0% found this document useful (0 votes)
285 views

Chapter-4 Module 4 ICT1

hahhahajajjajakakkalala

Uploaded by

Joyce Verano
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
285 views

Chapter-4 Module 4 ICT1

hahhahajajjajakakkalala

Uploaded by

Joyce Verano
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 46
Programs and Apps: Productivity, Graphics, Security, and Other Tools OBJECTIVES After completing this module, you willbe able to Idem the general catagories of piograms and apps Describe how an operating system interacts with applications and hardware Differentiate among the ways you can acquire programs and apps: retail, custom, web app, mobile apo, mobile web app, shareware, freeware, open source, and public-domain Idem the key features of productivity apalcaions: word processing, presentation spreadsheet, database, rote taking, text eit, calendar and contact management, proect management, accounting, personal finance, egal, tax preparation, document conversion and readers, and enterprise computing Identify the key features of graphics and media applications: computer-aided design, desktop publishing, painvimage editing, photo editing and photo management, ideo and audio editing, multimedia and website authoring, mediaplayer, and auomented and virtual reality Identily the uses of persona interest applications: fest, medical, entertainment, convenience, and education 7 Ident the purpose of software use in communications 8 entity the key features of security tools: personal fewall, antivrus programs, malware removers and Internet filters Identify the key features of file, disk, and system management tools: file manager search, image vewes, uninstaller, disk cleanup, disk defragmenter, screen save, fle compression, PC maintenance, backup and restore and power management coy Cee (Creeping |] Figure 4-1 Programs and Apps Programs and Apps Using programs and apps, you can accomplish a variety of easks on computers and! mobile devices pure 4-1). Recall from Module | that a program, or software, consists ofa series of related instructions, organized for a common purpose, that tells the computer what tasks to perform how to perform them. An application, or app, sometimes called applicarim software, consists of programs designed to make users more productive and/or assist them with personal tasks. An operating system isa set of programs that coordinates all the activities among computer or ‘mobile device hardware. Other programs, often called tools or utilities, enable you to perform ‘maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices. The operating system and other tools are collectively known as r because they consist of the programs that control or maintain the operations of the computer and its devices. 7 c om x 4 aaa Aik — <= -—= = ~TGraphics and media programs and apps, some of which are shown in this figure, Productivity, Graphics, Security, and Other Tools Role of the Operating System To use applications, such as a browser or word processing program, on @ desktop or laptop, your computer must be running an operating system. Similarly, mobile device muse be running an operating system to run a mobile app, such as a navigation or messaging app. Desktop operating systems include macOS, Windows, Linux, and Chrome OS, Mobile operating systems include Android, (OS, and Windows (Mobile Edition). The operating system, therefore, serves 28 the interface between the user, the applications and other programs, and the computer's or mobile device's hardware (Figure 4-2) ‘An Example of How an Operating System int ts with a User, an Application, and Hardware step? Ths nate epost spt orn an apt, ich Bawa pocsong sept ich appease aes ce, rpc adcunen, ecu oberet step Aocpsaing son wer foe payee nthesceenan 2 Serta aconp step Te spleatonsends pa rivactontte Pei fone’ sooeatrg Treen gam arb i sp ea, Icon tepn ava men ug weinpicsthe amet teen Figure 4-2 Ths igure shows how the operating system isthe interface between the user, the application(s) tnd other programs, and the hardware. Each time you starta computer or mobile device, the operating system is loaded (copied) from the computer’ hard drive or mobile device’ storage media into memory. Once the operating sytem is loaded, it coordinate all the activities of the computer or mobile device. This inchudes running applications and transferring data among input and output devices and memory. While the computer or mobile device is running, the operating system remains in memory. Module 4 Oow Tal Versions Some retail and other pragrams havea tral Version, which isan application you can Use at no charge fore limited tie to see if t meets your needs. Some ‘rial versions have limited functionality. Programs and Apps Interacting with Programs and Apps Developers create software for specific computers or devices (desktop or mobile) and distribute software as native apps, cloud apps, or web apps, depending on requirements for how ‘users will interact with them. A desktop app runs on a desktop or laptop computer. A mile app rans on a mobile device Recall from Module 1 that you usually do not need to install desktop or mobile apps on a compatible computer or mobile device. Installing is the process of setting up the software to ‘work with a computer or mobile device and its connected hardware, Mobile apps typically install automatically after you download them from the device’ app store. You usually do not need to install web apps before you can use them, but you may need to install plug-ins, such as Java or Flash, so that they work in your browser. “The technologies that developers use to create apps often depends whether they will be installed on a users device or accessed via a network. © A native app is an app written for a specific platform and installed on a computer or mobile device. Native apps ean take advantage of specific features of the devices on which they are installed, such as a smartphone’ camera or contact lst. You may install native mobile or desktop apps by downloading them from an app store, sometimes called a markeplae, or other Jocation on the Internet. You also may purchase native desktop apps on a storage medium, such as CD or DVD, to install on your computer. Some manufacturers will preinstal selected apps on a new computer or mobile device for users to try. Examples include productivity applications, single-player games, and browsers, Read Tech Feature 12-2 for more information about mobile app development. “ Acloud app makes use of software and data that are not stored on your computer or mobile device, You ean access the software and data using a computer or mobile device, with or without a browser, as long as itis connected to @ network, such as the Internet, Examples include apps for accessing online social networks, web-based email services, and online calendars. «+ A web app isa special type of cloud app that is accessed by visiting a website in a browser. + A mobile zeb app isa web app that runs on a mobile device. Mobile web apps often have a responsive web design, which means the app is optimized for display ina browser on a mobile device, regardless of screen size or orientation, Many app developers opt for web delivery Iecause they do not have to create a different version for each device's operating system on which the app will run, Examples of web apps include websites for shopping, banking, and online social networks accessed in a browser. Many cloud and web apps are available at no cost. Free apps often provide access to basie features and require payment for access to a more comprehensive set of capabilities. Some charge 4 one-time fee, while others charge recurring monthly or annual subscription fees. Distributing Programs and Apps Programs and apps are distributed in a variety of forms: retail, custom, shareware, freeware, ‘open souree, and public domain. * Retail softeare is mass-produced, copyrighted software that mects the needs of a wide variety of users, not justa single user or company. Some retail software, such as an operating system, is preinstalled on new computers and mobile devices, You also can purchase retail software from Jocal stores and on the web. With online purchases, you may be able to download purchased programs immediately instead of waiting for the software to arrive by mail, * Custom sfizare performs functions specific to a business or industry. Sometimes a company cannot locate retail software that meets its unique requirements, In this ease, the company may hire software developers to create specialized custom software, Custom software usually costs ‘more than retail software, Productivity, Graphics, Security, and Other Tools + Shareware is copyrighted software that is distributed at no cost fora trial period. shareware program beyond that period, you send payment to the software developer, or you might be billed automatically unless you cancel within a specified period of time. Some ‘developers trust users to send payment if software use extends beyond the stated trial period. (Others render the software useless ifno payment is received after the trial period expires In some cases, a scaled-down version of the software is distributed free, and payment entitles the user to the fally functional product. * Freeware is copyrighted software provided at no cost by an individual or a company that retains all rights to the software. Thus, software developers typically cannot incorporate freeware in applications they intend to sell. The wort, free, in freeware indicates the software has no charge. * Open source software is software provided for use, mosification, and redistribution. This software may have restrictions from the copyright holder regarding modification of the software's intemal instructions and its redistribution. For example, developers may be required to provide the source code when distributing an application and may be restricted from charging-a fee 10 those who use it. Open source software usually can be downloaded from a web server on. the Internet, often at no cost. Promoters of open source software state two main advantages: community of developers contribute enhancements to the software for all to use, and customers can personalize the software to meet their needs. * Pablicdmain sofizare has been donated for public use and has no copyright restrictions. Anyone can copy or distribute public-comain software to others at no cost. Om conv Aone ee after act of rina poreaeee ice Eine aah siiatreen — Q consiver tus What is software as a service? Saloare asa service (S208 desctibes a medel for csbuting sofware in which a software provider hosts apolations ona server and makes them availble to users via the intent. The server canbe configured wth tonal processing or storage capabtiesas needs increase. SaaS providers often deer he applications as coud 26. Edtng projector photos, sening email messages, and managing finances ar common consumer tasks with S23 Foc an exercise related to Sa, see the Item Research Cloud Services exec at the ero ths module @ow yan Ape iene eee eet eel install autornavcaly on ary other compatets See sescipton pan ‘Thousands of shareware, freeware, and public-domain programs are available from websites ‘on the Internet for users to download, Examples include communications, graphics, and game programs, Read Secure IT’ 4-1 for tips about safely downloading shareware, freeware, oF piblic-domain software. SECURE IT 4-1 nioading Software and Apps Safely es and app stores tempt potential Before downloading any software, consider these factors wen downloading shareware, ers wth catchy offers for software __‘Teeware, or public domain software: ing to speed up thelr computers oF Choose apas from Google Pay fr Android inthe latest versions of games and music. devices or the App Store for Apple devices. temptation to dowmload shareware, ‘These sores requie aps to pass rigorous and public-domain software is igh, tests befee they are pushed. Choose sot- ‘ware fom reputable shareware, freeware, ‘and public domain download websites that coffer product for your computer or device. + Beary of aps that do nat have many reviews ‘or apps that were ack rece, unis you canvetfy the developer or publishes Search for reviews fom reputable webstes ally when the cost of such useful o: fun 10F apps is free or extremely reason Ths action could be dangerous, however, some programs or apps may contin mialware, oF adware ust waiting to be jon an unsuspecting user's computer be device. Obiain the latest versions of shareware, freeware, and public domain software and ‘apps. Many developers update their programs frequently in an effort to include new features ‘and to thwart viruses. If you follow these tis, you may find some ofthe best software bar {gains inthe marketplace. © Consider This Look fora poplar game ‘your computer cr mobile cece fom an app sto or trough sharenere reeware, or publ domain software downoad websites What infomation might persuade you that tissafe to instal? Did you ever unknowing instal sofware that contained a virus or mahare? How did you ddscoverend then remedy the situation? Programs and Apps Installing and Updating Programs and Apps During installation of software or before the first use, a program or app may ask you to register and/or activate the software. Saftware registration typically is optional and usually involves submitting your name and other personal information to the software manufacturer or developer. Registering the software often entitles you to product support. Praductactition isa technique that some software manufacturers use to ensure that you do not install the software on ‘more computers than legally licensed, Usually, che software ean be run a preset number of times, has limited funetionality, or does not function until you activate it via the Internet or by phone. Thus, activation isa required process for programs that request it. Some software allows multiple activations; for example, you can install itand run iton a laptop and a desktop at the same time. Registering and/or activating software also usually entitles you to free program updates for a specified time period, such as a year Many desktop and mobile apps use an automatic updare feature, where the updates ean be con- figured to download and install automatically. With web apps, by contrast, you always access the latest version when you run it ina browser. @ consiver rHis What isa license agreement? A ence agreement, somtimes called an end-user ense agreement (EULA she right to use a progam or app The icense agreement provides speci contions fr use ofthe sftwar, which ase ypically mst accept before Using the sofware Figue 4-3) Unless otherwise specified by license agreement, you donot have the right 0 Copy, an, borrower ern any way dsb programs or apps. Deng sos alton of copyright law it sos a federal rime ‘Step of [tens of icense agreement ‘Terms & Condon for Wed Vorsion Pleaso check ne bor blow and select Acepto launch tua count Numbers. To enol inthe ital Aceaunt Numbers Sere, ou must evaw and cceptne Terms of Use elon Aor Fevoring be Terms of Use, please cick on R09 belo VIRTUAL ACCOUNT NUMBERS SERVICE TERMS OF USE By cetng on tAccop you apes tobe bound by feso Tome of Us. you donc acroplheso Terms of Use, you may not use he Vital Account Mumbers Sernce License Grant ‘bank grants you enoneicushe, nentanstorabte, nenassignable and eal ee icone uso the [Pinar read and gre to thase Terms and Conlon ‘ing button nccates you accept conse agreement __-o=myp =n Figure 43. user must accept the terms in a license agreement before using the software cert ee eae nn tae Categories of Programs and Apps With programs and apps, you can work on a variety of projects — such as creating letters, memos, reports, and other documents; developing presentations; preparing and filing taxes; drawing and altering images; recording and enhancing audio and video clips; obtaining Productivity, Graphics, Security, and Other Tools. directions or maps; playing games individually or with others; composing email messages; protecting computers and mobile devices from malware; organizing media; locating files; and much more. Table 4-1 categorizes popular categories of programs and apps by their general use. Productivity Word Processing * Accounting (Business and + Presentation * Personal Finance eal) + Spreadsheet + Legal * Database * Tax Preparation + Note Taking + Document Management + Calendar and Contact Management © Support Services + Project Management * Enterprise Computing Graphics and Media * Computer Aided Design (CAD) * Video and Aucio Editing * Desktop Publishing ‘Multimedia and Website Authoring + Poin/Image Edting + Media Player * Photo Editing and Photo ‘Augmented and Virual Realty Management * Clip artamage Gallery Personal Interest + Lifestyle * Entertainment + Mapping # Convenience * Medical + Education Communications + Blog file Transfer * Browser * internet Phone + Chat Room + Intemet Messaging * Online Discussion + Mobile Messaging = Email + Videoconference ‘= Personal Firewall Malware Removers = Antiius + internet Filters * File Manager Screen Saver Management * Search + File Compression + Image Viewer + PC Maintenance Uninstaller + Backup and Restore + Disk Cleanup + Power Management Disk Defragmenter @ consiver THis ‘Are the categories of programs and apps shown in Table 4-1 mutually exclusive? Programs and aps listed in one category may be used in other categories For example, photo editing applications, hich appear in the graphics and media catego, often also are used for business or personal producti. Aaationaly the programs and apps inthe ast the categories (communications; ecuriy and fe, disk, an system smaragement) often are used in conjunction wth oto support programs and apps inthe fst thre categories (eroductvty,cephics and mia, and persona interest). For example, email appears inte communications ‘ategory but alo i 2 productity application Module 4 ro EEMIEER Programs and Apps Productivity Applications Productivity applications can assist you in becoming more effective and efficient while performing daily act ties at work, school, and home. Productivity applications include word processing, presentation, spreadsheet, database, note taking, calendar and contact management, project ‘management, accounting, personal finance, legal, tax preparation, document management, and enterprise computing, A variety of manufacturers offer product ity apps in each of these areas, ranging from desktop to mobile to web and cloud apps. Many have a desktop version and a corresponding mobile version adapted for smaller screen Developing Projects With productivity applications, users often create, edit, format, save and share projects Projects include documents, presentations, spreadsheets, nots, calendars, contact lists, budgets, drawings, and more @x During the process of developing a project, you likely will switch back and forth among the Keyboard Shortcuts In many desktop apps, following activities izes an(Vor touch screens you can use keyboard 1. When you crete a project, you enter text or numbers, insert images, add contacts, schedule shortcuts for cut, copy, and paste commands, instead of selecting those items from a Graphical user interface, appointments, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice “To edt a project means to make changes to its existing content. Common editing tasks include inserting, deleting, cutting, copying, and pasting. Press cmtsx for cut, a. Inserting involves adding text, images, or other content, cca for copy and b. Deleting involves removing text, images, or other content. cca for paste in . Cutting is the process of removing content and storing it in a temporary storage location, Windows, or press called a clipboard. eee 4. Copying is the process of placing content on a clipboard, withthe content remaining in conan for copy, and covmanot¥ for paste, on computers « running mac0s. the project, Read Ethies & Issues 4-1 for a discussion about unethical copying. Pasting is the process of transferring content from a clipboard to a specific location in a project. @D emacs aissues 41 What Can Schools and Employers Do to Prevent internet Plagiarism? The Internet has made it easier for students and employes to plagiarize in contrast, it also provides tools that schools and employ- ers an use to detect ilega copying, Schools often have specific ules about what const ‘utes plagiarism. Employees such as ournal- ists are expected to folow ethical guidelines _when copying or ting content The Intemet offers mary ways for students to cheat intentional, including websites ‘that allow you to purchase a research paper Students may not realize that copying infor Imation without propel citing it also is pa giarsm, Students who intentionally plagiatize blame competition. Teachers have several ‘tools to catch plagiarsts induding services ‘that compare papers to others onthe Internet and produce a report highlighting content resembling previously published writing ‘A joumalist might be expected not only ‘0 produce multiple articles daly, but also to se socal media to keep readers engaged. ‘This pressure tempts some journalist to copy content, sometimes without giving credit or linking to the original source. The laws against plagiarism are the same whether copying content from a respected news source, a per- sonal blag, or social media. the pressures of time and expectations of content can create high-profile cases of plagiarism that affect rot only the journalist but the news source for ‘which he or she wes Some argue thatthe best way to prevent cheating i to educate Fst, teach the values and cscs the consequences of cheating Next, teach howto cite sources propery and summarize information. Before copying or para phrasing another persons wor, contact hin Core to request permission. When in doubt, check wth libreian, ecto or nstctr, © Consider This How should educators and ‘employers deal wth plagiarism? Should schools use papercompatison see in an attempt to stop cheating? Why o why not? Does inking to the orignal source excuse a journalist who copies content? Wy or wy not? Fig ‘king Productivity, Graphics, Security, and Other Tools 3. When users format a project, they change its appearance. Formatting is imporeant because the overall look of a project significandly can affect its capability to communicate informa- tion clearly, Examples of formatting tasks are changing the font, font size, and font style igure 4-4) 2. A font is « name assigned toa specific design of characters. Cambria and Calibri are examples of fonts b, Font size indicates the sie of the characters ina particular font. Font size is gauged by a measurement system called points. A single point is about 1/72 of an inch in height. 6. A font syle adds emphasis toa font. Bold, italic, underline, and color are examples of font styles. 4, During the process of creating, editing, and formatting 2 project, the computer or mobile device holds itn memory. To keep the project for furnre use requires that you save it. When you srcea project, the computer transfers the project from memory to a local storage medium, such as a USB flash drive or hard drive, or the cloud, so that you can retrieve slater. 5. You can distribute a project as a hard copy or electronically. A bard copy is information that exists om a physical medium, such as paper. To generate a hard copy, you print a project. znding electronic files via email or posting them for others to view, on websites for ‘example, saves paper and printer supplies. Many users opt for electronic distribution because it contributes to green computing. 12-point Cambria 28-point Cambria ein Bold Italic Underline Color 12-point Calibri font styles | 28-point Calibri es TS |S Bold /talic Underline Color Figure 4-4 The Cambria and Calibri fonts are shown in two font sizes a variety of font styles @ consiver Tals How are productivity web apps different from productivity desktop apps? Sone word process, spreadsheet and presentation software apclicatins are avaliable as webapps. These online vesons aftn have inte functioelty compare to thei desktop counterparts. They alow users oshare projets vith oer ets and enable many uses oe them atthe sane time Onine product apps save your work onthe cloud instant as you type Both the apps and the documents rie wth them are stored on the oud. In carat, desktop app are installed on yout compute Documents ate wth desktop ans may be stored on your computer, onthe out, or srchanzed between both ctor Nn elton pructty programs have an AutoSave feature that automaticaly saves open project to your Canute’ storage at spectied tie interval, suchas eer 10 minutes Saving your wok Fequently ensure that tempi of your work wil at be st inthe vent ofa jst faire or power ios. COMMUTES Programs and Apps Q consier this What is a clip artimage gallery? ‘Applications often include a clip artYimage gallery, viich i a collection of clipart and photos. Many cp at Image gli als provide fonts, animations, sounds, vdeo cls, and audio clips You can use the images fons, and other items from the clip artfimage gallery in all types of projects, including documents, brochures, wotkshees, and slid shows Word Processing Word processing software, sometimes called a word processor is an application that allows "users to create and manipulate documents containing text and sometimes graphies (Pigure 4-5). People use word processing software to develop documents such as letters, memos, reports, ‘mailing labels, and newsletters, Word processing software has many features to create professional and visually appealing documents. For example, you can change the font, size, nd color of characters; apply special cffects, such as three-dimensional shadows; use built-in styles to format documents, and organize text in newspaper-style columns. Word processing software allows users to incorporate graphics, such as digital photos and clip art, in documents. In Figure 4-5, a user inserted an image ofa tractor in the document: documents iplayed inwindow printed document Figure 45 Word processing software enables users to create professional and vsvally appealing documents Productivity, Graphics, Security, and Other Tools With word processing software, you easily can modify the appearance of an image after inserting itin the document. The page setup feature of word processing software allows you to define the size ofthe paper fon which to print and to specify the margins. A feature, called wordwrap, allows users to type ‘words in a paragraph continually without pressing the ENTER key at the end of each line. While you edit a paragraph or change the paragraph margins, the words in the paragraph automatically ‘wrap, or reflow, within the paragraph. As you type more lines of text than can be displayed on the screen, the top portion of the document moves upward, or scrolls, off the screen. Word processing software typically includes tools to assist you with the writing process. For example, a spelling checker reviews the document for spelling errors. A grammar checker detects passive voice, run-on sentences, and grammatical errors. A format checker identifies, extraneous spaces, capitalization errors, and more. A bibliography tool can generate and format a bibliography from information provided about references cited in a paper. Presentation Presentation software is an application that allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group. The presentations can be viewed as slides, sometimes called a slide show, that are displayed on a large monitor or on a projection screen from a computer or mobile devi Presentation software typically provides a variety of predefined presentation formats that suggest ‘complementary colors for backgrounds, text, and graphical accents on the slides. This software also provides a variety of layouts for each slide, such asa ttle slide, a two-column slide, a slide with clip art, 1 chart, table, ora diagram, along with tools for arranging text in various configurations (Figure 4-6). | ‘ve cola sie Figure 4.6 Presentation software crovides tools for creating sides with content arranged in a variety of formats. ‘When building a presentation, users can set the slide timing so that the presentation automatically displays the next slide after a preset delay. Presentation software allows you to apply special effects to the transition between slides. One side, for example, might fade away as the next slide appears DEE Programs and Apps Presentation software typically includes images, photos, video clips, and audio clips to enhance presentations, Some presentation software offers a media search too! to help users locate online images or videos to include in their slides. ‘You can view or print finished presentation ina variety of formats, including a hard copy outline of text from each slide and handouts that show completed sles. Presentation software also incorporates features such as checking spelling, formatting, researching, and creating webpages from existing slide shows. Spreadsheet ‘Spreadsheet software is an application that allows users to organize data in columns andl rows and perform calculations on the data. These columns and rows collectively are called a worksheet. Most spreadsheet software has basic features to help users create, edit, and format worksheets A spreadsheet file also i known as a workbook because itcan contain thousands of related individual worksheets Data is organized vertically in columns and horizontally in rows on each worksheet (Figure 4-7). ach worksheet usually can have thousands of columns and rows. One or more leters identify each column, and a number identifies cach rovs. Only a small fraction of these columns andl ros are visible ‘on the sereen at one time, Scrolling through the worksheet displays different parts of it on the screen, ‘Acell is the intersection of a column and row. The spreadsheet software identifies cells by the column and row in which they are located, For example, the intersection of column B and row 4 is referred to as cell BA. As shown in Figure 4-7, cell B4 contains the number, $1,000.29, which represents the wages for January. Many of the worksheet cells shown in Figure 4-7 contain a number, called a value, that can be used in a calculation, Other cells, however, contain formulas that calculate values. A formula @ow performs calculations on the data in the worksheet and displays the resulting value in a cell, Sane usually the cell containing the formula, When creating a worksheet, you can enter your own Inmany spieatsheet ‘formulas. In Figure 4-7, for example, cll B17 could contain the forrmula ~B9+B10«B11+B12+ apps, aformula begins _B134B1-4¥B15+B16, which would add (sum) the contents of cells B9, B10, B11, B12, B13, B14, with an equal sg B15, and B16, That is, this formula calculates the total expenses for January. {onl assigned to active cal coma 3 function Bo Gleam Bucget AAT te BOE: ee BEY Personal Budget Worksheet January Febeasy Mah sin Ane Sue Some Suna sew Acer fmt ace seater Figure 4.7. With spreadsheet software, you create worksheets that contain dats arcanged in columns and rows, and you can perfor calculations on the data in the worksheets, Sipe Tae ie Productivity, Graphics, Security, and Other Tools eam SED |A finction isa predefined formula that performs a calculation, such as adding the values in a group of cells or generating a value, such as the current time or date. For example, -SUM(B9:B16) is a formula that uses the SUM function to instruct che spreadsheet application to add all of the ‘numbers in the range of cells BY through B16, Spreadsheet applications contain many built-in functions to perform financial, mathematical, logical, date and time, and other calculations, Many spreadshect applications allow users to write their own customized Functions to perform special purpose calculations. ‘One of the more powerful features of spreadsheet software is its capability to recalculate the rest ofthe worksheet when data in a cell changes. Spreadsheet software's capability of recalculat- ing data also makes ita valuable budgeting, forecasting, and decision-making tool. Another stan- dard feature of spreadsheet software is charting, which depicts the data in graphical form, such as bar charts or pie charts. A visual representation of data through charts often makes it easier for "users to sce ata glance the relationship among the numbers. Database A database is a collection of data organized in a manner that allows access, retrieval, and use @@) stv of that data. In a manual database, you might record data on paper and store it in a filing cabinet. Web Databases With a database stored electronically, such as the one shown in Figure 4-8, the computer stores Much ofthe information the data on a storage medium, such asa hard drive or flash drive, or the cloud. you access on the Database software is an application that allows users to ereate, access, and! manage a database, Web — including Using database software, you can add, change, and delete data in a database; sort and retrieve data PUD‘es videos, Novis, from the database; and create forms and reports using the data in the database, F 2 deta, and ass With most personal computer database programs, a database consists of a collection of tables, eqisratons —isstred organized in rows and columns. Each row, called a record, contains data about a given item in in databases. Read Tech the database, such as a person, product, object, or event. Fach column, called a field, contains a Feature 11-1 for more specific category of data within a record. The Publishing database shown in Figure 4-8 consists formation about web of two tables: a Customer table and a Book Rep table. The Customer table contains 15 records *!#0=##8 (rows), each storing data about one customer. The customer data is grouped into 10 fields 1U # (customer number), Customer Name, Street, City tate, Postal Code, Amount ‘common BR # fel eats the Customer ole to the Book Rep table “Figure 4-8 This database contains two tables: one for customers and one for book reps. The Customer table has 1Srecards and 10 fields; the Book Rep table has 4 records and 10 fields. CRC MMEESTICES Programs and Apps Paid, Current Due, Returns, and BR # (book rep number). The Current Due field, for instance, contains the amount of money the customer owes the publisher. The Customer and Book Rep tables relate to each other through a common field, BR # (book rep number). Users run queries to retrieve data. A query is a request for specific data from the database. For ‘example, a query might request a lst of customers whose balance is greater than $20,000. After obtaining the results of a query, database applications can present them on the screen, send them. to a printer, or save them in a file. @Q consiver His When should you use a database instead of a spreadsheet program? Although databases and soreadshees ath store dat, these programs have diferent purposes and capabilites Spreadsheet programs are del for calculating resus or cating charts from vale inthe worksheet, You Should use a database poaram, however want to collect, reorganize and fier data, andlor ceate reports ftom the data Note Taking ‘Note taking software is an application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook (Figure 4-9). Users also can inelude roves eae audio recordings as part of their notes meres tin ae =< Some enable users to syne heir notes ‘Greuatory Syste Varatons 4 to the cloud so that they ean acess El the notes on any computer or mobil device, Many note taking applications also include a calendar feature. Users find note taking software convenient during meetings, class lectures, and conferences, and in libraries and other settings where they would record written notes in a notebook: len + Sige Ct cute a intoretboe shape Text Editor aa text editor is used to type information when it does not need to be formatted ure 4-9. With note taking software, mobile users ean handwrite notes, draw with fonts, page numbers, or other styles. sketches, insert photos and links, and type text. Many programmers and web developers use text editors to enter the programming ‘or H'TML code used for building applications or websites. Read! Focus On: Web Development for more information about text editors. Calendar and Contact Management Calendar and contact management software helps you organize your calendar, keep track ‘of contacts, and share this information with other users, who can view it on their computers and mobile devices (Figure 4-10). This software provides a way for individuals and workgroups to ‘organize, find, view, and share appointment and contact information easily. Although sometimes available separately calendar and contact management software often exists as a unit ina single program. Many email applications include calendar and contact management Features. Calendar and contact management applications enable you to synchronize information across all of your computers and mobile devices so that you always have the latest version of any updated information, Productivity, Graphics, Security, and Other Tools (ICCC mC SEE Figure 4-10. Users access their calendars on computers and mobile devices. Software Suite @sw ‘A software suite isa collection of individual related applications available together a5 a unit. Forms and Surveys Productivity software suites typically include, ata minimum, word processing, presentation, Some online productivity : spreadsheet, and email applications. While several productivity suites are designed to be installed sites support creating r ‘on a local computer, some are available as web apps and enable you to share projects stored on a eae eee the cloud to collaborate with other users. Roiacaeeee @ consiver THis a Why would you use a software suite instead of a stand-alone application? Sofware suites offer three major advantages ease of use, integration, and lower cost. : “Software suites provide ease of use because the applications inthe suite normally use a consistent interface and share features such as clipart and speling checker. 5 + Aoplcations ina software suite often ae integrated, which makes it easy to share information among them. For example, you can copy a chart ona worksheet created ina spreadsheet program and paste into aside created wh presentation software. + When you purchase a software sute, the suite usually costs significantly less than purchasing each application indvidualy, or as stand-alone applications d Project Management Project management software is an application that allows a user to plan, scheclule, track, and analyze the events, resources, and costs of a project. Project management software helps twers manage project variables, such as the tasks required to complete a project and the allotted time and resources for each, allowing them to complete a project on time and within budget. Amarketing manager, for example, might use project management software to schedule the processes required in a product launch (Figure 4-11). CE TMMMEICEMEEN Programs and Apps eee mecciaeen 3 0 iron etpton "mO Be ore ae LUnpretsanastes ectytcetrg anon sae) staff assigned to task ota tentcnelotereinaten Figure 411 with completed tats | senna semesters sornen 9 8 project management eae Software, you can pian Berane ow and schedule the tasks Guertenneonyinnamnatin 3 5 and resources required in menu ape magn Breet Brwoenerrnaiectare tO @Q consiver rHis Does the term, project, have two meanings in the technology field? "Yes. As discussed earlier in this module a project can be a delveable you create using apoiation software, such as, a document, presentation, spreadsheet, notes, calendar, contact lit budget, and mare. projet aso describe the collection of asks and processes required to develop a solution ta a problem, Accounting Accounting software is an application that helps businesses of all sizes record and report th SSS FeO] With accounting software, business users ‘ee % | perform accounting activities related to the general ledger, accounts receivable, accounts payable, purchasing, invoicing (Figure 4-12), and payroll fanctions. Accounting software also enables busi- ‘ness users to write and print checks, track checking account activity, and update and reconcile balances on demand, “Most accounting software supports online credit checks, bill payment, direct deposit, and payroll services. Some offer ‘more complex features, such as job costing and estimating, time tracking, multiple ‘company reporting, foreign currency reporting, and forecasting the amount of Figure 4-12 Accounting software helps businesses record and report their raw materials needed for products. The financial transactions cost of accounting software for small financial transactions. ora ayer cc: Productivty, Graphics, Security, and Other Tools URI Cmts businesses ranges from less than one hunateed ro several thousand dollars. Accounting software for large businesses can cost several hundred thousand dollars. Personal Finance Personal finance software isa simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills track personal income and expenses, verify account balances, trans fer funds, track investments, and evaluate financial plans (Figure 4-13), Personal finance sofeware helps determine where, and for what purpose, you are spending money so tht you can mame your finances, Most personal finance software includes Financial planning fearores, such as analy a hhome and personal loans, preparing income Figure 413. Personal finance software sss home users wih tacin tayes,and managing retirement savings. Other e979! 3ccounts features incude managing hame inventory | and setting up budgets. Most of these applications also offer a variety of online services, such as online banking and online investing. Read Secure I 4-2 for safety tips when using personal finance apps on your smartphone or other mobile device. @ secure ir42 Using Personal Finance Apps Safely Insitutions Theyofien, however, are td- to the use of apps available to help users Soar eaneganee Geena cto: dled vith msspelings andawioerd sen. locate rissing ahones Many phones aso Bey ctiotstanuylilh decal chests tences Inadtiton, legate companies havea kl sitch that renders the shone nine count balances, verfy payers, ‘Flv pramote downloading an app or a inoperable or rectly wes the phone's and wanslerfuncs. They also are magnets Pop-up or pep-under advertisement. yeu data after too mary unsuccesfl login foroterciminalstosnétch anunsipectng ett anapofton abank or oer financal attempts. Yu sil shoud ake caten Berean ciel on eneSend 8 Ge institution, vit that company’s website for when storing personal information on your somecne ese anherein the world, who insructions about downloeding and fstall- pon to rotert your identity inthe ev Sere ie riarniias eemonceny ing ts authenticapns thal your moble device ilos:orstlen. trasations, erly ethic of malware —_-* Use strong passwords to access the + Verify the transactions. Aways vei banking apps target cusomersin the Unted apps. Many of the more secure personal __your transactions ky scutizing month Stateswit malious instrutiens thatimade finance appshave aval password: that statements In ation, parody check ihr smorthones ard cain accesso infer invoke typing a string of charactos and balances and alert your financial nsituion ration stored on their devices, Users in Bazi, also validating a cure. Inadiition, be if any aaivty seers abnomal Astealia,ond Fence ako are becoming cetain to password pretect your motile exrerly popular tage's for banking thieves. device © Consider This: Have you wed france Bjvsing c@uton ane common sense, bow. «Guard your smartphone, Acouing to 29s? so whic ones? When conducting ler ser con tke steps to sofeguard th Cansume Repos, more than 5.2 milion ransactons, do you fll some ofthe tps fundsane their emits by folowing these americas est had telrphones sien cesctibed inthis box? Ifo, would you pret ina recent year That number decreased by consider downloading an app to complete ‘+ Fvaluate the apps. Ftcudulers appsmay _morethan J millon rem aprevious year. some common banking tarseciors? Why resettle leltmete epps from financial ‘he study teed the decrease in numbers or why not? CREME CLS Procrams and Apos Legal Legal software assists inthe preparation of legal documents and provides legal information ‘o individuals families, and small businesses (Figure 4-14). L-egal software provides standard ' ‘contracts and documents asseciated with buying, selling, and renting property; estate planning: marriage and civoree; and preparing a will or ving trust. By answering a series of questions oF completing a form, the legal software tailors the legal document to specific needs. Many lawyers offer assistance online when using legal software web apps. Has the ears edometer been altered Aka longer toe | qusstin fr bil af ale docament stot commun onsae eit Fate eon Figure 4-14 Leaalsofwere assists ncviduals, fails, and small ousinesses inthe pieparaton of legal documents, Productivity, Graphics, Security, and Othar Tools Tex Preparation ‘Tat preparation software is an application that can guide individuals, families, or small hnusinesses through the process of fling federal and state taxes (Figure 4-15). These programs forecast tax liability and offer money-saving tax tips, designed to lower your tax bill, After you answer a series of questions and complete basic forms, the software creates and analyzes your tax forms tosearch for missed potential exrors and deduction opporcunities. Once the forms are complete, you cin print any necessary paperwork; then, they are realy {for filing, Some tax preparation programs also allow you to file your tax forms electroniealy, a process called s-fling. TELE sean pace Figure 4-15 Tax preperation software guides individual, farnies, ersmall businesses through the proces of filing federal taxes Document Conversion and Readers Document conversion software saves dacuments created in any application into a common onnar that has the same appearance as the original document, A popularimage file format asad t save converted documents is PDF (Porable Document Format), developed by Adobe Systems. Productivity applications, such as word processing and spreadsheet program, often grit the ability to save project in PDF format. To interact with « PDF file, you need a DP reader application, such as Adobe Reader, which can be downloaded free from Adabes website. With a document reader you can view, create, search, convert, annotate, edit, share, and print documents (Figure 4-16). You do not need the sofeware that created the original euitent, Some readers allow you to complete forms aad add your signature to documents. prise Computing ge organization, commonly referred to as an enterprise, requires special computing lations hecause ofits size and geographic distribution. A typical entexprise consists of a wide ety of departments, centers, and divisions — collectively known as functional units, Nearly ey enterprise hos the following furictional units: human resources, accounting and finance, ering or product development, manuficturing, marketing, sales, distribution, customer and information technology. Programs and Apps . commenting /uis0t / fe ea eating Ik options Ie Figure 4-16 Users can edit content and add commens to a ?DF decument Software used in finetional units is nor mutually exelusive; however, exch functional unit in an enterprise uses specifi oftware, as outlined below. + Human resources software manages employee information, such as pay rate, benefits, personal in‘ormation, performance evaluations training, and vacaton time, * Accounting software manages everyday transactions, such assales and payments to supplier. Einance software helps managers budger, forecast, and analyze * Engineering or product development software allows engineers to develop plan products and test their product designs, * Manufacturing software assists in the assembly process as well 2s in scheduling and managing the inventory of parts snd produces + Markering software allows markering personnel to create marketin campaigns, tinget demographics, and track their effectiveness , schedule meetings, log customer es software enables the salesforce to manage cont insersctions, manage produce informetion, and tale eustomer orders. * Distribution software analyzes and tracks inventory and manages product shipping status ‘omer service software manages the day-to-day interactions with customers, such as phone calls, ermail messages, web Inceraccions, and messaging sessions. + Information technology staff use a variety of programs and apps to maintain and secure the hardware and software in an enterprise, Tech Feature 4-1: Web and Mobile Apps for Personal and Business Productivity variety of applications provile a service intended ta make business or persanal tasks easier ta accomplish. Some applications focus ona single service, while others provide several services ina single application. Read Tech Feature 4-1 to lear bout some popular wel and mobile apps for personal and business productivity you ing they Refe (@ tech Feature 4.1 Web and Mobile Apps for Personal and Business Productivity Weer you are checking apoinments, ering 0: reading emal essages,eranging tive banking cr lokig op infomation onine ming opts, Sar ning QR iuick sponse) codes orba caesar thecking ini ends on online cil neers, web ar mobie 29pscan asst our personal nd uses producti Calender and Email Weintaning a clendr and chevtrg onal messages are cammon tsi of eed and eal es ad robo af0s Calendar anos ken ack ol our appobrents ard selrrie nfomaton enteric on amcbile doce with