Now on your Samsung phone Assitive Keys (Without any apps) 😀


For those of us who use this Samsung phone, this post is for them. We usually see the Assit key on the iPhone. There are many apps available in this play store. Today, I will teach you without any app.

First go to Settings. Come down one step. Accessibility options view ????

Click there. Here you will find 3 options. 1) Vision. 2) Hearing. 3) Dexterity and interaction Select option 3.

After clicking, you will get 3 options. Select Assistant Menu.

If you have Off, please Click here! Finish the job See the magic.
Google Play Store's download problem causes and its solution.

Google Play Store's download problem causes and its solution.

Many times, when downloading any games or apps from Google Play Store, we will see Error 498. That is, a message like "Error 498 has occurred while communicating with the server". It is not possible to download anything due to error 498, but not many times. The subject of today's post, Error 498 and its 5 solutions.

Reasons for Google Play Store Error 498:

01. There are several reasons for this problem. The most common of which is the cache partition of the device. You will only see this problem when your app size is higher than the device's cache partition.
For example: your cache partition is 80 MB and the size you want to download is 90 MB then you will see this problem.

2. Another important reason is the Google service. When you try to download a file it may contain under maintenance. So when you try to download that file, you can get Error 498 message. It's not a big problem, wait and try again.

Solution of Error 498:

solution 01: Clear the cache:
This problem is more for your cash. So please clear your device's cache.

Solution 02: Use Wifi to download:

Many times deliberately internet connectors create this problem. So download Wifi to download.

Solution 03: Use the new Play Store account:
To resolve the error 498, you must delete a new account from your previous account. To do this you have to go to Settings> Accounts> Add New Account> Click on Google> Next> Enter email> Done. Connect to new account and try to download again.

Solution 04: Connect to Computer:

Connect your mobile phone to a computer or laptop with a USB cable. Access Google Play Store with Chrome or FireFox or any browser you like. From there, download your favorite file again and show your smartphone. Hopefully this problem will be resolved.

Solution 05: Uninstall and reinstall Google Play store.

If you do not find any solution at the end, then Uninstall your Google Play Store from your device and restart your device. Hope you find the solution.

How does the modern battery work? And how the battery is eroded.

How does the modern battery work? And how the battery is eroded.

In this age of information technology, the amount of battery you will not have to re-interpret. Almost most electronic gazed batteries have the power. And today I went to Techtunes to discuss some of the batteries. Let's say something about the history of the battery at the beginning of the discussion.
In the 1800s Alessandro Volta was able to create the first active electromagnetic battery. He assembled the copper and gene plates through a brin-souk paper disk, and was able to hold the voltage for a while! Holding this voltage is called the Vaultage Pile and in this method it is possible to discover the complete battery later on.Later in 1836 John Frederic Daniell designed a standard for batteries. He set the model of a typical battery by shaping Copper Pot and Copper Sulplett properly, and later the scientists from different countries developed their own theory on this model and gradually the batteries were developing. Meanwhile, in 1979, John Goodenough and Koichi Mizushima of Oxford University first invented a rechargeable cell.

It was a battery of 4 vault ranges, which used lithium cement oxide as a positive electrode and lithium metal as a negative. However, this technology was first introduced in 1991 as Sony commercial vehicles on their portable electronic devices.

Modern Battery:



In our current era, portable technology devices are said to be battery-powered batteries with electromechanical sales. Our battery is generally two types of batteries.

1) Single use: Once the battery is used, it can not be used again, to be dropped.

2) Rechargeable: Repeatedly use the battery. Where there is a recharge feature through the use of electrocode.



Li-ion Battery:

Most amalgamated batteries use lithium-ion (Li-ion) cells. In some places, lithium-polymer (Li-Po) cells are also used. Lipo cells are less in lipoprotein battery but it is light weight, foamy design than lion batteries and they are not easily hit.
Lithium banalt oxide (LiCoO2), graphite and organic solvents are used as electrolytes in Lyon batteries.

Chasing Process:

Batteries of lithium technology have gained popularity as the Power Source of Portable Technology in the present era. Because these batteries are able to retain rechargeable and high power sources. During the lion battery chasing, the battery's positive lithium concave oxide electrode has been converted to negative graphite electrode.When the charging is not done or the battery is used in the positive process, the Lyon battery gets negative from its negative. This process is done through the 3.7 volts high-voltage outlets.

Laptop Battery:

Lithium batteries are used as a laptop battery and installed on large compounds. Laptop batteries are working on a number of sales chasings / discharging, so there is a need to be careful about chasing. Laptop batteries have temporary censors that monitor the battery's hits,There is a voltage regulator, whose job is to supply the right amount of current in all the cells in the battery, there is a battery charge state, which will show you how much the charge is on the laptop.

The main causes of battery damage are:

When the positive electrode cells inside our modern lithium battery are drained, the overall battery power can be reduced gradually and once the battery is ineffective. There are mainly three reasons for battery loss or battery loss. Those are.

1. Heat:

Battery is the main reason for withering because the battery is heated or the battery is hot. Extra hot batteries can destroy the life span, and even more pressure can cause the battery to explode through short-circuit! Each lithium technology has a separator inside the battery's sales. This separator's job is to switch the battery cells to positive / negative electrocode during chasing / discharging.When this separator is damaged, electrodes rotate inside the battery cells freely. Battery is over-heating because of this purposeless movement of the vehicle, and thus the possibility of battery explosion increases.

Avoid using the device directly in the sunlight to prevent battery being heated or hot, do not run any apps, games, etc. outside your device's power,
Refrain from charging while using the internet on the device, and most importantly, charge the battery using the right vortex current according to the charging capacity of your device's battery.

2. Not charging for a long time:

Batteries of lithium technology do not have any kind of charge memory. Because of this, if the lithium batteries do not charge for long, their sales may be eroded. So you will see that the new batteries of the new devices are available in the shops on light charges. Because there is a possibility of battery drain if the unused battery or full-load battery is not used for a long time.

3. Battery Age:

Lithium batteries mainly depend on their aircrafts on chasing. Generally, the maximum lifespan of a lithium battery is 2 to 4 years. You can have a battery of 1 year and the same battery can be another 2 years. In this case, the battery is charged for the number of times it has been charged.
Age is the main reason for the main reasons of battery loss. Older battery will be less likely to serve less than a new battery. So it is important to check the battery life of a new device when purchasing it. If you are looking at purchasing a new device that you have given the date of battery production more than one year ago, then you should definitely ask for a new battery from the device manufacturers.

Batteries of the near future:

Like every other gazede, scientists are also working to improve the battery. Because all the portable device improvements depend on the development of the battery. The batteries we can see in the near future are:
A) Dual Carbon Battery:
A company in Japan is trying to develop this dual-carbon battery by replacing the lithium oxide with lithium oxide with plain carbon to the positive and negative terminals used in lithium batteries. Dual Carbon Batteries will be charged 20 times faster than nowadays!Chasing will not be hot during this time and the possibility of a fire in this dual-carbon battery will be 10%. And the best thing is that these dual-carbon batteries will be available at low prices, they can also be recycled for non-toxid batteries. Basically this type of battery will be used for electric cars in the next few days.

B) Lithium Air Battery (Li-Air):

This lithium air battery technology is an advanced version of lithium batteries. The main focus of this battery is to use oxygen instead of chemical oxide in lithium batteries. Generally, lithium batteries are used on portable technology devices, because this technology is for the makers of a dream project.

C) Graphene Ultracapacitors:

The battery of this graphene ultracaptor technology is expected to be available in the next 50 years to touch the battery to the latest technology. This technology will charge the battery for only one second and the amount of Syrian quantities can be stored on it. Let's see what happens next!
Stay safe on the internet by following some basic rules

Stay safe on the internet by following some basic rules

We bring a certain diversity in our lifelong lifestyle, by focusing on particular issues with a particular day of celebration or festivities. Such as Valentine's Day, Mother's Day, Father's Day etc. There is no exception to the technology world.For example, February 9 is celebrated throughout the world as Safer Internet Day. For the past 13 years, cyber advocates around the world are celebrated on the second Tuesday of February to remind the Internet user to be alert. Today this day is celebrated in more than 120 countries of the world.In these cases, the main focus of the discussion is to keep children safe from harmful sites.
Internet security is basically a cyber criminal, cyber criminal, sonup, creep and other dark sites on the Internet. Using the strategies mentioned in this article, you can safely surf the internet.

01. Frequently updated frequently:

If you have a vulnerability in your operating system, browser or any other software, then you can be sure that your system can take control of Nutcracker-when But there is no reason to be concerned about it. Because software makers repair these halls of software very soon and open their updates. However, this update does not really require any action to install on your system.So, as soon as the software is released, install it as soon as possible for the security of the system. However, it is best to set up OS and apps to automatically update. However, it is quite a jarring to update Java and Adobe Acrobat. Some updates may occasionally cause other problems.

2. Update the antivirus software to the latest version:

Nowadays antivirus software is not as safe as previously installed software. As a result, installing antivirus software does not mean that you will be safe on the Internet you use. Antivirus companies have been updating their software regularly before the 'Zero Day' thread is incremented.These software can deal with over 90% threads. If you are unwilling to buy BitDefender or Intel's MacAfee by spending some money, then you can download the free AVG or Avast Antivirus, which will be the perfect solution.

03. Not being attracted to scams:

What could be more than malware and cyber crocus? The easiest way to access the attackers on your login is to fool you, so that you give yourself to them. It is usually acquired through the 'phishing' e-mail, which looks like the e-mail came from your bank, amplee or IRS.The main goal of this email is to entice you to access the bad site, where you enter the login name and password. If the hackers get your information once, they will be able to access and steal your account effortlessly.

04. Do not touch the file:

Scammers can access your system by sending bad attachments to the contract order for invoice or something. Such attachment documents usually infect your computer. If you can not recognize an attachment sender, you can delete that e-mail.If you think that the message has come from your friends or colleagues, then be sure to open an e-mail attachment, whether they are genuinely from your friends or colleagues.

05. Being a cyber guardian:

In the internet era, since you have been a sensitive guardian for babies, taixing, cyberbulisms and cat-phishing have become very difficult. The best in this case is to establish itself as a good education in the cyber world. The Connect Sable site will find a helpful, non-historical guide to keep children safe from cyberbullying, which works on numerous issues including SunPacatate and Instagram, complex questions of mobile phones or puzzles.Common senses media is another excellent resource, which allows you to find ways to become a cyber-guardian, as well as get a recapation on some more topics like Age-Appropriate, apps, games and so on.

06. Do not make mistakes about youtube:

If your child is walking online frequently, then they can spend most of the time on YouTube and other video sites. Most of these content are harmless and innocent, but none of them is there. You should always be aware of what your child is watching on YouTube, and you can set some controls if necessary.

07. New video player not installed:

Like our real life, bad people on the internet spend most of the time on the bad site. For example - Adult Site, Bit Torrent Search Engine and Stolen Internet TV Station. In some cases, almost a message pops up, where it says - your flash player is outdated.For that you need to install new video player, so you can enjoy all the videos you want. Do not forget the confusion in such a message, but do not do the job.

08. Use the password manager:

We usually use passwords for data protection. We have to rely on passwords so long as the password is good for us to protect the data. So judge yourself and use a good password manager.For example - One password, DashLyn or LostPass. It will serve as a password volt, which will store thousands of logins for different sites, so auto-generated will be a very difficult password, which is impossible to crack for you. The main thing to do this is, do not forget your volt master password

09. Protected the login:

If your password is stolen, then one of the ways to understand it is to check that someone logged in to your account from an unknown machine. As a way to prove to you, more and more sites are currently using Facebook and Twitter, which are specially Important.

10. Secure all Safari passwords:

Most people can not understand the importance of account security. If you are a WiFi user, then know that there are two passwords for your home WiFi. For a network that you type on logon from the new device and the other for the router. This will allow you to enter the network and change the network settings.For example - WiFi password. Most users remember to change the first set of logins, but the second set does not remember the key to change. Router default is well-known to everyone. Such as "admin" and "password". So, anyone in your home network range will be able to login to your router, change the setting, lock you up, if anyone wants to get hold of all the data you want or flush on your network.

11. Use encrypted password in public place:

Even if you are using a legitimate public WiFi network, someone else can keep an eye on your data on the same network as long as you are taking precautions. Firstly, if you login to webmail or account, then the website is encryptedMake sure to use the version. Remember, the address will always start with https but not with http. Otherwise, type in whatever the plane can send to the textet and it can capture someone else on the same network.

12. Fake or fake WiFi hotspot is not fooled by:

You will probably see a large amount of "free" WiFi hotspot when you go to a busy cafe or busy airport. Some of these are legitimate, some of which are very bad. In fact, you might want to find out before logging in A cafe, where free WiFi is offered, whatever the network name is. You can handle everything from all your internet traffic to the Finger Access Point, which comes to your computer secretly. If there is a doubt, then you can use a federal hotspot that costs some money, which is Secure.

Do to keep your Facebook ID safe

Do to keep your Facebook ID safe

Image result for facebook 1. Keep the login process turned on. You can get it in Security Options by going to Settings. After going to this option you will be asked to make sure. There you will be able to keep your Facebook account more secure by choosing any option you like.

2. Use the Privacy Backup Tool. You will find it in the privacy options of the settings. Choose the option "Who can see my stuff?" Here. But in this case, it is better to choose 'Friends' option than 'Public' option for your ID security.

3. Remove some of the friends in the buddy list. Especially those who have not been using Facebook for long or you do not have contact with them, you can remove them. This will ensure your account security.

In addition to these you will use a strong password for your ID. If possible, change the password after 15 days is good.
Back To Top