Java IO explains that in detail

  0x01: byte stream Byte stream base class 1. InputStream InputStream: the base class of byte input stream. The abstract class is a superclass representing all classes of byte input stream. Common methods: // Reads the next byte of data from the input stream abstract int read() // A certain number of bytes are read from the input st ...

Posted by hl_tan on Sat, 27 Nov 2021 22:03:31 -0800

Oracle,Mysql REGEXP_LIKE regular expression usage

1. Scenario Display Regular expressions and corresponding functions are the same in oracle and mysql. Introduction to regular expression symbols: '^' Matches the start position of the input string, used in a square bracket expression, where it indicates that the character set is not accepted. '$' Matches the end of the input string. If set Re ...

Posted by pixeltrace on Sat, 27 Nov 2021 21:53:58 -0800

My first JDBC program (to realize the addition, deletion, modification and query of data table) and error analysis and solution.

1. Define your own database and data table 2. Access the defined data table through JDBC and insert 2 records. Requirements: 1. Submit SQL statements defined in database and data table; 2. Submit program implementation process; 3. Submit program running results. This is a small class assignment assigned by my teacher. What is JDBC JDBC(Jav ...

Posted by Lucnet on Sat, 27 Nov 2021 21:47:13 -0800

C language file operation details

preface In C language, file is an important concept in programming. The operating system manages data in the unit of files. Although there may not be many places to use files in the future, files are still an indispensable part of C language. Well, no more nonsense. Let's get straight to the point. 1, What is a file Concept: files on dis ...

Posted by Tjeuten on Sat, 27 Nov 2021 21:25:53 -0800

☕ [Java deep series] "technical blind spot" let's fully understand the API guide related to time and date

Technical introduction Date processing in java has always been a problem. There is no good way to handle it, so there is a third-party framework, such as joda. This article mainly explains the java date processing in detail. Joda can be used in 1.8. Time concept First, let's introduce some basic concepts, in which GMT and UTC can be expressed a ...

Posted by systemtek on Sat, 27 Nov 2021 21:17:34 -0800

LeetCode sword finger Offer II linked list (021-029)

021. Delete the penultimate node of the linked list Title: Given a linked list, delete the penultimate node of the linked list, and return the head node of the linked list. Example: Input: head = [1,2,3,4,5], n = 2 Output: [1,2,3,5] Idea: Fast and slow pointers: the slow pointer is the head node, the difference between the f ...

Posted by golfromeo on Sat, 27 Nov 2021 21:14:57 -0800

Linux three swordsmen: efficient data analysis

1. What is the Linux three swordsman First of all, we want to know what the Linux three swordsmen are? The first tool is grep, which performs pattern pattern in each file or matching line, that is, searches the content according to the regular expression and prints it out The second tool is awk, which is abbreviated by three authors (aho, Kern ...

Posted by Apollo_Ares on Sat, 27 Nov 2021 21:14:55 -0800

Python object protocol

Original text: https://www.cnblogs.com/JanSN/p/12540247.html Because Python is a dynamic language and the Concept of Duck Typing is all over it, the Concept does not take type constraints as the carrier, but uses a Concept called protocol. In Python   I need to call one of your methods, and you happen to have this method.For example, in st ...

Posted by Gish on Sat, 27 Nov 2021 21:02:43 -0800

How to use enumeration to eliminate if/else in Java

Today, I'm going to relearn enumeration types in Java. Why study again now? Because when I first started learning Java, I didn't pay much attention to enumeration. After work, I basically didn't use enumeration. As a result, I don't quite understand the data type of enumeration. Sometimes when I see the enumeration types and related operations ...

Posted by Agtronic on Sat, 27 Nov 2021 20:59:13 -0800

Linux 12 enterprise practice -- 12ubuntu deploying K8s cluster

0. Architecture diagram 1. Network and system settings 1.1 /etc/profile agent sudo vi /etc/profile Comment out the following agent configuration source /etc/profile 1.2 wget agent sudo vi /etc/wgetrc 1.3 clearing environment variables env | grep -i proxy unset HTTPS_PROXY unset HTTP_PROXY unset FTP_PROXY unset https_prox ...

Posted by chrispos on Sat, 27 Nov 2021 20:57:57 -0800