your online or desktop calendar saftware, Email apps imate wth your device’ adress banka fcitate sending messages te penple whose names are stared in Your device’ coact ist ar alow yout access and Ser phos sore nyu dees photo galery Travel Furchasing tights, hots, rertal cars, o travel Series fsa common onine task for perscnal and busines travelers. rave apps splay avaiable options pi allow yout fier suits. Vany allow you to share travel plans wth your onine socal networks. ncal ‘ou can access bank accounts or investments using afrancal app Financial mabile apps track expenses as youspend morey and natfy you when a bili due. To help secure infortration, financial mobile apps can di able access if your deviceis stolen cr lost. Sarre bank- Ing motile apps stow you to upload a photo ofa check taken with the device's came to arcess the deposit Reference Ditionaries, engyclopedias, books. ard crecories aelable orl as reference apps. Mary have asso date roble apps that format information for mobile Procuctivity, Graphics, secur ces or ake advantage of tes features. For erage rather han ping a search term ina detcnary wa app {0 leokup ts defatin, a mobil app ako might ote ‘ce ino On the mabie version of a encyclopedia app, you mht shake the device to disglay random top- is or redisplay the apo's nore screen, Some raferenca motile apps ako can downlcad information drecy to Jour phone forofine acess Retail Ontine marketplaces ard payment senices support !aying and sling tems and varsfeing funds from one pat to ancther Marketplace apps enable austome's io esearch preducts, submit or examine product viens, and make purchases, retail store mobie pp might use advice’ GS to offer special deas closest othe cs tore’ lacaton. You a0 might we a deve’ camera toscana product's bar code and then place the item in a shopping cat, Payment services allow customers to sed money or pay rites using mabils devices, Read Secure I 4-3 fr set tos when using payment apps Scaming Scanning apps use a mebile device's camera co stan 2 QR code or barcode. A QR code Isa square-shaped graphic that represents a web aduress or otter informa tion. A QR code reader app scans 9 QR cede, and then dlsplays ts corresponding information, Some messaging pos provide codes iepesertrg contact nfemetion, By scanning the code displayed or the screen of fiend’s mobile device, yeu can aud your fiend’ contac informa tion te your contacts orale social rework var coce scanner reads a barcode and may pcvide product infor ‘metion price, oF eviews. Some supermarkets provide shopping apps for customer te scan bar codes cf items they purchase. These apps ceate a customized shopping ‘ist ordering tems by their aisle location the store, to provide a mote efficient shopping experience Online Social Networks Many users connect with family ends and coworters using online secial network mebile aos. Shine social network wob apps aen integrate instant ‘messaging and video chat communications, Nobile apps allow users to indude photos and videos i updates made fom their dovces. © Consider this: Compr be weband bie reson of te sane spp for pesora and buses pracy hic fests cone to beh? ich feats inthe edie vesion ar ot feud nthe web ‘erson Which fetus nthe web eon arene find in the mableton? Why co you ink the devebpes made thse declan? Wick features woud you ko sce hat ate misig fom ether verona he 99? ee ee Programs end Apps @ secure v4.3 ——_— Avoiding Risks Using Payment Apps Pasna forcofiee at the cal coffee shop or buying took at the herdae store has become steamlined with the advent of mobilepayment apps Each month, more than ore milion Starbucks customers use thet smanphones insteed of using cash a cedt cards to pay for their orders, and many merchants are acceoting this form af gayment as mobile wallet apos become mote secure. Users ust download a mobile ‘valet app such 2s Apple Py 0 Andreld Pay, inorder to pay wih their smatphones. Using the motile walet app they can thelr Smartphones near @ eader atthe POS termi nal to complete the tansacton, rather than handing a cet card to a clerk. Contrast this practice with the proces at any restaurants, here employees often must tae credit cards away fom the tale to complete the tanszc- tion: an unscrupulous employee would then have fll acces tothe personal information on the cares Mobile pment orovders state thatthe tse of their apps is mote secure than using crecitcars. The apps ise a payment system ‘on phones equipped wth an NEC chp, which stores data thats transmitted toa contact- less terminal and verted as alegtimate sale ‘A smertphore user never enters 2n account a the cash rogster because financal information i stored onthe mobile payment system, f, however, an unauthorized charge fs mae the Electronic Fund Tansfer Ac protects users as long as the dam is made promptly, general within two das. it you use your smartphene to make pur chases, follow ths advice form the security exper + Use a password en yourphane elect an approved payment app fiom your device's app store that requies you to enter a password to stat the transaction, © Use a secure Internet connection when mating a purchase online, When using a Graphics and Media Applications mobie veb apg, be sure that the browser shows hitos! in the websites web addess and 2 padlock gmbol appa, + Be viglant about checking receipts and mobile tensactons against monthly stare iments from the creditcard company, © Consider this: ove you evermate purchase using a able paymert 2907, how aoe the expeionce compare to paying wth elt card? Under wit drumtances 210 you mor lily to aay using our snarthone? In addition to productivity applications, many people work with software designed specifically for their field of work. Power users, such as engineers, architects, desktop publishers, and graphic artis ‘often use sophisticated software that allows them to work with graphs and media. Many of these applications incorporate user-friendly interfaces or scaled-down versions, making it pos sible for the home znd small business users aso to ereate projects using these types of programs. computer: ing pine and photo management. video and audio. Graphics and media applications include ided design, desktop publish ‘eliting, photo editing 15, multimedia and website authoring, crs, and augmented and virtual reality applications. Computer-Aided Design ‘Computeraided design (CAD) software ia type of application thar assis professionals and designers in creating engi- neering, architectural, and scientific designs and models (Figure 4-17). For example, ‘engineers create cesign plans for vehicles and security systems. Architects design building structures ani floor plans, Scientists design P drawings of molecular straceures “Three-dimersional CAD programs allow oak op designers to rotate designs of 3-D objects ie Productivity, Graphics, Security, and Other Tools NEEL toview them from any angle. Some CAD sofeware even can generate meterial lists for building designs. Home and small business users work with less sophisticated design and modeling software. “These applications usually contain thousands of predrawn plans that users can customize to meet theirneeds: For example, home design/landscaping softeare is an application that assists users with the design, remodeling, or improvement ofa home, deck, of landscape. Desktop Publishing Desktop publishing software (DTP sofeware) isan application that enables designers to create sophisticated publieations thae contain text, graphics, and many colors. Professional DTP software is ideal forthe production of high-qualigy color projects, such as textbooks, corporate newsletters, marketing literaturs, product catalogs, and annual reports. Designers an graphic antists can print finished publications om color printer, take chem to a professional printer, or post them on the web in a format that can be viewed by those withous DIFP sofevare, Home andl small business users create newslercers, brochures, flyers, advertisements, posteards, greeting cards, letterhead, business cards, banners, calendars, logos, and webpages using personal DTP software (Fygure 4-18). Although many word processing programs include DIP features, home and small business users often prefer to create DTP projects using DP software because of its enhanced features. These programs typically guide you through the development of a project by asking a series of questions. Then, you can print a finished publication on a color printer or post iton the web, Figure 4-18 W/th personal DTP software, such as Microso't Publisher shown rere, home users can create pesleters, Many personal DTP prograns also include paint/imge editing software and photo editing and photo management software (discussed next), enabling users to embellish their publications @)#TW Bivonee Buin nag Editing : Wore procesing, i presentation, an ater Paint/image Editing procuctivty apsications tly elise besicimege eng misin-applicaton diet emabikine Graphie artists, multimedia professionals, technical illustrators, and desktop publishers use paint software and image editing software to create and modify graphios, such as those used in DTP projects and webpages, Paint software, also called iThumnaton sof Programs and Apps Video and Audio Editing ideo editing software is an apolication that allows users to modify a segment ofa video called a clip. Por exam the lengih ofa video clip, reorder a series of clips, oo add special effects, such across the screen, Video editing sofware typi- cally inchides aucio cating capabilities. Audio editing sofeware isan application that enables users to modify audio clips, produce studio-quality soundtracks, and add audio to video clips (Figure 4-21). Most television shows and movies and many online videos are created or enhanced. audio editing software. Audio and video ealiting apps allow users to edit avdio or using video: video files recorded with their mobile deviews. ‘Some operating systems inclucle video editing and audio editing applications. 1 Figure 421. With audio citing software, uses ’ nrosfyaudo cips 1 I Multimedia and Website Authoring th Multimedia authoring software allows users to combine text, graphics, aulio, video, and = animation in an interactive application. With this software, users control the placement of exe iv and images and the curation of sounds, video, and animation, ‘Training centers, educational inst tutions, and online magazine publishers use multimedia authoring software to develop interactive applications. These applications may be diseributed on an optical disc, over a local area network, _ oronline on Website authoring software helps users create business websites for a variety of purposes, fo such as online stores, restaurants, small businesses, oF persona interests, generally without ay requiring advanced HTML skills. Users can create pages by dragging and dropping content ele- i ‘ments, such as images, videos, maps, blog posts, and other content (Figur Some website c 1, blog post cig S ad authoring software create websites that appear properly on both deskrop or laptop eomputers , while é and smartphones. In addition, some of these applications are installed on a user's compa or fothers are accessed through a web app running in a browser a F ima cha Productivity, Graphics, Security, and Other Tools WK 8 ioe cig options Teer Figure 4-22 Wietsite autncring software allo Yur fex, images, and videos to exst onal and business websites you to cate engaging p templates webs @ conswee ms What are computer-based training, web-based training, and massive open online courses? Compsterbsed rig (Bs yp of ehucation in wich students eam by eang a conn ees nth istucional scat. Web -hased rain 8) ayo fC hot uss nee ctrco Ge te tio. Cand WAT pil cont of efter, ek paceé rutin about ape WE caer nbishes, dustry, and sco fr teaching ew sik or etamcng ocsieg and suds thug aconbiration af veo The MOOC fomat can vary depending upan the sutect mater and stots {ectures, assigned readings, assignments, and interactive dic interested in attending, and they invite people to share the course cortent. Other instructors, however keep the couse sed and manta sti con their sauces thar heen 10s, an theshor vdeo instructions en thwsad of topes have been tandeted i wo fers access to qualty education anys ion and interaction with ar instructor ar the interes avalabie students an online classtoam. S expe sions. Some istrcto's open their courses to anyone sone of the mote pop! Media Player ‘A media players program that allows you to view images and anitnations, listen to audio, snd watch video files on your computer or mobile devies. Mula players aso may enable you fo dtginize media files by genre, artist or othorearegory; creme plays convert files w dittrene formats; connect to and purchase media from an online media core or marketplace; stream radio stations’ broadcasting over the Internet; download podcasts; burn audio CDs; and transfer media tb portable mectia players, Augmented and Virtual Reality An augmented reality app overlays information and digital content on top of physical objects tr locations. Some augmented reality mobile apps overlay media or ether digtal content eer ure 423 shows the use of augmented reality in medical education. A user scans a earget an augmented reality app, and the app overlays 3-D) graphics of the hurman bocly By the angle, oF zooming in and out, the user can visualize various muscles org sgtetis of the human body, and riers) irre Programs and Apps ‘augmened ealiy fa 08 tatlet [ toet ese gure 423 Scennig a rge: ina ve moselo! the buman baby sit a tablel or smartohone displays a thisaugmented realty apo used for mecica A virtual reality app provides an immersive user experience. Some require a specialized viewer, which may have a built-in display, or make use of a smartphone to display 360-degree images or video content, Popular applications of virtual reality inelude gaming, health care, fashion, business, and training. The military uses virtual reality for training soldiers for com: bat by simulating real-world environments, Using virtual reality simulations, soldiers learn to fly planes, respond to medical situations on a battlefield, and drive military vehicles without placing themselves in danger. Personal interest Applications Countless desktop, mobil entertainment, convenien relatively inexpensive: many are free or open source, and available for download from web sites fora devive’s app store. Some applications focus on sin and web apps are designed specifically for lifestyle, metical or education activities, Mest of the programs in this category are service, while others provide several services in a single application. * Lifestyle applications: Access the latest news orsports scores, check the weather forecast, compose mesic, research genealogy; find recipes, meet or chat with friends online near you, or locate nearby restaurants, gas stations, or points of interest. * Mezlical applications: Research symptoms, establish a fitness or health progesm, track exercise activity, refill prescriptions, coune calories, or monitor sleep patterns * Entertainment applications: Listen to music or the radio, view photos, watch videos or shows, read a book or other publication, organize and track fantasy sports teams, and play games individually or with others. Productivity, Gravhics, Security, end Other Tools EVEETEN al 2) * Convenience applications: Obtain driving directions or your current location, convert specch totext instead of typing, set an alarm or timer, check the time, calculate a tip, use your phone asa flashlight, or use a personal assistant that acts on your voice commands (read HowTo 4-2 for instructions about using personal assistant apps) idacation applications: Access how-to guides, leam or fine-tune a particular skill, follow tutorial, run a simulation, assist children with reicing and osher elementary skills, or support academies. IG) sowro <2 ‘Use Features in Voice Command Personal Assistant and Mobile Search Apps ‘Many moblle ouerating systems incluce a vinual personal assistant that processes voice commands and performs certain tasks. Some mobie -seuchapps also act on spoken commands. For example, you can sue voice commands to set an alam, add an appointirent to your caenday, sed atex messeye, or un ar app he table below descries ways to Use features in voice cemmand personal assistant apps. Actvste your device's personal assistant “Hey, Si “OK, Gogh” CCange shone settings, "Tur on Wi” “increase bvightness.