Search This Blog
Saturday, 31 December 2011
Thursday, 29 December 2011
The highest award for science in India - CSIR Declares Shanti Swarup Bhatnagar Prize 2011
Eleven Scientist have been selected for Shanti Swarup Bhatnagar (SSB) Prize for Science & Technology for the year 2011.Dr Samir K Brahamachari, Director General, Council of Scientific Research and Industrial development announced the names of scientists today at the celebration of CSIR foundation Day here today. Till 2010, 463 scientists (including 14 women scientists) have been bestowed with the prestigious SSB Prize.
Biological Sciences
Dr Amit Prakash Sharma
International Centre for Genetic Engineering and Biotechnology, New Delhi
Dr Rajan Sankaranarayanan
CSIR Centre for Cellular & Molecular Biology, Hyderabad
Chemical Sciences
Dr Balasubramanian Sundaram
Jawaharlal Nehru Centre for Advanced Scientific Research, Bangalore
Dr Garikapati Narahari Sastry
CSIR Indian Institute of Chemical Technology, Hyderabad
Earth, Atmosapere, Ocean & Planetary Sciences
Dr Shanker Doraiswamy
CSIR National Institute of Oceanography, Goa
Engineering Sciences
Dr Sirshendu De
Indian Institute of Technology, Dharagpur
Dr Upadrasta Ramamurty
Indian Institute of Science, Bangalore
Mahtematical Sciences
Dr Mahan Mj
Ramakrishna Mission Vivekananda University, Howrah
Dr Palash Sarkar
Indian Statistical Institute, Kolkata
Medical Sciences
Dr Kithiganahalli Narayanaswamy Balaji
Indian Institute of Science, Bangalore
Physical Sciences
Dr Shiraz Minwalla
Tata Institute of Fundamental Research, Mumbai
Any citizen of India engaged in research in any field of science and technology up to the age of 45 years is eligible for the Prize. The Prize is awarded on the basis of contributions made through work done primarily in India during the five years preceding the year of the Prize. The Prize comprises a citation, a plaque, and a cash award of Rs. 500,000. In addition recipients also get Rs 15,000 per month up to the age of 65 years.
Wednesday, 28 December 2011
RECRUITMENT OF CLERKS IN SBI
RECRUITMENT OF CLERKS IN SBI
1 - SPECIAL RECRUITMENT DRIVE FOR SC/ST/OBC CATEGORY
2 - REGULAR RECRUITMENT FOR POSTING AT NORTH EASTERN CIRCLE
Date of Written Examination : 18.03.2012 (sunday)
On-line Registration will start from : 28.12.2011
Last Date for Registration of Online Applications : 20.01.2012
Payment of Fees : 30.12.2011 TO 25.01.2012
1 - SPECIAL RECRUITMENT DRIVE FOR SC/ST/OBC CATEGORY
2 - REGULAR RECRUITMENT FOR POSTING AT NORTH EASTERN CIRCLE
Date of Written Examination : 18.03.2012 (sunday)
On-line Registration will start from : 28.12.2011
Last Date for Registration of Online Applications : 20.01.2012
Payment of Fees : 30.12.2011 TO 25.01.2012
Tuesday, 27 December 2011
Jana Gana Mana - 100th Year
à´ാà´°à´¤ീയന്à´±െ ആത്à´®ാà´µിà´²് ആദരവും à´…à´ിà´®ാനവും à´¨ിറയ്à´•്à´•ുà´¨്à´¨ à´¦േà´¶ീയഗാà´¨ം à´ªിറന്à´¨ിà´Ÿ്à´Ÿ് à´šൊà´µ്à´µാà´´്à´š à´¨ൂà´±്à´•ൊà´²്à´²ം à´¤ിà´•à´¯ുà´¨്à´¨ു. 1911 à´¡ിà´¸ംബര് 27à´¨് à´•ൊà´²്à´•്à´•à´¤്തയിà´²്നടന്à´¨ ഇന്à´¤്യന് à´¨ാഷണല് à´•ോà´£്à´—്à´°à´¸് സമ്à´®േളനത്à´¤ിà´²ാà´£് à´°à´µീà´¨്à´¦്à´°à´¨ാà´¥ à´Ÿാà´—ോà´°് ജനഗണമന ആദ്യമാà´¯ി ആലപിà´š്à´šà´¤്. à´¬ംà´—ാà´³ിà´¯ിà´²് à´°à´šിà´š്à´š à´† à´—ാനത്à´¤ിà´¨് 'à´ാà´—്യവിà´§ാà´¤ാ' à´Žà´¨്à´¨ാà´£് ആദ്à´¯ം à´ªേà´°ിà´Ÿ്à´Ÿിà´°ുà´¨്നത്.
ശങ്à´•à´°ാà´à´°à´£ à´°ാà´—à´¤്à´¤ിà´²് à´°ാംà´¸ിà´™് à´ ാà´•്à´•ൂà´°് à´¸ംà´—ീà´¤ം നല്à´•ിà´¯ à´ˆ à´—ാà´¨ം à´ªിà´¨്à´¨ീà´Ÿ് à´¹ിà´¨്à´¦ിà´¯ിà´²േà´•്à´•ും à´‡ംà´—്à´²ീà´·ിà´²േà´•്à´•ും à´®ൊà´´ിà´®ാà´±്à´±ി. ഇന്à´¤്യന് à´ªാà´°്ലമെà´¨്à´±ിà´²് à´ˆ à´—ാà´¨ം ആദ്യമാà´¯ി അവതരിà´ª്à´ªിà´š്à´šà´¤് 1950 ജനവരി 24à´¨ാà´£്. à´ˆ à´¦ിവസമാà´£് 'വന്à´¦േà´®ാതരം' à´¦േà´¶ീയഗാനമാà´¯ി à´…ംà´—ീà´•à´°ിà´š്à´šà´¤്.
à´¦േà´¶ീയഗാനത്à´¤ിà´¨്à´±െ ആദ്à´¯ à´–à´£്à´¡ിà´•à´¯ാà´£് ഇപ്à´ªോà´³് ആലപിà´•്à´•ുà´¨്നത്.à´Ÿാà´—ോà´±ിà´¨്à´±െ 150-ാം ജന്മവാà´°്à´·ിà´•à´®ാà´˜ോà´·ിà´•്à´•ുà´¨്à´¨ à´µേളയിà´²്à´¤്തന്à´¨െ à´¦േà´¶ീയഗാനത്à´¤ിà´¨്à´±െ 100-ാം à´µാà´°്à´·ിà´•à´µും വന്à´¨ുà´µെà´¨്നതും à´¶്à´°à´¦്à´§േà´¯ം. à´Ÿാà´—ോà´°് à´Žà´´ുà´¤ിà´¯ 'അമര് à´·ൊà´¨ാà´°് à´¬ംà´—്à´²' à´Žà´¨്à´¨ à´•à´µിതയാà´£് à´¬ംà´—്à´²ാà´¦േà´¶ിà´¨്à´±െ à´¦േà´¶ീയഗാà´¨ം.
ശങ്à´•à´°ാà´à´°à´£ à´°ാà´—à´¤്à´¤ിà´²് à´°ാംà´¸ിà´™് à´ ാà´•്à´•ൂà´°് à´¸ംà´—ീà´¤ം നല്à´•ിà´¯ à´ˆ à´—ാà´¨ം à´ªിà´¨്à´¨ീà´Ÿ് à´¹ിà´¨്à´¦ിà´¯ിà´²േà´•്à´•ും à´‡ംà´—്à´²ീà´·ിà´²േà´•്à´•ും à´®ൊà´´ിà´®ാà´±്à´±ി. ഇന്à´¤്യന് à´ªാà´°്ലമെà´¨്à´±ിà´²് à´ˆ à´—ാà´¨ം ആദ്യമാà´¯ി അവതരിà´ª്à´ªിà´š്à´šà´¤് 1950 ജനവരി 24à´¨ാà´£്. à´ˆ à´¦ിവസമാà´£് 'വന്à´¦േà´®ാതരം' à´¦േà´¶ീയഗാനമാà´¯ി à´…ംà´—ീà´•à´°ിà´š്à´šà´¤്.
à´¦േà´¶ീയഗാനത്à´¤ിà´¨്à´±െ ആദ്à´¯ à´–à´£്à´¡ിà´•à´¯ാà´£് ഇപ്à´ªോà´³് ആലപിà´•്à´•ുà´¨്നത്.à´Ÿാà´—ോà´±ിà´¨്à´±െ 150-ാം ജന്മവാà´°്à´·ിà´•à´®ാà´˜ോà´·ിà´•്à´•ുà´¨്à´¨ à´µേളയിà´²്à´¤്തന്à´¨െ à´¦േà´¶ീയഗാനത്à´¤ിà´¨്à´±െ 100-ാം à´µാà´°്à´·ിà´•à´µും വന്à´¨ുà´µെà´¨്നതും à´¶്à´°à´¦്à´§േà´¯ം. à´Ÿാà´—ോà´°് à´Žà´´ുà´¤ിà´¯ 'അമര് à´·ൊà´¨ാà´°് à´¬ംà´—്à´²' à´Žà´¨്à´¨ à´•à´µിതയാà´£് à´¬ംà´—്à´²ാà´¦േà´¶ിà´¨്à´±െ à´¦േà´¶ീയഗാà´¨ം.
Saturday, 17 December 2011
PSC ID Certificates raised to 15 from the existing 7
The Kerala Public Service Commission decided to include Aadhar cards issued by the UIDAI among the identification certificates to be submitted to it by applicants along with seven other new documents.
With this amendment, the total number of identity proofs accepted by the PSC would be raised to 15 from the existing seven. The new documents that have to be submitted include identity cards with photographs issued by the District Sainik Welfare Board to ex-service men or discharge certificates; Conductor licence issued by the Motor Vehicles Department;Pass books with photographs issued by Scheduled Banks, State Co-operative Banks, and District Co-operative banks; identity cards with photos issued to employees by the PSUs, companies, corporations, boards, authorities and Government self-financing institutions; ID cards with photos issued to employees by the Kerala State Universities; ID cards with photos issued by the Medical Board to physically challenged persons and ID cards with photos issued by the Bar Council to advocates.The new set of documents would be accepted by the PSC from candidates appearing for examinations, interviews, practical examinations, physical tests and for certificate verification from January 1, 2012 onwards. Earlier this year, the PSC had made it mandatory to produce ID cards with photographs due to allegations of forgery by candidates. The identity certificates approved by the PSC till now - Voter’s ID card, driving licence, passport, PAN card, ID cards issued by government offices, pass books of nationalised banks with photos, ID cards issued to physically challenged persons by the Social Welfare Board - would continue to be valid. It was found that applying for PSC jobs remained out of bounds for many for lack of access to these documents, prompting the PSC to include eight more.Thursday, 8 December 2011
UPSC and Other PSC Website Address
• | U.P.S.C. | |
• | Andhra Pradesh PSC | |
• | Arunachal Pradesh PSC | www.appsc.gov.in |
• | Assam PSC | www.apsc.nic.in |
• | Bihar PSC | www.bpsc.bih.nic.in |
• | Chattisgarh PSC | www.psc.cg.gov.in |
• | Goa PSC | www.goaspc.in |
• | Gujarat PSC | |
• | Haryana PSC | |
• | Himachal Pradesh PSC | www.hp.gov.in/hppsc |
• | Jammu & Kashmir PSC | www.jkpsc.org |
• | Jharkand PSC | www.jharkhandjpsc.org |
• | Karnataka PSC | www.kpsc.kar.nic.in |
• | Madhya Pradesh PSC | www.mppsc.com |
• | Maharashtra PSC | www.mpsc.maharashtra.gov.in |
• | Manipur PSC | www.mpsc.manipur.gov.in |
• | Meghalaya PSC | www.mpsc.nic.in |
• | Mizoram PSC | www.mpsc.mizoram.gov.in |
• | Nagaland PSC | www.npsc.co.in |
• | Orissa PSC | |
• | Punjab PSC | www.ppsc.gov.in |
• | Rajasthan PSC | |
• | Sikkim PSC | www.spscskm.gov.in |
• | Tamilnadu PSC | www.tnpsc.gov.in |
• | Tripura PSC | www.tpsc.gov.in |
• | Uttaranchal PSC | www.tnpsc.gov.in |
• | Uttar Pradesh PSC | www.uppsc.org.in |
• | Uttarakhand PSC | www.gov.ua.nic.in/ukpsc |
• | West Bengal PSC | www.pscwb.org.in |
Wednesday, 7 December 2011
Indian History - Medieval India, Arab Invasion - Part 1
അറബിà´•à´³ുà´Ÿെ ആദ്à´¯ à´¸ിà´¨്à´§് ആക്രമണം ?
A D 712
അറബിà´•à´³ുà´Ÿെ ആദ്à´¯ à´¸ിà´¨്à´§് ആക്രമണത്à´¤ിà´¨് à´¨േà´¤ൃà´¤്à´µം നല്à´•ിയത് ?
à´®ുഹമ്മദ് à´¬ിà´¨് à´•ാà´¸ിം
à´¸ിà´¨്à´§് ആക്രമണത്à´¤ിà´¨് à´•ാà´¸ിà´®ിà´¨െ അയച്à´š ഇറാà´–ിà´²െ ഗവര്ണര് ?
à´…à´²് ഹജാà´œ് à´¬ിà´¨് à´¯ൂസഫ്
à´®ുഹമ്മദ് à´¬ിà´¨് à´•ാà´¸ിം വധിà´š്à´š à´¸ിà´¨്à´§ിà´²െ à´à´°à´£ാà´§ിà´•ാà´°ി?
à´¦ാà´¹ിà´°്
à´Žà´µിà´Ÿെ വച്à´šാà´£് à´•ാà´¸ിം à´¦ാà´¹ിà´°ിà´¨െ വധിà´š്à´šà´¤് ?
à´±ാവല്
à´Ž à´¡ി 1001 - à´²് ഇന്à´¤്à´¯ ആക്à´°à´®ിà´š്à´š à´®ുà´¸്à´²ിം à´à´°à´£ാà´§ിà´•ാà´°ി?
à´®ുഹമ്മദ് à´—à´¸്à´¨ി
à´Ž à´¡ി 1025 - à´²് à´¸ോമനാà´¥ à´•്à´·േà´¤്à´°ം ആക്à´°à´®ിà´š്à´š à´®ുà´¸്à´²ിം à´à´°à´£ാà´§ിà´•ാà´°ി?
