Trending February 2024 # 2 Unexpected File Types Where Computer Viruses Can Be Found # Suggested March 2024 # Top 3 Popular

You are reading the article 2 Unexpected File Types Where Computer Viruses Can Be Found updated in February 2024 on the website We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested March 2024 2 Unexpected File Types Where Computer Viruses Can Be Found

How Non-EXE Viruses Work

There’s a common myth circulating around the web: As long as a file doesn’t have an EXE (“.exe”) extension, then you can open it without having a second look. This argument has a significant flaw and doesn’t account for the behavior of programs that open the files. We will now have a look at a few different file types that viruses can be present in and discuss them in detail.

First of all, a file doesn’t have to have the EXE extension to execute. Screensaver (SCR) and batch (BAT) files are good examples of this, and you’ll find plenty of viruses with this extension to this day.

Besides executable files, you can also have a virus that manipulates the program that opens it, like malicious Windows Help (CHM) files. A CHM virus will open the Windows Help program and use some of its features to harm your computer. Depending on how complex the program is, a virus can even collect information from your computer and send it home without any sign of wrongdoing. Every virus needs some form of access to the Windows application programming interface (API). Some programs offer some level of access (like Microsoft Word) and can really put your computer at risk.

1. Word Macro Viruses

One of the most common types of a typical viruses is the Microsoft Word macro virus. It’s grown to a level in which even Microsoft warns about them in its own site. One of the biggest attacks came from a macro virus known as W97M/Melissa.A. This particular virus would deliver itself in an email that contains a Word document attachment. Once the virus executed in Microsoft Word 97/2000, it would first send itself from your computer to all your email contacts. After that, the virus writes itself into your normal template ( so that every document you start within Word would be infected. Although most viruses are dangerous, this particular macro virus posed a very small threat. Another variant of the virus (Melissa.V) actually destroys Excel documents after searching for them.

To protect yourself from viruses like these, it’d be wise to disable macros. The most recent versions of MS Word already do this for you and ask if you’d like to enable macros when you open such a document. The threat presented by these viruses shouldn’t be underestimated, though.

2. PDF Viruses

In the year 2001, a new kind of virus was discovered hidden within PDF files. Adobe’s Reader application allows PDFs to run embedded executable files, meaning that there’s a vast amount of potential with this. As far as carnage is concerned, this type of virus can rip your system (and privacy) to shreds. Another type of PDF virus also runs an embedded script, which can also wreak havoc on your system.

One such virus, known only by the name of “Peachy,” entertained you with a game and then ran a VBScript file once you won. The PDF document would then send copies of itself to your Outlook contacts.

The threat of these viruses has been minimized by Outlook’s upgrade in 2002 which detected any external attempt to grab its contact list. The program will warn you when an external source tries to get a hold of email addresses. The best way to defend yourself against PDF viruses is to put them under scrutiny (such as uploading them to VirusTotal) and heeding any warnings from Outlook when unauthorized scripts try to access its contact list.

The Threat Continues

Miguel Leiva-Gomez

Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox

Sign up for all newsletters.

By signing up, you agree to our Privacy Policy and European users agree to the data transfer policy. We will not share your data and you can unsubscribe at any time.

You're reading 2 Unexpected File Types Where Computer Viruses Can Be Found

Fixis Missing Or Not Found Error On Your Computer

If you find that OpenCL.dll is missing from your computer when you’re launching a program or starting your Windows 11 or Windows 10 computer, then this post is intended to help you fix the issue by applying the most suitable solutions.

What is OpenCL.dll?

The chúng tôi is called OpenCL Client DLL – and it is a part of OpenCL ICD (Installable Client Driver) program which is developed by Khronos Group. chúng tôi is an important file needed by plenty of applications or games. This DLL file as with all DLL files on the Windows OS is located at C:WindowsSystem32 folder.

When you encounter this error, you may receive any of the following known variants or instances of the chúng tôi missing error;

The program can’t start because chúng tôi is missing from your computer. Try reinstalling the program to fix this problem.

dll is missing

dll error loading

dll crash

dll was not found

dll could not be located

dll Access Violation

Cannot find OpenCL.dll

Cannot register OpenCL.dll

Regardless of the instance of this error, you have encountered, the solutions presented in this post apply.

How do I fix chúng tôi missing in Windows 10?

Among other fixes which include installing the chúng tôi file, updating your device drivers, reinstalling the problematic program causing the error, running a full system virus scan – you can easily fix chúng tôi missing in Windows 10. See detailed solutions below.

OpenCL.dll is missing from your computer error

If you’re faced with the chúng tôi is missing from your computer error, you can try our recommended solutions below in no particular order and see if that helps to resolve the issue.

Run full system AV scan

Update drivers

Run SFC and DISM scan

Restore/Replace chúng tôi file

Re-register DLL files

General fix for missing DLL files errors

Perform System Restore

Let’s take a look at the description of the process involved concerning each of the listed solutions.

Before you try the solutions below, check for updates and install any available bits on your Windows device and see if the error reappears. Also, as indicated on the error prompt (if applicable), you can try reinstalling the program that’s triggering this error.

1] Run full system AV scan

To begin troubleshooting the error on Windows 11/10, you can run a full system AV scan to rule out the possibility of malware/virus infection corrupting the file. Running an AV scan will disinfect the file and possibly restore the file to a healthy copy.

PC users can run a full system antivirus scan with Windows Defender or any reputable third-party AV product.

2] Update drivers

This solution requires you to update the drivers (especially video card drivers) for your computer.

3] Run SFC and DISM scan

You can run an SFC scan to fix corrupted system files which may be the cause of the error. In the event this operation didn’t resolve the issue, you can run a DISM scan to fix the corrupt Windows image, and possibly get the error fixed.

If both operations didn’t work for you, try the next solution.

4] Restore/Replace chúng tôi file

This solution requires you to restore the file from Recycle Bin in the case of accidental deletion by the user. You can also restore this file by logging into another working Windows computer that has been recently updated, navigate to the C:WindowsSystem32 folder and locate, copy the file and paste it into the exact location copied from the other computer.

5] Re-register DLL files

Re-registering the missing chúng tôi file is another viable solution to this issue. If this operation didn’t help, proceed with the next solution.

6] General fix for missing DLL files errors

We recommend using this guide for a general fix for missing DLL files errors to fix most DLL file errors you may encounter on your Windows 11/10 PC.

7] Perform System Restore

If nothing has worked so far for you in fixing this issue at hand, you can perform System Restore to revert your computer to a working state when you weren’t getting DLL file-related errors.

Hope this helps!

How do I know if OpenCL is installed in Windows?

To verify if the OpenCL file is installed on your Windows system, you can run the command clocl --version to display the version of the OpenCL compiler installed on the system. To display the OpenCL libraries installed on the Windows 11/10 device, you can run the command ls -l /usr/lib/libOpenCL*.

How do I fix a chúng tôi error?

If you have encountered the chúng tôi is either not designed to run on Windows or it contains an error on your Windows 11/10 PC, you can fix the error by reinstalling the program that is triggering the error. To reinstall the program, try using the original installation media or contact your system administrator or the software vendor for support.

Related post: The program can’t start because chúng tôi is missing from your computer.

Can The Xbox Get Viruses? (Quick Answer And Why)

While nothing in the cybersecurity world is 100%, it’s almost impossible at the time of writing this article for the Xbox to get a virus. To date, there have been no successful reported widespread compromises of Xbox consoles. 

I’m Aaron and I’ve worked in cybersecurity for the better part of two decades. I love learning new things about cybersecurity and sharing what I’ve learned to help make the world a safer place. 

In this article, we’ll discuss why it’s so difficult to deploy viruses or malware on the Xbox and why threat actors have likely decided that the outcomes aren’t worth the effort. 

Key Takeaways

No version of the Xbox is readily susceptible to viruses. 

Xboxes don’t get viruses because of how they’re designed.  

Software curation for Xboxes also makes them difficult to compromise.

As a result of the difficulty of creating viruses for Xboxes and the lack of reward for doing so makes it unlikely viruses will be developed for the Xbox.

Which Xbox Are We Talking About Here?

All of them! There are only four generations of Xboxes and they all have similar reasons for why they’re so difficult to make and deploy malware to. The four generations of Xboxes are:


Xbox 360

Xbox One (One S, One X)

Xbox Series X and Xbox Series S

Each iteration of Xbox is effectively a pared down and heavily customized Windows PC. The Xbox operating system, for example, was based on Windows 2000. The Xbox One (and variants), Series X, and Series S are all likely based on the Windows 10 kernel based on app compatibility. 

The hardware is also the same as low-to-midrange computers of their day. The Xbox processor was a custom Pentium III. The original Xbox could run Linux! The Xbox One ran an eight core x64 AMD CPU, while the current generation of Xboxes runs a custom AMD Zen 2 CPU–not unlike the Steam Deck and other handheld computers. 

Since they’re just Windows computers, they should be susceptible to Windows viruses and malware, right?

Why Xboxes Aren’t Really Susceptible to Viruses

Despite the similarities of the core hardware and operating systems between the Xbox and Windows PCs, Xboxes aren’t susceptible to viruses made for Windows PCs. There are a few reasons for that. 

I’ll admit that some of these explanations are educated guesses. Microsoft holds its intellectual property under heavy secrecy, so there isn’t a lot of verifiable public information in this space. A lot of these explanations are logical extensions of information and tools that are available. 

The Xbox OSes are Heavily Modified

As demonstrated by the original Xbox OS source code leak, even though the OS is based on Windows 2000, it was heavily modified both in operation and execution. The modifications were so extensive that software developed for the Xbox–usually in the form of game disks–was unreadable and incompatible with Windows PCs. 

With Microsoft’s decision to enable a unified Xbox gaming experience across Windows PCs and the Xbox Series X and Xbox Series S, it’s unclear if that’s made possible by software similarities and compatibility, if the game is emulated on a Windows PC, or if there are still two different versions of each game. 

At the very least, as highlighted by some developers, there are differences in communication architecture depending on where you bought the game, which disables crossplay if purchased outside of the Microsoft Store. 

Xbox Software is Cryptographically Signed

Microsoft has prevented piracy of its game titles and created a closed development environment by requiring cryptographic signatures for its software. In general, that operates by requiring exchange and validation of a code identifying software as validly developed. Without that cryptographic signature, the software cannot be run on an Xbox. 

The Xbox One and later versions of the Xbox have a developer sandbox. That developer sandbox allows execution of code in an isolated environment for testing purposes. Cryptographic signing is provided by using Microsoft’s Xbox developer tools. 

The Xbox’s cryptographic signing is provided by a hardware security chip. We know that because of the use of modchips to circumvent that. Modchips are small circuit boards that are soldered to various integrated circuits and points on the Xbox motherboard. Those circuit boards use sophisticated hardware attacks to spoof or disable cryptographic signing validation, which allows the end-user to run custom code. 

Microsoft Curates Application Stores for the Xboxes 

For legitimately sourced games and other applications, Microsoft monitors and manages application stores for the Xboxes. There are even indie developer channels, like [email protected] and the XNA Game Studio for Xbox 360. Games deployed on those platforms are vetted by Microsoft for quality and safety.

Why Threat Actors Don’t Target the Xbox

Circumventing one of the sets of controls I enumerated above is difficult, but circumventing all three is potentially overwhelming. A threat actor would need to circumvent hardware cryptographic signing, while developing code for the Xbox OS which they can’t easily interact with, using developer tools designed to prevent that kind of nefarious activity. 

Cyberattacks are typically designed to result in financial gain, activism, or both. It’s unclear what financial gain can be gleaned from Xboxes–certainly not as straightforward or lucrative as that found on PCs–or what activist purpose there would be to attack Xboxes. Where something is very difficult and there’s not a lot of incentive to pursue it, it’s not surprising to see that it hasn’t been pursued. 

That’s not to say that there isn’t financial incentive in creating tooling to circumvent Xbox security measures. The existence of modchips highlights that there is. 


Let’s talk about some questions that you may have related to Xboxes getting viruses. 

Can the Xbox Get a Virus From Microsoft Edge?

No. Microsoft Edge on the Xbox runs in a sandbox and doesn’t download executables. If it did, it would need to download a virus programmed for the Xbox, which is unlikely to happen. 

Can an Xbox One Get Hacked?

Yes! This is what modchips do. There is allegedly a modchip available for the Xbox One. So if you were to purchase and install one, then you would have hacked your Xbox. Just be aware that hacking, as described here, just means that you’ve circumvented some security protections on the Xbox. It doesn’t mean that the Xbox One can get a virus. 


It’s very unlikely that any model of Xbox can get a virus. This is due to the high complexity of developing and deploying a virus and a low return on work to do so. Both the technical architecture and software delivery pipelines make it very unlikely that a virus will be developed for the Xbox. 

What Is M.2 Ssd? Does Your Computer Need M.2 Ssd?

As computers, predominantly the laptops, continue to shrink in size, its components like the storage drives also needed to congruently get smaller. In the past few decades, computer storage has transformed from that typical 2 square meter product to ultra-modern flash drives – which now fit into the thinnest of laptops and Ultrabooks. Behold the M.2 SSD (M-dot-2) form factor, that’s nips the size of conventional solid-state storage to the minuscule size of a USB stick.

If you are planning to buy an M.2 SSD drive for your next computer, here’s all that you need to know.

What is M.2 SSD

M.2 is a form factor for SSDs (solid-state drives) which looks like a stick of gum. M.2 SSDs are rectangular and most of them are 80 x 22mm (L x W) but can be shorter or longer (i.e., 30 mm, 42 mm and 110 mm). The M.2 SSD drives which are longer hold more NAND chips and hold extra capacity than the shorter versions. These drives can also be single or double-sided. The most common size is labeled M.2 Type-2280.

M.2 SSD cards are archetypally used in modern mobile computing devices. M.2 SSDs are not compatible with older systems because this form factor is not like mSATA cards. Owing to its compactness factor, thin laptops are increasingly using M.2 SSDs as they take very less room, unlike the traditional SATA drives. Also, since it’s designed for mobile devices, these aren’t fit for large enterprise storage systems.

Now about the cost and vendors, this type of SSDs are widely available in the market now and typically cost from $0.25-$0.75 per gigabyte. Samsung and Intel are the most popular vendors for M.2 SSDs. Other vendors include Toshiba, Kingston, Team Group, Plextor, and Adata.

Identifying different sizes of M.2 SSD

M.2 SSD cards and motherboard slots differ in sizes, both in the width and length of the card. The size of M.2 SSD can be identified using the four- or five-digit number in its name. The first two digits are its width, while the others are its length. For example, M.2 type – 2280 card; it’s 22 mm wide and 80 mm long. For desktop and laptops, 22 mm width M.2 SSDs are standard. The current available sizes for M.2 modules are as follow:

Widths – 12, 16, 22, and 30 mm

Lengths – 16, 26, 30, 38, 42, 60, 80, and 110 mm

An 80 mm or 110 mm length card can hold 8 NAND chips for 1 TB of capacity. Furthermore, M.2 SSDs go up to 2TB in storage size.

Keying Structure

With several notched pins, M.2 modules can be easily plugged into a mating connector, which further enhances its easy compatibility. Definite Notched pins match to a unique Key, ranging from A (having pins 8-15 notched) to M (having pins 59-66 notched).

The typical M.2 SSD keying structure includes B key, M key or B+M Key. For WD M.2 SSDs, the keys used are B and M (B+M) on WD Green SSD and WD Blue SSD models, while the WD Black PCIe SSD uses only the M key.

M.2 SSD Storage Pros

Extra Speed

Compacted Form Factor

The technology of the Future

Improved Power Consumption

Reliable and dependable

1] Extra speed

M.2 SSDs are designed for the PCIe connector, which has far more caliber than the traditional SSDs. These add to the sheer difference in speed of SSD technologies, and these reasonably priced M.2 SSDs have the power to fetch 15x faster speed. Users will also be able to get M.2 SSDs which leverage the NVME protocol, these offer much lower latency.

Operating systems like Windows utilize the system’s storage most of the time, hence an upgrade makes things smoother. The difference in speed will also be evident in the system’s boot times and reduced game load screens.

2] Compacted Form Factor

So, if you are planning a portable build, then an M.2 SSD is one stern consideration for reducing the weight and space factor. The traditional 2.5-inch SSDs are almost the size of your entire hand, but M.2 SSDs lie on 2 to 3 fingers. In addition to this, M.2 connectors plug straight into the motherboard, eliminating the need for extra cabling. These drives cut down the weight of SSDs from 50 grams to just 7 grams, i.e., equivalent to the weight of a leaf on a tree.

3] Technology of the Future

If you get a system which supports M.2 drives, you will open plenty of upgrade options in the future. Like PCIe storage and NVME, M.2 is another innovation that is expected to dominate the consumer market in a few years.

4] Improved Power Consumption

Mobile computers systems have a very limited running time depending upon the size of their battery and the power consumed by the different components. Since the interface of M.2 SSD is a part of the SATA 3.2 specifications, it includes few features that are beyond just the interface, like DevSleep. This new feature creates a lower power state and cuts down the amount of power used by the devices. This helps in extending the running time for the systems and put it to sleep rather than powered down amid several uses.

