Computers in Your Life PDF

Document Details

AdvantageousNashville

Uploaded by AdvantageousNashville

null

null

Eng Abdallah Hussein

Tags

computer science computer computer history technology

Summary

This is an introduction to the world of computers. It explains the importance of learning about computers today, defines a computer, lists milestones in computer evolution, and details the major parts of a personal computer.

Full Transcript

40 INTRODUCTION S U M M A RY COMPUTERS IN YOUR LIFE Chapter Objective 1: Computers appear almost everywhere in today’s worl...

40 INTRODUCTION S U M M A RY COMPUTERS IN YOUR LIFE Chapter Objective 1: Computers appear almost everywhere in today’s world, and most people need to use a Explain why it is essential to computer or a computerized device frequently on the job, at home, at school, or while learn about computers today on the go. Computer literacy, which is being familiar with basic computer concepts, and discuss several ways helps individuals feel comfortable using computers and is a necessary skill for every- computers are integrated into one today. our business and personal Computers abound in today’s homes, schools, workplaces, and other locations. Most lives. students and employees need to use a computer for productivity, research, or other impor- tant tasks. Individuals often use computers at home and/or carry portable computers or mobile devices with them to remain in touch with others or to use Internet resources on a continual basis. Individuals also frequently encounter computers while on the go, such as consumer kiosks and point-of-sale (POS) systems. WHAT IS A COMPUTER AND WHAT DOES IT DO? Chapter Objective 2: A computer is a programmable electronic device that accepts input; performs processing Define a computer and operations; outputs the results; and provides storage for data, programs, or output when describe its primary needed. Most computers today also have communications capabilities. This progression operations. of input, processing, output, and storage is sometimes called the information processing cycle. Data is the raw, unorganized facts that are input into the computer to be processed. Data that the computer has processed into a useful form is called information. Data can exist in many forms, representing text, graphics, audio, and video. Chapter Objective 3: One of the first calculating devices was the abacus. Early computing devices that pre- List some important mile- date today’s computers include the slide rule, the mechanical calculator, and Dr. Herman stones in computer evolution. Hollerith’s Punch Card Tabulating Machine and Sorter. First-generation computers, such as ENIAC and UNIVAC, were powered by vacuum tubes; second-generation computers used transistors; and third-generation computers were possible because of the invention of the integrated circuit (IC). Today’s fourth-generation computers use microprocessors and are frequently connected to the Internet and other networks. Fifth-generation computers are emerging and are, at the present time, based on artificial intelligence. Chapter Objective 4: A computer is made up of hardware (the actual physical equipment that makes up Identify the major parts of a the computer system) and software (the computer’s programs). Common hardware com- personal computer, includ- ponents include the keyboard and mouse (input devices), the CPU (a processing device), ing input, processing, output, monitors/display screens and printers (output devices), and storage devices and storage storage, and communications media (such as CDs, DVD drives, hard drives, USB flash drives, and flash memory cards). hardware. Most computers today also include a modem, network adapter, or other type of communi- cations device to allow users to connect to the Internet or other network. Chapter Objective 5: All computers need system software, namely an operating system (usually Windows, Define software and under- Mac OS, or Linux), to function. The operating system assists with the boot process, and stand how it is used to then controls the operation of the computer, such as to allow users to run other types of instruct the computer what software and to manage their files. Most software programs today use a variety of graph- to do. ical objects that are selected to tell the computer what to do. The basic workspace for Windows’ users is the Windows desktop. Application software (also called apps) consists of programs designed to allow people to perform specific tasks or applications, such as word processing, Web browsing, photo touch-up, and so on. Software programs are written using a programming language. Programs are written by programmers; computer users are the people who use computers to perform tasks or obtain information. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 1 INTRODUCTION TO THE WORLD OF COMPUTERS 41 COMPUTERS TO FIT EVERY NEED Embedded computers are built into products (such as cars and household appliances) to Chapter Objective 6: INT give them added functionality. Mobile devices are small devices (such as mobile phones List the six basic types of and media tablets) with computing or Internet capabilities; an Internet-enabled mobile computers, giving at least phone is called a smartphone. one example of each type Small computers used by individuals at home or work are called personal computers of computer and stating (PCs) or microcomputers. Most personal computers today are either desktop computers what that computer might or portable computers (notebook computers, laptop computers, tablet computers, be used for. hybrid notebook-tablet computers, and netbooks) and typically conform to either the PC-compatible or Mac standard. Thin clients are designed solely to access a network; Internet appliances are ordinary devices that can be used to access the Internet. Medium-sized computers, or servers, are used in many businesses to host data and pro- grams to be accessed via the company network. A growing trend is virtualization, such as creating separate virtual environments on a single server that act as separate servers or deliv- ering each users’ desktop to his or her device. The powerful computers used by most large businesses and organizations to perform the information processing necessary for day-to-day operations are called mainframe computers. The very largest, most powerful computers, which typically run one application at a time, are supercomputers. COMPUTER NETWORKS AND THE INTERNET Computer networks are used to connect individual computers and related devices so that Chapter Objective 7: users can share hardware, software, and data as well as communicate with one another. Explain what a network, The Internet is a worldwide collection of networks. Typically, individual users connect the Internet, and the World to the Internet by connecting to computers belonging to an Internet service provider Wide Web are, as well as (ISP)—a company that provides Internet access, usually for a fee. One resource available how computers, people, through the Internet is the World Wide Web (WWW)—an enormous collection of Web and Web pages are identi- pages located on Web servers. The starting page for a Web site (a related group of Web fied on the Internet. pages) is called the home page for that site. Web pages are viewed with a Web browser, are connected with hyperlinks, and can be used for many helpful activities. To access a computer network, you need some type of modem or network adapter. Chapter Objective 8: To access the Internet, an Internet service provider (ISP) is also used. Internet addresses Describe how to access are used to identify resources on the Internet and include numerical IP addresses and a Web page and navigate text-based domain names (used to identify computers), Uniform Resource Locators or through a Web site. URLs (used to identify Web pages), and e-mail addresses (a combination of a username and domain name that is used to send an individual e-mail messages). Web pages are displayed by clicking hyperlinks or by typing appropriate URLs in the browser’s Address bar. Favorites/Bookmarks and the History list can be used to redisplay a previously visited Web page and search sites can be used to locate Web pages matching speci- fied criteria. Electronic mail (e-mail) is used to send electronic messages over the Internet. COMPUTERS AND SOCIETY Computers and devices based on related technology have become indispensable tools for Chapter Objective 9: modern life, making ordinary tasks easier and quicker than ever before and helping make Discuss the societal impact today’s worker more productive than ever before. In addition to the benefits, however, of computers, including there are many risks and societal implications related to our heavy use of the Internet and some benefits and risks the vast amount of information available through the Internet. Issues include privacy and related to their prominence security risks and concerns (such as malware, identity theft, phishing, and spam), the dif- in our society. ferences in online and offline communications, the anonymity factor, and the amount of unreliable information that can be found on the Internet. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 42 INTRODUCTION R EVI EW ACTIVITI E S KEY TERM Instructions: Match each key term on the left with the definition on the right that best describes it. MATCHING 1. A collection of related Web pages usually belonging to an organization or individual. a. computer 2. An Internet address, usually beginning with http://, that uniquely identifies a Web page. b. hardware 3. A programmable, electronic device that accepts data input, performs processing c. Internet operations on that data, and outputs and stores the results. d. processing 4. A portable computer about the size of a notebook that is designed to be used with a digital pen. e. software 5. Performing operations on data that has been input into a computer to convert that f. storage input to output. g. supercomputer 6. The operation of saving data, programs, or output for future use. h. tablet computer 7. The fastest, most expensive, and most powerful type of computer. i. Uniform Resource Locator 8. The instructions, also called computer programs, that are used to tell a computer (URL) what it should do. j. Web site 9. The largest and most well-known computer network, linking millions of computers all over the world. 10. The physical parts of a computer system, such as the keyboard, monitor, printer, and so forth. SELF-QUIZ Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. Answers for the self-quiz are located in the References and Resources Guide at the end of the book. 1. T F A mouse is one common input device. 2. T F Software includes all the physical equipment in a computer system. 3. T F A computer can run without an operating system if it has good application software. 4. T F One of the most common types of home computers is the server. 5. T F An example of a domain name is microsoft.com. 6. is the operation in which data is entered into the computer. 7. A(n) computer is a portable computer designed to function as both a notebook and a tablet PC. 8. is frequently used with servers today to create several separate environments on a single server that function as separate servers. 9. Electronic messages sent over the Internet that can be retrieved by the recipient at his or her convenience are called. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 1 INTRODUCTION TO THE WORLD OF COMPUTERS 43 10. Write the number of the term that best matches each of the following descriptions in the blank to the left of its description. a. Allows access to resources located on the Internet. 1. Application software INT b. Supervises the running of all other programs on the computer. 2. Operating system c. Enables users to perform specific tasks on a computer. 3. Programming language d. Allows the creation of application programs. 4. Web browser 1. For the following list of computer hardware devices, indicate the principal function of each EXERCISES device by writing the appropriate letter—I (input device), O (output device), S (storage device), P (processing device), or C (communications device)—in the space provided. a. CPU d. Keyboard g. Speakers b. Monitor e. Hard drive h. DVD drive c. Mouse f. Modem i. Microphone 2. Supply the missing words to complete the following statements. a. The Internet is an example of a(n) , a collection of computers and other devices connected together to share resources and communicate with each other. b. The starting page for a Web site is called the site’s. c. For the e-mail address [email protected], jsmith is the and cengage.com is the name. d. The e-mail address pronounced bill gee at microsoft dot com is written. 3. What are three differences between a desktop computer and a portable computer? 4. List two reasons why a business may choose to network its employees’ computers. 5. If a computer manufacturer called Apex created a home page for the Web, what would its URL likely be? Also, supply an appropriate e-mail address for yourself, assuming that you are employed by that company. 1. There is usually a positive side and a negative side to each new technological improvement. DISCUSSION Select a technology you use every day and consider its benefits and risks. What benefits does the technology provide? Are there any risks involved and, if so, how can they be minimized? If you QUESTIONS chose not to use this technology because of the possible risks associated with it, how would your life be affected? Who should determine if the benefits of a new technology outweigh the poten- tial risks? Consumers? The government? 2. The ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but will misuse of new improvements to this technology result in the loss of that convenience? For instance, camera phones are now banned in many fitness centers, park restrooms, and other simi- lar facilities because some people have used them inappropriately to take compromising photos, and mobile phones are banned in many classrooms because of the disruption of constant text messaging and the use of the phone by dishonest students to cheat on exams. Do you think these reactions to mobile phone misuse are justified? Is there another way to ensure the appropriate use of mobile phones without banning their use for all individuals? Should there be more stringent consequences for those who use technology for illegal or unethical purposes? Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 44 INTRODUCTION PR OJ E CTS HOT TOPICS 1. Mobile TV As discussed in this chapter, TV is one of the newest entertainment options avail- able for smartphones. From live TV to video clips and movies, mobile TV is taking off. For this project, investigate the mobile TV options available today. Find at least two services and compare features, such as cost, compatibility, channels, and programming. Do your selected services offer live TV, video-on-demand, or both? If you have a smartphone, are any of the ser- vices available through your mobile provider? Are there currently Web sites where mobile users can view episodes of TV shows for free, like personal computer users can? What is the current status of the push by the Open Mobile Video Coalition to have a free mobile TV standard across the United States? Have you ever watched TV on a smartphone? If so, how do you rate your expe- rience and would you do it again? If not, would you want to watch TV on a smartphone? Do you think mobile TV is the wave of the future? Why or why not? At the conclusion of your research, prepare a one-page summary of your findings and opinions and submit it to your instructor. SHORT ANSWER/ 2. Buying a New PC New personal computers are widely available directly from manufacturers, as well as in retail, computer, electronic, and warehouse stores. Some stores carry only stan- RESEARCH dard configurations as set up by the manufacturers; others allow you to customize a system. For this project, assume that you are in the market for a new personal computer. Give some thought to the type of computer (such as desktop, notebook, or tablet computer) that best fits your lifestyle and the tasks you wish to perform (such as the application programs you wish to use, how many programs you wish to use at one time, and how fast you desire the response time to be). Make a list of your hardware and software requirements (refer to the “Guide to Buying a PC” in the References and Resources Guide at the end of this book, if needed), being as specific as possible. By researching newspaper ads, manufacturer Web sites, and/or systems for sale at local stores, find three systems that meet your minimum requirements. Prepare a one-page com- parison chart, listing each requirement and how each system meets or exceeds it. Also include any additional features each system has, and information regarding the brand, price, delivery time, shipping, sales tax, and warranty for each system. On your comparison sheet, mark the system that you would prefer to buy and write one paragraph explaining why. Turn in your com- parison sheet and summary to your instructor, stapled to copies of the printed ads, specifications printed from Web sites, or other written documentation that you collected during this project. HANDS ON 3. The Internet The Internet and World Wide Web are handy tools that can help you research topics covered in this textbook, complete many of the projects, and perform the online activi- ties available via the textbook’s Web site that are designed to enhance your learning and help you prepare for exams on the content covered in this textbook. For this project, find an Internet-enabled computer on your campus, at home, or at your public library and perform the following tasks, then submit your results and printout to your instructor. (Note: Some of the answers will vary from student to student.) a. Open a browser and the Google search site. Enter the search terms define: Internet to search for definitions of that term. Click on one result to display the definition. Use your browser’s Print option to print the page. b. Click your browser’s Back button to return to the Google home page. Use your browser’s Bookmark or Favorites feature to bookmark the page. Close your browser. c. Reopen your browser and use its Bookmark or Favorites feature to redisplay the Google home page. d. Google yourself to see if you can find any information online. On your printout from part a, indicate how many hits were returned for this search and if any on the first page of hits really contained information about yourself. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 1 INTRODUCTION TO THE WORLD OF COMPUTERS 45 4. Gossip Sites A recent trend on college campuses today is the use of campus gossip sites, ETHICS IN ACTION where students can post campus-related news, rumors, and basic gossip. These sites were INT originally set up to promote free speech and to allow participants to publish comments anony- mously without repercussions from school administrators, professors, and other officials. However, they are now being used to post vicious comments about others. What do you think of campus gossip sites? Is it ethical to post a rumor about another individual on these sites? How would you feel if you read a posting about yourself on a gossip site? School administra- tors cannot regulate the content because the sites are not sponsored or run by the college, and federal law prohibits Web hosts from being liable for the content posted by its users. Is this ethical? What if a posting leads to a criminal act, such as a rape, murder, or suicide? Who, if anyone, should be held responsible? For this project, form an opinion about the ethical ramifications of gossip Web sites and be prepared to discuss your position (in class, via an online class discussion group, in a class chat room, or via a class blog, depending on your instructor’s directions). You may also be asked to write a short paper expressing your opinion. 5. Online Education The amount of distance learning available through the Internet and World PRESENTATION/ Wide Web has exploded in the last couple of years. A few years ago, it was possible to take an occasional course online—now, an entire college degree can be earned online. DEMONSTRATION For this project, look into the online education options available at your school and two other colleges or universities. Compare and contrast the programs in general, including whether or not the institution is accredited, the types of courses available online, whether or not an entire certificate or degree can be earned online, and the required fees. Next, select one online course and research it more closely. Find out how the course works in an online format—including whether or not any face-to-face class time is required, whether assign- ments and exams are submitted online, which software programs are required, and other course requirements—and determine if you would be interested in taking that course. Share your findings with the class in the form of a short presentation. The presentation should not exceed 10 minutes and should make use of one or more presentation aids, such as a whiteboard, handouts, or a computer-based slide presentation (your instructor may provide additional requirements). You may also be asked to submit a summary of the presentation to your instructor. 6. Should Social Media Activity Cost You a Job? When you apply for a new job, there’s a good BALANCING ACT chance that the company will take a look at your social media activity, such as your Facebook page, blog activity, and even Craigslist listings. In fact, many companies now require job applicants to pass a social media background check before offering them a job. Companies are trying to protect themselves by looking for such things as racist remarks and illegal activi- ties, as well as get a feel for whether or not an individual would be a good fit for the company. But should individuals have to risk losing a job if they post a photo of themselves in a racy Halloween costume or make an offhand comment that an employer may misinterpret? What if a company denies you a job based on inaccurate information or information they wouldn’t be allowed to ask in a job interview, such as information relating to your age, race, gender, religion, and so forth? And what if someone else posts and tags a questionable photo of you— should a potential employer be able to use that or other third-party information to make a decision about your future? To be safe, should job applicants have to abstain from social media activity in order to protect themselves, even though such sites are typically viewed as places to casually interact with others on personal free time? Or is everything a potential employer finds online fair game? Pick a side on this issue, form an opinion and gather supporting evidence, and be pre- pared to discuss and defend your position in a classroom debate or in a 1–2 page paper, depending on your instructor’s directions. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 206 SOFTWARE S U M M A RY SYSTEM SOFTWARE VS. APPLICATION SOFTWARE Chapter Objective 1: System software consists of the programs that coordinate the activities of a computer Understand the difference system. The basic role of system software is to act as a mediator between application between system software software (programs that allow a user to perform specific tasks on a computer, such as word and application software. processing, playing a game, preparing taxes, browsing the Web, and so forth) and the com- puter system’s hardware, as well as between the computer and the user. THE OPERATING SYSTEM Chapter Objective 2: A computer’s operating system is the primary system software program; it manages the Explain the different functions computer system’s resources and interfaces with the user. The essential portion, or core, of an operating system and of an operating system is called its kernel. The functions of the operating system include discuss some ways that booting the computer, configuring devices and device drivers (often simply called drivers), operating systems enhance communicating with the user, managing and monitoring computer resources, file manage- processing efficiency. ment, and security. File management programs allow the user to manage the enormous col- lection of files typically found on a computer’s hard drive by organizing files hierarchically into folders. To access a file in any directory, the user can specify the path to the file; the path identifies the drive and folders the user must navigate through in order to access the file. A variety of processing techniques can be built into operating systems to help enhance processing efficiency. Multitasking allows more than one program to be open at one time; multithreading allows for rotation between program threads; and multiprocessing and par- allel processing involve using two or more CPUs (or CPU cores) to perform work at the same time. Operating systems typically use virtual memory to extend conventional mem- ory by using a portion of the hard drive as additional memory, and buffering and spooling free up the CPU from delays by storing data that is used by different hardware devices or programs that may operate at different speeds in a buffer. Chapter Objective 3: Some of the differences among operating systems center around whether they use a List several ways in which graphical user interface (GUI) or command line interface, whether they are a personal operating systems differ from (desktop) operating system designed for individual users or a server (network) operat- one another. ing system designed for multiple users, and the types and numbers of processors supported. Operating systems that are used with mobile devices or are embedded in other devices are called mobile operating systems or embedded operating systems, respectively. OPERATING SYSTEMS FOR PERSONAL COMPUTERS AND SERVERS Chapter Objective 4: One of the original operating systems for IBM and IBM-compatible personal computers Name today’s most widely was DOS (Disk Operating System), which is still in existence but not widely used. Most used operating systems for desktop computers today run a version of Windows. Windows 3.x, the first widely used ver- personal computers and sion of Windows, was an operating environment that added a GUI shell to DOS, replacing servers. the DOS command line interface with a system of menus, icons, and screen boxes called windows. Windows 95, Windows 98, Windows NT, Windows Me, Windows 2000, Windows XP, Windows Vista, and Windows 7—all full-fledged operating systems and successors to Windows 3.x—each included an increasing number of enhancements, such as multitasking, a better user interface, and more Internet, multimedia, and communications functions. The current personal version of Windows is Windows 8, which uses a new tile interface; the cur- rent network version of Windows (Windows Server) is Windows Server 2012. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 5 SYSTEM SOFTWARE: OPERATING SYSTEMS AND UTILITY PROGRAMS 207 Mac OS is the operating system used on Apple computers. The current personal ver- sion is Mac OS X (and includes Mac OS X Mountain Lion and Mac OS X Mavericks); Mac OS X Server is designed for server use. UNIX is a flexible operating system that was originally developed for use with midrange servers, but is now available for a variety of devices. UNIX comes in many versions or UNIX flavors and is the basis of several other operating systems, including Mac OS. The open source Linux operating system has gathered popularity because it is distributed free over the Internet and can be used as an alternative to Windows and Mac OS. Linux has earned support as a mainstream operat- ing system in recent years and is being used in computers of all sizes, from netbooks to supercomputers. OPERATING SYSTEMS FOR MOBILE DEVICES Mobile phones and mobile devices usually require a different operating system than a Chapter Objective 5: desktop computer or server, although many mobile operating systems are mobile versions State several devices other of desktop operating systems. Widely used mobile operating systems include Windows than personal computers Phone, Windows RT, Android, iOS, BlackBerry OS, and Ubuntu. Other everyday and servers that require devices that contain a computer—such as cars, cash registers, and consumer electronics an operating system and SW devices—typically use an embedded operating system, such as Windows Embedded. list one possible operating system for each type of device. OPERATING SYSTEMS FOR LARGER COMPUTERS High-end servers, mainframes, and supercomputers may use an operating system designed specifically for that type of system, but are increasingly using customized versions of con- ventional operating systems, such as Windows, UNIX, and Linux. UTILITY PROGRAMS A utility program is a type of system software written to perform specific tasks usually Chapter Objective 6: related to maintaining or managing the computer system. File management programs Discuss the role of util- enable users to perform file management tasks, such as copying, moving, and deleting ity programs and outline files. The file management system built into Windows is File Explorer. Search tools are several tasks that these designed to help users find files on their hard drives; diagnostic and disk management programs perform. programs are used mainly to diagnose and repair computer problems, such as hard drive errors and files deleted accidentally, as well as maintenance tasks, such as performing disk defragmentation. Uninstall utilities remove programs from a hard drive without leaving annoying remnants behind, file compression programs reduce the stored size of files so they can be more easily archived or sent over the Internet, and backup programs make it easier for users to back up the contents of their hard drive. There are also a number of security-oriented utility programs, such as antivirus, antispyware, and firewall programs. THE FUTURE OF OPERATING SYSTEMS In the future, operating systems will likely become even more user-friendly, voice-driven, Chapter Objective 7: and stable, repairing themselves when needed and causing errors and conflicts much less Describe what the operat- frequently. They will also likely continue to include improved security features, support ing systems of the future for new technologies, and assistance for coordinating data and activities among a user’s might be like. various computing and communications devices. They may also one day be designed pri- marily for accessing cloud applications. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 208 SOFTWARE R EVI EW ACTIVITI E S KEY TERM Instructions: Match each key term on the left with the definition on the right that best describes it. MATCHING 1. A duplicate copy of data or other computer content for use in the event that the origi- nal version is destroyed. a. Android 2. A Linux-based operating system designed for mobile devices and developed by the b. backup Open Handset Alliance, which is a group of companies led by Google. c. device driver 3. A memory-management technique that uses hard drive space as additional RAM. d. kernel 4. A program that enables an operating system to communicate with a specific hard- ware device. e. multitasking 5. A type of software that performs a specific task, usually related to managing or f. operating system maintaining a computer system. g. spooling 6. The capability of an operating system to run more than one program at one time. h. utility program 7. The essential portion, or core, of an operating system. i. virtual memory 8. The main component of system software that enables a computer to operate, manage j. Windows its activities and the resources under its control, run application programs, and interface with the user. 9. The primary personal computer operating system developed by Microsoft Corporation. 10. The process of placing items in a buffer so the appropriate device (such as a printer) can retrieve them when needed. SELF-QUIZ Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. Answers for the self-quiz are located in the References and Resources Guide at the end of the book. 1. T F Windows 8 is an example of an operating system. 2. T F Most operating systems today use a command line interface. 3. T F Mobile devices, such as media tablets and mobile phones, typically require an operating system. 4. T F File Explorer is an operating system designed for mobile phones. 5. T F Windows Phone is a versatile operating system designed to be used on a variety of computer types, such as mainframes, servers, personal computers, and mobile phones. 6. refers to the ability of an operating system to have more than one program open at one time. 7. is the operating system used with iPhones and iPads. 8. To decrease the size of a file, a(n) utility program can be used. 9. To guard against losing your data if a computer problem occurs, you should your data files on a regular basis. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 5 SYSTEM SOFTWARE: OPERATING SYSTEMS AND UTILITY PROGRAMS 209 10. Match each device to the most appropriate operating system and write the corresponding number in the blank to the left of the device. a. Home office computer 1. Windows Embedded b. Mainframe computer 2. Android c. Media tablet 3. Windows 8 d. ATM machine 4. UNIX 1. For the following path, identify the drive the document is located on, the name of the file EXERCISES (including its file extension), and whether or not the document is stored inside a folder. If the file is stored inside one or more folders, list the folder name(s). C:\ My Documents\Resume.docx 2. Match each program or processing technique with the appropriate term and write the corre- sponding number in the blank to the left of each term. a. Zipped file 1. Spooling SW b. Printer 2. File management program c. Swap file 3. File compression program d. Folder 4. Virtual memory 3. Would a new notebook computer typically have Windows XP, Windows 8, Windows Phone 8, or Windows Server 2012 installed as its operating system? Explain your answer. 4. What type of utility program is designed to automatically make duplicate copies of your hard drive content for safekeeping? 5. Identify the purpose of each of the following types of utility programs. a. File management program b. Uninstall utility c. File compression program d. Antivirus program 1. There are a few companies, such as Microsoft and Google, that have moved into many different DISCUSSION areas of computing, such as operating systems, application software, cloud software, search, and more, and both of these companies have been accused of monopolistic procedures. Is there QUESTIONS a risk for the consumer or for businesses if one company is involved with so many different aspects of computing? Should this be prohibited or should the natural order of the free market be trusted to prevent areas of computing from being monopolized by one company? 2. As discussed in the chapter, many everyday devices—including cars and other vehicles—are con- trolled by operating systems. There are advantages, such as avoiding possible driver errors and the ability to change the speed of or reroute trains automatically to avoid collisions. But are there poten- tial risks, as well? For example, Thailand’s Finance Minister once had to be rescued from inside his limousine after the onboard computer malfunctioned, leaving the vehicle immobilized and the door locks, power windows, and air conditioning not functioning. Do you think the benefits of increased automation of devices that could put us in danger if they malfunction outweigh the risks? What types of safeguards should be incorporated into computer-controlled cars, subway trains, and other automated vehicles? What about medication dispensers and other automated medical devices? Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 210 SOFTWARE PR OJ E CTS HOT TOPICS 1. New OSs There have been a number of new operating systems developed in the past few years, such as Android, Windows RT, and Google Chrome OS. For this project, select one new or emerging operating system and research it. What is the purpose and targeted market for this operating system? What advantages does it have over any current competition for this market? If the operating system was developed to fulfill a new need, are there other operating systems that are being adapted or being developed as a result? Do you think your selected operating system will succeed? Why or why not? At the conclusion of your research, prepare a one- to two-page summary of your findings and opinions and submit it to your instructor. SHORT ANSWER/ 2. File Compression As described in the chapter, compression programs can be used to reduce the size of files before they are stored or sent over the Internet. The most common compres- RESEARCH sion programs create files with the file extensions.zip,.sit,.sitx, and.exe. Self-extracting compressed files decompress automatically when you download them, while compressed files must be decompressed with a version of the program that compressed them. For this project, identify compression programs associated with each of the file exten- sions listed above and determine which extensions represent a self-extracting format, as well as which extensions are associated with the Windows and Mac OS operating systems. For the type of computer you use most often, find at least two compression programs that you might use and compare their costs and capabilities. At the conclusion of your research, prepare a one-page summary of your findings and submit it to your instructor. HANDS ON 3. File Practice As discussed in the chapter, all operating systems have a file management system, such as the File Explorer program illustrated in Figures 5-21 and 5-22. For this project, obtain a removable storage medium (such as a USB flash drive) appropriate for a computer you have access to, connect it to that computer, and perform the following tasks. a. Open the file management program and select the icon representing the removable storage medium being used to display its contents. Are there any files on the storage medium? How much room is available on the storage medium? b. Open any word processing program available on your computer (such as Word or Notepad for a Windows computer). Create a new document consisting of just your name, then save the document to your storage medium (be sure to change the save location to the appropriate drive and use an appropriate filename). In the file management program, view the content of your storage medium to see the new document. What is the file size and how much room is now left on your storage medium? c. Prepare a short summary of your work to submit to your instructor, listing the software programs and storage medium used, the name and size of the file, and the amount of space left on your storage medium once the file was stored on it. d. Return to your file management program and delete the file from your storage medium. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 5 SYSTEM SOFTWARE: OPERATING SYSTEMS AND UTILITY PROGRAMS 211 4. Operating System Bugs Most software, including operating systems, is not error free when it ETHICS IN ACTION is first released. Some programs, in fact, contain thousands of problems, called bugs. Software companies regularly release fixes (called patches) to correct known issues with released software. Is it ethical for software companies to release products that have known problems? Many hackers and other criminals target these bugs with computer viruses or other attacks, frequently on the day a new vulnerability is announced—called a zero-day attack. Obviously, the acts by these criminals are not ethical, but what responsibility does a software company have to consumers if they are put at risk due to the company’s carelessness or rush to market? What responsibility do consumers have to make sure they keep their computers patched against new vulnerabilities? For this project, form an opinion about the ethical ramifications of software bugs and be prepared to discuss your position (in class, via an online class discussion group, in a class chat room, or via a class blog, depending on your instructor’s directions). You may also be asked to write a short paper expressing your opinion. 5. OS Support No matter which operating system you have, it’s likely you will eventually need PRESENTATION/ SW to get some help resolving a problem. Support options typically include the following: search- able knowledge bases, technical support phone numbers and e-mail addresses, online chat, DEMONSTRATION FAQs, and user discussion groups. For this project, select one operating system and go to the manufacturer’s Web site to determine which of the support options listed in the previous paragraph are available. Select one support option and find out how it is used and what type of information can be obtained. Share your findings with the class in the form of a short presentation. The presentation should not exceed 10 minutes and should make use of one or more presentation aids, such as a white- board, handouts, or a computer-based slide presentation (your instructor may provide addi- tional requirements). You may also be asked to submit a summary of the presentation to your instructor. 6. Are Computerized Cars a Cyber Threat? As discussed in this chapter, cars are continually BALANCING ACT getting smarter and these features are supposed to help make us safer. But do they put us at risk as well? Today’s cars are essentially computers on wheels and computers can be hacked. What if a hacker infects a car with malware and takes control of the car’s speed, braking, and other vital systems? Researchers have already shown that such an attack is possible. There are a number of access points available to hackers, such as the car’s entertainment system, the car’s Internet connection—even the tire pressure monitoring system. Could hackers be hired as hit men to murder selected individuals by taking control of their cars? What about terrorists introducing a virus to large numbers of cars as a terrorist act? Do we need new laws to make hacking cars illegal? Should security companies be developing antivirus software for cars? Will we get to the point where we’ll need to run a virus scan before we can safely use our vehicles? Are the benefits of computerized cars worth the potential risks? Pick a side on this issue, form an opinion and gather supporting evidence, and be prepared to discuss and defend your position in a classroom debate or in a 1–2 page paper, depending on your instructor’s directions. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 246 SOFTWARE S U M M A RY THE BASICS OF APPLICATION SOFTWARE Chapter Objective 1: Application software (or an app) is software designed to carry out a specific task. Common Describe what application types of application software include games, Web browsers, word processing programs, software is, the different multimedia software, and more. Many application software programs today are commer- types of ownership rights, cial software programs that are developed and sold for a profit. When a software program and the difference between is purchased, individual users receive a software license authorizing them to use the soft- installed and cloud software. ware. Some commercial software is available in a demo or trial version. Other software is available as shareware, freeware, or public domain software. Open source software is the term for programs whose source code is available to the general public. Software is designed as either desktop software or mobile software. Installed software is installed on a local computer or network server; cloud software, which is also called Software as a Service (SaaS) and cloudware, is run from the Internet instead. Organizations that pro- vide cloud software are referred to as application service providers (ASPs). Chapter Objective 2: Many office-oriented programs are sold bundled together as a software suite. One Detail some concepts and of the most widely used software suites is Microsoft Office. Although they are used for commands that many different purposes, most application software programs share some of the same concepts software programs have in and functions, such as similar document-handling operations and help features. For common. instance, documents are commonly opened, saved, printed, edited, and formatted in a sim- ilar manner. Editing a document changes its content; formatting a document changes its appearance (such as by changing the font face, font size, or font style of text or by changing the line spacing or margins). Commands can be issued via a variety of methods, such as by using menus, toolbars, keyboard shortcuts, or the Microsoft Office Ribbon—the insertion point typically looks like a blinking vertical line and identifies the current posi- tion in a document. Online help is available in many programs. WORD PROCESSING CONCEPTS Chapter Objective 3: Word processing refers to using a computer and word processing software to create, Discuss word processing and manipulate, and print written documents, such as letters, contracts, and so forth. When cre- explain what kinds of docu- ating or editing a word processing document, the word wrap feature automatically moves ments are created using this the insertion point to the next line when the end of the screen line is reached. Formatting type of program. can be applied at the character, paragraph, or document level. Other enhancements found in most word processing programs include the ability to include graphical images and tables, and to use styles, templates, or wizards for more efficient document creation. Documents can also include hyperlinks and be saved as Web pages in many programs. Most word pro- cessors also include a spelling and grammar check feature and other useful tools. SPREADSHEET CONCEPTS Chapter Objective 4: Spreadsheet software is used to create documents (spreadsheets or worksheets) that Explain the purpose of typically include a great deal of numbers and mathematical computations; a collection spreadsheet software of worksheets stored in the same spreadsheet file is called a workbook. A worksheet is and the kinds of documents divided into rows and columns that intersect to form cells, each of which can be accessed created using this type of through a cell address, such as B3. A rectangular group of cells is referred to as a range. program. Content is entered into individual cells and may consist of labels, constant values, formulas, or functions. Formulas can be typed using relative cell or absolute cell ref- erences, depending on the type of computation required. Once created, the content of individual cells may be edited and formatted. Numeric formats are used to change the Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 6 APPLICATION SOFTWARE 247 appearance of numbers, such as adding a dollar sign or displaying a specific number of decimal places. Spreadsheet programs commonly include a charting or graphing feature and the ability to perform what-if analysis. Some spreadsheet programs allow worksheets to be saved in the form of a Web page and the inclusion of hyperlinks in cells. DATABASE CONCEPTS A database management system (DBMS) or database software program enables the cre- Chapter Objective 5: ation of a database—a collection of related data stored in a manner so that information can Identify some of the vocab- be retrieved as needed. In a relational DBMS (the most common type found on personal ulary used with database computers), a field or column is a collection of characters that make up a single piece of software and discuss the data, such as a name or phone number; a record or row is a collection of related fields; and benefits of using this type a table is a collection of related records. One or more tables can be stored in a database file. of program. A relational database typically contains a variety of objects, such as tables, forms to input or view data, queries to retrieve specific information, and reports to print a formal listing of the data stored in a table or the results of a query. When a table is created, the table fields are specified along with their characteristics, such as field name, field size, and data type. This structure, as well as the data, are saved in the table and can be modified SW when needed. Databases are commonly integrated into the Web, such as to keep track of inventory and to facilitate online ordering. PRESENTATION GRAPHICS CONCEPTS Presentation graphics are images used to visually enhance the impact of information Chapter Objective 6: communicated to other people. Presentation graphics software can be used to create Describe what presentation presentation graphics and electronic slide shows consisting of electronic slides. The indi- graphics and electronic vidual slides in the slide show are created, and then they can be edited and formatted, as slide shows are and when can the overall appearance of the presentation. Multimedia elements, such as images and they might be used. video clips, can also be included. After all slides have been created for a presentation, the order of the slides can be rearranged and transitions between the slides can be specified. It is becoming increasingly common to find slide-based presentations available through the Web. Web-based slide shows can include multimedia elements, as well as hyperlinks and other navigational buttons. GRAPHICS AND MULTIMEDIA CONCEPTS Graphics are graphical images, such as digital photographs, clip art, and original art. Chapter Objective 7: Multimedia refers to applications that include more than one type of media, but often refers List some types of graph- to audio and video content. To create graphics, graphics software—such as a painting, ics and multimedia soft- a drawing, or an image editing program—can be used. Audio editing, video editing, and ware that consumers use DVD authoring software are common types of multimedia programs, as are the media frequently. player programs used to play audio and video files. CD and DVD burning software can be used to burn songs or other data on a CD or DVD disc. OTHER TYPES OF APPLICATION SOFTWARE Other types of application software include desktop publishing and personal publishing Chapter Objective 8: programs, computer-aided design (CAD) and other types of design software, accounting Name several other types software, personal finance software, and project management software. The use of collab- of application software pro- oration, remote access, and note taking software is growing. Educational, entertainment, grams and discuss what and reference software are very popular with home users. functions they perform. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. 248 SOFTWARE R EVI EW ACTIVITI E S KEY TERM Instructions: Match each key term on the left with the definition on the right that best describes it. MATCHING 1. A collection of related data that is stored in a manner enabling information to be retrieved as needed. a. cell 2. A collection of related fields in a database; also called a row. b. database 3. A collection of worksheets saved in a single spreadsheet file. c. field 4. An agreement, either included in a software package or displayed on the screen d. formula when the software is installed or launched, that specifies the conditions under which the program can be used. e. label 5. An entry in a worksheet cell that performs computations on worksheet data and dis- f. public domain software plays the results. g. record 6. A single category of data to be stored in a database, such as a person’s name or h. shareware phone number; also called a column. i. software license 7. A text-based entry in a worksheet cell that identifies data on the worksheet. j. workbook 8. Copyrighted software that is distributed on the honor system; consumers should either pay for it or uninstall it after the trial period. 9. Software that is not copyrighted and may be used without restriction. 10. The location at the intersection of a row and column on a worksheet into which data can be typed. SELF-QUIZ Instructions: Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. Answers for the self-quiz are located in the References and Resources Guide at the end of the book. 1. T F Microsoft Office is one example of a software suite. 2. T F Changing the font size in a document is an example of a formatting operation. 3. T F In a word processing document, the Enter key is always pressed at the end of each screen line to move down to the next line. 4. T F The formula =A2+B2 located in cell C2 would multiply the two cells to the left of cell C2. 5. T F Typically, a single software program can be installed on both a computer and a mobile device. 6. With a(n) program, the source code for the program is made available to the public and so can be modified by others. 7. The blinking vertical line displayed on the screen that indicates the current location in a document, such as where the next change will be made to the document in a word processing program, is called the. 8. A named formula (such as @SUM) in a spreadsheet program is called a(n). 9. In a relational database, the database object that contains the actual data is the. Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. CHAPTER 6 APPLICATION SOFTWARE 249 10. Match each application with its type of application program, and write the corresponding num- ber in the blank to the left of each application. a. Listening to a music CD. 1. DVD authoring software b. Creating a child’s birthday invitation. 2. Media player c. Creating a home movie DVD. 3. Personal publishing software 1. List the programs included in the Microsoft Office software suite that fit in the following EXERCISES categories. a. Spreadsheet software c. Word processing software b. Presentation graphics software d. Database software 2. Match each spreadsheet element with its term and write the corresponding number in the blank to the left of each term. a. An absolute cell address 1. =SUM(A1:A2) b. A relative cell address 2. $D$4 SW c. A function 3. B6 3. For a customer database containing 50 customers and recording data about the customer’s num- ber, last name, street, city, state, ZIP code, and current balance, answer the following questions. a. How many records are in the database? b. How many fields are in the database? c. To display a list of all customers who live in Texas and have a current balance of less than $10, what database tool should be used? 4. Write the number of the presentation graphic that best matches each of the following possible uses in the blank to the left of each use. a. Adding an arrow to highlight a point located on a slide. 1. Pie chart 2. Slide b. Illustrating the percent of sales coming from each sales territory. 3. Drawn object c. Conveying the key points in an educational lecture. 5. Would rearranging the paragraphs in a document using a word processing program be an editing operation or a forma

Use Quizgecko on...
Browser
Browser