Saturday, 31 December 2011

Kerala PSC One Time Registration


Thursday, 29 December 2011

The highest award for science in India - CSIR Declares Shanti Swarup Bhatnagar Prize 2011



Eleven Scientist have been selected for Shanti Swarup Bhatnagar (SSB) Prize for Science & Technology for the year 2011.Dr Samir K Brahamachari, Director General, Council of Scientific Research and Industrial development announced the names of scientists today at the celebration of CSIR foundation Day here today. Till 2010, 463 scientists (including 14 women scientists) have been bestowed with the prestigious SSB Prize.
Biological Sciences
Dr Amit Prakash Sharma
International Centre for Genetic Engineering and Biotechnology, New Delhi

Dr Rajan Sankaranarayanan
CSIR Centre for Cellular & Molecular Biology, Hyderabad

Chemical Sciences

Dr Balasubramanian Sundaram
Jawaharlal Nehru Centre for Advanced Scientific Research, Bangalore
Dr Garikapati Narahari Sastry
CSIR Indian Institute of Chemical Technology, Hyderabad

Earth, Atmosapere, Ocean & Planetary Sciences
Dr Shanker Doraiswamy
CSIR National Institute of Oceanography, Goa

Engineering Sciences
Dr Sirshendu De
Indian Institute of Technology, Dharagpur

Dr Upadrasta Ramamurty
Indian Institute of Science, Bangalore
Mahtematical Sciences
Dr Mahan Mj
Ramakrishna Mission Vivekananda University, Howrah

Dr Palash Sarkar
Indian Statistical Institute, Kolkata

Medical Sciences
Dr Kithiganahalli Narayanaswamy Balaji
Indian Institute of Science, Bangalore

Physical Sciences
Dr Shiraz Minwalla
Tata Institute of Fundamental Research, Mumbai

Some Information: The Shanti Swarup Bhatnagar Prize for Science and Technology is awarded annually by the Council of Scientific and Industrial Research (CSIR) for notable and outstanding research, applied or fundamental, in biology, chemistry, environmental science, engineering, mathematics, medicine and Physics. The purpose of the prize is to recognize outstanding Indian work (according to the view of CSIR awarding committee) in science and technology. It is the highest award for science in India.[1] The award is named after the founder Director of the Council of Scientific & Industrial Research, Shanti Swarup Bhatnagar.[2] It was first awarded in 1958.

Any citizen of India engaged in research in any field of science and technology up to the age of 45 years is eligible for the Prize. The Prize is awarded on the basis of contributions made through work done primarily in India during the five years preceding the year of the Prize. The Prize comprises a citation, a plaque, and a cash award of Rs. 500,000. In addition recipients also get Rs 15,000 per month up to the age of 65 years.

Wednesday, 28 December 2011

RECRUITMENT OF CLERKS IN SBI



RECRUITMENT OF CLERKS IN SBI

1 - SPECIAL RECRUITMENT DRIVE FOR SC/ST/OBC CATEGORY

2 - REGULAR RECRUITMENT FOR POSTING AT NORTH EASTERN CIRCLE

Date of Written Examination : 18.03.2012 (sunday)

On-line Registration will start from : 28.12.2011

Last Date for Registration of Online Applications : 20.01.2012

Payment of Fees : 30.12.2011 TO 25.01.2012

Tuesday, 27 December 2011

Jana Gana Mana - 100th Year


เดญാเดฐเดคീเดฏเดจ്เดฑെ เด†เดค്เดฎാเดตിเดฒ്‍ เด†เดฆเดฐเดตും เด…เดญിเดฎാเดจเดตും เดจിเดฑเดฏ്เด•്เด•ുเดจ്เดจ เดฆേเดถീเดฏเด—ാเดจം เดชിเดฑเดจ്เดจിเดŸ്เดŸ് เดšൊเดต്เดตാเดด്เดš เดจൂเดฑ്‌เด•ൊเดฒ്เดฒം เดคിเด•เดฏുเดจ്เดจു. 1911 เดกിเดธംเดฌเดฐ്‍ 27เดจ് เด•ൊเดฒ്‍เด•്เด•เดค്เดคเดฏിเดฒ്‍เดจเดŸเดจ്เดจ เด‡เดจ്เดค്เดฏเดจ്‍ เดจാเดทเดฃเดฒ്‍ เด•ോเดฃ്‍เด—്เดฐเดธ് เดธเดฎ്เดฎേเดณเดจเดค്เดคിเดฒാเดฃ് เดฐเดตീเดจ്เดฆ്เดฐเดจാเดฅ เดŸാเด—ോเดฐ്‍ เดœเดจเด—เดฃเดฎเดจ เด†เดฆ്เดฏเดฎാเดฏി เด†เดฒเดชിเดš്เดšเดค്. เดฌംเด—ാเดณിเดฏിเดฒ്‍ เดฐเดšിเดš്เดš เด† เด—ാเดจเดค്เดคിเดจ് 'เดญാเด—്เดฏเดตിเดงാเดคാ' เดŽเดจ്เดจാเดฃ് เด†เดฆ്เดฏം เดชേเดฐിเดŸ്เดŸിเดฐുเดจ്เดจเดค്. 

เดถเด™്เด•เดฐാเดญเดฐเดฃ เดฐാเด—เดค്เดคിเดฒ്‍ เดฐാംเดธിเด™് เด ാเด•്เด•ൂเดฐ്‍ เดธംเด—ീเดคം เดจเดฒ്‍เด•ിเดฏ เดˆ เด—ാเดจം เดชിเดจ്เดจീเดŸ് เดนിเดจ്เดฆിเดฏിเดฒേเด•്เด•ും เด‡ംเด—്เดฒീเดทിเดฒേเด•്เด•ും เดฎൊเดดിเดฎാเดฑ്เดฑി. เด‡เดจ്เดค്เดฏเดจ്‍ เดชാเดฐ്‍เดฒเดฎെเดจ്เดฑിเดฒ്‍ เดˆ เด—ാเดจം เด†เดฆ്เดฏเดฎാเดฏി เด…เดตเดคเดฐിเดช്เดชിเดš്เดšเดค് 1950 เดœเดจเดตเดฐി 24เดจാเดฃ്. เดˆ เดฆിเดตเดธเดฎാเดฃ് 'เดตเดจ്เดฆേเดฎാเดคเดฐം' เดฆേเดถീเดฏเด—ാเดจเดฎാเดฏി เด…ംเด—ീเด•เดฐിเดš്เดšเดค്.

เดฆേเดถീเดฏเด—ാเดจเดค്เดคിเดจ്เดฑെ เด†เดฆ്เดฏ เด–เดฃ്เดกിเด•เดฏാเดฃ് เด‡เดช്เดชോเดณ്‍ เด†เดฒเดชിเด•്เด•ുเดจ്เดจเดค്.เดŸാเด—ോเดฑിเดจ്เดฑെ 150-ാം เดœเดจ്เดฎเดตാเดฐ്‍เดทിเด•เดฎാเด˜ോเดทിเด•്เด•ുเดจ്เดจ เดตേเดณเดฏിเดฒ്‍เดค്เดคเดจ്เดจെ เดฆേเดถീเดฏเด—ാเดจเดค്เดคിเดจ്เดฑെ 100-ാം เดตാเดฐ്‍เดทിเด•เดตും เดตเดจ്เดจുเดตെเดจ്เดจเดคും เดถ്เดฐเดฆ്เดงേเดฏം. เดŸാเด—ോเดฐ്‍ เดŽเดดുเดคിเดฏ 'เด…เดฎเดฐ്‍ เดทൊเดจാเดฐ്‍ เดฌംเด—്เดฒ' เดŽเดจ്เดจ เด•เดตിเดคเดฏാเดฃ് เดฌംเด—്เดฒാเดฆേเดถിเดจ്เดฑെ เดฆേเดถീเดฏเด—ാเดจം.

Saturday, 17 December 2011

PSC ID Certificates raised to 15 from the existing 7



The Kerala Public Service Commission decided to include Aadhar cards issued by the UIDAI among the identification certificates to be submitted to it by applicants along with seven other new documents.
With this amendment, the total number of identity proofs accepted by the PSC would be raised to 15 from the existing seven. The new documents that have to be submitted include identity cards with photographs issued by the District Sainik Welfare Board to ex-service men or discharge certificates; Conductor licence issued by the Motor Vehicles Department;
Pass books with photographs issued by Scheduled Banks, State Co-operative Banks, and District Co-operative banks; identity cards with photos issued to employees by the PSUs, companies, corporations, boards, authorities and Government self-financing institutions; ID cards with photos issued to employees by the Kerala State Universities; ID cards with photos issued by the Medical Board to physically challenged persons and ID cards with photos issued by the Bar Council to advocates.
The new set of documents would be accepted by the PSC from candidates appearing for examinations, interviews, practical examinations, physical tests and for certificate verification from January 1, 2012 onwards.  Earlier this year, the PSC had made it mandatory to produce ID cards with photographs due to allegations of forgery by candidates. The identity certificates approved by the PSC  till now - Voter’s ID card, driving licence, passport, PAN card, ID cards issued by government offices, pass books of nationalised banks with photos, ID cards issued to physically challenged persons by the Social Welfare Board - would continue to be valid.  It was found that applying for PSC jobs remained out of bounds for many for lack of access to these documents, prompting the PSC to include eight more.

Thursday, 8 December 2011

UPSC and Other PSC Website Address




U.P.S.C.
Andhra Pradesh PSC
Arunachal Pradesh PSCwww.appsc.gov.in
Assam PSCwww.apsc.nic.in
Bihar PSCwww.bpsc.bih.nic.in
Chattisgarh PSCwww.psc.cg.gov.in
Goa PSCwww.goaspc.in
Gujarat PSC
Haryana PSC
Himachal Pradesh PSCwww.hp.gov.in/hppsc
Jammu & Kashmir PSCwww.jkpsc.org
Jharkand PSCwww.jharkhandjpsc.org
Karnataka PSC
Madhya Pradesh PSCwww.mppsc.com
Maharashtra PSCwww.mpsc.maharashtra.gov.in
Manipur PSCwww.mpsc.manipur.gov.in
Meghalaya PSCwww.mpsc.nic.in
Mizoram PSCwww.mpsc.mizoram.gov.in
Nagaland PSCwww.npsc.co.in
Orissa PSC
Punjab PSCwww.ppsc.gov.in
Rajasthan PSC
Sikkim PSCwww.spscskm.gov.in
Tamilnadu PSCwww.tnpsc.gov.in
Tripura PSCwww.tpsc.gov.in
Uttaranchal PSCwww.tnpsc.gov.in
Uttar Pradesh PSCwww.uppsc.org.in
Uttarakhand PSCwww.gov.ua.nic.in/ukpsc
West Bengal PSCwww.pscwb.org.in

Wednesday, 7 December 2011

Indian History - Medieval India, Arab Invasion - Part 1



เด…เดฑเดฌിเด•เดณുเดŸെ เด†เดฆ്เดฏ เดธിเดจ്เดง് เด†เด•്เดฐเดฎเดฃം ?
A D 712


เด…เดฑเดฌിเด•เดณുเดŸെ เด†เดฆ്เดฏ เดธിเดจ്เดง് เด†เด•്เดฐเดฎเดฃเดค്เดคിเดจ് เดจേเดคൃเดค്เดตം เดจเดฒ്‍เด•ിเดฏเดค് ?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เดฌിเดจ്‍ เด•ാเดธിം

เดธിเดจ്เดง് เด†เด•്เดฐเดฎเดฃเดค്เดคിเดจ് เด•ാเดธിเดฎിเดจെ เด…เดฏเดš്เดš เด‡เดฑാเด–ിเดฒെ เด—เดตเดฐ്‍เดฃเดฐ്‍ ?
เด…เดฒ്‍ เดนเดœാเดœ് เดฌിเดจ്‍ เดฏൂเดธเดซ്‌

เดฎുเดนเดฎ്เดฎเดฆ്‌ เดฌിเดจ്‍ เด•ാเดธിം เดตเดงിเดš്เดš เดธിเดจ്เดงിเดฒെ เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดฆാเดนിเดฐ്‍

เดŽเดตിเดŸെ เดตเดš്เดšാเดฃ് เด•ാเดธിം เดฆാเดนിเดฐിเดจെ เดตเดงിเดš്เดšเดค് ?  
เดฑാเดตเดฒ്‍

เดŽ เดกി 1001 - เดฒ്‍ เด‡เดจ്เดค്เดฏ เด†เด•്เดฐเดฎിเดš്เดš เดฎുเดธ്เดฒിം เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—เดธ്เดจി

เดŽ เดกി 1025 - เดฒ്‍ เดธോเดฎเดจാเดฅ เด•്เดทേเดค്เดฐം เด†เด•്เดฐเดฎിเดš്เดš เดฎുเดธ്เดฒിം เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—เดธ്เดจി

เดธോเดฎเดจാเดฅ เด•്เดทേเดค്เดฐം เดชുเดคുเด•്เด•ി เดชเดฃിเดค เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดญിเดฎ I

17 เดคเดตเดฃ เด‡เดจ്เดค്เดฏ เด†เด•്เดฐเดฎിเดš്เดš เดฎുเดธ്เดฒിം เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—เดธ്เดจി

เด—เดธ്เดจിเดฏുเดŸെ เด†เด•്เดฐเดฎเดฃเด™്เด™เดณെ เดจേเดฐിเดŸ്เดŸ เด†เดฆ്เดฏ เด‡เดจ്เดค്เดฏเดจ്‍ เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดœเดฏเดชാเดฒเดจ്‍

เดœเดฏเดชാเดฒ เดฐാเดœാเดตിเดจ്‍เดฑെ เดฐാเดœเดตംเดถം ?
เดทാเดนി เดตംเดถം

เด—เดธ്เดจിเดฏുเดŸെ เด•ാเดฒเด˜เดŸ്เดŸเดค്เดคിเดฒ്‍ เดœീเดตിเดš്เดšിเดฐുเดจ്เดจ เดช്เดฐเดถเดธ്เดค เดšเดฐിเดค്เดฐเด•ാเดฐเดจ്‍ ?
เดซിเดฐ്‍เดฆൌเดธി

เดซിเดฐ്‍เดฆൌเดธിเดฏുเดŸെ เดช്เดฐเดถเดธ്เดคเดฎാเดฏ เด•ൃเดคി ?
เดทാเดจാเดฎ

' เดชേเดฐ്‍เดท്เดฏเดจ്‍ เดนോเดฎเดฐ്‍ ' เดŽเดจ്เดจเดฑിเดฏเดช്เดชെเดŸുเดจเดค്‌?
เดซിเดฐ്‍เดฆൌเดธി

เด—เดธ്เดจിเดฏുเดŸെ เด•ൊเดŸ്เดŸാเดฐം เด…เดฒเด™്เด•เดฐിเดš്เดšിเดฐുเดจ്เดจ เดชเดฃ്เดกിเดคเดจ്‍ ?
เด…เดฒ്‍เดฌเดฑുเดฃി

เด…เดฒ്เดฌเดฑുเดฃിเดฏുเดŸെ เดช്เดฐเดถเดธ്เดคเดฎാเดฏ เด•ൃเดคി ?
เดคാเดฐിเด–് - เด‰เดฒ്‍ - เดนിเดจ്เดฆ്‌

เด•ാเดถ്เดฎീเดฐ്‍ เด•ീเดดเดŸเด•്เด•ിเดฏ เด—เดธ്เดจിเดฏുเดŸെ เดฎเด•เดจ്‍?
เดฎเดธൂเดฆ്

เดŽ เดกി 1175 - เดฒ്‍ เด‡เดจ്เดค്เดฏ เด†เด•്เดฐเดฎിเดš്เดš เดฎുเดธ്เดฒിം เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി

'เดฎോเดฏിเดธുเดฆ്เดฆിเดจ്‍ เดฎുเดนเดฎ്เดฎเดฆ്‌ เดฌിเดจ്เดธാ' เดŽเดจ്เดจ เดชേเดฐിเดฒ്‍ เด…เดฑിเดฏเดช്เดชെเดŸുเดจ്เดจเดค്?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി

เด‡เดจ്เดค്เดฏเดฏിเดฒ്‍ เดฎുเดธ്เดฒിം เดญเดฐเดฃเดค്เดคിเดจ് เด…เดŸിเดค്เดคเดฑ เดชാเด•ിเดฏ เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി

เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി เดชเดฐാเดœเดฏเดช്เดชെเดŸുเดค്เดคിเดฏ เดกเดฒ്‍เดนിเดฏിเดฒെ เดญเดฐเดฃാเดงിเด•ാเดฐി?
เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดšൌเดนാเดจ്‍

เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดšൌเดนാเดจ്‍ เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฐിเดฏെ เดชเดฐാเดœเดฏเดช്เดชെเดŸുเดค്เดคിเดฏ เดฏുเดฆ്เดงം?
เด’เดจ്เดจാം เดคเดฐൈเดจ്‍ เดฏുเดฆ്เดงം

เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดšൌเดนാเดจെ เดชเดฐാเดœเดฏเดช്เดชെเดŸുเดค്เดคിเดฏ เดฏുเดฆ്เดงം?
เดฐเดฃ്เดŸാം เดคเดฐൈเดจ്‍ เดฏുเดฆ്เดงം            

เดคเดฐൈเดจ്‍ เดธ്เดฅിเดคി เดšെเดฏ്เดฏുเดจ്เดจ เดธംเดธ്เดฅാเดจം?
เดนเดฐിเดฏാเดจ

เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി เด‡เดจ്เดค്เดฏเดฏിเดฒ്‍ เด†เดฆ്เดฏം เดชിเดŸിเดš്เดšเดŸเด•്เด•ിเดฏ เดธ്เดฅเดฒം ?
เดฎുเดณ്‍เดŸ്เดŸാเดจ്‍

เดฎുเดนเดฎ്เดฎเดฆ്‌ เด—ോเดฑി เด‡เดจ്เดค്เดฏเดฏിเดฒേเด•്เด•്‌ เด•เดŸเด•്เด•ാเดจ്‍ เดคിเดฐเดž്เดžെเดŸുเดค്เดค เดชാเดค?
เด•ൈเดฌเดฐ്‍ เดšുเดฐം

เดกเดฒ്‍เดนി เดญเดฐിเดš്เดšിเดฐുเดจ്เดจ เด…เดตเดธാเดจเดค്เดคെ เดนിเดจ്เดฆു เดฐാเดœാเดต് ?
เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดšൌเดนാเดจ്‍

'เดฐാเดฏเดชിเดคൊเดฑ' เดŽเดจ്เดจเดฑിเดฏเดช്เดชെเดŸ്เดŸിเดฐുเดจ്เดจ เดฐാเดœാเดต്?
เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดšൌเดนാเดจ്‍

เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดšൌเดนാเดจ്เดฑെ เด†เดธ്เดฅാเดจ เด•เดตി?
เดšเดจ്เดฆ്เดฌเดฐ്เดฆാเดฏി

เดšเดจ്เดฆ്เดฌเดฐ്เดฆാเดฏിเดฏുเดŸെ เดช്เดฐเดถเดธ്เดคเดฎാเดฏ เด•ൃเดคി ?
เดช്เดฐിเดฅ്เดตിเดฐാเดœ് เดฑാเดธോ

เดฏുเดฆ്เดงเดค്เดคിเดฒ്‍ เดชเดฐാเดœเดฏเดชെเดŸ്เดŸാเดฒ്‍ เดฐเดœเดชുเดค്เดฐ เดธ്เดค്เดฐിเด•เดณ്‍ เด•ൂเดŸ്เดŸเดฎാเดฏി เดคീเดฏിเดฒ്‍ เดšാเดŸി เด†เดค്เดฎเดนเดค്เดฏ เดšെเดฏ്เดฏുเดจ്เดจ เดฐീเดคി?
เดœോเดนാเดฐ്‍

Tuesday, 6 December 2011

General Knowledge - History



1, Who among the following was a General of Alexander?
a) Galelio                      b) Copornicos               c) Megellan                   d) Selucus Nikator

2, The Crips Mission visited India durigne the regime of _______
a) Lord Wellington                     b) Lord Wavell               c) Lord Linlithgow          d) Lord Mountbatten

3, Who presented the first Budget in Independent India?
a) Abdul Kalam Azad                 b) R.K Shanmukham Shetty       c) Morarji Desai             d) K C Neogi

