0
In the boot parameters of your bootloader, you specify it with the text root=/path/to/device or a unique UUID name.
1 answer
If you want to get info about your system's BIOS, then type this command
wmic bios get name,serialnumber,version
This will tells you the name if your BIOS, current version and it's serial number if there is any.
wmic csproduct get name,identifyingnumber,uuid
This command will tell you the system motherboard (that happen to be the name) and it's UUID
wmic cpu get name,CurrentClockSpeed,MaxClockSpeed
If you want to quickly find out what's the CPU clock speed, you can do the following, also if you have turbo boost CPUs you can find out what's the Max Clock Speed your system is capable of for the current configuration. Of course you can always overclock your CPU and that will too reflect the change.
wmic cpu get name,CurrentClockSpeed,MaxClockSpeed /every:1
1 answer
Edit the /boot/grub/menu.lst file and change the timeout value to 30:
# general configuration:
timeout 30
default 0
And to change the title you change what looks like this:
# (0) Arch Linux
title "insert title here, without quotes"
root (hd0,0)
kernel /vmlinuz26 root=/dev/disk/by-uuid/epl509af-b8f0-4453-2678-2cb61f54c848 ro
initrd /kernel26.img
1 answer
Two methods of identifying a drive is used on the Mac. One is used by the computer, and the other is used by the user.
If you open Disk Utilities, you can see the user type. There are names and numbers that a human can read. The user can name his hard drives as he chooses.
If you open System Information under the black apple on the top menu. Click Storage, and you can see the computer type, including a BSD name, Media Name and Volume UUID. These names ensure that even if two drives are attached with the same user name, they will appear to the system as separate drives.
Human: My HD
Computer: disk0s2, 396D197-066-328-3F2-A1A86AEFDAB, WDC WD5000AAKS-40YGA1 Media
Aren't you glad you are a human?
3 answers
Double up?? Umm im not exaclty sure what you mean by that but if you are talking about the Hannah Montana stunt double then yes she used one and then she stopped using it but tour is over.
If what i was thinking is what you were looking for here are a few things that will help you.....
http://www.eonline.com/news/article/index.jsp?uuid=3850b77e-fbcb-408f-9aaf-d0ef0087b353
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/CMGOlJBexAA&hl=en&fs=1"></param><param name="allowFullScreen" value="true"></param><embed src="http://www.youtube.com/v/CMGOlJBexAA&hl=en&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" width="425" height="344"></embed></object>
fast forward to about 2:30 on the video.
hope this helpsnow can you go and see if you an try and answer my question. i need to know very bad!!!!! if you cant just let me know. thanks.
1 answer
A foreign key is determined by the underlying database model. Usually, a foreign key points to the "primary key" of the table that it references. In Access, for example, a lookup field holds the ID of the record you are referencing, while displaying whichever field you specify from the referenced table. In MySQL and most other RDBM systems, you can query the data using a LEFT JOIN or RIGHT JOIN based using the form "a.relatedid = b.id", where "a" is an alias to the child record (the one with the lookup field), and "b" is the primary key on the parent record.
A query on a foreign key might look like this: "select * from `orders` a left join `customers` b on a.`customerid` = b.`id`". In this query, you would see the order plus the customer that placed the order, each order on it's own line. Customers may be duplicated, since they might have multiple orders in the database. Of course, this assumes that "customerid" is the field on the "orders" table that contains the foreign key relationship, and "id" is a primary key on the "customers" table.
The primary key must be unique to be useful. This is usually defined as an AUTO_INCREMENT field, but it may also be some other value guaranteed to be unique, such as a randomly assigned UUID or customer number.
1 answer
The file /etc/fstab is commonly found in UNIX (Such as BSD, UnixWare, or OS X) systems or UNIX-like systems (Such as Linux, Plan 9, or Minix.).
It is a plaintext file, not always modified by the user, and it stands for FileSystem TABle.
Though it can describe every filesystem on your computer, it is usually just used to describe filesystems that need to be mounted at boot as opposed to everything available.
Typically you'll find:
A description of your root filesystem, which is the topmost level all directories and mounted filesystems will branch off of.
A description of your pseudoterminal and shared memory virtual filesystems which are usually required in Linux by most applications (Your terminal emulators and the screen command depend on pseudoterminal devices to work.)
A description of your swap partition, where virtual memory or hibernation data will be stored. This particular filesystem is not actually mounted, but activated and given over to the control of the *nix memory manager. There is no way to explore this filesystem as a user.
Other filesystems and mountpoints may also be commonly described, the three most common being /home, /usr, and /boot.
Removable media can also be described in here, but it's impractical and inflexible, not to mention grossly unnecessary due to HAL and udev, which will manage such things in much the same way as Windows manages its removable media. That is beyond the scope of this answer.
Long answer short, it's a configuration file Linux needs to boot and function properly, don't mess with it unless you know what you are doing. Your Linux distribution's installer is likely to automagically generate this file for you.
3 answers
There are several ways to either confirm that a given number is unique, or confirm that it is a duplicate of some number already on a list.
Unique on a short list
1) Compare the given number to each and every number on the list, one at a time, to see if the given number is already on the list. This is the best method for a short list of numbers.
Unique on a long list
2) If you are building a very long list of numbers, and you want to make sure that every number on the list is unique, sort the initial list of numbers and then do a binary search to see if the given number is already on the list. If it's not already there, then insert the new number in the appropriate place that keeps the list sorted.
3) If you already have a very long list of numbers, and you want to see if each and every number on that list is unique, sort the list and then scan the sorted list for duplicates (which will be consecutive). This is quick and easy to do with the "sort" and "uniq" command-line tools.
To generate a new list that only has the *unique* items in the original list (if any item is duplicated, that item is entirely left out of the second list):
cat in.txt | sort | uniq -u | tee uniques.txt
To generate a new list that lists only the *duplicated* items in the original list (but every item in the new list is unique in that new list, because it leaves out the second, third, etc. duplicates of the repeated items):
cat in.txt | sort | uniq -d | tee duplicates.txt
If that command doesn't print out anything, you can be sure that every item in the original list was unique.
To generate a new list that has both the *unique* items *and* the *duplicated* items -- i.e., *every* item in the original list exactly once (leaving out the second, third, etc. duplicates of repeated items), so every item in the new list is unique in that new list:
cat in.txt | sort -u | tee uniquified.txt
Universally unique
4) Sometimes you want a number that is globally unique, that no other human has ever seen before.
It's not possible to directly compare some given number with every number that any human has ever seen before If someone gives you a number, it's usually not possible to check after-the-fact if this is a unique number that only you two have seen, or if that someone gave you a copy of some old number that has been well-known by dozens of other people for decades.
However, it is possible to build a process that generates "new" numbers that are almost certainly unique, such that it is practically impossible that any human has ever seen it before.
(Such processes often involve "/dev/random", hardware random number generators, cryptographically secure pseudorandom number generators, or some combination of them).
Such processes are used to generate a universally unique identifier (UUID),
such as a globally unique identifier (GUID).
Generating such numbers is quick and easy to do with the "uuidgen" command-line tool (spelled "uuid_generate" on some systems).
uuidgen | tee unique_number.txt
1 answer
You can use remote installation or RIS
following are the steps to follow
You can use Remote Installation Services (RIS) for Windows 2000 to install a local copy of the operating system to other computers from remote locations. You can start up your computer, contact a Dynamic Host Configuration Protocol (DHCP) server for an Internet Protocol (IP) address, and then contact a boot server to install the operating system.
RIS requires several other services. These services can be installed on individual servers, or all of these services can be installed on a single server. The type of installation depends upon your network design:
DNS server: RIS relies on DNS for locating the directory service and client computer accounts. You can use any Windows 2000 Active Directory service-compliant DNS server, or you can use the DNS server that is provided with Windows 2000 Server.
Dynamic Host Configuration Protocol (DHCP) server: RIS requires an active DHCP server on the network. The remote boot-enabled clients receive an IP address from the DHCP server before they contact RIS.
Active Directory: RIS relies on Windows 2000 Active Directory for locating existing clients as well as existing RIS servers. RIS must be installed on a Windows 2000-based server that has access to Active Directory, for example, a domain controller or a server that is a member of a domain with access to Active Directory.
Using RIS
To ensure a successful installation, you must install and configure the additional services previously described for RIS to function. Also, ensure that you have both the Windows 2000 Server and Windows 2000 Professional CD-ROMs available. The following steps are an overview of how to set up and configure the RIS process.
Installing RIS
On Windows 2000 Server, click Start, point to Settings, and then click Control Panel.
Double-click Add/Remote Programs.
Double-click Add/Remove Windows Components.
Scroll down and click Remote Installation Services, and then click Next.
Insert the Windows 2000 Server CD-ROM into the CD-ROM drive, and then click OK. The necessary files are copied to the server.
NOTE: After you insert the CD-ROM, a dialog box is displayed that prompts you to upgrade the operating system. Click No, and then close this screen.
Click Finish to end the wizard.
When you are prompted to restart your computer, click Yes.
When the server has restarted, log on to the computer as a local administrator.
Setting up RIS
Click Start, click Run, and then type: risetup.exe to start the Remote Installation Services Setup Wizard.
When the Welcome screen is displayed, which indicates some of the requirements to successfully install RIS, click Next.
The next screen prompts you to enter the server drive and folder where you want to install the RIS files. The default drive and folder are going to be on the largest NTFS-formatted drive that is neither a system nor a boot drive. In this example, this drive is: E:\RemoteInstall. Then, click Next.
NOTE: The drive on which you want to install RIS must be formatted with the NTFS file system. RIS requires a significant amount of disk space and cannot be installed on the same drive or partition on which Windows 2000 Server is installed. Ensure that the selected drive contains enough free disk space for at least 1 full Windows 2000 Professional CD-ROM. That CD-ROM must contain a minimum of 800 megabytes (MB) to 1 gigabyte (GB) of disk space.
The next screen enables you to configure client support. By default, the RIS server does not support clients until you have set up RIS and configured the server. If you want the server to begin supporting clients immediately after the setup of RIS, select the Respond to clients requesting service option. If you select this option, the server can respond to clients and provide them with operating system installation options. If you do not select this option, the RIS server does not respond to the clients that request service.
The Setup Wizard prompts you for the location of the Windows 2000 Professional installation files. RIS supports only the remote installation of Windows 2000 Professional. Insert the Windows 2000 Professional CD-ROM into the CD-ROM drive of the server, and then enter the drive letter that contains the CD-ROM or browse to a network share that contains the installation source files. Then, click Next.
The wizard prompts you to enter the folder name that contains the workstation files on the RIS server. This folder is created beneath the folder that is specified in the preceding step 3. The folder name must reflect its contents, for example, Win2000.pro. Click Next to accept the default name of Win2000.pro.
You are prompted for a "friendly" description and help text that describes this operating system image. For this example, click Next to accept the default name of Microsoft Windows 2000 Professional.
You are presented with a summary screen that indicates the choices that you have made. Click Finish to confirm your choices. When the installation wizard is complete, you can either service clients, or configure the RIS settings.
The wizard installs the service and settings that you have selected. This process takes several minutes. When this process is finished, click Done.
When RIS is successfully installed, you must authorize the RIS server in Active Directory. If you do not authorize the RIS server, it cannot service clients that request a network service boot. The next section outlines these steps.
Authorizing RIS in Active Directory
To authorize an RIS server in Active Directory, you must be logged on to your computer as an enterprise administrator or a domain administrator of the root domain. You can complete the following steps on any domain controller, member server of the domain, or a Windows 2000 Professional-based workstation that has installed the Administrator Tools Package that contains the DHCP Server Management snap-in. This section describes the authorization process on a domain controller:
Click Start, point to Programs, point to Administrative Tools, and then click DHCP to activate the DHCP snap-in.
Right-click DHCP in the upper-left corner of the DHCP screen, and then click Manage Authorized Servers. If your server is not already listed, click Authorize, and then enter the IP address of the RIS server. Click Yes when you are prompted to verify that the address is correct.NOTE: If you authorize the RIS server on a computer that is not a domain controller, use the following steps to install the Administrator Tools Package: Click Start, click Run, and then type: adminpak.msi on a server network. From a Windows 2000 Professional-based computer, run the Adminpak.msi program from the Windows 2000 Server CD-ROM.
Setting the Required User Permissions
The permissions that are granted by using the following steps can enable users to create computer accounts anywhere in the domain:
Click Start, point to Programs, point to Administrative Tools, and then click Active Directory Users and Computers.
Right-click the domain name that is listed at the top of the snap-in, and then select the Delegate Control option. After a wizard starts, click Next.
Click Add to add the users who are able to install their own computers by using Microsoft Windows 2000 Remote OS Installation.
Select the necessary users, click Add, and then click OK.
Click Next to continue.
Select the Join a Computer to the Domain option, and then click Next.
Click Finish. Users can create computer account objects during the operating system installation by using the RIS service.
NOTE: You can either use the default RIS settings and immediately begin servicing clients, or you can make changes to the RIS settings first.
Installing Clients By Using Remote Installation
This section describes the steps that are required to successfully install Windows 2000 Professional on a network computer, a managed computer, or a computer that contains a network adapter that is supported by the remote installation boot floppy disk:
Restart your client from either the remote floppy disk or the Pre-Boot Execution Environment (PXE) boot CD-ROM. When you are prompted, press the F12 key to start the download of the Client Installation Wizard.
At the Welcome screen, press ENTER.
For the username, enter a username from the domain. Enter the password and domain name, and then press ENTER to continue.
After you receive a warning message that all data on the client hard disk is going to deleted, press ENTER to continue.
After a computer account and a global unique identification (ID) for this workstation are displayed, press ENTER to begin Setup. Windows 2000 Setup starts.
If you are prompted, type the product key (which is located on the back of the Windows 2000 Professional CD-ROM case), and then click Next.
NOTE: This step can be avoided by specifying the product key in the .sif file. You have successfully configured and installed a remote operating system by using RIS. Refer to the following section for additional information about configuration options.
Prestaging
By prestaging the client, the administrator can define a specific computer name, and optionally, the RIS server that can service the client:
Locate the container in the Active Directory service in which you want your client accounts to be created.
Right-click the container, click New, and then click Computer. The New Object-Computer dialog box is displayed.
Enter the computer name and authorize domain-join permissions for the user or security group that contains the user who is going to use the computer that this computer account represents.
In the next dialog box, you are prompted for either the globally unique identifier (GUID) or universally unique identifier (UUID) of the computer itself and whether you intend to use this computer as a managed (Remote OS Installation-enabled) client. Enter either the GUID or UUID, and then click to select the This is a managed computer check box.
The GUID or UUID is a unique 32-character number that is supplied by the manufacturer of the computer, and is stored in the system basic input/output system (BIOS) of the computer. This number is written on the case of the computer, or on the outside of the box that the computer had been shipped in. If you cannot locate this number, run the system BIOS configuration utility. The GUID is stored as part of the system BIOS. Contact your OEM for a VBScript (created with Visual Basic Scripting Edition) that can be used to prestage newly purchased clients in Active Directory for use with Remote OS Installation.
The next screen prompts you to indicate the RIS server that this computer is serviced by. This option can be left blank to indicates that any available RIS server can answer and service this client. If you know the physical location of the specific RIS server and where this computer can be delivered, you can use this option to manually load clients in the RIS servers in your organization as well as segment the network traffic. For example, if a RIS server had been located on the fifth floor of your building, and you are delivering these computers to users on that floor, you can assign this computer to the RIS server on the fifth floor
1 answer
President Bush presents the Presidential Medal of Freedom to Pope John Paul II during a visit to the Vatican, June 2004
A March 2007 survey of Arab opinion conducted by Zogby International and the University of Maryland found that Bush was the most disliked leader in the Arab world.[323]
The Pew Research Center's 2007 Global Attitudes poll found that out of 47 countries, a majority of respondents expressed "a lot of confidence" or "some confidence" in Bush in only nine countries: Israel, India, Ethiopia, Ghana, Ivory Coast, Kenya, Mali, Nigeria and Uganda.[324]
During a June 2007 visit to the mostly Islamic Eastern European nation of Albania, Bush was greeted enthusiastically. Albania has a population of 3.6 million, has troops in both Iraq and Afghanistan, and the country's government is highly supportive of American foreign policy.[325] A huge image of the President now hangs in the middle of the capital city of Tirana flanked by Albanian and American flags.[326] The Bush administration's support for the independence of Albanian-majority Kosovo, while endearing him to the Albanians, has troubled U.S. relations with Serbia, leading to the February 2008 torching of the U.S. embassy in Belgrade.[327]
Post-presidencyGeorge and Laura Bush wave to a crowd of 1000 at Andrews Air Force Base before their final departure to Texas, January 20, 2009Following the inauguration of Barack Obama, Bush and his family boarded a presidential helicopter typically used as Marine One to travel to Andrews Air Force Base.[328] Bush, with his wife, then boarded an Air Force Boeing VC-25 for a flight to a homecoming celebration in Midland, Texas. Because he was no longer President, this flight was designated Special Air Mission 28000, instead of Air Force One. After a welcome rally in Midland, the Bushes returned to their ranch in Crawford, Texas, by helicopter.[328] They bought a home in the Preston Hollow neighborhood of Dallas, Texas, where they planned to settle down.[329]
Since leaving office, Bush has kept a relatively low profile.[330] However, he has made appearances at various events throughout the Dallas/Forth Worth area, most notably when he conducted the opening coin toss at the Dallas Cowboys first game in the team's new Cowboys Stadium in Arlington.[331] An April 6, 2009, visit to a Texas Rangers game, where he gave a speech thanking the people of Dallas for helping them settle in (and specifically, the people of Arlington, where the game was held), was met with a standing ovation.[332]
His first speaking engagement occurred on March 17, 2009 in Calgary, Canada. He spoke at a private event entitled "A conversation with George W. Bush" at the Telus Convention Centre and stated that he would not criticize President Obama and hoped he succeeds, specifically stating, "[President Obama] deserves my silence."[333][334] During his speech, Bush announced that he had begun writing a book, which is expected to be published under the title Decision Points in 2010.[16] The book will focus on "12 difficult personal and political decisions" Bush faced during his presidency.[16]
Bush made a video-taped appearance on the June 11, 2009, episode of The Colbert Report during the show's trip to Baghdad, Iraq. Bush praised the troops for earning a "special place in American History" and for their courage and endurance. He joked that it would come in handy, saying, "I've sat through Stephen's stuff before," in reference to Colbert's performance at the 2006 White House Correspondents' Association dinner as well as The Colbert Report's history of criticizing Bush's administration.[335]
On August 29, 2009, Bush, with his wife Laura, attended the funeral of Senator Ted Kennedy.[336]
See alsoANSWER: you can get it by either using an AR or trading someone for it.
1 answer