vba lessons

Discover vba lessons, include the articles, news, trends, analysis and practical advice about vba lessons on alibabacloud.com

Python learning-eight weeks two lessons (December 12)

() Proc.join () print (x.value) print (arr) print (L)The manager uses the list () method to provide a way to share tables. You can actually use Dict () to share the dictionary, Lock () to share the threading. Lock (Note that we are sharing the threading. Lock, not the mutiprocessing of the process. Lock. The latter itself has realized process sharing) and so on. This allows the manager to allow us to share more diverse objectsThe process pool can create multiple processes.For example, the follo

"How to learn python lessons"

, exercise, keep;2, rest: Do not stay up late, 3, sleep six hours a day 11 points of sleep, early 6 get up. 4, fragmentation of time utilization.5, more concerned about the development of related functions. Manufacturing links, expanding the circle.Study hard, as much as possible into the circle. 1, find more opportunities to meet new people. A good circle can drive you, a good circle, mutual benefit.2, more reading, more powerful themselves. They are strong enough to build a circle of their

0 Basic Learning Python_ dictionary (25-26 lessons)

the example below and you'll know.2.in, similar to python2.7 inside the has_key, Determine whether a key is in a dictionary, there is true no false3. Query value directly from the key value,4.dict1.keys (), the keys method returns the keys in the dictionary as Dict_keys, Dict1.values (), and the values method returns the keys in the dictionary in dict_values form.5.dict1.setdefault (Key,default=none), similar to get (), but if the key does not exist in the dictionary, the key is added and the

20171115_python study five weeks three lessons

,group () can be accessed either by subscript (starting at 1) or by group name.4,groupdict can only display data with a group nameGroup ([Group1, ...]):Gets the string that is intercepted by one or more groups, and returns a tuple when multiple parameters are specified. Group1 can use numbers or aliases; number 0 represents the entire matched substring; returns Group (0) when no parameters are filled; Groups that have not intercepted a string return none; The group that intercepted multiple time

2018.5.8 seven weeks three lessons (FIREWALLD and Netfilter,iptables grammar)

下是否修改成功 DNS configuration file in/etc/resolv.conf [[emailprotected] ~]# cat /etc/resolv.conf # Generated by NetworkManager nameserver 119.29.29.29 nameserver 114.114.114.114Firewalld and NetFilter (firewall)Linux防火墙-netfilter:selinux临时关闭 setenforce 0 selinux永久关闭 vi /etc/selinux/config centos7之前使用netfilter防火墙 centos7开始使用firewalld防火墙 关闭firewalld开启netfilter方法 systemctl stop firewalld 服务关掉 systemctl disable firewalled 关闭firewalled 不让开机启动 yum install -y iptables-services 如果再开启firewall

Python Five week two lessons

[+]: M.group () out[35]: ' AB 'Re.search (): Usage is consistent with re.findall (), but Re.findall () matches all contained characters, while Re.search () matches only one contained characterIn [All]: Re.findall (R ' Ab ', ' ABCDABCD ') out[42]: [' AB ', ' ab ']in []: M = re.search (R ' Ab ', ' ABCDABCD ') in []: M.group () # the group () method to view out[44]: ' AB ' Re.sub (): Used to replace stringIn ["]: re.sub (R ' AB ', ' ab ', ' ABCDABCD ') # means to replace

Swift Project Combat-Multi-version iphone calculator based on layered architecture-free live public lessons invite you to participate

Service qq:1575716557Course Description:this is through a practicalIPhonea calculator application that enables learners to connect Swift's various knowledge points in tandem and to familiarize themselves withSwiftlanguage Features, understandingIOSGeneral process of application development, masteringobjective-cLanguage andSwiftlanguage blending and invocation to understand the importance of layered architecture design. Enable learners to make a swift-based iphone calculator650) this.width=650;

54 Lessons (EXPORTFS commands, NFS client issues, FTP introduction, using VSFTPD to build FTP)

virftp:virftp /home/virftp Defining where a password file is important [[emailprotected] vsftpd_user_conf]# vim /etc/pam.d/vsftpd ##这是用来认证的一个文件auth sufficient /lib64/security/pam_userdb.so db=/etc/vsftpd/vsftpd_loginaccount sufficient /lib64/security/pam_userdb.so db=/etc/vsftpd/vsftpd_login Edit the VSFTPD Master profile [[emailprotected] vsftpd_user_conf]# vim /etc/vsftpd/vsftpd.conf将anonymous_enable=YES 改为 anonymous_enable=NO ##不允许匿名用户 将#anon_upload_enable

"Deep Exploration C + + object Model"-about objects (object lessons) __c++

Preface "This book is written by a compiler designer for senior C + + programmers. The assumption behind this book is that programmers who understand the C + + object model can write code that is less prone to error and more efficient. ” It is because of the loss in the actual programming that I feel that reading this book is very necessary, such as a previous blog post: http://blog.csdn.net/jiange_zh/article/details/51871782 If you had read this book, you would not have been confused. Here are

Yesterday to Anhui Susong a customer there to maintain the experience and lessons

Yesterday to Anhui Susong a customer to do maintenance experience and lessons customer's database server would have been good, and I was trying to show someone how to install Oracle's clients. Oracle client installed on the server, half of the time I suddenly felt I found a great error: Oracle server can no longer install Oracle client, I quit but late: fee management system can not connect to the database, PB can not connect to the database, DBA

A few lessons to share as a personal webmaster

Review the mistakes made by zcom over the past year and share some of the lessons of last year. The biggest mistake is losing focus . We did a lot of acquisitions last year, we made a lot of investments and even invested in an in-house media company. The mode of their magazine is to put a magazine rack in the hotel room, and put their own and outside magazines to sell ads. They want to replicate Jiangnan spring's niche pattern, where we felt there was

Internet product design Lessons and experience: delete Confirmation not less

that the user can complete the operation, but also these dangerous operations with split line and normal operation of the Division, reduce the possibility of user misoperation, the recent user use of this kind of problem is much less. Have previously shared a confirmation page design in Google Reader series, if you look again may avoid this mistake ~ Confirmation Page Design (confirmation alert) (i)--timing of use Confirmation Page Design (confirmation alert) (ii)--the choice of form

Eight Lessons from COM experience

In my daily work, I have seen many COM codes written by different developers. I was amazed by the many creative ways of working with COM, and some of the clever code that made COM work might not even have occurred to Microsoft. Also, seeing some mistakes repeated again and again made me frustrated. Many of these errors are related to thread and security, and this is exactly the two areas that are missing from COM documentation. If you do not plan carefully, they are also the most likely to encou

Summary of the second week of Access lessons

Tags: many direct span data AC content close Basic access1. What knowledge has been learned in this lesson?(1) Database creation: Create empty data directly, create a database from existing files, and create a database using a template.(2 basic operation of the database: the opening of the database (the default) exclusive mode, read-only mode, and exclusive read-only mode) are turned off.(3) Basic maintenance of the database.(4) The Access data type.2. What are your experiences?Recognizing the m

Lessons learned from Linux to modify the user name of the root account

file,Both sides of the user do not correspond, resulting in the inability to login, and then find the appropriate solution on the Internet, most of the solution to the use of single-user mode to reset the password, but the server in the customer's company, but alsois to contact them to solve, no way, things have reached this point, can only solve, so later trouble customer company maintenance personnel to deal with, very sorry.Online query, found that they are not a person, but this problem, I

2018-4-22 17 weeks 4 Lessons Shell alarm System script Configuration

# #发送邮件Fiecho "' Date +%t ' 502 $c _502"disk.sh Content#! /bin/bash# #Writen by alex##Rm-f. /log/disk.tmplang=enFor R in ' Df-h |awk-f ' [%]+ ' {print $} ' |grep-v use ' # #以一个或多个空格或% as delimiterDoIf [$r-gt] [$send-eq "1"]Thenecho "$addr ' date +%t ' disk useage is $r" >> /log/disk.tmpFiIf [-F. /LOG/DISK.TMP]ThenDf-h >>. /log/disk.tmp/bin/bash. /mail/mail.sh $addr \_disk $r. /log/disk.tmpecho "' Date +%t ' disk useage is Nook"Elseecho "' Date +%t ' disk useage is OK"Fi [%]+ represents o

2018-4-17 16 weeks 5 Lessons shell script date, if

later[[email protected] ~]# date-d "+1day" April 18, 2018 Wednesday 21:46:48 Cst[[email protected] ~]# date-d "+1day" +%f2018-04-18date-d "-1 days" a day agodate-d "-1 month" Month ago # #年year[Email protected] ~]# date-d "-1 month" +%F2018-03-17date-d "-1 min" A minute ago # #小时hour, seconds second[[email protected] ~]# date-d "-1 min" +%t21:47:09[[email protected] ~]# cal April 2018 1,234,561 2 3 4 5 6 78 9 10 11 12 13 1415 16 17 18 19 20 2122 23 24 25 26 27 2829 30 20.4 variable

2018-1-4 4 weeks 3 lessons VIM 2

action (U)10, replace all the etc in the entire file with a CTE (1, $s/etc/cte/g)11, move the cursor to line 25th, delete the string "ly" (25G then press J to move the cursor to the right to find "lyl", press V to select, then press x)12, Restore previous action (U)13, delete line 50th (50G DD)14, Restore previous action (U)15. Delete all contents of 第37-42 (37G 6DD)16, restore previous action (U)17, copy the contents of line 48th and paste it below line 52nd (48G yy 52G p)18, restore previous

Linux Eight week three lessons (March 28)

Tags: LinuxEight weeks three sessions (March 28)10.32/10.33 rsync via service sync10.34 Linux system logs10.35 Screen ToolExtended Linux log File Explorer Logrotate http://linux.cn/article-4126-1.html Xargs Usage Detailed http://blog.csdn.net/zhangfn2011/article/details/6776925 10.32rsync synchronization via service (UP)Open two virtual machines, a machine 192.168.133.130,b machine 192.168.133.130, two machines can communicate with each other.A machine file is synced to machine

Eight weeks three lessons rsync syncs through services, Linux system logs, screen tools

/wtmpUsed to view the correct login history, he is a binary file that cannot be viewed by cat and can only be viewed with last.LASTB command to view the user who failed the login, the corresponding file is/var/log/btmp/var/log/secureHe is the log that logs the login failure. He is also a binary file and cannot be viewed by cat./var/log/secure Security LogHe logs log-in related, Pam-related, and so on. If someone has hacked our device, it will also be recorded in this file.Screen toolVirtual Term

Total Pages: 15 1 .... 11 12 13 14 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.