Variable naming rules ------ Hungarian naming rules!
A few years ago, Charles Simonyi (who later became a well-known programmer at Microsoft) designed a post-fix-based naming method known as "Hungary notation" to remember him. his idea is to give each identifier a prefix based on its meaning. microsoft later adopted this idea to give each identifier a prefix to describe its data type. therefore, the prefix
3. Comment on specifications and naming rules. Comment on standardized naming rules.
1. For C/C ++ files, the file header should have a comment similar to this:
/*************************************** *********************************
*
* File name: network. c
*
* File Description: network communication function set
*
* Created by: Hao Chen, December February 3, 2003
*
* Version: 1.0
*
********
13 Rules and 13 system security rules must be observed to maintain the security of the XP System
Although the Windows operating system leaves us with many bad memories, we must admit that Windows is still one of the most widely used systems. In the face of such a large and complex operating system, it is imperative to protect its security. For the current Windows security technology and concepts, this arti
3.3 basic requirements for Class Design
The above describes the basic rules of system design and class design, which are theoretically strong and difficult to understand for a while. The following describes the basic requirements of class design, which is easier to practice, you need to do well. The above rules can be gradually understood in the practice process. software design is a practical science, and
Arris-22 marketing rules (22 Business Rules)
19. Face up to the failure rule
Failures are hard to avoid, but failures should be taken into consideration.
For bad things, too many companies always want to improve it rather than give up it in time. "Let
We repeat to save the situation "is their rule of survival.
For your personal future, it is terrible to face the wrong reality but do nothing for it.
. The pr
Rules on the wine table:
(1) If you really can't drink it yourself, don't open your first bite and eat it while holding your rice bowl.
(2) If you are sure you want to drink it, do not install ink. The next step is the rule.
Rule 1: although the wine table is "deeply emotional, stuffy; feeling shallow, licking a lick", you must not put this sentence on your mouth when drinking.
Rule 2: keep a low profile, and make a small fortune. You cannot g
General rules for object type conversion, object conversion rules
1. the type of a subclass object can be converted to its parent class, that is, a subclass object can be referenced as a parent class object. This conversion is safe and can be automatically implemented by the Java compiler.
2. the type of a parent class object cannot be converted down to its subclass type, that is, a parent class object ca
78 golden rules for java programming and 78 golden rules for java
Create and destroy objects1. Consider replacing the constructor with the static factory method (the static method of the returned class instance ).2. When encountering multiple constructor parameters, consider using Constructor3. Use a private constructor or enumeration type to enhance the Singleton attribute.4. Enhance the non-inst
[Go] common css naming rules and css naming rulesCommon css naming rules
Header: header
Content: content/container
End: footer
Navigation: nav
Sidebar: sidebar
Column: column
Overall Layout width of the page peripheral control: wrapper
Left right center
Logon entry: loginbar
Logo: logo
Advertisement: banner
Page subject: main
Hotspot: hot
News: news
Download: download
Subnavigation: subnav
Menu: menu
Sub me
Break C ++ Const rules and cconst rules
Starting with a C ++ cainiao Function
1 CString MyClass::GetStringValue() const2 {3 return m_strValue; 4 }
This value may not have been assigned a value. Well, I will first judge whether it is null. If it is null, it will be assigned a value.
CString MyClass::GetStringValue() const{ if(m_strValue.IsEmpty()) SetStringValue(); return m_strValue; }
As
The following may be the form data to be submitted {code ...} I intend to write an OrderFormmodel to verify the data. products corresponds to a model, and there is also a model for Form Verification marketing, there is also a Form Verification OrderForm rules should... the following may be the form data to be submitted:
phpArray( [products] => Array ( [0] => Array ( [product_id] => 12
Front-end CSS naming rules and CSS naming rules
This article summarizes various CSS specifications in Web Front-end development, including file specifications, annotation specifications, naming rules, writing specifications, and test specifications.1. File specifications 1. All files are archived to the specified directory. The specific requirements are explained
One of the strengths of yii2 is its Form component, which is convenient and secure. This article introduces the rules custom verification rules in yii2. For more information, see its Form component. Some friends feel that they have been using yii for a while. well, it seems nothing except tp.
The leader arranged for a registration function. this guy is refreshing Baidu, what a good form style, and Baid
CSS naming rules and css naming rules
Reprinted statement:Original: BingoLink: http://blog.bingo929.com/css-coding-semantic-naming.html
I would like to thank the author for sharing this article. This article is completely reproduced from the above link, which is used as a backup for ease of use.
CSS naming rules are standardized. When you write css, you often enc
Recently, I am confused about csdn's blog point calculation rules. I have seen a csdn blog titled how to calculate csdn's blog points: "ranking score of the blog ranking = sum of all essays on the personal blog and the number of readings on the article + sum of all comments on the personal blog * 10+ Total number of comments of an individual * 50 ".
The credit calculation rules of csdn and blog are differe
Tags: tween type database SQL not CTE definition Data blog char betweenCreating a rule with the CREATE RULE statement Create a hire date rule hire_date_rule CREATE RULE as @hire_date >= ' 1980-01-01 ' and@hire_date getdate () Create a gender rule sex_rule CREATE RULE as @sex inch (' male ',' female ') Create scoring rules Grade_rule CREATE RULE Grade_rule
as @value between 1 and - Create a character rule my_character_rule Create Rule My_charact
Regular Expression-Introduction to matching rules, regular expression matching rulesBasic mode matching
Everything starts from the most basic. Pattern is the most basic element of a regular expression. They are a set of characters that describe character strings. The mode can be very simple. It is composed of common strings and can be very complex. special characters are often used to indicate characters in a range, repeated occurrences, or context. F
I read this book in the weekend, and decided to put the book on my nightstand. It's a short and funny book, the Clear insight and good stories, strongly recommend entry even senior engineers to read it.IntroductionThis book tells your how to find out what's wrong with stuff, quick. It indeed short and fun. I finished reading in the weekend and made some notes. And it convinced me the Nine rules powerful to hardware/software design and design, as some
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.