Archive
Hi guys , I need your help to find a good firewall to my laptop , Right now I have kaspersky 2009 Internet Security , but I need a good firewall , which need to show what are the programs use internet most
Read moreHi guys, using the password manager (like Roboform) is a very good way to avoid key - loggers,
Please can someone suggest me a good password manager to Mozilla Firefox
Read moreHi everyone,
Can anyone answer the following questions? what are meta tags what can I do with them how to use meta tags.
Thank you
Read moreMan uses software with different purposes.
e use Microsoft Access in career life. There are different purposes of Microsoft Access.
Want detailed suggestion please.
Thanks a lot in advance.
Read moreHi friends , I am searching for a backup program that it would compare a folder on my hard drive to its backup and copy any files that are new to the folder on the backup
Thank you
Read moreHi guys ,
I have created a new website , and I need it to center align using CSS ,
Please can someone suggest me a way to do this?
Read moreI have two spreadsheets, one is my company database and the second is a spreadsheet which has manufacturing item details. What I need is something that will find the buyer from the database spreadsheet according to the id number of parts which are in manufacturing item spreadsheet, can someone help me with this?
Read moreHi guys , I have some video files at the end of the file name it says fxg , I never heard that file type before , please can someone suggest me a player to play those video files
Thank you
Read more
Hi guys, Please consider the following code segment and tell me what are the values of @y and @z after executing the code segment
@num = (2,16,4,32);
@y = reverse(@num);
@z = sort{$b <=> $a} @num;
Hi guys ,I need some explanation about the concept of “weakly typed programming language” , and some examples of weakly typed languages
Read more