Translate

Showing posts with label Information. Show all posts
Showing posts with label Information. Show all posts

Cyber Crime from Sold Devices

 Cyber Crime from Sold Devices

-Dr. Lalit Kumar Setia

Mobile devices, notepads, laptops, and computers each device has its memory and the user usually stores the information including his/her credentials in the device. Do you know if you sell the device to someone unknown after a few times, it can be harmful to you?

Cyber Crime from Sold Devices

Sold Device as a Weapon of Cybercrime

Cybercrime is usually done by cybercriminals. The cybercriminals stole the personal information stored on the devices and misused it for getting money or selling contacts, selling confidential information to the hackers, etc.

Do not sell the used devices in junk

Even selling used devices in junk to the hawkers roaming in nearby places, can be harmful. There are people who agree to give money for old devices especially Android-based devices. If you have an old device, for example, a mobile whose screen was broken in the past and was unrepairable. It is alright that the device is not usable for you now, but selling it in junk can be harmful or your biggest mistake.

Recovery of useful data from the sold devices

Now a day, there are a lot of criminals, looking for sold devices that become useless, so that they can recover confidential information from the devices. For example, your Google account access is possible if you have not logged out in the Gmail app of an old device. Similarly, your other apps login can be misused to find your passwords for such apps.

Online Frauds from Confidential Information

The confidential information is used for making a collection of information for each user targeted by the cybercriminals. In most cybercrimes, the police found the sold devices in the rooms of the cybercriminals caught at regular intervals.

Do not respond with account details to unknown people

Whether you are using PhonePe, PayTM, Google Pay, and MobiKwik, or various apps for e-payments on Android devices; do not share your account information especially the three-digit CVV number and OTPs sent by the bank; with anyone else. Use yourself for making the payments online without showing the same to others.

If any cyber-criminal is using your sold device, you can be accused in the eyes of the Police:

Do you know, that if you purchased a device and registered firstly with your Gmail identity on that device, the device will show you the first registered person forever? In case, any crime is committed using that device and the police start recovering the data from that device, you will be the first accused in the eyes of the police. The device will show you the first user, registered the Gmail identity in that mobile. The cybercriminals never use their original new mobiles for crimes, instead, they use the sold devices only so that in an investigation of the police, the accused becomes the one in whose name, the mobile is first registered. In order to complete the investigation, the police can call you to their concerned police station and you have to go there to support the police. It may be inconvenient for you also.

What to do with the old mobiles or devices?

Even if anyone tries to do factory settings or completely erase the confidential information from the device; the information can be recovered with the help of advanced apps and software. Once information is stored, it can be recovered anytime in the future. In such circumstances, what to do with the old mobiles or devices?

Keep the old device with you lying idle:

One solution is to keep the device always with you, even after it becomes old. In rural areas, people usually keep their old mobiles with them lying idle however, they are not very aware of selling it to an unknown person, which is why the hawkers usually tell them to sell the devices. It is recommended to never sell the devices to the hawkers.

Use it in the Home Security System

Secondly, the old devices can be converted and used for home security systems. The vendors of home security systems have apps to make your old device used in home security.

Use it for giving Internet access to your children

Even if you are not putting the sim card in the old device, the device can be connected with the help of a Wi-Fi connection and the internet can be used in that old device. The children can use the internet for educational purposes and in this way, it can be fruitful to your children.

Sell the device to an e-waste company

Finally, if you don’t want to keep it, then sell it to an e-waste company. The recycling of mobile or laptops is not possible for all. There is a need for advanced tools to treat the e-waste as per the policies of the Government. The companies also offer to give the old mobile back to them while taking a new mobile, however, we may not trust even the companies. The right way is to delete and erase the confidential information and then reinstall the apps of games or fill the memory of the mobile with movies or video clips. Watch the same for a few days. Make the memory fully stored and then sell the device to an e-waste company. In such a case, it will be impossible to retrieve confidential information from your old mobile or device.

*Copyright © 2021 Dr. Lalit Kumar. All rights reserved.

This content is written by Dr. Lalit Kumar Setia; a renowned author and trainer. He completed his Doctorate in Commerce from Kurukshetra University Kurukshetra and MBA in Information Technology from GJU, Hisar. He also wrote two books, 15 research papers, and organized more than 200 Training Courses during his working period since 2006 in Haryana Institute of Public Administration, Gurugram. The article was published on 7th November 2021 and last updated on 7th November 2021. The writer can be contacted on lalitkumarsetia@gmail.com 

More Articles

बेचे गए उपकरणों से साइबर अपराध

-डॉ. ललित कुमार सेतिया

मोबाइल डिवाइस, नोटपैड, लैपटॉप और कंप्यूटर प्रत्येक डिवाइस में उनकी मेमोरी होती है और उपयोगकर्ता आमतौर पर डिवाइस में अपनी साख सहित जानकारी संग्रहीत करता है। क्या आप जानते हैं कि अगर आप डिवाइस को कुछ समय बाद किसी अनजान को बेच देते हैं तो यह आपके लिए नुकसानदेह हो सकता है?

साइबर अपराध के हथियार के रूप में बिक गया उपकरण

साइबर अपराध आमतौर पर साइबर अपराधियों द्वारा किया जाता है। साइबर अपराधियों ने उपकरणों पर संग्रहीत व्यक्तिगत जानकारी को चुरा लिया और पैसे प्राप्त करने या संपर्क बेचने, हैकर्स को गोपनीय जानकारी बेचने आदि के लिए इसका दुरुपयोग किया।

इस्तेमाल किए गए उपकरणों को कबाड़ में न बेचें

यहां तक ​​कि आस-पास घूमने वाले फेरीवालों को कबाड़ में इस्तेमाल किए गए उपकरणों को बेचना भी हानिकारक हो सकता है। ऐसे लोग हैं जो पुराने उपकरणों के लिए विशेष रूप से एंड्रॉइड-आधारित उपकरणों के लिए पैसे देने के लिए सहमत हैं। यदि आपके पास कोई पुराना उपकरण है, उदाहरण के लिए, एक मोबाइल जिसकी स्क्रीन पहले टूट गई थी और मरम्मत योग्य नहीं थी। यह ठीक है कि डिवाइस अभी आपके लिए उपयोग करने योग्य नहीं है, लेकिन इसे कबाड़ में बेचना हानिकारक या आपकी सबसे बड़ी गलती हो सकती है।

बेचे गए उपकरणों से उपयोगी डेटा की पुनर्प्राप्ति

आजकल, बहुत सारे अपराधी ऐसे बेचे गए उपकरणों की तलाश में हैं जो बेकार हो जाते हैं, ताकि वे उपकरणों से गोपनीय जानकारी प्राप्त कर सकें। 

उदाहरण के लिए, यदि आपने किसी पुराने डिवाइस के जीमेल ऐप में लॉग आउट नहीं किया है तो आपके Google खाते तक पहुंच संभव है। इसी तरह, ऐसे ऐप्स के आपके पासवर्ड खोजने के लिए आपके अन्य ऐप्स लॉगिन का दुरुपयोग किया जा सकता है। 

गोपनीय जानकारी से ऑनलाइन धोखाधड़ी

गोपनीय जानकारी का उपयोग साइबर अपराधियों द्वारा लक्षित प्रत्येक उपयोगकर्ता के लिए जानकारी का संग्रह करने के लिए किया जाता है। अधिकांश साइबर अपराधों में, पुलिस ने नियमित अंतराल पर पकड़े गए साइबर अपराधियों के कमरों में बेचे गए उपकरणों को पाया। 

अज्ञात लोगों को खाता विवरण के साथ जवाब न दें

चाहे आप PhonePe, PayTM, या Google Pay और Mobiqwik का उपयोग कर रहे हों, Android उपकरणों में ई-भुगतान के लिए विभिन्न ऐप; अपने खाते की जानकारी विशेष रूप से बैंक द्वारा भेजे गए तीन अंकों के सीवीवी नंबर और ओटीपी को साझा न करें; किसी और को। दूसरों को यह दिखाए बिना, ऑनलाइन भुगतान करने के लिए, स्वयं का उपयोग करें।

यदि कोई साइबर अपराधी आपके बेचे गए उपकरण का उपयोग कर रहा है, तो पुलिस की नजर में आप पर आरोप लगाया जा सकता है:

क्या आप जानते हैं, यदि आपने कोई उपकरण खरीदा है और उस उपकरण में अपनी Gmail पहचान के साथ सबसे पहले पंजीकृत किया है, तो वह उपकरण आपको हमेशा के लिए पहला पंजीकृत व्यक्ति दिखाएगा? 

यदि उस डिवाइस का उपयोग करके कोई अपराध किया जाता है और पुलिस उस डिवाइस से डेटा को रिकवर करना शुरू कर देती है, तो आप पुलिस की नजर में पहले आरोपी होंगे। डिवाइस आपको उस मोबाइल में पंजीकृत जीमेल पहचान वाला पहला उपयोगकर्ता दिखाएगा। साइबर क्रिमिनल कभी भी अपने ओरिजिनल नए मोबाइल का इस्तेमाल अपराधों के लिए नहीं करते हैं, बल्कि बेचे गए उपकरणों का ही इस्तेमाल करते हैं ताकि पुलिस की जांच में आरोपी वही बन जाए जिसके नाम पर सबसे पहले मोबाइल रजिस्टर हो। जांच पूरी करने के लिए पुलिस आपको अपने संबंधित थाने में बुला सकती है और आपको वहां पुलिस की मदद के लिए जाना होगा। यह आपके लिए असुविधाजनक भी हो सकता है। 

पुराने मोबाइल या डिवाइस का क्या करें?

यहां तक ​​कि अगर कोई फ़ैक्टरी सेटिंग करने का प्रयास करता है या डिवाइस से गोपनीय जानकारी को पूरी तरह से मिटा देता है; जानकारी को उन्नत ऐप्स और सॉफ़्टवेयर की सहायता से पुनर्प्राप्त किया जा सकता है। एक बार जानकारी संग्रहीत हो जाने के बाद, इसे भविष्य में कभी भी पुनर्प्राप्त किया जा सकता है। ऐसे में पुराने मोबाइल या डिवाइस का क्या करें?

पुराने उपकरण को अपने पास बेकार पड़े रखें

एक उपाय यह है कि डिवाइस को हमेशा अपने पास रखें, भले ही वह पुराना हो जाए। ग्रामीण क्षेत्रों में, लोग आमतौर पर पुराने मोबाइल को बेकार पड़े रहते हैं, हालांकि, उन्हें इसे किसी अज्ञात व्यक्ति को बेचने के बारे में ज्यादा जानकारी नहीं होती है, इसलिए फेरीवाले आमतौर पर उन्हें उपकरण बेचने के लिए कहते हैं। यह अनुशंसा की जाती है कि फेरीवालों को उपकरण कभी न बेचे जाएं।

गृह सुरक्षा प्रणाली में इसका इस्तेमाल करें

दूसरे, पुराने उपकरणों को परिवर्तित किया जा सकता है और घरेलू सुरक्षा प्रणालियों के लिए उपयोग किया जा सकता है। गृह सुरक्षा प्रणालियों के विक्रेताओं के पास आपके पुराने उपकरण को गृह सुरक्षा में उपयोग करने के लिए ऐप्स हैं।

अपने बच्चों को इंटरनेट एक्सेस देने के लिए इसका इस्तेमाल करें

अगर आप पुराने डिवाइस में सिम कार्ड नहीं लगा रहे हैं तो भी डिवाइस को वाई-फाई कनेक्शन की मदद से जोड़ा जा सकता है और उस पुराने डिवाइस में इंटरनेट का इस्तेमाल किया जा सकता है। बच्चे इंटरनेट का उपयोग शैक्षिक उद्देश्यों के लिए कर सकते हैं और इस तरह यह आपके बच्चों के लिए उपयोगी हो सकता है।

डिवाइस को ई-वेस्ट कंपनी को बेचें

अंत में, यदि आप इसे नहीं रखना चाहते हैं, तो इसे किसी ई-कचरा कंपनी को बेच दें। मोबाइल या लैपटॉप की रिसाइकलिंग सभी के लिए संभव नहीं है। सरकार की नीतियों के अनुसार ई-कचरे के उपचार के लिए उन्नत उपकरणों की आवश्यकता है। कंपनियां नया मोबाइल लेते समय पुराने मोबाइल को वापस देने की पेशकश भी करती हैं, हालांकि, हम कंपनियों पर भी भरोसा नहीं कर सकते हैं। सही तरीका यह है कि गोपनीय जानकारी को हटाकर मिटा दिया जाए और फिर गेम के ऐप्स को फिर से इंस्टॉल किया जाए या मोबाइल की मेमोरी को मूवी या वीडियो क्लिप से भर दिया जाए। कुछ दिनों तक ऐसा ही देखें। मेमोरी को पूरी तरह से स्टोर कर लें और फिर डिवाइस को किसी ई-वेस्ट कंपनी को बेच दें। ऐसे में आपके पुराने मोबाइल या डिवाइस से गोपनीय जानकारी प्राप्त करना असंभव होगा।

*कॉपीराइट © 2021 डॉ. ललित कुमार। सर्वाधिकार सुरक्षित।

यह सामग्री डॉ ललित कुमार सेतिया द्वारा लिखी गई है; एक प्रसिद्ध लेखक और प्रशिक्षक। उन्होंने कुरुक्षेत्र विश्वविद्यालय कुरुक्षेत्र से वाणिज्य में डॉक्टरेट और जीजेयू, हिसार से सूचना प्रौद्योगिकी में एमबीए पूरा किया। उन्होंने 2006 से हरियाणा लोक प्रशासन संस्थान, गुरुग्राम में अपनी कार्य अवधि के दौरान दो पुस्तकें, 15 शोध पत्र लिखे और 200 से अधिक प्रशिक्षण पाठ्यक्रमों का आयोजन किया। लेख 7 नवंबर 2021 को प्रकाशित हुआ था और अंतिम बार 7 नवंबर 2021 को अपडेट किया गया था। लेखक से lalitkumarsetia@gmail.com पर संपर्क किया जा सकता है।

अधिक लेख

https://drlalitsetia.blogspot.com/p/new-articles-study-material-notes.html

Automation and Using Information Technology

 Automation and Using Information Technology

By Dr. Lalit Kumar Setia

Information Technology is taking its place in every field of life and Financial Management to improve Governance at workspace requires to be reformed with the help of using Gadgets, Software, and the latest technological tools.

I planned and designed a module on “Information Technology in Effective Financial Management and Accounting” on the demand of various government departments and HAFED. It is worth mentioning here that the Drawing and Disbursing Officers in Government Government are supposed to follow Punjab Financial Rules strictly to avoid audit objections. In today’s age, it is a must to use information technology in communicating with e-mail, exploring sites or content online, social networking, writing articles and reports, using MS-Excel software, and designing app & web pages for building personal repo around the world. The Government officers are supposed to use information technology in routine official functions. The students of even matriculation are nowadays well versed with the use of information technology and to upgrade the skills of officers, it is a must to learn using IT tools in office and personal life. Financial management comprises budgeting for estimating revenues and expenditures and accounting for keeping records of financial transactions. It is a must to firstly understand the difference between expenses and expenditures. It is also must to know about Economic Order Quantity (EOQ), funding patterns including the use of Public-Private Partnership (PPP) and private partners as outsourcing. It is also explained in the class, the difference between outsourcing and PPP.

How it helps in improving Governance

With the change in the governance during the last decade, the head offices of government are framing Result-oriented Framework Document (RFD) to fix the accountability with maximum use of Standardized Operating Procedures (SoPs). The Human Resource Management System (HRMS) is being connected with salary to fix the account directly and Human Resource Accounting (HRA) will be the next step to provide performance-linked pay and ensure full exploitation of resources including human resources. The practical examples of using spreadsheets in estimating revenues, expenditures, and computing economic order quantities made the sessions more interesting. The first day of the course remained totally full of practical examples and exercises. The types of accounting including cash basis, accrual basis, single-entry book-keeping, and double-entry bookkeeping methods with the procedures to switching from manual to computerized accounting have also been discussed. The sessions on this topic improves the capacity of government officers to prepare the budget estimates using excel spreadsheets and a discussion on types of accounting and book-keeping made them competent to understand financial functions more effectively. I usually am invited to various esteemed organizations for delivering sessions on these issues.

Software for improving Management 

Today in the era of technology, automation is everywhere. The time-consuming complex processes are being replaced with automated software-based processes. The chances of manual errors were reduced significantly. It will not be surprising if the procurement through GeM becomes automated in near future on the basis of the level of inventory set as a minimum reserve in the storeroom of a Government office. How to design software to support the management, in Haryana, the modules are prepared and implemented in an amazing way to enhance the efficiencies. A course is designed to inculcate the same skills in Officers/officials so that the time and efforts can be saved and the resources are fully utilized. The departments which are not using software and modules; are suffering from inefficiencies. 

Automation and using Information Technology

During the Covid-19 times, most of the organizations decided to work from home, and innovative ways were incorporated to perform the organizational activities. The software not only streamlines the organizational processes but also makes the employees realize more job satisfaction from their efforts. The employees also learn to manage time more effectively and the use of virtual meetings, virtual training, and software-based outcomes can easily measure their real-time performance. 

It's time to be well managed and utilize the resources more effectively. How to do it, require skills which I inculcate usually in my classes. A new course designed for the Officers / Officials of the Government of Haryana:

Course on Digitalization of Service Records (HRMS) and Records Management

Haryana State Training Policy, 2020 is committed to equipping all functionaries of Government with adequate knowledge and skills, bringing about positive attitudinal changes, and building capacities to enhance performance. 

The main objective of the above course is to build and enhance the capacities of officers to digitalize the service records as per the latest guidelines of the Haryana Government on implementing Human Resource Management System (HRMS) and also to maintain the records properly with weeding out old records as per rules of Government.

What needs to be computerized in Office?

The Accounting, Invoicing and tax compliance-related procedures are already computerized in most of the offices relating to Boards and Corporations of Government. The public sector undertakings (PSUs) are facing competition from the private sector players, need to automate the functions for improving efficiency to a great extent. I have designed courses especially to sharpen the skills in the following areas:

a. Use of Technology to automate compliance of financial rules in managing expenses: 

It is possible to use Google forms for ensuring a proper system of approvals in each office and for automate purchase orders, prepare invoices, make reimbursement of expenses easily, and also for posting entries or booking expenditures. 

b. Reconciliation of accounts to trace embezzlements

Tracking expenses is easy but when the number of expenses every day increases to a significant level, it becomes difficult to trace and track any file or case relating to an expense. The cloud-based solutions can easily be used for automatic reconciliation of accounts and giving the red signals to the exceptions for consideration of the executives. 

c. Business Applications in Government Offices

The Government has adopted a Double Entry System in most of the departments working under the direct control of the Government. The double entry system is also used in business organizations of the private sector. Whatever business applications with automation are used in the private sector, the same business applications can be adopted in Government offices. For example, the private organizations use Customer Relationship Management (CRM), the government organization may design and use Citizen Relationship Management (CRM) with rating each citizen of the state or country. 

How to design software for Government organizations:

The National Informatics Centre is the primary organization for designing specific software in Government offices. Four things should be taken care of while giving directions to the NIC for designing a specific software i.e. Estimated Expenditure or Budget Availability, No leakage of privacy or security of confidential information, the feature of the software to scale it up for large level applications, and information is stored either on systems of NIC or on clouds. 

It is fact that the use of automation software increases the efficiency in functions but everything cannot be computer-based. 

*Copyright © 2018 Dr. Lalit Kumar. All rights reserved. 
This article is written by Dr. Lalit Kumar Setia; a renowned author and trainer. He completed his Doctorate in Commerce from Kurukshetra University Kurukshetra and MBA in Information Technology from GJU, Hisar. He also wrote two books, 15 research papers, and organized more than 200 Training Courses during his working period since 2006 in Haryana Institute of Public Administration, Gurugram. The article was firstly published on 8th July 2017, and last updated on 14th October 2021. The writer can be contacted on lalitkumarsetia@gmail.com 
Read more content:

SWOT Analysis for Skills Development in Employees

SWOT Analysis

SWOT Analysis for Skills Development in Employees

By Dr. Lalit Kumar Setia |  @drlalitsetia  |  drlalitsetia@gmail.com  |  September 8, 2018 7:50 p.m. PDT
The strengths and weaknesses are those internal abilities on which basis, a person is either able or not able to achieve a specific objective. Which things are not in the control of a person are known as opportunities and threats. If there are weaknesses (lack of internal abilities) in a person and he gets chances from external environment to eliminate the weaknesses, those chances will be known as opportunities. The strengths of a person makes him skilled and he becomes capable to earn money.

Commitment for achieving Goal: 

If you have decided that this is my goal and that will definitely be achieved by me. Then you will be more attentive because accordingly you will build your staff, connections, network and you will be ready to go through the required steps for achievement of goals.  

Communication Skills: 


It is must to examine and identify the level of communication skills. Effective communication skill is considered as strength while lack of communication skill considered as weakness. The communication skills help each individual to state his problem in a proper way either in written mode or in verbal state. If a person is able to sort out his complaints or problems by discussion with others, then your communication skills are effective.

Interpersonal Skills:




These are also known as negotiation skills. Through these skills, a person utilizes his abilities by his speech and transforms the things according to his requirements. In a certain situation of conflict, a person identifies the root cause of the conflict and then using interpersonal skills, the person transforms the situation in his favour; that is the real use of interpersonal skills.

Caring Nature: 




Suppose any work is stopped and you are also unable to do that work. If you are of caring nature, then your colleagues and staff will definitely support you and they will also help you in getting the work done. But if you are not equipped with caring nature then your image will be dented in the minds of others. Even if you are competent to perform a task, the others will intervene to make your work suffered. That can also be happened due to lack of caring skills.

Knowledge of rules:  




If you are equipped with this strength, then more than 50% work becomes easy in government offices. You will remain conscious what should be done and what should not be done. If you are not enough aware of rules, then you are unconscious about the rules and in such case, if something wrong is happening in your office, even then you will not be able to realize the wrong things being happened.

Interpretation Skills:




Suppose you received a circular but you have doubt in interpreting the written content of the circular. Means you are unable to interpret either the terminology is difficult or your perspective is different and you have doubt to interpret the real sense of the circular. The circular contains such words which are deriving multiple meanings. Normally, such circulars are issued in offices and in that case, the sense of letter is mis-interpreted by the employees in order to get their work done as per their convenience. The intention or objective behind each issued circular, order, or letter is normally hidden and doesn’t communicated by the government. Because the objective is not known or silent for the employees, it becomes impossible to clearly interpreted the letters. In case, an employee is well equipped with the interpretation skills then to a great extent, he becomes successful in clearly interpret such letters.

Maintenance of Daily Expenditure:




If you keep the track record of day to day expenditures being spent in your office, then you will be able to accurately estimate the budget for the next financial year. Generally, what happens in offices during budget estimation, just pick the estimates sent in previous year, add 10% or 20% more in the same amounts and then send as current year’s budget estimates. But in case, an office maintains record of day to day expenditures properly then that record helps in accurate estimation of the budget. If the statements are available of monthly expenditures, quarterly expenditures then the head of office can confidently state that next year, my office expenditures will be approximately of such and such amount.

For example, let us take an example of your domestic expenditures. Suppose you get the salary and then require to estimate how much to save and how much to spend in the beginning of the month. If you are maintaining the record of your monthly expenditures, then you can save & invest a particular amount in the beginning of the month and even you will not face any problem during the month due to such saving. But if you have no record of monthly expenditures, then there will be no problem. However, a person should keep a margin of safety for uncertain activities which can happen. For example, in case of inflation, it is possible that the monthly expenditures during a particular month exceed than the previous month. 

You may have seen the process of estimating the amount going to be incurred in a work contract. When you invite a tender if the tender is of one year. The firm or vendor applying for the quote always keep in mind those factors which can create the sufferings in execution of the contract and keeps a margin of safety to contain such uncertainties. The firm or vendor quantifies various risks related to quality control, inflation and for each risk, a certain amount is added in the quote, so that the chances of loss from that work contract can be reduced. The process of quantifying the risks and adding value in quote. Similarly, a head of office can also keep a margin of safety in estimating the budget for the official works. However, if there is proper record of actual expenditures available with the head of office, then he can more accurately estimate the amount of expenditures.

Today, all participants have completed the SWOT Analysis, this analysis can be done at any time in future even with sitting in your offices. After such analysis, you be aware how to know the strengths and weaknesses. The SWOT analysis also tells you where you require to improve your internal abilities.

How to collect data and information:



if you are committed and you are conscious regarding your incompetency or weaknesses. After being conscious (i.e. aware of your incompetence), you require to gain knowledge in the concerned area. Without knowledge, the commitment is useless. The commitment works after gaining knowledge. It is commitment that transforms the knowledge into the skill. When a person become habitual for a particular work by performing it again and again; then it becomes part of his personality known as attitude. There are three terms i.e. K, S, A. These terms are related to training, Knowledge, Skills, and Attitude. If you have knowledge and you adopt the knowledge in practice, it will become skill. After gaining the skill, when practice become too much that the skills imparted in the personality in the form of habit, it becomes attitude. In order to build up the image and realize success in life, a person should enhance all the three. These three things are so powerful that a person can become from Zero to Hero; given the person took these three things seriously and gain with concentration and commitment.
After SWOT Analysis, the areas of weaknesses which are due to lack of knowledge, then the areas are required to be improved through gaining the knowledge by exploring the internet.
There are two things which are most popular to gain knowledge through internet i.e. Google and Youtube.


Auto_1

Horizontal Responsive1

Popular Posts

LoP_1

Special Offer!

Funny Baba

Free Seminars

Featured post

Dr. Lalit Setia CV

Free Notes

Tips to Grow

Earn Money

Popular Posts

Free Download

Tax Saving

Fun in Life

Labels

Professional Guidance Government Income Tax Tax Deduction at Source General Knowledge Important Questions Income Tax TDS Accounting Deduction Governance Haryana Income Tax Return Latest Questions Competitive Examination Current Affairs Drawing and Disbursing Officer Audit Auditing Covid Financial Financial Management Financial Terminology Goods and Services Tax India Knowledge Lalit Kumar Lalit Kumar Setia Money Skills Tax Planning Virus Accounts Attitude Banking Compliance Currency Economic Problem Employee Facts Free Notes Functions GST Government Accounting Government eMarketplace Incomes Information Interest Omicron Virus Organization Payment Science Scientific Causes Section 80C TDS on GST Tips Tricks Very Important Questions answers Administration Advance Tax Anti-Virus Automatic Back Up Balance Sheet Bitcoin Certificate of TDS Computer Control Corruption Creativity Cryptocurrency DDOs Deductions Deductor Deductors Development Dr. Lalit Kumar Duties EPS Economy Employer English Evaluation Example Expenditure FAQs Finance Financial Accounting Financial Administration Financial Control Frustration GeM General Studies Geography Google HRA Information Technology Investment Life Management Meditation Omicron Performance Planning Positivity Process Procurement Public Public Administration Public Services Purchase Matters Questions on General Studies Resources Resume Saving Services Stress Success System Tax Collection Taxable income Technique Technology Tender Training Trust 26AS 80GG 80GGC AIS Statement ATM Abatement Abbreviations About Dr. Lalit Setia Accountant's Duties Accounting Heads Accounting Standards Accounts Branch Accrual Accumulated Fund Act Action Administrative Admissibility of DA Advance Allowance Almighty Amalgamation Amazon Amount Amrapali Group Android Annual General Meeting Annual Information Statement Anomaly Anti-Corruption Anti-virus Protection Antonyms Appraisal Appreciation Arbitrator Arrears Articles of Association Asset Auctio Audit concerns in procurement Automated Teller Machine Automatic Teller Machine Autorised Capital Average Award Bad Debts Balance of Payments Bankrupt Barter Benchmark Bhagat Prahlad Bid Bikaner Bio-Data Bitcoins Bitcoins Network Block Chain Blood Breathing Bribe Buddha Budget C M Window CV Canada Cards Caring Nature Cash Book Cash Flows Central Bank Chapter Character China Clerks Commitment Common Man Communication Communization Competitive Examinations Computation Computer Virus Computerization Conflict Contacts Contribution of Employees Corona Crime Crude Oil Culture Curriculum Vitae Custody Cyber Cybercrime Data Dearness Allowance Debit and Credit Decision Making Deduction under section 80GG Delay in Service Delhi Department Dera Sacha Sauda Desktop Devices Digital Transformation Double Click Double Entry System Dr. Lalit Setia EPF Earnest Money Deposit Earning Money Economic Growth Electronic Payment System Employment Energy Solutions Environment Evasion Examination Exempt Exemption Exemptions Expenditures Experience Exploitation Facebook Failure Festivals Final Accounts Financial Rules Financial Statements Formula Frauds Games General Generation Gap Goals Google search bar Government Deductor Government Officers Grades of Employees Gurmeet Ram Rahim Singh HRMS HUF Harish Chandra Higher Education Hindu Undivided Family History Home Loan House Building Advance House Property House Rent Allowance How to stay protected Human Resource Management System Humanity IAS Officers IT Skills ITR Importance Income Statement Income Tax Changes Income Tax Refund Income and Expenditure Account Income from Gifts Indirect Cost Innovation Internet Interpersonal Interpretation Inventory Inventory Management Investigation Investments Irregularities Jiomeet App Jokes Kids Labour Laptop Laundering Leadership Leadership Tussle Learn Learn English Learn Excel Shortcuts Learning Ledger Ledgers Liquidity Logical Lokpal Lost Crypto currencies Love MS-Office MS-Word Maldives Mankind Mask Material Mathematics Matters Meaning Measurement Equipment Meerabai Messages Methods Minimum Income Scheme Misuse Mitigation Mobile Monitor Monitoring Morality Motivation Mumbai Lockdown NPS National Highways National Pension National Pension System Nationwide Payment News Non Performing Assets Non-performance Official Life One Liner Questions Outstanding PAN number Pakistan Parents tips Pebbles Penalty Pension Per Day DA Petroleum Phonebook Practices Prevention Prices Prime Minister Private Gain Probability Problem Procedure Protection Publica Publishing Purchase Question Quotation Quotes Rational Decisions Rebate Reforms Register Registration Relationship Rent Paid Reporting Research Retirement Robert Vadra SAP SWOT Analysis Saint Ravi Dass Salaries Saudi Arabia Scam Scientific Searching emails Section 234 (a) Section 234 (b) Section 234 (c) Section 87A Security Security of Bitcoins Self Growth Shortcut Smashwords Social Activists Software Space Speculation Spyware Standard Deduction Standard Deduction on Salaries Standards Statistics Story on Husband and Wife Study Material Sugamya Pustakalaya Superintendent Symbols Symptoms of Omicron Synonyms TA Rules TAN TDS Payment Talent Search Tax Credit Taxation Taxpayers Techniques for fast and efficient work Thought Tips for Students Toddlers Tools of Rulers Tourism Trial Balance Type UCP Uncertainty Unemployment Uniformity Unique Code of Payee United States of America Users Using Asterisk Using Quotes Using Site Using minus Utilization Utilization Certificate Vigilance Bureau Whatsapp Working Capital e-Payments e-filing eMarketplace eProcurement financial procedures gmail immunity innovative solutions pandemic records management red-handed speed vaccine बैंकिग मापने वाले यंत्र राष्ट्रीय राजमार्ग

Happy Moments

Learn and Update

Popular Posts

Auto_1

Horizontal Responsive1