Solved

points for zzynx

Posted on 2004-04-09
3
207 Views
Last Modified: 2012-05-04
Here ya go!  Thanks for always helping me!!

-luna621 =^^=
0
Comment
Question by:luna621
  • 2
3 Comments
 
LVL 37

Accepted Solution

by:
zzynx earned 400 total points
ID: 10790238
Thaaaaaank youuuuuuuuuu!
:°)

>>Thanks for always helping me!!
You're welcome.


P.S. To whoever might read this:
Thesepoints are for my comments at http://www.experts-exchange.com/Programming/Programming_Languages/Java/Q_20937029.html
0
 

Author Comment

by:luna621
ID: 10790318
Oops!  Sorry!  I forgot to put the link!  I promise I'll remember to do that next time :)
0
 
LVL 37

Expert Comment

by:zzynx
ID: 10790362
Aren't you supposed to be in bed?
;°)

BTW: that means you live on "the other side" of the world, then.

Thanx
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
json example 39 135
groovy example issue 10 90
ArrayIndexOutOfBoundException 9 68
how do i compare an object based on two fields 6 49
Introduction This article is the last of three articles that explain why and how the Experts Exchange QA Team does test automation for our web site. This article covers our test design approach and then goes through a simple test case example, how …
Java functions are among the best things for programmers to work with as Java sites can be very easy to read and prepare. Java especially simplifies many processes in the coding industry as it helps integrate many forms of technology and different d…
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
This tutorial covers a practical example of lazy loading technique and early loading technique in a Singleton Design Pattern.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

28 Experts available now in Live!

Get 1:1 Help Now