Tuesday, February 28, 2012

History - Rulers of British India

History - Rulers of British India

Please wait while images are being loaded.....
Robert Clive (1757-60) (1765-67)
1. Robert Clive started his career as a clerk in the English East India Company, and he became the Governor of Bengal, following the victory of the Company forces under him in the Battle of Plassey (1757). The Battle of Plassey laid the foundation of the British Empire in India.
2. Roger Drake held the post of the Governor of Bengal for a brief period before Clive.
3. Governor of Bengal twice; from 1757 - 60 and again from 1765-67.
4. Started dual Govt. in Bengal in 1765. It was a system intended to obtain the services of the officials of the erst-while Nawab of Bengal in revenue administration.
5. He forbade the servants of company from indulging in private trade and made payment of internal duties by them obligatory.
6. Bengal White Mutiny by the European brigades at Allahabad and Monghyr, they were arrested and tried.
7. Following the first tenure of Clive, Holwell officiated as the Governor of Bengal for a brief time, followed by Vansittart (1760-1765).
8. Henry Verelst (1767-69) and Cartier (1769-72) succeeded Clive after his second term.
9. The Battle of Buxar was fought and won by the Company forces (1764) when Vansittart was the Governor. The English forces were led by Holwell and the peace treaty (Treaty of Allahabad) was negotiated by Clive. The Battle of Buxar secured the British Empire in India.
10. When he returned to England, Clive was charged with corrupting the political life of England with the ill-gotten money in India. The charges against him included acceptance of bribe and abusing the office of the Governor of Bengal.
11. Though Clive was acquitted, he led a desperate life and committed suicide.
Please wait while images are being loaded.....
Warren Hastings (1772-85)
1. Became the Governor of Bengal in 1772 and Governor - General in 1774, following the Regulating Act (1773). It was the first Act passed on India by the British Parliament. Following this, the British Parliament got some law-making powers over the land in India, ruled by the English East India Company.
2. Introduced quinquennial settlement of land revenue in 1772 farming out of lands to the highest bidder, later on he reversed to annual settlement (1777) on the basis of open auction to the highest bidder
3. Abolished ‘Dual Government’ in 1772.
4. Created a Diwani and Fuajidari Adalat in 1772.
5. With the passage of the Regulatory in Act in 1773, he became the first to hold the post of Governor General in 1774.
6. Divided Bengal into revenue districts and made appointment of the collectors and the other revenue officials. Thus, the system of collectors heading the administration of revenue districts began.
7. Codified Hindu & Muslim Laws (1776).
8. Trial of Nand Kumar and his judicial murder in 1775.

prayer in school essay

Intro-
Contrary to the claims, students have the Constitutional right to pray in school, either individually or in informal groups so long as the prayer is not organized by the school. But if the students only knew what they were really doing by praying in school. II. First of all they are going against the Bible. As to quote, Matthew 6:5-6: "And when you pray, do not be like the hypocrites, for they love to pray standing in the synagogues and on the street corners. But when you pray, go into your room, close the door and pray..." So as you can see those who pray in places such as the cafeteria, middle of the hall or things of that nature is actually going against the bible. Now I am not saying that a person should not pray in schools, but they should do it just as the Bible says in a personal place. If a student can't find a personal place, and have an undesirable need to pray, they need to not make a big deal out of it. Praying as put in the Bible is a personal experience between that person and God. Not an event to be proclaimed up and down the hallway. III. Another problem there is with praying in schools is the fact that there are some students who don't believe in God. The purpose of a 

Hinduism and Buddhism essay

Introduction-
Hinduism and Buddhism are two of the five major religions in our world today. They are widely practiced, and have survived for centuries. Both have similarities and differences, as do all forms of religion. Hopefully, in this paper I will show you the basic structure of each religion. I would also like to show how they compare and contrast.
Hinduism: Foundation
No one is completely sure of where Hinduism was started and by whom. Their oldest written documents, the Vedas, were written down in 1000 B.C. but they had existed orally long before. The Vedas are where Hinduism originated. Today, Hinduism is the world's third largest religion. Many changes have come upon Hinduism since they practiced it first. Hinduism includes many different sects, or denominations, and beliefs that have arisen. Though, there are many things in common with all of the Hindu sects. Their basic beliefs are what ties them together.


Monday, February 27, 2012

Brief history of Buddhism essay

Brief history of Buddhism
Buddhism is one of the major religions of the world. It
was founded by Siddhartha Guatama (Buddha) in Northeastern
India. It arose as a monastic movement during a time of
Brahman tradition. Buddhism rejected important views of
Hinduism. It did not recognize the validity of the Vedic
Scriptures, nor the sacrificial cult which arose from it. It
also questioned the authority of the priesthood. Also, the
Buddhist movement was open to people of all castes, denying
that a person's worth could be judged by their blood.
The religion of Buddhism has 150 to 350 million 

Information About Viruses short essay

Information About Viruses
A growing problem in using computers is computer viruses. Viruses are pesky little programs that some hacker with too much time on his hands wrote. Viruses have been known to create annoyances from displaying messages on the screen, such as "Your PC is now stoned," to completely obliterating everything that is contained on the computer's hard disk. Viruses are transferred from computer to computer in a number of ways. The most common way that users receive viruses at home are downloading programs off the internet, or off of local Bulletin Board Systems, or BBSs. These viruses are then transferred to a floppy disk when written to by the infected computer. Computers can also be infected when a disk that is infected with a virus is used to boot the computer. When this computer is infected, every one who writes a floppy disk on this computer gets 

history of computer essay

 
The volume and use of computers in the world are so great, they have become difficult to ignore anymore. Computers appear to us in so many ways that many times, we fail to see them as they actually are. People associated with a computer when they purchased their morning coffee at the vending machine. As they drove themselves to work, the traffic lights that so often hampered us are controlled by computers in an attempt to speed the journey. Accept it or not, the computer has invaded our life.
The origins and roots of computers started out as many other inventions and technologies have in the past. They evolved from a relatively simple idea or plan designed to help perform functions easier and quicker. The first basic type of computers were designed to do just that; compute!. They performed basic math functions such as multiplication and division and displayed the results in a variety of methods. Some 

essay on welcome to the internet

Good evening I would like to welcome you all here this evening to our symposium on "Then & Now the Evolution of a society"
Things Have Changed dramatically since the 1920's
This Panel of researchers that you see before you are here to talk to you about the events and issues from the past 75 years that have led up society as we know it today.
starting from left to right I would like to Introduce this panel to you
first we have Lori who is an expert in the political arena and she will touch on a few issues on how politics itself has not really changed but how the politicians get there message across has
Next to her we have Yolanda who is an expert on African American leaders and the profound effect they have made in the Last 75 years.

Journalism on the Internet essay

Journalism on the Internet
The common forms of media in today's world each have both
advantages and disadvantages. The Internet has been around for an
almost equal amount of time as most of them, but only recently has
it become a popular way of retrieving information. The Internet
takes the best of all other medium and combines them into a very
unique form. The Internet is the best way to retrieve information.
This combination of paper publishing, TV, radio, telephones, and 

VIDEOGAME: The High Tech Threat to Our Younger Generation

VIDEOGAME: The High Tech Threat to Our Younger Generation

VIDEOGAME: The High Tech Threat to Our Younger Generation
Anyone who has ever walked through a shopping mall on a weekend knows how popular videogame arcades have become with our young people. It is becoming a force in the lives of millions of kids all across America. Parents and teachers become more concerned and worried when they see their kids devoted to videogames. They are highly concentrated because vidiogames greatly influence the mental and learning processes of the younger generation. Many parents believe that their children learn values more from the mass media rather than their from homes. Generally speaking, the video and computer game industry has been a growing concern to the religious groups, responsible politicians and bewildered parents for the disturbing contents and the substandard themes in some of its games. The videogame technology must be recognised for its role and influence on the younger generation because, for better or worse, it clearly affects their academic and social life. 

essay on computer crime

I

Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?

II

Today's computer society has brought a new form of crime. There are those "hackers" who break their way into computers to learn the system or get information. I found out in the book Computer Crime written by Judson, Karen: That "Salami Slicers" steal small amounts of money from many bank customers this adding up to a great deal of money. I also read about phone phreaks more known as "Phreakers." They steal long distance phone services. Phreakers commit many other crimes against phone companies.

In the book Computer Crime it states, most people commit thesis crimes, because they where carious and wanted to explore the system. All they want to do is exploit systems not destroy it. It is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world.

I found out Arizona was the first state to pass a law against computer crime, in 1979. In 1980 the U.S. copyright act was amended to include soft ware. I found out that in 1986 a

computer farad abuse act was passed. This act was made to cover over any crime or computer scheme that was missed with any former laws. Violations to any of thesis laws are a maxim of five years in prison and a $250,000 fine.

III

With my computer I can do lots of thesis things but choose not to. Because I know that if you know computers you can do much more like carious wise. If you know computers you set for the future. I'm not saying I don't have fun with my computer I like causing a little trouble every now and then. Well I piety much covered the motives and intentions behind the most common computer crimes. I explained the laws and punishments for committing thesis crimes. I hope I cleared things up for you elutriate computer people, and gave you a more understanding of the things that can be done. As you have red you can see that computers can and are more dangerous than guns.

computer in various fields essay

computer in various fields essay

Computers in Education
The typical school has 1 computer per 20 students, a ratio that computer educators feel is still not high enough to affect classroom learning as much as books and classroom conversation.
Some critics see computer education as merely the latest in a series of unsuccessful attempts to revolutionise education through the use of audio- and visually-oriented non print media. For example, motion pictures, broadcast television, filmstrips, audio recorders, and videotapes were all initially heralded for their instructional potential, but each of these ultimately became minor classroom tools alongside conventional methods. 

Sunday, February 26, 2012

DSSSB Recruitment Syllabus: TGT HINDI, TGT ENGLISH ETC.

DSSSB Recruitment Syllabus:
Syllabus of Preliminary Exam:

The preliminary exam for DSSB Recrutiment will be divided into following sections:

A. General Awareness, General Intelligence and Reasoning ability (20 Questions, 20 Marks)

B. Arithmetical & Numerical Ability (20 Questions, 20 Marks)

C. Hindi Language(20 Questions, 20 Marks)

D. English Language(20 Questions, 20 Marks)

E. Post specific Subject related objective type (20 Questions, 20 Marks)

(i) General Awareness: Questions will be designed to test the ability of the candidate’s General Awareness of the environment around him and its application to society. The questions will also be designed to test knowledge of current events and of such matter of everyday observation as may be expected of an educated person. The test will include questions relating to India and its neighboring countries, especially pertaining to History, Indian Polity & Constitution, Art & Culture, Geography, Economics, General Policy, Science & Scientific Research, National/International Organizations /Institutions, events etc.

(ii) General Intelligence and Reasoning Ability: The syllabus of General Intelligence includes questions of both verbal and non-verbal types. Test may include questions on analogies, similarities, differences, space visualization, problem solving, analysis, judgment, decision making, visual memory, discrimination, observation, relationship, concepts, arithmetical reasoning, verbal and figure classification, arithmetical number series etc.

(iii) Arithmetical and Numerical Ability: The test of Arithmetical and Numerical Ability will cover Number System including questions on Simplification, Decimals, Fractions, L.C.M., H.C.F., Ratio & Proportion, Percentage, Average, Profit & Loss, Discount, Simple & Compound Interest, Mensuration, Time & Work, Time & Distance, Tables & Graphs, etc.

(iv) Test of Language English: In addition to the testing of candidate’s understanding of the English, its Vocabulary, Grammar, Sentence Structure, Synonyms, Antonyms and its correct usage etc. would also be tested.

(v) Test of Language Hindi: In addition to the testing of candidate’s understanding of the Hindi Languages, its Vocabulary, Grammar, Sentence Structure, Synonyms, Antonyms and its correct usage etc. would also be tested.

(v) Post Specific Subject related Questions: The question will be on the concerned Child & Education Psychology. (Educational Technology, Communication Skills, Teaching & Learning processes) and related topics.

Syllabus of Main Exam: The questions will be on the concerned subject/ work/qualification of the relevant post as prescribed in the recruitment rules and will be of the same level as applicable for the concerned post.

Blogger Labels: DSSSB,Recruitment,Syllabus,POST,Preliminary,Exam,DSSB,Recrutiment,General,Intelligence,Marks,Arithmetical,Numerical,Hindi,Language,English,Subject,candidate,environment,knowledge,events,observation,person,India,History,Indian,Constitution,Culture,Geography,Economics,Policy,Science,Scientific,Research,National,International,Test,visualization,analysis,judgment,decision,visual,memory,discrimination,relationship,classification,series,Number,System,Simplification,Decimals,Ratio,Proportion,Percentage,Average,Profit,Loss,Discount,Simple,Compound,Interest,Mensuration,Time,Work,Distance,addition,Vocabulary,Grammar,Sentence,Structure,Synonyms,Antonyms,usage,Specific,Child,Education,Psychology,Educational,Technology,Communication,Main,qualification,rules,Organizations,Institutions,analogies,differences,concepts,Fractions,Graphs,Languages,Skills,topics

Saturday, February 25, 2012

TGT HINDI QUESTION PAPER

 

QUESTIONS FOR TGT HINDI DSSB PAPER

१. बिहारी का नायिका वर्णन .