5] Reliable and dependable

M.2 SSD Cons

Spotting an M.2 SSD which fits your motherboard can be a difficult job for those who aren’t too conversant with computer hardware. These drives come with many complications, here’s a quick rundown:

Two connectors support only a few selective ‘keys,’ hence can connect to connectors with the same keying.

Only a few M.2 drives and connection points support NVME, i.e., the faster data transfer protocol.

Users might have to switch their M.2 drive to PICe mode in their system BIOS.

Two drives which use SATA connection can condense the overall computer performance.

Hence before making the final purchase, a user needs to check if their motherboard is compatible with M.2 and explore their connections options and setup steps.

Another con is the price, getting newer modern technologies like Intel Optane can demand 4X cost.

Final Thoughts

Do you need M.2 SSD? Well, owing to the array of pros every modern computer needs M.2 SSD, not just for its compact structure and sleekness, but to stay relevant with the new and upcoming technologies.

Crm Misconceptions Can Be Costly

I wrote a column last year on CRM (“A Little CRM, Please“) that generated a lot of reaction. It seems that lots of us think about CRM a lot — though usually from the perspective of customers. That column was the beginning of some thinking I’ve done about CRM and what I’ll call the price/value/service ratio and its relationship to customer relationship management (CRM) process and technology investments.

But before we get to that, let’s agree that CRM is not technology, software or “architecture”: CRM is a state of mind, a philosophy, a business strategy. I cannot believe the number of companies I see — still — that are convinced a CRM (in-house or hosted) application is the answer to their customer relationship problems. Successful CRM software applications that we buy (from Siebel) or rent (from chúng tôi assume a variety of things to be true before implementation (though the vendors tend to hide many of them in fine print). Newsflash: If your company isn’t customer friendly, technology will not change a thing (except the technology budget).

CRM, the philosophy (versus CRM, the technology), regards customers as lifelong clients whose personal and professional lives can be monetized through the proactive management of the client’s needs, values and ability and desire to pay. CRM the technology is about applications that leverage customer data, supplier data, company data and even vertical industry data into actionable information. The disconnect that sometimes occurs is between the corporate and technology views of customers, not different perspectives on how software applications should be acquired and deployed. There also are disconnects among what companies sell, what they charge and what customers are willing to pay.

Customer-centered companies have wide and deep protocols around customer care. They also have specific protocols around the acquisition of new customers. Nordstrom department stores get it; Ritz-Carlton hotels get it; Lexus car dealers get it. While far from “perfect” these and other vendors understand that the extra profit they embed in their products and services better be offset by the quality of the service they provide.

Many customers are quite willing to pay more than they should in return for over-the-top service. High-end vendors have always understood this and manage their customers accordingly. Many middle-end vendors also treat their customers elegantly; while some others offer alternative value propositions to their customers — like low prices — as a trade-off to mediocre or downright poor service.

The CRM danger zone is reached when companies misjudge the product/value/customer service relationship ratio of customer care and investment. Some companies, for example, are in the middle of the price/value hierarchy but provide horrible service. Other companies are at the very top and provide marginal service. (Any company at the top of the price/value hierarchy that provides horrible service is unlikely to stay there.) The CRM success zone is reached when a company synchronizes its price/value/service ratios with investments in CRM processes and technology.

Where is your company in the price/value/service space? If all your customers care about is low prices, then why invest in elaborate CRM processes or technologies? All it will do is increase your costs, lower your margins — and eventually require you to raise prices — which will alienate your price-obsessed clientele. If you are on the higher end of the price vector — or aspire to climb the price/value hierarchy — then you need to make sure that your prices, value and service are synchronized.

The decision to invest in CRM technology comes much later. Companies need to understand who they are, where they are, and what they want to be when they grow up before talking to a CRM software sales rep. Figure 1 suggests where CRM technology investments make the most sense (the green zone) and where it might make sense to keep CRM process and technology investments to a minimum (the red zone).

The yellow zone is where the real CRM action is, where CRM management gurus and technology vendors can make real money. Green zone companies will spend on process and technology because they understand the price/value/service ratios well (and because they can pass the costs on to their loyal, accepting customers anyway). Red zone companies should under-invest in CRM processes and technology since their customers already have low service expectations.

Figure 1: Price/Value/Service Ratios & Likely CRM Investment Payback

How Autocomplete Method Can Be Implemented?

