5,331 Posted Topics

Member Avatar for dlmagers

It is really in bad taste (and unethical) to ask people to do your homework for you. Make an honest effort to solve the problem, and we will be happy to help you, but you have to make a start.

Member Avatar for phorce
0
758
Member Avatar for AVIZZ

So, you are running overclocked at 3.77GHz, correct? This may be causing issues with bus I/O. Try resetting the clock to normal and see what happens. Also, your power supply may be failing. When you overclock a system, it sucks up more power.

Member Avatar for AVIZZ
0
116
Member Avatar for Violet_82

A lot of usb memory sticks come with some sort of encryption tools installed on them. Myself, I just reformat the entire device because most of that cruft is worthless. If you need to encrypt your data on the device, there are good full-disc encryption tools out there, including open …

Member Avatar for Violet_82
0
132
Member Avatar for godzab

For simple C++ executables, you can just use the make command directly. So, if you want to build a simple C++ source file named my_application.cpp, you can just execute the command: make my_application That will compile and link the executable for you quite nicely. A Makefile is unnecessary unless you …

Member Avatar for godzab
0
646
Member Avatar for cmmmm

Yes, well think about the problem and write out a solution in words. First, you need to determine the scope of the number (thousands, hundreds, tens, ones columns, etc), then figure out the number of each found. Then you can encode the number as words. So, take the number 3532. …

Member Avatar for stultuske
0
240
Member Avatar for Pyler

You need the class name before the method in the implementation. IE, class cone { private: double radius; double height; public: cone(); void setvolume(double r, double h); double conevol(); }; //implementation void cone::cone() : radius(0.0), height(0.0) { } void cone::setvolume(double r,double h) { radius=r; height=h; } double cone::conevol() { double …

Member Avatar for Rashakil Fol
0
255
Member Avatar for lewashby

Never heard of them. Most of these so-called certifications are pretty much useless for finding work as an IT or network administrator. Job experience is the best bet, and second is to host your own servers and learn by doing. The Red Hat certifications are somewhat better than many, but …

Member Avatar for rubberman
0
102
Member Avatar for royng

I like Jewels, Angry Birds, and Solitaire. Mostly I play Jewels and Angry Birds when I am bored.

Member Avatar for Daniel Jones
1
234
Member Avatar for juljan30

If you want help with your homework, then make an effort to do it first yourself. We aren't here to help you cheat, but we will help you if you make the effort.

Member Avatar for VernonDozier
0
165
Member Avatar for benyamin.jane

Have you tried implementing the new/delete functions out-of-line (not in the header file, but in the .cc/.cpp file? This may be an issue with some compilers.

Member Avatar for benyamin.jane
0
944
Member Avatar for adityasingh95

As WaltP said. In your Clothing constructor, you are copying too much data into the Code data member, corrupting the object. IE, this is part of the problem: Clothing() { strcpy(Code,"NOT ASSIGNED"); // This will corrupt the data structure. strcpy(Type,"NOT ASSIGNED"); strcpy(Material,"NOT ASSIGNED"); Size=0; Price=0; }

Member Avatar for rubberman
0
140
Member Avatar for rithish

Get this book: Algorithms + Data Structures = Programs Author: Niklaus Wirth Publisher: Prentice-Hall Available from Amazon.com both new and used. FWIW, Wirth was the inventor of both the Pascal and Modula programming languages. The original edition of the book used Pascal for the examples, but the content is applicable …

Member Avatar for rubberman
0
115
Member Avatar for palani vijay

Assuming that the printer on CentOS is shared, you should go to the printer manager tool: System->Administration->Printing. Select add new printer, and go to the Network Printer options. It should help you get to the remote printer from there. If for some reason the tool doesn't run, then run it …

Member Avatar for rubberman
0
36
Member Avatar for tez

My guess is that these are "filler" tracks, containing nothing, but there as separators for the actual music. Unfortunately, without access to the system(s) in question, that is just a guess... :-)

Member Avatar for john29
0
193
Member Avatar for Bheeman89

No. Compliance checks/analysis requires that the factors that indicate a system is in/out of compliance are very specific to a particular organization. Assuming your are paid by the hour, this is a nice contract to have. Do it dilligently, and be thorough in your report. FWIW, I am a senior …

Member Avatar for Bheeman89
0
310
Member Avatar for veledrom

Someone is trying to be clever... :-) I think that they mean you get a lot of functionality for relatively little code.

Member Avatar for Rashakil Fol
0
165
Member Avatar for Skrell

You have allocated the array of poitners rowptr, but not the elements of each row. As a result, your strcpy() functions will be corrupting memory. You also need to do this: for (row = 0; row < nrows; row++) { rowptr[row] = (char*)calloc(ncols, sizeof(char)); } As mentioned, you also need …

Member Avatar for Skrell
0
101
Member Avatar for sang.christin
Member Avatar for Labdabeta

What is your intent for this? Usually, with C++ we use stubbed methods that return some meaningful, but not critical, value when called, so that the program can flow as indended. As for tools that do this, I am not aware of any, though they may exist.

Member Avatar for Labdabeta
0
2K
Member Avatar for tandex

Yeah, well after spending 20 years doing advanced C++ software design and development, the lack of multiple inheritance in Java drives me nuts! Interfaces are OK, but not the panacea that a lot of java developers think it is... sigh! I just finished a significant SNMP framework for Java, and …

Member Avatar for stultuske
0
413
Member Avatar for anuran

Work out the math, and then convert that to software. Also, this will be easier to do with Linux than Windows (in my opinion). If you haven't mastered the math to detect facial expressions from raw data, then you have no hope of succeeding in this quest. It is a …

Member Avatar for rubberman
0
502
Member Avatar for wilko1995

All current graphics cards should support vanilla VGA mode so you can get into the BIOS, and such like installing drivers, etc. If your monitor does not show anything, and you don't have an on-board video adapter, then there is some other problem happening.

Member Avatar for JorgeM
0
72
Member Avatar for ashiiiish

This is not particularly informative. Without more information, such as just exactly what you are trying to do, it will be pretty much impossible to help you.

Member Avatar for rubberman
0
69
Member Avatar for wilko1995

Are you sure it is plugged into a compatible slot on your motherboard? What interface does the video card use - pci-x??. Is the slot compatible with that?

Member Avatar for rubberman
0
113
Member Avatar for amin.sohal

Well, you aren't posting the stack trace, nor the related code. Without that, helping you is not possible.

Member Avatar for rubberman
0
94
Member Avatar for comp4323

Can you boot into the BIOS? If not, then your hardware is starting to fail. If so, then reset to factory defaults and see if it boots. If not, then the hardware is starting to fail...

Member Avatar for bnuppp
0
169
Member Avatar for pcmic

It's probably your anti-virus scanner that is doing it. McAfee does on-access scanning, which is incredibly CPU intensive. Try disabling it temporarily and see if that solves your problem.

Member Avatar for pcmic
0
451
Member Avatar for beep
Member Avatar for HTMLperson5
0
133
Member Avatar for rhowell

These are linker, not compiler errors. Do you have the libf2c package installed on your system? Also, why use f2c instead of gfortran?

Member Avatar for rubberman
0
432
Member Avatar for jade_91

1. You need to remove the space between the "PS3=" and the prompt. Also, this just sets an environment variable. It does not output the prompt. So, propose some alternative options that we can comment on.

Member Avatar for Habitual
0
123
Member Avatar for inthink

It depends. What OS is your laptop running? Some (like Windows) will let you use your laptop's wireless as an access point, in which case this may work.

Member Avatar for inthink
0
116
Member Avatar for aphotic16

If you removed it after writing to it without doing the "safely remove" operation, then it may be scrambled to the point that the OS cannot see it to mount it. IE, if the MBR of the disc (1st sector) is not recognizable as an MBR, then you may be …

Member Avatar for shivam singh
0
240
Member Avatar for lewashby
Re: FCDN

Assuming you just want an internal network address, you need to go into the dhcp setup page on the local router and see what the dhcp address range is. Then you go into the network manager application on ubuntu and set the network interface to use a static address that …

Member Avatar for JorgeM
1
200
Member Avatar for carrot_123
Member Avatar for Bencz

Learn about finite state machines (FSM). This is how professionals create parsers. There are tools that help with this (Yacc/Lex et al) once you have written the rules needed by the tools. They then create C code that will do the heavy lifting for you. Remember, Google is your friend! …

Member Avatar for Schol-R-LEA
0
199
Member Avatar for bboykk1234

Before we will help you, you have to make an effort on your own to solve the problem. Try writing pseudo code first - how would you solve the problem in words. Then try to express that in code and class structures. Describe the classes you will need - what …

Member Avatar for bboykk1234
0
153
Member Avatar for seijidinzuala

Send it to the manufacturer. These boneheads are clueless and you should not trust your gear with them - just my humble opinion. As for cost, most manufacturers have a fixed price for out-of-warranty repairs. Check on their web site. If they don't have a repair depot in your country, …

Member Avatar for rubberman
0
134
Member Avatar for nuclear

My guess is that when the application adds the pointers to the top container, that it deletes them when finished, resulting in the access violation. You should probably run the application in the debugger so you can see if that is the case.

Member Avatar for Lucaci Andrew
0
165
Member Avatar for SCass2010

I think that rpm uses bzip2 to compress the image, which is significantly more efficient (usually - not always) than gzip, with respect to size at least. BTW, you can create a compressed tarball with just the tar command. For a gzipped one use `tar -zcvf tarballname sources*`, and for …

Member Avatar for mike_2000_17
0
124
Member Avatar for Ankit_Parmar

It depends upon how many threads are allowed to access a resource at a time. A binary semaphore allows only one, whereas a counting semaphore may only allow N accesses at a time. The counting version is not frequently used, but it may be useful for some situations.

Member Avatar for Climber Ty
0
484
Member Avatar for lewashby

Consider Linux samba shares just like Windows shares. If you don't have AD (Active Directory - or OpenLDAP, the Linux equivalent to AD) installed on your system, then you need to have a userid/password for each authenticated user who can access your Samba shares, on each Linux system you want …

Member Avatar for androtheos
0
192
Member Avatar for chrisfernam

Most current laptops have pci-x hardware, but no easy way for a user to connect to them, other than via a docking station, or in the case of the ViDock devices, via the ExpressCard port, which this model should have.

Member Avatar for chrisfernam
0
269
Member Avatar for YancePants100

Are you asking if it can run using the Toshiba drive, or are you asking if you can boot from an operating system already installed on the Toshiba drive? In the first case, probably, as long as they use the same interface (PATA or SATA). In the second situation, maybe, …

Member Avatar for YancePants100
0
242
Member Avatar for atown282

I don't see anything in your code that would cause Ctrl-C to not deliver a kill signal to the application. Since this is a console application, I assume you are running it in a cmd.exe window?

Member Avatar for Lucaci Andrew
1
578
Member Avatar for Dudearoo

You have an explicit return before the end of the loop, so there is no looping going on. All of what VernonDozier said goes double for me.

Member Avatar for rubberman
0
160
Member Avatar for Taniya19

Good link oh m4ster r0shi! The application of recursion for such tasks is one of those elegant applications of logic to overcome system limitations. I used a similar approach to generate the prime factors of very large numbers, such as Goedel encodings.

Member Avatar for TrustyTony
0
168
Member Avatar for sternone

Just like human languages, once you are fluent in one it is unlikely that you will confuse it with another that you are also fluent in. I know a LOT of programming languages, and have never had a problem moving from one to another. If I don't use one for …

Member Avatar for sternone
0
248
Member Avatar for mashimaro

You can write a genetic algorithm based document clustering program and cannot figure out how to integrate it into a "standard" search engine? Well, I'm not sure there is such a thing as a "standard" search engine... Anyway, what approach are you trying?

Member Avatar for mashimaro
0
270
Member Avatar for Valiantangel

Your setBaseSalary() function should be tagged as throwing an exception. IE: public void setBaseSalary( double salary ) throws IllegalArgumentException { // TODO: implement this method baseSalary = ( salary < 0.0 ) ? 0.0 : salary; if (baseSalary < 0.0) { throw new IllegalArgumentException("Negative base-salary values should be rejected by …

Member Avatar for JamesCherrill
0
97
Member Avatar for ganges

This isn't enough information to be helpful. Please post your compiler error output here. Thanks. Also, post the relevant source code.

Member Avatar for rubberman
0
243

The End.