Solved

For Wakeup

Posted on 2002-07-09
4
243 Views
Last Modified: 2010-07-27
0
Comment
Question by:rayt333
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 18

Accepted Solution

by:
Wakeup earned 75 total points
ID: 7141699
0
 
LVL 18

Expert Comment

by:Wakeup
ID: 7141704
Hmmm...that didnt work right..........I said that I didnt need the points but if you are giving them to me, I won't mind.  I just wanted to know how he resolved his Cmos issue, so that other users will know how to fix a similar problem!  Thanks!

0
 
LVL 17

Author Comment

by:rayt333
ID: 7141900
You deserve them just as much as me.
:>)

0
 
LVL 18

Expert Comment

by:Wakeup
ID: 7141973
hehe....well thanks! much appreciated! :)
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

this article is a guided solution for most of the common server issues in server hardware tasks we are facing in our routine job works. the topics in the following article covered are, 1) dell hardware raidlevel (Perc) 2) adding HDD 3) how t…
Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question