Hackers
now lets understand the person hacker
hacker is a person who breaks computer the subculture that has evolved around hacker is often reffered to as the computer underground.
History of hackers.
Fistly bruce sterling traces the root of the computer underground to the yippies, a 1960s counterculture movement.
Type of hacker.
@ white hat
a white hat hacker breaks security for non malicious reason. This type of hacker enjoys learning and working with computer systems and consequently gains a deeper understanding of subjects. Such pepoles normally go on use theis hacking skills in legitimate ways such as becoming the security consultant.
@ gray hat.
A gray hat hacker is a hacker of ambiguous etgics and or borderline lagality often frankly admitted.
@ black hat.
A black hat hacker is someone who subverts computer security withnut aurthorization or uses techonology for vandalism i.e. Malicious destruction, credit card funds, identity theft, intellectual property theft or other types of crime. They are also known as crakers.
@ cyberterrorist.
A cyberterrorist uses technology to comit act of terrorism. Their intentious are to cause physical, real-world harm to socity, social, ideological, religious, political or governmental establishments.
@ Script kiddies
A script kiddie are non-expert hacker who breaks into computer syste by using pre-designed scripts.
These are type of hackers.
Thank you,
tushar khoje.
This Blog Is Created By Tushar khoje And will try to solve computer related Problems, and will help to teach C programmings and other computer related things
Thursday, December 16, 2010
Hitman contracts
Hitman contracts.
Adding line "EnableCheats 1"
makes u the cheats enabling.
file name - hitmancontracts.ini
configuration setting file is in game folder.
Level informations = logos.gms
all level access = levelmemu.gms
system configurtions
cpu = pentium 4.16 ghz or athalon xp
ram = 256 mb
graphics = 64 mb 3d cara and 100 % directx 8.1
sound = windows compatible card
cd rom = 8x cd rom
hd = 2gb free space
weapons in this game,
ak47
aug
awp
deagle
elite
famas
fiveseven
g3sgl
glock 18
m3
m4al
mac10
mp5navy
p228
p90
scout
sg550
sg552
tmq
ump45
usp
xml1014
Adding line "EnableCheats 1"
makes u the cheats enabling.
file name - hitmancontracts.ini
configuration setting file is in game folder.
Level informations = logos.gms
all level access = levelmemu.gms
system configurtions
cpu = pentium 4.16 ghz or athalon xp
ram = 256 mb
graphics = 64 mb 3d cara and 100 % directx 8.1
sound = windows compatible card
cd rom = 8x cd rom
hd = 2gb free space
weapons in this game,
ak47
aug
awp
deagle
elite
famas
fiveseven
g3sgl
glock 18
m3
m4al
mac10
mp5navy
p228
p90
scout
sg550
sg552
tmq
ump45
usp
xml1014
Hitman contracts
Hitman contracts.
Adding line "EnableCheats 1"
makes u the cheats enabling.
file name - hitmancontracts.ini
configuration setting file is in game folder.
Level informations = logos.gms
all level access = levelmemu.gms
system configurtions
cpu = pentium 4.16 ghz or athalon xp
ram = 256 mb
graphics = 64 mb 3d cara and 100 % directx 8.1
sound = windows compatible card
cd rom = 8x cd rom
hd = 2gb free space
weapons in this game,
ak47
aug
awp
deagle
elite
famas
fiveseven
g3sgl
glock 18
m3
m4al
mac10
mp5navy
p228
p90
scout
sg550
sg552
tmq
ump45
usp
xml1014
Adding line "EnableCheats 1"
makes u the cheats enabling.
file name - hitmancontracts.ini
configuration setting file is in game folder.
Level informations = logos.gms
all level access = levelmemu.gms
system configurtions
cpu = pentium 4.16 ghz or athalon xp
ram = 256 mb
graphics = 64 mb 3d cara and 100 % directx 8.1
sound = windows compatible card
cd rom = 8x cd rom
hd = 2gb free space
weapons in this game,
ak47
aug
awp
deagle
elite
famas
fiveseven
g3sgl
glock 18
m3
m4al
mac10
mp5navy
p228
p90
scout
sg550
sg552
tmq
ump45
usp
xml1014
Friday, December 10, 2010
Thursday, December 9, 2010
use of a constant
//This program demonstrates the use of a constant
#include
int main()
{
const int constantNumber = 100; //Declaration of a constant.
It must be initialized immediately, else it picks up a garbage value.
//constantNumber = 30; Will generate an error. Cannot change the value of a constant
printf("The value is %d", constantNumber);
return 0;
}
#include
int main()
{
const int constantNumber = 100; //Declaration of a constant.
It must be initialized immediately, else it picks up a garbage value.
//constantNumber = 30; Will generate an error. Cannot change the value of a constant
printf("The value is %d", constantNumber);
return 0;
}
use of arithmetic operators and its precedense
//This program demonstrates the use of arithmetic operators and its precedense
#include
int main()
{
int value1, value2, value3;
clear();
value1 = 10;
value2 = 20;
value3 = value1 + value2 * 2;
printf("\nvalue1=%d, value2=%d, value1+value2*2=%d", value1, value2, value3);
value3 = (value1 + value2) * 2;
printf("\nvalue1=%d, value2=%d, (value1=value2)*2=%d", value1, value2, value3);
value1 = 20;
value2 = 10;
value3 = ((value1/value2)*value2)+(value1%value2);
printf("\nvalue1=%d, value2=%d, ((value1/value2)*value2)+(value1%value2)=%d", value1, value2, value3);
return 0;
}
#include
int main()
{
int value1, value2, value3;
clear();
value1 = 10;
value2 = 20;
value3 = value1 + value2 * 2;
printf("\nvalue1=%d, value2=%d, value1+value2*2=%d", value1, value2, value3);
value3 = (value1 + value2) * 2;
printf("\nvalue1=%d, value2=%d, (value1=value2)*2=%d", value1, value2, value3);
value1 = 20;
value2 = 10;
value3 = ((value1/value2)*value2)+(value1%value2);
printf("\nvalue1=%d, value2=%d, ((value1/value2)*value2)+(value1%value2)=%d", value1, value2, value3);
return 0;
}
Some C Refrence Books
main Book is Lets C By Yashwant Kanitkar obviously but here are some other Reference Books
References
1. ‘C’ Odyssey
By: Vijay Mukhi
2. C under UNIX
By: Y.P. Kanetkar
3. Thinking in C
By: Bruce Eckel
4. Let Us C
By: Y.P. Kanetkar
5. Programming in C
By: Dennis Ritchie and Kernighan
Thanks,
Tushar Khoje
References
1. ‘C’ Odyssey
By: Vijay Mukhi
2. C under UNIX
By: Y.P. Kanetkar
3. Thinking in C
By: Bruce Eckel
4. Let Us C
By: Y.P. Kanetkar
5. Programming in C
By: Dennis Ritchie and Kernighan
Thanks,
Tushar Khoje
Weitage
C Programming Topic Wise Weightage
Topics Percentage Weightage Marks
Arrays 12 to 14 % 05 to 07
Structures 12 to 14 % 05 to 07
Pointers 12 to 16 % 06 to 08
Functions 10 to 12 % 04 to 06
Preprocessors 02 to 06 % 01 to 03
File handling 18 to 22 % 09 to 11
Command line arguments 02 to 06 % 01 to 03
Standard Coding Practices 10% 05
Total marks 100% 50
Topics Percentage Weightage Marks
Arrays 12 to 14 % 05 to 07
Structures 12 to 14 % 05 to 07
Pointers 12 to 16 % 06 to 08
Functions 10 to 12 % 04 to 06
Preprocessors 02 to 06 % 01 to 03
File handling 18 to 22 % 09 to 11
Command line arguments 02 to 06 % 01 to 03
Standard Coding Practices 10% 05
Total marks 100% 50
Reverse of a String using Recursion
/* C Program to print Reverse of String Using Recursion */
#include
int main()
{
int num,rev;
printf("\nEnter a number :");
scanf("%d",&num);
rev=reverse(num);
printf("\nAfter reverse the no is :%d",rev);
return 0;
}
int sum=0,r;
reverse(int num)
{
if(num)
{
r=num%10;
sum=sum*10+r;
reverse(num/10);
}
else
return sum;
return sum;
}
#include
int main()
{
int num,rev;
printf("\nEnter a number :");
scanf("%d",&num);
rev=reverse(num);
printf("\nAfter reverse the no is :%d",rev);
return 0;
}
int sum=0,r;
reverse(int num)
{
if(num)
{
r=num%10;
sum=sum*10+r;
reverse(num/10);
}
else
return sum;
return sum;
}
To Print Prime Factors of a number
function program to get Sum Average And SD of 5
/* function program to get Sum Average And SD of 5 */
#include
#include
int calc (float a, float b, float c, float d, float e, float *sum, float *avg,float *sd);
int main()
{
float a, b, c, d, e, sum=0.0, avg=0.0;
float sd=0.0;
printf("Enter Five Numbers:");
