Service Notices

Maintenance Scheduled
Service outage reported in Big Oak Flat and small parts of Groveland. Please call the office if your experiencing any issues.

Sonora (209) 588-9601
Groveland (209) 962-6373


Service Notices

 8   A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z 


This is a data transfer system that transfers digital signals at 1.544 megabits per second (quite a bit faster than a 56K modem, which maxes out at around 0.056 Mbps). Most small to mid-sized colleges and business have T1 lines for their Internet connections. Because of the T1's large bandwidth, hundreds of people can be accessing the Internet from one T1 line. However, like all good things, too many people on one T1 line can cause dramatic decreases in data transfer speeds. For this reason, multiple T1s are often used.


If a T1 connection just isn't going to cut it for you, a T3 should do the trick. However, if you thought a T3 was 3 times faster than a T1 connection, you're slightly off. A T3 line actually 30 times faster, supporting data transfer rates of 44.736 megabits per second.


In Web pages, tags indicate what should be displayed on the screen when the page loads. Tags are the basic formatting tool used in HTML (hypertext markup language) and other markup languages, such as XML.

Tape Drive

This is a removable storage device mainly used for backing up data. It is similar to a Zip Drive, but instead of Zip disks, it uses small tapes. The drive acts like a tape recorder, reading data from the computer and writing it onto the tape. Since tape drives have to scan through lots of tape to read small amounts of scattered data, they are not practical for most storage purposes. That is why they are used almost exclusively for data backup. The benefit of tape drives is that they typically have large capacities for storing data, for a lower cost than hard drives similar in size. Also, multiple tapes can be used to make incremental backups (daily, weekly, monthly, etc.), which is much cheaper than using multiple hard drives.

Target Disk Mode

Target disk mode is a way of booting a Macintosh computer so that it acts as an external hard drive on another computer. When a Mac is booted in target disk mode, the typical boot sequence is bypassed and the operating system is not loaded. Instead, the computer's internal and external hard drives are simply mounted on a connected computer. Target disk mode can be used to manually transfer files between two machines or to copy data from one computer to another using Apple's Migration Assistant.

Task Bar

The task bar was introduced with Windows 95 and has been part of every version of Windows since then. It is the bar that spans the bottom of the screen and contains the Start button on the left side and the systray on the right. The task bar also includes the current time on the far right side and can hold shortcuts to programs directly to the right of the Start button.

Most of the task bar, however, contains shortcuts to open windows. Whenever you open a program or window, it shows up in the task bar. So if you have Internet Explorer and Microsoft Word open, there will be at least two items in the middle area of the task bar. Since each window gets its own location in the task bar, if there are two Microsoft Word documents open and three Internet Explorer windows open, there will be a total of five items in the task bar. When you click on a window title in the task bar, that window will become active and show up in front of other open windows. You can also cycle through the task bar items by holding the Alt key and pressing Tab a few times.


Stands for "Transmission Control Protocol/Internet Protocol." These two protocols were developed in the early days of the Internet by the U.S. military. The purpose was to allow computers to communicate over long distance networks. The TCP part has to do with the verifying delivery of the packets. The IP part refers to the moving of data packets between nodes. TCP/IP has since then become the foundation of the Internet. Therefore, TCP/IP software is built into all major operating systems, such as Unix, Windows, and the Mac OS.


Telecommunications is the transmission of analog or digital signals over a long distance. This includes telephone calls, radio and television broadcasts, and data transfers over the Internet. Thanks to telecommunications, people can communicate instantly regardless of where they are located.

The term "telecom" may also refer to a telecommunications company.

Telephone Adapter

Most residential and business VOiP systems use an adapter that converts analog voice and telephone signals to Internet protocol (IP) packets. Your existing telephone, or telephone system, plugs in to the analog telephone adapter (ATA). The ATA contains analog to digital converter circuitry that converts the phones analog signals into a digital format that can be transmitted over the Internet. The ATA then takes this digital data and packages it as IP packets. The IP packets are then sent out via the Internet.

Where the packets are re-assembled depends on the type of phone you are calling. If you are calling a cell phone or traditional land line, the packets are re-assembled by your VOiP provider at a switch near the person you are calling. The packets are then converted back in to an analog signal and sent through the traditional telephone network to their final destination.


This is a program that allows you log in to a Unix computer via a text-based interface. If you have an account on a Telnet server, you can access certain resources on the system such your home directory, your e-mail account, FTP files, etc. The downside of Telnet is that, to use it, you need to use Unix commands, which can be a challenge.


