आपको इसे अवश्य पढ़ना चाहिए और इस पर विचार करना चाहिये .
व्लादिमीर पुतिन रूस के राष्ट्रपति रूसी संसद को सम्बोधन में रूस के अल्पसंख्यक के साथ तनाव पर कहा –
रूस में रूसियों की तरह रहें . कोई भी अल्पसंख्यक समुदाय जो कहीं से हो, यदि उसे रूस में रहना है , यहाँ काम करना है, आहार लेना है तो रूसी भाषा में बोलना होगा, रूस के कानूनों का सम्मान करना होगा .यदि वे शरीयत नियमों को वरीयता देना पसंद करते हैं एवं मुस्लिम जीवन शैली में जीना चाहते हैं तो उन्हें हमारा सुझाव है कि वे उन स्थानों पर जायें जहाँ यह राजकीय कानून है .
रूस को अल्पसंख्यक मुस्लिम समुदाय की आवश्यकता नहीं है . अल्पसंख्यकों को रूस की आवश्यकता है, हम किसी तरह के विशेषाधिकार उन्हें नहीं देते, और न ही हम अपने कानूनों में ऐसे बदलाव लायेंगें जो उनकी अपेक्षावों पर खरे हों , चाहे वो ऊंची से ऊंची आवाज में इसे ‘भेदभाव’ कहें . रूसी संस्कृति की अवमानना हमें किसी भी रूप में स्वीकार नही है . हमें यदि एक राष्ट्र के रूप में जीवित रहना है तो हमें अमेरिका, इंग्लैंड, होलैंड और फ्रांस में हुये आतंकी हमलों से सीख लेने की आवश्यकता है .मुसलमान उन देशों का अधिग्रहण कर रहे हैं लेकिन वे रूस के साथ ऐसा नहीं कर पायेंगे .
रूसी रिवाजें एवं परंपरायें का मुकाबला असंस्कारी और आदिम मुस्लिम शरीयत नियमों के साथ नहीं किया जा सकता .
जब भी यह सम्माननीय वैधानिक निकाय नये नियमों के सृजन का विचार करे तो उसे रूस के राष्ट्रीय हितों को प्रथम वरीयता में रखना है, यह ध्यान में रखते हुए कि मुस्लिम अल्पसंख्यक रूसी नही हैं .
रूसी संसद के राजनेताओं ने पुतिन का खड़े होकर 5 मिनटों तक अभिवादन किया .
अगर आप इस जानकारी को अपने तक ही सीमित रखते हैं तो आप भी इस समस्या के भागीदार ही माने जायेंगे .
निवेदन है कि प्राप्त संप्रेषण को अधिक से अधिक लोगों से साझा करें .
USER AGREEMENT
Policy effective date: Oct 23, 2018
IMPORTANT – PLEASE READ THESE TERMS CAREFULLY BEFORE USING P&S (“PRODUCTS OR SERVICES OF YOLO NET TECHNOLOGY LTD”). BY DOWNLOADING, INSTALLING, OR USING THE PRODUCT, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, THAT YOU UNDERSTAND IT, AND THAT YOU AGREE TO BE BOUND BY ITS TERMS. IF YOU DO NOT AGREE TO THE TERMS HEREIN, PLEASE DO NOT USE THE PRODUCT AND SERVICE.
This user agreement is between you (“you”), as either an individual or as a business entity, and us (“YOLO NET TECHNOLOGY LTD”). XCall is not designed to the person under 13 years old, who shall stop using XCall and its services and shall delete all the files if it is already installed. In exchange for your use of the Product and Service, you agree as follows:
I. About
You acknowledge that you have only a non-exclusive and limited right to use the object code version of the product on the personal or non-commercial purposes. You may make a single copy of the product in object code form for archival or backup purposes. You shall include all notices on all copies of the products. You may not reverse engineer, crack, decompile or disassemble the product or attempt to gain access to the source code for the product, except and only to the extent that it is expressly permitted by applicable law, and, to the extent applicable law permits contractual waiver of such right, you hereby waive your rights to do so.
You will not transfer or assign the product or this UA (User Agreement) and/or any rights or obligations hereunder without the prior written consent of XCall.
Your rights under this UA will automatically terminate if you breach any of items under this UA. Upon violation of the UA, XCall can, in our sole discretion, disable your account for a while or permanently. Upon any termination of this UA, you will destroy all copies of the product promptly.
All rights not expressly granted are reserved by us.
II. Account
You shall register an account and submit the required information for access to the product and service. You shall provide your personal data to XCall and make sure that the data are accurate and complete. You shall be responsible for safeguarding the password or credentials that you use to access the product and service and for any activities or actions under your account. We cannot and will not be liable for any loss or damage arising from your failure to manager your account.
XCall reserves the right to terminate a registered account if you are in violation of any or whole items of this UA or conduct any infringement on third party right or you are in violation of any applicable laws and regulations.
III. Service.
By using the product, you may call other users for free. In exchange with free call, you should earn credits by downloading recommended apps or watching advisements provided by XCall or our business partner. You shall warrant and guarantee to comply with the call feature guidelines stipulated by us.
You are prohibited from earning XCall’s credits unduly through any deceptive means, whether technological or not, including but not limited to:(1) providing virtual number to XCall for registration to earn credits; (2)using plug-ins or any other similar program to simulate a click or request to the advertisement in order to generate fraudulent credits.(3)tampering maliciously with the MCC(Mobile Country Code) of you mobile device to trick the XCall server for fraudulent credits, etc.
You may be charged for using some specified feature as stated in our product. In the event that you do not want to use or pay for such service, you shall not make any payment. Any payment from you for the service will be deemed your consent to use the service and the charge.
For the purpose of payment, XCall may provide you with the third payment services platform. When you start the payment procedure, you will leave our product and for payment purpose you may be required to provide your information to the third party service platform, you acknowledge and agree that any activity on third party payment platform shall not be liable by us and you shall be responsible for the decision and activity on the third-party service platform.
IV. Infringement Indemnity; Limited Warranty; Limitation of Liability
Neither XCall, nor its affiliates, subsidiaries will have any liability for any claim based upon or arising out of :(1) intentional or negligent acts of anyone other than us; or(2) the combination, operation or use of the product with any equipment, devices or software not supplied by XCall, or(3) the alteration or modification of product.
XCall does not represent or warrant that XCall will operate without interruption or will be error free. Especially in the following cases: (1) modification or alteration of the product made without the prior written approval of XCall, and(2) accident, neglect, misuse or abuse, or (3) exposure to conditions outside the range of the environmental, power and operating specifications provided by XCall.
To the full extent permitted by applicable laws or regulations, this section states the entire liability of XCall, its affiliates, subsidiaries and your sole remedy with respect to any claim of infringement.
Except as expressly set forth in this UA, neither XCall, its affiliates, subsidiaries make any other warranties, express or implied, including any implied warranties of merchantability and fitness for a particular purpose. XCall, its affiliates, subsidiaries expressly disclaim all warranties not stated in this UA. Any implied warranties that may be imposed by law are limited to the terms contained in this UA to the maximum extent permitted by law.
V. User Restrictions
You understand, agree that upon submitting or posting you content on or through XCall and its service, such content may be distributed, viewed and accessed and commented by others. XCall will not be responsible for or hold liable for any use of your content.
You hereby represent and warrant that you legally have the rights, power or authority to your content and to grant the rights as set forth in above. You also represent and warrant that your content and your or any other’s use of your content will not infringe, misappropriate the third party intellectual property rights, rights of publicity or privacy, or will not be in violation of any applicable law and regulation.
Any user and the user’s content of XCall and its service shall be prohibited from:
Sexually Explicit Material: Contents contain pornography are prohibited; this includes sexually explicit or erotic content, icons, titles, or descriptions.
XCall has a zero-tolerance policy against child sexual abuse imagery. If we become aware of content with child sexual abuse imagery, we will report it to the appropriate authorities and delete the submitting Accounts.
Violence and Bullying: Depictions of gratuitous violence are not allowed. User Content shall not contain materials that threaten, harass or bully other users.
Hate Speech: User Content shall not advocate against groups of people based on their race or ethnic origin, religion, disability, gender, age, nationality, veteran status, sexual orientation, or gender identity.
Sensitive Events: User Content which may be deemed as capitalizing on or lacking reasonable sensitivity towards a natural disaster, atrocity, conflict, death, or other tragic event are not allowed.
Any user of XCall shall not use this product and its service in unlawful activities.
Infringement on third party’s rights, including copyright, trademark, privacy and publicity rights are prohibited.
We reserve the right from time to time to remove and refuse to post, distribute any User Content on the Product at XCall’s sole discretion. We also are entitled to suspend or terminate the account posting contents failure to be in compliance with this UA without any liability.
We also reserve the right to access, read, preserve, and disclose any information as we reasonably believe is necessary to (i) satisfy any applicable law, regulation, legal process or governmental request, (ii) enforce the terms, including investigation of potential violations hereof, (iii) detect, prevent, or otherwise address fraud, security or technical issues, (iv) respond to user support requests, or (v) protect the rights, property or safety of XCall, its users and the public. Notwithstanding the foregoing, XCall does not disclose personally identifying information to third parties except in accordance with our Privacy Policy.
VI. Comments and Copyright Policy
You may post reviews, comments, and other contents in XCall as long as such materials is/are not illegal, obscene, threatening, defamatory, invasive of privacy, infringing of intellectual property rights, or otherwise injurious to third parties or objectionable and does not consist of or contain software viruses, political campaigning, commercial solicitation, or any form of “spam”. XCall takes no responsibility and assumes no liability for any content or comment posted by you or any third party but reverses the right to remove the illegal contents or comments at all the time.
Copyright Policy. You should not use XCall for infringement on the intellectual property rights of others, (including without limitation to patent, trademark, trade secret, copyright, and other proprietary rights), and if you, the copyright owner or an authorized representative, believe that any content infringes on your copyrights, you may submit a notification pursuant to the Digital Millennium Copyright Act (“DMCA”) by providing us with the information as follows:
A physical or electronic signature of a person authorized to act on behalf of the owner or an agent of an exclusive right that is allegedly infringed;
Identification of the copyright claimed to have been infringed;
Identification of the material that is claimed to be infringing, and where it is located in the product;
Information reasonably sufficient to permit the service provider to contact you;
A statement that you have a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law, and;
A statement, made under penalty of perjury, that the above information is accurate, and that you are the copyright owner or are authorized to act on behalf of the owner.
We respect the intellectual property rights of others and will respond to clear notices of alleged infringement. You acknowledge that if you fail to comply with all of the requirements of this section, your notice may not be valid.
VII. Miscellaneous Terms and Conditions
This UA constitutes the entire agreement between you and XCall with respect to the subject matter hereof and supersedes all previous and contemporaneous written and oral representations, proposals, negotiations and communications, including, without limitation, the terms and conditions of any purchase order.
XCall may assign this UA or any of the rights or obligations hereunder, and any causes of action arising hereunder, to any third party without necessity or obligation of notice to you. The waiver or failure of either party to exercise in any respect any right provided for herein will not be deemed a waiver of any further right hereunder. The invalidity or unenforceability of any provision of this UA will not affect the validity or enforceability of any other provision, the remaining provisions being deemed to continue in full force and effect.
XCall will not be responsible for any failure to perform its obligations under this UA due to circumstances beyond its reasonable control, including without limitation acts of God, war, riot, terrorism, embargoes, acts of civil or military authorities, fire, flood or accidents. You agree that XCall will be entitled to all legal and equitable remedies otherwise available to it to protect the intellectual property, proprietary rights and Confidential Information of itself and its Licensors, including, without limitation, the right to seek and obtain injunctive relief and enforce the same against you without the necessity of having to post bond or other such guarantee.
This UA will in all respects, be governed by and construed and enforced in accordance with the laws of People’s Republic Of China (PRC) (without giving effect to any choice or conflict of laws). Any dispute arising from or in connection with this UA or the product and service shall be submitted to China International Economic and Trade Arbitration Commission (CIETAC) for arbitration which shall be conducted in accordance with the CIETAC’s arbitration rules in effect at the time of applying for arbitration. The arbitral award is final and binding upon both parties.
.
# Privacy Policy
I. Information We Collect
a. Personal Information.
We do not collect Personal Information. “Personal Information” is information that identifies you or another person, such as your first name and last name, physical addresses, email addresses, telephone, fax, SSN, information stored within your device.
b. Non-personal Information.
We collect your non-personal information when you visit our website, including your device information, operation system, logs, which would not identify you.
c. Information you provide.
We may collect your information when you communicate with us or you give us.
II. How We Use Information
a. Personal Information.
We do not store Personal Information and therefore we do not disclose your Personal Information.
b. Non-Personal Information.
We do not sell, trade, or otherwise transfer to outside parties your information. We do not combine Non-Personal Information with Personal Information (such as combining your name with your unique User Device number).
c. Legal Reasons
We may access, use or disclose your information with other organizations or entities for reasons that required by any applicable law, regulation, legal process or enforceable governmental request; detect, prevent, or otherwise fraud, security or technical issues; protect against harm to the rights, property or safety of us, our users or the public as required or permitted by law.
III. Security
We are very concerned about safeguarding the confidentiality of your information. We do not collect Personal Information, and we employ administrative, physical and electronic measures designed to protect your Non-Personal Information from unauthorized access and use. Please be aware that no security measures that we take to protect your information is absolutely guaranteed to avoid unauthorized access or use of your Non-Personal Information which is impenetrable.
IV. Sensitive Information
We ask that you not send us, and you not disclose, any sensitive Personal Information (e.g., information related to racial or ethnic origin, political opinions, religion or other beliefs, health, sexual orientation, criminal background or membership in past organizations, including trade union memberships) on or through an Application, the Services or the Site or otherwise to us.
V. Your Rights under the GDPR
Individual rights for users live in the European Economic Area, United Kingdom, and Switzerland, we provide you with the rights described below when you use our Services. Please contact us at zzxy.zzczll@gmail.com if you would like to exercise your rights under applicable law. When we receive an individual rights request from you, please make sure you are ready to verify your identity. Please be advised that there are limitations to your individual rights. We may limit your individual rights in the following ways:
Where denial of access is required or authorized by law;
When granting access would have a negative impact on other’s privacy;
To protect our rights and properties; and
Where the request is frivolous or burdensome.
a. Right to withdraw consent
If we rely on consent to process your personal information, you have the right to withdraw your consent at any time. A withdrawal of consent will not affect the lawfulness of our processing or the processing of any third parties based on consent before your withdrawal.
b. Right of access and rectification
If you request a copy of your personal information that we hold, we will provide you with a copy without undue delay and free of charge, except where we are permitted by law to charge a fee. We may limit your access if such access would adversely affect the rights and freedoms of other individuals. You may also request to correct or update any of your personal information held by us, unless you can already do so directly via the Services.
c. Right to erasure (the “Right to be Forgotten”)
You may request us to erase any of your personal information held by us that: Request access to Your Personal Data. The right to access, update or delete the information We have on You. Whenever made possible, you can access, update or request deletion of Your Personal Data directly within Your account settings section. If you are unable to perform these actions yourself, please contact Us to assist You. This also enables You to receive a copy of the Personal Data We hold about You.
d. Right to restriction
You have the right to restrict our processing your personal information where one of the following applies:
You contest the accuracy of your personal information that we processed. We will restrict the processing of your personal information, which may result in an interruption of some or all of the Services, during the period necessary for us to verify the accuracy of your personal information;
The processing is unlawful and you oppose the erasure of your personal information and request the restriction of its use instead;
We no longer need your personal information for the purposes of the processing, but it is required by you to establish, exercise or defense of legal claims; or
You have objected to processing, pending the verification whether the legitimate grounds of our processing override your rights.
We will only process your restricted personal information shall with your consent or for the establishment, exercise or defense of legal claims or for the protection of the rights of another natural or legal person or for reasons of important public interest. We will inform you if or when the restriction is lifted.
e. Right to object to processing
You may object to our processing at any time and as permitted by applicable law if we process your personal information on the legal basis of consent, contract or legitimate interests. We can continue to process your personal information if it is necessary for the defense of legal claims, or for any other exceptions permitted by applicable law.
f. Right to data portability
If we process your personal information based on a contract with you or based on your consent, or the processing is carried out by automated means, you may request to receive your personal information in a structured, commonly used and machine-readable format, and to have us transfer your personal information directly to another “controller”, where technically feasible, unless exercise of this right adversely affects the rights and freedoms of others.
g. Notification to third-parties
If we share your personal information with third parties, we will notify them of any requests for rectification, erasure or restriction of your personal information, unless this proves impossible or involves disproportionate effort. Upon your request, we will identify such third parties.
h. Automated individual decision-making, including profiling
You have the right not to be subject to a decision based solely on automated processing of your personal information, including profiling, which produces legal or similarly significant effects on you, unless an exception applies under applicable law.
i. Right to lodge a complaint
If you believe we have infringed or violated your privacy rights, please contact us at zzxy.zzczll@gmail.com so that we can work to resolve your concerns. You also have a right to lodge a complaint with a competent supervisory authority situated in a Member State of your habitual residence, place of work, or place of alleged infringement.
# Contact
If you have any questions or comments about this, please contact us:
zzxy.zzcall@gmail.com
Visual Basic .Net IDE Integrated Development Environment (IDE)
It consist of inbuilt compiler, debugger, editors, and automation tools for easy development of code. Visual Basic.net IDE can be accessed by opening a new project. Visual Basic Integrated Development Environments (IDE) Visual Basic.net Integrated Development Environment (IDE) consists of Solution Explorer, Toolbox, Form, Properties Window, and Menu Bar .
In Visual Studio windows related to a project are combined together and placed at certain locations on the screen. This type of IDE is known as Multiple Document Interface or MDI. Menu System / Toolbars Menu bar consist of the commands that are used for constructing a software code. These commands are listed as menus and sub menus Menu bar also includes a simple Toolbar that lists the commonly used commands as buttons. This Toolbar can be customized, so that the buttons can be added as required. The new Project dialog box Creating a new Visual Basic project is a simple task. You can either click File-ÿNew->Project or File or Website command or the New Project link from the Start Page. In both cases, Visual Studio shows the New Project window. New Project windows In Visual Studio, you can choose what version of the .NET Framework your application targets, This can be useful if you plan to develop applications with a high compatibility level and without new language features. After that enter name for the new project and dick OK to create the project. Graphical designers VB.Net programmers have made extensive use of forms to build user interfaces. Each time you create a Windows application, Visual Studio will display a default blank form, onto which you can drag and drop controls from the Visual Studio Toolbox window. Code designers The code editor in Visual Studio is now based on Windows Presentation Foundation. This innovation introduces new features to the Visual Basic code editor. We can focus on the zoom functionality in the code editor, the gradient selection, and IntelliSense. IntelliSense IntelliSense is one of the most important feature in the coding experience with Visual Studio. IntelliSense is represented by a pop-up window that appears in the code editor each time you begin typing a keyword or an identifier and shows options for auto completing words. The Object Explorer/Browser The Object Browser is a special tool window that enables you to browse the .NET Framework class library You can get a hierarchical view of the Base Class Library and of all the types defined in your solution, including types defined in referenced external assemblies. The Toolbox Toolbox in Visual Basic.net consist of Controls, Containers, Menu Options, Crystal Report Controls, Data Controls, Dialogs, Components, Printing controls that are used in a form to design the interfaces of an application. The Solution Explorer Solution Explorer is a special tool window that enables managing solutions, projects, and files in the projects or solution. It provides a complete view of what files compose your projects and enables adding or removing files and organizing files into subfolders. Properties Window The Properties window allows user to view and modify the properties of the form and of the controls that it contains. You often need to set properties for your code, for .NET objects you use in your code, and for your files. To make things easier, Visual Studio provides a tool window named Properties window, which is a graphical tool for setting items’ properties The Dynamic help window Visual Studio ships with the MSDN Library, which is the place where you can find documentation for Visual Basic version and the .NET Framework versions. There are basically two ways to access the MSDN Library: offline and online. You can also quickly find information on particular objects using built-in tools, such as the Object Browser. The Server explorer Server Explorer is the server management console for Visual Studio. Use this window to open data connections and to log on to servers and explore their databases and system services. To access Server Explorer, choose Server Explorer on the View menu. The Command window The .NET Framework allow you to access tools from the command prompt, so if you wish to use these utilities from any window command window, you will need to register these paths with the operating system.
SARASWATI PUJA
सम्पूर्ण राजकीय सम्मान के साथ स्वर कोकिला लता मंगेशकर का हुआ अंतिम संस्कार, पीएम मोदी ने किए अंतिम दर्शन , देशवासियों ने दी भावभीनी श्रद्घांजली

February 6 2022 , Team NEWS2020
भारत रत्न स्वर कोकिला लता मंगेशकर को पूरे राजकीय सम्मान के साथ पंचतत्व में विलीन कर दिया गया। मुंबई के शिवाजी पार्क में पंडितों ने मंत्र उच्चारण किया और उसके बीच लता के भाई हृदयनाथ मंगेशकर ने मुखग्नि दी। शाम सवा सात बजे लता मंगेशकर को पंचतत्व में विलीन कर दिया गया। उन्हें पूरे राजकीय सम्मान के साथ विदाई दी गई। अंतिम संस्कार से पहले लता मंगेशकर के पार्थिव शरीर को उनके घर ‘प्रभु कुंज’ लाया गया था, जहां अंतिम दर्शन करने वालों का हुजूम उमड़ पड़ा। लता मंगेशकर के घर के बाहर देशभक्ति वाला माहौल हो गया था। कोई ‘वंदे मातरम’ का नारा लगा रहा था तो कोई ‘ए मेरे वतन के लोगों’ गा रहा था।
उमर 92 साल हो चुकी थी। कोरोना और निमोनिया से 29 दिन लड़ीं भी, लेकिन आखिरकार रविवार सुबह 8 बजकर 12 मिनट पर दुनिया को ना कह गईं। इसके ठीक 11 घंटे बाद शाम 7 बजकर 16 मिनट पर लता ताई पंचतत्व में विलीन हो गईं। उन्हें भाई हृदयनाथ मंगेशकर और भतीजे आदित्य ने मुखाग्नि दी। इस दौरान लता ताई की बहनें उषा, आशा और मीना भी मौजूद थीं।
नरेंद्र भाई ने लता दीदी को प्रणाम किया
प्रधानमंत्री नरेंद्र भी लता जी को श्रद्धांजलि देने मुंबई पहुंचे। उन्होंने लता जी के पार्थिव शरीर पर पुष्प चक्र अर्पित कर श्रद्धांजलि दी। इसके बाद तीनों सेनाओं ने स्वर कोकिला को अंतिम विदाई दी। फिर उनके परिवार के रीति-रिवाज के मुताबिक धार्मिक कर्मकांड पूरे किए गए।
महाराष्ट्र के राज्यपाल भगत सिंह कोश्यारी, मुख्यमंत्री उद्धव ठाकरे, NCP चीफ शरद पवार, पूर्व मुख्यमंत्री देवेंद्र फडणवीस, राज ठाकरे, आदित्य ठाकरे, सुप्रिया सुले, पीयूष गोयल, अजित पवार समेत कई राजनेता लता जी के अंतिम दर्शन करने पहुंचे। इनके अलावा सचिन तेंदुलकर, शाहरुख खान, जावेद अख्तर, रणबीर कपूर और श्रद्धा समेत कई कलाकार और फिल्म इंडस्ट्री से जुड़ी हस्तियां उन्हें अंतिम विदाई देने पहुंचीं।
अंतिम यात्रा में शामिल हुए हजारों लोग
इससे पहले, सेना के जवान लता जी के पार्थिव शरीर को तिरंगे में लपेटकर घर से बाहर लाए। इसके बाद आर्मी, नेवी, एयरफोर्स और महाराष्ट्र पुलिस के जवानों ने उनकी अर्थी को कंधा दिया। उनका पार्थिव शरीर फूलों से सजे सेना के ट्रक में रखकर शिवाजी पार्क ले जाया गया। मुंबई के हजारों लोग लता ताई को अंतिम विदाई देने सड़कों पर उतर आए। लता जी की पार्थिव देह दोपहर 1.10 बजे ब्रीच कैंडी अस्पताल से उनके घर पहुंची थी।

लता जी का शरीर पूरा हो गया। कल सरस्वती पूजा थी, आज माँ विदा हो रही हैं। लगता है जैसे माँ सरस्वती इस बार अपनी सबसे प्रिय पुत्री को ले जाने ही स्वयं आयी थीं।
मृत्यु सदैव शोक का विषय नहीं होती। मृत्यु जीवन की पूर्णता है। लता जी का जीवन जितना सुन्दर रहा है, उनकी मृत्यु भी उतनी ही सुन्दर हुई है।
93 वर्ष का इतना सुन्दर और धार्मिक जीवन विरलों को ही प्राप्त होता है। लगभग पाँच पीढ़ियों ने उन्हें मंत्रमुग्ध हो कर सुना है, और हृदय से सम्मान दिया है।
उनके पिता ने जब अपने अंतिम समय में घर की बागडोर उनके हाथों में थमाई थी, तब उस तेरह वर्ष की नन्ही जान के कंधे पर छोटे छोटे चार बहन-भाइयों के पालन की जिम्मेवारी थी। लता जी ने अपना समस्त जीवन उन चारों को ही समर्पित कर दिया। और आज जब वे गयी हैं तो उनका परिवार भारत के सबसे सम्मानित प्रतिष्ठित परिवारों में से एक है। किसी भी व्यक्ति का जीवन इससे अधिक सफल क्या होगा?
भारत पिछले अस्सी वर्षों से लता जी के गीतों के साथ जी रहा है। हर्ष में, विषाद में,ईश्वर भक्ति में, राष्ट्र भक्ति में, प्रेम में, परिहास में… हर भाव में लता जी का स्वर हमारा स्वर बना है।
लता जी गाना गाते समय चप्पल नहीं पहनती थीं। गाना उनके लिए ईश्वर की पूजा करने जैसा ही था। कोई उनके घर जाता तो उसे अपने माता-पिता की तस्वीर और घर में बना अपने आराध्य का मन्दिर दिखातीं थीं। बस इन्ही तीन चीजों को विश्व को दिखाने लायक समझा था उन्होंने। सोच कर देखिये, कैसा दार्शनिक भाव है यह… इन तीन के अतिरिक्त सचमुच और कुछ महत्वपूर्ण नहीं होता संसार में। सब आते-जाते रहने वाली चीजें हैं।
कितना अद्भुत संयोग है कि अपने लगभग सत्तर वर्ष के गायन कैरियर में लगभग 36भाषाओं में हर रस/भाव के 50 हजार से भीअधिक गीत गाने वाली लता जी ने अपना पहले और अंतिम हिन्दी फिल्मी गीत के रूप में भगवान भजन ही गाया है। ‘ज्योति कलश छलके’ से ‘दाता सुन ले’ तक कि यात्रा का सौंदर्य यही है कि लताजी न कभी अपने कर्तव्य से डिगीं न अपने धर्म से! इस महान यात्रा के पूर्ण होने पर हमारा रोम रोम आपको प्रणाम करता है लता जी।🙏🌹





विद्यालय में पुनः पढ़ाई शूरू
झारखण्ड के 17 जिलो में पहली क्लास से विद्यालय खुलेगे .सरायकेला, रांची में 9वीं से 12वीं तक की कक्षा खुलेंगी Team News 2020


लॉकडाउन से राहत, स्कूल खुलने के साथ -साथ इन चीजों में मिली छुट
झारखंड राज्य में कोरोना की स्थिति के मद्देनज़र आपदा प्रबंधन की बैठक प्रोजेक्ट भवन में राज्य के मुख्यमंत्री हेमंत सोरेन की अध्यक्षता में पूरी हुई. बैठक में राज्य के स्वास्थ्य मंत्री बन्ना गुप्ता भी मौजूद थे. इस बैठक में कई मुद्दों पर चर्चा की गयी और राज्य में कोरोना की स्थिति को ध्यान में रखते हुए पाबंदियों से जनता को राहत दी गई है. कोरोना के तीसरे लहर ओमिक्रोन वैरिएंट के प्रकोप की वजह से स्कूल-कॉलेज बंद कर दी गयी थी साथ ही रात 8 बजे तक ही दुकान खोलने का आदेश दिया गया था. इसके साथ ही सरकारी और निजी दफतरों में 50 प्रतिशत संख्याबल के साथ ही ऑफिस खोलने का आदेश जारी हुआ था. राज्य सरकार के द्वारा जारी वर्तमान पाबंदियां 31 जनवरी तक के लिए ही लागु थी. लेकिन कोरोना के मामलों में कमी और संक्रमण के खतरे को कम होता देख आपदा प्रबंधन प्राधिकार की बैठक कर कई तरह की पाबंदियों से राहत दी गयी है.
इन चीजों पर मिली छुट
सभी कॉलेजों को खोलने का आदेश दिया गया है
17 जिलों में कक्षा 1 से कक्षा 12वीं तक खुलेंगी, 7 जिलों में 9वीं से 12वीं तक की कक्षा खुलेंगी
रांची में कक्षा 9वीं से 12वीं तक ही ऑफलाइन माध्यम से खुलेंगे स्कूल
रांची, धनबाद, बोकारो, सिमडेगा, चतरा, देवघर, सरायकेला , जमशेदपुर में कक्षा 9वीं से 12वीं तक ही खुलेंगे स्कूल
ऑनलाइन और ऑफलाइन एग्जाम की अनुमति
शादी-विवाह में 100 के जगह 200 लोग हो सकेंगे सम्मिलित
खेल की सभी एक्टिविटी होगी शुरू, बिना दर्शक के हो सकेंगे मैच
सभी कोचिंग सेंटर खुलेंगे
रात 8 बजे के बाद बंद होगी सभी दुकानें
आंगनबाड़ी केंद्र खुलेंगे
जिम खोला जाएगा
जु, पार्क, क्लब, सिनेमा हॉल भी खुलेंगे
सरकारी कार्यालयों में 100 % उपस्थित रहेगी||

SPIRITUAL INDIA द्वारा कोविड – 19 टीकाकरण शिविर सम्पन्न

Team News 2020 , आदित्यपुर , भारत सरकार द्वारा चलाए जा रहे कोरोना वैक्शीनेशन अभियान के तहत् कोविड-19 टीकाकरण कैम्प का सफलता पूर्वक संचालन गायत्री शिक्षा निकेतन कैंपस में विद्यालय प्रबंधन और स्प्रिचुअल इंडिया के सौजन्य से निष्पादित किया गया .






इस शिविर में प्रत्येक रविवार के दिन कैंप लगाकर विद्यालय के सभी बच्चों का लगभग टीकाकरण संपादित कर लिया गया है. विद्यालय संचालन के अहम फैसले में कक्षा 9 से 12वीं तक के सभी बच्चों को टीकाकरण के लिए आदेश सरकार द्वारा जारी किया गया था , ताकि बच्चों को ऑफलाइन विद्यालय संचालन करने में कठिनाई नहीं हो . इसलिए सभी बच्चों को अनिवार्य रूप से टीका लगवाने के लिए कहा गया था . ज्ञातव्य हो कि अगले रविवार से विद्यालय प्रबंधन एवं समाजसेवी स्प्रिचुअल इंडिया के सौजन्य से दूसरी वैक्सीनेशन और बूस्टर डोज दिया जाएगा . सभी बंधुओं से अपील है किस समाज को स्वस्थ रखने के लिए टीकाकरण अवश्य करवाएं . स्वस्थ रहें और सुरक्षित रहें . धन्यवाद !
Computer Programming in QBASIC
The full form of QBASIC is Quick Beginners All-purpose Symbolic Instruction Code. QBASIC is the most popular high-level programming language. Various versions of BASIC have been developed by Microsoft Company. This language is quite simple to understand and has been adopted by most of the microcomputers. It is suitable for both mathematical and business problems. It is compatible with MS-DOS environment and it has two basic files QBASIC.EXE and QBASIC.HLP. We can edit, debug and execute the program using these two files.
Advantages of QBASIC
- QBASIC is easy to learn and fun to practice program. It may be called a “People’s language”.
- It is available almost for every computer from micro-computer to mainframe. Therefore, a program developed in a micro-computer can run on a bigger system with minor modifications.
- It is suitable for mathematical and business application.
- Program development cycle is quick, debugging is simple, and
- Modification of the program is quite easy.

Starting QBASIC(from DOS)
- Turn on the computer.
- Click on start button and get DOS prompt.
- Change the directory to QBASIC.
C:\> CD QBASIC [Press Enter Key]
C:\> QBASIC > QB [Press Enter Key]
Now you will see the screen:
Elements of QBASIC programming

To construct the QBASIC program, we have to arrange some standard elements.The elements used in Qbasic are as follows:
- Character set
- Variables
- Constants
- Operator and Operands
- Expression
- Statements
Character Set
QBASIC has the character set consisting of the following elements:
- Alphabets: A, B, C,….Z
- Digits: 0, 1, 2……..,9 and
- Special characters: + – * / ( ) . , $ ; ,: ,= ,> ,< , ^
The symbol ^ (caret) is used to denote exponentiation operator, the symbol * (asterisk) is used to denote multiplication and other symbols; have their usual meanings.
Constants
A quantity in a computer program which does not change its value during the execution of the program is called a constant. QBASIC allows the following constants:
- Numeric constantThe numeric constant is one that is formed by a sequence of digits 0, 1, 2,…..9 and may include a decimal point. A numeric constant may be an integer or a real number. 383, +57, 0, -6.2 and 6.15E4 are valid numeric constants. The number 6.15E4, in fact, represent 6.15 * 104. The notation E is used to represent the exponential form. The number after E is the exponent which can be positive or negative. However, its length cannot exceed two digits.It is also important to keep in mind that:
- QBASIC does not distinguish between an integer and fraction.
- Commands are not allowed in a numeric constant.
- The limit on the number of digits that can be used varies from computer to computer. Normally, a numeric constant can have up to a maximum of eight digits.
- String constantA string constant consists of a sequence of characters which must be enclosed by a quotation mark.
Variables
The quantity which may change its values during the execution of the program is called the variable.
In QBASIC, variables are also of two types:
- Numeric variable: Numeric variable can assume numeric value and is represented by an alphabet or an alphabet followed by another alphabet or digit. For example A, C, A2, ABC, A6 etc, represent numeric variables.
- String variable: A string variable is represented by an alphabet followed by dollar ($) sign. It should be kept in mind that while constructing the string variable, dollar ($) should be the last character. For example, B1$, NAME$, BOOK1$, etc are valid string variables.
Expression
An expression can be a string, or numeric constant, a variable or a combination of constants, variables with operators which returns a single value.
Operands
Operands are the data or variables on which mathematical, logical and string operations take place.
Operators
Operators are the symbols, which are used in arithmetic operations, logical expressions, and string expressions.
Statements
A statement is a set of instructions written using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax.
Statements in QBASIC

A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The keywords have specific meaning in the QBASIC programming. The statements are the first stored in the memory and executed only when the RUN command is given.
Different statements used in QBASIC are as follows:
CLS Statement
The CLS statement clears the screen. If you write CLS statement in the middle of the program then you cannot see the outputs generated before execution of CLS because it clears the screen.
Syntax: CLS
LET Statement
LET is an assignment statement. It is used to assign the value to a variable. LET is an optional statement i.e. without using LET statement one can assign the value to a variable. The data type must match with the variable type otherwise type mismatch error will occur.
Syntax:|LET| variable = value or expression
Example:
CLS
INPUT ” First Number”; A
INPUT “Second Number”; B
let Sum = A+B
PRINT ” The Sum is”; S
END
REM Statement
It is a basic declaration statement that allows explanatory remarks to be inserted in a program. The remarks may be useful in a program to explain about different kinds of statements and user defined words. Adding comments in the program allows us to remind about the program and also helps other programmers to understand the logic of the program.
Syntax: REM < Remarks>
Example:
CLS
PRINT “Some text.”
REM This text is ignored.
REM This program clears the output screen.
REM and then PRINT ” Some text.”
PRINT Statement
PRINT statement provides output on the screen. It prints the values of the expression on the screen. If the expression list is blank, no characters are printed. The expressions in the list may be numeric or string. In case of number, the negative number is preceded by a minus sign (-) but in positive number it is preceded by a space.
We can use semicolon and comma with a print statement which results differently than a normal PRINT statement. If expression list ends with comma or semicolon, the next PRINT statement prints on the same line. Comma provides a TAB space, but semicolon provides only one space.
Syntax: PRINT [“Message”]; expression
Example:
CLS
PRINT “Computer is an electronic machine.”
PRINT
PRINT “IT’s amazing.”
PRINT 1000
PRINT ” The number is: “; 20
END
Output
Computer is electronic machine
IT’s amazing
1000
The number is: 20
Fundamental Knowledge of Computer Programming

Computers are the machines that can perform tasks or calculations according to the set of instructions or programs. Computers are very fast due to which thousands of tasks can be performed within a short period of time. Hence, computers are the machine, they have no brain so they work according to the set of instructions set inside it.
We know that a computer is an electronic device works on ON and OFF (1 AND 0), the technique to read and write data. We use several languages to communicate with others, just like it, we use several computers languages to communicate with other computers e.g. BASIC, COBOL, PASCAL, FORTRAN etc. The computer understands only computer language written in binary. Other languages have to be converted to machine level for a computer to understand. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. Different types of programming languages are as follows:
- Machine level language
- Assembly level language
- High-level language
Machine Code (Machine Languages)

Computer dependent language written in binary is called Machine code or Machine language. Machine code requires a high-level programming skill along with sound knowledge of computer architecture and functions. Instructions written in binary are immediately executable without the help of any language translators because computer understands the machine codes.
Advantages
- It is written in machine code so no need to translate it into machine language.
- It has faster execution than other languages.
- Other translator type subsidiary programs are not required.
Disadvantages
- It is difficult to understand and develop a program using machine language.
- It is machine-oriented language.
- The knowledge of computer internal architectures is essential for program coding.
- Time-consuming.
- Debugging is tough and difficult.
Assembly Language

It is a low-level language in which some high-level words are used with machine codes. These words are called mnemonics. Some mnemonics are given below:
- ADD for Addition
- SUB for Subtraction
Assembly language requires ASSEMBLER to translate assembly language code into computer understandable code (Machine code). So, it is not immediately executable. It is difficult to develop the program using this immediately executable. It is difficult to develop the program using this language.
Advantages
- Coding is faster than machine code language because mnemonics are used for program coding.
- Less time consumed with respect to Machine code languages.
- Debugging is easy.
Disadvantages
- Machine oriented language
- The good knowledge of machine architectures is required.
- Time consuming
- The translator is used to translate the program into machine code.
- Not as fast as machine code language in case of execution.
High-level language
High-level language contains a set of instructions written in simple English. It is a set of symbols, words and rules to instruct machine. The language is oriented towards the problem and procedures. A program written in a high-level language is called source program. A language translator is used to translate into object code (Machine code).
Advantages
- Simple English is used for program coding.
- Machine independent
- Problem and procedure oriented
- The knowledge of computer architectures is not necessary.
- It requires less time for program coding.
- Program can be debugged easily
Disadvantages
- Since it is written in user’s language so it should be converted into machine code.So it requires a translator.
- The execution of the program is slower than machine code.
- The conversion time is slower than assembly language because it is entirely written in human language.
Computer Virus

Computer virus is a type of destructive program that can replace itself by making copies of itself without the knowledge of the user.Computer virus is a term given to man-made computer software or system to destroy computer programs or computer. The virus destroys data, useful application, programs, and even the operating system. Computer virus hides themselves in other host files. They are not visible to us. The viruses can corrupt, delete files and programs.
Computer Viruses affect the computer in many ways. It can destroy data, files or programs and cause the system malfunction. The destructive effects of viruses are different according to their types.
Characteristics of Computer Virus
Some important characteristics of virus are:
- The virus can easily transfer from one file or computer to another.
- The virus can multiply itself.
- The virus can hide from users.
Types of Virus

The different types of viruses on the basis of their infected area are:
- Macro virus
- Boot sector virus
- File infect virus
- Self-modified virus
- Multi-party virus
- Script virus
Macro Virus
Macro virus resides inside files. Macro virus is commands which are designed to infect a specific type of document file such as MS-Word or MS-excel support. At present, Microsoft company have designed macro virus protection tools. The examples of such viruses are Melissa, I love you etc.
Boot Sector Virus
The boot sector virus infects the information system during the start-up process. It tends to create the bad sector of the hard drive or floppy disk. The virus infects the system by using infected diskettes during start up. The entire computer system becomes slow by reading the virus from the disk boot sector. The examples of such viruses are C- Brain, Stone, Disk Killer etc.
File Infector Virus
File infector virus infect application programs. They may attach themselves to any executable file, usually.COM, EXE files. An application program infector takes control after the initial use of the infected program. The example of such viruses is Jerusalem, cascade etc.
Polymorphic Virus
A polymorphic virus is self- encrypted virus which avoid detection of the scanner. Such viruses actively hide themselves from antiviral software by either masking the size of the file they hide in or temporarily removing itself from the infected file and placing a copy of itself in another location. The examples of such viruses are Phoenix, Evil etc.
Multiparty Virus
Multiparty virus is the combination of boot sector virus and program virus. It can infect both application programs and the boot sector of a disk. When the infected program is executed, these viruses infect the boot record. When you boot the computer the next time, the virus starts infecting other program files on the disk. The example of such viruses is Tequila, Flip etc.
Script Virus
The virus which is developed by using script language is known as script virus. This virus uses script language to transfer from one computer to another. This virus is created by using script language like VBscript, Javascript. The examples of such viruses are Readlof.A, Sujim .com.np.
Some of the effects of virus are as follows:
- The speed of computer is reduced.
- The instruction of program is reduced.
- Data may be lost in the database.
- Virus may transfer from one file to another.
- It corrupts the system data.
Protection from virus
Computer viruses are very harmful to computer system. They can destroy data and information. So, computer should be protected from viruses.
The computer system can be protected from the viruses by the following ways:
- Install anti-virus software from a well known, reputed company and use it regularly.
- Do backup your entire system on a regular basis. Because some viruses may erase or corrupt files on your hard disk.
- Do not use any pirated software.
- Lock the computer system using password to prevent your computer from being used by others.
- Do not download any programs from the internet unless you are confirmed that they are virus free.
- Be careful while checking mail having attached documents.