Mysql測試題

1 Which Linux MySQL server installation directories are the base directories? (Choose two)?
/usr/sbin
/var/lib/mysql ??
/var/log
/usr/bin
/etc ? ?


2 What does the RPM installation process for MySQL do? (Choose two)
It creates the default my.cnf file
It sets up the mysql user and group in the operating system
It creates the default root@localhost account
It provides a temporary password for the root account
It registers system startup scripts for MySQL services

3 What is the purpose of the mysql_config_editor utility? (Choose two)
It reads and replays the contents of binary log files.
It creates TLS keys and certificates.
It reads and summarizes the contents of MySQL slow query log files.
It enables users to store authentication credentials in the .mylogin.cnf file.?

4 Which storage engine supports INSERT and SELECT but not DELETE, REPLACE, or UPDATE commands?
ARCHIVE ? ??
MyISAM
BLACKHOLE?
MEMORY


5 Which features are supported by InnoDB? (Choose two)
Hash indexes
Clustered indexes
B-tree indexes
Cluster database support
T-tree indexes


6 Which are true about the MyISAM storage engine? (Choose three)?
It supports table-level locking?
It supports all data types except spatial data types
It supports FULLTEXT indexes
It supports spatial data types and indexes?
It supports storing row data and indexes in memory


7 Which system variables have both global and session scope in MySQL? (Choose two)
sort_buffer_size ?
error_count
max_join_size ?
innodb_buffer_pool_size
max_connections


8 Examine this command which executes successfully: SET PERSIST max_connections=99; Which command displays the content of the file that includes this parameter change?
cat /labs/slap-test-updates.sh
mysql> \! cat /var/lib/mysql/mysqld-auto.cnf | python -m json.tool
mysql> \! cat /var/lib/mysql/slow-query.log
cat /labs/multi.cnf


9 You changed the maximum number of connections in MySQL. In the variable_info table, the max_connections system variable displays a VARIABLE_SOURCE of DYNAMIC. What does it mean?
The max_connections system variable was set from the my.cnf file.
The max_connections system variable has not been configured in any startup file.
The max_connections system variable was changed at runtime.?
The max_connections system variable was set from a server-specific mysqld-auto.cnf option file.

10 Examine this command and results: SET GLOBAL port = 3303; ERROR 1238 (HY000): Variable “port” is a read only variable. How would you resolve this error? (Choose two)
Change the port option to dynamic in the my.cnf file.
Change the port option to dynamic at the command line.
Change the default port number in the my.cnf file.
Change the port number in the mysql-auto.cnf file.
Change the modifier from GLOBAL to SESSION in the command.

11 Which command displays collected server metrics stored in the performance schema? ? ?服務器指標(metrics)
SELECT * FROM setup_objects LIMIT 5\G;
SELECT * FROM setup_actors LIMIT 5\G;
SELECT * FROM setup_consumers LIMIT 5\G;
SELECT * FROM setup_instruments LIMIT 5\G;?

12 What can be configured by modifying the Performance Schema setup_actors table?
stored procedures that are monitored
server metrics that are collected
foreground threads that are monitored
thread classes that are instrumented

13 Examine this output: | HOST | USER | ROLE | ENABLED | HISTORY | | % | % | % | YES | YES | 1 row in set (#.## sec) Which command produces this?
SELECT * FROM setup_objects LIMIT 5\G;
SELECT * FROM setup_consumers LIMIT 5\G;
SELECT * FROM setup_actors LIMIT 5\G;
SELECT * FROM setup_instruments LIMIT 5\G;


14 Why is the General Query Log used in MySQL? (Choose two)
To record statements where execution time exceeds a specified threshold
To record the time and type of each connection and the process ID of all operations ??
To discover queries with excessive execution time.
To include update operations stored as row-based binary logs on slave servers
To record all statements executed against all tables ?


15 Which Performance Schema instruments have no subcomponents? (Choose three)?
stage?
transaction?
statement?
error ?
memory?
idle ?


16 How does a Performance Schema provide insight into database activity? (Choose three)?
By analyzing errors that occur on the system
By analyzing I/O wait statistics?
By analyzing historical performance data ?
By interpreting the Performance Schema to DBAs for diagnostic use cases
By analyzing the audit record of server activity in log files
By analyzing which queries are running?

17 Which MySQL logs can be stored in tables? (Choose two)
Audit log
General query log ? ?
Slow query log ? ??
Binary log
Error log

18 You plan to use the test authentication plug-in test_plugin_server. Which statements are true? (Choose two)
It sends a plain text password to the server.
It authenticates against operating system users and groups.
It only allows MySQL users to log in via a UNIX socket.
It is intended for use during testing and development.
It implements native and old password authentication.

19 Which command activates roles at the session level?
SET PERSIST activate_all_roles_on_login = ON;
SET DEFAULT ROLE ALL TO kari@localhost;
ALTER USER kari@localhost DEFAULT ROLE ALL;
SET ROLE ALL;?

20 Which command removes DDL privileges from a role?
REVOKE DELETE, INSERT, UPDATE ON world.* FROM r_dev;
REVOKE CREATE, DROP ON world.* FROM r_dev; ? ? ?
REVOKE GRANT OPTION ON world.* FROM r_dev
REVOKE r_updater FROM r_dev;

21 The -ssl-mode option in your configuration is VERIFY_CA. What does this do?(Choose two)
It establishes secure connections or fails if unable to do so. ? ?建立安全連接或失敗(無法建立則連接失敗)
It checks whether host names match the Common Name value in the server certificate.
It verifies that server digital certificates match the MySQL server hosts.
It establishes secure connections if it can but if not then unsecure connections are eastablished.
It verifies server digital certificates with the Certificate Authority. ? ?驗證服務器證書是否由可信的 CA 簽發


22 After firewall training is complete, which modes will make the statement digest persistent in the account’s whitelist cache? (Choose two)?
RECORDING?
RESET?
PROTECTING?
DETECTING ?
OFF


23 Which statements are true about Brute Force attacks? (Choose two)
They compare password hashes against the stored hashes in the MySQL database.
They match target password hashes against rainbow tables.
They are slow as they require lots of CPU. ? ?
They perform hashing operations on the characters to find matching hashes.
They perform hashing operations on combinations of dictionary words and characters.

24 Examine this command and output: SHOW STATUS LIKE 'Connection_control%'; | Variable_name | Value | | Connection_control_delay_generated | 7 | 1 row in set (#.## sec) Which is true?
A seven millisecond delay is added for each consecutive connection failure.
The maximum possilbe added delay is seven milliseconds.
MySQL server added a delay for failed connection attempts seven times.?
Seven successive failures are permitted before adding a delay.

25 Which command registers the appuser@apphost account for firewall training?
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'PROTECTING')
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'OFF')
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'RECORDING') ? ??
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'RESET')

26 You observe poor system performance. Which commands will display currently executing queries? (Choose two)
SELECT * FROM sys.session\G ? ??
SHOW MASTER STATUS\G
SHOW GLOBAL STATUS\G
SHOW PROCESSLIST\G ? ?
SELECT * FROM performance_schema.session_status;

27 Examine this statement which executes successfully: "#mysqladmin –uroot –p kill 14" What does 14 represent in the output?
blocking_pid ?
waiting_pid
waiting_trx_id
blocking_trx_id

28 Which are server-level data locks? (Choose two)
Metadata locks
Row-level locks
Table locks
Locks that apply to internal resources
Storage engine data locks

29 Which are true about MySQL behaviour when attempting to access a table for which an Exclusive (X) table-level lock is held? (Choose two)
it allows other transactions to acquire shared locks on the table's rows ?
it prevents other transaction from locking any rows in the table.?
It locks the table to allow shared row-level locking ??
it allows other sessions only to read rows. ?
it permits the transaction owning the lock to read and write rows


30 Which conditions force an update to the performance baseline? (Choose two)
changes in the exploratory configuration
increasing data volumes
server migration to a new subnet ?
changes in application usage patterns ?
changes in server connection credentials?


31 Which actions are included in scaling out a database server? (Choose two)?
writing software (application or storage engine) to use multiple locations?
adding more servers to the environment
adding more CPU, storage, or main memory resources?
increasing the network bandwidth?
increasing the processing capacity of any single node


32 Which properties are true about Invisible Indexes? (Choose three)
They can be used to facilitate a staged rollout of changes caused by index removal.
They are updated when indexed columns in their associated table is modified by DML statements.
They can be applied to primary keys.
They provide an approximation of data distribution in indexed columns.
They can test the effect of removing an index on performance without dropping the index.
They analyze and store key distribution statistics of a table.


33 Which storage engines support the mysqlcheck client program? (Choose three)
MyISAM ??
BLACKHOLE
MEMORY
MERGE
InnoDB ??
ARCHIVE ??

34 What does the EXPLAIN command do? (Choose two)
It generates a query execution plan.
It performs data modification in a query.
It examines SQL statements beginning with the SELECT, INSERT, REPLACE, UPDATE, and DELETE statements.
It enables efficient access to rows.
It returns data from tables.


35 Which materially improves overall system performance? (Choose two)
A query that executes once per minute has its response time reduced from 2 seconds to 1 second.
A query that executes once per minute has its response time reduced from 2 seconds to 800 ms.
A query that executes once per minute has its response time reduced from 20 ms to 15 ms.
A query that executes several thousand times per minute has its response time reduced from 40 ms to 25 ms.
A query that executes several thousand times per minute has its response time reduced from 50 ms to 40 ms.

36 Examine this command which executes successfully: mysql> EXPLAIN SELECT emp_no, title FROM titles \G It generates this output: id: 1 select_type: SIMPLE table: titles partitions: NULL type: eq_ref … Which type of comparison plan is used to access rows?
matching rows in a range that the named index supports
matching one or more referenced values for equality
matching a primary or unique key against a constant at the start of a query
matching a single referenced value for equality


37 What does the FORCE command do? (Choose three)
forces an index rebuild even though the SQL statement does not change the table structure
produces multiple output rows when analyzing complex queries
provides the optimizer with extra information about data distribution
reorganizes data evenly across data pages
reclaims file system space used by empty pages
analyzes and stores key distribution statistics of a table

38 Which logs contain queries that the MySQL server executes? (Choose two)
the Binary log?
the Relay log
the General query log?
the Slow query log
the Audit log


39 Which techniques segregate data file backups from MySQL server data files? (Choose three)
MySQL enterprise backup
snapshots
OS copy commands
binary logging
distributed replicated block device
replication


40 Which methods are used for logical backups? (Choose three)
MySQL enterprise backup
SQL statements
snapshots
the mysqldump utility
OS copy commands
the mysqlpump utility

41 Which are advantages of the RAID mirroring process? (Choose two)
It enables the creation of live backups
It recovers data in the event of a hardware failure?
It backs up both local and remote MySQL servers
It can reload a database on another server, running a different architecture?
It creates a SQL script that can be executed on a MySQL server


42 Which are true about warm backups? (Choose two)
They lock data using multiversion concurrency control (MVCC).
Updates are not possible during these backups.
When backups occurs, the server is in an inaccessible mode.
They permit applications to only read data.
They do not impact system performance.

43 Which of these use full and binary log backups? (Choose two) ?
multiple backups of data modifications taken each hour to minimize exposure during each day
backups using mysqlbackup from a replication slave
daily/hourly supplemental backups containing live data
backups using mysqldump with the --where option
weekly conditional backups of large transactional tables containing only fixed or historical data

44 Which are features or capabilities of multisource replication? (Choose three)
consolidating data from multiple servers to a single server
adding processing load on the master
preventing slaves from making backups
merging table shards
backing up multiple servers to a single server
backing up files not requiring additional storage or processing on the master

45 Which command forces the current binary log to close and the next incremental binary log to open?
mysql> PURGE BINARY LOGS TO 'binlog.000048';
mysql> BINLOG 'next';
mysql> FLUSH BINARY LOGS;
mysql> GRANT RELOAD ON *.* TO 'backupuser'@'localhost';

46 Which are features of the mysqlpump utility? (Choose three)
taking physical backups of databases
restoring databases using dumped data files
faster reloading of secondary indexes for InnoDB tables
dumping InnoDB CREATE TABLESPACE statements
parallel processing of the database dump process
dumping user accounts as CREATE USER/GRANT statements


47 How does the - - master-data option of the mysqldump command ensure data consistency during a database backup? (Choose two)
It locks tables during backup.
It creates database and table structures but does not dump the data.
It acquires a global lock at the beginning of the backup operation.
It records the binlog position in the backup file.
It starts a new binary log.


48 Which are requirements for enabling multisource replication? (Choose two)
The slave must use TABLE-based repositories.
All masters and slaves must be configured to prevent data conflicts.
The slave must use FILE-based repositories.
The slave must create a replication channel for each master.
All masters and slaves must be in a star topology.

49 Which statement uses the global transaction identifier (GTID) replication protocol?
CHANGE MASTER TO RELAY_LOG_FILE='slave-relay-bin.006', RELAY_LOG_POS=4025;
CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3312, MASTER_LOG_FILE='server2-bin.000001', MASTER_LOG_POS=723074;
CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3311, MASTER_LOG_FILE='server1-bin.000001', MASTER_LOG_POS=155;
CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3313, MASTER_AUTO_POSITION=1;

50 Which are advantages of MySQL replication? (Choose two)
Applications can scale-out SQL queries to multiple servers to reduce the response time.
Another server, either master or slave, can take over the duties of a crashed server to prevent application outages.
Clients can run queries on different servers simultaneously to prevent data conflicts.
When the master is down, a slave server can be configured to automatically become the master to prevent database inconsistencies.
Same-level slave servers can share updates in case of the master’s failure to enable data coherency.


51 Which are true for semisynchronous replication? (Choose two)
After committing a transaction, the master blocks until at least one slave acknowledges the transaction.
If the master is configured as semisynchronous, then all slaves must be configured as semisynchronous.
It restricts masters and slaves to use only statement-based binary logging.
It improves query execution performance of the master and at least one slave.
It ensures data integrity between the master and at least one slave.


52 You used the SHOW SLAVE STATUS command on a slave and received this output: … Master_Log_File: server1-bin.000004 Read_Master_Log_Pos: 275 Relay_Log_File: server2-relay-bin.000011 Relay_Log_Pos: 453 Relay_Master_Log_File: server1-bin.000002 Exec_Master_Log_Pos: 1307 … What does this status signify? (Choose two)
Log events are being copied faster than they are being executed on the slave.
There is network latency when transferring events between master and slave.
The slave is still executing previous binary log events but has received another binary log from the master.
The binary log was re-sent as the slave failed to acknowledge completion
There is latency in the SQL thread rather than the I/O thread.


53 Which replication table in a performance schema contains the status of the SQL thread in a multithreaded slave?
replication_applier_status_by_worker
replication_applier_status?
replication_applier_status_by_coordinator?
replication_applier_configuration?


54 Querying the I/O thread status of a replication slave displays this status message: Waiting for the slave SQL thread to free enough relay log space What does this status signify?
The I/O thread is executing a LOAD DATA statement and appending the data to a temporary file which will be processed by the slave.
The value of the relay_log_space_limit parameter is zero.
The combined size of the relay logs exceeds the value of relay_log_space_limit. ?
The I/O thread is copying an event to the relay log for processing by the SQL thread.


55 Which are required when troubleshooting a MySQL replication error? (Choose two)
Reviewing the events in the master binary log file.
Verifing that both master and slave have unique nonzero server ID values. ? 檢查主從 server id?
Verifying that the slave I/O thread serializes all event updates in the relay log.
Verifying that the Seconds_Behind_Master column displayed by the SHOW SLAVE STATUS command is zero.
Reviewing the Last_IO_Error and Last_SQL_Error columns displayed by the SHOW SLAVE STATUS command. ??


56 Which are functions of a slave SQL thread? (Choose two)
connecting with the master’s binlog dump thread
allowing transactions updating different databases to run in parallel on a slave
copying events from the master relay log to the slave’s relay log
distributing relay log events between worker threads on a multithreaded slave
reading events from the binary log and sending them to the slave I/O thread


57 Examine this parameter setting: SLAVE_PARALLEL_TYPE = DATABASE Which are true? (Choose two)
SLAVE_PARALLEL_WORKERS must be greater than zero for this setting to take effect
transactions that update different databases can run in parallel on a slave
master-slave data consistency is ensured when there are cross-database constraints
transactions that are part of the same binary log group commit on a master can to run in parallel on a slave
MASTER_AUTO_POSITION must be set to 1 for this setting to take effect

58 How does MySQL Shell (mysqlsh) support the administration of a cluster? (Choose two)
It manages failover by automatically routing server connections.
It enables access to MySQL features via APIs.
It implements a pluggable architecture and allows developers to create customized plug-ins.
It provides scripting capabilities using JavaScript, Python, and SQL commands.
It enables replicated server updates using binary log position and global transaction identifiers (GTIDs).

59 myCluster is an InnoDB cluster. Examine this mysqlsh statement and output: mysql-js > cluster.status() { "clusterName": "myCluster", "defaultReplicaSet": { "name": "default", "primary": "server2:3312", "status": "OK_NO_TOLERANCE", … What does this status signify? (Choose two)
There is sufficient redundancy available to tolerate at least one failure.
There is no redundancy in the cluster, and the failure of a member will result in database outage.
One or more members may be online but their status is not ONLINE or RECOVERING.
One or more members are online but cannot form a quorum.
There are enough members online to form a quorum.


60 Which are true about a MySQL InnoDB cluster? (Choose two)
It uses MySQL Group Replication to replicate data between all servers in a group. ??
It relies on MySQL Router to interconnect replicated servers in a group.
It provides a confgurable capability for the administration of a group of server instances in a cluster. ??
It provides real-time access with data consistency across partitioned and distributed datasets.
It uses AdminAPI to work with relational and document data in the MySQL Document Store.

61 You have a live cluster with three servers. Executing the dba.getCluster() function returns the Cluster value “cluster”. Which methods must be used, all of which are required, to add a fourth server to the cluster? (Choose three)
dba.configureInstance()
cluster.dissolve()
cluster.addInstance()?
cluster.rescan()
dba.configureLocalInstance()
cluster.rejoinInstance()?

62 Examine this mysqlsh statement and output: mysql-js> cluster.checkInstanceState(“root@server4:3314”) ... … { "reason": "recoverable", "state": "ok" } What does the output signify?
The instance has more executed GTIDs than the executed GTIDs of the cluster seed instances. ?
The instance has executed GTIDs, which do not conflict with the executed GTIDs of the cluster seed instances.
The instance has executed GTIDs, which diverge with the executed GTIDs of the cluster seed instances.
The instance has not executed any GTID transactions; therefore, it cannot conflict with the GTIDs executed by the cluster.

