php代码看得懂却写不出来
php代码看得懂却写不出来,为什么,我在w3school中学习,看到一个上传文件的代码,该代码中具有限制用户上传不指定的格式的功能。代码写得非常清楚易懂。
当我关闭chrome浏览器,尝试自己写的时候,却出现了巨大的困难,我该如何解决这样的局面,请php前辈们指点,我是真想学好它。。
回复讨论(解决方案)
那就是没看懂?
那就是没看懂?
+1
虽然和LZ的“看懂”是两个概念,但#1所说的更重要
我给的建议是找个软件,画一画你所看到的代码流程图(有能力是画UML,但估计你还不懂UML)
这个办法因人而异,对我是比较有用,因为我自小写文章就习惯打草稿,即使是短短的百字文
再看一遍,比着写吧
就拿你说的这个例子为例
当你关闭浏览器打开编辑器准备写代码,遇到问题时,先不要着急,把自己遇到的问题,逐条记下来
比方说, if/else没问题 那么接下来获取和分析后缀的代码,有没有问题?能不能写出来?
如果不能,罗列到纸上,一条条.
那么这个有问题的列表,也就是你还没记住的功能点.
再打开浏览器,把这些功能点一一看明白,就差不多了.
除了过目不忘的,没有谁刚开始看一眼就能写出来的,你可以先试着写思路,写伪代码。
同意#5 先有思路,再写代码

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.
