U-M Computing News, 5. sējums,3. izdevumsComputing Center, 1990 |
No grāmatas satura
1.–5. rezultāts no 99.
6. lappuse
... services on MTS . Using a Macintosh as a UMnet Terminal , InfoDisk Friday , March 2 , 1 : 00-3 : 00 p.m. Monday , April 2 , 1 : 00-3 : 00 p.m. Instructor : Cole Whiteman More HyperCard Scripting . The new HyperCard Scripting , Part. 6.
... services on MTS . Using a Macintosh as a UMnet Terminal , InfoDisk Friday , March 2 , 1 : 00-3 : 00 p.m. Monday , April 2 , 1 : 00-3 : 00 p.m. Instructor : Cole Whiteman More HyperCard Scripting . The new HyperCard Scripting , Part. 6.
11. lappuse
... terminal , or if you are connecting to UMnet through a 1200 bps or slower connection , you will probably want to select line mode . You must use line mode if you have reconfigured your PF keys , because * DOCINFO won't recognize the new ...
... terminal , or if you are connecting to UMnet through a 1200 bps or slower connection , you will probably want to select line mode . You must use line mode if you have reconfigured your PF keys , because * DOCINFO won't recognize the new ...
13. lappuse
... terminal emulation program from Columbia University used primarily for file transfer MacPaint Version 1.5 , a graphics program from Claris ( not available at sites with software servers ) MacPaint Version 2.0 ( only at sites with ...
... terminal emulation program from Columbia University used primarily for file transfer MacPaint Version 1.5 , a graphics program from Claris ( not available at sites with software servers ) MacPaint Version 2.0 ( only at sites with ...
22. lappuse
... terminal will no longer be tied up while you wait for it to print . Sample Commands . To access a local printer using the RM , use a $ CONTROL or $ SET command to specify the printer you want to use . For example , to use the Xerox 4045 ...
... terminal will no longer be tied up while you wait for it to print . Sample Commands . To access a local printer using the RM , use a $ CONTROL or $ SET command to specify the printer you want to use . For example , to use the Xerox 4045 ...
5. lappuse
... terminal ( not just a monitor , but a terminal - a combined video screen and keyboard ) . Terminals could run $ 750 to $ 2,000 ( $ 1,325 to 3,540 ) . You would doubtless want a printer as well . By current standards , dot - matrix ...
... terminal ( not just a monitor , but a terminal - a combined video screen and keyboard ) . Terminals could run $ 750 to $ 2,000 ( $ 1,325 to 3,540 ) . You would doubtless want a printer as well . By current standards , dot - matrix ...
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
611 Church Street A/UX Apple Autonet Basic Skills BITNET Campus Computing Sites cards chip color command Computer Network Computing News Vol Computing Resource Center conference Consulting and Support COPY database dBASE disk display documentation Education Building electronic mail expanded memory floppy fonts fourth floor graphics Greg Scott hard drive hardware Hewlett-Packard HyperCard IBM PC Ilsi ImageWriters Information Technology Information Technology Division InfoX Instructional Technology interface Internet ITD Consulting LaserWriter list price LS&A MacDraw machine Macintosh macro Manager memory Michigan Microcomputer Microsoft Model monitor MS-DOS MultiFinder NSFNET NUBS NuBus operating system PC and Compatibles phone number printer Registration required School of Education sending electronic mail server SprintNet staff terminal U-M Computing UM-MTS and UB-MTS University University Stores UNIX UNYN upgrade vendors Windows 3.0 workshops Workstation Digest Zenith
Populāri fragmenti
4. lappuse - The first of April, some do say, Is set apart for All- fools' Day ; But why the people call it so, Nor I, nor they themselves do know. But on this day are people sent On purpose, for pure merriment ; And though the day is known before, Yet frequently there is great store Of these...
8. lappuse - He is also the associate director for virtual environments at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign.
1. lappuse - SMTP (Simple Mail Transfer Protocol) The Internet standard protocol for transferring electronic mail messages from one machine to another. SMTP specifies how two mail systems interact and the format of control messages they exchange to transfer mail.
4. lappuse - Christ backwards and forwards to mock and torment him, ie from Annas to Caiaphas, from Caiaphas to Pilate, from Pilate to Herod, and from Herod back again to Pilate, this ridiculous, or rather impious custom, took its rise from thence, by which we send about, from one place to another, such persons as we think proper objects of our ridicule. Such is Bellingen's explanation. Calling this
1. lappuse - Protocols can describe low-level details of machine to- machine interfaces (eg, the order in which bits and bytes are sent across a wire) or high-level exchanges between allocation programs (eg, the way in which two programs transfer a file across the Internet).
1. lappuse - IP (Internet Protocol) The Internet standard protocol that defines the Internet datagram as the unit of information passed across the Internet and provides the basis for the Internet connectionless, best-effort packet delivery service.
15. lappuse - The WDEF Virus. The WDEF virus was first discovered in December 1989 in Belgium and at Northwestern University.
1. lappuse - A to see if it is alive." port See protocol port. positive acknowledgement PPP (Point to Point Protocol) A protocol for framing IP when sending across a serial line. Also see SLIP. promiscuous ARP See proxy ARP. protocol A formal description of message formats and the rules two or more machines must follow to exchange those messages.
15. lappuse - ZUC infects only applications; it does not infect system files or document files. Applications do not have to be run to become infected. ZUC was timed to activate on March 2, 1990, or two weeks after an application becomes infected, whichever is later. Before that date, it only spreads from application to application. After that date, approximately 90 seconds after an infected application is run, the cursor begins to behave unusually whenever the mouse button is held down. The cursor moves diagonally...