epdf.life_Technology in Action_ Complete 16th ed 2020.pdf
Document Details
Uploaded by ImmaculateKoto
University of Technology, Jamaica
Full Transcript
TECHNOLOGY 16E IN ACTION ALAN EVANS COMPLETE KENDALL MARTIN MARY ANNE POATSY Don’t just read about technology, interact with it. HELPDESKS SOUND BYTES IT SIMULATIONS These highly-interactive,...
TECHNOLOGY 16E IN ACTION ALAN EVANS COMPLETE KENDALL MARTIN MARY ANNE POATSY Don’t just read about technology, interact with it. HELPDESKS SOUND BYTES IT SIMULATIONS These highly-interactive, almost game- These multimedia lessons demystify IT Simulations are detailed, interactive like simulations let you take the role of complex computer concepts with short scenarios covering the core chapter a helpdesk staffer where you answer audio, animation, or video. The Sound topic. Students work through the computer technology questions from Bytes now also include integrated simulations to apply what they have customers. These simulations help learning objectives, a summary, learned and demonstrate understanding reinforce the book content in a fun, and a quiz. in an active learning environment. engaging way. CHAPTER 1 CHAPTER 8 CHAPTER 1 CHAPTER 8 CHAPTER 1 CHAPTER 8 Technology Impacts Managing Digital Virtual Computer Enhancing Photos Technology and Digital Devices The Impact of Artificial Media Tour with Image-Editing Ethics and Multimedia Intelligence Understanding How to Debate Software Intellectual Property Ethical Issues Plagiarism and CHAPTER 2 CHAPTER 9 CHAPTER 2 and Copyright Intellectual What Is Security and Understanding Bits CHAPTER 2 Property a Computer? Privacy and Bytes CHAPTER 9 Binary Numbers Exploring Storage Threats to Your Interactive CHAPTER 9 CHAPTER 3 CHAPTER 10 Devices and Ports Digital Life Smartphone Are Protecting Your The Internet Program Understanding Really Smart Computer Development CHAPTER 3 Firewalls Managing Computer CHAPTER 4 Doing Business CHAPTER 3 Security with CHAPTER 11 Application Software Online CHAPTER 10 Blogging Windows Tools Databases Evaluating Websites Understanding Finding Information CHAPTER 5 Software on the Web CHAPTER 10 System Software CHAPTER 12 CHAPTER 4 Programming Using the Arduino Client/Server Buying and Installing A Variety of CHAPTER 4 Microcontroller Programming Programming with CHAPTER 6 Networks Software Where Does Binary Languages the Processing Hardware Choosing Software Show Up? CHAPTER 13 Programming for Language CHAPTER 11 CHAPTER 7 Communicating, CHAPTER 5 End Users CHAPTER 11 Networks Sharing on Starting the Using Databases the Web Computer: The How Businesses CHAPTER 5 Creating and Boot Process Use Databases Using Windows Querying an Organizing Your Task Manager to Access Database Computer: CHAPTER 12 Evaluate System Analyzing Data with File Management Using Servers Performance Microsoft Power Transmission Media Hard Disk Anatomy BI Suite CHAPTER 6 and Network Adapters CHAPTER 6 CHAPTER 12 Evaluating Your CPU and RAM Installing RAM Network Topology Evaluating Computer CHAPTER 13 Installing an SSD and Navigation System Understanding IP Drive Devices Components Addresses, Domain A Day in the Life Names, and CHAPTER 7 of a Network CHAPTER 7 Protocols Technician Installing a Home Understanding Keeping E-Mail Computer Secure CHAPTER 13 Networking Network Managing and Securing Wireless Creating Web Pages Securing Wireless Networks with Squarespace Networks Client-Side Web Page Development You will find the Helpdesks, Sound Bytes, and IT Simulations in MyLab IT. 16th Edition Technology in Action Complete Alan Evans Kendall Martin Mary Anne Poatsy 330 Hudson Street, NY NY 10013 Vice President, Career & IT Skills: Andrew Gilfillan Digital Content Producer: Tanika Henderson Executive Portfolio Manager: Jenifer Niles Senior Art Director: Mary Siener Managing Producer: Laura Burgess Cover Design: Pearson CSC Development Editor: Shannon LeMay-Finn Cover Image Credits: keving3/Alamy Stock Photo Director of Product Marketing: Brad Parkins Full-Service Project Management: Susan Hannahs Director of Field Marketing: Jonathan Cottrell Composition: Pearson CSC Field Marketing Manager: Bob Nisbet Printer/Binder: LSC Communications Product Marketing Manager: Heather Taylor Cover Printer: Phoenix Color Operations Specialist: Maura Garcia Text Font: 10/12 Helvetica Neue LT W1G Roman Senior Product Model Manager: Eric Hakanson Lead, Production and Digital Studio: Heather Darby Course Producer: Amanda Losonsky Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose. All such documents and related graphics, are provided “as is” without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services. The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified. Microsoft©, Windows©, and Microsoft Office© are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Copyright © 2020, 2019, 2018 by Pearson Education, Inc., All rights reserved. Manufactured in the United States of America. This publication is protected by copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms and the appropriate contacts within the Pearson Education Global Rights & Permissions department, please visit www.pearsoned.com/permissions/ Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Names: Evans, Alan (Alan D.), author. | Martin, Kendall (Kendall E.), author. | Poatsy, Mary Anne, author. Title: Technology in action. Complete / Alan Evans, Kendall Martin, Mary Anne Poatsy. Description: 16th edition. | NY, NY : Pearson, | Includes index. Identifiers: LCCN 2018055748 | ISBN 9780135435199 | ISBN 0135435196 Subjects: LCSH: Microcomputers. | Computer science. | Computer networks. | Information technology. Classification: LCC QA76.5.E9195 2020 | DDC 004—dc23 LC record available at https://lccn.loc.gov/2018055748 1 18 ISBN 10: 0-13-543519-6 ISBN 13: 978-0-13-543519-9 Contents at a Glance Chapter 1 The Impact of Technology in a Changing World......................................................................... 2 Chapter 2 Looking at Computers: Understanding the Parts..................................................................... 36 Chapter 3 Using the Internet: Making the Most of the Web’s Resources.................................................. 80 Chapter 4 Application Software: Programs That Let You Work and Play................................................. 120 Chapter 5 System Software: The Operating System, Utility Programs, and File Management................. 158 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System......................................... 198 Chapter 7 Networking: Connecting Computing Devices......................................................................... 240 Chapter 8 Managing Your Digital Lifestyle: Challenges and Ethics.......................................................... 272 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices........................................... 322 Chapter 10 Behind the Scenes: Software Programming........................................................................... 368 Chapter 11 Behind the Scenes: Databases and Information Systems...................................................... 412 Chapter 12 Behind the Scenes: Networking and Security in the Business World...................................... 456 Chapter 13 Behind the Scenes: How the Internet Works.......................................................................... 498 Appendix A The History of the Personal Computer....................................................................................A-1 Appendix B Careers in IT...........................................................................................................................B-1 Glossary................................................................................................................................. G-1 Index........................................................................................................................................ I-1 iii Contents Chapter 1 The Impact of Technology in a Changing World...................................................... 2 Part 1: Technology in Society................................................................................................................................................ 4 Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on national and global issues. Technology in a Global Society............................................................................................................................. 4 Impact of Tools of Modern Technology.................................................................................................................. 4 Objective 1.1 Describe various technological tools being used to impact national and global issues. Global Issues......................................................................................................................................................... 5 Objective 1.2 Describe various global social issues that are being affected by technology. Technology Connects Us with Others.................................................................................................................. 6 Technology Impacts How and Why We Connect and Collaborate.......................................................................... 6 Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others. Technology Impacts How We Consume................................................................................................................ 7 Objective 1.4 Summarize how technology has impacted the way we choose and consume products and services. The Importance of Computer Literacy................................................................................................................. 8 Computer Literacy................................................................................................................................................. 8 Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate. HELPDESK: Technology Impacts............................................................................................................................................. 8 SOUND BYTE: Virtual Computer Tour...................................................................................................................................... 8 TRY THIS: What Does Facebook Know about You?........................................................................................... 11 MAKE THIS: TOOL: IFTTT.com (If This Then That).............................................................................................. 12 Part 2: Emerging Technologies and Ethical Computing.................................................................................................... 13 Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intelligence, and how technology creates new ethical debates. Artificial Intelligence............................................................................................................................................. 13 Artificial Intelligence Basics.................................................................................................................................. 13 Objective 1.6 Describe artificial intelligence systems and explain their main goals. HELPDESK: The Impact of Artificial Intelligence...................................................................................................................... 13 ETHICS IN IT: Ethics in Computing.................................................................................................................... 16 Working with Artificial Intelligence and Other Information Technologies....................................................... 17 Technology and Your Career................................................................................................................................ 17 Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in many careers. BITS&BYTES: Is It AI or Human? Take a Turing Test!.......................................................................................... 19 DIG DEEPER: Augmented and Virtual Realities................................................................................................... 21 Ethical Computing................................................................................................................................................ 22 Defining Ethics..................................................................................................................................................... 22 Objective 1.8 Define ethics and examine various ethical systems. SOUND BYTE: How to Debate Ethical Issues......................................................................................................................... 22 Personal Ethics.................................................................................................................................................... 23 Objective 1.9 Describe influences on the development of your personal ethics. Ethics and Technology......................................................................................................................................... 25 Objective 1.10 Present examples of how technology creates ethical challenges. SOLVE THIS: How Technology Is Used on the World Stage and in Your Personal Life......................................... 35 iv Contents Chapter 2 Looking at Computers: Understanding the Parts................................................... 36 Part 1: Understanding Digital Components....................................................................................................................... 38 Learning Outcome 2.1 You will be able to describe the devices that make up a computer system. Understanding Your Computer........................................................................................................................... 38 Computers Are Data Processing Devices............................................................................................................ 38 Objective 2.1 Describe the four main functions of a computer system and how they interact with data and information. Binary: The Language of Computers................................................................................................................... 39 Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed. SOUND BYTE: Binary Numbers Interactive............................................................................................................................ 39 Types of Computers............................................................................................................................................ 41 Objective 2.3 List common types of computers, and discuss their main features. ACTIVE HELPDESK: Understanding Bits and Bytes.............................................................................................................. 41 BITS&BYTES: Today’s Supercomputers: Faster Than Ever................................................................................. 45 Input Devices........................................................................................................................................................ 45 Physical Keyboards and Touch Screens.............................................................................................................. 45 Objective 2.4 Identify the main types of keyboards and touch screens. Mice and Other Pointing Devices......................................................................................................................... 47 Objective 2.5 Describe the main types of mice and pointing devices. DIG DEEPER: How Touch Screens Work........................................................................................................... 48 BITS&BYTES: Distributed Computing: Putting Your Computer to Work While You Sleep.................................... 49 Image, Sound, and Sensor Input......................................................................................................................... 49 Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices. Output Devices................................................................................................................................................. 51 Image and Audio Output..................................................................................................................................... 51 Objective 2.7 Describe options for outputting images and audio from computing devices. BITS&BYTES: Near Field Communication (NFC): Pay (or Get Paid) Anywhere with Your Phone.......................... 53 Printers................................................................................................................................................................ 53 Objective 2.8 Describe various types of printers, and explain when you would use them. BITS&BYTES: Medical Devices and 3D Printing................................................................................................. 56 TRY THIS: What’s Inside My Computer?............................................................................................................ 58 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................... 59 Part 2: Processing, Storage, and Connectivity................................................................................................................... 60 Learning Outcome 2.2 You will be able to describe how computers process and store data and how devices connect to a computer system. Processing and Memory on the Motherboard................................................................................................... 60 The Motherboard and Memory............................................................................................................................ 60 Objective 2.9 Describe the functions of the motherboard and RAM. SOUND BYTE: Smartphones Are Really Smart...................................................................................................................... 61 Processing.......................................................................................................................................................... 61 Objective 2.10 Explain the main functions of the CPU. Storing Data and Information.......................................................................................................................... 62 Storage Options on Computing Devices.............................................................................................................. 62 Objective 2.11 Describe the various means of storing data and information with computing devices. ETHICS IN IT: What Is Ethical Computing?......................................................................................................... 64 TRENDS IN IT: Green Computing (Green IT)...................................................................................................... 65 Connecting Peripherals to the Computer.......................................................................................................... 66 Computer Ports................................................................................................................................................... 66 Objective 2.12 Describe common types of ports used today. HELPDESK: Exploring Storage Devices and Ports.................................................................................................................. 66 Contents v Power Management and Ergonomics................................................................................................................ 67 Power Controls and Power Management............................................................................................................. 67 Objective 2.13 Describe how to manage power consumption on computing devices. Setting It All Up: Ergonomics............................................................................................................................... 69 Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices. BITS&BYTES: Sleep Better and Avoid Eyestrain: Use Less Blue Light................................................................ 69 SOLVE THIS: Technology Wish List.................................................................................................................... 79 Chapter 3 Using the Internet: Making the Most of the Web’s Resources............................... 80 Part 1: Collaborating and Working on the Web................................................................................................................. 82 Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for c ollaboration, communication, commerce, and entertainment purposes. The Internet and How It Works........................................................................................................................... 82 The Origin of the Internet..................................................................................................................................... 82 Objective 3.1 Describe how the Internet got its start. How the Internet Works....................................................................................................................................... 84 Objective 3.2 Explain how data travels on the Internet. Collaborating and Communicating on the Web................................................................................................. 85 Collaborating with Web Technologies.................................................................................................................. 85 Objective 3.3 Evaluate the tools and technologies used to collaborate on the web. BITS&BYTES: Secure Messaging Apps.............................................................................................................. 87 SOUND BYTE: Blogging........................................................................................................................................................ 87 Communicating over the Web............................................................................................................................. 89 Objective 3.4 Summarize the technologies used to communicate over the web. Conducting Business on the Web....................................................................................................................... 92 Conducting Business Online................................................................................................................................ 92 Objective 3.5 Describe how business is conducted using the Internet. E-Commerce Safeguards.................................................................................................................................... 92 Objective 3.6 Summarize precautions you should take when doing business online. DIG DEEPER: How Cloud Computing Works..................................................................................................... 93 BITS&BYTES: Looking for Extra Money? Try a Side Hustle................................................................................. 94 HELPDESK: Doing Business Online....................................................................................................................................... 95 BITS&BYTES: Bitcoin: A Form of Virtual Currency.............................................................................................. 95 TRY THIS: Use OneDrive to Store and Share Your Files in the Cloud.................................................................. 97 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................... 98 Part 2: Using the Web Effectively........................................................................................................................................ 99 Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web. Accessing and Moving Around the Web............................................................................................................ 99 Web Browsers..................................................................................................................................................... 99 Objective 3.7 Explain what web browsers are, and describe their common features. URLs, Protocols, and Domain Names............................................................................................................... 101 Objective 3.8 Explain what a URL is and discuss its main parts. Navigating the Web........................................................................................................................................... 102 Objective 3.9 Describe tools used to navigate the web. BITS&BYTES: Maintain Your Privacy While Searching the Web......................................................................... 103 Searching the Web Effectively........................................................................................................................... 104 Using Search Engines....................................................................................................................................... 104 Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results. vi Contents BITS&BYTES: Digital Assistants and Predictive Search..................................................................................... 105 SOUND BYTE: Finding Information on the Web.................................................................................................................... 107 Evaluating Websites.......................................................................................................................................... 107 Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes. HELPDESK: Evaluating Websites......................................................................................................................................... 107 TRENDS IN IT: Linked Data and the Semantic Web......................................................................................... 108 BITS&BYTES: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?....................................... 109 Using the Web Ethically..................................................................................................................................... 109 Digital Activism.................................................................................................................................................. 109 Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism. Geolocation....................................................................................................................................................... 110 Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices. BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare?............................................. 111 ETHICS IN IT: Cyber Harassment..................................................................................................................... 112 SOLVE THIS: Create a Report: Conducting Research on the Web.................................................................... 119 Chapter 4 Application Software: Programs That Let You Work and Play............................. 120 Part 1: Accessing, Using, and Managing Software.......................................................................................................... 122 Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage your software. Software Basics.................................................................................................................................................. 122 Application vs. System Software........................................................................................................................ 122 Objective 4.1 Compare application software and system software. Distributing Software......................................................................................................................................... 122 Objective 4.2 Explain the differences between commercial software and open source software and describe models for software distribution. BITS&BYTES: Finding Alternative Software....................................................................................................... 123 Managing Your Software................................................................................................................................... 123 Purchasing Software......................................................................................................................................... 123 Objective 4.3 Explain the different options for purchasing software. TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce................................................................. 124 HELPDESK: Buying and Installing Software.......................................................................................................................... 125 Installing and Uninstalling Software.................................................................................................................... 125 Objective 4.4 Describe how to install and uninstall software. BITS&BYTES: Ridding Your Computer of “Bloat”.............................................................................................. 125 Upgrading Software.......................................................................................................................................... 126 Objective 4.5 Explain the considerations around the decision to upgrade your software. DIG DEEPER: How Number Systems Work...................................................................................................... 126 Software Licenses............................................................................................................................................. 127 Objective 4.6 Explain how software licenses function. SOUND BYTE: Where Does Binary Show Up?..................................................................................................................... 127 ETHICS IN IT: Can I Borrow Software That I Don’t Own?................................................................................. 129 TRY THIS: Citing Website Sources................................................................................................................... 131 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 132 Part 2: Application Software............................................................................................................................................. 133 Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia. Productivity and Business Software................................................................................................................. 133 Productivity Software......................................................................................................................................... 133 Objective 4.7 Categorize the types of application software used to enhance productivity and describe their uses and features. Contents vii BITS&BYTES: Productivity Software Tips and Tricks......................................................................................... 133 BITS&BYTES: How to Open Unknown File Types............................................................................................. 134 BITS&BYTES: Going Beyond PowerPoint......................................................................................................... 138 SOUND BYTE: Programming for End Users.......................................................................................................................... 140 Business Software............................................................................................................................................. 142 Objective 4.8 Summarize the types of software that large and small businesses use. BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools........................................................... 144 Multimedia and Educational Software.............................................................................................................. 144 Digital Multimedia Software............................................................................................................................... 144 Objective 4.9 Describe the uses and features of digital multimedia software. Digital Audio Software....................................................................................................................................... 146 Objective 4.10 Describe the uses and features of digital audio software. HELPDESK: Choosing Software........................................................................................................................................... 147 App Creation Software...................................................................................................................................... 147 Objective 4.11 Describe the features of app creation software. BITS&BYTES: Mirror, Mirror........................................................................................................................... 149 Educational and Reference Software................................................................................................................. 149 Objective 4.12 Categorize educational and reference software and explain their features. SOLVE THIS: Analyzing Benchmark Data......................................................................................................... 157 Chapter 5 System Software: The Operating System, Utility Programs, and File Management............................................................................................ 158 Part 1: Understanding System Software.......................................................................................................................... 160 Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the steps in the boot process. Operating System Fundamentals...................................................................................................................... 160 Operating System Basics.................................................................................................................................. 160 Objective 5.1 Discuss the functions of the operating system. Operating Systems for Personal Use................................................................................................................. 160 Objective 5.2 Explain the most popular operating systems for personal use. BITS&BYTES: Open Source Operating Systems............................................................................................... 162 BITS&BYTES: Operating Systems for the Smart Home.................................................................................... 162 Operating Systems for Machinery, Networks, and Business.............................................................................. 163 Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business. ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows?.................................................................. 164 What the Operating System Does..................................................................................................................... 165 The User Interface............................................................................................................................................. 166 Objective 5.4 Explain how the operating system provides a means for users to interact with the computer. Hardware Coordination..................................................................................................................................... 166 Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage, and peripheral devices. SOUND BYTE: Using Windows Task Manager to Evaluate System Performance.................................................................. 166 Software Application Coordination..................................................................................................................... 168 Objective 5.6 Explain how the operating system interacts with application software. TRENDS IN IT: Are Personal Computers Becoming More Human?.................................................................. 169 Starting Your Computer..................................................................................................................................... 170 The Boot Process.............................................................................................................................................. 170 Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot process are handled. viii Contents HELPDESK: Starting the Computer: The Boot Process........................................................................................................ 172 TRY THIS: Using Virtual Desktops in Windows 10............................................................................................ 174 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 175 Part 2: Using System Software......................................................................................................................................... 176 Learning Outcome 5.2 You will be able to describe how to use system software, including the user interface, file management capabilities, and utility programs. The Windows Interface...................................................................................................................................... 176 Using Windows 10............................................................................................................................................. 176 Objective 5.8 Describe the main features of the Windows interface. BITS&BYTES: The Snipping Tool...................................................................................................................... 177 File Management................................................................................................................................................ 179 Organizing Your Files......................................................................................................................................... 179 Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders. BITS&BYTES: Save Files in the Cloud.............................................................................................................. 181 BITS&BYTES: Tips for Organizing Your Files..................................................................................................... 182 HELPDESK: Organizing Your Computer: File Management................................................................................................... 183 Utility Programs.................................................................................................................................................. 185 Windows Administrative Utilities......................................................................................................................... 186 Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility. DIG DEEPER: How Disk Defragmenting Utilities Work...................................................................................... 188 SOUND BYTE: Hard Disk Anatomy...................................................................................................................................... 188 SOLVE THIS: Operating Systems: Analyzing Market Share............................................................................... 197 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System.................... 198 Part 1: Evaluating Key Subsystems.................................................................................................................................. 200 Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the CPU and memory subsystems. Your Ideal Computing Device............................................................................................................................ 200 Moore’s Law..................................................................................................................................................... 200 Objective 6.1 Describe the changes in CPU performance over the past several decades. Selecting a Computing Device........................................................................................................................... 201 Objective 6.2 Compare and contrast a variety of computing devices. Evaluating the CPU Subsystem......................................................................................................................... 203 How the CPU Works......................................................................................................................................... 203 Objective 6.3 Describe how a CPU is designed and how it operates. BITS&BYTES: Liquid Cooling........................................................................................................................... 207 Measuring CPU Performance............................................................................................................................ 207 Objective 6.4 Describe tools used to measure and evaluate CPU performance. DIG DEEPER: The Machine Cycle.................................................................................................................... 209 Evaluating the Memory Subsystem.................................................................................................................. 210 Random Access Memory.................................................................................................................................. 210 Objective 6.5 Discuss how RAM is used in a computer system. Adding RAM...................................................................................................................................................... 212 Objective 6.6 Evaluate whether adding RAM to a system is desirable. HELPDESK: Evaluating Your CPU and RAM......................................................................................................................... 212 SOUND BYTE: Installing RAM............................................................................................................................................... 213 TRY THIS: Measure Your System Performance................................................................................................. 215 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 216 Contents ix Part 2: Evaluating Other Subsystems and Making a Decision....................................................................................... 217 Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media subsystem, and reliability and decide whether to purchase a new system or upgrade an existing one. Evaluating the Storage Subsystem................................................................................................................... 217 Types of Storage Drives..................................................................................................................................... 217 Objective 6.7 Classify and describe the major types of nonvolatile storage drives. SOUND BYTE: Installing an SSD Drive.................................................................................................................................. 218 DIG DEEPER: How Storage Devices Work....................................................................................................... 219 Storage Needs.................................................................................................................................................. 220 Objective 6.8 Evaluate the amount and type of storage needed for a system. BITS&BYTES: How Much Storage to Buy?....................................................................................................... 222 Evaluating the Media Subsystems.................................................................................................................... 223 Video Cards...................................................................................................................................................... 223 Objective 6.9 Describe the features of video cards. BITS&BYTES: Graphics Cards with SSD on Board........................................................................................... 225 TRENDS IN IT: USB 3.1 and USB-C................................................................................................................ 226 Sound Cards..................................................................................................................................................... 227 Objective 6.10 Describe the features of sound cards. HELPDESK: Evaluating Computer System Components...................................................................................................... 227 Evaluating System Reliability and Moving On................................................................................................. 229 Maintaining System Reliability............................................................................................................................ 229 Objective 6.11 Describe steps you can take to optimize your system’s reliability. Getting Rid of Your Old Computer..................................................................................................................... 231 Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer. ETHICS IN IT: Free Hardware for All................................................................................................................. 232 SOLVE THIS: Laptop Alternatives..................................................................................................................... 239 Chapter 7 Networking: Connecting Computing Devices....................................................... 240 Part 1: How Networks Function........................................................................................................................................ 242 Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to create a network, and describe the different ways a network can connect to the Internet. Networking Fundamentals................................................................................................................................. 242 Understanding Networks................................................................................................................................... 242 Objective 7.1 Describe computer networks and their pros and cons. HELPDESK: Understanding Networking............................................................................................................................... 243 Network Architectures....................................................................................................................................... 244 Network Designs............................................................................................................................................... 244 Objective 7.2 Explain the different ways networks are defined. DIG DEEPER: P2P File Sharing........................................................................................................................ 246 Network Components........................................................................................................................................ 247 Transmission Media........................................................................................................................................... 247 Objective 7.3 Describe the types of transmission media used in networks. SOUND BYTE: Installing a Home Computer Network........................................................................................................... 247 Basic Network Hardware................................................................................................................................... 249 Objective 7.4 Describe the basic hardware devices necessary for networks. Network Software.............................................................................................................................................. 250 Objective 7.5 Describe the type of software necessary for networks. TRENDS IN IT: How Smart Is Your Home?....................................................................................................... 251 x Contents Connecting to the Internet................................................................................................................................. 251 Broadband Internet Connections....................................................................................................................... 251 Objective 7.6 Summarize the broadband options available to access the Internet. BITS&BYTES: Net Neutrality............................................................................................................................. 252 BITS&BYTES: Who’s Not on Broadband?........................................................................................................ 253 Wireless Internet Access................................................................................................................................... 253 Objective 7.7 Summarize how to access the Internet wirelessly. TRY THIS: Testing Your Internet Connection Speed.......................................................................................... 255 MAKE THIS: TOOL: Ping and Telnet................................................................................................................. 256 Part 2: Your Home Network............................................................................................................................................... 257 Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home n etwork and how to manage and secure a wireless network. Installing and Configuring Home Networks..................................................................................................... 257 Planning Your Home Network............................................................................................................................ 257 Objective 7.8 Explain what should be considered before creating a home network. BITS&BYTES: Power Your Devices—Wirelessly................................................................................................ 258 Connecting Devices to a Network..................................................................................................................... 258 Objective 7.9 Describe how to set up a home network. BITS&BYTES: Mesh Networks: An Emerging Alternative.................................................................................. 260 BITS&BYTES: Analyzing Network Problems..................................................................................................... 262 Managing and Securing Wireless Networks.................................................................................................... 262 Troubleshooting Wireless Network Problems..................................................................................................... 262 Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them. Securing Wireless Networks.............................................................................................................................. 262 Objective 7.11 Describe how to secure wireless home networks. SOUND BYTE: Securing Wireless Networks......................................................................................................................... 264 HELPDESK: Managing and Securing Your Wireless Network............................................................................................... 264 SOLVE THIS: Home Networking Guide............................................................................................................. 271 Chapter 8 Managing Your Digital Lifestyle: Challenges and Ethics...................................... 272 Part 1: The Impact of Digital Information........................................................................................................................ 274 Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technology is used to produce and distribute digital texts, music, and video; and the challenges in managing a digital lifestyle. Digital Basics...................................................................................................................................................... 274 Digital Convergence and the Internet of Things.................................................................................................. 274 Objective 8.1 Describe how digital convergence and the Internet of Things have evolved. Digital versus Analog......................................................................................................................................... 276 Objective 8.2 Explain the differences between digital and analog signals. Digital Publishing................................................................................................................................................ 278 e-Readers......................................................................................................................................................... 278 Objective 8.3 Describe the different types of e-readers. Using e-Texts..................................................................................................................................................... 279 Objective 8.4 Explain how to purchase, borrow, and publish e-texts. HELPDESK: Managing Digital Media.................................................................................................................................... 279 Digital Music....................................................................................................................................................... 280 Creating and Storing Digital Music..................................................................................................................... 280 Objective 8.5 Describe how digital music is created and stored. Distributing Digital Music................................................................................................................................... 282 Objective 8.6 Summarize how to listen to and publish digital music. Contents xi Digital Media....................................................................................................................................................... 283 Digital Photography........................................................................................................................................... 283 Objective 8.7 Explain how best to create, print, and share digital photos. SOUND BYTE: Enhancing Photos with Image-Editing Software........................................................................................... 284 Digital Video...................................................................................................................................................... 285 Objective 8.8 Describe how to create, edit, and distribute digital video. TRENDS IN IT: Digital Asset Managers Needed!.............................................................................................. 288 Managing Your Digital Lifestyle......................................................................................................................... 288 Digital Challenges and Dilemmas....................................................................................................................... 289 Objective 8.9 Discuss the challenges in managing an active digital lifestyle. DIG DEEPER: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?........................................... 290 BITS&BYTES: The Rise of Wearable Technology.............................................................................................. 291 TRY THIS: Creating and Publishing a Movie...................................................................................................... 295 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 296 Part 2: Ethical Issues of Living in the Digital Age........................................................................................................... 297 Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways that maintain your digital reputation. Protection of Digital Property............................................................................................................................ 297 Intellectual Property........................................................................................................................................... 297 Objective 8.10 Describe the various types of intellectual property. Copyright Basics............................................................................................................................................... 298 Objective 8.11 Explain how copyright is obtained and the rights granted to the owners. HELPDESK: Understanding Intellectual Property and Copyright........................................................................................... 300 Copyright Infringement...................................................................................................................................... 301 Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe situations in which you can legally use copyrighted material. BITS&BYTES: Software Piracy: It’s More Than Just Downloading and Copying................................................ 303 BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission!.......................................................... 305 Living Ethically in the Digital Era....................................................................................................................... 306 Plagiarism......................................................................................................................................................... 306 Objective 8.13 Explain plagiarism and strategies for avoiding it. Hoaxes and Digital Manipulation........................................................................................................................ 308 Objective 8.14 Describe hoaxes and digital manipulation. SOUND BYTE: Plagiarism and Intellectual Property.............................................................................................................. 308 Protecting Your Online Reputation..................................................................................................................... 311 Objective 8.15 Describe what comprises your online reputation and how to protect it. BITS&BYTES: Celebrity Photographic Rights.................................................................................................... 313 ETHICS IN IT: Acceptable Use Policies: What You Can and Can’t Do............................................................... 314 SOLVE THIS: Intellectual Property and Copyright Basics.................................................................................. 321 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices....................... 322 Part 1: Threats to Your Digital Assets............................................................................................................................... 324 Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats they pose to your digital security. Identity Theft and Hackers................................................................................................................................ 324 Identity Theft..................................................................................................................................................... 325 Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate. xii Contents Hacking............................................................................................................................................................. 325 Objective 9.2 Describe the different types of hackers and the tools they use. BITS&BYTES: Hackers Wanted........................................................................................................................ 326 Computer Viruses............................................................................................................................................... 329 Virus Basics....................................................................................................................................................... 329 Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus, and the symptoms it may display. SOUND BYTE: Protecting Your Computer............................................................................................................................ 330 Types of Viruses................................................................................................................................................ 331 Objective 9.4 List the different categories of computer viruses, and describe their behaviors. Online Annoyances and Social Engineering.................................................................................................... 332 Online Annoyances............................................................................................................................................ 333 Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security. Social Engineering............................................................................................................................................. 335 Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them. BITS&BYTES: I Received a Data Breach Letter... Now What?....................................................................... 336 ETHICS IN IT: You’re Being Watched... But Are You Aware You’re Being Watched?...................................... 338 HELPDESK: Threats to Your Digital Life................................................................................................................................ 338 TRENDS IN IT: Spear Phishing: The Bane of Data Breaches............................................................................ 339 TRY THIS: Testing Your Network Security......................................................................................................... 341 MAKE THIS: App Inventor 2 or Thunkable........................................................................................................ 342 Part 2: Protecting Your Digital Property............................................................................................................................ 343 Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption. Restricting Access to Your Digital Assets........................................................................................................ 343 Firewalls............................................................................................................................................................ 343 Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers. Preventing Virus Infections................................................................................................................................. 345 Objective 9.8 Explain how to protect your computer from virus infection. HELPDESK: Understanding Firewalls................................................................................................................................... 345 Authentication: Passwords and Biometrics........................................................................................................ 348 Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication. BITS&BYTES: CAPTCHA: Keeping Websites Safe from Bots........................................................................... 348 Anonymous Web Surfing: Hiding from Prying Eyes............................................................................................ 350 Objective 9.10 Describe ways to surf the Web anonymously. BITS&BYTES: Multi-Factor Authentication: Don’t Rely Solely on Passwords!.................................................... 352 Keeping Your Data Safe..................................................................................................................................... 352 Protecting Your Personal Information................................................................................................................. 352 Objective 9.11 Describe the types of information you should never share online. SOUND BYTE: Managing Computer Security with Windows Tools....................................................................................... 352 Backing Up Your Data....................................................................................................................................... 353 Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. Protecting Your Physical Computing Assets................................................................................................... 357 Environmental Factors and Power Surges.......................................................................................................... 357 Objective 9.13 Explain the negative effects environment and power surges can have on computing devices. Preventing and Handling Theft........................................................................................................................... 357 Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems. DIG DEEPER: Computer Forensics: How It Works........................................................................................... 359 SOLVE THIS: Computer Security...................................................................................................................... 367 Contents xiii Chapter 10 Behind the Scenes: Software Programming......................................................... 368 Part 1: Understanding Programming............................................................................................................................... 370 Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the program development life cycle. Life Cycle of an Information System................................................................................................................. 370 The Importance of Programming....................................................................................................................... 370 Objective 10.1 Describe the importance of programming to both software developers and users. System Development Life Cycle........................................................................................................................ 370 Objective 10.2 Summarize the stages of the system development life cycle. BITS&BYTES: Let Them See Your Work........................................................................................................... 372 Life Cycle of a Program...................................................................................................................................... 372 The Program Development Life Cycle................................................................................................................ 372 Objective 10.3 Define programming and list the steps in the program development life cycle. The Problem Statement..................................................................................................................................... 373 Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task. SOUND BYTE: Using the Arduino Microcontroller.................................................................................................................. 373 HELPDESK: Understanding Software Programming.............................................................................................................. 374 Algorithm Development..................................................................................................................................... 375 Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms. BITS&BYTES: Hackathons............................................................................................................................... 378 DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operators........................................................................................................................... 380 Coding.............................................................................................................................................................. 381 Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated development environment in coding. Debugging........................................................................................................................................................ 387 Objective 10.7 Identify the role of debugging in program development. BITS&BYTES: Many Languages on Display...................................................................................................... 388 Testing and Documentation............................................................................................................................... 388 Objective 10.8 Explain the importance of testing and documentation in program development. TRY THIS: Programming with Corona............................................................................................................... 390 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 391 Part 2: Programming Languages...................................................................................................................................... 392 Learning Outcome 10.2 You will understand the factors programmers consider when selecting an a ppropriate programming language for a specific problem and will be familiar with some modern programming languages. Many Programming Languages........................................................................................................................ 392 Need for Diverse Languages............................................................................................................................. 392 Objective 10.9 Discuss the driving factors behind the popularity of various programming languages. SOUND BYTE: Programming with the Processing Language................................................................................................. 392 Selecting the Right Language............................................................................................................................ 393 Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting. BITS&BYTES: Coding for Zombies................................................................................................................... 393 ETHICS IN IT: When Software Runs Awry........................................................................................................ 394 Exploring Programming Languages................................................................................................................. 395 Tour of Modern Languages................................................................................................................................ 395 Objective 10.11 Compare and contrast modern programming languages. BITS&BYTES: Your Software Portfolio.............................................................................................................. 399 TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools............................................. 403 xiv Contents Future of Programming Languages.................................................................................................................... 403 Objective 10.12 State key principles in the development of future programming languages. HELPDESK: A Variety of Programming Languages................................................................................................................ 404 SOLVE THIS: Time Sheets................................................................................................................................ 411 Chapter 11 Behind the Scenes: Databases and Information Systems................................... 412 Part 1: Database Fundamentals........................................................................................................................................ 414 Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of databases and the functions and components of relational databases in particular. The Need for Databases.................................................................................................................................... 414 Database Basics............................................................................................................................................... 414 Objective 11.1 Explain what a database is and why databases are useful. Database Types.................................................................................................................................................. 416 Flat Databases.................................................................................................................................................. 416 Objective 11.2 Describe features of flat databases. Relational Databases......................................................................................................................................... 418 Objective 11.3 Describe features of relational databases. Object-Oriented Databases............................................................................................................................... 419 Objective 11.4 Describe features of object-oriented databases. BITS&BYTES: Normal Forms............................................................................................................................ 419 Multidimensional Databases.............................................................................................................................. 419 Objective 11.5 Describe features of multidimensional databases. HELPDESK: Using Databases............................................................................................................................................... 419 NoSQL Databases............................................................................................................................................ 420 Objective 11.6 Describe how Web 2.0 data is managed in a database. Using Databases................................................................................................................................................. 421 Relational Database Components and Functions............................................................................................... 421 Objective 11.7 Describe how relational databases organize and define data. SOUND BYTE: Creating and Querying an Access Database................................................................................................. 424 BITS&BYTES: Music Streaming Services Use Databases................................................................................. 425 Inputting and Managing Data............................................................................................................................. 425 Objective 11.8 Describe how data is inputted and managed in a database. DIG DEEPER: Structured Query Language (SQL)............................................................................................. 430 BITS&BYTES: Data Dashboards: Useful Visualization Tools.............................................................................. 432 TRY THIS: Using Excel’s Database Functions................................................................................................... 434 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 435 Part 2: How Businesses Use Databases........................................................................................................................... 436 Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data mining to manage data and how business information systems and business intelligence are used to make business decisions. Data Warehousing and Storage........................................................................................................................ 436 Data Warehouses and Data Marts..................................................................................................................... 436 Objective 11.9 Explain what data warehouses and data marts are and how they are used. HELPDESK: How Businesses Use Databases....................................................................................................................... 436 BITS&BYTES: Data Warehouses Are Going to the Cloud................................................................................. 437 Data Mining....................................................................................................................................................... 438 Objective 11.10 Describe data mining and how it works. BITS&BYTES: Hadoop: How Big Data Is Being Managed................................................................................ 439 ETHICS IN IT: Data, Data Everywhere—But Is It Protected?............................................................................. 441 Contents xv Using Databases to Make Business Decisions............................................................................................... 441 Business Information Systems........................................................................................................................... 441 Objective 11.11 Describe the main types of business information systems and how they are used by business managers. SOUND BYTE: Analyzing Data with Microsoft Power BI Suite.............................................................................. 446 BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web...................................................... 446 TRENDS IN IT: Mobile Business Intelligence..................................................................................................... 447 SOLVE THIS: College Database........................................................................................................................ 455 Chapter 12 Behind the Scenes: Networking and Security in the Business World................. 456 Part 1: Client/Server Networks and Topologies............................................................................................................... 458 Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on them, and network topologies used to construct them. Client/Server Network Basics........................................................................................................................... 458 Networking Advantages.................................................................................................................................... 458 Objective 12.1 List the advantages for businesses of installing a network. Comparing Client/Server and Peer-to-Peer Networks........................................................................................ 459 Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network. Types of Client/Server Networks........................................................................................................................ 460 Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use. BITS&BYTES: Your Car Network Can Be Hacked!............................................................................................ 463 Servers and Network Topologies...................................................................................................................... 464 Servers.............................................................................................................................................................. 464 Objective 12.4 List the common types of servers found on client/server networks. HELPDESK: Using Servers................................................................................................................................................... 465 TRENDS IN IT: Virtualization: Making Servers Work Harder.............................................................................. 466 Network Topologies........................................................................................................................................... 467 Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one. SOUND BYTE: Network Topology and Navigation Devices.................................................................................................... 469 TRY THIS: Sharing Printers on a Network Using Windows................................................................................ 474 MAKE THIS: TOOL: App Inventor 2 or Thunkable............................................................................................. 475 Part 2: Setting Up Business Networks............................................................................................................................. 476 Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and network navigation devices and explain major threats to network security and how to mitigate them. Transmission Media........................................................................................................................................... 476 Wired and Wireless Transmission Media............................................................................................................ 476 Objective 12.6 Describe the types of wired and wireless transmission media used in networks. BITS&BYTES: Go Green with Mobile Apps....................................................................................................... 478 Network Adapters and Navigation Devices..................................................................................................... 478 Network Adapters............................................................................................................................................. 478 Objective 12.7 Describe how network adapters help data move around a network. MAC Addresses................................................................................................................................................ 480 Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network. Switches, Bridges, and Routers........................................................................................................................ 481 Objective 12.9 List the various network navigation devices, and explain how they help route data through networks. HELPDESK: Transmission Media and Network Adapters...................................................................................................... 482 Network Operating Systems and Network Security....................................................................................... 482 Network Operating Systems.............................................................................................................................. 483 Objective 12.10 Explain why network operating systems are necessary for networks to function. BITS&BYTES: Smart Lighting for Smart Homes............................................................................................... 483 xvi