Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 90
Page 183
... program , the system software must first determine which program is associated with that icon and where the program is stored on the hard drive in order to verify that the program file exists in that ... Software vs Application Software.
... program , the system software must first determine which program is associated with that icon and where the program is stored on the hard drive in order to verify that the program file exists in that ... Software vs Application Software.
Page 221
... program specify the allowable use of the program . After a software program is developed , the developer holds the ownership rights for that program . Whether or not the program can be sold , shared ... Software > Software Ownership Rights.
... program specify the allowable use of the program . After a software program is developed , the developer holds the ownership rights for that program . Whether or not the program can be sold , shared ... Software > Software Ownership Rights.
Page 222
... program is shareware . MVP Spades for Windows Trial Version This game is shareware . You may freely try it . If you like it or find it useful , then you must register with MVP Software ... Software As discussed in Chapter. 222 SOFTWARE.
... program is shareware . MVP Spades for Windows Trial Version This game is shareware . You may freely try it . If you like it or find it useful , then you must register with MVP Software ... Software As discussed in Chapter. 222 SOFTWARE.
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML