' regexp ' and its front and back lines, plus the ' regexp ' before the first line# line number of rows (similar to "GREP-A1-B1")Sed-n-E '/regexp/{=;x;1!p;g;$! n;p;d;} ' -E H# Displays lines containing "AAA", "BBB" or "CCC" (in any order)
Sed '/aaa/!d/bbb/!d/ccc/!d ' NBS P # The order of the strings does not affect the result # displays lines containing "
/**
* 1, the null judgement of the string org.aphche.commons.lang.StringUtils
*/
Checks If a String is empty ("") or null.
SYSTEM.OUT.PRINTLN (Stringutils.isempty (null)); True
System.out.println (Stringutils.isempty ("")); True
System.out.println (Stringutils.isempty ("")); False
System.out.println (Stringutils.isempty ("Bob"));//False
System.out.println (Stringutils.isempty ( " Bob ")); False
//Checks If a String is whitespace, empty ("") or null.
SYSTEM.OUT
(similar to "GREP-A1-B1")Sed-n-E '/regexp/{=;x;1!p;g;$! n;p;d;} ' -E H # Displays lines containing "AAA", "BBB" or "CCC" (in any order)Sed '/aaa/!d; /bbb/!d; The order of the/ccc/!d ' # string does not affect the result # Displays lines containing "AAA", "BBB" and "CCC" (in Fixed order)Sed '/aaa.*bbb.*ccc/!d ' # Displ
;} '-e' $! {H; d;} '-e x # when there is only one row in the file, no output
# Only display rows matching Regular Expressions (simulate "grep ")
Sed-n'/regexp/P' # method 1
Sed '/regexp /! D' # method 2
# Show only the rows that do not match the regular expression (simulate "grep-v ")
Sed-n'/regexp /! P' # method 1, which corresponds to the preceding command
Sed '/regexp/d' # method 2, similar syntax
# Search for "regexp" and display the last line of the matched row, but n
:192.168.8.0/24Router segment VLAN6 IP:192.168.6.0/24Wireless VLAN11 IP:192.168.9.0/24each network segment gateway is 192.168.*.254The 23,24 of the first switch on each layer is configured for wireless access mode, 19,20,21,22 for the camera for access mode, and the first interface for each switch is configured as a cascadeVlan1 as the management interface for each switch3. Network ConfigurationRouter configuration==================================================================================
During development, we often use the built-in JDK keytool to create a self-issued certificate and save it to the keystore file. If you want to import a keystore to another keystore (such as installing it on another machine without overwriting files), what should you do?
For example, we import the content with the alias Tomcat from AAA. jks to BBB. jks. The illusion is that the certificate is first exported from
First of all, please take a look at the following output results. Please think carefully and do not answer them so quickly!
String STR = new string ("AAA"); string str2 = new string ("AAA"); system. out. println (STR = str2); system. out. println ("----------------"); string str3 = "BBB"; string str4 = "BBB"; system. out. println (str3 = str4); system. out. println ("----------------"); string str5 = new
describe the hard link and soft link.
Now there are two files in the directory, one named AAA and the other named BBB. Reference $ LS-il
963922-RW-r -- 1 Ocean ocean 92 aaa
963923-RW-r -- 1 Ocean ocean 95 bbb
First, create a hard link for AAA. Reference $ ln AAA aaahard
$ LS-il
963922-RW-r -- 2 ocean 92
String class:1. for the Equality judgment of a string object, use the Equals () method instead of = =. The Equals () of string determines whether the current string is consistent with the contents of the passed-in string.2. string is a constant, and its object cannot be changed once it has been created. When using the + stitching string, a new string object is generated instead of appending content to the original string object.3. string pool is in stack memory.4. String s = "
show status like ' wsrep% 'Balance= "0", does not open the read-write separation mechanism, all read operations are sent to the currently available writehost. 0 " writetype= "0" dbtype= "MySQL" dbdriver= "native" switchtype= "2" slavethreshold= ">"show slave status3 Basic SQL Operation validationLook directly at the insert operation of the log, the current data is directly into the 3306 port of the host.01/17 10:53:58.596 DEBUG [$_NIOREACTOR-1-RW] (serverqueryhandler.java:56)-serverconnection
the mailto tag, I will make a detailed summary of the use of the mailto tag here, hoping to share with you!
1. If we create a super connection like "mailto: aaa@21cn.com" in the web page, click the super connection with the mouse, the browser will automatically call the system's default mail client program. At the same time, the recipient's address is automatically written in the recipient settings bar of the mail editing window, while other content
PHP reflection class ReflectionClass and ReflectionObject
PHP reflection class ReflectionClass and ReflectionObject
PHP extension reflection class, which is used to analyze php programs, export or extract detailed information about classes, methods, attributes, parameters, and so on, including comments.
Let's look at this question. The member variables of the php class are not declared in the class, but in the function. What is the difference?
The Code is as follows:
Class test {Private $
Delphi Tstringlist Usage DetailedTstringlist Common Methods and properties:varlist:tstringlist; I:integer;beginList:= Tstringlist.Create; List.add ('STRINGS1');{Add}List.add ('STRINGS2'); List.exchange (0,1);{Displacement}List.insert (0,'STRINGS3');{Insert}I:= List.indexof ('STRINGS1');{the first occurrence of the position}List.sort; {Sort}list.sorted:= True;{Specify sort}List.count; {Total}List.text; {Text Collection}List.delete (0);{Delete, 0 is the first data}List.loadfromfile ('C:/tmp.txt');
................................... ........................................ ...................................... 5810.2 what is authentication .................................... ........................................ ......................................... 5810.3 what is authentication .................................... ........................................ ......................................... 5810.4 Oma authentication method .................................... .............
Omniswitch the command to view the log is: Format: Show log swlog [timestamp start_time [end_time]]show log swlog timestamp 05/21/2015 11:30 05/21/201 5 12:30Discover that adding a router privately causes DHCP distribution to confirm the router IP, find the MAC, switch to the MAC corresponding port, close this port to search for this router location, master its Administrator account and password, turn off the DHCP function.Show configuration Snapshotshow VLAN rules add managed switch, MAC addres
When matching a class, jquery is used for a relatively clumsy method. Both the class name of the target node and the expression must be processed before they can be used.
Match = "" + match [1]. replace (// \/g, "") + ""; for (VAR I = 0, ELEM; (ELEM = curloop [I])! = NULL; I ++) {If (ELEM. classname ("" + ELEM. classname + ""). replace (/[\ t \ n \ r]/g ,""). indexof (MATCH)> = 0 )){//*******************}}
If match is. AAA, it is okay to use only
Scenario 1:
Table Data
Name score
AAA 11
AAA 19
Bbb 12
Bbb 18
CCC 19
Ddd 21
The expected query result is as follows:
Name score
AAA 30
Bbb 30
CCC 19
Ddd 21
CopyCode The Code is as follows: --- check whether the table exists
If exists (select * From sysobjects where name = 'testsum ')
Drop table testsum
Go
--- Create a table
Create Table testsum
(
TID int Prima
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.