Posts
Showing posts from 2017
Qualities of Confident Person
- Get link
- X
- Other Apps
They don't show off They can say no without any explanation Reacts same for a compliment and criticism Least bothered about what others think Emotionally balanced They are not afraid to take any challenge Thinks about solution rather than the problem Ready to take calculated risks They don't fight for rights, they know how to get them. Usually they are not tensed, because they know how to get the things done. They feel less insecurity They don't compare with others They know there is a solution for every problem They stand straight They are not gossip- mongers. They accept their mistakes and correct it. They don't say. They “speak”. They love to speak in the crowd. Smile when look at to new people They can deal any situation They treat Janitors and rich same way Finally they know life is brief, don't waste time on things which are not worthwhile
Brief History of Magars in Nepal(with 1st Boxer of Nepal Dal Bdr Rana from Arkhale,Gulmi)
- Get link
- X
- Other Apps
Origin Genetically and physically, Magar people are Mongoloid/east Asian. They are believed to have migrated from Tibet like the Gurungs and other prominent ethnic groups, however, there is an interesting mythical story describing Magar's origins and versions of three different language groups are presented. The Magar of the Bara Magaranth (a group of twelve Magar kingdoms east of the Gandaki River) are said to have originated in the land of Seem. Two brothers, See Magar and Chintoo Magar, fought, and one remained in Seem, while the other left, ending up in Kangwachen in southern Sikkim. The Bhutia people lived at the northern end of this region. Over time, the Magars became very powerful and made the northern Bhutia their vassals. Sintoo Sati Sheng ruled in a very despotic manner, and the Bhutia conspired to assassinate him. Sheng's queen took revenge and poisoned 1,000 Bhutia people at a place now called Tong Song Fong, meaning "where a thousand were murdered&
GET FREE PREMIUM ACCOUNT OF LYNDA FOR online TRAINING COURSES OF VARIOUS SECTORS.(IT/Managemnet/Business/Web Develop and many more)
- Get link
- X
- Other Apps
JUST FOLLOW THESE 15 STEPS CAREFULLY. 100% Click on this link for the Vedio Click here 1.https://hide.me/en/proxy (IF you are using IP outside USA if not directly go to step 2) 2. www.lapl.org (Enter web address) 3.Switch the Proxy location: USA 4. Visit Anynomosly and GET A LIBRARY CARD HERE YOU CAN SEE LOS ANGELES PUBLIC LIBRARY. 5. Click on e-Card Registration - English NOW YOU HAVE TO FILL UP THIS FORM FOR THIS GO TO STEP 6 6.http://www.fakenamegenerator.com 7.Click on generate until city is los Angeles (ONLY LOS ANGELS) ( ADVANCE OPTION AND SWITCH TO REGION CALIFORNIA AND I HAVE GOT LOSS ANGELES) 8.Copy and paste all the infotmation in ecard registration (just REMOVE DOT IN LAST NAME) BEFORE STEP9 GO TO STEP 12.AND COPY EMAIL ADDRESS AND PASTE 9.IF street number is incorrect.Just go to google.com and type los angeles residential address (if not GO TO STEP 11.) 10. copy one of the addresses and paste to street in e card registration. (* Co
Virtual Private Network(VPN)
- Get link
- X
- Other Apps
Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. The Internet is used as the backbone for VPNs. It saves cost tremendously from reduction of equipment and maintenance costs. VPN transmits data by means of tunnelling. Before a packet is transmitted, it is encapsulated (wrapped) in a new packet, with a new header. This header provides routing information so that it can traverse a shared or public network, before it reaches its tunnel endpoint. This logical path that the encapsulated packets travel through is called a tunnel. When each packet reaches the tunnel endpoint, it is “decapsulated” and forwarded to its final destination. Both tunnel endpoints need to support the same tunnelling protocol. The most commonly used tunnelling protocols are — IPSec(Tunnel Mode) — PPTP (Point-to-Point Tunnelling Protocol ) — L2TP(Layer 2 Tunnelling Protocol ) — SSL
B.E Electronics& Communication Engineering Books(TU/PU/KU)
- Get link
- X
- Other Apps
For Electronics and Communication Engineer B.E Elex & Com: 1st Semseter (I/I) B.E Elex & Com: 2nd Semseter (I/II) B.E Elex & Com: 3rd Semseter (II/I) B.E Elex & Com: 4th Semseter (II/II) B.E Elex & Com: 5th Semseter (III/I) B.E Elex & Com: 6th Semseter (III/II) B.E Elex & Com: 7th Semseter (IV/I) B.E Elex & Com: 8th Semseter (IV/II)