Why you should marry before 40

A while ago while visiting a friend who’s married, her wife send her newly arrived maid to her cousin house which was few blocks away and opposite main gate from where they were staying. From the conversion on the phone, I could hear she was instructing the receiver on the side of the items the maid was to pick. Among the items to be pick was waruu (Kikuyu name for potatoes) and the maize flour he brought from the village. The current empty shelves of Unga (Kiswahili word for flour) have pushed people to a far reaching implication on family living in urban and towns areas. Some have resorted to “importing” Unga from County while some family had to survive on rice. A few minutes later the maid arrives with items she was sent to collect. My friend’s wife asks the girl who else was in the house. This smart way for ladies to spy on their relative to know if there are some women in the room. The maid answered innocently “Baba wa Tom, in fact, he’s the one who gave me the stuff”. My friend wife looked surprised and called whoever she has sent to confirm Mzee (Old man) present immediately. “Hey Tom, Kwani Mzee amerudi so soon?” I don’t hear the reply on another side, but she responds to the caller that the maid told her he was around to which she replies laughing loudly “Kwani ilikuwa ni wewe? (So it was you) I thought baba (Kiswahili word for father) is back in the city!” she hanged the phone promising to call back later. My friend wife confirms it was not the old man from the village who has visited but it was her cousin whom her maid misunderstood as my friend’s wife cousin father. Tom father is one of those old colonial men whom they called all relatives, clan’s men, villages and everyone he knows in the city to pronounce his coming in advance as he doesn’t like inconveniences whenever he’s coming for quarterly eye checked up in Kikuyu hospital. Whenever he’s around, he will eat at my friend house and only sleep at Toms place. I asked how old her cousin is, such that her maid mistaken him as his father. I learn he was 40 years old and still unmarried despite having a stable job, a car and three bedrooms rental house at their posh area. He’s have been worrying his parents and all relatives as large. This development initiates our topic for the rest of time I was at my friend house. Later I decided to weight on pro and cons of marrying before and after 40, but I find there is the reason for one to postponed marrying. It’s best if both runs parallel with other activities. Below is five reason why you should marry before 40.

Read More

Kericho county

Kericho County is one of devolved county unit in the former Rift valley province in the Republic of Kenya. It is a capital and administrative headquarter of the Kericho County. It’s located 289Km on the Southern side of the country from capital city of Nairobi. The main economic activity of Kericho people is tea plantation where’s the county got its name as the green county. Tea in Kericho County is plant on small scale farming and large multinational big tea plantation. The population of Kericho is 567,092 as per 2013 national census. The inhabitant community are Kipsigis people who is the sub tribe of Kalenjins.

Read More

Hair extensions

WHAT ARE VIRGIN HAIR EXTENSIONS?

Until late in 20th-century ladies have been known to keep their natural hair as they maintain their natural beauty but towards the start of 21st-century hair extensions began to take shape thanks to fashionable ladies who want to look natural even without their hair. So what are Virgin hair extensions? Virgin hair extensions are human hair which is chemically unprocessed collected from a single donor. Donors could be Brazilian, Indian, Malaysian or any other. Virgin Hair Extensions are Remy hair which had never been washed with the bleaches, perms, dyes or harsh washes.

Read More

Getters and setters

Introduction

Accessors (also known as getters and setters) are methods that let you read and write the value of an instance variable of an object.Its used to control changes to a variable. They are also widely known as setter methods. Often a setter is accompanied by a getter (also known as an accessor), which returns the value of the private member variable.

Read More

How Browsers Work

Introduction

A web browser (commonly referred to as a browser) is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content.Hyperlinks present in resources enable users easily to navigate their browsers to related resources.

Read More

Operating systems

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs. The operating system is a component of the system software in a computer system. Application programs usually require an operating system to function.

Read More

How internet change world

10 Ways the Internet has Changed the World

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link billions of devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and peer-to-peer networks for file sharing.

Read More

Hard drives

A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material. The platters are paired with magnetic heads arranged on a moving actuator arm, which read and write data to the platter surfaces.Data is accessed in a random-access manner, meaning that individual blocks of data can be stored or retrieved in any order and not only sequentially. HDDs are a type of non-volatile memory, retaining stored data even when powered off.

Read More

Computer hacker

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment,or to evaluate those weaknesses to assist in removing them.

Classifications

Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with whom they do not agree.

Read More

Cloud computing

What is Cloud computing

Cloud computing is a kind of Internet-based computing that provides shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services),which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers.It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.

Read More

Research On Chrome Developer Tools

The Chrome Developer Tools

The Chrome Developer Tools (DevTools for short), are a set of web authoring and debugging tools built into Google Chrome. The DevTools provide web developers deep access into the internals of the browser and their web application. Use the DevTools to efficiently track down layout issues, set JavaScript breakpoints, and get insights for code optimization.

Read More

4 principles of oop

Object Oriented Programming

Object Oriented Programming (OOP) refers to using self-contained pieces of code to develop applications. We call these self-contained pieces of code objects, better known as Classes in most OOP programming languages and Functions in JavaScript. We use objects as building blocks for our applications. Building applications with objects allows us to adopt some valuable techniques, namely, Inheritance (objects can inherit features from other objects), Polymorphism (objects can share the same interface—how they are accessed and used—while their underlying implementation of the interface may differ), and Encapsulation (each object is responsible for specific tasks).

Read More