• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 05:52
CEST 11:52
KST 18:52
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Code S Season 1 - RO12 Group A: Rogue, Percival, Solar, Zoun7[ASL21] Ro8 Preview Pt1: Inheritors16[ASL21] Ro16 Preview Pt2: All Star10Team Liquid Map Contest #22 - The Finalists19[ASL21] Ro16 Preview Pt1: Fresh Flow9
Community News
2026 GSL Season 1 Qualifiers25Maestros of the Game 2 announced92026 GSL Tour plans announced15Weekly Cups (April 6-12): herO doubles, "Villains" prevail1MaNa leaves Team Liquid25
StarCraft 2
General
Code S Season 1 - RO12 Group A: Rogue, Percival, Solar, Zoun Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool Team Liquid Map Contest #22 - The Finalists MaNa leaves Team Liquid Maestros of the Game 2 announced
Tourneys
FSL Season 10 Individual Championship GSL Code S Season 1 (2026) WardiTV Spring Cup 2026 GSL Season 1 Qualifiers Sparkling Tuna Cup - Weekly Open Tournament
Strategy
Custom Maps
[D]RTS in all its shapes and glory <3 [A] Nemrods 1/4 players [M] (2) Frigid Storage
External Content
The PondCast: SC2 News & Results Mutation # 523 Firewall Mutation # 522 Flip My Base Mutation # 521 Memorable Boss
Brood War
General
ASL21 General Discussion JaeDong's ASL S21 Ro16 Post-Review BW General Discussion Leta's ASL S21 Ro.16 review [ASL21] Ro8 Preview Pt1: Inheritors
Tourneys
[ASL21] Ro8 Day 2 [BSL22] RO16 Group Stage - 02 - 10 May [Megathread] Daily Proleagues [ASL21] Ro8 Day 1
Strategy
Fighting Spirit mining rates Simple Questions, Simple Answers What's the deal with APM & what's its true value Any training maps people recommend?
Other Games
General Games
Daigo vs Menard Best of 10 Stormgate/Frost Giant Megathread Nintendo Switch Thread Dawn of War IV Diablo IV
Dota 2
The Story of Wings Gaming
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Vanilla Mini Mafia Mafia Game Mode Feedback/Ideas TL Mafia Community Thread Five o'clock TL Mafia
Community
General
European Politico-economics QA Mega-thread US Politics Mega-thread Russo-Ukrainian War Thread 3D technology/software discussion Canadian Politics Mega-thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece [Req][Books] Good Fantasy/SciFi books Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion McBoner: A hockey love story
World Cup 2022
Tech Support
streaming software Strange computer issues (software) [G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Sexual Health Of Gamers
TrAiDoS
lurker extra damage testi…
StaticNine
Broowar part 2
qwaykee
Funny Nicknames
LUCKY_NOOB
Iranian anarchists: organize…
XenOsky
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1459 users

The Big Programming Thread - Page 429

Forum Index > General Forum
Post a Reply
Prev 1 427 428 429 430 431 1032 Next
Thread Rules
1. This is not a "do my homework for me" thread. If you have specific questions, ask, but don't post an assignment or homework problem and expect an exact solution.
2. No recruiting for your cockamamie projects (you won't replace facebook with 3 dudes you found on the internet and $20)
3. If you can't articulate why a language is bad, don't start slinging shit about it. Just remember that nothing is worse than making CSS IE6 compatible.
4. Use [code] tags to format code blocks.
Abominous
Profile Joined March 2013
Croatia1625 Posts
January 18 2014 13:41 GMT
#8561
On January 18 2014 22:32 TheSwedishFan wrote:
A easy one.
What does [1,n] mean? I've studied database modeling before and there were something similar called a "one-to-many" relationship between entities. Translating that to a programming language would suggest an array. However, i get the sense that it means a range where 1 is the smallest value and "n" the biggest.
So does it mean range or array? Or something else?

In Algorithms let's say an Array[1...N] would present an array of N elements called Array.

In Databases if you're studying the relations between entities, it represents cardinality number in a relation, for example of a 1 to N cardinality relation, let's say one doctor can have N patients.

Maybe it's something third but I cannot think of anything else right now.
icystorage
Profile Blog Joined November 2008
Jollibee19350 Posts
January 18 2014 13:54 GMT
#8562
i really think it depends on where you are using it.
[1,n] might also mean from 2 to n-1 (excluding 1 and n). I'm not sure im too lazy to confirm
LiquidDota StaffAre you ready for a Miracle-? We are! The International 2017 Champions!
zhr
Profile Joined September 2010
Finland12 Posts
January 18 2014 14:56 GMT
#8563
On January 18 2014 22:54 icystorage wrote:
i really think it depends on where you are using it.
[1,n] might also mean from 2 to n-1 (excluding 1 and n). I'm not sure im too lazy to confirm


In maths it means the interval from 1 to n (inclusive), while ]1,n[ means from 2 to n-1 when talking about integers. https://en.wikipedia.org/wiki/Bracket_(mathematics)#Intervals
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
January 18 2014 15:00 GMT
#8564
In some languages, I think python being one of them, it also means "Array/string slice from index 1 to n".

I think in this context it means the 1 to n relation in databases though.
Mr. Wiggles
Profile Blog Joined August 2010
Canada5894 Posts
January 18 2014 17:44 GMT
#8565
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf
you gotta dance
TimKim0713
Profile Joined June 2012
Korea (South)221 Posts
January 18 2014 19:09 GMT
#8566
On January 18 2014 14:24 Warri wrote:
Show nested quote +
On January 18 2014 13:18 TimKim0713 wrote:
Hello,
I'm fairly new to Java, and I have been stuck understanding somewhat of concepts.

So, the main (problem) concept is about using methods/constructors/variables from different class to another...
For Example, (https://docs.google.com/file/d/0B17THXdfP8JwLTBIMUdWQkszWmM/edit)

There are 3 classes and under ClassRoom class, it has " Arraylist<Student> roster ".

Does the Arraylist roster have all the methods under Student Class?
Meaning it can do - roster.getID(); and roster.getRoom(); ?
If not, how does the arraylist roster have access methods or do something from Student?
Methods under Student Class are used by whom? (how?)


OR am I totally off?

Can someone please explain what uses what methods and etc under which class?

Gahh.... Confusing!

Thanks. I appreciate it.





You need to understand that java is mostly about references to objects. The ArrayList is an object itself and contains references (the location where the objects are stored in the memory) to other objects, in this case from the student class.
So if you already have the references stored in the arraylist, the objects are already created. To access them you can define a new reference to the object in question. For example
Student s = roster.get(0);
No new object is created here, the only thing that happens is that s is now a reference to the object that is also referenced in the ArrayList (which it still does after this call).
Now you can work with that objects methods by using s.getID(); Or, you could have done it directly with roster.get(0).getID();

Student s = new Student(); this on the other hand, would create a new object of the student class which gets referenced by s.



Thanks for your help!
Does this mean that In the Arraylist of roster, Students are in there?

like
for(int x=0; x<roster.size(); x++{
roster.get(x);
}

would this go throguh all the students since that "roster" arraylist is made of Students?

(roster.get(0) would be a student ?)

Thanks :D
I guess in ArrayList<**THISTHING**> name, "<**THISTHING**> would be the type of stuff in the arraylist then...

Did I understand correctly?

Prillan
Profile Joined August 2011
Sweden350 Posts
January 18 2014 20:19 GMT
#8567
On January 19 2014 00:00 Morfildur wrote:
In some languages, I think python being one of them, it also means "Array/string slice from index 1 to n".

I think in this context it means the 1 to n relation in databases though.


No, [1:n] is what you're thinking of. Also, in python [1, n] is the same as [(1, n)] so it tries to grab element at index (1, n) which doesn't exist for lists.
TheBB's sidekick, aligulac.com | "Reality is frequently inaccurate." - Douglas Adams
Shield
Profile Blog Joined August 2009
Bulgaria4824 Posts
Last Edited: 2014-01-18 21:45:24
January 18 2014 20:43 GMT
#8568
On January 19 2014 04:09 TimKim0713 wrote:
Show nested quote +
On January 18 2014 14:24 Warri wrote:
On January 18 2014 13:18 TimKim0713 wrote:
Hello,
I'm fairly new to Java, and I have been stuck understanding somewhat of concepts.

So, the main (problem) concept is about using methods/constructors/variables from different class to another...
For Example, (https://docs.google.com/file/d/0B17THXdfP8JwLTBIMUdWQkszWmM/edit)

There are 3 classes and under ClassRoom class, it has " Arraylist<Student> roster ".

Does the Arraylist roster have all the methods under Student Class?
Meaning it can do - roster.getID(); and roster.getRoom(); ?
If not, how does the arraylist roster have access methods or do something from Student?
Methods under Student Class are used by whom? (how?)


OR am I totally off?

Can someone please explain what uses what methods and etc under which class?

Gahh.... Confusing!

Thanks. I appreciate it.





You need to understand that java is mostly about references to objects. The ArrayList is an object itself and contains references (the location where the objects are stored in the memory) to other objects, in this case from the student class.
So if you already have the references stored in the arraylist, the objects are already created. To access them you can define a new reference to the object in question. For example
Student s = roster.get(0);
No new object is created here, the only thing that happens is that s is now a reference to the object that is also referenced in the ArrayList (which it still does after this call).
Now you can work with that objects methods by using s.getID(); Or, you could have done it directly with roster.get(0).getID();

Student s = new Student(); this on the other hand, would create a new object of the student class which gets referenced by s.



Thanks for your help!
Does this mean that In the Arraylist of roster, Students are in there?

like
for(int x=0; x<roster.size(); x++{
roster.get(x);
}

would this go throguh all the students since that "roster" arraylist is made of Students?

(roster.get(0) would be a student ?)

Thanks :D
I guess in ArrayList<**THISTHING**> name, "<**THISTHING**> would be the type of stuff in the arraylist then...

Did I understand correctly?



Yes, you should get all students from that loop. However, I personally prefer, maybe others too, enumeration like this:

Syntax: Object type | variable | the container (collection) variable

for (Student s : roster) {
s.method(); // method implemented by the Student class
}


Alternatively, you may still use your initial loop approach like this. It is similar to the above code:

for (int x=0; x<roster.size(); x++) {
roster.get(x).method(); // method implemented by the Student class
}


And to your second question, yes, you need to specify the type of object when you use a container (ArrayList, Vector, Stack, Map, Set, HashSet, etc).

So in this case: ArrayList<Student> roster = new ArrayList<Student>();
Cyx.
Profile Joined November 2010
Canada806 Posts
January 18 2014 21:30 GMT
#8569
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

Show nested quote +
What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf


Pretty fucking cool, especially considering I'm taking an assembly course in school right meow ^^ thanks for sharing!
Mavvie
Profile Blog Joined May 2012
Canada923 Posts
Last Edited: 2014-01-18 22:12:44
January 18 2014 22:11 GMT
#8570
On January 19 2014 05:19 Prillan wrote:
Show nested quote +
On January 19 2014 00:00 Morfildur wrote:
In some languages, I think python being one of them, it also means "Array/string slice from index 1 to n".

I think in this context it means the 1 to n relation in databases though.


No, [1:n] is what you're thinking of. Also, in python [1, n] is the same as [(1, n)] so it tries to grab element at index (1, n) which doesn't exist for lists.

It's..a bit more similar to Ruby? str[s,n] returns a string of n letters starting at index s.

e.g.
$ irb
> str = "abcde"
> str[2,2]
#=> "cd"


He definitely meant databases though, 1 to many relation.
Getting back into sc2 O_o
necrosexy
Profile Joined March 2011
451 Posts
Last Edited: 2014-01-19 01:31:51
January 19 2014 01:22 GMT
#8571
i need to compile this java program with ant. it's not finding the class in the external jar:
"Exception in thread "main" java.lang.NoClassDefFoundError: org/jsoup/Jsoup"
it compiles correctly, but i'm getting this error after go into the build directory and try to run the program (java prog ...)
the code works if I manually compile it w/o ant.

EDIT: nevermind, i figured it out. i feel so silly...

directory structure
project
/src
/lib (external jar here)
/build
build.xml


here's the build.xml:
<project name="Project1" default="compile" basedir=".">
<description>
Project1
</description>
<property name="src" location="src"/>
<property name="lib" location="lib"/>
<property name="build" location="build"/>

<path id="classpath">
<fileset dir="${lib}" includes="**/*.jar"/>
</path>

<target name="init">
<tstamp/>
<mkdir dir="${build}"/>
</target>
<target name="compile" depends="init" description="compile the source " >
<javac srcdir="${src}" destdir="${build}" classpathref="classpath"/>
</target>

<target name="clean"
description="clean up" >
<delete dir="${build}"/>
</target>
</project>

Shield
Profile Blog Joined August 2009
Bulgaria4824 Posts
Last Edited: 2014-01-19 02:34:54
January 19 2014 02:33 GMT
#8572
Is it my Java's code understanding or is that guy's code is very unreadable with long methods?

http://www.teamliquid.net/forum/viewmessage.php?topic_id=436957

I remember one of you prefers 5-10 lines methods.

Edit: Why does his .h (header) file provide actual implementation?
sluggaslamoo
Profile Blog Joined November 2009
Australia4494 Posts
Last Edited: 2014-01-19 03:49:04
January 19 2014 03:48 GMT
#8573
On January 19 2014 11:33 darkness wrote:
Is it my Java's code understanding or is that guy's code is very unreadable with long methods?

http://www.teamliquid.net/forum/viewmessage.php?topic_id=436957

I remember one of you prefers 5-10 lines methods.

