Mysql测试题

1 Which Linux MySQL server installation directories are the base directories? (Choose two) 
/usr/sbin
/var/lib/mysql   
/var/log
/usr/bin
/etc    


2 What does the RPM installation process for MySQL do? (Choose two)
It creates the default my.cnf file
It sets up the mysql user and group in the operating system
It creates the default root@localhost account
It provides a temporary password for the root account
It registers system startup scripts for MySQL services

3 What is the purpose of the mysql_config_editor utility? (Choose two)
It reads and replays the contents of binary log files.
It creates TLS keys and certificates.
It reads and summarizes the contents of MySQL slow query log files.
It enables users to store authentication credentials in the .mylogin.cnf file. 

4 Which storage engine supports INSERT and SELECT but not DELETE, REPLACE, or UPDATE commands?
ARCHIVE     
MyISAM
BLACKHOLE 
MEMORY


5 Which features are supported by InnoDB? (Choose two)
Hash indexes
Clustered indexes
B-tree indexes
Cluster database support
T-tree indexes


6 Which are true about the MyISAM storage engine? (Choose three) 
It supports table-level locking 
It supports all data types except spatial data types
It supports FULLTEXT indexes
It supports spatial data types and indexes 
It supports storing row data and indexes in memory


7 Which system variables have both global and session scope in MySQL? (Choose two)
sort_buffer_size  
error_count
max_join_size  
innodb_buffer_pool_size
max_connections


8 Examine this command which executes successfully: SET PERSIST max_connections=99; Which command displays the content of the file that includes this parameter change?
cat /labs/slap-test-updates.sh
mysql> \! cat /var/lib/mysql/mysqld-auto.cnf | python -m json.tool
mysql> \! cat /var/lib/mysql/slow-query.log
cat /labs/multi.cnf


9 You changed the maximum number of connections in MySQL. In the variable_info table, the max_connections system variable displays a VARIABLE_SOURCE of DYNAMIC. What does it mean?
The max_connections system variable was set from the my.cnf file.
The max_connections system variable has not been configured in any startup file.
The max_connections system variable was changed at runtime. 
The max_connections system variable was set from a server-specific mysqld-auto.cnf option file.

10 Examine this command and results: SET GLOBAL port = 3303; ERROR 1238 (HY000): Variable “port” is a read only variable. How would you resolve this error? (Choose two)
Change the port option to dynamic in the my.cnf file.
Change the port option to dynamic at the command line.
Change the default port number in the my.cnf file.
Change the port number in the mysql-auto.cnf file.
Change the modifier from GLOBAL to SESSION in the command.

11 Which command displays collected server metrics stored in the performance schema?    服务器指标(metrics)
SELECT * FROM setup_objects LIMIT 5\G;
SELECT * FROM setup_actors LIMIT 5\G;
SELECT * FROM setup_consumers LIMIT 5\G;
SELECT * FROM setup_instruments LIMIT 5\G; 

12 What can be configured by modifying the Performance Schema setup_actors table?
stored procedures that are monitored
server metrics that are collected
foreground threads that are monitored
thread classes that are instrumented

13 Examine this output: | HOST | USER | ROLE | ENABLED | HISTORY | | % | % | % | YES | YES | 1 row in set (#.## sec) Which command produces this?
SELECT * FROM setup_objects LIMIT 5\G;
SELECT * FROM setup_consumers LIMIT 5\G;
SELECT * FROM setup_actors LIMIT 5\G;
SELECT * FROM setup_instruments LIMIT 5\G;


14 Why is the General Query Log used in MySQL? (Choose two)
To record statements where execution time exceeds a specified threshold
To record the time and type of each connection and the process ID of all operations   
To discover queries with excessive execution time.
To include update operations stored as row-based binary logs on slave servers
To record all statements executed against all tables  


15 Which Performance Schema instruments have no subcomponents? (Choose three) 
stage 
transaction 
statement 
error  
memory 
idle  


16 How does a Performance Schema provide insight into database activity? (Choose three) 
By analyzing errors that occur on the system
By analyzing I/O wait statistics 
By analyzing historical performance data  
By interpreting the Performance Schema to DBAs for diagnostic use cases
By analyzing the audit record of server activity in log files
By analyzing which queries are running 

17 Which MySQL logs can be stored in tables? (Choose two)
Audit log
General query log    
Slow query log     
Binary log
Error log

18 You plan to use the test authentication plug-in test_plugin_server. Which statements are true? (Choose two)
It sends a plain text password to the server.
It authenticates against operating system users and groups.
It only allows MySQL users to log in via a UNIX socket.
It is intended for use during testing and development.
It implements native and old password authentication.

19 Which command activates roles at the session level?
SET PERSIST activate_all_roles_on_login = ON;
SET DEFAULT ROLE ALL TO kari@localhost;
ALTER USER kari@localhost DEFAULT ROLE ALL;
SET ROLE ALL; 

20 Which command removes DDL privileges from a role?
REVOKE DELETE, INSERT, UPDATE ON world.* FROM r_dev;
REVOKE CREATE, DROP ON world.* FROM r_dev;      
REVOKE GRANT OPTION ON world.* FROM r_dev
REVOKE r_updater FROM r_dev;

21 The -ssl-mode option in your configuration is VERIFY_CA. What does this do?(Choose two)
It establishes secure connections or fails if unable to do so.    建立安全连接或失败(无法建立则连接失败)
It checks whether host names match the Common Name value in the server certificate.
It verifies that server digital certificates match the MySQL server hosts.
It establishes secure connections if it can but if not then unsecure connections are eastablished.
It verifies server digital certificates with the Certificate Authority.    验证服务器证书是否由可信的 CA 签发


22 After firewall training is complete, which modes will make the statement digest persistent in the account’s whitelist cache? (Choose two) 
RECORDING 
RESET 
PROTECTING 
DETECTING  
OFF


23 Which statements are true about Brute Force attacks? (Choose two)
They compare password hashes against the stored hashes in the MySQL database.
They match target password hashes against rainbow tables.
They are slow as they require lots of CPU.    
They perform hashing operations on the characters to find matching hashes.
They perform hashing operations on combinations of dictionary words and characters.

24 Examine this command and output: SHOW STATUS LIKE 'Connection_control%'; | Variable_name | Value | | Connection_control_delay_generated | 7 | 1 row in set (#.## sec) Which is true?
A seven millisecond delay is added for each consecutive connection failure.
The maximum possilbe added delay is seven milliseconds.
MySQL server added a delay for failed connection attempts seven times. 
Seven successive failures are permitted before adding a delay.

25 Which command registers the appuser@apphost account for firewall training?
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'PROTECTING')
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'OFF')
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'RECORDING')     
CALL mysql.sp_set_firewall_mode('appuser@apphost', 'RESET')

26 You observe poor system performance. Which commands will display currently executing queries? (Choose two)
SELECT * FROM sys.session\G     
SHOW MASTER STATUS\G
SHOW GLOBAL STATUS\G
SHOW PROCESSLIST\G    
SELECT * FROM performance_schema.session_status;

27 Examine this statement which executes successfully: "#mysqladmin –uroot –p kill 14" What does 14 represent in the output?
blocking_pid  
waiting_pid
waiting_trx_id
blocking_trx_id

28 Which are server-level data locks? (Choose two)
Metadata locks
Row-level locks
Table locks
Locks that apply to internal resources
Storage engine data locks

29 Which are true about MySQL behaviour when attempting to access a table for which an Exclusive (X) table-level lock is held? (Choose two)
it allows other transactions to acquire shared locks on the table's rows  
it prevents other transaction from locking any rows in the table. 
It locks the table to allow shared row-level locking   
it allows other sessions only to read rows.  
it permits the transaction owning the lock to read and write rows


30 Which conditions force an update to the performance baseline? (Choose two)
changes in the exploratory configuration
increasing data volumes
server migration to a new subnet  
changes in application usage patterns  
changes in server connection credentials 


31 Which actions are included in scaling out a database server? (Choose two) 
writing software (application or storage engine) to use multiple locations 
adding more servers to the environment
adding more CPU, storage, or main memory resources 
increasing the network bandwidth 
increasing the processing capacity of any single node


32 Which properties are true about Invisible Indexes? (Choose three)
They can be used to facilitate a staged rollout of changes caused by index removal.
They are updated when indexed columns in their associated table is modified by DML statements.
They can be applied to primary keys.
They provide an approximation of data distribution in indexed columns.
They can test the effect of removing an index on performance without dropping the index.
They analyze and store key distribution statistics of a table.


33 Which storage engines support the mysqlcheck client program? (Choose three)
MyISAM   
BLACKHOLE
MEMORY
MERGE
InnoDB   
ARCHIVE   

34 What does the EXPLAIN command do? (Choose two)
It generates a query execution plan.
It performs data modification in a query.
It examines SQL statements beginning with the SELECT, INSERT, REPLACE, UPDATE, and DELETE statements.
It enables efficient access to rows.
It returns data from tables.


35 Which materially improves overall system performance? (Choose two)
A query that executes once per minute has its response time reduced from 2 seconds to 1 second.
A query that executes once per minute has its response time reduced from 2 seconds to 800 ms.
A query that executes once per minute has its response time reduced from 20 ms to 15 ms.
A query that executes several thousand times per minute has its response time reduced from 40 ms to 25 ms.
A query that executes several thousand times per minute has its response time reduced from 50 ms to 40 ms.

36 Examine this command which executes successfully: mysql> EXPLAIN SELECT emp_no, title FROM titles \G It generates this output: id: 1 select_type: SIMPLE table: titles partitions: NULL type: eq_ref … Which type of comparison plan is used to access rows?
matching rows in a range that the named index supports
matching one or more referenced values for equality
matching a primary or unique key against a constant at the start of a query
matching a single referenced value for equality


37 What does the FORCE command do? (Choose three)
forces an index rebuild even though the SQL statement does not change the table structure
produces multiple output rows when analyzing complex queries
provides the optimizer with extra information about data distribution
reorganizes data evenly across data pages
reclaims file system space used by empty pages
analyzes and stores key distribution statistics of a table

38 Which logs contain queries that the MySQL server executes? (Choose two)
the Binary log 
the Relay log
the General query log 
the Slow query log
the Audit log


39 Which techniques segregate data file backups from MySQL server data files? (Choose three)
MySQL enterprise backup
snapshots
OS copy commands
binary logging
distributed replicated block device
replication


40 Which methods are used for logical backups? (Choose three)
MySQL enterprise backup
SQL statements
snapshots
the mysqldump utility
OS copy commands
the mysqlpump utility

41 Which are advantages of the RAID mirroring process? (Choose two)
It enables the creation of live backups
It recovers data in the event of a hardware failure 
It backs up both local and remote MySQL servers
It can reload a database on another server, running a different architecture 
It creates a SQL script that can be executed on a MySQL server


42 Which are true about warm backups? (Choose two)
They lock data using multiversion concurrency control (MVCC).
Updates are not possible during these backups.
When backups occurs, the server is in an inaccessible mode.
They permit applications to only read data.
They do not impact system performance.

43 Which of these use full and binary log backups? (Choose two)  
multiple backups of data modifications taken each hour to minimize exposure during each day
backups using mysqlbackup from a replication slave
daily/hourly supplemental backups containing live data
backups using mysqldump with the --where option
weekly conditional backups of large transactional tables containing only fixed or historical data

44 Which are features or capabilities of multisource replication? (Choose three)
consolidating data from multiple servers to a single server
adding processing load on the master
preventing slaves from making backups
merging table shards
backing up multiple servers to a single server
backing up files not requiring additional storage or processing on the master

45 Which command forces the current binary log to close and the next incremental binary log to open?
mysql> PURGE BINARY LOGS TO 'binlog.000048';
mysql> BINLOG 'next';
mysql> FLUSH BINARY LOGS;
mysql> GRANT RELOAD ON *.* TO 'backupuser'@'localhost';

46 Which are features of the mysqlpump utility? (Choose three)
taking physical backups of databases
restoring databases using dumped data files
faster reloading of secondary indexes for InnoDB tables
dumping InnoDB CREATE TABLESPACE statements
parallel processing of the database dump process
dumping user accounts as CREATE USER/GRANT statements


47 How does the - - master-data option of the mysqldump command ensure data consistency during a database backup? (Choose two)
It locks tables during backup.
It creates database and table structures but does not dump the data.
It acquires a global lock at the beginning of the backup operation.
It records the binlog position in the backup file.
It starts a new binary log.


48 Which are requirements for enabling multisource replication? (Choose two)
The slave must use TABLE-based repositories.
All masters and slaves must be configured to prevent data conflicts.
The slave must use FILE-based repositories.
The slave must create a replication channel for each master.
All masters and slaves must be in a star topology.

49 Which statement uses the global transaction identifier (GTID) replication protocol?
CHANGE MASTER TO RELAY_LOG_FILE='slave-relay-bin.006', RELAY_LOG_POS=4025;
CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3312, MASTER_LOG_FILE='server2-bin.000001', MASTER_LOG_POS=723074;
CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3311, MASTER_LOG_FILE='server1-bin.000001', MASTER_LOG_POS=155;
CHANGE MASTER TO MASTER_HOST='127.0.0.1', MASTER_PORT=3313, MASTER_AUTO_POSITION=1;

50 Which are advantages of MySQL replication? (Choose two)
Applications can scale-out SQL queries to multiple servers to reduce the response time.
Another server, either master or slave, can take over the duties of a crashed server to prevent application outages.
Clients can run queries on different servers simultaneously to prevent data conflicts.
When the master is down, a slave server can be configured to automatically become the master to prevent database inconsistencies.
Same-level slave servers can share updates in case of the master’s failure to enable data coherency.


51 Which are true for semisynchronous replication? (Choose two)
After committing a transaction, the master blocks until at least one slave acknowledges the transaction.
If the master is configured as semisynchronous, then all slaves must be configured as semisynchronous.
It restricts masters and slaves to use only statement-based binary logging.
It improves query execution performance of the master and at least one slave.
It ensures data integrity between the master and at least one slave.


52 You used the SHOW SLAVE STATUS command on a slave and received this output: … Master_Log_File: server1-bin.000004 Read_Master_Log_Pos: 275 Relay_Log_File: server2-relay-bin.000011 Relay_Log_Pos: 453 Relay_Master_Log_File: server1-bin.000002 Exec_Master_Log_Pos: 1307 … What does this status signify? (Choose two)
Log events are being copied faster than they are being executed on the slave.
There is network latency when transferring events between master and slave.
The slave is still executing previous binary log events but has received another binary log from the master.
The binary log was re-sent as the slave failed to acknowledge completion
There is latency in the SQL thread rather than the I/O thread.


53 Which replication table in a performance schema contains the status of the SQL thread in a multithreaded slave?
replication_applier_status_by_worker
replication_applier_status 
replication_applier_status_by_coordinator 
replication_applier_configuration 


54 Querying the I/O thread status of a replication slave displays this status message: Waiting for the slave SQL thread to free enough relay log space What does this status signify?
The I/O thread is executing a LOAD DATA statement and appending the data to a temporary file which will be processed by the slave.
The value of the relay_log_space_limit parameter is zero.
The combined size of the relay logs exceeds the value of relay_log_space_limit.  
The I/O thread is copying an event to the relay log for processing by the SQL thread.


55 Which are required when troubleshooting a MySQL replication error? (Choose two)
Reviewing the events in the master binary log file.
Verifing that both master and slave have unique nonzero server ID values.   检查主从 server id 
Verifying that the slave I/O thread serializes all event updates in the relay log.
Verifying that the Seconds_Behind_Master column displayed by the SHOW SLAVE STATUS command is zero.
Reviewing the Last_IO_Error and Last_SQL_Error columns displayed by the SHOW SLAVE STATUS command.   


56 Which are functions of a slave SQL thread? (Choose two)
connecting with the master’s binlog dump thread
allowing transactions updating different databases to run in parallel on a slave
copying events from the master relay log to the slave’s relay log
distributing relay log events between worker threads on a multithreaded slave
reading events from the binary log and sending them to the slave I/O thread


57 Examine this parameter setting: SLAVE_PARALLEL_TYPE = DATABASE Which are true? (Choose two)
SLAVE_PARALLEL_WORKERS must be greater than zero for this setting to take effect
transactions that update different databases can run in parallel on a slave
master-slave data consistency is ensured when there are cross-database constraints
transactions that are part of the same binary log group commit on a master can to run in parallel on a slave
MASTER_AUTO_POSITION must be set to 1 for this setting to take effect

58 How does MySQL Shell (mysqlsh) support the administration of a cluster? (Choose two)
It manages failover by automatically routing server connections.
It enables access to MySQL features via APIs.
It implements a pluggable architecture and allows developers to create customized plug-ins.
It provides scripting capabilities using JavaScript, Python, and SQL commands.
It enables replicated server updates using binary log position and global transaction identifiers (GTIDs).

59 myCluster is an InnoDB cluster. Examine this mysqlsh statement and output: mysql-js > cluster.status() { "clusterName": "myCluster", "defaultReplicaSet": { "name": "default", "primary": "server2:3312", "status": "OK_NO_TOLERANCE", … What does this status signify? (Choose two)
There is sufficient redundancy available to tolerate at least one failure.
There is no redundancy in the cluster, and the failure of a member will result in database outage.
One or more members may be online but their status is not ONLINE or RECOVERING.
One or more members are online but cannot form a quorum.
There are enough members online to form a quorum.


60 Which are true about a MySQL InnoDB cluster? (Choose two)
It uses MySQL Group Replication to replicate data between all servers in a group.   
It relies on MySQL Router to interconnect replicated servers in a group.
It provides a confgurable capability for the administration of a group of server instances in a cluster.   
It provides real-time access with data consistency across partitioned and distributed datasets.
It uses AdminAPI to work with relational and document data in the MySQL Document Store.

61 You have a live cluster with three servers. Executing the dba.getCluster() function returns the Cluster value “cluster”. Which methods must be used, all of which are required, to add a fourth server to the cluster? (Choose three)
dba.configureInstance()
cluster.dissolve()
cluster.addInstance() 
cluster.rescan()
dba.configureLocalInstance()
cluster.rejoinInstance() 

62 Examine this mysqlsh statement and output: mysql-js> cluster.checkInstanceState(“root@server4:3314”) ... … { "reason": "recoverable", "state": "ok" } What does the output signify?
The instance has more executed GTIDs than the executed GTIDs of the cluster seed instances.  
The instance has executed GTIDs, which do not conflict with the executed GTIDs of the cluster seed instances.
The instance has executed GTIDs, which diverge with the executed GTIDs of the cluster seed instances.
The instance has not executed any GTID transactions; therefore, it cannot conflict with the GTIDs executed by the cluster.

63 Which are functions of Group Replication? (Choose two)
assigning replication servers to groups of three to nine servers
in single-primary mode, enabling all servers to accept transactions but only the primary decides the order to commit
in multi-primary mode, enabling group members to certify the order of transactions within the global sequence of transactions
enabling automatic avoidance of “split-brain” situations among group members
in multi-primary mode, enabling automatic election of a new primary when the primary server fails

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。
如若转载,请注明出处:http://www.pswp.cn/diannao/91604.shtml
繁体地址,请注明出处:http://hk.pswp.cn/diannao/91604.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

自动化测试工具 Selenium 入门指南

Selenium 是一款强大的自动化测试工具,可用于模拟用户在浏览器中的各种操作。它支持多种浏览器(如 Chrome、Firefox、Edge 等)和多种编程语言(如 Python、Java、C# 等),广泛应用于 Web 应用程序的自动化测试…

Hystrix与Resilience4j在微服务熔断降级中的应用对比与实战

Hystrix与Resilience4j在微服务熔断降级中的应用对比与实战 1. 问题背景介绍 在微服务架构中,服务之间的依赖使得链路调用更加复杂。一旦某个下游服务发生故障或响应延迟,可能导致整个调用链阻塞甚至雪崩,影响系统可用性。熔断(Ci…

PostgreSQL数据库集群如何进行自动化性能监测?

前言:在这个数据爆炸的时代,PostgreSQL数据库集群就像是我们的"数据宝库"。但是,再好的宝库也需要有专业的"保安"来守护。今天我们就来聊聊如何给PostgreSQL集群配备一套智能的"保安系统"——自动化性能监测。…

OneCode体系架构深度剖析:设计哲学与AI增强之道

引言 在企业级应用开发领域,架构设计决定了系统的扩展性、可维护性与演进能力。OneCode作为一站式开发平台,其架构设计蕴含着对复杂业务场景的深刻理解与技术选型的前瞻性思考。本文将从六个维度系统剖析OneCode的架构设计理念,揭示其模块划分…

AWS中国区资源成本优化全面指南:从理论到实践

引言:为什么AWS中国区成本优化如此重要? 在数字化转型的浪潮中,越来越多的中国企业选择AWS中国区作为其云计算服务提供商。然而,随着业务规模的扩大,云资源成本往往成为企业关注的焦点。有效的成本优化不仅能够直接降低IT支出,还能提高资源利用效率,为企业创造更大的商…

Redis中什么是看门狗机制

在 Redis 中,“看门狗机制”(Watchdog Mechanism)不是 Redis 的核心机制之一,但它在一些场景中起到了重要作用,尤其是在使用 Redlock 分布式锁实现 或在 Redis Enterprise 等高级用法中。一、看门狗机制的通用含义看门…

[MRCTF2020]PYWebsite

function enc(code){hash hex_md5(code);return hash;}function validate(){var code document.getElementById("vcode").value;if (code ! ""){if(hex_md5(code) "0cd4da0223c0b280829dc3ea458d655c"){alert("您通过了验证!…

