rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Time to send it to the repair depot... :-( If it won't get to the POST (Power-On Self Test) screen, then something is seriously broken. It may be as simple as a blown capacitor (not uncommon), or even more serious, but unless you have some circuit repair experience, this is not a job for the amateur.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

FWIW, we don't solve your class problems for you, but will help once you make an honest effort to do so yourself and have hit some wall.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Sure, but what do YOU think is the right approach?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If you are running Linux, there is the nice inotify api's that will let you know when a file/directory has been changed.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

As Mike2K said... You have a 32-bit system, but have somehow installed 64-bit versions of gcc and related cruft. You need to remove them all from the system and then reinstall the 32-bit versions of gcc et al.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
  1. First problem with new card - too much power required.
  2. Second problem. First problem caused low voltage (hence too much current) to motherboard, causing component failure.

At this point, you have only one option - replace system. You might be able to recover the hard drives and new video card, but that is not a given.

Don't bother to try and fix the old system. The video card may be ok (or replaceable under warranty), and the hard drives may be usable, but I would suspect that the motherboard, power supply, etc to be fubar.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Any or all of the above... Or perhaps power supply...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
  1. Boot a live Linux image from a cd/cvd/usb drive.
  2. Attach external hard drive or usb drive to save data. Format as either ntfs or fat-32.
  3. Mount internal system drive (windows) as ntfs volume at some specified mount point, such as /mnt/winboot, on the live linux system.
  4. Backup your data to the external drive.
  5. Reinstall Windows from scratch.
  6. Attach external drive with backup data.
  7. Scan backup data for viruses.
  8. Reinstall all needed software.
  9. Restore user data from external drive.

And don't bother trying to restore from the restore partition on the system disc. Most malware these days will also infect critical components there so if you reinstall from the restore partition, you will still be infected!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Go here: http://unetbootin.sourceforge.net/
Install on a thumb drive a live Ubuntu image. Boot it. Install Ubuntu. Done...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Start by drawing diagrams of the interconnection topologies in each case, 1-6. Then answer the question relevant to each topology.

As Caperjack said - we don't do your homework. We will help you, IF you make an honest effort to solve it yourself.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

To continue this...

Modern physics requires serious collaboration between people and groups world-wide. No one in the field works in isolation. Just to be clear, the world-wide-web was an invention of the high-energy physics community. Networking should be embedded in the DNA of modern physicists. Even my father, a physicist of the previous generation (he passed in 1991), was network-savy. Many physicists I know (and there are a lot of them, including Nobel-laureats) do network engineering frequently - they have to make sure that the data they are taking from their experiments get to the analytical arrays (computer clusters - sometimes counted in the 1000's of processors) in good order. This is part of the process of experimental design in this day and age. IE, if you don't understand networking, then you cannot perform as a modern physicist, purely and simply put...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

If you were a physicist (my wife is - PhD in particle physics), then you would know the answer to this question! PhysNet, CERN, FermiLab, Argonne, SLAC, LBL... If you don't, then either you aren't a physicist (or student of the discipline), or you should be doing something else!

I apologize for being somewhat dismissive of your question, but it just does not compute!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Lenovos are good and reliable. Whether is is best for your purposes depends entirely upon what those are, and you weren't too clear on that...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Clean it up, then I'll comment. FWIW, I have done a LOT of research into prime number algorithms. They way it is written, it is very hard to read in a short period of time, which is all I have to give you...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Use the string::c_str() method to extract a const c-string. Also, line 39 should be this:

char * str = ::strdup(fileline.c_str());

and eliminate line 40...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Before you even get into the programming part, you need to 1) describe in as much detail as possible the steps needed to identify the rRNA sequences you need, and then 2) draw a hypothetical tree structure showing the relationships that exsit between the sequences (I assume that's what you want to do). Drawing pictures and writing out descriptions help, and will point you in the right direction with regard to coding forms.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

FWIW, use the sha256 hash algorithm if you want to generate a REALLY unique hash value. So far, there are no collisions detected, anywhere! If you do detect one, publish it - you will gain instant internet fame! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Good for you! Another approach would be a function (not class member method) double distanceBetween(const threeD& ptA, const threeD& ptB), which could be used anywhere.It may be more reasonable for general algorithms as well. In any case, this is just a suggestion. Your approach is perfectly reasonable.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You aren't showing enough code. What is the element that defines the set member? Is that being changed?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

