Search This Blog

Sunday, December 4, 2011

The Veena Malik Brouhaha

Having an opinion about Veena Malik, much like Veena’s clothing itself, is strictly optional. What is not acceptable is occupying a position of neutrality in the fight between Veena and her holier-than-thou critics. Veena Malik’s nude photo shoot in FHM India, which she and her publicist are claiming was doctored but the magazine’s editor insists was genuine, is not something to give our enthusiastic support to. One of the greatest mistakes liberals make is to support every action that upsets the morality brigade rather than to argue for the principle that each individual is free to choose their own path, no matter how wrong-headed it may be, so long as it doesn’t harm others. What we must be ready to do is enthusiastically defend Veena from the attacks that are sure to come her way.
Even more important is to fight back against the vision for Pakistan that the likes of Veena’s attackers are trying to impose on us. For them, the country should be a soulless place where diversity is not permitted and women are to be kept cloaked. This is not to say that one is at all condoling indecency; rather, the point is that we need to be less controlling and judgemental as far as women are concerned. That they are willing to enforce this vision with the force of arms only adds to the case against them. Pakistan is a country large enough to accommodate the likes of both Veena Malik and Mufti Naeem.
Moreover what is being completely ignored is that Veena’s side is denying the photo shoot ever took place. Regardless of the denial, we are quick to judge her, as we have been quick to judge other women. As a society, we seem to unfairly subject women to a much higher standard, indicative of a misogynist/patriarchal mindset. Even if she has done the photo shoot, there will be those who will accuse her of doing it only for shock value, for deliberately offending the sensibilities of the majority of the nation. They may well be right. But Pakistan should not become a country where something is banned simply because a lot of people don’t like it. The rights due to minorities should extend to minority opinions and actions that may not be to the liking of the majority. That is the very essence of a tolerant society.

Veena Malik Files For Rs100m In Damages From FHM

Refusing to balk in the face of controversy, Veena Malik has filed for monetary damages against For Him Magazine (FHM) to the sum of Indian Rs100,000,000 following their release of two magazine covers featuring the diva naked.

The notice was delivered on Sunday and named Maxposure Corporate Media, FHM chieft editor Kabeer Sharma and photographer Vishal Saxena as respondents. It outlined Malik’s narrative of events surrounding the photo shoot for FHM, including the claim that “our client was assured that no nude photograph in any manner would be shot by you.”

The notice reiterated that Malik’s photos had been morphed, stating that Malik had agreed to be shot in shorts and tee shirt and boots; wearing a fur coat up to thighs and boots; hot pants and a broad big belt with the upper portion of her body covered with her hands and an ISI tattoo on her hand; an image with a tattoo of “ISI” appearing on one hand, in which Malik would wear a bikini and/or a thong posing with folded hands with the upper portion of her body covered with other tattoos.

Claiming irreparable harm, loss and damage, the notice said the respondents had committed offences punishable under the Indian Penal Code as well as Information and Technology Act, 2000. The notice called on FHM to ensure the magazine issue would not go into print, remove the tampered photos from the FHM website and pay millions in damages.

Seen-A-Malik

After going through an excruciatingly painful yet sheepishly exciting bit of research on our one and only Wild Woman, Veena Malik, This is what I have to say…

… Frecking Hilarious!!

I say this in a condescending tone of voice, of course. This girl is so oblivious to the realities of life, that it’s absorbingly painful in a weird and unhindered way.

You think NATO dropped a bomb on us? Wait till you see this acclaimed “Pakistani Weapon of Mass Destruction” with her rather tart but enthusiastic, show of obscenity on the Cover page of FHM India, where she flamboyantly reveals her self-proclaimed, “Toned and muscular body.” which by the way is also slightly (massively) photo-shopped.

Another thing that seems to be remarkable and attention-grabbing besides the obvious… ;) …is the visually loud and apparent tattoo of the renowned Pakistani Intelligence agency ISI; stamped on her right shoulder.

I’m assuming that’s just her way of, “showin’ da love!”

Now after a long and hectic analysis of the situation I ask, what else do you want from her folks?

She goes all over the world and makes Pakistan popular well not in a good way, but still, she loves the ISI to such an extent that she tattooed it to her arm; for life!, she disciplines the old mullahs who force their gaunt faces and clerical judgments on her, she even took off her God dam clothes for you!! Jesus on a bicycle, what else do you want? You entertainment-hungry-soul-consuming monsters!

All jokes aside,

It was pretty obvious that the Pakistani people were eagerly anticipating her next move to be of a similar nature as to what she has done now, so this shouldn’t come off as a surprising fixation to us. This is how we know her and this is how we have to accept her. Or not!

Maybe we should just get them to pass a “fatwa” requiring her to immediately cease to exist; or make another Salman Rushdie case out of her. I don’t know, but just in case you’re a terrorist or an angry feminist and reading all this is making you angry, please don’t hate me! She’s the one who has been bad; very; very bad, in fact.

In conclusion, I wonder:

Was this an “ultramodern” act of rebellion? Or was she just trying to do something that’s avant-garde in her own little world?  Rest assured, whatever has been done; she has definitely broken new barriers, at least when it comes to how Pakistani Women are perceived all over the world. Let’s hope she gets what she deserves, which could be loads of money, fame, love, respect and power. Or… like I said, if you’re still reading Mr. terrorist-blog-reader-guy and the angry-feminist-lady, let’s get her a fatwa!

FHM India 2nd Cover Option With Veena Malik

After not being in the limelight for quite a while Veena has done it once again! She posed nude for an Indian Magazine, apparently they say she did it for Free, they shot two options for the Cover, this is the second image!

Veena represents Pakistan there in India and should know she has done in this picture, as she has justified herself before with full emotions and tamed by the audience and media both, Surely she is one actress who knows how to draw eyeballs towards her, but the way of being famous chosen by her is beyond adulthood and just because of her vulgarity in a sacred month for Muslims is a redundant ignominy, she has always been controversy's favorite child courtesy her link-up with Muhammad Asif and her on-off affair with “Assshhhhmit Patel”, seemed all set to create yet another controversy with her adult photo shoot.

On the other side, issue that has taken place is that Veena talks about controversial topics like Hijaab and Work related visas.

She would do anything to get some attention going towards her, She does not actually care if the whole world hates her as long as shes getting famous. She has done nude photoshoots before, but the most controversial thing being here is the ISI tattoo part, Her manager denies this, She is a little confused about it, FHM India Editor claims Veena was a big part of the concept. Well I guess its not surprising that she would do this to get some fame, but is she that dumb, that when Pakistan is in the middle of a crisis situation where NATO forces killed 24 army personnels, where the US is claiming that ISI has been helping out the Taliban's and the whole worlds watching.. here comes a nude ISI chic from Pakistan...

Saturday, December 3, 2011

Desi Boyz – Movie Review

Producer: Krishika Lulla, Vijay Ahuja and Jyoti Deshpande
Director: Rohit Dhawan
Cast: Akshay Kumar, John Abraham, Deepika Padukone, Chitrangada Singh, Sanjay Dutt, Anupam Kher and Omi Vaidya
Music: Pritham
Release Date: November 2011

Actors Akshay Kumar and John Abraham have already rocked the audience with their slap-stick comedy in the movie Garam Masala. The duo is back with another comic-caper. In their latest movie Desi Boyz, they take their comic-timing to next level, which is sure to entertain the movie-goers.

Desi Boyz is a Hindi comedy drama and the amazing chemistry between Akshay Kumar and John Abraham is the major attraction of the film. Pritham's music, Natarajan Subramaniam's picturisation, fast-paced screenplay and dialogues, graphics work, beautiful locations, costumes and art direction are the other highlights of the movie. But it suffers a setback due to weak storyline and poor characterisation.

The movie is about two jobless youth's struggle for livelihood during recession. Director Rohit Dhawan might have failed to have strong storyline, but he proves that he is no lesser to his filmmaker father David Dhawan in making a comedy. With his dynamic screenplay, he makes sure that the audiences' attention will centre on screen till the end of the film. One thing should be said here unlike his father, he never plays it over the top.

Two friends Jignesh a.k.a Jerry (Akshay) and Nick (John) are working as security guard and banker respectively in London. Jerry has a responsibility to look after his sister's orphan son, while Nick has a high maintenance girlfriend (Deepika Padukone). But hell breaks loose when they lose their jobs due to recession. In a bid to seek desperate measures for survival, they meet Sanjay Dutt, who hires them as male escorts in his company. What happens next will form the interesting portion of the movie.

Akshay Kumar and John Abraham are superb in their respective roles. As far as their acting is concerned, there seems to be a tough competition between the two. Their telepathic conversation in the film is very humourous. Their chemistry is awesome. Deepika grabs the eyeball with her acting, while Chitrangada Singh is a treat to watch. Sanjay Dutt, Anupam Kher and Omi Vaidya also brighten up the screen with their hilarious acts.

Pritham's composition of the songs is very impressive. Especially, title song 'Desi Boyz' and party number 'Tu Mera Hero' are ultra-groovy. Natarajan's cinematography also adds to the richness of the production values. Dialogues and Editing are also commendable.

Overall, Desi Boyz is a good entertainer, which can be enjoyed by comedy lovers.

The Dirty Picture - Movie Review

Producers: Ekta Kapoor and Dheeraj Shenoy
Director: Milan Luthria
Cast: Vidya Balan, Naseeruddin Shah, Emraan Hashmi, Tusshar Kapoor, Anju Mahendru, Rajesh Sharma, Shivani Tanskale, Mangal Kenkre and Imran Hasnee
Music: Vishal-Shekhar
Release Date: December 2, 2011

Director Milan Luthria and script writer Rajat Arora are back with another realistic movie. Once Upon A Time In Mumbai duo's latest film The Dirty Picture is another bold attempt. The movie is daring and provocative, yet it keeps distance from vulgarism and offensiveness.

The Dirty Picture is a biopic on the life of the South sex symbol Silk Smitha. Actress Vidya Balan's bold performance is the major attraction in the movie. Vishal-Shekhar's music, Rajat Arora's dynamic script and sharp dialogues, Bobby Singh's cinematography, Pony Prakash Raj's choreography and beautiful art works and costumes are the other attractions of the film.

The movie is set against the colourful and entertaining setting of the South film industry of the 80s. It revolves around a girl's journey from a makeup artiste to a sex goddess. She battles fame, fortune and alcohol. The Dirty Picture does not focus on the sleaze, but the tragic story of the sex siren, who provided titillation to thousands of viewers, but died a lonely and tragic death.

The first credit of the movie goes to Rajat Arora who has written a wonderful screenplay and power-packed dialogues. Secondly, it is Milan Luthria, who has wonderfully executed them on screen. The narration of the movie is so interesting that it will not let the viewers rest even for a single second. In the second half, Emraan-Vidya sequences slow down the pace, but soon the narration picks up pace dramatically. Of all what strikes one's mind is the recreation of the era 1980s.

Vidya Balan has a role that she has never played before and she has delivered a brilliant performance. She surely wins the heart of the movie goers with her confident act in sizzling show and dare-bare sequences. As an ageing South Indian superstar, Naseeruddin Shah reminds us of the 1980s stars and his acts surely provoke claps, laughs and whistles among the viewers. Emraan Hashmi and Tusshar have also got totally new role. As a headstrong director, Emraan has delivered a bold act, while Tusshar appears fantastic in his role. Others like Anju Mahendru, Rajesh Sharma, Shivani Tanskale, Mangal Kenkre and Imran Hasnee have also done justice to their respective roles.

The Dirty Picture has a rich production values and Vishal-Shekhar's music is the major attraction in the technical front. Their compositions like 'Ooo La La', 'Ishq Sufiyana' are 'Honeymoon Ki Raat' are the pick of everyone. Pony Prakash Raj's choreography and Bobby Singh's cinematography are excellent in these songs. Akiv Ali's editing is also commendable.

Overall, The Dirty Picture is a right blend of wonderful script, amazing direction and bold performance from the lead actors. The movie has a universal theme and mass appealing story. This movie is a good entertainer.


Friday, December 2, 2011

Veena Malik Denies Nude Photo Shoot For FHM

Veena Malik has stirred controversy in both Pakistan and India — and this time she is not even involved. An alleged photograph of the actress posing nude appeared on the Indian online edition of the international monthly men’s lifestyle magazine FHM on Friday, but her PR manager confirmed to The Express Tribune that the photograph is fake.
When contacted by The Express Tribune, Veena Malik’s PR Manager Sohail Rashid said Malik has not done any such photo shoot.
He added that Malik was unaware about the shoot, since she was currently busy shooting for two movies in India.
Rashid said that she has instructed him to approach their lawyer, on December 3, to deliberate a legal course of action with regards to the matter.
“Veena knows her limits. I know we have done quite bold stuff/shoots, those which are available on our website, but she knows her parameters. Yes we need to be bold for international magazines, but she won’t cross her limits,” Rashid added.
The picture – which was posted on FHM India’s website, Facebook page and Twitter account simultaneously – was cited as the cover of the magazine’s December 2011 issue.
The actress was shown naked, brandishing an Inter-Services Intelligence agency (ISI) tattoo on her arm, linked to text that says “hand in the end of the world too?”.
The magazine cover made waves online, with many speculating over the authenticity of the photograph.
A Times of India report quoted Malik while speaking during the photo shoot:
“It’s tough standing on one leg, while trying to cover up with one hand and running the other through my hair – you guys are going to pay for this.”
In a new Times of India report, Veena has been quoted denying she has posed nude for the magazine. She says the photographs have been morphed.
“I have never posed nude. I have never done anything like that ever. My manager and legal team is looking into the matter. We will take legal action against them.”
“The picture has been morphed. Its not me. Definitely not.”
FHM India Editor Kabeer Sharma denies her claim and says the magazine has proof of the photo shoot.
“The photo shoot was done in Mumbai on November 22. We have a video of the photo shoot.”
“I also have an email from Veena in which she says she has seen the photos and is happy with them, and that she’s looking forward to seeing the cover.”

Veena Malik Becomes More ‘Dirty’

Lahore: 
Pakistan’s most controversial actress Veena Malik, who is controversial for her bold acts and allegedly involvement in a sexual scandal in near past, now captured in a new scandal in which she picturized a ‘nude’ photo shoot in India.
According to reports, Veena Malik gave the photo shoot for men’s magazine FHM which was shot by Vishal Saxena.
Interestingly, she is portraying controversial message through a tattoo mark on her arm ‘ISI’.
A nude Veena Malik who is covering her ‘modesty’ with her hands, with a blatant lettering on her arm – is bound to attract the kind of attention the publishers are hoping for.
Despite being cited as the cover image of the December 2011 issue, Veena’s camp strenuously denied any such photo shoot had taken place.
Her manager, Sohail Rashid, has clearly refused about that photo shoot and said “I know we have done quite bold stuff/shoots, those which are available on our website, but she knows her parameters. Veena knows her limits. Yes we need to be bold for international magazines, but she won’t cross her limits”.
These kinds of actions by Veena has been appreciating by the some sections of the society including the celebrities in Pakistan.
But the critics of Veena argued that this may be a try to become famous in the Pakistan and India, but the way of being chosen is not up to the level and very cheap.
The actress had been involved in scandals with Pakistani fast bowler Muhammad Asif and with India mediocre star Ashmit Patel, seemed all set to create yet another controversy with her adult photo shoot.
According to Pakistani English news paper Express Tribune, Not only has the picture got the online community talking, Pakistani diva, Meera – who had earlier called Veena a “cheap girl” – was active on Twitter commenting on the picture.
This is not the first time that FHM India has been accused of manipulating photographs.
According to reports, Indian actress Kajal Agarwal had accused the magazine of “morphing” her pictures taken at a photo shoot for the September 2011 issue.

Veena Malik Has Gone The Full Distance By Baring It All For Men's Magazine FHM

Pakistani actress Veena Malik, who is best known for her stint in Bigg Boss 4, has gone the full distance by baring it all for men's magazine FHM.

Veena, who has always been controversy's favorite child courtesy her link-up with banned Pakistani cricketer Muhammad Asif and her on-off affair with Ashmit Patel, seemed all set to create yet another controversy with her adult photo shoot. Veena has not only revealed it all but has even gone ahead and got an ISI tattoo on her arms. This picture has been shot by ace photographer Vishal Saxena.

The issue also has Veena talking about controversial topics like Hijaab and Work related visas.

Surely here is one actress who knows how to draw eyeballs towards her.

Thursday, December 1, 2011

10 Reasons Why PCs Crash

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Ms Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram
Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings
Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives
After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors
Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses
Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software
A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Monday, November 28, 2011

23 Ways To Speed Up Windows XP

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.
1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.

How to Change your IP Address?


Before you can change your IP you need some information. This information includes your IP range, subnet mask, default gateway, dhcp server, and dns servers.


1. Getting your IP range - Getting information about your IP range is not difficult, I recommend using Neo Trace on your own IP. But for my test just look at your IP address, say it's 24.193.110.13 you can definitely use the IP's found between 24.193.110.1 < [new IP] < 24.193.110.255, don't use x.x.x.1 or x.x.x.255. To find your IP simply open a dos/command prompt window and type ipconfig at the prompt, look for "IP Address. . . . . . . . . . . . : x.x.x.x".


2. Subnet Mask, Default Gateway, DHCP Server - These are very easy to find, just open a dos/command prompt window and type 'ipconfig /all' without the ' '. You should see something like this:
Windows IP Configuration:

Host Name . . . . . . . . . . . . . . : My Computer Name Here
Primary Dns Suffix . . . . . . . . . :
Node Type . . . . . . . . . . . . . . .: Unknown
IP Routing Enabled. . . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . . . . . . .: xxxx.xx.x
Description . . . . . . . . . . . . . . . . . . . . : NETGEAR FA310TX Fast Ethernet Adapter (NGRPCI)
Physical Address. . . . . . . . . . . . . . . . . : XX-XX-XX-XX-XX-XX
Dhcp Enabled. . . . . . . . . . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . . . . . . : Yes
IP Address. . . . . . . . . . . . . . . . . . . . . : 24.xxx.xxx.xx
Subnet Mask . . . . . . . . . . . . . . . . . . . .: 255.255.240.0
Default Gateway . . . . . . . . . . . . . . . . . : 24.xxx.xxx.x
DHCP Server . . . . . . . . . . . . . . . . . . . .: 24.xx.xxx.xx
DNS Servers . . . . . . . . . . . . . . . . . . . . : 24.xx.xxx.xxx
24.xx.xxx.xx
24.xx.xxx.xxx
Lease Obtained. . . . . . . . . . . . . . . . . . .:Monday, January 20, 2003 4:44:08 PM
Lease Expires . . . . . . . . . . . . . . . . . . . .:Tuesday, January 21, 2003 3:43:16 AM


This is all the information you will need for now, I suggest you either keep your dos/command prompt window open or copy & paste the information somewhere, to copy right click the window and select text and click once.



III. Changing your IP Address


To change your IP address first pick any IP you like out of your IP range and remember it or write it down. It is usualy a good idea to make sure the IP is dead (except for what we are going to do later on) so just ping it via "ping x.x.x.x" and if it times out then you can use it. Now go to My Computer, then Control Panel. In Control Panel select Network Connections and pick your active connection, probably Local Area Connection or your ISP name. Open that connection by double clicking on the icon in Network Connections, then select Properties under the General Tab. In the new window that pops up select Internet Protocol (TCP/IP) and click properties, it's under the general tab. In this new window select the General tab and choose "Use the following IP address" and for the IP address enter the IP you would like to use (the one you picked from your subnet earlier) and for the Subnet Mask enter the subnet mask you got when your ran ipconfig /all, same goes for the Default Gateway. Now select "Use the following DNS server addresses" and enter the information you got earlier. Now just click OK. Test that it worked, try to refresh a website and if it works you know everything is okay and you are connected. To make sure the change worked type ipconfig again and the IP address should have changed to your new one.



IV. DDoS & DoS Protection


If your firewall shows that you are being DDoSed, this is usually when you are constantly getting attempted UDP connections several times a second from either the same IP address or multiple IP addresses (DDoS), you can protect yourself by changing your IP address via the method I described above.



V. Web servers & Other Services


If you know someone on your IP range is running a web server and he or she has pissed you off or you just like messing around you can "steal" their IP address so any DNS going to that IP will show your site instead because you would be running a web server yourself.

To "steal" an IP is to basically use the changing IP address method above and picking an IP that someone that is running a web server has in use. Often you will be able to keep that IP at least for some time, other times you won’t be able to use it so just keep trying until it works. You your self will need to have a web server on the same port with your message. You can do this with other services too. You can also DoS or DDoS the IP address you are trying to steal to kick him off the net, but I don't recommend as its pretty illegal.

Amplitude


The Amplitude Is the Height of the crust in a sound wave and it affects the loudness of the sound, loudness of sound can be harmful if crossed the limits.

Db in SOUND
Amplitude or loudness of sound is measured in db (Decibels). Decibel is not an absolute scale, it is a relative scale, it is only used for measuring ratios, and that depends upon different situations. But there is no answer that what exactly is 1db as we know in kg or km.

