[data structure algorithm] - C language
The data structure algorithm implemented in C language is explained one by one below:
(Swap function is a transposition function at the end, which can be understood)
1. Insert sorting
As the name suggests, a value is inserted one by one from the front. When inserting, it is sorted once. If there are n numbers, it is sorted n times
Th ...
Added by tomharding on Fri, 11 Feb 2022 20:18:56 +0200
Node --- 01 nodemon depends on thermal overload
Do Vue JS for a long time, subconsciously rely on thermal overload, ctrl+s save!! The page automatically presents the latest status!! It's great!!
Lead to node JS, ctrl+s saves, and looks forward to waiting for the latest state. The result Hey, hey?? oh This is node JS, you need to enter a command
"node [startup file]" can be recomp ...
Added by Coronet on Fri, 11 Feb 2022 20:17:17 +0200
Core content of MySQL execution plan
Core content of MySQL execution plan
As we all know, mysql performs query optimization when executing queries. To put it simply, when executing, first generate an execution plan based on cost and rule optimization, and then execute the query according to the execution plan. This article mainly introduces the meaning of each output item of EXPL ...
Added by _OwNeD.YoU_ on Fri, 11 Feb 2022 20:16:21 +0200
Shutter | scroll component, ListView, GridVIew, etc
Scrollable componentWhen the component content exceeds the current display viewport, if there is no special treatment, the flyer will prompt the Overflow error. Therefore, the flyer provides a variety of scrollable components to display the list and long layout;Scrollable components directly or indirectly contain a scrollable component, so they ...
Added by devstudio on Fri, 11 Feb 2022 20:09:54 +0200
Section 4.4 of algorithm notes - preliminary algorithm - > greedy
A watch TV
Title Description
When the summer vacation comes, Xiao Ming can finally watch TV happily. But Xiao Ming likes too many programs. He hopes to see as many complete programs as possible. Now he gives you the broadcasting schedule of his favorite TV programs. Can you help him arrange it reasonably?
input
The input contains multip ...
Added by madwormer2 on Fri, 11 Feb 2022 20:09:40 +0200
. NET generates applet code, and generates QR code of promotion applet in combination with custom background image
preface: Everyone may be very familiar with small programs. With the continuous popularity of small programs, more and more companies begin to promote and use them. Today, I received a demand to generate a small program code, and combine the promotion pictures given by the operation to make a beautiful promotion QR code. Scanning the QR code ca ...
Added by shahansudu on Fri, 11 Feb 2022 19:48:09 +0200
String matching algorithm
Title: give you two strings, haystack and need. Please find the first position of the need string in the haystack string (the subscript starts from 0). If it does not exist, - 1 is returned. 0 is returned when {need} is an empty string.
leetcode: https://leetcode-cn.com/problems/implement-strstr/
Premise of problem solution
This question ...
Added by Stagnate on Fri, 11 Feb 2022 19:45:46 +0200
Multithreading and thread pool
catalogue
thread
ThreadPool
7 parameters of thread pool
Blocking queue of thread pool
Rejection policy of thread pool (RejectedExecutionHandler)
Monitor the running status of thread pool
Partial source code analysis
thread
Thread is the smallest unit for scheduling CPU resources. The thread model is divided into KLT model and ULT mo ...
Added by fastfingertips on Fri, 11 Feb 2022 19:41:57 +0200
Single machine and multiple machines are configured with https certificates, and the page format of https in the whole station (taking discuz as an example) is disordered
HTTPS
Basic overview of HTTPS
Why use HTTPS,because HTTP Unsafe when we use http The website will be hijacked and tampered with if used https Protocol, then the data is encrypted in the transmission process, so hackers can not steal or tamper with the data message information, but also avoid information leakage during website transmissio ...
Added by friendlylad on Fri, 11 Feb 2022 19:35:50 +0200
Car rental system, including UML diagram, friend overloaded operator function, derived class use, file use, object array use, and the difference between protected and private
Learning objectives:
The program is to design a car rental system, which can realize the functions of car rental, canceling rental reservation, exiting the program and so on. File operation is required to store data. (this is my lesson plan. I plan to write him into a blog to consolidate my learning achievements) Required design: (1) Class des ...
Added by ravegti on Fri, 11 Feb 2022 19:33:46 +0200