5,331 Posted Topics
Re: How do YOU think you use the newline() function? | |
Re: We do NOT do your homework for you - that is cheating! Make an effort to solve the problem, post the code here, and we MIGHT decide to help you... :-( | |
Re: You don't show the definition of the default argument "shift". | |
Re: Have you considered that the tool may be truncating the xml file's lines? An xml file can be placed entirely on one line, but that does cause problems for some tools that have a line-length limit. | |
Re: nVidia has a lot of really great cards, most of which easily handle 2 displays. Go visit www.nvidia.com and look at their current offerings. Once you find something you like, go to a site like www.rakuten.com to find specific boards to purchase in your price range. | |
Re: C++ is the C language with objects (classes, methods, etc). C is often considered a high-level assembler language, able to control the system at a fundamental level. Compilers will turn C/C++ code into very efficient machine (binary) language. So part of the popularity of C++ is its efficiency (speed and … | |
Re: Please properly and consistently indent your code. It makes it a LOT more readable. Also, use curly-braces to bracket the contents of ALL conditional code blocks. Failure to do so is a major cause of many bugs in the code of inexperienced programmers. | |
Re: What do you know of this subject? It is non-trivial. Do some google searching for more information, and don't expect someone with this sort of specialized knowledge to just "impart" it to you. Also, if you go to the Matlab web site, you might be able to find packaged solutions … | |
Re: Please don't ask us to do your homework for you! Make an attempt to code this to the best of your ability and we will be happy to help you with your mistakes. | |
Re: Run this in a debugger and single-step it through the code. You will soon find your problem. If you haven't yet used a debugger, it is time to learn! | |
Re: Google is your friend. We don't give answers to school problems. If this isn't a school problem I'd still tell you to do a Google search. There are relevant articles on the Wikipedia, but in any case, you first need to understand reservation systems themselves: http://en.wikipedia.org/wiki/Computer_reservations_system The above link is … | |
Re: What do you mean by "modify tmpfs? Where it is mounted? Please explain exactly what you are trying to accomplish. | |
Re: And your problem is? Please do NOT ask us to do your homework for you! | |
Re: I thought that Adobe Acrabat Pro had the ability to protect the document from subsequent edits. Have you checked the tools/options settings? | |
Re: Most Dell laptops use Broadcom WiFi chip sets. Execute the command line "lspci" and "lsusb", and report the results (output) here. The site www.linuxwireless.org has links and instructions for drivers for just about all supported devices. I have a Dell laptop, and their link to the new Broadcom drivers worked … | |
Re: Well, at least you only have to worry about remainers to decide whether to round up or down for the final product of the division - no floating point required. Since division is basically the inverse of multiplication, try adapting that algorithm, using right shifts instead of left shifts for … | |
Re: Correct! You can declare a common namespace in many source files / headers. The effect is cumulative in that in each case, the contained classes/symbols are added to that namespace. | |
Re: Usually, just holding down any key on the keyboard while booting, will force it into the BIOS. Have you tried that? | |
Re: If this is for security research purposes then I applaud your efforts to understand stack vulnerabilities. In any case, we cannot help you with this since it can be used to write exploits/viruses that can compromise systems. You are on your own! | |
Re: You say it won't start, but the reset button will force it to boot. Have you set your BIOS to output detailed POST (Power On Self Test) information when it boots? If you do that, you should be able to see where it gets to in the boot process before … | |
Re: One of my pet peves with Java programmers is their prediliction to create descriptive, but overly-long, class names. You want to use a name that is easy to remember, difficult to mis-type, and as short as possible while meeting the previous two characteristics. What about SumDS? or SumDataScrp? | |
Re: NULL is defined in <stdio.h> as `(void*)0`. This can cause problems with some C++ code. With current C/C++ compilers, you are safe to use a simple 0 for null values. IE: void* vptr = 0; // ok int* iptr = 0; // ok double* dptr = NULL; // not ok, … | |
Re: You can either use Windows Hyper-V or try the latest version of VirtualBox (VBox) or VMware. If you want to use VBox or VMware you will need to disable Hyper-V on your Win-8 system. Also, you will need to enable VT-x in the BIOS before you install the VM manager. | |
Re: Write it out in pseudo-code first, and then code it. IE: n = new_value p = start lastp = null while (p not null && n gt p->value) { lastp = p; p = p->next } if p is null // add n to end { if lastp is null … ![]() | |
Re: The onboard audio is HD with S/PDIF (optical) output support as well as Dolby Surround Sound. It should do nicely. My system uses an Intel mobo with HD onboard audio as well, and it works very nicely - driving a pair of Bose speakers. My advice is to use the … | |
Re: Nobody uses the Windows burner if they don't have to. There are a lot of much better programs to do that, such as Nero, Alcohol 120%, and some open source tools. | |
