Insomnia can often be improved by changing your daytime and bedtime habits or by improving your bedroom environment.

Making small changes may help you to get a good night's sleep. Try some of the methods below for a few weeks to see if they help.

1. Keep regular hours

Going to bed and getting up at roughly the same time every day will programme your body to sleep better. Choose a time when you're most likely to feel sleepy.

2. Create a restful sleeping environment

Your bedroom should be kept for rest and sleep. Keep it as quiet and dark as possible. It should be neither too hot nor too cold. Temperature, lighting and noise should be controlled so that the bedroom environment helps you to fall (and stay) asleep.

3. Make sure that your bed is comfortable

It’s difficult to get restful sleep on a mattress that’s too soft or too hard, or a bed that's too small or old. If you have a pet that sleeps in the room with you, consider moving it somewhere else if it often makes noise in the night.

4. Exercise regularly

Moderate exercise on a regular basis, such as swimming or walking, can help relieve some of the tension built up over the day. Make sure that you don't do vigorous exercise too close to bedtime, however, as it may keep you awake.

5. Less caffeine

Cut down on stimulants such as caffeine in tea or coffee, especially in the evening. They interfere with the process of falling asleep, and they prevent deep sleep. The effects of caffeine can last a long time (up to 24 hours), so the chances of it affecting sleep are significant. Instead, have a warm, milky drink or herbal tea.

6. Don’t over-indulge

Too much food or alcohol, especially late at night, can interrupt your sleep patterns. Alcohol may help you to fall asleep initially, but it will disrupt your sleep later on in the night.

7. Don’t smoke

It’s bad for sleep. Smokers take longer to fall asleep, they wake up more frequently, and they often have more disrupted sleep.

8. Try to relax before going to bed

Have a warm bath, listen to quiet music or do some gentle yoga to relax the mind and body. Your doctor may be able to recommend a helpful relaxation CD.

9. Write away your worries

Deal with worries or a heavy workload by making lists of things to be tackled the next day. If you tend to lie in bed thinking about tomorrow's tasks, set aside time before bedtime to review the day and make plans for the next day. The goal is to avoid doing these things when you're in bed, trying to sleep.

10. Don't worry in bed

If you can’t sleep, don’t lie there worrying about it. Get up and do something you find relaxing until you feel sleepy again, then return to bed.



What is Website? 



       A website, also written as web site  is a collection of related web pages, including multimedia content, typically identified with a common domain name, and published on at least one web server. A web site may be accessible via a public Internet Protocol (IP) network, such as the Internet, or a private local area network (LAN), by referencing a uniform resource locator (URL) that identifies the site. All publicly accessible websites collectively constitute the World Wide Web, while private websites are typically a part of an intranet.

Today, we can easily identify eight different types of websites available on the Internet since the inception of the basic informational website which appeared in the early years.
1. Informational Websites
As mentioned above, information-based websites were the first versions to hit the Internet.  They are as they sound – sites which enable readers to find information on a particular business or topic. Today, these are the most basic of sites, so extreme care should be taken with copywriting and visuals, because what they lack in bells and whistles, they need to make up for in quality content.
2. Brochure/Catalogue Style Websites
This kind of website goes further in depth than an informational site and provides general information about a store as well as the stock they carry and the prices. Don’t confuse this kind of site with a web shop – it is better suited for products that are specialized or require unique quotations. Call to Actions (CTAs) are super important on Brochure sites because you are asking the customer to take an extra step to contact or come see you.
3. E-Commerce Websites
E-Commerce websites take brochure websites a step further by allowing you to shop directly from your computer.  The main difference between a brochure site and an e-commerce site is that the latter features a checkout system to enable you to order directly from the online store. There are a number of plugins and pre-built options available, and your shopping cart choice depends greatly on your specific product and business. Show me the money!
4. Blogs
Blogging websites (originally known as ‘web logs’) did not hit the mainstream until the early to mid 2000s.  However, blogging has become very popular for both business and personal use. Blogs are great to establish expertise, display a story or concept, and reach the reader (end user) in a personal way. Blogs also translate intrinsically to Social Media, so if you are starting a Blog, make certain Social Media is an essential part of your growth strategy.
5. Personal Websites
Personal websites are similar to that of a personal blog, where an individual in all likelihood will have their own personal domain.  These are created by friends and families to share their information and pictures online with each other allowing for people to keep in contact. More recently, people have started to use these to demonstrate skill sets or create interactive resumes that really work to set them apart.
6. Social Media and Networking Websites
More popular than ever, online forums and social networking sites like Facebook and LinkedIn are used on a daily basis to spread the word about businesses and keep in touch with family and friends. Not just for posting pictures of kids and cats, these sites offer great targeted advertising and growth opportunities for small, consumer-based businesses. Buttons and links to your Social Media pages should be included and defined in your web-build spec.
7. Photo Sharing Websites
Great for those in the photographic industry, these sites allow for individuals to upload and share photographs online.
8. Mobile Device Websites
Now called “responsive sites”. As technology develops, so is the variety of new websites appearing online.  The latest is the creation of websites for viewing on mobile devices and mobile phones. But seriously – any website you build today simply must be mobile friendly, aka ‘responsive’. There are a number of factors to consider when building a responsive site, so make sure you are working with an experienced designer.
Knowing the types of websites available will help identify your web development requirements and define the one most suitable for your business needs.

Example of Website Builders




           Wix.com is a cloud-based web development platform that allows users to create HTML5 web sites and mobile sites through the use of their online drag and drop tools. Users may add functionalities such as social plug-ins, e-commerce, contact forms, e-mail marketing, and community forums to their web sites using a variety of Wix-developed and third-party applications.




The Web.com Group was formed as a result of the merger of Web.com, Inc. (NASDAQ: WEB) and Website Pros, Inc. (WSP, NASDAQ: WSPI). Website Pros was founded in 1999 by Darin Brannan with a goal of becoming the largest nationwide website design and related value-add services company to the small and mid-sized market in a subscription model (SaaS). The idea was to provide these services at 1/10 the cost and time of that offered by thousands of small web design shops dominating the cottage industry. It went public in 2005.




 It’s been a player in the hosting arena for more than 15 years and is now owned by Endurance International Group (EIG) (the same group that owns dozens of other hosting companies, including BlueHost, iPage, HostMonster, JustHost, and Hostgator, to name just a few). The company just underwent a major revamp and relaunch this year (2015).



Strikingly is a website builder that allows the user, with little or no development experience,to create mobile optimized websites “within minutes”. The company takes a mobile-first approach, allowing users to create websites that are enhanced for viewing across all devices including desktopstablets, and smartphones.
Weebly is a web-hosting service featuring a drag-and-drop website builder. The company is headquartered in San Francisco. The company was founded by chief executive officer (CEO) David Rusenko, chief technology officer (CTO) Chris Fanini, and chief operating officer (COO) Dan Veltri. The startup competes with Wix.comWebsWordPress.com,Squarespace.comJimdoYola, SnapPages, and other web-hosting and creation websites.




The appropriately-named SimpleSite is an old-school freemium drag-and-drop website builder that, while plain and dated, serves up a solid free plan and generous free eCommerce. 

iPage is a web hosting company owned by the Endurance International Group. iPage's hosting plans serve more than 2,000,000 web sites. iPage was initially founded in 1998 as a full web service provider, but the company completely re-launched operations as a web hosting provider in 2009. It's currently run byEndurance International Group, which is also the owner of other web hosting companies such as BlueHost and HostGator. 
Register.com (previously Forman Interactive) was founded as a provider of Internet services by brothers Richard, Peter Forman and Dan Levine in 1994. In 1999, the company officially changed its name to Register.com. 



Webs primarily target small businesses and entrepreneurs. This is not to say that you can’t build a personal or non-profit website using Webs as you most definitely can (we will discuss user-friendliness and website building tools below).  But the tools that they provide are slightly more geared towards small businesses, which we will review and let you know our opinion below.



GoDaddy is a publicly traded Internet domain registrar and web hosting company. As of January 2016, GoDaddy was said to have had more than 61 million domain names under management, making it the world's largest ICANN-accredited registrar. It serves more than 13 million customers and employs more than 4,000 people. The company is known for its celebrity spokespeople, Super Bowl ads and as being an online provider for small businesses. In addition to a postseason college football bowl game, it previously sponsored NASCAR. It has been involved in several controversies related to security and privacy.


