BLOGGER TEMPLATES AND TWITTER BACKGROUNDS

Saturday, August 29, 2009

Research of Hardware and Software

From research of obtaining price for selected hardware and software, i find the research to be very informative for me.
It gives user,who wish to buy hardware like laptop, pc and much more about information of the hardware.
They can compare the pros and cons and the price of each hardware that they have survey before buying it.
The research also gives us new knowledge of how to buy any hardware. Which is by search of minimum specification that is important a hardware needed.
For preparing a quotation,all students will know how to create a quotation in future when they have entered the business life.

Electronic Mail

Electronic mail, or e-mail, developed as part of the revolution in high-tech communications during the mid 1980s. Although statistics about the number of e-mail users is often difficult to compute, the total number of person-to-person e-mails delivered each day has been estimated at more than ten billion in North America and 16 billion worldwide. Faster and cheaper than traditional mail, this correspondence is commonly sent over office networks, through many national services, and across the internet.
E-mail is less secure than traditional mail, even though federal law protects e-mail from unauthorized tampering and interception. Under the Electronic Communications Privacy Act of 1986 (ECPA), Pub. L. No. 99-508, 100 Stat. 1848, third parties are forbidden to read private e-mail. However, a loophole in the ECPA that allows employers to read their workers' e-mail has proven especially controversial. It has provoked several lawsuits and has produced legislative and extralegal proposals to increase e-mail privacy.
Congress intended to increase privacy by passing the ECPA. Lawmakers took note of increasingly popular communications devices that were readily susceptible to eavesdropping—cellular telephones, pagers, satellite dishes, and e-mail. The law updated existing federal criminal codes in order to qualify these emerging technologies for constitutional protection under the fourth amendment. In the case of e-mail, Congress gave it most of the protection already accorded by law to traditional mail. Just as postal employees may not divulge information about private mail to third parties, neither may e-mail services. The law provides criminal and civil penalties for violators: In cases of third-party interception, it establishes fines of up to $5,000 and prison sentences of up to six months. In cases of industrial espionage—where privacy is invaded for purposes of commercial advantage, malicious destruction, or private commercial gain—it establishes fines of up to $250,000 and prison sentences of up to one year.
Commentators have noted that cases involving employers reading their employees' e-mails tend to favor the employers, especially where the employer owns the equipment that stores the e-mail. Many companies also provide written policies regarding the ownership of stored e-mail messages, indicating whether the employer considers stored e-mail to be the property of the employer.
E-mail raises additional issues of privacy in the context of communications between an attorney and client. Because communications between attorney and client must remain confidential, questions have arisen about whether sending unencrypted e-mail messages by attorneys to clients could pose ethical problems. In 1999, the American Bar Association issued its opinion that the mere use of unencrypted messages does not pose ethical problems.
E-mail raises some evidentiary problems as well. Commentators have noted that the origin of some e-mail messages might be difficult to authenticate, while messages might constitute Hearsay. Nevertheless, many courts have admitted e-mail messages into evidence. To protect against disclosure of private or sensitive information, some attorneys advise employers and employees to exercise caution with e-mail, as it can be subpoenaed. Some experts have advised users to delete their e-mail regularly, and even to avoid saving it in the first place. Still others advocate the use of encryption software, which scrambles messages and makes them unreadable without a digital password.

Love of my life.......


Love love love
  • He is not so romantic, but i find him so loving
  • His aroma that make me feels calm
  • After all these years..You are still number one!
  • Nothing is gonna change my love for you.. 
"If I could rearrange the alphabet,
I would put U and I together."


"i will grinding the hollywood if i hav to,cuz i love u..
i will throw my arms around Eiffel towerif i hav to, cuz i love u..
i will kill the sharks if i hav to, cuz i love u..
And i will do anything and die if i hav to, bcuz I LOVE U!
and my love:
     "Can you give me directions to your heart?
    I've seemed to have lost myself in your eyes" ;D

    Things that women should know about men......

    1. Describing a guy as 'cute' is apparantely offensive
    2. Men are sensitive in strange ways. if a man can't fix something, he'll actually take it personally.
    3. Guys don't understand hint, so say what you mean and mean what you say.
    4. Guys don't have issues hooking up with their ex-girlfriend's best friend. Since there's more women than men in the world, let's call it recycling.
    5. They're gentlemen in front of single girls, but if you're already taken, they'll treat you like one  of the boys (farts included).

    After Seven Dinners...

    After years of being told to eat before 7pm or starve for the rest of the night, newer studies suggest otherwise!
    Katie Clark, assistant clinical professor of nutrition at the university of California, San Fransisco says calorie is a calorie, and it doesn't matter what time you eat it. If you're home after dark, tuck into some nourishment but keep these pointers in mind:
    • The three-hour rule. The rule of thumb is to stop eating three hours before you hit the sack. A heavy meal or one that's too close to ur bed time keeps u awake as your body is forced to churn energy to breakdown and digest food.When food is not digested properly u end up with morning gas and bloated tummy.

    Tips of preparing for ur exams..

    • Do not wait until the night before an exam to study! Of course, you should be regularly reviewing your notes, but the preparation still takes time.
    • If your instructor hasn't explained to you how he or she designs exams, ask. You need to learn to handle all testing styles--including the dreaded essay exam! 
    • A good first step in preparation is to read through your notes a couple of times. While you are doing this, you might also
    • Highlight major topics and subtopics, with the goal of generating an outline of your notes. Even if you take your notes in outline form, this is a good practice. Major topics often extend through more than one day's lecture, and it is easy to lose track of the overall picture from day to day.
    • With a second color, highlight all vocabulary terms.
    • Outline the entire set of notes. When you study a large body of information, you should study from concept to detail, not the other way around. 
    • Learn the details if you take the time to learn the concept and theory first. The least efficient approach to studying is to attempt to memorize your notes from beginning to end. It's not the words which are important--it's the ideas

    Saturday, August 22, 2009

    life is like a rainbow..

    We can have a positive attitude towards life..
    or a negative attitude..
    We can focus on the good or we can focus on the bad..
    Keeping a positive mental attitude is one of the keys to success..

    The choice is always up to you!