Solved

Points for jhance

Posted on 2001-08-22
3
160 Views
Last Modified: 2010-04-13
For your assistance in this Q which I really apprecaited. :>)
http://www.experts-exchange.com/jsp/qShow.jsp?ta=win2k&qid=20171736

One of my problems is I know what the answer is but I have a very difficult time explaining it. One problem is that I am a terrible typist. my fingers don't want to hit the keys that my brain tells them to hit. The other problem is that I find it difficult to translate the image I have in my head into words. A picture may be worth a thousand words but I can't always figure out what those words are. hehehehe


Spencer
The Crazy One
0
Comment
Question by:CrazyOne
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 32

Accepted Solution

by:
jhance earned 170 total points
ID: 6414110
Thanks....
0
 
LVL 44

Author Comment

by:CrazyOne
ID: 6414189
My pleasure. :>)
0
 
LVL 44

Author Comment

by:CrazyOne
ID: 6414198
Tell me if that did not come through as an A. As a questioner you don't get to see what grade got assigned. I am sure I selected the A option.
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
If you need a simple but flexible process for maintaining an audit trail of who created, edited, or deleted data from a table, or multiple tables, and you can do all of your work from within a form, this simple Audit Log will work for you.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

689 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question