YTU 1076: SPY
1076: SPY
时间限制: 1 Sec 内存限制: 128 MB
提交: 6 解决: 6
题目描述
The National Intelligence Council of X Nation receives a piece of credible information that Nation Y will send spies to steal
Nation X’s confidential paper. So the commander of The National Intelligence Council take measures immediately,
he will investigate people who will come into NationX. At the same time, there are two List in the Commander’s hand, one is full of spies that Nation Y will send to Nation X, and the other one is full of spies that Nation X has sent to Nation Y before.
There may be some overlaps of the two list. Because the spy may act two roles at the same time, which means that he may be the one that is sent from Nation X to Nation Y, we just call this type a “dual-spy”. So Nation Y may send “dual_spy” back to Nation X,
and it is obvious now that it is good for Nation X, because “dual_spy” may bring back NationY’s confidential paper without worrying to be detention by NationY’s frontier So the commander decides to seize those that are sent by NationY,
and let the ordinary people and the “dual_spy” in at the same time .So can you decide a list that should be caught by the Commander?
A:the list contains that will come to the NationX’s frontier.
B:the list contains spies that will be sent by Nation Y.
C:the list contains spies that were sent to NationY before.
输入
There are several test cases.
Each test case contains four parts, the first part contains 3 positive integers A, B, C, and A is the number which will come into the frontier. B is the number that will be sent by Nation Y, and C is the number that
NationX has sent to NationY before.
The second part contains A strings, the name list of that will come into the frontier.
The second part contains B strings, the name list of that are sent by NationY.
The second part contains C strings, the name list of the “dual_spy”.
There will be a blank line after each test case.
There won’t be any repetitive names in a single list, if repetitive names appear in two lists, they mean the same people.
输出
Output the list that the commander should caught (in the appearance order of the lists B).if no one should be caught, then , you should output “No enemy spy”.
样例输入
8 4 3
Zhao Qian Sun Li Zhou Wu Zheng Wang
Zhao Qian Sun Li
Zhao Zhou Zheng
2 2 2
Zhao Qian
Zhao Qian
Zhao Qian
Qian Sun Li
样例输出
Qian Sun Li
No enemy spy
你 离 开 了 , 我 的 世 界 里 只 剩 下 雨 。 。 。
#include <iostream>
#include <cstring>
using namespace std;
string a[1005],b[1005],c[1005];
string s[1005];
int flag[1005],temp[1005];
int main()
{
int n,m,t;
while(cin>>n>>m>>t)
{
for(int i=0; i<n; i++)cin>>a[i];
memset(flag,0,sizeof(flag));
memset(temp,0,sizeof(temp));
for(int j=0; j<m; j++)
{
cin>>b[j];
for(int i=0; i<n; i++)
{
if(b[j]==a[i])
{
flag[j]=1;
break;
}
}
}
for(int k=0; k<t; k++)
{
cin>>c[k];
for(int j=0; j<m; j++)
{
if(c[k]==b[j])
{
temp[j]=1;
break;
}
}
}
int ans=0;
for(int j=0; j<m; j++)
if(flag[j]&&!temp[j])
s[ans++]=b[j];
if(!ans)cout<<"No enemy spy"<<endl;
else
{
for(int j=0; j<ans-1; j++)
cout<<s[j]<<" ";
cout<<s[ans-1]<<endl;
}
}
return 0;
}
#include <cstring>
using namespace std;
string a[1005],b[1005],c[1005];
string s[1005];
int flag[1005],temp[1005];
int main()
{
int n,m,t;
while(cin>>n>>m>>t)
{
for(int i=0; i<n; i++)cin>>a[i];
memset(flag,0,sizeof(flag));
memset(temp,0,sizeof(temp));
for(int j=0; j<m; j++)
{
cin>>b[j];
for(int i=0; i<n; i++)
{
if(b[j]==a[i])
{
flag[j]=1;
break;
}
}
}
for(int k=0; k<t; k++)
{
cin>>c[k];
for(int j=0; j<m; j++)
{
if(c[k]==b[j])
{
temp[j]=1;
break;
}
}
}
int ans=0;
for(int j=0; j<m; j++)
if(flag[j]&&!temp[j])
s[ans++]=b[j];
if(!ans)cout<<"No enemy spy"<<endl;
else
{
for(int j=0; j<ans-1; j++)
cout<<s[j]<<" ";
cout<<s[ans-1]<<endl;
}
}
return 0;
}
YTU 1076: SPY的更多相关文章
- UVA - 1025 A Spy in the Metro[DP DAG]
UVA - 1025 A Spy in the Metro Secret agent Maria was sent to Algorithms City to carry out an especia ...
- ytu 1057: 输入两个整数,求他们相除的余数(带参的宏 + 模板函数 练习)
1057: 输入两个整数,求他们相除的余数 Time Limit: 1 Sec Memory Limit: 128 MBSubmit: 177 Solved: 136[Submit][Status ...
- Manthan, Codefest 16 -C. Spy Syndrome 2
time limit per test 2 seconds memory limit per test 256 megabytes input standard input output standa ...
- 用PowerMock spy mock private方法
在实际的工作中,经常碰到只需要mock一个类的一部分方法,这时候可以用spy来实现. 被测类: public class EmployeeService { public boolean exist( ...
- Jasmine测试ng Promises - Provide and Spy
jasmine提供了很多些很实用的处理Promises的方法,首先我们来考虑下面的这个例子: angular.module("myApp.store").controller(&q ...
- UVa 1025 A Spy in the Metro(动态规划)
传送门 Description Secret agent Maria was sent to Algorithms City to carry out an especially dangerous ...
- ytu 1058: 三角形面积(带参的宏 练习)
1058: 三角形面积 Time Limit: 1 Sec Memory Limit: 128 MBSubmit: 190 Solved: 128[Submit][Status][Web Boar ...
- UVA1025---A Spy in the Metro(DP)
http://acm.hust.edu.cn/vjudge/problem/viewProblem.action?id=35913 Secret agent Maria was sent to Alg ...
- ytu 1980:小鼠迷宫问题(DFS 深度优先搜索)
小鼠迷宫问题 Time Limit: 2 Sec Memory Limit: 64 MB Submit: 1 Solved: 1 [Submit][Status][Web Board] Desc ...
随机推荐
- mybatis动态sql foreach的用法
<select id="findUserByIds" parameterType="com.pojo.QueryVo" resultType=" ...
- LR手动关联参数化问题总结
所谓的关联就是把脚本中某些写死的代码(hard-coded)数据,转变成截取自服务器所送的.动态的.每次都不一样的数据. 一般情况下,比较聪明的服务器在每个浏览器第一次跟它要数据时,都会在数据中夹带一 ...
- nmon分析与详解
1.命令安装 1.查看liunx版本版本x86_64_14i 目录:cd /nmon/logs/ 版本x86_64_14i [root@localhost u06]# cd / [root@local ...
- C#静态构造函数和非静态构造函数
// 使用静态构造函数时,需要注意几点 //1. 一个类中,最多只能有一个静态构造函数,不允许静态构造函数的重载: //2. 不能加任何访问修饰符(public/private/internale等) ...
- Java并发编程:自己动手写一把可重入锁
关于线程安全的例子,我前面的文章Java并发编程:线程安全和ThreadLocal里面提到了,简而言之就是多个线程在同时访问或修改公共资源的时候,由于不同线程抢占公共资源而导致的结果不确定性,就是在并 ...
- Netty 4.0 新的特性及需要注意的地方
Netty 4.0 新的特性及需要注意的地方 这篇文章和你一起过下Netty的主发行版本的一些显著的改变和新特性,让你在把你的应用程序转换到新版本的时候有个概念. 项目结构改变 Netty的包名从or ...
- Educational Codeforces Round 37 (Rated for Div. 2) G
G. List Of Integers time limit per test 5 seconds memory limit per test 256 megabytes input standard ...
- [HDU4607]Park Visit(树上最长链)
HDU#4607. Park Visit 题目描述 Claire and her little friend, ykwd, are travelling in Shevchenko's Park! T ...
- Python---django轻量级框架
Python的WEB框架有Django.Tornado.Flask 等多种,Django相较与其他WEB框架其优势为:大而全,框架本身集成了ORM.模型绑定.模板引擎.缓存.Session等诸多功能. ...
- Java中long(Long)与int(Integer)之间的转换(转)
一.将long型转化为int型,这里的long型是基础类型: long a = 10; int b = (int)a; 二.将Long型转换为int型,这里的Long型是包装类型: Long a = ...