Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 68
Page 383
... employees had been fired . Consequently , it is vital that whenever an employee leaves the company for any reason , all access to the system ( username , password , e - mail address , and so forth ) should be removed immediately - for ...
... employees had been fired . Consequently , it is vital that whenever an employee leaves the company for any reason , all access to the system ( username , password , e - mail address , and so forth ) should be removed immediately - for ...
Page 645
... employee monitoring . Although some employees may view workplace monitoring as an invasion of their per- sonal privacy , employers have several valid reasons for monitoring employee activities , such as security concerns , productivity ...
... employee monitoring . Although some employees may view workplace monitoring as an invasion of their per- sonal privacy , employers have several valid reasons for monitoring employee activities , such as security concerns , productivity ...
Page 646
... employees for sending sexu- ally suggestive or explicit material via office e - mail ( 25 % have fired an employee for vio- lating the company e - mail policy ) , and 36 % have disciplined employees for downloading , uploading , or ...
... employees for sending sexu- ally suggestive or explicit material via office e - mail ( 25 % have fired an employee for vio- lating the company e - mail policy ) , and 36 % have disciplined employees for downloading , uploading , or ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML