What is a good typewriter font on Microsoft Word?
There is no "best" font as such. It depends on what you want to do. Some fonts are good for formal things. If you were writing an important letter, you would use something like Times New Roman. Some fonts are good for fun things, like Comic Sans MS, like if you were doing a poster for a sale.
But, to add, choose a font that you think suits you. For example, this font, Tahoma, is kind of small and little, and that's basically the way I am. So, get choosing!
How your reset bios password from dell inspiron 1420?
Depending on the make and model, there is usually somewhere on the motherboard, a jumper which resets the BIOS.
Sometimes it is a jumper plug attached to pins, on others it is two pads on the circuit board, which you short out with a wire or tips of tweezers.
They usually put them where you can get at them without too much dismantling.
A good place to look is under the memory modules.
It may be marked cryptically on the board, as something like 'rst'
It will reset everything back to factory settings, even the clock, but it should then boot up OK and you can then reconfigure it.
How do you fix a runtime error 91?
the run-time error 131 would be caused by reasons as below:
* Corrupted Office applications
* Missing component in the applications
* Damaged component in the applications
* Incorrect system configuration
* Corrupted Windows registry the easily way to fix runtime error 131 is to use a registry cleaner to clean up the windows registry.
What are the common icons found on the computer?
Icons on the desktop, when double clicked, bring you to the certain programs they represent. Each icon is a shortcut to that application which opens whenever it is clicked. For example, if you have an Internet Explorer icon and double click it, you open up the Internet Explorer application.
How do you change your administrator password on Apple?
What is the purpose of this question? There are many ways, all of them illegal if used to hack a computer. (see Computer Misuse Acts around the globe).
The general method is to boot the computer in single user mode, causing it to allow root access, which would allow you to change the password through UNIX command: passwd.
Note: This method will require a significant amount of experience in command-line systems..
It depends on the type of modem. Serial modems must be connected to a PC serial port and configured manualy. Serial modems are rarely ever used now. PCI modems must be installed into a spare PCI slot on the inside of the PC, the modem should auto configure. USB modems should be plugged into a USB port and like PCI modems should auto configure.
There are a few steps you will have to go through to be able to test your memory on your Windows XP computer. You will need to use the DVD booting, then click on repair your computer, after that you will select Windows Memory Diagnostic tool. There you will be able to test your memory.
Why does windows allow you to lock your taskbar?
You can lock the Windows task bar by right clicking on your task bar and clicking "Lock the taskbar." If this does not work, you may have a virus and should try running a virus scan with your antivirus software.
What tool in windows 7 can be used to temporarily disable a startup program?
The msconfig tool.
To do this, type into the start menu msconfig and press enter. Go to the startup tab and uncheck the ones that you don't what to run on windows startup, once you've finished, click ok and reboot windows
How long does a windows vista take to boot up?
There is no average. The amount of time it takes will vary considerably based on the specifications of the computer and the number of applications installed.
What the technique of holding down the left mouse button and moving it over an area of text?
Highlighting the text.
How do you put unregistered hypercam files into windows movie maker?
As long as the Hypercam files are in the correct format for Windows Movie Maker, they can be imported into the program. If the files are not compatible, they will need to be converted before importation.
Windows 7 Starter is only available for a 32-bit system, with the maximum RAM at 2 GB. Windows 7 Ultimate for a 32-bit system has a maximum RAM of 4 GB. Two more gigabytes are required. And if one gigabyte is equal to 1024 megabytes, then two are equal to 2048 MB.
In short, the requirement is 2048 MB to upgrade from Starter to Ultimate.
How and where can i download DELL Inspiron 1464 laptop Drivers and Utilities software?
One can download the updated drivers for a Dell laptop direct from the official Dell website. If you're having any trouble installing, it would be recommended to consult a computer technician.
Why does your computer shutdown?
You do not have to but it helps your computer so it isn't overused because computers don't last forever and if it is not off it is being used so it will not last as long. Also if your computer is on it uses energy so turning it off will save you money. Even by turning your computer off it is not truly off if you take out the cord to the outlet then it will be.
How do you transfer windows xp outlook express email to Windows Vista?
Download and install the free trial version of Outlook 2007 for Vista on your new Vista computer. Export the outlook files on your old computer in .pst files. Import these .pst files into Outlook 2007 on your new computer. Open Windows mail and import your mails and contacts from Outlook 2007. Remove the trial version of Outlook 2007 from your new computer.
You want to change color of taskbar in windows xp?
Here are step by step instructions on how to change your task bar color in Windows XP: # Right click on your desktop. # Click on "Properties". # In the window that pops up, go to the "Appearance" tab. # Using the "Color scheme" box, select the color scheme of your choice. A preview is displayed above. # When you find a color scheme you like, click "OK".
How do you override adminstrator password on vista?
If you lost windows password, you can go into safe mode (F8 when booting up) to recover windows password while you forgot user account password,but if you forgot administrator password,there is no way to change administrator password while you forgot it,you must use software to recover administrator password.my favorite is Windows Password Recovery 9.0.
What is another name for a blue screen error?
1 Which of the following is a public IP address?
192.168.200.14
2 Which of the following refers to a device that is logically addressed on an IP network?
Host
3 Which of the following are Network Devices?
HUB
Bridge
Router
Switch
4 Which physical network topology is the LEAST fault tolerant? (Choose all that apply)
The ring topology
The bus topology
5 A client on a Windows 2000 network cannot access resources on a Windows 2000 server because the DHCP server is down. The
client obtained an IP address. What IP address is the Client using?
169.254.X.X with a subnet mask of 255.255.0.0
6 There are several Broadcast storms in the network which is affecting the performance of it. Which devices would you
implement to reduce the traffic in the network ?
Switch
7 For which IP class range is 255.0.0.0 the default subnet mask?
Class A
8 What are the different tools you can use to troubleshoot -" No Dial Tone " issues when you are using a Dialup Modem?
Hyper Terminal
System Information
Device Manager
Query Modem
9 Which of the following is a valid Public IP address for an Internet host?
56.144.226.123
172.192.4.254
239.168.11.21
12.24.12.0
10 Which of the following is the protocol used for transferring Web pages?
HTTP
11 Which of the following IP addresses have a default subnet mask of 255.255.0.0?.Select all that apply.
129.0.0.1
12 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?
Type the IP Address of the Server to contact the Website
13 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?
Transmission Control Protocol
14 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?
Check for a Firewall blocking access
Check for the subnet mask in both systems.
15 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?
The TCP/IP protocol is not functioning
16 When you map a drive over a network, the mapped drive acts as though it is another drive that is physically in your system.
True
17 Where can one find the option to Block Popups in IE 6?
Right click Internet Explorer icon -> Properties -> Privacy tab
Section : Threats
18 What does Virus stand for?
Vital Information Resource Under Siege
Section : Threats
19 What is TRUE for a WORM?
WORMS can self-replicate
It is a malicious program which enters a computer by travelling through security & network loopholes
Section : Threats
20 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.
Pharming
Section : Networking
21 Which of the following are Network Devices?
Router
Switch
HUB
Bridge
Section : Networking
22 Which of the following is a valid Public IP address for an Internet host?
56.144.226.123
Section : Networking
23 Wireless Zero Configuration is included from which Windows Operating system?
XP
Section : Networking
24 Which one of the following is required to connect an 11 Mbps wireless network that uses the 2.4 GHz frequency band based on the Wi-Fi certification standard?
802.11 b
Section : Threats
25 Which of the following would you use to access win.ini and system.ini in a notepad?
sysedit
Section : Threats
26 Many pieces of Adware can be uninstalled via Add/remove program.
False
Section : Threats
27 Why are Trojans hard to detect?
Because Anti Viruses cannot detect Trojans
Section : Threats
28 My Yahoo messenger application is blocked from communicating . Where do I go to enable the application?
Start--> ControlPanel--> Windows Firewall --> Exceptions
Section : Threats
29 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.
Pharming
Section : Threats
30 Where can one find the option to Block Popups in IE 6?
Right click Internet Explorer icon -> Properties -> Privacy tab
Section : Threats
31 What is TRUE for a WORM?
WORMS can self-replicate
It is a malicious program which enters a computer by travelling through security & network loopholes
Section : Networking
32 A system with IP Address 10.0.0.1 is trying to connect to a system with IP Address 192.168.0.1. In which scenarios would they connect to each other?
None of the mentioned answers
By deploying a Switch
By deploying a Bridge
By deploying a Hub
Section : Networking
33 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?
Transmission Control Protocol
Section : Networking
34 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?
Check for the Default Gateway
Check for a Firewall blocking access
Section : Networking
35 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?
The TCP/IP protocol is not functioning
Section : Networking
36 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?
Type the IP Address of the Server to contact the Website
Section : Networking
37 Wireless Zero Configuration is included from which Windows Operating system?
XP
Section : Networking
38 Which of the following statements is TRUE regarding the command line utility which should be run to check for any open Simple Mail Transfer Protocol (SMTP) sockets if you suspect a virus exists on the computer and e-mail no longer functions?
Wrong You should run the nslookup command line utility.
You should run the mode command line utility.
You should run the ipconfig command line utility.
You should run the netstat command line utility.
Section : Networking
39 You have a DSL Connection at home. Suddenly there is no Internet service on your PC. What would you do as a first few troubleshooting steps to connect to the Internet?
Wrong
Reset the Modem
Right Perform Ipconfig /release and then Ipconfig /renew
Section : Networking
40 Which of the following are points of failure for a DSL connection?
IP settings
DSL modem
NIC
Section : Networking
41 _____ is a logical address, used to identify computers in a network.
Subnet Mask
Default Gateway
IP address
Section : Threats
42 Which of the following best describes Rootkits?
A rootkit is a collection of tools (programs) that enable only remote desktop level access to a computer or computer network.
Section : Threats
43 The following are characteristics of AV(Anti-Virus) software EXCEPT that it will:
Delete an Infected File
Update a Definition automatically
Quarantine
Section : Threats
44 Which of the following are symptoms of Virus?
You cannot start Windows Task Manager.
Strange dialog boxes or message boxes appear onscreen
None of the mentioned answers
An antivirus program is disabled for no reason and it cannot be restarted.
Section : Threats
45 What is a adware?
Adware is a type of program that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
Wrong Adware is neither a Hardware not Software that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
None of the mentioned answers
Adware is a type of Hardware that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
Section : Threats
46 What are the types of Firewall?
Software
Hardware
47 Section : Threats
Which of the following are manual threat removal?
Program Removal
Wrong Enable Firewall
Right File removal
48 Which of the following is the path for startup registry in win XP?
HKEY_CURRENT_USER\SYSTEM\Microsoft\Windows NT\CurrentVersion\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
1) You could have been banned. On runescape homepage click on appeal an offence/ban 2) Your account could be locked. On runescape homepage go to recover an locked account/recover a lost password. 3) You could have been hacked. If you set recovery questions, You could recover your account VIA recover a lost password on runescape homepage 4) The runescape servers may be down, try again later.
What is a good paint program to use with a Wacom tablet?
Aside from the obvious biggies like Adobe's Photoshop and Illustrator, anything that lets you draw a line! But to get the full use of the pressure-sensitivity (one of the big advantages over a mouse), try art programs advanced enough to allow variation in line quality and color blending. I'm experimenting with ArtRage right now, which is fun to play with. There are plenty of other programs out there, some free and some which have free trials.
Is windows antivirus better than Norton?
Absolutely. If you go to download.com you will see users like you and me voting for the best antivirus based on the amount of definitions that can detect, budget, and friendly environment. The one that I recommend is Antivir which is on place #2 from my opinion due to being free. 1# I would say is Avast! Norton is somewhere at # 22 if not lower. Symantec used to have a great QA back in 2000. The name remained as it is but the team has downgraded the product way below other competitors to the point of getting frustration on everything it can offer: huge, non-friendly, containg more than 1 module (anivirus) and making the product too complicated, not giving security enough to protect the system (e.g. to detect ZIP layers as much as 99) or detect high level heuristic, not free (see ANTIVIR, AVG, etc) and on top of that has a yearly license which will expire making the customer to miss the effectivness of the software and throw it in the recycle bin due to upgrading it to a different version (that could give him/her a surprise on the features and layout)..then getting to the point and asking...why both with the features, next year will have other...perhaps better onese...and the last but the most important part: DOES NOT DETECT ALL THE VIRUSES ON YOUR COMPUTER! Way to go...have Norton advertised in all Corporate Computer Stores, pay for it for 1 year and it DOES NOT DO THE PROMISE JOB.
AnswerKaspersky is cheaper than Norton
Answer
Norton is a popular antivirus but it can sometimes miss to detect some viruses.
I recommend you to try Microsoft Security Essential which is also very popular, efficient, user-friendly and efficient.
Answer
COMODO is better than Norton because it give's many security option's and NO 1 in all Anti-virus test.
How do you make an administrator account if you dont have an administrator account?
You can change administrator's password by a few easy steps.
1. Open the Start menu and click on "Run..."
2. Type "cmd" and click enter.
3. Type "net user (admin name) *
Where it says (admin name) you should type the administrator's name. Make sure you type a space and then a *.
4. It should ask you to type a password. Just type enter if you want no password.
It should then ask you to confirm. Re-type what you just typed.
5. There you are. Log out of your account, and their password should be changed/gone. Now go onto their account, go to "User Accounts" and make yourself an administrator.
6. GET SUSPENDED
use the last known good configuration to restart computer