YTU 1076: SPY
1076: SPY
时间限制: 1 Sec 内存限制: 128 MB
提交: 6 解决: 6
题目描述
The National Intelligence Council of X Nation receives a piece of credible information that Nation Y will send spies to steal
Nation X’s confidential paper. So the commander of The National Intelligence Council take measures immediately,
he will investigate people who will come into NationX. At the same time, there are two List in the Commander’s hand, one is full of spies that Nation Y will send to Nation X, and the other one is full of spies that Nation X has sent to Nation Y before.
There may be some overlaps of the two list. Because the spy may act two roles at the same time, which means that he may be the one that is sent from Nation X to Nation Y, we just call this type a “dual-spy”. So Nation Y may send “dual_spy” back to Nation X,
and it is obvious now that it is good for Nation X, because “dual_spy” may bring back NationY’s confidential paper without worrying to be detention by NationY’s frontier So the commander decides to seize those that are sent by NationY,
and let the ordinary people and the “dual_spy” in at the same time .So can you decide a list that should be caught by the Commander?
A:the list contains that will come to the NationX’s frontier.
B:the list contains spies that will be sent by Nation Y.
C:the list contains spies that were sent to NationY before.
输入
There are several test cases.
Each test case contains four parts, the first part contains 3 positive integers A, B, C, and A is the number which will come into the frontier. B is the number that will be sent by Nation Y, and C is the number that
NationX has sent to NationY before.
The second part contains A strings, the name list of that will come into the frontier.
The second part contains B strings, the name list of that are sent by NationY.
The second part contains C strings, the name list of the “dual_spy”.
There will be a blank line after each test case.
There won’t be any repetitive names in a single list, if repetitive names appear in two lists, they mean the same people.
输出
Output the list that the commander should caught (in the appearance order of the lists B).if no one should be caught, then , you should output “No enemy spy”.
样例输入
8 4 3
Zhao Qian Sun Li Zhou Wu Zheng Wang
Zhao Qian Sun Li
Zhao Zhou Zheng
2 2 2
Zhao Qian
Zhao Qian
Zhao Qian
Qian Sun Li
样例输出
Qian Sun Li
No enemy spy
你 离 开 了 , 我 的 世 界 里 只 剩 下 雨 。 。 。
#include <iostream>
#include <cstring>
using namespace std;
string a[1005],b[1005],c[1005];
string s[1005];
int flag[1005],temp[1005];
int main()
{
int n,m,t;
while(cin>>n>>m>>t)
{
for(int i=0; i<n; i++)cin>>a[i];
memset(flag,0,sizeof(flag));
memset(temp,0,sizeof(temp));
for(int j=0; j<m; j++)
{
cin>>b[j];
for(int i=0; i<n; i++)
{
if(b[j]==a[i])
{
flag[j]=1;
break;
}
}
}
for(int k=0; k<t; k++)
{
cin>>c[k];
for(int j=0; j<m; j++)
{
if(c[k]==b[j])
{
temp[j]=1;
break;
}
}
}
int ans=0;
for(int j=0; j<m; j++)
if(flag[j]&&!temp[j])
s[ans++]=b[j];
if(!ans)cout<<"No enemy spy"<<endl;
else
{
for(int j=0; j<ans-1; j++)
cout<<s[j]<<" ";
cout<<s[ans-1]<<endl;
}
}
return 0;
}
#include <cstring>
using namespace std;
string a[1005],b[1005],c[1005];
string s[1005];
int flag[1005],temp[1005];
int main()
{
int n,m,t;
while(cin>>n>>m>>t)
{
for(int i=0; i<n; i++)cin>>a[i];
memset(flag,0,sizeof(flag));
memset(temp,0,sizeof(temp));
for(int j=0; j<m; j++)
{
cin>>b[j];
for(int i=0; i<n; i++)
{
if(b[j]==a[i])
{
flag[j]=1;
break;
}
}
}
for(int k=0; k<t; k++)
{
cin>>c[k];
for(int j=0; j<m; j++)
{
if(c[k]==b[j])
{
temp[j]=1;
break;
}
}
}
int ans=0;
for(int j=0; j<m; j++)
if(flag[j]&&!temp[j])
s[ans++]=b[j];
if(!ans)cout<<"No enemy spy"<<endl;
else
{
for(int j=0; j<ans-1; j++)
cout<<s[j]<<" ";
cout<<s[ans-1]<<endl;
}
}
return 0;
}
YTU 1076: SPY的更多相关文章
- UVA - 1025 A Spy in the Metro[DP DAG]
UVA - 1025 A Spy in the Metro Secret agent Maria was sent to Algorithms City to carry out an especia ...
- ytu 1057: 输入两个整数,求他们相除的余数(带参的宏 + 模板函数 练习)
1057: 输入两个整数,求他们相除的余数 Time Limit: 1 Sec Memory Limit: 128 MBSubmit: 177 Solved: 136[Submit][Status ...
- Manthan, Codefest 16 -C. Spy Syndrome 2
time limit per test 2 seconds memory limit per test 256 megabytes input standard input output standa ...
- 用PowerMock spy mock private方法
在实际的工作中,经常碰到只需要mock一个类的一部分方法,这时候可以用spy来实现. 被测类: public class EmployeeService { public boolean exist( ...
- Jasmine测试ng Promises - Provide and Spy
jasmine提供了很多些很实用的处理Promises的方法,首先我们来考虑下面的这个例子: angular.module("myApp.store").controller(&q ...
- UVa 1025 A Spy in the Metro(动态规划)
传送门 Description Secret agent Maria was sent to Algorithms City to carry out an especially dangerous ...
- ytu 1058: 三角形面积(带参的宏 练习)
1058: 三角形面积 Time Limit: 1 Sec Memory Limit: 128 MBSubmit: 190 Solved: 128[Submit][Status][Web Boar ...
- UVA1025---A Spy in the Metro(DP)
http://acm.hust.edu.cn/vjudge/problem/viewProblem.action?id=35913 Secret agent Maria was sent to Alg ...
- ytu 1980:小鼠迷宫问题(DFS 深度优先搜索)
小鼠迷宫问题 Time Limit: 2 Sec Memory Limit: 64 MB Submit: 1 Solved: 1 [Submit][Status][Web Board] Desc ...
随机推荐
- zoj 1763 A Simple Question of Chemistry
A Simple Question of Chemistry Time Limit: 2 Seconds Memory Limit: 65536 KB Your chemistry lab ...
- 【HTML/XML 3】XML 简介,来源
导读:在标记语言出现之前,计算机中的数据一直都是以神秘的二进制在进行处理,但是,标记语言的出现,慢慢的改变了这种认识.那么,标记语言都经过了什么样的发展呢?它又有什么用处呢? 一.追根溯源(XML的产 ...
- 《TC训练赛一》题解!
以下题目标题就是此题题目链接,题目内容为了节省篇幅就不粘上去了.整套题的链接:https://acm.bnu.edu.cn/v3/contest_show.php?cid=8679#info 密码:7 ...
- 【二分+尺取】HDU 6119 小小粉丝度度熊
http://acm.hdu.edu.cn/showproblem.php?pid=6119 [思路] 首先通过处理交叉的可以处理成不交叉的 然后二分查找答案 如何判断一个长度是否可行? 双指针O(n ...
- 通过调用C语言的库函数与在C代码中使用内联汇编两种方式来使用同一个系统调用来分析系统调用的工作机制
通过调用C语言的库函数与在C代码中使用内联汇编两种方式来使用同一个系统调用来分析系统调用的工作机制 前言说明 本篇为网易云课堂Linux内核分析课程的第四周作业,我将通过调用C语言的库函数与在C代码中 ...
- php的错误控制运算符
php的错误控制运算符 PHP中提供了一个错误控制运算符“@”. 可以将@放置在一个PHP表达式之前,该表达式可能产生的任何错误信息都被忽略掉: 如果开启了php.ini 中的 track_error ...
- poj1308+HOJ1325,判断是否为树
POJ 应该是判断是否为简单无环连通图,用并查集直接秒杀即可,而HOJ的是有向树,还需判断所有点的入度必需小于2,用一个类似hash[]数组判断一下即可, ////判断树之一:入度<=1:三:点 ...
- THUPC2018看题总结
THUPC2018看题总结 #6387. 「THUPC2018」绿绿与串串 / String 据说是签到题啊. 首先根据题目的意思,我们发现如果能找到那个最后一次选择的对称轴岂不是美滋滋. 自然地,我 ...
- python执行
转载:https://www.cnblogs.com/zflibra/p/4180796.html
- sendEmail实现邮件报警发送
安装wget http://caspian.dotconf.net/menu/Software/SendEmail/sendEmail-v1.56.tar.gz tar -xf sendEmail-v ...