0% found this document useful (0 votes)
9 views721 pages

Evans Technology in Action 8th Edition

Uploaded by

kobina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views721 pages

Evans Technology in Action 8th Edition

Uploaded by

kobina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 721

Editor in Chief: Michael Payne Cover Art: © Dieter Matthes

Product Development Manager: Manager, Visual Research: Karen Sanatar


Eileen Bien Calabro Photo Researcher: David Tietz
Development Editor: Jennifer Lynn Manager, Rights and Permissions: Zina Arabia
Editorial Project Manager: Laura Burgess Permissions Project Manager: Hessa Albader
AVP/Executive Acquisitions Editor: Stephanie Wall Text Permission Researcher: Michele Pridmore
Editorial Assistant: Nicole Sam Director of Digital Development: Zara Wanlass
Director of Marketing: Kate Valentine Editor, Digital Learning & Assessment: Paul Gentile
Marketing Manager: Tori Olson Alves Product Development Manager, Media: Cathi Profitko
Marketing Coordinator: Susan Osterlitz Media Project Manager, Editorial: Alana Coles
Marketing Assistant: Darshika Vyas Media Project Manager, Production: John Cassar
Senior Managing Editor: Cynthia Zonneveld Full-Service Project Management:
Managing Editor: Camille Trentacoste MPS Content Services
Production Project Manager: Mike Lackey Composition: MPS Limited, a Macmillan Company
Operations Director: Nick Sklitsis Printer/Binder: Quebecor World Color/Versailles
Operations Specialist: Natacha Moore Cover Printer: Lehigh/Phoenix
Art Director: Jonathan Boylan Text Font: 10/12 Palatino
Cover Design: Anthony Gemmellaro

Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook
appear in the Rear Matter of this book.

Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries.
Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or
endorsed by or affiliated with the Microsoft Corporation.

Copyright © 2012, 2011, 2010, 2009, 2008 Pearson Education, Inc., publishing as Prentice Hall. All rights reserved.
Manufactured in the United States of America. This publication is protected by Copyright, and permission should be
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in
any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to
use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, 1
Lake Street, Upper Saddle River, New Jersey, 07458.

Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks.
Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations
have been printed in initial caps or all caps.

Library of Congress Cataloging-in-Publication Data

Evans, Alan (Alan D.)


Complete technology in action / Alan Evans, Kendall Martin, Mary Anne
Poatsy. -- 8th ed.
p. cm.
Includes bibliographical references and index.
ISBN 0-13-139157-7 (alk. paper)
1. Microcomputers. I. Martin, Kendall. II. Poatsy, Mary Anne. III. Title.
QA76.5.E9195 2011b
004.16--dc22
2010046480

10 9 8 7 6 5 4 3 2

ISBN 10: 0-13-139157-7


ISBN 13: 978-0-13-139157-4
COMPLETE

Technology
in Action 8th Edition

Alan Evans • Kendall Martin


Mary Anne Poatsy

Prentice Hall
This page intentionally left blank
eighth

EDITION
EIGHTH
Contents at a Glance
8
Chapter 1
Why Computers Matter to You: Becoming Computer Literate ......................................................2
Technology in Focus
The History of the PC ..........................................................................................................................34
Chapter 2
Looking at Computers: Understanding the Parts............................................................................46
Chapter 3
Using the Internet: Making the Most of the Web’s Resources ......................................................92
Technology in Focus
Information Technology Ethics ........................................................................................................138
Chapter 4
Application Software: Programs That Let You Work and Play....................................................160
Chapter 5
Using System Software: The Operating System, Utility Programs, and File Management ....206
Technology in Focus
Computing Alternatives ....................................................................................................................252
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System ..........................................266
Chapter 7
Networking: Connecting Computing Devices ..............................................................................306
Technology in Focus
Under the Hood ..................................................................................................................................346
Chapter 8
Digital Lifestyle: Managing Digital Data and Devices..................................................................362
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices..............................................408
Technology in Focus
Careers in IT ........................................................................................................................................456
Chapter 10
Behind the Scenes: Building Applications ......................................................................................472
Chapter 11
Behind the Scenes: Databases and Information Systems..............................................................516
Chapter 12
Behind the Scenes: Networking and Security in the Business World ........................................562
Chapter 13
Behind the Scenes: How the Internet Works ..................................................................................606
Glossary................................................................................................................................................647
Index ....................................................................................................................................................667
Credits ..................................................................................................................................................681

iii
eighth
EDITION
EIGHTH
Contents
8
Chapter 1
Why Computers Matter to You:
Becoming Computer Literate ........................................................................2
Why Should You Become Computer Literate? ..................................................................................4
Becoming a Savvy Computer User and Consumer ..........................................................................4
Being Prepared for Your Career ........................................................................................................6
Computers in Today’s Careers ..........................................................................................................6
Retail: Working in a Data Mine ................................................................................................6
Business: Data on the Go...........................................................................................................7
Arts: Ink, Paints, and a Notebook? ..........................................................................................8
Video Game Design: A Long Way from Pac-Man .................................................................9
Education: Teaching and Learning ..........................................................................................9
Law Enforcement: Put Down That Mouse—You’re Under Arrest!...................................11
DIG DEEPER: Computers Migrate into the Living Room .................................................12
Military Careers: Drive That Drone.......................................................................................12
Agriculture: High-Tech Down on the Farm .........................................................................14
Automotive Technology: Sensors and CPUs........................................................................14
Medicine: Technologies of Today and Tomorrow ...............................................................15
Medicine: The Chip Within.....................................................................................................17
Science: Simulating Reality .....................................................................................................18
Sports Science: Compute Your Way to a Better Game ........................................................19
Nanotechnology: Careers Yet to Come .................................................................................20
Psychology: You Should Smile . . . Now ...............................................................................21
Understanding the Challenges Facing a Digital Society ....................................................................22
ETHICS IN IT: Knowledge Is Power—Bridging the
Digital Divide .....................................................................................................................22

TECHNOLOGY IN FOCUS
The History of the PC ..............................................................................................34

Chapter 2
Looking at Computers:
Understanding the Parts ......................................................................46
Understanding Your Computer..............................................................................................................48
Computers Are Data Processing Devices .............................................................................48
Bits and Bytes: The Language of Computers .......................................................................48
Your Computer’s Hardware ...................................................................................................50
Input Devices ..........................................................................................................................................51
Keyboards..................................................................................................................................52
Mice and Other Pointing Devices ..........................................................................................54
Touch Screens............................................................................................................................56

iv
eighth

EDITION
EIGHTH
8
Image Input...............................................................................................................................57
ETHICS IN IT: What Is Ethical Computing? ........................................................................58
Sound Input ..............................................................................................................................59
Output Devices ........................................................................................................................................60
Monitors ....................................................................................................................................60
Printers.......................................................................................................................................62
DIG DEEPER: How Inkjet and Laser Printers Work...........................................................65
Sound Output ...........................................................................................................................66
Processing and Memory on the Motherboard ....................................................................................67
Memory .....................................................................................................................................67
Processing..................................................................................................................................68
Storing Data and Information ..............................................................................................................69
Hard Drives...............................................................................................................................69
Optical Storage .........................................................................................................................70
Flash Storage .............................................................................................................................71
Connecting Peripherals to the Computer ............................................................................................71
High-Speed and Data Transfer Ports.....................................................................................72
Connectivity and Multimedia Ports ......................................................................................73
Adding Ports: Expansion Cards and Hubs ..........................................................................74
Power Controls........................................................................................................................................75
Setting It All Up ......................................................................................................................................77
TRENDS IN IT: Emerging Technologies—Displays That You Can
Take with You .....................................................................................................................80

Chapter 3
Using the Internet:
Making the Most of the Web’s Resources............................92
The Internet..............................................................................................................................................94
Communicating Through the Internet: E-Mail and Other Technologies ............................................95
E-Mail.........................................................................................................................................95
Instant Messaging ....................................................................................................................97
Group Communication ...........................................................................................................98
Web 2.0 Technologies: Collaborating and Communicating Through the Internet ..........................99
Social Networking....................................................................................................................99
Weblogs (Blogs) and Video Logs (Vlogs)............................................................................100
Wikis.........................................................................................................................................102
Podcasts and Webcasts ..........................................................................................................102
TRENDS IN IT: Computers in Society—The Internet Makes
Business Startups Affordable .........................................................................................104
Web Entertainment: Multimedia and Beyond ..................................................................................106
Conducting Business over the Internet: E-Commerce ....................................................................108
E-Commerce Safeguards .......................................................................................................109

Contents v
eighth
EDITION
EIGHTH
8
Accessing the Web: Web Browsers ..............................................................................................110
Getting Around the Web: URLs, Hyperlinks, and Other Tools ......................................................112
URLs .........................................................................................................................................112
Hyperlinks and Beyond.........................................................................................................113
Favorites, Live Bookmarks, and Tagging............................................................................114
Searching the Web Effectively ......................................................................................................115
Search Engines ........................................................................................................................115
Evaluating Web Sites..............................................................................................................118
The Internet and How It Works ......................................................................................................118
ETHICS IN IT: Plagiarism and Copyright Violation—What Can You
Borrow from the Internet? ..............................................................................................119
Connecting to the Internet..............................................................................................................121
Broadband Connections ........................................................................................................121
Wireless....................................................................................................................................123
DIG DEEPER: Discovering the Semantic Web...................................................................124
Dial-Up Connections .............................................................................................................125
Choosing the Right Internet Connection Option...............................................................126
The Future of the Internet ..............................................................................................................126

TECHNOLOGY IN FOCUS
Information Technology Ethics ................................................................138

Chapter 4
Application Software:
Programs That Let You Work and Play ..........................................160
The Nuts and Bolts of Software ....................................................................................................162
Productivity Software for Home and Office ..................................................................................162
Word Processing Software ....................................................................................................163
Spreadsheet Software ............................................................................................................165
Presentation Software ............................................................................................................166
Database Software..................................................................................................................166
Note Taking Software ............................................................................................................167
Personal Information Manager (PIM) Software ................................................................168
Productivity Software Features............................................................................................169
Integrated Software Applications ........................................................................................169
Software Suites .......................................................................................................................170
Personal Financial Software..................................................................................................171
Media Software for Home ............................................................................................................172
Digital Image Editing Software............................................................................................172
DIG DEEPER: Speech Recognition Software .....................................................................174
Digital Audio Software..........................................................................................................174

vi Technology in Action
eighth

EDITION
EIGHTH
8
Digital Video Editing Software ............................................................................................176
Media Management Software ..............................................................................................177
Software Fun for Home ................................................................................................................178
Gaming Software....................................................................................................................178
Educational Software.............................................................................................................179
Drawing Software ..................................................................................................................180
Business Software for Home and Office ......................................................................................180
Home Business Software.......................................................................................................181
Large Business Software........................................................................................................181
Specialized Business Software..............................................................................................184
Getting Help with Software ..........................................................................................................184
TRENDS IN IT: Emerging Technologies: Is It Real or Is
It Virtual?...........................................................................................................................185
Buying Software ............................................................................................................................186
Software Licenses ...................................................................................................................186
ETHICS IN IT: Can I Borrow Software That I Don’t Own? .............................................187
Preinstalled Software .............................................................................................................187
Web-Based Applications........................................................................................................188
Discounted Software..............................................................................................................189
Freeware and Shareware .......................................................................................................190
Software Versions and System Requirements....................................................................192
Installing, Uninstalling, and Starting Software ............................................................................193

Chapter 5
Using System Software: The Operating
System, Utility Programs, and
File Management ..........................................................................................................206
System Software Basics ................................................................................................................208
Types of Operating Systems ..........................................................................................................209
Real-Time Operating Systems ..............................................................................................209
Operating Systems for Networks, Servers, and Mainframes ..........................................210
Operating Systems for Mobile Devices ...............................................................................211
Operating Systems for Personal Computers ......................................................................211
TRENDS IN IT: Emerging Technologies: Open Source Software—
Why Isn’t Everyone Using Linux? ................................................................................213
What the Operating System Does ................................................................................................214
The User Interface ..................................................................................................................214
Processor Management .........................................................................................................215
ETHICS IN IT: Sugar—The Sweet OS for Every Child.....................................................216
Memory and Storage Management .....................................................................................218
Hardware and Peripheral Device Management ................................................................219
Software Application Coordination.....................................................................................220

Contents vii
eighth
EDITION
EIGHTH
8
The Boot Process: Starting Your Computer ....................................................................................221
Step 1: Activating BIOS .........................................................................................................222
Step 2: Performing the Power-On Self-Test ........................................................................222
Step 3: Loading the Operating System................................................................................222
Step 4: Checking Further Configurations and
Customizations.................................................................................................................223
Handling Errors in the Boot Process ...................................................................................223
The Desktop and Windows Features ............................................................................................224
Organizing Your Computer: File Management ............................................................................227
Organizing Your Files ............................................................................................................227
Viewing and Sorting Files and Folders ...............................................................................229
Naming Files ...........................................................................................................................230
Working with Files .................................................................................................................232
Utility Programs ............................................................................................................................232
Display Utilities ......................................................................................................................233
The Programs and Features Utility......................................................................................233
File Compression Utilities.....................................................................................................234
System Maintenance Utilities ...............................................................................................235
System Restore and Backup Utilities...................................................................................237
DIG DEEPER: How Disk Defragmenter Utilities Work ...................................................238
The Task Scheduler Utility ....................................................................................................239
Accessibility Utilities .............................................................................................................240

TECHNOLOGY IN FOCUS
Computing Alternatives ......................................................................................252

Chapter 6
Understanding and Assessing Hardware:
Evaluating Your System ......................................................................................266
Is It the Computer or Me? ..............................................................................................................268
What Is Your Ideal Computer? ......................................................................................................269
Choosing Either a Desktop or Notebook System ..........................................................................271
Assessing Your Hardware: Evaluating Your System ....................................................................272
Evaluating the CPU Subsystem ......................................................................................................272
Evaluating RAM: The Memory Subsystem ....................................................................................276
Adding RAM ..........................................................................................................................279
Evaluating the Storage Subsystem ................................................................................................279
The Hard Drive.......................................................................................................................280
Optical Storage ..............................................................................................................................283
DIG DEEPER: How a Mechanical Hard Drive Works ......................................................286

viii Technology in Action


eighth

EDITION
EIGHTH
8
Evaluating the Video Subsystem ..................................................................................................286
Video Cards.............................................................................................................................287
Evaluating the Audio Subsystem ..................................................................................................290
Sound Cards............................................................................................................................290
ETHICS IN IT: Optical Technology: A Free Lunch—Or
at Least a Free Copy ........................................................................................................291
Evaluating System Reliability ........................................................................................................291
Making the Final Decision ............................................................................................................294
TRENDS IN IT: Computers in Society: How to Donate Your
Old Computer Safely.......................................................................................................295

Chapter 7
Networking: Connecting
Computing Devices ..................................................................................................306
Networking Fundamentals ............................................................................................................308
Network Architectures ..................................................................................................................310
Describing Networks Based on Network Administration ...............................................310
Describing Networks Based on Distance............................................................................312
Network Components ....................................................................................................................312
Transmission Media ...............................................................................................................313
Network Adapters..................................................................................................................313
ETHICS IN IT: Sharing Your Internet Connection with Your Neighbors:
Legal? Ethical? Safe?........................................................................................................314
Network Navigation Devices ...............................................................................................315
Networking Software ............................................................................................................315
Home Ethernet Networks ..............................................................................................................315
Ethernet Home Networks .....................................................................................................315
Throughput Speeds................................................................................................................316
Network Cabling ....................................................................................................................317
Wired and Wireless on One Network..................................................................................318
Home Ethernet Equipment ............................................................................................................319
Routers and Switches: Moving Data Around Your
Network ............................................................................................................................319
Connecting Devices to Routers ............................................................................................320
Connecting Network Nodes.................................................................................................322
Connecting Other Devices to Networks ........................................................................................322
Network-Ready Devices .......................................................................................................323
Digital Entertainment Devices on a Network ....................................................................324
Specialized Home Networking Devices .............................................................................325
Securing Wireless Networks ........................................................................................................327
Configuring Software for Your Home Network ............................................................................329
Windows Configuration........................................................................................................329

Contents ix
eighth
EDITION
EIGHTH
8
Wireless Node Configuration ...............................................................................................332
TRENDS IN IT: Careers: Cybercops on the Beat—Computer
Security Careers ...............................................................................................................333
Troubleshooting Network Problems ...................................................................................334

TECHNOLOGY IN FOCUS
Under the Hood ..............................................................................................................346

Chapter 8
Digital Lifestyle: Managing Digital
Data and Devices ........................................................................................................362
A Digital Lifestyle ..........................................................................................................................364
Digital Telephony: Communicating with Bits ................................................................................366
Cell Phones and Smartphones..............................................................................................366
Text Messaging .......................................................................................................................371
Internet Connectivity.............................................................................................................372
Voice over Internet Protocol..................................................................................................374
Cell Phone/Smartphone Security........................................................................................376
Digital Media and Information ......................................................................................................377
Digital Music...........................................................................................................................377
Digital Navigation..................................................................................................................381
Digital Photography ..............................................................................................................383
Digital Video ...........................................................................................................................386
ETHICS IN IT: Managing Your Copyrights: Copyleft Might
Simplify Your Life ............................................................................................................388
Digital Mobility and Access ..........................................................................................................392
Selecting the Right Device ....................................................................................................392
Ubiquitous Computing .........................................................................................................393
TRENDS IN IT: Computers in Society: “Ecosystem” of New Tools—
Augmented Reality..........................................................................................................396

Chapter 9
Securing Your System: Protecting
Your Digital Data and Devices ..................................................................408
Keeping Your Data Safe ................................................................................................................410
Computer Threats: Computer Viruses ............................................................................................411
Types of Viruses ......................................................................................................................411
Virus Classifications...............................................................................................................413
Computer Safeguard: Antivirus Software and Software Updates ..............................................414

x Technology in Action
eighth

EDITION
EIGHTH
8
Antivirus Software .................................................................................................................414
Software Updates ...................................................................................................................416
Computer Threats: Hackers ..........................................................................................................417
What Hackers Steal ................................................................................................................417
Trojan Horses ..........................................................................................................................418
Denial of Service Attacks.......................................................................................................419
How Hackers Gain Access ....................................................................................................420
Restricting Access to Your Digital Assets ......................................................................................421
Firewalls...................................................................................................................................421
Types of Firewalls...................................................................................................................421
DIG DEEPER: How Firewalls Work ....................................................................................422
Knowing Your Computer Is Secure .....................................................................................422
Preventing Bluetooth Attacks...............................................................................................424
Password Protection and Password Management ............................................................425
Anonymous Web Surfing: Hiding from Prying Eyes .......................................................428
Biometric Authentication Devices .......................................................................................429
Managing Online Annoyances ......................................................................................................429
Malware, Adware, and Spyware..........................................................................................430
ETHICS IN IT: Big Brother Is Watching . . . But Should He Be Allowed
to Do So? ...........................................................................................................................431
Spam.........................................................................................................................................432
Cookies ....................................................................................................................................433
Protecting Yourself . . . from Yourself! ..........................................................................................434
Protecting Your Personal Information.................................................................................434
Backing Up Your Data ...........................................................................................................435
Social Engineering: Fooling the Unwary ............................................................................438
TRENDS IN IT: Computers in Society: Identity Theft—Is There More Than
One of You Out There?....................................................................................................439
Protecting Your Physical Computing Assets ..................................................................................441
Environmental Factors ..........................................................................................................441
Deterring Theft .......................................................................................................................443

TECHNOLOGY IN FOCUS
Careers in IT ......................................................................................................................456

Chapter 10
Behind the Scenes:
Building Applications ..............................................................................................472
Understanding Software Programming ........................................................................................474
The Life Cycle of an Information System ......................................................................................474
System Development Life Cycle ..........................................................................................474
ETHICS IN IT: When Software Kills....................................................................................477

Contents xi
eighth
EDITION
EIGHTH
8
The Life Cycle of a Program ..........................................................................................................478
Describing the Problem: The Problem Statement..............................................................478
Making a Plan: Algorithm Development............................................................................480
Developing an Algorithm: Decision Making and Design ................................................482
Coding: Speaking the Language of the Computer............................................................486
DIG DEEPER: The Building Blocks of Programming Languages: Syntax,
Keywords, Data Types, and Operators.........................................................................488
Debugging: Getting Rid of Errors........................................................................................493
Finishing the Project: Testing and Documentation............................................................494
Programming Languages: Many Languages for Many Projects ..................................................495
Selecting the Right Language ...............................................................................................496
Windows Applications ..........................................................................................................496
Visual Basic..............................................................................................................................497
Web Applications: HTML/XHTML and Beyond ..............................................................500
Scripting Languages for the Web .........................................................................................500
The Next Great Language .....................................................................................................502
TRENDS IN IT: Emerging Technologies:Will It Blend?
Writing Your First Video Game in Blender ..................................................................504

Chapter 11
Behind the Scenes: Databases and
Information Systems ..............................................................................................516
Life Without Databases ..................................................................................................................518
Database Building Blocks ..............................................................................................................520
Advantages of Using Databases ..........................................................................................520
Database Terminology...........................................................................................................522
Primary Keys ..........................................................................................................................523
Database Types ..............................................................................................................................524
Relational Databases..............................................................................................................524
Object-Oriented Databases ...................................................................................................525
Multidimensional Databases ................................................................................................525
Database Management Systems: Basic Operations ....................................................................526
Creating Databases and Entering Data ...............................................................................526
Inputting Data ........................................................................................................................527
Data Validation .......................................................................................................................528
DIG DEEPER: Structured Query Language (SQL)............................................................530
Viewing and Sorting Data.....................................................................................................532
Extracting or Querying Data ................................................................................................532
Outputting Data .....................................................................................................................533
Relational Database Operations ..................................................................................................534
Normalization of Data...........................................................................................................535
TRENDS IN IT: Computers in Society: User-Populated Databases................................536
Data Storage ............................................................................................................................539

xii Technology in Action


eighth

EDITION
EIGHTH
8
Data Warehouses ....................................................................................................................539
TRENDS IN IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!.............................540
Populating Data Warehouses ...............................................................................................541
Data Staging ............................................................................................................................542
Data Marts ...............................................................................................................................542
Managing Data: Information Systems ..........................................................................................542
Office Support Systems .........................................................................................................543
Transaction-Processing Systems...........................................................................................544
Management Information Systems......................................................................................545
Decision Support Systems.....................................................................................................545
Internal and External Data Sources .....................................................................................546
Model Management Systems ...............................................................................................546
Knowledge-Based Systems ...................................................................................................547
Enterprise Resource Planning Systems...............................................................................547
ETHICS IN IT: Data, Data Everywhere—But Who Is Viewing
It and Why?.......................................................................................................................548
Data Mining ..................................................................................................................................549

Chapter 12
Behind the Scenes: Networking and
Security in the Business World ................................................................562
Networking Advantages ..............................................................................................................564
Client/Server Networks ................................................................................................................565
Classifications of Client/Server Networks: LANs, WANs, and MANs..........................................566
Constructing Client/Server Networks ..........................................................................................569
Servers ..........................................................................................................................................570
Print Servers............................................................................................................................571
Application Servers................................................................................................................571
Database Servers ....................................................................................................................572
E-Mail Servers.........................................................................................................................572
Communications Servers ......................................................................................................572
Web Servers.............................................................................................................................572
Network Topologies ......................................................................................................................572
Bus Topology...........................................................................................................................573
Ring Topology.........................................................................................................................574
Star Topology ..........................................................................................................................576
Comparing Topologies ..........................................................................................................578
Transmission Media ......................................................................................................................578
Wired Transmission Media ...................................................................................................579
Wireless Media Options ........................................................................................................581
Comparing Transmission Media..........................................................................................581

Contents xiii
eighth
EDITION
EIGHTH
8
DIG DEEPER: The OSI Model: Defining Protocol Standards..........................................582
Network Operating Systems ........................................................................................................583
Network Adapters ........................................................................................................................584
Network Navigation Devices ........................................................................................................586
MAC Addresses......................................................................................................................586
Switches and Bridges.............................................................................................................587
Routers .....................................................................................................................................587
Network Security for Client/Server Networks..............................................................................588
Authentication ........................................................................................................................589
Access Privileges ....................................................................................................................589
TRENDS IN IT: RFID—Friend or Foe?................................................................................590
ETHICS IN IT: Network Technicians’ Access to Networks—Who Is Watching
the Watchers?....................................................................................................................592
Physical Protection Measures ...............................................................................................592
Firewalls...................................................................................................................................594

Chapter 13
Behind the Scenes: How the Internet Works ......................606
The Management of the Internet ..................................................................................................608
Internet Networking ......................................................................................................................608
Connecting to the Internet ....................................................................................................609
The Network Model of the Internet.....................................................................................610
Data Transmission and Protocols ..................................................................................................611
Packet Switching ....................................................................................................................612
TCP/IP.....................................................................................................................................613
IP Addresses and Domain Names ................................................................................................613
IP Addresses............................................................................................................................614
DIG DEEPER: Making the Connection—Connection-Oriented Versus
Connectionless Protocols ................................................................................................616
Domain Names .......................................................................................................................617
DNS Servers ............................................................................................................................618
Other Protocols: FTP and Telnet ....................................................................................................619
File Transfer Protocol .............................................................................................................619
Telnet ........................................................................................................................................619
HTTP, HTML, and Other Web Jargon ............................................................................................620
HTTP and SSL.........................................................................................................................620
HTML/XHTML......................................................................................................................621
XML..........................................................................................................................................622
The Common Gateway Interface .........................................................................................622
Dynamic HTML......................................................................................................................623

xiv Technology in Action


eighth

EDITION
EIGHTH
8
Client-Side Applications .......................................................................................................625
ETHICS IN IT: Web Browsing—Not as Private as You May Think ................................626
Communications over the Internet ................................................................................................626
E-Mail.......................................................................................................................................627
E-Mail Security: Encryption and Specialized Software ....................................................628
TRENDS IN IT: Emerging Technologies—The Evolving Internet ..................................630
Instant Messaging ..................................................................................................................632
Voice over Internet Protocol (VoIP) .....................................................................................633
Using the Internet to Deliver Computer Services ..........................................................................634
Glossary ........................................................................................................................................647
Index ..............................................................................................................................................667
Credits ............................................................................................................................................681

Contents xv
eighth
EDITION
EIGHTH
Dedication
8

For my wife Patricia, whose patience, understanding, and support continue to

make this work possible ... especially when I stay up past midnight writing!

And to my parents, Jackie and Dean, who taught me the best way to achieve

your goals is to constantly strive to improve yourself through education.

Alan Evans

For all the teachers, mentors, and gurus who have popped

in and out of my life.

Kendall Martin

For my husband Ted, who unselfishly continues to take on more than his fair

share to support me throughout this process; and for my children, Laura,

Carolyn, and Teddy, whose encouragement and love have been inspiring.

Mary Anne Poatsy

xvi
eighth

EDITION
EIGHTH
What’s New
Technology in Action, Eighth Edition 8
Thank you for your continued use of Technology in Action. To ease • New coverage of system repair discs and Windows’ Problem
your transition, here are highlights of changes for the 8th edition. Steps Recorder
The following list includes comprehensive changes for the
Chapter 6: Understanding and Assessing Hardware: Evaluating
8th edition:
Your System
• New Multiple-Choice Questions • Updates to the “Ideal Computer System” worksheet
All chapters have all-new, multiple-choice questions. In • Updated coverage of all hardware statistics, including
addition, multiple-choice questions have been added to all processors
Technology in Focus features. • New Bits and Bytes: “3D Explosions” and “Taking Your
• New Ethics Projects System Out of the Box”
Each chapter now concludes with a special team-oriented • New coverage of SuperFetch and RAID technology
ethics project that discusses new and interesting develop- Chapter 7: Networking: Connecting Computing Devices
ments in technology that relate directly to the real world. • Chapter revised to refocus content on setting up and working
• New and Updated End-of-Chapter Projects with a home Ethernet network
More than 80% of all of the end-of-chapter projects for • New section on troubleshooting wireless networks
Making the Transition to . . . Next Semester, Making the Chapter 8: Digital Lifestyle: Managing Digital Data and Devices
Transition to . . . the Workplace, Critical Thinking Questions, • Updated coverage of smartphone connection speeds and
and Team Time are all new or have been updated. operating systems, digital cameras, and printers
• New and Updated “Active Helpdesks” • New coverage on syncing computers with mobile devices,
• Completely revised for the 8th edition MiFi access, and Bluetooth tethering
• New Trends in IT: “World Changing: Impact of Mobile
• New look and feel
Technology” and “Ecosystem of New Tools: Augmented
• Updated Windows 7 and Office 2010 content Reality”
The following list includes changes specific to each chapter for Chapter 9: Securing Your Systems: Protecting Your Digital Data
the 8th edition: and Devices
Chapter 1: Why Computers Matter to You: Becoming Computer • Updated coverage of cybercrimes and Facebook privacy
Literate • New and updated coverage of data backups, including
• Updates to computer system statistics online backups
• New section on military careers that use computers • New Bits and Bytes: “CAPTCHA: Keeping Web Sites Safe
From Bots”
Chapter 2: Looking at Computers: Understanding the Parts
• New coverage of Apple’s Mac Mouse Chapter 10: Behind the Scenes: Building Applications
• Updates to how to select a printer and statistics on media • Updated “How Cool Is This?” topic: XNA Game Studio
storage • New coverage of Objective C
• New coverage of USB 3.0 technology Chapter 11: Behind the Scenes: Databases and Information
Chapter 3: Using the Internet: Making the Most of the Web’s Systems
Resources • New “How Cool Is This?” topic: JustTweetIt.com
• New “How Cool Is This?” topic: WolframAlpha • New section on Facebook as a database
• New coverage of wireless in-flight service • Updated coverage on Microsoft Access
• Updates to Internet connection speeds • New Bits & Bytes: “Music Database Helps You Find Music,”
“iTunes Smart Playlists—They’re Just Queries!” and “CRM
Chapter 4: Application Software: Programs That Let You Work Tools Go Online”
and Play • New Trends in IT: “User-Populated Databases”
• New coverage of free software, Software as a Service
Chapter 12: Behind the Scenes: Networking and Security in the
(SaaS), and Web-based software
Business World
• Updated coverage of note-taking software
• New coverage of using wired connections in business networks
• New coverage of open source software licensing and
• Updated network cabling statistics
reinstalling software
• New Bits and Bytes: “Print Documents Anywhere . . . From
• New Bits and Bytes: “Working with Different File Formats,”
Your Phone!” and “PAN Clothing—Organization and Power
“Making a Winning Presentation,” and “Getting Rid of Bloat”
for Portable Gear”
Chapter 5: Using System Software: The Operating System, Util- • Updated Ethics in IT: “Network Technicians’ Access to
ity Programs, and File Management Networks—Who Is Watching the Watchers?”
• Updated coverage of operating systems for cell phones,
Chapter 13: Behind the Scenes: The Internet: How It Works
Microsoft Windows editions, and RAM requirements
• New Ethics in IT: “Web Browsing—Not as Private As You
• New sections on operating systems and platforms, running
May Think”
multiple operating systems on a single computer, and using
• New sections on crowdsourcing and email encryption
Linux

xvii
This page intentionally left blank
eighth

EDITION
EIGHTH
About the Authors
8
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College teaching a variety of computer
science and business courses. He holds a B.S. in accounting from Rider
University and an M.S. in information systems from Drexel University, and he is
a certified public accountant. After a successful career in business, Alan finally
realized his true calling was education. He has been teaching at the college
level since 2000. Alan enjoys giving presentations at technical conferences and
meets regularly with computer science faculty and administrators from other
colleges to discuss curriculum development and new methods of engaging students.

Kendall Martin, PhD


[email protected]
Kendall has been teaching since 1988 at a number of institutions, including
Villanova University, DeSales University, Arcadia University, Ursinus College,
County College of Morris, and Montgomery County Community College, at
both the undergraduate and graduate level.
Kendall’s education includes a B.S. in electrical engineering from the
University of Rochester and an M.S. and a Ph.D. in engineering from the
University of Pennsylvania. She has industrial experience in research and
development environments (AT&T Bell Laboratories) as well as experience with several start-
up technology firms.
At Ursinus College, Kendall developed a successful faculty training program for distance
education instructors. She makes conference presentations throughout the year.

Mary Anne Poatsy, MBA


[email protected]
Mary Anne is a faculty member at Gwynedd-Mercy College and a senior
faculty member at Montgomery County Community College, teaching various
computer application and concepts courses in face-to-face and online
environments. She enjoys speaking at various professional conferences
about innovative classroom strategies. She holds a B.A. in psychology and
education from Mount Holyoke College and an MBA in finance from
Northwestern University’s Kellogg Graduate School of Management.
Mary Anne has been in teaching since 1997, ranging from elementary and secondary
education to Montgomery County Community College, Gwynedd-Mercy College, Muhlenberg
College, and Bucks County Community College, as well as training in the professional
environment. Before teaching, she was a vice president at Shearson Lehman Hutton in the
Municipal Bond Investment Banking Department.

xix
eighth
EDITION
EIGHTH
Acknowledgments
8
First, we would like to thank our students. We constantly learn from them while teaching, and they are a
continual source of inspiration and new ideas.

We could not have written this book without the loving support of our families. Our spouses and
children made sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.

Although working with the entire team at Prentice Hall has been a truly enjoyable experience, a
few individuals deserve special mention. The constant support and encouragement we receive from
Stephanie Wall, Associate Vice President/Executive Editor, and Michael Payne, Editor in Chief, continu-
ally makes this book grow and change. Our heartfelt thanks go to Jennifer Lynn, our developmental
editor. Jennifer continues to have a positive impact on the book, and we have benefited greatly from her
creative ideas and efficient time management skills. In addition, Laura Burgess, our project manager,
has done a fantastic job of coordinating all details of the project and always keeping the entire project
on track. As Media Development Manager, Alana Coles works tirelessly to ensure that the media
accompanying the text is produced professionally and is delivered in a timely fashion. Despite the
inevitable problems that crop up when producing multimedia, she handles all challenges with a smile.
We also would like to extend our appreciation to Mike Lackey, our Production Project Manager, who
works tirelessly to ensure that our book is published on time and looks fabulous. The timelines are
always short, the art is complex, and there are many people with whom he has to coordinate tasks.

There are many people whom we do not meet in person at Prentice Hall and elsewhere who make
significant contributions by designing the book, illustrating, composing the pages, producing multimedia,
and securing permissions. We thank them all. We would also like to thank the supplement authors for
this edition: Lisa Beach, Sharon Behrens, Michael Callahan, Kevin Cleary, Barbara Edington, Stefanie
Emrich, Stacy Everly, Wanda Gibson, Mary Carole Hollingsworth, Terri Holly, Ruth Neal, Tonya Pierce,
and Linda Stoudemayer.

And finally, we would like to thank the reviewers and the many others who contribute their time,
ideas, and talents to this project. We appreciate their time and energy, as their comments help us turn
out a better product each edition.

xx
eighth

EDITION
EIGHTH
Reviewers
8
Prentice Hall and the authors would like to thank the following people for their help
and time in making this book what it is. We couldn’t publish this book without their
contributions.

Nazih Abdallah University of Central Florida


Allen Alexander Delaware Technical & Community College
Joan Alexander Valencia Community College—West
Beverly Amer Northern Arizona University
Wilma Andrews Virginia Commonwealth University
Gregg W. Asher, Ph.D. Minnesota State University—Mankato
LaDonna Bachand Santa Rosa Junior College
Wendy Barron Lehigh Carbon Community College
LeeAnn Bates
Elise J. Bell, MA, Educ. City College of San Francisco
Linda Belton Springfield Technical Community College
David Billings Guilford Technical Community College
Kim Binstead, Ph.D University of Hawaii at Manoa
Susan Birtwell Kwantlen University College
Henry Bojack Farmingdale State University of New York
Julie Boyles
Brenda K. Britt Fayetteville Technical Community College
Cathy J. Brotherton Riverside Community College
Gerald U. Brown Jr. Tarrant County College
Jeff Burton Daytona Beach Community College
Kristen Callahan Mercer County Community College
Judy Cameron Spokane Community College
Jill Canine Ivy Tech Community College of Indiana
Heather Cannon Blinn College
Judy Cestaro California State University—San Bernardino
Deborah Chapman University of Southern Alabama
Gerianne Chapman Johnson & Wales University
John P. Cicero, Ph.D Shasta College—Redding, CA
Dan Combellick Scottsdale Community College
Joann Cook College of DuPage
Mark Connell SUNY Cortland
Gail Cope Sinclair Community College
Françoise Corey California State University, Long Beach
John Coverdale Riverside Community College
Thad Crews Western Kentucky University
Doug Cross Clackamas Community College
Geoffrey Crosslin Kalamazoo Valley Community College
Becky Cunningham Arkansas Tech University
John Cusaac Fullerton College
James Bac Dang Tarrant County College
Marvin Daugherty Ivy Tech
Ronald G. Deardorff Shasta Community College
Joseph DeLibero Arizona State University
K. Kay Delk Seminole Community College
Charles DeSassure Tarrant County College
Gretchen V. Douglas State University of New York at Cortland
Susan N. Dozier Tidewater Community College
Annette Duvall Albuquerque Technical Vocational Institute

xxi
eighth
EDITION
EIGHTH
8
Laurie Eakins East Carolina University
Roland Eichelberger Baylor University
James Fabrey West Chester University
Catherine L. Ferguson University of Oklahoma
Marj Feroe Delaware County Community College
Judy Firmin Tarrant County College
Beverly Fite Amarillo College
Howard Flomberg The Metropolitan State College of Denver
Richard A. Flores Citrus College
Alicen Flosi Lamar University
Linda Foster-Turpen Central New Mexico Community College
Susan Fry Boise State University
Yvonne Galusha University of Iowa
Barbara A. Garrell Delaware County Community College
Ernest Gines Tarrant County College
Tim Gottleber North Lake College
Sherry Green Purdue University—Calumet Campus
Debra Gross The Ohio State University
Vivian Haddad Nova Southeastern University
Don A. Halcomb Bluegrass Community and Technical College
Lewis Hall Riverside City College
Rachelle Hall Glendale Community College
Eric Hamilton Community College of Denver
Bill Hammerschlag Brookhaven College
Terry Hanks San Jacinto College—South Campus
Susan Hanson Albuquerque Technical Vocational Institute
Marie Hartlein Montgomery County Community College
Ronda D. Hayes North Lake College
Susan E. Hoggard Tulsa Community College
Jim Hendricks Pierce College
Catherine Hines Albuquerque Technical Vocational Institute
Norm Hollingsworth Georgia Perimeter College
Bill Holmes Chandler-Gilbert Community College
Mary Carole Hollingsworth Georgia Perimeter College
Sherry Hopkins Anne Arundel Community College
Christie Jahn Hovey Lincoln Land Community College
Jeffrey Howard Finger Lakes Community College
John L. Howard East Carolina University
Judy Irvine Seneca College
Glen Johansson Spokane Community College
Kay Johnson Community College of Rhode Island
Stephanie Jones South Plains College
Steve St. John Tulsa Community College
Kathy Johnson DeVry Chicago
Richard B. Kalman Atlantic Cape Community College
Dr. K. Kamel TSU
Darrel Karbginsky Chemkeketa Community College
Linda Kavanaugh Robert Morris University
Robert R. Kendi Lehigh University
Annette Kerwin College of DuPage
David Kight Brewton-Parker College
Kai S. Koong University of Texas Pan American
Frank Kuehn Pikes Peak Community College

xxii Technology in Action


eighth

EDITION
EIGHTH
8
Jackie Lamoureux Albuquerque Technical Vocational Institute
David K. Lange Grand Valley State University
Joanne Lazirko University of Wisconsin—Milwaukee
Michael R. Lehrfeld Brevard Community College
Yvonne Leonard Coastal Carolina University
Judith Limkilde Seneca College—King Campus
Richard Linge Arizona Western College
Christy Lopez East Carolina University
Joelene Mack Golden West College
Lisa Macon Valencia Community College
Donna Madsen Kirkwood Community College
Daniela Marghitu Auburn University
Norma Marler Catawba Valley Community College
Carol Prewitt Martin Louisiana State University at Alexandria
Toni Marucco Lincoln Land Community College
Evelynn McCain Boise State University
Dana McCann Central Michigan University
Lee McClain West Washington University
Sandra M. McCormack Monroe Community College
Sue McCrory Missouri State University
Phil McCue Lone Star College—Montgomery
Helen McFadyen Mass Bay Community College—Framingham
Charles J. McNerney Ph.D. Bergen Community College
Dr. Dori McPherson Schoolcraft College
Laura Melella Fullerton College
Josephine Mendoza California State University, San Bernardino
Mike Michaelson Palomar College
Gina Bowers Miller Harrisburg Area Community College
Johnette Moody Arkansas Tech University
Dona Mularkey Southern Methodist University
Rebecca A. Mundy University of Southern California
Linda Mushet Golden West College
Lisa Nademlynsky Johnson & Wales University
Maguerite Nedreberg Youngstown State University
Brad Nicolajsen Carteret Community College
Omar Nooraldeen Cape Fear Community College
Judy Ogden Johnson County Community College
Connie O’Neill Sinclair Community College
Claudia Orr Northern Michigan University
James R. Orr East Carolina University
Sung Park Pasadena City College
Brenda Parker Middle Tennessee State University
Patricia Partyka Schoolcraft College
Woody Pekoske North Carolina State University
Judy Perhamus Perry Riverside Community College—Norco Campus
Carolyn Poe Lone Star College—Montgomery
Mike Puopolo Bunker Hill Community College
Paul Quan Albuquerque Technical Vocational Institute
Ram Raghuraman Joliet Junior College
Patricia Rahmlow Montgomery County Community College
Shirley Reid Indian Hills Community College
Ruth Robbins University of Houston—Downtown
Teresa Roberts Wilson Community College

Reviewers xxiii
eighth
EDITION
EIGHTH
8
Catherine J. Rogers Laramie County Community College
Russell Sabadosa Manchester Community College
Peg Saragina Santa Rosa Junior College
Judith Scheeren Westmoreland County Community College
Samuel Scott Pierce College
Vicky Seehusen The Metropolitan State College of Denver
Ralph Shafer Truckee Meadows Community College—Reno
Mirella Shannon Columbia College
Laurie Evin Shteir Temple University
Sheila Smart Sicilia Onondaga Community College
Greg A. Simpson Phoenix College—Phoenix, AZ
Robert G. Sindt Johnson County Community College
Gary R. Smith Paradise Valley Community College
Steven Singer Kapi’olani Community College
Robert Smolenski Delaware County Community College
Diane Stark Phoenix College
James Stark Milwaukee Area Technical College
Suzanne Mello Stark Community College of Rhode Island
Kriss Stauber El Camino College
Neal Stenlund Northern Virginia Community College
Linda Stoudemayer Lamar Institute of Technology
Catherine Stoughton Laramie County Community College
Lynne Stuhr Trident Technical College
Song Su East Los Angeles College
John Taylor Hillsborough Community College—Brandon Campus
Dennie Templeton Radford University
Joyce Thompson Lehigh Carbon Community College
Lou Thompson University of Texas at Dallas
Janine Tiffany Reading Area Community College
Janet Towle New Hampshire Community Technical College—Nashua
Goran Trajkovski Towson University
Deborah Tyler Tarrant County College
Pamella M. Uhlenkamp Iowa Central Community College—Fort Dodge, Iowa
Erhan Uskup Houston Community College—Northwest
Emily Vandalovsky Bergen Community College
Bill VanderClock Bentley Business University
Glenna Vanderhoof Missouri State University
Michelle Vlaich-Lee Greenville Technical College
Karen Weil-Yates Hagerstown Community College
Catherine Werst Cuesta College
Janice L. Williams Seward County Community College
Melanie Williamson Bluegrass Community and Technical College
Steven H. White Anne Arundel Community College
Barbara Yancy Community College of Baltimore County—Essex Camp
Thomas Yip Passaic County Community College
Mary Zajac Montgomery County Community College
Mary T. Zegarski Northampton Community College
Mary Ann Zlotow College of DuPage

xxiv Technology in Action


eighth

EDITION
EIGHTH
Letter from the Authors
8
Why We Wrote This Book
Our combined 43 years of teaching computer concepts have coincided
with sweeping innovations in computing technology that have affected
every facet of society. From iPads to Web 2.0, computers are more than
ever a fixture of our daily lives—and the lives of our students. But
although today’s students have a greater comfort level with their digital
environment than previous generations, their knowledge of the
machines they use every day is still limited.
We wrote Technology in Action to focus on what matters most to today’s student. Instead of a history lesson
on the microchip, we focus on what tasks students can accomplish with their computing devices and what
skills they can apply immediately in the workplace, the classroom, and at home. We strive to be as current as
the publishing timelines will allow us, constantly looking for the next technology trend or gadget. The result
is a book that sparks student interest by focusing on the material they want to learn (such as how to integrate
computing devices into a home network) while teaching the material they need to learn (such as how
networks work). The sequence of topics is carefully set up to mirror the typical student learning experience.
As they read through this text, your students will progress through stages of increasing difficulty:

1. Examining why it’s important to be computer fluent and how computers impact our society
2. Examining the basic components of the computer
3. Connecting to and exploring the Internet
4. Exploring software
5. Learning the operating system and personalizing the computer
6. Evaluating and upgrading computing devices
7. Exploring home networking and keeping the computer safe from hackers
8. Going mobile with smartphones, netbooks, iPads and laptops
9. Going behind the scenes, looking at technology in more detail

We have written the book in a “spiraling” manner, intentionally introducing on a basic level in the earlier
chapters those concepts that students have trouble with and then later expanding on those concepts in more
detail when students have become more comfortable with them. Thus, the focus of the early chapters is on
practical uses for the computer, with real-world examples to help the students place computing in a familiar
context. For example, we introduce basic hardware components in Chapter 2, and then we go into increas-
ingly greater detail on some hardware components in Chapter 6 and in the “Under the Hood” Technology in
Focus feature.
The Behind the Scenes chapters venture deeper into the realm of computing through in-depth explanations
of how programming, networks, the Internet, and databases work. They are specifically designed to keep
more experienced students engaged and to challenge them with interesting research assignments.
We have also developed a comprehensive multimedia program to reinforce the material taught in the text
and to support both classroom lectures and distance learning. The Helpdesk training content, created specifi-
cally for Technology in Action, enables students to take on the role of a helpdesk operator and work through
common questions asked by computer users. Exciting Sound Byte multimedia—fully integrated with the
text—expands student mastery of complex topics.
Now that the computer has become a ubiquitous tool in our lives, a new approach to computer concepts is
warranted. This book is designed to reach the students of the twenty-first century and prepare them for the
challenges they will face in the new global economy.

xxv
eighth
EDITION
EIGHTH
8 Visual Walk-Through
TOPIC SEQUENCE
Concepts are covered in a spiraling manner between chapters to mirror the typical student learning experience.

CHAPTER 2 CHAPTER 6 CHAPTER 6


and front side
1 2
bus (FSB).
Figure 6.26 DO YOU WANT TO UPGRADE YOUR STORAGE SUBSYSTEM?
(FSB deter- CD/DVD drive
mines how Current System Ideal System
fast data is
What is my current hard drive capacity?
exchanged be- Empty drive bay
tween the Do I want to have a very fast startup time (i.e., use an SSD drive for
CPU and my operating system)?
RAM.) These Do I want to implement multiple drives in RAID 0 for performance?
factors will be Hard drive
Do I want to implement multiple drives in RAID 1 for instant backup?
discussed in
greater detail Do I have a DVD-ROM drive?
in Chapter 6. Can I burn DVDs (i.e., do I have a DVD-/+RW drive)?
The “best”
processor will Can I play Blu-ray discs (i.e., do I have a Blu-ray drive)?
depend on Figure 6.16 Can I burn my own Blu-ray discs (i.e., do I have a Blu-ray burner installed)?
your particu- Adding RAM to a
lar needs and Do I have a working data backup solution such as external backup drives or
computer is quite simple
remote data storage?
is not always the processor with the highest and relatively inexpensive. Fortunately, several storage options milliseconds—that’s less than one-hun-
GHz and the greatest number of cores. Intel, • External drive bays can be seen and exist within every computer system. dredth of a second—are typical. A DVD Do I use any portable storage devices such as flash drives or external
one of the leading manufacturers of com- accessed from outside the system unit. Figure 2.31 hard drives?
Storage devices for a typical personal com- drive can take over 150 milliseconds to ac-
puter processor chips, has created a pictorial External drive bays house CD and DVD Storage devices in puter include the hard drive, USB flash cess data.
rating system for CPU chips. Intel uses one drives, for example. On desktop desktop and notebook
computers.
drives, optical drives, and external hard Solid state drives offer even faster access
to five stars to illustrate the relative comput- computers, sometimes there are empty drives. When you turn off your computer, times. A solid state drive (SSD) uses the using your computer system to display files ACTIVE Evaluating
ing power of each type of CPU within the external drive bays that can be used to the data that has been written to these same kind of memory that flash drives that have complex graphics, such as videos HELP- Computer System
Intel line of processors. It also provides an install additional drives. These extra devices will be available the next time the use, but whereas flash drives have access on Blu-ray or from your camcorder, or even DESK
playing graphics-rich games with a lot of
Components
overall ranking of “smart,” “smarter,” and spaces are covered by a faceplate on the machine is powered on. These devices are times of about 1 ms, SSD drives can reach
“genius” and an overview of each proces- front panel. Notebook computers gener- therefore referred to as nonvolatile storage data in only a tenth of that time (around fast action, you may want to consider In this Active Helpdesk call, you’ll play the role of a
sor’s key benefits. ally do not give you the ability to add devices. 0.1 ms). Because there are no spinning upgrading your video subsystem. helpdesk staffer, fielding calls about the computer’s
additional drives. Such expansion is platters or motors needed, SSDs run with storage, video, and audio devices and how to evaluate
done by attaching an external drive to no noise, very little heat, and require Video Cards whether they match your needs, as well as how to
the computer through a USB port. The Hard Drive very little power. As the storage capacities
improve the reliability of your system. Figure 6.27
What is a video card? A video card
Storing Data and You may occasionally see a PC that still What makes the hard drive the most for SSDs continue to increase and the (or video adapter) is an expansion card Video cards have grown
Information has a bay for a floppy disk drive, which reads popular storage device? With storage prices for SSDs continue to drop, you’ll that is installed inside your system unit to to be highly specialized
subsystems.
Earlier we characterized RAM as temporary and writes to easily transportable floppy capacities exceeding 2 terabytes (TB), a hard start to see them in a wide range of translate binary data into the im-
or volatile memory because the entire con- disks that hold a limited amount of data drive has the largest storage capacity of any systems. ages you view on your monitor.
(1.44 MB). Some computers also feature storage device. The hard drive is also a Figure 6.18 provides a listing of the vari- Modern video cards like the ones Video memory chips
tents of RAM are erased when you turn off Processor covered
what’s called a Zip disk drive, which resem- much more economical device than other ous storage options and compares their shown in Figure 6.27 and by heat sink and fan
the computer. Thus, if you permanently want
to save the files you’re working on, as well as bles a floppy disk drive but has a slightly storage options, because it offers the most access times.
your music, digital images, and any software wider opening. Zip disks work just like gigabytes of storage per dollar. Most system Another key performance specification
Video memory chip
applications you use, you need to store them standard floppy disks but can carry much units are designed to support more than one for a hard drive is the speed at which it
in a different location than RAM. To save data more data (up to 750 MB). These storage internal hard drive. The Apple Mac Pro, can transfer data to other computer com-
permanently, you need to save it to the hard devices are legacy technologies and are not shown in Figure 6.17, has room for four hard ponents (such as RAM). This speed of
drive or to another permanent storage device found on new computers. drives. Each one simply slides into place transfer is referred to as data transfer rate.
such as a CD, DVD, or flash drive. Each of when you want to upgrade. Depending on the manufacturer, the rate is
these permanent storage devices is located in Another reason the hard drive is so useful expressed in either megabits or megabytes
your desktop or notebook computer in a Hard Drives for storage is that the hard drive’s access per second.
space called a drive bay (see Figure 2.31). time, the time it takes a storage device to How is data stored on a hard
Which storage device holds the most locate its stored data and make it available drive? A hard drive is composed of sev-
There are two kinds of drive bays—internal Video memory chip Clips into motherboard
data? The hard drive (see Figure 2.32a) is for processing, is faster than that of other eral coated round, thin plates of metal Connects to
and external—as described below: HDMI port to
your computer’s primary device for perma- permanent storage devices, like optical stacked on a spindle. Each plate is called a VGA monitor
digital monitor
• Internal drive bays cannot be seen or nent storage of software and documents. drives. Hard drive access times are meas- platter. When data is saved to a hard drive
accessed from outside the system unit. The hard drive is a nonvolatile storage ured in milliseconds (ms), meaning thou- platter, a pattern of magnetized spots is
S-video port to TV, Digital Video Interface (DVI)
Generally, internal drive bays are device, meaning it holds the data and sandths of seconds. For large- capacity created on the iron oxide coating of each stereo, or VCR port to digital monitor
reserved for internal hard drives. An instructions your computer needs perma- drives, access times of approximately 12–13 platter. When the spots are aligned in one
internal hard drive usually holds all nently, even after the computer is turned off.
permanently stored programs and data. Today’s internal hard drives, with capacities
Evaluating the Video Subsystem 287

Storing Data and Information 69 280 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System

Hardware First Introduced Hardware Taught in More Depth in Additional Chapters


Chapter 2 is the first time students read In later chapters, students are taught hardware in greater depth because they are
about introductory hardware. It is covered more experienced and comfortable working with their computer.
at the beginning level because this is their
experience level at this point of the book.

seven
seven cool
chapter

networking
how
How Cool is This?
connecting computing devices
how cool is this? As you have probably
already experienced, wireless connectivity is not always free. Many businesses, such
is this?
as Starbucks, charge customers for each device they want to connect, which
Highlights the latest and greatest can become expensive for groups of friends trying to surf the Internet while waiting to
catch a flight at the airport. Connectify is free software that takes an existing
websites, gadgets, and multimedia. objectives Internet connection and turns it into a wireless hotspot. So if you are connected to the
objectives

After reading this chapter, you should be able to answer the following questions: Internet on your notebook, the Connectify software turns your notebook
computer into a wireless hotspot so that you and your friends can connect other
1. What is a network, and what are the advantages/disadvantages of setting up one?
(pp. 309–310) WiFi-enabled devices
such as a cell phone
2. What is the difference between a client/server network and a peer-to-peer network?
(pp. 310–312) or gaming system
3. What are the main components of every network? (pp. 312–315) through the same
Internet connection.
4. Which type of network is most commonly found in the home? (p. 315)
The hotspot you
5. What equipment and software do I need to build a network in my home? (pp. 319–322)
create features easy
6. Besides computers, what other devices would I connect to a home network?
connectivity and
(pp. 322–326)
encryption of data for
7. Why are wireless networks more vulnerable than wired networks, and what special
precautions are required to ensure my wireless network is secure? (p. 327) solid security.

Multimedia Cues 8. How do I configure the software on my computer and set up other devices to get my
network up and running? (pp. 329–334)

Visual integration of multimedia. 9. What problems might I encounter when setting up a wireless network? (pp. 334–335)

multimedia resources
multimedia
resources

Active Helpdesk
• Understanding Networking (p. 325)

Sound Bytes
• Installing a Home Computer Network (p. 325)
• Securing Wireless Networks (p. 327)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction

307

xxvi Technology in Action


eighth

EDITION
EIGHTH
Student Textbook
8
ETHICS TRENDS
IN IT Knowledge Is Power—Bridging the Digital Divide IN IT Emerging Technologies: Is It Real or Is It Virtual? DIG
DEEPER
How a Mechanical Hard Drive Works
What would your life be like if you had never touched a computer be- Volunteers, funded by a generous donor, have installed 12 outdoor Software can take us beyond what is familiar to us and into alternate accountants offer services to advise “in-world” businesses on finance,
cause you simply couldn’t afford one? What if there were no computers access points complete with directional antennas to connect a series of realities. Virtual reality uses software to allow people to interact in a sim- strategic planning, or budget forecasting. There is fertile ground for innova- The thin metal platters that make up a hard drive are covered with a spe- concentric circles, each called a track, and pie-shaped wedges, each
in your town? By 2009, almost 75% of the United States had Internet ac- villages to the Internet via a wireless network. The last access point in ulated three-dimensional environment that users can manipulate and tive and entrepreneurial thinkers both inside and outside Second Life. cial magnetic coating that enables the data to be recorded onto one or called a sector, are created in the magnetized surface of each platter,
cess. But for those not served, and for many around the world, access to the connectivity chain connects to an Internet service provider 22 miles explore as if they were in that world. Beyond video games, the applica- Finally, businesses and educational institutions also recognize the both sides of the platter. Hard drive manufacturers prepare the disks to setting up a gridlike pattern that identifies file locations on the hard drive.
the opportunities and knowledge computers and the Internet offer is im- away. The villagers are now able to hold meetings, attend school classes, tions of virtual reality are almost endless. Three-dimensional environ- marketing potential in Second Life, and they use the virtual world to test hold data through a process called low-level formatting. In this process, A separate process called high-level formatting establishes the catalog
possible. The discrepancy between the haves and have-nots with regard and access the Internet without trekking across miles of mountainous ments created by computers are getting better and better at helping new ideas. Educational institutions such as Harvard, Princeton, and Ohio that the computer uses to keep track of where each file is located on
to computer technology is commonly referred to as the digital divide. terrain. Unfortunately, this solution isn’t available throughout all of people experience new things or experience familiar things in new ways. University have built virtual campuses with the intention of offering “vir- the hard drive. More detail on this is presented in the Dig Deeper
This discrepancy is a growing problem. People with access to com- Nepal . . . or even throughout some areas of the United States. Virtual environments are used in military training programs, the tual tours” to prospective students. At these “campuses,” current stu- Read/write head feature “How Disk Defragmenter Utilities Work” on page 238.
puters and the Internet (that is, those who can afford them) are poised to What is being done to bridge the digital divide? Organizations world- space program, and, as discussed in Chapter 1, in the medical field. dents can take courses (see Figure 4.26), participate in student Hard drive platters spin at a high rate of speed, some
Arms
Studies show that soldiers who have gone through virtual reality (VR) organizations, or meet and collaborate online just as they would if they
take advantage of the many new developments technology offers, wide are working to raise awareness and to increase government in- as fast as 15,000 revolutions per minute (rpm). Sitting
training are just as effective as those who have trained in traditional met in the real-world student center.
whereas poorer individuals, communities, and school systems that can’t volvement. Groups are sponsoring referendums that increase Internet between the platters are special “arms” that con-
combat situations. Flight simulators are used by airlines to prepare com- Virtual worlds such as Second Life are innovative ways to hold dis-
afford computer systems and Internet access are being left behind. capacity in schools, for example, and are urging state legislatures to pro- tain read/write heads (see Figure 6.25). A
mercial pilots to fly in a wide range of flight conditions; the military and tance learning classes. Online classes held in a virtual world environment
For example, in the United vide additional funding for technol- NASA also use them. The obvious benefit of simulators and VR is that give students the online convenience of not having to travel to class, read/write head moves from the outer edge of
States, more teachers are using the ogy to struggling school systems. there is little machine or human expense when a mistake is made in vir- while providing a more enjoyable and perhaps even more effective the spinning platter to the center, as frequently as
Internet to communicate with par- Community organizations are rising tual conditions—but there would be in “live” conditions. experience. In a virtual world, students are able to convene in traditional 50 times per second, to retrieve (read) and record
ents than ever before. E-mail up- to the challenge as libraries and Engineers and designers are also using virtual reality technologies. classrooms, on sandy Malibu beaches, or in open-air venues— (write) the magnetic data to and from the hard
dates on student progress, Web sites recreation centers work to provide Car manufacturers build virtual prototypes of new vehicles, test them, environments limited only by the imagination of the instructor and the drive platter. As noted earlier, the average total
with homework postings that allow free Internet access to the public. and make alterations in design before producing a single physical part. students. Given such enjoyable choices, students might be more inclined time it takes for the read/write head to locate the
parents to track assignments, and You can help directly by donat- Architects create virtual models of building plans so that clients or poten- to make time to attend classes, thus increasing their productivity and the
even online parent–teacher confer- ing used computer equipment to tial buyers can “walk through” and get a more realistic idea of what the interactivity of the online classroom. Figure 6.25
completed building will be like. Virtual classroom environments may add an additional layer of expe-
ences are becoming popular. Un- nonprofit groups that refurbish Platters The hard drive is a stack of platters enclosed
Second Life, a virtual world launched in 2003 by Linden Research, rience that students may be able to bring into their professional lives.
wired parents and students are left computers. These organizations re- in a sealed case. Special arms fit in between
Inc., has gained worldwide popularity. Users create avatars, or virtual Seton Hall University, for example, uses Second Life in an emergency
out of the loop. In the United States, pair and upgrade retired systems each platter. The read/write heads at the end
representations of themselves, with which they interact in the virtual preparedness course that allows students to work in simulated cata- of each arm read from and save data to the
children who do not have access to before distributing the systems to world. Second Life has its own economy, where users have created “in- strophic situations, which would otherwise be difficult to experience in platters.
the Internet and computers won’t be needy families at low cost. The Web world” businesses and residents can legally trade in the world’s own the real world.
prepared for future employment, site Techsoup (techsoup.org) main- currency, called Linden dollars. Just as in the real
contributing to the continuing cycle tains national resource lists that can Second Life has also begun to permeate the world, the virtual world has
of poverty. help you find such organizations in outside world.“Outside world” businesses now as- its problems. However, it is
Figure 1.29 sist and advise “in-world” businesses. For likely that virtual reality
But the digital divide isn’t always your area. Some technology com-
caused by low income. Terrain can Terrain such as this glacial lake and mountainous region in Nepal panies have programs in place to example, real-world programmers build complex and virtual environments
show that there can be barriers beyond income to conquering the in-world projects for clients such as Dartmouth Col- will continue to find uses in
be a factor that inhibits connectivity digital divide. help with these efforts. The Mi- BITS Do I need separate players and
lege, Major League Baseball, and Lego. Real-world entertainment, education,
(see Figure 1.29). In Nepal’s moun- crosoft Authorized Refurbisher
distance learning, design,
AND How Do You Find Your WiFi? burners for CD, DVD, and now BD
tainous terrain, for example, even (MAR) program, for example, sup- BYTES formats? Although CDs and DVDs are
and manufacturing.
though a village might only be a few miles away “as the crow flies,” ports refurbishers by allowing certain Microsoft operating systems and based on the same optical technology,
it might take two days to hike there because of the lack of roads. Office software to be installed for free on refurbished systems. Detecting a nearby WiFi signal is important if you are looking for Internet connectivity CD drives cannot read DVDs. If your
while you are on the move. Some notebooks have a system has only a CD drive, you will
built-in WiFi scanner that displays a row of lights need to add a DVD drive to view DVDs.
on the case whenever a WiFi signal is avail- However, if your system has a DVD
able. Keychain fobs that light up when they drive, that is all you need, even just to
Research are working on robots that move in a society. Although computers offer us a detect WiFi signals in the vicinity are also listen.
more human fashion. Their biped (two- world of opportunities, they also pose available. Are there different standards of
legged) robot named Rabbit is able to walk, ethical, legal, and moral challenges and If you are running Windows 7, the Con- optical media? Unfortunately, technol-
run, and climb stairs. It may lead to industrial questions. For example, how do you feel nect to a Network dialog box (accessible from ogy experts have not agreed on a standard
robots that can tackle new tasks for us. about the following? the Network and Sharing Center) shows the DVD format. Currently, there are multiple
• Since the tragic events of September 11, strength of all wireless networks within range of recognized formats, DVD-R/RW
2001, various nationwide surveillance your computer. (pronounced “DVD dash”) and
Understanding the programs have been proposed. Some At ThinkGeek (thinkgeek.com), you may find DVD+R/RW (pronounced “DVD plus”).
the most easy-to-use WiFi detector ever. The WiFi DVD-RAM is a third format.
Challenges Facing a programs include installing surveillance
Detector t-shirt has a logo that lights up to Figure 8.17 Are some CD and DVD drives
cameras in public places that could be
Digital Society considered attractive areas in which to Figure 4.26
indicate the signal strength of a nearby WiFi The WiFi Detector T-shirt faster than others? When you buy an
network (see Figure 8.17). Find your WiFi and makes a statement—a optical drive, knowing the drive speed is
Part of becoming computer literate is being stage terrorist activities. These cameras Virtual worlds are an innovative way to hold
look . . . well, look geeky while doing so! geeky statement. important. Speeds are listed on the device’s
able to understand and form knowledgeable would be monitored via the Internet, distance learning classes.
opinions on the challenges that face a digital possibly by volunteers. Should the packaging.

22 Chapter 1 Why Computers Matter to You: Becoming Computer Literate Getting Help with Software 185 286 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System

Dig Deeper boxes cover techni-


Ethics in IT boxes cal topics in depth to challenge
examine the ethical Trends in IT boxes advanced students. Question/
dilemmas caused explore newer topics involved Answer Format
by technology. in computing. Bits and Bytes teach good habits Written in an engaging
for safe computing. and easy-to-read format.

NEW
Multiple Choice and True/False

Technology in Focus
Five special features that teach key uses
of technology today.
six self-test
six
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which statement about notebook 6. What allows two different programs


computers is FALSE? to be processed at one time?
a. Notebooks typically have a a. Hyperthreading
longer lifespan. b. SSD
b. Notebooks are typically less c. Benchmarking
reliable. d. GPU
c. Notebooks can be docked to 7. Which is not a type of memory stored
larger monitors. in your system?
d. Notebook are more difficult to a. RAM
expand or upgrade. b. Cache
2. ROM is classified as what type of c. CPU register
storage? d. ALU
a. Volatile c. Flash 8. The optimal amount of memory for a
b. Nonvolatile d. Cache
3. To document a problem you are
having, you can use
a. Disk Cleanup.
b. Problem Step Recorder.
c. PC DeCrapifier.
d. Resource Monitor.
4. If you want your system to run
reliably, you should
video card depends on
a. the quality of video you will be
watching.
b. the resolution of the monitor.
c. the number of monitors you have.
d. All of the above.
9. SuperFetch is a memory-management
technique that
a. determines the type of RAM your
S OME PEOPLE ARE DRAWN TO UNDERSTANDING
things in detail, but many folks are happy just to have things work. If
you use a computer, you may not have ever been tempted to “look
under the hood.” However, without understanding the hardware inside,
you’ll be faced with some real limitations. You’ll have to pay a technician to fix or
upgrade your computer. This won’t be as efficient as fine-tuning it yourself, and you
may find yourself buying a new computer sooner than necessary. If you’re preparing
a. delete all programs from the system requires. for a career in information technology, understanding computer hardware will affect
Startup folder. b. makes the boot-up time for the
the speed and efficiency of the programs you design. And what about all those excit-
b. save all of your temporary system very quick.
Internet files. c. preloads the applications you use ing advances you hear about? How do you evaluate the impact of a new type of
c. install programs in the system most into system memory. memory or a new processor? A basic appreciation of how a computer system is built
tray. d. defragments the hard drive to
and designed is a good start.
d. defragment the hard drive. increase performance.
5. Which bests describes RAID 0 10. What is the name for the time it takes We’ll build on what you’ve learned about computer hardware in other chapters and

Under
technology? a storage device to locate its stored go under the hood, looking at the components of your system unit in more detail.
a. Saved data is spread across two data and make it available for Let’s begin by looking at the building blocks of computers: switches.
hard drives. processing?
b. Data is written to one drive and a. Clock speed
mirrored to a second drive. b. Access time
Switches

the
c. RAID 0 allows you to store twice c. Data transfer rate
the data. d. Seek time
The system unit is the box that contains the a computer does, such as processing data or
d. RAID 0 provides an instant central electronic components of the computer. printing a report, is broken down into a series of
backup of your work. But how, exactly, does the computer perform all 0s and 1s. Electrical switches are devices inside
of its tasks? How does it process the data you the computer that can be flipped between these
input? The CPU performs functions like adding, two states: 1 and 0, signifying “on” and “off.”

Hood
subtracting, moving data around the system, and Computers use 0s and 1s to process data because
True–False so on using nothing but a large number of on/off they are electronic, digital machines. They only
switches. In fact, a computer system can be understand two states of existence: on and off.
_____ 1. A single CPU can have multiple cores but cannot also use hyperthreading. viewed as an enormous collection of on/off Inside a computer these two possibilities, or
switches. states, are represented using the binary switches
_____ 2. The memory that your operating system uses is referred to as kernel memory. (or digits) 1 and 0.
_____ 3. Motherboards are designed with a specific number of memory card slots. ELECTRICAL SWITCHES You use various forms of switches every day.
Computers work exclusively with numbers, The on/off button on your DVD player is a
_____ 4. Cache memory is a form of read-only memory that can be accessed more quickly not words. To process data into information, mechanical switch: pushed in, it represents the
computers need to work in a language they un- value 1 (on), whereas popped out, it represents
by the CPU. derstand. This language, called binary language, the value 0 (off). Another switch you use
consists of just two numbers: 0 and 1. Everything each day is a water faucet. As shown in Figure 1,
_____ 5. Solid state drives are faster than hard drives and eSATA drives.

300 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


346 Technology in Action Technology in Focus: Under the Hood 347

xxvii
eighth
EDITION
EIGHTH
The Multimedia
8
Student CD
The launch pad to the multimedia.

Companion Website
Includes an interactive study guide,
online end-of-chapter material,
additional Internet exercises,
and much more.

www.prenhall.com/techinaction

xxviii Technology in Action


eighth

EDITION
EIGHTH
8
Active Helpdesk
Interactive training that puts
the student in the role of a
helpdesk staffer fielding
questions from callers.

Completely Revised
Features textbook page refer-
ences within each call and
assessment at the end of
each call.

Supervisor
available to assist
students.

Related Bits and Bytes refer- Audio on


enced and Sound Bytes. or off.

Transcript button used


to turn transcript on or off.

Sound Bytes
Multimedia lessons
with video, audio, or
animation and corre-
sponding labs featur-
ing multiple-choice
quizzing.

NEW Also available as


podcasts.

Navigational tool. Video or animation


Audio leads students through. teaches key concepts.

xxix
eighth
EDITION
EIGHTH Annotated Instructor Edition
8 Provided with each chapter are two divider pages like the ones outlined below.

FRONT OF CHAPTER TAB


On the front side of each chapter tab, you will find the fol- Chapter 3
lowing categories: Using the Internet:
Making the Most of the Web’s Resources

IN THE CLASSROOM: Activities you can use in a classroom In the Classroom


PowerPoint Presentation Chapter 3
or in online classes, including: (located on the IRCD) Consider using the PowerPoint presentation as a lecture guide, weaving it throughout
the entire class. You can also customize it with additional art images from the IRCD.

Audio PowerPoint Can be used for online courses. Audio content expands on topics covered in the

• PowerPoint Presentations Presentation


(located on the IRCD)
presentation.

Discussion Exercise Making the Transition to . . . The Workplace

• Discussion Exercises (textbook p. 134) Exercise 3: Evaluating Web 2.0 Content


Have students discuss if and how they currently evaluate Web sites, blogs, wikis,
social networking sites, etc. and why it’s important. Then have students search the

• Active Helpdesk Calls Internet for Web site evaluation guidelines, citing their sources. This is a great exercise
to use when you have students in front of lab computers or together in lecture.

Active Helpdesk Call Using Subject Directories and Search Engines

• Sound Bytes (located on the IRCD) This Helpdesk call presents a topic that students usually feel they have mastered, so
they are often surprised to see how much they don’t know. As you run the Helpdesk
call, have a browser open so that you can expand upon what is discussed in the call.

Discussion Exercise Evaluating Web Sites

HOMEWORK: Activities used out of class for assessment or After reviewing the online tutorial at one of the following links, http://muse.
widener.edu/~tltr/How_to_Evaluate_9.htm or http://library.acadiau.ca/tutorials/
webevaluation, show students three examples of good Web sites and three examples of

preparation for the next chapter, including: bad Web sites. Ask them to explain what makes the sites good or bad based on the
material in the tutorial.

• Web Resource Projects Homework


Writing Exercise Making the Transition to . . . Next Semester

• Active Helpdesk Calls (textbook p. 133) Exercise 3: Searching Beyond Google


Have students work in teams to conduct the search for travel deals for spring break.
Students should use all three search engines listed in the exercise. Have students sum-

• Sound Byte Labs marize the pros and cons of using each non-Google search engine. Ask them which
search engine met their needs the best and why they chose that search engine.

Writing Exercise Making the Transition to . . . The Workplace

• Online Study Guides (textbook p. 134) Exercise 5: Internet Connection Speed


Using the sites listed in this exercise, have students evaluate the speed of their Internet
connections—including both upload speeds and download speeds—at home. In class,
discuss why there is such a range in Internet connection speeds.

ASSESSMENT: Writing Exercise Are You 21st Century Literate?


Have students visit mrsoshouse.com/ext/21stcent.html and complete the exercise.
This exercise assesses the student’s current familiarity with Web 2.0 technologies, and
informs them of their need to become 21st century literate.

• Blackboard Preparing for the Next


Technology in Focus
How Ethical Are You?
Have the students take a quiz that either you prepare or direct them to one of many
online quizzes such as the ones http://www.uiowa.edu/~c07w092a/quiz or
http://resources.monster.com/tools/quizzes/bizethics. Have the students write a
• WebCT brief paragraph or two on what surprised them about computer or business ethics.

• TestGen Assessment
Test Bank
• myitlab (located on the IRCD)
To test student comprehension, use the Test Bank questions for Chapter 3 general
content. This week, design the quiz as a timed, one-attempt quiz with some essay
questions included.

The back side of each chapter tab includes the relevant Sound
Bytes for that chapter.

Ethics in Action
FRONT OF ETHICS TAB
Does Privacy Exist in the Modern Workplace?
On the front of the Ethics tab, you will find the following: Personal computers and other electronic devices have become integral to most workplaces.
Many employees, however, do not always use the computing resources provided by their
employers solely for work-related tasks. And employers are now using electronic means to

OPPOSING VIEWPOINTS TABLE: Outlines debatable ethics screen employees prior to employment. Are employees entitled to privacy in the workplace
at least as far as their activities relate to their personal lives? Do employees surrender
personal privacy rights because they are paid to do a job and are using
topics that you can use in the classroom. employer-provided equipment?

Conduct a debate or discussion using the opposing viewpoints in the table below.
Keywords have been supplied to help you search the Internet for more information on the topic.
KEYWORDS: Provides you with additional words to search
Employers: Monitor Employees: Flexibility
the Internet for more information related to the ethics topic. Employees at Work
Employers need to monitor workers so they are honest. Employees sometimes need to handle personal business

For a list of the resources available for every chapter and during work hours.

where they are located, see the back of this tab. Employers want employees working for the business
100 percent of the day.
If some individuals complete their work in less time, why
can’t they conduct some personal business on company
time?

Employers need to run background checks on employees. Personal life should be separate from one’s business
identity.

Monitoring employees helps measure employee There are other ways to test productivity (such as meeting
productivity. performance goals) other than monitoring phone calls
and e-mails.

Monitoring employees alerts managers to possible leaks of Employees should be respected as professionals and will
information to competitors. uphold basic principles of business ethics without being
monitored.

keywords

keystroke monitoring legality, satellite GPS, monitoring employees,


video surveillance, workplace privacy, employee privacy, e-mail monitoring,
IM monitoring, employee phone record tracking

xxx Technology in Action


eighth

EDITION
EIGHTH
Instructor Resource CD
GREATLY
8
ENHANCED
Instructor Resource CD
• NEW! Interactive Course Builder to help you integrate all the instructor resources.
• NEW! Recommended chapter lectures written by the authors that you can customize.
• All resources included with the Technology in Action Instructional System.

Contact your local Prentice Hall sales rep to learn more about the
Technology in Action instructional system.

xxxi
This page intentionally left blank
COMPLETE

Technology
in Action
8th Edition
one
one
chapter

why computers
matter to you:
becoming computer literate

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What does it mean to be “computer literate”? (p. 4)
2. How does being computer literate make you a savvy computer user and consumer?
(pp. 4–5)
3. How can becoming computer literate help you in a career? (pp. 6–20)
4. How can becoming computer literate help you understand and take advantage of
newly emerging careers? (pp. 20–21)
5. How does becoming computer literate help you deal with the challenges associated
with technology? (pp. 22–23)

multimedia resources
multimedia
resources

Active Helpdesk
This chapter has no Active Helpdesks.
Sound Bytes
• Questions to Ask Before You Buy a Computer (p. 6)
• The History of the Personal Computer (p. 21)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Whether you want a
handmade piece of jewelry, a vintage handbag, or a handblown glass
vase, Etsy is the site for you. This person-to-person e-commerce site is beautifully
designed and allows artists and craftspeople to take full advantage of technology and
connect with customers around the globe.
If you are thinking of opening a storefront for your own handmade goods, Etsy
provides an extremely easy entry into e-commerce. It costs just 20 cents to
list an item, and Etsy provides workshops, marketing support, and forums for store
owners to exchange ideas.
In the full spirit of the modern Web, Etsy enthusiasts have created a variety of
ways to connect and collaborate. These include blogs about Etsy and a wiki with info
for Etsy buyers and sellers. You’ll also
find mentions of Etsy on Flickr
photography sites, and a YouTube
video in which Etsy’s founder, Rob
Kalin, talks about creating “a
handmade market-
place.” Facebook gets in
on the act with a My Etsy
tab whereby Etsy sellers
can create a special tab on
their profile page to share
Etsy shops and favorite items.
Now the artistic among us can easily use
technology to expand our world.

3
Why Should You wisely and be a more knowledgeable
consumer.
Become Computer
• Computer-literate employees are sought
Literate? after in almost every vocation.
It’s safe to say that computers are nearly • Becoming computer literate will help
everywhere in our society. You find them in you better understand and take advan-
schools, cars, airports, shopping centers, tage of future technologies.
toys, phones, medical devices, and homes,
and in many people’s pockets. You interact In addition, understanding computers
with computers almost every day, sometimes and their ethical, legal, and societal implica-
without even knowing it. Whenever you buy tions will make you a more active and aware
something with a credit card, you interact participant in society.
with a computer. And, of course, most of us Anyone can become computer literate—
can’t imagine our lives without e-mail. Even no matter what your degree of technical
if you don’t yet have a computer and don’t expertise. Being computer literate doesn’t
feel comfortable using one, you still feel the mean you need to know enough to program
impact of technology: Countless ads for com- a computer or build one yourself. With a car,
puters, cell phones, digital cameras, and an for example, you should know enough about
assortment of Web sites surround us each it to take care of it and use it effectively, but
day. We’re constantly reminded of the ways that doesn’t mean you have to know how to
in which computers, the Internet, and tech- build one. You should try to achieve the
nology are integral parts of our lives. same familiarity with computers.
So, just by being a member of our society,
you already know quite a bit about comput-
ers. But why is it important to learn more Becoming a Savvy
about computers, becoming what is called Computer User and
computer literate? Being computer literate Consumer
means being familiar enough with comput-
ers that you understand their capabilities One of the benefits of becoming computer
and limitations (see Figure 1.1), and you literate is being a savvy computer user and
Figure 1.1
know how to use them. Being computer lit- consumer. What does this mean? The fol-
Do you know what all the lowing are just a few examples of what it
words in a computer ad erate means more than just knowing about
mean? Can you tell the parts of your computer. The following may mean to you:
whether the ad includes are some other benefits: • Avoiding hackers and viruses. Do you
all the information
necessary to make a • As a computer literate individual, know what hackers and viruses are?
purchasing decision? you can use your computer more Both can threaten a computer’s security.

Processor: Intel i7-965 Extreme, Factory O’Cd to 3.73 GHz

RAM: 12 GB Tri Channel Corsair DDR3 (1066 MHz)

Video: ATI Radeon HD 5870 X2 with 1 GB DDR5

Audio: Creative Labs X-Fi Elite Pro; HDA 7.1 surround


channel sound

Network: Native Gigabit Ethernet

Optical Drive: Blu-ray burner

Storage Drive: 1 TB Serial ATA hard drive with support for up to


5 additional drives with RAID options

Ports: 8 USB and 2 USB 3.0


2 DVI and 1 S-Video
2 IEEE 1394
1 S/PDIF out

Physics Accelerator: Ageia PhysX Card

Cooling: Two-stage liquid cooling system

Portable Storage: Bluetooth wireless 19-in-1 media hub with VoIP stereo
headset

Operating System: Windows 7 Ultimate 64-bit

4 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


Being aware of how hackers and viruses to do) you should install on your com-
operate and knowing the damage they puter to avoid online annoyances?
can do to your computer can help you • Being able to maintain, upgrade, and
avoid falling prey to them. troubleshoot your computer. Learning
• Protecting your privacy. You’ve proba- how to care for and maintain your
bly heard of identity theft—you see and computer and knowing how to
hear news stories all the time about peo- diagnose and fix certain problems can
ple whose “identities” are stolen and save you a lot of time and hassle. Do you
whose credit ratings are ruined by know how to upgrade your computer if
“identity thieves.” But do you know you want more memory, for example?
how to protect yourself from identity Do you know which software and com-
theft when you’re online? puter settings can help you keep your
• Understanding the computer in top shape?
real risks. Part of Everywhere
being computer you go, you see ads
literate means like the one in
being able to Figure 1.1 for com-
separate the real puters and other de-
privacy and secu- vices: notebooks
rity risks from (laptops), printers,
things you don’t monitors, cell
have to worry phones, digital cam-
about. For exam- eras, and GPS (global
www.CartoonStock.com

ple, do you know positioning system)


what a cookie is? devices. Do you know
Do you know what all the words in
whether it poses a the ads mean? What is
privacy risk for RAM? What is a CPU?
you when you’re What are MB, GB, GHz,
on the Internet? Figure 1.2 and cache? How fast do
What about a Understanding how to use e-mail effectively is just one you need your com-
firewall? Do you example of what it means to be computer literate. puter to be, and how
know what one much memory should
is? Do you really need one to protect it have? Understanding computer terminol-
your computer? ogy and keeping current with technology will
• Using the Internet and the Web wisely. help you better determine which computers
Anyone who has ever searched the Web and devices match your needs.
can attest that finding information and Finally, becoming computer literate
finding good information are two differ- means knowing which technologies are
ent things. People who are computer on the horizon and how to integrate them
literate make the Internet a powerful into your home setup when possible (see
tool and know how to find the informa- Figure 1.3). Can you connect your notebook
tion they want effectively. How familiar to a wireless network? What is Bluetooth,
with the Web are you, and how effective and does your computer “have” it? Can a
are your searches? USB 3.0 flash drive be plugged into an old
• Avoiding online annoyances. If you USB 1.0 port? (For that matter, what is a USB
have an e-mail account, chances are port?) How much memory should your cell
you’ve received electronic junk mail, or phone have? Knowing the answers to these
spam (see Figure 1.2). How can you and other questions will help you make
avoid being overwhelmed by spam? better purchasing decisions.
What about adware and spyware—do you The benefits of being computer literate will
know what they are? Do you know the help you in your career and in running your
difference between those and viruses, personal life. You’ll be able to save money,
worms, and Trojan horses? Do you time, and endless frustration by having a
know what software programs (or the strong background in the basics of how com-
instructions that tell the computer what puters and computer systems operate.

Becoming a Savvy Computer User and Consumer 5


Questions to Ask
SOUND
BYTE Before You Buy a
Computer
This Sound Byte will help you consider important
questions to ask before you buy a computer, such as
whether you should get a notebook or a desktop, or
whether you should purchase a new computer or a
used or refurbished one.

the workplace, see the Technology in Focus


section, “Careers in IT.”
Becoming truly computer literate—
understanding the capabilities and limita-
tions of computers and what you can do
with them—will undoubtedly help you
perform your job more effectively. It also will
make you more desirable as an employee
and more likely to earn more and advance
your career. So, let’s begin with a look at how
computer systems are used in a wide range
of careers. Whether you become an employee
in one of these industries or a user of its serv-
ices, you will have a great advantage if you
understand computer systems.

Computers in
Today’s Careers
We all are used to seeing computers at the
checkout counter in stores, at the check-in
Figure 1.3
area at an airport, and so on, but there are
Can you identify all of
these devices? Do you
Being Prepared many ways that computers are being used
know how to get them all for Your Career that you probably aren’t aware of. Before we
to work well together? begin looking at a computer’s parts and
Computer careers are on the rise. Regardless how it operates, let’s take a look at a whole
of which profession you pursue, if comput- range of industries and examine how com-
ers are not already in use in that career, they puters are a part of getting work done.
most likely will be soon. Information Whether you plan on a career in one of these
technology (IT) is a field of study focused fields or will just be a user of their products
on managing and processing information and services, your life will be affected by the
and the automatic retrieval of information. use of computers in areas including retail,
Information technology includes computers, arts, law enforcement, the military, agricul-
telecommunications, and software ture, and more.
deployment. IT careers are on the rise, and
the seven fastest-growing occupations are
computer related. New technology in the
Retail: Working in a Data Mine
workplace is creating a demand for new
skill levels from employees. A study from Businesses accumulate a lot of data, but how
the National Research Council concludes do they manage to make sense of all of it?
that by the year 2030 computers will How do they separate the anomalies from
displace humans in 60 percent of the current the trends? They use a technique known as
occupations. It will be more critical than data mining, the process of searching huge
ever for employees to have advanced skills. amounts of data with the hope of finding a
For more information about computers and pattern (see Figure 1.4). For example, large

6 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


retailers often study the data gathered from
register terminals to determine which prod-
ucts are selling on a given day and in a spe-
cific location. In addition to inventory
control systems helping managers figure out
how much merchandise they need to order
to replace stock that is sold, data mining
opens the door to more detail. Managers can
use mined data to determine that if a certain
product is to sell well, they must lower its
price—especially if they cut the price at one
store and see sales increase, for example.
Data mining thus allows retailers to respond
to consumer buying patterns.
Did you ever wonder how Amazon or
Netflix can suggest items that fit your taste?
Or how such Web sites automatically dis-
play lists of items people bought after they
ordered the camera you just picked out?
Data mining can keep track of the purchases
customers are making, along with their
geographic data, past buying history, and
lists of items they examined but did not
purchase. This can be translated into ex-
tremely specific marketing that is immediate
and customized to your shopping experi-
ence. This is the motivation behind all of the
discount cards that grocery stores and Figure 1.4
drugstores offer. In exchange for tracking customers’ packages get from points A to B
Data mining is the art of
your personal buying habits, they offer you without ending up forever at point C? The
combining huge volumes
some kind of special pricing. How much is company uses a sophisticated database and of raw data into views that
your private information worth? a highly efficient package tracking system provide insight.
that follows the packages as they move
around the world.
Business: Data on the Go For UPS, package tracking starts when
Did you know that United Parcel Service the sender drops off a package and the com-
(UPS) handles more than 3.9 billion pack- pany creates a “smart label” for the package
ages and letters a year? Just how does the (see Figure 1.5a). In addition to the standard
“brown” company ensure that all its postal bar code and a bar code showing UPS

a b c

Figure 1.5
(a) Package tracking starts when the package is sent with the generation of a smart label, which includes the UPS
MaxiCode. (b) Portable handheld devices allow UPS personnel to scan packages for accurate transfer of informa-
tion. (c) Devices with built-in GPS are used to find directions to customers, capture customer signatures, and
transfer information.

Computers in Today’s Careers 7


to be a “starving artist,” you’ll probably
want to sell your work. To do so, you’ll need
to advertise to the public and contact art gal-
leries to convince them to purchase or dis-
play your work. Wouldn’t it be helpful if
you knew how to create a Web site like the
one shown in Figure 1.6?
Using computers in the arts and enter-
tainment fields goes far beyond using the In-
ternet. Dance and music programs like the
ones at the Atlanta Ballet and the Juilliard
School of Music use computers to create
new performances for audiences. As shown
in Figure 1.7, a live dancer can be wired
Figure 1.6 customer numbers, this smart label contains with sensors that are connected to a com-
Artists such as Michael something called a MaxiCode. The MaxiCode puter that captures the dancer’s movements.
Koratich display and sell is a specially designed, scannable sticker that Based on the data it collects, the com-
their creations by using resembles an inkblot and contains all the im-
custom Web galleries puter generates a virtual dancer on a
such as this one portant information about the package (class screen. The computer operator can
(michaelkoratich.com). of service, destination, etc.). When the pack- easily manipulate this virtual dancer,
age is handled in processing centers, UPS as well as change the dancer’s cos-
workers scan the MaxiCode using portable tume, with the click of a mouse.
handheld devices (see Figure 1.5b). These This allows artists to create new ex-
devices use Bluetooth technology (a type periences for the audience.
of wireless communication) to transmit Of course, not all artwork
the scanned data through radio is created using traditional
waves to a terminal. This materials such as paint and
terminal then sends the data canvas. Many artists today
across a wireless network, work exclusively with com-
where it is recorded in the puters. Mastery of software
UPS database. programs such as
To track package Adobe Illustrator,
delivery, UPS carriers Adobe Photoshop, and
use delivery acquisition Corel Painter is essen-
devices (see tial to creating digital
Figure 1.5c) that feature art.
wireless networking ca- Other artists are
pability, GPS position- Figure 1.7 pushing the envelope
ing, infrared scanners A dancer is wired with light electronic sensors so of creating art with
(to scan the smart la- that her movements can be digitized for computer computers even fur-
bels and transmit the analysis. ther. For example,
information back to the MacArthur Fellow and
UPS database), and an electronic pad to cap- artist Camille Utterback uses a computer
ture customer signatures. By capturing all of to create works of art that react to the
this data and making it available on its Inter- presence—and the absence—of movement of
net database, UPS enables its customers to the viewers in the gallery (see Figure 1.8).
track their packages. UPS is also able to When no one is near the art piece, the image
make informed decisions about staffing and paints a small series of dots. However, as
deploying equipment (trucks, airplanes, etc.) onlookers in the gallery move closer to the
based on the volume and type of packages in work, a camera mounted on the ceiling of
the system at any given time. the art gallery captures the onlookers’ move-
ments and dimensions. A computer with
specialized software then uses this captured
Arts: Ink, Paints, and a Notebook? data to create smears of color and patterns of
Some art students think that because they’re lines that reflect their movements. Because
studying art, there is no reason for them to the image itself is created from the current
study computers. However, unless you plan and past movements and sizes of the gallery

8 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


patrons, the work looks different each time it have a working knowledge of computers to Figure 1.8
is viewed. You can learn more about Utter- integrate computer technology into the Computers even figure
back’s digital art at macfound.org. classroom effectively. directly into the develop-
ment of artwork. Artist
The Internet has obvious advantages Camille Utterback devel-
in the classroom as a research tool for ops interactive art that
Video Game Design: A Long students, and effective use of the Internet changes with the pres-
Way from Pac-Man allows teachers to expose students to ence and movement of
places students otherwise could not access. viewers in the gallery.
Revenues from video game sales in the
There are simulations and instructional
United States are now larger than the
software programs on the Web that are
movie industry’s box office. Computer
incredible learning tools. Teachers can
gaming topped $21 billion in 2008 and is
employ these products to give students a
projected to continue its rapid growth over
taste of running a global business (see
the next decade. The field is competitive,
Figure 1.10) or provide the experience of
and games must be creative to grab their
the Interactive Body (bbc.co.uk/science/
audience. Large-scale games are impossible
humanbody).
to create on your own—you must be part of
Many museums have virtual tours on
a team. The good news is that because
their Web sites that allow students to
computer games are best developed for a
examine objects in the museum collections.
local market by people native to that
Often, these virtual tours include three-
market, game development will most likely
dimensional photos that can be viewed from
stay in the United States instead of being
all angles. So, even if you teach in Topeka,
offshored (sent to other countries), as
Kansas, you can take your students on a
many other types of programming jobs
virtual tour of the Smithsonian Institution
have been.
in Washington, D.C.
You’ll need an in-depth knowledge of
But what about when you want to take
computers to pursue a career in game pro-
your students to visit museums in person?
gramming or as a gaming artist. Mastering
software animation tools, such as 3ds Max,
Figure 1.9
will enable you to create compelling new
worlds and new characters like those in Using powerful software,
game developers can
the story-driven role-playing game Final
create complex worlds
Fantasy XIII (see Figure 1.9). and characters to satisfy
even the most demanding
gamer.
Education: Teaching and Learning
Today’s teachers need to be at least as com-
puter savvy as their students. Computers
are part of most schools, even preschools. In
fact, at many colleges, students are required
to have their own computers. Courses are
designed around course management soft-
ware such as Blackboard or Moodle so that
students can communicate outside of class,
take quizzes online, and find their class
materials easily. Teachers must therefore

Computers in Today’s Careers 9


Figure 1.10
Internet applications have Today, technology is often used to enhance group and direct them to specific works you
become sophisticated visitors’ experiences at museums. New want them to see. Being literate with tech-
learning resources. York’s Museum of Modern Art (MoMA), for nology may help make your museum tour
IndustryMasters.com example, offers a full range of options for even more memorable.
allows students to tech-savvy visitors: old-fashioned museum Computers in the classroom will become
compete online for
domination of a global audio guides, podcasts you can listen to more prevalent as prices continue to fall and
market while giving with your smartphone, and multimedia parents demand that their children be
instructors the chance to tours that you can download through taught the computer skills they will need to
introduce many business MoMA WiFi (moma.org) to your own MP3 be successful in the workplace. Therefore, as
concepts. device such as a Zune or an iTouch. These an educator, being computer literate will
multimedia guides let you listen to music
that the artist listened to when he or she was
creating a particular work or look at other
works that reflect similar techniques or
themes to those of the one you’re viewing
Figure 1.11 (see Figure 1.11). While looking at works by
Multimedia tours using more modern artists, you can watch inter-
mobile devices and views with the artist explaining his or her
wireless technology are motivation for the work. You can even
commonplace in museums connect quickly to other members of your
and galleries.

10 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


help you integrate com- computer and
a
puters constructively located searches for
into lesson plans for your terms like “hire a
students and use technol- hitman” and “GHB,”
ogy to interact with them. the date rape drug.
Zirko also had used
his computer to find
the daily schedule
Law Enforcement: Put Down for his victim’s two
That Mouse—You’re Under school-aged children
and to get directions
Arrest! to her home. This
Today, wearing out b
case is one of
shoe leather to many solved by
solve crimes is far the use of com-
from the only puter forensics
method available to techniques. In
investigators trying many cases, files,
to catch criminals. videos, and
Computers are being conversations
used in police cars and conducted using a
crime labs to solve an computer can be
increasing number of recovered by forensics
crimes. For example, specialists and used as
Figure 1.12
facial reconstruction evidence of criminal
systems like the one (a) The FastScan wand lets forensics teams quickly activity.
grab three-dimensional images of skulls. (b) Tissue-
shown in Figure 1.12 rendering programs then add layers of muscles, Computers are also
can turn a skull into fat, and skin to create faces that can be used to used in training law
a finished digital identify victims. enforcement officers to be
image of a face, more effective. For exam-
allowing investigators to proceed far more ple, the Federal Bureau of Investigation
quickly with identification. (FBI) and the Transportation Security
One technique used by modern detectives Administration (TSA) use computer-based
to solve crimes uses computers to search the training to teach officers to recognize lies
vast number of databases on the Internet. and evasive behavior. Dr. Paul Ekman has
Proprietary law enforcement databases such spent a career studying microexpressions,
as the National Center for the Analysis of brief (1/25th of a second) flashes of emotion.
Violent Crime database enable detectives to When a person is being deceptive, microex-
analyze a wealth of information about simi- pressions, which cannot be controlled,
larities between crimes, trying to detect pat- reveal true emotions in his or her body
terns that may reveal serial crimes. Where language. The Microexpression Training Figure 1.13
the law permits, detectives can also use their Tool software system (paulekman.com), a The Microexpression
knowledge of wireless networking to inter- program developed by Ekman’s company, Training Tool software
cept and read a criminal suspect’s e-mail trains users to recognize emotions such as trains law enforcement
messages and chat sessions when he or she fear, disgust, contempt, and anger in these officials to distinguish true
is online, all from the comfort of a car flashes of mi- emotion from deception.
parked outside the suspect’s home. croexpressions
As detective work goes more high tech, (see Figure 1.13).
so, too, does crime. To fight modern crime, a You can try the
law enforcement specialty called computer online demo to
forensics is growing. This specialty analyzes see if you are a
computer systems with specific techniques “natural,” one of
to gather potential legal evidence. For exam- the rare people
ple, in 2009 Steven Zirko was convicted for who can recog-
two Chicago-area murders based on com- nize and read
puter forensics work. FBI-trained computer emotion without
forensics examiners scoured Zirko’s training.

Computers in Today’s Careers 11


DIG
DEEPER
Computers Migrate into the Living Room

You’re probably already using your computer in many different ways to fit Or use the notebook computer upstairs to play a dance song through the
your lifestyle. Perhaps you’re ripping your CD collection to MP3 files and big speakers in the basement audio system?
downloading movies so that you can transfer them from your computer When in the future will you be able to do all this? Right now if you set
to your iPod or Zune. Maybe you’re burning a CD of all your favorite up a digital home. Setting up a digital home means having an appropri-
songs for a party you’re having. But wouldn’t it be great if you could ate computer and digital devices that are all connected to a home net-
manage the music for your party straight from your computer? And what work. Let’s discuss the key components you need to get started with a
about that video of your friend’s birthday party you shot last week? digital living room, some of which are shown in Figure 1.14.
You’ve already imported it to your computer, edited it, and added a music 1. A media computer: A computer is the nerve center of any digital
track. But when your friends come over for the party this weekend, home, allowing you to interface with all the different digital devices
wouldn’t it be fun to be able to show them the video on the TV in the liv- you have connected to the network. For a Windows-based
ing room instead of having them crowd around your computer monitor? computer (see Figure 1.15), you should opt for a computer running

Media center
computer system

LED Internet-ready
TV

Universal remote
control
Wireless keyboard
with built-in trackpad

Figure 1.14
You can create a digital living room with only a few devices.

Military Careers: Drive That Drone desirable military positions require knowl-
edge of computer software and hardware.
Developing and using cutting-edge technol- Right from the start, planning a career in
ogy has always been an important compo- the military is easier for those who are
nent of a military career, and advanced computer literate. The ASVAB (Armed
technology is especially important in Services Vocational Aptitude Battery) exam is
modern times. The need for electronic a requirement for entry into the U.S. armed
communications in the field means that services, and the scores on various sections of
many soldiers are trained computer this exam determine if you are eligible to en-
specialists in areas such as satellite transmis- list, indicate which branch or branches of the
sions, radio controllers, and computer military will consider you, and identify
networking. Whether the job is in electronics, which military careers are appropriate.
aviation support, art and media production, Studying for this timed multiple-choice exam
or logistics and supply, many of the most can involve using tools such as an iTouch

12 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


high-definition media (such as Blu-ray discs) or onto DVDs and
CDs instead of your hard drive.
c. A network adapter: A network adapter is a device that is in-
stalled in your computer and allows it to communicate with
other devices on a network. (You’ll learn more about network
adapters in Chapter 7.) For digital devices to communicate with
each other, they need to be connected to a network.
2. A network: Unless you’re going to view digital and audio files only
on your computer, you will need a network to transfer files easily to
other devices (such as televisions) in your home. A wireless net-
work has an advantage over a wired network because it is easier to
relocate devices on a wireless network. (You’ll learn all about wired
and wireless networks in Chapter 7.)
Figure 1.15 3. An Internet-ready digital television: Newer plasma and organic
light-emitting diode (OLED) televisions (see Figure 1.14) or high-
Media Center in Microsoft Windows 7 allows you to manage all definition TVs (HDTVs) are an important part of any digital home
your media entertainment from your computer.
because they are the best way to show off all your digital media.
Internet-ready televisions are featured in most companies’ product
the current version of Microsoft Windows 7 or Windows Vista as its lines now. These have network adapters built in and include soft-
operating system. (We’ll discuss operating systems in more detail ware that allows you to access a limited number of Internet sites.
in Chapter 5.) Often YouTube is available, for example, as well as support for
A typical media PC will be equipped with the software to cus- streaming videos using video-on-demand services from Netflix
tomize it to the tasks of a digital entertainment center. Windows 7 and Amazon.
already incorporates versions of much of the software you might 4. A universal remote: A universal remote is a single remote control
want to add. Windows Media Center is part of Windows 7 and func- that works with any infrared-controlled device (such as your
tions as a digital video recorder (DVR), a video player, and a music computer, amplifiers, receivers, and game consoles) and allows you
player. You can use Media Center to view and organize the digital to access media such as MP3 files no matter where in the house it
audio and video files on your computer. The DVR software allows is stored. Universal remotes such as the Pronto from Philips (see
you to turn your computer into a DVR similar to TiVo. Digital video Figure 1.14) come with software that allows you to program your
recorders record TV programs like analog VCRs used to do, but they own custom interface for the remote. You can even program
use the computer’s hard drive to store the video. macros that perform multiple commands with the press of a
There are some other hardware components most users want button.
to add to their media computer:
a. A TV tuner: A TV tuner allows your computer to receive televi- With these devices installed, you can get the maximum benefit from
sion channels from a cable connection and display them on your computer and all your digital entertainment devices. When you’re in
your computer monitor. In fact, you can install more than one TV your living room, you can play digital music files stored on your computer
tuner on your computer, allowing you to receive multiple televi- (in the den) for the party you’re throwing. You can also display the video
sion channels at the same time. of your friend’s birthday party (downloaded to your computer) on the TV
b. Blu-ray, DVD, and CD players and recorders: To make it easy for your friends to see. And when you’re in your room, you can watch the
to transfer your audio or video files from one device to another, latest episode of CSI, which you recorded on your computer’s hard drive,
Blu-ray and DVD/CD players and recorders allow you to play while your sister is listening to MP3 files stored on your computer on the
all kinds of optical media. You can also record files onto TV in the living room.

Web app or an online tutorial. Many public while the driver is in a remote location
libraries have access to databases that store thousands of miles away. Recent software
sample ASVAB questions and provide learn- innovations such as the Gorgon Stare soft-
ing modules to guide you in your prepara- ware package feeds 12 video screens of in-
tion for the exam. Knowing how to use all formation— covering an area of 1.5 square
these tools will give you an advantage. miles—back to the “pilot” in Virginia. The
The U.S. military branches have some of pilot can decide to deliver Hellfire missiles
the most highly technological projects ever and bombs to any section of that area.
developed. For example, the Air Force em- Models of drones that can take off and
ploys unmanned aerial vehicles, called UAVs land on aircraft carriers are expected to
or drones, to perform surveillance operations be on the scene in the next few years.
and to deliver missiles (see Figure 1.16). Maintaining and operating highly
Modern drones use complex video and technological tools is part of military life for
guidance systems to do their work, all many soldiers.

Computers in Today’s Careers 13


Figure 1.16
Unmanned drones can be Agriculture: High-Tech Down nights by turning on water pumps to sur-
controlled remotely, even on the Farm round the berries with water and keep them
at distances of thousands from freezing. Today, growers use a Web-
of miles, by modern You might think that ranching and farming based system that can automatically control
avionics systems. are low-tech operations that have little use for the pumps. It analyzes information about
computers and software. The growing season the time, the temperature measured near the
can’t be changed by any computer program! berries, watering schedules, rainfall, and
Even so, new technologies are changing life wind conditions and then automatically
on farms and ranches in many ways. turns the pumps around the bog fields on
Ranchers face many challenges in modern and off as needed.
meat production. For example, they must
watch for and prevent outbreaks of diseases Automotive Technology:
such as hoof and mouth, mad cow, and
E. coli. The meat you purchase can be intro-
Sensors and CPUs
duced to these dangers at many different An automotive technician is required to have
places in the processing chain from the knowledge of a range of tools—impact ham-
ranch to the supermarket. mers, wrenches, pneumatic tools, lathes, and
Fortunately, outbreaks can be managed welding and flame cutting equipment. Indi-
and minimized with the use of radio viduals considering a career in automotive
frequency identification tags (RFID tags). repair today require a sophisticated level of
These RFID tags are small versions of the computer literacy as well (see Figure 1.17).
roadway electronic toll systems used in Environmental trends and governmental
many states to collect tolls automatically as regulation are driving auto manufacturers to
drivers pass through toll stations. Each tag develop vehicles that produce lower emis-
looks like a tiny button and is attached to a sions as the push for more efficient cars and
cow’s ear. It contains a microchip that holds higher gas mileage continues.
a unique sequence of numbers used to iden- These changes have increased the number
tify that animal. When the cow walks past a of sensors and computer CPU (central
panel reader, its location is automatically processing unit) systems needed in a typical
recorded and tracked in a database. vehicle. The fuel injection and engine
If a cow is identified as having a disease, management systems possible today go far
all of its recorded movements can be checked beyond what a simple carburetor can do.
in the database that stores the RFID informa- Several sensors measure everything from air
tion. It is then simple to identify the exact pressure to air temperature, engine tempera-
food lots where that and other animals ate. ture, and throttle position, for example. The
Using RFID tags, potential crises can be data from these sensors is then used to com-
averted or at least better controlled. pute the precise amount of fuel to spray into
In cranberry bogs, computer technology the cylinders, resulting in less fuel waste
is being used in some interesting ways. For and reduced pollution. The braking, trans-
example, cranberry crops easily can be de- mission, and steering systems also are
stroyed by frost. In the past, growers had to primarily controlled by computers and
race to protect the bogs of berries on cold electronic components.

14 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


In 2010, Toyota issued a recall for more
than 6 million cars as a response to con-
sumer complaints of sudden acceleration.
One suspect in the investigation was a mal-
function of the ETCS-I, the electronic throttle
control system module. The National High-
way Traffic Safety Association (NHTSA)
performed tests on the recalled cars but used
a safety protocol for accelerators that was
from 1973, before electronic throttles were
introduced. The incident began a debate
over how much electronics are controlling
modern cars and what limits should be set
in giving control of vehicles to electronic
computer systems.
At the same time, consumers expect digi-
tal music systems, airbags, voice-controlled
phones, and GPS navigation screens in their
cars, so the number of computer subsystems brain associates with physical movement (of Figure 1.17
may continue to grow. In addition to these his arm, for example) and then translates the These automotive
driver-friendly features, the computers in instructions into commands to the robot. technicians for BMW
today’s cars even alert drivers when it’s time Patient Stephen Heywood explained, “After Sauber gather around
to take the cars in for maintenance or repair. being paralyzed for so long, it is almost im- their car before the start
of the Malaysian Grand
As a result, automotive technicians must be possible to describe the magical feeling of Prix. They need computer
able to update documentation through the imagining a motion and having it occur.” skills to run all of the
Internet, use computer databases to learn In addition to being an integral part of electronic checks of
about common problems and solutions, and many medical research projects, computers automotive subsystems.
use computer systems to interface with and are helping doctors and nurses learn their
run diagnostics on all the different automotive trades. Training for physicians and nurses can
computer systems. The days of working on a be difficult even in the best of times. Often,
car in the driveway with some screwdrivers the best way for medical students to learn is
and a socket wrench are fading quickly. to experience a real emergency situation. The
problem is that students are then confined to
watching as the emergency unfolds and
Medicine: Technologies trained personnel care for patients. Students
rarely get to train in real-life situations; when
of Today and Tomorrow they do, a certain level of risk is involved.
In some movies set in the distant future, Medical students now have access to
humans interface with computers just by better training opportunities thanks to a
thinking and looking at a screen or monitor.
Until recently, such scenes took place only in BITS
movies. But since 2006, companies such as AND NASA Wants You ... to Learn
BrainGate have been working to understand BYTES
the human neural interface system. Using
As you read this chapter, hundreds of satellites are orbiting the globe and taking won-
the BrainGate Neural Interface, a patient
derfully detailed pictures of Earth. Until recently, these photos weren’t available to the
suffering from amyotrophic lateral sclerosis
general public. However, thanks to NASA (and U.S. taxpayer dollars) and some savvy
(ALS, which is also known as Lou Gehrig’s
software developers, an application called World Wind is now making some 10 trillion
disease), who no longer had any control of
bytes of imagery available to you. Do you need a picture of Mount Fuji for your science
muscle movement, was able to control the
project or an aerial picture of your house for your PowerPoint presentation? Just
movement of a robotic arm.
download the software from learn.arc.nasa.gov, and you’re ready to go. You’ll find
The BrainGate software translates his
several terrific learning applications here as well. Virtual Lab lets you pretend you
thoughts into commands to the robotic limb.
have your own scanning electron microscope, and Moonbase Alpha is a game built off
The patient has had a tiny array of micro-
of the Unreal engine and is complete with 3D graphics, team play, and the ability to do
electrodes implanted in his brain (see
in-play chatting. With a few clicks, you can have interactive learning resources that
Figure 1.18a). The computer equipment
open the world to you.
receiving data from his neural activity (see
Figure 1.18b) identifies the impulses that the

Computers in Today’s Careers 15


a b the Bioengineering In-
stitute in Auckland,
New Zealand. It now
is a global public
domain effort (not
covered by copyright)
in which bioengineers
are creating realistic
computer simulations
of all systems and
features of the human
anatomy.
Although the Phys-
iome Project’s current
system models a theo-
retical human’s lungs,
Figure 1.18 researchers hope to
computer technology called a patient simu- one day use computers to simulate a specific
(a) The BrainGate Neural
Interface is implanted lator (see Figure 1.19). Patient simulators are person’s anatomical systems. With such a
in the patient’s brain. life-sized, computer-controlled mannequins system, imaging scans (CTs, MRIs, etc.) of
(b) A signal converter that can speak, breathe, and blink (their eyes your body and a sample of your DNA
recognizes patterns and respond to external stimuli). They have a would be fed into a computer, which would
then translates them into pulse and a heartbeat, and they respond just create an exact computer model of your
commands to a robotic
arm. like humans to procedures such as the ad- body. This would allow doctors to experi-
ministration of intravenous drugs. ment with different therapies to see how
Medical students can train on patient sim- you would react to specific treatments. A
ulators and experience firsthand how a great deal of work is still to be done before
human would react to their treatments. The this refinement becomes a reality, and com-
best thing about these “patients” is that if puter-literate medical professionals will be
they “die,” students can restart the needed to make it happen.
computer simulation and try again. Even the In the operating room, computer literacy
U.S. military is using patient simulators to is now a must. Surgeons are even using com-
train medics to respond to terrorist attacks puter-guided robots to perform surgery. Hu-
that involve chemical and biological agents. mans are limited by their manual dexterity
Figure 1.19
Even more exciting than patient simula- and can have trouble making small, precise
Patient simulators allow tors is the work being done on modeling incisions. Robots can help. Robotic surgery
health care students to
practice medical proce- complete human biological systems. The devices can exercise much finer control than
dures without risk of injury Physiome Project began as the brainchild of a human when making delicate incisions
or death to real patients.

16 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


a b

Figure 1.20
with a scalpel. To use the robots, doctors look Medicine: The Chip Within (a) A doctor manipulates
into a surgery control device where they ma- controls that move the
nipulate controls that move robotic devices When you mention implanting technology robotic instrument tips
hovering over the patient (see Figure 1.20). into the human body, some people conjure inside the patient. (b) This
One robot control arm contains a slender im- up images of the Terminator, a futuristic shows what surgeons
cybernetic life form from the movie The might see as they operate
aging rod that allows the doctor to see inside on the patient.
the patient when the rod is inserted into the Terminator. But the more realistic goals of
patient. Doctors can now perform a coronary modern biomedical chip research are to pro-
bypass by vide techno-
making two logical
small incisions solutions to
in the patient physical prob-
and inserting lems and to
the imaging provide a
rod in one inci- means for
sion and an- positively
other robotic identifying
device with a individuals.
scalpel into the We are at a
other. The abil- stage when
ity to make biology and
small incisions technology
instead of the are fusing.
large ones re- Figure 1.21
quired by con- shows a nerve
ventional cell grown on a
surgery means Figure 1.21 silicon chip.
less The cell was
Researchers are experimenting with implantable chips such as this one
trauma and to repair nerve damage and restore movement or sensation to parts of cultured on the
blood loss for the body. chip until it
the patient. formed a net-
Theoretically, surgeons do not even have to work with
be in the same room as the patient. They nearby cells. The chip contains a transistor
could be thousands of miles away, control- that stimulates the cell above it, which in
ling the movements of the robotic devices turn passes the signal to neighboring
from a control station. neurons.

Computers in Today’s Careers 17


being used with other devices (such as elec-
tronic ID cards) to provide tamperproof se-
curity measures. If someone stole your
credit card, that person couldn’t use it if a
salesclerk had to verify your identity by
scanning a chip in your arm before authoriz-
ing a transaction.
Currently, nonimplant versions of iden-
tity chips are used in hospitals. When chips
are attached with bands to newborn infants,
the hospital staff can monitor the location of
any baby instantly. Elevators and doors are
designed to allow only certain people to
Figure 1.22 enter with a specific baby, even if the hospi-
The MIT eyeball chip is a
One potential application of biomedical tal power is interrupted. Although the use of
retinal implant that may chip implants is to provide sight to the blind. these tags is becoming more commonplace,
restore at least partial Macular degeneration and retinitis pigmen- it remains to be seen whether people
vision to certain groups of tosa are two diseases that account for the generally will decide that the advantages of
legally blind patients. majority of blindness in developing nations. having personal identity and medical data
Both diseases result in damage to photore- quickly available justifies having chips im-
ceptors in the retina. (Photoreceptors convert planted into their bodies.
light energy into electrical energy that is Hitachi has a similar device, called the
transmitted to the brain, allowing us to see.) ␮-chip (“mu chip”), which is smaller than
Researchers at the the period at the end
Massachusetts Insti- of this sentence (see
tute of Technology Figure 1.23). Those
(MIT) are experiment- concerned with pri-
ing with a microchip vacy issues worry be-
that would attach to cause the μ-chip
the outside of the eye could be easily at-
(see Figure 1.22), with tached to, or ingested
human trials expected by, a person without
to begin in 2010. The his or her knowledge.
chip would take over On the other hand,
processing from dam- researchers are
aged photoreceptors excited by the possi-
and transmit electrical bility of using the
images to the brain. ␮-chip to monitor the
Figure 1.23
Biomedical chips safety of the food sup-
such as these exem- No bigger than the period at the end of this sentence, ply chain and how it
the Hitachi μ-chip can hold digital information, which
plify the types of med- can then be read when it passes a detector. might be mixed into
ical devices you may paints to monitor heat
“see” in the future. and moisture condi-
One type of chip is already being implanted tions and be embedded in paper and plastics.
in humans as a means of verifying a person’s
identity. Produced by Positive ID and called
the VeriChip, this “personal ID chip” is about
Science: Simulating Reality
the size of a grain of rice and is implanted Thanks to a partnership between the
under the skin. When exposed to radio waves National Severe Storms Lab and the
from a scanning device, the chip emits a signal National Center for Supercomputing
that transmits its unique serial number to the Applications, tornado forecasting may be
scanner. The scanner then connects to a data- getting more accurate (see Figure 1.24).
base that contains the name, address, and Scientists have been able to create a model
medical conditions of the person in whom the so detailed that it takes nine days for a su-
chip has been implanted. percomputer to generate it, even though the
The creators of the VeriChip envision it computer is executing 4 trillion operations
helping keep Alzheimer’s patients safe and each second. Simulations also can model the

18 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


Figure 1.24
structure of solar magnetic flares, which can progress through ranges of motion, such as
Software that combines
interfere with broadcasts on Earth. By study- the angle of a baseball player’s left arm rela- radar information in new
ing the data produced by these simulations, tive to his body as he swings the bat. Minor ways increases the
forecasters hope to improve their predic- adjustments can be made on the computer accuracy of tornado
tions about weather phenomena. regarding positioning of body parts and the predictions and allows
Other technological applications in the force used in performing various move- for earlier warning of
threatened towns.
sciences are being used on some of the old- ments. This helps baseball players, for exam-
est sites on Earth. The ancient site of Pom- ple, enhance their performance by
peii has been under the intense scrutiny of determining what adjustments they should
tourists and archaeologists for decades. make to hit the ball harder and farther.
Sadly, decades of foot traffic and hundreds The U.S. Olympic Training Center in
of years of exposure to the elements have Colorado uses computers extensively in
eroded portions of the ruins. Today, scien- training athletes such as swimmers. The
tists are using three-dimensional scanners major objective in training swimmers to
and imaging software to capture a detailed swim faster is to reduce drag from the water
record of the current condition of the ruins and minimize turbulence, which also slows
(see Figure 1.25). The virtual re-creation of down a swimmer. Software has been devel- Figure 1.25
the ruins is so lifelike that archaeologists can oped that simulates the way water flows A digital re-creation of the
study the ruins on screen instead of at the around the parts of a swimmer’s body when ruins of Pompeii allows
archaeologists to study
actual site. Using the scans as well as satel- in motion. Coaches can use the software to the ruins without even
lite imagery, aerial photography, and other experiment with small changes in the posi- being there, as well as
data, scientists will eventually be able to re- tion of a swimmer’s arms or legs and deter- re-create Pompeii as it
create missing portions of the ruins in a vir- mine whether turbulence and drag are looked before the
tual model. And scientists won’t stop at reduced. The coaches can then train the devastation.
Pompeii. This method will soon be used to swimmers to use the
make records of other decaying sites. new techniques to im-
prove their strokes
Sports Science: Compute Your Way to and speed.
Aren’t planning on
a Better Game competing in the next
Want to be a world-class swimmer or base- Olympics or playing
ball player? Getting an Olympic-caliber in the major leagues?
coach and training for hours every day are How about improving
no longer enough. To get that competitive your weekend golf
edge, you really need to use a computer. game? Employees in
That’s right, computers are often used to golf shops are now
help athletes analyze their performance and using sophisticated
improve their game. How does this work? motion-capture equip-
First, video recordings are made of the ath- ment to improve
lete in action. The video is then transferred golfers’ swings. To
into special motion-analysis software on a have your golf swing
computer. This software measures the exact analyzed, shop per-
angles of the athlete’s body parts as they sonnel hook you up

Computers in Today’s Careers 19


into shoulder, leg, and hip harnesses contain- The prefix nano stands for one billionth.
ing motion sensors. As you swing away at a Therefore, a nanometer is one billionth of a
variety of shots (drives, chips, and so on), meter. To put this in perspective, a human
computers capture information about the hair is approximately 50,000 nanometers
motion of your swing, comparing it to a data- wide. Put side by side, 10 hydrogen atoms
base of the ideal positions of pro golfers (see (the simplest atom) would measure approx-
Figure 1.26). Trainers then suggest adjust- imately one nanometer. Anything smaller
ments you can make so that your swing more than a nanometer is just a stray atom or
closely emulates that of successful golfers. particle floating around in space. Therefore,
Even weekend warriors can benefit from high- nanostructures represent the smallest
tech analysis. human-made structures that can be built.
Nanotechnology is the science of using
Nanotechnology: Careers Yet to Come nanostructures to build devices on an ex-
tremely small scale. Right now,
Developments in computing based on the
nanoscience is limited to improving exist-
principles of nanoscience are being touted as
ing products, such as enhancing fibers
the next big wave in computing. Ironically,
used in clothing with coatings so that they
this realm of science focuses on incredibly
repel stains,
small objects. Nanoscience involves the
resist odors, or stop wrinkles. However,
study of molecules and structures (called
someday scientists hope to use nanostruc-
nanostructures) that range in size from 1 to
tures to build computing devices that will
100 nanometers. It will provide numerous
be too small to be seen by the naked eye.
career paths and high-tech positions over
Nanowires (see Figure 1.27), which are
the next several decades.
extremely small conductors, could be used
to create extremely small pathways in
a
computer chips. Developments such as
this could lead to computers the size of a
pencil eraser that will be far more powerful
than today’s desktop computers.
Ever since the movie Fantastic Voyage,
people have dreamt of nanoprobes, tiny ma-
chines that can be injected into the blood-
stream. Nanotechnology researchers are
now using carbon nanotubes to create de-
vices that deliver medicine and informa-
tion. We are still a long way from
developing nanoscale machines. However,

Figure 1.26
(a) High Definition Golf
does a complete analysis
on your swing and
projects the flight path
the ball would have taken.
(b) It can also simulate
many popular golf
courses, such as Pebble
Beach.

20 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


wide gap in the computing abilities of com-
puters versus their emotional abilities is the
target of research in affective computing.
One project to emerge is the emotional-
social prosthesis (ESP) device developed by a
group at the MIT Media Lab. The ESP system
is targeted at helping people who have
autism. Autistic individuals can have ex-
tremely high intelligence but do not easily
sense nonverbal cues such as facial expres-
sions and tone of voice. ESP is a wearable sys-
tem that isolates the movements and facial
expressions of people, interprets what their
mood and intention probably are, and com-
municates this information back to the user.
Another project at the Media Lab will
help people who have difficulty maintain-
Figure 1.27 ing focus on a specific task. This project cen-
ters on the creation of computer
Nanowires hold promise for use in constructing even
smaller computing devices. systems that can analyze a per-
son’s movements, watch how
the person uses the mouse,
researchers are investigating the use of and interpret the pressure pat-
nanostructures to deliver precise doses of terns on the chair in
drugs on a molecule-by-molecule basis which the person is
within the human bloodstream. Universities seated. That data is
and government laboratories are investing used to determine
billions of dollars in nanotechnology re- the individual’s
search every year. If you have the back- level of attention.
ground and interest in computing The computer could
technology and science, this is the time to then interrupt an
pursue an education in nanoscience. individual who is
beginning to lose
Psychology: You Should Smile . . . Now concentration and
refocus him or her
Science fiction shows and movies such as on a certain task.
Transformers have always been populated While engineers
with robots that emulate humans, seemingly work to create com-
effortlessly. So, when will we have Bumble- puters that can under-
bee, C-3PO, or the Terminator laughing at stand us emotionally,
our jokes or bringing us our favorite snack psychologists and
when they recognize we’re sad? It is a ques- computer scientists
tion that pushes us to explore the nature of are also working to Figure 1.28
being human and the nature of machines. evolve systems toward a more human appear-
Robots with articulated
Psychologists and computer scientists are ance (see Figure 1.28). Teams at the University joints that mimic human
jointly conducting research to develop com- of Michigan, Ohio State University, and the limbs can balance, stand,
puter systems that respond to human affect French Institute of Computer Science walk, and even hug.
and emotional expression, as well as enable
computer systems to develop social and emo-
tional skills. Affective computing is comput- SOUND The History of the
ing that relates to emotion or deliberately BYTE
Personal Computer
tries to influence emotion. Most computers
you are familiar with can perform calcula- In this Sound Byte, you will explore the history of the
tions and do the tasks they are programmed personal computer, including the events that led to
for much faster than humans can, but they fail the development of today’s computers and the people
miserably in telling a good joke or modifying who made them possible.
their behavior based on your frustration. This

Computers in Today’s Careers 21


ETHICS
IN IT Knowledge Is Power—Bridging the Digital Divide

What would your life be like if you had never touched a computer be- Volunteers, funded by a generous donor, have installed 12 outdoor
cause you simply couldn’t afford one? What if there were no computers access points complete with directional antennas to connect a series of
in your town? By 2009, almost 75% of the United States had Internet ac- villages to the Internet via a wireless network. The last access point in
cess. But for those not served, and for many around the world, access to the connectivity chain connects to an Internet service provider 22 miles
the opportunities and knowledge computers and the Internet offer is im- away. The villagers are now able to hold meetings, attend school classes,
possible. The discrepancy between the haves and have-nots with regard and access the Internet without trekking across miles of mountainous
to computer technology is commonly referred to as the digital divide. terrain. Unfortunately, this solution isn’t available throughout all of
This discrepancy is a growing problem. People with access to com- Nepal . . . or even throughout some areas of the United States.
puters and the Internet (that is, those who can afford them) are poised to What is being done to bridge the digital divide? Organizations world-
take advantage of the many new developments technology offers, wide are working to raise awareness and to increase government in-
whereas poorer individuals, communities, and school systems that can’t volvement. Groups are sponsoring referendums that increase Internet
afford computer systems and Internet access are being left behind. capacity in schools, for example, and are urging state legislatures to pro-
For example, in the United vide additional funding for technol-
States, more teachers are using the ogy to struggling school systems.
Internet to communicate with par- Community organizations are rising
ents than ever before. E-mail up- to the challenge as libraries and
dates on student progress, Web sites recreation centers work to provide
with homework postings that allow free Internet access to the public.
parents to track assignments, and You can help directly by donat-
even online parent–teacher confer- ing used computer equipment to
ences are becoming popular. Un- nonprofit groups that refurbish
wired parents and students are left computers. These organizations re-
out of the loop. In the United States, pair and upgrade retired systems
children who do not have access to before distributing the systems to
the Internet and computers won’t be needy families at low cost. The Web
prepared for future employment, site Techsoup (techsoup.org) main-
contributing to the continuing cycle tains national resource lists that can
of poverty. help you find such organizations in
Figure 1.29
But the digital divide isn’t always your area. Some technology com-
caused by low income. Terrain can Terrain such as this glacial lake and mountainous region in Nepal panies have programs in place to
show that there can be barriers beyond income to conquering the
be a factor that inhibits connectivity digital divide. help with these efforts. The Mi-
(see Figure 1.29). In Nepal’s moun- crosoft Authorized Refurbisher
tainous terrain, for example, even (MAR) program, for example, sup-
though a village might only be a few miles away “as the crow flies,” ports refurbishers by allowing certain Microsoft operating systems and
it might take two days to hike there because of the lack of roads. Office software to be installed for free on refurbished systems.

Research are working on robots that move in a society. Although computers offer us a
more human fashion. Their biped (two- world of opportunities, they also pose
legged) robot named Rabbit is able to walk, ethical, legal, and moral challenges and
run, and climb stairs. It may lead to industrial questions. For example, how do you feel
robots that can tackle new tasks for us. about the following?
• Since the tragic events of September 11,
2001, various nationwide surveillance
Understanding the programs have been proposed. Some
Challenges Facing a programs include installing surveillance
cameras in public places that could be
Digital Society considered attractive areas in which to
Part of becoming computer literate is being stage terrorist activities. These cameras
able to understand and form knowledgeable would be monitored via the Internet,
opinions on the challenges that face a digital possibly by volunteers. Should the

22 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


government be allowed to monitor your such chips outweigh the poten-
activities in public places, à la George tial benefits?
Orwell’s famous book 1984, to help keep • Should companies be
the country secure? allowed to collect personal
• Advances in surveillance device tech- data from visitors to their
nology (see Figure 1.30) are allowing Web sites without their
these devices to become smaller and less permission?
noticeable. In certain jurisdictions, • Should school officials be al-
courts have upheld the rights of em- lowed to use webcams to watch
ployers to install surveillance devices in students while on school grounds
the workplace (sometimes without or attending school events? What about Figure 1.30
needing to notify employees) to cut when students are at home?
down on theft and prevent industrial es- Should the government be
• Should spam be illegal? If so, what allowed to install micro-
pionage. And in 2009 a school district in penalties should be levied on people cameras without your
suburban Philadelphia met with a law- who send spam? knowledge?
suit for possible wiretapping. School of-
• Is it ethical to download music off
ficials are alleged to have recorded
the Web without paying for it (see
images through student notebook web-
Figure 1.31)? How about downloading a
cams (the notebooks were provided by
newly released movie using a torrent?
the school district) and used those im-
What about copying a friend’s software
ages as evidence of illegal behavior by
onto your computer?
students in their own bedrooms. Do you
know if someone is watching you? • What are the risks involved in humans
attempting to create computers that can
• Many employees don’t know that em-
learn and become more human?
ployers have the right to monitor e-mail
and network traffic on the systems they • Should we rely solely on computers to
Figure 1.31
use at work because those systems are provide security for sensitive areas such
as nuclear power plants? Does downloading music
provided at the employer’s expense for without paying for it hurt
the sole purpose of allowing employees As a computer user, you must consider anyone? Or is it merely a
to do their jobs. Have you visited Web these and other questions to define the cost absorbed by huge
sites that you don’t want your employer boundaries of the digital society in which record companies? How
will your choices create
to know about (such as employment sites you live. the music market you will
as part of a new job search)? Have you experience in the future?
sent personal e-mail through your
company e-mail system? Does
your employer know about these
activities? Should employers have
the right to know?

These are just a few examples of


the kinds of questions active partici-
pants in today’s digital society need
to be able to think about, discuss,
and, at times, take action on. Being
computer literate enables you to form
educated opinions on these issues
and to take stands based on accurate
information rather than media hype
and misinformation. Here are a few
other questions that you, as a
member of our digital society, may
be expected to think about and
discuss:

• What privacy risks do biomed-


ical chips such as the VeriChip
pose? Do the privacy risks of

Understanding the Challenges Facing a Digital Society 23


one
one summary
chapter

1. What does it mean to be “computer computer. Among other things, you’ll be


literate”? able to avoid hackers, viruses, and Internet
Computer literacy goes beyond knowing headaches; protect your privacy; and sepa-
rate the real risks of privacy and security
summary

how to use a mouse and send e-mail. If you


are computer literate, you understand the from those you don’t have to worry about.
capabilities and limitations of computers You’ll also be better able to maintain,
and know how to use them wisely. Being upgrade, and troubleshoot your computer;
computer literate also enables you to make make good purchasing decisions; and
informed purchasing decisions, use comput- incorporate the latest technologies into
ers in your career, and understand the many your existing equipment.
ethical, legal, and societal implications of
technology today. Anyone can become 3. How can becoming computer literate
computer literate. help you in a career?
As computers become more a part of our
2. How does being computer literate daily lives, it is difficult to imagine any
make you a savvy computer user and career that does not use computers in some
consumer? fashion. Understanding how to use comput-
By understanding how a computer is con- ers effectively will help you be a more pro-
structed and how its various parts function, ductive and valuable employee, no matter
you’ll be able to get the most out of your which profession you choose.

24 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


summary
one one

chapter
4. How can becoming computer literate 5. How does becoming computer
help you understand and take literate help you deal with the
advantage of newly emerging challenges associated with

summary
careers? technology?
In today’s world, many changes are a result Although computers offer us great opportu-
of new computer technologies. Understand- nities, they also pose ethical, legal, and
ing how today’s computers function should moral challenges and questions. Being com-
help you utilize technology effectively puter literate enables you to form educated
now. And by understanding computers opinions on these issues and to take stands
and how they work today, you can con- based on accurate information rather than
tribute to the technologies of tomorrow media hype and misinformation.
such as nanoscience and new medical
technologies.

25
one
one key terms
chapter

affective computing ............................................ 21 nanotechnology ................................................... 20


Bluetooth technology ......................................... 8 offshored............................................................... 9
computer forensics.............................................. 11 patient simulator ................................................. 16
key terms

computer literate ................................................. 4 public domain...................................................... 16


data mining .......................................................... 6 radio frequency identification tag
digital divide........................................................ 22 (RFID tag).......................................................... 14
digital home ......................................................... 12 software................................................................. 5
information technology (IT) ............................. 6 spam....................................................................... 5
nanoscience .......................................................... 20

26 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


buzzwords
one one

chapter
Word Bank
• affective computing • digital home • patient simulator
• Bluetooth technology • information technology • public domain

buzzwords
• computer forensics (IT) • radio frequency identifica-
• computer literate • nanoscience tion tags (RFID tags)
• data mining • nanotechnology • software
• digital divide • offshoring • spam

Instructions: Fill in the blanks using the words from the Word Bank above.

Becoming computer literate is necessary in modern life and helps with just about any
career path you can imagine. (1) __________, the study of incredibly small computing
devices built at the molecular level, is one field that is expanding and offers great potential
but requires computer literacy. (2) __________ uses an understanding of computer systems
to take criminologists beyond what they could accomplish with conventional investigation
techniques. And as the science of (3) __________ advances, computers will perform more
and more like human beings in emotion and social cueing.

There are many advantages to becoming (4) __________ , that is, understanding more about
the capabilities and limitations of computers. Doing so can help you manage computer
annoyances like unwanted e-mails, which are called (5) __________. You will also know how
to upgrade your system to the latest standards such as wireless (6) __________.

More and more aspects of how our homes are run are being coordinated through comput-
ers, giving rise to the term (7) __________. You may even find you enjoy computers so much
you want to explore careers in (8) __________.

Be forewarned—people who fail to keep up with the knowledge of how to use and main-
tain computer systems will fall to one side of the gap known as the (9) __________. When an
entire country begins to fall behind in computer expertise, jobs are relocated to other, more
tech-savvy countries. This shift of work is known as (10) __________.

becoming
computer literate computer
Using the key terms and ideas you learned in this chapter, write a one- or two-paragraph
literate

summary for your school adviser so that he or she can use it to explain to students the
becoming
importance of being computer literate in today’s job market. Using the Internet, find
additional examples of careers most people would not expect to require computer
knowledge and show how computer literacy is still critical to success in those careers.
Add these examples to your document to support your position.

27
one
one self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which is not a current use of comput- d. run sensors and CPU diagnostics
ers in the military? for a vehicle’s many
a. Using RFID tags to avert potential computerized subsystems.
crises like E. coli epidemics 6. A device that tracks movement is
b. Studying for the standardized a. a PSS.
exam for enlisting b. an RFID tag.
c. Navigating unmanned aerial c. an MP3 device.
vehicles remotely d. a patient simulator.
d. Coordinating communications 7. Computer forensics uses computer
across wired and wireless systems and technology to
networks a. simulate a person’s anatomical
2. Artists interface with technology system.
often, but cannot yet b. train law enforcement officers to
a. use computers to generate images be more effective.
that respond to the environment. c. improve fuel injection and engine
b. use computers to create a virtual management systems.
storefront. d. gather potential legal evidence.
c. use software to suggest plot 8. IT is the abbreviation for
endings. a. information training.
d. use software to create and b. Internet training.
enhance virtual performances. c. Internet technology.
3. People who do not read emotion eas- d. information technology.
ily in others hope for new progress in 9. Which allows retailers to respond to
the field of consumer buying patterns?
a. affective computing. a. RFID tags
b. nanotechnology. b. Data mining
c. patient simulators. c. Smart labels
d. forensic science. d. Bluetooth technology
4. A necessary ingredient for a digital 10. Robotic surgery devices help physi-
home is a cians because
a. network. a. they make incisions that are more
b. videocassette recorder. accurate.
c. radio tuner. b. the doctor does not have to be
d. smartboard. involved in the surgery.
5. Automotive technology requires an c. they monitor and make
understanding of computers to suggestions to the surgeon during
a. properly bill customers. the procedure.
b. control computerized pneumatic d. if the operation runs into
tools. complications, they can suggest
c. keep carburetor settings at creative alternatives.
optimal positions.

True–false
_____ 1. Researchers believe that microchips may one day restore sight to the blind.
_____ 2. Anyone can become computer literate—no matter what their degree of technical
expertise.
_____ 3. Supercomputers can accurately forecast tornadoes within minutes.
_____ 4. Criminal investigators may find evidence on a computer, but that evidence cannot
be used in court.
_____ 5. Many modern museums offer WiFi networks and multimedia downloads to their
patrons to enrich their experience.

28 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


making the
one one

chapter
transition to...
next semester
1. Computer Literacy

transition to ...
In your college career, you’ll be spending time understanding the requirements of the
degree program you choose. At many schools, computer literacy requirements exist
either as incoming requirements (skills students must have before they are admitted)

next semester
making the
or outgoing requirements (skills students must prove they have before graduating).
Does your program require specific computer skills? Which skills are these? Should
they be required? How can students efficiently prove that they have these skills? How
often does the set of skills need to be reviewed and updated?
2. Does Size Matter?
Think about your typical school schedule. What type of computing solution would best
support your needs—a desktop computer, a notebook, or a netbook? Think about the
level of computing power required by your courses. Will any course require you to use
a specialty software product such as a nutrition monitoring program or a statistics
training application? Or do you just need word processing capabilities and Internet
connectivity? How much does portability matter, and do you need a larger-than-usual
screen? How many years do you expect to be able to use the computer you purchase
today?
3. Old Technologies Holding On
What courses and careers have not felt the impact of computer technology? Think of
three courses that are taught effectively with no use of technology. Think of three
careers that do not use computers in a significant way. Research and find the average
salary and the rate of growth in these careers.
4. Digital Dorm
What features of a digital home would make living in your dorm room more produc-
tive? Do you already have access to high-speed Internet? Do you have wireless access?
Do you have a way to time-shift television and audio programming using a digital
media recorder? Do you have remote control of your lights and dorm room fridge?
What about being able to monitor the status of your laundry in the basement washer
and dryer using your cell phone? Identify three additional tools that could be added to
dorm life that would be popular and useful for you or your fellow students.
5. Military Computing
In this chapter, we discussed the use of high-level technology in the U.S. military.
Review the computer science programs at the U.S. Air Force Academy, the U.S. Military
Academy at West Point, and the U.S. Naval Academy. What specific courses or paths of
study do these institutions have that are specific to military settings? What information
do the department Web sites provide on why an understanding of computers matters
to the military? How would this training support a transition from a military career to
the civilian workplace?

29
one
one making the
chapter

transition to...
the workplace
1. The Productivity Paradox
making the

In this chapter, we highlighted several careers that require computer skills. With all of
the workplace

the advancements in computing technology, you might expect to see a great rise in
workforce productivity, yet statistics since 2004 report a decline in productivity. How is
this possible? Do you think it applies in the profession you are in or plan to enter? Can
transition to ...

you think of reasons in which the increased use of computers would decrease
productivity? How has the shift toward more technology in your personal life impacted
you? Are you more or less productive there? How do computers affect creativity?
2. Patients and Medical Computing
There are some major changes in the flow of medical information that impact patients
every day. As more hospitals and doctor’s offices begin to use electronic medical
records (EMRs), the flow of information among the different doctors and care facilities
a patient uses could become much more reliable. In their training and work, doctors
and nurses rely on computers. What about patients? Examine Google Health at
health.google.com for an example of an electronic medical history. How does this mi-
gration from a traditional paper records system impact the skills required for medical
office workers? New ethical questions also often arise when technology changes. How
would a medical facility now protect and verify its data records? What risks are there
with a product like Google Health?
3. Computer Literacy at Work
Computer literacy is a requirement in most professions today. Based on your course of
study, identify two potential jobs (using resources such as Monster.com) that you
would consider applying for after graduation. Research these professions and deter-
mine what the computer literacy requirements are for these types of jobs. How would
you go about proving to a potential employer that you possess the requisite skill set?
4. Using Video in Your Business
With the widespread use of video on the Web, many companies find it essential to have
an online video presence to generate interest in their products. Review a few of the
“Will It Blend?” videos produced by Blendtec (blendtec.com/willitblend). These sim-
ple videos became cult hits on YouTube and remarkably increased Blendtec’s sales of
its high-end blenders. Assume you are working for a company that makes graphic
T-shirts. What types of videos could you deploy that would increase awareness of your
shirts? If you worked for a local restaurant and bar, what types of videos would draw
customers to your business?
5. Social Media Careers
With the explosion of users on social media sites, businesses need to establish their pres-
ence on social media sites. Just search for “Vans” or “Subway” on Facebook for examples
of company sites. To manage their interaction with customers (and fans), companies need
to hire social media managers. Using a job site such as Monster.com, search on social
media manager and review the job postings. What are the educational requirements for
social media managers? What technical skills do these jobs require? Given your major,
what companies would you do well for as a social media manager? What steps should
you take while in school to prepare yourself for a career as a social media manager?
6. Portfolio of Electronic Skills
Job seekers want to highlight their skills for prospective employers—show employers
both what they can do right now to contribute and provide evidence that they can learn
quickly and grow into new technologies and new responsibilities. What skills could
you place in a portfolio to demonstrate your current mastery of computer concepts and
computer applications? How would you document for your employer your ability to
learn, quickly adapt to changes in technology, and acquire new skills?

30 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


critical thinking
one one

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Your Own IT Department


This chapter lists many ways in which knowing about computers (or becoming com-
puter literate) is beneficial. Imagine that you are self-employed—you’ve started a busi-
ness out of your home. What areas of computing would be most important for you to
understand? How would you decide when to pay for support and when you could
handle the problem yourself? How would an understanding of computer hardware
and software help in establishing and marketing your new business?

2. Interactive Art
This chapter briefly discusses the integration of computer technology and art. Pieces
like Flight Time at the Museum of Modern Art use the vast amounts of data around us
to create images and interactive exhibits that are visually exciting. What kind of design
can you envision that brings the data around us into an interactive, visual experience of
beauty? What computer skills would you need to acquire to make that a reality?

3. Perception of Truth
As you learned in the chapter, computer simulations are incredibly sophisticated tools.
Given that the public knows that images and videos can be easily edited digitally, what
role do you think simulations will play in the legal system? What impact would a sim-
ulation, a video, or an image have on a jury in deciding “truth” when the public knows
that these items can be manipulated digitally? Perception plays a role in the integration
of computers to other arenas as well. How do you think public perception of comput-
ers impacts a patient’s decision to use a digital “surgeon” like the da Vinci robotic
surgery system?

4. . . . and Bandwidth for All


In 2010, Google announced it would select a group of communities in the United States
to create an experimental fiber-optic network providing Internet connection speeds of
1 Gb/s, about 300 times the average broadband service. How would that kind of access
change the way you live? How would it change the community in which you live?
What new applications would be possible? Are there disadvantages you can identify?

5. Affective Computing
Affective computing is the science that attempts to produce machines that understand
and can respond to human emotions and social mores. Do you think humans will ever
create a machine that cannot be distinguished from a human being? In your opinion,
what are the ethical and moral implications associated with that development?

6. The World Stage


How might access to (or denial of) electronic information improve the education of a
country’s citizens? Could that affect who the world’s next technology power will be?
Could it eliminate third world status? Examine the ideas behind the Next Einstein from
Africa project at nexteinstein.org to explore this further. What consequence might
developments in Africa have on you, your family, and your experiences?

31
one
one team time
chapter

Promoting Future Technologies


team time

Problem
People are often overwhelmed by how quickly technology changes and by how frustrating
it can be not to know how to use it easily. In response, some people react by using only the
minimum technology they need. In this Team Time, we consider how that reaction might
limit the options available in a career path and what strategies might assist someone in
becoming more comfortable with the pace of technological change.

Task
Talk to the members of your group and find out what each person is most passionate
about—a hobby, a field of study, or some other personal interest. Your mission is to investi-
gate technological tools that would be useful in developing that area of passion and interest
into a career.

Process
Divide the class into three or more teams.
1. With the other members of your team, use the Internet to research up-and-coming tech-
nologies that would support your interests. Do people use social media tools to connect
into groups to exchange ideas? What computer hardware would let you turn your
hobby into a marketable product? What software programs would you need to pursue
turning your interest into a professional career? Prepare a list of skills, tools, and expe-
riences that would prepare you with the technological training to succeed.
2. Present your group’s findings to the class for debate and discussion. How many of
these skills do you have under your belt already? What access do you need to learn the
rest? What new tools will appear in the next four years that you may need to know
after graduation?
3. Write a strategy paper that details how you plan to make sure you have the computer
skills and exposure to put you in a strong position to start your career. Note any barri-
ers you may have to overcome—for example, finding access to the software programs,
getting enough time on specialized equipment, or finding the right training.

Conclusion
The future of technology is unknown, but we do know that the career options available in
four years will include many job paths that don’t even exist today. To be prepared to take
advantage of the opportunities that technology will bring, no matter what area you are
interested in pursuing, will take good planning and attention. Begin now—learn how to
stay on top of technology.

32 Chapter 1 Why Computers Matter to You: Becoming Computer Literate


ethics
one one

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; regardless, your re-
search and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together team members will agree
on an ethical solution.

Topic: Digital Rights Management


Digital entertainment downloads are here to stay: iTunes alone has surpassed 1 billion
downloads. Books, movies, and television shows are all delivered electronically to con-
sumers. But these industries and consumers still wrestle with the ethical conduct they can
expect of each other. Some recording companies support their artists in releasing free song
downloads to publicize an album; others refuse. Some consumers feel they serve the
recording company by spreading a start-up band’s music, but sometimes companies push
for criminal and civil charges against such action.
Digital rights management (DRM) policies are in place now to try to clarify what conduct is
and is not criminal. DRM varies from product to product and item to item. For example,
you might pay one price for a song on iTunes and get the rights to put the song on only five
computers—or you might pay another price and be able to put the song anywhere. And
while negotiating all of these rights policies, the consumer still has access to many ways to
illegally obtain unrestricted use of the same materials.

Research Areas to Consider


• Electronic Arts’ DRM policy for the Will Wright video game Spore
• Legal and illegal torrents
• Electronic Frontier Foundation
• Amazon Kindle and text-to-speech feature

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has violated
DRM rules.
2. Team members should write a summary that provides background information for
their character—for example: artist/creator, consumer, or arbiter—and details their
character’s behaviors to set the stage for the role-playing event. Then team members
should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using either the chat room feature of MyITLab or the discussion board feature of Black-
board or by meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presentation
for review by the rest of the class, along with the summary and resolution they developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

33
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
00010010001000100000011111111100000000001101000100101
00000001101000100101010010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
11111100000000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
11111100000000001101000100101010010101000010000100000
10101000010000100000010010001000100000011111111100000
00000011111111100000000001101000100101010010101000010
00000010010001000100000011111111100000000001101000100

D
o you ever wonder how big the first personal computer was, or how
much the first portable computer weighed? Computers are such an
integral part of our lives that we don’t often stop to think about how far
they’ve come or where they got their start. In just 35 years, computers
have evolved from expensive, huge machines that only corporations
00011 1 1 1to1small,
owned 111 0 0 0 0devices
powerful 0 0 0found
0 0 0in1millions
1 0 1 0of0homes.
0 1 0In0this
1 0Technology
1010010101000010000
0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1we
in Focus feature, we look at the history of the computer. Along the way, 00 0100000011111111
will
discuss some developments that helped make the computer powerful and
01000 1000
portable, as0 0 0as1some
well 1 1 people
1111 who11 0 0 0 0 0to0its0development.
contributed 0 0 0 1 1 0However,
1000100101010010101
01000 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0
we will start with the story of the personal computer and how it grew to0 00be1as0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0
00010 0 1 0to0our
integral 0 1lives
0 0as0the
1 0automobile
0 0 0 0 0is.1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1
00000001101000100101010010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
34 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
0100101010000100001000000100100010001000000111111111000
0001000000111111111000000000011010001001010100101010000
0001001010100101010000100001000000100100010001000000111
0100100010001000000111111111000000000011000111111111000
0001000000111111111000000000011010001001010100101010000
000100 The
1 0 First
1 0 1 0Personal
0101010000100001000000100100010001000000111
010010 Computer:1The
0 0 1 0 0 0 0 0 0Altair
0 0 0 1 1 1 1 1 1 1 1 1 0 0Why0 0 0Was000 It0Called
0 1 1 0the1 0“Altair”?
001001010100
0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0For 0 lack
1 0of 0 a0better
0 1 0name,
0 0 the
0 0Altair’s
0 1 0develop-
0100010001
Our journey through the history of the personal
000100 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 0 0 0ers
computer starts in 1975. At that time, most peo-
1 originally
0 0 1 0called
1 0 1the
0 computer
01010 the1PE-8,
0000100001
01010 0were
ple 101 0 1 0 0with
unfamiliar 001 the0mainframes
0 0 0 1 0 and
0 0 0 0 0 1 0short
0 1for
00 0 1 0Electronics
Popular 0 0 1 0 8-bit.
0 0 0However,
0 0 1 1Les1 1 1 1 1 1 1
supercomputers that large corporations and the Soloman, the Popular Electronics writer who
government owned. With price tags exceeding introduced the Altair, wanted the machine to
the cost of buildings, and with few if any practi- have a catchier name. The author’s daughter,
cal home uses, these monster machines were not who was watching Star Trek at the time,
appealing or attainable to the vast majority of suggested the name Altair. (That’s where the
Americans. That began to change when the Jan- Star Trek crew was traveling that week.) The
uary 1975 cover of Popular Electronics announced first star of the PC industry was born.
the debut of the Altair 8800, touted as the first
personal computer (see Figure 1). For just $395 Figure 1
for a do-it-yourself kit or $498 for a fully assem-
bled unit (about $2,000 in today’s dollars), the
price was reasonable enough that computer fa-
natics could finally own their own computers.
The Altair was a very primitive computer,
with just 256 bytes (not kilo bytes, just bytes) of
memory. It didn’t come with a keyboard, nor did
it include a monitor or printer. Switches on the
front of the machine were used to enter data in
machine code (strings of 1s and 0s). Flashing
lights on the front indicated the results of a pro-
gram. User-friendly it was not—at least by
today’s standards. In 1975, the Altair was touted as the “world’s
Despite its limitations, computer “hackers” first minicomputer” in the January issue of
(as computer enthusiasts were called then) Popular Electronics.
flocked to the machine. Many people who
bought the Altair had been taught to program,
but until that point, they had access only to big,
(a program that translates user commands into
clumsy computers. These people were often
commands that the computer can understand)
hired by corporations to program routine finan-
for the Altair. The two friends later convinced the
cial, statistical, or engineering programs in a
Altair’s developer, Ed Roberts, to buy their pro-
workplace environment. The Altair offered these
gram. This marked the start of a small company
enthusiasts the opportunity to create their own
called Microsoft. We’ll get to that story later. First,
programs. Within three months, Micro Instru-
let’s see what their future archrivals were up to.
mentation and Telemetry Systems (MITS), the
company behind the Altair, received more than
4,000 orders for the machine.
The release of the Altair marked the start of the
The Apple I and II
0 0 0 0 0personal
0 1 0 0computer
1 0 0 0(PC)1 0boom.
0 0 1In0fact,
0 0two
0 0men
0 1 1 1 1Around
1111 1time
the 0 0 the
0 0Altair
000 00
was 0110
released, 10001001
Steve
000000000011010001001010100101010000100001000000100100
who would play large roles in the development Wozniak, an employee at Hewlett-Packard,
0 0 0 1 0of0the
00 PC1were
0 0among
0 0 0 the
0 1first
0 0Altair
100 0 1 0Re-
owners. 0 0 1 0was
0 0becoming
0 0 0 1 fascinated
1 1 1 1 1with 1 1the
1 0burgeoning
00000000011
cent high school graduates Bill Gates and Paul personal computer industry and was dabbling
1 1 1 1 1Allen
1 1 were
1 1 0so0enamored
0 0 0 0 by 00 0 0 1 1 0 1 0
this “minicomputer,”0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0
with his own computer design. He would 0 0 0 1bring
00001000
1 0 0 1 0as1these
0 1 personal
0 0 0 0computers
1 0 0 0 0were 1 0called
0 0 0at0the
0 1 0 0 1his
00 0 1 0 0prototypes
computer 0 1 0 0 0to0meetings
0 0 1 1of1the 111111000
001000000111111111000000000011010001001010100101010000
time, that they wrote a compiling program Homebrew Computing Club, a group of young
001001010100101010000100001000000100100010001000000111
1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0Technology
0 0 0 1 1in0Focus:
0 0 1The
1 1History
1 1 1of1the
11 PC0 0 035
001000000111111111000000000011010001001010100101010000
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
0 0 0 1Figure
0 0 120Steve
0 0 Jobs
1 0(a)00and
10000 b 0011111111100000000001101000100101
Steve Wozniak (b) were two
0 0 0 0computer
0 0 0 1hobbyists
1 0 1 0who 00 100101010010101000010000100000010010001
worked
1 0 0 0together
0100 to form the Apple 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1
0 0 0 0 1 0
1 1 1 1Computer
1 1 0 0Company.
000000001101000100101010010101000010000100000
0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1Figure 0 0 030The 0 first
0 1Apple
0010001
1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1computer,
1 1 1 0the
0 Apple
000 0 0 0like
I, looked 001101
1 1 1 1 1 a1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1a0typewriter
1 0 0 0in0a 1 0 It0was
box. 0 0one
100000
10101000010000100000010010001000100000011111111100000 of the first computers
to incorporate
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0a1keyboard. 01000010
00000010010001000100000011111111100000000001101000100

computer fans in Palo Alto, California who met Previously, the operating system had to be
to discuss computer ideas. Steve Jobs, who was rewritten every time the computer was turned on
working for computer game manufacturer Atari The friendly features of the operating system on
at the time, liked Wozniak’s prototypes and the Apple II, such as automatic loading, encour-
made a few suggestions. Together, the two built aged less technically oriented computer enthusi-
a personal computer, later known as the Apple I, asts to try writing their own software programs.
in Wozniak’s garage (see Figures 2 and 3). In An instant success, the Apple II would be the
that same year, on April 1, most successful product in the
1976, Jobs and Wozniak offi- company’s early line, outshin-
cially formed the Apple ing even its successor, the
Computer Company. Apple III, which was released
No sooner had the Apple I in 1980. Eventually, the Apple II
hit the market than Wozniak would include a spreadsheet
began working to improve it. program, a word processor, and
A year later, in 1977, the desktop publishing software.
Apple II was born (see Fig- These programs gave personal
ure 4). The Apple II included computers like the Apple func-
a color monitor, sound, and tions beyond gaming and spe-
game paddles. Priced around cial programming, and led to
$1,300 (almost $4,700 in their increased popularity. We
today’s dollars), it included will talk more about these ad-
4 kilobytes (KB) of random vances later. For now, we will
access memory (RAM) as look at which other players
well as an optional floppy were entering the market.
disk drive that enabled users
to run additional programs.
00011 1 1of1these
Most 1 1 programs
1 1 0 0 0were00000001101000100101010010101000010000
01010 0 1 0However,
games. 1 0 1 0for 00 0 1 0 0and
many 0 0an1external
0 0 0floppy
0 0 0disk
10 Enter the
Figure 4 The Apple II came with a monitor
010001000100000011111111
drive.
01000100000011111111100000000001101000100101010010101
users, there was a special ap-
peal to the Apple II: The pro-
Competition
01000 10010101001010100001000
gram that made the computer function when the
0100000010010001000100000
Around the time that Apple was experiencing
00010 010
power 0 first
was 0 1 turned
0001 on0(the
0 0operating
0 0 0 1sys-
111111 1 1 0with
success 0 0its
0 computers,
000000 1 1 0 1of0com-
a number 00100101
00000 00
tem) was11 010
stored in 0 0 1 0 0memory
read-only 1 0 1 0(ROM).
1001010 1 0 0entered
petitors 0010 the0market.
0010 00
The 000
largest 10010001
among
10000100000010010001000100000011111111100000000001101
36 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
them
010010 1 0were
1 0 Commodore,
0 0 0 1 0 0RadioShack,
0 0 1 0 0 0and00 IBM.
0100100010001000000111111111000
As Figure 5 shows, just a few years after the
000100 0 0 0 0 1of1the
introduction 1 1Altair,
1 1 1the
1market
1000 00
was 0000011
filled Why0 1 Is
0 0It0Called
1 0 0 1“Apple”?
010100101010000
000100 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1
with personal computers from a variety of 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 010001000000111
Steve Jobs wanted Apple Computer to be the
010010 0010001000000111111111000
manufacturers. 0 0 0computer
“perfect” 0 0 0 0 company.
1 1 0 0Having
0 1 1 recently
1111111000
0001000000111111111000000000011 010
worked at0an0apple
1 0 orchard,
0 1 0 1Jobs 0 1thought
0 0 1of0the1010000
The Commodore PET and TRS-80
0001001010100101010000100001000000100100010001000000111 apple as the “perfect” fruit because it was high
010010 0 0 1Apple’s
Among 0001 0 0 0 0competitors
strongest 0 0 1 1 1were
1 1 the
1111000 in 0 0000
nutrients, 0 0in1a1nice
came 01 0 0 0and
package, 1 0was
01010100
not easily damaged. Thus, he and Wozniak de-
000001 1 0 1 0 0 PET
Commodore 0 1 2001,
0 0 1shown
0 1 0in1Figure
0 0 16,0and1010000 1 0to0name
cided
0 0 their
100 new
0 computer
00010 0100010001
company
Tandy RadioShack’s TRS-80, shown in Figure 7.
000100 0000100100010001000010001 001010100101010000100001
Apple.
Commodore introduced the PET in January
01010 0 1It0was
1977. 1 0featured
1 0 0 0on0the
10 0 0of0Popular
cover 1000 000100100010001000000111111111
Sci-
ence in October 1977 as the “new $595 home
computer.” Tandy RadioShack’s home computer
also garnered immediate popularity. Just one
month after its release in 1977, the TRS-80 Model Figure 5
1 had sold approximately 10,000 units. Priced at Personal Computer Development
$594.95, the easy-to-use machine included a
monochrome display and 4 KB of memory. YEAR APPLE IBM OTHER
Many other manufacturers followed suit over
the next decade, launching new desktop 1975 MITS Altair
computers, but none were as successful as
1976 Apple I
the TRS-80 and the Commodore.
1977 Apple II Tandy RadioShack’s
TRS-80
The Osborne
Commodore PET
The Osborne Company introduced the indus-
try’s first portable computer, the Osborne, in 1980 Apple III
April 1981 (see Figure 8). Although portable, the
computer weighed 24.5 pounds, and its screen 1981 IBM PC Osborne
was just five inches wide. In addition to its hefty
weight, it came with a hefty price tag of $1,795. 1983 Lisa
Still, the Osborne included 64 KB of memory,
two floppy disk drives, and preinstalled pro- 1984 Macintosh 286-AT IBM PC clones
grams such as word processing and spreadsheet
software. The Osborne was an overnight success,
and its sales quickly reached 10,000 units per
month. Despite the Osborne’s popularity, the

Figure 7 The TRS-80 hid its circuitry under the


keyboard. The computer was nicknamed “trash-
80,” which was more a play on its initials than a
reflection of its capabilities.

000000100100010001000000111111111000000000011010001001
000000000011010001001010100101010000100001000000100100
000100001000000100100010001000000111111111000000000011
111111111000000000011010001001010100101010000100001000
1 0 0 1 0Figure
101 60The0Commodore
0 0 1 0 0PET0was
0 1well
00 0000100100010001000000111111111000
received
0 0 1 0 0because
0 0 0of0its1all-in-one
1 1 1 1design.
1111000000000011010001001010100101010000
0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0Photo
00 00100100010001000000111
Courtesy of The Computer History Museum

1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0Technology0 0 0 1 1in0Focus: 0 0 1The


1 1History
1 1 1of1the
11 PC0 0 037
001000000111111111000000000011010001001010100101010000
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
0 0 0 1release
0 0 1 of
0 a0successor
0 1 0 0 ma-
0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0the
00 term
0 0used
1 1to0describe
1 0 0 0all1 0 0 1 0 1

Photo Courtesy of The Computer History Museum


chine, called the Executive, personal computers.
0 0 0 0reduced
0 0 0 1sales
1 0of1the
0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0The 0 1IBM0 0PC
00 0 0with
came 10010001
1 0 0 0Osborne
0 1 0 0significantly,
000010 and0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0
64 KB of memory, expand-00001101
1 1 1 1the
1 1Osborne
0000 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1able
Company 0 1to02560 0KB,
01 0 prices
and 000100000
eventually closed. Compaq started at $1,565. IBM
00000001101000100101010010101000010000100000010010001
bought the Osborne design marketed its PC through
1 0 0 0and
0 1in01983
0 0produced
00010 its0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1retail
1 1 outlets
1000 0 0as0Sears
such 00001101
1 1 1 1first
1 1portable
0 0 0 0computer.
0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1and0 1Computerland
0 0 0 0 1 0 in 000100000
1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0order 000 to 1 1 1the
reach 1 1home
111100000
market, and it quickly
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1dominated
0 1 0 1 0the 01 0101000010
playing
0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0field.0 0 In00 0 0 01983,
110 1000100
IBM PCs January Time
Figure 8 The Osborne was introduced as the magazine, playing on its an-
By 1980, IBM recognized first portable personal computer. It weighed a nual “man of the year”
that it needed to get its feet whopping 24.5 pounds and contained just issue, named the computer
wet in the personal com- 64 KB of memory. “1982 machine of the year”
puter market. Up until that (see Figure 9).
point, the company had
been a player in the computer industry, but pri-
marily made mainframe computers, which it
sold only to large corporations. It had not taken
Other Important Advancements
the smaller personal computer seriously. In Au- It was not just the hardware of the personal
gust 1981, however, IBM released its first per- computer that was developing during the 1970s
sonal computer, appropriately named the IBM and 1980s. At the same time, advances in pro-
PC. Because many companies were already fa- gramming languages and operating systems and
miliar with IBM mainframes, they readily the influx of application software were leading
adopted the IBM PC. The term PC soon became to more useful and powerful machines.

00011111111100000000001101000100101010010101000010000
01010010101000010000100000010010001000100000011111111
01000100000011111111100000000001101000100101010010101
0100010 0101010010101000010000100000010010001000100000
Figure 9 The IBM PC was the first (and only) nonhuman object chosen as “man of the year” (actually,
0001001 0 0 0of1the
“machine 00 0 1by0Time
year”) 0 0magazine.
0 0 0 1This1 1designation,
11111 1 0 0January
in Time’s 0 0 01983
0 0issue,
0 0indicated
0 1 1 0the 1000100101
0000000 1 1the
impact 0 1PC0was
00 1 0 on
having 01 the0general
1 0 1public.
0010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
38 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
The
010010 1 0Importance
1 0 0 0 0 1of 00BASIC
001000000100100010001000000111111111000
000100 0 software
The 0 0 0 1industry
1 1 1 1began
1 1 1in1the
0 1950s
0 0 0with
0 0the
000011010001001010100101010000
000100 1 0 1 0 1 of
development 00 101010
programming 0 0 0 1such
languages 0 0as
001000000100100010001000000111
0100100010001000000111111111000000000011000111111111000
FORTRAN, ALGOL, and COBOL. These lan-
guages were used mainly by businesses to create
000100 0 0 0 0statistical,
financial, 1 1 1 1and 1 1engineering
1 1 1 0 0programs
0000000011010001001010100101010000
000100
for1corporate
0 1 0 1enterprises.
0 0 1 0 1 However,
0 1 0 0 0the01964
1 0 in-
0001000000100100010001000000111
010010 0 0 1 0of
troduction 0 Beginners
0 1 0 0 0All-Purpose
0 0 0 1 1 Symbolic
1111111000000000011010001001010100
000001 10100
Instruction 0 1(BASIC)
Code 0 0 1 0revolutionized
1 0 1 0 0 1 the01010000100001000000100100010001
software industry. BASIC was a programming
000100 0 0 0 0that
language 10 the0beginning
10001 0001000010001001010100101010000100001
programming
01010 0 1 0could
student 101 0 0learn.
easily 0 0 1It0thus
0 0became
01000000100100010001000000111111111
enormously popular—and the key language of
the PC. In fact, Bill Gates and Paul Allen (see
Figure 10) used BASIC to write their program for Figure 10 Bill Gates and Paul Allen are the founders of
the Altair. As we noted earlier, this program led to Microsoft.
the creation of Microsoft, a company that pro-
duced software for the microcomputer.

recommended that IBM investigate the CP/M


The Advent of Operating Systems OS, but they could not arrange a meeting with the
Because data on the earliest personal computers founder, Gary Kildall. Microsoft reconsidered the
was stored on audiocassettes (not floppy disks), opportunity and developed MS-DOS for IBM
many programs were not saved or reused. Rather, computers. (This was one meeting that Digital
programs were rewritten as needed. Eventually Research certainly regretted not arranging.)
Steve Wozniak designed a smaller 5.25-inch- MS-DOS was based on an OS called Quick
floppy disk drive subsystem, called the Disk II, and Dirty Operating System (QDOS) that was
which was introduced in July 1978. With the in- developed by Seattle Computer Products. Mi-
troduction of the floppy drive, programs could be crosoft bought the nonexclusive rights to QDOS
saved with more efficiency, and operating sys- and distributed it to IBM. Eventually, virtually
tems (OSs) developed. all personal computers running on the Intel chip
Operating systems were (and still are) written used MS-DOS as their OS. Microsoft’s reign as
to coordinate with the specific processor chip one of the dominant players in the PC landscape
that controlled the computer. Apples ran exclu- had begun. Meanwhile, many other programs
sively on a Motorola chip, while PCs (IBMs and were being developed, taking personal comput-
so on) ran exclusively on an Intel chip. Disk Op- ers to the next level of user acceptance.
erating System (DOS), developed by Wozniak
and introduced in December 1977, was the OS The Software Application Explosion:
that controlled the first Apple computers. The
Control Program for Microcomputers (CP/M),
VisiCalc and Beyond
developed by Gary Kildall, was the first OS de- Inclusion of floppy disk drives in personal com-
signed for the Intel 8080 chip (the processor for puters not only facilitated the storage of operat-
PCs). Intel hired Kildall to write a compiling ing systems, but also set off an application
program for the 8080 chip, but Kildall quickly software explosion, because the floppy disk was
saw the need for a program that could store a convenient way to distribute software. Around
computer operating instructions on a floppy that same time, in 1978, Harvard Business School
disk rather than on a cassette. Intel wasn’t inter- student Dan Bricklin recognized the potential for
ested in buying the CP/M program, but Kildall a spreadsheet program that could be used on
saw a future for the program and thus founded PCs. He and his friend Bob Frankston (see
0 0 0 0 0his
0 own
100 1 0 0 0Digital
company, 1 0 0Research.
0 1 0 0 0 0 0 0 1 1 1 1Figure
1 1 111)
11 0 0 0the
created 0 program
0 0 0 0VisiCalc.
0 0 1 1 VisiCalc
010001001
0 0 0 0 0 0In01980,
000 1 1IBM
when 0 1was
0 0considering
010010 1 0 1 0 0 1not
entering 01 0 1became
only 0 0 0an 01 000
instant 0 1 0but
success, 0 0was
0 0also
0100100
000100001000000100100010001000000111111111000000000011
the personal computer market, it approached one of the main reasons for the rapid increase in
Bill Gates at Microsoft to write an OS program PC sales. Finally, ordinary home users could see
1 1 1 1 1for
1 the
1 1IBM
1 0PC.
0 0Although
0 0 0 0Gates
0 0 0had11 0 1 0 0 0 1 0how
written ver-
0 1owning
0101 00101010000100001000
a personal computer could benefit
1 0 0 1 0sions
1 0of1 BASIC
0000 for1different
0 0 0 0computer
1 0 0 0systems,
0 0 0 1 0 0 1their
0 0lives.
010 0 0than
More 1 0100,000
0000 011
copies of 1 111111000
VisiCalc
0 0 1 0 0he0had
0 0never
011 1 1 1an
written 1OS.
1 1He
10 0 0 0 0 0 0 0 0 0were
therefore 1 1 sold
0 1 in
0 its
00 10
first 01010100101010000
year.
001001010100101010000100001000000100100010001000000111
1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0Technology
0 0 0 1 1in0Focus:
0 0 1The
1 1History
1 1 1of1the
11 PC0 0 039
001000000111111111000000000011010001001010100101010000
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 You’ll
1 1 1probably
0 0 0 0be 0 surprised
0 0 0 0 0to1learn
1 0that
1 0a0 0 1 0 0 1 0 1
company known for its photocopiers was the
0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 real
0 1innovator.
000010000100000010010001
10000100000010010001000100000011111111100000000001101
1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 Xerox
01010010101000010000100000
00000001101000100101010010101000010000100000010010001
In 1972, a few years before Apple launched its
1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 first
0 0PC,0 1photocopier
1 1 1 1 1 manufacturer
1 1 1 0 0 0Xerox
0 0 0was
00001101
1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 hard
010 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 00100000
at work in its Palo Alto Research Center
1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 (PARC)
0 1 0 0designing
0 1 0 0a0personal
0 0 0 1computer
1 1 1 1of1its
11100000
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0the
own. Named the Alto (shown in Figure 13), 1000010
computer included a word processor, based on
0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 the
1 1What
1 1 You
1 1See
0 0Is0What
0 0 You
0 0Get
0 0(WYSIWYG)
01101000100
Figure 11 Bob Frankston and Dan Bricklin created principle, that incorporated a file management
VisiCalc, the first business application developed for the system with directories and folders. It also had a
personal computer. mouse and could connect to a network. None of
the other personal computers of the time had any
of these features. For a variety of reasons, Xerox
After VisiCalc, other electronic spreadsheet
never sold the Alto commercially. Several years
programs entered the market. Lotus 1-2-3 came
later, it developed the Star Office System, which
on the market in January 1983, and Microsoft
was based on the Alto. Despite its convenient fea-
Excel entered the scene in 1985. These two prod-
tures, the Star never became popular, because no
ucts became so popular that they eventually put
one was willing to pay the $17,000 asking price.
VisiCalc out of business.
Meanwhile, word processing software was
gaining a foothold in the PC industry. Up to this The Lisa and the Macintosh
point, there were separate, dedicated word
processing machines, and the thought hadn’t Xerox’s ideas were ahead of its time, but many
occurred to anyone to enable the personal of the ideas of the Alto and Star would soon
computer to do word processing. Personal catch on. In 1983, Apple introduced the Lisa,
computers, it was believed, were for computa-
tion and data management. However, once
WordStar, the first word processing application, Figure 12 Application Software Development
came out in disk form in 1979 and became
available for personal computers, word YEAR APPLICATION
processing became another important use for
the PC. In fact, word processing is now one of 1978 VisiCalc: First electronic spreadsheet
the most common PC applications. Competitors application.
such as Word for MS-DOS (the precursor to WordStar: First word processing application.
Microsoft Word) and WordPerfect soon
entered the market. Figure 12 lists some of the 1980 WordPerfect: Thought even now to be the
important dates in application software best word processing software for the PC,
development. WordPerfect was eventually sold to Novell, and
was later acquired by Corel.

The Graphical User Interface 1983 Lotus 1-2-3: Added integrated charting,
plotting, and database capabilities to
Another important advancement in personal spreadsheet software.
computers was the introduction of the graphical Word for MS-DOS: Introduced in the pages of
user interface (GUI), which allowed users to PC World magazine on the first magazine-
interact with the computer more easily. Until inserted demo disk.
00011 1 time,
that 1 1 1users
1 1had
1 0to0use
0 0complicated
0000001101000100101010010101000010000
01010 0 1 0 1 or
command- 01 0 0 0 0 1 interfaces
menu-driven 00001 to0 0 0 0 0 0 11985
interact 0 0 1 0Excel:
001 One0of0the
0first
1 0spreadsheets
00000 1 1a 1 1 1 1 1 1
to use
graphical user interface.
01000 1 0the0computer.
with 0 0 0 0 1Apple
111 11
was the1first
1 1company
00000000001101000100101010010101
to take full commercial advantage of the GUI,
01000 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0PageMaker:
but competitors were fast on its heels, and soon
00001 The first desktop publishing
0010001000100000
software.
00010
the0GUI
1 0became
0010 0 0 1 0 0with
synonymous 000 011111111100000000001101000100101
personal
00000 00110
computers. 1 0developed
Who 00100 the1idea
0 1of0the
1 0GUI?
010101000010000100000010010001
10000100000010010001000100000011111111100000000001101
40 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
0100101010000100001000000 Figure
1 0 13
0 1The
0 Alto
0 0was1 0the0first
0 1computer
0 0 0 0to0use 0111111111000
a graphical user interface, and it provided the basis
0001000000111111111000000 for0the
0 GUI
0 0that
1 1Apple
0 1used.
0 0However,
0 1 0 0because
1 0 1of0 1 0 0 1 0 1 0 1 0 0 0 0
0001001010100101010000100 marketing problems, the Alto never was 0
0 0 1 0 0 0 0 0 0 1 0 0 1 0 010001000000111
sold.
0100100010001000000111111111000000000011000111111111000
0001000000111111111000000000011010001001010100101010000
0001001010100101010000100001000000100100010001000000111
Photo Courtesy of The Computer History Museum

0100100010001000000111111111000000000011010001001010100
0000011010001001010100101010000100001000000100100010001
0001000000100100010001000010001001010100101010000100001
Figure 14 The Lisa was
0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 the 1 0first
00 0 0 0to
computer 111111111
introduce a GUI to the
market. Priced too high, it
never gained the popularity
it deserved.

shown in Figure 14. Named after Apple founder users to view multimedia on the Web, causing In-
Steve Jobs’s daughter, the Lisa was the first suc- ternet traffic to increase by nearly 350 percent.
cessful PC brought to market that used a GUI. Meanwhile, companies discovered the Internet
Legend has it that Jobs had seen the Alto during as a means to do business, and computer sales
a visit to PARC in 1979 and was influenced by took off. IBM-compatible PCs became the per-
its GUI. He therefore incorporated a similar user sonal computer system of choice when, in 1995,
interface into the Lisa, providing features such Microsoft (the predominant software provider to
as windows, drop-down menus, icons, a PCs) introduced Internet Explorer, a Web browser
hierarchical file system with folders and files, that integrated Web functionality into Microsoft
and a point-and-click device called a mouse. The Office applications, and Windows 95, the first
only problem with the Lisa was its price. At Microsoft OS designed to be principally a GUI
$9,995 ($21,530 in today’s dollars), few buyers OS, although it still was based on DOS.
were willing to take the plunge. About a year earlier, in mid-1994, Jim Clark,
A year later, in 1984, Apple introduced the founder of the computer company Silicon
Macintosh, shown in Figure 15. The Macintosh Graphics Inc., Marc Andreessen, and others
was everything the Lisa was and then some, from the Mosaic development team developed
and at about a third of the cost.
The Macintosh was also the first
personal computer to utilize 3.5-
inch floppy disks with a hard
cover, which were smaller and
sturdier than the previous 5.25-
inch floppies.

The Internet Boom


The GUI made it easier for users
to work on the computer. The
Internet provided another rea-
0 0 0 0 0son
01 for0consumers
0 1 0 0 0to1buy0 0com-
01000000111111111000000000011010001001
0 0 0 0 0puters.
0 0 0Now0 0 they
110 1 0conduct
could 001001010100101010000100001000000100100
0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 with
research and communicate 00100010001000000111111111000000000011
each other in a new and conven-
1 1 1 1 1ient
1 1way.
1 1In01993,
0 0the
0 0Web
0 0 0 0 0 Figure
1 1 015 10 001001010100101010000100001000
The Macintosh became one of Apple’s best-selling computers,
1 0 0 1 0browser
1010 0 0 0was
Mosaic 1 0intro-
0 0 0 1 0 incorporating
000001 0 0 1 0user
a graphical 0 0interface
1 0 0along
010 0 other
with 000 0 1 1 1such
innovations 1 1as1 1 1 1 0 0 0
0 0 1 0 0duced.
0 0 0This
0 1browser
1111 1 1 1 1 0 the
allowed 0 03.5-inch
0 0 0floppy
000 0drive.
disk 11010001001010100101010000
001001010100101010000100001000000100100010001000000111
1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0Technology
0 0 0 1 1in0Focus:
0 0 1The
1 1History
1 1 1of1the
11 PC0 0 041
001000000111111111000000000011010001001010100101010000
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
0 0 0 1the
0 0Netscape
1 0 0 0commercial
1 0 0 0 1Web0 0browser.
0 0 0 0 1 1 1 1 1 1 The111 Pascalene
0 0 0 0 0 Calculator
0 0 0 0 0 1 and
1 0 1the000100101
Netscape’s popularity grew quickly, and it soon
0 0 0 0became
0 0 0 1a predominant
1 0 1 0 0 0player
1 0 0in1browser
0 1 0 1 0 0 1 0 1 Jacquard
010000 10000100000010010001
Loom
1 0 0 0software.
0 1 0 0 However,
0 0 0 0 1pressures
0 0 1 0from
0 0 Microsoft
1000100000011111111100000000001101
The Pascalene was the first accurate mechanical
1 1 1 1became
1 1 0 0too
0strong.
0000 In 0 0beginning
the 0 1 1 0 1of01998,
0 0 1 0 0 1 calculator.
0 1 0 1 0This 0 1machine,
0 1 0 1created
0000 by1the
0 French
000100000
Netscape announced it was moving to the open
0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 mathematician
0 1 0 0 0 0 1Blaise
0 0 0Pascal
0 1 0in01642,
0 0 used
001 0010001
revo-
source market, would no longer charge for the
1 0 0 0product,
0 1 0 0and
0 0would
0 0 1make
001 the0code
0 0 available
10001 to 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1
lutions of gears, like odometers in cars do, to
1 1 1 1the 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 count
1 1public. 0 1 0by 1 tens.
001 The Pascalene could be used to
0101000010000100000
add, subtract, multiply, and divide. The basic
1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 design 0100 of 0
the1Pascalene
00000 01
was so 1 111
sound 11
that it 1 1 0 0 0 0 0
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 lived 0 1 0on0in0mechanical
1 0 0 1 0calculators
1 0 1 0 0for10 1 0than
more 1000010
Making the PC Possible: Early
00000010010001000100000011111111100000000001101000100 300 years.
Computers Nearly 200 years later, Joseph Jacquard
revolutionized the fabric industry by creating a
Since the first Altair was introduced in the 1970s, machine that automated the weaving of complex
more than a billion personal computers have patterns. Although not a counting or calculating
been distributed around the globe. Because of the machine, the Jacquard loom (shown in
declining prices of computers and the growth of Figure 16) was significant because it relied on
the Internet, it’s estimated that a billion more stiff cards with punched holes to automate the
computers will be sold within the next decade. weaving process. Much later, this punch-card
What made all of this possible? The computer is process would be adopted as a means for
a compilation of parts, each of which is the result computers to record and read data.
of individual inventions. From the earliest days
of humankind, we have been looking for a more
systematic way to count and calculate. Thus, the Babbage’s Engines
evolution of counting machines led to the devel-
Decades later, in 1834, Charles Babbage designed
opment of the computer we know today.
the first automatic calculator, called the Analytical
Engine (see Figure 17). The machine was actually
Figure 16 The Jacquard loom used holes punched in based on another machine called the Difference
stiff cards to make complex designs. This technique Engine, which was a huge steam-powered me-
would later be used in punch cards that controlled chanical calculator that Babbage designed to print
the input and output of data in computers. astronomical tables. Babbage stopped working on
the Difference Engine to build the Analytical En-
gine. Although it was never developed, Babbage’s
detailed drawings and descriptions of the Analyti-
cal Engine include components similar to those
found in today’s computers, including the store
(akin to RAM) and the mill (a central processing
unit), as well as input and output devices. This in-
vention gave Charles Babbage the title of “father
of computing.”
Meanwhile, Ada Lovelace, who was the
daughter of poet Lord Byron and was a student
of mathematics (which was unusual for women
of that time), was fascinated with Babbage’s
Photo Courtesy of The Computer History Museum

Engines. She translated an Italian paper on


Babbage’s machine, and at the request of Bab-
bage added her own extensive notes. Her efforts
are thought to be the best description of Bab-
0001111111110000000000110100 010
bage’s 0101010010101000010000
Engines.
01010010101000010000100000010010001000100000011111111
0100010000001111111110000000 0 0Hollerith
The 0 1 1 0 1Tabulating
0 0 0 1 0 0Machine
101010010101
0100010010101001010100001000 0 1 0 0 0 0 0 0 1 0 0 1 0 001000100000
In 1890, Herman Hollerith, while working for
0001001000100010000001111111 1U.S.
the 1 0Census
0000 0 0 0was
Bureau, 0 0the
11 01
first to 0 00100101
take
0000000110100010010101001010 1 0 0 0 punch-card
Jacquard’s 010000 1 0 0and
concept 0 0apply
001 0010001
it to
10000100000010010001000100000011111111100000000001101
42 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
0000100001000000100100010001000000111111111000000000011
0111111111000000000011010001001010100101010000100001000
010010 computing.
1 0 1 0 0Hollerith
0 0 1 0devel-
0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1The
0 0 Harvard
0 0 0 0 1Mark1 1 1I 1 1 1 1 1 0 0 0
oped a machine called the
000100 0 0 0 0Tabulating
Hollerith 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1From
001 0late
the 1 01930s
1 0 to01the0 1 0 1 0 0 0 0
000100 1 0 1 0 1 0 0 1 0
Machine that used punch 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0
early 0 0 1
1950s, 0 0
Howard0 1 0 00000111
Aiken
010010 0 0to1tabulate
cards 0 0 0 1census
000000111111111000000000011000111111111000 and Grace Hopper designed
data. Up until that time, the Mark series of computers
0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1at0Harvard
0 1 0 1University.
0 1 0 0 1The 01010000
census data had been
000100 1 0 1 0manually
1 0 0 1in0a1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0U.S.
1 0Navy
0 0 1used
0 0these
0 1com-
000000111

Photo Courtesy of The Computer History Museum


tabulated
010010 0 0 1 0 0 0 1 0 0
long, laborious process.0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1
puters 1 0
for 1 0 0 0
ballistic 1
and0gun-
01010100
000001 1 0 1 0 tabulating
Hollerith’s 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0an0 0 1 0 0 0 1
nery calculations. Aiken,
machine automatically read electrical engineer and physi-
000100 0 0 0 0 1 0 0 1 0 0
data that had been punched
0 1 0 0 0 1 0 0 0 0 1 0 0 0 1 0 0 1 0 1 0 1 0designed
cist, 0 1 0 1the01 0000100001
computer,
01010 0 1small
onto 0 1 punch
0 1 0cards,
0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0while
0 0 1Hopper
0 0 0did0 0the01 11111111
pro-
speeding up the tabulation gramming. The Harvard
process. Hollerith’s machine Mark I, finished in 1944,
became so successful that he could perform all four arith-
left the Census Bureau in metic operations (addition,
1896 to start the Tabulating subtraction, multiplication,
Machine Company. His com- and division).
pany later changed its name Figure 17 The Analytical Engine, designed by However, many believe
to International Business Charles Babbage, was never fully developed, Hopper’s greatest contribu-
Machines, or IBM. but included components similar to those tion to computing was the
found in today’s computers. invention of the compiler, a
program that translates
The Z1 and the English-language instructions into computer
language. The team was also responsible for a
Atanasoff–Berry Computer common computer-related expression. Hopper
German inventor Konrad Zuse is credited with was the first to “debug” a computer when she
a number of computing inventions. His first, in removed a moth that had flown into the Harvard
1936, was a mechanical calculator called the Z1. Mark I and caused the computer to break down
The Z1 is thought to be the first computer to in- (see Figure 19). After that, problems that caused
clude certain features that are integral to today’s a computer not to run were called “bugs.”
systems, such as a control unit and separate
memory functions. These were important break- Figure 18 The Atanasoff–Berry
throughs for future computer design. Computer laid the design groundwork
In late 1939, John Atanasoff, a professor at for many computers to come.
Iowa State University, and his student Clifford
Berry built the first electrically powered digital
computer, called the Atanasoff–Berry Com-
puter (ABC), shown in Figure 18.
The computer was the first to use
vacuum tubes, instead of the me-
chanical switches used in older
computers, to store data. Al-
though revolutionary at its time,
the machine weighed 700 pounds, con-
tained a mile of wire, and took about 15
seconds for each calculation. (In com-
parison, today’s personal computers can
perform billions and billions of calcula-
0 0 0 0 0tions
0 1in015
01 0 0 0 1Most
seconds.) 0 0importantly,
01000000111111111000000000011010001001
0 0 0 0 0the
0 ABC
0 0 0was01 1first
the 0 1computer
00010 to 0
use1010100101010000100001000000100100
000100001000000100100010001000000111111111000000000011
the binary system. It was also the first
computer to have memory that repow-
1 1 1 1 1ered
1 1itself
1 1upon
0 0 0booting.
0000 00011010001001010100101010000100001000
The design of the
1 0 0 1 0ABC
1 0would
1 0 0end
0 0up1 being
0 0 0central
0 1 0to0that
0 0of0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0
0 0 1 0 0future
0 0 0computers.
0111111111000000000011010001001010100101010000
001001010100101010000100001000000100100010001000000111
1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0Technology
0 0 0 1 1in0Focus:
0 0 1The
1 1History
1 1 1of1the
11 PC0 0 043
001000000111111111000000000011010001001010100101010000
01000100000011111111100000000001101000100101010010101
01000100101010010101000010000100000010010001000100000
0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0The
0 0UNIVAC
000001101000100101
0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0The
1 0Universal
00010 0 0 0 0 Com-
Automatic 010010001
1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1puter,
1 1 1or1UNIVAC,
11000 00
was the0first
00001101
11111100000000001101000100101010010101000010000100000 commercially successful electronic
digital computer. Completed in
0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0June
1 01951
0 0 and
0 1manufactured
0000001 by0 0 1 0 0 0 1
1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1the
11 1 1 1 1Remington
company 0 0 0 0 0Rand,
000 the001101
1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 1 0 1 0 1 0 0UNIVAC
1 0 1 0operated
1 0 0 0on01 0000100000
magnetic
1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1tape.
0 0This
0 0 set
0 0it1apart
1 1from
111 its1com-
1100000
petitors, which ran on punch cards.
0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 1The
0 0UNIVAC
1 0 1 0gained
1 0 0notoriety
10101000010
0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1when,
0 0 0in0a01951
0 0publicity
0 0 0 1stunt,
101 it 0 0 0 1 0 0
was used to predict the outcome of
the Stevenson–Eisenhower
presidential race. After an-
Actual moth pasted alyzing only 5 percent of
into notebook
the popular vote, the UNI-
VAC correctly identified
Dwight D. Eisenhower as
Figure 19 Grace Hopper coined the term computer bug the victor. After that, UNIVAC
when a moth flew into the Harvard Mark I, causing it to soon became a household word. The UNIVAC
break down. and computers like it were considered first-
generation computers and were the last to use
vacuum tubes to store data.

The Turing Machine Transistors and Beyond


Meanwhile, in 1936, the British mathematician Only a year after the ENIAC was completed,
Alan Turing created an abstract computer scientists at the Bell Telephone Laboratories in
model that could perform logical operations. New Jersey invented the transistor, which was
The Turing Machine was not a real machine, another means to store data. The transistor re-
but rather was a hypothetical model that placed the bulky vacuum tubes of earlier com-
mathematically defined a mechanical procedure puters and was smaller and more powerful than
(or algorithm). Additionally, Turing’s concept tubes were. It was used in almost everything,
described a process by which the machine could from radios to phones. Computers that used
read, write, or erase symbols written on squares transistors were referred to as second-
of an infinite paper tape. This concept of an infi- generation computers. Still, transistors
nite tape that could be read, written to, and were limited as to how small they could
erased was the precursor to today’s RAM. be made.
A few years later, in 1958, Jack Kilby, while
working at Texas Instruments, invented the
The ENIAC world’s first integrated circuit, a small chip ca-
The Electronic Numerical Integrator and Com- pable of containing thousands of transistors.
puter (ENIAC), shown in Figure 20, was another This consolidation in design enabled computers
U.S. government-sponsored machine developed to become smaller and lighter. The computers in
to calculate the settings used for weapons. this early integrated-circuit generation were con-
Created by John W. Mauchly and J. Presper sidered third-generation computers.
Eckert at the University of Pennsylvania, it was Other innovations in the computer industry
placed in operation in June 1944. Although the further refined the computer’s speed, accuracy,
00011 1 1 1is1generally
ENIAC 1 1 1 0thought
0 0 0 0of0as0the
00 0110100
first 01
and 0 0 1 0However,
efficiency. 10100 1 0were
none 1 0as1 signifi-
000010000
0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 Corpo-
successful high-speed electronic digital com- cant as the 1971 introduction by the Intel 11111111
puter, it was big and clumsy. The ENIAC used ration of the microprocessor chip, a small chip
01000 10000001111111110000000
nearly 18,000 vacuum tubes and filled approxi-
0001101000100101010010101
containing millions of transistors. The
01000 1 0 0 1 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0
mately 1,800 square feet of floor space. Although 1 0 0 0 0100000
microprocessor 0 1 0 0as1the
functions 00 0 1 0process-
central 00100000
00010 010001
inconvenient, the0ENIAC
0010 000
served its0purpose
0111 1111
and 1unit
ing 1 0(CPU),
0 0 0 or00 0 0 0of0the
brains, 11 01000100101
computer.
000000011010001001010100101010000100001000000
remained in use until 1955. Computers that used a microprocessor 10010001
chip
10000100000010010001000100000011111111100000000001101
44 11 1 1 1 1 0 0in0Action
Technology 00000001101000100101010010101000010000100000
00000001101000100101010010101000010000100000010010001
were called fourth-genera-
tion computers. Over time,
Intel and Motorola became
the leading manufacturers of
microprocessors. Today, the
Intel Core i7 is one of

Photo Courtesy of The Computer History Museum


Intel’s most powerful
processors.
As you can see, personal
computers have come a long
way since the Altair, and
have a number of inventions
and people to thank for their
amazing popularity. What
will the future bring? If
current trends continue,
computers will be smaller,
lighter, and more powerful.
The advancement of wireless Figure 20 The ENIAC took up an entire room and required several people to
technology will also play a manipulate it.
big role in the development
of the personal computer.

Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms and concepts
from this Technology in Focus feature.

1. What was the name of the first Web browser? 6. Which computer first stored its operating system in
a. Mosaic c. Netscape ROM?
b. Internet Explorer d. Firefox a. Apple I c. Lisa
b. Apple II d. Macintosh
2. Which programming language revolutionized the
software industry? 7. What was the first word processing application?
a. ALGOL c. COBOL a. Lotus 1-2-3 c. WordPerfect
b. BASIC d. FORTRAN b. Word for MS-DOS d. WordStar
3. Why was the invention of the integrated circuit 8. Which components are characteristic of second-
important? generation computers?
a. It enabled computers to store more data. a. Transistors
b. It enabled monitors to display a better image. b. Vacuum tubes
c. It enabled more processing memory. c. Integrated circuits
d. It enabled computers to become smaller and lighter. d. Microprocessor chips
4. Which computer is touted as the first personal 9. For what is the Atanasoff-Berry Computer best
computer? known?
a. Altair c. Lisa a. It was the first computer used to tabulate U.S.
b. Commodore PET d. Osborne census data.
b. It was the first computer to use the binary system.
5. What was the importance of the Turing machine to
c. It was the first computer to incorporate the punch-
today’s computers?
card system.
a. It described a system that was a precursor to
d. It was the first computer used as a mechanical
today’s notebook computer.
calculator.
b. It was the first electronic calculator and a precursor
to the computer. 10. Who are the founders of Microsoft?
c. It was the first computer to have a monitor. a. Paul Allen and Bill Gates
d. It described a process to read, write, and erase b. Bill Gates and Steve Wozniak
symbols on a tape and was the precursor to today’s c. Steve Jobs and Bill Gates
RAM. d. Bill Gates and Gary Kildall

Technology in Focus: The History of the PC 45


two
two
chapter

looking at
computers
understanding the parts

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What exactly is a computer, and what are its four main functions? (p. 48)
2. What is the difference between data and information? (p. 48)
3. What are bits and bytes, and how are they measured? (pp. 48–49)
4. What devices do I use to get data into the computer? (pp. 51–60)
5. What devices do I use to get information out of the computer? (pp. 60–66)
6. What’s on the motherboard? (pp. 67–68)
7. Where are information and programs stored? (pp. 69–71)
8. How are devices connected to the computer? (pp. 71–75)
9. How do I set up my computer to avoid strain and injury? (pp. 77–79)

multimedia resources
multimedia
resources

Active Helpdesk
• Understanding Bits and Bytes (p. 49)
• Using Input Devices (p. 58)
• Using Output Devices (p. 62)
• Exploring Storage Devices and Ports (p. 72)

Sound Bytes
• Binary Numbers Interactive (p. 48)
• Tablet and Notebook Tour (p. 56)
• Virtual Computer Tour (p. 68)
• Port Tour: How Do I Hook It Up? (p. 72)
• Healthy Computing (p. 77)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? If you have ever thought
about customizing the layout of your keyboard, this Luxeed Dynamic
Pixel LED Keyboard is the one for you. If you’re a gamer, you can program specific
keys to control your game and to glow with different colors that indicate each key
action. If you’re not a gamer but just would like to add a bit of fun to your
otherwise dull keyboard, you can animate colored scenarios to “play” on the
keys, or create an illuminated pattern or design. With 430 LEDs, the Luxeed is
capable of individually lighting each key in your choice of color.
The keyboard comes in either black or white. The keys of the white keyboard light
up more brightly and have a
semitransparent look. The
keys of the black keyboard
can be set so just the letters
light up.

47
Understanding Your or presented in a meaningful fashion. When
your computer provides you with a contact
Computer listing that indicates Zoe Richardson can be
After reading Chapter 1, you can see why reached by phone at (713) 555-3297, then the
becoming computer literate is so important. previous data suddenly becomes useful—
But where do you start? You’ve no doubt that is, it becomes information.
gleaned some knowledge about computers How do computers interact with
just from being a member of society. How- data and information? Computers are
ever, although you have undoubtedly used a excellent at processing (manipulating,
computer before, do you really understand calculating, or organizing) data into
how it works, what all its parts are, and information. When you first arrived on
what these parts do? In this section, we campus, you probably were directed to a
discuss what a computer does and how its place where you could get an ID card. You
functions make it such a useful machine. most likely provided a clerk with personal
data (such as your name and address) that
was entered into a computer. The clerk then
Computers Are Data took your picture with a digital camera
Processing Devices (collecting more data). This information was
then processed appropriately so that it could
Strictly defined, a computer is a data
be printed on your ID card (see Figure 2.1).
processing device that performs four major
This organized output of data on your ID
functions:
card is useful information. Finally, the
1. It gathers data, or allows users to input information was probably stored as digital
data. data on the computer for later use.
2. It processes that data into information.
3. It outputs data and information. Bits and Bytes: The Language
4. It stores data and information. of Computers
What is the difference between How do computers process data into
data and information? People often information? Unlike humans, computers
use the terms data and information inter- work exclusively with numbers (not words).
changeably. Although they may mean the To process data into information, computers
same thing in a simple conversation, the need to work in a language they understand.
actual distinction between data and infor-
mation is an important one.
In computer terms, data is a representa- SOUND Binary Numbers
BYTE Interactive
tion of a fact, a figure, or an idea. Data can
be a number, a word, a picture, or even a
recording of sound. For example, the This Sound Byte helps remove the mystery surround-
number 7135553297 and the names Zoe and ing binary numbers. You’ll learn about base conversion
Richardson are pieces of data. Alone, these between decimal, binary, and hexadecimal numbers
pieces of data probably mean little to you. interactively using colors, sounds, and images.
Information is data that has been organized

Figure 2.1
Computers process data GGrraammeercrcyySSt.t.
into information. Zoe
Zoe Zoe
Richardson
Richardson Richardson
H
Hoo
uuss
tonn
to 5211
5211 73300 ID# 216-730
2211667
TX
TX 5211 Gramercy St.
Houston, TX 77021

7
7 7
0 20121 (713) 555-3297
7
Processing data
Input data Output information
into information

48 Chapter 2 Looking at Computers: Understanding the Parts


This language, called binary language, ACTIVE
consists of just two digits: 0 and 1. Every- HELP-
Understanding Bits
thing a computer does, such as processing DESK and Bytes
data or printing a report, is broken down
into a series of 0s and 1s. Each 0 and 1 is a In this Active Helpdesk call, you’ll play the role of a
binary digit, or bit for short. Eight binary helpdesk staffer, fielding calls about the difference
digits (or bits) combine to create one byte. between data and information, what bits and bytes
In computers, each letter of the alphabet, are, and how they are measured.
each number, and each special character
(such as the @ sign) consists of a unique
combination of eight bits, or a string of eight
0s and 1s. So, for example, in binary (com- than a byte. Kilobytes, megabytes, and giga-
puter) language, the letter K is represented bytes are therefore simply amounts of bytes.
as 01001011. This equals eight bits, or one As shown in Figure 2.2, a kilobyte (KB) is
byte. (We discuss binary language in more approximately 1,000 bytes, a megabyte
detail in the Technology in Focus section (MB) is about 1 million bytes, a gigabyte
“Under the Hood.”) (GB) is around 1 billion bytes, and a
What else can bits and bytes be terabyte (TB) is around 1 trillion bytes. As
used for? You’ve probably heard the our information-processing needs have
terms kilobyte (KB), megabyte (MB), and grown, so too have our storage needs.
gigabyte (GB). Bits and bytes not only are Today, personal computers store terabytes
used as the language that tells the computer of data, and many business computers can
what to do but also are what the computer store up to a petabyte of data. The Google
uses to represent the data and information search engine processes more than 1 petabyte
that it inputs and outputs. Word processing of user-generated data per hour—that’s a lot
files, digital pictures, and even software are of bytes!
represented inside a computer as a series of How does your computer process
bits and bytes. These files and applications bits and bytes? Your computer uses a
can be quite large, containing thousands or combination of hardware and software to
millions of bytes. process data into information and enables
To make it easier to measure the size of you to complete tasks such as writing a
these files, we need units of measure larger letter or playing a game. An anonymous

Figure 2.2 HOW MUCH IS A BYTE?

Name Abbreviation Number of Bytes Relative Size


Byte B 1 byte Can hold one character of data.

Kilobyte KB 1,024 bytes (210) Can hold 1,024 characters or about half of a double-
spaced typewritten page.

Megabyte MB 1,048,576 bytes (220 bytes) Can hold approximately 768 pages of typed text.

Gigabyte GB 1,073,741,824 bytes (230 bytes) Approximately 786,432 pages of text; 500 sheets of
paper is approximately 2 inches, so this represents a
stack of paper 262 feet high.

Terabyte TB 1,099,511,627,776 bytes (240 bytes) This represents a stack of typewritten pages almost
51 miles high.

Petabyte PB 1,125,899,906,842,62 bytes (250 bytes) The stack of pages is now 52,000 miles high, or
approximately one-fourth the distance from the Earth
to the moon.

Exabyte EB 1,152,921,504,606,846,976 bytes (260 bytes) The stack of pages is now 52 million miles high, or
just about twice the distance between the Earth and
Venus.

Zettabyte ZB 1,180,591,620,717,411,303,424 bytes (270 bytes) The stack of pages is now 52 billion miles high. That’s
some 20 times the distance between the Earth and
Pluto.

Understanding Your Computer 49


person once said that hardware is any part up of software and hardware. There are two
of a computer that you can kick when it basic designs of computers: portable and sta-
doesn’t work properly. A more formal defi- tionary. A notebook computer (or laptop
nition of hardware is “any part of the com- computer) is a portable computer that is
puter you can physically touch.” However, a powered by batteries (or a handy electrical
computer needs more than just hardware to outlet) and has a keyboard, a monitor, and
work: It also needs some form of software other devices integrated into a single com-
(computer programs). Think of a book with- pact case. A netbook is a small, lightweight
out words or a CD without music. Without notebook computer that is generally 7 to 10
words or music, these two common items inches wide and has a longer battery life
are just shells that hold nothing. than a notebook computer. A tablet PC is
Similarly, a computer without software is similar to a notebook but features a touch-
a shell full of hardware components that sensitive screen that can swivel and fold
can’t do anything. Software is the set of flat (see Figure 2.14 later in this chapter).
computer programs that enables the hard- Users input data and commands on a
ware to perform different tasks. There are tablet PC via a special pen called a stylus
two broad categories of software: applica- or with their fingers. A desktop computer
tion software and system software. is intended for use at a single location, and
When you think of software, you are therefore, is stationary. Desktop computers
most likely thinking of appli- consist of a separate
cation software. case that houses
Application software is the the main components
set of programs you use on of the computer
a computer to help you plus peripheral
carry out tasks such as devices. A peripheral
writing a research paper. If device is a component,
you’ve ever typed a docu- such as a monitor or
ment, created a spread- keyboard, that is
sheet, or edited a digital connected to the
photo, for example, then computer. An all-in-
you’ve used a form of ap- one computer such
plication software. as the Apple iMac
System software is (see Figure 2.3), the Dell
the set of programs Studio One 19⬙, or the Gate-
that enables your com- way One houses not just the
puter’s hardware de- Figure 2.3 computer’s processor and memory
vices and application The Apple iMac is an example of an but also its monitor.
software to work to- all-in-one computer. Are there other types of
gether. The most com- computers besides desktop
mon type of system software is the and notebook computers? Desktop
operating system (OS)—the program that and notebook computers are the computers
controls the way in which your computer that you will most likely encounter. Al-
system functions. It manages the hardware though you may never come into direct con-
of the computer system, such as the monitor tact with the following types of computers,
and the printer. The operating system also they are still important to our society:
provides a means by which users can inter-
act with the computer. We’ll cover software • A mainframe is a large, expensive
in greater depth in Chapters 4 and 5. For the computer that supports hundreds of
rest of this chapter, we’ll explore hardware. users simultaneously. Mainframes are
often used in insurance companies,
for example, where many people are
Your Computer’s Hardware working on similar operations (such as
Are all computers the same? claims processing) all at once. Your
Considering the amount of amazing things college also may use mainframe com-
computers can do, they are really quite sim- puters to handle the multitude of pro-
ple machines. You learned in the previous cessing needs throughout the campus.
section that a basic computer system is made Mainframes excel at executing many

50 Chapter 2 Looking at Computers: Understanding the Parts


Processing
Data Information

Input Output

Storage

Figure 2.4
different computer programs at Each part of the computer
the same time. serves a special function.
• A supercomputer is a specially de-
signed computer that can perform
complex calculations extremely rapidly. ing of documents and other resources. We
Supercomputers are used in situations begin our exploration of hardware by looking
in which complex models requiring at your computer’s input devices.
intensive mathematical calculations are
needed (such as weather forecasting or
atomic energy research). The main Input Devices
difference between a supercomputer An input device enables you to enter data
and a mainframe is that supercomputers (text, images, and sounds) and instructions
are designed to execute a few programs (user responses and commands) into the
as quickly as possible, whereas main- computer. The most common input devices
frames are designed to handle many are the keyboard and the mouse. A
programs running at the same time but keyboard is used to enter typed data and
at a slower pace. commands, and a mouse is used to enter
• An embedded computer is a specially user responses and commands.
designed computer chip that resides in There are other input devices as well.
another device, such as your car or the Microphones input
electronic thermostat in your home. sounds, and scanners
Embedded computers are self-contained and digital cameras
computer devices that have their own input nondigital text and
programming and typically do not digital images, respectively.
receive input from you or interact A stylus is an input
with other systems. device that looks
like a skinny
In the following sec- pen but has
tions, we look more no ink. You
closely at your use it like a
computer’s hard- mouse or pen
ware. Each part has a to tap commands
specific purpose that or draw on a screen.
coordinates with one of Electronic pens are
the functions of the com- also becoming quite
puter—input, processing, out- popular and are often
put, or storage (see Figure 2.4). used in conjunction
Additional devices, such as Figure 2.5 with graphics tablets that
modems and routers, help a computer An electronic pen is a type can translate a user’s
communicate with the Internet and of input device that is used handwriting into digital input
other computers to facilitate the shar- with graphics tablets. (see Figure 2.5).

Input Devices 51
How do notebook keyboards
differ? To save space and weight, some of
the smaller notebook keyboards (14⬙ and
under) are more compact than standard
desktop keyboards and, therefore, have
fewer keys. To retain the same functionality
as a standard keyboard, many of the note-
book keys have alternate functions. For ex-
ample, many notebook keyboards do not
have a separate numeric keypad. Instead,
some letter keys function as number keys
when they are pressed in combination with
another key such as the function (Fn)
key. The keys you use as numeric keys on
notebooks have number notations on
them so you can tell which keys to use
Figure 2.6
Keyboards (see Figure 2.7).
QWERTY keyboard layout. What if the standard keyboard
Aren’t all keyboards the same? Most doesn’t work for me? Because recent
desktop and notebook computers come development efforts have focused on reduc-
with a standard QWERTY keyboard (see ing the size and weight of notebook comput-
Figure 2.6). This keyboard layout gets its ers, the keyboards have had to shrink
name from the first six letters in the top-left accordingly. Flexible keyboards are a terrific
row of alphabetic keys on the keyboard and is alternative if you want a full-sized keyboard
the standard English-language keyboard lay- for your notebook. You can roll one up, fit it
out. Over the years, there has been some de- in your backpack, and plug it into the USB
bate over what is the best keyboard layout. port when you need to use it. The virtual
The QWERTY layout was originally designed laser keyboard (see Figure 2.8a) is about the
for typewriters and was meant to slow typists size of a cellular phone. It projects the image
down and prevent typewriter keys from jam- of a keyboard on any surface, and sensors
ming. Although the QWERTY layout is con- detect the motion of your fingers as you
sidered inefficient because it slows typing “type” on a desk or other flat surface. Data
speeds, efforts to change to more efficient lay- is transmitted via Bluetooth technology,
outs, such as that of the Dvorak keyboard, which is a wireless transmission standard
have not been met with much public interest. that facilitates the connection of electronic
The Dvorak keyboard is an alternative key- computing devices such as cell phones,
board layout that puts the most commonly smartphones, and computers to peripheral
used letters in the English language on “home devices such as keyboards and headsets.
keys,” which are the keys in the middle row We’ll discuss Bluetooth in further detail
Figure 2.7 of the keyboard. The Dvorak keyboard’s de- in Chapter 8.
On many notebooks, sign reduces the distance your fingers travel Gamers love keyboards such as the DX1
certain letter keys can for most keystrokes, increasing typing speed. from Ergodex (see Figure 2.8b). These key-
function as number keys. boards allow placement of the keys in any
position on the keyboard pad. The keys can
be programmed to execute individual
keystrokes or macros (a series of tasks) to
perform specific tasks. This makes it easy for
gamers to configure a keyboard in the most
desirable way for each game they play.
How can I use my keyboard most
efficiently? All keyboards have the
standard set of alphabetic and numeric
keys that you regularly use when typing.
As shown in Figure 2.9, many keyboards
for notebook and desktop computers have
additional keys that perform special
functions.

52 Chapter 2 Looking at Computers: Understanding the Parts


a b Figure 2.8
(a) The virtual laser
keyboard projects the
image of a QWERTY
keyboard on any
surface. Sensors
detect typing motions,
and data is transmitted
to a computing device
via Bluetooth
technology. (b) The
Ergodex DX1 allows
keys to be relocated
anywhere on the pad
and reprogrammed
because they start with the letter F easily, making the
followed by a number. Each software keyboard popular
application has its own set of tasks with gamers.
assigned to various function keys.
For example, the F2 key moves text
or graphics in Microsoft Word but
allows editing of the active cell in
Microsoft Excel. Many keys are univer-
sal: the F1 key is the Help key in most
applications.
• The Control (Ctrl) key is used in combi-
nation with other keys to perform short-
cuts and special tasks. For example,
Knowing how to use these special keys holding down the Control (Ctrl) key
will help you improve your efficiency: while pressing the B key adds bold
formatting to selected text. The Alt key
• The numeric keypad allows you to enter works with other keys to execute addi-
numbers quickly. tional shortcuts and special tasks. (On
• Function keys act as shortcut keys you Macs, the Control function is the Apple Figure 2.9
press to perform special tasks. They are key or Command key, and the Alt Keyboards have a variety
sometimes referred to as the “F” keys function is the Option key.) of keys that help you work
more efficiently.

Multimedia controls
Function keys Internet controls

Toggle and
other keys

Numeric
keypad

Control (Ctrl) key Windows key Alt key Windows key Cursor control keys

Input Devices 53
• The Windows key is specific to the to facilitate attaching other devices, such as
Windows operating system. Used alone, a mouse or a keyboard.
it opens the Start menu, although you Another set of controls on standard key-
use it most often in combination with boards are the cursor control keys that move
other keys to perform shortcuts. For your cursor (the flashing symbol on the
example, in Windows 7 and Vista, monitor that indicates where the next char-
pressing the Windows key plus the acter will be inserted). A cursor control key
M key minimizes all windows, and the is also known as an arrow key because each
Windows key plus the L key locks a one is represented by an arrow on standard
computer (a good habit to get into when keyboards. The arrow keys move the cursor
you use a computer in a group setting one space at a time in a document: up,
such as a business office). down, left, or right.
What are some other features on Above the arrow keys, you’ll usually find
keyboards? Some keyboards (such as the Page Up (PGUP) and Page Down (PGDN)
one shown in Figure 2.9) also include keys that move the cursor up or down one
multimedia and Internet keys or buttons full page or even to the document’s begin-
that enable you to open a Web browser, view ning (Home), or to the end of a line of text or
e-mail, access Help features, or control your document (End). The Delete (Del) key allows
CD/DVD player. These buttons are not you to delete characters, and the Insert key
always in the same position on every key- allows you to insert or overwrite characters
board, but the symbols on top of the buttons within a document. The Insert key is a toggle
generally help you determine their function. key because its function changes between one
Some desktop keyboards include USB ports of two options each time you press it: When
toggled on, the Insert key inserts new text
BITS within a line of existing text. When toggled
AND Keystroke Shortcuts off, the Insert key replaces (or overwrites)
BYTES existing characters with new characters as
you type. Other toggle keys that switch
Did you know that you can combine certain keystrokes to take shortcuts within between an on state and an off state include
an application, such as Microsoft Word, or within the operating system itself? The the Num Lock key and the Caps Lock key.
following are a few of the most helpful Windows shortcuts. Use them to make more Are all conventional keyboards
efficient use of your time. For more shortcuts for Windows-based PCs, visit support. connected to the computer via
microsoft.com. For a list of shortcuts for Macs, see apple.com/support. wires? Although most desktop PCs ship
with wired keyboards, wireless keyboards
Text File Cut/Copy/ Windows are available. Wireless keyboards are pow-
Formatting Management Paste Controls ered by batteries. They send data to the
computer using a form of wireless technol-
CTRL+B Applies CTRL+O Opens the CTRL+X Cuts Alt+F4 Closes the
ogy that uses radio frequency (RF). A radio
(or removes) Open dialog box (removes) selected current window
bold formatting text from document transmitter in the keyboard sends out radio
to selected text and stores in wave signals that are received either
Clipboard through a small receiving device that is
plugged into a USB port or a Bluetooth
CTRL+I Applies CTRL+N Opens a CTRL+C Copies Windows Key+
(or removes) new document selected text to Tab Cycles through
receiving device that is contained in the
italic formatting Clipboard open programs system unit. RF keyboards used on home
to selected text using Flip 3-D computers can be placed as far as 6 feet to
30 feet from the computer, depending on
CTRL+U Applies CTRL+S Saves a CTRL+V Pastes Windows Key+L their quality. RF keyboards that are used in
(or removes) document selected text Locks the
underlining to (previously cut or computer business conference rooms or auditoriums
selected text copied) from can be placed as far as 100 feet away from
Clipboard the computer, but they are far more expen-
sive than traditional wired keyboards.
CTRL+P Opens the Windows Key+F
Print dialog box Opens the Search
(Find Files) dialog Mice and Other Pointing Devices
box
What kinds of mice are there? The
mouse type you’re probably most familiar
with is the optical mouse (see Figure 2.10a).

54 Chapter 2 Looking at Computers: Understanding the Parts


An optical a
device such as a touch pad, a small, touch-
mouse uses sensitive area at the base of the keyboard (see
an internal Figure 2.11). To use the touch pad, you
sensor or simply move your finger across the
laser to pad. Some touch pads are sensitive to
detect the taps, interpreting them as mouse clicks,
mouse’s while others have buttons beneath the
movement. pads to record
The sensor mouse clicks.
sends signals to b Other note-
the computer, Wheel
eel books incorpo-
telling it where to Optical laser
rate a
move the pointer (sensor) trackpoint de-
on the screen. Opti- vice, a small,
cal mice are often preferable joystick-like
to other types of mice because nub that al-
they have fewer moving parts, lows you to
which lessens the chances that move the
dirt will interfere with the Trackball cursor with
mechanisms or that parts will the tip of
break down. Optical mice also do your finger.
not require a mouse pad, though Are
you can still use one to protect Figure 2.10 there wire-
your work surface from being (a) An optical mouse has an optical laser (or sen- less
scratched. You may still find a sor) on the bottom that detects its movement. (b) A mice? Just
mouse at home or in school that trackball mouse turns the traditional mouse on its as there are
back, allowing you to control the rollerball with
has a rollerball on the bottom, your fingers. wireless key-
which moves when you drag the boards, there
mouse across a mouse pad. The are wireless
movement of the rollerball controls mice, both optical and trackball. Wireless
the movement of the cursor that appears mice are similar to wireless keyboards in
on the screen. that they use batteries and send data to the
A trackball mouse (see Figure 2.10b) has computer by radio frequency or Bluetooth
the rollerball on top or on the side of the technologies. If you have an RF wireless
mouse, and you move the ball with your keyboard, then your RF wireless mouse and
fingers, allowing the mouse to remain keyboard usually can share the same RF re- Figure 2.11
stationary. A trackball mouse doesn’t ceiver. Wireless mice for notebooks have Touch pads and trackpoint
demand much wrist motion, so it’s consid- their own receivers that often clip into the devices take the place of
a mouse on notebook
ered better for the wrist than an optical computers.
mouse. Mice also have
two or three buttons that
enable you to execute
commands and open
shortcut menus. (Mice for
Macs sometimes have
only one button.) Many
mice have additional pro-
Trackpoint
grammable buttons and
wheels that let you
quickly scroll through
documents or Web pages.
Do notebook com-
puters include a
mouse? Most note- Touch pad
books do not have a
mouse. Instead, they have
an integrated pointing

Input Devices 55
a bottom of the • Web search: Allows you to quickly
mouse for highlight a word or phrase and then
easy storage press the search button on the mouse to
when not in start a Web search.
use. • File storage: Includes a wireless USB
Apple has receiver that contains flash memory to
developed Magic store or back up your files (for example,
Mouse, the first multitouch wireless a USB drive).
b
mouse (see Figure 2.12a). The top surface of
the mouse, which is virtually the mouse it- What other input devices are used
self, is the button. Use your finger to scroll in with games? Game controllers such as
any direction, swipe your joysticks, game pads, and steering wheels are
finger across the mouse to also considered input devices because they
move through Web pages send data to the computer. Game controllers,
and photos, and tap on which are similar to the devices used on gam-
the mouse to click and ing consoles, such as the Xbox 360 and the
double-click. PlayStation, are also available for use with
Small, compact de- computers. They have buttons and miniature
vices like the MoGo pointing devices that provide input to the
Mouse (see Figure 2.12b) computer. Force-feedback joysticks and steer-
are designed for portability. The ing wheels deliver data in both directions.
MoGo Mouse fits into a They translate your movements to the com-
peripheral slot on the side of a puter and translate its responses into forces
Figure 2.12 on your hands, creating a richer simulated
notebook; this slot serves to store the mouse,
(a) The Magic Mouse by protect it, and charge its batteries all at the experience. Most game controllers, such as
Apple has multitouch those for Rock Band and the Wii system, are
technology. (b) The MoGo
same time. The MoGo Mouse is wireless and
uses Bluetooth technology to transmit data wireless to provide extra mobility.
Mouse is a portable
mouse that stores and to the notebook.
charges in a PC Card slot. What else can I do with my Touch Screens
mouse? Manufacturers of mice are con-
How else can I input data and
stantly releasing new models that allow you
commands? You’ve seen and used
to perform useful tasks with a few clicks of
touch-sensitive screens in fast food restau-
the mouse. On some mouse models, Mi-
rants, airport check-in kiosks, and ATM ma-
crosoft and Logitech now provide features
chines for quite some time. A touch screen is
such as the following:
a display screen that responds to commands
• Magnifier: Pulls up a magnification box initiated by a touch with a finger or a stylus.
that you can drag around the screen to Touch screens are becoming increasingly
enhance viewing of hard-to-read images popular on many computing devices, includ-
(see Figure 2.13). This feature is often ing desktops, notebooks, smartphones, and
used by people with visual disabilities. portable media players (PMPs). Tablet PCs
• Customizable buttons: Provide extra were one of the first devices with touch-
Figure 2.13 buttons on the mouse that you can pro- screen capabilities (see Figure 2.14). Al-
The magnifier is a mouse gram to perform the functions that you though all tablet PCs have built-in keyboards
feature that provides use most often to help you speed that allow you to type text just as you would
instant magnification of with a normal keyboard, the touch-screen
images or text.
through tasks.
functionality often makes it a better choice
when inputting with a keyboard is impracti-
Window
provides
magnified SOUND Tablet and
view BYTE Notebook Tour

In this Sound Byte, you’ll take a tour of a Tablet PC and


a notebook computer, learning about the unique fea-
tures and ports available on each.

56 Chapter 2 Looking at Computers: Understanding the Parts


(a portable electronic storage device that
connects to a USB port on a computer). You
can write with the pen on any conventional
paper. The pen captures your writing and
then wirelessly transmits and stores it in
the flash drive. When the flash drive is con-
nected to a computer, you can use software
to translate your writing into digital text.

Image Input
How can I input digital images into
my computer? Digital cameras,
camcorders, and cell phones are common
devices for capturing pictures and video,
and all of them are considered input de-
vices. Digital cameras and camcorders are
Figure 2.14
usually used in remote settings (away from
Tablet PCs use the finger or a stylus to input data and a computer) to capture images and video for
commands on a touch-screen display that twists and
later downloading to the com-
folds flat.
puter. These devices either con-
cal or unwieldy. The Apple iPod nect to a computer with a data
Touch, iPad, and iPhone all have cable or transmit data wirelessly.
touch capability, as do portable Windows automatically recog-
gaming devices such as the Nin- nizes these devices when they
tendo DS. Dell and Hewlett are connected to a computer and
Packard have released all-in-one makes the input of the digital
desktop PCs with touch-screen data to the computer simple and
displays. easy. Scanners can also input
Tablet PCs, which were devel- images. They work similar to a
oped primarily because many photocopy machine, but instead
people find it easier to write than of generating the image on
to type input into a computer, paper, they create a digital
are expensive compared to con- image, which can then be
Figure 2.15 printed, saved in storage, or
ventional notebooks. An alterna-
tive is a digital pen like the The Dane-Elec Digital Pen e-mailed. Figure 2.16
captures writing and stores How do I capture live
Dane-Elec Digital Pen (see it in a flash drive for later A webcam is either built
Figure 2.15). This pen works in video from my computer? into a notebook monitor or
transfer to a computer. No
conjunction with a flash drive typing is required! A webcam (see Figure 2.16) is a placed on top of a monitor.
small camera that sits on top of a
Built-in webcam

Webcam

Input Devices 57
ETHICS
IN IT What Is Ethical Computing?

If you were asked to cite an example of unethical behavior while using a 7. Avoid using other people’s computer resources without appropriate
computer, you could easily provide an answer. You’ve probably heard news authorization or proper compensation.
stories about people using computers to commit such crimes as unleashing 8. Do not claim other people’s intellectual output as your own.
viruses or committing identity theft. You may also have read about students 9. Consider the social consequences of the products of your computer
who were prosecuted for illegally sharing copyrighted material such as labor.
videos. Or perhaps you heard about the case where the school district was 10. Only use computers in ways that show consideration and respect
monitoring students through notebook computer webcams without the stu- for others.
dents’ knowledge. All of these are examples of unethical behavior while
The United States has en-
using a computer. However, if you
acted laws that support
were asked what constitutes ethical
some of these guidelines,
behavior while using a computer,
such as Guideline 6, the
could you provide an answer just as
breaking of which would
quickly?
violate copyright laws, and
Loosely defined, ethics is a sys-
Guideline 4, which is en-
tem of moral principles, rules, and
forceable under numerous
accepted standards of conduct. So
federal and state larceny
what are the accepted standards of
laws. Other guidelines,
conduct when using computers
however, require more
(see Figure 2.17)? The Computer
subtle interpretation as to
Ethics Institute developed the Ten
what behavior is unethical
Commandments of Computer
because there are no laws
Ethics, which is widely cited as a
designed to enforce them.
benchmark for companies that are
Consider Guideline 7,
developing computer usage and
which covers unautho-
compliance policies for employees.
rized use of resources.
These guidelines are applicable for
The college you attend
schools and students as well. The
Figure 2.17 probably provides com-
ethical computing guidelines listed
Make sure the work you claim as your intellectual output is the product of puter resources for you to
below are based on the Computer
your intellect alone. use for coursework. But if
Ethics Institute’s work.
the college gives you ac-
Ethical Computing Guidelines cess to computers and the Internet, is it ethical for you to use those re-
1. Avoid causing harm to others when using computers. sources to run a business on eBay in between classes or on the
2. Do not interfere with other people’s efforts at accomplishing work weekends? Although it might not be technically illegal, you are tying up
with computers. computer resources that could be used by other students for their in-
3. Resist the temptation to snoop in other people’s computer files. tended purpose: learning and completing coursework. (This behavior
4. Do not use computers to commit theft. also violates Guidelines 2 and 10.)
Throughout the chapters in this book, we touch on many topics related
5. Agree not to use computers to promote lies.
to these guidelines. So keep them in mind as you study, and think about
6. Do not use software (or make illegal copies for others) without pay-
how they relate to the actions you take as you use computers in your life.
ing the creator for it.

ACTIVE computer monitor (connected to the com-


HELP- Using Input Devices puter by a cable) or is built into a notebook
DESK computer. Although some webcams are able
to capture still images, they are used mostly
In this Active Helpdesk call, you’ll play the role of a for transferring live video directly to a com-
helpdesk staffer, fielding calls about different input de- puter. Webcams make it possible to transmit
vices, such as the different mice and keyboards on the live video over the Web. They are often used
market, what wireless input options are available, and to facilitate videoconferencing or calls made
how to best use these devices. with video phones. Videoconferencing tech-
nology allows a person sitting at a computer

58 Chapter 2 Looking at Computers: Understanding the Parts


equipped with a web- voice, such as during a
cam and a microphone conference call when
to transmit video and you need to pick up
audio across the the voices of multi-
Internet. ple speakers.
Clip-on micro-
phones (also
Sound Input called lavalier mi-
Why would I crophones) are
want to input useful in environ-
sound to my ments such as pre-
computer? Equipping sentations, where you need
your computer to accept Figure 2.18 to keep your hands free
sound input opens up a for other activities (such as
Professional-quality microphones such as
variety of possibilities. the Snowball are essential for producing writing on a white board)
You can conduct audio quality podcasts. or move around the room.
conferences with work Many of these micro-
colleagues, chat with phones are wireless.
friends or family over the Internet instead of Close-talk microphones, which are usually
using a phone, record podcasts, and more. attached to a headset, facilitate using speech-
Inputting sound to your computer requires recognition software, videoconferencing, or
equipping it with a microphone or mic, a making telephone calls. With a microphone
device that allows you to capture sound attached to a headset, your hands are free to
waves (such as your voice) and transfer perform other tasks while you speak (such as
them to digital format on your computer. making notes or referring to paper docu-
Many notebook computers come with built- ments), and the headset allows you to listen
in microphones, and some desktop comput- as well (such as when making Internet phone
ers come with inexpensive microphones. If calls or playing games online).
you don’t have a microphone or you aren’t What input devices are available
getting the quality you need from your for people with disabilities? Many
existing microphone, then you probably people who have physical challenges use
need to shop for one. computers often, but they sometimes need
What types of microphones are special input devices to access them. For
available? There are several different visually impaired users, voice recognition is
types of microphones available for a variety an obvious option. For those users whose
of needs. Desktop microphones, which have visual limitations are less severe, keyboards
an attached base that allows them to sit with larger keys are available. Keyboards
on a flat surface (see that display on a touch
Figure 2.18), are conven- screen can make input easier
ient for recording pod- for some individuals. These
casts or in other keyboards are displayed as
situations in which you graphics on the computer
might need your hands monitor. The user presses the
to be free. Unidirectional keys with a pointing device
microphones pick up or simply presses
sound from only one on the touch-screen monitor.
direction. These are best There are also keyboards de-
used for recording signed for individuals who
podcasts with a single Figure 2.19 can only use one hand such
voice or making phone For people who have physical disabilities, as the Maltron keyboard (see
calls over the Internet devices such as this keyboard adapt to Figure 2.19).
with only one person on accommodate special needs. This People with motor control
the sender’s end of the keyboard is shaped and designed for issues may have difficulty
individuals who can only use one hand.
call. Omnidirectional with pointing devices. To aid
microphones pick up such users, special trackballs
sounds from all directions at once. These are available that can easily be manipulated
mics are best for recording more than one with one finger and can be attached to almost

Input Devices 59
any surface, including a wheelchair. When Monitors
arm motion is severely restrained, head-
mounted pointing devices can be used. Gen- What are the different types of
erally, these involve a camera mounted on the monitors? The most common type of
computer monitor and a device attached to monitor is a liquid crystal display (LCD)
the head (often installed in a hat). When the (see Figure 2.20). An LCD monitor, also
user moves his or her head, the camera de- called a flat-panel monitor, is light and en-
tects the movement, which con- ergy efficient. Some newer
trols the cursor on the screen. In LCD monitors use light-
this case, mouse clicks are con- emitting diode (LED) tech-
trolled by a switch that can be nology, which is even more
manipulated by the user’s energy efficient, and may
hands or feet or even by using have better color accuracy
an instrument that fits into and thinner panels than
the mouth and senses the traditional LCD monitors. LCD
user blowing into it. monitors have replaced the cath-
ode ray tube (CRT) monitor.
CRT monitors are difficult to
Output find or buy because they have
become legacy technology,
Devices or computing devices or pe-
An output device enables you ripherals that use tech-
to send processed data out of niques, parts, and methods
your computer in the form from an earlier time that are
of text, pictures (graphics), Figure 2.20 no longer popular. Al-
sounds (audio), or video. LCDs (flat-panel monitors) save pre- though legacy technology
One common output device cious desktop space and weigh consid- may still be functional, it is
is a monitor (sometimes re- erably less than older CRT monitors. quickly being replaced by
ferred to as a display newer technological ad-
screen), which displays text, graphics, and vances. This doesn’t mean that if you have a
video as soft copies (copies you can see only CRT monitor that is functioning well you
on screen). Another common output device should replace it with an LCD monitor.
is the printer, which creates hard copies However, when your CRT monitor fails, you
Figure 2.21 (copies you can touch) of text and graphics. will most likely only be able to replace it
Speakers and earphones (or earbuds) are the with an LCD monitor.
A magnification of a single
pixel in an LCD monitor. output devices for sound. How do monitors work? Monitor
screens are grids made up of millions of tiny
dots, each of which is called a pixel. Illumi-
Rear glass Colored light nated pixels create the images you see on
your monitor. Each pixel is actually com-
prised of three subpixels of red, blue, and
green, and some newer TVs on the market
have added a fourth color: yellow.
Polarizer
LCD monitors are made of two or
Front glass more sheets of material filled with
a liquid crystal solution (see Fig-
ure 2.21). A fluorescent panel at the
back of the LCD monitor generates
light waves. When electric current
Unpolarized Polarizer passes through the liquid crystal
white light solution, the crystals move around and
from backlight
either block the fluorescent light or let
the light shine through. This blocking or
passing of light by the crystals causes images
to form on the screen. The various combina-
tions of red, blue, and green make up the
Liquid crystals Color filters
components of color we see on our monitors.

60 Chapter 2 Looking at Computers: Understanding the Parts


What factors affect the quality of • Brightness: Measured as candelas per
an LCD monitor? When choosing an square meter (cd/m2) or nits, brightness
LCD monitor, there are several factors to is a measure of the greatest amount of
consider, such as aspect ratio and resolution. light showing when the monitor is dis-
The aspect ratio is the width-to-height pro- playing pure white. A brightness level of
portion of a monitor. Traditionally, aspect 300cd/m2 or greater is recommended.
ratios have been 4:3, but newer monitors • Response time: This is the measurement
are available with an aspect ratio of 16:9 or (in milliseconds) of the time it takes for
16:10. The screen resolution, or the clearness a pixel to change color. A lower response
or sharpness of the image, reflects the num- time value means faster transitions;
ber of pixels on the screen. An LCD monitor therefore, moving images will appear
may have a native (or maximum) resolution less jerky on the monitor.
of 1,600 ⫻ 1,200, meaning it contains 1,600
vertical columns with 1,200 pixels in each Is a bigger screen size always
column. The higher the resolution, the better? The bigger the monitor, the more
sharper and clearer the image will be, but you can display, and depending on what you
generally the resolution of an LCD monitor want to display, size may matter. In general,
is dictated by the screen size and aspect the larger the panel, the larger number of
ratio. Although you can change the resolu- pixels it can display. For example, a 21-inch
tion of an LCD monitor beyond its native monitor will typically be able to display
resolution, the images will become distorted. 1680 ⫻ 1050 pixels, while a 19-inch monitor
Generally, you should select a monitor with may only be able to display 1440 ⫻ 900 or
the highest resolution available for the 1280 ⫻ 1024. If you watch many high-
screen size (measured in inches). definition movies on your monitor, you will
Other factors to consider when judging need a monitor with at least the 1920 ⫻ 1080
the quality of an LCD monitor include the resolution required to display HD-DVDs and
following: Blu-ray movies. Larger screens can also allow
you to view multiple documents or Web
• Contrast ratio: This is a measure of the pages at the same time, creating the effect of
difference in light intensity between the using two separate monitors side by side.
brightest white and the darkest black Again, be mindful of cost. Buying two smaller
that the monitor can produce. If the monitors might be cheaper than buying one
contrast ratio is too low, colors tend to large monitor. For either option—a big screen
fade when you adjust the brightness to or two screens—you should check that your
a high or low setting. A contrast ratio computer has a special adapter card to
between 400:1 and 1,000:1 is preferable. support these video display devices.
Some monitors may sport a dynamic
contrast ratio that may be 10,000:1 or BITS
50,000:1. This measurement is taken AND Cleaning Your Monitor
when the backlight is turned off BYTES
completely; normal contrast ratio
Have you ever noticed how quickly your monitor attracts dust? It’s important to keep
measurements have the backlight
your monitor clean because dust buildup can act like insulation, keeping heat in and
dimmed to its lowest setting but not
causing the electronic components to wear out much faster. To clean your LCD
completely off. Unfortunately, in normal
monitor, follow these steps:
use, the backlight is not turned off, so
the dynamic contrast ratio is not a 1. Turn off the monitor (or your notebook computer) and make sure it is unplugged
relevant measure, unless you are from the electrical power outlet.
using an LED monitor. 2. Use a 50/50 solution of rubbing alcohol and water on a soft cloth and wipe the
screen surface gently. Never spray anything directly onto the monitor. (Check
• Viewing angle: An LCD’s viewing
your monitor’s user manual to see if there are cleaning products you should
angle, which is measured in degrees,
avoid using.)
tells how far you can move to the side of
3. In addition to wiping the screen, wipe away the dust from around the case.
(or above or below) the monitor before
the image quality degrades to unaccept- Also, don’t place anything on top of the monitor or pack anything closely around it.
able levels. For monitors that measure This may block air from cooling it. Finally, avoid placing magnets (including your
17 inches or more, a viewing angle speaker system’s subwoofer) anywhere near the monitor because they can interfere
of at least 150 degrees is usually with the mechanisms inside the monitor.
recommended.

Output Devices 61
What other features should I look ACTIVE
for in an LCD monitor? Some moni- HELP-
Using Output
tors, especially those on notebook computers, DESK Devices
come with convenient built-in features such
as speakers, webcams, and microphones. A In this Active Helpdesk call, you’ll play the role of a
built-in multiformat card reader is conven- helpdesk staffer, fielding calls about different output
ient to display images directly on the monitor devices, including the differences between LCD and
or to download pictures quickly from a cam- CRT monitor technologies and between inkjet and
era memory card to the PC. Another nice fea- laser printers and the advantages and disadvantages
ture to look for in a desktop LCD monitor is a of each.
built-in USB port. This will enable you to
connect extra peripherals easily without
reaching around the back of the PC. beams to transfer marks onto the paper.
If these features are important to you, Today, nonimpact printers have replaced
then look for a monitor that has them, but be impact printers almost entirely. An impact
careful that the price of buying a monitor printer has tiny hammerlike keys that strike
with these additional features isn’t more the paper through an inked ribbon, making
than what it would cost you to buy the marks on the paper. The most common im-
monitor and extra peripherals separately. pact printer is the dot-matrix printer. The
How do I show output to a large only place you may see a dot-matrix printer
group of people? Crowding large is at a company that still uses them to print
groups of people around your computer isn’t multipart forms. For most users, dot-matrix
practical. However, it is possible to use a printers are truly legacy technology.
projector, a device that can project images What are the advantages of inkjet
from your computer onto a wall or viewing printers? An inkjet printer (see
screen (see Figure 2.22). Projectors are Figure 2.23) is the standard type of printer
commonly used in business and education found in most homes. Inkjet printers are
settings such as conference rooms and class- popular because they are affordable and
rooms. These projectors are small and light- produce high-quality color printouts quickly
weight, and some, like the 3M MPro 150, are and quietly. Inkjet printers work by spraying
small enough to fit into the palm of your tiny drops of ink onto paper and are great
hand! These portable projectors are ideal for for printing black-and-white text as well as
businesspeople that have to make presenta- color images. In fact, when loaded with the
tions at client locations. Entertainment projec- right paper, higher-end inkjet printers can
tors, such as the Wonderwall, include stereo print images that look like professional-
speakers and an array of multimedia connec- quality photos. One thing to consider when
tors, making them a good option for use in the buying an inkjet printer is the type and cost
home to display TV programs, DVDs, digital of the ink cartridges the printer needs. Some
images, or video games in a large format. printers use two cartridges: black and color.
Other printers use four or more cartridges,
typically black, magenta, cyan, and yellow.
Printers Often the cost of buying replacement car-
Figure 2.22 What are the different types of tridges is more than that of a brand-new
Inexpensive projectors printers? There are two primary cate- printer! Depending on how frequently you
are showing up more gories of printers: inkjet and laser, both of
frequently in business and
which are considered nonimpact printers. A
the home to provide large
images for movie viewing nonimpact printer sprays ink or uses laser
and gaming.

62 Chapter 2 Looking at Computers: Understanding the Parts


print, you might want to lightweight, and
consider a laser sometimes run on bat-
printer. tery power instead of
Why would I AC power.
want a laser Are there wire-
printer? Laser less printers?
printers (see One reason you may
Figure 2.24) are most have bought a note-
often used in office or book was to be able to
classroom settings use a computer without
because they have a the restriction of wires. Wire-
faster printing speed Figure 2.23 less printing offers
than inkjet printers Inkjet printers are popular among home users, espe- you the same free-
and produce higher- cially with the rise of digital photography. Many inkjet dom. In addition,
quality printouts. A printers are optimized for printing photos from digital wireless printers
laser printer uses cameras. allow several people
laser beams and static to print to the same
electricity to deliver toner (similar to ink) printer from different places. There are two
onto the correct areas of the page. Heat is different types of wireless printers: WiFi and
used to fuse the toner to the page, making Bluetooth. Both WiFi and Bluetooth printers
the image permanent. In the past, laser print- have a range of up to approximately 300
ers generally were not found in the home be- feet. WiFi, however, sends data more quickly
cause of their high purchase price and than Bluetooth. If your printer is not Blue-
because they did not produce great color im- tooth enabled, you can add Bluetooth by
ages. Recently, however, the quality has im- plugging a Bluetooth adapter into a USB
proved and the price of color laser printers port. This lets you take advantage of a great
has fallen dramatically, making them highly printing solution for photos stored on your
price competitive with high-end inkjet print- cell phone or any other Bluetooth-enabled
ers. When you include the price of ink or portable device.
toner in the overall cost, laser printers can be Are there any other types of spe-
more economical than inkjets. cialty printers? An all-in-one printer is
What kind of printer can I take a device that combines the functions of a
with me? Although some inkjet printers printer, scanner, copier, and fax into one ma-
are small enough to carry with you, you chine. Popular for their space-saving con-
may want to consider a printer designed for venience, all-in-one printers can use either
portability for added mobility and flexibility inkjet or laser technology. A plotter is an- Figure 2.25
(see Figure 2.25). Portable printers are often other type of printer. Plotters produce over- Modern portable printers
compact enough to fit in a briefcase, are size pictures that require the drawing of feature Bluetooth connec-
tivity, allowing them to be
used with mobile devices.

Figure 2.24
Laser printers print quickly and offer high-quality
printouts.

Output Devices 63
print digital images, then you will want to
select a photo printer. If not, then a general-
purpose printer will be a better choice.
General-purpose printers have a finer, faster
text output, whereas photo printers have a
more distinctive color output. It’s also
important to determine whether you want
just a printer or a device that prints and scans,
copies, or faxes (an all-in-one). In addition,
you should decide whether you want an
inkjet or laser printer, and whether or not
you want to print wirelessly. Once you have
narrowed down the type of printer you
want, the following criteria will help you
determine the best model to meet your
needs.

precise and contin- • Speed: A printer’s speed determines


uous lines, such as maps, how many pages it can print per
detailed images (see Figure 2.26), minute. Print speed is expressed as pages
Figure 2.26 and architectural plans. Plotters use a per minute or ppm. The speed of inkjet
computer-controlled pen that provides a printers has improved over the years,
Plotters are large printers
used to print oversize greater level of precision than the series of and many inkjet printers now print as
images, maps, and dots that laser or inkjet printers are capable fast as laser printers. Printing speeds
architectural plans. of making. vary by model and range from 8 ppm
A thermal printer, such as the one shown to 38 ppm for both laser and inkjet
in Figure 2.27, is another kind of specialty printers. Text documents printed in
printer. These printers work either by melt- black and white print faster than
ing wax-based ink onto ordinary paper (a documents printed in color.
process called thermal wax transfer printing), • Resolution: A printer’s resolution
or by burning dots onto specially coated (printed image clarity) is measured in
paper (a process called direct thermal dots per inch (dpi), which is the number
printing). They are used in stores to print re- of dots of ink in a one-inch line. The
ceipts and in airports for electronic ticketing, higher the dpi, the greater the level of
among other places. Thermal printers are detail and quality of the image. You’ll
also emerging as a popular technology for sometimes see dpi represented as a hori-
Figure 2.27 zontal number multiplied by a vertical
mobile and portable printing in conjunction
Thermal printers are used with smartphones and similar devices. number, such as 600 ⫻ 600, but you may
in many restaurants to also see the same resolution simply
print receipts. Many models, such as the printers that car
rental agencies use stated as 600 dpi. For general-purpose
to give you an in- printing, 1,200 dpi is sufficient. For
stant receipt when printing photos, 4,800 dpi is better. The
you drop off your dpi for professional photo-quality print-
rental car, feature ers is twice that.
wireless infrared • Color output: If you’re using an inkjet
technology for com- printer to print color images, buy a four-
plete portability. color printer (cyan, magenta, yellow,
How do I and black) or a six-color one (four-color
select the best plus light cyan and light magenta) for
printer? There is the highest-quality output. Although
a printer for every some printers come with a single ink
printing need. First, cartridge for all colors and others have
you need to decide two ink cartridges (one for black and
what your primary one for color), the best setup is to have
printing need is. If an individual ink cartridge for each
you will use your color so you can replace only the spe-
printer mostly to cific color cartridge that is empty. Color

64 Chapter 2 Looking at Computers: Understanding the Parts


DIG
DEEPER
How Inkjet and Laser Printers Work

Ever wonder how a printer knows what to print and how it puts ink in just Laser printers use a completely different process. Inside a laser
the right places? Most inkjet printers use drop-on-demand technology in printer is a big metal cylinder (also called a drum) that is charged with
which the ink is “demanded” and then “dropped” onto the paper. Two static electricity. When asked to print something, the printer sends sig-
different processes use drop-on-demand technology: Thermal bubble is nals to the laser in the laser printer, telling it to “uncharge” selected
used by Hewlett-Packard and Canon, and piezoelectric is used by Epson. spots on the charged cylinder. These spots correspond to characters and
The difference between the two processes is how the ink is heated images in the document you wish to print. Toner, a fine powder that is
within the print cartridge reservoir (the chamber inside the printer that used in place of liquid ink, is only attracted to those areas on the drum
holds the ink). that are not charged (the areas where the desired characters and images
In the thermal bubble process, the ink is heated in such a way that it are to be printed). The toner is transferred to the paper as it feeds
expands (like a bubble) and leaves the cartridge reservoir through a through the printer. Finally, the toner is melted onto the paper. All unused
small nozzle. Figure 2.28 shows the general process for thermal bubble. toner is swept back to the toner hopper before the next job starts the
In the piezoelectric process, each ink nozzle contains a crystal at the process all over again.
back of the ink reservoir that receives an electrical charge, causing the
ink to vibrate and drop out of the nozzle.

Inkjet Printer
Print head

Nozzles

The print cartridge is


positioned inside your
Print cartridges
inkjet printer so that the
print head faces down
toward the paper. The
print head has 50 to
several hundred nozzles, Inverted
or small holes, through print cartridge
which ink droplets fall. These nozzles are narrower than a human hair. Inside
the print head of color inkjet printers, there are three ink reservoirs that hold
magenta (red), cyan (blue), and yellow ink. Depending on your printer, a fourth
ink reservoir may be required to hold black ink, as well. (In non-color inkjet
printers, there is only one ink reservoir for the black ink.)

(1) Ink (2) STEP 1: Once the printer receives the


Resistor
Firing Bubble command to print, electrical
chamber forming pulses flow through thin
resistors in the print head to
heat the ink.
Ink forced
Nozzle out of STEP 2: The heated ink forms a
the nozzle bubble. The bubble continues
to expand until it is forced
(3) (4) out of the nozzle.

STEP 3: The ink drops onto the paper.

STEP 4: As the ink leaves the cartridge,


the chamber begins to cool
and contract, creating a
Ink drop Ink dot vacuum to draw in the ink for
the process to begin again.

Figure 2.28
How a thermal bubble inkjet printer works.

Output Devices 65
BITS generally only print 100 copies a month,
AND Does It Matter What Paper I Print On? then you will have overpurchased.
BYTES Alternatively, exceeding the duty cycle
estimates might lead to printer
The quality of your printer is only part of what controls the quality of a printed image. malfunctions.
The paper you use and the printer settings that control the amount of ink used are • Cost of consumables: You should care-
equally important. If you’re printing text-only documents for personal use, then using fully investigate the cost of consumables
low-cost paper is fine. You also may want to consider selecting draft mode in your (such as printer cartridges and paper)
printer settings to conserve ink. However, if you’re printing more formal documents for any printer you are considering
such as résumés, you may want to choose a higher-quality paper (determined by the purchasing because the cost of inkjet
paper’s weight, whiteness, and brightness) and adjust your print setting to “normal” cartridges often can exceed the cost of
or “best.” the actual printer when purchased on
The weight of paper is measured in pounds, with 20 pounds being standard. A sale. Reviews in consumer magazines
heavier paper may be best for projects such as brochures, but be sure to check that such as PC World and Consumer Reports
your printer can handle the added thickness. The degree of paper whiteness is a mat- can help you evaluate the overall cost of
ter of personal preference. Generally, the whiter the paper, the brighter the printed producing documents with a particular
color. However, for more formal documents, such as résumés, you may want to use a printer.
creamier color. The brightness of paper usually varies from 85 to 94. The higher the
number, the brighter the paper, and the easier it is to read printed text. Opacity is es-
pecially important if you’re printing on both sides of the paper because it determines
the amount of ink that shows through from the opposite side of the paper.
Sound Output
If you’re printing photos, then paper quality can have a big impact on the results.
Photo paper is more expensive than regular paper and comes in a variety of textures What are the output devices for
ranging from matte to high gloss. For a photo-lab look, high-gloss paper is the best sound? Most computers include inexpen-
choice. Semigloss (often referred to as satin) is good for portraits, while a matte sur- sive speakers. A speaker is an output device
face is often used for black-and-white printing. for sound. These speakers are sufficient to
play the standard audio clips you find on
the Web and usually enable you to partici-
pate in videoconferencing or phone calls
made over the Internet. However, if you
laser printers have four separate toner plan to digitally edit audio files or are par-
cartridges (black, cyan, magenta, and ticular about how your music sounds, then
yellow), and the toner is blended in var- you may want to upgrade to a more sophis-
ious quantities to produce the entire ticated speaker system, such as one that in-
color spectrum. cludes subwoofers (special speakers that
• Use and cost of the printer: If you will produce only low bass sounds) and sur-
be printing mostly black-and-white, round-sound speakers. A surround-sound
text-based documents or will be sharing speaker is a system of speakers and audio
your printer with others, then a black- processing that envelops the listener in a full
and-white laser printer is best because 360-degree field of sound. Wireless speaker
of its printing speed and overall econ- systems are available now to help you avoid
omy for volume printing. If you’re plan- cluttering up your rooms with speaker wire.
ning to print color photos and graphics, We discuss surround sound in more detail
then an inkjet printer or color laser in Chapter 6.
printer is a must, even though the cost If you work in close proximity to other
per page will be higher. Keep in mind a employees or travel with a notebook, then
printer’s reported duty cycle. A duty you may need to use headphones or ear-
cycle is a manufacturer’s figure that buds for your sound output to avoid dis-
refers to how long a machine can keep tracting other people. Both devices will plug
operating before it needs a rest, or what into the same jack on the computer that
percentage of the time it’s designed to speakers connect to, so using them with a
be in use. For a printer, the duty cycle computer is easy. Studies of users of
generally refers to the number of portable media players have shown that
printed pages the printer can reliably hearing might be damaged by excessive
produce on a monthly basis. If you volume, especially when using earbuds,
buy a printer with a duty cycle of because they fit into the ear canals. Exercise
1,000 copies per month, and you caution when using these devices.

66 Chapter 2 Looking at Computers: Understanding the Parts


Processing and phone line, and a network interface card
(NIC), which enables your computer to
Memory on the connect with other computers or to a
Motherboard cable modem to facilitate a high-speed
We just looked at the components of your Internet connection. Lastly, some expansion
computer that you use to input and output cards provide additional USB and FireWire
data. But where does the processing take ports.
place, and where is the data stored? The
motherboard is the main circuit board that
contains the central electronic components
Memory
of the computer, including the computer’s
processor (its brain), its memory, and the What exactly is RAM? Random access
many circuit boards that help the computer memory (RAM) is the place in a computer
function. On a desktop, the motherboard is where the programs and data the computer
located inside the system unit, the metal or is currently using are stored. RAM is much
plastic case that also houses the power faster to read from and write to than the
source and all the storage devices (CD/DVD hard drive and other forms of storage. The
drive and hard drive). With a notebook com- processor can request the RAM’s contents,
puter, the system unit is combined with the which can be located, opened, and delivered
monitor and the keyboard into a single to the CPU for processing in a few nanosec-
package. onds (billionths of a second). If you look at a
What’s on the motherboard? Recall motherboard, you’ll see RAM as a series of
that the motherboard is the main circuit small cards (called memory cards or memory
board that contains the set of chips that modules) plugged into slots on the
powers the system, including the central motherboard.
processing unit (CPU). The motherboard Because the entire contents of RAM are
also houses ROM, RAM, and cache, the erased when you turn off the computer,
chips that provide the short-term memory RAM is a temporary or volatile storage
for the computer. The motherboard also in- location. To save data permanently, you
cludes slots for expansion cards (or adapter need to save it to the hard drive or to an-
other permanent storage device such as a Figure 2.29
cards), which are circuit boards that provide
additional functionality (see Figure 2.29). CD or flash drive. You can think of RAM as A motherboard contains
the CPU, the memory
Typical expansion cards found in the system
(RAM) modules, and slots
unit are the sound and video cards. A sound for expansion cards.
card provides a connection for the
speakers and micro-
phone, whereas a video Memory modules
card provides a (RAM)
Expansion slot
connection for the moni-
tor. Many low-end
computer models have
video and sound capa-
bilities integrated into
their motherboards.
High-end models use
expansion cards to
provide video and
sound capabilities.
Other expansion cards
provide a means for
network and Internet
connections. These
include the modem
card, which provides
the computer with a
connection to the CPU Expansion cards
Internet via a traditional

Processing and Memory on the Motherboard 67


BITS
AND Maintaining Your Inkjet Printer SOUND Virtual Computer
BYTE Tour
BYTES

In general, printers require minimal maintenance. Occasionally, it’s a good idea to In this Sound Byte, you’ll take a video tour of the inside
wipe the case of the printer with a damp cloth to free it from accumulated dust. How- of a system unit. From opening the cover to locating
ever, do not wipe away any ink residue that has accumulated inside the printer. If you the power supply, CPU, and memory, you’ll become
are experiencing streaking or blank areas on your printed paper, then your print head more familiar with what’s inside your computer.
nozzles may be clogged. To fix this, run the printer’s cleaning cycle. (Check your printer’s
manual for instructions, because every printer is different.) If this doesn’t work, you
may want to use a cleaning sheet to brush the print head clean. These sheets often
come with printers or with reams of photo paper. If you still have a problem, try a second without error, making them
cleaning cartridge. Cleaning cartridges contain a special fluid that scrubs the print extremely powerful components.
head. These cartridges can be found where most ink cartridges are sold. As with ink How is processor speed meas-
cartridges, make sure you buy one that is compatible with your printer. ured? Processor speed is measured in
units of hertz (Hz). Hertz means “machine
cycles per second.” A machine cycle is the
process of the CPU getting the data or in-
the computer’s temporary memory and the structions from RAM and decoding the in-
hard drive as permanent memory. structions into something the computer can
Does the motherboard contain any understand. Once the CPU has decoded the
other kinds of memory besides instructions, it executes them and stores the
RAM? In addition to RAM, the mother- result back into system memory. Older ma-
board also contains a form of memory called chines ran at speeds measured in megahertz
read-only memory (ROM). ROM holds all (MHz), or millions of machine cycles per
the instructions the computer needs to start second, whereas current systems run at
up when the computer is powered on. Un- speeds measured in gigahertz (GHz), or bil-
like data stored in RAM, which is volatile lions of machine cycles per second. There-
storage, the instructions stored in ROM are fore, a 3.8 GHz processor performs work at a
permanent, making ROM a nonvolatile stor- rate of 3.8 billion machine cycles per second.
age location, which means the data is not It’s important to realize, however, that CPU
erased when the power is turned off. clock speed alone doesn’t determine the per-
formance of the CPU.
What else determines processor
performance? Although speed is an
Processing important consideration when determining
Figure 2.30 What is the CPU? The central process- processor performance, CPU performance
Two are faster than one! ing unit (CPU, or processor) is sometimes also is affected by other factors. One factor is
With their dual core referred to as the “brains” of the computer the number of cores, or processing paths, a
processors, Intel CPUs because it controls all the functions per- processor has. Until just a few years ago,
can work in parallel, formed by the computer’s other components processors only could handle one instruc-
processing two separate and processes all the commands issued to tion at a time. Now, processors have been
programs at the same time
instead of switching back it by software instructions. Modern CPUs designed so that they can have two, four,
and forth between them. can perform as many as 45 billion tasks per and even eight different paths, allowing
them to process more than one instruction at
Single path vs. dual path processors for data a time (see Figure 2.30). Applications such as
Sin
virus protection software and the operating
gle Dua
Pat exe Pat l ex
ecu
system, which are always running behind
h2 cut h2 tion
Pat ion Pat the scenes, can have their own processors,
h1 cor h1 cor
e es
freeing up the other processor to run other
applications such as a Web browser, Word,
or iTunes more efficiently.
Besides the number of cores, are
there other factors that determine
processing power? In addition to the
number of cores in a processor, you should
Single core processor Dual core processor consider other factors such as cache memory

68 Chapter 2 Looking at Computers: Understanding the Parts


and front side
bus (FSB).
(FSB deter- CD/DVD drive
mines how
fast data is
exchanged be- Empty drive bay
tween the
CPU and
RAM.) These
factors will be Hard drive
discussed in
greater detail
in Chapter 6.
The “best”
processor will
depend on
your particu-
lar needs and
is not always the processor with the highest
GHz and the greatest number of cores. Intel, • External drive bays can be seen and
one of the leading manufacturers of com- accessed from outside the system unit. Figure 2.31
puter processor chips, has created a pictorial External drive bays house CD and DVD Storage devices in
rating system for CPU chips. Intel uses one drives, for example. On desktop desktop and notebook
computers.
to five stars to illustrate the relative comput- computers, sometimes there are empty
ing power of each type of CPU within the external drive bays that can be used to
Intel line of processors. It also provides an install additional drives. These extra
overall ranking of “smart,” “smarter,” and spaces are covered by a faceplate on the
“genius” and an overview of each proces- front panel. Notebook computers gener-
sor’s key benefits. ally do not give you the ability to add
additional drives. Such expansion is
done by attaching an external drive to
the computer through a USB port.
Storing Data and You may occasionally see a PC that still
Information has a bay for a floppy disk drive, which reads
Earlier we characterized RAM as temporary and writes to easily transportable floppy
or volatile memory because the entire con- disks that hold a limited amount of data
tents of RAM are erased when you turn off (1.44 MB). Some computers also feature
the computer. Thus, if you permanently want what’s called a Zip disk drive, which resem-
to save the files you’re working on, as well as bles a floppy disk drive but has a slightly
your music, digital images, and any software wider opening. Zip disks work just like
applications you use, you need to store them standard floppy disks but can carry much
in a different location than RAM. To save data more data (up to 750 MB). These storage
permanently, you need to save it to the hard devices are legacy technologies and are not
drive or to another permanent storage device found on new computers.
such as a CD, DVD, or flash drive. Each of
these permanent storage devices is located in
your desktop or notebook computer in a Hard Drives
space called a drive bay (see Figure 2.31).
Which storage device holds the most
There are two kinds of drive bays—internal
data? The hard drive (see Figure 2.32a) is
and external—as described below:
your computer’s primary device for perma-
• Internal drive bays cannot be seen or nent storage of software and documents.
accessed from outside the system unit. The hard drive is a nonvolatile storage
Generally, internal drive bays are device, meaning it holds the data and
reserved for internal hard drives. An instructions your computer needs perma-
internal hard drive usually holds all nently, even after the computer is turned off.
permanently stored programs and data. Today’s internal hard drives, with capacities

Storing Data and Information 69


a b c

Photo courtesy of Iomega Corporation


Figure 2.32
(a) Internal hard drives
hold the data and of as much as 3.5 terabyte (TB), can hold an internal hard drive in case a problem
instructions that the more data than would fit in the books in a develops with the internal hard drive and
computer needs and are
inaccessible from outside
school’s library. data needs to be recovered.
the system unit. (b) High- Are all hard drives located inside
capacity external hard the system? Because the hard drive
drives are often used to stores all of the computer’s data and pro- Optical Storage
back up data on internal grams, special measures are taken to protect
hard drives. (c) Smaller What other kinds of storage devices
external hard drives
the hard drive from any possible damage.
Unlike other storage devices on the com- are available? Internal hard drives are
enable you to take a
significant amount of data puter, the hard drive is enclosed in a case used to store your data, files, and installed
and programs on the road and is not accessible from the outside of the software programs. Hard drives store their
with you. system unit. If you need a more portable data on magnetized platters. Also included
solution, external hard drives are readily on most desktop and notebook computers is
available. An external hard drive (see at least one optical drive that can read from
Figures 2.32b and 2.32c) is essentially like an and maybe even write to CDs, DVDs, or
internal hard drive. However, it has been Blu-ray discs. Data is saved to a compact
made portable by making it small and light- disc (CD), digital video (or versatile) disc
weight and enclosing it in a protective case. (DVD), or Blu-ray disc (BD) as tiny pits that
Some external hard drives, which are small are burned into the disc by a high-speed
enough to fit into your pocket, have storage laser. CDs were initially created to store
Figure 2.33 capacities of 1 or 2 TB (or larger). An exter- audio files. DVDs are the same size and
Flash drives are a nal hard drive is often used to back up shape as CDs but can hold more data. DVDs
convenient means of (make a copy of) data that is contained on that store data on just one side and in one
portable storage, and layer can store about seven times more data.
come in many different If you’re looking for more storage capacity,
shapes and sizes. a double-sided/single-layer DVD is the next
step. These discs have up to 8.5 GB of stor-
age, and a double-sided/double-layer DVD
can store nearly 16 GB of data. What if you
want even more storage capacity? Blu-ray is
the latest incarnation of optical storage to hit
the market. Blu-ray discs, which are similar
in size and shape to
CDs and DVDs, can
hold as much
as 50 GB of
data—
enough to
hold approxi-
mately 4.5
hours of
movies in the

70 Chapter 2 Looking at Computers: Understanding the Parts


high-definition (HD) digital format that has Figure 2.34 STORAGE MEDIA CAPACITIES
become so popular. Many systems are now
available with BD-ROM drives and even Medium Image Capacity
Blu-ray burners. External BD drives are an-
Mechanical hard drive As much as 3.5 TB
other inexpensive way to add HD storage
capacity to your system.

Flash Storage
A flash drive, sometimes referred to as a
jump drive, USB drive, or thumb drive, is Solid state drive (SSD) 5 TB or more
a way of storing portable data. Flash drives
plug into USB ports. These devices origi-
nally were more or less the size of a thumb,
but now they vary in size and are often com-
External portable 4 TB or more
bined with other devices such as pens or hard drive
pocketknives (see Figure 2.33). Despite their
diminutive size, flash drives have significant
storage capacity—currently as much as
256 GB. Flash drive 256 GB or more
Several manufacturers now also include
slots on the front of the system unit in which
you can insert a portable flash memory card
such as a Memory Stick or CompactFlash Blu-ray (dual layer) 50 GB
card. Many notebooks also include slots for
flash memory cards in the sides. Flash mem-
ory cards let you transfer digital data be-
tween your computer and devices such as
digital cameras, PDAs, smartphones, video Flash memory card Up to 128 GB
cameras, and printers. Although incredibly
small—some are just the size of a postage
stamp—these memory cards have capacities 8
12
that exceed the capacity of a DVD. We discuss
flash memory in more detail in Chapter 8.
Some hard drives are also based on flash Blu-ray (BD) 25 GB
memory. A solid state drive (SSD) does not
have any spinning platters or motors, so they
are more efficient, run with no noise, emit
very little heat, and require very little power.
Figure 2.34 shows the storage capacities
DVD DL (dual layer) 88.5 GB
of the various portable storage media used
in your computer’s drive bays.

Connecting DVD 4.7 GB


Peripherals to
the Computer
Throughout this chapter, we have discussed
peripheral devices that input, store, and
CD 700 MB
output data and information. A port is a
place through which a peripheral device
attaches to the computer so that data can be
exchanged between it and the operating
system. Many ports are located on the back

Connecting Peripherals to the Computer 71


a b

Memory card slots USB ports

Figure 2.35
Many of the same ports
appear on both (a) note-
book and (b) desktop Audio/video ports Ethernet port S-video
computers. of a notebook com-
puter and the system unit
of a desktop computer. How- FireWire ports
ever, some commonly used ports are
placed on the front and sides of many
desktop and notebook computers (see SOUND Port Tour: How Do I
Figure 2.35) for easier access when connect- BYTE Hook It Up?
ing devices such as flash drives or digital
and video cameras. In this Sound Byte, you’ll take a tour of both a desktop
system and a notebook system to compare the num-
High-Speed and Data Transfer Ports ber and variety of available ports. You’ll also learn
about the different types of ports and compare their
What is the most common way to speed and expandability.
connect devices to a computer? A
universal serial bus (USB) port is now the
most common port type used to connect
speed of USB 2.0. USB 3.0 should quickly
input and output devices to the computer.
become the port of choice.
This is mainly because of a USB port’s
A traditional serial port sends data one
ability to transfer data quickly. USB 2.0 ports
bit (piece of data) at a time. Serial ports
(see Figure 2.36) are the current standard
were often used to connect modems (devices
and transfer data at 480 megabits per
used to transmit data over telecommunica-
second (Mbps), approximately 40 times
tions lines) to the computer. Sending data
faster than the original USB ports. USB ports
one bit at a time was a slow way to commu-
can connect a wide variety of peripherals to
nicate. A parallel port could send data
the computer, including keyboards, printers,
between devices in groups of bits at speeds
mice, smartphones, external hard drives,
of 500 Kbps and was much faster than
flash drives, and digital cameras. The
traditional serial ports. Parallel ports were
new USB 3.0 standard provides transfer
often used to connect printers to computers.
speeds of 4.8 Gbps, which is 10 times the
The speed advantage offered by USB ports
has made serial and parallel ports legacy
ACTIVE technology.
HELP-
Exploring Storage What are other types of ports?
DESK Devices and Ports You may also see other ports, such as
FireWire 400 and FireWire 800. The
In this Active Helpdesk call, you’ll play the role of a FireWire 400 interface moves data at
helpdesk staffer, fielding calls about the computer’s 400 Mbps, while the FireWire 800 doubles
main storage devices and how to connect various the rate to 800 Mbps. Devices such as
peripheral devices to the computer. external hard drives, digital video cameras,
portable music players, and digital media

72 Chapter 2 Looking at Computers: Understanding the Parts


To transfer data between the two
devices, a special cable that has an
appropriate connector at each end
is needed. The faster FireWire 800
requires a nine-pin connection
and is found on storage devices
such as external and portable
hard drives.

Connectivity and Multimedia


Ports
Which ports help me connect
with other computers and
the Internet? Another
Figure 2.36
set of ports on your computer helps you -
A USB port and a USB connector. communicate with other computers. A
connectivity port can give you access to
networks and the Internet or enable your
players all benefit from the speedy data computer to function as a fax machine. To
transfer capabilities of FireWire. The find a connectivity port, look for a port that
FireWire 3200 standard, with data transfer resembles a standard phone jack but
rates of 3.2 Gbps, has been ratified but has is slightly larger. This port is called an
yet to reach the market. FireWire 400 ports Ethernet port (see Figure 2.38).
and connectors have two different Ethernet ports transfer data at speeds up
configurations, as shown in Figure 2.37. to 1,000 Mbps. You can use an Ethernet
FireWire 400 ports on computers generally port to connect your computer to a
have six pins, while FireWire ports on digital subscriber line (DSL) or cable
digital cameras have four pins. modem, or a network. Many computers
still feature a second connectivity port that
will accept a standard phone line connector.
This jack is the modem port. It uses a
traditional telephone signal to connect to
6-pin 4-pin
the Internet over a phone line.
Figure 2.38
How do I connect monitors and
multimedia devices? Other ports on An Ethernet port and an
Ethernet connector.
the back of the
computer include
the audio and
video ports (see
Figure 2.39). Video
ports are necessary
to hook up monitors.
Whether you are
attaching a monitor
to a desktop com-
puter, or adding a
second, larger display
to a notebook com-
puter, you will use
video ports. The
video graphics array
Figure 2.37 (VGA) port is the
FireWire ports come in different configurations, some port to which CRT
of which are illustrated here. monitors connect.

Connecting Peripherals to the Computer 73


a b

S-video port for


connecting your DVI port for VGA port for CRTs
Speakers Microphone Headphones
PC to your TV digital LCDs and analog LCDs

Figure 2.39
DVI, VGA, and S-video Many older LCD monitors also connect devices such as DVD players, TVs, and
ports connect your with a VGA port. The newer LCD monitors, game consoles have at least one HDMI port
monitors and multimedia
devices to the computer. as well as other multimedia devices such (see Figure 2.40).
as televisions, DVD players, and projectors,
connect to digital video interface (DVI)
and S-video (super video) ports. Audio Adding Ports: Expansion
ports are where you connect headphones, Cards and Hubs
microphones, and speakers to the
What if I don’t have all the ports I
computer.
need? Because almost everything con-
How can I connect my computer to
nects to your computer using USB ports,
TVs and gaming con-
your desktop computer
soles? The latest digi-
should have at least six
tal connector designed
USB ports, and a note-
for use in high-definition
book computer should
home theater environ-
have at least three USB
ments is high-definition
ports. Therefore, if you
multimedia interface
are looking to add the
(HDMI), a compact
newest ports to an older
audio–video interface
computer or to expand
that carries both high-
Figure 2.40
the number of ports on
definition video and un-
your computer, you can
compressed digital audio HDMI is the latest digital connector type for
HD home theater equipment.
use special expansion
on one cable. (DVI can
cards. For example,
only carry video signals.)
your computer may
Because HDMI can transmit uncompressed
have only USB 2.0 ports, but you would like
audio and video, there is no need to convert
Figure 2.41 to upgrade to the new USB 3.0 ports. You
the signal, which could ultimately reduce
This expansion card can install expansion cards in your system
the quality of the sound or picture. Most
provides your computer unit to provide additional ports (such
with additional ports. as USB 3.0 and FireWire). Like other
expansion cards, these
cards clip into an open
USB expansion slot on
the motherboard.
Figure 2.41
shows an exam-
ple of such an
expansion card.
What if there are no
open slots on the mother-
board where I can insert an
FireWire expansion card? If there are no
open slots on the motherboard and you

74 Chapter 2 Looking at Computers: Understanding the Parts


properly helps to save energy, keeps your
computer more secure, and ensures that
your data is saved. You can turn your com-
puter off by pressing the computer’s power
button or using the Shut Down button on
the Start menu.
Should I turn off my computer
every time I’m done using it? Some
people say you should leave your
computer on at all times. They argue that
turning your computer on and off
throughout the day subjects its components
to stress because the heating and cooling
process forces the components to expand
and contract repeatedly. Other people
say you should shut down your
Figure 2.42
computer when you’re not using it. They
claim that it’s not as environmentally
If you don’t have enough USB ports to support your
USB devices, consider getting an expansion hub,
friendly, and you’ll end up wasting money
which can add four or more USB ports to your on electricity to keep the computer running
system. all the time. Modern operating systems
include power-management settings
that allow the most power-hungry
still need extra ports, you can add an components of the system (the hard drive
expansion hub (shown in Figure 2.42). An and monitor) to shut down after a short
expansion hub is a device that connects to idle period. With the power-management
one port, such as a USB port, to provide options of Windows 7, for example, you
additional new ports. It works like the mul- really need to shut down your computer
tiplug extension cords used with electrical completely only when you need to repair
appliances. or install hardware in the system unit or
You also can add ports to an empty drive move the system unit to another location.
bay, giving you easy-to-reach new ports. The However, if you use your computer only
Koutech 10-in-1, shown in Figure 2.43, fits for a little while each day, it would be
into a regular drive bay and adds front- best to power it off completely after each
panel access to two USB 2.0 ports, two daily use.
FireWire ports, three audio jacks, and a six-
in-one digital media card reader.

Power Controls
What’s the best way to turn my com-
puter on and off? The power supply,
which is housed inside the system unit,
transforms the wall voltage to the voltages
required by computer chips. A desktop
system typically has a power-on button on
the front panel of the system unit, though
you may also find power-on buttons on
some keyboards. On notebooks, the power-
on button is generally located near the top of
the keyboard. Powering on your computer
from a completely turned off state, such as
when you start your computer in the morn- Figure 2.43
ing, is called a cold boot. You can use an empty drive bay to add additional ports
How do I power down a computer and even a flash card reader to the front panel of the
properly? Powering off your computer system unit.

Power Controls 75
the same programs running and
documents displayed as when you put it to
sleep.
In Windows 7, you can change what
happens when you press the power button
on the Start menu. By accessing the Power
Options screen (see Figure 2.44), you can
decide if you want your computer to
Sleep or Hibernate when you click the
power button.
What’s the restart option in Win-
dows for? If you’re using Windows 7,
you have the option to restart the computer
when you click the right arrow button next
to the Shut Down button on the Start menu
(see Figure 2.45). Restarting the system
while it’s powered on is called a warm boot.
You might need to perform a warm boot if
the operating system or other software
Figure 2.44
The Sleep and Hibernate settings are good for the
environment and for your wallet.
>To open the Power Options dialog box, click the Start
button, click Control Panel, and then click Power
Options.

Can I “rest” my computer without


turning it off completely? As men-
tioned earlier, your computer has power-
management settings that help it conserve
energy. In Windows 7, the two main
methods of power management are Sleep
and Hibernate. When your computer enters
Sleep mode, all of the documents, applica-
tions, and data you were using remain in
RAM (memory), where they are quickly
accessible when you restart your computer.
(In Windows XP, this mode is called
Standby.)
Hibernate is another power-saving mode
that stores your data in memory and saves
it to your computer’s hard drive. In either
Sleep or Hibernate mode, the computer
enters a state of greatly reduced power
consumption, which saves energy. The Right arrow
big advantage to using Hibernate is that button
if there is a power failure while your
computer is conserving power, your
information is protected from loss, because Figure 2.45
it is saved on the hard drive. To put your The Start menu in Windows 7 presents several power
computer into Sleep or Hibernate, open options. For a warm boot, choose Restart. To power
down the computer completely, choose Shut Down. To
the Start menu and select the appropriate put your computer into a lower power mode, select
Sleep or Hibernate option. To wake up Sleep or Hibernate.
your computer, tap a key on the keyboard >To select a particular power option, click the Start
or move the mouse. In a few seconds, menu button in the taskbar and then click the right
the computer will resume with exactly arrow button.

76 Chapter 2 Looking at Computers: Understanding the Parts


safely.” In terms of computing, ergonomics
SOUND Healthy Computing refers to how you set up your computer and
BYTE other equipment to minimize your risk of
injury or discomfort.
In this Sound Byte, you’ll see how to set up your work- Why is ergonomics important?
space in an ergonomically correct way. You’ll learn the You don’t have to have a desk job to run
proper location of the monitor, keyboard, and mouse, the risk of becoming injured by working
as well as ergonomic features to look for when choos- improperly on a computer. Studies suggest
ing the most appropriate chair. that teenagers, on average, spend 31 hours
online each week. When you factor in other
computer uses such as typing school
reports and playing video games, there is
application stops responding or if you have great potential for injury. The repetitive
installed new programs. It takes less time to nature of long-term computer activities
perform a warm boot than to power down can place too much stress on joints and
completely and then restart all of your pull at the tendons and muscles, causing
hardware. repetitive stress injuries such as carpal
tunnel syndrome and tendonitis. These
injuries can take months or years to
Setting It All Up develop to a point where they becomes
It’s important that you understand not only painful, and by the time you notice the
your computer’s components and how they symptoms, the damage has already taken
work together but also how to set up these place. If you take precautionary care now,
components safely. Merriam-Webster’s Dictio- you may prevent years of unnecessary pain
nary defines ergonomics as “an applied later on.
science concerned with designing and How can I avoid injuries when
arranging things people use so that the peo- I’m working at my computer? As
ple and things interact most efficiently and Figure 2.46 illustrates, it is important to

Top of monitor
at or below
eye level

Adjustable
monitor

Adjustable-height
Lumbar keyboard tray and
support wrist rest

Fully Footrest
adjustable if needed
chair

Figure 2.46
Using proper equipment that is adjusted correctly helps prevent repetitive strain injuries while working at a computer.

