Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 89
Page 31
... called Web pages available through the Internet . A group of Web pages belonging to one indi- vidual or company is called a Web site . Web page files are stored on computers ( called Web servers ) that are continually connected to the ...
... called Web pages available through the Internet . A group of Web pages belonging to one indi- vidual or company is called a Web site . Web page files are stored on computers ( called Web servers ) that are continually connected to the ...
Page 104
... called the disk access time and requires the following three steps : 1. Move the read / write heads to the cylinder that contains ( or will hold ) the desired data - called seek time . 2. Rotate the disks into the proper position so ...
... called the disk access time and requires the following three steps : 1. Move the read / write heads to the cylinder that contains ( or will hold ) the desired data - called seek time . 2. Rotate the disks into the proper position so ...
Page 236
... called a worksheet . Most spreadsheet programs allow multiple worksheets to be saved together in a single spreadsheet file , called a workbook . Worksheets are divided into rows and columns . The intersection of a row and a column is called ...
... called a worksheet . Most spreadsheet programs allow multiple worksheets to be saved together in a single spreadsheet file , called a workbook . Worksheets are divided into rows and columns . The intersection of a row and a column is called ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML