Most of the time books are better than movies. Books can let you imagine the setting or events happening in the story. They are also more detailed than movies because movies sometimes leave out some important details.In some movies, they switch up the characters because in the book they are different and totally the opposite.When we read a book, we tend to visualize the characters a certain way and in movies they don’t look like the way we want them too. It disappoints us in many ways. I’ve read books before that have a plot twist at the end and in the movie it never happens.Movies tend to last about two hours and books take their time and last longer. Movies rush things so that they can end it fast and there. Not everyone has access to movies or can afford going to movie theatres but books can be borrowed at the library or from a friend.Books are portable and can be read online as well, anytime. When reading books, we get more knowledge and it helps us improve our vocabulary. Characters are described much better and with more detail.One important thing that books do have and movies don’t is that they provide more background information than a movie does.
Can You Give Up?
“You can do it. Just a little more effort. You’re almost there. You’re the hero. I know you have it in you. You can’t give up.”
Well, here’s some newsflash for you. You can give up.
Be it movies, songs, books, everyone’s pushing the protagonist to do a thing which is clearly out of their scope. They may not have the physical or mental strength to do the thing but we still expect them to. It doesn’t matter whether you want to do that thing or whether it’s actually for a greater good. You just have to do it. You cannot give up. Because giving up is for losers. And the hero cannot be a loser, right? Or it’s the opposite? A loser cannot be a hero?
Shah Rukh Khan’s character from Rab Ne Bana Di Jodi was a scrawny guy who tried to fight with a samurai. Since they are selling their movie to you and it’s ‘the SRK’, obviously he’s going to win that fight. But think about this. You are up against some buffy wrestler let alone a professional sumo wrestler. Do you think you stand a teensy bit chance? You have your answer right there.
Provided this whole notion of not giving up works on some people, but it’s warping the minds of others. Most people cause some irreversible damage while not giving up. And more often than not, this damage is to them. I am not saying giving up is a good thing. But it’s not a bad thing either. Don’t you think, it would be nice to have an option of giving up, backing down from doing a particular thing when it is clearly out of our reach, and not be judged for it?

Most of you might not know this but there is a Disney movie Moana whose scene would be apt in a situation like this. When Moana confesses she couldn’t defeat the villain, Te Fiti, her Grandma clearly says that it is not Moana’s fault. She states that the burden is too much for her granddaughter and that she would be with her even if Moana wants to go back home.
Moana did end up defeating Te Fiti in the end. But that wasn’t because someone pushed her to do that. Instead, she realized her power and strength on her own. This just shows that even if you don’t have enough strength to do something, you are not a loser. What matters is you gave your best. And there will be people who’re there for you, supporting you even when you get defeated in life because it’s not your fault. It was just too much burden.
Or a more relatable example would be Aamir Khan’s character in 3 Idiots who fought against all odds to study not because someone was pushing or cheering him but because he himself wanted to do that.
Having said all that, I’m not against actually working hard. But the focus remains on working hard because you yourself want to achieve something. What I’m saying is we should all try to find our inner voice and be happy with whatever outcome there is to our situations.
North and South Korea RELATIONS
North Korea blew up the joint liaison office with South Korea in Kaesong, an industrial area on its side of the border, becoming one of the two countries’ most damaging conflicts without ever going to war. The collapse of the joint liaison office followed a growing breakdown of ties between Pyongyang and Seoul, which came just hours after Pyongyang had threatened with military action at the border with South Korea.
Tensions between the two countries had increased since last week, after Pyongyang took offence to South Korean activists and defectors sending anti-North Korean propaganda leaflets, rice and bibles using ballons across the border into North Korean territory, and cut off communication with Seoul. Experts believe that these movements follow the frustrations of North Korea over the inability of South Korea to revive inter-Korean economic projects that, under US pressure, had benefited Pyongyang, along with UN sanctions.
The liaison office was set up in Kaesong in 2018 to facilitate communication between North Korea and South Korea. Following the demolition of the office, North Korean state media outlet KCNA released a statement saying the office had been “tragically ruined with a terrific explosion”.
South Korea’s President Moon Jae-in called for an urgent national security meeting following the demolition. The country’s Unification Ministry called the incident “a senseless act”, one that had “destroyed the hopes of those who wished for peace on the Korean Peninsula”.The South Korean government said they would “respond strongly” if the situation were to worsen but did not elaborate on how it would retaliate. The demolition occurred just days after North Korean leader Kim Jong Un’s sister Kim Yo Jong had threatened to destroy the liaison office.
North Korea and South Korea jointly established a liaison office in North Korea’s Kaesong, in 2003. The Kaesong Industrial Complex is a joint industrial zone where both North Koreans and South Koreans operate and run factories. Approximately 120 factories operated in this industrial zone at its height, with more than 50,000 North Korean employees and several hundred managers, according to a BBC report. Pyongyang had threatened to close this liaison office last week and had cut off his lines of communication with Seoul.
Following the demolition of the liaison office, North Korean state media KCNA announced that Pyongyang would be sending troops in demilitarised areas, including in the Kaesong industrial zone. The KCNA added that North Korea would be adding artillery units along the border with South Korea for reinforcement and North Korean police posts that had been withdrawn when relations had improved between the two countries would now be instituted once again.
Observers say North Korea has been the most provocative by doing these actions in the last few years. During the last few years, South Korean President Moon Jae-in has made efforts to improve relations with Pyongyang. Researchers say that such provocations may have happened because Pyongyang aims to compel Seoul to make it more concessions that will be economically favorable to North Korea, which has been hit hard by sanctions. Although it is not clear how COVID-19 has affected North Korea, experts believe it is likely that the country has not escaped unscathed, particularly in the context of how China is the main trading partner for North Korea.
HENRI FAYOL: THE FATHER OF MANAGEMENT
Henri Fayol is the universalist and he father of general management and Fayol developed the Theory of Management and he has given his opinion that managerial excellence is technical ability and can be acquired and he developed theories and principles of management which are universally accepted and made him a universalist. He was a pioneer of the formal education in management, Fayol’s principles of management meet the requirements of modern management, as such, he is rightly accepted as the “Father of General Management”.

Fayol’s long practical experience in the field of management is reflected in his written work and He did not develop a logical theory of management, nor evolved a philosophy that answered all questions and satisfied all doubts about its practicability and based on his own experience in the field, Fayol set forth 14 Principles of management and they are:
1. Division of Work
The division of work is applied to all kinds of work- technical as well as management and division of work also means specialization and division of work promoted efficiency.
2. Authority and Responsibility
Authority and responsibility go together and Fayol stressed that right and power to give orders should be balanced by the responsibility for performing necessary functions and according to Fayol “The result of authority is responsibility. It is the natural result of authority and essentially another aspect of authority and whenever authority is used, responsibility is automatically born”.
3. Discipline
According to Fayol, “Discipline is in essence obedience, application, energy, behavior and outward marks of respect observed following the standing agreements between the firm and its employees”. Agreements must be obeyed in totality, without any dissent and discipline is essential for the smooth running of the business.
4. Unity of Command
A subordinate should take orders from only one boss and Fayol claimed that if the unity of command is violated “Authority is undermined, discipline is endangered, order disturbed and stability threatened” if there are two or more superiors for an employee then confusion and conflict of interest arise and everyone has to make sure that this doesn’t happen.
5. Unity of direction
Fayol advocates, “One head and One plan” for a group of activities having the same objectives, and this will create dedication of purpose and loyalty. Unity of direction for achieving unity of action in the pursuit of common objectives by a group of persons.
6.Subordination of Individual Interests to general Interests
This is a home truth and, in a family, the interests of its members should be subordinated to the interests of the family as a whole.
7. Remuneration to employees
Remuneration should to fair and adequate and it should be supported by both types of incentives- Financial as well as non-financial.
8.Centralization and Decentralisation
There should be one central point in the organization that exercises control over all the parts but the degree of centralization of authority should vary according to the needs of the situation.
9. Scalar Chain
The Scalar chain is a chain of supervisors from the highest to the lowest rank and this principle suggest that there should be a clear line of authority from top to bottom linking all managers at all level.
10. Principle of order
This principle applies to the arrangement of material and people and there should be a place for everything and everything should be in a place.
11. Principle of Equity
Kindness and justice should be exercised by management in dealing with their subordinates and this will infuse loyalty and devotion among the employees.
12. Stability of Tenure of Personnel
An employee with all the requisite abilities needs some time to gain specialization and stability is linked with a long tenure of personnel in the organization and efficiency is promoted by a stable workforce.
13. Principle of Initiative
The initiative is the power of thinking out a plan and ensuring its successful implementation. Initiative on the part of its employees can become a great source of strength, but it must not be against the established practice.
14.Esprit-de-corps
It means the spirit of loyalty and revolution which unites the members of a group or society and Fayol said that there is strength in unity and the two enemies of sprit-de-corps are:
i. Divide and rule
ii. Abuse of written communication
Judgemental mentality!!
As a person you will be knowing that judging is the primary behaviour of a person. The one who gets judged by others also will be the one judging others. We are so much into this behaviour that we started enjoying it, and slowly it turned into bullying. We as a part of being judged know how that feels but despite of that we judge others. What more a person can go through. Some has strong mind, they don’t bother giving a damn about others. On the other side there are some people who are so much afraid of being judged that as a result they start to live according to others to please them, this category even involve me! Speaking frankly I am a coward and I myself is afraid of being judged by others and always bothering about what they are thinking about me, have I did something wrong, blah blah. Even while writing this I am thinking that using such words will be alright, will it offend others. But we have to stop right here, right now.
Seeing as a part of a person who is being judged by others, let me tell you..How many peoples mouth you will shut!? We cannot reach out to every person and ask them to shut their mouth. There are people who will start harassing you! But you can do a simple task and that is not giving any consideration to them. People are suffering through this behaviour from a very early period. Talking about the era where lord Ram was born. Even lord Ram has suffered through the judgment, as he overheard people talking about Sita mata being impure and as a result Sita mata has to give ‘Agni pariksha’ but this didn’t satisfied others and as a testimony of her purity she returns to the womb of her mother, the Earth. So, don’t let others unnecessary thoughts bother you.
Seeing as a part of person who is judging others then as I said that this is a primary behaviour of a person, then one cannot stop oneself to stop judging others. We cannot go to each and every person to know what they’re going through or what situation they are struggling in. We have to come upto a conclusion. Let me tell you by giving an example, suppose you are watching a suspensive movie and someone stops you to watch the climax and asks you to watch it the other day or say that a situation arise where you cannot make upto the climax then what you will do? Yes you start assuming, you start making conclusions on your own, you have your own scenarios. This is how a persons brain is developed. And you are helpless until you seriously wants to change!!
Even the lord has to suffer from the judgment back then, then what are we! We have to suffer through this ordinary stuff but one thing we can do is ignore these all things and mind our own business! Minding our own business will not let you bother about others even as judging others or being judged by others. But don’t get mistaken between being judged and being bullied. If this happens then you must stand and report. This surely is a crime making others suffer through trauma and depression.
PS:- If you read until now then let me know about your opinions. No, this is not the ninja technique to increase comments ; ) I want to know that people made it upto the ending.
CYBER SECURITY
What is Cyber Security?
Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of “smart” devices, including smartphones, televisions, and the various devices that constitute the “Internet of Things”. Owing to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
Importance of Cyber Security
In today’s connected world, everyone benefits from advanced cyber-defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.
Everyone also benefits from the work of cyber-threat researchers, like the team of 250 threat researchers at Talos, who investigate new and emerging threats and cyber attack strategies. They reveal new vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open source tools. Their work makes the Internet safer for everyone.
Types of Cyber Security threats
- Phishing is the practice of sending fraudulent emails that resemble emails from reputable sources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.
- Ransomware is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.
- Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.
- Social engineering is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.
- SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from a database. Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a database via a malicious SQL statement. This gives them access to the sensitive information contained in the database.
Recent Cyber Threats
Dridex malware: In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an organized cyber-criminal group for their part in a global Dridex malware attack. This malicious campaign affected the public, government, infrastructure and business worldwide.
Affecting victims since 2014, it infects computers though phishing emails or existing malware. Capable of stealing passwords, banking details and personal data which can be used in fraudulent transactions, it has caused massive financial losses amounting to hundreds of millions.
In response to the Dridex attacks, the U.K.’s National Cyber Security Centre advises the public to “ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.
Romance scams: In February 2020, the FBI warned U.S. citizens to be aware of confidence fraud that cybercriminals commit using dating sites, chat rooms and apps. Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. The FBI reports that romance cyber threats affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million.
Emotet malware: In late 2019, The Australian Cyber Security Centre warned national organizations about a widespread global cyber threat from Emotet malware. Emotet is a sophisticated trojan that can steal data and also load other malware. Emotet thrives on unsophisticated password: a reminder of the importance of creating a secure password to guard against cyber threats.
End-User Protection
End-user protection or endpoint security is a crucial aspect of cyber security. After all, it is often an individual (the end-user) who accidentally uploads malware or another form of cyber threat to their desktop, laptop or mobile device.
So, how do cyber-security measures protect end users and systems? First, cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data. This not only protects information in transit, but also guards against loss or theft.
In addition, end-user security software scans computers for pieces of malicious code, quarantines this code, and then removes it from the machine. Security programs can even detect and remove malicious code hidden in Master Boot Record (MBR) and are designed to encrypt or wipe data from computer’s hard drive.
Electronic security protocols also focus on real-time malware detection. Many use heuristic and behavioral analysis to monitor the behavior of a program and its code to defend against viruses or trojans that change their shape with each execution (polymorphic and metamorphic malware). Security programs can confine potentially malicious programs to a virtual bubble separate from a user’s network to analyze their behavior and learn how to better detect new infections.
Security programs continue to evolve new defenses as cyber-security professionals identify new threats and new ways to combat them. To make the most of end-user security software, employees need to be educated about how to use it. Crucially, keeping it running and updating it frequently ensures that it can protect users against the latest cyber threats.
Security Measures
A state of computer “security” is the conceptual ideal, attained by the use of the three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following:
- User account access controls and cryptography can protect systems files and data, respectively.
- Firewalls are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services, and block certain kinds of attacks through packet filtering. Firewalls can be both hardware- or software-based.
- Intrusion Detection System (IDS) products are designed to detect network attacks in-progress and assist in post-attack forensics, while audit trails and logs serve a similar function for individual systems.
- “Response” is necessarily defined by the assessed security requirements of an individual system and may cover the range from simple upgrade of protections to notification of legal authorities, counter-attacks, and the like. In some special cases, complete destruction of the compromised system is favored, as it may happen that not all the compromised resources are detected.
Today, computer security comprises mainly “preventive” measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet, and can be implemented as software running on the machine, hooking into the network stack (or, in the case of most UNIX-based operating systems such as Linux, built into the operating system kernel) to provide real-time filtering and blocking. Another implementation is a so-called “physical firewall”, which consists of a separate machine filtering network traffic. Firewalls are common amongst machines that are permanently connected to the Internet.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.
However, relatively few organizations maintain computer systems with effective detection systems, and fewer still have organized response mechanisms in place. The primary obstacle to effective eradication of cybercrime could be traced to excessive reliance on firewalls and other automated “detection” systems. Yet it is basic evidence gathering by using packet capture appliances that puts criminals behind bars.
In order to ensure adequate security, the confidentiality, integrity and availability of a network, better known as the CIA triad, must be protected and is considered the foundation to information security. To achieve those objectives, administrative, physical and technical security measures should be employed. The amount of security afforded to an asset can only be determined when its value is known.
11 Tricks and tips of facebook

