Local Area Network (LAN) - is a computer network covering a small physical area, like a home, or small group of buildings, such as a school, or an airport. Ethernet and Wi-Fi are the two most common technologies currently.
Tower - is the enclosure that contains the main components of a computer, usually being made of steel or aluminium.
Virus - is a computer program that can copy itself and infect a computer without the permission or knowledge of the user.
Spyware - is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.
Antivirus - is computer software used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware.
Back Up - refers to making copies of data so that these additional copies may be used to restore the original after a data loss.
Compact Disc Recordable (CD-R) - is a variation of the Compact Disc (CD) that is a write once read many optical medium.
Compact Disc ReWriteable (CD-RW) - is a rewritable optical disc format that is a write many read many optical medium.
Digital Video Disc (DVD) - same type of optical medium as CDs, but hold up to six (6) times the amount of data. Forms of writable and re-writable also exist using the same R and RW as the previous CDs.
Cookie - are parcels of text sent by a server to a browser and then sent back unchanged by the client each time it accesses that server. They are used for authenticating, session tracking, and maintaining specific information about users.
Desktop - is an interface which is a set of unifying concepts used by graphical user interfaces to help users more easily interact with the computer. It usually has a nice looking picture on it, and is the large portion of the screen upon coming into Windows.
Digital Subscriber Line (DSL) - is a family of technologies that provides digital data transmission over the wires of a local telephone network, and can be used at the same time and on the same telephone line with a regular telephone.
HiJacking - term used when malware infiltrates a system without the consent and performs tasks set by its creator in addition to, or instead of, the system's normal duties.
HyperText Markup Language (HTML) -is the predominant markup language for web pages. It provides a means to describe the structure of text-based information in a document, by denoting certain text as links, headings, paragraphs, and lists, and to supplement that text with interactive forms, embedded images, and other objects.
HyperText Transfer Protocol (HTTP) - is an application-level protocol for distribute, collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to the establishment of the world wide web (WWW).
Java - is a programming language originally developed by Sun Microsystems and can run on any Java virtual machine (JVM) regardless of the computer architecture.
Motherboard - is the central printed circuit board (PCB) in some complex electronic system, such as the modern computer.
Network - is a group of interconnected computer.
Operating System (OS) - is an interface between hardware and application, it is responsible for the management and coordination of activities and the sharing of the limited resources of the computer. Some common ones that are out there include Microsoft Windows and Linux.
Random Access Memory (RAM) - is a form of computer data storage.
Uninterrupted Power Supply (UPS) - also known as a battery back-up, provides emergency power and line regulation to connected equipment by supplying power from a seperate source when utility power is not available. On computers this is an advantage allowing the user to properly shut down the computer, to prevent data corruption or data loss.
Wallpaper - refers to an image used as a background on a computer screen, usually for the desktop of a graphical user interface.
Wireless Local Area Network (WLAN) - is the linking of two or more computers or devices using a wireless means of communication, giving the user the mobility to move around within a broad coverage area and still be connected to a network.
Zip File - contains one or more files that have been compressed to reduce file size.
Emoticon - is a portrayal of the writer's facial expression so that the reader can understand the appearance of their friend's face, using alphabetical and punctual symbols. :)
Firewall - is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Phishing - is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Voice Over Internet Protocol (VOIP) - is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet switched networks. One of the largest most commonly known forms of this is Vonage.
Definitions were found using wikipedia.
Virus Update In todays' world of viruses we need to all protect ourselves from not only viruses, but also from spyware that can be installed on our machine. These items can both get on your machine in various ways, including from e-mail, web pages, downloads, or files from other people. Click above for software to assist in the removal of these items. Some can be difficult and might require professional removal.
Drivers for Computers Most people just load an operating system without taking the time to load the individual drivers for their system. Loading drivers can be a little hard unless you are real familiar with your hardware inside the computer. Click above to see a listing of some of the common web sites used to obtain the latest drivers used for computers. Please use only if familiar with the hardware inside your computer.
Turn Off Computer? You are doing everything you can to cut back on energy costs. Is it more energy efficient to put your computer in sleep mode or repeatedly turn it on and off? According to experts at the Department of Energy, computers in sleep mode use about seventy percent less energy than what is used when a computer is awake. If you plan to leave your computer for longer than two hours, you should shut it off.
Upgrade or Buy New Computer Typically, we would recommend if replacing two major components inside a computer, we feel the customer is better off to replace the computer. The technology in computers is changing on a daily basis, and if one upgrades more than two major items it is better to upgrade the entire computer system. The good news is that monitors, keyboards, mice, and speakers can be used with a new computer system, to save the customer unneeded cost.
Cable versus DSL Service Many ask for recommendations on cable modem or DSL service, when upgrading from dial-up service. There are two basic differences between the two types of service. Cable modem service is slightly faster than DSL service, however most will not be able to tell much difference between the speeds. The other major difference is that DSL service is usually cheaper in most areas. Please be sure to check with local providers for pricing.
Backing Up Data The best way to keep your data safe on your computer is to regularly back up your data. Even the best computers in the world have failures that are unpredictable, and with redundant data one can recover any lost data. The easiest way today to back up your data is to place the data on a recordable DVD. Be sure to ask us about our other back up options for businesses or those with critical data.