Mutual Funds

N kavya

A mutual fund is a company that pools money from many investors and invests the money in securities such as stocks, bonds, and short-term debt. The combined holdings of the mutual fund are known as its portfolio. Investors buy shares in mutual funds.

Why do people buy mutual funds?

Mutual funds are a popular choice among investors because they generally offer the following features:

1. Professional Management -:The fund managers research for you. They select the securities and monitor the performance.
2. Diversification-: “Don’t put all your eggs in one basket.” Mutual funds typically invest in a range of companies and industries. This helps to lower your risk if one company fails.
3. Affordability -: Most mutual funds set a relatively low dollar amount for initial investment and subsequent purchases.
4. Liquidity -: Mutual fund investors can easily redeem their shares at any time, for the current net asset value (NAV) plus any redemption fees.

What types of mutual funds are there?

1. Money market funds-: Have relatively low risks. By law, they can invest only in certain high-quality, short-term investments issued by U.S. corporations, and federal, state, and local governments.
2. Bond funds-: Have higher risks than money market funds because they typically aim to produce higher returns. Because there are many different types of bonds, the risks and rewards of bond funds can vary dramatically.
3. Stock funds-: Invest in corporate stocks. Not all stock funds are the same. Some examples are:
• Growth funds-: focus on stocks that may not pay a regular dividend but have the potential for above-average financial gains.
• Income funds-: invest in stocks that pay regular dividends.
• Index funds-: track a particular market index such as the Standard & Poor’s 500 Index.
• Sector funds-: specialize in a particular industry segment.
4. Target date funds -: Hold a mix of stocks, bonds, and other investments. Over time, the mix gradually shifts according to the fund’s strategy. Target date funds, sometimes known as lifecycle funds, are designed for individuals with particular retirement dates in mind.

What are the benefits and risks of mutual funds?

Mutual funds offer professional investment management and potential diversification. They also offer three ways to earn money:

1. Dividend Payments -: A fund may earn income from dividends on stock or interest on bonds. The fund then pays the shareholders nearly all the income, and fewer expenses.
2. Capital Gains Distributions -: The price of the securities in a fund may increase. When a fund sells a security that has increased in price, the fund has a capital gain. At the end of the year, the fund distributes these capital gains, minus any capital losses, to investors.
3. Increased NAV -: If the market value of a fund’s portfolio increases, after deducting expenses, then the value of the fund and its shares increases. The higher NAV reflects the higher value of your investment.


A fund’s past performance is not as important as you might think because past performance does not predict future returns. But past performance can tell you how volatile or stable a fund has been over a while. The more volatile the fund, the higher the investment risk.

How to buy and sell mutual funds:

Investors buy mutual fund shares from the fund itself or through a broker for the fund, rather than from other investors. The price that investors pay for the mutual fund is the fund’s per share net asset value plus any fees charged at the time of purchase, such as sales loads.

Mutual fund shares are “redeemable,” meaning investors can sell the shares back to the fund at any time. The fund usually must send you the payment within seven days.

Before buying shares in a mutual fund, read the prospectus carefully. The prospectus contains information about the mutual fund’s investment objectives, risks, performance, and expenses.

Avoiding fraud:

By law, each mutual fund is required to file a prospectus and regular shareholder reports with the SEC. Before you invest, be sure to read the prospectus and the required shareholder reports. Additionally, the investment portfolios of mutual funds are managed by separate entities known as “investment advisers” that are registered with the SEC. Always check that the investment adviser is registered before investing.

Are mutual funds safe?

Mutual funds are a safe investment if you understand them. Investors should not be worried about the short-term fluctuation in returns while investing in equity funds. You should choose the right mutual fund, which is in sync with your investment goals and invest with a long-term horizon.

Television In India

N kavya

Television is the most powerful medium of mass communication that has ever existed. It has revolutionized our lives in many ways. Isn’t it a wonder that we can witness the events happening all over the world in the comfort of our drawing-room by merely switching on the Television? Today television has become an integral part of our lives. Television is a recent invention. Very few homes had television sets some fifty years ago. Also, till the 1990s Doordarshan was the only channel available to a vast majority of Indians.

Evolution Of Television-:

Today television has become an integral part of our lives. 1939, television broadcasts began in the United States also. Other countries began television broadcasting on a wide scale only by the 1950s. Second World War slowed down the rapid development of the new medium, but the post-war years made up for it. The limitations of the early camera forced the actors and anchors to work with impossibly hot lights. Imagine trying to read news with full makeup under a blazing light. The early television broadcasts were all black and white. The first successful program in color was transmitted by Columbia Broadcasting System (CBS) in the USA in 1953. From being a “radio with pictures” it acquired a unique style of its own. As a result of this, this phase is often called the “golden age” of television.

Important dates -:

1. 1936 – British Broadcasting Corporation (BBC) of Britain began the first television service in the world.
2. 1939 – Television broadcasts began in the US. The 1950s – Other countries began television broadcasting on a wide scale.
3. 1953 – The first successful program in color was transmitted by CBS in the USA.

1959- TELEVISION BEGAN IN INDIA ON AN EXPERIMENTAL BASIS -:

The early programs on these experimental broadcasts were generally educational programs for school children and farmers. Several community television sets were set up in Delhi’s rural areas and schools around Delhi for the dissemination of these programs. By the 1970s, television centers were opened in other parts of the country also. In 1976, Doordarshan, which was All India Radio’s television arm until then became a separate department.

1976- DOORDARSHAN BECAME A SEPARATE DEPARTMENT INDEPENDENT OF ALL INDIA RADIO (AIR) -:

Several community television sets were distributed as a part of one of the important landmarks in the history of Indian television, the Satellite Instructional Television Experiment (SITE). It was conducted between August 1975 and July 1976. Under this program, the Indian government used the American satellite ATS-6 to broadcast educational programs to Indian villages. Six states were selected for this experiment and television sets were distributed in these states.

• Clusters selected for SITE

1. Andhra Pradesh
2. Karnataka
3. Madhya Pradesh
4. Bihar
5. Orissa
6. Rajasthan

1975-1976 SATELLITE INSTRUCTIONAL TELEVISION EXPERIMENT (SITE) -:

SITE was an important step taken by India to use television for development. The programs were mainly produced by Doordarshan which was then a part of AIR. The telecasts happened twice a day, in the morning and evening. Other than agricultural information, health and family planning were the other important topics dealt with in these programs. Entertainment was also included in these telecasts in the form of dance, music, drama, folk, and rural art forms. A major milestone in the history of Indian television was the coverage of the Ninth Asian Games in 1982. In addition to the domestic transmission, Doordarshan was also providing content for the broadcasters of many other countries. After 1982, there was a huge increase in the live coverage of sports by Doordarshan. Doordarshan provided national coverage for the first time through the satellite INSAT 1A. Also, for the first time, the transmission was in color.

1982- DOORDARSHAN PROVIDED NATIONAL COVERAGE FOR THE FIRST TIME THROUGH THE SATELLITE INSAT 1A. -:

By 1983, the government-sanctioned a huge expansion of Doordarshan. Several new transmitters were set up throughout the country. Thus towards the end of the 80s around 75 percent of the population could be covered by the transmitters. Many of the programs of Doordarshan like Hum Log, Buniyaad, and Nukkad were immensely popular.

1983- GOVERNMENT SANCTIONS HUGE EXPANSION OF DOORDARSHAN -:

In 1997, Prasar Bharati, a statutory autonomous body was established. Doordarshan along with AIR was converted into government corporations under Prasar Bharati. The Prasar Bharati Corporation was established to serve as the public service broadcaster of the country which would achieve its objectives through AIR and DD. This was a step towards greater autonomy for Doordarshan and AIR. However, Prasar Bharati has not succeeded in shielding Doordarshan from government control.

1997- ESTABLISHMENT OF PRASAR BHARATI -:

About 90 percent of the Indian population can receive Doordarshan programs through its network. From its humble beginning as a part of All India Radio, Doordarshan has grown into a major television broadcaster with around 30 channels. These include Regional Language Satellite Channels, State Networks, International Channel, and All India Channels like DD National, DD News, DD Sports, DD Gyandarshan, DD Bharati, Loksabha Channel, and DD Urdu.

Conclusion -:

Television as a medium of visual communication offers immense possibilities to overcome the illiteracy barrier and assists in the process of modernization. It has a marked role to play in furthering the cause 2 of education and has a unique advantage over the media. While it provides words with pictures and sound effects like the movies, it scores over the latter by its high intimacy and reaches the largest number of people in the shortest possible time the visual in it has ii an edge over sound broadcasting. It can also deal with topical problems and present known persons who can provide solutions. People learn through the eye and remember things better. periodical surveys about the public reaction to television programs have indicated that most of the programs telecast are rather dull. There is a lot to be done in them. The plays particularly are uninspiring and badly directed.

Criticism against Indian television is that like the All India Radio, it is the mouthpiece of the Government and the ruling party. The News Bulletins in Hindi and English and the news and views programs are heavily colored in favor of the Government and the party in power. Achievements of the Government are highlighted while the weaknesses are ignored. There is hardly any program: which allows free, frank, and straightforward criticism of the Governmental policies and the ruling party politicians. Therefore, there has been a demand for All India Radio and Doordarshan to be turned into autonomous bodies with no control and interference by the Government.

SCHIZOPHRENIA

N kavya

Schizophrenia is a disorder of the brain in which the person has lost touch with reality, and has symptoms like delusions, hallucinations, and bizarre beliefs. A person with schizophrenia has only one personality. The ‘split’ refers to the fact that their thinking, feeling, and behavior may not be consistent/congruent with one another (e.g., laughing while recollecting a sad story).

Schizophrenia sometimes can cause a person to behave violently, but not all with schizophrenia are violent. It is only a small minority of violent persons. Even these people are not violent all the time; they may become violent mostly when they are very ill. After a proper diagnosis and appropriate medication, a person with schizophrenia is no more or less violent than a person who does not have the disorder. Improved patients who are on treatment are no more dangerous than the general population.

Symptoms of Schizophrenia –:

The symptoms are classified into 5 types Behavioural, cognitive, mood, psychological, speech

1. Behavioural: social isolation, disorganized behavior, aggression, agitation, compulsive behavior, excitability, hostility, repetitive movements, self-harm, or lack of restraint
2. Cognitive: thought disorder, delusion, amnesia, belief that an ordinary event has a special and personal meaning, belief that thoughts aren’t one’s own, disorientation, mental confusion, slowness in activity, or false belief of superiority
3. Mood: anger, anxiety, apathy, feeling detached from self, general discontent, loss of interest or pleasure in activities, elevated mood, or inappropriate emotional response
4. Psychological: hallucination, paranoia, hearing voices, depression, fear, persecutory delusion, or religious delusion
5. Speech: circumstantial speech, incoherent speech, rapid and frenzied speaking, or speech disorder

• Also common: are fatigue, impaired motor coordination, lack of emotional response, or memory loss.
• Triggers may include:
• stress
• drug misuse
• chronic alcohol use

Causes of schizophrenia –:

1. Genetics
2. Structural changes in the brain
3. Chemical changes in the brain
4. Pregnancy or birth complications
5. Childhood trauma
6. Previous drug use

Can you prevent schizophrenia?

Researchers don’t completely understand what causes schizophrenia, there’s no sure way to prevent it. However, if you’ve been diagnosed with this disorder, following your treatment plan can reduce the likelihood of relapse or worsening symptoms.

Do People with schizophrenia need to be cared for in a hospital ?

Not all people with schizophrenia need to be hospitalized. The family can care for the person at home, by understanding the disorder and learning what kind of support the person needs, while diligently following the advice of the mental health professionals.

Is schizophrenia caused by bad parenting or abuse during childhood ?

Schizophrenia is not caused by bad parenting or abuse. The occurrence of schizophrenia is linked to the structure of the brain, and other risk factors: genetic, physical, emotional, and social. Adolescence is a period where some structural changes take place in the brain. One of the theories is that due to some faulty disruption that happens in the brain during adolescence, the teenager may be more vulnerable to developing the illness if other risk factors are also present.

When to seek help ?

If you believe you or a loved one is showing signs of schizophrenia, it’s important to seek immediate treatment.
Keep these steps in mind as you seek help or encourage someone else to find help.


1. Remember that schizophrenia is a biological illness. Treating it is as important as treating any other illness.
2. Find a support system. Find a network you can rely on or help your loved one find one they can tap into for guidance. This includes friends, family, colleagues, and healthcare providers.
3. Check for support groups in your community. Your local hospital may host one, or they can help connect you to one.
4. Encourage continuing treatment. Therapy and medications help people lead productive and rewarding lives. You should encourage a loved one to continue treatment plans.

Treatment –:

Treatment includes medications and therapies –:


1. Medications – Antipsychotic and Anti-Tremor
2. Therapies – Support group, Rehabilitation, Cognitive therapy, Psychoeducation, Family therapy, Behaviour therapy, and Group psychotherapy

Schizophrenia is a lifelong condition. However, properly treating and managing your symptoms can help you live a fulfilling life. Recognizing strengths and abilities will help you to find activities and careers that interest you. Finding support among family, friends, and professionals can help you to reduce worsening symptoms and manage challenges.

Bitcoin The Future?

N kavya

Bitcoin is a type of digital currency that enables instant payments to anyone. Bitcoin was introduced in 2009. Bitcoin is based on an open-source protocol and is not issued by any central authority. It is an electronic currency created back in January 2009. It is known to be decentralized electronic cash that does not rely on banks. It is possible to send from one user to another on the bitcoin blockchain network without the necessity for mediators. It is primarily used for sending or receiving cash through the internet even to strangers. Bitcoin is also known to be a new type of cash. It is predicted to grow at a rapid pace over the years, along with its value. It is typically purchased as an investment by numerous industries and people.


The central government typically handles bitcoins without specific rules, unlike dollars and euros. It is not owned by a country, individual, or group. Therefore, it reduces the chances of corruption and inflation.

History -:

The origin of Bitcoin is unclear, as is who founded it. A person, or a group of people, who went by the identity of Satoshi Nakamoto are said to have conceptualized an accounting system in the aftermath of the 2008 financial crisis.

Uses -:

1. Originally, Bitcoin was intended to provide an alternative to fiat money and become a universally accepted medium of exchange directly between two involved parties.
2. Fiat money is a government-issued currency that is not backed by a commodity such as gold.
3. It gives central banks greater control over the economy because they can control how much money is printed.
4. Most modern paper currencies, such as the US dollar and Indian Rupee are fiat currencies

Acquiring Bitcoins -:

1. One can either mine a new Bitcoin if they have the computing capacity, purchase them via exchanges, or acquire them in over-the-counter, person-to-person transactions.
2. Miners are the people who validate a Bitcoin transaction and secure the network with their hardware.
3. The Bitcoin protocol is designed in such a way that new Bitcoins are created at a fixed rate.
4. No developer has the power to manipulate the system to increase its profits.
5. One unique aspect of Bitcoin is that only 21 million units will ever be created.
6. A Bitcoin exchange functions like a bank where a person buys and sells Bitcoins with traditional currency. Depending on the demand and supply, the price of a Bitcoin keeps fluctuating.

Bitcoin Regulation -:

The supply of bitcoins is regulated by software and the agreement of users of the system and cannot be manipulated by any government, bank, organization, or individual.Bitcoin was intended to come across as a global decentralised currency, any central authority regulating it would effectively defeat that purpose.It needs to be noted that multiple governments across the world are investing in developing Central Bank Digital Currencies (CBDCs), which are digital versions of national currencies.
The legitimacy of Bitcoins (or cryptocurrencies)

In India -:
In the 2018-19 budget speech, the Finance Minister announced that the government does not consider cryptocurrencies as legal tender and will take all measures to eliminate their use in financing illegitimate activities or as a part of the payment system.
In April 2018, the Reserve Bank of India (RBI) notified that entities regulated by it should not deal in virtual currencies or provide services for facilitating any person or entity in dealing with or settling virtual currencies.
However, the Supreme Court struck down the ban on the trading of virtual currencies (VC) in India, which was imposed by the RBI.
The Supreme Court has held that cryptocurrencies are like commodities and hence they can not be banned.

Possible Reasons for the Rise in the Value of the Bitcoin -:

1. Increased acceptance during the pandemic.
2. Global legitimacy from large players like payments firm PayPal, and Indian lenders like State Bank of India, ICICI Bank, HDFC Bank, and Yes Bank.
3. Some pension funds and insurance funds are investing in Bitcoins.

Bitcoin Transaction -:

Bitcoin address is built from the public key. It is very similar as compared to an email address, anyone can check up and provide bitcoins. The private key is known to be identical to that of an email password since it is possible to send bitcoins with the help of remote access only. That’s why it is essential to keep the private key confidential or hidden. To send bitcoins, it is required to verify to the network that you acquire the private key of that particular address without the private key being revealed. It can be done with a specific mathematics branch referred to as public-key cryptography. The identification of the user possessing bitcoins is known as a public key. The public access and the ID number are very alike. For an individual to send you bitcoins, they require your bitcoin address. It is known to be another version of the public key that can be typed and read effortlessly.

However, the security concern of bitcoin is increasing day by day across the world. Since digital wallets are used to store bitcoins, they might be targeted by hackers as their value increases.

Mcaffeine Neem Face Wash

Mcaffeine Neem Face Wash Cleanser With Argan Oil & Vitamin E For Men And Women – 150 ml https://www.amazon.in/dp/B071X49GR9/ref=cm_sw_r_apan_glt_fabc_9B6RQWH965EW0W12D2T2

Factors used in this face wash are Caffeine, Neem, Argan Painting and Vitamin E. These all factor are skin-friendly. They not only clean your skin but also secure your skin. It’s extremely delicate to the skin, makes the skin smoother and vigour.

Top 5 venomous snake species

Snake are deadliest animal. Whenever one encounters it many get hurt or you can easily say they are dangerous to humans. They have aggressive nature. They are very dangerous especially for rural area people’s. There are estimated 3,500 snake species out of which 600 are venomous. Their estimated yearly attacks ranges from 53 lakhs to 54 lakhs, out of which more than 1 lakh people die due to their attack.

1) Inland Taipan

They are also known as fierce snake. They has the most toxic venom in the world. The average quantity venom give by this snake is 44mg while the most given is 110mg, which is enough to kill 100 people. Its venom consists of neurotoxins, Hemotoxins (procoagulants) affecting the blood, myotoxin affecting the muscles, nephrotoxins affecting the kidneys and hemorrhaggins causing hemorrhage. Its venom paralysis the body and cause hemorrhage. It is found in Australia.

2) Dubois sea snake

Dubois sea snake is also known as reef shallow sea snake. It is a species of venomous sea snake. Adult sea snake grows upto 4.86ft but usually grow upto 2.6ft. It is most venomous sea snake and one of the top three most venomous snakes in the world. The venom is lethal and contains neurotoxin that act on the nerve cell, myotoxins acting on muscles. The venom of this snake paralysis the respiratory system which ultimately cause death of the person. They feed on fish and swallow the whole fish. True incident of sea snake bite has not been recorded but they might have caused bite in rural area where taking record might not be possible. They are not aggressive but can bite if feel threatened or surprised. Fisherman’s are more likely to get trapped in their bites often when they try to remove them from fishing net. They are found in Australia, and some parts of Indian Ocean and Timor sea.

3) Eastern brown snake

Eastern brown snake or also known as common brown snake. This snake is highly venomous snake in the family Elapidae. Adult eastern brown snake goes upto 2m or 7ft. The venom of the snake mainly affects the circulatory system, coagulopathy, hemorrhage, cardiovascular collapse and cardiac arrest mainly the death occurs due to cardiac arrest. And one of the main components of venom is prothombinase which breaks down prothrombin. It is responsible for about 60% of snake bite death in Australia. They are native to eastern and central Australia and southern New Guinea.

4) Black mamba

Black mamba also belongs to highly venomous species of family Elapidae. It is second longest venomous snake after king cobra. It grows upto 2m (6ft 7in) and commonly grow to 3m (9ft 10in). Its colour varies from grey to dark brown and it’s species is both terrestrial and arboreal (found on trees). It is native to parts of Sub Sahara Africa. Its venom is composed of neurotoxins and it’s induce symptoms within ten minutes and is frequently fatal. This species of snake is aggressive but only attack when threatened or cornered. It constantly bites more than once and it’s bite derive 100mg-120mg of venom, the highest venom recorded is 400mg. It is considered as snake of medical importance by World Health Organization. Its venom if not treated on time will result in respiratory failure, cardiovascular collapse and ultimately death.

5) Boomslang

Boomslang snake is one of the venomous snake of family Colubridae Average adult Boomslang is 100-160 cm in total length and exceeds to 183cm. Colouration is very different like males are light green with black or blue scale edge while females may be brown. Their weight varies from 175 to 510 g. The Boomslang snake is able to open its jaws up to 170 degree when butting. It is found in sub Saharan Africa, south africa, Botswana and Namibia. Its venom is hemotoxin and disables coagulation process and the victim die as a result of internal or external bleeding. Its venom cause hemorrhaging in to tissue such as muscles and the brain tissue. Its venom is slow acting. This snake is timid and only bite if attempted to handle, catch or kill.

Top motivational quotes to awaken the beast hiding in you

Motivation is something that helps you grow. Not only from inside but also from all aspects, all ups and downs in your life, whenever you feel low why do you need motivation? Have you ever thought about it. Here, is the answer because motivation is something that helps you to grow, that helps you to be you, that makes you. It has the power to awaken the beast hiding inside you.

Your perspective with either become prison or your passport.

-Steven Furtick

Realise deeply that the present moment is all that you ever have.

– Eckhart Tolle

How you love yourself is how you teach others to love you.

– Rupil Kaur

The Secret of your success is determined by your daily agenda.

– John C. Maxwell

Burn the past, Turn the page, Move on.”

– Safura Arsh

Act as what you do makes a difference, IT DOES.”

– William James

Excessive fear is always powerless.”

– Aeschylus

A good Education is the foundation of better future.”

– Elizabeth Warren

Between thinking and seeing there is a place called knowing.”

– Carolyn Myss

You can’t build a reputation on what you are going to do.”

– Henry Ford

Believe you can and you are halfway there.”

– Theodore Roosevelt

Take care of your body, It is the only place you have to live.”

– Jim Rohn

If you hear a voice within you say ‘ you cannot paint,’ then by all means paint and that voice will be silenced.”

– Vincent Van Gogh

Ofcourse motivation is not permanent. But then, neither is bathing: but it is something you should do on a regular basis.”

– Zig Ziglar

The only way to do a great work is to love what you do.”

– Steve Jobs

It’s not the load that breaks you down, it’s the way you carry it.”

– Lou Haltz

Nothing will work unless you do.”

– Mayo Angelo

Do one thing everyday that scares you.”

– Anonymous

If you are not willing to risk the usual, you will have to settle for the ordinary.”

– Jim Rohn

When I hear somebody sigh, ‘ Life is hard,’ I am always tempted to ask, ‘Compared to what?’

– Sydney Harris

Success is walking from failure to failure with no loss of enthusiasm.”

– Winston Churchill

All progress takes place outside the comfort zone.”

– Michael John Bobak

The only place where success comes before work is in the dictionary.”

– Vidal Sassoon

Here are some of the motivational quotes that if you implement in your lives will be successful for sure. Motivation will help you to achieve all your goals and so are these quotes.

Affordable places to visit in india

India the land of culture, heritage, devotion and beauty. There are many beautiful places to visit in India and we cannot talk about all places in this article. So, here are 4 affordable places to visit. If you are travel lover then this is great for you all.

1) Goa

Goa is one of the cheapest country to visit. Alcohol is also very cheap here. You can have unlimited fun and crazy party all night and can even return with full pocket. The best time of the year to visit is October to March. Must visit places to visit is Calangute Beach, Fort Aguada, Dudhsagar falls, Anjuna beach. Goa is also known for its cruise and its water sports. You can check many websites for price. Average 4 days/ 3 Nights will cost you around 12,000 per adult on twin sharing with many amenities.

2) Nainital, uttarakhand

Nainital is famous for its misty lakes and mountains. Nainital is very beautiful hill station. It is also known for its cheap hotels and meals. You can do boating here at barely any cost. The area of interest lies in its name which it has gotten from the eye shaped Lake the Naini Lake thus due to this eye shaped Lake it’s called Nainital. Must visit places include Naini Lake, Tiffin top, Snow view point, Mall road, Eco cave gardens and High Altitude zoo. Average 3 days/ 2 Nights will cost you around 4,500 Rs per adult on twin sharing with other amenities as well. It can be seen that how much affordable is this place. Best time to visit is throughout the year.

3) Udaipur, Rajasthan

Udaipur also know as city of lakes. It is also called as Venice of East. It is also termed as jewel. It has abundance of natural beauty, awesome architecture and breathtaking temples. Must visit places include Lake pichola, City Palace, Fateh Sagar Lake, Jaisamand Lake, Sajjangarh palace, Jagdish temple. In addition to this it cost very less on average 6 days/ 5 night stay cost you around 17,700 INR per adult on twin sharing. Best time to visit is from October to March.

4) Darjeeling, West Bengal

Darjeeling also know as Queen of Himalayas, has jaw dropping and mesmerizing sunrises, the breathtaking beauty of the hills, the charm of past and all those beautiful smile of beautiful people. It is one of the most appealing hill station. And all chai lovers it offers best quality chai. Hotels and lodges are at reasonable price and it’s also cheap. Must visit places include Darjeeling Himalayan railway, Tiger hill, Batasia loop, Himalayan mounteering institute, Darjeeling ropeway and Nightingale park. Average 4 days/ 5 nights will cost around 8,375 Rs per adult on twin sharing. Best time to visit is from February to March and September to December.

So these are the places that have jaw dropping and breathtaking beauty. Apart from this they are also very affordable and hence you can easily visit with low money in your pocket. You can even check rates on different websites and there you may can get offers too. Hope you all like it.

SCIENCE AND TECHNOLOGY

Science and technology play a huge role in our society as well as in our lives. Nowadays we all are surrounded by technology and are dependent on it for everything we do. Especially after this pandemic everything is in virtual mode and is completely based on technology. We live in the technological era where gadgets are of outmost importance to us. A gadget is simply a human made device which is programmed to reduce human effort and does a piece of job easily without any hassle.

In this fast-growing world we human beings are always surrounded by machines and gadgets for every need of ours starting from the time we get up in the morning till we again go to bed we even use gadgets while we are asleep such as air conditioner, insect repellent and many more. Science is a boon for us, but in the other hand as everything has its own merits and demerits there are also people who do use science for a bad cause. Technology is good but it is advisable to keep this technology out of the reach of children as otherwise they will not tend to learn things and will prefer to take the help of science to solve a particular existing problem this may affect their growth.

IMPORTANCE OF SCIENCE AND TECHNOLOGY :


Technology, science and knowledge are important in modern contemporary society. Essential questions include the following : How does science and technology produce new products, new ways of living and new nutritious? Why is new technology and knowledge so fundamental to us in the ways through which we imagine the future?


Technology, knowledge and science are fundamental in modern contemporary society. The understanding of how social, cultural and material elements influence the production of new practices, new ways of under of contemporary postmodern society. Studies of technology and science provides students with insight into how different processes of knowledge are initiated and progressed, and how innovative technological processes are developed employed and increase in importance.
In this manner, students will be provided with the academic basis for working with detailed analyses of different forms of technologies and process of knowledge within business life or industry and commerce, research work , political development, management of knowledge and innovation.


THE RELATIONSHIP BETWEEN SCIENCE AND TECHNOLOGY :


Science , technology and innovation each represent a successively larger category of activities which are highly interdependent but distinct. Science contributes to technology in at least six ways.

  1. New knowledge which serves as a direct source of ideas of new technological possibilities.
  2. Source from tools and techniques for more efficient engineering design and a knowledge based for evaluation of feasibility of designs
  3. Research instrumentation, laboratory techniques and analytical methods used in research that eventually find their way into design or industrial practices, often through intermediate disciplines.
  4. Practice of research as a source for development and assimilation of new human skill and capabilities eventually useful for technology.
  5. Creation of a knowledge base that becomes increasingly important in the assessment of technology in terms of its wider social and environmental impacts
  6. Knowledge base that enables more efficient strategies of applied research, development, and refinement of new technologies.

THe ROLE OF SCIENCE AND TECHNOLOGY


Teaching technological literacy, critical thinking and problem- solving through science education gives students the skills and knowledge they need to succeed in school and beyond.

SCIENCE AND TECHNOLOGY USED IN SOCIETY :


Science and technology have had a major impact on society, and their impact is growing. By making life easier, science has given an the chance to pursue societal concerns such as ethics, aesthetics, education and justice to create cultures, and to improve human conditions.

Horticulture

Horticulture, the branch of plant agriculture dealing with garden crops, generally fruits,vegetables, and ornamental plants. The Horticulture falls between domestic gardening and field agriculture, through all forms of cultivation naturally have close links.


It is divided into the cultivation of plants for food and plants for ornament. Pomology deals with fruit and nut crops. Oliericuture deals with herbaceous plants for the kitchen, including, for example carrots, cauliflower. Floriculture deals with the production of flowers and ornamental plants; generally, cut flowers, pot plants, and greenery. Landscape Horticulture is a broad category that includes plants for the landscape, including lawn turf but particularly nursery crops such as shrubs, trees, and vines.
The specialisation of the horticulture and the success of the crop are influenced by many factors. Among these are climate, terrain, and other regional variations.


HORTICULTURAL REGIONS :

TEMPERATURE ZONES :


Temperature zones for horticulture cannot be defined exactly by lines of latitude or longitude but are usually regarded as including those areas where frost in winter occurs, even though rarely. Thus, most parts of Europe, North America and Northern Asia
are included, though some parts of the United States, such as southern Florida, are considered subtropical.
The temperature zones are also the areas of the grasses – the finest lawns particularly are in the regions of moderate or high rainfall- and of the great cereal crops. Rice is excluded as being tropical, but wheat, barley, corn and Rye grow well in the temperature zones.
Plants in the temperature zones benefit from a winter resting season, which clearly differentiates them from tropical plants which tend to grow continuously. Most of the great gardens of the world have been developed in temperature zones. Particular features such as rose gardens, herbaceous borders, annual borders, woodland gardens, and rock gardens are also those of temperature zone gardens. Nearly all depends for their success on the winter resting period.


TROPICAL ZONES :


There is no sharp line of demarcation between the topics and the subtropics. Just as many tropical plants can be cultivated in the subtropics, so also many subtropical and even temperature plants can be grown satisfactorily in the tropics. Elevation is a determining factor. In addition to Elevation, another determinant is the annual distribution of rainfall. Plants that grow and flower in the monsoon areas, as in India, will not succeed where the climate is uniformly wet. Another factor is the length of day, the number of hours the sun is above the horizon;some plants flower only if the day is long, but others make their growth during the long days and flower when the day is short.
In the tropics of Asia and parts of central and south America, the dominant features of the gardens are flowering trees, shrubs, and climbers. Herbaceous plants are relatively few, but many kinds of orchids can be grown.


PROPAGATION :


propagation is the controlled perpetuation of plants,is the most basic of Horticulture practices . It’s two objectives are to achieve an increase in numbers and to preserve the essential characteristics of the plant. Propagation can be achieved sexually by seed or asexually by utilising specialised vegetative structures of the plant or by employing such techniques are cutting, layering, grafting and tissue culture

SEED PROPAGATION :


The most common method of propagation for self- pollinated plants is by seed. In self-pollinated plants,the sperm nuclei in pollen produced by a flower fertilize egg cells of a flower on the same plant. Propagation by seed is also used widely for many cross- pollinated plants pollen is carried from one plant to another.
The practice of saving seed to plant the following year has developed into a specialized part of horticulture. Seed technology involves all of the steps necessary ensure production of seed with high viability, freedom from disease, purity, and trueness to type. These processes may include specialized growing and harvesting techniques, cleaning, and distribution. Germination in such seed may be accomplished by treatment to remove these inhibitors. This may involve cold stratification, storing seed at high relative humidity and low temperatures, usually slightly above freezing. Cold stratification is a prerequisite to the uniform germination of many temperature-zone species such as apple, bear, and redbud.


VEGETATIVE PROPAGATION :


Asexual or vegetative reproduction is based on the ability of plants to regenerate tissues and parts. In many plants vegetative propagation is a completely natural process; in others it is an artificial one. It has may advantages. These include the unchanged prepetuation of naturally cross pollimated palnts and the possibility of propagation seedless progeny.
Vegetative propagation is accomplished be use of

  1. Apomictic seed
    1. Specialized vegetatice structres such as runners, bulbs, corms, rhizomes, offshoot, tubers, stems and roots.
  2. Layers and cuttimgs
  3. Grafting and budding
    1. tissue culture.

Methods of Stealing Information

Shoulder Surfing

Shoulder surfing is a word that refers to someone looking at another person’s computer or mobile device screen and keyboard in order to collect sensitive information. Direct observation can be accomplished by simply glancing over someone’s shoulder – a practice known as shoulder surfing – or by employing binoculars, hidden or apparent video cameras, and other optical equipment.

Example 

Shoulder surfing at ATMs is an example of a crime in which a suspect looks over your shoulder while you enter in your PIN number.

Several recent incidents have resulted in police issuing warnings, announcing arrests, and even conducting sting operations:

Milpitas (California) – On Jan. 2, 2015, a bank employee spotted a lady monitoring ATM clients. Police investigated and discovered that money had been illegally stolen from numerous consumers’ accounts.

Concept

Shoulder surfing is the act of directly observing someone to gain personal or private information. Shoulder surfing is the practice of peeking over someone’s shoulder to acquire information while the victim is unaware. This is particularly useful in congested areas if someone is using a computer, smartphone, or ATM. Shoulder surfing gets suspect fast if it occurs while there are few people around. Depending on the area and scenario, binoculars, video cameras, and vision-enhancing equipment are also employed.

Personal security keys, such as username and password combinations, are important personal and private data protections in our data and identity-driven world. Unfortunately, hackers do not necessarily require technical knowledge to obtain information. Credit card numbers, personal identification numbers (PINs), crucial personal information (such as middle names and birth dates required in password recovery) and usernames/passwords are the most often stolen data by shoulder surfing. In the case of bank accounts, this sort of information might be used to log into accounts and steal additional information, such as money.

Dumpster diving

A dumpster diving attack is a type of cyber attack made possible by searching through the victim’s trash.

While you may imagine a dirty and disgusting scene in which someone jumps into a trash, the reality is far less filthy. Threat actors might be in and out of the dumpster in minutes during a dumpster diving attack. They may, however, already have a box full of sensitive papers, storage devices, and workstations.

Example

Jerry Schneider, who established a wholesale telephone equipment firm while still in high school in 1968, is one of the most well-known trash divers. The inspiration originated from a dumpster, especially Pacific Telephone’s garbage, which contained paperwork, instructions, and bills related to the order and delivery system.

Needless to say, Schneider got in trouble and served 40 days in a security facility. He then founded a security consulting company.

Concept 

Dumpster diving is the act of searching through an organization’s trash for information that may be used to gain access to its network. Companies frequently discard sensitive data, such as system manuals, which attackers exploit to gain access to information systems. Un-erased and complete hard drives with extremely sensitive information are dumped in certain circumstances, allowing a dumpster diver to easily boot up and get information.

In many cases, dumpster diving involves getting data about a user in order to impersonate that user and gain access to his or her user profiles or other restricted areas of the Internet or a local network. Dumpster diving can mean looking through physical trash for such information, or searching discarded digital data. In either case, security experts warn users to leave a clean trail to prevent identity theft and avoid other consequences that can stem from a successful dumpster diving operation.

Businesses and other large entities have developed practical ways to discourage dumpster diving, such as shredding paperwork and locking waste bins. Other security measures include the use of firewalls and other precautions to stop dumpster divers from getting access to discarded or loose data, such as ensuring that data is wiped off of old hard drives and destroying old storage media.

Social engineering

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Example

 $100 Million Google and Facebook Spear Phishing Scam

The biggest social engineering attack of all time (as far as we know) was perpetrated by Lithuanian national Evaldas Rimasauskas against two of the world’s biggest companies: Google and Facebook.

Rimasauskas and his team set up a fake company, pretending to be a computer manufacturer that worked with Google and Facebook. Rimsauskas also set up bank accounts in the company’s name.

The scammers then sent phishing emails to specific Google and Facebook employees, invoicing them for goods and services that the manufacturer had genuinely provided — but directing them to deposit money into their fraudulent accounts.

Between 2013 and 2015, Rimasauskas and his associates cheated the two tech giants out of over $100 million.

Concept

Spear phishing is a common social engineering technique. For example, a phisher may send an email to addresses at a target company asking a user to verify security information. The email is made to appear legitimate and from the IT staff or senior management, along with a warning for major consequences if the required information is not provided. As with a regular phishing attack, the victim clicks a link that goes to a site the hacker sets up to gather the sensitive information, generally with the look and feel of the real website. After obtaining the info, the hacker has the ability to access the company’s network by using a legitimate login.

Social engineering is as dangerous and harmful as any other technical attack. In fact, you could argue that social engineering is more serious than other threats, as humans are always in a vulnerable state. It is not that tough to properly configure a firewall. It is very difficult to train new staff about the dangers of social engineering exploits.