Therefore these Assumptions come into play, which are different for real sound and audio.
When we talk about the Real sound, in order to measure loudness of sound, a level of the minimum sound (threshold) which is pure silence is set to be 0 db. And with that reference we can measure the loudness of the real sound in reality as we go up by 5db 10db 15db and so on. With these measurements it is assumed that loudness within 100db is safest sound that is audible. Maybe 115 db can be harmful.

Db in Audio
Now for Audio, It Is totally reversed, when we talk about decibels in audio 0db is the maximum value that any audio device can handle. And then all audio is based on negative values of decibels.  That is 0db, -5db, -10db, -15db.                                                                                                     
                             Max, loud, less loud, lesser loud and so on.

Frequency


Frequency is defined As the no. of cycles per second, its measured in Hz (hertz), and it effects The pitch of the sound, higher the pitch sharper will be the sound and lower the pitch the graver will be the sound. E.g. a female’s and a male’s voice in most cases (Deep or Bass).

Range of frequency a human ear can listen is known as the AUDIBLE range and the range is 20 Hz to 20000 Hz
Infrasonic (Below)   20 Hz - 20000 Hz   (Above) Ultrasonic
Frequency is harmless because we cannot listen to infra and ultrasonic frequencies.

Sound


Sound is Form of energy, which is in the form of waves.

Sound is created from a source of energy, and when sound is produced the constant air molecules (in Silence) are disturbed, and that disturbance is two way disturbance, and thus waves are created, which have peaks and troughs (oppressions and depressions). Humans have a little organ in our ears called the ear drum, the ear drum also vibrates in the exact same way the sound waves are vibrating.
The only difference between air and water is that we can see water waves but cannot see air.

Dynamic Range


The Difference between the highest and the lowest levels of loudness in audio is known as dynamic Range, i.e. –infinity to 0db.

In real sound the dynamic range is from 0db till the point our ears get damaged.

Phase


When two waves are totally identical, we say that the waves are in a phase.

Constructive Interference:
When we join the two identical waves then the resultant wave will be a wave having double the amplitude of each wave. This process is known as Constructive Interference.

Phase Cancellation:
But if two wave are totally identical (phase) but are inverse and they are added then the amplitude of the resultant wave will be cancelled out, then the there will be neither peak nor a trough and there will only be a straight line. This process is known as destructive Interference (Phase Cancellation).
 Good Examples: Karaoke Devices, Noise reduction Headphones etc.

Audio Sampling


When Sound is recorded in audio through any device it is known to be sampled, just like in images, pixels are the building blocks of the picture. When we talk about audio, samples are the building blocks of digital audio, The audio wave is sliced in tiny parts called samples, higher the sampling rate better is the quality of the sound (just like resolution).


Sample Rate: 
The sample rate is no. of samples per second. And the standard is 44100 Hz which Is good quality sound.

Difference Between Sound And Audio


Sound is the natural voice or sound that is produced from natural sources
But when our sound is recorded into digital energy it is converted into Audio

But what is the final destination of audio?
The Speakers! Where it is again converted into sound that reaches our ears
SOUND = Acoustic Energy             and               Audio = Electronic Energy

Tools And Techniques Of Measurement And Evaluation


VALIDITY:
It is the degree to which a test measures what is suppose to measure. (L. R. Gay)
  • Test validity refers to the degree to which the test actually measures what it claims to measure.
  • Test validity is also the extent to which inferences, conclusions, and decisions made on the basis of test scores are appropriate and meaningful.
  • Validity is the strength of our conclusions, inferences or propositions.
  • Validity refers to the accuracy of an assessment -- whether or not it measures what it is supposed to measure.
  • If a test is valid, it is almost always reliable.
Measurement of validity:
There are three ways in which validity can be measured.
Type of Validity
Definition
Example/Non-Example
Content
The extent to which the content of the test matches the instructional objectives.
A semester or quarter exam that only includes content covered during the last six weeks is not a valid measure of the course's overall objectives -- it has very low content validity.
Criterion
The extent to which scores on the test are in agreement with (concurrent validity) or predict (predictive validity) an external criterion.
If the end-of-year math tests in 4th grade correlate highly with the statewide math tests, they would have high concurrent validity.
Construct
The extent to which an assessment corresponds to other variables, as predicted by some rationale or theory.
If you can correctly hypothesize that ESOL students will perform differently on a reading test than English-speaking students (because of theory), the assessment may have construct validity.
In order to have confidence that a test is valid (and therefore the inferences we make based on the test scores are valid), all three kinds of validity evidence should be considered. So, does all this talk about validity and reliability mean you need to conduct statistical analyses on your classroom quizzes? No, it doesn’t. (Although you may, on occasion, want to ask one of your peers to verify the content validity of your major assessments.) However, you should be aware of the basic tenets of validity and reliability as you construct your classroom assessments, and you should be able to help parents interpret scores for the standardized exams.
Types of Validity:
There are four types of validity commonly examined in social research.
  1. Conclusion validity asks is there a relationship between the program and the observed outcome? Or, in our example, is there a connection between the attendance policy and the increased participation we saw?
  2. Internal Validity asks if there is a relationship between the program and the outcome we saw, is it a causal relationship? For example, did the attendance policy cause class participation to increase?
  3. Construct validity is the hardest to understand in my opinion. It asks if there is there a relationship between how I operationalized my concepts in this study to the actual causal relationship I'm trying to study/? Or in our example, did our treatment (attendance policy) reflect the construct of attendance, and did our measured outcome - increased class participation - reflect the construct of participation? Overall, we are trying to generalize our conceptualized treatment and outcomes to broader constructs of the same concepts.
  4. External validity refers to our ability to generalize the results of our study to other settings. In our example, could we generalize our results to other classrooms?
Characteristics of Validity:
There are following characteristics of validity commonly examined in social research.
  1. Content Validity: How well the sample of test items represents the content the test is designed to measure.
  2. Predictive validity: How well predictions made by a test are confirmed by later behavior of subjects.
  3. Concurrent validity: Similar to predictive validity, but behavior is measured at same time as test.
  4. Construct validity: How well a particular test can be shown to measure a particular construct (a theoretical construction about the nature of human behavior, such as intelligence, anxiety, or creativity).
  5. Face validity: How closely the test appears to measure what it's supposed to measure.

RELIABILITY:
Reliability is the degree to which a test is consistently measures whatever it measure.
(L. R. Gay)
Test reliability refers to the degree to which a test is consistent and stable in measuring what it is intended to measure. Most simply put, a test is reliable if it is consistent within itself and across time. Reliability is the consistency of your measurement, or the degree to which an instrument measures the same way each time it is used under the same condition with the same subjects. In short, it is the repeatability of your measurement. It is the level of internal consistency or stability of the test over time, or the ability of the test to obtain the same score from the same student at different administrations (given the same conditions). Reliability is usually expressed as some sort of correlation coefficient. Values may range from .00 (low reliability) to 1.00 (perfect reliability). Reliability refers to the extent to which assessments are consistent. Just as we enjoy having reliable cars (cars that start every time we need them), we strive to have reliable, consistent instruments to measure student achievement. Another way to think of reliability is to imagine a kitchen scale. If you weigh five pounds of potatoes in the morning, and the scale is reliable, the same scale should register five pounds for the potatoes an hour later (unless, of course, you peeled and cooked them). Likewise, instruments such as classroom tests and national standardized exams should be reliable – it should not make any difference whether a student takes the assessment in the morning or afternoon; one day or the next. Another measure of reliability is the internal consistency of the items. For example, if you create a quiz to measure students’ ability to solve quadratic equations, you should be able to assume that if a student gets an item correct, he or she will also get other, similar items correct.  The following table outlines three common reliability measures.
Type of Reliability
How to Measure
Stability or Test-Retest
Give the same assessment twice, separated by days, weeks, or months. Reliability is stated as the correlation between scores at Time 1 and Time 2.
Alternate Form
Create two forms of the same test (vary the items slightly).  Reliability is stated as correlation between scores of Test 1 and Test 2.
Internal  Consistency
Compare one half of the test to the other half.  Or, use methods such as Kuder-Richardson Formula 20 (KR20) or Cronbach's Alpha.   

Estimation of Reliability:
There are two ways by which reliability is usually estimated
  1. Test/Retest: Test/retest is the more conservative method to estimate reliability. The idea is that you should get the same score on test 1 as you do on test 2.
The three main components to this method are as follows:
o    Implement your measurement instrument at two separate times for each subject
o    Compute the correlation between the two separate measurements;
o    Assume there is no change in the underlying condition (or trait you are trying to measure) between test 1 and test 2.
  1. Internal Consistency: Internal consistency estimates reliability by grouping questions in a questionnaire that measure the same concept. For example, you could write two sets of three questions that measure the same concept (say class participation) and after collecting the responses, run a correlation between those two groups of three questions to determine if your instrument is reliably measuring that concept.
The primary difference between test/retest and internal consistency estimates of reliability is that test/retest involves two administrations of the measurement instrument, whereas the internal consistency method involves only one administration of that instrument.
The Relationship of Reliability and Validity
In order for assessments to be sound, they must be free of bias and distortion. Reliability and validity are two concepts that are important for defining and measuring bias and distortion. Test validity is requisite to test reliability. If a test is not valid, then reliability is moot. In other words, if a test is not valid there is no point in discussing reliability because test validity is required before reliability can be considered in any meaningful way. Likewise, if a test is not reliable it is also not valid.
OBJECTIVITY:
Objectivity is the extent to which the instrument is free from personal error (personal bias) that is subjectivity on the part of the error. (C.V Good)
The objectivity of test refers to the degree to which equally competent scores obtained the same results. (Norman E. Gronlund)
ACCURACY:
A term used to describe the size of the relative error.                                      (C.V Good)
ADECUACY:
A characteristic evidenced by its sufficient length to sample widely the behaviour it is designed to measure.                                                                                         (C.V Good)


Methods of Data Recording
The assessment techniques in this category may be used with any of the ongoing student activities as well as with the quizzes and tests. The appropriateness of the technique for the purpose intended should act as a guide.
Anecdotal records refer to written descriptions of student progress that a teacher keeps on a day- to-day basis.
A teacher may decide to keep anecdotal records on students' ability to manipulate materials at assessment stations, to work in a group, to work in a test-taking situation, or to complete a project or a written report. There are situations where a teacher will keep anecdotal comments on the development of specific skills related to instructional objectives, on the behavior of a student, or on the attitude expressed or demonstrated by a student. Anecdotal records are as flexible as a teacher wishes to make them.
Observation checklists are lists of criteria a teacher determines are important to observe in students at a particular time. Beside each of the criteria, a notation is made as to whether that particular criterion was observed.
Checklists can be used to record the presence or the absence of knowledge, particular skills, learning processes, or attitudes. They may be used to record such information in relation to written assignments, presentations, classroom performance, test-taking behaviors, individual or group work, fulfillment of the requirements of a contract, self- and peer-assessment of work, or completion of an assessment station. How a teacher wishes to use an observation checklist depends upon the type of student progress information required.
  • Rating Scales
Rating scales have the same usage as observation checklists. The essential difference lies in what is indicated. Observation checklists record the presence or absence of a particular knowledge item, skill, or process. Rating scales record the degree to which they are found or the quality of the performance.
Anecdotal Records Description
An anecdotal record is a written description of the observations made on students. These records are usually collected in a specific book or folder.


Evaluation Context
  • Formative
The very act of recording observations may serve to alert you to some aspect of a student's learning or attitude that may need immediate attention; for example, an outburst caused by frustration.
  • Summative
Since the anecdotal record concentrates on describing incidents of student performance over a period of time, the sequence of anecdotes can serve as a record of the student's development towards long term goals such as lifelong learning, healthy self-concept, cooperative learning, skill development, work/study habits, knowledge attainment, and interest/attitude.
  • Diagnostic
Through the regular spotlighting of a student's performance, areas needing special attention may emerge. Examples include communication skills and personal development. Your anecdotal records may start to show that Billy is consistently having trouble in expressing coherent thoughts. As a consequence, you may decide to investigate the causes of this behavior more thoroughly.
Using Technique to Best Advantage

Entries must be made with appropriate frequency. They should eventually encompass all the students, although some students may warrant more entries than others. Anecdotal records offer you a way of recording aspects of your students' learning that might not be identified by other techniques.
Guidelines for use
  • What to write
First, you write a description of the incident in an objective way by describing what actually happened. Then make further notes on your analysis of the situation, any comments you want to make, and any questions you pose to yourself that may guide further observations.
  • When to use
For many teachers, the time when students are engaged in writing offers an opportunity to demonstrate that teachers are writing, too. You can use a portion of your writing time for recording your anecdotes. Teachers who do not have these opportunities may use times when students are engaged in independent work. In program areas such as physical education and home economics, there are parts of the period when students change clothes or tidy up equipment. You might be able to use these times for recording entries. Whichever scheme is chosen, it should offer regular opportunities for entering observations.
  • How to record
Various formats have been developed. A notebook with each entry dated offers a powerful chronological record; although it is sometimes difficult locate a particular student. Alphabetized notebooks, looking like large address books, are available and they permit easy reference by student name. Alternatively, a loose leaf format may be used so that the entries may be entered chronologically, and at the end of the year may be reformatted by student name. One further idea: modern technology has provided us with conveniences for recording and storing student progress data that range from electronic student data files available on various software programs to removable self-stick notes that can be used to record the anecdote and then be affixed to the student record.
Example:          No example is required for the open-ended, unstructured anecdotal record. The examples that follow are formats for anecdotal records designed to give you ideas as to how to set up this type of data recording method. Keep in mind these are only examples.
Using the Information for Student Evaluation
While the entries themselves are usually not shown to the student or the parents/guardians, they can form a valuable basis for communication. They allow you to flesh out your year-end reports on the more holistic dimensions of student growth.
Observation Checklists Description
The observation checklist is a listing of specific concepts, skills, processes, or attitudes, the presence or absence of which you wish to record. If the observation checklist is used relatively frequently and over time, a longitudinal profile of a student is assembled and ultimately evaluated.
Evaluation Context
The observation checklist is most appropriately used in situations where you wish to assess your students' abilities, attitudes, or performance in process areas. For example, it can assess communication skills, cooperative learning skills, extent of participation, interest in the topic, and psychomotor skills.
Using Technique to Best Advantage
Used on a single occasion, the observation checklist can provide formative evaluation information for the situation in which it is used For example, to learn how effective students are when working in groups, a checklist to observe them in a single group session can be used. This will provide information to guide future instruction.
Observation checklists are most useful when collected over time and used summatively or diagnostically. Once you decide to use observation checklists in your evaluation plan, you must use them systematically. They are misleading when used sporadically.
Guidelines for Use
Usually the observation checklist is used during class time. Therefore, it must be simple. The most efficient way to collect data is to record learning progress on four or five students at the same time. If you choose to observe four students per lesson and you have 28 students, you will cover the class once every seven lessons. At the end of the term or unit, you will have several observations on every student. If your class is working in groups, do one group every day. If not, use your seating plan to identify groups of students sitting in the same area. If you choose students alphabetically, you may find that your eyes have to cover too much of the room in order to encompass the selected students.
  • Before the unit or course begins, develop an estimate of what would constitute appropriate learning outcomes for your students. If you intend to use the information for making criterion-referenced judgments, decide on what your criteria will be. You may wish to develop minimum criteria (e.g., "six of the eight behaviors must be observed over the course of the unit"), or you may wish to develop different criteria levels for what would constitute excellent, satisfactory, or unsatisfactory work. Decisions on criteria should be made before the observation sequence begins.
  • Before every class, enter the names of the students, the date, and the activity. During class, pay special attention to the selected group so that you build an impression of their level of competence or execution of the skills, processes, or attitudes you wish to record.
Recording options: You may simply mark an entry on the item's first appearance and leave it at that, or you may record an item's every appearance (e.g., Undisplayed Graphic). If you develop some measure of degree to describe the item (e.g., !, ?, or X), you have transformed your observation checklist into a rating scale. This is a characteristic of rating scales and checklists that gives you more flexibility. Make sure you record the date and the class on every observation checklist you use.
  • After class, annotate the checklist sheet with any appropriate thoughts. For example, "Fire drill interrupted the group activity - recorded instances are therefore lower than I anticipated." Ä File the checklist sheet with the others so that the class set is available for evaluation at the end of the course or unit. Large envelopes are useful here.
Example: The example checklists are designed to give you ideas as to how to set up this type of data recording technique. Keep in mind these are only examples.
Using the Information for Student Evaluation
Arrange the sheets into piles according to the student groups. Read them all over once or twice to develop a feeling for the overall class picture. For criterion-referenced judgments, refer to the criterion levels you made initially. For norm-referenced judgments, estimate where each student lies relative to the others in the class and make your judgment. If you have looked for very general or broad items, be careful not to over interpret your data - for example, "On these aspects of the course Kim seems to be performing a little bit more consistently than most of the students." This may be about the level of sophistication that is possible, depending on how you constructed the instrument. For self-referenced judgments, all the checklists on one particular student can be studied, providing a measure of progress over the span of the unit or course. This is one of the most powerful uses of the checklist.
  • Where you can, start with an existing checklist and modify it according to your needs.
  • Choose items that relate to the intended learning outcomes of the unit. If you wish to use checklists in several courses and they have many overlapping items, develop a master list and eliminate those items that are inappropriate for the specific unit or course.
  • Choose items that you can observe or reasonably infer. If an item is too vague (e.g., interest in the subject), you may not be consistent throughout the term in your estimation and recording of it.
  • Keep the list of items manageable. Twelve is about the maximum.
  • Keep the language of the items simple and jargon-free. In that way you can use the checklists at parent-teacher or student-teacher interviews.
Variants