AWS S3事件通知实战:从配置到生产的完整指南

引言 在现代云架构中,事件驱动设计已成为构建可扩展、高可用系统的核心模式。AWS S3作为对象存储服务,其事件通知功能为我们提供了强大的自动化处理能力。本文将基于一个真实的图片处理系统案例,详细介绍如何正确配置和使用S3事件通知。 业务场景 我们开发了一个图片处理…

[AI-video] Web UI | Streamlit(py to web) | 应用配置config.toml

链接:https://reccloud.cn/start?positiontab1 docs:AI creates videos MoneyPrinterTurbo 是一个自动化短视频创作流程的开源项目。 它通过输入主题或关键词,利用人工智能(大语言模型)生成脚本和搜索条件&#xff0…

CommonJS 功能介绍

CommonJS是JavaScript的模块化规范,主要用于服务器端(如Node.js)的模块化开发,其核心功能和特点如下: 一、核心功能模块定义与导出 module.exports:用于导出模块的内容,可以是函数、对象、变量等…

3D材质总监的“光影魔法”:用Substance Sampler AI,“擦除”照片中的光影

在三维视觉艺术的创作中,我们始终在探索一对核心的“对立统一”:一方面是**“现实世界的光照”(Real-World Lighting),它被固定、“烘焙”在一张照片的像素之中;另一方面是“虚拟世界的光照”(V…

从高斯噪声的角度分析MAE和MSE

文章目录1. MAE与MSE的本质区别2. 高斯噪声下的统计特性3. MAE导致稀疏解的内在机制4. 对比总结1. MAE与MSE的本质区别 MAE(Mean Absolute Error)和MSE(Mean Squared Error)是两种常用的损失函数,它们的数学形式决定了…

AR智能巡检:制造业零缺陷安装的“数字监工”

在制造业中,设备安装与组装环节的准确性是产品质量和生产效率的关键。传统的人工巡检和纸质作业指导书容易因人为疏忽、经验不足或信息滞后导致安装错误,进而引发返工、延误甚至安全事故。然而,随着增强现实(AR www.teamhelper.cn…

js最简单的解密分析

js最简单的解密分析 一、JavaScript 代码保护技术简介 ✅ 为什么要保护 JavaScript 代码? JavaScript 是前端语言,代码在浏览器中是完全可见的。这意味着: 别人可以轻松查看你的核心算法或业务逻辑页面上的接口地址、加密逻辑等容易被抓包分析…

React强大且灵活hooks库——ahooks入门实践之开发调试类hook(dev)详解

什么是 ahooks? ahooks 是一个 React Hooks 库,提供了大量实用的自定义 hooks,帮助开发者更高效地构建 React 应用。其中开发调试类 hooks 是 ahooks 的一个重要分类,专门用于开发调试阶段,帮助开发者追踪组件更新和副…

React强大且灵活hooks库——ahooks入门实践之副作用类hook(effect)详解

什么是 ahooks? ahooks 是一个 React Hooks 库,提供了大量实用的自定义 hooks,帮助开发者更高效地构建 React 应用。其中副作用类 hooks 是 ahooks 的一个重要分类,专门用于处理各种副作用操作,如定时器、防抖、节流等…

SpringBoot一Web Flux、函数式Web请求的使用、和传统注解@Controller + @RequestMapping的区别

一、函数式 Web 在 Spring Boot 中,使用函数式 Web(Function-based Web)可以通过 RouterFunction 和 HandlerFunction 来定义路由和请求处理逻辑。这种方式与传统的注解驱动的方式不同,它更加简洁,并且适合响应式编程。…

Vue+Cesium快速配置指南

安装必要依赖在项目根目录下运行以下命令安装vue-cesium和cesium:npm install vue-cesium3.1.4 cesium1.84配置Vite在vite.config.js文件中添加以下配置:import { defineConfig } from vite import vue from vitejs/plugin-vue import { resolve } from …

矿业自动化破壁者:EtherCAT转PROFIBUS DP网关的井下实战

在深井钻机的轰鸣、矿石输送带的奔流与通风设备的不息运转中,矿业生产的脉搏强劲跳动。然而,这片创造价值的土地,却为自动化技术的深入设置了严苛的考场:信息孤岛林立: 高效现代的EtherCAT控制系统与井下大量稳定服役的…

SpringBoot+Loki4j+Loki+Grafana搭建轻量级日志系统

文章目录前言一、组件介绍(一)Loki特点架构适用场景总结(二)Loki4j特点(三)Grafana特点适用场景二、组件配置(一)Loki(二)Grafana三、项目搭建参考文章前言 …