Technology in Action, IntroductionFeatures
|
From inside the book
Results 1-3 of 69
Page 17
... tion was then processed appropriately so that it could be printed on your ID card ( see Figure 1.18 ) . This organized output of data on your ID card is useful information . Finally , the information was probably stored as digital data ...
... tion was then processed appropriately so that it could be printed on your ID card ( see Figure 1.18 ) . This organized output of data on your ID card is useful information . Finally , the information was probably stored as digital data ...
Page 272
... tion by attacking major networks , Web sites , or communications equipment . Bombing or other- wise disabling major ... tion they " sniff " ? Once a hacker has your credit card information , he or she can either use it to purchase items ...
... tion by attacking major networks , Web sites , or communications equipment . Bombing or other- wise disabling major ... tion they " sniff " ? Once a hacker has your credit card information , he or she can either use it to purchase items ...
Page 328
... tion , GPS units are now used as naviga- tional aids for aircraft , recreational boats , and automobiles , and they even come in handheld models for hikers . While this precise positioning in- formation clearly redefines the fields of ...
... tion , GPS units are now used as naviga- tional aids for aircraft , recreational boats , and automobiles , and they even come in handheld models for hikers . While this precise positioning in- formation clearly redefines the fields of ...
Contents
Specialty Computers | 21 |
IN FOCUS | 22 |
Choosing the Right Internet Connection Option | 73 |
Copyright | |
27 other sections not shown
Other editions - View all
Common terms and phrases
allows application software audio BITS AND BYTES browser cable cell phone chapter chip computer system computer's create database delete designed desktop dial-up digital cameras display document drive bays e-mail electronic Ethernet example files firewall FireWire flash memory floppy floppy disk folder graphics hackers hard drive hardware images inkjet inkjet printers input install Internet connection keyboard laptop line network located Mbps Microsoft Microsoft Word modem monitor mouse multimedia nodes operating system options phone line power line network printer processor puter screen search engine server shown in Figure software applications Sound Byte spam speed spreadsheet system unit tablet PC tasks TechTV tion transfer upgrade users viruses ware Windows XP Word Zip disk