当前位置:网站首页>The realization of online Fox game server room configuration battle engagement customization function
The realization of online Fox game server room configuration battle engagement customization function
2022-06-11 06:39:00 【RemoteDev】
Final effect :

1. Create dialog resources and modify ID by IDD_PERSONAL_RULE, Then design the effect as shown in the figure below
2. Add dialog resource processing class DlgPersonalRule

3. Declare structure variable and control data interaction function and rule structure operation function
// Configuration structure
struct tagPersonalRule
{
byte cbSpecialRule; // Are there any special rules
tagPersonalGeneralRule personalRule[PERSONAL_OPTION_COUNT]; // Configuration parameters
int nCellScore[CELLSCORE_COUNT]; // Initial integral
tagPersonalRule()
{
memset(nCellScore, 0, sizeof(nCellScore));
}
};
4. Initialization class
边栏推荐
- Examinelistactivity of Shandong University project training
- Exchange two values without introducing the third variable
- ERROR 1215 (HY000): Cannot add foreign key constraint
- 解决ffmpeg获取AAC音频文件duration不准
- JVM from getting started to giving up 2: garbage collection
- 021 mongodb database from getting started to giving up
- Fix the problem that the right mouse button does not have a vscode shortcut
- Jenkins voucher management
- LeetCodeT526
- Mediaextractor source code analysis of multimedia framework analysis (1)
猜你喜欢
![Illustration of JS implementation from insertion sort to binary insertion sort [with source code]](/img/e5/1956af15712ac3e89302d7dd73f403.jpg)
Illustration of JS implementation from insertion sort to binary insertion sort [with source code]

PHP laravel8 send email

Convert multiple pictures into one NPY file storage

jenkins-用户权限管理

On cursor in MySQL

Eureka cluster setup

C language war "minesweeping"

UEFI finding PCI devices
![[]==! []](/img/65/ab724c74b080da319ed5c01c93fdb7.png)
[]==! []

Sohu employees encounter wage subsidy fraud. What is the difference between black property and gray property and how to trace the source?
随机推荐
争议很大的问题
The nearest common ancestor of 235 binary search tree
572. subtree of another tree
UEFI finding PCI devices
538.把二叉搜索树转换成累加树
Detailed installation instructions for MySQL
Warning: Each child in a list should have a unique “key“ prop.
Handwriting promise [02] - asynchronous logic implementation
Resolve typeerror: ctx injections. tableRoot.$ scopedSlots[ctx.props.column.slot] is not a function
通过两种方式手写一个消息队列
Throttling and anti shake
Illustration of JS implementation from insertion sort to binary insertion sort [with source code]
学好C语言从关键字开始
Analyze the principle of configuration center from the perspective of Nacos client
Metasploitabile2 target learning
Examinelistactivity of Shandong University project training
Verilog realizes binocular camera image data acquisition and Modelsim simulation, and finally matlab performs image display
617. 合并二叉树
Learn C language well from keywords
Jenkins user rights management