Question about Kenmore Elite 45986 Front Load Washer

1 Answer

I want to clean LED letters or numbers

I have a digital phone and personal information organizer. Some of the LED letters or numbers don't all appear complete. Is there a way to clean them so they will show the whole nmber or letter?

Posted by on


1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points


    An expert that got 10 achievements.


    An expert that got 5 achievements.


    An expert whose answer got voted for 500 times.

  • Master
  • 373 Answers

Either there is a small leakage of current in the display panel or there might be a shortage of either cases the display looks faulty.try to check the leakage by removing the panel.better be done by a professional.try contacting any technician available.sometimes the problem solves by just switching on and off the machine a couple of times.

Posted on Dec 14, 2008


1 Suggested Answer

  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

a 6ya Repairman can help you resolve that issue over the phone in a minute or two.
Best thing about this new service is that you are never placed on hold and get to talk to real repair professionals here in the US.
click here to Talk to a Repairman (only for users in the US for now) and get all the help you need.

Posted on Jan 02, 2017


Add Your Answer

Uploading: 0%


Complete. Click "Add" to insert your video. Add



Related Questions:

1 Answer

On my 7" wide screen model TL7001-TP-ASC with ATSC Tuner. When I change the channel it wont tell me what channel the tv is on and the tv guide wont show. The tv does not show no numbers or letters

LG LED TV won't show program information or channel name ...

Oct 18, 2011 - 17 posts - ‎7 authors
I will get the picture/sound (up to 1080i) but i can't get the TV to display the information (What I'm watching and the channel's name). It used to ...

ChanSort download ' > Browse > Multimedia

Rating: 4.5 - ‎23 votes - ‎Free - ‎Windows
Jun 5, 2015 - ChanSort Channel List Editor for Samsung, LG, Toshiba and Panasonic ... ChanSort allows you to organize your TV's channel lists on your PC.

Jan 13, 2016 | Televison & Video


Password Security

With most websites requiring you to create an account, do you find yourself in a bit of a pickle when it comes to inventing passwords? Many people use the same password for all their online accounts and often forget the password they came up with months ago. Hands up who doesn’t feel like banging your head against the wall trying to remember the password you created months ago?

Let’s face it - everyone has problems with creating and remembering secure passwords. That’s why we decided to help.

Tips on how to create and remember your passwords:

•Use the first letters of a sentence that you will remember,e.g. "I have 3 cats: Fluffy, Furry and Shaggy" gives: Ih3c:FF&S, or “Bouncing tigers have every right to ice-cream” becomes: Bther2I-C.

•Take the name of the website and then add your personal twist, like your height or your friend’s home address (e.g. “AmazonOceanRd6’2”). Avoid using your own contact details like your phone number or house number.

•Remove the vowels from a word or phrase e.g. "I like eating pancakes” becomes: Ilktngpncks”.

•Use a phrase from your favourite book and then add the page, paragraph or chapter number.

The Do’s and Don'ts of creating passwords


•Mix letters, numbers and symbols, and use case sensitivity (upper and lower case letters)

•The longer the better. Use passwords that are longer than 6 characters.

•Change your passwords at least every 60 days, cycling the numeric values up or down makes the new password easy to remember.

•Try copying and pasting at least some of the characters in your password that way keyloggers won’t be able to track your keystrokes.


•Don’t use words or phrases or numbers that have personal significance. It is very easy for someone to guess or identify your personal details like date of birth.

•Don’t use the same password for several logins, especially if they involve sensitive financial or other personal information.

•When registering on websites that ask for your email address, never use the same password as your email account.

on Mar 08, 2010 | Computers & Internet


How to unlock the RIM Blackberry Pearl 8220 flip

  1. Please select Turn All Connections Off. Press the red End key.
  2. Then scroll to and select the Settings icon.
  3. Scroll to and select the Options icon.
  4. Scroll to and select Advanced Options
  5. Scroll to and select SIM Card
  6. Enter MEPD.
    Note: When Typing in MEPD the letters will not appear on the screen. This step opens up the personalization on the device. Notice under Network, it will say Active.
  7. Enter MEP2 (For “2′, press the ALT key then 2)
    Note: When Typing in MEP2 the letters will not appear on the screen. This step opens up the Enter Network MEP code box.
    Enter the Unlock code (This is a 16 digit code)
    Press the Trackball or Enter key (once one of these keys is pressed the device should display “Code Accepted”)
  8. The phone has been successfully Subsidy Unlocked is you see in the display next to Network Disabled

*The 16 digit code can be obtained by calling T-Mobile Technical Support and give the representative the IMEI number. In exchange they will give you the Subsidy Unlock Code.

To obtain the IMEI number press *#06# on your mobile device.


*all information are brought to you by for the sake of sharing to the fixya members

on Feb 13, 2010 | Cell Phones

1 Answer

I just entered in my banking information to finalize my card but I did not receive any kind of conformation or any information of when I'll be receiving my card?

Many people - especially young people - believe that because they don\'t have a lot of money or assets themselves they don\'t have to worry about criminals bothering them. This is an erroneous and dangerous assumption. Sometimes your good name is exactly what a crook is looking for.

Next to cash, a crook\'s most valuable asset is a good and real financial identity. Many crimes require the use of an unblemished identity, and for that reason they\'ve become a major black market commodity.

There are usually two sets of crooks involved with identity theft: the one who steals and then sells your identity, and the one who buys and uses it.

There are two general categories of Identity Theft:

  • Account takeover - This is when crooks take over your bank accounts. The person gets the information needed to convince the bank that they are you, and the bank gives them access to your money or line of credit. This can include all of the information associated with your account: account numbers, card numbers, passwords, PINs, security codes, social security numbers and other personal information.

  • True-name fraud - This is when crooks get the personal information they need to establish an account in your name, such as a credit card, a new bank account, renting or buying a property, obtaining medical insurance, or establishing a utility service. You may never know about these accounts until they become delinquent and the collection agency comes calling, or you\'re refused a loan because of "unpaid debts" you never knew you had, or until you\'re arrested because there\'s a warrant in your name. Or perhaps you\'re mistreated during an emergency medical situation because your medical records show the records of the criminal rather than yours. While some of this may seem unbelievable, all of these scenarios happen all too often.

Whether you lose money outright or you have to straighten out the disaster a crook has made of your life by using your name to commit crimes, you are a victim of fraud. Don\'t let this happen to you: be vigilant when anyone (even friends or family members, who are - sadly - often involved in identity theft asks for any personal or financial information from you at any time, for any reason. Sound paranoid? That isn\'t such a bad thing these days. When it comes to identity crime, you\'re better safe than sorry.

The "Ishings" - Phishing, Vishing and Smishing.

With the advent of digital services, cybercriminals have created devious new ways of stealing victims\' personally identifiable information (PII). The terms used to describe this type of fraud follow a fishing theme (i.e., baiting a hook and casting a line in the water, hoping to lure fish to bite). First seen in emails, the technique has evolved, using the same basic bait-and-hook technique, customized as needed to work through phone and text messaging services.

PII is no longer the only thing at risk to an "ishing" attack. It is also used to lure victims to web sites where their electronic devices can be infected by Trojans or viruses. To add insult to injury, these techniques are only successful if the victim voluntarily complies with the crook\'s request, not recognizing that these requests are illegitimate.

To avoid becoming a victim, don\'t respond to these directives immediately. Question all unexpected requests for PII, instructions to call unrecognized phone numbers or directions to click on links. Contact authentic organizations through other channels and make sure the contacts and requests are legitimate before responding.

  • Phishing - Fraud operators bait victims by sending emails that appear to be from a reliable source, asking the recipients to respond to the email in various ways, e.g., send a return email with information or click on a link in the email. Those recipients who respond become victims. Able to send a large number of phishing emails in mass distributions, the crooks need only a small percentage of recipients to respond in order to make it a worthwhile catch.

    • Example: Victim receives an email from his bank telling him that he needs to update his password immediately or risk having his online banking service shut down. The victim clicks on the link in the email, which takes him to a fake ("spoofed") bank site where he is instructed to enter his username and current password. He complies and in so doing, gives the fraud operator his on-line banking login information.

  • Vishing - Since Voice of Internet Protocol (VoIP) technology became available as an option to traditional telephone services, criminals recognized an opportunity to collect victims\' numeric PII (e.g. credit and bank account numbers, PINs, security codes, SSNs, dates of birth) through their telephone devices, by creating the illusion that they were interacting with a legitimate organization.

    • Example: Victim receives an automated phone message that there is a suspicious transaction on her credit card account and to please call a number to confirm the transaction is legitimate. The victim calls the phone number given and is asked to enter her credit card number and security code on the key pad so she can be "authenticated" as the real customer, which is how the crooks get her card information for future fraudulent transactions.

  • Smishing - It wasn\'t long before smart phones and texting became a popular communication channel, and with it, scoundrels saw the chance to use SMS - Short Messaging Service - to convince texters to respond to fraudulent texted communications.

    • Example: Victim receives a text message that he is about to be charged for a service the victim never ordered. He is told that he needs to contact the company immediately to cancel the order or be responsible for the charge. The text includes a hyper-link, which the victim clicks on, taking him to a fake website that triggers the download of a program that breaches the security features of his phone.

Oct 11, 2014 | Finance

1 Answer

Can you retreive the last number of a person calling you

Using the Call Log or Directories
You can make a call with the call log or directories as follows:
Outgoing Call Log
Incoming Call Log
Extension Number Directory
System Speed Dialing Directory
Personal Speed Dialing Directory
Calling with a call log or directory
While on-hook
>Press Left or Right
until desired log/
directory appears.
>Press ENTER.
>Press Up or Down until
desired item appears.
To cancel or exit, press cancel or exit.
Clearing the log information
>While confirming the log information
>Press Up or Down until
desired item appears.
>Press "CLEAR".
Storing the caller's information for the Personal Speed Dialing Directory
>While confirming the log information
>Press Up or
Down until
desired item
>Press STORE or
>Press STORE or
>Press "EXIT" or
To enter characters, refer to "Entering Characters".

Apr 15, 2011 | Panasonic KX-T7630 Corded Phone

2 Answers

My samsung intensity got switched to NAM2 and cant figure out the four didgit password

The password is usually the last 4 digits of your phone number. Does that unlock it?

Oct 10, 2010 | Samsung SCH-U450 Cell Phone

1 Answer

Problem with entering anti-theft radio code for Honda Fit: The radio screen says: "Enter Code:" I enter the confirmed correct code, but when doing so when the actual code (all numbers) turn into letters or...

when you use the "preset keys" (the keys on the radio with numbers on them) to enter the code, each time you press a code number, a letter appears [c, o, d, e]. once the word is spelled out, from entering the correct 5 digits, the radio is reset, ready to go.

BUT if you miss a number, enter a wrong number, whatever, each number pressed, still makes a letter appear from the word "code". once the word is spelled out, by entering ANY 5 numbers, if ANY of the 5 is wrong, the radio displays a message "Error" and then a number 1 thru 10.

When you see the word "Error..."

the next preset button you push, starts the whole thing over again. The radio says "Enter code". That is when you enter the 1st of the 5 digits, the letter C appears, enter the next digit, the letter O appears, enter the next digit, the letter D appears, enter the last digit, the letter E apperas, the radio is reset, ready to go, if you got the 5 correct numbers entered.

you have 10 chances to enter the right 5 digit code. Each wrong try of 5 digits yeilds a display of "Error 1", "Error 2", "Error 3", etc 'till you get to 10 incorrect tries of 5 digits each.

If you dont get it right in 10 tries, you have to leave the radio "on" for an hour, then it will let you start the 10 tries over again.

Good luck!

Apr 26, 2009 | 2007 Honda Fit Sport Hatchback

1 Answer

How do i change the name on the phone

This should be what your looking for..

From an individual extension with a Display Phone:
  1. Press [ Feature ] [ 0 ] [ 0 ]
  2. Press [ Left Intercom ] one time. The display reads: Enter Name (If a name was previously assigned to this extension, it displays instead.)
  3. Enter the two-digit code for each character you want to enter. (See Valid Entries below)
    For example, to enter the name Andy, press [ 2 ] [ 1 ] [ 6 ] [ 2 ] [ 3 ] [ 1 ] [ 9 ] [ 3 ] . The display reads: 12 ANDY
  4. If you make a mistake, you can press [ Mic ] to clear the display. Repeat Step 3 to enter the correct name.
  5. Press [ Feature ] [ 0 ] [ 0 ] to exit programming mode.
Valid Entires:
Letters A-Z, numbers 0-9, and blank spaces.

Character and Digit Codes:
Letters: Numbers:
A=21 N=62 0=00
B=22 O=63 1=10
C=23 P=71 2=20
D=31 Q=72 3=30
E=32 R=73 4=40
F=33 S=74 5=50
G=41 T=81 6=60
H=42 U=82 7=70
I=43 V=83 8=80
J=51 W=91 9=90
K=52 X=92 BLANK = 11
L=53 Y=93
M=61 Z=94

Mar 10, 2009 | Lucent PARTNER18 Corded Phone

1 Answer


It is a fraud. Do not send any information. Throw away the email.

Jan 04, 2009 | Computers & Internet

Not finding what you are looking for?
Kenmore Elite 45986 Front Load Washer Logo

Related Topics:

36 people viewed this question

Ask a Question

Usually answered in minutes!

Top Kenmore Washing Machines Experts

Sal De

Level 3 Expert

2669 Answers


Level 3 Expert

5623 Answers

Robert Rankin

Level 2 Expert

356 Answers

Are you a Kenmore Washing Machine Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides