സ്ത്രീകള്‍ എങ്ങിനെ വസ്ത്രം ധരിക്കണം എന്ന് പുരുഷന്‍ നിഷ്ക്കര്‍ഷിക്കുന്നത് ശരിയോ? അല്ലെങ്കില്‍ തിരിച്ചും?

Sunday, March 04, 2012

Computers Can not Replace Teachers,

MUMBAI: How does one bridge the divide between the chalk and blackboard, and the computer and internet? While teachers, principals, counsellors and even parents admit that it would be a futile exercise to ignore technology in the classroom, there is a very real fear that it will be misused by easily distracted students who have yet to understand the pitfalls of the internet.

A 2000 report from a US organization comprising educationists and health professionals-Alliance for Childhood-questioned the money schools were spending on technology. Computers, said the report, have become the "fool's gold" of the education system. According to the report, instead of raising the standard of learning, computers were actually negating the healthy development of young students.

But the technology and social media landscape has changed dramatically over the last decade; and classrooms are filled with students who were born with a smartphone in their hands. By the time they enter kindergarten, words like 'apps', 'mp3' etc are part of their lexicon.

To ignore this important part of their lives, say principals, would be equally detrimental to the learning process. Educationists suggest a middle path, one where students are taught to use the gadgets that they have responsibly.

"The learning process begins at home. Parents should limit the amount of time their child engages with a gadget, be it the computer or a gaming console. Such activities are exclusive by nature, and by the time the child enters the school he or she is socially awkward because of their limited interaction with their peers," said psychiatrist Dr Hozefa Bhinderwala, adding that children often don't know how to interact with their elders, let alone their peers.

Many city doctors and counsellors are of the opinion that excessive use of technology affects a child's lateral and creative thinking.

"After hours in front of a screen, children tend to become less spontaneous and don't push the boundaries when it comes to imagination. They are in danger of becoming robotic thinkers," said Shubhangi Parkar, head of psychiatry ward at KEM Hospital, Parel.

So how necessary is the iPad, laptop, or the latest smart-phone for a child's learning process?

It's not the gadget, say teachers, as much as it is tapping the wealth of easily accessible information on the internet.

"Children are already tech savvy. We use smart boards, simple projectors, and computers to engage children both mentally and visually. Besides, most children already have access to the internet at home, and many have questions that are not covered in the textbook," said Shirin Castelina, a teacher at Holy Family School in Andheri.

Even the latest gadget and the best internet website, however, cannot replace a good teacher.

"Children today lead complicated lives ruled by technology. Instead of adding to the information overload, it is the teacher's job to simplify lesson plans. Children today need to be in touch with the real world, and the school teacher is the one person who can draw the line and decide how much is too much," said psychologist Seema Hingorrany.

It's all about moderation. If the educator fails to engage with his or her students, no amount of technology will help, say experts. The teacher's job, then, is to break down information into bite-sized pieces, and ensure that their children have understood the topic covered. This can even be achieved with the aid of a simple blackboard and chalk. - Times of India

"The Windows Installer Service Could Not Be Accessed" error message when you install a program in Windows XP

To resolve this issue, follow these steps:
  1. Log on to your computer as an administrator.
  2. Click Start, and then clickRun.
  3. In the Open box, type cmd, and then click OK.
  4. At the command prompt, typemsiexec.exe /unregister, and then press ENTER.
  5. Type msiexec /regserver, and then press ENTER.
  6. Verify that the SYSTEM account has full control access permissions to the
    HKEY_CLASSES_ROOT
    hive in the Windows registry. In some cases, you may also have to add Administrator accounts. To do so:Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs.
  7.  
    1. Click Start, click Run, type regedit in the Open box, and then click OK.
    2. Click the following registry hive:

      HKEY_CLASSES_ROOT
    3. On the Edit menu, click Permissions.
    4. If SYSTEM is not listed in the Group or user names list, click Add, make sure that the local computer name appears in the From this location box, type system in the Enter the object names to select box, click Check Names, and then click OK.
    5. Click SYSTEM in the Group or user names list, and then select the Full Control check box under Allow in the Permissions for SYSTEM box.
    6. Click Apply, click OK, and then quit Registry Editor.
  8. Restart the computer. If the problem is not resolved, repair Windows XP
Courtesy : sysadmindop.blogspot.in & sapost.blogspot.com

English Phonetics



phonetic alphabet was developed by the International Civil Aviation Organization 
The pronunciation of the codes for the letters of the alphabet and for the digits varies according to the language habits of the speaker
The first internationally recognized spelling alphabet was adopted by the ITU during 1927
A spelling alphabet is used to spell parts of a message containing letters and numbers to avoid confusion
The NATO Phonetic Alphabet was developed in the 1950s to be intelligible (and pronounceable) to all NATO allies in the heat of battle.
Letter
phonetic letter
Pronunciation
A
Alpha or Alfa
AL FAH
B
Bravo
BRAH VOE
C
Charlie
CHAR LEE
D
Delta
DELL TAH

E
Echo
ECK OH
F
Foxtrot
FOKS TROT
G
Golf
GOLF
H
Hotel
HO TELL
I
India
IN DEE AH
J
Juliet or Juliett
JEW LEE ETT
K
Kilo
KEY LOH
L
Lima
LEE MAH
M
Mike
MIKE
N
November
NO VEM BER
O
Oscar
OSS CAH
P
Papa
PAH PAH
Q
Quebec
KEH BECK
R
Romeo
ROW ME OH
S
Sierra
SEE AIR RAH
T
Tango
TANG GO
U
Uniform
YOU NEE FORM
V
Victor
VIK TAH
W
Whiskey
WISS KEY
X
X-ray
ECKS RAY
Y
Yankee
YANG KEY
Z
Zulu
ZOO LOO

Some Useful Command Prompt Tricks



openfiles /query

If you are running a system and you want to know who has files open on your computer, this command will provide you a list of those users and the files that they have open.

    Note: If you get an error saying The system global flag ‘maintain objects list’ needs to be enabled to see local opened files, you can fix this issue by typing openfiles /local on. You will have to reboot the system but it will resolve the issue.
Recover Information From A Corrupt File

recover filename.ext

If you have a disk with damaged sectors, you can attempt to recover as much information as possible from the damaged file. Data that is not damaged can be retrieved but data in damaged sectors will be lost.
rexec remotePC defrag C: /F

This command used the rexec command to force a defragment of the C: drive on the computer named remotePC. You can use whatever you want to for the command (I just used defrag C: /F as an example). This is very useful for remote maintenance.
Retrieve Detailed System Information
tasklist
taskkill /im programname.exe /f

It’s always good to know what is running on your system. This is the command line version of the processes tab in Taks Manager.
Kill A Program


dir *.ext /s /b > files.txt

This command line will create a file called files.txt. When you open this file, there will be a complete list of all the files in that directory and all subdirectories with the .ext extension. You can then open up this text file in any text editor and work this the information.By changing the ext part, you can select different files. For example, if you wanted to list all of the PDF documents, you would type:

dir *.pdf /s /b > files.txt
ipconfig /all

This will retrieve a pile of information about your network connection and IP information. From this command, you can get:

    Host Name
    Primary DNS Suffix
    Node Type
    IP Routing Enabled
    WINS Proxy Enabled
    DNS Suffix Search List
    Connection-specific DNS Suffix
    Network Adapter Description
    Physical (MAC) Address
    DHCP Enabled
    IP Address
    Subnet Mask
    Default Gateway
    DNS Servers 
openfiles /query

If you are running a system and you want to know who has files open on your computer, this command will provide you a list of those users and the files that they have open.

    Note: If you get an error saying The system global flag ‘maintain objects list’ needs to be enabled to see local opened files, you can fix this issue by typing openfiles /local on. You will have to reboot the system but it will resolve the issue.
Monitor Port Activity

netstat -a 30
This will show you all of the TCP/IP ports that are being used on your system and what they are connecting to (or being connected from). It will continue to monitor these ports and refresh the information every 30 seconds. You can change the refresh rate by changing the number at the end of the command.
Reboot a Remote Computer

shutdown -r -f -m \\remotePC –c

 "System will be rebooted in 20 seconds

Automatically Defragment C: Daily

schtasks /create /tn "Defrag C" /tr "defrag c: /f" /sc daily /st 23:00:00 /ru "System"


This will set your computer to automatically perform a complete defrag of the C: drive each day at 11:00:00 PM (23:00:00). It does this by creating a scheduled task called Defrag C. It will run this command under the computer’s system account.

Courtesy :    http://nfpemavelikaradivision.blogspot.com

Useful Commands

Just go start,then click on Run then type any command below 

0) cmd - comand prompt

1) compmgmt.msc - for computer managent

2) devmgmt.msc - device manager

3) regedit - registry editor


4) msconfig - system configuratn utility . . .

5) compmgmt.msc - Computer management

6) devmgmt.msc - Device manager

7) diskmgmt.msc - Disk management

8) dfrg.msc - Disk defrag

9) eventvwr.msc - Event viewer

10) fsmgmt.msc - Shared folders

11) gpedit.msc - Group policies

12) lusrmgr.msc - Local users and groups

13) perfmon.msc - Performance monitor

14) rsop.msc - Resultant set of policies

15) secpol.msc - Local security settings

16) services.msc - Various Services

17) msinfo32 - System Information

18) sysedit - System Edit

19) win.ini - windows loading information(also system.ini)

20) winver _ Shows current version of windows

21) calc - calculator



Courtesy : abkantharaja.blogspot.in

Saturday, March 03, 2012

How to Lock any Drive ( Hard Disk & CD Drive )


STEPS TO LOCK DRIVE IN WINDOWS:

1. Go to Start menu and then to RUN  and type "gpedit.msc" (without quotes) and Press Enter.
2. Now you will see a new dialog window , where you will see two things "Computer Configuration" and "User Configuration". Now click on "User Configuration".
3. There you will see three items. Now you have to Click on "Administrative Templates". Then go to "Windows Components".
4. There you will see a lot of Windows Components. Now Click on " Windows Explorer"
5. Now you will find something like this "Prevent Access To Drives From My Computers" , double click on it . It will open its properties. Now to lock a drive or drives click on "Enabled"radio button. Now from the drop down menu select the drive that you want to lock or block.
6. After that click on apply and restart your system. Now anyone will not been able to access the particular drive.
7. To unlock the drive again follow the similar procedure and just click on "Not configured" and apply the settings and restart your system.

FULL Procedure is in this snapshot...

Courtesy : abkantharaja.blogspot.in