[data structure algorithm] - C language

The data structure algorithm implemented in C language is explained one by one below: (Swap function is a transposition function at the end, which can be understood) 1. Insert sorting As the name suggests, a value is inserted one by one from the front. When inserting, it is sorted once. If there are n numbers, it is sorted n times Th ...

Added by tomharding on Fri, 11 Feb 2022 20:18:56 +0200

Node --- 01 nodemon depends on thermal overload

Do Vue JS for a long time, subconsciously rely on thermal overload, ctrl+s save!! The page automatically presents the latest status!! It's great!! Lead to node JS, ctrl+s saves, and looks forward to waiting for the latest state. The result Hey, hey?? oh This is node JS, you need to enter a command "node [startup file]" can be recomp ...

Added by Coronet on Fri, 11 Feb 2022 20:17:17 +0200

Core content of MySQL execution plan

Core content of MySQL execution plan As we all know, mysql performs query optimization when executing queries. To put it simply, when executing, first generate an execution plan based on cost and rule optimization, and then execute the query according to the execution plan. This article mainly introduces the meaning of each output item of EXPL ...

Added by _OwNeD.YoU_ on Fri, 11 Feb 2022 20:16:21 +0200

Shutter | scroll component, ListView, GridVIew, etc

Scrollable componentWhen the component content exceeds the current display viewport, if there is no special treatment, the flyer will prompt the Overflow error. Therefore, the flyer provides a variety of scrollable components to display the list and long layout;Scrollable components directly or indirectly contain a scrollable component, so they ...

Added by devstudio on Fri, 11 Feb 2022 20:09:54 +0200

Section 4.4 of algorithm notes - preliminary algorithm - > greedy

A watch TV Title Description When the summer vacation comes, Xiao Ming can finally watch TV happily. But Xiao Ming likes too many programs. He hopes to see as many complete programs as possible. Now he gives you the broadcasting schedule of his favorite TV programs. Can you help him arrange it reasonably? input The input contains multip ...

Added by madwormer2 on Fri, 11 Feb 2022 20:09:40 +0200

. NET generates applet code, and generates QR code of promotion applet in combination with custom background image

preface: Everyone may be very familiar with small programs. With the continuous popularity of small programs, more and more companies begin to promote and use them. Today, I received a demand to generate a small program code, and combine the promotion pictures given by the operation to make a beautiful promotion QR code. Scanning the QR code ca ...

Added by shahansudu on Fri, 11 Feb 2022 19:48:09 +0200

String matching algorithm

Title: give you two strings, haystack and need. Please find the first position of the need string in the haystack string (the subscript starts from 0). If it does not exist, - 1 is returned. 0 is returned when {need} is an empty string. leetcode: https://leetcode-cn.com/problems/implement-strstr/   Premise of problem solution This question ...

Added by Stagnate on Fri, 11 Feb 2022 19:45:46 +0200

Multithreading and thread pool

catalogue thread ThreadPool 7 parameters of thread pool Blocking queue of thread pool Rejection policy of thread pool (RejectedExecutionHandler) Monitor the running status of thread pool Partial source code analysis thread Thread is the smallest unit for scheduling CPU resources. The thread model is divided into KLT model and ULT mo ...

Added by fastfingertips on Fri, 11 Feb 2022 19:41:57 +0200

Single machine and multiple machines are configured with https certificates, and the page format of https in the whole station (taking discuz as an example) is disordered

HTTPS Basic overview of HTTPS Why use HTTPS,because HTTP Unsafe when we use http The website will be hijacked and tampered with if used https Protocol, then the data is encrypted in the transmission process, so hackers can not steal or tamper with the data message information, but also avoid information leakage during website transmissio ...

Added by friendlylad on Fri, 11 Feb 2022 19:35:50 +0200

Car rental system, including UML diagram, friend overloaded operator function, derived class use, file use, object array use, and the difference between protected and private

Learning objectives: The program is to design a car rental system, which can realize the functions of car rental, canceling rental reservation, exiting the program and so on. File operation is required to store data. (this is my lesson plan. I plan to write him into a blog to consolidate my learning achievements) Required design: (1) Class des ...

Added by ravegti on Fri, 11 Feb 2022 19:33:46 +0200