Technology in Action
Pearson Prentice Hall, 2007 - Technology & Engineering - 491 pages
For introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office.
A Computer Concepts Text Focused on Today's Student! Technology in Action engages students by combining a unique teaching approach with rich companion media.
Results 1-3 of 48
FIGURE 7.28 Computer viruses and other dangerous programs (such as Trojan
horses) are passed from one unsuspecting user to the next. Computer Threats:
Computer Viruses Keeping your computer safe entails keeping it safe from more
802.11 standard (Wi-Fi) 312 antivirus software 334 backdoor programs 323 black
-hat hackers 321 boot-sector viruses 333 Cat 5E cable 309 client 305 client/
server networks 305 coaxial cable 307 cybercrime 321 cybercriminals 321 ...
This makes it more difficult for antivirus programs to detect the virus. pop-up
window Windows that pop up when you install freeware programs or enter Web
sites. They often offer "useful" information or tout products. port An interface
What people are saying - Write a review
Understanding the Parts
25 other sections not shown