The study says - Ncell's service in voice and Nepal Telecom's service in data are better

The study says - Ncell's service in voice and Nepal Telecom's service in data are better


In a study conducted by Nepal Telecommunication Authority, the regulatory body of the telecommunication sector, the service of Ncell in terms of voice and data of Nepal Telecom is good. The study conducted by the authority in some places in Kathmandu Valley has come to this conclusion.


From the 12th of June to the 22nd of last June, the quality of the network of Nepal Telecom, Ncell Aziata, and Smart cell was tested by the authority in Tangal, Handigaon, and Sano Gaucharan, Buddh, Chabahil, Gaurighat and other areas of the valley.




In the driving test (in which the quality of all the service providers available at one location is measured simultaneously), all the companies failed to provide quality service as a whole, but comparatively, Ncell's service in voice is seen as good.


The call was tested in such a way that the most suitable network is automatically selected from the networks (4G, 3G, and 2G) provided by each service provider at a particular location.


In that test, only Ncell has been successful in the call establishment rate. According to the set standards, the phone call installation rate should be 99 percent or more, Telecom has 95.71 percent, Smart has 94.52 percent, and Ncell has 100 percent.



Similarly, all service providers have failed to meet the minimum standard of call duration.


According to the standard, the time taken to make a call should be 5 seconds or less. But Nepal Telecom has 7.27 seconds. 9.3 seconds of Smart and 5.13 seconds of Ncell are seen.


Likewise, all the service providers have succeeded in meeting the standards for the rate of phone calls or disconnections. According to the authority, the rate of phone call disconnection should be two percent or less.


In the test conducted in the valley, the rate of disconnection of phone calls by themselves is zero percent of all service providers.


Similarly, even in call block rate (grade of service), Nepal Telecom and Smart cell have failed while Ncell has met the authority's standards.


According to the authority, the call block rate should be two percent or less. During the study, Ncell's call block rate remained at zero percent, Telecom's 4.29 percent, and Smart's 5.48 percent.


Similarly, in the case of data, the ping 32 bytes round trip time has also been successful for all three service providers.


Under this, Telecom has 90.8 ms, Smart has 172.93 ms and Ncell has 192.89 ms. While the authority's standards have specified 250 ms.


In terms of data, Nepal Telecom has proven to be better than other service providers.

How is the cheap internet in Nepal?


'Wi-Fi Nepal', which started two months ago as a new internet service provider, is now advancing in service expansion. When the competition of internet speed war is going on, this company has brought the cheapest package.


Under this, internet packages of 30 and 50 Mbps speed have been provided. Customers who take the annual package will get 30 Mbps internet speed for Rs 4,000 and 50 Mbps speed for Rs 5,000. The monthly fee for 30 Mbps is Rs 333 and for 50 Mbps is Rs 417.



Similarly, a three-month package of 30 Mbps will be available for Rs 1,100 and a six-month package for Rs 2,100, while a three-month package of 50 Mbps will cost Rs 1,500 and a six-month package will cost Rs 3,000.


In case of paying only one month's fee, the monthly fee of a 30 Mbps speed internet package will be Rs 400 excluding VAT and the price of a 50 Mbps speed internet package will be available at Rs 550 per month excluding VAT.


Internet service providers can no longer give away IPTV and routers for free


Internet service providers will no longer be able to provide free TV and routers in internet packages. The regulatory body Nepal Telecommunication Authority has instructed to stop such work immediately, saying that providing free router and TV in the internet package is against the spirit of the license conditions of the service provider.


Currently, the service provider is providing free routers and TV in one package to the customers who connect to the internet. The regulator thinks that the service provider has committed an illegal act by not separating the cost of the router and TV while mentioning it as free.



"In the current situation, it is illegal to bundle the price of internet service and TV service including optical network unit (ONU) and router in such a way as to provide some services for free," the authority said in the instructions given to service providers on Wednesday. "It should be stopped immediately because it is contrary to the meaning of the permit conditions."


In addition to this, the authority has also been instructed to issue separate invoices when it is found that Internet and TV services are jointly operated and sold and if a service provider is operating both services jointly when charging fees from the customer.


This means that now the service provider has to specify the TV fee and internet fee in the bill to the customer.



When the service provider issues an invoice during the operation and sale of internet services, according to the conditions of the license, the monthly price of the tariff rate approved by the authority of the relevant package and service, including the monthly price of the service fee, maintenance fee, connection fee, router fee, etc. Issuing separate invoices for fees,' said the authority's letter.


The purpose of this is to control the increasing 'price war' among service providers in the market, according to the authority.


Under this, the service provider has to inform about the price of which service. Now the customer will also know the price of which service.


What you need to know to protect your privacy on the Internet


Due to mobile technologies like 3G and 4G and fixed line broadband, Internet access has become nationwide. In this way, most people have entered the world of the internet.


With the expansion of Internet access, the use of online services based on it is also increasing. As easy as it is to access various services due to internet access, it is equally challenging to stay safe on it.




Safer Internet Day is being celebrated worldwide today to make the Internet safer for children and youth. On this occasion, we are telling you about some general issues that must be taken care of while using the Internet.


1. Use private or incognito mode when using the website


Use incognito or private mode as much as possible when using way browsing apps like Chrome, Firefox, and Edge. As a result, your login passwords are not saved in the browser and automatically log out when you exit.



Otherwise, in normal mode, all important information including your login credentials and web history are stored in it. Which can be dangerous in terms of your privacy.


2. Use separate passwords for different websites and apps


Even if you are taking precautions while using the internet, logins and passwords are reaching unwanted people and hackers due to various reasons.


In this case, if you use the same password for all IDs, then a person who knows the password of one ID or account (Facebook, Twitter, Instagram, or ID of mobile banking and digital wallet) can gain access to your other accounts as well. Therefore, it is advisable to use a separate password for each website and app.


3. Turn off location access on social networks


Most mobile apps are now looking for location access. In this case, if you have given location access unnecessarily, there is a risk that you can be tracked or monitored by using it.


So don't give mobile apps access to your location access. Don't forget to give access for a certain period and close it.


4. Use a VPN to increase online security


It is wise to use a VPN, or Virtual Private Network, to keep your online presence and use of any service secure. Some web browsers like Opera Mini, and Brave have been providing VPN services for free.


If you want to use a more reliable and high-speed VPN service, you can also take out an instant subscription. When using the internet through VPN, the internet service provider or mobile service provider you are using the internet with cannot track or monitor your internet activity.


5. Do not click on the 'Adds' button that appears on the website


While browsing various websites and apps on the internet, you may see many advertisements there. Clicking on such ads may lead you to unnecessary and unrelated sites.


Not only this but sometimes there is a possibility that your personal information will be stolen through it. So, while using websites on the Internet, be careful about pop-up ads.


6. Do not accept all requests on social media


If you receive a request from a stranger on social media such as Facebook, Instagram, etc., do not accept it blindly. In this way, anyone and any person can be sending you a request.


Not only this, but even by creating someone's fake ID, you may receive a friend request. Block such users in the section where requests are received from unknown and unnecessary people. If you randomly accept a friend request, the person you don't want may be keeping information about you.


7. Ignore the popup that appears on the screen:


When you are using websites or apps, pop-ups are asking for serious permission on your mobile and computer from time to time. In this case, do not give permission by turning a blind eye.


Instead, block or skip it. Otherwise, through such pop-ups, an unwanted person can gain access to your personal and privacy-sensitive information.


8. Don't forget to save your debit-credit card information in the browser


Do not make the mistake of saving your debit and credit card information while using the website and web browser. Also, don't save financial information like mobile and internet banking, or digital wallet on the website.


Because there is a risk that a hacker can gain access to your device and steal such information and based on that information, your bank account and wallet can be deleted.


Also, don't enter any message or code requested by any other person on your mobile. This can allow fraudsters to gain access to your social media as well as your bank account.


Comments

Popular posts from this blog

Artificial intelligence (AI) - the ability of a digital computer.

Facebook's name has been changed to 'rebranding'

What is SEO and how to do search engine optimization?

Labels

Social media Facebook of What a and phone on mobile This you are Do smartphone internet IT Android workforce Nepal app your from robot iPhone use Machine Learning for Python will company computer with account can data does password these twitter Apple digital feature Instagram Whatsapp YouTube like machine media not why Tiktok new ChatGPT China an be by free out people search that website without work Future India ML corona features find information make online or public video Elon Musk Microsoft One apps has market million social user users way year Intelligence Laptop US billion education history home protect service videos want Bitcoin Have Machine Learning Future Nepali Now Operators Scientists Wi-Fi Windows chrome code cyber download hacking money network photos tips world Amazon Artificial Intelligence Future Avoid Cryptocurrency Here If Know Learning TV Things artificial battery being browser human malware many need netflix photo security smart software study system there update which 10 15 Beginners Buy Deep Learning Did Privacy Who about business career chat cloud digital marketing down hacker marketing millions number phones sent virus when work force Agriculture Bug Deep Earth GPS Gmail Google Maps Kaggle Keep NASA RAM Than Top Windows 11 World Cup Xiaomi address after also as at available camera change dangerous difference drive earn easy email going its job jobs language life look may message news old open price really search engine settings storage store such two used version watch windows 10 working 14 2020 2022 4 5 6 7 Cambridge Content Dark Web GB GPT Global Health-care Lite Maps Messages More Oppo Pakistan PayPal Print Pro QR Risk SEE SEO Samsung So Some Telegram TensorFlow Tutorial Type Types Vision Ways WiFi Zoom advertising attack been best better biggest blue brain chip comments country created cyber attacks don't electricity engine eyes fake files first football function game get go government hacked hackers hidden hours image install lost medical mind misused monitor moon once pay percent play problem processing program quantum robots scan science send share signal smartphones space stay story take their them thousands time topics tricks up using was water web where while wireless workers 000 2024 5G AI Education Alan Musk America Analytica Applications Army Blockchain Bounty CCTV COVID-19 Chat GPT Choose Clean Close Clubhouse Computer Vision Crypto DL Developer Development Docs Electric Explain Factory Finally Gemini Google chrome Google drive Healthcare Help Here's I IBM Japan Keras Kernels Large Lifestyle Looking MDMS Mac Models Musk Natural Ncell Net Notebooks PC Preparing Reasons Russia SIM SMS Save Scikit-Learn Skills SpaceX Stephen Hawking Sun Tesla Theme Therefore Thinking VPN Variables Word WorldLink ability accounts ads age airplane all any aware background bandwidth bank become beneficial between blocked bring bully cable call cameras captions capture care cause charge chatbots check come coming companies complete computers consumption copyright corona-virus courses create currency cyber security dataset datasets days delete deleted deleting details developed device dislike doctor documents doing domain due during dynamic energy engineer engineering exactly forever found fraud full gadgets games getting given good got guest handle his humans iOS iPhone 14 iPhones important including increase industry keyboard known launch law learn listen live manager map meaning megapixel memory messenger mode model month months most movies much name nonsense nuclear opening over own phishing physics porn post posts prevent problems product production programming protection quickly real-world reduce reward robotics run safe same saving say scandal searched selfie show site sold someone speaking speed spyware stuck students subscription systems target techology television tick today torrent traffic trillion universe upload verification voice war weakest women worldwide years & 'Buy the Dip' 'HDR' 'I' 'Mr. Beast' 'Professional Mode' 'football intelligence' 'hidden' 'refill station' (IoT) (LLM) (NLP) 1 100 10:10 10th 12 145 16 17 19 2 200 2007 25 35 3D 40 4000 48 4K 5 P's 60 7 C's 8 @everyone on A17 AI Tool AI ethics API AR Adjust Adobe Adopt Adsense Adsense Supports Africa Alexa Ali Baba Altman Amazon Jungle Amazon Prime Ambani American Anaconda Android 11 Android TV Android phone Annoyed Appoints Arithmetic Art Art through NFTs Artficial Intelligence Artificial neural Artuficial Intellegence Ashika Tamang Assignment Assistant Astronauts Astronomy Atrificial Inteligence Attacks Audiobooks Augmented Reality Australia Auto-GPT AutoML Avatar 2 Bachelors Banned Bard AI Based Because Before Bernie Sanders Big data BigQuery Bill Gates Bitwise Blind Blockchain Developer Blockchain Technology Books Brave Brave Browser Brazil C charger CPU CPU temperature CTEVT CV Cases Casting Changed ChatGBT Chery Chinese Citroën C5 Cloud Factory Cloud Factory Nepal Club House Colab Command Comparison Compute Concatenate Contactless Contactless payment system Copa America Copilot Couple Challenge Crash test Create your first Project on Python Crossover Cup DNS DRS Gaming Dark mode Datalab Deep Fake Deep Learinig Deep Learning with Python Deep Neural Networks Deepfake Demat Dept Development in predictive analytics Didn't Digital avatars Discontinuing Do not Dodge Dogecoin DuckDuckGo E-task EA ETF EU EV Earbuds Earth 2 Earthquake Edge Computing El Salvador Elected Electric Vehicles Electrical Elon Embedded Application Embedded Application (EA) Emoji Estimators Ethical Hacking Euro NCAP European Even Everyone Evolve Explained Explosion Express WiFi FPS Facebook Messenger Facebook's Facets Fears Federal Reserve System Finance Firefox FiveG Fixed wireless Follow Forge Fraud Call Freefire Freelancing GIF Git Gold Google Chat Google Cloud Google Meet Google Play Music Google Plus Google Plus code Google Workspace Google search Green room Greenroom. Spotify Guest Mode HDMI Happy Birthday Health sector Holi Honest Honeygain Huawei Hyundai ID IMD IP ISP Identify Implementing Includes Increasing Indonesia Inflation InfoSec Input Inspiration Installation Integrated circuit Intel Intelligent Internet of Things (IoT) Introduction Iranian Island Isn't JBL JPG JPMorgan Chase & Co Jack Ma January JavaScript Jio Joker Virus Jungle Jupyter Jupyter Notebooks Keys Korean LAN LLM LP Large Language Models Launch of better autonomous systems Lee Kun-hee Library Line Linux Logical Lucky MDMS Nepal ML Engine MSN MaAfee Mark Zuckerberg Max Meet Membership Mero Share Metaverse Microsoft Office Microsoft Teams Military Military weapons Mobile Operating System Module Mouse Mukesh Ambani Music Must NASA's NEA NFT NFTs Natural language processing (NLP) Nepal. radio mapping Nepali businesses Nepali game Nepali youth Nepalis NetTV Neural Network Neural Networks New Technology No Nokia North Korea Note Object Detection Open-source Opera Operating PDF PNG PPT PUBG Pandas Paytm Pendrive Photoshoot Pi Network Pip Plan Play Store Pokémon Pokémon Go Police Premium Preparations Prerequisite Prime Pro's Process Process discovery Pycharm Pyenv Python Programming Python Tutorial Python Tutorials Python for Beginners Python on Windows Quick Draw RCS Race Radically Ransomware Rashtra Bank Reboot Recommender Recommender Systems Redmi Reinforcement Reinforcement learning Reliance Reliance Jio Remove. bg Replacing Revolution Rice that grows for years once planted Rises Robot Sophia Roles Ronaldo Routine of Nepal Banda S&P 500 S&P Global Ratings SD Scale Scaling Scikit Screen Pinning Selection Seven Shorts Singapore Sitting SixG Snapchat Sophia South Korea Space X Spam Stable Coin Starlink Steve Jobs Stock market String Success Sundar Pichai Supermarket Supervised Supervised Learning Supervised Machine Learning Supply Chain Attack Supports Swift TIFF Telecom TensorBoard TensorFLow Hub Thes Tiktok stop Time Travel Tool Training Data Transforming Trojan Truecaller Trump Trusting Type-C US Congress USA USB United States Unnecessary Unsupervised Unsupervised Learning Unsupervised LearningUnsupervised Machine Learning Unsupervised Machine Learning Upcoming Upcoming Technology Urges Using a drone VPNs VR Vehicles Virtual reality Virtualenv Visualize WWW Wait Walkthrough Walmart WeChat Wha What are Assignment Operators in Python What are Comparison Operators in Python What are Logical Operators in Python What are Operators in Python What are the basic laws of quantum physics What is What is Chat GPT What is Google Adsense What is Pycharm What is Python What is String in Python What is Variable in Python Whose Wi-Fi 6 Wikipedia WordPress Wrangling data Write X X8 series XAI XOR XSS YouTuber Ziglar Zipty Zuckerberg admin advertisers again agency agricultural ai beauty air aircraft aired alert algorithm almost along alpha alternative analytics ancient angles announcement announces another answer answering antivirus anyone anything appear appearance appliances approach approaching approaching science meaning apps. google article artificial blood vessels arts associated attention audience automatic automatically autonomous avatars back backed ban bans bar basic batteries becoming beginner benefit benefits bitcoin mine bitcoins black block boarding bogged book bought box brand break brings broadband brought browsing bug bounty build but buttons buying bypass cable internet cables calculus calls campaign can't cancer cannot car cards careeer carry cave center challenge channel charger charging chat.com cheap cheaper checkmarks chess child children choose. a class clicking climbers clock closest club coding colleges color combat common communicate compensates compete competing computer mouse computer science concept connect cons control controls controversies could countries credit crisis criteria crore crores crowdsourcing culture cyberattack d about damaged danger dark data center data science dating apps day debit dedicated delete data depression destination devices diary die different digit digital cameras digital land digital privacy disappeared disappearing discovered discovery displaced display document dog dollars doodle door downloads dream drone drug trafficking e features e-Rupee e-books e-passport e-sewa eBooks ePassport each earn money from Nepal easier eating economy edit effective electronic else email server emails emerged emergency emojis employee employees end enough espionage etflix ethics except excessive excuse existence expected expire extracts eye face app facial verification facts family far farm fax fdown.net fee feet fiber fight file film final five flying foldable food footprint forced foreigners forget forgotten form formats foundation free upgrade frequency freshman from search fruit fuel game tips gamer gas gasoline geometry gets gives glasses goes good content goodbye goods google docs gossip granted great groups growing had hall hand handy happen happy harmful he head headphones headset heater hobby human brain human intelligence human trafficking hundreds hurting hydrogen hype iCloud iPhone 12 Pro illegal data illicit trade image processing processor images impair inbox incidents income increased incur insecure instant instrument interest internal storage internet speed into intranet introduced invented invention invest investment invites jack join journalists journey kit laboratory lakh languages last later latest launched launching lawmakers laws leak leaks legalize let letter letters light likes link lives loaded location locked longest lose loss love machine vision made main main features makes man manage management system mango marketplace martial mask matches measuring meetings melting meme messaging meta microphone middle million. downloads mine mistake mistakes mobile number moble moment monitors mountain move movie moving mute name-x naming near necessary neural neural networking new code new look new windows news anchor night mode non notes notifications now.gg nuclear energy obscene official offline open source opened operate operated operating system opposed optic optical fiber optimization option options other others our outbreak oversold owner page paid pandemic paper participant participate passports password. passwords patent pattern paying payment pen drive permanent permission person personal perspective phone confidential picture pictures pirated placed planting platform platforms political pop-up popular popularity port possible powered practice predictive pregnant prepared principles private prize processor product key programmatically programming languages project prompt property pros protected proxies proxy quantum computer quantum internet quires quota r daily radio rain rainy season rate reach reading ready real reason rebranding record recovery reform refresh refreshes refrigerator regarding registered registration regulators relationship released remain remove removes removing repairing replace report requiring reset residence resolution responsibilities restaurants returned revenue review rings risks risky road robotic dog rocket room rooms round ruin rules running safely safety sale satellite saying says scary schedule scheme schools screen screens search engines secret secretly secure selectric cars sell semi-final semiconductor sending series server services shared ships shocked shortage should shoulders shuffled shuts shutting sidebar simple since sites sky sleeping smartblock smartly social engineering hacking software. tech solve somewhere soon source sources space center space debris spacecraft spaceships special spectrum spend spending sponsors sports spying star starship start starting starvation steps stocks stolen stop stories strategy streaming student studying subject subscribers successful suggested suggestions suitable suitcase surface surprised survive t are tag tagging talent talk teach team technlogy technoloy technonlogy telecommunication terminology test text they think thousand thread threat to through throwaway timer tinder toilet too took topic tossing touch pad tracking trackpad trading transact transport travel trending trends trip turn turns tweets unbuyable unemployed unemployment unpleasant unregistered unsafe unseen unveils upgrades useful uses various versatility very view viral virtual virtual currency virtual world vishing visit visiting vulnerabilities warning washing waterproof we weapons web design websites week well went were wet willing woman works workspace world war worrie worth writer written wrong young
Show more