Xem 1-20 trên 819 kết quả And your computer
  • .Network Your Computers & Devices Step by Step Ciprian Adrian Rusen and 7 Tutorials .Published with the authorization of Microsoft Corporation by: O’Reilly Media, Inc. 1005 Gravenstein Highway North Sebastopol, California 95472 Copyright © 2010 Ciprian Adrian Rusen. Complying with all applicable copyright laws is the responsibility of the user.

    pdf561p stingdau_123 26-01-2013 25 8   Download

  • Whether you want to prepare your computer for Windows 7, avoid investing in a new one, or just "go green", this fully illustrated guide has what you need. You'll learn how to add printers and new keyboards, boost your PC's performance and increase memory, improve power consumption, rev up your multimedia capacity, and much more. Step-by-step instructions are accompanied by photos that show you exactly what you should see at every stage.

    pdf340p phungnguyet_123 20-02-2013 20 8   Download

  • In Programming Your Home, technology enthusiast Mike Riley walks you through a variety of custom home automation projects, ranging from a phone application that alerts you to package deliveries at your front door to an electronic guard dog that will prevent unwanted visitors. Open locked doors using your smartphone. Assemble a bird feeder that posts Twitter tweets to tell you when the birds are feeding or when bird seed runs low

    pdf229p hoa_can 28-01-2013 24 8   Download

  • When something goes wrong with your computer, it's frustrating and potentially expensive. With Fix Your Own Computer For Seniors For Dummies, you can find out what's wrong, how to fix it, whether you need to call in professional help, and how to practice preventive maintenance. This friendly guide avoids techie jargon and shows you how to diagnose the problem, find out whether the software or hardware is at fault, make simple repairs, and add external devices such as scanners, printers, and hard drives.

    pdf397p ken333 07-06-2012 108 31   Download

  • The goal of the course is to increase the competence in key areas related to engineering of software qualities and by this establish a common platform and understanding. The latter should in the long run make it easier to perform future cooperation and joint projects. We will also discuss techniques and criteria for reviewing scientific papers and book chapters. The course is divided into a number of sections, where one (or a group of) student(s) is responsible for each section. Each section should be documented in written form......

    pdf100p monkey68 13-03-2009 182 24   Download

  • “The highest-performing people I know are those who have installed the best tricks in their lives.”—David Allen, productivity guru 1 Contrary to the popular misuse of the term to denote a computer criminal, a hacker is someone who solves a problem in a clever or non-obvious way. A lifehacker uses workarounds and shortcuts to overcome everyday difficulties of the modern worker: an interrupt-driven existence of too much to do and too many distractions to keep you from doing it.

    pdf330p manhhakcqt 10-04-2011 265 24   Download

  • Imagine a world in which the colors you see do not necessarily represent the correct ones. Imagine, when you approach a traffic light, you cannot tell what color the light is. Imagine the colors of traffic lights changing from one block to the next one. Could you? If you can’t, just go to your computer. In the world of visual computing, you cannot be sure what the colors will be. Even today. And today, the awareness of computer professionals to color has grown orders of magnitude.

    pdf227p hoang3 03-11-2009 96 18   Download

  • Names such as company names, trade names, font names, service names, and product names appearing in this book may be registered or unregistered trademarks or service marks, whether or not identified as such. All such names and all registered and unregistered trademarks, service marks, and logos appearing in this book or on its cover are used for identification purposes only and are the property of their respective owners.

    pdf358p vinhnghi 18-08-2009 47 14   Download

  • Most of the machines that have been developed to improve our lives serve a single purpose. Just try to drive to the store in your washing machine or vacuum the living room with your car and this becomes quite clear. Your computer, by contrast, serves many functions. In the office or library, you may find it invaluable as a word processor. Once you get home, slip in a DVD and your computer takes on the role of a television. Start up a flight simulator and it assumes the properties of anything from a hang glider to a Learjet. Launch an mp3 player and you suddenly...

    pdf350p tailieuvip13 25-07-2012 79 14   Download

  • How to Unlock a Windows XP or Windows Server 2003 Computer In Windows XP and Windows Server 2003, you can lock and unlock a computer either manually (by pressing the + keyboard shortcut) or using a program (such as a screen saver). For example, you can lock your computer at the office then connect to it from another location and continue working with your documents. When you return to your workplace, you can unlock your system.

    pdf1p kisiheo 26-07-2010 97 13   Download

  • No programmer, no matter how good (s)he is, writes bug−free code all the time. And so, most programming languages come with built−in capabilities to catch errors and take remedial action. This action could be something as simple as displaying an error message, or as complex as heating your computer's innards until they burst into flame (just kidding!) Over the next couple of pages, we're going to look at some of the error−management techniques available in JSP, and also demonstrate some of the JSP directives used to integrate standalone JavaBeans into your JSP scripts....

    pdf15p trungha 31-08-2009 35 10   Download

  • Chapter 10. RDF, RDF Tools, and the Content Model-P1 Chapter 9 introduced the Resource Description Framework (RDF) as the basis for building display data in the interface, where XUL templates take RDF-based data and transform it into regular widgets. But RDF is used in many other more subtle ways in Mozilla. In fact, it is the technology Mozilla uses for much of its own internal data handling and manipulation.

    pdf15p kaka 28-07-2010 70 10   Download

  • To help ensure security, passwords should be used carefully. These recommendations will help protect your passwords: • Never write down your password. • Never share your password with anyone. • Never use your network logon password for another purpose. • Use different passwords for your network logon and the Administrator account on your computer. • Change your network password every 60 to 90 days or as often as required in your specific environment. • Change your password immediately if you think it has been compromised....

    doc4p maiyeuanh_10081990 10-04-2013 26 5   Download

  • The indispensable and concise guide to Ubuntu, read by over half a million people! Ideal for ALL releases of Ubuntu! Written by award-winning author Keir Thomas, Ubuntu Pocket Guide and Reference quickly transforms its readers into experts. In its clear and concise pages, you learn step-by-step about installation--getting Ubuntu onto your computer - after which you learn how to configure your computer's hardware. Following this you are introduced to the Ubuntu desktop, and the tricks and techniques of efficient day-to-day usage.

    pdf170p ringphone 07-05-2013 31 4   Download

  • A firewall is a device that controls the flow of information between your computer and the internet, similar to a router. Most modern operating systems include a software firewall. In addition to the operating system’s firewall, the majority of home routers have a firewall built in. Refer to your user’s guide for instructions on how to enable your firewall. Once your firewall is enabled, consult the user’s guide to learn how to configure the security settings and set a strong password to protect it against unwanted changes. ...

    pdf5p khongmuonnghe 04-01-2013 23 3   Download

  • The legal process can be very confusing and complicated. A domestic violence advocate can help you understand the legal process and provide you with information about what to expect and how to prepare if you choose to seek assistance from the court. Advocates can also help you with a safety plan tailored to protect you and your family. Look for an advocate who works for a domestic violence, sexual assault, dating violence, or stalking program. You may also call the National Domestic Violence Hotline at 800-799-SAFE (7233); TTY: 800-787-3224.

    pdf21p enter1cai 12-01-2013 18 2   Download

  • Chapter 3B - Inputting data in other ways. This lesson examines several categories of alternative input devices and discusses the special uses of each. You may be surprised at how often you see these devices, and you may decide that an alternative device will be your primary means of interacting with your computer.

    ppt12p tangtuy02 12-03-2016 2 1   Download

  • Chapter 6B - Measuring and improving drive performance. This chapter define the term average access time and describe how it is measured, explain why file compression is a factor in drive performance, define the term data transfer rote and describe how it is measured, explain two steps you can take to optimize the performance of your computer’s hard disk, identify four drive interface standards commonly used in PCs.

    ppt17p tangtuy02 12-03-2016 2 1   Download

  • The first step to good computer security is awareness. You should understand a ll the dangers that specifically threaten your computer system. You need to know how each threat can affect you and prioritize them accordingly. This lesson introduces you to some of the most common threats to your privacy, data, and hardware. The following lesson shows you how to protect yourself and your system.

    ppt23p tangtuy02 12-03-2016 4 1   Download

  • Chapter 14B - Taking protective measures. In this lesson, you will leam about specific steps you can take to secure your computer system and your data from a variety of threats. You might be surprised to learn that computer security is not primarily a technical issue, and is not necessarily expensive. For the most part, keeping your system and data secure is a matter of common sense.

    ppt26p tangtuy02 12-03-2016 2 1   Download

Đồng bộ tài khoản