scanf("%f %f %f %f %f",&a,&b,&c,&d,&e);
calc (a, b, c, d, e, &sum, &avg, &sd);
printf("\nSum=%f", sum);
printf("\nAverage=%f", avg);
printf("\nStandard Deviation=%f\n", sd);
getchar();
return 0;
}
calc (float a, float b, float c, float d, float e, float *sum, float *avg, float *sd)
{
float Calc=0.0;
*sum = a+b+c+d+e;
*avg = *sum / 5.0;
Calc += ( a - *avg) * ( a - *avg);
Calc += ( b - *avg) * ( b - *avg);
Calc += ( c - *avg) * ( c - *avg);
Calc += ( d - *avg) * ( d - *avg);
Calc += ( e - *avg) * ( e - *avg);
*sd = sqrt((double)Calc/5.0);
}
Thanks,
Tushar Khoje
#include
#include
int calc (float a, float b, float c, float d, float e, float *sum, float *avg,float *sd);
int main()
{
float a, b, c, d, e, sum=0.0, avg=0.0;
float sd=0.0;
printf("Enter Five Numbers:");
scanf("%f %f %f %f %f",&a,&b,&c,&d,&e);
calc (a, b, c, d, e, &sum, &avg, &sd);
printf("\nSum=%f", sum);
printf("\nAverage=%f", avg);
printf("\nStandard Deviation=%f\n", sd);
getchar();
return 0;
}
calc (float a, float b, float c, float d, float e, float *sum, float *avg, float *sd)
{
float Calc=0.0;
*sum = a+b+c+d+e;
*avg = *sum / 5.0;
Calc += ( a - *avg) * ( a - *avg);
Calc += ( b - *avg) * ( b - *avg);
Calc += ( c - *avg) * ( c - *avg);
Calc += ( d - *avg) * ( d - *avg);
Calc += ( e - *avg) * ( e - *avg);
*sd = sqrt((double)Calc/5.0);
}
Thanks,
Tushar Khoje
C Program to Print the Fibonacci Series nad in various Options
/*C Program to print the Fibonacci series with various Options*/
#include
#include
//Function Prototype
void fibo(int);
void fiborec(int,int,int);
void main()
{
int i,num1=0,num2=1;
clrscr();
//Accept User Input
printf("Please enter the no. of terms value : ");
scanf("%d",&i);
//To Call Normal Function
printf("\nWithout Recursion\n");
printf("%5d%5d",num1,num2);
fibo(i-3);
//To Call Recursive Function
printf("\n\nUsing Recursion\n");
printf("%5d%5d",num1,num2);
fiborec(num1,num2,i-2);
getch();
}//End of main()
void fibo(int n)
{
int i,previous=1,sum=1,result=0;
for(i=0;i<=n;i++)
{
sum=previous+result;
result=previous;
previous=sum;
printf("%5d",sum);
}//End of For Loop
}//End of fibo()
void fiborec(int previous,int num2,int count)
{
int sum;
sum = previous + num2;
printf("%5d",sum);
count--;
if(count>0)//Exit Condition (Very Important in Recursion)
{
fiborec(num2,sum,count);
}
}//End of fiborec()
/*OUTPUT
--------
Please enter the no. of terms value : 12
Without Recursion
0 1 1 2 3 5 8 13 21 34 55 89
Using Recursion
0 1 1 2 3 5 8 13 21 34 55 89 */
-----------------------------------
-----------------------------------
#include
#include
//Function Prototype
void fibo(int);
void fiborec(int,int,int);
void main()
{
int i,num1=0,num2=1;
clrscr();
//Accept User Input
printf("Please enter the no. of terms value : ");
scanf("%d",&i);
//To Call Normal Function
printf("\nWithout Recursion\n");
printf("%5d%5d",num1,num2);
fibo(i-3);
//To Call Recursive Function
printf("\n\nUsing Recursion\n");
printf("%5d%5d",num1,num2);
fiborec(num1,num2,i-2);
getch();
}//End of main()
void fibo(int n)
{
int i,previous=1,sum=1,result=0;
for(i=0;i<=n;i++)
{
sum=previous+result;
result=previous;
previous=sum;
printf("%5d",sum);
}//End of For Loop
}//End of fibo()
void fiborec(int previous,int num2,int count)
{
int sum;
sum = previous + num2;
printf("%5d",sum);
count--;
if(count>0)//Exit Condition (Very Important in Recursion)
{
fiborec(num2,sum,count);
}
}//End of fiborec()
/*OUTPUT
--------
Please enter the no. of terms value : 12
Without Recursion
0 1 1 2 3 5 8 13 21 34 55 89
Using Recursion
0 1 1 2 3 5 8 13 21 34 55 89 */
-----------------------------------
-----------------------------------
To Print Pascle Triangle
The C Program for it is :
#include
void main()
{
int a[10][10];
int i,j,c,n;
printf("Enter how many lines do you want");
scanf("%d",&n);
a[1][1]=1;
printf("%5d",a[1][1]);
a[2][1]=1;a[2][2]=2;a[2][3]=1;
printf("%d %d %d",a[2][1],a[2][2],a[2][3]);
for(i=3;i<=n;i++)
{
a[i][1]=1;
printf("%d",a[i][1]);
j=2;c=3;
while(j<=i)
{
a[i][j]=a[i-1][c-1]+a[i-1][c-2];
printf("%5d",a[i][j]);
c=c+1;
j=j+1;
}
a[i][j]=1;
printf("%d",a[i][j]);
}
}
thanks,
Tushar Khoje
#include
void main()
{
int a[10][10];
int i,j,c,n;
printf("Enter how many lines do you want");
scanf("%d",&n);
a[1][1]=1;
printf("%5d",a[1][1]);
a[2][1]=1;a[2][2]=2;a[2][3]=1;
printf("%d %d %d",a[2][1],a[2][2],a[2][3]);
for(i=3;i<=n;i++)
{
a[i][1]=1;
printf("%d",a[i][1]);
j=2;c=3;
while(j<=i)
{
a[i][j]=a[i-1][c-1]+a[i-1][c-2];
printf("%5d",a[i][j]);
c=c+1;
j=j+1;
}
a[i][j]=1;
printf("%d",a[i][j]);
}
}
thanks,
Tushar Khoje
to reverse of the String
the Program to reverse the String is as follows..
#include
#include
main()
{
char str[50],revstr[50];
int i=0,j=0,a;
printf("Enter the string to be reversed : ");
scanf("%s",str);
a=strlen(str);
for(i=a-1;i>=0;i--)
{
revstr[j]=str[i];
j++;
}
revstr[j]='\0';
printf("Input String : %s",str);
printf("\nOutput String : %s",revstr);
getch();
}
thanks,
Tushar Khoje
#include
#include
main()
{
char str[50],revstr[50];
int i=0,j=0,a;
printf("Enter the string to be reversed : ");
scanf("%s",str);
a=strlen(str);
for(i=a-1;i>=0;i--)
{
revstr[j]=str[i];
j++;
}
revstr[j]='\0';
printf("Input String : %s",str);
printf("\nOutput String : %s",revstr);
getch();
}
thanks,
Tushar Khoje
To print Reverse number
To print Reverse number
#include
int main()
{
int n;
Printf("Enter the Number you want to Reverse");
Scanf("%d",&n);
printf("\n The Reverse number of the Given NUmber is:");
n=n%10;
printf("%d",n);
}
OUTPUT
Enter the Number you want to Reverse 567446874
The Reverse number of the Given NUmber is: 478644765
Thanks,
Tushar Khoje
#include
int main()
{
int n;
Printf("Enter the Number you want to Reverse");
Scanf("%d",&n);
printf("\n The Reverse number of the Given NUmber is:");
n=n%10;
printf("%d",n);
}
OUTPUT
Enter the Number you want to Reverse 567446874
The Reverse number of the Given NUmber is: 478644765
Thanks,
Tushar Khoje
To print Average Marks of Five Subjects
/* C Program to PRont To print Average Marks of Five Subjects */
#include
int main()
{
int s1,s2,s3,s4,s5;
float avg;
Printf("Enter the marks Of 5 Subjects one by one:\t");
scanf("%d %d %d %d %d",&s1, &s2, &s3, &s4, &s5);
avg=(s1+s2+s3+s4+s5)/5;
printf("\nThe Average mark of the 5 subjects you have Entered is %f",avg);
}
OUTPUT
Enter the marks Of 5 Subjects one by one: 70 54 68 99 57
The Average mark of the 5 subjects you have Entered is 69.60
thanks,
Tushar Khoje
#include
int main()
{
int s1,s2,s3,s4,s5;
float avg;
Printf("Enter the marks Of 5 Subjects one by one:\t");
scanf("%d %d %d %d %d",&s1, &s2, &s3, &s4, &s5);
avg=(s1+s2+s3+s4+s5)/5;
printf("\nThe Average mark of the 5 subjects you have Entered is %f",avg);
}
OUTPUT
Enter the marks Of 5 Subjects one by one: 70 54 68 99 57
The Average mark of the 5 subjects you have Entered is 69.60
thanks,
Tushar Khoje
C Prog to find Sum of the Digits
Maths Paper of Postal Assistance
My brother have applied for the post of postal assistance and he had studied the following paper which was previously asked ...
he scored good marks in this year postal assistance exam also
the Sample paper is as follows
@ last i have provided the Answers also
Directions—(Q. 1—5) What should come in the place of question mark (?) in the following questions?
1. (5/4)+(14/9)x(13/8)÷(13/2)=?
(A) 17
(B) 27
(C) 42
(D) 18
(E) 59/36
2. If 289= 17x1/5;then x=?
(A) 16
(B) 8
(C) 32
(D)2/5
(E) None of these
3. 0.01 x0.1—0.001÷10+ 0.01=?
(A) 0.01009
(B) 0.0101
(C) 0.19
(D) 0.109
(B) 0.0109
4. If x% of 500 =y% of 300 and x% of y% of 200 = 60, then x =?
(A) 10?2
(B) 20?2
(C) 15?2
(D) 30?2
(E) None of these
5.
16×32 _ _ _ = 9×27x81
(A) (2/3)12
(B)(2/3)11
(C) (2/3)13
(D) (2/3)14
(E) None of these
Directions—(Q. 6—10) What approximate value should come in place of question mark (?) in the following questions?
6. 23.999 x 9.004 x 16.997 =?
(A) 3200
(B) 4100
(C) 2700
(D) 3700
(E) 4500
7. (52/9)x(44/5)x(29/3)=?
(A) 490
(B) 590
(C) 540
(D)460
(E) 520
8. 5940÷28÷6=?
(A) 40
(B)35
(C) 46
(D) 52
(E) 27
9. 15.5% of 850 + 24.8% of 650=?
(A) 295
(B) 330
(C) 270
(D) 375
(E) 220
10. 2?230=?
(A) 54
(B) 59
(C) 41
(D) 37
(E) 47
Directions—(Q. 11 and 12) In the following number series only one is wrong. Find out the wrong number.
11.
8,11,17,47, 128, 371, 1100
(A) 11
(B) 47
(C) 17
(D) 371
(E) 128
12.
1,5, 13, 31, 61, 125, 253
(A)1
(B)5
(C) 31
(D) 61
(E) 125
13. Aman’s expense is 30% more than Vimal’s expense and Vimal’s expense is 10% less than Raman’s expense. If the sum of their expenses is Rs. 6,447, then what would be the Aman’s expense?
(A) Rs. 2,200
(B) Rs. 2,457
(C) Rs. 1,890
(D) Rs. 2,100
(E) None of these
14. In a test, a candidate secured 336 marks out of maximum marks ‘x’. If the maximum marks ‘x’ were converted into 400 marks, he would have secured 192 marks. What were the maximum marks of the test?
(A) 700
(8) 750
(C) 500
(D) 650
(E) 650
15. An AC consumes 8 units of electricity in 30 minutes and a bulb consumes 18 units of electricity in 6 hours.
How much total unit of electricity will both AC and bulb consume in 8 days if they run 10 hours a day?
(A) 1280 units
(B) 1528 units
(C) 1248 units
(D) 1520 units
(E) 1620 units
16. What amount a man would have received on a principal of Rs. 4,000 after two years simple interest @5 p.c.p.a. ?
(A) Rs.4,161
(B) Rs. 5,200
(C) Rs. 4,400
(D) Rs. 4,100
(E) Rs.4,190
17. Four years ago Shyam’s age was 3/4 times that of Ram. Four years
hence, Shyam’s age will be 5/6 times that of Ram. What is the present age of Shyam?
(A) 15 years
(B) 20 years
(C) 16 years
(D) 24 years
(E) 8 years
18. The average marks in Science subject of a class of 20 students is 68. If the marks of two students were misread as 48 and 65 of the actual marks 72 and 6 respectively, then what would be the correct average?
(A) 68.5
(B) 69
(C) 69.5
(D) 70
(E) 66
19. A school team has eight volleyball players. A five-member team and a captain will be selected out of these eight players. How many different selections can be made?
(A) 224
(B) 112
(C) 56
(D) 88
(E) None of these
20. A bus started its journey from Kamgarh and reached Devgarh in 44 minutes with its average speed of 50 km/hour. If the average speed of the bus is increased by 5 km/hour, how much time will it take to cover the same distance?
(A)40.minutes
(B)38 minutes
(C)36 minutes
(D) 31 minutes
(E) 49 minutes
Directions—
(Q. 21—25) In the following questions two equations numbered I and II are given. You have to solve both the equations and Give answer If
(A) x > y
(B) x>=y
(C) x
(D) x<=y
(B) x = y or the relationship can not be established
21. I x2-1=0
II y2+4y+3=0
22. I x2-7x+12=0
II y2-12y+32=0
23. I x3-371=629
II y3-543=788
24. I 5x+2y=31
II 3x+7y=36
25. I 2x2+11x+12=0
II 5y2+27y+10=0
Directions—(Q. 26-30) Study the information carefully to answer the questions that follows.
In an annual function, 504 children participated. The ratio of number of girls to the number of boys is 5: 3 respectively. Out of the total girls, 20% participated in dance and remaining girls participated in solo song, group song and drama in the ratio of 2 :3: 4 respectively. Two- third of the total boys participated in group song and remaining boys participated in solo song and dance in the ratio 4 : 5 respectively.
26. What is the approximate percentage of the boys who have participated in dance out of the total number of boys?
(A)19%
(B) 23%
(C)16%
(D) 27%
(E)14%
27. What is the approximate percentage of the girls participated in solo song out of all the total participants?
(A)11%
(B) 15%
(C) 6%
(D) 20%
(E)18%
28, What is the total number of girls who have participated in group song and drama together?
(A)192
(B) 196
(C)184
(D) 168
(E)175
29. What is the ratio between number of boys to the number of girls respectively who have participated in solo song?
(A)1:2
(B) 2:1
(C)4:3
(D) 3:2
(E) None of these
30. What is the difference between the number of boys and girls who have participated in dance?
(A)63
(B)35
(C)28
(D)126
(E) None of these
31. The sum of four consecutive even numbers is 284. What would be the smallest number?
(A)72
(B) 74
(C)68
(D) 66
(E)70
32. If{(a-b)2-(a+b)2)}/(-4a)=x/y
On simplifying the above mentioned equation, what will be the equation?
(A)xy=b
(B) bx=y
(C)by=x
(D) ab=x
(E) ay=x
33. 1/5 of 3/5 of 6/5 of a number = 54. What is the number?
(A) 280
(B) 250
(C) 300
(D) 150
(E) 160
34. The average age of the family of five members is 24. If the present age of youngest member is 8 years. then what was the average age of the family at the time of the birth of the youngest member?
(A)20 years
(B) 16 years
(C)12 years
(D) 18 years
(E)21 years
35. A candidate appearing for an examination has to secure 35% marks to pass. But he secured only 40 marks and failed by 30 marks. What would be the maximum marks of test?
(A)280
(B)180
(C)200
(D)150
(E)210
36.The length of a rectangular floor is twice its breadth. If Rs. 256 is required to paint the floor at the rate of Rs. 2 per square metres, then what would be the length of floor?
(A)16 metre
(B) 8 metre
(C)12 metre
(D) 32 metre
(E) 20 metre
37.Angle ‘A’ of the quadrilateral ABCD is 26° less than angle B. Angle 8 is twice angle C and angle C is 10° more than the angle D. What would be the measure of angle A?
(A)104°
(B)126°
(C)56°
(D)132°
(E)106°
38.A number when subtracted by 1/7th of itself gives the same value as the sum of all the angles of a triangle. What is the number?
(A) 224
(B) 210
(C) 140
(D) 350
(E) 187
39 A man walked at a speed of 4 km/hr from point A to B and came back from point B to A at the speed of 6 km/hr. What would be the ratio between the time taken by man in walking from point A to B to point B to A respectively?
(A) 5:3
(B) 2:3
(C) 2:1
(D) 4:3
(E) 3:2
40. In every 30 minutes the time of watch increases by 3 minutes After setting the correct time at 5 AM, what time will the watch show after 6 hours?
(A)10:54 a.m
(B) 11:30 a.m
(C)11:36 a.m
(D) 11:42 a.m
(E)11:38 p.m
Directions—(Q. 41-45) Study following profile of Parliament care fully and answer the questions given below it
Profite of Parliament in Year XXXX Total members in Parliament— 640 (490 from Lok Sabha and 150 from Rajya Sabha)
Lok Sabha (No. of Members) Party Rajya Sabha (No. of Members)
280 A 90
180 B 45
30 Others 15
490 Total 150
Sex
435 Male 120
55 Female 30
Religion
348 Hindus 85
42 Muslims 20
75 Sikhs 35
25 Christian 10
Profession
300 Graduates 50
45 Businessmen 19
60 Educators 11
85 Unknown 70
41. What is e approximate percentage of the Muslim members in Lok Sabha?
(A) 9%
(B) 11%
(C) 13%
(D) 14%
(E) 7%
42. In Rajya Sabha if 30 male members were replaced by female members, then what is the ratio of male members
female members respectively?
(A) 3:1
(B) 3:2
(C) 1:3
(D) 2:3
(E) 2:1
43. What percentage of members in Parliament are businessmen?
(A) 8%
(B) 20%
(C) 30%
(D) 18%
(F) 10%
44. If all the ‘others’ party members of Lok Sabha join party ‘B’ then hat would be the ratio between members of party ‘A’ to the members of party ‘B’ respectively?
(A)3:2
(B)6:5
(C)4:3
(D) 7:6
(E)4:5
45. Out of total members of party ‘B’ in Parliament, what percentage of the members belong to Rajya Sabha?
(A) 30%
(B) 35%
(C) 25%
(C) 20%
(E) 15%
Directions—(Q. 46—50) Study the following pie-charts carefully and answer the questions below it.
The entire fund that school gets from different sources is equal to Rs. 500 lakhs
Sources of Funds In School
NGO 15%
Donation 35%
Govt Agencies 45%
internal Source 5%
Uses of Funds by School
School Maintenance 20%
Reserved 35%
Payment 30%
Scholarship 15%
46. What is the difference between the funds acquired by school from NGO’s and internal sources?
(A) Rs.50 lakhs
(B) Rs. 45 lakhs
(C) Rs. 75 lakhs
(D) Rs. 25 lakhs
(E) None of these
47.If the school managed ‘school maintenance’ from the ‘government agencies’ fund only, then how much fund from government agencies would still left for other use?
(A) Rs. 120 lakhs
(B) Rs. 150 lakhs
(C) Rs. 110 lalchs
(D) Rs. 95 lakhs
(E) None of these
48. If scholarship has to he paid out of the donation fund, then what is the approximate per cent of donation fund used for this purpose?
