Solved

mouse

Posted on 2006-07-15
3
310 Views
Last Modified: 2013-12-09
hello,
can someone please tell me whats the difference between these two mouses
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=190009059302
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=120008045636
I see MICROSOFT LASER MOUSE 6000 in both and I need to buy the
best for my desktop PC.
thanks
0
Comment
Question by:aplelois
  • 2
3 Comments
 

Expert Comment

by:newbiekv
ID: 17116967
The first link that you gave is the wired 6000 laser mouse and the second one is a refurbished 6000 wireless mouse.  I would go for the wired one since it doesn't need battery and it is brand new.
0
 
LVL 70

Expert Comment

by:garycase
ID: 17117373
Both are wired USB versions of the Laser Mouse 6000.

First first link (ending in 59302) is used and is silver.

The second link (ending in 5636) is new and is black.
0
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
ID: 17117376
... either will work fine => the 6000 uses a very thin wire between the mouse and the PC to give what Microsoft calls "the feel of wireless with the control of wired".

0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question