Free Essay

How to Use Winrar

In:

Submitted By Daxyns
Words 361
Pages 2
Andy
Professor Ellis
Technical Writing
November 19, 2012
Instruction on how to extract a file using WinRAR
Step 1: Download WinRAR if you do not have the application. You will find it on the internet by searching WinRAR in the search bar.
Note: If you already have WinRAR skip to Step 4.

Step 2: Download the right file depending if your system is 32 bit or 64 bit.
Step 3: Install WinRAR and make sure the application is on the desktop and or know the location of the file.

Step 4: Open the application by double clicking the WinRAR to start the program.
Note: You don’t have to purchase the license right away, because there is a 40 day trail to use this application.
Step 5: Click on the close button to continue.

Step 6: Locate the file that you want to Extract that is ZIP files. Click once on the file that you want to extract.
Note: The files that you can Extract will look like the file that is inside the red box. It doesn’t have to be the same in which is shown below.

Step 7: Click on the Extract To button which is located right above the search bar.

Note: A new window will pop up and display options on how to extract it.

Step 8: Choose a destination for the file to be extracted to.
Note: You don’t have to use the same save location as what is displayed below.

Step 9: After selecting the location where it’s going to be saved at. Click on the Ok button, which is located at the bottom right of the application.

Step 10: Wait till the extraction the extraction is complete.
Step 11: Once the extraction is complete, you can close the program by pressing the X button at the top right of the application.

Step 12: Locate the extracted file where ever it was saved at.
Note: It should look like what is displayed below, which this was saved on the desktop.

Step 13: The file extraction was completed using WinRAR, you can open it up and it will allow you to view whatever the file contains.

Similar Documents

Premium Essay

Nt1330 Unit 3 Lab Report

...shortcuts? Why would we use them? What is the Windows AutoHotkey? What do the following shortcuts do? Keyboard shortcuts are simpler ways to command your computer. We use shortcuts to get around the computer in a much faster way. Windows AutoHotkeys are custom shortcuts that comes for Windows Microsoft. Control + C - Copy Control + V - Paste Control + X - Cut Control + A - Bold Alt + Tab - Switch Between running programs Control + Esc - Start Menu Windows + F - Find files & Folders Windows - Start menu 2. Print Screen is a shortcut that takes a screen shot of what is being displayed. We use when we are going to print what ever is...

Words: 857 - Pages: 4

Premium Essay

Faqs on Electronic Filing and Payment System of Bir

...Internal Revenue (BIR) for electronically filing tax returns, including attachments, if any, and paying taxes due thereon, specifically through the internet. What is e-Filing? e-Filing is the process of electronically filing returns including attachments, if any, specifically through the internet. What is e-Payment? e-Payment is the process of electronically paying a tax liability through the internet banking facilities of Authorized Agent Banks (AABs). Why do we need to use eFPS? What are its objectives? With eFPS, taxpayers can avail of a paperless tax filing experience and can also pay their taxes online through the convenience of an internet-banking service via debit from their enrolled bank account. In addition, since eFPS is available on the Internet, taxpayers can file and pay for their taxes anytime, anywhere as long as he or she is using a computer with an internet connection. What are the expected benefits of the system? The eFPS is: - Convenient to use - it is quick and simple to use, as well as secure. - Interactive - information exchange is immediate and online, users get immediate feedback from the system when enrolling, e-filing or performing e-payments. - Self-validating - errors are minimized because all of the information supplied by the taxpayer is validated before final submission. - Fast - response or acknowledgment time is quicker than manual filing. - Readily available - eFPS is available 24 hours a day, 7 days a week including holidays...

Words: 3160 - Pages: 13

Premium Essay

Management Information Technology Literature Review

...Running head: ETHICAL BEHAVIOR AND THE WORKPLACE How Businesses Are Using Technology to Enforce Ethical Behavior in the Workplace: Jonathan R. Jordan Liberty University Abstract Many companies and organizations are finding enviable growth and expansion only by delving into new markets. To accomplish this, companies must seize the advantage of utilizing the latest and most effective technology. With the rapid advancement of technology, the importance of business ethics has increased immensely. Ethics has always been an important subject as long as companies and organizations have been conducting business. However, this rapid technological advancement has and will have a tremendous impact on business ethics. This literature review will explain how businesses are using technology to enforce ethics in the workplace. It will discuss how the progression of technology is forcing businesses and organizations to approach their operations from an ethical perspective. It will explain the importance of business ethics, and will provide research concerning what has been accomplished to utilize technology in enforcing business ethics. Ethics The concept of ethics involves deciding what kind of work life businesses and companies should seek for their employees (Audi, 2009). Morality, honesty, and integrity, are ethical concerns that are seemingly deficient in modern society. However, the concept of ethics reaches further into the fiber of corporations and businesses...

Words: 6959 - Pages: 28

Free Essay

Data

...Tutorial on Classification Igor Baskin and Alexandre Varnek Introduction The tutorial demonstrates possibilities offered by the Weka software to build classification models for SAR (Structure-Activity Relationships) analysis. Two types of classification tasks will be considered – two-class and multi-class classification. In all cases protein-ligand binding data will analyzed, ligands exhibiting strong binding affinity towards a certain protein being considered as “active” with respect to it. If it is not known about the binding affinity of a ligand towards the protein, such ligand is conventionally considered as “nonactive” one. In this case, the goal of classification models is to be able to predict whether a new ligand will exhibit strong binding activity toward certain protein biotargets. In the latter case one can expect that such ligands might possess the corresponding type of biological activity and therefore could be used as ‘’hits” for drug design. All ligands in this tutorial are described by means of an extended set of MACCS fingerprints, each of them comprising 1024 bits, the “on” value of each of them indicating the presence of a certain structural feature in ligand, otherwise its value being “off”. Part 1. Two-Class Classification Models. 1. Data and descriptors. The dataset for this tutorial contains 49 ligands of Angeotensin-Converting Enzyme (ACE) and 1797 decoy compounds chosen from the DUD database. The set of "extended" MACCS fingerprints is used as...

Words: 5674 - Pages: 23

Free Essay

Exal

...Asus From Wikipedia, the free encyclopedia Jump to: navigation, search For the Arts & Science Undergraduate Society, see Queen's Faculty of Arts and Sciences. ASUSTeK Computer Inc. (trading as Asus) | | Type | Public | Traded as | LSE: ASKD, TWSE: 2357 | Industry | Computer hardware Electronics | Founded | 2 April 1989 | Founder(s) | T.H. Tung Ted Hsu Wayne Hsieh M.T. Liao | Headquarters | Beitou District, Taipei, Taiwan | Area served | Worldwide | Key people | Jonney Shih (Chairman) Jerry Shen (CEO) | Products | Desktops, laptops, netbooks, mobile phones, networking equipment, monitors, motherboards, graphics cards, optical storage, multimedia products, servers, workstations | Revenue | US$14.73 billion (2011)[1] | Profit | US$565.2 million (2011)[1] | Employees | 18,850 (2011)[1] | Website | Asus.com | Asus | Traditional Chinese | 華碩電腦股份有限公司 | Literal meaning | ASUSTeK Computer Inc. (Great Splendid Computer Corporation) | [show]Transcriptions | | ASUSTeK Computer Inc., trading as Asus (/ˈeɪsuːs/[2]), is a Taiwanese multinational computer hardware and electronics company headquartered in Taipei, Taiwan. Its products include desktops, laptops, mobile phones, monitors, motherboards, servers, tablet PCs and video cards. The company's slogan is: "Inspiring Innovation. Persistent Perfection."[3] Asus is the world's fifth-largest PC vendor by 2012 unit sales (after HP, Lenovo, Dell and Acer).[4] Asus appears in BusinessWeek’s...

Words: 6997 - Pages: 28

Free Essay

Blah

...18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...

Words: 17866 - Pages: 72

Free Essay

Khan

...part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-159989-4 The material in this eBook also appears in the print version of this title: 0-07-159988-6. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior...

Words: 43266 - Pages: 174

Premium Essay

Computer Tricks

...academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification designed to immerse the learner in an interactive environment where they will learn how to scan, test, hack and secure information systems. Ideal candidates for the C|EH program are security professionals, site administrators, security officers, auditors or anyone who is concerned with the integrity of a network infrastructure. The goal of the Ethical Hacker is to help the organization take...

Words: 61838 - Pages: 248

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501