(A)43%
(B)53%
(C)37%
(D)47%
(E)32%
49. What is the total amount used by the school for payment
(A)Rs 100 lakhs
(B) Rs 110 lakhs
(C)Rs. 150 lakhs
(D)Rs. 140 lakhs
(E) None of these
50. What amount of the fund is acquired by the school from government agencies?
(A) Rs. 220 lakhs
(B) Rs, 310 lakhs
(C) Rs. 255 lakhs
(D) Rs. 225 lakhs
(E) None of these
ANSWERS:
1 E
2 C
3 E
4 D
5 D
6 D
7 C
8 B
9 A
10 E
11 C
12 C
13 B
14 A
15 D
16 C
17 C
18 B
19 E
20 A
21 B
22 D
23 C
24 A
25 E
26 A
27 A
28 B
29 A
30 C
31 C
32 C
33 C
34 A
35 C
36 A
37 E
38 B
39 E
40 C
41 A
42 B
43 E
44 C
45 D
46 A
47 E
48 A
49 C
50 D
Thanks
Tushar Khoje
he scored good marks in this year postal assistance exam also
the Sample paper is as follows
@ last i have provided the Answers also
Directions—(Q. 1—5) What should come in the place of question mark (?) in the following questions?
1. (5/4)+(14/9)x(13/8)÷(13/2)=?
(A) 17
(B) 27
(C) 42
(D) 18
(E) 59/36
2. If 289= 17x1/5;then x=?
(A) 16
(B) 8
(C) 32
(D)2/5
(E) None of these
3. 0.01 x0.1—0.001÷10+ 0.01=?
(A) 0.01009
(B) 0.0101
(C) 0.19
(D) 0.109
(B) 0.0109
4. If x% of 500 =y% of 300 and x% of y% of 200 = 60, then x =?
(A) 10?2
(B) 20?2
(C) 15?2
(D) 30?2
(E) None of these
5.
16×32 _ _ _ = 9×27x81
(A) (2/3)12
(B)(2/3)11
(C) (2/3)13
(D) (2/3)14
(E) None of these
Directions—(Q. 6—10) What approximate value should come in place of question mark (?) in the following questions?
6. 23.999 x 9.004 x 16.997 =?
(A) 3200
(B) 4100
(C) 2700
(D) 3700
(E) 4500
7. (52/9)x(44/5)x(29/3)=?
(A) 490
(B) 590
(C) 540
(D)460
(E) 520
8. 5940÷28÷6=?
(A) 40
(B)35
(C) 46
(D) 52
(E) 27
9. 15.5% of 850 + 24.8% of 650=?
(A) 295
(B) 330
(C) 270
(D) 375
(E) 220
10. 2?230=?
(A) 54
(B) 59
(C) 41
(D) 37
(E) 47
Directions—(Q. 11 and 12) In the following number series only one is wrong. Find out the wrong number.
11.
8,11,17,47, 128, 371, 1100
(A) 11
(B) 47
(C) 17
(D) 371
(E) 128
12.
1,5, 13, 31, 61, 125, 253
(A)1
(B)5
(C) 31
(D) 61
(E) 125
13. Aman’s expense is 30% more than Vimal’s expense and Vimal’s expense is 10% less than Raman’s expense. If the sum of their expenses is Rs. 6,447, then what would be the Aman’s expense?
(A) Rs. 2,200
(B) Rs. 2,457
(C) Rs. 1,890
(D) Rs. 2,100
(E) None of these
14. In a test, a candidate secured 336 marks out of maximum marks ‘x’. If the maximum marks ‘x’ were converted into 400 marks, he would have secured 192 marks. What were the maximum marks of the test?
(A) 700
(8) 750
(C) 500
(D) 650
(E) 650
15. An AC consumes 8 units of electricity in 30 minutes and a bulb consumes 18 units of electricity in 6 hours.
How much total unit of electricity will both AC and bulb consume in 8 days if they run 10 hours a day?
(A) 1280 units
(B) 1528 units
(C) 1248 units
(D) 1520 units
(E) 1620 units
16. What amount a man would have received on a principal of Rs. 4,000 after two years simple interest @5 p.c.p.a. ?
(A) Rs.4,161
(B) Rs. 5,200
(C) Rs. 4,400
(D) Rs. 4,100
(E) Rs.4,190
17. Four years ago Shyam’s age was 3/4 times that of Ram. Four years
hence, Shyam’s age will be 5/6 times that of Ram. What is the present age of Shyam?
(A) 15 years
(B) 20 years
(C) 16 years
(D) 24 years
(E) 8 years
18. The average marks in Science subject of a class of 20 students is 68. If the marks of two students were misread as 48 and 65 of the actual marks 72 and 6 respectively, then what would be the correct average?
(A) 68.5
(B) 69
(C) 69.5
(D) 70
(E) 66
19. A school team has eight volleyball players. A five-member team and a captain will be selected out of these eight players. How many different selections can be made?
(A) 224
(B) 112
(C) 56
(D) 88
(E) None of these
20. A bus started its journey from Kamgarh and reached Devgarh in 44 minutes with its average speed of 50 km/hour. If the average speed of the bus is increased by 5 km/hour, how much time will it take to cover the same distance?
(A)40.minutes
(B)38 minutes
(C)36 minutes
(D) 31 minutes
(E) 49 minutes
Directions—
(Q. 21—25) In the following questions two equations numbered I and II are given. You have to solve both the equations and Give answer If
(A) x > y
(B) x>=y
(C) x
(D) x<=y
(B) x = y or the relationship can not be established
21. I x2-1=0
II y2+4y+3=0
22. I x2-7x+12=0
II y2-12y+32=0
23. I x3-371=629
II y3-543=788
24. I 5x+2y=31
II 3x+7y=36
25. I 2x2+11x+12=0
II 5y2+27y+10=0
Directions—(Q. 26-30) Study the information carefully to answer the questions that follows.
In an annual function, 504 children participated. The ratio of number of girls to the number of boys is 5: 3 respectively. Out of the total girls, 20% participated in dance and remaining girls participated in solo song, group song and drama in the ratio of 2 :3: 4 respectively. Two- third of the total boys participated in group song and remaining boys participated in solo song and dance in the ratio 4 : 5 respectively.
26. What is the approximate percentage of the boys who have participated in dance out of the total number of boys?
(A)19%
(B) 23%
(C)16%
(D) 27%
(E)14%
27. What is the approximate percentage of the girls participated in solo song out of all the total participants?
(A)11%
(B) 15%
(C) 6%
(D) 20%
(E)18%
28, What is the total number of girls who have participated in group song and drama together?
(A)192
(B) 196
(C)184
(D) 168
(E)175
29. What is the ratio between number of boys to the number of girls respectively who have participated in solo song?
(A)1:2
(B) 2:1
(C)4:3
(D) 3:2
(E) None of these
30. What is the difference between the number of boys and girls who have participated in dance?
(A)63
(B)35
(C)28
(D)126
(E) None of these
31. The sum of four consecutive even numbers is 284. What would be the smallest number?
(A)72
(B) 74
(C)68
(D) 66
(E)70
32. If{(a-b)2-(a+b)2)}/(-4a)=x/y
On simplifying the above mentioned equation, what will be the equation?
(A)xy=b
(B) bx=y
(C)by=x
(D) ab=x
(E) ay=x
33. 1/5 of 3/5 of 6/5 of a number = 54. What is the number?
(A) 280
(B) 250
(C) 300
(D) 150
(E) 160
34. The average age of the family of five members is 24. If the present age of youngest member is 8 years. then what was the average age of the family at the time of the birth of the youngest member?
(A)20 years
(B) 16 years
(C)12 years
(D) 18 years
(E)21 years
35. A candidate appearing for an examination has to secure 35% marks to pass. But he secured only 40 marks and failed by 30 marks. What would be the maximum marks of test?
(A)280
(B)180
(C)200
(D)150
(E)210
36.The length of a rectangular floor is twice its breadth. If Rs. 256 is required to paint the floor at the rate of Rs. 2 per square metres, then what would be the length of floor?
(A)16 metre
(B) 8 metre
(C)12 metre
(D) 32 metre
(E) 20 metre
37.Angle ‘A’ of the quadrilateral ABCD is 26° less than angle B. Angle 8 is twice angle C and angle C is 10° more than the angle D. What would be the measure of angle A?
(A)104°
(B)126°
(C)56°
(D)132°
(E)106°
38.A number when subtracted by 1/7th of itself gives the same value as the sum of all the angles of a triangle. What is the number?
(A) 224
(B) 210
(C) 140
(D) 350
(E) 187
39 A man walked at a speed of 4 km/hr from point A to B and came back from point B to A at the speed of 6 km/hr. What would be the ratio between the time taken by man in walking from point A to B to point B to A respectively?
(A) 5:3
(B) 2:3
(C) 2:1
(D) 4:3
(E) 3:2
40. In every 30 minutes the time of watch increases by 3 minutes After setting the correct time at 5 AM, what time will the watch show after 6 hours?
(A)10:54 a.m
(B) 11:30 a.m
(C)11:36 a.m
(D) 11:42 a.m
(E)11:38 p.m
Directions—(Q. 41-45) Study following profile of Parliament care fully and answer the questions given below it
Profite of Parliament in Year XXXX Total members in Parliament— 640 (490 from Lok Sabha and 150 from Rajya Sabha)
Lok Sabha (No. of Members) Party Rajya Sabha (No. of Members)
280 A 90
180 B 45
30 Others 15
490 Total 150
Sex
435 Male 120
55 Female 30
Religion
348 Hindus 85
42 Muslims 20
75 Sikhs 35
25 Christian 10
Profession
300 Graduates 50
45 Businessmen 19
60 Educators 11
85 Unknown 70
41. What is e approximate percentage of the Muslim members in Lok Sabha?
(A) 9%
(B) 11%
(C) 13%
(D) 14%
(E) 7%
42. In Rajya Sabha if 30 male members were replaced by female members, then what is the ratio of male members
female members respectively?
(A) 3:1
(B) 3:2
(C) 1:3
(D) 2:3
(E) 2:1
43. What percentage of members in Parliament are businessmen?
(A) 8%
(B) 20%
(C) 30%
(D) 18%
(F) 10%
44. If all the ‘others’ party members of Lok Sabha join party ‘B’ then hat would be the ratio between members of party ‘A’ to the members of party ‘B’ respectively?
(A)3:2
(B)6:5
(C)4:3
(D) 7:6
(E)4:5
45. Out of total members of party ‘B’ in Parliament, what percentage of the members belong to Rajya Sabha?
(A) 30%
(B) 35%
(C) 25%
(C) 20%
(E) 15%
Directions—(Q. 46—50) Study the following pie-charts carefully and answer the questions below it.
The entire fund that school gets from different sources is equal to Rs. 500 lakhs
Sources of Funds In School
NGO 15%
Donation 35%
Govt Agencies 45%
internal Source 5%
Uses of Funds by School
School Maintenance 20%
Reserved 35%
Payment 30%
Scholarship 15%
46. What is the difference between the funds acquired by school from NGO’s and internal sources?
(A) Rs.50 lakhs
(B) Rs. 45 lakhs
(C) Rs. 75 lakhs
(D) Rs. 25 lakhs
(E) None of these
47.If the school managed ‘school maintenance’ from the ‘government agencies’ fund only, then how much fund from government agencies would still left for other use?
(A) Rs. 120 lakhs
(B) Rs. 150 lakhs
(C) Rs. 110 lalchs
(D) Rs. 95 lakhs
(E) None of these
48. If scholarship has to he paid out of the donation fund, then what is the approximate per cent of donation fund used for this purpose?
(A)43%
(B)53%
(C)37%
(D)47%
(E)32%
49. What is the total amount used by the school for payment
(A)Rs 100 lakhs
(B) Rs 110 lakhs
(C)Rs. 150 lakhs
(D)Rs. 140 lakhs
(E) None of these
50. What amount of the fund is acquired by the school from government agencies?
(A) Rs. 220 lakhs
(B) Rs, 310 lakhs
(C) Rs. 255 lakhs
(D) Rs. 225 lakhs
(E) None of these
ANSWERS:
1 E
2 C
3 E
4 D
5 D
6 D
7 C
8 B
9 A
10 E
11 C
12 C
13 B
14 A
15 D
16 C
17 C
18 B
19 E
20 A
21 B
22 D
23 C
24 A
25 E
26 A
27 A
28 B
29 A
30 C
31 C
32 C
33 C
34 A
35 C
36 A
37 E
38 B
39 E
40 C
41 A
42 B
43 E
44 C
45 D
46 A
47 E
48 A
49 C
50 D
Thanks
Tushar Khoje
Wednesday, December 8, 2010
game hitman silent assassin.
Hey did you play d game hitman scilent assasine?
I have played all parts and i would like to tell you guys that its d best game that i like in all ascepts.
Its pc requirements are
cpu - p3 or equivakent
ram - 192 mb
graphics - 32 mb 3d card and 100% directx 8.1 compatible
sound - windows compatible sound
cd-rom - 8x cd rom
hard drive - 800 mb free hd space.
When you complete the game and if u want to add cheats to the game then its very simple.
Just right click on d game icön.
Click properties.
Click find target.
Now the folder where game is installed will open.
Open file hitman2.ini in notepad.
And add these lines @ the bottom which are case sensitive,
"EnableConsole 1"
"EnableCheats 1"
and just save the file and run the game in the console type the cheats and they wil be activated nw.
Thank you,
Tushar khoje.
I have played all parts and i would like to tell you guys that its d best game that i like in all ascepts.
Its pc requirements are
cpu - p3 or equivakent
ram - 192 mb
graphics - 32 mb 3d card and 100% directx 8.1 compatible
sound - windows compatible sound
cd-rom - 8x cd rom
hard drive - 800 mb free hd space.
When you complete the game and if u want to add cheats to the game then its very simple.
Just right click on d game icön.
Click properties.
Click find target.
Now the folder where game is installed will open.
Open file hitman2.ini in notepad.
And add these lines @ the bottom which are case sensitive,
"EnableConsole 1"
"EnableCheats 1"
and just save the file and run the game in the console type the cheats and they wil be activated nw.
Thank you,
Tushar khoje.
Monday, December 6, 2010
Games that i play
Hey guys,
hi,
today i wil tel u that which games i play d most and about which games i could tel you the intresting things.
1. A3 mania
2. Hitman
3. Hitman 2 : scilent assign
4. Hitman 3 : contracts
5. Hitman 4 : blood money.
6. Nfs underground
7. Nfs underground 2
8. Nfs most wanted
9. Nfs most wanted (black edition)
10. Nfs carbon
11. Nfs shift
12. Gta 3 liberty city
13. Gta 4 vice city
14. Gta 5 san andreases.
15. Gta 6 IV welcome to america
16. Max payne
17. Max payne 2
18. Max payne 3
19. WWE RAW
20. Counter strike cs 1.6
21. Counter strhke condition zero
22. Cricket 2007
23. Cricket 2007 ipl patch
24. Igi 1
25. Igi 2 i'm going in
26. Igi 3 covert strike
27. Art of war
28. Art of war 2
29. Blood
30. Blood 2 rayne
31. Golden gun.
32. Aggresor 16
33. Blade.
And many more also.
Read my next post so that you could get sum very intresting informations which are very helpful to you, while playing games.
Thanks,
Tushar khoje.
hi,
today i wil tel u that which games i play d most and about which games i could tel you the intresting things.
1. A3 mania
2. Hitman
3. Hitman 2 : scilent assign
4. Hitman 3 : contracts
5. Hitman 4 : blood money.
6. Nfs underground
7. Nfs underground 2
8. Nfs most wanted
9. Nfs most wanted (black edition)
10. Nfs carbon
11. Nfs shift
12. Gta 3 liberty city
13. Gta 4 vice city
14. Gta 5 san andreases.
15. Gta 6 IV welcome to america
16. Max payne
17. Max payne 2
18. Max payne 3
19. WWE RAW
20. Counter strike cs 1.6
21. Counter strhke condition zero
22. Cricket 2007
23. Cricket 2007 ipl patch
24. Igi 1
25. Igi 2 i'm going in
26. Igi 3 covert strike
27. Art of war
28. Art of war 2
29. Blood
30. Blood 2 rayne
31. Golden gun.
32. Aggresor 16
33. Blade.
And many more also.
Read my next post so that you could get sum very intresting informations which are very helpful to you, while playing games.
Thanks,
Tushar khoje.
Updated list of Games that i play
Hey guys,
hi,
today i wil tel u that which games i play d most and about which games i could tel you the intresting things.
1. A3 mania
2. Hitman
3. Hitman 2 : scilent assign
4. Hitman 3 : contracts
5. Hitman 4 : blood money.
6. Nfs underground
7. Nfs underground 2
8. Nfs most wanted
9. Nfs most wanted (black edition)
10. Nfs carbon
11. Nfs shift
12. Gta 3 liberty city
13. Gta 4 vice city
14. Gta 5 san andreases.
15. Gta 6 IV welcome to america
16. Max payne
17. Max payne 2
18. Max payne 3
19. WWE RAW
20. Counter strike cs 1.6
21. Counter strhke condition zero
22. Cricket 2007
23. Cricket 2007 ipl patch
24. Igi 1
25. Igi 2 i'm going in
26. Igi 3 covert strike
27. Art of war
28. Art of war 2
29. Blood
30. Blood 2 rayne
31. Golden gun.
32. Aggresor 16
33. Blade.
34. Devil may Cry
35. Devil may Cry 2
36. Devil may Cry 3
37. Devil may Cry 4
38. Call of Duty
39. Call of Duty 2
40. Call of Duty 3
41. Call of Duty 4
42. Spiderman 2
43. Spiderman 3
44. Gunz The Dual
And many more also.
as i told you about the Hitman Game i will tell you some tricks and many more intresting things regarding this Games. So keep reading the Blog
Thanks,
Tushar khoje.
hi,
today i wil tel u that which games i play d most and about which games i could tel you the intresting things.
1. A3 mania
2. Hitman
3. Hitman 2 : scilent assign
4. Hitman 3 : contracts
5. Hitman 4 : blood money.
6. Nfs underground
7. Nfs underground 2
8. Nfs most wanted
9. Nfs most wanted (black edition)
10. Nfs carbon
11. Nfs shift
12. Gta 3 liberty city
13. Gta 4 vice city
14. Gta 5 san andreases.
15. Gta 6 IV welcome to america
16. Max payne
17. Max payne 2
18. Max payne 3
19. WWE RAW
20. Counter strike cs 1.6
21. Counter strhke condition zero
22. Cricket 2007
23. Cricket 2007 ipl patch
24. Igi 1
25. Igi 2 i'm going in
26. Igi 3 covert strike
27. Art of war
28. Art of war 2
29. Blood
30. Blood 2 rayne
31. Golden gun.
32. Aggresor 16
33. Blade.
34. Devil may Cry
35. Devil may Cry 2
36. Devil may Cry 3
37. Devil may Cry 4
38. Call of Duty
39. Call of Duty 2
40. Call of Duty 3
41. Call of Duty 4
42. Spiderman 2
43. Spiderman 3
44. Gunz The Dual
And many more also.
as i told you about the Hitman Game i will tell you some tricks and many more intresting things regarding this Games. So keep reading the Blog
Thanks,
Tushar khoje.
Saturday, December 4, 2010
Simple C Programs 1. to convert temperature in Degree Celcius and Degree Kelvin
/* C program to accept the temperature in Fahrenheit and convert it into degree Celsius and degree Kelvin*/
#include"stdio.h"
main()
{
float t,a,c,b;
printf("Enter the Temperature in Fahrenheit: \n");
scanf("%f",&a);
/* C is temp in degree Celsius and t in Kelvin*/
c=0.55*(a-32);
t=C+273.15;
printf("/n temperature in degree Celsius is :%f",c);
printf("/n temperature in degree Kelvin is : %f",t);
}
--------------------------------------
this was the program to convert it.
Thanks,
Tushar Khoje
#include"stdio.h"
main()
{
float t,a,c,b;
printf("Enter the Temperature in Fahrenheit: \n");
scanf("%f",&a);
/* C is temp in degree Celsius and t in Kelvin*/
c=0.55*(a-32);
t=C+273.15;
printf("/n temperature in degree Celsius is :%f",c);
printf("/n temperature in degree Kelvin is : %f",t);
}
--------------------------------------
this was the program to convert it.
Thanks,
Tushar Khoje
About New Ideas
hi Guys as i said that i am going to Start the Blogging so i would like to tell that we are going to learn and Discuss about come new topics as follows
1. C Programming
2. Microsoft offices(Word, PowerPoint,Access, Excel)
3. Knowledge about Windows some Tricks, how to make it Good accessible faster
performance and much more ....
4. General Computer h/w Problems.
5. General Computer S/w Problems.
6. Games (which i love to play Too much)
so plz give your suggestion about these items or Problems that you faces or the things you want to know.
i Will found myself Glad to solve that.
thank you,
Tushar Khoje
copyright @ Tushar H. Khoje
------------------------------------------------
Abput New Things
Wednesday, June 23, 2010
Applied Computer Solutions, Huntington Beach
hi there i have one New Great Contact to you,
Applied Computer Solutions (ACS) aims to turn hardware and software into customized computer systems. Founded in 1989, the company designs and installs database, network, Intranet, Internet, and computer security systems. It narrows its focus on servers, storage, security, networking, and compliance practice areas. ACS won't turn other industries away, but it does have specialized divisions that handle its telecommunications, government, and financial services clients. ACS also offers project management services and financing programs such as leasing in addition to its IT services.
Officers:
President and CEO: Sandra F. (Sandy) Davis
COO: Michael A. (Mike) Davis
CFO: Warren Barnes
Contact Information
Applied Computer Solutions
15461 Springdale St.
Huntington Beach, CA 92649
CA Tel. 714-861-2200
Fax 714-842-8795
Competitors:
Hewlett-Packard
HP Enterprise Services
IBM Global Services
join
http://www.infotechse.info/jobs/idevaffiliate.php?id=1606
---------------------------------------------
---------------------------------------------
Applied Computer Solutions (ACS) aims to turn hardware and software into customized computer systems. Founded in 1989, the company designs and installs database, network, Intranet, Internet, and computer security systems. It narrows its focus on servers, storage, security, networking, and compliance practice areas. ACS won't turn other industries away, but it does have specialized divisions that handle its telecommunications, government, and financial services clients. ACS also offers project management services and financing programs such as leasing in addition to its IT services.
Officers:
President and CEO: Sandra F. (Sandy) Davis
COO: Michael A. (Mike) Davis
CFO: Warren Barnes
Contact Information
Applied Computer Solutions
15461 Springdale St.
Huntington Beach, CA 92649
CA Tel. 714-861-2200
Fax 714-842-8795
Competitors:
Hewlett-Packard
HP Enterprise Services
IBM Global Services
join
http://www.infotechse.info/jobs/idevaffiliate.php?id=1606
---------------------------------------------
---------------------------------------------
Sunday, June 13, 2010
Computer Security Glossery normally..
A
Access
Access refers to the right and ability to access certain resources. For example, in order to have access to your online banking, you need to have the right (established by the use of a password) and the ability (a functioning Internet connection) to connect. Some resources have public or open access, meaning that anyone with the ability to connect and use them also has the right.
Access Point
A node or area that can be used to gain permission to and utilize protected resources. The most common use for the term access point is in reference to areas (such as airport terminals or study halls) that allow access to wireless networks.
Adware
Adware is software that displays ads on your computer while you are using it, often in the form of popups. It is almost always installed without your authorization or hidden with another program you installed. Adware is often packaged with spyware which collects information on the user in order to target the ads. Adware can cause dramatic performance decreases.
Anti-virus
Anti-virus means hardware, software, or other means or methods designed to prevent the spread and damage of computer viruses.
Anti-virus Software
Anti-virus software is software that is designed to keep your computer from being damaged, infected, or used by computer viruses as they spread.
Anti-virus Solution
An anti-virus solution is a particular package or group of anti-virus hardware, software, and methods that is presented as a complete protection against viruses.
ATA
ATA is an acronym for advanced technology attachment. What this means is that the circuitry for controlling the hard drive platters and read head of your hard drive are attached to or included internally in your hard drive. See also IDE.
Autofill
Autofill is short for automatic form filler. Password management programs, such as MySecurityVault PRO, that automatically fill web forms are considered much more convenient.
B
Bookmark
Like a bookmark for a book, a bookmark on the web will save your place. You can use your browser to store location information for web sites that you have visited and would like to remember. Bookmarks are often targets for adware—adware programs will often add bookmarks to your list for sites they would like you to visit.
Bot
A bot is a computer program that is meant to perform tasks in place of or in behalf of a human being.
For example, an IRC bot is a bot that chats with humans using IRC. Search engines use bots (also called spiders) to find and index web sites.
Some bots represent a security risk. Bots are deceptive when they impersonate humans without disclosure that they are not human. They can also be employed to harvest e-mail addresses from web sites where they are shown. Some bots are used to look for computers with security weaknesses.
C
Compact Flash
Compact flash is simply a small-footprint flash module. Compact flash modules are very popular for digital cameras. Just like any removable media, they sometimes get lost or replaced by better modules, which means it is important to periodically wipe your data to prevent it from being used for identity theft.
Cookie
Cookies are text files that web sites store on your computer in order to store information about your user session, which pages you've visited, what products you've purchased, etc. For example, online stores often use cookies to collect and store information about their customers in order to provide them with accurate and useful recommendations.
Cookies are usually harmless, but they can contain data that is sensitive and they are only as secure as any other data stored on your computer. There is the occasional rogue web site that uses cookies for illicit purposes, too. To be completely sure that cookies aren't being used against you, it is wise to periodically delete your cookies.
Cyber
Cyber is a prefix that usually means computer or computer network.
Cyberpunk—computer punk
Cyberspace—the virtual "space" of a computer network
Cybernetics—the study of automatic (often computer) control systems for mechanical or biological entities
D
Data Recovery
Data recovery is an attempt to locate and save deleted, formatted, or lost data in a usable form. The best data recovery programs run from separate hard drives and burn files directly to cd in order to avoid any unintentional overwriting of the lost data.
Delete
Delete, in reference to a computer file, means to remove the reference or pointer to a file and flag the space as available for new storage. If you delete a file, the data is still there! That data will remain there until it is overwritten by another file or by a drive wiping program.
Disk
A disk is a disc-shaped storage medium. See also floppy disk and hard disk.
Download
A download is a file that you transfer over the Internet and save to you computer. Downloads are fraught with security risks, especially if you download and install programs. Downloading programs to run on your computer can expose your computer to adware, spyware, viruses, and a host of other malicious programs. Make sure to download files only from sources you trust.
---------------------------------------------------
Access
Access refers to the right and ability to access certain resources. For example, in order to have access to your online banking, you need to have the right (established by the use of a password) and the ability (a functioning Internet connection) to connect. Some resources have public or open access, meaning that anyone with the ability to connect and use them also has the right.
Access Point
A node or area that can be used to gain permission to and utilize protected resources. The most common use for the term access point is in reference to areas (such as airport terminals or study halls) that allow access to wireless networks.
Adware
Adware is software that displays ads on your computer while you are using it, often in the form of popups. It is almost always installed without your authorization or hidden with another program you installed. Adware is often packaged with spyware which collects information on the user in order to target the ads. Adware can cause dramatic performance decreases.
Anti-virus
Anti-virus means hardware, software, or other means or methods designed to prevent the spread and damage of computer viruses.
Anti-virus Software
Anti-virus software is software that is designed to keep your computer from being damaged, infected, or used by computer viruses as they spread.
Anti-virus Solution
An anti-virus solution is a particular package or group of anti-virus hardware, software, and methods that is presented as a complete protection against viruses.
ATA
ATA is an acronym for advanced technology attachment. What this means is that the circuitry for controlling the hard drive platters and read head of your hard drive are attached to or included internally in your hard drive. See also IDE.
Autofill
Autofill is short for automatic form filler. Password management programs, such as MySecurityVault PRO, that automatically fill web forms are considered much more convenient.
B
Bookmark
Like a bookmark for a book, a bookmark on the web will save your place. You can use your browser to store location information for web sites that you have visited and would like to remember. Bookmarks are often targets for adware—adware programs will often add bookmarks to your list for sites they would like you to visit.
Bot
A bot is a computer program that is meant to perform tasks in place of or in behalf of a human being.
For example, an IRC bot is a bot that chats with humans using IRC. Search engines use bots (also called spiders) to find and index web sites.
Some bots represent a security risk. Bots are deceptive when they impersonate humans without disclosure that they are not human. They can also be employed to harvest e-mail addresses from web sites where they are shown. Some bots are used to look for computers with security weaknesses.
C
Compact Flash
Compact flash is simply a small-footprint flash module. Compact flash modules are very popular for digital cameras. Just like any removable media, they sometimes get lost or replaced by better modules, which means it is important to periodically wipe your data to prevent it from being used for identity theft.
Cookie
Cookies are text files that web sites store on your computer in order to store information about your user session, which pages you've visited, what products you've purchased, etc. For example, online stores often use cookies to collect and store information about their customers in order to provide them with accurate and useful recommendations.
Cookies are usually harmless, but they can contain data that is sensitive and they are only as secure as any other data stored on your computer. There is the occasional rogue web site that uses cookies for illicit purposes, too. To be completely sure that cookies aren't being used against you, it is wise to periodically delete your cookies.
Cyber
Cyber is a prefix that usually means computer or computer network.
Cyberpunk—computer punk
Cyberspace—the virtual "space" of a computer network
Cybernetics—the study of automatic (often computer) control systems for mechanical or biological entities
D
Data Recovery
Data recovery is an attempt to locate and save deleted, formatted, or lost data in a usable form. The best data recovery programs run from separate hard drives and burn files directly to cd in order to avoid any unintentional overwriting of the lost data.
Delete
Delete, in reference to a computer file, means to remove the reference or pointer to a file and flag the space as available for new storage. If you delete a file, the data is still there! That data will remain there until it is overwritten by another file or by a drive wiping program.
Disk
A disk is a disc-shaped storage medium. See also floppy disk and hard disk.
Download
A download is a file that you transfer over the Internet and save to you computer. Downloads are fraught with security risks, especially if you download and install programs. Downloading programs to run on your computer can expose your computer to adware, spyware, viruses, and a host of other malicious programs. Make sure to download files only from sources you trust.
---------------------------------------------------
how to Keep Computer Safe and Fix little Small Problems
Learn How To Fix My Computer Problems - Steps
Like a car, there are steps you can take to keep up on your computer maintenance. We have provided you with some steps to help you learn how to fix your computer. Cleaning this information can improve your computer performance.
Fix My Computer - Web History
Cleaning your web history is important because it has a record of all the sites that were visited by your computer. Follow these steps to remove history:
Note: This step will not completely remove traces of web history.
Open Internet Explorer and go to the Tools menu.
Select Internet Options.
Go to the General tab.
Select the button "Clear History".
Fix My Computer - Pop-ups
Removing pop-up adds are different. They can hide in the Windows registry or in the Windows system files. These are annoying and need to be removed. The best way to remove pop-ups is to use software specifically designed to do so. SecureClean was designed to remove these pop-ups from your computer. "This is the best way to fix my computer" from pop-ups.
Fix My Computer - Personal Information
Your personal information can be stored in many different places and they are not all easy to get to.
SecureClean can repair this problem by finding and eliminating traces of your personal information. This information can be stored from sites that you enter your personal information into a form.
Other sites will store your credit card information on your computer when you purchase something online. SecureClean is the best solution for eliminating personal information and makes the process simple.
Fix My Computer - Internet Cookies
Deleting cookies will help to eliminate some personal information. These steps will get you to the place that allows you to remove cookies and temporary Internet files.
Open Internet Explorer.
Go to the Tools menu and select Internet Options
In the new window select the general tab.
There are two buttons, "Delete Cookies" and "Delete Files"
Press both buttons.
A slight pause will occur. This may be longer for "Delete Files".
Fix My Computer - E-mail
SecureClean will permanently clean hard drives of unwanted previously deleted messages lingering in e-mail archives from popular e-mail programs like America Online® , Microsoft Outlook®, Outlook Express®, Netscape®, and Eudora®. These e-mails can hold personal information or hold removed viruses.
Like a car, there are steps you can take to keep up on your computer maintenance. We have provided you with some steps to help you learn how to fix your computer. Cleaning this information can improve your computer performance.
Fix My Computer - Web History
Cleaning your web history is important because it has a record of all the sites that were visited by your computer. Follow these steps to remove history:
Note: This step will not completely remove traces of web history.
Open Internet Explorer and go to the Tools menu.
Select Internet Options.
Go to the General tab.
Select the button "Clear History".
Fix My Computer - Pop-ups
Removing pop-up adds are different. They can hide in the Windows registry or in the Windows system files. These are annoying and need to be removed. The best way to remove pop-ups is to use software specifically designed to do so. SecureClean was designed to remove these pop-ups from your computer. "This is the best way to fix my computer" from pop-ups.
Fix My Computer - Personal Information
Your personal information can be stored in many different places and they are not all easy to get to.
SecureClean can repair this problem by finding and eliminating traces of your personal information. This information can be stored from sites that you enter your personal information into a form.
Other sites will store your credit card information on your computer when you purchase something online. SecureClean is the best solution for eliminating personal information and makes the process simple.
Fix My Computer - Internet Cookies
Deleting cookies will help to eliminate some personal information. These steps will get you to the place that allows you to remove cookies and temporary Internet files.
Open Internet Explorer.
Go to the Tools menu and select Internet Options
In the new window select the general tab.
There are two buttons, "Delete Cookies" and "Delete Files"
Press both buttons.
A slight pause will occur. This may be longer for "Delete Files".
Fix My Computer - E-mail
SecureClean will permanently clean hard drives of unwanted previously deleted messages lingering in e-mail archives from popular e-mail programs like America Online® , Microsoft Outlook®, Outlook Express®, Netscape®, and Eudora®. These e-mails can hold personal information or hold removed viruses.
Story of Greek activists
hi there all this is one Shoking Story that a Greek activists tells who returned back to Athens Very Hardly .... I have taken this Story that You All might Be Intrested in Reading.... so here is the Story...
it is Said that
The first six Greek activists condemned the illegal detention of the Greeks at Ashdod port in Israel and the violence they faced after their arrival at the airport Eleftherios Venizelos this morning. They characterized Israel’s action as “piracy” and they stressed that the ships carried only humanitarian aid and were thoroughly checked before departing from their ports.
As Aristidis Papadokostopoulos stated, on the Greek ship was humanitarian aid, wheelchairs, prefabricated homes and medical supplies.
According to the activist when the ship was raided by the Israelis, the Free Mediterranean was 70 miles away from the waters of Gaza.
He described the Israeli actions as “clearly piratical” and underlined that “we can not allow Israel to play the role of the policeman.”
On his part, activist D. Gelalis from Larissa said that “around four o’clock in the morning we saw inflatable boats everywhere approaching us and within seconds fully armed commandos boarded the vessel.”
Activists also tell of beatings and use of electric shock and said, “We didn’t even have the right to get up of the chair. We had to raise our hands to use the toilet.”
The rest of the Greeks which are illegally detained will be brought against Israeli justice as Thanos Petrogiannis, an engineer from the Greek university, stressed.
“We went to offer help. According to the Israelis 80 miles away from the land is considered Israeli international waters and that we had entered their country illegally,” he said.
He continued by saying, “The ones who are still detained refused to sign any papers given to them by the Israelis. They will be taken to court in about 10-15 days.”
He added, “That the humanitarian aid carried by the ships bound for the Gaza strip has been seized.”
The use of violence from the Israeli commandos was condemned by the activist Michalis Grigoropoulos.
“We were in international waters. The Israelis hijacked our ship. They took us hostage as they kept aiming guns at our heads,” he said. He continued by saying that, “I was the steersman of the boat. They descended from the helicopters dropping and threw tear gas. We didn’t resist, we couldn’t do anything against the commandos.“
He also witnessed the use of electroshock to whoever tried to create a human shield in front of the bridge. Concerning the conditions of the detainment he said, “They wouldn’t even let us use the toilet, eat or drink water as they also made videos of us.
As far as the confiscation of the humanitarian aid and other personal belongings is concerned Michalis Grigoropoulos stated, “They confiscated everything. They left nothing but my papers. They took mobiles, laptops, cameras and personal belongings.”
He also said that he refused to sign papers submitted to him by the Israelis and he was removed against his will.
”They did not let me contact my lawyer or even the Greek embassy,” he said. He continued by accusing the Greek government by saying that, “Taken to trial will be the ones who refused to sign Israeli documents. The Greek government has done nothing to safeguard the Greek ships. They did not do anything to prevent them from jumping on our ships.”
Israeli claims
On the other side, the spokesman of the defence ministry in Israel, Sady Muoni, speaking on NET, said that the passengers of the Turkish ship Mavi Marmara aimed at provoking us.
He insisted that the occupants of the ship tried to lynch the Israeli soldiers while he claimed that an activist fired first.
Following that, Muoni added that the soldiers had to use violence.
Greek protest
The ambassador of Greece in Israel responded to the illegal detainment of Greek activists by Israel with a protest, calling for their immediate release.
He states that the arrest of the activists took place in international waters and that Israel could not ask from the detainees to sign documents for attempting to enter the country illegally.
According to the latest reports, 610 people have been transferred to Dire Sheva prison and held as prisoners until their cases are heard by the Israeli court.
Amongst the 610 prisoners are 31 Greeks, in which the Greek ambassador of Tel Aviv is going to visit.
From their part, Israeli authorities note that they are not held as prisoners but detained in a specially designed place in prisons.
Even though the custody of the Greek activists remains unclear, in Jerusalem and in parts of Northern Israel, Israeli Arabs are protesting against the bloody attack against the Freedom Flotilla.
--------------------------------
it is Said that
The first six Greek activists condemned the illegal detention of the Greeks at Ashdod port in Israel and the violence they faced after their arrival at the airport Eleftherios Venizelos this morning. They characterized Israel’s action as “piracy” and they stressed that the ships carried only humanitarian aid and were thoroughly checked before departing from their ports.
As Aristidis Papadokostopoulos stated, on the Greek ship was humanitarian aid, wheelchairs, prefabricated homes and medical supplies.
According to the activist when the ship was raided by the Israelis, the Free Mediterranean was 70 miles away from the waters of Gaza.
He described the Israeli actions as “clearly piratical” and underlined that “we can not allow Israel to play the role of the policeman.”
On his part, activist D. Gelalis from Larissa said that “around four o’clock in the morning we saw inflatable boats everywhere approaching us and within seconds fully armed commandos boarded the vessel.”
Activists also tell of beatings and use of electric shock and said, “We didn’t even have the right to get up of the chair. We had to raise our hands to use the toilet.”
The rest of the Greeks which are illegally detained will be brought against Israeli justice as Thanos Petrogiannis, an engineer from the Greek university, stressed.
“We went to offer help. According to the Israelis 80 miles away from the land is considered Israeli international waters and that we had entered their country illegally,” he said.
He continued by saying, “The ones who are still detained refused to sign any papers given to them by the Israelis. They will be taken to court in about 10-15 days.”
He added, “That the humanitarian aid carried by the ships bound for the Gaza strip has been seized.”
The use of violence from the Israeli commandos was condemned by the activist Michalis Grigoropoulos.
“We were in international waters. The Israelis hijacked our ship. They took us hostage as they kept aiming guns at our heads,” he said. He continued by saying that, “I was the steersman of the boat. They descended from the helicopters dropping and threw tear gas. We didn’t resist, we couldn’t do anything against the commandos.“
He also witnessed the use of electroshock to whoever tried to create a human shield in front of the bridge. Concerning the conditions of the detainment he said, “They wouldn’t even let us use the toilet, eat or drink water as they also made videos of us.
As far as the confiscation of the humanitarian aid and other personal belongings is concerned Michalis Grigoropoulos stated, “They confiscated everything. They left nothing but my papers. They took mobiles, laptops, cameras and personal belongings.”
He also said that he refused to sign papers submitted to him by the Israelis and he was removed against his will.
”They did not let me contact my lawyer or even the Greek embassy,” he said. He continued by accusing the Greek government by saying that, “Taken to trial will be the ones who refused to sign Israeli documents. The Greek government has done nothing to safeguard the Greek ships. They did not do anything to prevent them from jumping on our ships.”
Israeli claims
On the other side, the spokesman of the defence ministry in Israel, Sady Muoni, speaking on NET, said that the passengers of the Turkish ship Mavi Marmara aimed at provoking us.
He insisted that the occupants of the ship tried to lynch the Israeli soldiers while he claimed that an activist fired first.
Following that, Muoni added that the soldiers had to use violence.
Greek protest
The ambassador of Greece in Israel responded to the illegal detainment of Greek activists by Israel with a protest, calling for their immediate release.
He states that the arrest of the activists took place in international waters and that Israel could not ask from the detainees to sign documents for attempting to enter the country illegally.
According to the latest reports, 610 people have been transferred to Dire Sheva prison and held as prisoners until their cases are heard by the Israeli court.
Amongst the 610 prisoners are 31 Greeks, in which the Greek ambassador of Tel Aviv is going to visit.
From their part, Israeli authorities note that they are not held as prisoners but detained in a specially designed place in prisons.
Even though the custody of the Greek activists remains unclear, in Jerusalem and in parts of Northern Israel, Israeli Arabs are protesting against the bloody attack against the Freedom Flotilla.
--------------------------------
Wednesday, March 17, 2010
Hi there Everybody there today i am going to tell you top 10 catagorized scam catagories... here are they
Top 10 List of Current Scams - 2008
For detailed explanations of each scam, how to report a scammer and how to protect yourself, click on the blue titles below for more information! For internet crime and fraud statistics, see this pagge.
1. LOTTERY SCAMS
These include scams which can go under the name of genuine lotteries like the UK National Lottery and the El Gordo Spanish lottery. Unsolicited email or telephone calls tell people they are being entered or have already been entered into a prize draw.
Later, they receive a call congratulating them on winning a substantial prize in a national lottery. But before they can claim their prize, they are told they must send money to pay for administration fees and taxes. The prize, of course, does not exist. No genuine lottery asks for money to pay fees or notifies it's winners via email.
2. INTERNET AUCTION FRAUDS - Auction frauds (commonly called Ebay or PayPal scams, after the two largest venues)
is a misrepresentation of a product advertised for sale through an Internet auction site or the failure to deliver products purchased through an Internet auction site.
3. NIGERIAN ADVANCE FEE FRAUDS
These frauds take the form of an offer, via letter, e-mail or fax, to share a huge sum of money in return for using the recipient's bank account to transfer of the money out of the country. The perpetrators will often then use the bank account details to empty their victim's bank account. Often, they convince the victim that money is needed up front, to pay fees or is needed to bribe officials.
4. PHISHING AND PHARMING FOR IDENTITY THEFT
The victim receives an email that appears to be from a credible, real bank or credit card company, with links to a website and a request to update account information. But the website and email are fakes, made to look like the real website.
5. "PASSIVE RESIDUAL INCOME" SCAMS
Get rich scheme and scam websites - Make $$$ in your spare time! It so EASY once you get their free book or cd and learn their secrets! Sure... These websites are themselves scams; claiming to offer you a good deal, when at best, their products are worthless, they have no real secrets, and worse, some are identity thieves!
6. LOTTERIES AND OTHERS THAT SEND YOU A COUNTERFEIT CHECK
You receive a check in the mail - either from a lottery you "won" (without buying a ticker) or from an EBay buyer or other source. It looks real... but after you try to cash it, you find out it is a fake; and you're arrested for passing a counterfeit check! Read more about scam checks on this page and here about the EBay check scam.
7. FREE CREDIT REPORT.COM
What a scam this one is! The name of the website is freecreditreport.com, but you'll only get a credit report when you sign up for their paid service. And worst of all there IS a government mandated website where you CAN get a free credit report! Find out more here!
8. WORK-AT-HOME SCAMS
Work-at-home and business opportunity scams are often advertised as paid work from home. After the would-be worker applies, they are asked for money up-front to pay for materials and, after paying, they hear nothing back.
A variation of this is, people are asked to invest in a business that has little chance of success.
9. MATRIX / MULTI-LEVEL MARKETING AND PYRAMID SCHEMES
"MAKE MONEY NOW!" scream their websites! And do it in your spare time! Earn big bucks for almost no work. If that isn't enough to tell you it is a scam, let us explain why it is. These schemes are promoted through websites offering expensive electronic gadgets as free gifts in return for spending about $25 on an inexpensive product, such as a mobile phone signal booster.
Consumers who buy the product then join a waiting list to receive their free gift. The person at the top of the list receives his/her gift only after a prescribed number of new members join up.
The majority of those on the list will never receive the item.
Pyramid schemes offer a return on a financial investment based on the number of new recruits to the scheme.
Investors are misled about the likely returns. There are simply not enough people to support the scheme indefinitely.
10. PROPERTY INVESTMENT SCHEMES
Investors attend a free presentation, which aims to persuade them to hand over large amounts of money to enroll on a course promising to make them a successful property dealer, usually involving "no money down".
Schemes can involve the offer of buying yet-to-be built properties at a discount. Other variations include a buy-to-lease scheme where companies offer to source, renovate and manage properties, claiming good returns from rental income. The properties are generally near-derelict and the tenants non-existent.
11. 900 PHONE NUMBER SCAMS
Postal notification of a win in a sweepstake or a holiday offer in this scam include instructions to ring a premium rate number. This is generally an 900 toll number. Calls to the number incur significant charges, the recorded message is lengthy, and the prize often does not exist. It is a scam that has been around a long time, but it is still in use.
------------------------------
Friday, March 12, 2010
Hi there,
i have got a news about the scams of the peoples by a mail id...
this E-mail Id will gives you loans online Very Funny thing that is.
If loans are giving online in just one or two hours then what should our banks do ?
the mail Id is online serviceonlineloan@ymail.com he called himself as an agent of UBA group i.e. united Bank of Africa Plc... gives his name as polly devidson & tells his seniors name as john michael.....
then he will ask for some little payment to be made for confirmation of the loan and will send you a copy of LOAN TRANSFER CONCESSION which is in GIF format..... and will try to make you confirmed about them that they are giving you loans actually but it's all fake......
When we take it then we came to know that this Confession letter Actually asks you some more money to trarnsfer your loan to your banks .....
When we pay that money also then he says you for a week that he dosent receive the payment yet.....
and Then after a long time we will came to know that We Have Been Scammed.!
if you are taking loans from this persons then be aware from this This is a SCAM.
Yes many persons are there who gives loans online...but be aware from them.... if you are taking loans online then ask them about their id-proofs, Then ask where do they have their investments & by any other means take their confirmations and then only go ahead.
ok just this much information i know about them
one more thing is that about the UBA Group that if you want to View the Board Of Directors then go to site http://en.wikipedia.org/wiki/United_Bank_for_Africa#Board_of_Directors it can give you the list.
by Uba also updating Programs are taken whoes information is on the Site
http://www.ubagroup.com/web/fraud/genericpage/403
so you can visite also there.....
just copy the links and paste to the address bar...
Thanks buddies Byeeeeeeeeeee..
as soon as i got new information then i will keep updating you.
-------------------------------------------
Wednesday, March 10, 2010
Get your Solutions Here
Hi Everyone
IF you are facing any problems then just mail me at khoje.tusahr@yahoo.com for your best solution regarding that solutions
Prolems may be related to your computer Problems, mails, Scams mails or if you need any suggestion on any computer related Problem then just send me your full problems and get the desired Solutions just here.....
yours,
TUSHAR KHOJE
IF you are facing any problems then just mail me at khoje.tusahr@yahoo.com for your best solution regarding that solutions
Prolems may be related to your computer Problems, mails, Scams mails or if you need any suggestion on any computer related Problem then just send me your full problems and get the desired Solutions just here.....
yours,
TUSHAR KHOJE
Subscribe to:
Posts (Atom)