Develop checklists that detail one particular series of components. For example, a checklist on the correct operation of a microscope may be useful in minimum competency situations where something just has to be done correctly.
As previously mentioned, the observation checklist shares many characteristics with the rating scale. This is an advantage that can be a time-saver for you.

Rating Scales Description
Rating scales are measuring instruments that allow representation of the extent to which specific concepts, skills, processes, or attitudes exist in students and their work.
Evaluation Context
Rating scales enable the teacher to record student performance on a wide range of skills and attitudes. They are particularly useful in situations where the student performance can be described along a continuum, such as participation in a debate or skill in preparing a microscope slide.
Guidelines for Use
As the rating scale is usually used during class time, it must be simple to use.
  • Developing the rating scale
Once you decide upon the activity you wish to rate, break it up into its constituent parts. Make the parts as specific as possible so as to increase the scale's reliability. For example, instead of globally rating "performance in debates," decide on what performance criteria you wish to observe in the student. Perhaps "states argument," "demonstrates background preparation," "responds to opposition arguments relevantly" might together give a less inferential picture of the student's performance than the rating on the global behavior alone.
The next task is to develop the scale points. You might use the old stand-by: "very good/good/ average/poor/very poor," or you can develop more descriptive scale points. For the criterion mentioned above, "states argument," you could choose to use points based upon how forceful the student was: "very forceful/forceful/average/ diffident/very diffident."
  • Before the unit or course begins
If you intend to use the information for making criterion-referenced judgments, decide on what your criteria will be. You may wish to develop minimum criteria such as, "six of the eight behaviors must be rated at the satisfactory level or higher over the course of the unit." Or you may wish to develop different criteria levels for what would constitute excellent, satisfactory, or unsatisfactory work.
  • Before every class
Enter the names of the students, the date, and the activity. This will usually be governed by the activity being rated. If Peter and Petra are facing off in today's debate, then theirs are the names entered.
  • Recording
As you form an impression of student behavior on each criterion, mark the point on the continuum.
  • After class
Examine the individual criteria and decide on an overall rating for each student on the total behavior being rated. File the rating sheet with the others so that the class set is available as a record. Large envelopes are useful here.

Example: In the first example provided, the full sheet on 'Performance in Debates' is developed. The other examples that follow are designed to give you ideas as to how to set up this type of data recording method. Keep in mind these are only examples.
Two Variants
Rating scales have many variants and any book on measurement will offer examples. Two variants are described here.
  • Self-evaluation
Rating scales are very useful in allowing students to perform self-evaluation on their own work. Present the student with a rating scale that covers the aspects of the unit or project which you wish him or her to self-evaluate. Examples may be the amount of effort expended in research, the amount of effort expended on initial organization, the extent to which the student reflected on the initial organization, the amount of reorganization, or the effort spent on writing. The student's ratings on the five-point scale can form a useful starting-point for teacher- student dialogue. 
  • Number line
The number line is a variant that is particularly useful with pre-reading students. On a long piece of paper, draw a horizontal line and mark off five to ten intervals. On the extreme left- hand mark, draw a sad face, at the mid-point draw a neutral face, and at the right-hand mark, draw a happy face. Mount the number line on the wall at a suitable height. The student then places the left palm on the sad face and, in response to a question (such as "How much did you like that story?"), positions the right palm accordingly. If the story was not a success, then both hands overlap on the unhappy face. By training the students to pass by the number line fairly quickly, you can obtain rapid feedback on the question you pose. With experience, more sophisticated questions can be asked. Here are examples from a unit on estimation. "When you guessed the number of peas in the pea pod that I showed you, how sure were you of your answer?" "Now, when you guessed the number of Smarties in the bottle, how sure were you?"