Common Tech Queries Resolved

    • Dheeraj.Jangra@timesgroup.com
    • Publish Date: May 29 2016 5:29PM
    • |
    • Updated Date: Aug 20 2016 5:14PM
Common Tech Queries Resolved

How is a 4K display different from a High definition display? Why do we “eject” USB drives before unplugging it from computers? Well, technology can be mysterious, even to the geekier among us. But don’t worry, DHEERAJ has all the answers lined up for you. 

Why do we “eject” USB drives before unplugging it from computers?

It’s a no brainer that if you remove the USB (Universal Serial Bus) drive while the data is being written to it—for example, if you are copying content from it or transferring files to it—can result in data corruption. But what if you have completed your task? Is it safe then to remove the drive without ejecting it? The simple answer is no. Even if the USB device doesn’t appear to be in-use, it may still be in-use. We are unaware of the actions that are being performed in the background. For example, it could be possible that a program for no good reason has locked a file in the USB drive even if it’s not using it. If you yank the drive in this situation, your data could get corrupted. Ejecting the disk is a way of telling the computer that it’s time to tell the program to disconnect any connection with the drive, regardless of whether the computer deems it efficient. In other words, the few seconds you take to click “eject” is time well spent.

What is NFC?

NFC — Near Field Communication — is a wireless connectivity technology that allows phones, tablets, and laptops to share data with other NFC-equipped devices. You must be wondering that how is it different from Bluetooth or Wi-Fi? Unlike Bluetooth, NFC doesn’t require any kind of manual pairing or device discovery to transfer data. Simply by bringing two NFC-enabled devices close together, they automatically initiate network communications without requiring the user to configure the setup (All it requires is one-tap). Another argument in favour of NFC is that it consume much less power than Bluetooth. But the range of transmission is much shorter than Bluetooth. While NFC has a range of around 10cm, Bluetooth connections can transmit data up to 10 meters or more from the source. The potential for NFC is huge. In the coming future NFC is best poised to make our smartphones a viable alternative to credit and transport cards. A research predicts that 1.95 billion NFC-enabled devices will ship in 2017, largely in smartphones. 

Why public Wi-Fi hotspots pose a security risk?

Nowadays public Wi-Fi is available everywhere — in stores, libraries, restaurants and soon on trains and in stations — but so is the danger. The open nature of the network allow cybercriminals to easily intercept login information, credit card details and vital passwords. It’s pretty easy for someone who wants to intercept your data to set up a network called “Free Wi-Fi” or any other variation that includes a nearby venue name, to make you think it’s a legitimate source. If you plan to use a mobile app to conduct sensitive transactions — like shopping with a credit card — use your phone’s data network (often referred to as 3G or 4G). While using a public Wi-Fi always keep in mind that your actions are visible to a “third party.”

Tips and tricks 

  • If you’re at small venue (public library, restaurant, coffee shop, etc.), check with staff to confirm the authenticity of their Wi-Fi network.  
  • When browsing information sensitive sights, do your best to visit websites that start with “Https”. Keep your anti-virus software up-do date. 
  • Enable two-factor authentication for your accounts. It simply means means you’ll have a code sent to you via text or phone call if you’re logging in from an unrecognized IP address (you can do this for your email and social accounts).
  • To enable this feature for Gmail, log into your account and open the settings page. Navigate to the Accounts And Import tab and click Other Google Account Settings. The second section will be two-step verification, and you can click Sign-in & security to start. First, enter your phone number and choose whether you’d like a text message or a phone call. Next, Google will send a six-digit code to your phone. Enter this when prompted. The process in now complete.

What is 4K display?

Every screen has a resolution, a number which represents the amount of pixels on the screen. A 4K display, officially known as UHD (Ultra-High Definition), consist of at least 3,840 pixels (horizontal) x 2,160 pixels (vertical) of resolution (the horizontal can go above 4,000 pixels). This puts it on the top of the current scale of digital resolutions in which the bottom is occupied by standard definition (450X540 pixels), followed by HD (High Definition) with 720 pixels and full HD at 1080 pixels. A 4K display offers four times more pixels than regular High Definition TV. Thus the name 4K. This produces unparalleled clarity and sharpness with no image degradation. That said, the more important problem isn't really the name; it's how to get real 4K content to watch. So far, it's appearing in dribs and drabs on services like Netflix and Amazon Instant Video. It will take another couple of years for 4K to fully become mainstream option.   

What is cloud storage? 

Let’s make this clear that cloud storage has nothing to do with weather patterns and storm systems. To put it simply, it’s a space on internet where you can store your data. The cloud, represents the Internet. Instead of saving information in your computer’s hard drive or other local storage devices, you save it in a remote database, called servers. This remote infrastructure is installed and maintained by highly specialized companies. Files stored in the cloud can be accessed at any time from any place so long as you have Internet access. They also act as a second back-up for your precious data.  Here are some example of cloud storage services that you use on daily basis without even realizing it. Web e-mail providers like Gmail, Hotmail and Yahoo! Mail store e-mail messages on their own servers. YouTube hosts millions of user-uploaded video files. Instagram, where you post your photos is also an example of cloud storage. Three of the most popular cloud storage services are Dropbox, Google Drive and SkyDrive.  Most cloud-based services offer a certain amount of storage space free, which will be ample for most of you. Apple customers get 5GB of iCloud storage free, Dropbox offers 2GB and Google offers 15GB across Google Drive, Google+ Photos and Gmail. If your requirement is more, you have to pay a subscription fee. Other Cloud-based services such as  Spotify or Netflix (used for consuming movies and music) work on subscription basis. If these services hadn’t been around you will be forced to carry all your data in pen drives or portable hard disks. 

Cloud computing is believed to have been invented by Joseph Carl Robnett Licklider in the 1960s with his work on ARPANET to connect people and data from anywhere at any time

What is the difference between a virus, worm, Trojan horse and bot?

Viruses, worms, Trojans, and bots are all part of a class of software called malware. They are designed specifically to damage, disrupt, steal or stop the system from being used in its normal manner. They are generally referred by the generic term “computer virus.” Let’s know more about them. 

Virus: It share a lot of characteristics with its biological counterpart. Viruses are programs that copy themselves and infect a computer, spreading from one to another—just like a real life virus. Computer viruses usually have 2 phases — the infection phase, where they reproduce as widely as possible without being detected, and an attack phase where they attempt to carry out whatever damage they were designed to inflict. It is important to note that a virus cannot be spread without a human action (such as running an infected program or sharing corrupt files).

Trojan horse: The name is based on the famous wooden horse used by the Greeks warriors to secretly gain access to the legendary city of Troy. Trojan horse software operates the same way, where Troy is your computer and the horse is the deadly application. On the face of it the application could be in the form of a harmless computer game or a free MP3 song that you wish to download. Once installed in your device it can steal your credit card information or vital passwords. Trojan Horse does not have the ability to multiply like viruses but it can make your computer prone to virus attacks.  

Spamming: Spamming is a method of flooding the Internet with copies of the same message. Most spams are commercial advertisements which are sent as an unwanted email to users. Spams are also known as Electronic junk mails or junk newsgroup postings. We know how irritating and time consuming is to delete them daily from our mailboxes.

Worms: A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. Using a network, a worm can expand from a single copy incredibly quickly. The Code Red worm replicated itself more than 250,000 times in approximately nine hours on July 19, 2001. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike computer virus it never attaches itself to a program. Worms will most certainly cause harm to the network (apart from the host computer), whereas viruses corrupt or modify files on a targeted computer. 

Bot: A ‘bot’ is a type of malware which allows an attacker to gain complete control over the affected computer. Computers that are infected with a ‘bot’ are generally referred to as ‘zombies’. In addition to the worm-like ability to self-propagate, bots can also log keystrokes, gather passwords and financial information, relay spam, and open back doors on the infected host. It might also cause your computer to slow down, display mysterious messages, or even crash.

More From SCI-TECH...

READ MORE

POST YOUR OWN ARTICLE, PHOTO & VIDEO

SIMPLY FILL DETAILS & POST


 
SIGN UP & EXPLORE MORE...
*


*
* *
* *
img
REGISTRATION SUCCESSFUL...
THANK YOU FOR REGISTERING
  • About Us

Times Newspaper in Education (Times NIE) is a novel program that helps students ‘Stay Ahead’ and aims at making ‘Learning Fun’. It introduces concepts that help individual growth and development beyond school curriculum.

A brainchild of The Times of India, the world’s leading English newspapers, Times NIE nurtures progress and innovation. Adapted from the international concept, Times Newspaper in Education program (Times NIE) was initiated in India in 1985.

Today we have over 3000 schools and over 9 lac students subscribing to the programme, spanning 16 cities viz. Delhi, Mumbai, Pune, Bangalore, Kolkata, Chennai, Hyderabad, Ahmedabad, Kochi, Lucknow, Coimbatore, Chandigarh, Dehradun, Vijayawada, Visakhapatnam, and Jaipur.

The Times of India Student edition, a customized student newspaper exclusively for the students, packs a powerful punch in terms of content that leads to a smarter and superior learning experience. The information is crafted such that it finds use in classroom discussions, thus making it relevant and current. It truly gives education a new dimension by fostering the simple habit of reading which in turn paves the way for a confident, informed and aware individual. A newspaper that inspires young minds and equips them to face challenges of today’s world, making way for global citizens.

Empowering students with new cutting-edge knowledge through various educative and informative activities is a commitment and tradition of Times NIE. The programme serves as a catalyst of education and interaction, as well as a window into the minds of the quintessential Indian youth. On a significant scale Times NIE comprises diverse interesting activities and events that boost the child’s passion for learning, while revealing hidden talent.

While you are aware that The Times of India is among the leading English Newspapers across the world, it has consummated its position as an everlasting winner. With several international awards and recognitions to its credit, The Times of India and Times NIE have validated an enduring tradition of setting the highest benchmarks in every respect. We have been awarded with the two most prestigious awards, Times NIE - World’s No.1 NIE program and The Times of India, Student Edition - World’s No.1 Newspaper for the youth in 2006 by the celebrated World Association of Newspapers (WAN). In 2008 we were honoured by the International Newspaper Marketing Association (INMA), yet another international recognition for ‘Youth Audience Development’. In 2013 we were again honoured by the celebrated World Association of Newspapers (WAN) as the ‘Times NIE - World’s Best Youth Engagement Program’.

Times NIE has grown remarkably over the last three and a half decades, touching millions of children across more than 16 Indian cities. Our absolute commitment towards the fledgling generation remains undiluted and our greatest strength lies in the school partnership and commitment.

  • Times NIE World Awards
EDIT STUDENT PROFILE...



img

JOIN NOW !!!

Create or join groups, share your views, ideas through posts (Text, Pictures & Videos)

GOT A QUERY?

FEEL FREE TO ASK HERE. GET IT ANSWERED BY EXPERTS

CLICK HERE TO SEE YOUR PREVIOUS QUERIES

win

Why You Think India Is Great....