Skip to main content

What Should We don't Do In 4 Years Of Engineering College..

           ⇰Shivam kumar mishra

  • Don’t disrespect the faculty but don’t shy from bunking class once in a while.
  • Don’t spend the initial 3 years enjoying too much that you forget the way ahead. Set a goal in initial 2 years and work towards it.
  • Don’t foolishly spend money on every club and the fest which is being organised in and around. 
  • Don’t spend the nights playing video games and watching movies. First of all, remember that regular night outs will have toll on your body in long run. Second, play outdoors more and don’t fool yourself that you are learning English in the name of hours of movie and TV series watching.
  • Don’t go into drugs and alcohol. It has serious impact and I have seen it.
  • Don’t ruin the semesters in the name of petty breakups and friend fights. Those are happy moments but don’t take them seriously.
  • Don’t take exams seriously but do take the learning seriously.
  • Don’t refrain from visiting library. It is the underrated place for engineers. Believe me the collection there might surprise you.
  • Don’t let the time pass like that. Make friends, create memories, develop a passion and hobby, set a goal and get ready to fly once you leave the college.
  • Don’t forget to smile. Let the problems come for they will surely, but they will pass by. Back logs, no placements, sleepless nights etc aren’t that big a problem. There are much bigger problem than these. Shrug the shoulders, take the lesson and move on.
#iamskm

Comments

Popular posts from this blog

MOST COMMON CYBER ATTACKS

1). PHISHING:        • One of the most insidious techniques used today is Phishing. It's hard to find the person that doesn't know what phishing is. However lot of users still getting tricked by the hackers.         • Phishing implies    the replication of the website with the aim of stealing money or personal information. And once a user enters his credit card details in that fake website, a hacker can get access to those details and will be able to use those information for his own benefit. 2). Viruses and Malicious Codes:        • Hacker's can almost crawl into any website and leave in its database malware or insert code into website files.         • There is a huge variety of viruses, and each may impact the infected websites differently. 3). UI Redress:        • This technique is similar to the phising; but in this case a hacker could create a fake hidden user int...

Will life ever be the same again?

Stay at home, work from home The fact is, even before COVID-19 became the catalyst, there were quite a number of employers already embracing the ever-evolving technologies that make WFH an option for their employees. They recognized that it’s no longer necessary to have employees be in an office full-time to be productive contributor to a team. Indeed, many kinds of work can be done just as effectively, if not more so, from home or anywhere. But this time, WFH was not an option but mandatory. Were employers and employees ready for workplace changes? Let’s take a quick look at the top challenges faced by employees versus business leaders/owners working from home: Barriers to effective communication top the challenges faced by both employees and business leaders/owners. Both groups also pointed out insufficient facilities, tools and devices; and that the home environment is not conducive to work as the other top challenges faced. Surprisingly, lack of trust came up last in ...

दुनिया की सबसे ज्यादा उपयोग होने वाली वेबसाइट

आज मैंने आप लोगो के लिए बहुत ही अच्छा डाटा बेस तैयार किया है | इस डाटा बेस से आप लोगो को बहुत हे ज्यादा लाभ होगा , क्युकी इसमे सौ से ज्यादा वेबसाइट का नाम है और उसके सामने उसका लिंक भी दिया गया है | अगर आप लोगो को यहाँ डाटा बेस अच्छा लगे तो अपने दोस्तों के साथ जरूर शेयर करे |इसमे मैंने आप के यूज़ मे आने वाली बहुत सारी वेबसाइट का नाम है | उम्मीद है आप लोगो को यह जरूर पसंद आएगा ||| . How to simultaneously videos to YouTube – tubemogul.com . How to share you email address online without worrying about spam – scr.im . How to check font name of any image- myfonts.com/WhatTheFont . Best Collection of Open source fonts- google.com/webfonts . How to find data hidden in your photographs – regex.info . How to set broadcast events live over the web, including your desktop screen – livestream.com . How to search all your domain – iwantmyname.com . How to design from scratch or re-model your home in 3d- homestyler.com . How to share all your screen with anyon...