exe" /m This will run all three programs as before, however the "/m" parameter will minimize them so that they don't clutter up the desktop. Other people have found much more creative and effective ways to use batch files, but the important thing is that you know they're a resource you can use to save a few seconds or minutes in performing important tasks. Those errors are the result of Program B attempting to use an outdated (shared) file that was installed by Program A. In order to fix that problem, the user would have to download an updated version of the shared file (which to say the least - is not an easy thing to find or do). Sometimes, errors occur because a system doesn't have the required drivers or the drivers that are on the system are the incorrect version. Today, that would be some of the worst advice we could give anyone. As reported in countless news reports, computer viruses are rampant and they're extremely worrisome. This article will describe what viruses are and then point you in the direction of some rather unique protection and prevention. In short, a computer virus is a software program designed to destroy or steal data. These old computers booted an MS-DOS type operating system from drivers stored onto a floppy disk, and in order to use a program, users would remove the boot floppy and then insert a new floppy that contained the program. The floppy not only stored the program (word processor, spreadsheet, etc.), it also stored the drivers that the program needed to communicate with the computer's hardware. We're talking about shareware - software that you can try before buying. Shareware has a long history and was rather popular in the days where BBS (bulletin board systems) reigned the online industry. It hasn't gone anywhere, but its competition with commercial software is fierce - so fierce that it tends to fall on the back burner among new computer users. But your specifications don't just apply to Windows, they also apply to the many software programs that are installed onto the computer (not to mention that many software programs can be further customized through their own configurations). We aren't going to cover them all, but we will introduce some of the most popular so that you can get a feel of the control over your system that these configurations give you.
Share This Page