body1
stringlengths 20
4.1k
| body2
stringlengths 23
4.09k
|
---|---|
I have downloaded ubuntu-18.04-desktop-amd64.iso and would like to run from cd without destroying my existing Windows System. I burned the iso file to a dvd. What do I do next? What do I do with this iso file?
|
I'm a little confused as to whether I should install Ubuntu on its own partition on my hard drive, use VirtualBox or another virtualization package to install it, or use Wubi to install it directly on top of my current OS (Win 7). I definitely want to learn and use Ubuntu, so this is not just for playing around with it. Also, if I choose to partition, should I partition the hard drive myself or should I let the Ubuntu installation menu do it for me? I understand that I am going to need a main partition, for Ubuntu's core components, and also a swap partition. Then there is the option to add a partition for "home"- I don't understand what combination of these partitioning options I should choose, or whether it is better to partition in Windows before I install Ubuntu or just partition my hard drive when I install Ubuntu itself
|
Here is my sample code: #!/usr/bin/python import sys m=1 n=1 f = [[0]*(m+1)]*(n+1) for i in range (1, n+1): for j in range (0, m+1): f[i][j] = 101 print "check 1: " + str(f[i][j]) f[i-1][j] = 102 print "check 2: " + str(f[i][j]) print"\n" The output I get: check 1: 101 check 2: 102 check 1: 101 check 2: 102 While I'm changing the f[i-1][j], why the value for f[i][j] would change ?
|
I needed to create a list of lists in Python, so I typed the following: my_list = [[1] * 4] * 3 The list looked like this: [[1, 1, 1, 1], [1, 1, 1, 1], [1, 1, 1, 1]] Then I changed one of the innermost values: my_list[0][0] = 5 Now my list looks like this: [[5, 1, 1, 1], [5, 1, 1, 1], [5, 1, 1, 1]] which is not what I wanted or expected. Can someone please explain what's going on, and how to get around it?
|
Suppose: ${A_j} \in {\mathbb{C}^{n \times n}},0<{w_j}\in \mathbb{R} (j = 0,1,2....m)$ ${\rm{P(}}\lambda {\rm{) = }}{{\rm{A}}_m}{\lambda ^m} + .....{A_1}\lambda + {A_0}$ is a matrix polynomial, and $\lambda $ is a complex variable. ${\rm{q(}}\lambda {\rm{) = }}{{\rm{w}}_m}{\lambda ^m} + .....{w_1}\lambda + {w_0}$ ${\sigma _{\varepsilon ,w}}(P) = \left\{ {\lambda \in \mathbb{C}:\left\| {P{{(\lambda )}^{ - 1}}} \right\| \ge {{(\varepsilon q(\left| \lambda \right|))}^{ - 1}}} \right\}$, where $\left\| . \right\|$ is any subordinate matrix norm. Why does boundary of ${\sigma _{\varepsilon ,w}}(P)$ can be written in the form $S = \left\{ {\lambda \in \mathbb{C}:\left\| {P{{(\lambda )}^{ - 1}}} \right\| = {{(\varepsilon q(\left| \lambda \right|))}^{ - 1}}} \right\}$.
|
Suppose: $B_i \in \mathbb{C}^{n \times n}$, $0<w_i\in \mathbb{R}$ $(i = 0,1,2,\ldots,m)$ ${\rm P}(x) ={\rm{B}_m} x ^m + \cdots + B_1 x + A_0$ is a matrix polynomial, and $x $ is a complex variable. ${\rm q}(x) =\rm{w}_m x^m + \cdots +w_1 x + w_0$ $U= \left\{ {x \in \mathbb{C}:\left\| P(x)^{-1} \right\| \ge (\varepsilon q(|x|))}^{-1} \right\}$, where $\left\| \cdot \right\|$ is any subordinate matrix norm. Why can the boundary of $U$ be written in the form $S = \left\{ x \in \mathbb{C}:\left\| P(x )^{-1} \right\| = (\varepsilon q(|x|))^{-1} \right\}$?
|
I changed my username and I tried logging back on and when I got back on, Minecraft would keep saying Error: Authentication To Minecraft.Net Failed All the servers I visited also said this.
|
I don't understand this and I'm now worried as I have donated to a lot of servers and I don't want to lose this account. On the launcher it says my new username but when I log on it says "Account not Authenticated with minecraft.net" and "Non-Valid Username". How can I regain the ability to use my account online?
|
I'm looking to implement a similar program as tail in my python program. I can listen to a named pipe via Unix: tail -f mypipe This works great (I can echo strings to said pipe), but I'd like to do it in python. I'd like to set the data coming through the pipe to a variable (it's preferable for a var to get updated with the last datum sent over the pipe). So far I have: cwd = os.getcwd() testpath = os.path.join(cwd, 'mypipe') if os.path.exists(testpath): os.remove(testpath) mkfifo = os.mkfifo(testpath, 0644) rp = open(testpath, 'r') response = rp.read() print 'response is ', response There are two issues: response reads once, but I don't know how I would read the stream upon data being received (something like a listener) I seem to be running into a blocking issue whereby the pipe is claimed and will not allow other programs to access it. I don't totally understand accessing fifo pipes without blocks and am having a hard time w/ the docs for this. I've attempted something like what is found (the highest upvoted answer), but it doesn't seem to work for me. I get an error: IOError: [Errno 29] Illegal seek
|
I'm writing a log file viewer for a web application and for that I want to paginate through the lines of the log file. The items in the file are line based with the newest item at the bottom. So I need a tail() method that can read n lines from the bottom and support an offset. This is hat I came up with: def tail(f, n, offset=0): """Reads a n lines from f with an offset of offset lines.""" avg_line_length = 74 to_read = n + offset while 1: try: f.seek(-(avg_line_length * to_read), 2) except IOError: # woops. apparently file is smaller than what we want # to step back, go to the beginning instead f.seek(0) pos = f.tell() lines = f.read().splitlines() if len(lines) >= to_read or pos == 0: return lines[-to_read:offset and -offset or None] avg_line_length *= 1.3 Is this a reasonable approach? What is the recommended way to tail log files with offsets?
|
I am trying to clean all color control characters from log file. I am able to clean all other control characters except ^[(B . Please help me to clean this control character also. I am using these combination to clean control characters. cat $LOGFILE | sed -e 's/\x1b\[[0-9;]*m//g' > $LOGDIR/Temp.txt
|
I have a program that would output something like this: ^[0;33m"2015-02-09 11:42:36 +0700 114.125.x.x access"^[0m Is there built in linux program that could clean that output up into something like this "2015-02-09 11:42:36 +0700 114.125.x.x access"
|
I wrote the following sentence in my exam The film was tried to be masked as a fictional movie. My teacher had underlined this part of the text and told me that it was incorrect. The idea was to say that the people who made the movie had tried to make it look like a fictional movie. Is this correct or not?
|
OK, so I'm trying to complete the following analogy: John ate the worms. is to The worms were eaten. as John tried to eat the worms. is to The worms were tried to be eaten. or The worms were eaten attemptively. ... ? I feel like such an inarticulate fool sometimes. Edit: I'm not asking which of the two possibilities is better, but how I might complete the analogy, preferably with "the worms" as the subject. This is so that I can write something like The worms were stolen, taken to John's house, and [tried to be eaten]. Sorry if my question wasn't clear.
|
Two letters need to be delivered to each of $n$ houses. How many ways can a postman deliver two letters to each house such that each house receives at least one incorrect letter? Right now I have the total number to deliver two letters to $n$ houses as $N = \frac{(2n)!}{2^n}$. I know derangement is equal to $N - N_1 + N_2 - N_3 + ... + (-1)^kN_k$. I have $N_1 =\displaystyle{n \choose 1}\bigg[\frac{(2n-2)!}{2^{(n-1)}}\bigg]$ but I can't seem to find a pattern or find a solution.
|
Two letters need to be delivered to each of n houses. How many ways can a postman deliver two letters to each house such that each house receives at least one incorrect letter? I got stuck and don't now how to progress. Can someone provide hint? 1) $(2n)!/2^n$ is the number of all possible onto functions from our domain of houses to the codomain of letters. 2) Let $A_i$ be property that two delivered letters are correct. $ |A_1' \cup A_2' \cup... \cup A_n'|=(2n)!/2^n-|A_1 \cap A_2 \cap... \cap A_n|$ I tried everything I could come up with but I cannot find $|A_1 \cap A_2 \cap... \cap A_n|$. I feel like I need to find union first but in order to do that I should find intersection. Really confused. Any hint would be appreciated. Edit: Corrected mistake in the equation.
|
I have a string which i would need to convert back to its original byte array. byte[] frame = new frame[64]; //Frame has values : 0x01,0x04,0x00,0x00,0x00,0x0A,0x70,0x0D //TotalLengthofRecivedPackage = 8 string Payload ; StringBuilder builder = new StringBuilder(); for ( int i = 0; i < TotalLengthofRecivedPackage; i++ ) { builder.Append(frame[i].ToString("x2")); } this.Payload = builder.ToString(); after this I was able to get this.Payload set as 01040000000A700D NOw i would like to recreate back this byte array with contents as 0x01,0x04,0x00,0x00,0x00,0x0A,0x70,0x0D is this possible, I have tried to use byte[] recreatedbytesarray = payload.Select(c => ( byte ) ( c - '0' )).ToArray(); but with this the bytes i get is 0x00,0x01,0x00,0x04,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x0A,0x70,0x0D which is literraly each character changed to a number but i need 2 digits to be considered as a number. Any help would be appreciated.Thank you.
|
Can we convert a hex string to a byte array using a built-in function in C# or do I have to make a custom method for this?
|
I managed to create an image of a 1000 GB ext4 partition on a dying HDD using ddrescue. The image is almost complete: only an area of about ~34 MB could not be read surprisingly close to the "middle" of the disk: 498396 MB - 498430 MB. I can mount the image, the filesystem is clean and I can see and open my files. Since the partition was almost full, I am curious which files' contents were affected and thus damaged/lost due to the unreadable area. In other words, I want to get the list of files that are physically located entirely or partially in this area. I would prefer a solution which uses basic Linux commands and utilities that can be found in a common rescue environment (I'm using UBCD right now for this), but a computer running Ubuntu Server with internet connection is also available and I can mount the image there if additional packages are needed to do this.
|
May you have ever used filesystem defragmentation tools (like Norton SpeedDisk or Piriform Defraggler) on Windows, you have probably seen such a diagram: It displays a filesystem sectors map, painting (as for this particular example) sectors (sets of sectors actually, to fit the whole partition in the screen) occupied by non-fragmented (contiguous) files in blue, the opposite in red and free sectors in white (and some more colours for some more particular cases which can happen to be of interest). You can click on a "sector" and see what particular files "live" there. Is there such a visualization tool for Linux?
|
How can I detect if the operating system is Windows in C++/C?
|
I need my code to do different things based on the operating system on which it gets compiled. I'm looking for something like this: #ifdef OSisWindows // do Windows-specific stuff #else // do Unix-specific stuff #endif Is there a way to do this? Is there a better way to do the same thing?
|
What is the plural of "API" () Is it part of English irregular plurals ending in "-i"?
|
For example, if I wanted to write the equivalent of There are many automated teller machines in this city. Would it be There are many ATMs in this city. or There are many ATM's in this city. (could get confused with possessive form or contraction). or just There are many ATM in this city. (assuming the final s is included in Machines represented by M). Maybe something else?
|
Can you please explain some of the usages as well?
|
What do people really mean when they say "what's not to love"? Is there any context in particular to use this?
|
I have a javascript which makes a table in HTML sortable. However I want to style the header of the column which is clicked using javascript. How can I get the thead of the table? I know the column of the header which i need to change. Here is what my javascript returns to me right now. javascript console.log(table.tHead); output to console: <thead> <tr> <th>Name</th> <th>Times Placed</th> <th>UMF (KB)</th> <th>UAC</th> <th>Texture Memory (MB)</th> <th>Texture Count</th> <th>Mesh Memory (KB)</th> <th>Mesh Count</th> <th>Path</th> </tr> </thead>
|
How can I change the class of an HTML element in response to an onclick or any other events using JavaScript?
|
I'm using Ubuntu 14.04 and I made an empty directory on /tmp with the mkdir command: cd /tmp mkdir foo and then I checked it's size using ls: ls -ldh foo and the result shows that the size of the directory is 4KB, although it has nothing inside! then I created an empty file with touch: touch empty and then I checked its size: ls -l empty the result shows that the empty file is of 0B, which differs from the empty directory. I've read about some Q&A's saying that the 4KB is the metadata of the directory. But if it is the metadata, what kind of information is stored inside and why it is so huge, and why an empty file don't have such kind of metadata? If it is not the metadata, what does the 4KB mean?
|
What does size of a directory mean in output of ls -l command?
|
In the Star Trek: Voyager episode "Night" (S05 E01), Voyager suffers a ship-wide total power drain. How is the holodeck still rendering Tom Paris' program, albeit in darkness? He turns on a program-driven torch and you can see the screen.
|
I'm watching the first two seasons of Voyager and various episodes have commentary on having energy limitations -- but we constantly see crew using extremely complicated holodeck simulations. Why would they allow use of the holodeck if they need to conserve energy?
|
Context: We are planning to run promotional campaign for hiring engineering talent, and thinking which one these promotional sentences are more correct/connecting or simply better? Sentence 1 20 Reasons to work at X. Sentence 2 20 Reasons to work with X. Sentence 3 20 Reasons to work for X. Which of the above sentence is more promising and correct for our campaign or website?
|
The prepositions “with”, “at” and “for” are also used to associate a business title with a company's name. It seems that they are interchangeable, with no (significant) difference in meaning. The following examples taken from The New York Times website seem to confirm that: Until now, said Justin Nielson, a senior analyst for the media research firm SNL Kagan, “there really hasn't been any direct competitor . . . “The consumer is still deleveraging,” said Jason Goldberg, a senior analyst with Barclays. “It's not a lack of supply; it's a lack of demand.” “There’s the party of fear and the party of despair,” Nikos Xydakis, a political analyst and an editor at Kathimerini daily, said. Are they really the same as for meaning? If it isn't so, what is the difference between them?
|
Is starting a sentence with a "But" still bad? I know some Harvard graduates who are native English speakers and do this when they write. Is it acceptable now? What are some of the examples where "But" is and is not acceptable? Is there ever a situation when replacing a "But" with "However" makes the sentence better?
|
I know it's wrong, but I do it all the time or else my sentences would go on forever.
|
I would like to know if there's a way - without installing a third party program - to view a graphical item, such as a photo, inside terminal. I'm running Ubuntu 17.04 Thank you!
|
This is a quick mockup I copy and pasted together. I imagine this being super cool and useful. Does something like this exist already?
|
Recall a space is totally disconnected if the only connected subsets are singletons (one-point subsets). Is a totally disconnected space, Hausdorff? I think it is true since if $a $ and $b $ are two distinct points, they can be separated two disjoint open sets, since the main space is totally disconnected (see Theorem at < >). Is this argument true?
|
The Wikipedia article on totally disconnected spaces seems to imply they are not necessarily Hausdorff (they are all $T_1$ though). What's an example of a totally disconnected non $T_2$ space? (A space is totally disconnected if all connected components are singletons.)
|
Alright! I really wanna learn how to bake textures. I have a weapon model which uses 30 textures its a single model but those 30 textures covers different parts of the weapon. I am a game modder and I am converting a weapon which uses 30 textures I watched videos on youtube but it didn't helped me at all. If someone can tell me how to bake 30 textures to single uv map that would be a lot of help.
|
Using: Blender V2.79 Cycles Render Engine After creating a complex interior scene consisting of 3 different texture types, each having 3 associated maps (Diffuse, Gloss, Normal) I noticed the texture and baking options will not successfully combine to create a texture for the exported mesh once I bring it into Unity 3D. The mesh is a single object with the different textures assigned to specified faces. I've played around with a default cube mesh for testing purposes, using the same 3 textures split among the 6 sides, but have only been able to successfully pull over the color info by baking a diffuse map to my UV and saving the image. When using the other baking options, Blender does not successfully create a map for either my Glossy textures, nor my normal map. Even using the "Combined" baking option, I am provided a flat dull diffuse image for my mesh, no gloss or normal info is saved. My Node process for textures is displayed here Here is the result of baking my textures as a Normal The result of adding other textures made from Blender's baking, results in flat gloss at best. What can I do differently in Blender, to have my assigned UV Diffuse, Normal, and Gloss maps all appear in a single object in Unity?
|
Hello i'd like to know how to remove 2 apt things that gets an error any time I type apt-get update here is the output at the end `W: Failed to fetch HttpError404 W: Failed to fetch HttpError404 ` I've already tried ppa purge and apt remove neither worked.
|
PPA seems to be constantly offline. Whenever I use sudo apt-get update, this error is shown: W: Failed to fetch http://ppa.launchpad.net/ 404 Not Found How do I fix these errors?
|
As a high school, we need to send regular emails to a certain group of student's parents. We have grouped the students by grade, however, when sending emails, it only sends to the first parent listed. We need to default BOTH parents on every email. How can I set up our contact list?
|
I'm trying to send an E-mail message using Gmail to a contact group where some of the contacts have more than one E-mail address and I want to send the mail to all of them. Is there a way for me to do that?
|
What I would like someone to explain is where do those (3 of them) foot long claws go when they retract ???
|
Everyone knows that Wolverine's adamantium claws are super-sharp — sharper than even a razor — and virtually indestructible. What puzzled me the first time I saw Wolverine is: how do the claws stay in his body? As it is shown, Wolverine's flesh and skin are human in strength, but the healing factor makes it superhumanly durable and strong. Still, when Wolverine slashes something, or someone, extremely hard, dense, or thick (as he has to use great amount of force), the claws don't tear through his hand and leave his hand through the opposite side of the palm (because of the action having equal and opposite reaction).
|
Through The Witcher 3 is it possible at some point of the game to reset my skill tree; in case I made a mistake or want to re-spec? If there is please answer with no spoiler about how to obtain this if spoilers are evident to know, just answer saying yes/no and how far into the story.
|
I'm also curious about being able to reset my points, should I wish to change my ability configuration later. So far (10h-ish) I've only seen one way, which is a potion sold by Kiera Metz for 1000g. However she's no longer available as a store, due to a story choice, so I'm not sure where else I could buy this potion. Where might I buy this potion, and is it the only way to reset your ability points?
|
When I learned about how the sum of a series could be divergent and convergent, I decided to try to find the sum of the square reciprocals to no avail. The proof, obviously at not my level as you can tell, was too difficult to understand (what math branch is required because they mentioned something a Riemann Zeta function). Is there an alternative proof that would yield the result ${\pi^2}/6$ as well without higher math?
|
As I have heard people did not trust Euler when he first discovered the formula (solution of the ) $$\zeta(2)=\sum_{k=1}^\infty \frac{1}{k^2}=\frac{\pi^2}{6}.$$ However, Euler was Euler and he gave other proofs. I believe many of you know some nice proofs of this, can you please share it with us?
|
I am struggling to understand what is different from 'Godel incompleteness' (GI) and call it 'ordinary completeness' (OC). Godel showed FOL to be complete. Yet, Godel's theorems establish that the language Q (an axiomatic extension of FOL) is incomplete. What distinguishes GI from OC in terms of FOL?
|
Through browsing questions asked in the past about Godel's completeness and imcompleteness theorems, I've come to see that the sense of completeness in both of the theorems are different. However, I can't see how they are different! Does this distinction boil down to that of truth and proof? Is it the case that the completeness theorem talks about the relationship between truth and proof, while the incompleteness theorems only relate to provability? Could someone please elaborate on the sense in which both notions of completeness are different?
|
I am a non-EU resident currently residing in London, UK. I hold a multiple-entry Schengen visa holder issued by the French Embassy. Unfortunately my entire itinerary has changed and I am not visiting any countries submitted to the French Embassy. My Paris trip got postponed and I will be visiting Paris, France in the subsequent month and not in the first trip. My query is are there any serious consequences or any repercussions if I visit any other countries and not the one in the itinerary given to them. How should I tackle this situation? Thanks in advance.
|
In case, if I get a multiple-entry Schengen visa in one of the embassies in Ukraine, Kyiv - should my first trip be to the country which issued the visa? Any there any requirements of this sort? Does this condition vary depending on embassy which issued the visa? What are the possible consequences on not visiting that country first? Does it somehow depend on country where the embassy is (i.e. non-Schengen and not EU members)?
|
I am looking for any source code that does tree crown segmentation/delaunitaitoun with LiDAR point clouds or their respective greo-TIFFs. So far I can load and view both LiDAR file and its TIFF in matlab but I need the code to convert it to extract tree crowns. Any open source library in any programming language is ok.
|
I am looking for a method to process a remote sensing image and extract the crown areas of the individual trees from the image. I have both visual wavelength areal imagery, and lidar data from the area. The location in question is a desert area, so the tree cover isn't as dense as a forest area. The resolution of the aerial imagery is 0.5 feet by 0.5 feet. The lidar resolution is approximately 1 x 1 feet. Both the visual data and the lidar come from a Pima County, Arizona dataset. A sample of the type of aerial imagery I have is at the end of this post. This question seems to be the same issue, but there does not seem to be a good answer there. I can obtain a reasonable classification of the vegetation types (and information about the overall percent cover) in the area by using the Iso Cluster classification in Arcmap, but this provides little information on individual trees. The closest I have to what I want is the results of passing the output of the isocluster classification through the Raster to Polygon feature in Arcmap. The problem is that this method merges near by trees into a single polygon. Edit: I probably should have included some more detail about what I have. The raw datasets I have are: Full las data, and a tiff raster generated from it. Visual imagery (like the sample image shown, but covering a much wider area) Manual direct measurements of a subset of the trees in the area. From these I have generated: The ground/vegetation classifications. The DEM/DSM rasters.
|
Regarding multiple comparisons, could someone please explain me why the power of false discovery rate (FDR) is greater than the power of family-wise error rate (FWER)?
|
I have read that controlling FDR is less stringent than controlling FWER, such as in : FDR controlling procedures exert a less stringent control over false discovery compared to familywise error rate (FWER) procedures (such as the Bonferroni correction). This increases power at the cost of increasing the rate of type I errors, i.e., rejecting the null hypothesis of no effect when it should be accepted. But I was wondering how it is shown to be true mathematically? Is there some relation between FDR and FWER?
|
I want to know how $$\frac{\delta(x^TAx)}{\delta(x)}=2Ax$$ I think here's what happens (please correct me where wrong): (by: the rule for matrix derivative) $$ \frac{\delta(x^TAx)}{\delta(w)}=x^T(A^T+A) $$ (by: I assume we can transpose matrices whenever we need to?) $$ x^T(A^T+A) = x^T(A^T+A^T) = x^T(2A^T) $$ (by: transpose property) $$ x^T(2A^T) = (x^T2A^T)^T = 2Ax $$ Is that how this happens?
|
It's stated that the gradient of: $$\frac{1}{2}x^TAx - b^Tx +c$$ is $$\frac{1}{2}A^Tx + \frac{1}{2}Ax - b$$ How do you grind out this equation? Or specifically, how do you get from $x^TAx$ to $A^Tx + Ax$?
|
Want to shrink my windows partition and then increase the size of my Ubuntu one. I could not find a clear answer already, so I'm asking this.
|
Previously, I have installed Windows 7 on my 320 GB laptop with three partitions 173, 84 and 63 GB each. The 63 GB partition was where the Windows was installed. The rest were for file containers. Now I changed my OS to Ubuntu 12.04 LTS. I installed Ubuntu by replacing the entire Windows 7 on the 63 GB partition. The rest of the partitions remain as an NTFS Windows partition and I can still access them both (the 173 and 84 GB partitions). Now I want to change the two partitions of Windows into an Ubuntu format partitions plus most importantly, I want to extend the 63 GB partition to more than a 100 GB because at the moment I am running out of disk space. Whenever I try to install any application, especially using wine, it always complains for a shortage of disk space. How do I do the extending activity before I entirely format my laptop again and lose all the important files on my partitions?
|
I am 17 years old and I met this sugar daddy online that only wanted to talk and for me to be his companion, nothing sexual. I agreed. After 2 weeks of talking he said I will be sending you your first allowance. I sent him my full name and email and he sent me a cheque through my email. I deposited the money today. He sent me $800 so now I have $830 (yes I have only $30). Then he said that he needs help. I needed to buy him 3 steal wallet cards each $50. He is working on an app in Denmark and also works in some type of cryptocurrency. So at first I said why do I need to get it and he said that he lives in Denmark and it needs to be dollar or whatever. I said sure. Then he asked me for paypal because someone was going to paypal me some money and I needed to send it to someone. I disagreed and he said okay. Then I asked him if he is scamming me because I read about fake checks and scamming situations. I am so anxious and scared I am going to have a panic attack and faint. I don’t know anything I’ve never done this please what should I do? edit: edit: i blocked him and reported his account. then i went to my bank and told them about it. they put the $800 on hold until it gets returned or something idk. the man texted me from another account saying he will report my account for fraud and have me arrested by Tuesday. i deleted the message and didn’t respond. can he do that ?
|
I met a guy on a sugar daddy dating site and we talked, I told him my situation and he said he would help. He asked for my bank account information and I told him you can use cash app or PayPal to go through. He said his account manager deals with his finances. So I set up an account with a bank that I don’t use so that my primary account isn’t used. Eventually he was in the process of sending me money and we had agreed on a amount that wasn't crazy. But then he asked for my address and I asked why and he said just wondering. Then said he wanted to send me a surprise for being his baby. Which I didn’t give. Then later on he sent the money and said he sent me a bonus and that I was supposed to use that to pay his mothers caregiver, which he didn’t mention until after. I kept questioning him and he was saying that he works in construction and he’s trusting me to carry out the errand. Then he said don’t let him down and I asked him if he was threatening me and he kept saying I need this done but didn’t really answer my question. Am I being scammed? I’m about to change my password but is this a scam?
|
I want to set a custom cursor within my WPF application. Originally I had a .png file, which i converted to .ico, but since I didn't find any way to set an .ico file as a cursor in WPF, I tried to do this with a proper .cur file. I have created such an .cur file using Visual Studio 2013 (New Item -> Cursor File). The cursor is a coloured 24-bit image and its build-type is "Resource". I accquire the resource stream with this: var myCur = Application.GetResourceStream(new Uri("pack://application:,,,/mycur.cur")).Stream; This code is able to retrieve the stream, so myCur is NOT null aferwards. When trying to create the cursor with var cursor = new System.Windows.Input.Cursor(myCur); the default cursor Cursors.None is returned and not my custom cursor. So there seems to be a problem with that. Can anybody tell me why the .ctor has problems with my cursor stream? The file was created using VS2013 itself, so I'd assume that the .cur file is correctly formatted. Alternatively: If someone knows how to load a .ico file as a cursor in WPF, I'd be very happy and very grateful. EDIT: Just tried the same with a fresh new .cur file from VS2013 (8bpp) in case adding a new palette has screwed the image format. Same result. The .ctor of System.Windows.Input.Cursor can't even create a proper cursor from the 'fresh' cursor file.
|
I want to use an image or icon as a custom cursor in WPF app. What's the best way to do it?
|
$\lim_{x\to 0}( \frac {\sin(x)}{x})^{\frac 1x}$ $$$$ I can use Tailor to get to $\lim_{x\to 0}(1+\epsilon(x))^\frac 1x$ $$$$ $(\epsilon(x)\underset{x\to\infty}\to 0) $ $$$$ but does that mean that the limit equals 1?
|
$$\lim _{x \rightarrow 0} \left(\frac{ \sin x}{x}\right)^{1/x}$$ I have spent an hour on the above limit and have no work to show. I tried using L'Hopital's Rule, but just kept going around in circles. Any help would be appreciated. Thank you.
|
I'm compiling my thesis. The middle is LaTeX code, the right panel is the PDF file and the left panel is the navigation panel seen in Adobe Reader. The order is Chapter1-AppendixQ-Chapter2 in the TeX code and the order is preserved in the left panel. But Chapter 2 and AppendixQ are reversed in the Table of Contents in the PDF file. (2.5 Data analysis and 2.6 Conclusion are sections in the chapter 2, A1 and A2 are sections in 'appendicex.' 'AppendixQ' is inserted using \addcontentsline command because the appendix title is not shown in the Table of Contents. I don't understand why \include{chapter2} comes earlier than \addcontentsline{toc}{chapter}{AppendixQ}
|
I have a table of contents in my memoir book. I want there to be one line for each chapter, in addition to headings for each set of similar chapters. For some reason, the line for the first chapter appears before the first phantom line. \documentclass{memoir} \begin{document} \frontmatter \tableofcontents* \mainmatter \phantomsection \addcontentsline{toc}{part}{Topic 1} \include{intro} \chapter{Chapter 2} This is the second chapter. \phantomsection \addcontentsline{toc}{part}{Topic 2} \chapter{Chapter 3} This is the third chapter. \chapter{Chapter 4} This is the fourth chapter. \end{document} The file intro.tex in the same directory contains the following: \chapter{Introduction} \label{chap:intro} \noindent This is the introductory chapter. I've noticed that if I paste the contents of intro.tex into the main file (instead of using \include), the problem is fixed--the "Introduction" line in the table of contents appears before "Topic 1"! However, this isn't a good solution, since I have large chapter files which I want to include separately... What might be causing this problem? And is there a way to fix it?
|
I don't know how to use any mask money outside of the input. $(function() { $('.currency').maskMoney().focus(); }); Works <input type="text" name="amount" class="currency" value="1000000" /> Not Works <span class="currency">5000000</span>
|
I would like to format a price in JavaScript. I'd like a function which takes a float as an argument and returns a string formatted like this: "$ 2,500.00" What's the best way to do this?
|
I wonder why NetBeans 7.0 is still in Software Center and is not replaced by 7.4? Netbeans 7.0.1 Released August 1, 2011
|
Why are packages in the official Ubuntu repositories older than the latest (upstream) versions from Debian Sid, PPAs, the authors, etc.?
|
Does anyone have any book/problem sets that would go well with Dennery and Krzywicki's ? I like the style of the book compared to usual texts like Riley, Arkfen, or Hobson and Bence, and would really like to study from it. The thing is this book has no problems sets and without doing problems, it's worthless to do a math methods course. So, any pointers to other books, problem sets from professors, your own stuff would be much appreciated!
|
I'm looking for texts on mathematical physics. I've seen various other threads, but the texts recommended in those threads were mathematical methods of theoretical physics texts, that is to say those texts focused on the math methods useful for physicists and assumed the applications of those methods would be covered in some other text. What I'm looking for is a book which introduces some math and then looks at its applications (back and forth) rather than a text which just goes over some math. (Example of books which are NOT what I'm looking for: Mathematics for physicists by Dennery, Math methods for physicists by Weber and Arfken etc) I've taken courses in multi-variable calc, linear algebra, real analysis, and I'm currently taking a course in abstract algebra. But so far I've only seen applications of multi-variable to physics. I'm looking for books which look at the applications of the other subjects mentioned above to physics, of course books which cover subjects beyond those mentioned are also welcome. So far I'm liking the flavor of the text "A Course in Modern Mathematical Physics" by Szekeres, but I'd prefer a text which got to the physics side of things more quickly (in the Szekeres text the first eight chapters are strictly on pure math). After some amazon searching it looks like Theoretical Physics by Joos, Mathematical Physics by Henzel, and Physical Mathematics by Cahill may be good bets?
|
Show that Z cannot be turned into a vector space over any field. So, we have 2 cases here. Case 1:lets suppose the charF=P, n does not equal 0, then (1+1+...+1)n=1n+1n+...+1n=n+n+...+n=pn=wchich does not equal zero =0n =0 ................................................ a contradiction Case 2: CharF=0 ->Q ?????
|
Prove that $\mathbb{Z}$ is not isomorphic to additive group of any vector space over any field. Proof. Surpose that: $\phi : (A, +) \rightarrow \mathbb{Z} $ is an isomorphism. Then there is some $r∈A $ such that $ϕ(r)=1_\mathbb{Z}$. We have $$ 1_\mathbb{Z}=ϕ(r)=ϕ(2(r/2))=2ϕ(r/2)$$ or equivalently that $ϕ(r/2)=\frac{1}{2}$. But this is not in $ \mathbb{Z}$, so there can be no such morphism. Is my proof above correct? Thanks
|
$a,b\in\mathbb{N}$ and $ab>2$.Suppose,$\text{lcm}(a,b)=L,\gcd(a,b)=G$ and $a+b\mid L+G$.Prove that $\dfrac{(a+b)}{4}\cdot(a+b)\ge (L+G)$. Also prove that equality occurs when $a,b$ are consecutive odd integers. Hint: There is an exception when $a,b$ are both equal to 2. I could not approach this problem at all. Please help.
|
Let $a$ and $b$ be natural numbers with $ab>2$. Suppose that the sum of their highest common factor and least common multiple is divisible by $a+b$. Prove that the quotient is at most $\frac{a+b}4$. When is this quotient exactly equal to $\frac{a+b}4$.
|
I asked a question on an Stack Exchange site and at the time got an answer which I marked as such () Since accepting the answer, a new answer has been submitted which is now more accurate than the original answer (I only noticed as I stumbled across the question in error when going through my account). Should I be changing my accepted answer or leaving it as it is? Logic says I should update it, but it seems unfair that the original user who answered the question will now lose reputation points (I'm assuming they will anyway once I un-mark their answer) when originally they answered the question correctly.
|
I had a question of the form "does something like X exist?" Someone wrote a response to say that, No, X does not exist, but I could write it if I liked. I had suspected as much, so I marked his answer as the accepted answer. Today someone actually posted the code to do X for me, and I feel that the new poster deserves the "Accepted Answer" checkmark. Is it poor form for me to pick a new Accepted answer? Does the original answerer get penalized in terms of reputation? While the original responder's answer was accepted at the time, I feel this new answer is really more helpful. Edit: Which of these responses should I accept? What does the notion of a single accepted answer mean with a question that is subjective that could have multiple "right" answers?
|
If this question can be reworded to fit the rules in the help center, please edit the question. If you're lower rep and you don't know what the reopen link is as a result, then it's very easy to read this as "it's closed, but will be reopened if the reason for closure is edited away". My edit was approved, and I didn't understand why the question wasn't reopened until I remembered from another SE site that reopening is a separate thing, and a privilege that I don't have access to on SO. Something's wrong here. The wording does not clearly state that I can edit a post, but editing has nothing to do with reopening. And now that I remember that distinction (to be clear, I only know the distinction because I'm high-rep on another site; I didn't figure it out through SO's UI), I'm not sure what the path forward is. I flagged it and tried to explain this but I have no way of checking the outcome of the flag that I know of. I added a comment in hopes that OP or someone else could see it and vote to reopen, but there's no feedback there either. Future visitors will see that the question is closed, and they'll likely assume that it was closed for its current wording and thus see no reason to reopen. If I see another question I can edit for the purpose of reopening, why would I do so if I have less than 3000 rep?
|
To reopen a closed question, must agree that the question is suitable for the site and cast votes to reopen the question. But: How does one actually vote to reopen? Is there a reputation level that you must have before you can see this function? Or do I just leave a comment along the lines of, "I vote to reopen"? What happens if someone with less than 3000 reputation leaves a comment that they wish to vote to reopen? How can one draw attention to their closed questions? Is it done via a posting new question? Or do you edit the closed question? Related: For more information, see "" in the .
|
This is my first time playing the game and I've played for a few hours but I want to revisit locations I've already been to. How?
|
Since I'm out hunting for all the achievements, including Sightseer, and all the Voxophone records, I'd like to go back to past areas to finish up the rest of the achievements. Can you backtrack to previous areas? Or is it once you leave you can't go back?
|
Prove the identity: $$ {2n\choose0} + {2n\choose2} + \dots + {2n\choose{2n}} = 2^{2n-1} $$ $\forall n\in\mathbb{N}$ Progress: I've tried using the binomial theorem to get: $$ 2^{2n-1}=\sum\limits_{k=0}^{2n-1} {{2n-1}\choose k} $$ Followed by Pascal's: $$ {2n\choose k}={{2n-1}\choose k}+{{2n-1}\choose{k-1}} $$ Then: $$ 2^{2n-1}=\sum\limits_{k=0}^{2n-1} \Bigg({2n\choose k}-{{2n-1}\choose{k-1}}\Bigg) $$ However, I don't feel right about this.
|
I need to evaluate, for a certain worded question: If n is even $$\binom{n}{0}+\binom{n}{2}+\binom{n}{4}+\cdots\binom{n}{n}$$ If n is odd $$\binom{n}{0}+\binom{n}{2}+\binom{n}{4}+\cdots\binom{n}{n-1}$$ I havent been able to reduce this using the binomial expansion.
|
One day, I wanted to up-vote an answer because it was so helpful, but couldn't because I didn't have enough reputation. A little while later, I wanted to answer a question because I was feeling helpful, but couldn't again. Later, I wanted to comment on an answer because I thought there could be a little more clarification with still no success. So, how do I get those first few points that will open the world of stack-fun-times up to me?
|
As a new user, I find it impossible to contribute to the community or to even begin contributing. I know why the reputation system is in place and I respect it, but at the same time it is too hard on new users. It started with me wanting to upvote a question... "Vote Up requires 15 reputation" Just to appreciate a good question that helped me I need 15 rep? OK..., so I find out how I can get reputation points. More or less, I need to ask a question for +5 and add an answer for +10. I don't have any questions at the moment and I don't want to spam a random question, but I did happen to have a slightly different answer to the earlier question that I wanted to upvote. So I try to answer... This question is protected to prevent "thanks!", "me too!", or spam answers by new users. To answer it, you must have earned at least 10 reputation on this site. Now... I know this doesn't apply to every question, but at the same time, this means I'm forced to answer yet another question, and I don't want to go around looking for random questions and spam irrelevant answers... Now I'm stuck. So I try to talk to some other users in the chat rooms about how to go about getting reputation points and how they first started. I entered into a "casual chat room". You must have 20 reputation on Meta Stack Overflow to talk here. Yes... I can understand why this is enforced, because we don't want new users to spam chat rooms, but all I wanted to do was ask for help. So I can't even talk to anyone about my newbie problems. So okay, I'll just settle for upvoting comments in the question that helped me. I don't see an upvote hover-over button so I can't even do that. So now I'm stuck at 1 reputation point, unable to cross that 15 rep barrier, and even after posting this question I'll only have 6 rep points and still unable to do anything, and I'll be forced to look for questions to answer. Yes, I should be contributing to the community, but I shouldn't need to begin answering or making questions to upvote questions and answers. This only spurs more spam/irrelevant answers if anything. Very, very, very new-user unfriendly.
|
Is it somehow possible to execute a PHP Website code without the need to have the Website open. Something like a intern webbrowser the refreshes itselfs. Or is the any other way like a repeating sheduler the executes the Code every 10 seconds.
|
I have some functions that use curl to pull information off a couple of sites and insert them into my database. I was just wondering what is the best way to go about executing this task every 24 hours? I am running off windows now, but will probably switch to linux once I am live (if that makes a difference). I am working inside symfomy framework now. I hear cronjobs can do this this...but looking at the site it seems to work remotely and I would rather just keep things in house...Can i just "run a service" on my computer? whatever that means ;) (have heard it used) thanks for any help, Andrew
|
Does "but one" mean "only one" or "except one"? This phrase shows up in the song "Love is an Open Door" from the movie "Frozen". The relevant line is "Our mental synchronization can have but one explanation". EDIT: Shouldn't it be "Our mental synchronization can't have but one explanation"?
|
Here's two ways I've seen the "all, but" idiom used: "Close all tabs but this one" (Any modern application with a number of tabs might have this as an option.) It means "close all the tabs, but not this one". "With that goal, the championship is all but decided". This seems to mean "you can say/do whatever (all) you want, (but) it won't change who wins the championship." Is one of these usages more correct than the other?
|
I have a tree (v is number of vertex and d is the maximum degree)whose maximum degree is $\geq 2$. I want to show that, if I take out an specific edge from this tree, I'll get $2$ trees whose number of the vertex in each tree is no more than $$\frac{v(d-1)}d$$
|
I was asked the following question: Let $T=\left(V,E\right)$ be a tree, and let $d$ be the maximum degree of a vertex in that tree. Assume that $d \geq 2$. Prove there an edge in the tree such that, when we remove it from $T$, we will get two trees each of which has at most $\left\lceil \dfrac{d-1}{d}\left|V\right|\right\rceil$ vertices. I tried going by induction on $d$ the maximum degree while I set the number of vertices and it didn't worked. also tried to do induction on the number of vertices and it didn't worked too. Thanks for the help, Yoav
|
I have a problem understanding the definition of the surface area integral of a revolution . I know that we can obtain its volume using the disc method . The method defines the width of the disc as infinitely small (dx) , it is then pretty obvious that the integral is defined as the area made by each point multiplied by the width , which is dx .I found however by the definition of the surface area integral that the width is not defined as dx . Can somebody please clarify why it doesn't work the same way with surface areas ? ! thanks
|
Suppose we rotate the graph of $y = f(x)$ about the $x$-axis from $a$ to $b$. Then (using the disk method) the volume is $$\int_a^b \pi f(x)^2 dx$$ since we approximate a little piece as a cylinder. However, if we want to find the surface area, then we approximate it as part of a cone and the formula is $$\int_a^b 2\pi f(x)\sqrt{1+f'(x)^2} dx.$$ But if approximated it by a circle with thickness $dx$ we would get $$\int_a^b 2\pi f(x) dx.$$ So my question is how come for volume we can make the cruder approximation of a disk but for surface area we can't.
|
I have upgraded my Ubuntu version from 16.04 to 18.04. After that wine programs stopped working. I have re-installed wine and now I'm getting the following error: The following packages have unmet dependencies: wine32:i386 : Depends: libwine:i386 (= 3.0-1ubuntu1) but it is not going to be installed wine64 : Depends: libwine (= 3.0-1ubuntu1) but it is not going to be installed E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution). I can't even install FileZilla from software center. How can I resolve this?
|
I've been using Ubuntu for a few years now, but I just installed Version 16.04, and I've been having a lot of issues. I'm not a command line expert, but I tried to install some software last night, and it is creating issues (and also not working properly). When I run sudo apt-get -f install, I see the following message: Reading package lists... Done Building dependency tree Reading state information... Done Correcting dependencies... Done The following additional packages will be installed: lua-event lua-expat lua-filesystem lua-sec lua-socket lua5.1 prosody Suggested packages: lua-zlib lua-dbi-postgresql lua-dbi-mysql lua-dbi-sqlite3 The following packages will be REMOVED: jitsi-meet-tokens The following NEW packages will be installed: lua-event lua-expat lua-filesystem lua-sec lua-socket lua5.1 prosody 0 upgraded, 7 newly installed, 1 to remove and 22 not upgraded. 3 not fully installed or removed. Need to get 0 B/413 kB of archives. After this operation, 2,296 kB of additional disk space will be used. Do you want to continue? [Y/n] Y (Reading database ... 176266 files and directories currently installed.) Removing jitsi-meet-tokens (1.0.962-1) ... dpkg: error processing package jitsi-meet-tokens (--remove): subprocess installed post-removal script returned error exit status 10 Errors were encountered while processing: jitsi-meet-tokens E: Sub-process /usr/bin/dpkg returned an error code (1) Can someone help me figure out what I need to do to get this resolved? I'm fine with deleting jitsi, but I'm not sure if that will correct the problem. Currently there is a red circle with a line through it in the upper right corner that indicates there may be installed packages with unmet dependencies.
|
I was about to play around on my virtual machine running Ubuntu 12.04. I installed GIT-CORE using apt-get install git-core from repos. First I thought the apt-get command will install in the folder I am in, but I was wrong. So is there a way to directly tell apt-get where to install ? Or do I have to move the files later? Let me know your best solution for this.
|
I'd like to install software packages, similar to apt-get install <foo> but: Without sudo, and Into a local directory The purpose of this exercise is to isolate independent builds in my server. I don't mind compiling from source, if that's what it takes, but obviously I'd prefer the simplest approach possible. I tried apt-get source --compile <foo> as mentioned but I can't get it working for packages like autoconf. I get the following error: dpkg-checkbuilddeps: Unmet build dependencies: help2man I've got help2man compiled in a local directory, but I don't know how to inform apt-get of that. Any ideas? UPDATE: I found an answer that almost works at . The problem with chroot is that it requires sudo. The problem with apt-get source is that I don't know how to resolve dependencies. I must say, chroot looks very appealing. Is there an equivalent command that doesn't require sudo?
|
I noticed that ice becomes stickier the colder it gets. I am reminded of the fool who stuck his tongue to a cold galvanized steel pole and got stuck to it. I am guessing that the pole was so cold that the moisture on his tongue instantly became ice. Why does ice have this property?
|
since the Christmas season is here, I would like to ask a question about the movie, "A Christmas Story." In one of the subplots of the movie, Ralphie's friends were betting each other that their tongue would stick to to a frozen pole. Finally, the kid did it and it stuck to the pole. Why does this happen? I believe that there is a physics explanation for this.
|
I'm mostly wondering if there any way to port or convert minecraft ps4 saves into a format that is compatible with pc minecraft. I only own a ps4 and a pc, but I'm still curious if it's possible to do the same for xbox. Also, are there any legal reasons not to convert files from one platform to another?
|
I would like to know if the same Minecraft account used on a computer can be used on a different platform like the Xbox 360? I am not asking about playing on each simultaneously as each platform has been purchased - I am asking if you can cross play on multiple platforms with the same account. Basically I would like to know if all the saved stuff and settings from one platform will carry over to another.
|
As in title, in terms of group theory (I'm not familiar with category-theoretic terms), question comes from algebraic topology but seems to be of general interest. (Other questions on MSE touch on the topic but I haven't found a direct answer). What is the difference between the two? Is one special case of the other?
|
I'm trying to proof that the following diagram in the category of groups with $i_1$ and $i_2$ being inclusions is a pushout iff $G$ is the free product with amalgamation (up to isomorphism). It should be sufficient to proof $"\Leftarrow"$ since the pushout is unique up to isomorphism. How does the proof of $"\Leftarrow"$ go? \begin{array}{ccc} G_0 & \xrightarrow{i_1} & G_1 \\ \downarrow_{i_2} & & \downarrow_{\varphi_1}\\ G_2 & \xrightarrow{\varphi_2} & G \end{array} I tried defining the unique homomorphism of the pushout by $$\phi((g_1*...*g_n)N) = h_i(g_1)*...*h_i(g_n)$$ but couldn't proof it's well-definedness.
|
If $3n+1$ is a perfect square where $n$ is a positive integer greater than $1$. Then how to prove that $n+1$ would be sum of $3$ perfect squares?
|
If $n$ is a positive integer greater than 1 such that $3n+1$ is perfect square, then show that $n+1$ is the sum of three perfect squares. My work: $3n+1=x^2$ $3n+3=x^2+2$ $3(n+1)=x^2+2$ $(n+1)=\dfrac{x^2+2}{3}$ I have no clue what to do next. Please help!
|
Recently I answered question on Stack Overflow. Instead of getting 10 reputation, it got 3. I didn't get any downvotes on that answer. I am bit confused at this stage. Can anybody explain what is going?
|
On Stack Exchange, users may gain a certain level of reputation. What does reputation do? How can a user gain or lose reputation? See also in the Help Center - Maximum amount of votes a user can use in a day and reputation requirements to vote. - How to get an exact overview of the actions that got you your reputation. - A full list of all privileges granted at each reputation level on all sites.
|
Can we prove that there exists at least one chain $A$ in P(X), where X is a non-empty set (finite or infinite), s.t. $ |X|<|A|\leq |P(X)|$? If you can't solve it, ideas/possible directions are welcome :) The two links mentioned above do not contain answers.
|
$P(\mathbb N)$ = power set of $\mathbb N$. $A \subset P(\mathbb N)$ is a chain if $a,b \in A \implies$ either $a \subseteq b$ or $ b \subseteq a$ That is, we have something like this: $$\cdots a \subseteq b \subseteq c \subseteq\cdots$$ where $a,b,c \in A$ are distinct. We can show easy enough that there is an uncountable chain - this is done by noting $\mathbb N\sim\mathbb Q$ then using Dedekind cuts in $\mathbb Q$ to define $\mathbb R$ we see that a family of (nearly arbitrary) cuts satisfy the condition. For instance the family $L_r=\{q \in \mathbb Q : q < r \}$ for $r > 0$ gives us the sets we need and obviously we can pick others. I tried doing this for $ \mathbb R$ and don't seem to be getting anywhere. To be more specific, does there exist a chain in $P(\mathbb R)$ with cardinality $2^ \mathbb R$? Given a set of cardinality $X$ (necessarily non-finite), is there a chain in $P(X)$ of the same cardinalty of $P(X)$?
|
I'm trying to snap a vertex to the edge right above with with axis locked to z. But it just slides along the edge. Going to vertex mode doesn't help either. This should be possible though as there is only one solution for blender to accomplish this really... idk if this could be a feature request? It's not the first time I'm encountering this problem. Is there a way to make it work?
|
Is there a way to move a vertex along an axis for it to then stop when it reaches the angled edge and snap to it. When I try to using the snap tool, the vertex just goes past or does't reach the edge as my cursor slides up and down the angled edge.
|
The number of numbers lying between 1 and 200 which are divisible by either of two , three or five?
|
I stumbled upon the following in a book: till 400 all even numbers will be divisible by 2 ( 200 even numbers) remaining 200 odd numbers 1 3 5 7 9 ..... 399 200/3 = 67 will be divisible by 3, as we have discarded all even numbers and out of remaining numbers 2nd number is 3 then 1 + 198/3 = 67 numbers are divisible by 3 now we have discarded all multiples of 2 and 3 remaining numbers will be 200 - 67 = 133; 1 5 7 11 13 ... so on out of these 133 numbers 2nd number is 5 so numbers divisible by 5 will be 1 + 131/5 = 1+26 = 27 now remaining numbers = 133 - 27 = 106; 1 7 11 13 .. so on again 2nd number is 7 , so numbers divisible by 7 = 1 + 104/7 = 1+14 = 15 total numbers from 1 - 400 divisible by any of 2 3 5 7 = 200+67+27+15 = 309 But I can't seem to understand how the following is derived? : as we have discarded all even numbers and out of remaining numbers 2nd number is 3 then 1 + 198/3 = 67 numbers are divisible by 3 How does the result come out to be "1 + 198/3" ?
|
Newbie here. Not familiar with cryptography; just interested and reading up about it from time to time. We know that the RSA problem (let's say $c=m^e \bmod N, c^d= m \bmod N$) is about recovering $m$ given $N, c$ and $e$. However, if given $N, m, C$ and $e$ - can I recover $d$?
|
Assume Alice and Bob are using RSA to create a common session key and Cindy is listening, attempting to obtain the session key. Alice and Bob each have their public- and private-key pairs ($\left[pub_{A}, pri_{A}\right]$ for Alice and $\left[pub_{B}, pri_{B}\right]$ for Bob) and Alice, Bob, and Cindy all know everyone else's public key. Alice generates a random $n_{A}$ and sends out $En_{pub_{B}}\left(n_{A}\right)$ ($n_{A}$ encrypted with Bob's public key). Bob generates a random $n_{B}$ and sends out $En_{pub_{A}}\left(n_{B},n_{A}\right)$ and sets the session key to $n_{A}\oplus n_{B}$. Alice sends out $En_{pri_{A}}\left(n_{B}\right)$ and sets the session key to $n_{A}\oplus n_{B}$. My thinking is, Cindy decrypts message 3 with Alice's public key to obtain $n_{B}$. Now Cindy has a plaintext, ciphertext pair and the key that decrypts the ciphertext. My question is, is it possible with this information for Cindy to find $pri_{A}$ in order to decrypt message 2 and find $n_{A}$?
|
I'm trying to convert single line 'C' style comments to 'C++' style. The 'sed' below isn't bad, but of course it fails if any leading code (code before the comment) has any ' / ' in it at all: sed -i 's,\(^[^\/]*\)\/\*\([^\*]*\)\*\/[ ]*$,\1\/\/\2,' filename What I wish I could do is this: ... [^\\/\\*] ... i.e. negate ' /* ' which doesn't work of course, but after several hours of searching, I can't find a simple explanation of how to do that properly :( It doesn't seem like it should be rocket science. For example, these strings: blah blah /* comment */ blah blah / blah /* comment */ blah blah /* comment */ blah blah blah / blah /* comment */ blah ... should convert thusly: blah blah // comment blah blah / blah // comment blah blah /* comment */ blah (this CAN'T be converted) blah blah / blah /* comment */ blah (this CAN'T be converted) ... obviously no conversion can take place if there is code AFTER the 'C' comment. I will do a close visual comparison between the file, before and after, so there's no need to handle ' /* ' inside a literal, nor do I want to convert anything multi-line. Note I think of this as a 'negation' problem but maybe there is another way. I just need to capture everything before a ' /* ' and I don't care how. FOLLOW UP ON ANSWER BELOW Well damn! I see that I've completely misunderstood something fundamental: .*/\* ... reads: "anything except slash star followed by slash star", so actually I get my 'negation' for free :-) So, going even further than Barmar: sed -i 's,^\(.*\)/\*\(.*\)\*/\s*$,\1//\2,' filename ... will even catch this: blah / * blah /* co / mme * nt */ and output this: blah / * blah // co / mme * nt Enlightenment.
|
I am trying to write a script that will delete all comments and everything in between inside C files in my current directory. I've been using sed, and this is what I have so far: sed -i '/ * [^()] */d' *.c This works when the comments are on the same line as an asterisk or backslash. However it doesn't work when there is a commented line without a slash or asterisk. I know sed goes line by line, I just don't know how to tell it to keep deleting until it sees a */.
|
Since the release of the new Android version, has anyone had any success with decrypting the contents of a Micro SD card without the use of the phone? I want to encrypt my card incase I lose the phone. However, I also don't want to be in a situation where something could happen and I am left with no way to retrieve contents from the SD card.
|
Using the SD card as Adopted Storage encrypts it. How can it be decrypted?
|
Yesterday (November 4), I update my Ubuntu 14.04. After that I can't login. It something like a loop. I type the password, enter and it's return to login-screen. The same happen if try the guest mode. After some research, I found that the problems isn't with the login itself. But with the video card driver. Any clue?
|
My Ubuntu is stuck in a login loop when trying to enter my desktop. When I login, the screen gets black and soon after that the login screen comes back. I've read that the problem might be caused by an error depending on the graphics, here's my graphics card: ATI Radeon 7670M
|
I'm doing a remote upgrade from 18.04 LTS to 20.4 LTS over ssh, trying to follow this recipe: However, it seems the upgrade stopped while cleaning up the packages -- it detached from screen and never got to the "System upgrade complete" message. Running sudo do-release-upgrade -d again says "There is no development version of an LTS available". Since this is remote, I'm afraid to reboot or do the wrong thing. How can I check/resume/fix the upgrade? Here's the last part of the /var/log/dist-upgrade/.../main.log: 2020-09-26 10:20:41,799 ERROR not handled exception: Traceback (most recent call last): File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeCache.py", line 997, in tryMarkObsoleteForRemoval self.restore_snapshot() File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeCache.py", line 370, in restore_snapshot pkg.mark_delete() File "/usr/lib/python3/dist-packages/apt/package.py", line 1509, in mark_delete apt_pkg.Error: E:Error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/tmp/ubuntu-release-upgrader-soxxvnbe/focal", line 8, in <module> sys.exit(main()) File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeMain.py", line 238, in main if app.run(): File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeController.py", line 2081, in run return self.fullUpgrade() File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeController.py", line 2058, in fullUpgrade self.doPostUpgrade() File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeController.py", line 1484, in doPostUpgrade if not self.cache.tryMarkObsoleteForRemoval(pkgname, remove_candidates, self.forced_obsoletes, self.foreign_pkgs): File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeCache.py", line 243, in wrapper res = f(*args, **kwargs) File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeCache.py", line 1001, in tryMarkObsoleteForRemoval self.restore_snapshot() File "/tmp/ubuntu-release-upgrader-soxxvnbe/DistUpgrade/DistUpgradeCache.py", line 370, in restore_snapshot pkg.mark_delete() File "/usr/lib/python3/dist-packages/apt/package.py", line 1509, in mark_delete apt_pkg.Error: E:Error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages.
|
I am not sure what caused this error, but here is what the whole error says, and also this is sitting as a notification, and preventing me from updating any software using Update Manager - Please provide some assistance or tell me how to figure out what to do to fix it. Could not calculate the upgrade An unresolvable problem occurred while calculating the upgrade. Please report this bug against the 'update-manager' package and include the following error message: 'E:Error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages.'
|
What is the meaning of International Passport data page Please explain .
|
The checklist for my Mongolian visa application mentions Copy of the bio-data page of your current passport (including passport of other nationality) What's a bio-data page?
|
Currently I have a variable called "data" that I assign static JSON data, then push the values to arrays using three variables named rev_date, rev_area & rev_cases, using the following Javascript code; data = [{ "date": "2020-10-17", "areaName": "Devon", "newCasesByPublishDate": "108" }, { "date": "2020-10-16", "areaName": "Devon", "newCasesByPublishDate": "76" }]; let rev_date = []; let rev_area = []; let rev_cases = []; data.map((item) => { rev_date.push(item.date); rev_area.push(item.areaName); rev_cases.push(item.newCasesByPublishDate); }); My question is, there is an api that returns the same data in JSON format, using the following URL - Is there an easy way using ajax or something else to replace my static "data" variable holding the JSON data, to pull the data dynamically from the URL above?
|
I need to do an request in JavaScript. What's the best way to do that? I need to do this in a Mac OS X dashcode widget.
|
I'm playing D&D 5e as a DM for about a 3-4 sessions now and the math involved in the Wizard's ability Arcane Ward is a little unclear to me. All of my players just reached level 2 and one of the players is a Wizard who chose The School of Abjuration archetype and he now has the Arcane Ward ability. Playing by the PHB(p.109) the ability states: Starting at 2nd level, you can weave magic around yourself for protection. When you cast an abjuration spell of 1st level or higher, you can simultaneously use a strand of the spell's magic to create a magical ward on yourself that lasts until you finish a long rest. The ward has hit points equal to twice your wizard level + your Intelligence modifier. With his Intelligence modifier (+3) and Wizard level 2 the equation should be: $$ \begin{align} {Temporary\;HP} &= ( 2 \times {Wizard\;level} ) + {Int\;modifier} \\ &= ( 2 \times 2 ) + 3 \\ &= 4 + 3 \\ &= 7 \end{align} $$ But it can also be: $$ \begin{align} {Temporary\;HP} &= 2 \times ( {Wizard\;level} + {Int\;modifier} ) \\ &= 2 \times ( 2 + 3 ) \\ &= 2 \times 5 \\ &= 10 \end{align} $$ The text makes it unclear.
|
An abjuration wizard's Arcane Ward states: [...] The ward has hit points equal to twice your wizard level + your Intelligence modifier. So how many hit points is this supposed to be? \$ (2 \times WizardLevel) + INT_{mod}\$ or \$2 \times (WizardLevel + INT_{mod})\$ ? I feel like the phrasing hints toward the first calculation, but it's still somewhat ambiguous.
|
I am using gnome-terminal. I often work on large projects where there are lots of sub-directories and I have to compile them from the terminal. It's a very problematic to work with long-path terminal prompt while you have one monitor. Assume you are in a directory, sbmaruf@lenovo:/sys/dev/block/7:6/bdi/subsystem/7:7/power$ Now while I am using the terminal, is there any tricks or shortcuts to make the current address to a dummy string or text so that it may easy to work. Like if I want to show the above address as, sbmaruf@lenovo:proj1$ where proj1 = /sys/dev/block/7:6/bdi/subsystem/7:7/power. I want do it on the go. like while I am using the terminal can I do it in a short amount of work.
|
Currently it is: michael@Castle2012-Ubuntu-laptop01:~/Dropnot/webs/rails_v3/linker/spec/controllers$ Outside of renaming my machine and directory structure... How could I make it be something more like: michael:controllers$
|
I've got a httpd24 server that I want to use to server multiple domains. I've got a 3 VirtualHost definitions. <VirtualHost *:443> ServerName one.example.com # SSL stuff DocumentRoot "/opt/rh/httpd24/root/var/www/one </VirtualHost> <VirtualHost *:443> ServerName two.example.com # SSL stuff DocumentRoot "/opt/rh/httpd24/root/var/www/two </VirtualHost> <VirtualHost _default_:443> Redirect / https://two.example.com </VirtualHost> The idea being that if the exact url one.example.com or two.example.com is entered they'll get the appropriate pages. If any other domain is received I want to redirect to the url. However I'm finding that if I enter I'm not getting redirected, instead the content for one.example.com is served. Note that does work as expected. My issue is that I'm expected unknown domains to be redirected, but they are instead being resolved as if they were one.example.com. The RPM I installed originally was httpd24-httpd-2.4.27-8.el6.1.x86_64. Any ideas what is going on?
|
It's the following part of a virtual host config that I need further clarification on: <VirtualHost *:80> # Admin email, Server Name (domain name), and any aliases ServerAdmin [email protected] ServerName 141.29.495.999 ServerAlias example.com ... This is and example config, similar to what I currently have (I don't have a domain name at the moment). <VirtualHost *:80> - Allow the following settings for all HTTP requests made on port 80 to IPs that this server can be contacted on. For instance, if the server could be accessed on more than one IP, you could restrict this directive to just one instead of both. ServerName - If the host part of the HTTP request matches this name, then allow the request. Normally this would be a domain name that maps to an IP, but in this case the HTTP request host must match this IP. ServerAlias - Alternate names accepted by the server. The confusing part for me is, in the above scenario, if I set ServerAlias mytestname.com and then made an HTTP request to mytestname.com, there would have to be a DNS record pointing to the server's IP for this to work? In which case, is ServerAlias just basically EXTRA ServerName entries? Say I had a DNS entry such that foobar.com = 141.29.495.999 but then I had ServerName = 141.29.495.999 and ServerAlias was empty, would that mean that although foobar.com gets resolved to the right IP, because there is no reference to accept foobar.com in ServerName or ServerAlias? Or something. Man I'm confused.
|
I have test: @Test public void postStatusTest() { loginPage.logInFacebook("my-email", "my-password"); facebookMainPage.checkNotifications(); facebookMainPage.postStatus("Test"); } where: public FacebookMainPage checkNotifications(){ if (driver.findElements(notificationsButton).size() > 0) driver.findElement(notificationButton).click(); return new FacebookMainPage(driver); } and: public FacebookMainPage postStatus(String statusText){ driver.findElement(textField).click(); driver.findElement(textField).sendKeys(statusText); driver.findElement(postButton).click(); return new FacebookMainPage(driver); } can you, please, explain why in my case both methods checkNotifications and postStatus return NullPointerException? I've read theory, but I hardly understand what in my case can be wrong.
|
What are Null Pointer Exceptions (java.lang.NullPointerException) and what causes them? What methods/tools can be used to determine the cause so that you stop the exception from causing the program to terminate prematurely?
|
how to go about computing following determinant? I tried using Gaussian elimination on some special cases and figured there might be some pattern, maybe a recurrence relation involved, but I just can't see it. $\begin{vmatrix} 1 & 2 & 3 & \cdots & n-1 & n \\ 2 & 3 & 4 & \cdots & n & 1 \\ 3 & 4 & 5 & \cdots & 1 & 2 \\ \vdots & \vdots & \ddots & \vdots \\ n & 1 & 2 & \cdots & n-2 & n-1 \end{vmatrix}$
|
I'm stuck in this question: How calculate this determinant ? $$\Delta=\left|\begin{array}{cccccc} 1&2&3&\cdots&\cdots&n\\ n&1&2&\cdots&\cdots& n-1\\ n-1&n&1&\cdots&\cdots&n-2\\ \vdots &\ddots & \ddots&\ddots&&\vdots\\ \vdots &\ddots & \ddots&\ddots&\ddots&\vdots\\ 2&3&4&\cdots&\cdots&1 \end{array}\right|$$ Thanks a lot.
|
I'm upgrading my databases to compatibility level 100 on SQL Server 2008 R2. My next step is to check if my stored procedures, functions, views, triggers are still working properly. Running each of these is not an option. How should I check?
|
I've made a backup of a SQL Server database running on SQL Server 2008. I've restored that backup into a SQL Server 2012 instance. I've set the compatibility level on the restored instance to SQL Server 2012 (110). What does this do to the database? Does it, for example, cause stored procedures to be examined for incompatibilities cause any updates to all of the data pages in the database Cause updates to to datapages as the are accessed in the future Cause errors in the future if stored procedures or views are executed that use incompatible syntax Where in books on line, or else where, can I find more detail?
|
It seems that \input appends a trailing space. MWE: foo.tex \documentclass{article} \begin{document} foo\input{bar.txt}baz \end{document} bar.txt bar Which, using pdflatex foo gives the output foobar baz, with a space in between. How do I remove it?
|
Intro I'm working on a lightweight package that allows you to put any content (typically LaTeX code) in an environment, then use that content multiple times, each time scanned separately, so you can use it both as verbatim output and interpreted as LaTeX. Its main purpose is to typeset LaTeX code and its 'result' side-by-side; useful for documenting TeX packages without having to copy/paste code. But it has other purposes as well. After experimenting with \scantokens until I gave up in tears, I arrived at the filecontents environment, which almost solved my problem singlehandedly! The Problem The problem is, when reintroducing filecontented code through \input, LaTeX adds an implicit newline at the end, which translates to whitespace that I can't seem to get rid of. I've seen many semi-related questions floating around, with answers employing techniques like: reading a file line-by-line, using \everyeof in some clever way, playing with \endlinechar or using packages such as catchfile but none of them provides a clear answer to the following question: The Question How can I \input a file without getting the implicit newline? Minimal Working Example \documentclass[margin=1mm]{standalone} \usepackage{filecontents} \begin{filecontents*}{tmp.tex} \LaTeX{}\end{filecontents*} \begin{document} \fbox{\input{tmp.tex}} \end{document} Note the extra whitespace to the right of the box. Note also that I'm definitely not adding any explicit whitespace. Even a manually produced file (so, not using filecontents) with no newlines at all exhibits the same problem.
|
We are developing a software for a hosting company. This software is required to Lock/Unlock computers based on whether the admin is physically present or not. We are using RFID. So as long as the software detects admin's RFID, the system remains unlocked. As soon as the Admin leaves the premises, the software automatically locks the computer. Untill the admin again enters the premises. The main problem in getting this to work is, the application needs to run at all time and no one should be able to close the application. Even if it shows up in task manager, the main purpose is the no one should be able to close the application.
|
I have a requirement to hide a process in Task Manager. It is for Intranet scenario. So, everything is legitimate. :) Please feel free to share any code you have (preferably in C#) or any other techniques or any issues in going with this route. Update1: Most of the users have admin privileges in order to run some legacy apps. So, one of the suggestion was to hide it in task manager. If there are other approaches to prevent users from killing the process, that would be great. Update2: Removing the reference to rootkit. Somehow made this post look negative.
|
If I add a foreign key constraint with the following command: ALTER TABLE [abc] WITH CHECK ADD CONSTRAINT [fk_some_col] FOREIGN KEY([some_col_id]) REFERENCES [xyz] ([some_col_id]) Is there any reason or advantage to follow it with this line? ALTER TABLE [abc] CHECK CONSTRAINT [fk_some_col]
|
ALTER TABLE [dbo].[REMINDER_EMAIL] WITH CHECK ADD CONSTRAINT [FK__REMINDER_EMAIL__FACILITY_ID] FOREIGN KEY ( [FACILITY_ID] ) REFERENCES [dbo].[FACILITY] ( [FACILITY_ID] ) ALTER TABLE [dbo].[REMINDER_EMAIL] CHECK CONSTRAINT [FK__REMINDER_EMAIL__FACILITY_ID]
|
In a circuit diagram were capacitance value of an electrolytic capacitor is given, how do you know the capacitor voltage to use?
|
How to find the voltage rating of a capacitor after knowing the capacitance value. Example, For a power supply, If the input voltage is 60V and output is 5V. The input capacitor(C1) value is 100uf and output capacitor value is 1000uf. What is the voltage rating for both the capacitors and how to find them.
|
In order to create a simple event bus to implement a communication infrastructure for microservice I hit this question: How can I invoke multiple Action with different generic types?
|
What's the best way to call a generic method when the type parameter isn't known at compile time, but instead is obtained dynamically at runtime? Consider the following sample code - inside the Example() method, what's the most concise way to invoke GenericMethod<T>() using the Type stored in the myType variable? public class Sample { public void Example(string typeName) { Type myType = FindType(typeName); // What goes here to call GenericMethod<T>()? GenericMethod<myType>(); // This doesn't work // What changes to call StaticMethod<T>()? Sample.StaticMethod<myType>(); // This also doesn't work } public void GenericMethod<T>() { // ... } public static void StaticMethod<T>() { //... } }
|
I have got a .ecw-file that I want to somehow import into QGIS 1.8.0. Is there a plugin that I can install that can help me do this or is there another way? The .ecw-file contains raster data.
|
How might I enable Quantum GIS to read ECW imagery? At the moment I'm mostly concerned about this on Ubuntu 10.4 amd64, but I also use WinXP & Win7.
|
I am fairly new to DNS managing. I have been attempting for a while now to point both my root domain @ and www to my GitHub account page user.github.io. I have a CNAME pointing www to user.github.io., but for some reason I can't do a CNAME that points @ to user.github.io.. The error I'm getting is CNAME records cannot share a name with other records. I don't have the slightest clue what that's supposed to mean, please help. If it makes a difference I'm using DigitalOcean's DNS controls
|
This is a about CNAMEs at the apices (or roots) of zones It's relatively common knowledge that CNAME records at the apex of a domain are a taboo practice. Example: example.com. IN CNAME ithurts.example.net. In a best case scenario nameserver software might refuse to load the configuration, and in the worst case it might accept this configuration and invalidate the configuration for example.com. Recently I had a webhosting company pass instructions to a business unit that we needed to CNAME the apex of our domain to a new record. Knowing that this would be a suicide config when fed to BIND, I advised them that we would not be able to comply and that this was bunk advice in general. The webhosting company took the stance that it is not outright forbidden by standard defining RFCs and that their software supports it. If we could not CNAME the apex, their advice was to have no apex record at all and they would not provide a redirecting webserver. ...What? Most of us know that insists that A CNAME record is not allowed to coexist with any other data., but let's be honest with ourselves here, that RFC is only Informational. The closest I know to verbiage that forbids the practice is from : If a CNAME RR is present at a node, no other data should be present; this ensures that the data for a canonical name and its aliases cannot be different. Unfortunately I've been in the industry long enough to know that "should not" is not the same as "must not", and that's enough rope for most software designers to hang themselves with. Knowing that anything short of a concise link to a slam dunk would be a waste of my time, I ended up letting the company get away with a scolding for recommending configurations that could break commonly used software without proper disclosure. This brings us to the Q&A. For once I'd like us to get really technical about the insanity of apex CNAMEs, and not skirt around the issue like we usually do when someone posts on the subject. is off limits, as are any other Informational RFC applicable here that I didn't think of. Let's shut this baby down.
|
If I have nothing to do, should I say "yes" or "no"? I'm confused because both "Yes, I do have nothing to do" and "No, I don't have anything to do" have the same meaning.
|
Take the question: Did you not go to the store? If I did not go to the store, should I then say yes? Or no? If I did go to the the store, would my answer then have to be yes or no? For me I would think that if I did you go to the store, then the answer to the question would be 'yes'.
|
Why is it so? My MWE: \documentclass{article} \usepackage{tabularx} \usepackage[table]{xcolor} \begin{document} \begin{table}[H] \caption{Title.}\label{title} \begin{tabularx}{\linewidth}{|p{5.5cm}|X|} \hline \color{red}{\textbf{Column 1}} & \color{red}{\textbf{Column 2}} \\ \hline A & a \\ \hline B & b \\ \hline C & c \\ \hline \end{tabularx} \end{table} \end{document} The result is as follows If color is black, then the height is as I expect:
|
I'm trying to make a beamer slide containing a table with the text in a row styled in a different color. However, the row's height increases when colored, as opposed to the default. The same problem occurs if I use the \rowfont command. How do I correct this? \PassOptionsToPackage{table}{xcolor} \documentclass[compress]{beamer} \begin{document} \begin{frame} Example 1 \rowcolors{1}{gray!30}{blue!30} \begin{tabular}{|p{0.5\textwidth}|} \hline \color{blue}{Foo} \\ Bar\\ Baz\\ \hline \end{tabular}\\[1in] Example 2 \rowcolors{1}{gray!30}{blue!30} \begin{tabular}{|p{0.5\textwidth}|} \hline Foo \\ Bar\\ Baz\\ \hline \end{tabular} \end{frame} \end{document} I want the table to look like "Example 2", but with the row text colored as in "Example 1".
|
I hit Shift+F4 to get the Blender Python console. PYTHON INTERACTIVE CONSOLE 3.2.3 (default, Sep 25 2013, 19:38:45) [GCC 4.7.2] >>> import numpy Traceback (most recent call last): File "<blender_console>", line 1, in <module> ImportError: No module named numpy On the web, I found some instructions that might work, that involved copying my Python3 numpy into the Blender Folder. Install python3.2 Install numpy for python3.2 using the python3.2 command instead of python on my system numpy was located in /usr/local/lib/python3.2/dist-packages. Copy numpy from there to blender/2.57/scripts/modules Looking around and with help from In my case, copied numPy to /usr/lib/blender/modules however it still cannot find. I may have done some of these steps wrong or not represented them accurately. This is to the best of my memory.
|
I'm currently developing a script for Blender to handle Mesh Frequency Decomposition. The script is nearly complete, but i need one more thing: The SciPy library to compute eigenvalues and eigenvectors. Following the installation instructions on , I'm able to install it as well as Numpy. Numpy works fine, but I can't even import SciPy: Traceback (most recent call last): File "/CAF_FD.py", line 4, in <module> ImportError: No module named 'scipy' Error: Python script fail, look in the console for now... By the way, I'm working on Linux 64 bit and I've installed SciPy and Numpy with my package manager. Edit: When I try to use SciPy with a terminal prompt, it works.
|
I've traveled in the past with a laptop in its bag as the sole carry on. There were usually other "small" electronic parts, like a mouse, charger, phone charger, etc. The laptop and its accessories are the property of the company I work for and on whose behalf I'm going on the business trip. However, I have no official document that states the ownership of the device(s), such is the company policy (I can't change that, nor include it somewhere), but I do have a written travel order. Customs never made any issue about that, just as for a mobile phone, even in the case of two laptops or external hard drives. (I guess that that falls under some kind of "personal items" category.) They typically look through my stuff and just confirm that those are business things and don't look twice at them (once they asked me to power on the laptop, but that is for security reasons). What is about to change is that I'm going to be required to travel, again on business, with a graphic card. Those are also company-issued and definitely not high-end (perhaps ca. 300 euro). However, these are graphic cards that are used for PCs normally, i.e. as such they can't be plugged in into a laptop. The interface for the laptop wouldn't look as such to the layman and can't be found on the internet, as it is internally built. My main concern is that a customs officer will think that I'm trying to smuggle a graphic card and that I'm going to be either forced to pay taxes/duties or worse get penalized. I haven't been able to find any rules regarding electronic devices as to what is allowed that would match my situation - not even for just the laptop. The question is whether there are such rules and subsequently whether my concern is justified? I tagged the question with europe, but to further narrow down, focus on entering and leaving the EU. And to give a bit of substance to my concern, I've observed that non-technical people are often biased when it comes to electronic devices. For example, no one would accuse a man with a leather briefcase that he traveled to London without it, purchased there a 2000 euro briefcase and is now attempting to avoid paying due customs. Edit I don't think is a duplicate for two reasons. First, it focuses on security rather than customs. Second, OP says explicitly that he is going to buy a graphic card abroad and consequently has all the required documentation and/or packaging and the duty and intent to pay any occurring taxes/duties, which is not my case. I have neither the packaging, nor the receipts, nor should I be obliged to pay duties and taxes.
|
As I will be travelling to the US in July, I was thinking of buying two graphics cards (R9 390X) over there and bring them back to Switzerland, as computer components are mostly a bit cheaper over there. I know that the US has some really high security standards regarding international flights. If I take these two GPU's in my carry-on luggage (so they don't break), how would a security officer at LAX react when they see those Graphics cards? I do realise that most people don't actually know what a GPU is or how it looks like. So I am concerned that a security officer might take them from me at an airport when trying to board an international flight. Believe it or not, I read some really strange stories in forums from people that claim the security officer did not know what a GPU is and thought it might be some sort of a bomb. Note: By "GPU" I am referring to the whole graphics card (with circuit board, coolers, etc.) and not just the processing unit.
|
Can someone please explain me why does this work like it does? Python 3.6.3 In [1]: def test(): ...: try: ...: return 1 ...: finally: ...: return 2 ...: In [2]: test() Out[2]: 2 EDIT: This is not exactly duplicate as linked questions raise exceptions in their try : and my example uses return which I expected to work. This function looks like it should return 1 yet it returns 2 - so basically return 1 is ignored. finally makes a good job of eating any risen exceptions but should it also eat returns?
|
I found the following behavior at least weird: def errors(): try: ErrorErrorError finally: return 10 print errors() # prints: 10 # It should raise: NameError: name 'ErrorErrorError' is not defined The exception disappears when you use return inside a finally clause. Is that a bug? Is that documented anywhere? But the real question (and the answer I will mark as correct) is: What is the python developers' reason to allow that odd behavior?
|
Equation: \documentclass[12pt]{article} \usepackage{mathtools} \begin{document} \begin{eqnarray} \langle\pi_n|\hat{H}^{ab}|\pi_m\rangle & =& \Delta_{nm} g\int d^3x|\Psi_p(x-r_m)|^2\left\{|\phi_0(x)|^2+ \sum_{q=1}^{N}\left[\hat{b}_q\left(a\phi_0^*(x)-a\phi_0(x)\right)\right.\right.\\ & & +\left.\left. \phi*a*a*a-\phi^*_0(x)v^*_q(x)\right]\right\} \end{eqnarray} \end{document} The third bracket at the end of the equation is of different size than the earlier bracket used in the first line.
|
I want to align equations (using the align environment from the amsmath package) inside matching \left( and \right) commands. For example: \documentclass[a4paper,12pt]{article} \usepackage{amsmath} \begin{document} \begin{align} a \left( b &= c \right)\\ d \left( e &= f \right) \end{align} \end{document} But that code gives this error: Extra }, or forgotten \right. The error disappears when I remove the delimiters. Is there a workaround for this?
|
I am getting below error when I tried to install the WSP in staging environment. Add-SPSolution : Operation is not valid due to the current state of the object. At line:1 char:1 + Add-SPSolution -LiteralPath "D:\StagePackage\SharePoint.ServiceSett ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : InvalidData: (Microsoft.Share...dletAddSolution:SPCmdletAddSolution) [ Add-SPSolution], InvalidOperationException + FullyQualifiedErrorId : Microsoft.SharePoint.PowerShell.SPCmdletAddSolution I am not sure what is the exact issue here, I tried to install the same package in my dev/test environment its working fine Below is the ULS log Deleting the SPPersistedObject, SPSolutionLanguagePack Name=0. 5f1402fb-84e7-41d1-abeb-da9cdc500246 Deleting the SPPersistedObject, SPSolution Name=sharepoint.mysettings.wsp. 5f1402fb-84e7-41d1-abeb-da9cdc500246 System.InvalidOperationException: Operation is not valid due to the current state of the object. at Microsoft.SharePoint.Administration.SPConfigurationDatabase.Microsoft.SharePoint.Administration.ISPPersistedStoreProvider.GetParent(SPPersistedObject persistedObject) at Microsoft.SharePoint.Administration.SPSolutionLanguagePack.get_DisplayName() at Microsoft.SharePoint.Administration.SPSolutionLanguagePack.SetSolutionFile(SPFarmSolutionPackage solnPackage, String path, String solutionName, Boolean isRestore) at Microsoft.SharePoint.Administration.SPSolution.AddLanguagePack(SPFarmSolutionPackage solnPackage, String path, UInt32 lcid, String name, Boolean isRestore) at Microsoft.SharePoint.Administration.SPSolutionCollection.Add(String path, String name, UInt32 lcid, Boolean isRestore) at Microsoft.SharePoint.Administration.SPSolutionCollection.Add(String path, UInt32 lcid) at Microsoft.SharePoint.PowerShell.SPNewCmdletBase`1.InternalProcessRecord() at Microsoft.SharePoint.PowerShell.SPCmdlet.ProcessRecord() 5f1402fb-84e7-41d1-abeb-da9cdc500246 Error Category: InvalidData Target Object Microsoft.SharePoint.PowerShell.SPCmdletAddSolution Details NULL RecommendedAction NULL 5f1402fb-84e7-41d1-abeb-da9cdc500246 I tried deploying the package with stsadm command also and there also I am getting error. Its 2013 solution and scoped at farm level I am completely running out of ideas can anyone please help me on this.
|
I installed the August-2016 CU updates and then I upgraded the farm solutions after that i can't deploy any solutions in SharePoint 2013 by using visual studio ?I got this error message Error occurred in deployment step 'Add Solution': Operation is not valid due to the current state of the object.
|
I have created a new custom Formula Field called Locale on the Case object. I want to extract all values which are available on User object (Locale field values) to this Case Locale field. How? without using Apex Class we can use validation Rule or formula Field or any other Method
|
I Have Created a New Custom Formula Field called Locale in Case Object,I want to Extract all Values which is available on User object(Locale Field Value) to case Locale Field, How ? Can anyone Explain to this Question.
|
I need to pass a batch of parameters to mysql in python. Here is my code: sql = """ SELECT * from my_table WHERE name IN (%s) AND id=%(Id)s AND puid=%(Puid)s""" params = {'Id':id,'Puid' : pid} in_p=', '.join(list(map(lambda x: '%s', names))) sql = sql %in_p cursor.execute(sql, names) #todo: add params to sql clause The problem is I want to pass the name list to sql IN clause, meanwhile I also want to pass the id and puid as parameters to the sql query clause. How do I implement these in python?
|
I know how to map a list to a string: foostring = ",".join( map(str, list_of_ids) ) And I know that I can use the following to get that string into an IN clause: cursor.execute("DELETE FROM foo.bar WHERE baz IN ('%s')" % (foostring)) What I need is to accomplish the same thing SAFELY (avoiding SQL injection) using MySQLDB. In the above example because foostring is not passed as an argument to execute, it is vulnerable. I also have to quote and escape outside of the mysql library. (There is a , but the answers listed there either do not work for MySQLDB or are vulnerable to SQL injection.)
|
We all know Thanos specifically chose to snap to use all the Infinity Stones to wipe out half the universe. Even everyone else who gets an Infinity Gauntlet seems to have to snap in order to use all the Stones. Did it have to be a snap in order to use all the Infinity Stones? Why wasn't it a clap? Or something else? I get Thanos chose to do a snap but if he had chosen to do a clap or something else, would it have worked? The reason I'm not entirely sure is because Tony builds a gauntlet as well and he's not working off Thanos' gauntlet but he comes to the same conclusion-snap to use all Infinity Stones, granted this may have been easiest, but I'm still curious if it needed to be a snap or all gauntlets were just designed that way. I'm specifically asking for lore on using all 6 stones. I know there's duplicates out there about how specifically the gauntlet is activated, but I'm asking if, in order to use all 6 infinity stones, a snap, by any party, whether it be Thanos, Hulk, Tony, other celestials, etc, is required on any gauntlet (or any device using all 6 stones), or if that was simply a choice by all parties that have used all 6 stones thus far.
|
In Avengers: Infinity War, up until Thanos gets all six Stones in order to use the Gauntlet he needs to close his fist, as we see in the fight scene on Titan. Doctor Strange: "Don't let him close his fist!" So why later does snapping work?
|
I am trying to set the default desktop icon size to a really small value, because the small option in org->gnome->nautilus->icon-view (dconf editor) is still too large for my taste. Is is possible to set that value to an even smaller one somehow? Maybe there's a way to set the smallest icon size in pixels somewhere? I'm new to Ubuntu and I haven't found anything useful on the internet. Thanks.
|
In the newest Nautilus 3.18 the smallest folder/icon size is really too big. Is there some way to hack (or something) this program and set a smaller one?
|
The ordered pair $(a,b)$ is defined in formal set theory as the set $\{\{a\},\{a,b\}\}$. Then ordered triples $(a,b,c)$ are defined in this way: $((a,b),c)$. However, can we define ordered triples as the set $\{\{a\},\{a,b\},\{a,b,c\}\}$, and analogously for higher n-tuples. In other words, does such a definition uniquely determine the components of the ordered triple?
|
releasing a second question concerning ordered stuff and set theory, which is very similar to my first question () which I'm putting here for reference. The next problem that I'm stuck at in my book is this: we have an ordered triple $(a,b,c)$ and we want to define it using set theory. Why would $\{\{ a\} ,\{ a,b\} ,\{ a,b,c\}\}$ not work? The book requires from me to prove why it is not valid. Additional info: I don't know how this matters but I'm gonna put it up anyhow. It is written within the book that the correct way to show it is $\{\{ a\} ,\{\{ a\} ,\{\{ b\} ,\{ b,c\}\}\}\}$ EDIT: Now, I consider that the correct case should matter. Besides pointing out why the first case is wrong I'm curious as to why the second one is correct
|
From my basic understanding of popular-level physics articles and books and such, the 4 forces (Electromagnetism, Gravity, Strong and Weak Force) used to be 1 force in the early universe, then split off into the 4 forces as the universe expanded and cooled down. I'm wondering, if the universe is continuously expanding and cooling down, could the 4 forces split off or "decay" again in the far future? Has anyone theorized about this at all? Billions of trillions of years in the future, might magnets cease to induce electrical currents, or could electrical activity cease to carry a magnetic component, or could the Weak Force break up into its individual components?
|
It is generally believed that $10^{-35}$ seconds after the Big Bang, the symmetry of a GUT was broken and after $10^{-12}$ seconds the electroweak force was broken: \begin{equation} \mathrm{SU(2)} \times \mathrm{U(1)} \rightarrow \mathrm{U(1)} \end{equation} This symmetry breaking is a result of the universe cooling down and undergoing a phase transition. I'm aware that the temperature of the universe it about $2.7$ Kelvin, so the temperature of the universe cannot decrease much more, but I was wondering if there is a chance that another phase transition might happen again in the future?
|
I have read this sentence and I'm not sure that it's correct He has been buried 4 days I think it should have been He has been buried for 4 days. Am I correct?
|
The other day I heard someone say: They've been going out a week; I mean, that's not (a) serious (relationship). I wondered if she was speaking correctly, which is presumable, since she was a native American English speaker. But more often I here the for when people talk about duration. So is it also possible to leave out for? Maybe only in the informal register? EDIT: There was a heavy stress on the word week. Does it play a role in this matter? EDIT#2: ... OK. It's more suitable as an answer.
|
Ubuntu 12.04 Python 2.7 apt 0.8.16~exp12ubuntu10.17 for amd64 compiled on Jun 13 2014 17:42:13 When I run sudo apt-get install python-pip It installs a a very old version. $ pip --version pip 1.0 from /usr/lib/python2.7/dist-packages (python 2.7) This has caused me all sorts of problems as that version of pip has trouble locating many packages. When I try to install the via apt-get It wont locate it. [$ sudo apt-get install python-pip=1.5.6 Reading package lists... Done Building dependency tree Reading state information... Done E: Version '1.5.6' for 'python-pip' was not found][2] NOTE: I have previously run apt-get update and apt-get update When I try to install pip by executing sudo python get-pip.py I get $ python get-pip.py Downloading/unpacking pip Cannot fetch index base URL https://pypi.python.org/simple/ Could not find any downloads that satisfy the requirement pip Cleaning up... No distributions at all found for pip Storing debug log for failure in /home/user/.pip/pip.log I believe this is because of some issues with the Ubuntu VM proxy settings which I can get resolved later in the week. Preferably I just want to install a recent version of pip via apt-get but I am open to any solution. Any help is much appreciated
|
I am new to Linux and Ubuntu. I was trying to upgrade pip but ran into this... $ sudo pip install --upgrade pip Cannot fetch index base URL https://pypi.python.org/simple/ Downloading/unpacking pip from https://pypi.python.org/packages/py2.py3/p/pip/pip-7.1.0-py2.py3-none-any.whl#md5=b108384a762825ec20345bb9b5b7209f Downloading pip-7.1.0-py2.py3-none-any.whl (1.1MB): 1.1MB downloaded Installing collected packages: pip Found existing installation: pip 1.5.4 Not uninstalling pip at /usr/lib/python2.7/dist-packages, owned by OS Successfully installed pip Cleaning up... Any idea why?
|
I want to download entire multiverse repository I know it maybe several GBs around 20, but I want to. NOTE:I ONLY WANT TO DOWNLOAD AND WILL INSTALL LATER using dpkg -i [pkg] First created a file which contains names of all the available packages using apt-cache. apt-cache dumpavail |grep -oP "(?<=Package: ).*" >> packagelist This will create a file packagelist with all the available packages. i want to understand the working of apt-cache dumpavail command. i know >> is there to append and creates a file package list and all, but didn't get that grep (?<=package: ) and it's working so ones understood i don't have to memorize that stuff.
|
I have a friend who has got a computer that is not connected to the Internet. Is there any way to install software offline easily?
|
when I initialize an array in python like so and then assign an element to a different value and then print out the 2d list dist = [[0]*3]*3 dist[1][1] = 1 It gives me this [[0,1,0],[0,1,0],[0,1,0]] Can someone explain to me why the whole column has changed instead of just the specific element?
|
I needed to create a list of lists in Python, so I typed the following: my_list = [[1] * 4] * 3 The list looked like this: [[1, 1, 1, 1], [1, 1, 1, 1], [1, 1, 1, 1]] Then I changed one of the innermost values: my_list[0][0] = 5 Now my list looks like this: [[5, 1, 1, 1], [5, 1, 1, 1], [5, 1, 1, 1]] which is not what I wanted or expected. Can someone please explain what's going on, and how to get around it?
|
Why are ideals in valuation rings totally ordered? I was thinking of defining a valuation $v:I \rightarrow \text{min}\{v(x): x \in I\}$, would this work?
|
How do I prove the fact that for any valuation ring $V$ the ideals are totally ordered under inclusion?
|
I allowed Windows 10 update on my Windows 7. Later I wanted to stop this update. Right now I have Windows 7 as desired, but I guess, that win10 update is on my drive, because I have got 10gb of free space, and now 4 gb. Where can I find downloaded files of Windows 10 update, and delete them?
|
I cancelled the Microsoft Windows 10 Reservation and uninstalled KB3035583, but Windows 10 is still trying to install. After I uninstalled KB3035583 and restarted my laptop as instructed, I could not find KB3035583 to hide it. Now Windows 10 is sitting in my Windows Update saying that it will install when I restart my computer.
|
I need to know how to get a string's length in pixels in C# Unity3D. string msg = ""You Must be from South Carolina!"; How do I get the above message string length in Pixels?.
|
I have a string like this: string s = "This is my string"; I am creating a Telerik report and I need to define a textbox that is the width of my string. However the size property needs to be set to a Unit (Pixel, Point, Inch, etc). How can I convert my string length into, say a Pixel so I can set the width? EDIT: I have tried getting a reference to the graphics object, but this is done in a class that inherits from Telerik.Reporting.Report.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.