BNMC Blog

Tackling Five of Tech’s Biggest Myths

Tackling Five of Tech’s Biggest Myths

With the use of computers and mobile devices becoming persistent in the culture, there have been some myths conjured up by people that have become just as incessant. These lead to people getting the wrong idea about situations with their IT; and, ultimately believe things that are going wrong, when nothing can be further from the truth. Today, we’ve picked five such scenarios we feel need to be debunked.

Myth #1 - The more RAM you have the faster your PC will go.

RAM, or random-access memory, is thought to make any system run quicker. This isn’t the case. RAM is nothing more than a super-fast temporary storage space where your active programs are called from. By increasing your RAM, you will only help open more programs at the same time. That’s not to say that RAM isn’t important, as sometimes you need to run a lot of programs at once. When your system doesn’t run smoothly, and you add more RAM to it, it may begin to run better, but that is contingent on the commands you give the computer and the intensiveness of the software.

Myth #2 - You need to click on “Safely remove USB” button on your taskbar.

Our next myth is that if you don’t click on the “Safely remove USB” button that appears on your taskbar, and you remove a USB drive, you run the risk of corrupting the data and any changes written to the disk won’t be saved. The truth is that if you are not reading or writing data to the disk, there is no problem with simply pulling it out of the USB. The virtual button only ensures that the OS is not sending or receiving data to the drive, but most times you’ll know.

Myth #3 - Don’t use your smartphone while it is charging.

The next myth is one that we’ve heard time and again, especially after the Samsung Galaxy Note 7 snafu where devices were catching fire. All smartphones use lithium-ion batteries that have a very small chance to explode. Furthermore, the process of using the phone and charging the phone has not traditionally led to explosion. Skeptics cite that phones warm up more than usual when they are charging. If you are dealing with a phone that is hot to the touch (and isn’t running graphic-intensive applications) chances are you need to replace your charger or your phone, because its battery is shot.

Myth #4 - You should only use your phone manufacturer’s charger.

The lead in for this myth comes from the last one. If you don’t use the phone manufacturer’s charger you risk ruining its battery or having the phone explode. This is patently false. You can obviously use other chargers to charge your phone. It may not charge as fast, but as long as you use a well-made charger with the same specs there is no reason to think that the device will be harmed by using chargers not made by the manufacturer of the phone. Avoid cheap and poorly made charging hardware, and you and your phone should be just fine.

Myth #5 - Using a private browser will keep you hidden.

Occasionally, you’ll come across a person that seems to think that the private browsing function that all major browsers have, was made to ensure that no one can track their browsing history. Of course, written on the browser window is a message that says the inverse is true. The private browsing action will only erase locally saved data. Any external source can still track your activity. If you want a secure and private viewing experience, you will need a Virtual Private Network.

Do you have any myths you’d like us to debunk? Leave your thoughts in the comments section below and return to our blog for more great technology information.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 22 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Email User Tips Privacy Computer Microsoft Malware Productivity Network Security Hackers Google Software Hosted Solutions Business Communication Data Hardware Tech Term Mobile Devices IT Services Ransomware Efficiency Internet Small Business IT Support Cloud Computing Backup Data Recovery Smartphone Managed IT Services Outsourced IT Android Innovation Workplace Tips Saving Money Upgrade Windows Users Social Media Business Continuity Miscellaneous Information Office 365 Managed IT Services Smartphones Microsoft Office Data Backup Mobile Device Data Management Business Management Windows 10 Windows 10 Internet of Things Browser Server Phishing Remote Monitoring App communications Word Passwords Gmail Productivity Facebook Cybersecurity Vulnerability Managed Service Infrastructure Disaster Recovery Encryption VoIP Artificial Intelligence Chrome Network Gadgets Save Money VPN Website Virtual Reality Apps Analytics Tip of the week BYOD Managed Service Provider Employer-Employee Relationship Applications IT Support Money Paperless Office YouTube Robot Employee-Employer Relationship Access Control Google Drive Risk Management Automation Company Culture IT Management Bandwidth Unified Threat Management Content Filtering Office Tips Quick Tips Education Apple Maintenance Storage Government Development Big Data Hacker Data storage Settings Display Antivirus Router Bring Your Own Device Operating System Monitors Search WiFi Business Intelligence Vendor Management Networking Chromebook Social LiFi Hosted Solution Data Security Administration End of Support Server Management Data loss OneNote Business Technology Mouse Touchscreen Augmented Reality Virtual Private Network Telephone Systems MSP desktop Managing Stress Tablet Laptop SaaS The Internet of Things Collaboration Firewall Printing Computers Virtualization Document Management Holiday Two-factor Authentication HIPAA Downtime Avoiding Downtime Solid State Drive Retail Alert Wireless Managed IT Service Mobile Security Scam Hard Disk Drive Outlook Spam Computing Hotspot Internet Exlporer Scalability Black Friday Compliance Virus Halloween Tech Support Dell Servers Google Calendar WannaCry IT Technicians Optimization Updates Emergency Cabling Connectivity Budget Managed Services Utility Computing Network Management Staff Typing Leominster Humor Mixed Reality Social Engineering Google Maps Dark Web Modem Information Technology FinTech Device Reducing Cost Language Best Practice Value Migration Cyber Monday Regulations Current Events LED Threats Scary Stories Websites Legislation Mirgation Recycling PowerPoint Running Cable IoT Laptops Remote Workers SharePoint Cryptocurrency K-12 Schools Data Breach Safety Microsoft Excel Cookies Mobility Batteries Buisness Techology Computing Infrastructure Professional Services Google Docs Windows 7 Virtual Desktop Remote Computing Managed IT Digital Payment Smart Technology IT solutions Social Networking Going Green Co-Managed IT Sports Software as a Service Managed Services Provider Network Congestion Statistics Digital Chatbots Hacks eWaste Onboarding GDPR How To Lenovo Disaster Star Wars Downloads Wearable Technology Bitcoin Network upgrade Slack Hard Disk Drives Mail Merge Blockchain Nanotechnology Google Wallet Print Toner Myths Wi-Fi VoIP Unified Threat Management Alerts Business Growth USB Messaging Writing Shortcut Distributed Denial of Service Motherboard Cables Content Huawei Legal Entertainment Vendor Bluetooth Comparison Spyware Identity Password Continuity Digital Signage Data Warehouse Firefox Superfish Uninterrupted Power Supply Fraud Cost Management Dark Data Update Computer Care IBM Windows 8 Smart Office Monitoring Solid State Drives Cybercrime File Sharing Address Permissions Unified Communications Screen Reader Drones Charging Shortcuts Mobile Management User Error Licensing Dongle Employee-Employer Relationships Patch Management BDR Wires Streaming Processor Marketing Deep Learning Assessment iOS Identity Theft Specifications Mobile Device Management Solar Troubleshooting Business Analysis Politics Customer Relationship Management Customer Service Heating/Cooling Training Multi-Factor Security Corporate Profile Work Spying National Security Smart Tech Security Cameras Profiles Private Cloud Time Management G Suite Printer Cooperation Alt Codes Service Level Agreement Analysis Students Office Samsung Automobile Break Fix Voice over Internet Protocol Human Error Memory Black Market Supercomputer CrashOverride Mobile Computing Printers Staffing Law Enforcement Motion Sickness Electronic Medical Records Taxes Notifications Administrator what was your? Twitter IT Budget Physical Security Web Server Emoji GPS Upgrades Gadget IT Consultant Crowdsourcing Botnet Cameras Financial Personal Information Cortana Tracking 3D Printing Meetings Cleaning Machine Learning CCTV Processors Unsupported Software Webcam Computer Repair Relocation Error Mobile Data Point of Sale Ben McDonald shares Recovery How To Work/Life Balance Travel Regulation Health

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3