1 PackageAlgorithms.util;2 3 /******************************************************************************4 * Compilation:javac Directory.java5 * Execution:java Directory directory-name6 * Dependencies:Queue.java Stdout.java7 * 8 * Prints out all of the files in the given directory and any9 * subdirectories in Level-order by using a queue. Also PrintsTen * out their file sizes in bytes. One * A *% java Directory. - * - *********************************************************************
When you are maintaining Oracle, you can use some Unix operating system commands to view system-related information under various operating systems.
Memory
-------
Aix:bootinfo-r
LSATTR-E-LMEM0
/USR/SBIN/LSATTR-E-L sys0-a Realmem
Or use a tool as "Topas" or "Nmon" (These are utilities)
Linux:cat/proc/meminfo
/USR/SBIN/DMESG | grep "Physical"
Free (the free command)
HP:/usr/sam/lbin/getmem
grep me
variables and their current values.
All: lists all options.
Term: Set the terminal type
Ignorance: Case Insensitive in search
List: displays the stop table (Ctrl + I) and end mark ($)
Number: displays the row number.
Report: displays the number of changes made by line-oriented commands.
Terse: displays brief warning information
Warn: NO write information is displayed if the current file is not saved when i
Od
The OD (octal dump) filter will convert the input (or file) to octal or other hexadecimal. You need to view
This command is useful when processing binary data files or an unreadable system device file,
For example,/dev/urandom, or a binary data filter.
DdThis is also a well-known tool, but it is a frightening "Data Replication" command.It is used to exchange data between a Unix microcomputer and an IBM mainframe through tape. This command still ha
It took me two days to sort it out, and some of the most common commands that people on earth know would be skipped! Finally, download the pdf manual. command to change the archive owner: chown [-cfhvR] [-- help] [-- version] user [: group] file... function: Change the file or folder owner parameter format: user of the new file owner IDgroup: user group of the new file owner-c: if the archive owner has changed, the change action is displayed.-f: If th
Hp unix has maintained a high market share in large enterprise-level hosts. For its top commands, I have read some documents before. Here I will summarize how to analyze the contents.
1.TopThe command syntax is as follows:
Top [-s time] [-D count] [-q] [-u] [-H] [-N number] [-f filename]
-S time: set the screen refresh latency, in seconds. The default value is 5 seconds.
-D count: set the number of screen r
BKJIA: In this article, we will introduce six cool and practical Unix/Linux tools. From viewing the weather through your terminal to letting a system administrator teach you how to complete a difficult task, there is almost no clue. Interestingly, most of these tools were released decades ago! Please let me know ......
Mentoring dialogue: kibitz
Kibitz is a terminal tool mainly used by a "master" to help him/her "apprentice )". Essentially, it provide
Introduction: Most Java programmers use some sort of tracking system to track potential bugs and problems with code in development. However, multithreading and multi-platform environments can generate a lot of puzzling trace data. In this article, software engineer Daniel Would provides some tips to help you understand the trace data that is generated in a complex application. You will learn how to use the Open source logging package log4j to generate a log file that contains rich information. Y
already exists:
If the size of the new value is smaller or equivalent than the value already exists, overwrite the old value directly;
If the new value is larger than the value already exists, then we must make a new memory space for the new value malloc, copy the new value into that memory, and replace the pointer to the old value with a pointer to the new value.
If we add an environment variable:
First we need to call malloc to allocate space for the string n
The DF command is a commonly used command for viewing hard disk information. The main parameters are as follows:
DF-A: displays the disk usage of all file systems, including 0 block file systems.DF-I: displays the I node information, not the disk block.DF-T: displays the disk space usage of each specified type of file system.DF-X: List disk space usage of a file system of a specified type.DF-T: displays the file system type.DF in 512 bytes DF-K: in
the hard disk space and usage. in Linux, the parameter H can be used to display more user-friendly results. For example:DF-H hard drive space display by userDF-K hard disk space is displayed in KBDF-M hard disk space is displayed in MB
W: displays the list of users logging on to the server.
The following commands are only applicable to Linux
Lsof: displays the list
1. Man-an interface to the on-line reference manuals$manMans2. apt-advanced Package ToolSee Also:apt-cache, Apt-get, apt.conf, sources.list$APT-cache search MySQL3.sudo-execute a command as another user (sudo allows a permitted user to execute a command as the Superuser or another User, as specified by the security policy.)$sudoinstall python2. 74.su-change user ID or become superusercc@debian: ~$supassword:[email protected]:/home/cc#succ cc@debian: ~$5. Ls-
pipeline that does not have a read process
Sigalrm
14
Term
Timer-to-time signal from alarm
SIGTERM
15
Term
Terminating signal
SIGUSR1
30,10,16
Term
User-defined Signal 1
SIGUSR2
31,12,17
Term
User-defined Signal 2
SIGCHLD
20,17,18
Ign
Child process stopped or terminated
Sigcont
19,18,25
Cont
If stopped, continue execution
1. Query IP address ifconfig2. Find port assignments for applications on the servergrep telnet/etc/services (telnet)Telnet using the TCP/UDP port number 23grep domain/etc/services (domain),
Telnet
Ftp
Tftp
http
Https
Snmp
Domain
Echo
Discard
Daytime
Chargen
Time
23
20
69
80
443
161
53
7
9
13
19
37
3.ping [IP Address], test the network for connect
Reference: http://www.renfei.org/blog/mac-os-x-terminal-101.htmlOne command line includes 4 Parts:command Name, Options, Arguments, Extras.Man : Give The Manual of this command.Absolute and relative paths/ : Root Directory.. : Parent directory.Directory Operationspwd : Print working directory, which'll show the absolute path of current folder.ls : List directory contents. Ls–la:list all contents including hidden contents.CD : Change directory.mkdir :
4. Basic Redis commands-list, basic redis-list1. The list type is implemented using a double linked list. Therefore, if you want to add elements to both ends, the time complexity is O (1 ), the faster the element gets closer to the two ends. However, the cost is that accessing elements through indexes is slow.2. the ma
List of configuration commands involved in the samba service configuration file [reprinted]
--------------------------------------------------------------------------------
Coding System = #Client code page = 936 # Set the character set used by Samba (default: 850,936 is simplified Chinese)Code page Directory =/usr/share/samba/codepages #Workgroup = ccgd. com # Set the samba workgroup;NetBIOS name = ccgd.
, respectively, from the left pop-up, from the right pop-up, the return value is a pop-up value. (pop-up means to remove the value and return the value)
127.0.0.1:6379> lrange mylist 0-1
1) "-2"
2) "-1"
3 "" 0 "
4)" 1 "
127.0.0.1:6379> Lpop MyList
"-2"
127.0.0.1:6379> rpop mylist
"1"
127.0.0.1:6379> lrange mylist
-0-1 1) "-1"
2) "0"
Combined with the above four commands, you can implement stacks and queues.
Stacks: lpush and lpop or usin
1. show command:Display RMAN configuration: RMAN> show all;
2. Report command:2.1. RMAN> report schema the physical structure of the target database;2.2. RMAN> report need backup days = 3; report data files not backed up in the last three days;2.3. RMAN> report need backup days 3 tablespace users; data files not backed up in the users tablespace for three days;2.4. RMAN> report need backup incremental 3. report the number of incremental backups required for data file recovery more than three ti
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.