Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 66
Page 37
Deborah Morley. E - Mail Electronic mail ( more commonly called e - mail ) is the process of exchanging electronic messages ... e - mail messages daily . If you are connected to the Internet ( via a desktop computer , portable computer , or ...
Deborah Morley. E - Mail Electronic mail ( more commonly called e - mail ) is the process of exchanging electronic messages ... e - mail messages daily . If you are connected to the Internet ( via a desktop computer , portable computer , or ...
Page 38
... e - mail mes- sages , see the " E - Mail Fundamen- tals " section of the References and Resources Guide located at ... messages . However , many plans from wireless providers ( such as those used with handheld PCs and smart phones ) include a ...
... e - mail mes- sages , see the " E - Mail Fundamen- tals " section of the References and Resources Guide located at ... messages . However , many plans from wireless providers ( such as those used with handheld PCs and smart phones ) include a ...
Page 635
... e - mail addresses to or from other compa- nies that acquired their e - mail addresses from a third - party , such as via a pur- chased mailing list . While these latter types of marketing e - mail messages do not technically fit the ...
... e - mail addresses to or from other compa- nies that acquired their e - mail addresses from a third - party , such as via a pur- chased mailing list . While these latter types of marketing e - mail messages do not technically fit the ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML