Cyber Crime

N kavya

Cybercrime is any criminal activity that involves a computer, networked device, or network. cybercrimes are carried out to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them. Others use computers or networks to spread malware, illegal information, images, or other materials. Some cybercrimes do both — i.e., target computers to infect them with a computer virus, which is then spread to other machines and, sometimes, entire networks. A primary effect of cybercrime is financial. Cybercrime can include many types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, identity fraud, and attempts to steal financial accounts, credit cards, or other payment card information. Cybercriminals may target an individual’s private information or corporate data for theft and resale. As many workers settle into remote work routines due to the pandemic, cybercrimes are expected to grow in frequency in 2021, making it especially important to back up the data.

The U.S. Department of Justice (DDJ) divides cybercrime into three categories :
1. Crimes in which the computing device is the target
2. Crimes in which the computer is used as a weapon
3. Crimes in which the computer is used as an accessory to a crime

Cybercriminal activity may be carried out by individuals or groups with relatively little technical skill, or by highly organized global criminal groups that may include skilled developers and others with relevant expertise. Cybercriminals often choose to operate in countries with weak or non-existent cybercrime laws to further reduce the chances of detection and prosecution.

Types of Cybercrime -:

1. Cyberextortion: A crime involving an attack or threat of an attack coupled with a demand for money to stop the attack.
2. Crypto-jacking: An attack that uses scripts to mine cryptocurrencies within browsers without the user’s consent.
3. Identity Theft: An attack that occurs when an individual accesses a computer to glean a user’s personal information, which they then use to steal that person’s identity or access their valuable accounts, such as banking and credit cards.
4. Credit card Fraud: An attack occurs when hackers infiltrate retailers’ systems to get their customers’ credit card and/or banking information.
5. Cyber espionage: A crime involving a cyber-criminal who hacks into systems or networks to gain access to confidential information held by a government or other organization.
6. Software-Piracy: An attack that involves the unlawful copying, distribution, and use of software programs with the intention of commercial or personal use.
7. Ransomware attacks are similar, but the malware acts by encrypting or shutting down victim systems until a ransom is paid.
8. Phishing: The most common type of cybercrime as reported to the U.S. Internet Crime Complaint Centre was phishing and similar fraud.
9. Website Spoofing & IOT Hacking.

Cybercrime & Its Impact on Society – : On an individual level, a cyber-attack can lead to a variety of consequences, ranging from theft of personal information to extortion of money or loss of valuable data, such as family photos. Society and systems depend on critical infrastructures, such as power plants, hospitals, and financial services companies. The protection of these and other organizations is essential for the maintenance of our society and support of the relations between countries and international organizations.

How to prevent Cyber Crime –:

Backup all data, system, and considerations: This enables data stored earlier to assist businesses in recovering from an unplanned event.


• Enforce concrete security and keep it up to date: Choose a firewall with features that protect against malicious hackers, malware, and viruses. This enables businesses to identify and respond to threats more quickly.


• Never give out personal information to a stranger: They can use the information to commit fraud.


• Check security settings to prevent cybercrime: A cyber firewall checks your network settings to see if anyone has logged into your computer.


• Using antivirus software: Using antivirus software helps to recognize any threat or malware before it infects the computer system. Never use cracked software as it may impose the serious risk of data loss or malware attack.


• When visiting unauthorized websites, keep your information secure: Using phishing websites, information can easily bypass the data.


• Use virtual private networks (VPNs): VPNs enable us to hide our IP addresses.


• Restriction on access to your most valuable data: Make a folder, if possible, so that no one can see confidential documents.

Solar Energy for The Future

N kavya

Solar energy is any type of energy generated by the sun. Solar energy is created by nuclear fusion that takes place in the sun. Fusion occurs when protons of hydrogen atoms violently collide in the sun’s core and fuse to create a helium atom. Solar technologies convert sunlight into electrical energy either through photovoltaic (PV) panels or through mirrors that concentrate solar radiation. This energy can be used to generate electricity or be stored in batteries or thermal storage.

The Process of Solar Energy –

This process, known as a PP (proton-proton) chain reaction, emits an enormous amount of energy. At its core, the sun fuses about 620 million metric tons of hydrogen every second. The PP chain reaction occurs in other stars that are about the size of our sun and provides them with continuous energy and heat. The temperature for these stars is around 4 million degrees on the Kelvin scale (about 4 million degrees Celsius, 7 million degrees Fahrenheit).

In stars that are about 1.3 times bigger than the sun, the CNO cycle drives the creation of energy. The CNO cycle also converts hydrogen to helium but relies on carbon, nitrogen, and oxygen (C, N, and O) to do so. Currently, less than 2% of the sun’s energy is created by the CNO cycle.

Nuclear fusion by the PP chain reaction or CNO cycle releases tremendous amounts of energy in the form of waves and particles. Solar energy is constantly flowing away from the sun and throughout the solar system. Solar energy warms the Earth, causes wind and weather, and sustains plant and animal life.

The energy, heat, and light from the sun flow away in the form of electromagnetic radiation (EMR).

The electromagnetic spectrum exists as waves of different frequencies and wavelengths. The frequency of a wave represents how many times the wave repeats itself in a certain unit of time. Waves with very short wavelengths repeat themselves several times in a given unit of time, so they are high-frequency. In contrast, low-frequency waves have much longer wavelengths.

The vast majority of electromagnetic waves are invisible to us. The most high-frequency waves emitted by the sun are gamma rays, X-rays, and ultraviolet radiation (UV rays). The most harmful UV rays are almost completely absorbed by Earth’s atmosphere. Less potent UV rays travel through the atmosphere and can cause sunburn.

The sun also emits infrared radiation, whose waves are much lower frequency. Most heat from the sun arrives as infrared energy.

Sandwiched between infrared and UV is the visible spectrum, which contains all the colors we see on Earth. The color red has the longest wavelengths (closest to infrared), and violet (closest to UV) the shortest.

Natural Solar Energy

1. Greenhouse Effect
2. Photosynthesis
3. Fossil Fuels
• Harnessing solar Energy (The methods use either active solar energy or passive solar energy)
• Photovoltaics
• Concentrated solar energy
• Solar Architecture

Advantages & Disadvantages of Solar Energy

1. Advantages
• Solar energy is clean. After the solar technology equipment is constructed and put in place, solar energy does not need fuel to work. It also does not emit greenhouse gases or toxic materials.
• There are locations where solar energy is practical. Homes and buildings in areas with high amounts of sunlight and low cloud cover have the opportunity to harness the sun’s abundant energy.
• Solar energy complements other renewable sources of energy, such as wind or hydroelectric energy.


Homes or businesses that install successful solar panels can produce excess electricity. These homeowners or business owners can sell energy back to the electric provider, reducing or even eliminating power bills.

2. Disadvantages
• Solar energy equipment is also heavy. To retrofit or install solar panels on the roof of a building, the roof must be strong, large, and oriented toward the sun’s path.
• Both active and passive solar technology depends on factors that are out of our control, such as climate and cloud cover. Local areas must be studied to determine whether or not solar power would be effective in that area.
• Sunlight must be abundant and consistent for solar energy to be an efficient choice. In most places on Earth, sunlight’s variability makes it difficult to implement as the only source of energy.

Business Ethics and its scope.

Business ethics comprises various traits, such as trustworthiness and transparency in customer services. Ethical business practices strengthen customer relationship that is of prime importance for long-term organizational success. It deals with retaining and creating a long-lasting impression in the minds of customers. Such impressions help the enterprise to win the trust of customers and get more business.

Business ethics plays a very crucial role in various management functions, which are given as follows:

i. Ethics in Finance:

It deals with various ethical dilemmas and violations in day-to-day financial transactions. An example of ethical violations is data fudging in which enterprises present a fabricated statement of accounts and other records, which are open to investigation. Ethics in financial transactions gained importance when due to their insufficiency nations suffered massive economic meltdowns.

The following are the ethics in finance:

a. Following truthfulness and authenticity in business transactions

b. Seeking the fulfilment of mutual interests

c. Getting the economies and financial units freed from greed-based methodologies.

ii. Ethics in Human Resource Management:

It deals with the enforcement of the rights of employees in an enterprise.

Such rights are as follows:

a. Having a right to work and be compensated for the same

b. Possessing a right for free association and participation

c. Enjoying a right for fair treatment in an enterprise

d. Holding a right to work in a hazard-free environment

e. Blowing whistle (an activity where an employee can raise voice against any wrong practice of anyone in an enterprise)

iii. Ethics in Marketing:

Deals with a number of issues, which are as follows:

a. Misinforming the customers about the products or services

b. Deciding high prices for the products and services

c. Creating false impression on the customers/consumers about the features of products

d. Promoting sexual attitudes through advertising; thus, affecting the young generation and children.

iv. Ethics in Production:

It deals with the responsibility of an organization to make sure that products and processes of production is not causing harm to the environment.

It throws light on the following issues:

a. Avoiding rendering services or producing products that are hazardous to health. For example, tobacco and alcohol

b. Maintaining ethical relations with the environment and avoiding environmental pollution.

Business Ethics and its scope.

Business ethics comprises various traits, such as trustworthiness and transparency in customer services. Ethical business practices strengthen customer relationship that is of prime importance for long-term organizational success. It deals with retaining and creating a long-lasting impression in the minds of customers. Such impressions help the enterprise to win the trust of customers and get more business.

Business ethics plays a very crucial role in various management functions, which are given as follows:

i. Ethics in Finance:

It deals with various ethical dilemmas and violations in day-to-day financial transactions. An example of ethical violations is data fudging in which enterprises present a fabricated statement of accounts and other records, which are open to investigation. Ethics in financial transactions gained importance when due to their insufficiency nations suffered massive economic meltdowns.

The following are the ethics in finance:

a. Following truthfulness and authenticity in business transactions

b. Seeking the fulfilment of mutual interests

c. Getting the economies and financial units freed from greed-based methodologies.

ii. Ethics in Human Resource Management:

It deals with the enforcement of the rights of employees in an enterprise.

Such rights are as follows:

a. Having a right to work and be compensated for the same

b. Possessing a right for free association and participation

c. Enjoying a right for fair treatment in an enterprise

d. Holding a right to work in a hazard-free environment

e. Blowing whistle (an activity where an employee can raise voice against any wrong practice of anyone in an enterprise)

iii. Ethics in Marketing:

Deals with a number of issues, which are as follows:

a. Misinforming the customers about the products or services

b. Deciding high prices for the products and services

c. Creating false impression on the customers/consumers about the features of products

d. Promoting sexual attitudes through advertising; thus, affecting the young generation and children.

iv. Ethics in Production:

It deals with the responsibility of an organization to make sure that products and processes of production is not causing harm to the environment.

It throws light on the following issues:

a. Avoiding rendering services or producing products that are hazardous to health. For example, tobacco and alcohol

b. Maintaining ethical relations with the environment and avoiding environmental pollution.

Latest 5G mobile phones under 20000

As we all know in today’s world without mobile phones we can not live a single moment. These smart mobile phones have made us lazy and we have been very dependent on our phones but it has also had some good results. Everything, everything has both good and bad sides so it depends on us what path we choose. Mobile phones make our life easy and less time-consuming. Like earlier if we have to recharge our phone or television we have to go to the shop and then we can recharge but now we don’t need to step out of our house. We can use our phones and within a second we can make online payments easily. We can book our online tickets for any trip, we can book our online movie tickets, we can pay our electricity bills and many more are there. So basically without phones, we are nothing. Now we are using our 4G mobile phones but now 5G mobile phones have arrived and it is so amazing. Here we will discuss some new 5g phones under 20000 

Latest 5G mobile phones under 20000

1. Redmi Note 11T 5G mobile phone

This Redmi phone has all the features one needs in his phone. It has a 5000 mAh massive battery along with a 50  MP AI camera and 8MP ultra-wide camera. It has a 16.7 cm ( 6.6 inches) FHD + Display. 1-year guarantee offer. Its price is 20,999.  
2. Realme 8s 5G mobile phone
It has a 64 MP+ 2 MP+2MP primary camera and it has a 16.5 cm( 6.5 inches) FHD + 90 Hz ultra-smooth display. Its price is 17,999.00.
3. Infinix Note 12 5G mobile phone

This phone has a 16 MP front camera with a 5000 mAh Li-Ion Polymer battery. It has a 17.02 cm (6.7) inch Full HD + AMOLED Display. 1-year guarantee offer. Its price is 19,999.
4. Xiaomi Redmi Note 10T 5G mobile phone
It has a 1-year guarantee and it has an 8 MP In- Display front camera with 48 MP, 2MP, and 2MP Rear cameras. It has 6 GB of memory and 128 GB of storage. Its price is 18,999.
5. Realme 8s 5G mobile phone
It has a 6nm dimension 810 5G processor, 33 Dwart Charge with 16.5 cm (6.5) inch FHD + 90 Hz Ultra smooth display. It has realme UI 2.0 Based on the Android 11 Operating System. Its price is 19,999.
 
This festive season brings happiness to your home with these amazing 5G mobile phones. You can get a discount on reliance digital. in. Check their official website for more information.
Go and grab your latest smartphones now. 

Right to Information

 Right to Information Act

The Right to Information Act 2005 is enacted by the Parliament of India giving citizens of India access to Central Government records. Under provision of this Act, any citizen may request information from a public authority which is required to reply within thirty days. Every public authority need to computerize their records for wide dissemination and publish certain categories of information. It is applicable to all constitutional authorities including executive, legislature and judiciary, any institution established or constituted by an Act of Parliament or a State legislature. The Act specifies that citizens have right to : request any information, take copies and inspect documents, works and records, take certified samples of materials of work, obtain information in form of printouts, tapes or in any other electronic mode.

Under the Act, all complying department must appoint Public Information Officer(IPO). Any citizen of India may submit request to the PIO for information in any format paper or electronic. Public information officers responsibility is to ensure that the information is obtained from the appropriate department or section. If the request pertains to other public authority, it is the PIO’s responsibility to transfer or forward the concerned portions of the request to a PIO of the other. Every public authority is required to designate Assistant public information officer( APIOs) to receive RTI requests and appeals for forwarding to the PIOs of their public authority. The citizen making the request is not obliged to explain why the information is needed. The Act specifies time frames for replying to the request. 

1st war of independence

 

The 1st war of Independence 

The year 1857 is very significant in the history of India’s freedom struggle. It witnessed a revolt which the British historians have dubbed the Sepoy Mutiny and the Indian historians the First war of Independence. The troubles first broke out in Berhampore of Bengal on February 26 in 19th Bengal infantry. The first shot was fired by Mangal Pandey of the 34th Bengal infantry at Barrackpore of Bengal. He was hanged at Barrackpore on April 8th.

Mutiny started on May 10th at Meerut, followed in Delhi on May 11th. The revolt began as a mutiny of Indian soldiers against British commanders. The military and political coalesced in the revolt of 1857. The Indian soldiers having massacred British personnel in Meerut, marched to Delhi and proclaimed Mughal Emperor Bahadur Shah II as the Emperor of India. Bahadur Shah issued proclamation urging people of India “ to end the tyranny and the oppression of the infidel and treacherous English.” The British recaptured Delhi from the mutineers on September 20. Bahadur Shah surrendered to Lt. W.S.R. Hodson on September 21 at Humayun’s Tomb in Delhi. Queen Victoria was proclaimed the Empress of India.