Is someone using a stylus w / their Tablet?

RE: HP basic capacitive stylus

RE: HP 7 more tablets

Can you tell me what actually work for you.  Honestly, I don't like the touch screen.  IT slows me down typing.  And I wonder if the stylus is a tool better than my fingers.

Chicago0048 wrote:

RE: HP basic capacitive stylus

RE: HP 7 more tablets

Can you tell me what actually work for you.  Honestly, I don't like the touch screen.  IT slows me down typing.  And I wonder if the stylus is a tool better than my fingers.

I do not use a stylus.

I'm typing this reply on a HP Tablet with a BlueTooth keyboard.  For me, it's the only way to seriously type with a Tablet!

It is an ancient Palm (by today's standards) folding BlueTooth keyboard.  Pretty much any BT keyboard which States "compatible Android" should work if you are interested.

WyreNut

Tags: HP Tablets

Similar Questions

  • Cursor turns in a circle when you use the pen and Wacom Tablet?

    When you use the stylus and Tablet Wacom the cursor becomes a circle inscribed in a circle and use.

    What type of Wacom tablet work?  I have a Cintiq, and according to that tool I use, I tend to change the pointer in what ever I need.

    But if you use an Intuos I can ask someone at Wacom Europe, since I work closely with them on the Wacom InfoChannel.

    Let me know.

  • Someone used my apple ID

    Someone used my apple ID to log in my iCloud and implemented on their MacBook iMessage. How is that possible? How can I make sure that nobody can no longer use it? I changed my password.

    Go to iforgot.apple.com, and change your password immediately. Then I recommend the marketing of two-step verification. This will appleid.apple.com then connection, go to security and turn on validation in two steps. Hope, the one who got in it does nothing.

  • Why can I not use my HP Pavilion tx1000 tablet form

    I recently bought my computer off of ebay, HP Pavilion tx1000 tablet PC (tx1115nr (P / N:RV309UA #ABA)).  The computer has been renovated and did not come with a stylus. Windows vista is the operating system.  do I need a special stylus, or do I need other software. I contacted the seller and his answer was not the tablet PC are touchscreen. Well I can understand, but I'd still be able to use a STYLUS to take handwritten notes in windows journal / one note.

    Hi chrisworden,

    Check the link below for the manual for the HP Pavilion tx1000.

    http://h10032.www1.HP.com/CTG/manual/c00853874.PDF

    You will need to contact HP support or see the PDF above to see if this laptop model can serve as a tablet PC.

    http://welcome.HP.com/country/us/en/contact_us.html

  • PC/tablet-is there a laboratory touchscreen top that works on windows 7 / 8, where the screen can detach the keyboard to use in the form of tablets, or screen can be reached for keyboard vertically or horizontally?

    Labtop / Tablet question -I'm shopping for a new Labtop.    Is there a laboratory touchscreen top that works on windows 7 / 8, where the screen can detach the keyboard used in the form of tablets and then transformed (with long vertical side) and attached to the keyboard to type a length full page (8.5 x 11 page) and then returned (long horizontal side) one attached to the keyboard (to be used as a stand) for a movie with all the features of present characteristics of a top laboratory such as 4 to 8 GB memory and a 500 GB hard drive (perhaps as part of the screen or connected to / through the keyboard, if it is used as a docking station)?

    It seems with all the technology of the tablet on the market that Microsoft or somebody would do something like that now.  Can someone help me? Thank you

    -Scott M

    PS: My wife has an ASUS transformer where the screen detaches from the keyboard, so it can be used in the form of tablets.  When it is attached to the keyboard, the keyboard acts as a stand to sit on the counter for watching movies.  And then the keyboard and the screen can fold them together, so when it is closed there is a stand-alone case. This, however, runs the Android operating system.  Basically, I want this same design (for the potability in a Briefcase), but with it running Microsoft Windows so it can be used as any other labtop.  It the keyboard could have a number pad are associated with, that would be a bonus.

    Hi pr-e-s,.

    You can check with asus.

    http://us.Acer.com/AC/en/us/content/home

    http://us.Acer.com/AC/en/us/content/group/notebooks

    http://us.Acer.com/AC/en/us/content/group/notebooks

  • using photoshop cs5 on possible tablets?

    Hello

    I think about to buy a Tablet for Photoshop cs5. I'm not sure it will work, that s why I want to know if someone has expieriences using the application on a tablet. Otherwise, I would buy a net or a laptop.

    I would be very happy when I inform about it.

    Thank you very much.

    Kind regards

    Toni Kuchinke

    An idea that MAY work to install or run some programs in Windows 10 old... works for some, not for others

    -http://www.tenforums.com/tutorials/15523-compatibility-mode-settings-apps-change-windows-1 0 - a.html

    - or run as Administrator http://forums.adobe.com/thread/969395 to assign FULL permissions can help... said yet, but sometimes it is necessary for all Adobe programs (this is same as using an administrator account)

  • Someone had problems with custom javascript does not once someone adds a product to their cart?

    Just as the title suggests, for some reason any I noticed the javascript (from some of the tutorials that bcgurus offers), I add to my pages Web does not work once someone adds a product to their cart. It's almost as if the javascript code is deleted from the page entirely once this 1 (add to cart) button is pushed. I don't know if I'm just something wrong or... I don't know, just thought I'd ask. Thanks in advance!

    BC e-commerce code removes and recreates the set containing the block html on most events (all?), so the event handlers that you have joined, or changes, in deleted items also well inside that block.

    Try setting your listeners to an element outside of this block using event bubbling.

  • At the launch of Thunderbird, how can I set a password that prevents viewing of my emails if someone uses my computer?

    At the launch of Thunderbird, how can I set a password that prevents viewing of my emails if someone uses my computer?

    100% this addons can help you
    https://addons.Mozilla.org/en-us/Thunderbird/addon/master-password/

    Look at my Thunderbird when I open

  • Someone using Skype on PHILIPS Xenium W632?

    Really this smartphone and will buy it and really need to have Skype on it - but I am warned that someone could not run Skype on this device.

    Someone using Skype on it?

    Any comments?

    What about video calls using the front camera?

    Thank you very much in advance!

    Ooooohhh... Nobody seems to know this phone, and no one is using Skype on this... Hard to believe!
    OK, I found it: Skype works on this phone - but no video call and therefore any use of the front camera.

  • Someone uses another SMTP relay and then using my email address to send spam.

    Someone uses another SMTP relay and then using my email address to send spam. They have no access to my hotmail otherwise I see on sent items. I can see the SMTP server on the header. What should do?

    They send SPAM to some of my contacts.

    Someone uses another SMTP relay and then using my email address to send spam. They have no access to my hotmail otherwise I see on sent items. I can see the SMTP server on the header. What should do?

    They send SPAM to some of my contacts.

    Not a question for the forum of Virus and malware/scanning software and removal of threats.

    A moderator will move your post to the Forum Microsoft Account, Hotmail, Skydrive.

    http://ask-Leo.com/my_contact_list_is_getting_spam_from_me_what_do_i_do.html

  • Someone used this on me and after a while windows shell program take completely my computer as well as bank accounts

    I finally understand what has happened to all computers, I threw out and now it's a. Someone used this on me and after a while windows shell program take completely my computer as well as the account numbers of bank accounts and cards and so on. I got it with computers. I have been a dedicated customer of Microsoft and I can't believe that you would put on such a dangerous program that any computer fool can use to people disrupting. I want to know what I can wip this thing by buying a new hard drive and operating system put this program on this subject before I sitgn on the internet and don't have not this thing happen? I would like to send you the hard drive rinse you these people in the open air where I could get my hands on them. This coswt haqs me more than I want to tell you.

    I think that you're wrong in your assessment of what you have been.  "Shell Microsoft Program"?  Please explain.

    If configure you your own computer, software Windows XP firewall is enabled, have a decent router (reset and configured with a password before connecting anything to him) between your network and the Internet, and you have changed all your passwords for each account to a password that is hard (15 characters or more containing at least three of the four character types (: uppercase, lowercase, number, and symbol) and checked that each account online has a configuration password recovery method that * you * have you personally (no one else has used your password they obtained to make sure if you have already changed your password, they could get the upper hand) and you have a decent anti-virus software installed. Then you should be fine.

    You can Disable Remote Desktop (on Windows XP Professional - you left out the details of your operating system in your rant) and Remote Assistance if that makes you more comfortable or you do not use these functions.

    Otherwise - most of it security is common sense stuff.  Do not download or run things do not know the origin of and trust said origin and application.  Do not open unknown emails and instant messages.  If you do not call to get your computer fixed, don't expect sopmeone will call you to fix your computer problem - and if they don't - know it's a scam.  Don't visit questionable websites.  Do not use the computer on a daily basis with a user account that could ruin everything (run as a normal user, not an administrator for your daily activities.)  Keep your system and you have installed - including all antivirus software - up to date/current.  Keep your computer in a locked - room physical security is a top priority.  Backup your important data to external media.  Change your password periodically - because you have a password - most probably someone can get it.  If something is * really * important keep you the 'secret' and protected - encrypt.  Almost every other method can be easily bypassed - encryption, not so much.  Etc and so on...

  • How to tell if someone uses remote adjustment to control the use of my computer?

    How to tell if someone uses remote adjustment to control the use of my computer?

    * original title - monitoring computer use *.

    Hello

    Why do you think that someone is watching your computer use? One would have to have
    loaded tracking software (trojan) on your computer or have access to the source of the network
    you use, such as cable, on your leg of it and have very sophisticated equipment.

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be harder to detect as
    the cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this into the search-> find COMMAND to top box and RIGHT CLICK-
    RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to analyze the log file entries that the Microsoft Windows Resource Checker
    (SFC.exe) program generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Run checkdisk - schedule it to run at the next startup, then apply OK then restart your way.

    How to run the check disk at startup in Vista
    http://www.Vistax64.com/tutorials/67612-check-disk-Chkdsk.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    =======================================

    For extreme cases:

    Norton Power Eraser - eliminates deeply embedded and difficult to remove crimeware
    This traditional antivirus analysis does not always detect. Because the Norton Power Eraser
    uses aggressive methods to detect these threats, there is a risk that it can select some
    legitimate programs for removal. You should use this tool very carefully and only after
    you have exhausted other options.
    http://us.Norton.com/support/DIY/index.jsp

    ================================

    If you are in North America, you can call 866-727-2338 to get infections of virus and spyware. Seehttp://www.microsoft.com/protect/support/default.mspx for more details. For international information, check your subsidiary local Support site.

    I hope this helps.

  • I let someone use my computer and somehow they ended up formatting my hard drive, so now I have no operating system. If windows are not coming how can I fix.

    I let someone use my computer and somehow they formatted my computer, s he always tells me to run the Startup Repair, but it won't let me. Someone knows how to fix this?

    Your best option is to try to reinstall Windows 7:

    If Windows 7 is pre-installed:

    New computers that come pre-installed with Windows often have what is called a recovery partition. This is used to reinstall an operating system in the case of a system failure. To access it, you need to start when you start your computer by pressing a function key. This can be either F1, F2, F9, F10, F11, F12 key DEL or tab. See the manual that came with your PC for instructions on how to reinstall Windows.

    If your recovery partition is not available or damaged, you must contact the manufacturer of your computer, and request that a defined recovery disk you can use to reinstall Windows 7. They could practice a small shipping and handling.
    ------------------------------------
    This is how the recovery partition is accessible to most popular brands...
    For Dell, press CTRL + F11 directly after switching on the device
    For HP, press F11 directly after switching on the device
    For LG, press F11 directly after switching on the device
    For Toshiba, press and hold "0" BEFORE and during the power upward
    For Acer, press and hold ALT + F10, as soon as you see the logo
    For Asus, press F9, as soon as you see the Asus logo.
    For Samsung, press F4 to the power upward...
    For Fujitsu, press the F8 key directly after the power
    Advent, restart your computer. Then, press F10 repeatedly until the message "Starting system recovery"
    Sony VAIO, reboot and press "F8" or "F10" repeatedly until the screen "Advanced Boot Options".

    If you have a retail copy of Windows 7 installed, use your reinstallation disk to perform a new installation:

    http://Windows.Microsoft.com/en-us/Windows7/installing-and-reinstalling-Windows-7

  • How to tell if someone uses my count at home when I'm not home?

    Original title: who was on my computer.

    Probably a stupid question, but I've never had to ask before.  How to tell if someone uses my count at home when I'm not home?

    You can examine (eventwvr.exe) Event Viewer system log. He recorded each logon.

  • Is someone using the data cloud connector Melissa with Eloqua

    We are in the middle of our integration and try to make calls from Melissa Data of our Eloqua forms.  Anyone out there who did or can provide an overview?

    I understand that if someone used this service in real time - if a person completes a form and between a postal code invalid - in real-time we ping Melissa Data to know it is a zip code not valid, and the person filling out the form receives a message that is not valid the data.  Our territory lead routing depends on ensuring that we correct geographic information if we want the data validated in real time.  Thank you!

    Post edited by: Maia Tihista

    Maia,

    I could be wrong, but I'm not aware of a Melissa data cloud connector which was built immediately.  From what I know, I think that David York (on this thread) may be closest on that.  There are other people interested too, can't wait to see it built.

    Steve

Maybe you are looking for

  • this sweet Microsoft product key behind the back of the laptop not working not

    Hello The product key is behind my laptop don't is not accepted in ms office 2010, I formatted and after putting the key does not work... help me

  • HP and/or Techtronix Multisim and GRAPHER

    Is there anyway to have the results of the Tecktronix and the HP o-scopes in Multisim appear in the Grapher?  Not sure why they don't, but they do not.

  • Why I can't install Windows 7 USB DVD Tool?

    Hi, I am located in Sweden and recently bought premium to the home page of Windows 7 on the Windows Store Web site. I chose to download the file to .iso formats the hard drive. Then I was told to download Windows7, but just after full download USB-DV

  • Questions SSHD on the computer.

    Hello all and thanks in advance for the help. I have a Samsung series 5 that came with a solid state Hybrid Drive. Since almost the beginning, it never worked right, and I could never see the SSD or get things like the Cache Express or fast to work.

  • BlackBerry Smartphones Notepad, Word go, Excell to go are missing.

    Had one major flaw 3 weeks ago while in portugal. App error 523 came on a WSOD. I reinstalled the operating system using a Portuguese pc (not easy because my Portuguese is, well, uh,... zip!) So I went from 4.7 to V5. Icons and screen were very sligh