Advert

Java Data Types

Last edited by . Total of no comments in the discussion.

Data types in the Java programming language are basically divided into two groups – primitive data types and object references. A primitive data type is a basic building block and has full built-in support. Many other languages also support composite data types, which are build on a combination of primitive data types and may or may not have built-in support. Java Primitive Data Types Let’s discuss the available primitive data types in Java. There are 8 primitive data types in Java, which are Boolean, Char, Byte, Short, Int, Long, Float, Read More

Share on:

AAC (Advanced Audio Coding)

Last edited by . Total of no comments in the discussion.

Advanced Audio Coding (AAC) is a standard compression and encoding format for digital audio. AAC is part of the MPEG-4 standard, which was established by the Moving Pictures Experts Group (MPEG), the committee that developed the MPEG-1 and MPEG-2 standards that are used all over the world in CD-ROM and DVD discs and other technologies. AAC is similar in many ways to the popular MP3 format. The encoding and compression techniques are designed in such a way that some information is discarded because of limitations of the human ear. This Read More

Share on:

How to Modify the IRC Client to Hide Your Real Username

Last edited by . Total of no comments in the discussion.

Note: This FAQ answer was written by someone else, but I do not know who. If you know who originally wrote this, please e-mail me. Applying these changes to the source code for your ircII client and recompiling gives you a new ircII command: /NEWUSER. This new command can be used as follows: /NEWUSER <new_username> [new_IRCNAME] <new_username> is a new username to use and is required [new_IRCNAME] is a new IRCNAME string to use and is optional This will disconnect you from your server and reconnect using the new information Read More

Share on:

How to Install DirectX

Last edited by . Total of 4 comments in the discussion.

To install DirectX, it is recommended that the latest DirectX version is downloaded directly from Microsoft. Go to the DirectX 9.0c End-User Runtime download page using Internet Explorer. Click the Download button. Click the Run button to run dxwebsetup.exe immediately. Click the next Run button. Check the circle next to “I accept the agreement.” Click the Next button. Click the Finish button. Checking the DirectX Version Installed on the System Users can check which version of DirectX is installed on their computer with the DirectX Diagnostic Tool. To check which Read More

Share on:

Which is better, the underscore (_) or the hyphen (-)?

Last edited by . Total of no comments in the discussion.

Google treats hyphens as spaces. Google does not treat underscores as spaces. Because of this, the string “search_engine” will not show up in a search for “search engine”, but the string “search-engine” will show up in that search. The end result is that hyphens are much better, from an SEO perspective, than underscores. This rule seems to hold true for use in text, in file names, and in domain names.

Share on:

Convert WMA to MP3

Last edited by . Total of no comments in the discussion.

Windows Media Player has significant market penetration throughout the world. When audio files are imported from CD or DVD, the software defaults to storing the music in the Windows Media Audio (WMA) format on the target computer. Unfortunately, the WMA format is not supported by all digital music players available on the market due to being a proprietary Microsoft format. To successfully play or import on alternative music players, end-users must convert WMA to MP3 format. How to Convert WMA to MP3 with Windows Media Player An inexpensive method to Read More

Share on:

Pointers and Arrays

Last edited by . Total of no comments in the discussion.

Arrays and pointers are very closely linked together. In most contexts, C++ treats the name of an array as if it were a pointer i.e. memory address of some element. C++ interprets an array name as the address of its first element. That is, if age is an int array to hold 10 integers then age stores the address of age[0], the first element of the array. Consider the following code snippet: int *a ; // a is a pointer to an integer int age[10] ; cout<<"Enter the value for Read More

Share on:

Migrating from Exchange 2000 Server to Exchange Server 2003

Last edited by . Total of no comments in the discussion.

Preparing for Migration to Exchange Server 2003 For number of services running in existing Exchange 2000 environments, you first have to move these services to other servers, and then remove the services so that the upgrade to Exchange Server 2003 can occur. The services listed here have to be removed before migrating to Exchange Server 2003: Instant Messaging Service (IMS) Key Management Service Microsoft Chat Service Microsoft Exchange Connector for Lotus cc:Mail Microsoft Mail Connector In addition to the removing the above mentioned services, the following requirements have to be Read More

Share on:

Exchange Server 2003 Overview

Last edited by . Total of 1 comment in the discussion.

Understanding the Different Messaging Systems With shared-file messaging systems, directories and files typically reside on a file server. The structure of directories and files at the centralized file server location are commonly called post offices. The post office is the mail store for many users. Users have to access a mail box in the post office in order to access email messaging. When a user sends a message, the message or written data is stored in the directories of the post office. The recipient of the message next identifies the Read More

Share on:

How to Remove the Administrative Mode in Vista

Last edited by . Total of no comments in the discussion.

The new MS Vista operating system is trying to be much tougher on viruses, trojan horses and other forms of malware. However, to implement this tough approach, Vista employs UAC (User Account Control) as the default setting. Vista UAC while is a great tool and resource for many to have on their computer, it does get on some peoples nerves. For experienced or power users, it can be down-right annoying, the reason being that any function that can limit security requires an administrator-level user level. Moreover, one must click through Read More

Share on: