Oracle function (converts the entire string to lowercase) NLS_LOWER (x [, y]) [function] returns the string and converts it to lowercase. [parameter] x-character expression [parameter] Nl
Oracle function (converts the entire string to lowercase) NLS_LOWER (x [, y]) [function] returns the string and converts it to lowercase. [parameter] x-character expression [parameter] Nl
Oracle function (converts the entire string to lowercase)
NLS_LOWER (x [, y])
[Function] returns a string and conve
Oracle function (converts the entire string to uppercase) NLS_UPPER (x [, y]) [function] returns a string and converts the string to uppercase. [parameter] x parameter expression [parameter]
Oracle function (converts the entire string to uppercase) NLS_UPPER (x [, y]) [function] returns a string and converts the string to uppercase. [parameter] x parameter expression [parameter]
Oracle function (converts the entire string to uppercase)
NLS_UPPER (x [, y])
[Function] returns a string and
the file between ms dos and UNIX.Mdel file name: delete the file in ms dos.Mdir directory name: displays the directory under ms dos.Mformat drive letter: Create a ms dos file system on a low-level formatted floppy disk.Rnlabel drive letter: generate the volume label under the ms dos.MMD directory name: create a directory under ms dos.MRD directory name: Delete the directory under ms dos.Target file of the mren source file: rename the existing ms dos file.Mtype file name: displays the content of
: Message from liux on ttyp1... Hello! Everybody, I 'llcome. EOFWhen using window systems such as CDE or openwindows, each window is considered as a separate logon. If the number of user logins exceeds one, the message is sent directly to the control window.
1169 send messages in files to a single user (Chen Xu)If a long message is sent to several users, use the file method:1) Create the file filename of the Message Text to be sent.2) Enter write user
Replace
Replace all the second given string expressions in the first string expression with the third expression. Syntax
Replace('String_expression1','String_expression2','String_expression3') Parameters
'String_expression1'
String expression to be searched.String_expression1It can be character data or binary data.
'String_expression2'
String expression to be searched.String_expression2It can be character data or binary data.
'String_expression3'
String expression used for replaceme
this class. It also inherits the ilist interface and provides data storage and retrieval. The size of the arraylist object is dynamically expanded and reduced according to the data stored in the object. Therefore, when declaring an arraylist object, you do not need to specify its length.
[CSHARP]View plaincopy
Arraylist list1 = new arraylist ();
// Add data
List1.add ("CDE ");
List1.add( 5678 );
// Modify data
List [2] = 34;
// Remove
storage and retrieval. The size of the arraylist object is dynamically expanded and reduced according to the data stored in the object. Therefore, when declaring an arraylist object, you do not need to specify its length.
[CSHARP]View plaincopy
Arraylist list1 = new arraylist ();
// Add data
List1.add ("CDE ");
List1.add( 5678 );
// Modify data
List [2] = 34;
// Remove data
List. removeat (0 );
// Insert data
List. insert (0, "q
I used to read the KMP algorithm before. At that time, I always felt very esoteric. I had to take a nap on the data structure before I understood it. Later I mentioned that KMP only had "Ao, it is used for pattern matching. Recently, I am free to look at the introduction to algorithms. It turns out that this is so simple (not to mention program implementation, the idea is very simple ).
Classic application of pattern matching: find the location of the pattern string from a string. For example, "
, because this is how the game is played, buby. Are you going to support hailstorm? Soap? RDF? AreYou supporting it because your MERs need it, or because someone is firing at you and you feel like you have to respond? The sales teams of the big companies understand cover fire. They go into their MERs and say, "OK, you don't have to buy from us.Buy from the best vendor. But make sure that you get a product that supports (XML/soap/CDE/J2EE) because othe
and format the hard disk. install linux multiple times and try windows andCommon Linux situations. In this way, you will have a bottom in your mind. If you want to install it, be sureRemember to back up important data.
