Computing Essentials 2017 PDF
Document Details
Uploaded by Deleted User
2017
Timothy J. O’Leary, Linda I. O’Leary, Daniel A. O’Leary
Tags
Related
- Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 03_ocred_fax_ocred.pdf
- Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 04_ocred_fax_ocred.pdf
- Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 05_ocred_fax_ocred.pdf
- Computing Essentials Chapter 1 PDF
- Basic Computer Hardware Servicing PDF
- Module 12 - Cloud Computing (PDF)
Summary
This is a textbook titled "Computing Essentials 2017" covering fundamental information technology topics like the internet, software, hardware, and application programs. It's organized into chapters covering various aspects of computers and technology. It is written by Timothy J. O’Leary, Linda I. O’Leary, and Daniel A. O’Leary, published by McGraw-Hill Education.
Full Transcript
Computing Essentials 2017 Making IT work for you The O’Leary Series Computing Concepts Computing Essentials 2014 Introductory & Complete Editions Computing Essentials 2015 Introductory & Complete Editions Computing Essentials 201...
Computing Essentials 2017 Making IT work for you The O’Leary Series Computing Concepts Computing Essentials 2014 Introductory & Complete Editions Computing Essentials 2015 Introductory & Complete Editions Computing Essentials 2017 (Complete Edition) Microsoft Office Applications Microsoft® Windows 7: A Case Approach Microsoft® Office 2013: A Case Approach Microsoft® Office Word 2013: A Case Approach Introductory Edition Microsoft® Office Excel 2013: A Case Approach Introductory Edition Microsoft® Office Access 2013: A Case Approach Introductory Edition Microsoft® Office PowerPoint 2013: A Case Approach Introductory Edition Computing Essentials 2017 Making IT work for you Timothy J. O’Leary Professor Emeritus Arizona State University Linda I. O’Leary Daniel A. O’Leary PhD University of California at Santa Cruz COMPUTING ESSENTIALS 2017 COMPLETE EDITION Published by McGraw-Hill Education, 2 Penn Plaza, New York, NY 10121. Copyright © 2017 by McGraw-Hill Edu- cation. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of McGraw-Hill Education, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Some ancillaries, including electronic and print components, may not be available to customers outside the United States. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 RMN/RMN 1 0 9 8 7 6 ISBN 978-1-259-56365-2 MHID 1-259-56365-0 ISSN 2158-8805 Senior Vice President, Products & Markets: Kurt L. Strand Vice President, General Manager, Products & Markets: Michael Ryan Vice President, Content Design & Delivery: Kimberly Meriwether David Managing Director: Scott Davidson Executive Brand Manager: Wyatt Morris Director, Product Development: Meghan Campbell Senior Product Developer: Alan Palmer Executive Marketing Managers: Tiffany Russell, Debbie Clare Senior Product Developer: Kevin White Senior Digital Product Analyst: Thuan Vinh Director, Content Design & Delivery: Terri Schiesl Program Manager: Mary Conzachi Content Project Managers: Mary E. Powers (Core), Danielle Clement (Assessment) Buyer: Susan K. Culbertson Design: Srdjan Savanovic Content Licensing Specialists: Carrie Burger (Image), DeAnna Dausener (Text) Cover Image: © Photosani/Shutterstock Compositor: SPi Global Printer: R. R. Donnelley All credits appearing on page or at the end of the book are considered to be an extension of the copyright page. The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website does not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education does not guarantee the accuracy of the information presented at these sites. www.mhhe.com Dedication We dedicate this edition to Nicole and Katie—our inspiration. Brief Contents 1 Information Technology, the Internet, and You 2 2 The Internet, the Web, and Electronic Commerce 26 3 Application Software 60 4 System Software 88 5 The System Unit 114 6 Input and Output 140 7 Secondary Storage 172 8 Communications and Networks 194 9 Privacy, Security, and Ethics 222 10 Information Systems 252 11 Databases 276 12 Systems Analysis and Design 302 13 Programming and Languages 328 The Evolution of the Computer Age 360 The Computer Buyer’s Guide 371 Glossary 375 Index 396 vi Contents File Transfer Utilities 35 1 Internet Security Suites 36 Communication 37 INFORMATION TECHNOLOGY, E-mail 37 THE INTERNET, AND YOU 2 Messaging 38 Social Networking 39 Introduction 4 Blogs, Microblogs, Webcasts, Podcasts, Information Systems 4 and Wikis 41 People 6 Search Tools 43 Software 7 Search Engines 43 System Software 7 Specialized Search Engines 43 Application Software 8 Content Evaluation 43 Electronic Commerce 44 Making IT work for you: Security 45 Free Antivirus Program 9 Cloud Computing 46 The Internet of Things 47 Hardware 10 Careers in IT 48 Types of Computers 10 A Look to the Future: Your Car’s Dashboard Personal Computer Hardware 11 as