Technology in Action, IntroductionFeatures
|
From inside the book
Results 1-3 of 38
Page 278
... Viruses Keeping your computer safe entails keeping it safe from more than just hackers . You must also guard against computer viruses . A computer virus is a computer program that attaches itself to another computer program ( known as ...
... Viruses Keeping your computer safe entails keeping it safe from more than just hackers . You must also guard against computer viruses . A computer virus is a computer program that attaches itself to another computer program ( known as ...
Page 279
... viruses do cause disruption to computer systems , including data destruction and informa- tion theft , virus creation is a form of cybercrime . How does my computer catch a virus ? If your computer is exposed to a file infected with a virus ...
... viruses do cause disruption to computer systems , including data destruction and informa- tion theft , virus creation is a form of cybercrime . How does my computer catch a virus ? If your computer is exposed to a file infected with a virus ...
Page 285
... viruses do I need to protect my computer from ? A computer virus is a program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged . Computer viruses can be grouped into five ...
... viruses do I need to protect my computer from ? A computer virus is a program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged . Computer viruses can be grouped into five ...
Contents
Specialty Computers | 21 |
IN FOCUS | 22 |
Choosing the Right Internet Connection Option | 73 |
Copyright | |
27 other sections not shown
Other editions - View all
Common terms and phrases
allows application software audio BITS AND BYTES browser cable cell phone chapter chip computer system computer's create database delete designed desktop dial-up digital cameras display document drive bays e-mail electronic Ethernet example files firewall FireWire flash memory floppy floppy disk folder graphics hackers hard drive hardware images inkjet inkjet printers input install Internet connection keyboard laptop line network located Mbps Microsoft Microsoft Word modem monitor mouse multimedia nodes operating system options phone line power line network printer processor puter screen search engine server shown in Figure software applications Sound Byte spam speed spreadsheet system unit tablet PC tasks TechTV tion transfer upgrade users viruses ware Windows XP Word Zip disk