New Perspectives on Computer Concepts: IntroductoryRevised to keep your students on top of our ever-changing world of emerging technology, this is your solution for staying current and keeping your students engaged in an information age. Features: Each lesson is presented on two facing pages, with the main points discussed on the left hand page and large illustrated on the right. Students learn all they need about a topic without turning the page! The modular structure of the book allows you to cover the units and lessons in any order. Computers in Context lessons highlight how computer technology is used in various fields, such as sports, education and law enforcement. Students can use the new companion Web site activities to reinforce the concepts that they have learned in the book. New material and photos added to this Fifth edition will keep you current including coverage of Tablet computers, wireless networks, a new lesson on Solid State Storage Technology, an updated and revamped lesson on Defining database software, and a new lesson on introducing DHTML and XML. An Interactive CD accompanies the book and contains videos and screentours, InfoWebs, Interactive Exercises, Practice Tests and Labs. Icons placed throughout the book direct students to the CD putting the concepts on context. ... From publisher description. |
From inside the book
Results 1-3 of 25
Page 328
Introductory June Jamrich Parsons, Dan Oja. TECHTALK ENCRYPTION em At one time , encryption was synonymous with spies , secret agents , and an assortment of cloak - and - dagger activities . The average person's exposure to encryption ...
Introductory June Jamrich Parsons, Dan Oja. TECHTALK ENCRYPTION em At one time , encryption was synonymous with spies , secret agents , and an assortment of cloak - and - dagger activities . The average person's exposure to encryption ...
Page 330
Introductory June Jamrich Parsons, Dan Oja. What's public key encryption ? Caesar's encryption method is an example of symmetric key encryption , which is also called " secret key " or " conventional " encryption . With symmetric key ...
Introductory June Jamrich Parsons, Dan Oja. What's public key encryption ? Caesar's encryption method is an example of symmetric key encryption , which is also called " secret key " or " conventional " encryption . With symmetric key ...
Page 331
... encryption . AES ( Advanced Encryption Standard ) is an encryption standard that uses three key sizes of 128 , 192 , or 256 bits . It is based on the Rijndael ( pronounced " rain doll " ) encryption algorithm . What kind of encryption ...
... encryption . AES ( Advanced Encryption Standard ) is an encryption standard that uses three key sizes of 128 , 192 , or 256 bits . It is based on the Rijndael ( pronounced " rain doll " ) encryption algorithm . What kind of encryption ...
Contents
Computer Basics | 2 |
Operating a Personal Computer | 14 |
Internet Basics | 15 |
Copyright | |
152 other sections not shown
Other editions - View all
Common terms and phrases
ActiveX antivirus software application software audio backup bitmap bitmap graphic BookOnCD browser button bytes cable modem called camera chapter CHECK ANSWERS color compression contains cookies create database delete designed dial-up display document domain name e-commerce e-mail message electronic encryption Ethernet example Figure File Edit View file format filename extension floppy disk folder hard disk drive icon InfoWeb INFOWEBLINKS install instructions Interactive Internet connection IP address Kbps menu microprocessor Microsoft Microsoft Word operating system option packets peripheral devices personal computer Perspectives NP7 pixels player popular printer processor protocol provides QuickCheck require screen server signals specify storage device stored tags tape Tools Tracking Disk typically vector graphic virus viruses Web server Wi-Fi Windows word workstations