answersLogoWhite

0

Miscellaneous

The Miscellaneous category is for a wide variety of questions and answers that we find important, but that have not found a home in one of our specific categories.

14,596 Questions

How do you turn up the volume on a tv?

At the top left hand corner of the iTunes window, near the pause/play buttons, there is a little speaker with a button you can drag to the left or right to increase or decrease the iTunes volume.

How do i get my cam working on stickam?

To use Stickam you need to have the latest version of Flash installed. You then select the Mic and Camera options in the Settings window, The Mac's built in iSight camera is often listed as a USB Class Video.

What is the best site to use to find an old friend?

You could start by trying any old mutual friends that may know or family members or even check the directory of areas they have known to be in. If you want to spend money you could hire a private detective or just a stalk them in facebook events. Also, you could attempt to get their attention back by throwing exclusive poorly attended parties. Good luck!

How do you create a new user account from the Command Prompt?

:

At the command prompt type the following: net user username /add /random /passwordchg:yes. The /random switch will randomly generate a password for the user. The / passwordchg:yes switch will allow the user to change the password.

You can add this new user to a group by using the net localgroup command e.g net localgroup "administrators" username /add

Try the steps as mentioned in:

http://winplat.net/post/Manage-user-accounts-with-NET-USER-command.aspx

What is a good site to go to for picture quotes?

The best quotes you can get are at wordlymusic's site in Twitter...they come with lessons. I just found out today but they are really good. The site just started so there aren't a lot, just one but it makes sense! Hope this helps!

How long do DVD's last?

Yes a DVD can wear out. All materals degrade with time and the plastics and other materials used in DVDs are no exception but it will take a (very) long time and the degradation has very little to do with whether or not the DVD is played many times. Recordable DVD's (and even more so Re-recordable DVDs) have a shorter lifespan than the commercial (pressed from a matrix) disks. The greatest risk to the information stored on a DVD is still mechanical abrasion due to handling the disk.

Owners manuel for a electra lite 9 weed eater?

how to remove the trim line spool ?

Pull straight out away from the body. The line spool is on clips. Reassemble by running line through hole, maintaining tension on the line while you snap the spool into place.

Different types of protocol?

Different types of networking operating systems uses different digital languages to control the communication process between the computers. These languages is called Network protocols.

Definition : A protocol is a set of rules to govern the data transfer between the devices. The rules are used for the following purposes.

1. For compressing the data.

2. For sending device to indicate that it has finished sending a message.

3. For receiving device to indicate that it has received a message.

Types of Protocols :

There are different types of Protocol such as:

1. Transmission control Protocol (TCP)

2. Internet Protocol (IP)

3. Internet Address Protocol (IP Address)

4. Post office Protocol (POP)

5. Simple mail transport Protocol (SMTP)

6. File Transfer Protocol (FTP)

7. Hyper Text Transfer Protocol (HTTP)

8. Ethernet

9. Telnet

10. Gopher

1. Transmission control Protocol (TCP)

This is a communication protocol that computers uses to communicate over a network. TCP divides message into stream of packets which are sent and then reassembled at the destination.

2. Internet Protocol (IP)

Internet protocol is addressing protocol. It is always used together with TCP. IP addresses of packet, routes them through different nodes and networks until it reaches its final destination. TCP/IP is perhaps the most used standard protocol for connecting computer networks.

3. Internet Address Protocol (IP Address)

This is the address that identifies a computer on a network using TCP/IP. An IP address contains series of four numbers unique to the computer concerned Eg : 90.399.424.34. This address is usually supplied by a Internet Service Provider.

4. Post office Protocol (POP)

This is used to receive incoming E-mail .

5. Simple mail transport Protocol (SMTP)

This protocol is used for sending and distributing outgoing E-Mail .

6. File Transfer Protocol (FTP)

This is a system that allows users to transfer files from one computer to another computer. Files that can be transfered may include program files, text files and multimedia files ect. This method of file transfer is faster than that using HTTP.

7. Hyper Text Transfer Protocol (HTTP)

HTTP is used to transfer a hyper text between two or more computers. Hyper text is the text that is coded using the language called HTML. HTML codes are used to create links. This link may be in any format such as text or graphics.

HTTP is based on the Client/server principles. HTTP allows a client to establish connection with a server and make a request. The server accepts the connection initiated by the client and send back the response. An HTTP request identifies the resources that the client is interested it and tells the server what action to take on the resource.

8. Ethernet

Ethernet is a most popular protocol used for LAN communication. It transfer the information in digital packets. Every computer that uses this protocol contains the Ethernet Network Interface Card (NIC).

This card is an unique address code embedded in microchip. This address is used to identify the system. When a packet is placed on a network, The packet is sent to every computer on the networks but only the computer which has the same address as Network Interface Card address is allowed to claim that packet and receive the digital information contained with it.

Only one packet is placed at a time in the network. If two systems placed packets on the network on same time. When NIC tries to place a packet it first looks whether a packet already exit or not. If it exits the NIC is forced to wait for a random milliseconds before trying again. This continues until a 'gap' is found then the packet can be successfully transmitted on to a network.

9. Telnet

Telnet is a set of rules used to connect one computer to another computer. The process of this connection is called as remote login. The computer who request connection is called local computer, who accept the connection is called remote computer. If you type commands in local computer remote login these commands executed in the remote computer. You can see in your monitor what is the process going on in this remote computer.

