Misplaced Pages

:Reference desk/Computing: Difference between revisions - Misplaced Pages

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
< Misplaced Pages:Reference desk Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 06:04, 18 July 2016 edit71.110.8.102 (talk) Current existence of InterNIC← Previous edit Latest revision as of 00:05, 29 December 2024 edit undoScsbot (talk | contribs)Bots239,707 edits edited by robot: adding date header(s) 
Line 1: Line 1:
<noinclude>{{Misplaced Pages:Reference desk/header|WP:RD/C|WP:CHD}}
<noinclude>
]
{{#ifeq:{{PROTECTIONLEVEL:edit}}|autoconfirmed|{{pp|small=no}}}}
]
{{Misplaced Pages:Reference desk/header|WP:RD/C}}
]
]
] ]
] ]
]
]
</noinclude> </noinclude>
= July 13 =


== Windows 9x == = December 13 =


== Where can I find a thesis of recently released Gemini 2.0? ==
Theoretically if Microsoft had continued to develop and invest in the DOS-based Win9x line instead of switching to NT, could they have produced a 64-bit OS running on-top of DOS that took full advantage of modern hardware capabilities? <!-- Template:Unsigned IP --><small class="autosigned">—&nbsp;Preceding ] comment added by ] (]) 14:39, 13 July 2016 (UTC)</small> <!--Autosigned by SineBot-->


For , I find its ].
:There is no reason that DOS couldn't be altered and compiled to take advantage of a 64-bit CPU. Keep in mind that jumping to 64-bits isn't always an advantage in every single possible application. So, playing an old DOS game in 64-bit DOS won't make it better. ] (]) 16:06, 13 July 2016 (UTC)


What about recently released ? ] (]) 21:53, 13 December 2024 (UTC)
::Well, this entails a sort of ].... When does a sufficiently-modified DOS system cease to be DOS anymore? If you add all the code, piece by piece, to make DOS behave like a modern system... haven't you ended up replacing it with the modern software?
::A lot of features you take for granted today were absolutely missing from DOS. For example, the DOS operating system provided very little in the way of memory management, and essentially zero memory protection. Could you use a modern Intel CPU architecture in ] and still call it "64 bit"?
::DOS did not provide ]. There was no thread model, and there was no process model; these software abstractions simply did not exist and were not provided as a system service; obviously, there was no multi-CPU support either. Application software either ran serially, or used hardware interrupts, or used an application-provided threading model.
::DOS never provided support for the ]. The entirety of computer network application software that we now know and love - things like web browsers, for example - would require application-provided network abstractions and hardware device drivers.
::You can read about DOS in our articles; and if you are technically adept, you can study ] and ], or download their source code, to see what DOS programming looks like in the 21st century.
::Don't be fooled by superficial appearances: although many new systems provide a ], modern systems are very dissimilar from DOS. DOS did ''very'' little, compared to modern system software; consequently, many DOS application programmers had to write lots of difficult, non-portable software to make their application features work. You should not fall into the trap of conflating all text-mode systems with DOS. For example, you can run a terminal or shell in most operating systems, but that's not DOS. If you really dislike colorful graphics, - or linux or , for that matter - to a text-only-mode command-line terminal... but these modern operating systems still do things ''much'' differently than DOS.
::] (]) 09:04, 14 July 2016 (UTC)


:? &nbsp;--] 21:55, 14 December 2024 (UTC)
::::I'm not sure I understand the point you are trying to make. You go on and on about the limitations of DOS, such as lack of network support, memory management, web browsers, protected mode, etc but ignore the fact that versions of Windows built upon DOS such as Windows 95, 98, and ME provided all of those things. Since the question was about a hypothetical modern version of Windows built on DOS, I do not see how limitations of vanilla DOS that were overcome years ago in previous versions of DOS-based Windows are at all relevant to this question. ] (]) 12:36, 14 July 2016 (UTC)
:::::Maybe it will help if you clarify exactly what you think DOS is. Have you read our article section on ]? ] (]) 18:09, 14 July 2016 (UTC) ::OK That's Gemini 2.0 release information. ] (]) 16:52, 15 December 2024 (UTC)
::::::I'm not sure why you are still going on about DOS. I asked about Windows9x which uses DOS as a boot loader but is obviously not DOS itself. I don't need to explain to you what DOS is since I didn't ask about DOS, I asked about Windows9x. Maybe reading ] will help you? You're acting as though I asked if DOS itself could be turned into a 64-bit OS with a GUI (which obviously it could) and then debating with yourself about whether such a system should still be defined as "DOS", but that wasn't what I asked at all. It's quite clear that my question is about Windows9x, not DOS. The title of this section is even "Windows9x". So quite why you are so determined to derail my question into a debate on DOS is a mystery to me. ] (]) 18:29, 14 July 2016 (UTC)
:::<small>Instead of the paradox you mentioned, how about the ] paradox, which deals with replacement of components rather than removal ? ] (]) 12:03, 14 July 2016 (UTC) </small>
:::For the sake of comparison, ] (and yes, I am specifically talking about the Linux kernel here) originally ran only on ] systems. The Linux kernel of today has basically no code from the original 1991 kernel. So the answer is yes, Microsoft ''could have'' decided to retrofit DOS bit by bit into a modern operating system. They decided not to because they felt the ] architecture was more elegant and extensible (], who previously worked on the venerable ], was lead designer), and switching to it would eliminate the ] of the Windows 9x line, as well as the redundancy of maintaining two separate operating system product lines. --] (]) 03:07, 15 July 2016 (UTC)


= December 15 =
== What happens exactly when you clone your SIM card ==


==Questions About New Laptop Computer==
If you clone your SIM card and use both the new and old card at the same time, how will the phone company react? How will they discover it? Is there a central server with a list of all numbers and where they are? What if one card accesses the network through roaming? ] (]) 16:21, 13 July 2016 (UTC)
My old laptop computer developed problems with the power, so that it wouldn't start when connected to regular line current. It would start when connected to high-amperage current in an electronics store, but that wasn't useful, and it was time to replace it after five years. I now have some questions about problems with a new laptop computer. The new laptop computer is an HP running Windows 11. ] (]) 04:43, 15 December 2024 (UTC)
===Cursor Jumping Randomly===
Sometimes when I am typing in a Word document or editing Misplaced Pages in a source window, I discover that the cursor isn't where I think it should be. The cursor has jumped to somewhere else on the screen, apparently randomly. I have to do a Ctrl-Z to undo what I typed in the wrong place, and then move the cursor back to where I want it. If this is caused by line noise, how do I minimize the impact? How likely is that a new mouse would resolve the problem? Are there any settings that I should diddle with?
] (]) 04:43, 15 December 2024 (UTC)


:First thing I would do is give the mouse and mousepad a good clean and disconnect and reconnect it. ]|] 09:14, 15 December 2024 (UTC)
:Yes, they do keep a database, See ], ], and ]. There are special clone SIMs that disables the first SIM when switched on, but as far as I know the carrier has to turn on support for such devices.
:Possibly due to your hand brushing the trackpad while typing. If you have a mouse, you could experiment with disabling the trackpad: . Or even just try turning it off while typing. This erratic ] jumping used to happen to me a lot, too, when my laptop was new, until I found the key to disable the trackpad.
:Also see:
:The term ''caret'' or ''insertion point'' is useful to exclude the mouse cursor (the pointer) from searches. ]&nbsp;] 12:54, 15 December 2024 (UTC)
:* https://security.stackexchange.com/questions/64294/how-does-a-sim-card-prevent-cloning
::Thank you, ]. I disabled the touchpad. For users who always use a mouse, the touchpad is a complication. ] (]) 19:06, 15 December 2024 (UTC)
:* ] (warning: poor quality article; needs to be expanded and references added)
:::I now have a possibly useless question. The documentation referred to an option that disables the touchpad when there is a mouse, but the only option that I found in the settings is the option that always disables the touchpad. I would like to specify that the touchpad is disabled when there is a mouse, and enable it if there is no mouse. This makes very little difference because I will always use a mouse. Is it possible that that option isn't available on my computer? This isn't important. ] (]) 02:38, 17 December 2024 (UTC)
:--] (]) 18:13, 13 July 2016 (UTC)
::::Possibly true, your system vendor might not have put any software on there to do that automatically. The general rule with computers is, you can make it do what you want, it's just a question of how much effort is involved in that. To do stuff automatically when hardware is (dis)connected, you have to set up something that subscribes to ] events: Windows's thing for letting all interested parties know "hey some new device just showed up". Here's an answer for how to run a script when a device is connected: , if you really want to put in the effort. Alternatively if you just want something quicker and simpler but not automatic, you can install ] (quite useful program) and set a shortcut key on the keyboard to disable/enable touchpad. --] (]) 19:11, 26 December 2024 (UTC)


===Network File Sharing===
== Spy potential of Pokemon Go ==
With the old laptop, I had set up network file sharing, so that the laptop computer could view and edit files in shared folders on my desktop computer, a Dell, also running Windows 11, if they were both within range of my wireless router (and the desktop computer always is). The desktop computer could also access files in shared folders on the laptop, if the laptop was I have tried to set up network file sharing with the new laptop computer. I tried calling the technical support offered by the electronics chain that I bought the computers from, and I made seven calls to them, none of which worked, and I have concluded that their technical support people don't know what they are doing, and, worse, don't know the limits of their knowledge. Does anyone have advice on a book that will tell me how to set up network file sharing with Windows 11, that has neither too little nor too much information for a retired database engineer?
] (]) 04:43, 15 December 2024 (UTC)


:@] Did you try ? <span style="font-family:monospace; font-weight: bold"> <span style="color:ForestGreen;font-size:15px"> ]</span> (<span style="color:#324c80">she/they</span> {{pipe}} ]) </span> 20:21, 16 December 2024 (UTC)
I've been seeing a wave of newsvertisements for ] that is unrivalled since, well, Facebook Live's snuff video PR campaign, including inducing players to jump a fence to find a dead body, and it's left me thinking about how useful this app may or may not be to spy agencies, police, or even ordinary private dicks.
::] - Thank you. That describes the basics, and describes what I had done successfully with the previous laptop computer. I need either a much greater level of detail, or a troubleshooting guide, or something like that. That was helpful in that it doesn't point out anything that I am doing wrong. ] (]) 02:31, 17 December 2024 (UTC)
:::Asking for clarification: you did all the steps in the section "How do I troubleshoot sharing files and folders" on that page, on the new laptop? After doing those steps, you still don't "see" your desktop in File Explorer on laptop? (Restart the laptop just in case.) ] (]) 04:24, 26 December 2024 (UTC)
:Check that all the computers are on the same network. See if all the IP addresses are different. See if the wifi has the network profile set to Private. See if file explorer shows it in Network, or \\newlaptopname . You may have to check file wall settings ] (]) 07:29, 26 December 2024 (UTC)


= December 19 =
* Who is in charge of placing the Pokemon monsters or other targets? Is there a straightforward way for a third party to set up an attractive feature on some property they want inspected?


==Scanning all available streams==
* How do players find the targets they are looking for? Is there a general 'directory' that leads them to the land they are supposed to reconnoiter?


Hello there. I'm have a question: How to scan all available online streams from a specified server and port given? For example, I've found a Wowza Streaming Engine server at 115.79.46.164 and port 1935. I want to know which website or software can help me to find all active streams on this server. Thanks for reading. ] (]) 14:22, 16 December 2024 (UTC)
* Is the game known to ''upload'' the video the phone is taking in order to put the cartoon figure on the screen, or is that done locally?


: ] -- ]'''··–·'''] 17:02, 16 December 2024 (UTC)
* Does the game have a way of collecting data about things in the area, e.g. other cell-phones, Wi-Fi identifying numbers, etc.?
:nmap is just going to let you toss packets to the server and inspect the packets that server decides to send you back in reply. Which is great for networking analysis, but we want to speak ] here and talk with the "streaming" software on the remote host. Does help at all? (You will need ] if not already installed.) Do take note, the party which owns the server could always have configured it to restrict the information it will give out to the public. --] (]) 19:32, 26 December 2024 (UTC)


== .kp domains ==
* If a player trespasses in order to happen across evidence, is there any possible legal argument that he is a "police agent" if it could be shown that police put the target on his map, or does his personal decision to trespass to play the game put an end to any attempt to claim a warrantless search?


How many .kp domains are there? ] (]) 13:10, 19 December 2024 (UTC)
* I've read about players being lured to police stations to hunt Pokemon, with cops complaining about it; is there any way to lure a ''particular'' player to a police station without luring all of them, say if that particular one had outstanding warrants?
:Did you see ]? ] (]) 19:10, 19 December 2024 (UTC)
:https://www.northkoreatech.org/the-north-korean-website-list/ is a bit outdated but has more background info. ] (]) 19:20, 19 December 2024 (UTC)
::It's ok, bro. I can still view the outdated ones with the Wayback Machine at the Internet Archive. Thanks, ] (]) 16:10, 20 December 2024 (UTC)


* Are players being lured near crack houses and other highly hazardous features that someone might want to have periodic video surveillance of? I didn't see this one but it seems like an understandable "accident" to have happen.


] (]) 23:00, 13 July 2016 (UTC)


= December 24 =
Update: there's a discussion of this and better ; some users are skeptical that there is video uploading going on based on the reported bandwidth. However, apparently the app actually has the user take a picture, which is a more limited amount of data. The privacy policy is and doesn't specifically say video is uploaded; it's wording is pretty much the longwinded way of saying "absolutely none" used in any privacy policy online. One user said that "Pokemon GO is owned by ], which was formed by ], which was funded by the CIA's venture capital arm ]". Checking this out, the second part is true (see ]); the first part omits that Keyhole was first acquired by Google, putting its cofounder in charge of Google Maps (gee, never would have guessed...) before eventually the department was spun off as Niantic. I don't know how much this really means though, since I don't actually know nowadays that it is possible in a capitalist economy for a company to be created without the CIA effectively in charge of it. Also, none of this really answers the practical questions, just reinforces the underlying suspicion. ] (]) 11:47, 14 July 2016 (UTC)
*OK... So, you are at the reference desk, made to ask factual questions, not to promote tinfoilhattery. While "is there a large-scale conspiracy that released Pokemon Go to improve their spying" is somewhat factual, it is unreasonable to expect Misplaced Pages editors to give an appropriate answer (although ] likely applies).
:Did the CIA/Mossad/whatever fund the development/release of PG to improve their sensors? Probably not. Does the CIA/Mossad/whatever try to interfere with the players' connections to snoop on their private data? Probably.
:Does the CIA/Mossad/whatever pay/coerce the Pokemon Go Head of Spawning Operations (or hacked the servers that handle that task) in order to push some people to some places for some reasons? Unlikely. It is not cost-efficient for the rabble, and getting a tracker (GPS data exchanged between the PG servers and the player's device can be more easily intercepted than spoofed) on a mafia boss or international terrorist is so valuable that you do not want to lose it if they feel there is something weird with the spawns.
:]<sup>]</sup> 15:48, 15 July 2016 (UTC)


== Is this bug in the google search ? ==
::I prefer the conspiracy theory at '''''' ... :)   --] (]) 06:39, 16 July 2016 (UTC)


I searched for the keywords: "Israel Folau" "Margaret Court" "David Tyree", then Google shows me . Is this bug?] (]) 22:35, 24 December 2024 (UTC)
:FWIW I found another article saying that the game manufacturers had inexplicably gotten millions of users to sign over access to their Google accounts, and to accept that the program would have access to their stored documents, before deciding that was just an accident and they didn't really need access to the information. <small>I remember in the 1990s that some people would say I believed "conspiracy theories" about the government tapping all our communications, but I wouldn't have expected anyone to continue to try to hold that kind of line ''nowadays''.</small> ] (]) 11:38, 16 July 2016 (UTC)
:If I do the same search, this question shows up (twice, due to how the refdesk is organized) plus a link to Stuff. So, it doesn't seem to be a bug. I tried the same format search with much more famous people and got hundreds of links. ] (]) 13:20, 25 December 2024 (UTC)
::Remember that Google has numerous servers that can respond to your search, and they do not necessarily all behave the same. --] (]) 22:17, 27 December 2024 (UTC)


