Tech Tips 4-05-2016

Tuesday’s Technology Tips
Geek Terms A-H
A Guide to Simplifying Geek Speak
(Please remember to not let the computer get the winning hand. Open a technology request
and let us help reduce the frustrations day in and day out with technology.)
Hey everyone, welcome back to another Technology Tips for Tuesday, April 5, 2016. I’ve often
asked for feedback and suggestions and I have one suggestion related to last week’s issue of You
Tube alternatives.
Ms. Megan Driggers at New Brockton High School sent me an email and wanted to share an
additional resource teachers may find quite beneficial in the school system related to videos. She
says it’s called Tube Chop. The program still allows you to play videos but it will also allow you
to chop or edit the videos you do show to students so you can control the content of what your
students view. She also left a URL to read more and explore Tube Chop. It’s located at
https://www.tubechop.com. I haven’t looked at it in great detail but it shows to be a good
resource to edit out video content and display the content you want shown by giving a start and
end time on the video. Check it out when you have time and thank you for suggesting it Ms.
Driggers.
Today I’d like to send out some common geeky type terms that we computer techs like to use
and discuss when we gather around the table eating fat free and sugar free donuts and drinking
low fat low sugar decaffinated coffee.
Here’s a list of common words starting out in the alphabet from letter A to letter H. Future
episodes appearing in your email in box will include letters beyond the letter H to give you a
broad sense of geek speak so to speak. I hope you enjoy them.
Now off to the list:
Access Point
An access point provides wireless access to a network. Devices connected to an access point can
communicate with other devices on the network. They may also connect to the Internet if the
access point is linked to an Internet connection, which is commonly the case.
Adware
Adware is free software that is supported by advertisements. Common adware programs are
toolbars that sit on your desktop or work in conjunction with your Web browser. They include
features like advanced searching of the Web or your hard drive and better organization of your
bookmarks and shortcuts. Adware can also be more advanced programs such as games or
utilities. They are free to use, but require you to watch advertisements as long as the programs
are open. Since the ads often allow you to click to a Web site, adware typically requires an active
Internet connection to run.
Most adware is safe to use, but some can serve as spyware, gathering information about you
from your hard drive, the Web sites you visit, or your keystrokes. Spyware programs can then
send the information over the Internet to another computer. So be careful what adware you install
on your computer. Make sure it is from a reputable company and read the privacy agreement that
comes with it.
Applet
This a Java program that can be embedded in a Web page. The difference between a standard
Java application and a Java applet is that an applet can't access system resources on the local
computer. System files and serial devices (modems, printers, scanners, etc.) cannot be called or
used by the applet. This is for security reasons -- nobody wants their system wiped out by a
malicious applet on some wacko's Web site. Applets have helped make the Web more dynamic
and entertaining and have given a helpful boost to the Java programming language.
Bandwidth
Bandwidth refers to how much data you can send through a network or modem connection. It is
usually measured in bits per second, or "bps." You can think of bandwidth as a highway with
cars travelling on it. The highway is the network connection and the cars are the data. The wider
the highway, the more cars can travel on it at one time. Therefore more cars can get to their
destinations faster. The same principle applies to computer data -- the more bandwidth, the more
information that can be transferred within a given amount of time.
Bcc
In email, BCC stands for "Blind Carbon Copy." When you send an e-mail to only one person,
you type the recipient's address in the "To:" field. When you send a message to more than one
person, you have the option to enter addresses in the "Cc:" and "Bcc:" fields. "Cc" stands for
"Carbon Copy," while "Bcc" stands for "Blind Carbon Copy."
A carbon copy, or "Cc'd" message is an e-mail that is copied to one or more recipients. Both the
main recipient (whose address is in the "To:" field) and the Cc'd recipients can see all the
addresses the message was sent to. When a message is blind carbon copied, neither the main
recipient nor the Bcc'd recipients can see the addresses in the "Bcc:" field.
Blind carbon copying is a useful way to let others see an e-mail you sent without the main
recipient knowing. It is faster than sending the original message and then forwarding the sent
message to the other recipients. It is also a good practice to use Bcc when copying a message to
many people. This prevents the e-mail addresses from being captured by someone in the list who
might use them for spamming purposes. However, if it is important that each recipient knows
who your message was sent to, use carbon copy (Cc) instead. I also advise using BCC sparingly
if you are trying to relay effective and open communication. But like mentioned above a BCC
used the right way is a great way to send messages to all intended recipients.
Boot or Boot Up
When you boot up a computer, you simply turn it on. Kicking your computer really far is not
recommended, though you may be tempted to do so at times. The term "boot" comes from the
word "bootstraps," which people at one time used to get their boots on. Likewise, "booting" a
computer gets it up and running.
In simple terms, to boot a computer is to turn it on. Once the computer's power is turned on, the
"boot process" takes place. This process involves loading the startup instructions from the
computer's ROM, followed by loading the operating system from the current boot disk. The boot
disk is usually an internal hard drive, but can also be an external drive, a CD or DVD-ROM, or
even a floppy disk. Once the operating system software is loaded, the boot process is complete
and the computer is ready to be used.
Buffer
A buffer contains data that is stored for a short amount of time, typically in the computer's
memory (RAM). The purpose of a buffer is to hold data right before it is used. For example,
when you download an audio or video file from the Internet, it may load the first 20% of it into a
buffer and then begin to play. While the clip plays back, the computer continually downloads the
rest of the clip and stores it in the buffer. Because the clip is being played from the buffer, not
directly from the Internet, there is less of a chance that the audio or video will stall or skip when
there is network congestion.
Cache
This term is pronounced like "cash". There are many different types of caches but they all serve
the same purpose. A cache stores recently-used information in a place where it can be accessed
extremely fast. For example, a Web browser like Internet Explorer uses a cache to store the
pages, images, and URLs of recently visited Web sites on your hard drive. With this neat
strategy, when you visit a page you have recently been to, the pages and images don't have to be
downloaded to your computer all over again. Because accessing your computer's hard disk is
much faster than accessing the Internet, caching Web sites can speed up Web browsing
significantly.
Cc
I email, this stands for "Carbon Copy." When you send an e-mail message, you typically type the
recipient's address in the "To:" field. If you want to send the message to one or more other
recipients, you can use the "Cc:" field to add additional addresses. This will send the e-mail to
the address in the "To:" field and to each address listed in the "Cc:" field as well.
The "Cc:" option is often used in business communications when a message is intended for one
person, but is relevant to other people as well.
CD-R
CD-R Stands for "Compact Disc Recordable." CD-R discs are blank CDs that can record data
written by a CD burner. The word "recordable" is used because CD-Rs are often used to record
audio, which can be played back by most CD players. However, many other kinds of data can
also be written to a CD-R, so the discs are also referred to as "writable CDs."
The data burned onto a CD-R disc is permanent, meaning it can not be altered or erased like the
data on a hard drive. Typically, once a CD has been burned, it will not be able to record any
more data. Some CD burning programs can record data as "sessions," allowing a disc to be
written to mulitple times until it is full. Each session creates a new partition on the disc, meaning
a computer will read a disc with multiple sessions as multiple discs.
CD-RW Disk
CD-RW Disk stands for "Compact Disc Re-Writable." A CD-RW is a blank CD that can be
written to by a CD burner. Unlike a CD-R (CD-Recordable), a CD-RW can be written to
multiple times. The data burned on a CD-RW cannot be changed, but it can be erased. Therefore,
you have to completely erase a CD-RW every time you want to change the files or add new data.
While it may be somewhat inconvenient, this capability makes CD-RWs a good choice for
making frequent backups. However, because CD-RWs can be erased, they don't store data
reliably for as long as CD-Rs do. Therefore, you should use regular CD-Rs for long-term
backups.
Clean Install
A clean install is an operating system (OS) installation that overwrites all other content on the
hard disk drive. Unlike a typical OS upgrade, a clean install removes the current operating
system and user files during the installation process. When a clean install finishes, the hard disk.
However, sometimes an OS upgrade is not possible because important files have become lost or
corrupted. In this case, a clean install may be the only option. Some users may also prefer to
perform a clean install so that no lingering problems from the previous OS will affect the newly
installed operating system. Additionally, a clean install may be appropriate when installing an
OS on a new hard drive or when transferring ownership of a computer to another person.
Cookie
In computer terminology, a cookie is data sent to your computer by a Web server that records
your actions on a certain Web site. It's a lot like a preference file for a typical computer program.
When you visit the site after being sent the cookie, the site will load certain pages according to
the information stored in the cookie. This is why if you surf the internet for something like a new
car, you will start to see advertisements for new cars on other websites as you surf along your
day.
While cookies have many benefits, some people don't like to have their information recorded by
Web sites that they visit. For this reason, most Web browsers have an option to accept or deny
cookies. You may also want to delete cookies on a regular basis when surfing the internet.
CPU
CPU stands for "Central Processing Unit." This is the pretty much the brain of your computer. It
processes everything from basic instructions to complex functions. Any time something needs to
be computed, it gets sent to the CPU. Every day, it's compute this, compute that -- you'd think
the CPU would need a break after a while.
Crop
When you crop an image or photo, you remove part of the image. This may involve cutting some
of the image from the left, right, top, bottom, or any combination thereof. It may also mean just
cutting out a small rectangular of the image.
For example, your friend takes a picture of your family and leaves a good five feet of headroom
above the tallest person. If you are going to use the photo as your Christmas card picture, you
probably don't want half the picture to be filled with sky. Therefore, you can use an imageediting program to crop the top part of the image, leaving only a small area above the tallest
person's head. If the camera was zoomed out too far, you may want to crop some of the sides as
well.
Defragment
Defragmenting your hard disk is a great way to boost the When you delete a bunch of little files
and add a new large file to the computer, the file may get broken up into multiple sections on the
hard disk. The computer will still read the newly added file as a single valid file, but the drive
will have to scan multiple parts of the disk to read it. Because hard disk seek time is one of the
most significant bottlenecks in a computer's performance, this can drag down your computer's
speed quite a bit. If you have a ton of "fragmented" files on your hard disk, you might hear extra
grinding, sputtering, and other weird noises coming from your computer.
You computer does not like having fragmented files any more than you do. This is why
defragmenting your hard disk is such a good idea. When you start to hear extra grinding sounds,
or your computer doesn't open files as quickly as it did before, it's time to defragment. With
Windows, you can use the pre-installed Intel defragment program to defragment your hard disk.
You can also use a commercial software program like Norton Utilities to defragment your hard
disk more efficiently and with more options. If you use your computer daily, defragmenting your
hard drive once a month should keep the fragment-fiends away.
Domain
A domain contains a group of computers that can be accessed and administered with a common
set of rules. An organization that uses computers usually will configure all local computers to be
networked within the same domain so that each computer can be seen from other computers
within the domain or located from a central server location. Setting up a domain may also block
outside traffic from accessing computers within the network, which adds an extra level of
security.
Driver
In the computer world a driver is a small file that helps the computer communicate with a certain
hardware device. It contains information the computer needs to recognize and control the device.
In Windows-based PCs, a driver is often packaged as a dynamic link library, or .dll file. I most
commonly use printer drivers to add printers to laptops and desktops around the school system.
Encryption
Encryption is the coding or scrambling of information so that it can only be decoded and read by
someone who has the correct decoding key. Encryption is used in secure Web sites as well as
other mediums of data transfer. If a third party were to intercept the information you sent via an
encrypted connection, they would not be able to read it. So if you are sending a message over the
office network to your co-worker about how much you hate your job, your boss, and the whole
dang company, it would be a good idea to make sure that you send it over an encrypted line. Or
better yet save those type of messages for face to face so you can have a healthy discussion with
therapeutic co-workers who listen and can understand and offer advice.
Ethernet
Ethernet is the most common type of connection computers use in a local area network (LAN).
An Ethernet port looks much like a regular phone jack, but it is slightly wider. This port can be
used to connect your computer to another computer, a local network, or an external DSL or cable
modem.
Two widely-used forms of Ethernet are 10BaseT and 100BaseT. In a 10BaseT Ethernet
connection, data transfer speeds can reach 10 mbps (megabits per second) through a copper
cable. In a 100BaseT Ethernet connection, transfer speeds can get up to 100 mbps. There is also
a new technology called "Gigabit" Ethernet, where data transfer rates peak at 1000 mbps.
Flash Drive
Flash drives have many names — jump drives, thumb drives, pen drives, and USB keychain
drives. They are all a small data device that allows you to save data with a USB connection.
Flash drives are typically no more than two to three inches in length and less than an inch in
width. Their size and shape may resemble a thumb or a small pen (which is where the names
"thumb drive" and "pen drive" come from). Flash drives are also very thin, often having a depth
of less than a centimeter. Because of their small form factor, they are highly portable and can
easily fit in a pocket or on a keychain (hence the name "keychain drive").
Today’s modern day flash drives can store a large amount of data. As with any external storage
it’s always a good idea to back up data to one thumb drive and then use a second drive to be sure
the data is also updated in the second flash drive. Call it OCD or CDO or something else
memorable but I’ve saved myself quite a bit by having two thumb drives with the exact same
information on it to retrieve when one flash drive conveniently stopped working at the most
opportune times available. Remember the power of two thumb drives and sleep restful at night.
Or again better yet, save your files and documents at work to your Google drive or on the
network or if you’re at home using a personal Gmail account, save those files on your home
personal Google drive account. It’s safe, secure and backed up so you can sleep at night knowing
your files are secure.
Frozen
Frozen refers to an unresponsive computer. When a computer does not respond to any user input,
it is said to be frozen. When a computer system freezes, or "locks up," the screen stays the same
and does not change no matter what buttons you press on your mouse or keyboard. You can tell
if your computer has frozen if the cursor will not move when you move the mouse.
A computer typically freezes due to a software malfunction that causes the operating system to
"hang." This may happen because of many possible reasons, including a memory leak, an infinite
calculation, or another reason.
If your computer does freeze, usually you can restart the computer to make it function again.
You can typically force your computer to shut down by holding the power button for several
seconds but you shouldn’t always have to do that. If this starts happening, please open us good
technology folks a ticket so we can help further. And is the case often, when computer freeze or
lock up happens unexpectedly, it is a good idea to save your work frequently to reduce potential
data loss.
Hardware
Computer hardware refers to the physical parts of a computer and related devices. Internal
hardware devices include motherboards, hard drives, and RAM. External hardware devices
include monitors, keyboards, mice, printers, and scanners.
The internal hardware parts of a computer are often referred to as components, while external
hardware devices are usually called peripherals. Together, they all fall under the category of
computer hardware.
HTML
HTML Stands for "Hyper-Text Markup Language." This is the language that Web pages are
written. Web pages must conform to the rules of HTML in order to be displayed correctly in a
Web browser. The HTML syntax is based on a list of tags that describe the page's format and
what is displayed on the Web page.
Fortunately, the HTML language is relatively easy to learn. Even more fortunately (so much for
good grammar), many Web development programs allow you to create Web pages using a
graphical interface. These programs allow you to place objects and text on the page and the
HTML code is written for you.
Hyperlink
A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a
new section within the current document. Hyperlinks are found in nearly all Web pages, allowing
users to click their way from page to page. Text hyperlinks are often blue and underlined. When
you move the cursor over a hyperlink, whether it is text or an image, the arrow should change to
a small hand pointing at the link. When you click it, a new page or place in the current page will
open.
Hyperlinks, often referred to as just "links," are common in Web pages, but can be found in other
hypertext documents. These include certain encyclopedias, glossaries, dictionaries, and other
references that use hyperlinks. The links act the same way as they do on the Web, allowing the
user to jump from page to page.
Well that’s about it for a partial lesson on geeky type terms. Feel free to start using them in the
discussions you have with us fellow geek types. We can coach you with the right time and terms
and get you up to speed so you too can be a member of the card carrying “Geek Speak” club.
Right now there aren’t very many members of the club but we welcome all new members. And
besides if you start speaking geek we can all get together and have those sugar free donuts and
drink that delicious sugar free decaffinated coffee too.
Now that we cleared that part out, I wanted to toss out a mysterious photograph for you to
ponder over. It’s one of our employees out in the school system taken at a very young age. I
wanted to see if you had any idea of who the mystery employee is in our system. The employee
willingly volunteered a photograph so now take a close look and study it and let me know who
you think the employee might be.
(So…good luck with the guessing game. If you have one
you’d like to share with the newsletter, please email me at [email protected].
Here are also some funny quotes provided by Ms. Sonya Shaw at Kinston School. Great shout
out to my collegaues down in the southern part of the county. I thought these were quite funny
but then again I have a strange sense of humor. Or something like that. These came from a
website that hosts lots of these types of images located at http://www.despair.com . Check it out
when you have time and enjoy some of the favorites Ms. Shaw sent to me recently. If you have
any funny jokes or comments or computer humor, please send them my way at
[email protected] or stop me when you see me at your school. Humor is great
and helps get us through a workday. I welcome any feedback on the newsletter too.
Now off to some de-motivators:
And finally…a few computer jokes to end the newsletter: