Saturday, 28 May 2016

RESEARCH DESIGN


    A research design is the arrangement of conditions for collections and analysis of data in a manner that aims to combine relevance the research purpose with economy in procedure.It is the conceptual structure within which research is conducted;it is the outline for the collection,measurement and analysis of data.
     Research design is the specific framework in which a researcher would examine his data and this includes testing of hypothesis,finding out the facts etc.Research design is the most significant part of a research work. A specific design is the precondition for the successful completion of a good research. Skillful preparation of the research design and examining the data is always treated as a good quality for a good researcher.

STEPS OF RESEARCH DESIGN
      The fourteen steps of research design by Samuel A Stouffer from American Soldier and Social Research to Test Ideas(1962)are following;
1)Prompting attention to;
2)Personal contacts and discussion with top executives involved in the problem of study;
3)To observe,inspect,examine survey in a preliminary and later in general way the problems and situations of the study;
4)Informal interviews with enlisted men in selected camps;
5)Preliminary,but lengthy discussions with staff about the data obtained by them;
6)Drafting questionnaires and schedules;
7)Pretesting questionnaires and schedules;
8)Examinations of results of Pretesting to detect and eliminate inconsistencies,obscurity especially, and vagueness;
9)Drafting  revised  questionnaires and schedules;
10)Conference with initiator request for a study to ensure clearness and completeness of proposed study;
11)Drafting final questionnaires and schedules;
12)Outlining field interviews;
13)Analysing collected data;
14)Drafting of final report;

STEPS OF RESEARCH

1)The selection or choice of the problem
2)The statement and definition of the problem
3)The review of the related literature
4)The preparation of the research design,and formulation of hypothesis
5)The selection of sampling
6)The selection of the tools of data collection
7)The Pretest and pilot study
8)The execution of the research plan
9)The coding and processing of data
10)The preparation of the brief
11)The preparation of the final report

Friday, 27 May 2016

COMPUTER VIRUS (VITAL RESOURCES INFORMATION UNDER SIEGE)

A computer virus is a computer program that can spread across computers and networks by making copies of itself,usually without the user's knowledge.viruses can have harmful side effects.These can range from displaying irritating messages to deleting all the files on our computer.It is estimated that there are 53,000computer virus in existence,with new one's being detected almost every quarter of minute.                  

HISTORY
               A programme called "Elk cloner "is credited with being first computer virus to appear in the wild-that is ,outside the single computer or lab where it is created.Written in 1982 by Richard Sir enta, it attached itself to the Apple DOS 3.3  operating system and spread by floppy disk.This virus was originally a joke,created by the high school student and put onto a game.The game was set to play,but release the virus on the 50th time of starting the game.Only this time,instead of playing the game,it would change to a blank screen that read a poem about the virus named Elk corner.The computer would then be infected.
The first PC virus was a boot sector virus called (c)Brain,created in 1986 by two brothers,Basit and Amjad FarlooqAlvi,   operating out of Lahore, Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written.However,analysts have claimed that the Ashar virus,a variant of brain,possibly predated it based on code within the virus.
SPECIFIC TYPES OF VIRUS
1 )Boot sector virus
        Boot sector viruses were the first type of PC virus to appear.They spread by modifying the boot sector,which contains the programe that enables computer to start up.When you switch on,the hardware looks for the boot sector programme which is usually on the hard disk, but can be on floppy or CD and runs it.This program then loads the rest of the operating system into memory.A boot sector virus replaces the original boot sector with its own,modified version.When you next start up,the infected boot sector is used and the virus becomes active.
2)Parasitic viruses (File viruses)
      Parasitic viruses also known as file viruses;attach themselves to programs (or'executable').When you start a program infected with a file virus,the virus is launched first.To hide itself,the virus then runs the original program.The operating system on your computer sees the virus as part of the program you were trying to run and gives it the same right.These rights allow the virus to copy itself,install itself in memory or release its payload.
3)E-mail virus
       An E-mail virus is a virus which uses E-mail messages as a mode of transport.These viruses often copy themselves by automatically mailing copies to hundreds of people in the victim's address book
4)Logic bomb
        A logic bomb employs code that lies insert until specific conditions are met.The resolution of the conditions will trigger a certain function (such as printing a message to the user and/or deleting files).An example of a logic bomb would be a virus that waits to execute until it has infected a certain number of hosts.A time bomb is a subset of logic bomb,which is set to trigger on a particular date and/or time
5)Macro virus
       A macro virus,often written in the scripting languages for Microsoft programs such as Word and Excel, is spread in Microsoft Office by infecting documents and spreadsheets.
6)Trojan
        A program that appears legitimate,but performs some illicit activity when it is run.It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk.A Trojan is similar to a virus,except that it does not replicate itself.It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer.Trojans often sneak in attached  to a free game or other utility.
7)Worm
       A worm is another type of self-replicating progarms. Worms have the ability to spread over a network.The definitions of viruses and worms are not mutually exclusive.Worms always have a mechanism to spread over a network,viruses always infect other program( whether those programs are boot sectors,binary files or macros).
Mydoom or I LOVE YOU are two examples of worms.

DECORATIVE WORK

ZARDOOSI WORK

SAREE BOARDER WORK

STONE WORK

A STUDY TOUR TO VAYANAD

MY CREATIVE DRAWINGS

WOMEN'S DAY CELEBRATION IMAGES