![]() On Instagram, you can use up to 30 to help improve your standings. Hashtag: The # character (called an octothorpe) combined with a word or phrase that concisely defined a conversation, post, tweet, or image into a category, intended to make it easier for people to find by searching on the term associated with the hashtag. Popularized by Snapchat, flower headbands and dog ears are now able to be superimposed on our faces for a laugh.ġ3. Today, filters consist of animated masks, hats, rainbow tongues and more. Filter: In the beginning, a filter was an overlay of a photo that would alter lighting and coloring to improve the picture. ![]() Here are some common ones that you can use to impress your friends.ġ2. If there’s a way to shorten a phrase, we’ll take it. Social media is probably the place full of the most tech vocabulary. TWAIN: a standard for hardware interoperability, this was originally a type of technology without an interesting name, until someone was inspired by Rudyard Kipling to borrow from the Ballad of East and West, since it seemed that “…never the twain shall meet.” Social media You can even buy mice that look like mice.ġ1. Mouse: what else could you expect Doug Englebart and Bill English to call their small device with a tail coming out of it, an X-Y position indicator? Fortunately their word for the cursor, bug, didn’t catch on like their invention the mouse. No one knows for sure what Intel engineer Jim Kardach was really thinking when he came up with this codename, but it’s so much cooler than calling it Personal Area Network (PAN) that we’re glad the name stuck.ġ0. Bluetooth-named for the Dread Pirate Roberts, ehm, the Dread King Bluetooth of Scandinavia, whose real name was Harald Gormsson. PC hardware has some funny names that we just take for granted, but they had to come from somewhere.ĩ. Beware of any links from suspicious emails. Short for password fishing, this is a fraudulent practice where private data is captured from attempting to get you to enter in your personal information. Phishing: When you see a link in your email to download an attachment from an unknown sender, it is possible you are a target for phishing. I prefer to give credit to another Monty Python fan.Ĩ. Some say it’s because you can liken email to ham, and not important email (junk and adverts) as spam, which is not really purely ham. ![]() Spam: We may never have the absolute and authoritative explanation of why junk email is called spam. that are used to convey tone or emotion in written conversations.ħ. Emoji: another word for emoticon, it’s those little smiley faces, frowning faces, tables, etc. Terms from emailĮveryone these days uses email, and there are plenty of voters and taxpayers who have never known a world without email, but there are some terms that still cause non-techies to think you’re just making things up, or who have no idea why something is called what it is.Ħ. Word: 16 bits of data used to represent a discrete piece of data. Byte: eight bits strung together to represent a specific value such as a letter or a digit.ĥ. Bit: a single binary piece of data, either a 0 or a 1.Ģ. The first, smallest piece seems like it was self-evident, and the rest naturally follow.ġ. Pieces of dataĬomputer scientists had to come up with terms to define units of data. PS: this is an updated post which was originally published 2 years ago. Every culture and trade has its own secret language known only to the initiates, but in today’s post we’re going to look at 57 of the oddest/strangest/most obscure terms we use in what, to us, is everyday language. Sometimes, we don’t even realize we’re doing it until a “normal” looks at us like we’re speaking in tongues, which, in fact, we are. We have what must appear to the uninitiated as mystical powers, typing at the command line looks like programming, many of the icons in modern operating systems resemble ancient runes or glyphs, and we oft-times speak in our own secret language. Most people who do not work in IT do not “get” IT.
0 Comments
Leave a Reply. |