Technology in ActionFor introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office. A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media. |
From inside the book
Results 1-3 of 89
Page 286
... shown in Figure 13 . Protecting Your Mac Although Macs tend to be attacked less often by viruses and other hacker nuisances , you can still be vulnerable if you don't take precautions . OS X comes with a firewall , but by default it is ...
... shown in Figure 13 . Protecting Your Mac Although Macs tend to be attacked less often by viruses and other hacker nuisances , you can still be vulnerable if you don't take precautions . OS X comes with a firewall , but by default it is ...
Page 377
... shown in Figure 5. When you leave your laptop , you use a small device called a " key fob acti- vator " to activate the alarm . If your laptop is moved while the alarm is activated , it emits a wailing 85 - decibel sound . The fact that ...
... shown in Figure 5. When you leave your laptop , you use a small device called a " key fob acti- vator " to activate the alarm . If your laptop is moved while the alarm is activated , it emits a wailing 85 - decibel sound . The fact that ...
Page 430
... figure , top- down design is applied to the highest level of task in our parking garage exam- ple . ( b ) Here , the ... shown in Figure 10.11b : Announce Program , Give Users Instructions , Read the Input Number Hours WorkedToday . When ...
... figure , top- down design is applied to the highest level of task in our parking garage exam- ple . ( b ) Here , the ... shown in Figure 10.11b : Announce Program , Give Users Instructions , Read the Input Number Hours WorkedToday . When ...
Other editions - View all
Common terms and phrases
allows application software binary browser cable cameras cell phone central processing unit chapter chip client computer client/server network computer fluent computer system computer's connect create database designed desktop developed devices display documents drive bays e-mail electronic enable Ethernet example files firewall FireWire flash memory floppy floppy disk folder hackers hard drive hardware images ink-jet input installed interface Internet IP address keyboard language laptop located memory Microsoft mouse multimedia operating system output packets personal computer ports printers processor Protocol puter router screen search engine server shown in Figure software applications Sound Byte storage system unit tasks Tier 1 ISPs tion upgrade users Windows XP wireless network Word