4, Who was the author of the book ‘Indika’?
a) Banabhatan               b) Megasthenes            c) Fahian           d) Vasco de gama

5, Man discovered fire in the ___ Age?
a) Metal                        b) Prehistoric                c) New Stone                d) Old Stone

6, The title ‘Sardar’ was given to Patel by
a) Raja Rammohan Roy             b) Dr. B R Ambedkar                 c) Mahatma Gandhi       d) Motilal Nehru

7, Who, amongst the following, first prohibited the practice of Sati?
a) Jehangir                    b) Sher Shah Suri          c) Akbar            d) Aurangzeb

8, The Sikh Khalsa was founded by
a) Guru Hargobind                     b) Guru Gobind Singh                c) Guru Nanak   d) Guru Teg Bahadur

9, Who called the name ‘Mahatma’ to Gandhi?
a) Raja Rammohan Roy             b) Dr. B R Ambedkar                 c) Rabindra Nath Tagore            d) Jawahar Lal Nehru

10, The practice of Sati was declared illegal by
a) Lord Ripon                b) Lord Wavell               c) Lord William Bentick              d) Lord Mountbatten

11, The word ‘Jai Hind’ was first used by
a) Bankim Chandra Chatterjee                b) Mahatma Gandhi                   c) Rabindra Nath Tagore            d) Jawahar Lal Nehru

12, The first women’s university in India was founded by
a) Raja Rammohan Roy             b) JC Kumarappa          c) Dhondo Keshave Karve         d) Rani Ahilya Devi

13, The first sermon of Buddha made at Saranath is called _____
a) Dharma Chakra Parivarthana              b) Dharma Samsthapan             c) Dharma Buddha                    d) Dharma Sabha

14, Who among the following was called as ‘Father of Indian Renaissance?
a) Raja Ram Mohan Roy                        b) Lala Lajpat Rai                      c) Rabindra Nath Tagore            d) Jawahar Lal Nehru

15, Jalianwala bagh massacre occurred on
a) January 30, 1918                   b) April 13, 1919            c) August 14, 1920        d) July 3, 1930

Continue....

Sunday, 4 December 2011

C-DIT DCA Reference Questions and Answers - PC Software



What is DOS?
DOS stands for Disk Operating System. DOS controls the computer’s hardware and provides an environment for programs to run. This system program must always be present when working with your computer.
Why You Need DOS
There are a variety of reasons why you need DOS. A few of them are listed below to satisfy your curiosity.
1. DOS controls the flow of information between you and the computer (translator).
2. DOS allows you to store information on your computer.
3. DOS allows you to retrieve information stored on your computer.
4. DOS interprets and translates the software you have on your computer.
5. DOS gives you access to all its function (i.e. saving, copying, and printing files).

Some of the most common DOS Commands are as follows (corresponding commands on Unix-like operating systems are shown in parenthesis):
    CD - changes the current directory (cd)
    COPY - copies a file (cp)
    DEL - deletes a file (rm)
    DIR - lists directory contents (ls)
    EDIT - starts an editor to create or edit plain text files (vi, vim, ed, joe)
    FORMAT - formats a disk to accept DOS files (mformat)
    HELP - displays information about a command (man, info)
    MKDIR - creates a new directory (mkdir)
    RD - removes a directory (rmdir)
    REN - renames a file (mv)
    TYPE - displays contents of a file on the screen (more, cat)
With the release of Windows 95 up to Windows ME MS-DOS has only a minory roll. It is installed for compatibility reasons for MS-DOS programs and makes Windows 95 up to ME start able. DOS programs being executed in the DOS box or directly in MS DOS before Windows start. Today it finds application for boot disks or similar purposes.

Small reference of internal DOS commands
del, erase - delete files
rd, rmdir - delete directories
dir - show content of directories
cd, chdir - change current directory
cls - clear the screen
md, mkdir - create a directory
copy - copy of one or several files
ren, rename - rename of files or directories
type - shows the content of text files
set - shows the DOS environment variables or defines a new one
ver - shows the DOS version number
vol - shows the name of the storage drive
Small reference of external DOS commands
attrib - shows the attributes of files or set one of those
fdisk - partitioning or modify of the hard disk
move - move of files
mem - shows the occupancy of working memory
tree - shows the directory structure
format - format of storage drives
Field of Application
- booting system for storage media
- File management
- For single user systems only
- Network client (NetBEUI, IPX/SPX, TCP/IP)
- batch processing
Structure information
- 16-bit operating system, (formerly 8-bit)
- Single tasking
- command interpreter for internal and external commands
- external driver software imbedding for periphery devices possible
System environment
- minimum: 512 kbytes RAM, 5 mbyte harddisk storage (depends on version for full installation)
- FAT file system
- executable with every x86 compatible CPU
- low RAM and fixed storage disk needs

Views in PowerPoint
The Views in PowerPoint that you can use to edit, print, and deliver your presentation are as follows:
    Normal view
    Slide Sorter view
    Notes Page view
    Slide Show view (which includes Presenter view)
    Master views: Slide, Handout, and Notes
You can switch between PowerPoint views in two places:
Switch views in PowerPoint
Callout 1 Use the View menu to switch between any of the views
Callout 2 Access the three main views (Normal, Slide Sorter, or Slide Show) on the bottom bar of the PowerPoint window
Views for creating or editing your presentation
Several views in PowerPoint can help you create a professional presentation.
Normal view:  Normal view is the main editing view, where you write and design your presentations. Normal view has four working areas:
    Working areas in Outline and Slides view
    Callout 1 Outline tab
    Callout 2 Slides tab
    Callout 3 Slides pane
    Callout 4 Notes pane
Slide Sorter view: Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you create your presentation, and then also as you prepare your presentation for printing. You can add sections in Slide Sorter view as well, and sort slides into different categories or sections.
            Notes Page view:  The Notes pane is located under the Slide pane. You can type notes that apply to the current slide. Later, you can print your notes and refer to them when you give your presentation. You can also print notes to give to your audience or include the notes in a presentation that you send to the audience or post on a Web page.
            Master views:  The master views include, Slide, Handout, and Notes view. They are the main slides that store information about the presentation, including background, color, fonts, effects, placeholder sizes, and positions. The key benefit to working in a master view is that on the slide master, notes master, or handout master, you can make universal style changes to every slide, notes page, or handout associated with your presentation. For more information about working with masters, see Modify a slide master.
Views for delivering your presentation
            Slide Show view:  Use Slide Show view to deliver your presentation to your audience. In this view, your slides occupy the full computer screen.
    Presenter view : Presenter View helps you manage your slides while you present by tracking how much time has elapsed, which slide is next, and displaying notes that only you can see (while also allowing you to take meeting notes as you present). For more information about using presenter view, see Use presenter view.
Views for preparing and printing your presentation
To help you save paper and ink, you'll want to prepare your print job before you print. PowerPoint provides views and settings to help you specify what you want to print (slides, handouts, or notes pages) and how you want those jobs to print (in color, grayscale, black and white, with frames, and more).
             Slide Sorter view:  Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you prepare to print your slides.
             Print Preview: Print Preview lets you specify settings for what you want to print — handouts, notes pages, and outline, or slides.

