Understanding Computers: Today and TomorrowGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Known for its readability and breadth of topics covered, Understanding Computers: Today and Tomorrow will ensure that students have the comprehensive, current knowledge of computer concepts and issues needed to succeed in our technocentric society. This 11th Edition offers exciting new features and updates to make its content more approachable and meaningful to students. |
From inside the book
Results 1-3 of 20
Page 209
... phishing items that match the user's supplied search terms . Most of these search tools create an index of the ... [ phishing ] results from Google Desktop Search - Microsoft In ... File Edit View Favorites Tools Help more >> Desktop ...
... phishing items that match the user's supplied search terms . Most of these search tools create an index of the ... [ phishing ] results from Google Desktop Search - Microsoft In ... File Edit View Favorites Tools Help more >> Desktop ...
Page 362
... phishing , and other types of dot cons . 5. Detail steps an individual can take to protect against online theft , identity theft , Internet scams , spoofing , phishing , and other types of dot cons . 6. Identify personal safety risks ...
... phishing , and other types of dot cons . 5. Detail steps an individual can take to protect against online theft , identity theft , Internet scams , spoofing , phishing , and other types of dot cons . 6. Identify personal safety risks ...
Page 387
Today and Tomorrow Deborah Morley, Charles S. Parker. TREND Pharming As if phishing is not bad enough , now there is pharming . Similar to phishing , pharming is used to obtain personal information ( such as credit card numbers , account ...
Today and Tomorrow Deborah Morley, Charles S. Parker. TREND Pharming As if phishing is not bad enough , now there is pharming . Similar to phishing , pharming is used to obtain personal information ( such as credit card numbers , account ...
Contents
TECHNOLOGY AND YOU Wired | 50 |
MODULE Hardware | 52 |
Input and Output 132 | 53 |
Copyright | |
40 other sections not shown
Other editions - View all
Common terms and phrases
activities addition application software applications Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory floppy disk folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing portable printers processing programming language record RFID screen server shown in Figure smart card specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML