Using shell to realize the function similar to windows recycle bin under linux
When using linux, the rm -rf command is often executed, but this command is risky. For example, execute a shell script, which contains the following statements:
# script.sh
rm -rf $HOME/$SOME_PATH
At this time, if the environment variable HOME is caused by a setting_ If the path is empty, all contents in the HOME directory will be cleared di ...
Posted by shilpa_agarwal on Sun, 27 Feb 2022 05:00:05 +0100
[open and closed principle] of design principle
Python wechat ordering applet course video
https://edu.csdn.net/course/detail/36074
Python actual combat quantitative transaction financial management system
https://edu.csdn.net/course/detail/35475 The design principle is a summary of some experience guiding our code design, that is, "mental method"; Object oriented is our "w ...
Posted by TecTao on Sun, 27 Feb 2022 04:55:26 +0100
[Ji Li 01 group No. 08] SSM framework integration
Python wechat ordering applet course video
https://edu.csdn.net/course/detail/36074
Python actual combat quantitative transaction financial management system
https://edu.csdn.net/course/detail/35475
[Ji Li 01 group No. 08] SSM framework integration
Database preparation
This course uses MySQL database. Start MySQL first:
sudo service mysq ...
Posted by desmi on Sun, 27 Feb 2022 04:50:24 +0100
Write a script in python to dynamically delete the QQ space for many years
Seriously, when I wrote this script, I didn't understand the basic syntax of python. I can only say that language is not important, just easy to use...
As for why I want to delete QQ dynamics, I just don't want to always see those childish words that were sent that year and today. There are many dynamics (although QQ has not been used in recen ...
Posted by jiayanhuang on Sun, 27 Feb 2022 04:28:23 +0100
es 7.x advanced document analysis
Process of document analysis
Divide the document into separate entries suitable for inverted indexingUnify entries into a standard format, such as removing tenses from English
When the analyzer executes the above contents, it actually encapsulates the above functions into a package Character filter: pass the string through each character ...
Posted by newbtophp on Sun, 27 Feb 2022 04:15:10 +0100
Section 7 of C + + after the initial stage - polymorphism
Our task in this section is to find out the polymorphism
catalogue
1, Concept of polymorphism
2, Override (overwrite) of virtual function:
3, override and final in C++11
Keyword override:
Keyword: final
Comparison: overload, overwrite (override), hide (redefine)
4, Abstract class
concept
Interface inheritance and implementation inhe ...
Posted by futurshox on Sun, 27 Feb 2022 04:05:10 +0100
[x86 assembly language: Notes from real mode to protected mode] Chapter 8 access and control of hard disk and graphics card
Objectives of this chapter:
Simulate the process of loading applications by the operating system, demonstrate the relocation method of segments, and thoroughly understand the segmented memory management mechanism of 8086 processorLearn the program execution mechanism of x86 processor procedure callUnderstand how x86 processors access periphera ...
Posted by ATS16805 on Sun, 27 Feb 2022 03:56:48 +0100
LRU and LFU algorithms (page replacement algorithm)
Difference between LRU and LFUBoth LRU and LFU are page replacement algorithms for memory management.LRU: Least Recently Used (longest time) elimination algorithm. LRU is the page that has not been used for the longest time.LFU: Least Frequently Used. LFU is the page that has been used the least times in a period of time.exampleSuppose the peri ...
Posted by whatwhat123 on Sun, 27 Feb 2022 03:47:14 +0100
SSH secret free automatic connection
1. GeneralFor the use of Linux operating system, the importance of SSH is self-evident. However, you have to enter a lengthy user name @ host IP every time you log in, and sometimes you forget the user name / host IP. It is also a waste of time to check the records again, so this time we need to configure the SSH login configured to the server ...
Posted by jamesp on Sun, 27 Feb 2022 03:43:13 +0100
[Java object-oriented] String, String Constant Pool, String initialization, intern method, common methods of String (interception)
String
Used in Java
java.lang.String class represents string:
Before Java 9, the bottom layer used char [] to store character data Starting from Java 9, the bottom layer uses byte [] to store character dataAll String literals (such as "abc") are instances of the String classOnce a String object is created, its character content ...
Posted by smsulliva on Sun, 27 Feb 2022 03:30:51 +0100