What is Secondary storage
Secondary storage is defined as a storage medium that is separate from the processor and holds data even with no power passed to it. An example is a hard drive or an optical drive.
Related Searches:
    BenQ Data Projector
    Computer Data
    USB Drives
        A USB flash drive is a type of flash memory storage device integrated with a universal serial bus interface. Usually portable and rewritable, some can hold up to 300 GB.
    Floppy Disks
        Floppy disks are a storage medium made of a thin magnetic disk. They were widely used from the 1970s to the 1990s. Storage capabilities ranged from 1.5 Mb to 200 MB on some versions.
    CD-R
        A CD-R (compact disc recordable) is an optical secondary storage device invented by Sony and Philips. It is also known as a WORM (write once read many) medium.
    DVD-R
        DVD-R (DVD recordable) has a storage capacity of usually 4.1 GB. There is also an 8.54-GB dual-layer version, called DVD-R DL.
    Magnetic Tape
        Magnetic tape has been in use for more than 50 years. It is (in recent years) packaged in cartridges/cassettes. The average amount of storage is 5 MB to 140 MB for every standard-length reel (2,400 feet).
Generation of Computers
First Generation (1940-1956) Vacuum Tubes
Sponsored
Take an interactive tour::  The IBM SmartCloud gives your business the IT resources it needs.
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. They were very expensive to operate and in addition to using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions.
First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. Input was based on punched cards and paper tape, and output was displayed on printouts.
The UNIVAC and ENIAC computers are examples of first-generation computing devices. The UNIVAC was the first commercial computer delivered to a business client, the U.S. Census Bureau in 1951.
Second Generation (1956-1963) Transistors
Transistors replaced vacuum tubes and ushered in the second generation of computers. The transistor was invented in 1947 but did not see widespread use in computers until the late 1950s. The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to damage, it was a vast improvement over the vacuum tube. Second-generation computers still relied on punched cards for input and printouts for output.
Second-generation computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words. High-level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN. These were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology.
The first computers of this generation were developed for the atomic energy industry.
Third Generation (1964-1971) Integrated Circuits
The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system, which allowed the device to run many different applications at one time with a central program that monitored the memory. Computers for the first time became accessible to a mass audience because they were smaller and cheaper than their predecessors.
Fourth Generation (1971-Present) Microprocessors
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the central processing unit and memory to input/output controls—on a single chip.
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors.
As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the mouse and handheld devices.
Fifth Generation (Present and Beyond) Artificial Intelligence
Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.
Microsoft Word Commands
Bold: CTRL + B
Center a paragraph: CTRL + E
Copy: CTRL + C
Create a hanging indent: CTRL + T
Decrease the font size by 1 point: CTRL + [
Double-space lines: CTRL + 2
Hanging Indent: CTRL + T
Help: F1
Increase the font size by 1 point: CTRL + ]
Indent a paragraph from the left: CTRL + M
Indent: CTRL + M
Insert a footnote: ALT + CTRL + F
Insert an endnote: ALT + CTRL + D
Italic: CTRL + I
Justify a paragraph: CTRL + J
Left-align a paragraph: CTRL + L
Mark a table of contents entry: ALT + SHIFT + O
Mark an index entry: ALT + SHIFT + X
Page Break: CTRL + ENTER
Print: CTRL + P
Remove a paragraph indent from the left: CTRL + SHIFT + M
Remove paragraph formatting: CTRL + Q
Right-align a paragraph: CTRL + R
Save: CTRL + S
Select All: CTRL + A
Shrink Font One Point: CTRL + [
Single-space lines: CTRL + 1
To type a Subscript: CTRL + =
To type a Superscript: CTRL + SHIFT + =
Thesaurus: SHIFT + F7
Remove Hanging Indent: CTRL + SHIFT + T
Remove Indent: CTRL + SHIFT + M
Underline: CTRL + U
Undo: CTRL + Z

What is plotter?
A device that draws pictures on paper based on commands from a computer. Plotters differ from printers in that they draw lines using a pen. As a result, they can produce continuous lines, whereas printers can only simulate lines by printing a closely spaced series of dots. Multicolor plotters use different-colored pens to draw different colors.
In general, plotters are considerably more expensive than printers. They are used in engineering applications where precision is mandatory.



Saturday, 3 December 2011

C-DIT DCA Reference Questions and Answers - Html & Internet



Difference Between Html & XML

XML was designed to transport and store data.
HTML was designed to display data.

XML stands for EXtensible Markup Language
XML is a markup language much like HTML
XML was designed to carry data, not to display data
XML tags are not predefined. You must define your own tags
XML is designed to be self-descriptive
XML is a W3C Recommendation

XML is not a replacement for HTML.

XML and HTML were designed with different goals:

XML was designed to transport and store data, with focus on what data is
HTML was designed to display data, with focus on how data looks

HTML is about displaying information, while XML is about carrying information.

Maybe it is a little hard to understand, but XML does not DO anything. XML was created to structure, store, and transport information.

The following example is a note to Tove, from Jani, stored as XML:
<note>
<to>Tove</to>
<from>Jani</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>

The note above is quite self descriptive. It has sender and receiver information, it also has a heading and a message body.

But still, this XML document does not DO anything. It is just information wrapped in tags. Someone must write a piece of software to send, receive or display it.
With XML You Invent Your Own Tags

The tags in the example above (like <to> and <from>) are not defined in any XML standard. These tags are "invented" by the author of the XML document.

That is because the XML language has no predefined tags.

The tags used in HTML are predefined. HTML documents can only use tags defined in the HTML standard (like <p>, <h1>, etc.).

XML allows the author to define his/her own tags and his/her own document structure.
XML is Not a Replacement for HTML

XML is a complement to HTML.

It is important to understand that XML is not a replacement for HTML. In most web applications, XML is used to transport data, while HTML is used to format and display the data.

My best description of XML is this:

XML is a software- and hardware-independent tool for carrying information.
XML is a W3C Recommendation

XML became a W3C Recommendation on February 10, 1998.

XML is now as important for the Web as HTML was to the foundation of the Web.

XML is the most common tool for data transmissions between all sorts of applications.

Html Tags              Description                            DTD

<!--...-->                   Defines a comment                               STF
<!DOCTYPE>         Defines the document type STF
<a>                          Defines an anchor                                STF
<abbr>                     Defines an abbreviation        STF
<acronym>             Defines an acronym              STF
<address>              Defines contact information for the author/owner of a document    STF
<applet>                                 Deprecated. Defines an embedded applet         TF
<area />                   Defines an area inside an image-map                STF
<b>                          Defines bold text   STF
<base />                 Defines a default address or a default target for all links on a page                STF
<basefont />           Deprecated. Defines a default font, color, or size for the text in a page          TF
<bdo>                     Defines the text direction     STF
<big>                       Defines big text      STF
<blockquote>         Defines a long quotation      STF
<body>                   Defines the document's body              STF
<br />                       Defines a single line break   STF
<button>                                 Defines a push button           STF
<caption>               Defines a table caption         STF
<center>                                 Deprecated. Defines centered text      TF
<cite>                      Defines a citation STF
<code>                   Defines computer code text                 STF
<col />                     Defines attribute values for one or more columns in a table             STF
<colgroup>            Defines a group of columns in a table for formatting        STF
<dd>                       Defines a description of a term in a definition list             STF
<del>                       Defines deleted text              STF
<dfn>                      Defines a definition term      STF
<dir>                       Deprecated. Defines a directory list    TF
<div>                       Defines a section in a document         STF
<dl>                         Defines a definition list         STF
<dt>                         Defines a term (an item) in a definition list         STF
<em>                       Defines emphasized text      STF
<fieldset>                Defines a border around elements in a form      STF
<font>                     Deprecated. Defines font, color, and size for text              TF
<form>                    Defines an HTML form for user input STF
<frame />                 Defines a window (a frame) in a frameset           F
<frameset>              Defines a set of frames         F
<h1> to <h6>          Defines HTML headings       STF
<head>                   Defines information about the document            STF
<hr />                      Defines a horizontal line      STF
<html>                     Defines an HTML document                 STF
<i>                           Defines italic text   STF
<iframe>                 Defines an inline frame         TF
<img />                    Defines an image STF
<input />                                 Defines an input control       STF
<ins>                       Defines inserted text             STF
<kbd>                      Defines keyboard text           STF
<label>                    Defines a label for an input element    STF
<legend>                                Defines a caption for a fieldset element              STF
<li>                          Defines a list item STF
<link />                    Defines the relationship between a document and an external resource       STF
<map>                     Defines an image-map          STF
<menu>                   Deprecated. Defines a menu list          TF
<meta />                 Defines metadata about an HTML document      STF
<noframes>            Defines an alternate content for users that do not support frames TF
<noscript>              Defines an alternate content for users that do not support client-side scripts              STF
<object>                 Defines an embedded object               STF
<ol>                         Defines an ordered list         STF
<optgroup>            Defines a group of related options in a select list             STF
<option>                                 Defines an option in a select list         STF
<p>                          Defines a paragraph             STF
<param />               Defines a parameter for an object        STF
<pre>                      Defines preformatted text     STF
<q>                          Defines a short quotation     STF
<s>                          Deprecated. Defines strikethrough text              TF
<samp>                   Defines sample computer code           STF
<script>                 Defines a client-side script STF
<select>                 Defines a select list (drop-down list) STF
<small>                   Defines small text STF
<span>                   Defines a section in a document         STF
<strike>                   Deprecated. Defines strikethrough text              TF
<strong>                                 Defines strong text                STF
<style>                    Defines style information for a document           STF
<sub>                      Defines subscripted text       STF
<sup>                      Defines superscripted text   STF
<table>                    Defines a table       STF
<tbody>                 Groups the body content in a table     STF
<td>                         Defines a cell in a table         STF
<textarea>               Defines a multi-line text input control                 STF
<tfoot>                    Groups the footer content in a table   STF
<th>                         Defines a header cell in a table            STF
<thead>                 Groups the header content in a table                 STF
<title>                      Defines the title of a document            STF
<tr>                          Defines a row in a table        STF
<tt>                          Defines teletype text              STF
<u>                          Deprecated. Defines underlined text   TF
<ul>                         Defines an unordered list     STF
<var>                       Defines a variable part of a text            STF
<xmp>                     Deprecated. Defines preformatted text

What is Internet

The internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol.

Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other networks. These networks enable the internet to be used for various important functions which include the several means of communications like the file transfer, the online chat and even the sharing of the documents and web sites on the WWW, or the World Wide Web.

It is always mistaken said that the internet and the World Wide Web are both the same terms, or are synonymous. Actually there is a very significant difference between the two which has to be clear to understand both the terms. The internet and World Wide Web are both the networks yet; the internet is the network of the several different computers which are connected through the linkage of the accessories like the copper wires, the fiber optics and even the latest wireless connections. However, the World Wide Web consists of the interlinked collection of the information and documents which are taken as the resource by the general public. These are then linked by the website URLs and the hyperlinks. Therefore World Wide Web is one of the services offered by the whole complicated and huge network of the internet.

The use of IP in the Internet is the integral part of the network, as they provide the services of the internet, through different layers organization through the IP data packets. There are other protocols that are the sub-classes of the IP itself, like the TCP, and the HTTP.


What is Formal Learning, Non-Formal Learning and In-Formal Learning?

 Formal learning consists of learning that occurs within an organised and structured context (formal education, in-company training), and that is designed as learning. It may lead to a formal recognition (diploma, certificate).
Formal learning is intentional from the learner’s perspective

 Non-formal learning consists of learning embedded in planned activities that are not explicitly designated as learning, but which contain an important learning element. Non-formal learning is intentional from the learner’s point of view. The term non-formal has been used most often to describe organized learning outside of the formal education system. These offerings tend to be short-term, voluntary, and have few if any prerequisites.

 Informal learning is defined as learning resulting from daily life activities related to work, family, or leisure. It is often referred to as experiential learning and can to a certain degree be understood as accidental learning.
It is not structured in terms of learning objectives, learning time and/or learning support. Typically, it does not lead to certification. Informal learning may be intentional but in most cases, it is non-intentional (or ‘incidental’/random).

Authentication and authorization

Authentication and authorization is the key to gain access to the corporate resources – many types of authentication methods you can adopt with their advantages and disadvantages

In a corporate network infrastructure, the information assets must be properly protected against any types of threats or security breaches. The need of management of information security is very essential for the organization. The way the user gain access to the corporate network either in the Ethernet network or the wireless network – use the authentication and authorization methods.

Authentication is the process where a user (via any type of physical access such as computer, network, or remote) establishes a right to an identity. A user log in to a network infrastructure system with a user name and password, and the system knows who the user is.

Authorization is the process of determining whether a user is permitted to perform some action or access to a resource. A user log in to a system with a user name and password, and the system knows who the user is and the user can grant or deny access to certain network resources.

Authentication

There are many different methods that can be used to authenticate a user.

User name and password Authentication

Most operating systems and web servers will have some type of user name and password authentication system. Most of these systems will have some type of mechanism to manage the user name and password architecture—for example, account expiration, password expiration, password length, and/or quality of password. Currently, this is the access method of choice for most pages on the Internet. See also password security guidelines.

Advantages

Easy to implement and manage
Inexpensive—provided with most operating systems and web servers
Only minimal training required for end users

Disadvantages

User name and password sent in the clear text for basic authentication (although not in all cases, and SSL can encrypt at the Network level)
User name and password subject to directory attacks
On the Internet, users may have many different user names and passwords (which can be a real headache to maintain)

Certificates Authentication

User certificates can be used by end users to assure their identity. Access to the certificate is normally controlled by a password that is local to the certificate. For example, on Netscape you can open the certificate database with a password, which then allows you to use the certificate. Many companies are starting to implement user certificates on their internal network.

Advantages

Binds the certificate to the user
Ability to encrypt data and digitally sign messages
Supported by most web browsers and e-mail packages
Offers some mechanisms for a single sign-on solution
Difficult to stage a directory attack
Allows roaming users, i.e., users moving from one location to another (if your vendor supports this feature)
Can encrypt data, e-mail, and sign with only one certificate (actually, it is better to have separate certificates for signing and encryption)

Disadvantages

Cost—implementing a PKI can be expensive
Extensive user training is required
Requires a support structure
Roaming users, i.e., users moving from one location to another (not many vendors support this feature—but this is getting better)
Vendors are only now developing tools that can handle large-scale implementations

See also windows file encryption.

Biometric techniques Authentication

A biometric authentication system will use devices such as fingerprints or eye scanners to allow access. This type of device can ensure greater security for high-risk environments that need to limit and control access to sensitive systems. Using this type of system, you could limit “tailgating,” or, allowing users to use another person’s user name and password.

Advantages

The person is the authentication—very difficult to impersonate
Directory attacks are nearly impossible
Offers some mechanisms for a single sign-on solution

Disadvantages

Not many vendors support this technology, but the laptops today are now equipped with this type of fingerprint authentication to gain access to the laptops.
Expensive to implement unless manufactured in mass production such as today’s laptops

Smart cards Authentication

A smart card is typically a credit card-sized plastic card that has an embedded integrated circuit (IC) chip. This chip is what makes the card “smart.” The smart card can store all types of information, which can be transferred via an electronic interface that connects to a computer. This smart card can store information about who you are and cryptographic keys and perform cryptographic algorithms, like encryption. Access to the smart card is controlled via a PIN or a password. This type of authentication mostly deployed for door access in high security area such as military, banks, gold industry, etc.

Advantages

Easy to bind the card to the person
The card can hold keys and other information about the user
If keys are included, then it is easy to encrypt data and e-mail
Easy to train users on the technology
Great solution for roaming users; the certificate can easily be transported

Disadvantages

Very expensive, although the cost of this technology is dropping
Still easy to give the card and PIN to another user i.e. tailgating
Requires a support system and may require more hardware on each PC

Anonymous Authentication

An anonymous user name is a method for giving users access to files so they don’t need to identify themselves to the server. The user enters “anonymous” as a user ID. Anonymous identification is a common way to get access to a server to view or download files that are publicly available.

Through the use of a control anonymous setting, anonymous is both an authentication method and an authorization method. By accessing a system via a control anonymous setting, you can be sure that you know where users are and what data they are accessing. Never assume that anonymous should be a “default” access. This is dangerous. Make sure you limit anonymous access to the data sources that really need to gain access.

Advantages

Easy to implement
Little to no user training required
Ability to conduct secure transactions without registering a user with a user name and password. How? Have you ever purchased a book online and used a credit card? Not all companies will require you to create an account. All you need to do is enter your credit card information (and hopefully you used SSL!)

Disadvantages

Clearly, there is no binding to a specific user. Consequently, you don’t know who accessed the data
Cannot block access on a “per-user” basis
Potentially open to “spam” attacks, where garbage is dumped onto your site
No logging or audit trail **********

What is Ecommerce?

In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People use the term "ecommerce" to describe encrypted payments on the Internet.

Sometimes these transactions include the real-time transfer of funds from buyer to seller and sometimes this is handled manually through an eft-pos terminal once a secure order is received by the merchant.

Internet sales are increasing rapidly as consumers take advantage of lower prices offer by wholesalers retailing their products. This trend is set to strengthen as web sites address consumer security and privacy concerns.

Let's Talk - What is ecommerce?
Benefits of E-Commerce

E-commerce can provide the following benefits over non-electronic commerce:

Reduced costs by reducing labour, reduced paper work, reduced errors in keying in data, reduce post costs
Reduced time. Shorter lead times for payment and return on investment in advertising, faster delivery of product
Flexibility with efficiency. The ability to handle complex situations, product ranges and customer profiles without the situation becoming unmanageable.
Improve relationships with trading partners. Improved communication between trading partners leads to enhanced long-term relationships.
Lock in Customers. The closer you are to your customer and the more you work with them to change from normal business practices to best practice e-commerce the harder it is for a competitor to upset your customer relationship.
New Markets. The Internet has the potential to expand your business into wider geographical locations.

Types of Ecommerce
Ecommerce can be classified based on the type of participants in the transaction:

Business to Business (B2B)
B2B ecommerce transactions are those where both the transacting parties are businesses, e.g., manufacturers, traders, retailers and the like.

Business to Consumer (B2C)
When businesses sell electronically to end-consumers, it is called B2C ecommerce.

Consumer to Consumer (C2C)
Some of the earliest transactions in the global economic system involved barter -- a type of C2C transaction. But C2C transactions were virtually non-existent in recent times until the advent of ecommerce. Auction sites are a good example of C2C ecommerce.

Online Shopping
Buying and selling goods on the Internet is one of the most popular examples of ecommerce. Sellers create storefronts that are the online equivalents of retail outlets. Buyers browse and purchase products with mouse clicks. Though Amazon.com is not the pioneer of online shopping, it is arguably the most famous online shopping destination.

Electronic Payments
When you are buying goods online, there needs to be a mechanism to pay online too. That is where payment processors and payment gateways come into the picture.

Electronic payments reduce the inefficiency associated with writing and mailing checks. It also does away with many of the safety issues that arise due to payment made in currency notes.

Online Auctions
When you think online auction, you think eBay. Physical auctions predate online auctions, but the Internet made auctions accessible to a large number of buyers and sellers. Online auctions are an efficient mechanism for price discovery. Many buyers find the auction shopping mechanism much interesting than regular storefront shopping.

Internet Banking
Today it is possible for you to perform the entire gamut of banking operations without visiting a physical bank branch. Interfacing of websites with bank accounts, and by extension credit cards, was the biggest driver of ecommerce.

Online Ticketing
Air tickets, movie tickets, train tickets, play tickets, tickets to sporting events, and just about any kind of tickets can be booked online. Online ticketing does away with the need to queue up at ticket counters.

Benefits of Ecommerce
The primary benefits of ecommerce revolve around the fact that it eliminates limitations of time and geographical distance. In the process, ecommerce usually streamlines operations and lowers costs.

Specialized Forms of Ecommerce
On some platforms, ecommerce has shown the promise of explosive growth. Two such examples are:

Mcommerce
Mcommerce is short for "mobile commerce." The rapid penetration of mobile devices with Internet access has opened new avenues of ecommerce for retailers.

Fcommerce
Fcommerce is short for "Facebook commerce." The immense popularity of Facebook provides a captive audience to transact business.**********


What is CSS?

CSS stands for Cascading Style Sheets
Styles define how to display HTML elements
Styles were added to HTML 4.0 to solve a problem
External Style Sheets can save a lot of work
External Style Sheets are stored in CSS files
CSS is a style language that defines layout of HTML documents. For example, CSS covers fonts, colours, margins, lines, height, width, background images, advanced positions and many other things. Just wait and see!

HTML can be (mis-)used to add layout to websites. But CSS offers more options and is more accurate and sophisticated. CSS is supported by all browsers today.

HTML is used to structure content. CSS is used for formatting structured content.

CSS was a revolution in the world of web design. The concrete benefits of CSS include:

control layout of many documents from one single style sheet;
more precise control of layout;
apply different layout to different media-types (screen, print, etc.);
numerous advanced and sophisticated techniques.
The basic CSS syntax

Let's say we want a nice red color as the background of a webpage:

Using HTML we could have done it like this:

<body bgcolor="#FF0000">

With CSS the same result can be achieved like this:


body {background-color: #FF0000;}

As you will note, the codes are more or less identical for HTML and CSS. The above example also shows you the fundamental CSS model:

Figure explaining selector, property and value

But where do you put the CSS code? This is exactly what we will go over now.
Applying CSS to an HTML document

There are three ways you can apply CSS to an HTML document. These methods are all outlined below. We recommend that you focus on the third method i.e. external.
Method 1: In-line (the attribute style)

One way to apply CSS to HTML is by using the HTML attribute style. Building on the above example with the red background color, it can be applied like this:

<html>
<head>
<title>Example</title>
</head>
<body style="background-color: #FF0000;">
<p>This is a red page</p>
</body>
</html>

Method 2: Internal (the tag style)

Another way is to include the CSS codes using the HTML tag <style>. For example like this:

<html>
<head>
<title>Example</title>
<style type="text/css">
body {background-color: #FF0000;}
</style>
</head>
<body>
<p>This is a red page</p>
</body>
</html>

Method 3: External (link to a style sheet)

The recommended method is to link to a so-called external style sheet. Throughout this tutorial we will use this method in all our examples.

An external style sheet is simply a text file with the extension .css. Like any other file, you can place the style sheet on your web server or hard disk.

For example, let's say that your style sheet is named style.css and is located in a folder named style. The situation can be illustrated like this:

The folder "style" containing the file "style.css"

The trick is to create a link from the HTML document (default.htm) to the style sheet (style.css). Such link can be created with one line of HTML code:

<link rel="stylesheet" type="text/css" href="style/style.css" />

Notice how the path to our style sheet is indicated using the attribute href.

The line of code must be inserted in the header section of the HTML code i.e. between the <head> and </head> tags. Like this:

<html>
<head>
<title>My document</title>
<link rel="stylesheet" type="text/css" href="style/style.css" />
</head>
<body>

This link tells the browser that it should use the layout from the CSS file when displaying the HTML file.
The really smart thing is that several HTML documents can be linked to the same style sheet. In other words, one CSS file can be used to control the layout of many HTML documents.

Figure showing how many HTML documents can link to the same style sheet

This technique can save you a lot of work. If you, for example, would like to change the background color of a website with 100 pages, a style sheet can save you from having to manually change all 100 HTML documents. Using CSS, the change can be made in a few seconds just by changing one code in the central style sheet.

Online processing, Real Time Processing, Batch processing

Online processing means users directly enter information online (usually, online, in this case, means online to a central processor, rather than its modern connotation of the Internet, but it could mean both!), it is validated and updated directly onto the master file. No new file is created in this case. Therefore, there is near immediate input process, and output. Imagine a cash dispenser transaction or booking a holiday at a travel agents or over the Internet. Compared with batch processing the number of transactions will be few.

In a real time processing, there is a continual input, process and output of data. Data has to be processed in a small stipulated time period (real time), otherwise it will create problems for the system.
For example: assembly line robots and radar system. 

In a batch processing group of transactions collected over a period of time is collected, entered, processed and then the batch results are produced. Batch processing requires separate programs for input, process and output. It is an efficient way of processing high volume of data.
For example: Payroll system, Examination system and billing system.

{***Batch processing refers to applications that are run in batches, often overnight due to limited system resources. For example, bank transaction processing is database intensive, so actually applying the transactions to all the accounts is done when the system is less busy. In batch processing all the data is stored and presented to the program(s) to handle them at once, in one or more large bundles or "batches."

Online processing is what you're doing right now. The application is waiting for you to tell it what to do, and it does it when you tell it to. In the bank example, accepting data for transactions and calculating the available balance would be done online. Online processing doesn't require being "on the line" of a network or modem connection, though nowadays it's quite common.

Real-time processing refers to applications that need to respond within a certain amount of time — usually on the order of seconds — to get the job done. Examples include rocket telemetry processing, many military applications, flight systems, and industrial automation and control systems. For example, if something goes wrong in a factory, a real-time system needs to be able to detect the situation and perform some action, such as notifying an operator or shutting down the problem area, within a few seconds.}*****

What is digital library?

A digital library is a library in which collections are stored in digital formats (as opposed to print, microform, or other media) and accessible by computers.[1] The digital content may be stored locally, or accessed remotely via computer networks. A digital library is a type of information retrieval system.
A digital library is a collection of documents in organized electronic form, available on the Internet or on CD-ROM (compact-disk read-only memory) disks. Depending on the specific library, a user may be able to access magazine articles, books, papers, images, sound files, and videos.


What is Data and Information?

Data

    The word ‘Data’ is derived from the plural form of latin word ‘Datum’, which means ‘to give’.
    Data is a collection of raw facts.
    May or may not be meaningful.
    Input to any system may be treated as Data.
    Understanding is difficult.
    Data must be processed to understand.
    Data may not be in the order.
    Example: Statistics, numbers, characters, images.

Information

    The word ‘Information’ is derived from latin word ‘Informare’, which means ‘to instruct’.
    Information is the outcome derived after processing the data.
    Information is always meaningful.
    Output after processing the system is Information.
    Understanding is easy.
    Information is already in understandable form, it may be processed further to make it more understandable.
    Information should be in the order.
    Example Reports, Knowledge.


What is Dynamic DNS?

Dynamic DNS or DDNS is a term used for the updating in real time of Internet Domain Name System (DNS) name servers to keep up to date the active DNS configuration of their configured hostnames, addresses and other information.

Dynamic Domain Name System, a method of keeping a domain name linked to a changing IP address as not all computers use static IP addresses. Typically, when a user connects to the Internet, the user's ISP assigns an unused IP address from a pool of IP addresses, and this address is used only for the duration of that specific connection. This method of dynamically assigning addresses extends the usable pool of available IP addresses. A dynamic DNS service provider uses a special program that runs on the user's computer, contacting the DNS service each time the IP address provided by the ISP changes and subsequently updating the DNS database to reflect the change in IP address. In this way, even though a domain name's IP address will change often, other users do not have to know the changed IP address in order to connect with the other computer.



Recent Comments Widget
« »