Skip to content
  • Log In
  • Privacy Policy

Computer Booters

SouthEast Valley Friends in Tech


Need website login credentials? Click Here


  • Home
  • Calendar
  • Membership
    • Become A Member
      • New Member Application
    • Benefits of Membership
    • Volunteering
  • Newsletter
    • CB Newsletter
  • Articles
    • All
  • Resources
    • Free Online Computer Courses
    • Windows 10 Tips & Tricks
    • APCUG Video Archive
    • Apple Support Videos
    • Maricopa County Library
    • Video Conferencing
  • About Us
    • Board of Directors
    • Contact Us
    • Privacy Policy
    • Legal Stuff
  • Login
Computer Booters

Category: Hardware

What’s the Difference Between Intel Core i3, i5, i7, and X CPUs?

February 20, 2021 Rob Truman

While AMD is making inroads, Intel is by far the number one choice in computer processors. Core processors are great chips for a desktop or laptop, but what’s the difference between Core i3, i5, i7, i9, and X? (more…)

Read more
  • General
  • Hardware
  • What Is

How to Turn a Windows Laptop Into a Desktop PC

January 9, 2021 Rob Truman

Laptops offer the power of a PC wherever you go, from the other side of the country to the other side of the couch. But sometimes you want a desktop for a bigger display, a larger keyboard, and a beefy mouse. Here’s how to turn your laptop into a pseudo desktop. (more…)

Read more
  • General
  • Hardware
  • How To

How to Create a QR Code for Your Wi-Fi Password

January 2, 2021 Rob Truman

Typing in your Wi-Fi details on new smartphones and tablets (and on your guests’ phones) can be a total hassle, especially if you have a long complex password. Make life a little simpler for yourself by turning your Wi-Fi password into a handy Wi-Fi QR code, so that anyone can log into your wireless network without bugging you. (more…)

Read more
  • General
  • Hardware
  • How To
  • Internet

Desktops Are Faster and More Powerful Than Laptops.

December 26, 2020 Rob Truman

Laptops offer portability, but if you need raw power and performance, there’s no beating a traditional desktop computer. Desktops don’t have the size or thermal constraints of a laptop, and don’t need to consider power consumption because they’re not running on battery power. (more…)

Read more
  • General
  • Hardware
  • Tips n Tricks

Stop Buying Inkjet Printers and Buy a Laser Printer Instead

September 12, 2020 Rob Truman

Are you sick and tired of how slow your inkjet printer is? Does it seem like the ink constantly runs out? Do yourself a favor and replace that hunk of junk with a quality laser printer. You may think that laser printers are meant for the business world and have no use in a residential setting, but you’d be woefully […]

Read more
  • General
  • Hardware
  • Tips n Tricks

11 Raspberry Pi projects for everyone: From beginners to pros

June 20, 2020 Rob Truman

The Raspberry Pi has grown from being a curiosity, maybe even a novel idea, to be a key item for anyone wanting to learn programming, electronics, robotics, IoT, and more. The little board is accessible both in terms of price and learning curve and has a sufficiently big enough fan base that there are thousands of ready-made projects, just waiting […]

Read more
  • General
  • Hardware
  • How To
  • Tips n Tricks

February 3rd Meeting

Guest Speaker: Judy Taylour

Ergonomics

Attend A Meeting

Click Here

What Is?

Trojan Horse

A Trojan horse is a computer program that pretends to do one thing (claiming to be a picture) but actually does damage when one starts it (it can completely erase one's files). Trojan horses cannot replicate automatically.

Malware

Short for "malicious software" and is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware.

Simple Mail Transfer Protocol (SMTP)

This is a set of rules used for sending email over the Internet. Your email program uses SMTP to send a message to the mail server and the mail server uses SMTP to relay that message to the correct receiving mail server. SMTP is a set of commands that authenticate and direct the transfer of electronic mail.

RSS

A format for information syndication, enabling the publishing of data which can then be reused in other contexts. RSS sources are often called feeds, meaning that new information is produced and published regularly and can be obtained from these feeds. RSS stands for Really Simple Syndication.

Font

A design for a set of characters. A font is the combination of typeface and other qualities, such as size and spacing. The term font is often used incorrectly as a synonym for 'typeface'. The font you're currently looking at is called Arial.

Key logger

Sometimes called a keystroke logger, key logger, or system monitor, it is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.

Root Kit

A rootkit is a collection of programs that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the network.

FTP

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.

Phishing

Phishing is email fraud where the perpetrator sends out legitimate-looking emails that appear to come from trustworthy web sites in an attempt to gather personal and financial information from the recipient.

Worm

A worm is a software program that uses computer networks and security flaws to create copies of itself. It replicates itself to new computers using the flaws and then begins scanning and replicating again.

Multi-purpose Internet Mail Extensions (MIME)

A standard that allows Internet users to exchange email messages enhanced with graphics, video, and voice as attachments to the body of the text.

Encryption

A way of coding the information in a file or email so that if it is read by a third party as it travels over a network it cannot be read. Only the persons sending and receiving the information have the key and this makes it unreadable to anyone except the intended persons.

Digital Subscriber Line (DSL)

A technology for bringing high-bandwidth information to homes and businesses over ordinary copper telephone lines.

Central Processing Unit (CPU)

A central processing unit (CPU), or often simply called a processor, is the component in a computer that interprets instructions and processes data contained in computer programs.

Internet Message Access Protocol (IMAP)

A method of accessing electronic mail that is kept on a mail server. It allows an email program to access remote message stores as if they were local. Email stored on an IMAP server can be accessed from a desktop computer at home, a workstation at the office, and a notebook computer while traveling, without the need to transfer messages or files back and forth between these computers.

Virus

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

Internet Protocol (IP) Address

A string of four numbers separated by periods (such as 192.168.211.100) used to represent a computer on the Internet.  Having an IP address allows a device to communicate with other devices over an IP-based network like the internet.

Internet Service Provider (ISP)

Internet Service Provider is an organization that provides services for accessing, using, or participating in the Internet. Internet service providers can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

Firewall

A system that prevents unauthorized access to or from a private network. Firewalls can be hardware or software, or a combination of both.

Random Access Memory (RAM)

The best-known form of computer memory. RAM is considered "Random Access" because you can access any memory cell directly. RAM is volatile memory -- its contents are lost as soon as power to the computer is turned off.

Web Portal

A web portal is a specially designed website that brings information from diverse sources, like emails, online forums, and search engines, together in a uniform way. Usually, each information source gets its dedicated area on the page for displaying information (a portlet); often, the user can configure which ones to display. 

Post Office Protocol (POP)

A set of rules by which a computer can retrieve electronic mail from a mail server. The POP server holds the email until the user can retrieve it. POP does not provide for sending email which is usually done via SMTP. POP3 can be used with or without SMTP.

Podcast

A pre-recorded audio program that is made available for download (manually or automatically) so people can listen to them on personal computers or mobile devices.

Read-Only Memory (ROM)

This memory holds all the basic instructions the computer needs to do very simple stuff, such as making the letter "X" appear on the monitor when you press the "X" key. This memory cannot be changed, so losing power does not affect it.

Broadband

According to the FCC, the definition of broadband internet is a minimum of 25 Mbps download and 3 Mbps upload speeds. Broadband provides high-speed internet access via multiple types of technologies including fiber optics, wireless, cable, DSL, and satellite.

Hard Drive/Hard Disk

A hard disk drive (sometimes abbreviated as a hard drive, HD, or HDD) is a non-volatile data storage device. It is usually installed internally in a computer, attached directly to the disk controller of the computer's motherboard.

Bandwidth

Bandwidth in computer networking refers to the data speed supported by a network connection. It is most often expressed in terms of bits per second (bps) or megabits per second (Mps). The term represents the total distance between the highest and lowest signals on the communication channel (band).

Adware

Any advertising software which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used.

SSD

A solid-state drive (SSD) is a solid-state storage device it is also sometimes called a solid-state device or a solid-state disk, even though SSDs lack the physical spinning disks and movable read-write heads used in hard drives ("HDD") or floppy disks.

Spyware

Computer software that collects personal information about users without their informed consent. The term is often used interchangeably with adware and malware. Personal information is secretly recorded with techniques such as logging keystrokes, recording browsing history, and scanning documents on the computer's hard disk. 

Blog

A blog (shortening of “weblog”) is an online journal or informational website displaying information in the reverse chronological order, with the latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject.

Just 4 Laughs

Random image