Technology in Action, IntroductionFeatures
|
From inside the book
Results 1-3 of 69
Page 264
... laptop connected to the network 100 feet away may get throughput of 5.5 Mbps or less . If nodes are located more than 250 feet apart , they may not be able to connect to the network at all . Obstacles between wireless nodes also ...
... laptop connected to the network 100 feet away may get throughput of 5.5 Mbps or less . If nodes are located more than 250 feet apart , they may not be able to connect to the network at all . Obstacles between wireless nodes also ...
Page 298
... laptop from being stolen , you can attach a motion alarm to it , shown in Figure 5. When you leave your laptop , you use a small device called a " key fob activator " to activate the alarm . If your laptop is moved while the alarm is ...
... laptop from being stolen , you can attach a motion alarm to it , shown in Figure 5. When you leave your laptop , you use a small device called a " key fob activator " to activate the alarm . If your laptop is moved while the alarm is ...
Page 332
... Laptops The most powerful mobile computing solution is a laptop computer , sometimes called a note- book computer . Laptops offer large displays and all of the computing power of a full desktop system ( see Figure 8.28 ) . Although ...
... Laptops The most powerful mobile computing solution is a laptop computer , sometimes called a note- book computer . Laptops offer large displays and all of the computing power of a full desktop system ( see Figure 8.28 ) . Although ...
Contents
Specialty Computers | 21 |
IN FOCUS | 22 |
Choosing the Right Internet Connection Option | 73 |
Copyright | |
27 other sections not shown
Other editions - View all
Common terms and phrases
allows application software audio BITS AND BYTES browser cable cell phone chapter chip computer system computer's create database delete designed desktop dial-up digital cameras display document drive bays e-mail electronic Ethernet example files firewall FireWire flash memory floppy floppy disk folder graphics hackers hard drive hardware images inkjet inkjet printers input install Internet connection keyboard laptop line network located Mbps Microsoft Microsoft Word modem monitor mouse multimedia nodes operating system options phone line power line network printer processor puter screen search engine server shown in Figure software applications Sound Byte spam speed spreadsheet system unit tablet PC tasks TechTV tion transfer upgrade users viruses ware Windows XP Word Zip disk