当前位置:网站首页>Reading notes of the beauty of programming
Reading notes of the beauty of programming
2022-07-06 00:22:00 【It rained and windy last night】
Preface
Text
Reading progress
P12
Introduction
So why The manhole cover of the sewer is round ?
Online answers : a. If it is square , Boring man , It's possible to pick up the manhole cover , Throw it diagonally .b. Because the hole at the bottom is a cylinder , therefore , The manhole cover is round .Show me the most beautiful program I wrote ?
Sentiment :
a. A function does only one thing , One function should not be able to abstract another function .
b. The ideal situation is zero parameter , If any , Up to three input parameters are allowed , More functions would be silly . Be careful , The identification parameters are ugly ,
c. High readability , Clear logic , High cohesion , Low coupling , TestedHow to write a program to make CPU The usage rate of 50%?
To be changed ~
Reference resources
边栏推荐
- Single source shortest path exercise (I)
- Huawei equipment configuration ospf-bgp linkage
- LeetCode 6006. Take out the least number of magic beans
- anconda下载+添加清华+tensorflow 安装+No module named ‘tensorflow‘+KernelRestarter: restart failed,内核重启失败
- 建立时间和保持时间的模型分析
- Go learning --- structure to map[string]interface{}
- Basic introduction and source code analysis of webrtc threads
- DEJA_VU3D - Cesium功能集 之 055-国内外各厂商地图服务地址汇总说明
- Pointer - character pointer
- Data analysis thinking analysis methods and business knowledge - analysis methods (III)
猜你喜欢
About the slmgr command
How much do you know about the bank deposit business that software test engineers must know?
18. (ArcGIS API for JS) ArcGIS API for JS point collection (sketchviewmodel)
LeetCode 1189. Maximum number of "balloons"
Priority queue (heap)
Doppler effect (Doppler shift)
XML配置文件
FFT learning notes (I think it is detailed)
Search (DFS and BFS)
[binary search tree] add, delete, modify and query function code implementation
随机推荐
2022.7.5-----leetcode.729
认识提取与显示梅尔谱图的小实验(观察不同y_axis和x_axis的区别)
What is information security? What is included? What is the difference with network security?
权限问题:source .bash_profile permission denied
Chapter 16 oauth2authorizationrequestredirectwebfilter source code analysis
The difference of time zone and the time library of go language
anconda下载+添加清华+tensorflow 安装+No module named ‘tensorflow‘+KernelRestarter: restart failed,内核重启失败
Power query data format conversion, Split Merge extraction, delete duplicates, delete errors, transpose and reverse, perspective and reverse perspective
DEJA_VU3D - Cesium功能集 之 055-国内外各厂商地图服务地址汇总说明
State mode design procedure: Heroes in the game can rest, defend, attack normally and attack skills according to different physical strength values.
wx. Getlocation (object object) application method, latest version
Data analysis thinking analysis methods and business knowledge - analysis methods (III)
数据分析思维分析方法和业务知识——分析方法(三)
Knowledge about the memory size occupied by the structure
如何解决ecology9.0执行导入流程流程产生的问题
Date类中日期转成指定字符串出现的问题及解决方法
Global and Chinese markets for hinged watertight doors 2022-2028: Research Report on technology, participants, trends, market size and share
Gavin teacher's perception of transformer live class - rasa project actual combat e-commerce retail customer service intelligent business dialogue robot system behavior analysis and project summary (4
LeetCode 8. String conversion integer (ATOI)
Basic introduction and source code analysis of webrtc threads