Tag:key

  • Who is playing Chrysanthemum Stage in Python

    Time:2021-10-24

    You must be crazy at home. My current state is as follows: But I don’t want to be so depressed. I want to do something elegant. It’s really nice to see someone in my circle of friends playing chrysanthemum platform on the mobile app. So I began to get excited, quickly downloaded the app and […]

  • day 3 of learning vue

    Time:2021-10-19

    Key modifier You can use the global config.keycodes objectCustom key modifier alias Auto match key modifier You can also directlyKeyboardEvent.keyAny valid key name exposed is converted to kebab case as a modifier: <input @keyup.page-down=”onPageDown”> In the above example, the handler function is only called when $event. Key = = ‘pagedown’. System modifier .ctrl .alt .shift […]

  • Setting method of secure CRT key login Linux SSH

    Time:2021-10-17

    1、 First create the key with SecureCRT 1. Use SecureCRT to create private key and public key   SecureCRT quick Connect-> Authentiation -> Public Key -> Properties ->Create Identity File -> DSA/RSA -> Set Passphrase -> Done At this time, two files will be generated in the specified directory, for example, the private key my_ RSA […]

  • 10.2 how to run Android project to Android studio built-in simulator

    Time:2021-9-23

    Android development can generally run applications to the simulator to check the effect, unless the real machine is used for special projects, so let’s first explain how to run the project to the simulator to verify whether there are problems in our development environment and the created project. Create simulator Click “create new virtual device” […]

  • Explain the key uniqueness of V-for in Vue

    Time:2021-9-17

    catalogue 1. DOM Diff 2. Add the key attribute for elements of the same type in the same layer 3. Key cannot be index subscript value 1. DOM Diff To truly understand the significance of the key attribute, we really need to start with DOM diff. we don’t need to deeply understand the principle of […]

  • The redis pessimistic lock is used to solve the secondary write of data under high parallel transmission

    Time:2021-9-14

    Pessimistic lock In the case of pessimistic locking, in order to ensure the isolation of transactions, it is necessary to lock reads consistently.Lock the data when reading, and other transactions cannot change the data.When changing or deleting data, it should also be locked. Other transactions cannot read these data. In data caching, the data is […]

  • Electron menu and shortcut keys

    Time:2021-8-29

    Although we usually use desktop software with the mouse in most cases, some software provides menus and keyboard shortcuts for operation, which are common on MAC systems. If there is a corresponding shortcut key operation or menu when using the software, it will make the user’s use experience more smooth and convenient. This chapter mainly […]

  • Vue Basics (III): template syntax (II)

    Time:2021-8-28

    1. Event binding 1.1 basic use of v-on Vue binds events through the instruction v-on, such as the most commonly used click method: v-on: click. We can also abbreviate it as @ click; Let’s take a simple example: Basic use of Vue {{num}} click click1 click2 click3 var vm = new Vue({ el: ‘#app’, data: […]

  • Written by sublime snippet

    Time:2021-8-26

    <snippet> <content><![CDATA[ Hello, ${1:wuwuuwuwuwuwuuwu} is a ${2}. ]]></content> <!– Optional: Set a tabTrigger to define how to trigger the snippet –> <!– <tabTrigger>hello</tabTrigger> –> <tabTrigger>hello</tabTrigger> <!– Optional: Set a scope to limit where the snippet will trigger –> <!– <scope>source.python</scope> –> <scope>text.html</scope> <description>Hellossssssssssssssssssssssssssssssssssssssss My test.</description> </snippet> Snippet means fragment, that is, the concept of intelligent […]

  • C / C + + Programming Notes: those unknown “malicious code” (I) remember to use it carefully

    Time:2021-8-15

    The classification of malicious code includes computer viruses, worms, Trojans, backdoors, rootkits, rogue software, spyware, adware, bots, exploit, etc. some technologies are often used and some are inevitable. The common functions and technologies of malicious code are as follows: process traversal, file traversal, key recording, back door, desktop screenshot, file monitoring, self deletion, U disk […]

  • Android key monitoring and keyboard event flow (deletion key cannot be monitored)

    Time:2021-8-14

    Android key monitoring and keyboard event flow (deletion key cannot be monitored) Recently, when doing a password key input function, we need to process each key, so we used itOnKeyListenerInterface listening. You can listen to input key events in normal text format, but once the input type of EditText is modified to numberpassword (Android: inputtype […]

  • 100 lines of Python code to realize Snake game

    Time:2021-8-9

    I believe the post-80s and post-90s must have played the snake game when they were young. Do you know if it is implemented through Python? Xiao Qian will teach you today. First, let’s see the final presentation effect: Basic preparation First, we need to install the pyGame library. Xiaobian will install pyGame through PIP install […]