You want to change color of taskbar in windows xp?
Here are step by step instructions on how to change your task bar color in Windows XP: # Right click on your desktop. # Click on "Properties". # In the window that pops up, go to the "Appearance" tab. # Using the "Color scheme" box, select the color scheme of your choice. A preview is displayed above. # When you find a color scheme you like, click "OK".
How do i reset my password on Fantage if i don't know my old password?
well you go to options and the first one there is change password and it has a key right next to it then you press that ;type your current password ;and type your new password twice. Hope this helps and if it doesn't make a new one.$).
Disk partition it involves the dividing of the hard disks into portions as opposed to the using of the hard disk without dividing it. Disk partition is very important since it allows the maximum usage of the disk and it encourages organisation of the disk; it is also easier to change programs without affecting other programs.
What programs used to create or modify vector images?
you can create and modify vector images in Photo shop, Corel Draw, illustrator and so on. If you already have vector image and want to modify look what extension have that image, look at letters on the end like .PSD, .AI, if you have for example .AI extension it is illustrator file and you need illustrator or Corel Draw to modify it, but still you can place it in Photo Shop document through File -> Place command.
Right-click anywhere on the desktop and select Properties from the shortcut menu or use the Display applet in Control Panel to access Display Properties. From this window, you can change the background, screen saver, color scheme, icon settings, color range, screen resolution, screen refresh rate, and drivers.
During user profile setup, when do you make sure the user has access to the correct functions and tasks in Access Online?
What is another name for a blue screen error?
1 Which of the following is a public IP address?
192.168.200.14
2 Which of the following refers to a device that is logically addressed on an IP network?
Host
3 Which of the following are Network Devices?
HUB
Bridge
Router
Switch
4 Which physical network topology is the LEAST fault tolerant? (Choose all that apply)
The ring topology
The bus topology
5 A client on a Windows 2000 network cannot access resources on a Windows 2000 server because the DHCP server is down. The
client obtained an IP address. What IP address is the Client using?
169.254.X.X with a subnet mask of 255.255.0.0
6 There are several Broadcast storms in the network which is affecting the performance of it. Which devices would you
implement to reduce the traffic in the network ?
Switch
7 For which IP class range is 255.0.0.0 the default subnet mask?
Class A
8 What are the different tools you can use to troubleshoot -" No Dial Tone " issues when you are using a Dialup Modem?
Hyper Terminal
System Information
Device Manager
Query Modem
9 Which of the following is a valid Public IP address for an Internet host?
56.144.226.123
172.192.4.254
239.168.11.21
12.24.12.0
10 Which of the following is the protocol used for transferring Web pages?
HTTP
11 Which of the following IP addresses have a default subnet mask of 255.255.0.0?.Select all that apply.
129.0.0.1
12 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?
Type the IP Address of the Server to contact the Website
13 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?
Transmission Control Protocol
14 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?
Check for a Firewall blocking access
Check for the subnet mask in both systems.
15 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?
The TCP/IP protocol is not functioning
16 When you map a drive over a network, the mapped drive acts as though it is another drive that is physically in your system.
True
17 Where can one find the option to Block Popups in IE 6?
Right click Internet Explorer icon -> Properties -> Privacy tab
Section : Threats
18 What does Virus stand for?
Vital Information Resource Under Siege
Section : Threats
19 What is TRUE for a WORM?
WORMS can self-replicate
It is a malicious program which enters a computer by travelling through security & network loopholes
Section : Threats
20 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.
Pharming
Section : Networking
21 Which of the following are Network Devices?
Router
Switch
HUB
Bridge
Section : Networking
22 Which of the following is a valid Public IP address for an Internet host?
56.144.226.123
Section : Networking
23 Wireless Zero Configuration is included from which Windows Operating system?
XP
Section : Networking
24 Which one of the following is required to connect an 11 Mbps wireless network that uses the 2.4 GHz frequency band based on the Wi-Fi certification standard?
802.11 b
Section : Threats
25 Which of the following would you use to access win.ini and system.ini in a notepad?
sysedit
Section : Threats
26 Many pieces of Adware can be uninstalled via Add/remove program.
False
Section : Threats
27 Why are Trojans hard to detect?
Because Anti Viruses cannot detect Trojans
Section : Threats
28 My Yahoo messenger application is blocked from communicating . Where do I go to enable the application?
Start--> ControlPanel--> Windows Firewall --> Exceptions
Section : Threats
29 __________ is the term for when criminal hackers redirect Internet traffic from one website to a different. Identical-looking site in order to trick you into entering your username and password into the database on their fakesite.
Pharming
Section : Threats
30 Where can one find the option to Block Popups in IE 6?
Right click Internet Explorer icon -> Properties -> Privacy tab
Section : Threats
31 What is TRUE for a WORM?
WORMS can self-replicate
It is a malicious program which enters a computer by travelling through security & network loopholes
Section : Networking
32 A system with IP Address 10.0.0.1 is trying to connect to a system with IP Address 192.168.0.1. In which scenarios would they connect to each other?
None of the mentioned answers
By deploying a Switch
By deploying a Bridge
By deploying a Hub
Section : Networking
33 You're talking with a few of the programmers in your department about an application they are working on. They tell you it is designed to use a connection oriented protocol to communicate over the network. Which protocol in the TCP/IP protocol suite provides connection-oriented communications?
Transmission Control Protocol
Section : Networking
34 There are two computers with IP Addresses 192.168.0.2 and 192.168.0.3 . But they still do not communicate with each other. What would you check?
Check for the Default Gateway
Check for a Firewall blocking access
Section : Networking
35 You work as a network technician at New.com. The New.com network user reports that when he pings the computers loopback address he receives no response. The New.com user wants to know what could cause this problem. What would your reply be?
The TCP/IP protocol is not functioning
Section : Networking
36 Which of the following can be carried out if the DNS Server is not available when you are trying to connect to a website?
Type the IP Address of the Server to contact the Website
Section : Networking
37 Wireless Zero Configuration is included from which Windows Operating system?
XP
Section : Networking
38 Which of the following statements is TRUE regarding the command line utility which should be run to check for any open Simple Mail Transfer Protocol (SMTP) sockets if you suspect a virus exists on the computer and e-mail no longer functions?
Wrong You should run the nslookup command line utility.
You should run the mode command line utility.
You should run the ipconfig command line utility.
You should run the netstat command line utility.
Section : Networking
39 You have a DSL Connection at home. Suddenly there is no Internet service on your PC. What would you do as a first few troubleshooting steps to connect to the Internet?
Wrong
Reset the Modem
Right Perform Ipconfig /release and then Ipconfig /renew
Section : Networking
40 Which of the following are points of failure for a DSL connection?
IP settings
DSL modem
NIC
Section : Networking
41 _____ is a logical address, used to identify computers in a network.
Subnet Mask
Default Gateway
IP address
Section : Threats
42 Which of the following best describes Rootkits?
A rootkit is a collection of tools (programs) that enable only remote desktop level access to a computer or computer network.
Section : Threats
43 The following are characteristics of AV(Anti-Virus) software EXCEPT that it will:
Delete an Infected File
Update a Definition automatically
Quarantine
Section : Threats
44 Which of the following are symptoms of Virus?
You cannot start Windows Task Manager.
Strange dialog boxes or message boxes appear onscreen
None of the mentioned answers
An antivirus program is disabled for no reason and it cannot be restarted.
Section : Threats
45 What is a adware?
Adware is a type of program that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
Wrong Adware is neither a Hardware not Software that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
None of the mentioned answers
Adware is a type of Hardware that displays an advertisement of some sort, usually related to a specific Web site cached in the Web browser.
Section : Threats
46 What are the types of Firewall?
Software
Hardware
47 Section : Threats
Which of the following are manual threat removal?
Program Removal
Wrong Enable Firewall
Right File removal
48 Which of the following is the path for startup registry in win XP?
HKEY_CURRENT_USER\SYSTEM\Microsoft\Windows NT\CurrentVersion\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
1) You could have been banned. On runescape homepage click on appeal an offence/ban 2) Your account could be locked. On runescape homepage go to recover an locked account/recover a lost password. 3) You could have been hacked. If you set recovery questions, You could recover your account VIA recover a lost password on runescape homepage 4) The runescape servers may be down, try again later.
What is the name of the virtual memory file in Windows XP?
It is called Page File.It is created during widows xp installation & resides on the hard drive.It is measured in MB.By default,windows xp creates a page file approx. 1.5 times size of installed RAM.
The feature you are referring to is called Internet Connection Sharing, or ICS for short. This allows a computer with a direct connection to the internet to "share" that connection with other computers on a network. There are many ways to accomplish this, and it depends on your network setup. You can share a connection via a wired or wireless network connection (the LAN portion, or Local Area Network).
For information on ICS, see the related links.
How do you remove security tool?
Security Tool is a hoax virus that does let you open anything except the Internet. They say that you have a virus on your computer that tries to get your credit card number, but that's what they're trying to do. They want you to buy their product that doesn't work. To remove this virus, go to this link, by the way, no antivirus software will remove this virus :)
http://www.youtube.com/watch?v=9UoV1C4NbfU
It worked for me,
Good Luck!
VTSIT MY WEBSITE FOR EASY TIPS:Visit My WebsiteIs windows antivirus better than Norton?
Absolutely. If you go to download.com you will see users like you and me voting for the best antivirus based on the amount of definitions that can detect, budget, and friendly environment. The one that I recommend is Antivir which is on place #2 from my opinion due to being free. 1# I would say is Avast! Norton is somewhere at # 22 if not lower. Symantec used to have a great QA back in 2000. The name remained as it is but the team has downgraded the product way below other competitors to the point of getting frustration on everything it can offer: huge, non-friendly, containg more than 1 module (anivirus) and making the product too complicated, not giving security enough to protect the system (e.g. to detect ZIP layers as much as 99) or detect high level heuristic, not free (see ANTIVIR, AVG, etc) and on top of that has a yearly license which will expire making the customer to miss the effectivness of the software and throw it in the recycle bin due to upgrading it to a different version (that could give him/her a surprise on the features and layout)..then getting to the point and asking...why both with the features, next year will have other...perhaps better onese...and the last but the most important part: DOES NOT DETECT ALL THE VIRUSES ON YOUR COMPUTER! Way to go...have Norton advertised in all Corporate Computer Stores, pay for it for 1 year and it DOES NOT DO THE PROMISE JOB.
AnswerKaspersky is cheaper than Norton
Answer
Norton is a popular antivirus but it can sometimes miss to detect some viruses.
I recommend you to try Microsoft Security Essential which is also very popular, efficient, user-friendly and efficient.
Answer
COMODO is better than Norton because it give's many security option's and NO 1 in all Anti-virus test.
If the first word is supposed to be what and not when then the answer is Server Core.
Stop windows security pop up alerts?
If you have Vista: Go get Windows 7 (nothing you can do about it)
If you have 7: Click Win-Key type User Account Control Settings and move the slider
If you have XP: IDK (someone please put insert the appropriate info)
If you have Mac: IDK I don't have a Mac (someone please insert the appropriate info)
Download HP Deskjet 3845 installation software for free?
HP provide links for software for their products from their website (See links below).
What action displays a window similar to the one below to appear T2q16?
Double-click with the left mouse button
If performance improves when Windows is loaded in a clean boot what can you conclude?
If performance improves when you start the system in Safe Mode, you can assume that nonessential startup programs are slowing down the system when Windows boots normally. But, if the performance does not improve, you can assume that the problem is with a hardware device, a critical driver, or a Windows component.
How can I delete Microsoft Narrator from a computer?
To delete any installed program from your computer (you must have administrator privileges). Start, run, control (enter), add or remove programs, find program in list, click "remove". if it prompts you if you really want to remove, say yes. You'll have to delete desktop icons separately.
How can you configure to start a program automatically when you start Windows 2000 professional?
How Do I Have a Program Start Automatically With Windows 2000 Pro?
Windows Professional 2000 is an older operating system still used on some networks. Windows 2000 has a similar architecture to newer Windows operating systems, such as the ability to place programs in the start section of the registry. The registry has a section called "Run," where programs such as antivirus other personalized software you want to start are entered. These programs are started each time you boot Windows.
Instructions
Click the Windows "Start" button and select "Run." Enter "regedit" into the text box displayed and press the "Ok" button.
Navigate to the "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" registry directory.
Right-click the window and select "New." Select "Value" and a new window opens. In the data type drop-down box, select "REG_SZ."
Enter the executable for the program you want to start. Enter the full path to the executable, or the registry will return an error. Click the "OK" button to save your settings.
Reboot the machine. The next time you reboot, the Windows operating system automatically runs the software after you log in to the machine
Which registry hive is loaded first during Windows startup?
system registry hive actually it is C:|Windows\system32\Config or HKEY_LOCAL_MACHINE\SYSTEM\Services.
How do you make an administrator account if you dont have an administrator account?
You can change administrator's password by a few easy steps.
1. Open the Start menu and click on "Run..."
2. Type "cmd" and click enter.
3. Type "net user (admin name) *
Where it says (admin name) you should type the administrator's name. Make sure you type a space and then a *.
4. It should ask you to type a password. Just type enter if you want no password.
It should then ask you to confirm. Re-type what you just typed.
5. There you are. Log out of your account, and their password should be changed/gone. Now go onto their account, go to "User Accounts" and make yourself an administrator.
6. GET SUSPENDED
The question is broad, there are many things that can go wrong or cause problems with a treadmill. Usually it is either the belt or the motor that cause the most problems. Is your belt slipping, or "bogging down" while you are on the treadmill? Perhaps your unit is stopping after a few minutes of walking or running. To answer a specific question would require more input from the treadmill owner. I do provide treadmill troubleshooting tips on my website at http://treadmills.cc Thanks, Paul
Windows 7Right click on Computer--> Advanced System Setting •Applying a restore point•Windows Vista or Windows XP desktop
-1. Open System Restore box
-2. If multiple restore points exist, two options display:
•Use recommended restore point
•Choose a different restore point
-3. System restarts and restore point is applied