As the most seasoned, greatest online networking stage, Facebook has developed into an entangled and useful asset for association. It’s constantly been engineer well disposed so it has a ton of niches and corners to lose all sense of direction in.
Utilizing Facebook like an ace takes an ability to investigate, also a tolerable venture of time. We’ve featured these astounding highlights and simple successes to give you a head start.
General Facebook tips
1. Stunt out your profile
There are a cou
ple of steps associated with setting up an essential Facebook Page, yet the key to extraordinary commitment rates is setting aside the effort to enhance.
Make your Page simple to discover with a basic username (a.k.a. vanity URL) with the goal that individuals know what your identity is. In the event that you figure you may be a large enough brand, go for the stars and apply for that definitive blue confirmation checkmark.
2. Direct people to Facebook
In case you’re simply beginning, let your current crowd realize where you’re at. Odds are they’re on Facebook, as well. Get more Page prefers on Facebook by adding Follow or Share catches to the code of your site or blog. Feel free to cross-elevate by including connections to your Facebook page on your other online life stage profiles.
3. Convert the inquisitive

Conveying mass welcomes to like your Page can feel somewhat unoriginal, or more regrettable, nasty. Set aside some effort to create a message that diagrams why an individual should focus, and stay in contact.
4. Grandstand your best work
As a Page chairman, you can stick a post to keep it top-of-mind for guests. Regardless of whether it’s a declaration, an advancement, or only a high-performing post that your crowd as of now adores, make the most of the chance to get more eyeballs on it.
You can stick a post by tapping the ellipsis button in the post’s upper right corner.
facebook stunts
5. Be amicable

Dale Carnegie said that the best stable is an individual’s own name. On Facebook, it appears as though the best solid is the notice ping.
Notice an individual in a post and they’re much bound to impart that post to their companions. In case you’re a brand, why not give another brand a like and check whether the inclination is shared? This sort of mindfulness raising, when done right, is as healthy and natural as a Whole Foods plate of mixed greens: it sets you up for sound development.
Facebook stunts for business Pages
As a business Page, you can exploit exceptional advantages and highlights intended to enable you to lock in.
6. Flawless your source of inspiration

The CTA button is an up front open door at the highest point of your Page, so ensure it’s sending your crowd the correct way. In case you’re hoping to impart, “Join” or “Send message” may be great. In the interim, “Book now” or “Shop presently” can assist you with distinguishing prompt possibilities.
To alter the CTA button on your work area, drift your mouse over the default “Send message” catch and snap Edit.
7. Alter your tabs
Each Facebook page has some essential tabs on the left-hand side, including About, Events, and Photos. Make the following stride and feature your advancements, applications, custom points of arrival or gated content by making a custom tab so your inquisitive crowd can look at your best highlights.
You can work with an engineer or utilize a Facebook Page application to make your custom tabs.
8. Casing your fans
Facebook’s photograph/video overlay impacts are a fun, innovative chance to associate with your crowd as they utilize the Facebook camera. While a full video overlay takes some specialized skill, a straightforward photograph edge can be made in a snap utilizing the Camera Effects apparatus.
9. Accumulate your greatest supporters in a Facebook Group

Facebook Groups are perhaps the most ideal approaches to assemble network among similar individuals. Furthermore, since Facebook’s calculation is concentrating on significant connections to the exclusion of everything else, organizations are observing. A brand-embraced Group is somewhat similar to a center gathering of your superfans, where they can find out about advancements and occasions, share encounters, or collaborate with one another and your business.
From your Facebook Page, you can begin a Group by tapping the ellipsis button, naming the Group, and conveying a first round of solicitations to join. Steady administration is essential to keep the Group flourishing, so look at more systems for business Facebook Groups.
10. Go live
Facebook Live video has the best reach of any post type. Furthermore, it draws 10 fold the number of remarks as ordinary video and individuals watch it for multiple times as long. Facebook effectively organizes live video by setting it at the highest point of the News Feed, just as sending warnings to conceivably intrigued crowd individuals.
Hop on every one of these focal points by planning a communicate in Publishing Tools, or simply go live by choosing the Live Video symbol in the Update Status box.
Livestreaming on Facebook is ideal for giving instructional exercises or demos, broadcasting an occasion, making a major declaration, or going in the background. The more you’re live (Facebook suggests in any event ten minutes) the higher the probability that individuals will tune in. For additional methodologies, look at our total manual for Facebook Live Video.
Facebook stunts for distributing
Remove the mystery from an ideal Facebook post with these tips.
11. Compose smart duplicate

The perfect length for a natural Facebook post is under 80 characters (getting 66 percent greater commitment, as indicated by Buzzsumo). For a paid post, attempt to adhere to under 18 characters. With so little space, you will need to get Shakespearean to demonstrate that quickness is the spirit of mind. (Or then again you can utilize the Hemingway application.)
In any case, there are consistently exemptions to this standard: individuals esteem distributers and thought pioneers for their thoughts, not their concision. Nuanced and significant thoughts can occupy more room. Yet, since abilities to focus are on a lofty decay, remember that the initial not many words are the most critical to any peruser.
Fashionable masks :on DEMAND
Have a look to different masks in the article….
Corona-virus : During lockdown , Indian textile and apparel manufacturers have been facing difficult times as they have lost almost all their orders for the summer and faced huge losses in sale. But, as the lockdown rules are relaxed, huge consumption of masks are in demand. The virus that created problem also offered a lifevest to textile industries.Orders of masks are flooded and production process are in load to meet the demand of masks for the population. With manufacturers ramping up production of face masks since the outbreak of covid-19, India has turned into a surplus nation choking production lines.
“India, according to the association, has a production capacity of 1.5 billion three-layer masks and after accounting for domestic demand, the surplus capacity is 532.03 million”.
Wearing masks in corona began to be mandatory for prevention from corona virus that saw a spike in recent times in many parts of the country.Wearing mask is no longer just a safety accessory,but people use it as a fashion accessory. Due to this, many apparel companies have started producing masks according to public interest. The textile industry is gearing up and making variety of masks as people are increasingly becoming safety conscious. Fashion is the right industry to make masks.
“Suddenly this (mask manufacturing) has come as a great opportunity for the industry, as a different product line, at this moment of crisis,” Ram Bhatnagar, Vice President and Head – Sales,Raymond Ltd. said adding, “nobody could have ever imagined about this segment from a fashion perspective.”
Textile industries are continuously on research to invent new forms of style in masks which would attract customers.This pandemic has brought out the innovative side of people.Mask made from different cloth,coloured or printed fabric are in demand.
Masks are in demand according to workplace, events etc. Have a look to some of these-

- Matchy- Matchy masks :
Indians are buying multiple masks for themselves and their loved ones, as masks are reusable. Fashion conscious peope are buying multiple masks with different colours to match their outfits. People who are working during the pandemic are using masks according to their dress matching.

- Children’s masks :
Textile industries are creative and designing attractive masks for kids. From cartoons to super-heroes, characters from sci-fi films,birds, animals and flowers to the range. Cheerful characters like dora, Chotta Bheem, Mickey Mouse and Donald Duck are in demand.

- Face print masks :
This new surge in the demand for masks has led to people unleashing their creative best in the form of creating face printed masks. The mask is printed with the person’s face from nose to chin, which makes it easy to recognise despite wearing it. People are attracted towards their own face printed masks these days. The trend has become quite popular in other parts of the country too, with several other photo studios having started offering similar services.

- Wedding masks :
Few Indian weddings have taken place during the lockdown and the bride and groom are seen wearing coloured, sparkling masks. The wedding wear market is also taking the trend seriously and a couple of clients have shown interest in custom-made face masks.

- Organic cotton masks :
Organic material based masks are also in demand to promote ‘Swadeshi ‘.The fabrics used are pure cotton dyed in extracts of turmeric, neem, tulsi, red sandalwood and indigo.They are healthy and easy to breathe.
For now and post-covid world, masks are here to stay and so, designer masks. Perhaps, these masks is what may help people to get protected from coronavirus.So keep wearing face covers, masks or whatever you have. Stay safe, stay healthy….!!!!
Film Review Of an overrated B’wood Movie I’ve Seen In Recent Times
Well, overrated would actually be quite an inappropriate word to use, so let’s just say it was a disappointing movie for it did fail at delivering what I and most of the viewers expected it to.

This movie that I had watched just 2 weeks ago ,”Laila Majnu” set in Kashmir directed by Imtiaz Ali went a bit over my head and hence became a reason of my dislike. The first half an hour is fine and in fact quite engaging. The male and female protagonist are into a kind of flirtationship, some cliché stalking from the guy’s side happens and then they soon fall for each other, ask the girl finally gives into to the boy’s advances. The romantic medley depicting this blossoming of love is just amazing! #Aahista Check out this clip here. https://www.instagram.com/p/BmQVM8thKNQ/?igshid=efdd6ydad9my
Their families are arch rivals. Laila gets married to somebody else owing to a misunderstanding. The story then takes a turn of events until both of the leads get united post Laila’s repentance as she came vis-à-vis the reality of (Qais) Majnu’s innocence and her husband’s real attitude soon after her marriage. So she was delighted to see Qais aka THE Majnu back in the town after 4 long years. After her husband’s demise in an accident, Laila had to wait for 3 more months to be able to marry Majnu as per an Islamic tradition.