a Powerful, Internet-Connected Computing Data 13 Device 49 Connectivity and the Mobile Internet 14 Careers in IT 15 Visual Summary 50 A Look to the Future: Using and Understanding Key Terms 54 Information Technology 16 Multiple Choice 55 Matching 56 Visual Summary 17 Open-Ended 56 Key Terms 20 Discussion 57 Multiple Choice 21 Photo Credits 59 Matching 22 Open-Ended 22 Discussion 23 Photo Credits 25 3 APPLICATION SOFTWARE 60 2 Introduction 62 Application Software 62 THE INTERNET, THE WEB, User Interface 62 AND ELECTRONIC COMMERCE 26 Common Features 64 General-Purpose Applications 64 Introduction 28 Word Processors 64 The Internet and the Web 28 Spreadsheets 67 Presentation Graphics 69 Making IT work for you: Database Management Systems 70 Online Entertainment 30 Specialized Applications 70 Graphics 70 Internet Access 32 Video Game Design Software 73 Providers 32 Web Authoring Programs 73 Browsers 32 Other Specialized Applications 74 Web Utilities 34 Mobile Apps 74 Plug-ins 34 Apps 74 Filters 34 App Stores 75 vii Software Suites 76 Office Suites 76 5 Cloud Computing 76 Specialized and Utility Suites 76 THE SYSTEM UNIT 114 Careers in IT 77 Introduction 116 Making IT work for you: System Unit 116 Desktops 116 Google Docs 78 Laptops 116 Tablets 117 A Look to the Future: Next-Generation Smartphones 118 User Interfaces 79 Wearable Computers 118 Components 118 Visual Summary 80 System Board 119 Key Terms 83 Microprocessor 120 Multiple Choice 84 Microprocessor Chips 121 Matching 85 Specialty Processors 121 Open-Ended 85 Memory 122 Discussion 86 RAM 122 Photo Credits 87 ROM 122 Flash Memory 122 Expansion Slots and Cards 123 Bus Lines 124 4 Expansion Buses 124 Ports 125 SYSTEM SOFTWARE 88 Standard Ports 126 Introduction 90 Specialized Ports 126 Cables 126 System Software 90 Operating Systems 91 Functions 91 Making IT work for you: Features 92 Tv Tuners 127 Categories 93 Mobile Operating Systems 94 Power Supply 128 Desktop Operating Systems 95 Electronic Data and Instructions 129 Windows 95 Numeric Representation 129 Mac OS 95 Character Encoding 129 UNIX and Linux 96 Careers in IT 130 Virtualization 96 A Look to the Future: Chips inside Utilities 97 Your Brain 131 Making IT work for you: Visual Summary 132 Mac OS X Activity Monitor 98 Key Terms 135 Multiple Choice 136 Windows Utilities 100 Matching 137 Utility Suites 103 Open-Ended 137 Careers in IT 104 Discussion 138 A Look to the Future: Self-Healing Computers Photo Credits 139 Could Mean an End to Computer Crashes and Performance Problems 105 Visual Summary 106 6 Key Terms 109 Multiple Choice 110 INPUT AND OUTPUT 140 Matching 111 Introduction 142 Open-Ended 111 Discussion 112 What Is Input? 142 Photo Credits 113 Keyboard Entry 142 Keyboards 143 viii CONTENTS Pointing Devices 144 Mouse 144 Touch Screen 144 7 Game Controllers 144 SECONDARY STORAGE 172 Stylus 145 Introduction 174 Scanning Devices 145 Storage 174 Optical Scanners 146 Card Readers 146 Hard Disks 175 Bar Code Readers 146 Internal Hard Disk 176 RFID Readers 147 External Hard Drives 176 Character and Mark Recognition Performance Enhancements 176 Devices 147 Solid-State Storage 178 Image Capturing Devices 147 Solid-State Drives 178 Digital Cameras 148 Flash Memory Cards 178 Webcams 148 USB Drives 178 Audio-Input Devices 148 Optical Discs 179 Voice Recognition Systems 148 Cloud Storage 180 What Is Output? 149 Making IT work for you: Monitors 149 Features 149 Cloud Storage 182 Flat-Panel Monitors 150 Curved Monitors 150 Mass Storage Devices 184 E-book Readers 150 Enterprise Storage System 184 Other Monitors 151 Storage Area Network 185 Careers in IT 185 Making IT work for you: E-Books 152 A Look to the Future: Next-Generation Storage 186 Printers 153 Features 153 Inkjet Printers 153 Visual Summary 187 Laser Printers 154 Key Terms 190 3D Printers 154 Multiple Choice 190 Other Printers 154 Matching 191 Audio-Output Devices 155 Open-Ended 192 Combination Input and Output Discussion 192 Devices 155 Photo Credits 193 Headsets 155 Multifunctional Devices 156 Telephones 156 Drones 156 Robots 156 8 Making IT work for you: Skype 157 COMMUNICATIONS Virtual Reality Headgear and Gloves 159 AND NETWORKS 194 Ergonomics 159 Introduction 196 Portable Computers 161 Communications 196 Careers in IT 161 Connectivity 196 A Look to the Future: Augmented Reality The Wireless Revolution 197 Displays 162 Communication Systems 197 Communication Channels 198 Physical Connections 198 Visual Summary 163 Wireless Connections 199 Key Terms 167 Multiple Choice 168 Connection Devices 200 Matching 169 Modems 200 Open-Ended 169 Connection Service 200 Discussion 170 Data Transmission 202 Photo Credits 171 Bandwidth 202 Protocols 202 CONTENTS ix Careers in IT 241 Making IT work for you: A Look to the Future: Mobile Internet 203 The End of Anonymity 242 Networks 204 Terms 204 Visual Summary 243 Network Types 206 Key Terms 246 Local Area Networks 206 Multiple Choice 247 Home Networks 206 Matching 248 Wireless LAN 207 Open-Ended 248 Personal Area Network 207 Discussion 249 Metropolitan Area Networks 208 Photo Credits 251 Wide Area Networks 208 Network Architecture 208 Topologies 209 Strategies 210 10 Organizational Networks 210 Internet Technologies 211 INFORMATION SYSTEMS 252 Network Security 211 Introduction 254 Careers in IT 212 Organizational Information Flow 254 A Look to the Future: Telepresence Functions 254 Lets You Be There without Actually Management Levels 256 Being There 213 Information Flow 257 Computer-Based Information Visual Summary 214 Systems 258 Key Terms 217 Transaction Processing Systems 259 Multiple Choice 218 Management Information Systems 261 Matching 219 Decision Support Systems 262 Open-Ended 219 Executive Support Systems 263 Discussion 220 Other Information Systems 265 Photo Credits 221 Expert Systems 266 Careers in IT 266 A Look to the Future: IBM’s Watson: 9 The Ultimate Information-Finding Machine 267 PRIVACY, SECURITY, AND ETHICS 222 Visual Summary 268 Key Terms 270 Introduction 224 Multiple Choice 271 People 224 Matching 272 Privacy 224 Open-Ended 272 Large Databases 225 Discussion 273 Private Networks 227 Photo Credits 274 The Internet and the Web 227 Online Identity 230 Major Laws on Privacy 230 Security 231 Cybercrime 231 11 Measures to Protect Computer DATABASES 276 Security 235 Ethics 238 Introduction 278 Data 278 Making IT Work for You: Data Organization 279 Key Field 280 Cloud-Based Backup 239 Batch versus Real-Time Processing 280 Copyright and Digital Rights Databases 281 Management 240 Need for Databases 282 Plagiarism 240 Database Management 282 x CONTENTS DBMS Structure 284 Prototyping 315 Hierarchical Database 284 Rapid Applications Development 315 Network Database 285 Careers in IT 316 Relational Database 285 A Look to the Future: The Challenge Multidimensional Database 286 of Keeping Pace 317 Object-Oriented Database 287 Types of Databases 288 Visual Summary 318 Individual 288 Key Terms 322 Company 288 Multiple Choice 323 Distributed 289 Matching 324 Commercial 289 Open-Ended 324 Database Uses and Issues 290 Discussion 325 Strategic Uses 290 Photo Credits 326 Security 290 Careers in IT 291 A Look to the Future: The Future of Crime Databases 292 13 PROGRAMMING Visual Summary 293 AND LANGUAGES 328 Key Terms 296 Multiple Choice 297 Introduction 330 Matching 298 Programs and Programming 330 Open-Ended 298 What Is a Program? 330 Discussion 299 What Is Programming? 330 Photo Credits 301 Step 1: Program Specification 332 Program Objectives 332 Desired Output 332 Input Data 332 12 Processing Requirements 333 Program Specifications Document 333 SYSTEMS ANALYSIS Step 2: Program Design 334 AND DESIGN 302 Top-Down Program Design 334 Pseudocode 335 Introduction 304 Flowcharts 335 Systems Analysis and Design 304 Logic Structures 337 Phase 1: Preliminary Investigation 306 Step 3: Program Code 338 Defining the Problem 306 The Good Program 338 Suggesting Alternative Systems 307 Coding 338 Preparing a Short Report 307 Step 4: Program Test 340 Phase 2: Systems Analysis 308 Syntax Errors 340 Gathering Data 308 Logic Errors 340 Analyzing the Data 308 Testing Process 340 Documenting Systems Analysis 310 Step 5: Program Documentation 342 Phase 3: Systems Design 310 Step 6: Program Maintenance 343 Designing Alternative Systems 310 Operations 343 Selecting the Best System 311 Changing Needs 343 Writing the Systems Design Report 311 CASE and OOP 344 Phase 4: Systems Development 312 CASE Tools 344 Acquiring Software 312 Object-Oriented Software Acquiring Hardware 312 Development 344 Testing the New System 313 Generations of Programming Languages 346 Phase 5: Systems Implementation 313 Machine Languages: The First Types of Conversion 313 Generation 346 Training 314 Assembly Languages: The Second Phase 6: Systems Maintenance 314 Generation 346 Prototyping and Rapid Applications High-Level Procedural Languages: The Third Development 315 Generation 346 CONTENTS xi Task-Oriented Languages: The Fourth The Evolution of the Computer Generation 347 Age 360 Problem and Constraint Languages: The Fifth Generation 348 The Computer Buyer’s Guide 371 Careers in IT 349 A Look to the Future: Your Own Glossary 375 Programmable Robot 350 Index 396 Visual Summary 351 Key Terms 355 Multiple Choice 356 Matching 357 Open-Ended 357 Discussion 358 Photo Credits 359 xii CONTENTS New to Computing Essentials 2017 Every chapter’s Making IT Work for You, Privacy, Ethics, and Environment features have been carefully revaluated, enhanced, and/or replaced. Additionally, every chapter’s Look to the Future has been revised to show that the expected breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the following. Chapter 1 Revised Figure 1-1 Parts of an Information System to include mobile devices (tablets and smartphones), Windows 10 operating system, and Office 10 Chapter 2 Added coverage of Microsoft’s new Edge browser, https and MMS (Multimedia Messaging Service) Expanded coverage of Facebook Messenger, Google Hangouts Added coverage Instagram, Pinterest, Tumblr, and Vine Added a major new section on the Internet of Things (IoT) Chapter 3 Added coverage of video editors and video game design software Added discussion of game apps including role playing games (RPG) Expanded Cloud Computing to include Microsoft Office 365 for Office and iPad. Chapter 4 Expanded coverage of voice recognition and real time operating systems (RTOS) Undated operating systems to include coverage of Windows 10 and Cortana Expanded coverage of Mac OS including Yosemite and related system software Expanded coverage of Chrome OS Chapter 5 Expanded coverage of laptops to include two-in-one, gaming, and ultrabooks Expanded coverage of tablets to include keyboard attachments, digital pens, and speech recognition Added a new major section on Wearable Computers Expanded and updated ports and cables Chapter 6 Added coverage of gaming mice, 3D scanners, and smart cards Expanded coverage of voice recognition systems to include digital assistants (Siri, Cortana, and Google Now) Updated resolution standards to include UHD 4K and UHD 5K Added coverage of UHDTV, 3D UHDTV, digital projectors headsets and headphones Expanded coverage of drones, robots, and virtual reality Chapter 7 Reorganized chapter to give more prominence to solid-state storage Expanded solid-storage, flash memory coverage, and NAS Chapter 8 Updated Wi-Fi standards to include 802.11ac and 802.11ax Added cellular as a wireless connection technology including discussion of cells and cell towers Expanded coverage of LTE as a fourth-generation mobile telecommunication technology Chapter 9 Added Privacy relating to drones and the Dark Web Added Ethics boxes relating to the right to be forgotten and net neutrality Added a Tip on creating strong passwords Added a new section on security tools including password managers Chapters 10, New end of chapter case 11, 12, and 13 xiii Preface T he 20th century brought us the dawn of the digital informa- tion age and unprecedented changes in information technology. In fact, the rate of change is clearly increasing. As we begin the 21st century, computer literacy is undoubtedly becoming a prerequisite in whatever career you choose. The goal of Computing Essentials is to provide you with the basis for understanding the concepts necessary for success. Computing Essentials also endeavors to instill an appreciation for the effect of information technology on people, privacy, ethics, and our environment and to give you a basis for building the necessary skill set to succeed in the 21st century. Times are changing, technology is changing, and this text is changing too. As students of today, you are different from those of yesterday. You put much effort toward the things that interest you and the things that are relevant to you. Your efforts directed at learning application pro- grams and exploring the web seem, at times, limitless. On the other hand, it is sometimes difficult to engage in other equally important topics such as personal privacy and technological advances. At the beginning of each chapter, we carefully layout why and how the chapter’s content is relevant to your life today and critical to your future. Within each chapter, we present practical tips related to key concepts through the demonstration of interesting applications that are relevant to your lives. Topics presented focus first on outputs rather than pro- cesses. Then, we discuss the concepts and processes. Motivation and relevance are the keys. This text has several features specifically designed to engage and demonstrate the relevance of tech- nology in your lives. These elements are combined with a thorough coverage of the concepts and sound pedagogical devices. xiv Visual Learning VISUAL CHAPTER OPENERS Revised Pages Revised Pages chapter 2 The Internet, the Web, and Electronic Commerce Each chapter begins with a Why Why should I read this chapter? Should I Read This? feature that The Internet has changed the world, and will continue to presents a visually engaging and have an amazing impact on our day-to-day lives. For exam- ple, cars promise to soon be able to drive themselves, avoid traffic accidents and congestion, and automatically adjust personal schedules and much more. concise presentation of the chap- This chapter covers the things you need to know to be prepared for this ever-changing digital world, including: Impact—how Internet technology is changing your world. ter’s relevance to the reader’s Hardware—how to connect your life to the Internet, including Wi-Fi, smartphones, and tablets. Applications—how to get ahead using social network- ing, streaming technology, and cloud computing. Learning Objectives current and future life in the digi- After you have read this chapter, you should be able to: 1 Explain the origins of the Internet and the web. tal world. Then a list of chapter 2 Explain how to access the web using providers and browsers. 3 Compare different web utilities, including plug-ins, filters, file transfer utilities, and Internet secu- rity suites. 4 Compare different Internet communications, including e-mail, text messaging, instant messaging, learning objectives is presented social networking, blogs, microblogs, webcasts, podcasts, and wikis. 5 Describe search tools, including search engines and specialized search engines. 6 Evaluate the accuracy of information presented on the web. providing a brief introduction 7 Identify electronic commerce, including B2C, C2C, B2B, and security issues. 8 Describe cloud computing, including the three-way interaction of clients, Internet, and service providers. 9 Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow to what will be covered in the everyday objects to send and receive data. chapter. 26 27 ole63650_ch02_026-059.indd 26 10/15/15 05:14 PM ole63650_ch02_026-059.indd 27 10/15/15 05:14 PM VISUAL SUMMARIES Revised Pages Revised Pages To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand Visual summaries appear at the VISUAL SUMMARY electronic commerce, and to use web utilities. The Internet, the Web, and Electronic Commerce WEB UTILITIES COMMUNICATION end of every chapter and sum- INTERNET AND WEB INTERNET ACCESS marize major concepts covered throughout the chapter. Like the chapter openers, these summaries E-mail E-mail (electronic mail) is the transmission of electronic messages. There are two basic types of e-mail systems: use graphics to reinforce key Web utilities are specialized utility programs that make Client-based e-mail systems use e-mail clients using the Internet and the web easier and safer. installed on your computer. Internet Once connected to the Internet, your computer seemingly Web-based e-mail systems use webmail clients located becomes an extension of a giant computer that branches plug-ins Launched in 1969 with ARPANET, the Internet consists on the e-mail provider’s computer. This is known as Plug-ins are automatically loaded and operate as part of a concepts in an engaging and of the actual physical network. all over the world. webmail. browser. Many websites require specific plug-ins to fully experience their content. Some plug-ins are included in A typical e-mail has three basic elements: header Web providers (including address, subject, and perhaps attachment), Internet service providers are connected to the Internet, many of today’s browsers; others must be installed. Introduced in 1991 the web (World Wide Web, WWW) message, and signature. providing a path for individuals to access the Internet. meaningful way. provides a multimedia interface to Internet resources. Three Filters generations: Web 1.0 (existing information), Web 2.0 (con- Connection technologies include DSL, cable, and wire- Filters are used by parents and organizations to block cer- user name top-level domain tent creation and social interaction), and Web 3.0 (automatic less modems. tain sites and to monitor use of the Internet and the web. [email protected] personalized content). browsers domain name Browsers provide access to web resources. Some related File Transfer Utilities Common Uses File transfer utilities copy files to (downloading) and from The most common uses of the Internet and the web terms are URLs—locations or addresses to web resources; two (uploading) your computer. There are three types: Spam is unwanted and unsolicited e-mail that may include parts are protocol and domain name; top-level domain File transfer protocol (FTP) and secure file transfer include a computer virus or destructive programs often Communication—the most popular Internet activity. protocol (SFTP) allow you to efficiently copy files attached to unsolicited e-mail. Spam blockers, also known as (TLD) or web suffix identifies type of organization. Shopping—one of the fastest-growing Internet across the Internet. spam filters, are programs that identify and eliminate spam. activities. HTML—commands to display web pages; hyperlinks (links) are connections. BitTorrent distributes file transfers across many differ- Searching—access libraries and local, national, and ent computers. messaging international news. Technologies providing interactive, animated websites Web-based file transfer services make use of a web While e-mail is the most widely used, there are two other include cascading style sheets, or CSS (to control the Education—e-learning or taking online courses. appearance of web pages); JavaScript (to trigger interac- browser to upload and download files. messaging systems: Entertainment—music, movies, magazines, and com- tive features); AJAX (to create quick response interactive Text messaging, also known as texting and SMS (short puter games. websites; and applets (to display graphics, provide inter- Internet Security Suite message service), is a process of sending short electronic active games, and more). An Internet security suite is a collection of utility pro- messages typically less than 160 characters. Texting while Mobile browsers run on portable devices. grams designed to protect your privacy and security on driving is very dangerous and illegal in several states. the Internet. Instant messaging (IM)—supports live communication between friends. Most instant messaging programs also include videoconferencing features, file sharing, and remote assistance. 50 ChApTEr 2 ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 51 ole63650_ch02_026-059.indd 50 10/15/15 05:14 PM ole63650_ch02_026-059.indd 51 10/15/15 05:14 PM xv Unique Content MAKING IT WORK FOR YOU Revised Pages Making IT work for you Special-interest topics are presented in the Mak- ing IT Work for You section found within nearly FREE ANTIVIRUS PROGRAM Have you or someone you know had a slower computing experience due to a spyware infection? Even every chapter. These topics include Installing a Free worse, perhaps a malicious piece of software stole crucial, personal information or caused a total system failure. Most of these problems can be averted by having an up-to-date antivirus program running in your computer’s memory at all times. This exercise shows you how to download and install a free antivirus pro- Antivirus Program, Online Entertainment, Google gram if your computer does not yet have one. (Please note that the web is continually changing, and some of the specifics presented below may have changed.) Docs, Skype, and Cloud Storage. getting Started First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free antivirus program: 1 Visit http://free.avg.com and click the Download button. You will be asked to confirm that you want the free edition and then redirected to a download site. 2 run the installation file and follow the prompts. 3 Select basic protection if you are asked which product you would like to install. using AVg Generally speaking, your antivirus program watches your system for malware and updates itself automatically. However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari- ous components of the software. 1 click Scan now to run a full scan on your computer. 2 Just to the right of that, click the button with the white cog to see the scan options where you can set a schedule for automated scans. 3 click the back arrow to reach the main screen, where you can click various elements of the program to configure them. for example, clicking Web will allow you to turn on a feature that detects cookies that may be used to track your online activity. 9 ole63650_ch01_002-025.indd 9 10/12/15 11:07 AM PRIVACY, ETHICS, AND ENVIRONMENT Rev. Confirming Pages Nearly every chapter has a Privacy box located in the margin adjacent to the coverage of related tech- privacy nologies. Topics include protecting personal infor- Did you know that one type of specialty processor is devoted exclusively to protecting your mation when using a free Wi-Fi network or when privacy? Called cryptoproces- sors, these microchips perform encoding and decoding of data faster and more securely than disposing of an outdated computer. a CPU. These specialized chips exist in ATMs, TV set-top boxes, and smartcards. Figure 5-10 chip mounted onto a chip carrier networking card plugs into a slot on the system board to provide a connection to a ethics local area network. Connecting lines called bus lines provide pathways that support communication Nearly every chapter has an Ethics box located in Because labor costs are much lower in China, many computers and peripherals are among the various electronic components that are either located on the system board or attached to the system board. Generally, the system board found on a desktop is larger than that found on a lap- the margin adjacent to the coverage of related tech- manufactured there. While this has resulted in the loss of jobs top, and much larger than one found on a tablet, smartphone, or wearable computer. elsewhere, it has improved the Although these system boards vary in size, they nevertheless all perform the same standard of living for millions function of communicating between the components of the personal computer. nologies. Topics include proper disposal of older of Chinese. Unfortunately, their working conditions are considered to be very poor. Do concept check CRT monitors, empty inkjet cartridges, and old you think consumers have an ethical responsibility regarding where and/or how products are What is the system board, and what does it do? manufactured? computers. Define and describe sockets, slots, and bus lines. What are chips? How are chips attached to the system board? Microprocessor In most personal computer systems, the central processing unit (CPU) or processor is contained on a single chip called the microprocessor. The microprocessor is the Nearly every chapter has an Environment box environment “brains” of the computer system. It has two basic components: the control unit and the arithmetic-logic unit. Have you ever wondered Control unit: The control unit tells the rest of the computer system how to carry located in the margin adjacent to the coverage of what you should do with your out a program’s instructions. It directs the movement of electronic signals between old computers equipment? memory, which temporarily holds data, instructions, and processed information, Consider donating them to and the arithmetic-logic unit. It also directs these control signals between the CPU charitable organizations that related technologies. Topics include plagiarism of and input and output devices. work with local schools and low-income families. Or, recycle Arithmetic-logic unit: The arithmetic-logic unit, usually called the ALU, performs them. Many computer retailers two types of operations: arithmetic and logical. Arithmetic operations are the online materials, editing images to promote a partic- and local government agencies fundamental math operations: addition, subtraction, multiplication, and division. accept recycled equipment. Logical operations consist of comparisons such as whether one item is equal to (=), less than () the other. ular message, and the use of monitoring software. 120 chapter 5 Untitled-2 120 12/01/15 12:32 PM xvi Unique End-of-Chapter Discussion Materials MAKING IT WORK FOR YOU Revised Pages Making IT Work for You discussion questions are carefully integrated with the chapter’s Making IT Work for You top- DISCUSSION Respond to each of the following questions. ics. The questions facilitate in-class discussion or written assignments focusing on applying specific technologies into 1 Making IT Work for You: ONLINE ENTERTAINMENT Review the Making IT Work for You: Online Entertainment on pages 30–31, and then respond to the a student’s day-to-day life. They are designed to expand a following: (a) Do you currently have a subscription to Netflix, Hulu Plus, or another service that allows you to stream movies and TV shows? If so, which ones? If student’s awareness of technology applications. not, do you plan on using one in the future? Why or why not? (b) What device do you use most often to watch video content from the web? Would you con- sider purchasing a dedicated streaming device such as the PRIVACY Roku? Why or why not? (c) Could ever see yourself cancel- ing or “cutting the cord” from your current cable or satellite service? Why or why not? Privacy discussion questions are carefully integrated with 2 Privacy: SOCIAL NETWORKING the chapter’s marginal Privacy box. The questions facilitate When a Facebook friend posts a picture, video, or text that includes you, who can view that post? Review the Privacy box on page 40, and respond to the following: in-class discussion or written assignments focusing on (a) Who should be responsible for ensuring privacy on social networking sites? Defend your position. (b) Do you think that most people are aware of their privacy critical privacy issues. They are designed to develop a settings on Facebook? Have you ever checked your settings? Why or why not? (c) Investigate and then summarize the default security settings for a social student’s ability to think critically and communicate networking website such as Facebook or Google+. effectively. Revised Pages ETHICS ChApTEr 2 57 Ethics discussion questions are carefully integrated with ole63650_ch02_026-059.indd 57 10/15/15 05:14 PM 3 Ethics: FILTERING AND MONITORING Parents can use content filters and monitoring software to the chapter’s marginal Ethics boxes. The questions facili- restrict or monitor their child’s Internet behavior. Review the tate in-class discussion or written assignments focusing on Ethics box on page 35, and respond to the following: (a) Is it ethical for parents to filter ethical issues relating to technology. They are designed to or monitor Internet content for their children? Does your answer depend on the age of develop a student’s ability to think critically and communi- the child? Defend your position. (b) Should parents inform their children that Internet activity cate effectively. is being filtered or monitored? Why or why not? (c) Do you feel that filtering or monitoring soft- ware is the best way to protect children? Defend your position. 4 Environment: E-MAIL ENVIRONMENT Review the Environment box on page 37, and then respond to the following: (a) When it comes to sending letters, holiday cards, and invitations to friends and family, do you mostly use e-mail or postal mail? What are your reasons for choos- ing one over the other? (b) Are there any situations where you feel that using e-mail would be inappropriate? (c) Have you Environment discussion questions are carefully integrated signed up for paperless billing from your financial institutions with the chapter’s marginal Environment boxes. The ques- and utility companies? Why or why not? (d) Go through all the paper mail you have received in tions facilitate in-class discussion or written assignments the last week or two. Is there anything there that you could receive via e-mail or view on the focusing on environmental issues relating to technology. web? If so, list a few examples. They are designed to develop a student’s ability to think critically and communicate effectively. 58 ChApTEr 2 xvii ole63650_ch02_026-059.indd 58 10/15/15 05:14 PM Shopping is one of the fastest-growing Internet applications. You can window shop, look for the latest fashions, search for bargains, and make purchases. Searching for information has never been more convenient. You can access some of the world’s largest libraries directly from your home computer. You can find the latest local, national, and international news. Reinforcing Key Concepts Education or e-learning is another rapidly emerging web application. You can take classes on almost any subject. There are courses just for fun, and there are courses for high school, college, and graduate school credit. Some cost nothing to take and others cost a lot. Entertainment options are nearly endless. You can find music, movies, magazines, and computer games. You will find live concerts, movie previews, book clubs, and interactive live games. To learn more about online entertainment, see Making IT CONCEPT CHECKS Work for You: Online Entertainment on pages 30–31. The first step to using the Internet and the web is to get connected, or to gain access to the Internet. Located at points throughout each chap- concept check ter, the Concept Check cues you to note What is the difference between the Internet and the web? which topics have been covered and to Describe how the Internet and the web started. What are the three web generations? self-test your understanding of the List and describe five of the most common uses of the Internet and the web. material presented. Revised Pages ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 29 KEY TERMS KEY TERMS address (33, 37) message (37) Advanced Research Project Agency microblog (41) Throughout the text, the most important terms Network (ARPANET) (28) MMS (multimedia messaging ole63650_ch02_026-059.indd 29 10/15/15 05:14 PM AJAX (33) service) (38) applets (33) mobile browser (33) attachment (37) online (28) BitTorrent (35) blog (41) plug-in (34) podcast (42) are presented in bold and are defined within the browser (32) protocol (33) business-to-business (B2B) (45) business-to-consumer (B2C) (44) search engine (43) search service (43) text. You will also find a list of key terms at the end cable (32) secure file transfer protocol (SFTP) (35) cascading style sheets (CSS) (33) Circles (40) signature (37) SMS (short messaging service) (38) of each chapter and in the glossary at the end of client-based e-mail system (38) social networking (39) cloud computing (46) consumer-to-consumer (C2C) (44) digital cash (45) spam (38) spam blocker (38) spam filter (38) the book. domain name (33) specialized search engine (43) downloading (35) spider (43) DSL (32) streaming (41) e-commerce (44) subject (37) e-learning (29) texting (38) electronic commerce (44) text messaging (38) electronic mail (37) top-level domain (TLD) (33) e-mail (37) tweet (41) e-mail client (38) Twitter (41) Facebook (39) uniform resource locator (URL) (33) Facebook groups (40) uploading (35) Facebook Pages (40) virus (38) Facebook Profile (40) web (28) Revised Pages file transfer protocol (FTP) (35) Web 1.0 (28) filter (34) Web 2.0 (28) friend (39) Web 3.0 (28) Google+ (40) web auction (44) Google Plus (40) web-based e-mail system (38) Hangouts (40) web-based file transfer services (35) header (37) webcasts (41) hit (43) web log (41) hyperlink (33) webmail (38) Hypertext Markup Language (HTML) (33) webmail client (38) instant messaging (IM) (39) Internet (28) webmaster (48) web page (33) MULTIPLE CHOICE Internet of Things (IoT) (47) web suffix (33) Internet security suite (36) web utility (34) Circle the correct answer. Internet service provider (ISP) (32) wiki (42) JavaScript (33) Wikipedia (42) 1. The network that connects computers all over the world. link (33) wireless modem (32) LinkedIn (40) World Wide Web (28) a. ARPANET c. LAN location (33) WWW (28) b. Internet d. web 2. The rules for exchanging data between computers. 54 ChApTEr 2 a. DSL c. web b. protocols d. WWW 3. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet. This is called: ole63650_ch02_026-059.indd 54 10/15/15 05:14 PM a. downloading c. blogging b. filtering d. uploading CHAPTER REVIEW 4. Communities of individuals who share a common interest typically create Facebook: a. clients c. Pages b. groups d. Profiles 5. Type of e-mail account that does not require an e-mail program to be installed on a