Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Z

Index: D

-d operator : 10.6. The -x File Tests
d, as delete option of tr : 15.5. Transliteration
\d, in regular expressions : 7.3.1. Single-Character Patterns
dangling else, and impossibility of : 4.2. The if/unless Statement
database interface modules : B.2.6. Database Interfaces
databases
fixed-length records in : 17.4. Fixed-Length Random-Access Databases
human-readable : 17.5. Variable-Length ( Text) Databases
managing with the DBM library : 17.1. DBM Databases and DBM Hashes
random-access : 17.4. Fixed-Length Random-Access Databases
daytime server : C.1. A Simple Client
DBM array : 17.1. DBM Databases and DBM Hashes
DBM files : 1.6.16. Maintaining a Last-Good-Guess Database
DBM library : 17.1. DBM Databases and DBM Hashes
dbmclose( ) : 17.2. Opening and Closing DBM Hashes
example of : 1.6.17. The Final Programs
dbmopen( ) : 17.2. Opening and Closing DBM Hashes
examples of
1.6.17. The Final Programs
1.6.16. Maintaining a Last-Good-Guess Database
debugger : D.2. The Debugger
decimal points, in floating-point numbers : 2.2.2. Float Literals
default filehandle : 10.5. Using Filehandles
default values, implemented with || operator : 1.6.9. Making It a Bit More Modular
defensive programming : 15.4. Advanced Sorting
defining a format : 11.2. Defining a Format
delete operator : 5.4.4. The delete Function
delete( ), example of : 17.3. Using a DBM Hash
DeleteKey( ) : 16.6.1. More Registry Operations
deleting characters : 15.5. Transliteration
deleting Registry keys : 16.6.1. More Registry Operations
delimiters, for tr : 15.5. Transliteration
diamond operator (<>)
6.2. Input from the Diamond Operator
17.5. Variable-Length ( Text) Databases
examples of
A.7. Chapter 8, Functions
A.9. Chapter 10, Filehandles and File Tests
A.14. Chapter 15, Other Data Transformation
A.16. Chapter 17, Database Manipulation
7.2. Simple Uses of Regular Expressions
die( ) : 10.4. A Slight Diversion: die
examples of : A.11. Chapter 12, Directory Access
using : 1.6.13. Many Secret Word Files in the Current Directory
directories, renaming files into : 13.2. Renaming a File
directory handles : 12.3. Directory Handles
creating : 12.4. Opening and Closing a Directory Handle
division, operators for : 2.4.1. Operators for Numbers
Documentation : 1.5.1. Documentation
documentation : 1.5.1. Documentation
DomainName module : B.4. Win32 Extensions
dot (.)
as current directory : A.11. Chapter 12, Directory Access
example of : A.7. Chapter 8, Functions
double-quote interpolation : (see variable interpolation)
double-quoted strings : 2.3.2. Double-Quoted Strings
backslash escape and : 2.3.2. Double-Quoted Strings
example of : 1.6.2. Asking Questions and Remembering the Result
hash elements : 5.4.1. The keys Function
variable interpolation : 2.6.4. Interpolation of Scalars into Strings


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.