Search This Blog

Tuesday 14 October 2008







Just 4 UR Knowladge (For Vista)


User Account Control (UAC) is a feature in Windows that can help prevent unauthorized changes to your computer. UAC does this by asking you for permission or an administrator‌ password before performing actions that could potentially affect your computer's operation or that change settings that affect other users. When you see a UAC message, read it carefully, and then make sure the name of the action or program that's about to start is one that you intended to start.



By verifying these actions before they start, UAC can help prevent malicious software (malware) and spyware from installing or making changes to your computer without permission.

When your permission or password is needed to complete a task, UAC will alert you with one of the following messages:

Windows needs your permission to continue
A Windows function or program that can affect other users of this computer needs your permission to start. Check the name of the action to ensure that it's a function or program you want to run.

A program needs your permission to continue
A program that's not part of Windows needs your permission to start. It has a valid digital signature indicating its name and its publisher, which helps to ensure that the program is what it claims to be. Make sure that this is a program that you intended to run.

An unidentified program wants access to your computer
An unidentified program is one that doesn't have a valid digital signature from its publisher to ensure that the program is what it claims to be. This doesn't necessarily indicate danger, as many older, legitimate programs lack signatures. However, you should use extra caution and only allow this program to run if you obtained it from a trusted source, such as the original CD or a publisher's website.

This program has been blocked
This is a program that your administrator has specifically blocked from running on your computer. To run this program, you must contact your administrator and ask to have the program unblocked.

We recommend that you log on to your computer with a standard user account most of the time. You can surf the Internet, send e‑mail, and use a word processor, all without an administrator account. When you want to perform an administrative task, such as installing a new program or changing a setting that will affect other users, you don't have to switch to an administrator account. Windows will prompt you for permission or an administrator password before performing the task.

Sunday 12 October 2008

~~Back Of Rangoli Girls~~






Just 4 UR Knowladge



A user account is a collection of information that tells Windows what files and folders you can access, what changes you can make to the computer, and your personal preferences, such as your desktop background or color theme. User accounts make it so that you can share a computer with several people, but still have your own files and settings. Each person accesses their user account with a user name and password.

There are three different kinds of accounts:

  • Standard

  • Administrator

  • Guest


    Each account type gives the user a different level of control over the computer. The standard account is the account to use for everyday computing. The administrator account provides the most control over the computer, and should only be used when necessary. The guest account is primarily for people who need temporary access to the computer.


    A standard user account lets a person use most of the capabilities of the computer, but permission from an administrator is required if you want to make changes that affect other users or the security of the computer.

    When you use a standard account, you can use most programs that are installed on the computer, but you can't install or uninstall software and hardware, delete files that are required for the computer to work, or change settings on the computer that affect other users. If you're using a standard account, some programs might require you to provide an administrator password before you can perform certain tasks.



    An administrator account is a user account that lets you make changes that will affect other users. Administrators can change security settings, install software and hardware, and access all files on the computer. Administrators can also make changes to other user accounts.



    A guest account is an account for users who don't have a permanent account on your computer or domain. It allows people to use your computer without having access to your personal files. People using the guest account can't install software or hardware, change settings, or create a password.

  • Party Girls !!!



    Check the instructions included with the device to determine whether driver software should be installed before you connect the device. Typically, Windows detects a new device after you connect it, and then installs the driver software automatically. However, some devices require you to install the driver software before plugging the device in.

    Also, while most devices that have power switches should be turned on before you connect them, others require that you turn them on during the installation process. Because of issues like this, it's a good idea to read the instructions included with a new device before you connect it.

    If the instructions that came with your device contradict the information in this topic, follow the instructions that came with the device.

    Party Grils Enjoy It





    Just 4 UR Knowladge



    Introduction to Deming:
    W. Edwards Deming conducted a thriving worldwide consulting practice for more than forty years. His clients included manufacturing companies, telephones companies. railways, carriers of motor freight, consumer researchers, census methodologists, hospitals, legal firms, government agencies, and research organizations in universities and in industry.

    Deming a U.S. business management expert used statistical analysis to formulate quality-control methods in industrial production. His methods, advocating and enlisting the cooperation of the workers in the achievement of high-quality results during the manufacturing process, instead of relying on inspection at the end of the process to find flaws, were credited with the success of Japan's spot-World War II economic boom. Deming's ideas of quality and continuous improvement were adopted and implemented by Japanese firms long before many U.S. firms acknowledged their importance. For this reason, a host of Japanese firms developed a competitive advantage in product quality that has been difficult for the U.S. to overcome. U.S. companies, which for many years complacently ignored Deming's methods, finally began to implement them in the 1980s. Deming's 14 points for managing and achieving quality have become a watchword in many current businesses globally.
    The Deming Method:

    Deming was an advocate of ideas proposed in General Systems Theory used in engineering and applied to other academic disciplines. The General System Theory suggests that a unit of study as a system can be identified by a cyclical INPUT-PROCESS-OUTPUT-
    FEEDBACK cycle. The difference that Deming applied to the systems concept for the Deming Method is the presence and importance of the customer as the ultimate definer of quality of a firm's products or services. Because of the systems nature of this method, the results of acquired feedback from the customer become criteria for modification of product design, changes in input (raw material) specification, alterations in production processes, or changes in output (including distribution). The goal is to ensure that the total product package is constantly monitored and improved to meet or exceed customers' changing expectations for product performance.
    For organizations to successful incorporate this method, Deming proposed and has refined his 14 POINTS. What follows is a listing of the 14 points with a basic interpretation of each


    Party Girls Enjoy Life Friends






    Just 4 UR Knowladge : QTP


    If you have ever tested applications or Web sites manually, you are aware of
    the drawbacks. Manual testing is time-consuming and tedious, requiring a
    heavy investment in human resources. Worst of all, time constraints often
    make it impossible to manually test every feature thoroughly before the
    application is released. This leaves you wondering whether serious bugs
    have gone undetected.

    Automated testing with QuickTest addresses these problems by dramatically
    speeding up the testing process. You can create tests that check all aspects of
    your application or Web site, and then run these tests every time your site or
    application changes.


    As QuickTest runs tests, it simulates a human user by moving the mouse
    cursor in a Web page or application window, clicking Graphical User
    Interface (GUI) objects, and entering keyboard input; however, QuickTest
    does this faster than any human user.




    Party Girls





    Just 4 fun

    Before you begin, make sure that you've installed your scanner on the computer and that the scanner is turned on.
    1.

    Click to open Windows Photo Gallery.
    2.

    Click File, and then click Import from Camera or Scanner.
    3.

    In the Import Pictures and Videos window, click the scanner that you want to use, and then click Import.
    4.

    In the New Scan dialog box, click the Profile list, and then click Photo. The default settings for scanning a picture are automatically displayed.
    5.

    If you're using a scanner with a document feeder, click the Paper size list, and then click the size of the picture that you've placed on the scanner or click the size that most closely matches the picture.
    6.

    Click the Color format list, and then click the color format that you want the scanned file to display.
    7.

    Click the File type list, and then click the file type that you want to use to save the scanned file.
    8.

    Click the Resolution (DPI) list, and then click the resolution, in dots per inch, that you want to use.
    9.

    Adjust the brightness and contrast settings or type the values that you want to use.
    10.

    To see how the picture will appear when it is scanned, click Preview. If needed, modify the scan settings, and then preview the picture again. Repeat these steps until you're satisfied with the preview results. Some scanners might require you to place the picture in the document feeder each time that you scan.
    11.

    Click Scan. When the scan is complete, Windows Photo Gallery prompts you to tag the picture so that it's easier to organize or find later.
    12.

    In the Tag these pictures (optional) list, type a tag name, and then click Import. Windows Photo Gallery displays the picture so you can view, fix, or organize it.

    ~~Rangoli Girls~~



    Just4Fun

    A feed can have the same content as a webpage, but it's often formatted differently. When you subscribe, Internet Explorer automatically checks the website and downloads new content so you can see what is new since you last visited the feed.

    The most common formats are RSS and Atom. Feed formats are constantly being updated with new versions. Internet Explorer supports RSS 0.91, 1.0, and 2.0, and ATOM .3, 1.0 . All web feed formats are based on XML (Extensible Markup Language), a text-based computer language used to describe and distribute structured data and documents


    *~*~Rangoli gilrs*~*~



    Just4Fun
    What is a feed (RSS)?

    Feeds, also known as RSS feeds, XML feeds, syndicated content, or web feeds, contain frequently updated content published by a website. They are usually used for news and blog websites, but are also used for distributing other types of digital content, including pictures, audio files, or video. Internet Explorer can discover and display feeds as you visit websites. You can also subscribe to feeds to automatically check for and download updates that you can view later.

    ~*~Rangoli Girls~*~



    JUST 4 FUN

    Check to see if the file is encrypted. Here's how:

    Right-click the file, and then click Properties.

    Click the General tab, and then click Advanced.

    If the Encrypt contents to secure data check box is selected, you need the certificate that was used to encrypt the file in order to open it.

    You should get the certificate from the person who created the file. For more information, see Import or export certificates and private keys.

    ~*~Rangoli Girls ~*~



    Saturday 11 October 2008

    ~~Rangoli Girls6~~




    ~~Rangoli Girls5~~




    ~~Rangoli Girls 4~~




    ~~Rangoli Girls 3 ~~




    ~~Rangoli Girls 2 ~~





    The Fun Of Rangoli Girls Continue On this page also.....Hope You Like It.....
    This is also an ultimate collation of the rangoli girls.....Hope all u like it... :)

    ~~Rangoli Girls~~



    The Collage Rangoli Girl's..These are the photographs of the the inter-collage championship of RANGOLI....Really very ggod stuff by all Groups....Enjoy!!!!