• How to code a website like yahoo answer?

    I believe a content management system can be used to make something like Yahoo Answers. I could point you in the right direction, so you would know what to use, but I don't think that would matter, and I don't think I would be helping you by me doing this. I think you would just get more confused, and probably frustrated because you would... show more
    I believe a content management system can be used to make something like Yahoo Answers. I could point you in the right direction, so you would know what to use, but I don't think that would matter, and I don't think I would be helping you by me doing this. I think you would just get more confused, and probably frustrated because you would not know what to do next. I recommend, for you to try to familiarize yourself with MANY different topics that relate to building websites, and not just learning about content management systems. If you want to be realistic with yourself, then I think you should not expect to be able to make something like Yahoo Answers without you putting any effort into learning.
    14 answers · Programming & Design · 4 weeks ago
  • MicroSD card wont work?

    I also have a MicroSD card. My MicroSD card is working with my cell phone, and my computer. I make sure to be careful whenever I use my MicroSD card, and remove it from my cell phone, and put it back in, and same thing with my computer. I firmly put my MicroSD card inside of my cell phone, and MicroSD adapter before I put it in my computer. I... show more
    I also have a MicroSD card. My MicroSD card is working with my cell phone, and my computer. I make sure to be careful whenever I use my MicroSD card, and remove it from my cell phone, and put it back in, and same thing with my computer. I firmly put my MicroSD card inside of my cell phone, and MicroSD adapter before I put it in my computer. I think you did something wrong, and it seems you don't know what you did wrong. Unfortunately you did not give enough information, for me to be able to explain to you what you did wrong.
    15 answers · Add-ons · 1 month ago
  • How many social media accounts do you have in total?

    1. Youtube 2. Pinterest 3. Google+ 4. Linkedin I just named some popular social media accounts above that I have. Since I know how to make websites, then if I want, I can make a lot of social media accounts. I have another social media account that I made, and I created it from my own website. Right now my website is offliine. Because I am... show more
    1. Youtube 2. Pinterest 3. Google+ 4. Linkedin I just named some popular social media accounts above that I have. Since I know how to make websites, then if I want, I can make a lot of social media accounts. I have another social media account that I made, and I created it from my own website. Right now my website is offliine. Because I am working on other projects. I am planning to put it back online sometime in the future.
    32 answers · Singles & Dating · 1 month ago
  • How can I convince my parents to let me start a youtube account?

    You were not able to convince me why you should start a youtube account, so I don't know how you will be able to convince your parents. I think this is something you're going to have to figure out on your own. Another option is once you are an adult who lives independently, then you can make your own choices such as you making a youtube... show more
    You were not able to convince me why you should start a youtube account, so I don't know how you will be able to convince your parents. I think this is something you're going to have to figure out on your own. Another option is once you are an adult who lives independently, then you can make your own choices such as you making a youtube account, and you won't have to convince anyone.
    48 answers · YouTube · 1 month ago
  • Is this computer halfway decent for my mom?

    I recommend you use 1 operating system with the computer that you bought, for your mother, and I suggest you use Microsoft Windows. What your mother wants to do is just basic stuff. I don't think your mother needs to use Linux. I suggest, for your mom to use Microsoft Windows 10, but she might have to upgrade her operating system later on, and... show more
    I recommend you use 1 operating system with the computer that you bought, for your mother, and I suggest you use Microsoft Windows. What your mother wants to do is just basic stuff. I don't think your mother needs to use Linux. I suggest, for your mom to use Microsoft Windows 10, but she might have to upgrade her operating system later on, and this is if Microsoft makes a newer operating system. I saw Microsoft Windows 10 in the specs, so that's good. The specifications of the refurbished computer seems good to me according to what your mom wants to do with it. Since I can't see, and use your mom's 15 year old computer, then I would not be able to determine why it's freezing only when your mom is watching youtube videos. I have some theories regarding why her computer is freezing, but I can't determine which one is correct unless if I can see, and use her 15 year old computer.
    18 answers · Desktops · 1 month ago
  • How do I disable this window from poping up on web browsers?

    What part of "you have chosen to open" don't you understand? I think you clicked on something. Because you want to open it, and I assume the word open is a word that's normally learned as a child. Try closing your web browser, and computer, and then reboot your computer, and then don't click on whatever you clicked on that... show more
    What part of "you have chosen to open" don't you understand? I think you clicked on something. Because you want to open it, and I assume the word open is a word that's normally learned as a child. Try closing your web browser, and computer, and then reboot your computer, and then don't click on whatever you clicked on that displays the window that's in your question. Sam, I don't know if you realize what you are asking, and showing me, and everyone else here. I believe you clicked on something from this website: http://www.anceldirect.com. IF YOU STOP CLICKING ON WHATEVER YOU ARE CLICKING ON FROM THE WEBSITE, THEN YOU SOLVED YOUR OWN PROBLEM.
    12 answers · Programming & Design · 1 month ago
  • Why is my younger brother afraid of me this much?

    I don't know why you asked this question since you already know the answer. The answer is: "I end up losing it and yell at him when he keeps making the same mistake and occasionally end up hitting him (not badly)." I think you need anger management, and not an opportunity to tutor another human being.
    I don't know why you asked this question since you already know the answer. The answer is: "I end up losing it and yell at him when he keeps making the same mistake and occasionally end up hitting him (not badly)." I think you need anger management, and not an opportunity to tutor another human being.
    7 answers · Family · 2 months ago
  • How or where can I get paid to learn coding ?

    Regarding you getting paid to learn about coding. You won't be able to get paid to learn coding. It's the other way around. You can either teach yourself how to code, for free, or pay someone to teach you how to code. If you want to pay someone to teach you how to code, then I recommend, for you to attend college. Regarding you earning... show more
    Regarding you getting paid to learn about coding. You won't be able to get paid to learn coding. It's the other way around. You can either teach yourself how to code, for free, or pay someone to teach you how to code. If you want to pay someone to teach you how to code, then I recommend, for you to attend college. Regarding you earning $4,000-$6,000 per month. You won't be able to make any money as a coder if you never created something that benefits yourself, and, or other people.
    9 answers · Programming & Design · 2 months ago
  • How do I block access to these scammers?

    If you have your computer with you, and you don't allow other people to see, and, or use it, then nobody else would know what is on your hard disk drive, or solid state drive. could they access my computer anytime they want now? Maybe. How do I stop them? You would have to delete the program.
    If you have your computer with you, and you don't allow other people to see, and, or use it, then nobody else would know what is on your hard disk drive, or solid state drive. could they access my computer anytime they want now? Maybe. How do I stop them? You would have to delete the program.
    8 answers · Security · 2 months ago
  • Should I buy a demo laptop?

    I recommend you bring someone with you who is familiar with laptops before you consider buying it. I think you might regret buying the laptop if you have no, or very little knowledge of computers. I am familiar with computers. I buy computers that are on display, but before I buy a computer, I test it out. You did't say anything about the... show more
    I recommend you bring someone with you who is familiar with laptops before you consider buying it. I think you might regret buying the laptop if you have no, or very little knowledge of computers. I am familiar with computers. I buy computers that are on display, but before I buy a computer, I test it out. You did't say anything about the specifications of the laptop, and since none of us can see, and use the laptop that you are interested in, then none of us would know what kind of condition it's in.
    24 answers · Laptops & Notebooks · 2 months ago
  • Is it normal to be 24 and still living at my parents?

    I suggest first you finish your studies, and then you can find a job, so you can move out.
    I suggest first you finish your studies, and then you can find a job, so you can move out.
    13 answers · Family · 3 months ago
  • How can I convince my dad that I’ll buy myself a new laptop?

    I buy whatever I want, or need. I don't have to convince anyone about me buying what I want, or need.
    I buy whatever I want, or need. I don't have to convince anyone about me buying what I want, or need.
    17 answers · Laptops & Notebooks · 3 months ago
  • Am i getting hacked??

    I am not convinced you are getting hacked, and I will explain why. Maybe you, or someone else installed software on your computer that allows another person to take control over it. If someone else installed this kind of software on your computer, then whoever that person was probably was touching your computer. If you don't want someone else... show more
    I am not convinced you are getting hacked, and I will explain why. Maybe you, or someone else installed software on your computer that allows another person to take control over it. If someone else installed this kind of software on your computer, then whoever that person was probably was touching your computer. If you don't want someone else to move the pointer that is on your screen, then you have to make sure your computer doesn't have any installed software that will allow this to happen. I assume you don't know what is installed your computer, so I suggest you delete, and reinstall your operating system, or you can replace your hard disk drive, or solid state drive with a new one.
    5 answers · Security · 3 months ago
  • What website or software do most hackers use to hack with?

    I think penetration testing is a starting point to be able to hack something. There is software that can be used, for penetration testing, but I don't recommend you use it. You would have to go beyond the point of using software to be able find vulnerabilities in something. Because if you were to use a computer program to look, for holes in... show more
    I think penetration testing is a starting point to be able to hack something. There is software that can be used, for penetration testing, but I don't recommend you use it. You would have to go beyond the point of using software to be able find vulnerabilities in something. Because if you were to use a computer program to look, for holes in something, then you might not find any vulnerabilities, so you might end up wasting your time. If you can't find a vulnerability in something, then you won't be able to exploit it. According to what I copied, and pasted below regarding white hats, it's pretty clear you would have to use certain software to do penetration testing, but if you end up using it, then I think you will hinder yourself. There is no such thing as red team, and blue team. I believe there is such a thing as: white hat hacker, black hat hacker, grey hat hacker, and blue hat hacker. Please read below. White hat Main article: White hat A white hat hacker breaks security for non-malicious reasons, either to test their own security system, perform penetration tests or vulnerability assessments for a client - or while working for a security company which makes security software. The term is generally synonymous with ethical hacker, and the EC-Council,[18] among others, have developed certifications, courseware, classes, and online training covering the diverse arena of ethical hacking.[17] Black hat Main article: Black hat A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005).[19] The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration in hacker culture, or the ethos of the white hat hacker who performs hacking duties to identify places to repair or as a means of legitimate employment.[20] Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".[21] Grey hat Main article: Grey hat A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.[21] Grey hat hackers sometimes find the defect of a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical. Blue hat A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term Blue Hat to represent a series of security briefing events.[24][25][26]
    5 answers · Software · 3 months ago
  • Why am I so stupid and a loser in life?

    Nothing you said makes you stupid, and a loser. You said: "I'm horrible at math, science, I'm not mechanically inclined whatsoever". You didn't say you tried everything. You said: "I've failed everything I've tired in life". Art, Music, Sports, Cooking, Cleaning, Gardening, Driving Vehicles, Babysitting,... show more
    Nothing you said makes you stupid, and a loser. You said: "I'm horrible at math, science, I'm not mechanically inclined whatsoever". You didn't say you tried everything. You said: "I've failed everything I've tired in life". Art, Music, Sports, Cooking, Cleaning, Gardening, Driving Vehicles, Babysitting, etc.. Maybe you didn't try what I mentioned. If you choose to give up at doing something, then you won't become good at it. Yes, you might fail at doing something, but if you don't keep trying, then you will never become good at doing something.
    6 answers · Family · 3 months ago
  • How to deal with annoying, copycat roommate at University?

    Please carefully read what is below. Academic integrity is the moral code or ethical policy of academia. The term was coined by the late Don McCabe, who is considered to be the "grandfather of academic integrity".[1] This includes values such as avoidance of cheating or plagiarism; maintenance of academic standards; honesty and rigor in... show more
    Please carefully read what is below. Academic integrity is the moral code or ethical policy of academia. The term was coined by the late Don McCabe, who is considered to be the "grandfather of academic integrity".[1] This includes values such as avoidance of cheating or plagiarism; maintenance of academic standards; honesty and rigor in research and academic publishing.[2] Academic integrity is practiced in the majority of educational institutions, it is noted in mission statements and represented in honor codes, but it is also being taught in ethics classes and being noted in syllabuses. Many universities have sections on their websites devoted to academic integrity which define what the term means to their specific institution. Universities have moved toward an inclusive approach to inspiring academic integrity, by creating Student Honor Councils[7] as well as taking a more active role in making students aware of the consequences for academic dishonesty. Gary Pavela, Director of Judicial Programs and Student Ethical Development, University of Maryland stated that "Promoting student moral development requires affirming shared values. More colleges are starting to focus on one value that goes to the heart of the academic enterprise: a commitment to honesty in the pursuit of truth." To help with understanding of a university's level of academic integrity, Clemson University's International Center for Academic Integrity at Rutland Institute for Ethics has developed a Campus Assessment Guide which includes information for universities to survey their own current academic integrity. Apart from the Assessment Guide, the Computer Science and Engineering Department of The Chinese University of Hong Kong has invented a plagiarism detection software system named as VeriGuide. This system aims at upholding the academic honesty levels of various academic institutions (such as: universities, community colleges). Through its website, the system provides a platform for students and educators to manage and submit academic works (i.e. student assignments). The system also provides as a function of analyzing the readability of academic works and serve as an assignment collection system and database. Despite these advances, academic dishonesty still plagues the university and in the 1990s the academic dishonesty rates were as bad as, and in some cases, worse than they were in the 1960s.[8]:1 The acknowledgement of this ethics crisis is inspiring many universities to focus more on promoting common values of academic integrity. Conversely, critics have drawn attention to the fact that "teaching and learning are interrupted because faculty, in an effort to control plagiarism and protect notions of intellectual capital, are forced to engage with the students as detectives rather than as teachers, advisors, or mentors. The focus on controlling plagiarism among students is critiqued as unnecessarily legalistic and the rules more rigid than those necessarily accorded to intellectual property law (Marsh, 2004)".[8]:5 Similarly, contributions made from a societal perspective question or critique previously unexamined assumptions of the "inherent goodness, universality, and absoluteness of independence, originality, and authorship (Valentine, 2006). Authors who write about the societal dimension such as Ede and Lundsford (2001) do not suggest the elimination of notions of individual authorship and the unconditional acceptance of copying and collaboration in its place. Rather, the societal dimension highlights the need to consider both and the importance of deconstructing how the idea of the "individual author" might be serving (or not serving) the goals of teaching (learning), service, and research. ... Postsecondary education institutions are urged to step back from the mindless or fear-based ready adoption of the "turnitin culture" (Maruca, 2005) to allow for such question asking in the spirit of enhancing academic integrity and the teaching and learning environment."[8]:59
    43 answers · Family · 3 months ago
  • My computer is STILL getting hacked. I called the police and they said there is nothing they can do about it...what do I do?

    Is this happening to you? No. PS: These hackers hacked my bank too...are you guys experiencing anything like this? Not me.
    Is this happening to you? No. PS: These hackers hacked my bank too...are you guys experiencing anything like this? Not me.
    13 answers · Security · 3 months ago
  • How can I make a time bomb that will delete system32 ?

    If you wanted to be compensated, then you should have discussed about this issue before you did your work.
    If you wanted to be compensated, then you should have discussed about this issue before you did your work.
    10 answers · Programming & Design · 3 months ago
  • Just discovered stepson speaks no English?

    Update: What you said in your update has NO bearing to anything. You have a problem, and I gave you a solution. You should look, for someone who can help you translate from his native language to English. You won't be able to introduce him to your grandparents since you don't know how to speak his language, and since he doesn't speak... show more
    Update: What you said in your update has NO bearing to anything. You have a problem, and I gave you a solution. You should look, for someone who can help you translate from his native language to English. You won't be able to introduce him to your grandparents since you don't know how to speak his language, and since he doesn't speak English, then he can't introduce himself. Regarding you supervising him, you could try to hire a live in translator. A person who can translate whatever you say back, and forth with your step son, and this person would be living with you, and your step son, and whoever else you are living with. If you choose not to hire a translator to help you, and your step son, then you WILL have a language barrier.
    12 answers · Marriage & Divorce · 3 months ago