Edit: Why does his .h (header) file provide actual implementation?


1-3 lines functional/declarative, 3-5 lines imperative

Its "throwaway code" though, so I don't really count that. My code is pretty bad when I'm casually testing stuff on a single file, then when I realise there's some merit to it I will refactor the whole thing.

I would only care if it was a longer term project that requires maintenance. Although I certainly would not like to work on that particular code.
Come play Android Netrunner - http://www.teamliquid.net/forum/viewmessage.php?topic_id=409008
phar
Profile Joined August 2011
United States1080 Posts
January 19 2014 20:48 GMT
#8574
On January 19 2014 11:33 darkness wrote:
Edit: Why does his .h (header) file provide actual implementation?

So in a lot of style guides you are allowed to inline some small stuff into the header file. Not the way he's doing it, but certain things are ok.
Who after all is today speaking about the destruction of the Armenians?
Tobberoth
Profile Joined August 2010
Sweden6375 Posts
January 19 2014 21:30 GMT
#8575
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

Show nested quote +
What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf

Thanks for recommending this, I just beat the first non-tutorial level. I've been looking for something like this, a game which is actually really useful for training assembly, reverse engineering etc. It's almost scary how realistic it is, it's more or less exactly how you crack programs IRL.
Cyx.
Profile Joined November 2010
Canada806 Posts
January 20 2014 00:53 GMT
#8576
On January 20 2014 06:30 Tobberoth wrote:
Show nested quote +
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf

Thanks for recommending this, I just beat the first non-tutorial level. I've been looking for something like this, a game which is actually really useful for training assembly, reverse engineering etc. It's almost scary how realistic it is, it's more or less exactly how you crack programs IRL.


Hahaha tell me about it, so cool! I just made a program execute arbitrary machine language that I typed in as a password ^^ I'm like 9 levels in so far, we'll see how far I get tonight =D
Ben...
Profile Joined January 2011
Canada3485 Posts
Last Edited: 2014-01-20 02:57:05
January 20 2014 02:55 GMT
#8577
On January 19 2014 06:30 Cyx. wrote:
Show nested quote +
On January 19 2014 02:44 Mr. Wiggles wrote:
Hey, so I've been playing with something last night that I think maybe a couple of people here would be interested in.

https://microcorruption.com/

What is it?

Your target is a small embedded device; a microcontroller running compiled C code.

You get access to the device, disassembly of its code, and a low-level debugger and assembler. We "run" the devices, you interact with them via a vanilla web interface.

At each level, you'll get a simple input that, owing to some C software bug, can be used to own the target. You'll use the debugger to reverse the target, find the input, and then deliver it to a "production" instance to beat the level.

You'll face a series of revisions of the target, starting from "comically broken" and proceeding vendor-fix by vendor-fix through basic memory corruption, stack overflows, randomization, memory protection schemes, allocator vulnerabilities, and DRM-style software protection.

All this happens on an architecture you've probably used, but likely never have written any code for. Have you ever reverse-engineered a program from its assembly code to understand what it's doing? That'll happen too.

We're keeping a leaderboard, by completion time, CPU cycles, and input size. Part of the fun of a challenge like this is to see how others are doing in real-time.

If you've done a lot of exploit development, you won't have much trouble. But we hope the real fun is reserved for the people who haven't: you'll get to play with concepts that, in the real world, involve tedious toolchain installs and comprehensive knowledge of the memory layouts of gigantic browser library codebases. You won't need any of that here: we're looking forward to seeing people who have never written a line of assembly beating people who've been doing this for years.


It's been pretty fun so far, I've beaten the first 3 levels. You don't need any experience with exploit development, and knowing assembly helps, but it's pretty easy to pick up. They have a little manual attached for it:

https://microcorruption.com/manual.pdf


Pretty fucking cool, especially considering I'm taking an assembly course in school right meow ^^ thanks for sharing!

Which flavour of assembly?

I actually find assembly quite fun so far. It can be finicky but once you figure something out there is no transparency to it. It can be tedious at times but not too bad and it is quite reliable. It will do exactly what I expect it to.
"Cliiiiiiiiiiiiiiiiide" -Tastosis
WarSame
Profile Blog Joined February 2010
Canada1950 Posts
January 20 2014 03:56 GMT
#8578
In my school last semester we did MIPS, this semester we're doing x86. Interesting stuff, but it takes forever to write simple programs. On Wikipedia it says that the person who made Rollercoaster Tycoon did it entirely in Assembly. That person is likely insane.
Can it be I stayed away too long? Did you miss these rhymes while I was gone?
Ben...
Profile Joined January 2011
Canada3485 Posts
Last Edited: 2014-01-20 05:44:47
January 20 2014 05:44 GMT
#8579
On January 20 2014 12:56 WarSame wrote:
In my school last semester we did MIPS, this semester we're doing x86. Interesting stuff, but it takes forever to write simple programs. On Wikipedia it says that the person who made Rollercoaster Tycoon did it entirely in Assembly. That person is likely insane.

Ah I see. We are doing MIPS as well.

Also, Chris Sawyer is the guy who made those RCT games. He's a maniac apparently. Fun games though. He did all his games in x86 Assembly back then
"Cliiiiiiiiiiiiiiiiide" -Tastosis
dapierow
Profile Blog Joined April 2010
Serbia1316 Posts
Last Edited: 2014-01-20 05:46:24
January 20 2014 05:44 GMT
#8580
Hey quick question. When I'm trying to split a text file in into an array list, which I know how to do but the problem is, this text file is a lot larger than others, and to split each segment of the text file, the Line where the segment needs to be split contains only "SP" short for split here. So my question is how do make my loop check for that SP line to split the segments into the arraylist.

while( !((input = in.nextLine()).equals("SP")))

does not seem to work for me, am I at least on the right track with it?
Eat.Sleep.Starcraft 2
Prev 1 427 428 429 430 431 1032 Next
Please log in or register to reply.
Live Events Refresh
GSL
09:30
2026 Season 1: Ro12 Group A
Rogue vs PercivalLIVE!
Zoun vs Solar
Ryung 256
IntoTheiNu 180
CranKy Ducklings SOOP60
Rex14
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Ryung 256
Rex 14
StarCraft: Brood War
Calm 9493
Jaedong 572
Leta 444
Hyuk 376
Mini 324
Stork 169
actioN 153
ProTech136
Dewaltoss 110
EffOrt 103
[ Show more ]
hero 77
Light 67
Aegong 67
ZerO 62
sSak 58
Rush 52
Shinee 41
soO 32
Bale 20
IntoTheRainbow 13
Dota 2
XaKoH 678
resolut1ontv 225
ODPixel72
Counter-Strike
olofmeister2676
shoxiejesuss1305
allub303
Other Games
XBOCT273
crisheroes108
Livibee65
Mew2King54
ZerO(Twitch)12
Organizations
Other Games
gamesdonequick586
Dota 2
PGL Dota 2 - Main Stream116
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
[ Show 15 non-featured ]
StarCraft 2
• intothetv
• AfreecaTV YouTube
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• iopq 3
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• lizZardDota234
League of Legends
• Jankos982
• Stunt386
• TFBlade180
Upcoming Events
Replay Cast
14h 8m
GSL
23h 38m
Cure vs TriGGeR
ByuN vs Bunny
KCM Race Survival
1d
Big Gabe
1d 2h
Replay Cast
1d 14h
Replay Cast
1d 23h
Escore
2 days
OSC
2 days
Replay Cast
2 days
Replay Cast
2 days
[ Show More ]
RSL Revival
3 days
IPSL
3 days
Ret vs Art_Of_Turtle
Radley vs TBD
BSL
3 days
Replay Cast
3 days
RSL Revival
4 days
uThermal 2v2 Circuit
4 days
BSL
4 days
IPSL
4 days
eOnzErG vs TBD
G5 vs Nesh
Replay Cast
4 days
Wardi Open
5 days
Afreeca Starleague
5 days
Jaedong vs Light
Monday Night Weeklies
5 days
Replay Cast
5 days
Sparkling Tuna Cup
6 days
Afreeca Starleague
6 days
Snow vs Flash
GSL
6 days
Liquipedia Results

Completed

Proleague 2026-04-28
WardiTV TLMC #16
Nations Cup 2026

Ongoing

BSL Season 22
ASL Season 21
CSL 2026 SPRING (S20)
IPSL Spring 2026
KCM Race Survival 2026 Season 2
StarCraft2 Community Team League 2026 Spring
2026 GSL S1
BLAST Rivals Spring 2026
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026

Upcoming

Escore Tournament S2: W5
KK 2v2 League Season 1
Acropolis #4
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
Maestros of the Game 2
2026 GSL S2
RSL Revival: Season 5
XSE Pro League 2026
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
IEM Atlanta 2026
Asian Champions League 2026
PGL Astana 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.