Top Tech Myths

Tech myths can be difficult to disprove but these technology myths will uncover more of the truth behind technology advancement and capabilities. Look around and you will found yourself surrounded with gadgets. So much that first thing in the morning you probably look at in the morning is a gadget. It’s a tad ironic that despite gadgets – especially smartphones – have become an all-consuming device for us, most of us remain unaware about what goes inside them.

Most of us just want our technology to work when we need it, and when we have problems with it, we don’t dive into the details of how it runs — we just want it fixed. So it’s natural that we fall for the most convenient suggestions for resolving issues or getting the most life out of our gear. Unfortunately, some of those premises are false, and they can do more harm than good — and may even damage the device permanently.

1 Jailbreaking and Rooting are Illegal

Smartphone owners can jailbreak or root their devices (Android as well as iOS device) to get around the restrictions of manufactures. But is this ominous-sounding practice legal? The word itself jailbreaking makes it sound like the process is illegal.

So, the million-dollar question is “is jailbreak or root illegal ?” The short answer is: No, It is not illegal. Jailbreaking officially became legal in 2012 when the Library of Congress made an exemption to the Digital Millennium Copyright Act, allowing users to jailbreak their iPhones. However, iPads didn’t become legal to jailbreak until a couple of months ago, surprisingly.
This means that if you’ve been jailbreaking your iPad for years now, you were technically committing a crime.
Again, jailbreaking can be seen as mostly harmless, but there are some things you can do with it that allow you to actually break the law, like not paying for a paid service, but getting it for free. For instance, a jailbreak app called Flex 2 allows you to get RunKeeper Go features for free, which is a service that normally costs $10 per month.

2The more megapixels your camera has, the better the picture

The majority of peoples firmly believing in this tech myth. In reality, a camera’s megapixels do not necessarily correlate to the quality of the picture, according to the report. Quality is actually more dependent on your smartphone’s lens and sensor. So even if you have a lot of megapixels, your pictures may still come out poor because of a bad lens, the report added.

Under typical lighting conditions, a camera with a 6 or 8-megapixel sensor might provide better photos than a camera with an 18-megapixel sensor. If you’re just posting photos online, almost any camera will work fine. For higher quality photos, select a camera with a large sensor and a high pixel count.

3More bars on your mobile phone mean better service

Most of us believe in this tech myth. But in reality, the bars only indicated the strength of the signal, not the quality of available strength. If many people in the same cell are calling, texting, going online or gaming, service may be intermittent, slow or even unavailable. You may have experienced this at an athletic event or at the mall, where there may be plenty of signals but a lot of people on their phones. And if you have teenagers in the house, you can expect to have terrible service no matter how many bars you have.

4Charging a cell phone overnight can ruin the battery

Over half (52%) of respondents said they still believe this tech myth. But this tech myth is not totally untrue but it is outdated. Modern smartphones are advance enough to stop the charging when the battery is full (to avoid the overcharging). Old school cell phones did use to be affected by overnight charging, possibly resulting in their overheating or degrading life cycle, the report says. But with new smartphones, this information is debunked.
Therefore, there’s no real risk of damaging the battery when you keep it plugged in after a 100% charge. But even when the battery is fully charged, the charger will draw a small amount of current. Therefore, unplugging the phone when it’s fully charge will save a bit of money. This also applies to all electronic equipment with rechargeable batteries or an “instant-on” feature.

5Private/Incognito browsing mode keeps your computer or mobile activity anonymous

If you’ve ever tried to be anonymous on the internet or tried to hide browsing history, you may have used a privacy option on your browser. These may have the various name (InPrivate, Private Browsing, Incognito or Private Tab), but they all provide the pretty much the same functionality i.e. to keep the browsing history off your computer. While these privacy tools might keep others with access to your computer (spouse, office mates, friends, and kids) from seeing where you have surfed, they don’t prevent your Internet Service Provider or the sites you visit from tracking you.

6You shouldn’t use 3rd party chargers on your phone or tablet

According to this tech myth, using a 3rd party charger may damage your phone, laptop, or tablet. There can be two issues here. First, the third-party charger may have less power than the charger comes with the phone, laptop, or tablet and hence third-party charger may charge your device slowly. the second issue here is the quality of the charger. Original equipment are made by reputed companies and they test their devices very intensively and there are fewer chances of failure of the devices. But third party devices (chargers) are made by unknow companies, they are poorly designed and have a higher risk of failure. And these low-quality components can fail permanently or even cause a fire.

7Computers must be shut down every night for them to work properly

You will save power if you shut down your computer when it’s not being used. You will also keep the cooling fan from sucking in still more dust. Another advantage is that rebooting your computer each morning will often remove annoying problems you may have noticed. But while there are benefits to shutting down your computer every night, it’s not absolutely necessary. Switching a computer on and off subjects its power supply and hard drive (assuming it’s a rotating platter) to stress. Leave your computer on, and it’s available for instant use. A good compromise that will save power is to simply set the monitor to switch off when the computer has not been used for 10 minutes or so. You can save a bit more power by setting the computer to sleep or hibernate when it hasn’t been used for a while. If your computer begins to slow down or become erratic, rebooting it might return it to normal operation. If not, it’s time for a malware scan.

8Macs can’t get viruses

Many of us believe in this tech myth that Macs cannot get viruses, which is patently false, the report found. While Macs don’t get viruses as often as PCs, they are absolutely still vulnerable.

9Airport X-ray machines can wipe the memory of a phone or laptop

The x-ray machines at airport security checkpoints can blur and ruin unprocessed film from non-digital cameras, especially film in checked baggage. But your memory cards are safe, at least at the level of x-ray emitted at checkpoints. Sandisk, a major flash card manufacturer, provides this assurance on its website. So airport security checks should pose no threat to your memory cards unless they’re laced with C4 explosives or Ebola.

10Password protected networks are safe from hackers

No network can be assumed to be totally protected from hackers and their amazing variety of code-cracking tools. Even carefully composed passwords can be eventually cracked. If you use a hard-wired office network, assume that anyone on the network can potentially see anything on your computer. This is even truer for wifi networks. Wifi has become so ubiquitous that people routinely access the Web and their email in airports, hotels, restaurants, and even planes and trains, all of which can be penetrated by a dedicated hacker. You can improve your protection by encrypting what’s on your computer and by using very strong passwords with upper and lower case letters and a variety of symbols, none of which should resemble a word. But the only way to completely protect bank account, bank and Social Security numbers is to never enter them online. Also, keep in mind that some hacks can block access to your computer. That’s a good reason to keep a backup copy of everything on a removable drive kept tucked away in a separate location. While you can also back up to a cloud site, should that site go down or be hacked, you will still have your removable drive.

Shashank Tiwari

Shashank Tiwari is a writer from India and the Tech Explained editor. In his free time he dabbles in fiction, photography, and game development.

Leave a Reply

avatar
  Subscribe  
Notify of