Tutorial by Examples: d

GCobol >>SOURCE FORMAT IS FIXED *> *************************************************************** *> Purpose: RELATIVE file organization REWRITE example *> Tectonics: cobc -g -debug -W -x relatives.cob *> *********************************************...
GCobol* GnuCOBOL SORT verb example using standard in and standard out identification division. program-id. sorting. environment division. input-output section. file-control. select sort-in assign keyboard organizat...
When used in an expression out << setprecision(n) or in >> setprecision(n), sets the precision parameter of the stream out or in to exactly n. Parameter of this function is integer, which is new value for precision. Example: #include <iostream> #include <iomanip> #include...
When used in an expression out << setfill(c) sets the fill character of the stream out to c. Note: The current fill character may be obtained with std::ostream::fill. Example: #include <iostream> #include <iomanip> int main() { std::cout << "default fill: &quo...
When used in an expression out << setiosflags(mask) or in >> setiosflags(mask), sets all format flags of the stream out or in as specified by the mask. List of all std::ios_base::fmtflags : dec - use decimal base for integer I/O oct - use octal base for integer I/O hex - use hexade...
Installation: In order to use DataProviders, you need junit-dataprovider .jar : Github Direct download Hamcrest-core-1.3.jar : Github Direct download And add both of this .jar to your project. Usage: Add this import to your code: import com.tngtech.java.junit.dataprovider.DataProvider; im...
In ruby you can add methods to existing instances of any class. This allows you to add behavior to and instance of a class without changing the behavior of the rest of the instances of that class. class Example def method1(foo) puts foo end end #defines method2 on object exp exp = E...
Its easy to get lost while debugging the hiearchy. You can use PHP's built in command debug_backtrace. Put the next snippet inside any template you want to debug and view the generated page: <!-- <?php print_r( debug_backtrace() ) ?> -->
Flower is a web based tool to monitor Celery. To install Flower, we can use pip as follows: pip install flower To run Flower for proj: celery -A proj flower Now, flower is accessible in: http://localhost:5555
There are two options to render components on server: renderToString and renderToStaticMarkup. renderToString This will render React components to HTML on server. This function will also add data-react- properties to HTML elements so React on client won't have to render elements again. import { r...
This document explains how to display your GitHub feeds/timeline on your website. Example: A live example is available at: https://newtonjoshua.com GitHub timeline: GitHub provides the public timeline for any user in Atom format. You can view your timeline at: https://github.com/{{GitHub...
# install react and react-dom $ npm i react react-dom --save # install webpack for bundling $ npm i webpack -g # install babel for module loading, bundling and transpiling $ npm i babel-core babel-loader --save # install babel presets for react and es6 $ npm i babel-preset-react babel-p...
Using webpack, you can bundle your component: $ webpack This will create our output file in build directory. Open the HTML page in a browser to see component in action
Convert the interface of a class into another interface clients expect. Adapter (or Wrapper) lets classes work together that couldn't otherwise because of incompatible interfaces. Adapter pattern's motivation is that we can reuse existing software if we can modify the interface. Adapter pattern...
This source code create a simple key/value store service based on map Erlang datastructure. Firstly, we need to define all information concerning our gen_server: -module(cache). -behaviour(gen_server). % our API -export([start_link/0]). -export([get/1, put/2, state/0, delete/1, stop/0]). %...
Cryptography is the science of using mathematical constructs (codes) to make communication secure. The field of cryptography is a subset of the field of Information Security. There are many cryptographic operations possible; some best known examples are: Encryption : transforming a plaintext mes...
It is common practice to create groups of items by creating simple value nodes with item ID as key. For example, we can add a user to the group "administrators" by creating a node at /administrators/$user_id with a value true. We don't want anyone to know who administrators are, for securi...
function downloadCsv() { var blob = new Blob([csvString]); if (window.navigator.msSaveOrOpenBlob){ window.navigator.msSaveBlob(blob, "filename.csv"); } else { var a = window.document.createElement("a"); a.href = window.URL.createObjectURL(blob, { ...
Create a new ASP.Net Project: Select the empty template: Add two new folders: App and Scripts in the root folder: Add npm configuration file in the root folder: { "version": "1.0.0", "name": "phaser.js.environment.setup", "priva...

Page 510 of 691