Flowdock

686 results found for "array"

value=

(WIN32OLE_VARIANT, >= v1_9_1_378 <= v2_6_3)
Importance_1_sm

type does not match variant value type( vartype ), then val is changed to match variant value type( vartype ) before setting val. This method is not available when vartype is VT_ARRAY(except VT_UI1|VT_ARRAY). If the vartype is VT_UI1|VT_ARRAY, the val should be String object.

-

(Array, >= v1_8_6_287 <= v2_6_3)
Importance_1_sm

Array Difference Returns a new array that is a copy of the original array, removing any items that also appear in other_ary . The order is preserved from the original array. It compares elements using their #hash and #eql? methods for efficiency. If you need set-like behavior, see the library

MonitorMixin

Importance_2_sm

compared to reasoning about parallel code that updates a data structure. You can read more about the general principles on the Wikipedia page for Monitors Examples Simple object.extend SynchronizedArray implements an Array with synchronized access to items. This Class is implemented as subclass of Array which includes the MonitorMixin module.

new

(Tempfile, >= v1_8_6_287 <= v2_6_3)
Importance_2_sm

Array with 2 String elements. In the former form, the temporary file’s base name will begin with the given string. In the latter form, the temporary file’s base name will begin with the array’s first element, and end with the second element. For example: Exceptions If Tempfile

primitive_errinfo

(Encoding::Converter, >= v1_9_1_378 <= v2_6_3)
Importance_3_sm

primitive_errinfo returns important information regarding the last error as a 5-element array:

repeated_combination

(Array, >= v1_9_2_180 <= v2_6_3)
Importance_2_sm

When invoked with a block, yields all repeated combinations of length n of elements from the array and then returns the array itself. The implementation makes no guarantees about the order in which the repeated combinations are yielded. If no block is given, an Enumerator is returned instead. Examples:

new

(Addrinfo, >= v1_9_2_180 <= v2_6_3)
Importance_2_sm

array or a string. The array should be compatible to the value of IPSocket#addr or UNIXSocket#addr. The string should be struct sockaddr as generated by Socket.sockaddr_in or Socket.unpack_sockaddr_un. sockaddr examples: “AF_INET”, 46102, “localhost.localdomain”, “127.0.0.1” “AF_INET6”, 42304, “ip6-localhost”, “::1” “AF_UNIX”, “/tmp/sock” Socket.sockaddr

Shellwords

Importance_2_sm

Array . You can use this method to create an escaped string out of an array of tokens separated by a space. In this example we used the literal shortcut for Array.new. Authors Wakou Aoyama Akinori MUSHA <knu@iDaemons.org> Contact Akinori MUSHA <knu@iDaemons.org> (current maintainer) Resources 1: IEEE

benchmark

(Benchmark, >= v1_8_6_287 <= v2_6_3)
Importance_2_sm

array of Benchmark::Tms objects. If the block returns an array of Benchmark::Tms objects, these will be used to format additional lines of output. If labels parameter are given, these are used to label these extra lines. Note: Other methods provide a simpler interface to this one, and are suitable

benchmark

(Benchmark, >= v1_9_1_378 <= v2_6_3)
Importance_2_sm

array of Benchmark::Tms objects. If the block returns an array of Benchmark::Tms objects, these will be used to format additional lines of output. If labels parameter are given, these are used to label these extra lines. Note: Other methods provide a simpler interface to this one, and are suitable

lib/shellwords.rb

Importance_2_sm

Array . You can use this method to create an escaped string out of an array of tokens separated by a space. In this example we used the literal shortcut for Array.new. Authors Wakou Aoyama Akinori MUSHA <knu@iDaemons.org> Contact Akinori MUSHA <knu@iDaemons.org> (current maintainer) Resources 1: IEEE

recvmsg

(BasicSocket, >= v1_9_2_180 <= v2_6_3)
Importance_2_sm

array. mesg is a string of the received message. sender_addrinfo is a sender socket address for connection-less socket. It is an Addrinfo object. For connection-oriented socket such as TCP, sender_addrinfo is platform dependent. rflags is a flags on the received message which is bitwise OR of MSG_* constants

methods

(Object, >= v1_8_6_287 <= v2_6_3)
Importance_2_sm

names of public and protected methods of obj . This will include all the methods accessible in obj’s ancestors. If the optional parameter is false, it returns an array of obj ’s public and protected singleton methods, the array will not include methods in modules included in <i>obj .

slice_before

(Enumerable, >= v1_9_2_180 <= v2_6_3)
Importance_3_sm

true for the element, the element is beginning of a chunk . The === and block is called from the first element to the last element of enum . The result for the first element is ignored. The result enumerator yields the chunked elements as an array. So each method can be called as follows:

push

(Array, >= v1_8_6_287 <= v2_6_3)
Importance_1_sm

Append — Pushes the given object(s) on to the end of this array. This expression returns the array itself, so several appends may be chained together. See also Array#pop for the opposite effect.

Set

Importance_2_sm

Array’s intuitive inter-operation facilities and Hash’s fast lookup. Set is easy to use with Enumerable objects (implementing each ). Most of the initializer methods and binary operators accept generic Enumerable objects besides sets and arrays. An Enumerable object can be converted to Set using the to_set method

new

(CSV::Row, >= v1_9_1_378 <= v2_6_3)
Importance_1_sm

Arrays. If one Array is shorter than the other, it will be padded with nil objects. The optional header_row parameter can be set to true to indicate, via CSV::Row.header_row?() and CSV::Row.field_row?(), that this is a header row. Otherwise, the row is assumes to be a field

rows

(Matrix, >= v1_8_6_287 <= v2_6_3)
Importance_1_sm

Creates a matrix where rows is an array of arrays, each of which is a row of the matrix. If the optional argument copy is false, use the given arrays as the internal structure of the matrix without copying.

permutation

(Array, >= v1_8_7_72 <= v2_6_3)
Importance_2_sm

permutations of length n of the elements of the array, then return the array itself. If n is not specified, yield all permutations of all elements. The implementation makes no guarantees about the order in which the permutations are yielded. If no block is given, an Enumerator is returned instead. Examples:

|

(Array, >= v1_8_6_287 <= v2_6_3)
Importance_1_sm

Set Union — Returns a new array by joining ary with other_ary, excluding any duplicates and preserving the order from the given arrays. It compares elements using their #hash and #eql? methods for efficiency. See also Array#uniq.

add_certificate

(OpenSSL::SSL::SSLContext, >= v2_5_5 <= v2_6_3)
Importance_2_sm

array of OpenSSL::X509::Certificate . When sending a certificate chain, the certificates specified by this are sent following certificate, in the order in the array. Example Note OpenSSL before the version 1.0.2 could handle only one extra chain across all key types. Calling this method discards the chain set previously

scan

(String, >= v1_8_6_287 <= v2_6_3)
Importance_2_sm

each match, a result is generated and either added to the result array or passed to the block. If the pattern contains no groups, each individual result consists of the matched string, $&. If the pattern contains groups, each individual result is itself an array containing one entry per group.

timeouts=

(Resolv::DNS, >= v2_1_10 <= v2_6_3)
Importance_1_sm

array of positive numbers representing timeouts in seconds. If an array is specified, a DNS request will retry and wait for each successive interval in the array until a successful response is received. Specifying nil reverts to the default timeouts: 5, second = 5 * 2 / nameserver_count, 2 * second, 4 * second

tsort

(TSort, >= v2_1_10 <= v2_6_3)
Importance_2_sm

array of nodes. The array is sorted from children to parents, i.e. the first element has no child and the last node has no parent. The graph is represented by each_node and each_child . each_node should have call method which yields for each node in the graph. each

combination

(Array, >= v1_8_7_72 <= v2_6_3)
Importance_2_sm

When invoked with a block, yields all combinations of length n of elements from the array and then returns the array itself. The implementation makes no guarantees about the order in which the combinations are yielded. If no block is given, an Enumerator is returned instead. Examples:

write

(IO, >= v1_9_3_125 <= v2_6_3)
Importance_2_sm

start with “w”, “a”, or “r+”, otherwise it will cause an error. See IO . new for the list of possible modes. :perm integer Specifies the perm argument for open (). :open_args array Specifies arguments for open () as an array. This key can not be used in combination with other keys.

read

(IO, >= v1_8_6_287 <= v2_6_3)
Importance_2_sm

Specifies the mode argument for open (). It must start with an “r”, otherwise it will cause an error. See IO . new for the list of possible modes. :open_args array Specifies arguments for open () as an array. This key can not be used in combination with either :encoding or :mode . Examples:

generate

(JSON, >= v1_9_1_378 <= v2_6_3)
Importance_2_sm

array_nl: a string that is put at the end of a JSON array (default: ”), allow_nan: true if NaN, Infinity, and - Infinity should be generated, otherwise an exception is thrown if these values are encountered. This options defaults to false. max_nesting: The maximum depth of nesting allowed in the data

popen

(IO, >= v1_8_6_287 <= v2_6_3)
Importance_3_sm

Runs the specified command as a subprocess; the subprocess’s standard input and output will be connected to the returned IO object. The PID of the started process can be obtained by IO#pid method. cmd is a string or an array as follows.

caller

(Kernel, >= v1_8_6_287 <= v2_6_3)
Importance_2_sm

array containing strings in the form file:line or file:line: in `method’. The optional start parameter determines the number of initial stack entries to omit from the top of the stack. A second optional length parameter can be used to limit how many entries are returned from the stack