Branching operations 1. View Remote Branch前面带*号的代表你当前工作目录所处的分支$ git branch -a * br-2.1.2.2 master remotes/origin/HEAD -> origin/master remotes/origin/br-2.1.2.1 remotes/origin/br-2.1.2.2 remotes/origin/br-2.1.3 remotes/origin/master2. View local Branch$ git branch* br-2.1.2.2 master3. Create a Branch
GIT branch test
4. Switch the branch to test
git checkout Test
5. Delete local Branch
Git branch-d test
6. Push the branch to the remote branch
May 4-May 24, intermittent tossing and greenplum for three weeks, finally came to an end: the expansion, found that the expansion of capacity, had to upgrade; upgrade, found a bunch of errors, had to pause the repair database; fixed, continue to upgrade; Finally completed the expansion. This process is written in 8 blog post to the implementation process and problem solving are recorded, here to summarize the whole process. Originally had to write, but home outside a pile of things, dragged to t
the template engine that you use? (1 point)Smarty
12. Briefly describe your most proud development work (4 points)
4 q; O # e] 8 w * B :{13. What methods do you use to solve the traffic issue for high-traffic websites? (4 points)First, check whether the server hardware is sufficient to support the current traffic.Second, optimize database access.Third, prohibit external leeching.Fourth, control the download of large files.Fifth, use different hosts to distribute major trafficSixth, use the tr
VI several shortcut keys, record the memoI. Cursor movement1. Move the cursor to the file to start pressing the GG two key2. Move the cursor to the end of the file press the G key3. Move the cursor to the wardrobe press ^4. Move the cursor to the end of the line by pressing $Two. Editing1. Delete a (cursor) word (alphanumeric string) press DW two key2. Delete (cursor) line press DD two key3. Press the * key at the full text search cursor4. Search under (top) a match word press N (n) key5. Search
have made a lot of research at the time of purchase, I also have some experiences. Here I will tell you:
Sony Ericsson x10i: the exterior is elegant, the system UI is quite beautiful, the CPU is high, the screen is large, the camera is even more than 8.1 million pixels, the commodity price is not expensive, however, the failure was due to the failure of the 1.6 system, and it is said that the operation was slow, so I did not choose this one that I liked for a long time.
Samsung i9000: I don
(VC)
Http://www.dzsc.com/data/html/2009-10-20/79533.html
Cserialport class
Post6:Multi-serial port multi-thread industrial control implementation (cserialport class)
Http://bbs.51cto.com/thread-417831-1.html this article is very good to write, it is worth reading.
The following two lines of code tell us the timeout setting when multiple serial port Devices round-robin.
If (tnow-tlast) * 1000 + (nnowmillsecond-nmillsecond [0])> 800) 9 x * G8
have the name of the template engine you are using? (1 points)Smarty
12, please briefly describe your most proud of the development of the work (4 points)
4 q; o# e]8 w* B: {13, for the large-volume website, what method do you use to solve the traffic problem? (4 points)First, verify that the server hardware is sufficient to support current traffic.Second, optimize database access.Third, prohibit the external hotlinking.Four, control the download of large files.V. Use different hosts to diver
1,600,000,002 binary (bit), or 200 million-byte vector, and then all of the 1.6 billion bits to zero. For each e-mail address X, we use eight different random number generator (F1,F2, ..., F8) to generate eight information fingerprints (F1, F2, ..., F8). Then using a random number generator G to map these eight information fingerprints to eight natural numbers from 1 to 1.6 billion G1, G2, ..., G8. Now let's set the bits of all eight positions to one
Qvga (240x320)UsedLess than 1000 RMBThe display of low-end Android phones is the same as that of Saipan s60v3, which has poor compatibility with the software. Many applications may exit without reason, such as ZTE n600 and HTC G8 wildfire.
Hvga (320x480)The previous mainstream resolution is currently priced1500 to 2000 yuanMobile phones are commonly used, and most of the software is running, but the display effect is average. The representative mode
rows, number of columns, number of non-zero values}. Except for the first value, other values represent the column coordinates of non-zero values in the matrix and their own values. First, let's look at the last small example. clip_image001 [10] We know that the number of non-0 values in the preceding matrix is 16-7 = 9; use the array item test [9 + 1] to represent the array subscript (I) row (row) Column (col) value (value) 0 4 4 91 0 0 a2 0 1 b3 0 3 c4 2 0 d5 2 1 e6 2 3 f7 3 0
with +h8 v$ q#-F3 b '-G8 C $ y| separate. For example: The value in this setting is 8a:n! L ' x0 ': C(except ' H0 N "G, W2 W) K F # y2 L!c"Stateunspecified" and"Adjustunspecified" 3 ^, p2e g:i2 y/vOverrides the value set in the theme.Overrides the value set in the theme
Value
Describe
"Stateunspecified"
The state of the soft keyboard(Whether it is hidden or visible) is not specified. The system will select an app
1) First, right-click the partition on the computer -- manage -- disk management ()
The size of the disk allocated to Ubuntu should be preferably (20 GB or above) not too small. Please note that ubuntu and windows file systems are completely different, so we should delete the Volume After partitioning ubuntu. At that time, the installed ubuntu partition will not be visible in windows, but you can access windows disks In ubuntu.
2) Prepare the EasyBCD software and the Ubuntu iso image.
3)
Open
btn_calcel = NULL; string name [] = {"g1", "G2", "G3", "G4", "G5", "G6", "G7", "G8 ", "G9", "G10", "G11", "G12", "G13", "G14"}; arraylist
Okay. Let's see the running result.
I have selected three items: G2, G3, and G11. Now the screen slides to the bottom and the status is saved very well. textview displays three items selected. The select all, select inverse, and cancel selected functions are normal. The multi-choice operation is perfect!
Listview
. Basic Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to a label x,1旁边的键 11、移动到上次编辑文件的位置 .PS:. Represents an arbitrary character * represents the repetition of one or more chara
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
current line looks for characters FX, FX, TX, TX4. Basic Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you l
VBA editor. Right-click on "VBAProject (Workbook 1)", select "Insert → class module", then a class module folder will appear, click "+" to expand it, select "Class 1", select " View → Properties window, change the name of the class to "EventClassModule", double-click the class to enter the edit window, and enter the code as shown. Next, double-click ThisWorkBook, select the left wordbook of the edit window, select Open on the right, and enter the code in the diagram (Figure 3).
Sma
example, when we store the database, we can generate the corresponding 62 decimal code according to the ID. As the number of short links, the longest 6-bit, the shortest 1-bit, the following is the method of implementation for reference only:/** * 10 binary to 62 binary * @param $num * @return string*/functionFROM10_TO62 ($num) { $to= 62;//0-9a-za-z total of 62 characters $dict= ' 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ ';//This can disrupt the sequence . $ret= '
There are times when we need to view the contents of certain areas in the Distributed Excel worksheet. However, the protection settings for worksheets are only for the entire worksheet. Do you have a limited way to view some of the data areas by password? Yes, please follow the small weave to practice together!
The following two diagrams, respectively, are the correct password, incorrect table content display effect:
1.1. New rule:
Select the table area where you want to restr
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.