We often talk about the contemporary aspects of technology and how it has contributed towards changing the global era of modern computing. That much part is not just inevitable but also completely visible from the naked eye. However, behind the cliche of technological revolution, it is surprising to know that many of the computer terminologies and gadgets that you hear about these days are not as new as you think they are.
You may like to read:
Confused? Don't be. I have compiled a list of such items that are older then you think. You will be surprise to read about them.
7) Computer Virus
The first computer virus was known as ‘Creeper’ and it was developed in 1971. It infected the ARPANET, predecessor of the internet. The virus was developed for the computers running TENEX operating systems and would display the message ‘I’m the creeper: catch me if you can’ on the affected computers. As for the first anti-virus, that would be Reaper and it brought the Creeper down.
6) Text Speak
Im sur u wud be familiar wd dis typ of writng formt. Wel, dis is knwn as Text Speak. I first came across such writing style on text messages on cellphone. People write short words like these on text messages as it is relatively convenient and faster to write on cell phone.
5) SpamDo you have an e-mail account? If yes, then you know what spam mails are. And if No, you don’t have an e-mail account. So that means spams introduced when e-mail services were launched? Well, No. we don’t just have E-mails in this world, there are many sorts of Mails that we have.
4) Tabbed Browser
But why ‘G’ of all letters? Because Google owns it? NO. From 1995 to 2004, the web address was owned by the company Garfield for its Garfield Mail Service. And ‘Garfield’ is where the G comes from. Meaning if you searched for Gmail before 2004, you would have gotten Garfield mail, but later on, that turned to Google Mail.
2) DDOS AttacksDDOS (Distributed Denial of Service) attack is a form of attack that targets web servers. This is that one type of attack a web server can’t simply handle. The basic procedure is to ‘flood’ the website with so much traffic that it overloads the server and it crashes. The DDOS attacks have been used over many notable websites like that of US Department of Justice, MPAA, etc.
1) Social Media
You may like to read: