Questions & Answers

  • Microsoft Excel: Create diagrams of risk types

    How can I create diagrams by overlap for risk types in Microsoft Excel?

    khaleghian5 pointsBadges:
  • How to open a ZML file

    I need help with a ZML file. Don't no what it is and how to open it. trying to open it on my laptop as well as my iPhone.

    sweetNspycee25 pointsBadges:
  • School subscription online, be amongst the first

    I would like some information on how I can maximize my chance to register my son at school. They will open the subscription in some months with a strict first come, first served politic. Are there tools to maximize my chance to connect to the website on d-day?

    nanobul5 pointsBadges:
  • IN PL/SQL how to declare and use ‘STATIC DATA TYPE like C’

    Hi All, Can anybody help me to declare a variable having the similar propery of 'STATIC DATA TYPE IN C'. Means declare a variable and initialize it inside the procedure and called the procedure recursively but each time it is initializing the variable. I want any mechanism in PL/SQL that will make...

    Oracle10g4developers5 pointsBadges:
  • Checking number of PDF file pages using Shell Script

    Usually - I generate a PDF file dynamically. Would there be a way for me to check the number of pages in that file using a Shell Script? Thanks so much!

    ITKE828,985 pointsBadges:
  • CPF4169 error appeared during OPEN for screen file

    In reference to Ibmi ILE programming environment. I am in a screen program which is set to 132 length. There are multiple calls to other programs that are set to 80 length where there is not a problem getting the CPF4169 error. So now I have a new program to call and I am getting this error and I...

    sewell90 pointsBadges:
  • Data validity vs. CL program with OVRDBF command submitted 10 times simultaneously

    Would I be able to process the file correctly if I would have a CL program submitted 10 x simultaneously that contains OVRDBF. Behavior is similar to multi threading and this would really help process a very large file with less time. OVRDBF is necessary to point to the correct file member prior to...

    Andy01atSM5 pointsBadges:
  • Getting started in Agile

    How do I get started in Agile software development?

    jeremycato5 pointsBadges:
  • Convert Microsoft Excel file to PDF

    I have a recently created / updated Microsoft Excel file. This needs to be converted to a PDF file ASAP. What's the best approach to do this? Possibly a Java API? Thank you so much.

    ITKE828,985 pointsBadges:
  • Extracting PDF and Microsoft Word text using C#

    Anyone know how I could extract specific text from PDFs / Microsoft Word files in C#? I'm specifically looking to remove images / other rich text. Thank you.

    ITKE828,985 pointsBadges:
  • Can employer see Internet usage on personal phone?

    I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?

    Lalalucy15 pointsBadges:
  • How to recover laptop password

    My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.

    mogrov25 pointsBadges:
  • SAP EDI to send ASNs

    What type of EDI format SAP use to send ASNs? It is EDIFACT?

    ThainaSoares5 pointsBadges:
  • HP – ALM and Android applications

    Hi. I was wondering if HP - ALM can be used to test the Android based applications. Thanks.

    Sergey20165 pointsBadges:
  • Outlook not storing passwords for extra accounts

    Microsoft Outlook is not storing passwords for extra accounts. What should I do?

    BiGDee765 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • Change English numbers to Arabic numbers

    How I can change English numbers to Arabic numbers?

    Mark475 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following