Friday, November 21, 2008

Startup Programs - Without the Startup Folder

Start/Run/Regedit

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run. Data Type: REG_SZ. Value: path to program.

Startup Sounds are missing:

Startup Sounds are missing:
TweakUI/General/Beep on errors (verify that the box is checked).
http://www.microsoft.com/windowsxp/pro/downloads/powertoys.asp

System Sounds are missing:
Go to Start/Run/Regedit and navigate to this key: HKEY_USERS. If it doesn't have a Data entry in the right pane that reads: (value not set), double click (Default) and delete it. If it does, check your HKEY_USERS\S-1-5-21 keys for the same.

Restore System Default Sounds (Line 6)
http://www.kellys-korner-xp.com/xp_tweaks.htm

This edit corrects many Sound issues:
http://www.kellys-korner-xp.com/xp_tweaks.htm

Shutdown Command - Disable

Start/Run/GPEDIT.MSC
Computer Configurations/Windows Settings/Security Settings/Local Policies/User Rights Assignment/Shut Down the System/Users/Remove.

There may be certain machines that you do not want to be shut down; for instance, a workgroup print server, or a machine in a kiosk. With this Registry edit, you can take away that option: Start/Run/Regedit
Hive: HKEY_CURRENT_USER
Key: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
Name: NoClose
Data Type: REG_DWORD
Value: 1

Show Hidden Files and Folders is Missing from Folder Options

Go to: Start/Run/Regedit HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden. Modify the string value "Type" and enter "group" as value data. After the edit is complete hit F5 to refresh.

SFC - System File Checker - (SFC /Scannow)

/SCANNOW
Scans all protected system files immediately.

/SCANONCE
Scans all protected system files at the next boot.

/SCANBOOT Scans all protected system files at every boot.
/REVERT
Windows XP: Return to default settings.

Tip: SFC sets the following registry value: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan

Tip: SFC Creates a log - Start/Run/Msinfo32/Tools/File Signature Verification Ulitity

Security Tab

To Display the Security Tab: Start/Settings/Control Panel/Appearance & Themes/Folder Options. View/Advancedand clear "Use Simple File Sharing".

Script Debugger

IE/Tools/Internet Options/Advanced/Disable Script Debugging and Display a notification about every script error.
Disable the Script Debugger in IE (Line 142)http://www.kellys-korner-xp.com/xp_tweaks.htm
How to Troubleshoot Script Errors in Internet Explorerhttp://support.microsoft.com/default.aspx?scid=KB;EN-US;q181698&

If you continue to get the errors after trying the above and/or the settings become unchecked, rename mdm.exe

When Internet Explorer detects an error on a page it has the ability to launch a script debugger to diagnose the problem. This setting controls the use of the Internet Explorer script debugging functions.
Go to Start/Run/Regedit and navigate to this key:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main

Create a new string value, or modify the existing value, named "Disable Script Debugger" and set it to either "yes" to disable the debugger or "no" to enable it. Restart Internet Explorer for the change to take effect.

Screen Saver - Set to None

Check your settings here: Go to Start/Run/RegeditHKEY_CURRENT_USER\Control Panel\Desktop

Scrnsave.exe = C:\Windows\System32\logon.scr

Verify your Time while there as well and choose accordingly:ScreenSaveTimeOut = (set your preference)

Also make sure none of the screensavers are wrapped in double quotes as in: ""c:\windows\system32\screensavername.scr""

Screen Saver - Replace

Start/Run/Regedit
HKEY_USERS\.DEFAULT\Control Panel\Desktop

Locate the SCRNSAVE.EXE entry in the right pane and modify it to the one you desire. SCR files are located in Windows\System32 by default, but you may have some add-on screen savers in the Windows folder.

Sasser - W32.Sasser Removal Tool

To prevent the 60 second shutdown: Go to Start/Run/CMD and type in: shutdown -a
Once done: Download the FxSasser.exe file from: http://securityresponse.symantec.com/avcenter/FxSasser.exe. The process takes around 15 minutes to complete and works perfectly!

Safe Mode

During a boot, tap the F8 key or go to Start/Run/Msconfig/Boot.ini and check off /SafeBoot/Apply, reboot.

Tuesday, November 18, 2008

iTunes unable to launch or communicate with iPod or iPhone

If you are getting an error "iTunes might be unable to launch or communicate with iPod or iPhone"

Try this link : http://support.apple.com/kb/TS1593,

NTLDR is missing

Issue: Error :NTLDR is missing after Windows Vista installed and Xp wont boot up.

After some digging around the internet, I found the solution:
Boot up Windows Vista, and navigate to Start (the Vista orb)-> All Programs -> Accessories -> Command Prompt, then right-click on Command Prompt and select Run as Adminstrator. Either enter your password if needed or just press continue. The new window should be titled "Administrator: Command Prompt". In the command prompt, type in bcdedit /enum active and press Enter. Locate the sections titled "Windows Legacy OS Loader". Note the identifier (all of them if there is more than one matching section); my identifier was {ntldr}. If the problem is the same as mine, the device property should be currently set to unknown. Use the command bcdedit /set (ID) device boot to change unknown to boot, that is, the partition that is active and is booting from. By default, Vista does not change which partition boots, so if your XP partition is set as active, it will add the new booting code to that. Therefore assuming your XP partition is set as the active (boot) partition, the above command will be correct. Apply the above command for each identifier, replacing (ID) with the identifier itself, including the curly braces, e.g. bcdedit /set {ntldr} device boot. Press Enter after each one - it should report that the operation was completed successfully. Rerun the command in step 2 to check that the changes were applied correctly. Test!
Note: Can refer this link to understand BCD EDIT command
http://technet2.microsoft.com/WindowsVista/en/library/85cd5efe-c349-427c-b035-c2719d4af7781033.mspx?mfr=true

Microsoft Windows Hardware Compatibilty List

For Windows Vista
http://www.microsoft.com/windows/compatibility/


For Windows XP:
http://winqual.microsoft.com/HCL/Default.aspx?m=x


For Windows 98
https://winqual.microsoft.com/download/hcl/Win98HCL.txt


For Windows ME
https://winqual.microsoft.com/download/hcl/WinMeHCL.txt

Search for a filename or a startup entry

http://www.kephyr.com/filedb/index.php?viewtopic=DHTMLED

A good site for Router's User Name and Password

http://www.routerpasswords.com/index.asp

Windows reinstall

http://www.windowsreinstall.com/

delete start up from registry

HKLM\SOFTWARE\Microsoft\Shared Tools\MSConfig\startupfolder

Saturday, November 1, 2008

How to Remove Startup Entries from MSConfig

http://cococokie.wordpress.com/2007/06/16/how-to-remove-startup-entries-from-msconfig/

Thursday, October 30, 2008

Registery cleaner

http://www.whichregistrycleaner.co.uk/

Mozilla firefox2 download

http://www.mozilla.com/en-US/firefox/


http://www.mozilla.com/en-US/launch/?utm_id=Q406&utm_source=googlecontent&utm_medium=ppc&utm_campaign=postlaunch&gclid=CInblaLugpICFQVzbgodCTbe9Q

Screen upside down

CTRL + ALT + Up Arrow Key

Downloading ie7(sp2)

http://www.microsoft.com/downloads/details.aspx?FamilyId=9AE91EBE-3385-447C-8A30-081805B2F90B&displaylang=en

Reinstall/repaire IE

http://support.microsoft.com/kb/318378/en-us

Error message when you start Internet Explorer in Windows XP: "Microsoft Internet Explorer has encountered a problem and needs to close. We are sorry

http://support.microsoft.com/kb/921470

IE optimization

http://support.microsoft.com/kb/153790

CD-ROM doesn't work

kb/929461 ,(support.microsoft.com/kb/314060) i.e HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4D36E965-E325-11CE-BFC1-08002BE10318} delete upperfilter and lowerfilter.

Antispywar removal

http://spyware-removal.thrcomputer.com/articles/free-spyware-removal.html

Antispyware

http://www.threatfire.com/download/

Antispyware doctor

http://www.pctools.com/spyware-doctor/google_pack/

IE 6 reinstallation

c:\windows\inf now find ie, right click and install.

avast anti virus

http://www.avast.com/eng/download-avast-home.html

AVG DOWNLOAD

http://free.grisoft.com/doc/2/


http://www.download.com/AVG-Anti-Virus-Free-Edition/3000-2239_4-10320142.html?tag=pop.software

Norton removal tools

http://service1.symantec.com/SUPPORT/tsgeninfo.nsf/docid/2007080716240739?Open&docid=2005033108162039&nsf=tsgeninfo.nsf&view=docid

Dial a fix download

http://www.majorgeeks.com/download4899.html

Reregister ie dll files (auto)

varun.notlong.com

jeeva.notlong.com

IE 7 uninstallation

http://support.microsoft.com/kb/927177

wireless N/W in Win XP Ser Pack 2

http://support.microsoft.com/kb/870702

Windows live messenger 8.1

http://www.microsoft.com/downloads/details.aspx?familyid=D78F2FF1-79EA-4066-8BA0-DDBED94864FC&displaylang=en

Import and export in Oulook express 6

http://support.microsoft.com/kb/270670

recover from corrupted reg in xp

http://support.microsoft.com/kb/307545

repair pst and ost outlook 2007

http://office.microsoft.com/en-us/outlook/HA010563001033.aspx

auto account setting of Live.com in outlook

http://office.microsoft.com/en-us/outlook/HA102225181033.aspx#4

http://www.softpedia.com/get/Office-tools/Other-Office-Tools/Microsoft-Office-Outlook-Connector.shtml

Smitfraud fix download

http://www.bleepingcomputer.com/files/smitfraudfix.php

Spybot download

http://www.safer-networking.org/en/download/index.html

Nero 8.0 Trial Version

http://www.nero.com/eng/downloads-nero8-trial.php

Combofix download (for malware remove)

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Super Antispyware download

http://www.superantispyware.com/downloadfile.html?productid=SUPERANTISPYWAREFREE

wireless configuratin demo

http://www.expertvillage.com/video/17057_wireless-router.htm

Wireless configuration

http://www.microsoft.com/athome/moredone/wirelesssetup.mspx


http://technet.microsoft.com/en-us/library/bb457016.aspx

Malicious Software Removal Tool

http://www.microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

Add email client in IE

http://msdn2.microsoft.com/en-us/library/aa753633(VS.85).aspx#

driver information (astra32) download

http://www.astra32.com/download.htm

HOt Fix Activation Link

http://support.microsoft.com/kb/827349

Task Manager Enable

http://support.microsoft.com/kb/555546

http://windowsxp.mvps.org/Taskmanager_error.htm

To Fix error on Desktop (Hijack)

www.download.com/Trend-Micro-HijackThis/3000-8022_4-10227353.html



http://hijackthis.de/

To Fix error on Desktop (Hijack)

www.download.com/Trend-Micro-HijackThis/3000-8022_4-10227353.html



http://hijackthis.de/

email account in Outlook of comcast

http://www.comcast.com/Customers/Faq/FaqDetails.ashx?Id=2364

open outlook with contact

http://office.microsoft.com/en-us/outlook/HA010347711033.aspx

WeatherBug Gadget download

http://weather.weatherbug.com/desktop-weather/windows-vista.html

Windows Update Error code 0×8024402c

http://www.petri.co.il/forums/showthread.php?t=17312


http://infotechsolutions.wordpress.com/2006/11/10/windows-update-error-code-0x8024402c/


http://forums.techarena.in/showthread.php?t=888551

Download XP Service pack 2

http://www.microsoft.com/downloads/details.aspx?FamilyID=1a8ce553-ab76-4a63-99da-b4ed914c1514&displaylang=en

Windows Antivirus 2008 removal tools

http://www.xp-vista.com/spyware-removal/antivirus2008-antivirus-2008-removal-instructions


http://www.internetinspiration.co.uk/roguefix.htm#uninstall


http://www.symantec.com/security_response/writeup.jsp?docid=2007-101010-0713-99&tabid=3


http://www.bleepingcomputer.com/forums/topic111715.html

your uninstaller

http://www.softpedia.com/progDownload/Your-Uninstaller-Download-29334.html#download_locations

windows cleanup utility

http://support.microsoft.com/kb/290301

Root Drive file limitation

http://www.techsupportforum.com/microsoft-support/windows-xp-support/224378-error-directory-file-cannot-created.html

.pst repair tool

http://www.emailaddressmanager.com/outlook/repair.html

event id tracker

http://www.eventid.net/display.asp?eventid=1110&source=

You cannot add a printer and you receive printer spooler error messages in Windows XP

http://support.microsoft.com/kb/324757

Computer Starts Only in Safe Mode and System Restore Does Not Work Properly

http://support.microsoft.com/?kbid=305671

Monday, October 27, 2008

Registry Hives


A hive is a logical group of keys, subkeys, and values in the registry that has a set of supporting files containing backups of its data.
Each time a new user logs on to a computer, a new hive is created for that user with a separate file for the user profile. This is called the user profile hive. A user's hive contains specific registry information pertaining to the user's application settings, desktop, environment, network connections, and printers. User profile hives are located under the HKEY_USERS key.
Registry files have the following two formats: standard and latest. The standard format is the only format supported by Windows 2000. It is also supported by later versions of Windows for backward compatibility. The latest format is supported starting with Windows XP. On versions of Windows that support the latest format, the following hives still use the standard format: HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE\SAM, HKEY_LOCAL_MACHINE\Security, and HKEY_USERS\.DEFAULT; all other hives use the latest format.
Most of the supporting files for the hives are in the %SystemRoot%\System32\Config directory. These files are updated each time a user logs on. The file name extensions of the files in these directories, or in some cases a lack of an extension, indicate the type of data they contain. The following table lists these extensions along with a description of the data in the file.


Wednesday, October 22, 2008

Stop c000021a {Fatal System Error}

Error Message: Stop c000021a {Fatal System Error} The Session Manager Initialization System Process...

http://support.microsoft.com/kb/317189

Out look error---The server could not be found. (Account:account name, POPserver:'mail', Error Number: 0x800ccc0d)

How to troubleshoot error messages that you receive when try to send and receive e-mail in Outlook and in Outlook Express

http://support.microsoft.com/kb/813514

pst size upto 2GB in outlook

http://support.microsoft.com/kb/832925

http://support.microsoft.com/kb/296088

Linksys Router Help

We can all use the following link to configure the wireless settings on a Linksys Router, and we can also use this link to search for more in the Linksys setup or configuration.

http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_alp.php?p_lva=4625&p_li=&p_accessibility=0&p_page=1&p_cv=&p_pv=&p_prods=0&p_cats=0&p_hidden_prods=&prod_lvl1=0&cat_lvl1=0&p_scf_lang=1&p_search_text=setup+wireless&p_new_search=1

how to register dll

You can use the Regsvr32 tool (Regsvr32.exe) to register and unregister object linking and embedding (OLE) controls such as dynamic-link library (DLL) or ActiveX Controls (OCX) files that are self-registerable. This may be necessary to troubleshoot some issues with Windows, Microsoft Internet Explorer, or other programs. It is also frequently used by program hacks
.1.) Copy the files you would like to register to [C:\WINDOWS\system32]
2.) Go to the command prompt Start --> Run --> cmd
3a.) To install/register the file type in: regsvr32 file.dll or regsvr32 file.ax3b.) To uninstall the files type: regsvr32 -u file.dll or regsvr32 -u file.ax
4.) Some type of message should be displayed that says you successfully registered or unregistered the file
Extra info:
Regsvr32 [/u] [/n] [/i[:cmdline]] dllname
/u - Unregister server
/i - Call DllInstall passing it an optional [cmdline]
when used with /u calls dll uninstall
/n - do not call DllRegisterServer;
this option mustbe used with
/i More information @ MS

Remove URLs from Restricted Zone

Method 1 - Remove URLs from Restricted Zone using Windows XP Registry Editor
CAUTION: Before making any changes to the Windows XP Registry, please backup your Windows XP
Click Start and then Run....
Type regedit.exe in the Run dialog box.
Click OK.
Navigate to:HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains
Delete all sub-keys in the Domain key.
Navigate to:HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains
Delete all sub-keys in the Domain key.
Navigate to:HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains
Delete all sub-keys in the Domain key.
Exit Windows XP Registry Editor.
Method 2 - Remove URLs from Restricted Zone using REG DELETE
CAUTION: Before making any changes to the Windows XP Registry, please backup your Windows XP
Click Start and then Run....
Type cmd.exe in the Run dialog box.
Click OK.
Type:REG DELETE "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains"
Press ENTER on your keyboard.
Type:REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains" /ve
Type:REG DELETE "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains"
Press ENTER on your keyboard.
Type:REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains" /ve
Press ENTER on your keyboard.
Type:REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains" /ve
Type:REG DELETE "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains"
Press ENTER on your keyboard.
Type:REG ADD "HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains" /ve
Press ENTER on your keyboard
Type EXIT and press ENTER on your keyboard.

