that allows you to make a mark (bookmark) Somewhere, so that you can jump back here.
Call: Menu→navigate→bookmarks
Shortcut keys:
Add/Remove Bookmarks: F3 (OS X), F11 (Windows/linux);
Add/Remove Bookmarks (tagged): Alt + F3 (OS X), Ctrl + F11 (windows/linux);
Show all bookmarks: Cmd + F3 (OS X), Shift + F11 (windows/linux), Show all boo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.