5,331 Posted Topics
Re: It is really in bad taste (and unethical) to ask people to do your homework for you. Make an honest effort to solve the problem, and we will be happy to help you, but you have to make a start. | |
Re: So, you are running overclocked at 3.77GHz, correct? This may be causing issues with bus I/O. Try resetting the clock to normal and see what happens. Also, your power supply may be failing. When you overclock a system, it sucks up more power. | |
Re: A lot of usb memory sticks come with some sort of encryption tools installed on them. Myself, I just reformat the entire device because most of that cruft is worthless. If you need to encrypt your data on the device, there are good full-disc encryption tools out there, including open … | |
Re: For simple C++ executables, you can just use the make command directly. So, if you want to build a simple C++ source file named my_application.cpp, you can just execute the command: make my_application That will compile and link the executable for you quite nicely. A Makefile is unnecessary unless you … | |
Re: Yes, well think about the problem and write out a solution in words. First, you need to determine the scope of the number (thousands, hundreds, tens, ones columns, etc), then figure out the number of each found. Then you can encode the number as words. So, take the number 3532. … | |
Re: You need the class name before the method in the implementation. IE, class cone { private: double radius; double height; public: cone(); void setvolume(double r, double h); double conevol(); }; //implementation void cone::cone() : radius(0.0), height(0.0) { } void cone::setvolume(double r,double h) { radius=r; height=h; } double cone::conevol() { double … | |
Re: Never heard of them. Most of these so-called certifications are pretty much useless for finding work as an IT or network administrator. Job experience is the best bet, and second is to host your own servers and learn by doing. The Red Hat certifications are somewhat better than many, but … | |
Re: I like Jewels, Angry Birds, and Solitaire. Mostly I play Jewels and Angry Birds when I am bored. | |
Re: If you want help with your homework, then make an effort to do it first yourself. We aren't here to help you cheat, but we will help you if you make the effort. | |
Re: Have you tried implementing the new/delete functions out-of-line (not in the header file, but in the .cc/.cpp file? This may be an issue with some compilers. | |
Re: As WaltP said. In your Clothing constructor, you are copying too much data into the Code data member, corrupting the object. IE, this is part of the problem: Clothing() { strcpy(Code,"NOT ASSIGNED"); // This will corrupt the data structure. strcpy(Type,"NOT ASSIGNED"); strcpy(Material,"NOT ASSIGNED"); Size=0; Price=0; } | |
Re: Get this book: Algorithms + Data Structures = Programs Author: Niklaus Wirth Publisher: Prentice-Hall Available from Amazon.com both new and used. FWIW, Wirth was the inventor of both the Pascal and Modula programming languages. The original edition of the book used Pascal for the examples, but the content is applicable … | |
Re: Assuming that the printer on CentOS is shared, you should go to the printer manager tool: System->Administration->Printing. Select add new printer, and go to the Network Printer options. It should help you get to the remote printer from there. If for some reason the tool doesn't run, then run it … | |
Re: My guess is that these are "filler" tracks, containing nothing, but there as separators for the actual music. Unfortunately, without access to the system(s) in question, that is just a guess... :-) | |
Re: No. Compliance checks/analysis requires that the factors that indicate a system is in/out of compliance are very specific to a particular organization. Assuming your are paid by the hour, this is a nice contract to have. Do it dilligently, and be thorough in your report. FWIW, I am a senior … | |
Re: Someone is trying to be clever... :-) I think that they mean you get a lot of functionality for relatively little code. | |
Re: You have allocated the array of poitners rowptr, but not the elements of each row. As a result, your strcpy() functions will be corrupting memory. You also need to do this: for (row = 0; row < nrows; row++) { rowptr[row] = (char*)calloc(ncols, sizeof(char)); } As mentioned, you also need … | |
Re: What is your intent for this? Usually, with C++ we use stubbed methods that return some meaningful, but not critical, value when called, so that the program can flow as indended. As for tools that do this, I am not aware of any, though they may exist. | |
Re: Yeah, well after spending 20 years doing advanced C++ software design and development, the lack of multiple inheritance in Java drives me nuts! Interfaces are OK, but not the panacea that a lot of java developers think it is... sigh! I just finished a significant SNMP framework for Java, and … | |
Re: Work out the math, and then convert that to software. Also, this will be easier to do with Linux than Windows (in my opinion). If you haven't mastered the math to detect facial expressions from raw data, then you have no hope of succeeding in this quest. It is a … | |
Re: All current graphics cards should support vanilla VGA mode so you can get into the BIOS, and such like installing drivers, etc. If your monitor does not show anything, and you don't have an on-board video adapter, then there is some other problem happening. | |
Re: This is not particularly informative. Without more information, such as just exactly what you are trying to do, it will be pretty much impossible to help you. | |
Re: Are you sure it is plugged into a compatible slot on your motherboard? What interface does the video card use - pci-x??. Is the slot compatible with that? | |
