jooohn's Profile

311
Points

Questions
10

Answers
21

  • Asked on November 1, 2023 in Business.

    10 Ways to take care of indoor plants

    • Light Requirements

    Understanding the light requirements of your indoor plants is crucial for their health and growth. Different plants have varying needs, with some thriving in bright, indirect light while others prefer low light conditions. Place your plants accordingly, ensuring they receive the right amount of light for their species. Consider rotating them occasionally to promote even growth.

    • Watering Routine

    Establishing a consistent watering routine is essential for the well-being of your indoor plants. Pay attention to each plant’s specific watering needs, as they can vary based on factors like plant type, size of the pot, and humidity levels. Always check the soil moisture before watering to avoid overwatering, which can lead to root rot. Ensure that the pots have drainage holes to allow excess water to escape.

    • Humidity Levels

    Indoor plants can be sensitive to humidity levels, especially if they are native to tropical or subtropical climates. To increase humidity, consider using a humidifier or placing a tray filled with water and pebbles near the plants. Misting the leaves can also provide a temporary boost in humidity. Conversely, if the air is too humid, ensure there is proper ventilation to prevent mold or fungal issues.

    • Temperature Considerations

    Maintaining an appropriate temperature range is crucial for indoor plants. Most common houseplants thrive in temperatures between 60-75°F (15-24°C). Avoid placing plants near heating or cooling vents, as extreme temperature fluctuations can stress them. Be mindful of drafts from windows or doors, as well as any temperature variations caused by appliances.

    • Soil and Repotting

    Choosing the right type of soil for your indoor plants is essential for their overall health. Use well-draining, nutrient-rich potting mixtures that are specific to the type of plants you have. Additionally, monitor the growth of your plants and be prepared to repot them when they outgrow their containers. This allows the roots to have sufficient space and access to nutrients.

    • Fertilizing

    Providing the right nutrients is crucial for the health and growth of indoor plants. Choose a balanced, water-soluble fertilizer and apply it according to the recommended dosage. During the growing season (usually spring and summer), feed your plants every 4-6 weeks. Reduce or stop fertilizing during the dormant period in fall and winter.

    • Pruning and Trimming

    Regular pruning and trimming help maintain the shape and health of indoor plants. Remove dead or yellowing leaves, as well as any spent flowers. Trim back overgrown stems or branches to encourage new growth and maintain a tidy appearance. Use clean, sharp pruning tools to prevent damage to the plant.

    • Pest Control

    Keep an eye out for common pests that can infest indoor plants, such as spider mites, mealybugs, and aphids. If you notice any signs of pest activity, like discolored leaves or small insects, take prompt action. Use natural remedies like neem oil or insecticidal soap, or opt for commercial insecticides if necessary. Quarantine newly acquired plants to prevent introducing pests to your existing collection.

    • Grooming and Cleaning

    Regularly dusting and cleaning your indoor plants is important for their respiratory health. Dust can accumulate on the leaves, hindering their ability to absorb light and nutrients. Gently wipe the leaves with a damp cloth or sponge to keep them clean and allow them to breathe freely. Additionally, clean the pots and saucers to prevent the buildup of salts or mineral deposits.

    • Observation and Adjustment

    Pay close attention to your indoor plants and be observant of any changes in their appearance or behavior. This includes monitoring for signs of overwatering, underwatering, pest infestations, or nutrient deficiencies. Adjust your care routine accordingly based on the specific needs of each plant. Taking the time to observe and respond to their conditions is key to successful plant care.

    • 211 views
    • 1 answers
    • 0 votes
  • Asked on December 9, 2021 in Computer.

    How to upgrade from Windows 10 to Windows 11?

    You can download Windows 11 upgrade file from the official website and then install it in your system. But we are going to use the easier approach.

    • Go to the Start menu and click on the Setting Icon.

    Click On Settings

    • Your Windows 10 settings page will open. Now click on the “Updates and Security” option from the settings page.

    • Now Windows update page will Open. Click on the Check for Updates button.

    Check for Updates

    • Now windows will start checking for new updates.

    Checking for Updates

    • Now windows will show multiple updates and you can select which update you want to install.

    Available Updates

    • Go through the detected updates, If you see Windows 11 upgrade in that list, select that file and Click Download and Install.
    • 213 views
    • 1 answers
    • 0 votes
  • Asked on October 1, 2021 in Computer.

