Wednesday 14 November 2012

HOW TO REGISTER JAMB UTME 2013/14 YOURSELF

Online registration for JAMB UTME is very simple, although a few complexities are involved. However, if you have some basic computer skills you will be able to register yourself with little difficulty. If you already know how to browse the internet using tools like Yahoo mail, Gmail, or Facebook, then registering for JAMB UTME will probably be a piece of cake for you. However, if you are not computer literate it may be quite challenging. But that does not mean you should give it out to a consultant to do for you. The fact is that you can register for JAMB UTME yourself.
However, the need for fingerprint scanner may create some difficulty. You have to probably look for a cyber cafe with fingerprint scanners. You can use such a cafe to signup for your UTME account. You can then logout and continue the registration yourself another time or you can complete it at the internet cafe. Note that the JAMB UTME registration portal requires that the Java Runtime Environment be installed on your computer.
Registering yourself for UTME 2012 online may be a great opportunity to become computer literate, so don’t miss it. If you must give out your Jamb UTME registration to another person, use a friend that is computer literate and learn from him/her.
Registering yourself for JAMB UTME may also be challenging because of slow internet connections at cyber cafes as well as the capacity of the JAMB UTME registration portal. We hope JAMB have taken care of the high level of load expected during this period. Some cyber cafes may block access to JAMB UTME e-registration portal from their cafe so that you pay them for your UTME registration. In such a situation, you are advised to look for a cyber cafe that does not offer JAMB UTME services. However, if it is impossible to register for Jamb UTME yourself, then you can give it out to a consultant or to the cyber cafe, but don’t just give out your Jamb UTME registration to a consultant without first trying to register yourself.
If you outsource your JAMB UTME registration to a consultant or cyber cafe, make sure you monitor him/her to ensure that your data is properly entered. Most people with registration problems in JAMB UTME are usually those who give it out to consultants without proper monitoring. If you find the JAMB UTME portal too slow try on Sundays or at Night when traffic is minimal.
If you have your own internet connection, you can always access the JAMB UTME portal at anytime.

Note about the fingerprint scanner:
JAMB UTME 2012 registration requires fingerprint scan. Fingerprint derived from the registration process may be used for gaining access to examination hall on examination date. If this the case, prospective candidates for JAMB UTME 2012, should take it very serious. Make sure your left and right thumb fingerprint are carefully scanned to avoid surprises and disappointments on UTME 2012 examination date. Make sure the biometric scanner and your hands are clean when taking the scan.

JAMB Begins UTME 2013/2014 Registration

Registration for the Unified Tertiary Matriculation Examination, UTME 2013/2014 admission into tertiary institutions in Nigeria has started.
JAMB UTME scratch card for accessing the e-registration portal for JAMB UTME 2013 is now available at designated banks, NIPOST offices and JAMB offices nationwide. The date for JAMB UTME exam 2013 has not been fixed yet by the board.
JAMB/UTME e-registration portal is at www.jamb.org.ng/Unifiedtme2013/. To access the JAMB/UTME portal for e-registration, you need a scratch card which is being sold for N4,000 at designated banks, Post offices and JAMB offices nationwide.
The JAMB UTME Scratch card contains a serial number and your PIN, two vital information you require for your UTME e-registration. UTME 2013 registration will also require a finger print scanner like in 2012. However, registration can only be done at accredited centres. Returning JAMB UTME 2012 candidates may not require fingerprint scanner, since their fingerprint is already in JAMB’s database, but they may need to provide their JAMB 2012 registration numbers.
JAMB has maintained the same process used in 2011 and 2012 UTME registration for 2013. JAMB/UTME 2013 registration, like in 2012, will require a biometric fingerprint scanner. The biometric scanner (finger print reader) will be used to capture the left and right thumbs of the candidates. Candidates are advised to make sure an approved fingerprint reader is available on the computer they intend using for their JAMB UTME 2013 registration as their finger print (left and right thumb) will be read before they can sign-up for a UTME account, which is the first step in the registration process.
Also like in 2012, JAMB UTME 2012 registration must be done on a computer with the Java Runtime Environment (JRE) installed. This is because the application that runs the Jamb UTME registration portal is based on Java programming language. Minimum of JRE 1.6 is required. Java JRE can be downloaded free on the internet, if it is not already on your system (about 10MB). Make sure to read the instructions at the registration website before commencing your registration. The JAMB UTME 2013 Brochure is built-into the portal making it easy to search for details of your Jamb UTME courses of choice.

Thursday 16 August 2012

Bill Gates Seeks to Reinvent the Toilet

Though Bill Gates stepped down as head of Microsoft in 2008 to focus on philanthropy, he hasn’t left the realm of world-changing innovation.
Gates hosted the Reinvent the Toilet Fair in Seattle, Wash. Tuesday and Wednesday, showcasing the designs and working prototypes of eight design finalists from around the world, who followed though on his August 2011 challenge to reinvent the toilet. The former Microsoft chief invited innovators to create a product that could function without water pipes, a sewer connection or outside electricity, while costing less than 5 cents per day to honor. The eight universities that presented at the fair received a cumulative $400,000 to develop their prototypes.
The winning toilet came from California Institute of Technology, receiving $100,000 for its model of a solar-powered toilet that generates hydrogen and electricity. The second place toilet, hailing from the UK”s Loughborough University receives $60,000 for its toilet that produces biological charcoal, minerals and clean water. The third prize winner, from the University of Toronto, receives $40,000 for its toilet that sanitizes human waste.

According to the Gates Foundation, the need for a new toilet model is obvious: 2.6 billion people in the world lack access to safe and affordable sanitation.
Other prototypes presented at the fair include a toilet powered by the sun that generates cooking gas and a toilet that turns waste into electricity.
Take a look at some Reinvent the Toilet Challenge finalists and let us know which you think should be mass produced. Can a reinvented toilet be a game changer for the developing world? Is Gates properly directing his energies and funds? Let us know what you think in the comments.

Saturday 11 August 2012

WAEC releases May/June 2012 results


The West African Examinations Council on Friday released the results of the May/June 2012 West African Senior School Certificate Examination.

The candidates for this year’s examination performed better than their counterparts in the last three years.
A total of 649,156 candidates representing 38.81 per cent of the total candidates that sat for the examination this year obtained credits in five subjects and above, including English Language and Mathematics.
This represents an 8.9 per cent increase above last year’s performance, where 471,474 candidates representing 30.91 per cent had five credits and above in five subjects, including English and Mathematics.
In 2010, 317,142 candidates representing 23.71 per cent of the candidates that sat for the examination obtained five credits including English and Mathematics.
Addressing journalists in Lagos on Friday, the Head of the Nigeria National Office of WAEC, Dr. Iyi Nwadiae, said a total of 1,695,878 candidates registered for this year’s examination out of which 1,672,224 sat for the examination.
He said out of the total number of candidates, 1,545,004, representing 91.10 per cent, had their results fully released, while 150,874 candidates, representing 8.90 per cent had a few of their subjects still being processed because of some errors mainly traceable to the candidates and schools either in the course of registration or writing the examination.
Nwadiae said of the total number of candidates that sat for the examination, 771,731 candidates (46.14 per cent), obtained six credits and above and 952,156 candidates representing 56.93 per cent obtained five credits and above.
Apart from improved results this year, the WAEC boss stated that cases of examination malpractices declined compared with previous years.
He said the positive trend was an indication that investment in the education sector was beginning to yield dividends, adding that cases of malpractice would naturally reduce when candidates were adequately prepared for examinations.
He, however, said the results of 112,000 candidates, representing 6.70 per cent were being withheld in connection with various cases of examination malpractice.
He explained that the cases were being investigated, adding that the reports of the investigations would be presented to the Nigerian Examinations Committee of the council in due course for consideration.
He said the committee’s decision would be communicated to the affected candidates through their schools.
He said 114 blind candidates registered for the examination. Out of this number, 95 candidates sat for the examination.
He said candidates could check their results on the council’s website: www.waecdirect.org from Monday 12th August, 2012.
Megatek Computers is giving reliable information that candidates are not supposed to buy scratch cards to access their results as the scratch cards had already been supplied the various schools through which the candidates purchased their forms.
“The cost of scratch card is already included in the total cost of the form. Candidates are not expected to pay for scratch cards separately.

Tuesday 31 July 2012

How to Protect Your Smartphone From Viruses

All smartphone owners should be aware of and concerned about viruses that affect smartphones, but most aren't. Only 4 percent of mobile phones use virus protection software, according to Juniper Network Global Threat Center's Malicious Mobile Threats Report 2010/2011. Personal and identity information such as financial passwords and contact lists -- once stored on protected personal computers -- now appear on unprotected smartphones. Phones infected with malware, Trojan horses and other viruses leave your phone unusable, send the virus to your contacts or worse: Perpetrators steal usernames and passwords that can lead to identity theft. Protecting your phone is a twofold process; avoid potential viruses and download legitimate virus protection on your phone. 

Below are some tips on how to protect your smartphones:

  • 1.:  Open attachments on your phone with the same caution as you do on your computer. This includes attachments in emails and in MMS messages. Don't open attachments from people you don't know. Also, don't open attachments from a contact if the message looks suspicious. Your contact's phone or computer may be infected with a virus that is emailing or messaging itself to everyone on his contact list, including you.
  • 2:  Watch for suspicious links sent through email or text messages. Never click on questionable links. Like attachments, these may be sent by people you don't know who are posing as individuals on your contact list. If you are suspicious about a link sent to you by a contact, email or text message the sender to ask if he sent the message. He may not know his phone or computer is infected by a virus that is sending messages to his contacts.
  • 3:  Download apps only from legitimate app stores, and read the reviews before buying to make sure there is no buzz about a virus attached with the app. The Malicious Mobile Threats Report finds that as the demand for apps increases, so does the proliferation of viruses, particularly spyware. Viruses can transfer through any type of application, including gaming apps, fake anti-virus apps, fake financial-tracking apps and social networking apps.
  • 4 :  Practice safe memory card use. Never share your memory card with another cell phone. An infected memory card can spread a virus to each phone it contacts.
  • 5:  Set the Bluetooth option on your phone to the undiscoverable setting. Some viruses penetrate phones through a Bluetooth connection. This attack is especially tricky; you need only walk by an infected Bluetooth device while your phone is discoverable, and the virus can transfer to your phone. The first documented Bluetooth virus, the Cabir virus, which arrived in 2004, didn't harm your phone or steal valuable information, but it ran the phone battery down quickly by constantly trying to discover nearby Bluetooth connections through which to spread. Current Bluetooth viruses are more malicious; they steal contact information and disable phones.

Third-Party Apps

  • 6:  Protect your iPhone from malware and other virus infections with anti-virus apps. Choose from a handful of well-known and trusted anti-virus software providers, as some viruses present themselves as inexpensive or free virus software from unknown companies. SmrtGuard Solutions' Snap Secure app and the Lookout Mobile Security app from Lookout Inc. both protect your iPhone from viruses while backing up your important data and allowing you to track or wipe your iPhone if it's lost or stolen. McAfee Enterprise Mobility Management from Trust Digital is designed for business environments with multiple mobile devices, including iPhones. Snap Secure, Lookout Mobile Security and EMM are all free downloads at the iPhone App Store. Intego created the Virus Barrier iOS software specifically for the iPhone and iPad to scan for and block any viruses from transferring to your computer when you connect the mobile device to it. Virus Barrier can be downloaded from the App Store for a small fee.
  • 7:  If you own an Android-powered phone, download anti-virus from reliable suppliers to protect your personal information. The Kaspersky Mobile Security app offers find-and-wipe services as well as virus and spam protection. In addition to standard virus scans, Norton Mobile Security can lock your phone to protect personal data during a virus attack or if the phone is lost or stolen. The Bullguard Mobile Security app protects against viruses, identity theft and online fraud, and it offers parental controls, a basic backup and SIM card protection. All these apps are available for download from the Android Market.
  • 8:   Add anti-virus protection for your BlackBerry with Bullguard Mobile Security, which offers a user-friendly online interface that allows you to manage your virus protection and back up information from your phone or your computer. Also useful is SmrtGuard's Snap Secure app for handy information in addition to virus protection; the app warns how new apps may affect your privacy settings and leave your device vulnerable to virus attack. The app also provides BlackBerry users with Personal Guardian service, with which you create a panic button that sends out a text message or phone call with your location. The NetQin Mobile Security for BlackBerry app provides two levels of protection: one local for your phone and one cloud based. It offers real-time virus scanning and a backup of all your data. Download Snap Secure from the BlackBerry App World. Bullguard Mobile Security and NetQin Mobile Security are available for download at the developers' websites.
  • 9:   Even if your Windows computer is protected with anti-virus software, you still need a separate mobile app for your phone. Find Windows Mobile virus protection with the Kaspersky Mobile Security app, which offers a full range of protection not available in its BlackBerry and Android apps. These additional features include data encryption and parental controls. In addition to virus protection, the Bullguard Mobile Security app offers a spam filter and firewall protection with its Windows Mobile apps, which are not offered with its Android and BlackBerry versions. NetQin's NQ Mobile Security for Windows Phone app offers anti-virus scans and data backups as well as private and safe-browsing capabilities. NQ Mobile Security is available from the Windows Phone Marketplace. Kaspersky Mobile Security and Bullguard Mobile Security can be downloaded from the developers' websites.


Thursday 12 July 2012

Laptop battery

HOW TO MAXIMIZE THE LIFE SPAN OF YOUR LAPTOP BATTERY

It has been discovered by IT experts that one of the problems that laptop users normally have is changing of thier laptop battery.  When you buy a new system and the manufacturer gives you a guaranty of 2 years or more, you will be surprised that while all other components of the laptop works fine even for over 5 or 6 years, the laptop battery has a shorter life span. When there is no external supply of power, the laptop battery is very useful.  Normally, a laptop battery is supposed to power the laptop for up to 2 hours (thou there are some now that can power for up to 6 hours) but it can be annoying when the laptop battery cannot supply power for more than 30 or 10 mins, honestly from experience, it reduces productivity and do not allow mobility of the laptop in areas where there is no external power supply.

If you practice the instructions listed below, you will be amazed that laptop batteries can last longer than it used to.

1. Dim your screen: how of our laptops have this very bright screen and this kills the battery faster, especially when you are not using the brightness , for example when you are watching a movie. so reduce or dim your screen.
2. Running Many Application: When you are not using some application on your background, close it because it consumes RAM and RAM consumes the battery. Reduce the application running.
3. Remove External devices: switch off devices such as Bluetooth, WiFi they drain your battery, and charging of phones and Ipod are one of the good sources of draining your battery. so whenever they are not in such shut them down.
4. CD/DVD Drives:CD and DVD Drives drains the battery most especially when there is a disk in it, when it spins it drains your battery. so copy what you need from a CD before running.
5. Keep the battery contacts clean: Clean your battery’s metal contacts every couple of months with a cloth moistened with rubbing alcohol. This keeps the transfer of power from your battery more efficient.
6. Take care of your battery – Exercise the Battery. Do not leave a charged battery dormant for long periods of time. Once charged, you should at least use the battery at least once every two to three weeks. Also, do not let a Li-On battery completely discharge.
7. Hibernate not standby – Although placing a laptop in standby mode saves some power and you can instantly resume where you left off, it doesn’t save anywhere as much power as the hibernate function does. Hibernating a PC will actually save your PC’s state as it is, and completely shut itself down.
8. Set up and optimize your power options – Go to ‘Power Options’ in your windows control panel and set it up so that power usage is optimized (Select the ‘max battery’ for maximum effect).

Monday 18 June 2012

Facebook Guidelines for Parents

Facebook's policy states users must be 13 years old to create a profile, but Facebook does not verify a user's age when signing up. As a parent, it is important to be aware of what Facebook is and to monitor your child's profile and online time to help keep him safe.

  1. General Rule

    • Setting general guidelines and rules with your child for Internet and Facebook usage will help keep her safe and aware of boundaries. Keep the computer in a public area of your home, such as the living room. If your child has a computer in her room, consider installing software to block certain websites or do not allow the computer to access the Internet. Discuss acceptable uses of Facebook with your child. Explain that posting inappropriate pictures or messages won't be tolerated. Creating your own Facebook profile and insisting that your child add you as a friend if she wants to use Facebook is a good way to keep an eye on what she's doing without having to look over her shoulder every minute she's online.

    Safety

    • Keeping your child safe is likely one of your largest concerns when it comes to Facebook. Explain to your child that he should never post his personal information such as phone numbers, school names and addresses on his profile or in a wall post or reply. Discuss who is acceptable to add as a friend and who is not. Make it clear that you don't want your child to add strangers and encourage him to deny any friend requests from people he doesn't know. If you're particularly concerned about safety, tell your child to input only his last initial instead of his full last name and tell him to use an email address that does not contain his full name for his Facebook log-in name.

    Privacy

    • Go through your child's profile with her and help her set up privacy settings so that people cannot view her posts and pictures unless they are friends. Go to "Privacy Settings" from the "Account" drop-down menu at the top right of the Facebook screen. Choose "Friends Only" to ensure that random people browsing Facebook cannot see your child's information. Clicking on "Edit Settings" next to "Public Search" in the "Applications, Games and Websites" portion of "Privacy Settings" will allow to disable the public search feature. This means people won't be able to search for your child's profile by her name or other information, which gives her more control over who sees her page and who she adds as a friend.

    Other Considerations

    • The computer isn't the only way your child can access Facebook. If your child has a cellphone or other Web-enabled device, he can likely access Facebook even when he's away from his computer. If you don't want your child to have Web access away from home, call your cellphone provider and ask a representative how to block Web access on your child's phone. Consider putting parental controls on other Web-related devices, such as handheld gaming systems and MP3 players with Wi-Fi.