Sunday, May 26, 2013

Top 10 Technology Concepts You Should Have Learnt


With the influx of Technology in almost every sphere of our lives, most of us claim to be tech-savvy. We text message in the blink of an eye, use Bluetooth while driving, and debug programs in a jiffy. However, many of us may not have a clear concept about each and every ‘bit and byte’ of the tech world.
Here is a list of the Top 10 Tech concepts that you should have learnt.

10. Windows Registry
The Windows Registry is a hierarchical database that stores the configuration settings of the operating system as well as application software that are installed in your PC. It is simply a database that stores your computer hardware, software, user settings, security and property settings for folders and programs. It is an important part place in the Windows OS, where most of the apps are stored.

9. SSL Encryption/HTTPs
HTTPs stands for Hypertext Transfer Protocol Secure and is a URL scheme that is in sync with the normal HTTP connections, but has an additional signal that secures the browser with an encryption layer of SSL/LS to protect the traffic. It is a combination of HTTP and SSL/TLS protocols to provide encrypted communication and secure identification of a web server. The SSL encryptions are usually used for payment transactions or sensitive corporate information that passes through the World Wide Web.

8. Network Neutrality
As the name suggests, Net Neutrality is all about creating a neutral Internet. It is also known as Internet neutrality or Network Neutrality. According to this concept, Internet traffic should be treated equally. The term also supports the view that Internet should be an open platform, just like any other home utility, as it has now become a necessary part of our daily lives. Net Neutrality believes in no restrictions by the Internet Service Providers (ISPs) and governments on sites, content and the types of commodities that are attached to the modes of communication.

7. 4G
4G is the fourth generation of wireless cellular standards in telecommunications. The peak speed requirements for 3G service is 100 Mbit/s for high mobility communication and 1Gbit/s for low mobility communication. A 4G system provides a secure mobile broadband solution to smartphones, wireless modems and laptops. Internet access, IP telephony, gaming services and multimedia streaming services are all provided by the 4G system. Technologies such as WiMAX and LTE are 4G technologies.

6. Lossless and Lossy Music
Usually, audio compression comes in two forms-lossless compression and lossy compression. In the lossless audio format, the audio files retain every bit of information that is found in the original so that nothing is lost. The lossy format is the audio compression that loses some of the information found in the original, especially when you are compressing the file to make it smaller. The MP3 format is the lossy compression format. Here the very high and the very low frequencies are often skipped during compression.

5. 32-Bit and 64-Bit Operating Systems
The terms 32-bit and 64-bit imply the way a computer’s CPU handles information. The 64-bit version of the operating system can handle huge amounts of RAM and more effectively than the 32-bit operating system. For the 64-bit version to be installed, your computer needs a processor that is capable of running a 64-bit version of the Windows OS. The main advantage of the 64-bit is that it is more responsive when you are running several programs at the same time.

4. Android Task Killers
Android Task killers were earlier considered very useful tools. They could improve your phone’s performance and boost battery life. However, they are no longer used, as they do more harm than good to your Android phones. A task killer is an app from which you can force other apps to quit, providing more space on your Android OS for other apps to work speedily. It is advisable that you don’t use them unless you know perfectly well how they function.

3. Proper Windows maintenance
To keep your computer running smoothly you should know how to maintain, restore and have a back up of your registry. Improper entries in the registry can destroy the whole Windows operating system. For proper Windows maintenance, see that you have a back up of your registry before editing it. Then you need to clean up your registry as it may be filled with cluttered unwanted programs. The other aspect of Windows maintenance is to fix a damaged registry as this will restore something that has been inadvertently damaged.

2. Spyware, Viruses, Trojans, Worms and other Malware
Viruses, trojans and worms are all a sort of malicious software programs that are designed to disrupt your computer operations or gather information through unauthorized access to system resources. There are thousands of viruses, Trojans, worms, bots and root kits all stalking out there waiting to infest your computer. It therefore makes sense to have a very good antivirus software package installed to combat with this menace.

1. Wi-Fi and Wireless Internet
Wi-Fi is a wireless communication standard that is used between computer devices to share resources and data. The Wi-Fi signals cannot travel a long distance and are therefore used for Local Area networks (LANs). To set up a Wi-Fi network, the main computer acts as a server with a wireless network interface card. This card features a small antenna that receives and broadcast WiFi signals. A high speed modem assists the direction of the traffic with the help of a router and a switch, to integrate wireless internet into the WiFi LAN. Now any computer in the vicinity can make use of the WiFi signals and connect to the Internet using the WiFi network interface card. Smartphones, Mobiles, PDAs and laptops have a built-in Wi-Fi ability that enables them to surf the Internet, access or transfer data with speed and efficiency.

These are some of the technology concepts that one should know as they may come handy at some time or the other. With the vast trove of technology terms, sometimes a lifetime may not be enough to learn all of them.

Source : http://www.gizmocrazed.com

No comments:

Post a Comment