MERIT Solutions Blog

Getting to Know Technology: Link

Getting to Know Technology: Link

Navigation is important for any computing system--particularly the Internet, where there are countless destinations. The Internet is comprised of various web pages, images, videos, and many other valuable little bits of content that are all connected by a web of links. These links are the cornerstone of the Internet, and we’ll explain the details of how they work and what they are.

Links are often called hyperlinks, and they are calls to specific information that can be discovered by clicking on them with a mouse or tapping them with your finger on a touchscreen. Even if it doesn’t look like it, buttons and other on-screen elements often have a link contained within them so they can be connected to certain information.

Links can be used to provide a direct path to specific information, such as a location on the network or a certain web page. Links can be embedded into text, as well--chances are you’ve seen links in blog articles before, linking to external information on either the same site or elsewhere. Links can even be used to navigate to different parts of a singular web page through anchor text.

An example we like to use is an image on a website. Depending on how it’s set up, you can “navigate” to another page to view the image, or you can just view an enlarged image of it right there. Either way, a link is used to display the image. The same can be said for clicking on a link to a PDF. You either download it by clicking on it, or you open it from its source in the web browser.

Of course, with the ease of sharing information and files that links provide, some choose to use it to disseminate threats across the Internet. You should always hover over a link to see its destination before actually clicking on it. You certainly don’t want to download a dangerous file. This is a tactic used by many malicious websites. They will make a site that looks legitimate and use links to spread threats or convince users to download malicious files. You can basically avoid most of these just by paying attention.

For more information about the latest technology, subscribe to our blog.

Google’s Making Changes to Chrome, and Not Everyon...
Ransomware Getting Much More Targeted
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Tim Meyers Tip of the Week: Change Your Display in Windows 10
26 August 2019
Don't change only your operating system, change your display as well with a modern sunlight readable...
Tim Meyers E-Waste: An Often-Forgotten Environmental Issue
23 August 2019
E-waste and recycling and other waste management activities have not yet been determined, but they a...
Tim Meyers How to find the ideal desk height
23 August 2019
The table where you sit should be at the right height because it is necessary to have a good positio...
Tim Meyers Self-Driving Cars: Would You Hand the Wheel Over to a Computer?
23 August 2019
Self-driving cars are just cars, so they might have sensors, but no computer brain. Still, they are ...
Tim Meyers Checking Up on Medical IT in 2019
23 August 2019
Because almost all the personal information of the patients are on computers and on a cloud storage ...