Re: Well, you aren't posting the stack trace, nor the related code. Without that, helping you is not possible. | |
Re: Can you boot into the BIOS? If not, then your hardware is starting to fail. If so, then reset to factory defaults and see if it boots. If not, then the hardware is starting to fail... | |
Re: It's probably your anti-virus scanner that is doing it. McAfee does on-access scanning, which is incredibly CPU intensive. Try disabling it temporarily and see if that solves your problem. | |
Re: To solve this problem I usually just wipe the disc and install Linux... ![]() | |
Re: These are linker, not compiler errors. Do you have the libf2c package installed on your system? Also, why use f2c instead of gfortran? | |
Re: 1. You need to remove the space between the "PS3=" and the prompt. Also, this just sets an environment variable. It does not output the prompt. So, propose some alternative options that we can comment on. | |
Re: It depends. What OS is your laptop running? Some (like Windows) will let you use your laptop's wireless as an access point, in which case this may work. | |
Re: If you removed it after writing to it without doing the "safely remove" operation, then it may be scrambled to the point that the OS cannot see it to mount it. IE, if the MBR of the disc (1st sector) is not recognizable as an MBR, then you may be … | |
Re: Assuming you just want an internal network address, you need to go into the dhcp setup page on the local router and see what the dhcp address range is. Then you go into the network manager application on ubuntu and set the network interface to use a static address that … | |
Re: You don't indicate what voltage_min and voltage_max may be. | |
Re: Learn about finite state machines (FSM). This is how professionals create parsers. There are tools that help with this (Yacc/Lex et al) once you have written the rules needed by the tools. They then create C code that will do the heavy lifting for you. Remember, Google is your friend! … | |
Re: Before we will help you, you have to make an effort on your own to solve the problem. Try writing pseudo code first - how would you solve the problem in words. Then try to express that in code and class structures. Describe the classes you will need - what … | |
Re: Send it to the manufacturer. These boneheads are clueless and you should not trust your gear with them - just my humble opinion. As for cost, most manufacturers have a fixed price for out-of-warranty repairs. Check on their web site. If they don't have a repair depot in your country, … | |
Re: My guess is that when the application adds the pointers to the top container, that it deletes them when finished, resulting in the access violation. You should probably run the application in the debugger so you can see if that is the case. | |
Re: I think that rpm uses bzip2 to compress the image, which is significantly more efficient (usually - not always) than gzip, with respect to size at least. BTW, you can create a compressed tarball with just the tar command. For a gzipped one use `tar -zcvf tarballname sources*`, and for … | |
Re: It depends upon how many threads are allowed to access a resource at a time. A binary semaphore allows only one, whereas a counting semaphore may only allow N accesses at a time. The counting version is not frequently used, but it may be useful for some situations. | |
Re: Consider Linux samba shares just like Windows shares. If you don't have AD (Active Directory - or OpenLDAP, the Linux equivalent to AD) installed on your system, then you need to have a userid/password for each authenticated user who can access your Samba shares, on each Linux system you want … | |
Re: Most current laptops have pci-x hardware, but no easy way for a user to connect to them, other than via a docking station, or in the case of the ViDock devices, via the ExpressCard port, which this model should have. | |
Re: Are you asking if it can run using the Toshiba drive, or are you asking if you can boot from an operating system already installed on the Toshiba drive? In the first case, probably, as long as they use the same interface (PATA or SATA). In the second situation, maybe, … | |
Re: I don't see anything in your code that would cause Ctrl-C to not deliver a kill signal to the application. Since this is a console application, I assume you are running it in a cmd.exe window? | |
Re: You have an explicit return before the end of the loop, so there is no looping going on. All of what VernonDozier said goes double for me. | |
Re: Good link oh m4ster r0shi! The application of recursion for such tasks is one of those elegant applications of logic to overcome system limitations. I used a similar approach to generate the prime factors of very large numbers, such as Goedel encodings. | |
Re: Just like human languages, once you are fluent in one it is unlikely that you will confuse it with another that you are also fluent in. I know a LOT of programming languages, and have never had a problem moving from one to another. If I don't use one for … | |
Re: You can write a genetic algorithm based document clustering program and cannot figure out how to integrate it into a "standard" search engine? Well, I'm not sure there is such a thing as a "standard" search engine... Anyway, what approach are you trying? | |
Re: Your setBaseSalary() function should be tagged as throwing an exception. IE: public void setBaseSalary( double salary ) throws IllegalArgumentException { // TODO: implement this method baseSalary = ( salary < 0.0 ) ? 0.0 : salary; if (baseSalary < 0.0) { throw new IllegalArgumentException("Negative base-salary values should be rejected by … | |
Re: This isn't enough information to be helpful. Please post your compiler error output here. Thanks. Also, post the relevant source code. |
The End.