mySQL traverse string PHP string common sense
Pay attention to the use of escape characters\,",$
Pay attention to the use of octal or hexadecimal characters to represent xf6
echo "Hxf6me";//You need to check whether this type of text encoding is supported
--------- ------------Output results------------------------------------ ----
H鑇e
----------------------------------------- ----------------------------
1. Use printf() and sprintf() to create formatted output
printf() direct output To the output buffer
The output of sprintf() is returned as a string
For example, printf("Output content%.2fn",$PI());
All conversion specifications start with %
Data types include d-integer, s -String, f-floating point number, b-binary
.2 is an optional width indicator, and the output to the right of the decimal point is padded with 0
printf("%.2f",3.14159);
printf("%10.2f", 3.14159);
printf("%.10f",3.14159);
printf("%.9s",abcdefghijklmn);
printf("%5.2f,%f,%7.3fm",3.14159,3.14159,3.14159);
printf("%b %d %f %s n",123,123,123,"test");
------------------------Output results----- ----------------------------------
3.14 3.143.1415900000abcdefghi 3.14,3.141590, 3.142m1111011 123 123.000000 test
-------------------------------------------------- ------------------
2. String padding
string str_pad(string input original string, int length the total length after adding [, string padding characters to be filled [, int pad_type] padding type])
The padding type is added to the left STR_PAD_LEFT, the default is added to the right, and padding is added to both ends STR_PAD_BOTH
$index = array("one"=>1,"two"=>155, "three"=>1679);
echo "
";
echo str_pad("This is the title",50," ",STR_PAD_BOTH)."n";
foreach($index as $inkey=>$inval )
echo str_pad($inkey,30,".").str_pad($inval,20,".",STR_PAD_LEFT)."n";
echo "
";
--------- ----------Output results---------------------------------------- ---
This is the title
one...................................... .....1
two........................................ ..155
three........................................1679
-- -------------------------------------------------- ------------------
string strtolower(string subject)//Convert to lowercase
string strtoupper(string subject)//Convert to uppercase
string ucfirst(string subject)// Capitalize the first letter of each word
string ucwords(string subject)//Capital the first letter of each word
string ltrim(string subject)//Remove the left blank
string rtrim(string subject)//Remove the right blank
string trim(string subject) Left and right whitespace, whitespace includes null, tab character, newline character, carriage return character and space
string n12br(string source)//Convert the newline character represented by n to
mark
3. String comparison
integer strcmp(sting str1 , string str2) //str1 is greater than str2 and returns -1. str1 is less than str2 and returns 1. If str1 and str2 are equal, return 0.
integer strmcmp(sting str1, string str2, integer length) //The third parameter limits the comparison of length characters.
print strcmp("aardvark","aardwolf");
print strncmp("aardvark","aardwolf",4);
---------------------Output results ----------------------------------------
-10
------ -------------------------------------------------- -------------
strcasecmp() and strncasecmp() are case-insensitive comparison functions
4. Find and extract substrings
string substr(sting source,integer start[,integer length])//Take length characters from start
start and length can use negative values
$var = "abcdefgh";
print substr($var,2);//Start counting from 0
print substr($var ,2,3);
print substr($var,-1);//Start from the end of the string
print substr($var,-5,2);
print substr($var,-5,-2 );
---------------------Output result------------------------ ----------------
cdefgh
cde
h
de
def
----------------------- -----------------------------------------------
integer strpos( string haystack,string needle[,integer offset])//Find the position of the substring and return the first occurrence.
integer strrpos(string haystack,string needle)//Only search for a single character (only take the first for multiple characters ), returns the index of the last occurrence.
There are also common functions for extracting the found part from a string
string strstr(string haystack,string needle)//It is not case sensitive
string stristr(string haystack,string needle) )//Case sensitive
string strrchr(string haystack,sting needle)
**************** array explode(string separator,string subject[,integer limit])//Return a string array
array implode(string glue,array pieces)//Return a string
////////////////////////////Code segment///// /////////////////////////////////////
$guest = "this is a string";
$guestArray = explode(" ",$guest);
var_dump($guestArray);
sort($guestArray);
echo implode(",",$guestArray);
/////////////// ///////////////////////////////////////////////////// ////////
------------------------Output results------------------ -----------------------
array(4) { [0]=> string(4) "this" [1]=> string(2 ) "is" [2]=> string(1) "a" [3]=> string(6) "string" }a,is,string,this
------------------------------------------------ -----------------------------
5. Replace characters and substrings
string substr_replace(string source,string replace,int start[,int length])
The above introduces the common sense of mySQL traversing strings and PHP strings, including the content of mySQL traversing strings. I hope it will be helpful to friends who are interested in PHP tutorials.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.
