more safety tips....
|
|
|
ARE YOU IN NEED OF A SOFTWARE TOOL ????
CLICK ON THE BUTTON BELOW.
spammy.
Sends junk mails or inappropriate material that you neither want to see nor download. Steer clear of unwanted links and ignore links in email.
- C.E.O Ozeka private.
- C.E.O Ozeka private.
vulchur.
This predatory character pretends to be your friend and tries to gain your trust. "Remember not to add friends randomly to your online profile".
|
ANSWERS AND F.A.Q'S
answers
Aby
We recieved your question
What is the difference between an Ipod and Iphone
It is quite a simple one
Ipod -
It is a music player with some other functions launched by Apple.
Iphone-
It is a Cellular phone through which we can also make voice calls
It works just like a usual phone
But it uses the IOS- I operating system.
We recieved your question
What is the difference between an Ipod and Iphone
It is quite a simple one
Ipod -
It is a music player with some other functions launched by Apple.
Iphone-
It is a Cellular phone through which we can also make voice calls
It works just like a usual phone
But it uses the IOS- I operating system.
HI NIDHI
we recieved your question....
4.What is computer ?
>A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.
Conventionally, a computer consists of at least one processing element, typically a central processing unit (CPU) and some form ofmemory. The processing element carries out arithmetic and logic operations, and a sequencing and control unit that can change the order of operations based on stored information. Peripheral devices allow information to be retrieved from an external source, and the result of operations saved and retrieved.
The first electronic digital computers were developed between 1940 and 1945. Originally they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] In this era mechanical analog computers were used for military applications.
Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into mobile devices, and mobile computers can be powered by smallbatteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as “computers.” However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.
THANKYOU FOR YOUR QUESTION
- C.E.O Ozeka private.
we recieved your question....
4.What is computer ?
>A computer is a general purpose device that can be programmed to carry out a set of arithmetic or logical operations. Since a sequence of operations can be readily changed, the computer can solve more than one kind of problem.
Conventionally, a computer consists of at least one processing element, typically a central processing unit (CPU) and some form ofmemory. The processing element carries out arithmetic and logic operations, and a sequencing and control unit that can change the order of operations based on stored information. Peripheral devices allow information to be retrieved from an external source, and the result of operations saved and retrieved.
The first electronic digital computers were developed between 1940 and 1945. Originally they were the size of a large room, consuming as much power as several hundred modern personal computers (PCs).[1] In this era mechanical analog computers were used for military applications.
Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space.[2] Simple computers are small enough to fit into mobile devices, and mobile computers can be powered by smallbatteries. Personal computers in their various forms are icons of the Information Age and are what most people think of as “computers.” However, the embedded computers found in many devices from MP3 players to fighter aircraft and from toys to industrial robots are the most numerous.
THANKYOU FOR YOUR QUESTION
- C.E.O Ozeka private.
Hi Nidhi
we receiveD your question....
3.WHAT IS INTERNET ?
>The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks.
Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet, giving birth to new services such as voice over Internet Protocol (VoIP) and Internet Protocol television (IPTV). Newspaper, book and other print publishing are adapting to website technology, or are reshaped into blogging and web feeds. The Internet has enabled and accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries.
The origins of the Internet reach back to research commissioned by the United States government in the 1960s to build robust, fault-tolerant communication via computer networks. While this work together with work in the United Kingdom and France lead to important precursor networks, they were not the Internet. There is no consensus on the exact date when the modern Internet came into being, but sometime in the early to mid-1980s is considered reasonable.
The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. Though the Internet has been widely used by academia since the 1980s, the commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of June 2012[update], more than 2.4 billion people—over a third of the world's human population—have used the services of the Internet; approximately 100 times more people than were using it in 1995.[1][2]
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise
THANKYOU FOR YOUR QUESTION
-C.E.O Ozeka Private
we receiveD your question....
3.WHAT IS INTERNET ?
>The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks.
