To do nothing and still think youre helping.

Posts made by Marquetta
-
RE: Pigeon
A small feathered creature that eats french fries and like to defacate ontop of people, cars, important things. A subspecies of [bird]. Also known as the [feathered rat] or [gutter bird].
-
RE: Wiggler
To rapidly press and depress the whammy bar or tremolo bar while rocking out on (a preferably plastic) guitar.
In real life generates o0o0os and aaaaahs.
In guitar hero, generates more points. -
WHOIS
WHOIS (pronounced who is) is an Internet service used to look up information about a domain name. While the term is capitalized, WHOIS is not an acronym. Instead, it is short for the question, Who is responsible for this domain name?
Domain names are registered through companies called registrars. Examples include GoDaddy, Tucows, Namecheap, and MarkMonitor. These companies have been approved and accredited by ICANN to register new domain names. Whenever an individual or organization registers a new domain name, the registrar is required to make the registration information publicly available. This information can be looked up online using the WHOIS service.
Since there is no central database of domain registration information, WHOIS search engines look up data across multiple registrars. Many registrars provide their own WHOIS lookup service, though several third party WHOIS websites also exist. ICANN provides its own WHOIS lookup service as well (see photo).
WHOIS records vary between registrars, but they all contain mandatory information. This includes the name of the registrar, created date, updated date, and expiration date of the domain name. The name servers are also listed. Three contacts are included — the registrant, admin, and technical contacts. This information, provided during registration, includes a name, organization (if applicable), address, phone number, and email address. In many cases, the information is duplicated across all three contacts, though each one may have different information.
NOTE: The contact information in a WHOIS record can be made private using a private registration service offered by some registrars. This service, which may be available for an additional fee, masks the registrants contact information with non-personally identifiable information. A domain registered with domain privacy will still show up in a WHOIS search, but the organization may appear as Whois Privacy Services and the email address [email protected]. -
RE: Utility
Utility programs, commonly referred to as just utilities, are software programs that add functionality to your computer or help your computer perform better. These include antivirus, backup, disk repair, file management, security, and networking programs. Utilities can also be applications such as screensavers, font and icon tools, and desktop enhancements. Some utility programs help keep your computer free from unwanted software such as viruses or spyware, while others add functionality that allows you to customize your desktop and user interface. In general, programs that help make your computer better are considered utilities. And unlike water and electric bills, computer utilities dont send you a bill every month!
-
UPnP
Stands for Universal Plug and Play. Plug and Play describes devices that work with a computer system as soon as they are connected. UPnP is an extension of this idea that expands the range of Plug and Play devices to networking equipment. Universal Plug and Play uses network protocols to allow a wide range of devices to be interconnected and work seamlessly with each other.
UPnP devices can be connected via wired (i.e. Ethernet and Firewire) or wireless (i.e. Wi-Fi and Bluetooth) connections. As long as a product supports UPnP, it can communicate with other UPnP devices within a network. The connections are typically created using the DHCP networking protocol, which assigns each connected device a unique IP address.
While UPnP is helpful for setting up networks, it also can be used to set up compatible audio and video (AV) devices. UPnP AV is a group of standards based on UPnP that allows audio and video components to be connected via network connections. This enables media files and streaming data to be sent between devices. For example, a movie stored on a hard drive in a bedroom could be played back on the TV screen in the living room. The central controller of a UPnP AV network is called a MediaServer and can be run from a Macintosh, Windows, or Linux computer or from a hardware device specifically designed to manage the network.
Since most UPnP devices support zero-configuration setup (like ordinary Plug and Play devices), it is simple to add devices to a network and use them immediately. While the networking terms associated with UPnP can be a bit intimidating, setting up a UPnP network is meant to be hassle-free ? and that is a term we can all appreciate. -
UEFI
Stands for Unified Extensible Firmware Interface. UEFI is an interface that loads near the beginning of the boot sequence and provides custom configuration options for a PC. It is considered the successor to BIOS and offers many advantages, including mouse support, a graphical user interface, and support for 32-bit and 64-bit systems.
UEFI is a standardized version of the original Extensible Firmware Interface (EFI) specification developed by Intel. It is managed by the Unified Extensible Firmware Interface Forum, comprised of more than 250 member companies. The standardized UEFI specifications are designed to ensure that components from different hardware manufacturers can be recognized and controlled via the UEFI.
The UEFI is designed for advanced users, so by default it is not displayed during the startup process. The standard way to load the UEFI on most Windows PCs is to press the F2 key when the computer is starting up. Typically, you should press the key when the manufacturers logo (such as Dell or HP) appears. In Windows 8 and 10, you can also use the Troubleshoot option to enable UEFI Firmware Settings before the next restart.
Configuration options provided in the UEFI vary depending on the manufacturer and computer model. Typically, you can perform administrator tasks like formatting and partitioning storage devices. You may also be able to change your boot disk and activate or deactivate specific peripherals. Some systems even allow you to overclock your CPU or run your PC in a low-power eco-friendly mode.
NOTE: Intel-based Macs use EFI to manage the hardware configuration, but the UEFI is not available at startup.
The ASUS UEFI Bios Utility -
System Preferences
System Preferences is an application bundled with OS X that allows you to change settings on your Mac. It is similar to the Control Panel in Windows and supersedes the Control Panel that was part of Mac OS Classic.
The System Preferences window displays several different options called preferences panes (instead of control panels). It lists the default preference panes included with OS X, as well as any third party preference panes that have been installed. While the default options have changed since the first version of OS X was released in 2001, many of them are the same. In OS X 10.10 (Yosemite), the System Preferences application includes the 30 preference panes listed below.
When you click an preference pane icon in System Preferences, it displays controls that allow you to modify certain settings. For example, you can use the Desktop -
RE: Nipped
Nipped/ Nipping is the act of cutting someone off while talking whose trying to offend you or insult you, and treating they ass right back with an offensive/ smart ass come back. This word is commonly used in Chicago.
-
Drops
Drops are another category of moves within the dance of BBoying.
Drops provide are meant to provide smooth transitioning from toprock to footwork.
Common foundational drops are the knee drop, corkscrew, and front and back sweeps.
Drops can also be categorized as suicides. Suicides are moves where the dancer literally drops onto the ground in a seemingly painful way, but are painless if done correctly.
Common suicide drops are the coin drop and pencil drop.
Suicide drops also provide transitioning from one move to another. A BBoy can suicide into another move. -
RE: Repository
In software development, a repository is a central file storage location. It is used by version control systems to store multiple versions of files. While a repository can be configured on a local machine for a single user, it is often stored on a server, which can be accessed by multiple users.
A repository contains three primary elements — a trunk, branches, and tags. The trunk contains the current version of a software project. This may include multiple source code files, as well as other resources used by the program. Branches are used to store new versions of the program. A developer may create a new branch whenever he makes substantial revisions to the program. If a branch contains unwanted changes, it can be discontinued. Otherwise, it can be merged back into the trunk as the latest version. Tags are used to save versions of a project, but are not meant for active development. For example, a developer may create a release tag each time a new version of the software is released.
A repository provides a structured way for programmers to store development files. This can be helpful for any type of software development, but it is especially important for large development projects. By committing changes to a repository, developers can quickly revert to a previous version of a program if a recent update causes bugs or other problems. Many version control systems even support side-by-side comparisons of different versions of files saved in the repository, which can be helpful for debugging source code. Additionally, when a repository is stored on a server, users can check out files for editing, which prevents files from being edited by more than one user at a time.
-
QR Code
A QR code (short for quick response code) is a type of barcode that contains a matrix of dots. It can be scanned using a QR scanner or a smartphone with built-in camera. Once scanned, software on the device converts the dots within the code into numbers or a string of characters. For example, scanning a QR code with your phone might open a URL in your phones web browser.
All QR codes have a square shape and include three square outlines in the bottom-left, top-left, and top-right corners. These square outlines define the orientation of the code. The dots within the QR code contain format and version information as well as the content itself. QR codes also include a certain level of error correction, defined as L, M, Q, or H. A low amount of error correction (L) allows the QR code to contain more content, while higher error correction (H) makes the code easier to scan.
QR codes have two significant benefits over traditional UPCs – the barcodes commonly used in retail packaging. First, since QR codes are two-dimensional, they can contain significantly more data than a one-dimensional UPC. While a UPC may include up to 25 different characters, a 33x33 (version 4) QR code, can contain 640 bits or 114 alphanumeric characters. A 177x177 (version 40) QR code can store up to 23,648 bits or 4,296 characters.
Another advantage of QR codes is that they can be scanned from a screen. Standard UPC scanners use a laser to scan barcodes, which means they typically cannot scan a UPC from a screen (like a smartphone). QR scanners, however, are designed to capture 2D images printed on paper or displayed on a screen. This makes it possible to use a QR code on your smartphone as a boarding pass at the airport or as a ticket for an event. -
RE: Squoze
The logical sounding past tense of squeeze. Instead of adding ed to the word squeeze to signify the action in past tense, squoze can be substituted.
Another word in which we do this is shook. We do not say, The Nanny shaked the baby, we say she shook the baby. -
Pop-Up
The term pop-up has two computer-related meanings. One refers to a window and the other is a type of menu.
Pop-Up Window A pop-up window is a type of window that opens without the user selecting New Window from a programs File menu. Pop-up windows are often generated by websites that include pop-up advertisements. These ads are produced with JavaScript code that is inserted into the HTML of a Web page. They typically appear when a user visits a page or closes a window. Some pop-up ads show up in front of the main window, while others show up behind the main browser window. Ads that appear behind open windows are also called pop-under ads.
Regardless of where pop-up advertisements appear on your screen, they can be pretty annoying. Fortunately, browser developers have realized this and most Web browsers now include an option to block pop-up windows. If you are noticing pop-up windows appear on your computer when your browser is not open, you may have an adware program running on your computer. The best solution to this problem is to run an anti-spyware program that will locate and remove the malware from your system.
Pop-Up Menu A pop-up menu is a type of menu that pops up on the screen when the user right-clicks a certain object or area. It can be also called a contextual menu since the menu options are relevant to where the user right-clicked on the screen. Pop-up menus provide quick access to common program functions and are used by most operating systems and applications.