Saturday, December 15, 2012

How to make a Batch File Without knowledge of Programming

 

Batch file is a text file with series of commands which would execute one by one on launching this single file. So, it can be used to automate your daily and repetitive tasks on windows. These tasks could be like executing a program, opening a website or simply open a file or document.

Let me give you a simple example where I need a batch file: I open Gmail, Facebook and Twitter every morning in web browser followed by a Music playlist in media player. All these tasks can be done by launching single batch file. Here’s how you can do it using a software to create batch file.

AutoStarter X3 is a portable software tool to create command files or batch file. And that too without knowledge of programming.Just specify file, web address or a program to be executed and batch file will be ready in one click.

 

Program has a single window interface and new command can be added by clicking on Add button. Here is a description of each command given there:

  • File(s)- Select one or more than one file to open in their default program. (Opening a .JPG file will open it with default photo viewer with which it is associated)
  • Webpages Tabs- Specify the web browser to be used to open a web address.
  • Webpages Windows- Open a web URL in default web browser of your PC.
  • Directory- Open a folder on your Hardrive or Network location.
  • Shortcut- Open a shortcut to file or web URL (lnk or url)
  • Music Files Directory- You can create a playlist of songs in a folder and then play them back via the default player. The creation of the playlist can take several minutes, depending on the number of songs in the folder, close the warning that pops up OK.
  • Open file with Program- Open a file in specific program of your choice instead of default. (Opening a JPG image in Photoshop when .JPG is associated with Windows photo viewer)
  • Execute Program- Run a software program specified.

After specifying the commands, you can test how the batch file will execute. If it is all right, click on Batch to create a Batch *.bat) file. Program also gives you an option to save project to edit or develop it later.

Batch file is a low level solution to automate tasks when there are software tools likeTimeComX and Scheduler  to schedule tasks and automate windows operations.

Download AutoStarter X3

Thursday, November 22, 2012

How to Run Application In Your Browser Without Installing Them

Have you ever wanted to run applications without having to install them? It always is a hassle to download the application, then install the application and then check it out. At times, the application is not what you are looking for and only manages to waste your time, and your hard-drive space as well, as the application is installed, and the registry is updated with its files.
If you come across such problems regularly, then you should check Spoon out. Spoon is an online-working tool that allows people to run virtual applications on demand. These applications can be searched for and then virtually installed to be run virtually on your Spoon console. Think of Spoon like an emulator that works online – it allows every application to work online, right from its own window. No need to download and install onto your OS itself.
Spoon-2
The very first step is to download the Spoon console from the Spoon website. The link is provided at the bottom of the post. Install this plugin. Use the account with which you signed up for to login into your Spoon console dashboard.
Click on the “All Applications” text to view the categories of the applications so you can view them accordingly and install. Once you have chosen a category, select the app you want from it and click on the software. Simply, you can search for the application using the top given search-box feature.
 
The application will be buffered from the virtual online database on Spoon and the application will soon be running! Like I said, no need to install and waste your hard-drive space. The application themselves work perfectly fine.
There is one catch. You only have 1GB of free space on the free account. So 1GB of software it is. If you upgrade to a PRO account, you get 16GB! Which is massive.
Check out Spoon







How to make your laptop to wifi hotspot

In past we showed you, how you can use Virtual Router to share your wired internet connection with others over Wi-Fi. mHotspot is another free software to serve this purpose with intuitive user interface. It is light-weight, easy to use and does not require any installation at all.
It allows the user to share internetconnection over Wi-Fi with password protection without any additional hardware. You can use this to connect your mobiles, laptops, tablets, smart tvs everything with a single internet connection. All you have to do is download the file and run it. You can even use this network to play multiplayer games on LAN as well.
Watch the video below to know more.
 
2-Terabyte-TB-Hard-Disk
Download mHotspot for Windows




Sunday, November 18, 2012

APPLY ANDROID SKIN PACKs FOR WINDOWS 7

Attention Windows 7 users. Here is a new skin pack for Windows 7 users and this is from Android.
Android launched the Android Jelly Skin pack for Android users. But now this is also available for Windows 7 users.
It will make your desktop more attract full and make it more customizable.
Installation is not difficult just download the file and run the file with extension .exe and follow the instruction provided by the setup.

Android-Jelly-Bean-Skin-Pack-for-Windows

 

Before Installing the skin pack , plz remove all the old skin pack if already installed. When you remove the previous skin pack then just one click to go. Before install close your all running applications and after installation restart your system.
It supports windows 7 , Windows 7 SP1 - {X86_X64} - All Languages- All versions.
For Windows 7 Starter and home Basic first need to patch and unlock Aero Effect.
Unlock Aero Effect
Click Here To Download :
Download Offline Installer
For X_86
.::DOWNLOAD::.
For X_64
.::DOWNLOAD::.

HOW TO INCREASE SPEED OF HARD DRIVE

It is a common observation that after sometime our computer slows down due to low performance of hard drive. This problems happens due to poor or low speed of hard disk. Poor speed mean the low performance or low speed of readind/writing head of hard drive.
This problem can be solved by increasing the hard disk speed.
Follow these steps to solve your problem:
1 Click Start menu and Select RUN.
2 Now type SYSEDIT.EXE in run and press Enter key.
3  System Configuration Editor will appear. Here you can see multiple windows but you will select            
    SYSTEM.INI

 

2-Terabyte-TB-Hard-Disk

Untitled

 
4 This window contains a line [386enh].

5 Now after this line type [irq14=4096].

6 Now close this window and save it.

7 Restart your sytem.

And you will surely feel better performance of your system.
Hope you will Enjoy............

Wednesday, September 26, 2012

HOW TO FORMAT WRITE PROTECTED PENDRIVE




  1. Open up a command prompt. 
  2. Type “diskpart” and press enter. 
  3. At the “DISKPART >” prompt, type “list volume”. 
  4. This will show you a list of your drives and a corresponding number. 
  5. Assuming your flash drive is listed as “5″, type “select volume 5″. 
  6. Then type “attributes volume clear readonly” and press enter.

That will remove the “readonly” setting from the flash drive’s volume. Hopefully it helps. “

OTHER WAY

Neo 9 tool able to get past the write protection and format the pen drive
or
1.Go to Run->regedit
2.MyComputer->HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Control -> StorageDevicePolicies
3.Delete the StorageDevicePolicies in Your Registry.

Tuesday, August 21, 2012

Reminder about your invitation from IETU WEB

 
 
 
LinkedIn
 
This is a reminder that on August 15, IETU WEB sent you an invitation to become part of their professional network at LinkedIn.
 
 
 
 
On August 15, IETU WEB wrote:

> To: [mikkimaxmail.alianposting@blogger.com]
> From: IETU WEB [iteuweb@gmail.com]
> Subject: Invitation to connect on LinkedIn

> I'd like to add you to my professional network on LinkedIn.
>
> - IETU
 
 
 
 
 
You are receiving Reminder emails for pending invitations. Unsubscribe.
© 2012 LinkedIn Corporation. 2029 Stierlin Ct, Mountain View, CA 94043, USA.
 

Friday, March 16, 2012

computer literacy short essay

For over fifty years, beginning with the famous ENIAC, a revolution has been taking place
in the United States and the world.  The personal computer has changed the way many
people think and live.  With its amazing versatility, it has found its way into every area of
life, and knowing how to operate it is a requirement for today's world.  Those who have
not taken the time to learn about computers often do not even know what to do once

 

A Long Way From Univac


Computers
A Long Way From Univac
    Can you imagine a world without computers?  You most probably interact with some form of a computer every day of your life.  Computers are the most important advancement our society has ever seen.  They have an interesting history, many interesting inner components, they are used nearly everywhere, and continue to advance incredibly fast.  Because the field of computers is so broad, this paper

 

Thursday, March 15, 2012

Terrorism short essay english

Terrorism

JUNE 1914: a young man in Sarajevo steps up to a carriage and fires his pistol. The Archduke Ferdinand dies. Within weeks, the first world war has begun. The 1940s: the French resistance kill occupying troops when and how they can. June 1944: at Oradour-sur-Glane, in central France, German SS troops take revenge, massacring 642 villagers. August 1945: the United States Air Force drops the world's first nuclear weapons. Some 190,000 Japanese die, nearly all of them civilians. Within days the second world war has ended.
Which of these four events was an act of terrorism? Which achieved anything? Which, if any, will history judge as justified? And whose history? Terrorism is not the simple, sharp-edged, bad-guy phenomenon we all love to condemn. No clear line marks off politics from the threat of force, threat from use, use from covert or open war. Who is or is not a terrorist? The suicide bomber, the rebel guerrilla, the liberation front, the armed forces of the state?

 

TELEVISON VIOLENCE

                              TELEVISON VIOLENCE

In today's society television plays a big role. People watch T.V. for many different

reasons. People watch T.V. mainly for entertainment, they also watch T.V. to

learn, and to find out news. Some people watch T.V. and get the wrong idea

about what they're watching, they feel that what they are watching is okay to do.

Violence is a major factor, it affects people of ages. The worst outcome of T.V. is

 

what is sociology short essay

Sociology is the scientific study of society and human behavior.  This is the most basic definition of sociology that one would find.  Getting a little more in depth, it is the study of humans in groups and how they interact with one another.  A scientist in this field, a sociologist, would look at these groups by means of the sociological perspective. 

 

The civil rights movement essay english

The civil rights movement was a period of time when blacks attempted to gain their constitutional rights of which they were being deprived. The movement has occurred from the 1950's to the present, with programs like Affirmative Action. Many were upset with the way the civil rights movement was being carried out in the 1960's. As a result, someone assassinated the leader of the movement, Dr. Martin Luther King Jr. Many blacks were infuriated at this death so there were serious riots in almost 100 cities. President Johnson then appointed a committee called The Kerner

 

Tuesday, March 13, 2012

about a hacker short para

                      A Hacker
    A hacker is a person obsessed with computers. At the heart of the obsession is a drive master the computer. The classic hacker was simply a compulsive programmer. It is only recently that the term hacker became associated with the computerized vandalism.

Great description of Hackers:

 

A Brief History of Library Automation essay english

    An automated library is one where a computer system is used to manage one or several of the library's key functions such as acquisitions, serials control, cataloging, circulation and the public access catalog. When exploring the history of library automation,  it is possible to return to past centuries when visionaries well before the computer age created devices to assist with their book lending systems. Even as far back as 1588, the invention of the French "Book Wheel" allowed scholars to rotate between books by stepping on a pedal that turned a book table. Another interesting example was the "Book Indicator", developed by Albert Cotgreave in 1863. It housed miniature books to represent books in the library's collection. The miniature books were part of a design that made it possible to determine if a book was in, out or overdue. These and many more examples of early ingenuity in library systems exist, however, this paper will focus on
the more recent computer automation beginning in the early twentieth century.

 

Monday, March 12, 2012

Reminder about your invitation from MIKIN KAUSHIK

 
 
 
LinkedIn
 
This is a reminder that on March 8, MIKIN KAUSHIK sent you an invitation to become part of their professional network at LinkedIn.
 
 
 
 
On March 8, MIKIN KAUSHIK wrote:

> To: [mikkimaxmail.alianposting@blogger.com]
> From: MIKIN KAUSHIK [mikkimaxmail@gmail.com]
> Subject: Invitation to connect on LinkedIn

> I'd like to add you to my professional network on LinkedIn.
>
> - MIKIN
 
 
 
 
 
You are receiving Reminder emails for pending invitations. Unsubscribe.
© 2012 LinkedIn Corporation. 2029 Stierlin Ct, Mountain View, CA 94043, USA.
 

Thursday, March 8, 2012

working women and family essay english

Many women today are facing choices that their mothers never had to face.  One of these choices is whether or not to go back to work after having a child.  This was practically unheard of in the 1950's.   In the 1990's it is not whether the mother will or will not go back to work, rather a question of when. When did the choice become set in stone?  Why do the mothers of today have to work outside the home versus working in the home, much like their mothers did.
When one thinks of the subject of working mothers, many differing

 

GLOBE PNG

AT&T_globe AT-GLOBE-106

 

Invitation to connect on LinkedIn

 
LinkedIn
 
 
 
MIKIN KAUSHIK
 
From MIKIN KAUSHIK
 
CCO at Labour Department
New Delhi Area, India
 
 
 

I'd like to add you to my professional network on LinkedIn.

- MIKIN

 
 
 
 
 
 
You are receiving Invitation to Connect emails. Unsubscribe
© 2012, LinkedIn Corporation. 2029 Stierlin Ct. Mountain View, CA 94043, USA
 

HOLI ESSAY IN HINDI

होली वसंत ऋतु में मनाया जाने वाला एक महत्वपूर्ण भारतीय त्योहार है। यह पर्व हिंदू पंचांग के अनुसार फाल्गुन मास की पूर्णिमा को मनाया जाता है। रंगों का त्योहार कहा जाने वाला यह पर्व पारंपरिक रूप से दो दिन मनाया जाता है। पहले दिन को होलिका जलायी
जाती है, जिसे होलिका दहन भी कहते है। दूसरे दिन, जिसे धुरड्डी, धुलेंडी, धुरखेल या धूलिवंदन कहा जाता है, लोग एक दूसरे पर रंग, अबीर-गुलाल इत्यादि फेंकते हैं, ढोल बजा कर होली के गीत गाये जाते हैं, और घर-घर जा कर लोगों को रंग लगाया जाता है। ऐसा माना जाता है कि होली के दिन लोग पुरानी कटुता को भूल कर गले मिलते हैं और फिर से दोस्त बन जाते हैं। एक दूसरे को रंगने और गाने-बजाने का दौर दोपहर तक चलता है। इसके बाद स्नान कर के विश्राम करने के बाद नए कपड़े पहन कर शाम को लोग एक दूसरे के घर मिलने जाते हैं, गले मिलते हैं और मिठाइयाँ खिलाते हैं।

Wednesday, March 7, 2012

Nuclear Power short essay english

Nuclear Power

images        

Radioactive wastes, must for the protection of mankind  be stored or disposed in such a manner that isolation from the biosphere is assured until they have decayed to innocuous levels. If this is not done, the world could face severe physical problems to living species living on this planet.


        Some atoms can disintegrate spontaneously. As they do, they emit ionizing radiation. Atoms having this property are called radioactive. By far the greatest number of uses for radioactivity  in Canada relate not to the fission, but to the decay of radioactive materials - radioisotopes. These are unstable atoms that emit energy for a period of time that varies with the isotope.  During this active period, while the atoms are 'decaying' to a stable state their energies can be used according to the kind of energy they emit.  Since the mid 1900's radioactive wastes have been stored in different

 

heart short essay english

The human body is divided into many different parts called organs.  All of the parts are controlled by an organ called the brain, which is located in the head.  The brain weighs about 2.75 pounds, and has a whitish-pink appearance.  The brain is made up of many cells, and is the control centre of the body.  The brain flashes messages out to all the other parts of the body.  The messages travel in very fine threads called nerves.  The nerves and the brain make up a system somewhat like telephone poles carrying wires across the

 

The Universe short essay english

The Universe

what lies beyond our planet.  The universe that we live in is so diverse  and unique, and it interests us to learn about all the variance that  lies beyond our grasp.  Within this marvel of wonders our universe holds
a mystery that is very difficult to understand because of the complications  that arise when

 

Australia SHORT ESSAY ENGLISH

Australia is the world's smallest continent and sixth-largest country.  With proportionately more desert land than any other continent, Australia has a low population density.  Lying completely in the Southern Hemisphere, Australia is bounded by the Indian Ocean on the west and south and by the Pacific Ocean on the east.  These oceans merge on the

I went to China SHORT ESSAY

I went to China at 4th April, with my grandma and grandpa. That day, we got up at 7 o*clock in the morning. We went on the ship at 9:40am. When we reached China, we saw our relation, they saw us and helped us to carry the luggage. They are very kind to us.

 

A TRIF THROUGH PANAMA ESSAY ENGLISH

Day 1:

    We arrived at Omar Torrijos airport via American Airlines early in the afternoon. We purchased our required tourist cards (3 balboas, as US dollars are called in Panama) at the airport, then caught a taxi for the 18 mile ride to our downtown hotel.  The ride in the battered, un-airconditioned car was rather expensive (30 balboas), but the driver spoke English and was very friendly.  We arrived at the hotel and checked in.  While my dad was checking in I bought a guidebook in the hotel lobby and read up on the

 

facebook all smiles and emotions free

facebook-emoticons

facebook smilies emotions

Faceboo-emoticons

Sunday, March 4, 2012

WORLD WAR 2 SHORT ESSAY

The 1930's were a very turbulent time period for the entire world. Many events occurred during this time that lead to World War II. It all began with a few events that set the stage for the entire thing. Things continued to get worse, until finally, the seemingly inevitable happened. There were several events that set the stage for the upcoming crisis. In Europe, Germany specifically, Adolf Hitler had gained control. Hitler was the head of the Nazi party, a Fascist political group. Meanwhile, on the other side of the world, Japan had invaded Manchuria, a province in China. The United States declared its disapproval in the Stimpson Doctrine, which stated that it

 

History Of Islam

History Of Islam
When Charles Martel defeated the Muslims in Spain and stopped their advance into greater Europe (Ahmed 67)0, he most likely did not know just how much of an effect his victory had on the history of not only Europe, but of the known world. The fact that Islam may have overtaken the rest of the world had it not been for that crucial battle attests to the strength of this relatively new religion. If the strength of the religion is dependent upon those who start it, then it is important to analyze the life of the one key character in history who began it all. That key character is Muhammad, the man that is known as the first and last true prophet of Islam. Muhammad, the great prophet and founder of Islam, was born in 570 AD, and was soon an orphan without parents. He was raised by a family of modest means and was forced to work to support himself at an early age. He worked with a travelling caravan as a driver and at

 

 

Nanotechnology essay

Nanotechnology: Immortality or total annihilation? Technology has evolved from ideals once seen as unbelievable to common everyday instruments. Computers that used to occupy an entire room are now the size of notebooks. The human race has always pushed for technological advances working at the most efficient level, perhaps, the molecular level. The developments and progress in artificial intelligence and molecular technology have spawned a new form of technology; Nanotechnology. Nanotechnology could give the human race eternal life, or it could cause total annihilation. The idea of nanotech was conceived by a man named K. Eric Drexler (Stix 94), which he defines as "Technology based on the manipulation of individual atoms and molecules to build structures to complex atomic specifications (Drexler, "Engines" 288)." The technology which Drexler speaks of will be undoubtedly small, in fact,

 

SOLAR ENERGY -- THE ENERGY OF THE FUTURE?

SOLAR ENERGY -- THE ENERGY OF THE FUTURE? About 47 per cent of the energy that the sun releases to the earth actually reaches the ground. About a third is reflected directly back into space by the atmosphere. The time in which solar energy is available, is also the time we least need it least - daytime. Because the sun's energy cannot be stored for use another time, we need to convert the suns energy into an energy that can be stored. One possible method of storing solar energy is by heating

 

Solar cells essay

Solar cells

Solar cells today are mostly made of silicon, one of the most common elements on Earth. The crystalline silicon solar cell was one of the first types to be developed and it is still
the most common type in use today. They do not pollute the atmosphere and they leave behind no harmful waste products. Photovoltaic cells work effectively even in cloudy weather and
unlike solar heaters, are more efficient at low temperatures. They do their job silently and there are no moving parts to wear out. It is no wonder that one marvels on how such a device would


Tuesday, February 28, 2012

History - Rulers of British India

History - Rulers of British India

Please wait while images are being loaded.....
Robert Clive (1757-60) (1765-67)
1. Robert Clive started his career as a clerk in the English East India Company, and he became the Governor of Bengal, following the victory of the Company forces under him in the Battle of Plassey (1757). The Battle of Plassey laid the foundation of the British Empire in India.
2. Roger Drake held the post of the Governor of Bengal for a brief period before Clive.
3. Governor of Bengal twice; from 1757 - 60 and again from 1765-67.
4. Started dual Govt. in Bengal in 1765. It was a system intended to obtain the services of the officials of the erst-while Nawab of Bengal in revenue administration.
5. He forbade the servants of company from indulging in private trade and made payment of internal duties by them obligatory.
6. Bengal White Mutiny by the European brigades at Allahabad and Monghyr, they were arrested and tried.
7. Following the first tenure of Clive, Holwell officiated as the Governor of Bengal for a brief time, followed by Vansittart (1760-1765).
8. Henry Verelst (1767-69) and Cartier (1769-72) succeeded Clive after his second term.
9. The Battle of Buxar was fought and won by the Company forces (1764) when Vansittart was the Governor. The English forces were led by Holwell and the peace treaty (Treaty of Allahabad) was negotiated by Clive. The Battle of Buxar secured the British Empire in India.
10. When he returned to England, Clive was charged with corrupting the political life of England with the ill-gotten money in India. The charges against him included acceptance of bribe and abusing the office of the Governor of Bengal.
11. Though Clive was acquitted, he led a desperate life and committed suicide.
Please wait while images are being loaded.....
Warren Hastings (1772-85)
1. Became the Governor of Bengal in 1772 and Governor - General in 1774, following the Regulating Act (1773). It was the first Act passed on India by the British Parliament. Following this, the British Parliament got some law-making powers over the land in India, ruled by the English East India Company.
2. Introduced quinquennial settlement of land revenue in 1772 farming out of lands to the highest bidder, later on he reversed to annual settlement (1777) on the basis of open auction to the highest bidder
3. Abolished ‘Dual Government’ in 1772.
4. Created a Diwani and Fuajidari Adalat in 1772.
5. With the passage of the Regulatory in Act in 1773, he became the first to hold the post of Governor General in 1774.
6. Divided Bengal into revenue districts and made appointment of the collectors and the other revenue officials. Thus, the system of collectors heading the administration of revenue districts began.
7. Codified Hindu & Muslim Laws (1776).
8. Trial of Nand Kumar and his judicial murder in 1775.

prayer in school essay

Intro-
Contrary to the claims, students have the Constitutional right to pray in school, either individually or in informal groups so long as the prayer is not organized by the school. But if the students only knew what they were really doing by praying in school. II. First of all they are going against the Bible. As to quote, Matthew 6:5-6: "And when you pray, do not be like the hypocrites, for they love to pray standing in the synagogues and on the street corners. But when you pray, go into your room, close the door and pray..." So as you can see those who pray in places such as the cafeteria, middle of the hall or things of that nature is actually going against the bible. Now I am not saying that a person should not pray in schools, but they should do it just as the Bible says in a personal place. If a student can't find a personal place, and have an undesirable need to pray, they need to not make a big deal out of it. Praying as put in the Bible is a personal experience between that person and God. Not an event to be proclaimed up and down the hallway. III. Another problem there is with praying in schools is the fact that there are some students who don't believe in God. The purpose of a 

Hinduism and Buddhism essay

Introduction-
Hinduism and Buddhism are two of the five major religions in our world today. They are widely practiced, and have survived for centuries. Both have similarities and differences, as do all forms of religion. Hopefully, in this paper I will show you the basic structure of each religion. I would also like to show how they compare and contrast.
Hinduism: Foundation
No one is completely sure of where Hinduism was started and by whom. Their oldest written documents, the Vedas, were written down in 1000 B.C. but they had existed orally long before. The Vedas are where Hinduism originated. Today, Hinduism is the world's third largest religion. Many changes have come upon Hinduism since they practiced it first. Hinduism includes many different sects, or denominations, and beliefs that have arisen. Though, there are many things in common with all of the Hindu sects. Their basic beliefs are what ties them together.


Monday, February 27, 2012

Brief history of Buddhism essay

Brief history of Buddhism
Buddhism is one of the major religions of the world. It
was founded by Siddhartha Guatama (Buddha) in Northeastern
India. It arose as a monastic movement during a time of
Brahman tradition. Buddhism rejected important views of
Hinduism. It did not recognize the validity of the Vedic
Scriptures, nor the sacrificial cult which arose from it. It
also questioned the authority of the priesthood. Also, the
Buddhist movement was open to people of all castes, denying
that a person's worth could be judged by their blood.
The religion of Buddhism has 150 to 350 million 

Information About Viruses short essay

Information About Viruses
A growing problem in using computers is computer viruses. Viruses are pesky little programs that some hacker with too much time on his hands wrote. Viruses have been known to create annoyances from displaying messages on the screen, such as "Your PC is now stoned," to completely obliterating everything that is contained on the computer's hard disk. Viruses are transferred from computer to computer in a number of ways. The most common way that users receive viruses at home are downloading programs off the internet, or off of local Bulletin Board Systems, or BBSs. These viruses are then transferred to a floppy disk when written to by the infected computer. Computers can also be infected when a disk that is infected with a virus is used to boot the computer. When this computer is infected, every one who writes a floppy disk on this computer gets 

history of computer essay

 
The volume and use of computers in the world are so great, they have become difficult to ignore anymore. Computers appear to us in so many ways that many times, we fail to see them as they actually are. People associated with a computer when they purchased their morning coffee at the vending machine. As they drove themselves to work, the traffic lights that so often hampered us are controlled by computers in an attempt to speed the journey. Accept it or not, the computer has invaded our life.
The origins and roots of computers started out as many other inventions and technologies have in the past. They evolved from a relatively simple idea or plan designed to help perform functions easier and quicker. The first basic type of computers were designed to do just that; compute!. They performed basic math functions such as multiplication and division and displayed the results in a variety of methods. Some 

essay on welcome to the internet

Good evening I would like to welcome you all here this evening to our symposium on "Then & Now the Evolution of a society"
Things Have Changed dramatically since the 1920's
This Panel of researchers that you see before you are here to talk to you about the events and issues from the past 75 years that have led up society as we know it today.
starting from left to right I would like to Introduce this panel to you
first we have Lori who is an expert in the political arena and she will touch on a few issues on how politics itself has not really changed but how the politicians get there message across has
Next to her we have Yolanda who is an expert on African American leaders and the profound effect they have made in the Last 75 years.

Journalism on the Internet essay

Journalism on the Internet
The common forms of media in today's world each have both
advantages and disadvantages. The Internet has been around for an
almost equal amount of time as most of them, but only recently has
it become a popular way of retrieving information. The Internet
takes the best of all other medium and combines them into a very
unique form. The Internet is the best way to retrieve information.
This combination of paper publishing, TV, radio, telephones, and 

VIDEOGAME: The High Tech Threat to Our Younger Generation

VIDEOGAME: The High Tech Threat to Our Younger Generation

VIDEOGAME: The High Tech Threat to Our Younger Generation
Anyone who has ever walked through a shopping mall on a weekend knows how popular videogame arcades have become with our young people. It is becoming a force in the lives of millions of kids all across America. Parents and teachers become more concerned and worried when they see their kids devoted to videogames. They are highly concentrated because vidiogames greatly influence the mental and learning processes of the younger generation. Many parents believe that their children learn values more from the mass media rather than their from homes. Generally speaking, the video and computer game industry has been a growing concern to the religious groups, responsible politicians and bewildered parents for the disturbing contents and the substandard themes in some of its games. The videogame technology must be recognised for its role and influence on the younger generation because, for better or worse, it clearly affects their academic and social life. 

essay on computer crime

I

Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?

II

Today's computer society has brought a new form of crime. There are those "hackers" who break their way into computers to learn the system or get information. I found out in the book Computer Crime written by Judson, Karen: That "Salami Slicers" steal small amounts of money from many bank customers this adding up to a great deal of money. I also read about phone phreaks more known as "Phreakers." They steal long distance phone services. Phreakers commit many other crimes against phone companies.

In the book Computer Crime it states, most people commit thesis crimes, because they where carious and wanted to explore the system. All they want to do is exploit systems not destroy it. It is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world.

I found out Arizona was the first state to pass a law against computer crime, in 1979. In 1980 the U.S. copyright act was amended to include soft ware. I found out that in 1986 a

computer farad abuse act was passed. This act was made to cover over any crime or computer scheme that was missed with any former laws. Violations to any of thesis laws are a maxim of five years in prison and a $250,000 fine.

III

With my computer I can do lots of thesis things but choose not to. Because I know that if you know computers you can do much more like carious wise. If you know computers you set for the future. I'm not saying I don't have fun with my computer I like causing a little trouble every now and then. Well I piety much covered the motives and intentions behind the most common computer crimes. I explained the laws and punishments for committing thesis crimes. I hope I cleared things up for you elutriate computer people, and gave you a more understanding of the things that can be done. As you have red you can see that computers can and are more dangerous than guns.

computer in various fields essay

computer in various fields essay

Computers in Education
The typical school has 1 computer per 20 students, a ratio that computer educators feel is still not high enough to affect classroom learning as much as books and classroom conversation.
Some critics see computer education as merely the latest in a series of unsuccessful attempts to revolutionise education through the use of audio- and visually-oriented non print media. For example, motion pictures, broadcast television, filmstrips, audio recorders, and videotapes were all initially heralded for their instructional potential, but each of these ultimately became minor classroom tools alongside conventional methods. 

Sunday, February 26, 2012

DSSSB Recruitment Syllabus: TGT HINDI, TGT ENGLISH ETC.

DSSSB Recruitment Syllabus:
Syllabus of Preliminary Exam:

The preliminary exam for DSSB Recrutiment will be divided into following sections:

A. General Awareness, General Intelligence and Reasoning ability (20 Questions, 20 Marks)

B. Arithmetical & Numerical Ability (20 Questions, 20 Marks)

C. Hindi Language(20 Questions, 20 Marks)

D. English Language(20 Questions, 20 Marks)

E. Post specific Subject related objective type (20 Questions, 20 Marks)

(i) General Awareness: Questions will be designed to test the ability of the candidate’s General Awareness of the environment around him and its application to society. The questions will also be designed to test knowledge of current events and of such matter of everyday observation as may be expected of an educated person. The test will include questions relating to India and its neighboring countries, especially pertaining to History, Indian Polity & Constitution, Art & Culture, Geography, Economics, General Policy, Science & Scientific Research, National/International Organizations /Institutions, events etc.

(ii) General Intelligence and Reasoning Ability: The syllabus of General Intelligence includes questions of both verbal and non-verbal types. Test may include questions on analogies, similarities, differences, space visualization, problem solving, analysis, judgment, decision making, visual memory, discrimination, observation, relationship, concepts, arithmetical reasoning, verbal and figure classification, arithmetical number series etc.

(iii) Arithmetical and Numerical Ability: The test of Arithmetical and Numerical Ability will cover Number System including questions on Simplification, Decimals, Fractions, L.C.M., H.C.F., Ratio & Proportion, Percentage, Average, Profit & Loss, Discount, Simple & Compound Interest, Mensuration, Time & Work, Time & Distance, Tables & Graphs, etc.

(iv) Test of Language English: In addition to the testing of candidate’s understanding of the English, its Vocabulary, Grammar, Sentence Structure, Synonyms, Antonyms and its correct usage etc. would also be tested.

(v) Test of Language Hindi: In addition to the testing of candidate’s understanding of the Hindi Languages, its Vocabulary, Grammar, Sentence Structure, Synonyms, Antonyms and its correct usage etc. would also be tested.

(v) Post Specific Subject related Questions: The question will be on the concerned Child & Education Psychology. (Educational Technology, Communication Skills, Teaching & Learning processes) and related topics.

Syllabus of Main Exam: The questions will be on the concerned subject/ work/qualification of the relevant post as prescribed in the recruitment rules and will be of the same level as applicable for the concerned post.

Blogger Labels: DSSSB,Recruitment,Syllabus,POST,Preliminary,Exam,DSSB,Recrutiment,General,Intelligence,Marks,Arithmetical,Numerical,Hindi,Language,English,Subject,candidate,environment,knowledge,events,observation,person,India,History,Indian,Constitution,Culture,Geography,Economics,Policy,Science,Scientific,Research,National,International,Test,visualization,analysis,judgment,decision,visual,memory,discrimination,relationship,classification,series,Number,System,Simplification,Decimals,Ratio,Proportion,Percentage,Average,Profit,Loss,Discount,Simple,Compound,Interest,Mensuration,Time,Work,Distance,addition,Vocabulary,Grammar,Sentence,Structure,Synonyms,Antonyms,usage,Specific,Child,Education,Psychology,Educational,Technology,Communication,Main,qualification,rules,Organizations,Institutions,analogies,differences,concepts,Fractions,Graphs,Languages,Skills,topics

Saturday, February 25, 2012

TGT HINDI QUESTION PAPER

 

QUESTIONS FOR TGT HINDI DSSB PAPER

१. बिहारी का नायिका वर्णन .

या

बिहारी सतसई में शृंगार रस.

२. नई कविता की प्रवातिया

या 

प्रयोगवाद और नई कविता

३. भूषण की राष्ट्रीयता |

या

भूषण की रचनाओं में वीर रस की व्यंजना |

४. आधुनिक हिन्दी का स्थान वश्विक स्तर पर |

या

हिन्दी का प्रचार प्रसार और आधुनिक साधन

५. उपन्यास के मूल तत्त्व |

या

कहानी के तत्त्व

६. कबीर के काव्य में आधुनिक चेतना |

या

भक्ति काल हिन्दी साहित्य का स्वर्ण युग आलोचनात्मक विवरण |

TGT HINDI SYLLABUS FOR TGT PAPER

Syllabus for TGT Hindi government job paper

 

GADH PART -

1. QUESTION BASED ON HINDI GADH KA VIKAS.

2. QUESTION BASED ON UPANYAS.

3. QUESTION BASED ON KAHANI.

4. QUESTION BASED ON NATAK EKANKI

5. QUESTION BASED ON NIBANDH.

6. QUESTION BASED ON YATRA / VRATANT.

7. QUESTION BASED ON SANSMARAN/ REKHACHITRA.

8. QUESTION BASED ON ATAMKATHA/JIVANI.

9. QUESTION BASED ON HINDI ALOCHNA.

10. QUESTION BASED ON HINDI GADH KE NAYE AAYAM.

 

 

KAVYA PART:

QUESTION BASED ON

1. AADIKALIN KAVYA.

2. BHAKTI KALIN KAVYA

3. RITIKALIN KAVYA.

4. AADHUNIK KALIN KAVYA.

BHARTENDU YUG.

DEVEDI YUG.

CHAYAVAD

PRAGATIVAD.

PRYOGVAD/NAI KAVITA

5. CHAND ALANKAR

6. RAS SIDANT

7. PRATIK/BINB VIDHAN

WHAT IS Robotics

 
WIRED HANDS - A Brief Look at Robotics NEWSCIENCE 
 
Two years ago, the Chrysler corporation completely gutted its Windsor, Ontario, car assembly plant and within six weeks had installed an entirely new factory inside the building. It was a marvel of engineering. When it came time to go to work, a whole new work force marched onto the assembly line. There on opening day was a crew of 150 industrial robots. Industrial robots don't look anything like the androids from sci-fi books and movies. They don't act like the evil Daleks or a fusspot C-3P0. If anything, the industrial robots toiling on the Chrysler line resemble elegant swans or baby brontosauruses with their fat, squat bodies, long arched necks and small heads. An industrial robot is essentially a long manipulator arm that holds tools such as welding guns or motorized screwdrivers or grippers for picking up objects. The robots 


History Of Data Bases

 
imagesSS
Brief History Of Data Bases
In the 1960's, the use of main frame computers became widespread in many companies. To access vast amounts of stored information, these companies started to use computer programs like COBOL and FORTRAN. Data accessibility and data sharing soon became an important feature because of the large amount of information recquired by different departments within certain companies. With this system, each application owns its own data files. The problems thus associated with this type of file processing was uncontrolled redundancy, inconsistent data, inflexibility, poor enforcement of standards, and low programmer maintenance. 

2000 BUG, 2000 PROBLEM

Fiction, Fantasy, and Fact:
"The Mad Scramble for the Elusive Silver Bullet . . . and the Clock Ticks Away."
Wayne Anderson
November 7, 1996
The year 2000 is practically around the corner, promising a new era of greatness and
wonder . . . as long as you don't own a computer or work with one. The year 2000 is bringing a
Pandora's Box of gifts to the computer world, and the latch is slowly coming undone.
The year 2000 bug is not really a "bug" or "virus," but is more a computer industry
mistake. Many of the PC's, mainframes, and software out there are not designed or
programmed to compute a future year ending in double zeros. This is going to be a costly "fix"
for the industry to absorb. In fact, Mike Elgan who is the editor of Windows Magazine, says " . .
. the problem could cost businesses a total of $600 billion to remedy." (p. 1) 

We have an environmental crisis because we have a people crisis

"We have an environmental crisis because we have a people crisis - a crisis of population growth, of wasteful consumption of resources, and a crisis of apathy and inaction."
An environmental crisis is an emergency concerned with the place in which every human lives - the environment. A people crisis is an emergency with the community that inhabits the world environment. A crisis of population growth is a turning point where the environment can no longer sustain the amounts of people which it contains. A crisis of apathy and inaction is one where the human race cannot be motivated to solve the problems with the environment that they themselves have created.
The claim that we have an environmental crisis because we have a people crisis is valid 

What I understand from term "development"

What I understand from term "development"
From what I understand from the term, a developed country, it is the
dividing line between an advanced country and  a developing country. It is
generally based on per capita income. Those with per capita incomes of less
than one fifth of the level of those in the US are considered 'undeveloped'.
   The definition is very similar to explanation of wealth and poverty. It
also suggests the balance of power between the two countries which are at
different stages of development.

World Demographic Development and Food Supply Essay

1.) The Neolithic and Industrial Revolutions
The two changes in the use of the earth's resources that had the greatest effect on the world population were
the neolithic and the industrial revolutions.
The neolithic revolution (a.k.a. agricultural revolution) was a change in the way of life of our ancestors. It
took place about 8000 years ago among various tribes in Asia and the Middle East. It included a transition
from foraging and hunting to the domestication of animals (most probably starting with the dog) and to
farming. Tribes settled in fertile areas and formed agricultural communities many of which grew into villages
and cities. This relatively stable way of life and the more reliable food supply (and surplus) led to the 

Free Facebook Smiles


Happy emote: :) or :-)
facebook smiley happy
Really happy emote: :D or :-D
facebook smiley wink
Wink emote: ;) or ;-)
facebook smiley happy eyes
Happy eyes: ^_^
facebook smiley laughing eyes
Laughing eyes: >:o
facebook smiley cat smile



Tuesday, February 21, 2012

How to change attributes of all folders/directory/files in dos

Few days ago, I connected my Flash Drive/ Pen Drive to my friend’s PC. My Pen Drive was infected by  virus.
This is a simple worm. It just make all your directory as system director and also make it hidden.(if you are using Microsoft windows as operating system).
So, I just First I deleted all those exe files and deleted recycled directory as well. This should remove your virus. But still you need remove the effect of virus. You need to update back the folder attributes.
You can do it by single line command:
[your drive letter]:/>attrib –s –h –r /s /d

F:/>attrib -s -h /s /d

Saturday, February 11, 2012

MozBackup

As great as it is to have tools such as Firefox and Thunderbird, backing them up can be a tedious process. MozBackup is a tiny program that makes saving and restoring all your bookmarks, extensions, and other personal settings a streamlined and stress-free experience.

The program works with Firefox, Thunderbird, SeaMonkey, and Netscape on Windows platforms. It doesn't work with Firefox Portable, Sunbird, Songbird, or Flock, but for standard Windows iterations of the programs in the Mozilla suite, it's almost silly to not use this program.

Close the program you want to back up, then run MozBackup. Choose backup or restore, then the application. Select the program profile and the location to save the backup, and whether you want to password protect the file. Lastly, choose which parts of the profile you want to save or restore, which range from from e-mails and address books to extensions and history, from certificates, and passwords to bookmarks and your cache.

To back up Netscape, choose the Mozilla Suite option.

Restoring a profile works the same way, but what makes the app extremely useful is that it doesn't differentiate from a restore and a clean install. So if you've got a specific or complicated set of extensions and settings on your work machine, and merely thinking about how to transfer them makes you want to revert to using an Underwood, MozBackup should quell your fears.

Friday, February 10, 2012

PDF Password Remover is a freeware tool

A while back, we shared some nifty utilities to Remove PDF Security Restrictions, Password Protect PDF and Remove Password from PDF Files. Another similar free app, PDF Password Remover is recently launched for Windows that aims to quickly wipe out all the restrictions of a PDF file, without requiring the owner password. Thus, to let users decrypt the PDF and remove the printing, copying text and editing protection.

PDF Password Remover is a freeware tool to remove PDF restriction from protected PDF files. It is very easy to use, offers drag and drop functionality and it even supports batch conversion to decrypt multiple PDFs at once. One can easily remove the owner password from any PDF document just by dragging the file(s), the tool will then instantly and automatically export the un-protected file to the output directory, and the output folder opens up itself in the explorer. You can also specify the desired output path.

 

This is one of the simplest and fastest application to remove restrictions from PDF(s). Moreover, a portable version of it is also available. However, it should be noted that PDF Password Remover cannot remove the user password, i.e. you cant remove the PDF password and restriction if there is a user password set.

Download PDF Password Remover