Lets go invent tomorrow instead of worrying about the past .....
  • HOME
  • About Us
  • Events
  • Circular
  • Courses
  • Download
  • Students Corner
  • Careers in IP
  • E-Learning: a useful Learning Tool for students

                    IT Club Session- ( 23rd June, 2013)

                   E-Learning:a useful Learning Tool for students

    Today, firstly in the interactive session, the students discussed about E-Learning. The advantages of E-learning are- We can learn right from our home in any popular learning site. it is less costlier and we can study at any time as there is no fixed time for studying in these sites. Moreover we can also complete a course in less span of time. These are only a few, there are a lot of other advantages of E-Learning. They also discussed different open source softwares. Next, they discussed the term Snooping which refers to stealing data in a network. Then, there was discussion on Eavesdropping which refers to the stealing of data and using them as the owner and also discussed about Sniffing.  The students discussed about Intrusion. These all are forms of security attacks. They also discussed about PRISM which is a national security electronic surveillance program operated by the United States National Security Agency since 2007.
    Next, the students discussed about Typosqatting which means mis-spelt URL and also about Denial Of Services.
    They also discussed about Sandboxing
    It was also discussed that when RAM is unable to take the load, then a blue screen appears and our computer restarts to stop the damage and this blue screen is called the Blue Screen Of Death.
    Blue Screen Of Death

    Then, in the next session, the students learnt how to repair a damaged system. They tried this on a damaged laptop.

    Using and learning TuneUp Utilities 2013

                                          IT Club Session- (16th June 2013)
                           Using and Learning TuneUp Utilities 2013 

    Firstly, in the interaction session, students discussed about E-WASTE. It refers to the old and discarded computers and electronic devices. It is a growing matter of concern today. The next topic we discussed about was- Google+ vs. Facebook. The discussion was based on the growing number of Google+ users which may surpass the number of Facebook users. Next, they discussed how Android phone is better than i-phone. The students discussed about open source software and proprietory software. They also learnt about the Intellectual Property Right law.
    In the next session, the students were given TuneUp Utilities 2013. This is an utility software which is used to manage, maintain, optimize, configure and troubleshoot a computer system. The students used this softwares on their computers.


    Lastly, the students were distributed the 'Xilisoft Audio Converter' which is a video to audio converter. 
    Session was started at 12 noon and ended at 2-40 p.m.

    User Datagram Protocol (UDP)

                                                     
    The User Datagram Protocol (UDP) is one of the core members of Internet protocol suite. With UDP, computer applications can be sent via messages, in this referred to as datagrams, to other hosts on an IP protocol network without communications to set up special transmission channels or data paths. Since TCP consumes immense bandwidth resources, therefore UDP was conceived. UDP is suitable for purposes where error-checking and correction is either not necessary or performed in the application, thus reducing the time taken for handover and synchronization.

    UDP is suitable for very large number of clients. It works well in unidirectional communication. UDP is used in connection-less applications with the packet headers less than 512 bytes. Since UDP has an advantage of speed, it is preferred in heavy applications such as video. When data is sent, UDP does not check whether it is received by each recipient and does not re-transmit it. This is an advantage because it takes less time but this is also a disadvantage as no one is sure whether all the information is received or not. After the source and destination ports are transmitted, an additional 16 bits of length and check sum is transmitted. Due to low bandwidth utilization, transfer is faster and time is effectively saved.

    The disadvantages of UDP are -it is unreliable, it does not send data in a sequence and it does not check for errors. And the main advantage is that it is speedy.



                                                                                      Submitted by -Km. Angana Borah
                                                                                                             Class X

    Joining of new members in IT club

    The following members joined the IT Club on 9th June, 2013-

    Km. Sukanya Sen
    Km. Rashmi Malviya
    Km. Sreya Das
    Kr. Manoj Singh Warkade
    Km. Sreeja Das

    Identification and learning the uses of diodes, transistors, resistors and capacitors

                                              IT Club Session- (9th June 2013)
          Learning the uses of some of the vital parts of Motherboard                                                     

    Students firstly learnt the uses of diodes, transistors, resistors and capacitors. They were given labelled diagrams of these components. This helped them to identify the above given components in the motherboard. Students also learnt how to use a digital multimeter.

    Diodes, Transistors, Resistors and Capacitors



    After this, students were introduced to a software 'Microsoft Safety Scanner',which is a free, disposable virus scanner. Students were also distributed this software. Students then shared the problems they faced in their PC and shared some important  topics in the interaction session.
    Session was started at 12 noon and ended at 2-45 p.m.

    Congratulation!!

    IT Club Umrangso congratulates the students of Computer Science Department for scoring good marks in Informatics Practices (065) subject in AISSCE 2013. 
    A total fifteen students from both Science and Arts stream appeared in the subject. Their marks are -

    Sl. No
    Name of the Students
    Stream
    Marks scored
    1
    Kr. Rahul Lama
    Science
    99*
    2
    Kr. Suraj Kakati
    Science
    93
    3
    Km. Debolina Paul
    Science
    99*
    4
    Km. Sangeeta Paul
    Science
    93
    5
    Kr. Stalin Jidung
    Science
    95
    6
    Km. Rubi Das
    Arts
    93
    7
    Km Sumi Saikia
    Arts
    94
    8
    Km. Nisha Sinha
    Arts
    99*
    9
    Km Potmita Langthasa
    Arts
    99*
    10
    Kr. Shivam Srivastava
    Science
    93
    11
    Kr. Johny Thakuri
    Arts
    96
    12
    Kr. Vikram Upadhya
    Arts
    91
    13
    Kr. Bikram Das
    Science
    92
    14
    Km Ringbengdi  Nunisa
    Science
    95
    15
    Kr. Naveen Kumar
    Science
    96
    Subject Average -
    95.13

                                * indicates highest mark in the school

     All the best to all of you. 

    Identification of the different components of Motherboard

    IT Club Session - (2nd June 2013)
    Learning different parts of the Motherboard


    Students are introduced to identify the different parts of the motherboard and the importance of each component. They also observed the PCB of SMPS (Switch mode power supply.). Session was started at 12 noon and ended at 2-15 pm. 


              


       Labeling of the parts                           A typical motherboard

    A moment of the session -



    Unveiling the logo for IT Club Umrangso -


    Kamlakantji, Regional Officer , VKSPV and P J Brahmachary, Principal of VKV- Umrangso unveiled the logo designed for the IT club in the morning assembly.



    Six Steps To Protect Your Email Privacy

    1. Use a strong password
    You give out your email address all the time; it’s not really private information. That being the case, the only thing that protecting your account from misuse in the password .A malefactor who guesses your too weak password gains full control of email account with a strong password, especially if you use a web based email provider like Gmail or Yahoo.

    2. Beware public PCs
    If you check your email on public in a Library or Internet cafe, be absolutely sure you’ve logged out before leaving. Even then, you might be leaving behind traces that that could give next users too much information about you.

    3. Protect your address
    It is true that you give out your email address every time you send a message, but there’s no need to give it to the whole world. Don’t include your email address in comments in blogs post. Spammers and Scammers scrape pages all the time looking for new victims.

    4. Lock it up
    If you step away from your desktop, the windows desktops or close your email client. Otherwise a sneaky co worker can read your mail or reset your login password .Hold the windows key press L to lock the desktop instantly.

    5. Don’t be fooled.
    Your email provider  has sent you notification of a security breach with a link to reset your password .Don’t click that link ! It’s almost certainly fraud , designed to steal you email your account if you have any doubt, navigate to email provider site directly and double click.

    6. Use Encryption
    Sometimes you just have to send sensitive information by email. To keep your data safe, Save it as document and use your word processing application built-in encryptions, or store the document in an encryption zip file. Then share the password with the recipient separately. If you need encryption frequently, try up free email encryption product like Private Sky or Unlocked.
                            
                                                                                          By  Smriti Pradhan

                                                                                                Class VIII