200 rupees note will come in market from September, government issued notifications

The Reserve Bank of India will issue a new note of 200 rupees in the first week of September or by the end of this month. This will be the first time in the country, when 200 rupees note people will be able to use. RBI will make this note available across the country through banks and ATM machines. The central government has issued notification for this.
See Government notification here

Read - A note of 200 rupees will come to your hands, Reserve Bank of India gave the green signals

Steps taken to prevent black marketing
According to the Economic Times, RBI has already taken steps to prevent black marketing of Rs 200 notes. RBI hopes that people will take hands on new notes and hoard up. To avoid this, 50 crore notes have been printed so that they do not have any deficiency in the whole country.

No currency notes between 100 and 500
An official of the RBI told that there is no note between Rs 100 and Rs 500 notes. For this reason people can use more of this new currency note. This note is expected to be of much use in small expenses.

2000 note was hoarding
When the RBI issued a note of 2000 after the ban, people started hoarding it. It is going to launch a new note market of 200 after the central bank prepared for taking lessons and prevent hoarding. Please note that there were 1,717 crores of 500 notes before circulation and 686 million notes of 1000. According to SBI Research, the share of large notes after the ban was reduced by 70 per cent.

How to open ports in whm/vps hosting - by eknumber information

1. Step 1: Login to WHM.
2. Step 2: Type firewall in Find bar and click on ConfigServer Security&Firewall link.

3. Step 3: After searching keyword, you will see following option "Firewall Configuration" which is highlighted in following image.

4. Step 4: After clinking firewall configuration you will see following screen, on this you have to search "TCP_IN" keyword.
Note: for searching keyword on browser press Ctrl+F, you will get one text box popup type there "TCP_IN" keyword

5. Step 5: (1) In TCP_IN textbox you have to add your port number with cama as displaying following eg. "8008" (2) after adding port, click on Change Button it will be save (3) then click on Return Button like following screen.

6. Type firewall in Find bar and click on ConfigServer Security&Firewall link.

6. Step 6: After click on return button, you will redirect to following screen where you have to click Restart csf+lfd Button

7. Step 7: you will get setting update done successfully message.


Keep track of these things to avoid credit card fraud

New Delhi (JnN). If you are also a credit card holder, then you can not deny that you can be a victim of fraud like millions of people in the world. In the 80's, there was tremendous increase in the use of credit, debit and pre-paid cards internationally. According to the Nielsen report on October 1, 2016, 31 million US dollars was withdrawn in 2015 through these payment systems globally. This figure is 7.3 percent more than the year 2014.

During the year 2015, seventh of the eight purchases in Europe were used to purchase electronic media payment systems. Although there is also a separate loss of shopping from the cash to the electronic medium shift. There are many types of frauds in relation to credit cards, which vary with changing technology, so it is almost impossible to list all frauds associated with credit card in one place. But still there are two types of credit card fraud ...

Card Not Present Fraud (CNP):

This, the most common type of fraud occurs when the cardholder's information is stolen and such fraud is done without the physical prominence of the card. This kind of fraud is usually through online phishing mail, and the result is that a phishing mail is sent to you from the fraudist and after clicking on the link given to this mail, you have information about hackers She goes away.

Card Present Fraud:

Such frauds are usually low: but it is still being used. It usually occurs in the form of skimming. The cellar switches the consumer's credit card to the device so that the information can be stored. Once the data is used for purchase, the consumer account is charged from the account.

Fraud's fear of credit card gets even faster because it is a process of two steps: authorization and settlement.

How to Avoid This Fraud:

First, do not click on any mail link in which you have been asked for your personal details, even if the sender is of your respective bank.

Second, before buying anything from any unknown cellar through online medium, search the name of vendor on Google and see what kind of feedback the consumer has given to it.

By Surbhi Jain

There are many such villages in India. Who have their own identity. total villages in india, cleanest city in the world, cleanest village in india, india map with cities and villages, best village in india, poverty in india

total villages in india,

1. The sunrise first happens here:

There is a village on the border of Myanmar and China. Whose name is 'Dong'. The population of this village is very low. But believe in the first sunrise here in India only people see. The sun rises at 5 am to 55 minutes in the morning and at 4:30 in the evening.

