• No results found

Tuesday s Technology Tips Geek Terms H-L A Guide to Simplifying Geek Speak

N/A
N/A
Protected

Academic year: 2021

Share "Tuesday s Technology Tips Geek Terms H-L A Guide to Simplifying Geek Speak"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Tuesday’s Technology Tips

Geek Terms H-L

A Guide to Simplifying Geek Speak

(Please remember to not let the computer get the winning hand. Open a technology request and let us help reduce the frustrations day in and day out with technology.)

Hey everyone, welcome back to another Technology Tips for Tuesday, April 11, 2016. In this week’s newsletter, we continue more on the “Geek Speak” guide using letters “H” to letter “L”. This continues like last week’s newsletter to share some common geeky type terms that we computer techs like to use and discuss when we gather around the table eating fat free and sugar free donuts and drinking low fat low sugar decaffinated coffee.

Now off to the list:

Hardware

Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners.

The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals.

(2)

HDD is short for "hard disk drive." An HDD is a storage device used to store data. A hard disk drive stores data magnetically. Therefore, it retains its data when the power source is turned off or disconnected.

Most computers include a HDD that stores your files. For example, if your computer has an internal HDD, when you save a file, it is written to the hard disk drive. Additionally, the HDD stores pre-installed applications and other programs you add to your computer. Since modern HDDs have large storage capacities, most users do not even come close to running out of disk space.

Home Page

This is the starting point or front page of a Web site. This page usually has some sort of table of contents on it and often describes the purpose of the site. For example,

http://www.apple.com/index.html is the home page of Apple.com. When you type in a basic URL, such as "http://www.cnet.com," you are typically directed to the home page of the Web site. Many people have a "personal home page," which is another way the term "home page" can be used.

HTML

Stands for "Hyper-Text Markup Language." This is the language that Web pages are written in. Also known as hypertext documents, Web pages must conform to the rules of HTML in order to be displayed correctly in a Web browser. The HTML syntax is based on a list of tags that

describe the page's format and what is displayed on the Web page.

Fortunately, the HTML language is relatively easy to learn. Even more fortunately (so much for good grammar), many Web development programs allow you to create Web pages using a graphical interface. These programs allow you to place objects and text on the page and the HTML code is written for you.

HTTP

Stands for "HyperText Transfer Protocol." This is the protocol used to transfer data over the World Wide Web. That's why all Web site addresses begin with "http://". Whenever you type a URL into your browser and hit Enter, your computer sends an HTTP request to the appropriate Web server. The Web server, which is designed to handle HTTP requests, then sends to you the requested HTML page.

HTTPS

Stands for "HyperText Transport Protocol Secure." HTTPS is the same thing as HTTP, but uses a secure socket layer (SSL) for security purposes. Some examples of sites that use HTTPS include banking and investment websites, e-commerce websites, and most websites that require

(3)

you to log in. Always be sure the page is secure when you sign into the website. If not, be careful what information you type in and access.

Websites that use the standard HTTP protocol transmit and receive data in an unsecured manner. This means it is possible for someone to eavesdrop on the data being transferred between the user and the Web server. While this is highly unlikely, it is not a comforting thought that

someone might be capturing your credit card number or other personal information that you enter on a website. Therefore, secure websites use the HTTPS protocol to encrypt the data being sent back and forth with SSL encryption.

You can tell if a website is secure by viewing the URL in the address field of your Web browser. If the Web address starts with https://, you know you are accessing a secure website. Most browsers will also display a lock icon somewhere along the edge of the window to indicate the website you are currently visiting is secure.

So whenever you are asked to enter personal or financial information on a website, make sure that the URL starts with "https://" and that the lock icon appears in the window. Then you can be sure that the website is secure and any data you enter will only be recognized by your computer and the Web server.

Hub

This is a hardware device that is used to network multiple computers together. It is a central connection for all the computers in a network, which is usually Ethernet-based. Information sent to the hub can flow to any other computer on the network. If you need to connect more than two computers together, a hub will allow you to do so. If you only need to network two computers together, a simple crossover Ethernet cable will do the trick.

Illegal Operation

When a program on your computer has an error, you may see a message pop up on the screen saying, "Illegal Operation." This is a rather tactless way of saying something went wrong with the program that was running. It could also be a fault with the operating system itself.

Icon

Icons are the way to view files on computers. An icon on your computer screen represents an object or a program on your hard drive. For example, the folders you see on your desktop or in open windows are icons. The files that you see in those folders are also icons. The trash can on the Macintosh and the recycle bin on Windows are both icons as well.

Icons are a visual representation of something on your computer. An icon that looks like a sheet of paper is probably a text document. By clicking and dragging icons, you can move the actual files they represent to various locations on your computer's hard drive. By double-clicking an application icon, you can open the program.

(4)

IP Address

Also known as an "IP number" or simply an "IP," this is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. Every computer, whether it be a Web server or the computer you're using right now, requires an IP address to connect to the Internet. IP addresses consist of four sets of numbers from 0 to 255, separated by three dots. For example "66.72.98.236" or "216.239.115.148". Your Internet Service Provider (ISP), will assign you either a static IP address (which is always the same) or a dynamic IP address, (which

changes everytime you log on).

ISP

Stands for "Internet Service Provider." In order to connect to the Internet, you need an ISP. It is the company that you pay a monthly fee to in order to use the Internet.

JPEG

The term actually stands for "Joint Photographic Experts Group," because that is the name of the committee that developed the format. But you don't have to remember that because even

computer nerds will think you're weird if you mention what JPEG stands for. Instead, remember that a JPEG is a compressed image file format. JPEG images are not limited to a certain amount of color, like GIF images are. Therefore, the JPEG format is best for compressing photographic images. So if you see a large, colorful image on the Web, it is most likely a JPEG file.

While JPEG images can contain colorful, high-resolution image data, it is a lossy format, which means some quality is lost when the image is compressed. If the image is compressed too much, the graphics become noticeably "blocky" and some of the detail is lost. Like GIFs, JPEGs are cross platform, meaning the same file will look the same on both a Mac and PC.

Keylogger

A keylogger is a program that records the keystrokes on a computer. It does this by monitoring a user's input and keeping a log of all keys that are pressed. The log may be saved to a file or even sent to another machine over a network or the Internet.

Keylogger programs are often deemed spyware because they usually run without the user knowing it. They can be maliciously installed by hackers to spy on what a user is typing. By examining the keylog data, it may be possible to find private information such as a username and password combination. Therefore, keyloggers can be a significant security risk if they are

unknowingly installed on a computer.

The best way to protect yourself from keylogger programs is to install anti-virus or security software that warns you when any new programs are being installed. You should also make sure

(5)

no unauthorized people have access to your computer. This is especially true in work environments.

LAN

Stands for "Local Area Network," and is pronounced like "land" without the "d". (Computer people will think you're weird if you pronouce it "L-A-N"). A LAN is a computer network limited to a small area such as an office building, university, or even a residential home. Most mid to large-sized businesses today use LANs, which makes it easy for employees to share information.

Link

When you are browsing the Web and you see a highlighted and underlined word or phrase on a page, there is a good chance you are looking at a link. By clicking on a link, you can "jump" to a new Web page or a completely different Web site. While text links are typically blue and

underlined, they can be any color and don't have to be underlined. Images can also serve as links to other Web pages. When you move the cursor over a link in a Web page, the arrow will turn into a little hand, letting you know that it is a link. The term "hypertext" comes from the way links can quickly send you to another Web destination.

Login

If you are ever asked to enter your username and password, you are being asked to enter your login information. A login is a combination of information that authenticates your identity. This could be a name and password or an ID number and security code. Many secure Web sites use login information to authenticate visitors before allowing them access to certain areas of the site. Unlike the words "brush" and "comb," this term should not be used as both a noun and a verb. It should only be used as a noun, (you don't login to a server, you log in to it).

Congratulations to our two winners of guess that childhood photo contest. Both came from Zion Chapel. Ms. Parker and Ms. Killingsworth both guessed the name of the mystery baby. It’s Ms. Ember Griswold at ZCES. Thank you everyone who responded and guessed. We’ll try this again in future newsletters!!

(6)

And while we are congratulating everyone, here’s a warm wish of congratulations to Ms. Currie at Zion Chapel High School. She recently gave birth to a healthy baby boy. He weighed nine pounds and 6 ounces and was 22 inches in length. His name is Case Harden Currie.

Congratulations Ms. Currie!!

Now off to a little bit of computer humor followed up with some amazing quotes for the week…let’s continue.

(7)

(8)

And quotes…Have a great week everyone!! We’ll see you next week!!

References

Related documents

1. Retailer-related human capital plays a strong role in the online consumer's store choice decision. Further, the key factors that bring customers back to an online retailer

 Splitting sector antenna should be connected with an AISG cable to the nearest antenna as shown in the below

creditors provide a Loan Estimate in good faith, based on the best information reasonably available to the creditor..  It must be delivered or placed in the mail to

Sampel pada inti nukleus ini dipilih unit ruko yang dianggap mewakili dan dapat mendukung tujuan penelitian yaitu untuk menjelaskan morfologi fasade ruko dan

A global binding agreement was adopted with the leading of UNEP in Stockholm on May 22, 2001 to regulate the distribution of the 12 most offensive chemical substances. The

In Section 2 , we examine orthogonal decompositions of real inner product gyrogroups and construct left and right coset spaces, gyroprojectors, quotient gyrogroups, and give a

E103RF KODAK PROFESSIONAL Color Reversal Films E-113 KODAK EKTACHROME 100 Plus Professional Film E-130 KODAK EKTACHROME 64T Professional Film E-144 KODAK EKTACHROME 160T

Figure 9: Laser-cut garment detail by Jakob Schlaepfer (Braddock Clarke and Harris 2012, p.. In this community, the technology has aided creative development of concepts that