Your post and question self answers. If you can't create or manage then you answered your question but maybe you didn't ask the right question.
Try again?
Your post and question self answers. If you can't create or manage then you answered your question but maybe you didn't ask the right question.
Try again?
@a, now I've really worried that you told the truth about new to this. Did you skip classes and not complete prior homework? The reason I ask is what you supplied is the beginning and classes build on prior lessons adding as you go.
I would find it hard to believe you were given this assignment without having to write a small thing that would ask for some information.
I want you to think if someone gave this request to you just like above. You may wonder why they were so short and more.
Read https://www.daniweb.com/programming/threads/435023/read-this-before-posting-a-question so you know how forums work then try again. Remember that if you are hiring or paying for this work to supply that pay rate and more details.
I get the feeling you want to debate if a return statement is required. This is a well discussed area and I will not debate this. If this was submitted as a class assignment you would be marked down a grade level. Why?
But in the end, flowing off the end of a non-void function still is undefined behavior. It might work on certain compilers, but it is not and never was guaranteed to. - https://stackoverflow.com/questions/32513793/c-and-c-functions-without-a-return-statement
So my question to you is why there is no return there. You need to be ready to answer that to your boss or professor.
Why doesn't void split() have a return statement?
Just a tip. Many wheels can be had from stock. That is, functions like the test for prime has many ready to use solutions. Bolt that on and run.
Look at the is_prime() function in C at https://rosettacode.org/wiki/AKS_test_for_primes
Rosettcode is a treasure trove of ready to use functions.
@J
If it's just an account password issue, www.lostpassword.com is my advice when NTPASSWD (see google) doesn't cut it.
About your second question. Many Microsoft versions do that until the OS is installed. You might have to install a driver or activate a drive after the installation.
Not a bad start. I worry that you are selling blogs here. Let me comment that I see less and less folk follow the blogs.
What's working around here are the video blogs.
Example: "Leonard French, your favorite Internet copyright attorney."
A fine example where something that can be interesting to some is moved from where it would be far too heavy in a blog but works in a video blog.
Remember we don't have to login. Besides, running this infected machine can lead to further damage.
It's like you are fire and insist on running. I read above advice about getting your files out. This is a standard routine. You get the drive over to some Linux box to copy out your files. If you know they can be decrypted, then you have your files and head to your decryption methods.
Remember you write it is decryptable so that means you know how. What you don't know is how to get the files out.
That would be the old standard routine. Remove drive from infected PC, boot Linux and get the files copied out to where you can work on them.
I think at this point we are going in circles. I get it that folk want a choice of the red or blue pill that will just fix it but this is mildly complicated work. Not impossible, just complicated. It might be scary to those that never booted Linux or moved drives around.
Glad to read you haven't taken to drink yet.
@J
We have to tackle this step by step. Remember that ransomware does not always encode files. It appears that recent ransomware is just wiping out files and hope you pay. They keep the money and have no decoder.
-> You have now stepped into the disaster plan with both feet. That is, you know you need to obtain your OS DVD, go get a Linux (too easy, I hope anyone that runs Windows Server knows how to go get this) and most of all, backups. If these files are irreplaceable then they are on backups. If not, they weren't worth backing up?
Some folk lash out over such events. I feel for them but for many that don't backup, don't have a disaster plan and run a loose ship that ransomware was installed by the user/owner/someone (so far I have yet to find an instance of a drive by ransonware.) Let's call it their Waterloo. They get soundly trounced and if they survive, they become a steadfast believer in backups and disaster plans.
I think about 2 or 3 out of 100 swear off Windows forever and 1 will toss the entire system in the bin and hide out on their smart phone.
BACK TO DECRYPTING. Since we have the new ransomware and a few you can decode the problem now is:
What Ransomware is it?
That's the big question since if you don't know the name of the daemon you can't be sure how to decrypt it.
You raised a lot of issues here. It's unclear why there is no installation CD (it's more likely to be a DVD) since well, it's one of the things you need to fix issues from time to time. I know with all the natural disasters there's a reason to be in such a pickle but I'd take the owner of such a server to task about being lax in regards to the company disaster plan.
But here we are. My bet is you'll have to remove drives so you can on a machine running Linux which as write by cereal will not execute any code but allow full access to backup what you want if the backups were not done. Linux will also let me copy in a file, edit if need be. But this is your support staff skills and not something you may find on the web as a step by step. In short, get the drives out and backup, then attempt a fix from another OS. That OS will likely be Linux.
Microsoft still sells Server 2012 media if you can't find a copy on the web. Once in a while I find an IT staffer flailing about, unwilling to pay the man for the media. I can't imagine why they delay.
Time to find that author. A lot has changed in browsers over the years. Find them and ask if there are other changes required. All I found so far is you jumped in, and well, not my code so I can only point out obvious omissions.
Read the rest of the replies at the link given.
You may want to read the notes again. I didn't read it as "remove" but edit/change.
It appears that is Chrome only and 3 years ago. In a reply at your YouTube link you find:
PROBLEM: Be aware that this code in video will only work in chrome. (even in 2014!) BUT I have managed to make this work in firefox also:
You need to modify the
"context = new webkitAudioContext();" to:
I think you need to read what they changed in the replies there.
Now is the time to use the Java switch and case to clean up that code. You've if'd your way into a hole. Switch that to readable code now.
Tutorial at https://www.tutorialspoint.com/java/switch_statement_in_java.htm
I don't know the full code base but let's check a thing. In your reply above "Like this?" tell me if the mysql_fetch_row supplies or changes the value adding_to_member_flag. Why it matters is that your compiler may do that test first as it is low cost.
If you want to assure that mysql_fetch_row executes before the test of adding_to_member_flag, be sure each test is on it's own if. Like this:
`
if(!(row1 = mysql_fetch_row(result1)))
if (adding_to_member_flag != 1)
{
}`
Not too bad. I usually see a lot more errors on sites like that.
Read https://validator.w3.org/nu/?doc=http%3A%2F%2Fkodibeginner.com%2F and a few should be easy to clean up.
I'm reading
Opening Your Access 2000, Access 2002, or Access 2003 Application in Access 2007
From https://msdn.microsoft.com/en-us/library/bb203849(v=office.12).aspx
Why the claim you can't change to a current version?
Also, at only 36 meagerbytes why isn't the backup hourly?
Sorry no. I'm more of a VNC and telnet over ssh type person.
Wait, didn't I read in SEO circles to not bother with Alexa ranking? Why bother?
Look carefully at your use of left and right parentheses on line 1.
Did you mean to compare gets(line, sizeof line, stdin) && sscanf_counter to not be equal to 2?
Or did you mean gets(line, sizeof line, stdin) then and the next condition.
Be clear about that. Don't rely on "a C compiler works like this."
There's a problem with your request. You didn't define the parameters for performance so without that, what you think is best is not known.
If you just need a handle on performance testing you can research that with google. I like to check sites with the W3C checks.
Let's see how you did.
Over 400 errors at https://validator.w3.org/nu/?doc=https%3A%2F%2Fwww.sellist.com%2F
I can see why you think there are performance issues. You may want to have a talk with your web master.
I went back to the pages and areas do look dated. Especially the references to Android 4.x. which is about 4 years ago.
I didn't want to upset you but the docs definitely have the feel that those that run this project may have moved on.
Here's my advice. Hunt down who runs this project and try to contact them directly about where to get support.
I think we need to talk about how most forums work. This link: https://www.daniweb.com/programming/threads/435023/read-this-before-posting-a-question covers a lot so you can get going in the right direction.
Now if you need to hire a programmer, that's covered too as you would post in the for hire section:
https://www.daniweb.com/community-center/for-hire-hiring/52
The concept of these forums vary. In this forum you would read the first link and share an error and maybe a cutdown version of where the error happened.
But if you need someone to take on your entire development, then you may be looking to hire someone. Or take on an intern. Many lecture schedules I ran into were for schools so as the teacher you can find a way to give course credits in lieu of pay.
Sadly this seems to never have a short answer. Read https://forum.ionicframework.com/t/cant-run-npm-install/103573/22 where they go round and round and a short explainer at the end.
When this question comes up, I reply with "never store passwords in a database." You can store the names but never the passwords.
So you may wonder how to verify that password? We store the one way encrypted password and then encrypt the offered password and then compare.
This way if your database is leaked they don't get the passwords that as you know folk tend to use the same all over.
More at https://www.google.com/search?q=never+store+passwords
Not the wrong place but it appears you can pick over priors for the basics such as https://www.google.com/search?q=java+source+to+take+words+from+a+list+(or+three)+to+create+a+random+sentence
This still means you get to deal with the Android front end to your app but the sentence, random and more is out there for you to re-use.
@S.
The best tools are what you can wield and create results. Now I'm not an expert on Android Studio but I will share that I'm up to my neck using AS.
Let me share the story as much as I can due to client agreements. The client is one of my oldest and they tried outsourcing and they ended up with a collection of tools like Eclipse and all the other parts in order to make an Android developer system. So setting up is a PITR. After they called it quits with a few outsource places they can back to me with a problem/bug that needing fixing. For some reason I didn't get into the Eclipse setup they told me just wouldn't compile their project. Given the 30 day deadline I went back to AS and the project loaded and compiled. I was then able to address the issues.
So my thought is you have to choose the tools that work for you. In the case of Android work, AS is my go to solution since I need it to just work. I do not want to be mired in "production hell." (thanks Tesla.)
@Catherine. Great idea but what if I want to automate this? Does GS Richcopy 360 offer a command line version?
@C. Ahh, threads from the command line is interesting. I don't have an Apple here so you may have to do some testing but...
On Linux you just type in the command and then add the ampersand to detach and let it run.
Example: https://www.tecmint.com/run-linux-command-process-in-background-detach-process/
On Windows it's nutty. You use the START command then your command.
On Apple? I think they are BSDish so try the same ampersand. Read https://www.cyberciti.biz/tips/freebsd-job-management.html
Another at http://commandlinemac.blogspot.com/2008/12/bash-job-control-fg-bg-jobs-and-ctrl-z.html but not as succinct.
@Charles. It was just one of those no-code ideas. The problem is that to benchmark this you have to run it twice and take the second time runs to even out caching effects. Same for the PHP test.
Anyhow, if I had to do this, the commands would be my first release so the job is up and running. If it's just a matter of 5 minutes vs 10 minutes then you have to think about ROI. That is, to code it up to go faster, how much time will your programmer be using up?
I wonder if this is just something we can use Linux, UNIX or your OS's command lines to get done.
Be aware that your top post wrote one way but in a later post you write:
So every file is formatted one serial number per line like below:
For example "uniq" has a method to not only strip repeats but count them. See the -c option at https://www.computerhope.com/unix/uuniq.htm
OK, so let's say I run this file through uniq with the -c. Now I can strip that to the 1's and the 3's with any number of methods or commands.
Why code this?
That's an odd question since when a CPU gets sick, you see all sorts of problems from The Dead PC to BSODs and corrupted drives.
But that aside, how about https://downloadcenter.intel.com/download/19792/Intel-Processor-Diagnostic-Tool
You can google one for AMD, others.
As to obstinate. "stubbornly refusing to change one's opinion or chosen course of action, despite attempts to persuade one to do so."
I had hoped you would restate your question along with necessary details so everyone can have a chance at helping you out.
My view here is you can easily make a new post and ask the question you meant to ask.
I know stuff but if you won't make a post with a clear request along with details about the host, what script languages and servers (web, SQL, etc.) then who can offer a script you might be able to use?
Also, you may be done with me since our SQL of choice at office and field is MySQL. You appear to be on a MSFT SQL so you'll want to chat with folk that run that system.
It's like you asking me for a tire for your car but you won't reveal the old tire size or make, model and if stock.
Example:
Q. Can my tire be replaced?
A. Yes.
Now if we discover you have a Ford Model T from 1908, then I was indeed wrong and should have answered maybe.
Why not make a clear post about what you want along with information so others can answer?
@Deamanjoe. I took a stab at your assignment googling the your top question. Now while that finds the assignment completed on a few sites, that's going to not get you there as far as what happens next. What happens next is the next assignment may be building on what you learn here.
There are free courses in Java such as https://www.google.com/search?q=online+java+courses
And there is plenty of discussion, docs and books online. But here's the hard part. You have to research, read and build your skills. Anyone that writes the code for you deprives you of learning not only how to code this assignment but how to do research today.
Why does this look similar or same as https://www.daniweb.com/programming/software-development/threads/510309/substring-counter#post2228065
While I don't see the end of the while loop, it appears to me it will do one last print before exit. You could fix that and move on.
Such as line 16 change it to
if (active) print .....
Seems easy to polish up.
I think a lot of this will depend on the size of your new job/ad/biz content company. If you look at your competitors like Monster, LinkedIn and so on, they have invested a lot of time in their product (their web site, apps and sales force.)
I'm going to give a nod to Dazah here. I wonder if you could use that. I'm sure Dani would love to talk about it. Just ask her.
My thought here is there are waiting window messages. I don't know if you have background in how Windows works but your change to visiable is in a message and your code didn't break yet so the message isn't processed yet.
https://msdn.microsoft.com/en-us/library/system.windows.forms.application.doevents(v=vs.110).aspx notes an example where we need to call this to process those messages.
Modems come in various designs. We have classic ones that connect to some RS232 Serial Port that we rarely have to install any drivers and can test with AT commands, then WinModems that were slipped into some PCI slot and were generally thought to be the Devil's spawn. Now we have USB Modems that well, don't work at all on most PCs except when you follow the directions.
You may have to tell a lot more.
OK, opened up the source and there is some animated thing there that has a play button but here's the PNG that Edge didn't work with:
http://fresway.com/images/hover.png
I need to see if the PNG is using indexed color or not. Why?
https://www.google.com/search?client=opera&q=IE+does+support+transparency+in+indexed-color+PNG+images
Just for this I opened that URL in Opera and the image had a video play button on the left rainbow effect.
Maybe that's not a PNG at all?
I thought Microsoft's attempt to put one online was hilarious.
Did they take the time to reveal just how badly they do AI?
I think which version PHP matters as I read priors at
https://www.google.com/search?q=preg_replace_callback()%3A+Requires+argument+2
You cut off your error message and didn't reveal which PHP version so my guess is you moved to PHP 7.
In many systems the string resides at some address and here's the trick. Think about how you print that string.
You pass the address of where the string is to the print function. Now to skip the first character, add 1 to the address and pass that address to the print or copy function.
It appears you've been at this for over a year now.
https://angel.co/fakenamez
Can you reveal why you weren't able to attract talent?
In the case of common apps like Tic-Tac-Toe I might defer to https://rosettacode.org/wiki/Tic-tac-toe but if you were to supply other folk's code you would indeed be missing out on the real reason you took the course. I won't tell you why here.
Here's the dictionary for Pander (noun). "Gratify or indulge (an immoral or distasteful desire, need, or habit or a person with such a desire, etc."
There has been a slew of low quality questions from a few members that were done for nothing more than to expose their spam links in the tagline or a shill operation.
We pandered to them by allowing dozens of such low quality questions to stay. They were disingenuous (insincere) members and deserved, in my opinion nothing but a slap of the eject buttons. Did they break the rules? Not directly but did use the rules to stay.
In their case, it became clear over time what the game was and I'm unsure if they were left alone or ejected. This behavior if left unchecked signals "this is OK." This is not OK to me but I understand the desire to let them be as well as why I want them gone.