Did you receive any high tech holiday gifts? Did you have to study the manual before you could use it?
Years ago, parents would spend late hours assembling toys from Santa but today computers and cell phones require the most effort from gift givers. Did you purchase the correct phone? There are a lot of choices but the biggest phones in demand are the iPhones and Samsung Galaxies. Did you get the correct iPhone? Did you want an iPhone 7, 7 Plus, 6, or 6 Plus? Did you research the differences between the iPhones?
Have you ever sent had an email but it never reached its destination? Have you ever had a friend call you to ask, “Did you get my email?”. If you did receive it, you don’t have to worry about getting caught in a lie since email has become less reliable due to the amount of spam on the Internet.
Do you know where your files are?
Years ago, there was a public information broadcast on late night television, “Do you know where your children are?”. Children should be home and in bed in late night hours. Most kids are responsible but there are a small group that trouble seems to follow. An appropriate question today should be, “Do you know where your files are?”.
Is that a virus on your computer?
How do you know that your computer has been infected with a virus or other malware? Is your computer slower than the day that you first turned it on? Do you have a reliable virus scanner? All anti-malware programs are not the same. Is your anti-malware up to the task?
Why isn’t my email being sent or received?
Email not being sent or received is a common complaint. You might think that sending and receiving email is a simple item that is under your control but there are a lot of things beyond your control that can affect delivery of your email.
Consider what happens when you send an email. You spend your time to compose the perfect email but it is never received by the recipient. What happened? You won’t know that your email wasn’t delivered unless you contact your intended recipient to confirm delivery but most of the time, you will receive an email to notify you of a failed sent email.
Have you ever wondered how your personal information could become acquired by identity thieves? If your identity has been stolen, it most likely was taken from an organization that collected your information but didn’t protect it properly. You probably didn’t do anything wrong but one of the organizations that lists you as a member was careless with your information.
Do you use google to help you find things? Are you aware that google places the order of things that you search in a specific order? Google doesn’t check the reputation of businesses that it lists.
I had been contemplating how to retire my trusty, old friend, a 2004 Subaru Forester with 222,000 miles. A check engine light that indicated a catalytic converter problem would make selling it a bit difficult. Did it make sense to spend more than the car was worth to fix it? Why not donate it? I would get a deduction on my taxes and a charity would get a donation.
“A major company was hacked….”
This has been a common news story over the last few years but last week a major attack occurred. The problem with most of these attacks is that the majority of the public doesn’t understand the issue. The average person tends to make the problem into a “bogey man” story. The current hack in the news was nothing new. This particular hack has been going on for years.
Don’t forget, your cell phone is a computer.
Have you ever been to a public place and noticed unattended cell phones? While you may respect your neighbor’s property, everyone doesn’t have that same respect. Thieves will pick up unattended cell phones but cell phones theft has been reduced. Cell phones can be blacklisted and unable to be activated on many service providers. A cell phone may also allow the rightful owner to track its location. Imagine the look on a cell phone thief’s face when the police knock on their door. Stealing cell phones is not a good idea.