RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: What is a Dongle?

Tech Term: What is a Dongle?

There are countless examples of words that have evolved to meet the needs of their times. Meat once referred to solid food of any kind before it came to mean the edible flesh of animals. The word nice once had many meanings that completely contradicted each other. Today’s Tech Term, dongle, is another word that has evolved, albeit at a faster pace.

There is no questioning that the term dongle is largely used in reference to technological devices, just as there is no questioning that “dongle” is an inherently silly word.

However, this silly word has become a constant in the world of tech, especially on the consumer side of things. Dongles can be found everywhere, from the adapters that allow headphones to be used with devices that are now made without headphone jacks, many of the streaming devices that can be found in the home could be considered dongles, and arguably any device that plugs into a computer via a USB port qualifies as a dongle.

Officially, the term dongle (if defined by its most common denominator in computer networking) is any small device that is plugged into a computer to allow a particular network connection to be made. We see them most often today in USB devices. However, this blanket term doesn’t include USB devices that serve as data storage devices. Instead, the term dongle applies to other USB devices, such as Wi-Fi dongles that connect a device to a wireless network, or a modem dongle that connects to 3G or 4G wireless Internet networks.

As for the name itself, there are a variety of theories, including that the term is simply a play on the work ‘dangle’ (which most dongles do), or that the term held some significance to the developers of the Commodore PET Computer, which was released in 1977 and used a device similar to a dongle to boost its memory.

Regardless, the dongle is a term that is ingrained in modern technology. For more tech terms, tips, and tricks, make sure you subscribe to this blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 23 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Software Tip of the Week Business Management workplace tips Small Business gadgets Email Tip of the Week Backup Mobile Office Hackers Managed Service Provider Cloud Saving Money hardware Productivity Quick Tips Malware Data Google Business COmputing Social Media Smartphones Business Microsoft Office Users Hosted Solutions User Tips Computer Mobile Devices Android Innovation IT Services Virtualization Efficiency Business Continuity Smartphone Upgrade Windows WiFi Passwords Miscellaneous IT Support Network Security Operating System Holiday VoIP Server Mobile Computing Apple Communication Disaster Recovery The Internet of Things Alert Unified Threat Management Mobile Device Management Marketing Ransomware Windows 10 Windows 8 Apps Remote Computing Antivirus Gmail Analytics History Facebook Network IT Consultant Outlook Cybersecurity Virus Artificial Intelligence Browser Search Maintenance Big data Content Filtering Going Green Office Health Collaboration Data Management Hacking Excel Phishing Money Humor Productivity Bandwidth Cybercrime IT Support communications Lithium-ion Battery Printer Tutorials Firewall Vendor Management Current Events Remote Monitoring Mobile Device Hard Drives iPhone Automation Employer-Employee Relationship BDR Downtime Laptop Internet of Things BYOD Cost Management Comparison Bluetooth Tech Support Website App Best Practice Wireless Technology Networking Update Data Recovery Social Networking Windows 10 VPN Augmented Reality Spam PowerPoint Data Security Proactive IT Office 365 Social Save Time Bitcoin Safety Avoiding Downtime Specifications Bring Your Own Device IBM Information Technology Blockchain SaaS Net Neutrality Project Management DDoS Government Unified Communications Touchscreen IT Management Data Breach Law Enforcement User Error Pain Points Inbound Marketing Word Cryptocurrency Administration Cortana Computer Repair Cleaning Data storage Phone System Saving Time Business Technology Digital Payment Gaming Console Compliance Websites Google Docs Presentation Running Cable Scam Encryption Vulnerabilities Document Management Chrome Computer Accessories Company Culture Tablet Managed IT Services Save Money Tech Term Mouse Robot Retail Lifestyle Customer Relationship Management eWaste Education Tech Terms Experience Help Desk Access Control Social Engineering Sports Data Backup Data loss Two-factor Authentication Hiring/Firing Business Intelligence Disaster User Patch Management Advertising Manages Service Provider Audit Recovery Hard Drive Virtual Desktop Mobile Technology Ebay Hosted Solution Hackeres Redundancy Regulations Statistics End of Support Distributed Denial of Service intranet Hiring/Firing Analytic Printing Point of Sale Documents Computers Digital Desktop Pirating Information Public Speaking Drones Fax Server Trojan Accountants Writing Entertainment Securty Downloads Media Streaming Virtual Assistant Heating/Cooling External Harddrive Emergency Equifax Managed IT Services Computer Care Mobility Hard Drive Disposal Time Management Applications Debate Hacker Network Congestion Smart Phones Password LinkedIn Vulnerability Startup Memory Upselling Training Entrepreneur USB Google Calendar email scam Unified Threat Management Mobile Security Customer Service HIPAA Electronic Payment Legislation Processors File Sharing Google Maps Router Society Television Multi-factor Authentication IP Address Phone Systems Leadership Emails Wireless Legal Teamwork SharePoint Software as a Service Device security Office Tips Storage Knowledge Wireless Headphones Twitter Identity Theft Computing Infrastructure Keyboard Music Freedom of Information Domains Printer Server Skype Virtual Reality Wearable Technology YouTube Business Cards Shortcut Black Market News Online Currency Managed IT HTML Deep Learning Troubleshooting Environment LiFi Programming Travel Staffing GPS Streaming Media Start Menu Piracy Competition Business Growth Co-Managed IT Fake News Monitors Harddrive Get More Done Visible Light Communication Webinar Read Product Reviews Budget 3D Display Windows XP Data Protection Software License Text Messaging Application Google Wallet Microsoft Excel Devices Trending Displays Business Owner