Recently, a lot of txt files need to be converted into csv file format in the project. In the past, excel files were opened manually and then imported into txt to produce csv files. As this has become a weekly need, we decided to use python automation script to achieve this idea:
Read all txt files in the folder and save them in the list
Posted by gmann001 on Sun, 13 Oct 2019 12:40:55 -0700
Assignment: Return the name of the student who scored the highest mark for each course.
Return the names of the students for each course and for the highest score
Posted by nephish on Sun, 13 Oct 2019 10:23:26 -0700
Installation of YouCompleteMe tutorial in vim under Ubuntu 16.4
YouCompleteMe Is the vim code prompt plug-in
1 First check the vim version
As shown below
VIM - Vi IMproved 7.4 (2013 Aug 10, compiled Nov 24 2016 16:44:48)
Included patches: 1-1689
Extra patches: 8.0.0056
Modified by firstname.lastname@example.org
Posted by john0117 on Sat, 12 Oct 2019 14:19:59 -0700
python day 9
1. xml module
1.1 First Understanding xml
1.2 Traversing specified nodes of xml documents
1.3 Manual creation of xml documents through python
1.4 Two Ways to Create Nodes
2. configparser module
4. shutil module
5. subprocess m ...
Posted by lakilevi on Sat, 12 Oct 2019 08:22:23 -0700
python day 8
1. re module supplement
2. import module import
3. os module
4. hashlib module
5. String format: percentile and format methods
6. Modular Knowledge Collection
7. Initial knowledge of requests module
python day 8
Data from the ...
Posted by Kerry Kobashi on Fri, 11 Oct 2019 12:24:23 -0700
Links to the original text: https://www.jianshu.com/writer#/notebooks/28758830/notes/51826042/preview
django implements automatic name modification after uploading files (pictures) and various reminders when uploading pictures on pages:
1. F ...
Posted by tom_b on Fri, 11 Oct 2019 07:37:09 -0700
What is CSRF?
Cross Site Request Forgery (Cross Site Request Forgery) is a network attack. It was listed as one of the 20 major security risks of the Internet in 2007. It is also known as "One Click Attack" or Session Riding. It is usually abbreviated as CSRF or XSRF. It is a malicious use of the website, which is known as phishing w ...
Posted by phpnow on Thu, 10 Oct 2019 23:48:03 -0700
T many times, but also want to use mutimap violence to decompose the prime factor of each number. Later, the minimum prime factor for each number was recorded.
using namespace std;
typedef long long ll;
int n, m, MOD;
const int SIZE = 1e6, SIZEP = 8e4;
int p2[SIZE + 5], p5[SIZE + 5];
Posted by elkidogz on Thu, 10 Oct 2019 11:03:27 -0700
Verification code has been a very common anti-cheating and anti-attack means, in fact, it is not difficult for people with good technical level to achieve this function, but not everyone, every language is naturally suitable for a function... But we can shield differentiation by encapsulating interfaces, simplify the problem, and now use a simp ...
Posted by eddy556 on Thu, 10 Oct 2019 07:48:40 -0700
Today, I learned the following aspects, although some of them are not comprehensible, I followed the teacher to write the code.
List, tuple operation
Character Coding and Transcoding
Please close your eyes and write the following program.
Posted by buildernaut1 on Thu, 10 Oct 2019 06:48:32 -0700