Calculate Percentages Examples

How To : Play The Game "Killer" With Playing Cards

Briefing Playing cards are used to play Killer but Killer is not exactly a card game. You cannot play this game if you do not know how to wink. I do not recommend that you go about winking at men and women to practice for this game. A minimum of 4 players are required to pla ...more

News : QR and ER Incorporation

Sergio Peralta Advisor: Jessica Davis ER/QR incorporation 18 January 2012 Workshop plans My senior thesis is creating a poetry/autobiography writing workshop. I will help develop my student’s autobiographical skills through poetry. My target group is mainly 9th graders be ...more

News : Everything You Need to Know About the New Facebook

Facebook unveiled a lot of changes last week, and, as usual, it's causing a lot of consternation and controversy. People within my Facebook, and on Google+, keep asking how to remove the ticker, and are trying, and mostly failing to make sense of the changes. I've decided to ...more

How To : Read a ruler

Everyone has used a ruler at some point in their life, whether for art sizing, blueprint plans, or sizing up your widescreen television on your living room wall. But there's a lot of little ticks on the ruler that you may not be aware of. Your ruler shouldn’t be used only to d ...more

How To : Build stairs for decks and porches

In this five-part video, learn the art of stair-making. If your deck or porch needs a new set of steps, why not do it yourself? The StairGuide makes it easy to figure the rise and run of steps, and the nubbier of steps needed for a staircase. Building outdoor staircases is a ...more

How To : Understand & Use IPv4 to Navigate a Network

You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discove ...more

How To : Easily Generate Hundreds of Phishing Domains

A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more

How To : Find the Area and Volume of a Hemisphere

A hemisphere is sphere that has been cut in half. When you cut the sphere in half you are left with the great circle, plus half of a sphere. This fact can be used to find the area, and the volume of a hemisphere. The video works several example problems in which the area and v ...more

How To : 26 Big iPhone Features and Improvements on iOS 16.1

It hasn't been long since Apple released iOS 16.0 with over 350 new features, but iOS 16.1 just came out with even more cool updates for your iPhone. While some of the recent upgrades were expected, others are somewhat surprising — and there's even one that you may not even th ...more

How To : Tactical Nmap for Beginner Network Reconnaissance

When it comes to attacking devices on a network, you can't hit what you can't see. Nmap gives you the ability to explore any devices connected to a network, finding information like the operating system a device is running and which applications are listening on open ports. Th ...more

News : 44 Cool New Features & Changes in Android 9.0 Pie

Even though most phones don't have Oreo yet, Google has released Android 9.0 Pie. It's available on Google's own Pixel devices, and updates should soon be available to partnered devices from Essential, Nokia, Oppo, Sony, Vivo, and Xiaomi. We're already digging into it to highl ...more

How To : 12 Tofu Hacks That Even Tofu-Haters Can Appreciate

Tofu has been a staple food in Asia for over 2,000 years, but due to the health craze of recent years, it's enjoyed a surge of popularity in the Western world. Derived from the milk of soy beans and typically coagulated by calcium or magnesium salts, tofu can be found in consi ...more

How To : Use the if Function in Excel

Video: . IF function This article describes the formula syntax and usage of the IFfunction in Microsoft Excel. Description The IF function returns one value if a condition you specify evaluates to TRUE, and another value if that condition evaluates to FALSE. For example, the ...more

How To : All the Reasons You Should Root Your Phone

Rooting. As an Android user, I'm sure you've heard the word once or twice. According to Kaspersky, 7.6% of all Android users root — but for the 92.4% who don't, we wanted to talk to you. Rooting allows you to remove barriers and open Android to a level of unprecedented contro ...more

How To : Use the Zoom and Push Tool in Xara Web Designer

Learn to Zoom to page, drawing, selection, previous, 100% and scale by numerical factor using zoom tool in Xara Web Designer. The zoom to page option is great for when you need to see all the web design elements that are shown on your web page at once. For example, imagine th ...more

How To : Get the Most Value from Your iPhone Trade-In

Phones these days are expensive. The iPhone 11 Pro is presumed to start at $999, following the iPhone XS and iPhone X's leads. One way to bring down that cost is to trade in your old iPhone, but there isn't one clear-cut way to do that. You could trade your iPhone into a parti ...more

News : 27 Cool New Features & Changes in Android 8.0 Oreo

It's official — the newest version of Google's mobile operating system is called Android 8.0 Oreo, and it's in the process of rolling out to many different devices. Oreo has plenty of changes in store, ranging from revamped looks to under-the-hood improvements, so there's tons ...more

Waymo Was Right : Why Every Car Maker Should Skip Level 3

Most carmakers now agree with Waymo that piloting driverless cars is best left to the machine — with no meddling from the human. In Waymo's case, this assumption dates back years ago. More recently in 2014, Google's driverless arm (before it became Waymo) shocked Detroit when ...more

How to Hack Wi-Fi : Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more

  • Hot
  • Latest