No one has voted on any posts yet. Votes from other community members are used to determine a member's reputation amongst their peers.
- PC Specs
- 1 Mhz, 2Kb Ram, EGA display
So, I've read Microsoft's documentation, and it ends up being a lot of words that don't explain anything. I've seen other places of people using DISM commands, but it doesn't explain what they do. I know DISM is used for working with images before deployment, but people are using it … |
|
Re:
So I am really not sure what the name of this device is as I have been trying to find out for some time now, basically in my home I have terrible connect in my room to my router and would like to get a wifi repeater similar to the … |
|
In Linux, what's the difference in a service and a daemon? I know a daemon is a long running process without a terminal, meant for servicing things such as requests from other processes or server type services such as a web server or dns server. I understand that you can … |
|
I am running PVST. If I have 2 switches connected to each other over access ports, but they are configured for different VLANs, how does PVST deal with it? [Switch 1] Port 1 Access Mode VLAN 10 [Switch 2] Port 1 Access Mode VLAN 20 I know the traffic leaving … |
|
Normally you can do this and pass the reference type by reference and the new keyword won't make the variables point to different objects: static void Main(string[] args) { Object origObj = new Object(); ExampleMethod(ref origObj); } void ExampleMethod(ref Object newObj) { //origObj will also reference the newly created object … |
|
Can 2 identical IPs with different subnet masks be on the same LAN? I know you'd have to route to get between them, but is it acceptable to use the same set of IPs on 2 different subnets? |
|
Can you use any compiler, assembler, etc to output code directly for the processor and not for an executable file specific to an OS? How do you determine if you are outputting for an executable for an OS or directly for a processor? Are the instructions/code part in an exe … |
|
OK, this is specifically regarding Cisco Catalyst 2900s, 4500s, and 6500s. I've always matched my interface VLANs to my VLANs. Lets say I have VLAN 10 on a 2900, and all hosts on it have IP addresses on 192.168.10.0/24. I'd create a VLAN 10 on my 4500 and an Interface … |
|
How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will … |
|
Re:
I'm trying to write Fibonacci code for the first 100 numbers. It works until I get to number 94. 93 12200160415121876738 ok 94 1293530146158671551 mine 94 19740274219868223167 should be this I'm stumped as to why it doesn't work after 93. Can someone point me in the right direction? The code … |
|
How much of a source language's characteristics and ways of doing things is seen in a compiled executable? Let's say you use C++ and BASIC (compiled) to write 2 programs that functionally do the same thing. You compile them both on the same computer(and OS of course). How different will … |
|
I am confused about Android user rights. A lot of times you have to root your phone to get access to do things, but some programs run on a non-rooted phone in a way that would seem they have root access. Examples would be AppLockers, Antivirus programs, and Safe Browsing … |
|
Hello, I'm having a hard time when thinking about methods that belong to objects. Most documentation tells us that objects contain the data and actions for the data. When running as program though, the methods seem like they are actions that belong to the program (get put on the stack … |