A template is a file that serves as a starting point for a new document. When you open a template, it is pre-formatted in some way. When you save a file created with a template, you are usually prompted to save a copy of the file, so that you don't save over the template.


A terabyte is 2 to the 40th power, or 1,099,511,627,776 bytes.

It can be estimated as 10 to the 12th power, or 1,000,000,000,000 bytes. A terabyte is 1,024 gigabytes and precedes the petabyte unit of measurement. Due to consumer demand for multimedia storage space, improved platter designs, and rapidly falling storage media prices modern consumer hard drives are frequently 1TB or larger.


Teraflops (also TFLOPS) is used to measure the performance of a computer's floating point unit (FPU). One teraflops equals 1,000 gigaflops, or 1,000,000,000,000 FLOPS. The term "teraflops" may be singular or plural because FLOPS is short for "Floating Point Operations Per Second." Teraflops is often used to measure scientific computing performance, since most scientific calculations use floating point operations.


The word "terminal" comes from early computer systems that were used to send commands to other computers. Terminals often consist of just a keyboard and monitor, with a connection to another computer. The purpose of a terminal is not to process information (like a typical computer), but to send commands to another system. For example, a network administrator may use a terminal to log in to a network and manage devices connected to the network.

With modern computers, the word "terminal" usually refers to a terminal program, or emulator, which provides a text-based interface for typing commands. This type of program is often abbreviated "TTY" and may also be referred to as a command-line interface. Terminal programs are available for all major computing platforms and are typically included with the operating system. For example, Mac OS X includes a program appropriately called "Terminal," which can be used to run Unix commands within the Mac OS or to access other machines. Unix typically includes a program called "xterm," which can run BASH or other Unix shells.

Text Editor

A text editor is any word processing program that you can use to type and edit text. Hey, they don't call it a text editor for nothing... Word Pad and NotePad for Windows and SimpleText and TextEdit for the Mac are common text editors. Larger programs such as Microsoft Word and Word Perfect are also text editors, but they have many more features. You can actually write HTML code and create HTML pages with a simple text editor, as long as you know the correct HTML syntax.


Stands for "Thin Film Transistor." These transistors are used in high-quality flat panel liquid-crystal displays (LCDs). TFT-based displays have a transistor for each pixel on the screen. This allows the electrical current that illuminates the display to be turned on and off at a faster rate, which makes the display brighter and shows motion smoother. LCDs that use TFT technology are called "active-matrix" displays, which are higher-quality than older "passive-matrix" displays. So if you ever see a TFTAMLCD monitor at your local computer store, it is a "thin-film transistor active-matrix liquid crystal display." Basically, it is a high-quality flat screen monitor.

Thick Client

Thick clients, also called heavy clients, are full-featured computers that are connected to a network. Unlike thin clients, which lack hard drives and other features, thick clients are functional whether they are connected to a network or not.

While a thick client is fully functional without a network connection, it is only a "client" when it is connected to a server. The server may provide the thick client with programs and files that are not stored on the local machine's hard drive. It is not uncommon for workplaces to provide thick clients to their employees. This enables them to access files on a local server or use the computers offline. When a thick client is disconnected from the network, it is often referred to as a workstation.

Thin Client

Thin clients function as regular PCs, but lack hard drives and typically do not have extra I/O ports or other unnecessary features. Since they do not have hard drives, thin clients do not have any software installed on them. Instead, they run programs and access data from a server. For this reason, thin clients must have a network connection and are sometimes referred to as "network computers" or "NCs."

Thin clients can be a cost-effective solution for businesses or organizations that need several computers that all do the same thing. For example, students in a classroom could all run the same program from a server, each using his own thin client machine. Because the server provides the software to each computer on the network, it is not necessary for each NC to have a hard drive. Thin clients also make it easier to manage computer networks since software issues need to be managed only on the server instead of on each machine.

Third Party

Third party software refers to software programs developed by companies other than the operating system developer. It may also refer to third party plug-ins, which are developed by other companies besides the original application developer.

Third party hardware refers to computer equipment manufactured by companies other than the original manufacturer. Examples of third party components include hard drives, video cards, memory modules, and peripheral devices.


What do a t-shirt and a computer program have in common? They are both composed of many threads! While the threads in a t-shirt hold the shirt together, the threads of a computer program alllow the program to execute sequential actions or many actions at once. Each thread in a program identifies a process that runs when the program asks it to.

Threads are typically given a certain priority, meaning some threads take precedence over others. Once the CPU is finished processing one thread, it can run the next thread waiting in line. Computer programs that implement "multi-threading" can execute multiple threads at once. Most modern operating systems support multi-threading at the system level, meaning when one program tries to take up all your CPU resources, you can still switch to other programs and force the CPU-hogging program to share the processor a little bit.

The term "thread" can also refer to a series of related postings in an online discussion. Web-based bulletin boards are made up of many topics, or threads. The replies posted in response to the original posting are all part of the same thread. In e-mail, a thread can refer to a series of replies back and forth pertaining a certain message.


Throughput refers to how much data can be transferred from one location to another in a given amount of time. It is used to measure the performance of hard drives and RAM, as well as Internet and network connections.

For example, a hard drive that has a maximum transfer rate of 100 Mbps has twice the throughput of a drive that can only transfer data at 50 Mbps. Similarly, a 54 Mbps wireless connection has roughly 5 times as much throughput as a 11 Mbps connection. However, the actual data transfer speed may be limited by other factors such as the Internet connection speed and other network traffic. Therefore, it is good to remember that the maximum throughput of a device or network may be significantly higher than the actual throughput achieved in everyday use.


Thumbnail refer to a reduced size version of a digital image. Digital thumbnails are usually less than 200x200 pixels or less in size.

Thumbnails, or thumbnail images, are often used on the Web and in digital photo organization programs. Because of their small size, several thumbnails can be displayed on a single screen. This makes it possible to browse through several images at once. In most instances, clicking or double-clicking on a thumbnail will open the full size image.


A thyristor is a four-layer semiconductor that is often used for handling large amounts of power. While a thyristor can be turned on or off, it can also regulate power using something called phase angle control. This allows the amount of power output to be controlled by adjusting the angle of the current input. An example of this is the a dimmer switch for a light.

While thyristors have the advantage of using phase angle control and handling large amounts of power, they are not as suitable for low power applications. This is because they can only be turned off by switching the direction of the current. For this reason, a thyristor may take longer to turn on or off that other semiconductors. Also, thyristors can only conduct in one direction, making them impractical for applications that require current to be conducted to and from each device.


Stands for "Tagged Image File Format." It is graphics file format created in the 1980's to be the standard image format across multiple computer platforms. The TIFF format can handle color depths ranging from 1-bit to 24-bit. Since the original TIFF standard was introduced, people have been making many small improvements to the format, so there are now around 50 variations of the TIFF format. So much for a universal format. Recently, JPEG has become the most popular universal format, because of its small file size and Internet compatibility.

File extensions: .TIF, .TIFF

Title Bar

A title bar is the section at the top of a window that contains the name or description of the window. Nearly all windows displayed on your computer have a title bar. Therefore, if several windows are tiled across the screen at one time, a user can identify each window by just glancing at the title bar. Windows makes this even easier by placing the information from each window's title bar in the Task Bar. Mac OS X displays the title bar information in the middle of each window when the Exposé function is active.

The title bar is a standard user interface GUI convention used by many applications, as well as the operating system itself. When folders are opened on the Desktop, the folder window typically displays the name of the active folder in the title bar. In Windows, the title bar can also be set to display the full path to the folder's location by selecting "Folder Options" in the Tools menu.

While the title bar serves as an identifier for each window, it also has another important function. By clicking and dragging the title bar, you can move a window to another location on the screen. This is important to know, since the title bar is often the only place you can click to move the window. Also, double-clicking the title bar will minimize the window, placing the window in the Task Bar (Windows) or the Dock (Mac OS X).

Toggle Key

A toggle key is used to alternate the input mode of a group of keys on a keyboard. Some examples include Caps Lock, Insert, Num Lock, and Scroll Lock. Caps Lock is the most commonly used toggle key, and capitalizes all letter input when turned on. The Insert key toggles the text entry mode between insert (which inserts characters) and overtype (which overwrites characters). Num Lock makes sure numbers are input from the numeric keypad and Scroll Lock allows the arrow keys to scroll through the contents of a window.

All keyboards include the Caps Lock key and most keyboards include Num Lock. The Insert and Scroll Lock keys are found on many keyboards as well, but they are rarely used an not supported by all operating systems.


A token is a group of bits that are transferred between computers on a token-ring network. Whichever computer has the token can send data to the other systems on the network. This ensures that only one computer can send data at a time.

A token may also refer to a network security card, also known as a hard token.


A toolbar is a set of icons or buttons that are part of a software program's interface or an open window. When it is part of a program's interface, the toolbar typically sits directly under the menu bar.

The toolbar can also reside within an open window. For example, Web browsers, such as Internet Explorer, include a toolbar in each open window. These toolbars have items such as Back and Forward buttons, a Home button, and an address field. Open windows on the desktop may have toolbars as well. For example, in Mac OS X, each window has Back and Forward buttons, View Options, a Get Info button, and a New Folder button. You can customize the Mac OS X window toolbars as well.

Toolbars serve as an always-available, easy-to-use interface for performing common functions. So if you haven't made use of your programs' toolbar options or customization features in the past, now is a good time to start!


As computer users, we have become accustomed to icons that represent files, folders, programs, and other objects on the computer. Many software programs also use icons to represent tools, which are often found in the program's toolbar.

While these icons can save screen space and make the program's interface more attractive, it can sometimes be difficult to tell what all the tool icons mean. While some tool icons are obvious (such as a printer icon to print and a scissors icon to cut a text selection), others are a bit more ambiguous. For this reason, programs often include tooltips that explain what each tool icon represents.

Tooltips are displayed when you roll over an icon with the cursor. It may take a second or two to display the tooltip, but when it does appear, it usually is a small box with a yellow background explaining what the icon represents.


A torrent is a file sent via the BitTorrent protocol. It can be just about any type of file, such as a movie, song, game, or application. During the transmission, the file is incomplete and therefore is referred to as a torrent. Torrent downloads that have been paused or stopped cannot be opened as regular files, since they do not contain all the necessary data. However, they can often be resumed using a BitTorrent client, as long as the file is available from another server.

Torrents are different from regular downloads in that they are usually downloaded from more than one server at a time. The BitTorrent protocol uses multiple computers to transfer a single file, thereby reducing the bandwidth required by each server. When a torrent download is started, the BitTorrent system locates multiple computers with the file and downloads different parts of the file from each computer. Likewise, when sending a torrent, the server may send the file to multiple computers before it reaches the recipient. The result is a lower average bandwidth usage, which speeds up file transfers.

File Extension: .TORRENT


Toslink is a type of digital audio connection developed by Toshiba Corporation. It uses a fiber optic cable to transmit an audio signal in the form of pulses of light. A single Toslink cable can be used to carry a mono, stereo, or even a surround audio signal.

Toslink is similar to the Sony/Philips Digital Interfance, known as S/PDIF. It provides the same digital audio data as S/PDIF, but uses a light beam instead of an electrical current to send the data. Because the Toslink cable does not use electrical currents, the connection is immune to electrical or magnetic interference. Toslink connections are most commonly found on high-end home theater receivers, MiniDisc players, and professional audio equipment, as well as Power Mac G5 computers.


When computers communicate over the Internet, there are often many connections made along the way. This is because the Internet is made up of a network of networks, and two different computers may be on two separate networks in different parts of the world. Therefore, if a computer is to communicate with another system on the Internet, it must send data through a series of small networks, eventually getting to the Internet backbone, and then again traveling to a smaller network where the destination computer resides.

Traceroute is a TCP/IP utility that allows a user to trace a network connection from one location to another, recording every hop (i.e. individual network connection) along the way. The command can be run from a Unix or DOS command line by typing tracert [domain name], where [domain name] is either the domain name or the IP address of the system you are trying to reach. A traceroute can also be done using various networking utilities, such as Apple's Network Utility for Mac OS X.

When a traceroute is run, it returns a list of network hops and displays the host name and IP address of each connection. It also returns the amount of time it took for each connection to take place (usually in milliseconds). This shows if there were any delays in establishing the connection. Therefore, if a network connection is slow or unresponsive, a traceroute can often explain why the problem exists and also show the location of the problem.


Trackback is a protocol for notifying websites that other websites have linked to it. When a trackback link is added to a Web page, the linked website is notified that the link has been added. However, both websites must support the trackback protocol in order for the system to work. For this reason, trackback is most commonly used by blogging websites to share links and responses to blog entries.


A trackball is an input device that has a ball which is held in a socket and can be rolled in any direction. Most trackballs perform the same functions as a mouse and are used primarily to control the cursor on a computer screen. However, unlike a mouse, a trackball device remains stationary when the user move the ball. This makes trackballs ideal for areas with limited space.


