Solved

ATTENTION: Neo_mvps

Posted on 2002-03-23
2
220 Views
Last Modified: 2010-04-08
150 points here for split question at  http://www.experts-exchange.com/jsp/qShow.jsp?qid=20280520

Thanks.
0
Comment
Question by:lindsay50
  • 2
2 Comments
 
LVL 16

Accepted Solution

by:
Neo_mvps earned 150 total points
Comment Utility
your welcome.
0
 
LVL 16

Expert Comment

by:Neo_mvps
Comment Utility
lindsay50:  please award the points on this.

thanks
/neo
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
Follow this checklist to learn more about the 15 things you should never include in an email signature from personal quotes, animated gifs and out-of-date marketing content.
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
This Experts Exchange video Micro Tutorial shows how to tell Microsoft Office that a word is NOT spelled correctly. Microsoft Office has a built-in, main dictionary that is shared by Office apps, including Excel, Outlook, PowerPoint, and Word. When …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now