Creating an Effective Presentation

1. Minimize: Keep slides counts to a minimum to maintain a clear message and to keep the audience attentive. Remember that the presentation is just a visual aid. Most information should still come from the reporter.

2.Clarity: Avoid being to fancy by using font style that is easy to read. Make sure that it is also big enough to be read by the audience. Once you start making your presentation, consider how big the screen is during your report.

3.Simplicity: Use bullets or short sentences. Summarize the information on the screen to have your audience focus on what the speaker is saying than on reading the slide. Limit the content to six lines and seven words per line. This is known as the 6 x 7 rule.

4. Visual: Use graphics to help in your presentation but not too many to distract the audience. In addition, instead of using table of data, use charts and graphs.

5. Consistency: Make your design uniform. Avoid having different font styles and backgrounds.

6. Contrast: Use a light font on dark background or vice versa. This is done so that it is easier to read. In most instances, it is easier to read on screen if the background is dark. This is due to the brightness of the screen.

Below is a sample output for a Presentation:

                                         
                                             
                                               


                         

                              

                                             

                                                

                                       







Using Hyperlinks in Microsoft PowerPoint


Using hyperlinks in your presentation is an easy way to navigate slides during your presentation. 

 1. In Normal view, select the text, shape, or picture that you want to use as a hyperlink. 




2. On the Insert tab, in the Links group, click Hyperlink.

a view of the ribbon that shows the insert tab and hyperlink button

3. In the Insert Hyperlink dialog box, under Link to, click Place in This Document.

Shows dialog box with inserting link in the same document selected

Link Options: 

  • Existing File or Web Page- creates a hyperlink to a website or a local file saved in  your hard  drive. Just browse your file in the dialog box or type the web address.
  • Place in this Document- creates a hyperlink that once clicked, creates a new document on your specified location.
  • E-mail Address- creates a hyperlink that opens Microsoft Outlook that automatically adds your specified recipient on a new email.
4. Do one of the following:
  • To link to a slide in the current presentation, under Select a place in this document, click the slide that represents the hyperlink destination.
  • To link to a custom show (a select group of slides) in the current presentation, under Select a place in this document, under Custom Shows, click the custom show that represents the hyperlink destination. Then, select the Show and return check box.


Embedding Objects in Microsoft PowerPoint


Embedding objects is easy using Microsoft PowerPoint. With this option, you can insert an Excel file that would look like a table to a presentation.


Embedding an Excel File to your Slide Presentation

1. Go to the Insert Tab.
2. On the Test group, click on Object.
3. The Insert Object dialog box would appear.





Options:

a. Creates New- creates a new file from scratch. You can select on a wide variety of files listed.

b. Creates from file- creates a file from existing file saved on  your hard drive, simply browse the file to use it. Putting a check on the "link" option will allow you to modify the Excel file inside your presentation.

4. Once you are done. Click OK.






Online Safety and Security

The internet is define as the Information superhighway. This means that anyone has access to this highway, can place information, and can grab that information. It is also a powerful tool. It can be used to promote your business, gain new friends, and stay in touch with the old ones.But it is one of the most dangerous places, especially if you do not know what you are doing with it.


Tips to Stay Safe Online

1)      Don’t post any personal information online – like your address, email address or mobile number.
2)      Think carefully before posting pictures or videos of yourself.  Once you’ve put  a picture of yourself online most people can see it and may be able to download it, it’s not just yours anymore.
3)      Keep your privacy settings as high as possible.
4)      Never give out your passwords.
5)      Don’t befriend people you don’t know.
6)      Don’t meet up with people you’ve met online.  Speak to your parent or carer about people suggesting you do.
7)      Remember that not everyone online is who they say they are.
8)      Think carefully about what you say before you post something online.
9)      Respect other people’s views, even if you don’t agree with someone else’s views doesn’t mean you need to be rude.
10)   If you see something online that makes you feel uncomfortable, unsafe or worried: leave the website, turn off your computer if you want to and tell a trusted adult immediately.




 Internet Threats

Visit a social networking site and look for the site's privacy policy. The link is typically found at the bottom of the page and sometimes labeled only as "Privacy".

         


Virus

Virus is a program designed to copy itself and propagate, usually attaching itself to applications. It can be spread by downloading files, exchanging CD/DVDs and USB sticks, copying files from servers, or by opening infected email attachments.

Worms

A worm can be injected into a network by any types of means, like an USB stick or an email attachment. Email worm tends to send itself to all email addresses it finds on the infected PC. The email then appears to originate from the infected user, who may be on your trusted senders’ list, and catch you off guard.



Trojan 

It might appear harmless and even useful at first, but it leaves your PC unprotected, enabling hackers to steal sensitive information.

Spyware

Spyware is often secretly installed without users consent when a file is downloaded or a commercial pop-up is clicked. Spyware can reset your auto signature, monitor your keystrokes, scan, read and delete your files, access your applications and even reformat your hard drive. It constantly streams information back to the person that controls spyware.


Adware

This malware launches advertisements, mostly in the form of pop-ups. These are customized to you as a user, based on your behavior on the Internet, which may
be monitored by spyware.

Spam

Spam may be defined as unwanted emails. Most users are exposed to scam, which is more than 50% of all Internet emails. Though spam is not a direct threat, it can be used to send different kinds of malware. 


Phishing


This is the fraudulent acquiring of sensitive personal information such as passwords and credit card details. This is accomplished by sending official-looking emails impersonating a trustworthy sender. Users of online banking and auction sites are most likely to become a target.


Pharming

A more sophisticated form of phishing. By exploiting the DNS system, pharmers can create a fake website that looks like a real one for instance web bank page, and then collect the information users think they are giving to their real bank.


Keyloggers

Designed to record the user’s keystrokes. Keylogging allows criminals to look for particular bits of information that can be used for identity or intellectual property theft.
         

 Rogue security software

A special type of threat is software that claims to be security software. It tricks users that have installed it to pay a sum of money to be really protected (which they will not be). Most often it pretends to be antivirus and anti spyware programs.







Protecting Reputations Online 

In the past, doing something embarrassing was not much of a big deal. Nowadays, embarrassing moments are captured using any device you could imagine. What is worst is that people can easily upload it to the internet, where it can be stored forever.


Think before you click




Copyright infringement

 is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.


Know what copyrights protect.

Copyright law protects any original creation, and grants the holder of the copyright exclusive control over when, how, and by whom their work may be copied, distributed, or exhibited. This includes literary works, paintings, photographs, drawings, films, music (and its lyrics), choreography, sculptures and many other creative works.

Know what isn't protected. 


Copyright law generally does not protect the underlying ideas of a creative work, and it does not protect facts. For example, copyright doesn't prevent you from expressing in your own words ideas and facts found in a book or journal you read.


Don't confuse copyrights, trademarks, and other forms of "intellectual property.


" The term "intellectual property" itself has led to these very different things being confused with each other.


Learn about the public domain laws for your jurisdiction. 


"Public domain" is short-hand for  "uncopyrighted", not "publicly distributed". A work can be out of copyright due to age, by the nature of authorship, or other reasons. In the United States, all works authored by a federal government (not state government!) employee during the course of their official duties are public domain, as are all works published before 1923. Works first created in the European Union will usually be copyrighted until 70 years after the death of the author.


Online Research


Know what you’re looking for.


Begin your research by identifying specific topic areas you want to explore. Well-targeted keywords and search terms will deliver better results. Also, familiarizing yourself with the basic Boolean search techniques can help you narrow your search even more.

 Search a variety of resources. 

Your search results can vary depending on the search engine you use, so check a few out — Google, Bing, and Yahoo are the top three most used search engines. And don’t be afraid to seek out specific sources. Look into associations, research institutions, and journals that fit your subject area.
 Research until you feel like an “expert.”

It’s a writer’s job to understand and interpret a subject. To do this, you may have to research for hours, days, or even weeks until you fully wrap your head around a topic. Only then can you present that information in a way that makes sense to your readers.
 Scrutinize your sources.

Once you’ve put in the time to gather plenty of research, take time to evaluate it. Check your sources for credibility. If you feel uneasy about a source, see if you can find the same facts on a different, more credible site.

Always keep your eyes open. 

Research should be an ongoing process. Every once in a while you might stumble across information too good to pass up. Bookmark those pages, even if they have nothing to do with your current task. They could be the basis for your next piece.