Most traditional communications media including telephone, music, film, and television are being reshaped or redefined by the Internet, giving birth to new services such as voice over Internet Protocol (VoIP) and Internet Protocol television (IPTV). Newspaper, book and other print publishing are adapting to website technology, or are reshaped into blogging and web feeds. The Internet has enabled and accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries.
The origins of the Internet reach back to research commissioned by the United States government in the 1960s to build robust, fault-tolerant communication via computer networks. While this work together with work in the United Kingdom and France lead to important precursor networks, they were not the Internet. There is no consensus on the exact date when the modern Internet came into being, but sometime in the early to mid-1980s is considered reasonable.
The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. Though the Internet has been widely used by academia since the 1980s, the commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of June 2012[update], more than 2.4 billion people—over a third of the world's human population—have used the services of the Internet; approximately 100 times more people than were using it in 1995.[1][2]
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise
THANKYOU FOR YOUR QUESTION
-C.E.O Ozeka Private
Hi Rani
we received your question.Even though your question is not about web, the answer will be given.All the questions will be surely answered......THAT IS OZEKA STYLE........next time give the question in oz general knowldge.
2. HOW TO OVERCOME TEENAGE PROBLEMS ?
>Step 1 :Educate yourself about the changes taking place in your teen's body and brain. Talk with her doctor to understand the impact of hormones. Knowing that mood swings, some testing and a push for independence are normal parts of the teenage years can help you avoid misunderstandings and arguments.
Step 2 :Talk with your teen to get to the source of the problem. Maintain an open line of communication so your teen knows she can speak to you about anything.
Step 3 :Allow your child to have age-appropriate independence while remaining active in her life, activities and friendships so you can monitor without being intrusive. Be involved so you can see the early warning signs of impending challenges or stress.
Step 4 :Address the issue together, and make it clear to your teen that you're on her side. Discuss ways you can both deal with the situation and listen to your teen's input. Provide guidance and create a workable solution to help your child overcome the issue.
Step 5 :Empathize with your teenager to let her know that you understand. Offer stories of difficulties you faced during your teenage years, how you felt at the time and what happened in the end.
Step 6 :Follow up with your teen to see if the issue has gotten better. Discuss the need for outside help, such as a teacher, coach or doctor, if necessary.
Step 7 :Approach stressful situations from a point of love, instead of with impatience and accusations. Putting your teen on the defensive will quickly shut down the lines of communication, leaving you both at a standstill.
Step 8 :Empower your teen to work through issues she can handle on her own or with your help, but advocate on your teen's behalf when the problem is too big for her to deal with.
we received your question.Even though your question is not about web, the answer will be given.All the questions will be surely answered......THAT IS OZEKA STYLE........next time give the question in oz general knowldge.
2. HOW TO OVERCOME TEENAGE PROBLEMS ?
>Step 1 :Educate yourself about the changes taking place in your teen's body and brain. Talk with her doctor to understand the impact of hormones. Knowing that mood swings, some testing and a push for independence are normal parts of the teenage years can help you avoid misunderstandings and arguments.
Step 2 :Talk with your teen to get to the source of the problem. Maintain an open line of communication so your teen knows she can speak to you about anything.
Step 3 :Allow your child to have age-appropriate independence while remaining active in her life, activities and friendships so you can monitor without being intrusive. Be involved so you can see the early warning signs of impending challenges or stress.
Step 4 :Address the issue together, and make it clear to your teen that you're on her side. Discuss ways you can both deal with the situation and listen to your teen's input. Provide guidance and create a workable solution to help your child overcome the issue.
Step 5 :Empathize with your teenager to let her know that you understand. Offer stories of difficulties you faced during your teenage years, how you felt at the time and what happened in the end.
Step 6 :Follow up with your teen to see if the issue has gotten better. Discuss the need for outside help, such as a teacher, coach or doctor, if necessary.
