Input Data Search Results

How To: Make your first graph in Microsoft Excel

In this tutorial, we learn how to make your first graph in Microsoft Excel. First, open a new graph and enter in your data. Click and drag down from the original date you enter to have the other dates automatically entered in. Enter the rest of your information, then highlight all the data. Go to the menu and click "insert", then "chart". Now, go through the chart wizard to select what kind of chart you want to make. When you are finished entering all your preferences, change your values so t...

How To: Group quantitative data into classes in MS Excel

If you use Microsoft Excel on a regular basis, odds are you work with numbers. Put those numbers to work. Statistical analysis allows you to find patterns, trends and probabilities within your data. In this MS Excel tutorial from everyone's favorite Excel guru, YouTube's ExcelsFun, the 20th installment in his "Excel Statistics" series of free video lessons, you'll learn how to take raw quantitative (numerical) data and figure out how to group it into classes so that you can have categories an...

How To: Create a table for the VLOOKUP function in Excel

In this video tutorial, viewers will learn how to create a table for the VLOOKUP function in Excel. Create a dynamic table for the VLOOKUP function as well as a dynamic lookup area so that as you add new data or columns to the Lookup table. Create dynamic ranges using the Excel Table feature and Table Formula Nomenclature for the Data Validation drop-down list, the VLOOKUP table and the MATCH table. See an IF function formula that creates new labels as new columns are added to the lookup tabl...

How To: Clear Firefox Browsing Cache and Cookies

Here Danny Beales shows you how to quickly clear your Firefox cache and cookies. To clear your Firefox cache, do the following: Go to Tools Clear Private Data Select which data you would like to have cleared, and click on Clear Private Data. Your cookies and/or cache has been cleared. Remember to do this from time to time, because it will help speed up your browser's performance as well as keep harmful cookies from tracking your browsing.

How To: Use text fields in FileMaker Pro 10

If your into data based business,then this one's for you. Text field's are very much important while making a data based solution in FileMaker Pro 10.You can go to file menu>manage>database and there is the field's tab. Text field is used for storing text and no other such use. Text field's can hold up to 2GB of information. It can help to store raw data and formatting information, i.e., color,point size as well as type face.

How To: Use Excel spreadsheet setup & cell references

In this Excel basic video the instructor shows how to setup a spreadsheet and use cell references. Cell references are used in Excel to refer to other cells in a formula. When a formula contains data based on the cell reference the formula auto generates the result each time the value in the cell changes as the formula contains only the reference to the cell and not the actual data present in it. In this video the tutor goes on and shows how to write a few basic formulas using cell references...

How To: Use Microsoft Excel for beginners

MotionTraining gives an overview for using Microsoft Excel for beginners in this video. This video gives a rundown and overview of the basics of this spreadsheet program: from typing in the columns and rows, adding dollar signs to data, and how to make basic calculations. MotionTraining will show how to make text stand out with bold and italics, adding colors to your data, and how to make a grid appear during the printing process. Creating various charts of the data in the spreadsheet is also...

How To: Share data between client JavaScript and server code

In this video tutorial, Chris Pels will show how to share data in between JavaScript and server-side code by using a hidden field in an ASP.NET page. Next, learn how to use the RegisterHiddenField method in server-side code to programmatically create a hidden field on the client. In addition, see how to programmatically create a HiddenField server control for sharing data on an ASP.NET page. Finally, use the RegisterArrayDeclaration method to create a container in server code for storing mult...

How To: Wire a car amplifier and subwoofer inside your house

This easy to follow silent and accurate video will guide you quickly and easily through what you'll need, (like a Power Supply, a sound system that has a Subwoofer Pre-output and a High Input adapter, which may already come with your amp.) First learn what colored wires should be connected to simulate your PC starting. Then connect the amp to the power supply to simulate the car Head-Unit starting. Once the power issues are handled, the video assists you with connecting your audio input. It i...

How To: Create a transform effect in Illustrator

This video takes us through the procedure of creating a transform effect in Illustrator. First, choose a rectangular box and fill color in it. Input some text inside the box. The font and the color of the text can also be changed. Then position the text properly. Make a group of the shape and text. Now go to effect and choose transform. Transform is a very powerful effect which lets us create duplicates. Now select the number of copies, for example, one copy. Select preview. Now set the point...

How To: Use Excel data analysis filter & dynamic ranges

We're on sheet, tab, filter. We want to talk about filter, but we also want to talk about an Excel table or list. It is simply a data set with field names at the top, records in rows, no blanks anywhere and no other data sets touching this data set. When we convert to a table, it does a lot of amazing things. The new keyboard shortcut is "Ctrl T". If data is set up correctly, it will work. Click Ok. You can build a function based on a column of data, i.e. "Alt =" which is the shortcut for sum...

How To: Build a mini fume extractor

Materials needed: Altoid mint tin, 9 volt batter and connector, switch, 7812 voltage regulator, 12 volt computer fan, carbon filter and 2 pieces of screen. Wire the battery connectors. Solder all of the following: Negative connector to the switch, wire to the switch, ground wire of the voltage regulator to the middle wire, output for the 7812 to the fan, positive lead on the 9 volt connector to the input on the 7812 and the negative from the 7812 to the negative on the fan. Test. Put all the ...

How To: Create a game character that moves using Flash CS4

So you want to make your own video game using Flash CS4 and Actionscript 3. We applaud your chutzpah. This video will walk you through what should probably be your first steps: importing a sprite character, making them move around in response to keyboard inputs, and making them animate depending on how they are moving. Once you have this established, you can move on to creating enemies to fight, environments to wander, and all the other elements that make a good game.

How To: Know what your cat is trying to tell you

Have you ever wondered why your cat does wacky things like head butt you? Do you wish you and your cat could speak the same language? With input from an expert animal behaviorists, you can! In this video, Sara gives you the low down on why your cat is so aggressive, why he won't stop scratching your furniture, and how to interpret your cat's meows. Now you can finally understand what exactly is your cat is trying to tell you. Here you'll find a brief introduction to some common behaviors you ...

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 1

There is no shortage of defenses against cross-site scripting (XSS) since it is so prevalent on the web today. Filters are one of the most common implementations used to prevent this type of attack, usually configured as a blacklist of known bad expressions or based on regex evaluation. But there is hope with a wide variety of techniques that can be used to defeat these filters.

How To: Transfer Your Authy Account to a New Phone

One of the main reasons Authy was able to top our list of the best two-factor authentications apps was its ability to transfer access to a new device. This feature ensures that whenever you get a new phone, you don't lose all your tokens. However, if the process is done incorrectly, you can leave your account vulnerable.

Released: iOS 12 Dev Beta 3 (Public Beta 2), Includes Improved Maps, Bug Fixes & Security Patches

Apple released the third beta of iOS 12 for developers on Tuesday, July 3. The update comes exactly two weeks after the release of the second developer beta, which introduced a variety of fixes as well as new issues, and just one week after the release of the public beta. Public beta testers received this iOS 12 update on Thursday, July 5, labeled as public beta 2.

How To: Disable the 'Unlock iPhone to Use Accessories' Notification in iOS 11.4.1 & Higher

If you're on iOS 11.4.1 or iOS 12 and go more than an hour without unlocking your iPhone, an "Unlock iPhone to Use Accessories" message will appear whenever you connect your iPhone to a computer or other device that tries to use the Lightning cable's data lines. This is to protect you, but it can be annoying if you have no reason to believe that law enforcement or criminals will have access to your iPhone.

How To: Everything to Do When You Get a New Phone

After setting up your phone, there are a number of things you should do immediately before download your favorite apps. Specifically, now that your data is on the device, you need to take steps now to ensure it's both protected and retained. Fortunately, most of these steps are a one-time process.

News: Verizon Caves to Demand for Unlimited Data Plans, Makes Customers Happy

Verizon has long been king in the wireless provider market, but recently it has had to step up its game in the data department. A limited data plan — with supposedly superior service — was no longer cutting it for customers. Many of whom left to take up the sweet, sweet offers of competitors like Sprint and T-Mobile. This past fiscal year, Verizon had a net loss of customers in the first quarter. Something that has never happened to them before.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 16 (Extracting EXIF Data from Image Files)

Welcome back, my greenhorn hackers! In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as evidence. Obviously, in some cases these graphic images may be the evidence such as in child pornography cases. In other situations, the graphic images may tell us something about where and when the suspect was somewhere specific.

News: Oculus Is Collecting a Scary Amount of Data for Facebook

The highly anticipated VR headset hasn't been on the market long, but there's an issue that has some consumers, and even government officials, concerned about the Oculus Rift. You probably guessed the issue surrounds privacy and the extensive, not-so-secret way that it's collecting your personal data. The privacy concerns came about as various customers and media outlets took notice of the rather lengthy Terms and Services that pop up once you strap yourself into the Rift headset.

Basics of Ruby: Part 1 (Data Types/Data Storage)

Ruby is a dynamic, general-purpose programming language created by Yukihiro "Matz" Matsumoto in Japan around the mid-90's. It has many uses but with it's flexibility, it makes a great language to write exploits in. In fact, the entire Metasploit Framework is written in Ruby! The sole purpose of this series is to teach hackers the basics of Ruby, along with some more advanced concepts that are important in hacking.