当前位置:网站首页>L1-025 positive integer a+b (15 points)
L1-025 positive integer a+b (15 points)
2022-07-04 07:29:00 【Inter personal liabilities^】
L1-025 Positive integer A+B (15 branch )
The goal of the question is very simple , It's two positive integers A
and B
And , among A
and B
It's all in the range [1,1000]. A little bit of a hassle , The input is not guaranteed to be two positive integers .
Input format :
Type in on a line to give A
and B
, They are separated by spaces . The problem is A
and B
It doesn't have to be a positive integer , Sometimes it can be out of range numbers 、 negative 、 A real number with a decimal point 、 It's even a mess of code .
Be careful : Let's put... In the input 1 A space is taken as A
and B
Separation of . Make sure that there is at least one space for the question , also B
It's not an empty string .
Output format :
If the input is really two positive integers , According to the format A + B = and
Output . If an input is not satisfactory , Output at corresponding position ?
, Obviously at this time and also ?
.
sample input 1:
123 456
sample output 1:
123 + 456 = 579
sample input 2:
22. 18
sample output 2:
? + 18 = ?
sample input 3:
-100 blabla bla...33
sample output 3:
? + ? = ?
test 3: Similar to the third example , There may be more than two data entered , When the input data exceeds two data , You should directly output the results that are all question marks
test 5: The upper limit of the number is 1000, There are requirements for the topic , But when typing , I didn't input as required, so I need to judge
test 6: The lower limit of the number is 1, And testing 5 identical
AC Code
#include<iostream>
#include<algorithm>
#include<cstring>
#include<cmath>
#include<vector>
#include<stack>
#include<queue>
#include<sstream>
using namespace std;
typedef long long ll;
const int N=100010;
int main()
{
string a;
getline(cin, a);
bool flaga = false, flagb = false;
int aa = 0, bb = 0;
int flag = 0;
for(int i = 0; i < a.size(); i ++ )
{
if(a[i] == ' ') flag = i;
if(flag > 0) break;
}
for(int i = 0; i < flag; i ++ )
{
aa = aa * 10 + (a[i] - '0');
if(a[i] < '0' || a[i] > '9')
{
flaga = true;
break;
}
}
int flag1 = 0;
for(int i = flag + 1; i < a.size(); i ++ )
{
bb = bb * 10 + (a[i] - '0');
if(a[i] < '0' || a[i] > '9')
{
flagb = true;
break;
}
}
if(aa > 1000 || aa < 1) flaga = true;
if(bb > 1000 || bb < 1) flagb = true;
if(flaga) cout << '?' << ' ';
else cout << aa << ' ';
cout << '+' << ' ';
if(flagb) cout << '?' << ' ';
else cout << bb << ' ';
cout << '=' << ' ';
if(flaga || flagb) cout << '?';
else cout << aa + bb;
return 0;
}
边栏推荐
- Experience installing VMware esxi 6.7 under VMware Workstation 16
- How to send mail with Jianmu Ci
- University stage summary
- Vulhub vulnerability recurrence 77_ zabbix
- 2022-021rts: from the second half of the year
- Comparison between applet framework and platform compilation
- Cell reports: Wei Fuwen group of the Institute of zoology, Chinese Academy of Sciences analyzes the function of seasonal changes in the intestinal flora of giant pandas
- 2022-021ARTS:下半年开始
- Tri des fonctions de traitement de texte dans MySQL, recherche rapide préférée
- [FreeRTOS] FreeRTOS learning notes (7) - handwritten FreeRTOS two-way linked list / source code analysis
猜你喜欢
How to share the source code anti disclosure scheme
Implementation of ZABBIX agent active mode
The important role of host reinforcement concept in medical industry
Node connection MySQL access denied for user 'root' @ 'localhost' (using password: yes
Data double write consistency between redis and MySQL
How to send mail with Jianmu Ci
Su Weijie, a member of Qingyuan Association and an assistant professor at the University of Pennsylvania, won the first Siam Youth Award for data science, focusing on privacy data protection, etc
Book list | as the technical support Party of the Winter Olympics, Alibaba cloud's technology is written in these books!
BasicVSR++: Improving Video Super-Resolutionwith Enhanced Propagation and Alignment
Used on windows Bat file startup project
随机推荐
Su Weijie, a member of Qingyuan Association and an assistant professor at the University of Pennsylvania, won the first Siam Youth Award for data science, focusing on privacy data protection, etc
果果带你写链表,小学生看了都说好
Transition technology from IPv4 to IPv6
Review of enterprise security incidents: how can enterprises do a good job in preventing source code leakage?
User login function: simple but difficult
Finishing (III) - Exercise 2
MySQL中的文本處理函數整理,收藏速查
[network security] what is emergency response? What indicators should you pay attention to in emergency response?
tornado之目录
Life planning (flag)
NLP-文献阅读总结
When JDBC connects to es query, is there a God who meets the following situation?
Tri des fonctions de traitement de texte dans MySQL, recherche rapide préférée
Recursive Fusion and Deformable Spatiotemporal Attention for Video Compression Artifact Reduction
Take you to master the formatter of visual studio code
The frost peel off the purple dragon scale, and the xiariba people will talk about database SQL optimization and the principle of indexing (primary / secondary / clustered / non clustered)
[C language] open the door of C
[untitled] notice on holding "2022 traditional fermented food and modern brewing technology"
Zephyr Learning note 2, Scheduling
Basic DOS commands