Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 1 April 2010

Windows Explorer Versus Internet Explorer

Posted on 10:29 by Unknown
People often confuse Windows Explorer and Internet Explorer because of their similar names, but there is a big difference between them. Windows Explorer (often called Explorer for short) is a program for exploring things inside your computer — things like disk drives, folders, and files that you can use without being online. Its program file is named Explore.exe. If your computer is part of a local network, you use Windows Explorer to access shared resources on those nearby computers as well.

Internet Explorer is typically for exploring stuff outside your computer, mainly World Wide Web pages on the Internet. Its program file name is Iexplore.exe. You have to be online (connected to the Internet) to explore those outside resources. The items outside your computer are mostly Web pages, rather than drives, folders, and files. Web pages have longer names, usually in the form of www.something.com, rather than short, simple names such as Computer, Documents, Pictures, and such. Finally, note that you can open a Web page from a Windows Explorer window by typing the Web page’s URL in the Windows Explorer address bar and pressing Enter. However, the Web page doesn’t open in Windows Explorer. Instead, Windows Explorer passes the URL to your default Web browser to open the page; it then closes itself.

Source of Information : Windows 7 Bible
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Windows | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ►  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ►  October (7)
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ▼  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ▼  April (21)
      • Windows Deployment Platform Components - Answer Files
      • Windows Deployment Platform Components
      • Windows 7 Deployment Terminology
      • Windows 7 deployment
      • Service Accounts
      • Smart Cards
      • Windows Biometric Framework
      • Safe Unlinking in the Kernel Pool
      • Auditing Enhancements
      • Internet Explorer Security Features
      • UAC Improvements in Windows 7
      • Enabling Non-Administrators to Make Configuration ...
      • Admin Approval Mode
      • User Account Control
      • Multiple Active Firewall Profiles
      • AppLocker
      • Why IM
      • Introducing Windows Live Mail
      • Blocking Pop-Ups in IE
      • Personalizing IE tabbed browsing
      • Windows Explorer Versus Internet Explorer
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile