Technology in ActionIn today's technological age, computer literacy is important for everyone, and now learning the basics is easier than ever. A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media. The sixth edition has been updated to reflect the latest developments in computer technology. New interactive learning tools have also been added to enhance student engagement. Student CD is included with every text, containing:
With an array of fun and engaging learning tools, Technology in Action teaches students computer fundamentals, from learning Microsoft Office to setting up their own home network. |
From inside the book
Results 1-3 of 33
Page 100
... BLOGS ( WEBLOGS ) AND VIDEO LOGS ( VLOGS ) What is a blog ? Weblogs ( or blogs ) are personal logs , or journal entries , that are posted on the Web . The beauty of blogs is that they are simple to create , manage , and read ; because ...
... BLOGS ( WEBLOGS ) AND VIDEO LOGS ( VLOGS ) What is a blog ? Weblogs ( or blogs ) are personal logs , or journal entries , that are posted on the Web . The beauty of blogs is that they are simple to create , manage , and read ; because ...
Page 101
... blog ? The traditional form of blogs are primarily text - based but may also include images and audio . Video logs ( vlogs or video blogs ) are personal journals that use video as the primary con- tent in addition to text , images , and ...
... blog ? The traditional form of blogs are primarily text - based but may also include images and audio . Video logs ( vlogs or video blogs ) are personal journals that use video as the primary con- tent in addition to text , images , and ...
Page 513
... ( blogs ) , 100-101 Webmasters , 477 WebMD.com , 185 WEP ( Wired Equivalent Privacy ) security protocol , 346 wesabe.com ( software ) , 178 White - hat hackers , 336 Whole - house surge protectors , 366 Wide area networks ( WANs ) , 320 ...
... ( blogs ) , 100-101 Webmasters , 477 WebMD.com , 185 WEP ( Wired Equivalent Privacy ) security protocol , 346 wesabe.com ( software ) , 178 White - hat hackers , 336 Whole - house surge protectors , 366 Wide area networks ( WANs ) , 320 ...
Contents
Contents at a Glance Sixth Edition | 2 |
TECHNOLOGY IN FOCUS | 32 |
The History of the PC | 36 |
Copyright | |
24 other sections not shown
Other editions - View all
Go!: Technology in Action Alan D. Evans,Kendall E. Martin,Mary Anne Poatsy No preview available - 2009 |
Common terms and phrases
Active Helpdesk allow application software audio BITS AND BYTES blogs Bluetooth browser cable called cameras cell phone chapter chip computer literate computer system computer's create database designed desktop disk display document drive bays e-mail editing Ethernet ethics example files FireWire flash drive flash memory folder Google hackers hard drive hardware images inkjet printers input install interface Internet connection Internet Explorer keyboard laser printer Linux memory microphone Microsoft mobile devices monitor mouse multimedia notebook operating system PDA/smartphone personal computer players podcasts portable ports processor programs protect puter router screen search engine shown in Figure software applications Sound Byte speed storage system unit tion updates upgrade users Windows Vista wireless network