Technology in Action, IntroductionFeatures
|
From inside the book
Results 1-3 of 20
Page 103
... spam or fining spam senders . What do you think of such efforts to stop spam ? Will they work ? Do you think spam should fall under free speech protection ? If so , can you think of any creative ways to stop spam ? 8. Search engines ...
... spam or fining spam senders . What do you think of such efforts to stop spam ? Will they work ? Do you think spam should fall under free speech protection ? If so , can you think of any creative ways to stop spam ? 8. Search engines ...
Page 302
... spam , pop - ups , and spyware . Spam As we noted in Chapter 3 , spam is unwanted e - mail that is sent out by companies in an attempt to solicit business . While not damaging to your computer , it can be annoying as your inbox fills up ...
... spam , pop - ups , and spyware . Spam As we noted in Chapter 3 , spam is unwanted e - mail that is sent out by companies in an attempt to solicit business . While not damaging to your computer , it can be annoying as your inbox fills up ...
Page 303
... spam . This mail is then directed into a folder called " bulk " where you can easily delete all the spam at one time . This keeps your inbox relatively free from annoying spam . O 2003 by Yahoo! Inc. Barnes & Noble.com - Gateway ...
... spam . This mail is then directed into a folder called " bulk " where you can easily delete all the spam at one time . This keeps your inbox relatively free from annoying spam . O 2003 by Yahoo! Inc. Barnes & Noble.com - Gateway ...
Contents
Specialty Computers | 21 |
IN FOCUS | 22 |
Choosing the Right Internet Connection Option | 73 |
Copyright | |
27 other sections not shown
Other editions - View all
Common terms and phrases
allows application software audio BITS AND BYTES browser cable cell phone chapter chip computer system computer's create database delete designed desktop dial-up digital cameras display document drive bays e-mail electronic Ethernet example files firewall FireWire flash memory floppy floppy disk folder graphics hackers hard drive hardware images inkjet inkjet printers input install Internet connection keyboard laptop line network located Mbps Microsoft Microsoft Word modem monitor mouse multimedia nodes operating system options phone line power line network printer processor puter screen search engine server shown in Figure software applications Sound Byte spam speed spreadsheet system unit tablet PC tasks TechTV tion transfer upgrade users viruses ware Windows XP Word Zip disk