Why are so many variants of covid-19 arising?

In a bid to contain the spike in COVID-19 cases, the UK went on lockdown in November 2020. But despite having the same lockdown measures, infections in Kent were still rising. Due to an overall drop in the number of cases, the country eventually relaxed its lockdown restrictions. What happened next was nothing short of a nightmare. The number of cases skyrocketed. Researchers realized somewhere in Kent the virus had mutated. It was a new variant, and it was more contagious and was spreading extremely fast. In the next five months, this became the most common form of the virus.

But let us back up for a bit. Why did the COVID-19 virus mutate? Why do any virus mutate at all?                                                                                               

From an evolutionary standpoint, mutations are necessary accessories to natural selection. Most mutations are not beneficial for the organisms. Many mutations cause organisms to leave fewer descendants over time, but once in a while, there are changes that give the virus an advantage. These advantageous mutations led to the emergence of what are now called the Variants of concern.

Viruses are basically just a shell of protein surrounding some genetic material- either DNA or RNA. That genetic material is made up of molecules that can be represented by a series of letters like this

Structure of genetic material of viruses. [ Source: Vox]

Each part of the genetic code contains instructions for how to make one specific protein that allows the virus to function. The virus has one goal- to make more copies of itself. But because they are extremely simple entities they use us to replicate. Whenever a virus infects someone, it takes over their cells to make more and more copies of themselves. This means tediously replicating the  same code repeatedly. Occasionally, however, the virus makes a mistake. This is called a mutation, and it slightly changes the instructions for making the virus. This altered virus is a variant.

Coronaviruses have a specific type of proteins called the spike proteins that they use to bind with and infect the human cell. Luckily for us, this binding is not a perfect fit and the virus cannot always get past the cell’s defenses. What happened with the UK variant or the B.1.1.7 variant is that it had a mutation on the spike itself making the binding better.

The deadly second wave of Coronavirus that wreaked havoc globally, had a cataclysmic effect in India. WHO recently announced that the highly infectious virus variant which was first detected in India will be referred to as the ‘Delta variant.’ As per data, the Delta variant or the B1.617.2  was the primary cause behind India’s devastating second wave and is much more infectious than the Alpha strain (B.1.1.7), which found in the UK.

The Delta variant and its two mutations. [Source: Vox]

The Delta variant has many different mutations, two of which had been seen earlier. These mutations seem to make the virus more transmissible and confers it power to re-infect people. This means the Delta variant evolved as a response to our immune system.

The Delta plus variant, a new mutant version of the Delta strain first detected in India, has been found in 22 cases in Maharashtra, Kerala and Madhya Pradesh and is a “variant of concern”, the government said in a warning to these states this evening. Sharing preliminary details of the Delta-plus variant, researchers at CSIR-Institute of Genomics and Integrative Biology (IGIB) said that it may be linked with abilities to better escape immune response, which means the virus can potentially dodge vaccines and antibody therapies. In fact, Vinod Scaria, a scientist with IGIB, said that there is also evidence of the Delta-plus variant’s “resistance to monoclonal antibodies”, putting into question the effectivity of the monoclonal antibody cocktail that was recently okayed for the treatment of milder cases.

The tsunami we witnessed in the second wave of the pandemic, caused by the delta variant, has only started to ebb. The rise of a new mutant, merely months after the initial detection, makes the Delta plus variant a serious cause of concern, at least on paper.

Trees in Data Structures

The tree is a data structure that allows you to associate a parent-child relationship between various pieces of data and thus allows us to arrange our records, files, and data in a hierarchical fashion. The tree is a very popular data structure used in a wide range of applications. 
A tree data structure can be defined as follows…
The tree is a non-linear data structure that organizes data in a hierarchical structure and this is a recursive definition.
A tree data structure can also be defined as follows…
The tree data structure is a collection of data (Node) that is organized in hierarchical structure, and this is a recursive definition.

In a tree data structure, we use the following terminology :

1) ROOT: In a tree data structure, the first Node is called Root Node. Every tree must have a root node. We can say that the root node is the origin of the tree data structure. In any tree, there must be only one root node. We never have multiple root nodes in a tree.

2) EDGE: In a tree data structure, the connecting link between any two nodes is called EDGE. There will be a maximum of ‘N-1′ number of edges in a tree with an’ N’ number of nodes.

3) PARENT: In a tree data structure, the Node, which is a predecessor of any node, is called as PARENT NODE. In simple words, the Node with a branch from it to any other node is called a parent node. A parent node can also be defined as “The Node which has child / children”.

4) CHILD: In a tree data structure, the Node, a descendant of any node, is called a CHILD Node. In simple words, the Node with a link from its parent node is called a child node. In a tree, any parent node can have any number of child nodes. Thus, in a tree, all the nodes except the root are child nodes.

5) SIBLINGS: In a tree data structure, nodes that belong to the same Parent are called SIBLINGS. In simple words, the nodes with the same Parent are called Sibling nodes.

6) LEAF: In a tree data structure, the Node which does not have a child is called LEAF Node. In simple words, a leaf is a node with no child. In a tree data structure, the leaf nodes are also called External Nodes. External Node is also a node with no child. In a tree, a leaf node is also called a Terminal Node.

7) INTERNAL NODES: In a tree data structure, the Node which has at least one child is called as INTERNAL NODE. In simple words, an internal node is a node with at least one child. In a tree data structure, nodes other than leaf nodes are called Internal Nodes. The root node is also an Internal Node if the tree has more than one Node. Internal nodes are also called ‘Non-Terminal’ nodes.

8) DEGREE: In a tree data structure, the total number of children of a node is called DEGREE of that Node. In simple words, the degree of a node is the total number of children it has. Therefore, the highest degree of a node among all the nodes in a tree is called the ‘Degree of Tree.’

9) LEVEL: In a tree data structure, the root node is said to be at Level 0, and the children of the root node are at Level 1, and the children of the nodes which are at Level 1 will be at Level2 and so on… In simple words, in a tree, each step from top to bottom is called as a Level and the Level count start with ‘0’ and are incremented by one at each level (Step).

10) HEIGHT: In a tree data structure, the total number of edges from the leaf node to a particular node in the longest path is called as HEIGHT of that Node. In a tree, the height of the root node is said to be the height of the tree. In a tree, the height of all leaf nodes is ‘0’.

11) DEPTH: In a tree data structure, the total number of edges from a root node to a particular node is called as DEPTH of that Node. In a tree, the total number of edges from a root node to a leaf node in the longest path is said to be the depth of the tree. In simple words, the highest depth of any leaf node in a tree is said to be the depth of that tree. Thus, in a tree, the depth of the root node is ‘0.

12) PATH: In a tree data structure, the sequence of Nodes and Edges from one Node to another node is called PATH between that two Nodes. The length of a Path is the total number of nodes in that path. 

Maroju Sanjana



personality

Personality is a patterned body of habits, traits, attitudes, and ideas of an individual’s, as these are organized externally into roles and statues and as they relate internally to motivation, goals, and various aspects of selfhood.

The term personality is derived from the Latin word “Persona” which means to speak through. An individual’s personality is the combination of traits and patterns that influence their behavior, thought, motivation, and emotion. It derives individuals to consistently think, feel, and behave in specific ways; in essence, it is what makes each individual unique. Over the time, these patterns strongly influence personal expectations, perceptions, values, and attitudes. In addition to this, personality arises from within the individual and remains fairly consistent throughout life. It is a pattern of stable states and characteristics of a person that influence his or her behavior towards goal achievement. Each person has unique ways of projecting these states.

The study of personality focuses on two broad areas;

  1. One is understanding individual differences in particular personality characteristics, such as sociability or irritability.
  2. The other is understanding how the various parts of a person come together as a whole.

Characteristics of Personality

The term personality is used in various senses. Generally, it is used to indicate the external outlook of an individual. Personality is the sum of the ideas, attitudes and values of a person which determines his role in society and form an integral part of his character. Personality is acquired by the individual as a result of his participation in group life. It refers to something much more essential and enduring about a person.

Personality has other characteristics or features in common.

  1. Personality refers particularly to the persistent qualities of an individual.
  2. Personality is something which is unique in each individual.
  3. Personality is greatly influence by social interactions.
  4. It impacts behaviors and actions
  5. Consistency
  6. Multiple expressions.

Life skills to help you improve your Personality

Developing the personality can have a lot positive effect on your life and career. There was a belief that nature is permanent and it is not possible to change it. The personality is a typical pattern of behaviors, thinking, and they are unique. With outstanding effort, you can improve your habits and the pattern of thinking.

Here are some tips that will help you improve your personality:

  1. Become a better Listener: If you are a good listener, you can learn a lot from your surroundings. Being an excellent listener is a very good skill. When you listen to other people, you give them importance. They also pay more attention to you and will become more engaging.
  2. Meeting new people: Always make an effort to meet new people. Engaging with people provides you with a lot of experience, and you can learn so much from different people. Meeting new people can expose you to new cultures, ideas, opinions and it expands your mind.
  3. Expanding your interests: It is always good for the mental health to develop your interests. It will keep the mind fresh, and it will help in cultivating the new interests. It will also make you more

attractive to others as you will always have new things to share and talk about. 4.Becoming a better conversationalist: When you know your interests, and are well versed in them, you will have more confidence to talk about them. Having more knowledge means that you can contribute more to the conversation. If you want people to listen to you, it is important that you are an impressive talker. 5.Polishing interpersonal skills: Interpersonal skills are the core competencies for a successful life. These skills are useful for communicating and interacting on a daily basis. These skills are needed not just for individual interactions, but also in groups. You can work on developing good interpersonal skills.

Film industry in covid-19 crisis.

