Weekly Report: From January 1, October 29-20, 2018 to January 1, November 2
Monday 10.29
Debugging and testing of client logon.
The addition of subject database fields solves the problem of deleting the question library.
FTP configuration, permission configuration research, data query, and experiment.
Communicate with Xia to clarify the development tasks o
In order to omit the space and make it visible to the operator who manually fills in the paper, the volume number on the card of the materials shelf is determined to be classified and sorted, as shown in
A-3, A-4, A-5, A-8 forming A-3 ~ 5, 8, etc.
The following code uses a few auxiliary list
/// /// Similar to 1, 2, 3, 5, 7, 8, 10, 11, 12, 13, 14, 15, 16, 21, 22, convert to
View code
//// Main. M // money /// enter a specified amount (in Yuan, for example, 345.78) from the keyboard, and then display the number of different denominations that pay the amount, required to display 100 yuan, 50 yuan, 10 yuan, 5 yuan, 2 yuan, 1 yuan, 5 cents, 1 cent, 5 points, 1 cent each how many sheets // cr
the ④ method are local variablesThere are four manifestations of the ⑤ method, which are embodied in the same day work.The first form has no return value and the parameter parameter is equivalent to the vectorThe second form has a return value of no parametersThe third form has a return value with parametersFourth form no return value no parameter⑥return returns a keyword with a return value3, definition: Define class keyword is class name {class Body}4, Construction Method: ① method Name and c
1. MD5 encryption.
Algorithm Is one-way encryption, that is, encrypted data cannot be restored through decryption. The related classes are included in the Java. Security. messagedigest package.
2. 3-des encryption. the encryption algorithm is reversible. The decryption party can decrypt the data by using the secret key agreed with the encryption party. The related classes are included in the javax. crypto.
1. md5 encryption. the encryption algorithm is one-way encryption, that is, encrypted data cannot be restored through decryption. The related classes are included in the java. security. MessageDigest package.2. 3-DES encryption. the encryption algorithm is reversible. The decryption party can decrypt the data by using the secret key agreed with the encryption party. The related classes are included in the j
Reference:http://bbs.csdn.net/topics/390851535Content:One more character reason:Open a Test.txt text file with a text editor (notepad++)The first choice is the red box encoding, so that the length of the read string is always 28 (inexplicable one more characters), will report an exception, because the first character is not ' {'The second choice is the blue box encoding, so that the length of the read out of the string is 27, and we think of the same length, will not report an exceptionMy Code p
manual.
Several methods to ensure security:
(1) Before installing OracleServer, create a database administrator group (DBA) and assign the user IDs of the root and Oracle software owner to this group. Only 710 of the programs that DBA can execute are permitted. During the installation process, the SQL * DBA system permission command is automatically assigned to the DBA group.
(2) allow some Unix users t
types, see the following section)
Boolean
This is the simplest type. Boolean represents the TRUE value, which can be TRUE or FALSE.
When other types are converted to the boolean type, the following values are considered as FALSE:
Boolean value FALSE
Integer value 0 (0)
Floating point value: 0.0 (0)
Blank string and string "0"
Array without member variables
Objects without cells (applicable only to PHP 4)
Special type NULL (including unset variables)
All other values are considered to be TRUE (
without cells (applicable only to PHP 4)Special Type null (including unset variables)All other values are considered to be true (including any resources ).
ArrayArrays are an important data type in PHP. A scalar can only store one data, while an array can store multiple data.$ My = array ('1', '2', 'abc', 'D ');Object)Objects are advanced data types that will be learned later
Resource)Resources are cre
DescribeThere are two variables A and B, after executing the following code:A = 32768;b = a;printf ("%d%d\n", A, b);Output two number: 32768-32768What is the following type of A and B respectively?a. bool B. Char c. short D. int E. Float F. DoubleInput None. The output line contains two uppercase letters that represent the type labels for variables A and B, respectively. The middle is separated by a space. Sample inputNoSample outputA b//only as a format example, not the correct answer1 #include
, each line outputs the original number of the remaining recruits, with a space between the numbers.
Sample Input22040
Sample Output1 7 191) 19 37
Authorcai Minglun
SOURCE Hangzhou Electric ACM Training Team Training Tournament (VI)
Recommendlcy
Topic Analysis:Simple simulation. This question may be a little puzzled by how the input sample gets the output sample. Here are some of your own understandings:The code is as
Javascript: First JavaScript Basics
1. Javascript character set:Javascript uses the Unicode Character Set encoding.Why is this encoding used?The reason is simple. The 16-bit Unicode code can represent any written language of the Earth. This is an important feature of language internationalization. (You may have seen writing scripts in Chinese, such as: function my function (){});Each character in Javascript is expressed in two bytes. (Because it i
/** Copyright (c) 2012, School of Computer Science, Yantai University * All Rights Reserved. * file name: test. CPP * Author: Qiu xuewei * Completion Date: July 15, December 12, 2012 * version: V1.0 * input Description: none * Problem description: Use the while loop to judge the number of 1, 2, 3 in the string *ProgramOutput: * Problem Analysis :*AlgorithmDESIGN: slightly */# include
Experience: the fir
Before encountering a very interesting topic, is about the problem of sorting algorithm:Known: An array: array element: 0 or 1 or 2Solve: Sort the array by 0-1-2?1Template classT>2 voidSwap (t t1, tT2)3 {4T tmp =T1;5T1 =T2;6t2 =tmp;7 }8 9 //sorting a array which the elements is 0 or
MATLAB learning notes (2): symbol computation _-_ 1, matlab _-_ 1
2.1 symbol object and Symbol Expression
Create a basic symbol object
syms aCreate a basic symbolic number
sym('num')sc=sym('num')
The difference between a symbolic number and a numeric number
>> clear>> a=5+pi,b=sym('5+pi'),ca=class(a),cb=class(b),vpa(a-b)a = 8.1416 b = pi + 5 ca =doublecb
Two arrays a [N], B [N], where each element value of A [N] is known, and B [I] is assigned a value, B [I] = a [0] * a [1] * a [2]… * A [N-1]/a [I]
[Problem]
1. Division is not required.
Two arrays a [N], B [N], where each element value of A [N] is known, and B [I] is assigned a value, B [I] = a [0] * a [
there are many times in Linux where redirects are used to do some work. Let's talk about my understanding of redirection. Welcome to the slot 1,02, 1> indicates that the standard output code is 1 or stdout3, 2> indicates an error output code of 2 or stderrStandard output:> or 1
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.