This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Best Web Design Tutorial

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Networking Tutorial

Beginners can study these key networking concepts and technologies to learn the basics of computer networking fast.

Search Engine Optimization

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Graphics Design Tutorial

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, January 19, 2013

oDesk Search Engine Optimization Test Answers

Question: 1
Which of the following search engines or directories provides the directory 
search results for Yahoo?
Ans:  B
Question: 2
Which of the following statements regarding website content are correct?
Ans: A
Question: 3
What is Keyword Density?
Ans: D
Question: 4
Which of the following statements about the Google Sitemap are correct:
Ans: A
Question: 5
Are RSS/Atom feeds returned in Google’s search results?
Ans: B
Question: 6
What does the term Keyword Prominence refer to?
Ans: C
Question: 7
Which of the following factors does Google take into account 
while assessing whether or not a website is an authority website?
Ans: A,B,C
Question:  8
What is Anchor Text?
Ans: C
Question: 9
If you search for the term “iq test” in the Word Tracker keyword 
suggestion tool, will it return the number of independent searches 
for the term “iq”?
Ans: B
Question: 10
What is the illegal act of copying of a page by unauthorized parties 
in order to filter off traffic to another site called?
Ans: D
Question:  11
Do search engines such as Google detect unnatural linking patterns by checking 
the Class C IP address of the page where the link to the website originates?
Ans: A
Question:  12
What term is commonly used to describe the shuffling of positions in search 
engine results in between major updates?
Ans: B
Question: 13
While grading your website, Google gives credit to outbound links pointing 
to authority websites?
Ans: B
Question:  14
Which of the following URLs can the Google search engine spider?
Ans: E
Question: 16
What does the 302 server response code signify?
Ans: D
Question: 17
Which of the following statements is correct with regard to the description meta tag?
Ans: D
Question: 18
State whether true or false.The Yahoo Directory listing is a free service for commercial sites.
Ans: A
Question: 19
Which of the following statements is correct with regard to the images within a webpage?
Ans: B
Question: 20
Cloaking is a controversial SEO technique. What does it involve?
Ans: B
Question:  21
Which of the following facts about Alexa are correct?
ANS: A
Question: 22
Google looks down upon paid links for enhancing page rank.
 If a website sells links what action/s does 
Google recommend to avoid being penalized?
Ans: C
Question:  23
Which of the following actions could get you banned by Google?
Ans:  A
Question:  24
Which of the following statements about Google’s technical and quality guidelines is true?
Ans: B
Question: 25
Which of the following is an ethical SEO Technique?
Ans: D
Question:  26
All major search engines are case sensitive.
Ans: B
Question:  27
While optimizing your website it is important to generate the right type of 
traffic how does the Bounce Rate information help in this regard?
Ans: B
Question:  28
Which of the following factors contribute towards link popularity of a website?
Ans: A,B,C,D
 Question:  29
Search engines do not index some common words
 (such as “or”, “and”,“when”, and “in”) 
within the webpage. What are these common words called?
Ans: D
Question:  30
Which of the following activities could be looked down upon by 
 Google as per their quality guidelines?
Ans: B,C
Question:  31
Which of the following statements about RSS are correct?
Ans: A
Question:  32
_________ is usually the best web page to get linked to while receiving a
 themed in-bound link from another website.
Ans: D
Question: 33
Which of the following can be termed as good keyword selection and placement strategies?
ANS: A, D
Question:  34
If your site is not appearing i
 Google search results because of someunethical SEO  
practices in the recent past, _________________.
Ans:  D
 Question:  35
Which of the following statements about search engine optimization techniques are correct:
Ans: A, B, D
Question:  36
A Hallway Page is used to:
Ans: D
 Question:  37
Which of the following free tools/websites 
could help you identify which city in the world has the largest 
search for the keyword – “six sigma”?
Ans: D
 Question:  38
How are site maps important for the search engine optimization process?
Ans: C
Question:  39
State whether the following statement is true or false
.A Sitemap provides a list of internal links to user accessible pages on a website.
Ans: A
Question:  40
What is the function of “indexer” part of the Google search engine?
Ans:  D
Question:  41
Which of the following conditions will Google treat favorably from the ‘Relevancy’ perspective?
Ans: D
Question:  42
Some words, when followed by a colon, have special meanings to Yahoo
.What is performed by the link: operator?
ANS:  C
Question:  43
Which of the following factors have an impact on the Google Page Rank?
ANS:  A
Question:  44
What is the term for Optimization strategies that are in an unknown area of reputability/validity?
ANS: C
Question:  45
Why is it a bad idea from the seo perspective to host free articles and 
write ups that are very common on the internet.
ANS: B
Question:  46
The following robots meta tag directs the search engine 
 bots:<META <br>NAME=”robots” CONTENT=”noindex,nofollow”>
ANS:  B
Question:  47
_________________ use both crawlers and directories to generate relevant results.
ANS:  D
 Question:  48
Which of the following statements is correct with regard to natural links?
ANS: C
Question:  49
What will happen if you type the words ‘Certification -Networking’ in the Google search box?
ANS: D
Question:   50
If you enter ‘Help site:www.microsoft.com’ in the Google search box, what will Google search for?
ANS: B
Question: 51
Which of the following statements about FFA pages are true?
ANS: B
Question:  52
What is the name of the search engine technology
 due to which a query for the word ‘actor’ will also show 
search results for related words such as actress, acting or act?
ANS: D
Question:  53
If a website’s search engine saturation with respect to a particular search engine is 20%, what does it mean?
NS: A
 Question: 54
What is the main reason for the effectiveness of optimizing a webpage towards a long tail keyword search?
ANS:   A

Friday, January 18, 2013

Computer Viruses Intraduction

Computer Viruses Intraduction
What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.

Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

firefox using internet connection Speed

speed up your internet connection using firefox

1. Type “about:config” into the address bar and hit return. Scroll
down and look for the following entries:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.

2. Alter the entries as follows:

Set “network.http.pipelining” to “true”

Set “network.http.proxy.pipelining” to “true”

Set “network.http.pipelining.maxrequests” to some number like 30. This
means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0?.
This value is the amount of time the browser waits before it acts on information it recieves.

If you’re using a brodband connection you’ll load pages 2-3 times faster now.

Gmail account using shortcuts keys

Operate Gmail account using shortcuts keys

Shortcut keys Action
f Press simple f help you to forward email message to
next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail
a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.

freelance test

freelance test

Home TEST

Home TEST

IT Solution test

IT Solution test

Registry Washer 5.0.2.36 Full + Crack, Serial Key, Keygen

Registry Washer 5.0.2.36 Full + Crack, Serial Key, Keygen

Pc registry Appliance 5.0.2.36 | 5.2 Mb

What exactly is a Microsoft windows registry? For computers with a Microsoft Microsoft windows based pc, the Os is the database that stores many of your system's configuration settings and options. Imagine it as a vital part of your pc's brain.

Software applications on your pc rely on important information stored in your Os to perform a variety of tasks. But over time, as you add, remove, and modify the files and settings of these applications, your registry begins to lose its shape. This can leave you with a variety of obsolete, damaged, and even harmful registry records. When left unchecked, your program can become increasingly unstable, running slower and crashing more frequently.

That's where Pc registry Appliance an "award-winning" registry fix program comes in and saves the day!

Registry Appliance gives you a robust registry scan engine that allows you to safely scan your entire Os for errors and other problems that can interfere with your pc's performance. After identifying the problems that require action, Pc registry Appliance helps you resolve those issues and get your pc back to running efficiently.

But that's not all Pc registry Appliance can do! Pc registry Appliance also includes a variety of other system-maintenance tools to help optimize your pc's performance, including a quick and easy Microsoft windows Start-up Administrator, Pc registry Monitor, BHO Administrator, Complete Pc registry Back-up, Complete System Back-up, and MORE!

Registry Appliance Benefits

Improve the rate as well as of your pc by locating and repairing problems within your Microsoft windows registry
Locate in a flash registry records using the lightning-fast search Os tool
Monitor which applications access your Os quickly.
Receive alerts of applications that make changes to your registry so that you can 'undo' any malicious or unauthorized entries
Easily control all your Internet Explorer BHO components and stop hidden spyware, adware, and other types of malware from interfering with your system
Speed up your Microsoft windows registry's performance by analyzing, rebuilding, and compressing its information, thereby removing the gaps and damaged keys that slow it down
Perform a complete backup of your entire program prior to installing any program so that if things don't work out, simply roll your program back to the restore point and it's business as usual!
Speed up your Microsoft windows Start-up time by selecting which applications you want to run at startup, and stop the ones you don't
Quickly locate and safely uninstall applications you don't use or need, freeing up valuable disk space and improving your pc's performance

Registry Appliance Key Features:

Registry Scanner:
· Pc registry Washer's Pc registry Scanner safely scans your entire Os and pinpoints all Os invalid records and errors. With a few mouse clicks, you can then either fix or remove the reported invalid records and errors

Search Registry:
· Pc registry Washer's Search Pc registry feature quickly scans your Os keys and values for any given value. You'll be amazed at the rate of Pc registry Appliance search registry engine!

Startup Manager:
· Some applications automatically boot up when Microsoft windows starts up--and they're useful for your day-to-day computer activities. Others, however, just slow down your Microsoft windows startup and overall program performance, and you might not even be able to start all of them up correctly
· With Pc registry Washer's Start-up Administrator, you have full control on all Microsoft windows startup applications and can easily select which program to start and which not to, every time your pc starts up

BHO Manager:
· Some BHOs are legitimate and add functionality to your Internet Explorer; some, however, are malware, adware, or spyware. Pc registry Washer's BHO manager gives you full control over all installed BHO components and allow you to easily enable/ disable any or all of them

Automatic Backup:
· To insure maximum safety for our users, Pc registry Appliance auotmatically backs up all fix operations, so that you can easily restore any previous Os fix operation with just few simple mouse clicks!

Registry Defragmentation:
· Over time, your pc can begin to slow down due to the accumulation of information in Os. With Pc registry Washer's Pc registry Defragmentation feature, you can improve the performance of your pc by analyzing, rebuilding, and compressing information in your Os, removing the gaps and damaged keys that drag your program down. With just a few clicks, Pc registry Appliance allows you to enjoy a faster, more efficient program.

Full System Backup:
· Whether you're installing a new application or game, you never have to worry about how adding the new application will affect your program. Pc registry Washer's Complete System Back-up feature makes it easy to back up your entire program from within Pc registry Appliance itself. If the installation of a new program doesn't go as planned, Pc registry Appliance ensures you have the vital restoration point needed to restore your pc back to its previous state.


http://adlock.in/f/http://adlock.in/f/

Wordpress Development Test

Wordpress Development Test

GRAPHICS DESIGN TEST

GRAPHICS DESIGN TEST