Page 27 - Appendix Final
P. 27
TFT (Thin Film Transistor) Upload
‘Thin film transistor, or TFT’, is a description of the technolo- ‘Upload’ is the opposite of ‘Download’. You ‘Download’
gy behind flat screens, on laptops, phones and monitors, and something from the internet; you ‘Upload’ something to
how they are able to radiate a display. The term ‘TFT’ has the internet
become synonymous with flat screens, as in, a ‘TFT’ flat
screen monitor or ‘TFT’ monitor. Other flat screen technolo- (URL (Uniform Resource Locator)
gy exist like ‘AMOLED, LCD and LED’, each competing in dis- A ‘Uniform Resource Locator or URL’ is an internet or
play quality and price. ‘Web Address’. ‘https://www.google.co.uk’… is a URL. The
‘https’ Hypertext Transfer Protocol Secure) tells you the
Tooltip server uses encryption, and is secure. A web address with-
‘Tooltips’ are little boxes that appear when you hover or out the prefix ‘https' will usually be flagged as ’Not se-
move the mouse pointer over a button or icon. They usually cure’. This doesn’t mean there’s something wrong with
give you a brief but helpful tip on what the button or Icon the site; it just means the site is not encrypted. However,
does. They even give a shortcut key if one’s available. it does mean the site is more vulnerable to attack and
‘Tooltips’ are helpful if you’re a stranger to a program and could harbour malware or viruses. Never enter any per-
unsure of the button or which icon to select. sonal details on a site that is not secure, or the small
‘Padlock’ icon is missing at the beginning of the URL in the
TPM (Trusted Platform Module. A requirement for Win- address field of your ‘Browser’
dows 11)
‘TPM’ is a chip on the motherboard, network card or some- USB (Universal Serial Bus)
times set-up through the ‘UEFI’. ‘TPM is an anti-tamper me- The USB is a very popular port with many motherboards
dium used as a secure location for storing encryption ‘Keys’, now having upwards of six ports. Over the years the USB
like the ‘BitLocker encryption Key.’ The stored keys are Used has been regularly updated from USB1, 2 & 3. Each up-
to unlock the Drive or software; any Key missing or spoof key date introducing a faster Data transfer rate. The other big
will terminate the boot process stopping any software from advantage is its ‘Hot-Swap’ or ‘Warm swap’ capabilities,
loading. meaning you can safely disconnect or connect a USB de-
vice without having to shut down the system. Most mod-
Tooltip ern motherboards support USB3 or above and in many
‘Tooltips’ are little boxes that appear when you hover or cases USB3 is backward compatible with USB2. However,
move the mouse pointer over a button or icon. They usually USB1 devices, although accepted by many USB2 ports, is
give you a brief but helpful tip on what the button or Icon not accepted by USB3. Keep this in mind when you pur-
does. They even give a shortcut key if one’s available. chase a USB device and always make sure its compatible
‘Tooltips’ are helpful if you’re a stranger to a program and with the USB ports on your system. With so many ports
unsure of the button or which icon to select. available the temptation is to just plug a USB Hard drive
into the first available port regardless of which port it was
TLD (Top Level Domain) previously connected. Windows, on the other hand, treats
‘Top Level Domain’ referrers too the letters at the end of an each port as a separate device. Attach a USB device to a
internet address, it can be a company address like, Mi- port and Windows sets that port up with all the software
crosoft.com or an email address like, @yahoo.co.uk The top needed for that USB device. Change the port and Win-
level domain being, ‘.com’ and ‘uk’ . Most countries have dows will duplicate the setup on the new port. The impli-
their own top level domain, United States, ‘.us.’ France, ‘.fr’ cations of this are, you could end up with several duplicat-
Albania, .’al’ ed software bundles stored on your computer. Problems
could elevate if you have both USB hard drives and a USB
Trusted Boot flash card. Not only will you use up resources, you could
‘Trusted Boot’ checks the integrity of all the boot compo- have problems if either device has settings attached re-
nents including the kernel. The ‘Kernel’ then verifies all the lating to a particular port and Drive letter
Windows startup processes. This ensures only trusted soft-
ware is loaded. WAN (Wide Area Network)
A ‘WAN’ is a collection of computers joined together as a
UEFI (Unified Extensible Firmware Interface) network, but from a distance. Computers on this kind of
‘UEFI’ is the modern replacement for the traditional ‘Bios’. It network can be in another city, country or on the other
performs the same function as the ’Bios’ but with a mush side of the world. The Internet is a ‘WAN’
higher level of security; things like... ‘Secure Boot’, (A re-
quirement for Windows 11) and support for self-encrypted Warm boot
drives. (See, Secure Boot & TPM) Performing a restart, by using the ‘Reset’ button or using
the keystrokes Ctrl + Alt + Del.
27