|It is currently Thu Mar 28, 2024 11:28 am Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  Previous  1, 2, 3, 4, 5  Next
Feed Popular Blog Entries
array in function by farahinsamsudin on Sun Mar 17, 2013 5:35 am
i cant compile my coding because a several error. i'm try to find it by change its syntax. but it does not work. can anyone help me?

the question ask to display student name, total marks, and status.

Code:
import java.io.*;
import java.lang.*;


public class Assignment1 {
   public static void main(String[] args) {
      
      String studName[] = {"Aminah Binti Samad", "Putra Bin Abdul", "Muadz Bin Kassim", "Kaisara Binti Dollah", "Rahaman Bin Ismail"};
      int test1[] = {90, 45, 78, 80, 60};
      int test2[] = {40, 80, 78, 95, 93};
      int Marks = {0, 0, 0, 0, 0};
      String[] status = new String[5];
      
      CalculateMarks(test1, test2, Marks);
      DetermineStatus(Marks, status);
      Display(studName, Marks, status);
   }
   
   public static void CalculateMarks(int test1[], int test2[], int Marks[])
   {
      for(int i = 0; i < 5; i++)
      {
         int temptotalMarks = 0;
         Marks[i]...


[ Continued ]

Just need to complete my program for snake game by behumanizer on Wed Aug 17, 2011 8:17 am
Program below is working i just don't know what to do for the algorithm on keyevents for right,left,up and down
The code like y+=10; is just my assumption for the snake movement.....
I believe below the path.reset() code has to be change since stack is being use...
Can anyone help me program to run correctly?


/***
* PROVIDE THE MISSING CODE in the keyPressed() method
* in order to move the 'snake' around the interface
* by pressing:
*
* --> cursor keys
* --> CTRL-Z to 'undo' last move
* --> CTRL-Y to 'redo' past/last move
*/

package midterms;

import java.awt.*;
import java.awt.event.*;
import java.awt.geom.*;
import javax.swing.*;
import java.util.*;
import javax.swing.border.*;



public class Snakes extends JPanel implements KeyListener {
final static long serialVersionUID = 1;
final private int WIDTH = 600;
final private int HEIGHT = 400;

LinkedList<Point> snake = new LinkedList<Point>();
Stack<Point> undo = new...

[ Continued ]

how to add multiple clients to the server in java? by artigautam on Sun May 08, 2011 5:10 pm
I ve to add 2 clients to the server,chatting between these clients will be through the server.but after running these following files only Cframe1 got connected to server but second client i.e. Clientframe1 didnt...what changes should I make to connect this second client??

Serverframe.java
Code:
import java.awt.*;
import java.applet.*;
import java.awt.event.ActionEvent;
import java.awt.event.WindowAdapter;
import java.awt.event.WindowEvent;
import java.awt.event.ActionListener;
import java.net.*;
import java.io.*;
import java.lang.*;
class Serverframe extends Frame implements ActionListener
{
   Button b1,b2,b3;

   Label l1,l2,l3;

   TextField t1,t2,t3;

   TextArea t;

    boolean readSocketMem ;

    BufferedReader socketBR;


    BufferedWriter socketBW;

    Socket sref1,sref2;

   Serverframe()
   {


       setVisible(true);

      setSize(500, 500);

      setLayout(null);

      setTitle("Server Window");...


[ Continued ]

Common Techniques used by Enterprises to Secure Data by extendcode on Fri Sep 07, 2012 1:58 pm
In today’s digital age information is power and all critical information is currently stored on protected servers operated by companies themselves or by 3rd party operators. If a company cannot protect its data from access by unauthorized individuals, the result can be devastating for the company itself as well as all vendors and stakeholders involved with the company. Such critical data which are usually protected using leading information security services can be used by unauthorized individuals to commit crimes such as insider trading, tender fixing etc. Countries all over the world have laws to prevent such unauthorized data access and non-compliance with the guidelines is cognizable offence with the companies paying hefty fines to the government, if the data security measures are breached. However, a common question that arises is how to companies ensure that their data stays protected from access by unauthorized individuals. Some of the security solutions designed to ensure proper d...

[ Continued ]

Can Containers Techniques Prevent Unauthorized Data Access? by extendcode on Wed Sep 26, 2012 1:36 pm
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]

 [ 24 blog entries ]  Previous  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com