CHAPTER 1
Why Computers Matter to You:
Becoming Computer Fluent
Becoming a Savvy Computer User and Consumer
Being Prepared for Your Career
Being Prepared for Your Career
Computers in Business: Working in a Data Mine?
Computers in Retail: Let Me Look That Up for You
Computers in Shipping: UPS Data on the Go
Computers in Ranching and Farming: High Tech Down on the Farm
Computers in the Arts: Shall We Dance?
Computers in the Medical Field: Fact or Science Fiction?
Computers in Law Enforcement:
Put Down That Mouse–You’re Under Arrest!
Computers in the Legal Fields: Welcome to the Virtual Courtroom
Computers in Education: And on the Left, You See the Mona Lisa
Computers and the Sciences: Programming the Perfect Storm
Computers in Sports: Bend Your Elbow Another Two Degrees?
Computer Gaming Careers: Now Bigger Than Hollywood!
Computers at Home: Just Program It and Forget It
Getting Ready for the Technology of Tomorrow
Nanoscience: The Next “Big” Thing
Biomedical Chip Implants: Combining Humans with Machines?
Artificial Intelligence: Will Computers Become Human?
Understanding the Challenges Facing a Digital Society
TRENDS IN IT: Ehics: Knowledge Is Power: Bridging the Digital Divide
Becoming Computer Fluent
Computers Are Data Processing Devices
Bits and Bytes: The Language of Computers
Computer Hardware
Computer Software
Computer Platforms: PCs and MACs
Specialty Computers
DIG DEEPER: What Can You Do with a Digital Home?
CHAPTER 2
Looking at Computers:
Understanding the Parts
Your Computer’s Hardware
Input Devices
Keyboards
Mice and Other Pointing Devices
Sound Input
Input Devices for Physically Challenged Individuals
Output Devices
Monitors
Printers
DIG DEEPER: How Inkjet and Laser Printers Work
Sound Output
The System Unit
On the Front Panel
On the Back
Inside the System Unit
Setting It All Up
TRENDS IN IT: Emerging Technologies: Tomorrow’s
Display–You Can Take It with You!
TECHNOLOGY IN FOCUS
Careers in IT
CHAPTER 3
Using the Internet:
Making the Most of the Web’s Resources
The Internet
Communicating Through the Internet: E-Mail and Other Technologies
Instant Messaging
Voice over Internet Protocol (VoIP)
Weblogs (blogs) and Video Logs (vlogs)
Podcasts
Webcasts
Wikis
Chat
Rooms
Newsgroups
Listservs
Web Entertainment: Multimedia and Beyond
TRENDS IN IT: Social Networking
Conducting Business over the Internet: E-Commerce
E-Commerce Safeguards
Managing Online Annoyances
Spam
Cookies
Adware
Spyware
Malware
Phishing and Internet Hoaxes
Navigating the Web: Web
Browsers
Getting Around the Web: URLs, Hyperlinks, and
Other Tools
URLs
Hyperlinks and
Beyond
Favorites and Bookmarks
Tabbed
Browsing
TRENDS IN IT:
Ethics: What Can You Borrow from the Internet?
Searching the Web: Search Engines and Subject Directories
Search
Engines
DIG DEEPER:
Refining Your Web Searches: Boolean Operators
Subject
Directories
Evaluating Web Sites
Internet Basics
The Internet’s Clients and Servers
Connecting to the Internet
Broadband Connections
Dial-Up Connections
Choosing the Right Internet Connection Option
Finding an Internet Service Provider
Choosing an ISP
The Origin of the Internet
The Web Versus the Internet
The Future of the Internet
CHAPTER 4
Application Software:
Programs That Let You Work and Play
The Nuts and Bolts of Software
More Productivity at Home
Word-Processing Software
Spreadsheet Software
Presentation Software
Database Software
Personal Information Manager (PIM) Software
Productivity Software Tools
Integrated Software Applications Versus Software Suites
DIG DEEPER: Speech-Recognition Software
Personal Financial Software
More Media at Home
Digital Image-Editing Software
Digital Audio Software
Digital Video-Editing Software
Media Management Software
More Fun at Home
Gaming Software
Educational Software
Reference Software
Drawing Software
Business Software
Home Business Software
Large-Business
Software
TRENDS IN IT:
Emerging Technologies: Is It Real or Is It Virtual?
Specialized Business Software
Getting Help with Software
Buying Software
Standard Software
Web-Based Application Software
Discounted Software
Freeware and Shareware
Software Versions and Systems Requirements
Installing/Uninstalling and Opening Software
TRENDS IN IT: Ethics: Can I Borrow Software That I Don’t Own?
TECHNOLOGY IN FOCUS
Digital Entertainment
CHAPTER 5
Using System Software: The Operating System,
Utility
Programs, and File Management
System Software Basics
Operating System Categories
Real-Time Operating Systems
Single-User Operating Systems
Multiuser Operating Systems
Desktop Operating Systems
Microsoft Windows
Mac OS
Unix
Linux
TRENDS IN IT: Emerging Technologies: Open-Source Software:
Why Isn’t Everyone Using Linux?
What the Operating System Does
The User
Interface
Processor
Management
Memory and Storage Management
Hardware and Peripheral Device Management
Software Application Coordination
The Boot Process: Starting Your Computer
Step 1 : Activating BIOS
Step 2 : Performing the Power-On Self-Test
Step 3 : Loading the Operating System
Step 4 : Checking Further Configurations and Customizations
Handling Errors in the Boot Process
The Desktop and Windows Features
Organizing Your Computer: File Management
Organizing Your Files
Viewing and Sorting Files and Folders
Naming Files
Working with Files
Utility Programs
Display
Utilities
The Add or Remove
Programs Utility
File Compression Utilities
System Maintenance Utilities
DIG DEEPER: How Disk Defragmenter Utilities Work
System Restore and Backup Utilities
The Task Scheduler Utility
Accessibility Utilities
CHAPTER 6
Understanding and Assessing Hardware:
Evaluating Your System
Is It the Computer or Me?
What Is Your Ideal Computer?
Assessing Your Hardware: Evaluating Your System
Evaluating the CPU Subsystem
Analyzing Your CPU
Evaluating RAM: The Memory Subsystem
Virtual Memory
Adding RAM
Evaluating the Storage Subsystem
The Hard Disk Drive
DIG DEEPER: How a Hard Disk Drive Works
Portable Storage Options: The Floppy and Beyond
Upgrading Your Storage Subsystem
Evaluating the Video Subsystem
Video
Cards
TRENDS IN IT:
Ethics: CD and DVD Technology: A Free Lunch—Or at
Least a Free
Copy
Monitors
Evaluating the Audio Subsystem
Speakers
Sound Cards
Evaluating Port Connectivity
Adding Ports: Expansion Cards and Hubs
Evaluating System Reliability
TRENDS IN IT:
Computers in Society: How to Donate Your Old
Computer
Safely
Making the Final Decision
TECHNOLOGY IN FOCUS
Computing Alternatives
CHAPTER 7
Networking and Security: Connecting Computers
and Keeping Them Safe from Hackers and Viruses
Networking Fundamentals
Network Architectures
Describing Networks Based on Network Control
Describing Networks Based on Distance
Network Components
Transmission Media
Network Adapters
Network Navigation Devices
Networking Software
Types of Peer-to-Peer Networks
Wired Ethernet Networks
Ethernet Switches
Ethernet
Routers
Wireless Ethernet
Networks
Power-Line Networks
Phoneline Networks
Choosing a Peer-to-Peer Network
Configuring Software for Your Home Network
TRENDS IN IT: Emerging Technologies: Grid Computing: Aiding Scientific
Research with Your Computer
Keeping Your Home Computer Safe
Computer Threats: Hackers
What Hackers Steal
Trojan Horses
Denial of Service Attacks
How Hackers Gain Access
TRENDS IN IT: Computers in Society: Identity Theft: Is There More
Than One You Out There?
Computer Safeguards: Firewalls
Types of Firewalls
Is Your Computer Secure?
Securing Wireless Networks
DIG DEEPER: How Firewalls Work
Computer Threats: Computer Viruses
Types of Viruses
Virus Classifications
Computer Safeguards: Antivirus Software
Other Security Measures
TRENDS IN IT: Careers: Cybercops on the Beat: Computer Security Careers
CHAPTER 8
Mobile Computing: Keeping Your Data on Hand
Mobile Computing: Is It Right for You?
Mobile Device Limitations
Mobile Computing Devices
Cellular Phones
Cell Phone Hardware
How Cell Phones Work
Cell Phone Features: Text Messaging
Cell Phone Internet Connectivity
Portable Media Players
PMP Hardware
PMP Flash Memory and File Transfer
PMP Ethical Issues: Napster and Beyond
Personal Digital Assistants (PDAs)
TRENDS IN IT: Emerging Technologies: Why Carry Your Data When
You Can Wear It?
PDA Hardware
PDA Operating Systems
PDA Memory and Storage
PDA File Transfer and Synchronization
PDA Internet Connectivity
PDA Software and Accessories
PDA or Cell Phone?
Tablet PCs
DIG DEEPER: The Power of GPS
Tablet PC Hardware
Tablet Software
Tablet or PDA?
Notebooks
Notebook Hardware
TRENDS IN IT: Ubiquitous Networking: Wherever You Go, There You Are
Notebook Operating Systems and Ports
Notebook Batteries and Accessories
Notebook or Desktop?
TRENDS IN IT: Emerging Technologies: Nanotubes:
The Next Big Thing Is Pretty Darn Small!
TECHNOLOGY IN FOCUS
Protecting Your Computer and Backing Up Your Data
CHAPTER 9
Behind the Scenes: A Closer Look at System Hardware
Digital Data: Switches and Bits
Electrical Switches
The Binary Number System
DIG DEEPER: Advanced Binary and Hexadecimal Notations
The CPU: Processing Digital Information
The CPU Machine Cycle
Stage 1 : The Fetch Stage
Stage 2 : The Decode Stage
Stage 3 : The Execute Stage
Stage 4 : The Store Stage
TRENDS IN IT: Emerging Technologies: Printable Processors:
The Ultimate in Flexibility
RAM: The Next Level of Temporary Storage
Types of RAM
Buses: The CPU’s Data Highway
Making Computers Even Faster: Advanced CPU Designs
Pipelining
Specialized Multimedia Instructions
Multiple Processing Efforts
TRENDS IN IT: Emerging Technologies: Computer Technology
Changing the Face of Medicine
CHAPTER 10
Behind the Scenes: Software Programming
The Life Cycle of an Information System
System Development Life Cycle
TRENDS IN IT: Careers: Considering a Career in Systems Development?
The Life Cycle of a Program
Describing the Problem: The Problem Statement
Making a Plan: Algorithm Development
Developing an Algorithm: Decision Making and Design
Top-Down Design
Object-Oriented Analysis
Coding: Speaking the Language of the Computer
Categories of Programming Languages
Creating Code: Writing the Program
DIG
DEEPER: The Building Blocks of Programming Languages: Syntax,
Keywords, Data
Types, and Operators
Compilation
Coding Tools:
Integrated Development Environments
Debugging: Getting Rid of Errors
Finishing the Project: Testing and Documentation
Programming Languages: Many Languages for Many Projects
Selecting the Right Language
Windows Applications
Web Applications: HTML/XHTML and Beyond
The Next Great Language
TRENDS IN
IT: Computers in Society: Alice: Making Programming Fun
and
Approachable
CHAPTER 11
Behind the Scenes:
Databases and Information Systems
Life Without Databases
Database Building Blocks
Advantages of Using Databases
Database Terminology
Primary Keys
Database Types
Relational Databases
Object-Oriented Databases
Multidimensional Databases
Database Management Systems: Basic Operations
Creating Databases and Entering Data
Input
Forms
Data Validation
Viewing and Sorting Data
DIG DEEPER: Structured Query Language (SQL)
Extracting or Querying Data
TRENDS IN IT: Computers in Society: Can a Database Catch a Criminal?
Outputting Data
Relational Database Operations
Normalization of Data
TRENDS IN IT: Computers in Society: Need Cash? Use Databases
to Find Your Property
Data Storage
Data Warehouses
Populating Data Warehouses
Data
Staging
Data
Marts
Managing Data: Information
Systems
Office Support Systems
Transaction Processing Systems
Management Information Systems
Decision
Support Systems
Internal and
External Data Sources
Model Management Systems
Knowledge-Based Systems
Data Mining
TRENDS IN IT: Emerging Technologies: Web Portal Enables Krispy Kreme to
Manage Its Dough . . . Without Going Nuts!
CHAPTER 12
Behind the Scenes: Networking and Security
Networking Advantages
Client/Server Networks
Classifications of Client/Server Networks: LANs, WANs, and MANs
Constructing Client/Server Networks
Servers
Print
Servers
Application
Servers
Database Servers
E-Mail Servers
Communications Servers
Web Servers
Network Topologies
Bus Topology
Ring Topology
Star Topology
Comparing Topologies
Transmission Media
Wired Transmission Media
Wireless Media Options
Comparing Transmission Media
Network Operating Systems
TRENDS IN IT: Emerging Technologies: Virtual Network Computing Is
Here and It’s Free
Network Adapters
DIG DEEPER: The OSI Model: Defining Protocol Standards
TRENDS IN IT: Ethics: RFID—Friend or Foe?
Network Navigation Devices
MAC Addresses
Repeaters and Hubs
Switches and Bridges
Routers
Network Security
Authentication
Access Privileges
Physical Protection Measures
TRENDS IN IT: Emerging Technologies: Wi-Fi Phones Keep
Doctors and Nurses Connected
Firewalls
TRENDS IN IT: Computers in Society: What’s Shakin’? California Maintains a
Reliable Network to Respond to Earthquake Emergencies
CHAPTER 13
Behind the Scenes: The Internet: How It Works
The Management of the Internet
Internet Networking
Connecting Internet Service Providers
Network Access Points
Points of Presence
The Network Model of the Internet
Data Transmission and Protocols
Packet Switching
TCP/IP
IP Addresses and Domain Names
Domain Names
DIG DEEPER: Making the Connection: Connection-Oriented Versus
Connectionless Protocols
DNS
Servers
Other Protocols: FTP and Telnet
HTTP, HTML, and Other Web Jargon
HTTP and SSL
HTML/XHTML
XML
The Common Gateway Interface
Client-Side Applications
Communications over the Internet
TRENDS IN IT: Careers: If You Build It, Will They Come? Web
Development and Design Careers
TRENDS IN
IT: Computers in Society: Have You Ever Used an Extranet
or a Virtual
Private Network?
E-Mail Security: Encryption and Specialized Software
Instant Messaging
TRENDS IN IT: Emerging Technologies: The Evolving Internet
TECHNOLOGY IN FOCUS
The History of the PC
Glossary
Index
Credits
Three professors from Montgomery County Community College traveled
with the Prentice Hall Information Technology team for over two
years to uncover what students and professors today wanted and
needed in an Intro to Computer Concepts text. After meeting with
more than 1,000 students and instructors and developed Technology
in Action. Due to overwhelming success, they recently published
Technology in Action 2/e!
Alan D. Evans, M.S., CPA
Alan is currently the
director of computer science for Montgomery County Community
College. Alan’s parents instilled in him a love of education at an
early age. After a successful career in business, Alan finally
realized his true calling was education. He has been a
teacher and an administrator at the collegiate level for the past
five years. Alan makes presentations at technical conferences and
meets regularly with computer science faculty and administrators
from other colleges to discuss curriculum development. Currently,
he is researching computer literacy standards for college
freshmen.
Kendall E. Martin, Ph.D.
Kendall has been teaching since
1988 at a number of institutions, including Villanova University,
DeSales University, Arcadia University, Ursinus College, County
College of Morris, and Montgomery County Community College, at both
the undergraduate and master’s degree level. Kendall’s education
includes a B.S. in Electrical Engineering from the University of
Rochester and an M.S. and Ph.D. in Engineering from the University
of Pennsylvania. She has industrial experience in research and
development environments (AT&T Bell Laboratories) as well as
experience from several start-up technology firms. At Ursinus
College, Kendall developed a successful faculty training program
for distance education instructors, and she makes conference
presentations during the year.
Mary Anne Poatsy, MBA, CFP
Mary Anne is an adjunct
faculty member at Montgomery County Community College, teaching
various computer application and concepts courses in face-to-face
and online environments. Mary Anne holds a B.A. in Psychology and
Elementary Education from Mount Holyoke College and an MBA in
Finance from Northwestern University’s Kellogg Graduate School of
Management. Mary Anne has more than nine years of educational
experience, ranging from elementary and secondary education to
Montgomery County Community College, Muhlenberg College, and Bucks
County Community College, as well as training in the professional
environment. Prior to teaching, Mary Anne was a vice president at
Shearson Lehman Hutton in the Muncipal Bond Investment Banking
department.
Ask a Question About this Product More... |