当前位置:网站首页>CSP drawing
CSP drawing
2022-07-04 03:18:00 【< WRM>】
#include<bits/stdc++.h>
using namespace std;
const int N = 1000;
int a[N][N];
int main() {
int n;
scanf("%d", &n);
for (int i = 0; i <= 110; i++) {
for (int j = 0; j <= 110; j++) {
a[i][j] = 0;
}
}
for (int i = 0; i < n; i++) {
int x1, y1, x2, y2;
scanf("%d%d%d%d", &x1, &y1, &x2, &y2);
int minx=min(x1,x2);
int maxx=max(x1,x2);
int miny=min(y1,y2);
int maxy=max(y1,y2);
for (int j = minx+1; j <= maxx; j++) {
for (int k = miny+1; k <= maxy; k++) {
a[j][k] = 1;
}
}
}
int sum=0;
for(int i=0;i<=110;i++) {
for(int j=0;j<=110;j++) {
if(a[i][j]) sum++;
//printf("%d ",a[i][j]);
}
//printf("\n");
}
printf("%d\n",sum);
return 0;
}
边栏推荐
- 1day vulnerability pushback skills practice (3)
- PTA tiantisai l1-079 tiantisai's kindness (20 points) detailed explanation
- MySQL workbench use
- The property of judging odd or even numbers about XOR.
- Experience summary of the 12th Blue Bridge Cup (written for the first time)
- Formulaire day05
- Jenkins configures IP address access
- Tsinghua University product: penalty gradient norm improves generalization of deep learning model
- Dare to climb here, you're not far from prison, reptile reverse actual combat case
- Webhook triggers Jenkins for sonar detection
猜你喜欢

Redis transaction

Monitoring - Prometheus introduction

What are the conditions for the opening of Tiktok live broadcast preview?

There is no need to authorize the automatic dream weaving collection plug-in for dream weaving collection
![[Wu Enda deep learning] beginner learning record 3 (regularization / error reduction)](/img/e9/818bdfeae766dca7d2318b52b4424d.jpg)
[Wu Enda deep learning] beginner learning record 3 (regularization / error reduction)

Practical multifunctional toolbox wechat applet source code / support traffic master

Command Execution Vulnerability - command execution - vulnerability sites - code injection - vulnerability exploitation - joint execution - bypass (spaces, keyword filtering, variable bypass) - two ex

Jenkins continuous integration environment construction V (Jenkins common construction triggers)

Tsinghua University product: penalty gradient norm improves generalization of deep learning model

Teach you how to optimize SQL
随机推荐
The "two-way link" of pushing messages helps app quickly realize two-way communication capability
In my spare time, I like to write some technical blogs and read some useless books. If you want to read more of my original articles, you can follow my personal wechat official account up technology c
Site favorites
POSTECH | option compatible reward reverse reinforcement learning
ZABBIX API batch delete a template of the host
AI 助力藝術設計抄襲檢索新突破!劉芳教授團隊論文被多媒體頂級會議ACM MM錄用
1day vulnerability pushback skills practice (3)
Setting methods, usage methods and common usage scenarios of environment variables in postman
The requests module uses
Dare to climb here, you're not far from prison, reptile reverse actual combat case
Baijia forum the founding of the Eastern Han Dynasty
Webhook triggers Jenkins for sonar detection
what does ctrl + d do?
Ai aide à la recherche de plagiat dans le design artistique! L'équipe du professeur Liu Fang a été embauchée par ACM mm, une conférence multimédia de haut niveau.
Tsinghua University product: penalty gradient norm improves generalization of deep learning model
Contest3145 - the 37th game of 2021 freshman individual training match_ F: Smallest ball
I stepped on a foundation pit today
Base d'apprentissage de la machine: sélection de fonctionnalités avec lasso
Ningde times and BYD have refuted rumors one after another. Why does someone always want to harm domestic brands?
Unity controls the selection of the previous and next characters