Technology in Action, Introductory
In today's technological age, computer literacy is important for everyone, and now learning the basics is easier than ever. A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media. The sixth edition has been updated to reflect the latest developments in computer technology. New interactive learning tools have also been added to enhance student engagement. Student CD is included with every text, containing:
With an array of fun and engaging learning tools, Technology in Action teaches students computer fundamentals, from learning Microsoft Office to setting up their own home network.
Results 1-3 of 31
FIGURE 6.33 Bluetooth-equipped devices communicate wirelessly with one
another using radio waves. 480 Mbps. A newer USB 3.0 standard that takes
advantage of fiber-optic technology, with anticipated throughput of as much as 5
Preventing Bluetooth Attacks Bluetooth is a transmission medium for exchanging
data wirelessly over short distances. Most PDA/ smartphones are Bluetooth-
enabled. Although progress is being made, Bluetooth hardware and software ...
This is a real risk in Europe because Bluetooth and SMS are wildly popular there,
but the rise of Bluetooth usage in the United States is making this a risk here as
well. Many Europeans use their phones to make micropayments (small ...
What people are saying - Write a review
We haven't found any reviews in the usual places.
TECHNOLOGY IN FOCUS
Understanding the Parts
Making the Most of the Webs Resources
22 other sections not shown
Active Helpdesk allow application software audio BITS AND BYTES blogs Bluetooth browser cable called cameras cell phone chapter chip computer literate computer system computer's create database designed desktop developed disk display document drive bays e-mail Ethernet ethical example files firewall flash drive flash memory folder Google hackers hard drive hardware images inkjet printers input install Internet connection Internet Explorer keyboard Linux memory microphone Microsoft mobile devices monitor mouse multimedia notebook operating system options PDA/smartphone PDAs personal computer phishing players podcasts popular portable ports processor protect puter router screen search engine shown in Figure software applications Sound Byte spam storage subject directory system unit tion updates upgrade users VoIP Windows Vista wireless network