Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

33rd Annual /prog/ Challenge: non-millennial manbun edition

Name: Anonymous 2020-02-14 8:56

An easy one this year, turn to your bookshelf and select the most niche programming language book you can find. Flick to something random then type it out here.

Name: Anonymous 2020-02-14 9:07

My bookshelf contains only books by Crooked Donald, the sly rat who refuses to finish his magnum opus.

Name: Anonymous 2020-02-14 10:35

A human at a keyboard is unlikely to overflow any buffer, but a 9600 baud modem or a terminal that can dump a buffer at 19.2 Kbaud will challenge a loaded system. This will let the IRQ routine run at full speed into the buffer, and let the program read an entire block without waiting.

00000004 ABit equ 4 bit #4 of port address tells the "side"
80000080 BrkTime equ $80000000+128 break sent for 500mSec.
00000080 RxDefault equ RxRTS RxRTS control enabled
00000010 TxDefault equ TxCTS TxCTS control enabled

Name: Anonymous 2020-02-14 11:31

6. Does your son use Quake?

Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

Name: Anonymous 2020-02-14 11:44

Binary Search introduces one method for finding the root of a mathematical function. As the exercises in the same section sketch, the method naturally generalizes to computational problems, such as finding certain values in tables, vectors, and arrays. In mathematical applications, programmers tend to employ methods that originate from analytical mathematics. A prominent one is due to Newton. Like binary search, the so-called Newton method repeatedly improves an approximation to the root until it is ``close enough.'' Starting from a guess, say, r1, the essence of the process is to construct the tangent of f at r1 and to determine its root. While the tangent approximates the function, it is also straightforward to determine its root. By repeating this process sufficiently often,Newton proved this fact. an algorithm can find a root r for which (f r) is close enough to 0.

Name: Anonymous 2020-02-15 17:37

Only 3 progriders have a bookshelf?

(ಶ_ಶ)

Name: Anonymous 2020-02-15 22:03

Most people here are senile alcoholics.

Name: Anonymous 2020-02-15 22:26

Is it possible to cycle through all 2n combinations of n bits by changing only one bit at a time? The answer is “yes,” and this is the defining property of Gray codes. That is, a Gray code is an encoding of the integers such that a Gray-coded integer and its successor differ in only one bit position. This concept can be generalized to apply to any base, such as decimal, but here we will discuss only binary Gray codes.
Although there are many binary Gray codes, we will discuss only one: the “reflected binary Gray code.” This code is what is usually meant in the literature by the unqualified term “Gray code.” We will show, usually without proof, how to do some basic operations in this representation of integers, and we will show a few surprising properties.
The reflected binary Gray code is constructed as follows. Start with the strings 0 and 1, representing the integers 0 and 1:

0
1

Reflect this about a horizontal axis at the bottom of the list, and place a 1 to the left of the new list entires, and a 0 to the left of the original list entries:

00
01
11
10

This is the reflected binary Gray code for n = 2. Ti get the code for n = 3, reflect this and attach a 0 or 1 as before:

000
001
011
010
110
111
101
100

From this construction, it is easy to see by induction on n that (1) each of the 2n bit combinations appears once and only once in the list, (2) only one bit changes in going from one list entry to the next, and (3) only one bit changes when cycling around from the last entry to the first. Gray codes having this last property are called “cyclic,” and the reflected binary Gray code is necessarily cyclic.
If n > 2, there are non-cyclic codes that take on all 2n values once and only once. One such code is 000 001 011 010 110 100 101 111.

Name: Anonymous 2020-02-16 9:39

My books are in storage.

Name: Anonymous 2020-02-17 14:11

Teach urselv greek in 24 houres

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List