Opening Ceremony

Bhim Higher Secondary School Suntopar, Dolakha

Opening Ceremony

Bhim Higher Secondary School Suntopar, Dolakha

JCT Students (First Batch(2069-2070))

Bhim Higher Secondary School Suntopar, Dolakha

Opening Ceremony

Bhim Higher Secondary School Suntopar, Dolakha

Opening Ceremony

Bhim Higher Secondary School Suntopar, Dolakha

Monday, December 30, 2013

Bounce Email (bounce mail)

Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason. Unless otherwise arranged, bounce e-mail usually appears as a new note in your inbox. There are two kinds of bounce e-mail: hard bounce and soft bounce. Hard bounce e-mail is permanently bounced back to the sender because the address is invalid. Soft bounce e-mail is recognized by the recipient's mail server but is returned to the sender because the recipient's mailbox is full, the mail server is temporarily unavailable, or the recipient no longer has an e-mail account at that address.
Bounce e-mail can be handled by a program when sending e-mail to a distribution list and most e-mail distribution list vendors include this capability. Such a bounce handler can retry later, unsubscribe the addressee from the list, or take some other action.
Some products and individuals have developed bounce e-mail handlers that recognize spam messages and return a bounce message so that the recipient will be taken off the list.

Some products and users use the term bounce to mean "forward a received note to someone else."

Thursday, December 26, 2013

C Programming Variables and Constants

Variables


Variables are memory location in computer's memory to store data. To indicate the memory location, each variable should be given a unique name called identifier. Variable names are just the symbolic representation of a memory location. Examples of variable name: sumcar_nocount etc.

int num;
Here, num is a variable of integer type.


Rules for writing variable name in C


  1. Variable name can be composed of letters (both uppercase and lowercase letters), digits and underscore '_' only.
  2. The first letter of a variable should be either a letter or an underscore. But, it is discouraged to start variable name with an underscore though it is legal. It is because, variable name that starts with underscore can conflict with system names and compiler may complain.
  3. There is no rule for the length of length of a variable. However, the first 31 characters of  a variable are discriminated by the compiler. So, the first 31 letters of two variables in a program should be different.
In C programming, you have to declare variable before using it in the program.


Types of Variables

The Programming language C has two main variable types
  • Local Variables
  • Global Variables

Local Variables

  • Local variables scope is confined within the block or function where it is defined. Local variables must always be defined at the top of a block.
  • When a local variable is defined - it is not initalised by the system, you must initalise it yourself.
  • When execution of the block starts the variable is available, and when the block ends the variable 'dies'.
Check following example's output
   main()
   {
      int i=4;
      int j=10;
   
      i++;
   
      if (j > 0)
      { 
         /* i defined in 'main' can be seen */
         printf("i is %d\n",i); 
      }
   
      if (j > 0)
      {
         /* 'i' is defined and so local to this block */
         int i=100; 
         printf("i is %d\n",i);      
      }/* 'i' (value 100) dies here */
   
      printf("i is %d\n",i); /* 'i' (value 5) is now visable.*/
   }
   
   This will generate following output
   i is 5
   i is 100
   i is 5
Here ++ is called incremental operator and it increase the value of any integer variable by 1. Thus i++ is equivalent to i = i + 1;
You will see -- operator also which is called decremental operator and it idecrease the value of any integer variable by 1. Thus i-- is equivalent to i = i - 1;

Global Variables

Global variable is defined at the top of the program file and it can be visible and modified by any function that may reference it.
Global variables are initalised automatically by the system when you define them!
Data TypeInitialser
int0
char'\0'
float0
pointerNULL
If same variable name is being used for global and local variable then local variable takes preference in its scope. But it is not a good practice to use global variables and local variables with the same name.
   int i=4;          /* Global definition   */
   
   main()
   {
       i++;          /* Global variable     */
       func();
       printf( "Value of i = %d -- main function\n", i );
   }

   func()
   {
       int i=10;     /* Local definition */
       i++;          /* Local variable    */
       printf( "Value of i = %d -- func() function\n", i );
   }

   This will produce following result
   Value of i = 11 -- func() function
   Value of i = 5 -- main function

i in main function is global and will be incremented to 5. i in func is internal and will be incremented to 11. When control returns to main the internal variable will die and and any reference to i will be to the global.

Constants


Constants are the terms that can't be changed during the execution of a program. For example: 1, 2.5, "Programming is easy." etc. In C, constants can be classified as:

Integer constants


Integer constants are the numeric constants(constant associated with number) without any fractional part or exponential part. There are three types of integer constants in C language: decimal constant(base 10), octal constant(base 8) and hexadecimal constant(base 16) .

