April 17, 2012

New TDS Software ( SQL Based )

Developed by
Anudeep Sharma, System Manager
SRM I Dn. Jalandhar,
Area-1 Chandigarh , Punjab
Mobile : 09417016663
email : anudeep_sharma@yahoo.com


Postal Manual Vol V Qn 26-50)

26.  New Speed Post discount structure and operational mechanism would apply to all existing bulk customers availing credit facility w.e.f.

            a)         01012011.                                 b)         01-04-1995
            c)         01-01-2008                                        d)         None of these                       Ans:a

27.       The list showing the details of bags to be received and dispatched by a mail office/transit section is

            a)         Sorting list                                         b)         Due mail list
            c)         A order                                               d)         B order                                   Ans: b(52a)

28.       The list showing the manner in which the articles must be dispatched is

            a)         Sorting list                                         b)         Due mail list
            c)         A order                                               d)         B order                                   Ans:a(52a)

29.       The mail comprised of articles and documents which must be dispatched every day or at regular intervals is termed as

            a)         Due mails                                          b)         Unusual mails
            c)         Bulk mails                                         d)         None of the above               Ans: a(53)

30.       Letter posted after the prescribed hours of closing the mails but within the time permitted for posting and with prescribed late fee (in addition to the postage) are called

            a)         Too late letters                                  b)         Late letters
            c)         Missent letters                                  d)         Non of the above                 Ans: b(56a)

31.       Letter posted after the prescribed hours of closing the mails but within the time permitted for posting and without affixing prescribed postage and late fee are called

            a)         Too late letters                                  b)         Late letters
            c)         Missent letters                                  d)         Non of the above                 Ans: a(56a)

32.       An article which has been erroneously forwarded by an office to an office other than the office of destination and an article is a vernacular article on which the incorrect destination are

            a)         Mis-sent & mis directed article       b)         Too late letter
            c)         Late letters                                         d)         Non of the above                 Ans: a(57)

33.       Mark incorrect correct option

a)       Trial card  used for the purpose of determining the relative advantage of
            alternative mail routes or the cause of detention to articles
            b)         Trial cards are red colour
            c)         Trial card should be included in any station bundle
            d)         None of these                                                                                               Ans: c(57)

34.       The timing of clearance of letter at railway station is fixed by

            a)         SSPOs                                               b)         SSRM/SRM
            c)         Sub Divisional Inspector of Posts             d)         IRM                                         Ans: b(58)

35.       The registered newspaper addressed to foreign countries must have
36.       class="MsoNormal">             a)         Separate license for posting         
b)         License to post without prepayment
            c)         License to post only on prepayment of postage
d)         None of these                                                                                               Ans:a(58a)   

36.       The min number of copies of Regd newspaper posted at a time

            a)         100                                                     b)         50
            c)         75                                                        d)         60                                            Ans: a(58a)

37.       Mark correct option

            a)         Bill of franking machine used is prepared in form MS10
            b)         In RMS offices, letter box key should be kept in custody of Sorting Assistant
            c)         Greeting cards are treated as first class mails in sorting. During the greeting
season they are given air lift also without air surcharge otherwise surface mode.
            d)         Label bundle should not contain more than 50 to 60 letters & post cards.n-left: 0.5in; text-indent: -0.5in;">             c)         Ordinary cirove                                                                                            Ans:e

38.       Mark correct option

            a)         Territorial bundle prepared for foreign when not less than 5 articles
            b)         Bulk bag system is not available for Srilanka, Nepal, Buthan & Pakistan
    sp;                 &nbscumstances the bulk of the correspondence for any office is more
                        than a single mailbag can contain called as plural mail bags
            d)         When extra mail bag(unusual mail) is closed for PO or Mail office the registered              bag should be place in the due mail list         
            e)         All of the above                                                                                            Ans: e

39.       Normally mail list prepared in

            a)         Triplicate                                            b)         Duplicate
            c)         Single copy                                       d)         Quadruplicate                       Ans: b(76b)

40.       Air mail bags dispatched to each port of call is accompanied with

            a)         Window delivery ticket                    b)         Inland airmail delivery bill
            c)         Mail list                                               d)         None of these                       Ans: b(76)

41.       Face of the article mean

            a)         Back side of the article        b)         The side on which sender address written
            c)         The side on which addressee address written   d)         None of these Ans: b(54)

42.       Letter posted in the Night post office without payment of late feed will be

a)         Impressed with the remarks ‘Detained late fee not paid’ and included on the next day dispatch
            b)         Returned to the sender with the remarks ‘late fee not paid’
            c)         Detained without any remarks
            d)         None of these                                                                                               Ans: a(56a)

