Wednesday 21 December 2016

Restrict permission to content in a file Word PowerPoint Excel

Restrict permission to content in a file

https://support.office.com/en-ie/article/Restrict-permission-to-content-in-a-file-3cdd7eda-79d4-471f-91af-4dd02cc6f764

Which Office program are you using?

Word

IMPORTANT: To restrict permission to content in a file, you have to have Microsoft Office for Mac Standard 2011.
Information Rights Management (IRM) allows authors to restrict permission for documents, workbooks, and presentations on a per-person or per-group basis. For example, Ranjit, the author, can give Helena permission to read a document but not change it. Ranjit can also give Bobby permission to change the document and allow him to save the document. Authors always have Full Control permission.
IRM provides three permission levels.
Permission Level
Allows
Read
Read
Change
Read, edit, copy, save changes
Full Control
Read, edit, copy, save changes, print, set expiration dates for content, grant permissions to users, access content programmatically
Do any of the following:
Set permission levels manually
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Word Review tab, Protection group
  2. If this is the first time that you are accessing the licensing server, enter your user name and password for the licensing server, and then select the Save password in Mac OS keychain check box.
    TIP:  If you do not select the Save password in Mac OS keychain check box, you might have to enter your user name and password multiple times.
  3. In the ReadChange, or Full Control boxes, enter the e-mail address or name of the person or group of people that you want to assign an access level to.
  4. If you want to search the address book for the e-mail address or name, click Contacts button .
  5. If you want to assign an access level to all people in your address book, click Add Everyone   Add everyone .
  6. After you assign permission levels, click OK.
    The Message Bar appears and displays a message that the document is rights-managed.
Use a template to restrict permission
An administrator can configure company-specific IRM policies that define who can access information permissions levels for people. These aspects of rights management are defined by using Active Directory Rights Management Services (AD RMS) server templates. For example, a company administrator might define a rights template called "Company Confidential," which specifies that documents that use that policy can be opened only by users inside the company domain.
  • On the Review tab, under Protection, click Permissions, and then click the rights template that you want.
    Word Review tab, Protection group
Change or remove permission levels that you have set
If you applied a template to restrict permission, you can't change or remove permission levels; these steps only work if you have set permission levels manually.
  1. On the Message Bar, click Change Permissions.
  2. In the ReadChange, and Full Control box, enter a new e-mail address or name of the person or group of people that you want to assign an access level to.
  3. To remove a person or group of people from an access level, click the e-mail address, and then press DELETE .
  4. To remove Everyone from a permission level, click Add Everyone  Add everyone .
Set an expiration date for a restricted file
Authors can use the Set Permissions dialog box to set expiration dates for content. For example, Ranjit might also decide to limit both Helena's and Bobby's access to this document to May 25th, and then the permission to the document expires.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Word Review tab, Protection group
  2. Click More Options, and then select the This document expires on check box, and then enter the date.
    After permission for a document has expired for authorized people, the document can be opened only by the author or by people with Full Control permission.
Allow people with Change or Read permission to print content
By default, people with Change and Read permission cannot print.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Word Review tab, Protection group
  2. Click More Options, and then select the Allow people with Change or Read permission to print content check box.
Allow people with Read permission to copy content
By default, people with Read permission cannot copy content.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Word Review tab, Protection group
  2. Click More Options, and then select the Allow people with Read permission to copy content check box.
Allow scripts to run in a restricted file
Authors can change settings to allow Visual Basic macros to run when a document is opened and to allow AppleScript scripts to access information in the restricted document.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Word Review tab, Protection group
  2. Click More Options, and then select the Access content programmatically check box.
Require a connection to verify permissions
By default, people have to authenticate by connecting to the AD RMS server the first time that they open a restricted document. However, you can change this to require them to authenticate every time that they open a restricted document.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Word Review tab, Protection group
  2. Click More Options, and then select the Require a connection to verify permissions check box.
Remove restrictions
  1. On the Review tab, under Protection, click Permissions, and then click No Restrictions.
    Word Review tab, Protection group
  2. In the dialog box, click Remove Restrictions.

See also

PowerPoint

IMPORTANT: To restrict permission to content in a file, you have to have Microsoft Office for Mac Standard 2011.
Information Rights Management (IRM) allows authors to restrict permission for documents, workbooks, and presentations on a per-person or per-group basis. For example, Ranjit, the author, can give Helena permission to read a document but not change it. Ranjit can also give Bobby permission to change the document and allow him to save the document. Authors always have Full Control permission.
IRM provides three permission levels.
Permission Level
Allows
Read
Read
Change
Read, edit, copy, save changes
Full Control
Read, edit, copy, save changes, print, set expiration dates for content, grant permissions to users, access content programmatically
Do any of the following:
Set permission levels manually
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    PowerPoint Review tab, Protection group
  2. If this is the first time that you are accessing the licensing server, enter your user name and password for the licensing server, and then select the Save password in Mac OS keychain check box.
    TIP:  If you do not select the Save password in Mac OS keychain check box, you might have to enter your user name and password multiple times.
  3. In the ReadChange, or Full Control boxes, enter the e-mail address or name of the person or group of people that you want to assign an access level to.
  4. If you want to search the address book for the e-mail address or name, click Contacts button .
  5. If you want to assign an access level to all people in your address book, click Add Everyone   Add everyone .
  6. After you assign permission levels, click OK.
    The Message Bar appears and displays a message that the document is rights-managed.
Use a template to restrict permission
An administrator can configure company-specific IRM policies that define who can access information permissions levels for people. These aspects of rights management are defined by using Active Directory Rights Management Services (AD RMS) server templates. For example, a company administrator might define a rights template called "Company Confidential," which specifies that documents that use that policy can be opened only by users inside the company domain.
  • On the Review tab, under Protection, click Permissions, and then click the rights template that you want.
    PowerPoint Review tab, Protection group
Change or remove permission levels that you have set
If you applied a template to restrict permission, you can't change or remove permission levels; these steps only work if you have set permission levels manually.
  1. On the Message Bar, click Change Permissions.
  2. In the ReadChange, and Full Control box, enter a new e-mail address or name of the person or group of people that you want to assign an access level to.
  3. To remove a person or group of people from an access level, click the e-mail address, and then press DELETE .
  4. To remove Everyone from a permission level, click Add Everyone  Add everyone .
Set an expiration date for a restricted file
Authors can use the Set Permissions dialog box to set expiration dates for content. For example, Ranjit might also decide to limit both Helena's and Bobby's access to this document to May 25th, and then the permission to the document expires.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    PowerPoint Review tab, Protection group
  2. Click More Options, and then select the This document expires on check box, and then enter the date.
    After permission for a document has expired for authorized people, the document can be opened only by the author or by people with Full Control permission.
Allow people with Change or Read permission to print content
By default, people with Change and Read permission cannot print.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    PowerPoint Review tab, Protection group
  2. Click More Options, and then select the Allow people with Change or Read permission to print content check box.
Allow people with Read permission to copy content
By default, people with Read permission cannot copy content.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    PowerPoint Review tab, Protection group
  2. Click More Options, and then select the Allow people with Read permission to copy content check box.
Allow scripts to run in a restricted file
Authors can change settings to allow Visual Basic macros to run when a document is opened and to allow AppleScript scripts to access information in the restricted document.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    PowerPoint Review tab, Protection group
  2. Click More Options, and then select the Access content programmatically check box.
Require a connection to verify permissions
By default, people have to authenticate by connecting to the AD RMS server the first time that they open a restricted document. However, you can change this to require them to authenticate every time that they open a restricted document.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    PowerPoint Review tab, Protection group
  2. Click More Options, and then select the Require a connection to verify permissions check box.
Remove restrictions
  1. On the Review tab, under Protection, click Permissions, and then click No Restrictions.
    PowerPoint Review tab, Protection group
  2. In the dialog box, click Remove Restrictions.

See also

Excel

IMPORTANT: To restrict permission to content in a file, you have to have Microsoft Office for Mac Standard 2011.
Information Rights Management (IRM) allows authors to restrict permission for documents, workbooks, and presentations on a per-person or per-group basis. For example, Ranjit, the author, can give Helena permission to read a document but not change it. Ranjit can also give Bobby permission to change the document and allow him to save the document. Authors always have Full Control permission.
IRM provides three permission levels.
Permission Level
Allows
Read
Read
Change
Read, edit, copy, save changes
Full Control
Read, edit, copy, save changes, print, set expiration dates for content, grant permissions to users, access content programmatically
Do any of the following:
Set permission levels manually
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Review tab, Protection group
  2. If this is the first time that you are accessing the licensing server, enter your user name and password for the licensing server, and then select the Save password in Mac OS keychain check box.
    TIP:  If you do not select the Save password in Mac OS keychain check box, you might have to enter your user name and password multiple times.
  3. In the ReadChange, or Full Control boxes, enter the e-mail address or name of the person or group of people that you want to assign an access level to.
  4. If you want to search the address book for the e-mail address or name, click Contacts button .
  5. If you want to assign an access level to all people in your address book, click Add Everyone   Add everyone .
  6. After you assign permission levels, click OK.
    The Message Bar appears and displays a message that the document is rights-managed.
Use a template to restrict permission
An administrator can configure company-specific IRM policies that define who can access information permissions levels for people. These aspects of rights management are defined by using Active Directory Rights Management Services (AD RMS) server templates. For example, a company administrator might define a rights template called "Company Confidential," which specifies that documents that use that policy can be opened only by users inside the company domain.
  • On the Review tab, under Protection, click Permissions, and then click the rights template that you want.
    Review tab, Protection group
Change or remove permission levels that you have set
If you applied a template to restrict permission, you can't change or remove permission levels; these steps only work if you have set permission levels manually.
  1. On the Message Bar, click Change Permissions.
  2. In the ReadChange, and Full Control box, enter a new e-mail address or name of the person or group of people that you want to assign an access level to.
  3. To remove a person or group of people from an access level, click the e-mail address, and then press DELETE .
  4. To remove Everyone from a permission level, click Add Everyone  Add everyone .
Set an expiration date for a restricted file
Authors can use the Set Permissions dialog box to set expiration dates for content. For example, Ranjit might also decide to limit both Helena's and Bobby's access to this document to May 25th, and then the permission to the document expires.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Review tab, Protection group
  2. Click More Options, and then select the This document expires on check box, and then enter the date.
    After permission for a document has expired for authorized people, the document can be opened only by the author or by people with Full Control permission.
Allow people with Change or Read permission to print content
By default, people with Change and Read permission cannot print.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Review tab, Protection group
  2. Click More Options, and then select the Allow people with Change or Read permission to print content check box.
Allow people with Read permission to copy content
By default, people with Read permission cannot copy content.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Review tab, Protection group
  2. Click More Options, and then select the Allow people with Read permission to copy content check box.
Allow scripts to run in a restricted file
Authors can change settings to allow Visual Basic macros to run when a document is opened and to allow AppleScript scripts to access information in the restricted document.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Review tab, Protection group
  2. Click More Options, and then select the Access content programmatically check box.
Require a connection to verify permissions
By default, people have to authenticate by connecting to the AD RMS server the first time that they open a restricted document. However, you can change this to require them to authenticate every time that they open a restricted document.
  1. On the Review tab, under Protection, click Permissions, and then click Restricted Access.
    Review tab, Protection group
  2. Click More Options, and then select the Require a connection to verify permissions check box.
Remove restrictions
  1. On the Review tab, under Protection, click Permissions, and then click No Restrictions.
    Review tab, Protection group
  2. In the dialog box, click Remove Restrictions.

Monday 26 September 2016

5 Websites for Making Fake Calls – Caller ID Spoofing

5 Websites for Making Fake Calls – Caller ID Spoofing

ID Spoofing is the process of faking your identity while making a call. It means, you can show your desired phone number the call receiver’s screen. In this way, you will be able to hide your identity behind the identity of someone else. Read about Caller ID spoofing and learn how it works. There are many websites available which offer free service to make fake calls. With these websites, you can make calls to anyone from any one. In this post, we are listing 5 websites for making fake calls. You can use any of these websites for caller ID spoofing. There may be a possibility that the website is blocked in your country.Warning: Use these websites only for educational purpose. These websites collect logs. If you use it for any illegal work, we will not be responsible for any criminal charge you face.
make Fake Calls - Caller ID Spoofing

5 Websites for Making Fake Calls or Spoof Calls

These are 5 spoofed call service. Check the list.

1. CrazyCall.net

CrazyCall is the most popular website used for call spoofing. Few countries have also blocked the website because of its use in many crimes. This website lets users make calls from any number they want. So, you can make prank calls with this. It also lets users change the voice to be anonymous while calling.
Advertisement

2. SpoofCard

SpoofCard is also a nice service that lets users call from any number. You can call your friends from his number. It also lets you make group calls. For using the service, you need to have credits in your account. You can make demo calls for free, but you need to buy credits for more calls.

3. Spooftel

Spooftel is also a similar kind of caller id spoofing service. Purchase credits and make prank calls. You can also make demo calls to see how the service works. It also has the option to change the pitch of your voice. It also has the option to send messages.

4. BluffmyCall

BluffMyCall is another nice call spoofing web service with lots of features. It lets users change caller id, record calls, change voice and leave voice messages. After using your free minutes, you can purchase your minutes.

5. CallerIDFaker

CallerIDFaker comes with better offers. You can get unlimited calling for the whole month only for $29.95. Like other services, it also lets users change voice and record calls.
Please use these websites only for playing pranks with friends. You can easily get caught if you use it for illegal work. All these websites keep log and details of you. You can be easily traced by cops. So, avoid using these caller id spoofing websites for any crime.

How to Spoof Caller ID: Caller ID Spoofing

How to Spoof Caller ID: Caller ID Spoofing

Caller ID
Caller ID spoofing is the act of making the telephone network to display any desired (fake) incoming number on the recipient’s Caller ID display unit instead of the original one. With this, it is possible to make a call appear to have come from any phone number that the caller wishes.
Have you ever wondered to know how to perform this? Well, read on to discover more information on how to spoof Caller ID and play prank on your friends.
Unlike what most people think, an incoming call may not be from the number that is displayed on the Caller ID display unit. Because of the high amount trust that the people have in the Caller ID system, it is often possible for the caller to easily fool the call recipients and make them believe that the number displayed on the Caller ID display is real. This is all possible through the technique called Caller ID spoofing.

How to Spoof Caller ID?

You can easily spoof any Caller ID using services like SpoofCard. In order to use the spoofcard service, you need to pay in advance and obtain a PIN (Personal Identification Number) which grants access to make a call using the Caller ID spoofing service. Once you have purchased the service, you will be given access to login to your SpoofCard account. To begin with, you need to call the phone number given by the SpoofCard service and enter the PIN. Now, you will be given access to enter any phone number you want to call and also the number you wish to appear on the recipient’s Caller ID display unit.
Once you select the options and initiate the calling process, the call is bridged and the person on the other end receives your call. The receiver would normally assume that the call was coming from a different phone number (the spoofed number chosen by you), thus deceiving the recepient into thinking that the call was coming from a different individual or organization than the caller’s. In this way, it becomes just a cakewalk to spoof Caller ID and fool the receiver on the other end. SpoofCard also provides an option to change the tone of your voice so that it can appear as a male or a female voice.
Thus, you neither need to be a computer expert nor have any technical knowledge to spoof Caller ID. For more information on this service, you can visit the SpoofCard website from the link below:
SpoofCard – Caller ID Spoofing Service

How Caller ID Spoofing works?

Caller ID spoofing is done through various methods and using different technologies. The most commonly used technology to spoof Caller ID is VOIP (Voice Over IP) andPRI (Primary Rate Interface) lines.
Today, most VOIP systems provide an option for its users to enter whatever number they want in the calling party field and this number is sent out when they make a call. Hence, it is easily possible for any user to spoof Caller ID provided they have a VOIP system and know how to properly configure it to spoof the Caller ID. However, sites like SpoofCardprovide an easy and cheap spoofing services for those who aren’t using VOIP systems that they can configure themselves.
Caller ID spoofing is possible and being performed right from the days Called ID system was introduced. However, most people are unaware of the fact that it is possible to spoof  Caller ID and make any number to be displayed on the receiver’s end. In the past, this was mostly used by telemarketers, collection agencies, law-enforcement officials, and private investigators. But today, it is available to any Internet user who wish to do this.

Thursday 1 September 2016

कॉम्प्यूटर सामान्य ज्ञान CCC

कॉम्प्यूटर सामान्य ज्ञान
● डॉ. डगलस इंजेलबार्ट (Dr. Douglas Engelbart) ने 1964 माउस का आविष्कार किया।
● प्रथम वेब साइट के निर्माण का श्रेय टिम बर्नस ली (Tim Berners Lee) को है। इन्हें World Wide Web का संस्थापक कहा जाता है।
● बिल गेट्‌स (Bill Gates) तथा पाल एलेन (Paul Allen) ने मिलकर 1975 में माइक्रोसाफ्ट कॉरपोरेशन की स्थापना की।
● बिल गेट्‌स की प्रसिद्ध पुस्तक 'The Road Ahead' 1995 में लिखी गई। वर्तमान में वे "Bill and Melinda Gates Foundation" द्वारा सामाजिक कार्यों में लगे है।
● भारत के सबीर भाटिया (Sabeer Bhatia) ने फ्री ईमेल सेवा हॉटमेल (Hotmail) को जन्म दिया।
● ब्लू टूथ एक बेतार तकनीक (Wireless Technology) है जिसके द्वारा मोबाइल फोन के जरिये कम दूरी में कम्प्यूटर और विभिन्न उपकरणों को जोड़ा जाता है।
● बैंकों में एटीएम (Automatic Teller Machine) वैन (WAN) का एक उदाहरण है।
● WiFi का अर्थ है Wireless Fidelity इसका प्रयोग बेतार तकनीक द्वारा कम्प्यूटर के दो उपकरणों के बीच संबंध स्थापित करने के लिए किया जाता है।
● WAP (Wireless Access Point) एक युक्ति है जो विभिन्न संचार माध्यमों को जोड़कर एक बेतार नेटवर्क बनाता है।
● कम्प्यूटर के Standby Mode में मॉनीटर तथा हार्ड डिस्क ऑफ हो जाता है ताकि कम उर्जा खपत हो। किसी भी बटन को दबाने या माउस क्लिक करने से कम्प्यूटर Standby Mode से बाहर आ जाता है।
● ऑप्टिकल माउस (Optical Mouse) में माउस पैड की जरूरत नहीं पड़ती क्योंकि इसमें कोई घूमने वाला भाग नहीं होता।
● Hyper Text एक डाक्यूमेंट है जो उस वेब पेज को दूसरे डाक्यूमेंट के साथ जोड़ता है।
● Blog शब्द Weblog से बना है। Blog किसी व्यक्ति द्वारा निर्मित वेब साइट है जहां वह अपने विचार, अनुभव या जानकारी रख सकता है। इस वेब साइट को पढ़ने वाले अन्य व्यक्ति भी इस विषय पर अपनी टिप्पणी दे सकते हैं।
● Beta Release किसी साफ्टवेयर या तकनीक की उपयोगिता को परखने के लिए निर्माण के दौरान उसे बाजार में जारी करने को कहा जाता है।
● पॉप अप (Pop-up) वेब ब्राउजिंग के दौरान स्वयं खुलने वाला विज्ञापन का विण्डो है।
● की-बोर्ड की संरचना के निर्माण का श्रेय क्रिस्टोफर लॉथम सोल्स (Christopher Latham Sholes) को जाता है।
● डिजिटल काम्पैक्ट डिस्क (DCD) का आविष्कार 1965 में जेम्स रसेल (James Russell) ने किया।
● बॉब नोयी (Bob Noyee) तथा गार्डन मूरे (Gordon Moore) ने सम्मिलित रूप से इंटेल (Intel) नामक कम्पनी की स्थापना की।
● मोटरोला (Motorola) के डॉ. मार्टिन कूपन (Dr. Martin Cooper) ने मोबाइल फोन का आविष्कार किया।
● जीएसएम (GSM-Global System For Mobile Communication) मोबाइल फोन के लिए प्रयुक्त एक लोकप्रिय मानक है।
● सीडीएमए (CDMA-Code Division Multiple Access) मोबाइल नेटवर्क स्थापित करने की व्यवस्था है।
● कलकुलेटर तथा कम्प्यूटर में अंतर यह है कि कम्प्यूटर को एक साथ कई निर्देश या निर्देशों का समूह दिया जा सकता है तथा यह एक साथ कई कार्य कर सकता है। इसके विपरीत कलकुलेटर को एक साथ एक ही निर्देश दिया जा सकता है।
● प्रथम व्यावसायिक इंटीग्रेटेड चिप का निर्माण फेयर चाइल्ड सेमीकण्डक्टर कॉरपोरेशन (Fair Child Semiconductor Corporation) ने 1961 में किया।
● मॉनीटर का आकार मॉनीटर के विकर्ण (Diagonal) की लम्बाई में मापा जाता है।
● फ्लापी डिस्क का आविष्कार IBM के वैज्ञानिक एलान शुगार्ट (Alan Shugart) ने 1971 में किया।
● मानव मस्तिष्क और कम्प्यूटर में सबसे बड़ा अंतर यह है कि कम्प्यूटर की स्वयं की सोचने की क्षमता नहीं होती।
● होम थियेटर एक पर्सनल कम्प्यूटर है जिसका प्रयोग मनोरंजन के लिए किया जाता है। इसमें वीडियो प्लेयर, आडियो/वीडियो रिकार्डर, टेलीविजन गेम्स, इंटरनेट जैसी अनेक सुविधाएं रहती हैं।
● कम्प्यूटर प्लेटफार्म का तात्पर्य कम्प्यूटर में प्रयुक्त आपरेटिंग सिस्टम से है जो अन्य प्रोग्रामों के क्रियान्वयन के लिए आधार तैयार करता है। एक प्लेटफार्म में चलने वाले प्रोग्राम सामान्यत: दूसरे प्लेटफार्म में नहीं चलते हैं।
● अमेरिका के विंटेन कर्फ (Vinten Cerf) को इंटरनेट का जन्मदाता (Father of the Internet) कहा जाता है।
● नेटीकेट (Netiquette-Net+etiquette) इंटरनेट प्रयोग के समय किये जाने वाले अपेक्षित व्यवहारों और नियमों का समूह है।
● इंटरनेट का संचालन किसी संस्था या सरकार या प्रशासन के नियंत्रण से मुक्त है।
● जीपीआरएस (GPRS-General Pocket Radio Service) वायरलेस द्वारा मोबाइल फोन से इंटरनेट सुविधा के प्रयोग की तकनीक है।
● हाइपर टेक्स्ट (Hyper Text) एक व्यवस्था है जिसके तहत टेक्स्ट, रेखाचित्र व प्रोग्राम आदि को आपस में लिंक किया जा सकता है। इसका विकास टेड नेल्सन (Ted Nelson) ने 1960 में किया।
● WAP-Wireless Application Protocol मोबाइल फोन द्वारा इंटरनेट के इस्तेमाल के दौरान प्रयोग किये जाने वाले नियमों का समूह है।
● इंटरनेट फोन कम्प्यूटर और इंटरनेट का प्रयोग कर टेलीफोन कॉल स्थापित करने की प्रक्रिया है। 
● इंटरनेट तथा कम्प्यूटर का प्रयोग कर किये गये अवैध कार्य, जैसे-सुरक्षित फाइलों को देखना और नष्ट करना, वेब पेज में परिवर्तन करना, क्रेडिट कार्ड का गलत इस्तेमाल करना, वायरस जारी करना आदि साइबर (Cyber Crime) कहलाता है।
● इकॉन (ICANN-Internet Corporation for Assigned Names and Numbers) इंटरनेट पर प्रत्येक कम्प्यूटर के लिए एक विशेष पता देने के उद्देश्य से 1998 में गठित एक अन्तर्राष्ट्रीय संगठन है।
● इमोटीकॉन (Emoticon-emotion+icon) एक या अधिक संकेतों का समुच्चय है जिसके द्वारा इंटरनेट पर किसी विशेष भावना को व्यक्त किया जाता है।
जैसे-:-) का मतलब मुस्कुराता चेहरा है।
:-( का मतलब दुखी चेहरा है।
● एक्स्टानेट (Extranet) एक व्यक्तिगत नेटवर्क है जो व्यवसाय के लिए इंटरनेट तकनीक और सार्वजनिक संचार व्यवस्था का प्रयोग करता है।
● हैकर (Hacker) एक व्यक्ति है जो इंटरनेट पर इलेक्टानिक सुरक्षा व्यवस्था को भेदकर मनोरंजन या उत्सुकतावश गुप्त सूचनाएं प्राप्त करता है।
● ब्रिटेन के एलान टूरिंग (Alan Turing) सर्वप्रथम कृत्रिम बुद्धिमत्ता (Artificial Intelligence) की विचारधारा रखी। पर इस क्षेत्र में अपने योगदान के कारण जान मैकार्थी (John Mc Carthy) को कृत्रिम बुद्धिमत्ता (Father of Artificial Intelligence) का जनक कहा जाता है।
● डेस्कटॉप पब्लिशिंग (DTP) का विकास मैकिन्टोस (Macintosh) कम्पनी द्वारा किया गया।
● इंटरनेट पर मुफ्त में उपलब्ध विश्व के सबसे बड़े इनसाक्लोपीडिया विकिपीडिया (Wikipedia) की स्थापना जिमी वेल्स (Jimmy Wales) ने किया।
● बंग्लोर स्थित इंफोसिस टेक्नोलॉजी (Infosys Technology) का प्रारंभ एन. नारायणमूर्ति द्वारा 1981 में किया गया।
● वर्तमान में विश्व का सबसे तेज सुपर कम्प्यूटर IBM का रोड रनर (Road runner) है जो 1000 ट्रिलियन गणनाएं प्रति सेकेण्ड कर सकता है।
● भारत का सबसे तेज सुपर कम्प्यूटर एका (Eka) है जिसका विकास टाटा ग्रुप के पुणे स्थित सीआरएल (Computational Research Laboratory) द्वारा किया गया है। यह 117.9 ट्रिलियन गणनाएं प्रति सेकेण्ड कर सकता है।
● विलियन हिगिनबॉथम (William Higgin Botham) ने 1958 में कम्प्यूटर के प्रथम वीडियो गेम का निर्माण किया।

Computer Quiz in Hindi-1 | कम्प्यूटर ज्ञान प्रश्नोत्तरी | Computer GK/Knowledge in Hindi | CCC

प्रश्न: कम्प्यूटर के इतिहास में प्रथम प्रोग्रामर किसे माना जाता है ?
उत्तर: लेडी एडा लवलेस


प्रश्न: इंटरनेट का जनक किसे माना जाता है?
उत्तर: विंट सर्फ़

प्रश्न: प्रथम विद्युत कम्प्यूटर का क्या नाम था ?
उत्तर: मार्क-I

प्रश्न: HTML का पूर्ण रूप क्या है?
उत्तर: हाइपर टेक्स्ट मारकप लेंगवेज

प्रश्न: URL किसका संक्षिप्त रूप है?
उ० युनिफोर्म रिसोर्स लोकेटर

प्रश्न: प्रथम कम्प्यूटर गेम कौन सा था ?
उत्तर: स्पेसवार (प्रोग्रामर- स्टीव रसल)

प्रश्न: सर्वाधिक प्रचलित ऑपरेटिंग सिस्टम विंडोज(Windows) सबसे पहले कब लॉन्च किया गया था ?
उ० 10 नवंबर 1983

प्रश्न: जाने माने सर्च इंजन याहू (Yahoo) के संसथापक कौन थे?
उ०: David Filo & Jerry Yang

Certificate Course on Computer Concepts (CCC) | Eligibility: | Syllabus Outline | Duration of the Course CCC

Certificate Course on Computer Concepts (CCC)



 
Introduction: This course is designed to aim at imparting a basic level IT Literacy programme for the common man. This programme has essentially been conceived with an idea of giving an opportunity to the common man to attain computer literacy thereby contributing to increased and speedy PC penetration in different walks of life. After completing the course the incumbent should be able to the use the computer for basic purposes of preparing his personnel/business letters, viewing information on internet (the web), receiving and sending mails, preparing his business presentations, preparing small databases etc. This helps the small business communities, housewives, etc. to maintain their small accounts using the computers and enjoy in the world of Information Technology. This course is, therefore, designed to be more practical oriented.

Eligibility:
 The candidates can appear in the NIELIT CCC Examination through following three modes and the eligibility criteria for each mode are indicated against each:

2.1 Candidates sponsored by NIELIT approved Institutes permitted to conduct CCC Course - irrespective of any educational qualifications;
2.2 Candidates sponsored by Government recognized Schools/Colleges having obtained an Unique Identity number from NIELIT for conducting CCC - irrespective of any educational qualifications; and
2.3 Direct Applicants (without essentially undergoing the Accredited Course or without being sponsored by a Govt. recognised School/College) -irrespective of any educational qualification;
Duration: The total duration of the course is 80 hours, consisting of:
i)Theory25 hours
ii)Tutorials5 hours
iii)Practicals50 hours
The course could ideally be a two weeks intensive course. 

Who can conduct the course:
 The education and training for CCC shall be imparted at the institutions specifically authorised by NIELIT for conducting CCC. 

Examination: Examination for the certificate course will be conducted by the NIELIT(formerly DOEACC Society) as per the calendar of events .
Syllabus Outline

 
Course on Computer Concepts (CCC)
Duration of the Course
Theory: 25 hrs + Practical: 50 hrs. + Tutorial: 5 hrs. This course can
also be offered as 10 days full time intensive course. 
Syllabus Outline 

Theory
Tutorials
Practical
Introduction to computer
2
1
4
Introduction to GUI Based
Operating System
3
-
8

Elements of Word Processing
3.5
2
9
Spreadsheets
3.5
2
10
Introduction to Internet, WWW and web browsers    
6
-
8
Communication and
Collaboration
2
-
2  
Application of Presentations
4
-
8
Application of Digital Financial Services  
1
-
1
Grand Total
25
5
50

Featured post

Life Infotech now a leading brand in the field of technology training

  Life Infotech now a leading brand in the field of technology training & its invites students around the nation to be a part of the Tra...