• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 06:49
CET 12:49
KST 20:49
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
RSL Season 3 - Playoffs Preview0RSL Season 3 - RO16 Groups C & D Preview0RSL Season 3 - RO16 Groups A & B Preview2TL.net Map Contest #21: Winners12Intel X Team Liquid Seoul event: Showmatches and Meet the Pros10
Community News
Weekly Cups (Nov 24-30): MaxPax, Clem, herO win2BGE Stara Zagora 2026 announced15[BSL21] Ro.16 Group Stage (C->B->A->D)4Weekly Cups (Nov 17-23): Solar, MaxPax, Clem win3RSL Season 3: RO16 results & RO8 bracket13
StarCraft 2
General
Maestros of the Game: Live Finals Preview (RO4) BGE Stara Zagora 2026 announced Weekly Cups (Nov 24-30): MaxPax, Clem, herO win SC2 Proleague Discontinued; SKT, KT, SGK, CJ disband Information Request Regarding Chinese Ladder
Tourneys
$5,000+ WardiTV 2025 Championship Constellation Cup - Main Event - Stellar Fest RSL Revival: Season 3 Tenacious Turtle Tussle [Alpha Pro Series] Nice vs Cure
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 502 Negative Reinforcement Mutation # 501 Price of Progress Mutation # 500 Fright night Mutation # 499 Chilling Adaptation
Brood War
General
BGH Auto Balance -> http://bghmmr.eu/ Data analysis on 70 million replays Which season is the best in ASL? [ASL20] Ask the mapmakers — Drop your questions BW General Discussion
Tourneys
[Megathread] Daily Proleagues [BSL21] RO16 Group B - Sunday 21:00 CET [BSL21] RO16 Group C - Saturday 21:00 CET Small VOD Thread 2.0
Strategy
Game Theory for Starcraft How to stay on top of macro? Current Meta PvZ map balance
Other Games
General Games
Stormgate/Frost Giant Megathread The Perfect Game Path of Exile Nintendo Switch Thread Should offensive tower rushing be viable in RTS games?
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas TL Mafia Community Thread
Community
General
Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine US Politics Mega-thread The Big Programming Thread Artificial Intelligence Thread
Fan Clubs
White-Ra Fan Club
Media & Entertainment
[Manga] One Piece Movie Discussion! Anime Discussion Thread
Sports
2024 - 2026 Football Thread Formula 1 Discussion NBA General Discussion
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
Where to ask questions and add stream? The Automated Ban List
Blogs
James Bond movies ranking - pa…
Topin
Esports Earnings: Bigger Pri…
TrAiDoS
Thanks for the RSL
Hildegard
Saturation point
Uldridge
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1153 users

The Big Programming Thread - Page 429

Forum Index > General Forum
Post a Reply
Prev 1 427 428 429 430 431 1032 Next
Thread Rules
1. This is not a "do my homework for me" thread. If you have specific questions, ask, but don't post an assignment or homework problem and expect an exact solution.
2. No recruiting for your cockamamie projects (you won't replace facebook with 3 dudes you found on the internet and $20)
3. If you can't articulate why a language is bad, don't start slinging shit about it. Just remember that nothing is worse than making CSS IE6 compatible.
4. Use [code] tags to format code blocks.
Abominous
Profile Joined March 2013
Croatia1625 Posts
January 18 2014 13:41 GMT
#8561
On January 18 2014 22:32 TheSwedishFan wrote:
A easy one.
What does [1,n] mean? I've studied database modeling before and there were something similar called a "one-to-many" relationship between entities. Translating that to a programming language would suggest an array. However, i get the sense that it means a range where 1 is the smallest value and "n" the biggest.
So does it mean range or array? Or something else?

In Algorithms let's say an Array[1...N] would present an array of N elements called Array.

In Databases if you're studying the relations between entities, it represents cardinality number in a relation, for example of a 1 to N cardinality relation, let's say one doctor can have N patients.

Maybe it's something third but I cannot think of anything else right now.
icystorage
Profile Blog Joined November 2008
Jollibee19350 Posts
January 18 2014 13:54 GMT
#8562
i really think it depends on where you are using it.
[1,n] might also mean from 2 to n-1 (excluding 1 and n). I'm not sure im too lazy to confirm
LiquidDota StaffAre you ready for a Miracle-? We are! The International 2017 Champions!
zhr
Profile Joined September 2010
Finland12 Posts
January 18 2014 14:56 GMT
#8563
On January 18 2014 22:54 icystorage wrote:
i really think it depends on where you are using it.
[1,n] might also mean from 2 to n-1 (excluding 1 and n). I'm not sure im too lazy to confirm


In maths it means the interval from 1 to n (inclusive), while ]1,n[ means from 2 to n-1 when talking about integers. https://en.wikipedia.org/wiki/Bracket_(mathematics)#Intervals
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
January 18 2014 15:00 GMT
#8564
In some languages, I think python being one of them, it also means "Array/string slice from index 1 to n".

I think in this context it means the 1 to n relation in databases though.
Mr. Wiggles
Profile Blog Joined August 2010
Canada5894 Posts
January 18 2014 17:44 GMT
#8565
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf
you gotta dance
TimKim0713
Profile Joined June 2012
Korea (South)221 Posts
January 18 2014 19:09 GMT
#8566
On January 18 2014 14:24 Warri wrote:
Show nested quote +
On January 18 2014 13:18 TimKim0713 wrote:
Hello,
I'm fairly new to Java, and I have been stuck understanding somewhat of concepts.

So, the main (problem) concept is about using methods/constructors/variables from different class to another...
For Example, (https://docs.google.com/file/d/0B17THXdfP8JwLTBIMUdWQkszWmM/edit)

There are 3 classes and under ClassRoom class, it has " Arraylist<Student> roster ".

Does the Arraylist roster have all the methods under Student Class?
Meaning it can do - roster.getID(); and roster.getRoom(); ?
If not, how does the arraylist roster have access methods or do something from Student?
Methods under Student Class are used by whom? (how?)


OR am I totally off?

Can someone please explain what uses what methods and etc under which class?

Gahh.... Confusing!

Thanks. I appreciate it.





You need to understand that java is mostly about references to objects. The ArrayList is an object itself and contains references (the location where the objects are stored in the memory) to other objects, in this case from the student class.
So if you already have the references stored in the arraylist, the objects are already created. To access them you can define a new reference to the object in question. For example
Student s = roster.get(0);
No new object is created here, the only thing that happens is that s is now a reference to the object that is also referenced in the ArrayList (which it still does after this call).
Now you can work with that objects methods by using s.getID(); Or, you could have done it directly with roster.get(0).getID();

Student s = new Student(); this on the other hand, would create a new object of the student class which gets referenced by s.



Thanks for your help!
Does this mean that In the Arraylist of roster, Students are in there?

like
for(int x=0; x<roster.size(); x++{
roster.get(x);
}

would this go throguh all the students since that "roster" arraylist is made of Students?

(roster.get(0) would be a student ?)

Thanks :D
I guess in ArrayList<**THISTHING**> name, "<**THISTHING**> would be the type of stuff in the arraylist then...

Did I understand correctly?

Prillan
Profile Joined August 2011
Sweden350 Posts
January 18 2014 20:19 GMT
#8567
On January 19 2014 00:00 Morfildur wrote:
In some languages, I think python being one of them, it also means "Array/string slice from index 1 to n".

I think in this context it means the 1 to n relation in databases though.


No, [1:n] is what you're thinking of. Also, in python [1, n] is the same as [(1, n)] so it tries to grab element at index (1, n) which doesn't exist for lists.
TheBB's sidekick, aligulac.com | "Reality is frequently inaccurate." - Douglas Adams
Shield
Profile Blog Joined August 2009
Bulgaria4824 Posts
Last Edited: 2014-01-18 21:45:24
January 18 2014 20:43 GMT
#8568
On January 19 2014 04:09 TimKim0713 wrote:
Show nested quote +
On January 18 2014 14:24 Warri wrote:
On January 18 2014 13:18 TimKim0713 wrote:
Hello,
I'm fairly new to Java, and I have been stuck understanding somewhat of concepts.

So, the main (problem) concept is about using methods/constructors/variables from different class to another...
For Example, (https://docs.google.com/file/d/0B17THXdfP8JwLTBIMUdWQkszWmM/edit)

There are 3 classes and under ClassRoom class, it has " Arraylist<Student> roster ".

Does the Arraylist roster have all the methods under Student Class?
Meaning it can do - roster.getID(); and roster.getRoom(); ?
If not, how does the arraylist roster have access methods or do something from Student?
Methods under Student Class are used by whom? (how?)


OR am I totally off?

Can someone please explain what uses what methods and etc under which class?

Gahh.... Confusing!

Thanks. I appreciate it.





You need to understand that java is mostly about references to objects. The ArrayList is an object itself and contains references (the location where the objects are stored in the memory) to other objects, in this case from the student class.
So if you already have the references stored in the arraylist, the objects are already created. To access them you can define a new reference to the object in question. For example
Student s = roster.get(0);
No new object is created here, the only thing that happens is that s is now a reference to the object that is also referenced in the ArrayList (which it still does after this call).
Now you can work with that objects methods by using s.getID(); Or, you could have done it directly with roster.get(0).getID();

Student s = new Student(); this on the other hand, would create a new object of the student class which gets referenced by s.



Thanks for your help!
Does this mean that In the Arraylist of roster, Students are in there?

like
for(int x=0; x<roster.size(); x++{
roster.get(x);
}

would this go throguh all the students since that "roster" arraylist is made of Students?

(roster.get(0) would be a student ?)

Thanks :D
I guess in ArrayList<**THISTHING**> name, "<**THISTHING**> would be the type of stuff in the arraylist then...

Did I understand correctly?



Yes, you should get all students from that loop. However, I personally prefer, maybe others too, enumeration like this:

Syntax: Object type | variable | the container (collection) variable

for (Student s : roster) {
s.method(); // method implemented by the Student class
}


Alternatively, you may still use your initial loop approach like this. It is similar to the above code:

for (int x=0; x<roster.size(); x++) {
roster.get(x).method(); // method implemented by the Student class
}


And to your second question, yes, you need to specify the type of object when you use a container (ArrayList, Vector, Stack, Map, Set, HashSet, etc).

So in this case: ArrayList<Student> roster = new ArrayList<Student>();
Cyx.
Profile Joined November 2010
Canada806 Posts
January 18 2014 21:30 GMT
#8569
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

Show nested quote +
What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf


Pretty fucking cool, especially considering I'm taking an assembly course in school right meow ^^ thanks for sharing!
Mavvie
Profile Blog Joined May 2012
Canada923 Posts
Last Edited: 2014-01-18 22:12:44
January 18 2014 22:11 GMT
#8570
On January 19 2014 05:19 Prillan wrote:
Show nested quote +
On January 19 2014 00:00 Morfildur wrote:
In some languages, I think python being one of them, it also means "Array/string slice from index 1 to n".

I think in this context it means the 1 to n relation in databases though.


No, [1:n] is what you're thinking of. Also, in python [1, n] is the same as [(1, n)] so it tries to grab element at index (1, n) which doesn't exist for lists.

It's..a bit more similar to Ruby? str[s,n] returns a string of n letters starting at index s.

e.g.
$ irb
> str = "abcde"
> str[2,2]
#=> "cd"


He definitely meant databases though, 1 to many relation.
Getting back into sc2 O_o
necrosexy
Profile Joined March 2011
451 Posts
Last Edited: 2014-01-19 01:31:51
January 19 2014 01:22 GMT
#8571
i need to compile this java program with ant. it's not finding the class in the external jar:
"Exception in thread "main" java.lang.NoClassDefFoundError: org/jsoup/Jsoup"
it compiles correctly, but i'm getting this error after go into the build directory and try to run the program (java prog ...)
the code works if I manually compile it w/o ant.

EDIT: nevermind, i figured it out. i feel so silly...

directory structure
project
/src
/lib (external jar here)
/build
build.xml


here's the build.xml:
<project name="Project1" default="compile" basedir=".">
<description>
Project1
</description>
<property name="src" location="src"/>
<property name="lib" location="lib"/>
<property name="build" location="build"/>

<path id="classpath">
<fileset dir="${lib}" includes="**/*.jar"/>
</path>

<target name="init">
<tstamp/>
<mkdir dir="${build}"/>
</target>
<target name="compile" depends="init" description="compile the source " >
<javac srcdir="${src}" destdir="${build}" classpathref="classpath"/>
</target>

<target name="clean"
description="clean up" >
<delete dir="${build}"/>
</target>
</project>

Shield
Profile Blog Joined August 2009
Bulgaria4824 Posts
Last Edited: 2014-01-19 02:34:54
January 19 2014 02:33 GMT
#8572
Is it my Java's code understanding or is that guy's code is very unreadable with long methods?

http://www.teamliquid.net/forum/viewmessage.php?topic_id=436957

I remember one of you prefers 5-10 lines methods.

Edit: Why does his .h (header) file provide actual implementation?
sluggaslamoo
Profile Blog Joined November 2009
Australia4494 Posts
Last Edited: 2014-01-19 03:49:04
January 19 2014 03:48 GMT
#8573
On January 19 2014 11:33 darkness wrote:
Is it my Java's code understanding or is that guy's code is very unreadable with long methods?

http://www.teamliquid.net/forum/viewmessage.php?topic_id=436957

I remember one of you prefers 5-10 lines methods.

Edit: Why does his .h (header) file provide actual implementation?


1-3 lines functional/declarative, 3-5 lines imperative

Its "throwaway code" though, so I don't really count that. My code is pretty bad when I'm casually testing stuff on a single file, then when I realise there's some merit to it I will refactor the whole thing.

I would only care if it was a longer term project that requires maintenance. Although I certainly would not like to work on that particular code.
Come play Android Netrunner - http://www.teamliquid.net/forum/viewmessage.php?topic_id=409008
phar
Profile Joined August 2011
United States1080 Posts
January 19 2014 20:48 GMT
#8574
On January 19 2014 11:33 darkness wrote:
Edit: Why does his .h (header) file provide actual implementation?

So in a lot of style guides you are allowed to inline some small stuff into the header file. Not the way he's doing it, but certain things are ok.
Who after all is today speaking about the destruction of the Armenians?
Tobberoth
Profile Joined August 2010
Sweden6375 Posts
January 19 2014 21:30 GMT
#8575
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

Show nested quote +
What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf

Thanks for recommending this, I just beat the first non-tutorial level. I've been looking for something like this, a game which is actually really useful for training assembly, reverse engineering etc. It's almost scary how realistic it is, it's more or less exactly how you crack programs IRL.
Cyx.
Profile Joined November 2010
Canada806 Posts
January 20 2014 00:53 GMT
#8576
On January 20 2014 06:30 Tobberoth wrote:
Show nested quote +
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf

Thanks for recommending this, I just beat the first non-tutorial level. I've been looking for something like this, a game which is actually really useful for training assembly, reverse engineering etc. It's almost scary how realistic it is, it's more or less exactly how you crack programs IRL.


Hahaha tell me about it, so cool! I just made a program execute arbitrary machine language that I typed in as a password ^^ I'm like 9 levels in so far, we'll see how far I get tonight =D
Ben...
Profile Joined January 2011
Canada3485 Posts
Last Edited: 2014-01-20 02:57:05
January 20 2014 02:55 GMT
#8577
On January 19 2014 06:30 Cyx. wrote:
Show nested quote +
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf


Pretty fucking cool, especially considering I'm taking an assembly course in school right meow ^^ thanks for sharing!

Which flavour of assembly?

I actually find assembly quite fun so far. It can be finicky but once you figure something out there is no transparency to it. It can be tedious at times but not too bad and it is quite reliable. It will do exactly what I expect it to.
"Cliiiiiiiiiiiiiiiiide" -Tastosis
WarSame
Profile Blog Joined February 2010
Canada1950 Posts
January 20 2014 03:56 GMT
#8578
In my school last semester we did MIPS, this semester we're doing x86. Interesting stuff, but it takes forever to write simple programs. On Wikipedia it says that the person who made Rollercoaster Tycoon did it entirely in Assembly. That person is likely insane.
Can it be I stayed away too long? Did you miss these rhymes while I was gone?
Ben...
Profile Joined January 2011
Canada3485 Posts
Last Edited: 2014-01-20 05:44:47
January 20 2014 05:44 GMT
#8579
On January 20 2014 12:56 WarSame wrote:
In my school last semester we did MIPS, this semester we're doing x86. Interesting stuff, but it takes forever to write simple programs. On Wikipedia it says that the person who made Rollercoaster Tycoon did it entirely in Assembly. That person is likely insane.

Ah I see. We are doing MIPS as well.

Also, Chris Sawyer is the guy who made those RCT games. He's a maniac apparently. Fun games though. He did all his games in x86 Assembly back then
"Cliiiiiiiiiiiiiiiiide" -Tastosis
dapierow
Profile Blog Joined April 2010
Serbia1316 Posts
Last Edited: 2014-01-20 05:46:24
January 20 2014 05:44 GMT
#8580
Hey quick question. When I'm trying to split a text file in into an array list, which I know how to do but the problem is, this text file is a lot larger than others, and to split each segment of the text file, the Line where the segment needs to be split contains only "SP" short for split here. So my question is how do make my loop check for that SP line to split the segments into the arraylist.

while( !((input = in.nextLine()).equals("SP")))

does not seem to work for me, am I at least on the right track with it?
Eat.Sleep.Starcraft 2
Prev 1 427 428 429 430 431 1032 Next
Please log in or register to reply.
Live Events Refresh
Next event in 12m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
SortOf 237
ProTech123
Reynor 79
MindelVK 43
Rex 42
StarCraft: Brood War
Calm 5142
Shuttle 1870
Horang2 1736
Jaedong 746
actioN 618
Mini 313
Light 224
EffOrt 206
Hyun 203
Last 180
[ Show more ]
ZerO 151
Rush 128
Pusan 112
Snow 110
Sharp 89
Zeus 74
Killer 63
ToSsGirL 63
Mong 62
hero 56
sorry 37
NotJumperer 23
scan(afreeca) 20
soO 17
Aegong 13
ajuk12(nOOB) 13
Hm[arnc] 6
Terrorterran 2
Dota 2
singsing1257
Counter-Strike
olofmeister2193
shoxiejesuss845
x6flipin401
allub179
Other Games
B2W.Neo728
XaKoH 296
Fuzer 213
KnowMe87
ZerO(Twitch)9
Organizations
Other Games
gamesdonequick591
StarCraft: Brood War
lovetv 3
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 15 non-featured ]
StarCraft 2
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• C_a_k_e 1132
• WagamamaTV132
• lizZardDota269
League of Legends
• Jankos2651
• Stunt843
Upcoming Events
Wardi Open
12m
StarCraft2.fi
5h 12m
Replay Cast
12h 12m
The PondCast
22h 12m
OSC
1d 4h
Demi vs Mixu
Nicoract vs TBD
Babymarine vs MindelVK
ForJumy vs TBD
Shameless vs Percival
Replay Cast
1d 12h
Korean StarCraft League
2 days
CranKy Ducklings
2 days
WardiTV 2025
3 days
SC Evo League
3 days
[ Show More ]
BSL 21
3 days
Sziky vs OyAji
Gypsy vs eOnzErG
OSC
3 days
Solar vs Creator
ByuN vs Gerald
Percival vs Babymarine
Moja vs Krystianer
EnDerr vs ForJumy
sebesdes vs Nicoract
Sparkling Tuna Cup
3 days
WardiTV 2025
4 days
OSC
4 days
BSL 21
4 days
Bonyth vs StRyKeR
Tarson vs Dandy
Replay Cast
4 days
Wardi Open
5 days
StarCraft2.fi
5 days
Replay Cast
5 days
WardiTV 2025
6 days
StarCraft2.fi
6 days
PiGosaur Monday
6 days
Liquipedia Results

Completed

Proleague 2025-11-30
RSL Revival: Season 3
Light HT

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
YSL S2
BSL Season 21
CSCL: Masked Kings S3
Slon Tour Season 2
Acropolis #4 - TS3
META Madness #9
SL Budapest Major 2025
ESL Impact League Season 8
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2

Upcoming

BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
Bellum Gens Elite Stara Zagora 2026
HSC XXVIII
RSL Offline Finals
WardiTV 2025
Kuram Kup
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
eXTREMESLAND 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.