Technology in ActionFor introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office. A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media. |
From inside the book
Results 1-3 of 66
Page 359
... laptop . FIGURE 8.31 Laptops include many of the ports you're used to seeing on desktop com- puters . desktop computers . Manufacturers offer extended warranty plans ... Laptops 359 Laptops Laptop Hardware Laptop Operating Systems and Ports.
... laptop . FIGURE 8.31 Laptops include many of the ports you're used to seeing on desktop com- puters . desktop computers . Manufacturers offer extended warranty plans ... Laptops 359 Laptops Laptop Hardware Laptop Operating Systems and Ports.
Page 361
... laptop is so easily stolen , purchasing a security lock is a wise investment . And as is the case with regular desktops , power surges can adversely affect ... Laptop Tour In this Sound Byte. Laptops 361 Laptop or Desktop? Technology in ...
... laptop is so easily stolen , purchasing a security lock is a wise investment . And as is the case with regular desktops , power surges can adversely affect ... Laptop Tour In this Sound Byte. Laptops 361 Laptop or Desktop? Technology in ...
Page 377
... laptop to your work surface can be an effective way to prevent theft . As shown in Figure 6 , a special locking mechanism is attached to the laptop ( some laptops are even manufactured with locking ports ) , and a hardened steel cable ...
... laptop to your work surface can be an effective way to prevent theft . As shown in Figure 6 , a special locking mechanism is attached to the laptop ( some laptops are even manufactured with locking ports ) , and a hardened steel cable ...
Other editions - View all
Common terms and phrases
allows application software binary browser cable cameras cell phone central processing unit chapter chip client computer client/server network computer fluent computer system computer's connect create database designed desktop developed devices display documents drive bays e-mail electronic enable Ethernet example files firewall FireWire flash memory floppy floppy disk folder hackers hard drive hardware images ink-jet input installed interface Internet IP address keyboard language laptop located memory Microsoft mouse multimedia operating system output packets personal computer ports printers processor Protocol puter router screen search engine server shown in Figure software applications Sound Byte storage system unit tasks Tier 1 ISPs tion upgrade users Windows XP wireless network Word