Technology in ActionFor introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office. A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media. |
From inside the book
Results 1-3 of 39
Page 323
... hackers can do if they break into my computer ? Hackers often use individuals ' computers as a staging area to do mischief . To perpetrate widespread computer attacks , for example , hackers need to control many computers at the same ...
... hackers can do if they break into my computer ? Hackers often use individuals ' computers as a staging area to do mischief . To perpetrate widespread computer attacks , for example , hackers need to control many computers at the same ...
Page 324
... HACKERS GAIN ACCESS How exactly does a hacker gain access to a computer ? Hackers can gain access to computers directly or indi- rectly . Direct access involves sitting down at a computer and installing hacking software . This rarely ...
... HACKERS GAIN ACCESS How exactly does a hacker gain access to a computer ? Hackers can gain access to computers directly or indi- rectly . Direct access involves sitting down at a computer and installing hacking software . This rarely ...
Page 329
... hackers to access your computer , they must know your computer's IP address . With a NAT - capable router / firewall installed on your network , hackers are unable to access your internal IP address , so your computer is safe . Hacker ...
... hackers to access your computer , they must know your computer's IP address . With a NAT - capable router / firewall installed on your network , hackers are unable to access your internal IP address , so your computer is safe . Hacker ...
Contents
Chapter | 2 |
Understanding the Parts | 40 |
Technology in Focus | 78 |
Copyright | |
16 other sections not shown
Other editions - View all
Common terms and phrases
Active Helpdesk allows application software audio binary BITS AND BYTES Bluetooth browser cable camera career cell phone chapter chip computer fluent computer system computer's create CRT monitors database designed desktop digital video display documents drive bays e-mail Edition Ethernet files firewall FireWire flash memory floppy folder hackers hard disk drive hard drive hardware images inkjet printers install Internet connection iPod keyboard laser printers memory Microsoft Office motherboard mouse multimedia notebook operating system options players podcasts ports processor programs puter rollerball router screen search engine server shown in Figure software applications Sound Byte spreadsheet system unit tablet PC tasks tion updates upgrade users Windows XP wireless network Word