Solved

Mouse extender

Posted on 2010-09-15
2
353 Views
Last Modified: 2012-05-10
I want to extend my mouse because the tower is too far away.  Do I need a "USB A Male to A Female Extension Cable"?  This is the one that I am looking at.

http://www.newegg.com/Product/Product.aspx?Item=N82E16812119125&cm_re=A%2fMale_to_A%2fFemale-_-12-119-125-_-Product
0
Comment
Question by:HBMI
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 8

Accepted Solution

by:
brittonv earned 125 total points
ID: 33682216
Yes, or better yet, go wireless!
0
 
LVL 2

Assisted Solution

by:sushil_dias
sushil_dias earned 125 total points
ID: 33682220
Yes, thats just the one you need.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Mount cloned RDM in Windows VM without formatting 6 107
VMware - Migrating 1 57
VM replication scenario and caveats ? 6 115
Backup Strategy 13 63
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question