= Name;Lname = "";}}}Defines a class and returns the last name and name of the person with a comma in the middle of the name.Public class lastname: getname{Public lastname (string name){Int I = Name. Trim (). indexof (',');If (I> 0){Lname = Name. substring (0, I). Trim ();Fname = Name. substring (I + 1). Trim ();}Else{Lname = Name;Fname = "";}}}
The following is a simple factory mode class:Public class namefac{Public namefac (){}
Public static getname (string name) { if (I> 0) {}{}
All busin
anonymous blocks should be redefined as sub-processes and stored in the database.
2. Global variables that are out of control
Impact: maintainability
Symptom: global variables are used in the package to operate on global variables in multiple locations.
Create or replace package body pkg_test is
GN _ global variable number (12, 2 );
Procedure process a is
Begin
GN _ global variable: = 1;
End;
Procedure pro
game a winning strategy is to turn the AI into K, then the original game of a winning strategy is to move the piece I pieces to a SG value of the vertex of K. It sounds a little too magical--how to circle around and back to the Nim game.In fact, we still just have to prove that the situation of the p-position of this multiple chess game is that the SG function of the position of all the pieces is different or 0. This proof is almost exactly the same as the Bouton ' s theorem in the previous sec
data, enabling it to be securely routed through an external IP network.
The GP interface is defined in 3gppts23.060, which is actually the same as the GN interface. The only difference in the standard is that the GP interface is used to communicate between the plmn of the GSN. GP contains all GTP signaling information that supports GN, but the path management capabilities of the
Same as Useradd command4> Password Expiration control------chageFormat: chage [options] User nameCommon commands: chage-d 0 user name "Allow user to change password at first logon"-l list Password expiration information-e Specify the account expiration time Yy-mm-dd-i specifies how many days to lock the account when the password expires-m specifies the minimum number of days for password invalidation-m Specifies the maximum number of days the password expires5> Delete User------UserdelFormat: U
--U g oU=rw-=4+2+0=6G=r--=4+0+0=4O=r--=4+0+0=4So file permissions are represented as 644chmod Modified Permission value filechmod 777 File7=rwx6=rw-5=r-x4=r--3=-wx2=-w-1=--x0=---650) this.width=650; "Src=" https://s2.51cto.com/wyfs02/M00/8F/8D/wKioL1jk1oWiNvolAAO5QW_vGsc489.png-wh_500x0-wm_ 3-wmp_4-s_1010530136.png "title=" screenshot from 2017-04-05 19-33-58.png "alt=" Wkiol1jk1owinvolaao5qw_ Vgsc489.png-wh_50 "/>Four. Setting the system default permissionsFrom the point of view of system exist
, the higher the system existence meaning, from the system security point of view, the smaller the power of system openness, the higher the security of the system. So the system will remove some permissions when setting up a new file or directory.system default reserved Permissions umask=022The file default permission is 644 (the system kernel thinks that the file has executable power is not normal, so the system will go to the point of the file executable power)Directory default permission is 7
0. Basic commandsLinux basic Commands Collation1. Compression decompressiontar -zcvf A.tar.gz a #把a压缩成a. tar.gztar - ZXVF A.tar.gz #把a. tar.gz extract into a2. Vim Summary2.1 Vim Replacement#把word_1用word_2替换, g means replace all, c means to replace each one needs to be confirmed2.2 VIM Statistics The number of a string: m,ns/word_1//gn #把word_1用word_2替换, g means replace all, n means only the number of statistics is not replaced :1, $s/word
or file. So root creates a directory permission of 755, with a file permission of 644. The remaining user creates a directory permission of 775 and the file permission is 664.Why does the system have to pass the Umask value to create a file or directory.Because the system defaults to creating files or directories with permissions of 666 and 777, it is unsafe to introduce umask values to control user permissions when creating files or directories.(-RW-RW-RW)-(-----w--w-) ===>-rw-r--r--# #文件(DRW
Vim:/ETC/PASSWD User InformationForm: User name: Password (x): Uid:gid: User description: User home directory: User shell/etc/group User Group EnvironmentForm: User name: Group password: Group ID: Additional Member/etc/shadow User authentication information file (password)Form: User name: Authentication encryption character (encrypted password): Last Modified time: password minimum validity period (this period of time do not change password): Maximum validity period (must change password): Warni
higher the system securitySo the system set new file or directory will remove some permissionsSetting modeUmask # #查看系统保留权限默认为022Umask 077 # #修改该系统保留权限为077, this setting is temporary and only valid in the current shellDiagram: Umask system permissions and temporary permissions650) this.width=650; "Src=" https://s3.51cto.com/wyfs02/M00/A6/DB/wKioL1ncodeACGyoAAB4yx1vQk8107.png-wh_500x0-wm_ 3-wmp_4-s_3755303141.png "title=" screenshot from 2017-10-09 21-28-49.png "alt=" Wkiol1ncodeacgyoaab4yx1vqk8
belongs, and that other users have read more permission to delete and access the directory650) this.width=650; "src=" Https://s1.51cto.com/wyfs02/M01/9C/5B/wKiom1lvRP7QWQayAAAfeScj7Mk710.png "title=" 6.png "alt=" Wkiom1lvrp7qwqayaaafescj7mk710.png "/>use grep to filter out the total number of files displayed for easy viewing1. Chgrp CommandCHGRP Linux File # modifies the group to which the files belong to LinuxThreeModify permissions for directories and files created by default on the system1 .
securitySo the system set new file or directory will remove some permissionsSetting modeUmask View system reserved permissions default to 022Umask 077 Modify the system reserved permission is 077, this setting is temporary settings, only the current shell in effectPermanent setting Mode:VIM/ETC/BASHRC ShellIf [$UID-gt 199] ["' id-gn '" = "' Id-un '"]; ThenUmask 002 Ordinary User UmaskElseUmask 077 Super User UmaskThe fiVim/etc/profile systemIf [$UID
Same as Useradd command4> Password Expiration control------chageFormat: chage [options] User nameCommon commands: chage-d 0 user name "Allow user to change password at first logon"-l list Password expiration information-e Specify the account expiration time Yy-mm-dd-i specifies how many days to lock the account when the password expires-m specifies the minimum number of days for password invalidation-m Specifies the maximum number of days the password expires5> Delete User------UserdelFormat: U
Unit Five########################## User Action command #################(i) use of IDID User name # # View user Information ID - u # # user uid(userid) - G # # user gid(initial group ID, only one) -A # # users All information - G # # # User IDs for all groups (including universities,Linux groups, etc.) -un # # user name -GN # # user Initial group name -GN # # # users All group names Execute vim/etc/login
completion of PLMN between different GPRS network functions.
GB is the interface between SGSN and base station subsystem, GS is the interface between SGSN and MSC/VLR, SGSN sends mobile user's position information through GS to MSC, and receives the paging request of MSC; GR is the interface between SGSN and HLR, SGSN obtains the user information in HLR through GR, the GC is the interface between GGSN and HLR, GP and GN are the interfaces between tw
consider task B, because the old machine M1 at SB =3 moment has been idle, so assigns B to M1 execution, M1 the next available time becomes FB =7,m2 the available time becomes FF = 5. Step fourth, consider task C. Since no old machines are available at SC =4, the C is assigned to a new machine (M3), and the next available time for this machine is FC = 7. The fifth step is to consider task G, assign it to machine M2, step sixth assigns task E to Machine M1, and finally in step seventh, Task 2 as
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.