Technology in ActionThis volume focuses on what tasks students can accomplish with their PC and what skills they can apply immediately in the workplace and at home. This introduction to computers and computing addresses topics such as -- examining why it's important to be computer fluent and how computers impact our society; examining the basic components of the computer; connecting to the Internet; exploring software; learning the operating system and personalizing the computer; evaluating and upgrading the PC; exploring home networking and keeping the computer safe from hackers; going mobile with cell phones, PDAs, Tablet PCs, and laptops; and going behind the scenes, looking at hardware in more detail. This work is packaged with a multimedia program on CD-ROM to reinforce the material taught in the text. |
From inside the book
Results 1-3 of 30
Page 367
... Bluetooth on equipment you purchase , and how to use Bluetooth devices . BITS AND BYTES No Bluetooth ? No Problem ACTIVE HELPDESK Using PDAs In this Active Helpdesk call ,. and PDA , you simply place the PDA in its cradle ( which is ...
... Bluetooth on equipment you purchase , and how to use Bluetooth devices . BITS AND BYTES No Bluetooth ? No Problem ACTIVE HELPDESK Using PDAs In this Active Helpdesk call ,. and PDA , you simply place the PDA in its cradle ( which is ...
Page 396
... Bluetooth Attacks Bluetooth is a transmission medium for exchanging data wirelessly over short dis- tances . Many cell phones and PDAs are Bluetooth - enabled . Although progress is being made , Bluetooth hardware and soft- ware still ...
... Bluetooth Attacks Bluetooth is a transmission medium for exchanging data wirelessly over short dis- tances . Many cell phones and PDAs are Bluetooth - enabled . Although progress is being made , Bluetooth hardware and soft- ware still ...
Page 397
... Bluetooth attacks ? Many newer devices with Bluetooth capability give you the option of making your device invisible to other Bluetooth devices . This does not affect your ability to use your devices paired to your Bluetooth device ...
... Bluetooth attacks ? Many newer devices with Bluetooth capability give you the option of making your device invisible to other Bluetooth devices . This does not affect your ability to use your devices paired to your Bluetooth device ...
Contents
Chapter | 2 |
Understanding the Parts | 40 |
Technology in Focus | 78 |
Copyright | |
23 other sections not shown
Other editions - View all
Common terms and phrases
Active Helpdesk allows application software audio binary Bluetooth browser cable called camera cell phone chapter chip client client computer client/server network create database designed desktop devices disk drive display documents e-mail Edit Ethernet example files firewall FireWire flash memory folder hackers hard disk hard drive hardware images inkjet inkjet printers input install Internet connection IP address keyboard language memory messages Microsoft Microsoft Office monitor multimedia notebook operating system packets podcasts ports printer processor Protocol puter router screen search engine server shown in Figure software applications Sound Byte storage system unit tablet PC tasks Tier 1 ISPs tion updates users Windows XP wireless network