63 Which are functions of Group Replication? (Choose two)
assigning replication servers to groups of three to nine servers
in single-primary mode, enabling all servers to accept transactions but only the primary decides the order to commit
in multi-primary mode, enabling group members to certify the order of transactions within the global sequence of transactions
enabling automatic avoidance of “split-brain” situations among group members
in multi-primary mode, enabling automatic election of a new primary when the primary server fails

本文來自互聯網用戶投稿,該文觀點僅代表作者本人,不代表本站立場。本站僅提供信息存儲空間服務,不擁有所有權,不承擔相關法律責任。
如若轉載,請注明出處:http://www.pswp.cn/diannao/91604.shtml
繁體地址,請注明出處:http://hk.pswp.cn/diannao/91604.shtml
英文地址,請注明出處:http://en.pswp.cn/diannao/91604.shtml

如若內容造成侵權/違法違規/事實不符,請聯系多彩編程網進行投訴反饋email:809451989@qq.com,一經查實,立即刪除!

相關文章

自動化測試工具 Selenium 入門指南

Selenium 是一款強大的自動化測試工具,可用于模擬用戶在瀏覽器中的各種操作。它支持多種瀏覽器(如 Chrome、Firefox、Edge 等)和多種編程語言(如 Python、Java、C# 等),廣泛應用于 Web 應用程序的自動化測試…

Hystrix與Resilience4j在微服務熔斷降級中的應用對比與實戰

Hystrix與Resilience4j在微服務熔斷降級中的應用對比與實戰 1. 問題背景介紹 在微服務架構中,服務之間的依賴使得鏈路調用更加復雜。一旦某個下游服務發生故障或響應延遲,可能導致整個調用鏈阻塞甚至雪崩,影響系統可用性。熔斷(Ci…

PostgreSQL數據庫集群如何進行自動化性能監測?

前言:在這個數據爆炸的時代,PostgreSQL數據庫集群就像是我們的"數據寶庫"。但是,再好的寶庫也需要有專業的"保安"來守護。今天我們就來聊聊如何給PostgreSQL集群配備一套智能的"保安系統"——自動化性能監測。…

OneCode體系架構深度剖析:設計哲學與AI增強之道

引言 在企業級應用開發領域,架構設計決定了系統的擴展性、可維護性與演進能力。OneCode作為一站式開發平臺,其架構設計蘊含著對復雜業務場景的深刻理解與技術選型的前瞻性思考。本文將從六個維度系統剖析OneCode的架構設計理念,揭示其模塊劃分…

AWS中國區資源成本優化全面指南:從理論到實踐

引言:為什么AWS中國區成本優化如此重要? 在數字化轉型的浪潮中,越來越多的中國企業選擇AWS中國區作為其云計算服務提供商。然而,隨著業務規模的擴大,云資源成本往往成為企業關注的焦點。有效的成本優化不僅能夠直接降低IT支出,還能提高資源利用效率,為企業創造更大的商…

Redis中什么是看門狗機制

在 Redis 中,“看門狗機制”(Watchdog Mechanism)不是 Redis 的核心機制之一,但它在一些場景中起到了重要作用,尤其是在使用 Redlock 分布式鎖實現 或在 Redis Enterprise 等高級用法中。一、看門狗機制的通用含義看門…

[MRCTF2020]PYWebsite

function enc(code){hash hex_md5(code);return hash;}function validate(){var code document.getElementById("vcode").value;if (code ! ""){if(hex_md5(code) "0cd4da0223c0b280829dc3ea458d655c"){alert("您通過了驗證!…

AWS S3事件通知實戰:從配置到生產的完整指南

引言 在現代云架構中,事件驅動設計已成為構建可擴展、高可用系統的核心模式。AWS S3作為對象存儲服務,其事件通知功能為我們提供了強大的自動化處理能力。本文將基于一個真實的圖片處理系統案例,詳細介紹如何正確配置和使用S3事件通知。 業務場景 我們開發了一個圖片處理…

[AI-video] Web UI | Streamlit(py to web) | 應用配置config.toml

鏈接:https://reccloud.cn/start?positiontab1 docs:AI creates videos MoneyPrinterTurbo 是一個自動化短視頻創作流程的開源項目。 它通過輸入主題或關鍵詞,利用人工智能(大語言模型)生成腳本和搜索條件&#xff0…

CommonJS 功能介紹

CommonJS是JavaScript的模塊化規范,主要用于服務器端(如Node.js)的模塊化開發,其核心功能和特點如下: 一、核心功能模塊定義與導出 module.exports:用于導出模塊的內容,可以是函數、對象、變量等…

3D材質總監的“光影魔法”:用Substance Sampler AI,“擦除”照片中的光影

在三維視覺藝術的創作中,我們始終在探索一對核心的“對立統一”:一方面是**“現實世界的光照”(Real-World Lighting),它被固定、“烘焙”在一張照片的像素之中;另一方面是“虛擬世界的光照”(V…

從高斯噪聲的角度分析MAE和MSE

文章目錄1. MAE與MSE的本質區別2. 高斯噪聲下的統計特性3. MAE導致稀疏解的內在機制4. 對比總結1. MAE與MSE的本質區別 MAE(Mean Absolute Error)和MSE(Mean Squared Error)是兩種常用的損失函數,它們的數學形式決定了…

AR智能巡檢:制造業零缺陷安裝的“數字監工”

在制造業中,設備安裝與組裝環節的準確性是產品質量和生產效率的關鍵。傳統的人工巡檢和紙質作業指導書容易因人為疏忽、經驗不足或信息滯后導致安裝錯誤,進而引發返工、延誤甚至安全事故。然而,隨著增強現實(AR www.teamhelper.cn…

js最簡單的解密分析

js最簡單的解密分析 一、JavaScript 代碼保護技術簡介 ? 為什么要保護 JavaScript 代碼? JavaScript 是前端語言,代碼在瀏覽器中是完全可見的。這意味著: 別人可以輕松查看你的核心算法或業務邏輯頁面上的接口地址、加密邏輯等容易被抓包分析…

React強大且靈活hooks庫——ahooks入門實踐之開發調試類hook(dev)詳解

什么是 ahooks? ahooks 是一個 React Hooks 庫,提供了大量實用的自定義 hooks,幫助開發者更高效地構建 React 應用。其中開發調試類 hooks 是 ahooks 的一個重要分類,專門用于開發調試階段,幫助開發者追蹤組件更新和副…

React強大且靈活hooks庫——ahooks入門實踐之副作用類hook(effect)詳解

什么是 ahooks? ahooks 是一個 React Hooks 庫,提供了大量實用的自定義 hooks,幫助開發者更高效地構建 React 應用。其中副作用類 hooks 是 ahooks 的一個重要分類,專門用于處理各種副作用操作,如定時器、防抖、節流等…

SpringBoot一Web Flux、函數式Web請求的使用、和傳統注解@Controller + @RequestMapping的區別

一、函數式 Web 在 Spring Boot 中,使用函數式 Web(Function-based Web)可以通過 RouterFunction 和 HandlerFunction 來定義路由和請求處理邏輯。這種方式與傳統的注解驅動的方式不同,它更加簡潔,并且適合響應式編程。…

Vue+Cesium快速配置指南

安裝必要依賴在項目根目錄下運行以下命令安裝vue-cesium和cesium:npm install vue-cesium3.1.4 cesium1.84配置Vite在vite.config.js文件中添加以下配置:import { defineConfig } from vite import vue from vitejs/plugin-vue import { resolve } from …

礦業自動化破壁者:EtherCAT轉PROFIBUS DP網關的井下實戰

在深井鉆機的轟鳴、礦石輸送帶的奔流與通風設備的不息運轉中,礦業生產的脈搏強勁跳動。然而,這片創造價值的土地,卻為自動化技術的深入設置了嚴苛的考場:信息孤島林立: 高效現代的EtherCAT控制系統與井下大量穩定服役的…

SpringBoot+Loki4j+Loki+Grafana搭建輕量級日志系統

文章目錄前言一、組件介紹(一)Loki特點架構適用場景總結(二)Loki4j特點(三)Grafana特點適用場景二、組件配置(一)Loki(二)Grafana三、項目搭建參考文章前言 …