|
by: Bernard |
last post by:
Hi All,
I am not sure if I should be asking this question on clc or clc++. Let me try on
both. I hope that this is not too trivial for the brilliant minds over here.
I know that OOP questions have been asked on clc before so it is probably OK.
I am a newbie to C++. BS 3rd edition states:
% The throw transfers control to a handler for exceptions ....
%
|
by: Rajan |
last post by:
Hi,
I am trying to simulate a memcpy like this
void* mem_cpy(void* dest, void* src, int bytes)
{
dest = malloc(bytes);
}
Now if I want to copy the bytes from src to dest, how do I copy these
bytes.
I am stuck here.
|
by: Lucas Tam |
last post by:
Are there any free diagramming components to build flow chart type graphs
for .NET - in particular one that works with ASP.NET?
If not, can anyone recommend one of the commerical components over another?
Northwood GoDiagram? SyncFusion? etc?
Thanks!
--
Lucas Tam (REMOVEnntp@rogers.com)
|
by: Praasd |
last post by:
Hi
I have a problem in understanding how to implement a process created in visio through code. For example I have a diagram in visio which is defining a process, lets assume some decision boxes i.e it's just like a flow chart. I have to write a program in c# which takes this file as input and follow the flow chart instructions based on the user inputs. Are there any such samples or links that can guide me, whixh can understand the flow chart...
|
by: codepp |
last post by:
Hello
I need a way to create a flow chart for some code written in C.
I need if there are a normalized way to create it like UML.
Thanks in advance.
|
|
by: D-Someone |
last post by:
I am re-posting this message as originially it did not get a single
response.. Any ideas?
--------------
I am trying to come up with a good design for a web service that has some
user logic and business processes involved. Here a small sample of the
process flow:
---
Client Get's User Input for field 1...
|
by: Rasheed |
last post by:
We are building a smart client application (.NET 2.0) which uses Web Services
to access the business objects.
Services: The Web Services have been secured by brokered authentication
using X509 certificate along with message level security. (Right now the web
services are consumed only by the smart client application in intranet
environment. However, few services would be exposed as enterprise services in
future. Such services can be...
|
by: bayer.justin |
last post by:
Hi,
I am trying to communicate with a subprocess via the subprocess
module. Consider the following example:
<subprocess.Popen object at 0x729f0>
Here hey is immediately print to stdout of my interpreter, I did not
type in the "hey". But I want to read from the output into a string,
so I do
|
by: iheartvba |
last post by:
In my School swimming team, my coaches decided to pull my leg, they gave the award for asking the most questions. I think someone in bytes is going to give me that award soon....
I have currently found how usefull flow charts are in programming, like the slow kid in school finds out in University the importance of doing an outline before writing the essay.
The issue is it's taking me a while to make the flow charts, can someone recommend a...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|