Question about Borland Turbo C++ Suite 1.0 (TCB0000WWFS180) for PC

1 Answer

How can I use Pointer in C++?

I have problem with using pointer in C++, Can anyone know How can I use it?

Posted by on

1 Answer

  • Level 1:

    An expert who has achieved level 1.

  • Contributor
  • 1 Answer

There is a very in depth discussion on how to use pointers located here

Posted on Mar 30, 2014

1 Suggested Answer

  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:


About Laserpointer

Green laser pointers are fully legal for laser pointer use in most countries and at just below the maximum allowable legal power limit of 5mw for a pointer in most countries. We ensure that every high power green laser pointer is hand calibrated and tested to output at least 4.99mw and thus offers the expected stunning power expected of a real constant wave green (532nm) laser pointer, much brighter to look at than a regular red laser pointer and always with a visible green beam.
This high power green laser pointer will impress your coworkers, family and friends. Use it for your next presentation and everybody will know that you are ahead of the latest technology.

This high power green laser pointer features a top precision all-metal body. Don't be fooled, some green laser pointers have a plastic body that is metalized. Our all-metal body green laser pointer is therefore robust and durable.


Our high power green laser pointer features an all-glass lens that focuses the beam to a sharper, rounder, clearer dot.


Powered by a Sony diode with a lifetime of 3000-5000 hours, it projects a high power green dot up to an incredible 2 miles away. And it so powerful that the beam itself can be seen for several hundred feet in darkness. That's why astronomers use it to point out constellations and stars in the night sky, the US Army uses it for training exercises, and executives at all levels use it to enhance their prestige. It's a very important tool if you get lost while hiking.

on Feb 02, 2015 | Hama Laserpointer Lp-8 4In1


Safety first when using a laser pointer

Although a laser pointer may not look it, they can be very dangerous. While they can be a very effective tool for drawing your audience's attention to things in your presentations, using them for other purposes can cause a lot of damage. Following a few simple safety tips will ensure that no one will get hurt while you're presenting.

- Never point your laser pointer at an other person, especially not the face. Just because a laser pointer may not be dangerous when pointed at the skin of another person it is still a good practice to never use it to point at people.

- Never look directly into the laser beam, even if you are sure that the strength of the laser is not high. Even a low powered beam can cause some damage to the eyes. Eye damage can be permanent so it shouldn't be treated lightly.

- Check for reflective surfaces before you present with a laser pointer. If the beam is reflected off an other surface such as a mirror or glass can be just as dangerous as pointing it directly into some one's eyes.

- There is something about a laser pointer that makes people act like children. I have been in many college lectures where a lecturer will use a laser pointer to make emphasis in class and students will ask to play with the pointer. Under no circumstance should you allow someone else to use your laser pointer, especially in a classroom full of people.

If you feel uneasy about using a laser pointer in your presentation you might want to look into using your computer mouse as a laser pointer. Microsoft powerpoint has a feature that will allow you to use the mouse pointer as a laser pointer on the screen. That by far will be the safest laser pointer.

on Jan 29, 2014 | Office Equipment & Supplies

1 Answer

A circle with a line going through it takes the place of my cursor on my computer?

Firstly, go to

Control Panel
Find Mouse
Click Pointers along the top

Ensure that your default pointer is the normal mouse, like so:


If not, press "Use Default" and it should reset the mouse pointer to normal.

If it looks like the mouse pointer is supposed to be normal in this screen, let me know and we'll see if there's something else wrong.

Dec 23, 2012 | Computers & Internet

1 Answer

While charging my laptop , mouse pointer cant work and while it is running on batteries mouse pointer works


remove the battery from your notebook -- use the Ac adapter only

will the mouse pointer work ? are you using an attched wirelss mouse or the palmrest pointer ?

let me know what OS you use -- and if its mouse you use, what model ?

look forward to helping you resolve the issue !

Nov 03, 2010 | Dell Inspiron 1525 Notebook

1 Answer

My cordless optical mouse is slow dragging across the screen. When first used it is fine but then slows down. Ideas anyone?

Try this...

Go to Control Panel > Mouse > Pointer Option

There you can increase the pointer speed/motion.

I hope this helps. If not please inform me. I will see what else I could do.

Jan 30, 2010 | Logitech 9313960403 Mouse

1 Answer

How to write a record with pointer variables in a file in c++

if understand your question correctly , you don not work the pointer value but the contents the pointer is referring to.

Hope that makes sense

char* pointer = "some message";

pointer = 0x04556 *pointer = "s";


Apr 13, 2009 | Intel Computers & Internet

4 Answers

Keyspan remote control (mouse) Model TSAM - 004

Press and hold the two buttons (small pink and clear pie shaped) for 4 seconds. the lower button will flash red once every three seconds to show laser pointer enabled. Laser pointer turns itself off after 10 minutes on non-use.

Jan 13, 2009 | Keyspan Presentation Remote Control

1 Answer

Laptop mouse

Go to Start --> Control Panel --> Mouse.
Click on the Pointer Options tab and adjust the slider for the pointer speed.


Nov 16, 2007 | HP Compaq Presario V2000 Notebook

1 Answer

Fuzy pointer

HI NIXnerd, If your getting a crosshatched or disrupted box around the pointer then it sounds very much like the pointer accelerator is on it's way out. The pointer is displayed by a sub-unit of the GPU, you can think of this as a mini graphics chip built in to the GPU that is there for the sole purpose of displaying the pointer. Sounds like you know what you're doing re: configuring X so try turning off pointer acceleration and see if it makes a difference, sadly if the pointer accelerator is indeed on it's way out then the rest of the GPU will not be far behind so turning off acceleration should be thought of as a temporary solution. As ever, if you have any questions or need more in-depth help post back.

Aug 23, 2007 | XFX GeForce Fx5700 (128 MB) Graphic Card

Not finding what you are looking for?

Open Questions:

0 Answers

how to write c/ c++ sourcecode for Merkle-Hellman Knapsack Public Key Cryptosystem ??? In this problem you will implement the Merkle-Hellman Knapsack cryptosystem. The encryption and decryption algorithms are based on solving a knapsack problem. The knapsack problem consists of finding a way to select some of the items to be packed such that their sum (the amount of space they take up) exactly equals the knapsack capacity (the target). Formally the knapsack problem is as follows: Given a set S = {a1, a2, ..., an} and a target sum T, where each ai >= 0, is there a selection vector V={v1,v2,...,vn} each of whose elements is 0 or 1, such that (ai*vi) = T. The idea behind Merkle-Hellman scheme is to encode a binary message as a solution to a knapsack problem reducing the cipher text to the target sum obtained by adding terms corresponding to 1s in the plaintext. That is, blocks of plain text are converted to knapsack sums by adding into the sum the terms that match with 1bits in the plaintext as shown below: Plaintext: 1 0 1 0 0 1 Knapsack: 1 2 5 9 20 43 Cipher text: 49 Plaintext: 0 1 1 0 1 0 Knapsack: 1 2 5 9 20 43 Cipher text: 27 The receiver will have to use the cipher text (the target sum) to recover the plaintext. A knapsack problem is said to be ``easy'' if {missing}. The solution for the easy knapsack problem is straightforward, and can be achieved in O(n).Furthermore, there exists a way for transforming an easy knapsack set S into a non-easy knapsack H simply by multiplying the elements of S by w mod n where w and n are well chosen integers. Formally the terms of H are: hi = (w*si) mod n. For example if S = {1, 2, 4, 9}, w = 15, and n = 17 then H = {15, 13, 9, 6}. Encryption algorithm (executed by the sender) H is called the public key and is made public by the receiver Choose w and 1. n such that n > max(S) and n is prime, and w < n. Construct H from S, w, and n. Sender uses H to encipher blocks of m bits P0 = [p1,], P1 = [pm+1, pm+2...p2m] and so forth (m is the number of terms in H), as follows: Ti = Pi*H = (pj*hj). Thus T0 = P0*H, T1 = P1*H and so on. Ti are then transmitted to the receiver via a reliable channel. 1. Decryption algorithm (executed by the receiver) The tuple (S, n, w) is called the private key and is kept secret by the receiver Use w and n to compute w-1 where w-1*w = 1 mod n. if n is prime then w-1 = w (n-2) mod n 2. Compute Ai = w-1*Ti mod n 3. Find Pi by solving Ai = Pi*S Input file The input consists of N test cases. The number of them (N) is given on the first line of the input file. Each test case begins with a line containing a plaintext to be encrypted. The second line contains the number of elements (m) in the knapsack S that show in the third line. The knapsack elements are positive integers separated by space. The fourth line of each text case contains n and w in this order separated by space. Output file Print exactly 3 lines for each test case. The first line should contain the encrypted values of the plaintext of the set separated by space. The second line should contain the plaintext obtained by applying the decryption algorithm to the plaintext, preceded by `Recovered plain text: '. The third line should contain the value of w-1 Sample Input 2 Salaam! 4 1 2 4 9 17 15 hello there? 4 1 2 4 9 19 7 Sample Output 29 25 22 16 22 28 22 16 22 16 22 44 9 16 0 24 Recovered plain text: Salaam! 8 23 7 23 20 23 21 23 21 23 36 9 0 29 14 23 7 23 20 29 9 23 20 15 36 0 16 Recovered plain text: hello there? 11

Feb 24, 2009 | Borland Turbo C++ Suite 1.0...

Borland Turbo C++ Suite 1.0 (TCB0000WWFS180) for PC Logo

Related Topics:

164 people viewed this question

Ask a Question

Usually answered in minutes!

Top Borland Computers & Internet Experts


Level 3 Expert

2600 Answers

Yoav Shilon
Yoav Shilon

Level 2 Expert

104 Answers


Level 3 Expert

7993 Answers

Are you a Borland Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides