Solved

for MBo (qow 15)

Posted on 2002-04-22
2
156 Views
Last Modified: 2010-04-04
for your soluiton at
http://www.experts-exchange.com/jsp/qManageQuestion.jsp?ta=delphi&qid=20289453

thanks for participating on this quest


meikl ;-)
0
Comment
Question by:kretzschmar
2 Comments
 
LVL 1

Accepted Solution

by:
MBo earned 50 total points
ID: 6961851
OK.
BTW, do you need interesting question for future quest?
0
 
LVL 27

Author Comment

by:kretzschmar
ID: 6961872
all suggestions are welcome :-)

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now