GOOGLE SEARCH

Tuesday, October 19, 2010

THE ANSI STANDARD FLOWCHART SYMBOLS WITH LABEL


Production Activity Symbols
Rectangle - denotes an activity or operation. This symbol is used when an item or input is changed, through a computer, machine, or manual operation. A short description of the activity performed is contained within the rectangle
Decision
Diamond - denotes a decision point. This symbol is used when there is a decision to be made in the process. The process flow branches off in two or more directions at the decision point. The branch followed depends on the result of the decision. A short description of the decision to be made is contained within the diamond. The branches from the decision point are labelled with the valid results of the decision (e.g., Yes or No, True or False).
Direction
Arrow - denotes the order of steps within the process. It is used to connect the activities and decisions through the process.

Activity
Rectangle with Curved Base - denotes paper-based output from a process, such as a report. A label is placed within the symbol to describe the report.
Inspection Activity Symbols
Large Circle - denotes a point where the process is stopped for the purpose of review, inspection, quality control, or approval. A short description of the inspection point is contained in the circle.
Transportation Activity Symbols
Zigzagged Arrow - denotes transmission of data, such as electronic data transmission, fax, or telephone call.
Fat Arrow - denotes physical movement of output between locations (e.g., to or from the warehouse). A short description of the movement is contained within the arrow.
Storage Activity Symbols
Triangle - denotes that the output is placed in a controlled storage, requiring authorization for removal (e.g., waiting for an order to be placed). A short description of the reason for storage is contained within the triangle.
Rounded-End Rectangle - denotes a delay where the output or person performing the process must wait before proceeding with the next activity. This often requires the output to be placed in temporary storage. A short description of the reason for the delay is place within the rounded-end rectangle.

Documentation Symbols
Elongated Circle - denotes the beginning and end of the process.
Small Circle - denotes that the flowchart is continued on/from another page. The small circle contains a letter for identification of the two parts of the flowchart.
Open Rectangle connected to a flowchart symbol by a dotted line - denotes supplemental information or annotations to the flowchart.



Thursday, October 14, 2010

DEFINITION OF DATA TYPE AND ITS OPERATION IN QBASIC

DEFINITION OF DATA TYPE
- A data type in a programming language is a set of data with values having predefined characteristics. Examples of data types are: integer, floating point unit number, character, string, and pointer. Usually, a limited number of such data types come built into a language. The language usually specifies the range of values for a given data type, how the values are processed by the computer, and how they are stored.


OPERATIONS OF DATA TYPE DURING PROGRAMMING
With object-oriented programming JAVA, a programmer can create new data types to meet application needs. Such an exercise as known as "data abstraction" and the result is a new class of data. Such a class can draw upon the "built-in" data types such as number integers and characters. For example, a class could be created that would abstract the characteristics of a purchase order. The purchase order data type would contain the more basic data types of numbers and characters and could also include other
object
defined by another class. The purchase order data type would have all of the inherent services that a programming language provided to its built-in data types.
Languages that leave little room for programmers to define their own data types are said to be strongly-typed languages.



OPERATIONS OF DATA-TYPE IN QBASIC:
The computer can hold data in memory. The programmer must tell the computer what type of data to hold. This is called a data type.

Data Types in QBasic:
String.........Text and characters    
Example of a String Data Type: This line is an example of a string
Integer.......Non-floating-point numbers from -32,768 to 32,767
Examples of an Integer Data Type:  67, -34, -100, 203, 1022, -1, 0
Long..........Non-floating-point numbers from -2,147,483,648 to 2,147,483,647
Examples of a Long Data Type: 560005, 3, -2, 0, -867000, 14, 8, -10
Single........Floating-point numbers from -3.37x10^38 to 3.37x10^38
Examples of a Single Data Type: 4.3, 25.4567, -35.87, 0.35, -3.14
Double......Floating-point numbers from -1.67x10^308 to 1.67x10^308
Examples of a Double Data Type: 745663.90596, -98.12, 4859903.094491
It is possible to make your own data type, but we are not going to cover how to do that until later in this tutorial series.

Variables:
Variables are a name that is given to the data. The name must not start with a number or character that is not a letter. Also, the name of the variable must not be a reserved name like
PRINT, INPUT, LET, ABS, BEEP, etc.
There are two ways to declare a variable in QBasic. The first is to put a data type symbol after the name
$ String
% Integer
& Long
! Single
# Double

The flowing program gives and example of declaring variables.
CLS
Header$ = “This is an example program on declaring variables”
Num1% = 5
Num2% = 6
Num3& = 45000
Num4& = 54000
Num5! = 4.5
Num6! = 6.76
Num7# = 56000.25
Num8# =  89000.34
PRINT Header$
PRINT Num1% + Num2% +Num3&
PRINT Num6! / Num5!
PRINT Num8# + Num2%
PRINT Num4& / Num1%
The output will be:
This is an example on declaring variables
45011
1.502222
89006.34
10800
Code Download:  PROT4_1.BAS
Lets try the other way of declaring variables. This method should be used instead of the other method because Visual Basic and other BASIC languages tend to use this method. Becoming accustom to this way will help the transition from QBasic to Visual Basic. Create a new file and try this out:
DIM Num1 AS INTEGER
DIM Num2 AS LONG
DIM Num3 AS SINGLE
DIM Num4 AS DOUBLE
DIM Header AS STRING
CLS
Header = “This is another example program on declaring variables”
Num1 = 5
Num2 = 56000
Num3 = 45.635
Num4

Wednesday, October 13, 2010

LIST OF COMPUTER APPLICATION SOFTWAYS AND THEIR USES

1 MICROSOFT WORD: This is a word processing application software used in word publishing, typing documents.
2. MICROSOFT EXCEL: Spreed sheet application for financial accounting and calculations.
3. MICROSOFT POWERPOINT: Document/project presentation in a slide shows using projector.
4. MICROSOFT FRONTPAGE: Web designing application for HTML web sites and web base.
5. MICROSOFT OUTLOOK: For email management for large and big organisations.
6. MICROSOFT PUBLISHER: For the publishing of Journals, brochures, and Magazines.
7. MICROSOFT DOS: For Command Line Interface utilities when remotely accessing devices in a network and system components.
8. MICROSOFT ONENOTE: Digital jotter application for making short notes and remarks.
9. MICROSOFT VBasic: Graphics oriented programming language used in designing, running, and writing a programme.
10. MICROSOFT VBasic.NET: Advanced online based form of VBasic, used in producing programmes that run in a network.
11. MICROSOFT INTERNET EXPLORER: Internet web browser software used in accessing files online.
12. MOZILA FIREFOX: An internet web browser software.
13. OPERA: Internet browser application software, for accessing files online.
14. COREL-DRAW: Graphics design for decorations, certificates, cards and barnners.
15. PRINT ARTIST: For designing greeting cards and envelopes.
16. PAINT BRUSH: For digital drawing and designing in a canvas.
17. TOOBOOM: For cartoon production and video effects also known as firm tricks.
18. MICROSOFT PHOTOSHOP: For picture editing and high quality resolutional images.
19. MULT-MEDIA PLAYER: For playing movies, musics, audio recordings in a computer.
20. MICROSOFT ACCESS: For database management in a large and small enterprise.
21. CISCO PACKET TRACER: Network sumulator for network designing, implementation and maintenance.
22. DREAM WEAVER: Web designing software for designing websites that run with php.
23. SPSS- STATISTICAL PACKAGE for SOCIAL SCIENCE: For analysing statistical data in any document making it available within a short time for business marketing and implementation.
24...... Check back letter
 LIST IS STILL TO BE UPDATED IN THE NEXT 24 HOURS

THE DIFFERENCES BETWEEN INTERNET, EXTRANET AND ETHERNET
Extranet:
It is a private network that uses internet protocols,network connectivity, and possibly the public telecommunication system to
securely share part of an organization's information or operations with
suppliers, vendors, partners, customers or other businesses. An
extranet can be viewed as part of a company's Intranet that is extended to users outside the company, usually via the Internet.

Internet:
It is a global system of interconnected computer networks that use the standardized Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

Intranet
It is a private network that uses Internet protocols to securely share any part of an organization's information or operational systems within that organization.

An intranet is a private computer network that uses Internet technologies to securely share any part of an organization's information or operational systems with its employees. Sometimes the term refers only to the organization's internal website, but often it is a more extensive part of the organization's computer infrastructure and private websites are an important component and focal point of internal communication and collaboration.
An intranet is built from the same concepts and technologies used for the Internet, such as client-server computing and the Internet Protocol Suite (TCP/IP). Any of the well known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data.
An intranet can be understood as a private version of the Internet, or as a private extension of the Internet confined to an organization. The first intranet websites and home pages began to appear in organizations in 1990 - 1991. Although not officially noted, the term intranet first became common-place inside early adaptors, such as universities and technology corporations, in 1992.
Intranets differ from extranets in that the former are generally restricted to employees of the organization while extranets may also be accessed by customers, suppliers, or other approved parties. Extranets extend a private network onto the Internet with special provisions for access, authorization and authentication (see also AAA protocol).

LIST OF NETWORK PROTOCOLS AVAILABLE

Wiki: List of network protocols
This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. Many of these protocols, however, are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers.
  1. REDIRECT Template:OSI model
Contents:
1. Layer 1 protocols (Physical Layer)
2. Layer 1+2 protocols
3. Layer 2 protocols (Data Link Layer)
4. Layer 2+3 protocols
5. Layer 1+2+3 protocols
6. Layer 3 protocols (Network Layer)
7. Layer 3 protocols (Network Layer management)
8. Layer 3.5 protocols
9. Layer 3+4 protocol suites
10. Layer 5 protocols (Session Layer)
11. Other protocols
12. Layer 7 protocols (Application Layer)
13. Protocol description languages
14. See also
15. Further reading
16. External links

1. Layer 1 protocols (Physical Layer)

  • ADSL Asymmetric Digital Subscriber Line
  • ISDN Integrated Services Digital Network
  • PDH Plesiochronous Digital Hierarchy
  • RS-232, a serial line interface originally developed to connect modems and computer terminals
  • SDH Synchronous Digital Hierarchy
  • SONET Synchronous Optical NETworking
  • Modem standards/ITU V-Series Protocols used to communicate between analog modems over voice telephone lines.
  • ITU-T G.hn Physical Layer

2. Layer 1+2 protocols

  • Ethernet
  • GFP ITU-T G.7041 Generic Framing Procedure
  • OTN ITU-T G.709 Optical Transport Network also called Optical Channel Wrapper or Digital Wrapper Technology

3. Layer 2 protocols (Data Link Layer)

4. Layer 2+3 protocols

  • ATM Asynchronous Transfer Mode
  • Frame relay, a simplified version of X.25 welcome
  • MPLS Multi-protocol label switching
  • [[X.2

5. Layer 1+2+3 protocols

  • MTP Message Transfer Part
  • NSP Network Service Part

6. Layer 3 protocols (Network Layer)

  • CLNP Connectionless Networking Protocol
  • EGP Exterior Gateway Protocol
  • EIGRP Enhanced Interior Gateway Routing Protocol
  • ICMP Internet Control Message Protocol
  • IGMP Internet Group Management Protocol
  • IGRP Interior Gateway Routing Protocol
  • IPv4 Internet Protocol version 4
  • IPv6 Internet Protocol version 6
  • IPSec Internet Protocol Security
  • IPX Internetwork Packet Exchange
  • SCCP Signalling Connection Control Part
  • AppleTalk DDP

7. Layer 3 protocols (Network Layer management)

8. Layer 3.5 protocols

  • HIP Host Identity Protocol

9. Layer 3+4 protocol suites

10. Layer 5 protocols (Session Layer)

  • 9P Distributed file system protocol developed originally as part of Plan 9
  • NCP NetWare Core Protocol
  • NFS Network File System
  • SMB Server Message Block
  • SOCKS "SOCKetS"

11. Other protocols

12. Layer 7 protocols (Application Layer)

  • ADC, A peer-to-peer file sharing protocol
  • AFP, Apple Filing Protocol
  • BACnet, Building Automation and Control Network protocol
  • BitTorrent, A peer-to-peer file sharing protocol
  • BOOTP, Bootstrap Protocol
  • CAMEL, an SS7 protocol tool for the home operator
  • Diameter, an authentication, authorization and accounting protocol
  • DICOM includes a network protocol definition
  • DICT, Dictionary protocol
  • DNS, Domain Name System
  • DHCP, Dynamic Host Configuration Protocol
  • ED2K, A peer-to-peer file sharing protocol
  • FTP, File Transfer Protocol
  • Finger, which gives user profile information
  • Gnutella, a peer-to-peer file-swapping protocol
  • Gopher, a hierarchical hyperlinkable protocol
  • HTTP, Hypertext Transfer Protocol
  • IMAP, Internet Message Access Protocol
  • Internet Relay Chat (IRC)
  • ISUP, ISDN User Part
  • XMPP, an instant-messaging protocol
  • LDAP Lightweight Directory Access Protocol
  • MIME, Multipurpose Internet Mail Extensions
  • MSNP, Microsoft Notification Protocol (used by Windows Live Messenger)
  • MAP, Mobile Application Part
  • NetBIOS, File Sharing and Name Resolution protocol - the basis of file sharing with Windows.
  • NNTP, News Network Transfer Protocol
  • NTP, Network Time Protocol
  • NTCIP, National Transportation Communications for Intelligent Transportation System Protocol
  • POP3 Post Office Protocol Version 3
  • RADIUS, an authentication, authorization and accounting protocol
  • Rlogin, a UNIX remote login protocol
  • rsync, a file transfer protocol for backups, copying and mirroring
  • RTP, Real-time Transport Protocol
  • RTSP, Real-time Transport Streaming Protocol
  • SSH, Secure Shell
  • SISNAPI, Siebel Internet Session Network API
  • SIP, Session Initiation Protocol, a signaling protocol
  • SMTP, Simple Mail Transfer Protocol
  • SNMP, Simple Network Management Protocol
  • SOAP, Simple Object Access Protocol
  • STUN, Session Traversal Utilities for NAT
  • TUP, Telephone User Part
  • Telnet, a remote terminal access protocol
  • TCAP, Transaction Capabilities Application Part
  • TFTP, Trivial File Transfer Protocol, a simple file transfer protocol
  • WebDAV, Web Distributed Authoring and Versioning
  • DSM-CC Digital Storage Media Command and Control

13. Protocol description languages

14. See also

15. Further reading

16. External links

Wednesday, September 15, 2010

WILL END ALL SUFFERING! WHEN? HOW?

“How Long . .  . Must I Cry for Help?”

“I just want the pain to stop!” wept Jayne. She had cancer, and it was spreading through her body. How her family and friends wished they could simply remove her disease and her agony! They prayed to God to help her. Would he listen? Did he care?
A sick woman in pain GOD is aware of the condition of the human family. His Word, the Bible, says: “All creation keeps on groaning together and being in pain together.” (Romans 8:22) God knows that there are hundreds of millions of people who, like Jayne, are in pain every day, be it physical, emotional, or mental. God sees the 800 million people who go to bed hungry every night, the millions of others who suffer from domestic violence, and the many parents who fret about the future and the welfare of their children. Have you ever wondered whether God will take action? Surely, since we want to help our loved ones, would not God want to help the human family, his creation?
If you have asked those same questions, you are not alone. Over 2,600 years ago, a faithful man, Habakkuk, felt as many today do, and he asked God: “How long, O Jehovah, must I cry for help, and you do not hear? How long shall I call to you for aid from violence, and you do not save? Why is it that you make me see what is hurtful, and you keep looking upon mere trouble? And why are despoiling and violence in front of me, and why does quarreling occur, and why is strife carried?” (Habakkuk 1:2, 3) Habakkuk, a Hebrew prophet, witnessed shocking acts of mindless violence and aggression in his day. Today, such acts are everyday news that appalls compassionate people.
Did God belittle Habakkuk’s concerns? No. He listened to Habakkuk’s sincere questions and then comforted and encouraged the distressed man. Jehovah God fortified Habakkuk’s faith with a promise that He will end suffering. God’s message of hope can reassure you too, as it did Jayne and her family. The following articles will answer these questions: How can we be sure that God really cares about us? What will God do to end suffering, and when?

EXTRACTED www.watchtower.org

Tuesday, July 27, 2010

IMPROVE YOUR IQ IN COMPUTING

Get your best selling ICT resolution and screening questions and basic/extended knowledge TODAY.


BEST SELLING POLICE PETS.... Get our House Keeper at your price
Banner 125x125 Animated   Glassesshop.com, Inc.    Simon & Schuster Simon & Schuster   Simon & Schuster   Simon & Schuster

Saturday, July 24, 2010

SAVE INCOME FOR THE NEXT ACADEMIC SECTION

It sounds so funny, but it is really true.
- Take your time and go through this page and save your time, doing the things you are already doing and earning huge money before the holiday is over.
 Join INBOX Dollar Today
Click Below


GET CREATIVE AGAIN GET ADOBE
PeachPit (Pearson Education)

PeachPit (Pearson Education)

Monday, June 21, 2010

GENERATE CASH ADVERTIZING WITH US

Solution to financial problems view popular advertising tools below and try one that you can do best with
- GoogleAdsense (www.google.com/adsense)
   Earn money advertizing for Google in you website
   Earn $75 in a hardworking month
   Reliable and genuine
- Create a website for yourself
- Earn Credits Advertising with us
                                       CLICK ABOVE

Saturday, June 19, 2010

CISCO ACADEMY.... CCNA TRAINING TODAY

Become a network wizard today, learning from the foot of the Masters.
Our Training are located in various parts of the world. Visit www.cisco.com to enroll today.
-  Learn the elementary LAN Connection and Configuration
- Ethernet Setup and wizard
- Network Administration and Network Support Technician as a Certified Member.
                                                  VISIT TODAY        
                         http://www.cisco.com
             

Friday, June 18, 2010

OWN A WEBSITE FREE OF CHARGE TODAY


Start now take the following steps and CREATE  your own free website within some minutes.
Benefits:
_ FREE SERVICE
-  Fastest Ever
-  Free Web hosting
-  Earn Money Advertising  
- Unlimited Web space
                                             CREATE IT NOW

Saturday, May 15, 2010

New Extention to our Business

Pascal is happy to announce to you the new branch website for our online stuffs
 www.pascalworld.webs.com

Fastest Webhost ever, www.hostmenow.webs.com

Wednesday, April 14, 2010

DRUG DRIVING.......The Hiden Climax

Drunk Driving Can Be Stopped


Designated drivers have probably saved nearly 50,000 lives and spared many more thousands of people from suffering injury from drunk driving. 1 Over nine out of 10 Americans who attend social events where alcohol is served would like to see designated drivers used. And the proportion of people using or being a designated driver has increased dramatically over time. 2 Each year over 73,000,000 Americans either serve as a designated driver or are driven home by one. 3



Additional Information

•Help Police Stop Drunken Driving

•Drinking & Driving

•Young Drivers & Alcohol

A designated driver is simply a person who agrees to abstain from alcohol and be responsible for driving others home. The others are free to drink or not as they choose. 4 Many establishments provide free non-alcoholic beverages to designated drivers.

Sunday, April 4, 2010

BELIEVE IT, YOU CAN

It is absolutely through that we cannot forcast our future, but really, our future is not completely beyond our control.
Just believe that you can. And start seeing yourself successful. And the greatest success comes only from the school of HardKnocks that is only from our creator JEHOVAH ....... Eccl. 9 vs 11.

Saturday, March 27, 2010

MORE LEVELS HIGHER


 The Inner Core in Database Applications
How Hard can you crack your brain?
Be a web-Star today and Manage Large Company Information in just clicks away
This only identifies you as a GURU in the world of Information and Communication Technology (ICT) 
Venue:   AfriHub/University of Nigeria Nsukka/Enugu Campus, Federal University of Technology Owerri,(FUTO) University of Abuja(UNIABUJA) UNICAL, UNIBEN,UNILAG.

Duration:   4 Months Only


THIS IS IT!!

BE A CISCO CERTIFIED NETWORK ADMINISTRATOR!!

It is true that our future is completely beyond our forecast, but not completely out of our control.
  • Be an edge ahead of your fellow staff and students. 
  • Learn how to manage your networks and create a LAN/WLAN today
  • Become a network administrator and earn big
  • Self employed any where in the world
Venue: AFRIHUB UNEC , UNN(University of Nigeria Nsukka)

Tuesday, March 23, 2010

SAFE DRIVING TIPS



Home







The front wheel of a car

Driving
How You Can Keep It Safe

THOUGH driving a motor vehicle is viewed as a necessity by millions of people today, driving comes at a price. It has been estimated that over 1,200,000 people lose their lives in traffic accidents worldwide each year! Thus, would it not be worth our while to learn how to drive safely? Let us look at some practical steps that we can take.

Check Yourself

A report in the Australian Journal of Social Issues noted that one of the most significant steps a driver can take to reduce the risk of fatalities is to improve his behavior at the wheel. Therefore, before setting out, a driver might want to ask himself, ‘Am I in the proper condition and mood to drive?’ Fatigue can dull one’s mind and slow responses. The Land Transportation Office of the Philippines lists anger, anxiety, and excitement as emotions that affect driving habits and that can lead to unwise decisions and even violent road rage.
A man driving
  • Stay alert
  • Wear your seat belt
  • Don’t multitask
  • Avoid distractions

One’s physical condition must also be considered, as certain illnesses or injuries can hamper a person’s ability to drive safely. A driver who respects the lives of others will not venture out on the road when his driving ability may be impaired by alcohol. Certain drugs or medications can also affect the driver’s reactions. In some cases, it may be prudent to forgo the trip or to get someone else to drive.

Check Your Skills

Especially in developing countries, as the number of vehicles increases, so does the number of new, inexperienced drivers. Thus, it is good to consider two things that any driver can do to avoid accidents.
Drive defensively! Stay alert, watch for potential road hazards ahead and behind, and anticipate the moves of other drivers—including wrong moves. Since a large percentage of collisions result from one vehicle following another too closely, the wise driver will maintain a safe distance between his vehicle and others.
A car turning a corner
  • Be aware of blind spots
  • Brakes in prime condition
  • Sufficient tire pressure
  • Plenty of tread
  • Maintain a safe following distance

Be aware of blind spots and distractions. Turn your head to see what is happening around you, and do not rely solely on mirrors. Avoid distractions while driving. Don’t multitask—such activities as talking on the phone or operating gadgets are distracting.
If you drive a motorcycle: Some authorities say that per mile, a motorcyclist is 37 times more likely to die in a crash than the occupant of a car. What protective steps can you take? Both of the preceding steps also apply to the motorcyclist. In addition, the Motorcycle Safety Foundation in the United States says: “Be visible.” Make sure others can see you. Keep your headlights on. Stay out of blind spots of other vehicles. “Dress for safety.” Wear a helmet and bright, thick, protective clothing. “Ride extra defensively.” Assume that others cannot see you, and drive accordingly.
A man riding a motorcycle
  • “Dress for safety”
  • “Be visible”

Check Your Vehicle

The driver should be safety conscious, and his vehicle should be in good condition. Brakes should be in prime condition, as should all working parts. Tires should have plenty of tread to reduce the possibility of sliding or hydroplaning. Sufficient tire pressure will improve handling and braking. Most vehicles today have seat belts. These do little good if they are not worn.
The headlight of a car
  • Check headlights

Drive your vehicle according to conditions. Wet roads, and especially those with ice or snow, affect stopping distances and steering ability. For night driving, headlights should be kept in good condition and speeds should usually be lowered. Since life is a gift from God, it is only proper that we do what we can to protect our lives, including learning to drive safely.
The nozzle of a gasoline pump

ECONOMICAL DRIVING

  • Drive smoothly: Frequent acceleration and braking wastes fuel.
  • Avoid idling: Cars today do not generally need to be warmed up before being driven. If the car will be standing for more than half a minute, switch off the engine.
  • Maintain tire pressure: Properly inflated tires roll more easily, thus reducing fuel use significantly.
  • Keep your speed down: Driving at a high speed can be unsafe and can require extra fuel.

Top

Saturday, January 30, 2010

Toshiba Satellite L505

Creative Labs Live! Webcam AMAZON

Toshiba Satellite T135 - S1330 TruBrit..AMAZON

Canon Digital Rebel XSi 12.2 MP

NOKIA E71X AMAZON DEAL

SAMSUNG SOLISTICE a887

CurvyBerry White Curve 8520

DreamPhone BlackBerry Storm2 9550 [$44.99] AMAZON

BlackBerry Bold 9700 AMAZON GREAT DEAL

HP Pavilion 17.0inch AMAZON [$545.00]

HP Pavilion dv8t AMAZON [$1,571.00]

ACER AspireRevo AR 1600 Wireless webcam. AMAZON [$199.99]

HP G60-549DX Intel Notebook [$588.99] WEB-CAM EQUIPED

Acer V223-WBD 22" Widescreen Flat... $153.99 or Buy New $168.95 AMAZON

DELL Latitude D610 Notebook Best Price $205.99 AMAZON

Toshiba Satellite L505 TruBrit ($599.99) Best Price

AMAZON @ AT BETTER PRICES

Thursday, January 28, 2010

BRAND NEW DEALS (AMAZON DEALS)

LAP-TOPS, NOTE-BOOKS AND MINI PC


Toshiba Satelite King L505
Pentium Infinite






Acer AOD150-1920 Digital Companion

AMAZON DEALS @ CHEAP PRICES IN AMAZON

CELL-PHONES AND MOBILE



Nokia 2320 Web-packed
Music Master









 Nokia 6750 Flip Wireless Online Connectivity




Great Twist Phone
Nokia 7705




Samsun Mythic a897

Webmate...



Samsung Moment M900
Dream phone....




However You want it.

Samsun t749
PDA Mate

INTERNET HOSTER

Art Poster, Napoleonic Code: Software & Internet Hosting Services - 27.5 x 18.75Art Poster, Napoleonic Code: Software & Internet Hosting Services - 27.5 x 18.75Get your own website and  host others. Stream traffics to your sites.

HOSTING @cheaper rate amazon.com

PASCAL ASSOCIATE GROUP

Start buying goods at normal rates and moderate shipment prices at AMAZON.COM today...
LETS GO!!

Friday, January 22, 2010

IS GOD RESPONSIBLE FOR NATURAL DISASTERS?


Broken Hearts, Shattered Faith

“THERE were bodies everywhere, and we could not recognize where our house used to be,” said a Sri Lankan man after a tsunami destroyed his village in December 2004. In an article on the disaster, a religion editor said that he sometimes finds himself “praying through clenched teeth.”
Many view natural disasters as divine punishment. One columnist described a devastating hurricane as “the fist of God.” In the United States, some religious leaders described events like Hurricane Katrina as “God’s wrath” on “sin cities.” In Sri Lanka, militant Buddhists blamed Christians for the tsunami, deepening the religious divide. The trustee of a Hindu temple felt that the god Shiva was angry because people were not living the right way. A Buddhist religious leader in the United States said concerning natural disasters: “We don’t know why these things happen. We don’t even know why we’re here.”
When you see images of wrecked homes, lost lives, and broken hearts, do you sometimes wonder, ‘Why does God permit so much suffering?’ Or do you think, ‘God must have good reasons for allowing such things to happen but has not disclosed those reasons’? The following articles examine this issue. They also discuss some practical steps that people can take to reduce the risk of injury and death should a natural disaster threaten or occur.


Is God Responsible?

“GOD is love,” states the Bible. (1 John 4:8) He is also just and merciful. “The Rock, perfect is his activity, for all his ways are justice. A God of faithfulness, with whom there is no injustice; righteous and upright is he.”—Deuteronomy 32:4.
As Creator, Jehovah God has the ability to foresee all potential causes of harm, and he has the power to intercede. In view of these facts and the qualities attributed to God in the Bible, many rightly ask, “Why does God allow natural disasters to occur?”* As millions of sincere inquirers have found, God himself has provided a most reasonable answer in his written Word. (2 Timothy 3:16) Please consider the following.

They Rejected God’s Love

The Bible tells us that God gave our original parents all they needed to enjoy a happy and safe life. Furthermore, as they and their offspring obeyed God’s command to “be fruitful and become many and fill the earth,” the growing human family could count on God’s ongoing care.—Genesis 1:28.
Sadly, though, Adam and Eve deliberately turned their backs on their Creator by willfully disobeying him and choosing a course of independence from him. (Genesis 1:28; 3:1-6) By far the majority of their descendants have followed in their footsteps. (Genesis 6:5, 6, 11, 12) In short, humankind as a whole have chosen to be masters of themselves and of their home, the earth, without any guidance from God. Being a God of love who respects the principle of free will, Jehovah does not force his sovereignty on humans, even though their course may lead to harm.#
Nevertheless, Jehovah did not abandon the human family. To this day “he makes his sun rise upon wicked people and good and makes it rain upon righteous people and unrighteous.” (Matthew 5:45) Additionally, God gave mankind the ability to learn about the earth and its cycles, and to varying degrees this knowledge has enabled humans to predict extreme weather and other potential dangers, such as volcanic eruptions.
Humans have also discovered which parts of the earth are more prone to seismic or atmospheric extremes. In some lands this knowledge has helped to save lives through education as well as the development of better construction methods and warning systems. Still, the number of natural disasters reported annually has been rising steadily. The reasons for this are many and complex.

Living in High-Risk Areas

The severity of a disaster does not always relate to the power of the natural forces involved. The concentration of humans in the affected area is often of greater consequence. According to a report published by the World Bank, in more than 160 countries, over a quarter of the population live in areas of high mortality risk from natural disasters. “As you put more and more people in [harm’s] way, you make a disaster out of something that before was just a natural event,” says scientist Klaus Jacob of Columbia University in the United States.
Other exacerbating factors are rapid, unplanned urbanization, deforestation, and the extensive use of concrete to cover ground that would normally absorb runoff. Particularly the latter two can cause destructive mud slides and excessive flooding.
The human factor can also turn an earthquake into a major disaster, for it is not the shock wave of energy that causes most deaths and injuries but collapsing buildings. For good reason seismologists have the saying: “Earthquakes don’t kill people. Buildings kill people.”
Political incompetence can add to the death toll. In one South American land, earthquakes have demolished the capital city three times in the past 400 years. And since the last quake, which took place in 1967, the population has doubled to five million. “But building codes that could protect the population are either lacking or not enforced,” says New Scientist magazine.
That last statement well applies to the city of New Orleans, Louisiana, U.S.A., which was built in a low-lying, flood-prone area. Despite the existence of levees and pumps, the disaster that many had feared finally occurred in 2005 when Hurricane Katrina struck. “Longstanding warnings” were either ignored or “met with a halfhearted response,” said a report in USA Today.
A similar halfhearted response has been manifested toward global warming, which many scientists believe may intensify weather-related disasters and raise sea levels. Clearly, political, social, and economic factors—things that are not of God’s making—must be taken into account. These human factors call to mind the Biblical truth that man is unable “even to direct his step.” (Jeremiah 10:23) Another human element is the attitude of people toward warnings—natural and official.

Learn to Recognize Warning Signs

At the outset it must be acknowledged that natural disasters can strike without warning. “Time and unforeseen occurrence befall [us] all,” says Ecclesiastes 9:11. Often, though, there is some indication—natural or official—that trouble is looming. Hence, when people know the signs, they can improve their prospects of survival.
When a tsunami struck the Indonesian island of Simeulue in 2004, seven people out of a population of many thousands died. Knowing that abnormally receding tides can precede tsunamis, most people fled when the sea retreated. Likewise, people have escaped violent storms and volcanic eruptions by heeding warnings. Because nature’s warnings sometimes precede official warnings, it is wise to be familiar with both, especially if you live in a disaster-prone area.
Sadly, however, there is a “tendency for people to deny danger even when it is obvious,” said a volcanologist. This is particularly true where false alarms are common or where a previous disaster occurred a long time ago. And sometimes people just do not want to abandon their possessions, even when disaster is staring them in the face.
In many regions people are simply too poor to move to a safer area. But instead of reflecting badly on our Creator, the realities of poverty point to human failings. Governments, for example, often pour vast sums of money into armaments but do little to help the needy.
Nevertheless, a measure of help is available to most people, no matter what their situation may be. How is that so? In that God, by means of his written Word, the Holy Bible, has given us many fine principles, which when applied can save lives.

Principles That Save Lives

Do not put God to the test. “You must not put Jehovah your God to the test,” says Deuteronomy 6:16. True Christians do not have a superstitious outlook on life, thinking that God will always protect them from physical harm. Hence, when danger threatens, they heed the inspired advice: “Shrewd is the one that has seen the calamity and proceeds to conceal himself, but the inexperienced have passed along and must suffer the penalty.”—Proverbs 22:3.
Value life more than material possessions. “Even when a person has an abundance his life does not result from the things he possesses.” (Luke 12:15) Yes, material things have their place, but they are of no value to the dead. Therefore, those who love life and who cherish the privilege of serving God do not take needless risks in order to protect property.—Psalm 115:17.
In 2004, Tadashi, who lives in Japan, evacuated his home immediately after an earthquake hit and before official direction was given. His life meant more to him than his home and belongings. Akira, who lives in the same area, wrote that “the real degree of damage depends, not on the material loss, but on one’s viewpoint. I viewed this disaster as a good opportunity to simplify my life.”
Listen to governmental warnings. “Be in subjection to the superior authorities.” (Romans 13:1) When an official order is given to evacuate or to follow some other safety procedure, it is wise to take heed. Tadashi stayed away from the danger zone in obedience to an evacuation order and thus avoided injury or death from aftershocks.
When there are no official warnings of a threatening disaster, people have to decide personally when and how to respond, taking into account all the available facts. In some areas local governments may provide helpful guidelines on disaster survival. If such information is available in your area, are you familiar with it? And have you discussed it with your family? (See the accompanying box.) In many parts of the world, under the direction of the local branch office of Jehovah’s Witnesses, congregations of Witnesses have in place emergency procedures to follow should a disaster threaten or occur, and these procedures have proved to be extremely helpful.