The COVID-19 Pandemic has had an impact on nearly all aspects of our lives, and the film industry is no exception.Movie theaters are by nature a high-risk environment, as they often pack hundreds of people into a small space together for extended periods of time. Additionally, it can be difficult and time-consuming to clean them, making them less than ideal for a highly contagious virus like COVID-19.So how have businesses like movie theater chains and film production companies adjusted to these unprecedented times?

Movie theaters have arguably been hit the hardest, and several major chains such as Cinemex have been forced to close down permanently. Even AMC, the largest chain in America, may be forced to file for bankruptcy. Some smaller chains and independent theaters have allowed small groups of people to book private screenings, in an attempt to earn some money. Several states have announced support for a socially-distanced reopening of theaters, but with distribution companies not releasing new films and most film-goers wary, it remains to be seen if many will reopen at all.

Because of the Covid-19 lockout, the demand for OTT content has skyrocketed. The largest participant in this market, ‘Netflix,’ had a huge income that surpassed $25 billion US dollars in 2020. Similarly, the income of other OTT platforms has skyrocketed! Have you ever wondered how these OTT media generate money?

Over the top media is a video streaming technology that allows you to enjoy content while connected to the Internet. There is also a large selection of content available in both free and paid versions, such as movies, TV series, and documentaries.OTT media creates movies by assembling a crew and funding them out of their own pockets. The second option is to buy the rights from filmmakers in order to expand their content inventory.

With the use of machine learning known as Algorithm, over the top media know their audience’s preferences. This medium is dubbed “The Future of Entertainment,” as our generation is completely reliant on these channels for entertainment. The profitability of OTT media is determined by the number of viewers and subscribers. The more people that use these platforms, the more money may be made through the aforementioned revenue models.

Once a movie becomes a hit and garners huge box office collections, its subsequent satellite and OTT rights will also be priced at exorbitant rates, said Umrotkar. “…that way, OTT releases are not going to compensate for the potential the movie could have had,”both cinemas and OTT platforms will coexist beautifully.

Journey Of Feather 🪶

Being a feather I was expecting that I will have numerous adventure filled with fantasies and daring. But It was not like that I was thinking about. In today’s world there are no scarcity of creative people. A feather is now not only meant to drift through wind but it is also now a major part of creativity.
DIY or we can say do it yourself is one of the popular and viral things that people are adopting it now. So instead of that flying in the sky, I would share my feather experience as a craft material.
So after watching youtube videos or 5 minutes crafts. Kid caught me from the playground and took me to their working table. I was there with a huge bottle of fevicol and a scissors. The kid came and put the fevicol on me. The moment when he put that fevicol the vanes of it got sticked to each other. I was feeling so sticky and heavy at that time . After that he pasted me on a mask which he made by himself. He took scissors and trimmed my vanes to get me a finished look . He looked at me as he has achieved anything. He ran to his parents and show them up this masterpiece I was admired by everyone. The next day the kid took me to school to show off their friends. One of his friends got jealous of him. He came and snatch the mask from him. Now the mask was between the hands of two kids and I was waiting for someone to come and stop this fight. But no one came. The mask was now in 2 pieces but I was in the hand of the kid who made the mask. I was thankful But just few moments later he found another feather on the ground in his school and that was beautiful than me. He threw me and ran to that feather. I was alone and thinking that now I will be burned with the heap of dry leaves by the gardener. Suddenly A girl stepped on me, She realized that and took me up, and now I will be going to a part of a new craft of that girl.
With this, I would like to rest my journey as a feather.

Cloud Computing

Cloud computing facilitates in the analysis and storing of the data, allowing companies to get the most out of their IoT infrastructure.

Businesses may get a lot of resources from the Cloud, so they don’t have to spend a lot of money building up their infrastructure. The IT team is more focused on day-to-day upkeep operations in the absence of on-site systems, hardware, and software, which is frequently an obvious benefit of the Cloud.

Even in the face of unexpected crises, cloud computing can keep organisations functioning. There is no immediate threat to the private data because it is stored on extra independent servers, making the Cloud a vital aspect of Internet-based companies.

Features of Cloud Computing

  • Resources Pooling
    • It indicates that the Cloud provider used a multi-tenant architecture to draw computing resources to deliver services to many clients.
    • Various physical and virtual resources are assigned and reassigned based on the needs of the client.
    • The client has little control or information about where the given resources are located, but can define location at a higher level of abstraction.
  • On-Demand Self-Service

It is one of the most essential and valuable elements of Cloud Computing since it allows the user to keep track of the server’s uptime, capabilities, and network storage allocation. This function also allows the user to keep track of the computer’s capabilities.

  • Easy Maintenance

The servers are simple to manage, and downtime is minimal, if not non-existent in some situations. Every time a new version of Cloud Computing is released, it improves steadily. The upgrades are more compatible with devices and work quicker than previous versions, as well as having problems repaired.

  • Large Network Access

With the assistance of a device and an internet connection, the user may view the cloud’s data or upload data to the cloud from anywhere. These capabilities are available throughout the network and may be accessed over the internet.

  • Availability

The Cloud’s capabilities may be customised for the user and can be vastly expanded. It evaluates storage utilisation and, if necessary, allows the user to purchase more Cloud Storage for a nominal fee.

  • Automatic System

At some level of service, cloud computing automatically analyses the data required and facilitates metering. We can track, manage, and report on consumption. It will give both the host and the client with transparency.

  • Economical

It is a one-time expense since the firm (host) must purchase storage and just a portion of it can be shared among numerous companies, saving the host money on a monthly or annual basis. Only a small portion of the money is spent on basic maintenance and a few other little costs.

  • Security

One of the most appealing aspects of cloud computing is its security. It takes a snapshot of the data saved so that it doesn’t be lost if one of the servers is destroyed. The data is kept on storage devices that cannot be hacked or accessed by unauthorised individuals. The storage service is efficient and trustworthy.

  • Pay as you go

In cloud computing, the user only pays for the services or storage space that they use. There are no hidden or additional fees to be paid. The service is reasonably priced, and most of the time some space is made available for free.

LOVE IS NOT WAr

How many times have we heard that one? Speaking very frankly, I think this phrase is highly meaningless. Love does not have to mean war unless you make it into a fight, a fight for what you deserve, i.e., to love freely. To quote James Kirkup in his poem No Men Are Foreign, “The land our brothers walk upon is earth like this, in which we all shall lie.”, we are all born the same and eventually perish on the same land. 

People who belong to the LGBTQ+ community are no different than the ones who don’t. It is very straightforward and simple when you really think about it and are willing to open your mind to acceptance without wrongly judging somebody’s strength of character based on who they identify as. Gender well as sexuality, are two very subjective terms. It might mean one thing to someone and something entirely different to another. The term ‘LGBTQ’ is an acronym for Lesbian, Gay, Bisexual, Transgender, and Queer. These are all umbrella terms for the people who resonate with the particular label. Some people might not want to label themselves at all, which is also completely natural. As allies of the community, we should encourage them to be true to themselves and help them feel safe in their chosen environment. We should talk more freely about this taboo topic in order to ensure the development of people’s mindsets by educating them on the subject. 

It is not important what labels a person has, or no labels at all. What matters is their metal, what they are made of, who they are as humans.

ARE WE LOSING OUR CULTURE AS A NATION

India is, the cradle of the human race, the birthplace of human speech, the mother of history, the grandmother of legend, and the great grandmother of tradition. our most valuable and most instructive materials in the history of man are treasured up in India only. India is country whose foundation are culture and tradition. Indian culture is several centuries old and consist of ethical values and traditional practices. Today in 21st century, we have evolved, it’s a century where we have access to different societies and part of the globe. We are getting to know about the world and in this process, we are losing our culture which is our identity, we are influenced towards the western world and western culture. Culture is one of the strongest pillars of our country and I feel that we are losing it day by day. Although globalization has played an immense role towards the economic growth of our country, but when its dark side is witnessed, we get to know that a great amount of cultural identity and traditional values have been lost, which cannot be regained through any amount of economic prosperity.

 It’s not a doubt that we have made English a superior language. If a person speaks his mother tongue, we may judge him on the other hand when someone speaks fluent English, we are impressed by it. Sanskrit is India’s one of the oldest languages which seems like it doesn’t exist much. Few years ago, touching feet of elders as a greeting was a mandatory practice but today its not followed in many parts of our nation. If we talk about Food, we want to eat pizza and burger over dal roti and when it comes to clothing, we find our comfort in western clothes. Today, for most of us western dresses are our daily wear clothes and not the traditional ones. If we talk about sports, our traditional games like kho-kho, kabaddi and our national sport Hockey is not much famous in our country. If given a choice we rather watch and play cricket, football or the digital gaming world like PlayStation games which is now the favorite of our youth.  People get annoyed hearing Indian music which have Ragas, Talas which give us pleasure. But on the other hand the they like pop, rock and hip-hop. India offers a number of classical dance each of which can be traced to different parts of the country and because of the western outlook most of them tend to follow it. Some festivals are associated with renowned historical or cultural places like the Khajrao festival, Taj Mahoutsav, etc. We must give equal importance to the Indian culture as we are Indians and shouldn’t let any culture to come in our way. 

Culture is the name for what people are interested in, their thoughts, their models, the books they read and the speeches they hear. Respect and preserve our culture because it gives us an identity and defines us- what we are, who we are and where we have come from, it makes us unique. Don’t forget your roots and be proud of our culture.

UNITY IN DIVERSITY

India is a land of “Unity in diversity”. The high mountain ranges, vast seas , large river-irrigated lands, countless rivers and streams, dark forests, sandy deserts, all these have adorned India with an exceptional diversity. Among the people there are numerous races, castes, creeds, religions and languages

India is called the ‘Land of unity in diversity’ because it consists of various culture, customs etc. The main religions of India are Hinduism, Sikhism , Jainism , Buddhism , Christanity and islamic. As India is home to many people with different religions,castes,cultures and traditions.

The diversity in India is unique. Being a large country with large population. It presents endless varieties of physical features and cultural patterns. It is the land of many languages it is only in India people professes all the major religions of the world.

Unity in India is the best example of ‘unity in diversity’ because people living with different religions and culture follow the same laws as laid down in the Constitution of India.

India is home to a huge diversity of cultures, religions, and languages where people from different religions coexist with harmony The wide variety of festivals celebrated in India is a example of its rich culture and traditions

Festivals contribute immensely to feelings of social peace and harmony . Many such celebrations focus on cultural or ethnic topics and seek to inform community members of their traditions.

India is a country with a diverse culture, different ethnicities, and rich heritage. Every citizen of India realizes the significance of festivals in the country. Most of these festivals signify the importance of religious deities and an occurrence that marked the day as special.

Why is SQL important? What problem is it solving?

Database administration or data management is incomplete without the SQL. For comfortable use of  SQL as part of your administration or development requires that you understand the basics of SQL, which will take you a long way in your career.

Before we start with the introduction to the SQL itself, and then, understand the important features of SQL Server. It will take you through a demonstration of the internal workings of SQL, starting from SQL standards, evolution, and progresses to creating tables, understanding and defining relationships, writing Transact‑SQL commands, and so on.

You will also understand that SQL is a special-purpose programming language; special-purpose, as in, it is different from the general-purpose programming languages such as C, C++, Java/JavaScript, etc., meaning, it has a very particular purpose: manipulation of datasets. And this manipulation happens using what is known as Relational Calculus.

But isn’t studying SQL alone, restrictive? Turns out, it isn’t. Of course, we can use SQL on any kind of database or data source, but even if we cannot directly use SQL, most query languages of today have some relationship to SQL. In general, once you know SQL, you can effortlessly pick up other query languages too.

Standards are vital because every relational database must build its framework around this framework in order to ensure compatibility. This means that the learning curve is greatly reduced. SQL is ANSI as well as ISO-compliant, along with other standards, which emphasizes the fact that you have to learn the concept only once.

CYBERSECURITY – AN OVERVIEW

WHAT IS CYBERSECURITY? 

Cyber Security is defined as the measures taken to safeguard the connected networks and the data related to them from any attack, damage, or unauthorized access. Every organization like educational, medical, or financial organizations store a large number of user data or many confidential data which needs to be protected from outside access. These data if not protected keeps the company’s reputation at stake. The company needs to cover up data just like we hide our personal information in our online life. Healthcare organizations have their patients’ medical reports along with some personal info. Educational institutions will have the students’ and teacher’s personal as well as academic details. Corporate companies save their employee’s private details including their pay structure and banking details. 

Nowadays, we have highly privileged data such as intellectual property, patents, copyrights, etc… which have to be maintained as a secret from other competitive organizations. Losing this kind of information will affect the organization’s future on a large scale. With the advent Internet of Things (IoT), we have a lot more data to be managed and secured as we have widened the storage services through cloud and virtualization. This has given rise to a new stream called Big Data, which covers large volumes of data related to business and technology. 

WHY IT IS NEEDED?

All these details are confidential and need to be covered up from the external world so that no one could take easy advantage of them. Whenever we engage in any websites that have access to our data like name, age, or photos, the information will also be saved in the website’s server which allows the hackers to access the data. When the hackers see something beneficial in you, they use this data to threaten you to get something like ransom in return. Some steal this info to use your identity faking as their own. This may harm an individual or a whole company very badly. This summarizes the need for cybersecurity and the increase in scope for the field.

CIA TRIAD

  • CONFIDENTIALITY – Also known as privacy, this deals with restricting unknown access by using authentication encryption. Various methods used here are data encryption, two-factor authentication, biometrics and Username, ID, and password. 
  • INTEGRITY – This ensures accuracy and consistency even after unauthorized access. It is done by bringing in file permissions, version history, and backups. Checksum uses hashing algorithms to compare the hash value before and after any changes in data. If the data remains the same, the hash value returned is also the same. But even if a minute change is done in the data, the hash value returned will not be the same. By comparing the hash values, we can ensure integrity. 
  • AVAILABILITY – Making the data available only to the authorized users and performing hardware repairs, software updates, and backups on a timely basis. Avoiding attacks by using security software that doesn’t allow malicious attacks.

TYPES OF ATTACKERS

  • AMATEURS – Sometimes called script kiddies, these people are the ones with zero or low knowledge of hacking. They just follow the instructions found on the internet out of curiosity or just try their skills out. Still the results can be highly serious.
  • HACKERS – This group of people tries to get access to computer networks. They are further classified into three.
    • WHITE HAT HACKERS – These people break into computers to find out the flaws and fix them with the prior permission of the organization.
    • BLACK HAT HACKERS – These people break into computers with malicious intent and without permission. They try to take advantage of the company’s weaknesses.
    • GREY HAT HACKERS – These people fall somewhere between white and black hat hackers. They engage in unethical things but not with the intention of harmful attacks like the black hat hackers.
  • ORGANIZED HACKERS  This category includes cybercriminals, hacktivists, terrorists, and state-sponsored attackers.

CONSEQUENCES OF HACKING

The seriousness of the consequences differs with the scenario. But on the whole, the company or the victim is the one who faces the aftermath. For example, the attacker might use phishing techniques to hack your details. There might be some attachments in the mail that seems to be genuine and on clicking that it may look legitimate and ask for your details but actually, it might be a trap of the hackers which may cost you. Another example may be Denial of Service (DoS). We often come across website traffic because a lot of users try to access it. But the overloading may be done by the attackers to shut the website down. Again, this leads to unimaginable consequences. There are many more techniques and examples to cite. 

AWARENESS

Awareness leads to prevention. We can be more cautious when we give our private information like DOB, Banking details, ID proofs on any site. We should also be aware that all our picture uploads and other things are stored in the servers which might cause some problems similar to those we come across in our day-to-day life. It is always suggested to stay intact and stealthy when it comes to our social-media life.

How to turn your old router into Range Boosting WIFI Repeater

Let’s say you have a large house including basements and upstairs floor. There must be certain area or room where you are getting buffers when you are trying to connect to network. You may often want to extend the wireless signal out too if you have outbuildings, greenhouse or garage attached to your house. Here’s how to turn your old router into Range Boosting WIFI Repeater.

You can use your old router to boost Wi-Fi range. Now there are couple of things you would require to turn your old router into Range Boosting WIFI Repeater.

1. You will need an old router.

2. You should have an Ethernet cable running from your existing router out to the location you want to extend your network. There’s few setting you need to disable and certain configuration you need to do on router to turn into extra wireless access point.

Reset router to factory default settings

The first thing you need to do with your old router is reset it back to it’s factory state. Find the little pin hole at the back of the router known as reset button. Power on the router, insert a paper clip or similar, and hold it firmly for approximately 10 seconds. Once you release the button router actually will start to reset back to factory settings and that’s all you need to do.

Note current network configurations

Now you need to get some preliminary information from current network that is setup in your home. First thing you need to do is just hold that window key down on your keyboard and window flag normally the bottom left hand corner of your keyboard in between Ctrl and alt. So you should hold down the windows key and then tap the letter R. This bring up a run box or run prompt. Type CMD then press enter. Now you have a command prompt. Type IP config , press enter. This pull up your some information about current network. You have to pick different IP address (150 or 220) but can’t go higher than 254 for instance 192.168.1.220.

Newly reset router log into router using default IP

Move on to the next step. You have to disconnect your laptop from other any current wireless network or any other network that is connected to do make sure that it’s not connected to internet and turn off wireless or whatever you need to do to disconnect it from your current network, power on your new reset wireless router. Just take any standard Ethernet cable and go ahead and first plug it into one of the four ports on back of your router. Plug in your Ethernet cable to the router. Router is powered on and then plug the other end of your Ethernet cable into your computer’s Ethernet port and now configure the settings in computer so that it will behave properly on your current network and act as it is just wireless extension. Press the windows keys and type R same as before. Type in CMD again and press enter. Now open a command prompt. Press IP config again and this gives same information. You need to note down default gateway IP address and close prompt command box.

Wireless network name and security configuration

Next step is to open browser. Proceed to address bar and rub out everything that’s up there. Now you have to type in that address you just notated (192.168.1.1) and press enter. Now give access directly to your router. A pop up box emerges with password and username box to log into router. Since you reset it back to factory default, there will be factory admin and factory password for the router. After filling up press ok.

DHCP is turned off

So once you are logged into your router. Just depending on brand router, you have settings and menus might be in different place but what you should look for first is your wireless settings. Click on wireless setting and this is just what you going to give name to new wireless network that you’re creating in home. You should also put security on there so no one else gets into it. If you have option select WPA 2. You’ll be asked to create a passphrase. So you’ve got your new wireless network name. You have your security type selected and you have a password selected. You need information every time you connect to this network and press apply. Now you have to select LAN setup turn off the option to use router as a DHCP server to prevent your router assigning IP address to anyone. Your main router only assign IP address. So actually it will not work as a router anymore. Now you need to change the last digital of IP address. Whenever you want to manage this access point, you’ll need to know the IP address. This acts as the IP address of wireless access point. Then hit apply button.

Router is configured to previous IP address

You have got your router all set up. It’s called access point in your home and don’t act as router. So you’ve got that all configured. Place it up on the top of desk so it’s in real high location you want to hook up wireless.

Conclusion

Strengthen throughout your house so already have Ethernet cable run up from existing router. Just put this Ethernet cable into one of the four ports on router. This is the most simple way to extend an extra wireless access point to have and turn your old router into range boosting WIFI repeater.

Female Feticide

Even after years of development and advancement misogyny still prevails in society. And this issue prevails because of the existence of social evils. Even in the 21st century, many people find girls as a burden on the family and not capable of achieving anything, but doing household chores. The stigma still exists mostly because of the dowry culture. As still having a girl child means giving hefty dowry for their marriage. Other than that, ‘preference of son over daughter as for old age security’, and the thought that ‘daughters can only be only involved in domestic work as they are ultimately going to be married off, and thus there is no need of education for them’, and more such narrow-minded thoughts exist in the society. All such thoughts and beliefs result in female feticide.

What is Female Feticide?

Female feticide the process of identifying the sex or gender of the fetus or the unborn child still in the mother’s womb, and aborting it if found out to be a girl. The sex of the fetus is determined through prenatal diagnostic tests. Sex-selective abortion results in the murder of a female fetus.

India Government’s Take on the Matter

Female foeticide hampered the child sex ratio. Some parts of India have a critically low child sex ratio. As per the 2011 census, the number of girl child in the age group of 0 – 6 years is 75,837,152 out of 158,789,287 which accumulates to 47.8%, and the number of girl child in the age group of 7 years and above is 540,772,113 which accumulates to 48.6% of the total number of children in this age group, which is 1,051,404,135. Even the literacy rate is low in girls. The literacy rate of male children stands at 80.9% whereas the literacy rate in girls stands at 64.6%, as per the 2011 census data. It is even seen that the rate of dropping out of school and higher education is more for girls.

 ‘Pre – Conception and Pre – Natal Diagnostics Techniques Act, 1994 (PC & PNDT), was enacted by the Parliament of India to put a curb on female foeticides. The act banned prenatal sex determination and regulates the pre-natal diagnostic techniques that are capable of determining the sex of the fetus, only for detecting any abnormalities.

Beti Bachao, Beti Padhao Scheme – Beti Bachao Beti Padhao Scheme (BBBP) was launched on 22nd January 2015 at Panipat, Haryana by Prime Minister Narendra Modi. An initial fund of Rs 100 crore was accumulated for the implementation of this scheme. It mainly targets Uttar Pradesh, Uttarakhand, Haryana, Bihar, Punjab, and Delhi, where the child sex ratio is critically low.

The scheme involves enforcement of ‘Pre – Conception, and Pre – Natal Diagnostics Techniques Act, 1994 (PC & PNDT) and spreading nationwide awareness and multi-sector action focused on 100 districts throughout the country in its first phase where the child sex ratio is specifically low. Pre – Conception and Pre – Natal Diagnostics Techniques Act, 1994 (PC & PNDT) was enacted to stop the practice of female feticide.

The scheme aimed at eradicating the practice of female feticide which is the reason for the declining child sex ratio (CSR) as the practice of abortion of female fetus and murder of girl child is done as the girl child is seen as a liability on the family.

Today, the world collectively talks about equality and where women are performing at par with the men; where women are stepping on the moon; marking excellence in the field of science, technology, and inventions, still is divided by a society that believes in killing a child which has not seen the world just because it is a female, and is believed to be of no good and a burden because of the social evils they created themselves.

Female feticide is a crime and also threatens the human right of ‘right to life’. It is important not just to literate but educate and aware the society about such social stigmas existing in the society.

History of vaccination in India

The world is in a pathetic situation fighting with a deadly pandemic named COVID-19. On 31st December 2019, the first case of COVID was reported in Wuhan, China, and on 30th January 2020 in India. The number of COVID cases is increasing rapidly all over the world. The world had become helpless and hopeless. The only ray of hope was the scientists trying their level best to find a vaccine for COVID. Currently, we have at least 13 different vaccines across 4 platforms. Pfizer/BioNtech comirnaty vaccine was the first successful vaccine introduced to the world, listed for WHO Emergency Use Listing (EUL) on 31 December 2020. The SII/Covishield and AstraZeneca/AZD1222 vaccines (developed by AstraZeneca/Oxford and manufactured by the State Institute of India and SK Bio respectively) were given EUL on 16 February.

The national regulator has approved two vaccines for Emergency Use Authorisation is Covid shield and Covaxin. India’s COVID vaccination drive was scheduled to start on February 16 with priority given to an estimated three crore healthcare workers and the frontline workers, said the Health Ministry. It also added that people above the age of 50 will be vaccinated, co-morbidities will be given to people below the age of 50.
Under the first formulated policy of vaccine distribution, half of the vaccines produced in India went to the federal government, and the other half to state administration and private hospitals. Although the states competed on the open market for the vaccine doses for the 18-44 age group, recipients were able to get them for free at the state government’s vaccination centers. Meanwhile, the federal government was vaccinating frontline workers and those aged above 45 years – also for free.
Under the new policy, the federal government will now buy 75% of all vaccines manufactured. It means that the state government will receive vaccines from the federal government based on the population, state of the virus, progress of the vaccine. This benefits the state authorities as they don’t have to pay high amount to the manufacturer than they offered to the federal government for vaccines. The announcement also happened just days after the previous policy attracted criticism from India’s top court, which called it “arbitrary” and “irrational”. It questioned the rationale behind making states pay more for vaccines than the federal government had to. States had to procure them on the open market, and so the financial burden on some of the poorest states such as Bihar, Jharkhand, and Uttar Pradesh significantly increased.
India’s previous record of 4.5 million doses was on April 5, followed by a sharp decline with average daily inoculation falling below 3 million. Experts have said India needs to administer 10 million doses a day to achieve its aim of inoculating 950 million adults by December. So far, India has fully vaccinated fewer than 5% with two doses. After this policy was brought to practice, India has broken its record after vaccinating 7.5 million people in a day.
“If supply remains consistent, we will be on course to innoculate most of our population by the end of the year, D N Patil, a senior health official in the country’s richest state of Maharashtra.
Government adviser Vinod Kumar Paul said on Monday that administering 10 million shots per day was not a “set goal”.
“As the ramping up takes place, speed of implementation should also ramp up and that would lead to a certain number,” Paul said in an interview with the CNBC-TV18 channel.
“There is a demonstration by the system of how much can be done on a given day, at least this is something that should become obvious by the end of the day.”
India’s vaccination drive has been a rollercoaster but sooner or later it will come back on track.

Covid-19 vaccine

“Strength does not come from physical capacity. It comes from an indomitable will.”

Mahatma Gandhi

Yes the will power should be strong and covid-19 checked it and many passed the test by accepting the lockdown situation during the crisis. The Covid-19 also known as Coronavirus is a group RNA virus which infects only mammals and birds. It causes respiratory related diseases which range from mild to lethal.This new group of viruses were named coronaviruses after their distinctive morphological appearance.Human coronavirus 229E and human coronavirus OC43 continued to be studied in subsequent decades. The coronavirus strain B814 was lost. It is not known which present human coronavirus it was.Other human coronaviruses have since been identified, including SARS-CoV in 2003, HCoV NL63 in 2003, HCoV HKU1 in 2004, MERS-CoV in 2013, and SARS-CoV-2 in 2019 which got spread worldwide, therefore named as Covid-19. This virus has made humans learn about humanity by helping others in pandemic situations. Many people lost their lives while fighting against the virus, due to lack of oxygen and treatment. The current 22nd June 2021 covid case study is total cases are 179,680,188 and deaths are 3,891,130 and the recovered ones are in no of 164,370,420. As the virus is mutating and evolving so vaccination is the key form to stop spread of this virus.

Vaccinate World

During Pandemic time it was the feeling that the whole world was a slave under coronavirus. But there were many frontline workers in the form of Freedom Fighters who fought for people and stood as a shield against deadly viruses . Many lost their lives but they fought till their last breath. Over 80 lakh frontline workers were lost in this fight. They are the doctors, nurses, the working and non-working staff of hospitals. They performed their duty without taking their own care. The only hope to stop covid-19 is Vaccine. Firstly, many researchers tested various mammals and studied its effects on them. Now the mission to Vaccinate world began. The vaccines were introduced around the world and each had a different time interval between doses. Here is the list of vaccines introduced in the world which gave hope to survive:-

1.      Pfizer–BioNTech

2.      Moderna

3.      novirus vector vaccines

4.      Oxford–AstraZeneca

5.      Sputnik V

6.      Johnson & Johnson

7.      Convidecia

8.      Sputnik Light

9.      Sinopharm (BBIBP)

10.   CoronaVac

11.   Covaxin

12.   Sinopharm (WIBP)

13.   CoviVac

14.   QazCovid-in

15.   EpiVacCorona

16.   ZF2001

Problems occurred and Faced them

We know that the world isn’t filled with only smart people, there are some people who are interested in troubling others. In this covid like situation some people became hurdle in path of the vaccinated world. Their bad deeds include selling oxygen cylinders in black, storing them in large numbers so as to sell at higher prices during shortages. They didn’t stop here, they even started a black market of vaccines. They know that poor ones are badly in need of vaccines so they take advantage of this situation and sell vaccines at 3 or 4 times higher price than the value set by the government and the poor ones have no option but to buy it. They are too helpless and no one comes to help them and they sell everything for a single dose of vaccine. But for bad people there are always punishers such as cops who made them come to the right path. The cops raided many places, seized vaccines and oxygen cylinders and arrested the gangs working behind these scams. All countries helped each other in one or other way and formed a special bond between them that is of humanity.

Spreading Awareness

Social media, which is one the best inventions, can spread awareness among people regarding the use of vaccines. This awareness is much more important because many are unaware of the importance of vaccines. There are also some people who think doing vaccination is nothing, it is a waste of time. They also spread wrong information about vaccines. This information is spread within a minute in thousands through social media. This needs to be stopped. These bad influencers need to understand that vaccines are a type of advantage for people not a disadvantage. It is an essential key against covid virus. There are many good spreaders who understand and help people digitally through social media. I would specially refer to them as “digital frontliners”. So it is a humble request to spread awareness among people as much as you can.

At last I would like to say “Stay Strong Stay Safe”