Questions & Answers

  • Software and hardware requirements of mobile app to detect the person’s location

    What are the software and hardware requirements of mobile app to detect the person's location?

    80504097255 pointsBadges:
  • Open RTF documents as read-only

    I am doing a conversion of documents to RFT but I want the documents to open as read-only. Any suggestions? I do not want to have to save each document individually.

    bgreene5 pointsBadges:
  • Is *.JPG used to recover a file?

    Is this used to recover a lost file?

    Northrup575 pointsBadges:
  • How to handle .WXP extension

    I have received a document with extension as .WXP. What software would open and convert the file into LaTeX or MS Word document format?

    SomaVignesh5 pointsBadges:
  • Windows 10 low battery settings are not working

    Just got a new Lenovo laptop with Windows 10 on it. I was pretty excited about it until I noticed an issue with the battery settings. I'm not getting any warning messages when it's low battery. It just shuts right off. What can I do? Any help would be great. All of my Windows Updates are installed...

    ITKE1,000,710 pointsBadges:
  • Should I take my hard drive out of my laptop for security reasons?

    I recently bought a brand new laptop with the extended warranty. I have to sent it back through for repair - something got screwed up with the keyboard. Do you think I should remove the hard drive from it first before I send it back? I'm just nervous about all the data I have on it already. Not...

    ITKE1,000,710 pointsBadges:
  • Run Microsoft Office and LibreOffice on same computer

    Can you install / run Microsoft Office Suite and LibreOffice Office Suite on the same Windows computer, 64-Bit system? Same Hard Drive?

    Scanner114415 pointsBadges:
  • AS/400 Command Line and Special Authorities

    Let's say command XYZ has PUBLIC set to *EXCLUDE. If I have access to command line and not *ALLOBJ, I cannot access that command, right? If I have *ALLOBJ or belong to the authorization list, then I can launch it? Second question: if a user have full access to command line (Limit cap = *NO), but...

    aldc12385 pointsBadges:
  • Troubleshoot asymmetric routing in TCP based connection

    How can I troubleshoot asymmetric routing in TCP based connection?

    yfaizan15 pointsBadges:
  • Adding VIM extension into Visual Studio on Mac

    I'm on a Mac using Visual Studio. Help me out here - I can't for the life of me add a VIM extension into VS. What's the process here?

    ITKE1,000,710 pointsBadges:
  • Windows 10 computer will not recognize USB floppy disk

    I'm on Windows 10 and I recently purchased a USB floppy drive. When I put it in, I keep getting this message: This disk media is not recognized - it may not be formatted. How can I configure this disk for my computer?

    ITKE1,000,710 pointsBadges:
  • Move all images into one folder on Windows

    Hello, I have several thousand images in a bunch of different formats (.JPG, .PNG, etc.) and I would like to move all of them into one specific folder. How can I search for all of them / move them? I'm using Windows. Thanks!

    ITKE1,000,710 pointsBadges:
  • Open Microsoft Excel 2013 file on Microsoft Office 2010

    I'm currently on my home laptop that runs Office 2010. My co-worker gave me an Excel 2013 file that I can't open. Excel 2010 is telling me that it's a corrupt file. How can I view / open this file? Thank you so much.

    ITKE1,000,710 pointsBadges:
  • AS/400 User Profile

    A particular user profile is getting disabled often and the user has not logged on during that time. Is someone trying to logon using that ID or there is some other reason behind it? Please advise.

    Gayathri12370 pointsBadges:
  • Software files were deleted from AS/400 system

    Dear docs, I am very new to AS/400 administration. In our environment we have AS/400 server V6R1 with OS/400 OS and IBM MQ software installed in it. Recently we found some of the software files were deleted from the system. We have check the job logs with dsplog and wrksplf command but did not find...

    harsha812710 pointsBadges:
  • AUDIT: Attention Key Program, programs that adopt QSECOFR, and object authority

    Hi all, Two questions: If public is *USE to a program that adopts QSECOFR authority, how do I determine if a user can use the program, through attention key program and command line (if limit cap  = no)? Which values do I need to look at? If public is *EXCLUDE, is my risk covered or a user with...

    aldc12385 pointsBadges:
  • AS/400 Power 8 (Subsystems)

    I have a client who says their IBM rep said they should only have one batch subsystem, and they are adamant that this is gospel. How do I prove this wrong?

    Harry10815 pointsBadges:
  • Creating DML Triggers

    When creating a DML statement trigger on a table, what are the components that you must define?

    Dmanie015 pointsBadges:
  • Is this the right BYOD security plan?

    Dears, we have many users with mobile devices (not owned by The Business) need to check the Email, send report via Whatsِapp or other APP and they use direct connection to the internet as you know vulnerabilities with Android. They may be send message infected by malware to person on our local...

    Elyassalman5 pointsBadges:
  • Is it possible to install antivirus in my external hard drive?

    Would it be possible for me to install antivirus on my external hard drive?

    kari7301205105 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following