QA Official

8, Sword Finger offer's Abnormal Step Jump Problem, Topic Analysis and java Implementation Method 2019-05-09
topic description A frog can jump up to 1 step or 2 steps at a time ... It can also jump up to N steps.Find out how many jumping methods the frog can use to jump up an n-step. requirements Time Limit: 1 Second Space Limit: 32768K topic analysis The premise is that n steps will have an n-order jump method.The analysis is as follows: f(1) = 1F(2) = f(2-1)+f(2-2) //f(2-2) represents the number of times that the 2nd order jumps the 2nd order at a time.

Ajax POST request 2019-05-09
POST requests are mainly used to submit information, and the requested data will be placed in the body of HTTP request package.Therefore, the security of POST request is higher than GET request. The security here means that information is not easy to be intercepted by others. Of course, from another aspect, POST request can modify server resources. If scripts are embedded in the request, there is also a risk that

BN layer 2019-05-09 layer {bottom: "res2a_branch2b"top: "res2a_branch2b"name: "bn2a_branch2b"type: "BatchNorm"batch_norm_param {use_global_stats: true} } layer {bottom: "res2a_branch2b"top: "res2a_branch2b"name: "scale2a_branch2b"type: "Scale"scale_param {bias_term: true} }

C++tolower function usage summary 2019-05-09
c++ has a function tolower.This function is a function that processes strings.Converts uppercase to lowercase. Upcase refers to ABCDEFGHIJKLMNOPQRSTUVMXYZ converted to abcdefghijklmnopqrstuvwxyz.Non-alphabetic characters are not processed.For example, 1, 2, 3!Equal characters are header files that are output in the original characters: in VC6.0, they can be ctype.h or stdlib.hOf course, this function is a bit special in its usage. It deals with characters, not strings.The so-called inability to process strings does not mean that he cannot process strings.

Cat VS Dog (binary match) 2019-05-09
The zoo have N cats and M dogs, today there are P children visiting the zoo, each child has a like-animal and a dislike-animal, if the child's like-animal is a cat, then his/hers dislike-animal must be a dog, and vice versa. Now the zoo administrator is removing some animals, if one child's like-animal is not removed and his/hers dislike-animal is removed, he/she will be happy. So the administrator wants to know which animals he should remove to make maximum number of happy children.

JQuery Ajax Post Submitting Solution to Chinese Scrambling Code 2019-05-09
Introduction: In JQuery's Ajax POST request, the request is made, and the Chinese in the request is displayed as garbled code in the background. How should it be solved? problem introduction: var regid = $('#oregion').combobox('getValue'); //var sname = $('#sname').val(); var sname = encodeURI($('#sname').val(),"UTF-8"); if(regid!=""&&regid!='undefined'){ $.ajax({ async: true, type : "POST", dataType : "json", url : "<%=request.getContextPath() %>/secretary/"+regid+"&sname="+sname, success : function(data) { if(data.mes!=""&&data.mes!=null){ $.messager.alert('Warning',data.mes); return false; } } });

JSP Shows Current System Time in Four Ways 2019-05-09
JSP shows the current system time in four ways: The first java built-in time class instantiated object: <%@ page language="java" import="java.util.*" pageEncoding="UTF-8"%> <% String path = request.getContextPath(); String basePath = request.getScheme()+"://"+request.getServerName()+":"+request.getServerPort()+path+"/"; %> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <base href="<%=basePath%>"> <title>My JSP 'time4.jsp' starting page</title> <meta http-equiv="pragma" content="no-cache"> <meta http-equiv="cache-control" content="no-cache"> <meta http-equiv="expires" content="0"> <meta http-equiv="keywords" content="keyword1,keyword2,keyword3"> <meta http-equiv="description" content="This is my page"> <!-- <link rel="stylesheet" type="text/css"

Spark&amp;#x27;s Action operation 2019-05-09
1.reduce(func): through the function func, the data sets of each partition are gathered first, and then the data between partitions are gathered. func receives two parameters and returns a new value. the new value is then passed to the function func as a parameter until the last element 2.collect (): returns all elements in the data set to the Driver program in the form of data. in order to prevent memory overflow of the Driver program, the size of the returned data set is generally controlled

YII2 registration (using ajax&amp;#x27;s post submission method) 2019-05-09
Test the login method without official registration. csrf is turned off by default. Front End, ajax Submission: function register(){ var params; var mName; var mPassword; mName = $.trim($("#user").val()); mPassword = $.trim($("#password").val()); if(!mName || !mPassword) { Alert (' Please Enter Full Information!'); return false; } params = { "account": mName, "password": mPassword } var url = '<?php echo $this->context->createUrl('test/register-by-account')?>'; newajaxnoloadJson(url, params, function(res) { if(res.code == 200) { Alert (" registration successful!

c# Intercept Array 2019-05-09
The following implementation is that c# intercepts the data from the third bit to the eighth bit in array A. void Main() { byte[] a = new byte[] { 12, 32, 34, 43, 21, 23, 45, 56, 67, 78, 89, 96, 54, 32, 23, 45, 23 }; byte[] newA= a.Skip(2).Take(5).ToArray(); foreach (var b in newA) bracket Console.WriteLine(b); bracket bracket