image description
image description
Tags (178):
3D Maps 3D Printer 3D Touch 5D-Discs Altwork Android Apollo App Store Apple Apple Car Apple Company Apple Music Apple Pay Apple Store Apple Support Apple TV Apple Watch Apple Watch 2 Apple WWDC 2016 Apps Asia Audio Battery Beats Best Shots Bugs Business Camera CarPlay Cases Celebrities Charging Cheap Smartphone Court Deals deca-core Dev Center Discounts DJ gloves Education Elegant Encryption Error 1970 Error 53 Experiments Facebook Fashion FBI Flickr FORCEemotion Foxconn Free stuff Freedom 251 Fun Gadgets Games Gear 360 Gift Cards Giveaway Goldgenie Google GoPro Graphics Guide Hackers Headphones Hermès History iCloud iFunBox iMac India Instagram Intel Internet of things Interview iOS iOS 9 iOS 9.2 ios 9.3 iPad iPad Air 3 iPad Pro iPhone iPhone 5E iPhone 5S iPhone 5SE iPhone 6 iPhone 6 Plus iPhone 6C iPhone 6s iPhone 6s Plus iPhone 7 iPhone 7 Plus iPhone 7C iPhone SE iPod iPod Touch iTunes iTunes Radio Jailbreak Keynote Kickstarter LaMetric Time Laptop Leaks Li-Fi Lightning Cable Luxury Mac Mac OSX MacBook MacBook Air Macbook Pro MacOS Maps Microsoft Music MWC 2016 NAS News Nexus Novelties OPPO Oracle OS X OS X 10 Patent Preview Privacy Pros and Cons Records RemoteControl Revenues Review Rock Jaw Sentio Rumors Safari Sales Samsung Security Shares Siri Smart bracelet Smart Desktop Clock Smart home Smart Ring Solar Paper SONOS Sony Sound Speakers Specifications Speed 8 Steve Jobs Super VOOC Synology Tax Technology ThingMaker Tim Cook Tips Tools Tornado Touch ID Tutorial tvOS tvOS 9 Twitter Video VirnetX Virtual Reality watchOS watchOS 2 Windows wireless charging X-Files Zopo

The most common myths about smartphones and computers

Knowledge creates doubt, and lack of knowledge – errors, transforming into dangerous habits. How dangerous are mobile phones, and why the resolutions of displays are increasing, how to safely charge the smart phone and use the Internet. The answers for your questions you will find in this article.


Mac computers are immune to viruses


In early March 2016, the world, without much pleasure, met KeRanger program – typical ransomware virus which encrypts user’s files and demands a ransom in order to unlock them. The feature of this malicious program is that it is the first ransomware, specially adapted to environment of OS X. This is just the most recent example of fact that Apple computers, like all others, has been for long vulnerable to cyber-attacks.

Private browsing = anonymous web browsing


There is a misconception that the “anonymous” and “private mode” in the browsers are synonymous with anonymity. If you are using incognito mode in Google Chrome or private browsing in Safari browser, it simply means that the browser will not save history of your browsing and will not automatically log in with your account. This can only be useful if you have to work on other people’s computers. In this case, the owner of the computer will not know what you were doing. However, you should take into account that, for websites and your Internet Service Provider these data are always available.

Permanent connection to the charger destroying smartphone battery


If the title statement is true, then why do we use the dock station, the primary task of which is precisely to continuous charge the gadget? If you look at the design of a variety of popular accessories in this segment, the biggest part of them is designed to charge the battery. The dock station has a primitive mechanism that simply transports energy from the socket to the battery of the tablet or smartphone. Modern mobile devices running on lithium-ion batteries, and they are smart enough on their own to stop the charging process when the charge level is 100%.

Before charging the iPhone battery should be fully discharged

Apple technical support staff really recommend from time to time, like once a month, to completely turn off the iPhone or other devices by pressing physical button, to prevent of premature wear of the battery and nothing more. As for charging percentage – there is no direct correlation between, for what period you have used the battery charge and the efficiency of the energy system of the gadget. For example, during the day you have used 75% of the battery charge on the iPhone, and then fully charge it overnight. The next day you discharged to 25% – this will be the full charging cycle. The capacity of the battery on the iPhone will decrease after a certain number of charge cycles. As simple as that.

The more megapixels in the iPhone camera, the better


In the reality, when the smartphone can replace the camera for filming, everything is exactly the opposite. The problem of grainy image and low-definition – small resolution of matrix which was solved long ago, an average 6-10 megapixels is quite enough for filming and photo shooting tasks. Therefore, several generations of flagship smartphones compete with each other not to increase the megapixels quantity, but to improve image stabilization system, noise reduction, lighting sensors, “smart flash”, etc.

Do not use the charging of the tablet bundled with a smartphone

Unfortunately, there is no clear answer to this statement. The official website of Apple indicates that its 12-watt adapter from the iPad kit can also be used to charge the iPhone. However, Steve Sandler, founder of AEi Systems, specializing in the electronics analysis, believes that the regular use of the iPad charger kit may lead to failure of the iPhone battery. On the other hand, to notice any changes in battery efficiency will be possible only after a year, that is, when the majority of iPhone owners are switching to a new model.

You don’t need to shut down your computer every day

Everything is about your own ability to adhere to a regular pace of life and maintenance of equipment. Various experts advise to turn off your computer, thus you will be able to postpone the term of premature failure of electronic components of your computer. And those, who clearly know how much time they spend in front of a monitor for a week and when they have scheduled upgrades for their workstation shouldn’t be worrying about such trifles.


    Your email address will not be published.