à´®ുഹമ്മദ് à´—à´¸്à´¨ി
à´¸ോമനാà´¥ à´•്à´·േà´¤്à´°ം à´ªുà´¤ുà´•്à´•ി പണിà´¤ à´à´°à´£ാà´§ിà´•ാà´°ി?
à´ിà´® I
17 തവണ ഇന്à´¤്à´¯ ആക്à´°à´®ിà´š്à´š à´®ുà´¸്à´²ിം à´à´°à´£ാà´§ിà´•ാà´°ി?
à´®ുഹമ്മദ് à´—à´¸്à´¨ി
à´—à´¸്à´¨ിà´¯ുà´Ÿെ ആക്രമണങ്ങളെ à´¨േà´°ിà´Ÿ്à´Ÿ ആദ്à´¯ ഇന്à´¤്യന് à´à´°à´£ാà´§ിà´•ാà´°ി?
ജയപാലന്
ജയപാà´² à´°ാà´œാà´µിà´¨്à´±െ à´°ാജവംà´¶ം ?
à´·ാà´¹ി à´µംà´¶ം
à´—à´¸്à´¨ിà´¯ുà´Ÿെ à´•ാലഘട്à´Ÿà´¤്à´¤ിà´²് à´œീà´µിà´š്à´šിà´°ുà´¨്à´¨ à´ª്രശസ്à´¤ à´šà´°ിà´¤്à´°à´•ാà´°à´¨് ?
à´«ിà´°്à´¦ൌà´¸ി
à´«ിà´°്à´¦ൌà´¸ിà´¯ുà´Ÿെ à´ª്രശസ്തമാà´¯ à´•ൃà´¤ി ?
à´·ാà´¨ാà´®
' à´ªേà´°്à´·്യന് à´¹ോമര് ' à´Žà´¨്നറിയപ്à´ªെà´Ÿുനത്?
à´«ിà´°്à´¦ൌà´¸ി
à´—à´¸്à´¨ിà´¯ുà´Ÿെ à´•ൊà´Ÿ്à´Ÿാà´°ം അലങ്à´•à´°ിà´š്à´šിà´°ുà´¨്à´¨ പണ്à´¡ിതന് ?
à´…à´²്ബറുà´£ി
à´…à´²്ബറുà´£ിà´¯ുà´Ÿെ à´ª്രശസ്തമാà´¯ à´•ൃà´¤ി ?
à´¤ാà´°ിà´–് - ഉല് - à´¹ിà´¨്à´¦്
à´•ാà´¶്à´®ീà´°് à´•ീà´´à´Ÿà´•്à´•ിà´¯ à´—à´¸്à´¨ിà´¯ുà´Ÿെ മകന്?
മസൂà´¦്
à´Ž à´¡ി 1175 - à´²് ഇന്à´¤്à´¯ ആക്à´°à´®ിà´š്à´š à´®ുà´¸്à´²ിം à´à´°à´£ാà´§ിà´•ാà´°ി?
à´®ുഹമ്മദ് à´—ോà´±ി
'à´®ോà´¯ിà´¸ുà´¦്à´¦ിà´¨് à´®ുഹമ്മദ് à´¬ിà´¨്à´¸ാ' à´Žà´¨്à´¨ à´ªേà´°ിà´²് à´…à´±ിയപ്à´ªെà´Ÿുà´¨്നത്?
à´®ുഹമ്മദ് à´—ോà´±ി
ഇന്à´¤്യയിà´²് à´®ുà´¸്à´²ിം à´à´°à´£à´¤്à´¤ിà´¨് à´…à´Ÿിà´¤്തറ à´ªാà´•ിà´¯ à´à´°à´£ാà´§ിà´•ാà´°ി?
à´®ുഹമ്മദ് à´—ോà´±ി
à´®ുഹമ്മദ് à´—ോà´±ി പരാജയപ്à´ªെà´Ÿുà´¤്à´¤ിà´¯ à´¡à´²്à´¹ിà´¯ിà´²െ à´à´°à´£ാà´§ിà´•ാà´°ി?
à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´šൌà´¹ാà´¨്
à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´šൌà´¹ാà´¨് à´®ുഹമ്മദ് à´—ോà´°ിà´¯െ പരാജയപ്à´ªെà´Ÿുà´¤്à´¤ിà´¯ à´¯ുà´¦്à´§ം?
à´’à´¨്à´¨ാം തരൈà´¨് à´¯ുà´¦്à´§ം
à´®ുഹമ്മദ് à´—ോà´±ി à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´šൌà´¹ാà´¨െ പരാജയപ്à´ªെà´Ÿുà´¤്à´¤ിà´¯ à´¯ുà´¦്à´§ം?
à´°à´£്à´Ÿാം തരൈà´¨് à´¯ുà´¦്à´§ം
തരൈà´¨് à´¸്à´¥ിà´¤ി à´šെà´¯്à´¯ുà´¨്à´¨ à´¸ംà´¸്à´¥ാà´¨ം?
ഹരിà´¯ാà´¨
à´®ുഹമ്മദ് à´—ോà´±ി ഇന്à´¤്യയിà´²് ആദ്à´¯ം à´ªിà´Ÿിà´š്à´šà´Ÿà´•്à´•ിà´¯ à´¸്ഥലം ?
à´®ുà´³്à´Ÿ്à´Ÿാà´¨്
à´®ുഹമ്മദ് à´—ോà´±ി ഇന്à´¤്യയിà´²േà´•്à´•് à´•à´Ÿà´•്à´•ാà´¨് à´¤ിà´°à´ž്à´žെà´Ÿുà´¤്à´¤ à´ªാà´¤?
à´•ൈബര് à´šുà´°ം
à´¡à´²്à´¹ി à´à´°ിà´š്à´šിà´°ുà´¨്à´¨ അവസാനത്à´¤െ à´¹ിà´¨്à´¦ു à´°ാà´œാà´µ് ?
à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´šൌà´¹ാà´¨്
'à´°ായപിà´¤ൊà´±' à´Žà´¨്നറിയപ്à´ªെà´Ÿ്à´Ÿിà´°ുà´¨്à´¨ à´°ാà´œാà´µ്?
à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´šൌà´¹ാà´¨്
à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´šൌà´¹ാà´¨്à´±െ ആസ്à´¥ാà´¨ à´•à´µി?
à´šà´¨്à´¦്ബര്à´¦ാà´¯ി
à´šà´¨്à´¦്ബര്à´¦ാà´¯ിà´¯ുà´Ÿെ à´ª്രശസ്തമാà´¯ à´•ൃà´¤ി ?
à´ª്à´°ിà´¥്à´µിà´°ാà´œ് à´±ാà´¸ോ
à´¯ുà´¦്ധത്à´¤ിà´²് പരാജയപെà´Ÿ്à´Ÿാà´²് രജപുà´¤്à´° à´¸്à´¤്à´°ിà´•à´³് à´•ൂà´Ÿ്à´Ÿà´®ാà´¯ി à´¤ീà´¯ിà´²് à´šാà´Ÿി ആത്മഹത്à´¯ à´šെà´¯്à´¯ുà´¨്à´¨ à´°ീà´¤ി?
à´œോà´¹ാà´°്
Tuesday, 6 December 2011
General Knowledge - History
1, Who among the following was a General of Alexander?
a) Galelio b) Copornicos c) Megellan d) Selucus Nikator
2, The Crips Mission visited India durigne the regime of _______
a) Lord Wellington b) Lord Wavell c) Lord Linlithgow d) Lord Mountbatten
3, Who presented the first Budget in Independent India?
a) Abdul Kalam Azad b) R.K Shanmukham Shetty c) Morarji Desai d) K C Neogi
4, Who was the author of the book ‘Indika’?
a) Banabhatan b) Megasthenes c) Fahian d) Vasco de gama
5, Man discovered fire in the ___ Age?
a) Metal b) Prehistoric c) New Stone d) Old Stone
6, The title ‘Sardar’ was given to Patel by
a) Raja Rammohan Roy b) Dr. B R Ambedkar c) Mahatma Gandhi d) Motilal Nehru
7, Who, amongst the following, first prohibited the practice of Sati?
a) Jehangir b) Sher Shah Suri c) Akbar d) Aurangzeb
8, The Sikh Khalsa was founded by
a) Guru Hargobind b) Guru Gobind Singh c) Guru Nanak d) Guru Teg Bahadur
9, Who called the name ‘Mahatma’ to Gandhi?
a) Raja Rammohan Roy b) Dr. B R Ambedkar c) Rabindra Nath Tagore d) Jawahar Lal Nehru
10, The practice of Sati was declared illegal by
a) Lord Ripon b) Lord Wavell c) Lord William Bentick d) Lord Mountbatten
11, The word ‘Jai Hind’ was first used by
a) Bankim Chandra Chatterjee b) Mahatma Gandhi c) Rabindra Nath Tagore d) Jawahar Lal Nehru
12, The first women’s university in India was founded by
a) Raja Rammohan Roy b) JC Kumarappa c) Dhondo Keshave Karve d) Rani Ahilya Devi
13, The first sermon of Buddha made at Saranath is called _____
a) Dharma Chakra Parivarthana b) Dharma Samsthapan c) Dharma Buddha d) Dharma Sabha
14, Who among the following was called as ‘Father of Indian Renaissance?
a) Raja Ram Mohan Roy b) Lala Lajpat Rai c) Rabindra Nath Tagore d) Jawahar Lal Nehru
15, Jalianwala bagh massacre occurred on
a) January 30, 1918 b) April 13, 1919 c) August 14, 1920 d) July 3, 1930
Continue....
Sunday, 4 December 2011
C-DIT DCA Reference Questions and Answers - PC Software
What is DOS?
DOS stands for Disk Operating System. DOS controls the computer’s hardware and provides an environment for programs to run. This system program must always be present when working with your computer.
Why You Need DOS
There are a variety of reasons why you need DOS. A few of them are listed below to satisfy your curiosity.
1. DOS controls the flow of information between you and the computer (translator).
2. DOS allows you to store information on your computer.
3. DOS allows you to retrieve information stored on your computer.
4. DOS interprets and translates the software you have on your computer.
5. DOS gives you access to all its function (i.e. saving, copying, and printing files).
Some of the most common DOS Commands are as follows (corresponding commands on Unix-like operating systems are shown in parenthesis):
CD - changes the current directory (cd)
COPY - copies a file (cp)
DEL - deletes a file (rm)
DIR - lists directory contents (ls)
EDIT - starts an editor to create or edit plain text files (vi, vim, ed, joe)
FORMAT - formats a disk to accept DOS files (mformat)
HELP - displays information about a command (man, info)
MKDIR - creates a new directory (mkdir)
RD - removes a directory (rmdir)
REN - renames a file (mv)
TYPE - displays contents of a file on the screen (more, cat)
With the release of Windows 95 up to Windows ME MS-DOS has only a minory roll. It is installed for compatibility reasons for MS-DOS programs and makes Windows 95 up to ME start able. DOS programs being executed in the DOS box or directly in MS DOS before Windows start. Today it finds application for boot disks or similar purposes.
Small reference of internal DOS commands
del, erase - delete files
rd, rmdir - delete directories
dir - show content of directories
cd, chdir - change current directory
cls - clear the screen
md, mkdir - create a directory
copy - copy of one or several files
ren, rename - rename of files or directories
type - shows the content of text files
set - shows the DOS environment variables or defines a new one
ver - shows the DOS version number
vol - shows the name of the storage drive
Small reference of external DOS commands
attrib - shows the attributes of files or set one of those
fdisk - partitioning or modify of the hard disk
move - move of files
mem - shows the occupancy of working memory
tree - shows the directory structure
format - format of storage drives
Field of Application
- booting system for storage media
- File management
- For single user systems only
- Network client (NetBEUI, IPX/SPX, TCP/IP)
- batch processing
Structure information
- 16-bit operating system, (formerly 8-bit)
- Single tasking
- command interpreter for internal and external commands
- external driver software imbedding for periphery devices possible
System environment
- minimum: 512 kbytes RAM, 5 mbyte harddisk storage (depends on version for full installation)
- FAT file system
- executable with every x86 compatible CPU
- low RAM and fixed storage disk needs
Views in PowerPoint
The Views in PowerPoint that you can use to edit, print, and deliver your presentation are as follows:
Normal view
Slide Sorter view
Notes Page view
Slide Show view (which includes Presenter view)
Master views: Slide, Handout, and Notes
You can switch between PowerPoint views in two places:
Switch views in PowerPoint
Callout 1 Use the View menu to switch between any of the views
Callout 2 Access the three main views (Normal, Slide Sorter, or Slide Show) on the bottom bar of the PowerPoint window
Views for creating or editing your presentation
Several views in PowerPoint can help you create a professional presentation.
Normal view: Normal view is the main editing view, where you write and design your presentations. Normal view has four working areas:
Working areas in Outline and Slides view
Callout 1 Outline tab
Callout 2 Slides tab
Callout 3 Slides pane
Callout 4 Notes pane
Slide Sorter view: Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you create your presentation, and then also as you prepare your presentation for printing. You can add sections in Slide Sorter view as well, and sort slides into different categories or sections.
Notes Page view: The Notes pane is located under the Slide pane. You can type notes that apply to the current slide. Later, you can print your notes and refer to them when you give your presentation. You can also print notes to give to your audience or include the notes in a presentation that you send to the audience or post on a Web page.
Master views: The master views include, Slide, Handout, and Notes view. They are the main slides that store information about the presentation, including background, color, fonts, effects, placeholder sizes, and positions. The key benefit to working in a master view is that on the slide master, notes master, or handout master, you can make universal style changes to every slide, notes page, or handout associated with your presentation. For more information about working with masters, see Modify a slide master.
Views for delivering your presentation
Slide Show view: Use Slide Show view to deliver your presentation to your audience. In this view, your slides occupy the full computer screen.
Presenter view : Presenter View helps you manage your slides while you present by tracking how much time has elapsed, which slide is next, and displaying notes that only you can see (while also allowing you to take meeting notes as you present). For more information about using presenter view, see Use presenter view.
Views for preparing and printing your presentation
To help you save paper and ink, you'll want to prepare your print job before you print. PowerPoint provides views and settings to help you specify what you want to print (slides, handouts, or notes pages) and how you want those jobs to print (in color, grayscale, black and white, with frames, and more).
Slide Sorter view: Slide Sorter view gives you a view of your slides in thumbnail form. This view makes it easy for you to sort and organize the sequence of your slides as you prepare to print your slides.
Print Preview: Print Preview lets you specify settings for what you want to print — handouts, notes pages, and outline, or slides.
