Tuesday, 25 December 2012

What are Captchas?


Whenever we create an account on any website or comment on any blog we see scrambled words
which we have to type and continue these are CAPTCHAs .

What are CAPTCHAs and what they do?
It stands for Completely Automated Public Turing-test to tell Computers and Humans Apart.These tries to test that you are a person and not a auto filling software.

Why CAPTCHAs are necessary?
These are used to prevent hackers from avoiding misuse of online services.
There are some examples of activities which are undertaken by hackers are given below :-
-Opening someone's account  by attempting different  password again and again.
-Creating  hundreds of  free accounts
-Swaying an online poll by robotically submitting hundreds of false responses.
-Spamimng blogs by posting dozens of bogus comments.

These CAPTCHAs test prevent about 90% of hackers attacks.



What is a logic behind this CAPTCHAs?
 Commonly, these CAPTCHA phrases are .gif pictures of scrambled words, but can also be .mp3 voice recordings. These pictures and recordings are very hard for conventional software programs to understand, and hence, robots are usually unable to type the phrase in response to the picture or recording.

Keyboard basic shortcuts you should know

Using Keyboard shortcuts save time by allowing you to never take your hands off the keyboard to use the mouse. So here is the list:-




Win                                Press windows key to open start menu
Win+R                           Opens Run dialog box
Win+M                          Minimize all opened windows
Win+S                            maximize all opened windows
Win+L                            locks keyboard in windows XP

Win+E                            opens My Computer
Win+F                            opens search options
Win+U                            opens Utility Manager
Win+D                            view desktop/minimize all windows
Win+F1                           view the detail windows help page
Win+P                              Pause view the System Properties dialog box
Win+Tab                          Move through open windows
Win+F+Ctrl                     open search Window
Alt+Tab                           Move through opened windows programs
Alt+F4                             close active window
Alt+Enter                         open properties of selected item
Alt+SPACEBAR             Open the system menu of active window
Alt+SPACEBAR+N       minimize the active program
Alt+SPACEBAR+R        keys to restore the active program
Alt+SPACEBAR+C        keys to close the active program
Alt+SPACEBAR+X        keys to maximize the active program
Alt+SPACEBAR+M       keys to move the active program
Ctrl+Alt+Delete               options to shutdown or open task manager
Ctrl+Shift+Esc                open windows task manager
Ctrl+Esc                           keys to open start menu
Shift+Delete                     delete items permanently
Ctrl+A                             Selects all items in Folder
Ctrl+C                              Copy function
Ctrl+v                              Paste Option
Ctrl+home                        Move to the top of the page
Ctrl+End                          Move to the bottom of the page

Download the world's fastest download manager


Internet Download Manager (idm) is the world's fastest download manager with many extra great features.

It helps to download multiple files in a single time. It also provides the resume capability if sometimes we shutdown our computer with incomplete download we can resume the download. With this new version we can also control the download speed. It is fully integrated with almost all browsers like google chrome, Firefox, internet explorer, opera etc. It also has the capability to download videos from youtube. To download full version of idm. Click the download button below.

Dropbox - Simpify your life


What is Dropbox?
It is a website which provides online storage (free-2gb) and also makes file sharing easy.We can keep our files where ever we go or we can say we can have access to all your data from anywhere in the world.It can also be used for online backup.


Features  of dropbox:-
1)One of the great feature of dropbox is automatic uploading . We just need to copy the file to the dropbox folder to upload it. There is no need to log on to the dropbox account whenever we need to upload the file.

2)One another feature is suppose we are have more than one computer. One in home and another in office and we want some files(which are in home or office's computer) on both of the computers. So we can directly copy the file to the dropbox folder. And on another computer it will be automatically downloaded.
If we want to download the file on computer on which dropbox is not installed. We can download it by logging to the dropbox account by visiting dropbox website.
3)Dropbox app also available for smartphones(blackberry, apple, android etc.). We can access files on the smartphone too.  
4)Dropbox can be used for the online backup.

What we need for using drop box?
-A Dropbox account(Click here to create it)
Dropbox application  (Click here to download it)
-A Personal computer

How to use it?
First create an account on  Dropbox's website.
And Install the   Dropbox software.
 Copy the file which we want to share or send  to the Dropbox folder which is created automatically when we install Dropbox software. 

Sunday, 9 December 2012

Hackers


Who accesses a computer system by circumventing its security system. who makes innovative customization's or combinations of retail electronic and computer equipment. who shares an anti-authoritarian approach to software development now associated with the free software movement .

Ethical Hacking

Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.

How to Protect Your Computer

Below are some key steps to protecting your computer from intrusion:

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus SoftwareAntivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Anti spyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave theircomputers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning thecomputer off effectively severs an attacker's connection—be it spyware or a botnet that employs yourcomputer's resources to reach out to other unwitting users

Seo (Search Engine Optimization)

Keywords

First You Need You Choose The Best Keywords

On page SEO Meta Tags

HTML meta tags are bits of code that aren’t visible on your site but which help with on page SEO by describing the pages of your site to search engines. The use of meta tags is one of the basic elements of on page SEO.

<head>
<title>Trunzout.blogspot.com</title>
<meta content='Trunzout.blogspot.com,Trunzout,Mirza Ahmed Ali,Pc Tipz,Pc Trickz' name='keywords'/>
<meta content='Trunzout.blogspot.com Providing The Best Info.' name='description'/>
</head>

Off page SEO

Search Engine and Directory Submission

Search The Different Search Engines & Submit URL To  Directory.

Back links

Post You URL To  Other Sites

Must Use Defragmentation

Defragmentation is a process that reduces the amount of fragmentation. It does this by physically organizing the contents of the mass storage device used to store files into the smallest number of contiguous regions (fragments). It also attempts to create larger regions of free space using compaction to impede the return of fragmentation. Some defragmentation utilities try to keep smaller files within a single directory together, as they are often accessed in sequence. Defragmentation is advantageous and relevant to file systems on electromechanical disk drives. The movement of the hard drive's read/write heads over different areas of the disk when accessing fragmented files is slower, compared to accessing the entire contents of a non-fragmented file sequentially without moving the read/write heads to seek other fragments.

About Keyloggers

The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security. Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justifiedmonitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords. Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including: Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content; Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of “virtual cheating”; Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours; Company security: using keyloggers to track the input ofkey words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed; Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers; Other reasons. However, the justifications listed above are more subjective than objective; the situations can all be resolved using other methods. Additionally, any legitimate keylogging program can still be used with malicious or criminal intent. Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose. Furthermore, many keyloggers hide themselves in the system (i.e. they have rootkit functionality), which makes them fully-fledged Trojan programs. As such programs are extensively used by cyber criminals, detecting them is a priority for antivirus companies. Kaspersky Lab’s malware classification system has a dedicated category for malicious programs with keylogging functionality: Trojan-Spy. Trojan-Spy programs, as the name suggests, track user activity, save the information to the user’s hard disk and then forward it to the author or ‘master’ of the Trojan. The information collected includes keystrokes and screen-shots, used in the theft of banking data to support online fraud.

Intel Core i7

Intel Core i7 is an Intel brand name for several families of desktop and laptop 64-bit x86-64 processors using the Nehalem, Westmere, Sandy Bridge and Ivy Bridge microarchitectures. The Core i7 brand is targeted at the business and high-end consumer markets for both desktop and laptop computers, and is distinguished from the Core i3 (entry-level consumer), Core i5 (mainstream consumer), and Xeon (server and workstation) brands.
The Core i7 name was introduced with the Bloomfield Quad-core processor in late 2008.In 2009 new Core i7 models based on the Lynnfield desktop quad-core processor and the Clarksfield quad-core mobile were added, and models based on the Arrandale dual-core mobile processor were added in January 2010. The first six-core processor in the Core lineup is the Gulftown, which was launched on March 16, 2010. Both the regular Core i7 and the Extreme Edition are advertised as five stars in the Intel Processor Rating. In January 2011, Intel released the second generation of Core i7 processors. Both the first and second generation of Intel Core i7 processors are rated as 5 stars in the Intel processor rating. The second generation of Intel core processors are based on the "Sandy Bridge" core and are set to be updated in January1 2012 with "Ivy Bridge". 1Footnote: It has not yet been launched, as of 2012-04-22
In each of the first three microarchitecture generations of the brand, Core i7 has family members using two distinct system-level architectures, and therefore two distinct sockets (for example, LGA 1156 and LGA 1366 with Nehalem). In each generation, the highest-performing Core i7 processors use the same socket and QPI-based architecture as the low-end Xeon processors of that generation, while lower-performing Core i7 processors use the same socket and PCIe/DMI/FDI architecture as the Core i5.
"Core i7" is a successor to the Intel Core 2 brand.Intel representatives stated that the moniker Core i7 is meant to help consumers decide which processor to purchase as the newer Nehalem-based products are released in the future.

What is Computer Network?

Two or more computers connected together through a communication media form a computer network.
The computers are connected in a network to exchange information and data. The computers connected in a network can also use resources of other computers.

Computer Network Components

There are different components of a network. Following are the basic components of network.

1. Server:

Powerful computers that provides services to the other computers on the network.

2. Client:

Computer that uses the services that a server provides. The client is less powerful than server.

3. Media:

A physical connection between the devices on a network.

4. Network Adopter:

Network adopter or network interface card (NIC) is a circuit board with the components necessary for sending and receiving data. It is plugged into one of the available slots on the Pc and transmission cable is attached to the connector on the NIC.

5. Resources:

Any thing available to a client on the network is considered a resource .Printers, data, fax devices and other network devices and information are resources.

6. User:

Any person that uses a client to access resources on the network.

8. Protocols:

These are written rules used for communications. They are the languages that computers use to talk to each other on a network

PC Troubleshooting Tips Why is My PC Crashing?

Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files

Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files

Windows operating systems handle file organization in a way that isn’t very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software

Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory

When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this isn’t true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating

If you’ve run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and doesn’t work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan isn’t very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!

As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!

Top 10 Ways To Save Your Computer From Hackers


01: Software Updates
For the protection of your computer from hackers you should get the best and latest version of application which is impossible for the hackers to find it, another thing is also take place that your web browser and other programs are given best upgrades.

02: Window Updates
Another way to protect and save your computer from hackers is that you should keep your operating system up to dates in for minimizing the risk of virus which is very necessary for your computer.

03: Anti-Virus Software
Another way to protect your computer from hackers is that you should install best quality Anti-virus software, because with out antivirus software your computer is in the list of hackers and it is dangerous for your computer. So for protection of your computer you must do for the best.

04: Anti-Spyware Software
Anti-spyware software is one of the best ways to protect your computer from hackers, Thanks to anti-spyware luminaries like Ad-Aware, the previously crippling spyware infection had dwindled down whole of year.

05: Switch to Macintosh
Another best way for protect your computer from hackers is with the help of Macintosh operating system which is very secure for your computer because this fact only came about because smaller quantity hackers bother to attack this platform in the first place.

06: Hacker-controlled Websites
Another way to avoid your computer from the hackers is that you should avoid for getting snared by doubtful sites committed to porn, free downloads, online games, and so on; this way, there are not as much of chances for you to be hacked.

07: Spam Email
Another one of the best way to protect your computer from hacker is that you should avoid to open those websites which are doubtful if the massage is doubtful than delete the message which is useful for your computer.

08: Firewall
Another thing which is very important for your computer avoid to be hacked is to install the firewall if you have not install it than I will recommend to install it. Because there are goods that even filter both incoming and out going data streams.

09: Data Backup
Another thing which is very helpful for your computer to avoid from hacker is that if any data which is in your computer as well as related to computer, you should take backup of this data which is very important to save your data from crashes on internet.

10: Password Polices
Another very important thing which is very helpful to protect your computer from hackers is that your password polices should be of high standard using combinations of letters and numbers, and making sure that your password is as secret as potential without necessarily making it too difficult for you to remember it.

Need and Importance of Information Technology in Education

Need
Education is a life long process therefore anytime anywhere access to it is the need
Information explosion is an ever increasing phenomena therefore there is need to get access to this information
Education should meet the needs of variety of learners and therefore IT is important in meeting this need
It is a requirement of the society that the individuals should posses technological literacy
We need to increase access and bring down the cost of education to meet the challenges of illiteracy and poverty-IT is the answer


Importance
access to variety of learning resources
immediacy to information
anytime learning
anywhere learning
collaborative learning
multimedia approach to education
authentic and up to date information
access to online libraries
teaching of different subjects made interesting
educational data storage
distance education
access to the source of information
multiple communication channels-e-mail,chat,forum,blogs,etc.
access to open courseware
better accesses to children with disabilities
reduces time on many routine tasks


Information Technology in Education

INTRODUCTION Information Technology in Education, effects of the continuing developments in information technology (IT) on education.

The pace of change brought about by new technologies has had a significant effect on the way people live, work, and play worldwide. New and emerging technologies challenge the traditional process of teaching and learning, and the way education is managed. Information technology, while an important area of study in its own right, is having a major impact across all curriculum areas. Easy worldwide communication provides instant access to a vast array of data, challenging assimilation and assessment skills. Rapid communication, plus increased access to IT in the home, at work, and in educational establishments, could mean that learning becomes a truly lifelong activity—an activity in which the pace of technological change forces constant evaluation of the learning process itself.

Significance of IT in education

Access to variety of learning resources

In the era of technology. IT aids plenty of resources to enhance the teaching skills and learning ability. With the help of IT now it is easy to provide audio visual education. The learning resources are being widens and widen. Now with this vivid and vast technique as part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work.

Immediacy to information

IT has provided immediacy to education. Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated anywhere at any time. New IT has often been introduced into well-established patterns of working and living without radically altering them. For example, the traditional office, with secretaries working at keyboards and notes being written on paper and manually exchanged, has remained remarkably stable, even if personal computers have replaced typewriters.

Any time learning

Now in the year of computers and web networks the pace of imparting knowledge is very very fast and one can be educated .One can study whenever he wills irrespective of whether it is day or night and irrespective of being in India or in US because of the boom in IT.

Collaborative learning

Now IT has made it easy to study as well as teach in groups or in clusters. With online we can be unite together to do the desired task. Efficient postal systems, the telephone (fixed and mobile), and various recording and playback systems based on computer technology all have a part to play in educational broadcasting in the new millennium. The Internet and its Web sites are now familiar to many children in developed countries and among educational elites elsewhere, but it remains of little significance to very many more, who lack the most basic means for subsistence.

Multimedia approach to education

Audio-Visual Education, planning, preparation, and use of devices and materials that involve sight, sound, or both, for educational purposes. Among the devices used are still and motion pictures, filmstrips, television, transparencies, audiotapes, records, teaching machines, computers, and videodiscs. The growth of audio-visual education has reflected developments in both technology and learning theory.

Studies in the psychology of learning suggest that the use of audio-visuals in education has several advantages. All learning is based on perception, the process by which the senses gain information from the environment. The higher processes of memory and concept formation cannot occur without prior perception. People can attend to only a limited amount of information at a time; their selection and perception of information is influenced by past experiences. Researchers have found that, other conditions being equal, more information is taken in if it is received simultaneously in two modalities (vision and hearing, for example) rather than in a single modality. Furthermore, learning is enhanced when material is organized and that organization is evident to the student.

These findings suggest the value of audio-visuals in the educational process. They can facilitate perception of the most important features, can be carefully organized, and can require the student to use more than one modality.

Authentic and up to date information

The information and data which are available on the net is purely correct and up to date.

Internet, a collection of computer networks that operate to common standards and enable the computers and the programs they run to communicate directly provides true and correct information.

Online library

Internets support thousands of different kinds of operational and experimental services one of which is online library. We can get plenty of data on this online library.

As part of the IT curriculum, learners are encouraged to regard computers as tools to be used in all aspects of their studies. In particular, they need to make use of the new multimedia technologies to communicate ideas, describe projects, and order information in their work. This requires them to select the medium best suited to conveying their message, to structure information in a hierarchical manner, and to link together information to produce a multidimensional document.

Distance learning

Distance Learning, method of learning at a distance rather than in a classroom. Late 20th-century communications technologies, in their most recent phases multimedia and interactive, open up new possibilities, both individual and institutional, for an unprecedented expansion of home-based learning, much of it part-time. The term distance learning was coined within the context of a continuing communications revolution, largely replacing a hitherto confusing mixed nomenclature—home study, independent study, external study, and, most common, though restricted in pedagogic means, correspondence study. The convergence of increased demand for access to educational facilities and innovative communications technology has been increasingly exploited in face of criticisms that distance learning is an inadequate substitute for learning alongside others in formal institutions. A powerful incentive has been reduced costs per student. At the same time, students studying at home themselves save on travel time and other costs.

Whatever the reasoning, distance learning widens access for students unable for whatever reason (course availability, geographical remoteness, family circumstances, individual disability) to study alongside others. At the same time, it appeals to students who prefer learning at home. In addition, it appeals to organizers of professional and business education, providing an incentive to rethink the most effective way of communicating vital information.

Better accesses to children with disabilities

Information technology has brought drastic changes in the life of disabled children. IT provides various software and technique to educate these poor peoples. Unless provided early with special training, people profoundly deaf from birth are incapable of learning to speak. Deafness from birth causes severe sensory deprivation, which can seriously affect a person's intellectual capacity or ability to learn. A child who sustains a hearing loss early in life may lack the language stimulation experienced by children who can hear. The critical period for neurological plasticity is up to age seven. Failure of acoustic sensory input during this period results in failure of formation of synaptic connections and, possibly, an irremediable situation for the child. A delay in learning language may cause a deaf child's academic progress to be slower than that of hearing children. The academic lag tends to be cumulative, so that a deaf adolescent may be four or more academic years behind his or her hearing peers. Deaf children who receive early language stimulation through sign language, however, generally achieve academically alongside their hearing peers.

The integration of information technology in teaching is a central matter in ensuring quality in the educational system. There are two equally important reasons for integrating information technology in teaching. Pupils must become familiar with the use of information technology, since all jobs in the society of the future will be dependent on it, and information technology must be used in teaching in order to improve its quality and make it more effective.


INTRODUCTION

The information society challenges the education system. In recent years, the speedy, effective and global communication of knowledge has created a new foundation for co-operation and teamwork, both nationally and internationally. The increasing role played by information technology in the development of society calls for an active reaction to the challenges of the information society.

Already, new and greater demands are being made as to the core qualifications of individuals, as well as to their understanding and knowledge of the consequences of the introduction of information technology for the work and organisation of a company. Companies are no longer forced to gather all their functions in one place. The knowledge-intensive functions such as development and marketing can be sited in countries where the labour market can supply highly educated employees, whilst production itself can be moved to low wage countries. The result is the efficient handling, processing, co-ordination and administration of company resources, which is decisive for the competitiveness of the company.In a society which is becoming increasingly dependent on information and the processing of knowledge, great demands are therefore made that the individual should have a solid and broad educational foundation on which to build. Educational policy in the information society must ensure that:
 IT qualifications are developed by means of their integration in all activities in the education sector and
 The individual citizen must have an active and critical attitude to developments and not passively allow technological development to set the pace.


IT educational policy must ensure:
Up-to-date qualifications in the information society
Up-to-date qualifications gained against the background of a high general level of education in the population will be decisive if Denmark is to maintain competitiveness and its share of the global labour market in the information society. IT skills and IT understanding are thus central prerequisites for the individual, both now and especially in the future.

The advantage of using information technology is that time-consuming work routines can increasingly be performed by means of this technology and time can thus be devoted instead to communicating and informing, to the processing of information and the production of knowledge.