Warehouse Stock Clearance Sale

Grab a bargain today!


Go! Technology in Action with CDROM
By

Rating

Product Description
Product Details

Table of Contents

CHAPTER 1

Why Computers Matter to You:

Becoming Computer Fluent

    Becoming a Savvy Computer User and Consumer

     Being Prepared for Your Career

    Being Prepared for Your Career

        Computers in Business: Working in a Data Mine?  

Computers in Retail: Let Me Look That Up for You

         Computers in Shipping: UPS Data on the Go

         Computers in Ranching and Farming: High Tech Down on the Farm

         Computers in the Arts: Shall We Dance?

         Computers in the Medical Field: Fact or Science Fiction? 

         Computers in Law Enforcement:

         Put Down That Mouse–You’re Under Arrest! 

         Computers in the Legal Fields: Welcome to the Virtual Courtroom 

         Computers in Education: And on the Left, You See the Mona Lisa

         Computers and the Sciences: Programming the Perfect Storm 

         Computers in Sports: Bend Your Elbow Another Two Degrees?

         Computer Gaming Careers: Now Bigger Than Hollywood!

         Computers at Home: Just Program It and Forget It

 

     Getting Ready for the Technology of Tomorrow

 

        Nanoscience: The Next “Big” Thing  

         Biomedical Chip Implants: Combining Humans with Machines? 

         Artificial Intelligence: Will Computers Become Human?

    Understanding the Challenges Facing a Digital Society

        TRENDS IN IT: Ehics: Knowledge Is Power: Bridging the Digital Divide  

     Becoming Computer Fluent

         Computers Are Data Processing Devices  

         Bits and Bytes: The Language of Computers

         Computer Hardware 

         Computer Software 

         Computer Platforms: PCs and MACs

         Specialty Computers 

         DIG DEEPER: What Can You Do with a Digital Home? 

     

CHAPTER 2

 Looking at Computers:

 Understanding the Parts

    Your Computer’s Hardware

     Input Devices

         Keyboards  

         Mice and Other Pointing Devices

         Sound Input  

         Input Devices for Physically Challenged Individuals

     Output Devices

         Monitors  

         Printers 

         DIG DEEPER: How Inkjet and Laser Printers Work 

         Sound Output 

     The System Unit

         On the Front Panel  

         On the Back 

         Inside the System Unit 

    Setting It All Up

        TRENDS IN IT: Emerging Technologies: Tomorrow’s

          Display–You Can Take It with You! 

 TECHNOLOGY IN FOCUS

    Careers in IT

 

CHAPTER 3

Using the Internet:
Making the Most of the Web’s Resources

    The Internet

     Communicating Through the Internet: E-Mail and Other Technologies

         Instant Messaging  

         Voice over Internet Protocol (VoIP) 

         Weblogs (blogs) and Video Logs (vlogs) 

         Podcasts

         Webcasts 

         Wikis 

         E-Mail 

         Chat Rooms 
         Newsgroups

         Listservs

    Web Entertainment: Multimedia and Beyond

        TRENDS IN IT: Social Networking  

    Conducting Business over the Internet: E-Commerce

         E-Commerce Safeguards

     Managing Online Annoyances

         Spam  

         Cookies 

         Adware 

         Spyware

         Malware

         Phishing and Internet Hoaxes

     Navigating the Web: Web Browsers 
    Getting Around the Web: URLs, Hyperlinks, and Other Tools
        URLs 
        Hyperlinks and Beyond 

        Favorites and Bookmarks  

        Tabbed Browsing 
        TRENDS IN IT: Ethics: What Can You Borrow from the Internet? 

    Searching the Web: Search Engines and Subject Directories 

        Search Engines 
        DIG DEEPER: Refining Your Web Searches: Boolean Operators  
        Subject Directories 

         Evaluating Web Sites  

     Internet Basics

        The Internet’s Clients and Servers

         Connecting to the Internet

         Broadband Connections

         Dial-Up Connections 

         Choosing the Right Internet Connection Option 

    Finding an Internet Service Provider

        Choosing an ISP  

    The Origin of the Internet

        The Web Versus the Internet

    The Future of the Internet

 

CHAPTER 4

 Application Software:
Programs That Let You Work and Play

     The Nuts and Bolts of Software

     More Productivity at Home

        Word-Processing Software

         Spreadsheet Software 

         Presentation Software

         Database Software 

         Personal Information Manager (PIM) Software 

         Productivity Software Tools 

         Integrated Software Applications Versus Software Suites

         DIG DEEPER: Speech-Recognition Software

         Personal Financial Software 

     More Media at Home

         Digital Image-Editing Software  

         Digital Audio Software 

         Digital Video-Editing Software

         Media Management Software 

    More Fun at Home

         Gaming Software  

         Educational Software  

         Reference Software 

         Drawing Software 

     Business Software

        Home Business Software  

     Large-Business Software 
        TRENDS IN IT: Emerging Technologies: Is It Real or Is It Virtual?

         Specialized Business Software 

    Getting Help with Software

     Buying Software

         Standard Software  

         Web-Based Application Software 

         Discounted Software 

         Freeware and Shareware 

         Software Versions and Systems Requirements

    Installing/Uninstalling and Opening Software

         TRENDS IN IT: Ethics: Can I Borrow Software That I Don’t Own?

TECHNOLOGY IN FOCUS

    Digital Entertainment

 

CHAPTER 5

 Using System Software: The Operating System, Utility
Programs, and File Management

     System Software Basics

     Operating System Categories

         Real-Time Operating Systems  

         Single-User Operating Systems  

         Multiuser Operating Systems 

     Desktop Operating Systems

        Microsoft Windows  

         Mac OS 

    Unix

         Linux  

         TRENDS IN IT: Emerging Technologies: Open-Source Software:

         Why Isn’t Everyone Using Linux? 

     What the Operating System Does

         The User Interface  
         Processor Management  

        Memory and Storage Management

         Hardware and Peripheral Device Management

         Software Application Coordination 

     The Boot Process: Starting Your Computer

         Step 1 : Activating BIOS 

        Step 2 : Performing the Power-On Self-Test

        Step 3 : Loading the Operating System

        Step 4 : Checking Further Configurations and Customizations

         Handling Errors in the Boot Process 

    The Desktop and Windows Features

     Organizing Your Computer: File Management

        Organizing Your Files

         Viewing and Sorting Files and Folders

         Naming Files 

        Working with Files

     Utility Programs

         Display Utilities 
        The Add or Remove Programs Utility 

         File Compression Utilities 

         System Maintenance Utilities

         DIG DEEPER: How Disk Defragmenter Utilities Work 

         System Restore and Backup Utilities 

         The Task Scheduler Utility

         Accessibility Utilities 

 

CHAPTER 6

 Understanding and Assessing Hardware:

 Evaluating Your System

     Is It the Computer or Me?

    What Is Your Ideal Computer?

     Assessing Your Hardware: Evaluating Your System

     Evaluating the CPU Subsystem

        Analyzing Your CPU  

     Evaluating RAM: The Memory Subsystem

         Virtual Memory

         Adding RAM  

     Evaluating the Storage Subsystem

         The Hard Disk Drive  

        DIG DEEPER: How a Hard Disk Drive Works

        Portable Storage Options: The Floppy and Beyond 

         Upgrading Your Storage Subsystem 

     Evaluating the Video Subsystem

         Video Cards  
        TRENDS IN IT: Ethics: CD and DVD Technology: A Free Lunch—Or at 
        Least a Free Copy 

         Monitors 

     Evaluating the Audio Subsystem

        Speakers  

         Sound Cards 

    Evaluating Port Connectivity

        Adding Ports: Expansion Cards and Hubs  

    Evaluating System Reliability

        TRENDS IN IT: Computers in Society: How to Donate Your Old 
        Computer Safely  

    Making the Final Decision

TECHNOLOGY IN FOCUS

    Computing Alternatives

 

CHAPTER 7

 Networking and Security: Connecting Computers
and Keeping Them Safe from Hackers and Viruses

     Networking Fundamentals

     Network Architectures

         Describing Networks Based on Network Control  

         Describing Networks Based on Distance  

     Network Components

         Transmission Media

         Network Adapters 

         Network Navigation Devices

         Networking Software 

     Types of Peer-to-Peer Networks

         Wired Ethernet Networks

         Ethernet Switches

         Ethernet Routers 
        Wireless Ethernet Networks  

        Power-Line Networks 

         Phoneline Networks 

    Choosing a Peer-to-Peer Network

    Configuring Software for Your Home Network

        TRENDS IN IT: Emerging Technologies: Grid Computing: Aiding Scientific

         Research with Your Computer 

     Keeping Your Home Computer Safe

     Computer Threats: Hackers

         What Hackers Steal

         Trojan Horses

        Denial of Service Attacks 

         How Hackers Gain Access

         TRENDS IN IT: Computers in Society: Identity Theft: Is There More

          Than One You Out There?

     Computer Safeguards: Firewalls

         Types of Firewalls  

        Is  Your Computer Secure? 

    Securing Wireless Networks

        DIG DEEPER: How Firewalls Work

     Computer Threats: Computer Viruses

         Types of Viruses  

         Virus Classifications 

     Computer Safeguards: Antivirus Software

         Other Security Measures

         TRENDS IN IT: Careers: Cybercops on the Beat: Computer Security Careers 

 

CHAPTER 8

 Mobile Computing: Keeping Your Data on Hand

     Mobile Computing: Is It Right for You?

        Mobile Device Limitations  

    Mobile Computing Devices

     Cellular Phones

         Cell Phone Hardware  

         How Cell Phones Work 

         Cell Phone Features: Text Messaging

         Cell Phone Internet Connectivity 

     Portable Media Players

         PMP Hardware

         PMP Flash Memory and File Transfer 

         PMP Ethical Issues: Napster and Beyond 

     Personal Digital Assistants (PDAs)

        TRENDS IN IT: Emerging Technologies: Why Carry Your Data When

         You Can Wear It? 

         PDA Hardware

         PDA Operating Systems 

         PDA Memory and Storage

         PDA File Transfer and Synchronization 

         PDA Internet Connectivity 

         PDA Software and Accessories 

         PDA or Cell Phone? 

     Tablet PCs

         DIG DEEPER: The Power of GPS  

         Tablet PC Hardware 

         Tablet Software 

         Tablet or PDA? 

     Notebooks

         Notebook Hardware

         TRENDS IN IT: Ubiquitous Networking: Wherever You Go, There You Are

         Notebook Operating Systems and Ports 

         Notebook Batteries and Accessories 

         Notebook or Desktop? 

         TRENDS IN IT: Emerging Technologies: Nanotubes:

         The Next Big Thing Is Pretty Darn Small! 

TECHNOLOGY IN FOCUS

    Protecting Your Computer and Backing Up Your Data

 

CHAPTER 9

 Behind the Scenes: A Closer Look at System Hardware

     Digital Data: Switches and Bits

         Electrical Switches  

         The Binary Number System 

         DIG DEEPER: Advanced Binary and Hexadecimal Notations

     The CPU: Processing Digital Information

         The CPU Machine Cycle  

        Stage 1 : The Fetch Stage

        Stage 2 : The Decode Stage

        Stage 3 : The Execute Stage

        Stage 4 : The Store Stage

        TRENDS IN IT: Emerging Technologies: Printable Processors:

        The Ultimate in Flexibility 

    RAM: The Next Level of Temporary Storage

        Types of RAM  

    Buses: The CPU’s Data Highway

     Making Computers Even Faster: Advanced CPU Designs

         Pipelining  

         Specialized Multimedia Instructions 

         Multiple Processing Efforts  

         TRENDS IN IT: Emerging Technologies: Computer Technology

         Changing the Face of Medicine 

 

CHAPTER 10

 Behind the Scenes: Software Programming

     The Life Cycle of an Information System

         System Development Life Cycle

         TRENDS IN IT: Careers: Considering a Career in Systems Development? 

    The Life Cycle of a Program

    Describing the Problem: The Problem Statement

     Making a Plan: Algorithm Development

         Developing an Algorithm: Decision Making and Design

         Top-Down Design 

         Object-Oriented Analysis

     Coding: Speaking the Language of the Computer

         Categories of Programming Languages  

         Creating Code: Writing the Program 

         DIG DEEPER: The Building Blocks of Programming Languages: Syntax,
        Keywords, Data Types, and Operators 

         Compilation  
        Coding Tools: Integrated Development Environments 

     Debugging: Getting Rid of Errors

     Finishing the Project: Testing and Documentation

     Programming Languages: Many Languages for Many Projects

         Selecting the Right Language

         Windows Applications

         Web Applications: HTML/XHTML and Beyond

         The Next Great Language

         TRENDS IN IT: Computers in Society: Alice: Making Programming Fun 
        and Approachable 

 

CHAPTER 11

 Behind the Scenes:
Databases and Information Systems

     Life Without Databases

     Database Building Blocks

         Advantages of Using Databases  

         Database Terminology

         Primary Keys 

     Database Types

         Relational Databases  

         Object-Oriented Databases 

         Multidimensional Databases

     Database Management Systems: Basic Operations

         Creating Databases and Entering Data

         Input Forms  
        Data Validation

         Viewing and Sorting Data 

         DIG DEEPER: Structured Query Language (SQL) 

         Extracting or Querying Data 

         TRENDS IN IT: Computers in Society: Can a Database Catch a Criminal?

         Outputting Data 

     Relational Database Operations

         Normalization of Data  

         TRENDS IN IT: Computers in Society: Need Cash? Use Databases

         to Find Your Property 

     Data Storage

         Data Warehouses

         Populating Data Warehouses 

         Data Staging 
        Data Marts 
    Managing Data: Information Systems

         Office Support Systems

         Transaction Processing Systems 

         Management Information Systems 

         Decision Support Systems  
        Internal and External Data Sources  

        Model Management Systems 

         Knowledge-Based Systems

    Data Mining

        TRENDS IN IT: Emerging Technologies: Web Portal Enables Krispy Kreme to

         Manage Its Dough . . . Without Going Nuts!

 

CHAPTER 12

 Behind the Scenes: Networking and Security

     Networking Advantages

    Client/Server Networks

     Classifications of Client/Server Networks: LANs, WANs, and MANs

     Constructing Client/Server Networks

     Servers

        Print Servers  
        Application Servers 

         Database Servers 

         E-Mail Servers 

         Communications Servers

         Web Servers 

    Network Topologies

         Bus Topology  

         Ring Topology  

         Star Topology         

        Comparing Topologies 

    Transmission Media

        Wired Transmission Media

         Wireless Media Options 

         Comparing Transmission Media 

    Network Operating Systems

        TRENDS IN IT: Emerging Technologies: Virtual Network Computing Is

         Here and It’s Free 

     Network Adapters

         DIG DEEPER: The OSI Model: Defining Protocol Standards  

         TRENDS IN IT: Ethics: RFID—Friend or Foe? 

     Network Navigation Devices

     MAC Addresses  

     Repeaters and Hubs  

     Switches and Bridges 

     Routers

     Network Security

    Authentication

     Access Privileges

     Physical Protection Measures

     TRENDS IN IT: Emerging Technologies: Wi-Fi Phones Keep

     Doctors and Nurses Connected

     Firewalls 

     TRENDS IN IT: Computers in Society: What’s Shakin’? California Maintains a

     Reliable Network to Respond to Earthquake Emergencies 

 

CHAPTER 13

 Behind the Scenes: The Internet: How It Works

     The Management of the Internet

     Internet Networking

         Connecting Internet Service Providers  

         Network Access Points

         Points of Presence 

         The Network Model of the Internet 

     Data Transmission and Protocols

         Packet Switching  

         TCP/IP 

     IP Addresses and Domain Names

         Domain Names

         DIG DEEPER: Making the Connection: Connection-Oriented Versus

         Connectionless Protocols

         DNS Servers 
    Other Protocols: FTP and Telnet

     HTTP, HTML, and Other Web Jargon

         HTTP and SSL  

         HTML/XHTML 

         XML 

         The Common Gateway Interface

         Client-Side Applications 

     Communications over the Internet

         TRENDS IN IT: Careers: If You Build It, Will They Come? Web

         Development and Design Careers 

         E-mail

         TRENDS IN IT: Computers in Society: Have You Ever Used an Extranet 
        or a Virtual Private Network?

         E-Mail Security: Encryption and Specialized Software

         Instant Messaging 

         TRENDS IN IT: Emerging Technologies: The Evolving Internet 

TECHNOLOGY IN FOCUS

     The History of the PC

     Glossary 
    Index

     Credits

About the Author

Three professors from Montgomery County Community College traveled with the Prentice Hall Information Technology team for over two years to uncover what students and professors today wanted and needed in an Intro to Computer Concepts text. After meeting with more than 1,000 students and instructors and developed Technology in Action. Due to overwhelming success, they recently published Technology in Action 2/e!

Alan D. Evans, M.S., CPA
Alan is currently the director of computer science for Montgomery County Community College. Alan’s parents instilled in him a love of education at an early age. After a successful career in business, Alan finally realized his true calling was education. He  has been a teacher and an administrator at the collegiate level for the past five years. Alan makes presentations at technical conferences and meets regularly with computer science faculty and administrators from other colleges to discuss curriculum development. Currently, he is researching computer literacy standards for college freshmen.

Kendall E. Martin, Ph.D.
Kendall has been teaching since 1988 at a number of institutions, including Villanova University, DeSales University, Arcadia University, Ursinus College, County College of Morris, and Montgomery County Community College, at both the undergraduate and master’s degree level. Kendall’s education includes a B.S. in Electrical Engineering from the University of Rochester and an M.S. and Ph.D. in Engineering from the University of Pennsylvania. She has industrial experience in research and development environments (AT&T Bell Laboratories) as well as experience from several start-up technology firms. At Ursinus College, Kendall developed a successful faculty training program for distance education instructors, and she makes conference presentations during the year.

Mary Anne Poatsy, MBA, CFP
Mary Anne is an adjunct faculty member at Montgomery County Community College, teaching various computer application and concepts courses in face-to-face and online environments. Mary Anne holds a B.A. in Psychology and Elementary Education from Mount Holyoke College and an MBA in Finance from Northwestern University’s Kellogg Graduate School of Management. Mary Anne has more than nine years of educational experience, ranging from elementary and secondary education to Montgomery County Community College, Muhlenberg College, and Bucks County Community College, as well as training in the professional environment. Prior to teaching, Mary Anne was a vice president at Shearson Lehman Hutton in the Muncipal Bond Investment Banking department.

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » General
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling Go! Technology in Action with CDROM on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!

Back to top