Video learning notes of "basic data types in binary and Java" on muke.com

Video address: https://www.imooc.com/video/21195 Introduction: as we all know, computers are stored in binary. Learning binary well can help us understand how to deal with data and how to store data types in Java. This course will start from the history of binary system to explain binary related knowledge, such as digit value system countin ...

Posted on Sun, 24 May 2020 05:46:35 -0400 by hmiller73

Java extracting numbers from strings

In Java, if you enter a string of numbers separated by other non numeric characters, but want to extract the numbers, there are many solutions on the Internet. Here is a brief summary of these methods and their corresponding situations, and put forward your own solutions: 1. Multiple single numbers separated by indeterminate characters This met ...

Posted on Fri, 15 May 2020 00:41:37 -0400 by anthrt

Micro-service calls up the payment record of the WeChat applet

Micro-service calls up the payment record of the WeChat applet Application Applet Applet Registration Address Applicant Business Number Registered Business Number Address View Applet Payment Document Document Address Be sure to read the document carefully and completely Set Get Applet/Business Number parameter Applet parameters ...

Posted on Mon, 11 May 2020 23:03:32 -0400 by gortron

Spring Security has its own firewall!You don't know how secure your system is!

Previously, a small partner said that it would be better to write a Filter intercept request for Spring Security, which is so troublesome. Writing on your own is certainly possible, but in most cases, everyone is not a professional Web security engineer, so the problem is just certification and authorization. Once these two issues are addressed ...

Posted on Mon, 11 May 2020 22:05:33 -0400 by madrazel

Be careful with ToLower and ToUpper. Be careful to drag your system down

I don't know when to start. Many programmers like to use ToLower and ToUpper to realize string equality comparison that ignores case mode. It's possible that this habit is introduced from other languages. It's JS bold to guess. In order not to cause controversy, I mean JS is the meaning of technician~ 1: Background 1. Story telling In our orde ...

Posted on Tue, 05 May 2020 02:36:40 -0400 by swr

1507: [NOI2003]Editor (block list)

1507: [NOI2003]Editor Time Limit: 5 Sec  Memory Limit: 162 MBSubmit: 4157  Solved: 1677[Submit][Status][Discuss] Description Input The first line of the input file editor.in is the number of instructions t. the following are the t operations to be performed. Where: in order to make the input file easy to read, some carriage r ...

Posted on Sun, 03 May 2020 19:25:00 -0400 by egg82

Play audio data stream with DirectX

Play audio data stream with DirectX Use directX plug-in to play audio data stream Now do a test project, first of all, input the sine wave (cw wave) generated by the signal generator to the speech encoder for coding, and then talk about decoding the encoded data with the decoding algorithm, the decoded output data stream is cw wave. The main ...

Posted on Sun, 03 May 2020 08:30:19 -0400 by jtmathome

Java system class String common methods and method use details

character string String is a constant,String is also called constant string //All operations on strings return a new string (that is, the original string cannot be changed) // String exists in constant pool // The string itself does not change, but the reference address changes, which is equivalent t ...

Posted on Sat, 02 May 2020 10:39:15 -0400 by Charles Wong

Blue Bridge Cup - high precision addition

package jiChu; import java.util.Scanner; /** * Problem description * Input two integers a and b, and output the sum of the two integers. Neither a nor b is more than 100. * Algorithm description * Because both a and b are large, they cannot be stored directly using the standard data types in the language. For this kind of problem, we usua ...

Posted on Sat, 02 May 2020 10:33:12 -0400 by Horizon88

Detach linked hash

hash Hashing is a technique used to perform inserts, deletions, and lookups at a constant average time. The general implementation method is to make it possible to calculate the position of the data in the hash through the data keyword, similar to the dictionary in Python. The following issues need to be addressed with respect to hashing: How ...

Posted on Sat, 02 May 2020 09:04:19 -0400 by lotrfan