What our review scores mean -


We review hundreds of products in a wide range of categories each year, and our review process centers around how things perform for regular folks, not journalists in lab coats. Our goal to keep things simple extends to our review scores, as well. Below are our 10 different review scores and what they mean. Scores and awards are given out based on how products perform against other products in their class (price and type) at the time of review.

Figuring out what to spend your hard-earned money on is never easy, but we’re here to take as much pain from the process as we can. Check out our full How We Test guide for more info about each review category.

A game changer, or remarkable in some way

Outstanding in every way, has no major drawbacks, and is at the top of its category

Near perfect, with only minor quibbles

A very good product held back by a few issues (or stiff competition)

Competitive. It isn’t the best choice, but good qualities outweigh the bad ones

Not always the best choice, but it can get the job done

Delivers on far less than it should, and needs some work

Persistently difficult and annoying to use

Deeply flawed and barely functional

In addition to our scores, we also hand out two different awards: Recommended and Editors’ Choice. Full definitions of each award are below, but here’s the lowdown: The best of the best receive our Editors’ Choice award, and anything we think is a solid purchase earns our Recommended award.

For some examples, take a look at our full list of Editors’ Choice winners.

Editors’ Choice

These are standouts, and made a mark on our reviewers and editors. From speakers to smartphones, only the best of the best receive the Digital Trends Editors’ Choice award.

Recommended Product

Digtal Trends Recommended Product

These are not our absolute favorites, but they are still a smart purchase. If something has this award, we think you should give it strong consideration when you’re shopping.

Best Products


A popular category may have dozens of products that are really good — good enough that we recommend them or even award them our Editors’ Choice. But which is the best of the best? Digital Trends keeps up to date dozens of lists showcasing the best products, explaining in simply language why we picked it, who it’s for, and why you should buy it — or why you should hold off.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    LG Tribute 5 (Boost Mobile)

    99 LG Tribute 5 (full retail price) is one of many entry-level smartphones you can get on Boost Mobile.Compare Similar ProductsCompare LG Tribute 2 (Boost Mobile) %displayPrice% Motorola Moto E (2015, Boost Mobile) %displayPrice% LG Volt 2 (Boost Mobile) %displayPrice% Motorola Moto G (2015, Unlocked) %displayPrice% Google Nexus 5X (Unlocked) %displayPrice% Design, Display, and FeaturesThe Tribute 5 looks sleeker than your standard affordable phone.
  • 5300c769af79e

    Find What You Need Faster in Updated Google App

    Along those lines, you now may be able to find the information you're looking for via the Google app without having to type anything into the search bar.The Web giant today added a number of handy shortcuts to its app for Android and iOS and Google.
  • 5300c769af79e

    DEAL: Buy Unlocked US Galaxy S7 From Best Buy, Get a $75 Gift Card

    Should you have managed to hold off on buying the newly released US unlocked Galaxy S7 when it initially went live yesterday and are ready to pull the trigger today on payday, just hours before we step into a holiday weekend, we’ve got a decent deal for you.Best Buy is one of the few retailers in the US who has them in-stock, ready for pickup, so if you are considering buying from them, how does an additional $75 gift card with purchase sound?
  • 5300c769af79e

    Data Protection & the Insider Threat

    Download User and Entity Behavior Analytics has emerged as a critical part of a robust information security strategy, enabling the detection of threats that would otherwise go undetected.The barrage of data breaches and thefts caused by actual insiders, and by external actors impersonating insiders via compromised credentials, has led many to seek new approaches to increase their ability to protect sensitive data and intellectual property.