Solved

To ITugay

Posted on 2000-03-07
2
145 Views
Last Modified: 2010-04-04
Please collect your point for answering my question (# Q1035923).

Tenx for your help!

D'Mzzl!
RoverM
0
Comment
Question by:roverm
2 Comments
 
LVL 9

Accepted Solution

by:
ITugay earned 100 total points
Comment Utility
Welcome;)

Thanx,
Igor.
0
 
LVL 12

Author Comment

by:roverm
Comment Utility
What you described was the answer exact!

Tenx again!

D'Mzzl!
RoverM
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now