Sunday, 20 October 2013
What are the Differences between Boys and Girls Attitude?
For over 50 years, researchers have been studying how boys and girls interact. Not surprisingly, they have found some differences.
For the most part, boys and girls are more similar than they are different.
A lot of girls enjoy playing computer games, and a lot of boys enjoy more friendship-centered activities.
Researchers have found, however, that as a general group, boys spend more time with boys in physical activities such as sports and games; whereas girls tend to spend more of their time socializing with other girls in more friendship-based activities (for example, talking with other girls) (1, 2, 3). So it is not surprising that boys and girls tend to bully and be bullied differently. One of the most consistent research findings is that boys are more likely to both bully and be bullied than are girls (3, 4, 5, 6, 7, 8, 9). Also, boys and girls experience different types of bullying behaviors.
Bullying is defined as a form of aggression that is repetitively exerted against an individual who feels unable to defend him/herself (10). This aggression may occur directly against someone in a physical (for example, slapping, pushing) or verbal (for example, swearing, name calling) manner. Bullying can also be indirect whereby the targeted person experiences the aggression through others (for example, gossiped about, excluded from a social activity).
How are Girls Involved in Bullying?
Through Peer Group
Girls tend to bully other girls indirectly through the peer group. Rather than bully a targeted child directly, girls more often share with other girls (and boys) hurtful information about the targeted child (4). For example, a girl may tell a group of girls an embarrassing story about another girl. They may create mean names, gossip, and come up with ways of letting the girl know that she is rejected from the peer group (for example, saying mean things about her on social networking sites such as Facebook or MySpace, using her email address to send harassing messages to everyone on her email list, texting her a death threat). These are called “relational” bullying because they attack relationships and friendships.
How are Boys Involved in Bullying?
In contrast to girls, boys of any age and ethnic group tend to be physically aggressive (e.g., hit, kick, slap, push, or punch) (1, 2, 9, 11, 14, 20). Also, research shows that physical abuse tends to occur more often among boys than girls at all educational levels (e.g., elementary, high school, college) (13, 15, 16). In addition, male college students tend to bully and be bullied through physical and verbal forms of bullying (e.g., name-calling) more often than college girls (15).
Also boys may be more accepting of bullying, than are girls (17). That is, boys may like a girl even if she bullies others and like other boys who bully. Girls may still befriend boys who bully, but tend to dislike girls who bully. At the core of these differences are children’s and, indeed, societal beliefs about acceptable behaviors for boys and girls. Many people may see bullying among boys as “just boys being boys”. So, girls may accept this attitude and tolerate boys’ bullying. However, girls may be less accepting of girls who bully if it is seen as overly aggressive.
Friday, 18 October 2013
CRYPTOGRAPHY AND NETWORK SECURITY
1) What
is an attack? Types of attacks,security services and mechanisms?
What
are the non-cryptographic protocol vulnerabilities?
DOS,
DDOS and Session Hijacking?
2)What
is secret key cryptography?
Explain
DES ?
Explain
IDEA with neat diagram?
Explain
AES ?
3)Explain
Chinese Remainder theorem and fermatis theorem?
4)principles
of public key cryptography?
Explain
about RSA algorithm and Diffie-Hellman
Key Exchange?
Monday, 16 September 2013
Procedure for writing Microsoft Exam
Procedure for writing Microsoft Exam
1)Create Hotmail Account.Click here to go
2)NEXT GO TO THIS LINK.AND SIGN IN(SEE BELOW SNAPSHOT)
3NEXT IT WILL ASK YOUR PERSONAL INFORMATION.
COMPANY NAME:GVIT
4))NEXT YOU WILL SEE THE BELOW SNAPSHOTS.
(IF THERE IS ANY DOUBTH ,LEAVE ME COMMENT HERE)
MICROSOFT ANSWERS
1st Assessment
1)You need
to identify on which edition or editions of Windows 8 you can use AppLockerto
control access to Windows Store apps.What should you identify? (Choose all that
apply.)
ANS:windows 8 enterprise
2)You
download, install, and activate Windows 8 Enterprise evaluation.For how many
days can you evaluate Windows 8 Enterprise evaluation?
ANS:90
3)You plan
to install Windows 8 Pro on a client computer.You need to ensure that the
computer can run virtual machines by using Client Hyper-V.What is required?
ANS:slat
4)You are
evaluating the different editions of Windows 8.You need to identify which
features are only available in Windows 8 Enterprise. Which features should you
identify? (Choose all that apply.)
ANS: ALL 3 except hyper-v client
5)You have an Active Directory domain. The domain contains a
client computer that runs Windows 8.You need to manage Active Directory user
accounts from the computer. What should you do on the computer?
ANS: perform
reinstallation and reinstall data
6)You install and activate Windows 8 Enterprise evaluation.You
need to continue using Windows 8 after the evaluation period expires. You want
to achieve this goal by using the minimum amount of administrative effort.What
should you do?
ANS: enable remote
assistance
2nd Assessment
----------------------------------------------------------------------------------------------------------------------------------------
1)You need to identify which hardware configuration supports
Windows to Go.Which hardware configuration should you identify? (Choose all
that apply.)
