Skip to main content

Privacy Policy


Privacy Policy for Sampoorntech

At Sampoorntech, accessible from https://sampoorntech.blogspot.com/, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by Sampoorntech and how we use it.

If you have additional questions or require more information about our Privacy Policy, do not hesitate to Contact through email at niteshsendhav11@gmail.com

Log Files

Sampoorntech follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services' analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information.

Cookies and Web Beacons

Like any other website, Sampoorntech uses 'cookies'. These cookies are used to store information including visitors' preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information.

Google DoubleClick DART Cookie

Google is one of a third-party vendor on our site. It also uses cookies, known as DART cookies, to serve ads to our site visitors based upon their visit to www.website.com and other sites on the internet. However, visitors may choose to decline the use of DART cookies by visiting the Google ad and content network Privacy Policy at the following URL – https://policies.google.com/technologies/ads

Privacy Policies

You may consult this list to find the Privacy Policy for each of the advertising partners of Sampoorntech. Our Privacy Policy was created with the help of the GDPR Privacy Policy Generator

Third-party ad servers or ad networks uses technologies like cookies, JavaScript, or Web Beacons that are used in their respective advertisements and links that appear on Sampoorntech, which are sent directly to users' browser. They automatically receive your IP address when this occurs. These technologies are used to measure the effectiveness of their advertising campaigns and/or to personalize the advertising content that you see on websites that you visit.

Note that Sampoorntech has no access to or control over these cookies that are used by third-party advertisers.

Third Pary Privacy Policies

Sampoorntech's Privacy Policy does not apply to other advertisers or websites. Thus, we are advising you to consult the respective Privacy Policies of these third-party ad servers for more detailed information. It may include their practices and instructions about how to opt-out of certain options. You may find a complete list of these Privacy Policies and their links here: Privacy Policy Links.

You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers' respective websites. What Are Cookies?

Children's Information

Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.

Sampoorntech does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to Contact immediately and we will do our best efforts to promptly remove such information from our records.

Online Privacy Policy Only

This Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in Sampoorntech. This policy is not applicable to any information collected offline or via channels other than this website.

Consent

By using our website, you hereby consent to our Privacy Policy and agree to its Terms and Conditions.

Comments

Popular posts from this blog

BIT ORIENTED PROTOCOLS : SDLC, HDLC, BISYNC, LAP & LAPB

BIT ORIENTED PROTOCOLS A bit-oriented protocol is a communications protocol that sees the transmitted data as an opaque stream of bits with no semantics, or meaning. Control codes are defined in terms of bit sequences instead of characters. Bit oriented protocol can transfer data frames regardless of frame contents. It can also be stated as "bit stuffing" this technique allows the data frames to contain an arbitrary number of bits and allows character codes with arbitrary number of bits per character. SDLC Synchronous Data Link Control (SDLC) supports a variety of link types and topologies. It can be used with point-to-point and multipoint links, bounded and unbounded media, half-duplex and full-duplex transmission facilities, and circuit-switched and packet-switched networks. SDLC identifies two types of network nodes: primary and secondary. Primary nodes control the operation of other stations, called secondary. The primary polls the secondary in a predeter

Do Google Assistant work on KaiOS?

Yes Google Assistant can now read, translate text on KaiOS Google on Tuesday announced that now within Google Assistant, KaiOS users in India can use Google Lens to read, translate, and define words. At Google I/O in 2019, the US-based search engine giant brought a camera-based translation to Google Lens to help understand information. With Lens, one can point the camera at text one see and translate it into more than 100 languages and can even speak the words out loud in the preferred language. "We brought these Lens capabilities to Google Go, so even those on the most affordable smartphones can access them. Today we are extending this capability to the millions of Google Assistant users on KaiOS devices in India," the company said in a statement. It is currently available in English and several Indian languages, including Hindi, Bengali, Telugu, Marathi, and Tamil, and will soon be available in Kannada and Gujarati. Users can simply press the right soft key

Can coronavirus spread through mosquitoes?

  Can coronavirus spread through mosquitoes? Scientists have confirmed for the first time that the novel coronavirus behind the COVID-19 pandemic cannot be transmitted to people by mosquitoes , a finding that adds evidence to WHO claims that the disease is not mosquito-borne. The research, published in the journal Scientific Reports, provided the first experimental evidence on the capacity of SARS-CoV-2, the virus that causes COVID-19 disease, to infect and be transmitted by mosquitoes. "Here we provide the first experimental data to investigate the capacity of SARS-CoV-2 to infect and be transmitted by mosquitoes," the study noted. "While the World Health Organization (WHO) has definitively stated that mosquitoes cannot transmit the virus, our study is the first to provide conclusive data supporting the theory," said Stephen Higgs, a co-author of the research from Kansas State University in the US. According to the study, conducted at the university&#

What is Binary Exponential Back-off Algorithm in Computer Networking?

What is Binary Exponential Back-off Algorithm?                          When two station A and B transmit data simultaneously there will be collision and when collision occurs both the stations waits for some time before retransmitting the data. The time for which they stop sending the data is called back-off time and to calculate the back-off time we use an algorithm knows as Binary Exponential Back-off Algorithm.   How Binary Exponential Back- off Algorithm(BEB) Work?   After undergoing the collision both the stations wait for random amount of time in the range of    [0, (2^n)-1]. Value of n is - the nth times they are undergoing collision. If a station chooses a time K which is in the range [0, (2^n)-1] then Back-off time = K*time slot Example 1 - Collision occurs for 1st time then n=1 and range will be 0 to 1. Means K value will be between     0 to 1. Station A Station B  Remark  K=0          K=0           

Topology-Mesh, Star, Bus, Ring and Hybrid

Computer Network Topology – Mesh, Star, Bus, Ring and Hybrid Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology – Mesh, Star, Bus, Ring and Hybrid. Types of Topology There are five types of topology in computer networks: 1. Mesh Topology 2. Star Topology 3. Bus Topology 4. Ring Topology 5. Hybrid Topology Mesh Topology In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Lets say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2. Advantages of Mesh topology 1. No data traffic issues as there is a dedicated link between two devices which means the link is only available for those two devices. 2. Mesh topolog

what is diode | working, types

Diode A diode is a specialized electronic component with two electrodes/terminal called the anode and cathode. Most diodes are made up with semiconductor materials such as silicon, germanium, or selenium. Diode Symbol The anode terminal of the diode is called as P-type. The cathode terminal of the diode is called as N-type. A diode is an electrical device which allows current to easily pass through it in one direction and prohibit the current from other direction. Biasing: Method of applying necessary voltages across P-N junction, is known as biasing. There are two methods of Biasing: Forward Biasing Reverse Biasing Forward Biasing: When the diode allows current to easily pass through it this condition is called as forward biased. In forward biased condition the anode of diode is connected with positive terminal of the battery. And the cathode of diode is connected with the negative terminal of the battery. Reverse Biasing: In Reverse biased condition the a

Network devices: Repeaters, Hub, Switch, Bridge, Routers, Modem, Gateway

Network Devices Network devices are the components that are used to interconnect multiple computing devices to form a network, In order to share files or resources like printers or fax machines and for communications. Types of networking devices Repeaters Hub Switch Bridge Routers Modem Gateway Repeaters What is a repeater? In communication when signals move from one place to another place they become weak and after a particular time, they lost their values and become a straight line. To increase the strength of the signal and get back the original data before the signal loss, repeaters are used. “Repeaters are used to regenerate the signals before the complete loss of signal up to a particular limit.” Regeneration means to recreate the signals before they lost their value. We can't regenerate a signal, which is completely lost. We can't get back the data (we don't know whether it is 0 or 1 because the signal becomes a straight line) If there is some stren