current position:Home>[fun bath] C + + tips -- knowledge points: substr() interception function & replace() replacement function & find lookup function & similar to substring() function in Java
[fun bath] C + + tips -- knowledge points: substr() interception function & replace() replacement function & find lookup function & similar to substring() function in Java
2022-01-26 23:37:06 【Playful bass】
【 Play bass 】C++ tips—— Knowledge point : substr Intercept function & replace Substitution function & find Lookup function & similar JAVA in substring function
Welcome to my WeChat official account. :
Programming Pastor
ID:
bianchengzhizhen
Timely sharing algorithm 、 Computer science and game programming
I am CSDN Blog home page :
https://blog.csdn.net/D16100?spm=1000.2115.3001.5343&type=blog
Welcome to exchange and study
One 、 similar JAVA in substring() function
In the process of processing strings, there are many cases where you need to intercept strings , At this time Java Provided in substring Method to intercept is very convenient
There are two commonly used methods :
① public String substring(int beginIndex)
The string intercepted by this method is from the index beginIndex At the beginning , To the end of the entire string , for example : character string String s = “abcdef”;
call s.substring(2) Indicates the index from the string 2 Start intercepting to the end of the whole string , The intercepted string is cdef
② public String substring(int beginIndex, int endIndex)
The string intercepted by this method is from beginIndex Start , To the string index endIndex - 1 end , That is, the intercepted string does not include endIndex The character corresponding to this index , therefore endIndex The maximum value of is the length of the whole string , Therefore, when using this method, we should pay special attention to the problem that string interception is easy to cross the boundary
C++ in :
Two 、str.substr() function
The header file
#include “cstring”
perhaps <> here CSDN I can't type it out. I don't know why
- string s=“abcdef.ghijklmn”;
- Intercept substring
- s.substr(pos, n)
Intercept s In the from pos Start ( Include 0) Of n A substring of characters , And back to
//s.substr(0,6)= “abcdef”; - s.substr(pos)
Intercept s In the from pos Start ( Include 0) Substrings of all characters to the end , And back to //s.substr(7)=“ghijklmn”;
3、 ... and 、replace() function
- Replace substring
s.replace(pos, n, s1)
use s1 Replace s In the from pos Start ( Include 0) Of n A substring of characters
//s.replace(0,6,“aaaaaa”) ss=“aaaaaa.ghijklmn”;
Four 、find() function
-
Find substring
s.find(s1) lookup s For the first time s1 The location of , And back to ( Include 0) s.rfind(s1) lookup s Last occurrence in s1 The location of , And back to ( Include 0) s.find_first_of(s1) Find in s1 Any character in s The first place in , And back to ( Include 0) s.find_last_of(s1) Find in s1 Any character in s The last place in , And back to ( Include 0) s.fin_first_not_of(s1) lookup s The first of them does not belong to s1 The position of characters in , And back to ( Include 0) s.fin_last_not_of(s1) lookup s The last of these does not belong to s1 The position of characters in , And back to ( Include 0
copyright notice
author[Playful bass],Please bring the original link to reprint, thank you.
https://en.cdmana.com/2022/01/202201262337037297.html
The sidebar is recommended
- Spring IOC container loading process
- [thinking] the difference between singleton mode and static method - object-oriented programming
- Hadoop environment setup (MySQL environment configuration)
- 10 minutes, using node JS creates a real-time early warning system for bad weather!
- Git tool
- Force deduction algorithm - 92 Reverse linked list II
- What is the sub problem of dynamic programming?
- C / C + +: static keyword summary
- Idea does not have the artifacts option when configuring Tomcat
- Anaconda can't open it
guess what you like
-
I don't know how to start this
-
Matlab simulation of transportation optimization algorithm based on PSO
-
MySQL slow log optimization
-
[Vue] as the window is stretched (larger, smaller, wider and higher), the text will not be displayed
-
Popular Linux distributions for embedded computing
-
Suzhou computer research
-
After installing SSL Certificate in Windows + tomcat, the domain name request is not successful. Please answer!!
-
Implementation time output and greetings of jQuery instance
-
The 72 year old uncle became popular. Wu Jing and Guo fan made his story into a film, which made countless dreamers blush
-
How to save computer research
Random recommended
- Springboot implements excel import and export, which is easy to use, and poi can be thrown away
- The final examination subjects of a class are mathematical programming, and the scores are sorted and output from high to low
- Two pronged approach, Tsinghua Professor Pro code JDK and hotspot source code notes, one-time learning to understand
- C + + recursive knapsack problem
- The use of GIT and GitHub and the latest git tutorial are easy to understand -- Video notes of crazy God speaking
- PostgreSQL statement query
- Ignition database test
- Context didn't understand why he got a high salary?, Nginxfair principle
- Bootstrap switch switch control user's guide, springcloud actual combat video
- A list that contains only strings. What other search methods can be used except sequential search
- [matlab path planning] multi ant colony algorithm grid map path planning [including GUI source code 650]
- [matlab path planning] improved genetic algorithm grid map path planning [including source code phase 525]
- Iinternet network path management system
- Appium settings app is not running after 5000ms
- Reactnative foundation - 07 (background image, status bar, statusbar)
- Reactnative foundation - 04 (custom rpx)
- If you want an embedded database (H2, hsql or Derby), please put it on the classpath
- When using stm32g070 Hal library, if you want to write to flash, you must perform an erase. If you don't let it, you can't write continuously.
- Linux checks where the software is installed and what files are installed
- SQL statement fuzzy query and time interval filtering
- 69. Sqrt (x) (c + + problem solving version with vs runnable source program)
- Fresh students are about to graduate. Do you choose Java development or big data?
- Java project: OA management system (java + SSM + bootstrap + MySQL + JSP)
- Titanic passenger survival prediction
- Vectorization of deep learning formula
- Configuration and use of private image warehouse of microservice architect docker
- Relearn JavaScript events
- For someone, delete return 1 and return 0
- How does Java dynamically obtain what type of data is passed? It is used to judge whether the data is the same, dynamic data type
- How does the database cow optimize SQL?
- [data structure] chain structure of binary tree (pre order traversal) (middle order traversal) (post order traversal) (sequence traversal)
- Webpack packaging optimization solution
- 5. Operation element
- Detailed explanation of red and black trees
- redhat7. 9 install database 19C
- Blue Bridge Cup notes: (the given elements are not repeated) complete arrangement (arrangement cannot be repeated, arrangement can be repeated)
- Detailed explanation of springboot default package scanning mechanism and @ componentscan specified scanning path
- How to solve the run-time exception of test times
- Detailed explanation of k8s management tool kubectl
- Android system view memory command