Computer Terminology Facts
Note taking from my tech class.
What is USB?
What is a Flash Drive?
What is plug-and-play?
What is hot-swapping?
What is WiFi?
What is Bluetooth?
What is a LAN?
What is a WAN?
What is USB?
Just about every computer that you buy today comes with one or more USB or Universal Serial Bus ports on the back, which support data transfer rates up to 12Mbps(Megabits per second). These USB connectors let you attach up to 127 peripheral devices on each port such as mice, modems, keyboards and printers to your computer quickly and easily. It also supports plug-and-play and hot-swapping or plugging.
A few computer manufacturers first began including support for USB back in 1996, but it wasn?t until the release of the best-selling iMac in 1998 that USB became widespread. It is eventually expected to replace the older parallel and serial ports.
USB ports now come in 2 versions, 1.0 and the newer 2.0, which is backwards compatible with 1.0. That means the older version 1.0 will work with the newer version 2.0. You can also connect USB 2.0 devices to 1.0 ports but they will only function at the older standard speeds.
What is a Flash Drive?
A flash drive is a small, portable flash memory card that plugs into a computer?s USB port and functions as a portable hard drive with up to 2GB of storage capacity. They are small enough to be carried in a pocket and can plug into any computer with a USB drive. They are more durable than an external hard drive because they do not contain any internal moving parts. They are also called pen drives, key drives or simply USB drives.
What is Plug and Play?
Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there. The user doesn't have to tell the computer. In many earlier computer systems, the user was required to explicitly tell the operating system when a new device had been added by setting DIP switches, jumpers, and other configuration elements. Microsoft made Plug and Play a selling point for its Windows operating systems. A similar capability had long been built into Macintosh computers.
With Microsoft's participation, Plug and Play has now been replaced by an open, industry standard, Universal Plug and Play (UPnP), which uses Internet protocols for seamless device plug-in.
What is hot swapping?
Hot swapping is the ability to remove and replace components of a computer while it is operating. Once the appropriate software is installed on the computer, one can plug and unplug the device without rebooting. An example of this is the Universal Serial Bus (USB) that allows a user to add or remove peripheral devices such as a mouse, keyboard, or printer.
What is WiFi?
WiFi is the wireless way to handle networking. It is also known as 802.11 networking and wireless networking. The big advantage of WiFi is its simplicity. You can connect computers anywhere in your home or office on a Wireless LAN without the need for wires, with or without a wireless router and WiFi network cards. The computers connect to the network using radio signals, and they can be up to 100 feet or so apart.
What is Bluetooth?
Bluetooth is a new industrial specification for wireless personal area networks (PANs). It is the latest development in wireless technology and provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency. It is designed for low power consumption, using radio frequencies in the 2.45 GHz range to transmit information over short distances of generally 33 feet (10 meters) or less. By embedding a Bluetooth chip and receiver into products, cables that would normally carry the signal can be eliminated.
What is a LAN?
A LAN is a Local Area Network. A computer network that spans a relatively small geographical area such as in an office or at home, which share the same resources eg. printers, file servers and/or internet connections through ethernet cables or WIFI.
What is a WAN?
A WAN is a Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.
Computer Help FAQ
for what i learn in my technology class i warn you guys.
Let me begin by saying that this thread is a work in progress. It is going to be updated and I would appreciate it if members would ONLY post in this thread if there is an update to a particular program listed.
Additionally, this FAQ is not a substitute for seeking professional help. Anime-Dreanz is not responsible for your computer if anything goes wrong. We just offer advice and we are not a substitute for taking your computer to see professional help.
PC Tech Support and Coding FAQ
Note taking from my tech class.
What is USB?
What is a Flash Drive?
What is plug-and-play?
What is hot-swapping?
What is WiFi?
What is Bluetooth?
What is a LAN?
What is a WAN?
What is USB?
Just about every computer that you buy today comes with one or more USB or Universal Serial Bus ports on the back, which support data transfer rates up to 12Mbps(Megabits per second). These USB connectors let you attach up to 127 peripheral devices on each port such as mice, modems, keyboards and printers to your computer quickly and easily. It also supports plug-and-play and hot-swapping or plugging.
A few computer manufacturers first began including support for USB back in 1996, but it wasn?t until the release of the best-selling iMac in 1998 that USB became widespread. It is eventually expected to replace the older parallel and serial ports.
USB ports now come in 2 versions, 1.0 and the newer 2.0, which is backwards compatible with 1.0. That means the older version 1.0 will work with the newer version 2.0. You can also connect USB 2.0 devices to 1.0 ports but they will only function at the older standard speeds.
What is a Flash Drive?
A flash drive is a small, portable flash memory card that plugs into a computer?s USB port and functions as a portable hard drive with up to 2GB of storage capacity. They are small enough to be carried in a pocket and can plug into any computer with a USB drive. They are more durable than an external hard drive because they do not contain any internal moving parts. They are also called pen drives, key drives or simply USB drives.
What is Plug and Play?
Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems that gives users the ability to plug a device into a computer and have the computer recognize that the device is there. The user doesn't have to tell the computer. In many earlier computer systems, the user was required to explicitly tell the operating system when a new device had been added by setting DIP switches, jumpers, and other configuration elements. Microsoft made Plug and Play a selling point for its Windows operating systems. A similar capability had long been built into Macintosh computers.
With Microsoft's participation, Plug and Play has now been replaced by an open, industry standard, Universal Plug and Play (UPnP), which uses Internet protocols for seamless device plug-in.
What is hot swapping?
Hot swapping is the ability to remove and replace components of a computer while it is operating. Once the appropriate software is installed on the computer, one can plug and unplug the device without rebooting. An example of this is the Universal Serial Bus (USB) that allows a user to add or remove peripheral devices such as a mouse, keyboard, or printer.
What is WiFi?
WiFi is the wireless way to handle networking. It is also known as 802.11 networking and wireless networking. The big advantage of WiFi is its simplicity. You can connect computers anywhere in your home or office on a Wireless LAN without the need for wires, with or without a wireless router and WiFi network cards. The computers connect to the network using radio signals, and they can be up to 100 feet or so apart.
What is Bluetooth?
Bluetooth is a new industrial specification for wireless personal area networks (PANs). It is the latest development in wireless technology and provides a way to connect and exchange information between devices like personal digital assistants (PDAs), mobile phones, laptops, PCs, printers and digital cameras via a secure, low-cost, globally available short range radio frequency. It is designed for low power consumption, using radio frequencies in the 2.45 GHz range to transmit information over short distances of generally 33 feet (10 meters) or less. By embedding a Bluetooth chip and receiver into products, cables that would normally carry the signal can be eliminated.
What is a LAN?
A LAN is a Local Area Network. A computer network that spans a relatively small geographical area such as in an office or at home, which share the same resources eg. printers, file servers and/or internet connections through ethernet cables or WIFI.
What is a WAN?
A WAN is a Wide Area Network. A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.
Computer Help FAQ
for what i learn in my technology class i warn you guys.
Let me begin by saying that this thread is a work in progress. It is going to be updated and I would appreciate it if members would ONLY post in this thread if there is an update to a particular program listed.
Additionally, this FAQ is not a substitute for seeking professional help. Anime-Dreanz is not responsible for your computer if anything goes wrong. We just offer advice and we are not a substitute for taking your computer to see professional help.
PC Tech Support and Coding FAQ
Spyware information
Over the past few years, a new class of software has emerged that's up to no good. It goes by many names: spyware, adware, foistware, malware, eulaware, or even crapware. For simplicity we'll just call them all spyware. Here are some of the "features" you get from spyware. Some spyware may only use one or two of these tactics, while others do quite a bit more.
-
-
Remember to update the definitions for both before using them! Also, update defs at least once a week, otherwise your computer is NOT protected.
Also I'd like to add about spybot search & destroy , when you first install there is a way for it to monitor sites if you go to them for spyware activity ,but this ONLY works on version 1.3 ++ for spybot search and destroy..
Also when you do download it , and have it installed it would be best to immunize.. Also in the immunize section there is another program you can download called "spyware blaster" , its works very well..
Additionally, be careful with Spybot. By accident you can delete several very important files that are NOT spyware and are just encrypted files. Certain things like Microsoft Updates and Windows programs should not be deleted. Look for things like Cool2ShareSoftPLUS! and etc.
Virus Information
One of the biggest fears of having computers are viruses, viruses are malicious programs designed entirely for destruction and havoc. Viruses are created by people who either know a lot about programming or know a lot about computers.
Once the virus is made it will generally be distributed through shareware, pirated software, e-mail or other various ways of transporting data, once the virus infects someone's computer it will either start infecting other data, destroying data, overwriting data, or corrupting software.
The reason that these programs are called viruses is because it is spreads like a human virus, once you have become infected either by downloading something off of the Internet or sharing software any disks or write able media that you placed into the computer will then be infected. When that disk is put into another computer their computer is then infected, and then if that person puts files on the Internet and hundreds of people download that file they are all infected and then the process continues infecting thousands if not millions of people.
- - - - Pay Virus Scanner: - - - -
- Norton antivirus 2005 pro = buy
- Mcafee = buy
-AVG
- - - - Free virus scanner: - - - -
-
-
-
You can also get several free full time trials of virus scanners that are normally bought. They normally last about 30 days or so. Some such programs are AVG and McAfee. Try them out. ...But remember, just like with spyware, if you don't have a anti-virus program on your computer that updates at least once a week, your comp is NOT protected.
Trojan Information
What is a Trojan Horse?
Named after the famous Wooden Horse used by the Greeks to
conquer the city of Troy, these programs basically invade your PC disguised as a piece of desirable software. Often hidden inside the installation routines of pirate software downloaded from the internet they install themselves at the same time as the actual application and modify your system settings to ensure they are automatically run every time your PC is started up.
Trojan horses themselves seldom damage the system they infect, preferring to silently allow attackers to access your machine over the internet and do almost anything from stealing your files through to destroying your hard disk. Because they normally rely on an internet connection, PC's with cable modems or other always-on connections are especially vulnerable if infected with a trojan horse.
Regular users of IRC need to be especially wary of receiving trojan horses in files they download from other users. These often exploit bugs in the Windows operating system to make themselves appear to be harmless picture, text or zip files when in reality they are executables which will install a trojan horse on your system if run.
- - - - Best trojan remover: - - - -
- im sorry, but it's hard to find a good trojan remover.
Designed tools to remove specific virusses/trojans COMPLETLY
For Trojan removal/prevention try TDS-3 (free version, but really you want to buy it) and for free virus scan, try Housecall from trendmicro. For spyware prevention try SpywareBlaster and SpywareGuard. for general diagnosis and control of startup/bho's/ect try the following:
StartMan
BHO Demon
Process Viewer
Belarc Advisor
HijackThis
Over the past few years, a new class of software has emerged that's up to no good. It goes by many names: spyware, adware, foistware, malware, eulaware, or even crapware. For simplicity we'll just call them all spyware. Here are some of the "features" you get from spyware. Some spyware may only use one or two of these tactics, while others do quite a bit more.
- Deceptive functionality. Spyware often uses a classic "trojan horse" tactic--like a virus. It offers to synchronize your PC's clock or keep track of forms, but it is also doing other hidden things while you browse.
- Home page hijacking. Did you ever find that your home page was changed, or discover new sites in Favorites that you didn't add? It might be spyware.
- Loss of privacy. Some spyware keeps track of the web sites you visit and sends that information back to the spyware vendor. Do you want to tell everyone?
- More advertising. Did you install a popup stopper but you are still getting popups? The ads you are getting may not be from the web site you are on, but from spyware.
- Stolen advertising. Instead of showing the ads that should appear on a web site, some spyware substitutes its own ads which can rob a web site of revenue.
- Broken web sites. Spyware sometimes changes the actual content on a web page, and in the process it "breaks" the page. The page may not look correct, or you may get Javascript errors.
- Reduced performance. Spyware uses up system resources, CPU time, memory, disk space, and Internet bandwidth, making your system slower.
- System instability. Most spyware isn't very well tested or debugged, and there is no way to report bugs or obtain tech support. The result can be system crashes, hangs, or other strange behavior.
- Security risks. Some spyware has a built-in update feature that lets the spyware maker download and install new code to your system without your knowledge or approval.
-
You must be registered for see links
-
You must be registered for see links
Remember to update the definitions for both before using them! Also, update defs at least once a week, otherwise your computer is NOT protected.
Also I'd like to add about spybot search & destroy , when you first install there is a way for it to monitor sites if you go to them for spyware activity ,but this ONLY works on version 1.3 ++ for spybot search and destroy..
Also when you do download it , and have it installed it would be best to immunize.. Also in the immunize section there is another program you can download called "spyware blaster" , its works very well..
Additionally, be careful with Spybot. By accident you can delete several very important files that are NOT spyware and are just encrypted files. Certain things like Microsoft Updates and Windows programs should not be deleted. Look for things like Cool2ShareSoftPLUS! and etc.
Virus Information
One of the biggest fears of having computers are viruses, viruses are malicious programs designed entirely for destruction and havoc. Viruses are created by people who either know a lot about programming or know a lot about computers.
Once the virus is made it will generally be distributed through shareware, pirated software, e-mail or other various ways of transporting data, once the virus infects someone's computer it will either start infecting other data, destroying data, overwriting data, or corrupting software.
The reason that these programs are called viruses is because it is spreads like a human virus, once you have become infected either by downloading something off of the Internet or sharing software any disks or write able media that you placed into the computer will then be infected. When that disk is put into another computer their computer is then infected, and then if that person puts files on the Internet and hundreds of people download that file they are all infected and then the process continues infecting thousands if not millions of people.
- - - - Pay Virus Scanner: - - - -
- Norton antivirus 2005 pro = buy
- Mcafee = buy
-AVG
- - - - Free virus scanner: - - - -
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
You can also get several free full time trials of virus scanners that are normally bought. They normally last about 30 days or so. Some such programs are AVG and McAfee. Try them out. ...But remember, just like with spyware, if you don't have a anti-virus program on your computer that updates at least once a week, your comp is NOT protected.
Trojan Information
What is a Trojan Horse?
Named after the famous Wooden Horse used by the Greeks to
conquer the city of Troy, these programs basically invade your PC disguised as a piece of desirable software. Often hidden inside the installation routines of pirate software downloaded from the internet they install themselves at the same time as the actual application and modify your system settings to ensure they are automatically run every time your PC is started up.
Trojan horses themselves seldom damage the system they infect, preferring to silently allow attackers to access your machine over the internet and do almost anything from stealing your files through to destroying your hard disk. Because they normally rely on an internet connection, PC's with cable modems or other always-on connections are especially vulnerable if infected with a trojan horse.
Regular users of IRC need to be especially wary of receiving trojan horses in files they download from other users. These often exploit bugs in the Windows operating system to make themselves appear to be harmless picture, text or zip files when in reality they are executables which will install a trojan horse on your system if run.
- - - - Best trojan remover: - - - -
- im sorry, but it's hard to find a good trojan remover.
Designed tools to remove specific virusses/trojans COMPLETLY
You must be registered for see links
For Trojan removal/prevention try TDS-3 (free version, but really you want to buy it) and for free virus scan, try Housecall from trendmicro. For spyware prevention try SpywareBlaster and SpywareGuard. for general diagnosis and control of startup/bho's/ect try the following:
StartMan
BHO Demon
Process Viewer
Belarc Advisor
HijackThis
- HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect, and optionally remove selected items. The program can create a backup of your original settings and also ignore selected items. Additional features include a simple list of all startup items, default start page, online updates and more. Intended for advanced users.
- link:
You must be registered for see links