Recent projects used in the need to call the real-name authentication interface, real-name authentication interface price compared to SMS is not a bit higher than a few cents, so that the conditions of the call authentication is strict, so use to JS verify the true name and JS authentication ID number.
Get to the point.
JS Verify the real name, is used to match the Unicode characters, and the Chinese name is generally 2-4, so repeat the match {2,4}
To make it easier to represent or specify the name of a component, we typically use an ID or Itemid for the identity designation. (It is recommended to use Itemid as much as possible to reduce conflicts resulting from unique page identifiers) ID:The ID is a unique identifier for the component of the entire page, which also means that only the ID of a unique name
MySQL query repeating fields, and how to delete duplicate recordsMySQL, database, Database, field, serverThere is a large table in the database and you need to look for a duplicate record ID for the name in order to compare it. If you are simply looking for a word that is not duplicated in the database , it is easy to:SELECT min (' id '), ' name ' from ' table ' GROUP by ' name ';However, this does not gi
Scheme one: Change the cell format to "text" and re-enter it!
Option 2:1, address the problem of input ID number
By default, if the number of digits entered in the current cell in Excel is more than 11 digits (excluding 11-bit), the system displays the numbers entered in the scientific notation format, and when the number of digits entered exceeds 15 digits (excluding 15-bit), the system displays all 15-digit numbers as "0". This way, if we want to
Tips | Web page
I mentioned the importance of XHTML in the previous days, and in that article I talked about why the XHTML architecture is important and the benefits of XHTML architecture. But the article starts with the efficiency of development and does not go into detail, and today's article is about the details of XHTML, which can be described as a continuation of the previous article. The theme of this sequel is how ID and class work, in the titl
The following is based on the ID number coding rules, using JS to validate the code
The Idcard-validate.js code is as follows:
Copy Code code as follows:
/**
* ID Card 15-bit coding rule: dddddd YYMMDD xx p
* DDDDDD: Area code
* YYMMDD: Date of birth
* XX: Sequential class code, cannot be determined
* p: Sex, odd for male, even for female
* * ID
xhtml| technique The topic of this narrative is how ID and class work, in the title of the use of the principles and techniques, the use of principles and techniques here is my summary of experience, not from which the book, so it is not an authoritative discussion, please netizens in this article when you need to have assertive reading, Don't be fooled by my bogey.
The use principle of ID and class
It is s
Big New Year's also want to knock code, think is intoxicating. Busy today to get out of the set, when the function test found that the value of the ID has been 0, a look at the value of the ID is not self-increment, has been the default of 0. So went to Baidu, silently debugging, find the following code:SELECT Seq_result_id.nextval as ID from DUALThis code means
Method of returning the self-increment ID after MySQL inserts dataOne of the big differences between MySQL and Oracle insertion is that the Oracle support sequence does id,mysql itself with a column that can do self-growing fields, how can mysql get the value of this self-increment ID after inserting a piece of data?Method One: The use of last_insert_idMySQL>SELE
Process relationshipsCall format#include int Setpgid (pid_t pid, pid_t pgid);pid_t getpgid (pid_t pid);pid_t getpgrp (void); /* POSIX.1 version */pid_t getpgrp (psid_t pid); /* BSD version */int setpgrp (void); /* System V version */int Setpgrp (pid_t pid, pid_t pgid); /* BSD version */Description: Gets or sets the process group ID of a process. All of these interfaces are suitable for Linux, but generally use GETPGRP to get the group
It is not difficult to do this in fact, on the Internet, there will always be unexpected harvest. But 工欲善其事, its prerequisite. We need to understand the rules of the ID number, the enemy win.The ID number has 15-bit and 18-bit length two, 15-bit time, is a number, but 18-bit length may have check bit (X), so only check the number is not enough.Another ID number c
Service, distributed has become the first choice for system development, high concurrency operation in the data storage, need a set of ID generator services to ensure the distribution of global uniqueness, to ensure that the system's order creation, transaction payments and other scenarios under the unique data, otherwise it will cause immeasurable losses. based on time stamp
For example, the serial number rule is as follows: Xx-yyyymmdd-n bit random
background : Several years of work, has designed a lot of systems or products database, there is a single machine, LAN environment, there is an Internet environment, for different environments, design considerations are different. Even for the same environment, there are different designs depending on the business or the amount of data. A database of Internet products (MySQL service) is also being designed in the near future. After the accumulation, in the table
Method 1:1. Create a temporary table and select the desired data.2, clear the original table.3, temporary table data import into the original table.4. Delete the temporary table.Mysql> select * from student;+----+------+| ID | NAME |+----+------+| 11 | AA || 12 | AA || 13 | bb || 14 | bb || 15 | bb || 16 | CC |+----+------+6 Rows in Setmysql> Create temporary table temp as select min (id), name from student
Table:productpriceTable Column:id, Productasin ...The same productasin only retains the most recent one, that is, only the maximum ID is reserved.First step: Detect duplicate records and maximum IDsSELECT Productasin,max (ID) maxidFrom Productprice GROUP by Productasin have COUNT (ID) >= 2)TemptStep two: Isolate the record in duplicate and less than the maximum I
Method 1:1. Create a temporary table and select the desired data.2, clear the original table.3, temporary table data import into the original table.4. Delete the temporary table.Mysql> select * from student;+----+------+| ID | NAME |+----+------+| 11 | AA || 12 | AA || 13 | bb || 14 | bb || 15 | bb || 16 | CC |+----+------+6 Rows in Setmysql> Create temporary table temp as select min (id), name from student
css| Specification | A normalized web developer can identify the div and other formatting page elements by creating the class and ID names of the CSS and using those names. For developers, when naming CSS selectors for redefining XHTML tags (tags), you must ensure that they match exactly the predefined tags, but in terms of class and ID selector names, it's a good thing. However, it is not a good habit to n
Before writing a program, you should understand the composition of the ID number:
The ID card number is divided into two, the old one is 15 digits, the new one is 18 digits.
ID 15-bit encoding rule: dddddd YYMMDD xx p
Where DDDDDD: Region code yymmdd: birth date XX: Sequence class code, cannot determine p: sex, odd for male, even for female;
The function of the table custom property is completed in the previous article, now to complete the Id, because the main structure of a table is the table name, primary key (Id), Columns (column), primary key generation policy.
Usage code block 1-1 for ID custom attributes:
[Table (name= "Student")]
public class studententity
{
private string stuid;
[
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.