Thursday 30 September 2021

DCA क्या है?, कैसे करे, विषय, फ़ीस, कॉलेज, फ़ायदे | DCA Course In Hi

 

DCA क्या है?, कैसे करे, विषय, फ़ीस, कॉलेज, फ़ायदे | DCA Course In Hindi :TECH PKPRAJAPAT




हर बच्चा अपने जीवन में कुछ करना चाहता है ,कुछ बनना चाहता है हर बच्चे का यही सपना होता है कि वह अपनी लाइफ में आगे बढ़े कुछ करें उसके लिए हमें कंप्यूटर आना बहुत आवश्यक है जिसके माध्यम से हम कहीं भी किसी भी प्रकार की जॉब कर सकते हैं।

दोस्तों आज हम जानेंगे DCA क्या है?, DCA करने के क्या-क्या फ़ायदे है?, DCA मैं कितने विषय होते हैं? (DCA me kitne subject hote hai), DCA की फ़ीस कितनी है? (DCA ki fees)

DCA बहुत ही फायदेमंद कोर्स है जो कि बहुत जल्दी ही पूरा हो जाता है, आपने BCA के बारे में तो बहुत कुछ सुना होगा और आप जानते भी होंगे BCA एक प्रोफेशनल कंप्यूटर कोर्स है।


subcribe करें हमारे youtube चेन्नल को :- TECH PKPRAJAPAT


DCA और BCA में BASIC अंतर यही होता है की DCA एक diploma course होता है जबकि BCA एक डिग्री कोर्स होता है।

DCA का फुल फॉर्म क्या होता है?

Diploma in computer application

DCA क्या होता है? (What Is DCA In Hindi)

DCA एक कंप्यूटर कोर्स होता है जो कि 6 महीने से 1 साल के बीच पूरा हो जाता है। इस कोर्स में हमें कंप्यूटर के एप्लीकेशन के बारे में बताया जाता है जिससे हम कोई भी कंप्यूटर की बेसिक परेशानी को आसानी से हल कर सकते हैं।

इस कोर्स में हमें एप्लीकेशन को बनाना ,प्रोग्राम की कोड लिखना, माइक्रोसॉफ्ट ऑफिस और भी कई तरीके के एप्लीकेशन प्रोग्राम को चलाना सिखाया जाता है। यह कोर्स बहुत ही छोटे समय में पूरा हो जाता है और यह कोर्स हमें पूरी कंप्यूटर के बारे में ही जानकारी देता है।

DCA एक ऐसा कंप्यूटर कोर्स है जो कोई भी 10+2 करके कर सकता है। यह एक डिप्लोमा कोर्स है यह थ्योरी और प्रैक्टिकल दोनों के माध्यम से पढ़ाया जाता है।

DCA कोर्स कौन कर सकता है?

यह कोर्स वो करता है जिसको कंप्यूटर में बहुत रूचि होती है यह उन बच्चों के लिए और भी ज्यादा फायदेमंद होता है जिसके पास 11th में ऑप्शनल सब्जेक्ट कंप्यूटर होता है।

DCA कितने साल का कोर्स है?

DCA मैं बहूत सारे कोर्स होते है। जिनमे से कुछ कोर्स 6 महीने के होते है तो कुछ कोर्स 1 साल के होते है। और आप इन दोनो कोर्स को 12th के बाद कर सकते है।

DCA में कौन-कौन से विषय होते है? (Subject In DCA)

DCA me kitne subject hote hai

  • Programming languages – प्रोग्रामिंग लैंग्वेज इज के द्वारा हमें प्रोग्राम को लिखना मैं चलाना सिखाया जाता है इसमें हमें c language ,c++ language और भी कई प्रकार की कंप्यूटर लैंग्वेज सिखाई जाती है।
  • Microsoft office – इसमें हमें MS word MS PowerPoint ,MS Access ,MS Excel MS paint आदि की पूरी जानकारी दी जाती है इसके साथ ही हमें wordpad और notepad की भी जानकारी दी जाती है।
  • Tally – इसमें हमें Tally का बेसिक भी बताया जाता है।
  • Typing – इसके साथ ही हमें Hindi और English की typing सिखाई जाती है।
  • Basic Of Computer- इसके साथ ही हमें कंप्यूटर का पूरा बेस भी पढ़ाया जाता है।
  • Database management – Data base management के द्वारा हम किसी भी प्रकार का डाटा आसानी से सुरक्षित रख सकते हैं।
  • System Designing – System Designing के माध्यम से हम कोई भी लोगों को डिजाइन करना शादी का कार्ड बनाना मेनू कार्ड बनाना आदि आसानी से कर सकते हैं यह भी हमें सिखाया जाता है।
  • Financial accounting system – DCA में हमें अकाउंट भी पढ़ाई जाती है वे साथ में Tally भी सिखाई जाती है।
  • Unix operating system – साथ ही हमें ऑपरेटिंग सिस्टम के बारे में भी पूरी जानकारी दी जाती है वैसा ही कंप्यूटर के इनपुट आउटपुट हार्डवेयर सॉफ्टवेयर सब के बारे में संक्षेप में बताया जाता है।
  • Project management – प्रोजेक्ट मैनेजमेंट में हमें किसी भी प्रोजेक्ट को मैनेज करना सिखाया जाता है।

आजकल हर जगह कंप्यूटर का उपयोग बढ़ता ही जा रहा है हर काम कंप्यूटर से ही हो रहा है यहां तक की एंड्राइड फोन में भी कंप्यूटर के फीचर्स आने लगे हैं ज्यादातर चीजें हम कंप्यूटर के बिना भी अपने एंड्राइड फोन के माध्यम से कर सकते हैं हमारे फोन में भी कंप्यूटर की तरह ही ऑपरेटिंग सिस्टम होता है‌ कंप्यूटर में हम किसी भी प्रकार का डाटा आसानी से सुरक्षित रख सकते हैं।

 चाहे कोई सब्जी की दुकान हो या फल फ्रूट की या कोई जूस की वह भी अपना सारा काम कंप्यूटर या एंड्रॉयड फोन के माध्यम से ही करते हैं चाहे किसी कस्टमर से पैसा लेना हो या कटवाना हो इस के लिए भी कंप्यूटर आना बहुत ही महत्वपूर्ण है

हमें BCA करना चाहिए या DCA

अगर आप‌ शॉर्ट पीरियड कोर्स करना चाहते हैं तो आपको DCA करना चाहिए DCA एक ऐसा कोर्स है जो हमें एक छोटे समय में कंप्यूटर की पूरी जानकारी दे देता है जबकि BCA 3 साल का कोर्स होता है इसमें हमें पूरे कंप्यूटर के हार्डवेयर सॉफ्टवेयर वह कंप्यूटर एप्लीकेशन सब के बारे संक्षेप में बताया जाता है।

DCA को करने के लिए क्या एलिजिबिलिटी होती है?

हमें DCA को करने के लिए कोई भी एलिजिबिलिटी की जरूरत नहीं होती है।इस कोर्स को 12th पास का कोई भी Student कर सकता है।

इस कोर्स को करने के लिए कोई भी कटऑफ नहीं निकलती है। यह कोर्स हम किसी भी इंस्टिट्यूट से कर सकते हैं।

DCA की फीस कितनी होती है? (DCA Course Fees)

जैसा कि आप जानते ही होंगे हर संस्थान DCA कराने के लिए अपनी एक अलग फीस रखता है DCA की फीस 5000 से 10000 के बीच में होती है।

DCA कोर्स क्यों करना आवश्यक है?

DCA करना इसलिए आवश्यक है क्योंकि इसमें हमें कंप्यूटर सिखाया जाता है जो कि हमारे लिए बहुत महत्वपूर्ण होता है ,DCA करने से हमें कंप्यूटर का सर्वज्ञान हो जाता है ।DCA में हमें कंप्यूटर के बारे में बताया जाता है कंप्यूटर क्या है इसके अंदर कौन-कौन से पार्ट्स है और इसे चलाना भी सिखाया जाता है।

DCA कोर्स बहुत महत्वपूर्ण है वे एक सर्वव्यापी कोर्स है ,जिसे करने से हमें सिर्फ लाभ ही लाभ होंगे एक अच्छी जॉब मिलेगी साथ ही अच्छे पैसे भी मिलेंगे।

DCA करने के फ़ायदे? (Benefit Of DCA)

  • DCA करने के बाद हमें computer diploma का certificate मिल जाता है।
  • जिससे हमें कहीं भी आसानी से job मिल सकती है।
  • DCA करने के बाद हमें BCA के second semester में आसानी से प्रवेश मिल जाता है।
  • DCA करने के बाद हमें कहीं भी आसानी से computer की जॉब मिल जाती है।

DCA करने के बाद JOB

  • Data operator – Data operator जॉब करने के लिए व्यक्ति को अच्छी नॉलेज होनी चाहिए उसे किसी भी word को translate करना आना चाहिेए data operator बनने के लिए हमें दो लैंग्वेज आनी चाहिए।
  • Graphic designer – Graphic designer बनने के लिए हमें लोगों को design करना ,कोई भी कार्ड डिजाइन करना आना चाहिए, graphic desinger बनने के लिए हमें सोचने की क्षमता होनी चाहिए जिससे हम अच्छे अच्छे design सोच सके और कुछ नया बना सके।
  • Web developer – Web developer बनने के लिए हमें वापस आना जरूरी होता है साथ ही हमें वेबसाइट बनाना आना चाहिए जिससे हम वेबसाइट बनाने का काम भी शुरू कर सकते हैं।
  • C++ developer – C++ developer बनने के लिए हमें C++ language आना बहुत जरूरी होता है।
  • Web Designer – Web designing करने के लिए हमें websites  को डिजाइन  करना, website को बनाना,उसमें अलग प्रकार की डिजाइनें डालना डाटा को डालना आना चाहिए, इस के ही माध्यम से हम web designer बन सकते हैं।
  • Accountant – DCA करने के बाद हम accountant भी बन सकते हैं ,अकाउंटेंट बनने के लिए हमें tally आना बहुत महत्वपूर्ण होता है साथ ही हमें account की जानकारी होना आवश्यक है।

DCA करने के लिए कॉलेज

Top institutes for DCA in India

  • University of Madras   
  • Alagappa University
  • University of Calcutta   
  • Savitribai Phule Pune University
  • Kalinga Institute of Industrial Technology
  • Punjab University
  • Jadavpur University
  • Jamia Millia Islamia
  • Aligarh Muslim University
  • Gujarat Technological University
  • University of Rajasthan
  • Gujarat University
  • University of Allahabad
  • University of Mumbai
  • Amity University
  • Banaras Hindu University
  • Barkatullah University

Thursday 18 February 2021

Get Started With Your First Blog

 

Get Started With Your First Blog

 (11 votes, average: 3.73 out of 5)

                                                                                                                           TECH PK PRAJAPAT




There is no question that blogging is one of the best ways to get keyword rich content on your site, get your message on the search engines and get traffic to your website. But how do you get started blogging?

When you consider starting a blog there are many options. A great way to get started blogging quickly (and for free) is to use an online ‘standalone’ service like WordPress or Google’s Blogger. These are free, highly customizable tools that support both new and more advanced bloggers. The negative is that you can’t use your website’s domain name. For instance, if using Blogger, you blog address would be something like ‘yourblog.blogspot.com.’ While you can link to this from your current website, search engines won’t know give you ‘credit’ for the extra content since it is a different domain. With creative cross linking however, you can still benefit from the increased exposure you can get from a blog.

These free services provide powerful software tool that balance value, quality, and ease of use. While some people prefer to use more basic blog services, they too can truly benefit from the ‘built-in’ benefits of WordPress or Blogger along with its existing large community of users.

One of the most notable benefits of these services is the ease of use, and advanced functionality of the service compared to some blog software applications. Neither Blogger nor WordPress require you to know any ‘coding’ and allow you to built and post to your blog with easy to use icons similar to what one would see in a word processing program. Having the ability to utilize a program like this allows people to create blogs that are as high tech, and complete as full blown websites.

If you are occasionally ‘offline’ you can benefit from WordPress’s ability to import posts. This means you can put your blog together while you are not connected to the internet and then import it later. If you already use another blogging service such you can also import your posts directly into Blogger or WordPress.

Another benefit of these services is their large widget or element and theme libraries that allow you to instantly add useful features, and professional looking styles to your blog. A very simple drag and drop interface allows you to add features such as an RSS feed with a few clicks.

Another option to consider would be blogging software that you can directly integrate into your website. Some hosting provides such as GoDaddy allow you to use your existing domain name for you blog. The benefit is that the content of your blog becomes part of what search engines see for your domain. In these cases you are more likely to pay a monthly add-on fee to your hosting provider. 

https://prajapatpk.blogspot.com/

As an alternative, Google’s Blogger allows you to publish to a FTP site, which means you can blog from your own domain. You lose some of the flexibility of the ‘out of the box’ service, but with a little effort you can have a customized template and pretty easy posting capability that resides within your domain.

As your needs become more advanced or if you are a more technical blogger you may also consider blogging software that can be directly integrated into your website. One to consider is bBlog. bBlog is an open source, PHP/MySQL application. If you don’t know what the last sentence means, then this isn’t for you. If you do know, then you may benefit from the expanded flexibility an integrated application could provide.

In the end, you have a wide, wide range of very inexpensive (or free) options to get started.

Word count: 612


THIS ENTRY WAS POSTED IN BLOGGING AND TAGGED ENEFIT, BLOG, BLOGGER, BLOGGING, DOMAIN, FREE, WEBSITE. BOOKMARK THE PERMALINK.

भारत के जनरल अवेरनेस के क्वेश्चन (India general GK Questions) India GK

 

                                                                                      PK PRAJAPAT


भारत के जनरल अवेरनेस के क्वेश्चन  (India GK) 


Q1 भारत का सबसे बड़ा परमाणु ऊर्जा संयंत्र कौन सा है?

उत्तर कुडनकुलम परमाणु ऊर्जा संयंत्र, तमिलनाडु


Q2 उड़ान" पुस्तक के लेखक कौन हैं?

उत्तर वानना बोंटा


Q.3 "पंचतंत्र" को किसने लिखा है?

उत्तर विष्णु शर्मा


Q4 फ्लाइंग -V विमान किस देश से संबंधित है?

उत्तर नीदरलैंड


Q.5   किसने अपनी राजधानी दिल्ली से दौलताबाद में स्थानांतरित की?

उत्तर मुहम्मद बिन तुगलक


Q6 विनजिप क्या है?

उत्तर WinZip एक विंडोज-आधारित प्रोग्राम


Q7 लाला हरदयाल और सोहन सिंह भकना ने 1913 में गदर पार्टी कहाँ बनाई थी?

उत्तर सैन फ्रांसिस्को


Q8 आगरा की स्थापना  किसने की थी?

उत्तर  सिकंदर लोदी


Q9 आलू के कौन से हिस्से को खाते हैं -

उत्तर कंद


Q10 BARC के संस्थापक कौन थे?

उत्तर डॉ होमी जहांगीर भाभा

How To Protect Your Computer Wery Useful Tips

 

How To Protect Your Computer Wery Useful Tips



 (6 votes, average: 3.33 out of 5)

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. 

For example, it is crucial for businesses to keep information they have secure so that hackers can’t access the information. 

Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions. 

A computer security risk is any action that could cause lost of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cypercrime. 

A cybercrime is known as illegal acts based on the internet and is one of the FBI’s top priorities. There are several distinct categories for people that cause cybercrimes, and they are refereed as hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy. The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. 

They often claim that they do this to find leaks in the security of a network. The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It’s basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills. 

A cyberterrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It’s just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning. 

The term cyperextortionist is someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company’s network. They will request a paid amount to not proceed sort of like black mailing in a since. An unethical employee is an employee that illegally accesses their company’s network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge. 

A script kiddie is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs. A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice. Business and home users must do their best to protect or safeguard their computers from security risks. The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks. Over the internet there is no powerful administrator which makes the risk a lot higher. If your not sure if your computer is vulnerable to a computer risk than you can always use some-type of online security service which is a website that checks your computer for email and Internet vulnerabilities. 

The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a place that can do this. The typical network attacks that puts computers at risk includes viruses, worms, spoofing, Trojan horses, and denial of service attacks. 

Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user’s consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. 

It’s similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. 

The similarity is, the best way to avoid is preparation. A computer worm is a program that repeatedly copies itself and is very similar to a computer virus. 

However the difference is that a virus needs o attach itself to an executable file and become a part of it. A computer worm doesn’t need to do that I seems copies to itself and to other networks and eats up a lot of bandwidth. 

A Trojan Horse named after the famous Greek myth and is used to describe a program that secretly hides and actually looks like a legitimate program but is a fake. A certain action usually triggers the Trojan horse, and unlike viruses and worms they don’t replicate itself. Computer viruses, worms, and Trojan horses are all classifies as malicious-logic programs which are just programs that deliberately harms a computer. Although these are the common three there are many more variations and it would be almost impossible to list them. You know when a computer is infected by a virus, worm, or Trojan horse if one or more of these acts happen:



  1.  Screen shots of weird messages or pictures appear.
  2.  You have less available memory then you expected
  3.  Music or sounds plays randomly.
  4.  Files get corrupted
  5.  Programs are files don’t work properly
  6.  Unknown files or programs randomly appear
  7.  System properties fluctuate



Computer viruses, worms, and Trojan horses deliver their payload or instructions through four common ways. One, when an individual runs an infected program so if you download a lot of things you should always scan the files before executing, especially executable files. Second, is when an individual runs an infected program.

 Third, is when an individual bots a computer with an infected drive, so that’s why it’s important to not leave media files in your computer when you shut it down. Fourth is when it connects an unprotected computer to a network. Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment. 

There are literally thousands of computer malicious logic programs and new one comes out by the numbers so that’s why it’s important to keep up to date with new ones that come out each day. 

Many websites keep track of this. There is no known method for completely protecting a computer or computer network from computer viruses, worms, and Trojan horses, but people can take several precautions to significantly reduce their chances of being infected by one of those malicious programs. 

Whenever you start a computer you should have no removable media in he drives. 

This goes for CD, DVD, and floppy disks. When the computer starts up it tries to execute a bot sector on the drives and even if it’s unsuccessful any given various on the bot sector can infect the computer’s hard disk. If you must start the computer for a particular reason, such as the hard disk fails and you are trying to reformat the drive make sure that the disk is not infected.

Word count: 1308

Wednesday 16 December 2020

Computer Networks Questions & Answers – Access Networks

 TECH PKPRAJAPAT

TECH PKPRAJAPAT


Computer Networks Questions & Answers – Access Networks

 

1. Which of this is not a constituent of residential telephone line?

a) A high-speed downstream channel

b) A medium-speed downstream channel

c) A low-speed downstream channel

d) An ultra-high speed downstream channel

View Answer

 

Answer: c

Explanation: A low-speed downstream channel is not a constituent of a residential telephone line. But it might be just a two-way telephone channel. Internet can be provided through a high-speed downstream channel in a residential telephone line.

 

2. DSL telcos provide which of the following services?

a) Wired phone access

b) ISP

c) Wired phone access and ISP

d) Network routing and ISP

View Answer

 

Answer: c

Explanation: DSL stands for Digital Subscriber Line and ISP stands for Internet Service Provider. In a Digital Subscriber Line system, the same company which provides phone connection is also an ISP. The internet is provided through the pre-installed telephone lines.

 

3. The function of DSLAM is to __________

a) Convert analog signals into digital signals

b) Convert digital signals into analog signals

c) Amplify digital signals

d) De-amplify digital signals

View Answer

 

Answer: a

Explanation: DSLAM stands for Digital Subscriber Line Access Multiplexer and it’s used by Telcos to convert the analog signals to digital signals for the purpose of providing internet. The DSLAM located in a telco’s Central Office does this function.

 

4. Which of the following terms is not associated with DSL?

a) DSLAM

b) CO

c) Splitter

d) CMTS

View Answer

 

Answer: d

Explanation: CMTS stands for Cable modem termination system. It is used in cable internet access. In cable internet access, internet is not provided through telephone lines and the companies that provide such connections don’t necessarily provide telephone access.

 

5. HFC contains _______

a) Fibre cable

b) Coaxial cable

c) A combination of Fibre cable and Coaxial cable

d) Twisted Pair Cable

View Answer

 

Answer: c

Explanation: Hybrid fiber-coaxial (HFC) is a telecommunications industry term for a broadband network that combines optical fiber and coaxial cable. It has been popularly used since the early 1990s. It is stronger than the optical fiber cables and faster than the co-axial cables.

6. Which of the following statements is not applicable for cable internet access?

a) It is a shared broadcast medium

b) It includes HFCs

c) Cable modem connects home PC to Ethernet port

d) Analog signal is converted to digital signal in DSLAM

View Answer

 

Answer: d

Explanation: CMTS stands for Cable modem termination system. In cable access analog signal is converted to digital signal by CMTS. In cable internet access, internet is not provided through telephone lines. DSLAM is used by Telecom companies.

7. Among the optical-distribution architectures that are essentially switched ethernet is __________

a) AON

b) PON

c) NON

d) MON

View Answer

 

Answer:a

Explanation: AON stands for Active optical networks which are essentially switched Ethernets. Each user has his/her own dedicated optical fiber line connecting to the ISP in an AON.

8. StarBand provides __________

a) FTTH internet access

b) Cable access

c) Telephone access

d) Satellite access

View Answer

 

Answer: d

Explanation: StarBand was a two-way satellite broadband Internet service available in the U.S. from 2000–2015. It was discontinued from September 30 2015 due to increasing competition from other ISPs.

9. Home Access is provided by __________

a) DSL

b) FTTP

c) Cable

d) All of the mentioned

View Answer

 

Answer: d

Explanation: Home Internet Access is provided by DSL, FTTP, and Cable. FTTP provides the fastest speeds followed by the cable connections and then the DSLs. FTTP is popularly used in modern connections.

10. ONT is connected to splitter using _________

a) High speed fibre cable

b) HFC

c) Optical cable

d) Twisted pair cable

 

Answer: c

Explanation: ONT stands for Optical Network Terminal. The ONT connects to the Termination Point (TP) with an optical fibre cable. It translates light signals from the fibre optic line to electric signals that the router can read.

 

11. Which of the following factors affect transmission rate in DSL?

a) The gauge of the twisted-pair line

b) Degree of electrical interfernece

c) Shadow fading

d) The gauge of the twisted-pair line and degree of electrical interference

 

Answer: d

Explanation: Because DSL is made of twisted wire copper pair, the gauge of twisted pair line i.e. the protection and electrical interference would affect the transmission rate in DSL. Unlike DSL, FTTP is not really affected by these factors.

Friday 23 October 2020

Hindi Summary of Class 6 Geography NCERT UPSC CSE IAS, SSC

 

Hindi Summary of Class 6 Geography NCERT UPSC CSE IAS, SSC




https://youtu.be/DefEA9QZPcM



https://youtu.be/9uwfuGJtjqo

Sunday 23 February 2020

क्या आपके बच्चो को पढ़ा हुआ याद नही रहेता तो अपनाएं 3 MIRACLE STEPS

Image result for upsc

पी.के प्रजापत


  •   Ø  Linking Method
      Ø  Mechanism of Memory & Acronym Method
      Ø  Chunking Method v How to remember names & Faces
      Ø  Pegging Method
      Ø  How to Learn Foreign Language
      Ø  How to remember birthdays
      Ø  How to remember phone numbers and appointments
      Ø  How to remember Maps
      Ø  How to remember Datelines, Facts and Figures
      Ø  How to remember Science Phenomena
      Ø  How to remember Long-numbered Digits
      Ø  How to remember 200- Digits
      Ø  How to study Mathematics (Vedic Mathematics)
      Ø  How to Remember Long Answers, Essays & Chapters
      Ø  How to Mind Map
      Ø  Judicious Technique (How to make Physics& Chemistry Easy)
      Ø  Mechanical Technique
      Ø  How Much Time Should We Study
      Ø  Study Time Required to Get Top Rank
      Ø  What is the Best Time to Study



    यकीनन आपका बच्चा क्लास में टॉप करेगा |