Solved

dummy test

Posted on 2000-02-28
11
870 Views
Last Modified: 2012-11-28
dummy test
0
Comment
Question by:diakov
  • 5
  • 4
  • 2
11 Comments
 
LVL 7

Accepted Solution

by:
conick earned 0 total points
ID: 2565240
Meaning anyone who leaves a comment to this question is a dummy?
Come On.
Who would fall for that?


whoops :)
0
 
LVL 8

Author Comment

by:diakov
ID: 2565253
I wanted to test the ee interface a bit.

Cheers,
  Nik
0
 
LVL 7

Expert Comment

by:conick
ID: 2565815
Yeah, I was just trying (unsuccessfully) to be funny.
0
 
LVL 8

Author Comment

by:diakov
ID: 2566123
Oh no, it was successful. ;-)
I just didn't type it in.

See you around,
  Nik
0
 
LVL 8

Author Comment

by:diakov
ID: 2914495
Just testing whether comments can interpret HTML...

<img src="http://wwwhome.cs.utwente.nl/~diakov/S_nikolay.jpg" alt="photograph" width="162" height="226">


....
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 8

Author Comment

by:diakov
ID: 2914498
No, I guess not...
0
 
LVL 8

Author Comment

by:diakov
ID: 2914511
They use quotation for all html artefacts...
0
 
LVL 27

Expert Comment

by:d-glitch
ID: 38632918
I am also using this question to test the EE interface.
You can unsubscribe if you are annoyed by the beeping.

           http:#a2565240
0
 
LVL 27

Expert Comment

by:d-glitch
ID: 38632967
      http:#a2565240  

Open in new window

0
 
LVL 27

Expert Comment

by:d-glitch
ID: 38633442
A question link:

  http:Q_26928867.html


Use the Unmonitor Button (at the top left of the page) to get out of the loop.
0
 
LVL 27

Expert Comment

by:d-glitch
ID: 38640265
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
What is JNDI datasource in spring 1 50
Eclipse Neon and jdk 1.8.0 11 126
web services creation SOAP vs REST 5 17
MySqlDump not dumping triggers 1 13
For customizing the look of your lightweight component and making it look lucid like it was made of glass. Or: how to make your component more Apple-ish ;) This tip assumes your component to be of rectangular shape and completely opaque. (COD…
After being asked a question last year, I went into one of my moods where I did some research and code just for the fun and learning of it all.  Subsequently, from this journey, I put together this article on "Range Searching Using Visual Basic.NET …
Viewers will learn about the different types of variables in Java and how to declare them. Decide the type of variable desired: Put the keyword corresponding to the type of variable in front of the variable name: Use the equal sign to assign a v…
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now