Step 7 :Approach stressful situations from a point of love, instead of with impatience and accusations. Putting your teen on the defensive will quickly shut down the lines of communication, leaving you both at a standstill.
Step 8 :Empower your teen to work through issues she can handle on her own or with your help, but advocate on your teen's behalf when the problem is too big for her to deal with.
Mr.Joseph
we received your question.............
1. HOW TO CREATE A WEBSITE ?
> Actually making a website is quiet simple.The first thing you have to do is to create an account in a site which offers
website building[eg: weebly.com , webs.com , godaddy.com etc,]Then create a website using their site builder.If you want
to make your site ID free from the site tail then you will have to upgrade it using the upgrade option.The upgradation will also offer you some more options
THANK YOU FOR YOUR QUESTION ......
- C.E.O Ozeka Private........
we received your question.............
1. HOW TO CREATE A WEBSITE ?
> Actually making a website is quiet simple.The first thing you have to do is to create an account in a site which offers
website building[eg: weebly.com , webs.com , godaddy.com etc,]Then create a website using their site builder.If you want
to make your site ID free from the site tail then you will have to upgrade it using the upgrade option.The upgradation will also offer you some more options
THANK YOU FOR YOUR QUESTION ......
- C.E.O Ozeka Private........
f.a.q 's
1. How can I prevent PC crashes? There are a few simple things you can do right away to help prevent further spyware infection and stop frequent computer crashes:
- Update your operating system regularly.
- Avoid questionable Web sites.
- Practice safe email protocol:
- Don't open messages from unknown senders.
- Immediately delete messages you suspect to be spam.
- Avoid free software and file-sharing applications.
- Use anti-virus protection and a firewall.
- Get anti-spyware software protection.
2. How serious is the malware threat? The facts speak for themselves:
**eMarketer, 2005
- Nine out of 10 PCs connected to the Internet are infected with spyware.*
- 88% of Spy Audit scans found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumer computers.*
- "About 10 million Americans have their personal information pilfered and misused in some way or another every year, costing consumers $5 billion and businesses $48 billion annually." – Federal Trade Commission, June 21, 2005
- Some form of spyware can be found on 87% of corporate PCs.*
- "A hacker was able to access potentially 40 million credit card numbers by infiltrating the network of a company that processed payment data for MasterCard International and other companies." – InfoWorld, July 17, 2005
- 86% U.S. adult Internet users believe that spyware on their computers has caused them to suffer a monetary loss.**
**eMarketer, 2005
3. What should I look for in anti-malware software?
- Regular definition updates
- Refined malware detection
- Proactive protection
- Designated threat research team
- Customer service
- Easy-to-use interface
- Stable company to back up the software
4. How can I prevent a slow PC? There are a few simple things you can do right away to prevent further spyware infection and speed your PC performance.
- Update your operating system regularly.
- Increase your browser security settings.
- Avoid questionable Web sites.
- Only download software from sites you trust.
- Practice safe email protocol.
- Don’t open messages from unknown senders.
- Immediately delete messages you suspect may be spam.
- Avoid free software and file-sharing applications.
- Use anti-virus protection a firewall.
- Get anti-spyware software protection.
5. What can I do about hackers and predators? To combat online predators:
- Continually check the accuracy of personal documents and deal with any discrepancies right away.
- Use extreme caution when entering chat rooms or posting personal Web pages.
- Limit the personal information you post on a personal Web pages.
- Carefully monitor requests by online “friends” or acquaintances for predatory behavior.
- Keep personal and financial information out of online conversations.
- Use extreme caution when agreeing to meet an online “friend” or acquaintance in person.
- Update your operating system regularly.
- Increase your browser security settings.
- Avoid questionable Web sites.
- Only download software from sites you trust.
- Practice safe email protocol:
- Don't open messages from unknown senders.
- Immediately delete messages you suspect to be spam.Avoid free software and file-sharing applications.
- Use anti-virus protection and a firewall.
- Get anti-spyware software protection.