Decimal digits: 0 1 2 3 4 5 6 7 8 9

Octal digits: 0 1 2 3 4 5 6 7

Hexadecimal digits: 0 1 2 3 4 5 6 7 8 9 A B C D E F.

For example:

Decimal constants: 0, -9, 22 etc
Octal constants: 021, 077, 033 etc
Hexadecimal constants: 0x7f, 0x2a, 0x521 etc
Notes:
  1. You can use small caps abcdef instead of uppercase letters while writing a hexadecimal constant.
  2. Every octal constant starts with 0 and hexadecimal constant starts with 0x in C programming.

Floating-point constants


Floating point constants are the numeric constants that has either fractional form or exponent form. For example:

-2.0
0.0000234
-0.22E-5
Note:Here, E-5 represents 10-5. Thus, -0.22E-5 = -0.0000022.

Character constants


Character constants are the constant which use single quotation around characters. For example: 'a', 'l', 'm', 'F' etc.




Wednesday, December 25, 2013

Cascading Style Sheet (CSS)


A cascading style sheet (CSS) is a Web page derived from multiple sources with a defined order of precedence where the definitions of any style element conflict. The Cascading Style Sheet, level 1 (CSS1) recommendation from the World Wide Web Consortium (W3C), which is implemented in the latest versions of the Netscape and Microsoft Web browsers, specifies the possible style sheets or statements that may determine how a given element is presented in a Web page.
CSS gives more control over the appearance of a Web page to the page creator than to the browser designer or the viewer. With CSS, the sources of style definition for a given document element are in this order of precedence:
1.      The STYLE attribute on an individual element tag
2.      The STYLE element that defines a specific style sheet containing style declarations or a LINK element that links to a separate document containing the STYLE element. In a Web page, the STYLE element is placed between the TITLE statement and the BODY statement.
3.      An imported style sheet, using the CSS @import notation to automatically import and merge an external style sheet with the current style sheet
4.      Style attributes specified by the viewer to the browser
5.      The default style sheet assumed by the browser

In general, the Web page creator's style sheet takes precedence, but it's recommended that browsers provide ways for the viewer to override the style attributes in some respects. Since it's likely that different browsers will choose to implement CSS1 somewhat differently, the Web page creator must test the page with different browsers.
CSS can be divided into 3 types:
They are:
1. Inline CSS
2. Internal CSS
3. External CSS



Sunday, December 22, 2013

Browser


A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web. The word "browser" seems to have originated prior to the Web as a generic term for user interfaces that let you browse (navigate through and read) text files online.
Technically, a Web browser is a client program that uses HTTP (Hypertext Transfer Protocol) to make requests of Web servers throughout the Internet on behalf of the browser user. Most browsers support e-mail and the File Transfer Protocol (FTP) but a Web browser is not required for those Internet protocols and more specialized client programs are more popular.

The first Web browser, called WorldWideWeb, was created in 1990. That browser's name was changed to Nexus to avoid confusion with the developing information space known as the World Wide Web. The first Web browser with a graphical user interface was Mosaic, which appeared in 1993. Many of the user interface features in Mosaic went into NetscapeNavigator. Microsoft followed with its Internet Explorer (IE).
As of September 2006, Internet Explorer is the most commonly used browser, having won the so-called browser wars between IE and Netscape. Other browsers include:

·         Firefox, which was developed from Mozilla (the open source version of Netscape).
·         Flock, an open source browser based on Firefox and optimized for Web 2.0 features such as blogging and social bookmarking .
·         Safari, a browser for Apple computers (at this writing, the third most popular browser).
·         Lynx, a text-only browser for UNIX shell and VMS users.

·         Opera, a fast and stable browser that's compatible with most relatively operating systems.


Thursday, December 19, 2013

Data Types Used in C Language


The C language provides many basic types. Most of them are formed from one of the four basic arithmetic type specifiers in C (char, int, float and double), and optional specifiers (signed, unsigned, short, long). All available basic arithmetic types are listed below




Integer Data Types



Type
Storage size
Value range
char
1 byte
-128 to 127 or 0 to 255
unsigned char
1 byte
0 to 255
signed char
1 byte
-128 to 127
int
2 or 4 bytes
-32,768 to 32,767 or -2,147,483,648 to 2,147,483,647
unsigned int
2 or 4 bytes
0 to 65,535 or 0 to 4,294,967,295
short
2 bytes
-32,768 to 32,767
unsigned short
2 bytes
0 to 65,535
long
4 bytes
-2,147,483,648 to 2,147,483,647
unsigned long
4 bytes
0 to 4,294,967,295


                      Floating-Point Types
Following table gives you details about standard floating-point types with storage sizes and value ranges and their precision:
Type                         Storage size              Value range                                           Precision
float                          4 byte                           1.2E-38 to 3.4E+38                               6 decimal places
double                     8 byte                           2.3E-308 to 1.7E+308                          15 decimal places
long double            10 byte                        3.4E-4932 to 1.1E+4932                     19 decimal places








Wednesday, December 18, 2013

What is C, What is C++, and What is the Difference?




C is a programming language originally developed for developing the Unix operating system. It is a High-level (also called Middle-level) and powerful language, but it lacks many modern and useful constructs. C++ is a newer language, based on C, that adds many more modern programming language features that make it easier to program than C.

Basically, C++ maintains all aspects of the C language, while providing new features to programmers that make it easier to write useful and sophisticated programs. 

For example, C++ makes it easier to manage memory and adds several features to allow "object-oriented" programming and "generic" programming. Basically, it makes it easier for programmers to stop thinking about the nitty-gritty details of how the machine works and think about the problems they are trying to solve.


So, what is C++ used for?

C++ is a powerful general-purpose programming language. It can be used to create small programs or large applications. It can be used to make CGI scripts or console-only DOS programs. C++ allows you to create programs to do almost anything you need to do. The creator of C++, Bjarne Stroustrup, has put together a partial list of applications written in C++.


Protect Your Gmail Account From Being Hacked



How to protect gmail account from hackers?
------------------------------------------
For More Tips, Tweaks and Tricks Visit: 
http://bhssjct.blogspot.com/ or
http://www.facebook.com/morganglobal/ 

==> Most of the people use Gmail for sending emails. We have precious information stored in our Gmail account. So Gmail would be the target for hackers being hacking it. Gmail developer team has given us wonderful security option.

Enabling the 2-step Verification:
------------------------------------





==> By enabling the 2-step verification from you Gmail account makes your account more secure by making you to login into Gmail by 2 step. While logging in into the Gmail account, Gmail send you the security code to your mobile phone and asks you to enter that code in Gmail login page. This makes sure that only the mobile phone carrier can able to know that code. So your account cannot be Hacked if someone tries to hack your account from somewhere else.

For More Tips, Tweaks and Tricks Visit:
http://bhssjct.blogspot.com/ or http://www.facebook.com/morganglobal/



How to enable 2-step verification?
----------------------------------

- Log in to your Gmail Account,

- Click Account at the top right,

- Click Edit on 2-step verification,

- Now Click Start Setup,

- selcet your country and add your mobile number,

- Select the method of verification, SMS option is by default and it is most recommended one

- Just click Send Code

- Now Google will send you Text in your mobile with Verification Code

- Now click Next, and NextNote this point after 2-step Verification

- Your Another Application and Connected account will not be working, you need to re-invoke that on Final 2-step Verification or do it later!

- If your Primary Moblie is lost then you cannot able to login to Gmail so set Backup Mobile Number

• Backup Verification Code is the another way to Recover your Account Please Download and Note that number and keep it safely somewhere it is accessible for you, like your Wallet. Each code can be used only once.

• I recommend you to read everything and make a note of it.
Happy with your safe Gmail Account. This time none can Hack your Gmail, I hope. Please comment below and also mention me if I have missed any point.




For More Tips, Tweaks and Tricks Visit:
http://bhssjct.blogspot.com/ or
http://www.facebook.com/morganglobal/

Ms-Excel and It's Advantages



Excel is an electronic spreadsheet program that can be used for storing, organizing and manipulating data.

When you look at the Excel screen (refer to the example on this page) you see a rectangular table or grid of rows and columns. The horizontal rows are identified by numbers (1,2,3) and the vertical columns with letters of the alphabet (A,B,C). For columns beyond 26, columns are identified by two or more letters such as AA, AB, AC.



The intersection point between a column and a row is a small rectangular box known as a cell. A cell is the basic unit for storing data in the spreadsheet. Because an Excel spreadsheet contains thousands of these cells, each is given a cell reference or address to identify it.


Top 6 advantages of Ms-excel
-----------------------------------


1.Leader in the industry
--------------------------------
Microsoft has the monopoly when it comes to office software. Countless companies use Microsoft’s software to run their company and if you have a qualification in Microsoft software then you’re a foot in to work for them (mostly admin levels). Most companies don’t want to waste their time in training staff on how to use the office software. As mentioned previously, if you know how to use it effectively you’ll also be a productive staff member.


2.Easily work with data
------------------------------

Excel has this amazing ability to compile data and make it easier to work with. You’ll be able to do equations, sort and create charts with the information you put into Excel.



3.Charts and Tables
------------------------------
As mentioned, you will be able to use all the information in your sheet and create presentable presentations in the form of tables and charts. Clients and bosses just need a summarised version of the work you are currently doing and with this software you’ll be able to create the perfect presentation of your work.


4.User friendly
------------------------------
Excel is user friendly when you know how to customise your toolbars and side bars. When you do a Microsoft course you’ll be able to fully customise you’re work area to streamline your work in excel.


5.Constantly updated
------------------------------
Because of its popularity amongst businesses it will constantly be updated and new versions with better features will be released. Once you have the foundation training you’ll be able to adapt to the new features easily.


6.Great storage and security features
----------------------------------------
Excel makes saving easy and compresses it files so that they don’t take up too much space on your drive. Because so many people use it you will be able to open the file on most PC’s if you need to edit your work or present the file on a different PC.


For More Computer Tips, Tweaks and Tricks Visit:
http://www.facebook.com/morganglobal/ and
http://bhssjct.blogspot.com

Tuesday, December 17, 2013

E-commerce (electronic commerce or EC)



E-commerce (electronic commerce or EC) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term, e-business, are often used interchangably. For online retail selling, the term e-tailing is sometimes used.



E-commerce can be divided into:
-------------------------------------------
E-tailing or "virtual storefronts" on Web sites with online catalogs, sometimes gathered into a "virtual mall"
The gathering and use of demographic data through Web contacts
Electronic Data Interchange (EDI), the business-to-business exchange of data
E-mail and fax and their use as media for reaching prospects and established customers (for example, with newsletters)
Business-to-business buying and selling
The security of business transactions


E-tailing or The Virtual Storefront and the Virtual Mall
------------------------------------------------------------

As a place for direct retail shopping, with its 24-hour availability, a global reach, the ability to interact and provide custom information and ordering, and multimedia prospects, the Web is rapidly becoming a multibillion dollar source of revenue for the world's businesses. A number of businesses already report considerable success. As early as the middle of 1997, Dell Computers reported orders of a million dollars a day. By early 1999, projected e-commerce revenues for business were in the billions of dollars and the stocks of companies deemed most adept at e-commerce were skyrocketing. Although many so-called dotcomretailers disappeared in the economic shakeout of 2000, Web retailing at sites such as Amazon.com, CDNow.com, and CompudataOnline.com continues to grow.


Market Research
---------------------

In early 1999, it was widely recognized that because of the interactive nature of the Internet, companies could gather data about prospects and customers in unprecedented amounts -through site registration, questionnaires, and as part of taking orders. The issue of whether data was being collected with the knowledge and permission of market subjects had been raised. (Microsoft referred to its policy of data collection as "profiling" and a proposed standard has been developed that allows Internet users to decide who can have what personal information.)


Electronic Data Interchange (EDI)
------------------------------------

EDI is the exchange of business data using an understood data format. It predates today's Internet. EDI involves data exchange among parties that know each other well and make arrangements for one-to-one (or point-to-point) connection, usually dial-up. EDI is expected to be replaced by one or more standard XML formats, such as ebXML.


E-Mail, Fax, and Internet Telephony
-----------------------------------------


E-commerce is also conducted through the more limited electronic forms of communication called e-mail, facsimile or fax, and the emerging use of telephone calls over the Internet. Most of this is business-to-business, with some companies attempting to use e-mail and fax for unsolicited ads (usually viewed as online junk mail or spam) to consumers and other business prospects. An increasing number of business Web sites offer e-mail newsletters for subscribers. A new trend is opt-in e-mail in which Web users voluntarily sign up to receive e-mail, usually sponsored or containing ads, about product categories or other subjects they are interested in.


Business-to-Business Buying and Selling
------------------------------------------------
Thousands of companies that sell products to other companies have discovered that the Web provides not only a 24-hour-a-day showcase for their products but a quick way to reach the right people in a company for more information.

The Security of Business Transactions
-------------------------------------------

Security includes authenticating business transactors, controlling access to resources such as Web pages for registered or selected users, encrypting communications, and, in general, ensuring the privacy and effectiveness of transactions. Among the most widely-used security technologies is the Secure Sockets Layer (SSL), which is built into both of the leading Web browsers.