Page 27 - Appendix Final
P. 27

TFT (Thin Film Transistor)                               Upload
     ‘Thin film transistor, or TFT’, is a description of the technolo-  ‘Upload’  is  the  opposite  of  ‘Download’.  You  ‘Download’
     gy behind flat screens, on laptops, phones and monitors, and   something from the internet; you ‘Upload’ something to
     how they are able to radiate a display. The term ‘TFT’ has   the internet
     become  synonymous  with  flat  screens,  as  in,  a  ‘TFT’  flat
     screen monitor or ‘TFT’ monitor. Other flat screen technolo-  (URL (Uniform Resource Locator)
     gy exist like ‘AMOLED, LCD and LED’, each competing in dis-  A  ‘Uniform  Resource  Locator  or  URL’  is  an  internet  or
     play quality and price.                                  ‘Web Address’. ‘https://www.google.co.uk’… is a URL. The
                                                              ‘https’  Hypertext  Transfer  Protocol  Secure)  tells  you  the
     Tooltip                                                  server uses encryption, and is secure. A web address with-
     ‘Tooltips’  are  little  boxes  that  appear  when  you  hover  or  out  the  prefix  ‘https'  will  usually  be  flagged  as  ’Not  se-
     move the mouse pointer over a button or icon. They usually  cure’.  This  doesn’t  mean  there’s  something  wrong  with
     give you a brief but helpful tip on what the button or Icon  the site; it just means the site is not encrypted. However,
     does.  They  even  give  a  shortcut  key  if  one’s  available.  it  does  mean  the  site  is  more  vulnerable  to  attack  and
     ‘Tooltips’ are helpful if you’re a stranger to a program and  could harbour malware or viruses. Never enter any per-
     unsure of the button or which icon to select.            sonal  details  on  a  site  that  is  not  secure,  or  the  small
                                                              ‘Padlock’ icon is missing at the beginning of the URL in the
     TPM (Trusted  Platform  Module.  A  requirement  for  Win-  address field of your ‘Browser’
     dows 11)
     ‘TPM’ is a chip on the motherboard, network card or some- USB  (Universal Serial Bus)
     times set-up through the ‘UEFI’. ‘TPM is an anti-tamper me-  The USB is a very popular port with many motherboards
     dium used as a secure location for storing encryption ‘Keys’,  now having upwards of six ports. Over the years the USB
     like the ‘BitLocker encryption  Key.’ The stored keys are Used  has been regularly updated from USB1, 2 & 3.  Each up-
     to unlock the Drive or software; any Key missing or spoof key  date introducing a faster Data transfer rate. The other big
     will terminate the boot process stopping any software from  advantage is its ‘Hot-Swap’ or ‘Warm swap’ capabilities,
     loading.                                                 meaning you can safely disconnect or connect a USB de-
                                                              vice without having to shut down the system. Most mod-
     Tooltip                                                  ern  motherboards  support  USB3  or  above  and  in  many
     ‘Tooltips’  are  little  boxes  that  appear  when  you  hover  or  cases USB3 is backward compatible with USB2. However,
     move the mouse pointer over a button or icon. They usually  USB1 devices, although accepted by many USB2 ports, is
     give you a brief but helpful tip on what the button or Icon  not accepted by USB3. Keep this in mind when you pur-
     does.  They  even  give  a  shortcut  key  if  one’s  available.  chase a USB device and always make sure its compatible
     ‘Tooltips’ are helpful if you’re a stranger to a program and  with the USB ports on your system. With so many ports
     unsure of the button or which icon to select.            available the temptation is to just plug a USB Hard drive
                                                              into the first available port regardless of which port it was
     TLD  (Top Level Domain)                                  previously connected. Windows, on the other hand, treats
     ‘Top Level Domain’ referrers too the letters at the end of an  each port as a separate device. Attach a USB device to a
     internet  address,  it  can  be  a  company  address  like,  Mi-  port and Windows sets that port up with all the software
     crosoft.com or an email address like, @yahoo.co.uk The top  needed  for  that  USB  device.  Change  the  port  and  Win-
     level  domain  being,  ‘.com’  and  ‘uk’  .  Most  countries  have  dows will duplicate the setup on the new port.  The impli-
     their own top level domain, United States, ‘.us.’ France, ‘.fr’  cations of this are, you could end up with several duplicat-
     Albania, .’al’                                           ed software bundles stored on your computer. Problems
                                                              could elevate if you have both USB hard drives and a USB
     Trusted Boot                                             flash card. Not only will you use up resources, you could
     ‘Trusted  Boot’  checks  the  integrity  of  all  the  boot  compo-  have  problems  if  either  device  has  settings  attached  re-
     nents including the kernel. The ‘Kernel’ then verifies all the  lating to a particular port and Drive letter
     Windows startup processes. This ensures only trusted soft-
     ware is loaded.                                          WAN (Wide Area Network)
                                                              A ‘WAN’ is a collection of computers joined together as a
     UEFI  (Unified Extensible Firmware Interface)            network, but from a distance. Computers on this kind of
     ‘UEFI’ is the modern replacement for the traditional ‘Bios’.  It  network can be in another city, country or on the other
     performs  the  same  function  as  the  ’Bios’  but  with a  mush  side of the world. The Internet is a ‘WAN’
     higher  level  of  security;  things  like...  ‘Secure  Boot’,  (A  re-
     quirement for Windows 11) and  support for self-encrypted  Warm boot
     drives. (See, Secure Boot & TPM)                          Performing a restart, by using the ‘Reset’ button or using
                                                              the keystrokes Ctrl + Alt + Del.


                                                                                                                  27
   22   23   24   25   26   27   28   29   30   31   32