Telnet also operates on the client/server principle. The establishment of connection and display data on the local computer uses a Telnet server program to accept the connection and send responses to requests for information back to the local computer.

10. Gopher

Gopher is a sot of rules used to search, retrieve and display documents from remote sites. It is possible to initiate on-line connections with other systems through Goper. It also operates on client/server principal

.

Did you like this resource? Share it with your friends and show your love!

inShare

What is the price of a gallon of milk in 1992?

On average the cost of one gallon of milk in 1998 cost about $1.31 to $3.85.

How can you get your forgotten password?

Usually the site you are trying to get into offers a 'did you forget your password' link. If they do not, you can call to their customer service. If they do not have a customer service, then -alas- you must only rely on your own memory or notes.

What are digital footprints useful for?

A digital footprint is the data trace or trail left by someone's activity in a digital environment. Digital footprints are the capture, in an electronic fashion, of memories and moments and are built from the interaction with TV, mobile phone, World Wide Web, Internet, mobile web and other digital devices and sensors. Digital footprints are invisible but provide data on what you have done, where the person has been, how long they stayed, both via the web and by location, how often, the route or routine and increasingly who with, your social crowd. Digital footprints are extremely valuable as they provide the building block for behavioral targeting, personalisation, targeted marketing digital reputation and other social media or social graph services both Web and mobile.

What do you call a computerphile who use her expertise for illicit access?

A hacker is a computerphile who uses his expertise for illicit access.

What are the importance of quality control?

The main objective of quality assurance is to avoid problems or to identify them as soon as possible. Quality assurance is important because it is cheaper for a company to correct problems earlier in the development process than to correct them later on.

What is e-registration?

E-registration processes or forms make registering for a newsletter, college, school, university, or agency easy and simple to do from a computer, laptop, or another type of electronic device that has online internet access.

Is there a manual for brinks home security box 5062D?

Yes there is but if you have lost it here are the instructions. :O)

How to reset code on your brinks home security safe Model 5062D

1. Open safe with your key.

2. Press red reset button once on back of the door.

3. Enter new code then #.

4. Enter new code then #.

5. You should get a “Good” statement in the readout.

If you don’t the circuit board has gone bad.

6. To open safe, enter code then # and the safe opens.

If you have a problem and the safe goes into lock out mode, you have to wait at least 30 minutes before trying again.

For customer service call 1-800-223-8566 press option 5 and wait for a representative.

How long has MSN been around for?

14 years

MSN, formerly The Microsoft Network, is a collection of Internet sites and services provided by Microsoft. The Microsoft Network debuted as an online service and Internet service provider on August 24, 1995, to coincide with the release of the Windows 95 operating system.[1] The range of services offered by MSN has changed since its initial release in 1995. MSN was once a simple online service for Windows 95, an early experiment at interactive multimedia content on the Internet, and one of the most popular dial-up Internet service providers. Microsoft used the MSN brand name to promote numerous popular web-based services in the late 1990s, most notably Hotmail and Messenger, before reorganizing many of them in 2005 and 2006 under another brand name, Windows Live. MSN's Internet portal, MSN.com, still offers a wealth of content and is currently the 6th most visited domain name on the Internet.[2

Name of MCA enterence exam?

There are many enterence exam for MCA. Almost all universities organize enterence test for MCA admissions like UP technical university organise enterence exam and like MAT, CAT etc.........

What happens when you answer a question?

If I answer this question, I will be giving it an answer. I would also be taking up about a minute of my time. It is very possible this question won't remain for long, since the supervisors or community assistants might decide that this question belongs in the Adds No Value Catch-all.

You should be able to see what happens when I answer this.

What is core in cable?

The center conductor. It is usually made of copper or aluminum. Some high end cables use precious metals.

What would cause a TV to turn off or on by just walking past it?

Your set is developing some type of problem which acts up intermittently. What's happening is the computer chip in the TV is sensing the different circuits in the TV and when something's not right, it shuts the set down to protect itself. It's called a `self protection circuit'.

How do you make a youtube account without your parents knowing?

ok first do you have an email?

second if you do use that and then just delete the email

Third if you don't your shoot out of luck ask your parents

How do you get into my voicemail?

You shouldn't. Everyone has the right to have some privacy. Ignoring that privacy could cause serious damage to your relationship. You abviously don't trust him, so work out why that is and talk to him about it. Being paranoid and snooping around in his stuff will get you nowhere. It might confirm your fears, it might not. But if he finds out what you've been doing, it could have serious effects. If you are worried about something, if you think he's cheating or something, talk to him about it. If you still think he's lying, you should examine your relationship. Without trust you have nothing, so if you don't believe him (and maybe you're right not to) maybe you should take a break for a while. If he is doing something wrong, you did the right thing by taking a break. But if he really isn't and you still don't trust him, you should look to yourself. Why don't you trust him? It might have more to do with you than him. If he feels you don't trust him when you really should, he'll lose his faith in you as well.

so don't be hasty or do something you might regret. Take the time to think about everything and find a more suitable solution

How many 20oz equals Gallon?

If you had 6.4 bottles of 20oz that would equal a gallon. There is 128 oz in a gallon, 128 divided by 20 = 6.4 If you had 6.4 bottles of 20oz that would equal a gallon. There is 128 oz in a gallon, 128 divided by 20 = 6.4

1.5 GB equals to how much?

1 GB = 1024 MB

1 MB = 1024 KB

1 KB = 1024 B

Therefore,

1,5 GB = 1536 MB = 1 572 864 KB = 1 610 612 736 B