Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Today’s Teens React to Windows 95 [VIDEO]

b2ap3_thumbnail_windows_95_for_kids_400.jpgDo you remember the good old days of Windows 95? The nostalgia factor might be one reason to bring this up again, but the fact remains that Windows has changed significantly over the past twenty years; so much so that teenagers who were born just twenty years ago, after the introduction of Windows 95, may have no clue what they’re looking at.

You can watch the video here:

Watching these teens react to Windows 95 is borderline painful. Some make comments that it looks “prehistoric,” “dull,” and “ancient,” while others remark on how it looks somewhat like the operating systems that they are familiar with today. While many teens are in total shock over what they see, you can tell that some of the older ones are more appreciative of what they’re looking at, despite agreeing that it’s a very primitive OS for today’s tech-centric world.

Here are some observations from this video:

  • “How do you turn this thing on?” Many of the teens were confused about how to power-on the PC and power it down. The large power button on the old CRT monitor drew a lot of attention, but the teens spent quite some time looking for the power button on the main component itself.
  • Windows has grown more refined and personal: Several of the teens who responded in the video mention that it’s a little rough around the edges, but that it still seems somewhat familiar to them due to Microsoft keeping largely the same interface. Today’s Windows operating system holds many of the features that were present in Windows 95, including the Start menu and several icons, like Internet Explorer (now Edge), and the Recycle Bin, but its graphics interface and usability is much better.
  • “Oh no, there’s no WiFi!” These teens open up Internet Explorer (some of them saying that it’s somehow even worse than it is today), but are shocked that the PC doesn’t have WiFi. It just goes to show that they’ve been spoiled by two decades of technological innovations. People now believe that the worst thing that can happen to them is not having WiFi.
  • Technology has grown much easier to use: When given an explanation of how DOS systems work, the teens are in shock over how complicated and impossible it sounds to use the technology. One girl even makes a solid statement, “If users of consumer technology, like iPhones or iPads, had to enter in commands to open apps, nobody would use them.” We’ve grown accustomed to simple, easy-to-use technology, to the point where it becomes a chore to use anything less than the most recent operating system.

Either way, it’s incredible to think about just how far technology has come in just a few decades. Where will technology be decades from now? Do you have any fond memories of Windows 95? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Virtualization Social Media Saving Money Holiday Gadgets Tech Term Chrome Automation Managed IT Services Managed Service Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Telephone Systems Remote Information Technology Covid-19 Information Managed Service Provider Spam Alert Office 365 Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Password Money App Data Breach History Mobile Computing Encryption Applications Application Human Resources Law Enforcement Big Data Remote Monitoring Apps Office Tips Training VPN Blockchain Paperless Office Government How To Remote Computing Private Cloud Mobile Office Managed IT Data Storage Patch Management Windows 7 Work/Life Balance Word Flexibility Marketing Wireless Servers WiFi IT solutions Entertainment Gmail Website Budget Google Drive Settings Data Security Two-factor Authentication Avoiding Downtime Mouse HaaS Infrastructure Voice over Internet Protocol Bring Your Own Device Vulnerability Data Management Scam Cleaning Risk Management Data Protection Hacker End of Support The Internet of Things Vendor Management Education Physical Security Lithium-ion battery Safety Sports USB HIPAA Redundancy Vendor Firewall Keyboard Managed Services Staff Software as a Service Display Telephone System Virtual Reality Machine Learning Apple Connectivity Remote Work Employee/Employer Relationship Social RMM User Error Save Time Meetings Conferencing Remote Worker Digital Signage Robot Computing Infrastructure Excel Unified Threat Management Going Green Audit Worker Computer Accessories Biometrics IT Management Cryptocurrency Virtual Desktop Botnet Procurement Battery IT Plan Workplace Strategy DDoS Comparison Net Neutrality Shadow IT Legal CES SharePoint Help Desk Printer Unsupported Software Printing Bluetooth Internet Exlporer Charger Content Management Business Technology Access Control Compliance Customer Service PDF Environment OneNote Computer Care Managed Services Provider Current Events Virtual Assistant Proactive IT Telephony Authentication IT Consultant Database Fax Server Samsung Remote Workers Best Practice YouTube SaaS Humor Black Market Value Processor Update Spam Blocking Electronic Medical Records Network Congestion Hard Drive eWaste Document Management Google Docs Wireless Technology Hiring/Firing Identity Theft Solid State Drive How to Downtime Computing Data storage Augmented Reality Wearable Technology Automobile Hard Drives Fraud Retail Virus Instant Messaging Business Intelligence Dark mode Smart Tech Trend Micro User Running Cable Trending PowerPoint Windows Media Player Memory Addiction SMS Amazon Default App Public Computer Recycling Saving Time Reputation Streaming Media Procedure Regulations Wiring dark theme Practices Shopping Managing Stress Content Transportation Google Search Tech Support Laptop Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Techology Criminal Bing Cameras Customers Safe Mode FinTech GDPR Workers Hosted Computing Social Network Audiobook Benefits Science Touchpad FENG Wireless Internet Online Shopping Investment IBM Employee/Employer Relationships File Sharing Employees Flash Camera Windows 365 Inventory Distributed Denial of Service Politics Smart Technology Specifications ISP Customer Relationship Management Advertising Analyitcs Wire Video Conferencing Evernote ROI Supercomputer Bitcoin Travel Shortcuts Printer Server Programming Notifications Software Tips Sales Sync Printers Point of Sale Emails Personal Millennials Cryptomining Smart Office Supply Chain Management Wireless Charging Batteries Antivirus Relocation Monitoring Windows 8 Virtual Private Network Windows 8.1 Netflix Digitize Two Factor Authentication Workforce IT service Video Games Root Cause Analysis Cables Windows Server 2008 R2 Knowledge Worker Commute Music HBO Customer relationships Tablet Skype Project Management Email Best Practices Nanotechnology IT Assessment Experience Telecommuting Manufacturing Domains Scalability Data loss Cortana Leadership Digital Signature Managed IT Service Business Owner Troubleshooting Security Cameras Outlook Computer Tips NarrowBand Start Menu Warranty Virtual CIO OneDrive IaaS Biometric Security Maintenance Consultant Search Bloatware Screen Mirroring HVAC Peripheral Loyalty Google Apps Analysis Using Data Books Analytics iPhone Frequently Asked Questions Digital Security Cameras Tablets Mobile Administrator Windows 10s Devices Copiers 5G Best Available Entrepreneur Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics webinar Accountants WIndows 7 Emergency Smartwatch Files Chromecast Professional Services Microchip Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Shortcut Assessment Password Manager Virtual Machine Cost Management Password Management PCI DSS Windows Server 2008 2FA Fiber Optics Multi-Factor Security Employee Social Networking Colocation Uninterrupted Power Supply Tools Search Engine Twitter Messaging Cabling Television Business Mangement Hypervisor Monitor NIST Policy

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code