Skip to main content

perl和python到底哪个好?



tab就是tab,跟空格没关系,显示成几个空格是editor决定的
【 在 NKVD (Chuikov) 的大作中提到: 】
: 这个tab咋办?
: 有时候是4个空格,有时候是8个,3个,6个

perl is stronger in text processing.
python code is cleaner, and has more scientific packages than perl.

根据你的要求(文本处理,个人使用),我个人推荐你用Perl:
Python简单直观易读,但是Regular Expression是外部模块,不是语言本身内嵌的,用
起来有点别扭。
Perl处理文本是最爽的,各种库稳定,文档齐全。
Ruby很多地方借鉴了Perl,OO做的很纯,什么都是对象(连class都是对象),就语言本身
而言,我最喜欢Ruby,但是库的积累和文档跟前两个语言差太大了。



【 在 sysno (十六) 的大作中提到: 】
: 根据你的要求(文本处理,个人使用),我个人推荐你用Perl:
: Python简单直观易读,但是Regular Expression是外部模块,不是语言本身内嵌的,用
: 起来有点别扭。
這個批評是合理的。
不過Perl 還是很難讀,適合用過就丟的。
: Perl处理文本是最爽的,各种库稳定,文档齐全。
: Ruby很多地方借鉴了Perl,OO做的很纯,什么都是对象(连class都是对象),就语言本身
: 而言,我最喜欢Ruby,但是库的积累和文档跟前两个语言差太大了。
小日本發明的 Ruby 是有長處, 不過主要還是因為RoR 才帶動起來的,語言
設計本身只是普通而已。





Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...