Friday, December 30, 2011

70-272 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows Server 2003 and all client computers run Microsoft
Windows XP Professional SP2.
Certkingdom.com has a Marketing and Finance division which requires using Microsoft Office XP to
perform their daily duties.
How would you instruct the Marketing and Finance user’s to run the Microsoft Office XP setup if
the setup fails and rolls backup without changing the user’s currently assigned privileges?

A. By adding the Marketing and Finance division to the Network Configuration Operators group
and accessing Microsoft Office Product Updates to scan the computer for updates.
B. By adding the Marketing and Finance division to the Power Users group and using Add or
Remove Programs in Control Panel to remove Office and re-install Microsoft Office XP.
C. By creating a remote connection to the Marketing and Finance group client computers and reinstalling
Microsoft Office XP using a network-based installation point with the required .msi file.
D. By adding the Marketing and Finance division to the local Administrators group and restarting
the browser and Workstation services before re-installing Microsoft Office XP from the Windows
Installer command-line utility.

Answer: C

Explanation: To try to recreate the error you have to run the installation in the users’ privileges so
running the installation on your computer with your privileges will not help you to solve the problem
(answer B and D). Visiting the Microsoft Office Product Updates Web site will not help the user in
any way as long as he doesn’t have Microsoft Office installed on his computer.


QUESTION 2
You work as the desktop support technician at Certkingdom.com. Certkingdom.com has a domain named
Certkingdom.com. All servers on the Certkingdom.com network run Windows 2000 Server and all client computers
run Microsoft Windows XP Professional SP2.
Certkingdom.com has a Marketing division which uses Microsoft Office 2003 for their daily duties. During
the course of the day Marketing division users reported that certain files of theirs have been deleted.
How would you configure the Marketing division client computers to track any attempts by
malicious users to alter or delete files on their computers?

A. By running the secedit /analyze command on the client computers.
B. By running the secedit /configure command on the client computers.
C. By configuring security access control lists for their disk drives by auditing the Everyone group
on the client computers.
D. By running the secedit /validate command on the client computers.

Answer: C

Explanation: You must track unauthorized attempts to modify or delete the files so auditing the
Everyone group is the correct choice.


QUESTION 3
You work as a desktop adminsitrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers run Microsoft Windows 2000 server and the client computers run Microsoft Windows XP Professional.
Certkingdom.com has a Marketing division which makes online purchases during work hours.
How would you configure the network firewall to stop these activities whilst allowing the Marketing
division to access the Internet?

A. By having port 110 blocked on the firewall.
B. By having port 443 blocked on the firewall.
C. By having port 143 blocked on the firewall.
D. By having port 21 blocked on the firewall.

Answer: B

Explanation: Port 443 is used for Secure Sockets Layer connections to Secure HTTP Web sites.
This port should be blocked.


QUESTION 4
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows Server 2003 and all client computers run Windows XP Professional.
Certkingdom.com has a Finance division which uses Microsoft Office XP to perform their daily tasks.
How would you configure Microsoft Office XP to ensure opened documents display’s a toolbar
containing the Balloons button?

A. By accessing the Help menu and selecting the Detect and Repair… option.
B. By right-clicking the toolbar and selecting the Reviewing toolbar from the context menu.
C. By re-installing Microsoft Office XP and copying a Normal.dot file from the administrator’s
computer to the My Documents folder.
D. By accessing the tools menu from another user’s document and accessing the Tools menu to
select Shared Workspace.

Answer: B

Explanation: The Balloons button appears on the Reviewing Toolbar. Simply enabling this toolbar
will show this button. To enable the toolbar, right click any open spot in the toolbar area. From the
dropdown list, click Reviewing.


QUESTION 5
You work as a network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows 2000 Server and all client computers run Windows
XP Professional SP2.
Certkingdom.com has a Finance division that has a client computer named ABC-WS272. The Finance
division requires the use of a printer. You attach a printer to ABC-WS272 and enable Print Shared.
You then print a test page. However, other users in the Finance division cannot find the printer on the network.
How would you configure ABC-WS272?

A. By using a Group Policy Object GPO which deploys the printer software to the Finance division.
B. By opening Windows Firewall and configuring ICMP options.
C. By enabling the File and Printer Sharing option on the Exception tab of the Windows Firewall.
D. By configuring Windows Firewall to have the Don’t allow exceptions option enabled.

Answer: C

Explanation: If the File and Printer Sharing is not enabled, the incoming request will be blocked
by the Windows Firewall.


QUESTION 6
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows Server 2003 and all client computers run Windows
XP Professional SP2. Certkingdom.com has a client computer named ABC-WS272 configured with
Microsoft Outlook Express.
Certkingdom.com has a Marketing division which uses Microsoft Outlook Express to send e-mail.
How would you configure Microsoft Outlook Express to ensure the users are able to open saved email
messages when opening Microsoft Outlook Express?

A. By disabling AutoArchive.
B. By importing .zip files.
C. By importing .pst files.
D. By importing .bdx files.

Answer: D

Explanation: The probable cause for this problem is that the user is not loading his dbx files when
Outlook Express launches. This is usually due to the user moving the dbx files, and Outlook
Express can no longer find them.


QUESTION 7
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows Server 2003 and all client computers run Windows
XP Professional. Certkingdom.com has a client computer named ABC-WS272 configured with Microsoft Internet Explorer.
Certkingdom.com has a Finance division with several employees who use ABC-WS272 to perform their daily tasks.
How would you configure ABC-WS272’s Internet Explorer to make sure that each user has their
own Favorites list?

A. By having a user profile created for each Finance division member using the computer.
B. By having a Microsoft Outlook Express identity created for Finance division members using the computer.
C. By having an Internet Explorer Address book identity created for Finance division members using the computer.
D. By having separate Favorites folder created under the My Documents folder for Finance division members using the computer.

Answer: A

Explanation: The user favorites list keeps changing. You must make sure for the user. Creating a
user profile for each family member will stop this change from happening.


QUESTION 8
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers run Windows Server 2003 and all client computers run Windows XP Professional.
Certkingdom.com has its headquarters in Chicago and a Marketing and Finance division in Boston. You
are in Chicago and use a client computer named ABC-WS272. The Marketing and Finance
division has a client computer named ABC-WS274. Both ABC-WS272 and ABC-WS274 utilizes
manual IP address configuration and ISDN lines to access the Internet.
How can you utilize ABC-WS272 to control ABC-WS274 using Remote Desktop without disrupting
Internet connectivity?

A. By having ABC-WS272 configured with an Internet Connection Sharing (ICS) enabled after
placing ABC-WS272’s domain user account to Remote Desktop Users group on ABC-WS274.
B. By having ABC-WS272 configured with an Internet Connection Firewall (ICF) enabled with
Remote Desktop option in the Internet Connection Firewall (ICF) services enabled on ABCWS274.
C. By having ABC-WS272 configured with an Internet Connection Sharing (ICS) enabled and
enabling Internet Connection Firewall (ICF) on ABC-WS274.
D. By having ABC-WS274 configured with an Internet Connection Sharing (ICS) enabled after
placing ABC-WS274’s domain user account to Remote Desktop Users group on ABC-WS272.

Answer: B

Explanation: To keep the home computer secure you should start by enabling the ICF. By default
if you're running Windows XP Service Pack 2 (SP2) and you enable Remote Desktop, Windows
Firewall will be automatically configured to allow Remote Desktop connections to your computer. If
you or someone else has removed the Remote Desktop exception then you’ll have to manually
add it by open the Security Center, click Windows Firewall and click the Exceptions tab, and select
Remote Desktop.


QUESTION 9
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows Server 2003 and all client computers run Windows
XP Professional. Certkingdom.com has a client computer named ABC-WS272 configured with Microsoft
Outlook Express.
Certkingdom.com has a Marketing division which needs to sends e-mail to Arabic clients.
How would you configure ABC-WS272 to ensure the Marketing division members are able to
compose an e-mail message in the Arabic character set?

A. By downloading the foreign language version of Microsoft Outlook Express and install the software.
B. By having the Windows XP language pack for the foreign language required downloaded and installed.
C. By accessing Regional and Language option in Control Panel and select the foreign character set required.
D. By accessing the Microsoft Outlook Express View menu to select Auto Encoding.

Answer: B

Explanation: From Start menu, select Settings then Control Panel, Start Regional Options, Click
on Languages tab, In Supplemental language support box, check the checkboxes of desired
language collection(s) and click OK, Additional files will be copied to your machine. You may need
to provide the Windows XP CD or the network share name, After reboot, support for new
languages will become available.


QUESTION 10
You work as the network administrator at Certkingdom.com. Certkingdom.com has a domain named Certkingdom.com. All
servers on the Certkingdom.com network run Windows Server 2003 and all client computers run Windows
XP Professional. Certkingdom.com has a computer named ABC-SR01 configured as the VPN server using
IPSec connections.
Certkingdom.com has a Marketing division which uses ABC-SR01 using a L2TP connection. During the
course of the day the Marketing division state the L2TP connection has failed.
How would you configure the connection used to ensure that the Marketing division is able to
access ABC-SR01?

A. By configuring the connection type to PPTP VPN.
B. By configuring the connection to use the Public Key Infrastructure (PKI).
C. By configuring ABC-SR01 to use additional PPTP ports.
D. By configuring the connection type to SSTP VPN.

Answer: A

Explanation: IPSec is not used, so L2TP connections should not be used either. Instead
reconfigure to use PPTP VPN.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, December 28, 2011

70-271 Exam Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a technician at ABC.com. The ABC.com network only has workgroups. All client
computers are configured to run Windows XP Professional. All ABC.com employees have
administrative privileges on their own computer. ABC.com does not want file encryption to be
used.
You use a computer named ABC-WS25. You are promoted to a new position and have been
replaced by a new employee named Mia Hamm. You are worried that Mia Hamm will be able to
open your files.
How can you prevent Mia Hamm from opening your files and folders on ABC-WS25?

A. The data should be compressed in a folder.
B. The user should be removed from the ACL of the folder.
C. The operating system should be reinstalled with Windows XP Professional.
D. Your user account should be deleted from ABC-WS25.

Answer: D

Explanation: Your best option in this scenario would be to delete your user account from ABCWS25.


QUESTION 2
You are the newly appointed technician at ABC.com. The ABC.com network has a domain named
ABC.com. The client computers are configured to run Windows XP Professional.
Employees search the Web using Internet Explorer. To accomplish their tasks employees log onto
the ABC.com Web site. You implement a digital certificate to enhance the security of the ABC.com
Web site. The next day an employee of ABC.com, Ally Wagner, informs you that she is having
problems connecting to the Web site when she enters the URL for ABC.com in her browser.
Which action should you execute to resolve this problem?

A. Ally Wagner should add the www.ABC.com Web site to the approved Web sites in Content
Advisor.
B. Ally Wagner should access the Web site using the HTTPS for opening the URL..
C. Ally Wagner should set the Privacy setting to Medium in the Internet Option in the Control
Panel.
D. Ally Wagner should add the Web site URL to the trusted sites in the security zone.

Answer: B

Explanation: Your best option would be to select Option B. The scenario states that digital
certificates are used by ABC.com to secure the information on the website and in order to
establish a secure communication channel you have to use https instead of http. Https is http over
SSL.


QUESTION 3
You work as a graphics designer at ABC.com. The ABC.com network has a domain named
ABC.com. The client computers on the corporate network are configured to run Windows XP
Professional. You use a computer named ABC-WS271.
You want to increase the display size of your screen. However, you get an error message stating
that the Display menu on the control panel has been disabled.
How can you have the resolution of your screen increased?

A. You should set the hardware acceleration to full.
B. You should enable Advanced Configuration and Power Interface (ACPI) support in the system
BIOS on the computer.
C. You should configure the display settings to work in dual-monitor mode.
D. You should request that the Remove Display option in Control Panel be disabled.

Answer: D

Explanation: Your best option in this scenario would be to select Option D. The Deny Access to
the Display Settings option will disable the display settings control panel icon as well as stopping
users from accessing any display settings. This setting can be applied either by a GPO or by
modifying the registry.


QUESTION 4
You work as a technician at ABC.com. The ABC.com network has a domain named ABC.com. All
client computers on the network are configured to run Windows XP Professional.
You bring your personal laptop computer to work and attempts to logon to the domain from your
laptop. However, you are not able to log on. Your laptop computer is configured to run Windows
XP Home Edition.
How do you ensure access to the domain using your laptop? (Choose TWO. Each answer forms
part of the solution.)

A. By joining your laptop to the domain.
B. By installing Service Pack 3 on your laptop.
C. By logging on as a member of the Power Users group.
D. by changing the Custom settings in the Setup Wizard.
E. By uABCrading to Windows XP Professional.

Answer: A,E

Explanation: Your best option in this scenario would be to have ABC-WS25 uABCraded to
Windows XP Professional and join it to the domain. Microsoft has crippled the Home version of
Windows XP and made it impossible to join it to domains. It thus forced the majority of companies
to invest in the slightly more expensive Windows XP Pro.


QUESTION 5
You work as a help desk support technician at ABC.com. The ABC.com network consists of a
single Active Directory domain named ABC.com. The servers on the ABC.com network are
configured to run Windows Server 2003 and all client computers Windows XP Professional.
You have administrative privileges on a client computer named ABC-WS10. ABC-WS10 has a
hard disk that is formatted as a single partition. You realize the next day that you failed to backup
the Boot.ini file on ABC-WS10 and now get a message stating that the boot disk is unable to be
read and as a result Windows will not be started. You thus decide to run the Recovery Console
and reboot ABC-WS10.
You advise Rory Allen to reboot his computer with the Windows XP Professional CD-ROM and
make use of the Recovery Console.
Which of the following is the task that Rory Allen should complete next?

A. Rory Allen should reinstall Windows XP professional.
B. Rory Allen should execute a system restore on ABC-WS10.
C. Rory Allen should execute the bootcfg command with the /rebuild parameter.
D. Rory Allen should execute the diskpart command.

Answer: C

Explanation: Your best option in this scenario would be to select Option C. The bootcfg command
is a Microsoft Windows XP Recovery Console command that manipulates the Boot.ini file. This
command has a function that can scan your hard disks for Microsoft Windows NT 4.0, Microsoft
Windows 2000, and Windows XP installations, and then add them to an existing Boot.ini file. The
function can also rebuild a new Boot.ini file if one does not exist.


QUESTION 6
You work as a network administrator at ABC.com. The ABC.com network has a domain named
ABC.com. All servers on the ABC.com network run Windows Server 2003 and all client computers
run Windows XP Professional.
A ABC.com employee named Clive Wilson is a member of the Marketing department. Clive Wilson
is due to present a report to top management. The conference facility has a projector as well as a
laptop computer named ABC-WS25 that contains the latest graphics card. During the course of
the morning Clive Wilson informs you that he is having difficulty displaying complains that, during a
sales presentation to senior management he encountered a problem with ABC-WS25.
He informs you that the cables were connected properly and that ABC-WS25 was configured to
display to the projector. However, the message projected by the projector stated that it could not
project the image. You thus decide configure ABC-WS25 to show on the LCD but is unsuccessful
as you are presented with a ‘No signal’ message.
Which of the following actions should you take to rectify this problem?

A. The current video resolution on ABC-WS25 should be changed.
B. The projector should be checked to see whether it supports the IEEE 1394 standard.
C. The Video Graphics Array for ABC-WS25 should be listed in Device Manager.
D. The projector should be checked to see whether it supports the USB 2.0 standard.

Answer: A

Explanation: The error has occurred due to the fact that laptop computers often use a high
resolution while projectors have a much lower resolution. It is therefore needed that employees
assigned laptop computers make the necessary changed to the resolution settings prior to
connecting to the projector, unless the computer hardware takes care of this itself.


QUESTION 7
You work as a network administrator at ABC.com. The ABC.com network consists of a single
Active Directory domain named ABC.com. All servers on the ABC.com network run Windows
Server 2003 and all client computers run Windows XP Professional. The ABC.com network has a
file server named ABC-SR04 that is accessed by network users.
A ABC.com employee named Ally Wagner was assigned a computer named ABC-WS10. Ally
Wagner says that she cannot access ABC-SR04. No other employees are experiencing the same
problem. You confirm that the ABC-WS10 network cable connection is correct.
Which actions should you take to make sure that ABC-WS10 can make a connection to ABCSR04?

A. ABC-WS10 should be configured to make use of mnode for NetBIOS name resolution.
B. ABC-WS10 should be configured to automatically obtain an IP address.
C. ABC-WS10 should be configured with the correct DNS server IP address.
D. ABC-WS10 should be configured with the correct IP address of the default gateway.

Answer: C

Explanation: The scenario states that the cable is connected and other users are able to
communicate on the network. It is therefore not a physical network problem. It is likely to be a
configuration problem on ABC-WS10.


QUESTION 8
You work as a network administrator at ABC.com. The ABC.com network consists of a single
Active Directory domain named ABC.com. All servers on the ABC.com network run Windows
Server 2003 and all client computers run Windows 98.
ABC.com wants to uABCrade the client computers to Windows XP Professional. You are
concerned that performance might be slow after the uABCrade. You are particularly concerned
about response times when opening windows and menus.
Which of the following is a task that you would perform to address this issue?

A. Set the screen refresh rate to a lower value in Display settings.
B. Access the Performance Options dialog box and choose the Adjust for best performance
option.
C. Modify the Advanced Display settings to configure the display DPI setting to 120 dots per inch
in the Display Properties dialog box.
D. Access the Performance Options dialog box and modify the System applet.

Answer: B

Explanation: In this scenario you need to select the Adjust for best appearance option in the
Performance Option dialog box. The graphical nature of Windows XP Professional has progressed
as they are more extensive in their use of colors and shading, and they drain more system
resources. Trimming back the level of graphical representation in your Windows XP desktop can
save system resources and boost overall application and network performance.


QUESTION 9
You work as a network administrator at ABC.com. The ABC.com network has a workgroup named
ABC. All client computers either run Windows 2000 Professional or Windows XP Professional.
A ABC.com user named Kara Lang is assigned a new Windows XP Professional computer named
ABC-WS25. Kara Lang is assigned the permission to create a file for her department. The file will
be used by four other users. Each user is responsible for a specific task and permission has to be
assigned in accordance to the duties they will perform on the file.
Which of the following is an option that would enable Kara Lang to perform the functions
mentioned in the scenario?

A. On ABC-WS25 you need to have the option of simple file sharing deselected.
B. On ABC-WS25 the Full Control permission should be assigned to Kara Lang.
C. On ABC-WS25 the NTFS permissions was reset after the uABCrade.
D. On ABC-WS25 a link should be configured in My Computer to the shared folder.

Answer: A

Explanation: Your best option would be to have simple file sharing disabled as it is enabled on a
Microsoft Windows XP-based computer if the computer is not a member of a domain. Simple file
sharing allows you to share folders with everyone on your workgroup or network and make folders
in your user profile private. However, if simple file sharing is enabled, you cannot prevent specific
users and groups from accessing your shared folders. If you turn off simple file sharing, you can
permit specific users and groups to access a shared folder.


QUESTION 10
You are employed as an administrator at ABC.com. The client computers on the ABC.com
network are configured to run Windows XP Professional.
The ABC.com Sales department manager, Rory Allen is assigned a client computer named ABCWS25.
During the course of the day Rory Allen make use of the Windows XP Professional driver
to install a Canon MP250 color printer on ABC-WS25. The Canon MP250 color printer will be
shared with another manager in the department.
After the installation you receive complaints from the two managers informing that they are only
able to print monotone graphs. You receive an instruction from the CIO to ensure that they are
able print the graphs in color from the printer. You thus decide to install a printer driver on ABCWS25
from the CD-ROM provided by the manufacturing company but find that the problem
persists.
Which of the following should be your next option?

A. You should configure the appropriate printer option in the BIOS.
B. You should have a signed printer driver installed on ABC-WS25 that was obtained from the
company.
C. You should run use the Add Printer Wizard to connect to the printer.
D. You should reconfigure the properties of the print server in Printer and Faxes.

Answer: B

Explanation: You should install the correct printer driver on ABC-WS25. The computer of the
other manager will then receive the correct driver from ABC-WS25 when he attempts to print.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Monday, December 26, 2011

Top 5 Ed Tech predictions for 2012

Here’s hoping I’m more accurate than I was last year.

Earlier this week I wrote about five major technologies that should have had real impacts in education this year, but which never amounted to much. I called more than one of them out a year ago, when all signs pointed to their potential for disruption and transformation in 2011. I can’t resist giving it another shot this year, though. Here are my top 5 predictions for the state of the art in Ed Tech in the coming year.

Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training and more Cisco exams log in to Certkingdom.com



Analytics and BI will go mainstream
In a former life, I was a SAS programmer doing data management and statistical analysis for clinical trials. SAS is still going strong in large-scale, mission critical statistical programming, but much of its business focus is now on analytics and business intelligence (BI). IBM just launched an initiative to promote education, training, and research at the university level in the fields. For those not familiar with them, BI and BA apply complex business rules and enable decision-making based on the analysis of very large data stores.

Both companies (and many others, although SAS and IBM are arguably the market leaders) have products geared towards making these tools available, relevant, and usable in the education space, where the amount of data we now collect on our students is growing exponentially, both because of federal and state requirements and because most educators realize that data-driven instruction is a powerful tool for improving outcomes. In education, these tools can pick out at-risk students based on wide-ranging data before they ever hit the radar of a guidance counselor.

The data are in place, the technologies are in place, and NCLB and RTTP have conditioned educators to think about data (no matter what else, good or bad, you may think of them). 2012 will see an explosion in the real use of analytics to assist schools and districts in improving quality and outcomes. I’m not talking about reviewing yearly standardized test scores here. I’m talking about the confluence of formative and summative assessments, demographic data, and many other bits of information, all of which are now available electronically and ready to be mined. It’s worth noting that EDUCAUSE was filled with vendors holding up the latest and greatest tools for data mining, aggregation, management, and analysis and Oracle resorted to showgirls standing next to geeks demoing software at both BBWorld and EDUCAUSE.

Google’s tablet will NOT be the holy grail of 1:1
A reader emailed me the other day and asked me if I thought that Google’s tablet, expected for release before fall 2012, would finally make tablet-based 1:1 initiatives a reality. The answer was no. Although I’m sure the tablets will be great pieces of hardware and software and I’m sure that I’ll get one, the predicted $500 price point is just too high. Sure, Google Apps integration will be very strong, as will the management features that go with it, but at that price, you could have an iPad.

While I’m not saying that iPads are better for education than other tablets, I am saying that they have a major foothold in the growing market. Even iPads, though, are only making it into well-funded districts at scale. The only thing that could disrupt the current market and current trends in 1:1 would be a very inexpensive tablet (<$300) with all the management features and a content ecosystem that would finally make the ideal of a "tablet in every backpack" a reality.

Google's move to drop the price of Chromebooks this year and provide enterprise, web-based management consoles for the slick little laptops suggests, as well as innovative rental models for schools and businesses, however, suggests that they may have a few tricks up their sleeves. The Google tablet won't be the holy grail of 1:1, but I'm hopeful that it will be a step in the right direction.

BYOD will make 1:1 possible in a big way
In the face of miserable budgets and no end in sight to a stagnating economy, school/state-funded 1:1 will not be sustainable in the majority of school districts. Worldwide sales of Classmate PCs to education ministries remain strong, but this relies on a very different educational model than that employed here in the States. At the college level, where a computer is a necessity for students, only a tiny fraction of schools supply a laptop as part of a student’s tuition. Instead, students bring their own, often selecting from specially negotiated prices with major OEMs. It’s time K12 schools followed suit.

Again, there is a confluence of factors that will make BYOD the 1:1 model of choice for 2012 (a model, by the way, that will get devices onto a lot more desks and into a lot more student hands in the classroom this year). The emergence of inexpensive devices like the Kindle Fire, despite its lack of manageability, means that tabets will become increasingly commonplace for for students, making instant access to the Internet and a variety of content easily achieved. AMD is promising inexpensive alternatives to Intel’s ultrabooks and prices continue to fall on remarkably usable laptops.

Similarly, great platforms for e-learning, ranging from Moodle 2.3 to the new and improved Google Apps, to a growing ecosystem of tablet apps mean that schools have more reason than ever to leverage all of those devices that are sitting in student bedrooms but often aren’t allowed in classrooms. Finally, robust security and filtering solutions (including tablet integration) from companies like LightSpeed mean that the risks formerly posed by outside devices are increasingly being mitigated both on- off-campus.

Khan Academy, et al, will give publishers and mainstream educators a run for their money
Many teachers and students have leapt at the opportunities provided by Khan Academy, MIT OpenCourseWare, and other free and open educational tool available online, assigning them as homework, using them for flipped classes, suggesting them as resources for study and remediation, and even integrating them into their curricula just as they would multimedia tools that come with their textbooks. Others struggle with the idea that Khan and others represent competition. For the latter group, rest easy…no video can replace an awesome teacher in class. Awesome teachers, though, use whatever resources they can find to ensure that their students “get it”, whatever “it” might be. The teachers who should be worried are those who aren’t, for lack of a better word, awesome. Awesome teachers are engaged mentors to whom students will look for guidance as they navigate the muddy waters of information on the Internet, among other places.

The real moral of this story, though, is that enough teachers are turning to the Internet and open resources (including great open source texts available from organizations like CK12.org) that traditional publishers have no choice but to stand up and take notice. This will be a battle of Darwinian proportions (i.e., survival of the fittest); open resources will no doubt coexist for years to come with proprietary resources from mainstream publishers. But we’re talking about a multibillion dollar industry here. It doesn’t take much of a dent to start shaving millions off of profit margins.

We will say goodbye to a lot more libraries and hello to a lot more information
A local prep school dumped its library about two years ago in favor of a media center replete with computers, Kindles, and an espresso bar (yes, an espresso bar - it’s a prestigious school). Administration took a lot of flack, not because the library was well-used (it wasn’t) but because a lot of people didn’t like the idea that the notion of a library was changing. Now, with far less controversy, Johns Hopkins University is closing its historic medical library in a few short days. Library staff had already transitioned from traditional librarian roles to that of so-called “informationists.” Modern library science degree programs are far more concerned with accessing information than the Dewey Decimal System.

Add to that growing space constraints, emerging 1:1 programs that are far easier to justify if they can reduce reliance on dead trees, and nearly ubiquitous availability of journals and books in electronic formats and you have a recipe for converting libraries as we know them now to anachronisms. This isn’t a bad thing as long as the misson of school libraries can be to make students discerning seekers and users of information. In fact, moving to information-based rather than book-based models could cause a renaissance for libraries. This renaissance simply doesn’t need to involve acquiring larger expensive collections of paper; it needs to involve drastically increasing the amount of time students spend in libraries developing their critical thinking and information access skills.

Sunday, December 25, 2011

Must have Iphone 4S Apps with SIRI

In the recent time, the development in smart phone apps has affected the design community to a huge extent. This new development has provided the mobile technology with a new outlook which makes the mobile more than just a communication figure. It's anticipated that over 350,000 mobile apps have been developed in the past three years and have been downloaded massively 10.9 million times. It’s also estimated that popularity and demand of mobile apps will reach to its peak in 2013. These facts and figures show why businesses are banking more on mobile application development.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



Iphone mobile application development provides a user with different kinds of dimensions. With the proper use of iphone mobile applications you can find a right pathway towards development. The mobile application developers and experts have switched to this new era of technology. There are numerous iPhone apps that functions in organizing tasks and linking the space between conventional techniques for managing business and the novel and inventive technology of today. Let’s have a look at some of the useful iPhone apps that you must possess:


• Siri:

Siri is not new in the field of mobile applications but since its launch in April 2010, it has come a long way and is one of the best apps developed. Apple has decided to slot in Siri into its new iphone 4S and therefore, is not accessible elsewhere. Siri on iPhone 4S permits your voice to set reminders, send messages, checking weather, schedule meetings and many more. Siri is very comfortable to use as it understands what you say, knows what you mean and helps you do things you do everyday. If you have any work to do, just ask Siri to assist you in doing it. In fact, Siri talks with you. Siri utilizes nearly all the integrated apps on iPhone 4S. Its assimilation into iPhone 4S iOS5 will make it more accurate that it has ever been. Siri still requires some more improvements as its hearing ability in a crowdie environment isn’t good enough but its accuracy is perfect in a quite environment. All in all it will be fun to use as you will get exciting experience of talking with your phone.


• Doodle Jump:
It is the all-time top selling paid iPhone app. Even users say that be careful about it as it is insanely addictive. Doodle Jump is the WINNER of 2010 APPLE DESIGN AWARD for brilliance in design, user skill, novelty, presentation, expertise and superiority. Doodle Jump is an enjoyable and addictive dais skipping game with a charming, hand-scribbled artistic and a smartly incorporated leader board. Roll your iPhone to channel the endearingly long muzzled Doodler as he scrambles a part of graph paper, all the while evading black holes, killing giants, and collecting goodies. As you budge forward on an infinitely spooling, twisted vertical screen, you jump onto an progressively more exigent array of platforms consist of stirring blue platforms, dissolution brown platforms, white platforms that fade away after one jump and also possesses platforms with jump up surging springs and jet packs. Doodle Jump is tough to quit and you will surely love this App.


• Facebook:
Facebook have proclaimed that, out of 4 million daily mobile users of facebook, 1.64 million users possess iPhone and rests have other smart phones. The latest version of the Facebook as an iPhone app implies that there is a lot to offer on further apps for the iPhone platform. This new version is much faster and adds a bonus point to the iPhone users as it’s extremely easy to move back and forth between your personal and business accounts. If you want to interact with the facebook on the daily basis, then you must acquire this app. Videos are not yet playable and push notifications also need assimilation but developers are working on this and may be you will get it in the next version. Once you start with it, you will surely get passionate to it.

• SPY Mouse:
This game from Electronic Arts is a paid app and has topped the most downloaded app recently. The game was launched on August 30, 2011 and unexpectedly, has recently exceeded the popularity of Angry Birds and Angry Birds and the season. In this game, you command a secret agent mouse that is ordered to eat more cheese and evade every teasing cat along the way. You can skulk, run around and bite your way throughout 70 levels of twist and turn difficulty, with six exclusive worlds of jam-packed adventures, each with their own wicked and evil Hench-cat to get around. SPY Mouse is also launched and available in other languages like Chinese, Dutch, French, German, Italian, Japanese, Korean and Spanish.


• WhatsApp Messenger:
WhatsApp Messenger is a crusty-platform messaging mobile application which enables you to barter messages and saving a considerable amount of money. The main thing you require is that the person to whom you text most often also download this app. This mobile app is presently accessible for the iPhone, Android phones, Blackberry and Nokia and these phones can message each other. WhatsApp Messenger also allows you adjust your background, reports you when a passage has been viewed by your recipient and facilitates you to channelize your GPS position on an interactional map. There are not many advantages of this app but the best one is the money which you save. If you are fond of texting, then you must have this app for unlimited text experience while others worry about extra charges.

The only thing a mobile application developer requires is to recognize their potential customers and their basic needs. For small as well as large sized mobile application company, there is not any advantageous field or area of development other than the mobile application development.

Wednesday, December 21, 2011

Kindle Fire Tablet Review - New Product from Amazon

On Wednesday Amazon on officially introduced not one, not two, but four new Kindle devices. And of the Main is full color Kindle Fire. This new Tablet is very reasonable, will cost you only $199! This is a killer price for any color tablet. It's cheaper than the iPad

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Amazon's color tablet has a 7-inch 16-million color display same like the iPad. It has wide viewing angle and great color saturation. It is made of Gorilla Glass with multi-touch display screen and a resolution of 1024x600 pixels. This resolution is pretty dense: 169 pixels per inch. The display is chemically strengthened to be 20 times stiffer and 30 times harder than plastic, making it extra durable and resistant to accidental bumps and scrapes. It has its own unique Android interface. It has Android 2.x. Amazon Kindle Fire is powered by a dual core CPU. Dual-core processor gives fast, powerful performance


Highlights of the Kindle Fire :
• 18 million movies, TV shows, songs, magazines, and books
• Amazon Appstore - thousands of popular apps and games

• Ultra-fast web browsing - Amazon Silk
• Free cloud storage for all your Amazon content
• Vibrant color touchscreen with extra-wide viewing angle
• Fast, powerful dual-core processor
• Amazon Prime members enjoy unlimited, instant streaming of over 10,000 popular movies and TV shows


Kindle has Wi-Fi connectivity. All synchronization of Data is invisible, on wireless and in the background. It doesn't have cameras or microphone. So there is no videoconferencing available and there is no option of 3G connectivity also. There's only 8GB of storage on the device available.

The Drawback I can see is the device does not feature any Home button and instead of that you have multi-touch capabilities option to help you navigate the tablet's applications and features.

Amazon Kindle Fire's battery life also very good, provides you with eight hours of continuous reading and seven-and-a-half hours of continuous video playback as long as the wireless connection has been turned off. The tablet also has one USB 2.0 port which can be used as both purpose, charger when plugged into your computer and USB. It only weighs 14.6 ounces.


You can enjoy movies, magazines and children's books come alive on a 7" vibrant color touchscreen with high resolution. Kindle Fire uses IPS technology same technology is that used by Apple on the iPad - for an extra-wide viewing angle, perfect for sharing your screen with others. Enjoy your favorite magazines with glossy, full-color layouts, photographs and illustrations.

Android Platform gives you Top game applications like Angry Birds, Plants vs. Zombies, The Weather Channel and more, plus a great paid app for free every day. Amazon digital content is available on the Amazon Cloud. There is free Amazon Cloud Storage So that means you'll be able to start a movie on Kindle Fire and transfer it to your TV. Your books, movies, music and apps are available instantly to stream or download for free, at a touch of your finger. You can enjoy your social life with facebook and twitter and many more apps and also stay in touch using built-in email app that gets your webmail (Gmail, Yahoo!, Hotmail, AOL etc.) into a single inbox. The Kindle Fire can access all the content offered by Amazon (includes MP3 and video streaming)

The main advantage of buying kindle fire that it has all Kindle books, Android apps, and movies and TV shows... Full Entertainment Tablet...

Kindle Fire is best tablet with killer price. If you want to buy Kindle Fire Visit us at Technoeshop.com. At Technoeshop you can find many deals and special offers related all Tablet PCs in different brands.

We also offer deals in Laptops, Gaming Consoles, Digital Camera, Camcorders, Mobile You can find many I.T related products and Consumer products on Technoeshop.com. Technoeshop.com is consumer ecommerce website providing wide range of IT, Consumer Electronics & Office products at best price.

Monday, December 19, 2011

The future according to Big Blue

IBM unveils its annual list of five emerging technologies that will supposedly change our lives in the next five years.

As so many look back at where we’ve been in 2011, IBM is looking forward at where we’ll likely be in the not-so-distant future.

Cisco CCNA Training, Cisco CCNA Certification

Best IBM Certification Training and IBM Exams Training and more Cisco exams log in to Certkingdom.com



Today, the company releases the sixth annual “IBM 5 in 5” list of the five innovations “that have the potential to change the way people work, live, and interact during the next five years.”

According to IBM’s own research, “people power will come to life” as kinetic energy created by everything from human activity to heat from your computer is harnessed as renewable energy for homes, businesses, and even entire cities.

12345 may soon be out as the most popular password of all time because “you will never need a password again” but will instead rely on biometrics, or unique biological features such as eyes and fingerprints, to unlock doors, access computers, and even withdraw money.

Jokes about mainlining information or computer mind-melds may also become a thing of the past as IBM scientists in the field of bioinformatics look for new ways to link your brain to your devices so that “mind reading is no longer science fiction.”

Also, advances in mobile technology will lead to much more than an increase photo and status updates as better, faster, and cheaper mobile technologies lead to a brighter future where “the digital divide will cease to exist” for the planet’s 7 billion people.

And finally, turns out that “junk mail will become priority mail” when advertisements become so personalized and spam filters so effective that every offer is relevant to the individual user and no offer will ever really be unwanted.

True life will soon be at least as interesting as science fiction according to IBM which claims that some parts of each of these innovations already exist in its labs in some form of reality or another.

Saturday, December 17, 2011

Steve Jobs, Google+ and iPhone top Google's 2011 search list

What technology and technologists most interested the online world this year?

Based on the most popular 2011 Google search terms, people were most interested in getting information on Apple founder Steve Jobs, the iPhone 5, the iPad 2, and Google+.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



Out of the billions of searches that people conducted on Google this year, these were the top tech topics in the company's annual list of top searches.

"This year marks our 11th annual look back at the searches that compose the year's Zeitgeist -- the spirit of the time," wrote Amit Singhal, a Google Fellow, in a blog post. "With Zeitgeist, we look at the most popular and the fastest rising terms -- the terms with the highest growth in 2011 -- in many categories across many countries around the world."

On the list of fastest-growing search terms, Google's new social networking site, Google+, came in at a strong second, while the release of Battlefield 3, a first-person shooter video game, came in at number five, and the anticipated release of the iPhone5 was number six.

Non-technology-related searches in the Top 10 list of fastest-growing searches. Rebecca Black, a teen whose song "Friday" made a huge online splash, was on top of the list, which also included Casey Anthony, the mother charged with killing her young daughter, singer Adele and the earthquake/tsunami disaster in Japan.

Google today also released a list of the fastest growing searches for consumer electronics.

Amazon's Kindle Fire topped that list, followed by Apple's iPhone 4s, the Sidekick 4g Android phone, the HP Touchpad and the Android app Spb Shell 3D.

The list of fastest-falling Google searches -- search terms whose popularity plummeted in 2011 -- was topped by Myspace, a social networking pioneer that has been eclipsed by the likes of Facebook and Google+. The fastest-falling list also included Hi5, another social networking site and Baidu, a Chinese search engine.

Tuesday, December 13, 2011

CAREER LIFE STAGES

Once I was listening to a group of children trying to deal with
a member who was being quite obstinate about not permitting _
anyone else to play with his toys. As the hostility level was increas-
ing, peace was restored by a wise old 10-year—oId who said, "l—le’s
not usually like this; it’s just a phrase he’s going through."
lf she was a bit off in her jargon, our young neighborhood
sage was correct in her understanding of human development.
People do go through phases and stages when they experience
changes in their mood, needs, aspirations, values, skills, motiva-
tions, and other important human characteristics. We have all
heard comments like, "l—Ie’s a new man since he started working,"
and "She isn't the same person I married twenty years ago."
People do change over the course of their lives and work careers,
and in some fairly predictable ways. In this chapter we will examine
some of these stages. `

MCTS Certification, MCITP Certification

Best comptia A+ Training, Comptia A+ Certification at examkingdom.com



We may see a person’s life cycle as a series of stages charac-
terized by changing patterns of developmental tasks, career con-
cerns, activities, values, and needs, which emerge as he ages
and passes through various age ranges.
But we should re-
member, as Cain observes,
In spite of the observed ambiguity of age status and of the abundance of
descriptive data on the subject, supplied by historians, anthropologists, demog-
raphers, researchers in social welfare, and others, sociologists have yet

to devote more than passing attention to these data and to their implications
for the total social structure.
(This is as applicable to psychologists as well as sociologists.)
_UnIike the life stages of childhood and youth, which are well-
defined by age and institutional role transitions (e.g., the start
of grade school, high school graduation, driving age, university
graduation, legal age, marriage, etc.) the important changes in
the adult years are harder to delineate . Marriage and
parenthood are often the last institutionalized status passages expe-
rienced until retirement; thus a person tends to pace his own life
cycle in terms of the life cycle of his children and the total family
unit. In fact, a person’s social behavior is probably related more
to his stage in the family life cycle than to his age.
Cain has said, "To be the father of a teen—age daugh-
ter elicits certain behavior patterns, whether the father be 30 or
70 years of age"
The person’s stage in his or her work career is another factor
that can strongly affect (and is likewise affected by) social behavior
and attitudes; this variable may not be closely tied to age either.
A lawyer or manager who is on the first permanent job following
professional training (law school or business school) will probably
be concerned about advancement and establishing a reputation
among colleagues, whether he or she is 25 or 45. (However, the
45-year-old who started a career in that occupation at 25 will
probably have quite a different set of concerns, which we will
describe later.)*


Erikson’s Theory of Life Stages

From clinical psychology, part of Erik Erikson’s theory ofthe eight
stages of the life cycle can be logically applied to the study of
working careers. (The first four of these stages—oraI, anal, genital,
and latency—describe childhood and therefore are not relevant
here.) Erlkson believes that each stage is characterized by a partic-
ular developmental task which the person must work through be-
fore advancing fully into the following stage.
ln the first stage of youth, adolescence, the central develop-
mental task is achieving a sense of ego identity


The main danger at this stage is role confusion, the opposite of
a clear identity. Although the person may experience confusion
about his sexual identity, "in most instances, however, it is the
inability to settle on an occupational identity which disturbs young
people". It is a time of searching for values and
role models and testing various possible identities, a time of think-
ing about one’s own ideology and purpose in life.
The next stage is young adulthood, during which the develop-
mental task is to develop intimacy and involvements. This includes,
but is not limited to, interpersonal intimacy; it entails learning how
to let oneself become ego—involved with another person, group,
organization, or cause.
Thus, the young adult, emerging from the search for and the insistence on
identity, is eager and willing to fuse his identity with that of others. He is
ready for intimacy, that is, the capacity to commit himself to concrete affilia-
tions and partnerships and to develop the ethical strength to abide by such
commitments, even though they may call for significant sacrifices and com-
promises
The danger at this stage is that the person may be so afraid of
losing or compromising his new-found sense of identity and au-
tonomy that he shuns involvements and develops a deep sense
of isolation and self-absorption. To describe these issues further,
Erikson referred to Freud’s famous reply when asked what he
thought a normal person should be able to do well: "L/eben und
arbelten " (love and work).
lt pays to ponder on this simple formula; it gets deeper as you think about
it. For . . . when he [Freud] said love and work, he meant a general work-
productiveness which would not preoccupy the individual to the extent that
he loses his right or capacity to be a genital and a loving being
One of the behaviors that occurs in this stage as a sign of
intimacy is finding and committing oneself to a mate. Also, close,
lifelong friendships areestablished with those with whom one
interacts intensively during young adulthood—college chums,
roommates, army buddies, co-workers, etc. This is also a time
when young people test out their occupational identities and go
to work, creating involvements in and commitments to work orga-
nizations, bosses, and co-workers.
The seventh stage described by Erikson is adulthood, during


which the person deals with issues concerned with the generation
of that which is of lasting value to other people—his contributions
to following generations, and thus in a sense his antidote to
mortality.
Generativity, then, is primarily the concern in establishing and guiding the
next generation, although there are individuals who, through misfortune or
because of special and genuine gifts in other directions, do not apply this
drive to their own offspring. And, indeed, the concept of generativity is meant
to include such more popular synonyms as productivity and creativity, which,
however, cannot replace it
In the work setting, generativity may be achieved through such
things as building organizations; developing creative theories, dis-
coveries, or products that will endure; coaching and sponsoring
the development of younger colleagues; and teaching and guiding
students. Generativity is really an outgrowth of the preceding
stages (as is the case for any other stage): once the person has
developed a sense of identity and has committed it to a cause,
person, or organization, the next stage is to accomplish or pro-
duce something as a result of that commitment. The opposite of
generativity is what Erikson calls stagnation, which means stand-
ing still, producing nothing. Stagnation also carries the connota-
tion of decay, not just the absence of growth.
The eighth and final stage of development is maturity, during
which the fully developed person acquires a sense of ego integrity
(versus despair). This is the feeling that the person is satisfied
with his life, with his choices and actions. He sees it as meaningful,
and is willing to leave it as it is.
[Ego integrity] is the ego's accrued assurance oi its proclivity for order and
meaning. It is a post-narcissistic love of the human ego—not of the seIf—as
‘ an experience which conveys some world order and spiritual sense, no matter
how dearly paid for. It is the acceptance of one's one and only life cycle
as something that had to be and that, by necessity, permitted of no substitu-
tions .... In such final consolidation, death loses its sting.
The lack or loss of this accrued ego integration is signified by fear of
death: the one and only life cycle is not accepted as the ultimate of life.
Despair expresses the feeling that the time is now short, too short for the
attempt to start another life and to try out alternate roads to integrity
One characteristic of a cycle is that it has no beginning or
end, in a sense; the completion of one cycle feeds into the begin-
ning ofthe next.T Erikson ends his discussion of the eight stages
by showing strikingly the connection between the end and the
beginning of lite:


Webster's Dictionary is kind enough to help us complete this outline in a
circular fashion, Trust (the first of our ego values) is here defined as "the
assured reliance on another’s integrity," the last of our values. I suspect
that Webster had business in mind rather than babies, credit rather than
faith, But, the formulation stands, And, it seems possible to further paraphrase
i the relation of adult integrity and infantile trust by saying that healthy children
i will not fear life if their elders have integrity enough not to fear death

A person must achieve a satisfactory resolution of the issues
in one stage before he can deal competently with the issues at
the next stage. Thus, it is possible for a person’s development
to become arrested, in a sense, at any given stage. lf a person
were "hung up" at the identity level, for example, he may remain
plagued with doubts about his career choice, shifting from job
to job and perhaps career to career, long after his contemporaries,
who had settled on a career and an employer, were advancing
within their firms. According to this theory, a person cannot
achieve a full, deep commitment (intimacy) to an organization,
person, or cause until his identity is pretty well-defined; similarly,
he cannot attain higher-stage experience such as creative produc-
tion (generativity) or ego fulfillment (integrity).
The work of Erikson is based upon his clinical, anthro-
pological, and historical observations, and has not really been
tested with experimental and statistical methods. However, the
theory has received considerable support from clinicians and has
a great deal of face validity. It has been extremely useful in under-
standing specific developmental problems, such as identity confu-
sion and mid—life career crises. For example, it has been found
that students who had made weIl—adjusted vocational choices and
had developed mature career attitudes (as measured by Crites’
Maturity Inventory, discussed in Chapter 2), had also been most
successful in moving through the first six stages identified by
Erikson
There may be sex differences in the course of the life stages.
One study found that adolescent
. girls often achieve a sense of identity only after they have es-
tablished a sense of intimacy (generally heterosexual) in their
relationships. Thus, the intimacy stage may precede the identity
stage for girlst; adolescent boys, on the other hand, are seen
by these researchers to be able to achieve intimacy after they
had attained a sense of identity, which fits with Erikson’s model

Other theories, too, correspond in part, to Erikson‘s concep-
tion of life stages. In the realm of vocational behavior, Super and
his associates employ a model of five developmental stages: (1)
childhood, (2) adolescence, (3) young adulthood, (4) maturity,
and (5) old age. The main task in the I
childhood (up to age 14) stage is growth. In this stage the person ?
begins to fantasize about careers, and develops vocational inter-
ests and capacities. During adolescence, the person begins to
explore his own interests and different specific career opportu-
nities. This corresponds to Erikson’s identity stage. In young
adulthood, the person may initially flounder
a bit (as seen in the high initial turnover of recent college gradu-
ates), and eventually establish himself in a particular field. This
corresponds to Erikson's intimacy stage with some hints of gen-
erativity later. In maturity, the person continues
to hold his own in a sort of career plateau. This stage is probably
when generativity concerns would be most important. Old age
(65 and on) is a period of disengagement. This would be the
time ego integrity would be achieved, if the person has resolved
all the earlier stages. (The vocational stages defined by Super
are shown in detail in Table 3-1 .) Super's model has been support-
ed in recent research on organizational careers.

Miller and Fcrm’s Occupational Stages

Miller and Form have described five stages based more
on actual job behaviors than on the underlying developmental
processes. The preparatory work period occurs in childhood. The
initial work period (late teens) consists of part-time and occasional
jobs. The trial work period starts with the person’s first regular
full-time job and continues until he settles into a stable field of
work: (late twenties or early thirties). The stable work period ex-
tends from the thirties to the sixties, and is followed by retirement.
Typical career patterns tend to emerge, based upon the ways
people have gone through (or have failed to go through) these »
work stages, with primary emphasis on the stability or security
ofthe career. These patterns are as follows:
1. Stable career pattern. People in this category have gone directly from
their schooling into work with which they stayed. Many managers and
most professionals have careers of this type.
2. Conventional career pattern. In this pattern, the individual goes through
the stages in the sequence listed above: initial jobs, trial jobs, and stable
employment. This pattern describes most managerial careers.
3. Unstable career pattern. In this pattern the person never really becomes
established in one area, going from trial jobs to a stable situation and
then back to trial jobs again. She might be called /atera/ly mobile, rather
than upwardly mobile.
4. Mu/tiple-trial career pattern. In this pattern the person does not stay in

1. Growth Stage (Birth—14) ·
Self-concept develops through identification with key figures in family and
in school; needs and fantasy are dominant early in this stage; interest
and capacity become more important in this stage with increasing social
participation and reality testing. Substages of the growth stage are:
Fantasy (4-10), Needs are dominant; role playing in fantasy is impor-
tant.
Interests (11-12). Likes are the major determinant of aspitalions and
activities.
Capacity (13-14). Abilities are given more weight, and job requirements
(including training) are considered.
2. Exploration Stage (Age 15-24)
Self-examination, role tryouts, and occupational exploration take place
in school, leisure activities, and part—time work. Substages of the explora-
tion stage are:
Tentative (15-17). Needs, interests, capacities, values, and opportu-
. nities are all considered. Tentative choices are made and tried out in
fantasy, discussion, courses, work, etc.
Transition (18-21). Reality considerations are given more weight as
the youth enters labor market or professional training and attempts
to implement a self-concept.
Trial (22-24). A seemingly appropriate field having been located, a
beginning job in it is found and is tried out as a life work.
3. Establishment Stage (Age 25-44)
Having found an appropriate field, effort is put forth to make a permanent
place in it. There may be some trial early in this stage, with consequent
shifting, but establishment may begin without trial, especially in the profes-
sions. Substages of the establishment stage are:
Trial (25-30). The field of work presumed to be suitable may prove
unsatisfactory, resulting in one or two changes before the life work
is found or before it becomes clear that the life work will be a succession
of unrelated jobs.
Stabilization (31-44). As the career pattern becomes clear, effort is
put forth to stabilize, to make a secure place, in the world of work.
For most persons these are the creative years.
4. Maintenance Stage (Age 45-64)
Having made a place in the world of work, the concern is now to hold
it. Little new ground is broken, but there is continuation along established
lines.
5. Dec/ine Stage (Age 65 on)
As physical and mental powers decline, work activity changes and in
' due course ceases. New roles must be developed; first that of selective
participant and then that of observer rather than participant. Substages
of this stage are:
Deceleration (65-70). Sometimes at the time of official retirement,
sometimes late in the maintenance stage, the pace of work slackens,
duties are shifted, or the nature of the work is changed to suit declining
capacities. Many men find part-time jobs to replace their full—time oc-
cupations. _
Retirement (71 on). As with all the specified age limits, there are great
variations from person to person. But complete cessation of occupation
comes for all in due course, to some easily and pleasantly, to others
with difficulty and disappointment, and to some only with death.

Monday, December 12, 2011

London Business School Executive MBA (Dubai) attracts new talent

London Business School has announced the number of professionals from the media, leisure, sport and entertainment industries has more than doubled for its Executive MBA (Dubai) programme.

MCTS Certification, MCITP Certification

Microsoft IBM Exam Training, IBM Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The School, regarded as one of the world’s leading business schools, hosted its orientation week with new students in London this month, welcoming the next generation of business leaders from across the globe.

Student David Hanson, who is from the UK and is Director of Movies and On Demand at Orbit Showtime Network in Dubai, said:

“I think most of us are still buzzing from the orientation week. It was amazing to meet up with such a wide range of professionals and tap into their knowledge and enthusiasm. There was a genuine sense of camaraderie as we quickly realized that we as a group, are as responsible for each other’s development.”

The new Executive MBA class, which has increased in size to be the biggest since 2009, represents 13 industries, with 17 per cent coming from within the media, leisure, sports and entertainment sectors.

Students on the programme include executives who work for some of the region’s highest profile sporting events, including the Formula One Etihad Airways Abu Dhabi Grand Prix and the Dubai Duty Free Tennis Championships.

Andrew Scott, Deputy Dean of Programmes and Professor of Economics at London Business School, said: “Each year we witness a new trend emerging and this year is no different with some interesting statistics showing just how fast our world is changing. We are delighted to welcome an increase in students from such exciting industries, which reflects the diversity of our Executive MBA has become.”

There are 23 nationalities represented in the class, with the programme welcoming students from South Korea and Senegal for the very first time. Forty per cent of the class will be commuting from outside of the UAE, with students coming from Aberdeen, Almaty, Amman, Athens, Beirut, Cairo, Delhi, Doha, Karachi, Kuwait Moscow and Riyadh, among other cities around the world.

“Our Executive MBA programme is designed for those who want to broaden and strengthen their global approach. The students have taken on an exciting challenge and they can now look forward to enhancing their knowledge and learning the necessary skills and tools to be effective global leaders,” added Professor Scott.

The diversity within the Executive MBA was further enriched last year by the integration of the two London and Dubai based classes during three residential sessions held in London, forging even greater connections and networks throughout the UK, Europe and the Middle East.

“At orientation I was particularly impressed with the school’s involvement and presence in the international business community, the diversity and experiences of my fellow students and the smooth integration of the Dubai and London streams,” said student Bishoy Azmy from Egypt who is CEO of Al Shafar General Contracting in Dubai.

The average length of professional experience for the class is more senior in this intake, with 11 years of experience on average. The School has also welcomed a higher percentage of students working in Abu Dhabi, up from eight per cent in the last intake to 17 per cent.

London Business School’s full-time MBA programme is ranked number one in the world in the Financial Times´ annual survey, and first in the Financial Times´ ranking of European Business Schools´ MBA, EMBA and Executive Education programmes. It launched its Executive MBA programme in Dubai in September 2007. Located over campuses in two of the world’s most dynamic cities – London and Dubai – this programme is taught over 20 months. Ten of the 11 core courses are taught in the Centre of Excellence at the Dubai International Financial Centre, while the majority of elective courses are offered at London Business School’s central London campus.

The programme, taught exclusively by London Business School’s own faculty, gives students a thorough grounding in all key areas of business and management and, through the diverse elective portfolio, also allows them to specialise in their chosen subject areas.

Friday, December 9, 2011

Extended IT Support For Windows Servers And Windows PCs

In these difficult economic times many companies understandably want to extend Business IT Support and hardware maintenance on their Microsoft Servers and PCs for as long as they can.

But at some point the hardware will run out of warranty and it will become so old that your IT Support Company will be unable to provide adequate IT Support.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com



How Long Can You Extend IT Support On Old Computers?

Generally Servers and PCs will last for between 3 and 5 years.

There are 3 main reasons for this:

1. After 5 years it’s almost impossible to get a warranty. That means if it breaks it’s difficult to fix. Even if you could get a warranty it would be expensive compared to the cost of a new computer.
2. The version of software on the computer will be quite old. This may make it difficult to exchange information with people who have a more current version of the software despite the best efforts of your Business IT Support Company
3. Old computers are slow. Your users are likely to be frustrated. As far as they are concerned their PC or the network server will be getting in the way of them doing their work.


So by this stage it will be slow, won’t interact well with more modern systems in the outside world and can’t be repaired.

Limits On Managed IT Support Services

It will probably be too expensive for your IT Support Company to maintain your old computers. If you have a fixed price Managed IT Support Service there is likely to be a clause in the IT Support Contract that limits IT Support on old computers. After 5 years it’s probably more expensive to keep an old computer than replace it.

Replacing your Server

Your servers are pretty fundamental, so it’s important that you have an IT Support Contract for them. However Business IT Support isn’t the whole picture - hardware maintenance is important too.

The performance and reliability of your servers will affect all of your staff, not just 1 or 2. After 5 years it’s almost impossible to get a warranty, so if it breaks your IT Support Company probably won’t be able to get it fixed for you.

Most businesses are so dependent on their servers that they cannot afford for that to happen. So, at the very latest it will need to be replaced when you can no longer get a warranty, or an IT Support Contract.


However you may need to replace it before then if it will not run the most recent version of an application that you must upgrade to. Or if the growth of your business means that it is no longer powerful enough for your requirements. Your IT Support Company should advise you of this.

Hardware Maintenance From Your IT Support Company

Believe it or not the hardware manufacturers are the best and the cheapest people for hardware maintenance. IT Support Companies are not particularly well geared up for hardware maintenance.

We would advise you to buy Dell servers and PC’s. It’s good quality kit and Dell will come to your site within 4 hours and repair the hardware. And because they manufactured the hardware, unlike the IT Support Company, they have the parts to fix it quickly.

All the others – Toshiba, Sony, Apple etc. – make you send the broken hardware to them. They will return it to you 2 weeks later usually with the hard drive wiped, so it will require a complete rebuild by your IT Support Company. Your IT Support Company should liaise with the hardware manufacturer when you do have a problem – after all that’s why you’re paying for an IT Support Contract!

Wednesday, December 7, 2011

Speedreading Computer Software - On the Web High Schools Make Use of Speed Reading Computer Programs

Not all speedreading applications are created similarly. There are a couple genuinely strong pieces of applications in our world that might assist you out infinitely, and there one or more forms of computer applications that do not do pretty much for you to any degree. I hope that this short examination should support you understand what types of applications are going to be the best for your particular life.

MCTS Certification, MCITP Certification

Microsoft IBM Exam Training, IBM Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The first most relevant pieces of speed reading computer programs is that you must have a great deal of assortment in activities. A couple kinds of computer applications do nothing but give you reading passages and time you. The better forms of speedreading softwares should include games that show you diverse ways of chunking, analyzing, and highlighting varied reading quickly techniques. Individuals should challenge you with reading comprehension questions, which are nice for compelling you to concentrate on something and get the most knowledge feasible regardless of what the subject matter is. Visual exercises are at times included, and these are not generally recommended by reading rapidly specialists. Many doctors have cited these as a leading cause of recurring migraines, and perhaps incredibly, they have small effect on how fast you could read.


Books might be traditional, courses may be the most all-encompassing, but more and more, individuals are turning to PC or Mac applications as perhaps the best strategies to discover most forms of stuff. From high school courses, to over the internet science fairs, computer learning is at the forefront of education. There are most forms of things that are clearly better to know in front of a PC or Mac screen, but is reading one out of those?

Speedreading software is one of the completely new ways you could take to ameliorate your reading abilities to the next level. Programs offers you a lot of benefits over a traditional book or pen-and-paper method. First is the accurate reviews tracking and progress meter that tracks your outcomes over time. Software also offer you a distinct best part in allowing the applications producers to illustrate their points in completely new ways. With the numerous tools built in, There's no way to honestly avoid using this is one or more way. So get on board and get yourself a few reading rapidly applications to strengthen your abilities.


The first newest products being offered in schools across the U.S. is an on line high school, where students stay home and log in instead of ending up with on a school bus. Lessons are basically self-driven, with video support from educators, and assignments are largely project-based. These schools offer a number of positives, specifically in sparsely populated areas, or for students who are not able to handle the larger populations of schools. It also lets for another choice for students without having to be sent from school to school.

The first largest benefits of an over the internet high school is the factor of choice in education. instead of having to target what a educator thinks is necessary, on the internet schooler are allowed a lot of independence in what they want to learn. A common most in demand alternatives time and time again in these schools is the choice to know speedreading using reading quickly programs. English teachers are buying into the idea that learning to read fast does not necessarily mean that you are learning to read poorly, and speedreading lessons typically reinforce this concept.

Educators report that after having learned speed reading, ACT test and SAT scores are up, and children are uncommonly driven to understand.

Ways to manage IT Resource Requirements beyond Outsourcing

You will find that there are several reasons which require that you top up your IT resources – a couple of common reasons are seasonal trends and projects. In general, larger companies have built-in additional resources to deal with the highs and lows of demand. However, this is not the most efficient or cost effective model. For organisations which are small and medium sized, it is often a case of “just coping” leading to higher costs and lower efficiencies.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



A common challenge that many companies face is dealing with difficult and often unforeseen requirements. A suitable partner however could have innovative solutions to help you in such a state of affairs:

1) Interim & Ad hoc IT resources
This is the perfect solution if you do not have the capability, or you will lose basic IT support for your business, when you need to manage additional or short term projects. In such situations the partner either provides the additional resource for the project, or a resource to back fill your own staff from their talent pool, allowing your team to devote time to the project, without risking any lack of service to the business.


2) Short Term & Interim IT resources
This is the best solution when you need interim and fixed short term back up. You would have noticed that companies often undergo change which maybe planned or unplanned resulting in emergency support requirements during work overloads, specialist skill requirements, or resource requirements to deal with continuity management, change management and skills transfer.
Employing contractors directly will be both expensive and complicated. Here, the partner delivers the specialist skills as and when required in all these situations.

3) Flexible IT resources
We recommend that you take a pro-active approach when you plan for IT resource requirements and focus on preparing yourself for the unexpected staff shortages that spring up during holidays, sickness and urgent projects. A solution that will counter unpredictability by being flexible will be ideal such as a system where you can be provided with credits similar to pay as you go mobile phone tariffs, which you can pre-purchase in advance and use as when your require with no fuss and no hassle. That is, you will purchase resource credits from your partner and over the course of a year, you can exchange them for a wide range of skills that can be deployed anywhere at any time. This will relieve the pressure of staff shortages, IT projects or major roll-outs across a number of countries.


When you use these services you will benefit in the following ways:

1. Reduce the need for maintaining bench and underutilised staff
2. Ensure work continues and backlog does not mount providing a unique intermediate solution when faced with a decision between permanent or contracted staff
3. No inflated salaries and resentment or competition between existing staff
4. Improve flexibility and eliminate employee liability
5. Projects, SLA’s or backfill requirements will not be put on hold, minimising any downtime
6. Reduce employer liability and the costs associated by the employee being accountable to your partner
7. Ensure that you adhere to the complex European laws
8. Get fiscal reimbursements should the candidate leave or not work out
9. Eliminate any contractor or employment liabilities including IR35
10. Gain talented staff who match your organisation requirements without any of the HR/Payroll or recruitment costs
11. Decrease downtime and risk management with the purchasing of resource credits to provide maintenance when you don’t know you’ll need it!

You will see that Allied Worldwide's IT Recruitment Resourcing solutions helped their client to efficiently manage technical resource requirements at their locations across Europe, resulting in a reduction in their overall expenditure by approximately £250,000 per annum. You can read more about how a leading manufacturing firm reduced overall costs using flexible resources.

These bespoke solutions offer the transfer of employee’s, taking them on permanently and allowing you to only pay for the time you require whilst maintaining the same long-term employee carrying limited liability. We understand that longer serving employee’s (eg. 10+ years) carry a large cost with increased salary increments over the duration of employment, a very common dilemma in the West. This solution provides a happy interim when firms want to retain costly long-serving employees but also want to capitalise on the cost-savings which come with a new employee.

Additionally our IT consulting services for clients are designed to help them detail their strategy and bring in an independent perspective and impartial objectivity. The benefit that this clarity brings results in increased efficiency and reduced costs

Saturday, December 3, 2011

Oracle updates WebLogic for cloud usage

For the new release of its WebLogic, Oracle has tailored the enterprise Java application server so that it can be used more easily in cloud deployments.

MCTS Certification, MCITP Certification

Microsoft Oracle Exam Training , Oracle Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


"Many of our customers are running in traditional data centers but they are interested in moving to the cloud. We designed WebLogic 12c to make that happen," said Mike Lehmann, Oracle senior director of product management, noting that the "c" in the name of the new version stands for "cloud."

WebLogic 12c will be available for use within the next few weeks, the company announced Thursday. This edition is the first major update to WebLogic since WebLogic 11g, released in 2009.

With this release, Oracle has updated the software to meet the latest set of Java standards. It runs the latest version of the core Java runtime environment, Java SE (Standard Edition), version 7, released last July.

WebLogic 12c is also the first version to comply with the full Java Enterprise Edition 6 platform profile, including the APIs (application programming interfaces) and libraries for Java EE 6 components such as Java Servlets, JAX (Java API for restful XML Web services), JSF (Java Server Faces) and Enterprise JavaBeans. Java EE 6 also brings Context Dependency Injection, a feature long requested by developers for easily injecting components into applications.

Much of the work Oracle did getting WebLogic ready for the cloud involved integrating the server software with other Oracle and non-Oracle applications.

For instance, WebLogic has been tweaked to run with Oracle Virtual Assembly Builder, which provides a way for an organization to package into a single container all the components in a multitier application. Typically, enterprise Java application components, which include a Web server, traffic management software, the application server and a messaging tier, tend to be spread out across multiple servers. This software packages all of them into a single virtual container, which then can be moved from server to server and managed as a single identity.

The company also paired WebLogic with Oracle Traffic Director, a load balancer that routes inbound traffic across a number of duplicate WebLogic instances. "As they cloud-enable their environment, customers start getting a proliferation of virtual machines. Virtual Assembly Builder minimizes that by collecting them up into assemblies. And Traffic Director then allows them to tailor their network traffic much more cleanly into their back-end infrastructure," Lehmann said.

The software also has been engineered to work more easily with the Oracle Real Application Clusters (RAC) database clustering software. The application server can pick the best database server to work with at any given moment, and, as a result, can enjoy up to a threefold performance boost, Lehmann said. Other application servers will poll the database for new events to act upon, whereas, for WebLogic, Oracle set up a messaging system that can alert the application server immediately when new information has been ingested into the database. Oracle engineered similar performance enhancing shortcuts wth its Exalogic appliance, which is based on WebLogic.

At the behest of users, Oracle also integrated WebLogic with Apache Maven, which aids developers in managing their applications' dependencies, or the libraries and classes needed for that program to operate. "This makes it easy for our customers to integrate WebLogic into their standard build environment," Lehmann said.

Friday, December 2, 2011

Hire Affordable Outsource PHP Development Company

In today's modern era of world, technology proliferation has virtually occupied itself into all minute or major corners of the society. This day-by-day increasing technology is becoming a vast platform for transfer of ideas and growth of businesses.

Comptia A+ Training, Comptia A+ certification

Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



Technology has changed the life of every individual. Change is the key of life and positive adaptation is essential in this forever growing and changing world. One of the face of technology is the advent of Web and Internet technology. As a result, organizations have also adopt web development to increase their businesses.

Web technology has became powerful medium of communication and information generation. Web technology is made up of mark-up languages like HTML, PHP and many other. PHP development is vastly used now a days by most of the web development company. PHP outsource is currently at boom and at par level.

PHP stands for Hypertext Processor; a server side scripting language for fabricating the dynamic pages. PHP development is currently used by major companies for website designing and development as it is an open source software solution. PHP development is preferred, as this language can be embedded with HTML as well.


Outsourcing is one of main solution to keep yourself beforehand of your competitors. A successful PHP development company provides PHP outsource which suits to business and techno-driven world. PHP development company is having a best team of PHP outsource programmers and developers for PHP development.

A PHP development company which provides PHP outsourcing should contains following features and assets :

A PHP development company must follow consulting model and implements the best solution as per clients need and keeps complete compliance with your standards and also processes.

Hire PHP programmer who customizes your website to the finest accuracy. PHP outsource can be done from a PHP development company which provides presence and sufficient impetus towards the growth of your business.

Hire PHP programmer from such PHP outsource and PHP development company who understands your target customers, so that they can develop site in a technically accurate manner. So while choosing PHP development company, look for the one who is having expert and dedicated working professionals.


PHP outsource for PHP web development is available in India at very economical rates. Hire PHP programmer who makes your thinking reality for you. PHP outsource company should be consistent in completing clients projects on the given deadline at an affordable rate.

Hire PHP programmer from such company who focuses on rapid team mobilization and have pool of top-notch experts and dedicated professionals across different platforms and also technologies. A web development company for PHP outsource must provide consolidated solutions regarding services.

Hire PHP programmer from such PHP outsource company which is having highly equipped and modified development facility. All this, with simple goal of providing consistent quality at an affordable pricing, so that every one would like to hire PHP programmer from that company.

So, take the benefits of all PHP outsourcing services by hiring PHP programmer to beat the market competitors. Hire PHP programmer who is qualified, dedicated, experienced to develop website application, software application, mobile services, and many more.

Be the part of such PHP outsource and development company who believes in building strong relationship while also providing quality. The elevated PHP outsource company should be able to fulfill all your requirements, which would be beneficial to raise your business to a potential new level and height. PHP development provides lighthearted design, which makes PHP programmer work extremely fast and also available at a reasonable price.

Believe it or not, PHP outsource service has made this possible by providing result oriented and dynamic websites. Therefore, quality work with consistency at an affordable pricing becomes an important factor while choosing best PHP outsource and development company or when you hire PHP programmer, so that your business reaches to a new pinnacle by keeping all your needs and requirements intact.

Thus, it is very important to hire PHP programmer for PHP development. A successful PHP outsource company's primary purpose is to encourage the success of their clients by pioneering PHP development through valued, applications and services, which will then helps to heightens the class of their client interactions, increases the number of customer efficiency, and finally helps to deliver up-to best level of support and skill.

ExpertsFromIndia is an offshore leading PHP development company which provides solutions for PHP outsource as well. EFI is having highly dedicated and versatile team of PHP programmers and developers for PHP development. PHP outsource taken from EFI is accessible at an affordable rate.