Questions & Answers

  • What are your pros and cons of BYOD?

    During this year's Interop conference, many speakers and attendees discussed the pros and cons of BYOD or bring-your-own-device. Gib Sorebo, chief cyber-security technologist at SAIC, said BYOD may seem like a necessity but it's not always the case. What are your pros and cons of BYOD?

    Michael Tidmarsh52,245 pointsBadges:
  • How do I become an ICT professional?

    How do I become an information and communications technologies (ICT) professional?

    NetworkingATE1,545 pointsBadges:
  • How to get print on any HP printer from DOS mode Foxpro software?

    I have prepared software in DOS mode (Foxpro 2.5) and doing well with Dot matrix printers but now the demand for Deskjet print out has increased and I am unable to provide the same as the commands from DOS mode. It's not supported to print on Deskjet printers... Anybody know the solution? Can...

    Srmsoft5 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Can someone see what I’m browsing through network server?

    If anyone knows my laptop's MAC address, will they able to see what I'm browsing when I'm connected to their network server?

    nazurul1235 pointsBadges:
  • how many derived roles can be inherited from one master role in SAP

    how many derived roles can be inherited from one master role in SAP

    Shashikantrokade9805 pointsBadges:
  • wi fi signal blue dot moves

    I'm wondering about why my Wi-Fi signal moves to specific places in my home and outside

    edwinelbro5 pointsBadges:
  • swf

    embed swf audio in html

    dannyA5 pointsBadges:
  • Outlook Calendar

    I am sending meeting invites on behalf of my boss from their calendar to others. Do I need to invite them? My coworker says yes, but when I have done that, my boss gets two invites. As the organizer of the meeting, they don't also need to be invited, do they? Please help. In my review, this was an...

    coffeegurl455 pointsBadges:
  • AS/400 (language – RPGLE)

    I want to fetch combination of some records from PF file, so how should I do that?

    Shrikant3155 pointsBadges:
  • OPNQRYF command runs ok interactively but errors out in batch

    I have a CL (call it RUN) that calls multiple CLs. This was done to run several steps that were run manually. Two of these CLs ( STEP ONE and STEP TWO)  use an OPNQRYF against the same file. When I called RUN it worked fine interactively but when I submit it through WRKJOBSCDE, STEP...

    Georgeann10 pointsBadges:
  • memory ram problem

    suddenly, computer is beeping 3 beeps on startup. ram works properly on another identical pc, i tried all 4 slots on the board. i tried cleaning the ports. used another ram. whatever i do its still the same problem. anyone exp. that problem? is that a board problem?

    roypps5 pointsBadges:
  • Tracing a remote user activity

    Can the user activity for a file access on a remote machine be traceable? Example, If a user access files/folders on my machine through network (\\machine name\c$\folder\files), then can I trace the user activity on my machine?

    Santhoshk15 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE976,680 pointsBadges:
  • My ex-husband is accessing my laptop remotely

    My ex-husband is accessing my laptop remotely to sign into my outlook email account. I know the sign in was not me, but it has the IP address for my laptop as the IP used. I signed out of the account at 6:40pm last night from the laptop and today I see a sign in attempt at 11:17pm using my IP...

    thesabrina65 pointsBadges:
  • Neighbor controls my computer

    How can I bump him off once and for all. He knows my passwords but even more he has studied this area of hacking? Can I take him to court and what will the govt do for if anything? Yes, I do have evidence.

    targeted35 pointsBadges:
  • Certificate for Webpage Not Valid

    While using Safari, I frequently receive the message "Certficate Not Valid, may be directed to an external page". This happens when I try to access a page from a google search menu.  What does this mean and why does this happen?  It doesn't happen with the Chrome browser.

    nscott5155 pointsBadges:
  • Remove virus from USB pen drive

    I just noticed that my USB pen drive was infected by a virus. Now, everything is hidden in it. I had so much information on there. I tried the CMD attrib command but that didn't work. What can I do?

    ITKE976,680 pointsBadges:
  • sql

    HOW CONVERT ENGLISH NUMBER TO ARABIC NUMBER IN SQL SERVER

    elenahasooni5 pointsBadges:
  • UTM

    Could You: Explain why UTM hardware specifications (CPU, RAM and interfaces) need to be different for enterprise UTM devices when compared with Small/Medium Business devices. Using suitable diagrams with explanations, indicate effective and ineffective placement of UTMs on a network compromising of...

    sulhuss5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following