10. Windows Registry
The Windows Registry is a hierarchical database that stores the
configuration settings of the operating system as well as application
software that are installed in your PC. It is simply a database that
stores your computer hardware, software, user settings, security and
property settings for folders and programs. It is an important part
place in the Windows OS, where most of the apps are stored.
9. SSL Encryption/HTTPs
HTTPs stands for Hypertext Transfer Protocol Secure and is a URL
scheme that is in sync with the normal HTTP connections, but has an
additional signal that secures the browser with an encryption layer of
SSL/LS to protect the traffic.
It is a combination of HTTP and SSL/TLS protocols to provide
encrypted communication and secure identification of a web server. The
SSL encryptions are usually used for payment transactions or sensitive
corporate information that passes through the World Wide Web.
8. Network Neutrality
As the name suggests, Net Neutrality is all about creating a neutral
Internet. It is also known as Internet neutrality or Network Neutrality.
According to this concept, Internet traffic should be treated equally.
The term also supports the view that Internet should be an open
platform, just like any other home utility, as it has now become a
necessary part of our daily lives.
Net Neutrality believes in no restrictions by the Internet Service
Providers (ISPs) and governments on sites, content and the types of
commodities that are attached to the modes of communication.
7. 4G
4G is the fourth generation of wireless cellular standards in
telecommunications. The peak speed requirements for 3G service is 100
Mbit/s for high mobility communication and 1Gbit/s for low mobility
communication
.A 4G system provides a secure mobile broadband solution to smartphones, wireless modems and laptops. Internet access, IP telephony, gaming services and
multimedia streaming services are all provided by the 4G system.
Technologies such as WiMAX and LTE are 4G technologies.
6. Lossless and Lossy Music
Usually, audio compression comes in two forms-lossless compression
and lossy compression. In the lossless audio format, the audio files
retain every bit of information that is found in the original so that
nothing is lost.
The lossy format is the audio compression that loses some of the
information found in the original, especially when you are compressing
the file to make it smaller. The MP3 format is the lossy compression
format. Here the very high and the very low frequencies are often
skipped during compression.
5. 32-Bit and 64-Bit Operating Systems
The terms 32-bit and 64-bit imply the way a computer’s CPU handles
information. The 64-bit version of the operating system can handle huge
amounts of RAM and more effectively than the 32-bit operating system.
For the 64-bit version to be installed, your computer needs a processor
that is capable of running a 64-bit version of the Windows OS. The main
advantage of the 64-bit is that it is more responsive when you are
running several programs at the same time.
4. Android Task Killers
Android Task killers were earlier considered very useful tools. They
could improve your phone’s performance and boost battery life. However,
they are no longer used, as they do more harm than good to your Android
phones.
A task killer is an app from which you can force other apps to quit,
providing more space on your Android OS for other apps to work speedily.
It is advisable that you don’t use them unless you know perfectly well
how they function.
3. Proper Windows maintenance
To keep your computer running smoothly you should know how to
maintain, restore and have a back up of your registry. Improper entries
in the registry can destroy the whole Windows operating system.
For proper Windows maintenance, see that you have a back up of your
registry before editing it. Then you need to clean up your registry as
it may be filled with cluttered unwanted programs. The other aspect of
Windows maintenance is to fix a damaged registry as this will restore
something that has been inadvertently damaged.
2. Spyware, Viruses, Trojans, Worms and other Malware
Viruses, trojans and worms are all a sort of malicious software
programs that are designed to disrupt your computer operations or gather
information through unauthorized access to system resources. There are
thousands of viruses, Trojans, worms, bots and root kits all stalking
out there waiting to infest your computer. It therefore makes sense to
have a very good antivirus software package installed to combat with
this menace.
1. Wi-Fi and Wireless Internet
Wi-Fi is a wireless communication
standard that is used between computer devices to share resources and
data. The Wi-Fi signals cannot travel a long distance and are therefore
used for Local Area networks.
To set up a Wi-Fi network, the main computer acts as a server with
interface card. This card features a small antenna that receives and broadcast WiFi signals. A high speed modem assists the direction of the traffic with the help of a router and a switch, to integrate wireless internet into the WiFi LAN. Now any computer in the vicinity can make use of the WiFi signals and connect to the Internet using the WiFi Network
interface card. Smartphones, Mobiles, PDAs and laptops have a built-in
Wi-Fi ability that enables them to surf the Internet, access or transfer
data with speed and efficiency.
These are some of the technology concepts that one should know as
they may come handy at some time or the other. With the vast trove of
technology terms, sometimes a lifetime may not be enough to learn all of
them.