Ukpor being the headquarters of Nnewi south local government area of Anambra state is known for its very hilly topography.
The towns that share boundary with Ukpor are;
1) Okija
2) Azia
3) Ihembosi
4) Lilu
5) Orsumoghu
6) Ezinifite
7) Ebenator
8) Utuh
9) Nnewi
10) Ozubulu
Ezinifite, Ebenator, and Utuh are all from same local government (Nnewi south local government area) with Ukpor. They are known as ‘Mbaneri (the ten towns)’.
Okija, Azia, Lilu, and Orsumoghu are all from Ihiala local government area in Anambra state.
Ihembosi and Ezinifite are under Ekwusigo local government area of Anambra state.
Then, Nnewi which is the second largest town in Anambra state after Onitsha (according to Wikipedia) is situated at Nnewi North local government area.
Please, subscribe to my channel on YouTube ( https://youtube.com/@profblinkstv ), and turn on notifications to get updates of our new videos. Thanks 🙏
Kindly, drop suggestions on the comment section. Thank you 🙏
Do you know that every status you view will save itself temporarily on your Phone memory for 24hours? No need to ask people to send their uploads to you (waste of data bundle).
You don’t need to download ‘status saver apps’ – they even consume your Phone space.
Follow these steps to get those videos you enjoyed watching from your contact’s status:
Make sure you have a files manager or explorer.
When you have watched the video from that person’s WhatsApp status – go to file manager/explorer.
Locate for ‘show/hide hidden files’ in the file manager/explorer settings. There are different versions of explorers, but make sure you locate it and enable hidden files to display.
After you locate and click on it, set it to display hidden files.
Go to the location of your WhatsApp downloads (either phone or SD card storage) and click on it.
Locate the ‘WhatsApp’ folder and click on it.
Then, you click on ‘media’.
Then you click on ‘.statuses’
Now, click on status and you will see all the statuses you have viewed and are yet to expire. (Remember that these statuses are available only for 24 hours and will erase completely from your storage after that.
TO SAVE THEM PERMANENTLY, FOLLOW THESE STEPS:
Mark/select the ones you want.
Copy them
Paste the copied item(s) in your desired folder – the deal is done.
Over the past few weeks we’ve covered some of the basic aspects of blockchain technology. By now, you are hopefully eager to get started and become part of the blockchain community. The easiest way to do this is to get some cryptocurrency or tokens of your own. In this blog post we will step through how to purchase, transfer and store cryptocurrency and tokens.
Before diving into it, let’s go through a few definitions to avoid any confusion down the track.
Blockchain: A computer protocol that allows a network of computers to share and maintain a digital information ledger. There are many different blockchains; the most famous of which are Bitcoin, Ethereum and Ripple. Each blockchain has its own protocol, network and user base.
Cryptocurrency: The native currency of a blockchain. Cryptocurrencies are used to interact with the blockchain (either transferring cryptocurrency or interacting with an embedded smart contract) or as payment for real world goods and services.
dApp (decentralized application): An application whose backend code is embedded into a blockchain in the form of a smart contract.
Token: A digital asset native to a dApp. Tokens usually represent some form of value within the dApp, most commonly the right to interact with its smart contracts or share in its revenue.
Coin: A common term for cryptocurrencies and tokens.
Altcoin: Any coin that is not Bitcoin.
Fiat: Regulated, centralized money like USD, Euro or AUD.
Exchange: An online marketplace for buying and selling coins. Fiat exchanges allow you to trade between coins and fiat while coin exchanges only allow trading between different coins.
Lets have a look at how these terms fit together in the Ethereum blockchain:
Disclaimer. it is actually quite difficult to find consistent definitions for the blockchain terms above. There seems to be some inconsistency in how different communities use these terms and tokens are frequently referred to as cryptocurrency in many online forums. For the purposes of this blog, we will continue to use the above definitions.
There are 3 steps to purchasing your own coins.
Purchase coins from an exchange
Create a wallet to store your coins
Transfer your coins from the exchange to your wallet
Purchasing coins from an exchange
Unless you’re planning to dedicate your computer to mining, there is only one way of getting your hands on some coins; you have to find someone who is willing to sell you their coins for fiat. Luckily for you, all you need in order to find someone to trade with is an internet connection. The vast majority of people purchase their coins through online exchanges. There are hundreds of exchanges around the world and they all have their pros and cons. Most people who want to purchase coins with fiat use domestic exchanges to avoid international transaction fees and long waits. A quick google search will tell you which exchanges accept your local currency. Alternatively, you could have a look through cryptocompare’s extensive list to find an exchange that suits your needs. If you are after Bitcoin, bitcoin.org also has an extensive list of recommended bitcoin exchanges on their webpage. If you are after a specific coin, Coinmarketcap allows you to check where each specific coin can be traded (just select the coin you want to buy and click “markets”). Most smaller coins are not traded on fiat exchanges so if you’re after a smaller coin then your best bet is to purchase Bitcoin at a fiat exchange first then use a coin exchange to trade your way into the coin you’re after.
There’s a few key things to look for when you’re selecting an exchange
Safety: By far, the largest contributor to stolen coins over the past 6 years have been hacked exchanges. Because exchanges facilitate thousands of transactions every day they need to have automated solutions for moving coins around. As a result, exchanges are inherently less secure than your own private account which can be maintained completely offline if you so choose. My advice if you’re just starting out is to pick a large, reputable exchange with a proven track record.
Market spread: There is no official exchange rate for cryptocurrencies. Instead, the purchase price is simply the lowest price anyone on your exchange is willing to sell for. As a result, there is always a spread between the buy and sell price of any given coin. The more users an exchange has and the more popular the coin is, the lower its spread. Picking an exchange with a large user base is therefore likely to give you a more fair price.
Note. if you’re not familiar with the Arbitrage Flat Fish and other aquatic block characters in this post you may want to go back to Post 3 and familiarize yourself with the blockchain ecosystem.
Fees: Trading fees, deposit fees and withdrawal fees can all eat into your starting capital. Transaction fees vary widely between exchanges and typically range from 0.25% to 3%.
Once you’ve picked an exchange you’ll likely have to go through a sign-up procedure including identity verification. Don’t worry, it’s usually just a matter of taking a few pictures of yourself holding up your driver’s licence/passport to comply with local anti-money laundering policies.
Cryptocurrencies are pseudo-anonymous. Every single transaction is logged in the blockchain and is publicly available. You will still have to pay your taxes…
If revealing your identity doesn’t sound appealing to you for one reason or another you basically have two options.
Use an exchange based in a country with more relaxed anti-money laundering laws.
Find someone who is willing to sell their coins for cash in hand using a service like localbitcoin. If you go for the second option, I recommend reading up on other people’s experience and doing some research before meeting up with anyone in person. This thread from bitcointalk.com has some excellent information.
After you’ve finished the registration process you’ll have to transfer some money into your new account. Most exchanges offer a variety of ways to do this including wire transfers, credit card purchases and PayPal. These methods typically have different deposit fees so make sure to read and understand your exchange’s fee system before making your first deposit.
Once your money is in your exchange account you’re ready to start trading. If you picked an exchange with a large spread, you need to make sure you know what a fair price is before you put in your order. Coindesk.comwill give you reliable and real-time information on current average trading prices for Bitcoin and Ethereum. As stated previously, you can also use Coinmarketcapto check the going rate for each coin at different exchanges. Once you know what price you’re targeting you can place your first buy order.
Note. some exchanges have different fee structures for market “makers” and “takers”. A market maker in this context is an order that is not immediately matched (i.e. a buy order with a lower price than the lowest sell order). Market takers on the other hand are orders that match an existing order and are immediately executed. Fees are typically higher for market takers so take this into consideration when placing your order.
The vast majority of exchanges have percentage based trading fees as opposed to fixed fees. You can therefore start off slow and place a few smaller orders to get used to the system before placing your main order. Once your orders have been executed you’ll be able to see your coins in your exchange account.
Congratulations, you are now a cryptocurrency owner!
Create a wallet to store your coins
As discussed in Post 4, the way cryptocurrency is stored on a blockchain is that it is linked to a private key. Private keys are just long strings of letters and numbers that are generated in a random fashion. An example of a private key we just created for the Ethereum blockchain can be seen below.
This private key is all that is required to gain access to all the funds on this account. In fact, when people talk about blockchain “accounts”, they are really just talking about private keys. If someone somehow managed to guess your private key, they would immediately get access to all your funds. No centralized authority exists whom you could complain to and since the blockchain is immutable, there would be no way for you to get your money back. This may sound unsafe until you realize how many different possible combinations of private keys there are. A private key can be represented by a 256 bit number (a binary string of 256 zeroes and ones). That means there are 2^256 or 10^77 possible combinations of private keys. This is a number so large that it is incomprehensible to human beings (the number of atoms in the observable universe is estimated to be ~10^80 – Universe Today).
Creating a new account on a blockchain is simply the exercise of randomly generating a valid private key. Let’s step through an exercise so you can see what we mean. Let’s create an account on the Ethereum Blockchain using MyEtherWallet.com.
Select “View Wallet Info” then select “Private Key” as your method of accessing your wallet
Copy paste in the following address “bc07b514c6405bdbcb1475d33d4ba9a714e170c3332810f9a153b64cb12eb0a2″
Hit “Unlock” – You should then see the following screen:
You have just unlocked the account I created a few minutes ago! All you need to access an account is the private key. This is why it is essential to never give out your private key to anyone
Lets do a quick experiment – Refresh your page then select “Private Key” again
Copy paste in the following address “bc07b514c6405bdbcb1475d33d4ba9a714e170c3332810f9a153b64cb12eb0a2″ but this time change a couple numbers
Hit “Unlock” – If you did everything correctly, you should now have accessed a completely different wallet (if it didn’t work, try changing a different set of numbers)
Congratulations, you have just “created” a brand new Ethereum private key. The reason for stepping through this exercise is to show you that in theory, you don’t need a fancy computer program to generate a new private key. In fact, you could even “create” a new private key using only dice, pen and paper (Swanson Technologies). Creating a new private key or account is not like creating other accounts on the internet where your username and password are stored in a database somewhere. Instead, creating an account simply means being the first person on earth to come up with a specific private key. This private key is not stored anywhereon the blockchain. Until you make your first transfer, nobody will ever know you’ve just created a new private key. Although it is possible to create a new private key using only pen and paper, most people simply use the random number generator feature that comes with all standard wallets.
Another way to think about it is that you never really created a new account. Instead, you simply unlocked an already existing theoretical Ethereum account by being the first person in history to come up with that exact private key.
Wallets are simply software that allow you to easily check your funds, generate transactions, broadcast transactions and interact with smart contracts. Most wallets also include functions that allow you to encrypt your private key so that the only way to gain access to your account is through a combination of an encryption file and a password. There are also a variety of other ways to access your account without exposing your private key. This is why you had a number of options to access your wallet when you created your new account earlier. My recommendation is to use a Keystore File to access your account when you start off the upgrade to a hardware wallet when you have more money invested.
As discussed previously, keeping your coins in your exchange account for a long period of time is not a good idea. This is because exchanges manage thousands of transactions every day and therefore need to be able to achieve some level of automation. In order to achieve this automation, exchanges commonly keep private keys on their servers where they are vulnerable to hacking. Additionally, you don’t truly own your cryptocurrency while it is on your exchange account as you don’t have access to your private key. In other words, your ownership of your coins is reliant on your exchange allowing you access to them. This is completely contradictory to the fundamentals of cryptocurrency where you and only you can ever access your funds. We therefore highly recommended that you transfer your funds to a private wallet as soon as possible and only keep coins in your exchange account for trading.
There are several different types of wallets:
Software wallets: Software wallets allow you to securely and randomly generate private keys and manage your funds through simple user interfaces. For Bitcoin, there are at least a dozen software wallets that all offer different levels of ease of access, functionality and security. Bitcoin.org maintains a good list of recommended wallets on their website. Ethereum is younger than Bitcoin and therefore has fewer options for software wallets. For now, the best option for Ethereum users is to use either the official Ethereum Client Wallet (see below) or Myetherwallet, an open source, simple, browser-based wallet. Note that Myetherwallet is sometimes classified as a web/online wallet however it does not store any information online and can be downloaded and run in offline mode quite easily.
Client wallets: Client wallets are a subtype of software wallets that include downloading the entire blockchain to date (100GB+). Most blockchains have a native client wallet such as Bitcoin Core (previously known as BitcoinQT) and Ethereum Wallet (sometimes referred to as Mist although Mist is actually Ethereum’s native browser for dApps, one of which is the Ethereum Wallet). Some blockchains also have lightweight clients that doesn’t require downloading the entire blockchain. Electrum is an example of a lightweight client for Bitcoin.
Mobile wallets: Software wallets that can be run on your mobile device. Your private key never leaves your device however these generally tend to be less safe than computer based software wallets as it is harder to protect your phone from hackers.
An important note on software wallets is that the wallets are only as safe as the computers that run them. It’s difficult but not impossible for a hacker to install malware on your computer that allows them to see your screen and track your keyboard input.
Please install malware detection and anti-virus software on your computer when dealing with cryptocurrencies… If you’re not sure what to use, I recommend Avira and MalwareBytes but feel free to do your own research on this. Another highly recommended way of protecting against hacking is to encrypt your private key with a secure password. What this actually means is that your Private Key will be stored in a file on your computer, but in an encrypted way. The only way to decrypt it is by using your password. This way, hackers need to gain access to both your Keystore File and your password in order to access your account. Almost all software wallets allow you to do this and some, like Armory, allow you to employ additional layers of security such as multi-signature addresses.
Online wallets: Online wallets are similar to exchanges in that they store your private keys online and allow you to access your funds from any device with an internet connection. Online wallets are among the easiest to use however they suffer from the same security concerns as exchanges and should therefore be avoided for storing larger amounts of cryptocurrency. Some online wallets have apps that allow you to access your funds via your phone.
Hardware wallets: Hardware wallets are real-life devices that generate private keys offline on the device itself. They look like USB sticks and need to be plugged into your computer to generate transactions. Hardware wallets are immune to malware as the private key never leaves the device and can be secured further by adding a password to protect yourself from theft. Overall, hardware wallets are considered to be the safest option for storing large amounts of cryptocurrency. The two most common hardware wallets are Trezor and Ledger Wallets.
Paper wallets: Paper wallets refer to private keys that are not stored digitally anywhere. Instead, all the details of the account are written or printed on a piece of paper and stored somewhere safe. Several websites exist that make it easier to generate and print a random string suitable for cryptocurrency storage. bitaddress.orgallows you to generate random Bitcoin keys based on your mouse movement while Myetherwallet can be used to generate random Ethereum keys. If you don’t trust these sites, simply change a few characters or numbers manually after you finish generating your new key and you’ll have a new private key that has never existed in any way shape or form on any digital device. To make sure that everything worked and you have a valid address, send a tiny fraction of a coin to your new address first to check that everything works. You can check the funds on any Ethereum or Bitcoin address using Etherscan and Blockchain.inforespectively.
Lets step through how to generate a new wallet using two different methods; myetherwallet for Ethereum and Electrum for Bitcoin.
Creating an Ethereum wallet using myetherwallet
Myetherwallet is a simple and safe wallet solution for Ethereum. If you’ve read through this tutorial from top to bottom you would have already had some experience with how to use Myetherwallet. Lets now step through how to generate a new private key using Myetherwallet:
Note. myetherwallet is an open source html interface. Because it is open source, it is easy to clone. If you accidentally go to www.myetherwallet[dot]com[dot]co instead of www.myetherwallet[dot]com, you will end up on a fake website that steals your private key along with all your coins if you try to access your account. To avoid scamming websites like this, use bookmarks instead of clicking on links and always triple check that the domain name (.com) is the correct one.
Enter a strong password. This password will be used to encrypt your private key so you don’t have to enter your private key every time you want to access your account. Once you’ve entered your password you’ll see this screen:
Unless you’re planning to use your un-encrypted private key to access your funds (we highly recommend not doing this), download you Keystore File now. Make sure you keep a backup of your Keystore File on a USB drive. If you lose the Keystore File or forget your password, you will not be able to access your coins. When you are ready, click “I understand. Continue”:
This screen shows your new, randomly generated, private key. As long as you have your Keystore File and password, you don’t have to memorize your private key. There is however an option to print out a physical version of your private key in case you lose either your Keystore File or password. This option is what’s called a paper wallet which is basically just a fancy name for writing down your private and public keys. When you are ready, click “Save Your Address”.
That’s it! That is how easy it is to create a new blockchain address. You don’t have to put in your name, your email or any other identifiable information. The mechanism that keeps other people from accessing your funds isn’t an identification system but rather a mathematical firewall of improbability. To view the funds on your wallet, click “View Wallet Info” and access your account using either your keystore file and password or your private key.
Once you’re inside your account you’ll be able to see your private and public keys, your account balance and your transaction history. Your public key (often referred to as your address) can be shared with anyone. This is what people will use when they want to send coins to you. It is also what you need for the next step of this tutorial.
Creating a Bitcoin wallet using Electrum
Electrum is a Bitcoin software wallet that can be installed on Windows, OSX or Linux. It can be downloaded free of charge from electrum.org. When you install Electrum you’ll be asked a couple of questions:
This will create a seed for your new private key. A seed is a sequence of 12 words that can be used to access your wallet if you lose your password. Electrum requires you to re-enter your seed to make sure you wrote it down correctly:
Similar to myetherwallet, you’ll also be required to enter a strong password. This password will be used to encrypt your private key for additional safety.
Once you’ve finished setting up your account Electrum will start up. Navigate to the “Receive” tab at the top of the wallet interface.
From here you’ll be able to see your public key which is what people will use when they want to send coins to you. It is also what you need for the next step of this tutorial.
Transfer your coins from the exchange to your wallet
This step is fairly straight forward. All you have to do is follow all the instructions on your exchange carefully and make sure you put in the correct public key to send your coins to. Most exchanges use the term “withdrawal” for sending your coins from the exchange to your personal address. Some exchanges take up to a few hours to send your coins so don’t worry if you don’t see them in your account straight away. As always, it is best to send a small amount first so that you get comfortable with how to withdraw coins before withdrawing the full amount. After the exchange has sent your coins through you should be able to see them in your wallet.
Now that you know how to get started, we want to leave you with three pieces of essential advice that we tell any of our friends who are considering investing in cryptocurrency:
Start off slow: No more than a few hundred dollars at most. This way you can learn the ropes and get comfortable with cryptocurrency before you start taking any serious risks.
Never invest more than you can afford to lose: Seriously. Cryptocurrency is still in its relative infancy and despite what they might tell you, nobody knows where any given cryptocurrency will be in 3, 5 or 10 years from now.
Be intensely paranoid about cyber security: There are thousands of hackers and scammers out there who would love nothing more than to get their hands on your unregulated, anonymous and immutable cryptocurrency. Please exercise utmost caution when dealing with cryptocurrency and protect your private key like your life depended on it.
We hope you’ve enjoyed this tutorial and that it has made the prospect of getting into cryptocurrency easier for you! Please don’t hesitate to post any questions or clarifications on the comment board below if you have any. Our next post will explore the argument against blockchain. In this post we will take an objective look at several skeptical arguments for why blockchain will not be the transformative technology we think it will be. Hope to see you there!
There are secret killings going on in sokoto which is not made public. Just yesterday two Mopol Officers were killed, in NNPC. Also one person’s head was cut off at Bello way, while in G.I Lane one man was found dead with his head and manhood cut off. Our lovely brothers and sisters currently in Sokoto please try and reduce your night movement to avoid pathetic stories that touch. Please if you can, kindly send this post to all Groups. Please also note that this is not one of those hard jokes.
In December 2014, Muhammadu Buhari went on the record to say he would abolish, scrap or ban the office of the First Lady if he was elected as President, saying that it was unconstitutional.
The Movement for the Emancipation of the Niger Delta (MEND), which endorsed Buhari for the 2015 general elections, commended Buhari for his plans, when elected as President, to scrap the so-called “Office of the First Lady”. MEND went on to say that the office of the first lady is obviously an irrelevant, fraudulent and unconstitutional office, whose only purpose is to further plunder the resources of the country. LATE STELLA OBASANJO (FMR NIGERIA’S FIRST LADY)
Since assuming the presidency on 29 May 2015, Buhari has yet to officially abolish, scrap or ban the office of the First Lady. Aisha Buhari operates from the office of the First Lady as “wife of the President“.
The original Roman year had 10 named months Martius “March”, Aprilis “April”, Maius “May”, Junius “June”, Quintilis “July”, Sextilis “August”, September “September”, October “October”, November “November”, December “December”, and probably two unnamed months in the dead of winter when not much happened in agriculture. The year began with Martius “March”. Numa Pompilius, the second king of Rome circa 700 BC, added the two months Januarius “January” and Februarius “February”. He also moved the beginning of the year from Marius to Januarius and changed the number of days in several months to be odd, a lucky number. After Februarius there was occasionally an additional month of Intercalaris “intercalendar”. This is the origin of the leap-year day being in February. In 46 BC, Julius Caesar reformed the Roman calendar (hence the Julian calendar) changing the number of days in many months and removing Intercalaris.
January — Janus’s month
Middle English Januarie
Latin Januarius “of Janus”
Latin Janu(s) “Janus” + -arius “ary (pertaining to)”
Latin Januarius mensis “month of Janus”
Janus is the Roman god of gates and doorways, depicted with two faces looking in opposite directions. His festival month is January.
Januarius had 29 days, until Julius when it became 31 days long.
February — month of Februa
Middle English Februarius
Latin Februarius “of Februa”
Latin Februa(s) “Februa” + -arius “ary (pertaining to)”
Latin Februarius mensis “month of Februa”
Latin dies februatus “day of purification”
Februarius had 28 days, until circa 450 BC when it had 23 or 24 days on some of every second year, until Julius when it had 29 days on every fourth year and 28 days otherwise.
Februa is the Roman festival of purification, held on February fifteenth. It is possibly of Sabine origin.
Intercalaris — inter-calendar month
Latin Intercalaris “inter-calendar”
Latin Mercedonius (popular name) “?”
Intercalaris had 27 days until the month was abolished by Julius.
March — Mars’ month
Middle English March(e)
Anglo-French March(e)
Old English Martius
Latin Martius “of Mars”
Latin Marti(s) “Mars” + -us (adj. suffix)
Latin Martius mensis “month of Mars”
Martius has always had 31 days.
March was the original beginning of the year, and the time for the resumption of war.
Mars is the Roman god of war. He is identified with the Greek god Ares.
April — Aphrodite’s month
Old English April(is)
Latin Aprilis
Etruscan Apru
Greek Aphro, short for Aphrodite.
Aprilis had 30 days, until Numa when it had 29 days, until Julius when it became 30 days long.
Aphrodite is the Greek goddess of love and beauty. She is identified with the Roman goddess Venus.
May — Maia’s month
Old French Mai
Old English Maius
Latin Maius “of Maia”
Latin Maius mensis “month of Maia”
Maius has always had 31 days.
Maia (meaning “the great one”) is the Italic goddess of spring, the daughter of Faunus, and wife of Vulcan.
June — Juno’s month
Middle English jun(e)
Old French juin
Old English junius
Latin Junius “of Juno”
Latin Junius mensis “month of Juno”
Junius had 30 days, until Numa when it had 29 days, until Julius when it became 30 days long.
Juno is the principle goddess of the Roman Pantheon. She is the goddess of marriage and the well-being of women. She is the wife and sister of Jupiter. She is identified with the Greek goddess Hera.
July — Julius Caesar’s month
Middle English Julie
Latin Julius “Julius”
Latin Julius mensis “month of Julius”
Latin quintilis mensis “fifth month”
Quintilis (and later Julius) has always had 31 days.
Julius Caesar reformed the Roman calendar (hence the Julian calendar) in 46 BC. In the process, he renamed this month after himself.
August — Augustus Caesar’s month
Latin Augustus “Augustus”
Latin Augustus mensis “month of Augustus”
Latin sextilis mensis “sixth month”
Sextilis had 30 days, until Numa when it had 29 days, until Julius when it became 31 days long.
Augustus Caesar clarified and completed the calendar reform of Julius Caeser. In the process, he also renamed this month after himself.
September — the seventh month
Middle English septembre
Latin September
Latin septem “seven” + -ber (adj. suffix)
Latin september mensis “seventh month”
September had 30 days, until Numa when it had 29 days, until Julius when it became 30 days long.
October — the eighth month
Middle English octobre
Latin October
Latin octo “eight” + -ber (adj. suffix)
Latin october mensis “eighth month”
October has always had 31 days.
November — the nineth month
Middle English Novembre
Latin November
Latin Novembris mensis “nineth month”
Novembris had 30 days, until Numa when it had 29 days, until Julius when it became 30 days long.
December — the tenth month
Middle English decembre
Old French decembre
Latin december “tenth month”
Latin decem “ten” + -ber (adj. suffix)
December had 30 days, until Numa when it had 29 days, until Julius when it became 31 days long.
Below are reasons University Graduates and Polytechnic Graduates are never the same.
1- Jamb Cut-Off Marks on entry into a Polytechnic is Lower than that of a University.
2- University Graduates are the Lecturers in a Polytechnic.
3- The Curriculum in a Polytechnic and a University is totally different.
4- Polytechnic Graduates Can never attain the Level of a Professor.
5- Polytechnic Graduates Must have to Undergo another 2 Years in the University to get a Degree and be Really Relevant.
6- There is Discrimination even in the Polytechnics.
7- Polytechnic are not Up to standard in terms of Infrastructure, Curriculum and standard Lectures wit P.hd, Profs and the Likes.
8- Requirements to enter the Polytechnics and University Varies even in terms of S.S.C.E
9- Polytechnic graduates cannot get some political and F.G appointments like Directors, Perm. Sec.. Etc.
10- What’s the Point of going to a Polytechnic to Study courses like History, Public Admin, Law. Etc, where will you work?!
“The most beautiful copy paste photo tool on Android ever…” – Androidagent.com
Need to remove the background of a photo? Wanna swap faces for fun? Missed someone in a family photo? Or you’d like to do an “instantaneous transportation”? Just try Cut Me Out and have fun editing your creations of art and pranks!——Main Features——
– Easy Cutout: draw an area of any shape with your finger to get the instant cut-out.
– Paste Pictures: paste your nicely cropped photo onto another picture with ease.
– Swap Faces: cut the face out to place it on a cat, dog or whatever creature for fun!
– Teleporting: place your cut-out wherever you’d like to be—without physically being there!
– Instant Sharing: share your little pranks or serious work of art with your friends on Facebook, Twitter and Google Plus.
Dear Sir, I once again congratulate you on your prestigious victory on the month of March. It was like a dream come true for many Nigerians and a shocker to many others. I did not write this message to hail or congratulate you but to say something pertaining to your leadership strategy.
People are saying that you are preferential or one-sided in appointing your subjects. My president, you have to look into this matter because we are one Nigeria. I know you are trying to handle Nigeria in your best-known way, which is good. You barely need plenty of advice to handle this country.
Mr. President, I humbly want to try and give your appointments fairly to enable the youths to have hope. As you read this message, there are some bad eggs beside you and your government. It will be difficult for you to fish them out unless you use juju. Some PDP members have defected to APC- please ignore them and plan with your real members.
I have been to some parts of Nigeria and discovered that the money been allocated to the states are embezzled. I don’t want to mention them but my advice is that you should know how your budget is been delivered in this country.
Presido, please love your wife and leave the office of the first lady as it was. You can cut short the money being allocated to the office. Ask her and hear her reply.
I don’t want to say much my president. Thank you for receiving my letter.
WOW!! This is Nigeria where many things happen and people can climb up to any height to achieve their aims.
GCE means (GENERAL CERTIFICATE OF EDUCATION).
There are many ways to pass the GCE exam, but the surest way is reading your books and asking God for support.
Remember that you won’t take education with you to the grave- that means there is no reason to cheat in order to succeed. READ HARD AND PRAY HARD- these are the surest routes to passing your GCE exam.
Video Edit Magic Express is a video editing tool which makes video editing very simple and more intuitive to normal users. Its all new features give full command over editing and mixing videos, photos and sounds altogether. It supports all common video formats like AVI, WMA, WAV, 3GP and supports all common photo formats like BMP, GIF, and JPEG.
UKPOR, is a city founded on a hilly and mountainous topography which is beautifully interspersed with rivers, streams, books and lakes; also that which is wonderfully interlocked with impressive valleys and green forests punctuated with undulating and scintillating scenery. continue here
Crack your brain and see if you can solve this nice question
A piston an a cylinder arrangement containing 1.4kg of gas is maintained at a pressure of 7atm. During the process, the total heat transferred out of the gas is 50kj while the volume change is from 0.15-0.09m³. Calculate the internal energy change of the gas in kj/kg.
JANUARY Ambitious and serious
Loves to teach and be taught
Always looking at people’s flaws and weaknesses
Likes to criticize
Hardworking and … http://wp.me/P3Whp8-2K
In Akan (Ghana) – “Afishapa!”
In Zimbabwe – “Merry Kisimusi!”
In Afrikaans (South Africa) – “Geseënde Kersfees!”
In Zulu (South Africa) – “Sinifisela Ukhisimusi Omuhle!”
In Swazi (Swaziland) – “Sinifisela Khisimusi Lomuhle!”
In Sotho (Lesthoto) – http://wp.me/P3Whp8-2B
President Goodluck Jonathan Thursday said he was embarrassed by the provocative utterances of some politicians which are capable of setting the country on fire.He spoke at a special Christmas service at St. Mathew’s Anglican Church in Maitama, Abuja.According to the president, rather than … http://wp.me/P3Whp8-2i
The Popular Students Oh my God! These set of students know almost every staff in the library. In fact, their popularity is a source of envy to other students. Once they arrive the library, you see all the staffs greet them. They ask about their family, their studies, previous night etc. These students can chat with library officials for several minutes till you begin to wonder if that is what they have come to do. Continue reading here http://wp.me/P3Whp8-1S
The length of your eye helps determine what kind of eyesight you have. In addition to the eyes’ lens and corneal function, the length of your eyeball has a lot to do with whether you’re nearsighted or farsighted. People who are nearsighted have a longer-than-normal eyeball, while people who are farsighted have a shorter-than-normal eyeball. Just a millimeter change in the length of the eye will change the prescription for that eye.
The Goodluck Jonathan administration has been “silently transforming Nigeria from its dark ages of underdevelopment to a 21st century economic and political force,” Mr. Nnawetanma writes.
Mr. Nnawetanma has completed a list of implementations of the Goodluck Jonathan administration he considers to be a progress.
Promotion and practice of true democracy by creating an enabling environment where people from diverse backgrounds and with divergent views and opinions can be accommodated. Under the watch of Goodluck Jonathan administration, the APC was registered by INEC as a mega opposition party big enough to challenge the PDP at both state and national levels. This would have been unthinkable some years back.
You are the most precious gift that God gave to man; therefore, you are to be respected and honoured. Therefore, you are not to sell your ego, your dignity, your pride, your dreams for the pleasures of life. You are specially made by God; please, don’t put God to shame.
To be a successful woman; you don’t need to eke out men or their resources, you don’t need to be an electrode to social vices, you don’t need to protect your dignity, you don’t have to be reticent, and also, you need to fear God (because the Bible says ‘the fear of God is the beginning of wisdom’).
‘Guys are not to be taken for granted; anything you receive from them must be paid somehow’. In Nigeria today, some of you (ladies) have misunderstood the psychology of man and thereby acting as you wish.
I know a girl who saved some of her male friends’ phone numbers like these on her phone; they are as follows: mugu1, mugu2, cash money, rich man … – what do you think of this lady?, she thinks she is smart; which means, she can eke out any of them on her own wish. Hmmm… , I will say a big SORRY to her because she is surely goanna lose.
Kunle is a guy who was not so opulent, but he is handsome. He had a girlfriend (though, he thought he really had) whom he met at a restaurant. Kunle have spent enough money on the girl because he truly loves her and wants to marry her. Now what happened? This lady wasn’t interested in the love that Kunle shared with her. The humble truth here is that Kunle have never slept with her to prove that he loves her. One day, the girl asked Kunle for ₦12,000 (she said she used the money for the treatment of her father); Kunle, filled with pity gave her the money and promised to give her more. Kunle later discovered that the girl been cheating and also had being lying to him. Kunle, still filled with love for her, talked to her and tried to make her understand that her deeds were wrong. Due to her greed and selfish desires she kept on flexing and gallivanting.
I believe that you might have either heard or know about the story of Kunle and his girlfriend. – My dear, ask yourself, ‘am I the type of lady who behaves like Kunle’s girlfriend is? Haven’t you heard of women who were raped because they refused sex after enjoying gifts and other tings from a guy? Although, some of them had a cadaverous escape.
The commonest one is the ‘SEND ME AIRTIME’ text you normally send to guys. Read carefully below and see why you shouldn’t do so unless you both have mutual understanding of what you both are embarking on.
He is neither your Father nor your Sponsor
He is not the person to marry you; even if he is, must you drain him before he marries you
Most guys loose respect for ladies who do such things and they might even blast you
After asking all your male friends on facebook for airtime, what have you gained? Bloody NOTHING – You have succeeded in wasting your data on the texts.
You will even be ashamed of yourself when you ask some of those guys.
“Is it wrong for someone to love you? A man’s kindness or generosity does not mean he is foolish or stupid. Stop playing this things you call GAME. If you have conscience, you would just imagine you were to be a generous man whose generosity was taken to be a stupid act?”
Let us be realistic here, imagine you have 400 male friends on facebook and 50 of them sent you an average ₦100 each, what will you do with that? Aren’t you greedy? Don’t stoop so low to show the world how poor you are, it’s not good at all.
This is not a warning but a #FACTTHATWEMUSTALLKNOW. If you have read up to this extent (I did not say “if you jumped to this extent”, I pray that God will direct you on the best way to follow and you shall never lack anything you want. I also pray that you will marry a good man and your life will move on smoothly without frictional forces, thank you.
Top Universities in Nigeria – 2014 University Ranking
The latest Nigeria University Ranking is out with Obafemi Awolowo University (OAU) still topping the list of best Universities in Nigeria. The Ranking was obtainedfrom the 2014 webometrics World University Ranking results.
The Ranking Web of Universities (Webometrics) is a rank of world universities web presence. And below is the Top 100 Best University in Nigeria from the 2014 edition of the webometrics results.
Top 100 Best University in Nigeria for the second quarter of 2014.
Men of the State Security Services, on Friday evening, stormed the Emergency Department of Asokoro General Hospital in Abuja and quizzed the victims of the bloody attack on an uncompleted building at the Apo Legislative Quarters that left eight people dead.
Although the SSS claimed that those killed were members of the dreaded Boko Haram sect, eyewitnesses and survivors had denied the allegation.
Survivors alleged that the attack was masterminded by the owner of the building that was raided, who they said had strong connections in government, adding that it was done to force them out of the premises.
But our correspondent who visited the Hospital last night was informed that some SSS operatives came on Friday evening “wielding weapons in search of Boko Haram suspects.”
A source in the hospital who spoke on the condition of anonymity said the SSS operatives arrived by 6:30 pm.
He said, “I saw the SSS operatives at about 6:30 pm in the evening. They went straight to the Accident and Emergency Department to obtain statements from the people who were suspected to be Boko Haram members. They came on a vehicle, about six of them and went straight to the hospital.”
One of the victims also toldSUNDAY PUNCHthat the operatives came with camera and took the photograph of the ten victims who are currently receiving treatment in the Hospital.
“The SSS officials came with guns, other dangerous weapons, took our photographs, our names and other important details. Their faces were unfriendly and they neither laughed nor smiled,” he stated.
Several calls and text messages to the Chief Medical Director of Asokoro Hospital, Dr. Ahmadu Abubakar, for his reaction were not replied.
The victims of the attack, who are currently receiving treatment in the hospital, are Ibrahim Mohammed (Zamfara State 32); Ibrahim Lawal (Zamfara, 25); Shamshudeen Abubakar (Zamfara, 20); Sani Abdulrahman (Katsina, 17); Yusuf Abubakar (Zamfara, 20) and Yahaya Bello (Katsina, 20)
Others are Abubakar Auwal (Kano, 18); Muritala Abubakar (Zamfara, 20); Ibrahim Bala (Kano, 18) and Nuhu Ibrahim (Zamfara State 20).
The SSS Deputy Director (Public Relations), Marilyn Ogar, had on Friday claimed that the victims were gunmen who engaged the SSS operatives in a gun battle.
According to her, the security operatives were attacked by the sympathisers of the sect when they went to a building on Soji Aderemi Close, off Bamanga Tukur Street, Apo Quarters, to exhume weapons buried in an uncompleted building by people suspected to be members of the Islamic sect.
She further stated that the attack was sequel to information obtained from two Boko Haram elements, Kamal Abdullahi and Mohammed Adamu, who had earlier been arrested for terrorist activities. She added that the suspects led the security team to two uncompleted buildings where arms were purportedly buried.
Ogar declined further comments on Friday.
“I am busy now and I’m at a public place; I can’t speak on anything, if I have any new information, I will speak on it,” she said.
Some SSS operatives in six vehicles had stormed two uncompleted buildings at Soji Aderemi Close, Apo, where they shot dead eight persons, injured 10 and arrested 12 others whom they described as Boko Haram sect members.
Meanwhile, former Vice-President Atiku Abubakar has said that only an independent investigation by Nigeria’s parliament, the judiciary or civil society will unravel the facts behind the killings.
In a statement by his media office on Saturday, Atiku said, “For me, this issue borders on human rights, the rule of law and the sanctity of human life. Our security services should stick to their role under the constitution: make the country safe.”