In Feburary 2016 29,
Select 'Tools' from inside the CMS program then click on 'User Permissions.'
Select 'ACD' or 'ACD Group' from the 'ACD' field depending on which type of user you need to create according to the company's IT policy.
Click on 'User Data' in the 'Operations' list, and then click 'OK.'
Fill in the user information for the user you are creating. Including user ID, user name, room number, telephone number, default printer, login type, maximum user count, maximum refresh rate and login ACD. Fields other than user ID and user name are optional. You enter the information that applies according to your company's IT policy for new accounts.
Select 'Actions' from the menu bar, and click on 'Add.' The user is added and can now log in to Avaya CMS.
In Feburary 2016 29,
Showing posts with label data. Show all posts
Showing posts with label data. Show all posts
Monday, 29 February 2016
How to Import a MySQL DatabaseIn Feburary 2016 29,
In Feburary 2016 29,
Install phpMyAdmin software on your computer if it is not already installed. You can find phpMyAdmin software online at the phpMyAdmin homepage (see Resources below).
Log onto the phpMyAdmin page from your Web space. You will need the username and password assigned to you by your Web-hosting provider.
Select the database you wish to import the old data into from the drop-down Database Selection box on the left of the page.
Click the SQL tab toward the top of the interface.
Click the Browse button located toward the bottom of the page.
Find the .SQL file where it is saved on your hard drive, select it and click 'Open.'
Click the Go button. The data in your SQL file has now been imported into your database.
Using the SSH Command Line
Contact your hosting provider to gain SSH access.
Log into your Web space using an FTP client. You will need to know your username and password.
Find your existing .SQL database and upload it to your Web space using your FTP client. It doesn't matter where in your Web space you upload it to, as long as you execute the SSH command when you're in this folder.
Close your FTP program.
Log into your Web space using the appropriate SSH client. You will need the username and password assigned to you by your Web-hosting provider.
Enter the following into the command line, using your own database name, file name, username and password instead of the words in capitals.mysql -uUSERNAME -pPASSWORD DATABASENAME
In Feburary 2016 29,
Install phpMyAdmin software on your computer if it is not already installed. You can find phpMyAdmin software online at the phpMyAdmin homepage (see Resources below).
Log onto the phpMyAdmin page from your Web space. You will need the username and password assigned to you by your Web-hosting provider.
Select the database you wish to import the old data into from the drop-down Database Selection box on the left of the page.
Click the SQL tab toward the top of the interface.
Click the Browse button located toward the bottom of the page.
Find the .SQL file where it is saved on your hard drive, select it and click 'Open.'
Click the Go button. The data in your SQL file has now been imported into your database.
Using the SSH Command Line
Contact your hosting provider to gain SSH access.
Log into your Web space using an FTP client. You will need to know your username and password.
Find your existing .SQL database and upload it to your Web space using your FTP client. It doesn't matter where in your Web space you upload it to, as long as you execute the SSH command when you're in this folder.
Close your FTP program.
Log into your Web space using the appropriate SSH client. You will need the username and password assigned to you by your Web-hosting provider.
Enter the following into the command line, using your own database name, file name, username and password instead of the words in capitals.mysql -uUSERNAME -pPASSWORD DATABASENAME
In Feburary 2016 29,
Sunday, 28 February 2016
GetIn Feburary 2016 28,
In Feburary 2016 28,
Get_headers() is a command in PHP that fetches HTTP headers. The get_header() function accesses the header.php file that describes the nature of the Web page or file. The get_headers function also retrieves website redirection information, error codes, authentication requirements and encryption information such as HTTP and HTTPS. The get_headers function must include the URL of the request in the argument. An argument to format the retrieved headers is optional.
cURL
Websites may have cURL enabled or use a socket connection. cURL in PHP supports FTP, HTTP, HTTPS, LDAP and other data transfer protocols. The Web connection details are contained within the cURL class. This eliminates the need to reference the connection details throughout the PHP code, decreasing the amount of time required to create cURL scripts. cURL scripts create cookies and save the cookies to specified directories. The cURL extension in PHP websites allows external websites to be accessed while remaining on the first website. This function is used for retrieving data like stock quotes from a third-party website or third-party payment vendor websites like PayPal and credit-card processors. cURL scripts are essential to creating online shopping carts and continuously updating data feeds. cURL scripts allow reporting on a connection status such as transfer speed, transferred data volume and the percentage of the file that has been downloaded so far.
Factors Affecting Get_File Speed
Get_file functions do not trigger authentication routines such as log in prompts or cookies. The file_get_contents() function also downloads files without exchanging information with the server from which it was retrieved, such as cookie processing. Using a get_file function instead of a cURL script is faster than a cURL script because these steps are skipped. Get_header speed depends on the volume of information it retrieves. Web pages with less information are retrieved more quickly. Web pages that hold less data are downloaded more quickly.
Factors Affecting cURL Speed
cURL speed depends on network latency, network speed and the speed of the server with which it is communicating. cURL scripts also depend upon the processing speed of the servers they access. cURL slows down when handling large XML files. Multi-processing allows multiple cURL tasks to run simultaneously, potentially speeding up the processing time of the whole Web page.
In Feburary 2016 28,
Get_headers() is a command in PHP that fetches HTTP headers. The get_header() function accesses the header.php file that describes the nature of the Web page or file. The get_headers function also retrieves website redirection information, error codes, authentication requirements and encryption information such as HTTP and HTTPS. The get_headers function must include the URL of the request in the argument. An argument to format the retrieved headers is optional.
cURL
Websites may have cURL enabled or use a socket connection. cURL in PHP supports FTP, HTTP, HTTPS, LDAP and other data transfer protocols. The Web connection details are contained within the cURL class. This eliminates the need to reference the connection details throughout the PHP code, decreasing the amount of time required to create cURL scripts. cURL scripts create cookies and save the cookies to specified directories. The cURL extension in PHP websites allows external websites to be accessed while remaining on the first website. This function is used for retrieving data like stock quotes from a third-party website or third-party payment vendor websites like PayPal and credit-card processors. cURL scripts are essential to creating online shopping carts and continuously updating data feeds. cURL scripts allow reporting on a connection status such as transfer speed, transferred data volume and the percentage of the file that has been downloaded so far.
Factors Affecting Get_File Speed
Get_file functions do not trigger authentication routines such as log in prompts or cookies. The file_get_contents() function also downloads files without exchanging information with the server from which it was retrieved, such as cookie processing. Using a get_file function instead of a cURL script is faster than a cURL script because these steps are skipped. Get_header speed depends on the volume of information it retrieves. Web pages with less information are retrieved more quickly. Web pages that hold less data are downloaded more quickly.
Factors Affecting cURL Speed
cURL speed depends on network latency, network speed and the speed of the server with which it is communicating. cURL scripts also depend upon the processing speed of the servers they access. cURL slows down when handling large XML files. Multi-processing allows multiple cURL tasks to run simultaneously, potentially speeding up the processing time of the whole Web page.
In Feburary 2016 28,
Saturday, 27 February 2016
How to Replace a Substring in Oracle SQLIn Feburary 2016 27,
In Feburary 2016 27,
Sign in to SQLPlus.
Type a 'select' command using the 'replace' function and press 'enter':select string_column, replace(string_column, 'co.', 'company') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. In this case, 'co.' is the target and 'company' is the replacement.
Inspect the results to see the replacement. If the 'string column' contained 'abc co.', it should now be converted to 'abc company.'
Translate Function
Sign in to SQLPlus.
Type a 'select' command using the 'translate' function and press 'enter':select string_column, translate(string_column, 'abc', 'xyz') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. The phrase 'abc' is the 'fromlist', and 'xyz' is the 'tolist.'
Inspect the results to see the replacement. If 'string column' contained 'abc co.', it is converted to 'xyz zo.'
In Feburary 2016 27,
Sign in to SQLPlus.
Type a 'select' command using the 'replace' function and press 'enter':select string_column, replace(string_column, 'co.', 'company') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. In this case, 'co.' is the target and 'company' is the replacement.
Inspect the results to see the replacement. If the 'string column' contained 'abc co.', it should now be converted to 'abc company.'
Translate Function
Sign in to SQLPlus.
Type a 'select' command using the 'translate' function and press 'enter':select string_column, translate(string_column, 'abc', 'xyz') from string_table;This command retrieves the 'string_column' twice so that the user can see a before-and-after representation of the data. The phrase 'abc' is the 'fromlist', and 'xyz' is the 'tolist.'
Inspect the results to see the replacement. If 'string column' contained 'abc co.', it is converted to 'xyz zo.'
In Feburary 2016 27,
Labels:
case,
company,
data,
Enter,
representation,
retrieves,
string_column,
string_table,
Type,
USER
What is an Oracle Database Client?In Feburary 2016 27,
In Feburary 2016 27,
A server is a computer that hosts software which users can access through their client computers. The server and its clients are connected through a network, which allows users on client machines to use the services provided by the server.
Relational Database
A relational database organizes data into normalized tables, which are individual tables that don't contain data redundancies and that have a primary key, which is a unique identifier for each row of data in the table. A relational database can combine data from multiple tables by joining tables that share the same primary key through a query language, such as SQL.
The Oracle Database Client
Users can access the Oracle database through their client computers and submit requests for information, which the Oracle server will respond to. At a bank that uses Oracle database software, a teller could submit a query from her computer, the Oracle database client, to the Oracle server to retrieve a customer's account information.
In Feburary 2016 27,
A server is a computer that hosts software which users can access through their client computers. The server and its clients are connected through a network, which allows users on client machines to use the services provided by the server.
Relational Database
A relational database organizes data into normalized tables, which are individual tables that don't contain data redundancies and that have a primary key, which is a unique identifier for each row of data in the table. A relational database can combine data from multiple tables by joining tables that share the same primary key through a query language, such as SQL.
The Oracle Database Client
Users can access the Oracle database through their client computers and submit requests for information, which the Oracle server will respond to. At a bank that uses Oracle database software, a teller could submit a query from her computer, the Oracle database client, to the Oracle server to retrieve a customer's account information.
In Feburary 2016 27,
Labels:
data,
database,
individual,
organizes,
primary,
redundancies,
Relational,
services
Thursday, 25 February 2016
PHP Mkdir Permission Does Not WorkIn Feburary 2016 25,
In Feburary 2016 25,
The list of permissions you supply to the 'mkdir' function are valid only on Linux-based file systems. This means you cannot associate permissions with a directory you create under Windows. If you pass permissions with the 'mkdir' function under Windows, PHP simply ignores them.
Default User Account
Remember that a script run on a Web server from a browser runs under the default user account on the Web server such as 'www-data,' not under your user account. If directory permissions are not working, it may be because you are testing a script under your account instead of the default user account. You can test the script as the default user by typing 'su www-data' and exploring the directory permissions assigned to that user.
Directory Mask
If the resulting permissions of a new directory are different from what you passed, it may be because of a directory mask applied to the permissions. The mask is maintained by the Web server, not by PHP. To circumvent the mask, use the 'umask' function to set the mask to zero, create the directory using 'mkdir' and change the directory permissions using the 'chmod' function. For example:
$save = umask(0);
if (mkdir($newdir)) chmod($newdir, 0755);
umask($save);
?>
Recursive Assignment
The 'mkdir' function takes a second optional argument that creates nested directories recursively. When you assign directory permissions recursively, the permissions may not be executed in the proper order and you might get different results from what you expected. To ensure the proper order, use the 'chmod' function to assign directory permissions to the new directory after you create it with the 'mkdir' function. For example:
if (mkdir($newdir, 0755, true)) chmod($newdir, 0755);
?>
In Feburary 2016 25,
The list of permissions you supply to the 'mkdir' function are valid only on Linux-based file systems. This means you cannot associate permissions with a directory you create under Windows. If you pass permissions with the 'mkdir' function under Windows, PHP simply ignores them.
Default User Account
Remember that a script run on a Web server from a browser runs under the default user account on the Web server such as 'www-data,' not under your user account. If directory permissions are not working, it may be because you are testing a script under your account instead of the default user account. You can test the script as the default user by typing 'su www-data' and exploring the directory permissions assigned to that user.
Directory Mask
If the resulting permissions of a new directory are different from what you passed, it may be because of a directory mask applied to the permissions. The mask is maintained by the Web server, not by PHP. To circumvent the mask, use the 'umask' function to set the mask to zero, create the directory using 'mkdir' and change the directory permissions using the 'chmod' function. For example:
$save = umask(0);
if (mkdir($newdir)) chmod($newdir, 0755);
umask($save);
?>
Recursive Assignment
The 'mkdir' function takes a second optional argument that creates nested directories recursively. When you assign directory permissions recursively, the permissions may not be executed in the proper order and you might get different results from what you expected. To ensure the proper order, use the 'chmod' function to assign directory permissions to the new directory after you create it with the 'mkdir' function. For example:
if (mkdir($newdir, 0755, true)) chmod($newdir, 0755);
?>
In Feburary 2016 25,
Wednesday, 24 February 2016
What Is UTP Cable?In Feburary 2016 24,
In Feburary 2016 24,
Alexander Graham Bell was the first person to make a UTP cable by simply twisting two wires together. The basic design has changed little since 1881, and is still a pair of single conductors wrapped around each other inside an insulated jacket. Some cables include up to four pairs of twisted cable. There's no foil wrap shielding and no braided shield screen, so this kind of cable is more susceptible to interference than a shielded twisted pair.
Electrical Interference
Electrical signals carried through any conductor can create electromagnetic fields. Two or more electromagnetic fields in close proximity can interact with each other, which usually means loss of data or signal strength. Losing data in a computer network can result in a variety of problems. Shielded twisted pair cable is an option when interference is an issue.
Shielded and Unshielded Cables
Shielded and unshielded twisted pair cables carry several designations. Each type of cable has different electrical characteristics, varies in its ability to shield a signal, and is appropriate for different environments. Typical cable designations include UTP or U/UTP, the basic two-conductor without foil or braid shield; STP or U/FTP, which includes a foil shield under the jacket; and FTP or F/UTP, which includes a braided screen for additional protection. For some special environments, there are also heavier cable configurations with more shielding.
Cable Categories
There are different categories of cable, with CAT1 through CAT5, CAT5E and CAT6 being the most common. CAT1 is telephone wire and is not suitable for LAN communication. CAT2 through CAT5 are suitable for telephone or network communication, and differ in their ability to transmit high-speed data. CAT2 can support up to 4 Mbps, and CAT3 can go to 10 Mbps. CAT5 cable should be used for any high data speeds, up to 100 Mbps. CAT3, CAT4 and CAT5 carry more wires inside the jacket, with four pairs of twisted wire. In addition to having more conductors, conductors in a CAT5 cable are twisted more tightly together than in CAT4 and CAT3, which helps to prevent unwanted interference. CAT6 wire physically separates all four pairs of twisted conductors, further reducing the chance of interference, which makes it suitable for gigabit data speeds.
CAT5 and CAT5E Cable
CAT5E cable includes a variety of engineering improvements that make it superior in all respects to CAT5 cable. CAT5E cable is less susceptible to crosstalk, or interference between conductors, is rated at 350 MHz, can support gigabit Ethernet speeds, and has a tougher PVC jacket. The tougher jacket makes CAT5E cable less likely to be damaged during installation. Except for some networks that specifically call for CAT5 cable, CAT5E is suitable for all applications.
In Feburary 2016 24,
Alexander Graham Bell was the first person to make a UTP cable by simply twisting two wires together. The basic design has changed little since 1881, and is still a pair of single conductors wrapped around each other inside an insulated jacket. Some cables include up to four pairs of twisted cable. There's no foil wrap shielding and no braided shield screen, so this kind of cable is more susceptible to interference than a shielded twisted pair.
Electrical Interference
Electrical signals carried through any conductor can create electromagnetic fields. Two or more electromagnetic fields in close proximity can interact with each other, which usually means loss of data or signal strength. Losing data in a computer network can result in a variety of problems. Shielded twisted pair cable is an option when interference is an issue.
Shielded and Unshielded Cables
Shielded and unshielded twisted pair cables carry several designations. Each type of cable has different electrical characteristics, varies in its ability to shield a signal, and is appropriate for different environments. Typical cable designations include UTP or U/UTP, the basic two-conductor without foil or braid shield; STP or U/FTP, which includes a foil shield under the jacket; and FTP or F/UTP, which includes a braided screen for additional protection. For some special environments, there are also heavier cable configurations with more shielding.
Cable Categories
There are different categories of cable, with CAT1 through CAT5, CAT5E and CAT6 being the most common. CAT1 is telephone wire and is not suitable for LAN communication. CAT2 through CAT5 are suitable for telephone or network communication, and differ in their ability to transmit high-speed data. CAT2 can support up to 4 Mbps, and CAT3 can go to 10 Mbps. CAT5 cable should be used for any high data speeds, up to 100 Mbps. CAT3, CAT4 and CAT5 carry more wires inside the jacket, with four pairs of twisted wire. In addition to having more conductors, conductors in a CAT5 cable are twisted more tightly together than in CAT4 and CAT3, which helps to prevent unwanted interference. CAT6 wire physically separates all four pairs of twisted conductors, further reducing the chance of interference, which makes it suitable for gigabit data speeds.
CAT5 and CAT5E Cable
CAT5E cable includes a variety of engineering improvements that make it superior in all respects to CAT5 cable. CAT5E cable is less susceptible to crosstalk, or interference between conductors, is rated at 350 MHz, can support gigabit Ethernet speeds, and has a tougher PVC jacket. The tougher jacket makes CAT5E cable less likely to be damaged during installation. Except for some networks that specifically call for CAT5 cable, CAT5E is suitable for all applications.
In Feburary 2016 24,
Friday, 19 February 2016
How to Measure Traffic on GoDaddyIn Feburary 2016 19,
In Feburary 2016 19,
Open your Web browser. Type your website's address followed by forward slash and the word 'stats.' For instance, www.example.com/stats. Just replace the word 'example' with your domain name.
Enter your password. The password will be the same GoDaddy password that you use for your hosting account.
Review your statistics. GoDaddy provides all hosting customers with raw data. You may need to purchase a site analytic plan through GoDaddy in order to understand the data or to organize it better.
Log in to your account manager at GoDaddy to view traffic results in a different platform. Click 'Launch' next to the account you want to use if you have more than one.
Go to the 'Statistics' menu and choose 'Traffic Logs.' You will be able to view your hosting account's traffic logs, including all requests for your website.
In Feburary 2016 19,
Open your Web browser. Type your website's address followed by forward slash and the word 'stats.' For instance, www.example.com/stats. Just replace the word 'example' with your domain name.
Enter your password. The password will be the same GoDaddy password that you use for your hosting account.
Review your statistics. GoDaddy provides all hosting customers with raw data. You may need to purchase a site analytic plan through GoDaddy in order to understand the data or to organize it better.
Log in to your account manager at GoDaddy to view traffic results in a different platform. Click 'Launch' next to the account you want to use if you have more than one.
Go to the 'Statistics' menu and choose 'Traffic Logs.' You will be able to view your hosting account's traffic logs, including all requests for your website.
In Feburary 2016 19,
Wednesday, 17 February 2016
List of Free Website ProvidersIn Feburary 2016 17,
In Feburary 2016 17,
Black Apple Host is an easy, free website where you can register quickly and have access to your website in less than 30 seconds. This site currently supports more than 59,000 people (November 2010) and offers support if you run into any problems. The setup is instant, and the site offers 5GB of disk space, 20GB of data transfer, 1 domain hosted, 1 subdomain, Layered Panel, Webstats, PHP, Perl, MySQL, PHPMyAdmin, and 1 FTP account with the free access. There are options for upgraded services at a cost.
ATB Host
ATB Host offers free hosting plans with free setup. The site provides online support and live support. Included in the free plan is 1 GB of disk space, 10 GB of monthly bandwidth, 1 e-mail account, 1 MySQL database, 1 FTP account, 5 add-on domains, virus protection and spam guard. If you post in the online forum, they will allow you more bandwidth, disk space and email accounts. There are also options for upgrades for a price.
Netfirms
Netfirms offers basic web hosting, and this site offers free software to assist you in building your first web page. This site offers 25 MB disk space, 1GB monthly transfer, 1 webmail e-mail account, 24/7 FTP Access, Frontpage and Pearl and customer support via e-mail. Netfirms is well-known for assisting investors, entrepreneurs, designers and developers and has been in business since 1998.
In Feburary 2016 17,
Black Apple Host is an easy, free website where you can register quickly and have access to your website in less than 30 seconds. This site currently supports more than 59,000 people (November 2010) and offers support if you run into any problems. The setup is instant, and the site offers 5GB of disk space, 20GB of data transfer, 1 domain hosted, 1 subdomain, Layered Panel, Webstats, PHP, Perl, MySQL, PHPMyAdmin, and 1 FTP account with the free access. There are options for upgraded services at a cost.
ATB Host
ATB Host offers free hosting plans with free setup. The site provides online support and live support. Included in the free plan is 1 GB of disk space, 10 GB of monthly bandwidth, 1 e-mail account, 1 MySQL database, 1 FTP account, 5 add-on domains, virus protection and spam guard. If you post in the online forum, they will allow you more bandwidth, disk space and email accounts. There are also options for upgrades for a price.
Netfirms
Netfirms offers basic web hosting, and this site offers free software to assist you in building your first web page. This site offers 25 MB disk space, 1GB monthly transfer, 1 webmail e-mail account, 24/7 FTP Access, Frontpage and Pearl and customer support via e-mail. Netfirms is well-known for assisting investors, entrepreneurs, designers and developers and has been in business since 1998.
In Feburary 2016 17,
Sunday, 14 February 2016
Access 2007 Automatic BackupIn Feburary 2016 14,
In Feburary 2016 14,
Access 2007's included backup feature saves a copy of the currently active database. To open this feature, click the 'Office' button. Highlight 'Manage' and click on 'Back Up Database.' The program will prompt you to choose a backup location and file name.
Automatic Backup
For users who need automatic backup, Windows includes a tool for backing up the specified data on a user-defined schedule. Type 'Backup and Restore' into the 'Start' menu search to open this feature in Windows 7 or Vista. In XP, click the 'Start' menu and navigate to the 'Accessories/System Tools' folder, then click on 'Backup.'
Other Options
Third-party backup programs also work with Access 2007 database files, and may offer additional options, such as online storage. Some computer manufacturers include backup software with new systems, such as the HP Backup and Recovery Manager or Dell DataSafe.
In Feburary 2016 14,
Access 2007's included backup feature saves a copy of the currently active database. To open this feature, click the 'Office' button. Highlight 'Manage' and click on 'Back Up Database.' The program will prompt you to choose a backup location and file name.
Automatic Backup
For users who need automatic backup, Windows includes a tool for backing up the specified data on a user-defined schedule. Type 'Backup and Restore' into the 'Start' menu search to open this feature in Windows 7 or Vista. In XP, click the 'Start' menu and navigate to the 'Accessories/System Tools' folder, then click on 'Backup.'
Other Options
Third-party backup programs also work with Access 2007 database files, and may offer additional options, such as online storage. Some computer manufacturers include backup software with new systems, such as the HP Backup and Recovery Manager or Dell DataSafe.
In Feburary 2016 14,
InterWorx Control Panel Vs. CPanelIn Feburary 2016 14,
In Feburary 2016 14,
Each service actually has two control panels. If you are running a hosting service, you get access to the server administration panel when you purchase InterWorx or cPanel. The InterWorx server control panel is NodeWorx. The cPanel control panel for the Web host is WebHost Manager. Website owners do not buy cPanel or InterWorx. Rather, they choose a Web host that provides one of these control panels. These website owners then get access to either the cPanel website control panel or InterWorx's SiteWorx.
Common Features
For Web hosts, common features found in both programs include the ability to create customized hosting packages for website owners, creation and management of new users, domain management, DNS management and the ability to offer reseller hosting.Website owners will find many of the same features in their control panels. Examples include email accounts, website statistics, subdomains, a file editor for editing in plain text and HTML, a file manager, FTP accounts for uploading files to websites, password protection for your website pages and backup options in case you lose data. Both control panels also provide for add-on domains, which are domains hosted under the same hosting package to save money. Both control panels also support cron jobs, PHP, MySQL and SSL.
Added Features
Each control panel offers a few things not provided by its competitor. For example, cPanel has FrontPage extensions, which allow you to directly upload files from FrontPage to your website. The cPanel product also provides several video tutorials for website owners. Services providing hosting for gaming sites can also choose the cPanel Game Server. Web hosts using Windows servers instead of Linux can choose cPanel's Enkompass control panel. InterWorx integrates the APF iptables firewall system for Web hosts. Web hosts can also use InterWorx to import entire domains previously hosted in cPanel, InterWorx or other control panels.Installation programs simplify the process of building a website, blog or similar features. To help website owners, cPanel uses the Fantastico Deluxe installation program, while InterWorx uses SimpleScripts. You can compare the list of available programs from these installation services to see which one you prefer.
Languages
Website owners in some countries may prefer a control panel due to language availability. At the time of publication, both services offer versions in English, Spanish, Portuguese, German and French. However, cPanel offers Iberian Spanish and Brazilian Portuguese, as well. Other languages that only cPanel offers include Arabic, Hindi, Dutch, Polish, Romanian, Russian and Chinese. However, only InterWorx offers Slovak, Hungarian, Italian, Turkish, Swedish and Czech.
Price
As of the time of publication, the InterWorx monthly license is about $25, and the yearly license is about $250. Support is included, but you must pay $50 for installation. Conversely, the cPanel yearly license is about $400, which includes installation and support. For an additional $200 per installation per year, you can get VPS Optimized2, which enhances performance while reducing memory usage. There is no cPanel monthly license. You can also get InterWorx for life for about $300. However, support ceases on that license after the first six months. An additional six months of support is available for $50. Both companies have authorized resellers or distributors. In that case, the price varies.
In Feburary 2016 14,
Each service actually has two control panels. If you are running a hosting service, you get access to the server administration panel when you purchase InterWorx or cPanel. The InterWorx server control panel is NodeWorx. The cPanel control panel for the Web host is WebHost Manager. Website owners do not buy cPanel or InterWorx. Rather, they choose a Web host that provides one of these control panels. These website owners then get access to either the cPanel website control panel or InterWorx's SiteWorx.
Common Features
For Web hosts, common features found in both programs include the ability to create customized hosting packages for website owners, creation and management of new users, domain management, DNS management and the ability to offer reseller hosting.Website owners will find many of the same features in their control panels. Examples include email accounts, website statistics, subdomains, a file editor for editing in plain text and HTML, a file manager, FTP accounts for uploading files to websites, password protection for your website pages and backup options in case you lose data. Both control panels also provide for add-on domains, which are domains hosted under the same hosting package to save money. Both control panels also support cron jobs, PHP, MySQL and SSL.
Added Features
Each control panel offers a few things not provided by its competitor. For example, cPanel has FrontPage extensions, which allow you to directly upload files from FrontPage to your website. The cPanel product also provides several video tutorials for website owners. Services providing hosting for gaming sites can also choose the cPanel Game Server. Web hosts using Windows servers instead of Linux can choose cPanel's Enkompass control panel. InterWorx integrates the APF iptables firewall system for Web hosts. Web hosts can also use InterWorx to import entire domains previously hosted in cPanel, InterWorx or other control panels.Installation programs simplify the process of building a website, blog or similar features. To help website owners, cPanel uses the Fantastico Deluxe installation program, while InterWorx uses SimpleScripts. You can compare the list of available programs from these installation services to see which one you prefer.
Languages
Website owners in some countries may prefer a control panel due to language availability. At the time of publication, both services offer versions in English, Spanish, Portuguese, German and French. However, cPanel offers Iberian Spanish and Brazilian Portuguese, as well. Other languages that only cPanel offers include Arabic, Hindi, Dutch, Polish, Romanian, Russian and Chinese. However, only InterWorx offers Slovak, Hungarian, Italian, Turkish, Swedish and Czech.
Price
As of the time of publication, the InterWorx monthly license is about $25, and the yearly license is about $250. Support is included, but you must pay $50 for installation. Conversely, the cPanel yearly license is about $400, which includes installation and support. For an additional $200 per installation per year, you can get VPS Optimized2, which enhances performance while reducing memory usage. There is no cPanel monthly license. You can also get InterWorx for life for about $300. However, support ceases on that license after the first six months. An additional six months of support is available for $50. Both companies have authorized resellers or distributors. In that case, the price varies.
In Feburary 2016 14,
How to Transfer Photos From a Computer to an EmailIn Feburary 2016 14,
In Feburary 2016 14,
Log in to your email account. Click the 'Compose' or 'New' option to set up a new email draft.
Type your own email address in the 'To:' field. Type 'Photos' in the subject field, which is usually two data forms below where your email address has been placed.
Click the option that reads either 'Attach' or 'Photo.'
Click 'My Documents' and select the 'Pictures' tab folder in the pop-up dialog box to locate the photos you want to transfer from the computer.
Hold down the 'CTRL' key and click each picture only once.
Click 'Open' to attach the pictures into your email draft.
Click 'Send' once all of the pictures have attached to the email successfully.
In Feburary 2016 14,
Log in to your email account. Click the 'Compose' or 'New' option to set up a new email draft.
Type your own email address in the 'To:' field. Type 'Photos' in the subject field, which is usually two data forms below where your email address has been placed.
Click the option that reads either 'Attach' or 'Photo.'
Click 'My Documents' and select the 'Pictures' tab folder in the pop-up dialog box to locate the photos you want to transfer from the computer.
Hold down the 'CTRL' key and click each picture only once.
Click 'Open' to attach the pictures into your email draft.
Click 'Send' once all of the pictures have attached to the email successfully.
In Feburary 2016 14,
Thursday, 11 February 2016
WebIn Feburary 2016 11,
In Feburary 2016 11,
Customer support agents working for Web-hosting companies help clients with a variety of concerns, including setup issues such as website migration, software settings and any other initial problems getting started. Support staff continue to help clients after setup, troubleshooting issues such as connectivity problems, data storage and security. Web-hosting support and sales staff speak with clients to provide solutions over the phone and when needed they communicate through virtual private servers that allow customer support agents to control the customer's computer. Web-hosting jobs that revolve around sales require the same expertise. Sales agents identify the needs of potential customers while linking them to services offered by a Web-hosting company.
Job Requirements
Web-hosting jobs require in-depth knowledge of different types of software and computer systems that host websites. In addition to knowledge of Web-hosting platforms, workers need to be familiar with common website databases, programming languages, content-management systems and popular Web-based software such as WordPress and Joomla. Since the majority of work involves connecting with customers, Web-hosting workers must be comfortable communicating with clients and be able to relate to client needs. The ability to reach an understanding about technical issues with people who aren't technically adept is a crucial part of providing sales and service.
In Feburary 2016 11,
Customer support agents working for Web-hosting companies help clients with a variety of concerns, including setup issues such as website migration, software settings and any other initial problems getting started. Support staff continue to help clients after setup, troubleshooting issues such as connectivity problems, data storage and security. Web-hosting support and sales staff speak with clients to provide solutions over the phone and when needed they communicate through virtual private servers that allow customer support agents to control the customer's computer. Web-hosting jobs that revolve around sales require the same expertise. Sales agents identify the needs of potential customers while linking them to services offered by a Web-hosting company.
Job Requirements
Web-hosting jobs require in-depth knowledge of different types of software and computer systems that host websites. In addition to knowledge of Web-hosting platforms, workers need to be familiar with common website databases, programming languages, content-management systems and popular Web-based software such as WordPress and Joomla. Since the majority of work involves connecting with customers, Web-hosting workers must be comfortable communicating with clients and be able to relate to client needs. The ability to reach an understanding about technical issues with people who aren't technically adept is a crucial part of providing sales and service.
In Feburary 2016 11,
Labels:
communicate,
connectivity,
data,
needed,
phone,
provide,
sales,
solutions,
speak,
storage
How to Create Bulk Emails in CPanelIn Feburary 2016 11,
In Feburary 2016 11,
Log in to the cPanel for your site or blog.
Locate and click on the 'Fantastico Deluxe' icon. The Fantastico window appears, displaying organized script options on the left and domains requiring upgrades on the right.
Click on 'PHPList' under 'Mailing Lists,' then click on 'New Installation.'
Select which domain to send bulk emails from under the drop down menu below 'Installation Location' and type in a name for 'Install in Directory.'
Enter your cPanel administrator's user name and password under 'Admin Access Data.'
Set your email preferences under 'Base Configuration,' such as the number of sequential bounces, allowed lists, criteria and attachments. Select the preferred language.
Create a POP account to use exclusively with PHPList. Enter an email account user name and password in the required fields for the POP/SMTP server connected to your site.
Select the method of processing your message queue. 'Manual' is preferable for mailing lists of 1,000 subscribers and under, and 'Cron' is preferable for mailing lists larger than 1000. Cron will run in the background automatically. If you select Cron, set the frequency of the background Cron jobs from the drop down menu.
Click 'Install PHPList,' then click 'Finish Installation.'
Enter an email address in the 'Send Email' box to create a record of the PHPList user name, password and URL location information provided.
Go to the site's new PHPList administrator web address and log in.
Import emails into PHPList by clicking on 'Import' under 'List and User Functions.' Select one of the four methods to use to import an email list and follow the directions for that method.
Create and send a bulk email message by clicking on 'Send' under 'Message Functions.' Enter the subject and content of the message under the 'Content' tab. Add attachments through the 'Attachment' tab and schedule the date and time for the email release under the 'Scheduling' tab.
Select the list of email addresses to send the bulk email to and then click 'Send a Message to the Selected Mailing Lists.'
In Feburary 2016 11,
Log in to the cPanel for your site or blog.
Locate and click on the 'Fantastico Deluxe' icon. The Fantastico window appears, displaying organized script options on the left and domains requiring upgrades on the right.
Click on 'PHPList' under 'Mailing Lists,' then click on 'New Installation.'
Select which domain to send bulk emails from under the drop down menu below 'Installation Location' and type in a name for 'Install in Directory.'
Enter your cPanel administrator's user name and password under 'Admin Access Data.'
Set your email preferences under 'Base Configuration,' such as the number of sequential bounces, allowed lists, criteria and attachments. Select the preferred language.
Create a POP account to use exclusively with PHPList. Enter an email account user name and password in the required fields for the POP/SMTP server connected to your site.
Select the method of processing your message queue. 'Manual' is preferable for mailing lists of 1,000 subscribers and under, and 'Cron' is preferable for mailing lists larger than 1000. Cron will run in the background automatically. If you select Cron, set the frequency of the background Cron jobs from the drop down menu.
Click 'Install PHPList,' then click 'Finish Installation.'
Enter an email address in the 'Send Email' box to create a record of the PHPList user name, password and URL location information provided.
Go to the site's new PHPList administrator web address and log in.
Import emails into PHPList by clicking on 'Import' under 'List and User Functions.' Select one of the four methods to use to import an email list and follow the directions for that method.
Create and send a bulk email message by clicking on 'Send' under 'Message Functions.' Enter the subject and content of the message under the 'Content' tab. Add attachments through the 'Attachment' tab and schedule the date and time for the email release under the 'Scheduling' tab.
Select the list of email addresses to send the bulk email to and then click 'Send a Message to the Selected Mailing Lists.'
In Feburary 2016 11,
Wednesday, 10 February 2016
How to Make a VPS Out of a Dedicated ServerIn Feburary 2016 10,
In Feburary 2016 10,
Check to determine if your physical server meets the hardware requirement of the hypervisor that you want to use. A hypervisor is the operating system that manages the virtual servers. Some hypervisors require specific hardware to install at all.
Save the data and/or configuration of the appliance currently running on the physical server.
Put the disc in the reader and install the hypervisor. Hypervisors install like any other operating system.
Virtual Server
Once installed, you will be able to boot in the hypervisor console. Refer to your manual to create a Virtual Machine (VM). Choose what CPU power, memory and storage amount the VM will have access to. The CPU power, RAM amount and storage amount can be changed after creation if your appliance's needs go up.
Install the operating system using an ISO (image of a disk stored on a hard drive), a disk or the network. The installation and configuration is identical to an installation on a physical server. Install and configure the appliance.
Repeat the process for all of the appliances you want to install in virtual servers on the physical server.
In Feburary 2016 10,
Check to determine if your physical server meets the hardware requirement of the hypervisor that you want to use. A hypervisor is the operating system that manages the virtual servers. Some hypervisors require specific hardware to install at all.
Save the data and/or configuration of the appliance currently running on the physical server.
Put the disc in the reader and install the hypervisor. Hypervisors install like any other operating system.
Virtual Server
Once installed, you will be able to boot in the hypervisor console. Refer to your manual to create a Virtual Machine (VM). Choose what CPU power, memory and storage amount the VM will have access to. The CPU power, RAM amount and storage amount can be changed after creation if your appliance's needs go up.
Install the operating system using an ISO (image of a disk stored on a hard drive), a disk or the network. The installation and configuration is identical to an installation on a physical server. Install and configure the appliance.
Repeat the process for all of the appliances you want to install in virtual servers on the physical server.
In Feburary 2016 10,
Tuesday, 9 February 2016
How to Manage Your Web Traffic Using GodaddyIn Feburary 2016 09,
In Feburary 2016 09,
Go to the homepage for GoDaddy (see Resources below). Go to the 'Hosting and Servers' menu. Select the 'Traffic Facts' option.
Review the information provided to determine whether you want to pay for Traffic Facts. Note that site statistics are included with your hosting account. Purchase Traffic Facts if you need additional features, like the ability to export data to spreadsheets or access raw data log files.
Choose a time period. You can try Traffic Facts, with a monthly charge, for a minimum of three months or a maximum of two years.
Click the 'Add to Cart' button. Look through the options on the 'Customize Your Order' page that will appear. Consider the 'Traffic Blazer' option, a service designed to help increase traffic to your Web site.
Choose the additional options you want to purchase, if any, by checking the boxes provided and using the scroll-down menus to select an appropriate plan or term. Click 'Continue.' You will have an opportunity to add more services. Click 'Continue' to proceed to 'Checkout' and pay for your order.
Head back to the homepage for GoDaddy. Log in to your account. Choose 'Web Hosting and Databases' from the list and select the account you want to manage with Traffic Facts.
Select 'Apply Traffic Links to This Account.'
Evaluate the Results
Study the figures brought in by Traffic Facts and/or Traffic Blazer. They can help you pinpoint problem areas of your site as well as help you manage what is currently working.
Make changes to your site based on the information provided. For example, eliminate links that scored low in the 'Link Popularity Report.'
In Feburary 2016 09,
Go to the homepage for GoDaddy (see Resources below). Go to the 'Hosting and Servers' menu. Select the 'Traffic Facts' option.
Review the information provided to determine whether you want to pay for Traffic Facts. Note that site statistics are included with your hosting account. Purchase Traffic Facts if you need additional features, like the ability to export data to spreadsheets or access raw data log files.
Choose a time period. You can try Traffic Facts, with a monthly charge, for a minimum of three months or a maximum of two years.
Click the 'Add to Cart' button. Look through the options on the 'Customize Your Order' page that will appear. Consider the 'Traffic Blazer' option, a service designed to help increase traffic to your Web site.
Choose the additional options you want to purchase, if any, by checking the boxes provided and using the scroll-down menus to select an appropriate plan or term. Click 'Continue.' You will have an opportunity to add more services. Click 'Continue' to proceed to 'Checkout' and pay for your order.
Head back to the homepage for GoDaddy. Log in to your account. Choose 'Web Hosting and Databases' from the list and select the account you want to manage with Traffic Facts.
Select 'Apply Traffic Links to This Account.'
Evaluate the Results
Study the figures brought in by Traffic Facts and/or Traffic Blazer. They can help you pinpoint problem areas of your site as well as help you manage what is currently working.
Make changes to your site based on the information provided. For example, eliminate links that scored low in the 'Link Popularity Report.'
In Feburary 2016 09,
The Differences Between a Business Analyst a Data AnalystIn Feburary 2016 09,
In Feburary 2016 09,
A business analyst's understanding of an organization's operating and technological environments enables him to serve as an intermediary between the organization's user community and its information technology staff. The analyst documents a planned system's functional requirements, creates a business case that supports the IT project, conveys the requirements to the information technology staff, and confirms by a review of system project documentation that approved and documented business requirements are correctly represented in a system project plan. In addition, the analyst confirms through system testing that a developed or revised system meets the functional, performance and security requirements that are defined for the system.
Data Analyst
The focus of a data analyst is the collection, organization and analysis of data. Data management and reporting systems are used by the analyst to collect and organize data that may be extracted from multiple databases. In addition, the analyst determines the data collection protocols to be used that will best support the subsequent extrapolation and interpolation of values required to meet business objectives. The data analyst selects the reporting tools required to create graphs, charts and other report formats necessary to support the user community. Analysts also possess the technical expertise required to troubleshoot data extraction and data storage issues.
Data Analyst Expertise
The data analyst skill set includes mathematical skills as well as experience with the use of reporting tools including Microsoft Access, Excel and Crystal Reports. Expertise with relational database design and development tools including MySQL and SQL Server is also useful. Frequently, data analysts have earned a four-year statistics, computer science or business administration degree.
Business Analyst Expertise
The skills of a business analyst may include expertise in the implementation of particular software such as SAP or PeopleSoft applications, in addition to experience working with data extraction and testing tools. Educational credentials frequently include a business degree. An MBA is not unusual. Analysts' work experience may be focused in a particular industry in that many business processes are industry specific. Professional experience that reflects support of change management, customer service and supply chain initiatives is also common.
In Feburary 2016 09,
A business analyst's understanding of an organization's operating and technological environments enables him to serve as an intermediary between the organization's user community and its information technology staff. The analyst documents a planned system's functional requirements, creates a business case that supports the IT project, conveys the requirements to the information technology staff, and confirms by a review of system project documentation that approved and documented business requirements are correctly represented in a system project plan. In addition, the analyst confirms through system testing that a developed or revised system meets the functional, performance and security requirements that are defined for the system.
Data Analyst
The focus of a data analyst is the collection, organization and analysis of data. Data management and reporting systems are used by the analyst to collect and organize data that may be extracted from multiple databases. In addition, the analyst determines the data collection protocols to be used that will best support the subsequent extrapolation and interpolation of values required to meet business objectives. The data analyst selects the reporting tools required to create graphs, charts and other report formats necessary to support the user community. Analysts also possess the technical expertise required to troubleshoot data extraction and data storage issues.
Data Analyst Expertise
The data analyst skill set includes mathematical skills as well as experience with the use of reporting tools including Microsoft Access, Excel and Crystal Reports. Expertise with relational database design and development tools including MySQL and SQL Server is also useful. Frequently, data analysts have earned a four-year statistics, computer science or business administration degree.
Business Analyst Expertise
The skills of a business analyst may include expertise in the implementation of particular software such as SAP or PeopleSoft applications, in addition to experience working with data extraction and testing tools. Educational credentials frequently include a business degree. An MBA is not unusual. Analysts' work experience may be focused in a particular industry in that many business processes are industry specific. Professional experience that reflects support of change management, customer service and supply chain initiatives is also common.
In Feburary 2016 09,
Labels:
analysis,
Analyst,
collect,
collection,
data,
focus,
Management,
reporting,
revised,
systems
How to Build a Merchant WebsiteIn Feburary 2016 09,
In Feburary 2016 09,
Select your company name. Your name should be easy to remember. Once you've selected your name, purchase a domain name from GoDaddy.com (see Resources).
Choose an E-commerce site to host your Web site. Volusion.com offers an entire package that includes your domain name, shopping cart and Web hosting, starting at $19.95. Corecommerce.com is another E-commerce site that offers packages for as little as $29.95 (you will need to purchase your own domain name). Both sites offer business e-mail addresses, Web site templates (and the ability to use your own design), marketing tools, accounting tools, data feeds, Google AdWords coupons, the ability to create coupons or newsletters for your store and the ability to accept a number of different payment methods such as Paypal, Google Checkout and credit cards. GoDaddy.com allows you to pick and choose the services you need, such as a domain name or shopping cart. Web hosting starts at $4.99. If you aren't familiar with SEO and online selling, an all-inclusive site such as Corecommerce.com may be the way to go. Both Volusion.com and Corecommerce.com offer a free 30-day trial.
Build an attractive storefront. Take high-quality images of your products and create clear and thorough product descriptions that use relevant key words.
Create your business profile on an About Me page on the Web site that includes some information about how your business began, your vision and your goals. Create a Shipping and Returns page as well as a Privacy Notice page that tells your customers how you intend to use and safeguard their personal information.
Minimize risks by using security measures such as Secure Socket Layer (SSL) certificates such as those offered by VeriSign and payment gateways such as Authorize.net (see Resources). Contact your hosting site to see what services they offer or which gateways are compatible.
In Feburary 2016 09,
Select your company name. Your name should be easy to remember. Once you've selected your name, purchase a domain name from GoDaddy.com (see Resources).
Choose an E-commerce site to host your Web site. Volusion.com offers an entire package that includes your domain name, shopping cart and Web hosting, starting at $19.95. Corecommerce.com is another E-commerce site that offers packages for as little as $29.95 (you will need to purchase your own domain name). Both sites offer business e-mail addresses, Web site templates (and the ability to use your own design), marketing tools, accounting tools, data feeds, Google AdWords coupons, the ability to create coupons or newsletters for your store and the ability to accept a number of different payment methods such as Paypal, Google Checkout and credit cards. GoDaddy.com allows you to pick and choose the services you need, such as a domain name or shopping cart. Web hosting starts at $4.99. If you aren't familiar with SEO and online selling, an all-inclusive site such as Corecommerce.com may be the way to go. Both Volusion.com and Corecommerce.com offer a free 30-day trial.
Build an attractive storefront. Take high-quality images of your products and create clear and thorough product descriptions that use relevant key words.
Create your business profile on an About Me page on the Web site that includes some information about how your business began, your vision and your goals. Create a Shipping and Returns page as well as a Privacy Notice page that tells your customers how you intend to use and safeguard their personal information.
Minimize risks by using security measures such as Secure Socket Layer (SSL) certificates such as those offered by VeriSign and payment gateways such as Authorize.net (see Resources). Contact your hosting site to see what services they offer or which gateways are compatible.
In Feburary 2016 09,
How to Create a MySQL TableIn Feburary 2016 09,
In Feburary 2016 09,
Write the skeleton of the CREATE command. In this example, the table is named 'customers.' Replace 'customers' with the name of the table you want to create. Example:
CREATE TABLE customers (
);
Create an id column. All tables should have an id column to uniquely identify that row, since two rows can exist with identical data. Without an id column, it would be impossible to tell the two rows apart.
Define the id column as an integer. It should also be an AUTO_INCREMENT column. This means MySQL keeps track of the id numbers for you in sequential order. Example:
id INTEGER AUTO_INCREMENT,
Remember that an AUTO_INCREMENT column is also required to be a primary key and add this line. Example:
PRIMARY KEY (id)
Create a string column using the VARCHAR column type. A VARCHAR(n) will hold up to n characters but no more, so be sure to choose an n that's large enough to hold all the data you'll need, yet short enough so it won't waste space. Example:
name VARCHAR(32),
Create a real number column. A 'real' number is anything but an integer. If, for example, you want to store a customer's balance, you'll need to store cents as well as dollars, so a FLOAT column type is also necessary. Example:
balance FLOAT,
Create an integer column. Here an INTEGER is used to track the number of purchases a customer has made. Example:
purchases INTEGER,
Create a date column. This example uses a DATE column to store the date of the first purchase. Example:
customer_since DATE,
Put the column types together. The command can be on multiple lines to make it easier to read and to store in files. The MySQL command-line client also allows for commands to be entered this way. Example:
CREATE TABLE customers (
id INTEGER AUTO_INCREMENT, name VARCHAR(128),
address VARCHAR(512),
ph_number VARCHAR(20),
email VARCHAR(64), balance FLOAT, purchases INTEGER, customer_since DATE, PRIMARY KEY (id)
);
In Feburary 2016 09,
Write the skeleton of the CREATE command. In this example, the table is named 'customers.' Replace 'customers' with the name of the table you want to create. Example:
CREATE TABLE customers (
);
Create an id column. All tables should have an id column to uniquely identify that row, since two rows can exist with identical data. Without an id column, it would be impossible to tell the two rows apart.
Define the id column as an integer. It should also be an AUTO_INCREMENT column. This means MySQL keeps track of the id numbers for you in sequential order. Example:
id INTEGER AUTO_INCREMENT,
Remember that an AUTO_INCREMENT column is also required to be a primary key and add this line. Example:
PRIMARY KEY (id)
Create a string column using the VARCHAR column type. A VARCHAR(n) will hold up to n characters but no more, so be sure to choose an n that's large enough to hold all the data you'll need, yet short enough so it won't waste space. Example:
name VARCHAR(32),
Create a real number column. A 'real' number is anything but an integer. If, for example, you want to store a customer's balance, you'll need to store cents as well as dollars, so a FLOAT column type is also necessary. Example:
balance FLOAT,
Create an integer column. Here an INTEGER is used to track the number of purchases a customer has made. Example:
purchases INTEGER,
Create a date column. This example uses a DATE column to store the date of the first purchase. Example:
customer_since DATE,
Put the column types together. The command can be on multiple lines to make it easier to read and to store in files. The MySQL command-line client also allows for commands to be entered this way. Example:
CREATE TABLE customers (
id INTEGER AUTO_INCREMENT, name VARCHAR(128),
address VARCHAR(512),
ph_number VARCHAR(20),
email VARCHAR(64), balance FLOAT, purchases INTEGER, customer_since DATE, PRIMARY KEY (id)
);
In Feburary 2016 09,
Labels:
AUTO_INCREMENT,
data,
Define,
identical,
impossible,
integer,
means,
MySQL,
numbers,
track
Sunday, 7 February 2016
How Do I Change Data in Vertical Columns to Horizontal Columns in Excel or Access?In Feburary 2016 07,
In Feburary 2016 07,
Highlight the columns you want to transpose into rows. Press “Control + C” to copy the data.
Open a new worksheet for the transposed data. Select an empty worksheet tab from the bottom of the Excel window, or press “Shift + F11” to create a new worksheet. Rename the worksheet “Transposed Data.”
Right-click on cell “A1” to open the context menu. Select “Paste Special” from the menu to open the “Paste Special” dialog.
Check the “Transpose” box at the bottom of the “Paste Special” dialog to transpose the data. Click “OK.” Your data will be pasted into the spreadsheet as rows. Save your workbook.
Transposing Data in Access
Open the table you want to transpose. Select “Save As/Export” from the “File” menu. Select “To an External File or Database” in the 'Save As' window and click “OK.”
Give your table a name and select the version of Excel installed on your computer from the dialog box. Click “Export.”
Open your exported file in Microsoft Excel. Follow Steps 1-4 of “Transposing Data in Excel.” Close Microsoft Excel.
Import the transposed data into Microsoft Access. Select “Import” from the “File” menu. Use the “Files of Type” drop-down list and select “Microsoft Excel.”
Locate and select the file that contains the transposed data and click “Import.” Click “Show Worksheets” on the first screen of the Import Wizard and select the “Transposed Data” worksheet. Click “Next.”
Do not select the “First Row Contains Column Headings” option in the second screen of the Import Wizard; click “Next.” Check the “No Primary Key” option on the third screen of the Import Wizard and click “Finish” to import your data into a new table.
In Feburary 2016 07,
Highlight the columns you want to transpose into rows. Press “Control + C” to copy the data.
Open a new worksheet for the transposed data. Select an empty worksheet tab from the bottom of the Excel window, or press “Shift + F11” to create a new worksheet. Rename the worksheet “Transposed Data.”
Right-click on cell “A1” to open the context menu. Select “Paste Special” from the menu to open the “Paste Special” dialog.
Check the “Transpose” box at the bottom of the “Paste Special” dialog to transpose the data. Click “OK.” Your data will be pasted into the spreadsheet as rows. Save your workbook.
Transposing Data in Access
Open the table you want to transpose. Select “Save As/Export” from the “File” menu. Select “To an External File or Database” in the 'Save As' window and click “OK.”
Give your table a name and select the version of Excel installed on your computer from the dialog box. Click “Export.”
Open your exported file in Microsoft Excel. Follow Steps 1-4 of “Transposing Data in Excel.” Close Microsoft Excel.
Import the transposed data into Microsoft Access. Select “Import” from the “File” menu. Use the “Files of Type” drop-down list and select “Microsoft Excel.”
Locate and select the file that contains the transposed data and click “Import.” Click “Show Worksheets” on the first screen of the Import Wizard and select the “Transposed Data” worksheet. Click “Next.”
Do not select the “First Row Contains Column Headings” option in the second screen of the Import Wizard; click “Next.” Check the “No Primary Key” option on the third screen of the Import Wizard and click “Finish” to import your data into a new table.
In Feburary 2016 07,
Subscribe to:
Comments (Atom)