answersLogoWhite

0

📱

Windows XP

MS Windows XP operating system that was released for PC computers in 2001

9,737 Questions

What programs do you download to run DLL files?

Normally none. A Dynamic Link Library contains executable code that is not meant to be executed standalone, but in context with some hosting software. Typically, that host is a standalone executable (.exe). For example, Word for Windows loads a number of DLLs when running. These DLLs provide all kind of services, tools and data to the Word application, and through the application to the user. These DLLs are not normally designed, or capable of, running stanadalone. Exceptions exist. Windows screensavers or control panel applets are DLLs (which are run through an operating-system service), and Windows supplies a generic DLL host (RUNDLL.EXE) to execute apropriately designed DLLs.

Why can't you access properties in your start services control panel?

I can access mine on my home machine here. Maybe if you are on someone else's computer or are at work the network admin has locked you out of what he doesn't want you messing about with. Phil

How do you boot from the floppy prompt to install xp from CD?

First, if your computer is incapable of booting from a CD, it probably can't run XP anyway.

Secondly, all you need to do is put the floppy disk in the drive, and make sure that it is the first boot device in your BIOS.

What are hidden files and how can they is displayed in UNIX?

A hidden file is any file or directory that starts with the character '.' (period). It is designed to eliminate common files from showing with the 'ls' command.

Using the -a option for 'ls' will show all files.

How can you make your 2 GB Moser Baer Pen Drive Bootable?

It depends on which operating system you want to boot on your flash drive. I have been using an application called Bootsage to create a Windows 7 installer flash drive or a WinPE bootable environment, and it seems to work very well. It runs under Windows XP as well as Windows 7.

http://firesage.com/bootsage

Here is a utility which make bootable pendrive in few very simple steps...

http://techwek.com/2011/09/22/download-free-software-iso-to-usb-to-make-bootable-pen-drive-in-windows-7-vista-xp/

How does a 3.3 revo traxxas work?

the nitro motor turns the slipper clutch on the transmission which turns the output shafts that are tied to the front and rear differentials

What does do you want to use this printer as a default mean?

it means do you want to print with this printer every time you press print or not.

How do you resize a photo from 5mp to 2mp?

Basically you have to reduce the size of the photo 1.58 times on both x and y axis. This way you achive a reduction of 1.58^2 = 2.5 and the image will have about 2 mp.

You can use any image converter and enter a percentage of 100% / 1.58 = 63% (Paint is a example - but the image quality is not very good, AZImage is another possibility, GIMP, Photoshop, ...)

7 QC tools?

Seven Steps or Seven QC StepsThe 7 QC Steps process is a structured problem solving approach for improving weak processes. This approach is known as reactive improvement. The 7 QC Steps is easy to understand and learn, easy to use, and easy to monitor.

The 7 QC steps process is structured as follows:

Step 1: Select a Theme.

In this step, the weakness in the process or the problem to be solved is clarified in a theme statement. A Flowchart, a Theme Selection Matrix, or a Cause & Effect Diagram is used as a tool in this step.

Step 2: Collect and Analyze Data.

This step focuses facts about the problem and discovers what types of problems occur frequently. When collecting data, you must think of all possible causes. Checksheets and Pareto Diagrams are the tools most often used.

Step 3: Analyze Causes

.With sufficient data from step 2, the root cause, or fundamental cause, is found by constructing a Cause & Effect Diagram.

Step 4: Plan and Implement Solution.

In this step, you brainstorm for ideas that are causing the problem and develop a solution that prevents the root cause from recurring. Then, you implement an adjustment to the process. The 4W's and 1H Matrix (What, When, Where, Who, and How Matrix) is used to develop a plan.

Step 5: Evaluate Effects.

You evaluate the effects of implemented solution to make sure the solution worked and does not have unacceptable results from the comparison of data, before and after the implementation of the solution. In this step, comparative Pareto Charts and Graphs are frequently used to identify the results.

Step 6: Standardize Solution.

A standardized solution is confirms that the old process is replaced with an improved process and indicates that the solution is workable. A flowchart is most often used.

Step 7: Reflect on Process and the Next Problem.

In this step, you consider what the team's accomplishment was in the first 6 steps and recommend a weakness to work on next.

Should basement windows be open in summer?

No you should not. If you did leave the windows open, it would let hot air in, so therefore your basement would be hot and stuffy. Another reason why not to, is because of safety hazards, someone could break in or could be smashed.

In unix how will you find extension of file using commands?

Unix files do not rely on extensions, therefore there is no command to find them.

What size is a quantum fireball cr 3.5 series hard drive?

The Quantum Fireball EX came in a range of sizes in multiples of 3.2 depending on the number of platters. The smallest was 3.2gb, and the largest was 12.7gb with four platters.

What is etc folder in system32?

etc contains the hosts file, where you can add IP address to hostname mappings, so you can customize things there. LMHOSTS does the same thing, but for the Network Neighborhood.

Basically, there's nothing to mess with there. Sometimes, people map known spamhosts or ad servers domain names to 127.0.0.1, to block those ads. But, that's about it, and there's really no point to doing that, even, as there are way to many ad servers to fool with blocking.

What if UPnP framework is added to windows firewall exception list?

UPnP stands for universal plug and play. If you have a network (more than one computer in your home that are networked to share a connection) and you want to share plug and play devices (like a printer, perhaps) then this exception will keep your firewall from blocking plug and play devices. If you do not want to share plug and play devices, you should disable the exception. If you do have a network, make sure it is secure.

If you get a 'The system file is not suitable for running MS-DOS and Microsoft Windows applications' error what should you do?

== == == == The easiest way to explain solution is: Open the C:\windows\repair folder Highlight and copy autoexec.nt and config.nt (Ctrl+C) Open the C:\windows\system32 folder Paste (Ctrl+V) files and click Yes if box prompts to replace existing file If it does it again, it is because it gets deleted on Restart You just do it again or mark the files for Read-Only I just paste and copy and worry about tomorrow tomorrow If you try to start or install an MS-DOS-based or a 16-bit Windows-based program on your Windows XP-based computer, you may receive an error message that is similar to one of the following:

KB324767 - 16-bit MS-DOS Subsystem

path to the program that you are trying to start or install

C:\Windows\System32\Autoexec.nt The system file is not suitable for running MS-DOS and Microsoft Windows applications. Choose 'Close' to terminate the application. Although you may be prompted to quit the program or ignore the error message, either selection makes the program quit.

This issue may occur if one or more of the following files are missing or damaged: * Config.nt * Autoexec.nt* Command.com

How do you create a temp directory on Windows XP?

It is very simple. Create any directory that you wish to be used as windows temp direcotry.

Follow the steps below to create your own Windows temp directory under any OS.

1. Create a Directory under root ex: C:\Temp

2. Right Click on My Computer icon from the desktop and goto properties page.

3. Go to Advanced tab sheet, you will find "Environment Variables" button at the bottom of the tab sheet, click it.

4. By now Environment Variables dialog box is opened for you... There are two list boxes provided, 1 is for the current user who is logged in and the other is for system.

5. Click "New" button under system variables

6. Now specify your temp directory details, such as... Variable Name: TEMP Variable Value: C:\TEMP Click Ok button to apply the changes you have made.

Just restart your machine to get it activated.