What is Secondary storage
Secondary storage is defined as a storage medium that is separate from the processor and holds data even with no power passed to it. An example is a hard drive or an optical drive.
Related Searches:
BenQ Data Projector
Computer Data
USB Drives
A USB flash drive is a type of flash memory storage device integrated with a universal serial bus interface. Usually portable and rewritable, some can hold up to 300 GB.
Floppy Disks
Floppy disks are a storage medium made of a thin magnetic disk. They were widely used from the 1970s to the 1990s. Storage capabilities ranged from 1.5 Mb to 200 MB on some versions.
CD-R
A CD-R (compact disc recordable) is an optical secondary storage device invented by Sony and Philips. It is also known as a WORM (write once read many) medium.
DVD-R
DVD-R (DVD recordable) has a storage capacity of usually 4.1 GB. There is also an 8.54-GB dual-layer version, called DVD-R DL.
Magnetic Tape
Magnetic tape has been in use for more than 50 years. It is (in recent years) packaged in cartridges/cassettes. The average amount of storage is 5 MB to 140 MB for every standard-length reel (2,400 feet).
Generation of Computers
First Generation (1940-1956) Vacuum Tubes
Sponsored
Take an interactive tour:: The IBM SmartCloud gives your business the IT resources it needs.
The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. They were very expensive to operate and in addition to using a great deal of electricity, generated a lot of heat, which was often the cause of malfunctions.
First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. Input was based on punched cards and paper tape, and output was displayed on printouts.
The UNIVAC and ENIAC computers are examples of first-generation computing devices. The UNIVAC was the first commercial computer delivered to a business client, the U.S. Census Bureau in 1951.
Second Generation (1956-1963) Transistors
Transistors replaced vacuum tubes and ushered in the second generation of computers. The transistor was invented in 1947 but did not see widespread use in computers until the late 1950s. The transistor was far superior to the vacuum tube, allowing computers to become smaller, faster, cheaper, more energy-efficient and more reliable than their first-generation predecessors. Though the transistor still generated a great deal of heat that subjected the computer to damage, it was a vast improvement over the vacuum tube. Second-generation computers still relied on punched cards for input and printouts for output.
Second-generation computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words. High-level programming languages were also being developed at this time, such as early versions of COBOL and FORTRAN. These were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology.
The first computers of this generation were developed for the atomic energy industry.
Third Generation (1964-1971) Integrated Circuits
The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system, which allowed the device to run many different applications at one time with a central program that monitored the memory. Computers for the first time became accessible to a mass audience because they were smaller and cheaper than their predecessors.
Fourth Generation (1971-Present) Microprocessors
The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the central processing unit and memory to input/output controls—on a single chip.
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors.
As these small computers became more powerful, they could be linked together to form networks, which eventually led to the development of the Internet. Fourth generation computers also saw the development of GUIs, the mouse and handheld devices.
Fifth Generation (Present and Beyond) Artificial Intelligence
Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.
Microsoft Word Commands
Bold: CTRL + B
Center a paragraph: CTRL + E
Copy: CTRL + C
Create a hanging indent: CTRL + T
Decrease the font size by 1 point: CTRL + [
Double-space lines: CTRL + 2
Hanging Indent: CTRL + T
Help: F1
Increase the font size by 1 point: CTRL + ]
Indent a paragraph from the left: CTRL + M
Indent: CTRL + M
Insert a footnote: ALT + CTRL + F
Insert an endnote: ALT + CTRL + D
Italic: CTRL + I
Justify a paragraph: CTRL + J
Left-align a paragraph: CTRL + L
Mark a table of contents entry: ALT + SHIFT + O
Mark an index entry: ALT + SHIFT + X
Page Break: CTRL + ENTER
Print: CTRL + P
Remove a paragraph indent from the left: CTRL + SHIFT + M
Remove paragraph formatting: CTRL + Q
Right-align a paragraph: CTRL + R
Save: CTRL + S
Select All: CTRL + A
Shrink Font One Point: CTRL + [
Single-space lines: CTRL + 1
To type a Subscript: CTRL + =
To type a Superscript: CTRL + SHIFT + =
Thesaurus: SHIFT + F7
Remove Hanging Indent: CTRL + SHIFT + T
Remove Indent: CTRL + SHIFT + M
Underline: CTRL + U
Undo: CTRL + Z
What is plotter?
A device that draws pictures on paper based on commands from a computer. Plotters differ from printers in that they draw lines using a pen. As a result, they can produce continuous lines, whereas printers can only simulate lines by printing a closely spaced series of dots. Multicolor plotters use different-colored pens to draw different colors.
In general, plotters are considerably more expensive than printers. They are used in engineering applications where precision is mandatory.
C-DIT DCA Exam 2011, December 3 & 4 - RDBMS Questions
<div dir="ltr" style="text-align: left;" trbidi="on">
Download <a href="https://docs.google.com/open?id=0B7QD9It9FBu8YTc0NmU2ZmQtMTdlZS00MTk1LTkwNTYtMTkxNjMyZGQ3NzJj" target="_blank">C-DIT DCA Exam 2011, December 3 & 4 - RDBMS Questions</a></div>
C-DIT DCA Exam 2011, December 3 & 4 - Introduction to Programming - C, Questions
<div dir="ltr" style="text-align: left;" trbidi="on">
Download <a href="https://docs.google.com/open?id=0B7QD9It9FBu8Zjc5YmE1MTQtZGY0My00MDJjLWJiNjctYzYxNGE2OTI1YTli" target="_blank">C-DIT DCA Exam 2011, December 3 & 4 - Introduction to Programming - C, Questions</a></div>
C-DIT DCA Exam 2011, December 3 & 4 - Introduction To IT Question
<div dir="ltr" style="text-align: left;" trbidi="on">
Download <a href="https://docs.google.com/open?id=0B7QD9It9FBu8MjJkMWQwZDgtNTAzMS00YWI5LWE2ZTUtYzNhYzdhNTEwZjg2" target="_blank">C-DIT DCA Exam 2011, December 3 & 4 - Introduction To IT Question</a></div>
C-DIT DCA Exam 2011, December 3 & 4 - PC Software Question
<div dir="ltr" style="text-align: left;" trbidi="on">
Download <a href="https://docs.google.com/open?id=0B7QD9It9FBu8NTEyZDIwNTYtNGFlMC00OTA0LWFiNmItZmQ0NDM2MmRjNDg4" target="_blank">C-DIT DCA Exam 2011, December 3 & 4 - PC Software Question</a></div>
Saturday, 3 December 2011
C-DIT DCA Reference Questions and Answers - Html & Internet
Difference Between Html & XML
XML was designed to transport and store data.
HTML was designed to display data.
XML stands for EXtensible Markup Language
XML is a markup language much like HTML
XML was designed to carry data, not to display data
XML tags are not predefined. You must define your own tags
XML is designed to be self-descriptive
XML is a W3C Recommendation
XML is not a replacement for HTML.
XML and HTML were designed with different goals:
XML was designed to transport and store data, with focus on what data is
HTML was designed to display data, with focus on how data looks
HTML is about displaying information, while XML is about carrying information.
Maybe it is a little hard to understand, but XML does not DO anything. XML was created to structure, store, and transport information.
The following example is a note to Tove, from Jani, stored as XML:
<note>
<to>Tove</to>
<from>Jani</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>
The note above is quite self descriptive. It has sender and receiver information, it also has a heading and a message body.
But still, this XML document does not DO anything. It is just information wrapped in tags. Someone must write a piece of software to send, receive or display it.
With XML You Invent Your Own Tags
The tags in the example above (like <to> and <from>) are not defined in any XML standard. These tags are "invented" by the author of the XML document.
That is because the XML language has no predefined tags.
The tags used in HTML are predefined. HTML documents can only use tags defined in the HTML standard (like <p>, <h1>, etc.).
XML allows the author to define his/her own tags and his/her own document structure.
XML is Not a Replacement for HTML
XML is a complement to HTML.
It is important to understand that XML is not a replacement for HTML. In most web applications, XML is used to transport data, while HTML is used to format and display the data.
My best description of XML is this:
XML is a software- and hardware-independent tool for carrying information.
XML is a W3C Recommendation
XML became a W3C Recommendation on February 10, 1998.
XML is now as important for the Web as HTML was to the foundation of the Web.
XML is the most common tool for data transmissions between all sorts of applications.
Html Tags Description DTD
<!--...--> Defines a comment STF
<!DOCTYPE> Defines the document type STF
<a> Defines an anchor STF
<abbr> Defines an abbreviation STF
<acronym> Defines an acronym STF
<address> Defines contact information for the author/owner of a document STF
<applet> Deprecated. Defines an embedded applet TF
<area /> Defines an area inside an image-map STF
<b> Defines bold text STF
<base /> Defines a default address or a default target for all links on a page STF
<basefont /> Deprecated. Defines a default font, color, or size for the text in a page TF
<bdo> Defines the text direction STF
<big> Defines big text STF
<blockquote> Defines a long quotation STF
<body> Defines the document's body STF
<br /> Defines a single line break STF
<button> Defines a push button STF
<caption> Defines a table caption STF
<center> Deprecated. Defines centered text TF
<cite> Defines a citation STF
<code> Defines computer code text STF
<col /> Defines attribute values for one or more columns in a table STF
<colgroup> Defines a group of columns in a table for formatting STF
<dd> Defines a description of a term in a definition list STF
<del > Defines deleted text STF
<dfn> Defines a definition term STF
<dir> Deprecated. Defines a directory list TF
<div> Defines a section in a document STF
<dl> Defines a definition list STF
<dt> Defines a term (an item) in a definition list STF
<em> Defines emphasized text STF
<fieldset> Defines a border around elements in a form STF
<font> Deprecated. Defines font, color, and size for text TF
<form> Defines an HTML form for user input STF
<frame /> Defines a window (a frame) in a frameset F
<frameset> Defines a set of frames F
<h1> to <h6> Defines HTML headings STF
<head> Defines information about the document STF
<hr /> Defines a horizontal line STF
<html> Defines an HTML document STF
<i> Defines italic text STF
<iframe> Defines an inline frame TF
<img /> Defines an image STF
<input /> Defines an input control STF
<ins> Defines inserted text STF
<kbd> Defines keyboard text STF
<label> Defines a label for an input element STF
<legend> Defines a caption for a fieldset element STF
<li> Defines a list item STF
<link /> Defines the relationship between a document and an external resource STF
<map> Defines an image-map STF
<menu> Deprecated. Defines a menu list TF
<meta /> Defines metadata about an HTML document STF
<noframes> Defines an alternate content for users that do not support frames TF
<noscript> Defines an alternate content for users that do not support client-side scripts STF
<object> Defines an embedded object STF
<ol> Defines an ordered list STF
<optgroup> Defines a group of related options in a select list STF
<option> Defines an option in a select list STF
<p> Defines a paragraph STF
<param /> Defines a parameter for an object STF
<pre> Defines preformatted text STF
<q> Defines a short quotation STF
<s> Deprecated. Defines strikethrough text TF
<samp> Defines sample computer code STF
<script> Defines a client-side script STF
<select> Defines a select list (drop-down list) STF
<small> Defines small text STF
<span> Defines a section in a document STF
<strike> Deprecated. Defines strikethrough text TF
<strong> Defines strong text STF
<style> Defines style information for a document STF
<sub> Defines subscripted text STF
<sup> Defines superscripted text STF
<table> Defines a table STF
<tbody> Groups the body content in a table STF
<td> Defines a cell in a table STF
<textarea> Defines a multi-line text input control STF
<tfoot> Groups the footer content in a table STF
<th> Defines a header cell in a table STF
<thead> Groups the header content in a table STF
<title> Defines the title of a document STF
<tr> Defines a row in a table STF
<tt> Defines teletype text STF
<u> Deprecated. Defines underlined text TF
<ul> Defines an unordered list STF
<var> Defines a variable part of a text STF
<xmp> Deprecated. Defines preformatted text
What is Internet
The internet in simple terms is a network of the interlinked computer networking worldwide, which is accessible to the general public. These interconnected computers work by transmitting data through a special type of packet switching which is known as the IP or the internet protocol.
Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other networks. These networks enable the internet to be used for various important functions which include the several means of communications like the file transfer, the online chat and even the sharing of the documents and web sites on the WWW, or the World Wide Web.
It is always mistaken said that the internet and the World Wide Web are both the same terms, or are synonymous. Actually there is a very significant difference between the two which has to be clear to understand both the terms. The internet and World Wide Web are both the networks yet; the internet is the network of the several different computers which are connected through the linkage of the accessories like the copper wires, the fiber optics and even the latest wireless connections. However, the World Wide Web consists of the interlinked collection of the information and documents which are taken as the resource by the general public. These are then linked by the website URLs and the hyperlinks. Therefore World Wide Web is one of the services offered by the whole complicated and huge network of the internet.
The use of IP in the Internet is the integral part of the network, as they provide the services of the internet, through different layers organization through the IP data packets. There are other protocols that are the sub-classes of the IP itself, like the TCP, and the HTTP.
What is Formal Learning, Non-Formal Learning and In-Formal Learning?
Formal learning consists of learning that occurs within an organised and structured context (formal education, in-company training), and that is designed as learning. It may lead to a formal recognition (diploma, certificate).
Formal learning is intentional from the learner’s perspective
Non-formal learning consists of learning embedded in planned activities that are not explicitly designated as learning, but which contain an important learning element. Non-formal learning is intentional from the learner’s point of view. The term non-formal has been used most often to describe organized learning outside of the formal education system. These offerings tend to be short-term, voluntary, and have few if any prerequisites.
Informal learning is defined as learning resulting from daily life activities related to work, family, or leisure. It is often referred to as experiential learning and can to a certain degree be understood as accidental learning.
It is not structured in terms of learning objectives, learning time and/or learning support. Typically, it does not lead to certification. Informal learning may be intentional but in most cases, it is non-intentional (or ‘incidental’/random).
Authentication and authorization
Authentication and authorization is the key to gain access to the corporate resources – many types of authentication methods you can adopt with their advantages and disadvantages
In a corporate network infrastructure, the information assets must be properly protected against any types of threats or security breaches. The need of management of information security is very essential for the organization. The way the user gain access to the corporate network either in the Ethernet network or the wireless network – use the authentication and authorization methods.
Authentication is the process where a user (via any type of physical access such as computer, network, or remote) establishes a right to an identity. A user log in to a network infrastructure system with a user name and password, and the system knows who the user is.
Authorization is the process of determining whether a user is permitted to perform some action or access to a resource. A user log in to a system with a user name and password, and the system knows who the user is and the user can grant or deny access to certain network resources.
Authentication
There are many different methods that can be used to authenticate a user.
User name and password Authentication
Most operating systems and web servers will have some type of user name and password authentication system. Most of these systems will have some type of mechanism to manage the user name and password architecture—for example, account expiration, password expiration, password length, and/or quality of password. Currently, this is the access method of choice for most pages on the Internet. See also password security guidelines.
Advantages
Easy to implement and manage
Inexpensive—provided with most operating systems and web servers
Only minimal training required for end users
Disadvantages
User name and password sent in the clear text for basic authentication (although not in all cases, and SSL can encrypt at the Network level)
User name and password subject to directory attacks
On the Internet, users may have many different user names and passwords (which can be a real headache to maintain)
Certificates Authentication
User certificates can be used by end users to assure their identity. Access to the certificate is normally controlled by a password that is local to the certificate. For example, on Netscape you can open the certificate database with a password, which then allows you to use the certificate. Many companies are starting to implement user certificates on their internal network.
Advantages
Binds the certificate to the user
Ability to encrypt data and digitally sign messages
Supported by most web browsers and e-mail packages
Offers some mechanisms for a single sign-on solution
Difficult to stage a directory attack
Allows roaming users, i.e., users moving from one location to another (if your vendor supports this feature)
Can encrypt data, e-mail, and sign with only one certificate (actually, it is better to have separate certificates for signing and encryption)
Disadvantages
Cost—implementing a PKI can be expensive
Extensive user training is required
Requires a support structure
Roaming users, i.e., users moving from one location to another (not many vendors support this feature—but this is getting better)
Vendors are only now developing tools that can handle large-scale implementations
See also windows file encryption.
Biometric techniques Authentication
A biometric authentication system will use devices such as fingerprints or eye scanners to allow access. This type of device can ensure greater security for high-risk environments that need to limit and control access to sensitive systems. Using this type of system, you could limit “tailgating,” or, allowing users to use another person’s user name and password.
Advantages
The person is the authentication—very difficult to impersonate
Directory attacks are nearly impossible
Offers some mechanisms for a single sign-on solution
Disadvantages
Not many vendors support this technology, but the laptops today are now equipped with this type of fingerprint authentication to gain access to the laptops.
Expensive to implement unless manufactured in mass production such as today’s laptops
Smart cards Authentication
A smart card is typically a credit card-sized plastic card that has an embedded integrated circuit (IC) chip. This chip is what makes the card “smart.” The smart card can store all types of information, which can be transferred via an electronic interface that connects to a computer. This smart card can store information about who you are and cryptographic keys and perform cryptographic algorithms, like encryption. Access to the smart card is controlled via a PIN or a password. This type of authentication mostly deployed for door access in high security area such as military, banks, gold industry, etc.
Advantages
Easy to bind the card to the person
The card can hold keys and other information about the user
If keys are included, then it is easy to encrypt data and e-mail
Easy to train users on the technology
Great solution for roaming users; the certificate can easily be transported
Disadvantages
Very expensive, although the cost of this technology is dropping
Still easy to give the card and PIN to another user i.e. tailgating
Requires a support system and may require more hardware on each PC
Anonymous Authentication
An anonymous user name is a method for giving users access to files so they don’t need to identify themselves to the server. The user enters “anonymous” as a user ID. Anonymous identification is a common way to get access to a server to view or download files that are publicly available.
Through the use of a control anonymous setting, anonymous is both an authentication method and an authorization method. By accessing a system via a control anonymous setting, you can be sure that you know where users are and what data they are accessing. Never assume that anonymous should be a “default” access. This is dangerous. Make sure you limit anonymous access to the data sources that really need to gain access.
Advantages
Easy to implement
Little to no user training required
Ability to conduct secure transactions without registering a user with a user name and password. How? Have you ever purchased a book online and used a credit card? Not all companies will require you to create an account. All you need to do is enter your credit card information (and hopefully you used SSL!)
Disadvantages
Clearly, there is no binding to a specific user. Consequently, you don’t know who accessed the data
Cannot block access on a “per-user” basis
Potentially open to “spam” attacks, where garbage is dumped onto your site
No logging or audit trail **********
What is Ecommerce?
In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People use the term "ecommerce" to describe encrypted payments on the Internet.
Sometimes these transactions include the real-time transfer of funds from buyer to seller and sometimes this is handled manually through an eft-pos terminal once a secure order is received by the merchant.
Internet sales are increasing rapidly as consumers take advantage of lower prices offer by wholesalers retailing their products. This trend is set to strengthen as web sites address consumer security and privacy concerns.
Let's Talk - What is ecommerce?
Benefits of E-Commerce
E-commerce can provide the following benefits over non-electronic commerce:
Reduced costs by reducing labour, reduced paper work, reduced errors in keying in data, reduce post costs
Reduced time. Shorter lead times for payment and return on investment in advertising, faster delivery of product
Flexibility with efficiency. The ability to handle complex situations, product ranges and customer profiles without the situation becoming unmanageable.
Improve relationships with trading partners. Improved communication between trading partners leads to enhanced long-term relationships.
Lock in Customers. The closer you are to your customer and the more you work with them to change from normal business practices to best practice e-commerce the harder it is for a competitor to upset your customer relationship.
New Markets. The Internet has the potential to expand your business into wider geographical locations.
Types of Ecommerce
Ecommerce can be classified based on the type of participants in the transaction:
Business to Business (B2B)
B2B ecommerce transactions are those where both the transacting parties are businesses, e.g., manufacturers, traders, retailers and the like.
Business to Consumer (B2C)
When businesses sell electronically to end-consumers, it is called B2C ecommerce.
Consumer to Consumer (C2C)
Some of the earliest transactions in the global economic system involved barter -- a type of C2C transaction. But C2C transactions were virtually non-existent in recent times until the advent of ecommerce. Auction sites are a good example of C2C ecommerce.
Online Shopping
Buying and selling goods on the Internet is one of the most popular examples of ecommerce. Sellers create storefronts that are the online equivalents of retail outlets. Buyers browse and purchase products with mouse clicks. Though Amazon.com is not the pioneer of online shopping, it is arguably the most famous online shopping destination.
Electronic Payments
When you are buying goods online, there needs to be a mechanism to pay online too. That is where payment processors and payment gateways come into the picture.
Electronic payments reduce the inefficiency associated with writing and mailing checks. It also does away with many of the safety issues that arise due to payment made in currency notes.
Online Auctions
When you think online auction, you think eBay. Physical auctions predate online auctions, but the Internet made auctions accessible to a large number of buyers and sellers. Online auctions are an efficient mechanism for price discovery. Many buyers find the auction shopping mechanism much interesting than regular storefront shopping.
Internet Banking
Today it is possible for you to perform the entire gamut of banking operations without visiting a physical bank branch. Interfacing of websites with bank accounts, and by extension credit cards, was the biggest driver of ecommerce.
Online Ticketing
Air tickets, movie tickets, train tickets, play tickets, tickets to sporting events, and just about any kind of tickets can be booked online. Online ticketing does away with the need to queue up at ticket counters.
Benefits of Ecommerce
The primary benefits of ecommerce revolve around the fact that it eliminates limitations of time and geographical distance. In the process, ecommerce usually streamlines operations and lowers costs.
Specialized Forms of Ecommerce
On some platforms, ecommerce has shown the promise of explosive growth. Two such examples are:
Mcommerce
Mcommerce is short for "mobile commerce." The rapid penetration of mobile devices with Internet access has opened new avenues of ecommerce for retailers.
Fcommerce
Fcommerce is short for "Facebook commerce." The immense popularity of Facebook provides a captive audience to transact business.**********
What is CSS?
CSS stands for Cascading Style Sheets
Styles define how to display HTML elements
Styles were added to HTML 4.0 to solve a problem
External Style Sheets can save a lot of work
External Style Sheets are stored in CSS files
CSS is a style language that defines layout of HTML documents. For example, CSS covers fonts, colours, margins, lines, height, width, background images, advanced positions and many other things. Just wait and see!
HTML can be (mis-)used to add layout to websites. But CSS offers more options and is more accurate and sophisticated. CSS is supported by all browsers today.
HTML is used to structure content. CSS is used for formatting structured content.
CSS was a revolution in the world of web design. The concrete benefits of CSS include:
control layout of many documents from one single style sheet;
more precise control of layout;
apply different layout to different media-types (screen, print, etc.);
numerous advanced and sophisticated techniques.
The basic CSS syntax
Let's say we want a nice red color as the background of a webpage:
Using HTML we could have done it like this:
<body bgcolor="#FF0000">
With CSS the same result can be achieved like this:
body {background-color: #FF0000;}
As you will note, the codes are more or less identical for HTML and CSS. The above example also shows you the fundamental CSS model:
Figure explaining selector, property and value
But where do you put the CSS code? This is exactly what we will go over now.
Applying CSS to an HTML document
There are three ways you can apply CSS to an HTML document. These methods are all outlined below. We recommend that you focus on the third method i.e. external.
Method 1: In-line (the attribute style)
One way to apply CSS to HTML is by using the HTML attribute style. Building on the above example with the red background color, it can be applied like this:
<html>
<head>
<title>Example</title>
</head>
<body style="background-color: #FF0000;">
<p>This is a red page</p>
</body>
</html>
Method 2: Internal (the tag style)
Another way is to include the CSS codes using the HTML tag <style>. For example like this:
<html>
<head>
<title>Example</title>
<style type="text/css">
body {background-color: #FF0000;}
</style>
</head>
<body>
<p>This is a red page</p>
</body>
</html>
Method 3: External (link to a style sheet)
The recommended method is to link to a so-called external style sheet. Throughout this tutorial we will use this method in all our examples.
An external style sheet is simply a text file with the extension .css. Like any other file, you can place the style sheet on your web server or hard disk.
For example, let's say that your style sheet is named style.css and is located in a folder named style. The situation can be illustrated like this:
The folder "style" containing the file "style.css"
The trick is to create a link from the HTML document (default.htm) to the style sheet (style.css). Such link can be created with one line of HTML code:
<link rel="stylesheet" type="text/css" href="style/style.css" />
Notice how the path to our style sheet is indicated using the attribute href.
The line of code must be inserted in the header section of the HTML code i.e. between the <head> and </head> tags. Like this:
<html>
<head>
<title>My document</title>
<link rel="stylesheet" type="text/css" href="style/style.css" />
</head>
<body>
This link tells the browser that it should use the layout from the CSS file when displaying the HTML file.
The really smart thing is that several HTML documents can be linked to the same style sheet. In other words, one CSS file can be used to control the layout of many HTML documents.
Figure showing how many HTML documents can link to the same style sheet
This technique can save you a lot of work. If you, for example, would like to change the background color of a website with 100 pages, a style sheet can save you from having to manually change all 100 HTML documents. Using CSS, the change can be made in a few seconds just by changing one code in the central style sheet.
Online processing, Real Time Processing, Batch processing
Online processing means users directly enter information online (usually, online, in this case, means online to a central processor, rather than its modern connotation of the Internet, but it could mean both!), it is validated and updated directly onto the master file. No new file is created in this case. Therefore, there is near immediate input process, and output. Imagine a cash dispenser transaction or booking a holiday at a travel agents or over the Internet. Compared with batch processing the number of transactions will be few.
In a real time processing, there is a continual input, process and output of data. Data has to be processed in a small stipulated time period (real time), otherwise it will create problems for the system.
For example: assembly line robots and radar system.
In a batch processing group of transactions collected over a period of time is collected, entered, processed and then the batch results are produced. Batch processing requires separate programs for input, process and output. It is an efficient way of processing high volume of data.
For example: Payroll system, Examination system and billing system.
{***Batch processing refers to applications that are run in batches, often overnight due to limited system resources. For example, bank transaction processing is database intensive, so actually applying the transactions to all the accounts is done when the system is less busy. In batch processing all the data is stored and presented to the program(s) to handle them at once, in one or more large bundles or "batches."
Online processing is what you're doing right now. The application is waiting for you to tell it what to do, and it does it when you tell it to. In the bank example, accepting data for transactions and calculating the available balance would be done online. Online processing doesn't require being "on the line" of a network or modem connection, though nowadays it's quite common.
Real-time processing refers to applications that need to respond within a certain amount of time — usually on the order of seconds — to get the job done. Examples include rocket telemetry processing, many military applications, flight systems, and industrial automation and control systems. For example, if something goes wrong in a factory, a real-time system needs to be able to detect the situation and perform some action, such as notifying an operator or shutting down the problem area, within a few seconds.}*****
What is digital library?
A digital library is a library in which collections are stored in digital formats (as opposed to print, microform, or other media) and accessible by computers.[1] The digital content may be stored locally, or accessed remotely via computer networks. A digital library is a type of information retrieval system.
A digital library is a collection of documents in organized electronic form, available on the Internet or on CD-ROM (compact-disk read-only memory) disks. Depending on the specific library, a user may be able to access magazine articles, books, papers, images, sound files, and videos.
What is Data and Information?
Data
The word ‘Data’ is derived from the plural form of latin word ‘Datum’, which means ‘to give’.
Data is a collection of raw facts.
May or may not be meaningful.
Input to any system may be treated as Data.
Understanding is difficult.
Data must be processed to understand.
Data may not be in the order.
Example: Statistics, numbers, characters, images.
Information
The word ‘Information’ is derived from latin word ‘Informare’, which means ‘to instruct’.
Information is the outcome derived after processing the data.
Information is always meaningful.
Output after processing the system is Information.
Understanding is easy.
Information is already in understandable form, it may be processed further to make it more understandable.
Information should be in the order.
Example Reports, Knowledge.
What is Dynamic DNS?
Dynamic DNS or DDNS is a term used for the updating in real time of Internet Domain Name System (DNS) name servers to keep up to date the active DNS configuration of their configured hostnames, addresses and other information.
Dynamic Domain Name System, a method of keeping a domain name linked to a changing IP address as not all computers use static IP addresses. Typically, when a user connects to the Internet, the user's ISP assigns an unused IP address from a pool of IP addresses, and this address is used only for the duration of that specific connection. This method of dynamically assigning addresses extends the usable pool of available IP addresses. A dynamic DNS service provider uses a special program that runs on the user's computer, contacting the DNS service each time the IP address provided by the ISP changes and subsequently updating the DNS database to reflect the change in IP address. In this way, even though a domain name's IP address will change often, other users do not have to know the changed IP address in order to connect with the other computer.