Tuesday, November 12, 2019
Home Blog Page 3
Social media has a negative impact on youth. The use of the phone throughout the day and the use of social media can affect health which leads to depression. A recent research has revealed that social media has a negative impact on girls than boys. That is, the more social media girls use, the worse it will affect. About ten thousand children...
Generally, Universities design their degree plan based on industry requirements and it is always changing. However in present days if you decided to take Computer Science the path you will be taking focuses more on programming languages, protocols, problem solving using algorithms, and lots of theories on all of those above stuffs. You will not worry about about how...
No matter how long you manage to hold them off, at some point, your kids will have their own electronic devices, and they’ll use those devices to communicate with others. First with friends and family, but eventually with strangers, too. Educating our kids about internet safety is an important and ongoing part of keeping them safe, but parents also have...
By timesnownews.com Eat this and not that' is a piece of very popular advice almost anyone trying to lose weight seeks and gets, multiple times in a day. Weight loss is tricky since everyone has a different body type, accordingly to which we decide the food we eat and the workout we follow. If you were to follow every piece of...
Before data in an Excel worksheet can be analyzed and visualized, it must be cleaned up. One of these cleanup tasks is to find and remove duplicate data. There are several ways to accomplish this cleanup task. Learn how to delete duplicates in Excel using the Remove Duplicates and Filter tools. Then, choose the one that works best for...
A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet. A VPN uses tunneling protocols to encrypt data at the sending end and decrypt it at the receiving end. To provide additional security, the originating and receiving network addresses are also encrypted. VPNs are used to provide...
Braj Bhasha  made specially for poetry and music. It brings at once to the mind the great lines of Surdas  Mayya Mori Main Nahin Maakhan Khayo. The description of the Child Krishna  is so charming that no one can fail to be fascinated by it. I am not aware whether any other language has become so identified with the...
Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. Multifactor authentication combines two or more independent credentials: what the user knows (password), what the user has (security token) and what the user is (biometric verification). The goal of...
A generative adversarial network (GAN) is a machine learning (ML) model in which two neural networks compete with each other to become more accurate in their predictions. GANs typically run unsupervised and use a cooperative zero-sum game framework to learn. The two neural networks that make up a GAN are referred to as the generator and the discriminator. The generator...

POSITIVE PARENTING

By Rekha Singh (Psychologist) Parent’s role is very important and effective in children’s psychological growth and behavior. The foundation of children’s social attitudes and skills are laid at home. Parenting can be more enjoyable when positive parentchild relationship is established. Whether we are parenting a toddler or a teenager, good communication is the key to building self-esteem as well as...
- Advertisement -

MOST POPULAR

HOT NEWS