या

बिहारी सतसई में शृंगार रस.

२. नई कविता की प्रवातिया

या 

प्रयोगवाद और नई कविता

३. भूषण की राष्ट्रीयता |

या

भूषण की रचनाओं में वीर रस की व्यंजना |

४. आधुनिक हिन्दी का स्थान वश्विक स्तर पर |

या

हिन्दी का प्रचार प्रसार और आधुनिक साधन

५. उपन्यास के मूल तत्त्व |

या

कहानी के तत्त्व

६. कबीर के काव्य में आधुनिक चेतना |

या

भक्ति काल हिन्दी साहित्य का स्वर्ण युग आलोचनात्मक विवरण |

TGT HINDI SYLLABUS FOR TGT PAPER

Syllabus for TGT Hindi government job paper

 

GADH PART -

1. QUESTION BASED ON HINDI GADH KA VIKAS.

2. QUESTION BASED ON UPANYAS.

3. QUESTION BASED ON KAHANI.

4. QUESTION BASED ON NATAK EKANKI

5. QUESTION BASED ON NIBANDH.

6. QUESTION BASED ON YATRA / VRATANT.

7. QUESTION BASED ON SANSMARAN/ REKHACHITRA.

8. QUESTION BASED ON ATAMKATHA/JIVANI.

9. QUESTION BASED ON HINDI ALOCHNA.

10. QUESTION BASED ON HINDI GADH KE NAYE AAYAM.

 

 

KAVYA PART:

QUESTION BASED ON

1. AADIKALIN KAVYA.

2. BHAKTI KALIN KAVYA

3. RITIKALIN KAVYA.

4. AADHUNIK KALIN KAVYA.

BHARTENDU YUG.

DEVEDI YUG.

CHAYAVAD

PRAGATIVAD.

PRYOGVAD/NAI KAVITA

5. CHAND ALANKAR

6. RAS SIDANT

7. PRATIK/BINB VIDHAN

WHAT IS Robotics

 
WIRED HANDS - A Brief Look at Robotics NEWSCIENCE 
 
Two years ago, the Chrysler corporation completely gutted its Windsor, Ontario, car assembly plant and within six weeks had installed an entirely new factory inside the building. It was a marvel of engineering. When it came time to go to work, a whole new work force marched onto the assembly line. There on opening day was a crew of 150 industrial robots. Industrial robots don't look anything like the androids from sci-fi books and movies. They don't act like the evil Daleks or a fusspot C-3P0. If anything, the industrial robots toiling on the Chrysler line resemble elegant swans or baby brontosauruses with their fat, squat bodies, long arched necks and small heads. An industrial robot is essentially a long manipulator arm that holds tools such as welding guns or motorized screwdrivers or grippers for picking up objects. The robots 


History Of Data Bases

 
imagesSS
Brief History Of Data Bases
In the 1960's, the use of main frame computers became widespread in many companies. To access vast amounts of stored information, these companies started to use computer programs like COBOL and FORTRAN. Data accessibility and data sharing soon became an important feature because of the large amount of information recquired by different departments within certain companies. With this system, each application owns its own data files. The problems thus associated with this type of file processing was uncontrolled redundancy, inconsistent data, inflexibility, poor enforcement of standards, and low programmer maintenance. 

2000 BUG, 2000 PROBLEM

Fiction, Fantasy, and Fact:
"The Mad Scramble for the Elusive Silver Bullet . . . and the Clock Ticks Away."
Wayne Anderson
November 7, 1996
The year 2000 is practically around the corner, promising a new era of greatness and
wonder . . . as long as you don't own a computer or work with one. The year 2000 is bringing a
Pandora's Box of gifts to the computer world, and the latch is slowly coming undone.
The year 2000 bug is not really a "bug" or "virus," but is more a computer industry
mistake. Many of the PC's, mainframes, and software out there are not designed or
programmed to compute a future year ending in double zeros. This is going to be a costly "fix"
for the industry to absorb. In fact, Mike Elgan who is the editor of Windows Magazine, says " . .
. the problem could cost businesses a total of $600 billion to remedy." (p. 1) 

We have an environmental crisis because we have a people crisis

"We have an environmental crisis because we have a people crisis - a crisis of population growth, of wasteful consumption of resources, and a crisis of apathy and inaction."
An environmental crisis is an emergency concerned with the place in which every human lives - the environment. A people crisis is an emergency with the community that inhabits the world environment. A crisis of population growth is a turning point where the environment can no longer sustain the amounts of people which it contains. A crisis of apathy and inaction is one where the human race cannot be motivated to solve the problems with the environment that they themselves have created.
The claim that we have an environmental crisis because we have a people crisis is valid 

What I understand from term "development"

What I understand from term "development"
From what I understand from the term, a developed country, it is the
dividing line between an advanced country and  a developing country. It is
generally based on per capita income. Those with per capita incomes of less
than one fifth of the level of those in the US are considered 'undeveloped'.
   The definition is very similar to explanation of wealth and poverty. It
also suggests the balance of power between the two countries which are at
different stages of development.

World Demographic Development and Food Supply Essay

1.) The Neolithic and Industrial Revolutions
The two changes in the use of the earth's resources that had the greatest effect on the world population were
the neolithic and the industrial revolutions.
The neolithic revolution (a.k.a. agricultural revolution) was a change in the way of life of our ancestors. It
took place about 8000 years ago among various tribes in Asia and the Middle East. It included a transition
from foraging and hunting to the domestication of animals (most probably starting with the dog) and to
farming. Tribes settled in fertile areas and formed agricultural communities many of which grew into villages
and cities. This relatively stable way of life and the more reliable food supply (and surplus) led to the 

Free Facebook Smiles


Happy emote: :) or :-)
facebook smiley happy
Really happy emote: :D or :-D
facebook smiley wink
Wink emote: ;) or ;-)
facebook smiley happy eyes
Happy eyes: ^_^
facebook smiley laughing eyes
Laughing eyes: >:o
facebook smiley cat smile



Tuesday, February 21, 2012

How to change attributes of all folders/directory/files in dos

Few days ago, I connected my Flash Drive/ Pen Drive to my friend’s PC. My Pen Drive was infected by  virus.
This is a simple worm. It just make all your directory as system director and also make it hidden.(if you are using Microsoft windows as operating system).
So, I just First I deleted all those exe files and deleted recycled directory as well. This should remove your virus. But still you need remove the effect of virus. You need to update back the folder attributes.
You can do it by single line command:
[your drive letter]:/>attrib –s –h –r /s /d

F:/>attrib -s -h /s /d

Saturday, February 11, 2012

MozBackup

As great as it is to have tools such as Firefox and Thunderbird, backing them up can be a tedious process. MozBackup is a tiny program that makes saving and restoring all your bookmarks, extensions, and other personal settings a streamlined and stress-free experience.

The program works with Firefox, Thunderbird, SeaMonkey, and Netscape on Windows platforms. It doesn't work with Firefox Portable, Sunbird, Songbird, or Flock, but for standard Windows iterations of the programs in the Mozilla suite, it's almost silly to not use this program.

Close the program you want to back up, then run MozBackup. Choose backup or restore, then the application. Select the program profile and the location to save the backup, and whether you want to password protect the file. Lastly, choose which parts of the profile you want to save or restore, which range from from e-mails and address books to extensions and history, from certificates, and passwords to bookmarks and your cache.

To back up Netscape, choose the Mozilla Suite option.

Restoring a profile works the same way, but what makes the app extremely useful is that it doesn't differentiate from a restore and a clean install. So if you've got a specific or complicated set of extensions and settings on your work machine, and merely thinking about how to transfer them makes you want to revert to using an Underwood, MozBackup should quell your fears.

Friday, February 10, 2012

PDF Password Remover is a freeware tool

A while back, we shared some nifty utilities to Remove PDF Security Restrictions, Password Protect PDF and Remove Password from PDF Files. Another similar free app, PDF Password Remover is recently launched for Windows that aims to quickly wipe out all the restrictions of a PDF file, without requiring the owner password. Thus, to let users decrypt the PDF and remove the printing, copying text and editing protection.

PDF Password Remover is a freeware tool to remove PDF restriction from protected PDF files. It is very easy to use, offers drag and drop functionality and it even supports batch conversion to decrypt multiple PDFs at once. One can easily remove the owner password from any PDF document just by dragging the file(s), the tool will then instantly and automatically export the un-protected file to the output directory, and the output folder opens up itself in the explorer. You can also specify the desired output path.

 

This is one of the simplest and fastest application to remove restrictions from PDF(s). Moreover, a portable version of it is also available. However, it should be noted that PDF Password Remover cannot remove the user password, i.e. you cant remove the PDF password and restriction if there is a user password set.

Download PDF Password Remover