Majnu was heartbroken still did not express anything because he was tired of waiting for his ladylove so he sought refuge in his distant, tranquil farmhouse. There he is portrayed as a mad lover through typical actions of running around, screaming out loud and it just didn’t seem to make sense to me. Seemed as if he got struck by sufism and that he came to realize that he didn’t any longer require Laila for the fulfillment of his love story. For he is so content and at absolute peace by just seeing Laila (an illusion actually) in a beautiful white fairy gown in front of his eyes, he is seen talking to her and that’s the reason why the people declared him mad.

Laila then came to see him and she realised this as well that Majnu no longer needs her physical self to celebrate his love, for his love has evolved much more in deeper sense and left her body soonafter. Majnu is also shown to be dead near Laila’s grave. The ever-so-mind-bewildering story then ends with the song Jab Se Tu Meri Hai Tab Se Main Tera hu Laila. What questions pops up on my mind is that when one attains such deeper, higher form of divine, selfless love then it definitely would not lead to the downfall of that person that he would go insane. From what I know, true love only supports growth of both individuals and can never result in negativity as it is the only positive this world has to offer. So this story line contradicted the universal truth and just didn’t go well with me otherwise the scenes, the acting, the dialogues,
music and everything was top notch except for the way in which it’s plot progressed.

The leads, Avinash Tiwary and Tripti Dimri are coming together, yet again, for a Netflix Original “Bulbbul”. Checkout the trailer. Given that the chemistry of the leads was sizzling and they look cute together, I am sure you would not want to miss out on this one, especially if you love psychological, supernatural or thriller stuff.
https://www.instagram.com/tv/CBmurMRJI0O/?igshid=nzog9sschu2y
Digital Learning Vs Classroom Learning andits functioning in the times of Corona.
Traditional Classroom Learning, of course can not be replaced but Digital Learning, I feel, has proved out to be a boon in disguise especially in these times of Covid 19. If the concept of Digital Education had not been introduced long before then there would have been a complete hault in the process of shaping the intellect of students through academics.
Moreover, I reckon that Digital Education is a much better version of Classroom Education since students, especially in the younger grades, often mistake studies to be a burden since they are not exposed ,that seriously, to the idea of career-building yet. Hence, they deliberately lag behind when it comes to adopting a serious attitude in the higher grades. On the other hand if Digital Education is introduced early on in their lives, then they get fantasized with the illustrations, cartoon-voices, colourful theme etc which only draws them more towards studies and seems far more interesting than a black and white themed Classroom Education. Also, things when depicted through visuals tend to stick by much longer in the human brain than bookish texts.

Now talking about the senior lot, Digital Education has helped the students massively. The vast courses available online permit students to go for self-paced i.e flexible learning. They can understand the dimensions of a particular topic as per their own speed of grasping and can repeat a particular lecture multiple times. It also makes students acclimated to the idea of using technology the right way towards their best interest.
It is also a major boost for widening the scopes of teachers as they could never use technology in these complex yet enhancing ways during their years but now they are all also becoming used to and not only learning but also appreciating it. This accentuates that learning never stops and so doesn’t the advancement of technology.
However, just like a coin has two sides, Digital Learning also comes with its own sets of pros and cons. The pros have already been discussed so now let’s take a deeper insight into the cons i.e the demerits, I personally observed in the present scenario of the pandemic.
Online lectures, these days, are conducted through apps like Zoom in most schools, including my college.
Apps like Zoom which are of Chinese origin allow students to close the application without actually exiting from the ongoing lecture so their teachers kind of mistake them to be still attending the lecture while they are actually surfing through social media platforms or busy playing games like PUBG. Students can also watch their lectures while keeping the microphones muted. Now does that make any sense? What is the use of watching the lecture when you just can’t even hear the teacher and you’re watching some movie in the meantime.
So, I don’t think digital learning has been able to generate a fruitful result as far as the academics and portion completion in lockdown is concerned for students of higher grades, since they are very smart. Schools and officials need to reconsider the thought of spreading education through this means and should consider other better options like Google meet in which you can’t press the back button and exit the lecture just like that.


