Skip to main content

标 题: 我初学Python心得

 发信人: xiaxie7 (民科), 信区: Programming
标  题: 我初学Python心得
发信站: BBS 未名空间站 (Fri Feb 26 01:05:49 2021, 美东)

新冠期间窝在家里,决定学一门手艺,正好很多高中生第一门CS都是Python,我也开始
学它。

感觉它就像穷人的劳斯莱斯,虽然运行慢一点,但什么东西都有,很实用。

比方说要处理照片,需要PIL (pillow) library, 就创建一个文本文件:
requirements.txt,里面就一个词: pillow

然后运行:

python -m pip install -r requirements.txt

哈哈,库文件就装好了,就可以开始处理照片了。

这个比Java方便。20年前我学Java3D的时候,一时间不知道怎么把这个API装到现有JDK
目录下,忙乎了一个多小时!

作为从1983年开始学BASIC的53岁老人,我觉得学CS的门槛是越来越低了。

当然,作为Python初学者,我也发现它有些地方很马虎。

我1990年代初学C的时候就不喜欢它的global variable,一大堆全局变量摆在程序最前
面,然后主程序子程序共享很多全局变量。有时候我在一个地方把一个变量改名,然后
忘了在别处做出相应修改,然后就乱套了。

后来学习C++, Java,变量是规规矩矩的OOP,private, protected,default,井井有
条。

今天发现Python又回到了1990年代初,一大堆全局变量!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...