What is the correct term for MacBook models?

This may seem like a silly question, but I can never figure out the official answer. Where better to find it than here.
Ok, so I was wondering whether you capitalize the first letter of the "mid", "early", or "late" when saying something like:
"This is the MacBook Pro mid 2009" or is it "This is the MacBook Pro Mid 2009".
I would normally think to capitalize, but several Apple products have exceptions such as the "new iPad" and "iPad mini".

dani4576 wrote:
...Ok, so I was wondering whether you capitalize the first letter of the "mid", "early", or "late" when saying something like:
"This is the MacBook Pro mid 2009" or is it "This is the MacBook Pro Mid 2009".
I would normally think to capitalize, but several Apple products have exceptions such as the "new iPad" and "iPad mini".
My go-to resource for Apple product details is Mactracker, and there, when  a Mac is identified by its year and time period of introduction, the Early, Mid, and Late are always capitalized. The iPad and new iPad aren't. The rational is, I suspect, that the new iPad will only be new until it isn't, but the MacBook Pro Mid 2009 will always be the Mid 2009 model no matter what comes after. Essentially, it's a permanent descriptive name whereas the new iPad is only a temporary state. Moreover, if you check Apple's support website, you'll see QuickStart guides for specific Macs using the same capitalization scheme.

Similar Messages

  • What is the correct term for "static data"

    Hi,
    In this development shop we use the term "static data" for data that is loaded in the database prior to any customer registration / transactions being generated.
    It might be currency codes, types of products etc - data that the application needs up front.
    I was chided for using the term "static data" here before but was wondering if there is a better term for this -
    do people generally call this type of data configuration data or read-only data ?
    Or meta data ?
    Any help appreciated
    Rgds
    Peter

    user3047096 wrote:
    In this development shop we use the term "static data" for data that is loaded in the database prior to any customer registration / transactions being generated.
    It might be currency codes, types of products etc - data that the application needs up front.
    I was chided for using the term "static data" here before but was wondering if there is a better term for this -
    do people generally call this type of data configuration data or read-only data ?
    Or meta data ?I think "static data" is commonly understood in exactly the way you've used it, but "reference data" seems like a pretty good option.
    Regards
    Jonathan Lewis

  • What is the correct cable for iMac 11,2 Intel core i3, mini dvi to vga or mini display port to vga?

    What is the correct cable for iMac 11,2 Intel core i3, mini DVI to VGA or mini display port to VGA to hook up to projector? Thanks!

    mini-DisplayPort.
    Regards.

  • What is the best stylus for macbook pro?

    What is the best stylus for macbook pro?

    I dont understand? Why would a mac use a stylus when they aren't touchscreen?

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What are the new terms for renewal of payment for converting pdf to word?

    What are the new terms for renewal of payment for converting pdf to word?

    Hi joannep59572680,
    The terms haven't changed recently. ExportPDF subscriptions renew annually, unless your turn off Auto Renewal before your renewal date.
    Do you have a specific concern about your subscription?
    Best,
    Sara

  • Update my app. What is the correct procedure for updating an app/folio?

    I designed a folio in Indesign CS6 and created an app of the folio in adobe dps and succesfully uploaded it to the app store. Now I want to update my app. What is the correct procedure for updating an app/folio?

    no, just update your content and recreate the Single Edition App. Your certificate should still be valid so there is not need to recreate these.
    ... your App ID absolutely need to be the exact same one you used for the first version if you want to make sure this is an update.

  • What's the power Adapter for Macbook pro 13inch Mid 2012

    What's the power Adapter for Macbook pro 13inch Mid 2012 with core i-7, 2.9ghz, 8Gb ram?
    AFAIK it should be a 60wat Megasafe power adapter.
    But mine shipped with a 45Watt Megasafe. I got it as a Gift from my friend.
    Thanks in Advance.

    mmaumio wrote:
    60W MagSafe power adapter with "L" style connector
    This should be my Adapter right?
    Yes.
    There is a drawback in addition to taking a longer time to charge up your MBP.  In unusual instances when using your MBP with power adapter attached, and running a very heavy load on the CPU/GPU, the MBP will require additional electrical resources in addition to what the power adapter can provide.  It will then draw upon the battery.  What this means is that using a 45 watt adapter, these conditions are more likely to occur.
    Using a 45 watt adapter should not harm your MBP as such.
    Ciao.

  • What are the correct settings for my WRT54GS for using remote access on a Windows Home Server?

    I can not remotely access my Windows Home Server from outside.  What are the correct settings for my WRT54GS?

    I have opened ports 80, 443,and 4125 to PCP.  The  router address is http://192.168.1.1, my address is 221.40.138.170.
    Thank you.

  • What are the licensing terms for Creative Cloud Market Assets (e.g., what does Royalty Free mean? Can I use it in items for sales)?

    What are the licensing terms for Creative Cloud Market Assets (e.g., what does Royalty Free mean? Can I use it in items for sales)?

    Found it Creative Commons — Attribution-NonCommercial-ShareAlike 3.0 Unported — CC BY-NC-SA 3.0

  • What is the return policy for macbook pro in china?

    I live in SuZhou, Jiangsu in China. What is the return policy for macbook pro in china? It's been 1 month and I got a main board exchange(repair).

    You would need to return it to the Apple Online Store where you purchased it and it would have to be within 14 days. They may limit you to exchange only or charge a restocking fee.
    Contact the Apple Online Store to make arrangements.

  • What is the correct wpa for hp photosmart 5514e all in one printer b 111h

    What is the correct WPA for HP Photosmart 5514e All in one Printer B111h

    Hi,
    The correct WPA one is the one only you (or relatives/friends) know. You may forget therefore you have to logon to you wireless router to find out.
    Regards.
    BH
    **Click the KUDOS thumb up on the left to say 'Thanks'**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

  • What is the correct syntax for using a variable in an ad hoc query?

    Hi all
    I am an occasional DB user and at the moment need to update about 1000+ records so that a certain column gets a unique value.
    So I thought that I would use a variable for this.
    I then built this kind of SQL statement for just a small subset of the records:
    variable recNumber number;
    exec :recNumber := 1;
    UPDATE TABLE_TO_BE_UPD
    SET COL_TO_BE_UPD = COL_TO_BE_UPD + recNumber
    WHERE COL_TO_BE_UPD IN ('VAL_A','VAL_B');
    I get the invalid SQL statement error when attempting to execute above (besides the prompt that asks for a value which I would like to omit).
    Anyway I also tried this one:
    CREATE SEQUENCE seqCounter;
    UPDATE TABLE_TO_BE_UPD
    SET COL_TO_BE_UPD = COL_TO_BE_UPD + seqCounter.NEXTVAL
    WHERE COL_TO_BE_UPD IN ('VAL_A','VAL_B');
    From this one I got the error ORA-01722: invalid number...I am guessing this comes because seqCounter is of type number and the COL_TO_BE_UPD is of type character...(?)
    So what I would like to ask is what is the correct way to define and use a counter type of variable to append a number at the end of a character string?
    Also another question that I would like to ask is that are variables that are used in ad hoc queries also called 'bind variables'?
    Thanks muchly

    If you want to append a unique number to a column then this would do it:
    UPDATE TABLE_TO_BE_UPD
    SET COL_TO_BE_UPD = COL_TO_BE_UPD ||to_char(rownum)
    WHERE COL_TO_BE_UPD IN ('VAL_A','VAL_B');

  • What is the correct procedure for upgrading to aperture 3.4

    I am working in South Sudan and am shortly going to be in a place where I can download all the updates. The last time I did an update was around 2 weeks ago.
    I presume that there will be updates for Mountain Lion, iPhoto and Aperture, plus a whole pile of iOS updates. From the support questions I see that there is a number of people having problems.
    I presume that the first thing to do will be to rebuild the library of aperture.
    What is the correct procedure after that?

    If I do an upgrade through AppStore, and find it does not work, do I uninstall first by removing to trash? What do you mean by revert to an earlier version, and which previous version of Aperture should I use.
    Neville,
    So you did buy Aperture from the AppStore?
    Then move the Aperture application to the Trash, but do not empty it, just in case
    Sign into the AppStore and reinstall. In this case you do not need to revert to an earlier version. If the AppStore installer does not find an Aperture in your Applications folder, it will have to make a full install, and no incompatible frameworks should remain, as is the problem with the partial upgrades right now.
    Yes, I have a bootable clone,
    And have you checked, if you really can boot from your clone? Just being very cautious.
    Do you use facebook? Some posters are having problems, even after reinstalling, if the want to publish to Facebook. Post back, if you encounter that problem.
    Good Luck
    Léonie

  • What is the correct architecture for retrieving several complex decision reports

    The project that I am currently working on is required to save decision reports for several complex outputs.  These outputs are needed for each person entity contained in the request. All of the person entities are joined via relationships and the more people that are sent in the request, the more complex the decision reports become.
    We are using the determinations server and it is called as a web service.
    The determinations server starts having performance issues when the requests contain 6 people entities and times out when the number of people get to around 10.
    Checking the response size for a 10 person request with the complex decision reports yields a response size of around 40mb.
    What is the correct architecture to still have the traceability of what happened by having a copy of the decision report for each run without impacting system performance?

    Has anyone else encountered this issue?

Maybe you are looking for

  • 6.0.5 - 6.0.6 serial????

    Quick question... I'm on the road and thinking about jumping to 6.0.6 from 6.0.5 will serial re-entry be required with this one? Perhaps I should just wait until I return home in case anything crazy happens. (which it usually does) Thanks

  • Error Message on Flash installation

    I tried the fix suggested by johndiablo - downloaded flash installer then downloaded IE "standalone" Flash 9 installer. Now I get an error message "Flash Player ex is not a valid Win32 application. What's it all mean?? Will I ever get Flash installed

  • Lost Bluetooth on mac Wireless Keyboard

    Wierd issue Since the last update I lost the ability to connect my mac wireless keyboaed On my Imac and MBP. They see it but will not pair. Now I can pair this keyboard on my iPhone and my iPad I reset the PRAM and tried all the suggestions on the co

  • Where are 'in flight' messages stored ?

    Messages that are pulled off of persistent queues and processed within a           transaction envelope are retained atleast until they have been successfully           processed (indicated by way of the consumer or the container process issuing     

  • Can I only search for specific file types?

    Oftentimes I need to pickup just the InDesign file. I sort by type but there are word docs, images (lots of them!), web pages, etc. Is there a way to search in Client A's folder and all sub-folders for just InDesign files? Thx.