4 completely misconceptions about technology
The article explains misconception but rather popular technology concepts such as browsing in private mode to help you completely anonymous, so exhaust laptop batteries, phones before charging .
1. Should discharge laptop battery, phone battery before charging
Many people believe that the battery and laptop battery should be used before charging again. However, this is only true in some cases.
Older nickel-based batteries like NiMH and NiCd need to be discharged from 100% to 0% before being recharged to maintain capacity. Currently, most modern devices use Lithium Ion batteries. Lithium Ion batteries operate differently than nickel batteries and regular discharge is not good for this type of battery. You can learn more about how to use and preserve batteries for mobile devices here .
2. The phone shows as many waves as possible, the higher the wave quality
Wave columns are displayed on the smartphone screen indicating the signal strength to the mobile tower nearest you. However, the wave quality to your phone depends on the number of devices connected to that wave.
Urban areas are often equipped to meet the needs of many people who use phones in an area. In some unusual situations, for example at a music festival where many people gather in a small place, your phone may display a lot of wave columns, but the waves are actually extremely weak, That's because many people are connecting to a mobile tower.
3. Delete 'trash' will make the file permanently deleted
You delete a file, then delete the file again from the trash. This frees only the space it occupies in the drive, leaving the 'fragments' essentially recoverable.
On the Mac, select 'Secure Empty Trash' as the last step of the delete procedure. On a Windows-based computer, download a program like SDelete to safely delete files.
4. Browse the web in private mode to help you remain anonymous
Setting up the browser in incognito mode will prevent the browser from saving any information about the web pages you have visited and the content you entered when on that site.
However, the websites you visit may still have a record of your visit. In addition, the files that you download and save on your computer or mobile device will remain intact.
You should read it
- 9 'word of mouth' false technology
- Summary of the hottest technology news in the 3rd week of September
- The most misconception about successful thinking that many people think is right!
- Summary of the hottest tech news in the 4th of September
- 7 technology trends will change the world in the near future
- Summary of the hottest technology news in August 4
- Is the anonymous browsing mode really safe?
- What is a Graphene battery and how can it change the world of technology?
May be interested
- How does the DVD get stuck in the computer drive?what to do when your dvd is stuck in the tray? can you choose how to fix this situation yourself easily or bring a technician to solve it? if you choose to fix this situation yourself, this article will suggest a solution.
- Why do you need a more desktop laptop?laptops have long surpassed computers to discuss sales by compact design, easy to move. however, there are some compelling reasons to keep your feet in front of the desktop.
- 10 priceless shortcuts for computer usersbill gates once stated that the ctrl + alt + del key combination is a mistake, but this shortcut has quickly become a star in the technology community. besides ctrl + alt + del, on windows and mac there are 10 quite useful keystrokes that not everyone knows.
- 7 habits easy to damage technology equipmentall habits such as using a computer on a carpet, cushioning or using devices over and over and over without turning off will contribute to increasing the risk of risk and reducing the life of the technology equipment. here are some actions, habits that contribute to the destruction of your technology device, compiled by mashabe.
- 3 things to do right after removing the malwareafter removing the malware you need to change some of the system settings, which were previously altered by malicious software. the following article will show 3 important things that you need to do immediately after removing malware from your computer.
- How will Safely Remove harm the device?many users have a habit of removing an external usb drive / hard drive without performing safe exit (safely remove) on the computer. so how will safely remove harm your device?