So you incremented your pointer o. You're sort of lucky the compiler initialized your array.
Example? http://ideone.com/qijRC1
So at line 3 o is point at out(0) and after line 4 o is pointing to out[1]. Code is not broke?
So you incremented your pointer o. You're sort of lucky the compiler initialized your array.
Example? http://ideone.com/qijRC1
So at line 3 o is point at out(0) and after line 4 o is pointing to out[1]. Code is not broke?
Show your work so far.
As to character making, https://www.google.com/search?q=How+to+create+a+character+for+my+game&ie=utf-8&oe=utf-8 is a start. You have some thousand ways to create characters. Some don't require graphics. Remember Zork?
Let's pick on https://support.microsoft.com/en-us/kb/3080079
That's an update for Remote Desktop. Do you use that? if not, then ignore it.
http://www.bleepingcomputer.com/forums/t/595406/do-i-need-these-downloads/ repeats that advice about ignoring updates on things we don't use.
You have 16? KB numbers to research to see if any are really required.
I see you supply the error codes but the KBnnnnnn numbers are missing. Here's a thing. Microsoft does have failing patches. They fail, the reports accumulate and Microsoft re-issues a patch.
Without the KB numbers it's hard to see if this is expected or not.
To OP. OK you dumped how many hundred lines of code and ask to fix the errors but didn't list the errors.
Ask yourself if others will have the same compiler, settings, IDE and more. Try sharing the first error and see if others can point out why.
PS. Why does your code look so much like http://www.cplusplus.com/forum/beginner/6840/ ?
If you re-use code, cite source, etc.
The neat part of the web today is that many systems and code is on the web. While students should write their own stuff, if you need an app you can modify then start with research like https://www.google.com/search?q=Student+Course+Registration&ie=utf-8&oe=utf-8#q=Student+Course+Registration+in+c%2B%2B
First you need to tell more why you used the word "applets" since you could mean you want a web browser to run this. If so you have an embarrassment of riches to pick from for plotting. Example? https://www.google.com/#q=online+java+data+plotter
As to collecting the items into your array, that's something you should have been coding before you tackle a plotting system. So break that off into it's own piece of work.
pradeg. Avoid old posts. http://www.techrepublic.com/forums/questions/how-do-i-replace-the-cmos-battery-on-a-vaio-laptop/ and many other priors about some models don't power up with old batteries. This includes the CMOS battery. Again, don't bury your post.
Omimo, I see it's your first post so welcome. But if I do a little search like https://www.google.com/#q=mysql+save+picture+in+database+c%23 it appears there are priors.
Care to share a bit more what's up?
Just thinking here. A long time ago we needed to no have plain text just floating around with ticket details. So way way back then we used a single ROT13 on the strings before sending it across the network. I wonder if as simple as that. Don't let plain text details be easy to pick off the apps or across the wire.
Is this your assignment or something else? http://www.thirumal.in/2012/01/replacing-characters-in-file-c.html looks complete but if this is homework, ignore the web and write something. Share your code and tell why you think it didn't work.
If we keep optimizing we see we don't need to track both odd and even. We could save many CPU cycles by only counting odd or even then for the other value, use something like 100 - even for the odd count. One less variable, many fewer CPU cycles and less CO2 emissions.
Bit slicing is a good start but the discussions I had called it as possibly broken because usually the pieces of the puzzle are picked up at one time over the same pipe. To break that think about using another pipe such as text messages or a picture over MMS and steganography. Now that is something that would be beautiful to behold.
This has roots way back to Roman times with flag signals that not all the flags could be seen by the enemy. If you ship the message entirely over the internet, well, you can see it can be decoded as they have it all. Break it across other carriers and they don't have the full message.
I'm sorry, I thought this the how is it was about the back door to encryption. It's been over a decade since I was in a legal meeting about this area. Since the USA deemed Crytography to be munitions the only way we could sell the product was to do what the US GOV dictated.
But the USA exterts other forces on crypto even if you are out of the USA. I wrote the USA has not entirely released control of DNS root servers but didn't supply any link about that tactic.
-> As to the bit slicing, it suffers from the fact that the bits still arrive at some computer through the same interface. I hope someone will broach this subject on its own but imagine if you didn't get all your bits from the internet. Slice it up and use other data paths to the final destination. At a very high level, parts arrive from the internet, other parts via text messages and maybe some more via steganography.
By mandating the back door, crypto in the wild has proliferated.
In parting the most onerous government I had to deal with was Germany. Their telecom laws were from, well, WW2 days. That was in the 90's and even working for a very large company at the time, Germany's telecom laws were unbelievable when we read them. They've softened over time but in the 90's there were large fines for illegal importation of computer modems.
Oh, Canada? I lived in …
If I use Lavabit as an example, it appears that the current USA government is successfully suppressing secure email in the USA. You have to be elsewhere to avoid US interference in your secure email company. And then that's not true either. Since your system might rely on the internet the US Dept. Of Commerce still exerts control.
To get secure again in the USA you may have to stay under the radar and not tell anyone your underlying comms are encrypted.
Truthfully I am ashamed of the treatment of the folk I mentioned in this thread.
Good question. Any time folk ask me about email privacy I use what happened to Lavabit as a primer on well, many subtopics as to email security and encryption.
To top it off, if you do develop a new encryption your government may hound you for these backdoors. Need an example? Pretty Good Privacy's author was hounded for years after he released Pretty Good Privacy as shareware.
So let's get to what may be at the root of this issue. How about?
Cryptography programs are classified as munitions under federal law and may not be exported.
If you didn't recover this in the past year, it's gone. You asked this question on Dec 9, 2013 at
http://www.experts-exchange.com/questions/28314072/Recovering-MS-Word-2010-Document.html
Or you are a shill.
Line 16 looks like you'll get 101 numbers.
Why not initialize even and odd to zero on lines 13 and 14.
Line 22 would be simply even++ and I'll let you guess what line 24 would be.
What is this about boolean?
So I have to take this as if you want a ready to submit project to your professor without you doing the work or research? The PDF looked complete to me and on google there's more. If this is that hard, why not ask the prof how to get a tutor?
Outlook didn't use dbx and well, there are spammers that will share dbx recovery apps. My favorite Outlook Express dbx recovery is from my backups. Then again I haven't had to do that in over a decade. So what next? Try Firefox and import the DBX. How is on the web.
Oh, and those spammers? They'll show up soon enough. You usually can spot them by the number of posts they made. 1 is a bad sign.
@ressenjack, the PDF looks to have flowcharts and code. And there are more if you research it on the web.
http://midas.herts.ac.uk/reports/reports2008/05112913.pdf looks pretty complete. It was their paper so should suffice. Be sure to give attribute as needed.
That sounds like a failed LCD. I've seen such failures and I can't offer much more since your post is very light on the PC details.
Sure. Look at tools like https://www.pdflabs.com/docs/pdftk-cli-examples/ where it has a command line to set the password as you wish. Then offer that file for download.
Why does this look so much like http://stackoverflow.com/questions/34733653/how-calculate-cbo-coupling-between-objects-in-java
Anyhow, there were prior answers that tracked some source code for you to get this code metric. I don't write my own code analyzers since there are so many nice ones today. But I do tend to use open source when I want to see what happens underneath.
I see no code and this looks to be your fourth post about this. Try supplying code and more "specs." That is, there are code examiners on the web with source for you to dissect or just use the result.
Peter, now I'm confused.
You wrote you tried some displayport to HDMI on both laptops. Now you are going to get some thunderbolt to displayport and guessing here you are going to use that cable that didn't work on 2 laptops? The outlook is not good from here. I don't expect that to work either.
I tried to not be blunt but here goes. Many "cables" don't work. It's why I just get the Apple adapter.
If there is some HDMI issue I test that with some BluRay player or other HDMI source.
"It's complicated." Read https://support.apple.com/en-us/HT204388 and the links there in. Not all cables work. When I need this to work I buy the Apple adapter.
Glad you found it was one of the usual.
Look around for the old but still usefull HP USB FORMATTING tool.
Well, yes. Since you noted registry I dug up this old thing. https://blogs.msdn.microsoft.com/oldnewthing/20060222-11/?p=32193
That's 200,000 cycles so here I notice W10 to be more spry in that area. You may also see changes in .NET CLR performance across platforms. Not to mention other things like CPU, RAM, HDD and an antivirus that examines registry access.
Wish it was one thing, but it's not.
Here that paste is under 10 bucks and given the age, I never guess. I do this.
http://www.howtogeek.com/96805/how-to-reset-your-windows-password-without-an-install-cd/ is one of the thousands of prior discussions where folk tinker with drivers and more. However the 32GB RAM may be a clue here. Try this as a test run. Try it with a single stick of memory.
The Apricom kit with boot CD and USB cable for laptop drive cloning has saved me so much time that I rarely have to try the old ways (Clonezilla, Gparted, etc.)
The deal is you must find your own way if you must set out on paths less traveled or new.
The thing is, I left such to our "Build Meister." I recall him pointing me to https://msdn.microsoft.com/library/fda2bad5 about setup if I wanted to duplicate their work on this. Sometimes I'm thankful to be on a bigger team where such areas are split out.
@S
Woah, what is this about diskpart and ouch ouch ouch, that's going to leave a mark.
What I mean is that I see folk go down that road and they restored a partition and never restored the boot areas. The backups I made with the titles I noted restore the whole shebang. If I restore a partition, I only get that. Most folk want to restore the boot area, the OS and everything. So what a mess.
-> Let me take a swipe at the Windows Recovery issue. Just last month I had one like that. Here's my quick rundown.
1. Set the bios to allow CD boot of GPARTED (no secure boot, CSM, etc.)
2. remove all partitions.
3. Set the bios back to secure boot, CSM off and the ODD as the first boot item (or use the machine's boot selection.)
4. Now the machine's maker's factory recovery discs work. (Not to be confused with those Windows Recovery Discs.)
Siberian,
I didn't tell all. I had to hit the BIOS and turn off Secure Boot as enable CSM to do the clone job. Then to boot Windows 10 I had to turn on Secure Boot and disable CSM.
This varies with each PC so tailor this to your PC and software choices.
I've used Clonezilla to backup a complete HDD to a folder on the other drive. USB not required.
TODO Backup has it's own system so I defer to them.
My solution was to ignore MSFT's backup system. It failed for so many, and with nice alternatives I never looked back.
Let's hope folk can fix this. I ran into so many issues with MSFT's backup over the years I no longer use that. I use a few other apps and systems now.
I have to ask. Since this has been done so many times before ( https://www.google.com/#q=todo+in+html5 ) why not pick over prior ToDo systems?
When this happens I try that HP USB FORMATTER you can find on the web. Some USB Flash Drives fail and will never format again. But you will see clients ask you to try to save the drive. More at https://www.google.com/#q=linux+how+to+format+usb+drive
That didn't work for me. What did work was to run 7 then take the offer for the 10 upgrade. After 10 is running the PC is now marked as "good for 10" with a hardware hash so no key is required.
Now the clean install works.
Your method is not one I found to work.
Tip? When I start reading about a new area I use a search like this for tutorials.
https://www.google.com/#q=dbus+tutorial
Then I click on videos to watch a seminar or such.
@toxicandy.
I've lost count of how many company internal web sites fault like this only to discover the developer is long gone. The usual is to find what works then issue a company process guide that tells the users to use IE, Firefox or what works.
Sometimes the company just does that and doesn't migrate for another decade.
That said, over the years I've taken pain and time to document "How to build" the apps I've deployed over the years. You can imagine that after a decade even I won't remember such detail and sometimes I read my now ancient "How to build and deploy" document and wonder who wrote it. Then I remember and go "Oh, that was me."
Since both allow you to create anything you can imagine, my guess is that you are just starting out.
Why not go with your target audience to get the most exposure to your clients?
Seems there was a bug years ago ( http://www.dba-oracle.com/sf_ora_00907_missing_right_parenthesis.htm ) so there's that and you need to print/debug those variables to see if it's clean.
http://caniuse.com/#feat=srcset seems to note it's mostly an IE issue but since IE is mostly on Windows PCs of big screens you have to decide to let it be just so for IE and the rest look good to go.
-> Here's a thing. No matter what element or code you can always find a browser that has an issue.
My buddies that deal with web content learned long ago to write for the platforms they want to target and never fall into the "all browser" trap.