43.       The incharge of a RMS division is called       

a)         Senior/Superintendent of RMS    b)         Sub Divisional ASRM
c)         HRO                                                   d)         SRO                                       Ans: a(4)

44.       The lowest unit of post office is

            a)         Head Post Office                              b)         Sub post office
            c)         EDSO                                                 b)         BO                                          Ans:d(8)

45.       Monthly sorting order is issued by
            a)         PMG                                                   b)         SSP/SP
            c)         DG Posts                                           d)         CPMG                                    Ans: d(9)

46.       The officer incharge of a Head Record office is designated as

            a)         Head Postmaster                             b)         Record officer
            c)         Head record officer                          d)         Head sorter                           Ans: c(17)

47.       Territorial regd bundl are prepared when the number of registered article is

            a)         25 or more                                         b)         5 or more
            c)         10 or more                                         d)         50 or more                             Ans: a(24)

48.       The keys and changeable hour plate of a letter box must be kept in the custody of

            a)         Postmaster                                        b)         APM
            c)         Postal Assistant                               d)         Treasurer                               Ans: c

49.       Station bundle are prepared only when the no of article either paid of unpaid of any PO
            a)         5                                                          b)         7
            b)         3                                                          d)         14                                            Ans: d(24)

50.       The mail posted BO are sent to

            a)         Directly to RMS mail office                                     b)         HO
            c)         AO for inclusion into bag to the mail office         d)         None of these Ans: c(8)

(Prepared by AB Kantharaja Mobile 08969822340,  http://abkantharaja.blogpot.in)

Conduct and Disciplinary Rules – Glossary A to C

Glossary A to C

Abet means to encourage, incite.
Abettor is one who abets the commission of a crime and is present or nearby during the act.
Absolve: To pronounce clear of guilt or blame.
Accused is a person against whom an allegation has been made that he has committed an offence or who is charged with an offence.
Acquit is to set free or deliver from the charge of an offence after trial.
Act: A law made by competent legislature.
Actori incumbit onus probandi: The burden of proof lies on the plaintiff or the prosecution.
Ad hoc disciplinary authority: In a case where the prescribed appointing or disciplinary authority is unable to function as the disciplinary authority in respect of an official, on account of his being personally concerned with the charges or being a material witness in support of the charges, then an ad hoc disciplinary authority is nominated for that case.
Adjudicate: To try and determine judicially.
Appeal: Appeal is a proceeding taken before a superior court or authority for reversing or modifying decision of an inferior court or authority on ground of error.
Appoint means to designate a person to discharge the duties of an office or trust.
Arbitrary: Depending upon the will or pleasure, based on mere opinion or preference, hence capricious.
Arbitrariness being opposed to reasonableness is an antithesis to law. There cannot, however, be any exact definition of arbitrariness, neither can there by any strait-jacket formula evolved therefor, since it is dependent on the varying facts and circumstances of each case.
Audi alteram partem means that both the sides must be heard in a case before it is decided, or that no one shall be condemned unheard. This is one of the rules of natural justice.
Bias may be defined as a preconceived opinion or a predisposition or predetermination to decide a case or an issue in particular manner, so much, so that such predisposition does not leave the mind open to conviction. It is, in fact, a condition of mind, which sways judgments and renders the judge unable to exercise impartially in a particular case.
Becoming conduct: Becoming conduct as defined in Union of India v. K.K. Garg, should conform to the four criteria, namely,
It should be in conformity with the ordinary norms of decency and morality prevalent in the society in which he lives;
It should be in consonance with the laws of the land, which he is bound to respect;
It should not be against the policies of the Govt. which he serves; and
There is not a deliberate breach of departmental rules by the employee.
Benefit of doubt: The advantage derived from doubt about guilt or a possible error of the evidence.
Bigamy: Bigamy is second marriage during the life of the spouse. It is an offence under Section 17 of the Hindu Marriage Act, 1955.
Bona fide: In good faith.
Books or documents of reference: Encyclopaedia, dictionaries and other authoritative treatises on different subjects and important and authentic documents of which the court may take judicial notice and to which it may refer without the same being formally proved.
Break in service: A period of unauthorised absence of employees working in industrial establishments during a strike which is declared illegal shall be deemed to cause an interruption or break in service unless otherwise decided by the competent authority.
In the case of other employees, unauthorised absence because of action in combination or in concerted manner shall be deemed to cause break in service.
Bribe: A reward or gift bestowed or promised with a view to perverting the judgment or decision or corrupting the conduct of a judge or other officer.
Taking or demanding bribe is a misconduct. It is also an offence punishable under Section 161 of the Indian Penal Code.
Bribery: The offer or acceptance of a bribe.
Burden of proof: The onus of proving the charges or allegations. When a person is bound to prove the existence of any fact, it is said that the burden of proof lies on that person.
It needs no emphasis that in a departmental inquiry, the onus of establishing a charge against the delinquent official is on the presenting officer or the prosecution. The finding of the inquiry officer should be based of materials presented during enquiry. If the Inquiry Officer places the onus of disproving the charge on the charged employee, the case of the department would straightaway fall.
Censure: An order of “censure” is formal and public act intended to convey that the person concerned has been guilty of some blameworthy act or omission for which it has been found necessary to award him a formal punishment, and nothing can amount to a “censure” unless it is intended to be such a formal punishment and imposed for “good and sufficient reason” after following the prescribed procedure.
Circumstantial evidence is based on circumstances, which get established by either oral or documentary evidence on the point under inquiry. Though the circumstantial evidence has to be assessed with great caution but it will be wrong to think that circumstantial evidence is weak evidence. A well-knit circumstantial evidence can reasonably lead to a correct conclusion. “For the purpose of a departmental inquiry, complaint, certainly not frivolous, but substantiated by circumstantial evidence, is enough.”
Civil Post: Civil post is a post, not connected with defence and outside the regularly constituted civil services.
Classification of Posts: Classification of civil posts under the Union as Group ‘A’, Group ‘B’, Group ‘C’ and Group ‘D’ posts.
Common Proceedings: Where two or more Government servants are concerned in any case disciplinary action may be taken against all of them in a common proceeding, under order from competent authority, in stead of separate proceeding against each of them.
Confess a kind of pension that may be grated to a Government servant who is dismissed or removed from service.
Complainant is the party who makes the complaint before a competent authority.
The rule is that if a general law is broken, any person has a right to complain, whether he himself has suffered a particular injury or not.
Compulsory retirement is a kind of retirement ordered as a measure of penalty under CCS (CCA) Rules.
Compulsory retirement pension is a kind of pension granted to a Government servant who is compulsorily retired from service as a measure of penalty.
Confession: The action of confessing (to own or admit as a fault) or acknowledging one’s guilt; an admission of guilt by a person who has committed a crime.
“We have the best witness in an accused who confess the charge”.
While there could be no better evidence than ones own confession, yet it is not safe to act upon the same when it is alleged to have been extracted by coercion, especially by the affected party. Such a confession could still be used, if some other independent witness had corroborated it.
Condone: To forgive, overlook, or disregard (a misconduct or offence) without protest or censure.
Condonation of break in service: The past services lost due to imposition of break in service will be allowed to count if the competent authority condones the break in service. “It is not the intention of the Government to deny the pensionary benefits to the employees is all cases of break of service. The question of condonation of break in service for the purpose of Pension Rules may be considered suo motu without waiting for a representation from the affected officials and orders issued so that the retired employees are not put to financial hardship”.
Condonation of break in service for other purposes may be considered on merits, in case of the employee making a representation expressing unqualified regret, etc.
Conduct: The way a person acts; behaviour.
Government servants are bound to conduct themselves in a way consistent with the faithful discharge ommand.
Conviction: The act of a legal tribunal adjudging a person guilty of an offy Government servant is bound to observe certain rules of conduct and discipline both in relation to his employment and outside his employment. There exist both written (not exhaustive) and unwritten codes of conduct for them which must be observed by every Government servant.
Conduct, which has led to conviction of a Government servant: The original conduct, which constituted the offence for which the Government servant has been convicted.
Conviction itself cannot be equated with misconduct. The basis for imposing departmental penalty under Rule 19 of CCS (CCA) Rules is the conduct, which has led to the conviction and not mere conviction.
Control: Power to check or restrain; superintendence. To regulate; to govern; to have under command.
Conviction: The act of a legal tribunal adjudging a person guilty of an offence.
Criminal proceeding: A proceeding instituted and conducted for the purpose either of preventing the commission of a crime or for fixing the guilt of a crime already committed and punishing the offender.
Currency of penalty: The period for which the penalty prevails or is in currency or is operating.
Currency of penalty-promotion during: To punish a servant and at the same time to promote him during the currency of the punishment may justifiably be termed as self-contradictory.”
“In other words, a penalty of ‘Censure’ is deemed to have become final as soon as it is imposed without any further currency, likewise the penalty of recovery should not be a bar to eligibility for consideration (for promotion).”

Courtesy : http://www.gservants.com/ & saparavur , Dheeru24k

How to Add a Water Mark to a Word Document

Most of us seen water marks in many papers especially in exam answer papers etc. With Microsoft Word We can set a water mark in our document to separate it from others. Also water mark help us to distinguish our documents from others. We can either insert a text water mark or a picture water mark

Microsoft Word 97/2000/XP (2002)/2003:
    Open the Word document that you want to add watermark to.
    Select "Format" from the top menu, then select "Background", then "Printed Watermark".In the "Printed Watermark" dialog: 1 To insert a text watermark:
    • Select the "Text watermark".
    • Then, either select a pre-defined text from the drop-down, or type in your desire text on the "Text" field.
    • Customize your watermark with other options in this dialog such as text size, text color, etc, then click "OK".
    • Watermark is now inserted into your document.

    2 To insert an image watermark:
    • Select the "Picture watermark".
    • Then click on the button "Select Picture...".
    • Navigate to the directory where your watermark picture is located. Select it and click "Insert".
    • Select a customized scale if desired, then click "OK".
    • The image is now inserted into your document as watermark.
But in Microsoft windows 2007/2010
we want to open the word document and select the tab “Page layout”
and select page background group select the water mark.
Then do the step 1 or 2to add the specified water mark.
Crusted: dheeru24k


To add the Run command to the Start menu

  1. Open Taskbar and Start MenuProperties by clicking the Startbutton Picture of the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Taskbar and Start Menu.
  2. Click the Start Menu tab, and then click Customize.
  3. In the list of Start menu options, select the Run command check box, and then click OK. The Run command will be displayed on the right side of the Start menu.


Ten Ways to Help Your Customers Get Serious About Passwords

Practice what you preach. This is one mantra many computer repair technicians live by. Yet one area that we’re still pretty hypocritical about is passwords. Be honest with yourself: are all of your credentials following thegenerally accepted rules of password complexity? It’s admittedly a hard principle to live by, seeing as we are inundated with passwords for what seems to be every service we deal with. Our customers are in the same position, and the onus is on us as computer repair technicians to ensure that they have a sound password policy and are sticking to it.

Computer security expert Steve Gibson covers password strength and complexity at length during his usual appearance on many Security Now podcasts. But he recently penned an excellent article for Consumer Reports magazine on some common password creation tips that he believes work well. He recommends that users employ password techniques such as complex passphrases or sentences. At the very least, Steve says, passwords must “grow the haystack” which refers to reducing the possibility that a hacker could easily perform a common-knowledge or dictionary attack on a given password. His article is a must-read for any informed computer technician.
Google’s own Small Business Blog highlighted this growing problem recently with an excellent post providing some basic guidelines on good password policy as well. However, I want to go one step further and outline ten specific ways you can help your customers set strong passwords, manage credentials, and juggle the security/convenience complex. I employ a mixture of these techniques for clients of my company FireLogicand they indeed stand the test of time.

10) Use a password strength checker to educate your customers
You can preach about password complexity rules all day to your customers, but showing them something visual always works best. For this reason, I employ the use of password strength checkers when customers doubt what I have to say about the credentials they choose. One very simply tool is provided by Microsoft which offers an easy to understand visual strength indication for how good a password is. If you really want to hit the point home, Steve Gibson’s company GRC offers a brutally honest password checker which is technically very accurate but perhaps a bit harsh on anything but the most carefully crafted passwords.

9) Use a high-security password generator
Asking customers to remember completely random 256 bit passwords may be a bit impractical. But for some applications, like high-stakes wireless networks employed in multi-tenant office buildings, this could be your saving grace for creating super secure wifi networks. Once again, Gibson’s GRC website offers a High Security Password Generator which creates unique various bit length passwords on each reload of the page. These passwords are very useful for WPA or WEP wireless deployments or other needs where strong, random credentials are a priority.

8) Offer SSO (Single Sign On) integration when possible
It’s a known fact: the more passwords we stack on users, and the more complex they are, the likelihood that they will get sloppy with password management increases exponentially. Help your business customers avoid “post it note password” solutions and offer to integrate core technology services with SSO when it’s available. Many common services like email, Active Directory, and other systems can be tied together with one set of credentials. For example, businesses on Google Apps can leverage Google Apps Directory Sync to tie into Active Directory, and likewise, other cloud services can also piggyback off Google Apps (most of the excellentZoho suite offers this.) Asking business users to adhere to one set of strict credentials is an easy sell and great way to enforce common password standards.