    Here’s how to get it running on your computer.

    1. Go to Bluestacks and click on Download App Player. Click on the download button for Windows on the left or Mac on the right.
    2. Now open the setup file and follow on-screen instructions to install Bluestacks. The instructions are straightforward, similar to installing any other programme on your computer.
    3. Run Bluestacks when the installation is complete. You might see a notification saying that your graphics driver needs to be updated. Just click the “Close” button when you see the pop-up to start Bluestacks.
    4. Now you’ll see a window in which Android is up and running. Click the big search icon at the top > type the name of the app > select “Search Play for…” to get the apps from Google Play.
    5. 5) You’ll have to log in using your Google account once you search Google Play for apps. Once that is done, you can install most games and apps – some, which rely on a working SIM card for confirmation, such as WhatsApp, won’t run on your PC. While older versions of Whatsapp let you manually enter the verification code received on another device, WhatsApp no longer lets you enter the verification code manually. It sends a verification code via SMS and checks whether your registered phone number received that text message. Then WhatsApp automatically pulls that code to register your device. On Bluestacks, we managed to install WhatsApp but got a verification failed error. So WhatsApp doesn’t work with this software.
    6. Installing apps is simple. Just use the search button on the home screen and click Search Play for, as described in Step 4. This will open Google Play, where you can click “Install” to get the app.
    7. Bluestacks has an Android app so you can sync installed apps between your PC and Android device if needed.
    8. While you can use the mouse to simulate taps and swipes, Bluestacks also supports hardware keyboards for some games such as Temple Run. This means that you can play these games using your computer’s keyboard. If you have a preferred text-editor on Android, you can type using the keyboard as well.
    9. Bluestacks is free for a short duration (half an hour), after which it asks you to pay $2 (roughly Rs. 120) per month; or you can instead install some sponsored apps every day. That’s not a big dampener as you don’t need to open the sponsored app and you can easily delete it right after installation is complete. To do this, click the All apps icon at the top > Settings > Apps. Now select the sponsored app and click the “Uninstall” button.
    • 268 views
    • 1 answers
    • 0 votes
  • Asked on September 13, 2021 in Technology.

    How to Crack WiFI (Wireless) Networks

    WEP cracking

    Cracking is the process of exploiting security weaknesses in wireless networks and gaining unauthorized access. WEP cracking refers to exploits on networks that use WEP to implement security controls. There are basically two types of cracks namely;

    • Passive cracking– this type of cracking has no effect on the network traffic until the WEP security has been cracked. It is difficult to detect.
    • Active cracking– this type of attack has an increased load effect on the network traffic. It is easy to detect compared to passive cracking. It is more effective compared to passive cracking.

    WEP Cracking (Hacking) Tools

    • Aircrack– network sniffer and WEP cracker. This WiFi password hacker tool can be downloaded from http://www.aircrack-ng.org/
    • WEPCrack– this is an open source Wi-Fi hacker program for breaking 802.11 WEP secret keys. This WiFi hacker app for PC is an implementation of the FMS attack. http://wepcrack.sourceforge.net/
    • Kismet– this WiFi password hacker online detects wireless networks both visible and hidden, sniffer packets and detect intrusions. https://www.kismetwireless.net/
    • WebDecrypt– this WiFi password hack tool uses active dictionary attacks to crack the WEP keys. It has its own key generator and implements packet filters for hacking WiFi password. http://wepdecrypt.sourceforge.net/

    WPA Cracking

    WPA uses a 256 pre-shared key or passphrase for authentications. Short passphrases are vulnerable to dictionary attacks and other attacks that can be used to crack passwords. The following WiFi hacker online tools can be used to crack WPA keys.

    General Attack types

    • Sniffing– this involves intercepting packets as they are transmitted over a network. The captured data can then be decoded using tools such as Cain & Abel.
    • Man in the Middle (MITM) Attack– this involves eavesdropping on a network and capturing sensitive information.
    • Denial of Service Attack– the main intent of this attack is to deny legitimate users network resources. FataJack can be used to perform this type of attack. More on this in article

    Cracking Wireless network WEP/WPA keys

    It is possible to crack the WEP/WPA keys used to gain access to a wireless network. Doing so requires software and hardware resources, and patience. The success of such WiFi password hacking attacks can also depend on how active and inactive the users of the target network are.

    We will provide you with basic information that can help you get started. Backtrack is a Linux-based security operating system. It is developed on top of Ubuntu. Backtrack comes with a number of security tools. Backtrack can be used to gather information, assess vulnerabilities and perform exploits among other things.

    Some of the popular tools that backtrack has includes;

    • Metasploit
    • Wireshark
    • Aircrack-ng
    • NMap
    • Ophcrack

    Cracking wireless network keys requires patience and resources mentioned above. At a minimum, you will need the following tools

    wireless network adapter with the capability to inject packets (Hardware)

    • Kali Operating System. You can download it from here https://www.kali.org/downloads/
    • Be within the target network’s radius. If the users of the target network are actively using and connecting to it, then your chances of cracking it will be significantly improved.
    • Sufficient knowledge of Linux based operating systems and working knowledge of Aircrack and its various scripts.
    • Patience, cracking the keys may take a bit of sometime depending on a number of factors some of which may be beyond your control. Factors beyond your control include users of the target network using it actively as you sniff data packets.

    How to Secure wireless networks

    In minimizing wireless network attacks; an organization can adopt the following policies

    • Changing default passwords that come with the hardware
    • Enabling the authentication mechanism
    • Access to the network can be restricted by allowing only registered MAC addresses.
    • Use of strong WEP and WPA-PSK keys, a combination of symbols, number and characters reduce the chance of the keys been cracking using dictionary and brute force attacks.
    • Firewall Software can also help reduce unauthorized access.

    How to Hack WiFi Password

    In this practical scenario, we are going to learn how to crack WiFi password. We will use Cain and Abel to decode the stored wireless network passwords in Windows. We will also provide useful information that can be used to crack the WEP and WPA keys of wireless networks.

    Decoding Wireless network passwords stored in Windows

    Step 1) Download the Cain and Abel tool

    • Download Cain & Abel from the link provided above.
    • Open Cain and Abel

    How to hack wireless networks

    Step 2) Select the Decoders tab and choose Wireless passwords

    • Ensure that the Decoders tab is selected then click on Wireless Passwords from the navigation menu on the left-hand side
    • Click on the button with a plus sign

    How to hack wireless networks

    Step 3) The passwords will be shown

    • Assuming you have connected to a secured wireless network before, you will get results similar to the ones shown below

    How to hack wireless networks

    Step 4) Get the passwords along with encryption type and SSID

    • The decoder will show you the encryption type, SSID and the password that was used.

    Summary

    • Wireless network transmission waves can be seen by outsiders, this possesses many security risks.
    • WEP is the acronym for Wired Equivalent Privacy. It has security flaws which make it easier to break compared to other security implementations.
    • WPA is the acronym for Wi-Fi Protected Access. It has security compared to WEP
    • Intrusion Detection Systems can help detect unauthorized access
    • A good security policy can help protect a network.
    • 219 views
    • 1 answers
    • 0 votes
  • Asked on January 4, 2021 in Logo Design.

    A logo is much more than just an image; It is a point of recognition for clients and an important foundation for the branding of your company. A well-designed logo is an easy way to convey to potential customers that your business is professional, trustworthy, and provides quality goods or services. That’s why to create your business logo, you require a perfect logo making website or professional. In this article, I have listed the top 10 logo design websites where you can get a custom logo design from professional, experienced logo designer (updated for 2021):

    5dollargraphics: 5dollargraphics is an online custom & readymade graphic design marketplace. 5dollargraphics provides logo and graphic design services by the talented pre-qualified graphic designers & design studios around the world. Here You can get a Custom Logo Design just under 5$

    LogoMyface: LogoMyface is an online readymade & custom graphic design marketplace which allows potential employers to post design contests or projects that designers can then bid/compete to complete . LogoMyface provides logo, website, print and graphic design services by the talented pre-qualified graphic designers and design studios around the world. You can get a custom logo design starting at $69.

    Freelancer: Freelancer is a crowdsourcing marketplace website, which allows potential employers to post jobs that freelancers can then bid to complete. Freelancer provides logo, website, print and graphic design services by the freelancers around the world.

    99designs: 99designs is a graphic design company that operates a freelancer platform for connecting graphic designers and clients through contest & projects. It’s a creative platform for custom graphic design: logos, websites and more. You can get a custom logo design starting at $299.

    DesignContest: DesignContest is another crowdsourcing marketplace, which allows potential employers to post design contest that freelancers can then submit proposals to complete. DesignContest provides logo, website, print and graphic design services by the freelancers around the world.

    DesignCrowd: DesignCrowd is an online crowdsourcing platform that provides logo, website, print and graphic design services by the freelancers around the world. They also have a readymade logo store named BrandCrowd.

    • 381 views
    • 1 answers
    • 0 votes
  • Asked on June 2, 2020 in Solution.

    What is a Résumé?

    The Résumé is an important tool to market an individual’s experiences, skill set, achievements and potential to prospective employers. It is a professional written document that communicates your academic and professional qualifications, work experiences, and skills related to the type of position you’re are seeking. The idea is to grab focus at the right keywords and content to produce maximum effect.

    What is a Curriculum Vitae (CV)?

    A CV is a type of resume most commonly used to apply for research or faculty positions in an academic setting.

    A CV is typically longer in length and provides more detail than a resume. In addition to the basics that you would include on a resume, it is common to include publications, presentations, research and teaching experiences, grants, fellowships, and awards.

    CONSIDERATIONS FOR WRITING A RÉSUMÉ :

     Create a positive impression by tailoring your résumé to each position and employer.

     Determine experiences and skills needed for the job.

     Choose a résumé style that highlights your background.

    Now, to get started:-

    1) Make a list of experiences you’ve had: Education and training, jobs, internships, research, projects, volunteer work, leadership, student organizations, etc.

    2) Think about what you contributed, what skills you used and developed, and your significant achievements.

    3) Begin to craft your resume by organizing these experiences into sections as given below.

    SECTIONS TO INCLUDE: THE BASICS”

     CONTACT INFORMATION: Name, phone, email address, and one present or permanent address

     OBJECTIVE: A brief statement that indicates what type of position you are seeking. It may also include key skills you bring to the position, which type of industry you want to work in, and/or what company you want to work for. Including objective statement is optional. Make sure it is well written and enhances your resume in case it’s included.

     EDUCATION: List degrees in reverse chronological order. Include school/college name, University/Board name, location, percentage or CGPA, and graduation date.

     SKILLS: List of tangible skills gained through experiences as it pertains to the job, including technical, technological programming, laboratory skills, and operating systems knowledge.

     SOFT SKILLS: include your communication, leadership, interpersonal skills or any other soft skills. Try to incorporate them in your Work Experience and Activities Sections.

     WORK EXPERIENCE: Summer internships, publications, presentations and research. For each experience (paid or volunteer) include your title, organization name and location, and dates of employment. Then create a bulleted skills statement, following this formula: Action Verb + Details + Result (when applicable).

     PROJECTS: Describe individual or group work you have done to demonstrate your ability to apply learning to real-life problems.

    OTHER SECTIONS YOU CAN INCLUDE

     ACHIEVEMENTS AND HONORS: Scholarships or notable scholastic awards or any other achievements.

     ACTIVITIES: Include involvements with student organizations, volunteer experience, and professional associations. Include the organization name, dates of participation, and possibly a bulleted statement to explain a leadership role or accomplishment.

     AREA OF INTEREST: Mention about your areas of interests and domains or job profiles that you’re seeking or more interested in. What all to keep in mind while drafting your Résumé?

     Yes, you need a cover letter even when you are emailing your resume, posting it to a job board, or sending it electronically. A cover letter is the best place to introduce yourself, identify your goals, and briefly describe why you are a good fit for the position. A well-written cover letter is a sales tool that will ensure your resume will be read.

     Avoid using ready-made resume templates, such as those from Microsoft or other resumegenerating programs. Hiring managers will spot them quickly, and will assume you either lack creativity or don’t care enough about the position you are applying for to go the extra mile.

     Resumes that arrive unconventionally, are on colored or perfumed paper, or have many different fonts in an effort to make them stick out in the crowd will likely go unread. Employers will assume that if you need to resort to these tactics, you probably don’t have the qualifications for the job. Be simple and sober in your presentation. Don’t beautify your résumé.

     Your resume must be grammatically perfect with no spelling errors. Most positions today require good communication and writing skills, and if your resume is riddled with errors, you’ll be immediately judged as someone who doesn’t possess these basic skills. Make use of a dictionary and be sure to have your document carefully proofread.

     Your resume should clearly state what you do, what you are good at, and what you have accomplished. It should mention only relevant information in context to the job profiles you’re aiming at.

     Mention the important information in the beginning that you want the hiring staff to definitely read as they don’t have much time to full-read your résumé.

     The goal should be to document everything you’ve done, without being verbose. One page should suffice for entry-level workers and those with a few years of work experience. If you have more than six or seven years of experience, two pages is appropriate. Don’t make it too long or too short.

     Hiring managers have piles of resumes to get through, and most of them are unwilling to read your resume to full length no matter how qualified the candidate is. Avoid lengthy sentences or paragraphs, and use bullets instead. Write short sentences and be to the point. Avoid personal pronouns (I, my, we) and complete sentences to describe your experiences. Start your statements with action verbs.

     Employers don’t care what duties were assigned to you in your past jobs. All they are really concerned about is what you have done, and what you can do for them. Focus on your accomplishments, rather than your duties. Use statistics and numbers. Show how you solved problems. Avoid use of words like “duties” or “responsibilities.”

     Don’t include unnecessary details that could be controversial or untrue. Be 100% honest, accurate and factual. Avoid abbreviations.

     References are often used as a way to end a resume, but it’s completely unnecessary. Of course you have references! Otherwise, you have no business applying for this job!

     Personal information, such as marital status, age, height, weight, etc. should not be included.

     Don’t include reasons why you left any employment or a detailed work history. Rather, include your most related experiences or those where you demonstrated a high level of skill. It is suggested to tailor your resume to the job description. FORMATTING TIPS FOR YOUR RESUME

     Use easy-to-read font styles, such as Times New Roman, Arial, or Garamond between 10-12 point in size.

     Clear and consistent formatting creates an easily readable document.

     Start bullet points with action verbs.

     Include a well-written cover letter along with the resume.

     Describe and quantify experiences as much as possible.  Include key words from the job description.

     Place the most important information at the top of the document.

     Limit to one page at the entry or at the master’s level and two pages at the doctoral level or If you have more than six or seven years of work experience.

     Use grayscale color format. Don’t make it colorful or include any graphics. FINALIZING YOUR RÉSUMÉ

     Read closely for spelling and grammar mistakes. Avoid slang and excessive jargon.

     Proof-read your resume at least twice or thrice before finalizing.

     Contact a trustworthy and experienced person for a résumé review!

    Design is important, but it is suggested that you place your focus on the content of your resume. If you want to create a truly disruptive resume, include clear, quantifiable achievements.

    Let the power of your accomplishments set you apart.

    WISHING YOU ALL THE BEST!

    • 420 views
    • 1 answers
    • 0 votes
  • Asked on April 18, 2020 in Programming.

    Dirk’s probably right that RInside makes life easier. But for the die-hards… The essence comes from Writing R Extensions sections 8.1 and 8.2, and from the examples distributed with R. The material below covers constructing and evaluating the call; dealing with the return value is a different (and in some sense easier) topic.

    Setup

    Let’s suppose a Linux / Mac platform. The first thing is that R must have been compiled to allow linking, either to a shared or static R library. I work with an svn copy of R’s source, in the directory ~/src/R-devel. I switch to some other directory, call it ~/bin/R-devel, and then

    ~/src/R-devel/configure --enable-R-shlib
    make -j

    this generates ~/bin/R-devel/lib/libR.so; perhaps whatever distribution you’re using already has this? The -j flag runs make in parallel, which greatly speeds the build.

    Examples for embedding are in ~/src/R-devel/tests/Embedding, and they can be made with cd ~/bin/R-devel/tests/Embedding && make. Obviously, the source code for these examples is extremely instructive.

    Code

    To illustrate, create a file embed.cpp. Start by including the header that defines R data structures, and the R embedding interface; these are located in bin/R-devel/include, and serve as the primary documentation. We also have a prototype for the function that will do all the work

    #include <Rembedded.h>
    #include <Rdefines.h>
    
    static void doSplinesExample();

    The work flow is to start R, do the work, and end R:

    int
    main(int argc, char *argv[])
    {
        Rf_initEmbeddedR(argc, argv);
        doSplinesExample();
        Rf_endEmbeddedR(0);
        return 0;
    }

    The examples under Embedding include one that calls library(splines), sets a named option, then runs a function example("ns"). Here’s the routine that does this

    static void
    doSplinesExample()
    {
        SEXP e, result;
        int errorOccurred;
    
        // create and evaluate 'library(splines)'
        PROTECT(e = lang2(install("library"), mkString("splines")));
        R_tryEval(e, R_GlobalEnv, &errorOccurred);
        if (errorOccurred) {
            // handle error
        }
        UNPROTECT(1);
    
        // 'options(FALSE)' ...
        PROTECT(e = lang2(install("options"), ScalarLogical(0)));
        // ... modified to 'options(example.ask=FALSE)' (this is obscure)
        SET_TAG(CDR(e), install("example.ask"));
        R_tryEval(e, R_GlobalEnv, NULL);
        UNPROTECT(1);
    
        // 'example("ns")'
        PROTECT(e = lang2(install("example"), mkString("ns")));
        R_tryEval(e, R_GlobalEnv, &errorOccurred);
        UNPROTECT(1);
    }

    Compile and run

    We’re now ready to put everything together. The compiler needs to know where the headers and libraries are

    g++ -I/home/user/bin/R-devel/include -L/home/user/bin/R-devel/lib -lR embed.cpp

    The compiled application needs to be run in the correct environment, e.g., with R_HOME set correctly; this can be arranged easily (obviously a deployed app would want to take a more extensive approach) with

    R CMD ./a.out

    Depending on your ambitions, some parts of section 8 of Writing R Extensions are not relevant, e.g., callbacks are needed to implement a GUI on top of R, but not to evaluate simple code chunks.

    Some detail

    Running through that in a bit of detail… An SEXP (S-expression) is a data structure fundamental to R’s representation of basic types (integer, logical, language calls, etc.). The line

        PROTECT(e = lang2(install("library"), mkString("splines")));

    makes a symbol library and a string "splines", and places them into a language construct consisting of two elements. This constructs an unevaluated language object, approximately equivalent to quote(library("splines")) in R. lang2 returns an SEXP that has been allocated from R’s memory pool, and it needs to be PROTECTed from garbage collection. PROTECT adds the address pointed to by e to a protection stack, when the memory no longer needs to be protected, the address is popped from the stack (with UNPROTECT(1), a few lines down). The line

        R_tryEval(e, R_GlobalEnv, &errorOccurred);

    tries to evaluate e in R’s global environment. errorOccurred is set to non-0 if an error occurs. R_tryEval returns an SEXP representing the result of the function, but we ignore it here. Because we no longer need the memory allocated to store library("splines"), we tell R that it is no longer PROTECT’ed.

    The next chunk of code is similar, evaluating options(example.ask=FALSE), but the construction of the call is more complicated. The S-expression created by lang2 is a pair list, conceptually with a node, a left pointer (CAR) and a right pointer (CDR). The left pointer of e points to the symbol options. The right pointer of e points to another node in the pair list, whose left pointer is FALSE (the right pointer is R_NilValue, indicating the end of the language expression). Each node of a pair list can have a TAG, the meaning of which depends on the role played by the node. Here we attach an argument name.

        SET_TAG(CDR(e), install("example.ask"));

    The next line evaluates the expression that we have constructed (options(example.ask=FALSE)), using NULL to indicate that we’ll ignore the success or failure of the function’s evaluation. A different way of constructing and evaluating this call is illustrated in R-devel/tests/Embedding/RParseEval.c, adapted here as

    PROTECT(tmp = mkString("options(example.ask=FALSE)"));
    PROTECT(e = R_ParseVector(tmp, 1, &status, R_NilValue));
    R_tryEval(VECTOR_ELT(e, 0), R_GlobalEnv, NULL);
    UNPROTECT(2);

    but this doesn’t seem like a good strategy in general, as it mixes R and C code and does not allow computed arguments to be used in R functions. Instead write and manage R code in R (e.g., creating a package with functions that perform complicated series of R manipulations) that your C code uses.

    The final block of code above constructs and evaluates example("ns"). Rf_tryEval returns the result of the function call, so

    SEXP result;
    PROTECT(result = Rf_tryEval(e, R_GlobalEnv, &errorOccurred));
    // ...
    UNPROTECT(1);

    would capture that for subsequent processing.

    • 448 views
    • 1 answers
    • 0 votes
  • Asked on April 11, 2020 in Computer.

    You can run android apps in windows using emulators..Emulators are softwares that will emulate a android device in a PC ,built primarily for developers to test their app before deploying it..Bluestacks is the one of the most famous emulators available out there…you can install any app in it and the behaviour should be similar to that of how it will work in a normal mobile…

    • 397 views
    • 1 answers
    • 0 votes
  • Asked on April 10, 2020 in Computer.
    1. Open this link in your browser – Code-windows10.txt. You’ll see some text appeared on your screen. Now, you need to copy that text. (Copy that Code)
    2. (Create text file and paste code) Go to your desktop and create a new text document by pressing the right click of your mouse or laptop pad. Paste the text that you copied into the new text document. These were very simple steps and I expect you to be following me so far.
    3. (Save As this text file now as “1click.cmd”) Now, click on the file icon in your new text document the select the “save as” option. A box will appear in front of you. Write the name of the file as ‘1click.cmd’ and save it on your desktop or anywhere you can easily access the file.
    4. (Run this CMD file as adminstrator) Now what I want you to do is right click on the file that you just saved and select the option ‘Run as administrator’.
    5. (Sucessfully activated) As you run this programme your windows is activated. You can check the activation by going to the ‘control panel’ of your computer. Or you can either search for ‘system’ in your computer and there you have information about everything in your computer.

    5 Methods to Activate Windows 10 without Product Keys

    Recently, Microsoft announced “the latest version of Windows” that is Windows 10 and it explained that the new version will focus on the development of powerful and new features under the guide of software updates instead of building a new version. We have a news from Microsoft that it’s confirmed that Windows 10 is absolutely free to upgrade for all customers using a genuine copy of Windows 7 or higher.

    If you are searching for answer; how can I activate windows 10 for free? And how can I activate windows 10 for free? As you already know upgrading to Windows is already free. So what you need is just a valid, copy of Windows which you bought or previously upgraded.

    Microsoft has known for years that had been trying to get piracy of their products under control. Some people may tell you that Microsoft wants people to steal their products.

    So today we will be discussing that How can we Activate Windows 10 without any product key for free:

    1 – Using ISO file instead of an upgrade to Windows 10: You can get the latest version of Windows 10 Professional using ISO files. If you have ever installed any versions of Windows before, I am sure you will have no difficulty upgrading with Windows 10.

    2 – Secret method to Activate Windows 10: Initially; when you Install Windows 7, and it has activated, then you don’t need to activate Windows 10. The trick is to upgrade your Windows 7 or Windows 8 to get Windows 10.

    3- Another way of Upgrading into Windows10: Whenever you activated Windows 7 or Windows 8 and that your Windows 10 is fully activate then don’t need to buy Windows 10.
    Yeah won’t believe me but this trick for ‘How to activate windows 10 without product key’ works best.

    4- A unique method:

    Well I personally find it really simple method to Upgrade to Windows 10.

    Step- 1: First you need to Go to Settings in Windows 10 or go to Cortana and type settings.
    Step- 2: OPEN the Settings then Click on Update & Security.
    Step- 3: On the right-side of Window, Click on Activation.
    Step-4: Click on Go to Store and buy from the Windows 10 Store.

    5 – Activate using Windows loader: If You Are having a Windows 7 Ultimate and Not Being Able to Activate It Using Ms-Toolkit of Anything Else You Can Try Activating Windows 7 Ultimate with Windows Loader, for This You just need to download and Run the Windows Loader Software and Simply Allow It to Activate You Windows, this has same working as Ms Toolkit.

    6 – Activate Using Microsoft Toolkit: I really recommend using this method until unless if you have a Windows 7 PC, yeah because using Microsoft Toolkit Software one can activate and Install Product Key of Any Windows Version except Windows 7 Ultimate, in Addition You Can Also Activate or Install a Product Key of Any Microsoft Office Too.

    • 501 views
    • 1 answers
    • 0 votes
  • Asked on April 1, 2020 in Website.

    Five Ways to Improve your Site’s Ranking (SEO)

    • Publish Relevant Content. Quality content is the number one driver of your search engine rankings and there is no substitute for great content. …
    • Update Your Content Regularly. You’ve probably noticed that we feel pretty strongly about content. …
    • Metadata. …
    • Have a link-worthy site. …
    • Use alt tags.
    • Improve your page loading speed. Your page loading time is important for a few reasons. …
    • Produce high quality content. How often do you update your website? …
    • Optimize your images. …
    • Break up your content with header tags. …
    • Start blogging. …
    • Use outbound links. …
    • Add more than text. …
    • 8. Make sure your site is readable.

     

    • 347 views
    • 1 answers
    • 0 votes