Next we will talk about the concept of Hard Disk in Linux. Only IDE Hard Disks are considered. There are many operations on a hard diskLayer. We need to know that the hard disk is composed of many 512-byte sectors. And these sectors willIs organized into one partition ". These ar
in the array. If the value is found, the key name of the matching element is returned. Returns false if not found
The code is as follows
Copy Code
$array = Array (' 1 ', ' 2 ', ' 3 ', ' 4 ', ' 5 ');$del _value = 3;Unset ($array [Array_search ($del _value, $array)]);//use unset to delete this elementPrint_r ($array);OutputArray (' 1 ', ' 2 ', ' 4 ', ' 5 ');
Cases
Array_filter ()Call mode: Array_filter ($array)Parameter description: $array is the object of the
($fruits);$fruits = Array ("Apple", "banana", "orange");$fruit = "Pear";
Array_filter () to delete empty elements in an array
Function name: Array_filter ()Call mode: Array_filter ($array)Parameter description: $array is the object of the operation, we will delete the empty element in itInstance:
The code is as follows
Copy Code
$array = (' a ' + = ' abc ', ' B ' + = ' bcd ', ' c ' = ' CDE ', ' d ' and ' De
_ expression3''
String expression used for replacement. String_expression3 can be character or binary data.
Return typeIf string_expression (1, 2, or 3) is one of the supported character data types, character data is returned. If string_expression (1, 2, or 3) is one of the supported binary data types, binary data is returned.
ExampleIn the following example, replace the string CDE in abcdefghi with xxx.
Select Replace (''abcdefghicde'', ''
: zyylnxyy zyy ln-s abc cde # create a soft connection of abc lnabc cde # create a hard connection of abc
PS: If you want to delete a link, you can directly use the rm Link name like a common file.
3. Differences between soft links and hard links
A hard link can be considered as a file with two file names, while a soft link is a new link file created by the system, which points to the file to which it re
substring of string, starting at character number start. the first character of a string is character number one.43 For example, substr ("washington", 5, 3) returns "ing ".
If length is not present, substr () returns the whole suffix of string that begins at character number start. for example, substr ("washington", 5) returns "ington ". the whole suffix is also returned if length is greater than the number of characters remaining in the string, counting from character start.
If start is less t
Required bytes 1 ASCIISTR
Format:ASCIISTR (C)
Note:Converts a string C to an ASCII string, meaning that the ASCII characters in C remain unchanged, but non-ASCII characters are returned in ASCII format.
Example:
SQL> select asciistr ('AB? CDE database ') a from dual;
A
---------------------
AB? CDE \ 6570 \ 636E \ 5E932 BIN_TO_NUM
Format:BIN_TO_NUM (n1, n2, n3 ...)
Note:Convert each binary consisting of n1,
Description
When we are in elementary school or junior high school, we often modify the sentence. There is a very commonly used symbol, which is called a pair sign, expressed by a symbol or symbol. The first symbol indicates that the content at both ends of the vertical line is exchanged, while the second symbol indicates that the position of the middle part remains unchanged, while the content at both ends is exchanged. For example:
Actually, it is equivalent to "cdab". We can re
= 3sStr1 = sStr2[0:n]print sStr1Replaces the first n characters of a string with the specified characters.
#strnset(sStr1,ch,n)sStr1 = '12345'ch = 'r'n = 3sStr1 = n * ch + sStr1[3:]print sStr1Scan string
#strpbrk(sStr1,sStr2)sStr1 = 'cekjgdklab'sStr2 = 'gka'nPos = -1for c in sStr1: if c in sStr2: nPos = sStr1.index(c) breakprint nPosFlip string
#strrev(sStr1)sStr1 = 'abcdefg'sStr1 = sStr1[::-1]print sStr1Search for strings
#strstr(sStr1,sStr2)sStr1 = 'abcdefg'sStr2 = 'cde'print
regular expression can also be used | to represent the branch condition.
For example, AB [3-8] * | cd [1-3] + | EF [0-1] * indicates that three branches are matched from left to right, if the first branch matches, you don't have to worry about the branch. in fact, this is the same as or in the logic judgment of C #.
For example, if there are two Boolean variables A and B, if (a | B), if A is true, B will not be taken care.
Group
We use braces {} to specify the number of occurrences of a single
command to edit the/etc/hosts file and change the IP address of the corresponding host name.Note: Do not directly change the IP address in the CDE environment. Exit the CDE environment and complete the modification process.
15. Monitoring of common log files
File Name Content Monitoring Method/Etc/rc. Log: how to read text files,/Var/adm/syslog. Log note the prompt information and corresponding/Var/adm/SW/
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.