Advert

Typing Tutorials

Last edited by . Total of no comments in the discussion.

Typing is a must-have skill that we should all develop. It is an essential skill in most businesses today, especially if you are looking for a white collar job.  Whether you are a student, a casual computer user whose need to type starts and ends with keying out a few emails and chat messages, or if your job profile requires you to type long hours on the keyboard, picking up good typing skills can go a long way in simplifying the task at hand.  Most people do not have the Read More

Share on:

Implementing NWLink

Last edited by . Total of no comments in the discussion.

NWLink Overview NWLink IPX/SPX is the Microsoft implementation of Novell’s NetWare Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) protocol. NWLink IPX/SPX is simply called NWLink. NWLink is used in Novell NetWare, and can be considered IPX for Windows. NWLink is an IPX/SPX compatible transport protocol that was developed to enable Windows 2000 computers to communicate with NetWare services. It is therefore used when clients running Microsoft operating systems (OSs) need to access resources on NetWare servers. It is also used where clients running NetWare need to access resources on computers running Read More

Share on:

Types of Projector Lamps

Last edited by . Total of 1 comment in the discussion.

A projector lamp is used to transfer an image from a multimedia projector onto a larger screen. Earlier halogen bulbs were used for many years for projection purposes, but were discontinued as halogen produced a yellow tone on the images. A projector lamp relies on an intense light bulb, called a metal halide bulb, to produce a brilliant white light. The light bulb shines onto a number of small mirrors inside the machine and transfers the image through the air and onto the screen. These machines can project slides, films, Read More

Share on:

Understanding IPv6

Last edited by . Total of 1 comment in the discussion.

Understanding the Limitations of IPv4 Before moving on the to an in-depth discussion of IPv6, lets first look at the limitations of IPv4: The IPv4 addresses are somewhat scarce, even though it allows for 4,294,967,296 possible addresses. Because of this limitation, organizations are forced to utilize Network Address Translator (NAT) to map a public IP address to several private IP addresses. NAT typically creates performance and application bottlenecks. The increase in devices that are connected to the Internet would lead to the depletion of IPv4 address space. There is a Read More

Share on:

How to Reset a MySQL Password

Last edited by . Total of 8 comments in the discussion.

A MySQL password can be reset in 5 easy steps: Stop the mysqld daemon process. Start the mysqld daemon process with the –skip-grant-tables option. Start the mysql client with the -u root option. Execute the UPDATE mysql.user SET Password=PASSWORD(‘password’) WHERE User=’root’; Execute the FLUSH PRIVILEGES; command. These steps reset the password for the “root” account to “password.” To change the password for a different account or to set a different password, just edit the variables in single quotes in step 4. If the user knows his/her existing MySQL root password, Read More

Share on:

Free Music Editing Software

Last edited by . Total of 1 comment in the discussion.

Though there are several free music editing software packages available, a software utility entitled Audacity is very robust and has a version for Mac, Linux, and PC. Audacity can record live audio via mixer or microphone, as well as digitally capture recordings from cassette tapes, vinyl records, or mini-discs. Depending on your sound card, Audacity can also grab streaming audio, and you can create multi-track recordings by dubbing over already existing tracks. Provided that you have multi-channel hardware, Audacity will allow you to record up to 16 hardware) channels at Read More

Share on:

Function Overloading

Last edited by . Total of no comments in the discussion.

Function overloading is a concept where several function declarations are specified with a single and a same function name within the same scope. Such functions are said to be overloaded. C++ allows functions to have the same name. Such functions can only be distinguished by their number and type of arguments. Example: float divide(int a, int b) ; float divide(float a, float b) ; The function divide(), which takes two integer inputs, is different from the function divide() which takes two float inputs. What is the need for function overloading? Read More

Share on:

How Do Jet Engines Work?

Last edited by . Total of no comments in the discussion.

Jets are able to move much faster than other types of aircraft and they especially move faster than regular forms of transportation such as trains and automobiles. In exchange for all the extra speed, however, jet engines must be designed and built differently than normal engines. This article will explain what jet engines do that are so special and list a number of parts that are crucial to the jet engine's ability to generate such high speeds. What Do Jet Engines Do Jet engines, also known as gas turbine engines, Read More

Share on:

What Are AIM Chat Rooms?

Last edited by . Total of 3 comments in the discussion.

AIM Chat Rooms are a quick and easy way of communicating via the Internet. Two or more people can create a private environment and have control over who can enter the chat room. While many people use AIM Chat Rooms to keep in touch with friends and relatives, other people use AIM Chat Rooms to communicate with educational instructors and business acquaintances. How do I start an AIM chat room? Before anyone can begin or participate in an AIM chat, you will need to install AOL Instant Messenger client on Read More

Share on:

Metal Detector

Last edited by . Total of no comments in the discussion.

A metal detector uses an electromagnetic field to detect the presence of a concealed metal object. The range depends on the strength of the field, and is usually less than one meter from the search head. The three detection methods are beat frequency oscillation, very low frequency, and pulse induction. Metal detectors were first introduced around 1930 and are used in many different applications. How Metal Detectors Work The beat frequency oscillation method uses two coils connected to an oscillator. When the search head coil passes over a metal object, Read More

Share on: