One. Serialization:The process of writing an object into a stream is serialized, and the process of reading the object from the stream is called deserialization. In Java, it is often possible to implement a deep-clone object by enabling the object to implement the Serializable interface, then writing the object into a stream and then reading it from the stream to reconstruct the object. Two. Serialization implementation:Print:20Zhangsan-----------------------40Teacher Zhang40Teacher ZhangThree.
returned too large, after alldata range not exceeding 2^63! 2, use Longlong to store all the data! 3, the subject is an equation: a*x+b*y=n, X is the number of times a sharpening, Y is the number of knives! Of course, X and Y will have negative values when applying the extended Euclidean algorithm, and they need to be removed from the situation |! 4, the initial temperature of 0, see ' tips ' to get information! A little flaw!1#include 2#include 3#include string.h>4#include string>5#include 6
We're not using the clumsy way of the front, N instanceof to judge/*** Book: Thinking in Java * function: In order to count pet, we do a tool that can track the number of different types of pet, using map. Use dynamic instanceof () * File: petcount3.java* time: April 14, 2015 09:25:29* Author: Cutter_point*/package lesson14typeinformation; Import Java.util.linkedhashmap;import java.util.map;import net.mindview.util.mapdata;import static Net.mindview.util.print.*;import Lesson14typeinformation.pe
-poly low-coupling system has better reusability, maintainability and expansibility, and can complete the development, maintenance and expansion of the system more efficiently, and continuously support the development of the business. Therefore, it can be used as a standard for judging the quality of a software design, and naturally the goal of our software design.These advantages of object-oriented programming in software development make it one of the most popular program design ideas, which e
corresponding to the same value, forming a dictionaryinfo='Alex's1={}v2=s1.fromkeys (info,222)print (v2) {'a'l'e ' ' x ': 222}4.5 get, returns value according to Key, if none is returned, the none can be modified info={'Alex': 123, 'a':'nishishei' ,'v': 555}#info= ' Alex 'v2= Info.get (567,222)print(v2)------222Because there is no key567, so return parameter, 2224.6 Pop (key, return default value)If there is no key, the default value is returnedIf there is, then delete and get4.7 Popitem ()R
parentheses line;# GREP-E-o "^[_[:alpha:]]+\ (\)"/etc/rc.d/init.d/functions5, use echo to output a path, and then egrep find its path base name; Further use Egrep to remove its directory name (note that the directory name, not the directory path);# echo "/etc/network" | Egrep-o "[^/]+?$"6. Find all files that are not root, bin or hadoop under the/usr directory;# find/usr-not \ (-user root-o-user bin-o-user hadoop \)7, one day the system was invaded, hackers in your system to leave the Trojan fi
Yesterday, Baidu rejected the application released, because the resolution is set to 11, I immediately silly eyes, to ask the technical department, sent to Mail today, part of the following:Considering a fully adaptable model, the resolution layout of each model needs to be drawable, layout, and values, but the drawable and values need to be larger than the resolution requirements of your own package. 11 is the result of our analysis shows that you have to do settings, there are some models invi
vptr (virtual table pointer,** clause **7), which increases the memory required for the object.Handle classes and interface classes, once out of the inline function, cannot be too much. * * Clause **30 explains why inline functions are placed in the header file, but handle classes and interface classes are designed to hide implementation details.What we want to do is to use handle classes and interface classes in the program in order to have the least impact on their customers when the code cha
hour with "HH".
5
M
The number of minutes in the hour, the minute is two digits, and "mm" means minutes.
6
S
The number of seconds in minutes, seconds is two digits, and "SS" is used to denote seconds.
7
S
Milliseconds, the number of milliseconds is three digits, and "SSS" is used to denote milliseconds.
