Tutorial by Examples: n

For a class Person like: public class Person { public string Name { get; set; } public int Age { get; set; } public string Clothes { get; set; } } var person1 = new Person { Name = "Jon", Age = 20, Clothes = "some clothes" }; var person2 = new Person { Name ...
For given type Person: public class Person { public string Name { get; set; } public int Age { get; set; } public string Clothes { get; set; } } List<Person> persons = new List<Person> { new Person{ Name = "Jon", Age = 20, Clothes = "some clothes...
There are two basic classes of exact numeric data types - Integer, and Fixed Precision and Scale. Integer Data Types bit tinyint smallint int bigint Integers are numeric values that never contain a fractional portion, and always use a fixed amount of storage. The range and storage sizes o...
float [(n)] real These data types are used to store floating point numbers. Since these types are intended to hold approximate numeric values only, these should not be used in cases where any rounding error is unacceptable. However, if you need to handle very large numbers, or numbers with an ...
These types are in all versions of SQL Server datetime smalldatetime These types are in all versions of SQL Server after SQL Server 2012 date datetimeoffset datetime2 time
binary varbinary image
This example shows how to render text along an arc. It includes how you can add functionality to the CanvasRenderingContext2D by extending its prototype. This examples is derived from the stackoverflow answer Circular Text. Example rendering Example code The example adds 3 new text renderi...
All modern JavaScript JIT compilers trying to optimize code based on expected object structures. Some tip from mdn. Fortunately, the objects and properties are often "predictable", and in such cases their underlying structure can also be predictable. JITs can rely on this to make pred...
You can use built-in functions to run PHP processes as forks. This is the most simple way to achieve parallel work if you don't need your threads to talk to each other. This allows you to put time intensive tasks (like uploading a file to another server or sending an email) to another thread so you...
1 Tag Name Represents a tag name available in the DOM. For example $('p') selects all paragraphs <p> in the document. 2 Tag ID Represents a tag available with the given ID in the DOM. For example $('#some-id') selects the single element in the document that has an ID of some-id. 3 ...
One of the most common operations in erlang is pattern matching. It is used when assigning a value to a variable, in function declarations and in control-flow structures like case and receive statements. A pattern matching operation needs at least 2 parts: a pattern, and a term against wich the patt...
static_cast can convert from an integer or floating point type to an enumeration type (whether scoped or unscoped), and vice versa. It can also convert between enumeration types. The conversion from an unscoped enumeration type to an arithmetic type is an implicit conversion; it is possible, but ...
A pointer to member of derived class can be converted to a pointer to member of base class using static_cast. The types pointed to must match. If the operand is a null pointer to member value, the result is also a null pointer to member value. Otherwise, the conversion is only valid if the member ...
Generally execute() command is used for fire and forget calls (without need of analyzing the result) and submit() command is used for analyzing the result of Future object. We should be aware of key difference of Exception Handling mechanisms between these two commands. Exceptions from submit() ar...
C++14 C++14 introduced a standard way of deprecating functions via attributes. [[deprecated]] can be used to indicate that a function is deprecated. [[deprecated("reason")]] allows adding a specific reason which can be shown by the compiler. void function(std::unique_ptr<A> &&a...
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the website trusts. Learn more To enable CSRF protection, add the CsrfViewMid...
Creates a path from a set of points [{x:?,y:?},{x:?,y:?},...,{x:?,y:?}] with rounded corners of radius. If the corner angle is too small to fit the radius or the distance between corners does not allow room the corners radius is reduced to a best fit. Usage Example var triangle = [ { x: 200...
Detailed instructions on getting kettle set up or installed.

Page 595 of 1088