Do you find programs with ”help” files that can’t be accessed offline disingenuous?

1 Answer

Answer :

Yes, I certainly do. Unfortunately, it seems that many if not most of the help documentation out there is written hastily, as an afterthought, and not tested. Programmers like to write code, not documentation- at least, so it’s frequently been said both on various blogs and on the maillists I frequent. This is a problem, because they also frequently don’t like to write readable code. In a few cases I’ve looked at the codebase of a project with a view to improving it’s documentation, only to find myself lost in the code. I’ve not found any tactful way to bring this up without the developers having a snit about it, either.

Related questions

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : With so many people crying for unity of the nation, why does it seem so many are disingenuous about it?

Last Answer : Because so many ARE disingenuous about it and many of the others know it.

Description : What should you do if you "call out" someone for being disingenuous, but then you get accused by that person of bullying?

Last Answer : answer:In my experience, shoot the messenger comes from the recipient of the message, not from the subject. If the person you are reporting against is causing trouble, that should also be reported to ... . By calling out do you mean you are reporting their behavior to an authorized third party?

Description : Customer only restrooms, to make exceptions are being disingenuous to the policy?

Last Answer : answer:I have a rule too. Don’t patronize any establishment which denies human dignity.

Description : How do you convert Word files to PDF files offline?

Last Answer : You can carry out a conversion between Word to PDF with the help of Bitwar PDF converter.Check out the following steps to see how it works:Step 1: Install and Launch the PDF Converter software.Step ... for the Docx to PDF conversion to complete and click Open file to preview the new PDF files!

Description : Is BitLocker disk encryption compatible with online/offline backups?

Last Answer : answer:Are you completely settled on Bit Locker? it was developed by Microsoft and is almost all proprietary (not open source) software. Microsoft has worked with NSA and other organizations in the past. ... to make to you - just that BitLocker is somewhat suspect from a security point of view.

Description : What is the best iPad survey application that's appropriate for children, has a user friendly inteface and works offline?

Last Answer : answer:

Description : What is the best way to install packages in Ubuntu offline?

Last Answer : Bad news: you'd have to download all its dependencies in advance as well. While the packages.ubuntu .com site does tell you which packages it dependencies on, this can get quite tiresome if those ... might see if I can install them, check which dependencies it installs and bundle them in an archive.

Description : Why can't I and how can I read files on my Macbook?

Last Answer : Install the program on your computer, otherwise you’ll have to export them at school. Not experience but just common sense,

Description : How is Darknet/Deepnet accessed?

Last Answer : You’ll need tor, and don’t use Javascript if you want to remain anonymous

Description : Would you confront someone if you believed s/he accessed personal documents of yours?

Last Answer : Yes I would. I would speak to them privately, tell them of my suspicions and ask them to confirm or deny them. Then I would probably tell them how I feel about my private writings and ask why they did it.

Description : Website can be accessed by URL. -Technology

Last Answer : True Each Website is accessed by its own address known as URL.

Description : What memory technology allows two memory modules to be accessed at the same time?

Last Answer : What is the answer ?

Description : Are there any answering machine and phone units that can be accessed remotely?

Last Answer : Most modern answering machines can be accessed by calling your home number and letting the phone ring. You then have to enter a code when the answering machine picks up. This is a very common feature.

Description : Can all Spotify songs be accessed via Spotify Free?

Last Answer : The free version of Spotify is much like a radio station. So, if you are a free user, you cannot enjoy lots of additional features for premium users.Through TunesKit Spotify music converter, you can ... skip as many songs as you want. What's more, you can download Spotify songs listening offline.

Description : As compared to diskettes, the hard disks are A) More expensive B) More portable C) Less rigid D) Slowly accessed

Last Answer : Answer : A

Description : _________is a copy of Basic Input/Output Operating System (BIOS) routines from Read Only Memory (ROM) into a special area of RAM so that they can be accessed more quickly. A. Dynamic RAM B. Shadow RAM C. Synchronous Graphics RAM D. Video RAM

Last Answer : B. Shadow RAM

Description : What’s the .NET collection class that allows an element to be accessed using a unique key? 

Last Answer : HashTable. 

Description : What’s the .NET collection class that allows an element to be accessed using a unique key?

Last Answer : HashTable.

Description : As compared to diskettes, the hard disks are a. More expensive b. More portable c. Less rigid d. Slowly accessed

Last Answer : More expensive

Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine ? a. POP3 b. IMAP c. SMTP d. DMSP

Last Answer : b. IMAP

Description : Critical Region is: a) a set of instructions that access common shared resources which exclude one another in time b) the portion of the main memory which can be accessed only by one process at a time. c) Both of The Above d) None of The Above

Last Answer : a) a set of instructions that access common shared resources which exclude one another in time

Description : What exactly is cloud computing? a) A way to organize desktop computers b) Lightweight software that takes up little space on a hardware c) Computing resources that can be accessed on demand, like electricity from a utility d) The World Wide Web

Last Answer : Computing resources that can be accessed on demand, like electricity from a utility

Description : As compared to diskettes, the hard disks are a. More expensive b. More portable c. Less rigid d. Slowly accessed

Last Answer : a. More expensive

Description : In 8279, the keyboard entries are debounced and stored in an _________, that is further accessed by the CPU to read the key codes. a) 8-bit FIFO b) 8-byte FIFO c) 16 byte FIFO d) 16 bit FIFO

Last Answer : b) 8-byte FIFO

Description : When you start an Oracle DB which file is accessed first?

Last Answer : Oracle first opens and reads the initialization parameter file (init.ora) [oracle@hostname ~]$ls -la $ORACLE_HOME/dbs/initDB1_SID.ora -rw-r--r-- 1 oracle oinstall 1023 May 10 19:27 /u01/app/oracle/product/ ... 1 0 12:59 ? 00:00:05 ora_pmon_DB1_SID oracle 6779 1 0 12:59 ? 00:00:06 ora_smon_DB1_SID

Description : The FMC navigational database can be accessed by the pilots: a. To update the database b. To read information only c. To change information between the 28 day updates d. To change the information to meet the sector requirements

Last Answer : b. To read information only

Description : In the ………………… mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access

Last Answer : B) Random access

Description : As compared to diskettes, the hard disks are a. More expensive b. More portable c. Less rigid d. Slowly accessed

Last Answer : a. More expensive

Description : Which of these about a dictionary is false? a) The values of a dictionary can be accessed using keys b) The keys of a dictionary can be accessed using values c) Dictionaries aren’t ordered d) Dictionaries are mutable

Last Answer : b) The keys of a dictionary can be accessed using values

Description : Which of following can not be accessed randomly (A) DRAM. (B) SRAM. (C) ROM. (D) Magnetic tape.

Last Answer : Ans: D Magnetic tape can only be accessed sequentially.

Description : Advantages of B2C commerce to customers are  (i)wide variety of goods can be accessed and comparative prices  can be found  (ii) shopping can be done at any time  (iii)privacy of transactions can be guaranteed  (iv) ... be guaranteed a. i and ii b. ii and iii c. iii and iv d. i and iv

Last Answer : a. i and ii  

Description : Theory of multiple intelligence implies the following except Options: A) intelligence is a distinct set of processing operations used by an individual to solve problems. B) disciplines should be presented ... could be accessed through a variety of means D) emotional intelligence is not related to IQ

Last Answer : D) emotional intelligence is not related to IQ

Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine? (A) POP3 (B) IMAP (C) SMTP (D) DMSP

Last Answer : (B) IMAP

Description : ______ involves traversing the entire file system, marking everything that can be accessed. (1) Index pointer (2) Garbage collection (3) File system (4) Stack pointer

Last Answer : Garbage collection

Description : What is the size of memory which can be accessed by direct accessing in 8085 microprocessor? A) 64 kB B) 4 kB C) 128 kB D) 128 MB 

Last Answer : What is the size of memory which can be accessed by direct accessing in 8085 microprocessor? A) 64 kB B) 4 kB C) 128 kB D) 128 MB 

Description : Default programs to open picture files in problem...help?

Last Answer : Defaults for opening applications can be reset from the Control Panel. I would delete that program because it does things without permission. She may wish to install IrfanView which is quite well-behaved and free.

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : On a mac, is there some way I can change the default Icon for a program's files?

Last Answer : If there’s not an option to change them in CandyBar, I can’t think of another way to change every file of a type. You can change individual files’ icons by going to “Properties”, then clicking the icon, and pasting an image over it.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Icons represent graphical representation of various files and programs of an operating system.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.

Description : ………….. are desktop icons that links to particular files and programs. -Technology

Last Answer : Shortcutsare desktop icons that links to particular files and programs.

Description : What keys are used to permanently delete programs or files ?

Last Answer : Shift + Del keys are used to permanently delete programs or files .

Description : How can the user determine what programs are available on a computer? 1) Checking the hard disk properties 2) Viewing the installed programs during the booting process 11 3) Checking the operating system ... of installed programs. 4) Checking the existing files saved on the disk 5) None of these

Last Answer : Answer :4

Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above

Last Answer : e) None of The Above

Description : Overlay is: a) A part of an operating system b) A single contiguous memory that is used in olden days for running large programs by swapping c) Overloading the system with many user files d) None of The Above

Last Answer : b) A single contiguous memory that is used in olden days for running large programs by swapping

Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these

Last Answer : b) Backup software

Description : Define what do the characters “r” and “w” mean when writing programs that will make use of files?

Last Answer : “r” means “read” and will open a file as input wherein data is to be retrieved. “w” means “write”, and will open a file for output. Previous data that was stored on that file will be erased.

Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above

Last Answer : C) Physical

Description : Is there an accurate way to track conversion data for offline advertising campaigns? I.e. the number of downloads of a mobile App that is promoted on coffee sleeves?

Last Answer : I'm not an expert in this field yet!, but it seems to me there could be some type of code or password that would differentiate the source. For example, it might be something as simple as coffee ... online. The sign-in/login page for the app could say something like, Enter code for special offer!