Monday, December 26, 2016

A study on situation of Rapti Auto Engineering in Ghorahi

No comments :
This summer project is done on the topic of "A study on Situation of Rapti Auto Engineering (Bajaj Showroom) in Ghorahi ". The data collected for this project are primary as well as secondary. In this project, I have introduced the business named Rapti Auto Engineering and have divided this study into three chapters. The first phase is about the general background of study, objectives of the study, problem statement, hypothesis, importance, limitation, and research methodology.  In second phase, I have described about the Data Presentation and Analysis which includes the relevant qualitative and quantitative data and analysis is presented there. In third phase, I have presented the summary and conclusion. I have even attempted to drive meaningful findings and deliver useful suggestions and recommendations. 
Read full report..

Wednesday, November 2, 2016

Dairy Business in Ghorahi, Dang

No comments :
This summer project is done on the topic of DAIRY BUSINESS IN GHORAHI, DANG”. The data collected for this project are primary as well as secondary. In this project, I have introduced and divided the study into three chapters.  
     The first chapter is about the general background of study, Dang short descriptionreview of literature, objectives of the studyimportance of the study, limitations of the study, benefits of the dairy milkDairy enterprises in Ghorahi, dairy Products manufactured in Ghorahi,

Monday, October 3, 2016

A Study On Ncell Service In Dang

No comments :
           This summer project is done on the topic of "A Study on Ncell Service in Dang". The data collected for this project are primary as well as secondary. In this project, I have introduced Ncell shop. This study had been classified into three chapters. The first chapter includes background information, problem statement, objectives of the study, importance of the study, limitation of the study, hypothesis formulation, literature review and research methodology. Second chapter includes Data Presentation and Analysis which includes the relevant qualitative and quantitative data and analysis is presented there. In third chapter includes summary and conclusion. I have also included meaningful findings and useful suggestions and recommendations. 

Read full report...

Monday, July 25, 2016

A Study on Business Opportunities and Challenges of Ghorahi Copy Udyog

No comments :
As we know that this is the 21st century and in this competitive world there various category of business. Due to the globalization process people are starting their business in different countries. So, that the business is taken as the way of interaction among the people. 
We find some businesses are is successful due to effective management and technology but some are failure because of ineffective management and technology. So, to run business smoothly the effective management and technology is required. We can see the competition among various businesses in the market. So, to analyze the situation of Ghorahi Copy Udyog the research has been conducted. 

Sunday, July 24, 2016

Employment For Disables (Physically Handicaps) in the Banks of Dang

No comments :
This report presented is intended to provide all the Banks and financial institutions with the information and insights necessity to formulate for policy formulation and strategic planning in the area of disability for the inclusion and special provision for their development. After describing the disability definitions and condition of the disables in the banks of Dang. The paper presents a descriptive analysis of the evolution and current status of disable employees in the Banks of Dang. Based on this information, economic probabilities and development possibilities  is made in favor of investing public and private resources, in to increase access for people with disabilities to social and economic opportunities.

Read full report..

Wednesday, July 20, 2016

A Study on Business of Sworgadwari Drinking Water Ghorahi, Dang

No comments :
This is the age of competition and the competition exists in each and every field. Due to the over population and deforestation the water resources are being polluted and dry. As a result the people are lacking the fresh and pure water and are becoming the victims of different water borne diseases. Keeping these things in the mind different water business are established and establishing in Nepal and is a great competition in this business too. Among them one of the water business established in Dang is Sworgadwari Drinking Water (SDW). 

Read full report...

A Study on Situation of KD Enterprises (Hero Honda Bike) in Ghorahi

No comments :
This summer project is done on the topic of “Situation of KD Enterprises (Hero Honda Showroom)”. The data collected for this project are primary as well as secondary. In this project, I have recognized the showroom name KD Enterprises and have divided this study into three chapters. The first phase is about the general background of study, objectives of the study, problem statement, hypothesis, significance, limitation and research methodology. Second phase is about the Data Presentation and Analysis which includes the relevant qualitative and quantitative data and analysis is presented there. In third phase, I have presented the summary and conclusion. I have even attempted to drive meaningful findings and deliver useful suggestions and recommendations. 

Read full report..

A Case Study on NEWCPC for Social Welfare

No comments :
This summer project is done on the topic of A case study on Contribution of New Awareness Women Child Protection Centre (NEWCPC) for social welfare ". The data collected for this project are primary as well as secondary. In this project, I have introduced the organization named NECPC and have divided this study into three chapters. The first phase is about the general background of study, objectives of the study, problem statement, hypothesis, significance, limitation and research methodology.  In second phase, I have described about the Data Presentation and Analysis which includes the relevant qualitative and quantitative data and analysis is presented there. In third phase, I have presented the summary

Read full report...

Thursday, June 30, 2016

Loan Approval Process of Butwal Finance Limited, Ghorahi Branch

No comments :
This summer project is done on the topic of “Loan Approval Process Of Butwal Finance Limited in Ghorahi”. The data composed for this project are from many sources that are primary as well as secondary. In this project, I have started the organization named  Butwal Finance Limited and have divided into three chapters. The first phase is about the background information, objective of study problem statement, important of the study, limitation of the study, Research methodology, Research design, Sources of data, Hypothesis, Data collection procedures, Data processing, Data Analysis, Literature Review and organization of the study. In second phase, I have presented about the Data presentation and analysis. In third phase, I have described the summary, conclusion, and Recommendation.   

Read full report..

Sunday, January 3, 2016

Computer virus

No comments :
     A computer virus is a type of malicious software program ("malware") that,
when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include as well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.
Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can include seeking profit (e.g., with ransomware), desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore cybersecurity issues, artificial life and evolutionary algorithms.
Computer viruses currently cause billions of dollars' worth of economic damage each year,due to causing system failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open-source antivirus tools have been developed, and an industry of antivirus software has cropped up, selling or freely distributing virus protection to users of various operating systems.As of 2005, even though no currently existing antivirus software was able to uncover all computer viruses (especially new ones), computer security researchers are actively searching for new ways to enable antivirus solutions to more effectively detect emerging viruses, before they have already become widely distributed.
The term "virus" is also commonly, but erroneously, used to refer to other types of malware. "Malware" encompasses computer viruses along with many other forms of malicious software, such as computer "worms", ransomware, trojan horses, keyloggers, rootkits, spyware, adware, malicious Browser Helper Object (BHOs) and other malicious software. The majority of active malware threats are actually trojan horse programs or computer worms rather than computer viruses. The term computer virus, coined by Fred Cohen in 1985, is a misnomer. Viruses often perform some type of harmful activity on infected host computers, such as acquisition of hard disk space or central processing unit (CPU) time, accessing private information (e.g., credit card numbers), corrupting data, displaying political or humorous messages on the user's screen, spamming their e-mail contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a destructive "payload" and attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which modify other software without user consent.