Windows 10 All-in-One For Dummies. Woody Leonhard
Читать онлайн книгу.drivers ship with Windows, even though Microsoft doesn’t make them. The hardware manufacturer’s responsible for making its hardware work with your Windows PC, and that includes building and fixing the drivers. However, if Microsoft makes your computer, Microsoft’s responsible for the drivers, too. Sometimes you can get a driver from the manufacturer that works better than the one that ships with Windows. Also, keep in mind that device manufacturers offer updated drivers on their websites.
When you stick an app or program on your computer — and set it up so that you can use it — you install the app or program (or driver).
When you crank up a program — that is, get it going on your computer — you can say you started it, launched it, ran it, or executed it. They all mean the same thing.
If the program quits the way it’s supposed to, you can say it stopped, finished, ended, exited, or terminated. Again, all these terms mean the same thing. If the app stops with some sort of weird error message, you can say it crashed, died, cratered, croaked, went belly up, jumped in the bit bucket, or GPFed (techspeak for “generated a General Protection Fault” — don’t ask), or employ any of a dozen colorful but unprintable epithets. If the program just sits there and you can’t get it to do anything, no matter how you click your mouse or poke the screen, you can say that it froze, hung, stopped responding, or went into a loop.
A bug is something that doesn’t work right. (A bug is not a virus! Viruses work as intended far too often.) US Navy Rear Admiral Grace Hopper — the intellectual guiding force behind the COBOL programming language and one of the pioneers in the history of computing — often repeated the story of a moth being found in a relay of an ancient Mark II computer. The moth was taped into the technician’s logbook on September 9, 1947. (See Figure 1-4.)
Source: US Navy
FIGURE 1-4: Admiral Grace Hopper’s log of the first actual case of a bug being found.
The people who invented all this terminology think of the Internet as being some great blob in the sky — it’s up, as in “up in the sky.” So, if you send something from your computer to the Internet, you’re uploading. If you take something off the Internet and put it on your computer, you’re downloading.
The cloud is just a marketing term for the Internet. Saying that you put your data “in the cloud” sounds so much cooler than saying you copied it to storage on the Internet. Programs can run in the cloud — that is, they run on the Internet. Just about everything that has anything to do with computers can be done in the cloud. Just watch your pocketbook.
If you use cloud storage, you’re just sticking your data on some company’s computers. Put a file in Microsoft OneDrive, and it goes onto one of Microsoft’s computers. Put it in Google Drive, and it goes to Google’s storage in the sky. Move it to Dropbox, and it’s sitting on a Dropbox computer.
When you put computers together, you network them, and if your network doesn’t use wires, it's called a Wi-Fi network. At the heart of a network sits a box, commonly called a router or an access point, that computers can plug into. If the router has “rabbit ears” on top, for wireless connections, it’s usually called a Wi-Fi router. Keep in mind that some Wi-Fi routers may not have antennae outside and keep them hidden inside their box. Yes, fine lines of distinction exist among all these terms. No, you don’t need to worry about them.
There are two basic ways to hook up to the Internet: wired and wireless. Wired is easy: You plug your computer into a router or some other box that connects to the Internet. Wireless falls into two categories: Wi-Fi connections, which you find in many homes, coffee shops, airports, and all kinds of public places, and cellular (mobile phone–style) wireless connections.
Cellular Wireless Internet connections are identified with one of the G levels: 2G, 3G, 4G, or maybe even 5G. Each G level is faster than its predecessor.
This part gets a little tricky. If your smartphone can connect to a 3G or 4G network, it may be possible to set it up to behave like a Wi-Fi router: Your laptop talks to the smartphone, and the smartphone talks to the Internet over its 3G or 4G (or 5G) connection. That process is called tethering — your laptop is tethered to your smartphone. Not all smartphones can tether, and not all manufacturers allow it.
Special boxes called mobile hotspot units work much the same way: The mobile hotspot connects to the 3G or 4G (or 5G) connection, and your laptop gets tethered to the mobile hotspot box. Most smartphones these days can be configured as mobile hotspots.
If you plug your Internet connection into the wall, you have broadband, which may run via fiber (a cable that uses light waves), DSL or ADSL (which uses regular old phone lines), cable (as in cable TV), or satellite. The fiber, DSL, cable, or satellite box is called a modem, although it’s really a router. Although fiber-optic lines are inherently much faster than DSL or cable, individual results can be all over the lot. Ask your neighbors what they’re using and then pick the best. If you don’t like your current service, vote with your wallet.
Turning to the dark side of the force, Luke, the distinctions among viruses, worms, and Trojans grow blurrier every day. In general, they’re programs that replicate and can be harmful, and the worst ones blend different approaches. Spyware gathers information about you and then phones home with all the juicy details. Adware gets in your face with dodgy ads, all too frequently installing itself on your computer without your knowledge or consent. Ransomware scrambles (or threatens to scramble) your data and demands a payment to keep the data intact. I tend to lump the three together and call them scumware or crapware or something a bit more descriptive and less printable.
If a bad guy (and they’re almost always guys) manages to take over your computer without your knowledge, turning it into a zombie that spews spam by remote control, you’re in a botnet. (And yes, the term spam comes from the immortal Monty Python routine that’s set in a cafe serving Hormel’s SPAM luncheon meat, the chorus bellowing “lovely Spam, wonderful Spam.”) Check out Book 9 for details about preventing scumware and the like from messing with you.
The most successful botnets employ rootkits — programs that run underneath Windows, evading detection because regular programs can’t see them. The number of Windows 10 computers running rootkits is probably two or three or four orders of magnitudes less than the number of zombified Windows XP computers. However, as long as Windows XP computers are out there, botnets will continue to be a major threat to everyone.
This section covers about 90 percent of the buzzwords you hear in common parlance. If you get stuck at a party where the bafflegab is flowing freely, don’t hesitate to invent your own words. Nobody will ever know the difference.
What, Exactly, Is the Web?
Years from now, the operating system you use will be largely irrelevant, as will be the speed of your computer, the amount of memory you have, and the number of terabytes of storage that hum in the background. Microsoft will keep milking its cash cow, but the industry will move on. Individuals and businesses will stop shelling out big bucks for Windows and the iron to run it. Instead, the major push will be online. Rather than spend money on PCs that become obsolete the week after you purchase them, folks will spend money on big data pipes: It’ll