Mathews Shula Bwalya
Share insights, precautions and basic troubleshooting skills of computers. For the love of Computers.
"The world is full of opportunities. With determination and using your brain, you will find your portion.
Dr. E. Zulu"
Liverpool holds 10 Man U players to a nill all draw.
Silelo tayamba. Manchester is the real red.
Manchester United's supporters tomorrow include Aston Villa, Manchester City, and Arsenal. There are no eternal enemies in football.
Only when there is no misuse of authority can one find political liberty. However, ongoing experience teaches us that any man endowed with authority is susceptible to abusing it and using it to the fullest extent possible. The nature of things requires that one power be a check on another in order to prevent this abuse. When the legislative and executive branches of government are combined in one person or in a single body of judges, there can be no liberty.
Proverbs 3:19
By wisdom, the LORD founded the earth; by understanding, he created the heavens
I have come to terms with the fact that for any person to live a fulfilling life, they must have the skill to make money. A person without a money-making skill will suffer. As a spiritual man and also trying so hard to look at the people I grew up with, I can safely say that spiritual people are knowledgeable, while religious people are ignorant.
Provocative as this statement may be, I can also try to be more assertive by pronouncing that praying in tongues without knowledge is an embarrassment to the kingdom. If the all-knowing God needed both wisdom and understanding to find the earth, it is just right that we acquire these virtues to have any impact on the earth.
Education can be used to acquire knowledge. It could be casual or formal. We acquire skills to help us live and manage our lives through education. We employ these abilities to generate income.
Acts 7:22
Moses was educated in all the wisdom of the Egyptians and was powerful in speech and action.
It makes sense for a Christian of this day to acquire an education if the very spiritual Moses had to complete his schooling before God could send him. You see youngsters of the highest order; most religious people have a misunderstanding of prayer. A weapon for generating riches is not prayer. If prayer was intended to be the tool for creating prosperity, then the wealthiest Christians would be many, particularly Pentecostal Christians. Fortunately, God blesses the labor of our hands (Deuteronomy 28:12).
I support the practice of praying. Indeed, 1 Thessalonians 5:17 exhorts us to pray constantly. Upon praying, which might be interpreted as including God in our deeds, each of us must then act by going to work. According to the Bible, salvation is the sole instance in which faith has been successful without the need for works (Ephesians 2:8–10: For by grace you have been saved through faith). The other aspects of faith depend entirely on labor (James 2:17–20). As a result, faith on its own is dead without works. However, someone will assert, "I have works, and you have faith." I'll demonstrate my faith by my works; you show me yours without them.
One of the things I like best about this post is that we all strive to acquire life skills. When you make plans to acquire your expertise, involve God, and you will succeed. However, you will continue to be impoverished in the presence of prayer if you neglect education for the sake of prayer. If anything, because it is your decision, you will enter paradise even though you are impoverished. I hope you don't follow in the footsteps of Lazarus and the wealthy man. Despite his poverty, Lazarus was able to reach paradise. But you can reach the kingdom and still be wealthy.
Inspired by Rev E Zulu.
Political participation includes actions and nonactions methods through which persons attempt to influence, support, or reject governmental decisions and structures.
amogst the ctions apart from protests can include a convensional method of voting. Voting can enable you to show support for or opposition to a regime or political structure.
My simple analysis to all potential voters out there is "it seems particularly irrational to take the trouble to become an informed voter.
It is never in the citizen's rational self-interest to pay the costs of voting if the only benefits come from determing that the preferred candidate will win. Voting affirms a person's citizenship. Voting allows us to participate in democracy's greatest ritual: elections.
You would love that special candidate to win. A closer expected outcome of an election will be associated with the higher probability that a citizen will vote.
We as Zambians are at the cross roads once again. We ordinally citizens will attract those giants from high offices by our door steps once again. And the power is in our vote.
To have a feel of democracy's greatest ritual, which is elections, take that gamble and queue up to get your voter's card. That is your sword. Without that, !!!!!!!!!! citizen.
We can complain and think like politicians and diapers all need to be changed for the same reason. And to achieve that fit, you need to register as a voter.
Your vote, your power. Roan constituency, I will be coming to cast my vote.
Definition of what's good for the goose is good for the gander - used to say that one person or situation should be treated the same way that another person or situation is treated. I have lived long enough now to tell that what goes around comes around. Before we get excited at the time we are the ones calling the shorts, we need to be aware that every situation is temporal and one or the other day someone will be in charge. As a computer teacher myself, I always pray that my son be taught by a teacher like me. That is why I take keen interest in each and every child in my class.
In the natural law of justice, justice must be seen to be done rather than being professed to be done. I know of one politician who was imprisoned for almost three months without a case. What I always think about is, what if tables turned and the first becomes the last? What is it with a person with power that enables him to be blind to all the future likely consequences?
At my age, I would rather live my life as if there is a God and die to find out there isn't, than live as if there isn't and to die to find out that there is (Albert Camus).
All those people in charge today, try to image that your junior today will be the one to preside on your case tomorrow.
All you teachers out there, try to imagine that your pupil today is the one to sign on your pension tomorrow, worse, be your child’s teacher.
To people in government, ……………. You can finish it for me.
Please subscribe to my youtube channel to learn more about computer studies.
https://www.youtube.com/channel/UCle6Vj2gR0FV73KsPykFJ2Q?view_as=subscriber
Mathews Bwalya High School computer studies Videos as per zambian curriculum.
Why Are You at Risk? PART 2
It has become so common to hear about viruses, worms, identity theft, phishing scams, and other computer attacks that you may actually be wondering “where isn’t there a threat?” Understanding the importance of computer security is easier, though, if you have some idea of the threats you are defending against.
Malware
Malware is a general term used to refer to a wide variety of malicious programs. It includes threats such as viruses, worms, Trojan horses, spyware, and any other malicious programs. Even if you believe you have nothing of value to protect on your computer system, leaving it unprotected can leave you vulnerable to hundreds of different malware programs floating around the Internet which could arrive in your e-mail inbox daily. These programs can accomplish a wide variety of malicious activities, including possibly capturing your passwords and credit card numbers, sending out malware to other computers or to e-mail addresses of people you know, using your computer in a denial-of-service attack against a Web site, and more.
Weak Passwords
Passwords are the primary method most users are familiar with for gaining access to a computer system or program. If you have a weak password and an attacker manages to guess or crack it, he or she can access your private information, steal your identity, install and execute programs using your account, and more. Even worse, some of this can be done without ever knowing your password—by using remote threats.
Physical Security
Physical security is admittedly less of an issue in a home environment. Generally, you aren’t concerned with someone in your home sitting down at your computer and hacking into it.
Nevertheless, your computer could still be stolen or lost. The bottom line when it comes to physical security is that once someone has physical access to your computer, the gloves are off. There are ways that an attacker sitting at your computer and using your keyboard and disk drives can bypass the various security measures you have put in place to gain access to your data.
TO BE CONTINUED.
Why Do You Need to Be Secure? PART 1
Do you want your computer to be absolutely, positively, 100-percent secure against all vulnerabilities and exploits, not only those known now, but those yet to be discovered? It’s simple: leave your computer in the box, because once you turn the computer on, you begin to walk a tightrope between functionality (or convenience) and security. Unfortunately, many of the features that make your computer easier to use also create various security issues as well.
Some people appreciate that their printer is able to communicate with the computer and alert them with messages when the ink is running low or the paper tray is empty. However, leaving the Windows Messenger Service—the service used for such communication between your printer and your computer—enabled may also leave your computer open to being inundated with unsolicited spam pop-up messages.
One of the points of setting up a network in the first place is to share resources such as data and printers. You may want to share out files or folders so they can be accessed from other computers on the network. Unfortunately, many viruses and worms use these same connections to jump from one computer to the next and infect the whole network.
To be continued.
You can find four primary types of bus structures on most motherboards:
(1) Address bus: The components on the motherboard pass memory addresses to one another over the address bus.
(2) Control bus: Used by the CPU to send out signals to coordinate and manage the activities of the motherboard components.
(3) Data bus: Because the primary job of the computer is to process data, logically the data must be transferred between peripherals, memory, and the CPU. Obviously, the data bus can be a very busy hallway.
(4) Power bus: The power bus is the river of life for the motherboard's components, providing each with the electrical power it needs to operate.✔✔✔✔
Click here to claim your Sponsored Listing.
Category
Contact the business
Address
Behind Nyumba Yanga Market
Lusaka
10101
Opening Hours
Monday | 08:30 - 19:00 |
Tuesday | 08:00 - 19:00 |
Wednesday | 08:30 - 19:00 |
Thursday | 08:30 - 19:00 |
Friday | 08:30 - 19:00 |
Saturday | 08:30 - 19:00 |
10173 Wilson Mtonga Cloze
Lusaka, 10101
provide the best technical support to clients. Specialized in both web and mobile applications.
Chilulu Bus Stop_house #101058, Road 5
Lusaka, 10101
We as CITE currently are involved in web development and design
Matero
Lusaka, +26
Famous, wealth,rich and being protect by the illuminati fraternity. Once you join you can do whateve
Kabwata Estates
Lusaka, 10101
leading tech company in computer networking, CCTV installation web design etc.
John Laing Area
Lusaka, KANYAMA
Ict software and microsoft office and software installation
Opp Society Business Park, Nkhwazi Road, Shop No 3
Lusaka, 10101
iLinkTech has a network of resources, state-of-the-art technology and a culture dedicated to excellence. We have the equipment and the processes to deliver the finest solutions for...
Lusaka Matero
Lusaka, BUSINESS
This business is to store and suppling of Computer's