Introduction to computers and computing concepts / with contributions from Charles E. Pope
Publication details: Boston : Pearson custom publishing, c2008Description: iii, 355 p. : ill. ; 28cmISBN:- 0536067678
- 22 005.13 POP
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Agriculture and Animal Sciences Library | 005.13 POP 5 (Browse shelf(Opens below)) | 5 | Available | 0009671 | |
Book Open Access | Agriculture and Animal Sciences Library | 005.13 POP 6 (Browse shelf(Opens below)) | 6 | Available | 0009672 | |
Book Open Access | Engineering Library | 005.13 INT 1 (Browse shelf(Opens below)) | 1 | Available | 0010819 | |
Book Open Access | Engineering Library | 005.13 INT 3 (Browse shelf(Opens below)) | 3 | Available | 0013100 | |
Book Open Access | Natural Resources and Environmental Sciences Library | 005.13 INT 2 (Browse shelf(Opens below)) | 2 | Available | 00010510 | |
Book Open Access | Natural Resources and Environmental Sciences Library | 005.13 INT 4 (Browse shelf(Opens below)) | 4 | Available | 00010509 |
TABLE OF CONTENTS
Chapter 4 Marking Up with HTML 1
Taken from: Snyder, fluency with information technology, 2nd edition
Chapter 15 Is Artificial Intelligence real 42
Taken from: Beekman, tomorrow’s technology and you, 8thedition
Chapter 2 Producing results: Software development, data storage and language 86
Chapter 3 Having all knowledge : Information Technology 133
Chapter 5 Searching for Truth 157
Taken from: Snyder, Fluency with Information technology, 2nd edition
Chapter 8 Work and wealth 195
Taken from: Quinn, Ethics for the information age 2nd edition
Chapter 7 database applications and privacy implications 250
Taken from: Beekman, Tomorrow’s technology and you 8th edition
Chapter 10 Computer security and risks 304
Taken from: Beekman, Tomorrow’s technology and you 8th edition
There are no comments on this title.