How to reach: 200 km away from Teju from Arunachal Pradesh. You can easily go from bus or private vehicle here.
cleanest city in the world,
2. The cleanest village in Asia:

Mavelang Indian state is a village in eastern Khasi Hills district of Meghalaya. Mawlong is known for its cleanliness. The waste stuff is put in the garbage made from bamboo and its manure is prepared by putting it in a paddle. In 2003 this village was declared as the clean city, village of India in Asia and in the year 2005.

How to reach: Shillong is located at a distance of 90 kilometers to the India-Bangladesh border. You can go by bus or taxi.
cleanest village in india,
3. Safe Village:

Shani Shiganapur village in Maharashtra is considered to be the safest. Actually people do not put a door in their homes and shops, nor do they lock a lock. According to local beliefs, God Shani protects them.

How to reach: From Shirdi you can easily reach here by road.

india map with cities and villages,
4. The most educated villages:

Dhora village in Aligarh, Uttar Pradesh is considered to be quite read-written. It is at the top of the list of the most educated villages. There are close English medium schools here. The education rate here is about 75 percent.

How to get: Aligarh, you can catch the bus directly to the village.

best village in india,

5. Surrounded by sunlight village:

For 30 years, in Dharanai village of Bihar, it is completely dependent on the solar panel. There was no pill for electricity. The whole village is flabbergasted only by just and only solar energy. There is a solar powered micro grid which provides electricity for 24 hours.

How to reach: This village is located 26 km away from Gaya of Bihar.
poverty in india
6. Highest village village:
Pansari village of Gujarat is quite hitech. Here you will find everything from AC to Wi-Fi optic fiber billboards and mini bus transport. There are CCTV cameras on each pillar.

How to reach: This village is located 74 km from Ahmedabad. Here is the nearest railway station.

7. The richest village:

There is a village named Hivere Bazar in Ahmedabad, Maharashtra. Where one does not have 60 millionaires live. There is hardly any family that comes down from the poverty line.

How to reach: Around 20 km away from Ahmednagar.

8. First Green Village:

Khonoma village of Nagaland is the most green. Here you will find greenery around. It is also called India's first green village. Cutting trees is strictly forbidden here.

How to reach: From Dimapur you can get here by road and air. It falls about 20 km away from Kohima.

9. Here is the Olympics with the villages:

There is a village in Ludhiana, Punjab, named as Qila Raipur. There is a huge sports festival here. Which is also called the Olympics of Indian villages. It is organized in the month of February, which lasted for three days.

How to reach: 15 km away from Ludhiana by road.

10. 111 trees on the birth of a girl:

There is a Pipalantri village in Rajasthan, where the practice is quite unique. Here, 111 trees are planted on the birth of a girl.

How to reach: This village falls 64 km away from Udaipur.

Reliance Geophone's three-year lock-in period can be big challenge

Reliance Geophone's three-year lock-in period can be big challenge
New Delhi (JnN). According to a new report by JP Morgan, it may be that Mukesh Ambani's company Reliance Geo did not live up to the expectations of Geophone users or the feature phone users could prepare Geo to take feature phone. This is because the 3-year lock-in period has been given with Geophone. This means that users will get a deposit of 1500 rupees only after three years, for which users have to use Geophos for three years.

Lock-in period can become Challenge:

According to the Brokerage based in New York - some of Geophon's challenges are related to viability, some have the potential to change the behavior of the people due to its affordable prices according to some. Reliance Jio, which brought services based on 4G technology in September 2016 Now the company has launched Geophone some time ago. It has been introduced with a deposit of 1500 rupees. There is a lock-in period of three years with this deposit amount. Geophone is going to be in the market in September. However, its pre-booking will begin on August 24.

Users can be faster Shift:

The US-based firm was confused about the situation of attracting subscribers of Geo with a plan of Rs 153 per month. According to the report- "If the consumer is able to pay 153 rupees per month for three years, then he can become a smartphone user even before the completion of these three years.

Top PHP Interview Questions and Answers

1. what's PHP?
PHP (Hyper text Pre Processor) may be a scripting language unremarkably used for internet applications. PHP will besimply embedded in hypertext markup language. PHP usually runs on an online server. it's out there for free of charge and might be used across a spread of servers, operational systems and platforms.

2. What ar the variations between GET and POST strategies in kind submitting, offer the case wherever will|we will|we are able to} use get and that we can use post methods?
On the server facet, the most distinction between GET and POST is wherever the submitted is keep. The $_GET array stores information submitted by the GET methodology. The $_POST array stores information submitted by the POST methodology. 

On the browser facet, the distinction is that information submitted by the GET methodology are going to bedisplayed within the browser's address field. information submitted by the POST methodology won't be displayed anyplace on the browser. 

GET methodology is generally used for submitting atiny low quantity and fewer sensitive information. POST methodology is generally used for submitting an oversized quantity or sensitive information.

3. World Health Organization is that the father of php and make a case for the changes in php versions?
Rasmus Lerdorf for version changes head to http://php.net/ Marco Tabini is that the founder and publisher of php|architect.

4. however will we have a tendency to submit from while not a submit button?
We can use a straightforward JavaScript code coupled to an occurrence trigger of any kind field. within theJavaScript code, we are able to decision the document.form.submit() operate to submit the shape.

5. what number ways that we are able to retrieve the date in result set of mysql mistreatment php?
As individual objects thus single record or as a group or arrays.

6. what's the distinction between $message and $message?
They are each variables. however $message may be a variable with a hard and fast name. $message may be avariable who's name is keep in $message. as an example, if $message contains "var", $message is that the same as $var.

7. What ar the variations between need and embrace, include_once?
File won't be enclosed over once. If we would like to incorporate a file once solely and more line of work of the file are going to be neglected then we've got to use the PHP operate include_once(). this may forestall issues with operate redefinitions, variable price reassignments, etc.

8. What ar the various tables gift in mysql?
Total five sorts of tables we are able to produce 

1. MyISAM 

2. Heap 

3. Merge 

4. InnoDB 

5. ISAM 

6. BDB 

MyISAM is that the default storage engine as of MySQL three.23.

9. however am i able to execute a php script mistreatment command line?
Just run the PHP CLI (Command Line Interface) program and supply the PHP script file name because the statementargument. as an example, "php myScript.php", forward "php" is that the command to invoke the CLI program. 

Be aware that if your PHP script was written for the net CGI interface, it should not execute properly in statementatmosphere.

10. what's meant by nl2br()?
Nl2br Inserts hypertext markup language line breaks before all newlines in a very string string nl2br (string); For example: echo nl2br("god bless you")

will output "god bless you" to your browser.

11. What ar the present versions of apache, php, and mysql?
PHP: php 5.3 
MySQL: MySQL five.5 
Apache: Apache a pair of.2

12. What ar the explanations for choosing lamp (Linux, apache, mysql, php) rather than combination of differentsoftware package programs, servers and operational systems?
All of these ar open supply resource. Security of UNIX operating system terribly|is extremely|is incredibly} very overwindows. Apache may be a higher server that IIS each in practicality and security. Mysql is world preferred open supply information. PHP is a lot of quicker that asp or the other scripting language.

13. however will we have a tendency to inscribe and decode an information gift in a very mysql table mistreatment mysql?

14. however will we have a tendency to inscribe the username and secret mistreatment php?
You can inscribe a secret with the subsequent Mysql>SET PASSWORD=PASSWORD("Password"); we are able toinscribe information mistreatment base64_encode($string) and might rewrite mistreatmentbase64_decode($string);

15. What ar the various sorts of errors in php?
E_ERROR: A fatal error that causes script termination 
E_WARNING: Run-time warning that doesn't cause script termination 
E_PARSE: Compile time break down error. 
E_NOTICE: Run time notice caused owing to error in code 
E_CORE_ERROR: Fatal errors that occur throughout PHP's initial startup (installation) 
E_CORE_WARNING: Warnings that occur throughout PHP's initial startup 
E_COMPILE_ERROR: Fatal compile-time errors indication drawback with script. 
E_USER_ERROR: User-generated error message. 
E_USER_WARNING: User-generated warning message. 
E_USER_NOTICE: User-generated notice message. 
E_STRICT: Run-time notices. 
E_RECOVERABLE_ERROR: Catchable fatal error indicating a dangerous error 
E_ALL: Catches all errors and warnings

16. what's the practicality of the operate htmlentities?
Answer: htmlentities Convert all applicable characters to hypertext markup language entities This operate is clone ofhtmlspecialchars() all told ways that, except with htmlentities(), all characters that have hypertext markup languagecharacter entity equivalents ar translated into these entities.

17. what's meant by urlencode and urldocode?
Urlencode() returns the uniform resource locator encoded version of the given string. uniform resource locatorsecret writing converts special characters under consideration signs followed by 2 hex digits. For example: urlencode("10.00%") can come back "10%2E00%25?. uniform resource locator encoded strings ar safe to be used as a part of URLs. 
urldecode() returns the uniform resource locator decoded version of the given string.

18. what's the distinction between the functions unlink and unset?
Unlink() deletes the given file from the classification system. 
unset() makes a variable indefinable.

19. however will we have a tendency to register the variables into a session?
We can use the session_register ($ur_session_var) operate.

20. however will we have a tendency to get the properties (size, type, width, height) of a picture mistreatment php image functions?
To know the Image kind use exif_imagetype () operate 
To know the Image size use getimagesize () operate 
To know the image breadth use imagesx () operate 
To know the image height use imagesy() operate

21. what's the most size of a file {that will|which will|that may} be uploaded mistreatment php and the way can we alter this?
You can modification most size of a file set upload_max_filesize variable in php.ini file.

22. however will we have a tendency to increase the execution time of a php script?
Set max_execution_time variable in php.ini file to your required time in second.

23. however will we have a tendency to take a backup of a mysql table and the way will we have a tendency torestore it.?
Create a full backup of your database: shell> mysqldump tab=/path/to/some/diropt db_name Or: shell> mysqlhotcopy db_name /path/to/some/dir the total computer file is simply a group of SQL statements, thus restoring it's terriblyeasy: 

shell> mysql "."Executed"; 

24. what number ways that will we have a tendency to get the worth of current session id?
session_id() operate returns the session id for the present session.

25. however will we have a tendency to destroy the session, however will we have a tendency to unset the variable of a session?

26. however will we have a tendency to destroy the cookie?
Set same the cookie in past

27. what's the distinction between ereg_replace() and eregi_replace()?
eregi_replace() operate is clone of ereg_replace() except that this ignores case distinction once matching alphabetic characters.eregi_replace() operate is clone of ereg_replace() except that this ignores case distinction once matching alphabetic characters.

28. however will we all know the count/number of parts of AN array?
2 ways 
a) sizeof($urarray) This operate is AN alias of count() 
b) count($urarray)
interestingly if u simply pass a straightforward volt-ampere rather than a AN array it'll come back one.

29. what's the most length of a table name, information name, and fieldname in mysql?
Database name- sixty four 
Table name -64 Fieldname-64

30. what number values will the SET operate of mysql takes?
Mysql set will take zero or a lot of values however at the most it will take sixty four values

31.What is most size of a information in mysql?
If the package or filesystem places a limit on the amount of files in a very directory, MySQL is sure by that constraint. 
The potency of the package in handling giant numbers of files in a very directory will place a sensible limit on the amount of tables in a very information. If the time needed to open a go in the directory will increase considerablybecause the variety of files will increase, information performance will be adversely affected. 
The amount of obtainable disc space limits the amount of tables. 
MySQL 3.22 had a 4GB (4 gigabyte) limit on table size. With the MyISAM storage engine in MySQL three.23, the mosttable size was enhanced to 65536 terabytes (2567 â€" one bytes). With this larger allowed table size, the mosteffective table size for MySQL databases is sometimes determined by package constraints on file sizes, not by MySQL internal limits. 
The InnoDB storage engine maintains InnoDB tables among a tablespace that may be created from many files. this permits a table to exceed the most individual file size. The tablespace will embrace raw disk partitions, that permitsextraordinarily giant tables. the most tablespace size is 64TB. 
The following table lists some samples of package file-size limits. this is often solely a rough guide and isn't meant to be definitive. For the foremost up-to-date info, take care to envision the documentation specific to your package. 
Operating System File-size Limit 
Linux 2.2-Intel 32-bit 2GB (LFS: 4GB) 
Linux 2.4+ (using ext3 filesystem) 4TB 
Solaris 9/10 16TB 
NetWare w/NSS filesystem 8TB 
Win32 w/ FAT/FAT32 2GB/4GB 
Win32 w/ NTFS 2TB (possibly larger) 
MacOS X w/ HFS+ 2TB

32. what's meant by MIME?
Multipurpose web Mail Extensions.
WWW ability to recognise and handle files of various sorts is essentially addicted to the employment of the MIME (Multipurpose web Mail Extensions) normal. the quality provides for a system of registration of file sorts with infoconcerning the applications required to method them. This info is incorporated into internet server and browser software package, and allows the automated recognition and show of registered file sorts.

33. what's meant by PEAR in php?
PEAR is brief for "PHP Extension and Application Repository" and is pronounced similar to the fruit. the aim of PEAR is to provide: 
A structured library of open-sourced code for PHP users 
A system for code distribution and package maintenance 
A standard vogue for code written in PHP 
The PHP Foundation categories (PFC), 
The PHP Extension Community Library (PECL), 
A web site, mailing lists and transfer mirrors to support the PHP/PEAR community 
PEAR may be a community-driven project with the PEAR cluster because the organization. The project has been supported by Stig S. Bakken in 1999 and quite an heap of individuals have joined the project since then. 


34. What ar the variations between mysql_fetch_array(), mysql_fetch_object(), mysql_fetch_row()?
Mysql_fetch_array Fetch a result row as AN associative array, a numeric array, or both. 
mysql_fetch_object ( resource result ) 
Returns AN object with properties that correspond to the fetched row and moves the interior information pointer ahead. Returns AN object with properties that correspond to the fetched row, or FALSE if there aren't any a lot of rows 
mysql_fetch_row() fetches one row of information from the result related to the desired result symbol. The row is came back as AN array. every result column is keep in AN array offset, beginning at offset zero.

35. what's PHP?
PHP Version three.0 is AN HTML-embedded scripting language. abundant of its syntax is borrowed from C, Java and Perl with a handful of distinctive PHP-specific options thrown in. The goal of the language is to permit internetdevelopers to jot down dynamically generated pages quickly.

36. what's the distinction between embrace and require?
If you need a file and it can not be found, the script can terminate with a fatal error. If you employ embrace then {you can|you'll|you may} get miscalculation however the script will still execute. thus once the data you would like to reference from another file is crucial to the right running of a page, use need.

37. Is PHP a case sensitive programming language?
PHP may be a partly case sensitive artificial language. we are able to use operate names, category names just in case insensitive manner.

38. what's mean by LAMP?
LAMP means that combination of UNIX operating system, Apache, MySQL and PHP.

39.How does one get the user's science address in PHP?
Using the server variable: $_SERVER['REMOTE_ADDR']

40. however does one build a technique cryptography for your passwords in PHP?
Using md5 operate or sha1 operate

41. what's meant by PEAR in php?
Answer1: PEAR is that the next revolution in PHP. This repository is transfer higher level programming to PHP. PEAR may be a framework and distribution system for reusable PHP elements. It eases installation by transfer an automaticwizard, and packing the strength and knowledge of PHP users into a nicely union OOP library. PEAR conjointlyprovides a command-line interface that may be accustomed mechanically install "packages" 
PEAR is brief for "PHP Extension and Application Repository" and is pronounced similar to the fruit. the aim of PEAR is to provide: 
A structured library of open-sourced code for PHP users 
A system for code distribution and package maintenance 
A standard vogue for code written in PHP 
The PHP Foundation categories (PFC), 
The PHP Extension Community Library (PECL), 
A web site, mailing lists and transfer mirrors to support the PHP/PEAR community 
PEAR may be a community-driven project with the PEAR cluster because the organization. The project has been supported by Stig S. Bakken in 1999 and quite an heap of individuals have joined the project since then.

42. however will we have a tendency to repair a MySQL table?
The syntex for repairing a mysql table is: 

REPAIR TABLE tablename 
REPAIR TABLE tablename fast 

This command can repair the table nominative. 
If fast is given, MySQL can do a repair of solely the index tree. 
If EXTENDED is given, it'll produce index row by row.

43. what's the distinction between echo and print statement?
Echo() will take multiple expressions,Print cannot take multiple expressions. 

Print come back true or false supported success or failure whereas echo simply will what its told while not lease you recognize whether or not or not it worked properly.

44. What ar the options and benefits of OBJECT bound PROGRAMMING?
One of the most benefits of OO programming is its simple modification; objects will simply be changed and added to a system there by reducing maintenance prices. OO programming is additionally thought-about to be higher at modeling the $64000 world than is procedural programming. It permits for a lot of difficult and versatile interactions. OO systems also are easier for non-technical personnel to grasp and easier for them to participate within themaintenance and improvement of a system as a result of it appeals to natural human psychological feature patterns.