Wednesday
2024-12-25
12:32 PM
CATEGORIES
E-BOOKS [31]
VIDEOS [16]
TECH NEWS [86]
CLICK ON DIS(MUST WATCH)
TEST [1]
PLEASE WATCH THIS
SCIENTIST BIOGRAPHY [4]
PLEASE READ
BUISINESS DETAILS [13]
movies [0]
watch movies ol nd u can download
Curriculum Vitae Overview [7]
Interview Questions [3]
LATEST TECHNICAL IMPORTANT NEWS [27]
Block title
CHAT
BlomMe
Statistics

Total online: 12
Guests: 12
Users: 0
FOLLOWERS
Login form
Calendar
«  December 2024  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031
$TOp It
RATE MA BLOG
Rate my BLOG
Total of answers: 71
Search
LOGIN
Block title
dictionary
POST COMMENTS
SHARE
VISITORS
A HEARTY WELCOME TO MA VISITORS 4R ENTERIN MA BLOG THNX 4R VISITIN MA BLOG
STUDENTS QUEST
Main » TECH NEWS

I was asked by few readers to write about GRE new pattern coming in 2011. As I have seen the pattern change couple times and my personal experience taking GRE, I will share my perspective on GRE 2011 with post all the information in future articles.

The team of new GRE pattern 2011 say "it is the largest revision in the history of GRE, which is about 60 years, ”. They say it is the "changes in the demographics of the test takers, technology changes, etc”, have lead to this revision and they are really excited about the changes to the GRE format. Some of them say it is "thoughtful, better by design and revolution”.  The below reasons are my thoughts after reviewing all the material and watching videos on ETS site by the New GRE pattern team.

10 Things to know about the New Revised GRE General Test 2011

1.Better Design:

The new design is Multi-State Design, where you can go back and forward in a particular section and edit the answers. You can mark and go back to a question and answer. It is different from the way the current GRE works. The goal is to create a more natural test experience.

2. Improved Quality of Data:

The quality of the data used for the GRE Test will be better in the new pattern. New GRE pattern is designed to measure those skills that are critical to graduate and Business programs.

3.New GRE 2011 Mark and Go back and Calculator Most revisions to Verbal Section :

The verbal section is the most changed section of the whole GRE. There will be more complex reasoning. No antonyms and analogies. No vocabulary out of context. New types of questions.

4. Quantitative reasoning :

They are including a calculator to avoid distractions in test caused my minor mistakes. They are interested in reasoning ability and not the arithmetic calculations. More emphasis on Data interpretation and real life scenarios.

5. Analytical Writing :

There are not many major changes here but there will be expectations for more focused responses and less generalization.

6. New Test Score Scaling :

Due to changes to verbal and quant sections the new scale for them will be 130 to 170 score scale with increments of 1 point instead of before 200 to 800 with 10 point increments. The analytical writing section will have same scale of 0 to 6 with 0.5 increments.  The new test is designed to give fair chance to demonstrate your reasoning skills irrespective of your background.

7. First New GRE 2011 Test Scores and Test :

The first day of test is Aug 1, 2011. The scores for the tests taken between august and October will be available in November 2011. Applicants who need to GRE Scores before November 2011, should take the current test before Aug 2011. The score reporting will go back to normal 10-15 day cycle after late November.

8. Paper based Testing :

If you are taking paper based test, then you have to take before Nov 2011. The test dates that are available are  : Oct 23, Nov 20 in 2010 and Feb 12, 2011. All the new changes to GRE will be available in the paper based test too after the launch.

... Read more »

Category: TECH NEWS | Views: 1441 | Added by: kc | Date: 2011-02-04 | Comments (0)

Normally you end tasks the non-responsive programs manually using windows task manager with 

(CTRL + ALT +DELETE) keys. 

Sometimes these non-responsive programs creates problem to run windows and others programs properly.  

You can configure your computer to manage these non-responsive programs automatically. Windows has a feature that will close all non responding program automatically. If you have little knowledge about editing windows registry then you can configure your computer for this purpose.
Follow the given steps to configure windows registry for auto end task:
  • First click on Start button then type Regedit in Run option. Here locate the location to:
  • Go to Hkey_Current_User\Control Panel\Desktop
  • Here in right side panel, double click on AutoEndTasks and here its default value is 0. Now change it to 1. Now windows will close your all non-responsive programs automatically.
  • Now close the registry editor and restart your computer after any changes to go into effect.
Category: TECH NEWS | Views: 848 | Added by: kc | Date: 2011-02-04 | Comments (0)

Motherboard is the main part of your computer that contains all hardware components. Your computer motherboard could fry, if you do not keep it clean on periodically basis. Dust is the main cause to heat up your system and heat link to hardware failure. 

You can save your computer maintenance cost if you clean your computer on the regular basis. This will improve the cooling and performance of the motherboard components.
  • To clean your motherboard first unplugs your system power from the electrical outlet.
  • Using the screwdriver remove the side covers of your computer case and put them to one side.
  • Check all data and power cables connections. Inspect all motherboard PCI and AGP slots.
  • Remove all add-on card of your motherboard for example RAM, modem, VGA, sound card and LAN card.
  • Now blow the air around all the motherboard sides and keeping away your blower nozzle 4 to 5 inches away from main board components. You can use vacuum cleaner also for this purpose but compressed air is the better solution to clean a system.
  • At the end assemble back all cards, cables and side covers of your system.
  • I recommend you doing this after every three months if you want to save your system l
Category: TECH NEWS | Views: 832 | Added by: kc | Date: 2011-02-04 | Comments (0)

A rather controversial and yet very intriguing idea was to develop adisophable laptop, especially when the society has already accepted disposable mobile phones and cameras.




The designer of this concept is Je Sung Park. The Recyclable Paper Laptop looks as though it needs some improvement, yet it is a great step towards future development disposable computers.

The laptop makes use of recycled paper or pulp material compressed in layers. The paper computer allows you to replace any part of it anytime. It is yet to be seen if the disposable paper computer will catch the attention of buyers, until then let's just enjoy a fresh idea.




Category: TECH NEWS | Views: 964 | Added by: kc | Date: 2011-01-30 | Comments (0)

The best way to keep your computer virus-free is to install an effective antivirus software like the Antivirus and Security All-in-One-Suite that will not only allow you to check for any malware but will also stop attacks on your machine.



Computer viruses have a relatively short history, but the damages caused by some of them pushed cyber-experts to opening a new chapter on computer viruses. Some viruses led to serious damages and affected a large number of companies, universities and even governments.




Here are some of the most dangerous computer viruses in history:

Jerusalem - 1987
This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and companies worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got "acquainted" with it - the
Jerusalem University
.

Along with a number of other computer viruses, including "Cascade""Stoned" and "Vienna" the Jerusalem virus managed to infect thousands of computers and still remain unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little knowledge of the existence of computer viruses.

Morris (a.k.a. Internet Worm) - November 1988
This computer virus infected over 6,000 computer systems in the United States, including the famousNASA research Institute, which for some time remained completely paralyzed. Due to erratic code, the worm managed to send millions of copies of itself to different network computers, being able to entirely paralyze all network resources. The damages caused by the Morris computer virus were estimated at $96 millions.
To be able to spread, the computer virus used errors in such operating systems as Unix for VAX and Sun Microsystems. The virus could also pick user passwords.

Solar Sunrise - 1998
A decade later the situation didn't change, in fact it even got worse. Using a computer virus, hackers, in 1998, penetrated and took control of over 500 computer systems that belonged to the army, government and private sector of the United States. The whole situation was dubbed Solar Sunrise after the popular vulnerabilities in computers that run on the operating system called Sun Solaris. Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.

Melissa - 1999
For the first time computers got acknowledged with Melissa computer virus on March 26, 1999, when the virus shut down the Internet mail system, which got blocked with e-mails infected by the worm. It is worth mentioning that at first Melissa was not meant to cause any harm, but after overloading the servers, it led to serious problems. For the first time it spread in the Usenet discussion group alt.sex. Melissa was hidden within a file called "List.DiC", which featured passwords that served as keys to unlocking 80 pornographic websites. The original form of the virus was sent through e-mail to different users.

Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest was made by a team of representatives from FBI, New Jersey State Police and Monmouth Internet.

Melissa had the ability to multiply on Microsoft Word 97 and Word 2000, as well as on Microsoft Excel 97, 2000 and 2003. In addition, the virus had the ability to mass-mail itself from Microsoft Outlook 97 and Outlook 98.

I Love You - May 2000
Using a similar method as the Melissa, the computer virus dubbed "I Love You" managed to infect millions of computers around the world overnight. Just like Melissa this computer virus sent passwords and usernames, which were stored on the attacked computers, back to the developer of the virus. After authorities traced the virus they found that a young Filipino student was behind the attack. The young man was released due to the fact that the Philippines did not have any law that would prevent hacking and spreading malware. This situation served as one of the premises for creating the European Union's global Cybercrime Treaty.

The Code Red worm - July 2001
This 21st century computer virus managed to penetrate tens of thousands of systems that ran Microsoft Windows NT and Windows 2000 server software. The damages caused by the Code Red computer virus were estimated at $2 billion. Core Red was developed to use the power of all computers it infected against the official website of the White House at a predetermined date. In collaboration with different virus hunters and tech firms, the White House managed to decipher the code of the Code Red virus and stop traffic as the malware started its attacks.

Nimda - 2001
Shortly after the September 11 tragedy this computer virus infected hundreds of thousands of computers worldwide. Nimda was considered to be one of the most complicated viruses, having 5 different methods of infecting computers systems and being able to duplicate itself.

Downadup - 2009
The latest and most dangerous virus is the "downadup" worm, which was also called "Conficker". The computer security company F-Secure stated that the computer virus has infected 3.5 million computers worldwide. This malicious program was able to spread using a patched Windows flaw. Downadup was so "successful" in spreading across th ... Read more »
Category: TECH NEWS | Views: 1352 | Added by: kc | Date: 2011-01-27 | Comments (0)

Category: TECH NEWS | Views: 934 | Added by: kc | Date: 2011-01-26 | Comments (0)

Category: TECH NEWS | Views: 891 | Added by: kc | Date: 2011-01-26 | Comments (0)





DOWNLOAD THIS BOOK FROM SERVER BUT GO TO FILES TETXBOOK



Wrox | 2008-04-28 | ISBN: 0470259310 | 768 pages | PDF | 8,2 MB


This beginning guide reviews HTML and also introduces you to using XHTML for the structure of a web page and cascading style sheets (CSS) for controlling how a document should appear on a web page. 


Youll learn how to take advantage of the latest features of browsers while making sure that your pages still work in older, but popular, browsers. 


By incorporating usability and accessibility, youll be able to write professional-looking and well-coded web pages that use the  ... Read more »
Category: TECH NEWS | Views: 964 | Added by: kc | Date: 2011-01-18 | Comments (0)


To share a file or folder with your fellow computer users, move the file into your Shared Documents folder, which lives in your My Computer window. (You must move or copy a file into the Shared Documents folder; shortcuts don't always work.)

After you place your file or folder into your Shared Documents folder, it appears in the Shared Documents folder of everybody else using your computer.

Administrators can share folders without having to move them into the Shared Documents folder. The trick is to follow these steps:

1. Right-click on a folder you'd like to share and choose Sharing and Security from the pop-up menu.

Open My Computer and right-click on the folder you'd like to share. When the menu appears, select Sharing and Security. A window appears, showing the Properties for that folder. It opens to the Sharing tab.

Right-click on a folder and choose Sharing and Security to share the folder on the network.

2. Click the box marked Share This Folder on the Network.

A check mark in that box lets everybody peek at, grab, steal, change, or delete any of the files in that folder. To let visitors look inside the files but not change them, remove the check mark from the box marked Allow Network Users to Change My Files.

3. Click OK.

Now that particular folder and all its contents are available for everybody on the network to share.

Sharing a lot of folders isn't a good idea because it gives network visitors too much control over your computer. Even if you trust people, they might accidentally mess something up. To be safe, o ... Read more »
Category: TECH NEWS | Views: 1103 | Added by: kc | Date: 2011-01-17 | Comments (0)

« 1 2 ... 5 6 7 8 9 »
/news/0-0-1-0-16-4