Berikut Mitos Keliru Tentang Teknologi Yang Masih Kita Dengar Sampai Sekarang - Info Solution

Berikut Mitos Keliru Tentang Teknologi Yang Masih Kita Dengar Sampai Sekarang

Young happy smiling businesswoman holding laptop isolated Free Photo

Kalian mungkin masih mendengar mitos-mitos tentang teknologi yang dipercaya oleh orang-orang, seperti menonton televisi terlalu dekat dapat meyebabkan mata rusak. Mari kita lihat-lihat lagi apa saja mitos yang sering dipercaya oleh orang lain atau mengkin anda juga mempercayainya.

Dunia kita yang sudah sangat maju ini tidak hanya melahirkan teknologi-teknologi tercanggih, tapi juga mitos-mitos yang melekat dengan teknologi tersebut. Masih banyak broadcast-broadcast disebarkan di Whatsapp yang sangat diragukan kebenarannya.

Mulai dari radiasi ponsel yang dapat menyebabkan kanker, sampai invasi alien yang datang dengan kapal luar angkasanya. Biasanya generasi yang lebih tua lah yang sering termakan mitos-mitos tersebut.

Berikut adalah beberapa mitos tentang teknologi lainnya yang juga masih kita dengar sampai sekarang:

1. Mengisi ulang ponsel semalaman dapat merusak baterai

Seberapa sering kamu mendengar nasihat untuk tidak meninggalkan ponselmu dalam keadaan tersambung dengan charger semalaman? Jika kamu masih percaya dengan hal tersebut, maka sekarang lah saatnya untuk berhenti.
Saat ini kita sudah sampai pada era teknologi di mana telepon pintar yang kita punya dapat melakukan banyak hal. Ponsel yang kita miliki dapat memperlambat laju pengisian ulang ketika baterai hampir terisi penuh 100 persen.

Power bank and mobile phone on gray desk
Power bank and mobile phone on gray desk

Hal tersebut membuat ponsel tidak akan mengalami kelebihan daya dan menjadi bocor seperti yang orang-orang pikirkan. Silakan mengisi ulang ponselmu selama yang kamu mau, hal tersebut tidak akan menghancurkan baterai.

2. Duduk terlalu dekat dengan televisi dapat merusak mata

Hal ini benar jika televisi di rumahmu adalah televisi zaman dahulu yang diproduksi tahun 50 atau 60an. Televisi tersebut masih berbentuk kotak, besar, dan berat. Mitos bahwa duduk terlalu dekat dengan televisi berbahaya karena adanya sinar-X yang dipancarkan dari layar.

Guy from back watching television Free Photo
Guy from back watching television Free Photo

Namun, televisi modern yang kita miliki saat ini hanya mengeluarkan sedikit gelombang bahkan tidak sama sekali mengeluarkan gelombang yang dapat merusak matamu. Tapi jangan jadikan ini alasan untuk terus-terusan menonton televisi, ya.

 

 

 

3. Macbook tidak bisa terinfeksi virus

Mitos ini adalah cerita yang paling sering dibangga-banggakan oleh para pengguna Macbook dan Apple. Mereka senang karena akhirnya tidak lagi harus berurusan dengan virus yang dapat merusak laptop mereka.
Sayangnya, hal tersebut tidaklah benar. Meskipun tidak sebanyak virus yang menyerang laptop Windows, ternyata tetap ada virus yang dapat menyerang MacBook.

Desktop devices imac Premium Photo
Responsive mockup screen. Monitor, laptop, tablet, phone with blank screen on table in desktop office. 3d rendering.

Perlu otak yang cemerlang untuk mendesain MacBook, namun ada otak yang juga tidak kalah cemerlang yang dapat mencuri datamu ketika kamu mendownload sesuatu meskipun menggunakan MacBook.
Jadi untuk pengguna MacBook, tetaplah berhati-hati ketika mengunjungi website-website yang tidak jelas asal-usulnya. Apple memang bisa melakukan banyak hal, tapi 100 persen mencegah virus masuk ke programnya bukanlah salah satunya.

4. Modus Incognito dapat menyembunyikan history internet

Modus Incognito adalah temuan besar yang dapat membantu kita menjaga privacy dalam menggunakan internet. Terutama ketika kita harus berbagi komputer dengan teman atau keluarga.
Banyak hal yang ingin kita sembunyikan mulai dari informasi bank untuk belanja online, situs pornografi, sampai pencarian hadiah kejutan untuk pasangan. Berselancarlah dengan menggunakan Incognito, maka semua data akan hilang ketika jendela ditutup.

Elegant woman with a laptop listening to music Free Photo
Young business woman using phone in coffee shop. Successful business woman. Business infographic. Elegant woman with a laptop listening to music Free Photo

Namun masih ada satu masalah yang tidak kamu ketahui. Meskipun data tersebut hilang dari komputer yang kita gunakan, situs yang kamu kunjungi masih menyimpan data yang kamu berikan.
Sayangnya, para hacker masih dapat mengakses informasi tersebut. Jika pasanganmu ingin tau apa yang kamu lihat lewat komputer pada malam hari, secara teknis ia dapat melakukannya dengan bertanya kepada provider internetmu.

5. Laptop harus di-shutdown setiap malam

Siapa yang suka malas meng-shutdown komputer dan hanya membiarkannya tertidur saja? Meng-shutdown laptop setelah digunakan seringlah dianggap lebih baik. Alasannya tentu saja untuk menjaga agar laptop dapat beristirahat dan tidak terus-terusan bekerja.

Side view of woman holding laptop and pointing at it with copy space Free Photo
Side view of woman holding laptop and pointing at it with copy space Free Photo

Namun, sama seperti gadget yang lain, laptop juga memiliki sistem yang dapat mencegahnya menggunakan terlalu banyak energi. Jadi jangan khawatir jika laptopmu tidak di-shutdown semalaman

Sumber: kaskus.co.id

You May Also Like

About the Author: admin

I have had teaching experience in electronics and computer labs for 4 years as an instructor in basic electronics labs, digital system labs, microprocessor labs, lab interfaces, and embedded system labs. In addition, I also have work experience as an IT for 3 years in the financial industry, where my duties are to work on all computer installations (hardware and software), create networks, create proxies on routers, restrict data storage to USB, do server installation, creating virtual machines, creating active directories and file sharing. In addition, sometimes I am also assigned in the fields of multimedia and graphic designs on banners, business cards, ID cards, brochures, company profile videos, managing company websites, Facebook, Instagram, Twitter and YouTube. 1. Install on a Server Computer or user. 2. Perform regular backups on PC servers or users. 3. Create virtual machines, active directories and file sharing on the server. 4. Creating a network: - server installation - router configuration - switch configuration - install servers, switches, routers and firewalls on the server rack - setting the ISP IP address and Local address - check network from server to user 5. Mikrotik Configuration - Reset or delete default configuration - Client Configuration - Create User List - Local Interface Configuration on the Router - Create Firewall Rule - Create the Bandwidth of Each IP - NTP & Clock Configuration 6. Perform mainternance on the computer in the event of a system error or hardware and reinstallation. 7. Upgrading the Desktop PC: - RAM upgrade - ROM upgrade - VGA upgrade - processor upgrade - Upgrade processor fan - make 2 or 3 monitors - make 2 CPU 1 monitors 8. System settings on each PC: - VPN access - Server access - Access dynamic systems - Access data from the exchange (S-Invest and IQ +) using JTPM (integrated capital market network) 9. Setting and Sharing Data printer or USB. 10. Designing websites and social media companies. 11. Support users to resolve technical issues related to their desktops, laptops, tablets, phones, printer, network connectivity, Scanner and IP Phone. 12. Hardware & software maintenance (e.g. Replace Printer Drum/Toner, Apply Software Update, Installation Operating Sistem). 13. Assist and communicate to user via email, chat, phone and on-site. 14. Manage IT inventory and record. 15. Manage users email, chat and share folder accounts.

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *

The Following Are Myths About Technology That We Still Hear Until Now

Young happy smiling businesswoman holding laptop isolated Free Photo

You may still hear myths about technology that are trusted by people, such as watching television too closely can cause eye damage. Let’s look again at the myths that are often believed by others or may you also believe it.

Our highly developed world has not only given birth to the most advanced technologies, but also the myths inherent in these technologies. There are still many broadcasts distributed on Whatsapp that are very doubtful.

Ranging from cell phone radiation that can cause cancer, to the invasion of aliens that come with spaceships. Usually the older generation is often consumed by these myths.

Here are some myths about other technologies that we still hear today:

1. Charging the cellphone overnight can damage the battery

How often do you hear advice not to leave your cellphone in a state connected to a charger overnight? If you still believe in that, then now is the time to stop.
Now we have reached the era of technology where our smart phones can do many things. The cellphones we have can slow the rate of recharging when the battery is almost 100 percent fully charged.

Power bank and mobile phone on gray desk
Power bank and mobile phone on gray desk

This makes the cell phone will not experience excess power and become leaking as people think. Please recharge your cellphone for as long as you want, it won’t destroy the battery.

2. Sitting too close to the television can damage the eyes

This is true if the television in your house is an old-fashioned television produced in the 50s or 60s. The television is still boxy, large, and heavy. The myth that sitting too close to the television is dangerous because of the X-rays emitted from the screen.

Guy from back watching television Free Photo
Guy from back watching television Free Photo

However, the modern television that we have today only emits a few waves and doesn’t even emit waves that can damage your eyes. But don’t make this a reason to keep watching television.

 

 

 

3. Macbook can not be infected with a virus

This myth is the story most often proud of by Macbook and Apple users. They are happy because they no longer have to deal with viruses that can damage their laptops.
Unfortunately, this is not true. Although not as many viruses that attack Windows laptops, it turns out there are still viruses that can attack the MacBook.

Desktop devices imac Premium Photo
Responsive mockup screen. Monitor, laptop, tablet, phone with blank screen on table in desktop office. 3d rendering.

It takes a brilliant brain to design a MacBook, but there is a brain that is no less brilliant that can steal your data when you download something even if you use a MacBook.
So for MacBook users, be careful when visiting websites whose origins are unclear. Apple can do many things, but 100 percent of preventing viruses from entering the program is not one of them.

4. Incognito mode can hide internet history

Incognito mode is a great finding that can help us maintain privacy in using the internet. Especially when we have to share computers with friends or family.
Many things we want to hide ranging from bank information for online shopping, pornography sites, to finding a surprise gift for a partner. Surf using Incognito, then all data will be lost when the window is closed.

Elegant woman with a laptop listening to music Free Photo
Young business woman using phone in coffee shop. Successful business woman. Business infographic. Elegant woman with a laptop listening to music Free Photo

But there is still one problem that you don’t know about. Even though the data is missing from the computer that we use, the site that you visit still stores the data that you provide.
Unfortunately, hackers can still access this information. If your partner wants to know what you see on the computer at night, technically he can do it by asking your internet provider.

5. The laptop must be shut down every night

Who likes to lazily shutdown a computer and just let it go to sleep? Shutting down the laptop after use is often considered better. The reason is of course to keep the laptop able to rest and not keep working.

Side view of woman holding laptop and pointing at it with copy space Free Photo
Side view of woman holding laptop and pointing at it with copy space Free Photo

However, just like other gadgets, laptops also have a system that can prevent it from using too much energy. So don’t worry if your laptop isn’t shutdown overnight

Source: kaskus.co.id

You May Also Like

About the Author: admin

I have had teaching experience in electronics and computer labs for 4 years as an instructor in basic electronics labs, digital system labs, microprocessor labs, lab interfaces, and embedded system labs. In addition, I also have work experience as an IT for 3 years in the financial industry, where my duties are to work on all computer installations (hardware and software), create networks, create proxies on routers, restrict data storage to USB, do server installation, creating virtual machines, creating active directories and file sharing. In addition, sometimes I am also assigned in the fields of multimedia and graphic designs on banners, business cards, ID cards, brochures, company profile videos, managing company websites, Facebook, Instagram, Twitter and YouTube. 1. Install on a Server Computer or user. 2. Perform regular backups on PC servers or users. 3. Create virtual machines, active directories and file sharing on the server. 4. Creating a network: - server installation - router configuration - switch configuration - install servers, switches, routers and firewalls on the server rack - setting the ISP IP address and Local address - check network from server to user 5. Mikrotik Configuration - Reset or delete default configuration - Client Configuration - Create User List - Local Interface Configuration on the Router - Create Firewall Rule - Create the Bandwidth of Each IP - NTP & Clock Configuration 6. Perform mainternance on the computer in the event of a system error or hardware and reinstallation. 7. Upgrading the Desktop PC: - RAM upgrade - ROM upgrade - VGA upgrade - processor upgrade - Upgrade processor fan - make 2 or 3 monitors - make 2 CPU 1 monitors 8. System settings on each PC: - VPN access - Server access - Access dynamic systems - Access data from the exchange (S-Invest and IQ +) using JTPM (integrated capital market network) 9. Setting and Sharing Data printer or USB. 10. Designing websites and social media companies. 11. Support users to resolve technical issues related to their desktops, laptops, tablets, phones, printer, network connectivity, Scanner and IP Phone. 12. Hardware & software maintenance (e.g. Replace Printer Drum/Toner, Apply Software Update, Installation Operating Sistem). 13. Assist and communicate to user via email, chat, phone and on-site. 14. Manage IT inventory and record. 15. Manage users email, chat and share folder accounts.

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *