|It is currently Wed May 08, 2024 9:41 pm Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka


Blog Links

Blog Stats
4Total Entries
3Total Comments

Search Blogs


Category Blogs 
General Articles

General blog articles related to forums area or in general things.

1

Programming

Articles related programming (java,c++,csharp,dotNet)

1


 [ 24 blog entries ]  1, 2, 3, 4, 5  Next
Feed Random Blog Entries
array in function by farahinsamsudin on Sun Mar 17, 2013 5:35 am
i cant compile my coding because a several error. i'm try to find it by change its syntax. but it does not work. can anyone help me?

the question ask to display student name, total marks, and status.

Code:
import java.io.*;
import java.lang.*;


public class Assignment1 {
   public static void main(String[] args) {
      
      String studName[] = {"Aminah Binti Samad", "Putra Bin Abdul", "Muadz Bin Kassim", "Kaisara Binti Dollah", "Rahaman Bin Ismail"};
      int test1[] = {90, 45, 78, 80, 60};
      int test2[] = {40, 80, 78, 95, 93};
      int Marks = {0, 0, 0, 0, 0};
      String[] status = new String[5];
      
      CalculateMarks(test1, test2, Marks);
      DetermineStatus(Marks, status);
      Display(studName, Marks, status);
   }
   
   public static void CalculateMarks(int test1[], int test2[], int Marks[])
   {
      for(int i = 0; i < 5; i++)
      {
         int temptotalMarks = 0;
         Marks[i]...


[ Continued ]

Can someone help? by cscalkin on Mon Apr 04, 2011 2:57 am
I need to create a Java program that:

Takes as input a rooted tree T and a node c of T and converts T to another tree with the same set of node adjacency but now rooted at v.

any suggestions to start off?

Extract Text from PDF Files, Convert MS Word Document in Android by saaspose on Fri Feb 01, 2013 8:35 am
Saaspose development team is pleased to announce the release of Saaspose SDK for Android. It is great news for all Android developers to enjoy a whole new experience of document manipulation in the cloud. We have been working on Saaspose SDK for Android to facilitate the android developers with feature-rich APIs round the globe.

Saaspose REST APIs gives developers total control over documents and file formats on all platforms. We have developed SDKs for these file format APIs to help you utilize these feature-rich APIs in you applications for quick file processing. You can now use Saaspose APIs in your Android applications and take document manipulation experience to another level. Whether its text extraction from PDF files or conversion of MS Word document to different file formats, Saaspose REST APIs have much more to offer for your Android applications. You can extract text from documents, calculate formula in worksheets, convert PDF to images, extract images and slides from presentations...

[ Continued ]

Benefits from a Professional Web Design Company by quinnwd on Mon Nov 14, 2011 11:11 am
All business owners want their business to be recognized by the world. Who does want to be brush aside? Definitely, no one! Isn’t it? In business, it is not easy to acquired success and become a top seller.

It is not enough to have a good staff, products and service in order to be victorious. In business world, competition is not only banality and arduous but also formidable and intense. So, business should not be merely contented on media and print advertising. It is not enough tools to attract customers and have a high market.

Consequently, it also needs online promotional and advertising. Thus, it can only get through Web Design Company that will not only make your own business visible online but also thoroughly promote your business.

However, you might think what are the benefits will you get at web Design Company? Well, you will only get greater flexibility in your business, improved your business aesthetic and technical expertise, integrate your market and last but definitely n...

[ Continued ]

Can Containers Techniques Prevent Unauthorized Data Access? by extendcode on Wed Sep 26, 2012 1:36 pm
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]

 [ 24 blog entries ]  1, 2, 3, 4, 5  Next

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com