::U.S. intelligence agencies and their partners already have access to anything they want at Google through ]. Why would they need to create a secret spy app and try to get people to voluntarily install it to obtain access that they already have? Also, why would they stop after being asked about it? Why not just say they need the access because reasons? --] (]) 06:40, 17 July 2016 (UTC)


= December 28 =
:::Well, as I said above, lesser actors like ordinary police or private individuals might want the data. But it's true that this news, however interesting, strays from my initial thoughts about the program being useful to put cameras and specific individuals where you want them, which goes well beyond mere spying. ] (]) 13:15, 17 July 2016 (UTC)


== File disambiguators (1): Explorer/W11 ==
===Link Sought===
''Pokemon Go'' for ''PC'' and ''.apk'' for ''Smartphone'' is sought please. Regards. -- ] (]) 04:31, 14 July 2016 (UTC)


Óla! So Explorer adds (''n'') to a file with a duplicate name to an existing one. Do you have suggestions how to easily identify and delete them? The search option doesn't recognize parentheses, so a search would merely identify files with that number in the title. The reason for asking is that if a folder has a large number of duplicates that should be deleted, it would be easier to sort/select/delete rather than ctrl+click individually. Thank you! ] (]) 16:31, 28 December 2024 (UTC)
:Pokemon Go for PC doesn't exist, but tells you how it can be done using an Android emulator. It was the first result when I googled "Pokemon Go for PC". I don't use them myself, but I assume the .apk file can be obtained from the usual app sources. ] (]) 14:13, 14 July 2016 (UTC)
:https://www.alldup.de/alldup_help/alldup.php and then set it to compare 100% of the content. ] (]) 17:16, 28 December 2024 (UTC)
::Thank you ], that's great, and freeware too. It looks like it might take some getting used to! Cheers, ] (]) 18:13, 28 December 2024 (UTC)


= December 29 =
*Downloading .apk from third party sources is probably a bad idea, since (1) such third-party may have added any code they like (that you ''will not'' like) to it, (2) the standard process of updates is broken, and other potential issues. PG is available for download through the usual sources if you are in the area of deployment. ]<sup>]</sup> 15:48, 15 July 2016 (UTC)

* It's possible to play Pokemon Go on the PC , but that's against the terms of service of the game and will likely get your account banned. As for a download for smartphones, ] has a . As Tigraan said, third-party sites may maliciously modify the APK, so download at your own risk. ]<sub>(])</sub> 16:02, 15 July 2016 (UTC)

::The big problem with third-party sites is the attitude that they MIGHT add malicious content to the code. There is a very minuscule chance that there might be some malicious content. Out of a billion files, you might find one that has malicious code. That is completely false. The reality is that third-party sources usually host malicious code. The often host malicious code. You should expect malicious code. Even well-known sources like CNet have been known to add malware to the code (mainly adware/tracking code in CNet's case). So, this comment will be followed up with complaints that unless someone specifically exposes malware for a specific file, we should all assume that malware doesn't exist and download all the crap we find on the Internet. Please think it through. Why would someone pay money to host "Free" files and pay money for bandwidth so you can download them? It isn't because they are nice people. ] (]) 17:50, 15 July 2016 (UTC)
<small>Noted, and thanks all. {{=)}} -- ] (]) 18:51, 15 July 2016 (UTC)</small>

= July 14 =

== Printer ==

A Reliable and durable printer sought that can imprint a lot of papers with as less ink as possible. – say 3,000-5,000 pages in one go, 500 times with one inkjet or so. Also:

1) What kind of printers use heat/laser as ink, imprints on a special/non-special kind of paper? And, how much is it (both)?

] (]) 22:46, 14 July 2016 (UTC)
:HA Ha Ha Ha!!!--] (]) 23:30, 14 July 2016 (UTC)
::To clarify 86's comment, the OP's specifications are appropriate for a serious commercial printing establishment, not for a ] environment. is Canon's range of printers for those sort of volumes - other suppliers are available. But we are talking printers that cost about as much as a typical car. ] (]) 00:13, 15 July 2016 (UTC)

:See what ] is. The plastic dust gets molten onto paper. Todays multi function office machines, not at the SOHO entry level might already fulfill this need as dedicated printer or copier. One manufacturer owns a patend for automatic switching feed paper from next drawers. Large volume drawers with electric lift for feeding paper from top can load usually 2,000 to 3,000 sheet at once. This expensive machines make 25 to 80 prints per minute. But thats not the price and performance limit. --<span style="color:#00A000;">Hans Haase (])</span> 06:22, 15 July 2016 (UTC)

== Password-protecting SD cards ==

I bought an SD card for the sole purpose of tearing it down. But, instead of doing that, I want to know if I can play around with the password protection, temporary write protection, and permanent write protection mechanisms of it using a standard computer SD card port. I've read that most reader hardware does not have the capability to use these commands. Is this true? — ] ] 23:40, 14 July 2016 (UTC)

:Have you checked whether the ] article, or the resources it links to, answer your questions? --] (]) 02:35, 15 July 2016 (UTC)


= July 15 =

== File-system, external storage, unsafe removal ==

Do different file-systems behave differently, when an external storage medium is removed unsafely? That is, it's connected through USB and I just pull it. Would something like ext3 be more reliable than NTFS? ] (]) 00:43, 15 July 2016 (UTC)

:It depends on what features the filesystem has. ] and ] have rough feature parity—both are ]s—so between those two there's unlikely to be any significant difference. Other features like ] (not present in those two file systems) can also prevent filesystem corruption in some situations. It should go without saying that you should not make a habit of unsafely removing storage devices, and no file system features are a substitute for backups. --] (]) 02:32, 15 July 2016 (UTC)

:Aging of flash memory is caused by writing. So flash memory devices are written as less as possible. Removing the unsafe way may cause a lost of recent updates of the journal. Depending on the file system, when the journal is redundant, it is more robust due copies can be compared to the file it points and the checksum. --<span style="color:#00A000;">Hans Haase (])</span> 06:11, 15 July 2016 (UTC)

: is an interesting (if somewhat old) overview of the journaling behavior of various file systems. ], and I gather that NTFS's journaling is more or less the same as ext3's middle level ("ordered"). What this means is that you won't end up with a broken filesystem that needs fsck/chkdsk, and you won't end up with random crud (or zeroes) in a file that was never written to it, but you may end up with out-of-order overwrites. That is, if you overwrote data chunks A, B, and C in that order, then yanked the drive too early, you might find that A and C (or even parts of them) made it to the disk and B didn't.
:Note that these guarantees apply to disks that support some measure of data integrity in the first place. I've heard horror stories of SSDs being irreversibly damaged by sudden power loss (see ). That's reason enough to stop the drive first, regardless of the file system. I think HDDs are much better in this regard, even the cheaper consumer ones, but repeated sudden power loss may cause long-term damage to them too. -- ] (]) 06:37, 15 July 2016 (UTC)

::See ] and ] to get an idea how this is working. A typical horror scenarior might be caused when the block is being relocated due its number of rewrites exceeded the maximum specified. If this relocating is a map as well, the question must be asked, where is its repair procedure tool? --<span style="color:#00A000;">Hans Haase (])</span> 06:54, 15 July 2016 (UTC)

== Keybboard ==

My keyboard at some point completely ceased to function, and I am now using the super-tedious "on-screen keyboard". I likely bumped or hit something that caused this. My sleep-deprived brain is not working well, but I'm assuming this is a fairly simple issue. Any suggestions? ] (]) 02:04, 15 July 2016 (UTC)

:Is that a laptop or desktop? ] (]) 02:20, 15 July 2016 (UTC)

:What operating system are you using? Is this a wireless or wired keyboard? Have you checked that it's plugged in? If it's wireless, does it have working batteries? Have you tried restarting the system? --] (]) 02:34, 15 July 2016 (UTC)

::It's a laptop. Yes, it's plugged in, and yes I've restarted it. I'm using Windows 10, if that's what you mean. ] (]) 02:45, 15 July 2016 (UTC)

:::Try to reinstall it using the add hardware wizard to install the driver package. Otherwise, you might need to replace the keyboards. In some laptops is rather easy to remove it. You could also try to remove it, reboot, and to connect it again.] (]) 05:28, 15 July 2016 (UTC)

:The most common cause of this I've seen is a stuck key/dirt in the keys. It fails a self test at startup and then it's disabled (using Windows, anyway). Just shut off the computer, run your hand back and forth over it a few times so all the keys clatter, and see if you have a keyboard. ] (]) 10:17, 15 July 2016 (UTC)

:If your laptop has a removable battery try this: Shut down the laptop, remove the power supply, remove the battery. Wait 1 minute, reinsert the battery, reinsert the power, and start the laptop again. Even when shutdown, laptops often keep the glidepad and keyboard powered up. Doing the above procedure will reset their ]s. Otherwise, you can use an external USB keyboard for the laptop. ] (]) 11:36, 15 July 2016 (UTC)
::Thank you both!! Wnt's suggestion worked like a charm. ] (]) 03:39, 17 July 2016 (UTC)

= July 16 =

== make any page be the website entry ==

I'm in the process of making my personal website mobile-friendly. I was so glad to find out that adding the "viewport" link was all that was formally required that I just plunged in without much forethought, duplicating files, adding the link to each file, and rearranging the code so it could reasonably be compressed horizontally.

Currently, when html://www.something.com is invoked, control passes to the index.html file. So I should have planned to replace the current index.html with another of the same name. But instead, my new "index" is "arbitrary.html" and I call it with html://www.something.com/arbitrary.html. Unfortunately in each file I also coded a link back to this new home page. There are a couple of hundred files which I would have to edit individually to get it right (that is, link to index.html rather than arbitrary.html).

I did it the wrong way, but the best I could, as an amateur. Is there any way I could save myself through some kind of indirection, so that when "something.com" is entered as the URL, arbitrary.html gets executed? --] (]) 02:46, 16 July 2016 (UTC)
:What you need to implement is ]. On an ] server, this is done by editing ] - you'll need to add a line <code>DirectoryIndex arbitrary.html</code>. ] (]) 09:07, 16 July 2016 (UTC)

: Various techniques are listed at ]. The most "amateur" way might be to use the Refresh meta tag: include the tag <code><meta http-equiv="Refresh" content="0; url=arbitrary.html" /></code> in the <code><head></code> section of index.html. ] (]) 10:18, 16 July 2016 (UTC)

== Outlook time stamp ==

In sent items, is the time stamp on outlook, the time the email went into the sent items folder or the time it went to the outbox folder, if it took a while to send because either the file was large or you had connection problems? ] (]) 10:57, 16 July 2016 (UTC)

==Mouse cursor==
While I was using MS Word and MS Excel, I realised that:
# MS Word: A mouse cursor appears when you are at the left side of/in the sheet, changing its view, allowing you to select the line... How do I change this?
# MS Excel: How do I change the ''plus'' lookalike cursor/icon of the mouse cursor that displays while I’m in MS Excel?
] (]) 18:30, 16 July 2016 (UTC)

:2. No, You need for this: or the whole sheet is protected. --<span style="color:#00A000;">Hans Haase (])</span> 19:45, 17 July 2016 (UTC)
::<small>. I'll watch it some other time... -- ] (]) 05:00, 18 July 2016 (UTC)</small>

==='''Mouse cursor/icon making software sought'''===
What is highly praised in this day and age? Paid/Free? -- ] (]) 18:30, 16 July 2016 (UTC)

= July 17 =

== My SPI OLED Module has no CS pin ==

I tried to connect a 0.96" 128x64 monochrome OLED display to my Arduino Nano.

http://www.electrodragon.com/product/0-96-12864-oled-display-iicspi/

They look like the ones on this page even though their backs are a little different.

I purchased each of both types. The I2C OLED worked as advertised but the I2C/SPI one has some issues.

The OLED shown on the webpage has 7 pins while mine has only 6 pins. Mine has all the pins except for CS (Chip Select).

My I2C/SPI module has soldering pads in its back that says "I2C" and "SPI" and the SPI pads are shortened by its manufacturer. Unless I desolder them, its I2C interface is disabled. It does not provide any clue regarding its I2C address. Either 0x78 or 0x7A, I guess. I'll probably never use its I2C mode.

My I2C module with an address of 0x78, has a 470k resistor soldered between the 0x78 bonding pads in is back side. This resistor can be detached and soldered on the 0x7A pads. It's painful to work on these itsy-bitsy SMT parts. But at least I can still manage to have two of them on the same I2C bus.

Does it mean my I2C/SPI OLED module will always have its SS (select) line set at low?

Does it mean I can never use two of these I2C/SPI modules on the same SPI bus? -- ] (]) 03:13, 17 July 2016 (UTC)

: By the way, these OLED modules are not defective. They were custom made for their particular customers. That's why there are so many similar OLED modules on the market with similar but different circuit board designs. They were built for special purposes and unshipped productions went to the hobbyists. They are badly documented at best. Some of them have no documentation at all. -- ] (]) 04:07, 17 July 2016 (UTC)

:: I daresay you can use GPIO pins on the Arduino as outgoing CS pins, and AND these (with external glue logic) to each display's drop of the I2C bus (which is effectively how chip-select would work if the displays themselves had a CS pin). In any event, the I2C address space is so small you can resort to bruteforcing to figure out what address a specific part has. -- ]'''··–·'''] 21:26, 17 July 2016 (UTC)

== Files that I have deleted and thrown in the Trash-can, only to empty the trash-can afterwards, is it possible to recover those files ? ==

Files that I have deleted and thrown in the Trash-can, only to empty the trash-can afterwards, is it possible to recover those files ? If so, how ? Tell me step by step if you're willing.

Thank you. ] (]) 06:51, 17 July 2016 (UTC)

:The first place to look is on your backup media, but if that is somehow not available then you might like to try something from our ]. Before you do anything else, stop saving any files to the drive from which the files have been deleted because these might overwrite the space where your deleted files were stored. There is no guarantee that the deleted files will still be there, but and ]. ] 08:02, 17 July 2016 (UTC)

Thank you ] (]) 12:15, 17 July 2016 (UTC)
::It depends how badly you want the data back. For critical data, there are professional data recovery services but they are not cheap. Much more expensive than the cost of a backup disk. If you do want to go down that route, stop using the computer immediately. ] (]) 00:39, 18 July 2016 (UTC)

== Binary Calculation ==

While doing binary calculation such as : 11001+110*101011 Can we use BODMAS rule here or not? <!-- Template:Unsigned --><small><span class="autosigned">—&nbsp;Preceding ] comment added by ] (] • ]) 13:57, 17 July 2016 (UTC)</span></small> <!--Autosigned by SineBot-->

:In the absence of any indication of a left-to-right convention, one would assume that algebraic ] (BODMAS) is appropriate. For clarity, brackets (parentheses) should be shown when the calculation is not obviously algebraic. ] 15:54, 17 July 2016 (UTC)

:In mathematics, the normal order of operations always applies when arithmetic operators are applied to numbers. It doesn't matter how the numbers are written (decimal, binary, hex, or ] for that matter). However this is the computing reference desk. If you're asking whether the order of operations applies in some particular programming language, you'll need to specify which language you're using. Almost all programming languages use the BODMAS rule too, although there are exceptions like ] and ]. ] (]) 16:26, 17 July 2016 (UTC)
::It doesn't even matter if + and * are actual addition and multiplication rather than, say, bitwise OR and bitwise AND (I don't know enough math but I'm sure deep down + and OR and similarly * and AND, are one and the same operation, or are special instances of some third operation. It isn't called "sum of products" and "product of sums" for nothing!) ] (]) 23:32, 17 July 2016 (UTC)

== Current existence of InterNIC ==

Does anyone know about ]? Please go to the discussion at ] --] (]) 17:48, 17 July 2016 (UTC)