It depends upon how the access point / router is configured and how devices are connecting to it. From the speed mentioned, your A/P is an 802.11n device. It can also handle 802.11g and b (53mbps and 11mbps, or lower, depending upon device distrance from A/P-Router) devices. However, it will generally run at the speed of the slowest system connected. Also affecting speed are how many other routers or other devices in range are using the same channel (frequency) as your systems. If all of your devices are 802.11n, then go to the configuration page of the router and lock it into that protocol. When you do that, 802.11g/b devices won't work with it. If some are 802.11g, then configure the A/P to that - your 802.11n devices are backward compatible with that. If some are 802.11b only, then buy some new gear! :-)

So, first thing to try is changing the default channel (default is usually ch.6) - channels 1, 6, and 11 are (for 802.11g at least) are best, but mileage may vary. I generally use channel 11 at home for my 802.11g router since all the neighbors use the default channel 6 (they are not network experts, which I happen to be), and we usually have at least 6 devices connected to the WiFi (3-4 laptops, several phones, some ebook readers, and now tablets). They are all 802.11n/g devices and get good speed on the 802.11g router.

The second thing to try is to lock your router …

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

C and D drive designators are Windows constructs. AFAIK, they have nothing to do with OSX.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The Samba shares should show up in "My Network Places->Entire Network->workgroup". Under workgroup should appear each remote system that is attached to your workgroup (which Samba-enabled Linux systems should be), and under those directories will appear the shared folders that they are providing. If you need to login to access those shares, clicking on them should bring up the appropriate Windows dialog box. You can mount those systme shares as a permanent drive letter if you want. Right-click on the shared folder and select "Map Network Drive...".

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The only means to assure that your old data is not recoverable on discarded gear is to remove the hard drives, mount them as an external drive on another computer, and wipe the disc with an appropriate shredder software. Alternatively, if the system still boots and has a bootable usb/cd/dvd port/drive, then you can boot something like Linux from removable media and shred the data using that. Example, booting a live CD with Linux, you would generally do this (at a minimum): dd if=/dev/zero of=/dev/sda
That will write 0 bits to all sectors of the disc. You can also use of=/dev/random which will write random data to all sectors. Actually, doing both is better. Not NSA-level disc erasure, but recovering any data after that is quite likely impossible unless you are the NSA with gazillion$ in specialized hardware, clean-rooms, and software that literally no-one else in the world possesses.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Bad forum etiquette, hijacking another thread, especially from a long time back (a year ago). Please post your specific problem as a new thread.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I'd agree with gabeand - take the cover off and reseat all of the components. There may be other loose components (both socketed chips as well as expansion boards) that need to be reset in their sockets (RAM, flash/bios chips, etc). Also, check for loose screws.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The keyboard controller on the motherboard is continuously scanning the keyboard for keys that have been pressed. When a key is pressed, basically the controller detects that the key at position x (row) y (column) has been pressed, and that is decoded into the appropriate key by software. Since the same keys on the old and new keyboard are not being detected, then either the controller is bad, or the cable (as suggested above) has been damaged. My guess is that the liquid spill has caused damage to the controller. Take it to an authorized HP repair depot. Best guess is that they will replace the motherboard as replacing a lot of the soldered-on components is really not feasible as a field or depot repair.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Ane we usually guard these with #ifdef DEBUG ... #endif /* DEBUG */ blocks so that you can turn the printf statements off when you are ready for production. Example:

void checkcollision()
{
    float x1 = tanks[0].x;
    float y1 = tanks[0].y;
    float x2 = tanks[1].x;
    float y2 = tanks[1].y;
    float dist = sqrt((x1-x2)*(x1-x2) + (y1-y2)*(y1-y2));
    float dr = tanks[0].rad+tanks[1].rad;
#ifdef DEBUG
    printf("dist: %f, radius+radius: %f\n",dist, dr);
    if(1 < 2)
    {
       puts("yes");
    }
    else
    {
       puts("wtf");
    }
#endif /* DEBUG */
    if(dist < dr) ;
    {
        printf("checkcollision read true\n");
        printf("dist: %f, radius+radius: %f\n",dist,dr);
        goback(0); goback(1);
    }
}

So, when you have a valid value, yet you don't get the output from inside the if (dist<dr) clause, then you know you need to look there. In any case, this sort of bug is common to beginners. Another one is to have single line contents of a conditional and not use curly-braces, so when you add code later that should be inside the conditional, it doesnt work correctly. Example:

        if(dist < dr) /* Note - no semicolon now */
            goback(0); goback(1);

This will be another bug since the second goback(1) will execute whether or not dist < dr. Rule: ALWAYS brace ALL conditional blocks of code, whether they are one liners or not. First, it is easier to read. Second, adding more code within the conditional will be less likely to result in inadvertant bugs.

One final thing. Do NOT, if at all possible, execute two separate statements …

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Perfectly functional, if not simple or "elegant". This will do the same, in less code and perhaps more efficiently:

// This is == in a derived class
bool CFlatMeshGen::operator== (const CFlatMeshGen& rhs) const 
{
    // First compare the base class members....
    return ((const CMeshGen&)(*this) == (const CMeshGen&)rhs &&
            m_XSize == rhs.m_XSize &&
            m_YSize == rhs.m_YSize &&
            m_BaseHeight == rhs.m_BaseHeight);
}

One of the advantages of this construct is that the first non-equal element in the test will cause it to return false, so only the minimum element comparisons will be made in non-true cases.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Not enough information. If you have a copy of the data, and you have root (admin) privileges, then you should be able to access any of that data.

Next, what do you mean by "recover user accounts". Recover data? Restore user account to active status on the system? What?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Is this an external drive? If so, is it formatted in a way that is compatible with your computer? Windows won't deal nicely (without 3rd party drivers) with Linux or Apple file systems. Linux will handle Windows file systems without much fuss, and there are driver for Apple file systems on Linux as well. Apple can deal with FAT file systems, but not well with NTFS file systems, and it won't play nice with Linux file systems.

So,

  1. What is the computer operating system you are using.
  2. What operating system was the HDD created with.
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You are not providing enough information to help much. IP addressing problems arise when either you have assigned the same IP address to two computers on your LAN, or you have assigned a static IP address to one that is in the dynamic address range of your DHCP server that has granted that IP address to another system. That may, or may not be relevant to the first issue of file sharing.

File sharing between Windows and Linux/Unix systems is done in one of two ways - NFS or Samba/CIFS. CIFS is the standard file-sharing protocol for Windows systems. Linux systems can mount CIFS shares very easily. Linux can be a CIFS file server for Windows systems by installing the Samba server tool and sharing specific directories, just like Windows shares. NFS is quite different, and normally your Linux system will be an NFS server, and Windows systems can install NFS client software so they can access NFS shares. I have done both, and they both work well. However, the devil is in the details, such as in the configuration of these tools. You need to do some studying to determine how to set up these servers to work best in your environment. There are a lot of resources on the Internet (Google is your friend) to help, but the subject is too deep and extensive to cover here in any kind of detail. We can help with specific issues, but general case issues are not feasible.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

That's the nice thing about VMs - you can work with new kernels and versions of operating systems without munging your basic system build. I do that all the time, including running non-Linux systems like Solaris, QNX, DOS, etc. There is also the processor emulator/VM qemu which will let you run ARM and other processor-based systems (android, etc) on an x86 system.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Either the tarball is corrupt (is there a checksum to verify?), or the file name extension lies. In any case, you can expand a compressed tarball without decompressing the file first with tar using either the -z (gzip) or -j (bzip2) options: tar -zxf tarballname, or tar -jxf tarballname. This is useful especially in situations where you are running low on storage space.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Get a new drive. I believe that the Mac requires the backup drive to be in their format. The Windows backup drive is probably in either FAT or NTFS format (NTFS most likely, depending upon its size).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

USB modems on linux use the PPP (point-to-point protocol) to create a network connection. This usually does not require any specific driver. You need to visit the modem maker's site to see how to use it with PPP on Unix/Linux/OSX. Basically, the modem looks like a modem over USB device (serial-usb). Common stuff. I've used such frequently in the past, with both a USB Sprint broadband modem, and using my Android phone as a USB broadband modem. Both worked out-of-the-box without drivers, configuration, or whatever.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

There is an environment variable HISTSIZE that specifies the number of commands that history will save. I'm not sure what the default is, but I have mine set to 1000, so I have access to the last 1000 shell commands. You can also set the HISTCONTROL=ignoredups which will keep you from seeing duplicate commands in your history - a common occurance.