The Trash is used by Macintosh computers to store deleted items. It serves as a safety net, which provides an extra step before items are permanently deleted from the computer. Items can be moved to the Trash by dragging them to the Trash icon in the Dock or by selecting them and pressing Command-Delete.

You can view the items in the Trash by clicking the Trash icon. If you wish to save any of the items, you can drag them out of the Trash folder. If you are sure you no longer need the items in the Trash, you can select "Empty Trash..." from the Finder menu. This will permanently delete all the items stored in the Trash and will free up the disk space the items had been using.


Trinitron is arguably the best consumer CRT (Cathode Ray Tube) technology available. The technology was developed by Sony Corporation, who owns complete rights to it. The Trinitron design has helped the company lead the market in the manufacturing of TVs and monitors for many years. The difference between a Trinitron tube and most other tubes is that the Trinitron uses an aperture grille instead of a shadow mask for creating the image on the screen.

An aperature grille consists of wires stretched vertically down the screen (allowing for a vertically flat screen). A shadow mask is basically a metal plate with holes in it, where light can pass through. Because Trinitron monitors are vertically flat, they have less image distortion and less glare than most other monitors. If you look very closey at a Trinitron screen, you should see one or two very thin dark horizontal lines that span the width of the screen. These lines are small wires that support the aperture grille.

Trojan Horse

In Greek mythology, there is a story about the Trojan War. This war lasted many years, as the Greeks could not penetrate the heavily barricaded city of Troy. So one day, a few of the Greek soldiers brought the people of Troy a large wooden horse, which they accepted as a peace offering. The horse was moved inside the city walls, where it sat until the night. After the people of the city had fallen asleep, Greek soldiers jumped out of the wooden horse, opened the gates to let their fellow soldiers in, and took over the city.

So what is the moral of this story? Mainly, beware of Trojan horses. But how does that relate to computers? In the computing world, Trojan horses are more than just a myth. They really exist and can cause damage to your computer. Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.

Most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses don't replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers.


A troll is a person who posts offensive or off-topic comments online. These comments are often made to incite arguments or emotional responses from other users. Trolling, as it is called, may take place in Web forums, in blog comment sections, and in social networking websites.

Usernames provide trolls with hidden identities, and therefore a sense of anonymity online. Therefore, trolls often type things they would not actually say in person. The anonymous nature of the Internet gives trolls the capacity to post offensive comments without being held responsible. Fortunately, webmasters can typically delete unwanted posts and remove the accounts of the trolls that invade Web forums and other online communities.


Troubleshooting is the process or identifying and fixing problems. Computer troubleshooting may involve hardware or software and can sometimes involve both at the same time. The basic process of troubleshooting is to check the most general possible problems first, and then gradually check for more specific problems. This provides a logical approach to problem solving and can apply to multiple types of products.


To truncate something is to shorten it, or cut part of it off. In computer science, the term is often used in reference to data types or variables, such as floating point numbers and strings.

For example, a function may truncate the decimal portion of a floating point number to make it an integer. If the number 3.875 is truncated, it becomes 3. Note that this is different than if the number had been rounded to the nearest integer, which would be 4. Strings may also be truncated, which can be useful if a string exceeds the maximum character limit for a certain application.

Several programming languages use the function trunc() to truncate a variable. PHP uses strlen() to truncate a string to a set limit of characters.


Stands for "Time To Live." Pretty intense for a computer term, huh? It refers an aspect of the Internet Protocol. TTL is used when a "ping," or a request for a response, is sent to another computer, such as a server. The TTL represents the number of hops, or servers in different locations, the request can travel to before returning a failed attempt message.


The term "tunneling" probably brings to mind images of digging tunnels underground, perhaps for a subway system, or for you more technically-minded, a fiber optic cable connection. In the virtual world of computers world, however, tunneling refers to a protocol in which one protocol is encapsulated within another.

Tunneling protocols are often used for establishing various types of connections over common protocols, such as HTTP. For example, a peer-to-peer (P2P) file sharing program may mask data as HTTP to allow the data to be transferred through a firewall. Since most firewalls allow HTTP (port 80) connections, the connection would likely be allowed, since this is the same port that the Web uses. If the program used its own protocol and port number, the connection may be blocked.

Tunneling can also be used to establish secure connections through protocols that are typically not secure. For example, the point-to-point tunneling protocol (PPTP) establishes a secure connection over a standard PPP connection, and can used to create a virtual private network (or VPN) between two remote locations. PPTP allows a user to "tunnel" to another location with a secure password-protected connection using the standard or PPP protocol.


A computer tutorial is an interactive software program created as a learning tool. Tutorials help people learn new skills by using a step-by-step process that ensures the user is following along and comprehending the material. For example, a Web development tutorial may begin with instructions on how to create a basic Web page. This page might only include the words "Welcome to my website" on it and use the minimum HTML required in order for the page to load in a Web browser. Once the user is able to create a working Web page, the tutorial may explain how to add other features, such as styled text, table layouts, and images, to the page. Then the tutorial may provide instructions on how to publish the Web page to the Internet.

Some software tutorials provide testing features to ensure comprehension of the material, while others may be simple walkthroughs of a software program. Tutorials can be used for both school and business purposes and are written for basic, intermediate, and advanced users. Even smart computer programmers use tutorials. Most software development programs include a tutorial for creating a "Hello World!" program, which is the most basic program that can be created with the software. Since tutorials offer a gradual approach to learning, they can be helpful to people at many different skill levels. If a computer programmer can benefit from a tutorial, just about anybody can.


Other than being the last name of the author of "Huckleberry Finn," there are numerous other ideas concerning the origin of this term. Some believe it stands for "Toolkit Without An Informative Name," while others argue it is "Technology Without An Interesting Name." Still, there are some who believe that it came from the saying, "Ne'er the twain shall meet."

Though the real story behind the name may never be known, the purpose of TWAIN is quite clear. It is a graphics and imaging standard that allows companies to make drivers for scanners and digital cameras. Nearly all scanners on the market today are TWAIN-compliant, meaning the way they interact with your computer is based on the TWAIN standard. If you feel the need to know more about TWAIN and its fascinating history, the TWAIN Group has a website that you can visit.


When you modify a certain piece of hardware for better performance, it is often referred to as "tweaking" it. Overclocking the computer's CPU or changing jumper settings on the motherboard are common examples of hardware tweaking. Removing system limitations and adding plug-ins or extensions to a computer's operating system are types of software tweaking.

Tweaking a computer is much like "tuning" a car (you know, the ones with the huge mufflers, big spoilers, and pimped out rims). It may increase performance, but is best left in the hands of the technically savvy. For example, overclocking your computer's processor may cause it to crash frequently, or worse yet, overheat and destroy the CPU. So, for most people, it is best to leave well enough alone.


A tweet is an update published by a Twitter user. It is similar to a blog posting, but cannot be longer than 140 characters. Tweets are meant to answer the question, "What are you doing?" which provides other users with quick updates about your life. When you publish a tweet, it will show up on the Twitter home pages of all the users you are following. Similarly, when you log in to Twitter, you will see the most recent tweets of the users that you have chosen to follow.


Twitter is a service that allows people to stay connected with each other by answering the basic question, "What are you doing?" Once you sign up for a Twitter account, you can post your own updates, or "tweets," using a computer or cell phone. You can also view the updates posted by other users you are following. Since each tweet is limited to 140 characters or less, the updates must be short and sweet. However, you may twitter as often as you want, meaning there is no limit on how much information you can share.


A typeface is a set of characters of the same design. These characters include letters, numbers, punctuation marks, and symbols. Some popular typefaces include Arial, Helvetica, Times, and Verdana. While most computers come with a few dozen typefaces installed, there are thousands of typefaces available. Because they are vector-based (not bitmaps), typefaces can be scaled very large and still look sharp. The term "typeface" is often confused with "font," which is a specific size and style of a typeface. For example, Verdana is a typeface, while Verdana 10 pt bold is a font. It's a small difference, but is good to know.

SNC Location Map
Our Address:
16913 Amy Drive
Sonora, CA 95370
Mailing Address:
PO Box 281
Standard, CA 95373
Hours of Operation:
Mon. to Fri. 8am to 5:00pm

Tuolumne County Service Area: Cable TV, high speed internet, and VoIP telephone service areas include the Hwy 108 communities of Sonora, Columbia, Jamestown, Soulsbyville, Twain Harte, Strawberry, Longbarn, Cold Springs and Pinecrest, and the Hwy 120 communities of Big Oak Flat, Groveland, and Pine Mountain Lake. Not all services available everywhere

Customer Service



Online Support

This email address is being protected from spambots. You need JavaScript enabled to view it.

Proud member of:
Member of the Sierra Professional Association Member of TuCare