Tutorial by Examples: ha

FOR /F In a FOR /F statement, some characters needs escaping, here a list(taken and edited from Rob van der Woude's page) CharacterEscaped ResultRemarks'^'Only needed in FOR /F's brackets, unless usebackq is specified.`^`Only needed in FOR /F's brackets, when usebackq is specified,^,┒;^;┃=^=┣ Must...
Here is a list of other special character(s), that require(s)/may need escaping, but not mentioned above. CharacterEscaped ResultRemarks%%%[LF]^[LF]This trick is metioned by Mark Stang in the alt.msdos.batch news group.
each and eachWithIndex are methods to iterate over collections. each have it(default iterator) and eachWithIndex have it,index(default iterator, default index). We can also change the default iterator/index. Please see below examples. def list = [1,2,5,7] list.each{ println it } list.ea...
Vim saves all your unsaved edits in a swap file, an extra file that gets deleted once the changes are committed by saving. The name of the swap file is usually the name of the file being edited preceded by a . and with a .swp suffix (you can see it with :sw). So in case your vim process terminates ...
import java.util.*; public class HashtableDemo { public static void main(String args[]) { // create and populate hash table Hashtable<Integer, String> map = new Hashtable<Integer, String>(); map.put(101,"C Language"); map.put(102, &quot...
If you don't think that malicious scripts can harm your site, you are wrong. Here is a list of what a malicious script could do: Remove itself from the DOM so that it can't be traced Steal users' session cookies and enable the script author to log in as and impersonate them Show a fake "Yo...
Ensure you met all requirements, as per Requirements Mount the temporary API filesystems: cd /location/of/new/root mount -t proc proc proc/ mount --rbind /sys sys/ mount --rbind /dev dev/ mount --rbind /run run/ (optionally) If you need to use an internet connection in the c...
When a notebook .Rmd is saved, an .nb.html file is created alongside it. This file is a self-contained HTML file which contains both a rendered copy of the notebook with all current chunk outputs (suitable for display on a website) and a copy of the notebook .Rmd itself. More info can be found at R...
A Django model typically refers to a table in the database, attributes of that model becomes the column of that table. In more of a real-world example, you would create a model for any entity in your application, and store its attributes with django fields which automatically handles data-types conv...
When you use python file as module there is no need always check if package is installed but it is still useful for scripts. if __name__ == '__main__': try: import requests except ImportError: print("To use this module you need 'requests' module") t ...
In this Stack Overflow question, user txtechhelp found an issue with the ^ character which could cause a security issue. Cause anyInvaildCommand ^ Note: Make sure the caret(^) is the last character! Any extra CR\LF won't work at all! The caret looks for the next character to escape. However,...
Require is a statement that Node interprets as, in some sense, a getter function. For example, say you have a file named analysis.js, and the inside of your file looks like this, function analyzeWeather(weather_data) { console.log('Weather information for ' + weather_data.time + ': '); consol...
Node's require is also very helpful when used in tandem with an NPM package. Say, for example, you would like to use the NPM package require in a file named getWeather.js. After NPM installing your package through your command line (git install request), you are ready to use it. Your getWeather.js f...
.* in regex basically means "catch everything until the end of input". So, for simple strings, like hello world, .* works perfectly. But if you have a string representing, for example, lines in a file, these lines would be separated by a line separator, such as \n (newline) on Unix-like s...
Key Points:- Implementation of Map. stores only weak references to its keys. Weak References : The objects that are referenced only by weak references are garbage collected eagerly; the GC won’t wait until it needs memory in that case. Diffrence between Hashmap and WeakHashMap:- If the Jav...
Key Points:- Is Hash table and Linked list implementation of the Map interface, with predictable iteration order. inherits HashMap class and implements the Map interface. contains values based on the key. only unique elements. may have one null key and multiple null values. ...
You can read all items either from any config file or type it inline. Considering if its saved in Config File // Read all list items from config file string[] countryDV = ConfigurationManager.AppSettings["countryDV"].Split(',').Select(s => s.Trim().ToUpper()).ToArray(); int DVRowLim...
Approach in this case will be different than previous example because Excel file supports the Data validation for list of items with total character count less than 256 if all items are binded directly as in previous example. But in many situation list items can be longer than 256 characters and in ...
This example will show you back navigation which is expected generally in most of the flows. You will have to add following code to every screen depending on expected behavior. There are 2 cases: If there are more than 1 screen on stack, device back button will show previous screen. If there is ...
Say you're introducing a class of types that have a size in bytes. class SizeOf a where sizeOf :: a -> Int The problem is that the size should be constant for every value of that type. We don't actually want the sizeOf function to depend on a, but only on it's type. Without type applica...

Page 97 of 99