This works for the bash shell. Unix systems often use the Korn or C shells. They have different options to set these limits.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Several things happen when you remove the CMOS battery for more than a very short period of time (like to replace it with a new battery), and the system is unpowered.

  1. The CMOS memory is erased. This is where the BIOS settings are stored.
  2. The system is restored to factory defaults - pre-system installation.
  3. In some cases, the EPROM/flash data may be erased (should not happen in current systems).

So, you will have to go into the BIOS and re-configure ALL of the system settings. Then, you may be able to reboot after saving the settings (CPU configuration, date+time, boot order, etc).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

FWIW, I also have Nokia Symbian, S40, and Lumia phones (funny that, considering I am a Nokia engineer).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Most any Android device will do this just fine. They have a selectable option on how to present the device to your PC operating system. I run Linux RHEL 6.x and have a Nexus One (gingerbread), and can either mount it as a "smart" device, or as a USB drive. In any case, all Android phones should work well with Linux. Windows phones (Nokia Lumia phones), and iPhones, not so well. Don't know about RIM phones.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

By default, class members are private. You cannot assign to temp->TeamName from a string. This is where a public setter method is appropriate, as in

class team
{
    string TeamName;
    .
    .
    .
public:
    setName(const string& name);
    .
    .
    .
};
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

A double is a scalar type, not a class type, but as nmaillet asked, is there a question here?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Also, providing the error output that you get is helpful as well. FWIW, the GNU Make documentation is quite good. Go here: http://www.gnu.org/software/make/manual/make.html

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Usually, you will need to also pass the size of the elements, as in:
void randomProgram(char random[][], size_t max1, size_t max2)
where max1 is the size of the first element, and max2 the size of the second. Then you can process it with something like this:

for (size_t i = 0; i < max1; i++)
{
    for (size_t j = 0; j < max2; j++)
    {
        doSomethingWith(random[i][j]);
    }
}

Of course, this is where in C++ we use vectors of vectors. You can much more easily deal with them in code.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Also, you have 8GB of RAM. Are you sure you aren't hitting the swapper (virtual memory / swap space)? A lot of these games are very RAM intensive, so it is possible that you are hitting the swap file.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Build a system with Intel workstation/server motherboard (dual CPU capable - a gazillion GB of ram space available) and an nVidia graphics card. They are reliable, fast, and well supported by Intel directly. I did that about 5 years ago, and if upgrading now, that's what I'd do again. At this point, I have an outdated system - 2x 3GHz quad core CPUs, 8GB RAM (only using 1/2 the slots available), and an nVidia 8800GT video card with dual 1920x1200 displays. In 5 years, I have had some RAM overheating problems, but re-arranging the SIMMs fixed that. For such a system, absolutely use fully-buffered ECC RAM. When my RAM was overheating, instead of failing entirely, the system was able to map the failing stick out of use automatically. All I saw (until I looked at the thermal monitor) was that I suddenly had 6GB instead of 8GB of RAM!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

As far as I know, the only way this can happen is if there is some software running on your system that takes data stored to the USB/thumb drive and converts it on the fly before it is physically written to the device. This sounds very much like a virus to me. What AV scanners have you used to check your system?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What JorgeM said is basically correct. Some simple math is required to decode IP addresses (I used to teach this in elementary networking classes to AT&T technicians, most with a high-school education) for a network admin position, but this is simple for anyone with high-school math. To be a network engineer (and all that the title "engineer" entails), then math at least through differential calculus is needed, plus a degree from a accredited educational institution. There are exceptions (I am one), but the basic skills cannot be shorted. I am a non-degreed engineer, but I have many university credits in graduate-level technical curricula, as well as the requisite maths and scientific knowledge.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You can do that, but it means that you need to configure the PC with internet connection as a router. How you do that depends entirely upon the operating system you are using (Windows, Linux, Apple-OSX).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

We do like to help people here at Daniweb, but we expect them to try to help themselves first! Especially for class exercises/problems. If we just give you the answer, it is simple cheating... Sorry, but most of us have worked to hard to learn this stuff just to give it away for nothing.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What L7Sqr said - post the compiler error / warning output here please.