Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

SOFTWARE

Posted on 1999-01-27
1
Medium Priority
?
166 Views
Last Modified: 2010-04-27
CAN ANY  BODY  TELL  ME  WHER TO  FIND  A  PEAC  OF  SOFTWARE  CALLD  winword.exe
0
Comment
Question by:SCANNERS
1 Comment
 
LVL 7

Accepted Solution

by:
cmcgee earned 100 total points
ID: 1021085
This is the executable for Microsoft Word.

You will need the Word CD or Microsoft Office.


Craig
0

Featured Post

Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …
Suggested Courses

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question