Introduction to jQuery Autocomplete

Autocomplete is basically a mechanism that provides the users with a pre-populated list of values or suggestions as they type which enables them to easily find and select a particular item from the list. This jQuery feature helps the users by preventing them to type an entire word or set of words to find options from the select box. The user can then select from the list of options available which will be displayed in the input field. To help select from the list of available options, jQuery UI provides an autocomplete An autocomplete widget is a control that basically filters the options to display only those matching with what the user is typing in control.

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

$(selector, context).autocomplete (options)

$(selector, context).autocomplete (“action”, params)


Below is the syntax for jQuery Autocomplete:

Syntax #1 $(selector,context).autocomplete(options)


options: Parameter refers to an object which specifies the behavior of the list of suggestions as to the user types.

Syntax #2

The autocomplete(“action”, params) method is used when we need to perform an action on the list of suggestions. Such actions can be shown or hide for example.

$(selector,context).autocomplete("action", params)


action: specifies a string.

Implementation of jQuery autocomplete Method

Let us take a look at a few examples to understand how the autocomplete method can be implemented in web pages.

Example #1

The following example illustrates how the autocomplete mechanism works without passing any parameter to the autocomplete() method.

<link rel=”stylesheet” $(function() { var languages = [ “C”, “C++”, “Java”, “JavaScript”, “jQuery”, “PHP”, “Python”, “Ruby”, “C#”, “React” ]; $(“#langs”).autocomplete({ source: languages }); }); #divstyle { text-align: center; background-color: cadetblue; width: 400px; height: 150px; margin-left: 100px; } #pid { color: brown; font-weight: bold; font-family: Georgia, “Times New Roman”, Times, serif; }


Below screenshot is of the output which gets displayed on the page once the above code is executed. As we start typing words, for example, here, the word containing “j”, we see a list of suggestions for the words with “j” getting displayed below the input box.

We can use the up and down arrow key to navigate the list and make the selection as shown below in the screenshot.

Example #2

In the following example, we are trying to demonstrate the usage of a label in the autocomplete widget of jQuery.


<link rel=”stylesheet” $(function() { $(“#autocmp”).autocomplete({ source: [ { label: “Mathematics”, value: “MATHS” }, { label: “Chemistry”, value: “CHEM” }, { label: “Physics”, value: “PHY” }, { label: “English”, value: “ENG” }, { label: “Environmental Science”, value: “EVS” } ] }); }); #divstyle { text-align: center; background-color: cadetblue; width: 400px; height: 150px; margin-left: 100px; } #pid { color: brown; font-weight: bold; font-family: Georgia, “Times New Roman”, Times, serif }


Below screenshot is of the output which gets displayed on the page once the above code is executed.

As we start typing the word in the input box, we start getting a list of suggestions as shown below in the screenshot.

Here we are using labels in autocomplete()

If we start with typing “E” or “e” or “S” or “s”, we get a list of available options containing these letters.

We can then make the selection as per our choice.

We can use up and down arrow keys for navigation.

Example #3

In the following example, we are trying to demonstrate the usage of two options, that are, minLength and delay in jQuery autocomplete() method.


<link rel=”stylesheet” $(function() { var avaialableSubjects = [ “Mathematics”, “Chemistry”, “Physics”, “English”, “Environmental Science” ]; $(“#subjs”).autocomplete({ source: avaialableSubjects, minLength: 2, delay: 500 }); }); #divstyle { text-align: center; background-color: cadetblue; width: 400px; height: 200px; margin-left: 100px; } #pid { color: brown; font-weight: bold; font-family: Georgia, “Times New Roman”, Times, serif; } <div&gt


Below screenshot is of the output which gets displayed on the page once the above code is executed.

As we start typing the word in the input box, we start getting a list of suggestions as shown below in the screenshot.

Here we are using labels in autocomplete()

Here, minLength specifies the number of characters that must be entered before getting the matching values, the default value is 1.

delay specifies the time delay in milliseconds for which we need to wait before trying to obtain the matching values, the default value is 300.


In this article, we discussed the autocomplete widget functionality and its usage in the development of modern websites. This jQueryUI feature provides the users with the facility of obtaining a list of suggestions while typing in an input box and making a selection from the list which will be displayed in the input field. This feature helps users by not making them to type an entire word for making a selection. It can be utilized in searching and filtering purposes as well.

Recommended Articles

This is a guide to jQuery Autocomplete. Here we discuss the introduction, two syntaxes, and how autocomplete method can be implemented. You can also go through our other related articles to learn more –

Update the detailed information about 2 Unexpected File Types Where Computer Viruses Can Be Found on the website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!