Home Backend Development PHP Tutorial list-each-while traverse array

list-each-while traverse array

Jul 29, 2016 am 09:15 AM
key quot

$name = array(
		'孟子','孔子','孙子','老子'
	);
while($ele = each($name)){
		$key = $ele['key']; // == $ele[0]
		$value = $ele['value']; // $ele[2]
		var_dump($key,$value);
		echo "<br>";
	}
Copy after login

Although this is not commonly used, it is very useful for understanding the concept of array pointers (the best is to use foreach)

It can also be upgraded, using the List structure

The List structure uses an indexarray to initialize multiple arrays at the same time variables

$arr = array(0=>"some",1=>"many",2=>"much");
	list($v1,$v2,$v3) = $arr;
	var_dump($v1,$v2,$v3);
Copy after login

so it is optimized like this

	while(list($key,$value) = each($name)){
		// $key = $ele['key']; // == $ele[0]
		// $value = $ele['value']; // $ele[2]
		var_dump($key,$value);
		echo "<br>";
	}
Copy after login

The above introduces list-each-while traversing arrays, including aspects of it. I hope it will be helpful to friends who are interested in PHP tutorials.

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

What does the identity attribute in SQL mean? What does the identity attribute in SQL mean? Feb 19, 2024 am 11:24 AM

What is Identity in SQL? Specific code examples are needed. In SQL, Identity is a special data type used to generate auto-incrementing numbers. It is often used to uniquely identify each row of data in a table. The Identity column is often used in conjunction with the primary key column to ensure that each record has a unique identifier. This article will detail how to use Identity and some practical code examples. The basic way to use Identity is to use Identit when creating a table.

How SpringBoot monitors redis Key change events How SpringBoot monitors redis Key change events May 26, 2023 pm 01:55 PM

1. Function Overview Keyspace notification allows clients to receive events that modify Rediskey changes in some way by subscribing to channels or patterns. All commands that modify key keys. All keys that received the LPUSHkeyvalue[value…] command. All expired keys in the db database. Events are distributed through Redis's subscription and publishing functions (pub/sub), so all clients that support subscription and publishing functions can directly use the keyspace notification function without any modifications. Because the current subscription and publishing functions of Redis adopt a fireandforget strategy, if your program

Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices Sep 04, 2024 pm 06:32 PM

An unpatchable Yubico two-factor authentication key vulnerability has broken the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. The Feitian A22 JavaCard and other devices using Infineon SLB96xx series TPMs are also vulnerable.All

How to solve the problem of batch deletion of key values ​​in redis How to solve the problem of batch deletion of key values ​​in redis May 31, 2023 am 08:59 AM

Problems encountered: During the development process, you will encounter keys that need to be deleted in batches according to certain rules, such as login_logID (ID is a variable). Now you need to delete data such as "login_log*", but redis itself only has batch query. Command keys for class key values, but there is no command for batch deletion of a certain class. Solution: Query first, then delete, use xargs to pass parameters (xargs can convert pipe or standard input (stdin) data into command line parameters), execute the query statement first, and then remove the queried key value and the original del parameters. delete. redis-cliKEYSkey* (search condition)|xargsr

php提交表单通过后,弹出的对话框怎样在当前页弹出,该如何解决 php提交表单通过后,弹出的对话框怎样在当前页弹出,该如何解决 Jun 13, 2016 am 10:23 AM

php提交表单通过后,弹出的对话框怎样在当前页弹出php提交表单通过后,弹出的对话框怎样在当前页弹出而不是在空白页弹出?想实现这样的效果:而不是空白页弹出:------解决方案--------------------如果你的验证用PHP在后端,那么就用Ajax;仅供参考:HTML code

How to determine whether a JSONObject contains a certain key in Java? How to determine whether a JSONObject contains a certain key in Java? May 08, 2023 pm 12:25 PM

Determine whether a KeyJSONObject exists in JSONObjectjsonObj=newJSONObject();jsonObj.put("version","1.0.0");//version number jsonObj.put("encoding","UTF-8");//encoding method Determine whether the vesion attribute exists in jsonObject jsonObj.has("version");//Return true to check whether the k exists in the json string

How to implement Redis tens of billions of key storage solutions How to implement Redis tens of billions of key storage solutions May 30, 2023 pm 05:44 PM

1. Demand background This application scenario is a DMP cache storage requirement. DMP needs to manage a lot of third-party ID data, including the mapping relationship between each media cookie and its own cookie (hereinafter collectively referred to as superid), as well as the superid’s population tag, mobile Population tags of terminal IDs (mainly IDFA and imei), as well as some blacklist IDs, IPs and other data. It is not difficult to store hundreds of billions of records offline with the help of HDFS. However, DMP also needs to provide millisecond-level real-time queries. Since the cookie ID itself is unstable, the browsing behavior of many real users will result in the generation of a large number of new cookies. Only mappi can be synchronized in a timely manner.

How to get all keys in redis How to get all keys in redis May 28, 2023 pm 03:40 PM

Keys: Full traverse keys, used to list all keys that meet specific regular string rules. Assuming that redis is in a production environment at this time, using this command will cause hidden dangers. When the amount of redis data is relatively large: keys will be returned at once All keys that meet the conditions will cause redis to freeze. SCAN is a cursor-based iterator that needs to continue the previous iteration process based on the last cursor. SCAN starts a new iteration with 0 as the cursor until the command returns cursor 0 to complete a traversal. This command does not guarantee that each execution will return a given number of elements, or even 0 elements. However, as long as the cursor is not 0, the program will not consider the SCAN command to have ended, but the number of elements returned

See all articles