Geek Computer Logo
Geek Computer
Creating better technological experiences!

Search [11]

Let us help you find what you need using our site's search feature. Some content may be filtered for members only accessible only after signing in.
How computers work: why is the processor important?
We have prepared this article with the sole aim of informing you what a processor is, it's components and how they function together in transforming data and instructions into useful information. , A CPU or processor is an electronic circuit found ...

Author: Gloria Mutuku

Which Windows Computer is Best?
When you are in the market for a new computer, you will likely be debating whether to purchase a Mac or a Windows computer. However, this is not the end of the deliberating process; if you opt for a Windows computer, you will need to choose from a br...

Author: collinsokothwriter

Optimizing RAM with Multi-Channel Support
Nearly all computing devices require working memory to function properly. Take a look at your favorite device. Whether it's your TV, smartphone, or perhaps even your calculator, chances are it has its own memory module to store temporary data. Your c...

Author: Emman Jemuel

What is Memory in a Computer
Computer memory can be defined as a physical device to store information either temporarily or permanently in a computer. Computer memory is a generic term used to describe all the different forms of technology that a computer may use. These forms of...

Author: collinsokothwriter

How To Clear Your Cache
If you've ever struggled to access specific websites or failed to load an image on a webpage, no matter how many times you hit refresh, you've probably been advised to “clear your cache.” In fact, the only phrase more common in the world of IT and te...

Author: Trey Williams

What Happens When a Site I Use Gets Hacked?
In the Internet’s virtual world, security is very confusing as compared to the real world. Security is messy; difficult to develop and sustain. As much as the Internet is built around a system of protocols, these rules can often be ignored.    When...

Author: Ian

What are Proxy Server Ports?
Proxy servers are dedicated software systems that run on a computer and are intermediaries between two endpoint devices. These endpoint devices are usually a personal computer and a server. A server is a central computer from which other computers (c...

Author: collinsokothwriter

I Can't Open Email Attachments
Email attachments are the files you receive alongside your email messages. The files come in different formats. The most common and widely used are the .pdf, .doc, .zip, or .html.  There are various other forms, and each requires specific computer p...

Author: Njuguna Eunice

What are the F1 through F12 keys?
The F Keys have always remained a mystery to many regular computer users. The truth is, several basic computer tasks can be achieved without using these F Keys. However, for a relatively experienced or advanced computer user, these F keys become esse...

Author: collinsokothwriter

Computer Tips: How to make my computer run like new?
Do you wish your computer could look and run like the first day you bought it? The first day your computer was booting at a super speed, but in time, it’s so slow down. I  will share a few things I picked up to make your computer run like a new one. ...

Author: Faith Cheruiyot

How do I get rid of low disk space in Windows 10?
Low disk space warning appears on Windows operating system to warn the user that a specific location of the hard drive is low on storage space. This type of error is persistent and will keep reappearing until you work on it. There are generally thre...