The User Friendly Guide to INTERNET & COMPUTER TERMS

Total Page:16

File Type:pdf, Size:1020Kb

The User Friendly Guide to INTERNET & COMPUTER TERMS The User Friendly Guide to INTERNET & COMPUTER TERMS Charles Steed Gold Standard Press Inc. Reno, Nevada Copyright ã 2001 Charles Steed and Gold Standard Press Inc. Permission is granted to ALL USERS and readers to download, print and freely dis- tribute The User Friendly Guide To Internet & Computer Terms. No changes to this text is authorized. THIS TEXT MAY NOT BE SOLD EXCEPT BY AUTHORIZED AGENTS OR REPRESENTATIVES OF GOLD STANDARD PRESS INC. For information, contact Gold Standard Press Inc. 1475 Terminal Way, Suite E, Reno, Nevada 89502, tel. 360-482-2510. This book contains information gathered from many sources. It is published for gen- eral reference and not as a substitute for independent verification by users when circumstances warrant. It is sold with the understanding that neither the author nor publisher is engaged in rendering legal, psychological, accounting or professional advice. The publisher and author disclaim any personal liability, either directly or indirectly, for advice presented within. Although the author and publisher have used care and diligence in the preparation, and made every effort to ensure the accuracy and completeness of information contained in this book, we assume no responsibility for errors, inaccuracies, omissions, or any inconsistency herein. Any slights of people, places, publishers, books, or organizations are unintentional. The online version of this text has been slightly modified to faciliate easy download- ing. No significant differences from the printed version are present. Library of Congress Control Number 00-092608 ISBN 0-9654396-2-3 Cartoons ã Copyright Randy Glasbergen. http://www.glasbergen.com Other Books By The Author: The Streetsmart Homebuyer Crash Course 2000 CONTENTS 1250 + Internet & Computer Terms 5 User Friendly Guide Features How to Shop for a Computer 167 The History of the Internet 180 Who Owns It? 185 Close Up On The Truth About Online Travel 189 The Internet Shoppers Guide 194 The Truth About Investing Online 198 Avoiding Web Frauds & Scams 203 ECommerce Close Up 213 Fun Stuff Fun with Easter Eggs 221 Emoticons: Put a Smile in That File! 232 Online Shorthand: Common Email & Chat Acronyms 236 Fast Reference Guide High Power Computer & Internet Tips and Tricks 243 Organize Web Favorites 278 Search Engine Tips 279 Search Engine Glossary 282 Time-Saving Special Key Functions 285 Common DOS & Windows File Extensions 289 Metric Prefixes 290 Online Bonus Section 200 Plus Cool Websites 291 A A an HTML abbreviation used to signify a link to another document or an anchor. see HTML. A/B switch a two-way switch used for parallel or serial port cables. An A/B switch may be used to connect two devices such as printers or modems to the same computer. Care must be taken to use only the devices that are actually con- nected at any one time. abort to cancel a command. Abort, Retry, Fail? a DOS error message displayed when a disk is unreadable. Each of these words gives the user the option to continue as indicated. absolute address a fixed location or address in a computer’s memory. absolute URL a URL that contains the entire address identifying the machine, directory and file. For example, http://www.keenagers.com/community/friend- finder.htm is the site address of a service known as “friend finder” on the keenagers.com Website. abstract a summary of a file or document. accelerator a hardware device such as a card, that makes an operation, run faster. Without the device, the computer’s microprocessor would be the sole operator of the function. acceptable use policy the terms and conditions of use for Internet providers, inter- active Websites, and networks which must be agreed upon before the user is granted access to the service. Among the conditions of use can be found access provider 6 privacy policies, email policies, courtesy standards, and other parameters the provider deems appropriate for users of the service. Users must agree to the terms or they are denied access to services. access provider (ISP or Internet service provider) A private company that provides customers access to the Internet in exchange for a fee, though some companies are now offering this service for free. access time the time necessary for a memory device to deliver data to the CPU. see CPU, DRAM, SRAM. acquire to transfer a file from an analog source such as a scanner. see import. Acrobat Adobe software for reading and creating PDF files. Acrobat Reader (free software from Adobe) allows the user to print and view PDF files created in many different formats. see Adobe Acrobat, PDF activate to choose a window in which you want to work. active 1. items currently shown on a display monitor or an application in use on a computer. 2. the program currently running on a computer. active matrix a type of flat-panel liquid crystal display (LCD) that delivers better clarity and contrast than the passive-matrix display. ad banner an advertisement, usually displayed in a rectangular box, that contains a hyperlink pointing to the advertiser’s Web page or buffer page. Ad banners are the most common method of advertising on the World Wide Web. Costs can run anywhere from free, to upwards of $100,000 per month depending on the popularity of the host site and the number of page impressions the particu- lar page containing the banner receives. ad server a type of server that manages and maintains ad banners for a Website or a group of Websites. These programs are capable of keeping track of and re- porting Website usage statistics. Ad servers also provide the ability to rotate banners so a user won’t see the same ad every time she visits the page. adaptive equipment devices of many varieties, some computer controlled or acti- vated, designed to assist people with physical limitations. ADC see analog-to-digital converter. address a number that identifies the location of data, usually on the main disk, but possibly on a server. 7 Alt Adobe Acrobat a reader that decodes, reads and converts documents to the Por- table Document Format (PDF). This program allows scalable graphics and type to be displayed and printed from any computer and from any platform (Macintosh, Windows, DOS, or UNIX) regardless of the fonts or software programs used to create the original. Acrobat is freely available for download- ing on many Websites. see PDF. Adobe Systems Inc. Adobe Systems Inc. is a provider of graphic design, publish- ing, and imaging software for Web and print production. The company offers a line of application software products for creating, distributing, and managing information of all types. Many graphic designers feel Adobe programs have set the industry standard for design and publishing software. agent software operating in the background that performs an automatic and silent task such as information gathering. airbrush a creative tool in many paint programs that simulates the action of a real paint gun on the computer screen. see spray can. ALGOL (Algorithmic Language) developed in the 1950s and early 1960s by an international committee, an early programming language that was the basis for Pascal. alias the use of an icon as a method of starting an application, opening a folder, file or disk. With Macintosh products the alias may be placed anywhere that is convenient such as the Apple menu, the desktop, or a special folder. The title of an alias icon is in italics. In Windows, an alias is known as a shortcut. see shortcut. align to arrange characters, words or images so they line up either horizontally or vertically. Most word processing and drawing programs include commands to make images and text align as needed. allocation unit units of space on a disk that can be identified or designated for a file. Also known as a cluster. Alpha a 64-bit microprocessor manufactured by Digital Equipment Corporation. alphanumeric characters the letters and digits on the standard keyboard. alpha testing the first round of the testing of new software. Alt the prefix used for the “Alternative” key. It is used like the shift key. The result of using the Alt key will vary depending upon the software being used. Alta Vista 8 Alta Vista a popular search engine on the World Wide Web. amazon.com a commercial Website offering more than one million books and mu- sic CDs. The company is determined to maintain a dominant position as an online retailer through the expansion of services including auctions, electronic products, toys, and more. AMD (Advanced Micro Devices) a worldwide semiconductor manufacturer who’s products include a wide variety of industry-standard integrated circuits used in product applications such as telecommunications equipment, data and network communications equipment, consumer electronics, personal computers, and workstations. America Online (AOL) an online information service company that operates two worldwide Internet services, with more than 22 million members, and CompuServe, with more than 2.2 million members, several leading Internet brands including ICQ, AOL Instant Messenger, and Digital City, Inc. AMI (American Megatrends Inc.) The leading supplier of BIOS software used in PC motherboards. Amiga one of the first mass marketed PCs sold by Commodore Business Machines in the 1980s using Motorola microprocessors. analog data represented in a mode other than binary bits such as the image relayed by a scanner. Analog data is represented by one or more of an infinite number of points on a scale or continuum. analog computer a computer that processes and delivers data. An abacus is an analog computer. analog monitor a video device similar to television that can display an unlimited range of brightness for each primary color. An analog monitor can display any color a computer can generate.
Recommended publications
  • 1 Table of Contents List of Figures
    Table of Contents List of Figures ..................................................................................................................... 4 List of Tables ...................................................................................................................... 5 Chapter 1: Introduction....................................................................................................... 6 1.1 Introduction....................................................................................................................6 1.2 Problem Statement .......................................................................................................12 1.3 Thesis Objective...........................................................................................................12 1.4 Thesis Organization.....................................................................................................14 Chapter 2: Intrusion Detection.......................................................................................... 15 2.1 Introduction..................................................................................................................15 2.2 What is an IDS .............................................................................................................15 2.2.1 The Basic Concepts of Intrusion Detection......................................................16 2.2.2 A Generic Intrusion-Detection System.............................................................17 2.2.3 Characteristics of
    [Show full text]
  • My Cloud EX2 Ultra
    My Cloud™ EX2 Ultra Privater Cloud-Speicher Bedienungsanleitung WD Service und Support Sollten Probleme auftreten, geben Sie uns bitte Gelegenheit, sie zu beheben, bevor Sie das Produkt zurücksenden. Viele technische Fragen können über unsere Knowledge Base oder unseren E-Mail-Support unter http://support.wd.com beantwortet werden. Falls Sie dort keine geeignete Antwort finden oder Sie einen persönlichen Kontakt bevorzugen, rufen Sie WD unter der unten angegebenen Telefonnummer Ihres Landes an. Ihr Produkt schließt eine 30-tägige kostenlose telefonische Unterstützung während der Garantiezeit ein. Diese 30-tägige Frist beginnt mit dem Datum Ihres ersten telefonischen Kontakts mit dem technischen Support von WD. Der E-Mail-Support ist für die gesamte Garantiezeit kostenlos, und unsere gesamte Knowledge Base ist rund um die Uhr verfügbar. Damit wir Sie weiterhin über neue Funktionen und Serviceleistungen informieren können, denken Sie bitte daran, Ihr Produkt im Internet zu registrieren unter http://register.wd.com. Zugriff auf den Onlinesupport Auf unserer Produktsupport-Website unter http://support.wd.com können Sie unter den folgenden Themen wählen: Downloads – Laden Sie Treiber, Software und Updates für Ihr WD-Produkt herunter. Registrierung – Registrieren Sie Ihr WD-Produkt, um die neuesten Updates und Sonderangebote zu erhalten. Garantie- und Austauschservices – Informationen über Garantie, Produktersatz (RMA), RMA-Status und Datenwiederherstellung. Knowledge Base – Suchen Sie nach Schlüsselwort, Ausdruck oder Antwort-ID. Installation – Hier finden Sie online Hilfe zur Installation Ihres WD-Produkts oder Ihrer Software. WD Community – Tauschen Sie Ihre Gedanken mit anderen WD-Benutzern aus. Online-Schulungszentrum – Kommen Sie hierhin, um das meiste aus Ihrem privaten Cloud-Speichergerät herauszuholen: (http://www.wd.com/setup).
    [Show full text]
  • Using Remote Desktop Services with Ifix 1
    Proficy iFIX 6.5 Using Remote Desktop Services GE Digital Proficy Historian and Operations Hub: Data Analysis in Context 1 Proprietary Notice The information contained in this publication is believed to be accurate and reliable. However, General Electric Company assumes no responsibilities for any errors, omissions or inaccuracies. Information contained in the publication is subject to change without notice. No part of this publication may be reproduced in any form, or stored in a database or retrieval system, or transmitted or distributed in any form by any means, electronic, mechanical photocopying, recording or otherwise, without the prior written permission of General Electric Company. Information contained herein is subject to change without notice. © 2021, General Electric Company. All rights reserved. Trademark Notices GE, the GE Monogram, and Predix are either registered trademarks or trademarks of General Electric Company. Microsoft® is a registered trademark of Microsoft Corporation, in the United States and/or other countries. All other trademarks are the property of their respective owners. We want to hear from you. If you have any comments, questions, or suggestions about our documentation, send them to the following email address: [email protected] Table of Contents Using Remote Desktop Services with iFIX 1 Reference Documents 1 Introduction to Remote Desktop Services 2 Using iClientTS 2 Understanding the iFIX and Remote Desktop Services 3 File System Support 5 Where to Find More Information on Remote Desktop Services 5 Getting
    [Show full text]
  • Clearing of Cache & Cookies
    Clearing of Cache & Cookies What is cache? Cache memory is temporary memory used to store information that you accessed when visiting web sites. Cache speeds up a computer’s connection time with web sites that have been visited previously by locally storing information about that connection on the computer so that it does not have to be downloaded each time a site is visited. Why should cache be cleared periodically? Cache can become corrupt or outdated. As a result, cache can slow down or prevent a web page’s output and/or connection instead of assisting it. Clearing cache deletes corrupt or outdated data. It also removes unnecessary information stored in memory from sites that were only visited one time. Clearing Cache helps all web surfing not just PAWS. Internet Explorer 8 1. Open the Internet Explorer web browser. 2. Click on Tools. 3. Select Internet Options. 4. From the General Tab, click on Delete under Browsing History. 5. Uncheck Preserve Favorites website data and check both Temporary Internet Files and Cookies. 6. Click Delete. Internet Explorer 7 1. Open the Internet Explorer web browser. 2. Click on Tools. 3. Click on Internet Options. 4. Click on Delete under Browsing History. 5. Click Delete cookies. 6. When prompted, click Yes. 7. Click on Delete Internet Files. 8. When prompted, click Yes. 9. Click Close. 10. Click OK. 11. Close and reopen the browser for the changes to go into effect. Internet Explorer 6 1. Open the Internet Explorer web browser. 2. Click on Tools. 3. Click on Internet Options. 4.
    [Show full text]
  • Browser Wars
    Uppsala universitet Inst. för informationsvetenskap Browser Wars Kampen om webbläsarmarknaden Andreas Högström, Emil Pettersson Kurs: Examensarbete Nivå: C Termin: VT-10 Datum: 2010-06-07 Handledare: Anneli Edman "Anyone who slaps a 'this page is best viewed with Browser X' label on a Web page appears to be yearning for the bad old days, before the Web, when you had very little chance of read- ing a document written on another computer, another word processor, or another network" - Sir Timothy John Berners-Lee, grundare av World Wide Web Consortium, Technology Review juli 1996 Innehållsförteckning Abstract ...................................................................................................................................... 1 Sammanfattning ......................................................................................................................... 2 1 Inledning .................................................................................................................................. 3 1.1 Bakgrund .............................................................................................................................. 3 1.2 Syfte ..................................................................................................................................... 3 1.3 Frågeställningar .................................................................................................................... 3 1.4 Avgränsningar .....................................................................................................................
    [Show full text]
  • American Software, Inc
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 _________________________ FORM 10-K _________________________ (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended April 30, 2020 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number 0-12456 _________________________ AMERICAN SOFTWARE, INC. (Exact name of registrant as specified in its charter) _________________________ Georgia 58-1098795 (State or other jurisdiction of (IRS Employer incorporation or organization) Identification No.) 470 East Paces Ferry Road, N.E. Atlanta, Georgia 30305 (Address of principal executive offices) (Zip Code) (404) 261-4381 Registrant’s telephone number, including area code Securities registered pursuant to Section 12(b) of the Act: Title of each class Trading Symbol Name of each exchange on which registered None None Table of Contents Securities registered pursuant to Section 12(g) of the Act: Class A Common Shares, $0.10 Par Value (Title of class) _________________________ Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes No Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes No Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Netop Remote Control User's Guide
    USER'S GUIDE 27 September 2017 Netop Remote Control User's Guide Copyright© 1981-2017 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business Solutions A/S Bregnerodvej 127 DK-3460 Birkerod Denmark E-mail: [email protected] Internet: www.netop.com Netop™ is a trademark of Netop Business Solutions A/S. All other products mentioned in this document are trademarks of their respective manufacturers. Netop Business Solutions A/S denies any and all responsibility for damages caused directly or indirectly as a result of using this document. The content of this document is subject to change without notice. Netop Business Solutions A/S retains the copyright to this document. The document is optimized for double-sided printing. 27 September 2017 Netop Remote Control User's Guide Contents 1 Overview ....................................................................................................................................................4 1.1 Remote Control modules ...............................................................................................................................................4 1.2 Security ...........................................................................................................................................4 1.3 Communication profiles ...............................................................................................................................................5 2 Managing Hosts ........................................................................................................................................6
    [Show full text]
  • IIS Security and Programming Countermeasures
    IIS Security and Programming Countermeasures By Jason Coombs ([email protected]) Introduction This is a book about how to secure Microsoft Internet Information Services for administrators and programmers whose work includes a requirement for information security, a computer industry specialty field commonly referred to as infosec. In this book the terms information security and infosec are used interchangeably with the more friendly term data security. This is not a book about hacking, cracking, and the tools and techniques of the bad guys, the so-called black hat hackers. This book teaches computer professionals and infosec specialists how to build secure solutions using IIS. It is your duty to secure and defend networked information systems for the benefit of the good guys who are your end users, clients, or less technical coworkers. There is nothing you can do that will transform a programmable computer running Microsoft Windows from its vulnerable condition to an invulnerable one. Every general purpose programmable computer is inherently vulnerable because it is controlled by software and is designed to allow new software to be installed or executed arbitrarily. Network computing based on programmable general purpose computers will never be safe from an information security perspective. Eliminating the feature of general purpose programmability from a networked computer and replacing its software with firmware reduces but does not eliminate vulnerabilities. These are immutable realities of present day computing and, as always, reality represents your biggest challenge. Microsoft is in business to get as much of your money as possible using whatever means will work at a given moment and in this respect they know virtually no equal in the software business.
    [Show full text]
  • Microsoft Offerings for Recommended Accounting Pos Software
    Microsoft Offerings For Recommended Accounting Pos Software Is Broddy dried or zymogenic when inditing some zlotys sandbags deceptively? Geocentric and forkier Steward still flocculated his confluence defiantly. Rufus never crackle any phosphenes bedim wrongly, is Pascale worldwide and haunted enough? Users to segment leads through a cash flow, look into actionable next steps: pos for microsoft accounting software offerings, do integrate two factors like docs and We help users oversee the market for microsoft accounting software offerings pos systems we dig deep data according to use rights or feedback on many benefits. Digital Insight CGI IT UK Ltd. Using Spruce, Chic Lumber Increases efficiency and gains management insights. Power bi reports customization, then evaluate and accounting for more informed decisions across the. The GPS OCX program also will reduce cost, schedule and technical risk. Pos software is a credit card, or service software offerings for microsoft accounting pos captures guest details such as an online, customer insights they require. Or you can even download apps to track team performance. POS providers offer a free trial, but you should look for a company that does. Pricing is available on request and support is extended via phone and other online measures. Help inside business owners know that makes it solutions built to perform administrative offices in hand so integration, price for retailers with offers software offerings for pos system! The app provides time tracking features to see how long crucial tasks take. These virtual desktops are accessed from either PCs, thin clients, or other devices. When the subscription ends the institution will no longer have access to subscription benefits or new activations or product keys, however, they receive perpetual use rights to any software obtained during the subscription term and may continue to use the products.
    [Show full text]
  • Computer Malpractice and Other Legal Problems Posed by Computer Vaporware
    Volume 33 Issue 5 Article 4 1988 Computer Malpractice and Other Legal Problems Posed by Computer Vaporware Ronald N. Weikers Follow this and additional works at: https://digitalcommons.law.villanova.edu/vlr Part of the Computer Law Commons, Contracts Commons, and the Torts Commons Recommended Citation Ronald N. Weikers, Computer Malpractice and Other Legal Problems Posed by Computer Vaporware, 33 Vill. L. Rev. 835 (1988). Available at: https://digitalcommons.law.villanova.edu/vlr/vol33/iss5/4 This Comment is brought to you for free and open access by Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Villanova Law Review by an authorized editor of Villanova University Charles Widger School of Law Digital Repository. Weikers: Computer Malpractice and Other Legal Problems Posed by Computer V 1988] "COMPUTER MALPRACTICE" AND OTHER LEGAL PROBLEMS POSED BY COMPUTER "VAPORWARE" I. INTRODUCTION The computer hardware' and software 2 trade is extremely compli- cated in that manufacturers, distributors and retailers must contend with thousands of available computer systems and parts, various financing and pricing concerns, training and retaining salespeople and much more.3 Nonetheless, the picture has recently become further clouded by 1. The term "computer hardware" describes the physical computer equip- ment. Typically, the hardware comprising a "personal computer system" con- sists of a "central processing unit"-the main body of the computer housing the processing circuitry and disk drives-, a video display monitor, and a printer. See Note, Copyright Infringement of Computer Programs: A Modification of the Substantial Similarity Test, 68 MINN. L. REV. 1264, 1264 n.1 (1984); Management Sys.
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 21 Release Notes Symantec Netrecon Security Update 21 Release Notes
    Symantec NetRecon™ 3.6 Security Update 21 Release Notes Symantec NetRecon Security Update 21 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040831 Copyright Notice Copyright 2004 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]
  • Symantec Netrecon™ 3.6 Security Update 24 Release Notes Symantec Netrecon Security Update 24 Release Notes
    Symantec NetRecon™ 3.6 Security Update 24 Release Notes Symantec NetRecon Security Update 24 Release Notes The software that is described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: v3.6 040930 Copyright Notice Copyright 2005 Symantec Corporation. All Rights Reserved. Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice. No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014. Trademarks Symantec and the Symantec logo are U.S. registered trademarks, and Symantec NetRecon, Symantec Enterprise Security Architecture, Symantec Enterprise Security Manager, LiveUpdate, and Symantec Security Response are trademarks of Symantec Corporation. Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Printed in the United States of America. 3 Technical support As part of Symantec Security Response, the Symantec Global Technical Support group maintains support centers throughout the world.
    [Show full text]