Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

MIC?

Posted on 1998-06-14
5
302 Views
Last Modified: 2011-09-20
HOW CAN I ACCESS MICROPHONE??
0
Comment
Question by:tuki
5 Comments
 

Expert Comment

by:laercio
ID: 1019238
Follow these steps:

1) Check if the microphone os correctly connected on your sound board. The board usually have 3 or four P2 stereo connectors. You will always find one for microphone, but on several boards there is also a LINE IN input. LINE IN can't be used by a microphone, because different level of impedance and amplification.

2) To enabla microphone, use the Volume Control program (Start / Programs / Accessories / Multimedia / Volume Control). You can also reach Volume Control by double clicking the speaker icon on the Windows 95 task bar. From the main menu, select Optioons / Properties. Mark the RECORD box, and on the list of devices, mark the Microphone box. Click OK. The Volume Control Window will have the title changed to Recording Control. You will see several potentiometers. Mark the box below "microphone" and adjust the volume level to about 70 percent of the maximum (great values can cause sound distortion). Close the Recording Control Window.

3) Execute the Sound Recorder program (Start / Program / Accessories / Multimedia / Sound Recorder). Press the REC button, and you can start speaking on the microphone. After finishing, press the Stop button. Press play to listen the sound. Use File / Save, and you will save the sound to a .WAV file.

Probably you received with you sound board, a CD-ROM with several sound utilities. You will find better programs to record sound, like Creative Labs Sound'OLE. If you don't received a CD-ROM with sound utilities, you will find alternative sound programs, for exemple, on http://www.shareware.com




0
 

Author Comment

by:tuki
ID: 1019239
HOW CAN I MAKE OWN PROGRAM FOR ACCESS THE MIC??
THE MIC PORT??

0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1019240
tuki,
It would be courteous to accept laercio's answer, because he has answered your question completely.
I would suggest that you then post another question for answers about programming.
Regards,
Ralph

0
 
LVL 1

Accepted Solution

by:
YiannisVolos earned 100 total points
ID: 1019241
Hello tuki,
At the taskbar of the Windows 95 O/S double click the speaker icon to run the volume control program.
Check if the Microphone has a tick like others...
Then click the menu "Options" and the "Properties..."
Select the option recording and in the list box check the microphone. Doing that click ok to return...select the microphone again and thats it...it should work.

good luck
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1019242
It's beyond me why you would award credit to someone else who repeated laercio's correct answer.
Have you solved the problem yet?
A comment would be helpful here.
Ralph


0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
best recommendation for a hardware diagnostic tool 7 94
Server can not boot up 10 57
Dell Power edge R310 10 52
VMware Fail Over 5 47
Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question