5,331 Posted Topics

Member Avatar for SivaKing

The conio.h header file provides functions for input/output to console (cmd.exe) windows. You say it isn't working. Please be more specific.

Member Avatar for rubberman
0
311
Member Avatar for Mazi007

Try using Google to find tools to do this. There are a number of them.

Member Avatar for Moschops
0
81
Member Avatar for Ritesh_4

First, install the the 2GB DDR2-800 in the A2 slot (assuming the current one is in the A1 slot). See if that works. If so, then, install the 1GB SIMM in the B1 slot. If it doesn't work, install the 2GB SIMM in the B1 slot and try again... :-)

Member Avatar for Ritesh_4
0
176
Member Avatar for bjsaturn

It depends upon the trojan/virus. Some also infect the boot sector of the system drive, so the next time you boot the system, it gets reinfected. I have also seen some that infect libraries (dll's) in the recovery partition, so even if you reinstall the system, it will still mung …

Member Avatar for gerbil
0
325
Member Avatar for laaus001

MySQL is a specific implementation of a relational database that uses the SQL data access language. SQL is an ANSI/ISO standard, and is supported (to varying degrees) by database products such as MySQL, Ingres/Postgres, Oracle, DB2, Sybase/MS-SQLServer, et al. It is not a part of any operating system, per se. …

Member Avatar for rubberman
0
207
Member Avatar for b.moattar

Stop asking us to help you cheat on your school work asignments! Make an effort and post the code here with your errors, and then we may decide to help you. Until then, you are on your own! :-(

Member Avatar for rubberman
0
254
Member Avatar for man.chester.581

Basic C/C++ stuff. RTFM and try, as suggested by Ancient Dragon, a Google search.

Member Avatar for rubberman
0
177
Member Avatar for RikTelner

Yeah, if this wasn't mentioned, I think that currently about 95% of the top 500 super computers in the world are running Linux - you can't get much more "big iron" that that! A lot of them are also running scads of nVidia's tesla GPUs for parallel floating point performance.

Member Avatar for RikTelner
0
272
Member Avatar for rpv_sen
Member Avatar for somyms

When you figure them out, apply for that Nobel Prize in Medicine... This is an area of serious ongoing academic research, and there have been a number of recent articles about mapping human neural networks to machine neural networks. Remember, Google is your friend. If you are referring simply to …

Member Avatar for somyms
0
131
Member Avatar for PulsarScript

TopSpeed FuelConsumption (adjusted for speed) ie, mpg @ 100 mph != mpg @ 50 mph. PassengerLoad Cargo (in cubic whatever is appropriate for you) Cars have a LOT of options. This will change things quite dramatically when all things are considered. FWIW, I was a master mechanic before I became …

Member Avatar for vmanes
0
106
Member Avatar for fortranlover

Suzie999 was being nice to you. Usually we just say that we don't do your homework for you, but if you try and post your code here, we will usually try to point you in the right direction. So, get to work, and make an effort!

Member Avatar for vmanes
0
232
Member Avatar for Harrypeter

It is all relative to your needs. My needs as a software engineer who works on complex systems is not the same as most people's. Most people will find a desktop that costs well under $1000 USD to be more than they need. Myself, I spend about 5x that for …

Member Avatar for rubberman
-1
214
Member Avatar for Gman2

No. The answer is reduced latency. :-) Latency is the amount of time it takes for device A to send a message to device B. It is more or less directly (inversely) proportional to the speed of the link. IE, if a 1GB link between A and B takes 10ns …

Member Avatar for rubberman
0
104
Member Avatar for aluya

Burn a live Linux DVD/CD. Boot it up. Login as root (administrator). Then, wipe the disc with the dd command. Assuming that this is the only HD on the system at the time, it will be /dev/sda. The command line would be this: dd if=/dev/zero of=/dev/sda bs=1M This will write …

Member Avatar for bvestol
-1
303
Member Avatar for jeffreymrblls

Between the time it worked, and the time it didn't, did you change anything on the computer, such as install new software, make configuration changes, etc? Also, are you sure the flatscreen works ok? Have you tried connecting it to another computer?

Member Avatar for ColeTechInc
0
175
Member Avatar for UNDER-18 FG

Sorry, but we don't do your homework for you! Do the research and write up your paper and we may help with some pointers, but YOU have to do the work!

Member Avatar for ColeTechInc
0
395
Member Avatar for IceTouchAngel

This is not a simple subject. Start with some appropriate Google searches and read a lot of the resulting articles.

Member Avatar for KiloKraveSarave
-3
135
Member Avatar for khushhappy

Ok. Totally different thing. The 32-bit system is the print server. Just install the compatible 64-bit driver from HP on the Win8 machine and point your print stream to the 32-bit server.

Member Avatar for bvestol
0
382
Member Avatar for man.chester.581

I agree with AD and Mike2k about using Qt. It is a cross-platform C++ API that lets you really write once and deploy on multiple system types from Windoze, to Linux, to Unix (BSD et al), to some mobile operating systems, etc. Of course, once you use Windows API's in …

Member Avatar for glenwill101
0
300
Member Avatar for xidike

You have possibly put this file into the Visual Studio configuration file to be compiled, or the problem is that for C++ (especially for pre-compiled headers) it should either not have the .h extension, or should be something like .hh, .hxx, etc.

Member Avatar for xidike
0
195
Member Avatar for jainasamiento
Member Avatar for kevsam

Have you looked at the router security logs? That may provide some indication of what is going on. It is possible that it is so "smart" that it thinks you are trying to hack in? Sort of a Catch-22?

Member Avatar for rubberman
0
207
Member Avatar for amzz

First observation is that you need to move the `sqlite3* db;` declaration into the class member variable list, otherwise it will not be accessible outside of the DbInit() method. Also, I would create a set of constructors that call DbInit(), and a virtual destructor that disconnects from the database.

Member Avatar for amzz
0
861
Member Avatar for Curious Gorge

If you want to know exactly how to create an operating system from scratch, there are a number of texts out there to help teach you, such as Andrew Tanenbaum's "Operating Systems: Design and Implementation" - where he shows how the Minix operating system works. This was, as I understand …

Member Avatar for Curious Gorge
0
250
Member Avatar for mirchi mirchi

You do the work. We help you fix it. Don't ask us to do your homework for you - that is cheating! :-(

Member Avatar for mirchi mirchi
0
115
Member Avatar for ashishkadam0220

Minor issue AD. You are starting at the terminating null byte and then ending at the head of the string. Better this I think: for(int i = len-1, j = 0; i >= 0; --i, ++j) { target[j] = source[i]; } target[len] = 0; // Properly terminate the target string.

Member Avatar for Ancient Dragon
0
310
Member Avatar for sheelap
Member Avatar for rubberman
0
245
Member Avatar for Jorge_6

1. What is the Kinect's physical interface to the PC - USB? 2. What do you mean by "Is it possible to run applications on computers Kinect ARM architecture?"? Are you saying that the Kinect runs an ARM processor and you want to run apps on it directly? 3&4. Yes, …

Member Avatar for mike_2000_17
0
321
Member Avatar for bustamorg

Lambdabeta's answer is a good example of applying the KISS (Keep It Short and Simple) to code. IE, keep it as simple as possible, but no simpler than necessary. Too simple (short) usually makes stuff hard to understand. Also, don't hesitate to add comments to the code, especially stating what …

Member Avatar for rubberman
0
243
Member Avatar for sami11

What API's does Ilog provide for Java? I haven't done anything with Ilog since the 1990's. I still have the documentation though. :-)

Member Avatar for sami11
0
183
Member Avatar for kent.johnstone_1

Good luck Kent! :-) Sometimes this stuff gets my eyeballs rolling, and I've been doing it for 30+ years! Deceptikon's answer was to the point. Couldn't state it better myself.

Member Avatar for rubberman
0
278
Member Avatar for fahadmunir32

Sigh - C++ for Dummies. The problem with that is that dummies are not going to be able to write decent C++ code, no matter how hard they try! After 22 years as a professional C++ developer, I can write "decent" C++ code, and have done (and still do) some …

Member Avatar for rubberman
0
526
Member Avatar for alyssa.wilkins.77

Not doing your homework for you, but will give a clue, think bit-wise comparisons based upon some bit of information in your "truth table".

Member Avatar for alyssa.wilkins.77
0
177
Member Avatar for chubbyy.putto

And what IS your problem. Most rand() functions are at best "pseudo-random" - ie, not so much. This is a good tutorial on the subject: http://www.phy.ornl.gov/csep/CSEP/RN/RN.html From the site: page 2 Anyone who considers arithmetical methods of producing random digits is, of course, in a state of sin. -- John …

Member Avatar for DavidB
0
156
Member Avatar for ZaneDarklace

One of the easiest cyphers is a simple xor substitution of the source text with letters from the passphrase. You iterate through the source and the passphrase (password) and xor each letter of the source with the current letter of the passphrase. When you get to the end of the …

Member Avatar for ZaneDarklace
0
923
Member Avatar for alhawsa

You want us to help you cheat on your assignment? Do we get your degree when you graduate also? :-( Post your code, and we may help you, but you haven't started on a good foot.

Member Avatar for Stuugie
-3
179
Member Avatar for Kevin_7

I think Reverend Jim gets the punnage award for the week! So, what punnagement would be appropriate for that? :-)

Member Avatar for khakilang
0
117
Member Avatar for RikTelner

Is your WiFi secured? If secured with WEP, change the security to WPA and select a strong passphrase. If not secure, change it to WPA and select a strong passphrase. If already WPA, change the passphrase to a strong one that is difficult to guess. Also, go into your router …

Member Avatar for rubberman
0
247
Member Avatar for Labdabeta

Naming conventions... :-) I would suggest that you use something other than Int for your AP class to avoid this sort of confusion, such as APInt, or AnInt, etc. Depending upon the font, it can be difficult to tell int apart from Int, especially for us old farts! :-)

Member Avatar for mike_2000_17
0
1K
Member Avatar for Siberian

Is it worth the investment? It depends. The Intel "recommended" price for any of them is about $1100 USD. The Xeon E5-2650 has 8 cores and 16 threads (with hyperthreading enabled). There are 2 models. One is a 2Ghz chip with a turbo speed of 2.8Ghz, and a 2.6Ghz model …

Member Avatar for Siberian
0
88
Member Avatar for richkardmunga.hounarable

I've been making a good living in this domain for over 30 years, and have had the opportunity to do some important work, such as work on the US Navy's RAMP project, contribute to the manufacturing systems for the F111 stealth fighter avionics, design and help build the manufacturing systems …

Member Avatar for rubberman
0
104
Member Avatar for theashman88

Sorry, but we don't do your homework for you. Show us what you have tried and we can help you find the errors of your ways, and means. Remember, for *nix systems, there are user, group, and "other" permissions on directories as well as files. So, a hint - to …

Member Avatar for rubberman
0
317
Member Avatar for 404notfound

You need a function main(). Here are the valid signatures for main(): int main(void); int main( int argc, const char** argv); int main( int argc, const char* argv[]); Note that the second and third versions are functionally (sic) identical. You can also use non-const arguments for argv, but that is …

Member Avatar for Mike Askew
0
84
Member Avatar for Compton11

Overall, I think you did pretty well on the interview questions, though you are correct that #9 could have been handled better, such as mentioning that GC in Java has a serious impact upon long-running applications without considerable effort to compartmentalize the GC domains or to provide object caches for …

Member Avatar for jwenting
0
320
Member Avatar for Febel

What Mike2k said. Template functions are what you can call "generic programming". You develop an algorithm that works for multiple types, and then code it as a template. Instead of a separate function for each type you want to apply the algorithm to, you only have one template function, and …

Member Avatar for rubberman
0
187
Member Avatar for PulsarScript

Classes are used to model physical or conceptual entities. An example of physical entities may be the class Animal - an abstract base class. Derived from that are classes such as Cat, Dog, Human, Bird, etc. Derived from Cat are things like WildCat (Leopard, Tiger, Lion, Puma), DomesticatedCat (Abysinian, Siamese), …

Member Avatar for rubberman
0
111
Member Avatar for RikTelner

Swap space is used as virtual memory. IE, if your system and applications need more memory than you physically have, then the swapper will move the least-recently used memory blocks to the swap space, freeing that physical memory for active processes. This can be expensive, since it entails physical I/O …

Member Avatar for rubberman
0
823
Member Avatar for Dani

I would recommend building a whitebox. Get a good case with lots of cooling, a 1000watt power supply, an Intel workstation/server motherboard, one or two 6 core CPUs, 8-16GB of ECC fully buffered RAM (reliability - one stick fails, and the system falls back to the others without stopping), and …

Member Avatar for Ezekiel_1
0
260
Member Avatar for ryan.jay.ong

Also check the screensaver settings. Disable it, or set it to a long period when running this sort of application and/or movie. Either that, or move the mouse every once in awhile... :-)

Member Avatar for Gabriel_4
0
129

The End.