Solved

Wav files

Posted on 1997-03-01
1
163 Views
Last Modified: 2012-05-04
null
0
Comment
Question by:mkelley
1 Comment
 
LVL 2

Accepted Solution

by:
terminus earned 100 total points
ID: 1008356
It would be a good idea to copy all your wav files in the \Windows\media directory before doing this :

Go into Control Panel -> Sounds
In the event list (upper window), choose the event you would like to generate the sound (for rxample "start windows")
Click on Browse and go to the directory your wav file resides in
Select the wav file you want to play for this event
Repeat the process for all events you want to link a sound to
When finished, you can - only if you want - save these settings in a Model (lower window) : this enables you to have 2 or more "sound themes" and to be able to change between them easily, without losing your previous work.

hope this answers your question fully ...
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Advice on suitable tablet device. 13 110
Paper feed problems Epson Stylus Photo R800 4 67
security string in a noisy bar 5 87
Windows 7 Temporary Profile 4 85
The Rasberry PI is a low cost piece of hardware that you can have a lot of fun with through experimenting and building/working on projects like media players, running a low cost computer, build data loggers etc. - see: https://www.raspberrypi.org
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question