7) Phones need passwords now, too!
Most users carry around mini PCs right in their pockets and they overlook it. Those smartphones we all know and love contain massive amounts of information about a given person’s digital life, and many times, offer easy access to things like bank accounts and emails. At the very least, educate your customers about using simple password locks on their smartphones (backed by phone-tracing location services to take it one step further.) I’d even recommend that you push users to ensure they have the ability to remote wipe their phones in the case of theft. BlackBerry has been offering this for years, and iPhones and Android devices have similar functionality now too. An unlocked lost phone is as damaging as a lost laptop – perhaps worse.

6) Educate customers on avoiding passwords with personal information
As techs, we’ve known for years that using any part of our phone number, social security #, address, etc are very insecure methods for choosing passwords. Cyber thiefs know that people choose paths of least resistance when making passwords and in turn exploit this very easily. Don’t merely implement enforcements on core systems that your customers use which prevent this – let them know WHY these passwords need to be avoided!

5) No legitimate company EVER asks for passwords over email
Most modern email systems worth their salt should notify users about phishing attacks in email (Google Apps has been superb at this for years.) However, things will fall through the cracks and users should know that they should NEVER respond to any kind of email that asks for credentials to a service they use. Why would a bank ever ask you for your password – don’t they already control the system to begin with? Common sense is great, but sometimes users need reminders, especially when they are less technically savvy. A good computer technician will always offer solid education to his/her customers in this regard.

4) The “forever” password is just plain old bad policy
What’s a forever password, you ask? One that never changes. For ease of use, many companies allow employees to set it and forget it when it comes to passwords. Discourage your customers from following this methodology. The likelihood that a password may get written down and found at some point increases proportionately when there are no password age requirements on systems. Almost every major technology offers this these days, and Microsoft has a great guide on the various restrictions a company should place on passwords.

3) Push your larger customers to get an IT audit
Seeing is believing, and an IT audit can help your customers see exactly what is wrong with their IT policies when it comes to security. There are many firms that offer such audits in the form ofethical hackingsocial engineering penetration, and other similar services. These are real eye openers and can be the difference between complacency and pre-emptive action.

2) Limit exposure to administrative passwords
Passwords are only as secure as the people who are trusted with safeguarding them. Password books that float around an office which contain admin passwords to core network and server hardware along with email systems is not only a security hole, but an attack waiting to happen. Any kind of master password list should at the very least be encrypted in some kind of password management tool like the excellent free KeePass. Access to those files should then be restricted to key company personnel and the computer technician (like yourself) responsible for their maintenance. A smaller footprint greatly reduces chances of password theft.

1) All internet-connected computers ALWAYS need quality anti-malware software
This should almost go without saying but many people still (sadly) overlook this. Good security software goes a long way, and all laptops and desktops that touch the internet need to be protected these days. Even Macs are getting pummeled with malware on a daily basis. Free products are decent, but nothing beats a paid security program this day in age. My favorite continues to be ESET’s award-winning NOD32, with Kasperskyalso offering a solid product. Most of the damaging malware these days is coded with the full intent of stealing critical passwords and information from computers to allow hackers entry into their victim’s so-called “gold mines” of digital treasure. Even the strongest passwords can be sniffed out by malware prowling on an unprotected system.

Whether you are a computer repair technician that supports only residential customers, or have a growing small business following, the above facets of solid password policy can be applied. Remember that YOU are considered the expert when it comes to security, and customers rely on YOU to be their source of education on such matters.

Courtesy : http://www.technibble.com,mrsupport.blogspot,dheeru24k

India Post's gold offer for Akshaya Tritiya

India Post is offering 6 per cent rebate on gold coins of various denominations this Akshaya Tritiya, according to the Chief Postmaster General, Andhra Pradesh Circle. Buying gold is an important aspect of the festival that is on April 24 this year. The festival offer will be available at designated post offices across Andhra Pradesh on gold coins of 0.5 g, 8 g, 10 g, 20 g and 50 g of 24 carat and 99.99 per cent purity, a press release said.
India Post, in association with the World Gold Council and Reliance Money Infrastructure Ltd, began selling gold coins made by Switzerland's Valcambi in 2008. At present, gold coins are available at more than 800 post offices across the country.
Source : thehindu


In this 2010 file photo, Muslims looking at a selection list after 'Qurrah' (draw of lots) for Haj pilgrimage, organised by Madhya Pradesh State Haj Committee in Bhopal. Photo: A.M. Faruqui

The Hindu In this 2010 file photo, Muslims looking at a selection list after 'Qurrah' (draw of lots) for Haj pilgrimage, organised by Madhya Pradesh State Haj Committee in Bhopal.

The Centre has informed the Supreme Court that it has decided to restrict Haj pilgrimage at government subsidy to Muslims only as a “once in a lifetime” affair as against the existing policy of “once in five years”.
In an affidavit filed before the apex court, the government said the new guidelines have been framed to ensure that priority is given to those applicants who have never performed Haj.
“This is a major change introduced for the first time.
Restricting the number of pilgrimages to a Haj applicant through HCOI (Haj Committee of India) to ‘once in a lifetime’ as against the existing ‘once in five years’ will ensure that the Haji will benefit from government subsidy only once in his/her lifetime. It will also ensure that priority is given to those applicants who have never performed Haj,” the Centre said.
The government, however, refrained from disclosing the amount of subsidy being incurred by it for 2012 saying, “The exact figure in respect of the travel subsidy to the pilgrims going through Haj Committee of India for 2012 will be known after the Hajis completed their Haj journey and return to India.”
According to the government, priority will be given to those who are in the 70 plus category and those who had unsuccessfully applied thrice earlier for the subsidy.
The Centre’s affidavit comes in the backdrop of certain searching questions raised by the apex court on February 24.
A bench of Justices Aftab Alam and Ranjana Prakash Desai had directed the Centre to provide details of subsidy given by it and criteria adopted for allocation of seats to state committees.
The apex court frowned at the practice of sending official delegations to accompany the pilgrims and had asked the Centre to furnish entire details regarding Haj subsidy, as also to the criteria adopted.
The apex court was hearing an appeal filed by the Centre challenging a Bombay High Court judgement which had directed the Ministry of External Affairs to allow certain private operators to operate the services of 800 of the 11,000 pilgrims earmarked under the VIP quota subsidised by the government.
Earlier, the bench had pulled up the Centre’s practice of “politicising” the annual Haj pilgrimage by permitting official delegations to accompany the pilgrims, for which the government offers huge subsidy, saying, “It’s a bad religious practice.

Transfer Policy implemented by DOPT

Transfer Policy implemented by DOPT
Rotation Transfer Policy implemented with a systematic manner to Ad-hoc Assistants.
The Department of Personnel and Training has published orders from time to time regarding the service matters, in that respect, on 16th April, 2012 an order has been published regarding the subject of transfer of ad-hoc assistants under Rotational Transfer Policy (RTP) of Central Secretariat Services. Ad-hoc assistants working in the same department, who are all completed their service 16 years or more as on 1.1.2012 are to be transferred, due to implementation of RTP .
This decision has been taken by the Department of Personnel and Training to implement Rotation Transfer Policy (RTP) in a systematic manner.  The order also insists to all Cadre Units, to furnish a list of ad-hoc assistants who have completed 16 years or more in the Cadre Unit in any capacity as on 1.1.2012, except those officials who are due for retirement on attaining the age of superannuation, within two years to this Department. The officials concerned may be requested to indicate their preferences for posting in the enclosed format and the same may also be furnished to the undersigned by 24.04.2012.

Click here to view the enclosed format…

Publishes: Dheeru24k 

Save your Gmail Messages in Google Docs

Download Microsoft Word microsoft.com/free-trial-office365
Work Together In Real Time On Docs, Spreadsheets and More. Learn How.
You can save your Gmail messages in Google Docs and then edit them like any other document. The other use case is that once a Gmail message is available inside Google Docs, you can easily export that email as a PDF file or as a Word document while retaining the original formatting and without requiring an external PDF writer.
send gmail to google docs
To integrated Google Docs with Gmail, go to the Labs page and enable the “Create a Document” gadget. Save the changes and return to your Gmail Inbox.
Next, open any of your existing email messages and you should see a “Create a Document” link under the More box as shown in the screenshot above. This will export the current message as a new document in Google Docs – the rich text formatting is preserved but if the message includes any file attachments, Google Docs will ignore them.
One more thing. The Google Docs app for Android allows offline access to your documents so once you have saved your most important Gmail messages in Google Docs, they can be accessed on your phone without a data connection as well.

Crusted & Publishes by  Dheeru24k

Related Posts Plugin for WordPress, Blogger...
Related Posts Plugin for WordPress, Blogger...