Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 84
Page 26
... referred to as a dumb terminal . Somewhere between a PC and a dumb terminal are devices that may be able to perform a limited amount of independent processing but are designed to be used with a network . Two examples of these are thin ...
... referred to as a dumb terminal . Somewhere between a PC and a dumb terminal are devices that may be able to perform a limited amount of independent processing but are designed to be used with a network . Two examples of these are thin ...
Page 459
... referred to as C2G sites . Intermediary Hubs Companies that follow the intermediary hub model - also called the brokerage model- do not sell goods or services directly to others , but instead bring buyers and sellers ( usually both ...
... referred to as C2G sites . Intermediary Hubs Companies that follow the intermediary hub model - also called the brokerage model- do not sell goods or services directly to others , but instead bring buyers and sellers ( usually both ...
Page 496
... referred to as enterprises . Consequently , a system that integrates an entire company or enterprise is referred to as an enterprise - wide system . Systems that link multiple enterprises - such as a business and its customers ...
... referred to as enterprises . Consequently , a system that integrates an entire company or enterprise is referred to as an enterprise - wide system . Systems that link multiple enterprises - such as a business and its customers ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML