Solved

solving problems

Posted on 1999-01-08
6
219 Views
Last Modified: 2010-04-27
although this question might seem not related to computers directly , but the marks that I will give for , is worth to solve it:  I like solving puzzles ,so I was wondering if you know any web site that has this kind of puzzles, the kind of puzzles that I mean , are those that train our minds to think in a structured and organized way, just like those that are asked in job interviews.
0
Comment
Question by:zakmol
  • 4
  • 2
6 Comments
 

Author Comment

by:zakmol
ID: 1014807
Edited text of question
0
 

Author Comment

by:zakmol
ID: 1014808
Adjusted points to 150
0
 
LVL 9

Accepted Solution

by:
rmarotta earned 150 total points
ID: 1014809
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:zakmol
ID: 1014810
thanks rmarotta  , but please give me some time to check them ,but if you have more , please send them. if I find it what I need , I will increase marks to 200.

0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1014811
No problem zakmol, there's no rush.
Here is a link page that should keep you busy for a while:

http://www.netlink.co.uk/users/vess/mensal.html

Regards,
Ralph
0
 

Author Comment

by:zakmol
ID: 1014812
thanks.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Stuck in voice control mode on your Amazon Firestick?  Here is how to turn it off!!!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question