ANS: all the options except
arm
2)You need to recommend a solution to encrypt the entire contents
of a Windows togo drive. What should you include in the recommendation?
ANS: BitLocker Drive
Encryption (BitLocker) with a password
3)You need to control which Windows Store apps can be
installed from the Windows Store.Which Group Policy setting should you
configure?
ANS: application
control policies
4)You have a client computer that runs Windows 8.You have a
removable hard disk drive named Drive1.You need to recommend a solution to
encrypt the entire contents of Drive1. The solution must
ensure that Drive1 can be used on other client computers.What
should you include in the recommendation?
ANS: BitLocker To Go
5)Your company plans to develop a line-of-business Windows
Store app.You need to identify on which edition or editions of Windows 8 you
can sideload the app.What should you identify? (Choose all that apply.)(Choose
3 answers)
ANS: CLICK ANY THREE
6)You have a client computer that runs Windows 8.The
computer does not have a Trusted Platform Module (TPM).you need to recommend a
solution to encrypt the hard disk drive that contains the computer’soperating
system. The solution must minimize costs.What should you include in the
recommendation?
ANS: BitLocker Drive
Encryption (BitLocker)
7)You plan to sideload several Windows Store apps.You need
to activate a sideloading product key.Which command should you run?
ANS: slmgr.vbs
3rd Assessment
--------------------------------------------------------------------------------------------------------------------------------------
1)You have a client computer that runs Windows 8 Pro.You
need to ensure that Internet Explorer 10 supports browsing websites that
require ActiveX controls.What should you do?
ANS:From the Opening
Internet Explorer setting, select Always in Internet Explorer on the desktop.
2)You have a client computer that runs Windows 8.The desktop
contains shortcuts that point to the URLs of websites.You need to ensure that
the shortcuts only open in the Internet Explorer 10 Windows Store app.Which
Opening Internet Explorer setting should you select?
ANS:Open Internet
Explorer tiles on the desktop
3)You need to ensure that Internet Explorer 10 always opens
links in Internet Explorer for the desktop. Which Internet Options settings
should you modify?
ANS:program settings
4)You have a domain member computer that runs Windows 8
Enterprise.You plan to configure Internet Explorer on the computer.You need to
restrict Internet Explorer from providing access to the corporate intranet.Which
feature should you use?
ANS:enhanced
protected mode
5)You have a client computer that runs Windows 8.You need to
locate the administrative template (.admx) files that you can use to configure the,
Group Policy settings for Internet Explorer 10.Where should you search on the
computer?
ANS:%WinDir%\policydef
6)On which editions IE10works on
Windows 8, Windows
Server 2012, Windows 7, Windows Server 2008 R2
Thursday, 5 September 2013
Tuesday, 3 September 2013
Thursday, 29 August 2013
Thursday, 15 August 2013
Tuesday, 13 August 2013
Tuesday, 6 August 2013
Sunday, 4 August 2013
Saturday, 3 August 2013
Friday, 2 August 2013
Thursday, 1 August 2013
Saturday, 20 July 2013
List of Project Ideas and Topics (B.Tech. CS/IT)
List of Project Ideas and Topics (B.Tech. CS/IT)
- A Car Rental System
- Accounts Management Software
- Airline Reservation System
- Anti-Lock Braking System (Abs)
- Application Remote Control (Arc) Using Bluetooth
- Army Management System
- ATM System
- Auto Repair Shop Management System
- Automotive Store Management System
- Banking System
- Bus Ticket Reservation
- Cafeteria Ordering System
- Car Insurance System
- Car Safety System
- Clothing Store Management
- College Management System
- Ebook Shopping
- Elevator Control System
- Enterprise Resource Planning System
- Event Organizing, Planning and Management System
- Football Updates Information System
- Gym Workout Application
- Home Science Management System
- Hospital Management System
- Hostel Accommodation System
- Hotel Management System
- Household Budget Management System
- Human Resource Management
- Library Management System
- Medical Store System
- Mess Management System
- Online Admission System
- Online Auction System
- Online Course Registration System
- Online Education System
- Online Examination System
- Online Food Ordering
- Online Movie Ticket Booking System
- Online Recruitment System
- Online Recruitment System
- Online Shopping Inventory System
- Online Travel Portal
- Online Voting System
- Police Management System
- Power Consumption Management System
- Prison Management System
- Railway Reservation System
- RTO Management System
- School Management System
- Social Networking Portal
- Space Station Control System
- Sports Bulletin Management
- Sports Shop Management
- Student Attendance Management System
- Super Market Management System
- Time Monitoring Tool
- Toll Gate Check System
- Traffic Management System
- Vehicle Tracking System
- Web Publishing System
Thursday, 18 July 2013
Tuesday, 16 July 2013
Thursday, 11 July 2013
Wednesday, 10 July 2013
Monday, 8 July 2013
Subscribe to:
Comments (Atom)
