* Dial anumbar *Call Madely’s Cel.” *ial 407-555-8275." Ottain infomation “When was George Washington ban?” Ottain diving instructions Navigate 1123 Man Sret, Orlando, Frida," Run an asp tun calendar! Scedule ¢ meeting ~ "Schedule & meeting tac atthe ibrary at 3:00 p.m, tomarow Send a tet message “Text Samvel meet me atthe pool Set arerinder "Remind me to ge grocery shopping cn Tuesday" “et ater “Setter fr five mines" Set en alors “Seta alaim for 6:00 am. tomotov.” © Consider This: Use a search encine to find a complete lito voice conmands aeilzble foryour phone. Ty speating some commands that 4yoU have not used before, Vhich cnes might he mos sel fr you? Tech Feature 4-2: Web and Mobile Apps for Media and Personal interest \ satiety of applications provide service intended to make media and personal interest tasks ‘easier to accomplish. Some applications focus on a single service, while oxhers provide several services in a single application. Read ‘Tech Feature 4-2 to lears about some popular web ancl mobile apps for media and personal interests Programs and Apps @ teen resrunes.2 Web and Mobile Apps for Media and Personal Interests Whether sharing, digtal photos or ather medi, streaming audio and video, o: playlg gare by your sel or ith others, countless web and matile apps ate vale to meet your needs You aso can use web and imebile apgs to lok up rem sports, and weathes, obtain maps and directions ep you each yeurheah and fitress goels: and assist you with academic objectives Media Sharing ‘With midis shaving moblle apps, yeu use the digital «camera on your mobile device ta take quality photos hen instantly can share the photos for videos on online sacial nstwors. Using the cero sponding media sharing web app, you can categorie, tag organize, and rank the mesia nocedby you, your friends and your contac Streaming Audio and Video Fodcasts, video blogs, clips oF episodes from attelevi- | sion hon oreven ene movies ar valle thoush | a vatity of steaming medie web and motileapas, | Some services are availale ony with membership, and_ | may charge month fee, Cthes ae fee, but induce ads Steaming mec enables you ov ‘0 content without downtoang ito your computer or devce, Because steaming media can consume large amounts cf deta, however, nan users wil stream media when connected to 2 Wi-Fi retwork and dovnload media to the devices storage fer lsening on the go. Gaming Caring web and mobile apps offen offea socal ‘omponent,erablng you to cha: within the game en- ‘onment, thd fiends tho play the same game apos, and os you scores on sccial media Word, puzzle, and boare gattes are ust some examples of apps fou can pay by sell oy with fends or others using the same agns News, Sports, and Weather any apps provide access to the latest news stories, cartont events, sports scares, sporting events, ane \woatho forecasts Some of these mobile aps use GPS technalgy to provide cure or customized information based on the cation of your mobi dovice You alse «an configure these apps to deliver toxt messages ard other types of als to your device when certain events suchas when 3 football tam scores a touchdown ather & near or when severe nd isen Mapping Using your mabie device's GPS capatiliy, yeu can tse maping modile apps to obtain directions, maps, and recommendations for restautants or other points of interest based on yourcurent location, Some apps hein you to track the locations of yur friends based on their GPS dignas if theyenable you to.doso) Web apps help yeu decide on arate, print drections ot @ map, ard en find arent along your rete, such as puble rest, Stops or restaurants, Health and Fitness Losing welgh, training for 2 race, oF fllaing a low-calorie diet ae some uses of helth end fitness apps. Using a mobile device asa pedometer or GPS receiver can helo yeu coune your stes 01 create a map of route you run and then update your afte with the deta i trecked, You can use corresponding web apps = scm tochat and analyze your progress, | schedule your next wortout, or determine tha next steps to reach your goals These apps alsocan help ff plen yourmesls and tack the nuti- | gf tional vale f food you consume. am Academic Schools ofen subscrlve to educational apps that pro vide students with games, qulzes, and lessons about ‘course topics. Using these apps, teachers can keep vack cof students” progress and print areas where they ‘may need exva Pelp. You abo can acces complete co le ot high school couses and take advantage of Fee oF ee-based digial coment provced by publshers and wacies, © Consider This: Which we and motile pps have 0 used fr media shomngsteaming audioans ve, garing; nev, sports, and weather, nsping heath an fitness and edcation? ich wl you try ots after reasng this tec fete? Productivity, Graphics, Security, and Other Tools Communications Applications On Nabile Communications tions, many of which are Apps Most of tne communications apcs in Table 4-2 ae avaiable as moble apes, as wel, Rarlier modules presented a variety of communications appli summarized in’Table 4-2. Many of thes lable as free web apps, as desktop apps available from download sites, or asmobile apps from the device’ app store Table 4-2 Communicati ee Blog File Transfer + Time:stamped articles or posts, in daryor joumal format, © Method o! uploading fs to and dewnlading fies frm servers on Usually Usted in reverse chronological order the Intnet * Bloggers fauthor) use blogging software to create + May require an FIP client program maintain slog * Some blog services provide blogging sofware so users do not have to install it on thelr awn sens + Integrated in some operating systems ‘+ Many applications (ach as web authoring software) that ecuire frequent wansfer of ies to he Internet ave bull FTP capabilities Browser Internet Phone * Allows uses to access and view webpaces onthe Allows users to speak to other users via an intemet connection Internet * Requires a microphone, a speaker, a high speed Intinet connection, and * Requires browser software YalP sofware + Intearated in most cperatng sisters + Some subscription sevces ako require a separate phone andVoP router ‘© Many aternaive brows are available *+ With a wedcam, some serves als support vdeo chat or videoconference Chat Internet Messaging + Real-time, online typed conversation with one or + Realtime exchange of messages, les, images, cudlp, andlor video with more users another online ustr + Requires cra client software Requires messaging software * Integrated in some operating sstems and built nto + Provided by seme online socal networks Sorte websites © Also available as a browser plug-in * Included with some paid iSPs Online Discussion ‘Mobile (Text) Messaging * Online forums where users nave writen discussions Shor tert, pictre or video messages sent and received, mainly on + ta requie a reader program to manage and follow rmoble devices over a mobil caries networe discussion poss + May require messaging plan from mobile service provider * Integrated in some operating systems, eral programs, Requires messaging software online social networ's, end bronsers ‘© Integrated in most mobile devices Email Videoconference + Messages and files sent viaa network, such athe ‘+ eeung between geographically senarated people who use a network to Internet transmit videoraudo ‘+ Requires ar email desktop, web or mobile apo ‘Requires videoconterencing software, a microphone, a speaker, and a ‘Integrated in many software suites and operating webaam syste lable fee at portals on the web © Included with a pid SP B wre Security Tools ‘To protect your computers and mobile devives, you can use one or more security tools. Security tools include personal firewalls, antivirus programs, that etc malware removers, and Internet filters. Although o=.) @ ee some ofthese tools are included with the operating Protected Protected system, you also can purchase stand-alone programs Seipeenisete fl eat oe thar offer improvements or added funesionaliy Personal Firewall A personal firewall isa security too! that deteets and protects a personal computer and its data from ‘unauthorized intrusions (Figure 4-24). Personal firewalls constantly monitor all transmissions to and from a computer or mobile device and may Figure 4-24 This personal firewall detected a threat to the computer and inform a user of attempted intrusions. When con- provided a means to remove the threat @ew Sesh colette ery corse geese Tie ee oore nected to the Intemet, your computer or mobile device is vulnerable to attacks from hackers who try to access a computer or network illegally. These attacks may descroy your data, steal informa- tion, damage your computer, or carry out some other malicious action €} consiver THis What i a hardwae firewall? A advare fens 2 device intended to sop network intrusions before they tempt to afet your computer o retwerk malous. Many outers aso can function asa hardware rewal Tech Feature 4-3: Viruses and Malware A computer virus isa potentially damaging program that affects a computer or device negatively by altering the way it works. This occurs without the user's knowledge or permission. Once the virus is ina computer or device, it can spread and may damage your files, programs andl apps, and ‘operating system, Read Tech Feature 4-3 to learn more about viruses and other malware. @ recn rearune 3 Viruses and Malware standard feature of many productty applications, suchas word procesing and spreadsheet apps. A Viruses do not generate by chance. The programmer of boot sector virus targets the computer's start-up a virus known as a ius author intentionally wites a_i. fle vu attaches sll to program fies The ‘rus program. Writing a vitus program usualy eaures ext ime an infected program or app is un, the Significant programming sis. The ius author ensures us executes and infects the computer or device. the vius can replicate sel, concea ise, monitor for certain evens, and then delver its payload payloads the destructive event or prank the virus delivers. Viruses infect all types of camputers and devices. Nes canine al pol corms andes Mes! ie plac is acy age 5 execution: infection and delivery beetle : The fist step inthe infection phase is activation of 3+ Final viuses watch fr a certain contion or event and the vis. The most common way vses sored i by ‘act when that condition or event ocurs. The event 2. Viruses conceal themselves to avoid detection. stealth virus disguises itself ty hiding in fake code sections, which it inserts within working code in a users running infected programs or apps. ting the might be tating the computer or device, or reaching a infection phase, uses typcly perform ane or more of st onthe stem deck. lage bomb activates when i klein achors it detec a speeccoetion fy, a nae deleted om the employees). time bomb logic bomb hat 1. Fist ius replicates by attaching self to program —_achates ona partialar date orm he triggering fle. macro virus hides in’a macro, which is 2 condition doesnot est, the vis simply replicates, During the delivery phase, the vies unleashes its load wich might be a harmless prank that displays {2 meaningless message — or it might be destructive, croupting or deleting data and fles The most dangerous viruses do not have an abvious payload Instead, they qu etly moi files. One way artivius software detects com Pete viuses is by monitoring fs for urknown changes In adaition to viruses, other malware includes worms, trojan horse programs, and rootkits, * A worm resides in active memory and replicates itself over a network to infect computers and devices, using up system resources and possibly shutting down the system, orse’s a destructive program disguised as a real program, suchas a screen saver When a user ‘uns a seemingly innocent program, a trojan horse hiding inside can capture infermation, such as user ames and passwords, from your computer or enable someone to contro your computer remotely. Unlike ‘Vises, trojan horses donot replicate themselves, * An unusual message or image is displayed on the ‘computer screen, * An unusual sound or music plays randomly * The avalable memory is less than what should be avaiable + program or fle suddenly is missing, or an unknown program or file mysteriously appears ‘The computer's security toos, such as antivirus soffware or firewall, become disabled, Productivity, Graphics, Security, and Other Tools * A rootkitis a program that easily can hide {and allow someone to take full contol of your computer from a remote location, often for nefarious purposes. For example, aroctkit can hide in a folder on your computer. The folder ‘appears empty because the rootkit has instructed your computer not to display the contents of the folder. Rootkits can be very dangeraus and often requite special software to detect and remove. Studies show that malware can infect an unprotected computer within minutes after connecting to the Incernet. Due tothe increasing threat of viruses at ing your computer, itis more important than ever to protect your computer fiom viruses and other malware Secure IT 1-2 in Module 1 ists steps you can fallow protec your computer from a vius infection, Consider This: If your computer or mobile device I infected with a vius or malware, how will you know? How will ou find instructions for removing a vias? jgns of Virus and Malware Infection ‘+ The size ofa file changes without explanation. A ile becomes corrupted ‘© A program will not run. * The computer operates much slower than usual * Your bronser displays pop-ups that you cannot close or webpages you did not request when you ate online ee Antivirus Programs To protect a computer or mobile device from virus attacks, users should install an antivirus program and keep it updated by purchasing revisions or upgrades to the software. An antivirus program protects 4 computer against viruses by identifying and removing any computer viruses found jnmemory, on storage media, or on incom- ing files (igure 4-25). Antivirus programs sean for programs that attempt to molify computer’ start-up files, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically sean files downloaded from the web, email actachments, opened files, and all types of removable media inserted in the computer or mobile device ure 4-25, An antivirus program scans memory, mecia, and incoming email messages and attachments for viruses and attempts ta remo 25 it finds, EECEEs Programs and Apps Detection Programs ‘You should run only ‘one antivirus program. ‘on your computer or mobile device; however, you can run more than tone malware detection puter or mobile device unt fan antivirus program identifies an infected file, itartempts to remove the malware, Ifthe antivirus program cannot remove the infection, it often quarantines the isa separate area of a hard drive that holds the infected file until the infection ean be removed. This step ensures other files will not become infected. Quarantined files remain on your com- you delete them or restore them. Most antivirus programs also include protection against other malware, such as worms, trojan, horses, and spyware. When you purchase a new computer, itmay include a tial version of antivirus software, Many email servers also have antivirus programs installed to check incoming and outgo: ing email messages for viruses and other malware. Read Secure IT’ 4-4 for tips about recognizing ected file. A quasntine progam wits hoses, @ secure ins Recogiing Virus Hoaxes Computer hoaxes spread across the Intemet in record time and often are the source of urban legends These hoaxes take several forms and often disappear fr months or years ata tine, only to resurface some time lat Most alaming to some users are the com: puter vinushoaxes that war a computers infected and needs immecate attention, Same seconds The wamigs ct prominent compa- es, such s Microsoft and ntl Secu. These messages claim to offer a solution to the prob fem generally requesting @ fee fora program to download, Sropescom compiles these aes and describes ther sources ard histories. In teal, these foke messages are gener ated by unscrupulous scammers preying upon aulible people who panic and follow the Ifyou receve one ofthese virus hoaxes, never respond tothe message Instead, delete ‘it. Most importantly, never forward it to an Lnsuspecting fiend ox coworker. If you receive the virus hoax fom someone you know, send him or her a separate eral message with Information about the hoax. ® Consider This: Have you ever ecelved a viru hoax? If so, what action did you take? ‘naming tate the problem sso severe that ection inthe message. These users divulge the computer or device will explode or thatthe tet card information and then often down : entehard dive wil be easedin amatterof ‘ad fils raed wit viruses. i c ‘ 1 @ consiper THis 3 How do antivirus programs detect viruses? Many antivirus programs identify viruses by looking fr vius signatures. wus signature, also called avis definition, is 2 known specific pattem of virus code. Computer users should update their antivirus program's i signature files regulary Ths extremely important activity allows the antivius program to protect against viruses q ait since the antivirus program was released andlor is last update, Most antivirus pragrams contain an ‘automatic update feature or regularly prompts users to download the updated virus signatures, usually a least once In a vee. The vendor usuly proves ths eet registered uses at no cast for a specified tne a or ‘Spyware, Adware, and Other Malware Removers Se Sprsereis a type of program placed on a computer or mobile device without the wer’ knowledge ; that secretly collects information about the user and then communicate the information i collects vol to some outside source while the user is online. Some vendors or employers use spyware to collect Be: information about program usage or employees. Intemet advertising firms often collect informa- tion about users’ browsing habits. Spyware can enter your computer when you install a new pro- Wet gram, through a graphic on webpage or in an email message, or through malware. ther Adar a type of program that displays an online advertisement in a banner or pop-up or pha pop-under window on webpages, email messages, or other Internet services. Sometimes, Intemet ita advertising firms hide spyware in adware. A spyware remover is a type of program that detects and deletes spyware and similar programs. An adware remover is a program that detects and deletes adware. Malware removers detect and delete spyware, adware, and other malware. Read Secure ITT 4-5 for measures you can take to protect your mobile device from malware, Productivity, Graphics, Security, and Other Tools @ consiven ais eestor oat) A cookie is a small text file that a web server may place on your computer or mobile device when you view a Pe esc eee ere eater ee eer eee Ce Sy air ra TENET a ee a ttt Cotes oped ele ho pt a 020 ap Met ens ee men att Fr sete epee eee ate dee cme ear attempt to conceal the cookies. @ secure iras Malware Risks to Mobile Devices Practcaly every statphone is vunerable ta hacking attacks. Threats to smartphones and mobile deices are crowing in record numbers Aue tothe rising popularity ofthese products and the valty of marketplace sources for douioaing apps. ‘ne ofthe biggest concerns about mobile apps that they might contain malware that enables your device to *spy" on you, When you download an app, you ao may give the pp permission to access some ofthe capabil ites or content ofa smartphone, such asthe camera current location, calenday, contacts ot call history. One case was reported where malware enabled a flashlight app to access a device's camera. ihen the user accessed a banking app to scan a check for deposit, the flashlight app sent a photo ofthe check to.a remote server Asa result, personal bank account information was transmitted without the users knowledge. Other apps have been reported to contain aware that tured on a microphone without users knowing, thereby enabling others to remotely listenin on conversations. Smartphone users can take several precau tions to guard against malvare threats. They include: ‘+ Read reviews of apps and the companies that creat them before downloading the apps to your mobile device + Use mabile mere and ants rotecion. Grant apps access to only the data or hone capabilities need to run ‘+ Tutn off or deete apps that you donot use regulaty ‘= Keep the operating stern and apps up to date, ‘Enable the screen lock feature, and sea strong password to unlock the device + Reset the mobile device to factory settings before sling o trading it in ® Consider This: Which ofthese idelines do you follow now when using your smartphone or mobile device? How will you modify your usage aftet reading these tps? Internet Filters Filters are programs that remove or block certain items from being displayed. Four widely used progi Incemnet filters are anti-spam programs, web filters, phishing filers, andl pop-up and pop-under blockers Anti-Spam Programs Spam is an unsolicited email message or posting sent to many recipients or forums at once. Spam is considered Internet junk mail ‘The content of spam ranges from sell- ing a product or service, to promoting a business opportunity, to advertising offensive material. Spam also may contain links or atachments that contain malware. An anti-spam program is filtering program that attempts to remove spam before it reaches your inbox or forum. IF your email program does not filter spam, many anti-spam programs are available at no cost on the web. ISPs often fiter spam asa service for their subseribers, Web Filters Web filtering software is a program that restricts access to certain material on the web. Sonne restrict access to specific websites; others filer websites that use certain words or phrases. Many businesses use web filtering software to limit employees’ web access, Some schools, libraries, and parents use this software to restrict access to websites that are not educational ret | | IF TrustedBank”™ er vaues customer of TrustenBark | DET Programs and Apps \We have recieved noice tat you have receny tempted to winaraw the faoweng arcunt rom yur checking accoure whle In snatner uray $135.26 tras inormatcn snot cores, smeare unknown may nave acess to your Sceount Asa satel meseue, peare tour mebate slate Ikea to vey Your personal ar aE linker iesoges iden musteanank combensraicustentvern 260 g—— | ‘once you have cere ths, cur raus depart wil work re tinerepeney We sre aagy you nave chosen Use do business Wh ‘Taneyeu, ‘Trusses Figure 4-26 An example of a phishing eral message isa filtering program that stops pop-up or pop-under ads from displ browsers include these blockers. You also can download pop web at no cost 1g Filters Phishing isa scam in which a perpetrator sends an offcal-looking email mes- sage that attempts t0 obtain your personal and/ formation (Figure 4-26). Some or financi phishing messages ask you to reply with your information; others direct you to a phony website (oF @ pop-up oF pop-under window that looks like a legitimate website, which then collects your information, A phishing filter isa program that warns or blocks you from potentially fraudulent or suspicious websites. Some browsers include phishing filters. Pop-Up and Pop-Under Blockers A pup-up ad is advertisement that suddenly appears dow on top of a webpage. Similarly, an Inters a pop-under ad is an Internet advet hidden behind the browser window so that it will be viewed when users close their browser win- dows. A pop-up blocker or pop-under blocker ng on webpages, Many up and pop-under blockers from the File, Disk, and System Management Tools ‘To perform maintenance-type tasks related to managing a computer, its devices, or its programs, you can use one or more file, disk, and system management tools. Functions pro- vided by these tools include the following: stalling softwar files, maintaining a personal computer, and backing up files and disks. Although some of # nanaging files, searching, viewing images, unin cleaning up disks, defragmenting disks, setting up screen savers, compressing tools are inched with the operating system, you also ean purchase stand-alone programs that ents or added functionality offer improv Figure 4-27 witha fle manager, you can view folders and different types of files containing documents, photos, and music. n this case, thumonals of photos are displayed. File Manager A file manager is a tool that performs functions related to file management. the file management functions thac a file man ager performs are displaying a lst of files ona storage meclium (Figure 4-27); organizing files in folders; and copying, renaming, deleting, moving, and sorting files. A folder isa specific ‘named location on a storage medium that contains related files. Most operating systems typically include a file manager. sme of 1 Search A search tool isa program, usually included with an operating system, that attempts to locate a file, contact, calendar event, app or any other item stored on your computer or mobile Productivity, Graphics, Security, and Other Tools device based on criteria you specify (Figure 4-28), Search tools can look through documents, photos, music, calendars, contacts, and other items on your computer or mobile device and/or on the Internet, combining search results in a single location. Search tools typically use an incex to assist with locating items quickly. An index stores 2 vatiety of information about a file, inckuding its name, date created, date | dears macina Bb ee] ‘esl fom apps |_secuments othe web 1 watered matches fom your eomputer instead of looking through every file and folder on the storage Tracie i eens eoguaisie mice may moe match, Each entry in the index contains a link to the actual file on i DR sctgctredit Greasy rcciral ae Pace eb Sree flo dens | nag sch citeon | Image Viewer ‘An image viewer i a tool that allows users to display, copy, and prine the contents ofa graphics file, such asa photo (Figure 4-29), With an image viewer, users can see images withouc having to open them in a paint or image editing program. Many image viewers include some photo editing capa Iilities. Most operating systems include an image viewer. Figure 4-28 Scarch tools locate apes, folders, fle, settings, and Uninstaller ee ee ‘An uninstaller is a tool that removes a program, as well as any associated entries in the system files. When you install a program, the operating system records the information it uses to run the software in the system files. The uninstaller deletes files and folders from the hard drive, as well as removes program entries from the system files, Read How ‘To 4-3 for instructions Figure4-29 An image viewer allows users to see the cts ton te about uninstalling programs and removing See apps from your computers and mobile devices. @ sowross Uninstall a Program or Remove an App Mac Android Uninstaling unwanted programs and apps 1. Open the Finder 1. Display the Settings menu wilsave storage space on your computer ot 2, Clid Applications inthe let pane 2. Locate the Application manager to display ”vble device and maximize is performance, 3, cate the app you wish to unital a Ist of stale applications Me olonng steps descrbe how to urinal 4 555 heap’ can the Wah, SRC iaeaneien is aca A progiam or remove an app. 4, Tap the Uninstall button Windows oe 5, Tap te Ok button, Bette convo Pai 1. Press and hold the icon forthe app you wish o delete unt the ap icon begin to 2, ick the option to uninstall a program. animate. is: For ft 3, Click to select the program to unital el oereyee ee eae 2. Tapthe Xon the on forth app you wish to you uninstall an app fom your computer or ee rede athens ks pony dee mobile device? prompt on he sre, Q consiver THis Canyou use a file manager to delete a program? Han nnstalerexsis and you emove software fram a computer by deleting the es and folders associated wih theqroxram vthout runing the urinstall the system fle eis might not be updated. Ths may cause the ing system to cisplay error messages when you start the computer. COC MMMEUSTIGES Programs and Apps Disk Cleanup ‘disk cleanup tool searches for and removes BiSercneaeermancteweyaraie | unnecessary files on computers and mobile devices. Unnecessary files may include down- ens] |) loaded program fle, emporary Internet fanre Sunray — |) files, deleted files, and unused program files. Operating systems usually include a disk cleanup tool. Disk cleanup tools for mobile devices often locate duplicate files or photos, or large files that a user might want to delete igure 4-30) Disk Defragmenter A disk defragmenter i a tool that organizes the files and unused space on a computer’ hard disk so tha the operating system accesses data ‘more quickly and programs run faster. When an operating system stores data on a harddisk, ieplaces the daca in the firstavailble sector (@ storage location on a disk in the shape of an re4-30 Ads cleanus tool searches for and removes unnecessary files on a1). The operating system attempts to place a computer o mobile device. data in seevors that are contiguous (next to each other) but this is not always possible. When the contents of file are seattered across two or more fagnered 1 dk ep Aeogerg noncontiguous sectors, the file is fragmented Fragmentation slows down file access and, thus, the performance of the entire computer. Defragmenting the hard disk, or reorganizing it s0 that the files are stored in contiguous sectors, solves this problem (Figure 4-31). Operating systems usually include a disk defragmenter You do not need to defragment an SSD (olid-state drive). Solid-state drives use a dif ferent process to optimize performance. When you delete a file from an SSD, most operating systems mark the locations where it was stored as “ot in use” and erase the content so that those locations can be overwritten, Figure 4-31 4 fragmented hard isk has mary files stored in noncontiguous sectors. Defragmenting reorganize the files so that they are located in Screen Saver contiguous sector, which speeds access time A screen saver is a tool that causes a display device’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. When you press a key on the keyboard, tap the screen, or move the mouse, the screen saver disappears and the screen returns to the previous state. File Compression file compression tool shrinks the size of file). A compressed file takes up less storage space than the original ile You may need to compress file so that it will fit on a smaller storage medium, such asa USB flash drive. When you selece multiple files or folders to include in a compressed file, the file compression tool will group all of them into one compressed file, Sending a compressed file asan attachment to an email message is often preferable to attaching several files individually ‘Compressed files sometimes are called zipped files. When you receive or download a compressed file, you must uncompress it. To uncompress (or unzip or expand) a file, you restore Productivity, Graphics, Security, and Other Tools the file(s) or folder(s) it cont compression and uncompress ns to their original form. Most operating systems include file on capabilities, PC Maintenance APC maintenance tool is a program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer’ performance. Additionally, some personal computer maintenance utilities continuously monitor a computer while you use it to identify and repair problems before they occur. Backup and Restore backup tool allows users to copy, or back up, selected files oF the contents of an entire storage medium to another storage location, such as another hard drive, optical dise, USB flash drive, or the cloud. Many backup programs compress files during the backup process so they require less storage space than the original fies. Because they are compressed, you usually cannot use backup files in their backed up form. In the event you need to use a backup file, a restore tool reverses the process and returns backed up files to their original form. Backup tools work with a restore tool. You should back up files and storage devices regularly in the event your originals are lost, damaged, or destroyed. @ consiver tas, What is the difference between a cloud backup service and a cloud storage service? ‘The major diference is that cloud backup services automaticly back up all user les, serves, applications, and settings to the cloud in case of hard ve failure ox some other disaster. Users specify the locations a les anc foes to back up and may schedule whether to back up les continuously or at scheduled times. files usualy are compressed and transferred securely to the cloud, and prior versions are retained in case they need tobe recovered. Users can access copes of the saved fils from their computer or mobile device. Cloud storage services, onthe other hand, do not automatically backup all files. They make some files available to access across many devices, and users are able to share them with others. Users typically spect one folder on theirhatd drive fora cloud storage service o sve onthe cloud changes to the contents of that folder then wil be saved on te cloud and replicated to other devices. Many cloud storage senices retain only the most recent version of ale, overwniting ary previous versions Consumers often take advantage of cloud storage as an easy wayto back up their documents, music, videos, photos, anc other persona es, wile enterrise and professional users with mre demanding requirements vl employ cloud backup sevice to back up al of the fle on their computers Power Management Apower management tool monitors a laptop or mobile device’ battery usage, showing apps that consume the most battery power, displaying battery usage data since the deviee was hast charged, and estimating usage time remaining. Power management apps can enable power saving mode automatically when a device's battery runs low so that the battery will last longer until charged. Typically, devices in power saving mode operate without Internet connect diminish display brightness to save remaining battery power. summary ‘This module presented a variety of programs and apps available for computers and mobile devices. You learned about the role of the operating system and the various ways software is dis- tributed and created. The module presented the features ofa variety of productivity applications, graphics and media applications, and personal interest applications. It reviewed several commu~ nications applications and then presented features of a variety of security tools and file, disk, and system management tools, = My COC MMECTIEES Programs and Apps Study Guide Testy Guide rifores mates you shoetd know ferreting ts ‘module. Instructions: Answer the questions below using the format that helps you remember best o that required by your instructor Possible formats ray include ane or more of these options: write the ansmers; create a document that contains the answers; record answers as audio or vdeo Using ‘2 webcam, smartphone, or parable mediaplayer: post answers on a blog, wiki or website; or highlight answers in Uist categories of programs and apps. __ i another word for progrem 2, Define these terms: operating system, tools, and system software 3. List examples of desktop and mobile operating systems. 4, Describe how an operating system interacts with the computer. software performs functions speci toa business or industry. Differentiate among mobile apps, native apps, cloud apps, and web apps. 7. ist any restrictions for shareware, freeware, open source, and publidomain softwar. 8, Explain corsideratons for safely downloacing software and apps: 9, Describe steps to register and actvate software 1D, Explain the purpose ofa license asreement. 11. List types of productivity applications. 12. Desetbe the actives that occur during project development. 13, Differentiate among font, font size, and font style, 4, Explain the impact of the Internet on plagiarism 15, Applications often include a(n) __gallery, which is @ collection of clipart and photos. 16. Identify functions of the following software: word processing, presentation, spreadsheet, database, note taking, text editor, Calendar and contact management, text editor, software suite, project management, accounting, personal finance, legal, tax preparation, document conversion and readers, and enterprise computing 17. Identity tools word processing programs provide that can assist youwhen writing 18, Define the folowing terms: werksheet and function. 19, Describe when you should use a database and when to use 2 spreadsheat 20- List advantages of using a software suit. Identify ways you can manage a project using project ‘management software. 22_ist safety considerations when using personal finance apps. 23, Name the types of software used by various functional unis in an enterprise 24, entiy functions ofthe fllawing apps: calendar and emai, ‘vavel, financial, reference, reall, scanning, and online social networks booke-book, 25, Identify sks when using payment apps. 26, Identify functions of the folowing software: computer-aided design, desktop publishing, painvimage editing, photo ecit ing and photo management, video and audio editing, mult media and website authoring, media player, and augmented ‘and virtua reality. 27, Ust ways to edit digital photos. entity issues surounding| altered digital photos. 28, ___ authoring software allows users to combine tet ‘graphics, audio, video, and animation in an interactive application. 29, Define these terms CBT, WET, and MOOC. 30. List types of personal interest apolications 31, Describe ways fo use voice command personal assistant apps. 22. Kentify functions of the folowing apps: media sharing, streaming audio and video; gaming; news, sports, and ‘weather; mapping; heath and fitness; and academic 33, ldentify types of communications applications. 34, Ust issues surrounding an email provider scanning users’ email messages. identify functions of the folowing tools: personal firewalls, hardware Frewals, antivirus programs, malware removers, and Internet fiers 36. Describe ways a vius infects programs or apps. 37. Ust types of malware Identify signs of 2 vis infection. Explain the risks of and how to avoid computer virus hoaxes. Avirus__ isa known specific pattern of virus coe Differentiate between spyware and adware. Idantty ways to avoid malware when using a mobile device List and describe five types of Internet fiters 42. Identity functions of the following tools: file manager, search, image vewer, uninstaller, olsk cleanup, disk defragment, screen save, file compression, PC maintenance, backup and restore, and power management tools 43, Define the terms, folder and index. 4, Uist steps to uninstall a program or remove an ap. 45, Dest the disk defragmentation process. 46, Compressed files sometimes ae called __ ies. 47. List storage media for backups. You should be able to define the Primary Terms and be familiar with the Secondary Terms listed below, Primary Terms shown in bold-blaek characters in the module) accounting software (4-16) adware remover (4-34) anti-spam program (4-35) antivirus program (4-33) app 4-2) application (4-2) augmented reality app (427) audio editing software (4-26) backup tool (4-39) calendar and contact ‘management software @-14) clip arviimage gallery (4-10) computer-aided design (4-22) database (4-13) database software (4-13) desktop publishing software (4-23) Secondary Terms. so dare (4-34) eppicasion sere 2) entomatcupdae 6-9) rights (4-25) slpdoard 4-8) ld app (4-8) compres (25) compte bared runing (CBD), 20 comet 4-25) cookie (6-39) crate 4-8) mp (425) em sfrsare (4) detaop app (4-4) die 4-8) ‘fing 19) EULA G8) fons 4-9) fou size 9) four sle 9) format (4-9) Ficotre 5). fiostion 13) ard py (4-9) Productivity, Graphics, Security, and Other Tools disk cleanup (4-38) disk defragmenter (4-38) document conversion software (4-19) file compression tool (4-38) file manager (4-36) folder (4-36) image editing software 4-24) image viewer (4-37) legal software (4-18) ‘media player (4-27) ‘multimedia authoring software (4-26) note taking software (4-14) paint software (4-23) PC maintenance tool (4-39) PDF (4-19) personal finance software 17) 1 alc characters in the module 32) ngsofroure bardoorefrczall dame design/tndin 29 ilasratonsfsare (4-23) inde 4-32) iene agremene (4-6) markeplce (4-9) masive spon online corse (MOC) 20 oli app 8) mobile web app 6-4) ative apn 8) se scree ofroure 4-3) operating stem (4-2) payed (32) Pounder 0d 30) Prp-ip ad (4-36) prime 3-9) produ asization 4-6) proinscty applications 4-8) pablicdomain sare (4-5) quarantine (8-34) redaye 4-25) size (6-25) ti sftsare (4-8) personal firewall (4-32) phishing (4-36) phishing filter (4-36) photo editing software (4-24) photo management software (4-24) pop-under blocker (4-36) pop-up blocker (4-36) power management tool 4-39) presentation software (4-11) program (4-2) project management software (4-15) QR code (4-21) restore tool (4-39) screen saver (4-38) search tool (4-36) software (4-2) roatie (4-33) save (4-9) security eit (4-32) sanesere 4-5) sharpness 23) Aide stow 11) nfo asa erie SaaS) 43) onfsarereieation 6) spncere 4-34) tem ore (4-2) ire ee Key Terms software suite (4-15) spam (4-35) spreadsheet software (12) spyware remover (4-34) tax preparation software (19 ‘uncompress (4-38) uninstaller (4-37) video editing software 4-26) virtual reality app (4-28) virus (4-32) web filtering software (4-35) website authoring software (4-26) word processing software 4-10) worksheet (4-12) Zipped files (4-38) A H a Ey veal 4-2) srl wervon (4-4) rain bors (33) ilies 4-2) rns signatne (4-34) ch apn (4-9) ‘ach based tnning VED) ¢ sor (4-33) liana iB SiS COMME Programs and Apps Checkpoint te toint excises tert your knowledge of the mode concepts True/False — Mark I for True and F for Fase. I False, rewrite the statement so that itis True. 1, Application software serves as the interface between the user, the apps, and the computer's o mobile device’ hardware. 2. Enterprise and professional users employ cloud storage services to back up all of their files in case of disaster. 3. Open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users & 2 = By ‘When downloading shareware, freeware, or public-domain software, itis good practice to seck websites with ratings for and reviews of products. Because they run in a browser, you always access the latest version of web apps. ‘With database software, users run functions to retrieve data 5 6. 7 Software suites offer three major advantages: lower cost, ease of use, and integration, 8. A PDP file can be viewed and printed without the software that created the original document. 9, Augmented reality apps require the use ofa pi cial viewer device to display 360-degree images or videos —— 10. Many routers also can function as a hardware firewall _—— 11. A power management app will turn off Internet connectivity when your battery runs low. 12. Cookies typically are considered a type of spyware. Matching Watch the toms with their definitions. augmented reality a. destructive event or prank a virus was created to deliver CBr }. copyrighted software that is distributed at no cost fora trial period payload . type of mobile application that overlays media or other digital content over an personal firewall image on the screen rere 4. program that enables you to perform maintenance-type tasks usually related to ee ‘managing devices, media, and programs used by computers and mobile devices eatin €. computing environment where an Intemet server hosts and deploys applications £. security tool that detects and protects a personal computer and its data from pects unauthorized intrusions ). software as a service {& type of education in which students learn by using and completing exercises with instructional software —— 10. tools h, seam in which a perpetrator sends an official looking email message that attempts +o obtain personal and/or financial information i. square-shaped graphic that represents a web address or other information j. separate area of a hard drive that holds an infected file until the infection can be removed Productivity, Graphics, Security, and Other Tools LEM EY Mr Ey The Problem Solving exercises extend your knowledge of module concept by seeking i salient practical pblns vith tedelogy tet younsyencaunterathome sovol won, PF ODlem Solving & or wth nonprofit organizations The Cllaoration exercise shouldbe completed with a team Instructions: You often can sole problems wth technolgy in mtple ays. Determine a solution tothe problems in these exercises by using ‘one or more resources available to you (suchas @ computer or mobile device, articles on the web or in pint, lags, podcasts, videos, television, user guides, othe individuals, electronics or compute stores, et.) Describe your solution, along withthe rscurce(s used, in the format requested by your instructor (ve report, presentation, discussion blog post, video, ox other mean) Personal with your device. Why might the app be incompatible 1. Antivirus Program Not Updating You are attempting, a er to update your antivirus program with the latest virus Profess definitions, but you receive an error message, What steps will you take to resolve this issue? nal 6. Videoconference Freezes While conducting 2 videoconference with colleagues around the country, 2. Operating System Does Not Load Fach ime youtum the audio sporadically cuts out anc the video freezes, (on your computer the operating system atemptstoload for You have attempeed several ines to terminate and approximately 30 seconds and then the computer estar. then reestablish the connection, but the same problem You have wied molipe times totum your computer off continues to oceur. What might be the problem and on, butitkeaps restarting when the operating sytem is : peanuts 7. License Agreement You are planning to work fm ying to load. What are your nett steps! home for several days, but you are unsure of whether 3. Unwanted Programs When you displayed alse youare allowed to instal a program you use at work ‘of programs installed on your computer so that you €on your home computer, What steps wil you take could uninstall one, 10 determine whether you ar allowed tonsa the younotced several software on your home computer? me oeeciersramem || installed programs that 8. Low on Space ‘The computer in your office is running low on fie space. You have attempted to remove as ‘many files as possible, but the remaining programs and files are necessary to perform your daly job functions ‘What steps might you take to free enough space on the 4. News Not Updating Each morning, you run an app coined ‘on your smartphone to view the news for the current day: For the past week, however, you notice that the news displayed in the app is out of date. In fact, the app now is displaying news that is nearly one week old Why might the app not be updating? What are your next steps? you do not remember installing. Why might these programs be on ‘your compute 9. Unacceptable File Size Your boss has asked! you to design a new company logo using a graphics application installed on yout computer. When you save the logo and send! it to your boss, she responds that the file size is too large and tells you to find a way to decrease the fle size What might you do to make the image file size smaller? 10. Document Reader Software Cannot Open a PDF File Your boss sent you a PDF file fora brochure that che art department created. Your document reader software cannot open the file. What might be wrong? 5. Incompatible App You are using your Android tablet to browse for apps in the Google Play store. You found an app you want to download, but you are unable to download it because a message states it is incompatible Collaboration 11. Technology in Video Production ‘The admissions office ata local college is considering ereating a promotional video and has asked for your help. The director of admissions woul like to incorporate technology wherever possible, in hopes that ie would decrease the cost of the video's production. Form a team of three people to determine what technology «can be used to asit in producing the video. One team member should research the type of technology that can be used to record the video. Another team member should research software options available for video editing and the types computers or mobile devices necessary to run those applications, and the third team member should research the alkematives for publishing and distributing the video online. EB i E POC MEMTTIEES Programs and Apps : The How To: Your Tarn exercss present general guideline for fundementa kil when @& How To: Your Turn tgs camputet orate devce and then ere tat yo deterne how tsp these general guidelines toa spect rogram or stuation, Instructions: You often can complete tasks using technology in multiple ways. Figue out how to perform the tasks described in these evercses by using oreo mar resources avaiable to you (suchas a computer or mobile device aces onthe web on rit one or rogram hp, user uid, blogs, padeass, videos other indiguals, val and eva, et). Summarize your ‘how step, alongwith he resources) sen the format requested by your instructor fre reo, presentation escssan, bog post vide, or other means) © Compress/Uncompress Files and Folders You may want to compress files ifyour hard drive is running out of available space. While the operating system may be able to compress some files by 50 per- cent or more, other files’ sizes may not decrease sig- nificantly when they are compressed. Compressed files typically are stored by default in a file with a zip file extension. ’The following steps describe how to com press. file or folder and then uncompress (expand or extract) the compressed file a. Right-click the fle(9) or folders you wish to ‘compress to display a shortcut menu, b, Click the option to compress the files) or folder(). (You may need to select a Send to or other command to display the compression options.) €. TFnecessary, type the desired file name for the compressed file Uncompressing (or expanding) compressed files or folders returns them to their original form. The following steps uncompress a compressed file. a, Double-click the compressed file. b, Tfnecessary, click the option to uncompress (expand or extract) the file a, Right-click the compressed file to display a shortcut b. Click the option to uncompress (expand or extract) the file. Exercises 1, Inadition to the operating system’ built functionality to compress files and folders, what other programs and apps exist that can compress files and folders? 2. Imaddition to trying to free space on your storage device, for what other reasons might you want to compress files and folders? 3. Tiy compressing various types of files on your hard drive, sch as a Word document and an image. Compare the file sizes before and after compression. ‘What did you notice with each type of file? © Back Up Your Computer Backing up your computer is an important way to protect your programs, apps, and data from loss. The frequency at which people back up their computers can vary. For instance, iF you create and modify a lot of files on your computer, you may choose to back up your computer frequently: If you rarely use your ‘computer or primarily use your computer for answer ing email messages and browsing the web, you might not back up your computer as often. ‘The following steps guide you through the process of backing: up a computer. a. Decide which backup program you wish to use Some operating systems have builtin tools you ean use to back up @ computer, or you can installa third party program, b. Run the program you will use to back up the computer; ©. If necessary, connect the storage device, such as an external hard drive, you will use to store the backup. IF you plan to store the backup on an optical disc or another hard drive that already is installed, you will not need to connect an additional storage device. 4d, Make sure the storage medium has enough available space for the backed up files. IF you are storing the backup on optical discs, make sure you have enough ‘optical dises for the backup, ¢, Select the type of backup (full, incremental, differential, or selective) you wish to perform. f. Ifyou are performing a selective backup, choose the files, programs, and apps you wish to include in the backup. Rum the backup. The backup process may take up to several hours, depending on the number of files you are including in the backup, h, Ifyou are storing the backup on optical discs, the backup program may prompt you to insert new, blank optical dises throughout the backup process. i, When the backup is complete, store the backup in a safe location. In the event you lose data or information on the computer, you will n retrieve the backup. j._ Ifyou are backing up on the cloud, select and open an account with a cloud backup service. Identify the files and folders to back up, and the frequency by which to copy them on the cloud. dt. Productivity, Graphics, Security, and Other Tools hoe ae at How To: Your Turn @ €. Select the option to display the calendar’ sharing settings, 4, Specify with whom you want to share the calendar. ¢. Determine your sharing settings for each person, For example, you may select whether a person only can view your calendar or view and edit your calendar. You also can select the level of detail you ‘want to share with others. For example, you can share the times you are free or busy, or you can share the specific details for each appointment. f. Ifnecessary, repeat the two previous steps for each additional person with whom you wish to share the calendar g. Save the settings. h, Verify the people with whom you shared the Exercises calendar are able to access the calendar. 1. How often do you feel you should back up your computer or mobile device? Which storage medium do you feel is most appropriate? Justi Research at least three programs or cloud backup “| i Hy a Exercises 1. For what other reasons might you share your calendar? 2. In addition tothe steps outlined previously in what ; par cee eeate eee ree eee other ways ean you share your calendar online? eee ress Sea i oes ch? Which 3+ In addition to sharing online calendars, st possible tbe Wee to sare calendars you erate in proprams such as 3. How is backing up on the cloud different from backing _-‘Mierosoft Outlook? Ifso, how? up files to your own storage media devices? © Share Your Online Calendar Ifyou keep track of your meetings, appointments, and other obligations using an online calendar, you might wantto share your ealendar with oth- 680 that they know when you are available, For instance, you might wane to share your calendar with fellow employees so that they can veri your availablity before scheduling meetings. Your family members may share their calendars with one another so that er to plan family ‘events when everyone is available. The following steps describe how to share your online calendar a. fnecessary, run a browser and navigate to an online calendar b, Display the ealendar’s settings. COCMMEETTCES Programs and Apps @ Internet Research Instructions: Use presentation, discussion, blog post, ideo, or other meen). @ Making Use of the Web Website Creation and Management Retailers and organizations realize the importance of having a website to promote their goods and services. An online presence helps a business connect with an sudience and ultimately builds trust and respect. Inno~ vative and dynamic websites defiver information to current and potential customers and clients. Creating these websites requires a methodology of planning, designing, creating, hosting, and maintaining. A busi- ness must identify the website's purpose, demographics of the target audience, appropriate content and fune~ tionality, page layout, and usability. Once the website {s implemented, it must be monitored to determine usage. Logs list the mumber of visitors, the browsers they used, and usage patterns. In addition, the website should be maintained to update content and features. Products are available to help build and manage a website. Most offer well-designed templates that ean be customized to accommodate specific personal and business needs. They can include calendars, photos, ideos, maps, and blogs. Some of these design and management tools, such as those offered on Google sites, are available at no cost, while others require fees for specific features, such as technical support or exclu- A 2 a sive designs. teegle oo | | Research This: Visit Google sites and two other online content management systems for building web- sites. Compare these web apps by creating 2 table using these headings: Name, Number of Templates, Price, ‘Maximum Storage, Customer Support, and Features. The Internat Research exercises broaden your understanding of module concepts by requiring that you search for information on the web. rch engine or enather search tool 1o locate the information requested or answers to questions presantad inthe exercises Deseibe your fdings, alongwith the search tems) you used and your web source(s) n the format requested by your instructor bie report, ‘The Features column could include the availability of items such as customizable color schemes, e-com- merce, drag and drop, website logs and analytics, and mobile editing. Which website builder would you choose if you were creating a website? Wh Online Gaming ‘Gaming via social meciia has seen explosive growth in recent years, especially among adult males. Fxpo- nential gaming growth has spawned companion businesses that facilitate and manage the gaming. ‘experience. Some mobile and desktop apps provide {gamers with a portal for tracking all their online {gaming results in a central location that can be shared with friends and others with similar game interests. “These apps integrate with the major Internet mes- saging services, have personalized news feeds, and incorporate a “suggestion” engine for new game discoveries. Many gaming blogs offer game tricks, work-arounds, and hidden features. Beginning gamers ‘ean engage their minds during downtime and expand their circle of online friends Research This: Visit atleast two online social net~ works for gamers. How many games are shown? ‘Which topics are featured in community discussions and live chats? Are rewards available? If so, what are they? Which online leagues and tournaments are offered? What are some of the latest news a about specific games and the gaming industr you participated in gaming online social networks? If ‘0, which ones? Search Skills Narrowing Your Search Results One strategy for narrowing search results isto specify ‘what you are or are not looking for as part of your search text. Precede words with a plus sign (+) iFyou want to ensure that they appear in your search results, and precede a word with a minus sign (-) Fyou want to exclude that word from search results. For example, xing the phrase, windows +microsof, will information about the operating systems phrase, windows -mierosoft, also will find about windows that are made of gla. Productivity, Graphics, Security, and Other Tools SADE RCMmMm EE Include the keyword, and, between words or phrases in search text if you want search results to include both words or phrases, or the keyword, or, ifsearch results, containing either word or phrase are acceptable. Group terms with parentheses to clarify search text. For exam~ ple, type the phrase, iPhone and Google, to search for articles about smartphones and Google. Type the phrase, (phone or laptop) and Googie, (including the parentheses), to search for information about phones ‘or laptops that also mention Google, ee | Google ror tenn) ert Gos | | ae a ct wih Hangouts - Computes Hangouts He - Google Hep Research This: Create search text using the techniques described above or in previous Search. Skills exercises, and type it ina search engine to answer these questions. () What is an open source FTP application that has versions for both Windows and Mac? (2) Other than Turbo'Tax, what are two ‘examples of online tax preparation software? (3) Find reviews comparing Edge, Chrome, Safari, and Firefox browsers. (4) What are the more popular calendar ‘management and task management apps on the Apple App Store or Google Play? © security Virus Hoaxes Virus hoaxes are widespread and sometimes cause panic among Internet users. Secure I''4-4 in this module gives advice on recognizing and avoiding virus hoaxes. Snopes.com provides further insight on the Internet Research @ sources and variations of a wide variety of rumors, deceptions, and folklore. Research This: Visit snopes.com and type the search. text phrase, virus hoaxes & realities, in the Search box at the top of the page. Review the lis of the more recent real (indicated by 2 green dot) and false (indi- cated by a red dot) rumors circulating on the Internet. Which are the three newest actual warnings, and which are the three latest virus hoaxes? What harm is pre- dicted to occur if a user downloads each of these real or fle viruses or views a website laden with mal- ware? Whats the origin ofthe website nan Snopes? | © cloud services | Photo Editing (SaaS) Online photo editing apps provide browser-based | capabilities ro modify digital images and often | contain many similar features as their desktop erpartsThey are an example of SaaS (oftware asa service), a service of cloud com- poting chat provides acces to software solutions accessed through a browser: In addition to draw- ing shapes, touching up colors and adding filters to images, online photo editing apps allow users to access, store, and share their photos on the cloud. Online photo editing apps often include the capability to share photos with friends easily by sending a link, or posting the photo to online social networks Research This: (1) Use a search engine to research various onfine photo editing apps. Compare the fea- tures of two of them as you explore their capabilities Summarize your findings in a table, regarding image formats you can import or save, sharing capabilities, special editing features, and ways to organize photos one. Which features take advantage of the fat that the app is cloud based? (2) If you have access to com- puters running two different operating systems, such 4s Windows and Mac, try running the photo editing app in a browser on both computers. What similar ities and differences do you notice between the tro A 3 CEE MMMCTTICES Programs and Apps The Critical Thinking exercises challenge your assessment and decision-making skis by presenting real-world situations associated with module concepts. The Collaboration ‘exercise should be completed with a team. @ Critical Thinking Instructions: Evaluate the sivaions below, using personal experiences and one or more resources aalable to you (suchas articles onthe web or In prin, blogs, podcasts videos television, user guides othe indicus electronics or computer stores, et), Perform the tasks requested in each ‘veri and share your deliverables in the format requested by your instructor ori report, presentation, discussion, blog post, vden, or ots means) 1. File, Disk, and System Management Tools Youare the director of information technology at a ‘company that frequently hires student interns. The interns tend to have limited experience with using fle, disk, and system management tools, As part of your job, you lead workshops that teach the interns the many’ tasks and funetions they can perform using these tools Do This: Choose three categories of tools, such as disk cleanup, PC maintenance, file compression, clouel storage and backup. Use the web to research popular tools or apps for each category, if they are available as part of an operating system, and the costs for each, Choose one program from each category, and read user reviews and articles by industry experts, Describe situa- A Hy 8 tions where you would use each type of tool. Share any experiences you have with using the tools. 2. Web and Mobile App Comparison You recently purchased a new smartphone and want to research mobile apps that also have accompanying web apps. Do This: Choose three categories of apps, and find an example for each that has both a free web and mobile version. Read user reviews of each app, and search for articles by industry experts. Research any known safety risks for the apps. Ifyou determine the app i safe, have access to the appropriate device, and would like to test the mobile app, you can download it to a smartphone. ‘or other mobile device. Try accessing the web app on a computer. Using your experience or research, note Collaboration 4. Augmented and Virtual Reality Interior Design “The manag the differences in functionality between the web and. mobile app. Is one or the other easier to use? Why or why not? |. Case Study Family-Owned Coffee Shop You are the new man- Cao eee ore une Se east eT canna seer ee ee ered ‘You prepare a report to present to the owners about fee CSTR at nee cemeteries rs cessing, spreadshect, presentation, and accounting soft- ‘ware, Choose three programs from each category. List ere eee ac alee eater sterner iy ea (oh are Seer area iy DEST ae arene sign for the coffee anes ‘) Identify possible eras shop may have for ceeties and accounting + of a home furnishin, Iusiness is researching: ways ‘to use augmented or virtual realty apps to provide an enhanced customer experience at home, on their website, and in the store. member team and research the use of augmented or virtual realty apps. Each member of your team should choose a different type of app, such as taking panoramic photos, using virtual reality tools for inte rior design, and enhancing photos or maps with additional information. List ways that a home furnishings or interior 1s might use each type of app as part of their business, inthe store, in a mobile app, or on their website. If possible, download or access a free version of an augmented or virtual reality app from each category and spend some time using it. Read user reviews of popular apps, and search for articles by industry experts. Meet with your group to discuss your findings, and prepare a report and demonstration showing how a home furnishings business might make use of these apps.

You might also like