New Perspectives on Computer ConceptsBe engaged, excited and enlightened with the New Perspectives on Computer Concepts, Tenth Edition. This book has been completely updated to provide you with the latest, most in-depth information on both computer concepts and the context in which they fit into todayas world. The Tenth Edition provides the most current information on computers, software, the Internet, and emerging issues and technologies. The New Perspectives unique approach transforms learning concepts into a more approachable, hands-on experience that appeals to anyone, from the computer novice to computer savvy learners. |
From inside the book
Results 1-3 of 27
Page 22
USER IDS AND PASSWORDS Is access to the Internet restricted in any way? ...
A password is a different series of characters that verifies the user ID, similar to
the way a PIN (personal identification number) verifies your identity at an ATM ...
USER IDS AND PASSWORDS Is access to the Internet restricted in any way? ...
A password is a different series of characters that verifies the user ID, similar to
the way a PIN (personal identification number) verifies your identity at an ATM ...
Page 23
How do I choose a secure password? Even when you are assigned a "starter"
password, you should select a new password immediately, and then change it
periodically. Don't share your password with anyone or write it down where it
could ...
How do I choose a secure password? Even when you are assigned a "starter"
password, you should select a new password immediately, and then change it
periodically. Don't share your password with anyone or write it down where it
could ...
Page 24
Change your high-security password periodically in all the places that you use it.
Use your low-security password in situations where you don't really care if your
security is compromised. Some places on the Internet want you to establish an ...
Change your high-security password periodically in all the places that you use it.
Use your low-security password in situations where you don't really care if your
security is compromised. Some places on the Internet want you to establish an ...
What people are saying - Write a review
We haven't found any reviews in the usual places.
Contents
Computer Internet Web and Email Basics | 2 |
Computer Basics | 4 |
Computer Hardware | 9 |
Copyright | |
61 other sections not shown
Other editions - View all
Common terms and phrases
antivirus software application software backup BookOnCD boot process browser button cable cable modem called chapter CHECK ANSWERS computer displays computer system computer's contains copy create data files database delete designed device drivers display document e-mail message e-mail privacy electronic example File Edit View file format filename extensions floppy disk drive folder graphics hard disk drive icon InfoWeb INFOWEBLINKS input install instructions Interactive keyboard license memory menu microprocessor Microsoft Word modem mouse notebook computers operating system option password peripheral devices personal computer Perspectives NP7 printer processor provides QuickCheck referred screen search engine server specific spreadsheet storage devices store data system unit tape Tracking Disk typically user ID virus viruses Windows Windows Explorer Windows Registry word processing www.course.com/np/concepts7/ch01