Re: That user may not have login privileges on the ldap server. Once you login as root, root can su to any user account, no matter if it has login privileges or not. | |
Re: Some context would be helpful, to know what your purpose is and what you mean by a "data chunk". | |
Re: Rule one - never accept unsolicited phone or email contacts with people you don't know. Rule two - see rule one... Rule three - keep your A/V and malware detection software updated. Rule four - only use known suppliers for A/V and malware detection software. Rule five - sometimes all … | |
Re: You will have a lot more to do than just recompiling as Android doesn't support Windows APIs. Also, getting native code onto Android devices is not simple - possible, but not simple, and much more difficult for 3rd parties to install. I would suggest that you rewrite the code in … | |
Re: Do all this as root: sudo su - 1. Create a partition and file system in that partition on the new disc - use ext3 or ext4 file system types. 2. When you create the file system, specify a label such as "garrett": mkfs -t ext4 -L garrett /dev/snX1 where … | |
Re: A third way is to use a hash index. Once the hash is computed for the target value, it is usually a single probe to see if the value exists in the collection. The only thing that may interfere with that is a hash collision. I'm sure you can find … | |
Re: Good luck with that! Besides needing a pretty fat pipe (fast internet connection), none of the major studios are willing to release their content without "protections". My suggestion is to purchase BluRay discs, and then use some of the available open source tools to extract the feature or other parts … | |
Re: Clear your cache and cookies on Chrome and Firefox and try again. You might also want to try pinging the site from your laptop to see if you are able to access it - it could be that your firewall or other software is blocking it. Open a cmd.exe window … | |
Re: Why did the old keyboard die? Was it the keyboard, or something with the USB port and/or internal hub of the computer? You need to obtain and run hardware diagnostics to determine what the problem is. From your description, my guess is that the hub you are plugged into is … | |
Re: There is no general purpose antennas to do this without breaking every law regarding WiFi signal strength. There are directional antennas that will connect two sites, called Yagi-Uda antennas. | |
Re: Here is a sample of code to test for a set bit. Adapt as necessary. #include <stdio.h> int main(void) { unsigned char target_byte = 0x81; unsigned int i = 0; /* Always initialize variables - much safer! */ for (i = 0x01; i <= 0x80; i = (i << 1)) … | |
Re: How are you connected to the Internet? Is it through the switch, or does the desktop have a direct connection? | |
Re: I have had this problem with Win7 when accessing large (bigger than 2GB) drives that are perfectly accessible from Windows XP and Linux (FAT-32 drives). I don't know why this is an issue with Win7, but it is a PITA! | |
Re: You can try removing the shortcut you see in the root of the F: and G: drives. It is also possible that just mounting the drive on your system has infected it as well. Do run advanced A/V and Anti-malware scanners on your system now. Whether or not you can … | |
Re: Class assignment? Post your approach and some code and we may be able to help. What you have given so far is not so useful. | |
![]() | Re: A lot of video cards suck up a HUGE amount of power, that many systems' PSU (Power Supply Unit) is incapable of handling - often over 100 watts. You need to verify that your system's power supply can handle the additional load. |
Re: Ah! Serious beginner C++ programmer errors. Reference variables are much like pointers, but you can declare them as const, and thus refuse the called funtion from modifying them without going through some contortions (such as explicitly casting them as non-const). The issue is your intention. If you WANT the called … | |
Re: I think that Macs support the CUPS printer subsystem. Find the Unix (which Mac OSX is in effect) CUPS driver on the Dell web site for this printer. Ok, after some investigation, this is really a rebranded Lexmark X4650 printer (all-in-one). Here is a link for the Mac OSX CUPS … | |
Re: Please show more code. Your error indicates that you are missing some virtual function declarations. The vtable is the virtual function table. Since you aren't showing the derivation of your classes, it is difficult to help further. | |
Re: Do they also come with the world's smallest violins? :-) | |
Re: I seem to be agreeing with deceptikon a lot lately! :-) That said, strtok() is not the be-all and end-all of string parsing. I tried it a long time ago when writing an object serializer/de-serializer and found out its limitations, ending up writing my own tokenizer that could handle such … | |
Re: What JorgeM said. Do a Google search. There are a bunch of tools to help you deal with this problem, maybe... :-) | |
Re: I think this lspci entry: `03:00.0 Network controller: Ralink corp. Device 539b` is the one related to the WiFi. Here is the linuxwireless.com page on this device. Depending upon the actual chip, it may not be supported as yet by Linux: http://www.linuxwireless.org/en/users/Drivers/rt2800pci If you post the output for this device … | |
Re: All phones have security vulnerabilities. As for security risks, I think that the most robust phone OS out there is probably the new Blackberry 10 (QNX) operating system. It comes down to teaching your users safe usage of their phones - such as which apps they can install and use, … |
The End.