paste d DeleteWord movementW W move to the beginning of the next wordE e moves to the end of the next wordb b backwards to the beginning of the previous wordIt is important to note that E ignores punctuation, such as: I ' m,e will be two words, E won'tSimilarly, precede the command with a number that represents the number of executions, such as: 2w, to move 2 words downI may say a few more times at the beginning, because this technique is important.T
Edit command:I insert the word "a" before inserting a Line at the end of insert an O new line edit O Create a new row aboveInsert:X i * "ESC" insert 10 *25 a XX "ESC" insert 25 xxj join merge two rowsMove:4l Move right 4 characters 0 move to beginning of line^ Move to beginning $ move to end of line 2w move backward two words 3W backward Move three words (only by space)
, as follows: # lsof |grep/var/log/messagessyslogd 1283 root 2w REG 3,3 5381017 1773647/var/log/messages (deleted)from the above information you can see that the PID 1283 (syslogd) Open file has a file descriptor of 2. You can also see that/var/log/messages has been flagged for deletion. So we can view the corresponding information in/PROC/1283/FD/2 (each file descriptor for the process corresponding to a digitally named file under FD), as follows:# h
CommandPsView the process of the system[Email protected] ~]# Ps-aux[Email protected] ~]# ps-elfCommandNetstatView ports and connection status[[email protected] ~]# NETSTAT–LNP # View the ports on which the machine is open[[email protected] ~]# Netstat–an # View the status of native and other host connections[Email protected] ~]# netstat-an|grep119.29.186.209:80|grep-ic estab # See the number of concurrent, an nginx single-run static Web page can be 2w
process tree.
When a file in the system is accidentally deleted, as long as there are processes in the system that are accessing the file, you can recover the file from the/proc directory by lsof
Use lsof to see if there are currently processes open/var/logmessages files
# lsof |grep/var/log/messages syslogd 1283 root 2w REG 3,3 5381017 1773647/var/log/messages (deleted) from/proc/128 3/FD/2
This method of recovering deleted files is useful
too much trouble for the development of colleagues.What about that? You brainwave, wrote a timer function ...Import timedef Timer (func): start = Time.time () func () print (Time.time ()-start) def func1 (): print (' In Func1 ') def func2 (): print (' in Func2 ') timer (func1) timer (FUNC2)Does that look a lot easier? No matter how many functions we write, we can call this timing function to calculate the execution time of the function ... Although the modification cost has becom
a printPrint ("xxx")two variables/strings(a) The role of variablesUsed to store things so that they can be called later(ii) The operation of variable definition 1 variablesname = "Tortoise Man"Print ("My name is", name)Name2 =namePrint ("My name is", name,name2)Name = "X"Print (name,name2)At this point, name! = name22 defined Rules
Variable names can only be any combination of letters, numbers, or underscores
The first letter of the variable name cannot be a number
Python keywor
Daily Chicken Soup:I still have a 2w loan and I don't have to ...First, what is a functionFunctions are the encapsulation and definition of code and functionality.1. How to define a function1 def function name (): 2 function Body 3456# The naming convention for function names is the same as the naming convention for variables 7 # The function body is the code to execute after the function is executed2. How to call a functionThe function name can
. "Personally, I think you should look at your project needs, assuming you are 3d games. Your game needs to be compatible with low-configuration hardware, smooth operation, control hardware fever, but also to achieve a certain effect (lightmap+ fog effect), then the number of vertices must not be high. At this time the 2W vertex of the same screen I think is a more appropriate number, drawcall preferably less than 70. Another, control the heat please
The cursor can be moved in the screen text using the arrow keys, or the H J k L Letter KeyK (upstream) J (downlink) H (shift left) L (shift right)delete the cursor position character in normal mode, press Xin normal mode, insert or add text:I insert text before inserting text cursorA Add text line after add text: Wq Save changes and exit: q! Do not save and exitDW Deletes a word (the cursor is placed in the start out)d2w Delete Two wordsd$ at the end of the current line from the cursorDD Delete
that you can not make yourself a bother to tell all the development, and now you are in your original code to add a sentence to calculate the time?Import Timedef func1 (): print (' in func1 ') start = Time.time () func1 () print (Time.time ()-start)Or not, because this is too much trouble for the development of colleagues.What about that? You brainwave, wrote a timer function ...Import timedef Timer (func): start = Time.time () func () print (Time.time ()-start) def func1 (): pri
Blogging thinking: Both theory and practice, trying to know what this thing is, where to use it, when to use it, why to use it, and how to use it next. Learning ability, thinking method.Knowledge System:Foundation (RHCE)RH033RH133RH253RHCA:RH401RH423 (LDAP)RH442 system Tuning, the basic principle of hardware and the basic principle of the system.RH436RHS333Mysql:RH436: Clustering and accessNosqlOperations Engineer: For example: 2w Server, System proce
memory 2G, except for the general start of the service needs about 500M (conservative estimate), and the remaining 1.5G available, then theoretically support 1.5*1024*1024*1024/200000 = 8053.06368About 8K processes, support 2W people at the same time access should be no problem (can guarantee that 8 k people access quickly, others may need to wait 1, 2 seconds to connect, and once the connection will be very smooth)MaxClients that control the maximum
VIM Tutor makes you know enough commands-easily use VIM. If you wanna get full version of VIM Tutor, execute vimtutor in the shell. Lesson 1
The cursor is moved using either the arrow keys or the HJKL keys:h (left), J (off), K (UP), L (right)
To start Vim from the shell prompt Type:vim FILENAME
To exit Vim
Type:: q! To trash all changes.
Type:: Wq to save the changes.
To delete the character at the cursor type:x
To insert or append text type:
I reprint: http://www.cnblogs.com/panshenglu/archive/2009/09/21/1571258.htmlIn a web system, printing is a really annoying problem.Either develop the print control yourself, if the project time is tight, certainly too late.Either buy a mature print control, if it is a big project can be considered, but if the project only a few K to 1, 2W, this is troublesome.Some time ago there was a chance to touch web printing. In the blog park, Csdn find long time
The difference and introduction of character encodingASCII, GB2312, GBK, Unicode (Unified Code, universal code, single code)ASCII code 1 bytes accounted for 8 Bitcoin, Unicode Unified 2 bytes accounted for 16 Bitcoin;Utf-8 is a subset of Unicode, variable length, all English words are in ASCII format, Chinese characters are 3 bytes.ASCII 255 1bytes---> 1980 GB2312 7k+----> 1995 GBK1.0 2w+--->2000 year GB18030 2.7W---> Unicode 2bytes--- ; Utf-8 en:1byt
links, Admin5 is because of the high weight, friendship links is because the content of complementary and recommended the role of strong
First of all, determine the content of your site and keywords, suggest you use Baidu Index to find the corresponding keywords. Here I chose QQ2009 this keyword, QQ2009 this keyword current daily search quantity has 2W above. Select the flow of keywords after the analysis, to analyze the choice of the keyword compet
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.