"STAY HOME--STAY SAFE" FIGHT AGAINST COVID-19 Skip to main content

Privacy policy


Acceptable use policy

These acceptable use policy ("Acceptable Use Policy", "AUP", "Policy") is an agreement between Website Operator ("Website Operator", "us", "we" or "our") and you ("User", "you" or "your"). This Policy sets forth the general guidelines and acceptable and prohibited uses of the computertechstudy2020.blogspot.com website and any of its products or services (collectively, "Website" or "Services").

Prohibited activities and uses

You may not use the Services to publish content or engage in activity that is illegal under applicable law, that is harmful to others, or that would subject us to liability, including, without limitation, in connection with any of the following, each of which is prohibited under this Policy:
  • Distributing malware or other malicious code.
  • Disclosing sensitive personal information about others.
  • Collecting, or attempting to collect, personal information about third parties without their knowledge or consent.
  • Distributing pornography or adult related content.
  • Promoting or facilitating prostitution or any escort services.
  • Hosting, distributing or linking to child pornography or content that is harmful to minors.
  • Promoting or facilitating gambling, violence, terrorist activities, or selling weapons or ammunition.
  • Engaging in the unlawful distribution of controlled substances, drug contraband, or prescription medications.
  • Managing payment aggregators or facilitators such as processing payments on behalf of other businesses or charities.
  • Facilitating pyramid schemes or other models intended to seek payments from public actors.
  • Threatening harm to persons or property or otherwise harassing behavior.
  • Infringing the intellectual property or other proprietary rights of others.
  • Facilitating, aiding, or encouraging any of the above activities through our Services.

System abuse

Any User in violation of our Services security is subject to criminal and civil liability, as well as immediate account termination. Examples include, but are not limited to the following:
  • Use or distribution of tools designed for compromising the security of the Services.
  • Intentionally or negligently transmitting files containing a computer virus or corrupted data.
  • Accessing another network without permission, including to probe or scan for vulnerabilities or breach security or authentication measures.
  • Unauthorized scanning or monitoring of data on any network or system without proper authorization of the owner of the system or network.

Service resources

You may not consume excessive amounts of the Services or use the Services in any way which results in performance issues or which interrupts the services for other Users. Prohibited activities that contribute to excessive use, including without limitation:
  • Deliberate attempts to overload the Services and broadcast attacks (i.e. denial of service attacks).
  • Engaging in any other activities that degrade the usability and performance of our Services.

No spam policy

You may not use our Services to send spam or bulk unsolicited messages. We maintain a zero-tolerance policy for use of our Services in any manner associated with the transmission, distribution or delivery of any bulk e-mail, including unsolicited bulk or unsolicited commercial e-mail, or the sending, assisting, or commissioning the transmission of commercial e-mail that does not comply with the U.S. CAN-SPAM Act of 2003 ("SPAM").
Your products or services advertised via SPAM (i.e. Spamvertised) may not be used in conjunction with our Services. This provision includes, but is not limited to, SPAM sent via fax, phone, postal mail, email, instant messaging, or newsgroups.

Defamation and objectionable content

We value the freedom of expression and encourage Users to be respectful of the content they post. We are not a publisher of User content and are not in a position to investigate the veracity of individual defamation claims or to determine whether certain material, which we may find objectionable, should be censored. However, we reserve the right to moderate, disable or remove any content to prevent harm to others or to us or our Services, as determined in our sole discretion.

Copyrighted content

Copyrighted material must not be published via our Services without the explicit permission of the copyright owner or a person explicitly authorized to give such permission by the copyright owner. Upon receipt of a claim for copyright infringement, or a notice of such violation, we will immediately run full investigation and, upon confirmation, will promptly remove the infringing material from the Services. We may terminate the Service of Users with repeated copyright infringements. Further procedures may be carried out if necessary. We will assume no liability to any User of the Services for the removal of any such material.
If you believe your copyright is being infringed by a person or persons using our Services, please send a report of the copyright infringement to the contact details listed at the end of this Policy.

Security

Enforcement

We reserve our right to be the sole arbiter in determining the seriousness of each infringement and to immediately take corrective actions, including but not limited to:
  • Disabling or removing any content which is prohibited by this Policy, including to prevent harm to others or to us or our Services, as determined by us in our sole discretion.
  • Reporting violations to law enforcement as determined by us in our sole discretion.
  • A failure to respond to an email from our abuse team within 2 days, or as otherwise specified in the communication to you, may result in the suspension or termination of your Services.
Nothing contained in this Policy shall be construed to limit our actions or remedies in any way with respect to any of the prohibited activities. In addition, we reserve at all times all rights and remedies available to us with respect to such activities at law or in equity.

Reporting violations

If you have discovered and would like to report a violation of this Policy, please contact us immediately. We will investigate the situation and provide you with full assistance.

Changes and amendments

We reserve the right to modify this Policy or its terms relating to the Website or Services at any time, effective upon posting of an updated version of this Policy on the Website. When we do, we will send you an email to notify you. Continued use of the Website after any such changes shall constitute your consent to such changes. Policy was created with WebsitePolicies.

Acceptance of this policy

You acknowledge that you have read this Policy and agree to all its terms and conditions. By using the Website or its Services you agree to be bound by this Policy. If you do not agree to abide by the terms of this Policy, you are not authorized to use or access the Website and its Services.

Contacting us

If you would like to contact us to understand more about this Policy or wish to contact us concerning any matter relating to it, you may send an email to Rock53vinay@gmail.com
This document was last updated on April 8, 2020

THANK YOU

Comments

Popular posts from this blog

computer and its types

Features of computer Speed: Although one takes time to make a small calculation, the computer can make many calculations in less than a second, this speed is provided by the processor, the speed of the computer is measured in Hz., The intensity of work of the computer it is measured in seconds per second, per millisecond, per second, per nanosecond. Accuracy: doing a job without errors means completing any future job with complete precision is the second characteristic of a computer, the computer never makes mistakes, the computer always gives the correct result, because the computer is ours Performs a task only by following the specified instructions by the computer created a program, if the result given by the computer is wrong, then Area may be a bug in the program which are designed by human Automation: When a post-instruction is given to the computer until the task is completed, it continues to work automatically without stopping, for example, when the computer prompts

computer memory basics

computer memory What is computer memory? The CPU is called the brain of a computer, but while the human brain does a lot of work and protects our memories, the CPU only does arithmetic and logical calculations. Processes input data, process data cannot be protected because process data must now be stored in a safe place so that this task can be performed using computer memory (computer memory). Computer memory is divided into many small parts that we call cells. Each cell has a unique address or path. Whenever you save or save a file on a computer, it is saved in a cell - There are two types of computer memory : Variable - It is also called primary storage, also called primary storage. It is in direct contact with the CPU and its data and instructions are used quickly and directly by the CPU. This is called a variable memory because this memory cannot store any data permanently. Example - RAM Non-volatile - This is known as secondary storage. It is used to permanently stor

History of computer

History of computer Computer tech study:- History of computer It was difficult for humans to calculate from the start. Humans can only calculate or calculate to a limited extent without machines. In order to be able to perform many calculations, humans have to rely on the machine to meet this need. Built computers, that is, to calculate. Abacus - 3000 years ago Abacus was developed by Chinese scientists about 3,000 years ago. In a rectangular frame were wooden boards on iron bars, which were calculated or calculated from top to bottom. That said, it was the first computer to run without electricity. In fact, it was up to you to do this job. Antikythera system - 2000 years ago Antikythera was originally an astronomical calculator used to track solar and lunar eclipses in ancient Greece. Antikythera is approximately 2000 years old and was discovered by scientists in 1901 on a ship that was completely destroyed on the island of Antikythera. Acquired in a chronically dilapida