Iv. examples PackageCom.pb.demo3;Importjava.text.ParseException;ImportJava.text.SimpleDateFormat;Importjava.util
downloads the directory on the server to local, and the last . represents the current directoryrsync -r mydir/ happycasts.net:mydir/Can synchronize the corresponding directory of the client and server, note that two can / not save, and the general use -a of parameter substitution -r , -av to print out some useful information-aCan only synchronize the newly created files on the client, and sometimes the local will also delete some files, need the server also do the corresponding delete, it shoul
addition, it is necessary to find all files of more than 20k and type ordinary files in/etc directory;A. #find/-nouser-a-nogroup-atime-7-lsB. #find/etc-type f-size +20k-exec du-sh {} \;8, create the directory/test/data, let a group of ordinary users have write permissions to it, and all the files created by the group is the directory belongs to the group; In addition, each user can only delete their own files.A. #mkdir-pv/test/data#groupadd It;useradd Liu;useradd Wei;#chown: It/test/data;chmod
current system that are not owned by the master or group and have been visited in the last week;In addition, it is necessary to find all files of more than 20k and type ordinary files in/etc directory;find/-nouser-o-nogroup-atime-7find/etc-type f-size +20k8 , Create directory/test/data, let the normal user in a group have write permission to it, and all the files created belong to the group that the directory belongs to, in addition, each user can only delete their own files. [Email protected]~
(:) several fields, these fields are as follows:Group name: password: Group identification number: List of users in the groupSpecific explanations:Group Name:The group name is the name of the user group, consisting of letters or numbers. As with logins in/etc/passwd, group names should not be duplicated.Password:The password field holds the password word after the user group is encrypted. The user groups in the General Linux system do not have a password, that is, the field is generally empty o
the set is empty, an error occurs.Clear method:Empties the collection.Union method:1 a={1,2,3}2 b={2,3,4}3 c=a.union (b)4Print (c)# {1, 2, 3, 4}Combines two sets. A mathematical set-up.Intersection method:1 a={1,2,3}2 b={2,3,4}3 c=a.intersection (b) 4 Print (c) # {2, 3}The intersection of mathematics.Difference method:1 a={1,2,3}2 b={2,3,4}3 c=a.difference (b)4 Print(c)# {1}All elements of a collection that do not appear in B.Symmetric_difference Method:1 a={1,2,3}2 b={2,3,4}3 c=a.symmetric_
, so the array subscript range is 0 to 1, and the program subscript appears 2, that is, scores[2], over the range, resulting in array access.Code:public class HelloWorld {public static void Main (string[] args) {Defines a string array of length 3 and assigns the initial valueString[] Hobbys = {"Sports", "Game", "movie"};System.out.println ("The value of the element in the loop output array:");Iterating through the elements in an array using loopsfor (int i=0;iSystem.out.println (Hobbys[i]);}}Ope
3. But the array AA we defined is not like this, let's look at the results of the compilationWe see that the second compiled result is also indeterminate. Through this section of the array parameters and pointers to the learning, summed up as follows:1, C language will only be copied by the value of the parameter, and the array parameters must degenerate into a pointer; 2. The multidimensional array parameter has to provide all dimension lengths except the first dimension, and the first dimensi
Ajaxrequest is a lightweight AJAX application development framework that is compatible with Firefox, IE, Opera, and Safari, making it easy to do some of the operations that are often needed in Ajax, simplifying development steps and reducing the amount of repetitive code written.
If you find a problem in the course of use, or have good comments and suggestions, you can send me an email, vipxjw[at]163[dot]com.
Ajaxrequest v0.7.12 released in 2007-12-31
MySQL1024x768August - -: +a.myi-rw-r-----1MySQL MySQL456August - -: +A.myd -- Myisampack first to the base address to find the command (with RPM installation can be directly in the root directory with
the command)~]# Cd/usr/local/mysql/bin -- compress a table, the hint is too small to compress
[[email protected] bin]#. /myisampack/usr/local/mysql/data/test/a
/usr/local/mysql/data/test/A is too small to compress
If the compression succeeds, the table is read-only and cannot be written. You ca
) statements, Sequential writes, and automatic switching after full write. Only archive mode can recover data, and non-archive mode can only restore current data.----View Redo log file informationArchive log list;Select * from V$log;----switch access to physical files (not used in normal work)Alter system Switch Logfiel;Select * from V$logfile;----adding redo log filesLinux:alter database Add logfile '/database/. /redolog09.rdo ' size 2g autoextend off;Windows:alter Database Add Logfie(' g:oracl
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.