RunOnce

Create a .reg file or edit it directly.

CAUTION: Before making any changes to the Windows XP Registry, please backup your Windows XP

==================================
Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"RunOnceHasShown"=dword:00000001
"RunOnceComplete"=dword:00000001

==================================

Page Cannot be displayed

http://support.microsoft.com/kb/326155/en-us

http://support.microsoft.com/kb/241344/en-us

set up your home wireless network

set up your home wireless network

http://www.microsoft.com/athome/moredone/wirelesssetup.mspx

Missing C: drive from my computer

Please get this link up dated in the KB for Missing C: drive in my computer

http://help.lockergnome.com/windows/Missing-Hard-Drive-Icon-Computer-Panel-ftopict431205.html

How to Sync music with IPod

Please go Throught the below mentioned website for on........... How to Sync music with IPod

WEBSITE-----http://support.apple.com/kb/HT1351?viewlocale=en_US

RED SCREEN OF DEATH

Red Screen of Death (RSOD) is the way Vista helps IT understand hardware problems in the computer
. BSOD (BLUE SCREEN OF DEATH) means software and drivers
issues, while a RSOD is used to hint that there is a faulty hardware in your computer. In other words, a physical damage, power failure, motherboard
, etc. So, my suggestion is write down the information of the RSOD so we can search it. We should try and boot the hard drive
in other PC (for suggestion to customer if he/she want to do otherwise this it w'd be a Out Of Scope Issue for us) to at least see if is working and safe the information. Then we should try to uncover the faulty component.

Friday, September 26, 2008

C-programming SCDL Assignment

Multiple Choice Single Answer
Question
When the method is chosen and performed on the data, the object status changes. The static object assumes :-
Correct Answer Dynamic state
Your Answer Static state
True/FalseQuestion
Functions are written to avoid rewriting the same section of code which requires oftenly.
Correct Answer TrueYour Answer
TrueMultiple Choice Single AnswerQuestion
Use case defines and describes what happens in the system in logical order. This is termed as :-Correct Answer System behaviour
Your Answer System designing
Multiple Choice Single AnswerQuestion
Due to complex interactions, interaction diagrams are usually difficult to draw & read. The remedy for this is :-
Correct Answer To split the use cases into smaller activities or tasks with specifi goals
Your Answer To split the use cases into smaller activities or tasks with specifi goals
True/FalseQuestion
A structure variable can be passed to a function.
Correct Answer True
Your Answer True
Select The BlankQuestion
The address of the zeroth element can also be passed by just passing the ________ of the array.
Correct Answer Name
Your Answer Name
Select The BlankQuestion The link between the program and the operating systme is a structure called ________
Correct Answer FILE
Your Answer stream
Multiple Choice Multiple AnswerQuestion
When an array has both rows and columns it is called as:-
Correct Answer 2-D array , Matrix
Your Answer 2-D array
True/FalseQuestion
When function is called by itself, it is known as recursive function.
Correct Answer True
Your Answer True
Select The BlankQuestion
________ is an assignment operator.
Correct Answer =
Your Answer ==
Multiple Choice Multiple AnswerQuestion
Two dimensional array has :-
Correct Answer Rows , Columns
Your Answer Rows , Columns
Multiple Choice Single AnswerQuestion
A single dimensional array has :-
Correct Answer Only rows
Your Answer Dimension never refers to no. of rows and columns
Select The BlankQuestion Operation between ________ and integer always yields an integer result
Correct Answer an integer
Your Answer an integer
Multiple Choice Single AnswerQuestion
Studying system domain, identifying classes & objects with their properties and expressing them with eight notations/diagrams is called as
Correct Answer Object modeling of system.
Your Answer Object modeling of system.
True/FalseQuestion
There is no three dimensional array
Correct Answer False
Your Answer True
Multiple Choice Single AnswerQuestion
Which function is used to close a file?
Correct Answer fclose
Your Answer fclose
Multiple Choice Single AnswerQuestion
In logical AND :-
Correct Answer Both the conditions have to be TRUE
Your Answer Both the conditions have to be TRUEMultiple
Choice Single AnswerQuestion
The language used by UA to develop Object Oriented systems is :-
Correct Answer UML
Your Answer UML
Multiple Choice Single AnswerQuestion
A sequence diagram shows an interaction arranged in time sequence in its :-
Correct Answer Logical order
Your Answer Logical order
Multiple Choice Single AnswerQuestion
In this the condition is specified at the beginning of the loop :-
Correct Answer while
Your Answer while
Multiple Choice Multiple AnswerQuestion
Which of the following are basic data types in C?
Correct Answer int , float , char
Your Answer int , float , char
Multiple Choice Single AnswerQuestion
Use case steps are executed in :-
Correct Answer Logical order
Your Answer Serial orderMatch
The FollowingQuestionCorrect AnswerYour AnswerAccess Layer under OOAObjects whose role is to communicate to data storage.Objects whose role is to communicate to data storage.Layered architecture under TSDUser interface tightly coupled with dataObjects with which user interacts.Business Layer under OOAObjects that represent business with data and behaviour.Objects that represent business with data and behaviour.UI layer under OOAObjects with which user interacts.User interface tightly coupled with data
Multiple Choice Multiple AnswerQuestion
What will be the output of the following main(){ char c='d';float f=1; printf("%c", c); printf("%f", c * f);}
Correct Answer d , 100.000000
Your Answer d , 100.000000
Multiple Choice Multiple AnswerQuestion
Which tasks are performed on opening a file in read mode?
Correct Answer searches a file on the disk , loading a file into memory in presense and returning NULL in case of absent , setting up a character pointer to the first character
Your Answer searches a file on the disk , loading a file into memory in presense and returning NULL in case of absent , setting up a character pointer to the first characterMultiple Choice Multiple AnswerQuestion
Which of the following functions are used to set all / n characters of a string to a given character?Correct Answer strset , strnset
Your Answer strchr
Multiple Choice Single AnswerQuestion
This funciton is used to convert a string to lowercase :-
Correct Answer strlwr
Your Answer strlwr
Multiple Choice Multiple AnswerQuestion
Which of the following functions are used for formatted input/output operations?
Correct Answer printf , scanf
Your Answer printf , scanf , getch()
Select The BlankQuestion
Any C statement ends with ________.
Correct Answer ;
Your Answer ;
Multiple Choice Single AnswerQuestion
The approach of object oriented analysis and design that centers on understanding how the system is actually used is :-Correct Answer Use-case-driven designYour Answer Object oriented systemMultiple Choice Single AnswerQuestion Which funciton is used to append first n characters of a string at the end of another?Correct Answer strncatYour Answer strncatMultiple Choice Single AnswerQuestion UML uses :Correct Answer OCL [ object Constraint Language ]Your Answer XML [ Extended mark up language ]True/FalseQuestion Only one comment can be given in a C programCorrect Answer FalseYour Answer FalseMultiple Choice Single AnswerQuestion It is an idendical function to strcmpi function :-Correct Answer stricmpYour Answer stricmpSelect The BlankQuestion ________ means type of return value of a function.Correct Answer prototypeYour Answer returntypeTrue/FalseQuestion strstr() finds number of occurences of a give string in another string.Correct Answer FalseYour Answer FalseMatch The FollowingQuestionCorrect AnswerYour Answerputch()displays a single characterdisplays a single charactergetche()echoes a typed characterechoes a typed character, but an enter key should be hitted.getch()does not echo a typed characterechoes a typed charactergetchar()echoes a typed character, but an enter key should be hitted.accepts a stringMultiple Choice Single AnswerQuestion Individual element in the array can be referred with :-Correct Answer SubscriptYour Answer PointerSelect The BlankQuestion ________ is logical OR operatorCorrect Answer Your Answer Select The BlankQuestion In call by reference of passing array elements, the function argument is always ________Correct Answer PointerYour Answer PointerMultiple Choice Multiple AnswerQuestion What will be the output of the following main(){ int i = 1; char c='A'; printf("%d",i * c); printf("%f",i * (c+2));}Correct Answer floating point error , 65Your Answer 65 , 67.000000True/FalseQuestion The use case may begin with no precondition or with some preconditions.Correct Answer TrueYour Answer FalseTrue/FalseQuestion If the value of a formal argument is changed in the called funciton, the corresponding changes take place in the calling funciton.Correct Answer FalseYour Answer FalseMultiple Choice Multiple AnswerQuestion Which of the following operators have 1st priority in operations?Correct Answer * , / , %Your Answer * , / , %True/FalseQuestion Real falls under secondary constantCorrect Answer FalseYour Answer FalseSelect The BlankQuestion The address of a structure ________ be passed to a function.Correct Answer canYour Answer canSelect The BlankQuestion After goto, ________ has to be mentioned to pass the control.Correct Answer label nameYour Answer label name

Sunday, September 21, 2008

How to use System Restore to log on to Windows Vista when you lose access to an account

INTRODUCTION
This article describes how to use the System Restore feature to log on to Windows Vista when you lose access to an account.

To do this, there must be a System Restore point at which the logon was successful.
1.
Insert the Windows Vista DVD, and then restart the computer.
2.
When you receive the following message, press any key:
Press any key to boot from CD or DVD.
3.
Set the following preferences, and then click Next:

Language to install

Time and currency format

Keyboard or input method
4.
Click Repair your computer, select the operating system that you want to repair, and then click Next.
5.
Click System Restore, and then click Next.
6.
Click the restore point that you want to use, and then click Next.Note Click a restore point that will return the computer to a state where the logon is successful. After you use the System Restore feature, reinstall any programs or updates that may be removed. You will not lose any personal documents. However, you may have to reinstall programs. You may also have to reset some personal settings.
7.
Confirm the disks that you want to restore, and then click Next.
8.
Click Finish, and then click Yes when you are prompted.
9.
When the System Restore process is complete, click Restart to restart the computer.
10.
After the computer restarts, click Close to confirm that the System Restore process has finished successfully.
11.
Use an appropriate method to log on. For example, log on by using an older password, or log on by using another computer account.After you log on, you must follow additional steps, depending on the scenario that you experience.

Wednesday, September 17, 2008

The Hibernate option is not available in Windows Vista

Cause:
The Disk Cleanup Utility and has been used to delete the Hibernation File Cleaner,hibernation feature is disabled.
Symptoms:
Solution:
use the PowerCfg command-line tool to enable the hibernation feature
Details:
To resolve this issue, use the PowerCfg command-line tool to enable the hibernation feature. To do this, follow these steps.
1. Click Start, type command in the Start Search box, right-click Command Prompt in the Programs list, and then click Run as administrator If you are prompted for an administrator password or confirmation, type your password or click Continue.
2. At the command prompt, type powercfg /hibernate on.

How to manually remove XP Antivirus 2008

SUMMARY
Antivirus 2008 is counterfeit anti-virus software. Antivirus 2008 usually installed itself onto your PC without your permission, through Trojan and virus. Antivirus 2008 will display fake system alerts or fake security alerts to trick user to buy the Paid Version of Antivirus 2008 (You could get Antivirus 2008 by opening an infected message in myspace or installing infected or fake video codec from video sharing websites.)
Step 1:- Stop unwanted process running in background.
Click Start then Run and type taskmgr.exe.
Click on Process tab in Task Manager and locate the following Image name(s).
rhccu2j0ejd.exe
lphc9u2j0ejde.exe
Antvrs.exe
AntvrsInstall.exe
AntvrsInstall[1].exe
Win Antivirus 2008.exe
av2008xp.exe
Highlight the Image name and Click End Process to stop.
Close the Task Manager.
Step 2:- Delete the suspicious file(s) or folder(s) from the computer
Click on Start and Run, type system, press Enter.
Locate the following file(s) and Delete.
lphc9u2j0ejde.exe
blphc9u2j0ejde.scr
Click on Start and Run, type C:\Program Files, press Enter.
Locate the following folder and Delete.
rhc75dj0e1an
Close the Window.
Step 3:- Uninstall the Suspicious program from the computer.
Click on Start and Run, type appwiz.cpl, press Enter.
Locate Antivirus XP 2008 in Add and Remove Program.
Click on Remove (Uninstall) button.
Close Add or Remove program.
Restart the computer.
Step 4:- Manual Removal of suspicious entries from Registry.CAUTION: Changing the Registry incorrectly could cause your comuter to stop working. Please make sure to create backup of registry or create system point before proceeding.
Click Start, Click run and type regedit.
Create a registry backup.Note: Some of these Registry keys and values may be random.
Locate the following registry keys, right click and Delete. HKEY_LOCAL_MACHINE\SOFTWARE\rhcnkrj0etfg HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhcnkrj0etfgHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion 'rhcnkrj0etfg'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform 'AntivirXP08'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 'SMrhcnkrj0etfg'
Restart the computer.