choose to save on the desktop, the alternative path may not be saved, my situation is this, may be Win7 operating system reasons, may be the Chinese support bad reason, I am not clear, In case of really did not save, you cry also useless, heheOK, let's talk about it today, next time I will tell you what to pay attention to when IDE development, next is the application of the related control, I will continue to the problem I encountered written out, is the online information is too little too li
does not cache dataThis is the biggest difference between them.So you can choose to use $get () or $post () depending on your needs.Detailed descriptionThe $get () or $post () functions are abbreviated Ajax functions in exactly the same format, equivalent to:$.ajax ({Type: ' Post/get ',Url:url,Data:data,Success:success,Datatype:datatype//...});-----------------------------------------------------------------Also note that the type of data passed must be the object type (format of the key-value
First, URL rules1, the default is case-sensitive2, if we do not want to distinguish between the case can change the configuration file' url_case_insensitive ' =>true,//url case insensitive3. If the module is named UsergroupactionThen the URL to find the module is necessary to writeHttp://localhost/thinkphp4/index.php/user_group/index4, if ' url_case_insensitive ' =>falseThen the URL can also be written asHttp://localhost/thinkphp4/index.php/UserGroup/indexsecond, the URL pseudo-static' Url_html_
Tag: URI has a console implicit BSP Java Log ext post1, all reference types (objects, arrays, functions), all have object attributes, can be freely extended properties (except null)var obj ==; var arr ==; function = 100; 2. All reference types (objects, arrays, functions) have a __proto__ property, and the property value is a normal object. (__proto__ is called implicit prototype) (except for null)Console.log (obj.__proto__); Console.log (arr.__proto__);Console.log (fn.__proto__);3, all functio
attachments will be saved by the month.According to the above 3 steps, you can ensure that the site in the addition of pictures or upload a new file, the save path is the name of the month and year of storage. But also do collect friends reflect that, in the collection of articles or pictures, will still find that the storage files are named according to the date of the year, on this, you will follow the 4th step below to revise again.4, the acquisition of resources when remote resources locali
Minimizing the number of HTTP requests
Use Content distribution Network (CDN)
Add expires or Cache-control headers
Using the GZIP component
Put CSS style sheets on top
Place JavaScript scripts at the bottom
Avoid using expressions in CSS (seemingly obsolete)
Separate JavaScript and CSS into external files
Reduce DNS queries
Compress JavaScript and CSS (including inline
Avoid redirects
Delete duplicate scripts
Configure entity Tag ETag
Enable A
Keyword +class+ class name {Keyword + keyword + variable nameKeyword + keyword + Output type + method name (input type + variable name) {}}Pass-through of parameters: Subclass inherits Parent class, property in parent class changes, property of parent class called in child class also changesParameters of the set get method to the desired classChange by passing an object variableChange by passing a variableBasic syntax rules for Java
1.Python file naming: Capitalize the first letter of each word without underliningName of the 2.Python class: capitalize the first letter of each word without underlining3.Python Package Name: Use each word as lowercase, without underlining4.Python function (method) naming: Each word is lowercase, if there are multiple words made up of5.Python global variable naming: Capitalize the first letter of each word, and connect each word with an underscore6.Python local variable naming: Each word is low
Determine this
New binding: New Object;var bar = new Foo ();
Explicit binding (call, Apply,bind): Specifies the object;var bar = Foo.call (obj)
Implicit binding: An Environment object (or container object);var bar = Obj2.foo ();
Default binding: Strict mode is undefined, otherwise global object (browser is Windows,node environment is global)var bar = foo ();
The This is ignoredIf you pass null or undefined as the this binding parameter for call, apply, or bind, these values are i
Summarize:Through the pits and the past DIOCP group of some friends of the problem and practice, I listed the next multi-thread programming needs to follow a few points, I hope to be helpful to everyone:1. Child threads do not access the main thread of the UI, (Memo,label), I found that this is a lot of programmers, in DIOCP often used in the Onconnected/ondisconnected event to directly manipulate the main form of memo. Causes the program to fail to exit normally, or the situation of the card-d
in the course of the interview, there are A lot of tests on the knowledge of C, sometimes asked about the character Collocation and operation order of the problem, such as the value of A+++++b, ++i+++i+++i+i value, and so on, which belong to the C symbol of the problem, then how easy to know it? C has such a rule: that is the legendary greedy method, the rules are determined: each symbol should contain as many characters as possible, that is, our com
handles the functions used in JSON formatImport JSONJson.dumps (): Converts a dictionary or list to a JSON-formatted stringJson.loads (): Converts a JSON format string to a Python objectJson.dump (): Converts a dictionary or list into a JSON-formatted string and writes to a fileJson.load (): Reading JSON format strings from a file into a Python objectFront-end Processing:Converts a JSON format string to a JS objectJson.parse (' JSON format string ')Eval (' (' + JSON format string + ') ')Install
In general, the access rules for class instance properties are more intuitive in python.
However, there are still some areas that are not intuitive, especially for C + + and Java programmers.
Here, we need to understand the following areas:
1.Python is a dynamic language in which any entity can dynamically add or remove attributes.2. A class defines a scope.3. Class instances also introduce a scope, which is different from the scope defined by the
supported) the server does not support the HTTP protocol version used in the request.
Rewrite logo bit:
# # #Nginx URL rewrite will still be rewrite check, up to retry 10 times, if 10 times are still not terminated will return HTTP CODE 500###
Break: Stops rewrite detection, which means that when a rewrite statement containing a break flag is executed, the statement is the final result of the rewriteLast: Stop rewrite detection, but it is essentially different from the break, the end of the
Description
For the convenience of readers, the labels in this article use uppercase (according to XHTML rules, element names must be lowercase, such as Lowercase words indicate a group or series of HTML tags
Each entry (label) follows a list of labels and, if not, indicates that the entry (label) is not allowed to contain any labels inside. This means that the entry can contain only plain text content (#PCDATA, see below). If indicated (empty), this
Nginx to allow WordPress to support fixed-link pseudo-static rules
For Nginx to support WordPress fixed links is very simple, you need to add point configuration code:
Copy Code code as follows:
Location/{
if (-f $request _filename/index.html) {
Rewrite (. *) $1/index.html break;
}
if (-f $request _filename/index.php) {
Rewrite (. *) $1/index.php;
}
if (!-f $request _filename) {
Rewrite (. *)/index.php;
}
}
Then, restart the
solution:
1..htaccess pseudo-Static rule formulation
# root folder access pseudo static to Cunfang1
Rewriterule ^ ([a-z0-9a-z_\-]+) (/) $/cunfang1/$1/[L]
The above rules can have all access to the folder under the root directory of the Web site, pseudo static to the corresponding folder under Cunfang1.
2. Exclude certain directories, so that the first rule can not be useful, such as the site root directory of/data,/images and so on.
# root dire
18 Security rules for Asp+access databases:
1. First of all, we need to filter the content submitted by all clients, including the "Id=n", in addition to the operation of the database of select and ASP files in the submitted HTML code, you can escape the submitted word and then save it in the database.
2. Then you need to authorize access to the Access database page, for the Display data page can only use SELECT statements, filtering other upda
Nine analysis rules for website user data
No matter what profession you are engaged in, only hold the data to hold the user. For the site is the same, we only grasp the site's data to correctly analyze the user's behavior habits, love and users really need something. Don't say much, small series then describes how to correctly analyze Web site user data.
First, the source of the user.
1. Where do the users of our website come from? This data can be
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.