:The ] that formerly operated under the name "InterNIC" is now operated by ]. It probably lives in a giant data center in ], with the rest of Verisign's (]) internet backbone hardware.
:I doubt that very much of the server infrastructure has been physically located at 333 Ravenswood Avenue since the 1980s, so this transition was probably mostly an administrative transfer. One could probably make the case that the ] are, ''de facto,'' the new root-level arbiters, anyway, so it's ''almost'' moot to discuss who controls the root name servers and routing tables. As far as InterNIC itself, it always was, and still remains, a ] (not an organization). The mark is assigned to the ] (a part of the United States Government) and is administered by ], which is a special organization that still exists and has special operational involvement with the basic technology and policy infrastructure that most people call "The" Internet. ] (]) 20:28, 17 July 2016 (UTC)

::Nitpick: as the article says, most of the root "servers" are actually a bunch of servers spread around the globe using ]. --] (]) 06:04, 18 July 2016 (UTC)

= July 18 =
== Another ] Problem, kindly help ==
It has just two or three, or may be one more grounded terminal (for negative ] output) but several positive terminals, so many that they need numbers to be told apart. But the project I'm working on needs only one positive output (for a certain anode in the project) and lots of, literally dozens of, for cathodes that had to be fed negative DC. Of course, I can't feed all the cathodes from a single Arduino source, since the whole meaning of using the programmable micro-controller is to provide different cathodes at different times. Any solution, please ? ] (]) 00:28, 18 July 2016 (UTC)

== On some pages about Head Mounted Displays, you see a list of games suported by some brand of HMD, what does this mean? ==

On some pages about Head Mounted Displays, you see a list of games suported by some brand of HMD, what does this mean? Can't we just open a game while using HMD?] (]) 01:36, 18 July 2016 (UTC)

Latest revision as of 00:05, 29 December 2024

Welcome to the computing section
of the Misplaced Pages reference desk. skip to bottom Select a section: Shortcut Want a faster answer?

Main page: Help searching Misplaced Pages

   

How can I get my question answered?

  • Select the section of the desk that best fits the general topic of your question (see the navigation column to the right).
  • Post your question to only one section, providing a short header that gives the topic of your question.
  • Type '~~~~' (that is, four tilde characters) at the end – this signs and dates your contribution so we know who wrote what and when.
  • Don't post personal contact information – it will be removed. Any answers will be provided here.
  • Please be as specific as possible, and include all relevant context – the usefulness of answers may depend on the context.
  • Note:
    • We don't answer (and may remove) questions that require medical diagnosis or legal advice.
    • We don't answer requests for opinions, predictions or debate.
    • We don't do your homework for you, though we'll help you past the stuck point.
    • We don't conduct original research or provide a free source of ideas, but we'll help you find information you need.


Ready? Ask a new question!


How do I answer a question?

Main page: Misplaced Pages:Reference desk/Guidelines

  • The best answers address the question directly, and back up facts with wikilinks and links to sources. Do not edit others' comments and do not give any medical or legal advice.
See also:


December 13

Where can I find a thesis of recently released Gemini 2.0?

For Gemini 1.5, I find its thesis.

What about recently released Gemini 2.0? HarryOrange (talk) 21:53, 13 December 2024 (UTC)

Here?  --Lambiam 21:55, 14 December 2024 (UTC)
OK That's Gemini 2.0 release information. HarryOrange (talk) 16:52, 15 December 2024 (UTC)

December 15

Questions About New Laptop Computer

My old laptop computer developed problems with the power, so that it wouldn't start when connected to regular line current. It would start when connected to high-amperage current in an electronics store, but that wasn't useful, and it was time to replace it after five years. I now have some questions about problems with a new laptop computer. The new laptop computer is an HP running Windows 11. Robert McClenon (talk) 04:43, 15 December 2024 (UTC)

Cursor Jumping Randomly

Sometimes when I am typing in a Word document or editing Misplaced Pages in a source window, I discover that the cursor isn't where I think it should be. The cursor has jumped to somewhere else on the screen, apparently randomly. I have to do a Ctrl-Z to undo what I typed in the wrong place, and then move the cursor back to where I want it. If this is caused by line noise, how do I minimize the impact? How likely is that a new mouse would resolve the problem? Are there any settings that I should diddle with? Robert McClenon (talk) 04:43, 15 December 2024 (UTC)

First thing I would do is give the mouse and mousepad a good clean and disconnect and reconnect it. Shantavira| 09:14, 15 December 2024 (UTC)
Possibly due to your hand brushing the trackpad while typing. If you have a mouse, you could experiment with disabling the trackpad: how to disable touchpad on hp laptop. Or even just try turning it off while typing. This erratic caret jumping used to happen to me a lot, too, when my laptop was new, until I found the key to disable the trackpad.
The term caret or insertion point is useful to exclude the mouse cursor (the pointer) from searches.  Card Zero  (talk) 12:54, 15 December 2024 (UTC)
Thank you, User:Card Zero. I disabled the touchpad. For users who always use a mouse, the touchpad is a complication. Robert McClenon (talk) 19:06, 15 December 2024 (UTC)
I now have a possibly useless question. The documentation referred to an option that disables the touchpad when there is a mouse, but the only option that I found in the settings is the option that always disables the touchpad. I would like to specify that the touchpad is disabled when there is a mouse, and enable it if there is no mouse. This makes very little difference because I will always use a mouse. Is it possible that that option isn't available on my computer? This isn't important. Robert McClenon (talk) 02:38, 17 December 2024 (UTC)
Possibly true, your system vendor might not have put any software on there to do that automatically. The general rule with computers is, you can make it do what you want, it's just a question of how much effort is involved in that. To do stuff automatically when hardware is (dis)connected, you have to set up something that subscribes to WMI events: Windows's thing for letting all interested parties know "hey some new device just showed up". Here's an answer for how to run a script when a device is connected: , if you really want to put in the effort. Alternatively if you just want something quicker and simpler but not automatic, you can install AutoHotkey (quite useful program) and set a shortcut key on the keyboard to disable/enable touchpad. --Slowking Man (talk) 19:11, 26 December 2024 (UTC)

Network File Sharing

With the old laptop, I had set up network file sharing, so that the laptop computer could view and edit files in shared folders on my desktop computer, a Dell, also running Windows 11, if they were both within range of my wireless router (and the desktop computer always is). The desktop computer could also access files in shared folders on the laptop, if the laptop was I have tried to set up network file sharing with the new laptop computer. I tried calling the technical support offered by the electronics chain that I bought the computers from, and I made seven calls to them, none of which worked, and I have concluded that their technical support people don't know what they are doing, and, worse, don't know the limits of their knowledge. Does anyone have advice on a book that will tell me how to set up network file sharing with Windows 11, that has neither too little nor too much information for a retired database engineer? Robert McClenon (talk) 04:43, 15 December 2024 (UTC)

@Robert McClenon Did you try this? TheTechie@enwiki (she/they | talk) 20:21, 16 December 2024 (UTC)
User:TheTechie - Thank you. That describes the basics, and describes what I had done successfully with the previous laptop computer. I need either a much greater level of detail, or a troubleshooting guide, or something like that. That was helpful in that it doesn't point out anything that I am doing wrong. Robert McClenon (talk) 02:31, 17 December 2024 (UTC)
Asking for clarification: you did all the steps in the section "How do I troubleshoot sharing files and folders" on that page, on the new laptop? After doing those steps, you still don't "see" your desktop in File Explorer on laptop? (Restart the laptop just in case.) Slowking Man (talk) 04:24, 26 December 2024 (UTC)
Check that all the computers are on the same network. See if all the IP addresses are different. See if the wifi has the network profile set to Private. See if file explorer shows it in Network, or \\newlaptopname . You may have to check file wall settings Graeme Bartlett (talk) 07:29, 26 December 2024 (UTC)

December 19

Scanning all available streams

Hello there. I'm have a question: How to scan all available online streams from a specified server and port given? For example, I've found a Wowza Streaming Engine server at 115.79.46.164 and port 1935. I want to know which website or software can help me to find all active streams on this server. Thanks for reading. Ccv2020 (talk) 14:22, 16 December 2024 (UTC)

nmap -- Finlay McWalter··–·Talk 17:02, 16 December 2024 (UTC)
nmap is just going to let you toss packets to the server and inspect the packets that server decides to send you back in reply. Which is great for networking analysis, but we want to speak application layer here and talk with the "streaming" software on the remote host. Does help at all? (You will need curl if not already installed.) Do take note, the party which owns the server could always have configured it to restrict the information it will give out to the public. --Slowking Man (talk) 19:32, 26 December 2024 (UTC)

.kp domains

How many .kp domains are there? Gnu779 (talk) 13:10, 19 December 2024 (UTC)

Did you see .kp#Existing_and_externally_accessible_domain_list? Polygnotus (talk) 19:10, 19 December 2024 (UTC)
https://www.northkoreatech.org/the-north-korean-website-list/ is a bit outdated but has more background info. Polygnotus (talk) 19:20, 19 December 2024 (UTC)
It's ok, bro. I can still view the outdated ones with the Wayback Machine at the Internet Archive. Thanks, Gnu779 (talk) 16:10, 20 December 2024 (UTC)


December 24

Is this bug in the google search ?

I searched for the keywords: "Israel Folau" "Margaret Court" "David Tyree", then Google shows me blank. Is this bug?HarryOrange (talk) 22:35, 24 December 2024 (UTC)

If I do the same search, this question shows up (twice, due to how the refdesk is organized) plus a link to Stuff. So, it doesn't seem to be a bug. I tried the same format search with much more famous people and got hundreds of links. Matt Deres (talk) 13:20, 25 December 2024 (UTC)
Remember that Google has numerous servers that can respond to your search, and they do not necessarily all behave the same. --142.112.149.206 (talk) 22:17, 27 December 2024 (UTC)


December 28

File disambiguators (1): Explorer/W11

Óla! So Explorer adds (n) to a file with a duplicate name to an existing one. Do you have suggestions how to easily identify and delete them? The search option doesn't recognize parentheses, so a search would merely identify files with that number in the title. The reason for asking is that if a folder has a large number of duplicates that should be deleted, it would be easier to sort/select/delete rather than ctrl+click individually. Thank you! 2.28.124.91 (talk) 16:31, 28 December 2024 (UTC)

https://www.alldup.de/alldup_help/alldup.php and then set it to compare 100% of the content. Polygnotus (talk) 17:16, 28 December 2024 (UTC)
Thank you Polygnotus, that's great, and freeware too. It looks like it might take some getting used to! Cheers, 2.28.124.91 (talk) 18:13, 28 December 2024 (UTC)

December 29

Categories: