Evans Technology in Action 8th Edition
Evans Technology in Action 8th Edition
Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook
appear in the Rear Matter of this book.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries.
Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or
endorsed by or affiliated with the Microsoft Corporation.
Copyright © 2012, 2011, 2010, 2009, 2008 Pearson Education, Inc., publishing as Prentice Hall. All rights reserved.
Manufactured in the United States of America. This publication is protected by Copyright, and permission should be
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in
any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to
use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, 1
Lake Street, Upper Saddle River, New Jersey, 07458.
Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks.
Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations
have been printed in initial caps or all caps.
10 9 8 7 6 5 4 3 2
Technology
in Action 8th Edition
Prentice Hall
This page intentionally left blank
eighth
EDITION
EIGHTH
Contents at a Glance
8
Chapter 1
Why Computers Matter to You: Becoming Computer Literate ......................................................2
Technology in Focus
The History of the PC ..........................................................................................................................34
Chapter 2
Looking at Computers: Understanding the Parts............................................................................46
Chapter 3
Using the Internet: Making the Most of the Web’s Resources ......................................................92
Technology in Focus
Information Technology Ethics ........................................................................................................138
Chapter 4
Application Software: Programs That Let You Work and Play....................................................160
Chapter 5
Using System Software: The Operating System, Utility Programs, and File Management ....206
Technology in Focus
Computing Alternatives ....................................................................................................................252
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System ..........................................266
Chapter 7
Networking: Connecting Computing Devices ..............................................................................306
Technology in Focus
Under the Hood ..................................................................................................................................346
Chapter 8
Digital Lifestyle: Managing Digital Data and Devices..................................................................362
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices..............................................408
Technology in Focus
Careers in IT ........................................................................................................................................456
Chapter 10
Behind the Scenes: Building Applications ......................................................................................472
Chapter 11
Behind the Scenes: Databases and Information Systems..............................................................516
Chapter 12
Behind the Scenes: Networking and Security in the Business World ........................................562
Chapter 13
Behind the Scenes: How the Internet Works ..................................................................................606
Glossary................................................................................................................................................647
Index ....................................................................................................................................................667
Credits ..................................................................................................................................................681
iii
eighth
EDITION
EIGHTH
Contents
8
Chapter 1
Why Computers Matter to You:
Becoming Computer Literate ........................................................................2
Why Should You Become Computer Literate? ..................................................................................4
Becoming a Savvy Computer User and Consumer ..........................................................................4
Being Prepared for Your Career ........................................................................................................6
Computers in Today’s Careers ..........................................................................................................6
Retail: Working in a Data Mine ................................................................................................6
Business: Data on the Go...........................................................................................................7
Arts: Ink, Paints, and a Notebook? ..........................................................................................8
Video Game Design: A Long Way from Pac-Man .................................................................9
Education: Teaching and Learning ..........................................................................................9
Law Enforcement: Put Down That Mouse—You’re Under Arrest!...................................11
DIG DEEPER: Computers Migrate into the Living Room .................................................12
Military Careers: Drive That Drone.......................................................................................12
Agriculture: High-Tech Down on the Farm .........................................................................14
Automotive Technology: Sensors and CPUs........................................................................14
Medicine: Technologies of Today and Tomorrow ...............................................................15
Medicine: The Chip Within.....................................................................................................17
Science: Simulating Reality .....................................................................................................18
Sports Science: Compute Your Way to a Better Game ........................................................19
Nanotechnology: Careers Yet to Come .................................................................................20
Psychology: You Should Smile . . . Now ...............................................................................21
Understanding the Challenges Facing a Digital Society ....................................................................22
ETHICS IN IT: Knowledge Is Power—Bridging the
Digital Divide .....................................................................................................................22
TECHNOLOGY IN FOCUS
The History of the PC ..............................................................................................34
Chapter 2
Looking at Computers:
Understanding the Parts ......................................................................46
Understanding Your Computer..............................................................................................................48
Computers Are Data Processing Devices .............................................................................48
Bits and Bytes: The Language of Computers .......................................................................48
Your Computer’s Hardware ...................................................................................................50
Input Devices ..........................................................................................................................................51
Keyboards..................................................................................................................................52
Mice and Other Pointing Devices ..........................................................................................54
Touch Screens............................................................................................................................56
iv
eighth
EDITION
EIGHTH
8
Image Input...............................................................................................................................57
ETHICS IN IT: What Is Ethical Computing? ........................................................................58
Sound Input ..............................................................................................................................59
Output Devices ........................................................................................................................................60
Monitors ....................................................................................................................................60
Printers.......................................................................................................................................62
DIG DEEPER: How Inkjet and Laser Printers Work...........................................................65
Sound Output ...........................................................................................................................66
Processing and Memory on the Motherboard ....................................................................................67
Memory .....................................................................................................................................67
Processing..................................................................................................................................68
Storing Data and Information ..............................................................................................................69
Hard Drives...............................................................................................................................69
Optical Storage .........................................................................................................................70
Flash Storage .............................................................................................................................71
Connecting Peripherals to the Computer ............................................................................................71
High-Speed and Data Transfer Ports.....................................................................................72
Connectivity and Multimedia Ports ......................................................................................73
Adding Ports: Expansion Cards and Hubs ..........................................................................74
Power Controls........................................................................................................................................75
Setting It All Up ......................................................................................................................................77
TRENDS IN IT: Emerging Technologies—Displays That You Can
Take with You .....................................................................................................................80
Chapter 3
Using the Internet:
Making the Most of the Web’s Resources............................92
The Internet..............................................................................................................................................94
Communicating Through the Internet: E-Mail and Other Technologies ............................................95
E-Mail.........................................................................................................................................95
Instant Messaging ....................................................................................................................97
Group Communication ...........................................................................................................98
Web 2.0 Technologies: Collaborating and Communicating Through the Internet ..........................99
Social Networking....................................................................................................................99
Weblogs (Blogs) and Video Logs (Vlogs)............................................................................100
Wikis.........................................................................................................................................102
Podcasts and Webcasts ..........................................................................................................102
TRENDS IN IT: Computers in Society—The Internet Makes
Business Startups Affordable .........................................................................................104
Web Entertainment: Multimedia and Beyond ..................................................................................106
Conducting Business over the Internet: E-Commerce ....................................................................108
E-Commerce Safeguards .......................................................................................................109
Contents v
eighth
EDITION
EIGHTH
8
Accessing the Web: Web Browsers ..............................................................................................110
Getting Around the Web: URLs, Hyperlinks, and Other Tools ......................................................112
URLs .........................................................................................................................................112
Hyperlinks and Beyond.........................................................................................................113
Favorites, Live Bookmarks, and Tagging............................................................................114
Searching the Web Effectively ......................................................................................................115
Search Engines ........................................................................................................................115
Evaluating Web Sites..............................................................................................................118
The Internet and How It Works ......................................................................................................118
ETHICS IN IT: Plagiarism and Copyright Violation—What Can You
Borrow from the Internet? ..............................................................................................119
Connecting to the Internet..............................................................................................................121
Broadband Connections ........................................................................................................121
Wireless....................................................................................................................................123
DIG DEEPER: Discovering the Semantic Web...................................................................124
Dial-Up Connections .............................................................................................................125
Choosing the Right Internet Connection Option...............................................................126
The Future of the Internet ..............................................................................................................126
TECHNOLOGY IN FOCUS
Information Technology Ethics ................................................................138
Chapter 4
Application Software:
Programs That Let You Work and Play ..........................................160
The Nuts and Bolts of Software ....................................................................................................162
Productivity Software for Home and Office ..................................................................................162
Word Processing Software ....................................................................................................163
Spreadsheet Software ............................................................................................................165
Presentation Software ............................................................................................................166
Database Software..................................................................................................................166
Note Taking Software ............................................................................................................167
Personal Information Manager (PIM) Software ................................................................168
Productivity Software Features............................................................................................169
Integrated Software Applications ........................................................................................169
Software Suites .......................................................................................................................170
Personal Financial Software..................................................................................................171
Media Software for Home ............................................................................................................172
Digital Image Editing Software............................................................................................172
DIG DEEPER: Speech Recognition Software .....................................................................174
Digital Audio Software..........................................................................................................174
vi Technology in Action
eighth
EDITION
EIGHTH
8
Digital Video Editing Software ............................................................................................176
Media Management Software ..............................................................................................177
Software Fun for Home ................................................................................................................178
Gaming Software....................................................................................................................178
Educational Software.............................................................................................................179
Drawing Software ..................................................................................................................180
Business Software for Home and Office ......................................................................................180
Home Business Software.......................................................................................................181
Large Business Software........................................................................................................181
Specialized Business Software..............................................................................................184
Getting Help with Software ..........................................................................................................184
TRENDS IN IT: Emerging Technologies: Is It Real or Is
It Virtual?...........................................................................................................................185
Buying Software ............................................................................................................................186
Software Licenses ...................................................................................................................186
ETHICS IN IT: Can I Borrow Software That I Don’t Own? .............................................187
Preinstalled Software .............................................................................................................187
Web-Based Applications........................................................................................................188
Discounted Software..............................................................................................................189
Freeware and Shareware .......................................................................................................190
Software Versions and System Requirements....................................................................192
Installing, Uninstalling, and Starting Software ............................................................................193
Chapter 5
Using System Software: The Operating
System, Utility Programs, and
File Management ..........................................................................................................206
System Software Basics ................................................................................................................208
Types of Operating Systems ..........................................................................................................209
Real-Time Operating Systems ..............................................................................................209
Operating Systems for Networks, Servers, and Mainframes ..........................................210
Operating Systems for Mobile Devices ...............................................................................211
Operating Systems for Personal Computers ......................................................................211
TRENDS IN IT: Emerging Technologies: Open Source Software—
Why Isn’t Everyone Using Linux? ................................................................................213
What the Operating System Does ................................................................................................214
The User Interface ..................................................................................................................214
Processor Management .........................................................................................................215
ETHICS IN IT: Sugar—The Sweet OS for Every Child.....................................................216
Memory and Storage Management .....................................................................................218
Hardware and Peripheral Device Management ................................................................219
Software Application Coordination.....................................................................................220
Contents vii
eighth
EDITION
EIGHTH
8
The Boot Process: Starting Your Computer ....................................................................................221
Step 1: Activating BIOS .........................................................................................................222
Step 2: Performing the Power-On Self-Test ........................................................................222
Step 3: Loading the Operating System................................................................................222
Step 4: Checking Further Configurations and
Customizations.................................................................................................................223
Handling Errors in the Boot Process ...................................................................................223
The Desktop and Windows Features ............................................................................................224
Organizing Your Computer: File Management ............................................................................227
Organizing Your Files ............................................................................................................227
Viewing and Sorting Files and Folders ...............................................................................229
Naming Files ...........................................................................................................................230
Working with Files .................................................................................................................232
Utility Programs ............................................................................................................................232
Display Utilities ......................................................................................................................233
The Programs and Features Utility......................................................................................233
File Compression Utilities.....................................................................................................234
System Maintenance Utilities ...............................................................................................235
System Restore and Backup Utilities...................................................................................237
DIG DEEPER: How Disk Defragmenter Utilities Work ...................................................238
The Task Scheduler Utility ....................................................................................................239
Accessibility Utilities .............................................................................................................240
TECHNOLOGY IN FOCUS
Computing Alternatives ......................................................................................252
Chapter 6
Understanding and Assessing Hardware:
Evaluating Your System ......................................................................................266
Is It the Computer or Me? ..............................................................................................................268
What Is Your Ideal Computer? ......................................................................................................269
Choosing Either a Desktop or Notebook System ..........................................................................271
Assessing Your Hardware: Evaluating Your System ....................................................................272
Evaluating the CPU Subsystem ......................................................................................................272
Evaluating RAM: The Memory Subsystem ....................................................................................276
Adding RAM ..........................................................................................................................279
Evaluating the Storage Subsystem ................................................................................................279
The Hard Drive.......................................................................................................................280
Optical Storage ..............................................................................................................................283
DIG DEEPER: How a Mechanical Hard Drive Works ......................................................286
EDITION
EIGHTH
8
Evaluating the Video Subsystem ..................................................................................................286
Video Cards.............................................................................................................................287
Evaluating the Audio Subsystem ..................................................................................................290
Sound Cards............................................................................................................................290
ETHICS IN IT: Optical Technology: A Free Lunch—Or
at Least a Free Copy ........................................................................................................291
Evaluating System Reliability ........................................................................................................291
Making the Final Decision ............................................................................................................294
TRENDS IN IT: Computers in Society: How to Donate Your
Old Computer Safely.......................................................................................................295
Chapter 7
Networking: Connecting
Computing Devices ..................................................................................................306
Networking Fundamentals ............................................................................................................308
Network Architectures ..................................................................................................................310
Describing Networks Based on Network Administration ...............................................310
Describing Networks Based on Distance............................................................................312
Network Components ....................................................................................................................312
Transmission Media ...............................................................................................................313
Network Adapters..................................................................................................................313
ETHICS IN IT: Sharing Your Internet Connection with Your Neighbors:
Legal? Ethical? Safe?........................................................................................................314
Network Navigation Devices ...............................................................................................315
Networking Software ............................................................................................................315
Home Ethernet Networks ..............................................................................................................315
Ethernet Home Networks .....................................................................................................315
Throughput Speeds................................................................................................................316
Network Cabling ....................................................................................................................317
Wired and Wireless on One Network..................................................................................318
Home Ethernet Equipment ............................................................................................................319
Routers and Switches: Moving Data Around Your
Network ............................................................................................................................319
Connecting Devices to Routers ............................................................................................320
Connecting Network Nodes.................................................................................................322
Connecting Other Devices to Networks ........................................................................................322
Network-Ready Devices .......................................................................................................323
Digital Entertainment Devices on a Network ....................................................................324
Specialized Home Networking Devices .............................................................................325
Securing Wireless Networks ........................................................................................................327
Configuring Software for Your Home Network ............................................................................329
Windows Configuration........................................................................................................329
Contents ix
eighth
EDITION
EIGHTH
8
Wireless Node Configuration ...............................................................................................332
TRENDS IN IT: Careers: Cybercops on the Beat—Computer
Security Careers ...............................................................................................................333
Troubleshooting Network Problems ...................................................................................334
TECHNOLOGY IN FOCUS
Under the Hood ..............................................................................................................346
Chapter 8
Digital Lifestyle: Managing Digital
Data and Devices ........................................................................................................362
A Digital Lifestyle ..........................................................................................................................364
Digital Telephony: Communicating with Bits ................................................................................366
Cell Phones and Smartphones..............................................................................................366
Text Messaging .......................................................................................................................371
Internet Connectivity.............................................................................................................372
Voice over Internet Protocol..................................................................................................374
Cell Phone/Smartphone Security........................................................................................376
Digital Media and Information ......................................................................................................377
Digital Music...........................................................................................................................377
Digital Navigation..................................................................................................................381
Digital Photography ..............................................................................................................383
Digital Video ...........................................................................................................................386
ETHICS IN IT: Managing Your Copyrights: Copyleft Might
Simplify Your Life ............................................................................................................388
Digital Mobility and Access ..........................................................................................................392
Selecting the Right Device ....................................................................................................392
Ubiquitous Computing .........................................................................................................393
TRENDS IN IT: Computers in Society: “Ecosystem” of New Tools—
Augmented Reality..........................................................................................................396
Chapter 9
Securing Your System: Protecting
Your Digital Data and Devices ..................................................................408
Keeping Your Data Safe ................................................................................................................410
Computer Threats: Computer Viruses ............................................................................................411
Types of Viruses ......................................................................................................................411
Virus Classifications...............................................................................................................413
Computer Safeguard: Antivirus Software and Software Updates ..............................................414
x Technology in Action
eighth
EDITION
EIGHTH
8
Antivirus Software .................................................................................................................414
Software Updates ...................................................................................................................416
Computer Threats: Hackers ..........................................................................................................417
What Hackers Steal ................................................................................................................417
Trojan Horses ..........................................................................................................................418
Denial of Service Attacks.......................................................................................................419
How Hackers Gain Access ....................................................................................................420
Restricting Access to Your Digital Assets ......................................................................................421
Firewalls...................................................................................................................................421
Types of Firewalls...................................................................................................................421
DIG DEEPER: How Firewalls Work ....................................................................................422
Knowing Your Computer Is Secure .....................................................................................422
Preventing Bluetooth Attacks...............................................................................................424
Password Protection and Password Management ............................................................425
Anonymous Web Surfing: Hiding from Prying Eyes .......................................................428
Biometric Authentication Devices .......................................................................................429
Managing Online Annoyances ......................................................................................................429
Malware, Adware, and Spyware..........................................................................................430
ETHICS IN IT: Big Brother Is Watching . . . But Should He Be Allowed
to Do So? ...........................................................................................................................431
Spam.........................................................................................................................................432
Cookies ....................................................................................................................................433
Protecting Yourself . . . from Yourself! ..........................................................................................434
Protecting Your Personal Information.................................................................................434
Backing Up Your Data ...........................................................................................................435
Social Engineering: Fooling the Unwary ............................................................................438
TRENDS IN IT: Computers in Society: Identity Theft—Is There More Than
One of You Out There?....................................................................................................439
Protecting Your Physical Computing Assets ..................................................................................441
Environmental Factors ..........................................................................................................441
Deterring Theft .......................................................................................................................443
TECHNOLOGY IN FOCUS
Careers in IT ......................................................................................................................456
Chapter 10
Behind the Scenes:
Building Applications ..............................................................................................472
Understanding Software Programming ........................................................................................474
The Life Cycle of an Information System ......................................................................................474
System Development Life Cycle ..........................................................................................474
ETHICS IN IT: When Software Kills....................................................................................477
Contents xi
eighth
EDITION
EIGHTH
8
The Life Cycle of a Program ..........................................................................................................478
Describing the Problem: The Problem Statement..............................................................478
Making a Plan: Algorithm Development............................................................................480
Developing an Algorithm: Decision Making and Design ................................................482
Coding: Speaking the Language of the Computer............................................................486
DIG DEEPER: The Building Blocks of Programming Languages: Syntax,
Keywords, Data Types, and Operators.........................................................................488
Debugging: Getting Rid of Errors........................................................................................493
Finishing the Project: Testing and Documentation............................................................494
Programming Languages: Many Languages for Many Projects ..................................................495
Selecting the Right Language ...............................................................................................496
Windows Applications ..........................................................................................................496
Visual Basic..............................................................................................................................497
Web Applications: HTML/XHTML and Beyond ..............................................................500
Scripting Languages for the Web .........................................................................................500
The Next Great Language .....................................................................................................502
TRENDS IN IT: Emerging Technologies:Will It Blend?
Writing Your First Video Game in Blender ..................................................................504
Chapter 11
Behind the Scenes: Databases and
Information Systems ..............................................................................................516
Life Without Databases ..................................................................................................................518
Database Building Blocks ..............................................................................................................520
Advantages of Using Databases ..........................................................................................520
Database Terminology...........................................................................................................522
Primary Keys ..........................................................................................................................523
Database Types ..............................................................................................................................524
Relational Databases..............................................................................................................524
Object-Oriented Databases ...................................................................................................525
Multidimensional Databases ................................................................................................525
Database Management Systems: Basic Operations ....................................................................526
Creating Databases and Entering Data ...............................................................................526
Inputting Data ........................................................................................................................527
Data Validation .......................................................................................................................528
DIG DEEPER: Structured Query Language (SQL)............................................................530
Viewing and Sorting Data.....................................................................................................532
Extracting or Querying Data ................................................................................................532
Outputting Data .....................................................................................................................533
Relational Database Operations ..................................................................................................534
Normalization of Data...........................................................................................................535
TRENDS IN IT: Computers in Society: User-Populated Databases................................536
Data Storage ............................................................................................................................539
EDITION
EIGHTH
8
Data Warehouses ....................................................................................................................539
TRENDS IN IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!.............................540
Populating Data Warehouses ...............................................................................................541
Data Staging ............................................................................................................................542
Data Marts ...............................................................................................................................542
Managing Data: Information Systems ..........................................................................................542
Office Support Systems .........................................................................................................543
Transaction-Processing Systems...........................................................................................544
Management Information Systems......................................................................................545
Decision Support Systems.....................................................................................................545
Internal and External Data Sources .....................................................................................546
Model Management Systems ...............................................................................................546
Knowledge-Based Systems ...................................................................................................547
Enterprise Resource Planning Systems...............................................................................547
ETHICS IN IT: Data, Data Everywhere—But Who Is Viewing
It and Why?.......................................................................................................................548
Data Mining ..................................................................................................................................549
Chapter 12
Behind the Scenes: Networking and
Security in the Business World ................................................................562
Networking Advantages ..............................................................................................................564
Client/Server Networks ................................................................................................................565
Classifications of Client/Server Networks: LANs, WANs, and MANs..........................................566
Constructing Client/Server Networks ..........................................................................................569
Servers ..........................................................................................................................................570
Print Servers............................................................................................................................571
Application Servers................................................................................................................571
Database Servers ....................................................................................................................572
E-Mail Servers.........................................................................................................................572
Communications Servers ......................................................................................................572
Web Servers.............................................................................................................................572
Network Topologies ......................................................................................................................572
Bus Topology...........................................................................................................................573
Ring Topology.........................................................................................................................574
Star Topology ..........................................................................................................................576
Comparing Topologies ..........................................................................................................578
Transmission Media ......................................................................................................................578
Wired Transmission Media ...................................................................................................579
Wireless Media Options ........................................................................................................581
Comparing Transmission Media..........................................................................................581
Contents xiii
eighth
EDITION
EIGHTH
8
DIG DEEPER: The OSI Model: Defining Protocol Standards..........................................582
Network Operating Systems ........................................................................................................583
Network Adapters ........................................................................................................................584
Network Navigation Devices ........................................................................................................586
MAC Addresses......................................................................................................................586
Switches and Bridges.............................................................................................................587
Routers .....................................................................................................................................587
Network Security for Client/Server Networks..............................................................................588
Authentication ........................................................................................................................589
Access Privileges ....................................................................................................................589
TRENDS IN IT: RFID—Friend or Foe?................................................................................590
ETHICS IN IT: Network Technicians’ Access to Networks—Who Is Watching
the Watchers?....................................................................................................................592
Physical Protection Measures ...............................................................................................592
Firewalls...................................................................................................................................594
Chapter 13
Behind the Scenes: How the Internet Works ......................606
The Management of the Internet ..................................................................................................608
Internet Networking ......................................................................................................................608
Connecting to the Internet ....................................................................................................609
The Network Model of the Internet.....................................................................................610
Data Transmission and Protocols ..................................................................................................611
Packet Switching ....................................................................................................................612
TCP/IP.....................................................................................................................................613
IP Addresses and Domain Names ................................................................................................613
IP Addresses............................................................................................................................614
DIG DEEPER: Making the Connection—Connection-Oriented Versus
Connectionless Protocols ................................................................................................616
Domain Names .......................................................................................................................617
DNS Servers ............................................................................................................................618
Other Protocols: FTP and Telnet ....................................................................................................619
File Transfer Protocol .............................................................................................................619
Telnet ........................................................................................................................................619
HTTP, HTML, and Other Web Jargon ............................................................................................620
HTTP and SSL.........................................................................................................................620
HTML/XHTML......................................................................................................................621
XML..........................................................................................................................................622
The Common Gateway Interface .........................................................................................622
Dynamic HTML......................................................................................................................623
EDITION
EIGHTH
8
Client-Side Applications .......................................................................................................625
ETHICS IN IT: Web Browsing—Not as Private as You May Think ................................626
Communications over the Internet ................................................................................................626
E-Mail.......................................................................................................................................627
E-Mail Security: Encryption and Specialized Software ....................................................628
TRENDS IN IT: Emerging Technologies—The Evolving Internet ..................................630
Instant Messaging ..................................................................................................................632
Voice over Internet Protocol (VoIP) .....................................................................................633
Using the Internet to Deliver Computer Services ..........................................................................634
Glossary ........................................................................................................................................647
Index ..............................................................................................................................................667
Credits ............................................................................................................................................681
Contents xv
eighth
EDITION
EIGHTH
Dedication
8
make this work possible ... especially when I stay up past midnight writing!
And to my parents, Jackie and Dean, who taught me the best way to achieve
Alan Evans
For all the teachers, mentors, and gurus who have popped
Kendall Martin
For my husband Ted, who unselfishly continues to take on more than his fair
Carolyn, and Teddy, whose encouragement and love have been inspiring.
xvi
eighth
EDITION
EIGHTH
What’s New
Technology in Action, Eighth Edition 8
Thank you for your continued use of Technology in Action. To ease • New coverage of system repair discs and Windows’ Problem
your transition, here are highlights of changes for the 8th edition. Steps Recorder
The following list includes comprehensive changes for the
Chapter 6: Understanding and Assessing Hardware: Evaluating
8th edition:
Your System
• New Multiple-Choice Questions • Updates to the “Ideal Computer System” worksheet
All chapters have all-new, multiple-choice questions. In • Updated coverage of all hardware statistics, including
addition, multiple-choice questions have been added to all processors
Technology in Focus features. • New Bits and Bytes: “3D Explosions” and “Taking Your
• New Ethics Projects System Out of the Box”
Each chapter now concludes with a special team-oriented • New coverage of SuperFetch and RAID technology
ethics project that discusses new and interesting develop- Chapter 7: Networking: Connecting Computing Devices
ments in technology that relate directly to the real world. • Chapter revised to refocus content on setting up and working
• New and Updated End-of-Chapter Projects with a home Ethernet network
More than 80% of all of the end-of-chapter projects for • New section on troubleshooting wireless networks
Making the Transition to . . . Next Semester, Making the Chapter 8: Digital Lifestyle: Managing Digital Data and Devices
Transition to . . . the Workplace, Critical Thinking Questions, • Updated coverage of smartphone connection speeds and
and Team Time are all new or have been updated. operating systems, digital cameras, and printers
• New and Updated “Active Helpdesks” • New coverage on syncing computers with mobile devices,
• Completely revised for the 8th edition MiFi access, and Bluetooth tethering
• New Trends in IT: “World Changing: Impact of Mobile
• New look and feel
Technology” and “Ecosystem of New Tools: Augmented
• Updated Windows 7 and Office 2010 content Reality”
The following list includes changes specific to each chapter for Chapter 9: Securing Your Systems: Protecting Your Digital Data
the 8th edition: and Devices
Chapter 1: Why Computers Matter to You: Becoming Computer • Updated coverage of cybercrimes and Facebook privacy
Literate • New and updated coverage of data backups, including
• Updates to computer system statistics online backups
• New section on military careers that use computers • New Bits and Bytes: “CAPTCHA: Keeping Web Sites Safe
From Bots”
Chapter 2: Looking at Computers: Understanding the Parts
• New coverage of Apple’s Mac Mouse Chapter 10: Behind the Scenes: Building Applications
• Updates to how to select a printer and statistics on media • Updated “How Cool Is This?” topic: XNA Game Studio
storage • New coverage of Objective C
• New coverage of USB 3.0 technology Chapter 11: Behind the Scenes: Databases and Information
Chapter 3: Using the Internet: Making the Most of the Web’s Systems
Resources • New “How Cool Is This?” topic: JustTweetIt.com
• New “How Cool Is This?” topic: WolframAlpha • New section on Facebook as a database
• New coverage of wireless in-flight service • Updated coverage on Microsoft Access
• Updates to Internet connection speeds • New Bits & Bytes: “Music Database Helps You Find Music,”
“iTunes Smart Playlists—They’re Just Queries!” and “CRM
Chapter 4: Application Software: Programs That Let You Work Tools Go Online”
and Play • New Trends in IT: “User-Populated Databases”
• New coverage of free software, Software as a Service
Chapter 12: Behind the Scenes: Networking and Security in the
(SaaS), and Web-based software
Business World
• Updated coverage of note-taking software
• New coverage of using wired connections in business networks
• New coverage of open source software licensing and
• Updated network cabling statistics
reinstalling software
• New Bits and Bytes: “Print Documents Anywhere . . . From
• New Bits and Bytes: “Working with Different File Formats,”
Your Phone!” and “PAN Clothing—Organization and Power
“Making a Winning Presentation,” and “Getting Rid of Bloat”
for Portable Gear”
Chapter 5: Using System Software: The Operating System, Util- • Updated Ethics in IT: “Network Technicians’ Access to
ity Programs, and File Management Networks—Who Is Watching the Watchers?”
• Updated coverage of operating systems for cell phones,
Chapter 13: Behind the Scenes: The Internet: How It Works
Microsoft Windows editions, and RAM requirements
• New Ethics in IT: “Web Browsing—Not as Private As You
• New sections on operating systems and platforms, running
May Think”
multiple operating systems on a single computer, and using
• New sections on crowdsourcing and email encryption
Linux
xvii
This page intentionally left blank
eighth
EDITION
EIGHTH
About the Authors
8
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College teaching a variety of computer
science and business courses. He holds a B.S. in accounting from Rider
University and an M.S. in information systems from Drexel University, and he is
a certified public accountant. After a successful career in business, Alan finally
realized his true calling was education. He has been teaching at the college
level since 2000. Alan enjoys giving presentations at technical conferences and
meets regularly with computer science faculty and administrators from other
colleges to discuss curriculum development and new methods of engaging students.
xix
eighth
EDITION
EIGHTH
Acknowledgments
8
First, we would like to thank our students. We constantly learn from them while teaching, and they are a
continual source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and
children made sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Prentice Hall has been a truly enjoyable experience, a
few individuals deserve special mention. The constant support and encouragement we receive from
Stephanie Wall, Associate Vice President/Executive Editor, and Michael Payne, Editor in Chief, continu-
ally makes this book grow and change. Our heartfelt thanks go to Jennifer Lynn, our developmental
editor. Jennifer continues to have a positive impact on the book, and we have benefited greatly from her
creative ideas and efficient time management skills. In addition, Laura Burgess, our project manager,
has done a fantastic job of coordinating all details of the project and always keeping the entire project
on track. As Media Development Manager, Alana Coles works tirelessly to ensure that the media
accompanying the text is produced professionally and is delivered in a timely fashion. Despite the
inevitable problems that crop up when producing multimedia, she handles all challenges with a smile.
We also would like to extend our appreciation to Mike Lackey, our Production Project Manager, who
works tirelessly to ensure that our book is published on time and looks fabulous. The timelines are
always short, the art is complex, and there are many people with whom he has to coordinate tasks.
There are many people whom we do not meet in person at Prentice Hall and elsewhere who make
significant contributions by designing the book, illustrating, composing the pages, producing multimedia,
and securing permissions. We thank them all. We would also like to thank the supplement authors for
this edition: Lisa Beach, Sharon Behrens, Michael Callahan, Kevin Cleary, Barbara Edington, Stefanie
Emrich, Stacy Everly, Wanda Gibson, Mary Carole Hollingsworth, Terri Holly, Ruth Neal, Tonya Pierce,
and Linda Stoudemayer.
And finally, we would like to thank the reviewers and the many others who contribute their time,
ideas, and talents to this project. We appreciate their time and energy, as their comments help us turn
out a better product each edition.
xx
eighth
EDITION
EIGHTH
Reviewers
8
Prentice Hall and the authors would like to thank the following people for their help
and time in making this book what it is. We couldn’t publish this book without their
contributions.
xxi
eighth
EDITION
EIGHTH
8
Laurie Eakins East Carolina University
Roland Eichelberger Baylor University
James Fabrey West Chester University
Catherine L. Ferguson University of Oklahoma
Marj Feroe Delaware County Community College
Judy Firmin Tarrant County College
Beverly Fite Amarillo College
Howard Flomberg The Metropolitan State College of Denver
Richard A. Flores Citrus College
Alicen Flosi Lamar University
Linda Foster-Turpen Central New Mexico Community College
Susan Fry Boise State University
Yvonne Galusha University of Iowa
Barbara A. Garrell Delaware County Community College
Ernest Gines Tarrant County College
Tim Gottleber North Lake College
Sherry Green Purdue University—Calumet Campus
Debra Gross The Ohio State University
Vivian Haddad Nova Southeastern University
Don A. Halcomb Bluegrass Community and Technical College
Lewis Hall Riverside City College
Rachelle Hall Glendale Community College
Eric Hamilton Community College of Denver
Bill Hammerschlag Brookhaven College
Terry Hanks San Jacinto College—South Campus
Susan Hanson Albuquerque Technical Vocational Institute
Marie Hartlein Montgomery County Community College
Ronda D. Hayes North Lake College
Susan E. Hoggard Tulsa Community College
Jim Hendricks Pierce College
Catherine Hines Albuquerque Technical Vocational Institute
Norm Hollingsworth Georgia Perimeter College
Bill Holmes Chandler-Gilbert Community College
Mary Carole Hollingsworth Georgia Perimeter College
Sherry Hopkins Anne Arundel Community College
Christie Jahn Hovey Lincoln Land Community College
Jeffrey Howard Finger Lakes Community College
John L. Howard East Carolina University
Judy Irvine Seneca College
Glen Johansson Spokane Community College
Kay Johnson Community College of Rhode Island
Stephanie Jones South Plains College
Steve St. John Tulsa Community College
Kathy Johnson DeVry Chicago
Richard B. Kalman Atlantic Cape Community College
Dr. K. Kamel TSU
Darrel Karbginsky Chemkeketa Community College
Linda Kavanaugh Robert Morris University
Robert R. Kendi Lehigh University
Annette Kerwin College of DuPage
David Kight Brewton-Parker College
Kai S. Koong University of Texas Pan American
Frank Kuehn Pikes Peak Community College
EDITION
EIGHTH
8
Jackie Lamoureux Albuquerque Technical Vocational Institute
David K. Lange Grand Valley State University
Joanne Lazirko University of Wisconsin—Milwaukee
Michael R. Lehrfeld Brevard Community College
Yvonne Leonard Coastal Carolina University
Judith Limkilde Seneca College—King Campus
Richard Linge Arizona Western College
Christy Lopez East Carolina University
Joelene Mack Golden West College
Lisa Macon Valencia Community College
Donna Madsen Kirkwood Community College
Daniela Marghitu Auburn University
Norma Marler Catawba Valley Community College
Carol Prewitt Martin Louisiana State University at Alexandria
Toni Marucco Lincoln Land Community College
Evelynn McCain Boise State University
Dana McCann Central Michigan University
Lee McClain West Washington University
Sandra M. McCormack Monroe Community College
Sue McCrory Missouri State University
Phil McCue Lone Star College—Montgomery
Helen McFadyen Mass Bay Community College—Framingham
Charles J. McNerney Ph.D. Bergen Community College
Dr. Dori McPherson Schoolcraft College
Laura Melella Fullerton College
Josephine Mendoza California State University, San Bernardino
Mike Michaelson Palomar College
Gina Bowers Miller Harrisburg Area Community College
Johnette Moody Arkansas Tech University
Dona Mularkey Southern Methodist University
Rebecca A. Mundy University of Southern California
Linda Mushet Golden West College
Lisa Nademlynsky Johnson & Wales University
Maguerite Nedreberg Youngstown State University
Brad Nicolajsen Carteret Community College
Omar Nooraldeen Cape Fear Community College
Judy Ogden Johnson County Community College
Connie O’Neill Sinclair Community College
Claudia Orr Northern Michigan University
James R. Orr East Carolina University
Sung Park Pasadena City College
Brenda Parker Middle Tennessee State University
Patricia Partyka Schoolcraft College
Woody Pekoske North Carolina State University
Judy Perhamus Perry Riverside Community College—Norco Campus
Carolyn Poe Lone Star College—Montgomery
Mike Puopolo Bunker Hill Community College
Paul Quan Albuquerque Technical Vocational Institute
Ram Raghuraman Joliet Junior College
Patricia Rahmlow Montgomery County Community College
Shirley Reid Indian Hills Community College
Ruth Robbins University of Houston—Downtown
Teresa Roberts Wilson Community College
Reviewers xxiii
eighth
EDITION
EIGHTH
8
Catherine J. Rogers Laramie County Community College
Russell Sabadosa Manchester Community College
Peg Saragina Santa Rosa Junior College
Judith Scheeren Westmoreland County Community College
Samuel Scott Pierce College
Vicky Seehusen The Metropolitan State College of Denver
Ralph Shafer Truckee Meadows Community College—Reno
Mirella Shannon Columbia College
Laurie Evin Shteir Temple University
Sheila Smart Sicilia Onondaga Community College
Greg A. Simpson Phoenix College—Phoenix, AZ
Robert G. Sindt Johnson County Community College
Gary R. Smith Paradise Valley Community College
Steven Singer Kapi’olani Community College
Robert Smolenski Delaware County Community College
Diane Stark Phoenix College
James Stark Milwaukee Area Technical College
Suzanne Mello Stark Community College of Rhode Island
Kriss Stauber El Camino College
Neal Stenlund Northern Virginia Community College
Linda Stoudemayer Lamar Institute of Technology
Catherine Stoughton Laramie County Community College
Lynne Stuhr Trident Technical College
Song Su East Los Angeles College
John Taylor Hillsborough Community College—Brandon Campus
Dennie Templeton Radford University
Joyce Thompson Lehigh Carbon Community College
Lou Thompson University of Texas at Dallas
Janine Tiffany Reading Area Community College
Janet Towle New Hampshire Community Technical College—Nashua
Goran Trajkovski Towson University
Deborah Tyler Tarrant County College
Pamella M. Uhlenkamp Iowa Central Community College—Fort Dodge, Iowa
Erhan Uskup Houston Community College—Northwest
Emily Vandalovsky Bergen Community College
Bill VanderClock Bentley Business University
Glenna Vanderhoof Missouri State University
Michelle Vlaich-Lee Greenville Technical College
Karen Weil-Yates Hagerstown Community College
Catherine Werst Cuesta College
Janice L. Williams Seward County Community College
Melanie Williamson Bluegrass Community and Technical College
Steven H. White Anne Arundel Community College
Barbara Yancy Community College of Baltimore County—Essex Camp
Thomas Yip Passaic County Community College
Mary Zajac Montgomery County Community College
Mary T. Zegarski Northampton Community College
Mary Ann Zlotow College of DuPage
EDITION
EIGHTH
Letter from the Authors
8
Why We Wrote This Book
Our combined 43 years of teaching computer concepts have coincided
with sweeping innovations in computing technology that have affected
every facet of society. From iPads to Web 2.0, computers are more than
ever a fixture of our daily lives—and the lives of our students. But
although today’s students have a greater comfort level with their digital
environment than previous generations, their knowledge of the
machines they use every day is still limited.
We wrote Technology in Action to focus on what matters most to today’s student. Instead of a history lesson
on the microchip, we focus on what tasks students can accomplish with their computing devices and what
skills they can apply immediately in the workplace, the classroom, and at home. We strive to be as current as
the publishing timelines will allow us, constantly looking for the next technology trend or gadget. The result
is a book that sparks student interest by focusing on the material they want to learn (such as how to integrate
computing devices into a home network) while teaching the material they need to learn (such as how
networks work). The sequence of topics is carefully set up to mirror the typical student learning experience.
As they read through this text, your students will progress through stages of increasing difficulty:
1. Examining why it’s important to be computer fluent and how computers impact our society
2. Examining the basic components of the computer
3. Connecting to and exploring the Internet
4. Exploring software
5. Learning the operating system and personalizing the computer
6. Evaluating and upgrading computing devices
7. Exploring home networking and keeping the computer safe from hackers
8. Going mobile with smartphones, netbooks, iPads and laptops
9. Going behind the scenes, looking at technology in more detail
We have written the book in a “spiraling” manner, intentionally introducing on a basic level in the earlier
chapters those concepts that students have trouble with and then later expanding on those concepts in more
detail when students have become more comfortable with them. Thus, the focus of the early chapters is on
practical uses for the computer, with real-world examples to help the students place computing in a familiar
context. For example, we introduce basic hardware components in Chapter 2, and then we go into increas-
ingly greater detail on some hardware components in Chapter 6 and in the “Under the Hood” Technology in
Focus feature.
The Behind the Scenes chapters venture deeper into the realm of computing through in-depth explanations
of how programming, networks, the Internet, and databases work. They are specifically designed to keep
more experienced students engaged and to challenge them with interesting research assignments.
We have also developed a comprehensive multimedia program to reinforce the material taught in the text
and to support both classroom lectures and distance learning. The Helpdesk training content, created specifi-
cally for Technology in Action, enables students to take on the role of a helpdesk operator and work through
common questions asked by computer users. Exciting Sound Byte multimedia—fully integrated with the
text—expands student mastery of complex topics.
Now that the computer has become a ubiquitous tool in our lives, a new approach to computer concepts is
warranted. This book is designed to reach the students of the twenty-first century and prepare them for the
challenges they will face in the new global economy.
xxv
eighth
EDITION
EIGHTH
8 Visual Walk-Through
TOPIC SEQUENCE
Concepts are covered in a spiraling manner between chapters to mirror the typical student learning experience.
Storing Data and Information 69 280 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System
seven
seven cool
chapter
networking
how
How Cool is This?
connecting computing devices
how cool is this? As you have probably
already experienced, wireless connectivity is not always free. Many businesses, such
is this?
as Starbucks, charge customers for each device they want to connect, which
Highlights the latest and greatest can become expensive for groups of friends trying to surf the Internet while waiting to
catch a flight at the airport. Connectify is free software that takes an existing
websites, gadgets, and multimedia. objectives Internet connection and turns it into a wireless hotspot. So if you are connected to the
objectives
After reading this chapter, you should be able to answer the following questions: Internet on your notebook, the Connectify software turns your notebook
computer into a wireless hotspot so that you and your friends can connect other
1. What is a network, and what are the advantages/disadvantages of setting up one?
(pp. 309–310) WiFi-enabled devices
such as a cell phone
2. What is the difference between a client/server network and a peer-to-peer network?
(pp. 310–312) or gaming system
3. What are the main components of every network? (pp. 312–315) through the same
Internet connection.
4. Which type of network is most commonly found in the home? (p. 315)
The hotspot you
5. What equipment and software do I need to build a network in my home? (pp. 319–322)
create features easy
6. Besides computers, what other devices would I connect to a home network?
connectivity and
(pp. 322–326)
encryption of data for
7. Why are wireless networks more vulnerable than wired networks, and what special
precautions are required to ensure my wireless network is secure? (p. 327) solid security.
Multimedia Cues 8. How do I configure the software on my computer and set up other devices to get my
network up and running? (pp. 329–334)
Visual integration of multimedia. 9. What problems might I encounter when setting up a wireless network? (pp. 334–335)
multimedia resources
multimedia
resources
Active Helpdesk
• Understanding Networking (p. 325)
Sound Bytes
• Installing a Home Computer Network (p. 325)
• Securing Wireless Networks (p. 327)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
307
EDITION
EIGHTH
Student Textbook
8
ETHICS TRENDS
IN IT Knowledge Is Power—Bridging the Digital Divide IN IT Emerging Technologies: Is It Real or Is It Virtual? DIG
DEEPER
How a Mechanical Hard Drive Works
What would your life be like if you had never touched a computer be- Volunteers, funded by a generous donor, have installed 12 outdoor Software can take us beyond what is familiar to us and into alternate accountants offer services to advise “in-world” businesses on finance,
cause you simply couldn’t afford one? What if there were no computers access points complete with directional antennas to connect a series of realities. Virtual reality uses software to allow people to interact in a sim- strategic planning, or budget forecasting. There is fertile ground for innova- The thin metal platters that make up a hard drive are covered with a spe- concentric circles, each called a track, and pie-shaped wedges, each
in your town? By 2009, almost 75% of the United States had Internet ac- villages to the Internet via a wireless network. The last access point in ulated three-dimensional environment that users can manipulate and tive and entrepreneurial thinkers both inside and outside Second Life. cial magnetic coating that enables the data to be recorded onto one or called a sector, are created in the magnetized surface of each platter,
cess. But for those not served, and for many around the world, access to the connectivity chain connects to an Internet service provider 22 miles explore as if they were in that world. Beyond video games, the applica- Finally, businesses and educational institutions also recognize the both sides of the platter. Hard drive manufacturers prepare the disks to setting up a gridlike pattern that identifies file locations on the hard drive.
the opportunities and knowledge computers and the Internet offer is im- away. The villagers are now able to hold meetings, attend school classes, tions of virtual reality are almost endless. Three-dimensional environ- marketing potential in Second Life, and they use the virtual world to test hold data through a process called low-level formatting. In this process, A separate process called high-level formatting establishes the catalog
possible. The discrepancy between the haves and have-nots with regard and access the Internet without trekking across miles of mountainous ments created by computers are getting better and better at helping new ideas. Educational institutions such as Harvard, Princeton, and Ohio that the computer uses to keep track of where each file is located on
to computer technology is commonly referred to as the digital divide. terrain. Unfortunately, this solution isn’t available throughout all of people experience new things or experience familiar things in new ways. University have built virtual campuses with the intention of offering “vir- the hard drive. More detail on this is presented in the Dig Deeper
This discrepancy is a growing problem. People with access to com- Nepal . . . or even throughout some areas of the United States. Virtual environments are used in military training programs, the tual tours” to prospective students. At these “campuses,” current stu- Read/write head feature “How Disk Defragmenter Utilities Work” on page 238.
puters and the Internet (that is, those who can afford them) are poised to What is being done to bridge the digital divide? Organizations world- space program, and, as discussed in Chapter 1, in the medical field. dents can take courses (see Figure 4.26), participate in student Hard drive platters spin at a high rate of speed, some
Arms
Studies show that soldiers who have gone through virtual reality (VR) organizations, or meet and collaborate online just as they would if they
take advantage of the many new developments technology offers, wide are working to raise awareness and to increase government in- as fast as 15,000 revolutions per minute (rpm). Sitting
training are just as effective as those who have trained in traditional met in the real-world student center.
whereas poorer individuals, communities, and school systems that can’t volvement. Groups are sponsoring referendums that increase Internet between the platters are special “arms” that con-
combat situations. Flight simulators are used by airlines to prepare com- Virtual worlds such as Second Life are innovative ways to hold dis-
afford computer systems and Internet access are being left behind. capacity in schools, for example, and are urging state legislatures to pro- tain read/write heads (see Figure 6.25). A
mercial pilots to fly in a wide range of flight conditions; the military and tance learning classes. Online classes held in a virtual world environment
For example, in the United vide additional funding for technol- NASA also use them. The obvious benefit of simulators and VR is that give students the online convenience of not having to travel to class, read/write head moves from the outer edge of
States, more teachers are using the ogy to struggling school systems. there is little machine or human expense when a mistake is made in vir- while providing a more enjoyable and perhaps even more effective the spinning platter to the center, as frequently as
Internet to communicate with par- Community organizations are rising tual conditions—but there would be in “live” conditions. experience. In a virtual world, students are able to convene in traditional 50 times per second, to retrieve (read) and record
ents than ever before. E-mail up- to the challenge as libraries and Engineers and designers are also using virtual reality technologies. classrooms, on sandy Malibu beaches, or in open-air venues— (write) the magnetic data to and from the hard
dates on student progress, Web sites recreation centers work to provide Car manufacturers build virtual prototypes of new vehicles, test them, environments limited only by the imagination of the instructor and the drive platter. As noted earlier, the average total
with homework postings that allow free Internet access to the public. and make alterations in design before producing a single physical part. students. Given such enjoyable choices, students might be more inclined time it takes for the read/write head to locate the
parents to track assignments, and You can help directly by donat- Architects create virtual models of building plans so that clients or poten- to make time to attend classes, thus increasing their productivity and the
even online parent–teacher confer- ing used computer equipment to tial buyers can “walk through” and get a more realistic idea of what the interactivity of the online classroom. Figure 6.25
completed building will be like. Virtual classroom environments may add an additional layer of expe-
ences are becoming popular. Un- nonprofit groups that refurbish Platters The hard drive is a stack of platters enclosed
Second Life, a virtual world launched in 2003 by Linden Research, rience that students may be able to bring into their professional lives.
wired parents and students are left computers. These organizations re- in a sealed case. Special arms fit in between
Inc., has gained worldwide popularity. Users create avatars, or virtual Seton Hall University, for example, uses Second Life in an emergency
out of the loop. In the United States, pair and upgrade retired systems each platter. The read/write heads at the end
representations of themselves, with which they interact in the virtual preparedness course that allows students to work in simulated cata- of each arm read from and save data to the
children who do not have access to before distributing the systems to world. Second Life has its own economy, where users have created “in- strophic situations, which would otherwise be difficult to experience in platters.
the Internet and computers won’t be needy families at low cost. The Web world” businesses and residents can legally trade in the world’s own the real world.
prepared for future employment, site Techsoup (techsoup.org) main- currency, called Linden dollars. Just as in the real
contributing to the continuing cycle tains national resource lists that can Second Life has also begun to permeate the world, the virtual world has
of poverty. help you find such organizations in outside world.“Outside world” businesses now as- its problems. However, it is
Figure 1.29 sist and advise “in-world” businesses. For likely that virtual reality
But the digital divide isn’t always your area. Some technology com-
caused by low income. Terrain can Terrain such as this glacial lake and mountainous region in Nepal panies have programs in place to example, real-world programmers build complex and virtual environments
show that there can be barriers beyond income to conquering the in-world projects for clients such as Dartmouth Col- will continue to find uses in
be a factor that inhibits connectivity digital divide. help with these efforts. The Mi- BITS Do I need separate players and
lege, Major League Baseball, and Lego. Real-world entertainment, education,
(see Figure 1.29). In Nepal’s moun- crosoft Authorized Refurbisher
distance learning, design,
AND How Do You Find Your WiFi? burners for CD, DVD, and now BD
tainous terrain, for example, even (MAR) program, for example, sup- BYTES formats? Although CDs and DVDs are
and manufacturing.
though a village might only be a few miles away “as the crow flies,” ports refurbishers by allowing certain Microsoft operating systems and based on the same optical technology,
it might take two days to hike there because of the lack of roads. Office software to be installed for free on refurbished systems. Detecting a nearby WiFi signal is important if you are looking for Internet connectivity CD drives cannot read DVDs. If your
while you are on the move. Some notebooks have a system has only a CD drive, you will
built-in WiFi scanner that displays a row of lights need to add a DVD drive to view DVDs.
on the case whenever a WiFi signal is avail- However, if your system has a DVD
able. Keychain fobs that light up when they drive, that is all you need, even just to
Research are working on robots that move in a society. Although computers offer us a detect WiFi signals in the vicinity are also listen.
more human fashion. Their biped (two- world of opportunities, they also pose available. Are there different standards of
legged) robot named Rabbit is able to walk, ethical, legal, and moral challenges and If you are running Windows 7, the Con- optical media? Unfortunately, technol-
run, and climb stairs. It may lead to industrial questions. For example, how do you feel nect to a Network dialog box (accessible from ogy experts have not agreed on a standard
robots that can tackle new tasks for us. about the following? the Network and Sharing Center) shows the DVD format. Currently, there are multiple
• Since the tragic events of September 11, strength of all wireless networks within range of recognized formats, DVD-R/RW
2001, various nationwide surveillance your computer. (pronounced “DVD dash”) and
Understanding the programs have been proposed. Some At ThinkGeek (thinkgeek.com), you may find DVD+R/RW (pronounced “DVD plus”).
the most easy-to-use WiFi detector ever. The WiFi DVD-RAM is a third format.
Challenges Facing a programs include installing surveillance
Detector t-shirt has a logo that lights up to Figure 8.17 Are some CD and DVD drives
cameras in public places that could be
Digital Society considered attractive areas in which to Figure 4.26
indicate the signal strength of a nearby WiFi The WiFi Detector T-shirt faster than others? When you buy an
network (see Figure 8.17). Find your WiFi and makes a statement—a optical drive, knowing the drive speed is
Part of becoming computer literate is being stage terrorist activities. These cameras Virtual worlds are an innovative way to hold
look . . . well, look geeky while doing so! geeky statement. important. Speeds are listed on the device’s
able to understand and form knowledgeable would be monitored via the Internet, distance learning classes.
opinions on the challenges that face a digital possibly by volunteers. Should the packaging.
22 Chapter 1 Why Computers Matter to You: Becoming Computer Literate Getting Help with Software 185 286 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System
NEW
Multiple Choice and True/False
Technology in Focus
Five special features that teach key uses
of technology today.
six self-test
six
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
Under
technology? a storage device to locate its stored go under the hood, looking at the components of your system unit in more detail.
a. Saved data is spread across two data and make it available for Let’s begin by looking at the building blocks of computers: switches.
hard drives. processing?
b. Data is written to one drive and a. Clock speed
mirrored to a second drive. b. Access time
Switches
the
c. RAID 0 allows you to store twice c. Data transfer rate
the data. d. Seek time
The system unit is the box that contains the a computer does, such as processing data or
d. RAID 0 provides an instant central electronic components of the computer. printing a report, is broken down into a series of
backup of your work. But how, exactly, does the computer perform all 0s and 1s. Electrical switches are devices inside
of its tasks? How does it process the data you the computer that can be flipped between these
input? The CPU performs functions like adding, two states: 1 and 0, signifying “on” and “off.”
Hood
subtracting, moving data around the system, and Computers use 0s and 1s to process data because
True–False so on using nothing but a large number of on/off they are electronic, digital machines. They only
switches. In fact, a computer system can be understand two states of existence: on and off.
_____ 1. A single CPU can have multiple cores but cannot also use hyperthreading. viewed as an enormous collection of on/off Inside a computer these two possibilities, or
switches. states, are represented using the binary switches
_____ 2. The memory that your operating system uses is referred to as kernel memory. (or digits) 1 and 0.
_____ 3. Motherboards are designed with a specific number of memory card slots. ELECTRICAL SWITCHES You use various forms of switches every day.
Computers work exclusively with numbers, The on/off button on your DVD player is a
_____ 4. Cache memory is a form of read-only memory that can be accessed more quickly not words. To process data into information, mechanical switch: pushed in, it represents the
computers need to work in a language they un- value 1 (on), whereas popped out, it represents
by the CPU. derstand. This language, called binary language, the value 0 (off). Another switch you use
consists of just two numbers: 0 and 1. Everything each day is a water faucet. As shown in Figure 1,
_____ 5. Solid state drives are faster than hard drives and eSATA drives.
xxvii
eighth
EDITION
EIGHTH
The Multimedia
8
Student CD
The launch pad to the multimedia.
Companion Website
Includes an interactive study guide,
online end-of-chapter material,
additional Internet exercises,
and much more.
www.prenhall.com/techinaction
EDITION
EIGHTH
8
Active Helpdesk
Interactive training that puts
the student in the role of a
helpdesk staffer fielding
questions from callers.
Completely Revised
Features textbook page refer-
ences within each call and
assessment at the end of
each call.
Supervisor
available to assist
students.
Sound Bytes
Multimedia lessons
with video, audio, or
animation and corre-
sponding labs featur-
ing multiple-choice
quizzing.
xxix
eighth
EDITION
EIGHTH Annotated Instructor Edition
8 Provided with each chapter are two divider pages like the ones outlined below.
Audio PowerPoint Can be used for online courses. Audio content expands on topics covered in the
• Active Helpdesk Calls Internet for Web site evaluation guidelines, citing their sources. This is a great exercise
to use when you have students in front of lab computers or together in lecture.
• Sound Bytes (located on the IRCD) This Helpdesk call presents a topic that students usually feel they have mastered, so
they are often surprised to see how much they don’t know. As you run the Helpdesk
call, have a browser open so that you can expand upon what is discussed in the call.
HOMEWORK: Activities used out of class for assessment or After reviewing the online tutorial at one of the following links, http://muse.
widener.edu/~tltr/How_to_Evaluate_9.htm or http://library.acadiau.ca/tutorials/
webevaluation, show students three examples of good Web sites and three examples of
preparation for the next chapter, including: bad Web sites. Ask them to explain what makes the sites good or bad based on the
material in the tutorial.
• Sound Byte Labs marize the pros and cons of using each non-Google search engine. Ask them which
search engine met their needs the best and why they chose that search engine.
• TestGen Assessment
Test Bank
• myitlab (located on the IRCD)
To test student comprehension, use the Test Bank questions for Chapter 3 general
content. This week, design the quiz as a timed, one-attempt quiz with some essay
questions included.
The back side of each chapter tab includes the relevant Sound
Bytes for that chapter.
Ethics in Action
FRONT OF ETHICS TAB
Does Privacy Exist in the Modern Workplace?
On the front of the Ethics tab, you will find the following: Personal computers and other electronic devices have become integral to most workplaces.
Many employees, however, do not always use the computing resources provided by their
employers solely for work-related tasks. And employers are now using electronic means to
OPPOSING VIEWPOINTS TABLE: Outlines debatable ethics screen employees prior to employment. Are employees entitled to privacy in the workplace
at least as far as their activities relate to their personal lives? Do employees surrender
personal privacy rights because they are paid to do a job and are using
topics that you can use in the classroom. employer-provided equipment?
Conduct a debate or discussion using the opposing viewpoints in the table below.
Keywords have been supplied to help you search the Internet for more information on the topic.
KEYWORDS: Provides you with additional words to search
Employers: Monitor Employees: Flexibility
the Internet for more information related to the ethics topic. Employees at Work
Employers need to monitor workers so they are honest. Employees sometimes need to handle personal business
For a list of the resources available for every chapter and during work hours.
where they are located, see the back of this tab. Employers want employees working for the business
100 percent of the day.
If some individuals complete their work in less time, why
can’t they conduct some personal business on company
time?
Employers need to run background checks on employees. Personal life should be separate from one’s business
identity.
Monitoring employees helps measure employee There are other ways to test productivity (such as meeting
productivity. performance goals) other than monitoring phone calls
and e-mails.
Monitoring employees alerts managers to possible leaks of Employees should be respected as professionals and will
information to competitors. uphold basic principles of business ethics without being
monitored.
keywords
EDITION
EIGHTH
Instructor Resource CD
GREATLY
8
ENHANCED
Instructor Resource CD
• NEW! Interactive Course Builder to help you integrate all the instructor resources.
• NEW! Recommended chapter lectures written by the authors that you can customize.
• All resources included with the Technology in Action Instructional System.
Contact your local Prentice Hall sales rep to learn more about the
Technology in Action instructional system.
xxxi
This page intentionally left blank
COMPLETE
Technology
in Action
8th Edition
one
one
chapter
why computers
matter to you:
becoming computer literate
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What does it mean to be “computer literate”? (p. 4)
2. How does being computer literate make you a savvy computer user and consumer?
(pp. 4–5)
3. How can becoming computer literate help you in a career? (pp. 6–20)
4. How can becoming computer literate help you understand and take advantage of
newly emerging careers? (pp. 20–21)
5. How does becoming computer literate help you deal with the challenges associated
with technology? (pp. 22–23)
multimedia resources
multimedia
resources
Active Helpdesk
This chapter has no Active Helpdesks.
Sound Bytes
• Questions to Ask Before You Buy a Computer (p. 6)
• The History of the Personal Computer (p. 21)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Whether you want a
handmade piece of jewelry, a vintage handbag, or a handblown glass
vase, Etsy is the site for you. This person-to-person e-commerce site is beautifully
designed and allows artists and craftspeople to take full advantage of technology and
connect with customers around the globe.
If you are thinking of opening a storefront for your own handmade goods, Etsy
provides an extremely easy entry into e-commerce. It costs just 20 cents to
list an item, and Etsy provides workshops, marketing support, and forums for store
owners to exchange ideas.
In the full spirit of the modern Web, Etsy enthusiasts have created a variety of
ways to connect and collaborate. These include blogs about Etsy and a wiki with info
for Etsy buyers and sellers. You’ll also
find mentions of Etsy on Flickr
photography sites, and a YouTube
video in which Etsy’s founder, Rob
Kalin, talks about creating “a
handmade market-
place.” Facebook gets in
on the act with a My Etsy
tab whereby Etsy sellers
can create a special tab on
their profile page to share
Etsy shops and favorite items.
Now the artistic among us can easily use
technology to expand our world.
3
Why Should You wisely and be a more knowledgeable
consumer.
Become Computer
• Computer-literate employees are sought
Literate? after in almost every vocation.
It’s safe to say that computers are nearly • Becoming computer literate will help
everywhere in our society. You find them in you better understand and take advan-
schools, cars, airports, shopping centers, tage of future technologies.
toys, phones, medical devices, and homes,
and in many people’s pockets. You interact In addition, understanding computers
with computers almost every day, sometimes and their ethical, legal, and societal implica-
without even knowing it. Whenever you buy tions will make you a more active and aware
something with a credit card, you interact participant in society.
with a computer. And, of course, most of us Anyone can become computer literate—
can’t imagine our lives without e-mail. Even no matter what your degree of technical
if you don’t yet have a computer and don’t expertise. Being computer literate doesn’t
feel comfortable using one, you still feel the mean you need to know enough to program
impact of technology: Countless ads for com- a computer or build one yourself. With a car,
puters, cell phones, digital cameras, and an for example, you should know enough about
assortment of Web sites surround us each it to take care of it and use it effectively, but
day. We’re constantly reminded of the ways that doesn’t mean you have to know how to
in which computers, the Internet, and tech- build one. You should try to achieve the
nology are integral parts of our lives. same familiarity with computers.
So, just by being a member of our society,
you already know quite a bit about comput-
ers. But why is it important to learn more Becoming a Savvy
about computers, becoming what is called Computer User and
computer literate? Being computer literate Consumer
means being familiar enough with comput-
ers that you understand their capabilities One of the benefits of becoming computer
and limitations (see Figure 1.1), and you literate is being a savvy computer user and
Figure 1.1
know how to use them. Being computer lit- consumer. What does this mean? The fol-
Do you know what all the lowing are just a few examples of what it
words in a computer ad erate means more than just knowing about
mean? Can you tell the parts of your computer. The following may mean to you:
whether the ad includes are some other benefits: • Avoiding hackers and viruses. Do you
all the information
necessary to make a • As a computer literate individual, know what hackers and viruses are?
purchasing decision? you can use your computer more Both can threaten a computer’s security.
Portable Storage: Bluetooth wireless 19-in-1 media hub with VoIP stereo
headset
Computers in
Today’s Careers
We all are used to seeing computers at the
checkout counter in stores, at the check-in
Figure 1.3
area at an airport, and so on, but there are
Can you identify all of
these devices? Do you
Being Prepared many ways that computers are being used
know how to get them all for Your Career that you probably aren’t aware of. Before we
to work well together? begin looking at a computer’s parts and
Computer careers are on the rise. Regardless how it operates, let’s take a look at a whole
of which profession you pursue, if comput- range of industries and examine how com-
ers are not already in use in that career, they puters are a part of getting work done.
most likely will be soon. Information Whether you plan on a career in one of these
technology (IT) is a field of study focused fields or will just be a user of their products
on managing and processing information and services, your life will be affected by the
and the automatic retrieval of information. use of computers in areas including retail,
Information technology includes computers, arts, law enforcement, the military, agricul-
telecommunications, and software ture, and more.
deployment. IT careers are on the rise, and
the seven fastest-growing occupations are
computer related. New technology in the
Retail: Working in a Data Mine
workplace is creating a demand for new
skill levels from employees. A study from Businesses accumulate a lot of data, but how
the National Research Council concludes do they manage to make sense of all of it?
that by the year 2030 computers will How do they separate the anomalies from
displace humans in 60 percent of the current the trends? They use a technique known as
occupations. It will be more critical than data mining, the process of searching huge
ever for employees to have advanced skills. amounts of data with the hope of finding a
For more information about computers and pattern (see Figure 1.4). For example, large
a b c
Figure 1.5
(a) Package tracking starts when the package is sent with the generation of a smart label, which includes the UPS
MaxiCode. (b) Portable handheld devices allow UPS personnel to scan packages for accurate transfer of informa-
tion. (c) Devices with built-in GPS are used to find directions to customers, capture customer signatures, and
transfer information.
You’re probably already using your computer in many different ways to fit Or use the notebook computer upstairs to play a dance song through the
your lifestyle. Perhaps you’re ripping your CD collection to MP3 files and big speakers in the basement audio system?
downloading movies so that you can transfer them from your computer When in the future will you be able to do all this? Right now if you set
to your iPod or Zune. Maybe you’re burning a CD of all your favorite up a digital home. Setting up a digital home means having an appropri-
songs for a party you’re having. But wouldn’t it be great if you could ate computer and digital devices that are all connected to a home net-
manage the music for your party straight from your computer? And what work. Let’s discuss the key components you need to get started with a
about that video of your friend’s birthday party you shot last week? digital living room, some of which are shown in Figure 1.14.
You’ve already imported it to your computer, edited it, and added a music 1. A media computer: A computer is the nerve center of any digital
track. But when your friends come over for the party this weekend, home, allowing you to interface with all the different digital devices
wouldn’t it be fun to be able to show them the video on the TV in the liv- you have connected to the network. For a Windows-based
ing room instead of having them crowd around your computer monitor? computer (see Figure 1.15), you should opt for a computer running
Media center
computer system
LED Internet-ready
TV
Universal remote
control
Wireless keyboard
with built-in trackpad
Figure 1.14
You can create a digital living room with only a few devices.
Military Careers: Drive That Drone desirable military positions require knowl-
edge of computer software and hardware.
Developing and using cutting-edge technol- Right from the start, planning a career in
ogy has always been an important compo- the military is easier for those who are
nent of a military career, and advanced computer literate. The ASVAB (Armed
technology is especially important in Services Vocational Aptitude Battery) exam is
modern times. The need for electronic a requirement for entry into the U.S. armed
communications in the field means that services, and the scores on various sections of
many soldiers are trained computer this exam determine if you are eligible to en-
specialists in areas such as satellite transmis- list, indicate which branch or branches of the
sions, radio controllers, and computer military will consider you, and identify
networking. Whether the job is in electronics, which military careers are appropriate.
aviation support, art and media production, Studying for this timed multiple-choice exam
or logistics and supply, many of the most can involve using tools such as an iTouch
Web app or an online tutorial. Many public while the driver is in a remote location
libraries have access to databases that store thousands of miles away. Recent software
sample ASVAB questions and provide learn- innovations such as the Gorgon Stare soft-
ing modules to guide you in your prepara- ware package feeds 12 video screens of in-
tion for the exam. Knowing how to use all formation— covering an area of 1.5 square
these tools will give you an advantage. miles—back to the “pilot” in Virginia. The
The U.S. military branches have some of pilot can decide to deliver Hellfire missiles
the most highly technological projects ever and bombs to any section of that area.
developed. For example, the Air Force em- Models of drones that can take off and
ploys unmanned aerial vehicles, called UAVs land on aircraft carriers are expected to
or drones, to perform surveillance operations be on the scene in the next few years.
and to deliver missiles (see Figure 1.16). Maintaining and operating highly
Modern drones use complex video and technological tools is part of military life for
guidance systems to do their work, all many soldiers.
Figure 1.20
with a scalpel. To use the robots, doctors look Medicine: The Chip Within (a) A doctor manipulates
into a surgery control device where they ma- controls that move the
nipulate controls that move robotic devices When you mention implanting technology robotic instrument tips
hovering over the patient (see Figure 1.20). into the human body, some people conjure inside the patient. (b) This
One robot control arm contains a slender im- up images of the Terminator, a futuristic shows what surgeons
cybernetic life form from the movie The might see as they operate
aging rod that allows the doctor to see inside on the patient.
the patient when the rod is inserted into the Terminator. But the more realistic goals of
patient. Doctors can now perform a coronary modern biomedical chip research are to pro-
bypass by vide techno-
making two logical
small incisions solutions to
in the patient physical prob-
and inserting lems and to
the imaging provide a
rod in one inci- means for
sion and an- positively
other robotic identifying
device with a individuals.
scalpel into the We are at a
other. The abil- stage when
ity to make biology and
small incisions technology
instead of the are fusing.
large ones re- Figure 1.21
quired by con- shows a nerve
ventional cell grown on a
surgery means Figure 1.21 silicon chip.
less The cell was
Researchers are experimenting with implantable chips such as this one
trauma and to repair nerve damage and restore movement or sensation to parts of cultured on the
blood loss for the body. chip until it
the patient. formed a net-
Theoretically, surgeons do not even have to work with
be in the same room as the patient. They nearby cells. The chip contains a transistor
could be thousands of miles away, control- that stimulates the cell above it, which in
ling the movements of the robotic devices turn passes the signal to neighboring
from a control station. neurons.
Figure 1.26
(a) High Definition Golf
does a complete analysis
on your swing and
projects the flight path
the ball would have taken.
(b) It can also simulate
many popular golf
courses, such as Pebble
Beach.
What would your life be like if you had never touched a computer be- Volunteers, funded by a generous donor, have installed 12 outdoor
cause you simply couldn’t afford one? What if there were no computers access points complete with directional antennas to connect a series of
in your town? By 2009, almost 75% of the United States had Internet ac- villages to the Internet via a wireless network. The last access point in
cess. But for those not served, and for many around the world, access to the connectivity chain connects to an Internet service provider 22 miles
the opportunities and knowledge computers and the Internet offer is im- away. The villagers are now able to hold meetings, attend school classes,
possible. The discrepancy between the haves and have-nots with regard and access the Internet without trekking across miles of mountainous
to computer technology is commonly referred to as the digital divide. terrain. Unfortunately, this solution isn’t available throughout all of
This discrepancy is a growing problem. People with access to com- Nepal . . . or even throughout some areas of the United States.
puters and the Internet (that is, those who can afford them) are poised to What is being done to bridge the digital divide? Organizations world-
take advantage of the many new developments technology offers, wide are working to raise awareness and to increase government in-
whereas poorer individuals, communities, and school systems that can’t volvement. Groups are sponsoring referendums that increase Internet
afford computer systems and Internet access are being left behind. capacity in schools, for example, and are urging state legislatures to pro-
For example, in the United vide additional funding for technol-
States, more teachers are using the ogy to struggling school systems.
Internet to communicate with par- Community organizations are rising
ents than ever before. E-mail up- to the challenge as libraries and
dates on student progress, Web sites recreation centers work to provide
with homework postings that allow free Internet access to the public.
parents to track assignments, and You can help directly by donat-
even online parent–teacher confer- ing used computer equipment to
ences are becoming popular. Un- nonprofit groups that refurbish
wired parents and students are left computers. These organizations re-
out of the loop. In the United States, pair and upgrade retired systems
children who do not have access to before distributing the systems to
the Internet and computers won’t be needy families at low cost. The Web
prepared for future employment, site Techsoup (techsoup.org) main-
contributing to the continuing cycle tains national resource lists that can
of poverty. help you find such organizations in
Figure 1.29
But the digital divide isn’t always your area. Some technology com-
caused by low income. Terrain can Terrain such as this glacial lake and mountainous region in Nepal panies have programs in place to
show that there can be barriers beyond income to conquering the
be a factor that inhibits connectivity digital divide. help with these efforts. The Mi-
(see Figure 1.29). In Nepal’s moun- crosoft Authorized Refurbisher
tainous terrain, for example, even (MAR) program, for example, sup-
though a village might only be a few miles away “as the crow flies,” ports refurbishers by allowing certain Microsoft operating systems and
it might take two days to hike there because of the lack of roads. Office software to be installed for free on refurbished systems.
Research are working on robots that move in a society. Although computers offer us a
more human fashion. Their biped (two- world of opportunities, they also pose
legged) robot named Rabbit is able to walk, ethical, legal, and moral challenges and
run, and climb stairs. It may lead to industrial questions. For example, how do you feel
robots that can tackle new tasks for us. about the following?
• Since the tragic events of September 11,
2001, various nationwide surveillance
Understanding the programs have been proposed. Some
Challenges Facing a programs include installing surveillance
cameras in public places that could be
Digital Society considered attractive areas in which to
Part of becoming computer literate is being stage terrorist activities. These cameras
able to understand and form knowledgeable would be monitored via the Internet,
opinions on the challenges that face a digital possibly by volunteers. Should the
chapter
4. How can becoming computer literate 5. How does becoming computer
help you understand and take literate help you deal with the
advantage of newly emerging challenges associated with
summary
careers? technology?
In today’s world, many changes are a result Although computers offer us great opportu-
of new computer technologies. Understand- nities, they also pose ethical, legal, and
ing how today’s computers function should moral challenges and questions. Being com-
help you utilize technology effectively puter literate enables you to form educated
now. And by understanding computers opinions on these issues and to take stands
and how they work today, you can con- based on accurate information rather than
tribute to the technologies of tomorrow media hype and misinformation.
such as nanoscience and new medical
technologies.
25
one
one key terms
chapter
chapter
Word Bank
• affective computing • digital home • patient simulator
• Bluetooth technology • information technology • public domain
buzzwords
• computer forensics (IT) • radio frequency identifica-
• computer literate • nanoscience tion tags (RFID tags)
• data mining • nanotechnology • software
• digital divide • offshoring • spam
Instructions: Fill in the blanks using the words from the Word Bank above.
Becoming computer literate is necessary in modern life and helps with just about any
career path you can imagine. (1) __________, the study of incredibly small computing
devices built at the molecular level, is one field that is expanding and offers great potential
but requires computer literacy. (2) __________ uses an understanding of computer systems
to take criminologists beyond what they could accomplish with conventional investigation
techniques. And as the science of (3) __________ advances, computers will perform more
and more like human beings in emotion and social cueing.
There are many advantages to becoming (4) __________ , that is, understanding more about
the capabilities and limitations of computers. Doing so can help you manage computer
annoyances like unwanted e-mails, which are called (5) __________. You will also know how
to upgrade your system to the latest standards such as wireless (6) __________.
More and more aspects of how our homes are run are being coordinated through comput-
ers, giving rise to the term (7) __________. You may even find you enjoy computers so much
you want to explore careers in (8) __________.
Be forewarned—people who fail to keep up with the knowledge of how to use and main-
tain computer systems will fall to one side of the gap known as the (9) __________. When an
entire country begins to fall behind in computer expertise, jobs are relocated to other, more
tech-savvy countries. This shift of work is known as (10) __________.
becoming
computer literate computer
Using the key terms and ideas you learned in this chapter, write a one- or two-paragraph
literate
summary for your school adviser so that he or she can use it to explain to students the
becoming
importance of being computer literate in today’s job market. Using the Internet, find
additional examples of careers most people would not expect to require computer
knowledge and show how computer literacy is still critical to success in those careers.
Add these examples to your document to support your position.
27
one
one self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.
Multiple Choice
self-test
1. Which is not a current use of comput- d. run sensors and CPU diagnostics
ers in the military? for a vehicle’s many
a. Using RFID tags to avert potential computerized subsystems.
crises like E. coli epidemics 6. A device that tracks movement is
b. Studying for the standardized a. a PSS.
exam for enlisting b. an RFID tag.
c. Navigating unmanned aerial c. an MP3 device.
vehicles remotely d. a patient simulator.
d. Coordinating communications 7. Computer forensics uses computer
across wired and wireless systems and technology to
networks a. simulate a person’s anatomical
2. Artists interface with technology system.
often, but cannot yet b. train law enforcement officers to
a. use computers to generate images be more effective.
that respond to the environment. c. improve fuel injection and engine
b. use computers to create a virtual management systems.
storefront. d. gather potential legal evidence.
c. use software to suggest plot 8. IT is the abbreviation for
endings. a. information training.
d. use software to create and b. Internet training.
enhance virtual performances. c. Internet technology.
3. People who do not read emotion eas- d. information technology.
ily in others hope for new progress in 9. Which allows retailers to respond to
the field of consumer buying patterns?
a. affective computing. a. RFID tags
b. nanotechnology. b. Data mining
c. patient simulators. c. Smart labels
d. forensic science. d. Bluetooth technology
4. A necessary ingredient for a digital 10. Robotic surgery devices help physi-
home is a cians because
a. network. a. they make incisions that are more
b. videocassette recorder. accurate.
c. radio tuner. b. the doctor does not have to be
d. smartboard. involved in the surgery.
5. Automotive technology requires an c. they monitor and make
understanding of computers to suggestions to the surgeon during
a. properly bill customers. the procedure.
b. control computerized pneumatic d. if the operation runs into
tools. complications, they can suggest
c. keep carburetor settings at creative alternatives.
optimal positions.
True–false
_____ 1. Researchers believe that microchips may one day restore sight to the blind.
_____ 2. Anyone can become computer literate—no matter what their degree of technical
expertise.
_____ 3. Supercomputers can accurately forecast tornadoes within minutes.
_____ 4. Criminal investigators may find evidence on a computer, but that evidence cannot
be used in court.
_____ 5. Many modern museums offer WiFi networks and multimedia downloads to their
patrons to enrich their experience.
chapter
transition to...
next semester
1. Computer Literacy
transition to ...
In your college career, you’ll be spending time understanding the requirements of the
degree program you choose. At many schools, computer literacy requirements exist
either as incoming requirements (skills students must have before they are admitted)
next semester
making the
or outgoing requirements (skills students must prove they have before graduating).
Does your program require specific computer skills? Which skills are these? Should
they be required? How can students efficiently prove that they have these skills? How
often does the set of skills need to be reviewed and updated?
2. Does Size Matter?
Think about your typical school schedule. What type of computing solution would best
support your needs—a desktop computer, a notebook, or a netbook? Think about the
level of computing power required by your courses. Will any course require you to use
a specialty software product such as a nutrition monitoring program or a statistics
training application? Or do you just need word processing capabilities and Internet
connectivity? How much does portability matter, and do you need a larger-than-usual
screen? How many years do you expect to be able to use the computer you purchase
today?
3. Old Technologies Holding On
What courses and careers have not felt the impact of computer technology? Think of
three courses that are taught effectively with no use of technology. Think of three
careers that do not use computers in a significant way. Research and find the average
salary and the rate of growth in these careers.
4. Digital Dorm
What features of a digital home would make living in your dorm room more produc-
tive? Do you already have access to high-speed Internet? Do you have wireless access?
Do you have a way to time-shift television and audio programming using a digital
media recorder? Do you have remote control of your lights and dorm room fridge?
What about being able to monitor the status of your laundry in the basement washer
and dryer using your cell phone? Identify three additional tools that could be added to
dorm life that would be popular and useful for you or your fellow students.
5. Military Computing
In this chapter, we discussed the use of high-level technology in the U.S. military.
Review the computer science programs at the U.S. Air Force Academy, the U.S. Military
Academy at West Point, and the U.S. Naval Academy. What specific courses or paths of
study do these institutions have that are specific to military settings? What information
do the department Web sites provide on why an understanding of computers matters
to the military? How would this training support a transition from a military career to
the civilian workplace?
29
one
one making the
chapter
transition to...
the workplace
1. The Productivity Paradox
making the
In this chapter, we highlighted several careers that require computer skills. With all of
the workplace
the advancements in computing technology, you might expect to see a great rise in
workforce productivity, yet statistics since 2004 report a decline in productivity. How is
this possible? Do you think it applies in the profession you are in or plan to enter? Can
transition to ...
you think of reasons in which the increased use of computers would decrease
productivity? How has the shift toward more technology in your personal life impacted
you? Are you more or less productive there? How do computers affect creativity?
2. Patients and Medical Computing
There are some major changes in the flow of medical information that impact patients
every day. As more hospitals and doctor’s offices begin to use electronic medical
records (EMRs), the flow of information among the different doctors and care facilities
a patient uses could become much more reliable. In their training and work, doctors
and nurses rely on computers. What about patients? Examine Google Health at
health.google.com for an example of an electronic medical history. How does this mi-
gration from a traditional paper records system impact the skills required for medical
office workers? New ethical questions also often arise when technology changes. How
would a medical facility now protect and verify its data records? What risks are there
with a product like Google Health?
3. Computer Literacy at Work
Computer literacy is a requirement in most professions today. Based on your course of
study, identify two potential jobs (using resources such as Monster.com) that you
would consider applying for after graduation. Research these professions and deter-
mine what the computer literacy requirements are for these types of jobs. How would
you go about proving to a potential employer that you possess the requisite skill set?
4. Using Video in Your Business
With the widespread use of video on the Web, many companies find it essential to have
an online video presence to generate interest in their products. Review a few of the
“Will It Blend?” videos produced by Blendtec (blendtec.com/willitblend). These sim-
ple videos became cult hits on YouTube and remarkably increased Blendtec’s sales of
its high-end blenders. Assume you are working for a company that makes graphic
T-shirts. What types of videos could you deploy that would increase awareness of your
shirts? If you worked for a local restaurant and bar, what types of videos would draw
customers to your business?
5. Social Media Careers
With the explosion of users on social media sites, businesses need to establish their pres-
ence on social media sites. Just search for “Vans” or “Subway” on Facebook for examples
of company sites. To manage their interaction with customers (and fans), companies need
to hire social media managers. Using a job site such as Monster.com, search on social
media manager and review the job postings. What are the educational requirements for
social media managers? What technical skills do these jobs require? Given your major,
what companies would you do well for as a social media manager? What steps should
you take while in school to prepare yourself for a career as a social media manager?
6. Portfolio of Electronic Skills
Job seekers want to highlight their skills for prospective employers—show employers
both what they can do right now to contribute and provide evidence that they can learn
quickly and grow into new technologies and new responsibilities. What skills could
you place in a portfolio to demonstrate your current mastery of computer concepts and
computer applications? How would you document for your employer your ability to
learn, quickly adapt to changes in technology, and acquire new skills?
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
2. Interactive Art
This chapter briefly discusses the integration of computer technology and art. Pieces
like Flight Time at the Museum of Modern Art use the vast amounts of data around us
to create images and interactive exhibits that are visually exciting. What kind of design
can you envision that brings the data around us into an interactive, visual experience of
beauty? What computer skills would you need to acquire to make that a reality?
3. Perception of Truth
As you learned in the chapter, computer simulations are incredibly sophisticated tools.
Given that the public knows that images and videos can be easily edited digitally, what
role do you think simulations will play in the legal system? What impact would a sim-
ulation, a video, or an image have on a jury in deciding “truth” when the public knows
that these items can be manipulated digitally? Perception plays a role in the integration
of computers to other arenas as well. How do you think public perception of comput-
ers impacts a patient’s decision to use a digital “surgeon” like the da Vinci robotic
surgery system?
5. Affective Computing
Affective computing is the science that attempts to produce machines that understand
and can respond to human emotions and social mores. Do you think humans will ever
create a machine that cannot be distinguished from a human being? In your opinion,
what are the ethical and moral implications associated with that development?
31
one
one team time
chapter
Problem
People are often overwhelmed by how quickly technology changes and by how frustrating
it can be not to know how to use it easily. In response, some people react by using only the
minimum technology they need. In this Team Time, we consider how that reaction might
limit the options available in a career path and what strategies might assist someone in
becoming more comfortable with the pace of technological change.
Task
Talk to the members of your group and find out what each person is most passionate
about—a hobby, a field of study, or some other personal interest. Your mission is to investi-
gate technological tools that would be useful in developing that area of passion and interest
into a career.
Process
Divide the class into three or more teams.
1. With the other members of your team, use the Internet to research up-and-coming tech-
nologies that would support your interests. Do people use social media tools to connect
into groups to exchange ideas? What computer hardware would let you turn your
hobby into a marketable product? What software programs would you need to pursue
turning your interest into a professional career? Prepare a list of skills, tools, and expe-
riences that would prepare you with the technological training to succeed.
2. Present your group’s findings to the class for debate and discussion. How many of
these skills do you have under your belt already? What access do you need to learn the
rest? What new tools will appear in the next four years that you may need to know
after graduation?
3. Write a strategy paper that details how you plan to make sure you have the computer
skills and exposure to put you in a strong position to start your career. Note any barri-
ers you may have to overcome—for example, finding access to the software programs,
getting enough time on specialized equipment, or finding the right training.
Conclusion
The future of technology is unknown, but we do know that the career options available in
four years will include many job paths that don’t even exist today. To be prepared to take
advantage of the opportunities that technology will bring, no matter what area you are
interested in pursuing, will take good planning and attention. Begin now—learn how to
stay on top of technology.
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; regardless, your re-
search and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together team members will agree
on an ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has violated
DRM rules.
2. Team members should write a summary that provides background information for
their character—for example: artist/creator, consumer, or arbiter—and details their
character’s behaviors to set the stage for the role-playing event. Then team members
should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using either the chat room feature of MyITLab or the discussion board feature of Black-
board or by meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presentation
for review by the rest of the class, along with the summary and resolution they developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
33
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
00010010001000100000011111111100000000001101000100101
00000001101000100101010010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
11111100000000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
11111100000000001101000100101010010101000010000100000
10101000010000100000010010001000100000011111111100000
00000011111111100000000001101000100101010010101000010
00000010010001000100000011111111100000000001101000100
D
o you ever wonder how big the first personal computer was, or how
much the first portable computer weighed? Computers are such an
integral part of our lives that we don’t often stop to think about how far
they’ve come or where they got their start. In just 35 years, computers
have evolved from expensive, huge machines that only corporations
00011 1 1 1to1small,
owned 111 0 0 0 0devices
powerful 0 0 0found
0 0 0in1millions
1 0 1 0of0homes.
0 1 0In0this
1 0Technology
1010010101000010000
0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1we
in Focus feature, we look at the history of the computer. Along the way, 00 0100000011111111
will
discuss some developments that helped make the computer powerful and
01000 1000
portable, as0 0 0as1some
well 1 1 people
1111 who11 0 0 0 0 0to0its0development.
contributed 0 0 0 1 1 0However,
1000100101010010101
01000 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0
we will start with the story of the personal computer and how it grew to0 00be1as0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0
00010 0 1 0to0our
integral 0 1lives
0 0as0the
1 0automobile
0 0 0 0 0is.1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1
00000001101000100101010010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
34 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
0100101010000100001000000100100010001000000111111111000
0001000000111111111000000000011010001001010100101010000
0001001010100101010000100001000000100100010001000000111
0100100010001000000111111111000000000011000111111111000
0001000000111111111000000000011010001001010100101010000
000100 The
1 0 First
1 0 1 0Personal
0101010000100001000000100100010001000000111
010010 Computer:1The
0 0 1 0 0 0 0 0 0Altair
0 0 0 1 1 1 1 1 1 1 1 1 0 0Why0 0 0Was000 It0Called
0 1 1 0the1 0“Altair”?
001001010100
0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0For 0 lack
1 0of 0 a0better
0 1 0name,
0 0 the
0 0Altair’s
0 1 0develop-
0100010001
Our journey through the history of the personal
000100 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 0 0 0ers
computer starts in 1975. At that time, most peo-
1 originally
0 0 1 0called
1 0 1the
0 computer
01010 the1PE-8,
0000100001
01010 0were
ple 101 0 1 0 0with
unfamiliar 001 the0mainframes
0 0 0 1 0 and
0 0 0 0 0 1 0short
0 1for
00 0 1 0Electronics
Popular 0 0 1 0 8-bit.
0 0 0However,
0 0 1 1Les1 1 1 1 1 1 1
supercomputers that large corporations and the Soloman, the Popular Electronics writer who
government owned. With price tags exceeding introduced the Altair, wanted the machine to
the cost of buildings, and with few if any practi- have a catchier name. The author’s daughter,
cal home uses, these monster machines were not who was watching Star Trek at the time,
appealing or attainable to the vast majority of suggested the name Altair. (That’s where the
Americans. That began to change when the Jan- Star Trek crew was traveling that week.) The
uary 1975 cover of Popular Electronics announced first star of the PC industry was born.
the debut of the Altair 8800, touted as the first
personal computer (see Figure 1). For just $395 Figure 1
for a do-it-yourself kit or $498 for a fully assem-
bled unit (about $2,000 in today’s dollars), the
price was reasonable enough that computer fa-
natics could finally own their own computers.
The Altair was a very primitive computer,
with just 256 bytes (not kilo bytes, just bytes) of
memory. It didn’t come with a keyboard, nor did
it include a monitor or printer. Switches on the
front of the machine were used to enter data in
machine code (strings of 1s and 0s). Flashing
lights on the front indicated the results of a pro-
gram. User-friendly it was not—at least by
today’s standards. In 1975, the Altair was touted as the “world’s
Despite its limitations, computer “hackers” first minicomputer” in the January issue of
(as computer enthusiasts were called then) Popular Electronics.
flocked to the machine. Many people who
bought the Altair had been taught to program,
but until that point, they had access only to big,
(a program that translates user commands into
clumsy computers. These people were often
commands that the computer can understand)
hired by corporations to program routine finan-
for the Altair. The two friends later convinced the
cial, statistical, or engineering programs in a
Altair’s developer, Ed Roberts, to buy their pro-
workplace environment. The Altair offered these
gram. This marked the start of a small company
enthusiasts the opportunity to create their own
called Microsoft. We’ll get to that story later. First,
programs. Within three months, Micro Instru-
let’s see what their future archrivals were up to.
mentation and Telemetry Systems (MITS), the
company behind the Altair, received more than
4,000 orders for the machine.
The release of the Altair marked the start of the
The Apple I and II
0 0 0 0 0personal
0 1 0 0computer
1 0 0 0(PC)1 0boom.
0 0 1In0fact,
0 0two
0 0men
0 1 1 1 1Around
1111 1time
the 0 0 the
0 0Altair
000 00
was 0110
released, 10001001
Steve
000000000011010001001010100101010000100001000000100100
who would play large roles in the development Wozniak, an employee at Hewlett-Packard,
0 0 0 1 0of0the
00 PC1were
0 0among
0 0 0 the
0 1first
0 0Altair
100 0 1 0Re-
owners. 0 0 1 0was
0 0becoming
0 0 0 1 fascinated
1 1 1 1 1with 1 1the
1 0burgeoning
00000000011
cent high school graduates Bill Gates and Paul personal computer industry and was dabbling
1 1 1 1 1Allen
1 1 were
1 1 0so0enamored
0 0 0 0 by 00 0 0 1 1 0 1 0
this “minicomputer,”0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0
with his own computer design. He would 0 0 0 1bring
00001000
1 0 0 1 0as1these
0 1 personal
0 0 0 0computers
1 0 0 0 0were 1 0called
0 0 0at0the
0 1 0 0 1his
00 0 1 0 0prototypes
computer 0 1 0 0 0to0meetings
0 0 1 1of1the 111111000
001000000111111111000000000011010001001010100101010000
time, that they wrote a compiling program Homebrew Computing Club, a group of young
001001010100101010000100001000000100100010001000000111
1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0Technology
0 0 0 1 1in0Focus:
0 0 1The
1 1History
1 1 1of1the
11 PC0 0 035
001000000111111111000000000011010001001010100101010000
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
0 0 0 1Figure
0 0 120Steve
0 0 Jobs
1 0(a)00and
10000 b 0011111111100000000001101000100101
Steve Wozniak (b) were two
0 0 0 0computer
0 0 0 1hobbyists
1 0 1 0who 00 100101010010101000010000100000010010001
worked
1 0 0 0together
0100 to form the Apple 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1
0 0 0 0 1 0
1 1 1 1Computer
1 1 0 0Company.
000000001101000100101010010101000010000100000
0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1Figure 0 0 030The 0 first
0 1Apple
0010001
1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1computer,
1 1 1 0the
0 Apple
000 0 0 0like
I, looked 001101
1 1 1 1 1 a1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1a0typewriter
1 0 0 0in0a 1 0 It0was
box. 0 0one
100000
10101000010000100000010010001000100000011111111100000 of the first computers
to incorporate
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0a1keyboard. 01000010
00000010010001000100000011111111100000000001101000100
computer fans in Palo Alto, California who met Previously, the operating system had to be
to discuss computer ideas. Steve Jobs, who was rewritten every time the computer was turned on
working for computer game manufacturer Atari The friendly features of the operating system on
at the time, liked Wozniak’s prototypes and the Apple II, such as automatic loading, encour-
made a few suggestions. Together, the two built aged less technically oriented computer enthusi-
a personal computer, later known as the Apple I, asts to try writing their own software programs.
in Wozniak’s garage (see Figures 2 and 3). In An instant success, the Apple II would be the
that same year, on April 1, most successful product in the
1976, Jobs and Wozniak offi- company’s early line, outshin-
cially formed the Apple ing even its successor, the
Computer Company. Apple III, which was released
No sooner had the Apple I in 1980. Eventually, the Apple II
hit the market than Wozniak would include a spreadsheet
began working to improve it. program, a word processor, and
A year later, in 1977, the desktop publishing software.
Apple II was born (see Fig- These programs gave personal
ure 4). The Apple II included computers like the Apple func-
a color monitor, sound, and tions beyond gaming and spe-
game paddles. Priced around cial programming, and led to
$1,300 (almost $4,700 in their increased popularity. We
today’s dollars), it included will talk more about these ad-
4 kilobytes (KB) of random vances later. For now, we will
access memory (RAM) as look at which other players
well as an optional floppy were entering the market.
disk drive that enabled users
to run additional programs.
00011 1 1of1these
Most 1 1 programs
1 1 0 0 0were00000001101000100101010010101000010000
01010 0 1 0However,
games. 1 0 1 0for 00 0 1 0 0and
many 0 0an1external
0 0 0floppy
0 0 0disk
10 Enter the
Figure 4 The Apple II came with a monitor
010001000100000011111111
drive.
01000100000011111111100000000001101000100101010010101
users, there was a special ap-
peal to the Apple II: The pro-
Competition
01000 10010101001010100001000
gram that made the computer function when the
0100000010010001000100000
Around the time that Apple was experiencing
00010 010
power 0 first
was 0 1 turned
0001 on0(the
0 0operating
0 0 0 1sys-
111111 1 1 0with
success 0 0its
0 computers,
000000 1 1 0 1of0com-
a number 00100101
00000 00
tem) was11 010
stored in 0 0 1 0 0memory
read-only 1 0 1 0(ROM).
1001010 1 0 0entered
petitors 0010 the0market.
0010 00
The 000
largest 10010001
among
10000100000010010001000100000011111111100000000001101
36 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
them
010010 1 0were
1 0 Commodore,
0 0 0 1 0 0RadioShack,
0 0 1 0 0 0and00 IBM.
0100100010001000000111111111000
As Figure 5 shows, just a few years after the
000100 0 0 0 0 1of1the
introduction 1 1Altair,
1 1 1the
1market
1000 00
was 0000011
filled Why0 1 Is
0 0It0Called
1 0 0 1“Apple”?
010100101010000
000100 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1
with personal computers from a variety of 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 010001000000111
Steve Jobs wanted Apple Computer to be the
010010 0010001000000111111111000
manufacturers. 0 0 0computer
“perfect” 0 0 0 0 company.
1 1 0 0Having
0 1 1 recently
1111111000
0001000000111111111000000000011 010
worked at0an0apple
1 0 orchard,
0 1 0 1Jobs 0 1thought
0 0 1of0the1010000
The Commodore PET and TRS-80
0001001010100101010000100001000000100100010001000000111 apple as the “perfect” fruit because it was high
010010 0 0 1Apple’s
Among 0001 0 0 0 0competitors
strongest 0 0 1 1 1were
1 1 the
1111000 in 0 0000
nutrients, 0 0in1a1nice
came 01 0 0 0and
package, 1 0was
01010100
not easily damaged. Thus, he and Wozniak de-
000001 1 0 1 0 0 PET
Commodore 0 1 2001,
0 0 1shown
0 1 0in1Figure
0 0 16,0and1010000 1 0to0name
cided
0 0 their
100 new
0 computer
00010 0100010001
company
Tandy RadioShack’s TRS-80, shown in Figure 7.
000100 0000100100010001000010001 001010100101010000100001
Apple.
Commodore introduced the PET in January
01010 0 1It0was
1977. 1 0featured
1 0 0 0on0the
10 0 0of0Popular
cover 1000 000100100010001000000111111111
Sci-
ence in October 1977 as the “new $595 home
computer.” Tandy RadioShack’s home computer
also garnered immediate popularity. Just one
month after its release in 1977, the TRS-80 Model Figure 5
1 had sold approximately 10,000 units. Priced at Personal Computer Development
$594.95, the easy-to-use machine included a
monochrome display and 4 KB of memory. YEAR APPLE IBM OTHER
Many other manufacturers followed suit over
the next decade, launching new desktop 1975 MITS Altair
computers, but none were as successful as
1976 Apple I
the TRS-80 and the Commodore.
1977 Apple II Tandy RadioShack’s
TRS-80
The Osborne
Commodore PET
The Osborne Company introduced the indus-
try’s first portable computer, the Osborne, in 1980 Apple III
April 1981 (see Figure 8). Although portable, the
computer weighed 24.5 pounds, and its screen 1981 IBM PC Osborne
was just five inches wide. In addition to its hefty
weight, it came with a hefty price tag of $1,795. 1983 Lisa
Still, the Osborne included 64 KB of memory,
two floppy disk drives, and preinstalled pro- 1984 Macintosh 286-AT IBM PC clones
grams such as word processing and spreadsheet
software. The Osborne was an overnight success,
and its sales quickly reached 10,000 units per
month. Despite the Osborne’s popularity, the
000000100100010001000000111111111000000000011010001001
000000000011010001001010100101010000100001000000100100
000100001000000100100010001000000111111111000000000011
111111111000000000011010001001010100101010000100001000
1 0 0 1 0Figure
101 60The0Commodore
0 0 1 0 0PET0was
0 1well
00 0000100100010001000000111111111000
received
0 0 1 0 0because
0 0 0of0its1all-in-one
1 1 1 1design.
1111000000000011010001001010100101010000
0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0Photo
00 00100100010001000000111
Courtesy of The Computer History Museum
00011111111100000000001101000100101010010101000010000
01010010101000010000100000010010001000100000011111111
01000100000011111111100000000001101000100101010010101
0100010 0101010010101000010000100000010010001000100000
Figure 9 The IBM PC was the first (and only) nonhuman object chosen as “man of the year” (actually,
0001001 0 0 0of1the
“machine 00 0 1by0Time
year”) 0 0magazine.
0 0 0 1This1 1designation,
11111 1 0 0January
in Time’s 0 0 01983
0 0issue,
0 0indicated
0 1 1 0the 1000100101
0000000 1 1the
impact 0 1PC0was
00 1 0 on
having 01 the0general
1 0 1public.
0010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
38 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
The
010010 1 0Importance
1 0 0 0 0 1of 00BASIC
001000000100100010001000000111111111000
000100 0 software
The 0 0 0 1industry
1 1 1 1began
1 1 1in1the
0 1950s
0 0 0with
0 0the
000011010001001010100101010000
000100 1 0 1 0 1 of
development 00 101010
programming 0 0 0 1such
languages 0 0as
001000000100100010001000000111
0100100010001000000111111111000000000011000111111111000
FORTRAN, ALGOL, and COBOL. These lan-
guages were used mainly by businesses to create
000100 0 0 0 0statistical,
financial, 1 1 1 1and 1 1engineering
1 1 1 0 0programs
0000000011010001001010100101010000
000100
for1corporate
0 1 0 1enterprises.
0 0 1 0 1 However,
0 1 0 0 0the01964
1 0 in-
0001000000100100010001000000111
010010 0 0 1 0of
troduction 0 Beginners
0 1 0 0 0All-Purpose
0 0 0 1 1 Symbolic
1111111000000000011010001001010100
000001 10100
Instruction 0 1(BASIC)
Code 0 0 1 0revolutionized
1 0 1 0 0 1 the01010000100001000000100100010001
software industry. BASIC was a programming
000100 0 0 0 0that
language 10 the0beginning
10001 0001000010001001010100101010000100001
programming
01010 0 1 0could
student 101 0 0learn.
easily 0 0 1It0thus
0 0became
01000000100100010001000000111111111
enormously popular—and the key language of
the PC. In fact, Bill Gates and Paul Allen (see
Figure 10) used BASIC to write their program for Figure 10 Bill Gates and Paul Allen are the founders of
the Altair. As we noted earlier, this program led to Microsoft.
the creation of Microsoft, a company that pro-
duced software for the microcomputer.
The Graphical User Interface 1983 Lotus 1-2-3: Added integrated charting,
plotting, and database capabilities to
Another important advancement in personal spreadsheet software.
computers was the introduction of the graphical Word for MS-DOS: Introduced in the pages of
user interface (GUI), which allowed users to PC World magazine on the first magazine-
interact with the computer more easily. Until inserted demo disk.
00011 1 time,
that 1 1 1users
1 1had
1 0to0use
0 0complicated
0000001101000100101010010101000010000
01010 0 1 0 1 or
command- 01 0 0 0 0 1 interfaces
menu-driven 00001 to0 0 0 0 0 0 11985
interact 0 0 1 0Excel:
001 One0of0the
0first
1 0spreadsheets
00000 1 1a 1 1 1 1 1 1
to use
graphical user interface.
01000 1 0the0computer.
with 0 0 0 0 1Apple
111 11
was the1first
1 1company
00000000001101000100101010010101
to take full commercial advantage of the GUI,
01000 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0PageMaker:
but competitors were fast on its heels, and soon
00001 The first desktop publishing
0010001000100000
software.
00010
the0GUI
1 0became
0010 0 0 1 0 0with
synonymous 000 011111111100000000001101000100101
personal
00000 00110
computers. 1 0developed
Who 00100 the1idea
0 1of0the
1 0GUI?
010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
40 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
0100101010000100001000000 Figure
1 0 13
0 1The
0 Alto
0 0was1 0the0first
0 1computer
0 0 0 0to0use 0111111111000
a graphical user interface, and it provided the basis
0001000000111111111000000 for0the
0 GUI
0 0that
1 1Apple
0 1used.
0 0However,
0 1 0 0because
1 0 1of0 1 0 0 1 0 1 0 1 0 0 0 0
0001001010100101010000100 marketing problems, the Alto never was 0
0 0 1 0 0 0 0 0 0 1 0 0 1 0 010001000000111
sold.
0100100010001000000111111111000000000011000111111111000
0001000000111111111000000000011010001001010100101010000
0001001010100101010000100001000000100100010001000000111
Photo Courtesy of The Computer History Museum
0100100010001000000111111111000000000011010001001010100
0000011010001001010100101010000100001000000100100010001
0001000000100100010001000010001001010100101010000100001
Figure 14 The Lisa was
0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 the 1 0first
00 0 0 0to
computer 111111111
introduce a GUI to the
market. Priced too high, it
never gained the popularity
it deserved.
shown in Figure 14. Named after Apple founder users to view multimedia on the Web, causing In-
Steve Jobs’s daughter, the Lisa was the first suc- ternet traffic to increase by nearly 350 percent.
cessful PC brought to market that used a GUI. Meanwhile, companies discovered the Internet
Legend has it that Jobs had seen the Alto during as a means to do business, and computer sales
a visit to PARC in 1979 and was influenced by took off. IBM-compatible PCs became the per-
its GUI. He therefore incorporated a similar user sonal computer system of choice when, in 1995,
interface into the Lisa, providing features such Microsoft (the predominant software provider to
as windows, drop-down menus, icons, a PCs) introduced Internet Explorer, a Web browser
hierarchical file system with folders and files, that integrated Web functionality into Microsoft
and a point-and-click device called a mouse. The Office applications, and Windows 95, the first
only problem with the Lisa was its price. At Microsoft OS designed to be principally a GUI
$9,995 ($21,530 in today’s dollars), few buyers OS, although it still was based on DOS.
were willing to take the plunge. About a year earlier, in mid-1994, Jim Clark,
A year later, in 1984, Apple introduced the founder of the computer company Silicon
Macintosh, shown in Figure 15. The Macintosh Graphics Inc., Marc Andreessen, and others
was everything the Lisa was and then some, from the Mosaic development team developed
and at about a third of the cost.
The Macintosh was also the first
personal computer to utilize 3.5-
inch floppy disks with a hard
cover, which were smaller and
sturdier than the previous 5.25-
inch floppies.
Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms and concepts
from this Technology in Focus feature.
1. What was the name of the first Web browser? 6. Which computer first stored its operating system in
a. Mosaic c. Netscape ROM?
b. Internet Explorer d. Firefox a. Apple I c. Lisa
b. Apple II d. Macintosh
2. Which programming language revolutionized the
software industry? 7. What was the first word processing application?
a. ALGOL c. COBOL a. Lotus 1-2-3 c. WordPerfect
b. BASIC d. FORTRAN b. Word for MS-DOS d. WordStar
3. Why was the invention of the integrated circuit 8. Which components are characteristic of second-
important? generation computers?
a. It enabled computers to store more data. a. Transistors
b. It enabled monitors to display a better image. b. Vacuum tubes
c. It enabled more processing memory. c. Integrated circuits
d. It enabled computers to become smaller and lighter. d. Microprocessor chips
4. Which computer is touted as the first personal 9. For what is the Atanasoff-Berry Computer best
computer? known?
a. Altair c. Lisa a. It was the first computer used to tabulate U.S.
b. Commodore PET d. Osborne census data.
b. It was the first computer to use the binary system.
5. What was the importance of the Turing machine to
c. It was the first computer to incorporate the punch-
today’s computers?
card system.
a. It described a system that was a precursor to
d. It was the first computer used as a mechanical
today’s notebook computer.
calculator.
b. It was the first electronic calculator and a precursor
to the computer. 10. Who are the founders of Microsoft?
c. It was the first computer to have a monitor. a. Paul Allen and Bill Gates
d. It described a process to read, write, and erase b. Bill Gates and Steve Wozniak
symbols on a tape and was the precursor to today’s c. Steve Jobs and Bill Gates
RAM. d. Bill Gates and Gary Kildall
looking at
computers
understanding the parts
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What exactly is a computer, and what are its four main functions? (p. 48)
2. What is the difference between data and information? (p. 48)
3. What are bits and bytes, and how are they measured? (pp. 48–49)
4. What devices do I use to get data into the computer? (pp. 51–60)
5. What devices do I use to get information out of the computer? (pp. 60–66)
6. What’s on the motherboard? (pp. 67–68)
7. Where are information and programs stored? (pp. 69–71)
8. How are devices connected to the computer? (pp. 71–75)
9. How do I set up my computer to avoid strain and injury? (pp. 77–79)
multimedia resources
multimedia
resources
Active Helpdesk
• Understanding Bits and Bytes (p. 49)
• Using Input Devices (p. 58)
• Using Output Devices (p. 62)
• Exploring Storage Devices and Ports (p. 72)
Sound Bytes
• Binary Numbers Interactive (p. 48)
• Tablet and Notebook Tour (p. 56)
• Virtual Computer Tour (p. 68)
• Port Tour: How Do I Hook It Up? (p. 72)
• Healthy Computing (p. 77)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? If you have ever thought
about customizing the layout of your keyboard, this Luxeed Dynamic
Pixel LED Keyboard is the one for you. If you’re a gamer, you can program specific
keys to control your game and to glow with different colors that indicate each key
action. If you’re not a gamer but just would like to add a bit of fun to your
otherwise dull keyboard, you can animate colored scenarios to “play” on the
keys, or create an illuminated pattern or design. With 430 LEDs, the Luxeed is
capable of individually lighting each key in your choice of color.
The keyboard comes in either black or white. The keys of the white keyboard light
up more brightly and have a
semitransparent look. The
keys of the black keyboard
can be set so just the letters
light up.
47
Understanding Your or presented in a meaningful fashion. When
your computer provides you with a contact
Computer listing that indicates Zoe Richardson can be
After reading Chapter 1, you can see why reached by phone at (713) 555-3297, then the
becoming computer literate is so important. previous data suddenly becomes useful—
But where do you start? You’ve no doubt that is, it becomes information.
gleaned some knowledge about computers How do computers interact with
just from being a member of society. How- data and information? Computers are
ever, although you have undoubtedly used a excellent at processing (manipulating,
computer before, do you really understand calculating, or organizing) data into
how it works, what all its parts are, and information. When you first arrived on
what these parts do? In this section, we campus, you probably were directed to a
discuss what a computer does and how its place where you could get an ID card. You
functions make it such a useful machine. most likely provided a clerk with personal
data (such as your name and address) that
was entered into a computer. The clerk then
Computers Are Data took your picture with a digital camera
Processing Devices (collecting more data). This information was
then processed appropriately so that it could
Strictly defined, a computer is a data
be printed on your ID card (see Figure 2.1).
processing device that performs four major
This organized output of data on your ID
functions:
card is useful information. Finally, the
1. It gathers data, or allows users to input information was probably stored as digital
data. data on the computer for later use.
2. It processes that data into information.
3. It outputs data and information. Bits and Bytes: The Language
4. It stores data and information. of Computers
What is the difference between How do computers process data into
data and information? People often information? Unlike humans, computers
use the terms data and information inter- work exclusively with numbers (not words).
changeably. Although they may mean the To process data into information, computers
same thing in a simple conversation, the need to work in a language they understand.
actual distinction between data and infor-
mation is an important one.
In computer terms, data is a representa- SOUND Binary Numbers
BYTE Interactive
tion of a fact, a figure, or an idea. Data can
be a number, a word, a picture, or even a
recording of sound. For example, the This Sound Byte helps remove the mystery surround-
number 7135553297 and the names Zoe and ing binary numbers. You’ll learn about base conversion
Richardson are pieces of data. Alone, these between decimal, binary, and hexadecimal numbers
pieces of data probably mean little to you. interactively using colors, sounds, and images.
Information is data that has been organized
Figure 2.1
Computers process data GGrraammeercrcyySSt.t.
into information. Zoe
Zoe Zoe
Richardson
Richardson Richardson
H
Hoo
uuss
tonn
to 5211
5211 73300 ID# 216-730
2211667
TX
TX 5211 Gramercy St.
Houston, TX 77021
7
7 7
0 20121 (713) 555-3297
7
Processing data
Input data Output information
into information
Kilobyte KB 1,024 bytes (210) Can hold 1,024 characters or about half of a double-
spaced typewritten page.
Megabyte MB 1,048,576 bytes (220 bytes) Can hold approximately 768 pages of typed text.
Gigabyte GB 1,073,741,824 bytes (230 bytes) Approximately 786,432 pages of text; 500 sheets of
paper is approximately 2 inches, so this represents a
stack of paper 262 feet high.
Terabyte TB 1,099,511,627,776 bytes (240 bytes) This represents a stack of typewritten pages almost
51 miles high.
Petabyte PB 1,125,899,906,842,62 bytes (250 bytes) The stack of pages is now 52,000 miles high, or
approximately one-fourth the distance from the Earth
to the moon.
Exabyte EB 1,152,921,504,606,846,976 bytes (260 bytes) The stack of pages is now 52 million miles high, or
just about twice the distance between the Earth and
Venus.
Zettabyte ZB 1,180,591,620,717,411,303,424 bytes (270 bytes) The stack of pages is now 52 billion miles high. That’s
some 20 times the distance between the Earth and
Pluto.
Input Output
Storage
Figure 2.4
different computer programs at Each part of the computer
the same time. serves a special function.
• A supercomputer is a specially de-
signed computer that can perform
complex calculations extremely rapidly. ing of documents and other resources. We
Supercomputers are used in situations begin our exploration of hardware by looking
in which complex models requiring at your computer’s input devices.
intensive mathematical calculations are
needed (such as weather forecasting or
atomic energy research). The main Input Devices
difference between a supercomputer An input device enables you to enter data
and a mainframe is that supercomputers (text, images, and sounds) and instructions
are designed to execute a few programs (user responses and commands) into the
as quickly as possible, whereas main- computer. The most common input devices
frames are designed to handle many are the keyboard and the mouse. A
programs running at the same time but keyboard is used to enter typed data and
at a slower pace. commands, and a mouse is used to enter
• An embedded computer is a specially user responses and commands.
designed computer chip that resides in There are other input devices as well.
another device, such as your car or the Microphones input
electronic thermostat in your home. sounds, and scanners
Embedded computers are self-contained and digital cameras
computer devices that have their own input nondigital text and
programming and typically do not digital images, respectively.
receive input from you or interact A stylus is an input
with other systems. device that looks
like a skinny
In the following sec- pen but has
tions, we look more no ink. You
closely at your use it like a
computer’s hard- mouse or pen
ware. Each part has a to tap commands
specific purpose that or draw on a screen.
coordinates with one of Electronic pens are
the functions of the com- also becoming quite
puter—input, processing, out- popular and are often
put, or storage (see Figure 2.4). used in conjunction
Additional devices, such as Figure 2.5 with graphics tablets that
modems and routers, help a computer An electronic pen is a type can translate a user’s
communicate with the Internet and of input device that is used handwriting into digital input
other computers to facilitate the shar- with graphics tablets. (see Figure 2.5).
Input Devices 51
How do notebook keyboards
differ? To save space and weight, some of
the smaller notebook keyboards (14⬙ and
under) are more compact than standard
desktop keyboards and, therefore, have
fewer keys. To retain the same functionality
as a standard keyboard, many of the note-
book keys have alternate functions. For ex-
ample, many notebook keyboards do not
have a separate numeric keypad. Instead,
some letter keys function as number keys
when they are pressed in combination with
another key such as the function (Fn)
key. The keys you use as numeric keys on
notebooks have number notations on
them so you can tell which keys to use
Figure 2.6
Keyboards (see Figure 2.7).
QWERTY keyboard layout. What if the standard keyboard
Aren’t all keyboards the same? Most doesn’t work for me? Because recent
desktop and notebook computers come development efforts have focused on reduc-
with a standard QWERTY keyboard (see ing the size and weight of notebook comput-
Figure 2.6). This keyboard layout gets its ers, the keyboards have had to shrink
name from the first six letters in the top-left accordingly. Flexible keyboards are a terrific
row of alphabetic keys on the keyboard and is alternative if you want a full-sized keyboard
the standard English-language keyboard lay- for your notebook. You can roll one up, fit it
out. Over the years, there has been some de- in your backpack, and plug it into the USB
bate over what is the best keyboard layout. port when you need to use it. The virtual
The QWERTY layout was originally designed laser keyboard (see Figure 2.8a) is about the
for typewriters and was meant to slow typists size of a cellular phone. It projects the image
down and prevent typewriter keys from jam- of a keyboard on any surface, and sensors
ming. Although the QWERTY layout is con- detect the motion of your fingers as you
sidered inefficient because it slows typing “type” on a desk or other flat surface. Data
speeds, efforts to change to more efficient lay- is transmitted via Bluetooth technology,
outs, such as that of the Dvorak keyboard, which is a wireless transmission standard
have not been met with much public interest. that facilitates the connection of electronic
The Dvorak keyboard is an alternative key- computing devices such as cell phones,
board layout that puts the most commonly smartphones, and computers to peripheral
used letters in the English language on “home devices such as keyboards and headsets.
keys,” which are the keys in the middle row We’ll discuss Bluetooth in further detail
Figure 2.7 of the keyboard. The Dvorak keyboard’s de- in Chapter 8.
On many notebooks, sign reduces the distance your fingers travel Gamers love keyboards such as the DX1
certain letter keys can for most keystrokes, increasing typing speed. from Ergodex (see Figure 2.8b). These key-
function as number keys. boards allow placement of the keys in any
position on the keyboard pad. The keys can
be programmed to execute individual
keystrokes or macros (a series of tasks) to
perform specific tasks. This makes it easy for
gamers to configure a keyboard in the most
desirable way for each game they play.
How can I use my keyboard most
efficiently? All keyboards have the
standard set of alphabetic and numeric
keys that you regularly use when typing.
As shown in Figure 2.9, many keyboards
for notebook and desktop computers have
additional keys that perform special
functions.
Multimedia controls
Function keys Internet controls
Toggle and
other keys
Numeric
keypad
Control (Ctrl) key Windows key Alt key Windows key Cursor control keys
Input Devices 53
• The Windows key is specific to the to facilitate attaching other devices, such as
Windows operating system. Used alone, a mouse or a keyboard.
it opens the Start menu, although you Another set of controls on standard key-
use it most often in combination with boards are the cursor control keys that move
other keys to perform shortcuts. For your cursor (the flashing symbol on the
example, in Windows 7 and Vista, monitor that indicates where the next char-
pressing the Windows key plus the acter will be inserted). A cursor control key
M key minimizes all windows, and the is also known as an arrow key because each
Windows key plus the L key locks a one is represented by an arrow on standard
computer (a good habit to get into when keyboards. The arrow keys move the cursor
you use a computer in a group setting one space at a time in a document: up,
such as a business office). down, left, or right.
What are some other features on Above the arrow keys, you’ll usually find
keyboards? Some keyboards (such as the Page Up (PGUP) and Page Down (PGDN)
one shown in Figure 2.9) also include keys that move the cursor up or down one
multimedia and Internet keys or buttons full page or even to the document’s begin-
that enable you to open a Web browser, view ning (Home), or to the end of a line of text or
e-mail, access Help features, or control your document (End). The Delete (Del) key allows
CD/DVD player. These buttons are not you to delete characters, and the Insert key
always in the same position on every key- allows you to insert or overwrite characters
board, but the symbols on top of the buttons within a document. The Insert key is a toggle
generally help you determine their function. key because its function changes between one
Some desktop keyboards include USB ports of two options each time you press it: When
toggled on, the Insert key inserts new text
BITS within a line of existing text. When toggled
AND Keystroke Shortcuts off, the Insert key replaces (or overwrites)
BYTES existing characters with new characters as
you type. Other toggle keys that switch
Did you know that you can combine certain keystrokes to take shortcuts within between an on state and an off state include
an application, such as Microsoft Word, or within the operating system itself? The the Num Lock key and the Caps Lock key.
following are a few of the most helpful Windows shortcuts. Use them to make more Are all conventional keyboards
efficient use of your time. For more shortcuts for Windows-based PCs, visit support. connected to the computer via
microsoft.com. For a list of shortcuts for Macs, see apple.com/support. wires? Although most desktop PCs ship
with wired keyboards, wireless keyboards
Text File Cut/Copy/ Windows are available. Wireless keyboards are pow-
Formatting Management Paste Controls ered by batteries. They send data to the
computer using a form of wireless technol-
CTRL+B Applies CTRL+O Opens the CTRL+X Cuts Alt+F4 Closes the
ogy that uses radio frequency (RF). A radio
(or removes) Open dialog box (removes) selected current window
bold formatting text from document transmitter in the keyboard sends out radio
to selected text and stores in wave signals that are received either
Clipboard through a small receiving device that is
plugged into a USB port or a Bluetooth
CTRL+I Applies CTRL+N Opens a CTRL+C Copies Windows Key+
(or removes) new document selected text to Tab Cycles through
receiving device that is contained in the
italic formatting Clipboard open programs system unit. RF keyboards used on home
to selected text using Flip 3-D computers can be placed as far as 6 feet to
30 feet from the computer, depending on
CTRL+U Applies CTRL+S Saves a CTRL+V Pastes Windows Key+L their quality. RF keyboards that are used in
(or removes) document selected text Locks the
underlining to (previously cut or computer business conference rooms or auditoriums
selected text copied) from can be placed as far as 100 feet away from
Clipboard the computer, but they are far more expen-
sive than traditional wired keyboards.
CTRL+P Opens the Windows Key+F
Print dialog box Opens the Search
(Find Files) dialog Mice and Other Pointing Devices
box
What kinds of mice are there? The
mouse type you’re probably most familiar
with is the optical mouse (see Figure 2.10a).
Input Devices 55
a bottom of the • Web search: Allows you to quickly
mouse for highlight a word or phrase and then
easy storage press the search button on the mouse to
when not in start a Web search.
use. • File storage: Includes a wireless USB
Apple has receiver that contains flash memory to
developed Magic store or back up your files (for example,
Mouse, the first multitouch wireless a USB drive).
b
mouse (see Figure 2.12a). The top surface of
the mouse, which is virtually the mouse it- What other input devices are used
self, is the button. Use your finger to scroll in with games? Game controllers such as
any direction, swipe your joysticks, game pads, and steering wheels are
finger across the mouse to also considered input devices because they
move through Web pages send data to the computer. Game controllers,
and photos, and tap on which are similar to the devices used on gam-
the mouse to click and ing consoles, such as the Xbox 360 and the
double-click. PlayStation, are also available for use with
Small, compact de- computers. They have buttons and miniature
vices like the MoGo pointing devices that provide input to the
Mouse (see Figure 2.12b) computer. Force-feedback joysticks and steer-
are designed for portability. The ing wheels deliver data in both directions.
MoGo Mouse fits into a They translate your movements to the com-
peripheral slot on the side of a puter and translate its responses into forces
Figure 2.12 on your hands, creating a richer simulated
notebook; this slot serves to store the mouse,
(a) The Magic Mouse by protect it, and charge its batteries all at the experience. Most game controllers, such as
Apple has multitouch those for Rock Band and the Wii system, are
technology. (b) The MoGo
same time. The MoGo Mouse is wireless and
uses Bluetooth technology to transmit data wireless to provide extra mobility.
Mouse is a portable
mouse that stores and to the notebook.
charges in a PC Card slot. What else can I do with my Touch Screens
mouse? Manufacturers of mice are con-
How else can I input data and
stantly releasing new models that allow you
commands? You’ve seen and used
to perform useful tasks with a few clicks of
touch-sensitive screens in fast food restau-
the mouse. On some mouse models, Mi-
rants, airport check-in kiosks, and ATM ma-
crosoft and Logitech now provide features
chines for quite some time. A touch screen is
such as the following:
a display screen that responds to commands
• Magnifier: Pulls up a magnification box initiated by a touch with a finger or a stylus.
that you can drag around the screen to Touch screens are becoming increasingly
enhance viewing of hard-to-read images popular on many computing devices, includ-
(see Figure 2.13). This feature is often ing desktops, notebooks, smartphones, and
used by people with visual disabilities. portable media players (PMPs). Tablet PCs
• Customizable buttons: Provide extra were one of the first devices with touch-
Figure 2.13 buttons on the mouse that you can pro- screen capabilities (see Figure 2.14). Al-
The magnifier is a mouse gram to perform the functions that you though all tablet PCs have built-in keyboards
feature that provides use most often to help you speed that allow you to type text just as you would
instant magnification of with a normal keyboard, the touch-screen
images or text.
through tasks.
functionality often makes it a better choice
when inputting with a keyboard is impracti-
Window
provides
magnified SOUND Tablet and
view BYTE Notebook Tour
Image Input
How can I input digital images into
my computer? Digital cameras,
camcorders, and cell phones are common
devices for capturing pictures and video,
and all of them are considered input de-
vices. Digital cameras and camcorders are
Figure 2.14
usually used in remote settings (away from
Tablet PCs use the finger or a stylus to input data and a computer) to capture images and video for
commands on a touch-screen display that twists and
later downloading to the com-
folds flat.
puter. These devices either con-
cal or unwieldy. The Apple iPod nect to a computer with a data
Touch, iPad, and iPhone all have cable or transmit data wirelessly.
touch capability, as do portable Windows automatically recog-
gaming devices such as the Nin- nizes these devices when they
tendo DS. Dell and Hewlett are connected to a computer and
Packard have released all-in-one makes the input of the digital
desktop PCs with touch-screen data to the computer simple and
displays. easy. Scanners can also input
Tablet PCs, which were devel- images. They work similar to a
oped primarily because many photocopy machine, but instead
people find it easier to write than of generating the image on
to type input into a computer, paper, they create a digital
are expensive compared to con- image, which can then be
Figure 2.15 printed, saved in storage, or
ventional notebooks. An alterna-
tive is a digital pen like the The Dane-Elec Digital Pen e-mailed. Figure 2.16
captures writing and stores How do I capture live
Dane-Elec Digital Pen (see it in a flash drive for later A webcam is either built
Figure 2.15). This pen works in video from my computer? into a notebook monitor or
transfer to a computer. No
conjunction with a flash drive typing is required! A webcam (see Figure 2.16) is a placed on top of a monitor.
small camera that sits on top of a
Built-in webcam
Webcam
Input Devices 57
ETHICS
IN IT What Is Ethical Computing?
If you were asked to cite an example of unethical behavior while using a 7. Avoid using other people’s computer resources without appropriate
computer, you could easily provide an answer. You’ve probably heard news authorization or proper compensation.
stories about people using computers to commit such crimes as unleashing 8. Do not claim other people’s intellectual output as your own.
viruses or committing identity theft. You may also have read about students 9. Consider the social consequences of the products of your computer
who were prosecuted for illegally sharing copyrighted material such as labor.
videos. Or perhaps you heard about the case where the school district was 10. Only use computers in ways that show consideration and respect
monitoring students through notebook computer webcams without the stu- for others.
dents’ knowledge. All of these are examples of unethical behavior while
The United States has en-
using a computer. However, if you
acted laws that support
were asked what constitutes ethical
some of these guidelines,
behavior while using a computer,
such as Guideline 6, the
could you provide an answer just as
breaking of which would
quickly?
violate copyright laws, and
Loosely defined, ethics is a sys-
Guideline 4, which is en-
tem of moral principles, rules, and
forceable under numerous
accepted standards of conduct. So
federal and state larceny
what are the accepted standards of
laws. Other guidelines,
conduct when using computers
however, require more
(see Figure 2.17)? The Computer
subtle interpretation as to
Ethics Institute developed the Ten
what behavior is unethical
Commandments of Computer
because there are no laws
Ethics, which is widely cited as a
designed to enforce them.
benchmark for companies that are
Consider Guideline 7,
developing computer usage and
which covers unautho-
compliance policies for employees.
rized use of resources.
These guidelines are applicable for
The college you attend
schools and students as well. The
Figure 2.17 probably provides com-
ethical computing guidelines listed
Make sure the work you claim as your intellectual output is the product of puter resources for you to
below are based on the Computer
your intellect alone. use for coursework. But if
Ethics Institute’s work.
the college gives you ac-
Ethical Computing Guidelines cess to computers and the Internet, is it ethical for you to use those re-
1. Avoid causing harm to others when using computers. sources to run a business on eBay in between classes or on the
2. Do not interfere with other people’s efforts at accomplishing work weekends? Although it might not be technically illegal, you are tying up
with computers. computer resources that could be used by other students for their in-
3. Resist the temptation to snoop in other people’s computer files. tended purpose: learning and completing coursework. (This behavior
4. Do not use computers to commit theft. also violates Guidelines 2 and 10.)
Throughout the chapters in this book, we touch on many topics related
5. Agree not to use computers to promote lies.
to these guidelines. So keep them in mind as you study, and think about
6. Do not use software (or make illegal copies for others) without pay-
how they relate to the actions you take as you use computers in your life.
ing the creator for it.
Input Devices 59
any surface, including a wheelchair. When Monitors
arm motion is severely restrained, head-
mounted pointing devices can be used. Gen- What are the different types of
erally, these involve a camera mounted on the monitors? The most common type of
computer monitor and a device attached to monitor is a liquid crystal display (LCD)
the head (often installed in a hat). When the (see Figure 2.20). An LCD monitor, also
user moves his or her head, the camera de- called a flat-panel monitor, is light and en-
tects the movement, which con- ergy efficient. Some newer
trols the cursor on the screen. In LCD monitors use light-
this case, mouse clicks are con- emitting diode (LED) tech-
trolled by a switch that can be nology, which is even more
manipulated by the user’s energy efficient, and may
hands or feet or even by using have better color accuracy
an instrument that fits into and thinner panels than
the mouth and senses the traditional LCD monitors. LCD
user blowing into it. monitors have replaced the cath-
ode ray tube (CRT) monitor.
CRT monitors are difficult to
Output find or buy because they have
become legacy technology,
Devices or computing devices or pe-
An output device enables you ripherals that use tech-
to send processed data out of niques, parts, and methods
your computer in the form from an earlier time that are
of text, pictures (graphics), Figure 2.20 no longer popular. Al-
sounds (audio), or video. LCDs (flat-panel monitors) save pre- though legacy technology
One common output device cious desktop space and weigh consid- may still be functional, it is
is a monitor (sometimes re- erably less than older CRT monitors. quickly being replaced by
ferred to as a display newer technological ad-
screen), which displays text, graphics, and vances. This doesn’t mean that if you have a
video as soft copies (copies you can see only CRT monitor that is functioning well you
on screen). Another common output device should replace it with an LCD monitor.
is the printer, which creates hard copies However, when your CRT monitor fails, you
Figure 2.21 (copies you can touch) of text and graphics. will most likely only be able to replace it
Speakers and earphones (or earbuds) are the with an LCD monitor.
A magnification of a single
pixel in an LCD monitor. output devices for sound. How do monitors work? Monitor
screens are grids made up of millions of tiny
dots, each of which is called a pixel. Illumi-
Rear glass Colored light nated pixels create the images you see on
your monitor. Each pixel is actually com-
prised of three subpixels of red, blue, and
green, and some newer TVs on the market
have added a fourth color: yellow.
Polarizer
LCD monitors are made of two or
Front glass more sheets of material filled with
a liquid crystal solution (see Fig-
ure 2.21). A fluorescent panel at the
back of the LCD monitor generates
light waves. When electric current
Unpolarized Polarizer passes through the liquid crystal
white light solution, the crystals move around and
from backlight
either block the fluorescent light or let
the light shine through. This blocking or
passing of light by the crystals causes images
to form on the screen. The various combina-
tions of red, blue, and green make up the
Liquid crystals Color filters
components of color we see on our monitors.
Output Devices 61
What other features should I look ACTIVE
for in an LCD monitor? Some moni- HELP-
Using Output
tors, especially those on notebook computers, DESK Devices
come with convenient built-in features such
as speakers, webcams, and microphones. A In this Active Helpdesk call, you’ll play the role of a
built-in multiformat card reader is conven- helpdesk staffer, fielding calls about different output
ient to display images directly on the monitor devices, including the differences between LCD and
or to download pictures quickly from a cam- CRT monitor technologies and between inkjet and
era memory card to the PC. Another nice fea- laser printers and the advantages and disadvantages
ture to look for in a desktop LCD monitor is a of each.
built-in USB port. This will enable you to
connect extra peripherals easily without
reaching around the back of the PC. beams to transfer marks onto the paper.
If these features are important to you, Today, nonimpact printers have replaced
then look for a monitor that has them, but be impact printers almost entirely. An impact
careful that the price of buying a monitor printer has tiny hammerlike keys that strike
with these additional features isn’t more the paper through an inked ribbon, making
than what it would cost you to buy the marks on the paper. The most common im-
monitor and extra peripherals separately. pact printer is the dot-matrix printer. The
How do I show output to a large only place you may see a dot-matrix printer
group of people? Crowding large is at a company that still uses them to print
groups of people around your computer isn’t multipart forms. For most users, dot-matrix
practical. However, it is possible to use a printers are truly legacy technology.
projector, a device that can project images What are the advantages of inkjet
from your computer onto a wall or viewing printers? An inkjet printer (see
screen (see Figure 2.22). Projectors are Figure 2.23) is the standard type of printer
commonly used in business and education found in most homes. Inkjet printers are
settings such as conference rooms and class- popular because they are affordable and
rooms. These projectors are small and light- produce high-quality color printouts quickly
weight, and some, like the 3M MPro 150, are and quietly. Inkjet printers work by spraying
small enough to fit into the palm of your tiny drops of ink onto paper and are great
hand! These portable projectors are ideal for for printing black-and-white text as well as
businesspeople that have to make presenta- color images. In fact, when loaded with the
tions at client locations. Entertainment projec- right paper, higher-end inkjet printers can
tors, such as the Wonderwall, include stereo print images that look like professional-
speakers and an array of multimedia connec- quality photos. One thing to consider when
tors, making them a good option for use in the buying an inkjet printer is the type and cost
home to display TV programs, DVDs, digital of the ink cartridges the printer needs. Some
images, or video games in a large format. printers use two cartridges: black and color.
Other printers use four or more cartridges,
typically black, magenta, cyan, and yellow.
Printers Often the cost of buying replacement car-
Figure 2.22 What are the different types of tridges is more than that of a brand-new
Inexpensive projectors printers? There are two primary cate- printer! Depending on how frequently you
are showing up more gories of printers: inkjet and laser, both of
frequently in business and
which are considered nonimpact printers. A
the home to provide large
images for movie viewing nonimpact printer sprays ink or uses laser
and gaming.
Figure 2.24
Laser printers print quickly and offer high-quality
printouts.
Output Devices 63
print digital images, then you will want to
select a photo printer. If not, then a general-
purpose printer will be a better choice.
General-purpose printers have a finer, faster
text output, whereas photo printers have a
more distinctive color output. It’s also
important to determine whether you want
just a printer or a device that prints and scans,
copies, or faxes (an all-in-one). In addition,
you should decide whether you want an
inkjet or laser printer, and whether or not
you want to print wirelessly. Once you have
narrowed down the type of printer you
want, the following criteria will help you
determine the best model to meet your
needs.
Ever wonder how a printer knows what to print and how it puts ink in just Laser printers use a completely different process. Inside a laser
the right places? Most inkjet printers use drop-on-demand technology in printer is a big metal cylinder (also called a drum) that is charged with
which the ink is “demanded” and then “dropped” onto the paper. Two static electricity. When asked to print something, the printer sends sig-
different processes use drop-on-demand technology: Thermal bubble is nals to the laser in the laser printer, telling it to “uncharge” selected
used by Hewlett-Packard and Canon, and piezoelectric is used by Epson. spots on the charged cylinder. These spots correspond to characters and
The difference between the two processes is how the ink is heated images in the document you wish to print. Toner, a fine powder that is
within the print cartridge reservoir (the chamber inside the printer that used in place of liquid ink, is only attracted to those areas on the drum
holds the ink). that are not charged (the areas where the desired characters and images
In the thermal bubble process, the ink is heated in such a way that it are to be printed). The toner is transferred to the paper as it feeds
expands (like a bubble) and leaves the cartridge reservoir through a through the printer. Finally, the toner is melted onto the paper. All unused
small nozzle. Figure 2.28 shows the general process for thermal bubble. toner is swept back to the toner hopper before the next job starts the
In the piezoelectric process, each ink nozzle contains a crystal at the process all over again.
back of the ink reservoir that receives an electrical charge, causing the
ink to vibrate and drop out of the nozzle.
Inkjet Printer
Print head
Nozzles
Figure 2.28
How a thermal bubble inkjet printer works.
Output Devices 65
BITS generally only print 100 copies a month,
AND Does It Matter What Paper I Print On? then you will have overpurchased.
BYTES Alternatively, exceeding the duty cycle
estimates might lead to printer
The quality of your printer is only part of what controls the quality of a printed image. malfunctions.
The paper you use and the printer settings that control the amount of ink used are • Cost of consumables: You should care-
equally important. If you’re printing text-only documents for personal use, then using fully investigate the cost of consumables
low-cost paper is fine. You also may want to consider selecting draft mode in your (such as printer cartridges and paper)
printer settings to conserve ink. However, if you’re printing more formal documents for any printer you are considering
such as résumés, you may want to choose a higher-quality paper (determined by the purchasing because the cost of inkjet
paper’s weight, whiteness, and brightness) and adjust your print setting to “normal” cartridges often can exceed the cost of
or “best.” the actual printer when purchased on
The weight of paper is measured in pounds, with 20 pounds being standard. A sale. Reviews in consumer magazines
heavier paper may be best for projects such as brochures, but be sure to check that such as PC World and Consumer Reports
your printer can handle the added thickness. The degree of paper whiteness is a mat- can help you evaluate the overall cost of
ter of personal preference. Generally, the whiter the paper, the brighter the printed producing documents with a particular
color. However, for more formal documents, such as résumés, you may want to use a printer.
creamier color. The brightness of paper usually varies from 85 to 94. The higher the
number, the brighter the paper, and the easier it is to read printed text. Opacity is es-
pecially important if you’re printing on both sides of the paper because it determines
the amount of ink that shows through from the opposite side of the paper.
Sound Output
If you’re printing photos, then paper quality can have a big impact on the results.
Photo paper is more expensive than regular paper and comes in a variety of textures What are the output devices for
ranging from matte to high gloss. For a photo-lab look, high-gloss paper is the best sound? Most computers include inexpen-
choice. Semigloss (often referred to as satin) is good for portraits, while a matte sur- sive speakers. A speaker is an output device
face is often used for black-and-white printing. for sound. These speakers are sufficient to
play the standard audio clips you find on
the Web and usually enable you to partici-
pate in videoconferencing or phone calls
made over the Internet. However, if you
laser printers have four separate toner plan to digitally edit audio files or are par-
cartridges (black, cyan, magenta, and ticular about how your music sounds, then
yellow), and the toner is blended in var- you may want to upgrade to a more sophis-
ious quantities to produce the entire ticated speaker system, such as one that in-
color spectrum. cludes subwoofers (special speakers that
• Use and cost of the printer: If you will produce only low bass sounds) and sur-
be printing mostly black-and-white, round-sound speakers. A surround-sound
text-based documents or will be sharing speaker is a system of speakers and audio
your printer with others, then a black- processing that envelops the listener in a full
and-white laser printer is best because 360-degree field of sound. Wireless speaker
of its printing speed and overall econ- systems are available now to help you avoid
omy for volume printing. If you’re plan- cluttering up your rooms with speaker wire.
ning to print color photos and graphics, We discuss surround sound in more detail
then an inkjet printer or color laser in Chapter 6.
printer is a must, even though the cost If you work in close proximity to other
per page will be higher. Keep in mind a employees or travel with a notebook, then
printer’s reported duty cycle. A duty you may need to use headphones or ear-
cycle is a manufacturer’s figure that buds for your sound output to avoid dis-
refers to how long a machine can keep tracting other people. Both devices will plug
operating before it needs a rest, or what into the same jack on the computer that
percentage of the time it’s designed to speakers connect to, so using them with a
be in use. For a printer, the duty cycle computer is easy. Studies of users of
generally refers to the number of portable media players have shown that
printed pages the printer can reliably hearing might be damaged by excessive
produce on a monthly basis. If you volume, especially when using earbuds,
buy a printer with a duty cycle of because they fit into the ear canals. Exercise
1,000 copies per month, and you caution when using these devices.
In general, printers require minimal maintenance. Occasionally, it’s a good idea to In this Sound Byte, you’ll take a video tour of the inside
wipe the case of the printer with a damp cloth to free it from accumulated dust. How- of a system unit. From opening the cover to locating
ever, do not wipe away any ink residue that has accumulated inside the printer. If you the power supply, CPU, and memory, you’ll become
are experiencing streaking or blank areas on your printed paper, then your print head more familiar with what’s inside your computer.
nozzles may be clogged. To fix this, run the printer’s cleaning cycle. (Check your printer’s
manual for instructions, because every printer is different.) If this doesn’t work, you
may want to use a cleaning sheet to brush the print head clean. These sheets often
come with printers or with reams of photo paper. If you still have a problem, try a second without error, making them
cleaning cartridge. Cleaning cartridges contain a special fluid that scrubs the print extremely powerful components.
head. These cartridges can be found where most ink cartridges are sold. As with ink How is processor speed meas-
cartridges, make sure you buy one that is compatible with your printer. ured? Processor speed is measured in
units of hertz (Hz). Hertz means “machine
cycles per second.” A machine cycle is the
process of the CPU getting the data or in-
the computer’s temporary memory and the structions from RAM and decoding the in-
hard drive as permanent memory. structions into something the computer can
Does the motherboard contain any understand. Once the CPU has decoded the
other kinds of memory besides instructions, it executes them and stores the
RAM? In addition to RAM, the mother- result back into system memory. Older ma-
board also contains a form of memory called chines ran at speeds measured in megahertz
read-only memory (ROM). ROM holds all (MHz), or millions of machine cycles per
the instructions the computer needs to start second, whereas current systems run at
up when the computer is powered on. Un- speeds measured in gigahertz (GHz), or bil-
like data stored in RAM, which is volatile lions of machine cycles per second. There-
storage, the instructions stored in ROM are fore, a 3.8 GHz processor performs work at a
permanent, making ROM a nonvolatile stor- rate of 3.8 billion machine cycles per second.
age location, which means the data is not It’s important to realize, however, that CPU
erased when the power is turned off. clock speed alone doesn’t determine the per-
formance of the CPU.
What else determines processor
performance? Although speed is an
Processing important consideration when determining
Figure 2.30 What is the CPU? The central process- processor performance, CPU performance
Two are faster than one! ing unit (CPU, or processor) is sometimes also is affected by other factors. One factor is
With their dual core referred to as the “brains” of the computer the number of cores, or processing paths, a
processors, Intel CPUs because it controls all the functions per- processor has. Until just a few years ago,
can work in parallel, formed by the computer’s other components processors only could handle one instruc-
processing two separate and processes all the commands issued to tion at a time. Now, processors have been
programs at the same time
instead of switching back it by software instructions. Modern CPUs designed so that they can have two, four,
and forth between them. can perform as many as 45 billion tasks per and even eight different paths, allowing
them to process more than one instruction at
Single path vs. dual path processors for data a time (see Figure 2.30). Applications such as
Sin
virus protection software and the operating
gle Dua
Pat exe Pat l ex
ecu
system, which are always running behind
h2 cut h2 tion
Pat ion Pat the scenes, can have their own processors,
h1 cor h1 cor
e es
freeing up the other processor to run other
applications such as a Web browser, Word,
or iTunes more efficiently.
Besides the number of cores, are
there other factors that determine
processing power? In addition to the
number of cores in a processor, you should
Single core processor Dual core processor consider other factors such as cache memory
Flash Storage
A flash drive, sometimes referred to as a
jump drive, USB drive, or thumb drive, is Solid state drive (SSD) 5 TB or more
a way of storing portable data. Flash drives
plug into USB ports. These devices origi-
nally were more or less the size of a thumb,
but now they vary in size and are often com-
External portable 4 TB or more
bined with other devices such as pens or hard drive
pocketknives (see Figure 2.33). Despite their
diminutive size, flash drives have significant
storage capacity—currently as much as
256 GB. Flash drive 256 GB or more
Several manufacturers now also include
slots on the front of the system unit in which
you can insert a portable flash memory card
such as a Memory Stick or CompactFlash Blu-ray (dual layer) 50 GB
card. Many notebooks also include slots for
flash memory cards in the sides. Flash mem-
ory cards let you transfer digital data be-
tween your computer and devices such as
digital cameras, PDAs, smartphones, video Flash memory card Up to 128 GB
cameras, and printers. Although incredibly
small—some are just the size of a postage
stamp—these memory cards have capacities 8
12
that exceed the capacity of a DVD. We discuss
flash memory in more detail in Chapter 8.
Some hard drives are also based on flash Blu-ray (BD) 25 GB
memory. A solid state drive (SSD) does not
have any spinning platters or motors, so they
are more efficient, run with no noise, emit
very little heat, and require very little power.
Figure 2.34 shows the storage capacities
DVD DL (dual layer) 88.5 GB
of the various portable storage media used
in your computer’s drive bays.
Figure 2.35
Many of the same ports
appear on both (a) note-
book and (b) desktop Audio/video ports Ethernet port S-video
computers. of a notebook com-
puter and the system unit
of a desktop computer. How- FireWire ports
ever, some commonly used ports are
placed on the front and sides of many
desktop and notebook computers (see SOUND Port Tour: How Do I
Figure 2.35) for easier access when connect- BYTE Hook It Up?
ing devices such as flash drives or digital
and video cameras. In this Sound Byte, you’ll take a tour of both a desktop
system and a notebook system to compare the num-
High-Speed and Data Transfer Ports ber and variety of available ports. You’ll also learn
about the different types of ports and compare their
What is the most common way to speed and expandability.
connect devices to a computer? A
universal serial bus (USB) port is now the
most common port type used to connect
speed of USB 2.0. USB 3.0 should quickly
input and output devices to the computer.
become the port of choice.
This is mainly because of a USB port’s
A traditional serial port sends data one
ability to transfer data quickly. USB 2.0 ports
bit (piece of data) at a time. Serial ports
(see Figure 2.36) are the current standard
were often used to connect modems (devices
and transfer data at 480 megabits per
used to transmit data over telecommunica-
second (Mbps), approximately 40 times
tions lines) to the computer. Sending data
faster than the original USB ports. USB ports
one bit at a time was a slow way to commu-
can connect a wide variety of peripherals to
nicate. A parallel port could send data
the computer, including keyboards, printers,
between devices in groups of bits at speeds
mice, smartphones, external hard drives,
of 500 Kbps and was much faster than
flash drives, and digital cameras. The
traditional serial ports. Parallel ports were
new USB 3.0 standard provides transfer
often used to connect printers to computers.
speeds of 4.8 Gbps, which is 10 times the
The speed advantage offered by USB ports
has made serial and parallel ports legacy
ACTIVE technology.
HELP-
Exploring Storage What are other types of ports?
DESK Devices and Ports You may also see other ports, such as
FireWire 400 and FireWire 800. The
In this Active Helpdesk call, you’ll play the role of a FireWire 400 interface moves data at
helpdesk staffer, fielding calls about the computer’s 400 Mbps, while the FireWire 800 doubles
main storage devices and how to connect various the rate to 800 Mbps. Devices such as
peripheral devices to the computer. external hard drives, digital video cameras,
portable music players, and digital media
Figure 2.39
DVI, VGA, and S-video Many older LCD monitors also connect devices such as DVD players, TVs, and
ports connect your with a VGA port. The newer LCD monitors, game consoles have at least one HDMI port
monitors and multimedia
devices to the computer. as well as other multimedia devices such (see Figure 2.40).
as televisions, DVD players, and projectors,
connect to digital video interface (DVI)
and S-video (super video) ports. Audio Adding Ports: Expansion
ports are where you connect headphones, Cards and Hubs
microphones, and speakers to the
What if I don’t have all the ports I
computer.
need? Because almost everything con-
How can I connect my computer to
nects to your computer using USB ports,
TVs and gaming con-
your desktop computer
soles? The latest digi-
should have at least six
tal connector designed
USB ports, and a note-
for use in high-definition
book computer should
home theater environ-
have at least three USB
ments is high-definition
ports. Therefore, if you
multimedia interface
are looking to add the
(HDMI), a compact
newest ports to an older
audio–video interface
computer or to expand
that carries both high-
Figure 2.40
the number of ports on
definition video and un-
your computer, you can
compressed digital audio HDMI is the latest digital connector type for
HD home theater equipment.
use special expansion
on one cable. (DVI can
cards. For example,
only carry video signals.)
your computer may
Because HDMI can transmit uncompressed
have only USB 2.0 ports, but you would like
audio and video, there is no need to convert
Figure 2.41 to upgrade to the new USB 3.0 ports. You
the signal, which could ultimately reduce
This expansion card can install expansion cards in your system
the quality of the sound or picture. Most
provides your computer unit to provide additional ports (such
with additional ports. as USB 3.0 and FireWire). Like other
expansion cards, these
cards clip into an open
USB expansion slot on
the motherboard.
Figure 2.41
shows an exam-
ple of such an
expansion card.
What if there are no
open slots on the mother-
board where I can insert an
FireWire expansion card? If there are no
open slots on the motherboard and you
Power Controls
What’s the best way to turn my com-
puter on and off? The power supply,
which is housed inside the system unit,
transforms the wall voltage to the voltages
required by computer chips. A desktop
system typically has a power-on button on
the front panel of the system unit, though
you may also find power-on buttons on
some keyboards. On notebooks, the power-
on button is generally located near the top of
the keyboard. Powering on your computer
from a completely turned off state, such as
when you start your computer in the morn- Figure 2.43
ing, is called a cold boot. You can use an empty drive bay to add additional ports
How do I power down a computer and even a flash card reader to the front panel of the
properly? Powering off your computer system unit.
Power Controls 75
the same programs running and
documents displayed as when you put it to
sleep.
In Windows 7, you can change what
happens when you press the power button
on the Start menu. By accessing the Power
Options screen (see Figure 2.44), you can
decide if you want your computer to
Sleep or Hibernate when you click the
power button.
What’s the restart option in Win-
dows for? If you’re using Windows 7,
you have the option to restart the computer
when you click the right arrow button next
to the Shut Down button on the Start menu
(see Figure 2.45). Restarting the system
while it’s powered on is called a warm boot.
You might need to perform a warm boot if
the operating system or other software
Figure 2.44
The Sleep and Hibernate settings are good for the
environment and for your wallet.
>To open the Power Options dialog box, click the Start
button, click Control Panel, and then click Power
Options.
Top of monitor
at or below
eye level
Adjustable
monitor
Adjustable-height
Lumbar keyboard tray and
support wrist rest
Fully Footrest
adjustable if needed
chair
Figure 2.46
Using proper equipment that is adjusted correctly helps prevent repetitive strain injuries while working at a computer.
Setting It All Up 77
• Assume a proper position while
typing. A repetitive strain injury (RSI)
is a painful condition caused by
repetitive or awkward movements of
a part of the body. Improperly posi-
tioned keyboards are one of the
leading causes of RSIs in computer
users. Your wrists should be flat (not
bent) with respect to the keyboard,
and your forearms should be parallel
Figure 2.47 to the floor. Additionally, your wrists
should not be resting on the keyboard
Ergonomic keyboards that curve and contain built-in
wrist rests help maintain proper hand position and while typing. You can either adjust
minimize wrist strain. the height of your chair or install a
height-adjustable keyboard tray to
ensure a proper position. Specially
arrange your monitor, chair, body, and designed ergonomic keyboards such
keyboard in ways that will help you avoid as the one shown in Figure 2.47 can
injury, discomfort, and eyestrain as you help you achieve the proper wrist
work on your computer. The following position.
additional guidelines can help keep you • Take breaks from computer tasks.
comfortable and productive: Remaining in the same position for long
periods of time increases stress on your
• Position your monitor correctly. Studies body. Shift your position in your chair
suggest it’s best to place your monitor at and stretch your hands and fingers
least 25 inches from your eyes. You may periodically. Likewise, staring at the
need to decrease the screen resolution to screen for long periods of time can lead
make text and images more readable at to eyestrain, so rest your eyes by
that distance. Experts recommend that periodically taking them off the screen
the monitor be positioned either at eye and focusing them on an object at least
level or so that it is at an angle 15 to 20 feet away.
20 degrees below your line of sight. • Ensure the lighting is adequate.
• Purchase an adjustable chair. Adjust Ensuring that you have proper lighting
the height of your chair so that your in your work area is a good way to min-
feet touch the floor. (You may need to imize eyestrain. To do so, eliminate
use a footrest to get the right position.) any sources of direct glare (light shining
The back support needs to be directly into your eyes) or reflected glare
adjustable so that you can position it (light shining off the computer screen)
to support your lumbar (lower back) and ensure there is enough light to read
region. You should also be able to comfortably. If you still can’t eliminate
move the seat or adjust the back so glare from your computer screen, you
that you can sit without exerting pres- can purchase an antiglare screen to
sure on your knees. If your chair place over your monitor. Look for ones
doesn’t adjust, placing a pillow behind that are polarized or have a purplish
your back can provide the same optical coating. These will provide the
support. greatest relief.
Malady Repetitive strain injuries Hearing loss from high Blurriness and dryness Burns on legs from Pain caused from
,
(such as DeQuervain s decibel sound levels in caused by squinting to heat generated carrying notebook
tendonitis) from earbuds or headphones. view tiny screens on by notebook. (messenger) bag hung
constant typing of mobile devices. over your shoulder.
instant messages.
Preventative Restrict length and Turn down volume (you Blink frequently or use Place a book, magazine, Use a conventional
measures frequency of messages, should be able to hear eye drops to maintain or notebook cooling pad backpack with two
take breaks often, and external noises such as moisture level in eyes, between your legs and shoulder straps, lighten
perform other motions people talking), use after 10 minutes take a your notebook. the load by only carrying
with your thumbs and software programs that break and focus your essential equipment,
fingers during breaks limit sound levels (not eyes on something and consider buying a
to relieve tension. over 60 decibels), and at least 8 feet away for lightweight notebook.
use external, over-ear 5 minutes, use an
style headphones adequate amount of
instead of earbuds. light, increase the size
of fonts.
Setting It All Up 79
TRENDS
IN IT Emerging Technologies—Displays That You Can Take with You
OLED Displays
Organic light-emitting diode (OLED) displays use organic compounds
that produce light when exposed to an electric current. Unlike LCDs,
OLEDs do not require a backlight to function and therefore draw less
power and have a much thinner display, sometimes as thin as 3 mm.
They are also brighter, cheaper to manufacture, and more environmen-
tally friendly than plasma displays or LCDs. Because of their lower power
needs, OLED displays run longer on a single battery charge than do
LEDs, which is why OLED technology is currently being used in small
screens of mobile devices such as cell phones, portable media players,
and digital cameras.
More recently, OLED technology has been incorporated in some high- Figure 2.49
end televisions. The benefits of OLED technology may make LCD flat- Because they do not need a backlight, OLED displays are
panel displays quickly obsolete (see Figure 2.49). The pixels in OLED much thinner than LEDs, making LCD screens seem bulky!
screens illuminate quickly, like lightbulbs, and produce brighter images
than does LCD technology. Because of the quick on/off illumination ca- Flexible Screens
pacity of OLED pixels, the faster refresh rate enables these screens to An offshoot of OLED technology is the flexible OLED (FOLED). Unlike
display full-motion videos with lifelike motion. Sony and Toshiba have al- LCDs, which use rigid surfaces such as glass, FOLED screens use light-
ready produced OLED televisions. Eventually, you might not even need a weight, inexpensive, flexible material such as transparent plastics or
separate display device; it could very well be built into the walls of your metal foils. As shown in Figure 2.50, these flexible screens can play a
house! full-motion video while being completely bent.
FOLEDs would allow advertising to progress to a new dimension. in. Wearable displays might eventually replace heavier screens on note-
Screens could be hung where posters hang now (such as on billboards). books, desktops, and even PDAs.
Wireless transmission of data to these screens would allow advertisers to
display easily updatable full-motion images. Combining transparency and “Bistable” Screens
flexibility, these displays can be mounted on windshields and eyeglasses. Your computer screen constantly changes its images when you are surfing
the Internet or playing a game. Because PDA and cell phone screens don’t
Wearable Screens necessarily change that often, something called a “bistable” display, which
Who needs a computer screen when you can just wear one? With the rise is currently used in retail stores for pricing signs and in Amazon’s Kindle
of the iPod and other portable devices that play digital video, users are de- (a wireless reading device), may one day be used in these devices. A
manding larger viewing areas. Although a larger screen is often incompat- bistable display has the ability to retain its image even when the power is
ible with the main design features of portable devices (light weight and turned off. In addition, bistable displays are lighter than LCD displays and re-
long battery life), wearable virtual displays offer a solution. Personal media duce overall power consumption, resulting in longer battery life— perhaps
viewer displays such as the myvu, shown in Figure 2.51, are available now as much as 600 times longer, according to Motorola. Because the market
(myvu.com). Eventually, when the technology advances sufficiently, you for portable devices such as smartphones continues to explode, you can ex-
might be able to purchase conventional eyeglasses with displays built right pect to see bistable technologies emerging in mobile computer screens.
Setting It All Up 81
two
two summary
chapter
1. What exactly is a computer, and what Keyboards and mice come in both wired
are its four main functions? and wireless versions, as well as other
Computers are devices that process data. special layouts and designs to fit almost
every need.
summary
chapter
houses a set of slots for expansion cards, The most common type of port used to
which have specific functions that augment connect devices to a computer is the USB
the computer’s basic functions. Typical port. USB technology has replaced serial
summary
expansion cards found in the system unit ports and parallel ports, which are now
are the sound and video cards. considered legacy technology. USB 2.0 is
the current standard but will be quickly
7. Where are information and programs replaced by the newer, faster, USB 3.0
stored? standard. FireWire ports provide additional
To save programs and information perma- options for data transfer.
nently, you need to save them to the hard Connectivity ports give you access to
drive or to another permanent storage de- networks and the Internet and enable your
vice such as a CD, DVD, or flash drive. The computer to function as a fax machine.
hard drive is your computer’s primary Connectivity ports include Ethernet ports
device for permanent storage of software and modem ports. Multimedia ports include
and files. The hard drive is a nonvolatile VGA, DVI, and S-video ports. They connect
storage device, meaning it holds the data the computer to monitors and other multi-
and instructions your computer needs per- media devices. Audio ports are where you
manently, even after the computer is turned connect headphones, microphones, and
off. Mechanical hard drives have spinning speakers to the computer. HDMI ports are
platters on which data is saved, whereas used as a connection between monitors, TVs
newer solid state hard drives (SSD) use solid and gaming consoles and work with both
state memory, similar to that used with flash audio and video content.
drives. External hard drives are essentially
internal hard drives that have been made 9. How do I set up my computer to avoid
portable by enclosing them in a protective strain and injury?
case and making them small and light- Ergonomics refers to how you arrange your
weight. Optical drives that can read from computer and equipment to minimize your
and maybe even write to CD, DVD, or Blu- risk of injury or discomfort. This includes
ray discs are another means of permanent, positioning your monitor correctly, buying
portable storage. Data is saved to compact an adjustable chair that ensures you have
discs (CDs), digital video discs (DVDs), and good posture while using the computer,
Blu-ray discs (BDs) as tiny pits that are assuming a proper position while typing,
burned into the disc by a high-speed laser. making sure the lighting is adequate, and
Flash drives are another portable means of not looking at the screen for long periods of
storing data. Flash drives plug into USB time. Other good practices include taking
ports. Flash memory cards let you transfer frequent breaks and using other specially
digital data between your computer and designed equipment such as ergonomic
devices such as digital cameras, smart- keyboards. Ergonomics is also important to
phones, video cameras, and printers. consider when using mobile devices.
83
two
two key terms
chapter
chapter
Word Bank
• CPU • LCD • RAM
• DVI • microphone • ROM
buzzwords
• ergonomics • monitor • speakers
• external hard drive • mouse • SSD
• FireWire • notebook • system unit
• inkjet printer • optical mouse • USB
• laser printer • QWERTY • webcam
Instructions: Fill in the blanks using the words from the Word Bank above.
Austin had been getting a sore back and stiff arms when he sat at his desk, so he
redesigned the (1) __________of his notebook setup. He placed the notebook in a stand so
the (2) __________ was elevated to eye level and was 25 inches from his eyes. He decided to
improve his equipment in other ways. His (3) __________ was old, so he replaced it with
a(n) (4) __________ that didn’t need a mouse pad. To plug in the mouse, he used a(n)
(5) __________ port on the side of his (6) __________. He considered buying a larger
(7) __________ keyboard with a number pad because it’s not convenient to input numeric
data with his current keyboard. Because he often printed flyers for his band, Austin
decided to buy a printer that could print text-based pages quickly. Although he decided to
keep his (8) __________ to print photos, he decided to buy a new (9) __________ to print his
flyers faster. While looking at printers, Austin also noticed widescreen (10) __________
monitors that would provide a larger display than that on his notebook, so he bought one
on sale. He hooked up the monitor to the (11) __________ port on the back of the notebook.
He also bought a(n) (12) __________ that was attached to a headset and a(n) (13) __________
so he could talk to his friends over the Internet. Austin also knew he had to buy a(n)
(14) __________ to back up all his files. Finally, knowing his system could use more
memory, Austin checked out prices for additional (15) __________.
computer
becoming
literate
becoming
computer literate
Your grandparents live a day’s drive from your school and have just called asking you for
help in purchasing a new computer, but they don’t know what type of computer to get.
Instructions: Because you can’t help them in person, write a letter to your grandparents
detailing the differences between desktop, notebook, tablet PC, and netbook computers.
Include the pros and cons of each device, and explain why or why not each device may
suit your grandparents. Because your grandparents are not as familiar about these devices
as you are, you should also incorporate images for each device in the letter. You may use
the Internet for information, device pictures, and illustrations, but remember to credit
all sources.
85
two
two self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.
Multiple Choice
self-test
1. What controls the way in which your 7. Which is TRUE about mainframe
computer system functions? computers?
a. System software a. They perform complex
b. Operating system calculations rapidly.
c. Application software b. They support hundreds of users
d. Hardware simultaneously.
2. Which is the most common type of c. They execute many programs at a
monitor? fast pace.
a. LCD monitor c. LED monitor d. They excel at running a few
programs quickly.
b. CRT monitor d. HD monitor
8. Which is NOT important to consider
3. What enables your computer to
when buying a printer?
connect with other computers?
a. Paper
a. Expansion card
b. Duty cycle
b. Adapter card
c. Cost of consumables
c. Video card
d. Resolution
d. Network interface card
9. Which is NOT a storage device?
4. Which is NOT another name for a
flash drive? a. External hard drive
a. Zip c. Jump b. DVD
b. USB d. Thumb c. Flash memory card
d. Touch screen
5. To add additional ports to your
computer, what do you need? 10. What lets you transfer digital data
a. A digital media card reader between your computer and devices
such as digital cameras?
b. An external hard drive
a. Flash memory card
c. An expansion card
b. Optical drive
d. A flash memory card
c. Connectivity port
6. Which holds the instructions the
d. HDMI port
computer needs to start up?
a. CPU c. USB
b. RAM d. ROM
True–False
_____ 1. The CPU clock speed determines the performance of the CPU.
_____ 2. The hard drive is an example of a nonvolatile storage device.
_____ 3. Ergonomics is important only with desktop computers, not mobile devices.
_____ 4. For printing photos, printing at 1,200 dpi is sufficient.
_____ 5. Some mice include wireless USB receivers that contain flash memory to store your
files.
chapter
transition to...
next semester
1. Choosing the Best Keyboard and Mouse
transition to...
Once you become more familiar with software products such as Microsoft Office, you
may want to migrate to customized keyboard and mouse designs. Although most
keyboards and mice have similar setups, there are some devices that provide special
next semester
making the
features to support different users and their specific needs. For example, some
keyboards are designed specifically for multimedia use, Internet use, or gaming use.
Some mice have buttons for certain tasks. Which ones are best for you?
a. Examine the various keyboard setups at the Microsoft Web site
(microsoft.com/hardware/mouseandkeyboard/default.mspx). Which keyboard
would best suit your needs and why? What features would be most useful to you?
b. Look at the new cool mice at laptopshop.co.uk/news/2009/05/coolest-computer-
mice. Would any of these mice or the multitouch Magic Mouse by Apple mentioned
earlier in this chapter work for you? Why or why not?
2. Watching Device Demos
YouTube is a great resource for product demonstrations. Open your browser, navigate
to the YouTube Web site (youtube.com), and search on any type of computer peripheral
discussed in this chapter to see if you can find a demonstration of a cool product.
How helpful are these demonstrations? Make a demonstration of a computing
device you have and upload it to YouTube.
3. Communicating with the Computer
You want to start using Voice over Internet Protocol (VoIP) to chat over the Internet
with your family and friends who live far away. On the Web, investigate the following:
a. List the devices you need to start using VoIP.
b. Research the prices and features of each required device and create a shopping list
of the specific devices you would purchase.
4. Turn Your Monitor into a TV
You’ve heard how easy it is to convert an LCD monitor into a TV. Your parents just
bought a new computer and are giving you their old PC monitor. You need a new TV
for your dorm room, so you decide to give it a try.
a. What does your monitor need to retrofit it into a TV? What other devices do you
need?
b. How much will it cost?
c. How much do new LCD TVs cost? Is this something you would consider doing?
Why or why not?
d. What would you do if your parents gave you their old LCD TV? Could you turn it
into a monitor? If so, what would you need to do that?
5. Green Computing
Reducing energy consumption and promoting the recycling of computer components
are key aspects of many businesses’ “green” (environmentally friendly) initiatives.
Using the Web, research the following:
a. What are the key attributes of the Energy Star and EPEAT Gold green PC certifica-
tions? Does your PC have these certifications?
b. What toxic components are contained in computers and monitors? Where can you
recycle computers and monitors in your area?
c. Check out goodcleantech.com and find out which companies are currently working
toward better green technology. If your school had to replace computers in a lab,
which environmentally friendly company would you recommend? Why?
87
two
two making the
chapter
transition to...
the workplace the workplace
1. Backing up your Work
making the
You have embarked on a position as a freelance editor. You will be using your own com-
transition to...
puter. Until now you have not worried too much about backing up your data. Now, how-
ever, it’s extremely important that you back up all your work frequently.
Research the various backup options that are available including online backup, external
hard drives, and portable flash storage. What are the size limitations of each? What are the ini-
tial and ongoing costs of each? How frequently do the various options allow you to perform
backups? Which would be the option you would choose, and why?
2. What Hardware Will You Use?
When you arrive at a new position for a company, your employer will most likely provide
you with a computer. Based on the career you are in now or are planning to pursue, answer
the following questions:
a. What kind of computer system would the company mostly likely provide to you—desk-
top, notebook, tablet PC, or something else? How does that compare with the type of
system you would prefer to work with?
b. If you were required to use a type of computer you had never used before (such as a
Mac instead of a PC), how would you go about learning to use the new computer?
c. What other devices might your employer provide? Consider such items as smartphones
or printers. How important is it in for these devices to conform to the latest trends?
d. Should you be able to use employer-provided equipment, such as a smartphone, for per-
sonal benefit? Does your answer differ if you have to pay for part or all of the device?
3. Exploring Monitors
You have been asked to help edit video for a friend. You have a great notebook computer,
which is powerful enough to handle this type of task, but you need to buy a separate LCD
monitor to hook up to your computer and are not exactly sure what to buy. You know it
should be larger than 15", capable of displaying HD, and can’t cost more than $200.
a. Research five different monitors that would fit your needs. Create a table that lists each
monitor and its specifications, including display type, screen size, aspect ratio, native res-
olution, and response time. Also list the types of ports and connectors the monitor has.
b. Note whether each monitor has HDMI. Why or why not would HDMI capability be
important?
c. Research two LED monitors. Would an LED monitor be a viable option? Explain.
Explain which of the five monitors would best suit your needs and why.
4. What’s the Coolest Mouse?
The Luxeed Dynamic Pixel LED Keyboard is a very cool keyboard that was described in the
“How Cool Is This?” feature at the beginning of the chapter. There are some equally cool and
innovative mice on the market. For example, some mice have vertical orientations, are wash-
able, and can be used without touching a surface. Investigate some of these new mice and
come up with your list of the top five coolest ones. Which one would be your choice to be
“The Coolest Mouse”?
5. Choosing the Best Laser Printer
You are looking to replace your inkjet printer with a laser printer. You haven’t decided
whether a color laser printer is necessary.
a. What are the cost considerations between getting a laser printer and a color laser printer
(i.e., initial costs, costs of cartridges, and so on)?
b. Investigate wireless and Bluetooth options. What are the considerations involved with
regard to these features?
c. Investigate all-in-one laser printers that have printer, scanner, and fax capabilities. How
much more expensive are they than laser printers? Are there any drawbacks to these
multipurpose machines? Do they perform each function as well as their stand-alone
counterparts do? Can you print in color on these machines?
Based on your research, which printer would be your choice, and why?
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions,
questions
critical thinking
to develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
5. “Smart” Cars
Cars are becoming more technically advanced every day. They are now able to parallel
park by themselves, avoid collisions, alert you if you are falling asleep at the wheel,
provide emergency response, and sense if you are going to back up over something
inadvertently. What other technical advances do you see cars incorporating? Do you
think that any of these current or potential advancements could result in unexpected
negative consequences? If so, what?
6. iPad
The Apple iPad has been enthusiastically accepted because of its multitouch screen,
useful applications, and small, light frame. But it is without certain features that might
make it even better. If Steven Jobs, the CEO of Apple, were to ask you for your advice
as to what to include in the next version of the iPad, what would you suggest?
89
two
two team time
chapter
Problem
team time
You have joined a small business that is beginning to evaluate its technology setup. Because
of the addition of several new sales representatives and other administrative employees,
many new computers need to be purchased. You are trying to decide which would be bet-
ter to purchase: notebook computers, tablet PCs, or desktops or a combination.
Task
Split your class into small groups, divide each group into three teams, and assign the
following tasks:
Member A explores the benefits and downfalls of desktop computers.
Member B explores the benefits and downfalls of notebook computers.
Member C explores the benefits and downfalls of tablet PCs.
Process
1. Form the teams. Think about what the technology goals are for the company and what
information and resources you need to tackle this project.
2. Research and then discuss the components of each system you are recommending. Are
any components better suited for the particular needs of the various employees (sales
representatives versus administrative staff)? Consider all the input, output, processing,
and storage devices. Are any special devices or peripherals required?
3. Consider the different types of employees in the company. Would a combination of
devices be better than a single solution? If so, what kinds of employees would get
which type of computer?
4. As a team, write a summary position paper. Support your system recommendation for
the company. Each team member should include why his or her type of computer will
be part of the solution or not.
Conclusion
Desktop, notebook, and tablet PC computers have their own merits as computing systems.
Beyond portability, there are other things to think about. Being aware of the options in the
marketplace, knowing how to analyze the trade-offs of different designs, and recognizing
the different needs each type fulfills allows you to become a better consumer as well as a
better computer user.
chapter
project
project
ethics
Ethics Project
Ethical conduct is a stream of decisions you make all day long. In this exercise, you will re-
search and then role-play a complicated ethical situation. The role you play may or may not
match your own personal beliefs but your research and use of logic will enable you to rep-
resent whichever view is assigned. An arbitrator will watch and comment on both sides of
the arguments, and together the team will agree on an ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which your college is
considering modifying its current technology setup to a more green IT strategy.
2. Team members should write a summary that provides background information for
their character—for example, environmentalist, college IT administrator, or arbitrator—
and details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the chat room feature of MyITLab, the discussion board feature of Blackboard, or
meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
91
three
three
chapter
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What is the origin of the Internet? (pp. 94–95)
2. How can I communicate through the Internet? (pp. 95–99)
3. How can I communicate and collaborate using Web 2.0 technologies? (pp. 99–105)
4. What are the various kinds of multimedia files found on the Web, and what software
do I need to use them? (pp. 106–108)
5. What is e-commerce, and what e-commerce safeguards protect me when I’m
online? (pp. 108–110)
6. What is a Web browser, and what is a URL and what are its parts? (pp. 110–111)
7. How can I use hyperlinks and other tools to get around the Web? (pp. 112–115)
8. How do I search the Internet effectively, and how can I evaluate Web sites?
(pp. 115–118)
9. How does data travel on the Internet? (pp. 118–121)
10. What are my options for connecting to the Internet? (pp. 121–126)
multimedia resources
multimedia
resources
Active Helpdesk
• Doing Business Online (p. 110)
• Getting Around the Web (p. 117)
• Using Subject Directories and Search Engines (p. 118)
• Connecting to the Internet (p. 122)
Sound Bytes
• Creating a Web-Based E-mail Account (p. 97)
• Blogging (p. 60)
• Welcome to the Web (p. 114)
• Finding Information on the Web (p. 118)
• Connecting to the Internet (p. 121)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Looking for answers on
the Web? Check out WolframAlpha.com, a new way to search for
information on the Web!
Where do you go when you need to find something online? Google? Dogpile?
Although these and other common Internet tools help you find information, they
generally lead you to where you can find an answer, but don’t always provide the
answer—or an answer that you trust. Enter WolframAlpha.com (wolframalpha.com), a
“computational knowledge engine” that computes the an-
swers to a wide range of questions that have factual answers.
For example, if you ask, “What is the monthly payment for a $20,000, five-year
loan at 5% interest?” you’ll get not only the payment but also the total interest paid
and the effective interest rate. A search for “pear” results in average nutrition facts,
taxonomy information, and the digital representation of the color “pear.” WolframAlpha
understands questions and computes answers, unlike traditional
Internet search tools that simply retrieve
Web files that might contain an answer.
The foundation of this unique tool is a
set of models from a variety of fields of
knowledge, combined with massive amounts
of data and algorithms that represent real-
world knowledge. It knows about technol-
ogy, geography, cooking, business, travel,
music, and more. The information it delivers
uses more than 5,000 different visual
representations such as table styles
and graphs.
Ask WolframAlpha.com a question today
to see how cool it really is.
93
The Internet early 1960s, there was no reliable way to
connect computers from different manufac-
It’s hard to imagine life without the turers because they used different
Internet, the largest computer network in proprietary designs and methods of commu-
the world. It’s actually a network of net- nication. What was lacking was a common
works that connects billions of computer communications method that all computers
users globally. We use it to shop, to commu- could use. The Internet was created to
nicate, to research, to find places and get respond to these two concerns: establishing
directions, and to entertain ourselves (see a secure form of military communications
Figure 3.1). It’s accessible from our comput- and creating a means by which all comput-
ers, smartphones, and portable music ers could communicate.
players (PMPs), and we can get to it while Who invented the Internet? The
at home, at work, at school—even at modern Internet evolved from an early U.S.
Starbucks or in the car. But what exactly is government–funded “internetworking”
the Internet, and how did it begin? project called the Advanced Research
Why was the Internet created? Projects Agency Network (ARPANET).
Figure 3.1 The concept of the Internet was developed ARPANET began as a four-node network
From buying sneakers on while the United States was in the midst of involving UCLA, Stanford Research Insti-
eBay to getting directions the Cold War with the Soviet Union. At that
on your cell phone to tute, the University of California at Santa
time, the U.S. armed forces were becoming Barbara, and the University of Utah in Salt
checking messages or
finding out about the latest increasingly dependent on computers to Lake City. The first real communication
amusement park features, occurred in late 1969 between the computer
the Internet makes it all at Stanford and the computer at UCLA.
possible.
Although the system crashed after the third
letter was transmitted, it was the beginning
94 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Internet and the Web as being interchange- 800,000,000
able. However, the Web is only one compo-
700,000,000
nent of the Internet, the means we use to
access information over the Internet (hence Internet domain survey host count
600,000,000
the www at the beginning of Web addresses).
500,000,000
Other components of the Internet include
FTP, Gopher, Telnet, and BitTorrent, which 400,000,000
will be discussed later in this chapter. What
distinguishes the Web from the rest of the 300,000,000
Internet is its use of 200,000,000
Jan-94
Jan-95
Jan-96
Jan-97
Jan-98
Jan-99
Jan-00
Jan-01
Jan-02
Jan-03
Jan-04
Jan-05
Jan-06
Jan-07
Jan-08
Jan-09
Jan-10
compatible formats, and
• special links that enable users to
navigate from one place to another on Figure 3.2
the Web. Figure 3.2. The growth of the Web is by no
The growth of the number
means complete. In January 2010, more than of Web sites on the
Did the same people who invented 732 million Web sites were online. Internet has been
the Internet invent the Web? The explosive since the
Web was invented many years after the first Web site was hosted
original Internet. In 1989, Tim Berners-Lee, a Communicating in 1990.
Source: www.isc.org/
physicist at the European Organization for Through the Internet: solutions/survey.
Nuclear Research (CERN), wanted a method
for linking his research documents so that
E-Mail and Other
other researchers could access them. In Technologies
conjunction with Robert Cailliau, Berners- Think of all the different ways you commu-
Lee developed the basic architecture of the nicate with your friends, family, professors,
Web and created the first Web browser (or and business associates over the Internet.
browser), software that enables a user to You can use instant messaging, group
display and interact with text and other communications, social networking, web
media on the Web. The original browser logs and video logs, wikis, podcasts, and
could handle only text and was usable only webcasts to communicate via the Internet.
on computers running the NeXT operating (You can even talk over the phone through
system, a commercially unsuccessful operat- the Internet, which will be discussed in
ing system (OS), which limited its usage. So Chapter 8.) Like any other means of commu-
Berners-Lee put out a call to the Internet nication, you need to know how to use these
community to assist with development of tools efficiently to get the most out of them.
browsers for other platforms.
In 1993, the National Center for Super-
computing Applications released its Mosaic
browser for use on the Macintosh and
E-Mail
Windows operating systems. Mosaic could Why did e-mail catch on so quickly?
display graphics as well as text. The once- E-mail (short for electronic mail) is a writ-
popular Netscape Navigator browser ten message that is sent and received over
evolved from Mosaic and heralded the be- the Internet. The messages can be formatted
ginning of the Web’s monumental growth. and enhanced with graphics and may also
How much has the Internet include other files as attachments. E-mail
grown? The Internet experienced explo- became the primary method of electronic
sive growth in the early to mid-1990s. By communication worldwide because it’s fast
1997, Internet access was global. and convenient. Initially, another attraction
Because of such global Internet availabil- to e-mail was that it reduced the costs of
ity and access, as well as the increasing postage and long-distance phone calls.
capabilities of hardware and software, the Currently, e-mail is predominately the main
number of Web sites—locations on the means of communication in the business
Internet—grew exponentially, as shown in community. For social exchanges, e-mail
Figure 3.3
You can organize your
e-mail and assign
messages to topic-
specific folders.
E-mails can be
organized by status,
sender, date, or
category.
96 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Creating a Web- installed, Web-based e-mail accounts make
SOUND your e-mail accessible from any computer as
BYTE Based E-mail
long as you can access the Internet. No spe-
Account
cial e-mail client software is necessary. Even
In this Sound Byte, you’ll see a step-by-step demon- if you use a client-based account, having a
stration that explains how to create a free Yahoo! Web- secondary Web-based e-mail account, such
based e-mail account. You’ll also learn the options as Yahoo! or Gmail, also provides you with a
available with such accounts. more consistent e-mail address. Your other
e-mail accounts and addresses may change
when you switch ISPs or change employers,
so having a consistent e-mail address is
important.
read, send, and organize your e-mail, you Why would I need a client-based
can use an e-mail client. E-mail clients such e-mail program? One of the benefits of
as Microsoft Outlook are software programs using a client-based e-mail program such as
running on your computer that access your Microsoft Outlook is that you can download
Internet service provider (ISP), which acts your e-mail from many different e-mail
like an electronic post office. However, with accounts so that it all can be accessed in one
these e-mail clients, you are able to view location. In addition, client e-mail programs
your e-mail only from a computer on which offer several features to help you manage
the e-mail client program is installed, which and organize your e-mail and coordinate
can be less than convenient if you travel or e-mail with your calendar, tasks, and contact
want to view your e-mail when you’re away lists. As you can see in Figure 3.3, you can
from that computer. organize your e-mail by task, sender, or
Today, most high-speed providers and priority, or you can file your messages to
ISPs offer the services of a Web-based e-mail designated folders within your inbox. Some
client so that users can look at their e-mail Web-based e-mail systems such as Yahoo!
directly from the Web. Web-based e-mail feature many of the same organizational
uses the Internet as the e-mail client. Free tools, but client-based programs are gener-
e-mail accounts such as Yahoo! Mail, ally more fully featured.
Hotmail, or Gmail are Web-based e-mail
clients. Some e-mail providers—AOL, for
example—offer both client-based and
Instant Messaging
Web-based access to e-mail. What is instant messaging? Instant
What are the advantages of a Web- messaging (IM) services are programs that
based e-mail account? Unlike client- enable you to communicate in real time with
based e-mail, which is accessible only from a others who are online (see Figure 3.4).
computer on which the e-mail client is Although IM is most often used for casual
Figure 3.4
Instant messaging
services such as
Facebook Chat enable
you to have real-time
online conversations.
Group Communication
What kinds of online group
communication exist? E-mail
and IM allow you to chat with one
or a few people that you know
personally. Sites such as Facebook,
which are certainly the most com-
mon form of group communication
Figure 3.5 on the Internet, further connect you to
Google Groups is a convenient means to join a group your circle of friends and family. Sometimes,
or to create your own. however, you might want to connect with
others who share your interests but who you
might not know personally. You can com-
conversations between friends, many busi- municate and interact online with people
nesses use IM as a means of quick and in- who share similar interests through chat
stant communication between co-workers. rooms, newsgroups, and Internet Relay Chat
AOL’s AIM has been one of the most pop- (IRC).
ular instant messaging services. Facebook A chat room, such as those found at
Chat, ICQ, Yahoo!, Google, and Windows icq.com/icqchat, is a form of synchronous
Live Messenger also host popular instant- communication in which online conversa-
messaging services. Most of these services tions occur in real time and are visible to
are proprietary, meaning you can chat only everyone in the chat room. Usually, chat
with those who share the same IM service. rooms are organized around a specific
But there are universal chat services such as theme or topic. Wireclub (wireclub.com) has
Trillian, Pidgin, and Digsby that allow users a variety of chat rooms to suit every interest.
of all the popular IMs to chat with each A newsgroup is similar to a discussion
other regardless of the service they use. group or forum in which people create
Meebo is a new Web-based universal chat threads (conversations). In a thread, a news-
service that lets you communicate with group member posts messages and reads
users on a variety of IM services from any and replies to messages from other members
computer anywhere. No software download of the newsgroup. Google Groups is a great
is required because it’s Web-based. source for various newsgroups. Google
How do I keep track of my IM Groups (see Figure 3.5) allows you to join a
contacts? When you use IM, you set up group or create your own. Internet Relay
a list of contacts, often called a buddy list. To Chat (IRC) is primarily a means of synchro-
communicate (or chat) with someone from nous group communication used in discus-
your buddy list, that person must be online sion forums. Trillion, Pidgin, and XChat are
at the same time as you are. When someone popular IRC clients, and ChatZilla is a Fire-
wants to chat with you, a window pops fox add-on; Mibbit is a Web-based client.
open with his or her message. If it’s not Social networking is another popular
convenient to chat at that time, you can close means of communicating with many people,
or ignore the message. Some programs such which we will discuss in the Web 2.0 section
as Yahoo! and AOL’s AIM offer stealth next.
settings so that you can appear offline to Are there rules for group commu-
certain buddies. nications? General rules of etiquette,
If you want to chat with more than one often referred to as netiquette, exist across
person, you can hold simultaneous individ- chat rooms and other online forums, includ-
ual conversations, or if you all want to chat ing obvious standards of behavior such as
together, you can create custom IM chat introducing yourself when you enter the
98 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
room and specifically addressing the person and communicative nature of Web 2.0 appli-
to whom you are talking. Chat room users cations. Other Web-based productivity
also are expected to refrain from swearing, applications will be discussed in Chapter 4.
name-calling, and using explicit or preju-
diced language, and they are not allowed to
harass other participants. In addition, chat Social Networking
room users cannot post the same text repeat-
edly with the intent to disrupt the chat, a be- What is social networking? Social
havior called flooding. Similarly, users networking is a means by which people use
shouldn’t type in all capital letters, because the Internet to communicate and share infor-
this is interpreted as shouting. mation among their immediate friends, and
meet and connect with others through com-
mon interests, experiences, and friends (see
Web 2.0 Figure 3.7). Social networking services such
as Facebook (facebook.com) and MySpace
Technologies: (myspace.com) have become amazingly pop-
Collaborating and ular because they provide ways for members
Communicating to communicate with their friends in a vari-
ety of means such as by voice, chat, instant
Through the Internet message, and videoconference so that mem-
Over time, our use of the Internet has bers don’t need separate communication
evolved from passively using Web content accounts. These services were first accepted
created for us to actively creating, sharing, broadly among the younger, nonprofessional
and collaborating on our own Web content. population, but now many adults create
Web 2.0 describes an evolved type of Web their own social networking profiles on
interactions between people, software, and Facebook and MySpace. In fact, the largest
data. It can be classified as the social Web, increase of Facebook users in 2009 was
in which the user is also a participant. adults aged 55 and over, with a growth rate
Additionally, Web 2.0 describes a trend of of nearly 925%! Ning (ning.com) is a social
new applications to combine the functional- networking site that allows you to create
ity of multiple applications. Hundreds of your own network around your own com-
companies now exist to help us share, mon topic or join a social networking group
recommend, collaborate, create, and social- that has already been formed.
ize (see Figure 3.6). The following discus- Is social networking just for
sions focus more on the social, collaborative, fun? Networking has long been a means
Figure 3.6
Hundreds of companies
and Web sites make up
the Web 2.0 landscape,
which helps us share,
recommend, collaborate,
create, and socialize.
100 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
personal journal that uses video as the pri-
mary content. It can also contain text, im-
ages, and audio. Vlogs quickly are becoming
a highly popular means of personal expres-
sion, and many can be found by searching
the most popular video-sharing site today,
YouTube (youtube.com). Software such as
Vlog It! makes adding video content to your
blog easy, although you can easily upload
unedited video straight from your com-
puter, video camera, or cell phone. Blinkx
(blinkx.com) is a video search engine that
helps you sift through all the video posted
on the Web (see Figure 3.8).
Why would I want to create a
blog? Many people use blogs as a sort of
personal scrapbook. Whenever the urge
strikes, they just write a stream-of-
consciousness flow of thoughts or a report wordpress.com. You can add other features Figure 3.8
of their daily activities. Many blogs, to your blog such as pictures or subpages. Video logs use video in
however, focus on a particular topic. For Another alternative is to host your blog addition to text, images,
example, themovieblog.com contains yourself. Hosting your own blog requires and audio. Blinkx is a
reviews and opinions about movies, and that you have your own Web site and a URL video search engine that
engadget.com (see Figure 3.9) is a blog that so that people can access it. helps you sift through the
increasing number of
devotes itself to discussing techno-gadgets. Are there problems with blogs? vlogs.
Many corporations, such as WalMart and The popularity of blogs has brought about a
Best Buy, have blogs written by employees. new problem: spam blogs (splogs), which
Blogcatalog (blogcatalog.com) and Bloghub are artificially created blog sites filled with
(bloghub.com) are two of many blog direc- fake articles or stolen text (a tactic known as
tories that can help you find blogs that best blog scraping). Splogs, which contain links to
fit your interests. other sites associated with the splog’s
How do I create a blog? It is easy to creator, have the intention of either increas-
write and maintain a blog, and many Web ing traffic to, or increasing search engine
sites provide the necessary tools for you rankings for, these usually disreputable or
to create your own. Two sites that offer useless Web sites. Although not terribly
free blog hosting are blogger.com and bad, splogs are another unwanted form of
a b Figure 3.9
(a) Some blogs, like this
one from engadget.com,
are set up as online re-
views organized by
category. (b) Alternatively,
they can appear as
personal journals that
record a blogger’s
thoughts, viewpoints, and
feelings in reverse
chronological order.
Web 2.0 Technologies: Collaborating and Communicating Through the Internet 101
content that continues to grow like weeds online courses. Wikis are also becoming pop-
on the Web. ular tools for business collaboration. Rather
than passing documents back and forth via
Wikis e-mail and losing track of which updated
version is the most recent, wikis allow all
What are wikis? Unlike traditional Web who have access to the wiki page to post
content, which the viewer of the site cannot their ideas and modify the content of just one
change, a wiki is a type of Web site that document. A history of all changes is kept so
allows users to change its content by users can revert to earlier versions if desired.
adding, removing, or editing the content These same collaborative efforts extend to
(see Figure 3.10). Wikis add the extra benefit user manuals. One site, wikiHow (wikihow.
of tracking revisions so that past versions org), is an online project that uses both wikis
can be easily accessed at any time by any and the collaborative process to build a
reader. Like blogs, wikis can be used to large, online how-to manual. Blender
express thoughts and opinions about certain (blender.org), an open source software
topics. Unlike blogs, wikis can be edited application for 3D modeling, uses
and therefore can present an emergent MediaWiki, a more feature-rich wiki
“common” opinion rather than the implementation product, to provide users
individual opinion of the initial writer. with documentation, help with game
The popular collaborative online encyclo- development and 3D modeling, and
pedia Wikipedia (wikipedia.org) uses wiki tutorials for Blender software.
technology so that the content can be How accurate is Web content that
updated continually. Some Web-based anyone can change? The idea behind
Figure 3.10 document products, such as Google Docs content that is managed and edited by many
(docs.google.com), have wiki-like features users, such as that found in large public
Rather than collaborating
by exchanging e-mails to promote online collaboration. wikis such as Wikipedia, is that the group
and attachments—and What are wikis used for? Wikis will keep the content valid. Those challeng-
potentially losing track of provide an excellent source for collaborative ing the validity of publicly editable wikis
the most recent version writing, both in and out of the classroom.
of a document—different
argue that the content cannot be trusted
Wiki technology is currently incorporated in because wikis are easily tampered with,
users can collaborate on
a wiki page. course management systems such as Black- whereas supporters argue that the commu-
board, to encourage collaborative learning in nity of users can quickly catch erroneous
content and correct it.
Project Home In late 2005, Wikipedia content was
Week 7: Publicity Law
9/17/12 – 9/23/12
measured for accuracy in its scientific con-
tent and was found to be as accurate as the
9/18/12
Elijah provides initial text Mackenzie-Jordan Law Associates has a significant number Encyclopedia Britannica. Nonetheless, free and
(in black) of celebrity clients. One of the most important aspects of
our legal counsel to these individuals is to help protect the
easy access to edit pages also can lead to im-
use of their images and likenesses. proper manipulation, which results in tighter
Sometimes this is referred to as the right of publicity. This
right is a valuable asset because there are endless licensing access controls. To thwart malicious editing
opportunities that can be quite lucrative.
Some states have a publicity law that protects a celebrity’s
of the wiki content, for example, users who
image and likeness for 100 years, but as yet that law has want editing privileges are required to regis-
not been enacted in the state of Texas.
ter. Citizendium (citizendium.org), another
9/19/12 Jordan includes
The merchandising of celebrity images has become a huge additional text open wiki encyclopedia, requires contribu-
source of income for many celebrities as well as others. (shaded yellow) tors to provide real names and sign an ethics
In recent years, legal disputes have resulted from artists
and illustrators manipulating celebrity images. pledge, and all postings are monitored.
In the past, courts have typically protected the First
Amendment rights of artists in these cases. But recently
there have been a few cases where celebrities have been
allowed to sue creators of fictional works for the violation of Podcasts and Webcasts
the right of publicity.
The right of publicity is intended to prevent others from
capitalizing on a celebrity’s fame. Many people in the
What is a podcast? A podcast is a clip
entertainment industry are fearful that unauthorized of audio or video content that is broadcast
biographies, docudramas, and celebrity spoofs and satires
will no longer be protected. Many entertainment lawyers say over the Internet using compressed audio
a celebrity’s right to publicity is intended solely for ads and
merchandise, not for literary works.
and video files such as MP3s and MP4s. This
content might include radio shows, audio-
books, magazines, and even educational
Stephanie removes text programs. The word podcast is a combina-
(shaded with green and
shown with strikethrough) tion of broadcasting and iPod—not because
102 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
you have to use an iPod but because iPods BITS
are the most popular form of portable media AND Can Blogging Get You in Trouble?
player (PMP) and because people download BYTES
audio files to listen to on their iPods. How-
ever, you don’t have to listen to podcasts on It’s true: Bloggers have been fired from their jobs and, in some instances, even
a portable media player. You can listen to imprisoned because of the content of their blogs. Generally, the content may include
podcasts on your computer or even on a negative discussion about the blogger’s job, employer, or colleagues, or perhaps inap-
smartphone as long as the device can play propriate content about the blogger. Because blogs are on the Internet, anyone can
the content. To listen to a podcast on your find and read them, including bosses, college administrators, potential employers,
computer, you’ll need a media player such friends, relatives, neighbors, and colleagues. Therefore, illegal and socially unaccept-
as iTunes or Windows Media Player. If you able content should not be included in blogs. Bloggers who post negative or inappro-
want to enjoy a video podcast on your PMP, priate content should be prepared for the consequences.
you need to make sure your mobile device
can play video as well as audio files.
So what makes podcasting differ-
ent from just listening to an audio programs that go out and grab the latest
file on the computer or a PMP? The updates of Web material according to your
difference is that podcasts are files that come specifications. They are available for all
to you through syndication so you do not major operating systems as well as some
have to search for them. Perhaps you are mobile devices such as smartphones.
used to getting your news from a certain Where can I find podcasts?
Web site, but the only way you can deter- Podcasts can be found all over the Web.
mine that new content has been added is to Most newspapers, TV news organizations,
go to the site and look for the newly added and radio sites offer podcasts of their pro-
information. In contrast, if you subscribe to grams. Although many podcasts are news
podcasts, when the content changes, it is related, many podcasts offer more entertain-
brought to you. Some podcasts provide the ing and informative content. The television
opportunities for listeners to submit ques- network ABC, for example, offers podcasts
tions or even take listener’s calls live. What’s of some of its most popular TV shows, such
more, if you have several favorite Web sites, as Grey’s Anatomy and Lost. Sites such as
rather than indi- Yoga Today
vidually check- offer extensive
ing the content, yoga classes.
you can collect Many schools
all the site up- are beginning
dates in one to recognize
place. Podcasts this format
are possible be- as a way to sup-
cause of RSS ply students with
technology, course content
which makes it updates, and
more efficient for instructors
you to gather up- create podcasts
dates to your fa- of their
vorite content. lectures.
What is iTunes
RSS? Really (itunes.com),
Simple Syndica- Figure 3.11 Podcast Alley
tion (RSS) is an Podcasts are available in a wide variety of topics and content. (podcastalley.com),
XML-based Web sites such as podcast.com allow you to add your own and Podcast.com
format that podcast to their directories. (podcast.com) are
facilitates the aggregators as
delivery of frequent content updates on Web well as great directories of podcasts,
pages. Using RSS, Web content can be for- organized by genre, to help you easily
matted in such a way that aggregators can locate podcasts of most interest to you (see
find it and download only the new content to Figure 3.11). If there is a particular topic
your computer. Aggregators are software for which you’d like to hear a podcast,
Web 2.0 Technologies: Collaborating and Communicating Through the Internet 103
TRENDS
IN IT Computers in Society—The Internet Makes Business Startups Affordable
You, as well as many of your classmates, wear flip-flops year round— manufacturers of all sorts of products located in many different countries.
even in winter—and you think that flip-flops in school colors would be And many manufacturers are happy to work with you to custom design
an extremely popular product. Your school’s bookstore carries everything your product. So if you find a flip-flop style you like, you probably can get it
else with the school’s colors and logo, just not flip-flops. You have asked customized with your school colors.
your friends and several classmates, and most of them indicated they But what happens if the bookstore doesn’t want to sell your flip-
would buy flip-flops in the school’s colors. So what do you do next? How flops? You can always set up a Web site to sell them yourself. But you’ll
do you move from product concept to actually selling your physical probably need help with Web site design, company logo design, and Web
product? programming to construct the site if you don’t already have these skills.
Before the advent of the Internet and e-commerce, it would have been Fortunately, you can tap the global marketplace for skilled professionals
much more difficult and expensive to get your product produced and by using sites such as guru.com or elance.com (see Figure 3.13). These
distributed. First, you would have needed to find someone
with industrial design experience to design your flip-flops.
Then, to make the flip-flops, you would have had to find a
manufacturer, which likely required a high minimum order
(maybe tens of thousands of pairs of flip-flops). You also
would have needed a package design, marketing
brochures, company logo (and other branding devices), a
storage facility, and more. Finally, the largest hurdle would
have been convincing a brick-and-mortar retailer, such as
your campus bookstore, to carry your product.
Fortunately, the Internet brings the power of the global
economy right to your door. For product design and
manufacturing, you can visit a site like Alibaba.com
(see Figure 3.12), which helps entrepreneurs locate
Figure 3.12
A search for men’s flip-flops on Alibaba.com reveals
almost 2,500 suppliers with minimum order quantities
as low as 1,000 units.
104 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Figure 3.13
Need to design a package? Many freelancers at Elance.com are ready to help!
sites help you locate freelance professionals to work on projects for you. them? If your parent’s basement isn’t large enough, you can outsource
You can create a description of the job you need done (say, logo design for warehousing and order fulfillment to Amazon.com. Fulfillment by Amazon
a flip-flop company), post it on the site, and invite freelancers to bid on is a service in which Amazon (for a fee) will warehouse your inventory and
your job. You can contact freelancers that look promising, review samples then package and ship it when customer orders are received. Orders do
of their work, and decide on someone who can help you—and at a com- not have to come through Amazon’s site (although that is an option); you
petitive price. After your Web site is designed and up and running, you can can just provide ordering information to Amazon that is collected on your
place your business on social networking sites, such as Facebook, to help site, and Amazon will take care of all the tedious work.
potential customers discover your product and spread the word about your Although there is always a cost to starting up a business, up-front
great flip-flops. You probably already have lots of friends on Facebook who costs are much lower when you take advantage of the global marketplace
attend your school and would be good potential customers. and Internet tools. So take that brilliant idea you have and turn it into a
If you aren’t selling your flip-flops in a physical store, where will you business today!
store them, and who will package and ship them when customers buy
Web 2.0 Technologies: Collaborating and Communicating Through the Internet 105
BITS hour-long live concerts). In addition to
AND What’s Everyone Twittering About? movies, you can watch live or prerecorded
BYTES television broadcasts, movie trailers, and
sporting events. Hulu.com is a great Web
Twitter (twitter.com) is a social networking and microblogging service that enables site where you can find popular TV shows
you to exchange short text messages in real time with your friends or “followers” (see and movies.
Figure 3.15). It lets you specify which Twitter users you want to follow so you can read What are streaming audio and
their messages in one place. All you need is a device (such as your computer or mo- video? Because of the large file sizes of
bile device) connected to the Internet. media content, watching video files such as
Twitter messages, called tweets, are limited to 140 characters, so comments ex- movies or TV shows, listening to live audio
changed in Twitter are short and simple. While Twitter works well among close-knit broadcasting, and playing online games
groups for messages such is possible because of streaming media.
as “Joe and I are going to Streaming audio continuously feeds an
Murphy’s Café. See you audio file to your browser so you avoid hav-
there,” it can also be used ing to wait for the entire file to download
to gain a sense of the completely before listening to it. Likewise,
“pulse” of what the general streaming video continuously feeds a video
public is talking about file to your browser so that you can watch
within a broader commu- large files as they download instead of first
nity. Businesses are using having to download the files completely.
Twitter to respond to cus- What kinds of games are played on
tomer queries or to broad- the Web? Streaming audio and video
cast new services or helped to bring popularity to online user
products. Your Twitter ac- interactivity and online gaming. Many game
count tracks the number of Web sites, such as Addicting Games
“followers,” or people who (addictinggames.com), offer thousands of
are paying attention to your free online games in arcade, puzzle, sports,
tweets, and the number of Figure 3.15 shooting, word, and strategy categories.
“friends,” or people you are Twitter is a social networking and microblogging Simple multiplayer games such as backgam-
following. So, “tweet” away service for staying connected to “followers” in mon, chess, and checkers became popular
to stay connected. real time. and offered users the chance to play the
game with others from around the world.
In addition, there are many multiplayer
online games in which play occurs among
hundreds or thousands of other players over
Web Entertainment: the Internet in a persistent (or always-on)
Multimedia and game environment. In these games, you can
interact with other players around the world
Beyond in a meaningful context by trading, chatting,
Internet radio, music files such as MP3 and or playing cooperative or combative
advanced audio coding (AAC), streaming minigames. There are several types of
video, and interactive gaming are all part of a massive multiplayer online role-playing
growing entertainment world available over games (MMORPGs) in which participants
the Internet. What makes the Web appealing assume the role of a fictitious character in a
to many people is its rich multimedia content. virtual game world. World of Warcraft
Multimedia is anything that involves one or (worldofwarcraft.com), shown in Figure 3.16,
more forms of media in addition to text. and Guild Wars (guildwars.com) are
Many types of multimedia are used on among the most popular MMORPGs.
the Web. Graphics (drawings, charts, and Other types of multiplayer online games
photos) are the most basic form of multime- include first-person shooter games such as
dia. Audio files are what give sound to the battlegroundeurope.com, sports games such
Web—the clips of music you hear when you as footballsuperstars.com, and racing games
visit certain Web sites, MP3 files that you such as needforspeed.com. Second Life
download, or live broadcasts you can listen (secondlife.com) can also be considered an
to through Internet radio. Video files on MMORPG, but with its own well-established,
the Web range from the simple (such as in-world virtual economy, it has transcended
short video clips) to the complex (such as into a much bigger concept and function.
106 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Do I need anything besides a
browser to view or hear multimedia
on the Web? Without any additional
software, most graphics on the Web will
appear in your browser. However, to view
and hear some multimedia files—for
example, podcasts, videos on YouTube, and
audio files—you might need a special soft-
ware program called a plug-in (or player).
Figure 3.17 lists the most popular plug-ins.
If you purchased your computer within
the past several years, many plug-ins proba-
bly came preinstalled on your computer. If a
Web site requires a plug-in you don’t have,
then it usually displays a message on the
screen that includes links to a site where you
can download the plug-in free of charge.
For example, to use streaming video on a
Web site, your browser might send you to
adobe.com, where you can download Flash
Player.
Do I need to update players and Depending on your settings, this access hap- Figure 3.16
plug-ins? As with most technological re- pens without asking you for consent to start World of Warcraft is a
sources, improvements and upgrades are the plug-in. Such automatic access can pres- popular massive
multiplayer online role-
available for players and plug-ins, and most ent security risks. To minimize such risks, playing game.
will alert you to check for and download up- update your plug-ins and browser software
grades when they are available. It is best to frequently so that you will have the most
keep the players and plug-ins as current as up-to-date remedies against identified
possible so that you get the full effects of the security flaws.
multimedia running with these players. Is there any way to get multimedia
Are there any risks with using Web content to load faster? When
plug-ins? When a browser requires a you’re on the Internet, your browser keeps
plug-in to display particular Web content, it track of the Web sites you’ve visited so that
usually automatically accesses the plug-in. it can load them faster the next time you
Flash Player adobe.com Plays animation and movies through Web browsers.
QuickTime Player apple.com Plays MP3 animation, music, musical instrument digital interface (MIDI),
audio, and video files.
Shockwave Player adobe.com Plays interactive games, multimedia, graphics, and streaming audio and
video on the Web.
Windows Media Player microsoft.com Plays MP3 and WAV files, music files and live audio, and views movies and
live video broadcasts on the Web.
108 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
accounting for approximately 25 percent of credentials unsecured. To certify that their
all retail sales. So what is everyone buying online transactions are secure, businesses
online? Consumers now buy books, music hire security companies such as VeriSign.
and videos, movie and event tickets, and But just seeing the VeriSign seal is not al-
toys and games more often online than in re- ways a guarantee that the site is secure be-
tail stores. Travel items such as plane tickets, cause the seal can be copied and pasted onto
hotel reservations, and rental car reserva- virtually any site. Therefore, be sure to check
tions, and even automobile purchases are that the beginning of the URL changes from
also frequently made online. With the ad- “http://” to “https://”—with the “s” stand-
vent of more lenient return policies, online ing for secure socket layer. Another indication
retail sales of clothing and shoes also have that a Web site is secure is the appearance of
increased. Sites such as eBay and Craigslist, a small icon of a closed padlock (in both Mi-
together with payment exchange services crosoft Internet Explorer and Mozilla Fire-
such as PayPal and Google Checkout, are fox), as shown in Figure 3.19. Still, despite
becoming the online equiva- these indications, you also
lent of the weekend yard need to consider the valid-
sale and have dramatically
increased in popularity.
But e-commerce encom-
“ Just how safe
are online
transactions?
ity of the site and place
everything in context.
How else can I shop
”
passes more than just shop- safely online? To ensure
ping opportunities. Today, that your online shopping
anything you can do inside experience is a safe one, fol-
your bank you can do online, and more than low these guidelines:
50 percent of U.S. households do some form
• Shop at well-known, reputable sites. If
of online banking. Many people use online
you aren’t familiar with a site, then
services to check their account balances, pay
investigate it with the Better Business
bills online, as well as check stock and mu-
Bureau (bbb.org) or at bizrate.com.
tual fund performances. Credit card compa-
When you place an order, print a copy
nies allow you to view, schedule, and pay Figure 3.19
of the order and make sure you receive a
your credit card bill; brokerage houses allow A closed padlock icon,
confirmation number. Make sure the
you to conduct investment activities online. “https” in the URL, and
the VeriSign seal are
indications that the site
is secure.
E-Commerce Safeguards
Just how safe are online http:// changes to https:// Closed padlock icon
transactions? When you buy
something online, you most likely
use a credit card; therefore, the ex-
change of money is done directly
between you and a bank. Because
online shopping eliminates a sales-
clerk or other human intermediary
from the transaction, it can actually
be safer than traditional retail shop- Click padlock to display
ping. Still, because users are told to additional security
information.
be wary of online transactions and
because the integrity of online
transactions is the backbone of
e-commerce, businesses must have
some form of security certification
to give their customers a level of
comfort.
Some sites have created se-
cure logins that you can change VeriSign seal
to before signing in, which is
safer than sending your login
110 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
found in Firefox are spell-checking for
e-mail, blogs, and other Web postings, as
well as Session Restore, which brings
back all your active Web pages if the
browser or system shuts down
unexpectedly.
• Safari is a browser developed by Apple
(apple.com). Although it was created as
the default browser for Macintosh com-
puters and is included with the Mac OS,
a Windows-based version is also avail-
able. Safari has quickly gained public ac-
ceptance, and it now has approximately
an 8 percent share of the U.S. browser
market.
• Google Chrome is the newest browser Figure 3.20
on the market, distributed by Google Google Chrome includes thumbnails of the most
(google.com) (see Figure 3.20). The recently visited Web sites for easy access.
unique features offered by Chrome
include thumbnail access to your most within the same browser window. Rather
recently visited sites from Chrome’s than having to switch among Web pages in
main page and shortcuts to Google several open windows, you can flip between
applications. the tabs in one window. You can even open
What features do browsers offer? several of your favorite Web sites from one
Most browsers’ toolbars provide tabbed folder and choose to display them as tabs.
browsing and Quick Tabs for convenient You may also save a group of tabs as a
navigation and Web page management tools Favorites group, if there are several tabs
(see Figure 3.21). Quick Tabs, in Internet you often open at the same time.
Explorer 7 and higher, shows thumbnail Most browsers also include a built-in
images of all open Web pages in open tabs, search box in which you can designate your
and Google Chrome offers thumbnail im- preferred default search engine and tools for
ages of most recently visited sites on its printing, page formatting, and security
main page. Firefox offers a bookmark tool- settings. For extra browsing privacy, most
bar for quick access to the most frequently browsers also offer a feature, such as
used bookmarked sites. Most of the popular InPrivate Browsing in Microsoft Internet
Web browsers have tabbed browsing in Explorer, that allows users to surf without
which Web pages are loaded in “tabs” leaving a trace.
Figure 3.21
Forward and Tabbed browsing Built-in search Internet Explorer (IE)
Back buttons includes tabbed browsing
Quick Tabs and Quick Tabs. IE has
Tag buttons also reduced the display
of navigation tools to a
simple toolbar and built a
Google search engine
right into the browser.
Opened favorites
center with history
112 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
EXAMPLES OF connect you to different Web sites. You can
Figure 3.24
COUNTRY CODES jump from one Web page (the document in-
dicated by the path in the URL), to another
Country Code Country
Web page within the same Web site or navi-
.au Australia gate to another Web site altogether by click-
ing on a specially coded element called a
.ca Canada
hyperlink, as shown in Figure 3.25. Gener-
.jp Japan ally, text that operates as a hyperlink ap-
pears in a different color (often blue) and is
.uk United Kingdom
underlined. Sometimes images also act as
Note: For a full listing of country codes, refer to hyperlinks. When you pass your cursor over
norid.no/domenenavnbaser/domreg.html. a hyperlinked image, for example, a cursor
may change to a hand with a finger pointing
upward. To access the hyperlink, you simply
click the image.
Figure 3.23 lists the most frequently used How do I return to a Web page I’ve
top-level domains. already visited? To retrace your steps,
Each country has its own top-level do- some sites also provide a breadcrumb
main. These are two-letter designations such trail—a list of pages within a Web site
as .za for South Africa and .us for the United you’ve visited. It usually appears at the top
States. A sampling of country codes is of a page. Figure 3.25 shows an example of a
shown in Figure 3.24. Within a country- breadcrumb trail. “Breadcrumbs” get their
specific domain, further subdivisions can be name from the fairy tale “Hansel and Gretel,”
made for regions or states. For instance, the in which the characters drop breadcrumbs
.us domain contains subdomains for each on the trail to find their way out of a forest.
state, using the two-letter abbreviation of By clicking on earlier links in a breadcrumb Figure 3.25
the state. For example, the URL for Pennsyl- trail, you can retrace your steps back to the When you click on a
vania’s Web site is state.pa.us. page on which you started. hyperlink, you jump from
To get back to your original location or one location in a Web site
What’s the information after the to another. When you click
domain name that I sometimes visit a Web page you viewed previously, you on the links in a bread-
see? When the URL is only the domain use the browser’s Back and Forward buttons crumb trail, you can
name (such as nytimes.com), you are re- (see Figure 3.25). To back up more than one navigate your way back
questing a site’s home page. However, through a Web site.
sometimes a forward slash and additional
text follow the domain name, such as in Forward button Breadcrumb trail
nytimes.com/pages/cartoons. The informa-
tion after the slash indicates a particu-
lar file or path (or subdirectory)
within the Web site. The path or sub-
Back button
directory is what identifies each dif-
ferent page within a particular Web
site; it follows the top-level domain
and is preceded by a slash. In Figure
3.22, you would connect to the cartoon
pages on the New York Times site.
Getting Around the Web: URLs, Hyperlinks, and Other Tools 113
page, click the down arrow next to the For-
ward button to access a list of most recently SOUND
BYTE Welcome to the Web
visited Web sites. By selecting any one of
these sites in the list, you can return directly
to that page without having to navigate In this Sound Byte, you’ll visit the Web in a series of
through other Web sites and Web pages guided tours of useful Web sites. This tour serves as an
you’ve visited. introductory guide for Web newcomers and is a great
The History list (see Figure 3.25) on your resource for more experienced users.
browser’s toolbar is also a handy feature. The
History list shows all the Web sites and pages
that you’ve visited over a certain period of Favorites and Bookmarks are great for
time. These Web sites are organized accord- quickly locating those sites you use the
ing to date and can go back as far as three most, but they are accessible to you only
weeks. To access the history list in Internet when you are on your own computer.
Explorer, click the down arrow next to the One way to access your Bookmarks and
navigation arrows. On the Firefox toolbar, Favorites from any computer is to use
the history button is the alarm clock icon. MyBookmarks (mybookmarks.com), a free
Internet service that stores your Bookmarks
and Favorites online.
Favorites, Live Bookmarks, What are live bookmarks? The live
bookmark feature of the Firefox browser
and Tagging adds the technology of RSS feeds to book-
What’s the best way to mark a site marking. Because the Web is constantly
so I can return to it later? If you want changing, the site you bookmarked last week
an easy way to return to a specific Web page may subsequently change and add new con-
without having to remember to type in the tent. Traditionally, you would notice the
address, you can use your browser’s change only the next time you visited the site.
Favorites or Bookmarks feature. Internet Ex- With live bookmarks, the content comes to
plorer and Safari call this feature Favorites; you. Instead of constantly checking your fa-
Firefox and Google Chrome call the same vorite Web pages for new content, a live book-
feature a Bookmark. This feature places a mark delivers updates to you as soon as they
marker of the site’s URL in an easily retriev- become available. Live bookmarks are useful
able list in your browser’s toolbar. To organ- if you are interested in the most up-to-date
Figure 3.26 ize the sites into categories, most browsers news stories, sports scores, or stock prices.
Delicious is a social
offer tools to create folders. Most browsers What is social bookmarking?
bookmarking Web site also provide features to export the list of Social bookmarking, also known as
that allows you to bookmarks to a file from which you can im- tagging, lets you store, organize, and man-
organize and share your port to another computer or another browser. age bookmarks (or tags) of Web pages. A so-
favorite Web sites. cial bookmark or tag is a
keyword or term that is
Installed Toolbar
buttons for easy
assigned to a piece of in-
tagging formation such as a Web
page, digital image, or
video. A tag describes the
Number of people
who also
item so that it can be
tagged article found again by browsing
or searching. Tags were
popularized by Web 2.0
Tags created to Web sites such as YouTube
identify article and Flickr.
The social bookmark-
ing Web site Delicious
(delicious.com) gives you
List of all tags
the ability to add tags as
bookmarks to your fa-
vorite Web sites (see
Figure 3.26). The tag can
114 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Figure 3.27
Icons of some popular
be something meaningful to you, or you a structured outline of Web sites organized social bookmarking Web
can select one from a list of suggested tags. by topics and subtopics. Librarians’ Internet sites.
Later, you can go back to Delicious, conduct Index (ipl.org) is a subject directory, and
a search using your tag, and find bookmarks some popular search engines such as Yahoo!
tagged with the same word from everyone also feature directories. If you can’t decide
in your network. You can also see how which search engine is best, then you may
many other Web users tagged the same want to try a metasearch engine.
site. Delicious offers convenient toolbars Metasearch engines, such as Dogpile
for your browsers, and many Web sites (dogpile.com), search other search engines
incorporate bookmarking icons for ease rather than individual Web sites. Figure 3.28
of use. lists search engines and subject directories
Figure 3.27 lists several popular social that are alternatives to Google, Yahoo!, Bing,
bookmarking tag tools. Diigo (diigo.com) and Ask.com.
allows you not only to tag and bookmark
Web sites but also to annotate the pages
Search Engines
with highlights and sticky notes. Through
Diigo, the Web pages can be archived, so How do search engines work? Search
they are always available. Digg (digg.com) engines have three parts. The first part is a
and Newsvine (newsvine.com) offer similar program called a spider. The spider con-
systems for organizing news content. Stum- stantly collects data on the Web, following
bleUpon (stumbleupon.com) is like a per- links in Web sites and reading Web pages.
sonalized search engine and recommends Spiders get their name because they crawl
Web sites based on your personal interests over the Web using multiple “legs” to visit
and preferences, as well as the recommenda- many sites simultaneously. As the spider
tions of people you know or the general collects data, the second part of the search
surfing public. engine, an indexer program, organizes the
data into a large database. When you use a
search engine, you interact with the third
part: the search engine software. This soft-
Searching the Web ware searches the indexed data, pulling out
Effectively relevant information according to your
search. The resulting list appears in your
With its billions of Web pages, the Web Web browser as a list of hits (sites that match
offers visitors access to masses of informa- your search).
tion on virtually any topic. To narrow down Why don’t I get the same results
the quantity of Web information to some- from all search engines? Each search
thing more useful, use a search engine and a engine uses a unique formula, or algorithm,
keyword query. A search engine is a set of to formulate the search and create the result-
programs that searches the Web for ing index of related sites. In addition, search
keywords—specific words you wish to look engines differ in how they rank the search
for (query)—and then returns a list of the results. Most search engines rank their re-
Web sites on which those keywords are sults based on the frequency of the appear-
found. Popular search engines include ance of your queried keywords in Web sites
Google, Yahoo!, Bing, and Ask.com. as well as the location of those words in the
For some searches, you also can search sites. Thus, sites that include the keywords
the Web using a subject directory, which is in their URL or site name most likely appear
Clusty clusty.com Keyword search engine that groups similar results into clusters
ChaCha chacha.com This site lets you chat with a real live professional guide who helps you
search, and it’s free of charge. Also available by texting your questions to
242242.
CompletePlanet completeplanet.com Deep Web directory that searches databases not normally searched by typical
search engines
Dogpile dogpile.com Metasearch engine that searches Google, Yahoo!, Bing, and Ask
InfoMine infomine.com Subject directory of academic resources with keyword search engine
capabilities
Rollyo rollyo.com Short for “Roll Your Own Search Engine.” This site lets you create your own
search engine (searchroll) that searches just the sites you want it to search.
Open Directory Project dmoz.org Subject directory with keyword search capabilities
Stumbleupon stumbleupon.com Lets you rate pages “thumbs up” or “thumbs down.” As it learns your
preferences, your search results improve.
at the top of the hit list. After that, results In addition, search engines differ as to
vary because of differences in each engine’s which sites they search. For instance, Google
proprietary formula. and Ask.com search nearly the entire Web,
whereas specialty search engines search
BITS only sites that are relevant to a particular
AND Searching to Do Good subject. Specialty search engines exist for
BYTES almost every industry or interest. For
example, dailystocks.com is a search engine
There are many volunteer and charitable organizations to participate in, but for most of used primarily by investors that searches for
us it’s hard to incorporate such activities into our daily lives, and it’s equally difficult to corporate information to help them make
contribute financially to them all. Now there is an easy way to “do good” while doing educated decisions. Search Engine Watch
something we all do daily—use a search engine. GoodSearch (goodsearch. com) is a (searchenginewatch.com) has a list of
Yahoo-powered search engine that donates half of its revenues to approved U.S. char- many specialty search engines organized by
ities and schools that users designate. The money GoodSearch donates comes from industry.
the site’s advertisers and amounts to approximately a penny per search. Can I use a search engine to
If you’re a big fan of the SPCA, a local hospital, or the neighborhood public ele- search for images and videos? With
mentary school, check to see if that particular organization has been approved. If so, the increasing popularity of multimedia,
you can add it as your designated charity and start searching. You can easily track search engines such as Google, Ask.com,
how much GoodSearch has raised for your organization. More than 86,000 charitable and Yahoo! have capabilities to search the
organizations are being helped by GoodSearch, but if the organization you are inter- Web for digital images and audio and video
ested in is not on the list, as long as it is a registered U.S. not-for-profit organization, files. YouTube (youtube.com) is one of many
you can apply to have it added. sites that has gained recent popularity
You can also contribute to your favorite charity by shopping online through because of its wealth of video content. In
GoodShop. Instead of going directly to your favorite Web shop, go to Goodshop.com addition to the amusing videos that are
first, find and click through to the store of your choice, and start shopping. Participat- captured in popular news, YouTube contains
ing stores donate up to 30 percent of the purchased amount. So, search and shop instructional and informational videos.
away—and do some good! How can I refine my searches for
better results? When you conduct a
116 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
ACTIVE results about processors from the
HELP-
Getting Around Wired.com Web site. The same method
DESK the Web works for entire classes of sites in a
given top-level domain or country code.
In this Active Helpdesk call, you’ll play the role of a • Use a wild card. The asterisk “*” is a
helpdesk staffer, fielding calls about Web browsers, wild card, or placeholder, feature that is
URLs, and how to use hyperlinks and other tools to get helpful when you need to search with
around the Web. unknown terms. For example, searching
with Congress voted *on the* bill returns
sites that mention how Congress voted
on various bills.
Web search, you may receive a list of hits How else can I customize my
that includes thousands—even millions—of searches? A lot of other specialty
Web pages that have no relevance to the search strategies and services are available.
topic you’re trying to search. Initially, Clicking on the “more” hyperlink in the
Boolean operators were needed to help re- Google search engine, for example, takes
fine a search. Boolean operators are words you to all the various search products
such as AND, NOT, and OR that describe Google offers. Google Scholar searches
the relationships between keywords in a scholarly literature such as peer-reviewed
search. papers, theses, and publications from
Today, most search engines offer an ad- academic organizations. Each search result
vanced search page that provides the same contains bibliographic information as
types of strategies in a well-organized form well. Google Custom Search enables you
(see Figure 3.29). Using the advanced search to create a customized search engine to
form can make your Internet research a lot search only a selected set of sites tailored to
more efficient. With the simple addition of a your specific needs. This specialized search
few words or constraints, you can narrow engine can be added to a Web site or blog,
your search results to a more manageable or designed for a specific organization.
and more meaningful list. Google Book Search enables you to search
Are there other helpful search through the full-text content of millions of
strategies? Instead of using the ad- books. Google News searches through
vanced search form, you can use other thousands of news stories from around
strategies to help refine your searches when the world. Google News can be further Figure 3.29
entering your search phrases: customized to search stories within specific Most search engines have
• Search for a phrase. To search for an categories such as Business or Entertain- an advanced search form
exact phrase, place quotation marks ment, and a News Archives Timeline shows to help you refine your
selected results from relevant time periods searches.
around your keywords. The search en-
gine will look for only those Web sites (see Figure 3.30).
that contain the words in that exact Advanced search tips
order. For example, if you want infor- for additional search
strategies
mation on the movie Lord of the
Rings and you type these words
without quotation marks, your
search results will contain pages
that include either of the words
Lord and Rings, although not neces-
sarily in that order. Typing “Lord of
the Rings” in quotes guarantees
that search results will include this
exact phrase.
• Search within a specific Web site.
To search just a specific Web site,
you can use the search keyword,
then site: followed by the Web site’s
URL. For example, searching with
processor site:wired.com returns
118 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
ETHICS Plagiarism and Copyright Violation—
IN IT What Can You Borrow from the Internet?
You’ve no doubt heard of plagiarism—claiming another person’s words ensure your paper doesn’t even have unintended instances of plagia-
as your own. And you’ve probably heard the term copyright violation, rized work.
especially if you’ve been following the music industry’s battle to keep Copyright violation is more serious because it, unlike plagiarism, is
“free” music off the Web. But what constitutes plagiarism, and what con- punishable by law. Copyright law assumes that all original work—
stitutes copyright violation? And what can you borrow from the Web? including text, graphics, software, multimedia, audio and video clips, and
Consider these scenarios: other intellectual property—is copyrighted even if the work does not dis-
1. You find a political cartoon that would be terrific in a PowerPoint play the copyright symbol (©). Copyright violation occurs when you use
presentation you’re creating for your civics class. You copy it into another person’s material for your own personal economic benefit, or
your presentation. when you take away from the economic benefit of the originator. Don’t
2. Your hobby is cooking. You design a Web site that includes videos of assume that by citing a source you’re abiding by copyright laws. In most
you preparing recipes, as well as the recipes themselves. Some of cases, you need to seek and receive written permission from the copy-
these recipes you take from your favorite cookbooks; others you right holder.
get from friends. You don’t cite your sources, nor do you obtain There are exceptions to this rule. For example, there is no copyright on
permission from the originators of the recipes you post to your government documents, so you can download and reproduce material from
Web site. NASA, for example, without violating copyright laws. The British Broadcast-
3. You’re pressed for time and need to do research for a paper due ing Corporation (BBC) is also beginning to digitize and make available its
tomorrow. You find information on an obscure Web site and copy archives of material to the public without copyright restrictions.
it into your paper without documenting the source. Teachers and students receive special consideration regarding
4. You download a song from the Internet and incorporate it into a copyright violations. This special consideration falls under a provision
PowerPoint presentation for a school project. Because you called academic fair use. As long as the material is being used for edu-
figure everyone knows the song, you don’t credit it in your
cational purposes only, limited copying and distribution is allowed. One
sources.
standard applied to academic fair use is the effect the use has on the
Which of the preceding scenarios represent copyright violations? potential market. For example, an instructor could make copies of a
Which represent plagiarism? The distinctions between these scenarios are book chapter and distribute it to her class one time but could not do it
narrow in some cases, but it’s important to understand the differences. on a regular basis or over different semesters because that might affect
As noted earlier, plagiarism occurs when you use someone else’s the potential market or sales of the book. Similarly, a student can in-
ideas or words and represent them as your own. In today’s computer clude a cartoon in a PowerPoint presentation without seeking permis-
society, it’s easy to copy information from the Inter- sion from the artist. However, to avoid plagiarism
net and paste it into a Word document, change a in these situations, you still must credit your
few words, and call it your own. To avoid plagia- sources of information.
rism, use quotation marks around all words you So, do you now know which of the four scenar-
borrow directly, and credit your sources for any ios above are plagiarism or copyright violations?
ideas you paraphrase or borrow. Avoiding plagia- Let’s review them.
rism means properly crediting all information you
obtain from the Internet, including words, ideas, 1. You are not in violation because the use of the
graphics, data, and audio and video clips. cartoon is for educational purposes and falls
Web sites such as turnitin.com (for teachers under the academic fair use provision. You
must still credit the source, however.
and institutions) and WriteCheck.com (specifically
for students), as shown in Figure 3.31, help check 2. If you maintain your Web site for your eco-
nomic benefit, you would be in violation of
for plagiarism violations. WriteCheck.com com-
copyright laws because no credit was given for
pares your document to a database of magazines,
the recipes, and you are presenting them as
newspapers, journals, and books, as well as Web your own.
content and previously submitted student papers. Figure 3.31
3. You are guilty of plagiarism because you
Although some common phrasing may be truly By using WriteCheck.com, students copied content from another source and
coincidental, real and purposeful plagiarism is can compare their work to a database implied it was your own work.
reasonably easy to identify. Students can use of publications to check for unintended 4. Again, because your copying is for a school
WriteCheck.com before submitting an assignment plagiarism. project, you are not in violation because of
to ensure their papers will not be confused with the academic fair use provision. However,
plagiarized work. In most schools, plagiarism is a serious offense, it’s always important to document your
often resulting in a 0 for an assignment, or an F for the class. It’s best to sources.
STEP 3:
Server at skislope.com
receives request
National access
(Internet Backbone)
Regional
access
STEP 2:
Request travels to
STEP 1: server through Internet
Client computer requests access companies
access to skislope.com
through browser
STEP 4:
Request travels back to client
computer through Internet
access companies
120 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
5. Your Web browser interprets the data BITS
and displays it on your monitor. AND Citing Web Site Sources
BYTES
How does the data get sent to the
correct computer? Each time you After you’ve evaluated a Web site and determined it to be a credible source of infor-
connect to the Internet, your computer is mation that you will use in a research paper, you will need to list the source in the
assigned a unique identification number. Works Cited section of your paper. There are formal guidelines as to how to cite Web
This number, called an Internet Protocol content. Unlike those for citing books and periodicals, however, these standards are
address (or IP address), is a set of four still being developed. At a minimum, the following components should be included in
numbers separated by periods and com- the citation: author, title of document or publication, date of publication or last revi-
monly referred to as a dotted quad or dotted sion, date accessed and complete URL. Note that URL citations are no longer required
decimal such as 123.45.245.91. IP addresses by the MLA, but if a citation is still desired, it should appear in angle brackets. The fol-
are the means by which all computers lowing are examples of Web citations in both Modern Language Association (MLA)
connected to the Internet identify each and American Psychological Association (APA) style for an article found in
other. Similarly, each Web site is assigned BusinessWeek online:
an IP address that uniquely identifies it.
However, because the long strings of Example of MLA style
numbers that make up IP addresses are Fletcher, D. “How Facebook Is Redefining Privacy.” Time. 20 May 2010. 17 June
difficult for people to remember, Web sites 2010. <http://www.time.com/time/business/article/0,8599,1990582,00.html>
are given text versions of their IP addresses. Example of APA style
So the ski area’s Web site mentioned earlier Fletcher, D. (2010, May 20). How Facebook is redefining privacy. Time. Retrieved from
may have an IP address of 66.117.154.119 http://www.time.com/time/business/article/0,8599,1990582,00.html
and a text name of skislope.com. When
you type “skislope.com” into your browser For further assistance, go to citationmachine.net, which is an interactive tool de-
window, your computer (with its own signed to output citations in proper MLA or APA format, using information you provide
unique IP address) looks for the ski area’s in an online form. The current version of Microsoft Word also includes citation and
IP address (66.117.154.119). Data is bibliography formatting for most of the standard formats, and sites such as Son of
exchanged between the ski area’s Citation Machine (citationmachine.net) and Purdue Online Writing Lab (owl.english.
server computer and your computer purdue.edu) are also available.
using these unique IP addresses.
122 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
required, the phone line fits into the filter, networks. The newest wireless access
and the filter plugs into the phone’s wall technology to be deployed for mobile and
jack. stationary broadband
Generally, the modem is located some- access is WiMAX.
where near your computer and is con- WiMAX is designed to
Cable runs to network
nected to an expansion (or interface card extend local WiFi
adapter) card called a networks across
network interface card greater distances,
(NIC), which is located such as across a
inside your computer. campus. Mobile
If you want to share WiMAX is an alter-
your Internet connec- native to cellular
tion with more than transmission of voice
one computer, you will and high-speed data. Even
also need a router. wireless in-flight Internet service
What options is available! Gogo (gogoinflight.
exist when cable Figure 3.33 com) is a wireless broadband
and DSL are not network that provides coverage
You need a special DSL modem to
available? Satellite connect to the Internet using DSL. on participating airlines across the
Internet is another way continental United States, so
to connect to the Inter- when you are cleared to use your
net. Most people portable electronic devices, you
choose satellite Internet when other high- can comfortably access wireless Internet
speed options are unavailable. To take ad- from 35,000 feet.
vantage of satellite Internet, you need a How does one access the Internet
satellite dish, which is placed outside your wirelessly? To access the Internet wire-
home and connected to your computer with lessly, you need to be in a wireless fidelity
coaxial cable, the same type of cable used for (WiFi) hot spot and have the right equip-
cable TV. Data from your computer is trans- ment on your mobile device. Most note-
mitted between your personal satellite dish books, smartphones, game systems, and
and the satellite company’s receiving satel- PMPs sold in the past several years come
lite dish by a satellite that sits in a geosyn- equipped with wireless capability built in,
chronous orbit thousands of miles above but if not, several wireless adapters are
the Earth. available.
For your own personal WiFi, it’s simple to
set up a wireless network at home (see
Chapter 7 for details), and many businesses
Wireless and schools, as well as public places such as
Why is wireless Internet access airports, libraries, bookstores, and restau-
necessary? In our ever-more-mobile rants, offer WiFi. Some public places offer free
lifestyles, accessing the Internet wirelessly WiFi access, but many others require you to
can make our lives more productive, and buy wireless access through a wireless access
perhaps a bit more flexible, allowing us to service plan. For example, McDonald’s pro-
work away from our desks. Students can vides WiFi access through AT&T, Barnes &
use their notebook computers or smart- Noble provides WiFi through T-Mobile, and
phones to send instant messages to each Starbucks uses Boingo for its WiFi access. To
other across campus, and business access these WiFi services, you can pay for a
travelers can quickly grab their e-mail single session or a monthly membership, or
between flights. At home, wireless you can sign up for a longer-term subscrip-
networks allow us to share an Internet tion in which you receive monthly bills.
connection and print from our notebooks WiFi Free Spot (wififreespot.com) and
from any room without having to attach WiFiHotSpotList.com will help you locate
and detach wires. a free hot spot wherever you are planning
In some communities, organizations are to go.
now installing wireless or WiFi networks; If you need to access the Internet
and in some cities and towns, local govern- wirelessly and do not want the hassle of
ments are installing municipal WiFi looking for a WiFi hot spot, you can
How do we find information on the Web? Generally, we access Google or could enter your preferences into a computerized software agent, which
another search engine, type in the keyword or search phrase, and click would then search the Web for you, find the best option based on your
the search button. As a result, millions of links to Web pages display. At criteria, and place the order. Additionally, the agent would be able to
best, we click on the first several links that seem reasonably relevant to record the financial transaction into your personal bookkeeping software
our search. Rarely, if ever, do we explore all of the links that are found in and arrange for a technician to help install your purchase, if needed.
the search results. The Semantic Web would use software agents that roam from page
Similarly, think about all the other types of data on the Web that we to page, completing sophisticated tasks. These agents would not read
access manually, such as contact information, appointment times, trans- words, look at pictures, and process information as humans do, but
portation schedules, entertainment schedules, medical treatments, and rather would search through metadata. Metadata is machine-readable
store types, locations, and hours. It would seem that computers would be data that describes other data in such a way that the agents can identify
helpful in plugging through all of this Web data, but oddly, that is not the and define what they need to know. Like Web page coding, which is now
case. Web pages are designed for people to read, not for computers to done in HTML, XML, and other formats, metadata would be invisible to
manipulate. Although computers can determine the parts and functional- humans reading pages on the Web but would be clearly visible to com-
ity of Web pages (headers, hyperlinks, etc.), as yet no reliable way exists puters, in essence turning the Web into a giant database.
for computers to process the meaning of the data so that they can use The introduction of eXtensible Markup Language (XML) has helped
the information to see relationships or make decisions. make the user of the Web more of a participant. Web 2.0 technologies
The Semantic Web is an evolving extension of the World Wide Web in such as blogs, wikis, and social networking sites, as well as Web-based
which information is defined in such a way to make it more easily read- applications, are in part possible because of XML’s tagging functionali-
able by computers. Tim Berners-Lee, the inventor of the World Wide Web, ties. RSS feeds also use technologies that are an underlying component
and the implementation of HTTP and HTML, thought up the Semantic of the Semantic Web.
Web. The Semantic Web would build on this type of capability so that each
Right now, search engines function by recognizing keywords such as Web site would have text and pictures (for people to read) and metadata
appointment, dentist, and root canal, but they cannot determine in which (for computers to read) describing the information on the Web (see
office and on what days Dr. Smith works and what his available appoint- Figure 3.35). The metadata would contain all the attributes of the infor-
ment times are. The Semantic Web would enable computers to find and mation, such as condition, price, or schedule availability, in a machine-
manage that type of information and coordinate it with your other sched- readable format. Businesses, services, and software would all use the
ules and preferences. same categorization structures so that similar information would share
Similarly, think about the convenience and efficiency that online the same attributes, ensuring consistency of metadata throughout the
shopping has brought to our lives. Then think about all the time we actu- Web. Then, with Web data properly identified and categorized, computer-
ally spend researching and comparing products, brands, stores, prices, ized agents could read the metadata found on different sites, compare
and shipping options. Ultimately, after all that effort, we make the final the information, and process the information based on user-defined
buying decision and place the order. With the Semantic Web in place, you criteria.
124 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Figure 3.35
I need a dentist
appointment for Web 2.0 technologies
a root canal. enable us to become
creators and users of
Internet content. The
Semantic Web enables
SEARCH: STEP 6: Agent RESULTS:
the computer to add
Dentist
returns list of Dr. Amid, 3/23 2 p.m. context to Web content,
Root canal
Seattle area acceptable results
Dr. Brett, 3/23 4 p.m. providing meaning to
Dr. Slade, 3/24 8 a.m.
As soon as possible and waits for action. information from different
sources.
STEP 1: User
enters search
criteria.
Compare services
Although some of the Semantic Web functionalities are beginning to the information currently available on the Web into the type of metadata
emerge in Web 2.0 technologies, the majority of the functionality and im- that computers could recognize. The very grandeur of that task means
plementation of the Semantic Web is still in development. The World that we will not see a fully functional Semantic Web until sometime in the
Wide Web Consortium (W3C), led by Tim Berners-Lee, is the primary distant future. In the meantime, we can continue to benefit from each
organization leading the charge. The greatest challenge is recoding all small step toward that goal.
casually surfing the Internet is fine, it’s best travel over phone lines. The computer on
not to use your credit card, for example, to the other end also must have a modem to
purchase items online from a public hot spot translate (demodulate) the received analog
because your credit card information can be signal back to a digital signal that the receiv-
captured by a lurking identity thief. See ad- ing computer can understand. Modern
ditional information on wireless security in computers generally come with internal
Chapter 7. modems built into the system unit.
What are the advantages and
disadvantages of dial-up? A dial-up
Dial-Up Connections connection is the least costly way to connect
How does a dial-up connection to the Internet. Although slower than broad-
work? A dial-up connection needs only band connections, dial-up connections are
a standard phone line and a modem. The often fine for casual Internet users who do
word modem is short for modulate/demodulate. not need a fast connection. The major down-
A dial-up modem is a device that converts side to dial-up is speed. Dial-up modems
(modulates) the digital signals the computer transfer data at a much slower rate than that
understands into analog signals that can of a basic broadband connection. Although
Pros Lets you surf the Net and talk on Speeds are not dependent on distance Increased speeds. Service is not shared
the same phone line simultaneously. from central office. or dependent on distance from central
office.
Cons Speed drops as you get farther Line is shared with others in Cost, although this is a diminishing
from phone company’s central neighborhood; speeds may vary due to concern as the technology continues to
office. peak and nonpeak usage. be deployed and accepted.
Not every phone line will work. May require professional installation if Not available in all areas.
cable not already present.
Note: The data transfer rates listed in this table are approximations. As technologies improve, so do data transfer rates.
many Web pages can be sent without graph- data travels between computers. It is also in-
ics as plain text, it still can take a long time formally referred to as connection speed. For
to load a Web page, especially if it contains example, dial-up connections have a maxi-
multimedia, which is the norm for most Web mum data transfer rate of 56 Kbps (56K)
pages today. Similarly, if you visit many while broadband connections can achieve
Web sites at the same time or receive or send data-transfer rates of 10 to 1000 megabits
large files through e-mail, you’ll find that a per second (Mbps). Comparatively, satellite
dial-up connection is especially slow. An- Internet is slower than DSL and cable, and
other disadvantage of dial-up is that when fiber-optic provides the fastest transmission.
you’re on the Internet, you tie up your Finally, you may also need to consider
phone line if you don’t have a separate line. which other services you want bundled into
your payment, such as phone or TV. The
table in Figure 3.36 compares several fea-
Choosing the Right Internet tures of cable, DSL, and fiber-optic service to
help you with your decision.
Connection Option
How do I choose which Internet
connection option is best for me? The Future of the
According to a Federal Communications
Commission report released in early 2010, Internet
more than 75 percent of adults in the United The Internet of the future will have more
States use the Internet, and 65 percent of bandwidth and offer increased services. Be-
adults have home broadband access. De- cause of the prevalence of wireless technolo-
pending on the area in which you live, you gies, the Internet will be more accessible,
might not have a choice as to the type of and we will become more dependent on it.
broadband connection that is available. However, because commerce and com-
Check with your local cable TV provider, munication activities are increasingly domi-
phone company, and satellite TV provider(s) nating the Internet, the concern is that there
to determine what broadband options are will be no bandwidth left for one of the In-
available where you live and what the trans- ternet’s original purposes: exchange of sci-
fer rates are in your area. It might also be entific and academic research. Two major
good to check with your neighbors to see projects currently under way in the United
what kind of broadband connections they States to develop advanced technologies for
use. Speeds vary by neighborhood, some- the Internet are the large scale networking
times exceeding advertised rates, so it’s al- (LSN) program and Internet2.
ways good to check actual experiences. What are the large scale network-
One factor to consider in choosing the ing and Internet2 programs? Out of a
right Internet connection is speed. Data project titled the Next Generation Internet
transfer rate is the measurement of how fast (which ended in 2002), the U.S. government
126 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
created the large scale networking (LSN) BITS
program. Large scale networking’s aim is to AND National Broadband Plan
fund the research and development of BYTES
cutting-edge networking and wireless
technologies and to increase the speed of If the Federal Communications Commission (FCC) has its way, by 2020 nearly 100
networks. million, or 90%, of U.S. homes, as well as schools, hospitals, and government offices,
The Internet2 is a research and develop- will have access to more affordable broadband access of at least 100 Mbps. This
ment consortium of more than three hun- $15.5-billion National Broadband Plan proposes that such universal broadband
dred universities (supported by government access would pave the way for “economic growth, job creation, global competitive-
and industry partners) that seeks to expand ness, and a better way of life.” Universal Internet access can change how education,
the possibilities of the Internet by developing health care, energy, and public safety are delivered and managed.
new Internet technologies and disseminating In addition to ensuring that virtually every American has access to broadband In-
them as rapidly as possible to the rest of the ternet, the plan proposes to ensure that other aspects of Internet usage such as net-
Internet community. Many of the current works, devices, content, and applications are strong and functional. The plan also
technologies of the commercial Internet are proposes to help encourage greater competition in the broadband market, which can
possible because of the research done by the lead to competitive pricing and more innovative products and services among
Internet2 consortium. The Internet2 back- providers. Although the National Broadband Plan is just that—a plan—and is yet to
bone supports extremely high-speed com- be implemented, the prospects of such as plan, and the resulting innovations, is
munications—up to 8.8 gigabits per second intriguing and may make the U.S. a leader in mobile innovation.
(Gbps)—and provides an excellent testing
area for new data transmission technologies.
How else will the Internet become
a more integral part of our lives? As As other less obvious Internet-enabled
this chapter explained, the Internet is al- devices become popular and more accessible
ready an integral part of our lives. It is the to the common consumer, our lives will be-
way we communicate, shop, research, enter- come more Internet dependent. For exam-
tain, and express ourselves. Many of the ple, Internet-enabled appliances and
tools on the Web that have been described in household systems are now available that
this chapter—social networking sites, wikis, allow your home virtually to run itself.
podcasts, and user content databases such Today, there are refrigerators that can
as YouTube (for videos) and Flickr (for monitor their contents and go online to
photos)—are part of a wave of Web-based order more diet soda when they detect that
services that emphasizes online collabora- the supply is getting low. Meanwhile, Inter-
tion and sharing among users. The future net heating and cooling systems can monitor
Internet will continue to evolve with more weather forecasts and order fuel deliveries
Web-based applications driven by user when supplies run low or bad weather is
input, interaction, and content. expected. These appliances will become
In the future, you can expect to use the more widespread as the price of equipment
Internet to assist you with many day-to-day drops.
tasks that you now do manually. No longer The uses of the Internet are limited only
will PCs and mobile devices be our primary by our imaginations and the current con-
access to the Internet. We can already see the straints of technology. At some point, the
convergence of the Internet with telephony, Internet will no longer be a place we “go”
television, and gaming devices. to but an integral part of our lives.
1. What is the origin of the Internet? 4. What are the various kinds of
The Internet is the largest computer network multimedia files found on the Web,
in the world, connecting millions of comput- and what software do I need to use
summary
128 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
summary
three three
chapter
specific Web pages without having to type 9. How does data travel on the Internet?
in the URL and help you organize the Web A computer connected to the Internet acts as
content that is most important to you. either a client (a computer that asks for
summary
information) or a server (a computer that
8. How do I search the Internet receives the request and returns the
effectively, and how can I evaluate information to the client). Data travels
Web sites? between clients and servers along a system
A search engine is a set of programs that of communication lines or pathways. The
searches the Web using specific keywords largest and fastest of these pathways is the
you wish to query and then returns a list of Internet backbone. To ensure that data is
the Web sites on which those keywords are sent to the correct computer along the
found. Search engines can be used to search pathways, IP addresses (unique ID
for images, podcasts, and videos in addition numbers) are assigned to all computers
to traditional text-based Web content. A sub- connected to the Internet.
ject directory is a structured outline of Web
sites organized by topic and subtopic. 10. What are my options for connecting
Metasearch engines search other search to the Internet?
engines. Home users have many options for connect-
Not all Web sites are equal, and some are ing to the Internet. A dial-up connection, in
better sources for research than others. To which you connect to the Internet using a
evaluate whether it is appropriate to use a standard phone line, was at one time the
Web site as a resource, determine whether standard way to connect to the Internet.
the author of the site is reputable and Today’s broadband connections are faster
whether the site is intended for your partic- and have made dial-up a legacy connection
ular needs. In addition, make sure that the technology. Broadband connections include
site content is not biased, the information in cable, DSL, and fiber-optic. Satellite is a
the site is current, and all the links on the connection option for those who do not have
site are available and appropriate. If multi- access to faster broadband technologies.
ple sites offer the same content, then it is an- WiFi allows users to connect to the Internet
other indication that the information is wirelessly, but are not as fast as wired
accurate. connections.
129
three
three key terms
chapter
130 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
buzzwords
three three
chapter
Word Bank
• blogs (weblogs) • instant messaging (IM) • Uniform Resource
• Bookmarks • keyword Locators (URLs)
buzzwords
• broadband • podcast • Web 2.0
• DSL • search engine • Web browser
• fiber-optic service • social bookmarking • WiFi
(FiOS) • social networking • wiki
• hyperlink • tag
Instructions: Fill in the blanks using the words from the Word Bank above.
Juan rests his new notebook on his lap and powers it up while waiting for his next class to
begin. Using the (1) __________ access provided by his college, Juan is able to connect to the
Internet wirelessly. Although the school’s wireless access to the Internet is fast, it’s not as
fast as the (2) __________ connection at home, because his parents just switched to
(3) __________, which transfers data at the speed of light.
Knowing he has only a few minutes before class, Juan launches Internet Explorer, the
(4) __________ software from Microsoft that allows him to connect to the Internet. He
quickly goes to Facebook, the (5) __________ site, to catch up on the activities of his friends.
He also reads a few of the updates to the online journal Engadget.com, one of his favorite
(6) __________. He’s glad that the new (7) __________ technologies make such collaboration
possible. Just before class begins, Juan’s friend Marie, who is using her (8) __________ serv-
ice, sees that Juan is available on her buddy list. She sends him a quick, real-time note to let
him know she’ll catch up with him after class.
At home, Juan types in a (9) __________ in Google, the (10) __________, to find Web sites for
a research paper. One of the first sites listed is Wikipedia, the online encyclopedia that takes
advantage of the collaborative nature of (11) __________ technology. Because anyone can
add, change, or edit content on Wikipedia, Juan knows that he can’t rely completely on this
information but finds that it is usually a pretty good starting point for his research. Juan
computer
clicks on a (12) __________, the specially coded text at the bottom of the Wikipedia article,
which links him to another Web site. He adds a (13) __________ with a meaningful keyword
in the (14) __________ site Delicious so he can return to it later. Finally, before going to bed,
Juan listens to a (15) __________ of one of his favorite radio shows that he subscribed to
literate
becoming
recently.
becoming
computer literate
Using key terms from the chapter, write a letter to the owners of your local coffee shop
explaining why they should make it a WiFi hot spot. Include in your letter the advantages
WiFi would bring to the customers and identify some security considerations that
customers need to be aware of.
131
three
three self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.
Multiple Choice
self-test
1. Which is NOT true about the Internet? 6. What feature is a list of pages you’ve
a. It is the largest computer network visited within a Web site?
in the world. a. Favorites
b. It was created to establish a b. Breadcrumb trail
secure form of military c. Bookmarks
communications. d. History
c. It was developed as a method for 7. Which is NOT part of a search
linking research documents. engine?
d. It was invented as a way for all a. Spider
computers to communicate. b. Indexer program
2. What do you need to read, send, and c. Subject directory
organize e-mail from any computer? d. Search engine software
a. An e-mail client program 8. When using the Internet for research,
b. An e-mail server you
c. An Internet service provider a. can assume that everything you
d. A Web-based e-mail account find is accurate and appropriate.
3. Which is NOT an example of social b. should evaluate sites for bias and
networking? relevance.
a. E-mail c. should use the most current
b. Instant messaging sources.
c. Blogging d. can assume that the links
d. Listserv provided on the site are the only
4. In which way is a blog different from additional sources of information.
a wiki? 9. Which connection type provides the
a. Blogs are used to express opinions. fastest data transmission?
b. Blogs are written by a single a. DSL
author. b. Cable
c. Blogs include images and audio. c. Fiber-optic
d. Blogs are arranged as a listing of d. Satellite
entries. 10. What current program funds the
5. Which is true about plug-ins? research and development of
a. Plugs-ins rarely require updating. cutting-edge networking and wireless
b. Plug-ins track the Web sites technologies?
you’ve visited. a. Large scale networking
c. Plug-ins are necessary for b. Internet2
viewing most Web graphics. c. Web 2.0
d. Plug-ins can present security risks. d. ARPANET
True–False
_____ 1. The information in e-mail is no more private than a postcard.
_____ 2. Consumers buy books, movie tickets, and games more often online than in retail
stores.
_____ 3. The VeriSign seal on a Web site guarantees that the Web site is secure.
_____ 4. Each time you connect to the Internet, your computer is assigned the same IP
address.
_____ 5. Internet connection speeds vary by neighborhood, sometimes exceeding adver-
tised rates.
132 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
making the
three three
chapter
transition to...
next semester
1. Online Support Facilities
transition to...
Your school most likely has many online support facilities. Do you know what they
are? Go to your school’s Web site and search for online support.
a. Is online tutoring available?
next semester
making the
b. Can you reserve a book from the library online?
c. Can you register for classes online?
d. Can you take classes online?
e. Can you buy books online?
2. Plagiarism Policies
Does your school have a plagiarism policy?
a. Search your school’s Web site to find the school’s plagiarism policy. What does it
say?
b. How well do you paraphrase? Find some Web sites that help test or evaluate your
paraphrasing skills.
c. Create an account at Turnitin.com. This Web site checks your written work against
content on the Web and produces an originality report. Submit at least three differ-
ent drafts of your work to Turnitin.com to check for any intended or unintended
cases of plagiarism before submitting your final work for a grade. What were the
results?
133
three
three making the
chapter
transition to...
the workplace the workplace
1. Online Résumé Resources
making the
Using a search engine, locate several Web resources that offer assistance in writing a
transition to...
134 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
critical thinking
three three
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
135
three
three team time
chapter
Problem
team time
With millions of sites on the Internet, finding useful information can be a daunting—and, at
times, impossible—task. However, there are methods to make searching easier, some of
which have been discussed in this chapter. In this Team Time, each team will search for spe-
cific items or pieces of information on the Internet and compare search methodologies.
Process
Split your group into three or more teams, depending on class size. Each group will create a
team wiki using free wiki software such as that found at pbworks.com. To appreciate the
benefits of wiki collaboration fully, each team should have at least five or six members.
1. Each team should come up with a theme for its wiki. Suggestions include the
following:
• Best computer technology Web sites
• Coolest new technology gadgets
• All-time greatest rock ’n’ rollers
• All-time greatest athletes
• Best places to visit in the United States
• Best beaches in the United States
• Best skiing areas in the United States
2. Each student should pick one example to research and then must design a wiki page
highlighting that subject. For example, if the team chose all-time greatest rock ’n’
rollers, one student could select Bruce Springsteen and create a wiki page on Bruce
Springsteen. The wiki page should contain links to other Web sites and, if possible,
images and videos.
3. After the team wikis are created, teams should make their wikis available to the other
teams for comments.
Conclusion
After all the team wikis have been completed and shared, discuss the following with your
class. What is the benefit of using wiki technology to create team pages? How did wikis
help or hinder the team process? What other conclusions can the class draw about using
wiki technology?
136 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
ethics
three three
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an
ethical solution.
Topic: Plagiarism
Plagiarism, or portraying another’s work as your own, has been around for a long while
and extends well beyond the classroom. For example, Nick Simmons, the son of Gene
Simmons (KISS) and a member of A&E’s Family Jewels reality series, created a comic book
series “Incarnate.” Radical Publishing picked up the series but quickly stopped publication
when Internet messages accused the author of copying from other similar series. Similarly,
the Australian band Men at Work was cited for copying a melody from “Kookaburra Sits in
the Old Gum Tree” for its 1980s hit “Down Under” and owes the owner years of royalties.
• Plagiarism violations
• Comic book series “Incarnate”
• Australian band Men at Work
• Plagiarism consequences
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has violated
plagiarism rules.
2. Team members should write a summary that provides background information for
their character—for example: author, publisher, or arbitrator—and details their charac-
ter’s behaviors to set the stage for the role-playing event. Then team members should
create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the chat room feature of MyITLab, the discussion board feature of Blackboard, or
meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of an argument, while responding in a personally or socially ethical manner, will be an im-
portant skill.
137
T E C H N O L O G Y
y
rit
cu
Se
Computer Abuse
Information Technology
ethics In this Technology in Focus section, we explore what ethics is, how
your personal ethics develop, and how your personal ethics fit
into the world around you. We’ll also examine how technology
and ethics affect each other and how technology can be used
to support ethical conduct. Finally, we’ll examine several key
issues in technology ethics today, including the areas of social
justice, intellectual property rights, privacy, e-commerce, free
speech, and computer abuse.
138
I N F O C U S
139
ETHICS IN COMPUTING anyone else? Another ethical philosophy is
situational ethics, which states that decision
You just bought a new notebook computer.You making should be based on the circumstances
know you can go to BitTorrent or LimeWire to of a particular situation and not on fixed laws.
download the latest summer blockbuster Many other ethical systems have been pro-
movie and its soundtrack.You also probably posed over time, some of which are defined by
know this is unethical. Although pirating music religious traditions. For example, the expres-
and videos is a valid example of unethical be- sion “Judeo-Christian ethics”refers to the
havior, it has been overused as an illustration of common set of basic values shared across the
the ethical challenges of technology. There is a Jewish and Christian religious traditions.
vast range of ethical issues surrounding tech- These include behaviors such as respecting
nology (as shown in Figure 1), several of which property and relationships, honoring one’s
we will discuss in this section. Many other is- parents, and being kind to others.
sues are discussed in the Ethics in IT sections
of each chapter throughout the book. Are laws established to guide peo-
ple’s ethical actions? Laws are for-
WHAT IS ETHICS? mal, written standards designed to apply to
everyone. Laws are enforced by government
Ethics is the study of the general nature of agencies (such as the police, the Federal Bu-
morals and of the specific moral choices made reau of Investigation, the Food and Drug Ad-
by individuals. Morals involve conforming to ministration, and so on) and interpreted by
established or accepted ideas of right and the courts. It is not possible to pass laws that
wrong (as generally dictated by society), and cover every possible behavior that human be-
are usually viewed as black and white. Ethical ings can engage in. Therefore, societal ethics
issues often involve subtle distinctions, such as provides a general set of unwritten guidelines
the difference between fairness and equity. for people to follow.
Ethical values are the guidelines you use to Rule utilitarianism is an ethical theory that
make decisions each day. For example, the espouses establishing moral guidelines through
person in front of you at the coffee shop drops specific rules.The idea behind this system is that
a dollar on the floor and doesn’t notice it. Do if everyone adheres to the same moral code, so-
you tell him or her about it, or do you pick up ciety as a whole will improve and people will be
the dollar and use it to pay for your coffee? happier. Many societies follow this system in
general terms, including the United States. For
Doesn’t everyone have the same instance, laws against nudity in public places
basic ethics? There are many systems of (except for a few nude beaches) in the United
FIGURE 1 ethical conduct. Relativism is a theory that States help define public nudity as immoral.
Ethics in computing holds that there is no universal moral truth and
covers a wide range that instead there are only beliefs, perspectives, Don’t some people behave unethi-
of areas, not just pri- and values. Everyone has his or her own ideas cally? Although many valid systems of
vacy and security. of right and wrong, and so who are we to judge ethical conduct exist, sometimes people act in
a manner that violates the beliefs they hold or
the beliefs of the ethical system they say they
follow. Unethical behavior can be defined as
not conforming to a set of approved standards
of social or professional behavior. For instance,
using your phone to text message a test
answer to your friend during an exam is
prohibited by many colleges’ rules of student
conduct. This behavior is different from
amoral behavior, in which a person has no
sense of right and wrong and no interest in
the moral consequences of his or her actions.
FIGURE 6
Ethics in Computing
TOPIC ETHICAL DISCUSSION DEBATE ISSUE
Social justice Are there limits to whistle-blowing? Does technology provide too easy an
access for whistle-blowing?
Intellectual property Do entire countries support software Can we impose our values and intellectual
piracy? property laws on the world?
Privacy Is personal privacy a casualty of the Should personal privacy be protected?
modern age?
E-commerce Do geolocation devices and Do the benefits of geolocation devices and
applications threaten privacy? applications outweigh the risks?
Electronic communication When does big business limit free Should companies allow the Chinese
speech? government to dictate when to curtail free
speech?
Computer abuse Whose responsibility is it to monitor Should parents bear all the responsibility
cyberbullying? of monitoring cyberbullying, or should it
be in the hands of public officials?
FIGURE 8
What boundaries should there be on the
availability of sensitive information?
1. If other countries do not fight piracy, artists and de- 1. The existing laws on intellectual property have
velopers have an unfair advantage in the market- worked to serve the interests of these countries. If
place. U.S. companies do not want to sell to the billion-
person market of China, that is their choice.
2. By allowing massive piracy, these other countries
are stealing from the United States. 2. Piracy exists within the United States, so it is hypo-
critical to be chastising foreign governments for
3. Every country needs to have a common under- software piracy.
standing and enforcement of intellectual property
laws for trade to be fair and beneficial to everyone. 3. Companies can pursue restitution for piracy
through the foreign court systems.
FIGURE 9
The issues of intellectual property play an important
role in international trade.
FIGURE 10
What information are you sharing on Facebook?
“The danger is publicly telling people where you are. This is because it leaves
one place you’re definitely not . . . home. So . . . on one end we’re leaving lights
on when we’re going on a holiday, and on the other we’re telling everybody on
the Internet we’re not home. It gets even worse if you have ‘friends’ who . . .
enter your address, to tell everyone where they are.Your address . . . on the
Internet . . . Now you know what to do when people reach for their phone as
soon as they enter your home. That’s right, slap them across the face.”
3. Society may need to reevaluate its views about how 3. Consumers need to be educated about geolocation
much privacy is needed to maintain in people’s dig- and the ways it can impact them so that they are
ital lives, as well as assume greater responsibility for able to make informed choices.
making sensible decisions about sharing informa-
tion through the Internet.
FIGURE 11
Geolocation applications help
you find cool places and busi-
nesses. But who do you want to
find you with geolocation?
4. Most other rights hang on the community’s ability 3. Microsoft’s presence, as muted as it is, continues to
to have open discussions. Preventing that from advance the slow progress the Chinese government
happening is a serious assault on human rights. is making toward democracy. U.S. companies can
ethically stay in China if they make an effort to
5. If the policy were to make children work or to kill improve human rights there. U.S. companies
women, would the companies choose not to com- operating in China should agree on guidelines
ply? Are human rights and freedom of speech any that respect human rights.
different?
FIGURE 12
Is free speech possible in countries
(such as China) where information
availability is restricted by law?
FIGURE 13
Cyberbullying involves the use of digital
technologies both to bully and dissemi-
nate acts of bullying.
FIGURE 14
Cyberbullying should be stopped, but by whom?
application
software:
programs that let you work and play
objectives
Objectives
After reading this chapter, you should be able to answer the following questions:
1. What’s the difference between application software and system software? (p. 162)
2. What kinds of applications are included in productivity software? (pp. 162–172)
3. What are the different types of multimedia software? (pp. 172–178)
4. What are the different types of entertainment software? (pp. 178–179)
5. What are the different types of drawing software? (p. 180)
6. What kinds of software do small and large businesses use? (pp. 180–184)
7. Where can I go for help when I have a problem with my software? (pp. 184–186)
8. How can I purchase software or get it for free? (pp. 186–192)
9. How do I install, uninstall, and start software? (pp. 193–195)
multimedia resources
multimedia
resources
Active Helpdesk
• Choosing Software (p. 180)
• Buying and Installing Software (p. 193)
Sound Bytes
• Creating Web Queries in Excel 2010 (p. 165)
• Enhancing Photos with Image Editing Software (p. 173)
• Using Speech Recognition Software (p. 174)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? There are millions of
applications, and new ones are developed and released every day. How can you
find the right application to meet your needs? What
are the cool new applications, or
the ones that just don’t work? The editors
and analysts at PC Magazine have put
together AppScout (appscout.com),
which provides reviews of the best
software, Web sites, and Web
applications. AppScout might
be a good place to check first when
you are in need of a new application.
161
The Nuts and Bolts be productive—at home and at work. In
addition, applications are available to
of Software produce and edit media as well as for
A computer without software is like a sand- entertainment. Lastly, there are applications
wich without filling. Although a computer’s that are more applicable to business uses,
hardware is critical, a computer system does whether it’s for a home office, big business,
nothing without software. specialty business, or not-for-profit. In this
What is software? Technically speak- chapter, we look at each of these types in
ing, the term software refers to a set of in- detail, starting with productivity software.
structions that tells the computer what to By no means does this exhaust all the types
do. An instruction set, also called a program, of software that is in use. Other types of
provides a means for us to interact with and software, such as Web browsers, virus
use the computer, even if we lack special- protection, backup and recovery, and utility
ized programming skills. Your computer has software are in use every day. These types
two basic types of software: system software of software are discussed elsewhere in this
and application software. book.
• Application software is the software you
use to do tasks at home, school, and work.
You can do a multitude of things with ap-
plication software, such as writing letters, Productivity Software
sending e-mail, paying taxes, creating for Home and Office
presentations, editing photos, and taking
One reason to have a computer is to make it
an online course, to name a few.
easier to tackle the tasks you have in your
• System software includes software such daily life. Productivity software is all about
as Windows and Mac OS X, which help helping you do that, making it easier to keep
run the computer and coordinate in- your budget, send letters, or keep track of
structions between application software the kids’ school events. It’s safe to say you
and the computer’s hardware devices. regularly use some form of productivity
System software includes the operating software already. Productivity software
system and utility programs (programs includes programs that enable you to per-
in the operating system that help man- form various tasks required at home, school,
age system resources). We discuss sys- and business. This category includes word
tem software in detail in Chapter 5. processing, spreadsheet, presentation, data-
Figure 4.1 shows the various types of base, and personal information manager
application software that you can use to (PIM) programs.
Figure 4.1
Word processing
Application software Spreadsheet
enables computer users Presentation
APPLICATION Productivity Database
to do a variety of tasks. SOFTWARE Personal information manager
Personal finance
Note taking
Image editing
Audio editing
Media
Video editing
Media management
Gaming
Home/Entertainment Education
Drawing
Home business
Business Large business
Specialized business
162 Chapter 4 Application Software: Programs That Let You Work and Play
Word Processing Software BITS
What is the best software to use to
AND Working with Different File Formats
BYTES
create general documents? Most stu-
dents use word processing software to cre- There are lots of great word processing software applications available now. Although
ate and edit documents such as research each program has basic functional similarities, each program has a different file format
papers, letters, and résumés. Because of its that defines the way information is stored in the file, which in turn enables the program
general usefulness, word processing soft- to open and save the file. Some of these formats are shown in the following table.
ware is the most widely used application.
Word processing software has a key advan-
tage over its ancestral counterpart, the type- Microsoft Word 97-2003 .doc
writer: you can make revisions and
Microsoft Word 2007, 2010 .docx
corrections without having to retype an en-
tire document. Instead, you can quickly and Microsoft Works .wps
easily insert, delete, and move pieces of text,
Corel WordPerfect .wpd
as well as move and insert text from one
document into another seamlessly. Microsoft Zoho .sxw
Word and Corel WordPerfect are examples
AbiWord .abw
of popular word processing programs.
Are there free or more affordable Apple iWork Pages .pages
alternatives? If you’re looking for a
OpenOffice.org Writer .odt
more affordable alternative to software such
as Microsoft Word or other Microsoft Office
products, you may want to consider down- So, how easy is it to share documents created in different applications with differ-
loading free open source software. Open ent file formats? It’s not as difficult as you think. Most applications will open docu-
source software is program code that is pub- ments created in another application, and they can also save files in a different format
licly available and has few restrictions. Un- so that they can be opened in another application. So, for example, say you have
like proprietary software, which is neither Microsoft Word 2010 installed on your computer, but your classmate has sent you an
free nor open source, the code can be copied, e-mail with a document he created in OpenOffice.org Writer. Microsoft Word will be
distributed, or changed without the stringent able to open the file, and you will also be able to save it as a Word file. Conversely, if
copyright protections of software products you send your classmate a file you create in Word, he will be able to open it in
you purchase. OpenOffice.org Writer and save it as a Writer document. The open source programs
Writer, a word processing program from and Web-based applications are designed to work with a variety of file formats, so
the OpenOffice.org suite (openoffice.org), there should not be a problem. You can upload almost any type of word processing,
and AbiWord (abiword.com) are gaining in spreadsheet, or presentation file into Google Docs and work with it. Using Google
popularity because they are available as free Docs may actually facilitate sharing files made in dissimilar programs, although you
downloads from the Internet. Both AbiWord may lose some of the features, since Google Docs only has very basic capabilities.
and Writer have many of the same features
as their higher-priced Word and WordPer-
fect competitors, making either a great
choice for cost-conscious consumers. supported from their community of users
Also gaining in popularity are several across Web sites and newsgroups. For more
word processing programs that are Web- information on alternative software, see the
based, such as those found in Google Docs Technology in Focus feature “Computing
(docs.google.com) and Microsoft Office Web Alternatives” on page 252.
Apps. Web-based applications, which was How do I control the way my docu-
discussed in greater detail in Chapter 3, can ments look? An advantage of word pro-
be accessed from any computer that has an cessing software is that you can easily
Internet connection. Web-based applications format, or change the appearance of, your
are great for collaborating and coordinating document. As a result, you can produce pro-
input from a variety of users on a single doc- fessional-looking documents without having
ument. Keep one thing in mind when you to hire a professional. With the extensive for-
choose a free or Web-based software prod- matting options available, you can change
uct: support. Unlike Microsoft Office and fonts, font styles, and sizes; add colors to
other applications, these applications offer text; adjust margins; add borders to portions
little or no formal support. Instead, open of text or entire pages; insert bulleted and
source and Web-based applications are numbered lists; and organize your text into
Drop cap
Section headings
Bullets and
numbering
WordArt
Two-column
text
Figure 4.2 columns. You also can insert pictures from styles throughout your document. Figure 4.2
Nearly every word pro- your own files or from a gallery of images shows what a document can look like when
cessing application has and graphics, such as clip art and SmartArt, formatting options found in many word
formatting features to give which are included with the software. You processing applications are incorporated.
your document a profes-
sional look.
also can enhance the look of your document Although many of the open source and
by creating an interesting background or by Web-based applications have great format-
adding a “theme” of coordinated colors and ting capabilities, many are not as fully
featured as the proprietary applications,
such as Microsoft Word.
Designs and other Bibliography tool
visual effects organizes sources
What special tools do word pro-
cessing programs have? You’re
probably familiar with the basic tools
of word processing software. Most
applications come with some form of
spelling and grammar checker and a
thesaurus, for example. Another popular
tool is the search-and-replace tool that
allows you to search for text in your
document and automatically replace it
with other text.
The average user is unaware of many
interesting word processing software
tools. For example, did you know that
you could translate words or phrases into
another language or automatically correct
your spelling as you type? You also can
automatically summarize key points in
a text document, add bibliographical
references, and include illustrations with
different picture styles. Writer, the word
processing program in the OpenOffice.org
Figure 4.3 suite, has many of the same tools you’re
Writer, the word processing program in the OpenOffice.org suite, has many of the used to seeing in Microsoft Word and Corel
same features as Word and WordPerfect. WordPerfect (see Figure 4.3).
164 Chapter 4 Application Software: Programs That Let You Work and Play
Spreadsheet Software
Formula Values Changed value
Why would I need to use spread-
sheet software? Spreadsheet
software—such as Microsoft Excel and
OpenOffice.org Calc—enables you
to do calculations and numerical
analyses easily. You can use Cell
spreadsheet software to track
your expenses and create a sim-
ple budget. You also can use it to
determine how much you should be
paying on your student
loans, car loan, or credit
card bills each month. You Labels
know you should pay more
than the minimum payment
to spend less on interest, but how
much more can you afford to pay,
and for which loan? Spreadsheet
software can help you evaluate differ-
ent scenarios, such as planning the best
payment strategy.
How do I use spreadsheet
software? The basic element in a Inserted row Results of recalculated
Function Formula
spreadsheet program is the worksheet, =SUM(B10:B21) (=B8-B22) formulas
which is a grid consisting of columns
and rows. As shown in Figure 4.4, the
columns and rows form individual Figure 4.4
Figure 4.4, to calculate your average
boxes called cells. Each cell can be identified Spreadsheet software
earned income in September, you
according to its column and row position. enables you to calculate
could use the built-in AVERAGE and manipulate numerical
For example, a cell in column A, row 1 is re-
function, which would look like this: data easily with the use of
ferred to as “cell A1.” You can enter several
=AVERAGE(B4:B7). built-in formulas.
types of data into a cell:
The primary benefit of spreadsheet soft-
• Text: Any combination of letters, num- ware is its ability to recalculate all functions
bers, symbols, and spaces. Text is often and formulas in the spreadsheet automati-
used as labels to identify the contents of cally when values for some of the inputs
a worksheet or chart. change. For example, as shown on the
• Values: Numerical data that represent a spreadsheet on the right side of Figure 4.4,
quantity or an amount and are often the you can insert an additional row (Member-
basis for calculations. ships), change a value (September clothing
• Formulas: Equations that you build expense), and then recalculate the results for
yourself using addition, subtraction, Total Expenses and Net Income without
multiplication, and division, as well as having to redo the worksheet from scratch.
values and cell references. For example, Because automatic recalculation enables
in Figure 4.4, you would type the for- you to see immediately the effects that
mula “=B8-B22” to calculate net income different options have on your spreadsheet,
for September. you can quickly test different assumptions
• Functions: Formulas that are prepro-
grammed into the spreadsheet software. Creating Web
SOUND
Functions help you with calculations BYTE Queries in Excel
ranging from the simple (such as adding 2010
groups of numbers) to the complex
(such as determining monthly loan In this Sound Byte, you’ll learn what Excel Web queries
payments), without you needing to are, as well as how to use them effectively.
know the exact formula. Therefore, in
Presentation Software
What software do I use to create pre-
in the same analysis. sentations? You’ve probably sat through
This is called a what-if presentations during which the speaker’s
analysis. Look again at topic was displayed in slides projected on a
Figure 4.4 and ask, screen. These presentations can be the most
“What if I add $50 to my basic of outlines, containing only a few
b clothing expense? What words and simple graphics, or elaborate
impact will such an increase have on my multimedia presentations with animated
total budget?” text, graphic objects, and colorful back-
Figure 4.5 grounds. You use presentation software
What kinds of graphs and charts
(a) Column charts show can I create with spreadsheet such as Microsoft PowerPoint,
comparisons. (b) Pie OpenOffice.org Impress, or Zoho Show
software? Sometimes it’s easier to see
charts show how parts
contribute to the whole. the meaning of numerical information when (shown in Figure 4.7) to create these types of
(c) Line charts show it is shown in a graphical format such as a dynamic slide shows. Because these applica-
trends over time. chart. As shown in Figure 4.5, most spread- tions are simple to use, you can produce
sheet applications allow you to create a vari- high-quality presentations without a lot of
ety of charts, including basic column charts, training. With some of the new capabilities
pie charts, and line charts, with or without in PowerPoint 2010, you can embed online
three-dimensional (3D) effects. In addition videos, as well as change the color, add ef-
to these basic charts, you can use stock fects, and even trim video clips without the
charts (for investment analysis) and scatter need for a separate video editing program.
charts (for statistical analysis), or create cus- How do I create a presentation?
tom charts. New in Excel 2010 are Using the basic features included in presen-
sparklines, which are small charts that fit tation software, creating a slide show is sim-
into a single cell. Sparklines (see Figure 4.6) ple. To arrange text and graphics on your
easily show data trends. slides, you can choose from a variety of slide
Are spreadsheets used for any- layouts. These layouts give you the option
thing besides financial analysis? of using a single or double column of bul-
There are so many powerful mathematical leted text, various combinations of bulleted
Figure 4.6 functions built into spreadsheet programs text, and other content such as clip art,
Sparklines, a new feature that they can be used for serious numerical graphs, photos, and even video clips.
for Excel 2010, are tiny analyses or simulations. For example, an You also can lend a theme to your pres-
graphs that fit into a single Excel spreadsheet could be designed to entation by choosing from different design
cell.
templates. You can use animation effects
to control how and when text and other
objects enter and exit each slide. Slide
transitions add different effects as you
move from one slide to the next during
the presentation.
Database Software
How can I use database software?
Database software such as Oracle, MySQL,
Sparklines
and Microsoft Access are powerful
166 Chapter 4 Application Software: Programs That Let You Work and Play
a
Field Record
Figure 4.8
In databases, information is organized into tables, fields, and records.
168 Chapter 4 Application Software: Programs That Let You Work and Play
If you share a network at home or at BITS
work and are using the same PIM software AND Productivity Software Tips
as others on the network, you can use a PIM BYTES
program to check people’s availability be-
and Tricks
fore scheduling meeting times. Whether co- Looking for tips on how to make better use of your productivity software? Some Web
ordinating a team project or a family event, sites send subscribers daily e-mails full of tips, tricks, and shortcuts to their favorite
you can create and electronically assign software programs. Microsoft has actually made its Web site very useful with lots of
tasks to group members by using a PIM. You tips and tricks for its Office applications (office.microsoft.com). The New Paperclip
can even track each person’s progress to (thenewpaperclip.com) sends a free tip each day on Office 2007 and 2010 applica-
ensure that the tasks are finished on time. tions. MakeTechEasier (maketecheasier.com) has tidbits for a variety of applications
Are there Web-based PIM pro- including Windows and Mac products, OpenOffice.org, and cell phone applications.
grams? Many Web-based e-mail clients Also, check out YouTube. Many enthusiasts post quick instructive videos demonstrat-
such as Yahoo!, Google, and AOL have ing useful software tips. For example, there are several videos that show you how to
developed coordinating calendar and embed a YouTube video directly into PowerPoint. To take these YouTube videos on the
contacts programs similar to Microsoft Out- road with you, check out TubeSock (stinkbot.com/Tubesock) to download, convert,
look. Yahoo! includes Notepad for jotting and copy YouTube videos to your personal media player.
down notes and tasks. Google’s calendar
and contacts sync with Outlook so that you
can access your Outlook calendar informa-
tion by logging into Google, giving you • A macro is a small program that groups a
access to your schedule anywhere you have series of commands so they will run as a
access to a computer and an Internet connec- single command. Macros are best used to
tion. AOL’s Instant Messenger, AIM, has automate a routine task or a complex se-
coordinated e-mail, calendar, and contact ries of commands that must be run fre-
functions. quently. For example, a teacher may write
a macro to sort the grades in her grade
book automatically in descending order
Productivity Software Features and to highlight those grades that add up
What tools can help me work more to less than a C average. Every time she
efficiently with productivity adds the results of an assignment or test,
software? Whether you are working on a she can set up the macro to run through
word processing document, spreadsheet, that series of steps automatically.
database, or slide presentation, you can
make use of several tools to increase your
efficiency: Integrated Software Applications
• A wizard is a systematic guide that What’s an integrated software
walks you through the steps necessary application? An integrated software
to complete a complicated task. At each application is a single software program
step, the wizard asks you questions. that incorporates the most commonly used
Based on your responses, the wizard tools of many productivity software pro-
helps you complete that portion of the grams into a single integrated program.
task. When you install software, you are Note that integrated software applications
often guided by a wizard. are not substitutes for the full suite of
• A template is a predesigned form. applications they replace. Generally, because
Templates are included in many produc- they don’t include many of the more com-
tivity applications. They provide the plex features of the individual productivity
basic structure for a particular kind of software applications, they can be thought
document, spreadsheet, or presentation. of as “software lite.” To have access to the
Templates can include specific page full functionality of word processing and
layout designs, formatting and styles spreadsheet software, for example, you
relevant to that particular document, should get the individual applications
and automated tasks (macros). Typical or a suite that includes each of these
templates allow you to lay out a profes- applications.
sional-looking résumé, structure a home Microsoft Works is an example of an
budget, or communicate the results of a integrated software application. This inte-
project in a presentation. grated software application includes word
Excel Spreadsheet x x x
PowerPoint Presentation x x x
Access Database x
Outlook PIM x x
170 Chapter 4 Application Software: Programs That Let You Work and Play
addition, because the programs bundled in
a software suite come from the same com-
pany, they work well together (that is, they
provide for better integration) and share
common features, toolbars, and menus. For
example, when using applications in the
Microsoft Office suite, you can seamlessly
create a spreadsheet in Excel, import it into
Access, and then link a query created in Ac-
cess to a Word document. It would be much
harder to do the same thing using different
applications from a variety of software de-
velopers. Another example is Apple iWork,
which includes word processing (Pages),
presentation (Keynote), and spreadsheet
(Numbers) applications. Each program can
access and share certain common elements
such as photographs.
172 Chapter 4 Application Software: Programs That Let You Work and Play
of a professional ath-
lete or other famous
person.
If you want to use
a program that offers
more than basic fea-
tures but is still easy
to use, try Adobe
Photoshop Elements
(see Figure 4.16).
With this program,
you can improve the
color balance of an
image, touch up an
image (by removing
red-eye, for example),
add creative effects to
an image, or group
images together to
create montages. If
you later decide to
upgrade to the
professional Figure 4.16
Figure 4.15
version of Adobe Photoshop, you will Image editing software
With some image editing software, you can take two
already be familiar with the user interface. such as Adobe Photoshop
individual pictures and combine them into one picture.
Elements makes it easy to
create (a) calendars,
(b) greeting cards and
postcards, (c) slide shows.
Can a nonprofessional use image
editing software? Image editing a
programs such as Adobe Photoshop Ele-
ments and Roxio PhotoSuite are geared to- Create with Your Photos
To begin, select what you would like to create.
Enhancing Photos
SOUND
BYTE with Image Editing
Software
In this Sound Byte, you’ll learn tips and tricks on how
to best use image editing software. You’ll learn how to
remove the red-eye from photos and incorporate
borders, frames, and other enhancements to produce
professional effects. Create a Card
Create a greeting card for holidays, events, and other special occasions.
Speech recognition software (or voice recognition software) trans- contain alternative pronunciations for many words. Each phoneme is
lates your spoken words into typed text. With this software, you can dic- worked on separately; the phonemes are then chained together to form
tate documents and e-mail messages, use voice commands to start and words that are contained in the word list. Because a variety of sounds can
switch between applications, control the operating system, and even surf be put together to form many different words, the software analyzes all
or fill out forms on the Web. Several programs are available for personal the possible values and picks the one value that it determines has the
use, such as Dragon Naturally Speaking, and the technology is being best probability of correctly matching your spoken word. The word is then
used in automobiles, call centers, and even in military aircraft. displayed on the screen or is acted on by the computer as a command.
Microsoft has incorporated a speech recognition system into the Win- However, there are problems with speech recognition software. We
dows operating system. After starting speech recognition (from the Start don’t always speak every word the same way, and accents and regional
menu, type “speech” in the search box and click on “Windows Speech dialects produce great variation in pronunciations. Therefore, speech
Recognition”), the speech recognition toolbar appears and indicates recognition is not perfect and requires training. Training entails getting
whether or not the computer is “listening” for voice input. Just click the the computer to recognize your particular way of speaking by reading
microphone icon to make the computer listen to or ignore voice input. prepared text into the computer so the phoneme database can be ad-
Figure 4.17 shows how you can use the Windows’ speech recognition justed to your specific speech patterns.
functionality to run commands within an application. Another approach to improve speech inconsistencies is to restrict the
Speech recognition software is complicated. As you speak, the soft- word list to a few keywords or phrases, and then have the computer
ware divides each second of your speech into 100 individual samples guess the probability that a certain phrase is being said. This is how cell
(sounds). It then compares these individual sounds with a database phones that respond to voice commands work. The phone doesn’t really
(called a codebook) that contains samples of every sound a human being figure out that you said “call home” by breaking down the phonemes. It
can make. When it finds a match, it gives your voice sound a number that just determines how likely it is that you said “call home” as opposed to
corresponds to the number of the similar sound in the database. “call office.” This reduces the processing power needed as well as the
After your voice sounds are assigned values, these values are chance of mistakes. However, it also restricts the words you can use to
matched with another database containing phonemes for the language achieve the desired results.
being spoken. A phoneme is the smallest phonetic unit that distinguishes Though not perfect, speech recognition software programs can be in-
one word from another. For example, “b” and “m” are both phonemes valuable to individuals who don’t type well or who have physical limita-
that distinguish the words bad and mad from each other in the English tions that prevent them from using a keyboard or mouse. For those
language. Many languages, including English, are made up of thousands whose careers require a lot of typing, using speech recognition software
of different phonemes. Moreover, because of differences in pronuncia- reduces their chances of incurring debilitating repetitive-strain injuries.
tion, some phonemes may actually have several different corresponding In addition, because most people can speak faster than they can write or
matching sounds. type, speech recognition software can help individuals work more effi-
Once all the sounds are assigned to phonemes, word and phrase con- ciently. Doctors are incorporating speech recognition software into their
struction can begin. The phonemes are matched against a word list that practices to create a summary of the visit before the patient leaves the
contains transcriptions of all known words in a particular language. Be- room. This eliminates the need for a dictated summary to be transcribed
cause pronunciation can vary (for example, the word the can be pro- by a separate service, and it increases the physician’s in-office
nounced so that it rhymes with either duh or see), the word list must efficiency.
174 Chapter 4 Application Software: Programs That Let You Work and Play
“Select: What is Identity Theft?”
Figure 4.17
Speech recognition software allows you to create documents using simple voice commands.
Speech recognition software also can help you to be productive during which allows drivers to control mobile phones and digital music players
generally nonproductive times. For example, you can dictate into a digital with voice commands.
recording device while doing other things, such as driving, then download Speech recognition should continue to be incorporated into our daily
the digital file to your computer and let the program type up your words for lives. Aside from the obvious benefits to persons with disabilities, it will
you. Recently, voice recognition technologies have been incorporated into provide continued efficiencies to many others as well.
in-car communication and entertainment systems, such as Ford SYNC,
Window used to
view or edit movie clips
176 Chapter 4 Application Software: Programs That Let You Work and Play
Does video editing
software support all
kinds of video files?
Video files come in a num-
ber of formats such as flash
video (FLV for YouTube), Album covers flow by in
MPEG-1, MPEG-2, and a smooth display
MPEG-4, VCD, SVCD,
DVD, AVI, WMV, MOV and
even AVCHD. AVCHD (Ad-
vanced Video Coding High
Definition) is a format for
high-definition video. Many
of the affordable video Smart playlists select
editing software packages song lists based on
support most types of criteria you specify
video files.
For more information on
video editing software, see
the section “Digital Video”
on page 386 of Chapter 8.
In what format are
the videos I watch on
my portable media player? Videos that Figure 4.19
can be watched on portable media players, and even export the files to a database or Software programs such
such as the fifth-generation iPod and iPod spreadsheet application for further manipu- as iTunes help you
Touch, are in the MP4 (MPEG-4) video for- lation. Then you can burn the songs to a CD, manage all the music files
mat. This format stores digital audio and and the program will print liner notes that on your computer. You can
sort, filter, and search
digital video streams, as well as other items, you can place inside the CD case. your collection by artist,
such as text for subtitles and still images. Are there Web-based programs album, or category, and
Similar to the MP3 format, MP4 compresses available to edit, share, and store my you can create playlists.
the audio and video content into a more photos? One great advantage of taking
manageable file size. Most MP4 files have digital images is that you can easily share
the file extension .mp4. However, Apple has the images via the Internet. Initially, we had
created other MPEG-4 extensions to identify to send images as e-mail attachments—and
specific content such as .m4b, which is often our exuberance in sending several images at
used to identify audio book and podcast the same time often clogged someone’s
files, and .m4r, which is used to identify inbox. Several online photo sharing and
ringtone files for the iPhone. photo storing sites, such as Snapfish
(snapfish.com), Kodak (kodak.com), and
Shutterfly (shutterfly.com), enable you to
Media Management Software upload your digital images from your com-
How do I manage the audio, video, puter, create photo albums, and share them
and image files on my system? with friends and family. These sites offer
Many people add hundreds or even thou- printing and card-making services as well.
sands of files to their systems by purchasing Flickr (flickr.com) is probably one of the
music and downloading images and video. best of these online photo management and
Your hard drive is a convenient place to photo sharing applications. It lets you
store all your music and images, but only if organize your images and then share them
you can find what you’re looking for! publicly with millions of users, or just with
Software such as Windows Media Player, your closest friends and family. Discussion
Winamp, and Apple iTunes allows you to boards are available so that groups can
organize audio and video files so that you exchange comments about the images, just as
can sort, filter, and search your music you would if you were passing them around
collection by artist, album, or category (see the dinner table. In addition, taking advan-
Figure 4.19). Using these programs, you can tage of online mapping technologies, Flickr
manage individual tracks, generate playlists, enables you to link your images to a map so
178 Chapter 4 Application Software: Programs That Let You Work and Play
GameMaker (yoyogames.com) is a free prod- high winds. Consequently, users of these
uct that allows you to build a game without training programs are more likely to take
any programming; key elements of the new risks and learn from their mistakes—some-
game creation are dragged and dropped into thing they could not afford to do in real life.
place. Alice (alice.org) is another free envi- Simulated training programs also help pre-
ronment to check out. It lets you easily create vent costly errors. Should something go
3D animations and simple games and in- awry, the only cost of the error is restarting
cludes the actual Sims characters! the simulation program.
Do I need special software to take
courses online? As long as you have a
Educational Software compatible Web browser, online classes will
What kinds of educational applica- be accessible to you. Depending on the con-
tions are there? Although a multitude tent and course materials, however, you
of educational software products are geared may need a password or special plug-ins to
toward the younger set, software developers view certain videos or demos.
have by no means ignored adult markets. In Taking classes over the Internet is rapidly
addition to all the products relating to the becoming a popular method of learning be-
younger audience, there are software prod- cause it offers greater schedule flexibility for
ucts that teach users new skills such as typ- busy students. Although some courses are run
ing, languages, cooking, and playing the from an individually developed Web site,
guitar. Preparation software for students many online courses are run using course
who will be taking the SAT, GMAT, LSAT, management software such as Blackboard, Figure 4.21
and MCAT exams is also popular. In addi- Moodle, and Angel. These programs provide Course management
tion, there are many computer and online traditional classroom tools such as calendars software such as
brain training games and programs designed and grade books over the Internet (see Blackboard provides a
to improve the health and function of our Figure 4.21). Special areas are available for method for doing
traditional classroom
brains. Lumosity (lumosity.com) is one such students and professors to exchange ideas and tasks, such as participat-
site that has a specific “workout” program. information through the use of chat rooms, ing in discussions and
Brain Age2 (brainage.com) has software for discussion forums, and e-mail. Other areas are taking tests, in an online
the Nintendo DS and is designed for players environment.
of all ages.
What types of programs
are available to train you to
use software or special ma-
chines? Many programs pro-
vide tutorials for popular
computer applications. These pro-
grams use illustrated systematic
instructions to guide users
through unfamiliar skills. Some
training programs, known as
simulation programs, allow users
to experience or control the soft-
ware as if it were the actual soft-
ware or an actual event. Such
simulation programs include
commercial and military flight
training, surgical instrument
training, and machine operation
training. Often these simulators
can be delivered locally on CD or
DVD or over the Internet.
One benefit of these simulated
training programs is that they
safely allow users to experience
potentially dangerous situations
such as flying a helicopter during
Normally, when you double-click a file icon on your desktop, the program that is asso- In this Active Helpdesk call, you’ll play the role of a
ciated with the selected file runs automatically. For example, when you double-click a helpdesk staffer, fielding calls about the different
*.doc or *.docx file, the file will open in Microsoft Word. However, if the file has no kinds of multimedia software, educational and refer-
extension or Windows has no application currently associated with that file type, an ence software, and entertainment software.
“Open with” dialog box appears and asks what program you want to use to open the
file. In other cases, a document may open with a program other than the one you
wanted to use to open it. This is because many applications can open several file
types and the program you expected the file to open in is not currently the program nonphotographic drawings, animations, and
associated with that file type. To assign a program to a file type or to change the illustrations using standard drawing and
program to open a particular file type, follow these instructions: painting tools such as pens, pencils, and
paintbrushes. You also can drag geometric
1. Click the Windows Explorer icon, which is pinned to the Windows 7 taskbar by
objects from a toolbar onto the canvas area
default.
to create images and use paint bucket, eye-
2. Use the search and navigation tools in this folder to locate the file you want to
dropper, and spray can tools to add color
change. (For example, you can search for all Word files by searching for *.doc or
*.docx). Right-click on a file of the correct type, and then either click Open With
and special effects to the drawings.
or point to Open With, and click Choose Default Program. Are there different types of draw-
3. A list of programs installed on your computer will appear. Click the program that
ing software? Drawing software is used
you want to use to open this type of file. Although you can choose to open indi- in both creative and technical drawings.
vidual files with a certain program, normally you would select the “Always use Applications such as Adobe Illustrator in-
the selected program to open this kind of file” check box, and then click OK. clude tools that let you create professional-
quality creative and technical illustrations.
When you double-click that type of file in the future, the file will open in the program
Illustrator’s tools help you create complex
you selected.
designs, such as muscle structures in the
human body, and use special effects, such as
charcoal sketches. Its warping tool allows
available for posting assignments, lectures, you to bend, stretch, and twist portions of
and other pertinent class information. your image or text. Because of its many tools
and features, Illustrator is one of the pre-
ferred drawing software programs of most
Drawing Software graphic artists.
What kind of software should I use There are many software packages to
Figure 4.22
for simple illustrations? Drawing help plan the layout of rooms, homes, and
The drawing program landscapes, such as those offered by Broder-
Visio lets you create dif-
software (or illustration software) lets you
ferent types of diagrams create or edit two-dimensional, line-based bund. Microsoft Visio is a program used to
easily with drag-and-drop drawings. You can use drawing software to create technical drawings, maps, basic block
options. create technical diagrams or original diagrams, networking and engineering
flowcharts, and project schedules, but it can
also be used by the more casual designer.
Visio uses project-related templates with
special objects that you drag onto a canvas.
For example, Visio allows you to quickly
drag and drop objects to create diagrams
like the one shown in Figure 4.22. Visio also
provides mindmapping templates to help
you organize your thoughts and ideas.
Business Software
for Home and Office
With the amount of power available in a typ-
ical home computer, you have more
opportunities than ever to run a business
from your home. No matter what service or
180 Chapter 4 Application Software: Programs That Let You Work and Play
product you provide, there are common shapes, and patterns. You also can import
types of software you’ll want to consider. files into your documents from other
Accounting software will help manage the sources, including elements from other
flow of money, and desktop publishing and software programs (such as a chart from
Web page creation tools will help you market Excel or text from Word) and image files.
and develop your new enterprise. A number You can readily manipulate graphics with
of software packages are designed to organ- tools that crop, flip, or rotate images or
ize and help with the daily operations of a modify the image’s color, shape, and size.
typical business. If you ever plan to run a Desktop publishing programs also include
business from your own home, or even if features that allow you to publish to the
you are just a user of large business products Web.
and services, it is helpful to know what func- What software do I use to create a
tions business software can perform. Web page? Web page authoring soft-
ware allows even the novice to design inter-
esting and interactive Web pages, without
Home Business Software knowing any HyperText Markup Language
Which programs are good for small- (HTML) code. Web page authoring applica-
business owners? If you have a small tions often include wizards, templates, and
business or a hobby that produces income, reference materials to help you easily com-
then you know the importance of keeping plete most Web page authoring tasks. More
good records and tracking your expenses experienced users can take advantage of
and income. Accounting these applications’ advanced
“
software helps small-busi- features, such as features that
ness owners manage Accounting enable you to add headlines
their finances more effi- software helps and weather information,
ciently by providing tools small-business stock tickers, and maps to
for tracking accounts re- make your Web content cur-
ceivable and accounts owners manage rent, interactive, and interest-
payable. In addition, these their finances ing. Microsoft Expression
applications offer inven- more efficiently. Web and Adobe
tory management, payroll,
and billing tools. Examples of accounting
applications are Intuit QuickBooks and
” Dreamweaver are two of the
programs to which both professionals and
casual page designers turn.
Peachtree by Sage. Both programs include Are there other ways to create
templates for invoices, statements, and fi- Web pages? If you need to produce only
nancial reports so that small-business own- the occasional Web page and do not need a
ers can create common forms and reports. separate page authoring program, you’ll
What software can I use to lay out find that many applications include features
and design newsletters and other that enable you to convert your document
publications? Desktop publishing into a Web page. For example, in some Mi-
(DTP) software allows you to incorporate crosoft Office applications, if you choose to
and arrange graphics and text in your docu- save a file as a Web page, the application
ments in creative ways. Although many will automatically convert the file to a Web-
word processing applications allow you to compatible format.
use some of the features that are hallmarks
of desktop publishing, specialized desktop
publishing software such as QuarkXPress
and Adobe InDesign allows professionals to
Large Business Software
design books and other publications that re- There is an application for almost every as-
quire complex layouts (see Figure 4.23). pect of business. There are specialized pro-
What tools do desktop publishing grams for marketing and sales, finance, point
programs include? Desktop publishing of sale, general productivity, project manage-
programs offer a variety of tools with which ment, security, networking, data manage-
you can format text and graphics. With text ment, e-commerce, and human resources, to
formatting tools, you easily can change the name just a few. In the following sections, we
font, size, and style of your text and arrange discuss some of these specialized programs
text on the page in different columns, from this seemingly endless list.
Figure 4.23
Major publishing houses What software do businesses use contact information in one central database.
use professional publish- for planning and management? Sales professionals use CRM programs to
ing programs such as Planning is a big part of running a success- get in touch with and follow up with their
QuarkXPress to lay out the
pages of textbooks. ful business. Software programs such as clients. These programs also include tools
Palo Alto Software’s Business Plan Pro that enable businesses to assign quotas and
and Marketing Plan Pro help users write create reports and charts that document and
strategic and development plans for general analyze actual and projected sales data.
business and marketing needs. Another cat- Customer relationship programs coordinate
egory of business planning software is well with PIM software such as Outlook and
project management software, such as can be set up to work with smartphones.
Microsoft Project. This type of software GoldMine from FrontRange Solutions is one
helps project managers create and modify example of a CRM program.
scheduling charts like the one shown in An enterprise resource planning (ERP)
Figure 4.24, which help them plan and track system lets a business consolidate multiple
specific tasks and coordinate personnel systems into one and improve coordination
resources. of these business areas across multiple
Customer relationship management departments. ERP systems are used to
(CRM) software stores sales and client control many “back office” operations
182 Chapter 4 Application Software: Programs That Let You Work and Play
and processing functions such as billing, pro-
duction, inventory management, and human
resources management. These systems are
implemented by third-party vendors and
matched directly to the specific needs of a
company. Oracle and SAP are well-known
companies that sell ERP software.
What software helps business
travelers? Mapping programs such as
DeLorme Street Atlas USA and Microsoft
Streets & Trips are perfect for businesses that
require employees to travel frequently.
These programs provide street maps and
written directions to locations nationwide,
and users can customize maps to include
Figure 4.24
landmarks and other handy traveling sites
such as airports, hotels, and restaurants. A Gantt chart in Microsoft Project gives project managers a visual tool for assigning
personnel and scheduling and managing tasks.
More users now turn to an online mapping
service such as Google Maps, MapQuest,
Yahoo! Maps, or Google Earth than to a pany information or products, handle online
more traditional mapping software program sales, or offer customer service and support.
because the online services are easily acces- Depending on the size of the company and
sible with any Internet connection and are its specific needs, it may use products such
updated more frequently than offline ones. as IBM’s WebSphere, GoEmerchant, and
Mapping programs, which can work in con- ProStores Business from ProStores (an eBay
junction with a global positioning system company). These products offer bundled
(GPS), are available in versions for smart- Web site creation and hosting services,
Figure 4.25
phones and for cars. Such programs help shopping cart setup, and credit card
A geographic information
you navigate unfamiliar territory and are processing services. For larger businesses,
system (GIS) applies
essential for sales representatives or specialized software to handle each geographic data to pro-
delivery-intensive businesses. They are aspect of e-commerce is available; alterna- vide solutions to complex
useful for nonprofessionals traveling to tively, a large business might develop business situations.
unfamiliar locations.
Is mapping software just used to
assist with travel? Travel is only one of
several applications that uses mapping Digital elevation
technologies to assist businesses in making
complex decisions and managing complex
systems. Many companies use a geographic
information system (GIS) to assist with man- Streets
aging, analyzing, and displaying data, most
often in spatial or map form (see
Figure 4.25). These maps are used by power
companies to manage electric grids, by Land use and cover
water distribution companies to manage
water distribution, by shipping and trans-
portation companies to determine the most
efficient routes, and even by school districts Topographic map
to manage the flow of students to the appro-
priate schools. Many of these systems are
complex, proprietary ones such as those pro-
Digital line graph of rivers
duced by ESRI. Google Earth and interactive
maps like Google Maps are simple and free
examples of basic forms of a GIS.
What software is used with
e-commerce? It seems that every busi- Real world
ness has an online presence to display com-
184 Chapter 4 Application Software: Programs That Let You Work and Play
TRENDS
IN IT Emerging Technologies: Is It Real or Is It Virtual?
Software can take us beyond what is familiar to us and into alternate accountants offer services to advise “in-world” businesses on finance,
realities. Virtual reality uses software to allow people to interact in a sim- strategic planning, or budget forecasting. There is fertile ground for innova-
ulated three-dimensional environment that users can manipulate and tive and entrepreneurial thinkers both inside and outside Second Life.
explore as if they were in that world. Beyond video games, the applica- Finally, businesses and educational institutions also recognize the
tions of virtual reality are almost endless. Three-dimensional environ- marketing potential in Second Life, and they use the virtual world to test
ments created by computers are getting better and better at helping new ideas. Educational institutions such as Harvard, Princeton, and Ohio
people experience new things or experience familiar things in new ways. University have built virtual campuses with the intention of offering “vir-
Virtual environments are used in military training programs, the tual tours” to prospective students. At these “campuses,” current stu-
space program, and, as discussed in Chapter 1, in the medical field. dents can take courses (see Figure 4.26), participate in student
Studies show that soldiers who have gone through virtual reality (VR) organizations, or meet and collaborate online just as they would if they
training are just as effective as those who have trained in traditional met in the real-world student center.
combat situations. Flight simulators are used by airlines to prepare com- Virtual worlds such as Second Life are innovative ways to hold dis-
mercial pilots to fly in a wide range of flight conditions; the military and tance learning classes. Online classes held in a virtual world environment
NASA also use them. The obvious benefit of simulators and VR is that give students the online convenience of not having to travel to class,
there is little machine or human expense when a mistake is made in vir- while providing a more enjoyable and perhaps even more effective
tual conditions—but there would be in “live” conditions. experience. In a virtual world, students are able to convene in traditional
Engineers and designers are also using virtual reality technologies. classrooms, on sandy Malibu beaches, or in open-air venues—
Car manufacturers build virtual prototypes of new vehicles, test them, environments limited only by the imagination of the instructor and the
and make alterations in design before producing a single physical part. students. Given such enjoyable choices, students might be more inclined
Architects create virtual models of building plans so that clients or poten- to make time to attend classes, thus increasing their productivity and the
tial buyers can “walk through” and get a more realistic idea of what the interactivity of the online classroom.
completed building will be like. Virtual classroom environments may add an additional layer of expe-
Second Life, a virtual world launched in 2003 by Linden Research, rience that students may be able to bring into their professional lives.
Inc., has gained worldwide popularity. Users create avatars, or virtual Seton Hall University, for example, uses Second Life in an emergency
representations of themselves, with which they interact in the virtual preparedness course that allows students to work in simulated cata-
world. Second Life has its own economy, where users have created “in- strophic situations, which would otherwise be difficult to experience in
world” businesses and residents can legally trade in the world’s own the real world.
currency, called Linden dollars. Just as in the real
Second Life has also begun to permeate the world, the virtual world has
outside world.“Outside world” businesses now as- its problems. However, it is
sist and advise “in-world” businesses. For likely that virtual reality
example, real-world programmers build complex and virtual environments
in-world projects for clients such as Dartmouth Col- will continue to find uses in
lege, Major League Baseball, and Lego. Real-world entertainment, education,
distance learning, design,
and manufacturing.
Figure 4.26
Virtual worlds are an innovative way to hold
distance learning classes.
Software Licenses
Don’t I own the software I buy? Most
people don’t understand that, unlike other
Access Help online or offline items they purchase, the software they buy
doesn’t belong to them. The only thing
they’re actually purchasing is a license that
gives them the right to use the software
for their own purposes as the only user of
that copy. The application is not theirs to
Figure 4.27 lend or copy for installation on another
Microsoft Office gives you screen tips to explain where your cursor is computer, even if it’s another one of their
tips on tasks you’re resting. own machines.
working on and answers In Microsoft Office applications, you will What is a software license? A
specific questions you see a question mark icon on the far top right software license is an agreement between
have about using online you, the user, and the software company.
of the program screen. This icon takes you to
and offline resources.
the main Help interface. Integrated help You accept this agreement before installing
means that the documentation for the the software on your machine. It is a legal
product is built directly into the software so contract that outlines the acceptable uses of
you don’t need to keep track of bulky manu- the program and any actions that violate the
als. You can type your question, search for a agreement. Generally, the agreement will
term, or browse the Help topics (see state who the ultimate owner of the software
Figure 4.27). Like many software packages, is, under what circumstances copies of the
Microsoft Office offers help documentation, software can be made, and whether the
which is installed locally on your machine, software can be installed on any other
and online help resources, which are machine. Finally, the license agreement will
updated continually. state what, if any, warranty comes with the
Finally, the Help menu, found on the software.
menu bar of most applications, lets you Do you always buy just one
choose to search an index or content outline license? Most individuals buy single
to find out the nature of almost any licenses to cover their specific use. These
Microsoft application feature. licenses cannot be shared, and you cannot
Where do I go for tutorials and “extend” the license to install the software
training on an application? If you on more than one of your computers. How-
need help learning how to use a product, ever, Apple also offers a “family license”
the product’s developer may offer online that permits a user to install some of its soft-
tutorials or program tours that show you ware legally on as many as five computers,
how to use the software features. Often you and some versions of Microsoft Office come
can find good tutorials by searching the with three licenses. Businesses and educa-
Internet. MalekTips (malektips.com), for tional institutions often buy multiuser li-
example, includes a vast array of multime- censes that allow more than one person to
dia help files; you can find podcasts for use the software. Some multiuser licenses
applications such as Excel and Photoshop are per-seat and limit the number of users
in iTunes; and even YouTube has some overall, while others, called concurrent
helpful videos. licenses, limit the number of users accessing
the software at any given time.
Does open source software
require a license? As you learned ear-
Buying Software lier, anyone using open source software has
These days, you no longer need to go to a access to the program’s code. Therefore,
computer supply store to buy software. You open source software programs can be
can find software in almost any retail tweaked by another user and redistributed.
186 Chapter 4 Application Software: Programs That Let You Work and Play
ETHICS
IN IT Can I Borrow Software That I Don’t Own?
A computer user who copies an application onto more than one com- and unlicensed software and other files) from the Business Software
puter is participating in software piracy, unless his or her license Alliance Web site (bsa.org/usa). A similar program is available at the
specifically provides for multiple distributions. What many software users Microsoft Web site (microsoft.com/piracy). These programs check the
do not realize, or do not think about, is that when they purchase serial numbers of the software installed on your computer against soft-
software, they are actually purchasing a license to use it, rather than ware manufacturer databases of official licensed copies and known
purchasing the actual software. That license is what tells you how many fraudulent copies. Any suspicious software installations are flagged for
times you can install the software, so it is important to read it. If you your attention.
make more copies of the software than the license permits, you are As of yet, there’s no such thing as an official software police force,
pirating. Historically, the most common way software has been pirated but software piracy is so rampant that the U.S. government is taking
among computer users has been by supplementing each other’s soft- steps to stop piracy worldwide. Efforts to stop groups that reproduce,
ware library by borrowing installation CDs and installing the software on modify, and distribute counterfeit software over the Internet are in full
their own computers. Larger-scale illegal duplication and distribution by force. Software manufacturers also are becoming more aggressive in
counterfeiters are quite common as well. In addition, the Internet pro- programming mechanisms into software to prevent repeated installa-
vides various ways to copy and distribute pirated software illegally. tions. For instance, with many Microsoft products, installation requires
Is it really a big deal to copy a program or two? As reported by the you to activate the serial number of your software with a database main-
Business Software Alliance, 40 percent of all software is pirated. Not only tained at Microsoft. This is different from the traditional “registration”
is pirating software unethical and illegal, but the practice has financial that enrolled you voluntarily and allowed you to be notified of product
impacts on all software consumers. The dollars manufacturers lose updates, for example. Activation is required, and failure to activate your
when software is pirated decreases the amount of money available for serial number or attempting to activate a serial number that has been
further software research and development, while increasing the up- used previously results in the software going into a “reduced functional-
front costs to legitimate consumers. ity mode” after the 50th time you use it. Therefore, without activation,
To determine whether you have a pirated copy of software installed you would not be able to save documents in Office—a strong motivator
on your computer at work or at home, you can download a free copy of to let Microsoft watch how many times you install the software you
GASP (a suite of programs designed to help identify and track licensed purchased!
A free software license, the GNU General Multimedia-enriched computers also may
Public License, is required and grants the offer graphics software or a productivity
recipients the right to modify and redistrib- suite that includes page authoring software.
ute the software. Without such license, the Many new computers also include some
recipient would be in violation of software that is of interest to home users,
copyright laws. This concept of redistribut- such as image editing or financial planning
ing modified open source software under software.
the same terms as the original software is Are there any problems associated
known as copyleft. Thus, all enhancements, with pre-installed software? There is
additions, and other changes to copylefted such generous space on system hard drives
software must also be distributed as free these days that leaving pre-installed applica-
software. tions on a system isn’t problematic from
a storage perspective. However, some
manufacturers can include applications that
they hope you will try, so as to build interest
Pre-Installed Software in their product. Some of these applications,
What application software comes especially virus protection software, are trial
with my computer? Virtually every versions for which a user gets a short-term
new computer comes with an operating sys- temporary software license. When the li-
tem as well as some form of application soft- cense expires, the software disables (but is
ware, although the particular applications still installed), and a permanent license must
depend on the hardware manufacturer and be purchased to reinstate the software. In
computer model. You usually can count on addition, many types of pre-installed pro-
your computer having some form of pro- grams are available free from the Web, so
ductivity software preinstalled, such as Mi- the pre-installation is not an advantage. In
crosoft Works or Corel WordPerfect Office. fact, having so many pre-installed programs
188 Chapter 4 Application Software: Programs That Let You Work and Play
word processing, spreadsheet, and presenta-
tion capabilities. Sites such as Zoho
(zoho.com) as shown in Figure 4.29, and
ThinkFree (thinkfree.com) offer Web-based
applications that cover not only word pro-
cessing, presentation, and spreadsheet
needs, but also a wealth of other business
applications such as project management,
3D drawing, and customer relationship
management software. Some other examples
of Web-based applications include Intuit’s
QuickBooks online, Salesforce.com, and
Citrix Online.
What advantages do Web-based
applications have? As long as you have
a Web browser, you can access your files,
which are stored securely online. Although
these free applications are not as fully fea-
tured as their installable counterparts, most
can read and export to many different file
formats and can be used with other software
packages. Besides being able to access
your documents from any computer or
smartphone that has Internet access, Web-
based applications are great for collabora-
tions. You can invite people to share your
files and work together in real time,
watching as others make changes to the
document.
Is all Web-based software free?
Web-based applications are run from
software stored completely on a Web
server instead of your hard drive. Web-
based applications are a reflection of a
movement toward a new software distribu-
tion model.
Although most Web-based software pro-
grams are free, some Web sites charge a fee
for their online products. TurboTax Online
(turbotax.com) is a version of the popular Figure 4.28
tax preparation software that you can access Microsoft Web Apps are
online to prepare your tax returns. While the In addition, they want to encourage you to similar to the full-featured
standard version is free, you’re charged for learn with their product, hoping you’ll be- versions of Word, Excel,
PowerPoint, and OneNote.
the more full-featured product. In addition come a long-term user of their software. Although the Word and
to saving you the hassle of software installa- Therefore, if you’re a student or an educator, Excel Web applications
tion, TurboTax Online stores your informa- you can purchase software that is no differ- have fewer options
tion in a secure location so that you can ent from regularly priced software at prices available, the functionality
retrieve it anytime. that are sometimes substantially less than and user interface are
the same.
general consumer prices.
Campus computer stores and college
bookstores sometimes offer discounted
Discounted Software prices to students and faculty who possess a
Is it possible to buy software at a valid ID. Online software suppliers such as
discount? Software manufacturers un- Journey Education Marketing
derstand that students and educators often (journeyed.com), CampusTech, Inc.
need to use software for short periods of (campustech.com), and Academic Super-
time because of specific classes or projects. store (academicsuperstore.com) also offer
190 Chapter 4 Application Software: Programs That Let You Work and Play
distributed for free. SourceForge.net
(sourceforge.net) is an excellent site to begin
your hunt for a group that may already have
built a solution that will work for you!
While many legitimate freeware exists,
some unscrupulous people use freeware
to distribute viruses and malware. Be
cautious when installing such programs,
especially if you are unsure of the
provider’s legitimacy.
Can I try new software before it is
really released? Some software devel-
opers offer beta versions of their software
free of charge. A beta version is an applica-
tion that is still under development. By dis-
tributing free beta versions, developers hope
users will report errors, or bugs, they find in
their programs. Many beta versions are avail-
able for a limited trial period, and are used to Figure 4.30
help the developers correct any errors before
Butterscotch.com is a useful site for finding freeware applications and provides
they launch the software on the market. product reviews, tutorials, and related podcasts.
Is it still freeware if I’m asked to
pay for the program after using it for
a while? One model for distributing Can shareware programmers make
software is to run a version free of charge for me pay for their shareware once I
only a limited time. These are fully func- have it? The whole concept of shareware Figure 4.31
tional packages, but they expire if not pur- assumes that users will behave ethically and
Tucows.com is a useful
chased within a certain timeframe. This is abide by the license agreement. However, site for finding shareware
referred to as shareware. Shareware soft- to protect themselves, many developers and freeware applica-
have incorporated code into the program to tions. The site provides
ware is distributed free, but with certain product reviews, hard-
conditions. Sometimes the software is re- stop it from working completely or to alter
ware requirements, and
leased on a trial basis only and must be reg- the output slightly after the trial period
details about the limita-
istered after a certain period of time; in other expires. tions of free versions
cases, no support is available unless the soft- of software.
ware is registered. In some cases, direct pay-
ment to the author is required. Shareware is
not freeware. If you use the software after
the initial trial period is over, then you are
breaking the software license agreement.
Software developers put out shareware
programs to get their products into users’
hands without the added expense and has-
sle of marketing and advertising. Therefore,
quite a few great programs are available as
shareware, and they can compete handily
with programs on retail shelves. For exam-
ple, TechSmith Corporation (techsmith.com)
offers screen capture and desktop recording
applications as shareware, including SnagIt
Screen Capture and Camtasia Studio, a
screen recording and presentation applica-
tion. You can try these products for free for a
30-day period, after which time you must
purchase the software to continue using it.
For a listing of other shareware programs,
visit the CNET site Tucows (tucows.com), as
shown in Figure 4.31.
192 Chapter 4 Application Software: Programs That Let You Work and Play
ACTIVE installation disc. Instead, everything you
Buying and need to install and run the downloaded
HELP-
DESK
Installing Software program is contained in one file that has
been compressed (or zipped) to make the
In this Active Helpdesk call, you’ll play the role of a downloading process quicker. For the most
helpdesk staffer, fielding calls about how to best pur- part, these downloaded files unzip or de-
chase software or get it for free, how to install and compress themselves and automatically
uninstall software, and where you can go for help start or launch the setup program. During
when you have a problem with your software. the installation and setup process, these
programs select or create the folder on your
computer’s hard drive in which most of the
program files will be saved. Usually, you
can select a different location if you desire.
the video card, monitor, CD drive, and other Either way, note the name and location of
peripherals. These requirements generally the files, because you may need to access
are printed on the software packaging or are them later.
available at the manufacturer’s Web site. Be- What do I do if the downloaded
fore installing software on your computer, program doesn’t install by
ensure that your system setup meets the itself? Some programs you download do
minimum requirements by having sufficient not automatically install and run on your
storage, memory capacity, and processing computer. Although the compressed files
capabilities. may unzip automatically as part of the
download process, the setup program may
not run without some help from you. In this
Installing, case, you need to locate the files on the hard
Uninstalling, and drive (this is why you must remember the
location of the files) and find the program
Starting Software that is controlling the installation (usually
Before you use your software, you must per- named setup.exe or sometimes install.exe).
manently place it, or install it, on your Files ending with the .exe extension are exe-
system. The installation process will differ cutable files or applications. All the other
slightly depending on whether you’ve files in the folder are support, help, and data
purchased the software from a retail outlet files. Once the setup program begins, you
and have an installation CD or are down- will be prompted to take the actions neces-
loading it from the Internet. Deleting or sary to complete the installation.
uninstalling software from your system re-
quires that you take certain precautions to
ensure you remove all associated programs
as well.
How do I install software? When
you purchase software, the program files
may come on a CD or a DVD. For most pro-
grams created for installation on a PC, an in-
stallation wizard automatically opens when
you insert the disc, as shown in Figure 4.32.
By following the steps indicated by the wiz-
ard, you can install the application on your
system. If the wizard doesn’t open automati-
cally for some reason, the best way to install
the software is to go to the Programs and
Features icon, located on the Control Panel
on the Start menu. This feature locates and
launches the installation wizard.
How is the installation process dif-
ferent for software I download from Figure 4.32
the Web? When you download software Part of the installation process in Windows is a security check to confirm
from the Web, you typically do not get an that the software is from a reliable source.
Figure 4.33
For quick access to an
a
application you use often,
you can (a) create short-
cuts on (b) the desktop or b
taskbar.
Arrow indicates
shortcut
194 Chapter 4 Application Software: Programs That Let You Work and Play
unpin this program from taskbar or from There is virtually an application for
this list, respectively. almost anything you want or need to do on
To create a shortcut on the desktop, right- your computer, whether it’s work related
click the icon of the desired program, or just for entertainment purposes. And
click Send To, and select Desktop (see there are a variety of types of applications
Figure 4.33b). This places the shortcut icon for almost every application such as
directly on the Desktop. You can identify a proprietary, open source, Web-based,
shortcut icon by the arrow in its lower left freeware, and shareware. Have fun explor-
corner, as shown in Figure 4.31a. ing all the various possibilities!
196 Chapter 4 Application Software: Programs That Let You Work and Play
summary
four four
chapter
8. How can I purchase software or get it in the software, or if not included to use the
for free? Add or Remove Program feature that comes
Almost every new computer system comes with the operating system. Most programs
summary
with some form of software to help you ac- are installed using an installation wizard
complish basic tasks. You must purchase all that walks you through the installation.
other software unless it is freeware or open Other software programs may require you
source code, which you can download from to activate the setup program, which then
the Web for free. You can also find special will begin the installation wizard. Using the
software called shareware you can run free Add or Remove Programs feature when
of charge for a test period. Although you can uninstalling a program will help you ensure
find software in many stores, as a student that all additional program files are
you can purchase the same software at a removed from your computer.
reduced price with an academic discount.
197
four
four key terms
chapter
198 Chapter 4 Application Software: Programs That Let You Work and Play
buzzwords
four four
chapter
Word Bank
• application software • integrated software • system requirements
• beta version • productivity software • system software
buzzwords
• freeware • shareware • templates
• illustration software • software piracy • Web-based applications
• image editing software • software suite • wizards
• integrated help • spreadsheet • word processing
Instructions: Fill in the blanks using the words from the Word Bank above.
Roxanne is so pumped! Her aunt is upgrading to a newer computer and is giving Roxanne
her old one. Roxanne has just enrolled in college and knows she’s going to need at least
(1) a(n) __________ program to help her write papers and (2) a(n) __________ program to
help her keep track of expenses while she is at school. Because both of these applications
are part of a larger group of applications called (3) __________, she knows she can buy
them as a group. She’s been told that it’s cheaper to buy them as (4) a(n) __________ than to
buy them individually. Because she knows she’ll need the stable, tested versions of the soft-
ware, she cannot get by using (5) a(n) __________ of the program. Roxanne is also aware of
many interesting (6) __________ that are available from the Internet and that she can access
anywhere she has an Internet connection.
As a graduation present, Roxanne received a new digital camera. She needs to install
the (7) __________ that came with her camera to edit and manage her digital pictures.
Although she’s used the software a couple of times on her parents’ computer, she is still
glad for the (8) __________ feature to assist her with specific feature-related questions and
the (9) __________ that provide systematic guides to help her do things.
Roxanne especially likes the decorative preformatted (10) __________ she can use to insert
pictures and make them seem professional. She also knows of some (11) __________ games
she can download without cost from the Internet and other (12) __________ programs that
she could try but eventually pay for. She found some really useful utility programs under
computer
the category of (13) __________ programs, which she can download for no charge and
would like to install and try out. It’s tempting for her to borrow software from her friends,
but she knows that it’s considered (14) __________. She also knows that before installing
any of the programs she must check the (15) __________ to determine if the software is
literate
becoming
compatible with her system as well as whether the system has enough resources to support
the software.
becoming
computer literate
Using key terms from this chapter, write a letter to a new business owner advising them
of the types of software they should get to help them run their company. Make sure you
identify the type of business in the letter, and think of all possible software that would fit
that specific type of business in addition to general business software that most businesses
would require.
199
four
four self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more practice with key
terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. A macro is a small program that groups a series of commands so that they run as a single
command.
_____ 2. When you need help with software, you should use the program’s help features or
manufacturer FAQs, not online help like podcasts or YouTube videos.
_____ 3. System software includes the operating system and utility programs.
_____ 4. An integrated software application is a group of programs bundled as a package.
_____ 5. To remove a program you no longer want, it’s better to delete it than uninstall it.
200 Chapter 4 Application Software: Programs That Let You Work and Play
making the
four four
chapter
transition to...
next semester
1. Picture Perfect
transition to...
You just spent the summer volunteering in a remote village in Africa, and you have tons
of pictures you want to share with friends and family. For your friends, it’s easy to
upload them into Facebook, but you don’t want to give your family access to your
next semester
making the
Facebook account. Research different Web sites that you would consider using to upload
your pictures to show your family. Create a table that lists the different services along
with the pros and cons of each site. Discuss which services you would use and explain
your reasoning.
2. Software Help
Because your friends know you like technology, they always are coming to you for advice
and help with their software. While you don’t mind helping out your friends, there are
some great Web sites that they also can go to. Create a presentation that explains the
various ways they can get free help about all their software questions. Begin the presenta-
tion with a list of FAQs and hyperlink each question to the slide that contains the answer.
3. Upgrading Software
You are trying to decide whether to upgrade some software that you used this past
semester. How do the following items weigh into your decision to upgrade the software
or not?
a. The cost of the upgrade
b. The length of time the upgrade has been available
c. Hardware requirements
d. Features of the upgrade versus the stability of your current system
4. Choices, Choices
There are many word processing software options. Describe the decision process you
would use to choose among a free Web-based word processing application, an open
source word processing application, and a standard packaged application if you are
a. traveling abroad for a semester, visiting 15 different cities, and not carrying a
notebook with you.
b. staying at home for the term and compiling a capstone report using several hundred
researched sources of information.
c. working with three people from other colleges on a joint paper that will be presented
at a conference at the end of the term.
5. Using OneNote
You have been assigned a research paper, which will be very extensive. You are required
to collect information for the paper throughout the semester, so you need a good system
to keep your notes, readings, and data organized. You’ve heard OneNote is a great tool
for just this type of project, but since you have never used the software, you do not know
where to start. Go to Microsoft Online and search on “Templates for OneNote.” Find sev-
eral good templates that will help you get started. What are the features of the templates
you choose? Discuss which template you would most likely use and why.
201
four
four making the
chapter
transition to...
the workplace the workplace
1. Surveying the Competition
making the
You are asked to develop a departmental report that analyzes the key competitors in
transition to...
202 Chapter 4 Application Software: Programs That Let You Work and Play
critical thinking
four four
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
3. Media Management
Less than a decade ago, most home users had few media files on their computer
systems. Today, many users have a library of music, a collection of digitized movies,
personal photo collections, and even a large set of recorded television shows. Examine
three different software packages on the market today for managing these materials.
What features do they need to make the PC the primary entertainment device for a
home? What would make users move their PC from the office into the living room?
203
four
four team time
chapter
Problem
You and your friends have decided to start Recycle Technology, a not-for-profit organiza-
tion that would recycle and donate used computer equipment. In the first planning session,
the group recognized the need for certain software to help them with various parts of the
business such as tracking inventory, designing notices, mapping addresses for pickup and
delivery, and soliciting residents by phone or e-mail about recycling events, to name a few.
Task
Split your class into as many groups of four or five as possible. Make some groups respon-
sible for just locating free or Web-based software solutions, and other groups responsible
for finding proprietary solutions. Another group could be responsible for finding mobile
app solutions. The groups will present and compare results with each other at the end of
the project.
Process
1. Identify a team leader who will coordinate the project and record and present results.
2. Each team is to identify the various kinds of software that Recycle Technology needs.
Consider software that will be needed for all the various tasks needed to run the
organization such as communication, marketing, tracking, inventory management and
financial.
3. Create a detailed and organized list of required software applications. Depending on
your team, you will either specify proprietary software or open source software.
Conclusion
Most organizations require a variety of software to accomplish different tasks. Compare
your results with those of other team members. Were there applications that you didn’t
think about, but that other members did? How expensive is it to ensure that even the
smallest company has all the software required to carry out daily activities, or can the
needs be met with free, open source products?
204 Chapter 4 Application Software: Programs That Let You Work and Play
ethics
four four
chapter
project
project
ethics
Ethics Project
Ethical conduct is a stream of decisions you make all day long. In this exercise, you will
research and then role-play a complicated ethical situation. The role you play might or
might not match your own personal beliefs; in either case, your research and use of logic
will enable you to represent the view assigned. An arbitrator will watch and comment on
both sides of the arguments, and together the team will agree on an ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone is a proponent
for open source software but is being rebuffed by a someone who feels “you get what
you pay for” and is a big proponent of using proprietary software.
2. Team members should write a summary that provides background information for
their character—for example: open source proponent, proprietary developer, or arbitra-
tor—and details their character’s behaviors to set the stage for the role-playing event.
Then, team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration features of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
205
five
five
chapter
using system
software:
the operating system, utility programs,
and file management
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What software is included in system software? (pp. 208–209)
2. What are the different kinds of operating systems? (pp. 209–210)
3. What are the most common operating systems? (pp. 210–214)
4. How does the operating system provide a means for users to interact with the
computer? (pp. 214–215)
5. How does the operating system help manage resources such as the processor,
memory, storage, hardware, and peripheral devices? (pp. 215–219)
6. How does the operating system interact with application software? (pp. 220–221)
7. How does the operating system help the computer start up? (pp. 221–224)
8. What are the main desktop and window features? (pp. 224–227)
9. How does the operating system help me keep my computer organized? (pp. 227–232)
10. What utility programs are included in system software, and what do they do?
(pp. 232–241)
multimedia resources
multimedia
resources
Active Helpdesk
• Managing Hardware and Peripheral Devices: The OS (p. 221)
• Starting the Computer: The Boot Process (p. 223)
• Organizing Your Computer: File Management (p. 232)
• Using Utility Programs (p. 237)
Sound Bytes
• Customizing Windows (p. 212)
• File Management (p. 230)
• File Compression (p. 234)
• Hard Disk Anatomy Interactive (p. 239)
• Letting Your Computer Clean Up After Itself (p. 240)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Have you ever wanted to
capture what appears on your monitor screen? You can use the PrtScr
(print screen) key on your keyboard, but that captures the entire screen, and only onto
the clipboard. You then need to crop and save the file for that screen
capture to be useful. There are also screen capture software programs
that you can purchase. However, Windows 7 includes a Snipping
Tool to capture an entire screen image or to take a freeform
or rectangular “snip” of any window or object on the screen.
Once snipped, you can annotate, save, or share
the object. You can find the Snipping Tool by clicking
the Start button, selecting All Programs, and then
opening the Accessories folder. Jing
( jingproject.com), a freeware tool
from TechSmith, not only captures
still screen shots, but also records
video of on-screen action. You
can share Jing files over the
Web, via instant messaging, or
e-mail.
207
System Software Are all operating systems
alike? Although most computer users can
Basics name only a few operating systems, many
As you learned in the last chapter, there are types exist. Some operating systems, such as
two basic types of software on your com- those found in household appliances and car
puter: application software and system soft- engines, don’t require any user intervention
ware. Application software is the software at all. Some are proprietary systems
you use to do everyday tasks at home and at developed specifically for the devices they
work. System software is the set of programs manage. Some operating systems are avail-
that helps run the computer and coordinates able for personal and business use, and other
instructions between application software operating systems coordinate resources for
and the computer’s hardware devices. From many users on a network. These operating
the moment you turn on your computer to systems were traditionally classified into cat-
the time you shut it down, you are interact- egories, depending on the number of users
ing with system software. System software they served (single user or multiple users)
consists of two primary types of programs: and the tasks they performed (single task or
the operating system and utility programs. multitask). However, as devices begin to
What does an operating system converge in their functionalities, and the op-
do? The operating system (OS) is a group erating systems continue to become more
of programs that controls how your com- powerful, the distinction in the traditional
puter system functions. The OS manages the categorization of operating systems begins to
computer’s hardware, including the proces- blur (see Figure 5.1).
sor (also called the central For example, personal
“
processing unit, or CPU), computers were at one time
memory, and storage de- Every computer run by single-task, single-
vices, as well as peripheral has an operating user operating systems
devices such as the monitor system. such as the Microsoft Disk
and printer. The OS also pro-
vides a consistent means for
software applications to work with the CPU,
and it is responsible for the management,
” Operating System (MS-
DOS). MS-DOS (or DOS)
was the first widely installed operating sys-
tem in personal computers. Compared to the
scheduling, and coordination of tasks as operating systems we are familiar with
well as system maintenance. Your first inter- today, DOS was a highly user-unfriendly
action with the OS is the user interface—the OS. To use it, you needed to type specific
features of the program such as the desktop, commands, and didn’t have the option to
icons, and menus that allow the user to com- click on icons (pictures that represent an ob-
municate with the computer system. ject such as a software application or a file or
System software also includes utility pro- folder) or choose from menus or lists.
grams. A utility program is a small program Eventually, operating systems such as
that performs many of the general house- Apple’s Mac OS and Microsoft’s Windows
keeping tasks for the computer, such as sys- replaced DOS because these systems allowed
tem maintenance and file compression. a single user to multitask, or to perform more
Do all computers have operating than one process at a time. (The Mac and
systems? Every computer, from the Windows operating systems are discussed
smallest notebook to the largest supercom- in more detail later in this chapter.)
puter, has an operating system. Even cell Then, networking capabilities were
phones, game consoles, automobiles, and added to these personal computer operating
some appliances have operating systems. systems to facilitate sharing peripheral
The role of the OS is critical; the computer devices and Internet access among multiple
cannot operate without it. As explained computers at home. These systems, while
more fully in the section of this chapter still traditionally used as single-user, multi-
titled “What the Operating System Does,” task operating systems, technically became
the operating system coordinates the flow multiuser, multitask operating systems
of data and information through the because of their networking capabilities.
computer system by coordinating the Similar transitions are happening with
hardware, software, user interface, mobile devices, as cell phones and PDAs
processor, and system memory. (personal digital assistants) converge to
208 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Figure 5.1
Multitask
Devices no longer fit
neatly into categories of
operating systems, which
traditionally were defined
by the number of users
(single or multiple) and
Home servers Mainframes the number of simultane-
Personal Notebooks
ous tasks the device was
computers and netbooks
able to perform (single or
multiple).
Tablets
Single-user Multiuser
Smartphones
Cameras,
e-book readers
personal media
players
Game consoles
smartphones and incorporate the function- Single-task operating systems, also referred
alities of cameras and personal media to as embedded systems, require
players. Although smartphones were ini- minimal user interaction. The pro-
tially single-task devices, with combined grams are written specifically for the needs
functionalities, the newer devices are begin- of the devices and their functions. Therefore,
ning to add multitasking capabilities. there are no commercially available standard
In the next section, we will look at differ- RTOS software programs. This type of oper-
ent types of operating systems that work ating system is a program with a specific
with a variety of computers. purpose, and it must guarantee certain re-
sponse times for particular computing tasks;
otherwise, the machine is useless. Devices
Types of Operating that must perform regimented tasks or
Systems record precise results—such as measurement
Operating systems can be categorized by the instruments found in the scientific, defense,
type of device in which they are installed, and aerospace industries—require real-time
such as robots and specialized equipment, operating systems. Examples include digital
mainframes and network computers, mobile storage oscilloscopes and the Mars Recon-
devices, and personal computers. naissance Orbiter.
Where else are RTOSs in use
today? You also encounter real-time oper-
Real-Time Operating Systems ating systems in everyday life. They are in
Why do machines with built-in devices such as fuel-injection systems in car
computers need an operating engines, inkjet printers, VoIP phones, and
system? Machinery that is required to some medical devices (see Figure 5.2), as
perform a repetitive series of specific tasks in well as common appliances such as washing
an exact amount of time requires a real-time machines, dryers, and furnaces. Real-time
operating system (RTOS). Real-time operating systems are also found in many
210 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Operating Systems for Operating Systems for
Mobile Devices Personal Computers
What kind of operating system do What is the Microsoft Windows
smartphones use? A smartphone does operating system? Microsoft Windows
more than let the user make and answer began as an operating environment that
phone calls. It also has productivity features, worked with MS-DOS and incorporated a
in addition to features found on personal user-friendly interface like the one that was
media players and cameras as well as the first introduced with Apple’s operating
ability to connect to the Web. Examples of system. In 1995, Microsoft released
smartphones include BlackBerry devices, Windows 95, a comprehensive update that
Apple’s iPhone, Google Android, and Palm made changes to the user interface and in-
Pre. Initially, although multifunctional, corporated multitasking capabilities.
smartphones were only capable of doing Windows XP was another major update; it
one task at a time. Now most modern smart- provided networking capabilities in its
phones have modest multitasking capabili- consumer editions. The newest release of
ties such as checking e-mail while on a Microsoft’s operating system, Windows 7,
phone call. The most common follows Windows
operating systems Vista, and builds on the
that can be found on security and user inter-
smartphones include face upgrades that the
Symbian by Nokia, Windows Vista release
BlackBerry by RIM, provided. It also gives
Windows Mobile by users with touch-screen
Microsoft, iPhone monitors the ability
OS X by Apple, An- to use touch
droid by Google, commands to scroll,
and webOS by resize windows,
Palm. The newest pan, and zoom.
versions of the What was once
iPhone’s OS X and Figure 5.3 only an operating
the Palm Pre’s Gaming devices such as the Nintendo Wii and PlayStation 3 system on which
webOS enable the have their own system software. only one user
user to run more could perform one
than one applica- task at a time,
tion concurrently. Windows is now a powerful operating
Do gaming consoles and personal system that can support simple networking
media players require an operating tasks. Over time, Windows improvements
system? Gaming systems, like have concentrated on increasing user
Microsoft’s Xbox 360, the Nintendo Wii, and functionality and friendliness, improving
the Sony PlayStation (see Figure 5.3), as well Internet capabilities, and enhancing file
as personal media players like Microsoft’s privacy and security.
Zune, Apple’s iPod, and SanDisk’s Sansa, all What is the difference between
require some form of customized system the various editions of Windows 7
software that is developed specifically for operating systems? With each new
the particular device. The system software version of its operating system, Microsoft
includes system programs—also known as continues to make improvements. However,
firmware—that control the device, as well it’s still not a one-size-fits-all operating sys-
as other programs that come with the per- tem. Windows 7 comes in several editions to
sonal media player or the gaming device. accommodate different users: home users
For example, the programs included with (Starter, Home Basic, Home Premium), busi-
most portable media players allow users to ness users (Professional and Enterprise), and
manage music files on the player and to rip combination users (Ultimate). In addition,
audio CDs. The operating systems on gam- there are 32-bit and 64-bit versions of
ing consoles support Web browsing and file Windows. The 32-bit version is built for
storage of media and photos as well as play- computers that have up to 4 GB of RAM.
ing DVDs and games. For those systems with more than 4 GB of
212 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
TRENDS Emerging Technologies: Open Source Software—
IN IT Why Isn’t Everyone Using Linux?
Proprietary software such as Microsoft Windows and Mac OS is devel- market? One reason is that corporations and individuals have grown ac-
oped by corporations and sold for profit. This means that the source customed to one thing that proprietary software makers can provide:
code, the actual lines of instructional code that make the program work, technical support. It is almost impossible to provide technical support for
is not accessible to the general public. Without being able to access the open source software because anyone can freely modify it; thus, there is
source code, it’s difficult for a user to modify the software or see exactly no specific developer to take responsibility for technical support (see
how the program author constructed various parts of the system. Figure 5.5). Similarly, corporations have been reluctant to install open
Restricting access to the source code protects companies from hav- source software extensively because of the cost of the internal staff of
ing their programming ideas stolen, and it prevents customers from programmers that must support it.
using modified versions of the software. However, in the late 1980s, Companies such as Red Hat have been combating this problem. Red
computer specialists became concerned that large software companies Hat offers a free, open source operating system called Fedora. In addi-
(such as Microsoft) were controlling a large portion of market share and tion, Red Hat has modified the original Linux source code and markets a
driving out competitors. They also felt that proprietary software was too version, Red Hat Enterprise Linux, as a proprietary program. Fedora is the
expensive and contained too many bugs (errors). testing ground for what eventually goes into this proprietary program.
These people felt that software Red Hat Enterprise Linux 6 is the cur-
should be developed without a profit rent system on the market, and comes
motive and distributed with its source in versions for servers and desktops.
code free for all to see. The theory was Purchasers of Red Hat Enterprise Linux
that if many computer specialists ex- receive a warranty and technical sup-
amined, improved, and changed the port. Packaging open source software in
source code, a more full-featured, bug- this manner has made its use much
free product would result. Hence, the more attractive to businesses. As a
open source movement was born. result, many Web servers are hosted on
Open source software is freely dis- computers running Linux.
tributed (no royalties accrue to the cre- When will free versions of Linux (or
ators), contains the source code, and another open source operating system)
can in turn be redistributed freely to be the dominant OSs on home comput-
others. Most open source products are ers? The answer is, maybe never. Most
created by teams of programmers and casual computer users won’t feel
are modified (updated) by hundreds of comfortable without technical support;
other programmers around the world. Figure 5.5 therefore, any open source products for
You can download open source prod- Companies like Ubuntu and Xandros provide free (or home use will need to be marketed the
ucts for free from the Internet. Linux is low-cost) Linux software, but users must purchase way Red Hat markets Enterprise Linux.
probably the most widely recognized technical support. In addition, many open source products
name in open source software, but are not easy to maintain.
other products such as MySQL (a database program) and OpenOffice.org However, some companies are making easy-to-use visual interfaces,
(a suite of productivity applications) are also gaining in popularity. such as GNOME and KDE, which work with the Linux operating system. If
So, if an operating system such as Linux is free, why does Windows one of these companies can develop an easy-to-use product and has the
(which users must pay for) have such a huge market share (nearly marketing power to challenge Microsoft, you may see more open source
92 percent), and why does Linux have less than 1 percent of the desktop OSs deployed in the home computer market in the future.
1991 as a part-time project of Finnish univer- anyone, Linux can be tweaked quickly to meet
sity student Linus Torvalds, who wanted virtually any new operating system need. For
to create a free OS to run on his home com- example, only a few weeks were necessary
puter. He posted his OS code to the Web for to get the Linux OS ready for the Intel Xeon
others to use and modify. It has since been processor, a feat unheard of in proprietary
tweaked by scores of programmers as part OS development. Some Linux-based operat-
of the Free Software Foundation GNU ing systems have been modified to run on
Project (gnu.org). iPods and gaming systems. Linux is also
Linux is gaining a reputation as a stable gaining popularity among computer manu-
OS that is not subject to crashes or failures. facturers, which have begun to ship it with
Because the code is open and available to some of their latest PCs.
214 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
personal computers had a DOS operating BITS
system with a command-driven interface, as AND A Web-Based Operating System
shown in Figure 5.8. A command-driven in- BYTES
terface is one in which you enter commands
to communicate with the computer system. Now that broadband Internet access is becoming commonplace, the concept of a
The DOS commands were not always easy more universal operating system, called a Web-based OS, is being discussed, and
to understand; as a result, the interface some prototype sites are in their infancy. So what is a Web-based operating system?
proved to be too complicated for the average Actually, the terms Web-based operating environment or portable desktop might be
user. Therefore, PCs were used primarily in more accurate. The concept behind this movement is to make the Web the primary
business and by professional computer application interface through which users can view content, manage data, and use
operators. various services (calendars, e-mail, and picture sharing and storage) on their local
The command-driven interface was later machine and on the Web without noticing any difference between interfaces.
improved by incorporating a menu-driven Currently, most applications we use have been installed on a specific computer
interface, as shown in Figure 5.8. A menu- and can be used only on that computer. A Web-based operating environment would
driven interface is one in which you choose allow users access to applications and content via the Web, regardless of the
commands from menus displayed on the machine they are using. This means business travelers would not need to lug their
screen. Menu-driven interfaces eliminated notebooks everywhere they went. Instead, they would only need to find a computer
the need for users to know every command that had Internet access to be able to work on documents, see their calendar, read
because they could select most of the com- their e-mail, and so on. All of their settings and preferences, even a customized desk-
monly used commands from a menu. top image, as well as working documents, could be stored in an individual Web-based
However, they were still not easy enough account for them to access anywhere and on any machine at any time. Google is the
for most people to use. closest to having a complete Web-based system. Its Google Docs application and
What kind of interface do operating Chrome browser are the initial components of a completely Web-based operating
systems use today? Current personal environment, which is expected to come out by 2011. Because security measures
computer operating systems such as Microsoft have not been completely worked out, it’s advisable that Web-based accounts not be
Windows and Mac OS use a graphical user used to store or manipulate personal or proprietary data and information. For more in-
interface, or GUI (pronounced “gooey”). formation, or to open your own account, check out the Web sites of the current Web-
Unlike the command- and menu-driven based OS innovators, including Google, eyeOS (eyeos.org), and GoGUI (gogui.com).
interfaces used earlier, GUIs display graph-
ics and use the point-and-click technology of
the mouse and cursor, making them much actually allows you to select which interface
more user-friendly. (Windows or Mac) you’d like your system to
Unlike Windows or Mac OS, Linux does have. This means that if you’re using Linux
not have a single default GUI interface. In- for the first time, you don’t have to learn a
stead, users are free to choose among many new interface; you just use the one you’re
commercially available and free interfaces, most comfortable with already.
such as GNOME and KDE, each of which
provides a different look and feel. For exam-
ple, GNOME (pronounced “gah-NOHM”) Processor Management
Why does the operating
system need to manage the
a
processor? When you use your
computer, you are usually asking Figure 5.8
the CPU to perform several tasks at (a) A command-driven
once. For example, you might be interface. (b) A menu-
driven interface.
The Internet is a fantastic tool, but only if you can access it. In an effort to puters and those who don’t) and provide computing resources to every-
give children in developing countries a better opportunity to “learn, one regardless of their financial means.
share, and create,” the One Laptop per Child (OLPC) initiative was The notebook itself is revolutionary in design (see Figure 5.9). Called
founded by Nicholas Negroponte and the XO-1, the notebook is small and has a comfortable, child-sized, built-
other faculty from MIT Media in handle. It also has a tablet-like monitor that
Lab, in conjunction with part- can twist to turn the notebook into an elec-
ners such as Google, AMD, tronic book (e-book) reader, which is critical in
and News Corporation. The areas where books are hard to come by. The
mission of OLPC (laptop.org) outside of the notebook is rugged and child-
is to ensure that all school- friendly. In addition, it is power efficient, run-
aged children in lesser-devel- ning on less than one-tenth the power a
oped communities receive their standard notebook requires. Because access
own personal computers so that to electricity is minimal in many of the pro-
they are no longer excluded from ject’s target areas, the notebook is self-pow-
the educational, economic, and ered by an easy-to-use pull-string.
entertainment benefits that com- At the core of the project is Sugar, the oper-
puters can provide. Laptops have ating system. It is based on open source code
been distributed to children in components from Red Hat’s Fedora version of
areas and countries such as the the Linux operating system, but has a user in-
South Pacific, Uruguay, Mongolia, terface that is completely different from
Nigeria, Ethiopia, and Rwanda. Windows, Mac OS, or Linux. Credit
This ambitious project to de- goes to the developers, who
velop and distribute a low-cost note- really thought about how
book computer (currently, the cost is the users of the notebook
$199) would provide access to electronic would interact with the
textbooks and other learning device. The OLPC notebooks
aids—and eventually the Figure 5.9 will most likely be the first
Internet. The project has The revolutionary design of the XO-1 notebook is rugged yet child-friendly. The computer that many of
expanded to include a wide XO-1 can be easily converted from a traditional notebook to an e-book. It is ex- these children use. Because
variety of professionals from tremely power-efficient but can also be self-powered. children have no idea of
academia, business, the arts, what to do with the machine
and technology. The main thrust of the project is to overcome the so- and may not have anyone to tell them, the user interface was designed to
called digital divide (the gap between people who have access to com- be as intuitive as possible.
216 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
The operating system focuses on activities a
rather than on applications. When the machine
powers up, the first image is that of the XO
man (an O on top of an X) in the middle of a circle. It is
surrounded by icons that represent home, friends, and
neighborhood. The computer includes a built-in micro-
phone and webcam for children to create their own
multimedia. For example, the multimedia tool allows
children to add music to their drawings. Other activities
include browsing the Internet, chatting, text editing,
and playing games. At the core of each activity is the
ability to collaborate, which facilitates the community
learning experience. To enhance collaboration, the
notebooks are all interconnected in a wireless mesh
network, providing the potential for every activity to be
b
a networked activity. Browsing, for example, would no longer be an iso-
lated, individual activity; it could also be a collaborative group experience
(see Figure 5.10a). Wireless capabilities also help extend the community
beyond its physical borders. These computers make it possible for a child
in Africa, for example, to connect with another child in Europe.
In addition, the operating system uses a journaling technique for ar-
ranging and organizing files (see Figure 5.10b). The file system records
what the child has done (rather than just what the student has saved),
working as a scrapbook of the student’s interactions with the computer as
well as with peers. The journal can be tagged, searched, and sorted in a Figure 5.10
variety of ways.
(a) One student shares a browsing experience with several others.
Another general concept behind the operating system is that children (b) The journaling system chronicles what the student saves as
learn through doing, so the software puts an emphasis on tools for explo- well as the student’s interaction with the machine and with others.
ration and expression, as well as encouraging students to learn by helping
each other. Because Sugar is built on an open source platform, it also en- Discovery 2007 (a version of Linux)—it offers some of the same user-
courages students to explore how it works and to modify the code to meet friendly hardware features as the XO-1 machine does, such as the swivel
their individual preferences. monitor that converts to a tablet PC. Some reviewers and followers of both
The OLPC is not the only organization interested in increasing the reach projects have offered the opinion that the Classmate PC is better suited for
of technology to those in less-developed nations. Intel has gone forward the older student user, whereas the XO-1 laptop is geared toward a
with its own program and produced the Classmate PC. Although the Class- younger, less sophisticated user. With so many children waiting to be ex-
mate PC is more closely aligned with the traditional Windows-based PC posed to technology and to a more fun and intuitive learning process, there
model—it runs on either Windows or the open source OS Mandriva is most likely room in the market for both machines.
Sometimes these events occur sequen- device has its own type of interrupt, which
tially (such as when you type characters one is associated with an interrupt handler, a
at a time), but other events involve two or special numerical code that prioritizes the
more devices working concurrently (such as requests. These requests are placed in the in-
the printer printing while you continue to terrupt table in the computer’s primary
type and watch a movie). Although it looks memory (random access memory, or RAM).
as though the keyboard, Blu-ray drive, and The operating system processes the task as-
printer are working at the same time, in fact, signed a higher priority before processing a
the OS switches back and forth among task that has been assigned a lower priority.
processes, controlling the timing of events This is called preemptive multitasking.
the processor works on. In our example, when it receives the in-
For example, assume you are typing and terrupt from the printer, the operating sys-
want to print a document. When you tell tem pauses the CPU from its typing activity
your computer to print your document, the and from the Blu-ray activity, and puts a
printer generates a unique signal called an “memo” in a special location in RAM called
interrupt that tells the operating system that a stack. The memo is a reminder of what the
it is in need of immediate attention. Every CPU was doing before it started to work on
218 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
What happens if ot
str uctions n recently used
my computer runs d in
an
out of RAM? ta
Da
When there isn’t
enough RAM for the
operating system to
store the required data OS
and instructions, the
RAM
operating system
borrows from the more
spacious hard drive. This
process of optimizing RAM storage by bor- Data now
and instructions needed
rowing hard drive space is called virtual Hard drive’s swap file
memory. As shown in Figure 5.11, when
more RAM is needed, the operating system communication between the hardware
swaps out from RAM the data or instruc- device and the operating system. Because Figure 5.11
tions that have not been recently used and the OS must be able to communicate with Virtual memory borrows
moves them to a temporary storage area on every device in the computer system, the excess storage capacity
the hard drive called the swap file (or page from the hard drive when
device driver translates the device’s special- there is not enough
file). If the data or instructions in the swap ized commands into commands that the capacity in RAM.
file are needed later, the operating system operating system can understand, and vice
swaps them back into active RAM and re- versa. Devices would not function without
places them in the hard drive’s swap file the proper device drivers because the OS
with less active data or instructions. This would not know how to communicate
process of swapping is known as paging. with them.
Can I ever run out of virtual Do I always need to install drivers?
memory? Only a portion of the hard Today, most devices, such as flash drives,
drive is allocated to virtual memory. You can mice, keyboards, and many digital cameras,
manually change this setting to increase the come with the driver already installed in
amount of hard drive space allocated, but Windows. The devices whose drivers are
eventually your computer system will be- included in Windows are called Plug and
come sluggish as it is forced to page more Play devices. Plug and Play (PnP) is a soft-
and more often. This condition of excessive ware and hardware standard that Microsoft
paging is called thrashing. The solution to created with the Windows 95 OS. PnP is
this problem is to increase the amount of designed to facilitate the installation of new
RAM in your system so that it will not be hardware in PCs by including in the OS the
necessary for it to send data and instructions drivers these devices need in order to run.
to virtual memory. Because the OS includes this software,
How does the operating system incorporating a new device into your
manage storage? If it weren’t for the computer system seems automatic. Plug
operating system, the files and applications and Play enables users to plug a new device
you save to the hard drive and other storage into a port on the system unit, turn on the
locations would be an unorganized mess. computer, and immediately play (use) the
Fortunately, the OS has a file-management device. The OS automatically recognizes
system that keeps track of the name and the device and its driver without any further
location of each file you save and the user manipulations of the system.
programs you install. We will talk more What happens if the device is not
about file management later in the chapter. Plug and Play? Some current devices,
such as many types of printers and many
Hardware and Peripheral Device older devices are not Plug and Play. When
you install a non–PnP device, you will be
Management
prompted to insert the driver that was pro-
How does the operating system man- vided with the device. If you obtain a
age the hardware and peripheral non–PnP device secondhand and do not
devices? Each device attached to your receive the device driver, or if you are
computer comes with a special program required to update the device driver, you
called a device driver that facilitates can often download the necessary driver
220 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
ACTIVE Managing Hardware The Boot Process:
HELP- and Peripheral Starting Your
DESK
Devices: The OS Computer
In this Active Helpdesk call, you’ll play the role of a Many things happen quickly between the
helpdesk staffer, fielding calls about how the operating time you turn on the computer and the time
system manages memory, storage, hardware, and pe-
when it is ready for you to start using it. As
ripheral devices.
you learned earlier, all data and instructions
(including the operating system) are stored
in RAM while your computer is on. When
you turn off your computer, RAM is wiped
their corporate umbrella and use the same clean of all its data (including the OS). How
APIs in all or most of their applications. does the computer know what to do when
Because APIs coordinate with the operating you turn it on if there is nothing in RAM? It
system, all applications that have incorpo- runs through a special boot process (or
rated these APIs have similar interface fea- start-up process) to load the operating sys-
tures, such as toolbars and menus. Therefore, tem into RAM. The term boot, from bootstrap
many features of the applications have the loader (a small program used to start a larger
same look. An added benefit to this system program), alludes to the straps of leather,
is that applications sharing these formats called bootstraps, that men used in former
can easily exchange data with each other. As times to help them pull on their boots. This
such, it’s easy to create a chart in Microsoft is the source of the expression “pull oneself
Excel from data in Microsoft Access and in- up by the bootstraps.”
corporate the finished chart into a Microsoft What are the steps involved in the
Word document. boot process? As illustrated in Fig-
ure 5.13, the boot process consists of four
basic steps:
1. The basic input/output system (BIOS) Figure 5.13
is activated by powering on The boot process.
the CPU.
ROM
chip STEP 2: BIOS conducts
power-on self-test.
CPU
“
a Mac, you won’t hear any memory, types of disk
beeps or see any keyboard
What’s the first drives, and other essential
lights illuminate, but you thing that input and output hardware
will most likely see the Win- happens after I components. If the results
dows or Mac OS logo dis- of the POST compare favor-
play on the monitor,
turn on my ably to the hardware con-
computer?
indicating the progress of the
start-up process. Once the
boot process has completed these steps, it is
ready to accept commands and data. Let’s
” figurations stored in
CMOS, the boot process
continues. If new hardware has been in-
stalled, this will cause the POST to disagree
look at each of these steps in more detail. with the hardware configurations in
CMOS, and you will be alerted that new
hardware has been detected.
Step 1: Activating BIOS
What’s the first thing that happens Step 3: Loading the Operating System
after I turn on my computer? In the
How does the operating system get
first step of the boot process, the CPU acti-
loaded into RAM? When the previous
vates the basic input/output system (BIOS).
steps are successfully completed, BIOS goes
BIOS (pronounced “bye-OSE”) is a program
through a preconfigured list of devices in its
that manages the exchange of data between
search for the drive that contains the system
the operating system and all the input and
files, which are the main files of the operat-
output devices attached to the system, hence
ing system. When it is located, the operating
its name. BIOS is also responsible for load-
system loads into RAM from its permanent
ing the OS into RAM from its permanent
storage location on the hard drive.
location on the hard drive.
Once the system files are loaded into
BIOS itself is stored on a special read-only
RAM, the kernel (or supervisor program) is
memory (ROM) chip on the motherboard.
loaded. The kernel is the essential compo-
Unlike data stored in RAM, data stored in
nent of the operating system. It is responsi-
ROM is permanent and is not erased when
ble for managing the processor and all other
the power is turned off.
components of the computer system. Be-
cause it stays in RAM the entire time your
Step 2: Performing the computer is powered on, the kernel is said
to be memory resident. Other parts of the
Power-On Self-Test OS that are less critical stay on the hard
How does the computer determine drive and are copied over to RAM on an
whether the hardware is working as-needed basis so that RAM is not entirely
properly? The first job BIOS performs is filled. These programs are referred to as
to ensure that essential peripheral devices nonresident. Once the kernel is loaded, the
are attached and operational. As mentioned operating system takes over control of the
already, this process is called the power-on computer’s functions.
222 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Step 4: Checking Further ACTIVE Starting the
Configurations and Customizations HELP- Computer: The Boot
DESK
When are the other components Process
and configurations of the system In this Active Helpdesk call, you’ll play the role of a
checked? CMOS checks the configura- helpdesk staffer, fielding calls about how the operating
tion of memory and essential peripherals in system helps the computer start up.
the beginning of the boot process. In this last
phase of the boot process, the operating sys-
tem checks the registry for the configuration Fortunately, you have several options for
of other system components. The registry correcting the situation. If you have recently
contains all of the different configurations installed new software or hardware, try
(settings) used by the OS and by other appli- uninstalling it. (Make sure you use the Add
cations. It contains the customized settings or Remove Programs feature in the Control
you put into place, such as mouse speed and Panel to remove the software.) If the prob-
the display settings, as well as instructions lem no longer occurs when rebooting, you
as to which programs should be loaded first. have determined the cause of the problem
Why do I sometimes need to enter a and can reinstall the device or software. If
login name and password at the end the problem does not go away, the first option
of the boot process? In a networked is to restart your computer in Safe mode.
environment, such as that found at most What is Safe mode? Sometimes
colleges, the operating system serves many Windows does not boot properly, and you
users. To determine whether a user is au- end up with a screen that says “Safe Mode”
thorized to use the system (for example, in the corners, as shown in Figure 5.14.
whether a user is a valid student or college (Alternatively, you can boot directly into
employee), authorized users are given a Safe mode by pressing the F8 key during the
login name and password. The verification boot process before the Windows logo
of your login name and password is called appears.) Safe mode is a special diagnostic
authentication. The authentication process mode designed for troubleshooting errors.
blocks unauthorized users from entering When the system is in Safe mode, only
the system. essential devices—such as the mouse, key- Figure 5.14
On your home computer, you also may board, and monitor—function. Even the If there is an error in the
need to input a password to log in to your regular graphics device driver will not boot process, your system
user account on your computer after your be activated in Safe mode. Instead, the might boot into Safe
computer has completely booted up. Even in system runs in the most basic graphics mode. Safe mode offers
functionality that is limited
a home environment, all users with access to mode, eliminating any screen images and but sufficient to allow you
a Windows computer (such as family mem- nonessential icons and resulting in a neutral to perform diagnostic
bers or roommates) can have their own user testing.
accounts. Users can set up a password to
protect their account from being accessed by
another user without permission. For more
information on selecting a good password,
see Chapter 9.
How do I know if the boot process
is successful? The entire boot process
takes only a minute or two to complete. If Desktop wallpaper
the entire system is checked out and loaded image missing
properly, the process completes by display-
ing the restored screen image. The computer
system is now ready to accept your first
Icons not in
command. their usual spot
on the desktop
Recycle Sticky
The Desktop
Notes and Windows
Features
The desktop is the first inter-
Documents action you have with the op-
erating system and the first
Gadgets image you see on your moni-
Computer
tor. As its name implies, your
computer’s desktop puts at
your fingertips all of the ele-
All Programs
ments necessary for a pro-
ductive work session. They
Taskbar are items that are typically
found on or near the top of a
traditional desk, such as files
and folders.
What are the main features of the
b
Windows desktop and Start
menu? The very nature of a desktop is
that it lets you customize it to meet your in-
dividual needs. As such, the desktop on
your computer may be different from the
“Ghost images”
of other open desktop on your friend’s computer, or even
windows from the desktop of another account user on
the same computer. In recent versions of
Hover over icon Windows, many features that were once
to display
thumbnails of
only found on the desktop have moved to
open windows Hover over
the Start menu, including access to docu-
thumbnail to ments, programs, and computer drives and
display full devices. You can always create shortcuts on
size image
your desktop to these features if you find
that’s more convenient (see Figure 5.15).
224 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
On the desktop you’ll find: folder with subfolders, similar to the
way a traditional filing system is
• Recycle Bin: Location for deleted files
organized.
and folders from the C: drive only.
Deleted files from other locations, such • Computer: Provides easy access to
as your flash drive, do not go to the disk drives and system and network
Recycle Bin; instead, they are perma- devices.
nently deleted. Deleted files in the Recy- • All Programs: In the Start menu, this
cle Bin can be recovered easily before provides access to all programs avail-
the Recycle Bin is emptied. able in the system. To prevent taking
• Gadgets: A gadget is an easy-to-use up valuable screen space, a limited
miniprogram that gives you information number of programs displays. Use
at a glance or quick access to frequently the scrollbar to gain access to programs
used tools including weather informa- not immediately visible. Instant
tion, calendar items, calculators, games, Search can facilitate locating a
photo albums, and system tools. Sticky program.
Notes, in Windows 7, are not a gadget, How does the Mac desktop
but are a convenient accessory that compare with Windows? Although
you can use to jot down notes to yourself. the Mac OS X and the Windows operating
• Taskbar: Displays open and favorite systems are not compatible, they are
applications for easy access. You can extremely similar in terms of functionality.
point to an icon to preview windows As illustrated in Figure 5.16, both
of open files or programs, or move your Windows and Mac operating systems use
mouse over a thumbnail to preview a windows (rectangular boxes that contain
full-screen image. Or right-click an icon programs displayed on the screen), menus
to view a Jump List—the most recently (lists of commands that appear on the
or commonly used files for that screen), and icons (pictures that represent an
application. Finally, you can hover object such as a software application or a file
your mouse over a Taskbar icon to or folder).
display thumbnails of open windows, They both also have streamlined
and then you can hover over a mechanisms to access commonly used
thumbnail to display the contents of applications. Macs feature a Dock and a
that window at full size (all other Dashboard with widgets. A widget is a
apps are temporarily hidden from view). mini-application that enables quick access
to frequently used tools and activities (such
In the Windows 7 Start menu, you’ll find: as stock prices, to-do lists, and games).
The latest version of Windows has a Figure 5.16
• Documents: A convenient organiza-
taskbar with Dock-like capabilities and Although not compatible
tional tool that enables you to keep all
gadgets that provide functionality similar with each other, the
your documents in one place. You can Windows OS and the
to that of the Mac
further organize your Documents Mac OS have many
Widgets (Mac)/ widgets.
similar features.
Gadgets (Windows)
Files
Icons
Windows
Access to
applications
226 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
while holding down the left mouse button, BITS
drag the window to a different location. To AND Upgrading Your Operating System
resize a window, place your mouse pointer BYTES
over any side or corner of a window until it
changes to a double-headed arrow [D]. You If you have had your computer for a year or two, you may be faced with the decision
can then left-click and drag the window to of whether to upgrade to the newest release version of your operating system (such
the new desired size. Aero Shake is a feature as going from Windows Vista to Windows 7). Here are a few key things to consider
that allows you to grab a window by its title before taking the plunge:
bar and “shake” it to minimize all other • Are there significant features in the new version that will make your life
windows. easier? If the only features the new version offers are ones you don’t need,
why bother upgrading?
• Will your hardware work with the new OS? Check the minimum operating
requirements (required RAM, processor speed, hard drive space, etc.) of the
Organizing Your new version to ensure that your computer can handle the workload of the new
Computer: File software. You will also need to make sure drivers for the new OS are available
for all your hardware devices and peripherals to ensure they will work properly
Management with the new OS. Microsoft has made this easy with Windows Upgrade Advisor.
So far you have learned that the operating The Upgrade Advisor scans your hardware, devices, and installed programs for
system is responsible for managing the compatibility, advises you on how to resolve any issues found, and recommends
processor, memory, storage, and devices, what you should do before upgrading.
and that it provides a mechanism whereby • Is your application software compatible with the new version of the OS?
applications and users can interact with the Usually, application software works fine with a new version of an OS. Some-
computer system. An additional function of times it doesn’t. Check with the software vendors regarding compatibility, espe-
cially if you’re upgrading to a 64-bit system. Windows 7 has a compatibility
an operating system is to enable file man-
feature that allows you to run your software in an earlier version of the operat-
agement, which entails providing organiza- ing system if it is not compatible with Windows 7.
tional structure to the computer’s contents.
• Is your current operating system still supported? When it deploys
The OS allows you to organize the contents new versions of operating systems, the company may stop supporting older
of your computer in a hierarchical directory versions. If your version will not be supported, it’s best to upgrade to a newer
structure that includes files, folders, version.
libraries, and drives. In this section, we Before starting the upgrade, you should back up all your data files so you won’t
discuss how you can use this hierarchical lose anything accidentally during the upgrading process. Backup and Restore in
structure to make your computer more Windows 7 makes this job less of a hassle.
organized and efficient.
228 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Viewing and Sorting Files and Folders Sort files and folders
Figure 5.20
by clicking the headers Details view enables you
Are there different ways I can view to sort and list your files in
and sort my files and folders? When a variety of ways to en-
you open any folder in Windows, the tool- able quick access to the
bar at the top displays a Views button. correct file.
Clicking on the Views button offers you dif-
ferent ways to view the folders and files,
which are discussed in more detail below. In
some views, the folders are displayed as
Live Icons, which is a feature that began in
Windows Vista. Live Icons allows you to
preview the actual contents of a specific file
or folder without actually opening the file.
Live Icons can be displayed in a variety
of views.
• Tiles view: Displays files and folders as
icons in list form. Each icon represents
the application associated with the file,
and also includes the name and the size
picture files, or for PowerPoint presenta-
of the file, though the display informa-
tions, because the title slide of the
tion is customizable to include other
presentation will display, making it
data. The Tiles view also displays pic-
easier for you to distinguish among
ture dimensions, a handy feature for
presentations. You may use the scale
Web page developers.
feature to adjust the size of the icons
• Details view: The most interactive view. further. Additionally, a preview pane is Figure 5.21
Files and folders are displayed in list available in this view. It allows you to The Large Icons view is an
form, and the additional file information view the first page of the selected especially good way to
is displayed in columns alongside the document without having to open it display the contents of
name of the file. You can sort and dis- completely (see Figure 5.21). files and folders. The
play the contents of the folder by any of preview pane on the right
For those folders that contain collections enables you to see the
the column headings, so you can sort
of MP3 files, you can download the cover first page of your
the contents alphabetically by name or document without first
of the CD or an image of the artist to display
type, or hierarchically by date last modi- opening it.
on any folder to identify that collection
fied or by file size (see Figure 5.20). >To access Large Icons
further.
• List view: Another display of icons and What’s the best way to search for view, from the command
names that are even smaller than in Tiles bar in any folder dialog
a file? You’ve no doubt saved a file and box, click the Views
view. This is a good view if you have a forgotten where you saved it, or have down- arrow, and then select
lot of content in the folder and need to loaded a file from the Internet and then were Large Icons view. To
see most or all of it at once. not sure where it was saved. What’s the access the Preview Pane,
• Small and Medium Icons views: These click Organize, select
quickest way to find a file? Looking through
Layout, and then Preview
views also display files and folders as every file stored on your computer could Pane.
icons in list form, but the icons are
either small- or medium-sized, respec-
Preview Pane
tively. Additional file information dis- Folders with live allows viewing
plays in a ScreenTip (the text that preview of contents without opening file
.rtf Text (Rich Text Format) Any program that can read text documents
.htm or .html HyperText Markup Language for a Web page Any program that can read HTML
.jpg Joint Photographic Experts Group (JPEG) image Most programs capable of displaying images
.gif Graphics Interchange Format (GIF) image Most programs capable of displaying images
230 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Figure 5.23, when you save a file created in
Figure 5.24 FILE NAMING CONVENTIONS
most applications running under the Win-
dows operating system, you do not need to Mac OS Windows
add the extension to the file name; by de- File and folder name As many as 255 characters* As many as 255 characters
fault, it is added automatically for you. Mac length
and Linux operating systems do not require
file extensions. This is because the informa- Case sensitive? Yes No
tion as to the type of application the com- Forbidden characters Colon (:) ” / \ * ? <> | :
puter should use to open the file is stored
inside the file itself. However, if you’re File extensions needed? No Yes
using these operating systems and will be Path separator Colon (:) \
sending files to Windows users, you should
add an extension to your file name so that *Note: Although Mac OS X supports file names with as many as 255 characters, many applications
Windows can more easily open your files. running on OS X still support only file names with a maximum of 31 characters.
You may need to know the extension of files
created in any of the Office 2007 or 2010 ap-
plications because they have a different file
format than the earlier version. The new rules, which are listed in Figure 5.24.
versions of Office have an x at the end of the Beyond those conventions, it’s important
extension to represent the XLM file format. that you name your files so that you can
For example, files saved in Word 2010 have easily identify them. A file name such as
a .docx file extension, whereas files save in “research.docx” may be descriptive to you
Word 2003 have a .doc file extension. A file if you’re only working on one research
created in Office 2007 or 2010 cannot be read paper. However, if you create other
with an earlier version of Office unless it is research reports later and need to identify
converted or saved in the earlier format. the contents of these files quickly, you’ll
Are there things I shouldn’t do soon wish you had been more descriptive.
when naming my files? Each operating Giving your files names that are more
system has its own naming conventions, or descriptive, such as bioresearch.docx or,
better yet, bio101research.docx, is a
good idea.
Keep in mind, however, that all files must
be uniquely identified, unless they are saved
in different folders or in different locations.
Therefore, although files may share the same
file name (such as “bioreport.docx” or
“bioreport.xlsx”) or share the same exten-
sion (“bioreport.xlsx” or “budget.xlsx”), no
two files stored on the same device and
folder can share both the same file name and
Type file name the same extension.
How can I tell where my files are
saved? When you save a file for the first
time, you give the file a name and designate
where you want to save it. For easy refer-
ence, the operating system includes default
folders where files are saved unless you
specify otherwise. In Windows, the default
folders are “Documents” for files, “Down-
Change file type
loads” for files downloaded from the
Internet, “Music” for audio files, “Pictures”
Figure 5.23 for graphic files, and “Videos” for video
When you save a file in Microsoft Word 2010, you can files. Although you can create your own
select in what format you would like the file to be folders, these default folders are the begin-
saved, such as a format compatible with Word 97-2003. ning of a well-organized system.
>The Save As features are displayed by selecting the You can determine the location of a file by
File tab and then selecting Save As. its file path. The file path starts with the
232 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
frequent updating that they offered as BITS
stand-alone programs or as Web-based serv- AND A File Type for Everyone
ices. Sometimes utility programs, such as BYTES
Norton SystemWorks, are offered as soft-
ware suites, bundled with other useful Imagine you are sending an e-mail to a diverse group of individuals. You are not sure
maintenance and performance-boosting util- what word processing software each of them uses, but you assume that there will be
ities. Still other utilities, like Lavasoft’s Ad- a mix of people who use Word, WordPerfect, and even Writer. How can you be sure
Aware, are offered as freeware or shareware that all users will be able to open the attachment regardless of the program installed
programs and are available as downloads on their computers? Save the file in Rich Text Format (.rtf), Portable Document Format
from the Web. (.pdf), or Text (.txt) format. Rich Text and Text files can be read by any modern word
Figure 5.27 illustrates some of the various processing program, although some formatting may be lost when a document is
types of utility programs available within saved in Text (.txt) format. Anyone can read a PDF file by downloading the Acrobat
the Windows operating system as well as Reader from the Adobe Web site (adobe.com). To save files as RTF, PDF, or TXT files,
those available as stand-alone programs. In simply change the file type when saving your file. In Microsoft Word, for example, you
general, the basic utilities designed to man- can select the file type in the Save As menu shown in Figure 5.26.
age and tune the computer hardware are
incorporated in the operating system. The
stand-alone utility programs typically offer
more features or an easier user interface for
backup, security, diagnostic, or recovery
functions.
In this section, we explore many of the
Change
utility programs you’ll find installed on a file type
Windows 7 operating system. Unless other-
wise noted, you can find these utilities in the
Control Panel or on the Start menu by select-
ing All Programs, Accessories, and then
System Tools. (We also take a brief look at
some Mac utilities.) We will discuss
antivirus and personal firewall utility
Choose appropriate
programs in Chapter 9. file type
Display Utilities
How can I change the appearance of Figure 5.26
my desktop? Personalization, found in By changing a word processing file’s type to PDF, RTF, or TXT (plain text),
Appearance and Personalization on the you can ensure that everyone can read your file, no matter which word
processing program they use.
Control Panel or by right-clicking any area
on the desktop and selecting Personalize,
has all the features you need to change the
appearance of your desktop. It provides dif-
automatically runs a wizard (a step-by-step
ferent options for the desktop background,
guide) that walks you through the
screen savers, and window colors. Although
installation process. If a wizard does not start
Windows comes with many different back-
automatically, you should go to the Pro-
ground themes and screen saver options
grams and Features utility found in the
preinstalled, hundreds of downloadable op-
Programs folder in the Control Panel. This
tions are available on the Web. Just search
prompts the operating system to look for the
for “backgrounds” or “screen savers” on
setup program of the new software and
your favorite search engine to customize
starts the installation wizard.
your desktop.
What is the correct way to
remove unwanted programs from
my system? Some people think that
The Programs and Features Utility deleting a program from the Program
What is the correct way to add new Files folder on the C drive is the best way
programs to the system? When you to remove a program from the system.
install a new program, usually the program However, most programs include support
Backup and Disk Imaging Acronis True Image, Norton Ghost, SkyDrive Backs up important information and makes a complete mirror
image of your current computer setup
Disk Cleanup McAfee Total Protection Removes unnecessary files from hard drive
Disk Defragmenter Norton Utilities, iDefrag (for OS X) Arranges files on hard drive in sequential order
Error-checking (previously ScanDisk) Checks hard drive for unnecessary or damaged files
System Restore FarStone Snapshot, Acronis Backup and Restores system to a previous, stable state
Security, Norton Ghost
Task Manager and Resource Monitor Displays performance measures for processes; provides
information on programs and processes running on computer
234 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
placeholder are cataloged
a
and stored temporarily
in a separate file called
the dictionary. For example,
in the following sentence, you
can easily see the repeated
patterns of letters.
The rain in Spain falls
mainly on the plain.
Although this example
contains obvious repeated pat-
terns (ain and the), in a large
document the repeated pat-
terns may be more com-
plex. The compression
b Compression
program’s algorithm reduces file size
(a set of instructions from 1935 KB to
designed to complete a 1453 KB
solution in a step-by-step man-
ner) therefore runs through the file several
Figure 5.28
times to determine the optimal repeated to decompress the file as well (see
patterns to use to obtain the greatest Figure 5.29). (a) File compression is
a built-in utility of the
compression.
Windows operating
How effective are file compression system. (b) Compressing
programs? The effectiveness of file the PowerPoint document
compression—that is, how much a file’s
System Maintenance Utilities reduced the file size from
size is reduced—depends on several factors, Are there any utilities that make my 1,935 KB to 1,453 KB.
including the type and size of the individ- system work faster? Disk Cleanup is >To access the Windows
ual file and the compression method used. a Windows utility that cleans, or removes, file compression utility,
right-click the file or folder
Current compression programs can reduce unnecessary files from your hard drive.
that is to be compressed,
text files by 50 percent or more, depending These include files that have accumulated in select Send to from the
on the file. However, some files, such as the Recycle Bin as well as temporary files, shortcut menu, and then
PDF files, already contain a form of com- which are files created by Windows to store select Compressed
pression, so they do not need to be com- data temporarily when a program is run- (zipped) Folder.
pressed further. Other file types, especially ning. Windows usually deletes these tempo-
some graphics and audio formats, have rary files when you exit the program, but
gone through a compression process that sometimes it forgets to do this, or doesn’t
reduces file size by permanently discarding have time because your system freezes up or
data. For example, image files such as incurs a problem that prevents you from
Joint Photographic Experts Group ( JPEG), properly exiting a program. Disk Cleanup,
Graphics Interchange Format (GIF), and found by clicking the Start button, then se-
Portable Network Graphics (PNG) files lecting All Programs, Accessories folder, and
discard small variations in color that the then the System Tools folder, also removes
human eye may not pick up. Likewise, temporary Internet files (Web pages stored
MP3 files permanently discard sounds that on your hard drive for quick viewing) as
the human ear cannot hear. These graphic well as offline Web pages (pages stored
and audio files do not need further on your computer so you can view them
compression. without being connected to the Internet).
How do I decompress a file I’ve If not deleted periodically, these unneces-
compressed? When you want to sary files can hinder efficient operating
restore the file to its original state, you performance.
need to decompress the file so that the How can I control which files Disk
pieces of file that the compression process Cleanup deletes? When you run Disk
temporarily removed are restored to the Cleanup, the program scans your hard drive
document. Generally, the program you to determine which folders have files that
used to compress the file has the capability can be deleted and calculates the amount of
236 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
you want to diagnose, select Properties, BITS
and select Tools. On Macs, you can use the AND Making Tech Support Easier
Disk Utility to test and repair disks. You BYTES
will find Disk Utility in the Utilities folder
in the Applications folder on your Have you ever been frustrated trying to clearly and accurately describe your prob-
hard drive. lem or an error message you have received to a technical support person? Have
How can I check on a program that you had trouble remembering the steps you took to encounter a problem? Or, are
has stopped running? If a program has you on the other side, trying to help via the phone a friend or family member with
stopped working, you can use the Windows their problems? If so, Windows 7 has a cool new feature called Problem Steps
Task Manager utility to check on the pro- Recorder that you can use to capture all your mouse clicks and keystrokes. In ad-
gram or to exit the nonresponsive program. dition to capturing the clicks and keystrokes you make to reproduce the problem
Although you can access Task Manager or error, the Problem Steps Recorder provides screen shots of your actions. The
from the Control Panel, it is more easily captured data is stored in a zipped file. You can then send the zipped file to your
accessible by pressing Ctrl + Alt and then technical support person.
the Delete key or by right-clicking an empty To start Problem Steps Recorder, click Start, type psr.exe in the search box, and
space on the taskbar at the bottom of your press Enter. When Problem Steps Recorder displays, click the Start Record button and
screen. The Applications tab of Task Man- continue the steps to reproduce the problem or error. You can add comments as you
ager lists all programs that you are using go. The end result is a slideshow of all your actions, along with descriptions (in regu-
and indicates whether they are working lar English—not code) of what you did.
properly (running) or have stopped
improperly (not responding). You can
terminate programs that are not respond-
ing by clicking the End Task button in the
dialog box.
If you need outside assistance because of Figure 5.31
a program error, Dr. Watson for Windows, a The Problem Steps Recorder captures the clicks and keystrokes
tool that is included in Microsoft Windows you make to reproduce a problem or error.
XP, and Problem Reports and Solutions, a
tool in Windows Vista and Windows 7,
gather information about the computer
when there is a program error. When an you try to start the application, the sys-
error occurs, these tools automatically tem freezes once again. You uninstall the
create and save a log. The log can then be new program, but your computer contin-
viewed, printed, or delivered electronically ues to freeze after rebooting. What can
to any technical support professional, you do now?
who can then use this information to help The most recent versions of Windows
diagnose the problem. have a utility called System Restore
that lets you roll your system settings
back to a specific date when everything
System Restore and was working properly. A system restore
point, which is a snapshot of your entire
Backup Utilities system’s settings, is made every week
Is there an undo command for the and prior to certain events, such as
system? Say you have just installed a installing or updating software. You
new software program and your computer also can create a custom restore point
freezes. After rebooting the computer, when manually. Should problems occur, if the
computer was running just fine before
you installed new software or a hard-
ACTIVE ware device, you could restore your
Using Utility computer to the settings that were in
HELP-
DESK Programs effect before the software or hardware
installation. System Restore does not
In this Active Helpdesk call, you’ll play the role of a affect your personal data files (such as
helpdesk staffer, fielding calls about the utility pro- Microsoft Word documents, browsing
grams included in system software and what these history, or e-mail), so you won’t lose
programs do. changes made to these files when you
use System Restore.
To understand how disk defragmenter utilities work, you must first saved. In that case, the system writes the added part of the file to the
understand the basics of how a hard disk drive stores files. A hard disk next available location on the disk, and a reference is made in the table
drive is composed of several platters, or round, thin plates of metal, that as to the location of this file fragment. Over time, as files are saved,
are covered with a special magnetic coating that records the data. The deleted, and modified, the bits of information for various files fall out of
platters are about 3.5 inches in diameter and are stacked onto a spin- sequential order and the disk becomes fragmented.
dle. There are usually two or three platters in any hard disk drive, with Disk fragmentation is a problem because the operating system is not
data stored on one or both sides. Data is recorded on hard disks in con- as efficient when a disk is fragmented. It takes longer to locate a whole
centric circles called tracks. Each track is further broken down into pie- file because more of the disk must be searched for the various pieces,
shaped wedges, each called a sector (see Figure 5.32). The data is greatly slowing down the performance of your computer.
further identified by clusters, which are the smallest segments within How can you make the files line up more efficiently on the disk? At
the sectors. this stage, the disk defragmenter utility enters the picture. The defrag-
When you want to save (or write) a file, the bits that make up your menter tool takes the hard drive through a defragmentation process in
file are recorded onto one or more clusters of the drive. To keep track of which pieces of files that are scattered over the disk are placed together
which clusters hold which files, the drive also stores an index of all sec- and arranged sequentially on the hard disk. Also, any unused portions of
tor numbers in a table. To save a file, the computer will look in the table clusters that were too small to save data in before are grouped, increas-
for clusters that are not already being used. It will then record the file in- ing the available storage space on the disk. Figure 5.33 shows before
formation on those clusters. When you open (or read) a file, the and after shots of a fragmented disk that has gone through the defrag-
computer searches through the table for the clusters that hold the mentation process.
desired file and reads that file. Similarly, when you delete a file, you For more about hard disks and defragmenting, be sure to check out
are actually not deleting the file itself, but rather the reference in the Sound Byte “Hard Disk Anatomy Interactive.”
the table to the file.
How does a disk become fragmented? When only part of an older
file is deleted, the deleted section of the file creates a gap in the sector Fragmented files
on disk
of the disk where the data was originally stored. In the same way, when
new information is added to an older file, there may not be space to
save the new information sequentially near where the file was originally Defragmented
files on disk
Track
Sector
Cluster
How does the computer remember also can create and name your own restore
its previous settings? Every time points at any time. Creating a restore
you start your computer or install a new point is a good idea before making changes
application or driver, Windows automati- to your computer such as installing hard-
cally creates a system restore point. You ware or software. If something goes wrong
238 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
with the installation process,
Windows can reset your system
to the restore point. As shown in
Figure 5.34, Windows includes a
Restore Point Wizard that walks
you through the process of setting
restore points.
How can I protect my data in
the event something malfunc-
tions in my system? When you
use the Windows Backup and
Restore utility (found in the Control
Panel), you can create a duplicate
copy of all the data on your hard
drive (or just the folders and files
you specify) and copy it to another
storage device, such as a DVD or
external hard drive. A backup copy
protects your data in the event your hard
drive fails or files are accidentally erased.
Although you may not need to back up
every file on your computer, you should
back up the files that are most important
to you and keep the backup copy in a safe
location. Mac OS X Snow Leopard includes Figure 5.34
a backup utility called Time Machine that Windows 7 and it won’t reformat your Setting a restore point is
will automatically back up your files to computer; it’s just a means to get to the good practice before
a specified location. Apple also offers installing any hardware
recovery tools that are incorporated into or software.
backup hardware called Time Capsules, Windows. Sometimes your computer
which are wireless devices designed to >The Restore Point Wizard
comes with these repair discs, but often is found by clicking Start,
work with Time Machine and record your they do not. If you do not have a system All Programs, Acces-
backup data. Because Time Machine makes repair disc, you should create one before sories, System Tools. In
a complete image copy of your system, it problems arise. With Windows 7, it is easy the System Tools folder,
can also be used to recover your system in to create a system repair disc. Insert a click System Restore. The
the case of a fatal error. (For more System Restore wizard
blank disc into the DVD drive, click Start, appears, with Restore
information on backing up your files, see and type “System Repair” in the Search Point shown on the first
Chapter 9.) box. Then, click on Create a System Repair page of the Wizard.
If you encounter a non-recoverable Disc, make sure the appropriate drive is
error on a Windows machine that System showing, and click Create disc.
Restore cannot repair, you can recover
Windows from a system repair disc. A sys-
tem repair disc is designed to fix problems
with Windows 7. It will let you boot up
The Task Scheduler Utility
Windows, and then give you options for How can I remember to perform all
repairing your system. It won’t reinstall these maintenance procedures? To
keep your computer system in top shape,
it is important to run some of the utilities
described previously on a routine basis.
SOUND Hard Disk Anatomy Depending on your usage, you may want
BYTE Interactive to defrag your hard drive or clean out tem-
porary Internet files periodically. However,
In this Sound Byte, you’ll watch a series of animations many computer users forget to initiate these
that show various aspects of a hard drive, including tasks. Luckily, the Windows Task Scheduler
the anatomy of a hard drive, how a computer reads utility, shown in Figure 5.35, allows you to
and writes data to a hard drive, and the fragmenting schedule tasks to run automatically at pre-
and defragmenting of a hard drive. determined times, with no additional action
necessary on your part.
240 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
• On-Screen Keyboard: Displays a BITS
keyboard on the screen. You type by AND Need a System Software Update?
clicking on or hovering over the keys BYTES
with a pointing device (mouse or
trackball) or joystick. This utility, which Bugs, or problems, in software occur all the time. Software developers are constantly
is similar to the Narrator, is not meant testing their products, even after releasing the software to the retail market, and as
for everyday use for individuals with users report errors they find. Windows Update is Microsoft’s service (utility) for updat-
severe disabilities. A separate program ing operating system software. Windows Update automatically notifies Windows
with more functionality is better in those users when updates are available for download. Mac users can update their system
circumstances. with Software Update, found under System Preferences.
• Windows Speech Recognition: An
effective tool that allows you to dictate
text and control your computer by
voice. The Speech Recognition utility is meet your needs. As long as you keep the
in the Ease of Access folder. operating system updated and regularly
Whether you use Windows, OS X, use the available utilities to fine-tune your
Linux, or another operating system, a fully system, you should experience little
featured operating system is available to trouble from your OS.
Magnifier window
On-screen keyboard
Figure 5.36
Microsoft Windows includes an Ease of Access Center to help users with disabilities. It has handy
accessibility features such as a magnifier and an on-screen keyboard.
>The Ease of Access Center is found by clicking Start, All Programs, Accessories, Ease of Access.
1. What software is included in system user interface (GUI). Unlike the command-
software? and menu-driven interfaces used earlier,
System software is the set of software pro- GUIs display graphics and use the point-
and-click technology of the mouse and cur-
summary
242 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
summary five five
chapter
which software applications refer. These 9. How does the operating system help
blocks of code are called application program- me keep my computer organized?
ming interfaces (APIs). The OS allows you to organize the contents
summary
of your computer in a hierarchical structure
7. How does the operating system help of directories that includes files, folders,
libraries, and drives. Windows Explorer
the computer start up?
helps you manage your files and folders by
When you start your computer, it runs showing the location and contents of every
through a special process called the boot drive, folder, and file on your computer.
process. The boot process consists of four Creating folders is the key to organizing
basic steps: (1) The basic input/output sys- files because folders keep related documents
tem (BIOS) is activated when the user pow- together. Following naming conventions
ers on the CPU. (2) In the POST check, the and using proper file extensions are also
BIOS verifies that all attached devices are in important aspects of file management.
place. (3) The operating system is loaded
into RAM. (4) Configuration and customiza-
tion settings are checked. 10. What utility programs are included
in system software, and what do
8. What are the main desktop and they do?
windows features? Some utility programs are incorporated
into the OS; others are sold as stand-alone
The desktop provides your first interaction
off-the-shelf programs. Common Windows
with the OS and is the first image you see on
utilities include those that enable you to
your monitor once the system has booted
adjust your display, add or remove pro-
up. It provides you with access to your com-
grams, compress files, defragment your
puter’s files, folders, and commonly used
hard drive, clean unnecessary files off
tools and applications. Windows are the rec-
your system, check for lost files and errors,
tangular panes on your screen that display
restore your system to an earlier setting,
applications running on your system. Com-
back up your files, schedule automatic
mon features of windows include toolbars,
tasks, and check on programs that have
scrollbars, and minimize, maximize and
stopped running.
restore, and close buttons.
243
five
five key terms
chapter
application programming interface (API) ...... 220 operating system (OS)........................................ 208
application software ........................................... 208 paging.................................................................... 219
authentication ...................................................... 223 path separator ...................................................... 232
key terms
244 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
buzzwords five five
chapter
Word Bank
• Disk Defragmenter • Linux • Task Scheduler
• Error-checking • Mac OS • tracks
buzzwords
• file compression • platform • utility programs
• file management • system files • Windows
• files • system software • Windows Explorer
• folders • Task Manager • Windows 7
Instructions: Fill in the blanks using the words from the Word Bank above.
Veena was looking into buying a new computer and was trying to decide what
(1) __________ to buy—a PC or a Mac. She had used PCs all her life, so she was more
familiar with the (2) __________ operating system. Still, she liked the way the
(3) __________ looked and was considering switching. Her brother didn’t like either
operating system, so he used (4) __________, a free operating system instead.
After a little research, Veena decided to buy a PC. With it, she got the most recent version
of Windows, (5) __________. She vowed that with this computer, she’d practice better
(6) __________ because she often had a hard time finding files on her old computer. To
view all of the folders on her computer, she opened (7) __________. She made sure that
she gave descriptive names to her (8) __________ and placed them in organized
(9) __________ and libraries.
Veena also decided that with her new computer, she’d pay more attention to the
(10) __________, those little special-function programs that help with maintenance and
repairs. These special-function programs, in addition to the OS, make up the (11) __________.
Veena looked into some of the more frequently used utilities. She thought it would be a
good idea to run the (12) __________ on her hard drive regularly so that all the files lined
up in sequentially ordered (13) __________ and so that it was more efficient. She also
looked into (14) __________ utilities, which would help her reduce the size of her files
when she sent them to others over the Internet. Finally, she decided to use the Windows
(15) __________ utility to schedule tasks automatically so that she wouldn’t forget.
becoming computer
literate
computer literate
Using key terms from the chapter, write a letter to your 14-year-old cousin who just
becoming
received her first computer, explaining the benefits of simple computer maintenance. First,
explain any symptoms her computer may be experiencing (such as a sluggish Internet
connection); then include a set of steps she can follow in setting up a regimen to remedy
each problem. Make sure you explain some of the system utilities described in this chapter,
including but not limited to Disk Defragmenter, Disk Cleanup, and Task Scheduler. Instruct
your cousin on how to create a system repair disc and how to back up her files. Include any
other utilities she might need, and explain why she should have them.
245
five
five self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. Only personal computers need some form of operating system software.
_____ 2. Symbian OS is a common OS for netbooks.
_____ 3. The type of processor helps to determine which OS a computer uses.
_____ 4. Paging is the process of optimizing RAM storage by borrowing hard drive space.
_____ 5. Windows 7 includes a compatibility feature that allows you to run software that is
not compatible with Windows 7.
246 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
making the
five five
chapter
transition to...
next semester
1. Organizing Your Files
transition to...
Despite all the good advice, you have not taken the time to organize your files on your
computer. Now you have to plow through all your files to find anything, taking up
valuable time. Use the Snipping Tool to show your current organization. Then, using
next semester
making the
the Hierarchy style of a SmartArt graphic, develop a plan that outlines how you’ll set
up libraries, folders, and subfolders for your files.
2. Deciding On a New Computer
Your parents are getting you a new computer. Decide whether you want a desktop,
notebook, or netbook and then describe how the choice may impact the operating
system you get.
a. Research the advantages of Windows, Mac, and Linux operating systems. Which
best fits your needs and why?
b. Research whether you can use multiple operating systems on a single machine.
Why might this be an important feature for you to consider?
c. Research how your smartphone and PMP would sync with the operating system.
d. Explain which system would be most useful to you.
247
five
five making the
chapter
transition to...
the workplace the workplace
making the
1. Time to Upgrade?
The small company you work for has been using Windows XP since it came out. The IT
transition to...
department decided not to upgrade to Vista, and because Windows XP is still working
well, they are not contemplating an upgrade to Windows 7. However, you have been
hearing lots of good things about Windows 7 and think it would be a good idea to
upgrade. Write a letter to the head of the IT department informing him or her of the
new features of Windows 7 and why they would be beneficial to have. Also, list the
things the IT department should consider before upgrading.
2. Top 5 Utility Programs
Create a list of the top five utilities every computer should have. For each utility, list
one that can be downloaded for free and one that can be purchased. Then, for each
recommendation, include a review of the utility that has been written in the past
6 months—make sure you document your sources. For each utility note whether
you would choose the free utility or the one you have to purchase, and include the
reasons why.
3. Accessibility Features
Windows offers a lot of great accessibility tools for those needing extra assistance.
The vice president for human resources at the company you work for has asked you
to research some stand-alone accessibility programs to determine what else, if
anything, is available. List software that is available to help those who have special
computing needs.
4. Working with More Than One OS
The company you work for, which uses all Windows computers, has just acquired two
other smaller companies, one that uses Macs and the other that uses Linux. Your boss,
the CIO of the company, needs to decide what to do with all the various computer
systems. You have been asked to provide information to your boss so that he can make
an informed decision.
a. What are the advantages and disadvantages of letting the acquired companies
continue using their current systems?
b. What are the advantages and disadvantages of converting all systems to one
common system?
As you research, consider factors such as technical support, training for a new system,
compatibility of files and calendars among all employees in the company, cost of new
hardware, stability of operating systems, needed frequency of upgrades, and software
compatibility.
248 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
critical thinking
five five
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Market Dominance
Microsoft and Apple are large corporations and have control of most of the operating
system markets. While there has been some innovative changes to each of their propri-
etary operating systems, does their size and market dominance prevent more innova-
tion? Why or why not? Linux, as an open source environment, is poised for greater
innovation. Why do you think the Linux operating system doesn’t have a greater
market share?
2. A Web-Based OS
Operating system interfaces have evolved from a text-based console format to the
current graphical user interface. Many believe the OS of the future will be on the cloud
(the Internet) and Web-based. Discuss the implications of this type of operating system.
What would be the advantages and disadvantages of a Web-based operating system?
249
five
five team time
chapter
Problem
team time
You are the owner of a technology consulting firm. Your current assignments include
advising several start-up clients on their technology requirements. The companies include
a fashion design company, a small financial planning company, and an IT networking firm.
The companies are holding off on buying anything until they hear from you as to the
platform on which their computers should run. Obviously, one of the critical decisions
for each company is the choice of operating system.
Task
Recommend the appropriate operating system for each company.
Process
1. Break up into teams that represent the three primary operating systems: Windows,
Mac, or Linux. (Additional teams could be assigned to consider smartphone operating
systems).
2. As a team, research the pros and cons of your operating system. What features does it
have that would benefit each company? What features does it not have that each com-
pany would need? Why (or why not) would your operating system be the appropriate
choice for each company? Why is your OS better (or worse) than either of the other
options?
3. Develop a presentation that states your position with regard to your operating
system. Your presentation should have a recommendation and include facts to
back it up.
4. As a class, decide which operating system would be the best choice for each
company.
Conclusion
Because the operating system is the most critical piece of software in the computer
system, the selection should not be taken lightly. The OS that is best for a fashion design
agency may not be best for a financial planning firm. An IT networking firm may have
different needs altogether. It is important to make sure you consider all aspects of the
work environment and the type of work that is being done to ensure a good fit.
250 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
ethics
five five
chapter
project
project
ethics
Ethics Project
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an
ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which an individual has been
accused of software piracy.
2. Team members should write a summary that provides background information for
their character—for example, representative of a software developer, public consumer
of the software, or arbitrator—and detail their character’s behaviors to set the stage for
the role-playing event. Then team members should create an outline to use during the
role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the collaboration feature of MyITLab, the discussion board feature of Blackboard,
or meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
251
TECHNOLOGY IN FOCUS
Computing Alternatives
In this Technology in Focus feature, we explore software
and hardware alternatives to working with a PC loaded up
with Microsoft products. The world of computing is much
broader than that, and many of the options we discuss are
less expensive and more flexible. Let’s get started by
looking at alternatives to Microsoft Office products.
252
Application Software common tools needed to communicate using
graphics and diagrams, and Math creates
Alternatives equations and formulas for your documents.
You won’t lose any compatibility with
Corporations such as Microsoft and Apple other software by using OpenOffice; it is
develop proprietary (or commercial) soft- compatible with most programs. This means
ware to be sold for a profit. Opponents of that if your friend uses Microsoft Office and
proprietary software contend that software you send her an OpenOffice file, she can still
should be developed without the profit mo- read it, and you can read all of her Microsoft
tive and that the source code (the actual lines Office files, too. OpenOffice 3 is able to open
of instructional code that make the program Microsoft Office 2007 or 2010 files without the
work) should be made available so that need for a conversion program. Although the
others may modify or improve the software. individual applications in OpenOffice are not
Open source software is freely distributed as fully featured as those in Microsoft Office,
(no royalties accrue to the creators), contains and do not have the ribbon interface found in
the source code, and can in turn be distrib- the newest versions of the Office applica-
uted to others. Therefore, you can download tions, OpenOffice is still a powerful produc-
open source software for free from various tivity software suite, and the price is right.
Web sites, install it on as many computers as One of the biggest advantages of an open
you wish, make changes to the source code if source package like OpenOffice is that an in-
you know how to do this, and redistribute it credible number of people continue to de-
to anyone you wish (as long as you don’t velop for it all the time. This means you have
charge for distributing it). In this section, we a huge library of extensions to select from.
look at some open source software that you These small programs install themselves into
can download and use on your computer. OpenOffice and give you additional func-
For a list of open source resources available tions. For example, one extension allows you
on the Web, visit sourceforge.net. to import and edit PDF files; another allows
Draw to easily create barcodes. The library of
PRODUCTIVITY SOFTWARE extensions includes many hundreds of items
with more being added all the time.
ALTERNATIVES: OPENOFFICE.ORG When you launch OpenOffice (see
As mentioned in Chapter 4, the Figure 1), you can choose a file type from the
OpenOffice.org suite (which we’ll refer to list displayed. Once you select the appropriate
as OpenOffice) is a free suite of productivity file type (such as spreadsheet, presentation,
software programs that provides functional-
ity similar to that of Microsoft Office.
Versions of OpenOffice are available for a
variety of operating systems, including
Windows, Linux, and Mac. Support is
offered in more than 100 languages besides
English, with more being added all the time
by the development community. You can
download the installation file you’ll need to
run OpenOffice at openoffice.org. The mini-
mum system requirements for installing
OpenOffice 3 in a Windows environment are
less than those required for Microsoft Office.
The main components of OpenOffice are
word processing (Writer), spreadsheet
(Calc), presentation (Impress), and database
(Base) programs. These provide functional-
ity similar to that of the Word, Excel,
PowerPoint, and Access applications you FIGURE 1
might be familiar with in Microsoft Office. Starting OpenOffice.org displays a list of file types from which you
The OpenOffice 3 suite also includes addi- can choose to begin working on your project.
tional programs. Draw provides the most
Calc
Once you open a Calc spreadsheet, you
enter text, numbers, and formulas into the
Formatting
tasks and icons appropriate cells, just as you would in
similar to Word Microsoft Excel. You also can apply a full
range of formatting options (font size, color,
style, and so on) to the cells, making it easy
to create files such as the monthly budget
spreadsheet shown in Figure 3. Built-in
formulas and functions simplify the job of
creating spreadsheets, and Calc’s Function
Wizard guides you through the wide range
of available functions, providing sugges-
tions as to which function to use.
When saving a document in Calc, the
default file format has an .ods extension.
FIGURE 2 You can also save files in other formats, such
Writer provides similar functionality and icons to Microsoft Word. as Excel (.xls and .xlsx) and Pocket Excel
(.pxl) for use on mobile devices. The Export
Directly as PDF icon is also available in Calc.
Impress
When you select Presentation from the
OpenOffice start-up interface, a wizard is
displayed that offers you the option of
creating a blank Impress presentation or
building one from supplied templates. The
number of templates shipped with Impress
is smaller than those supplied with
Microsoft PowerPoint. If you are interested
in more templates, be sure to install some of
the extensions available. In addition, you
can also search Google using the keywords
Insert Object toolbar
for creating charts
“OpenOffice.org Impress Templates.” You’ll
find a wide variety of templates for Impress
that others have created and that you can
download free of charge. During the
FIGURE 3 OpenOffice installation you have the option
of installing the Google search bar (Web or
Calc offers many of the same features as Microsoft Excel.
Desktop), making it easy to access while you
are working in any of the OpenOffice components you should download and
applications. install with MySQL are the Database Server
and the Query Browser (see Figure 4). You
Base use the Database Server to
If you want to create or just manipulate data- create tables for your data-
bases, Base enables you to create and modify base and enter your data. Build queries with
tables, forms, queries, and reports by using The Query Browser SQL syntax
wizards, design views, and SQL views. Base
is similar to Microsoft Access and SQL
Server, and it works seamlessly with files
created in most database applications,
although you will need a separate converter
to work with Microsoft Access 2007.
List of database
tables
DATABASE SOFTWARE
ALTERNATIVES: MYSQL
While Base, the OpenOffice database pro-
gram described above, is perfectly func-
Query results
tional, if you’re interested in getting your
hands on a free high-end SQL database ap-
plication, the most popular open source op-
tion is MySQL (mysql.com). Sporting many
of the features contained in SQL Server and
Oracle Database 11g, MySQL is a powerful FIGURE 4
database program you can use to develop
MySQL is a free open source database alternative to Microsoft Access.
serious database applications. The two main
Operating System
Alternatives FIGURE 6
picking up viruses and malware from public code that provides Linux’s basic functional-
computers. In addition, it enhances privacy, ity) and special modifications to the OS, and
because temporary Internet files are stored may also include additional open source
on the portable device on which the OS is software (such as OpenOffice). Which distro
installed, rather than on the hard drive of the is right for you?
public computer you are using. Lastly, many A good place to start researching distros
users of netbooks, the lightest, smallest is distrowatch.com. This site tracks Linux
category of notebook computers, have opted distros and provides helpful tips for begin-
to install Linux because it takes up less space ners on choosing one. Figure 8 lists some
on the hard drive and runs faster than the popular Linux distros and their home pages.
proprietary software that was installed Before you can decide which distro is
originally by the manufacturer. In the next right for you, there are a few things to con-
section, we explore the different varieties of sider. The overall requirements to run Linux
Linux and explain how to install them. are relatively modest:
• A 1.2 GHz processor
WHICH LINUX TO USE
• 256 MB RAM (light on graphics edition)
Linux is available for download in various up to 1 GB RAM (standard desktop
packages known as distributions, or edition)
distros. Think of distros as being like • 8 GB of hard drive space
different makes and models of cars. Distros
• VGA graphics card capable of 640 ⫻ 480
include the underlying Linux kernel (the
resolution
Just like any other software program,
FIGURE 8 Linux Distributions
however, Linux performs better with a faster
processor and more memory. Depending on
Distro Home Page how much additional software is deployed
in the distro you choose to use, your system
Debian GNU/Linux debian.org
requirements may be higher, and you may
Fedora Core (Red Hat) fedoraproject.org need more hard drive space. Check the
Gentoo Linux gentoo.org specific recommendations for the distro
you’re considering on that distro’s Web site.
Mandriva Linux mandriva.com
PCLinuxOS pclinuxos.com EXPERIMENTING WITH LINUX
Slackware Linux slackware.com
Some Linux distros (such as Ubuntu and
Ubuntu ubuntu.com PCLinuxOS) are designed to run from a
Utility Programs
Just like Windows, the Mac OS contains a
wide variety of utility programs to help
users maintain and evaluate their comput-
ers. In Macs, utility programs are located
in a folder named Utilities within the
Applications folder on the hard drive.
If you’re a Windows user, you know that
the Windows Task Manager utility can help
you determine how your system is perform-
ing. In Macs, a similar utility, shown in
FIGURE 15
Figure 16, is called the Activity Monitor.
It shows what programs (processes) are
Keeping the Mac OS up to date with the latest software fixes and patches greatly
decreases your chances of being inconvenienced by hackers.
currently running and how much memory
they’re using. The CPU, System Memory,
>From the Apple menu, choose System Preferences, and then click Software Update.
Disk Activity, Disk Usage, and Network
DO IT YOURSELF!
There is definitely satisfaction in doing a job
yourself, and building a computer is no dif-
ferent. Of course, building a computer isn’t
for everyone, but for those who enjoy work- CPU display
ing with their hands and don’t mind doing
some up-front research, it can be a reward-
FIGURE 16
ing experience.
Many Web sites can provide guidance for Similar to the Task Manager in Windows, the Activity Monitor analyzes the
building your own Windows-based performance of a Mac.
computer. Tom’s Hardware (tomshardware. >Go to the Utilities folder found in the Applications folder on your hard drive
com/reviews/build-your-own-pc,2601.html) and double-click Activity Monitor to open the utility.
is a good place to start. Just Google “How to
build your own computer” and you’ll find
plenty of online help and advice. To start,
you need a list of parts. Here’s what you’ll
typically need:
1. Case: Make sure the case you buy is an
ATX-style case, which accommodates
the newest motherboards, and that it
includes adequate cooling fans. You’ll
want to decide between a full tower
(about 24 inches tall) or a mid- or mini-
tower. Also, be sure there are enough
drive bays in the case to handle the
hard drive and any other peripheral
drives (CD/DVD, Blu-ray and so on)
you’ll be installing.
2. Motherboard: Make sure that the
motherboard you buy can accommo-
date the CPU you have chosen. Many
motherboards come with integrated FIGURE 17
sound, video, and network capabilities.
The System Profiler is similar to the Systems Properties dialog box in Windows and
These may work fine for you, but be reveals a wealth of information about the hardware and software in the computer.
sure to check that they meet your
>To launch System Profiler, from the Apple menu, click About this Mac, and then
needs. You may want to plug in higher- click the More Info button.
end graphics and sound cards. The
Advantages Disadvantages
You get exactly the configuration and features There is no technical support when things go
you want. wrong.
You have the option of using components other You’ll need to examine more complex technical
than those that are used in mass-produced specifications (such as which CPU works with the
computers. motherboard you want), which may overwhelm the
average computer user.
If you succeed, you will get a feeling of You will not necessarily save money.
satisfaction from a job well done.
Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms and concepts from
this Technology in Focus feature.
understanding and
assessing hardware:
evaluating your system
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. How can I determine whether I should upgrade my existing computer or buy a new
one? (pp. 268–272)
2. What does the CPU do, and how can I evaluate its performance? (pp. 272–276)
3. How does memory work in my computer, and how can I evaluate how much memory
I need? (pp. 276–279)
4. What are the computer’s main storage devices, and how can I evaluate whether they
match my needs? (pp. 279–286)
5. What components affect the output of video on my computer, and how can I evaluate
whether they match my needs? (pp. 286–290)
6. What components affect my computer’s sound quality, and how can I evaluate
whether they match my needs? (pp. 290–291)
7. How can I improve the reliability of my system? (pp. 291–294)
multimedia resources
multimedia
resources
Active Helpdesk
• Evaluating Your CPU and RAM (p. 278)
• Evaluating Computer System Components (p. 287)
Sound Bytes
• Using Windows 7 to Evaluate CPU Performance (p. 276)
• Memory Hierarchy Interactive (p. 278)
• Installing RAM (p. 279)
• CD, DVD, and Blu-ray Reading and Writing Interactive (p. 283)
• Installing a Blu-ray Drive (p. 285)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? It used to be that the case
for a desktop computer was just a boring rectangular box—but no longer! Consider
some of the new designs on the market. On the Phobos computer system by
BFG Technologies, the front of the case features a touch-panel LCD that
reports system performance parameters, controls music content, and presents a
summary of storage and memory usage. There is also an integrated iPod/iPhone
docking station on the top of the case. Or consider Falcon NorthWest,
which delivers custom paint jobs on its system cases—images from
its library, your own image, or even a screen from your favorite game.
The Thermaltake Level 10 wins for pure artistry. It isolates
all the major subsections—motherboard, power supply, hard
drives, optical drives—in a separate physical space. Each
section is hinged and can swing open for easy
access. Made of aluminum, the entire case
helps disperse heat . . . and looks cool
doing it!
267
Is It the Computer ing out what you want your ideal computer
to be able to do. You’ll then learn more about
or Me? important components of your computer—
After saving up for a computer, Natalie took its CPU, memory, storage devices, audio and
the leap a couple of years ago and bought a video devices, and ports—and how these
new desktop PC. Now she is wondering components affect your system. Along the
what to do. Her friends with newer comput- way, you’ll find worksheets to help you con-
ers are burning high-def Blu-ray movies duct a system evaluation, and multimedia
they’ve made, and they’re able to wirelessly Sound Bytes that will show you how to in-
connect their phones and synch up music stall various components in your system and
files. They seem to be able to do a hundred increase its reliability. You’ll also learn about
things at once without their computers the various utilities available to help speed
slowing down at all. up and clean up your system. If you don’t
Natalie’s computer can’t do any of these have a computer, this chapter will provide
things—or at least she doesn’t think it can. you with important information you will
Lately it seems to take longer to open files need about computer hardware to make an
and scroll through Web pages. Making mat- informed purchasing decision.
ters worse, her computer freezes often and Is now a good time to buy a new com-
takes a long time to reboot. Now she’s won- puter? There never seems to be a perfect
dering whether she should buy a new com- time to buy. It seems that if you can just wait
puter, but the thought of spending all that a year, computers will inevitably be faster
money again makes her think twice. As she and cost less. Is this actually true?
looks at ads for new computers, she realizes As it turns out, it is true. In fact, a rule of
she doesn’t know what such things as thumb often cited in the computer industry,
“CPU” and “RAM” really are, or how they called Moore’s Law, describes the pace at
affect her system. Meanwhile, she’s heard which CPUs (central processing units)—the
it’s possible to upgrade her computer, but small chips that can be thought of as the
the task seems daunting. How will she “brains” of the computer—improve. Named
know what she needs to do to upgrade, or for Gordon Moore, the cofounder of the
whether it’s even worth it? CPU chip manufacturer Intel, this rule pre-
Are you in the same situation? How well is dicts that the number of transistors inside a
your computer meeting your needs? Do you CPU will increase so fast that CPU capacity
ever wonder whether your computer is fine will double every 18 months. (The number
and you just need more training to get it to of transistors on a CPU chip helps determine
Figure 6.1
work smoothly? Is that true, or do you really how fast it can process data.)
Moore’s Law predicts that
need a more sophisticated computer system? As you can see in Figure 6.1, this rule of
CPUs will continue to get
faster. In this chapter, you’ll learn how to evaluate thumb has held true since 1970, when Moore
Source: Adapted from the
your computer system to determine whether first published his theory. Imagine finding a
Moore’s Law animated demo it is meeting your needs. You’ll start by figur- bank that would agree to treat your money
at Intel.com. in this way. If you put 10 cents in that kind
of savings account in 1965, you would have
Transistors
a balance of more than $100 million today!
10,000,000,000 Moore himself, however, has predicted that
AMD Opteon around the year 2020 CPU chips will be
1,000,000,000
Moore’s Law Intel i7 Processor manufactured in a different way, thus
changing or eliminating the effects of
Intel Pentium 4 Processor 100,000,000
Intel Pentium III Processor Moore’s Law altogether.
Intel Pentium II Processor 10,000,000 In addition to the CPU becoming faster,
Intel Pentium Processor other system components also continue to
Intel 486 Processor
1,000,000 improve dramatically. For example, the
Intel 386 Processor
capacity of memory chips such as dynamic
286
100,000 random access memory (DRAM)—the most
8086
common form of memory found in personal
8080 10,000 computers—increases about 60 percent
8008
4004
1,000 every year. Meanwhile, hard drives have
1970 1975 1980 1985 1990 1995 2000 2005 2010 been growing in storage capacity by some
Intel, Itanium, Pentium, etc. are registered trademarks of the Intel Corporation. 50 percent each year.
Entertainment Uses
Access the Internet
Play and record CDs and DVDs
Play and record Blu-ray discs
Record and edit digital videos
Record and edit digital music
Edit digital photos
Play graphics-intensive games
Transfer files wirelessly to mobile devices and other computers
Transfer files using flash memory cards
Upload media to social networking sites
Have your peripheral devices work easily and speedily with your computer
Purchase/rent music and videos from the Internet
Talk with friends and family with live video and audio
Use the computer to stream television and movies
Other
Educational Uses
Perform word processing tasks
Use educational software
Access library and newspaper archives
Create multimedia presentations
Create backups of all your files
Record notes with synchronized audio recordings
Other
Business Uses
Create spreadsheets and databases
Work on multiple software applications quickly and simultaneously
Conduct online banking, pay bills online, or prepare your taxes
Conduct online job searches or post résumés
Synchronize your mobile device (smartphone or portable media player)
with your computer
Conduct online meetings with video and audio
Organize business contacts and manage scheduling
Other
Notebooks Desktops
Portable—lightweight, thin Best value: more processing power, memory, and storage
capacity for lower price
Take up less physical space More difficult to steal, less susceptible to damage from
dropping or mishandling
Easier to ship or transport if the system needs repair Easier to expand and upgrade
Smaller video display (17 inches or smaller) Large monitors available (19 inches or larger)
Is the CPU usage value below 90% during most of my daily tasks?
*You can find these by checking the manufacturer’s specifications for your model of CPU.
Figure 6.16
Adding RAM to a
computer is quite simple
and relatively inexpensive. Fortunately, several storage options milliseconds—that’s less than one-hun-
exist within every computer system. dredth of a second—are typical. A DVD
Storage devices for a typical personal com- drive can take over 150 milliseconds to ac-
puter include the hard drive, USB flash cess data.
drives, optical drives, and external hard Solid state drives offer even faster access
drives. When you turn off your computer, times. A solid state drive (SSD) uses the
the data that has been written to these same kind of memory that flash drives
devices will be available the next time the use, but whereas flash drives have access
machine is powered on. These devices are times of about 1 ms, SSD drives can reach
therefore referred to as nonvolatile storage data in only a tenth of that time (around
devices. 0.1 ms). Because there are no spinning
platters or motors needed, SSDs run with
no noise, very little heat, and require
The Hard Drive very little power. As the storage capacities
What makes the hard drive the most for SSDs continue to increase and the
popular storage device? With storage prices for SSDs continue to drop, you’ll
capacities exceeding 2 terabytes (TB), a hard start to see them in a wide range of
drive has the largest storage capacity of any systems.
storage device. The hard drive is also a Figure 6.18 provides a listing of the vari-
much more economical device than other ous storage options and compares their
storage options, because it offers the most access times.
gigabytes of storage per dollar. Most system Another key performance specification
units are designed to support more than one for a hard drive is the speed at which it
internal hard drive. The Apple Mac Pro, can transfer data to other computer com-
shown in Figure 6.17, has room for four hard ponents (such as RAM). This speed of
drives. Each one simply slides into place transfer is referred to as data transfer rate.
when you want to upgrade. Depending on the manufacturer, the rate is
Another reason the hard drive is so useful expressed in either megabits or megabytes
for storage is that the hard drive’s access per second.
time, the time it takes a storage device to How is data stored on a hard
locate its stored data and make it available drive? A hard drive is composed of sev-
for processing, is faster than that of other eral coated round, thin plates of metal
permanent storage devices, like optical stacked on a spindle. Each plate is called a
drives. Hard drive access times are meas- platter. When data is saved to a hard drive
ured in milliseconds (ms), meaning thou- platter, a pattern of magnetized spots is
sandths of seconds. For large- capacity created on the iron oxide coating of each
drives, access times of approximately 12–13 platter. When the spots are aligned in one
direction, they represent a 1; when aligned To determine the storage capacity your
in the other direction, the represent a 0. system needs, calculate the amount of stor-
These 0s and 1s are bits (or binary digits) age required by all the types of files you will
and are the smallest pieces of data that com- be keeping on your system. If you have a
puters can understand. When data stored on large digital music library, that alone could
the hard drive platter is retrieved (or read), require 30 to 50 GB. Do you keep all of your
your computer translates these patterns of photographs on your hard drive? You may
magnetized spots into the data you have need another 40 GB or more for them. If you
saved. store digital video of television shows and
How do I know how much storage movies, that could easily be 100 to 200 GB
capacity I need? Typically, hard drive more, even higher if the videos are all high
capacity is measured in gigabytes (GB), al- definition. Of course, the operating system
though hard drives with capacity in the ter- also requires storage space. The demands on
abytes (TB) are now available. To check how system requirements have grown with new
much total capacity your hard drive has, as versions of operating systems. Windows 7,
well as how much is being used, click the the latest Microsoft operating system, can re-
Start button and select Computer from the quire up to 20 GB of available hard drive ca-
right side of the Start menu. Windows dis- pacity, depending on the configuration.
plays the hard drives, their capacity, and In addition to having space for the oper-
usage information, as seen in Figure 6.19. To ating system, you need enough space to
get a slightly more detailed view, select a store the software applications you use, such
drive; then right-click and choose Properties. as Microsoft Office, music, and games.
Hard drive 10
1
Flash drive 1
0.1
SSD 0.1
Figure 6.23
(a) RAID 0 speeds up file
read/write time. (b) RAID 1 you can see in Figure 6.24, data is read from you want to be able to use a form of optical
gives you an instant a disc by a laser beam, with the pits and media repetitively, writing and rewriting
backup. nonpits (called lands) translating into the 1s data to it many times, read/writeable
and 0s of the binary code computers under- formats such as CD-RW, DVD-RW, and
stand. CDs and DVDs use a red laser to BD-RE are available.
read and write data. Blu-ray discs get their Do I need separate players and
name because they are read with a blue burners for CD, DVD, and now BD
laser light. All of them collectively are re- formats? Although CDs and DVDs are
ferred to as optical media. based on the same optical technology,
Why can I store data on some CD drives cannot read DVDs. If your
discs but not others? All forms of op- system has only a CD drive, you will
tical media come in prerecorded, recordable, need to add a DVD drive to view DVDs.
and rewritable formats. The prerecorded However, if your system has a DVD drive,
discs—known as CD-ROM, DVD-ROM, that is all you need, even just to listen to
and BD-ROM discs—are read-only optical CDs, because DVD drives can read them.
discs, meaning you can’t save any data Although Blu-ray discs are read with a dif-
onto them. Pre-recorded CDs usually ferent type of laser than CDs and DVDs,
contain audio content, software programs, most Blu-ray players are backward compat-
or games, whereas DVD-ROMs and ible and can play DVDs and CDs. There are
BD-ROMs typically contain movies or different types of optical drives for playing
prerecorded TV shows in regular or high or recording to discs. If you want to record
definition, respectively. Recordable formats to CDs, DVDs, or Blu-ray discs, you need to
such as CD-R, DVD-R, and BD-R allow data make sure your drive is capable of record-
to be written (saved or burned) to them. If ing (or burning) and not just playing.
The thin metal platters that make up a hard drive are covered with a spe-record (write) the magnetic data to and from the hard drive platter. As
cial magnetic coating that enables the data to be recorded onto one or noted earlier, the average total time it takes for the read/write head to
both sides of the platter. Hard drive manufacturers prepare the disks to locate the data on the platter and return it to the CPU for processing is
hold data through a process called low-level formatting. In this process,called its access time. A new hard drive should have an average access
concentric circles, each called a track, and pie-shaped wedges, each time of approximately 12 ms.
called a sector, are created in the magnetized surface of each platter, Access time is mostly the sum of two factors: seek time and latency.
The time it takes for the read/write heads to move over the surface of the
setting up a gridlike pattern that identifies file locations on the hard drive.
A separate process called high-level formatting establishes the catalog disk, moving to the correct track, is called the seek time. (Sometimes
that the computer uses to keep track of where each file is located on thepeople incorrectly refer to this as access time.) Once the read/write head
hard drive. More detail on this is presented in the Dig Deeper feature locates the correct track, it may need to wait for the correct sector to
“How Disk Defragmenter Utilities Work” on page 238. spin to the read/write head. This waiting time is called latency (or
Hard drive platters spin at a high rate of speed, some as fast as rotational delay ). The faster the platters spin (or the faster the rpm), the
15,000 revolutions per minute (rpm). Sitting between the platters are less time you’ll have to wait for your data to be accessed. Currently, most
special “arms” that contain read/write heads (see Figure 6.25). A hard drives for home systems spin at 7,200 rpm. Some people design
read/write head moves from the outer edge of the spinning platter to their systems to have a faster hard drive run the operating system, such
the center, as frequently as 50 times per second, to retrieve (read) and as the Western Digital Velociraptor, which spins at 10,000 rpm. They then
add a slower drive with greater capacity for storage.
The read/write heads do not touch the platters of the hard
Read/write head drive; rather, they float above them on a thin cushion of air at
Arms a height of 0.5 microinches. As a matter of comparison, a
human hair is 2,000 microinches thick and a particle
of dust is larger than a human hair. Therefore, it’s
critical to keep your hard drive free from all dust
and dirt, because even the smallest particle could
find its way between the read/write head and the
disk platter, causing a head crash—a stoppage of
the hard drive that often results in data loss.
Capacities for hard drives in personal comput-
ers can exceed 2000 GB (2 TB). Increasing the
amount of data stored in a hard drive is achieved
either by adding more platters or by increasing the
Platters amount of data stored on each platter. How tightly
the tracks are placed next to each other, how
tightly spaced the sectors are, and how closely the
bits of data are placed affect the measurement of
the amount of data that can be stored in a specific
Figure 6.25 area of a hard drive platter. Modern technology
The hard drive is a stack of platters enclosed in a sealed case. Special arms fit in continues to increase the standards on all three
between each platter. The read/write heads at the end of each arm read from and levels, enabling massive quantities of data to be
save data to the platters. stored in small places.
Do I want to have a very fast startup time (i.e., use an SSD drive for
my operating system)?
Can I burn my own Blu-ray discs (i.e., do I have a Blu-ray burner installed)?
Decades ago, when the electronic photocopier made its debut, book every month, and about one-quarter of all Internet users worldwide have
publishers and others who distributed the printed word feared they downloaded a movie from the Internet.
would be put out of business. They were worried that people would no In a separate survey, the Recording Industry Association of America
longer buy books and other printed matter if they could simply copy (RIAA), a trade organization that represents the interests of recording gi-
someone else’s original. Years later, when audiocassette and VCR players ants such as Sony, Capitol Records, and other major producers of musi-
and recorders arrived on the market, those who felt they would be nega- cal entertainment, reported that 23 percent of music fans revealed they
tively affected by these new technologies expressed similar concerns. were buying less music because they could download it or copy a CD-
Now, with the arrival of CD-RW, DVD-RW, and BD-RE technology, the ROM from a friend.
music and entertainment industries are worried because users can copy As you would expect, the music and entertainment industries want to
CDs, DVDs, and Blu-ray discs in a matter of minutes. be fairly compensated for their creative output. They blame the technol-
Although photocopiers and VCRs certainly didn’t put an end to the in- ogy industry for the creation of means by which artists, studios, and the
dustries they affected, some people still say the music and entertainment entertainment industry in general are being “robbed.” Although technol-
industries will take a significant hit with CD-RW, DVD-RW, and BD-RE tech- ogy that readily allows consumers to transfer and copy music and videos
nology. Industry insiders are claiming that these technologies are unethi- exists, the artists who produce these works do not want to be taken ad-
cal, and they’re pressing for increased federal legislation against such vantage of. However, others claim that the technology industry should
copying. It’s not just the CD-RW, DVD-RW, BD-RE technology that’s causing not bear the complete burden of protecting entertainment copyrights.
problems, either, because “copies” are not necessarily of the physical sort. The RIAA sums up the future of this debate nicely: “Goals for the new
Thanks to the Internet, file transfers of copyrighted works—particularly millennium are to work with [the recording] industry and others to enable
music and films—is now commonplace. According to Music United technologies that open up new opportunities but at the same time to pro-
(musicunited.org), more than 243 million files are downloaded illegally tect the rights of artists and copyright owners.”
newest standard. It features high-definition computer? To do so, you need more ports,
and lossless technology, in which no data is which are provided on upgraded sound
lost in the compression process. To create cards like the one shown in Figure 6.34.
surround sound, Dolby takes digital sound With an upgraded sound card, you can
from a medium (such as a DVD-ROM) and connect portable minidisc players, portable
reproduces it in eight channels. Seven chan- media players, portable jukeboxes, head-
nels cover the listening field with placement phones, and CD players to your computer.
to the left front, right front, and center of the Musicians also create music on their com-
audio stage, as well as the left rear and right puters by connecting special devices (such
rear, and then two extra side speakers are as keyboards) directly to sound card ports.
added, as shown in Figure 6.33. The eighth To determine whether your audio subsys-
channel holds extremely low-frequency tem is meeting your needs, review the table
sound data and is sent to a subwoofer, in Figure 6.35.
which can be placed anywhere in the room.
To set up surround sound on your com-
puter, you need two things: a set of Evaluating System
surround-sound speakers and, for the great-
est surround-sound experience, a sound Reliability
card that is Dolby Digital–compatible. Many computer users decide to buy a new
I don’t need surround sound on my system not necessarily because they need a
computer. Why else might I need to faster CPU, more RAM, or a bigger hard
buy an upgraded sound card? Most drive, but because they are experiencing
basic sound cards contain the following problems such as slow performance, freezes,
input and output jacks (or ports): micro- and crashes. Over time, even normal use can
phone in, speaker out, and line in. This al- cause your computer to build up excess files
lows you to hook up a set of stereo speakers and to become internally disorganized. This
and a microphone. But what if you want to excess, clutter, and disorganization can lead
hook up a right and left speaker individu- to deteriorating performance or, far worse,
ally, or attach other audio devices to your system failure. If you think your system is
RAM upgrade
Storage Subsystem
Hard drive upgrade
SSD drive
DVD+/-RW burner
Blu-ray burner
What happened to your last computer? If you threw it away hoping it These programs provide secure hard drive erasures, either of specific
would be safely recycled with your empty water bottles, think again. files on your hard drive or of the entire hard drive.
Mercury in LCD screens, cadmium in batteries and circuit boards, and Keep in mind that even these data erasure programs can’t provide the
flame retardant in plastic housings all are toxic. An alarming, emerging ultimate level in security. Computer forensic specialists or supercyber-
trend is that discarded machines are beginning to create an e-waste criminals can still manage to retrieve some data from your hard drive if
crisis. they have the right tools. The ultimate level of protection comes from de-
Instead of throwing your computer away, you may be able to donate stroying the hard drive altogether. Suggested methods include drilling
it to a nonprofit organization. Many manufacturers, such as Dell, offer re- holes in the hard drive, burning or melting it, or just taking an old-fash-
cycling programs and have formed alliances with nonprofit organizations ioned sledgehammer to it! For large companies that need to upgrade large
to help distribute your old technology to those who need it. Sites like quantities of computers and have the options of destroying or recycling
Computers With Causes (computerswithcauses.org) organize dona- their old computers, the problem becomes much worse. In these cases,
tions of both working and nonworking computers, printers, and mice. You recycling isn’t a good option, and throwing the computers away can create
can also take your computer to an authorized computer recycling center an environmental hazard. Companies such as GigaBiter (gigabiter.com)
in your area (see Figure 6.38). The Telecommunications Industry Associ- eliminate security and environmental risks associated with electronic
ation provides an e-cycling information site you can use to find a local destruction by first delaminating the hard drive and then breaking down
e-cycling center (eiae.org). the computer e-waste into recyclable products. The result of the final step
However, before donating or recycling a computer, make sure you is a sandlike substance that is 100 percent recyclable.
carefully remove all data from your hard drive, or you may end up having
your good deed turn bad by becoming the victim of
identity theft. Credit card numbers, bank information,
Social Security numbers, tax records, passwords, and
personal identification numbers (PINs) are just some of
the types of sensitive information that we casually
record to our computers’ hard drives. Just deleting files
that contain proprietary personal information is not
protection enough. Likewise, reformatting or erasing
your hard drive does not totally remove data, as was
proved by two MIT graduate students. In 2003, they
bought more than 150 used hard drives from various
sources. Although some of the hard drives had been re-
formatted or damaged so the data was supposedly ir-
recoverable, the two students were able to retrieve
medical records, financial information, pornography,
personal e-mails, and more than 5,000 credit card
numbers!
The U.S. Department of Defense suggests a seven-
layer overwrite for a “secure erase.” In other words,
they suggest that you fill your hard drive seven times
over with a random series of 1s and 0s. Fortunately,
several programs exist for PCs running Windows, such Figure 6.38
as Active@ Kill Disk, Eraser, and CyberScrub. Wipe is An electronics scrap recycler “demanufactures” printers, computers, and other
available for Linux, and ShredIt X can be used for OS X. electronics and then resells the usable parts.
provides an upgrade worksheet you can use Would you donate it to a charitable organi-
to evaluate both the upgrade path and the zation? Would you be able to give it to a
new purchase path. Be sure to consider what family member? Purchasing a new system is
benefit you might obtain by having two sys- an important investment of your resources,
tems if you were to buy a new computer. and you want to make a well-reasoned,
Would you have a use for the older system? well-supported decision.
chapter
6. What components affect the quality you buy a new system because you think
of sound on my computer, and how yours may be unreliable, make sure the
can I evaluate whether they match problem is not one you can fix. Run a full
my needs? scan with antispyware software. Make sure
Your computer’s sound depends on your you have installed any new software or
speakers and sound card. A sound card hardware properly, check that you have
enables the computer to produce sounds. enough RAM, run system utilities such as
Users upgrade their sound cards to provide Disk Defragmenter and Disk Cleanup, clean
for 3D sound, surround sound, and addi- out your Startup folder, remove unnecessary
tional ports for audio equipment. files from your system, and keep your soft-
ware updated with patches. If you continue
to have troubles with your system, reinstall
7. How can I improve the reliability of or upgrade your OS, and, of course, seek
my system? technical assistance.
Many computer users decide to buy a new
system because they are experiencing prob-
lems with their computer. However, before
297
six
six key terms
chapter
chapter
Word Bank
• access time • express cards • RAM
• Blu-ray disc • front side bus • sound card
buzzwords
• cache memory • GPU • SSD
• CPU usage • hard drive • surround sound
• data transfer rate • memory module • system evaluation
• eSATA • Moore’s law
Instructions: Fill in the blanks using the words from the Word Bank above.
Joe already has a PC but just heard about a great deal on a new one. He decides to perform
a(n) (1) __________ on his computer to see whether he should keep it or buy the new one.
First, he runs the Task Manager in Windows. By doing so, he can check the history of
(2) __________ as he works through his day. Because he is often over 90 percent, he begins to
suspect his system is suffering from too little (3) __________. He has room for an additional
two (4) __________ on his motherboard. Adding memory is something he learned how to do
this semester, but would that be enough to make this machine do all he needs?
He visits the Intel Web site to check two other important factors on his model of CPU: the
amount of (5) __________ memory and the speed of the (6) __________. It looks like the
newer i7 processor would be much faster overall. It seems each generation of processors is
so much faster than the last. That rule, (7) __________, is still holding true!
He continues to evaluate his system by checking out which components he has and which
ones he’ll need. He notes the storage capacity of the (8) __________. Recently, he has been
wishing his system had a(n) (9) __________ port because adding an external hard drive
would give him enough space to start to record HD television shows. As it is, he is running
out of space to store files. But the (10) __________, or the amount of time it takes to retrieve
data from the disk drive, on any mechanical drive is slow compared to the (11) __________ in
the new computer he’s eyeing, which has no moving parts at all. Joe also notes that he is un-
able to do a complete backup of his music library onto optical media now that he has 40 GB
of music data. His current system can’t burn a (12) __________, but the new system could.
The new video card would also include several (13) __________ ports so that six digital
monitors can be connected simultaneously. It would be great if he could take advantage of
the 5.1 (14) __________ that is on the soundtrack of most of the movies he watches on DVD.
He also has a lot of friends who play video games on their computer systems. However, his
current system doesn’t meet the minimum requirements for a video card. Newer cards
have blindingly fast (15) __________, and some cards even have multiple processors. computer
Overall, with prices dropping, it seems like time to go buy that new system!
literate
becoming
becoming
computer literate
Rebecca has already built five or six PCs and tells you she can make a killer desktop system
for you for under $1,300. But you do love the idea of having a light, compact notebook
computer that could travel with you around campus and back and forth to work.
Instructions: Using the preceding scenario, write an e-mail to Rebecca describing to her
what you need in your new system. Examine the specifications for both notebook and
desktop systems in this price range and decide which one is best suited to you. Use key
terms from the chapter and be sure your sentences are grammatically correct and
technically meaningful.
299
six
six self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. A single CPU can have multiple cores but cannot also use hyperthreading.
_____ 2. The memory that your operating system uses is referred to as kernel memory.
_____ 3. Motherboards are designed with a specific number of memory card slots.
_____ 4. Cache memory is a form of read-only memory that can be accessed more quickly
by the CPU.
_____ 5. Solid state drives are faster than hard drives and eSATA drives.
chapter
transition to...
next semester
1. Personalize Your System
transition to...
Likely you spend many hours each day working on your computer using it for school,
work, communication, research, and entertainment. Your computer should be a device
that fits you, fits your needs, and expresses who you are.
next semester
making the
a. Begin with the computer’s form. Would you select a notebook or a desktop? What
features determine that decision?
b. Next consider performance. Which type of CPU do you need? How much RAM
should be installed? What kind of hard drive storage would you select? Give
specific price-to-value arguments for each decision.
c. Now consider expandability. If you need this system to last for four years, what
kind of ports and expansion capability are necessary?
d. Finally, consider style. What components or design decisions can you make so that
this system uniquely suits you and represents you?
2. Desktop Replacement
The line between the capabilities of a desktop system and a powerful notebook have
become more and more blurred with the arrival of “desktop replacement” systems.
These systems often have 17-inch, 18-inch, or larger monitors, weigh 10 pounds or more,
and have a battery life of less than two hours. Research the most current entries in the
“desktop replacement” category and evaluate them. What kind of user would find this
an ideal solution? Do you anticipate this category of computer becoming more popular?
3. Go Small or Stay Home
Manufacturers are releasing a number of systems that are trying to capitalize on size—
or the lack of size! Explore some of the small form factor (SFF) computers appearing on
the market.
a. Research the Falcon NorthWest FragBox (falcon-nw.com).
b. Examine the Apple MacMini (apple.com).
c. Compare those systems with the Dell Zino HD (dell.com).
Why are these SFF computers appearing? What role do you see these systems fulfilling?
What kind of performance and hardware would you recommend for such a system?
4. Do-It-Yourself Computer Design
Visit NewEgg (newegg.com) and do a search on “do it yourself”. You will find that NewEgg
has created a number of bundles, which are a set of components that cover the categories
outlined in this chapter: the computer case, processor, RAM, storage, video, and audio.
a. Which system looks like the best match for your needs for school next semester? Why?
b. What is the price difference between building the system and purchasing a similar
unit from a major manufacturer?
c. What skills would you need before you could assemble the computer yourself?
d. What additional components (hardware and software) would you need to complete
the system?
e. What kind of support exists to train you in these skills or to help with questions you
might have along the way?
5. How Does Your System Measure Up?
A number of tools are available to measure your system’s performance. Explore the
following tools and use one to gather data on your current system’s performance.
a. Windows 7 Gadgets: Visit the Windows 7 Personalization Gallery (windows.
microsoft.com) and find gadgets to help you monitor system performance.
b. Windows 7 Resource Monitor: Use the Resource Monitor to collect data on CPU
utilization and memory usage over a typical school day.
c. Benchmarking suites: Examine a sample of consumer benchmarking programs like
the PassMark’s PerformanceTest, Primate Lab’s Geekbench, and Maxon’s
Cinebench. Which subsystems do each of these products evaluate? How do they
present their results? Which seems easiest to use?
301
six
making the
six
chapter
transition to...
the workplace the workplace
1. In the “Real World”
As you move from an educational environment to a business environment, how you use
making the
your computer will inevitably change. Write a description of your ideal computer system
for school and for once you are in the workforce. Defend the position you take with
transition to...
information covered in this chapter. To help you in your decision, fill out the worksheet,
similar to Figure 6.2, that is available on the book’s companion Website
(pearsonhighered.com/techinaction).
2. Judging System Performance
As you learned in this chapter, the Resource Monitor provides a detailed breakdown of how
the computer is using memory at any given time.
a. Open the Resource Monitor, move to the CPU tab, and open the Processes frame. What
is your total CPU Usage? How many “virtual” CPUs does your machine have? Clicking
on any of the column titles sorts that column, so clicking the Average CPU column
shows you the applications currently using most of the CPU resources. What are the top
two most intensive applications?
b. Move to the Memory tab. How much memory is in use? How much is available? Of the
memory available, how much has been preloaded with data and files that Windows
“thinks” you will need soon?
c. Move to the Disk tab. Click on the Processes With Disk Activity panel. Which programs
are making the greatest total demand to read and write to the disk?
3. My Mother(board)
This chapter discussed the qualities of a CPU that are important to consider for system per-
formance. Now examine the features of a motherboard that are critical to the performance
and expandability of a system. Visit NewEgg (newegg.com) and search for “Intel Mother-
boards”; then sort by “Best Rated”.
a. Which model has the best reviews?
b. How many ports and what type of ports does it have?
c. What kind of CPU does it support?
d. What kind of memory does it use, and what is the maximum memory it supports?
e. How many hard drives can it run? Does it support both RAID 0 and RAID 1?
f. Does it have integrated video? Audio?
4. Room to Move
You are responsible for specifying the storage solution for an accounting customer’s com-
puter system. Your customer needs to always have redundancy—that is, multiple copies of
the work they are doing—because of the secure nature of the records they keep and the
length of time they are required to keep records. Prepare a report that describes the type of
hard drive and optical storage you would recommend. Be sure to include performance speci-
fications and price. Devise a list of additional questions you would need to ask your cus-
tomer to be sure they have a system that meets their expectations.
5. A Picture Is Worth a Thousand Words
You work in a financial analysis firm. It is necessary to watch small fluctuations in many
different international monetary funds and markets each day. This data is then fed into your
own prediction software, tied to Excel calculations, and then plotted with three different sta-
tistical analysis packages. What video solution would be ideal for this environment? Would
it require a video card with a single or dual GPU? Multiple video cards? Multiple monitors?
6. Let Me Tell You My Problem
You may be responsible for helping others solve various computer problems. Test out the
Problem Steps Recorder in Windows 7 to see how the program can help you help them.
Click the Start button and search for “psr”. Run the program and click Record. Then just click
between different applications, visit the Control Panel, and add an annotation. Save the file
to your desktop and close the Problem Steps Recorder. View the annotated report. How
could you use the Problem Steps Recorder to describe a problem or to gather information?
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
2. Emerging Technologies
Touchscreens are now available in a range of sizes, from smartphones to iPads to larger
products like the Microsoft Surface. Windows 7 has integrated support for touchscreens.
“Surround Sight” and 3D monitors are available in increasing numbers. What new
technologies will last and become part of our collective experience? How will these
technologies and devices change entertainment and how people interact with
information? What future technologies that would be on your wish list?
4. A Green Machine
Review the impacts of your computer during its entire lifecycle. How do the produc-
tion, transportation, and use of the computer impact the increase of greenhouse gas
emissions? How does the selection of materials and packaging impact the environ-
ment? What restricted substances (like lead, mercury, cadmium, and PVC) are found
in your machine? Could substitute materials be used? How would the ultimate “Green
Machine” be designed?
5. System Longevity
If you purchase a computer system for business purposes, the Internal Revenue Service
(IRS) allows you to depreciate its cost over five years. The IRS considers this a reasonable
estimate of the useful lifetime of a computer system. What do you think most home
users expect in terms of how long their computer systems should last? How does the
purchase of a computer system compare with other major household appliances in
terms of cost, value, benefit, life span, and upgrade potential?
303
six
six team time
chapter
Problem
Even within one discipline, there are needs for a variety of types of computing solutions.
Consider the Communications department in a large university. Because it is such an
interdisciplinary area, there are some groups involved in video production, some groups
producing digital music, and some groups responsible for creating scripts and screenplays.
The department as a whole needs to decide on a complete computing strategy.
Process
Split your class into teams.
1. Select one segment of the Communications department that your team will represent:
video production, digital music, or scripting. The video production team requires their
labs to be able to support the recording, editing, and final production and distribution
of digital video. The digital music group wants to establish a collegiate recording
studio (in the model of the Drexel University recording label, Mad Dragon Records).
The scripting group needs to support a collaborative community of writers and
voice-over actors.
2. Analyze the computing needs of that division, with particular focus on how they need
to outfit their computer labs.
3. Price the systems you would recommend and explain how they will be used. What
decisions have you made to guarantee they will still be useful in three years?
4. Write a report that summarizes your findings. Document the resources you used and
generate as much enthusiasm as you can for your recommendations.
Conclusion
The range of available computing solutions has never been so broad. It can be a cause of
confusion for those not educated in technology. But with a firm understanding of the basic
subsystems of computers, it is precisely the pace of change that is exciting. Being able to
evaluate a computer system and match it to the current needs of its users is an important
skill.
chapter
project
project
ethics
Ethics Project
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together the team will agree on an
ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above from the perspective of either an Intel engineer working
on Light Peak, a notebook designer, a producer of high-definition videos, or an
arbitrator.
2. Team members should write a summary that provides factual documentation for the
positions and views their character takes around the issue of increasingly high speed
data transfer and intellectual property rights. Then, team members should create an
outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the chat room feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint
presentation for review by the rest of the class, along with the summary and resolution
they developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
305
seven
seven
chapter
networking
connecting computing devices
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What is a network, and what are the advantages/disadvantages of setting up one?
(pp. 309–310)
2. What is the difference between a client/server network and a peer-to-peer network?
(pp. 310–312)
3. What are the main components of every network? (pp. 312–315)
4. Which type of network is most commonly found in the home? (p. 315)
5. What equipment and software do I need to build a network in my home? (pp. 319–322)
6. Besides computers, what other devices would I connect to a home network?
(pp. 322–326)
7. Why are wireless networks more vulnerable than wired networks, and what special
precautions are required to ensure my wireless network is secure? (p. 327)
8. How do I configure the software on my computer and set up other devices to get my
network up and running? (pp. 329–334)
9. What problems might I encounter when setting up a wireless network? (pp. 334–335)
multimedia resources
multimedia
resources
Active Helpdesk
• Understanding Networking (p. 325)
Sound Bytes
• Installing a Home Computer Network (p. 325)
• Securing Wireless Networks (p. 327)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? As you have probably
already experienced, wireless connectivity is not always free. Many businesses, such
as Starbucks, charge customers for each device they want to connect, which
can become expensive for groups of friends trying to surf the Internet while waiting to
catch a flight at the airport. Connectify is free software that takes an existing
Internet connection and turns it into a wireless hotspot. So if you are connected to the
Internet on your notebook, the Connectify software turns your notebook
computer into a wireless hotspot so that you and your friends can connect other
WiFi-enabled devices
such as a cell phone
or gaming system
through the same
Internet connection.
The hotspot you
create features easy
connectivity and
encryption of data for
solid security.
307
Networking connecting to the Internet. A typical family,
like the Diaz family (see Figure 7.1), might
Fundamentals be engaged in the following: Carlos (the fa-
Now that we are into the second decade of ther) is watching a movie, which he down-
the 21st century, most homes have more loaded yesterday on the large-screen HDTV
than one computing device that is capable of in the living room while checking his Gmail
Figure 7.1
By setting up a home network, everyone in the family can connect their computers and others devices whenever
and wherever they desire.
Networking
software running
on each computer
Computer 2
network node
Printer
network node
Transmission media
(wires or radio waves)
connecting network nodes
Computer 1
network node
“
cable is used. Coaxial cable sion media. Most NICs in-
All computers cluded in computing
consists of a single copper
wire surrounded by layers of sold today devices today are built to
plastic. If you have cable TV, contain network use wireless media but
the cable running into your many can use wired media
adapters. as well. Your notebook
TV or cable box is most
likely coaxial cable. Fiber-
optic cable is made up of plastic or glass
fibers that transmit data at extremely fast to
”
wireless
wireless
NIC in
computer most likely has a
it
networks
that allows you to connect
(home, school, or the
speeds. Verizon’s FiOS service uses fiber- coffee shop). But most notebooks also have a
optic cable to run very fast data connections port on the side that accommodates cable for
directly up to your home, although fiber- a wired connection to a network.
optic cable is not usually run inside the Why would I ever consider using a
home. On a FiOS network, twisted-pair or wired connection with my notebook
coaxial cable is still used inside the home to computer? Wired connections can some-
transport the network signals. times provide greater throughput than cur-
Does it matter what type of media rent high-speed wireless networks. Here are
you use to transfer data? The media some common reasons why wireless signals
you choose depends on the requirements of may have decreased throughput:
a network’s users. Using wireless media is • Wireless signals are more susceptible to
critical when portable computing devices interference from magnetic and electri-
(such as smartphones) need to be connected cal sources.
to a network. However, higher speed con- • Other wireless networks (such as your
nections (than can be achieved by wireless neighbor’s network) can interfere with
connectivity) are required for certain types the signals on your network.
of network activities, such as downloading • Certain building materials (such as
large files such as movies. Different types of concrete and cinderblock) and metal (a
transmission media transmit data at differ- refrigerator) can decrease throughput.
ent speeds.
• Throughput varies depending on the
Data transfer rate (also called bandwidth)
distance from your networking
is the maximum speed at which data can be
equipment.
transmitted between two nodes on a net-
work. Throughput is the actual speed of Wireless networks usually use specially
data transfer that is achieved. Throughput is coded signals to protect their data whereas
Figure 7.7
At Wifi.com you can search and find free hot spots hosted by other Whisher users.
Data Data
packet 1 packet 4
Figure 7.18 Connecting Network Nodes adapters that are compatible with a previous
standard (802.11g or 802.11b) they will be
This Windows device What equipment do my computers able to connect to your 802.11n router.
manager shows a need to communicate with wireless
wireless and a wired However, the throughput will be at the
media on an 802.11n wireless lower 802.11g and b data transfer rates.
network adapter installed
in a notebook. network? Your computers need to have How can I tell what network
wireless network interface cards (NICs) adapters are installed in my com-
>To access Device
Manager: Click the Start installed in them. Notebooks and netbooks puter? To see which network adapter(s)
Button, select Control sold over the last several years most likely are installed in your Windows computer and
Panel, click on the contain 802.11n NICs. For older computers, to check whether the adapter is working,
Hardware and Sound as long as they have wireless Ethernet
Group, then click on you should use the Device Manager utility
Device Manager. program (see Figure 7.18). The installed
adapters will be shown and then you search
for information on the Internet to determine
the adapter’s capability if you aren’t sure
which wireless standard it supports.
Connecting Other
Devices to Networks
Because sharing peripherals is a major bene-
fit of installing a network, many peripheral
devices, such as scanners and printers, now
come with built-in Ethernet adapters. Also,
many home entertainment devices (such as
televisions, Blu-ray players, and gaming
systems), portable devices (such as
smartphones, and iPod Touches and iPads),
and power monitoring devices to reduce
Network adapters energy consumption in the home are also
designed to attach to home networks. Such
devices are usually described as being
“network-ready.”
Figure 7.19
(a) The My Book drives
Network-Ready Devices Popular for years on business networks, from Western Digital
NAS devices are now being widely mar- feature NAS devices that
What is a network-ready device? A keted for home networks. You can think of can store 2 TB of data in a
network-ready device (or Internet ready) device the size of a small
them as specialized external hard drives. book. (b) Time Machine
can be connected directly to a router instead NAS devices, like the My Book series from in conjunction with an
of to a computer on the network. Network- Western Digital (see Figure 7.19a), connect external hard drive
ready devices usually contain wireless and/ directly to the network through a router or provides easy backups of
or wired network adapters inside them. A switch. Specialized software can then be Macs on a network.
few devices (such as TiVo or the Xbox 360) installed on computers attached to the
still have external network adapters that network to ensure that all data saved to an
connect to the device via a USB port but individual computer is also stored on the
these eventually should be phased out in NAS as a backup. We’ll discuss backing up
favor of internal adapters. The eventual goal your data in more detail in Chapter 9.
may be to have all electronic devices in your For Apple computers, the Time Capsule is
home be nodes on your network. a wireless router combined with a hard
Why should I connect my peripher- drive for facilitating backups of all comput-
als to my home network? There is ers connected to the network. The Time
an advantage to connecting peripherals Capsule looks very similar to the AirPort
wirelessly to your network. If a printer were router and it works in conjunction with the
connected directly to another computer (via Time Machine backup feature of OS X (see
a cable) on the network instead of being a Figure 7.19b). If you buy a Time Capsule,
node on the network, that computer would you won’t need to buy an AirPort router (or
need to be switched on so other computers other router) as the Time Capsule fulfills this
could access the printer. With a network- function on your network also. When the
ready printer, only the printer needs to be Time Capsule is installed on your network,
powered on for any computer on the net- Macs connected to the network will ask the
work to print to it. user if they want to use the Time Capsule as
What can I attach to my network their source for Time Machine backups. The
to facilitate file sharing and back up Time Capsule is another type of NAS device.
of data? Network attached storage Besides external hard drives, are
(NAS) devices are specialized computing their other NAS devices I could use
devices designed to store and manage your on my network? A more sophisticated
data. People are generating tremendous type of NAS device is a home network
quantities of data today with digital cameras server. Home network servers are special-
and camcorders, as well as buying music ized devices that are designed to provide a
files, and these files need to be stored and specific set of services to computers on a
shared. Although data can always be stored home network. Home servers do not con-
on individual hard drives in computers on a vert a home peer-to-peer network into a
network, NAS devices provide for central- client/server network because these servers
ized data storage and access. only perform only a limited set of functions
Figure 7.25
Sending pictures directly were marketed toward older computer
to an electronic frame
from your phone is users since these devices feature easy opera-
possible when the frame tion and a shallow learning curve. But the
is connected to your Apple iPad is propelling this category of
network. devices into the hands of much
younger users. We discuss the
Apple iPad in more detail in
Chapter 8.
How can I use my home
network to enhance photo
sharing? Digital picture
frames that display an array of
changing digital photos have be-
come quite popular with the rise
in digital photography. Now digi-
tal picture frames such as the
eStarling TouchConnect (see
Figure 7.25) come with built-in
wireless adapters for easy Figure 7.26
connection to home networks. Logitech security products can help you remotely monitor your home’s
Featuring a touch screen security.
Passphrase you
created for router
Figure 7.29
(a) The Windows Network and Sharing Center helps you configure your home network. Selecting the appropriate
sharing options allow others to share resources on your computer. (b) Selecting the appropriate option provides
access to wizards that will assist you. (c) Fill in the information provided by your ISP. The wizard will then set up
your connection and connect your computer to the Internet.
>The Windows Network and Sharing Center is found in the Control Panel.
All other computers that subsequently are How do Macs connect wirelessly
added to the network will need the password to networks? Generally, connecting
to join the HomeGroup. When you configure Macs to a wireless network is a much easier
a HomeGroup, you have the option of process than connecting with Windows
deciding what files and peripherals on your computers. You set up the security for a
computer will be shared with other comput- router on a Mac network just as was illus-
ers on the network (see Figure 7.30). trated in the previous section on securing
You probably have a lot of data on your home network such as music and is to prevent either party from later denying having handled the
video files. And you probably generate more data every day. But this data.
pales in comparison to the data generated by most businesses. The vast The Global Information Assurance Certification, or GIAC (giac.org), is
quantities of data on business and government networks also require an industry-recognized certification that provides objective evidence
much higher levels of protection than the data on your home network. (through examinations) that security professionals have mastered key
With billions of dollars spent on e-commerce initiatives every year, com- skills in various aspects of information assurance.
panies have a vested interest in keeping their information technology (IT) What skill sets will be most in demand for security professionals? In
infrastructures humming along. The rise in terrorism has shifted the addition to information assurance technical skills (with an emphasis on
focus slightly—from protecting virtual assets and access, to protecting network engineering and data communications), broad-based business
these plus physical assets and access points. The increased need for experience is also extremely desirable. IT security professionals need to
virtual and physical security measures means there should be a robust understand the key issues of e-commerce and the core areas of their
job market ahead for computer security experts. company’s business (such as marketing, sales, and finance). Under-
The National Security Agency and the Office of Homeland Security standing how a business works is essential to pinpointing and correcting
are both encouraging information security professionals to be proficient security risks that could be detrimental to a company’s bottom line. Be-
in information assurance. As defined by the NSA, information assurance cause of the large number of attacks by hackers, security and forensic
is “the set of measures intended to protect and defend information and skills and related certifications also are in high demand. Working closely
information systems by ensuring their availability, integrity, authentica- with law enforcement officials is essential to rapidly solving and stopping
tion, confidentiality, and non-repudiation. This includes providing for cybercrime.
restoration of information systems by incorporating protection, detection, Another important attribute of security professionals is the ability to
and reaction capabilities.” The five key attributes of secure information lead and motivate teams. Security experts need to work with diverse
systems are as follows: members of the business community, including customers, to forge rela-
1. Availability: The extent to which a data-processing system is able tionships and understanding among diverse groups. Security profession-
to receive and process data. A high degree of availability is usually als must conduct skillful negotiations to ensure that large project
desirable. implementations are not unduly delayed by security initiatives or pushed
2. Integrity: A quality that an information system has if the processing through with inadequate security precautions. Diplomacy is therefore a
of information is logical and accurate and the data is protected sought-after skill.
against unauthorized modifications or destruction. Look for more colleges and universities to roll out security-based de-
3. Authentication: Security measures designed to protect an informa- gree and certificate programs as the demand for security professionals
tion system against acceptance of a fraudulent transmission of increases. These programs will most likely be appropriate for experi-
data by establishing the validity of a data transmission or message, enced networking professionals who are ready to make the move into
or the identity of the sender.
the IT security field. If you’re just starting to prepare for a career, consider
4. Confidentiality: The assurance that information is not disclosed to a degree in network engineering, followed by network security training
unauthorized persons, processes, or devices.
while you’re working at your first job. A degree program that is also
5. Nonrepudiation: A capability of security systems that guarantees designed to prepare you for security certification exams is particularly
that a message or data can be proven to have originated from a
desirable. Networking and security degrees, combined with passing
specific person and was processed by the recipient. The sender of
grades on certification exams, should help you make a smooth transition
the data receives a receipt for the data, and the receiver of the data
gets proof of the sender’s identity. The objective of nonrepudiation into the exciting world of cybersecurity.
passphrase. The Xbox 360 configuration promised you certain speeds of download-
screens are shown in Figure 7.33. ing and uploading data. How can you tell if
Once all your devices are connected to you are getting what was promised? There
your network, you might want to check are numerous sites on the Internet, such as
your Internet connection speed to see what Speedtest.net (see Figure 7.34) and
kind of throughput you are achieving. You broadband.gov, where you can test the
can check your speed on any device on your speed of downloading files to your
network that can access the Internet with a computer and uploading files to other com-
browser. puters. You can then see how your results
How can I test my Internet con- compare to those of other users in your state
nection speed? Your ISP may have and across the United States. Many factors
Figure 7.33
Xbox 360 wireless can influence your Internet speeds, so be about 350 feet. But as you go farther away
configuration screens. sure to run the test at several different times from your router, the throughput you
(a) The Xbox will detect during the day over the course of a week be- achieve will decrease. Obstacles between
available networks. Select fore complaining to your ISP about not get- wireless nodes also decrease throughput.
the Specify Unlisted ting your promised speed. Walls, floors, and large metal objects are the
Network option to enter
the SSID name of your most common sources of interference with
network. (b) Enter the wireless signals. For example, placing a
security passphrase on
Troubleshooting Network Problems computer with a wireless network adapter
the appropriate security What types of problems can I run next to a refrigerator may prevent the sig-
screen. into when installing wireless nals from reaching the rest of the network.
networks? The maximum range of wire- Similarly, a node that has four walls be-
less devices under the 802.11n standard is tween it and the Internet connection will
Figure 7.34
Speed test showing a download speed of 20.01 megabits, which is extremely fast for a
home Internet connection.
Wireless
router
Wireless range
extender
Figure 7.35
most likely have lower-than-maximum connectivity. As shown Figure 7.35, the note- Because a wireless range
extender is installed in the
throughput. book on the back porch can’t connect to the den, Notebook C on the
What if a node on the network wireless network even though the computer back porch can now
can’t get adequate throughput? in the den can connect to the network. By connect to the wireless
Repositioning the node within the same placing a range extender in the den, where network generated by the
room (sometimes even just a few inches there is still good connectivity to the wireless wireless router in the
bedroom.
from the original position) can often affect network, the wireless signal is amplified and
communication between nodes. If this beamed farther out to the back porch. This
doesn’t work, try moving the device closer improves the otherwise poor connectivity on
to the router or to other rooms in your the back porch and allows computer C to
house. If these solutions don’t work, you make a good connection to the network.
should consider adding a wireless range Hopefully, you’ll now be able connect all
extender to your network. your computing devices to your home net-
A wireless range extender is a device that work and achieve the throughput you need
amplifies your wireless signal to get it out to to move your date efficiently around your
parts of your home that are experiencing poor home network.
1. What is a network, and what are the 5. What equipment and software do I
advantages/disadvantages of setting need to build a network in my home?
up one? All computing equipment that will connect
summary
chapter
8. How do I configure the software on 9. What problems might I encounter
my computer and set up other when setting up a wireless network?
devices to get my network up and You may not get the throughput you need
summary
running? through a wireless connection and therefore
Windows features software wizards that you may need to consider a wired connec-
facilitate the setup of both wired and tion for certain devices. Distance from the
wireless networks. Plug in the modem, router as well as walls, floors, and large
routers, and all cables, and then switch on metal objects between a device and the
the modem, router, and computers (in that router can interfere with wireless connectiv-
order). Run the wizards, which should ity. Wireless range extenders can amplify
guide you through the process. Make sure signals to improve connectivity in areas of
each computer has a distinct name and poor signal strength.
ensure that all computers are in the same
HomeGroup. Devices such as gaming
consoles each have their own set-up
procedures for connecting to wireless
networks but usually require the same
information as needed for connecting a
computer to a secured wireless network.
337
seven
seven key terms
chapter
chapter
Word Bank
• Cat 6 cable • network adapter(s) • throughput
• client/server • network-ready • twisted pair cable
buzzwords
• data transfer rate • peer-to-peer (P2P) • WAN
• hacker(s) • piggybacking • wired
• home network server • router • wireless
• LAN • switch • wireless range expander
Instructions: Fill in the blanks using the words from the Word Bank above.
Cathi needed to network three computers for herself and her roommates, Sharon and
Emily. She decided that a(n) (1) __________ network was the right type to install in their
dorm suite because a(n) (2) __________ network was too complex. Because they all liked to
stream digital movies from the Internet, they needed high a(n) (3) __________ but doubted
they would achieve the promised (4) __________ in any network they installed. Although
they knew using (5) __________ media would provide the fastest Ethernet networks, they
decided to use (6) __________ media so that they could use their notebooks wherever they
were in their suite. Therefore they needed to buy a(n) (7) __________ with wireless capabil-
ity that would allow them to share the broadband Internet connection that Sharon already
had through a local ISP. This device would also double as a(n) (8) __________, preventing
the need to purchase a separate device. Fortunately, all their computers already had
(9) __________ installed, making it easy to connect the computers to the network. Cathi
knew they would need to purchase some (10) __________ since the Xbox 360 they wanted
to share only had a wired Ethernet adapter in it.
Cathi’s roommate Emily wanted to know if they could hook into the (11) __________, or
small network, that was already deployed for the students in the dorm. This student
network was already hooked into the college’s (12) __________, or large network, which
spanned all three of the college’s campuses. She knew they would need to be careful when
connecting to the network, because some students from the dorm had accidentally been
illegally (13) __________ on a network from the deli across the street. As the connectivity for
notebooks in the lounge at the end of the hall was very poor, they needed to consider
computer
purchasing a(n) (14) __________ to extend the range of the wireless signal. As a final detail,
Emily suggested they get a(n) (15) __________ printer that would plug right into the router
and allow them all to print whenever they needed to do so.
literate
becoming
becoming
computer literate
Your grandmother has moved into a new retirement community. She is sharing a
large living space with three other residents. All four retirees have their own notebook
computers. Your grandmother has asked you to advise her and her roommates on an
appropriate network to install so that they can share an Internet connection, a laser printer,
and movies that they want to stream from Netflix via the Internet. And your grandmother
is an avid photographer and has thousands of digital photographs on her computer. She is
very concerned about forgetting to back up the photographs after she takes new ones and
wants her family to be able to access her photos via the Internet.
Instructions: Using the preceding scenario, draft a networking plan for your
grandmother and her roommates using as many of the keywords from the chapter as you
can. Be sure that your grandmother, who is unfamiliar with many networking terms, can
understand your suggestions.
339
seven
seven self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. Actual data throughput is usually higher on wireless networks.
_____ 2. Ethernet networks require each node on the network to be equipped with its own
network adapter.
_____ 3. WEP and WPA are popular wired network security protocols.
_____ 4. MANs cover a larger geographic area than HANs.
_____ 5. 802.11n wireless networks provide faster throughput than wired gigabit Ethernet
networks.
chapter
transition to...
next semester
1. Dormitory Networking
transition to...
Mikel, Dylan, Sanjay, and Harrison were sitting in the common room of their campus
suite and complaining about their wireless network. They inherited the equipment from
next semester
the last residents of the suite, and unfortunately their router uses the outdated 802.11g
making the
standard. They all have notebooks that have 802.11n network adapters, but their
throughput is poor. Since they are often all surfing the Internet at the same time and
trying to download movies, their network’s performance has become unacceptable.
Since they all just sold last semester’s books back to the bookstore for a total of
$600, they decided this would be a good time to upgrade their network and peripher-
als. Dylan has an inkjet printer that gobbles up expensive cartridges, and Phil has a
laser printer that just broke. The guys figure one good networked all-in-one printer
should meet their needs since it would also provide them with photocopying capabili-
ties. Mikel is concerned about backups for his computer. His external hard drive fell on
the floor and no longer works reliably. He has a tremendous amount of photos and
schoolwork on his computer that he is concerned about losing if his hard drive fails.
Since the guys don’t know much about networking, the four roommates have asked for
your guidance. Consider the following keeping in mind their $600 budget:
a. Research network-ready laser printers on sites such as hp.com, epson.com, and
brother.com. What network-ready all-in-one printer would you recommend? Why?
b. Research 802.11n wireless routers at sites such as netgear.com, linksys.com, and
dlink.com. What router do you think will meet the roommates’ needs? Why?
c. How would you recommend addressing Dave’s backup concerns? Would you rec-
ommend a NAS device for the network, or do they have enough money left in their
budget for a home network server? Research these devices and make an affordable
recommendation. Check sites such as tigerdirect.com and newegg.com for competi-
tive pricing.
341
seven
seven making the
chapter
transition to...
the workplace the workplace
1. Wireless LAN for a Small Business
making the
transition to...
You are working for a local coffee shop. The owner of the shop thinks that adding a
wireless network and providing free Internet access to customers would be a good
way to increase business. The owner has asked you to research this idea and prepare a
report of your findings. Consider the following:
a. Price out business Internet connectivity with local phone and cable providers.
Which vendor provides the most cost effective solution for a coffee shop? Are there
any limitations on bandwidth or the number of people that can access the Internet at
one time through the business account connection?
b. What potential problems could you foresee with providing unrestricted free access
to the Internet? What policies would you suggest to keep people from abusing the
free Internet access? (An example of abuse is someone who sits all day and surfs for
free without purchasing any coffee.)
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
develop his theory of relativity. Some ideas are best understood by experimenting with them
questions
critical thinking
in our own minds. The following critical thinking questions are designed to demand your full
attention but require only a comfortable chair—no technology.
1. Protecting Your Wireless Home Network
Many people have installed wireless networks in their homes. Consider the wireless net-
work installed in your home (or in a friend’s home if you don’t have wireless).
a. Is your network set up to provide adequate protection against hackers? If not, what
would you need to do to make it secure?
b. Are there other wireless networks within range of your home? If so, are they set up with
an adequate level of security, or can you connect to them easily? How would you go
about informing your neighbors that their networks are vulnerable?
2. Adding Devices to Your Network
We discussed adding devices other than computers and computer peripherals to your net-
work in this chapter. Consider the following for your home network:
a. Do you currently stream or download movies from Netflix, Amazon Video on Demand,
or another service? If so, is your storage device sufficient or do you need more capacity? If
you don’t currently download this type of entertainment, would your family do so if you
had a device that was attached to your network? What type of device (DVR, home server,
etc.) do you think would be most appropriate for the type of media that you enjoy? How
much media would you need to download and view in a month to make purchasing
equipment worthwhile?
b. Do you have a need for a home security system? Would internal and external cameras be
appropriate for monitoring your home? Are their people in your house (babysitters,
housekeepers, contractors, etc.) on a regular basis that might need monitoring? Would
you monitor these people in real time or make recordings for later review?
3. Evaluating Your Home Networking Needs
You might have a network installed in your home already, or perhaps you are still
considering whether it is necessary to install one. Consider these issues:
a. Who uses computing devices in your home? How many computers (notebooks and
desktops) are currently in your home? Are the computers networked? If not, should they
be networked? What advantages would your family gain by networking its computers?
b. Which computer peripheral devices does your family own? Which family members need
to use which peripherals? Are the peripherals network-ready or are they connected to in-
dividual computers? How easy is it to share these peripherals? Are there peripherals that
your family doesn’t own that would be beneficial? (Make sure to explain why.) How
would you go about connecting new peripherals to your network?
c. Does your home network have network-attached storage or a home server? Would your
family benefit from having this technology on your home network? What types of media
do your family members routinely share? What other types would they share if they had
the means?
4. Sharing a Home Internet Connection
Perhaps you have considered whether sharing a home Internet connection with your neigh-
bors would save you money. Consider the following issues:
a. How many neighbors would be within range (say, within 350 feet of your router) of an
802.11n signal that came from your house or apartment? Do you think your neighbors
would be amenable to sharing the cost of your Internet connection and your bandwidth?
Why or why not?
b. Is it permissible to share an Internet connection with neighbors under your ISP’s terms of
use for the type of connection you purchased? If not, what type of plan would you need to
upgrade to in order to share a connection with your neighbors? Would the increased cost
of upgrading your connection still make it economically feasible to share a connection?
343
seven
seven team time
chapter
Problem
Wireless technology is being adopted by leaps and bounds, both in the home and in the
workplace. Offering easy access free of physical tethers to networks seems to be a solution
to many problems. However, wireless computing also has problems, ranging from poor re-
ception to hijackers stealing your bandwidth.
Task
You are volunteering for a charity that installs wireless networks in homes for needy fami-
lies. Many of these installations are done in older homes, and some recipients of the net-
works have reported poor connectivity in certain areas of their residences and extremely
low bandwidth at other times. You have volunteered to research the potential problems and
to suggest solutions to the director of the program.
Process
Break the class into three teams. Each team will be responsible for investigating one of the
following issues:
1. Detecting poor connectivity: Research methods that can be used to find areas of poor
signal strength, including signal sniffing software (netstumbler.com) and handheld
scanning devices such as WiFi Finder (kensington.com). Investigate maximum dis-
tances between access points and network nodes and make appropriate recommenda-
tions. (Equipment manufacturers such as netgear.com and linksys.com provide
guidelines.)
2. Signal boosters: Research ways to increase signal strength in access points, antennae,
and wireless cards. Signal boosters are available for access points. You can purchase or
construct replacement antennae or antenna enhancements. WiFi cards that offer higher
power than conventional cards are now available.
3. Security: “War drivers” (people who cruise neighborhoods looking for open wireless
networks from which to steal bandwidth) may be the cause of the bandwidth issues.
Research appropriate measures to keep wireless network traffic secure from eavesdrop-
ping by hackers. In your investigation, look into the WiFi Protected Access (WPA)
standard developed by the WiFi Alliance. Check out the security section of the
knowledge center on the WiFi Alliance Web site to start (wi-fi.org).
Present your findings to your class and discuss possible causes of and ways to prevent the
problems encountered at the residences. Provide your instructor with a report suitable for
eventual presentation to the CEO of the charity.
Conclusion
As technology improves, wireless connectivity should eventually become the standard
method of communication between networks and network devices. As with any other tech-
nology, security risks exist. Understanding those risks and how to mitigate them will allow
you to participate in the design and deployment of network technology and provide peace
of mind for your network users.
chapter
project
project
ethics
Ethics Project
In this exercise, you will research and then role-play a complicated ethical situation. The role
you play may or may not match your own personal beliefs, but your research and use of logic
will enable you to represent whichever view is assigned. An arbitrator will watch and com-
ment on both sides of the arguments, and together the team will agree on an ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has complained
about an employee blogging about a sensitive workplace issue such as cleanliness at a
food manufacturing facility or employee romances.
2. Team members should write a summary that provides background information for
their character—for example: employee, Human Resources manager, or arbitrator —
and details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
345
Under
the
Hood
346 Technology in Action
S OME PEOPLE ARE DRAWN TO UNDERSTANDING
things in detail, but many folks are happy just to have things work. If
you use a computer, you may not have ever been tempted to “look
under the hood.” However, without understanding the hardware inside,
you’ll be faced with some real limitations. You’ll have to pay a technician to fix or
upgrade your computer. This won’t be as efficient as fine-tuning it yourself, and you
may find yourself buying a new computer sooner than necessary. If you’re preparing
for a career in information technology, understanding computer hardware will affect
the speed and efficiency of the programs you design. And what about all those excit-
ing advances you hear about? How do you evaluate the impact of a new type of
memory or a new processor? A basic appreciation of how a computer system is built
and designed is a good start.
We’ll build on what you’ve learned about computer hardware in other chapters and
go under the hood, looking at the components of your system unit in more detail.
Let’s begin by looking at the building blocks of computers: switches.
Switches
The system unit is the box that contains the a computer does, such as processing data or
central electronic components of the computer. printing a report, is broken down into a series of
But how, exactly, does the computer perform all 0s and 1s. Electrical switches are devices inside
of its tasks? How does it process the data you the computer that can be flipped between these
input? The CPU performs functions like adding, two states: 1 and 0, signifying “on” and “off.”
subtracting, moving data around the system, and Computers use 0s and 1s to process data because
so on using nothing but a large number of on/off they are electronic, digital machines. They only
switches. In fact, a computer system can be understand two states of existence: on and off.
viewed as an enormous collection of on/off Inside a computer these two possibilities, or
switches. states, are represented using the binary switches
(or digits) 1 and 0.
ELECTRICAL SWITCHES You use various forms of switches every day.
Computers work exclusively with numbers, The on/off button on your DVD player is a
not words. To process data into information, mechanical switch: pushed in, it represents the
computers need to work in a language they un- value 1 (on), whereas popped out, it represents
derstand. This language, called binary language, the value 0 (off). Another switch you use
consists of just two numbers: 0 and 1. Everything each day is a water faucet. As shown in Figure 1,
FIGURE 2
Computers can be
constructed using vacuum
tubes (see inset). The
difference in size achieved
by moving from tubes to
transistors allowed
computers to become
desktop devices.
Base 2: 67 = 64 + 0 + 0 + 0 + 0 + 2 + 1
=(1 * 26) + (0 * 25) + (0 * 24) + (0 * 23) + (0 * 22) + (1 * 21) + (1 * 20)
=(1000011) base 2
It is easier to have a calculator do this for tem, meaning it uses 16 digits to represent
you! Some calculators have a button labeled numbers instead of the 10 digits used in base
DEC (for decimal) and another labeled BIN 10 or the 2 digits used in base 2. The 16 digits
(for binary). Using Windows, you can access it uses are the 10 numeric digits, 0 to 9, plus
the Scientific Calculator that supports six extra symbols: A, B, C, D, E, and F. Each
conversion between decimal (base 10) and of the letters A through F corresponds to a
binary (base 2) by choosing Start, All Pro- numeric value, so that A equals 10, B equals
grams, Accessories; then clicking Calculator; 11, and so on (see Figure 6). Therefore, the
00 00 08 08
01 01 09 09
02 02 10 A
03 03 11 B
04 04 12 C
05 05 13 D
06 06 14 E
07 07 15 F
ASCII Code Represents This Symbol ASCII Code Represents This Symbol
01000001 A 01100001 a
01000010 B 01100010 b
01000011 C 01100011 c
01011010 Z 00100011 #
00100001 ! 00100100 $
00100010 “ 00100101 %
Interpretation
All data inside the
computer is stored as
bits. Positive and neg-
ative numbers can be
stored using signed
integer notation, with
the first bit (the sign
bit) indicating the sign
and the rest of the bits
FIGURE 8
indicating the value of
The written languages of the world require thousands of different characters,
the number. Decimal
shown here. Unicode provides a system allowing digital representation of over
numbers are stored
1,100,000 unique characters.
according to the IEEE
floating-point stan-
dard, and letters and
symbols are stored according to the ASCII
modern and historic languages and nota- code or Unicode. All of these different num-
tional systems, including such languages ber systems and codes exist so that comput-
and writing systems as Tibetan, Tagalog, ers can store different types of information in
Japanese, and Canadian Aboriginal syllabics. their on/off switches. No matter what kind
As we continue to become a more global so- of data you input in a computer—a color, a
ciety, it is anticipated that Unicode will re- musical note, or a street address—that data
place ASCII as the standard character will be stored as a string of 1s and 0s. The im-
formatting code. portant lesson is that the interpretation of 0s
and 1s is what matters. The same binary pat-
Representing Decimal Numbers tern could represent a positive number, a
The binary number system also can repre- negative number, a fraction, or a letter.
sent a decimal number. How can a string of How does the computer know which inter-
1s and 0s capture the information in a value pretation to use for the 1s and 0s? When your
such as 99.368? Because every computer brain processes language, it takes the sounds
must store such numbers in the same way, you hear and uses the rules of English, along
the Institute of Electrical and Electronics En- with other clues, to build an interpretation of
gineers (IEEE) has established a standard the sound as a word. If you are in New York
called the floating-point standard that de- City and hear someone shout, “Hey, Lori!” you
scribes how numbers with fractional parts expect someone is saying hello to a friend. If
should be represented in the binary number you are in London and hear the same sound—
system. Using a 32-bit system, we can repre- “Hey! Lorry!”—you jump out of the way be-
sent an incredibly wide range of numbers. cause a truck is coming at you! You knew
The method dictated by the IEEE standard which interpretation to apply to the sound be-
works the same for any number with a deci- cause you had some other information—that
mal point, such as the number –0.75. The first you were in England.
digit, or bit (the sign bit), is used to indicate Likewise, the CPU is designed to under-
whether the number is positive or negative. stand a specific language or set of instruc-
The next eight bits store the magnitude of the tions. Certain instructions tell the CPU to
The CPU this chapter. Along the way, you’ll learn about the
machine cycle of the CPU, the movement of data
Machine Cycle between RAM and the CPU, and the hierarchy of the
different types of memory in computer systems.
Any program you run on your computer
is actually a long series of binary code de-
scribing a specific set of commands the CPU addition, subtraction, multiplication, divi-
must perform. These commands may be sion, and other mathematical and logical op-
coming from a user’s actions or may be in- erations at incredible speeds.
structions fed from a program while it exe-
cutes. Each CPU is somewhat different in the 4. STORE: The result is stored in one of
exact steps it follows to perform its tasks, but the registers, special memory storage areas
all CPUs must perform a series of similar built into the CPU, which are the most ex-
general steps. These steps, illustrated in pensive, fastest memory in your computer.
Figure 9, are referred to as a CPU machine The CPU is then ready to fetch the next set of
cycle (or processing cycle). bits encoding the next instruction.
1. FETCH: When any program begins to No matter what program you are running,
run, the 1s and 0s that make up the pro- be it a Web browser or a word processing
gram’s binary code must be “fetched” from program, and no matter how many pro-
their temporary storage location in random grams you are using at one time, the CPU
access memory (RAM) and moved to the performs these four steps over and over at
CPU before they can be executed. incredibly high speeds. Shortly, we’ll look at
each stage in more detail so that you can un-
2. DECODE: Once the program’s binary derstand the complexity of the CPU’s design,
code is in the CPU, it is decoded into the how to compare different CPUs on the mar-
commands the CPU understands. ket, and what enhancements you can expect
3. EXECUTE: Next, the CPU actually per- in CPU designs of the future. But first, let’s
forms the work described in the commands. examine a few of the CPU’s other compo-
RAM
Specialized hardware on the CPU performs nents that help it perform its tasks.
COMPUTER T tremendously each year. One strategy in use now for continuing that
trend is cluster computing. If one computer is powerful, then two
are twice as powerful—if you can get them to work together. A computing
cluster is a group of computers, connected by specialized clustering software,
NEED MORE that works together to solve complex equations. Most clusters work on
something called the balancing principle, whereby computational work is
POWER? transferred from overloaded (busy) computers in the cluster to computers
that have more computing resources available. Computing clusters, although
TEAM IT UP! not as fast as supercomputers (single computers with extremely high
processing capabilities), can perform computations faster than one computer
working alone and are used for complex calculations such as weather fore-
casting and graphics rendering. You can now rent time on computing clusters
through services like PurePowua (purepowua.com), where you can upload
and remotely control your job from your desktop as it runs on a cluster of
computers.
Clock Ticks
0 1 2 3 4 5 6 7
Clock Ticks
0 1 2 3 4 5 6 7
FIGURE 12
Instead of (a) waiting for each instruction to complete, (b) pipelining allows the system to work on more
than one set of instructions at one time.
TODAY’S upercomputers are the biggest and most powerful type of computer.
SUPER- S Scientists and engineers use these computers to solve complex prob-
lems or to perform massive computations. Some supercomputers are
single computers with multiple processors, whereas others consist of multiple
computers that work together.
COMPUTERS: The top spot on the June 2010 Top 500 List was won by the Cray Jaguar.
It operates at a peak of more than 2,300 teraflops (or 2,300 trillion opera-
THE FASTEST tions per second). That’s almost 23,000 times faster than the fastest personal
computer! Second position was the entry from China, the Nebulae.
OF THE FAST Check out the current crop of the world’s fastest supercomputers at the
Top 500 site (top500.org).
Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms
and concepts from this Technology in Focus feature.
1. Which is not a typical use of parallel processing 6. Special areas of memory storage built into the CPU
systems? are known as
a. Computer simulations a. switches. c. registers.
b. Word processing b. semiconductors. d. integrated circuits.
c. Weather modeling
7. Which is the correct set of steps in the machine cycle?
d. Graphics processing
a. Execute, store, fetch, decode
2. What is another name for the base 10 number system? b. Store, fetch, execute, decode
a. Decimal notation c. Decode, execute, fetch, store
b. Binary number system d. Fetch, decode, execute, store
c. Hexadecimal notation
8. All data inside the computer is stored as
d. Integer system
a. bytes. c. switches.
3. Which encoding scheme can represent the alphabets b. bits. d. cache memory.
of all modern and historic languages?
9. Which statement about pipelining is false?
a. Base 2 number system c. ASCII
a. Pipelining boosts CPU performance.
b. Unicode d. Scientific
b. Pipeline design is used in many modern CPUs.
4. Moore’s Law is best described as c. Pipelining requires a less complicated hardware
a. an observation of the rate of increasing transistor design.
density. d. The process allows the computer to process multi-
b. a physical principle. ple instructions simultaneously.
c. a legal construct limiting performance.
10. From fastest to slowest, which is the fastest sequence
d. an advertising campaign by Intel.
of accessing memory?
5. To regulate the internal timing of a computer system, a. RAM, Level 1 cache, Level 2 cache, Level 3 cache
the motherboard uses b. Registers, Level 1 cache, Level 2 cache, RAM
a. a system clock. c. RAM. c. Level 1 cache, Level 2 cache, RAM, registers
b. software simulation. d. a register. d. Level 2 cache, Level 1 cache, registers, RAM
digital lifestyle:
managing digital data and devices
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What are the changes that have brought us a digital lifestyle? (pp. 364–365)
2. How has the move to digital information affected the communication tools important
to both the business world and life outside of work? (p. 366)
3. How do cell phone and smartphone components resemble a traditional computer,
and how do they work? (pp. 366–374)
4. Why would I use VoIP, and what does it offer that is unique? (pp. 374–376)
5. How is digital media different from analog? (p. 377)
6. What can I carry in a portable media player, and how does it store data? (pp. 377–381)
7. What ways are there for me to create and to watch digital video? (pp. 386–391)
8. What changes does ubiquitous computing bring to our lifestyles? (pp. 393–397)
multimedia resources
multimedia
resources
Active Helpdesk
• Keeping Your Data on Hand (p. 376)
• Using Portable Media Players (p. 380)
Sound Bytes
• Smartphones Are Really Smart (p. 369)
• Connecting with Bluetooth (p. 371)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? TiVo is not the only game in
town! PVR (personal video recorder) software is now available, free of charge, for every
style of operating system. Using a PVR, you can record standard or HD television
broadcasts on your hard drive and then watch them when you have the time. Free
programs like XBMC Media Center and MeediOS let you pause and rewind
live TV shows and include features that allow you to automatically detect and skip
commercials. You even have access to a TV listings guide and can schedule
your PVR from any location using the Web.
363
A Digital Lifestyle digital formats. Phone systems and televi-
sion signals are now digital streams of data.
Computers today are central to everyday What is special about digital? Any
life. Which part of your life isn’t touched by kind of information can be digitized (meas-
some sort of computer or digital technol- ured and converted to a stream of numeric
ogy? Computer-like devices (such as smart- values). Consider sound. It is carried to your
phones and iPods) are everywhere. Much ears by sound waves, which are actually
of your entertainment—playing games, patterns of pressure changes in the air.
watching movies and television, and Images are our interpretation of the chang-
downloading songs—is probably delivered ing intensity of light waves around us.
via the Internet. These sound and light waves are called
Do you really understand how all this analog waves or continuous waves. They
digital technology works? Do you know all illustrate the loudness of a sound or the
of your options so you can enjoy the digital brightness of the colors in an image at a
devices you purchase to the fullest extent? given moment in time. They are continuous
In this chapter, we explore the key aspects of signals because you would never have to lift
your digital life—digital communication, your pencil off the page to draw them; they
digital entertainment, and digital mobility— are just long, continuous lines.
and help you understand how the related First-generation recording devices such as
technologies work so you can use them to vinyl records and analog television broad-
your best advantage. casts were designed to reproduce these
When did everything go sound and light waves. A needle in the
“digital”? It used to be that everything groove of a vinyl record vibrates in the same
was analog. Today, no matter what you’re pattern as the original sound wave. Analog
interested in—music, movies, television, television signals are actually waves that tell
radio, stock prices—digital information is an analog TV how to display the same color
the key. All forms of entertainment have mi- and brightness as is seen in the production
grated to the digital domain (see Figure 8.1). studio. However, it’s difficult to describe a
MP3 files encode digital forms of music, and wave, even mathematically. The simplest
digital cameras and video camcorders are sounds, such as that of middle C on a piano,
now commonplace. In Hollywood, some have the simplest shapes, like the one
feature films are now being shot entirely shown in Figure 8.2. However, something
with digital equipment, and many movie like the word hello generates a highly
theaters use digital projection equipment. complex pattern, like the one shown in
Satellite radio systems such as Sirius Satel- Figure 8.2.
lite Radio and HD Radio are broadcast in What advantages do digital for-
mats have over analog ones? Digital
Figure 8.1 ANALOG VERSUS DIGITAL ENTERTAINMENT formats describe signals as long strings of
numbers. This digital representation gives
Analog Digital
us a simple way to describe sound and light
Music Vinyl record albums and CDs and MP3 files waves exactly so that sounds and images
cassette tapes can be reproduced perfectly each time. In
Photography 35-mm single lens reflex Digital cameras, including addition, we already have easy ways to
(SLR) cameras digital SLRs distribute digital information (on CDs and
Photos stored on film Photos stored as digital files DVDs and using e-mail, for example). Thus,
digital information can be reproduced
Video 8-mm, VHS, and Hi8 High Definition Digital video exactly and distributed easily. Both give it
camcorders (DV) camcorders
huge advantages over analog.
Film stored on tapes Film stored as digital files;
distributed on DVD and
How can a sequence of numbers
Blu-ray discs and express complicated analog
streamed shapes? The answer is provided by
something called analog-to-digital conversion.
Radio AM/FM radio HD Radio
In analog-to-digital conversion, the incom-
Sirius/XM Radio ing analog signal is measured many times
Television Conventional broadcast High Definition Digital each second. The strength of the signal at
analog TV television (HDTV) each measurement is recorded as a simple
number. The series of numbers produced by
Middle C
“Hello”
Figure 8.2
the analog-to-digital conversion process media—like photographs, music, and (a) This is an analog wave
gives us the digital form of the wave. video—switched over to a digital standard, showing the simple, pure
Figure 8.3 shows analog and digital versions we began to have products with new sound of a piano playing
of the same wave. In Figure 8.3a, you see the and useful capabilities. Small devices can middle C. (b) This is the
original, continuous analog wave. You could now hold huge collections of a variety of complex wave produced
when a person says
draw that wave without lifting your pencil types of information. We can interact with “Hello.”
from the page. In Figure 8.3b, the wave has our information any time we like, in ways
been digitized and is no longer a single line; that, prior to the conversion to digital
instead, it is represented as a series of points media, had been too expensive or too
or numbers. difficult to learn. The implications of the
How has the change from analog shift to digital media are continually
to digital technologies affected our evolving. Let’s examine the many ways in
lifestyle? When the market for which digital media has already changed
communication devices for entertainment our lifestyles.
Figure 8.3
a Analog Sound Wave b Digitized Sound Wave
(a) A simple analog wave.
(b) A digitized version of
the same wave.
1 5 10 15 20 25 30 35 1 5 10 15 20 25 30 35
TIME TIME
a c
Figure 8.5
(including the operating system) remains in What input and output devices do
(a) Symbian, (b) Windows
Mobile, and (c) Android memory. cell phones use? The primary input
are all cell/smartphone Other phone data, such as ring tones, is devices for a cell phone are a microphone
operating systems. stored in separate internal memory chips. and a keypad. Some phones, such as the
Full-featured cell phones have as many as Samsung Impression (see Figure 8.7), feature
200 MB of internal memory (with some both a hidden keyboard (to make sending
smartphones carrying 1 GB internally) and e-mail or text messages more efficient) and a
support additional memory through micro touch-sensitive screen. The Apple iPhone
SD flash cards that can store up to 32 GB. uses its touch-sensitive screen to offer a
Micro SD cards are easy to install in a software-based keyboard (see Figure 8.7)
phone, as shown in Figure 8.6, while some that supports more than 40 languages.
models simply have external slots for an Cell phones often include a digital cam-
SD card. You can use that storage for contact era for capturing photos and video. These
data, ring tones, images, songs, videos, cameras are catching up to the quality level
and even software applications such as a of standalone point-and-shoot cameras. For
language translators or video games. Not example, the Droid Incredible offers a high-
Figure 8.6 every smartphone allows memory upgrades quality 8-megapixel (MP) camera with flash
You can insert additional in this way, however. For example, the and video capture, and the Nokia N8 sports
memory by installing a iPhone series does not allow you to add a 12 MP camera with Carl Zeiss lenses. Most
micro SD flash card in a any memory. cameras on cell phones can record video as
smartphone.
well as take still shots. Picture and video
messaging is popular with many smart-
phone users. They can transmit photos and
video files via e-mail, post the files to Web
sites such as Facebook, or send them directly
to other phones.
Cell phone output devices include a
speaker and a liquid crystal display (LCD).
Higher-end models include full-color, high-
resolution LCD screens. Newer on the mar-
ket are OLED (organic light-emitting diode)
displays, which allow very bright, sharp im-
aging and draw less power. High-resolution
displays are becoming increasingly popular
because more people are using their cell
phones to send and receive the digital im-
ages included in multimedia text messages
Figure 8.8
The Mobile DTV system
allows local TV stations to
Single frequency broadcast live, digital
network (SFN) content to mobile devices.
44636 (4Info) 4INFO 4info.net Similar to Google SMS, but also handles flight information and horoscopes.
242 242 (cha cha) ChaCha chacha.com Human “guides” provide answers to any question in conversational English.
3109043113 411sms 411sms.com Offers address and phone listings, turn-by-turn directions, movie show times, stock
quotes, hot spot locations, dictionary definitions, horoscopes, and foreign language
translations.
10
2
Mbps
include photos) and downloading informa-
12
0
tion (such as from a company intranet or the
Internet) can take place much more quickly. 3G 300 major markets 6 0.6–2.3
4 8
Of course if you are in range of a WiFi signal,
10
2
that is going to be a much faster transfer Mbps
12
option. EDGE and 3G have advantages over
0
WiFi, however. They are more reliable and
less susceptible to interference. Moreover, WiFi WiFi hot spots 6 4–5
4 8
you won’t have to hunt for a WiFi hot spot,
10
2
Mbps
because these technologies are used to blan-
12
0
ket major urban areas with connectivity.
4G networks are beginning to be rolled
out across the United States. The promise of 4G Major cities 6 5–12
4 8
4G is incredible: mobile connection speeds
10
2
Mbps
of up to 100 Mbps. Currently, most
12
0
providers can deliver speeds of 3 Mbps to
6 Mbps. The expansion of 4G will usher in
a new generation of mobile devices and Note: Speeds will vary depending on provider and location.
applications that will continue to expand
how we think of mobile computing.
How can I survive when I find I
have no WiFi signal? There are devices
available that will instantly create a mobile tells you there are no available wireless net-
hot spot for you. MiFi (pronounced “my fi”) works as long as you have 3G signal.
devices, like the Verizon model shown in How do smartphones display con-
Figure 8.14, are often available free with a tent from the Internet? On smart-
new account from major Internet providers phones that have a limited amount of screen
like Verizon and Sprint. The MiFi can fit in a space, it is difficult to view Web pages with-
shirt pocket and run for up to four hours on out a great deal of horizontal scrolling. This
a single charge. It connects to the Internet is because most Web sites are designed for
through the 3G wireless phone network and viewing on desktop monitors, which have
then distributes the WiFi signal over an area much wider pixel widths than mobile
of 30 feet. These personal hot spots can then screens. To enhance your Internet browsing
support up to five WiFi- experience on
enabled devices. mobile devices,
An iPhone 3G has special micro-
a similar capability. It browser software
can connect to your runs on your
notebook computer phone.
through wireless Microbrowser
Bluetooth, and software provides
then provide In- a Web browser that
ternet access is optimized to dis-
through the 3G play Web content
network signal. effectively on the
This “Bluetooth smaller screen (see
tethering” Figure 8.15). Popular
makes sure your versions of micro-
computer can Figure 8.14 browser software in-
access the Inter- A MiFi device turns your 3G phone signal into a WiFi con- clude Internet Explorer
net even when it nection for you and four of your friends. Mobile (included with
Sansa Fuze 2000 songs or 24 hours 2 GB to 8 GB None but USB 2.0 port FM radio, voice recorder and
Player of video 16 GB micro available “radio” cards prefilled
SD card with 1000 songs.
supported
Zune HD As many as 16,000 16 to 64 GB None USB 2.0 port or Has HD radio, OLED screen,
songs or 20 hours of HD wireless multitouch navigation.
video
Apple As many as 14,000 8 GB to 64 GB None USB 2.0 port Weighs only 4.05 ounces; flash
iPod songs or 80 hours of memory enables skip-free
touch video playback.
Apple As many as 40,000 None 160 GB USB 2.0 port Has calendar feature that syncs
iPod songs or 200 hours of with Outlook; can serve as a
classic video small, portable hard drive.
Archos 7 As many as 2,000 songs 2 GB to 8 GB None but USB 2.0 port Includes 7⬙ screen display, WiFi,
or 24 hours of video 32 GB and touch screen.
SDHC card
supported
(although they hold far less music than the iTunes Music Store, for example, you
iPod). Figure 8.19 shows several models of receive an .aac format file. AAC files can be
PMPs, all of which connect to computers via played only on iPods but can be converted
USB 2.0 ports. to the more widely used MP3 or Windows
Are all music files MP3 files? The Media Audio (WMA) formats. WMA files
letters at the end of a file name (the file can be played on a wide variety of MP3
extension) indicate how the data in the file is players. Most PMPs that support video
organized. MP3 is the name of just one type playback can play a wide range of video
of file format used to store digital music, but formats.
many others exist, such as AAC and WMA. Are PMP devices the only choice
There are also many video formats such as for portable media management?
DivX, MPEG-4 (which usually has an .mp4 PMP devices are not the only choice for
extension), WMV, and XviD. All file formats portable media management. A number of
compete on sound and video quality and electronic devices now incorporate the
compression, which relates to how small the capability to carry electronic files and play
file can be and still provide high-quality music and video files. Some models of
playback. If you buy a song from the digital cameras, such as the Samsung NV3,
Subscribe to
new podcast
Video podcast
Download
past episodes
Explicit content
warning
Moving Picture Experts Group (MPEG) .mpg MPEG-4 video standard adopted internationally in
.mpeg 2000; recognized by most video player software.
.mp4
Windows Media Video .wmv Microsoft file format recognized by Windows Media
Player (included with the Windows OS).
Microsoft Video for Windows .avi Microsoft file format recognized by Windows Media
Player (included with the Windows OS).
Adobe Flash Video .flv Adobe Flash video format, sometimes embedded in
Shockwave files (*.swf).
So you just returned from your trip to the Grand Canyon and all your Georgia could use one of your photos under this license because it is not
friends are raving about the quality of the photographs you took. You de- profiting from its use.
cide to put the photographs out on Flickr so your friends can see them. Both of these licenses can also be used to cover derivative works. A
You also think that maybe someone might see your photos and want to derivative work is based on the original work (one of your photos) but is
use them in a commercial publication such as a magazine. Because you modified in some way. The ad agency that wants to modify one of your
own the copyright to your photos, you control how they can be used— photos is seeking permission to create a derivative work. If you had used
and you want to protect your rights. You add a disclaimer to Flickr indi- an attribution license, the ad agency could use your work for a derivative
cating that all rights are reserved on your photos. Anyone who wants to purpose, but only if it attributed the original work to you as the author. If
use them will need to contact you and request permission. you had used a noncommercial license, the ad agency could not use your
All of a sudden, you are bombarded by dozens of requests for per- work to make a profit for itself.
mission to use your photographs for all sorts of purposes. A high school The obvious advantage to using these Creative Commons licenses is
student in Illinois wants to feature one of your photos on her travel blog. that people won’t constantly annoy you with permission requests to use
A church in Georgia wants to use a photo for their newsletter to illustrate your work. These licenses explain exactly how you are willing to have
a story about a church member’s trip to Arizona. An advertising agency in your work be used. Also, many advocates of copyleft policies feel that
Seattle wants to modify your sunrise photo by inserting a family on a creativity is encouraged when people are free to modify other people’s
camping trip into the photo. You want to be ethical and protect your own- work instead of worrying about infringing on copyright.
ership rights as well (maybe the ad agency might even pay you!), but Opponents of Creative Commons licenses often complain that these
how are you going to manage all these photo permission requests? licenses have affected their livelihoods. If millions of images are out on
Copyleft, a play on the word copyright, is designed for this situation. Flickr with Creative Commons licenses that permit free commercial use,
Copyleft is a term for various licensing plans that enables copyright hold- professional photographers might have a tougher time selling their work.
ers to grant certain rights to the work while retaining other rights. The Furthermore, Creative Commons licenses are irrevocable. If you make a
GNU General Public License is a popular copyleft license that is used for mistake and select the wrong license for your work, or you later find out
software. For other works, the Creative Commons, a nonprofit organiza- a work is valuable and you’ve already selected a license that allows
tion, has developed a range of licenses that can be used to control rights commercial use, you’re out of luck.
to works. Many people find listings of Creative Commons licenses confusing. If
Creative Commons has various types of licenses available based on there is a Creative Commons disclaimer at the bottom of a group of pho-
the rights you wish to grant. The company provides a simple form to as- tos, does that mean all the photos are available under that license, or just
sist you with selecting the proper license for your work. Creative Com- some of them? What actually constitutes commercial use? Is displaying
mons provides two licenses at creativecommons.org/about/licenses Google Adsense ads on your blog commercial use?
that could simplify your life. An attribution license permits others to copy, Each of us needs to carefully consider the value of our intellectual
distribute, and display your copyrighted work, but only if they give you property and decide how best to conduct our digital livelihood.
credit in the way you specify. Under this license, the high school student Understanding the meaning of copyright, and copyleft, is important both
could use one of your photos as long as he or she gave you credit. so that you respect the rights of others and so that you can simplify your
A noncommercial license allows anyone to copy, distribute, and dis- life in granting permission rights to the works you create.
play your work, but only for noncommercial purposes. The church in
Your choice of file format for your fin- (compression/decompression) is a rule, im-
ished video will depend on what you want plemented in either software or hardware,
to do with your video. For example, the that squeezes the same audio and video in-
QuickTime streaming file format is a great formation into less space. Some information
choice if your file is really large and you will be lost using compression, and there are
plan to post it on the Web. The Microsoft several different codecs to choose from, each
AVI format is a good choice if you’re send- claiming better performance than its com-
ing your file to a wide range of users, be- petitors. Commonly used codecs include
cause it’s extremely popular and is MPEG-4, H.264, and DivX. There is no one
commonly accepted as the standard video codec that is always superior—a codec that
format for the Windows Media Player. works well for a simple interview may not do
You also can try different compression a good job compressing a live-action scene.
choices to see which one does a better job of What if I want a DVD with a menu-
compressing your particular file. A codec ing system? If you want a DVD with a
Figure 8.36
The smart wine rack uses WineM technology and answers queries from its controller, (a) like “Show me all of the
California wines I have that are ready to drink and under $50 in value.” (b) In response WineM lights up the bottles
that fit the criteria.
a b
Figure 8.39
Sixth Sense recognizes what information you need added to your environment and displays it automatically.
idea that has appealed to futurists through- human rights abuses throughout the world
out time. Writer and futurist Jamais Cascio (witness.org). Their slogan is “See it. Film it.
has presented ideas of how such a setting Change it.” Similar efforts are aimed at docu-
might bring all citizens into a more engaged menting the environmental state of the
role in changing the world. In his TED talk world. Environmental successes can be col-
“The Future We Will Create” (ted.com), Cas- lected together along with evidence to docu-
cio discusses how a smartphone-carrying ment ecological crimes.
population can work to create a better What if each of the cell phones
world—more sustainable, more secure, and distributed around the world had
more desirable. integrated atmospheric sensors?
Having an international population armed Then millions of points around the world
with cameras and a means to quickly distrib- would be “reporting” in on quality of air
ute their video allows the invisible to become and water. And what if these sensors could
visible in many ways (see Figure 8.42). This monitor for flu viruses? Tagged with geo-
transparency can be used to let us see the graphical information, the data could be
consequences of our behavior directly—and combined with maps for easy viewing and
make changes. The Witness Project, founded analysis. Ideas like these are being explored
by Peter Gabriel, uses this strategy to stop by UCLA researcher Dr. Deborah Estrin, the
Figure 8.41
Augmented reality apps let you look through
your phone’s camera and see the world with
extra information superimposed.
Figure 8.42
Using mobile devices we could document the environ-
mental dangers and successes around the world.
1. What are the changes that have work in the same way as in a computer to
brought us a digital lifestyle? process information and support communi-
The increased use of digital information has cations, software applications, and other
services.
summary
chapter
7. What ways are there for me to create 8. What changes does ubiquitous
and to watch digital video? computing bring to our lifestyles?
You can create digital video using any digi- As computers become smaller and less obvi-
summary
tal camera, webcam, or digital camcorder. ous, they will begin to integrate into our life-
Digital editing software allows you to add like appliances rather than be complicated
transitions, effects, and sound tracks. There tools. Ubiquitous computing is beginning to
are a great many sources of digital video, in- allow us to move some objects from an own-
cluding free sources like YouTube and ership model to a subscription service
JustIn, as well as pay-per-view services like model.
Amazon Video On Demand or cable
providers’ streaming video options.
399
eight
eight key terms
chapter
chapter
Word Bank
• analog-to-digital converter • MMS • SMS
• Bluetooth • netbook • synchronize
buzzwords
• cell phone • P2P • telephony
• GPS • PMP • ubiquitous computing
• Internet tablet • sampling rate • VoIP
• microbrowser • smartphone • WML
Instructions: Fill in the blanks using the words from the Word Bank above.
Elizabeth knows that everything seems to be “digital” these days. In the past, she carried a
traditional SLR camera but now she uses her simple (1) __________ to take photos. She
can connect wirelessly to the computer to transfer the images because the phone supports
(2) __________. Sometimes she doesn’t bother to do that because she has already sent a(n)
(3) __________ message to a friend with the image. Her old phone couldn’t do that because
it only supported (4) __________. If she upgraded to a(n) (5) __________, she could actually
make many refinements and edits to the image without transferring it to the computer at all.
Pete is a real fan of technology, and so he has selected a(n) (6) __________ instead of a cell
phone. He’s always near a WiFi signal, so he doesn’t need an actual phone. He doesn’t even
pay for traditional phone service at home, where he uses (7) __________ instead of a
landline. He’s fallen in love with his new device for many reasons. It can give him driving
directions with its built-in (8) __________. The (9) __________ software displays full HTML
Web pages right on the device. To keep this device coordinated with the data on his
computer, he makes sure to (10) __________ the data each night.
Niti can’t quite decide what device will work best for his new life. He’s moving to
California and plans to be outside a lot, so he wants something very light. He thinks the
two-pound (11) __________ might be ideal because he doesn’t really need a full keyboard or
a huge screen. When he’s out biking, he’ll just wear his (12) __________ on his arm to keep
the tunes flowing. He downloads free songs offered by bands that are just starting out from
a(n) (13) __________ site. The songs have a much lower (14) __________ than he usually
computer
demands, but at least they don’t take up much space on his hard drive. He’s heard that
electronics are merging with clothing more and more, so maybe soon (15) __________ will
lead to a T-shirt that can take care of his mobile music needs!
becoming
literate
becoming
computer literate
Instructions: Write a report providing answers to the question posed below, using as
many of the key terms from the chapter as you can. Be sure the sentences are grammatically
and technically correct.
You have a limited budget to spend on technology tools and toys in the years you will be a
student. You are considering communication, entertainment media, and your need to be
able to work and connect with your information when you are not at home. Which digital
media services and products would you definitely invest in? How would you justify their
value? What kinds of services and products would you use that are free or low cost? Has
the migration to a digital lifestyle given you more freedom and creativity or just caused
you more annoyance and expense?
401
eight
eight self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. All smartphones allow you to add more memory.
_____ 2. Digital music files must be converted to the MP3 format if they are transferred to a
mobile device.
_____ 3. A codec is the algorithm that compresses and decompresses video files.
_____ 4. If your digital camera doesn’t support wireless connectivity, you can use a
memory card with built-in WiFi.
_____ 5. Some Internet-enabled devices like the Nokia N810 Internet tablet use Skype for
voice communications instead of cell phone service.
chapter
transition to...
next semester
1. Choosing Mobile Devices to Fit Your Needs
transition to...
As a student, which devices discussed in this chapter would have the most immediate
impact on the work you do each day? Which would provide the best value (that is, the
greatest increase in productivity and organization per dollar spent)? Consider the full
range of devices, from cell phones to notebook systems.
next semester
making the
2. Ready... Set... Act!
As a student, you often give presentations or take on student teaching assignments.
What would be the steps for creating a digital video recording of one of your presenta-
tions? What tools would you need to record? What kind of file would you end up pro-
ducing? How would you make a DVD from that? How would you distribute the video
to a live Internet audience?
3. Do You Still Need a Phone?
Explore Skype (skype.com) as an alternative to paid telephone service. What equip-
ment would you need to use Skype as your everyday communication medium? When
would this be useful? What telephone services and features would you lose if you went
to Skype?
4. Choosing the Best Phone
Your friend wants to trim down the number of different devices that she carries. Visit
the most popular cellular providers’ Web sites and research options. Which phone
would you recommend to your friend, and why? Compare at least three different
models of phones and list their price, music storage capacity, built-in memory, and
expandability options.
a. Which of the three models you compared is the best value for your friend?
b. What special features does the phone you chose have? What accessories would you
recommend your friend buy to make the phone more useful?
c. Would you suggest buying a refurbished phone? Why or why not?
5. iTunes U
Download a free copy of iTunes software. In the iTunes Store, explore the iTunes U
podcast directory, which contains free audio and video lectures published by major
universities.
a. Look for the MIT Open Courseware video podcasts. How many lectures are
available from MIT (Massachusetts Institute of Technology)?
b. If each lecture were 90 minutes on average and approximately 200 MB in size, how
much storage would it take to save all of the video lectures in every course
published by MIT?
c. Is there a mobile device that can store and play that much content? What devices
could store the lectures from all of the courses in mathematics offered by MIT Open
Courseware?
403
making the
eight
eight
chapter
transition to...
the workplace the workplace
1. Corporate Mobile Communications Needs
making the
Imagine your company is boosting its sales force and looking to the future of mobile
transition to...
technology. Your manager has asked you to research the following issues surrounding
mobile communications for the company:
a. Do mobile communication devices present increased security risks? What would
happen if you left a cell phone at a meeting and a competitor picked it up? Are there
ways to protect your data on mobile devices?
b. Can viruses attack cell phones? Is there any special software on the market to pro-
tect mobile devices from viruses? How much would it cost to equip 20 devices with
virus protection?
c. Is there a role for mobile communication devices even if employees don’t leave the
building? Which devices would be important for a company to consider for use
within corporate offices? Are there software solutions that would work as well?
d. Should employees be allowed to use smartphones provided by the company for
personal use even though files related to personal use might eat up potentially valu-
able memory and space? What restrictions should be put on personal use to protect
the privacy of proprietary company information contained on the devices?
2. 4G Communications
The most recent generation of telecommunications (nicknamed “4G” for fourth genera-
tion) allows the speed of cellular network transmissions to hit 3-6 Mbps. How does that
compare to dial-up and broadband access over wired networks? What implications
does it have for information access and e-commerce? What download speed would be
ideal? Upload speed? How would it change how you communicate?
3. Subscription versus Ownership
Consider the examples of Call-a-Bike and CarShare. Are there other businesses you can
identify that would be able to take advantage of digital information and become sub-
scription services instead of vendors of a physical product? What are the advantages to
the consumer of subscription over ownership? What are the drawbacks?
4. Too Much Media?
Imagine you are a manager of 18 employees, all of whom work with constant Internet
access. As a manager, what concerns might you have about their use of corporate band-
width to download and view media files? Do you think it would benefit your business
to block any MP3 file transfers? Should you put in place a block to prevent access to
sites that store huge numbers of streaming videos? As a manager, are there concerns
you might have if employees have digital cameras on their cell phones? Would your
answers be different in an academic setting?
5. Mobile Devices on the Highway
Mobile devices used in vehicles are becoming the norm in today’s society. Consider the
following:
a. Several car manufacturers provide Bluetooth option packages for their vehicles.
What advantages are there to having Bluetooth connectivity in your car? Are there
any disadvantages?
b. Examine the Microsoft Sync software package. List the features and services it pro-
vides. If you were a salesperson with a territory that you covered by car, how would
Sync help you?
chapter
questions
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Digital Entertainment
Can you name a style of media that has not made the shift to digital? What advantages
does digital photography offer? Digital video? What disadvantages come along with a
digital format for entertainment media? Has the growth in digital media promoted an
increased understanding between people or has it created more isolation?
5. Electronic Publishing
Explore the specifications of the Sony Portable Reader, the Barnes & Noble NOOK, the
Amazon Kindle, and the Apple iPad. How would your study habits change if your
textbooks were only delivered to you in electronic format on one of these devices?
What unique advantages would there be? What disadvantages would there be? How
would using such a device compare with just receiving the book as an electronic file,
such as a PDF document, to your notebook computer?
405
eight
eight team time
chapter
Problem
team time
There are so many different mobile devices saturating the market that many people are left
in a state of confusion. Either they are buying too many devices and not using them, or
they are refusing to buy anything because of the dilemma of too many choices.
Task
Each team will assign a member to become the expert resource in one of the digital areas
presented in this chapter: digital communication, digital media, or digital mobility. For
each scenario described by a client, the group will select the minimum set of devices that
would support and enhance the client’s life.
Process
1. Consider the following three clients:
• A retired couple who now travel for pleasure a great deal. They want to be involved
in their grandchildren’s lives and will need support for their health and personal
care as they age.
• A young family with two children, two working parents, and a tight budget.
• A couple in which each individual is a physician and both adore technology.
2. Make two recommendations for your client in terms of digital technologies that will
enhance their business or their lifestyle. Discuss the advantages and disadvantages of
each technology. Consider value, reliability, computing needs, training needed and
communication needs, as well as expandability for the future.
3. As a group, prepare a final report that considers the costs, availability, and unique
features of the recommendations you have made for each client.
4. Bring the research materials from the individual team meetings to class. Looking at the
clients’ needs, make final decisions as to which digital technologies are best suited for
each client.
Conclusion
Digital information has allowed the development of a new style of living, both at home
and at work. With so many digital solutions on the market today, recommending digital
communication, media management, and mobility options needs to focus on converging to
the minimum set of tools that will enhance life without adding complication to it.
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together the team will agree on an
ethical solution.
Process
Divide the class into teams.
1. Research the sources cited above and devise a scenario in which mobile access could
make an impact politically or environmentally.
2. Team members should write a summary that provides background information for
their character—for example: business owner, politician, reporter, and arbitrator—and
details their character’s behaviors to set the stage for the role-playing event. Then, team
members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
407
chapter
nine nine
securing your
system
protecting your digital data and devices
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. From which types of viruses do I need to protect my computer? (pp. 411–414)
2. What can I do to protect my computer from viruses? (pp. 414–417)
3. How can hackers attack my computing devices, and what harm can they cause?
(pp. 417–421)
4. What is a firewall, and how does it keep my computer safe from hackers? (pp. 421–425)
5. How do I create secure passwords and manage all of my passwords? (pp. 425–428)
6. How can I surf the Internet anonymously and use biometric authentication devices to
protect my data? (pp. 428–429)
7. How do I manage online annoyances such as spyware and spam? (pp. 429–434)
8. What data do I need to back up, and what are the best methods for doing so?
(pp. 435–438)
9. What is social engineering, and how do I avoid falling prey to phishing and hoaxes?
(pp. 438–441)
10. How do I protect my physical computing assets from environmental hazards, power
surges, and theft? (pp. 441–445)
multimedia resources
multimedia
resources
Active Helpdesk
• Avoiding Computer Viruses (p. 414)
• Understanding Firewalls (p. 421)
Sound Bytes
• Protecting Your Computer (p. 416)
• Installing a Personal Firewall (p. 424)
• Surge Protectors (p. 443)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Protect your surfing like a
pro. When you use public hotspots to surf, your Internet activity is subject
to snooping by prying eyes. Hotspot Shield (hotspotshield.com) is a free
software utility that ensures all of your data is transmitted across the
Internet through a virtual private network (VPN). A VPN is a secure Internet pathway
that large corporations use to protect sensitive data. Using the VPN shields
your data, such as information in forms you fill
out, credit card data, instant messages, and Web
browsing activities, from prying eyes. So install
Hotspot Shield today and increase your
level of protection.
409
Keeping Your spam, a recent survey by the Messaging
Anti-Abuse Working Group (MAAWG)
Data Safe found that half of e-mail users in North
The media is full of stories about malicious American and Europe have opened spam.
computer programs damaging computers, And the MAAWG discovered that 46 per-
criminals stealing people’s identities online, cent of people who opened spam did so
and attacks on corporate Web sites that have intentionally—out of idle curiosity, to follow
brought major corporations to a standstill. links to unsubscribe to unwanted e-mails
These are examples of cybercrime, which is (which only brings more spam), or because
defined as any criminal action perpetrated they are interested in the product being
primarily through the use of a computer. touted. Clearly, we are often our own worst
The existence of cybercrime means that com- enemies!
puter users must take precautions to protect Are computer viruses a type of
themselves (see Figure 9.1). cybercrime? A computer virus is a
Who perpetrates computer program that
computer crimes? attaches itself to another
Cybercriminals are indi- computer program
viduals who use comput- (known as the host pro-
ers, networks, and the gram) and attempts to
Internet to perpetrate spread to other comput-
crime. Anyone with a ers when files are ex-
computer and the where- changed. Creating and
withal to arm him- or disseminating computer
herself with the appropri- viruses is one of the most
ate knowledge can be a widespread types of
cybercriminal. cybercrimes. Tens of
What kinds of thousands of new viruses
cybercrimes are or modified versions of
conducted over the old viruses are released
Internet? The Internet each year. Some viruses
Crime Complaint Center cause only minor annoy-
(IC3) is a partnership be- ances, while others cause
tween the Federal Bureau destruction of data.
of Investigation (FBI) and Many viruses are now
the National White designed to gather sensi-
Figure 9.1
Collar Crime Center tive information such as
(NW3C). In 2009, the lat- Cybercrimes, including virus attacks, are a credit card numbers. The
est year for which data is serious problem for Web surfers. Conficker virus was the
available, IC3 processed most widespread in 2009
more than 336,000 complaints related to and infected millions of computers in a few
Internet crime, an increase of 22 percent weeks of its release, which illustrates how
over 2008. Many complaints were fraud serious a threat a virus can pose to your dig-
related, such as auction fraud, nondelivery ital security. You need to make sure your
of ordered items, credit and debit card data is protected from viruses and other
fraud, and advanced fee scams. Complaints malicious software attacks.
not related to fraud still pertained to serious Does cybercrime include the theft
issues such as computer intrusions, unso- of computing devices? Although
licited e-mail, and child pornography. Much theft of computer equipment is not classified
of the credit card fraud was perpetrated as a cybercrime (rather, it is considered
when credit card numbers were stolen by larceny), the theft of notebook computers,
criminals tricking people into revealing sen- cell phones, iPods, and other portable
sitive information or by computer programs computing devices is on the rise. The resale
that gather credit card data. value for used electronic equipment is
With all the news coverage about high, which contributes to demand for
cybercrimes, aren’t people being stolen merchandise. The ease with which
more cautious? Unfortunately, they are equipment can be sold online also fuels this
not. Although most people are aware of problem.
410 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
In this chapter, we discuss serious threats virus infection, as is e-mail, although
to your digital security (such as computer many people have misconceptions about
viruses and other activities of cybercrimi- how e-mail infection occurs. Just opening an
nals), less serious annoyances (such as spy- e-mail message will not usually infect your
ware and spam), and good security practices computer with a virus, although some new
to keep yourself from undermining your viruses are launched when viewed in the
digital security. We also discuss methods for preview pane of your e-mail software.
protecting your digital assets from attacks Downloading or running a file that is
and damage. attached to the e-mail is a common way that
your computer becomes infected. Thus, be
extremely wary of e-mail attachments,
Computer Threats: especially if you don’t know the sender.
Figure 9.2 illustrates the steps by which
Computer Viruses computer viruses are often passed from one
Computer viruses are threatening because computer to the next:
they are engineered to evade detection. 1. An individual writes a virus program
Viruses normally attempt to hide within the disguised as a music file of a popular
code of a host program to avoid detection. music group’s new hit song and posts
And viruses are not just limited to comput- it to a file sharing site.
ers. Any computing device such as a smart-
2. Unsuspecting Bill downloads the
phone, notebook, netbook, or iPad can be
“music file” and infects his computer.
infected with a virus. Even
your car, which now con- 3. Bill sends his cousin Fred an
“
tains embedded computer e-mail with the infected
systems, could catch a virus,
Viruses are not “music file” and contami-
especially if it connects to just limited to nates Fred’s computer.
the Internet for software computers. 4. Fred saves the MP3 file to a
updates.
What do computer
viruses do? A computer virus’s main
” flash drive and
then copies it to his
work computer and infects that ma-
purpose is to replicate itself and copy its chine as well.
code into as many other files as possible.
5. Everyone who copies files from
Although virus replication can slow down
Fred’s infected computer at work, or
networks, it is not usually the main threat.
whose computer is networked to
The majority of viruses have secondary
Fred’s computer, risks spreading the
objectives or side effects, ranging from dis-
virus.
playing annoying messages on the computer
screen to destroying files or the contents of
entire hard drives. Because computer
viruses cause disruption to computer sys-
Types of Viruses
tems, including data destruction and infor- Although thousands of computer viruses
mation theft, virus creation and deployment and variants exist, they can be grouped into
is a form of cybercrime. six broad categories based on their behavior
How does my computer catch a and method of transmission.
virus? If your computer is exposed to a
file infected with a virus, the virus will try to Boot-Sector Viruses
copy itself and infect a file on your com- What are boot-sector viruses? A
puter. If you never expose your computer to boot-sector virus replicates itself into a
new files, then it will not become infected. hard drive’s master boot record. The
However, this would be the equivalent of a master boot record is a program that
human being living in a bubble to avoid executes whenever a computer boots up,
catching viruses from other people—quite ensuring that the virus will be loaded into
impractical. memory immediately, even before some
Downloading infected audio and video virus protection programs can load.
files from peer-to-peer file sharing sites is a Boot-sector viruses are often transmitted
major source of virus infections. Shared by a flash drive left in a USB port. When
flash drives are also a common source of the computer boots up with the flash drive
Hacker’s computer
Figure 9.2
Computer viruses are
connected, the computer tries to launch a computers. The effects of logic bombs and
passed from one unsus-
pecting user to the next. master boot record from the flash drive, time bombs range from the display of
which is usually the trigger for the virus to annoying messages on the screen to
infect the hard drive. reformatting of the hard drive, which
causes complete data loss.
Logic Bombs and Time Bombs
What is a logic bomb? A logic bomb Worms
is a virus that is triggered when certain What is a worm? A worm is slightly dif-
logical conditions are met—such as ferent from a virus in that a worm attempts
opening a file or starting a program a to travel between systems through network
certain number of times. A time bomb is a connections to spread an infection. A virus
virus that is triggered by the passage of infects a host file and waits until that file is
time or on a certain date. For example, the executed on another computer to replicate.
Michelangelo virus was a famous time A worm, however, works independently of
bomb that was set to trigger every year on host file execution and is much more active
March 6, Michelangelo’s birthday. The in spreading itself. When the Conficker
BlackWorm virus (otherwise known as worm broke out, it quickly infected an
Kama Sutra, Mywife, or CME-24), another estimated 9 million to 15 million individual
time bomb, spreads through e-mail computers. This worm spread through
attachments. Opening the attachment vulnerabilities in the Windows code and
infects the computer, and on the third compromised computers by disabling cer-
day of every month, the virus seeks out tain software services and utility programs
and deletes certain file types (such as (such as Windows Update). Fortunately, it is
executable or .EXE files) on Windows easy to protect yourself from most worms.
412 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Installing antivirus software, which is soft- BITS
ware specifically designed to detect viruses CAPTCHA: Keeping Web Sites Safe
AND
and protect your computer and files from BYTES From Bots
harm, is a good start. You also should apply
software patches (updates issued by the Automated programs called bots (or Web robots) are used to make tasks easier on the
manufacturers of software such as Windows Internet. Search engines use bots in a technique called spidering to search and index
that repairs known security problems) to Web pages. Unfortunately, bots can also be used for malicious or illegal purposes be-
your computer whenever they are issued. cause these bots can perform some computing tasks much faster than humans. For
We discuss protective measures later in the example, bots can be used on ticket ordering sites to try to buy large blocks of high-
chapter. demand concert tickets or to make repeated entries into contests in attempts to
increase the chances of winning sweepstakes or prizes. Frequently, bots are used to
Script and Macro Viruses post spam in the comments sections of blogs. Fortunately, Web site owners can eas-
What are script and macro viruses? ily deploy software known as a CAPTCHA program (see Figure 9.3) to prevent such
Some viruses are hidden on Web sites in the bot activities.
form of scripts. A script is a series of com- CAPTCHA (Completely Automated Public Turing Test to Tell Computers and
mands—actually, a miniprogram—that is Humans Apart) programs generate distorted text and require that it be typed into a
executed without your knowledge. Scripts box. Because bots can’t yet be programmed to read distorted text, which most people
are often used to perform useful, legitimate usually can, the CAPTCHA program is used to verify that a human is performing what-
functions on Web sites such as collecting ever task is being tested. The program helps Web site owners defend against all types
name and address information from cus- of automated scams. If you want to try integrating a CAPTCHA program into your Web
tomers. However, some scripts are mali- site (to protect your e-mail address), go to recaptcha.net, which offers free CAPTCHA
cious. For example, say you receive an tools to help you protect your data.
e-mail encouraging you to visit a Web site
full of useful programs and information.
When you click a link to display a video on
the Web site you were directed to, a script
runs that infects your computer with a virus
without your knowledge
A macro virus is a virus that attaches
itself to a document (such as a Word or Excel
file) that uses macros. A macro is a short
series of commands that usually automates Figure 9.3
repetitive tasks. However, macro languages
CAPTCHA programs like this one verify that a human, not a bot
are now so sophisticated that viruses can be being used for malicious purposes, is performing the requested
written with them. The Melissa virus be- task.
came the first major macro virus to cause
problems worldwide.
The Melissa virus was also the first prac-
tical example of an e-mail virus. E-mail your files unusable. You then receive a mes-
viruses use the address book in the victim’s sage that asks you to send money to an ac-
e-mail system to distribute the virus. Any- count if you want to receive the program to
one opening an infected document triggered decrypt your files. The flaw with this type of
the virus, which infected other Word docu- virus, which keeps it from being widespread,
ments on the victim’s computer. Once trig- is that law enforcement officials can trace the
gered, the Melissa virus sent itself to the first payments to an account and may possibly be
50 people in the address book on the in- able to catch the perpetrators. Still, we see
fected computer. This helped ensure that these types of viruses from time to time.
Melissa became one of the most widely dis-
tributed viruses ever released. Virus Classifications
Encryption Viruses How else are viruses classified?
What are encryption viruses? When Viruses can also be classified by the methods
encryption viruses infect your computer, they take to avoid detection by antivirus
they run a program that searches for com- software:
mon types of data files (such as Microsoft • A polymorphic virus changes its own
Word and Excel files) and compresses them code (or periodically rewrites itself) to
using a complex encryption key that renders avoid detection. Most polymorphic
414 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
stops the execution of the file and virus and
notifies you that it has detected a virus. It Click to display Click to
also places the virus in a secure area on dialog box schedule a scan
your hard drive so that it won’t spread
infection to other files. This procedure is
known as quarantining. Usually the
antivirus software then gives you the
choice of deleting or repairing the
infected file. Unfortunately, antivirus
programs can’t always fix infected files to
make them usable again. You should
keep backup copies of critical files so Click to launch
scan immediately
that you can restore them in case a virus
damages them irreparably.
Most antivirus software will also at-
tempt to prevent infection by inoculating
key files on your computer. In
inoculation, the antivirus software
records key attributes about files on your
computer (such as file size and date created) programs from loading and will allow you Figure 9.4
and keeps these statistics in a safe place on to run the antivirus software directly from In Norton Internet Secu-
your hard drive. When scanning for viruses, your disk drive. If the software does detect rity, complete virus scans
can be set up to run auto-
the antivirus software compares the files to viruses, you may want to research them
matically. This computer
the attributes it previously recorded to help further to determine whether your antivirus will be scanned every
detect attempts by virus programs to modify software will eradicate them completely or Tuesday at 8 P.M.
your files. whether you will need to take additional
Does antivirus software always manual steps to eliminate the virus. Most
stop viruses? Antivirus software catches antivirus company Web sites, such as the
known viruses effectively. Unfortunately, Symantec site (symantec.com), contain
new viruses are written all the time. To com- archives of information on viruses and pro-
bat unknown viruses, modern antivirus pro- vide step-by-step solutions for removing
grams search for suspicious virus-like viruses.
activities as well as virus signatures. How-
ever, virus authors know how antivirus soft-
ware works. They take special measures to Click to check
for updates
disguise their virus code and hide the effects
of a virus until just the right moment. This
helps ensure that the virus spreads faster and
farther. Thus, your computer can be attacked
by a virus that your antivirus software
doesn’t recognize. To minimize this risk,
you should keep your antivirus software
up to date.
How do I make sure my antivirus
software is up to date? Most antivirus
programs have an automatic update
feature that downloads updates for virus
signature files every time you go online (see
Figure 9.5).
What should I do if I think my com-
puter is infected with a virus? Boot
up your computer using the antivirus instal-
lation disc. (Note: If you download your
antivirus software from the Internet, it is a
good idea to copy your antivirus software Figure 9.5
to a DVD in case you have problems in the Antivirus software, such as Norton Internet Security, provides for automatic updates
future.) This should prevent most virus to the software installed on the computer.
416 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
downloads updates, they are not in-
stalled until you instruct Windows to
install them. We don’t usually recom-
mend this option because you may Option 1
forget to install important updates.
• Option 3: Check for updates but let me Option 2
choose whether to download and in-
stall them. This is an appropriate choice
Option 3
if you have low bandwidth Internet ac-
cess. Because downloads over dial-up
can take a long time due to low band- Option 4
width, you need to control when down-
loads will occur so they don’t interrupt Option 5
your workflow.
• Option 4: Give me recommended up-
dates. This option ensures you receive
recommended (optional) updates as
well as critical (necessary) updates. Figure 9.7
• Option 5: Microsoft Update, This option black hats.) Regardless of the hackers’ opin- The Windows Update
ensures you receive updates for other ions, the laws in the United States and in screen makes it easy for
Microsoft products besides Windows many other countries consider any unautho- users to configure
rized access to computer systems a crime. Windows to update itself.
(such as Microsoft Office).
What about the teenage hackers >To enable automatic
In the next section, we explore another who are caught every so often? updates, click Start, select
major threat to your digital security— These amateur hackers are often referred to Control Panel, select
hackers. System and Security, click
as script kiddies. Script kiddies don’t create the Windows Update link,
the programs they use to hack into com- and then click the Change
puter systems; instead, they use tools cre- Settings link.
Computer Threats: ated by skilled hackers that enable unskilled
Hackers novices to wreak the same havoc as profes-
sional hackers.
Although there is a great deal of disagree- Fortunately, because the users of these
ment as to what a hacker actually is (espe- programs are amateurs, they’re usually not
cially among hackers themselves), a hacker proficient at covering their electronic tracks.
is most commonly defined as anyone who Therefore, it’s relatively easy for law en-
unlawfully breaks into a computer system— forcement officials to track them down and
either an individual computer or a network prosecute them. Script kiddies nevertheless
(see Figure 9.8). can cause a lot of disruption and damage to
Are there different kinds of hack- computers, networks, and Web sites.
ers? Some hackers are offended by being Why would a hacker be interested
labeled as criminals and therefore attempt to in breaking into my home computer?
classify different types of hackers. A hacker Some hackers just like to snoop. They enjoy
who breaks into systems just for the the challenge of breaking into systems and
challenge of it (and who doesn’t wish to seeing what information they can find. Other
steal or wreak havoc on the systems) may hackers are hobbyists seeking information
refer to him- or herself as a white-hat about a particular topic wherever they can
hacker. These individuals tout themselves find it. Because many people keep propri-
as experts who are performing a needed etary business information on their home
service for society by helping companies computers, hackers bent on industrial espi-
uncover the vulnerabilities in their systems. onage may break into home computers. For
White-hat hackers look down on those other hackers, hacking is a way to pass time.
hackers who use their knowledge to destroy
information or for illegal gain. A term for
these more villainous hackers is black-hat
What Hackers Steal
hacker. (The terms white hat and black hat are Could a hacker steal my credit card
references to old Western movies in which the number? If you perform financial transac-
heroes wore white hats and the outlaws wore tions online, such as banking or buying
418 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
horse is a program that appears to be Denial of Service Attacks
something useful or desirable (like a game
or a screen saver), but while it runs does What are denial-of-service attacks?
something malicious in the background In a denial-of-service (DoS) attack, legiti-
without your knowledge. The term Trojan mate users are denied access to a computer
horse derives from Greek mythology and system because a hacker is repeatedly
refers to the wooden horse that the Greeks making requests of that computer system
used to sneak into the city of Troy and through a computer he or she has taken over
conquer it. Therefore, computer as a zombie. A computer can handle only a
programs that contain a hidden (and usually certain number of requests for information at
dreadful) “surprise” are referred to as one time. When it is flooded with requests in
Trojan horses. a denial-of-service attack, it shuts down and
What damage can Trojan horses refuses to answer any requests for informa-
do? Often, the malicious activity perpe- tion, even if the requests are from a legitimate
trated by a Trojan horse program is the user. Thus, the computer is so busy respond-
installation of a backdoor program that ing to the bogus requests for information that
allows hackers to take almost complete con- authorized users can’t gain access.
trol of your computer without your knowl- Couldn’t a DoS attack be traced by
edge. Using a backdoor program, hackers to the computer that launched it?
can access and delete all the files on your Launching a DoS attack on a computer
computer, send e-mail, run programs, and system from a single computer is easy to
do just about anything else you can do trace. Therefore, most savvy hackers use a
with your computer. A computer that a distributed denial-of-service (DDoS)
hacker controls in this manner is referred to attack, which launches DoS attacks
as a zombie. Zombies are often used to from more than one zombie (sometimes
launch denial-of-service attacks on other thousands of zombies) at the same time.
computers. Figure 9.9 illustrates how a DDoS attack
Figure 9.9
Zombie computers are
Hacker launches DDoS by used to facilitate a
activating zombies (red lines) distributed denial-of-
service (DDoS) attack.
Hacker’s
computer
Academic Government
computer computer
(zombie) (zombie)
Home
computer
(zombie)
ISP
Corporate computer
computer (zombie)
(zombie)
420 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
ports, like open windows in a home, invite probably sufficient, you should consider in-
intruders, as illustrated in Figure 9.10. stalling both for maximum protection.
Unless you take precautions to restrict What software firewalls are
access to your logical ports, other people on there? Most current operating sys-
the Internet may be able to access your tems include reliable firewalls. Many
computer through them. security suites
Fortunately, you can thwart most hacking such as Norton
problems by installing a firewall. Internet Security,
McAfee Internet FTP (Port 21) YOUR DNS (Port 53)
Security, and COMPUTER
Restricting Access to ZoneAlarm Inter-
Your Digital Assets net Security Suite
also include fire-
Keeping hackers at bay is often just a matter wall software. HTTP (Port 80)
of keeping them out. This can be achieved Although the fire- E-mail (Port 25) Telnet (Port 23)
either by preventing them from accessing walls that come
your computer (usually through your Inter- with Windows 7
net connection), by protecting your digital and OS X will pro-
information in such a way that it can’t be tect your computer,
accessed (with passwords, for example), or firewalls included
by hiding your activities from prying eyes. in security suites
In the next section, we explore strategies for often come with
protecting access to your digital assets and additional features such as WEB SITE REQUEST
keeping your Internet surfing activities from monitoring systems that alert
being seen by the wrong people. you if your computer is under attack. Figure 9.10
If you are using a security suite (say, for Open logical ports are an
virus protection and parental controls) that invitation to hackers.
Firewalls includes a firewall, you should disable the
A firewall is a program or hardware device firewall that came with your operating sys-
designed to protect computers from hackers. tem. Two firewalls running at the same time
A firewall specifically designed for home can conflict with each other and can cause
networks is called a personal firewall. your computer to slow down or freeze up.
Personal firewalls are made to be easy to What are hardware firewalls? You
install. By using a personal firewall, you can can also buy and configure hardware fire-
close open logical ports to invaders and wall devices. Many routers sold for home
potentially make your computer invisible to networks include firewall protection. Just
other computers on the Internet. like software firewalls, the setup for hard-
Firewalls are named after a housing ware firewalls is designed for novices, and
construction feature. When houses were first the default configuration on most routers
being packed densely into cities, they were keeps unused logical ports closed. Docu-
attached to each other with common walls. mentation accompanying routers can assist
Fire was a huge hazard because wood burns users with more experience in adjusting the
readily. An entire neighborhood could be settings to allow access to specific ports if
lost in a single fire. Thus, builders started needed.
building common walls of nonflammable or
slow-burning material to stop, or at least
slow, the spread of fire. These came to be
known as firewalls. ACTIVE
HELP-
Understanding
DESK Firewalls
Types of Firewalls
In this Active Helpdesk call, you’ll play the role of a
What kinds of firewalls are there? As helpdesk staffer, fielding calls about how hackers can
noted earlier, firewalls can be configured attack networks and what harm they can cause, as
using either software or hardware devices. well as what a firewall does to keep a computer safe
Although installing either a software or a from hackers.
hardware firewall on your home network is
Firewalls are designed to restrict access to a network and its comput- get to the correct address. This is similar to the way addresses work on a
ers. Firewalls protect you in two major ways: by blocking access to conventional letter. A unique street address (such as 123 Main St., Any-
logical ports and by keeping your computer’s network address secure. where, CA 99999) is placed on the envelope, and the postal service routes
To block access to logical ports, firewalls examine data packets that it to its correct destination. Without such addressing, data packets, like let-
your computer sends and receives. Data packets contain information ters, would not reach their intended recipients.
such as the address of the sending and receiving computers and the log- IP addresses are assigned in a procedure known as dynamic
ical port the packet will use. Firewalls can be configured so that they fil- addressing when users log on to their Internet service provider (ISP), as
ter out packets sent to specific logical ports. This process is referred to shown in Figure 9.11). The dynamic host configuration protocol (DHCP)
as packet filtering. server assigns IP addresses out of a pool of available IP addresses
For example, file transfer protocol (FTP) programs are a typical way in licensed to the ISP in this manner:
which hackers access a computer. Hackers can disguise their requests 1. When you connect to your ISP, your computer requests an IP address.
for information as legitimate packets that appear to be FTP requests 2. The ISP’s DHCP server consults its list of available IP addresses
authorized by your computer. If a firewall is configured to ignore all and selects one.
incoming packets that request access to port 21 (the port designated for 3. The selected IP address is communi-
FTP traffic), no FTP requests will get through to your computer. This cated to your computer. The address
ABC Company.com
process is referred to as logical port blocking. remains in force for as long as you
If port 21 were a window at your home, you Step 4 are connected to the ISP.
would probably lock it so 4. Once on the Internet, your Web
that a burglar couldn’t get browser requests access to ABC
in. If you needed port 21 for Company’s Web site.
a legitimate purpose, you 5. The ABC Company server consults
Step 6
could instruct the firewall to Step 5 an IP address listing and determines
allow access to that port for that the IP address of your computer
a specified period of time or is assigned to your ISP. It then for-
by a certain user. wards the requested information to
Your Step 1 the ISP’s router.
For the Internet to share computer
information seamlessly, data Step 2 6. The ISP knows to whom it assigned
packets must have a way STEP 3 the IP address and, therefore, routes
IP Address the requested information to your
of getting to their correct ISP
128.15.9.21 ISP’s pool of computer.
locations. Therefore, every DHCP server
assigned IP addresses
computer connected to the Because hackers use IP addresses to
Internet has a unique address Figure 9.11 find victims and come back to their com-
called an Internet Protocol How dynamic addressing works. puters for more mischief, frequently
address (or IP address). As switching IP addresses helps make users
noted earlier, data packets contain the IP address of the computer to which less vulnerable to attacks. Periodically switching off your modem and
they are being sent. Routing servers on the Internet make sure the packets rebooting it will cause a different IP address to be assigned dynamically
422 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Step 1 Step 2
Step 4 Step 3
Router IP address:
111.22.3.44
ABC Company
Your computer’s internal Web server
IP address: 192.11.4.123
Figure 9.13
ShieldsUP common ports
test results.
424 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
mobile devices, so you may wish to pur- • Ideally, it should be a combination of
chase this for your phone. You must ensure several words with strategically placed
that you update the software in your mobile uppercase characters.
devices just as you do your computer’s OS • Your password should not be easily
and antivirus software. For more informa- associated with you (such as your birth
tion on securing your Bluetooth devices, go date, the name of your pet, or your
to the Bluetooth technology Web site nickname).
(bluetomorrow.com). • Use a different password for each
system or Web site you need to access.
This prevents access to other accounts
Password Protection and Password
you maintain if one of your passwords
Management is discovered.
Passwords, used in conjunction with login • Never tell anyone your password or
IDs, are the major way we restrict access to write it down in a place where others
computers, networks, and online accounts. might see it.
You no doubt have many passwords that • Change your password on a regular
you need to remember to access your digital basis (say, every month) and change it
life. However, creating strong passwords— sooner if you think someone may
ones that are difficult for hackers to guess— know it.
is an essential piece of security that
individuals sometimes overlook. Password Figure 9.15 shows some possible pass-
cracking programs have become more words and explains why they are strong or
sophisticated lately. In fact, some commonly weak candidates.
available programs, such as John the Ripper, How can I check the strength of
can test more than 1 million password my passwords? You can use online
combinations per second! Creating a secure password strength testers, such as The
password is therefore more important Password Meter (passwordmeter.com) or
than ever. Microsoft’s test (microsoft.com/protect/
Many people use extremely weak pass- yourself/password/checker.mspx), to
words. The Imperva Application Defense
Center (a computer security research organi-
zation) conducted a review of 32 million
passwords that were used at the Web site BITS
rockyou.com. More than 345,000 people AND Connecting to Wireless Networks on
were using “12345,” “123456,” or BYTES the Road? Beware of “Evil Twins”!
“123456789” as their password. And almost
62,000 people were using “password”! When you are at the airport or coffee shop, you may need to connect to a wireless
Passwords such as these are extremely easy network and check your e-mail. You switch on your notebook, and the wireless net-
for hackers to crack. work adapter finds a network called “free wifi” or “airport wireless.” You connect,
enter your credit card information to pay for your airtime, and start merrily surfing
Creating Passwords away. Three days later, your credit card company calls asking about the $2,400 big-
What constitutes a strong password? screen TV you just bought at the local electronics store and the $3,200 of power tools
Strong passwords are difficult for someone charged at the home improvement store. You didn’t make either of these purchases;
to guess. They should not contain easily you probably fell prey to an “evil twin” wireless hotspot.
deduced components related to your life Hackers know the areas where people are likely to seek access to wireless net-
such as parts of your name, your pet’s name, works. They will often set up their own wireless networks in these areas with sound-
your street address, or your telephone alike names to lure unsuspecting Web surfers and get them to enter credit card
number. To create strong passwords, follow information to gain access. Other times these “evil twins” offer free Internet access,
the basic guidelines shown here: and the hackers monitor traffic looking for sensitive information they can use.
• Your password should contain at least So how can you protect yourself? Check with authorized personnel at places
14 characters and include numbers, where you will be connecting to hotspots to determine the names of the legitimate
symbols, and upper- and lowercase hotspots. If you run across “free” access to a hotspot that isn’t provided by a legiti-
letters. mate merchant, then you are better off not connecting at all because you can’t be
sure your information won’t be used against you or that malicious files won’t be
• Your password should not be a single
downloaded to your computer.
word or any word found in the
dictionary.
P1zzA244WaterShiPDowN Easily remembered word with mix of alphanumeric characters and upper- and lowercase letters, your locker
number at your gym, plus the title of a book that you like (with upper- and lowercase letters).
S0da&ICB3N&J3RRY Mix of numbers, symbols, and letters. Stands for soda and ice cream and the names of famous ice cream makers
with the number 3 instead of the letter E.
4smithkids Even though this has alphanumeric combination, it is too descriptive of a family.
Brown5512 Last name and last four digits of phone number are easily decoded.
evaluate your passwords (see Figure 9.16). a challenge, you should use password-
The Password Meter provides guidelines for management tools, as described in the next
good passwords and shows you how inte- section, to make the process easier to handle.
grating various elements (such as symbols) If you have trouble thinking of secure pass-
affects the strength score for your password. words, there are many password generators
You should make sure you change your available for free, such as Perfect Passwords
passwords on a regular basis (such as (grc.com/passwords.htm) and the Bytes
monthly or quarterly). Your school or your Interactive Password Generator
employer probably requires you to change (goodpassword.com).
your password regularly. This is also a good Can I use a password to restrict
idea for your personal passwords. You access to my computer? Windows
Figure 9.16 should also not use the same password for has built-in password protection for files as
The Password Meter every account that you have. Because well as the entire desktop. If your computer
objectively evaluates your remembering constantly changing strong is set up for multiple users with password
passwords. passwords for numerous accounts can be protection, the Windows login screen re-
quires you to enter a password to gain ac-
cess to the desktop. You are also asked to
enter a password hint to remind you in case
Enter password you forget your password. The computer
can be set to default back to the Welcome
screen after it is idle for a set period of time.
This forces a user to reenter a password to
regain access to the computer. If someone
attempts to log on to your computer without
your password, that person won’t be able to
gain access. It is an especially good idea to
use passwords on notebook computers or
any computer that may be unattended for
periods of time. Figure 9.17 shows the
Control Panel screen used to set up a pass-
Password strength
word on a user account.
There are two types of users in Windows:
administrators and standard users. Setting
up a password on a standard user account
426 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
prevents other standard users from
being able to access that user’s files.
However, users with administrator Enter strong password
privileges can still see your files if you
are a standard user. So be aware that
your files may not be safe from all
prying eyes!
a b
Check these
Click and enter
master password
Figure 9.18
(a) The security tab in the Firefox browser options screen provides access to password-management tools. (b) The
Firefox Saved Passwords dialog box displays all sites for which login information is saved.
>From the Tools menu, select Options. In the Options dialog box, click the Show Passwords button.
428 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
that reads a unique personal
characteristic such as a fingerprint
or the iris pattern in your eye
and converts its pattern to a
digital code. When you use the
device, your pattern is read and
compared to the one stored on the
computer. Only users having an
exact fingerprint or iris pattern
match are allowed to access the
computer.
Because no two people have the
same biometric characteristics (fin-
gerprints and iris patterns are
unique), these devices provide a
high level of security. They also
eliminate the human error that can
occur in password protection. You
might forget your password, but
you won’t forget to bring your fin-
Figure 9.20 gerprint to the computer! Some
notebooks feature built-in fingerprint
Ubuntu is a version of Linux that has a Windows-like
interface and familiar browser tools like Firefox. readers, and companies like SecuGen
produce computer mice and keyboards (see
significantly reduces the chance that your Figure 9.21) that include built-in fingerprint
flash drive will become infected by any readers. Other biometric devices, which
malware running on the public computer. include voice authentication and face
Next, virus and hacking attacks against pattern–recognition systems, are now
Linux are far less likely than attacks against widely offered in notebook computers.
Windows. Because Windows has more than Make sure to utilize some (or all) of these
90 percent of the operating system market, methods to keep your activities from prying
people who write malware tend to target eyes and to restrict access to your digital
Windows systems. Finally, when you run information.
software from your own storage medium
(flash drive), you avoid reading and writing
to the hard disk of the public computer. This Managing Online Figure 9.21
(a) The SecuGen
significantly enhances your privacy because Annoyances OptiMouse Plus is a two-
you don’t leave traces of your activity button mouse with a scroll
Surfing the Web, sending and receiving
behind. wheel that includes a
e-mail, and chatting online have become a
Pendrivelinux.com (pendrivelinux.com) digital fingerprint reader.
common part of most of our lives. Unfortu- (b) The SecuGen
is an excellent resource that offers many dif-
nately, the Web has become fertile ground Keyboard Plus features a
ferent versions of Linux for download and
fingerprint reader.
includes step-by-step instructions on how
to install them on your flash drive.
If you are a Mac user, there is
an option for you, too! The gOS
a b
version of Linux provides a close
approximation of OS X, so you
can feel right at home.
Biometric Authentication
Devices
Besides passwords, how else can I Fingerprint
reader Fingerprint
restrict the use of my computer? A reader
biometric authentication device is a device
430 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
ETHICS
IN IT Big Brother Is Watching . . . But Should He Be Allowed to Do So?
Think you aren’t being closely watched by your employer? Think again! A responsibility (and a legal one as well, depending on the jurisdiction) not
survey of employers by the American Management Association and the to place monitoring devices in sensitive locations such as bathrooms and
ePolicy Institute revealed that, of the employers surveyed: dressing areas. However, in many states, the employer does not need to
• 73 percent monitored e-mail messages inform the employees in advance that they are being monitored. Consci-
• 66 percent monitored Web surfing entious employers include monitoring disclosures in published employee
• 48 percent monitored activities using video surveillance policies to avoid confusion and conflict.
• 45 percent monitored keystrokes and keyboard time Employers use a variety of software programs to monitor employee
• 43 percent monitored computer files in some other fashion computer usage. Certain software packages keep track of every Web site
There is a high probability that you are being monitored while you you visit and the duration of your stay. Checking the baseball scores might
work and when you access the Internet via your employer’s Internet con- take only three seconds and go unnoticed, but spending two hours updat-
nection (see Figure 9.23). ing your fantasy football team may be flagged. Keystroke loggers were
The two most frequently cited reasons for employee monitoring are originally used to monitor performance for people with input-intensive
to prevent theft and to measure productivity. Monitoring for theft isn’t jobs like clerks and secretaries. Now these programs have the potential to
new, because monitoring cameras have been around for years, and be used to invade your privacy because they can record everything you
productivity monitoring has been a consistent process for assembly line type, even that nasty e-mail about the boss that you decided to delete!
workers for decades. However, the Internet has led to a new type of Computer software can also be used to monitor the contents of your
productivity drain that is of concern to employers: Cyberloafing, or hard drive, so you don’t want to collect 4,823 illegal MP3 files on your
cyberslacking, means doing anything with a computer, while you are work computer. Some programs even track how long your computer is
being paid to do your job, that is not an approved function of your job. idle, which can give your manager a good idea of whether you were
Examples of cyberloafing activities are playing games, reading personal working or taking a three-hour lunch.
e-mail, checking sports scores, watching videos, and buying personal- Since your employer might not tell you that your computer use is
use products on e-commerce sites. Estimates of business productivity being monitored, you should assume that anything you do on your com-
losses due to cyberloafing top $50 billion annually. pany-provided computer is subject to scrutiny. If you need to do personal
Like most other Americans, you probably feel you have a right to pri- work on your lunch hour or other breaks, you may be able to use your per-
vacy in the workplace. Unfortunately, the laws in the United States don’t sonal notebook computer to avoid the monitoring. Check with your
support a worker’s right to privacy. Laws such as the 1986 Electronic employer to be sure you can connect personal computers to the corporate
Communications Privacy Act (ECPA), which prohibits unauthorized moni- network or Internet connection. Note that courts in some jurisdictions
toring of electronic communications, have been interpreted by the courts have ruled that e-mails sent from third-party systems, such as Yahoo! and
in favor of employers. The bottom line is that employers who pay for Gmail, are subject to monitoring if they are sent from employer-provided
equipment and software have the legal right to monitor their usage. computer systems. Instant messaging is also subject to monitoring.
But just because an action is legal doesn’t mean it is ethical. It is dif- People who monitor employees have a duty to protect their right to
ficult to argue that an employer doesn’t have the right to take measures privacy and not to disclose any information that they may inadvertently
to prevent theft and detect low productivity. The ethical issue here is see during the course of monitoring. The acceptable computer use poli-
whether or not the employees are made aware of monitoring policies. An cies at most companies include guidelines for network administrators
ethical employer should treat employees with respect and dignity and and other people who have high levels of access to sensitive information.
inform employees of any monitoring. Employers have an ethical When monitoring employees’ work habits, management must ensure
that compliance with the policies is tested periodically. Periodic reviews
of procedures and compliance help ensure that established company
policies are working as designed. An ethical employer strives to prevent
misuse of personal data and accidental data loss. However, you can’t al-
ways be certain that everyone who monitors you will behave ethically.
Therefore, you need to think very carefully about exactly what personal
tasks you are willing to risk engaging in on company computer systems.
So, do your employers have an ethical right to monitor your activi-
ties? Certainly, they have a right to ensure they are getting a fair day’s
work from you, just as you have an ethical obligation to provide a fair
effort for a fair wage. However, employers should also be willing to
respect the privacy rights of their employees and treat them as profes-
sionals, unless there is some indication of wrongdoing. Because employ-
ers may have a legal right to monitor you in the workplace, you should
work under the assumption that everything you do on your work com-
Figure 9.23 puter is subject to scrutiny and behave accordingly. Do your online shop-
Big Brother might really be watching you at work. ping at home!
432 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Click to reclassify
messages that
aren’t spam
Spam folder
Figure 9.25
How else can I prevent spam? information to determine the traffic flowing In Yahoo! Mail, messages
There are several additional ways you can through their Web site and the effectiveness identified as spam are
directed into a folder
prevent spam. of their marketing strategy and placement
called “Spam” for review
1. Before registering on a Web site, read its on Web sites. By tracking such information, and deletion.
privacy policy to see how it uses your cookies enable companies to identify differ-
e-mail address. Don’t give the site per- ent users’ preferences.
mission to pass on your e-mail address Can companies get my personal
to third parties. information when I visit their
sites? Cookies do not go through your
2. Don’t reply to spam to remove yourself hard drive in search of personal information
from the spam list. By replying, you are such as passwords or financial data. The
confirming that your e-mail address is only personal information a cookie obtains
active. Instead of stopping spam, you is the information you supply when you fill
may receive more. out forms online.
3. Subscribe to an e-mail forwarding Do privacy risks exist with cook-
service such as Emailias (emailias.com) ies? Some sites sell the personal informa-
or Sneakemail.com (sneakemail.com). tion their cookies collect to Web advertisers
These services screen your e-mail mes- who are building huge databases of con-
sages, forwarding only those messages sumer preferences and habits, collecting per-
you designate as being okay to accept. sonal and business information such as
phone numbers, credit reports, and the like.
The main concern is that advertisers will use
this information indiscriminately, thus infil-
Cookies trating your privacy. And you may feel your
What are cookies? Cookies (also privacy is being violated by tracking cookies
known as tracking cookies) are small text files that monitor where you go on a Web site.
that some Web sites automatically store on Should I delete cookies from my
your computer’s hard drive when you visit hard drive? Because cookies pose no se-
them. When you log on to a Web site that curity threat (it is virtually impossible to
uses cookies, a cookie file assigns an ID hide a virus or malicious software program
number to your computer. The unique ID is in a cookie), take up little room on your hard
intended to make your return visit to a Web drive, and offer you small conveniences on
site more efficient and better geared to your return visits to Web sites, there is no great
interests. The next time you log on to that reason to delete them. Deleting your cookie
site, the site marks your visit and keeps files could actually cause you the inconven-
track of it in its database. ience of reentering data you have already
What do Web sites do with cookie entered into Web site forms. However, if
information? Cookies can provide Web you’re uncomfortable with the accessibility
sites with information about your browsing of your personal information, you can peri-
habits, such as the ads you’ve opened, the odically delete cookies or configure your
products you’ve looked at, and the time and browser to block certain types of cookies, as
duration of your visits. Companies use this shown in Figure 9.26. Software such as
434 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
information, which they might use to a
trick you into revealing other infor-
mation that would lead to them steal-
ing your identity.
Information used in
How can I protect my information identity theft should be
on Facebook? To begin, you need to kept very private. This
change your privacy settings from some of should be changed!
the default options. On the upper right-
hand side of the Facebook page, click Ac-
count and then click Privacy Settings. On
the Privacy Settings page, select Profile In-
formation to display the screen shown in
Figure 9.27a. It’s a good idea to set most of
the options on this screen to Only Friends b
because, presumably, you are only friending
people you trust. Restrict contact settings
The other screen you need to address is to Only Me or Only Friends.
Contact Information Privacy Settings (see
Figure 9.27b), which you can also reach
from the Privacy Settings page. Restricting
this information only to friends or to your-
self is imperative. You don’t want scammers
contacting you via phone and trying to trick
you into revealing sensitive information. So
use discretion and keep your information as
private as possible. Figure 9.27
your computer is located. You wouldn’t
You should review the
want a fire or a flood destroying the back- (a) Profile Information and
ups along with the original data. Removable (b) Contact Information
Backing Up Your Data storage media, such as external hard drives, privacy settings in
How might I damage the data on my DVDs, and flash drives have been popular Facebook to ensure you
computer? The data on your computer choices for backing up files because they aren’t sharing too much
information.
faces three major threats: unauthorized hold a lot of data and can be transported
access, tampering, and destruction. As noted easily.
earlier, a hacker can gain access to your What types of files do I need to
computer and steal or alter your data. How- back up? Two types of files need
ever, a more likely scenario is that you will backups—program files and data files.
lose your data unintentionally. You may ac- A program file is used to install software
cidentally delete files. You may drop your and usually comes on CDs or DVDs or is
notebook on the ground, causing the hard downloaded from the Web. If any programs
drive to break, resulting in complete data came preinstalled in your computer, then
loss. A virus from an e-mail attachment you you may have received a CD or DVD that
opened may destroy your original file. Your contains the original program. As long as
house or dorm may catch fire and destroy you have the original media in a safe place,
your computer. Because many of these you shouldn’t need to back up these files. If
possibilities are beyond your control, you you have downloaded a program file from
should have a strategy for backing up your the Internet, however, you should make a
files, which is especially important if you copy of the program installation files on a
are running a small business. (The backup removable storage device as a backup. If
strategy for small businesses is quite similar you didn’t receive discs for installed
to the procedures recommended for programs with your computer, then see the
individuals.) next section for suggested strategies for
What exactly is meant by “backing backing up your entire computer.
up data”? Backups are copies of files that A data file is a file you have created or
you can use to replace the originals if they purchased. Data files include such files as
are lost or damaged. To be truly secure, research papers, spreadsheets, music files,
backups must be stored away from where movies, contact lists, address books, e-mail
An image backup (or system backup) 1. Online sites. In essence, online storage
means that all system, application, and data is like using the Internet as an alterna-
files are backed up, not just the files that tive to a portable storage device (such
changed. While incremental backups are as an external hard drive or flash
more efficient, an image backup ensures you drive). The beauty of online storage is
capture changes to application files, such as that your data is available anywhere
automatic software updates, that an incre- you are; you do not need to be at your
mental backup might not capture. The idea computer or have to lug around your
of imaging is to make an exact copy of the external hard drive to access the infor-
setup of your computer so that in the event mation. More important, because the
of a total hard drive failure, you could copy information is stored online, it is in a
the image to a new hard drive and have secure, remote location, so data is much
your computer configured exactly the way it less vulnerable to all the potential dis-
was before the crash. This is a quick way to asters (such as a flood) that could harm
get up and running again. data stored in your computer or exter-
How often should I back up my nal hard drive. If you are taking advan-
files? You should back up your data files tage of one of these free online storage
frequently. How frequently depends on how services, selectivity is the key because
much work you cannot afford to lose. You of cost. Although you might have hun-
should always back up data files when you dreds of gigabytes of data sitting on
make changes to them, especially if those your computer, perhaps you only need
changes involve hours of work. It may not to store several gigabytes online so that
seem important to back up your history they are always available.
term paper file when you finish it, but do A convenient free storage option for
you really want to do all that work again if Windows users is Windows Live
your computer crashes before you have a SkyDrive (skydrive.live.com), which
chance to turn in your paper? provides 25 GB of storage space. For
Because your program and operating sys- non-Windows users or those needing
tem files don’t change as often as your data even more storage space, check out
files, you can perform image backups on a ADrive (adrive.com) and its 50 GB of
less frequent basis. Most backup software free storage! Fee-based plans at ADrive
can be configured to do backups automati- give users access to tools that allow
cally so you don’t forget to perform them. them to schedule automatic backups of
You might consider scheduling backups of files and folders. However, image
your data files on a daily basis and an image backups probably won’t fit within the
436 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
storage limits offered by free providers. sharing files. Both NAS devices and
For a fee, companies such as Iron home servers are easy to configure and
Mountain (backup.ironmountain.com) are very useful if you have multiple
and IBackup (ibackup.com) provide computers within a single household
larger storage capacity. that need backing up.
If you store a backup of your entire
system on the Internet, then you won’t How do I actually perform a file
need to buy an additional hard drive backup? Windows 7 includes the Backup
for backups. This method also takes the and Restore utility, which provides a quick
worry out of finding a safe place to and easy way to schedule file backups,
keep your backups because they’re restore files from backups, or perform image
always stored in an area far away from (system) backups. You can access Backup and
your computer (on the backup com- Restore from the Control Panel. Before start-
pany’s server). However, the yearly fees ing this utility, make sure your external hard
can be expensive, so a cheaper option drive or NAS device is connected to your
may be to buy an external hard drive. computer or network and is powered on.
When you start the Backup and Restore
2. Local drives. External hard drives are
utility for the first time, no backups will
popular options for performing back- Figure 9.28
have ever been configured. Select the Set up
ups of data files and for complete
backup option to launch the Set up backup The Windows 7 Backup
image backups. Affordable external and Restore utility.
dialog box (see Figure 9.28a) and display a
drives are available with capacities of (a) Select your backup
list of available backup devices. Select a de-
3 TB or more. These drives are usually destination. (b) Choose
vice and click Next to proceed. On the next locations to back up.
connected to a single computer and
screen, you have the option to let Windows (c) Review your scheduled
often come with their own backup soft-
choose what to back up or to choose for backups, restore files,
ware (although you could still use the and start wizards for
backup software included with your system image and repair
operating system). Although conven- disc creation.
ient and inexpensive, using external
hard drives for backups still presents a
438 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
TRENDS Computers in Society: Identity Theft—Is There More Than One
IN IT of You Out There?
You’ve no doubt heard of identity theft. A thief steals your name, address, write bad checks and not pay the credit card bills, which will ruin your
Social Security number, bank account and credit card information and credit rating.
runs up debts in your name. This leaves you holding the bag, and you’re Even worse, the identity thieves may counterfeit debit cards or
hounded by creditors collecting on the fraudulent debts. It sounds horri- checks for your legitimate accounts and empty them of funds. They
ble—and it is. In fact, one of the authors of this textbook had his identity might even take out a mortgage in your name and then disappear with
stolen and spent about 50 hours filing police reports, talking to credit the proceeds, leaving you with the debt.
agencies, closing bogus accounts, and convincing companies that the Although foolproof protection methods don’t exist, there are precau-
$25,000 of debt run up on six phony credit card accounts was done by tions that will help you minimize your risk. You should never reveal your
an identity thief. Many victims of identity theft spend months (or even password or your PIN code to anyone or place it in an easy-to-find loca-
years) trying to repair their credit and eliminate fraudulent debts. Worse tion. Also, never reveal personal information unless you’re sure that a le-
yet, if an identity thief uses your identity to obtain medical services at a gitimate reason exists for a business to know the information, and you
hospital, you may be denied coverage at a later date because the thief’s can confirm you’re actually dealing with a legitimate representative
treatment has exceeded the limit of covered services on your policy. (don’t fall for phishing schemes). If someone calls or e-mails asking you
Stories of identity thieves—such as the New York man accused of for personal information, decline and call the company with which you
stealing more than 30,000 identities—abound in the media and should opened your account.
serve to make the public wary. However, many media pundits would Obviously, you should create secure passwords for your online
have you believe that the only way your identity can be stolen is by a accounts. When shopping online, be wary of unfamiliar merchants that
computer. This is simply not true. The Federal Trade Commission you can’t contact through a mailing address or phone number, or busi-
(ftc.gov) has identified other methods thieves use to obtain others’ per- nesses whose prices are too good to be true. These can be attempts to
sonal information. These include (1) stealing purses and wallets, in which collect your personal information for use in fraudulent schemes.
people often keep unnecessary valuable personal information such as If you have been the victim of identity theft, most states now allow
their ATM PIN codes; (2) stealing mail or looking through trash for bank you to freeze your credit history so that no new accounts can be opened
statements and credit card bills, which provide valuable personal infor- until you lift the credit freeze. Even if you live in a state where you can’t
mation; and (3) posing as bank or credit card company representatives freeze your account, you can still place an extended fraud alert on your
and tricking people into revealing sensitive information over the phone. credit history for seven years, which also warns merchants that they
Obviously, you’re at risk from online attacks, too, such as phishing. should check with you (at your home address or phone number) before
Once identity thieves obtain your personal information, they can use it in opening an account in your name.
many different ways. Identity thieves often request a change of address Using common sense and keeping personal information in the hands
for your credit card bill or bank statement. By the time you realize that of as few people as possible are the best defenses against identity theft.
you aren’t receiving your statements, the thieves have rung up bogus For additional tips on preventing identity theft or for procedures to follow
charges on your account or emptied your bank account. The thieves can if you are a victim, check out the Identity Theft Resource Center
open new credit card and bank accounts in your name. They then will (idtheftcenter.org).
logins and passwords from the victim as scammer has created. Once the e-mail recipi-
part of the process for “solving the prob- ent confirms his or her personal informa-
lem.” The most common form of pretexting tion, the scammers capture it and can begin
in cyberspace is phishing. using it.
Is pharming a type of phishing
Phishing and Pharming scam? Pharming is much more insidious
How are phishing schemes con- than phishing. Phishing requires a positive
ducted? Phishing (pronounced “fish- action by the person being scammed, such
ing”) lures Internet users to reveal personal as going to a Web site mentioned in an
information such as credit card numbers, e-mail and typing in your bank account
Social Security numbers, or other sensitive information. Pharming is when malicious
information that could lead to identity theft. code is planted on your computer that alters
The scammers send e-mail messages that your browser’s ability to find Web
look like they are from a legitimate business addresses. Users are directed to bogus
such as an online bank. The e-mail states Web sites even when they enter the correct
that the recipient needs to update or confirm address of the real Web site or follow a
his or her account information. When the bookmark that they previously had estab-
recipient clicks the provided link, he or she lished for the Web site. So instead of ending
goes to a Web site. The site looks like a legit- up at your bank’s Web site when you type in
imate site but is really a fraudulent copy the its address, you end up at a fake Web site
440 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
real-world vandalism like graffiti. Graffiti Environmental Factors
artists “make their mark” on the world, phys-
Why is the environment critical to
ically; hoaxers may consider they are making
the operation of my computer equip-
a similar mark when a bogus e-mail they
ment? Computers are delicate devices and
have created becomes widespread.
can be damaged by the adverse effects of
Sometimes hoaxes are based on misinfor-
abuse or a poor environment. Sudden move-
mation or are a way to vent frustration. An e-
ments (such as a fall) can damage your note-
mail hoax that reappears every time there is a
book computer or mobile device’s internal
spike in gasoline prices is the Gas Boycott
components. You should make sure that your
(Gas War) hoax. To boost the scheme’s credi-
computer sits on a flat, level surface, and, if it
bility, the e-mail touts it as having been in-
is a notebook, carry it in a padded case to pro-
vented by reputable businesspeople. The
tect it. If you do drop your computer, have it
e-mail explains how boycotting certain gaso-
professionally tested by a computer repair fa-
line companies will drive the price of gaso-
cility to check for any hidden damage.
line down and urges recipients of the e-mail
Electronic components do not like
to join the fight. The originator of this hoax
excessive heat or excessive cold. Unfortu-
was probably frustrated by high gas prices
nately, computers generate a lot of heat, which
and, armed with a poor understanding of
is why they have fans to cool their internal
economics, distributed this brainstorm. Un-
components. Make sure that you place your
fortunately, this tactic can have no effect on
desktop computer where the fan’s input vents
gasoline prices because it only shifts demand
(usually found on the rear of the system unit)
for gasoline from certain oil companies to
are unblocked so that air can flow inside. Chill
other sources. Because it does not reduce the
mats that contain cooling fans and sit under-
overall demand for gasoline, the price of gas
neath notebook computers are useful acces-
will not decline. Did you receive this e-mail
sories for dissipating heat. And don’t leave
and think it sounded like a plausible idea?
computing devices in a car during especially
How many people did you forward it to?
hot or cold weather because components can
How can I tell if an e-mail is a
be damaged by extreme temperatures. Natu-
hoax? Sometimes it is difficult to separate
rally, a fan drawing air into a computer also
fact from fiction. Many hoax e-mails are well
draws in dust and other particles, which can
written and crafted in such a way that they
wreak havoc on your system. Therefore, keep
sound very real. Before using the Forward
the room in which your computer is located as
button and sending an e-mail to all your
clean as possible. Even in a clean room, the
friends, check it out at one of the many
fan ducts can become packed with dust, so
Web sites that keep track of and expose
vacuum it periodically to keep a clear airflow
e-mail hoaxes. Check sites such as Snopes
into your computer. Finally, because food Figure 9.30
(snopes.com), Hoax-Slayer (hoax-slayer.com,
crumbs and liquid can damage keyboards and Sites like Hoax-Slayer
shown in Figure 9.30), or TruthOrFiction.com
other computer components, consume food help you research
(truthorfiction.com). These sites are search- potential hoaxes.
and beverages away from your computer.
able, so you can enter a few keywords from
an e-mail you suspect may be a hoax and
quickly find similar e-mails and explanations
of whether they are true or false. Checking
out e-mails before forwarding them on to
friends, family, and co-workers will save
other people’s time and help end the spread
of these time wasters.
Protecting Your
Physical Computing
Assets
Your computer isn’t useful to you if it is dam-
aged. Therefore, it’s essential to select and en-
sure a safe environment for it. This includes
protecting it from environmental factors,
power surges, power outages, and theft.
442 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
computers and peripherals during an When you leave your notebook, you use a
electrical storm is the only way to achieve small device called a key fob activator or
absolute protection. punch in a code to activate the alarm. If
How can I prevent my computers your notebook is moved while the alarm
from losing power during a power is activated, it emits a wailing 100-decibel
outage? Computers can develop sound. The fact that the alarm is visible
software glitches caused by a loss of acts as an additional theft deterrent, just
power if not shut down properly. Mission- like a “Beware of Dog” sign in a
critical computers such as Web front yard.
servers often are
protected by an Locks and
uninterruptible Surrounds
power supply How can I
(UPS), as shown in lock up a
Figure 9.33, which is a notebook
device that contains computer?
surge protection Chaining a note-
equipment and a large book to your work
battery. When power is surface can be
interrupted (such as another effective way
during a blackout), the to prevent theft. As
UPS continues to send Figure 9.33 shown in Figure 9.35, a
power to the attached A UPS device should not be mistaken for a fat special locking mecha-
computer from its bat- surge protector! nism is attached to the
tery. Depending on the notebook (some note-
battery capacity, you have between about books are even manufactured with locking
20 minutes and 3 hours to save your work ports), and a hardened steel cable is con-
and shut down your computer properly. nected to the locking mechanism. The other
end of the cable is looped around something
large and heavy, such as a desk. The cable
Deterring Theft lock requires the use of a key or combination
Because they are portable, notebooks are to free the notebook. You should consider
easy targets for thieves. Even though they taking a cable lock with you when traveling
are not considered portable, desktop to help deter theft from hotel rooms.
computers are also subject to theft. Three Software Alerts
approaches to deterring computer theft
How can my computer alert me when
include alarming them, locking them down,
it is stolen? You’ve probably heard of
or installing devices that alert you (or
LoJack, the theft-tracking device used in Figure 9.34
destroy data) when the computer is stolen.
cars. Car owners install a LoJack transmitter A notebook alarm sends
Alarms somewhere in their vehicle. If the vehicle is out an ear-piercing sound
stolen, police activate the transmitter and if your notebook is moved
What type of alarm can I install on before you deactivate the
use its signal to locate the car. Similar
my notebook computer? To prevent alarm.
your notebook from being stolen, you can
attach a motion alarm to it (see Figure 9.34).
SOUND
BYTE Surge Protectors Alarm
444 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Figure 9.36 COMPUTER SECURITY CHECKLIST
Yes No
Virus and Spyware Protection
Is antivirus and antispyware software installed on all your computers?
Is the antivirus and antispyware software configured to update itself automatically and regularly?
Is the software set to scan your computer on a regular basis (at least weekly) for viruses and spyware?
Firewall
Do all your computers have firewall software installed and activated before connecting to the Internet?
Have you tested your firewall security by using the free software available at grc.com?
Have you changed the name (SSID) of your network and turned off SSID broadcasting?
Software Updates
Have you configured your operating systems (Windows, OS X) to install new software patches and updates automatically?
Is other software installed on your computer (such as Microsoft Office) configured for automatic updates?
How can I ensure that I’ve covered access will be secure and free from
all aspects of protecting my problems.
computer? The checklist in Figure 9.36 Taking a few precautions regarding your
is a guide to ensure you didn’t miss any data security can provide huge benefits such
critical aspects of security. If you’ve as peace of mind and the avoidance of time
addressed all of these issues, then you can spent correcting problems. So enjoy your
feel reasonably confident that your Internet computing experiences, but do so safely.
itself to another program and attempts to upper- and lowercase letters, numbers, and
spread to other computers when files are ex- symbols, and are at least 14 characters long.
changed. Computer viruses can be grouped Passwords should not contain words that
into five categories: (1) boot-sector viruses, are in the dictionary or easy-to-guess per-
(2) logic bombs and time bombs, (3) worms, sonal information (like your pet’s name).
(4) scripts and macros, and (5) encryption Online password checkers can be used to
viruses. Once run, they perform their evaluate the strength of your passwords.
malicious duties in the background and are Utilities built into Web browsers and Inter-
often invisible to the user. net security software can be used to manage
your passwords and alleviate the need to re-
member numerous complex passwords.
2. What can I do to protect my computer
from viruses?
The best defense against viruses is to install 6. How can I surf the Internet
antivirus software. You should update the anonymously and use biometric
software on a regular basis and configure it authentication devices to protect my
to examine all e-mail attachments for data?
viruses. You should periodically run a The current versions of the popular
complete virus scan on your computer to browsers include tools (such as Chrome’s
ensure that no viruses have made it onto Incognito feature) that hide your surfing ac-
your hard drive. tivities by not recording Web sites that you
visit, or files that you download, in your
browser’s history files. Biometric authentica-
3. How can hackers attack my
tion devices use a physical attribute (such as
computing devices, and what harm
a fingerprint) that is not easily duplicated to
can they cause? control access to data files or computing de-
A hacker is defined as anyone who breaks vices. Some notebooks today feature finger-
into a computer system unlawfully. Hackers print readers and facial recognition software
can use software to break into almost any to control access.
computer connected to the Internet (unless
proper precautions are taken). Once hackers
gain access to a computer, they can poten- 7. How do I manage online annoyances
tially (1) steal personal or other important such as spyware and spam?
information, (2) damage and destroy data, The Web is filled with annoyances such as
or (3) use the computer to attack other spam, pop-ups, cookies, spyware, and scams
computers. such as phishing that make surfing the Web
frustrating and sometimes dangerous. Soft-
ware tools help to prevent or reduce spam,
4. What is a firewall, and how does it
adware, and spyware, while exercising cau-
keep my computer safe from tion can prevent serious harm caused by
hackers? phishing, pharming, and other Internet
Firewalls are software programs or hard- scams and hoaxes.
ware devices designed to keep computers
safe from hackers. By using a personal fire-
wall, you can close open logical ports to in-
vaders and potentially make your computer
invisible to other computers on the Internet.
446 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
summary
nine nine
chapter
8. What data do I need to back up, and appears to be legitimate (such as a bank site)
what are the best methods for doing but is specifically designed to capture per-
so? sonal information for committing fraud. To
summary
Data files created by you (such as Word and avoid phishing scams, you should never
Excel files) or purchased by you (such as reply directly to any e-mail asking you for
music files) need to be backed up in case personal information, and never click on a
they are inadvertently deleted or damaged. link in an e-mail to go to a Web site. You can
Application software (such as Microsoft research topics you believe to be hoaxes at
Office) may need to be reinstalled if files are sites such as Snopes (snopes.com).
damaged, so backups (usually the DVDs or
CDs the application came on) must be
10. How do I protect my physical
maintained. Web sites such as Adrive and
Skydrive are great for backing up individual computing assets from environmental
files. External hard drives are popular hazards, power surges, and theft?
choices for holding image backups of your Computing devices should be kept in clean
entire system. Windows 7 and OS X contain environments free from dust and other
solid backup tools that help automate particulates and should not be exposed to
backup tasks. extreme temperatures (either hot or cold).
You should protect all electronic devices
from power surges by hooking them up
9. What is social engineering, and how through surge protectors, which will
do I avoid falling prey to phishing and protect them from most electrical surges
hoaxes? that could damage the devices. Notebook
Social engineering schemes use human in- computers can be protected from theft
teraction, deception, and trickery to fool either by attaching alarms to them or by
people into revealing sensitive information installing software that will help recover
such as credit card numbers and passwords. the computer, if stolen, by reporting the
Phishing schemes usually involve e-mails computer’s whereabouts when it is
that direct the unwary to a Web site that connected to the Internet.
447
nine
nine key terms
chapter
448 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
buzzwords
nine nine
chapter
Word Bank
• adware • hacker(s) • social engineering
• antivirus software • identity theft • spyware
buzzwords
• backup(s) • keystroke logger(s) • surge protector
• distributed denial-of- • logical port(s) • virus
service (DDoS) • phishing • zombie(s)
• firewall
Instructions: Fill in the blanks using the words from the Word Bank above.
Emily learned a lot about computer security in her computer literacy class. She already
knew it was important to exercise caution when using the Internet because she had been
the victim of (1) __________, which destroyed her credit rating. A(n) (2) __________ had
obtained her credit card information by posing as an employee of her bank, using a
method known as (3) __________. In her class, Emily learned that hackers could install
(4) __________, a type of software that will capture everything she types, to steal her
personal information. And one of Emily’s classmates received a (5) __________ e-mail that
directed her to a fake Web site that looked like her bank’s Web site and resulted in her bank
account information being stolen. The computers in the lab at school had just been cleaned
of (6) __________ software that was displaying annoying pop-up advertisements. The
computer technician who fixed this problem indicated that (7) __________ software, which
was monitoring computer user activity, was often inadvertently installed on lab computers
by students downloading files.
Emily found out that her router could be configured as a(n) (8) __________ to repel
malicious hacking mischief. Turning off the unused (9) __________ would repel most
attacks on her home network. With this protection, it was unlikely that a hacker would turn
her PC into a(n) (10) __________ to launch (11) __________ attacks. However, after the scare
with the Conficker (12) __________, Emily was careful to warn her family not to open files
from untrusted sources. She also made sure all of the computers in her home had
(13) __________ installed to protect them from viruses. For extra security, Emily installed
an external hard drive so that she could create (14) __________ of her data files, and she
computer
replaced her power strip with a(n) (15) __________ to make sure power spikes didn’t ruin
her computer after all of the other precautions she’d taken.
literate
becoming
computer literate becoming
While attending college, you are working at a company that manufactures industrial
adhesives. Recently, the company computers have been behaving strangely and running
slowly. Your investigation revealed that although antivirus software was initially installed
on the company computers, the subscriptions have lapsed and the software is out of date. It
also appears that no antispyware software was ever deployed. Your boss heard that you are
taking a computer course and has asked you to run a seminar to educate management
about the potential problems and solutions.
Instructions: Using the preceding scenario, draft an antivirus and antispyware plan for
the company using as many of the keywords from the chapter as you can. Be sure that the
company managers, who are unfamiliar with many computer terms, can understand the
report.
449
nine
nine self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. An incremental backup back ups all files on your computer in a specified location.
_____ 2. Even a properly installed surge protector may fail to protect a computer from all
power surges.
_____ 3. Phishing is a form of social engineering.
_____ 4. When malicious code is planted on your computer that interferes with your
browser’s ability to find Web addresses, it is known as phishing.
_____ 5. If a password includes numbers, symbols, and upper- and lowercase letters, it is
considered to be a strong password.
450 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
making the
nine nine
chapter
transition to...
next semester
1. Backup Procedures
transition to...
After reading this chapter, you know you should have a good backup strategy in place
for your key data. Consider the following and prepare answers in an appropriate
format as directed by your instructor.
next semester
making the
a. How often do you back up critical data files such as homework files? What type of
device do you use for backing up files? Where do you store the backups to ensure
they won’t be destroyed if a major disaster (such as a fire) destroys your computer?
Do you use online sites for file backups?
b. List the applications (such as Microsoft Office) that are currently installed on your
computer. Where is the media (DVDs) for your application software stored? For any
software you purchased in an Internet download, have you burned a copy of the
installation files to DVD in case you need to reinstall the software?
c. Have you ever made an image backup of your entire system? If so, what software
do you use for image backups, and where are the image backups stored? If not,
research image backup software on the Internet and find an appropriate package to
use. Will you need to purchase an additional backup device to hold your image
backup or does your current device have room for an image backup? If you need a
new device, find one on the Internet that is appropriate. What is the total cost of the
software and hardware you will need to implement your image backup strategy?
451
nine
nine making the
chapter
transition to...
the workplace the workplace
1. File Backup Strategies
making the
Your employer was recently the victim of a break-in, and all three dozen of its
computers were stolen. Your company lost invaluable data because there was no
transition to...
comprehensive backup strategy in place for its computers. Your boss has asked you to
prepare a report outlining a new file backup plan for the company. While preparing
your report, consider the following:
a. How often should computer data be backed up? Should full backups or incremental
backups be performed? Are image backups necessary?
b. Eighteen employees have notebook computers that they take off company premises.
How will backups for notebooks be handled?
c. Research companies that provide online backup solutions for businesses. Which one
provides the most cost effective solution for backing up three dozen computers?
Can backups be performed automatically as employees change data files?
2. Securing Customer Data
Many corporations are collecting vast amounts of sensitive data (such as credit card
numbers, birth dates, etc.) about their customers. Assume you are working for a business
that accepts orders for merchandise through a Web site. Answer the following questions:
a. What types of information should you collect from your customers? What informa-
tion couldn’t you justify collecting from your customers using a valid business
reason (i.e., Social Security number)?
b. Your company would like to send e-mails to customers on their birthdays, offering
them a special discount on merchandise purchased within one week of their birth-
day. How would you explain to customers why you are collecting their birth dates,
and what measures would you need to take to keep this data secure?
c. How would you ensure that information shared with third parties (such as delivery
companies) is kept secure?
d. If your computer system was compromised and customer data was stolen, what
would you say to customers regarding the loss of their personal data? What steps
would you recommend your customers take to prevent identity theft due to your
losing control of their data?
3. Is Your Computer Vulnerable?
Visit Gibson Research (grc.com) and run the company’s ShieldsUP and LeakTest
programs on your personal computer.
a. Did your computer get a clean report? If not, what potential vulnerabilities did the
testing programs detect? If ports were shown as being vulnerable, research what
these ports do and explain what steps you will take to protect them.
b. A properly configured firewall protects your computer from port vulnerabilities.
Use the Internet to research firewall products and find three free firewall products.
Which one appears to provide the best protection?
c. Besides adding a firewall to your system, what other measures should you take to
protect your system from exploitation by hackers?
4. Computer Security Careers
Computer security professionals are among the highest paid employees in information
technology organizations. Using employment sites such as Monster.com,
computerjobs.com, and dice.com, research computer security jobs available in the state
where your school is located (try searching “computer security”). Select three entry-
level computer security jobs from different employers and prepare a document com-
paring the following: What are the educational requirements for computer security
jobs? What job skills are required? How much prior work experience are firms looking
for? Are programming skills required? With cloud computing becoming more popular,
how will that affect the outlook for computer security jobs?
452 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
critical thinking
nine nine
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Protecting Your Home Network
Many people have networks in their homes. Consider the network installed in your
home (or in a friend’s home if you don’t have a network).
a. Is your network set up to provide adequate protection against hackers? If not, what
would you need to do to make it secure?
b. Are the computers on your home network protected against viruses and malware?
What software do you use for protection and how often is it updated? Have you
ever had problems from a virus or spyware infestation? If so, how did you resolve
the problem?
2. Password Protection
You know from reading this chapter that secure passwords are essential to protecting
your digital information. Consider the following:
a. How many online accounts do you have that have passwords? List them. Are the
passwords for these accounts secure, based on the suggestions proposed in this
chapter? Do you change your passwords on a regular basis?
b. How do you keep track of all of your passwords? Do you use password-management
software? If so, what product are you using? How often do you change your master
password? If you don’t use password-management software, what methodology do
you use for remembering and tracking your passwords?
3. Shouldn’t Protection Be Included?
The Uniform Commercial Code, which governs business in every state except
Louisiana, covers the implied warranty of merchantability. This warranty’s basic
premise is that a company selling goods guarantees that their products will do what
they are designed to do (i.e., a car will transport you from place to place) and that there
are no significant defects in the product. But computers are routinely sold with only
trial versions of antimalware software.
a. Does the failure of OS manufacturers to include antimalware tools constitute a
breach of the implied warranty of merchantability? Why or why not? Microsoft does
have an antimalware product (Security Essentials), but it requires a separate
download. Should Microsoft be required to include Security Essentials as part of
the Windows product?
b. Computer hardware manufacturers don’t make OS software, but they sell comput-
ers that would be unusable without an OS. What responsibility do they have in
regard to providing antimalware protection to their customers?
4. Restricting Information to Keep You Safe
Many countries, such as China, have laws that control the content of the Internet and
restrict their citizens’ access to information. The United States, with the exception of
specific areas such as cyberbullying and pornography, does not currently take steps to
restrict its citizens’ access to the Internet. Unfortunately, this freedom of information
does carry some cost because some information on the Web can be potentially danger-
ous to the general public.
a. Do you think the U.S. government should censor information on the Web, such as
instructions for making weapons, to protect the general public? Why or why not? If
you think there should be some censorship, do you think such a law would violate
the First Amendment right to free speech? Explain your answer.
b. Would you be willing to live with a lower level of information access to increase
your sense of well being? What topics do you feel would make you feel more secure
if they were censored?
453
nine
nine team time
chapter
Problem
Computer networks with high-speed connections to the Internet are common in most busi-
nesses today. However, along with easy access to computing devices and the Web comes
the danger of theft of digital assets.
Task
A recent graduate of your school has opened a 15-person real estate office in a neighboring
town. He approached your instructor for help in ensuring that his computers are ade-
quately protected from viruses, malware, and hackers. Because he is currently low on
funds, he is hoping that there may be free software available that can adequately shield his
company from harm.
Process
Break the class into three teams. Each team will be responsible for investigating one of the
following issues:
1. Firewalls. Research free firewall software and locate at least three software options that
can be deployed at the business. Be sure to concentrate on software that is easy to con-
figure and requires little or no user interaction to be effective.
2. Antivirus software. Research alternatives that can be used to protect the computers in
the office from virus infection. Find at least three alternatives and support your recom-
mendations with reviews (from publications such as PC Magazine or Consumer Reports)
that evaluate the free packages and compare them to commercial solutions.
3. Antimalware software. Research free packages that will offer protection from malware.
Locate at least three alternatives and determine whether the recommended software
can be updated automatically. (Many free versions require manual updates.) Most com-
panies that provide free malware protection also offer commercial packages (for a fee)
that provide automatic updates. You may need to recommend that the company pur-
chase software to ensure that a minimum of employee intervention is needed to keep
the software up to date.
Present your findings to your class and discuss the pros and cons of free and commercial
software. Provide your instructor with a report suitable for eventual presentation to the
owner of the real estate office.
Conclusion
With the proliferation of viruses and malware, it is essential to protect business (and home)
computers and networks from destruction and disruption. Free alternatives might work,
but you should ensure that you have done adequate research to determine the best possible
protection solution for your particular situation.
454 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
ethics
nine nine
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an ethi-
cal solution.
• United States Supreme Court case United States v. American Library Association (2003)
• Content-filtering software and First Amendment rights
• Violating children’s free speech rights
• Children’s Internet Protection Act (CIPA)
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which parents have complained
about their child not being able to access a certain Web site needed for school research.
2. Team members should write a summary that provides background information for
their character—for example, parent, library administrator, and arbitrator—and details
their character’s behaviors to set the stage for the role-playing event. Then, team mem-
bers should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the chat room feature of MyITLab, the discussion board feature of Blackboard, or
meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
455
t’s hard to imagine an occupation in which
Number of Education/
Percent new jobs Wages (May training
Occupations change (in thousands) 2008 median) category
consumers who have had difficulty understand- participants had “negative experiences” with
ing the employees with foreign accents who staff overseas outsourcing. And a survey in CFO
the support lines. Communications problems can magazine indicated that 22 percent of CFOs were
arise between internal and external employees, planning to increase their outsourcing within
for example, and cultural differences between the the United States. Although outsourcing and
home country and the country doing the off- offshoring won’t be going away, companies are
shoring can result in software code that needs ex- approaching it with more caution and looking
tensive rework by in-house employees to make it more to U.S. companies to provide resources.
usable. Data also can be less secure in an external So, what IT jobs will be staying in the United
environment, or during the transfer between the States? According to InformationWeek magazine,
company and an external vendor. A study by De- most of the jobs in these three categories
loitte Consulting found that 70 percent of survey (see Figure 2) will stay put:
Database and data warehouse Project managers (for systems with Network administrators
designers/developers customers and business users (engineers)
who are located predominantly in
the United States)
1. Customer interaction: Jobs that require di- the size of an employer and its geographic
rect input from customers or that involve location are also factors. Large companies
systems with which customers interface tend to pay more, so if you’re pursuing a
daily. high salary, set your sights on a large corpo-
2. Enablers: Jobs that involve getting key ration. But remember that making a lot of
business projects accomplished, often money isn’t everything—be sure to con-
requiring technical skills beyond the realm sider other quality-of-life issues such as job
of IT and good people skills. satisfaction.
3. Infrastructure jobs: Jobs that are funda- 2. Gender bias: Many women view IT
mental to moving and storing the informa- departments as Dilbert-like microcosms
tion that U.S.–based employees need to do of antisocial geeks and don’t feel they
their jobs. would fit in. Unfortunately, some mostly
male IT departments do suffer from
varying degrees of gender bias. Although
Common Myths About some women may thrive on the challenge
IT Careers of enlightening these male enclaves and
bringing them into the 21st century,
Many people have misconceptions about pursu- others find it difficult to work in such
ing a career in IT that scare them away from environments.
considering a career in computing or convince
3. Location: In this case, location refers to
them to pursue a computing career for the
the setting in which you work. IT jobs can
wrong reasons. Review the myths listed in the
be office based, field based, project based,
boxed feature shown on the next page. Do you
or home based. Not every situation is
share any of these misconceptions?
perfect for every individual. Figure 3
summarizes the major job types and their
Is an IT Career Right locations.
for Me? 4. Changing nature of the work: In IT, the
playing field is always changing. New soft-
A career in IT can be a difficult path. Before ware and hardware are constantly being
preparing yourself for such a career, consider the developed. It’s almost a full-time job to
following. keep your skills up to date. You can expect
1. Salary range: What affects your salary in to spend a lot of time in training and self-
an IT position? Your skill set and your study trying to learn new systems and
experience level are obvious answers, but techniques.
Field based Travel from place to place as needed and Involve a great deal of travel and
perform short-term jobs at each location the ability to work independently
Project based Work at client sites on specific projects for Can be especially attractive to
extended periods of time (weeks or months) individuals who like workplace
situations that vary on a regular
Examples: contractors and consultants basis
Home based Work from home Involve very little day-to-day
(telecommuting) supervision and require an
individual who is self-disciplined
5. Stress: Whereas the average American The good news is that despite the stress (see
works 42 hours a week, a survey by Figure 5) and changing nature of the IT environ-
InformationWeek shows that the average IT ment, most computing skills are portable from
staff person works 45 hours a week and is industry to industry. A networking job in the
on call for another 24 hours. On-call time clothing manufacturing industry uses the same
(hours an employee must be available to primary skill set as a networking job for a
work in the event of a problem) has been
increasing in recent
years because more
IT systems (such as Te
xt
e-commerce systems) co cu s fr g
tin eed
s
ne mpl stom om 6 rke nt n ge
w a a
require 24/7 We nin ers 3
i M me p a
bs ga rt b
pa We ay
availability. ite bo
de ut de ew Frid
sig n by
n
Sa
les
r Sc s
so ly
rvi er ott golf taff a
u pe uart ort s
the al outi t an
d
FIGURE 5 q
S s rep
y!
ir s c ng nua
e
ale an’t in
ed t l
ne udge erda s r ac
Stress comes from multiple b est ep ce
ort ss
y
s
directions in IT jobs.
I Work In?
Web Development
Figure 7 provides an organizational chart for a
When most people think of Web development
modern IT department that should help you un-
careers, they usually equate them with being a
derstand the careers currently available and how
webmaster. However, today’s webmasters usu-
they interrelate. The chief information officer
ally are supervisors with responsibility for cer-
(CIO) has overall responsibility for the develop-
tain aspects of Web development. At smaller
ment, implementation, and maintenance of in-
companies, they may also be responsible for
formation systems and infrastructure. Usually
tasks that the other individuals in a Web devel-
the CIO reports to the chief operating officer
opment group usually do:
(COO).
The responsibilities below the CIO are gener- • Web content creators generate the words
ally grouped into two units: development and and images that appear on the Web. Journal-
integration (responsible for the development of ists, other writers, editors, and marketing
systems and Web sites) and technical services personnel prepare an enormous amount of
(responsible for the day-to-day operations of the Web content, whereas video producers,
company’s information infrastructure and graphic designers, and animators create
network, including all hardware and software Web-based multimedia. Interface designers
deployed). work with graphic designers and animators
In large organizations, responsibilities are to create a look and feel for the site and
distinct and jobs are defined more narrowly. In make it easy to navigate. Content creators
medium-sized organizations, there can be over- have a thorough understanding of their
lap between position responsibilities. At a small own fields as well as HTML/XHTML, PHP,
shop, you might be the network administrator, and JavaScript. They also need to be familiar
database administrator, computer support with the capabilities and limitations of
technician, and helpdesk analyst all at the same modern Web development tools so that
time. Let’s look at the typical jobs found in each they know what the Web publishers can
department. accomplish.
Director of Director of
Development Technical
& Integration Services
Manager of Manager of
Manager of Network Help Desk
Webmaster(s) Systems Project
Programming Administrator(s) Manager
Analysis Management
Interface Telecommunications
Designer(s) Technical Technician(s)
Writer(s)
Web Content
Creator(s) Database
Developer(s) Java, JavaScript, ASP, PHP, and PERL) and
development environments such as the
Customer Microsoft .NET Framework.
Interaction
Technician(s) • Customer interaction technicians provide
feedback to a Web site’s customers. Major job
Social
responsibilities include answering e-mail,
Media sending requested information, funneling
Director questions to appropriate personnel (technical
support, sales, and so on), and providing sug-
FIGURE 7 gestions to Web publishers for site improve-
This is a typical structure for an IT department at a large ments. Extensive customer service training is
corporation. essential to work effectively in this area.
• Social media directors are responsible for
directing the strategy of the company on all
• Web publishers build Web pages to deploy social media sites where the company
the materials that the content creators maintains a presence. Often supervising
develop. They wield the software tools customer interaction technicians, these peo-
(such as Adobe Dreamweaver and Microsoft ple make sure that customers have a quality
Expression) that develop the Web pages and experience while interacting with company
create links to databases (using products employees and customers on sites such as
such as Oracle and SQL Server) to keep Facebook, Twitter, and MySpace. Respond-
information flowing between users and ing to comments left on sites, developing
Web pages. They must possess a solid promotional strategies, and designing
understanding of client- and server-side functionality of the company’s social media
Web languages (HTML/XHTML, XML, sites are common job responsibilities.
Interface designers
create navigation Content creators
schemes generate text
Graphic designers
create art
As you can see in Figure 8, many different mixture of systems development, program-
people can work on the same Web site. The ming, and business courses.
education required varies widely for these jobs. • Programmers participate in the SDLC, at-
Web programming jobs often require a four-year tending meetings to document user needs
college degree in computer science, whereas and working closely with systems analysts
graphic designers often are hired with two-year during the design phase. Programmers need
art degrees. excellent written communication skills be-
cause they often generate detailed systems
documentation for end-user training pur-
Systems Development poses. Because programming languages are
Ask most people what systems developers do mathematically based, it is essential for pro-
and they will answer, “programming.” How- grammers to have strong math skills and an
ever, programming is only one aspect of systems ability to think logically. Programmers
development. Because large projects involve should also be proficient at more than one
many people, there are many job opportunities programming language. A four-year degree
in systems development. An explanation of each is usually required for entry-level program-
key area follows. ming positions.
• Systems analysts spend most of their time • Project managers usually have years of ex-
in the beginning stages of the system devel- perience as programmers or systems ana-
opment life cycle (SDLC). They talk with lysts. This job is part of a career path upward
end users to gather information about from entry-level programming and systems
problems and existing information systems. analyst jobs. Project managers manage the
They document systems and propose overall systems development process:
solutions to problems. Having good people assigning staff, budgeting, reporting to
skills is essential to success as a systems ana- management, coaching team members, and
lyst. In addition, systems analysts work with ensuring deadlines are met. Project man-
programmers during the development agers need excellent time management skills
phase to design appropriate programs to because they are pulled in several directions
solve the problem at hand. Therefore, many at once. Many project managers obtain mas-
organizations insist on hiring systems ana- ter’s degrees to supplement their undergrad-
lysts who have both solid business back- uate degrees in computer science or MIS.
grounds and previous programming
In addition to these key players, the following
experience (at least at a basic level). For
people are also involved in the systems develop-
entry-level jobs, a four-year degree is usu-
ment process:
ally required. Many colleges and universi-
ties offer degrees in management • Technical writers generate systems
information systems (MIS) that include a documentation for end users and for
FIGURE 9
This is a flowchart of a ticket ordering system. Each member of the systems development team performs functions critical to the development
process (as shown in the red boxes).
Database
developers
design
Customer orders tickets databases
on Web site
Payments transferred to
bank account
Data
Ticket transferred
Billing
Ordering Database
Database
Tickets
Clerk verifies order accuracy
printed
and payment
Systems analysts
interview users
to document
procedures Tickets Clerk reviews tickets
and mails
Computer
programmers
generate code to
process and record
transactions
for a job in a specific field. The main advan- 3. Get experience. In addition to education,
tage of technical schools is that their employers want you to have experience,
programs usually take less time to complete even for entry-level jobs. While you’re still
than college degrees. However, to have a completing your education, consider get-
realistic chance of employment in IT fields ting an internship or part-time job in your
other than networking or Web develop- field of study. Many colleges will help you
ment, you should attend a degree-granting find internships and allow you to earn
college or university. credit toward your degree through intern-
2. Investigate professional certifications. ship programs.
Certifications attempt to provide a consis- 4. Do research. Find out as much as you can
tent method of measuring skill levels in about the company and the industry it is in
specific areas of IT. Hundreds of IT certifi- before going on an interview. Start with the
cations are available, most of which you get company’s Web site and then expand your
by passing a written exam. Software and search to business and trade publications
hardware vendors (such as Microsoft and such as Business Week and CIO magazines.
Cisco) and professional organizations (such
as the Computing Technology Industry
Association) often establish certification How Do I Find a Job
standards. Visit microsoft.com, cisco.com, in IT?
comptia.org, and sun.com for more
information on certifications. Training for a career is not useful unless you can
find a job at the end of your training. Here are
Employees with certifications generally some tips on getting a job.
earn more than employees who aren’t certi-
fied. However, most employers don’t view a 1. Visit your school’s placement office. Many
certification as a substitute for a college de- employers recruit at schools, and most
gree or a trade school program. You should schools maintain a placement office to help
think of certifications as an extra edge be- students find jobs. Employees in the place-
yond your formal education that will make ment office can help you with résumé prepa-
you more attractive to employers. To ensure ration and interviewing skills, and provide
you’re pursuing the right certifications, ask you with leads for internships and jobs.
employers which certifications they respect, 2. Visit online employment sites. Most IT
or explore online job sites to see which certi- jobs are advertised online at sites such as
fications are listed as desirable or required. Monster.com and Dice.com. Most of these
If you are a woman and are thinking opportunities. For example, Google pro-
about pursuing an IT career, there are many vides searchable job listings by geographic
resources and groups that cater to female IT location (see Figure 15). Check the sites of
professionals and students. The oldest and companies in which you are interested and
best-known organization is the Association then do a search on the sites for job open-
for Women in Computing, founded in 1978. ings or, if provided, click their Employment
Figure 14 provides a list of resources to in- links.
vestigate. The outlook for IT jobs should continue to be
4. Check corporate Web sites for jobs. positive in the future. We wish you luck with
Many corporate Web sites list current job your education and job search.
FIGURE 15
Corporate Web sites often list available jobs. The Google site arranges jobs by location and then by broad
categories to help you zero in on the right job.
1. The individuals responsible for making a Web site 6. Which of the following statement about IT careers is
easy to navigate are referred to as true?
a. network engineers. a. IT employers typically prefer certification to
b. graphic designers. experience.
c. Web programmers. b. Women who have IT skills have limited
d. interface designers. opportunities.
c. Most IT jobs are being moved offshore.
2. What type of job involves a great deal of travel and
d. IT jobs require frequent interaction with others.
the ability to work independently?
a. Field based 7. Which task is not typically performed by a network
b. Project based administrator?
c. Office based a. Developing network usage policies
d. Home based b. Installing networks
c. Planning for disaster recovery
3. Which position is not typically a part of the informa-
d. Web site programming
tion systems department?
a. Helpdesk analysts 8. Social media directors are the people who are respon-
b. Telecommunications technicians sible for
c. Network administrators a. orchestrating the company strategy in online
d. Web server administrators venues.
b. providing feedback to Web site customers.
4. Outsourcing is thought to be an attractive option for
c. creating the look and feel of a Web site.
many companies because of
d. deploying the materials prepared by content
a. the emphasis on employee training.
creators.
b. the cost savings that can be realized.
c. increased data security. 9. The oldest scientific computing organization is the
d. the opportunity to experience new cultures and a. Institute of Electrical and Electronics Engineers.
ideas. b. Association for Computing Machinery.
c. Information Systems Security association.
5. Which role best describes those employees who
d. Association for Women in Computing.
design solutions to problems?
a. Project managers 10. Which position is part of the Web development
b. Network engineers department?
c. Systems analysts a. Systems analyst c. Programmer
d. Database developers b. Web content creator d. Technical writer
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What is a system development life cycle, and what are the phases in the
cycle? (pp. 474–476)
2. What is the life cycle of a program? (p. 478)
3. What role does a problem statement play in programming? (pp. 478–480)
4. How do programmers create algorithms? (pp. 480–486)
5. How do programmers move from algorithm to code, and in what categories of lan-
guage might they code? (pp. 486–487)
6. How does a programmer move from code in a programming language to the 1s and
0s the CPU can understand? (pp. 487–493)
7. How is a program tested? (pp. 493–494)
8. What steps are involved in completing the program? (pp. 494–495)
9. How do programmers select the right programming language for a specific
task? (pp. 495–502)
10. What are the most popular programming languages for Windows and Web
applications? (pp. 502–505)
multimedia resources
multimedia
resources
Active Helpdesk
• Understanding Software Programming (p. 495)
• Selecting the Right Programming Language (p. 497)
Sound Bytes
• Programming for End Users (p. 479)
• Looping Around the IDE (p. 493)
• 3D Programming the Easy Way (p. 503)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Microsoft has a tool to
make gaming programming simpler for all of us. The tool is called XNA Game
Studio. This platform uses the C# programming language to develop video games
for both Windows and the Xbox 360 game system. When the game is complete, the
“developer” can distribute his or her creation to other players using the Xbox
Live network. Windows Phone 7, the operating system for Windows-based mobile
devices like the Microsoft Zune, now also supports XNA. So you can open up the
Platformer Starter Kit and start creating your own 2D game in an afternoon!
Tour the XNA Creators Club (creators.xna.com/en-US) to see the types
of games players from all over the world have created!
473
Understanding Understanding programming is therefore
an important piece of getting the most out of
Software your computer system. If you plan to use
Programming only off-the-shelf (existing) software, having
Every day we face a wide array of tasks. a basic knowledge of programming enables
Some tasks are complex and need a human you to understand how application software
touch; some require creative thought and is constructed and to add features that sup-
high-level organization. However, some port your personal needs. If you plan to cre-
tasks are routine, such as alphabetizing a ate custom applications from scratch, having
huge collection of invoices. Tasks that are a detailed knowledge of programming will
repetitive, work with electronic information, be critical to the successful completion of
and follow a series of clear steps are candi- your projects. In this chapter, we explore the
dates for automation with computers. stages of program development and survey
Why would I ever need to create a the most popular programming languages.
program? Well-designed computer pro-
grams already exist for many tasks. For ex-
ample, if you want to write a research paper,
The Life Cycle of an
Microsoft Word allows you to do just that. Information System
The program has already been designed to Generally speaking, a system is a collection
translate the tasks you want to accomplish of pieces working together to achieve a com-
into computer instructions. To do your mon goal. Your body, for example, is a sys-
work, you need only be familiar with the in- tem of muscles, organs, and other organized
terface of Word; you do not have to create a groups of cells working together. The college
program yourself. you attend is a system, too, in which admin-
However, for users who cannot find an istrators, faculty, students, and maintenance
existing software product to personnel work together. An
accomplish a task, program-
ming is mandatory. For ex-
ample, imagine that a
medical company comes up
“
Why do I need to
know some
programming?
information system in-
cludes data, people, proce-
dures, hardware, and
”
software. You interact
with a new smart bandage with information systems
that is designed to transmit all the time, whether you
medical information about a wound directly are at a grocery store, bank, or restaurant. In
to a diagnostic computer. (These devices are any of these instances, the parts of the sys-
currently under development.) No existing tem work together toward a similar goal. Be-
software product on the market is designed cause teams of individuals are required to
to accumulate and relay information in just develop such systems, they need to follow
this manner. Therefore, a team of software an organized process (set of steps) to ensure
programmers will have to create smart- that development proceeds in an orderly
bandage software. fashion.
If I’m not going to be a program- This set of steps is usually referred to as
mer, why do I need to know some the system development life cycle (SDLC).
programming? Even if you’ll never cre- Systems theory came long before program-
ate a program of your own, knowing the ba- ming: Everything is a part of something
sics of computer programming is still larger and something smaller. If you change
helpful. For example, most modern software one part of a system, other parts of the sys-
applications enable you to customize and tem also change. In this section, we provide
automate various features by using custom- you with an overview of systems develop-
built miniprograms called macros. By creat- ment and show you how programming fits
ing macros, you can ask the computer to into the cycle.
execute a complicated sequence of steps
with a single command. Understanding how
to program macros enables you to add cus-
System Development Life Cycle
tom commands to Word or Excel, for exam- Why do I need a process to develop
ple, and lets you automate frequently a system? To create a modern software
performed tasks, providing a huge boost package, an entire team of people is needed,
to your productivity. and a systematic approach is necessary.
Concert
Hall
Building a software application is a process that involves many people Although the basic mistakes involved poor software engineering prac-
and requires many decisions. But what happens when the released tices, many different factors explained the full set of accidents including:
product is defective—tragically defective?
• Simple programming errors
The most infamous example of this was the computerized radiation
• Inadequate safety engineering
therapy machine called the Therac-25 (see Figure 10.3). Between June
• Poor human–computer interaction design
1985 and January 1987, six known accidents in the United States and
Canada led to massive radiation overdoses by the Therac-25, resulting in • Too little focus on safety by the manufacturing organization
the death of three patients and serious injuries to three others. This error • Inadequate reporting structure at the company level and as
has been described as the worst series of radiation accidents in the his- required by the U.S. government
tory of medical accelerators. In events such as this one, who should be held responsible for produc-
The software was responsible for monitoring the machine’s status, ing defective software? Is it the corporate management that did not insti-
accepting input about the treatment desired, and setting the machine up tute a defined software process? Is it the production managers, who
for treatment. It turned on the beam in response to an operator com- forced tight schedules that demanded risky software engineering prac-
mand and turned off the beam when treatment was completed, when an tices? What about the software engineers who wrote the defective code?
operator commanded it, or when a malfunction was detected. The very first article of the code of ethics of the Institute of Electrical and
In the first accident, a 61-year-old woman was receiving follow-up Electronic Engineers (IEEE) states, “[We] accept responsibility in making
radiation after surgery for breast cancer. When the machine turned on, engineering decisions consistent with the safety, health, and welfare of the
she said that she felt a “tremendous force of heat . . . this red-hot sensa- public, and to disclose promptly factors that might endanger the public or
tion.” When the technician came in and the patient said that she had the environment.” What about users of the software? Can they be held
been burned, the technician replied that it was not possible. The patient responsible for accidents? What if they made changes to the system?
went home but was soon in so much pain that she went to the local hos- The Association for Computing Machinery (ACM) and the IEEE have
pital. Hospital staff determined that the patient was experiencing a nor- established eight principles for ethical software engineering practices:
mal reaction to the radiation therapy and advised her to continue
1. Public: Software engineers shall act consistently with the public
treatments.
interest.
Although the therapeutic dose was expected to be about 200 rads, it
2. Client and Employer: Software engineers shall act in a manner
was later estimated that the patient had received one or two doses of ra-
that is in the best interests of their client and employer consistent
diation in the 15,000- to 20,000-rad range (doses of 1,000 rads can be with the public interest.
fatal). The hospital explained that part of the confusion happened be-
3. Product: Software engineers shall ensure that their products and
cause staff members had never seen a radiation overdose of that magni- related modifications meet the highest professional standards
tude before. Eventually the patient lost her breast, lost the use of her possible.
shoulder and arm, and was in constant pain. 4. Judgment: Software engineers shall main-
Other patients had similar incidents, some dying tain integrity and independence in their
as a result of complications from the error in the professional judgment.
dosage. 5. Management: Software engineering man-
In the years since these accidents, much agers and leaders shall subscribe to and
analysis has been done to see how the tragedy promote an ethical approach to the man-
could have been avoided. One notable item is that agement of software development and
remarkably little software documentation was maintenance.
produced by the two manufacturing companies 6. Profession: Software engineers shall
involved during development. A memo by the advance the integrity and reputation of
Food and Drug Administration reviewing the inci- the profession consistent with the public
dent said, “Unfortunately, the company response interest.
also seems to point out an apparent lack of docu- 7. Colleagues: Software engineers shall be
mentation on software specifications and a soft- fair to and supportive of their colleagues.
ware test plan.” 8. Self: Software engineers shall participate in
In addition, testing was not done in a rigorous lifelong learning regarding the practice of
manner. A “small amount” of software testing was their profession and shall promote an ethical
approach to the practice of the profession.
done on a simulator, but most testing was done at
the system level rather than by examining soft- Figure 10.3 Only through constant vigilance on the part
ware and hardware separately. It appears that The Therac-25 incident reminds us of the of each software programmer, manager, and
machine and software testing was minimal, with responsibilities incumbent on program- testing professional will situations such as the
most effort directed at the integrated system test. mers, system designers, and system users. Therac-25 be prevented.
Process Total pay earned is computed as $7.50 per hour for the first 8 hours worked each day. Any hours worked beyond the first 8 are
calculated at $11.25 per hour.
Error Handling The input (number of hours worked) must be a positive real number. If it is a negative number or other unacceptable character, the
program will force the user to re-enter the information.
values from the testing plan to determine Is there a standard format for a
whether the program they created works in problem statement? Most companies
the way it should. (We discuss the testing (and instructors) have their own format
process later in this chapter.) for documenting a problem statement.
Does the testing plan cover every However, all problem statements include
possible use of the program? The the same basic components: the data that
testing plan cannot list every input that the is expected to be provided (inputs), the
program could ever encounter. Instead, pro- information that is expected to be produced
grammers work with users to identify the (outputs), the rules for transforming the
categories of inputs that will be encoun- input into output (processing), an
tered, find a typical example of each input explanation of how the program will
category, and specify what kind of output respond if users enter data that doesn’t
must be generated. In the preceding parking make sense (error handling), and a testing
garage pay example, the error-handling plan. Figure 10.5 shows a sample problem
process would describe what the program statement for our parking garage
would do if you happened to enter “-8” (or example.
any other nonsense character) for the num-
ber of hours you worked. The error han-
dling would specify whether the program Making a Plan: Algorithm
would return a negative value, prompt you Development
to re-enter the input, or yell at you and shut
down (well, maybe not exactly). We could Once programmers understand exactly what
expect three categories of inputs in the park- the program must do and have created the
ing garage example. The user might enter: final problem statement, they can begin
developing a detailed algorithm, a set of
• A negative number for hours worked specific, sequential steps that describe in
that day natural language exactly what the computer
• A positive number equal to or less than program must do to complete its task. Let’s
eight look at some ways in which programmers
• A positive number greater than eight design and test algorithms.
Do algorithms appear only in
The testing plan would describe how the programming? Although the term
error would be managed or how the output algorithm may sound like it would fall only
would be generated for each input category. under the domain of computing, you design
PROCESS
P
Series
S of steps of work will be done here
Rectangle
INPUT/OUTPUT
IN
Data
D will be read (input) or printed (output)
Parallelogram
am
Oval TERMINATE
Seen at the beginning or end of the program
natural language and the special words that action first, that action second, another action
are commands in the programming lan- third, and so on. However, only the simplest
guage they are using. algorithms execute the same series of actions
every time they run.
Figure 10.8 Developing an Algorithm: Decision Problems that are more complex involve
Decision points force the choices and, therefore, cannot follow a se-
program to travel down
Making and Design quential list of steps to generate the correct
one branch of the algo- How do program- output. Instead, the list of steps created for
rithm or another.
mers develop an complex problems includes decision points,
Ask for # of
algorithm? When places where the program must choose from
Hours Worked programmers develop an array of different actions based on the
an algorithm, they con- value of its current inputs. For example, a
vert the problem binary decision (shown in a flowchart as a
statement into a list diamond) will have two possible paths that
Read # of of steps (or actions) can be taken, depending on the value of the
Hours Worked the program will take. inputs. Programmers convert a problem into
For simple problems, an algorithm by listing the sequence of ac-
Decision point this list is straightfor- tions that must be taken and recognizing the
ward: The program places where decisions must be made.
completes this In our parking garage example, if the
Is Number number of hours you worked in a given day
Yes of Hours Worked No
<= 8?
is eight or less, the program performs one
Program executes Program executes simple calculation: It multiplies the number
one set of steps if different set of
answer is Yes steps if answer of hours worked by $7.50. If you worked
is No more than eight hours in a day, then the
program takes a different path and per-
Total Pay = forms a different calculation, as shown in
Total Pay =
$7.50 * Number
$7.50 * 8 + $11.25 * Figure 10.8.
(Number of Hours
of Hours Worked
Worked – 8)
What kinds of decision points are
there? Two main types of decisions
change the flow of an algorithm. One deci-
sion point that appears often in algorithms
Done Done is like a “fork in the road” or a branch. Such
decision points are called binary decisions
Update
Bump to Next Day
Figure 10.10 a b c
In this figure, (a) a top-
down design is applied to Announce Program
the highest level of task Give Users Instructions
in our parking garage GET INPUT
example, (b) the tasks are Read the Input
further refined into sub- NumberHoursWorkedToday
tasks, and (c) subtasks are
refined into a sequence if (NumberHoursWorkedToday <= 8)
of instructions—an Determine if They Qualify Pay = $7.50 * NumberHoursWorkedToday
algorithm. PROCESS for Overtime
DATA else
Compute Pay Pay = $7.50 * 8 +
$11.25 * (NumberHoursWorkedToday – 8)
Print TotalPay
OUTPUT
RESULTS
High 3GL FORTRAN, BASIC, C, Java Symbols describe the commands to the CPU
Total Pay ⫽ Pay ⫹ Overtime Pay
input and each output item that the pro- asks for enough RAM storage space to hold
gram manipulates, also known as a an integer. After the RAM space is found, it
variable, needs to be announced early in the is reserved. As long as the program is run-
program so that memory space can be set ning, these RAM cells will be saved for the
aside. A variable declaration tells the oper- Day variable, and no other program can use
ating system that the program needs to allo- that memory until the program ends. From
cate storage space in RAM. The following that point on, when the program encounters
line of code is a variable declaration in the the symbol Day, it will access the memory it
language Java: reserved as Day and find the integer stored
int Day; there.
The following line of C++ code asks that
This variable’s name is Day. The “int” that
a decimal number (represented by the key-
precedes the Day variable indicates that this
word float) be stored in RAM:
variable will always be an integer (a whole
number such as 15 or –4). This statement float TotalPay;
Figure 10.15
APL requires programmers to use
an APL keyboard that includes
the many specialized operators in
the language.
This line asks the operating system to Comments are written into the code in plain
find and reserve enough storage space for English. The compiler, a program that trans-
one real number. It then associates the sym- lates codes into binary 1s and 0s, just ignores
bol TotalPay with the address of the mem- comments. Comments are intended to be
ory cell where that value will be stored. read only by human programmers. Lan-
Can programmers leave notes to guages provide a special symbol or keyword
themselves inside a program? to indicate the beginning of a comment. In
Programmers often insert a comment (or C++, the symbol // at the beginning of a
remark) into program code to explain the line indicates that the rest of the line is a
purpose of a section of code, to indicate the comment. In Visual Basic, a single apostro-
date they wrote the program, or to include phe or the keyword REM, short for remark,
other important information about the code does the same thing.
so that fellow programmers can more easily What would completed code for a
understand and update it should the origi- program look like? Figure 10.16, pres-
nal programmer no longer be available. ents a completed C++ program for our
Step 1:
Declare variables Keywords (blue)
Step 2:
Create loop
Step 3:
Collect input data
Step 4:
Check for errors
Commands (black)
Loop
Step 5:
Process data
Step 6:
Update variables
Figure 10.16
A complete C++ program
that solves the parking parking garage example. We’ll discuss later The next section (step 3) collects the input
garage pay problem. how you would actually enter this program data from the user. The program then checks
on your system. This program, which is writ- that the user entered a reasonable value
ten in a top-down style, does not make use (step 4). In this case, a positive number for
of objects. Each statement in the program is hours worked must be entered. Next, the
executed sequentially (that is, in order from program processes the data (step 5). If the
the first statement to the last) unless the pro- user worked eight or fewer hours, he or she
gram encounters a keyword that changes the is paid at the rate of $7.50, whereas hours
flow. In the figure, the program begins by de- exceeding eight are paid at $11.25.
claring the variables needed to store the pro- The final statement (step 6) updates the
gram’s inputs and outputs in RAM (step 1). value of the TotalPay variable. The last
Next, the for keyword begins a looping pat- bracket indicates that the program has
tern (step 2). All of the steps between the reached the end of a loop. The program will
very first bracket ({) and the last one (}) will repeat the loop to collect and process the in-
be repeated seven times to gather the total formation for the next day. When the seventh
pay for each day of the week. day of data has been processed, the Day
Figure 10.17
A function is a reusable
Inputs Function Output
component that can be
used in different settings.
Hours
Compute
Base Pay Rate Pay
Pay
Overtime Rate
MarinasPay = ComputePay(20, 10.50, 15.75); Marina Hours Base pay Overtime pay
20 $10.50 $15.75
Color coding
Values of variables
In this Sound Byte, you’ll work in the Microsoft Visual Debugging: Getting Rid of Errors
Studio integrated development environment (IDE) with
the C++ programming language and examine how the Once the program has compiled without
basic control structures of programming languages do syntax errors, it has met all of the syntax
their work. rules of the language. However, this doesn’t
mean that the program behaves in a logical
way or that it appropriately addresses the
task the algorithm described. If program-
How does an IDE help program- mers made errors in the strategy used in the
mers when they are typing the algorithm or in how they translated the al-
code? The IDE includes tools that sup- gorithm to code, problems will occur. The
port programmers at every step of the cod- process of running the program over and
ing process. Code editing is the step in over to find errors and to make sure the pro-
which a programmer physically types the gram behaves in the way it should is termed
code into the computer. An IDE includes an debugging (see Figure 10.19).
editor, a special tool that helps program- How do programmers know
mers as they enter the code, highlighting whether there is anything wrong
keywords and alerting them to typos. Mod- with their program? At this point in the
ern IDE editors also automatically indent process, the testing plan that was docu-
the code correctly, align sections of code ap- mented as part of the problem statement be-
propriately, and apply color to code com- comes critically important to programmers.
ments to remind programmers that these The testing plan clearly lists input and out-
lines will not be executed as code. In addi- put values, showing how the users expect
tion, IDEs provide help files that document the program to behave in each input situa-
and provide examples of the proper use of tion. It is important that the testing plan
keywords and operators. contain enough specific examples to test
How does the IDE help program- every part of the program.
mers after code editing is In the parking garage problem, we want
finished? Editing is complete when the to make sure the program calculates the cor-
entire program has been keyed into the edi- rect pay for a day when you worked eight or
tor. At that time, the programmer clicks a fewer hours and for a day when you worked
button in the IDE, and the compilation more than eight hours. Each of these input
process begins. A pop-up window shows values forces the program to make different
how the compilation is progressing, which decisions in its processing path (the sequence
line is currently being compiled, how many of steps that turns inputs into outputs). To be
syntax errors have been identified, and how certain the program works as intended, pro-
many warnings have been generated. A grammers try every possible path.
warning is a suggestion from the compiler For example, once we can successfully
that the code might not work in the way the compile the example code for the parking
programmer intended, although there is no
Figure 10.19
formal syntax error on the line.
As mentioned earlier, a syntax error is a Debugging—the process
of correcting errors in a
violation of the strict, precise set of rules that program—combines logic
define the language. Programmers create with an understanding of
syntax errors when they misspell keywords the problem to be solved.
(such as typing BEEGIN instead of BEGIN)
or use an operator incorrectly (such as typ-
ing x ⫽ y ⫹⫹ 2 instead of x ⫽ y ⫹ 2). Once
compilation is finished, the IDE presents all
of the syntax errors in one list. The program-
mer can then click any item in the list to see
a detailed explanation of the type of error.
When the programmer double-clicks an
4A
E 65
FF O
Compiled
once
Java into byte
code code
.....
FF
for (i = 1; i < 20; i++)
..... FF O
O
{ E 65
E
FF OE 4A
65
System.out.println(i);
4A
} 65 4A
.....
.....
Java and C#
What language do programmers
PC running Windows
use for applications that need to
collect information from networked Figure 10.23
computers? Imagine that an insurance neutral. This means that Java code needs to Java programs can be
company with many locations wants a be compiled only once, after which it can compiled once and run on
run on many CPUs (see Figure 10.23). The many different platforms.
program that will run each night and will
communicate with networked computers Java program does not care which CPU,
in many offices around the country, collect- operating system, or user interface is
ing policy changes and updates from that
day’s business and updating the company’s
main records. The team that writes this BITS
program would want to use a language AND Really Want to Learn? Work for Free!
that already provides support for network BYTES
communications.
Java would be a good choice. James The open source software movement is a grassroots collection of developers who
Gosling of Sun Microsystems introduced believe that software projects can be managed start to finish by groups of individuals
Java in the early 1990s. It quickly became instead of companies. Open source software is developed and maintained at no
popular because its object-oriented model charge by groups of people who are brought together by common interests such
enables Java programmers to benefit from as photo editing. When completed, the software product and its source code are
its large set of existing classes. For example, distributed free of charge.
a Java programmer could begin to use the The development, testing, and maintenance of the open source code are managed
existing “network connection” class with lit- through resources such as SourceForge (sourceforge.net), a development Web site
tle attention to the details of how that code that hosts more than 100,000 programs. To support development of open source
itself was implemented. Classes exist for projects, SourceForge provides services to its more than 1 million users in support of
many graphical objects, such as windows their development of projects. For example, version control tools allow specific ver-
and scroll bars, and for network objects such sions of a project to be “checked in” or “checked out,” as in a library, allowing many
as connections to remote machines. Observ- people to work on the project at the same time. Communication tools and publicity
ing Java’s success, Microsoft released a lan- tools are also provided to help the project succeed in reaching its audience.
guage named C# (pronounced “see sharp”) Most types of software in the marketplace have an open source equivalent. (See
that competes with Java. the Technology in Focus section called “Computing Alternatives” on page 252 for
Can a Java application work on more information.) If you are looking to learn about software development by doing it,
any type of computer? An attractive investigate SourceForge and volunteer for a project!
feature of Java is that it is architecture
12345
45678
98764
54321
11223
22334
Figure 10.25
An online store is an
Are there other scripting lan- the content displayed based on the user’s example of the three-tier
guages besides JavaScript? feedback. For example, as shown in Fig- client/server type of Inter-
Programmers who are more familiar with ure 10.25, the ABC online store’s Web page net application.
Visual Basic than Java or C++ often use will collect a customer bicycle inquiry for
VBScript, a subset of Visual Basic, to intro- red bikes. It then asks ABC’s main server for
duce dynamic decision making into Web a list of red bicycles sold by the company.
pages. Dynamic decision making means An ASP program running on the server
that the page can decide how to display it- creates a new HTML/XHTML page and
self based on the choices the reader makes. delivers that to the user’s browser, telling
PHP, discussed below, is another scripting the customer what red bicycles (including
language that has become extremely popu- details such as model and size) are currently
lar. It is a free, open source product that runs sold by ABC.
very efficiently on multiple platforms, in- Thus, ASP programs can have HTML/
cluding Windows, UNIX, and Linux. XHTML code as their output. They use what
the user has told them (via the list boxes,
check boxes, and buttons on the page) to
ASP, JSP, and PHP
make decisions. Based on those results, the
How are interactive Web pages built? ASP program decides what HTML/XHTML
To build Web sites with interactive capabili- to write. A small example of ASP writing its
ties, programmers use Active Server Pages own HTML/XHTML code is shown in
(ASP), Java Server Pages (JSP), or the Figure 10.26.
scripting language PHP (Hypertext Pre-
processor) to adapt the HTML or XHTML
page to the user’s selections. The user Flash and XML
supplies information that is translated into What if a programmer wants to cre-
a request by the main computer at the com- ate a Web page that includes sophis-
pany that owns the Web site, often using a ticated animation? Many Web sites
database query language such as SQL. feature elaborate animations that interact
Scripting code in ASP, JSP, or PHP controls with visitors. These sites include buttons and
the automatic writing of the custom HTML/ hyperlinks, along with animation effects.
XHTML page that is returned to the user’s These components can be designed with
computer. Adobe Flash, a software product for devel-
What does additional programming oping Web-based multimedia. Flash includes
bring to a Web page? The most ad- its own programming language, named
vanced Web pages interact with the user, ActionScript, which is similar to JavaScript
collecting information and then customizing in its keywords, operators, and classes.
HTML document is
program output
Microsoft has unveiled a competing transfer the key information on its page to
product named SilverLight that supports the another site.
development of rich multimedia and inter- Without XML, a Web site that wanted to
active Web applications. Other advances, look up current stock pricing information at
like the collection of technologies referred to another site would have to retrieve the
as AJAX (Asynchronous JavaScript And HTML/XHTML page, sort through the for-
XML), allow the creation of Web applica- matting information, and try to recognize
tions that can update information on a page which text on the page identified the data
without requiring the user to do a page re- needed. With XML, groups can agree on
fresh or leave the page. By using existing standard systems of tags that represent im-
technologies to do more processing in the portant data elements. For example, the
browser, users have a more responsive expe- XML tags <stock> and</stock> might de-
rience. limit key stock quote information. Mathe-
Is HTML/XHTML the only markup maticians have created a standardized set of
language for the Web? When Web XML tags named MathML for their work,
sites communicate with humans, HTML/ and biometrics groups are developing an
XHTML work well because the formatting XML standard to describe and exchange
they control is important. People respond data such as DNA and face scans. We dis-
immediately to the visual styling of textual cuss HTML/XHTML and XML in more
information; its layout, color, size, and font detail in Chapter 13.
design all help to transfer the message of the Figure 10.27 shows a table of popular pro-
page to the reader. When computers want to gramming tools with their features and the
communicate with each other, however, all typical settings in which they are used.
of these qualities just get in the way. A third
markup language, called eXtensible
Markup Language (XML), enables design-
The Next Great Language
ers to define their own data-based tags, What will be the next great lan-
making it much easier for a Web site to guage? It is never easy to predict which
Objective C Has a framework for writing iTouch/iPhone/ Used to create applications for Mac OS X and Apple
iPad applications mobile devices
Flash ActionScript Is similar in syntax to JavaScript but customized Used to control Flash animations
for the Flash animation environment
Microsoft SilverLight Is a competitor to Adobe Flash, and supports Used to deliver audio and video to Web pages
rich multimedia capabilities
Java Is architecture neutral Used to create applets that can be delivered over the Web
Is object-oriented
JavaScript Is similar in syntax to Java Creates code that lives on the client machine and supports
Has classes that represent buttons, drop-down interaction with Web pages
lists, and other Web page components
VBScript Is similar in syntax to Visual Basic Creates code that lives on the client machine and adds
Has classes that represent buttons, drop-down interaction to Web pages
lists, and other Web page components
Web Technologies
ASP, JSP, PHP Has a set of rules and standards that allow Controls the automated writing of HTML pages
Web sites to create their own HTML
code based on user actions
HTML/XHTML Provide a set of tags that control the display Control layout and style of information presented
of text on a Web page on a Web page
XML Enables users to define their own tags Used in the construction of Web services
Facilitates exchange of information between
Web sites
AJAX Uses a combination of existing technologies like Creates Web sites that can update without the user refreshing
JavaScript, CSS, and XML the page
language will become the next “great” lan- amount of time needed to compile a
guage. For example, as the popularity of completed project will also grow. It is not
Apple’s mobile devices increases, program- uncommon for a large project to require
ming for the iPhone, iTouch, and iPad is be-
coming much more popular. The language
required to develop these application is a
SOUND 3D Programming
BYTE the Easy Way
flavor of object-oriented C known as
Objective C. Objective C has been used to de-
In this Sound Byte, you’ll create a three-dimensional
velop applications for Mac OS X for quite a game using the visual drag-and-drop interface pro-
few years but is seeing a huge increase in in- vided by Alice, a free software package. This program
terest with the explosion of new devices. teaches all the concepts of programming with none of
Software experts predict that as software the pain of learning syntax.
projects continue to grow in size, the
1. What is a system development life the input data that users will have at the
cycle, and what are the phases in the start of the job, the output that the program
cycle? will produce, and the exact processing that
converts these inputs to outputs. In addi-
summary
3. What role does a problem statement 6. How does a programmer move from
play in programming? code in a programming language
The problem statement is an explicit to the 1s and 0s the CPU can
description of what tasks the computer understand?
program must accomplish and how the Compilation is the process by which code is
program will execute these tasks and converted into machine language, the lan-
respond to unusual situations. It describes guage the CPU can understand. A compiler
chapter
is a program that understands both the syn- training, which begins once the software is
tax of the programming language and the distributed, teaches the user community
exact structure of the CPU and its machine how to use the software efficiently.
summary
language. It can translate the instructions
written by programmers in the higher-level 9. How do programmers select the right
language into machine language, the binary programming language for a specific
patterns that will execute commands on the task?
CPU. Each programming language has its A programming team reviews several con-
own compiler. Separate versions are required siderations before selecting the language.
to compile code that will run on each differ- First, certain languages are best used with
ent type of processor. certain problems. Second, the target lan-
guage should be well matched to the
7. How is a program tested? amount of space available for the final pro-
If programmers make errors in the algo- gram. Third, some projects require the selec-
rithm or in translating the algorithm to code, tion of a language that can produce code
problems will occur. Programmers debug that executes in the fastest possible time.
the program by running it constantly to find Finally, selecting a language with which the
errors and to make sure the program be- programmers are familiar is also helpful.
haves in the way it should. Once debugging
has detected all the code errors, users, both 10. What are the most popular
within the company and outside the com- programming applications for
pany, test the program in every way they Windows and Web applications?
can imagine—both as it was intended to be
used and in ways only new users may think Visual Basic, C/C++, and Java are languages
up. Before its commercial release, software is that enable programmers to include
often provided at a reduced cost or no cost Windows control features such as scroll
in a beta version to certain test sites or to in- bars, title bars, text boxes, buttons, and
terested users for a last round of testing. expanding and collapsing menus. Program-
mers use HTML/XHTML tags to structure
for Web pages. For more complex Web
8. What steps are involved in
development, scripting programs such as
completing the program?
JavaScript and VBScript are popular. Web
Once testing is complete, technical writers page animations are done with ASP, JSP,
create internal documentation for the pro- PHP, Flash, and XML.
gram and external documentation that will
be provided to users of the program. User
507
ten
ten key terms
chapter
chapter
Word Bank
• algorithm • documentation • object-oriented
• beta version • HTML/XHTML • problem statement
buzzwords
• C/C++ • inheritance • testing plan
• classes • interpreter • top-down
• compiler • JavaScript • Visual Basic
• debugger • machine language
Instructions: Fill in the blanks using the words from the Word Bank above.
Things are not running smoothly at the Whizgig factory. We need to keep track of how
many Whizgigs are made every hour and how many are defective. We begin by calling in
the programming team to work with users. Together team members begin to build a soft-
ware solution by creating a(n) (1) __________. All of the input and output information
required is identified as well as the (2) __________, which lists specific examples of what
outputs the program will produce for certain inputs. The team then begins to design the
(3) __________ by listing all the tasks and subtasks required to complete the job. This
approach is called (4) __________ design.
An alternative to this design method is the (5) __________ design model, which develops
the program based on objects. Objects that have similar attributes and behaviors can be
grouped into (6) __________. The benefit of using this type of design approach is that objects
and classes can be reused easily in other programs. If necessary, new classes can be made
by first “borrowing” the attributes of an existing class and then adding differentiating
attributes. This concept is known as (7) __________.
To select the best language for this problem, the team considers the resources at Whizgig.
Although many of the programmers know the visual programming language of
(8) __________, the most important factors for this application will be how fast it runs,
so the language (9) __________ is selected. Once Whizgig has started to take off, the plan is
to expand into a strong Web presence. Then there will be a round of hiring programmers
who know (10) __________. For now, the program to track production and quality control
has been written in programming language; the (11) __________ translates it to
computer
(12) __________, or the binary code that the CPU understands. After that step, the program
is ready to be tested.
The (13) __________ helps identify errors in the program code. Then the programmers put
literate
becoming
together the necessary (14) __________ that explains the program and how to use it.
However, because this is a program that is to be used internally, the program does not need
to go through a test of the (15) __________ by a group of potential outside users.
becoming
computer literate
Your new manager wants to design and deploy an iPad application to collect marketing
information about potential customers. She wants to gather data and analyze it in one
report, which can be shipped to the marketing department.
Instructions: Write a memo to the manager describing what will have to be considered in
the creation of this project. Write the memo using as many of the key terms from the
chapter as you can. Consider what languages will need to be used, and what features will
be critical to the application’s success.
509
ten
ten self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. When producing the fastest executable program is essential, programmers use a
language with an interpreter.
_____ 2. Companies release service packs to repair problems after software has been made
commercially available.
_____ 3. Comments that programmers insert to explain the purpose of the code are written
in binary.
_____ 4. Each step of the SDLC must be completed before moving on to the next.
_____ 5. Programmers often use ActionScript to code prototypes for Windows applications.
chapter
transition to...
next semester
transition to...
1. Learning to Program
Research the core programming sequence at the college you are attending.
a. What languages does the core sequence cover? Are there any introductory courses
next Semester
that use languages with less syntax, like Alice or Visual Logic?
making the
b. How do the languages in the programming sequence reflect the popularity of the
languages used in today’s workplace?
c. How many sections of each of the classes are offered?
d. What can you infer about the percentage of students that stay in the programming
track over time?
e. What does that result mean to the future of your community and your country?
511
ten
ten making the
chapter
transition to...
the workplace
1. Programming Is Not Just for Programmers
the workplace
making the
Think about the range of jobs at the place where you currently work.
a. How many of the employees use computers?
transition to...
b. How many individuals create macros, scripts, or shortcuts for doing their work in a
faster, more automated fashion?
c. How many people actually program in a modern programming language?
2. Algorithm Design
Identify the most commonly performed task at your place of business. Think of a way
to document it as an algorithm. Then study it to see if you can find a way to make it
even more efficient. A small improvement to the most often performed task means big
productivity gains. Review the Jolt Award winners at joltawards.com to see examples
of the kinds of efficiencies that have been introduced in the software field this year to
boost productivity.
3. Choosing the Best Language
Using resources from the Web, determine which programming languages would be
best to learn if you were going to program for the following industries:
a. Animated movies
b. Computer games for mobile devices and Web deployment
c. Database management
d. Robotics
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
2. Class Hierarchy
A common test for deciding the structure of a class hierarchy is the “is a” versus “has
a” test. For example, a motorcycle “has a” sidecar, so Sidecar would be a data field of a
Motorcycle object. However, a motorcycle “is a” kind of vehicle, so Motorcycle would
be a subclass of the base class Vehicle. Use the “is a” versus “has a” test to decide how a
class structure could be created for computer peripherals. For example, consider that
printers are a type of peripheral and there are laser printers, inkjet printers, 3D printers,
color printers, black-and-white printers, and thermal printers. Work to separate the
unique features into objects and to extract the most common features into higher-level
classes.
5. Language Popularity
At the site Langpop.com, results of many different surveys are combined to decide
which programming languages are the most popular today. Where would you go to
conduct a survey on which programming languages are popular? What individuals
would you survey? How would you expect their answers to differ from one another?
513
ten
ten team time
chapter
Problem
team time
You and your team have just been selected to write a software program that tells a vending
machine how to make proper change from the bills or coins the customer inserts. The pro-
gram needs to deliver the smallest possible amount of coins for each transaction.
Task
Divide the class into three teams: Algorithm Design, Coding, and Testing. The responsibili-
ties of each team are outlined as follows.
Process
1. The Algorithm Design team must develop two documents. The first document should
present the problem as a top-down design sequence of steps. The second document
should use object-oriented analysis to identify the key objects in the problem. Each
object needs to be represented as data and behaviors. Inheritance relationships between
objects should be noted as well. You can use flowcharts to document your results.
Consider using a product such as Microsoft Visio or the open source program Dia
to create a visual representation of your objects and their relationships to each other.
2. The Coding team needs to decide which programming language would be most appro-
priate for the project. This program needs to be fast and take up only a small amount of
memory. Use the Web to collect information about the language you select and be sure
you have enough information to defend your selection.
You may also consider using a product such as Visual Logic to try to develop the
code for a prototype of the system. (VisualLogic.org offers a free demo version.) This
language, based on Visual Basic, allows you to write code free from many constraints
of syntax. Programs in Visual Logic look like flowcharts but actually execute!
3. The Testing team must create a testing plan for the program. What set of inputs would
you test with to be sure the program is completely accurate? Develop a table listing
combinations of inputs and correct outputs.
4. As a group, discuss how each team would communicate its results to the other teams.
Once one team has completed its work, are the team members finished or do they need
to interact with the other teams? How would the tools of a site such as SourceForge
(sourceforge.net) help your development team across the life of the project?
Conclusion
Any modern programming project requires programming teams to produce an accurate
and efficient solution to a problem. The interaction of the team members within the team as
well as with the other teams is vital to successful programming.
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The role
you play may or may not match your own personal beliefs, but your research and use of logic
will enable you to represent whichever view is assigned. An arbitrator will watch and com-
ment on both sides of the arguments, and together the team will agree on an ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above from the perspective of one of the following people:
a software developer, the injured or noninjured patients, and the arbitrator.
2. Team members should write a summary that provides factual support for their charac-
ter’s position regarding the fair and ethical design of medical equipment and a policy
for handling fair restitution for injured patients. Then, team members should create an
outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the collaboration features of MyITLab, the discussion board feature of Black-
board, or meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
515
eleven
eleven
chapter
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What is a database, and why is it beneficial to use databases? (pp. 518–520)
2. What components make up a database? (pp. 520–524)
3. What types of databases are there? (pp. 524–526)
4. What do database management systems do? (pp. 526–534)
5. How do relational databases organize and manipulate data? (pp. 534–539)
6. What are data warehouses and data marts, and how are they used? (pp. 539–542)
7. What is an information system, and what types of information systems are used in
business? (pp. 542–549)
8. What is data mining, and how does it work? (pp. 549–551)
multimedia resources
multimedia
resources
Active Helpdesk
• Understanding Database Management Systems (p. 525)
• Using Databases (p. 527)
• Data Warehouses, Data Marts, and Information Systems (p. 550)
Sound Bytes
• Creating an Access 2010 Database (p. 532)
• Improving an Access 2010 Database (p. 538)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Most useful sites on the
Internet have databases integrated into them (or are actually databases themselves).
One popular example is Twitter. But with the millions of Twitter users Tweeting
about all sorts of different things, how can you find Twitter users that generate Tweets
about subjects that fit your interests?
Justtweetit.com is a database
of Twitter users that groups users
by logical topics of interest. Are you an artist interested in following
what other artists are Tweeting about? Just click on the Artists link to find more than
250 active Twitter users who discuss art. What if you regularly Tweet on a topic, such
as fashion or video gaming, and want to have more potential
followers find you? You can easily
add yourself to
the Justtweetit
directory in the
most appropriate of
the hundreds of
categories featured on the
site. So start finding more
relevant Tweets today!
517
Life Without next to that entry and then you have the
choice of hiding all information from
Databases that friend or hiding all information from all
A database is a collection of related data that friends related to the application (Mafia
can be easily stored, sorted, organized, and Wars). When you choose to hide items on
queried. By creating an organized structure your feed in this manner, you are actually
for data, we hope to make data more mean- instructing the database to filter out infor-
ingful and therefore more useful. In other mation that is not useful to you.
words, we are attempting to turn data into Or, suppose you are looking for a new
information. But why should you learn netbook computer. When you search for
about databases? netbooks on the Best Buy site (see
Although you may never be called upon Figure 11.1), you get results showing more
to construct a database, you probably use than 50 different products. Perhaps you are
databases every day. For example, you on a limited budget, so you select an option
might search a database in an attempt to to sort the products with the lowest price
extract relevant information. A key attribute first. But maybe you are also interested in
of databases is that information can be seeing netbooks that many other people
filtered so that you only see the information have purchased. You then have the option of
you really want. Understanding how data- re-sorting the products by how well they
bases work and what you can do with a sell. Sorting data by criteria you specify is
database will help you use them more effec- also a very useful aspect of databases.
tively. Let’s look at two examples. Filtering and sorting information to
Have you checked Facebook today? If so, enhance its usefulness to you are just two
you used a database even though you prob- useful aspects of databases. In the rest of this
ably didn’t realize it. When you load your chapter, you’ll learn about the inner work-
Facebook page, you see a news feed of items ings of databases and other ways that they
your friends have posted on their Facebook can be used to provide relevant information
pages. Facebook is using your list of friends quickly and easily.
to comb through their databases to Should I use databases for manag-
Figure 11.1 provide you with what it thinks is relevant ing all types of data? Not every
On Best Buy’s site, sorting information—in other words, what your situation in which related data needs to be
results of a product friends are saying today. turned into organized information demands
search gives you Now suppose the top entry on your the complexity of a database. For simple
information that is more news feed is yet another post related to a tasks, lists are adequate. Often, word pro-
useful. You can also
further filter the data such game you don’t play (like Mafia Wars or cessing or spreadsheet software works for
as restricting your results Farmville). You can click on the Hide button creating simple lists. A table you create in
to one manufacturer. Microsoft Word can serve as a list, as can a
spreadsheet you create in Microsoft Excel.
Figure 11.2 shows a simple “Books to
Buy” list you might create in Excel before
beginning college. This list works well
because it is simple and suited to just one
purpose: to provide you with a list of the
Click to sort data books you need to buy for a particular
semester. If all the information that needed
to be tracked were as simple as the informa-
tion in Figure 11.2, there would be no need
for databases.
When is a list not appropriate? If
complex information needs to be organized
or more than one person needs access to it, a
list is not an efficient solution. For example,
Other data filters
when you enrolled in college, you provided
information about yourself to a number of
people. This information included your
name, your address, the classes you wished
to take, and the meal plan you selected. Your
Figure 11.5
In a database, a category
of information is stored in
Database Terminology class registration list shown in Figure 11.5.
a field. A group of related
Each field is identified by a field name, which
How is data stored in a is a way of describing the field. Class Code is
fields is called a record,
database? Understanding how data- a field name in the class registration list data-
and a group of related
records is called a table bases store information requires knowing base in Figure 11.5. In a database, fields have
(or file). This is a table that the unique terminology developed to de- other characteristics to describe them, includ-
contains records for all scribe databases. As shown in Figure 11.5,
students registered for
ing field data types and field size.
databases have three main components: What are data types? When fields
classes in the current
fields, records, and tables (or files). are created in the database, the user assigns
semester.
those fields a data type (or field type). The
Fields data type indicates what type of data can be
What is a field? A database stores each stored in the field.
category of information in a field. Fields are Common data types are listed and illus-
displayed in columns. The city where a stu- trated in Figure 11.6 and described in the
dent lives can be found in the City field in the remainder of this section.
Memo Long blocks of text Four score and seven years ago, our fathers brought forth on this continent a
new nation, conceived in liberty, and dedicated to the proposition that all men
are created equal.
Northern
tages for large businesses.
Object-oriented databases also need to use July Southern
a query language to access and manage data.
n
Eastern
io
“
primarily in response to cus- Each field should describe a
tomers who were using an Or- Each field unique piece of data and
acle database for applications should describe should never combine two
deployed on the Web and a unique piece separate pieces of data.
needed better ways of storing For example, for student
of data.
and accessing image, audio,
and video files. With multidi-
mensional databases such as the current
Oracle Database 11g, businesses do not have
” registration at a college,
capturing the student’s
name, street address, city, state, and zip code
is important. But should a student’s name be
to abandon the proven relational database placed in one field or two? Because first and
model, because multidimensional databases last names are separate pieces of data, you
are based on proven relational database would want to create a separate field for
theory. each. For instance, suppose you wish to
send an e-mail message to students address-
ing all of them by their first names (such as
Database “Dear Susan”). If Susan’s first and last
Management names are in the same field in the database,
it will be difficult to extract just her first
Systems: Basic name for the salutation.
Operations What does a data dictionary look
Databases are created and managed using a like, and how do I create one? In
database management system (DBMS). A Microsoft Access, the data dictionary is
DBMS is specially designed application soft- called the Field Properties box. Figure 11.10a
ware (such as Oracle Database or Microsoft shows the Field Properties box for a database
Access) that interacts with the user, other table in Access. The first step in creating an
applications, and the database to capture entry in the data dictionary is to create a field
and analyze data. The four main operations name. Field names should be unique within
of a DBMS are a table. In the table in Figure 11.10a, the field
name State is used to store the abbreviation
1. Creating databases and entering data. for the state where the student lives.
2. Viewing (or browsing) and sorting Second, you must define a data type for
data. each field. For the State field, you use a text
3. Querying (extracting) data. data type because names are expressed
using characters. Third, you should set a
4. Outputting data. maximum field size (in this case, two
In the next section, we look at each of characters) for the field. Data in the field
these operations in detail. can be shorter than the maximum but can
never exceed it. Sometimes the field name
may not be meaningful to the user of the
Creating Databases and Entering Data database even though it makes sense to the
How do I create a database with a designer. The Caption value allows you to
DBMS? To create a database with a DBMS, display a name of your choice on forms and
you must first define the data to be captured. reports.
Figure 11.10
Finally, you can set a default value for a add additional fields as needed but this does (a) The Field Properties
field. A default value is the value the not negate the need for proper planning and box, shown for the
Student Information table
database uses for the field unless the user design of a database. You will need to popu- in an Access database,
enters another value. Though not appropri- late (enter data into) into any new fields that represents the database’s
ate for first names, because they vary are added to your database. This could be data dictionary. (b) The
widely, default values are useful for field difficult if you suddenly need to add a Birth Student Information table,
data that is frequently the same. For exam- Date field to a database that already con- ready for data input,
results from setting up
ple, setting a default value for a State field tains records for 10,000 individuals. If you the data dictionary in
saves users from having to enter it for each plan to use the Birth Date field to analyze Figure 11.10a.
student if most students live in one state. the data, you need to have a plan for accu-
You need to repeat these steps for each mulating birth dates to ensure the complete-
field in the table. When completed, the re- ness of the data.
sulting Student Information table, shown in
Figure 11.10b, is ready for data entry. Inputting Data
The attributes (such as data type and field
How do I get data into the database?
size) shown in Figure 11.10a and 11.10b are
After you create a data dictionary for each
metadata: data that describes other data.
table (or file) in the database and establish
Metadata is an integral part of the data dic-
tionary. You need to build the data diction-
ary for each table you will use in a database ACTIVE
before you enter data into the database. This HELP- Using Databases
also has the benefit of forcing you to con- DESK
sider up front the data you need to capture
and the metadata that describes it. In this Active Helpdesk call, you’ll play the role of a
What happens if I forget to define helpdesk staffer, fielding calls about databases, their
a field in the data dictionary or if I benefits, their components, and how relational data-
want to add another one later? bases organize and manipulate data.
Databases are extremely flexible. You can
To extract records from a database, you use a query language. Almost all a commercial database product in 1979. It has been the unofficial stan-
relational and object relational databases today use structured query dard language for relational databases since then.
language, or SQL. Oracle, Microsoft SQL Server, Microsoft Access, IBM SQL uses relational algebra to extract data from databases.
DB2, and MySQL are examples of popular databases that use SQL. Relational algebra is the use of English-like expressions that have vari-
When relational databases were first developed in the early 1970s, ables and operations, much like algebraic equations. Variables include
each DBMS software product contained its own query language. This table names, field names, or selection criteria for the data you wish to
meant that database administrators had to learn a new language display. Operations include directions such as select (which enables you
whenever they worked with a different DBMS. The early query lan- to pick variable names), from (which tells the database which table to
guages were mathematically based and often difficult to master. E. F. use), and where (which enables you to specify selection criteria). The two
Codd, who has been called the father of relational databases, proposed most common queries used to extract data using relational algebra are
a standardized query language when he worked at IBM in the select queries and join queries.
mid-1970s. A select query displays a subset of data from a table (or tables) based
The original language was called SEQUEL, short for structured on the criteria you specify. A typical select query has the following format:
English query language. The idea was to make queries easy by using
English language–like sentence structure. Database software designers SELECT (Field Name 1, Field Name 2,...)
enthusiastically accepted the concept, developing a modified version of FROM (Table Name)
the original SEQUEL language, named SQL. Oracle first introduced SQL in WHERE (Selection Criteria)
a
aapplied to
aapplied to
this table
this table
Query
Query
th
th
SELECT First Name, Last Name, Telephone SELECT First Name, Last Name, Telephone
FROM Student Information Table FROM Student Information Table
WHERE State = MA
this output
put
ut
Produces
es
es
this output
put
Produces
es
es
b
c
Figure 11.15
When the query on the left is applied to the (a) Student Information table, it restricts the output to (b) only a phone list.
The query on the right, which uses a WHERE statement, further restricts the phone list to (c) only students from
Massachusetts.
Figure 11.16
This join query will display a student roster for each student in the Student Information table. Notice that the
WHERE statement creates the join by defining the common fields (in this case SID # and Student ID#) in each table.
of Data
How do I decide
which tables I need
and what data to
put in them? You
create database tables
(or files) for two reasons:
to hold unique data about Common field in each table
a person or thing and to
describe unique events or b
Figure 11.22
The column headings in blue are related to student contact data, whereas the column headings in red relate
to enrollment information. To construct an efficient database, these topics should be contained in separate
tables.
Web 2.0 applications are mostly about enhancing communications and up their ratings by using shill reviewers. And Yelp actively markets to
encouraging making it easy for users to create and disseminate their businesses to pay for placement of ads on their site that some users may
own content. So if you have a database that needs populating, why not mistake for unsponsored reviews. An alternative to Yelp that addresses
seek help from the Web community to populate it, especially if it is de- these concerns is Angie’s list.
signed as a resource for the masses. Angie’s List (angieslist.com) has the same basic premise as Yelp: to
The economy in the United States is largely a service-based econ- have individuals recommend businesses based on their experiences.
omy. Businesses based in the U.S. tend to provide services to individuals However, whereas Yelp derives its revenue from advertising, Angie’s List
or other businesses as the business climate has shifted away from man- is a subscription service. Members pay a monthly fee to access the
ufacturing. Everyone needs haircuts and health care services, and many reviews on Angie’s list. So what do you get for your fees that you don’t
Americans love to eat out. But how do you find reliable service providers get on Yelp? Angie’s List does not permit anonymous reviews. This is a
and good restaurants? Recommendations from friends and family are re- big benefit for business owners because it makes it easier to contact
liable, but what if no one in your circle of acquaintances knows of a good dissatisfied customers and try to resolve issues. Angie’s list also has a
personal trainer or a great dentist? Why shouldn’t the Internet be used to verification process with reviewers to ensure that businesses do not
harness the power of millions of people’s experiences to recommend re- report on themselves. And businesses do not pay to advertise on
liable service providers? Two companies that have successfully plunged Angie’s list; they make the list only when they are reviewed by a
into this arena are Yelp and Angie’s List. consumer.
Yelp (yelp.com) was conceived as the “yellow pages” for the 21st cen- Both Yelp and Angie’s List are searchable databases just like the
tury. Yelp is free to use, and anyone can write a review of a business and other examples in this chapter. But whereas most companies usually
post it to the site. The site has more than 11 million reviews of all types of populate databases with data that they generate or collect themselves,
businesses. Users can easily search the site, find service providers in their these Web sites rely on users to create their content. The databases still
geographic area, and see what ratings (both good and bad) consumers need to be well designed to capture this content, and there needs to be
gave them. Thinking about going to a Chinese restaurant in the Minneapo- processes in place to review the data entered for appropriateness.
lis area that you have never visited (see Figure 11.23)? A quick search on For instance, both Yelp and Angie’s List would want to delete reviews
Yelp found 149 restaurants that fit this broad criteria. Surely you’ll be able that contained racist comments or hate speech, for example. By
to find one that fits your budget and that other people enjoyed visiting. harnessing the power of large groups of users to populate a database,
However, Yelp.com is not without its critics. Because Yelp allows the database owners can reap the rewards of saving time, effort, and
anonymous posting, some people are afraid that businesses may try to money.
Figure 11.23
Yelp’s database is populated with reviews created by users.
Data Storage
At the simplest level, data is stored in a sin-
gle database on a database server, and you
retrieve the data as needed. This works fine
for small databases and simple enterprises
where all of the data you are interested in is
in a single database. Problems can arise,
however, when the data you need is in mul-
tiple places. Large storage repositories called
data warehouses and data marts help solve this
problem.
Data Warehouses
What is a data warehouse? A data
warehouse is a large-scale electronic reposi-
tory of data that contains and organizes all
the data related to an organization in one
place. Individual databases contain a wealth
of information, but each database’s informa- Figure 11.29
tion usually pertains to one topic. The Enterprise Dashboard in MySQL helps DBAs review database performance.
Figure 11.30
Using the database on Alibaba.com, a search for cotton fabric suppliers in China results in more
than 200 pages of links to vendors selling some type of cotton cloth.
sell in different databases (one for automo- Automobile Policy Sales database captures
bile insurance policy sales and one for life information about driving accident history,
insurance policy sales, for example), as car model, and the age and gender of the
shown in Figure 11.31. drivers because this information is pertinent
These databases capture specific to the pricing of car insurance policies.
information about each type of policy. The The Life Insurance Policy Sales database
Supplier
Database
OLAP
Query
Customer Information
Order Clickstream Data
Systems
Database (To Extract Data)
Data
Extraction
Billing
Database Data Data Marts
Warehouse
DBMS
Sales
Department
Data Staging Data Mart
Data
Extraction
Data Customer
Reformatting Reformatted Service
Data Stored Data Mart
Figure 11.35
available for the classes you want and who registered for classes each day. The three types of
immediately records your registration in the Figure 11.35a shows an example of a detail management information
class. This online transaction processing report on daily enrollment. system reports are
(a) detail report,
(OLTP) ensures that the data in the TPS is as Going beyond the detail reports provided
(b) summary report, and
current as possible. by TPSs, MISs provide summary reports (c) exception report.
and exception reports. A summary report
provides a consolidated picture of detailed
Management Information Systems data. These reports usually include some
calculation (totals) or visual displays of
What is a management information information (such as charts and graphs).
system? A management information Figure 11.35b shows an example of a
system (MIS) provides timely and accurate summary report displaying total daily
information that enables managers to make enrollment.
critical business decisions. MISs were a di- An exception report shows conditions
rect outgrowth of TPSs. Managers quickly that are unusual or that need attention by
realized that the data contained in TPSs users of the system. The registrar at your
could be an extremely powerful tool only if college may get an exception report when all
the information could be organized and out- sections of a course are full, indicating that it
put in a useful form. Today’s MISs are often may be time to schedule additional sections.
built in as a feature of TPSs. Figure 11.35c shows an example of such an
What does an MIS provide that a exception report.
TPS does not? The original TPSs were
usually designed to output detail reports. A
detail report provides a list of the transac-
tions that occurred during a certain time pe-
Decision Support Systems
riod. For example, during registration What is a decision support system?
periods at your school, the registrar might A decision support system (DSS) is
receive a detail report that lists the students designed to help managers develop
Internal
Models
Internal Data
Management
Current Model
Systems
Sales Management
(Databases, Data
Data System
Marts, Data
Warehouses) External
Models
Current
Customer
Demographics
Knowledge- User
Based Interface
Systems System
Purchased
Customer
List
Figure 11.36
Major components of a
solutions for specific problems. A DSS for
DSS. Through the user a marketing department might provide
interface, models are statistical information on customer attrib-
analyzed and manipulated utes (such as income levels, buying patterns,
to provide information on and so on) that would assist managers in
which management
decisions are based.
making decisions regarding advertising
data about customers, ordering patterns,
strategy. A DSS not only uses data from
inventory levels, and so on. An external
databases and data warehouses, but also en-
data source is any source not owned by the
ables users to add their own insights and
company that owns the DSS, such as cus-
experiences and apply them to the solution.
tomer demographic data purchased from
What does a decision support sys-
third parties, mailing lists, or statistics
tem look like? Database management
compiled by the federal government.
systems, while playing an integral part of a
Internal and external data sources provide a
DSS, are supplemented by additional soft-
stream of data that is integrated into the
ware systems in a DSS. In a DSS, the user
DSS for analysis.
interface provides the means of interaction
between the user and the system. An effec-
tive user interface must be easy to learn. The
other major components of a DSS are inter- Model Management Systems
nal and external data sources, model man- What function does a model manage-
agement systems, and knowledge-based ment system perform? A model
systems. As shown in Figure 11.36, all of management system is software that assists
these systems work together to provide the in building management models in DSSs. A
user of the DSS with a broad base of infor- management model is an analysis tool that,
mation on which to base decisions. through the use of internal and external
data, provides a view of a particular busi-
ness situation for the purposes of decision
Internal and External Data Sources making. Models can be built to describe any
What are internal and external data business situation, such as the classroom
sources for decision support sys- space requirements for next semester or a
tems? Data can be fed into the DSS from listing of alternative satellite campus
a variety of sources. Internal data sources locations.
are maintained by the same company that Internal models (such as a spreadsheet
operates the DSS. For example, internal that shows current classroom use on a
TPSs can provide a wealth of statistical college campus) are developed inside an
As databases have become commonplace, an ever-increasing amount of data might be used. In October 2004, a firefighter was arrested after his
information about you and your habits has gone into various databases. supermarket purchase records revealed he had purchased the same type
Every time you purchase something with a credit card, there is a record of fire starters used in an arson case. After three months, the charges were
of that transaction, and both the merchant from whom you purchased dropped when another person pleaded guilty to committing the arson.
the item and the credit card company have information about your buy- Financial information isn’t the only sensitive information that is
ing habits (see Figure 11.37). tracked. The majority of physicians and hospitals in the United States
Have you used a toll service that allows you to pay your tolls electroni- track medical records in electronic databases. Your entire prescription
cally by just driving through a history (and hence hints about
lane without stopping? Toll your medical history) is in a
records are routinely subpoe- database at the local phar-
naed in court cases.Toll records macy. Have you applied for in-
were used in an Illinois court by surance lately? Your doctor
a husband in a divorce case to was probably able to provide
prove his wife was rarely home (with your permission, of
and therefore unfit for custody course) your entire medical
of their son. All banking trans- history to the insurance com-
actions are handled by comput- pany with a few clicks of a
ers (and hence databases) in mouse. All of the data that ex-
the United States, and there is a ists in the world around us
high probability that your em- should give us pause, and we
ployer is electronically transfer- need to stop and consider the
ring your pay to your bank by ethical implications of the elec-
direct deposit. If you engage in tronic society we live in.
online banking and bill paying,
yet another electronic trail of Data Convergence—The
your financial life is being gen- Figure 11.37 Perfect Storm of Privacy
erated in databases. Invasion?
Workmen disassembling a house reveal the contents hidden inside. This is
Do you think you can avoid a metaphor for the erosion of our privacy rights. If our personal information Discrete pieces of data, such as
scrutiny by paying cash? Not if is in multiple databases and viewable by many people, is the information that you filled your gas tank last
you are a member of a frequent still private? Thursday or bought a copy of
shopper “club” (a popular pro- War and Peace last month,
motion used by supermarkets and drug stores) and provide the checkout don’t mean much in and of themselves. However, with so much data in
clerk with your personal information in exchange for coupons or a few electronic form, it is getting much easier to combine data from various
dollars off your purchases. Remember, you never can be sure of how this data sources and build a powerful profile of an individual to which
manage, and large, complex organizations For instance, human resource functions
can benefit from managing that information (such as the management of hiring, firing,
with a central piece of software. promotions, and benefits) and accounting
What does an enterprise resource functions (such as payroll) are often the first
planning system do? An enterprise processes integrated into an ERP system.
resource planning (ERP) system is a Historically, human resource records and
broad-based software system that integrates accounting records were kept in separate
multiple data sources and ties together the databases, but having the information reside
various processes of an enterprise to enable in one database makes the management and
information to flow more smoothly. ERP paying of employees more streamlined. If
systems use a common database to store and manufacturing operations were then inte-
integrate information. This enables the infor- grated into the ERP system, the data that was
mation to be used across multiple areas of already in place regarding the employees and
an enterprise. payroll could be easily used for determining
chapter
6. What are data warehouses and data in accomplishing their day-to-day tasks and
marts, and how are they used? improve communications. A transaction-
A data warehouse is a large-scale electronic processing system (TPS) is a system that is
summary
repository of data that contains and organ- used to keep track of everyday business
izes in one place all the relevant data related activities. A management information
to an organization. Data warehouses often system (MIS) provides timely and accurate
contain information from multiple data- information that enables managers to make
bases. Because it can be difficult to find critical business decisions. A decision sup-
information in a large data warehouse, small port system (DSS) is a system designed to
slices of the data warehouse called data marts help managers develop solutions for specific
are often created. The information in data problems. An enterprise resource planning
marts pertains to a single department within (ERP) system is a large software system that
the organization, for example. Data gathers information from all parts of a busi-
warehouses and data marts consolidate ness and integrates it to make it readily
information from a wide variety of sources available for decision making.
to provide comprehensive pictures of
operations or transactions within a business. 8. What is data mining, and how does it
work?
7. What is an information system, and Data mining is the process by which large
what types of information systems amounts of data are analyzed to spot other-
are used in business? wise hidden trends. Through processes such
Information systems are software-based as classification, estimation, affinity group-
solutions that are used to gather and analyze ing, clustering, and description (visualiza-
information. Information systems fall into tion), data is organized so that it provides
one of five categories. An office support sys- meaningful information that can be used by
tem (OSS) is designed to assist employees managers to identify business trends.
553
eleven
eleven key terms
chapter
binary large object (BLOB)................................ 525 management information system (MIS)......... 545
browsing ............................................................... 532 many-to-many relationship............................... 534
clickstream data................................................... 541 memo field ........................................................... 523
completeness check ............................................ 529 metadata................................................................ 527
computational field (computed field)............. 523 model management system............................... 546
consistency check ................................................ 529 multidimensional database............................... 525
data centralization............................................... 521 natural language processing
data dictionary (database schema)................... 526 (NLP) system .................................................... 547
data inconsistency............................................... 519 normalization....................................................... 535
data integrity ........................................................ 521 numeric check ...................................................... 529
data field ............................................................... 523 numeric field........................................................ 523
data mart ............................................................... 542 object field............................................................ 523
data mining .......................................................... 550 object-oriented database.................................... 525
data redundancy .................................................. 519 object query language (OQL) ........................... 525
data staging .......................................................... 542 office support system (OSS) ............................. 543
data type (field type) .......................................... 522 one-to-many relationship .................................. 534
data warehouse .................................................... 539 one-to-one relationship...................................... 534
database ................................................................ 518 online transaction processing (OLTP)............. 545
database administrator primary key (key field) ...................................... 523
(database designer) ......................................... 521 query...................................................................... 532
database management system query language .................................................... 533
(DBMS).............................................................. 526 range check........................................................... 528
database query..................................................... 532 real-time processing............................................ 544
date field ............................................................... 523 record ..................................................................... 523
decision support system (DSS) ........................ 545 referential integrity............................................. 538
default value ........................................................ 527 relation .................................................................. 524
detail report .......................................................... 545 relational algebra ................................................ 530
enterprise resource planning relational database .............................................. 524
(ERP) system..................................................... 548 relationship .......................................................... 534
exception report................................................... 545 select query........................................................... 530
expert system ....................................................... 547 sort.......................................................................... 532
export ..................................................................... 534 structured (analytical) data................................ 525
external data source ............................................ 546 structured query language (SQL)..................... 530
field........................................................................ 522 summary report ................................................... 545
field constraint..................................................... 528 table (file) ............................................................. 523
field name............................................................. 522 text field ................................................................ 523
field size................................................................ 523 time-variant data ................................................. 541
foreign key ........................................................... 538 transaction-processing system (TPS)............... 544
fuzzy logic ............................................................ 547 unstructured data ................................................ 525
hyperlink field..................................................... 523 validation.............................................................. 528
information system............................................. 543 validation rule ..................................................... 528
chapter
Word Bank
• data dictionary • memo field • structured query language
• data inconsistency • metadata (SQL)
buzzwords
• data mining • numeric field • table
• data warehouse • object field • text field
• decision support system • primary key • transaction-processing
system (TPS)
• field • relational algebra
• join query • select query
Instructions: Fill in the blanks using the words from the Word Bank above.
When constructing a database (1) __________, it is important to ensure each record is identi-
fied uniquely. A(n) (2) __________ should be established as a unique field that will be in-
cluded with each record. In a database, numbers such as 1234 are normally stored in a(n)
(3) __________, but they also could be stored in a(n) (4) __________ if calculations do not
need to be performed on the number. Extremely lengthy textual data is stored in a(n)
(5) __________, whereas video files are appropriately stored in a(n) (6) __________. The
(7) __________ fully describes each field in the database and its attributes. Data used to
describe other data in this manner is referred to as (8) __________.
Queries are used to prepare data for viewing or printing. A(n) (9) __________ usually
displays requested information from only one table. For displaying related information
that is stored in multiple tables, a(n) (10) __________ must be used. The most popular query
language in use today is (11) __________. Queries generated by this language make use of
English-language statements driven by the mathematical principles of (12) __________.
When individual databases are not sufficient to maintain all the data that needs to be
tracked, a(n) (13) __________ should be created. Databases are often key components of
(14) __________, which record routine business activities. A(n) (15) __________ utilizes
databases and other related systems to assist management with building business models
and making critical decisions.
computer
becoming
computer literate
literate
Everyone loves the handbags that your best friend, Linh, makes, and she has decided to
start selling them to the general public. Linh has a few existing customers already (mostly
becoming
family and friends), but she plans to put her work in a few art shows, make some deals
with area stores to feature it, and sell it online at Etsy.com. Keeping track of all this
information is going to be important, but she is not computer literate.
Linh has approached you to be her database consultant and to design a database for her
new business. Write a proposal that outlines what you intend to do for your friend. What
kind of database will you create? What kind of information will your friend need in the
database to run her business? How should that information be organized? Can the
database be created and stored online so that Linh can access it from her phone? As her
business grows, how do you imagine the database will grow with the business?
555
eleven
eleven self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. A query is used to transfer information into a database.
_____ 2. Completeness checks ensure that only reasonable data values are entered into a
database.
_____ 3. Reducing incorrect or incomplete data by recording data in only one place is called
data optimization.
_____ 4. An expert system attempts to replicate the decisions made by a live person.
_____ 5. Data mining cannot be used to spot customer trends.
chapter
transition to...
next semester
1. Understanding Database Design
transition to...
Go out to ebay.com and look at some items that are for sale. eBay uses a very sophisti-
cated database to process transactions. But every good database starts with good
design by creating a field for each unique piece of data. List as many fields as you can
next semester
making the
identify used to record information for an item for sale on eBay. Assign each field you
identify a data type and suggest a reasonable field length.
2. Privacy Settings on Facebook
Facebook is a large database. It is important to protect personal information that is
contained in a database, and with Facebook you are responsible for making decisions
about sharing your information. The owners of Facebook are constantly tweaking the
privacy settings on the site. If you have not checked your privacy settings lately, you
may not be aware of the personal information that you are sharing with anyone who
can access Facebook.
a. Log in to your Facebook account and access your privacy settings. Which informa-
tion about you is accessible to everyone? Is any of your information only visible to
your friends? What types of information is viewable by friends of your friends?
b. Did any of the privacy settings surprise you? Which privacy settings do you think
you need to change? Why? If you don’t think any changes to your setting are
necessary, explain why you feel secure with your current privacy settings.
4. Comparing Databases
Amazon.com and eCampus.com are two sites students frequently use to buy
textbooks. On both sites you interact with a database to search for and purchase your
textbooks. Visit both sites and search for several textbooks such as the ones you are
using this semester. Compare your experiences on both sites. Consider the following
(and make sure you fully explain each answer):
a. Which site is easier to use?
b. Which site offers better options for refining the results of your search (query) for a
textbook?
c. What fields did you search on to find your textbooks? Would searching on another
field have produced more accurate results?
d. What enhancements would you suggest the owners of both sites to improve your
shopping experience?
557
eleven
eleven making the
chapter
transition to...
the workplace the workplace
1. Data Marts
You are a summer intern in the information technology group of a regional chain of
making the
sandwich shops. The company has been in business for fifteen years and operates 200
locations in eight states. The 200 locations are organized into five regions (A, B, C, D,
transition to...
and E) of 40 stores each. Regional managers are responsible for inventory management,
procurement of inventory, sales, and marketing for their particular region. The com-
pany has been processing all transactions electronically (with customers and suppliers),
and it has captured all the data in a large data warehouse. Unfortunately, the regional
managers are complaining that there is now so much information in the data ware-
house that it has become somewhat difficult to sort through it and extract meaningful
data. You have just been placed on the team that will be designing a new data strategy
for the company.
a. Setting up data marts would probably help with the accessibility of information.
What type of data marts would you suggest setting up for this company? Make sure
you explain who will benefit from the data marts you suggest.
b. For the data marts you identified in the previous question, list the data that should
be stored in each data mart and explain how the regional managers could make use
of that information to manage their group of stores.
chapter
questions
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
559
eleven
eleven team time
chapter
Redesigning Facebook
Problem
team time
Facebook is the most popular social media site. But as with any product, there is always
room for improvement. Facebook management has made decisions about what data they
require from users who create Facebook accounts. They also have set up specific areas to
display what management considers to be pertinent information on a user’s main Facebook
page. But perhaps you as a user would have designed Facebook differently.
Task
Your class has volunteered to work as a focus group for Facebook as part of a nationwide
project to assess the usefulness of the information gathered by Facebook. Users often
provide unique perspectives, and they should be consulted whenever possible during
the design, implementation, and updates of Web sites. As heavy users of Facebook,
management feels that student input is invaluable to ensuring currency and usability of
its features.
Process
Divide the class into small groups.
1. Your group members should examine their individual Facebook accounts. If anyone in
your group does not have a Facebook account, they should set one up. If you all have
Facebook accounts, you might want to consider going through the process of setting up
an account to reacquaint yourselves with the information that is required (or can be
entered) when a Facebook account is first set up. Pay particular attention to the profile
area of your account. What fields in the profile do you consider to be most useful?
Which fields do you think are totally unnecessary and could be eliminated? What fields
are missing from the profile that you think would be useful to you and your friends?
2. Investigate your account settings and application settings paying particular attention to
items that are displayed on the main page of your account. What changes would you
make to these settings? Are options missing that you would find helpful to configuring
your Facebook page?
3. Present your group’s findings to the class. Compare your suggestions to those of other
groups. Be sure to think about the needs of other groups of users (such as your parents
or your grandparents) because they probably use Facebook in ways that you might not.
4. Prepare a list of recommendations for improvements to the current Facebook home
page and settings pages. Clearly indicate how the proposed changes will benefit both
users and the management of Facebook (retaining users, being able to better target
advertising to users, and so on).
Conclusion
Facebook will most likely experience competition in the future from other social network-
ing sites that will want to poach its huge base of users. To remain competitive, Facebook
needs to consider the input of users like you to ensure that it delivers a cutting-edge
product that delivers the features its customers want and need. Facebook’s best chance
of remaining on top of the social media heap is to be sensitive to the needs of its current
users.
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together the team will agree on an
ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has complained
about a Web site (such as spokeo.com) providing information that lead to their identity
being stolen.
2. Team members should write a summary that provides background information for
their character—for example: victim of identity theft, Web site owner, or arbitrator—
and details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
561
chapter
twelve twelve
behind the scenes:
networking and security
in the business world
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. What are the advantages of a business network? (p. 564)
2. How does a client/server network differ from a peer-to-peer network? (pp. 565–566)
3. What are the different classifications of client/server networks? (pp. 566–569)
4. What components are needed to construct a client/server network? (pp. 569–570)
5. What do the various types of servers do? (pp. 570–572)
6. What are the various network topologies (layouts), and why is network topology
important in planning a network? (pp. 572–578)
7. What types of transmission media are used in client/server networks? (pp. 578–583)
8. What software needs to run on computers attached to a client/server network, and
how does this software control network communications? (pp. 583–584)
9. How do network adapters enable computers to participate in a client/server
network? (pp. 584–586)
10. What devices assist in moving data around a client/server network? (pp. 586–588)
11. What measures are employed to keep large networks secure? (pp. 588–595)
multimedia resources
multimedia
resources
Active Helpdesk
• Using Servers (p. 572)
• Selecting a Network Topology and Cable (p. 577)
• Selecting Network Navigation Devices (p. 589)
Sound Bytes
• Network Topology and Navigation Devices (p. 574)
• What’s My IP Address? (And Other Interesting Facts about Networks) (p. 586)
• A Day in the Life of a Network Technician (p. 589)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Planning a meeting
with classmates to work on a group project can be difficult. E-mail is
not an efficient planning tool because it is difficult to coordinate numerous messages.
Even using threaded message postings on Facebook can be cumbersome. A simple
free tool that solves this problem is Doodle (doodle.com).
With Doodle, you can quickly set up a grid with possible meeting dates and
times. You then provide the URL of the meeting poll to the other members of the
group. As members come to the meeting site, they enter their names and indicate their
availability for various meeting times (yes, no, or maybe) as indicated by
the colors green, red, and yellow. Doodle then provides a visual summary
of all input from the group so you can easily select a meeting time
that works for the majority of the participants.
So stop tearing your hair out about get-
ting your group together and use Doodle to simplify your
planning!
563
Networking You probably have a printer hooked up
to your home computer. Think about
Advantages how often it sits idle. Compound that
You learned about peer-to-peer networks in by having 20 students in a lab, all with
Chapter 7, and we’ll expand your knowl- their own printers. Having 20 printers
edge of networks in this chapter. Recall that sitting idle 95 percent of the time is a
a network is a group of two or more com- tremendous waste of money. Installing
puters (or nodes) that are configured to a network that enables one printer
share information and resources such as (working most of the time) to serve
printers, files, and databases. Essentially, all 20 students saves money.
a network enables computers and other • Networks facilitate knowledge
devices to communicate with each other. sharing. The databases you learned
But why do we network computers? Home about in Chapter 11 become especially
networks enable users to share an Internet powerful when deployed on a network.
connection, share peripherals, and share Networked databases can serve the
media. Businesses, such as your college or needs of many people at one time and
an insurance company, also gain advantages increase the availability of data. Your
from deploying networks. college’s databases are much more use-
What advantages do businesses ful when all college employees can look
gain from networks? Large business up student records at the same time.
networks provide advantages similar to • Networks enable software sharing.
those of home networks, and therefore have Installing a new version of software on
advantages over individual stand-alone everyone’s desktop in a college with
computers: 500 employees can be time consuming.
• Networks increase productivity. However, if the computers are net-
Computers are powerful stand-alone worked, all employees can access the
resources. However, to increase produc- same copy of a program from the server.
tivity, people need to be able to share Although the college must still purchase
data and peripherals with co-workers a software license for each employee,
and communicate with them efficiently. with a network it can avoid having to
Without a network, only one person at a install the program on every computer.
time can access information because it This also saves space on individual
resides on a single computer. Informa- computers, because the software doesn’t
tion sharing is therefore the largest reside on every computer.
benefit gained by installing a network. • Networks facilitate Internet connectiv-
ity. Most college students need to con-
• Networks enable expensive resources
nect to the Internet to complete class
to be shared. Networks enable people to
work. Providing each computer on a
share peripherals such as printers, elimi-
network with its own dedicated connec-
nating the need for duplicate devices.
tion to the Internet is costly. Through a
network, large groups of computers can
BITS share one Internet connection, reducing
AND Print Documents Anywhere . . . Internet connectivity expenses.
BYTES From Your Phone! • Networks enable enhanced communi-
cation. Social networking tools, e-mail,
You have plenty of information on your smartphone, but what do you do when you and instant messaging are extremely
need print something and you’re nowhere near your printer? Using a free software powerful applications when deployed
program called PrinterShare (printeranywhere.com), you can print a document from on a network (especially one that is con-
your smartphone to any local WiFi connected printer. nected to the Internet). College students
The PrinterShare software helps your smartphone detect nearby printers con- can easily exchange information with
nected via a WiFi connection (such as a printer in the business center at your hotel) each other and their professors, and can
and print documents (such as your boarding pass for an airline fight) from your phone share valuable data by transferring files
to that printer. PrinterShare also works on smartphones such as the iPhone or phones to other users.
using the Android operating system. Check it out for yourself—it could save you some
Are there disadvantages to using
aggravation in the future.
networks? Because business (or college)
networks are often complex, additional
564 Chapter 12 Behind the Scenes: Networking and Security in the Business World
personnel are usually required to maintain this hardly would be efficient. You would be
them. These people, called network admin- floundering around in the kitchen with
istrators, have training in computer and other customers as they try to cook their
peripheral maintenance and repair, net- own meals. If the manager assigns
working design, and the installation of specialized tasks to a fast-food cook (the
networking software. server), many customers (clients) can be
Another disadvantage is that operating served efficiently at the same time. This is
a network requires special equipment and how servers work: One server can provide
software. However, most companies feel services efficiently to a large number of
that the cost savings of peripheral sharing clients at one time.
and the ability to give employees simultane- Does my home network have a
ous access to information outweigh the costs server? Your home P2P network does not
associated with network administrators and need a server. Peer-to-peer networks, which
equipment. are typically set up in homes or very small
Aside from the smallest networks, such as businesses, do not require servers (although
peer-to-peer networks, which are typically some home networks now have specialized
used in homes and small businesses, the media servers for sharing media) to function
majority of computer networks are based on efficiently. In these networks, computers
the client/server model of computing. act as both clients and servers when
appropriate.
When shouldn’t a peer-to-peer
Client/Server network be used? P2P networks
become difficult to administer when they
Networks are expanded beyond 10 users. Each indi-
As you’ve learned, a server is a computer vidual computer may require updating if
that both stores and shares resources on a there are changes to the network, which
network, whereas a client is a computer that is not efficient with large numbers of
requests those resources. A client/server net- computers. In addition, security can’t be
work (also called a server-based network) implemented centrally on a P2P network but
contains servers as well as client computers. instead must be handled by each individual
The inclusion of servers is what differenti- user. Client/server networks contain at least Figure 12.1
ates a client/server network from a typical Basic client/server
peer-to-peer (P2P) network. Each node interaction.
connected to a P2P network can communi-
cate directly with every other node on the Step 1: Client computer
network instead of having a separate requests service from
device exercise control over the network. server computer.
Figure 12.1 illustrates the client/server
relationship.
The main advantage of a client/ What are the names of
server relationship is that it makes data the customers who bought
flow more efficiently than in peer-to- more than 500 television
sets this month?
peer networks. Servers can respond to
requests from a large number of clients
Query submitted
at the same time. In addition, from client
servers can be configured to
perform specific tasks (such Answer provided
by server
as handling e-mail or data-
base requests) efficiently.
Say you are hungry and go Mega-Discount Appliances
Wall-To-Wall Televisions, Inc.
to a fast-food restaurant. In Computer A
Televisions-R-Us
(client) Computer B
your role as the customer or-
(server)
dering food, you are the client
making a request. The cook, in the role of
the server, responds to the request and pre- Step 2: Server computer
provides requested
pares the meal. Certainly, you could go to service to client computer.
the restaurant and cook your own meal, but
High-speed
communications line
Switch
Laser printer
566 Chapter 12 Behind the Scenes: Networking and Security in the Business World
area networks, metropolitan area networks, Figure 12.3 shows an example of what part
and personal area networks. of the ABC Shoe Company WAN might
A local area network (LAN) is a (gener- look like.
ally small) group of computers and periph- Sometimes government organizations or
erals linked together over a relatively small civic groups establish WANs to link users in
geographic area. The computer lab at your a specific geographic area (such as within a
school or the network serving the floor of city or county). This special type of WAN
the office building where you work is pro- is known as a metropolitan area network
bably a LAN. (MAN). San Diego’s Traffic Management
Wide area networks (WANs) comprise Center (TMC) uses a MAN to analyze traffic
large numbers of users over a wider physi- patterns. You can check out the traffic maps
cal area or separate LANs that are miles they generate at dot.ca.gov/sdtraffic.
apart. For example, a large college campus What sort of network connects
might have a WAN that spans all of its lec- devices such as smartphones and
ture halls, residence halls, and administra- Bluetooth headsets? A personal area Figure 12.3
tive offices. network (PAN) is a network used to connect A WAN comprises
Corporations often use WANs to connect wireless devices (such as Bluetooth-enabled several LANs in different
two or more geographically distant devices) that are in close proximity to each geographic locations
branches. For example, ABC Shoe Company other. (Bluetooth technology uses radio connected by telecommu-
nications media. Satellite
has manufacturing plants and administra- waves to transmit data over short distances.) communication is often
tive offices all over the globe. The LAN at PANs are wireless and work within the used to transmit data over
each ABC Shoe Company of- long distances.
fice is connected to other
ABC Shoe Company Microwaves Microwaves
LANs, forming a
global ABC Shoe
Company WAN.
High-speed High-speed
Communications Communications
Line Satellite Line
Modem Modem
Wireless
Client Computer
connection
Client Computer
Server Server
568 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Denver, CO
branch office
LAN VPN secure
Data tunnel through
VPN enabled flow the Internet
router
Phoenix, AZ
VPN enabled branch office
router LAN
Wireless Data
connection flow
Switch
Switch
Computer #1
Computer #3 Computer #4
Computer #2
Switch Server
(Network navigation device)
Client Computer #2
570 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Wireless
connection
Laser printer 1
Print server
Client Computer #1
Database server
Wireless
access point Switch Laser printer 2
Web server
Client Computer #2 Authentication/
file server
Communication
server
Application
Client Computer #3 server E-mail server
Figure 12.7
a computer’s processor (CPU) is a good request) from a client computer, it puts the job This is a typical large-
candidate to relegate to a dedicated server. into a print queue on the print server. Nor- scale client/server
Common types of dedicated servers are mally, each printer on a network has its own network with several
dedicated servers
print servers, application servers, database uniquely named print queue. Jobs receive a
installed.
servers, e-mail servers, communications number when they enter the queue and go to
servers, and Web servers. Servers are con- the printer in the order in which they were
nected to a client/server network so that all received. Print queues thus function like the
client computers that need to use their serv- “take a number” machines at a supermarket
ices can access them, as shown in Figure 12.7. deli. Thus, print servers organize print jobs
into an orderly sequence to make printing
Print Servers more efficient on a shared printer. Another
useful aspect of print servers is that network
How does a print server function? administrators can set them to prioritize print
Printing is a function that takes a large quan- jobs. Different users and types of print jobs
tity of CPU time and that most people do can be assigned different priorities so higher-
quite often. Print servers manage all client- priority jobs will be printed first. For instance,
requested printing jobs for all printers on a in a company in which documents are
network, which helps client computers to printed on demand for clients, you would
complete more productive work by relieving want these print jobs to take precedence over
them of printing duties. When you tell your routine employee correspondence.
computer to print a document, it passes off
the task to the print server. This frees the
CPU on your computer to do other jobs.
How does the printer know which
Application Servers
documents to print? A print queue is What function does an application
a software holding area for print jobs. When server perform? In many networks,
the print server receives a job (a printing all users run the same application software
Servers 571
(such as Microsoft Office) on their comput- goes to the e-mail server, which then
ers. In a network of thousands of personal handles the routing and delivery of your
computers, installing application software message. The e-mail server functions much
on each individual computer is time con- like a postal carrier, who picks up your mail
suming. An application server acts as a and sees that it finds its way to the correct
repository for application software. destination.
When a client computer connects to the
network and requests an application, the
application server delivers the software to Communications Servers
the client computer. Because the software
does not reside on the client computer itself, What types of communications does
this eases the task of installation and a communications server handle? A
upgrading. The application needs to be communications server handles all commu-
installed or upgraded only on the applica- nications between the network and other
tion server, not on each network client. networks, including managing Internet con-
nectivity. All requests for information from
the Internet and all messages being sent
through the Internet pass through the com-
Database Servers munications server. Because Internet traffic
What does a database server do? As is substantial at most organizations, the
its name implies, a database server provides communications server has a heavy
client computers with access to information workload.
stored in databases. Often, many people The communications server often is the
need to access a database at the same time. only device on the network connected to the
For example, multiple college advisers can Internet. E-mail servers, Web servers, and
serve students at the same time because other devices needing to communicate with
the advisers all have access to the student the Internet usually route all their traffic
information database. This is made possible through the communications server. Provid-
because the database resides on a database ing a single point of contact with the outside
server that each adviser’s computer can world makes it easier to secure the network
access through the network. If the database from hackers.
were on a stand-alone computer instead of a
network, only one adviser could use it at a
time, making the process of serving students Web Servers
terribly inefficient.
What function does a Web server
perform? A Web server is used to host a
Web site so it will be available through the
E-Mail Servers Internet. Web servers run specialized soft-
How is e-mail handled on a large ware such as Apache HTTP Server (open
client/server network? The volume source server software) and Microsoft Inter-
of e-mail on a large network could quickly net Information Services (IIS) that enable
overwhelm a server that was attempting to them to host Web pages. Not every large
handle other functions as well. The sole network has a Web server. Many colleges
function of an e-mail server is to process and businesses use a third-party Web host-
and deliver incoming and outgoing e-mail. ing company to host their Web sites instead.
On a network with an e-mail server, when
you send an e-mail from your computer, it
Network Topologies
ACTIVE Just as buildings have different floor plans
HELP- Using Servers depending on their uses, networks have dif-
DESK ferent blueprints denoting their layout.
Network topology refers to the physical or log-
In this Active Helpdesk call, you’ll play the role of a ical arrangement of computers, transmission
helpdesk staffer, fielding calls about various types of media (cable), and other network compo-
servers and client/server software. nents. Physical topology refers to the layout
of the “real” components of the network,
572 Chapter 12 Behind the Scenes: Networking and Security in the Business World
A cable break here
cuts off Computer #1 and
Computer #2 from
peripherals
Computer #4
Computer #1
Computer #3
Terminator
Terminator
Scanner
Figure 12.8
574 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Step 1: Token travels
around ring until a computer
needs to transmit data.
Computer #1
Computer #4
Computer #2
Computer #3
Step 3: Computer #2
completes transmission and
releases token.
Printer
Server
Computer #6
Computer #1
Computer #4
Computer #2 Computer #3
576 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Collision
Detected
Signal #1
Signal #4
Step 1: When two nodes
Computer Computer Computer Computer transmit simultaneous data
#1 #2 #3 #4 signals, a data collision occurs
and is detected.
ion!
Collis
Signal #1 Signal #4
Jam Signal
Jam Signal
Jam Signal
Jam Signal
Sent
Computer Computer Computer Computer
#1 #2 #3 #4 Step 2: The detecting
node sends a jam signal.
Retransmit
Signal #1
Signal #4
Step 3: The two nodes
that sent simultaneous data
Computer Computer Computer Computer
#1 #2 #3 #4 signals retransmit their signals
after a random amount of time.
Figure 12.11
How do computers on a star net- transmit data. All devices on the network
Avoiding data collisions
work avoid data collisions? Because have the same right (that is, they have
on an Ethernet network.
most star networks are Ethernet networks, multiple access) to transmit data when they
they use the method used on all Ethernet deem it safe. It is therefore possible for two
networks to avoid data collisions: CSMA/ devices to begin transmitting data signals at
CD (short for carrier sense multiple access the same time. If this happens, the two
with collision detection). With CSMA/CD, signals collide.
a node connected to the network uses carrier What happens when the signals
sense (that is, it “listens”) to verify that no collide? As shown in Figure 12.11, when
other nodes are currently transmitting two nodes (Computer 1 and Computer 4)
data signals. If the node doesn’t hear any begin transmitting data signals at the same
other signals, it assumes that it is safe to time, signals collide, and a node on the net-
work (Computer 3) detects the collision
ACTIVE Selecting a (Step 1). That node (Computer 3) then sends
HELP- a special signal called a jam signal to all net-
Network Topology
DESK work nodes, alerting them that a collision
and Cable has occurred (Step 2). The original nodes
In this Active Helpdesk call, you’ll play the role of a (Computer 1 and Computer 4) then stop
Helpdesk staffer, fielding calls about how a client/ transmitting and wait a random amount of
server network differs from a peer-to-peer network, time before retransmitting their data signals
the different classifications of client/server networks, (Step 3). The wait times need to be random;
various network topologies, and the types of trans- otherwise, both nodes would start retrans-
mission media used in client/server networks.
mitting at the same time and another colli-
sion would occur.
Transmission Media
Comparing Topologies A variety of building materials are available
Which topology is the best one? for constructing a house; the ones chosen
Figure 12.12 lists the advantages and disad- will depend on the needs of the builder.
vantages of bus, ring, and star topologies. Similarly, when building a network, net-
Star topologies are the most common, work engineers can use different types of
Figure 12.12 ADVANTAGES AND DISADVANTAGES OF BUS, RING, AND STAR TOPOLOGIES
578 Chapter 12 Behind the Scenes: Networking and Security in the Business World
media. Transmission media, whether for and so on. The bend radius of the cable
wired or wireless communications technol- defines how many degrees a cable can
ogy, comprise the routes data takes to flow be bent in a one-foot segment before it is
between devices on the network. Without damaged. If many corners need to be
transmission media, network devices would navigated when installing a network,
be unable to communicate. network engineers use cabling with a
Why are wired connections used in high bend radius.
business networks? Wired connections • Cable cost: The cost per foot of different
are popular in business networks because types and grades of cable varies widely.
wired connections generally provide higher Cable selection may have to be made
throughput than wireless connections. based on cost if adequate funds are not
And although most home users purchase available for the optimal type of cabling.
notebooks instead of desktop computers, • Installation costs: Certain types of cable
desktop computers still provide more com- (such as twisted pair) are easy and inex-
puting power for less money than note- pensive to install. Fiber-optic cable
books, which makes desktop computers requires special training and equipment
popular choices for business networks. to install, which increases the installa-
Because desktops aren’t moved around, tion costs.
they are usually connected to a network
• Susceptibility to interference: Signals
with a wired connection.
traveling down a cable are subject to
two types of interference. Electromag-
Wired Transmission Media netic interference (EMI), which is caused
when the cable is exposed to strong
What types of cable are commonly electromagnetic fields, can distort or
used for networks? Most home net- degrade signals on the cable. Fluores-
works use twisted-pair cable as wired trans- cent lights and machinery with motors
mission media. For business networks, the or transformers are the most common
three main cable types that are used today sources of EMI emissions. Cable
are twisted pair, coaxial, and fiber optic. signals also can be disrupted by radio
What are the important factors in frequency interference (RFI), which is
choosing a cable type? Although each
cable type is different, the same criteria
always need to be considered when choos- BITS
ing a cable type: AND ViFi—WiFi for Those on the Move!
BYTES
• Maximum run length: Each type of
cable has a maximum run length over With the proliferation of portable computing devices, demand for connectivity is
which signals sent across it can be increasing exponentially. To meet the demand, technologies such as WiFi are now
“heard” by devices connected to it. deployed even in moving vehicles. Numerous cities in the United States, including San
Therefore, when designing a network, Francisco, California; Cincinnati, Ohio; and Austin, Texas offer WiFi connectivity on city
network engineers must accurately buses. Initiatives like Aspirnaut, in Kentucky, provide rural children with school bus
measure the distances between devices rides in excess of one hour with free WiFi access and computing devices to use while
to ensure that they select an appropriate riding the bus. However, WiFi connectivity is tricky to achieve while on the move
cable. because you can connect to only one wireless access point at a time, and the access
• Bandwidth: As you learned in earlier points have limited range. As you drive along and get out of range, you need to
chapters, bandwidth is the amount of change to other access points. As you switch from one access point to another,
data that can be transmitted across a connectivity speeds drop dramatically or connectivity is lost altogether.
transmission medium in a certain A joint initiative among the University of Massachusetts, the University of Wash-
amount of time. Each cable is different ington, and Microsoft may be close to solving the problem. They have developed a
and is rated by the maximum band- new technology called Vehicle WiFi (ViFi) that allows a device to connect to more than
width it can support. Bandwidth is one access point at the same time. The software your device runs determines which
measured in bits per second, which rep- access point has the best signal strength and sends data packets through it. By con-
resents how many bits of data can be necting with multiple access points at once, it makes switching from point to point
transmitted along the cable each second. less likely to sever your Internet connection. Perhaps you’ll be able to take advantage
• Bend radius (flexibility): When in- of ViFi in the next new car you buy, and your passengers can surf effortlessly while
stalling cable, it is often necessary to you whiz along at 55 miles per hour!
bend the cable around corners, surfaces,
580 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Although coaxial cable used to be the
most widely used cable in business net-
Plastic Plastic
works, advances in twisted-pair cable jacket insulation
shielding and transmission speeds, as well
as twisted pair’s lower cost, have reduced
the popularity of coaxial cable. However, Copper
core
coaxial cable is still used in some manufac-
turing facilities where machinery creates Braided metal
for shielding
heavy electrical interference.
Fiber-Optic Cable
What does fiber-optic cable look Figure 12.14
like? As shown in Figure 12.15, the core of Coaxial cable consists of
fiber-optic cable is comprised of a glass (or media are usually add-ons that extend or four main components:
plastic) fiber (or a bundle of fibers) through improve access to a wired network. In the the core, an insulated
corporate environment, wireless access is covering, a braided metal
which the data is transmitted. A protective shielding, and a plastic
layer of glass or plastic cladding is wrapped often provided to give employees a wider
jacket.
around the core to protect it. Finally, for ad- working area. For instance, if conference
ditional protection, an outer jacket (sheath) rooms offer wireless access, employees can
is added, often made of a durable material bring their notebooks (laptops) to meetings
such as Kevlar (the substance used to make and gain access to the network during the
bulletproof meeting. However,
vests). Data trans- when they go back
missions can pass Optical to their offices,
through fiber- glass fiber they may connect
optic cable in to the network
only one direc- through a wired
Protective
tion. Therefore, at sheath connection. Accord-
least two cores ingly, corporate
are located in networks are often
Glass or plastic
most fiber-optic cladding a combination of
cables to enable wired and wireless
transmission of media.
Figure 12.15 Are there
data in both
Fiber-optic cable is made up of a glass or plastic fiber standards defined
directions. (or a bundle of fibers), a glass or plastic cladding, and
How does for wireless
a protective sheath.
fiber-optic communication?
cable differ Wireless devices must
from twisted-pair and coaxial cable? use the same communications standard to
As we noted earlier, the main difference communicate with each other. Wireless net-
between fiber-optic cable and other types works in the United States are currently
of cable is the method of signal transmis- based on the 802.11 standard, also known as
sion. Twisted-pair and coaxial cable use WiFi, established by the Institute of Electri-
copper wire to conduct electrical impulses. cal and Electronics Engineers (IEEE). Wire-
In a fiber-optic cable, electrical data signals less devices attached to networks using the
from network devices (client computers, 802.11 standard communicate with each
peripherals, and so on) are converted to other using radio waves.
light pulses before they are transmitted.
Because EMI and RFI do not affect light
waves, fiber-optic cable is virtually immune
to interference.
Comparing Transmission Media
So who decides which medium is
best for client/server networks?
Wireless Media Options Network engineers specialize in the design
What wireless media options are and deployment of networks and are re-
there? Although the word wireless sponsible for selecting network topology
implies “no wires,” in businesses, wireless and media types. Their decision as to which
The Institute of Electrical and Electronics Engineers (IEEE) has taken the • Session layer: Sets up a virtual (not physical) connection between
lead in establishing recognized worldwide networking protocols, includ- the sending and receiving devices. It then manages the communi-
ing a standard of communications called the Open Systems Interconnec- cation between the two. In our e-mail example, the session layer
tion (OSI) reference model. The OSI model, which has been adopted as a would set up the parameters for the communications session be-
standard throughout the computing world, provides the protocol guide- tween your computer and the Internet service provider (ISP) where
lines for all modern networks. All modern network operating system your friend has her e-mail account. The session layer then tracks
the transmission of the e-mail until it is satisfied that all the data in
(NOS) protocols are designed to interact in accordance with the stan-
the e-mail was received at your friend’s ISP.
dards set out in the OSI model.
• Transport layer: Breaks up the data into packets and sequences
The OSI model divides communications tasks into seven distinct
them appropriately. It also handles acknowledgment of packets
processes called layers. Each layer of an OSI network has a specific func-
(that is, it determines whether the packets were received at their
tion and knows how to communicate with the layers above and below it. destination) and decides whether packets need to be sent again.
Figure 12.16 shows the layers of the OSI model and their functions. In our e-mail example, the transport layer breaks up your e-mail
This layering approach makes communications more efficient be- message into packets and sends them to the network layer,
cause specialized pieces of the NOS perform specific tasks. The layering making sure that all the packets reach their destination.
approach is akin to assembly-line manufacturing. Producing thousands of • Network layer: Determines where to send the packets on the net-
cars per day would be difficult if one person had to build a car on his or work and identifies the best way to route them there. In our e-mail
her own. However, by splitting up the work of assembling a car into spe- example, the network layer examines the address on the packets
cialized tasks (such as installing the engine or bolting on the bumpers) (the address of your friend’s ISP) and determines how to route the
and assigning them to people who perform exceptionally well at certain packets so they get to your ISP and can ultimately get to the
tasks, greater efficiency is achieved. This is how the OSI layers work. By receiving computer.
handling specialized tasks and communicating only with the layers above • Data link layer: Responsible for assembling the data packets into
and below them, OSI layers make communications more efficient. frames (a type of data packet that holds more data), addressing the
Let’s look at how each OSI layer functions by following an e-mail you frames, and delivering them to the physical layer so they can be sent
on their way. It is the equivalent of a postal worker who reads the
create and send to your friend:
address on a piece of mail and makes sure it is sent to the proper
• Application layer: Handles all interaction between the application recipient. In our e-mail example, the data link layer assembles the
software and the network. It translates the data from the application e-mail data packets into frames, which are addressed with appropri-
into a format that the presentation layer can understand. For exam- ate routing information that it receives from the network layer.
ple, when you send an e-mail, the application layer takes the e-mail
• Physical layer: Takes care of delivering the data. It converts the
message you created in Microsoft Outlook, translates it into a format
data into a signal and transmits it over the network so that it can
your network can understand, and passes it to the presentation layer.
reach its intended address. In our e-mail example, the physical
• Presentation layer: Reformats the data so that the session layer can layer sends the data over the Internet to its ultimate destination
understand it. It also handles data encryption (changing the data into (your friend’s ISP).
a format that makes it harder to intercept and read the message) and
compression, if required. In our e-mail example, the presentation By following standardized protocols set forth by the OSI model, NOS
layer notices that you selected an encryption option for the e-mail software can communicate happily with the computers and peripherals
message and encrypts the data before sending it to the session layer. attached to the network as well as with other networks.
Application layer Handles all interfaces between the application software and the network
Translates user information into a format the presentation layer can understand
Presentation layer Reformats data so that the session layer can understand it
Compresses and encrypts data
Session layer Sets up a virtual (not physical) connection between the sending and receiving devices
Manages communications sessions
Data link layer Assembles the data into frames, addresses them, and sends them to the physical layer for delivery
Physical layer Transmits (delivers) data on the network so it can reach its intended address
582 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Figure 12.17 CHARACTERISTICS OF MAJOR CABLE TYPES
Cable Characteristics Twisted Pair (Cat 6) Twisted Pair (Cat 6a) Fiber-Optic
Maximum run length 328 feet (100 m) 328 feet (100 m) Up to 62 miles (100 km)
Bandwidth Up to 1 Gbps Up to 10 Gbps 10 to 40 Gbps
Bend radius (flexibility) No limit No limit 30 degrees/foot
Cable cost Extremely low Low High
Installation cost Extremely low Extremely low Most expensive because of installation training required
Susceptibility to interference High High None (not susceptible to EMI or RFI)
transmission medium a network will use is R2, Linux, UNIX, and Novell SUSE Linux
based on the topology selected, the length Enterprise.
of the cable runs needed, the amount of Do peer-to-peer networks need
interference present, and the need for special NOS software? The software
wireless connectivity. Coaxial cable has that P2P networks require is built into the
been made largely obsolete by advances Windows and Macintosh operating systems.
in twisted-pair cabling throughput and Therefore, if you have a simple P2P net-
decreases in its cost. work, there is no need to purchase special-
Figure 12.17 compares the attributes of ized NOS software. When a peer-to-peer
the major cable types. Most large networks network won’t suffice (such as in a network
have a mix of media. For example, fiber- with more than 10 computers), you can’t
optic cable may be appropriate for the por- use the networking software included in
tion of the network that traverses the factory Windows and Mac OS X. Instead, you will
floor, where interference from magnetic need to purchase additional NOS software.
fields is significant. However, unshielded How does NOS software differ
twisted-pair cable may work fine in the from operating system software?
general office area. Wireless media may be Operating system (OS) software is designed
required in conference rooms and other to facilitate communication between the
areas where employees are likely to connect software and hardware components of your
their notebooks or where it is impractical computer. NOS software is specifically de-
or expensive to run cable. signed to provide server services, network
communications, management of network
peripherals, and storage. To provide network
Network Operating communications, the client computer must
run a small part of the NOS in addition to
Systems the OS. Windows 7 is an OS and is installed
Merely using media to connect computers on home computers. As noted above, be-
and peripherals does not create a client/ cause it also has some NOS functionality,
server network. Special software known as a client computers (in a client/server network)
network operating system (NOS) needs to that have Windows 7 installed as the OS do
be installed on each client computer and not need an additional NOS. Windows
server connected to the network to provide Server 2008 R2 is a NOS that is deployed on
the services necessary for them to communi- servers in a client/server network.
cate. Many modern operating systems, such How does the NOS control network
as Windows 7 and Mac OS X, include NOS communications? Each NOS has its
client software as part of the basic installa- own proprietary communications language,
tion. However, if your operating system file-management structure, and device-
does not include NOS client software, it management structure. The NOS also sets
must be installed on each client. The NOS and controls the protocols (rules) for all
provides a set of common rules (a protocol) devices wishing to communicate on the
that controls communication among devices network. Many different proprietary
on the network. The major NOSs on the networking protocols exist, such as Novell
market today include Windows Server 2008 Internetwork Packet Exchange (IPX),
584 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Smartphone
with wireless NIC
Switch
Server
Figure 12.19
This small corporate
packets as there are request packets. The points. A wireless access point (WAP) gives network has an added
number of packets depends on the volume wireless devices a sending and receiving wireless access point.
of the data being sent. A simple response connection point to the network.
may have less data than a complex one. Figure 12.19 shows an example of a typi-
Are there different types of cal corporate network with a wireless access
network adapters? Although there are point. The access point is connected to the
different types of network adapters, almost wired network through a conventional
without exception, Ethernet (either wired or cable. When a notebook (or other device
wireless) is the standard communications with a wireless NIC) is powered on near a
protocol used on most client/server net- wireless access point, it establishes a con-
works. Therefore, the adapter cards that nection with the access point using radio
ship with computers today are Ethernet waves. Many devices can communicate
compliant. The majority of Ethernet with the network through a single wireless
adapters provide connection ports that ac- access point.
cept RJ-45 (Ethernet) connector plugs for Do network adapters require
connection to twisted-pair cable. However, software? Because the network adapter
adapters that provide other types of connec- is responsible for communications between
tors for direct connections to other types of the client computer and the network, it
network media (such as fiber-optic cables) needs to speak the same language as the net-
are available. work’s special operating system software.
Do wireless networks require Therefore, special communications software
network adapters? Most corporate net- called a device driver is installed on all client
works are not entirely wireless, but they do computers in the client/server network.
provide wireless connectivity to some com- Device drivers enable the network adapter
puters and to portable devices such as to communicate with the server’s operating
smartphones. A computer that connects to system and with the operating system of the
the network using wireless access needs to computer in which the adapter is installed.
have a special network adapter card, called What are my options if I’m not
a wireless network interface card (wireless located in range of a wireless
NIC), installed in the system unit. Notebook network? You can bring your own
computers and other portable computing wireless network with you! Most cellular
devices contain wireless NICs. To allow telephone companies, such as AT&T and
wireless connections, the network must be Sprint, offer broadband PC adapters for
fitted with devices called wireless access your notebook that will keep you connected
586 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Message for
Computer #3
Switch
Server
Computer #1
Broadcast of
message for
Computer #3
Computer #2
Computer #4
Computer #3
Figure 12.20
(one with an unauthorized MAC address) grows in size, performance can decline be- Switches rebroadcast
attempts to connect to the network, he or cause many devices compete for transmission messages—but only to
she will be unable to make a connection. Al- time on the network media. To solve this the devices to which the
though it would be impractical for a large problem, a network can be broken into multi- messages are addressed.
organization, in which employees constantly ple segments known as collision domains. A
are being hired and leaving, MAC address bridge is a device that is used to send data
filtering is a useful security tool on home between these different collision domains. A
networks and small business networks. bridge sends data between collision domains,
depending on where the recipient device is
located, as indicated in Figure 12.21. Signals
Switches and Bridges received by the bridge from collision domain
Which devices are used to route A are forwarded to collision domain B only if
signals through a single network? the destination computer is located in that do-
Switches and bridges are used to send data main. Most home networks contain only one
on a specific route through the network. A segment and therefore do not require bridges.
switch makes decisions, based on the MAC
address of the data, as to where the data is
to be sent and directs it to the appropriate
network node. This improves network effi-
Routers
ciency by helping to ensure that each node What device does a network use to
receives only the data intended for it. move data to another network?
Do all networks need a switch? Whereas switches and bridges perform their
Switches are needed on Ethernet networks functions within a single network, a router
whether installed in the home or a business. is designed to send information between
Routers sold for home use have switches two networks. To accomplish this, the router
built into them. Figure 12.20 shows a switch must look at higher-level network addresses
being used to rebroadcast a message. (such as IP addresses), not MAC addresses.
Are switches sufficient for moving When the router notices data with an
data efficiently across all sizes of address that does not belong to a device on
networks? When a corporate network the network from which it originated, it
Signal to Signal to
Computer #4 Computer #4
Switch
S must be Switch
Signal to
Computer #2 passed to
Collision
Domain B
Signal to
Computer #4
Computer #1 Computer #4
Computer #2 Computer #3
Figure 12.21
Bridges are devices used sends the data to another network to which mistakes, malicious human activity, and
to send data between it is attached (or out onto the Internet). natural events and disasters.
different network
collision domains. • Human errors and mistakes: Everyone
makes mistakes. For example, the clerk
Network Security processing your tuition payment could
accidentally delete your records. A
for Client/Server member of the computer support staff
Networks could mistakenly install an old database
A major advantage that client/server net- on top of the current one. Even physical
works have over peer-to-peer networks is accidents fall into this category; for ex-
that they offer a higher level of security. ample, someone could lose control of a
With client/server networks, users can be car and drive it through the wall of the
required to enter a user ID and a password main server room.
to gain access to the network. The security • Malicious human activity: Malicious
can be centrally administered by network actions can be perpetrated by current
administrators, freeing individual users of employees, former employees, or third
the responsibility of maintaining their own parties. For example, a disgruntled em-
data security (as they must do on a peer-to- ployee could introduce a virus to the
peer network). network. A hacker could break into the
In the next section, we will explore the student database server to steal credit
challenges network administrators face in card records. A former employee who
keeping a client/server network secure. We feels he or she was unjustly fired could
use a college network as our example, but deliberately destroy data.
note that the same principles apply to all • Natural events and disasters: Some
client/server networks. events—such as broken water pipes or
What sources of security threats fire, or disasters such as hurricanes, floods,
do all network administrators need earthquakes, and other acts of nature—are
to watch for? Threats can be classified beyond human control. All can lead to the
into three main groups: human errors and inadvertent destruction of data.
588 Chapter 12 Behind the Scenes: Networking and Security in the Business World
ACTIVE because the ID was generated by a network
HELP-
Selecting Network administrator when you became a student.
DESK Navigation Devices Can hackers use my account to
log on to the network? If a hacker
In this Active Helpdesk call, you’ll play the role of a knows your user ID and password, he or she
Helpdesk staffer, fielding calls about how network can log on and impersonate you. (Imperson-
adapters enable computers to participate in a client/ ation can also happen if you fail to log out of
server network and what devices assist in moving a terminal on the college network and some-
data around a client/server network. one comes along and uses your account.)
Sometimes network user IDs are easy to fig-
ure out because they have a certain pattern
(such as your last name and the first initial
Who and what does a college net- of your first name). If a hacker can deduce
work need to be secure against? A your user ID, he might use a software pro-
college network, like any network, is vulner- gram that tries millions of combinations of
able to unauthorized users and manipula- letters and numbers as your password in an
tion or misuse of the data contained on it. attempt to access your account. Attempting
The person who sat next to you last semes- to access an account by repeatedly trying
ter in English class—and failed—may be in- different passwords is known as a brute
terested in changing his or her grade to an force attack. To prevent these attacks from
A. Hackers may be interested in the finan- succeeding, network administrators often
cial and personal information (such as Social configure accounts so that they will disable
Security numbers and credit card numbers) themselves after a set number of logon at-
stored in college financial office databases tempts using invalid passwords have been
on the network. Thus, one of the network made. If a network account isn’t set to dis-
administrator’s key functions is to keep net- able itself after a small number of incorrect
work data secure. passwords is tried, a brute force attack may
eventually succeed.
Authentication
Access Privileges
How does a college ensure that only
authorized users access its net- How can I gain access to everything
work? Authentication is the process on the college network? The simple
whereby users prove they have authoriza- answer is that you can’t! When your account
tion to use a computer network. The type of was set up, certain access privileges were
authentication most people are familiar with granted to indicate which systems you were
consists of providing a user ID and pass- allowed to use. For example, your access
word. However, authentication can also be privileges probably include the ability to
achieved through the use of biometric de- access the Internet. You also might have
vices (discussed later in this chapter) and access privileges to view your transcript and
through possessed objects. A possessed grades online, depending on the sophistica-
object is any object that a user carries to tion of your college network. However, you
identify himself and that grants him access definitely were not granted access to the
to a computer system or computer facility. grade reporting system, because this would
Examples include identification badges, enable you to change your grades. Likewise,
magnetic key cards, and smart keys (similar
to flash drives). A Day in the Life
How do most colleges handle au- SOUND
BYTE of a Network
thentication on their networks? As Technician
mentioned earlier, to gain access to a typical
college client/server network, you have to In this Sound Byte, you’ll learn firsthand about the
go through authentication by entering a user exciting, fast-paced job of a computer technician.
ID and a password. By correctly inputting Interviews with actual network technicians and tours
your ID and password, you prove who you of networking facilities will provide you with a deeper
are to the network and show that you have appreciation for the complexities of the job.
authorized access. The access is authorized
Bought anything at WalMart or Best Buy lately? If so, there is a good and, ultimately, increased sales because the product is on the shelf when
chance that you brought home a radio frequency identification tag you go to buy it.
(RFID tag) with your purchase. Originally, RFID tags were used to keep Retailers also can use the product serial number information, which
track of cattle, but now they’ve moved into the retail sector to keep track can be embedded in tags, to speed repair or return service. This process
of products. What are RFID tags, how did they end up in retail stores, and is shown in Figure 12.22. As merchandise equipped with RFID tags en-
why should you care about them? ters the warehouse, the tags are scanned, and the inventory database is
RFID tags can look like stickers or labels, or like the thin plastic wrist- updated. When merchandise is moved to the sales floor, scanning up-
bands you get when you check into a hospital. The tags are attached to dates the inventory database again for the new stock location. One last
batches of merchandise (usually cases or pallets), and all tags contain a scan occurs when customers purchase items, which triggers the stock
microchip that holds a unique sequence of numbers used to identify the ordering system to place another order with a supplier if inventory is too
product to which it is attached. The tags also contain a tiny antenna that low.
broadcasts information about the merchandise, such as its date of man- RFID can provide huge benefits for consumers. Imagine if all prod-
ufacture or price. Think of RFID tags as the next generation of UPC codes. ucts in your local grocery store had RFID tags. When you entered the
Two types of tags are in use: active and passive. Active tags are store and grabbed a shopping cart, you could swipe your credit card
equipped with a battery and constantly transmit information. Passive through a reader on the cart. After you finished shopping, you could just
tags don’t have their own power source but instead get their energy from walk out the door, at which time an RFID reader would take an inventory
tag readers. Passive tags are more common because they are cheaper. of the contents of your cart and charge your credit card for what you pur-
Tag readers are devices that scan the information on the tags as the tags chased. No more waiting in checkout lines! This streamlining of payment
are passed by the reader. They do this through antennas that generate could result in lower costs for consumers. After you got home, if your re-
magnetic fields, which the passive tags sense. In response, the passive frigerator was equipped with RFID equipment, it could scan your pur-
tags transmit their product code to the tag reader. The reader then sends chases and keep track of your groceries, including expiration dates. Your
the digital information to a computer network, and most likely into a refrigerator might contact your smartphone (via the Internet) and let you
database. know that your milk was out of date so you could buy more on the way
So how do RFID tags help retailers? For large retailers, inventory can home. Now that’s a smart fridge!
be daunting to manage. Retailers such as WalMart have tens of thou- All this convenience could come with a price. There is concern that
sands of suppliers sending hundreds of thousands of products to their people might gather information about consumers’ buying habits without
warehouses and stores. The use of RFID tagging allows the recording of their knowledge, similar to the concerns people have about spyware on
inventory receipts and shipments to stores to be largely automated, re- computers today, because the RFID tags would be operational outside of
sulting in fewer mistakes, fewer instances of merchandise being lost and the retail store. For example, someone could sit in the parking lot with a
forgotten in the warehouse, and tighter control over stock levels. This tag reader and detect exactly what you had purchased as you pushed
helps retailers and their suppliers ensure that the correct inventory levels your shopping cart by his or her car. If this person were from a compet-
are maintained at all times, resulting in fewer shortages of merchandise ing retailer, this information could be especially valuable to that
you did not receive access to the financial Aside from improper access, how
systems; otherwise, you might be able to else do data theft and destruction
change your account, indicating that your occur? Data storage devices are becom-
bill was paid when it had not been. ing smaller even as their capacities are in-
How does restricting access creasing. One problem that devices such as
privileges protect a network? flash drives pose is theft of data or intellec-
Because network access accounts are tual property. Because these devices are so
centrally administered on the authentication portable and have such large memory ca-
server, it is easy for the network administra- pacity, it is easy for a disgruntled employee
tor to set up accounts for new students and to walk out the front door with stacks of
grant them access only to the systems and valuable documents tucked in his or her
software they need. The centralized nature pants pocket. Industrial espionage has never
of the creation of access accounts and the been easier—and no spy cameras are
ability to restrict access to certain areas of needed!
the client/server network make it more se- Flash drives can also introduce viruses or
cure than a peer-to-peer network. If you other malicious programs to a network,
shouldn’t go somewhere (such as into the either intentionally or unintentionally. Just
files that record student grades), you can’t Secure Network Technologies, a security
get there on your school network! consulting firm, decided to test a client’s
590 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Truck Warehouse Sales Floor Customer
Pallets of merchandise
being unloaded
at the dock
Figure 12.22
RFID tags are scanned multiple times at a retail store.
company. Alternatively, this person could be from a government enforce- Many consumers resent any potential invasion of their privacy. There-
ment agency trying to determine whether underage consumers were pur- fore, retailers will need to educate consumers about RFID tags and their
chasing alcoholic beverages. Some pundits have speculated that if the benefits. Retailers also will need to ensure that consumers have the option
tags had a long enough range, thieves could drive by houses and scan for to deactivate or remove tags to protect their privacy.
desirable items to steal, such as large-screen TVs. However, this is unlikely
given the state of current RFID technology.
detailed security policies. Such products can closets, safe from anyone who might tamper
also monitor USB device connections and with them in an attempt to sabotage the net-
track which users have connected devices to work or breach its security.
the network (including devices other than As shown in Figure 12.23, access to sensi-
flash drives). tive areas must be controlled. Many different
Don’t forget to inform the employees that devices can be used to control access. An
their use of these devices is being moni- access card reader is a relatively cheap de-
tored. That alone will be enough to scare vice that reads information from a magnetic
many employees from connecting untrusted strip on the back of a credit card–like access
devices to the network. card (such as your student ID card). The card
reader, which can control the lock on a door,
is programmed to admit only authorized
personnel to the area. Card readers are easily
Physical Protection Measures programmed by adding authorized ID card
Can any physical measures be taken numbers, employee numbers, and so on.
to protect a network? Restricting Biometric authentication devices are be-
physical access to servers and other sensi- coming more popular, although they are still
tive equipment is critical to protecting the prohibitively costly for many organizations,
network. Where are the servers that power especially colleges. A biometric authentica-
your college network? They are most likely tion device uses some unique characteristic
behind locked doors to which only author- of human biology to identify authorized
ized personnel have access. Do you see any users. Some devices read fingerprints or
routers or switches lying about in computer palm prints when you place your hand on a
labs? Of course you don’t. These devices are scanning pad. Other devices shine a beam of
securely tucked away in ceilings, walls, or laser light into your eye and read the unique
592 Chapter 12 Behind the Scenes: Networking and Security in the Business World
IT
Manager's Biometric
Office Authentication
Device
Biometric
Authentication
Device
Wiring
Closet
General IT
Office Area
Server Room
Biometric
Authentication
Device
“
principles as a home net- administrators can detect
work. At a minimum, most Firewalls can be and thwart their attacks.
firewalls work as packet comprised of Bastion hosts are often
screeners. Packet screening software or configured as proxy servers.
involves examining incom- A proxy server acts as a go-
ing data packets to ensure hardware, and between, connecting comput-
that they originated from many ers on the internal network
or are authorized by valid sophisticated with those on the external
users on the internal net- network (the Internet). All re-
work. The router is the firewalls include quests from the internal net-
device that performs the both. work for Internet services are
packet screening. Unautho-
rized or suspect packets are discarded by the
firewall before they reach the network.
” directed through the proxy
server. Similarly, all incoming requests from
the Internet must pass through the proxy
Packet screening also can be configured server. It is much easier for network
for outgoing data to ensure that requests for administrators to maintain adequate
information to the Internet are from legiti- security on one server than it is to ensure that
mate users. This helps detect Trojan horse security is maintained on hundreds or thou-
programs that may have been installed by sands of computers in a college network.
hackers. As you learned in Chapter 9, Trojan Figure 12.24 shows a network secured by a
horses masquerade as harmless programs firewall, a bastion host, and a screening
but have a more sinister purpose. They often router.
try to disguise where they are sending data Now that you know a bit more about
from by using bogus IP addresses on the business network computing, you should
packets the programs send instead of using be able to comfortably navigate the
an authorized IP address belonging to the network at your college or your place of
network. employment and understand why certain
If packet screening is working, packets security measures have been taken to
going into and out of the network are protect network data.
594 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Firewall
Packets
to/from the
Internet
Accepted
packets
from
authorized
users Perimeter Network
Rejected
packets from
unauthorized Authorized
users requests for Secure Internal Network
Internet services
Valid Internet
services
Computer #2
Figure 12.24
A typical college network firewall layout.
cate with each other more easily, even over same components of peer-to-peer networks
large distances. Networks also enable as well as some components specific to
resources, such as printers, to be shared, client/server networks, including servers,
avoiding the cost of providing these a network topology, transmission media,
resources to individual employees. Software network operating system (NOS)
can be deployed from a network server, software, network adapters, and network
thereby reducing the costs of installation navigation devices.
on each user’s computer. Finally, networks
enable employees to share an Internet
connection, avoiding the cost of providing 5. What do the various types of servers
each employee with a dedicated Internet do?
connection. Dedicated servers are used on large net-
works to increase efficiency. Authentication
2. How does a client/server network servers control access to the network and
ensure that only authorized users can log
differ from a peer-to-peer network?
on. File servers provide storage and man-
A client/server network requires at least one agement of user files. Print servers manage
server to be attached to the network. The and control all printing jobs initiated on a
server coordinates functions such as file network. Application servers provide access
sharing and printing. In a peer-to-peer to application software (such as Microsoft
network, each node connected to the net- Office). Database servers store database files
work can communicate directly with every and provide access to users who need the
other node on the network. In a client/ information in the databases. E-mail servers
server network, a separate device (the control all incoming and outgoing e-mail
server) exercises control over the network. traffic. Communications servers are used to
Data flows more efficiently in client/server control the flow of information from the
networks than in peer-to-peer networks. In internal network to outside networks (such
addition, client/server networks have as the Internet). Web servers are used to host
increased scalability, meaning users can be a Web site.
added to the network easily.
3. What are the different classifications 6. What are the various network
of client/server networks? topologies (layouts), and why is
Local area networks (LANs) are small network topology important in
groups of computers (as few as two) and planning a network?
peripherals linked together over a small In a bus topology, all nodes are connected to
geographic area. A group of computers on a single linear cable. Ring topologies are
the floor of the office building where you made up of nodes arranged roughly in a
work is most likely a LAN. Wide area circle. The data flows from node to node in a
networks (WANs) comprise large numbers specific order. In a star topology, nodes are
of users (or of separate LANs) that are miles connected to a central communication
apart and linked together. Corporations device (a switch) and branch out like points
often use WANs to connect two or more of a star. A hybrid topology blends two or
branches (such as an office in California and more topologies in one network. Each
one in Ohio). Sometimes government organ- topology has its own advantages and
izations or civic groups establish WANs to disadvantages. Topology selection depends
link users in a specific geographic area (such on two main factors: (1) the network budget,
as within a city or county). These special and (2) the specific needs of network users
WANs are known as metropolitan area (such as speed or fair allocation of
networks (MANs). resources).
596 Chapter 12 Behind the Scenes: Networking and Security in the Business World
summary twelve twelve
chapter
7. What types of transmission media are Second, it breaks the data generated by
used in client/server networks? the computer into packets and packages
In addition to wireless media, three main them for transmission across the network
summary
cable types are used: twisted-pair cable, media. Last, it acts as a gatekeeper to
coaxial cable, and fiber-optic cable. Twisted- control the flow of data to and from the
pair cable consists of four pairs of wires computer.
twisted around each other to reduce
interference. Coaxial cable is the same type 10. What devices assist in moving data
of cable used by your cable TV company to
around a client/server network?
run a signal into your house. Fiber-optic
cable uses bundles of glass or plastic fiber to Switches are devices that read the addresses
send signals using light waves. It provides of data packets and retransmit a signal to its
the largest bandwidth but is expensive and destination instead of to every device con-
difficult to install. Wireless media uses radio nected to the switch. Bridges are devices
waves to send data between nodes on a used to send data between two different
network. segments (collision domains) of the same
network. Routers are used to route data
between two different networks (such as be-
8. What software needs to run on tween a corporate network and the Internet).
computers attached to a client/server
network, and how does this software
control network communications? 11. What measures are employed to keep
large networks secure?
Network operating system (NOS) software
needs to be installed on each computer and Access to most networks requires authenti-
server connected to a client/server network cation procedures (such as having users
to provide the services necessary for the enter a user ID and password) to ensure that
devices to communicate. The NOS provides only authorized users access the network.
a set of common rules (called a protocol) that The system administrator defines access
controls communication between devices on privileges for users so that they can access
the network. only specific files. Network equipment is
physically secured behind locked doors,
which are often protected by biometric au-
9. How do network adapters enable thentication devices. Biometric devices, such
computers to participate in a as fingerprint and palm readers, use unique
client/server network? physical characteristics of individuals for
Without a network adapter, a computer identification purposes. Firewalls are
could not communicate on a network. A employed to keep hackers from attacking
network adapter provides three critical networks through Internet connections.
functions. First, it takes low-power data Packet screeners review traffic going to and
signals generated by the computer and from the network to ascertain whether the
converts them into higher-powered signals communication was generated by a
that can traverse network media easily. legitimate user.
597
twelve
twelve key terms
chapter
598 Chapter 12 Behind the Scenes: Networking and Security in the Business World
buzzwords twelve twelve
chapter
Word Bank
• application server • file server • scalable
• bastion host • LAN • star
buzzwords
• bridges • network administrator • switches
• bus • packet screener • twisted pair
• database server • packets • WAN
• fiber-optic • router • wireless access points
Instructions: Fill in the blanks using the words from the Word Bank above.
As a(n) (1) __________ Susan’s first task was to configure her college’s new network. Be-
cause the college had campuses in three different towns, she knew it would be necessary to
configure the network as a(n) (2) __________ . However, to handle all of the wireless devices
the students carried, (3) __________ would need to be installed throughout the buildings.
Software would need to be shared among 500 employees, so a robust (4) __________ would
be a necessity. Because the college was experiencing rapid growth, the network would have
to be highly (5) __________ , which would require the selection of a(n) (6) __________
topology instead of a(n) (7) __________ topology, which would only work for a very small
network.
The transfer of large files by the digital media department would mean that using
(8) __________ cabling would be an absolute necessity in the fine arts building, whereas (9)
__________ cabling would be sufficient for other areas of the campus. Because the college
had experienced hacking on its old network, Susan insisted that a(n) (10) __________ be
installed to bolster the network defenses further by filtering unauthorized transmissions of
data. Combined with a(n) (11) __________ installed as part of the perimeter network, she felt
they would be adequately protected from wily hackers.
(12) __________ would be necessary to shift data (13) __________ between collision domains
on the network. For transferring data from the network to the Internet, a(n) (14) __________
would need to be installed. If a star topology was to be used, many (15) __________ would
need to be deployed to handle all 500 network users.
becoming computer
literate
computer literate becoming
Ginormous State University is constructing a new building to house its Fine Arts and
Digital Media programs. The digital media students and faculty work primarily on the first
floor of the building at fixed workstations but need to transfer extremely large media files
among various workspaces. The rest of the Fine Arts faculty can teach on any of the three
floors in the building and need to access the network from wherever they may be teaching.
Students will also need connectivity to the campus network and the Internet from any
point in the building.
Instructions: Draft a memo (with supporting diagrams, if necessary) that details how to
deploy network connectivity in the 25 classrooms, 12 faculty offices, and the common
areas of the building. Justify the network topology you select, explain your choice of
transmission media, and indicate the device(s) needed to connect the computers to the
existing campus network.
599
twelve
twelve self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. Bridges are used to route data between two or more network collision domains.
_____ 2. Two different types of network topologies can be deployed on the same network.
_____ 3. Twisted pair cable is never susceptible to magnetic interference.
_____ 4. Client/server networks are less scalable than peer-to-peer networks.
_____ 5. A communication server is used to control access on a client/server network.
600 Chapter 12 Behind the Scenes: Networking and Security in the Business World
making the
twelve twelve
chapter
transition to...
next semester
transition to...
1. A Truly Wireless Campus
Most schools have wireless networks now, but these are mainly for the convenience
of the students. School employees are often still tied down to desktop computers with
wired connections. The primary reason for this is cost as desktop computers are
next semester
making the
cheaper than notebooks (for the same amount of computing power), and computers
that stay in one place put don’t require as much maintenance and repair. Assuming
your school can afford to begin transitioning to providing all employees with notebook
computers (or other wireless computing devices), draft a plan that identifies the
following:
a. Which two departments should be converted to wireless first?
b. What benefits will the employees in these departments gain from wireless connec-
tivity?
c. How will wireless devices allow these employees to better serve or interact with the
students?
d. What guidelines should the school establish for use of the computers when they are
off campus?
e. What precautions should the school take to help recover the computers in the event
they are lost or stolen?
601
twelve
twelve making the
chapter
transition to...
the workplace the workplace
1. Network Topology in the Workplace
You are interning at a small manufacturing company that is currently building a
new manufacturing facility. All of the main manufacturing machines are computer-
transition to...
making the
602 Chapter 12 Behind the Scenes: Networking and Security in the Business World
critical thinking
twelve twelve
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Biomentric Access on Campus
Biometric security devices are still expensive. But there are usually parts of any
organization that need to be more secure than others, and you can often justify the cost
of these devices for certain areas. Consider the following organizations and prepare a
paper discussing in which areas of the business they could most benefit from installing
biometric security devices:
a. Financial institution (bank)
b. Public university that conducts scientific research
c. Pharmaceutical company
2. Monitoring Computer Usage in the Workplace
Software tools for monitoring computer usage are readily available on the Internet,
often for free (such as Best Free Keylogger). In most jurisdictions, it is legal for employ-
ers to install monitoring software on computer equipment they provide to employees.
It is usually illegal for employees to install monitoring software on computers owned
by their employers for purposes of monitoring computer usage of co-workers or
bosses. The Ethics in IT feature “Who’s Watching the Watchers” earlier in this chapter
described the story of a man who was fired for installing monitoring software on his
boss’s computer even though he proved the boss was goofing off most of the time. Do
you think this double standard is fair? What circumstances do you think would justify
an employee monitoring other employers or their boss’s computer usage? Whose
approval should be sought before employees embarked on computer usage monitor-
ing? Should whistleblowers have the right to conduct computer usage monitoring?
Please fully explain your answers.
3. Acceptable-Use Internet Policies
Most schools have drafted acceptable-use policies for computers and Internet access to
inform students and employees of the approved uses of college computing assets.
Consider these areas of a potential college policy:
a. Should employees be allowed to use their computers and Internet access for
personal tasks (such as checking non–college-related e-mail, accessing Facebook, or
playing games)? If so, how much time per day is reasonable for employees to spend
on personal tasks?
b. Should student computer and Internet usage be monitored to ensure compliance
with the personal use policies? Should the college inform students that they are
being monitored? What should the penalties be for violating these policies?
c. Many colleges block access to Web sites that enable students to participate in
potentially illegal activities such as downloading music, gambling, or viewing
pornography. Should colleges have the right to block students’ access to these Web
sites when they are on campus? Why or why not?
4. Wireless Network Layout
You are working for a local outlet of a national sandwich franchise (such as Subway).
Now that most customers have portable devices with wireless access, they have come to
expect connectivity while they eat. Management has asked you to survey customers to
determine their needs. Draft a survey for your boss that helps determine the following:
a. Should access be free? If access is not free, how much would customers pay?
b. What types of applications would the customers access while in the shop?
c. How important is WiFi access to their dining experience?
603
twelve
twelve team time
chapter
Problem
As wireless devices become more prevalent, increased demands for wireless access will be
placed on networks. Although many schools already deploy adequate wireless access, there
is room for improvement of coverage in some areas.
Task
As part of a task force studying proposed technology improvements at your school, you
and your classmates have been requested to investigate the efficiency of the wireless cover-
age at your school. Before presenting your findings to the task force, your group needs to
fine-tune its recommendations.
Process
Divide the class into small teams.
1. Explore the areas of your campus where students congregate to socialize or engage in
research. Determine if these areas are covered by wireless Internet access and the speed
(802.11g or 802.11n) at which connections are offered. This may require interviewing
your school’s network manager. You can also test the throughput with your notebook
computer. First, install free connection speed monitoring software such as Net Meter or
BitMeter 2 (both available at download.cnet.com). Next, test the upload and download
speeds for areas of your school covered by wireless technology (such as the library) by
connecting to the Internet in various locations. Make sure you connect in several differ-
ent parts of the campus as speeds many vary significantly from location to location.
2. Present your findings to your class. Lead a discussion with the other students and
solicit feedback as to their experiences with wireless connectivity on the campus. In
which areas of the campus do you feel wireless technology should be improved? Are
there parts of the campus that are not covered by wireless technology that you feel
should feature it? What other technologies should be deployed that would benefit
student learning?
3. Prepare a report for the task force that includes your suggestions for improvements
and upgrades to the wireless network on your campus. If possible, address options
for wireless connectivity when students are off campus for field trips, seminars, and
so on.
Conclusion
Being tied down to a wired computer terminal just doesn’t cut it in the 21st century.
Although wireless technology can be difficult and expensive to deploy in some instances
(such as in old campus buildings), today’s students will continue to demand the portable,
high-speed connections that they need to function effectively. Someday we’ll probably
wonder why we even bothered with wired connections at all!
604 Chapter 12 Behind the Scenes: Networking and Security in the Business World
ethics
twelve twelve
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator
will watch and comment on both sides of the arguments, and together the team will agree
on an ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which the owner of a coffee shop
at a shopping center has accused the proprietor of the sandwich shop next door of encour-
aging the sandwich shop’s patrons to piggyback on the coffee shop’s wireless network.
2. Team members should write a summary that provides background information for
their character—for example: coffee shop owner, sandwich shop owner, and mall man-
ager (arbitrator)—and details their character’s behaviors to set the stage for the role-
playing event. Then, team members should create an outline to use during the
role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an im-
portant skill.
605
chapter
thirteenthirteen
behind the scenes:
how the internet works
objectives
objectives
After reading this chapter, you should be able to answer the following questions:
1. Who owns, manages, and pays for the Internet? (p. 608)
2. How do the Internet’s networking components interact? (pp. 608–611)
3. What data transmissions and protocols does the Internet use? (pp. 611–613)
4. Why are IP addresses and domain names important for Internet communications?
(pp. 613–619)
5. What are FTP and Telnet, and how do you use them? (pp. 619–620)
6. What are HTML/XHTML and XML used for? (pp. 620–626)
7. How do e-mail, instant messaging, and Voice over Internet Protocol work, and how is
information using these technologies kept secure? (pp. 626–634)
8. How do businesses use the Internet to reduce computing costs? (pp. 634–635)
multimedia resources
multimedia
resources
Active Helpdesk
• Understanding IP Addresses, Domain Names, and Protocols (p. 615)
• Keeping E-Mail Secure (p. 628)
Sound Bytes
• Creating Web Pages with HTML (p. 622)
Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool
is this?
how cool is this? Do you have several
e-mail accounts that need checking, such as your school e-mail account, which has
directives from your instructor, and your personal e-mail account, which receives
messages from friends and family? Do you have accounts on
multiple social networking sites, such as Facebook and MySpace? Are half of your
friends using AOL Instant Messenger while the other half uses Yahoo! Instant
Messenger? Keeping up with your online social life can be challenging.
Digsby is a free tool that consolidates all of your online communications into a
single application. You just enter all the login information for your social networking,
e-mail, and IM accounts into the Digsby setup screen. Then, whenever you run
Digsby, it logs into all your accounts and checks for updates. You can easily
see all of your friends who are online, regardless of the IM service they use. You can
also easily view the status of your
Facebook page and
see all activity at a glance.
Clicking on any activity
shown, such as a new e-mail
received, takes you to a browser
window for the relevant application
so you can take appropriate action.
Digsby makes managing your
digital life a snap no matter how
many different applications you
need to use!
607
The Management Many of the functions handled by these
nonprofit groups were previously handled
of the Internet by U.S. government contractors because the
The Internet is the largest network that you Internet developed out of a defense project.
use. To keep a massive network like the However, because the Internet now serves
Internet functioning at peak efficiency, it the global community, not just the United
must be governed and regulated. However, States, assigning responsibilities to organiza-
no single entity is in charge of the Internet. tions with global membership is helping to
In addition, new uses are created every day speed the Internet’s internationalization.
by a variety of individuals and companies. Through close collaboration among the or-
Who owns the Internet? Even ganizations listed in Figure 13.1 (and a few
though the U.S. government funded the others such as the Internet Network Infor-
development of the technologies that mation Center and the Internet Research
spawned the Internet, no one really owns it. Task Force), the Internet’s vast collection of
The particular local networks that constitute users and networks is managed.
the Internet are all owned by different enti- Who pays for the Internet? You do!
ties, including individuals, universities, gov- The National Science Foundation (NSF),
ernment agencies, and private companies. which is a U.S. government–funded agency,
Government entities such as the National still pays for a large portion of the Internet’s
Science Foundation (NSF) and the National infrastructure and funds research and devel-
Aeronautics and Space Administration opment for new technologies. The primary
(NASA), as well as many large, privately source of NSF funding is your tax dollars.
held companies, own pieces of the commu- Originally, U.S. taxpayers footed the entire
nications infrastructure (the high-speed data bill for the Internet, but as the Internet grew
lines that transport data between networks) and organizations were formed to manage it,
that makes the Internet work. businesses, universities, and other countries
Does anyone manage the Internet? began paying for Internet infrastructure and
Because the individual networks that partic- development. And, of course, the fees you
ipate in the Internet are owned by several pay to your ISP for Internet access also con-
different entities, the Internet would cease to tribute to defraying the costs of the Internet.
function without some sort of organization.
Therefore, several nonprofit organizations
and user groups, each with a specialized
purpose, are responsible for its manage-
Internet Networking
ment. Figure 13.1 shows the major organiza- The Internet’s response to our requests for
tions that play a role in the governance and information seems almost magical at times.
development of the Internet. By simply entering a URL in your browser
Internet Engineering A subgroup of ISOC made up of individuals and organizations that research new ietf.org
Task Force (IETF) technologies for the Internet that will improve its capabilities or keep the
infrastructure functioning smoothly.
Internet Architecture Board (IAB) Technical advisory group to the ISOC and a committee of the IETF. Provides direction iab.org
for the maintenance and development of the protocols that are used on the Internet.
Internet Corporation for Organization responsible for management of the Internet’s domain name system icann.org
Assigned Names and Numbers (DNS) and the allocation of IP addresses.
(ICANN)
World Wide Web Consortium of more than 330 member organizations that sets standards and w3.org
Consortium (W3C) develops protocols for the Web.
High-speed
connection
Your teacher’s
home computer
Dial-up
connection Networking devices
Your ISP
High-speed
connection
Your neighbor’s
computer services and other computers, known as
servers, provide those services to the clients.
Your computer In the case of the Internet, the clients are
Figure 13.4 devices such as computers, netbooks, and
Home users connect to data quickly between networks. They smartphones that use browsers (or other
their ISPs through a single allowed the early Internet, which began as a interfaces) to request services such as Web
point of presence that can government-funded academic experiment, pages. Various types of servers from which
handle many simultaneous to grow into the modern Internet of many clients can request services are deployed
connections.
commercial companies working together— (installed) on the networks that make up
the Internet that we all know and use today. the Internet:
Now, private-sector companies make up the
Internet system, and the data-exchange • Web server: Computer that runs special-
mechanism is known as an Internet exchange ized operating systems, enabling it to
point (IXP). A typical IXP is made up of one host (provide Web space for) Web pages
or more network switches to which ISPs and other information and provide
connect. As you’ll recall from Chapter 7, requested Web pages to clients.
switches are devices that send data on a • Commerce server: Computer that hosts
specific route through a network. By con- software that enables users to purchase
necting directly to each other through IXPs, goods and services over the Web. These
networks can reduce their costs and servers generally use special security
improve the speed and efficiency with protocols to protect sensitive informa-
which data is exchanged. tion (such as credit card numbers) from
How do individuals connect to an being intercepted.
ISP? Whether they dial up through a con- • File server: Computer that is deployed
ventional modem or connect through high- to provide remote storage space or to act
speed access (such as cable or fiber), as a storehouse for files that users can
individual Internet users enter an ISP through download. Google Docs, Flickr, and
a point of presence (POP), which is a bank Delicious offer online storage services
of modems, servers, routers, and switches for productivity documents, pictures,
(shown in Figure 13.4) through which many and Web pages, respectively.
users can connect to an ISP simultaneously. Do all Internet connections
ISPs maintain multiple POPs throughout the take place in a client/server
geographic area they serve. mode? Certain services on the Internet
operate in a peer-to-peer (P2P) mode, as
depicted in Figure 13.5. For example,
The Network Model of the Internet BitTorrent (bittorrent.com) is a popular file-
What type of network model does sharing service through which Internet users
the Internet use? The majority of can exchange files. BitTorrent and other file-
Internet communications follows the sharing services require the user’s computer
client/server model of network communica- to act as both a client and a server. When
tions, which we defined in earlier chapters requesting files from another user, the com-
as one in which client computers request puter behaves like a client. It switches to
Swarm
Your ISP in PA
Packet 1
ISP in
MN
Packet 2
Your computer
in Philadelphia
Packet 3
ISP in
NC
ISP
in ISP in
E-mail to your aunt OR
reconstructed by NJ
her computer
Packet 1
ISP in
FL
Packet 2
ISP in
Your aunt’s Your aunt’s TX
ISP in CA Figure 13.6
computer Packet 3
in San Diego Each packet can follow
its own route to its final
routes are clogged with traffic, police offi- The IP is like a postal worker who takes a destination. Sequential
cers are deployed in areas of congestion, letter (a packet of information) that was numbering of packets
ensures they are
directing drivers to alternate routes to mailed (created by the sending computer) reassembled in the
their destinations. and sends it on to another post office correct order at their
(router), which in turn routes it to the destination.
addressee (the receiving computer). The
TCP/IP postal worker never knows whether the
recipient actually receives the letter. The only
What protocol does the Internet use thing the postal worker knows is that the
for transmitting data? Although many letter was handed off to an appropriate
protocols are available on the Internet, the post office that will assist in completing
main suite of protocols used is TCP/IP. The the delivery of the letter.
suite is named after the original two proto-
cols that were developed for the Internet:
the Transmission Control Protocol (TCP) IP Addresses and
and the Internet Protocol (IP). Although
most people think that the TCP/IP suite
Domain Names
consists of only two protocols, it actually Each computer, server, or device (such as a
comprises many interrelated protocols router) connected to the Internet is required
(covered later in this chapter), the most to have a unique identification number.
important of which are listed in Figure 13.7. However, because humans are better at
Which particular protocol actually remembering and working with words
sends the information? The Internet than with numbers, the numeric IP
Protocol (IP) is responsible for sending the addresses were given more “human,”
information from one computer to another. word-based addresses.
STEP 1:
“Hello, Shigeru. Are you ready
for the figures?”
STEP 2:
“Let me grab a pencil.
Okay, I'm all set.”
STEP 1:
I want to send e-mail.
STEP 2:
Okay, I'm ready to receive.
STEP 3:
Here's the e-mail
message for Aunt Sally.
Your computer Your ISP’s server
Figure 13.10
(a) Colleagues in Hamburg and Tokyo establish communication using a three-way handshake. (b) Here, two
computers establish communication the same way.
These temporary IP addresses may or may dynamic addressing provides a more secure
not be the same from session to session. environment by keeping hackers out of com-
What are the benefits of dynamic puter systems. Imagine how hard it would
addressing? Although having a static be for burglars to find your home if you
address would seem to be convenient, changed your address every day!
Figure 13.11
Packet acknowledgment in action.
Your computer Your ISP’s Your ISP’s default Root server for
Web server DNS server .com domain
Figure 13.12
4. The root server provides the default File Transfer Protocol DNS servers in action.
DNS server with the appropriate IP
address of ABC.com. How does FTP work? The file transfer
protocol (FTP) enables users to share files
5. The default DNS server stores the cor- that reside on local computers with remote
rect IP address for ABC.com for future computers. If you’re attempting to down-
reference and returns it to your ISP’s load files to your local computer using FTP,
Web server. the FTP client application (most likely a Web
6. Your computer then routes its request browser) first establishes a TCP session
to ABC.com and stores the IP address with the remote computer. FTP provides for
in cache for later use. authentication and password protection, so
you may be required to log in to an FTP site
Your ISP or network administrator de-
with a username and password.
fines the default DNS server. If the default
Can you upload files with
DNS server does not have an entry for the
FTP? Most FTP sites allow you to upload
domain name you requested, then it queries
files. To do so, you either need a browser
another DNS server.
that handles FTP transfers (current versions
If all else fails, your ISP’s Web server will
of Internet Explorer and Firefox do), or you
contact one of the 13 root DNS servers
need to obtain an FTP client application.
maintained throughout the Internet. Each
Many FTP client programs are available as
root DNS server knows the location of all
freeware or shareware. Searching on the
the DNS servers that contain the master
term “FTP” on Download.com (download.
listings for an entire top-level domain.
com) will produce a list of programs from
Your default DNS server receives the infor-
which to choose. FileZilla (filezilla-project.
mation from the master DNS server (say,
org) is an open source FTP program that is
for the .com domain). It then stores that
available free of charge.
information in its cache for future use and
communicates the appropriate IP address to
your computer. Telnet
What is Telnet? Telnet is both a protocol
Other Protocols: for connecting to a remote computer and a
TCP/IP service that runs on a remote com-
FTP and Telnet puter to make it accessible to other comput-
The TCP/IP protocol suite contains ers. At colleges, students sometimes use
numerous protocols, although some of Telnet to connect to mainframe computers
them are used infrequently. Two of the or servers from their personal computers.
more commonly used protocols on the The Telnet client application, which runs on
Internet are the file transfer protocol your personal computer, connects to the
and Telnet. Telnet server application, which runs on a
Figure 13.13
This Telnet command
window shows available
commands.
TAC on
{ ar #E7 ”pic
CON butt 3px
spond to user input. /*
•su
bmi
t
ONT
{ F grou
: 1 -col
nd Figure 13.16).
or: url(
age
-im ft;
:
}
f orm back und l e id;
With JavaScript, though,
o
•sh
ad e
kg
bac -ali
t
tex H: 2
r
gn: ;
For example, a Web
X
00P 000
0
1px
sol
T #00
WID ER:
HTML/XHTML docu- BOR
D
page has an <H1> head- , ,s
asnasn-sse-
fr
rsie
; if
;
;f”
”g)i
);
annaa .rgimf.
rdda
ments can be made respon- ing tag, and all <H1>
1x3 p xarai
i
ra a
l
r
lro:
l,, v
: #
veer
#EE77E
E66E
(”
E5
p
”p
;;
5
ii
s/
cctt ss/
hsada
h efdoe
rfmo
T:3p urrll(
F:ON 1 -cloo
etf;t;
e xt a k ln }}
Keeping track of where you have been on the Internet can be quite a hacker places where you have financial resources (such as banks) and
challenge. Think about how many Web sites you visited today or when help direct them to Web sites where they can attempt to access your ac-
you were researching that paper for your history class last week. Can counts. Many people would feel that their privacy was severely violated if
you remember all the sites you visited? Probably not—most of us don’t their entire Web browsing history were seen by a stranger even if that
have total recall. person didn’t use that information in a malicious way.
Fortunately, tools built into browser software help us remember the So where does convenience stop and privacy start? This is one of the
sites we visit. For example, in Internet Explorer and Firefox, the history thorny ethical dilemmas that we face in today’s wired world. Having a
feature tracks all the sites visited over a period of time using the same browser history is extremely convenient when you can’t remember the
browser on the same computer. If you have a Google account and use name of a cool site you visited last week. But having a list of all the sites
the Google Toolbar (an add-on for the Internet Explorer and Firefox you visited could be downright embarrassing if your boss looked through
browsers), the Google Web History feature tracks your entire browsing them and found out you were surfing the “jobs available” section of a
history regardless of what computer you may be using (as long as you competitor’s Web site. Do you really want the next person to use the
are logged into your Google account and use the toolbar). But how computer in the lab at school to know what you were shopping for on the
private is your browsing history? Internet?
Most individuals in our society value privacy, which simply stated is Although users can erase browser histories and Google Web History,
the right to be left alone and unobserved to do as you please. But having this is not automatic and requires user intervention. The current ver-
your browsing habits recorded by the software you are using is tanta- sions of the popular browsers contain features called InPrivate Brows-
mount to having someone looking over your shoulder and watching ing (Internet Explorer) and Private Browsing (Firefox) that allow you to
exactly what you are doing. Did you browse to a site today that you surf the Web without the browser retaining your history. But again, you
wouldn’t want your parents, teacher, or boss to know about? If you must invoke these features to take advantage of them. Are you going to
haven’t cleared the history file in your browser, anyone could easily call remember to do so every time you need to keep your browsing private?
up the history in your browser and find out (see Figure 13.18)! Fortunately, Firefox allows you to make Private Browsing the default for
Google Web History is even more of a conundrum. Your entire brows- all your browsing sessions.
ing history is potentially contained in your Google file for all computers Should the makers of browser software and add-on tools be required
that you use (at home, school, and work). If you are browsing the Web at to remind users periodically to purge their browsing history? Should the
the local coffee shop and have not taken measures to secure your data surfing tools that enhance privacy be automatically invoked by default so
transmissions on your notebook, any hacker could potentially intercept people won’t forget to use them? Where does convenience end and
and gain access to your entire browsing history. This could reveal to a privacy begin? What do you think?
Figure 13.18
Nothing embarrassing in this Firefox Web history. But what’s lurking in your browser’s history?
Cheyenne’s ISP’s
e-mail server STEP 5: The next
(SMTP) time Cheyenne
checks her e-mail, unintended parties because
she gets your e-mail.
it’s sent in plain text. Addition-
ally, copies of your e-mail mes-
Cheyenne’s
computer
sages may exist (temporarily or
permanently) on numerous
This was fine in the early days of the servers as the messages make their way
Internet when most users were computer through the Internet. To protect your sensi-
scientists. However, when the Internet tive e-mail messages, encryption practices
started to become popular (in the early are used.
Figure 13.19
1990s), it became apparent that a simpler How do you encrypt e-mail?
A sample route an e-mail methodology was needed for sending and Encryption refers to the process of coding
takes on the Internet.
receiving files. The multipurpose Internet your e-mail so that only the person with
mail extensions (MIME) specification was the key to the code (the intended recipient)
introduced in 1991 to simplify attachments can decode (or decipher) and read the
to e-mail messages. All e-mail client soft- message. Secret codes for messages can
ware now uses this protocol to attach files. be traced almost to the dawn of written
E-mail is still sent as text, but the e-mail language. The military and government
client using the MIME protocol now han- espionage agencies are big users of codes
dles the encoding and decoding for the and ciphers. The trick is making the coding
users. For instance, in Yahoo! mail, on the system easy enough to use that everyone
Attach Files screen you merely browse to who needs to communicate with you can
the file you want to attach (located some- do so.
where on a storage device), select the file, There are two basic types of encryption:
and click the Attach Files button. The private key and public key. In private-key
Yahoo! e-mail client transparently encodes encryption, only the two parties involved in
and decodes the file for transmission
and receipt.
ACTIVE Keeping E-Mail
HELP- Secure
E-Mail Security: Encryption and DESK
Specialized Software
In this Active Helpdesk call, you’ll play the role of a
If e-mail is sent in regular text, can helpdesk staffer, fielding calls about how e-mail works
other people read my mail? E-mail and how messages are kept secure.
is highly susceptible to being read by
The Internet and the ways we use it are constantly evolving. In the Many businesses harness the power of their customers (and poten-
1990s, most home users connected to the Internet with a dial-up tial customers) by using the Internet to take advantage of a new tech-
modem. Fiber-optic technology, once available only for corporate and nique known as crowdsourcing. When you crowdsource, you take a
urban America, today reaches many homes in suburban and rural areas task that an employee or a contractor usually performs and instead out-
and provides lightning-fast Internet connections. But this wired technol- source that task to a large group of people, usually via the Internet. In
ogy does not address the growing demand for wireless connectivity that this way, you can have many individuals work on a task to take advan-
is accessible everywhere. Web 2.0 tools—such as social networking tage of aggregated brainpower. Or you can aggregate and analyze the
sites like Facebook and MySpace, blogs, wikis, and video sharing results of feedback from the crowdsourcers to make informed business
sites like YouTube—are changing the way individuals and businesses decisions. Two companies that exemplify the crowdsourcing model of
use the Internet. Let’s look at a few emerging trends in both of these customer-driven merchandise buying are Threadless.com and
areas. ModCloth.com.
Threadless is a T-shirt company, but what makes Threadless stand
WiMAX—Spreading the Signal Far and Wide out from the hundreds of other T-shirt companies on the Web is that they
Because of the rise in portable computing devices, people want Internet invite artists and designers to submit designs for T-shirts as part of an
access wherever they go. A wireless alternative to standard WiFi connec- ongoing contest. Threadless posts submitted designs on the site and
tions is WiMAX (short for worldwide interoperability for microwave ac- then lets anyone who visits the site vote on the best designs. The
cess). Instead of the 300 feet of connectivity that WiFi offers, WiMAX has a designs with the most votes get made into shirts and offered for
range of as far as 31 miles, and its transmission speed can run up to 72 sale (see Figure 13.21), and the designers of shirts that get printed win a
Mbps, making it much faster than current cable or DSL connections. The
WiMAX Forum, a nonprofit group consisting mainly of WiMAX providers
and component suppliers, reports there are more than
550 WiMAX networks deployed in 147 countries, and now
providers such as Clear are deploying WiMAX networks in
large cities throughout the United States. Clear offers mo-
bile access over a large area, freeing you from needing to
find a hot spot to connect. Your next provider of Internet
services may well be a company that offers WiMAX wire-
less connectivity.
Post it on
Facebook for
your friends
Make comments
or suggestions
Figure 13.22
Customers vote and comment on products that ModCloth.com is thinking about stocking.
cash prize of $2,500. Because potential customers have already indicated about the items, which range from humorous to constructive. ModCloth
their interest in a particular design by voting on it, Threadless can be fairly also provides links so that voters can easily share items with their friends
confident that the designs they print will sell briskly. on social networks like Facebook and Twitter. Constructive ideas from
ModCloth is a company founded in 2002 by two high-school students potential customers can be sent back to designers who might make sug-
who were just 17 years old! They started selling only vintage clothing but gested alterations to items before ModCloth orders them. When ModCloth
then expanded to offer vintage-inspired designs by Indie designers. When orders a popular item, customers who indicated they liked it can be con-
ordering clothing from designers, there is usually a minimum order quan- tacted via e-mail to stimulate sales.
tity that often exceeds 100 pieces. Although the buyers for ModCloth feel So don’t let all those customers that have friended you on your com-
they have a good eye for what their customers like, it is still risky for a pany’s Facebook page sit idle. Put them to work helping you make your
small business to order large quantities of items because they may take a business more profitable! And thanks to WiMAX, you soon should be able
long time to sell. to communicate with your customers from wherever you happen to be
ModCloth started its Be the Buyer program to involve customers in the standing.
buying process. They post clothing they are considering buying on the Look for these and other Internet-related trends coming soon to com-
ModCloth site, and then customers vote to either “Pick It” (stock the item) puters near you.
or “Skip It,” as shown in Figure 13.22. Customers can post comments
Your buddy’s
computer running the
same instant messaging
client software
for chatting
2. Dial the number of your friend’s phone. 2. Dial the number of your friend’s phone. The tones are converted into
digital data.
3. The call is routed through the switch at your local carrier, passing 3. As long as the phone number is in a valid format, your VoIP company
through several switches along the way. will translate the phone number into an IP address and then connects
to the receiving device.
4. The phone at the other end rings, and your friend answers the call. 4. The signal “asks” the receiving device to ring, and your friend answers
the call.
5. When the call is answered, a circuit is opened. 5. When your friend picks up the phone, each computer knows to expect
packets of data from the other computer.
6. As you talk, the circuit remains open. No other data can be 6. As you talk, the packets of data are sent over the same Internet
transmitted over the phone line during this time. A busy signal infrastructure as e-mail or a Web page. The digital data is translated
occurs if someone else tries to call. into analog audio signals so that you and your friend can understand
each other.
7. When you hang up, the circuit is closed, enabling another call to 7. When you hang up, the session is terminated.
come in.
Figure 13.25
Jamglue uses Amazon.com’s cloud computing services to process music mixes for its users.
1. Who owns, manages, and pays for the 4. Why are IP addresses and domain
Internet? names important for Internet
Management of the Internet is carried out communications?
summary
chapter
locking users into standard tags and formats for the recipients of the e-mail you send.
for data, XML enables users to create their Encryption software, such as Pretty Good
own markup languages to accommodate Privacy (PGP), is used to code messages so
summary
particular data formats and needs. XML is that they can be decoded only by the
used extensively in e-commerce for ex- authorized recipients.
changing data between corporations.
8. How do businesses use the Internet
7. How do e-mail, instant messaging, to reduce computing costs?
and Voice over Internet Protocol Many businesses are taking advantage of
work, and how is information using cloud computing to reduce costs. Cloud com-
these technologies kept secure? puting refers to business services provided
Simple mail transfer protocol (SMTP) is the online by other companies and delivered to
protocol responsible for sending e-mail over a customer through the Internet. These
the Internet. As is true of most other Internet services were formerly delivered locally by
applications, e-mail is a client/server appli- company-owned IT departments. A
cation. E-mail passes through e-mail servers company might use Amazon.com’s cloud
whose functions are to store, process, and computing servers, for example, to store
send e-mail to its ultimate destination. ISPs their data instead of purchasing and
and portals such as Yahoo! maintain e-mail installing their own servers. Cloud
servers to provide e-mail functionality to computing initiatives, while cost effective,
their customers. Your ISP’s e-mail server generate data security concerns because a
uses DNS servers to locate the IP addresses third party is managing sensitive data.
637
thirteen
thirteen key terms
chapter
chapter
Word Bank
• affective computing • HTTP • point of presence
• AJAX • ICANN • public-key encryption
buzzwords
• applet • Internet backbone • SMTP
• circuit switching • IP address • SSL
• DNS server • OC line • TCP/IP
• FTP • packet switching
• HTML tags • PGP
Instructions: Fill in the blanks using the words from the Word Bank above.
As a network administrator, Patricia knows that she can count on the organization
(1) __________ to ensure that she has an appropriate range of IP addresses for her work site.
Her high-speed connection to her company’s ISP was vital to providing the connectivity her
employees need to get their jobs done. Recently, the company moved up from a DSL connec-
tion to a(n) (2) __________ because of the high volume of Internet traffic it was generating.
Patricia hopes the government will continue to fund projects to continue research to improve
the Internet (3) __________, the main highway to the Internet, and other vital technologies.
But Patricia has indulged in enough daydreaming. It is time to ensure that the Internet
connection to the bank of modems, or (4) __________, provided by the ISP her company is
using is fully functional before the majority of the employees arrive for work. Because
Patricia’s company sends a tremendous amount of e-mail, old-fashioned (5) __________
technology would never have sufficed for sending messages. Fortunately, the Internet employs
(6) __________ to enable messages to be sent over widely varying routes. Of course, she knows
that the main suite of protocols that controls Internet data traffic is called (7) __________.
After ensuring that all is functional, Patricia begins to assist the Web development team with
Web page creation. To provide robust interaction with company databases, (8) __________ is
being used to code Web pages for the corporate Web site instead of HTML, which requires de-
velopers to use a standard set of (9) _________. Unsure of her instructions, she e-mails the direc-
tor of Web development for clarification, knowing that the (10) __________ protocol will ensure
that the e-mail is delivered to the director at the company’s office in the United Kingdom.
Requiring secure communications, she encrypts the e-mail using a(n) (11) __________
algorithm, knowing that the director can retrieve Patricia’s key from her personal Web site.
computer
After reading the director’s response to her e-mail, she quickly writes a Java (12) __________
to produce an interactive form to collect customer information. Using the (13) __________
protocol, Patricia posts her Web page to the corporate site. Of course, users will view the
Web page using the (14) __________ protocol. Because the Web page contains potentially
sensitive information, Patricia makes sure to use the (15) __________ protocol to provide
literate
added security for the data.
becoming
becoming
computer literate
While attending college, you are working at Shoe Station, a small retailer of children’s and
women’s footwear. The owner has charged your supervisor with establishing a Web presence
for the company by developing a company Web site and establishing online communications
with international suppliers. Your supervisor has asked you to help draft a memo to the CEO
that sets forth the technologies the company should deploy to create an Internet presence.
Instructions: Draft a memo for your boss that details the benefits of connecting the
company to the Internet. Make sure to suggest which types of Internet connections will be
appropriate and which type of ISP will be needed. Use as many of the keywords from the
chapter as you can, and ensure that the report will be understandable by managers who
may be unfamiliar with computers or the Internet.
639
thirteen
thirteen self-test
chapter
Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.
Multiple Choice
self-test
True–False
_____ 1. The costs associated with running the Internet are paid primarily through ISPs
collecting fees from customers and from funding by U.S. government agencies.
_____ 2. VoIP uses packet switching technology.
_____ 3. A computer needs the XML address to locate a Web page accurately.
_____ 4. The main suite of protocols used on the Internet is TCP/FTP.
_____ 5. Instant messages are generally secure because most instant-messaging software
provides for encryption of messages.
chapter
transition to...
next semester
1. Creating a Web Site
transition to...
As president of your school’s Phi Beta Lambda (PBL) club, you would like to build a
mailing list for your quarterly newsletter. You also would like to ensure that the
newsletter is available on the college’s Web site. When you visit the college Web
next semester
making the
developer, she asks you the following questions:
a. What data will you require all online subscribers to provide?
b. What optional data would you like subscribers to provide?
c. Will an e-mail address be provided to potential subscribers if they wish to make
inquiries? If so, who will be reviewing and responding to these e-mails? How
quickly will you be answering these e-mails?
2. Creating a Wiki Site: Issue 1
Your sociology instructor has asked your group to design a wiki site about preventing
identity theft. The site will include textual and graphic information about identity theft
as well as an interactive quiz. The wiki will be open for anyone to edit (just like
Wikipedia), and it is hoped that other students will contribute to the site. The following
issues need to be addressed:
a. Which wiki hosting service will you use to host the site? Why do you think this is
appropriate?
b. What name would you choose for the site? What URL would you choose for the site?
c. How would you publicize the site so that other students at your school can find it?
d. Who will be responsible for monitoring and editing the site? What types of content
would you remove from the site?
3. Creating a Wiki Site: Issue 2
You have been asked to assist your psychology professor in creating a wiki for her stu-
dents. The wiki will be used by the students to develop an online study guide for the
Introduction to Psychology class. Investigate the following two options and explain
which option you will recommend and why:
a. Most schools provide course management software (CMS) such as Blackboard or
Moodle to facilitate communication between faculty and students. Most CMS sys-
tems have the ability to host wikis. What CMS software does your school use? Is the
wiki feature available? How much storage space is provided for wiki pages? Can
the wiki be rolled over to the next semester so future classes can work on it?
b. Many sites host wikis free of charge, including PBworks (pbworks.com), Wikidot
(wikidot.com), and Wikispaces (wikispaces.com). Investigate at least two free wiki
services and compare their features. Include the following items and any other
features that would be useful to your professor:
• Limitations on number of users that can participate in a single wiki
• Amount of disk storage space
• Restrictions on file uploads, including file size and number of files
• Membership restrictions (e.g., can the wiki be private or editable only by members?)
• Notification features (e.g., can members be notified of updates by e-mail or RSS feed?)
4. Securing Your E-mail Communications
You have a brilliant idea for a new business and will begin developing it with several
friends next semester. To help ensure no one steals your idea before you launch the
business, you decide that encrypting your e-mail communications related to the busi-
ness would be a good idea. Investigate the free secure e-mail products Hushmail
(hushmail.com), S-Mail secure email (s-mail.com), and Comodo SecureEmail
(comodo.com). Prepare a report for your friends that compares the features of these
e-mail products and justifies the decision to use the e-mail package you chose.
641
thirteen
thirteen making the
chapter
transition to...
1. Web Site Privacy Issues the workplace
Your employer, a distributor of high-end stereo equipment, recently discovered that an
the workplace
employee was using his Facebook account to post disparaging remarks about the com-
pany president. The employee was fired and has now lodged a wrongful discharge
making the
lawsuit against your employer. You don’t feel comfortable with the way this employee
was treated, and you are wondering if your employer’s firing of the employee was
transition to...
legal. Investigate the following and prepare a narrative for your instructor:
a. Is the state in which you go to school an “employment-at-will” state? If so, generally
an employee can be fired for almost any reason at any time as long as the firing does
not violate another employment law (such as the Civil Rights Act). Should an
employer have the right to fire a person for expressing an opinion about his or her
boss or company on a social networking site?
b. Have employers been successful in terminating employees for making disparaging
comments on social networking sites, wikis, and blogs? Research the case of Ellen
Simonetti, whose firing over her blog posts is one of the most famous cases in this
area. In your opinion, was Ms. Simonetti treated fairly? What kind of policy should
an employer have to warn employees about the potential consequences of their
actions on social networking sites?
c. If you were running a small business and you found out that one of your
employees was disparaging you or the business on a public Web site, what
would you do about it?
3. “Googling”
At your company, someone was just fired because sensitive information related to a
company product was associated with the person’s name on the Internet. Discretion
being the better part of valor, you decide to do a search for your name on the Web
using a search engine such as Google (google.com) just to see what is out there. Prepare
a report on what you found. Your report should answer the following questions:
a. Did you find any accurate information about yourself (such as your home page URL
or résumé)? Did you find any erroneous information that you need to correct?
b. Did you find Web sites or information about other people with the same name as
you? Could any of that information be damaging to your reputation if someone
thought the other person was you? If so, provide examples.
c. Is there information that you found about yourself or others that you think should
never be available on the Internet? Provide examples and an explanation of why
you feel certain information should not be available.
d. Is there any information on social networking sites, such as MySpace
(myspace.com) or Facebook (facebook.com), that could be damaging to you if an
employer or school administrator were to see it?
chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Domain Names
Domain names often spark fierce controversy between competing companies. Legal
wrangling over the rights to attractive names such as Buynow.com and Lowprices.com
can generate large fees for attorneys. Meanwhile, some famous individuals such as
Julia Roberts have had to fight for the right to own domains based on their own names.
a. Should everyone be entitled to a Web site in a certain domain (say, .com) that con-
tains their own name? How would you handle disputes by people who have the
exact same name (say, two people named John Smith)?
b. Cybersquatting is registering a domain name (say, Coke.net) just for the purpose
of selling it to the organization that may benefit from it the most (in this case, the
Coca-Cola Company). Is cybersquatting ethical? Why or why not? Is cybersquatting
legal in the United States?
c. Typosquatting is related to cybersquatting. People often register domain names that
they think are common misspellings of well known Web sites (such as gooogle.com
or googgle.com). They then place Web pages at these addresses with clickable ad-
vertisements on them so they can potentially earn revenue when people mistype
URLs into their browsers. Is typosquatting legal in the United States? Is typosquat-
ting ethical? Why or why not?
3. Encryption of E-mail
a. Do you currently encrypt your personal e-mail? Why or why not? If you are sending
business-related e-mail, do you think you should use encrypted e-mail? Explain
your answers.
b. Do you think your school should provide encrypted e-mail for student use? If a
problem arises, such as a student accusing another student of sexual harassment,
do you think the software used for encryption should have code that enables school
administrators able to break the encryption? Explain your answers.
c. Should all U.S. government agencies be required to use encrypted e-mail? What
agencies should be required to use encrypted e-mail? Are there agencies that would
never need to use encrypted e-mail? Explain your answers.
643
thirteen
thirteen team time
chapter
Problem
team time
In today’s fast-paced business environment, establishing a Web presence for a new business
is critical. Having a Web site that is designed around the needs of customers is essential if a
business is to compete in the 21st century. In this Team Time, you’ll research Web hosting
options and providers for a start-up company.
Task
Your group has just received a request from a friend who is starting a new apparel com-
pany called Trendz. It will sell clothing designed by young, urban artists and will target
active young adults who are skateboarders and snowboarders. Your friend wants to sell
the clothing over the Internet and needs your group’s advice as to where to deploy a
Web site and what features to offer.
Process
Break the class into small teams of three or four students. Each team should prepare a
report as follows:
1. Determine an appropriate domain name for the Trendz Web site. Make sure that the
Web address you propose is available by using a Whois service such as whois.net.
2. Select a company that can cost effectively register the domain name you have chosen
and host the Web site. Investigate companies such as Network Solutions, 1and1.com,
Go Daddy, Tucows, and Yahoo!. You might also want to consider free hosting solutions
from Google or Microsoft Office Live.
3. Investigate options such as PayPal, Google Checkout, Authorize.net, or Cyber Source
and determine a provider for collecting payments from customers. Make sure to
consider fixed monthly fees charged as well as per transaction fees.
4. Determine what shopping cart software will be necessary to manage customer orders.
Volusion, Fortune 3, CS-Cart, and Early Impact are examples of companies that offer
possible solutions.
5. Develop a PowerPoint presentation to summarize your findings and present your
proposed solution to the class.
Conclusion
E-commerce Web sites are relatively easy to deploy using the vast array of tools available
on the Internet today. Substantial growth of new small businesses is expected in the United
States over the next several decades. Therefore, you may soon be in a position where you
will need to set up an e-commerce solution for friends, family, or an employer.
chapter
project
Ethics Project
project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an
ethical solution.
Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which a school district has
been monitoring students without their knowledge and has potentially violated their
privacy.
2. Team members should write a summary that provides background information for
their character—for example: student or parent, school official, and arbitrator—and
details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the chat room feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.
Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.
645
This page intentionally left blank
eighth
EDITION
EIGHTH
Glossary
8
3D sound card An expansion card that en- affective computing A type of computing presentations, editing photos, taking an on-
ables a computer to produce sounds that that relates to emotion or deliberately tries line course, and playing games.
are omnidirectional or three dimensional. to influence emotion.
artificial intelligence (AI) The science that
802.11 standard A wireless standard aggregator A software program that goes attempts to produce computers that display
established in 1997 by the Institute of out and grabs the latest update of Web ma- the same type of reasoning and intelligence
Electrical and Electronics Engineers; also terial (usually podcasts) according to your that humans do.
known as WiFi (short for Wireless Fidelity), specifications.
aspect ratio The width-to-height propor-
it enables wireless network devices to
aircard A device that enables users to have tion of a monitor.
work seamlessly with other networks and
devices. wireless Internet access with mobile devices
assembly language A language that
such as PDAs and notebooks.
enables programmers to write their pro-
A AJAX A collection of technologies that
allows the creation of Web applications that
grams using a set of short, English-like
commands that speak directly to the
access card reader A device that reads can update information on a page without central processing unit (CPU) and give
information from a magnetic strip on the requiring the user to do a page refresh or the programmer very direct control of
back of a credit card–like access card (such as leave the page. hardware resources.
a student ID card); card readers are easily audio editing software Programs that per-
algorithm A set of specific, sequential steps
programmed by adding authorized ID card form basic editing tasks on audio files such
that describe in natural language exactly
numbers, Social Security numbers, and so on. as cutting dead air space from the
what a computer program must do to com-
access method A program or hardware plete its task. beginning or end of a song or cutting a
mechanism that controls which computer is portion from the middle.
all-in-one computer A desktop system unit
allowed to use the transmission media in a authentication The process of
that houses the computer’s processor, mem-
network at a certain time. identifying a computer user, based on a
ory, and monitor in a single unit.
access time The time it takes a storage login or username and password. The
all-in-one printer See multifunction printer. computer system determines whether
device to locate its stored data.
the computer user is authorized and what
alphabetic check Confirms that only
accounting software An application level of access is to be granted on the
textual characters are entered in a database
program that helps business owners network.
field.
manage their finances more efficiently by
providing tools for tracking accounting authentication server A server that keeps
analog Waves that illustrate the loudness
transactions such as sales, accounts receiv- track of who is logging on to the network
of a sound or the brightness of the colors in
able, inventory purchases, and accounts and which services on the network are
an image at a given moment in time.
payable. available to each user.
analog-to-digital converter chip Converts
ActionScript A programming language in- analog signals into digital signals.
cluded in Flash; similar to JavaScript in its
keywords, operators, and classes. antivirus software Software that is specifi- B
cally designed to detect viruses and protect
Active Server Pages (ASP) A scripting backdoor program A program that enables
a computer and files from harm.
environment in which users combine a hacker to take complete control of a com-
HyperText Markup Language (HTML), applet A small program designed to be run puter without the legitimate user’s knowl-
scripts, and reusable Microsoft ActiveX from within another application. Java ap- edge or permission.
server components to create dynamically plets are often run on your computer by
backup A backup is a copy of computer
generated Web pages. your browser through the Java Virtual
files that you can use to replace the origi-
Machine (an application built into current
active topology A network topology in nals if they are lost or damaged.
browsers).
which each node on the network is respon-
Backup and Restore utility A Windows
sible for retransmitting the token, or the application programming interface (API)
utility (found in the Control Panel) that
data, to other nodes. A block of code in the operating system
allows the user to create a duplicate copy of
that software applications need to interact
Adobe Flash A software product for all the data on a hard drive (or just the fold-
with.
developing Web-based multimedia. ers and files the user specifies) and copy it
application server A server that acts as a to another storage device, such as a DVD or
adware A program that downloads on external hard drive.
repository for application software.
your computer when you install a freeware
program, game, or utility. Generally, application software The set of programs backward compatibility The accommoda-
adware enables sponsored advertisements on a computer that helps a user carry out tion of current devices being able to use
to appear in a section of your browser tasks such as word processing, sending previously issued software standards in ad-
window or as a pop-up ad box. e-mail, balancing a budget, creating dition to the current standards.
647
eighth
EDITION
EIGHTH
8
bandwidth (data transfer rate) The maxi- bit depth The number of bits a video card bridge A network device that is used to
mum speed at which data can be transmit- uses to store data about each pixel on the send data between two different local area
ted between two nodes on a network; monitor. networks (LANs) or two segments of the
usually measured in megabits per second same LAN.
black-hat hacker A hacker who uses his
(Mbps). See also data transfer rate.
knowledge to destroy information or for brightness A measure of the greatest
base class The original object class from illegal gain. amount of light showing when a monitor is
which other classes derive. displaying pure white; measured as cande-
bloatware The pre-installed software (often
las per square meter (cd/m2) or nits.
base transceiver station A large communi- trial versions) on a new computer.
cations tower with antennas, amplifiers, broadband A high-speed Internet connec-
and receivers/transmitters. BLOB See binary large object.
tion such as cable, satellite, or digital sub-
blog See Web log. scriber line (DSL).
basic input/output system (BIOS) A pro-
gram that manages the data between a Blu-ray disc A method of optical storage browser See Web browser.
computer’s operating system and all the for digital data, developed for storing high-
input and output devices attached to browsing (1) The process of viewing
definition media. It has the largest storage
the computer; also responsible for loading database records. (2) The process of
capacity of all optical storage options.
the operating system (OS) from its perma- “surfing” the Web.
nent location on the hard drive to random Bluetooth technology A type of wireless
brute force attack An attack delivered by
access memory (RAM). technology that uses radio waves to trans-
specialized hacking software that tries
mit data over short distances (approxi-
bastion host A heavily secured server lo- many combinations of letters, numbers, and
mately 30 feet for Bluetooth 1 and 60 feet
cated on a special perimeter network be- pieces of a user ID in an attempt to discover
for Bluetooth 2). Often used to connect pe-
tween a company’s secure internal network a user password.
ripherals such as printers and keyboards to
and its firewall. computers or headsets to cell phones. bus (linear bus) topology A system of
batch processing The process of accumu- networking connections in which all
bomb software Software that destroys data
lating transaction data until a certain point devices are connected to a central cable
on a computing device if someone continu-
is reached, then processing those transac- called the bus (or backbone).
ally tries to access information by guessing
tions all at once. the password. business-to-business (B2B) E-commerce
BD-ROM disc BD-ROM is defined as transactions between businesses.
bookmark A feature in some browsers that
BluRay Disc Read Only Memory. BD-ROM places a marker of a Web site’s Uniform Re- business-to-consumer (B2C) E-commerce
is an optical disc storage media format for source Locator (URL) in an easily retriev- transactions between businesses and
high-definition video and data storage. able list. (Bookmarks are called Favorites in consumers.
benchmark A measurement used in Microsoft Internet Explorer.)
byte Eight binary digits (bits).
comparing software and hardware per-
Boolean operator A word used to refine
formance. Benchmarks are created using
logical searches. For Internet searches,
software applications that are specifically
designed to push the limits of computer
the words AND, NOT, and OR describe the
relationships between keywords in the
C
performance.
search.
C The predecessor language of C⫹⫹;
binary decision A decision point that can developed originally for system program-
boot process The process for loading the
be answered in one of only two ways: yes mers by Brian Kernighan and Dennis
operating system (OS) into random access
(true) or no (false). Ritchie of AT&T Bell Laboratories in 1978.
memory (RAM) when the computer is
binary digit (bit) A digit that corresponds to turned on. It provides higher-level programming
the on and off states of a computer’s switches. language features (such as if statements
boot-sector virus A virus that replicates and for loops) but still allows programmers
A bit contains a value of either 0 or 1.
itself into the master boot record of a flash to manipulate the system memory and
binary language The language computers drive or hard drive. central processing unit (CPU) registers
use to process data into information, con- directly.
sisting of only the values 0 and 1. botnet A large group of software applica-
tions (called robots or bots) that runs without C# A programming language released
binary large object (BLOB) In databases, a user intervention on a large number of by Microsoft to compete with Java.
type of object that holds extremely large computers. Pronounced see sharp.
chunks of data in binary form; this data is
usually video clips, pictures, or audio clips. breadcrumb list A list that shows the Cⴙⴙ The successor language to C. Devel-
hierarchy of previously viewed Web pages oped by Bjarne Stroustrup, C⫹⫹ uses all of
biometric authentication device A device within the Web site that you are currently the same symbols and keywords as C but
that uses some unique characteristic of visiting. Shown at the top of some Web extends the language with additional key-
human biology to identify authorized users. pages, it aids Web site navigation. words, better security, and more support for
EDITION
EIGHTH
8
the reuse of existing code through object- circuit switching A method of communica- amount of audio and video information
oriented design. tion in which a dedicated connection is into less space.
formed between two points (such as two
cable A type of broadband Internet connec- code editing The step in which program-
people on telephones) and the connection
tion that uses a television’s cable service mers actually type code into the
remains active for the duration of the
provider to connect to the Internet. computer.
transmission.
cache memory Small blocks of memory, lo- coding The process of translating an algo-
class A collection of descriptive variables
cated directly on and next to the central rithm into a programming language.
and active functions that together define a
processing unit (CPU) chip, that act as
set of common properties. Actual examples cold boot The process of starting a com-
holding places for recently or frequently
of the class are known as objects. puter from a powered-down or off state.
used instructions or data that the CPU
accesses the most. When these instructions classless interdomain routing (CIDR) Pro- command-driven interface Interface be-
or data are stored in cache memory, the nounced “cider,” this is an addressing tween user and computer in which the user
CPU can more quickly retrieve them than scheme that allows a single IP address to enters commands to communicate with the
if it had to access the instructions or data represent several unique IP addresses by computer system.
from random access memory (RAM). adding a network prefix (a slash and a
number) to the end of the last octet; also comment (remark) A plain English
cascading style sheets (CSS) A list of state- notation inserted into program code for
known as supernetting.
ments (also known as rules) that define in documentation. The comment is not ever
one single location how HTML/XHTML el- clickstream data Information captured seen by the compiler.
ements are to be displayed. about each click that users make as they
commerce server A computer that hosts
navigate a Web site.
Cat 6 cable A UTP cable type that provides software that enables consumers to pur-
more than 1 GB of throughput. client A computer that requests informa- chase goods and services over the Web.
tion from a server in a client/server net- These servers generally use special security
cellular phone (cell phone) A telephone
work (such as your computer when you are protocols to protect sensitive information
that operates over a wireless network. Cell
connected to the Internet). (such as credit card numbers) from being
phones can also offer Internet access, text
intercepted.
messaging, personal information manage- client/server model A way of describing
ment (PIM) features, and more. typical network functions. Client computers Common Gateway Interface (CGI)
(such as your desktop PC) request services, Provides a methodology by which a
central processing unit (CPU or and servers provide (“serve up”) those browser can request that a program file be
processor) The part of the system unit of services to the clients. executed (or run) instead of just being de-
a computer that is responsible for data livered to the browser.
processing (the “brains” of the computer); client/server network A network, consist-
it is the largest and most important chip in ing of client and server computers, in which communications server A server that
the computer. The CPU controls all the the clients make requests of the server and handles all communications between the
functions performed by the computer’s the server returns the response. network and other networks, including
other components and processes all the managing Internet connectivity.
client/server network (server-based net-
commands issued to it by software
work) A type of network that uses servers compact disc (CD) A method of optical
instructions.
to deliver services to computers that are re- storage for digital data; originally devel-
centralized A type of network design in questing them (clients). oped for storing digital audio.
which users are not responsible for creating compilation The process by which code is
client-side program A computer program
their own data backups or providing secu- converted into machine language, or the
that runs on the client computer and re-
rity for their computers; instead, those tasks language the central processing unit (CPU)
quires no interaction with a Web server.
are handled by a centralized server, soft- can understand.
ware, and a system administrator. clock speed The steady and constant pace
at which a computer goes through machine compiler The program that understands
CGI script A computer program that con- both the syntax of the programming lan-
cycles, measured in hertz (Hz).
forms to the Common Gateway Interface guage and the exact structure of the central
(CGI) specification, which provides a cloud computing The process of using the processing unit (CPU) and its machine lan-
method for sending data between end users Internet to deliver business, entertainment, guage. It can “read” the source code and
(browser users) and Web servers. or other services that were previously deliv- translate the source code directly into ma-
ered by conventional means. chine language.
cgi-bin A directory where Common Gate-
way Interface (CGI) scripts are normally coaxial cable A single copper wire sur- completeness check A process that ensures
placed. rounded by layers of plastic insulation and that all database fields defined as
sheathing; used mainly in cable television “required” have data entered into them.
chat room An area on the Web where peo- and cable Internet service.
ple come together to communicate online. computational field (computed field) A
The conversations are in real time and are codec A rule, implemented in either soft- numeric field in a database that is filled as
visible to everyone in the chat room. ware or hardware, which squeezes a given the result of a computation.
Glossary 649
eighth
EDITION
EIGHTH
8
computer A data-processing device that cookie A small text file that some Web sites
gathers, processes, outputs, and stores data automatically store on a client computer’s
D
and information. hard drive when a user visits the site.
data Numbers, words, pictures, or
computer forensics The application of copyleft A simplified licensing scheme that sounds that represent facts, figures, or
computer systems and techniques to enables copyright holders to grant certain ideas.
gather potential legal evidence; a law rights to a work while retaining other rights.
data centralization Having all data in one
enforcement specialty used to fight
core A complete processing section from a central location (usually a database). Data
high-tech crime.
CPU, embedded into one physical chip. centralization helps ensure data integrity by
computer literate Being familiar enough requiring data to be updated only in one
course management software A program place if the data changes.
with computers that you understand their
that provides traditional classroom tools,
capabilities and limitations and know how
such as calendars and grade books, data collision When two computers send
to use them.
over the Internet, as well as areas for stu- data at the same time and the sets of data
computer protocol A set of rules for dents to exchange ideas and information collide somewhere in the media.
accomplishing electronic information in chat rooms, discussion forums, and
data dictionary (database schema) A file
exchange. If the Internet is the information e-mail.
that defines the name, data type, and length
superhighway, then protocols are the driv-
CPU usage The percentage of time a of each field in the database.
ing rules.
central processing unit (CPU) is working.
data file File that contains stored data.
computer-aided design (CAD) A 3D mod-
crowdsourcing The process of taking a task
eling program used to create automated de- data-flow diagram A design that traces all
that an employee or a contractor usually
signs, technical drawings, and model data in an information system from the
performs (such as product design) and in-
visualizations. point at which data enters the system to its
stead outsourcing that task to a large group
final destination (storage or output).
connectionless protocol A protocol that a of people, usually via the Internet.
host computer can use to send data over data inconsistency Any difference in data
CSMA/CD A method of data collision in lists caused when data exists in multiple
the network without establishing a direct
detection in which a node connected to the lists and not all lists are updated when a
connection with any specific recipient
network listens (that is, has carrier sense) piece of data changes.
computer.
to determine that no other nodes are cur-
connection-oriented protocol A protocol rently transmitting data signals; short for data integrity The process of ensuring that
that requires two computers to exchange Carrier Sense Multiple Access with data contained in a database is accurate and
control packets, which set up the parame- Collision Detection. reliable.
ters of the data exchange session, before data mart Small slices of a data warehouse.
cursor control key A set of controls on
sending packets that contain data.
standard keyboards that moves the cursor data plan A connectivity plan or text mes-
connectivity port A port that enables the (the flashing symbol on the monitor that in- saging plan in which data charges are sepa-
computer (or other device) to be connected dicates where the next character will be in- rate from cell phone calling charges and are
to other devices or systems such as net- serted); also known as an arrow key. provided at rates different from those for
works, modems, and the Internet. voice calls.
custom installation The process of in-
consistency check The process of compar- stalling only those features of a software data redundancy When the same data
ing the value of data in a database field program that a user wants on the hard exists in more than one place in a database.
against established parameters to determine drive.
data staging A three-step process: extract-
whether the value is reasonable. customer relationship management (CRM) ing data from source databases, transform-
consumer-to-consumer (C2C) E-commerce software A business program used for stor- ing (reformatting) the data, and storing the
transactions between consumers through ing sales and client contact information in data in a data warehouse.
online sites such as eBay.com. one central database.
data transfer rate (bandwidth) The maxi-
contrast ratio A measure of the difference in cybercrime Any criminal action perpe- mum speed at which data can be transmitted
light intensity between the brightest white trated primarily through the use of a between two nodes on a network; usually
and the darkest black colors that a monitor computer. measured in megabits per second (Mbps).
can produce. If the contrast ratio is too low, cybercriminal An individual who uses data type (field type) An attribute of a data
colors tend to fade when the brightness is computers, networks, and the Internet to field that determines what type of data can
adjusted to a high or low setting. perpetrate crime. be stored in the database field or memory
location.
control structure The general term used for cyberloafing Doing anything with a
keywords in a programming language that computer that is unrelated to a job (such data warehouse A large-scale electronic
allow the programmer to control, or redi- as playing video games), while one is repository of data that contains and organ-
rect, the flow of the program based on a de- supposed to be working. Also called izes in one place all the data related to an
cision. cyberslacking. organization.
EDITION
EIGHTH
8
database A collection of related data that denial of service (DoS) attack An attack and knowledge computers and the Internet
can be easily stored, sorted, organized, and that occurs when legitimate users are de- offer and those who do not.
queried. nied access to a computer system because a
hacker is repeatedly making requests of that digital home A home that has a com-
database administrator (database puter(s) and other digital devices that are
computer system that tie up its resources
designer) An individual trained in the all connected to a home network.
and deny legitimate users access.
design, construction, and maintenance of
databases. derivative work Intellectual property that digital signal processor A specialized chip
is based on an original work but is modified that processes digital information and
database designer See database administrator. transmits signals very quickly.
in some way.
database management system (DBMS) digital subscriber line (DSL) A type of
derived class A class created based on a
A type of specially designed application connection that uses telephone lines to con-
previously existing class (i.e., a base class).
software (such as Oracle or Microsoft Ac- nect to the Internet and that allows both
Derived classes inherit all of the member
cess) that interacts with the user, other ap- phone and data transmissions to share the
variables and methods of the base class
plications, and the database to capture and same line.
from which they are derived.
analyze data.
desktop As its name implies, the com- digital video disc (DVD) A method of op-
database query An inquiry the user poses tical storage for digital data that has greater
puter’s desktop puts at your fingertips all
to a database to extract a meaningful subset storage capacity than compact discs.
of the elements necessary for a productive
of data.
work session and that are typically found digital video editing software A program
database server A server that provides on or near the top of a traditional desk, for editing digital video.
client computers with access to information such as files and folders.
stored in a database. digital video interface (DVI) Video inter-
desktop computer A computer that is face technology that newer LCD monitors,
database software An electronic filing sys- intended for use at a single location. A as well as other multimedia devices such as
tem best used for larger and more compli- desktop computer consists of a case that televisions, DVD players, and projectors,
cated groups of data that require more than houses the main components of the com- use to connect to a PC.
one table and the ability to group, sort, and puter, plus peripheral devices.
retrieve data and generate reports. directory A hierarchical structure that
desktop publishing (DTP) software
include files, folders, and drives used to
date field A field in a database that holds Programs for incorporating and arranging
create a more organized and efficient
date data such as birthdays, due dates, and graphics and text to produce creative
computer.
so on. documents.
Disk Cleanup A Windows utility that
debugger A tool that helps programmers detail report A report generated with data removes unnecessary files from the hard
step through a program as it runs to locate from a database that shows the individual drive.
errors. transactions that occurred during a certain
time period. disk defragmenter A utility that regroups
debugging The process of repeatedly run- related pieces of files on the hard drive,
ning a program to find errors and to make device driver Software that facilitates the enabling faster retrieval of the data.
sure the program behaves in the way it communication between a device and the
should. operating system. distributed denial of service (DDoS) at-
tack An automated attack that is launched
decentralized A type of network in which Device Manager A feature in the Windows from more than one zombie computer at the
users are responsible for creating their own operating system that lets individuals view same time.
data backups and for providing security for and change the properties of all hardware
devices attached to the computer. Document Object Model (DOM) A means
their computers.
to organize objects and page elements
decision point A point at which a com- dial-up connection A connection to the In- in a Web page. DOM defines every item on
puter program must choose from a set of ternet using a standard telephone line. a Web page, such as graphics, tables, and
different actions based on the value of its dial-up modem A device that converts headers, as an object.
current inputs. (modulates) the digital signals the com- documentation A description of the
decision support system (DSS) A system puter understands to analog signals development and technical details of a
designed to help managers develop solu- that can travel over phone lines. The com- computer program, including how the code
tions for specific problems. puter on the other end also must have a works and how the user interacts with the
modem to translate (demodulate) the re- program.
dedicated server A server used to fulfill one ceived analog signal back to a digital signal
specific function (such as handling e-mail). that the receiving computer can domain name A part of a Uniform
understand. Resource Locator (URL). Domain names
default value The value a database will use consist of two parts: the site’s host and a
for a field unless the user enters another digital divide The discrepancy between suffix that indicates the type of organiza-
value. those who have access to the opportunities tion. (Example: popsci.com)
Glossary 651
eighth
EDITION
EIGHTH
8
Domain Name System (DNS) server A dynamic RAM (DRAM) The most basic Entertainment Software Rating Board
server that contains location information for type of random access memory (RAM); (ESRB) A self-regulatory body established
domains on the Internet and functions like used in older systems or in systems for in 1994 by the Entertainment Software As-
a phone book for the Internet. which cost is an important factor. DRAM sociation that rates computer and video
offers access times on the order of 60 games according to the age appropriateness
dotted decimal number (dotted quad) One
nanoseconds. of content.
of the numbers in an Internet Protocol (IP)
address. ergonomics How a user sets up his or her
drawing software (illustration software) E computer and other equipment to minimize
risk of injury or discomfort.
Programs for creating or editing two-
dimensional line-based drawings. e-commerce (electric commerce) The error handling In programming, the
process of conducting business online for instructions that a program runs if the
drive bay A special shelf inside a computer purposes ranging from fund-raising to ad- input data is incorrect or another error is
that is designed to hold storage devices. vertising to selling products. encountered.
drive-by download The use of malicious e-mail (electronic mail) Internet-based Error-Checking A Windows utility that
software to attack your computer by down- communication in which senders and recip- checks for lost files and fragments as well as
loading harmful programs onto your com- ients correspond. physical errors on a hard drive.
puter, without your knowledge, while you
are surfing a Web site. e-mail client A software program that runs Ethernet network A network that uses the
on a computer and is used to send and re- Ethernet protocol as the means (or stan-
DVD-RAM One of three competing ceive e-mail through the ISP’s server. dard) by which the nodes on the network
technologies for rewritable DVDs.
e-mail server A server that processes and communicate.
DVD-ROM DVD format in which data can delivers incoming and outgoing e-mail. Ethernet port A port that is slightly larger
only be read and not written.
e-mail virus A virus transmitted by than a standard phone jack and transfers
DVD-R/RW One of two recognized DVD e-mail that often uses the address book in data at speeds of up to 10,000 Mbps; used to
formats that enable you to read, record (R), the victim’s e-mail system to distribute connect a computer to a DSL or cable
and rewrite (RW) data on the disc. itself. modem or a network.
DVDⴙR/RW One of two recognized DVD editor A tool that helps programmers as event The result of an action, such as a key-
formats that enables you to both read, they enter code, highlighting keywords and stroke, mouse click, or signal to the printer,
record (R), and rewrite (RW) data on the alerting the programmers to typos. in the respective device (keyboard, mouse,
disc. or printer) to which the operating system
element The tags and the text between the responds.
dynamic addressing The process of tags in HyperText Markup Language
assigning Internet Protocol (IP) addresses (HTML). exception report A report that shows con-
when users log on using their Internet ditions that are unusual or that need atten-
service provider (ISP). The computer is embedded computer A specially designed tion by users of a system.
assigned an address from an available pool computer chip that resides inside another
device, such as a car. These self-contained executable program The binary sequence
of IP addresses.
computer devices have their own program- (code) that instructs the central processing
dynamic decision making A mechanism ming and typically neither receive input unit (CPU) to perform certain calculations.
that allows a Web page to decide how to from users nor interact with other expansion card (adapter card) A circuit
display itself, based on the choices the systems. board with specific functions that augment
reader makes as he or she looks at the page.
encryption The process of encoding data the computer’s basic functions and provide
Dynamic Host Configuration Protocol (ciphering) so that only the person with a connections to other devices; examples in-
(DHCP) The protocol that handles dy- corresponding decryption key (the in- clude the sound card and the video card.
namic addressing. Part of the Transmission tended recipient) can decode (or decipher) expert system A system designed to repli-
Control Protocol/Internet Protocol and read the message. cate the decision-making processes of
(TCP/IP) protocol suite, DHCP takes a pool
encryption virus A malicious program that human experts to solve specific problems.
of IP addresses and shares them with hosts
on the network on an as-needed basis. searches for common data files and com- export The process of putting data into an
presses them into a file using a complex en- electronic file in a format that another appli-
Dynamic HyperText Markup Language cryption key, thereby rendering the files cation can understand.
(DHTML or dynamic HTML) A combina- unusable.
tion of Web development technologies Extensible HyperText Markup Language
including HTML, cascading style sheets, and entertainment software Programs de- (XHTML) A standard established by the
a scripting language that are used to add in- signed to provide users with entertainment. World Wide Web Consortium (W3C) that
teractivity to a Web site after the Web site has Computer games make up the vast majority combines elements from both Extensible
been loaded onto the client computer. of entertainment software. Markup Language (XML) and
EDITION
EIGHTH
8
HyperText Markup Language (HTML). field name An identifying name assigned FireWire 800 One of the fastest ports avail-
XHTML has much more stringent to each field in a database. able, moving data at 800 Mbps.
rules than HTML does regarding
field size The maximum number of firmware System software that controls
tagging.
characters (or numbers) that a field in a hardware devices.
Extensible Markup Language (XML) A database can contain.
first-generation language (1GL) The actual
language that enables designers to define
fifth-generation language (5GL) A machine language of a central processing
their own tags, making it much easier to
computer language that uses natural lan- unit (CPU); the sequence of bits—1s and
transfer data between Web sites and Web
guage processing or expert systems to 0s—that the CPU understands.
servers.
make the programming experience
better matched to human thinking flash drive A drive that plugs into a uni-
extension (file type) In a file name, the
processes. versal serial bus (USB) port on a computer
three letters that follow the user-supplied
and stores data digitally. Also called USB
file name after the dot (.); the extension
file A collection of related pieces of infor- drive, jump drive, or thumb drive.
identifies what kind of family of files the
mation stored together for easy reference; in
file belongs to, or which application should flash memory Portable, nonvolatile
database terminology, a file or table is a
be used to read the file. memory.
group of related records.
external data source Any source not flash memory card A form of portable stor-
file allocation table (FAT) An index of all
owned by the company that owns a deci- age; this removable memory card is often
sector numbers that the hard drive stores in
sion support system, such as customer de- used in digital cameras, portable media play-
a table to keep track of which sectors hold
mographic data purchased from third ers, and personal digital assistants (PDAs).
which files.
parties.
file compression utility A program that flat-panel monitor A type of monitor that
external hard drive An internal hard drive is lighter and more energy-efficient than a
takes out redundancies in a file to reduce
that is enclosed in a protective case to make CRT monitor; often used with portable
the file size.
it portable; the drive is connected to the computers such as notebooks.
computer with a data transfer cable and is file management The process by which hu-
often used to back up data. mans or computer software provide flowchart A visual representation of the
organizational structure to a computer’s patterns an algorithm comprises.
external SATA See eSata. contents. folder A collection of files stored on a com-
extranet The portion of a company’s in- file name The first part of the label applied puter.
tranet that is used to share business infor- to a file; it is generally the name a user as-
mation with business partners such as For Keyword in Visual Basic used with the
signs to the file when saving it. Next keyword to implement a loop.
vendors, suppliers, and customers.
file path The exact location of a file, foreign key The primary key of another
starting with the drive in which the file is database table that is included for purposes
F located, and including all folders, subfold- of establishing relationships with another
ers (if any), the file name, and the table.
Favorites A feature in Microsoft Internet extension. (Example: C:\Users\username\
Explorer that places a marker of a Web Documents\Illustrations\EBronte.jpg) fourth-generation language (4GL) A
site’s Uniform Resource Locator (URL) in sophisticated level of programming
an easily retrievable list in the browser’s file server A computer deployed to pro- language such as a report generator or
toolbar. (Called Bookmarks in some vide remote storage space or to act as a database query language.
browsers.) repository for files that users can access.
frame A container designed to hold
fiber-optic cable A cable that transmits File Transfer Protocol (FTP) A protocol multiple data packets.
data at close to the speed of light along used to upload and download files from
glass or plastic fibers. one computer to another over the Internet. freeware Any copyrighted software that
can be used for free.
Fiber-Optic Service (FiOS) Internet access financial planning software Programs for
that is enabled by transmitting data at the managing finances, such as Intuit’s Quicken front side bus (FSB) See local bus.
speed of light through glass or plastic and Microsoft Money, which include elec-
full installation The process of installing
fibers. tronic checkbook registers and automatic
all the files and programs from the
bill payment tools.
field A field where a category of informa- distribution CD to the computer’s
tion in a database is stored. Fields are dis- firewall A software program or hardware hard drive.
played in columns. device designed to prevent unauthorized
fuzzy logic A type of logic that allows
access to computers or networks.
field constraint Any property that must be the interjection of experiential learning
satisfied for an entry to be accepted into the FireWire 400 (IEEE 1394) An interface port into an equation by considering
database field. that transfers data at 400 Mbps. probabilities.
Glossary 653
eighth
EDITION
EIGHTH
8
G hibernate A power-management mode
that saves the current state of the current
HyperText Transfer Protocol (HTTP) The
protocol that allows files to be transferred
system to the computer’s hard drive. from a Web server so that you can see
gadget A mini-application that runs on the
them on your computer by using a
desktop, offering easy access to a frequently high-definition multimedia interface
browser.
used tool such as weather or a calendar (HDMI) A compact audio–video interface
item. standard that carries both high-definition HyperText Transfer Protocol Secure
video and uncompressed digital audio. (HTTPS) A combination of the HTTP pro-
gateway See wireless router.
tocol and a network security protocol (usu-
hoax An e-mail message or Web site that
gigabit Ethernet The most commonly used ally SSL or TLS) that ensure data is sent
contains information that is untrue, and is
wired Ethernet standard deployed in de- securely over the Web.
published with the purpose of deceiving
vices designed for home networks which
others. hyperthreading A technology that permits
provides bandwidth of up to 1 Gbps.
quicker processing of information by en-
home area network (HAN) A network
gigabyte (GB) About a billion bytes. abling a new set of instructions to start
located in a home that is used to connect all
executing before the previous set has
gigahertz (GHz) One billion hertz. of its digital devices.
finished.
Global Positioning System (GPS) A home network server A device designed to
system of 21 satellites (plus 3 working store media, share media across the net-
spares), built and operated by the U.S. work, and back up files on computers con- I
military, that constantly orbit the earth. nected to a home network.
They provide information to GPS-capable icon A picture on a computer display
home page The main or opening page of a that represents an object such as a software
devices to pinpoint locations on the earth.
Web site. application or a file or folder.
graphical user interface (GUI) Unlike the
host The portion of a domain name that identity theft The process by which
command- and menu-driven interfaces
identifies who maintains a given Web site. someone uses personal information about
used in earlier software, GUIs display
For example, berkeley.edu is the domain someone else (such as the victim’s name,
graphics and use the point-and-click
name for the University of California at address, and Social Security number) to
technology of the mouse and cursor,
Berkeley, which maintains that site. assume the victim’s identity for the purpose
making them much more user-friendly.
HTML tag The bracketed information that of defrauding others.
graphics processing unit (GPU) A special-
surrounds elements of a Web page in order if else In the programming language C⫹⫹,
ized logic chip that is dedicated to quickly
to convey information about them and de- keywords for a binary decision within an
displaying and calculating visual data such
fine how their content is to be displayed. algorithm.
as shadows, textures, and luminosity.
HTML/XHTML embedded scripting lan- image backup A copy of an entire
guage A client-side method of embedding computer system, created for restoration
H programming language code directly within purposes.
the HTML/XHTML code of a Web page.
hacker Anyone who unlawfully breaks image editing software (photo editing
into a computer system (whether an indi- hybrid topology A topology comprised of software) Programs for editing photo-
vidual computer or a network). several topologies and combined into one graphs and other images.
network.
handshaking The process of two comput- impact printer A printer that has tiny
ers exchanging control packets that set up hyperlink A type of specially coded text hammer-like keys that strike the paper
the parameters of a data exchange. that, when clicked, enables a user to jump through an inked ribbon, thus making a
from one location, or Web page, to another mark on the paper. The most common
hard drive A device that holds all perma- within a Web site or to another Web site impact printer is the dot-matrix printer.
nently stored programs and data; can be altogether.
located inside the system unit or attached incremental backup A type of backup
to the system unit via a USB port. hyperlink field A field in a database that that only backs up files that have
stores hyperlinks to Web pages. changed since the last time those files
hardware Any part of the computer you were backed up.
can physically touch. hypertext Text that is linked to other
documents or media (such as video clips or information Data that has been
head crash Impact of read/write head pictures). organized or presented in a meaningful
against magnetic platter of the hard drive; fashion.
often results in data loss. HyperText Markup Language (HTML) A
set of rules for marking up blocks of text so information system A system that includes
hexadecimal notation A number system that a Web browser knows how to display data, people, procedures, hardware, and
that uses 16 digits to represent numbers; them. It uses a series of tags that defines the software and that is used to gather and ana-
also called a base 16 number system. display of text on a Web page. lyze information.
EDITION
EIGHTH
8
information technology (IT) The set of Internet Corporation for Assigned Names IP address See Internet Protocol address.
techniques used in processing and retriev- and Numbers (ICANN) The organization
ing information. responsible for allocating IP addresses to
inheritance The ability of a new class of
network administrators to ensure they are J
unique and have not been assigned to other
objects to pick up all of the data and meth- jam signal A special signal sent to all net-
users.
ods of an existing class automatically and work nodes, alerting them that a data colli-
then extend and customize those to fit its Internet exchange point A device that al- sion has occurred.
own specific needs. lows different Internet service providers to
exchange information between networks. Java A platform-independent program-
initial value A beginning point in a loop. ming language that Sun Microsystems in-
Internet Explorer (IE) A popular graphical troduced in the early 1990s. It quickly
inkjet printer A nonimpact printer that browser from Microsoft Corporation for dis-
sprays tiny drops of ink onto paper. became popular because its object-oriented
playing different Web sites, or locations, on model enables Java programmers to benefit
inoculation A process used by antivirus the Web; it can display pictures (graphics) in from its set of existing classes.
software; compares old and current quali- addition to text, as well as other forms of
ties of files to detect viral activity. multimedia such as sound and video. Java applet A small Java-based program.
Internet Protocol (IP) A protocol for send- Java Server Pages (JSP) An extension of
input device A hardware device used to
ing data between computers on the the Java servlet technology with dynamic
enter, or input, data (text, images, and
Internet. scripting capability.
sounds) and instructions (user responses
and commands) into a computer. Some Internet Protocol address (IP address) The JavaScript A scripting language often used
input devices are keyboards and mice. means by which all computers connected to to add interactivity to Web pages.
the Internet identify each other. It consists JavaScript is not as fully featured as Java,
input form A form that provides a view
of a unique set of four numbers separated but its syntax, keywords, data types, and
of the data fields to be filled in a database,
by dots such as 123.45.178.91. operators are a subset of Java’s.
with appropriate labels to assist database
users in populating the database. Internet Protocol version 4 (IPv4) The join query A database query that links (or
original IP addressing scheme. joins) two database tables using a common
instant messaging (IM) A program that en-
field in both tables and extracts the relevant
ables users to communicate online in real Internet Protocol version 6 (IPv6) A pro- data from each.
time with others who are also online. posed IP addressing scheme that makes IP
addresses longer, thereby providing more
integrated development environment
available IP addresses. It uses eight groups
(IDE) A development tool that helps pro-
of 16-bit numbers. K
grammers write, compile, and test their
programs. Internet Relay Chat (IRC) A means of syn- kernel (supervisor program) The essential
chronous group communication used in component of the operating system that is
integrated help Documentation for a responsible for managing the processor and
discussion forums.
software product that is built directly into all other components of the computer sys-
the software. Internet tablet A very light, portable tem. Because it stays in random access
computing device without a keyboard. memory (RAM) the entire time the com-
integrated software application A single
software program that incorporates the interpreter A software program that trans- puter is powered on, the kernel is called
most commonly used tools of many pro- lates source code into an intermediate form memory resident.
ductivity software programs. line by line. Each line is then executed as it kernel memory The memory that the com-
is translated. puter’s operating system uses.
internal hard drive A hard drive that is in-
stalled inside the system unit. interrupt A signal that tells the operating key pair A public and a private key
system that it is in need of immediate used for coding and decoding encrypted
Internet A network of networks that is the attention. messages.
largest network in the world, connecting
millions of computers from more than one interrupt handler A special numerical code keyboard A hardware device used to enter
hundred countries. that prioritizes requests from various devices. typed data and commands into a computer.
These requests then are placed in the interrupt
Internet backbone The main pathway of table in the computer’s primary memory. keystroke logger A type of spyware pro-
high-speed communications lines over gram that monitors keystrokes with the
which all Internet traffic flows. intranet A private corporate network that intent of stealing passwords, login IDs, or
is used exclusively by company employees credit card information.
Internet cache A section of your hard drive to facilitate information sharing, database
that stores information that you may need access, group scheduling, videoconferenc- keyword (1) A specific word a user wishes
again for surfing (such as IP addresses and ing, and other employee and customer to query (or look for) in an Internet search.
frequently accessed Web pages). collaborations. (2) A specific word that has a predefined
Glossary 655
eighth
EDITION
EIGHTH
8
meaning in a particular programming local area network (LAN) A network in users simultaneously and executes many
language. which the nodes are located within a small different programs at the same time.
geographic area.
kilobyte (KB) A unit of computer storage malware Software that is intended to
equal to approximately one thousand bytes. logic bomb A computer virus that runs render a system temporarily or perma-
when a certain set of conditions is met, such nently useless or to penetrate a computer
knowledge-based system A support as when specific dates are keyed off the system completely for purposes of informa-
system that provides additional intelligence computer’s internal clock. tion gathering. Examples include spyware,
that supplements the user’s own intellect
viruses, worms, and Trojan horses.
and makes a decision support system (DSS) logical error A mistake in the design and
more effective. planning of the algorithm itself rather than management information system (MIS) A
in the use of syntax in the coding. system that provides timely and accurate
information that enables managers to make
L logical port A virtual communications
gateway or path that enables a computer to critical business decisions.
large-scale networking (LSN) A program organize requests for information (such as many-to-many relationship A database re-
created by the U.S. government, the objec- Web page downloads and e-mail routing) lationship in which one record in a database
tive of which is to fund the research and from other networks or computers. table (A) can have many related records in
development of cutting-edge networking logical port blocking A condition in which another table (B), and any record in table B
technologies. Major goals of the program a firewall is configured to ignore all incom- can have many related records in table A.
are the development of enhanced wireless ing packets that request access to a certain
technologies and increased network mapping program Software that
port so that no unwanted requests will get provides street maps and written directions
throughput. through to the computer. to locations.
laser printer A nonimpact printer known loop An algorithm that performs a
for quick and quiet production and high- master boot record (MBR) A small
repeating set of actions. A logical yes/no program that runs whenever a computer
quality printouts. expression is evaluated. As long as the boots up.
Last Known Good Configuration A Win- expression evaluates to TRUE (yes), the
dows feature that starts the computer by algorithm will perform the same set media access control (MAC) address A
using the registry information that was of actions and continue to loop around. physical address, similar to a serial number
saved during the last shutdown. When the answer to the question is on an appliance, that is assigned to each
FALSE (no), the algorithm breaks free network adapter; it is made up of six 2-digit
latency The process that occurs after the of the looping structure and moves on to characters such as 01:40:87:44:79:A5.
read/write head of the hard drive locates the next step.
the correct track, and then waits for the cor- megabyte (MB) A unit of computer
rect sector to spin to the read/write head. storage equal to approximately 1 million
bytes.
legacy technology Comprises computing
devices, software, or peripherals that use
M megahertz (MHz) A measure of processing
techniques, parts, and methods from Mac OS The first commercially available speed equal to 1 million hertz.
an earlier time that are no longer operating system to incorporate a graphical memo field A text field in a database that
popular. user interface (GUI) with user-friendly is used to hold long pieces of text.
point-and-click technology.
library In Windows 7, a folder that is used
memory module (memory card) A small
to display files from different locations as if machine language A set of instructions circuit board that holds a series of random
they were all saved in a single folder, re- executed directly by the central processing access memory (RAM) chips.
gardless of where they are actually stored in unit (CPU).
the file hierarchy. menu A list of commands that displays on
macro A small program that groups a series the screen.
Linux An open source operating system of commands to run as a single command.
based on UNIX. Because of the stable na- menu-driven interface A user interface in
ture of this operating system, it is often macro virus A virus that is distributed by which the user chooses a command from
used on Web servers. hiding it inside a macro. menus displayed on the screen.
liquid crystal display (LCD) The massive multiplayer online role-playing metadata Data that describes other data.
technology used in flat-panel computer games (MMORPG) A gaming environ-
monitors. ment in which thousands of participants in- metasearch engine A metasearch engine,
teract in a virtual game world by assuming such as Dogpile, searches other search en-
live bookmark A bookmark that delivers roles of fictitious characters. gines rather than individual Web sites.
updates to you as soon as they become
available, using Really Simple Syndication mainframe A large, expensive computer method (behavior) An action associated
(RSS). that supports hundreds or thousands of with a class of objects.
EDITION
EIGHTH
8
metropolitan area network (MAN) A wide multimedia Anything that involves one or natural language processing (NLP) system
area network (WAN) that links users in a more forms of media plus text. A system that enables users to communi-
specific geographic area (such as within a cate with computer systems using a natural
multimedia message service (MMS) An
city or county). spoken or written language as opposed to
extension of short message service (SMS)
using computer programming languages.
microbrowser Software that makes it that enables messages that include text,
possible to access the Internet from a sound, images, and video clips to be sent negative acknowledgment (NAK) What
PDA/smartphone. from a cell phone or PDA to other phones computer Y sends to computer X if a packet
or e-mail addresses. is unreadable, indicating the packet was not
microphone (mic) A device that allows you
received in understandable form.
to capture sound waves, such as those cre- multimedia software Programs that
ated by your voice, and transfer them to include image, video, and audio editing netbook A computing device that runs a
digital format on your computer. software, animation software, and other full-featured operating system but weighs
specialty software required to produce two pounds or less.
Microsoft Disk Operating System (MS- computer games, animations, and movies.
DOS) A single-user, single-task operating netiquette The general rules of etiquette
system created by Microsoft. MS-DOS was multipartite virus Literally meaning “mul- for Internet chat rooms and other online
the first widely installed operating system tipart” virus; a type of computer virus that communication.
in personal computers. attempts to infect both the boot sector and
network A group of two or more comput-
executable files at the same time.
mobile switching center A central location ers (or nodes) that are configured to share
that receives cell phone requests for service multiplayer online game An online game information and resources such as printers,
from a base station. in which play occurs among hundreds or files, and databases.
thousands of other players over the Internet
model management system A type of soft- network adapter A device that enables the
in a persistent or ever-on game environ-
ware that assists in building management computer (or peripheral) to communicate
ment. In some games, players can interact
models in decision support systems (DSSs). with the network using a common data
with other players through trading, chat-
communication language, or protocol.
modem A communication device that ting, or playing cooperative or combative
works to translate digital data into an ana- mini-games. network address translation (NAT) A
log signal and back again. process that firewalls use to assign internal
Multiple Input Multiple Output (MIMO)
Internet Protocol (IP) addresses on a
modem card An expansion card that pro- A design in newer routers that provides for
network.
vides the computer with a connection to the faster wireless data transmission by utiliz-
Internet via conventional phone lines. ing more than one antenna to transmit and network administrator Someone who
receive data. has training in computer and peripheral
modem port A port that uses a traditional maintenance and repair, network design,
telephone signal to connect a computer to multipurpose Internet mail extensions
and the installation of network software;
the Internet. (MIME) A specification that was intro-
installs new equipment, configures comput-
duced in 1991 to simplify attachments to
monitor (display screen) A common out- ers for users, repairs equipment, and
e-mail messages. All e-mail client software
put device that displays text, graphics, and assigns network access to users.
now uses this protocol for attaching files.
video as soft copies (copies that can be seen network architecture The design of a com-
only on screen). multitask The ability of an operating system
puter network; includes both physical and
to perform more than one process at a time.
Moore’s Law A prediction, named after logical design.
Gordon Moore, the cofounder of Intel; multiuser operating system (network
network-attached storage (NAS) device A
states that the number of transistors on a operating system) An operating system
specialized computing device designed to
CPU chip will double every two years. (OS) that enables more than one user to
store and manage network data.
access the computer system at one time by
motherboard A special circuit board in the efficiently juggling all the requests from network interface card (NIC) An expan-
system unit that contains the central pro- multiple users. sion card that enables a computer to connect
cessing unit (CPU), the memory (RAM) other computers or to a cable modem to
chips, and the slots available for expansion facilitate a high-speed Internet connection.
cards; all of the other boards (video cards,
sound cards, and so on) connect to it to N network navigation device A device on a
receive power and to communicate. network such as a router, hub, and switch
nanoscience The study of molecules and that moves data signals around the
mouse A hardware device used to enter user nanostructures whose size ranges from 1 to network.
responses and commands into a computer. 100 nanometers (one billionth of a meter).
network operating system (NOS) Software
multidimensional database A database nanotechnology The science of using that handles requests for information,
that stores data in multiple dimensions and nanostructures to build devices on an ex- Internet access, and the use of peripherals
is organized in a cube format. tremely small scale. for the rest of the network nodes.
Glossary 657
eighth
EDITION
EIGHTH
8
network prefix The part of a network object-oriented analysis An approach management of hardware, peripherals, and
address under the CIDR IP addressing to software design that differs from the software.
scheme. It consists of a slash and a number traditional “top-down” design. In object-
operator Any of the coding symbols that
added to the end of the last octet in an IP oriented (OO) analysis, programmers first
represent the fundamental actions of a
address. identify all of the classes (collections of data
computer language.
and methods) that are required to describe
network topology The layout and struc-
completely the problem the program is optical carrier line See OC (optical carrier)
ture of the network.
trying to solve. line.
network-ready device A device (such as
object-oriented database A database that optical drive A hardware device that
a printer or external hard drive) that can be
stores data in objects, not in tables. uses lasers or light to read from, and
attached directly to a network instead of
maybe even write to, CDs, DVDs, or
needing to attach to a computer on the object query language (OQL) A query lan-
Blu-ray discs.
network. guage that is used to extract information
from an object-oriented database. optical media Portable storage devices,
newsgroup A method of communication,
octet Eight bits. For example, each of the such as CDs, DVDs, and Blu-ray discs, that
similar to a discussion group or forum, in
four numbers in the dotted decimal nota- use a laser to read and write data.
which people create threads, or conversa-
tions. In a thread, a newsgroup member tion of an Internet Protocol (IP) address is optical mouse A mouse that uses an
will post messages and read and reply to represented by an octet. internal sensor or laser to control the
messages from other members of the mouse’s movement. The sensor sends
office support system (OSS) A system
newsgroup. signals to the computer, telling it where
(such as Microsoft Office) designed to assist
employees in accomplishing their day-to- to move the pointer on the screen.
Next In the Visual Basic programming lan-
guage, the keyword used to implement a day tasks and to improve communications. organic light-emitting diode (OLED) dis-
loop. play A display that uses organic com-
offshore The process of sending jobs for-
merly performed in the U.S. to other pounds to produce light when exposed to
node A device connected to a network such
countries. an electric current. Unlike LCDs, OLEDs do
as a computer, a peripheral (such as a
not require a backlight to function and
printer), or a communications device (such
one-to-many relationship A database rela- therefore draw less power and have a
as a modem).
tionship in which one record in a data table much thinner display, sometimes as thin
nonimpact printer A printer that sprays can have many related records in another as 3 mm.
ink or uses laser beams to make marks on data table.
output device A device that sends
the paper. The most common nonimpact
one-to-one relationship A database rela- processed data and information out of a
printers are inkjet and laser printers.
tionship in which one record in a data table computer in the form of text, pictures
nonvolatile storage Permanent storage, as has only one related record in another data (graphics), sounds (audio), or video.
in read-only memory (ROM). table.
numeric check A data validation routine and Google Earth. packet (data packet) A small segment of
that confirms that only numbers are entered online transaction processing (OLTP) The data that is bundled for sending over trans-
in a database field. immediate processing of user requests or mission media. Each packet contains the ad-
transactions. dress of the computer or peripheral device
numeric field A field in a database that to which it is being sent.
stores numbers. open source software Program code made
publicly available for free; it can be copied, packet filtering A feature found in fire-
distributed, or changed without the strin- walls that filters out unwanted data packets
O gent copyright protections of proprietary sent to specific logical ports.
software products.
object A variable in a program that is an packet screening A process that involves
example of a class. Each object in a specific open system A system whose designs examining incoming data packets to ensure
class is constructed from similar data and are public, enabling access by any inter- they originated from, or are authorized by,
methods. ested party. valid users on the internal network.
object field A field in a database that holds operating system (OS) The system soft- packet sniffer A program that looks at
objects such as pictures, video clips, or en- ware that controls the way in which a com- (sniffs) each data packet as it travels on the
tire documents. puter system functions, including the Internet.
EDITION
EIGHTH
8
packet switching A communications Outlook or Lotus Organizer that strive to podcast A clip of audio or video content
methodology in which data is broken into replace the various management tools that is broadcast over the Internet using
small chunks (called packets) and sent over found on a traditional desk such as a compressed audio or video files in formats
various routes at the same time. When the calendar, address book, notepad, and such as MP3.
packets reach their destination, they are re- to-do lists.
point of presence (POP) A bank of
assembled by the receiving computer.
pharming Planting malicious code on a modems through which many users can
paging The process of swapping data or in- computer that alters the browser’s ability to connect to an Internet service provider (ISP)
structions that have been placed in the find Web addresses and directs users to simultaneously.
swap file for later use back into active ran- bogus Web sites.
polymorphic virus A virus that changes its
dom access memory (RAM). The contents
phishing The process of sending e-mail virus signature (the binary pattern that
of the hard drive’s swap file then become
messages to lure Internet users into reveal- makes the virus identifiable) every time it
less active data or instructions.
ing personal information such as credit card infects a new file. This makes it more diffi-
Pascal The only modern computer lan- or Social Security numbers or other sensi- cult for antivirus programs to detect the
guage that was specifically designed as a tive information that could lead to identity virus.
teaching language; it is seldom taught now theft.
port An interface through which external
at the college level.
PHP (Hypertext Preprocessor) A scripting devices are connected to the computer.
passive topology When data merely trav- language used to produce dynamic Web
portability The capability to move a
els the entire length of the communications pages.
completed solution easily from one type of
medium and is received by all network
physical memory The amount of random computer to another.
devices.
access memory (RAM) that is installed in a
portable media player (PMP) A small
path (subdirectory) The information after computer.
portable device (such as an iPod) that
the slash indicates a particular file or path
piggybacking The process of connecting to enables you to carry your MP3s or other
(or subdirectory) within the Web site.
a wireless network without the permission media files around with you.
path separator The backslash mark (\) of the owner of the network. positive acknowledgment (ACK) What
used by Microsoft Windows and DOS in file computer Y sends when it receives a data
names. Mac files use a colon (:), and UNIX pixel A single point that creates the images
on a computer monitor. Pixels are packet that it can read from computer X.
and Linux use the forward slash (/) as the
path separator. illuminated by an electron beam that passes possessed object Any object that a user
rapidly back and forth across the back of carries to identify him- or herself and that
patient simulator A computer-controlled the screen so that the pixels appear to glow grants the user access to a computer system
mannequin that simulates human body continuously. or computer facility.
functions and reactions. Patient simulators
are used in training doctors, nurses, and platform The combination of a computer’s power supply A power supply regulates
emergency services personnel by simulat- operating system and processor. The two the wall voltage to the voltages required by
ing dangerous situations that would put most common platform types are the PC computer chips; it is housed inside the
live patients at risk. and the Apple Macintosh. system unit.
peer-to-peer (P2P) network A network in platter A thin, round, metallic storage plate power-on self-test (POST) The first job the
which each node connected to the network stacked onto the hard drive spindle. basic input/output system (BIOS) per-
can communicate directly with every other player See plug-in. forms, ensuring that essential peripheral
node on the network. devices are attached and operational. This
plotter A large printer that uses a computer- process consists of a test on the video card
peer-to-peer (P2P) sharing The process of controlled pen to produce oversize pictures and video memory, a BIOS identification
users transferring files between computers. that require precise continuous lines to be process (during which the BIOS version,
peripheral device A device such as a moni- drawn, such as maps and architectural manufacturer, and data are displayed
tor, printer, or keyboard that connects to the plans. on the monitor), and a memory test to
system unit through ports. ensure memory chips are working
Plug and Play (PnP) The technology that
properly.
enables the operating system, once it is
personal area network (PAN) A network
booted up, to recognize automatically any preemptive multitasking When the oper-
used to connect wireless devices (such as
new peripherals and configure them to ating system processes the task assigned a
Bluetooth-enabled devices) in close proxim-
work with the system. higher priority before processing a task that
ity to each other.
has been assigned a lower priority.
plug-in (player) A small software program
personal firewall A firewall specifically
that “plugs in” to a Web browser to enable presentation software An application
designed for home networks.
a specific function—for example, to view program for creating dynamic slide shows
personal information manager (PIM) and hear certain multimedia files on the such as Microsoft PowerPoint or Apple
software Programs such as Microsoft Web. Keynote.
Glossary 659
eighth
EDITION
EIGHTH
8
pretexting The act of creating an invented programming The process of translating a recipient decodes the message with a
scenario (the pretext) to convince someone task into a series of commands a computer private key.
to divulge information. will use to perform that task.
Pretty Good Privacy (PGP) A popular programming language A kind of “code”
for the set of instructions the central pro-
Q
public-key encryption package.
cessing unit (CPU) knows how to perform. quarantining The placement (by antivirus
primary key (key field) The unique field
software) of a computer virus in a secure
that each database record in a table must projector A device that can project images
area on the hard drive so that it won’t
have. from your computer onto a wall or viewing
spread infection to other files.
screen.
print queue A software holding area for
query The process of requesting informa-
printing jobs. project management software An applica-
tion from a database.
tion program, such as Microsoft Project, that
print server A server that manages all helps project managers generate charts and query language A language used to
client-requested printing jobs for all print- tables used to manage aspects of a project. retrieve and display records. A query
ers on the network.
language consists of its own vocabulary
protocol (1) A set of rules for exchanging
printer A common output device that and sentence structure, used to frame the
data and communication. (2) The first part
creates tangible or hard copies of text and requests.
of the Uniform Resource Locator (URL)
graphics.
indicating the set of rules used to retrieve QWERTY keyboard A keyboard that gets
private key One-half of a pair of binary the specified document. The protocol is its name from the first six letters on the top-
files that is needed to decrypt an encrypted generally followed by a colon; two forward left row of alphabetic keys on the keyboard.
message. The private key is kept only by slashes; www (indicating World Wide Web);
the individual who created the key pair and and then the domain name.
is never distributed to anyone else. The
prototype A small model of a computer
R
private key is used to decrypt messages
program, often built at the beginning of a radio frequency identification tag (RFID
created with the corresponding public key.
large project. tag) A tag that looks like a sticker or label,
private-key encryption A procedure in is attached to a batch of merchandise, and
proprietary software Custom software ap-
which only the two parties involved in contains a microchip that holds a unique
plication that is owned and controlled by
sending a message have the code. This sequence of numbers used to identify the
the company that created it.
could be a simple shift code where letters product to which it is attached.
of the alphabet are shifted to a new proprietary system A software product
position. random access memory (RAM) The
whose code is not generally available (is
computer’s temporary storage space or
problem statement A clear description of kept private) and that is generally devel-
short-term memory. It is located in a set of
which tasks the computer program must oped and marketed by a single company.
chips on the system unit’s motherboard,
accomplish and how the program will exe- proxy server Acts as a go-between for com- and its capacity is measured in megabytes
cute these tasks and respond to unusual puters on the internal network and the ex- or gigabytes.
situations. It is the starting point of pro- ternal network (the Internet).
gramming work. range check A type of data validation used
pseudocode A text-based approach to doc- in databases to ensure that a value entered
processing Manipulating or organizing umenting an algorithm. falls within a specified range (such as re-
data into information. quiring a person’s age to fall in a range of
public domain The status of software (or
productivity software Programs that en- between 1 and 120).
other created works) that are not protected
able a user to perform various tasks gener-
by copyright. rapid application development (RAD) A
ally required in home, school, and business.
method of system development in which
Examples include word processing, spread- public key One-half of a pair of binary files
developers create a prototype first, generat-
sheet, presentation, personal information that is needed to decrypt an encrypted mes-
ing system documents as they use and
management (PIM), and database programs. sage. After creating the keys, the user dis-
remodel the product.
tributes the public key to anyone he wishes
program A series of instructions to be fol-
to send him encrypted messages. A mes- read/write head The mechanism that re-
lowed by a computer to accomplish a task.
sage encrypted with a public key can be un- trieves (reads) and records (writes) the
program development life cycle (PDLC) A encrypted only using the corresponding magnetic data to and from a data disk. They
number of stages, from conception to final private key. move from the outer edge of the spinning
deployment, which a programming project platters to the center, up to 50 times per
follows. public-key encryption A procedure in
second.
which the key for coding is generally dis-
program file A file that is used in the run- tributed as a public key that may be placed read-only memory (ROM) A set of
ning of software programs and does not on a Web site. Anyone wishing to send a memory chips, located on the motherboard,
store data. message codes it using the public key. The which stores data and instructions that
EDITION
EIGHTH
8
cannot be changed or erased; it holds all the the smoother moving images will appear script kiddy An amateur hacker who lacks
instructions the computer needs to start up. on the monitor. sophisticated computer skills. These individ-
uals are typically teenagers, who don’t create
real-time operating system (RTOS) A pro- reusability The ability to reuse existing
programs used to hack into computer systems
gram with a specific purpose that must classes of objects from other projects, en-
but instead use tools created by skilled hack-
guarantee certain response times for partic- abling programmers to produce new code
ers that enable unskilled novices to wreak the
ular computing tasks, or else the machine’s quickly.
same havoc as professional hackers.
application is useless. Real-time operating
ribbon A group of icons collected for easy
systems are found in many types of robotic scripting language A simple programming
access.
equipment. language that is limited to performing a
ring (loop) topology A network configura- specific set of specialized tasks.
real-time processing The process of
tion in which the computers and peripher-
updating a database (or information scrollbar On the desktop, the bar that
als are laid out in a configuration
system) immediately as changes are made. appears at the side or bottom of the window
resembling a circle. Data flows around the
and controls which part of the information
Really Simple Syndication (RSS) circle from device to device in one direction
is displayed on the screen.
technology An XML-based format that al- only.
lows frequent updates of content on the search engine A set of programs that
World Wide Web. root directory The top level of the filing
searches the Web for specific words (or key-
structure in a computer system. In Win-
words) you wish to query (or look for) and
record A collection of related fields in a dows computers, the root directory of the
then returns a list of the Web sites on which
database. hard drive is represented as C:\.
those keywords are found.
Recycle Bin A folder on a Windows desk- root DNS server A group of servers main-
second-generation language (2GL) Also
top in which deleted files from the hard tained throughout the Internet to which ISP
known as an assembly language. Second-
drive are held until permanently purged Web servers connect to locate the master
generation languages deal directly with
from the system. listings for an entire top-level domain.
system hardware but provide acronyms
referential integrity For each value in the router A device that routes packets of data that are easier for human programmers to
foreign key of one table, there is a corre- between two or more networks. work with.
sponding value in the primary key of the
runtime error An error in the problem second-level domain A domain that falls
related table.
logic that is only caught when the program within top-level domains of the Internet.
register A special memory storage area executes. Each second-level domain needs to be
built into the central processing unit (CPU). unique within that particular domain but
not necessarily unique to all top-level
registry A portion of the hard drive con-
taining all the different configurations
S domains.
(settings) used by the Windows operating sector A section of a hard drive platter,
Safe mode A special diagnostic mode de-
system (OS) as well as by other wedge-shaped from the center of the platter
signed for troubleshooting errors that occur
applications. to the edge.
during the boot process.
relation A database table that contains re- Secure Sockets Layer (SSL) A protocol that
sampling rate The number of times per
lated data. provides for the encryption of data trans-
second a signal is measured and converted
mitted using the Internet. The current ver-
relational algebra The use of English-like to a digital value. Sampling rates are meas-
sions of all major Web browsers support
expressions that have variables and opera- ured in kilobits per second.
SSL.
tions, much like algebraic equations. satellite Internet A way to connect to the
seek time The time it takes for the hard
relational database A database that organ- Internet using a small satellite dish, which
drive’s read/write heads to move over the
izes data in table format by logically group- is placed outside the home and is connected
surface of the disk, between tracks, to the
ing similar data into relations (or tables) to a computer with coaxial cable. The
correct track.
that contain related data. satellite company then sends the data to a
satellite orbiting the Earth. The satellite, in select query A query that displays a subset
relationship In relational databases, the turn, sends the data back to the satellite of data from a table based on the criteria the
link between tables that defines how the dish and to the computer. user specifies.
data are related.
scalability The ability to easily add more Serial Advanced Technology Attachment
resolution The clearness or sharpness of an users to a network without affecting the (Serial ATA) A type of hard drive that uses
image, which is controlled by the number of performance of the other network nodes much thinner cables, and can transfer data
pixels displayed on the screen. (computers or peripherals). more quickly, than IDE drives.
response time The measurement (in mil- script A list of commands (mini-programs server A computer that provides
liseconds) of the time it takes for a pixel to or macros) that can be executed on a com- resources to other computers on a
change color; the lower the response time, puter without user interaction. network.
Glossary 661
eighth
EDITION
EIGHTH
8
server-side program A program that is run software license An agreement between spyware An unwanted piggyback program
on a Web server as opposed to inside a Web the user and the software developer that that downloads with the software you want
browser. must be accepted before installing the to install from the Internet and then runs in
software on a computer. the background of your system.
service set identifier (SSID) A network
name that wireless routers use to identify software piracy Violating a software li- star topology An active topology (meaning
themselves. cense agreement by copying an application that data is retransmitted) in which the
onto more computers than the license nodes connect to a central communications
shareware Software that enables users to
agreement permits. device called a switch. The switch receives a
“test” the software by running it for a lim-
signal from the sending node and retrans-
ited time free of charge. software suite A collection of software pro- mits it to the node that should receive it.
grams that have been bundled together as a
shielded twisted pair (STP) cable Twisted
package. statement A sentence in programming
pair cable that contains a layer of foil
code.
shielding to reduce interference. software update (service pack) A down-
loadable software module that repairs static addressing A means of assigning an
short message service (SMS) Technology
errors identified in commercial program Internet Protocol (IP) address that never
that enables short text messages (up to 160
code. changes and is most likely assigned manu-
characters) to be sent over mobile networks.
ally by a network administrator.
solid state drive (SSD) A drive that uses
simple mail transfer protocol (SMTP) A stealth virus A virus that temporarily
the same kind of memory that flash drives
protocol for sending e-mail along the Inter- erases its code from the files where it re-
use, but can reach data in only a tenth of the
net to its destination. sides and hides in the active memory of the
time a flash drive requires.
simulation software Software, often used computer.
for training purposes, which allows the user sort (index) The process of organizing a
database into a particular order. streaming audio Technology that
to experience or control an event as if it is
enables audio files to be fed to a browser
reality. sound card An expansion card that at- continuously. This lets users avoid
sleep mode A low-power mode for elec- taches to the motherboard inside the system having to download an entire file before
tronic devices such as computers that unit and that enables the computer to pro- listening.
saves electric power consumption and duce sounds by providing a connection for
the speakers and microphone. streaming video Technology that enables
saves your computer settings where you
video files to be fed to a browser continu-
left off. When the computer is “woken
source code The instructions programmers ously. This lets users avoid having to
up,” you can resume working more
write in a higher-level language. download the entire file before viewing.
quickly than when cold booting the
computer. spam Unwanted or junk e-mail. structured (analytical) data Data that can
be identified and classified as discrete bits
smartphone A device that combines the spam filter An option you can select in of information (such as a name or phone
functionality of a cell phone, a PMP, and a your e-mail account that places known or number). Unstructured data includes non-
PDA into one unit. suspected spam messages into a folder traditional data such as audio clips (includ-
other than your inbox. ing MP3 files), video clips, and pictures that
social bookmark (tag) A keyword or term
that Internet users assign to a Web resource speaker An output device for sound. must be viewed in their entirety rather than
such as a Web page, digital image, or video. in discrete segments.
speech-recognition software (voice-
social engineering Any technique that recognition software) Software that structured query language (SQL) The
uses social skills to generate human interac- translates spoken words into typed text. most popular database query language
tion for the purpose of enticing individuals today.
to reveal sensitive information. spider A program that constantly collects
information on the Web, following links in stylus A pen-shaped device used to tap or
social networking A means by which peo- Web sites and reading Web pages. Spiders write on touch-sensitive screens.
ple use the Internet to communicate and get their name because they crawl over the subject directory A structured outline of
share information among their immediate Web using multiple “legs” to visit many Web sites organized by topics and
friends, and meet and connect with others sites simultaneously. subtopics.
through common interests, experiences, and
friends. spooler A program that helps coordinate summary report A report that summarizes
all print jobs being sent to the printer at the data in some fashion (such as a total of the
software The set of computer programs or same time. day’s concession sales at an amusement
instructions that tells the computer what to park). Also known as a summary data
do and enables it to perform different tasks. spreadsheet software An application pro-
report.
gram such as Microsoft Excel or Lotus 1-2-3
Software as a Service (SaaS) Software that that enables a user to do calculations and supercomputer A specially designed
is delivered on demand over the Internet. numerical analyses easily. computer that can perform complex
EDITION
EIGHTH
8
calculations extremely rapidly; used in situ- system file Any of the main files of an tax preparation software An application
ations in which complex models requiring operating system. program, such as Intuit’s TurboTax or H&R
intensive mathematical calculations are Block’s TaxCut, for preparing state and fed-
needed (such as weather forecasting or system requirements The set of minimum eral taxes. Each program offers a complete
atomic energy research). storage, memory capacity, and processing set of tax forms and instructions as well as
standards recommended by the software expert advice on how to complete each
surge protector A device that protects com- manufacturer to ensure proper operation of form.
puters and other electronic devices from a software application.
power surges. TCP/IP The main suite of protocols used
System Restore A utility in Windows that on the Internet.
surround sound A type of audio restores system settings to a specific previ-
processing that makes the listener experi- ous date when everything was working telephony The use of equipment to pro-
ence sound as if it were coming from all properly. vide voice communications over a distance.
directions.
system restore point In Windows, a snap- Telnet A network protocol used primarily
surround-sound speakers Speaker systems shot of your entire system’s settings used on the Internet for connecting to a remote
set up in such a way that they surround an for restoring your system to a prior point in computer to make it accessible to other
entire area (and the people in it) with time. computers.
sound.
system software The set of programs that template A form included in many produc-
S-video (super video) A type of technology enables a computer’s hardware devices and tivity applications that provides the basic
used to transmit video signals; used on application software to work together; it structure for a particular kind of document,
newer LCD monitors, as well as other mul- includes the operating system and utility spreadsheet, or presentation.
timedia devices such as televisions, DVD programs.
terabyte 1,099,511,627,776 bytes or 240
players, and projectors.
system unit The metal or plastic case bytes.
swap file (page file) A temporary storage that holds all the physical parts of the com-
terminator A device that absorbs a signal
area on the hard drive where the operating puter together, including the computer’s
so that it is not reflected back onto parts of
system “swaps out” or moves the data or processor (its brains), its memory, and the
the network that have already received it.
instructions from random access memory many circuit boards that help the computer
(RAM) that have not recently been used. function. test condition A check to see whether a
This process takes place when more RAM loop is completed.
space is needed.
switch A device for transmitting data on a
T testing plan In the problem statement, a
plan that lists specific input numbers that
network. A switch makes decisions, based the program would typically expect the
T line A high-speed fiber-optic communi-
on the media access control (MAC) address user to enter. It then lists the precise output
cations line that is designed to provide
of the data, as to where the data is to be values that a perfect program would return
much higher throughput than conventional
sent. for those input values.
voice (telephone) and data (DSL or cable)
syncing (or synchronizing) The process of lines. text field A database field that can hold
updating data on portable devices (such as any combination of alphanumeric data
table In database terminology, a group of
a cell phone or iPod) and computer so that (letters or numbers) and is most often used
related records. Also called a file.
they contain the same data. to hold text.
Tablet PC A notebook computer designed thermal printer A printer that works either
syntax An agreed-upon set of rules defin- specifically to work with handwriting
ing how a programming language must be by melting wax-based ink onto ordinary
recognition technology. paper (in a process called thermal wax trans-
structured.
Task Manager utility A Windows utility fer printing) or by burning dots onto spe-
syntax error An error that violates the that shows programs currently running cially coated paper (in a process called direct
strict, precise set of rules that defines a and permits you to exit nonresponsive thermal printing).
programming language. programs when you click End Task. third-generation language (3GL, or high-
system development life cycle (SDLC) An Task Scheduler utility A Windows level language) A computer language that
organized process (or set of steps) for devel- utility that enables you to schedule tasks uses symbols and commands to help pro-
oping an information processing system. to run automatically at predetermined grammers tell the computer what to do.
times with no interaction necessary on thrashing A condition of excessive paging
system evaluation The process of looking
your part. in which the operating system becomes
at a computer’s subsystems, what they do,
and how they perform to determine taskbar In later versions of Windows sluggish.
whether the computer system has the right operating systems, a feature that displays three-way handshake A process used by
hardware components to do what the user open and favorite applications for easy the Transmission Control Protocol (TCP) to
ultimately wants it to do. access. establish a connection.
Glossary 663
eighth
EDITION
EIGHTH
8
throughput The actual speed of data trans- transmission media The radio waves or urban legend A hoax that becomes so well
fer that is achieved. It is usually less than cable that transport data on a network. known that it is accepted by society as true
the data transfer rate and is measured in even though it is false. Also known as an
Transport Layer Security (TLS) A protocol
megabits per second (Mbps). urban myth.
that provides data integrity and security for
time bomb A virus that is triggered by the transmissions over the Internet. USB 2.0 port An external bus that supports a
passage of time or on a certain date. data throughput of 480 Mbps; these buses are
Trojan horse A computer program that
backward compatible with buses using the
time-variant data Data that doesn’t all per- appears to be something useful or desirable
original universal serial bus (USB) standard.
tain to one period in time—for example, (such as a game or a screen saver), but at
data in a data warehouse. the same time does something malicious User Datagram Protocol (UDP) A protocol
in the background without the user’s that prepares data for transmission but that
token method The access method that ring
knowledge. has no resending capabilities.
networks use to avoid data collisions.
twisted pair cable Cables made of copper user interface Part of the operating system
toolbar A group of icons collected for easy
wires that are twisted around each other that enables individuals to interact with the
access.
and are surrounded by a plastic jacket (such computer.
top-down design A systematic approach in as traditional home phone wire).
utility program A small program that
which a programming problem is broken
performs many of the general housekeep-
down into a series of high-level tasks.
ing tasks for the computer, such as system
top-level domain (TLD) The suffix, often U maintenance and file compression.
of three letters, in the domain name (such as
ubiquitous computing The condition in
.com or .edu) that indicates the kind of
which computing is so woven into the
organization the host is.
fabric of everyday life that it becomes indis-
touch screen A type of monitor (or display tinguishable from it. V
in a notebook or PDA) that accepts input
Uniform Resource Locator (URL) A Web validation The process of ensuring that
from a user touching the screen.
site’s unique address; an example is data entered into a database is correct (or at
touchpad A small, touch-sensitive screen at microsoft.com. least reasonable) and complete.
the base of a notebook keyboard. To use the
touchpad, you simply move your finger uninterruptible power supply (UPS) A de- validation rule A rule that is set up in a
across the pad to direct the cursor. vice designed to power a computer from database to alert the user to possible wrong
large batteries for a brief period during a entries.
track A concentric circle that serves as a loss of electrical power.
storage area on a hard drive platter. variable A name or symbol that stands for
universal serial bus (USB) port A port that a value.
trackball mouse A mouse with a rollerball can connect a wide variety of peripheral de-
on top instead of on the bottom. Because variable declaration A line of program-
vices to the computer, including keyboards,
you move the trackball with your fingers, it ming code that alerts the operating system
printers, mice, smartphones, PDAs, flash
doesn’t require much wrist motion, so it’s that the program needs to allocate storage
drives, and digital cameras.
considered healthier for your wrists than a space in random access memory (RAM) for
traditional mouse. UNIX An operating system originally con- the variable.
ceived in 1969 by Ken Thompson and Den-
trackpoint device A small, joystick-like VBScript A subset of Visual Basic; also
nis Ritchie of AT&T’s Bell Labs. In 1974, the
nub that enables you to move the cursor used to introduce interactivity to Web
UNIX code was rewritten in the standard
with the tip of your finger. pages.
programming language C. Today there are
transaction processing system (TPS) A various commercial versions of UNIX. vertical market software Software that is
system used to keep track of everyday developed for and customized to a specific
unshielded twisted pair (UTP) cable The
business activities (such as sales of industry’s needs (such as a wood inventory
most popular transmission media option
products). system for a sawmill) as opposed to
for Ethernet networks. UTP cable is com-
software that is useful across a range of
transceiver In a wireless network, a device posed of four pairs of wires that are twisted
industries (such as word processing
that translates the electronic data that needs around each other to reduce electrical
software).
to be sent along the network into radio interference.
waves and then broadcasts these video blog See video log.
unstructured data Nontraditional database
radio waves to other network nodes.
data such as audio clips (including MP3 video card (video adapter) An expansion
Transmission Control Protocol (TCP) A files), video clips, pictures, and extremely card that is installed inside a system unit to
protocol that prepares data for transmission large documents. Data of this type is known translate binary data (the 1s and 0s the com-
and provides for error checking and resend- as a binary large object (BLOB) because it is puter uses) into the images viewed on the
ing lost data. actually encoded in binary form. monitor.
EDITION
EIGHTH
8
video graphics array (VGA) port A port to
which a CRT monitor connects.
W WiFi (Wireless Fidelity) The 802.11 stan-
dard for wireless data transmissions estab-
lished by the Institute of Electrical and
video log (vlog or video blog) A personal warm boot The process of restarting the
Electronics Engineers (IEEE).
online journal that uses video as the pri- system while it’s powered on.
mary content in addition to text, images, wiki A type of Web site that allows anyone
Web 2.0 Tools and Web-based services that
and audio. visiting the site to change its content by
emphasize online collaboration and sharing
adding, removing, or editing the content.
video memory RAM that is included as among users.
part of a video card. window In a graphical user interface, a rec-
Web browser (browser) Software installed
tangular box that contains programs dis-
viewing angle Measured in degrees, this on a computer system that allows individuals
played on the screen.
tells how far you can move to the side of (or to locate, view, and navigate the Web.
above or below) the monitor before the Windows An operating system by Mi-
Web page authoring software Programs
image quality degrades to unacceptable crosoft that incorporates a user-friendly,
you can use to design interactive Web pages
levels. graphical interface.
without knowing any HyperText Markup
virtual memory The space on the hard Language (HTML) code. Windows 7 Microsoft operating system that
drive where the operating system builds upon the security and user interface
Web server A computer running a special-
stores data if there isn’t enough random upgrades that the Windows Vista release
ized operating system that enables it to host
access memory (RAM) to hold all of provided, and gives users with touch-screen
Web pages (and other information) and
the programs you’re currently trying monitors the ability to use touch commands
provide requested Web pages to clients.
to run. to scroll, resize windows, pan, and zoom.
Web service A program used by a Web site
virtual private network (VPN) A network Windows Explorer The main tool for
to make information available to other Web
that uses public communication pathways finding, viewing, and managing the con-
sites.
(usually the Internet) to provide branch of- tents of your computer by showing the
fices or employees who are not at the office Web site A location on the Web. location and contents of every drive, folder,
with secure access to the company network. and file.
Web-based application software A pro-
VPNs maintain privacy by using secure gram that is hosted on a Web site and does wireless access point (WAP) A device simi-
data communication protocols. not require installation on the computer. lar to a switch in an Ethernet network. It
virtual reality program Software that turns takes the place of a wireless network adapter
webcam A small camera that sits on top of
an artificial environment into a realistic and helps relay data between network
a computer monitor (connected to the com-
experience. nodes.
puter by a cable) or is built into a notebook
computer and is usually used to transfer Wireless Application Protocol (WAP) The
virus A computer program that attaches it-
live video. standard that dictates how handheld devices
self to another computer program (known
will access information on the Internet.
as the host program) and attempts to webcast The broadcast of audio or video
spread itself to other computers when files content over the Internet. Unlike a podcast, wireless Internet service provider
are exchanged. a webcast is not updated automatically. (wireless ISP) An ISP that provides
service to wireless devices such as
virus signature A portion of the virus code white-hat hacker A hacker who breaks
PDA/smartphones.
that is unique to a particular computer into systems just for the challenge of it (and
virus and makes it identifiable by antivirus who doesn’t wish to steal or wreak havoc Wireless Markup Language (WML) A for-
software. on the systems). Such hackers tout them- mat for writing content viewed on a cellular
selves as experts who are performing a phone or personal digital assistant (PDA)
Visual Basic (VB) A programming needed service for society by helping that is text-based and contains no
language used to build a wide range of companies realize the vulnerabilities that graphics.
Windows applications quickly. exist in their systems.
wireless media Communications media
visual programming A technique for whole-house surge protector A surge that do not use cables but instead rely on
automatically writing code when the pro- protector that is installed on (or near) the radio waves to communicate.
grammer says the layout is complete. It breaker panel of a home and protects all
helps programmers produce a final applica- wireless network interface card (wireless
electronic devices in the home from power
tion much more quickly. NIC) A card installed in a system that con-
surges.
nects with wireless access points on the net-
VoIP (Voice over Internet Protocol). wide area network (WAN) A network work.
made up of local area networks (LANs)
volatile storage Temporary storage, such wireless range extender A device that am-
connected over long distances.
as in random access memory (RAM). When plifies your wireless signal to get it out to
the power is off, the data in volatile storage widget A mini-application developed for parts of your home that are experiencing
is cleared out. the Macintosh platform. poor connectivity.
Glossary 665
eighth
EDITION
EIGHTH
8
wizard A step-by-step guide that walks Internet are (1) its use of common commu- worm A program that attempts to travel be-
you through the necessary steps to com- nication protocols (such as Transmission tween systems through network connec-
plete a complicated task. Control Protocol/Internet Protocol, or tions to spread infections. Worms can run
TCP/IP) and special languages (such as the independently of host file execution and are
word processing software Programs
HyperText Markup Language, or HTML) active in spreading themselves.
used to create and edit written
that enable different computers to talk to
documents such as papers, letters, and
résumés.
each other and display information in
compatible formats; and (2) its use of spe-
Z
World Wide Web (WWW or Web) The cial links (called hyperlinks) that enable
zombie A computer that is controlled by a
part of the Internet used the most. What users to jump from one place to another
hacker who uses it to launch attacks on
distinguishes the Web from the rest of the in the Web.
other computer systems.
EDITION
EIGHTH
Index
8
1GL (first-generation Adobe Premiere Pro Apple iPhone, 57, 211, 369, 373 Assembly language, 356–357, 486,
language), 486 (software), 176 Apple iPod (personal media 487. see also Programming
2GL (second-generation Adobe Reader (software), 107, 184 player), 103, 211, 378, 381 languages
language), 486 ADrive (online storage), 436 Apple iPod Touch (personal Association for Computing
3D sound card, 290 Advanced Research Projects media player), 57, 378 Machinery (ACM), 469,
3ds Max (software), 184 Agency Network Apple iWork, 171 477, 504
3G networks, 372–373 (ARPANET), 94 Apple Magic Mouse, 56 Association for Information
3GL (third-generation Adware, 430 Applet, 500, 625 Systems (AIS), 469
language), 487 Adware removal programs, 292 Application layer, 582 Association for Information
4G networks, 373, 586 Affective computing, 21 Application programming Technology Professionals
4GL (fourth-generation AFP (Apple File Protocol), 584 interface (API), 220–221 (AITP), 469
language), 487 Aggregators, 103 Application servers, 571–572 Association for Women in
4INFO, 372 Agriculture, and computers, 14 Application software, see also Computing (AWC), 470
5GL (fifth-generation AIFF files, 176 Open source software Asus Eee PC netbook, 393
language), 487 Aiken, Howard, 43 business software, 180–184 Asynchronous JavaScript and
32-bit systems, 218 Aircards, 124 buying, 186–187 XML (AJAX), 502, 503, 624
40-bit keys, 629–630 AirPort Extreme router, 321 database software, 166–167 Atanasoff, John, 43
64-bit systems, 218 AJAX (Asynchronous JavaScript defined, 50, 162 Atanasoff-Berry Computer, 43
128-bit keys, 630 and XML), 502, 503, 624 digital audio software, 174–176 Athlon processors, 273
411sms, 372 Alarms, 443 digital image editing software, Atlanta Ballet, 8
802.11 standard, 316 Algorithms, 478, 480–482 172–173 Attribute license, 388
802.11g standard, 320, 322, 581 Alibaba.com, 104, 540 digital video editing software, Audacity (audio software),
802.11n standard, 316, Alice (game design software), 179 176–177 176, 381
320–322, 334 Allen, Paul, 35, 39 drawing software, 180 Audible.com, 174
802.3 standard, 316 All-in-one computers, 50 educational software, 179–180 Augmented reality, 396–397
All-in-one printers, 63 entertainment software, 178 Authentication servers, 570–571
Alphabetic check, 529 gaming software, 178–179 Autodesk 3ds Max (software), 184
A Altair 8800 computer, 35 help with, 184–186 Autodesk AutoCAD
A Programmer’s Language AltaVista (search engine), 115–116 integrated, 169–170 (software), 184
(APL), 490 Alto (personal computer), 40, 41 integrated help, 186 Autodesk Maya (software), 184
AAC files, 378 Amazon Elastic Compute Cloud media management software, Automotive technology, 14–15
AbiWord (word processing (Amazon EC2), 634 177–178 AVI files, 387
software), 163 Amazon Kindle, 371, 393 note taking software, 166–167
Academic fair use, 118 Amazon Video Demand, 325 personal financial software,
Academic Superstore, 189 Amazon.com, 105, 108, 524 171–172 B
.accdb (file name extension), 230 AMD processors, 273 personal information B2B (business-to-business)
Accelerated design, 476 American Psychological management software, e-commerce, 108
Access card reader, 592, 593 Association (APA), 121 168–169 B2C (business-to-consumer)
Access method (bus American Standard for preinstalled, 187–188 e-commerce, 108
network), 574 Information Interchange presentation software, 166 Babbage, Charles, 42
Accounting software, 181 (ASCII), 352 productivity software, Back injury, 79
Acer Aspire easyStore server, Amyotrophic lateral sclerosis 162, 169 Backdoor programs, 419
311, 324 (ALS), 15 spreadsheet software, 165–166 Backup and Restore utility, 239,
ACK (positive Analog waves, 364, 365 suites, 170–171 437–438
acknowledgment), 617 Analog-to-digital conversion, tutorials, 186 Backups, see also Storage devices
ActionScript, 501, 503 364–365 Web-based, 188–189 Backup and Restore utility,
Active Server Pages (ASP), Analog-to-digital converter chip, word processing software, 437–438
501, 503 366, 377 163–164 data files, 435–436
Active topology, 575 Analytical data, 525 AppScout (Web site), 161 defined, 435
Active@ Kill Disk (program), 295 Analytical Engine, 42 ArcadePod.com, 626 files on school’s network, 438
Adams, Tom, 148 Android (operating system), 211, Archos 7 (personal media frequency, 436
Adapter cards, 67 214, 367 player), 378 home servers, 437
Ad-Aware, 432 Android Market, 370 Arithmetic logic unit (ALU), 357 image, 436
Addicting Games, 106 Angel (educational software), 179 Armed Services Vocational incremental, 436
Administrator account, 426–427 Animators, 462 Aptitude Battery local drives, 437
Adobe Acrobat (software), 184 Anita Borg Institute for Women (ASVAB), 12 network-attached storage
Adobe Dreamweaver (software), and Technology, 470 ARPANET (Advanced Research devices, 437
181, 256, 500 Antivirus software, 413, 414–416 Projects Agency online sites, 436–437
Adobe Encore (video AOL Instant Messenger, 632 Network), 94 partial, 436
software), 389 Apache HTTP Server, 572 Arrow key, 54 program files, 435
Adobe Flash Video format, 178, APL (A Programmer’s Artificial language (AI), 547 system, 436
387, 501 Language), 489 Arts, and computers, 8–9 Time Machine, 438
Adobe Illustrator (software), 180 Apple AirPort Extreme router, 321 Ascentix Corporation, 190 Backward compatibility, 316
Adobe InDesign (software), 181 Apple computers, 36. see also Mac ASCII (American Standard Baidu (Web site), 154
Adobe Photoshop Album Starter computers Code for Information Balancing principle, 358
Edition, 173 Apple File Protocol (AFP), 584 Interchange), 350 Ballmer, Steve, 148
Adobe Photoshop Elements Apple GarageBand, 174 ASP (Active Server Pages), Bandwidth, 313
(software), 173 Apple iMovie, 176 501, 503 Base (Open Office), 255
Adobe Photoshop (software), 172 Apple iPad, 57, 325, 393–394 Aspect ratio, 61 Base 2 number system, 350
667
eighth
EDITION
EIGHTH
8
Base 10 number system, 350 Blu-ray, 13, 70–71, 283–285 C⫹⫹ programming language, size, weight and
Base transceiver station, 366 .bmp (file name extension), 230 498–499, 503 capabilities, 392
Basic input/output system Bomb software, 444 Cable Internet, 121–122, 126 software, 369–370
(BIOS), 222 Bookmarks feature (browser), 114 Cables, 317–318 synchronization services,
BASIC programming language, Boolean operators, 117 Cache, 108 Web-based, 370–372
38, 487 Boot Camp utility (Mac OS X), Cache memory, 273, 274, 355–356 synchronizing with
Bastion host, 594 212, 261 Cactus Spam Filter, 432 computers, 370
Batch processing, 544 Boot process Cailliau, Robert, 95 virtual phone number, 376
Battlegroundeurope.com activating BIOS in, 222 Calc (OpenOffice), 253 viruses, 376
(multiplayer online checking configurations and Call a Bike program, 395 wireless file transfer, 370
game), 106 customizations in, 223 Camcorders, 57–59 Cellular modems, 124
BD Remote app, 325 defined, 221 Cameras, see Digital cameras Center for Women and
BD-ROM discs, 284 handling errors in, 223–224 CampusTech, 189 Information Technology
BearShare (software), 380–381 loading the operating system Camtasia Studio, 191 (CWIT), 470
Beginners All-Purpose Symbolic in, 222 Canon EOS 5D Mark II Central office, 122
Instruction Code (BASIC), 39 login name, 223 camera, 384 Central processing unit, see CPU
Behaviors, 484 password, 223 CAPTCHA program, 413 (central processing unit)
Bell Telephone Laboratories, 44 performing power-on self-test Car Whisperer (software), 424 Cerf, Vinton, 94
Berners-Lee, Tim, 95 in, 222 Careers Certifications, 468
Best Buy, 108 Safe mode, 223–224 computers in CGI (common gateway interface),
Beta version, 191, 494–495 steps in, 221–222 agriculture, 14 622–623
Better Business Bureau (BBB), 109 Boot-sector viruses, 411–412 arts, 8–9 CGI scripts, 623
BeyondTV, 391 Botnet, 420 automotive technology, 14–15 ChaCha (text messaging service),
Binary decisions, 482–483 Bots, 413, 420 business, 7–8 372
Binary digit, 49 Brain Age2 (program), 179 education, 9–11 Chair, 78
Binary language, 49 BrainGate Neutral Interface, 15 law enforcement, 11 Chandler (personal information
Binary large object (BLOB), 525 Breadcrumb links, 113–114 medicine, 15–18 management software), 168
Binary number system Breaks, taking, 78 military, 12–13 Charge-coupled device (CCD)
ASCII codes, 352 Bricklin, Dan, 39, 40 nanotechnology, 20 arrays, 383
decimal numbers, 352–353 Bridges, 587 package tracking, 7–8 Chat rooms, 98
defined, 350 Brightness, 61 psychology, 21–22 ChatZilla (online communication
integer representation, 350–352 Broadband connection, retail, 6–7 tool), 98
interpretation, 353–354 121–123 science, 18–19 China
Unicode, 352–353 Browsers, 95, 110–111 sports science, 19–20 free speech in, 154–155
Bing (search engine), 115–116 Buddy list, 98, 632 video game design, 9 intellectual property protection
Bioengineering Institute, 16 Buffalo Technology, 437 in information technology in, 148
Biomedical chip implants, 17–18 Buffer, 218 common myths, 459–460 Chrome (browser), 111, 428
Biometric authentication device, Bugs, 476 finding jobs in, 468–470 CIDR (classless interdomain
429, 592–593 Build-your-own computer information systems, 466–467 routing), 614
Bistable screens, 80–81 advantages and disadvantages job outlook, 457–459 Circuit switching, 612
Bit, 49, 352 of, 25 preparing for, 467–468 Citizendium (online
BitTorrent (file-sharing service), case, 263 resources for women in, 470 encyclopedia), 102
610–611 hard drives, 264 salaries, 461 City CarShare program, 395
Bizrate.com, 109 motherboard, 263–264 support services, 467 Clark, Jim, 41
Black Worm virus, 412 optical drive, 264 systems development, 464–466 Classless interdomain routing
Blackberry, 211, 374 power supply, 264 types of, 460 (CIDR), 614
Blackberry App World, 369, 370 processor, 264 web development, 462–464 Click-and-brick business, 108
Blackboard (educational random access memory, 264 Cascading style sheet (CSS), Clickstream data, 541–542
software), 9, 102, 179 sound card, 264 624–625 Client-based e-mail, 97
Black-hat hackers, 417 video card, 264 Cascio, Jamais, 396 Clients, 120
Blender (3D modeling software), Bus topology, 573–574, 578 Case, 263 Client/server networks
102, 184, 504 Business Cat 6 cable, 317, 580 access privileges, 589–592
Blinkx (video search engine), 101 and computers, 7–8 Cat 6a cable, 580 authentication, 589
Bloatware, 188 software for, 180–184 CD players and recorders, 13 classifications, 566–569
BLOB (binary large object), 525 Business Software Alliance (BSA), CD-ROM discs, 284 components of, 569–570
Blog scraping, 101 148–149, 187 Cell phones defined, 120, 311, 565–570
Blogcatalog (blog directory), 101 Business-to-business (B2B) accessing home computer firewalls, 594
Blogger.com, 101 e-commerce, 108 from, 366 network security for, 588–595
Bloghub (blog directory), 101 Business-to-consumer (B2C) atmospheric sensors, 396–397 vs. peer-to-peer networks,
Blogs, 100–102, 143 e-commerce, 108 cameras, 383 565–566
Bluebugging, 424 Butterscotch.com, 190, 191 checking e-mail with, 374 physical protection measures,
Bluesnarfing, 424 Bytes, 49, 352 components of, 367 592–594
Bluetooth digital signal processing, 366 scalability, 566
attacks, 423–424 Client-side program, 625
overview, 8 C features, 366
input and output devices, Clip-on microphones, 59
printers, 63 C programming language, 487, 367–368 Clock cycle, 354
tethering, 373 498–499, 503 keeping number private, 376 Clock speed, 273, 354
transferring files with, 370 C# programming language, operating systems, 367 Close-talk microphones, 59
in virtual keyboard, 52 499–500, 503 processor functions in, 367 Cloud computing, 370, 634–635
EDITION
EIGHTH
8
Cluster computing, 358 careers, 6–7 CompuTrace LoJack for CSMA/CD (carrier sense multiple
Clusty (search engine), in careers Laptops, 444 access with collision
115–116 agriculture, 14 Concurrent licenses, 186 detection), 577
CME-24 virus, 412 arts, 8–9 Conficker virus, 410, 412 CSS (cascading style sheet),
Coaxial cables, 313, 580–581 automotive technology, 14–15 Connection speed, 126 624–625
Codd, E.F., 524 business, 7–8 Connectionless protocol, 617 Cursor control key, 54
Code editing, 493 education, 9–11 Connection-oriented protocol, Custom installation, 194
Coding, 478, 486–493. see also law enforcement, 11 616–617 Customer interaction
Programming medicine, 15–18 Connectivity ports, 73 technicians, 463
Cold boot, 75, 220 military, 12–13 Consistency check, 529 Customer relationship
College networks nanotechnology, 20 Consumer-to-consumer (C2C) management (CRM)
access privileges, 589–592 package tracking, 7–8 e-commerce, 108 analysts, 459
authentication, 589 psychology, 21–22 Contrast ratio, 61 Customer relationship
firewalls, 594, 595 retail, 6–7 Control (Ctrl) key, 53 management (CRM)
network security for, science, 18–19 Control Program for software, 182, 542
588–595 sports science, 19–20 Microcomputers (CP/IM), 39 Cutepdf Writer (software), 184
physical protection measures, video game design, 9 Control structures, 483 Cyberbullying, 156–158
592–594 data processing, 48–49 Control unit, 354–355 Cybercrime, 410
Colleges, 467–468 defined, 48 Cookie Pal (software), 434 Cybercriminals, 410
.com domain, 618 do-it-yourself, 263–265 Cookies, 433–434 Cyberloafing, 431
Comments (programming), 489 educational uses, 270 Copyleft, 187, 388 CyberScrub, 295
Commerce server, 610 entertainment uses, 270 Copyright, 118, 148–149, 388 Cyberslacking, 431
Commodore PET computer, 37 ethics and, 144–145 Corel PaintShop Pro Photo, 172
Common gateway interface evaluating Country codes, 113
(CGI), 622–623 audio subsystem, 290–291 Course management D
Communication CPU subsystem, 272–276 software, 179 Dailystocks.com, 116
cell phones, 366–371 desktop vs. notebook system, CPU (central processing unit) Dane-Elec Digital Pen, 57
digital telephony, 366–376 271–272 in automobiles, 14–15 Dashboard (Mac OS X), 225, 261
ethics and, 144, 154–155 memory subsystem, 276–279 benchmarks, 274 Data
over Internet optical storage, 283–286 cache memory, 273, 274, 355–356 clickstream, 541–542
e-mail, 95–97, 627–632 storage subsystem, 279–283 clock cycle, 354 defined, 48, 479
group communication, system reliability, 291–294 clock speed, 273, 354 exporting, 534
98–99 upgrading vs. buying new cores, 68 extracting, 532–533
instant messaging, 97–98, system, 294–296 defined, 68 information systems, 542–549
632–633 video subsystem, 286–290 evaluating, 272 inputting, 527–528
Voice over Internet Protocol, first-generation, 44 front side bus, 69, 274 metadata, 527
374, 376, 633–634 fourth-generation, 44–45 vs. graphics processing unit, 288 normalization of, 535–538
smartphones, 366–371 hardware alternatives to how it works, 273 object-oriented analysis, 484
text messaging, 371–372 Microsoft products, 259–263 machine cycle outputting, 533–534
Communications servers, 572 history of control unit, 354 querying, 532–533
Comodo SecurEMail, 631 BASIC programming decode stage, 356–357 sorting, 532
Compact disc (CD), 70–71, language, 39 defined, 354 validating, 528–532
283–285 early computers, 42–45 execute stage, 357 viewing, 532
CompactFlash card, 71 early PCs, 35–38 fetch stage, 354 Data centralization, 521
Compilation, 491–492 graphical user interface, store stage, 357 Data collision, 577
Compiler, 43, 489, 491–492 40–41 system clock, 354 Data convergence, 548–549
Complementary metal-oxide Internet, 41–42 Moore’s Law, 268 Data dictionary, 526
semiconductor (CMOS), 222 operating systems, 39 multimedia-specific Data files, 435–436
Completeness check, 529 pre-PC computers, 43–47 instructions, 360 Data inconsistency, 519
CompletePlanet (search engine), software applications, 39–40 multiple processing, 360–361 Data link layer, 582
115–116 ideal system, 269–271 multiple-core, 273–274 Data marts, 542
Computational field, 522, 523 parts of for notebook computers, 275 Data mining, 6–7, 549–551
Computer abuse, 156–158 hardware overview, 50 performance of, 68, 275–276 Data packet, see Packet
Computer forensics, 11 input devices, 51–60 pipelining, 358–359 Data plan, 372
Computer literate, 4 motherboard, 67–69 processing power, 68–69, 273 Data redundancy, 519
Computer protocol, 611 output devices, 60–67 selecting, 264 Data staging, 542
Computer security, see Security for storing data and speed, 68 Data storage, 539
Computer support information, 69–71 types of, 273 Data transfer ports, 72–73
technicians, 467 platform, 212 Craigslist, 109 Data transfer rate, 126, 280,
Computer threats, see Threats, portability uses, 270 Crashes, troubleshooting, 313, 574
computer second-generation, 44 292–293 Data types, 489, 522
Computer-aided design (CAD) starting, 221–224 Cray Jaguar supercomputer, 360 Data warehouses, 539–542
software, 184 system evaluation, 272 Creative Commons licenses, 388 Database administrators, 467,
ComputerJobs.com, 505 third-generation, 44 Credit card, 110 521, 538
Computers turning on and off, 75 Credit card fraud, 439 Database designers/developers,
accessing from cell phone, 366 types of, 50–51 Credit card numbers, 459, 465, 521
all-in-one, 50 wise use of, 4–5 417–418, 440 Database management system
building own, 263–265 Computers With Causes, 295 CrossFire, 289 (DBMS), 526–534
business uses, 270 Computing cluster, 358 Crowdsourcing, 395, 630 Database query, 532–533
Index 669
eighth
EDITION
EIGHTH
8
Database schema, 526 Digital cinema, 389–390 DIMMs (dual inline memory DVI (digital video interface),
Database software, 166–167 Digital divide, 22 modules), 277 73–74
Databases, see also Information Digital entertainment Direct thermal printing, 64 Dvorak keyboard, 52
systems vs. analog entertainment, 364 Discounted software, 189–190 DVR (digital video recorder), 13,
advantages of, 520–522 devices, 324–325 Disk Cleanup (Windows utility), 325, 391
creating, 526–527 Digital home, 12–13 235–236, 292 Dye-sublimation printers, 385
defined, 518 Digital image editing software, Disk Defragmenter (Windows Dynamic addressing, 422, 615–616
disadvantages of, 521 172–173 Utility), 236, 238, 292 Dynamic decision making, 501
entering data into, 527–528 Digital lifestyle, 364–365 Disk II, 39 Dynamic host configuration
exporting data, 534 Digital media Display screens, see monitors protocol (DHCP), 615
extracting or querying data, creating, 377 Display utilities, 233 Dynamic HTML, 623–624
532–533 music, 377–380 Distrowatch.com, 258 Dynamic RAM (DRAM), 277
fields in, 522–523 navigation, 381–383 Dmoz.org, 115–116
lists, 518–520 photography, 383–386 DNS (domain name system)
multidimensional databases, video, 386–391 server, 618–619 E
525–526 Digital music .doc (file name extension), 230 Ease of Access Center (Windows
object-oriented databases, 525 copyright, 380 Dock (Mac), 225 utility), 240–241
outputting data, 533–534 downloading, 380 Document object model EB (Exabyte), 49
primary keys in, 523–524 DRM-free, 380 (DOM), 625 eBay, 109
records in, 523 formats, 378 Documentation, 495 EBCDIC (Extended Binary Coded
relational databases, 524, portable media players, 377–378 Documents, 225 Decimal Interchange
534–542 ripping, 379 .docx (file name extension), 230 Code), 352
servers, 572 tethered downloads, 380 Dogpile (search engine), 115–116 E-book reader, 393
tables in, 523 Digital navigation, 381–383 Dolby Digital sound, 290–291 Eckert, J. Presper, 44
types of, 524–526 Digital pen, 57 DOM (document object E-commerce, 104–105, 108–110,
validating, 528–532 Digital photography model), 625 144, 152–153
viewing and sorting data, 532 vs. analog photography, 383 Domain name system (DNS) E-commerce software, 183–184
Data-flow diagrams, 475–476 file formats, 384 server, 618–619 E-cycling, 295
Date field, 522, 523 making old photos digital, 385 Domain names, 112–113, 627–628 EDGE, 372–373
DDR2 (double data rate) moving photos to computer, Donating computers, 295 EDI (electronic data
memory, 277 57–59, 384–385 Doodle, 563 interchange), 568
Debugger, 494 printing digital images, Doping, 349 Editor (tool), 493
Debugging, 478, 493–494 385–386 Dot matrix printers, 62 Education, and computers, 9–11
Decimal notation, 350 resolution, 383–384 Dotted decimal number, 614 Ekman, Paul, 11
Decimal numbers, 352–353 Digital Photography Review, 383 Dotted quad, 614 Elance.com, 104–105
Decision points, 482–483 Digital printing services, 385 Double data rate (DDR2) Electrical switches, 347–348
Decision support system (DSS), Digital rights management memory, 277 Electronic Arts, 178
545–546 (DRM), 380 Download.com, 432, 619, 629 Electronic Communications
Dedicated servers, 570–571 Digital scanners, 385 Downloads, 23 Privacy Act (ECPA), 431
Delicious (social bookmarking Digital signal processor, 366 Dr. Watson for Windows Electronic data interchange
site), 114–115 Digital society, challenges to, (program), 237 (EDI), 568
DeLorme Street Atlas USA, 183 22–23 DRAM (dynamic RAM), 277 Electronic Numerical Integrator
Delta Airlines, 143 Digital subscriber line (DSL), Drawing software, 180 and Computer (ENIAC),
Denial-of-service attacks, 419–420 121–122, 126 Dreamweaver (software), 181, 44, 348
Derivative works, 388 Digital telephony 256, 500 Electronic pen, 51
Desktop, 224–225 defined, 366 Drive bays, 69 Electronic throttle control system
Desktop computers Internet connectivity, 372–374 Drivers, 219–220 (ETCS-I), 14–15
defined, 50 text messaging, 371–372 DRM-free music, 380 E-mail
vs. notebook computers, 271, Voice over Internet Protocol, Droid Incredible, 369 account types, 96
272 374–376 Drones, 13, 14 checking with cell phone, 374
Desktop microphones, 59 Digital television, 390 DSL (digital subscriber line), client-based, 97
Details view, 229 Digital video 121–122, 126 employer monitoring of, 23
Device drivers, 585 advantages, 390–391 DSS (decision support system), encryption, 628–632
Device Manager, 224, 322 editing, 387 545–546 history, 627
DeviceLock (software), 591 menuing system, 388–389 DTV.org, 389 hoaxes, 440–441
DHCP (dynamic host sources, 386, 389 Dual inline memory modules overview, 95–96
configuration protocol), 615 uploading, 389 (DIMMs), 277 privacy issues, 96
Dia (drawing software), 256 watching on portable device, Dual-core processing, 360 protocol, 627
Dial-up connection, 125–126 391 DVD (digital video disk) sending and receiving, 96
Dice.com, 468–469 webcasting, 389 capacity, 70–71 viruses, 413
Difference Engine, 42 Digital video disk, see DVD file formats, 285, 387–388 Web-based, 97, 432
Digital art, 8–9 Digital video editing players and burners, 284–285 writing, 96
Digital audio software, 174–176 software, 176 read only memory, 284 E-mail clients, 96
Digital cameras Digital video interface (DVI), recording to, 386–387 E-mail servers, 572, 627
file formats, 384 73–74 DVD players and recorders, 13 E-mailware, 190
moving photos to computer, Digital video recorder (DVR), 13, DVD+R/RW, 285 Embedded computers, 51
57–59, 384–385 325, 391 DVD-RAM, 285 Embedded systems, 209
resolution, 383–384 Digsby (online communication DVD-ROM discs, 284 Emotional-social prosthesis
selecting, 383 tool), 98, 607 DVD-R/RW, 285 (ESP), 21
EDITION
EIGHTH
8
Employee monitoring, 431 Expansion cards and hubs, 74–75 Firewalls, 327 connecting to computers, 74
Encore (video software), 389 Express card slot, 124 for client/server networks, 594 connecting to home
Encryption, e-mail, 628–632 ExpressCard, 272 for college networks, 595 networks, 325
Encryption viruses, 413 Expression Web, 256 hardware, 421 operating system for, 211
Engadget.com, 101 Extended Binary Coded how it works, 422 Gaming software, 178–179
Enhanced 911 program, 382 Decimal Interchange Code personal, 421 Garmin Nuvi series GPS
Enterprise, 547 (EBCDIC), 352 software, 421 device, 382
Enterprise resource planning Extensible HyperText Markup FireWire 400, 72–73 Gas Boycott (Gas War) hoax,
(ERP) specialists, 459 Language (XHTML), 500, FireWire 800, 72–73 440–441
Enterprise resource planning 501–502, 503, 621–622, 624 FireWire 3200, 73 Gates, Bill, 35, 39
(ERP) system, 182–183, Extensible Markup Language Firmware, 329 GB (gigabyte), 49
547–549 (XML), 502, 503, 622 First-generation computers, 44 General availability (GA), 495
Entertainment projectors, 62 External data sources, 546 First-generation language, 486 Geographic information system
Entertainment software External drive bays, 69 Flash, 501 (GIS), 183
defined, 178 External hard drives, 70, 437 Flash ActionScript, 503 Geolocation, 152–153
drawing software, 180 External SATA (eSATA), 272 Flash drive, 71 GetJar (Web site), 369
educational software, 179–180 Extra Large Icons view, 229 Flash memory, 379 GIAC (Global Information
gaming software, 178–179 Extranets, 568 Flash memory card, 71 Assurance Certification), 333
Entertainment Software Rating Eye-Fi, 385 Flash Player, 107 Gibson Research, 422
Board (ESRB), 178 Flash Video format, 178, 387, 501 GIF files, 230, 235
Environment, effect on Flat-panel monitor, see LCDs Gigabater (e-cycling service), 295
computer, 441 F Flexible keyboard, 52 Gigabit Ethernet, 317
Eraser (program), 295 Facebook (social networking site), Flexible OLED (FOLED), 80–81 Gigabyte (GB), 49
Ergodex D1 keyboard, 52, 53 99, 420, 434–435, 518 Flickr (Web site), 177, 385 GIMP, 256–257
Ergonomics Facebook Chat, 97, 416 Flip SlideHD video GIS (geographic information
avoiding injuries, 77–78 Facilitated team techniques, 476 camcorder, 389 system), 183
chair, 78 Family license, 186 Floating-point standard, 353 Global Information Assurance
defined, 77 Family Maps service, 382 Flooding, 98–99 Certification (GIAC), 333
lighting, 78 Favorites feature (browser), 114 Floppy disk drives, 69 Global Network Initiative
mobile devices, 79 Federal Bureau of Investigation Flowcharts, 475, 481–482 (GNI), 154
monitor positioning, 78 (FBI), 11, 410 Fluid Interfaces group (Media Gmail, 97
ERP (enterprise resource Federal Trade Commission, 439 Lab), 396 GNI (Global Network
planning) specialists, 459 Fedora (operating system), 213 FLV files, 387 Initiative), 154
ERP (enterprise resource Fiber-optic cable, 313, 581 FOLED (Flexible OLED), 80–81 GNOME, 215
planning) system, 182–183, Fiber-optic service, 121–122, 126 Fon.com, 314 GNU General Public License, 187
547–549 Field constraint, 529 Footballsuperstars.com GNU Project, 212, 213
Error handling, 479–480 Field type, 522 (multiplayer online GoEmerchant, 183
Error-checking, 236–237 Field-based IT job, 460 game), 106 Gogo (in-flight Internet
eSATA (external SATA), 272 Fields, 522–523 Foreign keys, 538 service), 123
eStarling TouchConnect, 326 Fifth-generation language, 487 Forensics, computer, 11 GoldMine (customer relationship
Ethernet network, 315–316 File compression, 234–235 FORTRAN, 487 management software), 183
Ethernet port, 73 File servers, 610 Fourth-generation computers, GoodSearch (search engine),
Ethical computing, 58 File Transfer Protocol (FTP), 44–45 115–116
Ethics 112, 619 Fourth-generation language, 487 GoodShop.com, 115–116
computers and, 144–145 Files Frames, 586 Google (search engine), 154–155
cyberbullying and, 156–158 backing up, 239 Frankston, Bob, 39, 40 Google Android (operating
defined, 140 copying, 232 Freeware, 190–191 system), 211, 214, 367
e-commerce and, 152–153 decompressing, 235 Freeware Home (Web site), 190 Google Book Search, 117
electronic communication and, defined, 227 French Institute of Computer Google Checkout, 108, 109
154–155 deleted, location of, 232 Science, 21 Google Chrome (browser),
geolocation and, 152–153 deleted, recovering, 234 Front side bus (FSB), 69, 274 111, 428
intellectual property and, deleting, 232 FrontRange Solutions, 182 Google Docs, 102, 163, 188–189
148–149 deleting permanently, 232 F-Secure, 376 Google Earth, 183
personal, 141–144 extensions, 230 FTP (File Transfer Protocol), Google Groups, 98
privacy and, 150–151 locating, 228 112, 619 Google Maps, 183
social justice and, 146–147 moving, 232 Full installation, 194 Google News, 117
social networking and, naming, 230–231 Function keys, 53 Google News Archives Timeline,
150–151 organizing, 227, 228 Functions (programming), 491 117–118
technology and, 144 saved, locating, 231 Fuzzy logic, 547 Google Picasa, 172, 178
European Organization for searching for, 229 Google Scholar, 117
Nuclear Research, 95 viewing, 229 Google SMS, 372
Events, 216–217 FileZilla, 619 G Google Talk, 416
Evernote, 168 Final Cut Pro (program), 176 GA (general availability), 495 Google Video, 386
Exabyte (EB), 49 Finder utility (Mac OS X), 261 Gabriel, Peter, 396 Google Web History, 626
Excel (program), 40 Fingerprint reader, 429 Gadgets, 225 GoogleSync, 371
Excite (search engine), 115–116 FiOS service, 313 Game controllers, 56, 178 Gorgon Stare (software), 13
Executable program, 492 Firefox (browser), 110–111 Game developers, 466 Gosling, James, 499
Executive computer, 38 Firefox Password Manager, GameMaker (software), 179 GoToMyPC (remote access
Expansion cards, 67 427–428 Gaming consoles service), 366
Index 671
eighth
EDITION
EIGHTH
8
GPS (global positioning system) Hewlett Packard MediaSmart
in automobiles, 382 servers, 325 I overview, 542–543
transaction-processing systems,
on child’s cell phone, 383 Hexadecimal notation, 615 IAB (Internet Architecture Board), 544–545
enhanced 911 feature, 382 Hibernation mode, 76 608 Information Systems Security
features, 383 High-definition multimedia IANA (Internet Assigned Association (ISSA), 469
how it works, 382 interface (HDMI), 74 Numbers Authority), 618 Information technology (IT)
overview, 381–382 High-definition television iBackup (online backup), 437 common myths, 459–460
package tracking with, 8 (HDTV), 390 IBM (International Business defined, 6
privacy and, 152–153 High-definition TVs, 13 Machines), 38, 43 finding jobs in, 468–470
Graphic designers, 462 High-level formatting, 286 iBooks bookstore, 393 information systems, 466–467
Graphical user interface (GUI), High-speed ports, 72–73 IC3 (Internet Crime Complaint job outlook, 457–459
40–41, 214–215 History list, 113–114 Center), 410 preparing for, 467–468
Graphics processing units Hitachi -chip, 18 ICANN (Internet Corporation for resources for women in, 470
(GPUs), 288 Hoaxes, 440–441 Assigned Names and salaries, 461
Grayware, 430 Hoax-Slayer (Web site), 441 Numbers), 608, 614 support services, 467
Group communication, 98–99 Hollerith, Herman, 42–43 iChat, 416 systems development, 464–466
GUI (graphical user interface), Hollerith Tabulating Machine, Icons, 226 types of, 460
40–41, 214–215 42–43 ICQ, 98, 632 Web development, 462–464
Guild Wars (multiplayer online Home area network (HAN), 312 IDE (integrated development Infrared scanners, 8
game), 106 Home business software, 180 environment), 492–493 Inheritance, 485
Guru.com, 104 Home network server, 311, iDefrag, 236 Initial value, 483
323–324 Identity theft, 418 Injuries, avoiding, 77–78
Home networks IEEE (Institute of Electrical and Inkjet printers, 62–63, 65
H cabling, 317–318 Electronics Engineers), InPrivate Browsing (Internet
H&R Block At Home (tax configuring software for, 469, 477 Explorer), 428, 626
preparation 329–335 IETF (Internet Engineering Task Input devices. see also Output
software), 171 digital entertainment devices, Force), 608 devices
Hackers, 4, 417–421 324–325 iFlipr (app), 380 defined, 51
HAN (home area network), 312 digital home, 308–309 iHomework (app), 380 game controllers, 56
Handheld devices equipment, 319–322 IIS (Internet Information image input, 57–59
ergonomics, 79 Ethernet networks, 315–316 Services), 572 keyboard, 51
Internet-enabled, 392–393 for home security, 326 Illustration software, 180 microphone, 59
keyboard, 393 operating system for, 319 Illustrator (software), 180 mouse, 51, 54–56
operating systems for, 211 photo sharing on, 326 iMac computers, 260 for people with disabilities,
screen, 393 securing, 327–329 Image backup, 436 59–60
selecting, 392 wired and wireless nodes, 318 Image editing software, 172–173 sound input, 59
size, weight and Home page, 112 Image input, 57–59 stylus, 51
capabilities, 392 Home security, 326 iMovie, 176 touch screens, 56–57
Handshaking, 616–617 Home servers, 437 Impact printers, 62 touchpad, 55
Hard boot, 220 Home-based IT job, 460 Imperva Application Defense trackpoint device, 55
Hard drives Homebrew Computing Club, Center, 425 web cam, 57–59
access time, 280 35–36 Implantable chip, 17–18 Input form, 528
data transfer rate, 280 Hopper, Green, 43 Impress (OpenOffice), 253–255 Inputs, 479–480
defragmenting, 236, 238 Host name, 112 Incognito feature (Google Installation wizard, 233
erasing, securely, 295 Host program, 410 Chrome), 428 Install.exe, 193
error-checking, 236–237 Hot spots, 123, 373 Incremental backups, 436 Instant messaging (IM), 97–98,
external, 70 Hotmail, 97 InDesign (software), 181 416, 632–633
how it works, 280–281, 286 .html (file name extension), 230 IndustryMastes.com, 10f Institute of Electrical and
internal, 69, 70f HTML (HyperText Markup iNet WOL (Wake on LAN), 316 Electronics Engineers (IEEE),
organizing files, 227–228 Language), 181, 500–503, InfoMine (search engine), 115–116 469, 477
overview, 69–70 621–622, 624 Information, 48, 479 Integers, 350–352
RAID, 283, 284f HTTP (HyperText Transfer Information assurance, 333 Integrated circuits, 44, 349–350
vs. RAM, 276–277 Protocol), 112, 420, 614, Information systems, see also Integrated development
SATA, 282 620–621 Databases environment (IDE), 492–493
selecting, 264 HTTPS (HyperText Transfer careers in, 466–467 Integrated help, 186
solid state drive, 71 Protocol Secure), 621 decision support system, Integrated software application,
storage capacity, 280–281 Hulu.com, 106, 386 545–546 169–170
Hardware, 50 Hushmail, 631 defined, 542–543 Integrated video card, 288
Hardware firewalls, 421 Hyperlink field, 522, 523 enterprise resource planning Intel Core i7, 45, 273
Harvard Mark I, 43 Hyperlinks, 113–114, 620 system, 547–549 Intel Corp., 44–45
Hatch, Orin, 148 Hypertext documents, 620 external data sources, 546 Intel Pentium 4 processor, 359
Hauppage HDTV stick, 282 HyperText Markup Language internal data sources, 546 Intel processors, 273
HDMI (high-definition (HTML), 181, 500–503, knowledge-based systems, 547 Intellectual property, 144, 148–149
multimedia interface), 74 621–622, 624 management information Interactive Body, 9
HDTV (high-definition HyperText Transfer Protocol system, 545 Interface designers, 462
television), 390 (HTTP), 112, 420, 614, model management system, Internal data sources, 546
Head crash, 286 620–621 546–547 Internal drive bays, 69
Hearing damage, 79 HyperText Transfer Protocol office support systems, Internal hard drive, 69, 70f
Helpdesk analysts, 467 Secure (HTTPS), 621 543–544 Internal testing, 494–495
EDITION
EIGHTH
8
International Business Machines Internet Corporation for Assigned
(IBM), 38, 43 Names and Numbers J L
Internet (ICANN), 608, 614 Jacquard, Joseph, 42 LaChapelle, David, 390
anonymous surfing, 428–429 Internet Crime Complaint Center Jacquard loom, 42 Langpop.com, 496
browsers, 110–111 (IC3), 410 JAD (joint application Languages, programming, see
client-side applications, 625–626 Internet Engineering Task Force development), 476 Programming languages
common gateway interface, (IETF), 608 Jam signal, 577 LANs (local area networks),
622–623 Internet exchange point (IXP), 610 Jamglue, 634, 635 312, 567
communication over Internet Explorer, 41, 110 Java applet, 500, 625 Lap injuries, 79
e-mail, 95–97, 627–632 Internet Explorer Mobile, 373–374 Java programming language, 487, Large Icons view, 229
group communication, 98–99 Internet Information Services 499–500, 503 Large scale networking (LSN), 127
instant messaging, 97–98, (IIS), 572 Java Server Pages (JSP), 501, 503 Laser printers, 63, 65
632–633 Internet Packet Exchange (IPX), Java Virtual Machine, 500 Last Know Good
Voice over Internet Protocol, 583–584 JavaScript, 500–501, 503, 624 Configuration, 224
633–634 Internet Protocol (IP), 614 Jing (screen capture software), 207 Lavalier microphones, 59
conducting business over, Internet Protocol (IP) addresses, Jobs, Steve, 35–36, 41 LavaRnd, 629
104–105, 108–110 121, 422, 586, 614–616 Join query, 531 Law enforcement, 11
connecting to, 121–126, 608–610 Internet Protocol version 4 Joint application development LCDs (liquid crystal displays)
broadband, 121–123 (IPv4), 614 (JAD), 476 aspect ratio, 61
dial-up, 125–126 Internet Protocol version 6 Journey Education Marketing, 189 brightness, 61
wireless, 123–125 (IPv6), 615 JPEG files, 230, 235, 384 built-in features, 62
connection speed, 126 Internet Relay Chat (IRC), 98 JSP (Java Server Pages), 501, 503 contrast ratio, 61
creation of, 94 Internet service providers (ISPs), Juice (podcasting software), 381 how it works, 60
data transmission and protocols, 97, 609–610 Juilliard School of Music, 8 overview, 60
611–613 Internet Society (ISOC), 608 Jump drive, 71 response time, 61
delivering computer services Internet tablet, 392 Justtweetit.com, 517 screen resolution, 61
through, 634–635 Internet2, 127 viewing angle, 61
DNS servers, 618–619 Internet-ready digital LeakTest program, 422
domain names, 112–113, television, 13 K Learn the Net (web site), 500
627–628 Interpreter, 492 Kahn, Robert, 94 Legacy technology, 60
dynamic HTML, 623–624 Interrupt, 217 Kama Sutra virus, 412, 422 Level 1 cache, 356
e-commerce, 104–105, 108–110 Interrupt handler, 217 KB (kilobyte), 49 Level 2 cache, 356
emerging technologies, 630 Intranets, 568 KDE, 215 Level 3 cache, 356
entertainment on, 106–108 Intuit QuickBooks, 181 Kernel, 222 Lighting, adequate, 78
FTP, 112, 619 Intuit Quicken, 171–172 Kernel memory, 278 Linear bus topology,
future of, 126–127 IP (Internet Protocol), 614 Key field, 523–524 573–574
growth of, 95 IP (Internet Protocol) addresses, Key fob activator, 443 Linux operating system
history, 41–42, 94 121, 422, 586, 614–616 Keyboard, see also Input devices advantages of, 257–258
how it works, 118–121 iPad, 57, 325, 393–394 Control (Ctrl) key, 53 distributions, 214, 258
HTML, 621–622 iPhone, 57, 211, 369 cursor control key, 54 Mandriva, 259
HTTP, 112, 620–621 iPhone Developer University defined, 51 online security, 428–429
invention of, 94 program, 380 Dvorak, 52 overview, 212–214
inventors of, 94 iPhone OSX, 211 flexible, 52 system requirements, 258
IP addresses, 121, 614–616 iPod (personal media player), 103, function keys, 53 Ubuntu, 259
management of, 608 211, 378, 381 gaming, 52 Liquid crystal display monitor,
mobile, 372–374 iPod Touch (personal media keystroke shortcuts, 54 see LCDs
multimedia content, 106–108 player), 57, 378 multimedia and Internet Lisa (personal computer), 40–41
network model of, 610–611 iProRecorder (app), 380 keys, 54 List view, 229
searching, 115–117 IPv4 (Internet Protocol notebook, 52 Live Bookmarks feature
SSL, 621 version 4), 614 numeric keypad, 53 (Firefox), 114
Telnet, 619–620 IPv6 (Internet Protocol for people with disabilities, Local area network (LAN),
using, 4 version 6), 615 59–60 312, 567
Web 2.0 technologies IPX (Internet Packet Exchange), QWERTY, 52 Locks, 443
blogs, 100–102 583–584 toggle keys, 54 Logic bombs, 412
podcasts, 102–104 IRC (Internet Relay Chat), 98 virtual laser, 52, 53 Logical errors, 494
social networking, 99–100 Iron Mountain (online Windows key, 54 Logical port blocking, 422
video logs, 100–102 backup), 437 wireless, 54 Logical ports, 420–421, 424
webcasts, 104–105 IronKey (portable privacy Keys, 629 Logical topologies, 572–573
wikis, 102 device), 428 Keywords (programming LogiTech Digital Video Security
Web entertainment, 106–108 ISOC (Internet Society), 608 language), 488 System, 326
WIMAX, 630 ISPs (Internet service providers), Kilby, Jack, 44 LogMeIn (remote access
XML, 622 97, 609–610 Kildall, Gary, 39 service), 366
Internet appliance, 325–326 ISSA (Information Systems Kilobyte (KB), 49 LoJack transmitter, 443–444
Internet Architecture Board Security Association), 469 Kindle, 371, 393 Loop (programming), 483
(IAB), 608 IT, see Information technology Knowledge-based Loop topology, 574
Internet Assigned Numbers iTunes, 103, 177, 369, 378, systems, 547 Lotus 1-2-3, 40
Authority (IANA), 618 381, 534 Kodak V1273 camera, 384 Lou Gehrig’s disease, 15
Internet backbones, 120, 609 iWork, 171 Kodak.com, 177 Lovelace, Ada, 42
Internet cache, 620 IXP (Internet exchange point), 610 Koratich, Michael, 8 Low-level formatting, 286
Index 673
eighth
EDITION
EIGHTH
8
LSN (large scale networking), 127 Media Center, 13 Microsoft Streets & Trips, 183 viewing angle, 61
Lucas, George, 389–390 Media computer, 12 Microsoft Tag, 395 wearable screens, 81
Lumosity, 179 Media Lab, 396 Microsoft Visio, 180 Monster.com, 461, 468
Luxeed Dynamic Pixel LED Media management software, Microsoft Windows operating Moodle (educational software),
Keyboard, 47 177–178 system, see Windows 9, 179
MediaWiki, 102 MiFi, 373 Moonbase Alpha (game), 15
Medicine, and computers, 15–18 Military, and computers, 12–13 Moore, Gordon, 268
M Medium Icons view, 229 MIME (multipurpose Internet Moore’s Law, 268
MAC (media access control) Meebo (online communication mail extensions), 628 Mosaic browser, 41, 95
address, 328, 586–587 tool), 98 MIMO (Multiple Input Multiple Motherboard, 67–69, 263–264
Mac computers, 41 MeediOS (software), 363 Output), 316 Motorola, 44–45
buying, 259–260 MeeGo (operating system), 214 Mint.com, 171–172 Mouse
configuring, 261 Megabyte (MB), 49 MIS (management information customizable buttons, 56
desktop, 225 Melissa virus, 413 system), 545 defined, 51
operating system for, 212, Memo field, 522, 523 MIT (Massachusetts Institute of file storage feature, 56
260–261 Memory Technology), 18 magnifier feature, 56
protecting, 262 management, 218–219 MIT Media Lab, 21 multitouch, 56
utility programs, 262–263 minimum requirements, 218 MITS (Micro Instrumentation and optical, 54–55
Mac PhoneHome, 444 random access, 67–68 Telemetry Systems), 35 trackball, 55
MacBook Air computer, 260 read-only, 68 MLA (Modern Language Web search feature, 56
Machine language, 357, 487 Memory cards, 67, 277 Association), 121 wireless, 55–56
Macintosh computers, see Mac Memory modules, 277 MMORPG (massive multiplayer MOV files, 387
computers Memory Stick, 71 online role-playing Mozilla Thunderbird (e-mail
Macro viruses, 413 Menus, 225 games), 106 client), 256
Macros, 169, 474 Messaging Anti-Abuse Working MMS (multimedia message MP3 files, 175–176, 235, 378
Magic Mouse, 56 Group (MAAWG), 410 service), 372 MP3.com, 379–380
MAGIX Music Maker Metadata, 527 Mobile coupons MP4 files, 176, 387
(software), 174 Metal-oxide varistors (mobicoupons), 394 MPEG files, 387
Magnifier (Windows utility), 240 (MOVs), 442 Mobile devices MPG files, 387
Mainframe computers, Methods, 484 ergonomics, 79 MS-DOS (Microsoft Disk
50–51, 210 Methods (programming), 491 Internet-enabled, 392–393 Operating System), 39, 208
MakeTechEasier, 169 Metropolitan area network keyboard, 393 Multi-core processing, 360–361
MalekTips, 186 (MAN), 312, 567 operating systems for, 211 Multidimensional databases,
Malware, 430 Mibbit (online communication screen, 393 525–526
Malwarebytes Anti-Malware, 432 tool), 98 selecting, 392 Multimedia content, 106–108
Management information system Michelangelo virus, 412 size, weight and Multimedia message service
(MIS), 545 Micro Instrumentation and capabilities, 392 (MMS), 372
Mandriva Flash (portable Telemetry Systems Mobile DTV, 369 Multimedia ports, 73–74
operating system), 259 (MITS), 35 Mobile Internet, 372–374 Multimedia software
Mandriva Linux (operating Micro SD cards, 370 Mobile switching center, 366 defined, 172
system), 259 Microbrowser, 373–374 Mobile WiMAX, 123 digital audio software, 174–176
MANs (metropolitan area Microchip implants, 17–18 MobileMe, 370–371 digital image editing software,
networks), 312, 567 Microexpression Training Tool, 11 MobileVoice, 395 172–173
Many-to-many relationship, 534 Microexpressions, 11 MOD Films, 391 digital video editing software,
Mapping programs, 183 Microphones, 59–60 ModCloth.com, 630–631 176–177
MapQuest, 183 Microprocessors, 44–45, 349 Model management system, media management software,
MAR (Microsoft Authorized Microsoft, 39, 154–155 546–547 177–178
Refurbisher), 22 Microsoft Authorized Refurbisher Modem, 125 speech recognition software, 174
Marketing, 395 (MAR), 22 Modem card, 67 voice recognition software, 174
Massachusetts General Hospital Microsoft Disk Operating System Modern Language Association Multimedia tours, 9–10
Utility Multi-Programming (MS-DOS), 39, 208 (MLA), 121 Multipartite virus, 414
System (MUMPS), 505 Microsoft Excel (program), 40 Modules (programming), 491 Multiplayer online games, 106
Massachusetts Institute of Microsoft Expression Web, 181 MoGo Mouse, 56 Multiple Input Multiple Output
Technology (MIT), 18 Microsoft Internet Information MoMA (Museum of Modern (MIMO), 316
Massive multiplayer online Services (IIS), 572 Art), 10 Multipurpose Internet mail
role-playing games Microsoft Knowledge Base, 293 Money, Microsoft (program), extensions (MIME), 628
(MMORPGs), 106 Microsoft Live Movie Maker, 176 171–172 Multitouch mouse, 56
Master boot record, 411 Microsoft Money (program), Monitors Multiuser operating system, 210
Mathematical Markup Language 171–172 bistable screens, 81 MUMPS (Massachusetts General
(MathML), 622 Microsoft .NET Framework, cathode ray tube, 60 Hospital Utility Multi-
Mauchly, John W., 44 190, 498 cleaning, 61 Programming System), 505
MaxiCode smart label, 8 Microsoft Office 2010, 170 contrast ratio, 61 Museum of Modern Art
Maya (software), 184 Microsoft Office Web Apps, defined, 60 (MoMA), 10
McAffee, 376 188, 189 flexible OLED, 80–81 Museums, 9–10
McAffee Internet Security Microsoft On-Demand Webcasts, how it works, 60 Music, see Digital music
(software), 421 105 liquid crystal display, 60–62 Music Genome Project, 524
Media, see Digital media Microsoft Outlook (application), organic light-emitting diode, 80 MusicID, 374
Media access control (MAC) 97, 169, 432 positioning, 78 MySpace (social networking
address, 328, 586–587 Microsoft Photo Story, 172 screen size, 61 site), 99
EDITION
EIGHTH
8
MySQL, 255–256 Network operating system (NOS), Norton Internet Security, 415, 421 database software, 255–256
Myvu (personal media viewer 210, 315, 569, 583–584 NOS (network operating system), drawing software, 256
display), 81 Network prefix, 614 210, 315, 569, 583–584 e-mail client, 256
Mywife virus, 412 Network Solutions, 618 Note taking software, 166–167 image editing, 256–257
Network topologies Notebook computers license, 186–187
active, 575 defined, 50 Linux operating system, 213
N bus, 573–574 vs. desktop computers, 271, 272 overview, 163
NAK (negative comparison of, 578 size, weight and productivity software, 253–255
acknowledgment), 617 defined, 569, 572 capabilities, 392 web page authoring, 256
Nanoprobes, 20 physical, 572 touchpad, 55 Open system, 611
Nanoscience, 20 ring, 574–576 trackpoint device, 55 Open Systems Interconnection
Nanostructures, 20 star, 575–578 upgrading, 272 (OSI), 582
Nanotechnology, 20 Network-attached storage (NAS) NSA (National Security OpenOffice
Nanowires, 21 devices, 323, 437 Agency), 333 Base, 255
Napster, 380–381 Networking software, 315 NSF (National Science Calc, 253
Narrator (Windows utility), 240 Network-ready device, 323–324 Foundation), 608 Impress, 253–255
NAS (network-attached storage) Networks Number system, 350 overview, 163, 253–254
devices, 323, 437 advantages of, 564 Numeric check, 529 Writer, 253
NAT (network address architectures, 310–312 Numeric field, 522, 523 Opera Mobile, 374
translation), 423 benefits of, 309–310 Numeric keypad, 53 Operating systems
National Broadband Plan, 127 client/server networks, 311, NW3C (National White Collar alternatives, 257–259
National Center for 565–570 Crime Center), 410 boot process, 221–224
Supercomputing components, 312–315 categories, 208
Applications, 18, 95 configuring software for, for cell phones and
National Center for the Analysis 329–332 O smartphones, 367
of Violent Crime, 11 defined, 309 Object field, 522, 523 defined, 50, 208
National Highway Traffic Safety for digital entertainment, 13 Object query language (OQL), 525 desktop, 224–227
Association (NHTSA), 15 disadvantages of, 310, 564–565 Objective C, 503 file management, 227–232
National Science Foundation equipment, 319–320 Object-oriented analysis, 484–486 functions of, 208, 214–221
(NSF), 608 home networks, 308–309 Object-oriented databases, 525 for gaming consoles, 211
National Security Agency local area network, 312 Occupations, with fastest hardware and peripheral device
(NSA), 333 logical, 572–573 growth, 458 management, 219–220
National Severe Storms Lab, 18 metropolitan area network, 312 Octet, 420 history, 39
National White Collar Crime network adapters, 313–315 Office 2010, 170 Linux, 212–214
Center (NW3C), 410 operating systems for, 318, Office support systems (OSS), loading, 222
Natural language processing 583–584 543–544 Mac, 212
(NLP), 547 peer-to-peer (P2P) networks, Office Web Apps, 188, 189 Mac OS X Snow Leopard,
Navigation, digital, 381–383 310–311 Office-based IT job, 460 260–261
Navigation devices, network, 315, resource sharing, 310 Offshoring, 9, 457–458 mainframe, 210
570, 586–588 securing wireless networks, 328 Ogg Vorbis format, 175 memory and storage
Nebulae supercomputer, 360 transmission media, 313, Ohio State University, 21 management, 218–219
Neck injury, 79 578–583 OLED (organic light-emitting for mobile devices, 211
Needforspeed.com (multiplayer troubleshooting, 334–335 diode) displays, 80 multiuser, 210
online game), 106 wide area network, 312 OLED (organic light-emitting for networks, 210, 318
Negative acknowledgment wireless node configuration, diode) TVs, 13 organizing files, 227
(NAK), 617 332–334 Omaha Paper Company, 108 for personal computers, 211–214
.NET Framework, 190, 498 New Paperclip, 169 Omnidirectional microphones, 59 for personal media players, 211
Net Meter, 316 Newsgroups, 98 One Laptop per Child processor management, 215–218
NetBios Extended User Interface Newsvine (social bookmarking (OLPC), 216 RAM, amount being used, 278
(NetBEUI), 584 site), 115 OneNote (note taking real-time, 209–210
Netbook, 50, 392 Next Generation Internet, 126–127 software), 168 running more than one on a
Netflix, 324, 386, 391 NeXT operating system, 95 One-to-many relationship, 534 single computer, 212
Netiquette, 98–99 NHTSA (National Highway One-to-one relationship, 534 for smartphones, 211
NetMeter, 316 Traffic Safety Online analytical processing software application
Netscape, 41–42 Association), 15 (OLAP), 542 coordination, 220–221
Network adapters, 13, 313–315, NIC (network interface card), 67, Online backups, 436–437 Sugar, 216–217
569–570, 584–586 122, 322, 584, 585 Online employment sites, 468–469 types of, 209–214
Network address translation Ning (social networking site), 99 Online mapping, 183 upgrading, 227, 294
(NAT), 423 Nintendo Wii, 211 Online payments, 108, 109 user interface, 214–215
Network administration, 310 NLP (natural language Online photo management, utility programs, 232–241
Network administrators, 467, processing), 547 177–178 Web-based, 215
502, 565 Node, 309 Online shopping, 109 Windows, 211–212
Network cabling, 317–318 Nokia N810 Internet tablet, Online transaction processing windows, 224–227
Network engineers, 465, 467 392–393 (OLTP), 545 Operators (programming
Network interface card (NIC), 67, Noncommercial license, 388 On-Screen Keyboard (Windows language), 489
122, 322, 584 Nonimpact printers, 62 utility), 241 Optical cables, 122
Network layer, 582 Nonresident programs, 222 Open Directory Project, 115–116 Optical carrier (OC) line, 609
Network navigation devices, 315, Nonvolatile memory, 367 Open source software, see also Optical character recognition
570, 586–588 Normalization, 535–538 Application software (OCR), 385
Index 675
eighth
EDITION
EIGHTH
8
Optical drive restricting computer access Plagiarism, 118 Printers, 385–386
defined, 283 with, 426–427 Platform, 212 all-in-one, 63
how it works, 283–284 strength testers, 425–426 Play testing, 466 color output, 64–66
players and burners, 284–285 strong, 425–426 Plotters, 63–64 cost of consumables, 64–66
read only memory, 284 weak, 426 Plug and Play (PnP), 219 dot matrix, 62
selecting, 264 PATA (parallel advanced Plug-ins, 106 impact, 62
speed, 285–286 technology attachment) PNG files, 235 inkjet, 62–63, 65
standards, 285 drives, 282 PnP (Plug and Play), 219 laser, 63, 65
Optical mouse, 55 Patient simulator, 16 Podcast Alley, 103 maintaining, 68
Optical storage, 70–71 PayPal, 108, 109 Podcast.com, 103 nonimpact, 62
OQL (object query language), 525 PB (petabyte), 49 Podcasting, 381 paper, 66
.org domain, 618 PC Card slot, 124 Podcasts, 102–104, 174 resolution, 64
Organic light-emitting diode PC Decrapifier, 188 Podscope, 104 speed, 64
(OLED) displays, 80 PC PhoneHome, 444 Point of presence (POP), 610 thermal, 64
Organic light-emitting diode PDF files, 184, 230 Point-and-shoot cameras, use and cost, 64–66
(OLED) TVs, 13 Peachtree (accounting 383–384 wireless, 63
ORLive.com, 105 software), 181 Polymorphic virus, 413–414 Privacy
Osborne computer, 37–38 Peer-to-peer (P2P) networks, Pompeii ruins, digital recreation ethics and, 144
OSI (Open Systems 310–311, 565–566 of, 19 protecting, 4
Interconnection), 582 Peer-to-peer (P2P) sharing, POP (point of presence), 610 social media and, 150–151
Outlook (application), 97, 169, 432 380–381 Pop-up windows, 430 Private Browsing (Firefox),
Output devices, see also Input Pendrivelinux.com, 429 Portable document format (PDF), 428, 626
devices Pentagon Papers, 146 184, 230 Private key, 629
monitors, 60–62 Peripheral devices, 50, 71–75 Portable media players Private-key encryption, 628–629
printers, 62–66 Personal area network (PAN), capacity, 377–378, 379 Problem Steps Recorder
sound output, 66 567–568 defined, 377 (Windows 7), 237
speakers, 66 Personal ethics, 141–144 docks, 379 Procedures (programming), 491
Outputs, 479–480 Personal financial software, features, 378 Process, 479–480
Outsourcing, 457–458 171–172 flash memory, 379 Processor, see CPU (central
Personal firewalls, 421 listening to podcasts on, 103 processing unit)
Personal information, 434–435 size, weight and Processor management, 215–218
P Personal information capabilities, 392 Productivity software, see also
P2P (peer-to-peer) networks, management (PIM) software, transferring files to, 379 Software
310–311, 565–566 168–169 video formats for, 176 database software, 166–167
P2P (peer-to-peer) sharing, Personal video recorder Ports defined, 162
380–381 (PVR), 363 connectivity, 73 features, 169
Packages (programming), 491 Personalization window, 233 data transfer, 72–73 integrated software application,
Packet, 315, 418, 574, 612 Petabyte (PB), 49 defined, 71–72 169–170
Packet filtering, 422 PGP (Pretty Good Privacy), 629 Ethernet port, 73 note taking software,
Packet screening, 594 Pharming, 439–440 expansion cards and hubs, 167–168
Packet sniffer, 418 Phenom processors, 273 74–75 personal financial software,
Packet switching, 612 Phishing, 439–440 FireWire 400, 72–73 171–172
Packets, 586 Photo Story, 172 FireWire 800, 72–73 personal information
Page file, 219 Photocopiers, 420 multimedia, 73–74 management software, 168
Palm Pre, 211 Photography, see Digital parallel, 72 presentation software, 166
Palo Alto Research Center photography serial, 72 spreadsheet software,
(PARC), 40 Photoshop (software), 172 USB, 72 165–166
Palo Alto Software, 182 Photoshop Album Starter video graphics array, 73–74 word processing software,
Panasonic Lumix G2 camera, 384 Edition, 173 Positive acknowledgment 163–165
Pandora Internet Radio, 524 Photoshop Elements (ACK), 617 Professional certifications, 468
Panjiva.com (Web site), 540 (software), 173 Positive psychology, 142 Professional organizations, 469
Parallel advanced technology PHP Hypertext Processor, 501 PositiveUD, 18 Program, 162
attachment (PATA) Physical layer, 582 POST (power-on self-test), 222 Program development life cycle
drives, 282 Physical memory, 277 Postcardware, 190 (PDLC), 478
Parallel ports, 72 Physical topology, 572 Power controls, 75–77 Program files, 435
Parallel processing, 360–361 Physiome Project, 16 Power supply, 75, 264 Programmers, 464
PARC (Palo Alto Research Pidgin (online communication Power surges, 442 Programming
Center), 40 tool), 98 Power-on self-test (POST), 222 algorithm development,
Partial backups, 436 Piggybacking, 327 PowerPC G5 processor, 359 480–482
Partitions, 212 PIM (personal information .pptx (file name extension), 230 coding, 485–493
Pascal, 496 management) software, Preemptive multitasking, compilation, 491–492
Pascal, Blaise, 42 168–169 216–217 debugging, 493–494
Pascalene calculator, 42 Pinnacle Studio (video Preinstalled software, 187–188 decision making and design,
Password Meter, 425–426 software), 389 Presentation layer, 582 482–486
Password-management tools, Pipelining, 358–359 Presentation software, 166 defined, 478
427–428 Pirate Bay, 420 Pretexting, 438–439 documentation, 495
Passwords PirePowua (cluster computing Pretty Good Privacy (PGP), 629 life cycle of information system,
creating, 425 service), 358 Primary keys, 523–524 474–478
managing, 427–428 Placement office, 468 Print servers, 571 life cycle of program, 478
EDITION
EIGHTH
8
overview, 484
problem statement, 478–480 R RM files, 387
Roberts, Ed, 35
SDLC (system development life
cycle), 474–478
system development life cycle, Rabbit (robot), 22 ROBOLAB (software), 486 SDRAM (Synchronous
474–478 Radio frequency identification Robotic surgery, 16–17 DRAM), 277
testing, 494–495 (RFID) tags, 14, 590–591 Robots, 420 Seagate, 437
visual, 497 RadioShack TRS-80 computer, 37 Roku (digital video player), 391 SeaMonkey Composer (web page
Programming languages RAID (redundant array of Roll Back driver feature authoring software), 256
categories, 486–487 independent disks), 283, 284f (Windows), 220 Search Engine Guide (Web
defined, 486 RAM (random access memory) Rollyo (search engine), 115–116 site), 43
future of, 502–505 adding, 279, 280 ROM (read-only memory), 68, Search Engine Watch, 116
generations, 486–487 amount being used, 277–278 284, 367–368 Search engines
overview, 495–496 amount being used by operating Root directory, 229 algorithms, 115–116
portability, 487 system, 278 Root DNS server, 619 customizing searches, 117
selecting, 496 amount installed, 277–278 Rosetta Stone, 148 for images and videos, 116
for Web applications, 500–502 vs. hard drive, 276–277 Router overview, 115
for Windows applications, management by operating buying, 320 strategies, 117
496–500 system, 218 connecting devices to, 320–322 Second Life (multiplayer online
PROgramming LOGic minimum requirements, 218 defined, 315 game), 106, 185
(PROLOG), 487 overview, 67–68 setting up, 321 Second-generation computers, 44
Programs required, 278–279 wired connections, 320 Second-generation language, 486
deleting, 194, 233–234 selecting, 264 wireless networking support, Second-level domain, 618
downloading, 193 types of, 277 320–321 Sector (hard drive), 238, 286
installing, 193, 233 Range check, 528–529 Routers, 587–588 SecuGen, 429
starting, 194–195 Rapid application Roxio PhotoSuite, 173 Secure HTTP (S-HTTP), 614
uninstalling, 194 development, 497 RPG Maker VX, 178 Secure socket layer (SSL), 109, 621
Programs and Features utility, Raw files, 384 RSI (repetitive strain injury), 78, Security
233–234 Reader, Adobe (software), 79 anonymous Web surfing,
Project management software, 182 107, 184 RSS (Really Simple Syndication), 428–429
Project managers, 464 Read-only memory (ROM), 68, 103 checklist, 444
Project-based IT job, 460 284, 367–368 .rtf (file name extension), 230 firewalls, 421–422
Projectors, 62 Really Simple Syndication RTM (release to manufacturers), password protection and
PROLOG (PROgramming (RSS), 103 495 management, 425–428
LOGic), 487 RealMedia format, 387 RTOS (real-time operating testing, 422–424
Proprietary software, 163 Real-time operating system system), 209–210 Security monitoring software, 326
Proprietary system, 611 (RTOS), 209–210 Rule utilitarianism, 140 Securus Systems Ltd., 631–632
ProStores Business, 183 Real-time processing, 544–545 Runtime errors, 494 Seeds, 524, 611
Protocol, 576 Records, 523 Seek time, 286
Prototype, 497 Recycle Bin, 225, 232, 234 Select query, 530
Proxy server, 594 Recycling computers, 295 S Semantic Web, 124, 125
PS3 (Sony PlayStation 3), 325 Red Hat Linux, 213 SaaS (Software as a Service), 188 Semiconductor, 348
Pseudocodes, 481–482 RedLaser (price comparison Safari (browser), 111, 374 Sensors, 14–15
PSP (Sony PlayStation Portable), tool), 394 Safe mode, 223–224 SEQUEL (Structured English
379, 392–393 Referential integrity, 538 Safeend (software), 591–592 Query Language), 530
Psychology, 21–22 Relation, 524 SafeMessage (software), 631–632 Serial ATA (SATA) drives, 282
Public domain, 16 Relational algebra, 530 Sage Master Builder Serial ports, 72
Public key, 629 Relational databases, 524, 534–542 (software), 184 Server-based networks, see
Public-key encryption, 629 Relationship, 534 SageTV, 391 client/server networks
Push technology, 374 Relativism, 140 Salaries, 461 Servers
PVR (personal video Release to manufacturers Salary.com, 461, 502 application, 571–572
recorder), 363 (RTM), 495 Sampling rate, 377 authentication, 570–571
Remark (programming), 490 Samsung Impression, 369 in client/server networks, 569
Remington Rand, 44 Samsung NV3 (camera), 378–379 communications, 572
Q Remote Play, 325 Samsung TL225 DualView database, 572
QDOS (Quick and Dirty Repetitive strain injury (RSI), camera, 384 dedicated, 570–571
Operating System), 39 78, 79 Sansa (personal media player), defined, 120, 311
QT files, 387 Resolution, 383–384 211, 378 e-mail, 572
Quad processor design, 360 Response time, 61 Sarbanes-Oxley Act, 144 print, 571
Quarantining, 415 Restart command, 76–77 SATA (Serial ATA) drives, 282 quad processor design, 360
QuarkXPress (software), 181 Restore disc, 188 Satellite Internet, 123 Web, 572
Query, 532–533 Restore points, 192 Scalability, 566 Server-side program, 623
Query language, 533 Retail, 6–7 ScanDisk, 236–237 Service packs, 495
Query Wizard, 533 Retail industry, 6–7 Scanners, 385 Service set identifier (SSID), 328
Quick Tabs (Internet Reverse SMS, 424 Scottevest jacket, 568 Session layer, 582
Explorer), 111 Ribbon interface, 226 Screen capture, 207 Set of actions, 483
QuickBooks, 181 Ring topology, 574–576, 578 Screen resolution, 61 Setup.exe, 193
Quicken, 171–172 Ripping, 174, 379 Script kiddies, 417 Shareware, 191
QuickTime format, 387 Risks, 4 Script viruses, 413 Shielded twisted-pair (STP)
QuickTime Player, 107 Rize (digital film), 390 Scripting languages, 500–502 cable, 580
QWERTY keyboard, 52 RJ-45 connectors, 317 Scroll bars, 226 ShieldsUP program, 422–423
Index 677
eighth
EDITION
EIGHTH
8
Shockwave Player, 107 Social media directors, 463 Spotlight (Mac OS X), 261 Synchronous DRAM
Shopping, 394 Social networking, 99–100, Spreadsheet software, 165–166 (SDRAM), 277
ShopSavvy (price comparison 150–151, 434–435 Sprint TV, 369 Syntax, 488
tool), 394 Social Web, 99 Spybot-Search & Destroy Syntax errors, 493
Short messaging service (SMS), Societal ethics, 140 program, 432 System backup, 436
371–372, 424 Soft boot, 220 Spyware, 430 System clock, 354
Shoulder injury, 79 Software, see also Application Spyware removal programs, 292, System development life cycle
ShredIt X (program), 295 software; Open source 430–432 (SDLC), 474–478
S-HTTP (Secure HTTP), 614 software SQL (Structured Query System evaluation
Shutterfly (Web site), 385 beta version, 494–495 Language), 487, 530 audio subsystem, 290–291
Silicon, 348 business software, 181–184 SSD (solid state drive), 71, CPU subsystem, 272–276
Silverlight, 107, 502, 503 buying, 186–187 280, 282 defined, 272
SIMD (Streaming Single defined, 5, 162 SSID (service-set identifier), 328 desktop vs. notebook system,
Instruction Multiple discounted, 189–190 SSL (secure socket layer), 109, 621 271–272
Data), 360 entertainment software, 178–180 Stack, 217 memory subsystem, 276–279
Simonetti, Ellen, 143 freeware, 190–191 Stakeholders, 143 optical storage, 283–286
Simple mail transfer protocol help with, 184–186 Star Office System, 40 storage subsystem, 279–283
(SMTP), 420, 614, 627 installing, 193–194 Star topology, 576–578 system reliability, 291–294
Simulation programs, 179 multimedia software, 172–178 Start menu, 224–225 upgrading vs. buying new
Simulations, 18–19 preinstalled, 187–188 Statements (programming system, 294–296
Single-lens reflex (SLR) productivity software, 162–172 language), 488 video subsystem, 286–290
cameras, 383 shareware, 190–191 Static addressing, 423, 615 System maintenance utilities,
Situational ethics, 140 starting application, 194–195 Stealth viruses, 414 235–237
Sixth Sense, 396–397 suite, 170–171 Storage devices System restore point, 237
SketchUp (3D modeling system requirements, 192–193 capacities, 71 System Restore utility,
software), 184, 256 tutorials, 186 flash storage, 71 237–239, 293
SkyDrive, 436 uninstalling, 194 hard drives, 69–70, 280–283 System software, see also
Skype, 374, 416 updating, 293–294 optical storage, 70–71, 283–286 Operating systems; Utility
Sleep mode, 76 versions, 192 overview, 279–280 programs
SLI standard, 289 Software alerts, 443–444 upgrading, 287 boot process, 221–224
Slingbox, 391 Software as a Service (SaaS), 188 Store-and-forward technology, defined, 50, 162
SLR (single-lens reflex) Software firewalls, 421 371–372 desktop, 224–227
cameras, 383 Software license, 186 STP (shielded twisted-pair) operating system, 208–220
Small Icons view, 229 Software piracy, 187 cable, 580 windows, 224–227
Smart label, 7 Software updates, 416–417, 495 Streaming audio, 106 System unit, 67
Smart playlists (iTunes), 534 Solid state drive (SSD), 71, Streaming Single Instruction Systems analysts, 464
Smartphones 280, 282 Multiple Data (SIMD), 360 Systems development, 464–466
Bluetooth attacks, 424–425 Sonoran Blue, 325 Streaming video, 106, 324
cameras, 383 Sony Bravia television, 391 Streets & Trips, 183
components of, 367 Sony Cybershot DSC-T1 Structured data, 525 T
data plan, 372 camera, 384 Structured English Query T line, 609
data transfer rate, 372–373 Sony Dash Personal Internet Language (SEQUEL), 530 Tables, 523
displaying content from the Viewer, 326 Structured Query Language Tablet PCs, 50, 56–57, 392
Internet, 373–374 Sony DPP-F700 digital (SQL), 487, 530 Tabulating Machine Company,
features, 366 frame/printer, 386 StumbleUpon (search engine), 42–43
Internet connectivity, 372–374 Sony PlayStation, 211 115–116 Tags, 500
keeping number private, 376 Sony PlayStation 3 (PS3), 325 Stylus, 50, 51 Target, 108, 385
microbrowser, 373–374 Sony PlayStation Portable (PSP), Subdirectory, 113 Task Manager utility, 237
operating system for, 211 379, 392–393 Subroutines (programming), 491 Task Scheduler, 239, 240f
processor functions in, 367 Sony Reader Digital Book, 393 Sugar (operating system), Taskbar, 225
size, weight and Sony Sound Forge Pro, 176 216–217 Tax preparation software, 171
capabilities, 392 Sound cards, 67, 264, 290–291 Summary report, 545 TaxiHack, 395
software, 369–370 Sound input, 59 Supercomputers, 51, 210, 360 TCP (Transmission Control
transferring files from computer Sound output, 66 Supervisor program, 222 Protocol), 614
to, 370 Source code, 213, 491 Support services, 467 TCP/IP (Transmission Control
virtual phone number, 376 SourceForge.net, 190–191, 499 Surge protector, 442–443 Protocol/Internet
viruses, 376 Spaces (Mac OS X), 261 Surround sight, 290 Protocol), 613
SMS (short messaging service), Spam, 5, 23, 410, 432–433 Surround-sound speakers, 66, TealLock (software), 444
371–372, 424 Spam blogs, 101 290–291 TealPoint Software, 444
SMTP (Simple Mail Transfer Spam filter, 432 Surveillance cameras, 22–23 Technical services, 466
Protocol), 420, 614, 627 SPAMfighter, 432 S-video (super video) port, 74 Technical writers, 464–465
SnagIt Screen Capture, 191 Speakers, 66 Swap file, 219 Technorati (search engine),
Snapfish (Web site), 177 Speech recognition software, Swarm, 611 115–116
Snipping Tool, 207 174, 175 Switch (star topology), 576 TechSmith Corporation, 191, 207
Snopes (Web site), 441 Speech Recognition Utility, 241 Switches, 315, 319–320, Techsoup (web site), 22
Snow Leopard (Mac OS X), 261 Spidering, 413 347–348, 587 Telecommunication
Social bookmarking, 114–115 Spim, 432 Symantec, 376, 415 technicians, 467
Social engineering, 438–439 Splogs, 101 Symbian OS, 367, 376 Telecommuting, 460
Social justice, 144, 146 Sports science, 19–20 Sync Center, 370 TeleNav Navigator, 374
EDITION
EIGHTH
8
Telephony, 366 Tomlinson, Jillian, 143
telephony, digital Tomlinson, Ray, 627 U Variable declaration, 488
Variables, 488
defined, 366 Toolbars, 226 UAVs (unmanned aerial vehicles), VBScript, 501, 503
Internet connectivity, 372–374 Top-down design, 484 13, 14 Vehicle WiFi (ViFi), 579
text messaging, 371–372 Top-level domain, 112, 618 Ubiquitous computing (ubicom), VeriChip, 18
Voice over Internet Protocol, Torvalds, Linus, 213 393–397 VeriSign, 109, 440, 618
374–376 Touch screens, 56–57 Ubuntu (operating system), Verizon V Cast, 369
Television Touchpad, 55 259, 429 Vertical market software, 184
connecting to computers, 74 TPI (outsourcing advisory UDP (user diagram protocol), 616 VGA (Video Graphics Array) port,
digital, 390 firm), 457 Unethical behavior, 140–141 73–74
Telnet, 614, 619–620 TPS (transaction-processing Unicode, 352–353 Video, digital
Telussion, 376 system), 544–545 Unidirectional microphones, 59 advantages, 390–391
Templates, 169 Track (hard drive), 238, 286 Uniform Resource Locator editing, 387
Terabyte (TB), 49 Trackball mouse, 55 (URL), 112 menuing system, 388–389
Test conditions, 483 Tracking cookies, 433–434 Uninstalling programs, 194 sources, 386, 389
Testing (programming), 494–495 Trackpoint device, 55 Uninterruptible power supply uploading, 389
Testing plan, 479–480 Training, 271 (UPS), 443 watching on portable
Tethered downloads, 380 Transaction-processing system United Parcel Service (UPS), 7–8 device, 391
Text field, 522, 523 (TPS), 544–545 UNIVAC (Universal Automatic webcasting, 389
Theft, 410 Transceiver, 316 Computer), 44, 349–350 Video capture, 57–59
Theft prevention Transistor, 44 Universal Automatic Computer Video cards
alarms, 443 Transistors, 348–350 (UNIVAC), 44, 349–350 defined, 287–288
locks and surrounds, 443 Transmission Control Protocol Universal remote, 13 functions of, 289
software alerts, 443–444 (TCP), 614 Universities, 467–468 graphics processing unit, 288
Themovieblog.com, 101 Transmission Control University of Michigan, 21 integrated, 288
Therac-25, 477 Protocol/Internet Protocol UNIX, 210 on motherboard, 67
Thermal bubble inkjet printer, 65 (TCP/IP), 613 Unmanned aerial vehicles multiple, 289
Thermal printers, 64 Transmission media (UAVs), 13, 14 selecting, 264
Thermal wax printing, 64 in client/server networks, 569 Unshielded twisted-pair (UTP) upgrading, 289–290
ThingM, 394 coaxial cables, 580–581 cable, 317, 318, 580 video memory, 288–289
ThinkFree Office Live, 189, 255 comparison of, 581–583 Unstructured data, 525 Video game design, 9
ThinkGeek (Web site), 375 defined, 313, 579 Updates, 293–294 Video game developers, 466
Third-generation computers, 44 fiber-optic cable, 581 UPS (uninterruptible power Video game industry, 9, 178, 466
Third-generation language, 487 overview, 578–579 supply), 443 Video graphics array (VGA) port,
Threadless.com, 630 twisted-pair cable, 580 UPS (United Parcel Service), 7–8 73–74
Threats, computer types of, 313 Urban legend, 440 Video logs (vlogs), 100–102
denial-of-service attacks, wired, 578–581 URL (Uniform Resource Video memory, 287
419–420 wireless, 581 Locator), 112 Video producers, 462
hackers, 417–418 Transport layer, 582 U.S. Olympic Training Center, 19 Videoconferencing, 58–59
malware, 430 Transport layer security USB data cable, 370 Viewing angle, 61
pharming, 439–440 (TLS), 621 USB drives, 71 ViFi (Vehicle WiFi), 579
phishing, 439–440 Transportation Security USB ports, 72 Vimeo (Web site), 386
spam, 432–433 Administration (TSA), 11 Used software, 190 Virtual account numbers, 440
spyware, 430–432 Trillian (online communication User diagram protocol (UDP), 616 Virtual Lab, 15
Trojan horses, 418–419 tool), 98 User interface, 214–215 Virtual laser keyboard, 52, 53
viruses, 411–414 Trojan horses, 418–419, 591 Ustream (Web site), 386 Virtual memory, 219
Three-way handshake, TruthOrFiction.com, 441 Utilities (Mac OS X), 262–263 Virtual phone number, 376
616–617 TSA (Transportation Security Utility programs Virtual private network (VPN),
Throughput, 313 Administration), 11 accessibility, 240–241 568–569
Throughput speeds, 316–317 TTL (time to live), 620 Backup and Restore utility, 239 Virtual reality programs, 178, 185
Thumb drives, 71 TubeSock, 169 defined, 208 Virtual tours, 9–10
Thunderbird (e-mail Tucows.com, 191 display, 233 Viruses
program), 256 Tuner, 13 Ease of Access Center, 240–241 avoiding, 4
Ticket ordering system, 465 Tunnel interface, 569 file compression, 234–235 boot-sector, 411–412
TIFF files, 385 Tunneling, 568–569 for Mac computers, 262–263 on cell/smartphones, 376
Tiles view, 229 TurboTax (tax preparation Programs and Features utility, classifications, 413–414
Time bombs, 412 software), 171 233–234 defined, 410
Time Capsule wireless router, TurboTax Online, 189 system maintenance, 235–237 e-mail viruses, 413
239, 323 Turing, Alan, 44 System Restore, 237–239 encryption viruses, 413
Time Machine (Mac OS X), 239, Turing Machine, 44 Task Scheduler, 239, 240 from flash drives, 591
261, 438 Turning on and off, 75 UTP (unshielded twisted-pair) host program, 410
Time to live (TTL), 620 Turnitin.com, 118 cable, 317, 318, 580 infection by, 410, 412
Time-variant data, 541 Tutorials, 186 Utterback, Camille, 9 macro, 413
TiVo Premiere, 325 TV tuner, 13 multipartite, 414
TLS (transport layer Tweets, 106 polymorphic, 413–414
security), 621 Twisted-pair cables, 313, 580 V purpose of, 410
Toggle keys, 54 Twisted-pair wiring, 122 Vacuum tubes, 348 quarantining, 415
Token method, 575 Twitter, 106, 420, 517 Validation, 528–532 script, 413
Token-ring topology, 574 .txt (file name extension), 230 Validation rule, 528 signature, 414
Index 679
eighth
EDITION
EIGHTH
8
Viruses (Continued) Web development, 462–464 Windows Word for MS-DOS, 40
stealth, 414 Web galleries, 8 arranging on desktop, 226 Word processing software,
symptoms of infection, 414 Web interface designers, 459 defined, 225 163–164
time bombs, 412 Web master, 462 moving, 226–227 WordPerfect, 40
types of, 411–413 Web Monkey (web site), 500 resizing, 226–227 Wordpress.com, 101
worms, 412–413 Web pages Windows 7 operating system, WordStar, 40
Visicalc, 39 History list, 114 211–212 World of Warcraft (multiplayer
Visio, 180 hyperlinks, 113–114 Windows 95 operating system, 41 online game), 106
Visual Basic, 497–498, 503 visited, returning to, 113–114 Windows desktop, 224–225 World Wide Web, 4, 94–95, 112. see
Visual programming, 497 Web publishers, 463 Windows Explorer, 228 also Internet
Vlog It!, 101 Web robots, 413 Windows key (keyboard), 54 World Wide Web Consortium,
Vlogs (video logs), 100–102 Web server, 112, 572, 610 Windows Live Mail, 432 500, 608
Voice recognition Web server administrators, 467 Windows Live Messenger, 98, 632 World Wind, 15
software, 174 Web service, 498 Windows Live Photo Gallery, 385 Worms, 412–413
VoIP (Voice over Internet Web sites, 95, 112, 118. see also Windows Media Center, 13 Wozniak, Steve, 35–36
Protocol) Internet Windows Media Player, 177 WPA (WiFi Protected Access), 328
advantages and disadvantages Web-based applications, 163, Windows Media Video .wpd (file name extension), 230
of, 375–376 188–189, 255 format, 387 WriteCheck.com, 118
vs. conventional telephone Web-based e-mail, 97, 432 Windows Mobile, 211 Writer (OpenOffice), 163, 253
call, 633 Web-based operating system, 215 Windows Mobile operating
defined, 274 Web-based software, 255 system, 367
how it works, 633–634 Webcams, 23 Windows Phone 7, 367 X
new features, 376 Webcasts, 104–106, 389 WineM, 394 XBMC Media Center
requirements, 374–375 Weblogs (blogs), 100–102 Wipe (program), 295 (software), 363
security of, 634 WebOS, 211, 367 Wireclub, 98 Xbox 360, 211, 334
Volatile memory, 367 WebSphere, 183 Wired Equivalent Privacy XChat (online communication
Volatile storage, 67, 276 WeFi.com, 314 (WEP), 328 tool), 98
Voltaic Backpack, 568 WEP (Wired Equivalent Wired transmission media, Xerox, 40–41
Vonage, 374–375 Privacy), 328 578–581 XHTML (eXtensible HyperText
VPN (virtual private network), Western Digital My Book, 323 Wireless access points Markup Language), 500,
568–569 What-if analysis, 166 (WAPs), 585 501–502, 503, 621–622, 624
Whisher, 314 Wireless Fidelity, see WiFi .xlsx (file name extension), 230
Whistle-blowers, 143, 146 Wireless Internet, 123–125
W White-hat hackers, 417 Wireless Internet service provider
XML (eXtensible Markup
Language), 502, 503, 622
Walgreens, 385 Whole-house surge (wireless ISP), 372 XNA Game Studio, 473
Walmart, 385 protectors, 442 Wireless keyboards, 54
WAN (wide area network), Wide area network (WAN), Wireless Markup Language
312, 567
WAPs (wireless access
312, 567
Widgets, 225
(WML), 374, 622
Wireless media, 581
Y
points), 585 WiFi (Wireless Fidelity) Wireless microphones, 59 Yahoo! (search engine), 115
Warm boot, 76, 220 hot spots, 123–124 Wireless mouse, 55–56 Yahoo! Mail, 97, 432
WAV files, 176 mobile hot spots, 373 Wireless network interface card Yahoo! Maps, 183
Wearable screens, 81 sharing Internet connection, 314 (wireless NIC), 585 Yahoo! Messenger, 98, 632
Web, 4, 94–95, 112 sharing services, 314 Wireless networks Yodlee MoneyCenter, 171
Web 2.0 technologies, see also standards, 316, 581 securing, 327–329 YouTube, 101, 116, 386, 389
Internet WiFi Detector T-shirt, 375 standards, 316
blogs, 100–102 WiFi Free Spot, 123 throughput speeds, 316–317
defined, 99 WiFi IP phones, 375 Wireless printers, 63 Z
podcasts, 102–104 WiFi printers, 63 Wireless range extender, 335 Z1 mechanical calculator, 43
social networking, 99–100 WiFi Protected Access WITI (Women in Technology Zetabyte (ZB), 49
video logs, 100–102 (WPA), 328 International), 470 .zip (file name extension), 230
webcasts, 104–106 Wifi.com, 314 Witness Project, 396 Zip disk drive, 69
whistle-blowing and, 146 WiFiHotSpotList.com, 123 Wizard, 169 Zirko, Steven, 11
wikis, 102 WikiHow, 102 WMA files, 176, 378 Zoho (Web site), 189, 190, 255, 542
Web application developers, 459 WikiLeaks, 146–147 WML (Wireless Markup Zombies, 419
Web applications, 500 Wikipedia (online Language), 374, 622 ZoneAlarm Internet Security
Web browsers, 95, encyclopedia), 102 WMV files, 387 Suite, 421
110–111, 626 Wikis, 102 Women in Technology Zune (personal media player),
Web cam, 57–59 WiMAX, 123, 630 International (WITI), 470 211, 378
Web content creators, 462 Winamp, 177 Wonderwall projector, 62 Zuse, Konrad, 43
EDITION
EIGHTH
Credits
8
Cover photo Dieter Matthes\AGE Fotostock Figure 1.12 Polhemus/Fast Scan
America, Inc. Figure 1.12b Paul Ekman Group, LLC.
Figure 1.13 © Digital Art/CORBIS All Rights
Reserved
Chapter 1 Figure 1.13a Paul Ekman Group, LLC.
Figure 1.1 The Dell logo is a trademark of Figure 1.14 Tom Pantages
Dell Inc.
Figure 1.16a Stocktrek Images/Getty Images
Figure 1.1b2 Logitech Inc.
Figure 1.16b Lefteris Pitarakis\AP Wide World
Figure 1.1b3 Belkin International, Inc. Photos
Figure 1.2 www.CartoonStock.com Figure 1.17 © Schlegelmilch/CORBIS All Rights
Figure 1.3a The Dell logo is a trademark of Reserved
Dell Inc. Figure 1.19a Ed Pfueller/Columbia Daily
Figure 1.3b PRNewsFoto/D-Link Systems\ Tribune/AP Photo
D-Link Systems, Inc. Figure 1.19b Photo courtesy of METI © METI
Figure 1.3c Handout/MCT\Newscom Figure 1.20a © 2008 Intuitive Surgical, Inc.
Figure 1.3d Motorola\Motorola PCS/CSG Figure 1.20b © 2008 Intuitive Surgical, Inc.
Figure 1.3e Belkin International, Inc. Figure 1.21 Courtesy of Dr. Peter Fromherz/Max
Planck Insitute of Biochemistry
Figure 1.3e-1 ExpressCard - PCMCIA
Figure 1.22a Shawn K Kelly PhD
Figure 1.3g Apple Computer, Inc.
Figure 1.22b Shawn K Kelly PhD
Figure 1.4a Simon Krzic\Shutterstock
Figure 1.23 Reuters/Eriko Sugita\Landov Media
Figure 1.4b Mclek\Shutterstock
Figure 1.23a Steve Bloom Images\Alamy Images
Figure 1.4c Richard Peterson\Shutterstock
Figure 1.23b NOAA\Public Domain
Figure 1.4d Dmitriy Shironosov\Shutterstock
Figure 1.25 Media from the Discovery Channel’s
Figure 1.4e Saleeee\Shutterstock Pompeii: The Last Day, courtesy of
Figure 1.4f yuyangc\Shutterstock Crew Creative, Ltd.
Figure 1.4g Dimitrije Paunovic\Shutterstock Figure 1.26a Interactive Sports Technologies
Figure 1.5a Editorial Image; LLC\Alamy Images Figure 1.26b Interactive Sports Technologies
Figure 1.5b United Parcel Service - DO NOT Figure 1.27 Mazur Group
USE!! Figure 1.28 AP Wide World Photos
Figure 1.5c Mary Kate Denny\PhotoEdit Inc. Figure 1.30a SparkFun Electronics
Figure 1.7 Peter Schaaf Figure 1.30b © (Photographer)/CORBIS All Rights
Figure 1.8a Camille Utterback, “Untitled 5”, from Reserved
the “External Measures” series. Photo Figure 1.31 Gerald Herbert\AP Wide World
by Peter Harris, © 2007 Photos
Figure 1.8b Camille Utterback, “Untitled 5”, from
the “External Measures” series. Image
courtesy of the artist. TECHNOLOGY IN FOCUS:
Figure 1.8c Camille Utterback, “Untitled 5”, from The History of the PC
the “External Measures” series. Image Chapter SuperStock\Jupiter Images
courtesy of the artist. opener a
Figure 1.11a Apple Computer, Inc. Chapter Courtesy of Apple Computer, Inc.
Figure 1.11b Moeskau Photography opener b
681
eighth
EDITION
EIGHTH
8
Figure 1 Heinz Nixdorf Musuemsforum\AP Figure 2.12 Newton Peripherals, LLC
Wide World Photos Figure 2.14 Hewlett-Packard Company
Figure 2a Getty Images Figure 2.15 EPOS
Figure 2b © Roger Ressmeyer/CORBIS All Figure 2.16a Courtesy of Sony Electronics Inc.
Rights Reserved
Figure 2.16b Fancy/Veer\Corbis RF
Figure 3 SSPL\The Image Works
Figure 2.17 Bennet\The Christian Science
Figure 4 Roger Ressmeyer\CORBIS- NY Publishing Society
Figure 6 Jerry Mason/SPL\Photo Researchers, Figure 2.18 Blue Microphones
Inc.
Figure 2.19 © Owen Franken/Corbis
Figure 7 Photo Courtesy of The Computer
History Museum Figure 2.22b PRNewsFoto/NEC Solutions
(America) Inc.\AP Wide World
Figure 8 Photo Courtesy of The Computer Photos
History Museum
Figure 2.23 Canon U.S.A., Inc.
Figure 9 Roberto Brosan\Time Inc. Magazine
Figure 2.24 Courtesy Xerox Corporation
Figure 10 © Doug Wilson/CORBIS All Rights
Reserved Figure 2.26 Photo courtesy of XEROX Corporate
Public Relations.
Figure 11 Daniel Bricklin
Figure 2.27 Extech Instruments Corporation
Figure 13 Photo Courtesy of The Computer
History Museum Figure 2.29 © 2008 XFXForce.com
Figure 16 Photo Courtesy of The Computer Figure 2.32b Photo courtesy of Iomega
History Museum Corporation
Figure 17 Photo Courtesy of The Computer Figure 2.32c Courtesy Western Digital Corporation
History Museum Figure 2.33a Rafael Angel Irusta Machin\Alamy
Figure 18 Ames Laboratory Images Royalty Free
EDITION
EIGHTH
8
Figure 2.34h Samsung Electronics America, Inc. TECHNOLOGY IN FOCUS:
Figure 2.34i Silicon Power Computer and Ethics
Communicatons
Chapter sjlocke\iStockphoto.com
Figure 2.35a David A. Tietz opener
Figure 2.35b Hewlett Packard HP 1 Figure 2 © Anton Seleznev/Courtesy of
Figure 2.36 Phil Burton\Alamy Images www.istockphoto.com
Figure 2.37 David A. Tietz Figure 5 Cartoon Stock
Figure 2.38 Editorial Image, LLC\Alamy Images Figure 11 Michael D Brown\Shutterstock
Royalty Free
Figure 2.38a Tim Arbaev\Shutterstock
Figure 2.38b Szymon Apanowicz\Shutterstock
Chapter 4
Figure 2.40 Syd M Johnson\The Image Works
Chapter Brent Walker\Shutterstock
Figure 2.42a Artur Synenko\Shutterstock
opener
Figure 2.43 Look Twice\Alamy Images
Figure 4.10b Avanquest North America Inc.
Figure 2.46 ROBYN BECK/AFP/Getty
Figure 4.10d Corel
Images\Newscom
Figure 4.20 PhotoEdit Inc.
Figure 2.47 Courtesy of Sony Electronics Inc.
Figure 4.26a Second Life is a trademark of Linden
Figure 2.48 Tom Theobald\Alamy Images
Research, Inc. Certain materials have
been reproduced with the permission
of Linden Research, Inc.
Chapter 3 Figure 4.26b Second Life is a trademark of Linden
Research, Inc. Certain materials have
Chapter Lukiyanova Natalia/
been reproduced with the permission
opener frenta\Shutterstock
of Linden Research, Inc.
Figure 3.1 Apple Computer, Inc.
Figure 4.26c Second Life is a trademark of Linden
Figure 3.10a jeny\Shutterstock Research, Inc. Certain materials have
Figure 3.10b Supri Suharjoto\Shutterstock been reproduced with the permission
of Linden Research, Inc.
Figure 3.10c AVAVA\Shutterstock
Figure 3.10R1 Monkey Business Images
\Shutterstock
Figure 3.10R2 Jaimie Duplass\Shutterstock Chapter 5
Figure 3.15 Daniel Heghton\
Chapter siloto\Shutterstock
Alamy Images
opener
Figure 3.16 Newscom
Figure 5.7c B. O’Kane\Alamy Images
Figure 3.18a Cecilia Lim H M\Shutterstock
Figure 5.9 fuseproject
Figure 3.18b Tatiana Popova\Shutterstock
Figure 3.33 Courtesy of www.istockphoto.com
Figure 3.34a Sierra Wireless, Inc. TECHNOLOGY IN FOCUS:
Figure 3.34b Sierra Wireless, Inc. Computing Alternatives
Figure 3.35a William Casey\Shutterstock Figure 5.UN1 Marilyn Conway/Photographer’s
Figure 3.35b Tomasz Sz.\Shutterstock Choice/Getty Images
Credits 683
eighth
EDITION
EIGHTH
8
Chapter 6 TECHNOLOGY IN FOCUS:
Under the Hood
Chapter Falcon Northwest
opener 2 Chapter Verity Smith\Jupiter Images
opener PictureArts Corporation/Brand X
Chapter Ramsom Koay
Royalty Free
opener 3
Figure 2a © CORBIS
Figure 6.3a David A. Tietz
Figure 6.3b David A. Tietz
Figure 6.5a Courtesy of Intel Corporation Chapter 8
Figure 6.5b Courtesy of International Business Chapter grzym\Shutterstock
Machines Corporation. Unauthorized opener
use not permitted./IBM Figure 8.6 David Young-Wolff\PhotoEdit Inc.
Figure 6.6a Courtesy of Intel Corporation Figure 8.7b MWW Group
Figure 6.6b Courtesy of Intel Corporation Figure 8.8a Koksharov Dmitry\Shutterstock
Figure 6.6c Courtesy of Intel Corporation Figure 8.17 ThinkGeek Inc.
Figure 6.12a Hugh Threlfall\Alamy Images Figure 8.19a SanDisk and Sanza FUZE are
Figure 6.12b Corsair trademarks of SANDISK Corporation
Figure 6.16a Editorial Image\Alamy Images Figure 8.19c Courtesy of Apple
Figure 6.16b Editorial Image\Alamy Images Figure 8.19d Apple Computer, Inc.
Figure 6.17 Brian Moeskau\Moeskau Photography Figure 8.19e Archos, Inc.
Figure 6.17a Moeskau Photography Figure 8.24 NeatReceipts®
Figure 6.17b Moeskau Photography Figure 8.28 Pure Digital Technologies Inc
Figure 6.17c Moeskau Photography Figure 8.31 Sling Media, Inc.
Figure 6.22b Editorial Image LLC Figure 8.33 Nokia
Figure 6.27 PRNewsFoto/NVIDIA Figure 8.38 Superbass\Wikipedia, The Free
Corporation\AP Wide World Photos Encyclopedia
Figure 6.28 Nvidia Figure 8.42a Len Green\Shutterstock
Figure 6.31a Advanced Micro Devices Figure 8.42b Pedro Salaverria\Shutterstock
Figure 6.33 Photo courtesy of Creative Labs, Inc.
Sound Blaster and Audigy are
registered trademarks of Chapter 9
CreativeTechnology Ltd. in the United
States and other countries. Chapter Robert F. Balazik\Shutterstock
opener
Figure 6.36 Eduardo Contreras/San Diego
Union-Tribune/ZUMA Figure 9.1 Mauro Bighin\Shutterstock
Press\Newscom Figure 9.8 Kevin Siers. © 2000 The Charlotte
Observer. KING FEATURES
SYNDICATE
EDITION
EIGHTH
8
Figure 2a Clive Streeter © Dorling Kindersley, Figure 11.32a AVAVA\Shutterstock
Courtesy of The Science Museum, Figure 11.32b Jace Tan\Shutterstock
London
Figure 11.33 Michael Jung\Shutterstock
Figure 5b Jenn Mackenzie\Shutterstock
Figure 11.33b Sean Prior\Shutterstock
Figure 5c Stephen Coburn\Shutterstock
Figure 11.33c Sean Prior\Shutterstock
Figure 5d wavebreakmedia ltd\Shutterstock
Figure 11.33d Raisa Kanareva\Shutterstock
Figure 5a photobank.ch \Shutterstock
Figure 11.34a Dash\Shutterstock
Figure 5e © Mark A. Johnson/CORBIS All Rights
Reserved Figure 11.34b Monjey Business Images\Shutterstock
Figure 9c Andresr\Shutterstock
Figure 11 Arthur Kwiatkowski\
iStockphoto.com
Chapter 12
Chapter HomeStudio\Shutterstock
opener
Chapter 10
Figure 10.3 PHOTOTAKE Inc.\Alamy Images
Chapter 13
Figure 10.19 Daft_Lion_Studio\iStockphoto.com
Chapter dotSyntax, LLC
Figure 10.21 © CORBIS All Rights Reserved
opener
Figure 10.28 Stichting Blender
Figure 13.10a Rob Marmion\Shutterstock
Figure 10.29 Luis Guillermo Restrepo Rivas
Figure 13.10b Tan Kian Khoon\Shutterstock
Figure 13.21 © Brendan McDermid/epa/CORBIS
Chapter 11 All Rights Reserved
Credits 685
This page intentionally left blank
SINGLE PC LICENSE AGREEMENT AND LIMITED WARRANTY
READ THIS LICENSE CAREFULLY BEFORE OPENING THIS PACKAGE. BY OPENING THIS PACKAGE, YOU ARE AGREEING
TO THE TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT AGREE, DO NOT OPEN THE PACKAGE. PROMPTLY
RETURN THE UNOPENED PACKAGE AND ALL ACCOMPANYING ITEMS TO THE PLACE YOU OBTAINED THEM. THESE
TERMS APPLY TO ALL LICENSED SOFTWARE ON THE DISK EXCEPT THAT THE TERMS FOR USE OF ANY SHAREWARE OR
FREEWARE ON THE DISKETTES ARE AS SET FORTH IN THE ELECTRONIC LICENSE LOCATED ON THE DISK:
1. GRANT OF LICENSE and OWNERSHIP: The enclosed computer programs (“Software”) are licensed, not sold, to you by Prentice-Hall,
Inc. (“We” or the “Company”) and in consideration of your purchase or adoption of the accompanying Company textbooks and/or other
materials, and your agreement to these terms. We reserve any rights not granted to you. You own only the disk(s) but we and/or our
licensors own the Software itself. This license allows you to use and display your copy of the Software on a single computer (i.e., with a
single CPU) at a single location for academic use only, so long as you comply with the terms of this Agreement. You may make one copy
for back up, or transfer your copy to another CPU, provided that the Software is usable on only one computer.
2. RESTRICTIONS: You may not transfer or distribute the Software or documentation to anyone else. Except for backup, you may not
copy the documentation or the Software. You may not network the Software or otherwise use it on more than one computer or computer
terminal at the same time. You may not reverse engineer, disassemble, decompile, modify, adapt, translate, or create derivative works
based on the Software or the Documentation. You may be held legally responsible for any copying or copyright infringement which is
caused by your failure to abide by the terms of these restrictions.
3. TERMINATION: This license is effective until terminated. This license will terminate automatically without notice from the Company if
you fail to comply with any provisions or limitations of this license. Upon termination, you shall destroy the Documentation and all copies
of the Software. All provisions of this Agreement as to limitation and disclaimer of warranties, limitation of liability, remedies or damages,
and our ownership rights shall survive termination.
4. DISCLAIMER OF WARRANTY: THE COMPANY AND ITS LICENSORS MAKE NO WARRANTIES ABOUT THE SOFTWARE,
WHICH IS PROVIDED “AS-IS.” IF THE DISK IS DEFECTIVE IN MATERIALS OR WORKMANSHIP, YOUR ONLY REMEDY IS TO
RETURN IT TO THE COMPANY WITHIN 30 DAYS FOR REPLACEMENT UNLESS THE COMPANY DETERMINES IN GOOD FAITH
THAT THE DISK HAS BEEN MISUSED OR IMPROPERLY INSTALLED, REPAIRED, ALTERED OR DAMAGED. THE COMPANY DIS-
CLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE COMPANY DOES NOT WARRANT, GUARANTEE OR
MAKE ANY REPRESENTATION REGARDING THE ACCURACY, RELIABILITY, CURRENTNESS, USE, OR RESULTS OF USE, OF
THE SOFTWARE.
5. LIMITATION OF REMEDIES AND DAMAGES: IN NO EVENT, SHALL THE COMPANY OR ITS EMPLOYEES, AGENTS, LICENSORS
OR CONTRACTORS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
OR IN CONNECTION WITH THIS LICENSE OR THE SOFTWARE, INCLUDING, WITHOUT LIMITATION, LOSS OF USE, LOSS OF
DATA, LOSS OF INCOME OR PROFIT, OR OTHER LOSSES SUSTAINED AS A RESULT OF INJURY TO ANY PERSON, OR LOSS OF OR
DAMAGE TO PROPERTY, OR CLAIMS OF THIRD PARTIES, EVEN IF THE COMPANY OR AN AUTHORIZED REPRESENTATIVE OF
THE COMPANY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS DO NOT ALLOW THE
LIMITATION OF DAMAGES IN CERTAIN CIRCUMSTANCES, SO THE ABOVE LIMITATIONS MAY NOT ALWAYS APPLY.
6. GENERAL: THIS AGREEMENT SHALL BE CONSTRUED IN ACCORDANCE WITH THE LAWS OF THE UNITED STATES OF
AMERICA AND THE STATE OF NEW YORK, APPLICABLE TO CONTRACTS MADE IN NEW YORK, AND SHALL BENEFIT THE
COMPANY, ITS AFFILIATES AND ASSIGNEES. This Agreement is the complete and exclusive statement of the agreement between you
and the Company and supersedes all proposals, prior agreements, oral or written, and any other communications between you and the
company or any of its representatives relating to the subject matter. If you are a U.S. Government user, this Software is licensed with
“restricted rights” as set forth in subparagraphs (a)-(d) of the Commercial Computer-Restricted Rights clause at FAR 52.227-19 or in
subparagraphs (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, and similar clauses, as
applicable.
Should you have any questions concerning this agreement or if you wish to contact the Company for any reason, please contact in writing:
Multimedia Production, Higher Education Division, Prentice-Hall, Inc., 1 Lake Street, Upper Saddle River NJ 07458.
Please see the Read Me file in the root directory of this CD or visit www.pearsonhighered.com/skills for detailed system requirements.