operators in php
1. Arithmetic operators
2. String operators
3. Assignment operator
2. Compound assignment operator
3. Pre-increment and decrement operations and post-increment and decrement operations
4. Reference operator
The reference operator & can be used in associative assignment. Usually, when assigning the value of one variable to another variable, a copy of the metavariable is first made and then stored elsewhere in memory. For example:
In the above example, the first line of code assigns a value to $a; the second line of code first generates a copy of $a and then saves it in $b. If the value of $a is subsequently changed, the value of $b will not change. Looking at the example below:
Note: The reference is not an independent second pointer, but a pointer using the original variable, that is, both $a and $b point to the same address in the memory. In the above example, the second line is $a referenced by $b. When the value of $a in the third line changes, the $b that referenced it also changes. We can break this reference association by resetting:
Note: This reset only resets $a, it does not change the value of $b(7). unsert($a) only destroys the association between $a and the value 7 stored in memory. Unsert($a) can be understood as canceling $a. 4. Comparison operators
5. Logical operators
Note: and and or have lower priority than && and ||. 6. Bit operators
7. Other operators
1. Ternary operator?:
The ternary operator can be seen as the abbreviation of if else conditional statement.
The error suppression operator @ can be used before any expression, that is, before any expression that has a value or can be calculated, for example:
If the error suppression operator @ is not used in the above example, then this line of code will throw a divide-by-0 warning. If @ is used, the warning will be suppressed, that is, not thrown.
php will try to execute commands between back single quotes as server-side commands. The value of the expression is the result of the command execution. For example, in a unix system, you can use:
On Windows server, you can use:
In both cases, a directory list will be obtained and the list will be saved in $out. Then, the list will be displayed in the browser or processed by other methods.
5. Type operator
|

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.