Setting It All Up 77
• Assume a proper position while
typing. A repetitive strain injury (RSI)
is a painful condition caused by
repetitive or awkward movements of
a part of the body. Improperly posi-
tioned keyboards are one of the
leading causes of RSIs in computer
users. Your wrists should be flat (not
bent) with respect to the keyboard,
and your forearms should be parallel
Figure 2.47 to the floor. Additionally, your wrists
should not be resting on the keyboard
Ergonomic keyboards that curve and contain built-in
wrist rests help maintain proper hand position and while typing. You can either adjust
minimize wrist strain. the height of your chair or install a
height-adjustable keyboard tray to
ensure a proper position. Specially
arrange your monitor, chair, body, and designed ergonomic keyboards such
keyboard in ways that will help you avoid as the one shown in Figure 2.47 can
injury, discomfort, and eyestrain as you help you achieve the proper wrist
work on your computer. The following position.
additional guidelines can help keep you • Take breaks from computer tasks.
comfortable and productive: Remaining in the same position for long
periods of time increases stress on your
• Position your monitor correctly. Studies body. Shift your position in your chair
suggest it’s best to place your monitor at and stretch your hands and fingers
least 25 inches from your eyes. You may periodically. Likewise, staring at the
need to decrease the screen resolution to screen for long periods of time can lead
make text and images more readable at to eyestrain, so rest your eyes by
that distance. Experts recommend that periodically taking them off the screen
the monitor be positioned either at eye and focusing them on an object at least
level or so that it is at an angle 15 to 20 feet away.
20 degrees below your line of sight. • Ensure the lighting is adequate.
• Purchase an adjustable chair. Adjust Ensuring that you have proper lighting
the height of your chair so that your in your work area is a good way to min-
feet touch the floor. (You may need to imize eyestrain. To do so, eliminate
use a footrest to get the right position.) any sources of direct glare (light shining
The back support needs to be directly into your eyes) or reflected glare
adjustable so that you can position it (light shining off the computer screen)
to support your lumbar (lower back) and ensure there is enough light to read
region. You should also be able to comfortably. If you still can’t eliminate
move the seat or adjust the back so glare from your computer screen, you
that you can sit without exerting pres- can purchase an antiglare screen to
sure on your knees. If your chair place over your monitor. Look for ones
doesn’t adjust, placing a pillow behind that are polarized or have a purplish
your back can provide the same optical coating. These will provide the
support. greatest relief.

78 Chapter 2 Looking at Computers: Understanding the Parts


Is ergonomics important when strain. The table in Figure 2.48 provides
using mobile devices? Working guidelines on preventing injuries when
with mobile computing devices presents computing on the go.
interesting challenges when it comes to So whether you’re computing at your
injury prevention. For example, many users desk or on the road, consider the ergonom-
work with notebooks resting on their laps, ics of your work environment. Doing so will
placing the monitor outside of the optimal help you avoid injury and discomfort.
line of sight and thereby increasing neck

Figure 2.48 PREVENTING INJURIES WHILE ON THE GO

PDA/Smartphone PMP Hearing Small-Screen Back, Neck, and


Lap Injuries
RSIs Damage Vision Issues Shoulder Injuries

Malady Repetitive strain injuries Hearing loss from high Blurriness and dryness Burns on legs from Pain caused from
,
(such as DeQuervain s decibel sound levels in caused by squinting to heat generated carrying notebook
tendonitis) from earbuds or headphones. view tiny screens on by notebook. (messenger) bag hung
constant typing of mobile devices. over your shoulder.
instant messages.

Preventative Restrict length and Turn down volume (you Blink frequently or use Place a book, magazine, Use a conventional
measures frequency of messages, should be able to hear eye drops to maintain or notebook cooling pad backpack with two
take breaks often, and external noises such as moisture level in eyes, between your legs and shoulder straps, lighten
perform other motions people talking), use after 10 minutes take a your notebook. the load by only carrying
with your thumbs and software programs that break and focus your essential equipment,
fingers during breaks limit sound levels (not eyes on something and consider buying a
to relieve tension. over 60 decibels), and at least 8 feet away for lightweight notebook.
use external, over-ear 5 minutes, use an
style headphones adequate amount of
instead of earbuds. light, increase the size
of fonts.

Setting It All Up 79
TRENDS
IN IT Emerging Technologies—Displays That You Can Take with You

Today, LCD monitors dominate the desktop PC and notebook markets.


Lighter and less bulky than previous monitors, they can be easily moved
and take up less space on a desk. LCD technology has improved signifi-
cantly over the past several years, and now monitors are sporting in-
creased viewing angles, higher resolutions, and faster pixel response
time, which makes full-motion video (critical for gamers) appear ex-
tremely smooth.
LCD technology has also infiltrated the television market and, along
with plasma technology, has made the boxy TV as obsolete as the CRT
monitor. However, as good as LCD technology is, some technology that is
beginning to hit the market is even better.

OLED Displays
Organic light-emitting diode (OLED) displays use organic compounds
that produce light when exposed to an electric current. Unlike LCDs,
OLEDs do not require a backlight to function and therefore draw less
power and have a much thinner display, sometimes as thin as 3 mm.
They are also brighter, cheaper to manufacture, and more environmen-
tally friendly than plasma displays or LCDs. Because of their lower power
needs, OLED displays run longer on a single battery charge than do
LEDs, which is why OLED technology is currently being used in small
screens of mobile devices such as cell phones, portable media players,
and digital cameras.
More recently, OLED technology has been incorporated in some high- Figure 2.49
end televisions. The benefits of OLED technology may make LCD flat- Because they do not need a backlight, OLED displays are
panel displays quickly obsolete (see Figure 2.49). The pixels in OLED much thinner than LEDs, making LCD screens seem bulky!
screens illuminate quickly, like lightbulbs, and produce brighter images
than does LCD technology. Because of the quick on/off illumination ca- Flexible Screens
pacity of OLED pixels, the faster refresh rate enables these screens to An offshoot of OLED technology is the flexible OLED (FOLED). Unlike
display full-motion videos with lifelike motion. Sony and Toshiba have al- LCDs, which use rigid surfaces such as glass, FOLED screens use light-
ready produced OLED televisions. Eventually, you might not even need a weight, inexpensive, flexible material such as transparent plastics or
separate display device; it could very well be built into the walls of your metal foils. As shown in Figure 2.50, these flexible screens can play a
house! full-motion video while being completely bent.

80 Chapter 2 Looking at Computers: Understanding the Parts


Figure 2.50 Figure 2.51
This 2.5-inch screen is playing a full-motion video while being bent Personal media viewers allow you to have a big-screen expe-
into a semicircle. rience with your mobile devices. The display is projected in
front of your eyes, giving you an “in the action” experience.

FOLEDs would allow advertising to progress to a new dimension. in. Wearable displays might eventually replace heavier screens on note-
Screens could be hung where posters hang now (such as on billboards). books, desktops, and even PDAs.
Wireless transmission of data to these screens would allow advertisers to
display easily updatable full-motion images. Combining transparency and “Bistable” Screens
flexibility, these displays can be mounted on windshields and eyeglasses. Your computer screen constantly changes its images when you are surfing
the Internet or playing a game. Because PDA and cell phone screens don’t
Wearable Screens necessarily change that often, something called a “bistable” display, which
Who needs a computer screen when you can just wear one? With the rise is currently used in retail stores for pricing signs and in Amazon’s Kindle
of the iPod and other portable devices that play digital video, users are de- (a wireless reading device), may one day be used in these devices. A
manding larger viewing areas. Although a larger screen is often incompat- bistable display has the ability to retain its image even when the power is
ible with the main design features of portable devices (light weight and turned off. In addition, bistable displays are lighter than LCD displays and re-
long battery life), wearable virtual displays offer a solution. Personal media duce overall power consumption, resulting in longer battery life— perhaps
viewer displays such as the myvu, shown in Figure 2.51, are available now as much as 600 times longer, according to Motorola. Because the market
(myvu.com). Eventually, when the technology advances sufficiently, you for portable devices such as smartphones continues to explode, you can ex-
might be able to purchase conventional eyeglasses with displays built right pect to see bistable technologies emerging in mobile computer screens.

Setting It All Up 81
two
two summary
chapter

1. What exactly is a computer, and what Keyboards and mice come in both wired
are its four main functions? and wireless versions, as well as other
Computers are devices that process data. special layouts and designs to fit almost
every need.
summary

They help organize, sort, and categorize


data to turn it into information. The Touch screens are display screens that
computer’s four major functions are to respond to commands initiated by a touch
(1) gather data (or allow users to input data), with a finger or a stylus. Images are input
(2) process (manipulate, calculate, or organ- into the computer with scanners, digital
ize) that data, (3) output data or information cameras, camcorders, and cell phones. Live
(display information in a form suitable for video is captured with webcams and digital
the user), and (4) store data and information video recorders. Microphones capture
for later use. sounds. There are many different types of
microphones, including desktop, headset,
2. What is the difference between data and clip-on models.
and information?
5. What devices do I use to get
Data is a representation of a fact or idea. The
information out of the computer?
number 3 and the words televisions and Sony
are pieces of data. Information is data that Output devices enable you to send
has been organized or presented in a processed data out of your computer. It can
meaningful fashion. An inventory list that take the form of text, pictures, sounds, or
indicates that “three Sony televisions” are in video. Monitors display soft copies of text,
stock is processed information. It allows a graphics, and video, while printers create
retail clerk to answer a customer query hard copies of text and graphics. LCDs are
about the availability of merchandise. the most popular type of monitor.
Information is more powerful than raw There are two primary categories of print-
data. ers used today: inkjet and laser. Specialty
printers are also available. These include all-
in-one printers, plotters, and thermal print-
3. What are bits and bytes, and how are
ers. When choosing a printer, you should be
they measured? aware of factors such as speed, resolution,
To process data into information, computers color output, and cost.
need to work in a language they under- Speakers are the output devices for
stand. This language, called binary language, sound. Most computers include speakers,
consists of two numbers: 0 and 1. Each 0 and with more sophisticated systems including
each 1 is a binary digit, or bit. Eight bits cre- subwoofers and surround sound.
ate one byte. In computers, each letter of the
alphabet, each number, and each special 6. What’s on the motherboard?
character consists of a unique combination
The motherboard, the main circuit board of
of eight bits (one byte)—a string of eight 0s
the system, contains a computer’s central
and 1s. For describing large amounts of
processing unit (CPU), which coordinates
storage capacity, the terms megabyte (approx-
the functions of all other devices on the
imately 1 million bytes), gigabyte (approxi-
computer. The performance of a CPU is
mately 1 billion bytes), and terabyte
affected by the speed of the processor
(approximately 1 trillion bytes) are used.
(measured in gigahertz), the amount of
cache memory, the speed of the front side
4. What devices do I use to get data into bus (FSB), and the number of processing
the computer? cores. RAM, the computer’s volatile mem-
An input device enables you to enter data ory, is also located on the motherboard.
(text, images, and sounds) and instructions RAM is where all the data and instructions
(user responses and commands) into a com- are held while the computer is running.
puter. You use keyboards to enter typed data ROM, a permanent type of memory, is
and commands, whereas you use the mouse responsible for housing instructions to help
to enter user responses and commands. start up a computer. The motherboard also

82 Chapter 2 Looking at Computers: Understanding the Parts


summary
two two

chapter
houses a set of slots for expansion cards, The most common type of port used to
which have specific functions that augment connect devices to a computer is the USB
the computer’s basic functions. Typical port. USB technology has replaced serial

summary
expansion cards found in the system unit ports and parallel ports, which are now
are the sound and video cards. considered legacy technology. USB 2.0 is
the current standard but will be quickly
7. Where are information and programs replaced by the newer, faster, USB 3.0
stored? standard. FireWire ports provide additional
To save programs and information perma- options for data transfer.
nently, you need to save them to the hard Connectivity ports give you access to
drive or to another permanent storage de- networks and the Internet and enable your
vice such as a CD, DVD, or flash drive. The computer to function as a fax machine.
hard drive is your computer’s primary Connectivity ports include Ethernet ports
device for permanent storage of software and modem ports. Multimedia ports include
and files. The hard drive is a nonvolatile VGA, DVI, and S-video ports. They connect
storage device, meaning it holds the data the computer to monitors and other multi-
and instructions your computer needs per- media devices. Audio ports are where you
manently, even after the computer is turned connect headphones, microphones, and
off. Mechanical hard drives have spinning speakers to the computer. HDMI ports are
platters on which data is saved, whereas used as a connection between monitors, TVs
newer solid state hard drives (SSD) use solid and gaming consoles and work with both
state memory, similar to that used with flash audio and video content.
drives. External hard drives are essentially
internal hard drives that have been made 9. How do I set up my computer to avoid
portable by enclosing them in a protective strain and injury?
case and making them small and light- Ergonomics refers to how you arrange your
weight. Optical drives that can read from computer and equipment to minimize your
and maybe even write to CD, DVD, or Blu- risk of injury or discomfort. This includes
ray discs are another means of permanent, positioning your monitor correctly, buying
portable storage. Data is saved to compact an adjustable chair that ensures you have
discs (CDs), digital video discs (DVDs), and good posture while using the computer,
Blu-ray discs (BDs) as tiny pits that are assuming a proper position while typing,
burned into the disc by a high-speed laser. making sure the lighting is adequate, and
Flash drives are another portable means of not looking at the screen for long periods of
storing data. Flash drives plug into USB time. Other good practices include taking
ports. Flash memory cards let you transfer frequent breaks and using other specially
digital data between your computer and designed equipment such as ergonomic
devices such as digital cameras, smart- keyboards. Ergonomics is also important to
phones, video cameras, and printers. consider when using mobile devices.

8. How are devices connected to the


computer?
There are a wide variety of ports that allow
you to hook up peripheral devices (such as
your monitor and keyboard) to your system.

83
two
two key terms
chapter

all-in-one computer ............................................ 50 microphone (mic) ................................................ 59


all-in-one printer ................................................. 63 modem card .......................................................... 67
application software ........................................... 50 modem port .......................................................... 73
aspect ratio............................................................ 61 monitor (display screen) .................................... 60
key terms

binary digit (bit) .................................................. 49 motherboard......................................................... 67


binary language................................................... 49 mouse .................................................................... 51
Blu-ray disc (BD) ................................................. 70 netbook ................................................................. 50
Bluetooth .............................................................. 51 network interface card (NIC) ............................ 67
brightness ............................................................. 61 nonimpact printer ............................................... 62
byte ........................................................................ 49 nonvolatile storage ............................................. 69
compact disc (CD) ............................................... 70 notebook computer............................................. 50
central processing unit operating system (OS)........................................ 50
(CPU or processor)........................................... 68 optical drive ......................................................... 70
cold boot ............................................................... 75 optical mouse ....................................................... 54
computer ............................................................... 48 organic light-emitting diode
connectivity port ................................................. 73 (OLED) displays .............................................. 80
contrast ratio......................................................... 61 output device ....................................................... 60
cursor control key................................................ 54 peripheral device................................................. 50
data......................................................................... 48 pixel ....................................................................... 60
desktop computer ............................................... 50 plotter .................................................................... 63
digital video (or versatile) disc (DVD)............ 70 port ......................................................................... 71
digital video interface (DVI)............................. 74 power supply ....................................................... 75
drive bay ............................................................... 69 printer.................................................................... 60
embedded computer........................................... 51 processing ............................................................. 48
ergonomics ........................................................... 77 projector ................................................................ 62
Ethernet port ........................................................ 73 QWERTY keyboard ............................................ 52
expansion card (adapter card)........................... 67 random access memory (RAM) ........................ 67
external hard drive.............................................. 70 read-only memory (ROM) ................................. 68
FireWire 400.......................................................... 72 resolution.............................................................. 61
FireWire 800.......................................................... 72 response time ....................................................... 61
flash drive (jump drive, USB drive, or S-video (super video) ......................................... 74
thumb drive)..................................................... 71 Sleep mode ........................................................... 76
flash memory card .............................................. 71 solid state drive (SSD)........................................ 71
flat-panel monitor ............................................... 60 sound card ............................................................ 67
gigabyte (GB) ....................................................... 49 speaker .................................................................. 66
gigahertz (GHz) ................................................... 68 stylus...................................................................... 51
hard drive ............................................................. 69 supercomputer ..................................................... 51
hardware ............................................................... 50 surround-sound speaker.................................... 66
hibernate ............................................................... 76 system software ................................................... 50
high-definition multimedia interface system unit ........................................................... 67
(HDMI) .............................................................. 74 tablet PC................................................................ 50
impact printer ...................................................... 62 terabyte (TB)......................................................... 49
information .......................................................... 48 thermal printer..................................................... 64
inkjet printer ........................................................ 62 touch screen.......................................................... 56
input device.......................................................... 51 touch pad .............................................................. 55
internal hard drive .............................................. 69 trackball mouse ................................................... 55
keyboard ............................................................... 51 trackpoint device................................................. 55
kilobyte (KB)........................................................ 49 universal serial bus (USB) port ........................ 72
laser printer .......................................................... 63 video card ............................................................. 67
legacy technology................................................ 60 video graphics array (VGA) .............................. 73
liquid crystal display (LCD) ............................. 60 viewing angle....................................................... 61
mainframe ............................................................ 50 volatile storage..................................................... 67
megabyte (MB) .................................................... 49 warm boot............................................................. 76
megahertz (MHz) ................................................ 68 webcam ................................................................. 57

84 Chapter 2 Looking at Computers: Understanding the Parts


buzzwords
two two

chapter
Word Bank
• CPU • LCD • RAM
• DVI • microphone • ROM

buzzwords
• ergonomics • monitor • speakers
• external hard drive • mouse • SSD
• FireWire • notebook • system unit
• inkjet printer • optical mouse • USB
• laser printer • QWERTY • webcam

Instructions: Fill in the blanks using the words from the Word Bank above.

Austin had been getting a sore back and stiff arms when he sat at his desk, so he
redesigned the (1) __________of his notebook setup. He placed the notebook in a stand so
the (2) __________ was elevated to eye level and was 25 inches from his eyes. He decided to
improve his equipment in other ways. His (3) __________ was old, so he replaced it with
a(n) (4) __________ that didn’t need a mouse pad. To plug in the mouse, he used a(n)
(5) __________ port on the side of his (6) __________. He considered buying a larger
(7) __________ keyboard with a number pad because it’s not convenient to input numeric
data with his current keyboard. Because he often printed flyers for his band, Austin
decided to buy a printer that could print text-based pages quickly. Although he decided to
keep his (8) __________ to print photos, he decided to buy a new (9) __________ to print his
flyers faster. While looking at printers, Austin also noticed widescreen (10) __________
monitors that would provide a larger display than that on his notebook, so he bought one
on sale. He hooked up the monitor to the (11) __________ port on the back of the notebook.
He also bought a(n) (12) __________ that was attached to a headset and a(n) (13) __________
so he could talk to his friends over the Internet. Austin also knew he had to buy a(n)
(14) __________ to back up all his files. Finally, knowing his system could use more
memory, Austin checked out prices for additional (15) __________.

computer
becoming
literate
becoming
computer literate
Your grandparents live a day’s drive from your school and have just called asking you for
help in purchasing a new computer, but they don’t know what type of computer to get.

Instructions: Because you can’t help them in person, write a letter to your grandparents
detailing the differences between desktop, notebook, tablet PC, and netbook computers.
Include the pros and cons of each device, and explain why or why not each device may
suit your grandparents. Because your grandparents are not as familiar about these devices
as you are, you should also incorporate images for each device in the letter. You may use
the Internet for information, device pictures, and illustrations, but remember to credit
all sources.

85
two
two self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. What controls the way in which your 7. Which is TRUE about mainframe
computer system functions? computers?
a. System software a. They perform complex
b. Operating system calculations rapidly.
c. Application software b. They support hundreds of users
d. Hardware simultaneously.
2. Which is the most common type of c. They execute many programs at a
monitor? fast pace.
a. LCD monitor c. LED monitor d. They excel at running a few
programs quickly.
b. CRT monitor d. HD monitor
8. Which is NOT important to consider
3. What enables your computer to
when buying a printer?
connect with other computers?
a. Paper
a. Expansion card
b. Duty cycle
b. Adapter card
c. Cost of consumables
c. Video card
d. Resolution
d. Network interface card
9. Which is NOT a storage device?
4. Which is NOT another name for a
flash drive? a. External hard drive
a. Zip c. Jump b. DVD
b. USB d. Thumb c. Flash memory card
d. Touch screen
5. To add additional ports to your
computer, what do you need? 10. What lets you transfer digital data
a. A digital media card reader between your computer and devices
such as digital cameras?
b. An external hard drive
a. Flash memory card
c. An expansion card
b. Optical drive
d. A flash memory card
c. Connectivity port
6. Which holds the instructions the
d. HDMI port
computer needs to start up?
a. CPU c. USB
b. RAM d. ROM

True–False
_____ 1. The CPU clock speed determines the performance of the CPU.
_____ 2. The hard drive is an example of a nonvolatile storage device.
_____ 3. Ergonomics is important only with desktop computers, not mobile devices.
_____ 4. For printing photos, printing at 1,200 dpi is sufficient.
_____ 5. Some mice include wireless USB receivers that contain flash memory to store your
files.

86 Chapter 2 Looking at Computers: Understanding the Parts


making the
two two

chapter
transition to...
next semester
1. Choosing the Best Keyboard and Mouse

transition to...
Once you become more familiar with software products such as Microsoft Office, you
may want to migrate to customized keyboard and mouse designs. Although most
keyboards and mice have similar setups, there are some devices that provide special

next semester
making the
features to support different users and their specific needs. For example, some
keyboards are designed specifically for multimedia use, Internet use, or gaming use.
Some mice have buttons for certain tasks. Which ones are best for you?
a. Examine the various keyboard setups at the Microsoft Web site
(microsoft.com/hardware/mouseandkeyboard/default.mspx). Which keyboard
would best suit your needs and why? What features would be most useful to you?
b. Look at the new cool mice at laptopshop.co.uk/news/2009/05/coolest-computer-
mice. Would any of these mice or the multitouch Magic Mouse by Apple mentioned
earlier in this chapter work for you? Why or why not?
2. Watching Device Demos
YouTube is a great resource for product demonstrations. Open your browser, navigate
to the YouTube Web site (youtube.com), and search on any type of computer peripheral
discussed in this chapter to see if you can find a demonstration of a cool product.
How helpful are these demonstrations? Make a demonstration of a computing
device you have and upload it to YouTube.
3. Communicating with the Computer
You want to start using Voice over Internet Protocol (VoIP) to chat over the Internet
with your family and friends who live far away. On the Web, investigate the following:
a. List the devices you need to start using VoIP.
b. Research the prices and features of each required device and create a shopping list
of the specific devices you would purchase.
4. Turn Your Monitor into a TV
You’ve heard how easy it is to convert an LCD monitor into a TV. Your parents just
bought a new computer and are giving you their old PC monitor. You need a new TV
for your dorm room, so you decide to give it a try.
a. What does your monitor need to retrofit it into a TV? What other devices do you
need?
b. How much will it cost?
c. How much do new LCD TVs cost? Is this something you would consider doing?
Why or why not?
d. What would you do if your parents gave you their old LCD TV? Could you turn it
into a monitor? If so, what would you need to do that?
5. Green Computing
Reducing energy consumption and promoting the recycling of computer components
are key aspects of many businesses’ “green” (environmentally friendly) initiatives.
Using the Web, research the following:
a. What are the key attributes of the Energy Star and EPEAT Gold green PC certifica-
tions? Does your PC have these certifications?
b. What toxic components are contained in computers and monitors? Where can you
recycle computers and monitors in your area?
c. Check out goodcleantech.com and find out which companies are currently working
toward better green technology. If your school had to replace computers in a lab,
which environmentally friendly company would you recommend? Why?

87
two
two making the
chapter

transition to...
the workplace the workplace
1. Backing up your Work
making the

You have embarked on a position as a freelance editor. You will be using your own com-
transition to...

puter. Until now you have not worried too much about backing up your data. Now, how-
ever, it’s extremely important that you back up all your work frequently.
Research the various backup options that are available including online backup, external
hard drives, and portable flash storage. What are the size limitations of each? What are the ini-
tial and ongoing costs of each? How frequently do the various options allow you to perform
backups? Which would be the option you would choose, and why?
2. What Hardware Will You Use?
When you arrive at a new position for a company, your employer will most likely provide
you with a computer. Based on the career you are in now or are planning to pursue, answer
the following questions:
a. What kind of computer system would the company mostly likely provide to you—desk-
top, notebook, tablet PC, or something else? How does that compare with the type of
system you would prefer to work with?
b. If you were required to use a type of computer you had never used before (such as a
Mac instead of a PC), how would you go about learning to use the new computer?
c. What other devices might your employer provide? Consider such items as smartphones
or printers. How important is it in for these devices to conform to the latest trends?
d. Should you be able to use employer-provided equipment, such as a smartphone, for per-
sonal benefit? Does your answer differ if you have to pay for part or all of the device?
3. Exploring Monitors
You have been asked to help edit video for a friend. You have a great notebook computer,
which is powerful enough to handle this type of task, but you need to buy a separate LCD
monitor to hook up to your computer and are not exactly sure what to buy. You know it
should be larger than 15", capable of displaying HD, and can’t cost more than $200.
a. Research five different monitors that would fit your needs. Create a table that lists each
monitor and its specifications, including display type, screen size, aspect ratio, native res-
olution, and response time. Also list the types of ports and connectors the monitor has.
b. Note whether each monitor has HDMI. Why or why not would HDMI capability be
important?
c. Research two LED monitors. Would an LED monitor be a viable option? Explain.
Explain which of the five monitors would best suit your needs and why.
4. What’s the Coolest Mouse?
The Luxeed Dynamic Pixel LED Keyboard is a very cool keyboard that was described in the
“How Cool Is This?” feature at the beginning of the chapter. There are some equally cool and
innovative mice on the market. For example, some mice have vertical orientations, are wash-
able, and can be used without touching a surface. Investigate some of these new mice and
come up with your list of the top five coolest ones. Which one would be your choice to be
“The Coolest Mouse”?
5. Choosing the Best Laser Printer
You are looking to replace your inkjet printer with a laser printer. You haven’t decided
whether a color laser printer is necessary.
a. What are the cost considerations between getting a laser printer and a color laser printer
(i.e., initial costs, costs of cartridges, and so on)?
b. Investigate wireless and Bluetooth options. What are the considerations involved with
regard to these features?
c. Investigate all-in-one laser printers that have printer, scanner, and fax capabilities. How
much more expensive are they than laser printers? Are there any drawbacks to these
multipurpose machines? Do they perform each function as well as their stand-alone
counterparts do? Can you print in color on these machines?
Based on your research, which printer would be your choice, and why?

88 Chapter 2 Looking at Computers: Understanding the Parts


critical thinking
two two

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions,

questions
critical thinking
to develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Computer of the Future


Think about how mobile our computing devices have become and the convergence of
different devices such as cameras, phones, computers, etc. What do you think the com-
puter of the future will be like? What capabilities will it have that computers currently
don’t have? Do you see desktop computers becoming obsolete in the near future?

2. Table Monitors and Surface Monitors


Table monitors and surface monitors are tabletop devices that are designed to “grab”
and manipulate objects on the display. Like an iPod touch or iPhone, the display is
multitouch and can accept simultaneous input from multiple users, so the table moni-
tor can be helpful with games or other products that require interactivity. Microsoft
launched a product called “Surface” in 2007, and although it never really took off, you
see similar devices featured on some TV crime-fighting shows as detectives manipulate
crime evidence and photos. Why do you think this device never really captured the
interest of the public? Would this be a useful object to have in your home, classroom, or
office? Why or why not?

3. Storage on the Web


There are many options available to store your files in the “cloud” (i.e., on the Web).
What do you think are the advantages of this type of storage versus storing your files
on a physical device such as a hard drive or flash drive? What are the disadvantages?

4. Computers and Productivity


How have computers increased your productivity as a student? How have computers
decreased your productivity? Would your answers be any different if you were work-
ing in an office? Why or why not? Would your parents answer any differently if you
asked them how computers have increased or decreased their productivity levels?

5. “Smart” Cars
Cars are becoming more technically advanced every day. They are now able to parallel
park by themselves, avoid collisions, alert you if you are falling asleep at the wheel,
provide emergency response, and sense if you are going to back up over something
inadvertently. What other technical advances do you see cars incorporating? Do you
think that any of these current or potential advancements could result in unexpected
negative consequences? If so, what?

6. iPad
The Apple iPad has been enthusiastically accepted because of its multitouch screen,
useful applications, and small, light frame. But it is without certain features that might
make it even better. If Steven Jobs, the CEO of Apple, were to ask you for your advice
as to what to include in the next version of the iPad, what would you suggest?

89
two
two team time
chapter

Notebook Versus Desktop: Which Is Best?

Problem
team time

You have joined a small business that is beginning to evaluate its technology setup. Because
of the addition of several new sales representatives and other administrative employees,
many new computers need to be purchased. You are trying to decide which would be bet-
ter to purchase: notebook computers, tablet PCs, or desktops or a combination.

Task
Split your class into small groups, divide each group into three teams, and assign the
following tasks:
Member A explores the benefits and downfalls of desktop computers.
Member B explores the benefits and downfalls of notebook computers.
Member C explores the benefits and downfalls of tablet PCs.

Process

1. Form the teams. Think about what the technology goals are for the company and what
information and resources you need to tackle this project.
2. Research and then discuss the components of each system you are recommending. Are
any components better suited for the particular needs of the various employees (sales
representatives versus administrative staff)? Consider all the input, output, processing,
and storage devices. Are any special devices or peripherals required?
3. Consider the different types of employees in the company. Would a combination of
devices be better than a single solution? If so, what kinds of employees would get
which type of computer?
4. As a team, write a summary position paper. Support your system recommendation for
the company. Each team member should include why his or her type of computer will
be part of the solution or not.

Conclusion
Desktop, notebook, and tablet PC computers have their own merits as computing systems.
Beyond portability, there are other things to think about. Being aware of the options in the
marketplace, knowing how to analyze the trade-offs of different designs, and recognizing
the different needs each type fulfills allows you to become a better consumer as well as a
better computer user.

90 Chapter 2 Looking at Computers: Understanding the Parts


ethics
two two

chapter
project

project
ethics
Ethics Project
Ethical conduct is a stream of decisions you make all day long. In this exercise, you will re-
search and then role-play a complicated ethical situation. The role you play may or may not
match your own personal beliefs but your research and use of logic will enable you to rep-
resent whichever view is assigned. An arbitrator will watch and comment on both sides of
the arguments, and together the team will agree on an ethical solution.

Topic: Green Computing


Green computing—conducting computing needs with the least possible amount of
power—is on everyone’s minds. Although it’s hard to argue with an environmentally con-
scious agenda, the pinch to our pocketbooks and the loss of some comforts sometimes
makes green computing difficult. Businesses, including colleges, need to consider a variety
of issues and concerns before jumping into a complete green overhaul.

Research Areas to Consider

• End-of-life management: E-waste and recycling


• Energy-efficient devices
• Costs of green computing
• Government funding and incentives

Process
Divide the class into teams.

1. Research the areas cited above and devise a scenario in which your college is
considering modifying its current technology setup to a more green IT strategy.
2. Team members should write a summary that provides background information for
their character—for example, environmentalist, college IT administrator, or arbitrator—
and details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the chat room feature of MyITLab, the discussion board feature of Blackboard, or
meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

91
three
three
chapter

using the Internet:


making the most of the Web’s resources

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What is the origin of the Internet? (pp. 94–95)
2. How can I communicate through the Internet? (pp. 95–99)
3. How can I communicate and collaborate using Web 2.0 technologies? (pp. 99–105)
4. What are the various kinds of multimedia files found on the Web, and what software
do I need to use them? (pp. 106–108)
5. What is e-commerce, and what e-commerce safeguards protect me when I’m
online? (pp. 108–110)
6. What is a Web browser, and what is a URL and what are its parts? (pp. 110–111)
7. How can I use hyperlinks and other tools to get around the Web? (pp. 112–115)
8. How do I search the Internet effectively, and how can I evaluate Web sites?
(pp. 115–118)
9. How does data travel on the Internet? (pp. 118–121)
10. What are my options for connecting to the Internet? (pp. 121–126)

multimedia resources
multimedia
resources

Active Helpdesk
• Doing Business Online (p. 110)
• Getting Around the Web (p. 117)
• Using Subject Directories and Search Engines (p. 118)
• Connecting to the Internet (p. 122)

Sound Bytes
• Creating a Web-Based E-mail Account (p. 97)
• Blogging (p. 60)
• Welcome to the Web (p. 114)
• Finding Information on the Web (p. 118)
• Connecting to the Internet (p. 121)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Looking for answers on
the Web? Check out WolframAlpha.com, a new way to search for
information on the Web!
Where do you go when you need to find something online? Google? Dogpile?
Although these and other common Internet tools help you find information, they
generally lead you to where you can find an answer, but don’t always provide the
answer—or an answer that you trust. Enter WolframAlpha.com (wolframalpha.com), a
“computational knowledge engine” that computes the an-
swers to a wide range of questions that have factual answers.
For example, if you ask, “What is the monthly payment for a $20,000, five-year
loan at 5% interest?” you’ll get not only the payment but also the total interest paid
and the effective interest rate. A search for “pear” results in average nutrition facts,
taxonomy information, and the digital representation of the color “pear.” WolframAlpha
understands questions and computes answers, unlike traditional
Internet search tools that simply retrieve
Web files that might contain an answer.
The foundation of this unique tool is a
set of models from a variety of fields of
knowledge, combined with massive amounts
of data and algorithms that represent real-
world knowledge. It knows about technol-
ogy, geography, cooking, business, travel,
music, and more. The information it delivers
uses more than 5,000 different visual
representations such as table styles
and graphs.
Ask WolframAlpha.com a question today
to see how cool it really is.

93
The Internet early 1960s, there was no reliable way to
connect computers from different manufac-
It’s hard to imagine life without the turers because they used different
Internet, the largest computer network in proprietary designs and methods of commu-
the world. It’s actually a network of net- nication. What was lacking was a common
works that connects billions of computer communications method that all computers
users globally. We use it to shop, to commu- could use. The Internet was created to
nicate, to research, to find places and get respond to these two concerns: establishing
directions, and to entertain ourselves (see a secure form of military communications
Figure 3.1). It’s accessible from our comput- and creating a means by which all comput-
ers, smartphones, and portable music ers could communicate.
players (PMPs), and we can get to it while Who invented the Internet? The
at home, at work, at school—even at modern Internet evolved from an early U.S.
Starbucks or in the car. But what exactly is government–funded “internetworking”
the Internet, and how did it begin? project called the Advanced Research
Why was the Internet created? Projects Agency Network (ARPANET).
Figure 3.1 The concept of the Internet was developed ARPANET began as a four-node network
From buying sneakers on while the United States was in the midst of involving UCLA, Stanford Research Insti-
eBay to getting directions the Cold War with the Soviet Union. At that
on your cell phone to tute, the University of California at Santa
time, the U.S. armed forces were becoming Barbara, and the University of Utah in Salt
checking messages or
finding out about the latest increasingly dependent on computers to Lake City. The first real communication
amusement park features, occurred in late 1969 between the computer
the Internet makes it all at Stanford and the computer at UCLA.
possible.
Although the system crashed after the third
letter was transmitted, it was the beginning

of a revolution. Many people participated in


the creation of the ARPANET, but two men
who worked on the project, Vinton Cerf and
coordinate and plan their activities. They Robert Kahn, are generally acknowledged as
needed a computer system that would oper- the “fathers” of the Internet. They earned
ate efficiently and that was located in vari- this honor because in the 1970s they were
ous parts of the country so that it could not primarily responsible for developing the
be disrupted easily in the event of an attack. communications protocols (standards) that
At the same time, researchers hoped the are still in use on the Internet today.
Internet would address the problems in- So are the Web and the Internet
volved with getting different computers to the same thing? Because the World
communicate with each other. Although Wide Web (WWW or the Web) is what we
computers had been networked since the use the most, we sometimes think of the

94 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Internet and the Web as being interchange- 800,000,000
able. However, the Web is only one compo-
700,000,000
nent of the Internet, the means we use to
access information over the Internet (hence Internet domain survey host count
600,000,000
the www at the beginning of Web addresses).
500,000,000
Other components of the Internet include
FTP, Gopher, Telnet, and BitTorrent, which 400,000,000
will be discussed later in this chapter. What
distinguishes the Web from the rest of the 300,000,000
Internet is its use of 200,000,000

• common communication protocols that 100,000,000


enable different computers to talk to
each other and display information in

Jan-94

Jan-95

Jan-96

Jan-97

Jan-98

Jan-99

Jan-00

Jan-01

Jan-02

Jan-03

Jan-04

Jan-05

Jan-06

Jan-07

Jan-08

Jan-09

Jan-10
compatible formats, and
• special links that enable users to
navigate from one place to another on Figure 3.2
the Web. Figure 3.2. The growth of the Web is by no
The growth of the number
means complete. In January 2010, more than of Web sites on the
Did the same people who invented 732 million Web sites were online. Internet has been
the Internet invent the Web? The explosive since the
Web was invented many years after the first Web site was hosted
original Internet. In 1989, Tim Berners-Lee, a Communicating in 1990.
Source: www.isc.org/
physicist at the European Organization for Through the Internet: solutions/survey.
Nuclear Research (CERN), wanted a method
for linking his research documents so that
E-Mail and Other
other researchers could access them. In Technologies
conjunction with Robert Cailliau, Berners- Think of all the different ways you commu-
Lee developed the basic architecture of the nicate with your friends, family, professors,
Web and created the first Web browser (or and business associates over the Internet.
browser), software that enables a user to You can use instant messaging, group
display and interact with text and other communications, social networking, web
media on the Web. The original browser logs and video logs, wikis, podcasts, and
could handle only text and was usable only webcasts to communicate via the Internet.
on computers running the NeXT operating (You can even talk over the phone through
system, a commercially unsuccessful operat- the Internet, which will be discussed in
ing system (OS), which limited its usage. So Chapter 8.) Like any other means of commu-
Berners-Lee put out a call to the Internet nication, you need to know how to use these
community to assist with development of tools efficiently to get the most out of them.
browsers for other platforms.
In 1993, the National Center for Super-
computing Applications released its Mosaic
browser for use on the Macintosh and
E-Mail
Windows operating systems. Mosaic could Why did e-mail catch on so quickly?
display graphics as well as text. The once- E-mail (short for electronic mail) is a writ-
popular Netscape Navigator browser ten message that is sent and received over
evolved from Mosaic and heralded the be- the Internet. The messages can be formatted
ginning of the Web’s monumental growth. and enhanced with graphics and may also
How much has the Internet include other files as attachments. E-mail
grown? The Internet experienced explo- became the primary method of electronic
sive growth in the early to mid-1990s. By communication worldwide because it’s fast
1997, Internet access was global. and convenient. Initially, another attraction
Because of such global Internet availabil- to e-mail was that it reduced the costs of
ity and access, as well as the increasing postage and long-distance phone calls.
capabilities of hardware and software, the Currently, e-mail is predominately the main
number of Web sites—locations on the means of communication in the business
Internet—grew exponentially, as shown in community. For social exchanges, e-mail

Communicating Through the Internet: E-Mail and Other Technologies 95


often offers a more “private” conversation professionalism, increases efficiency, and
away from the very public exchanges on might even help protect a company from
social networks. Lastly, e-mail accounts are costly lawsuits.
necessary to join and then receive updates of Common guidelines include being
activity on other Web sites. Because of these concise and to the point, using spell-check,
and other reasons, a September 2009 study avoiding texting abbreviations such as u, r,
reports that approximately 89 percent of LOL, BRB, and others. Also, make sure you
adult Americans who access the Internet include a meaningful subject line. This
send and receive e-mail. helps recipients prioritize, organize, and
Is e-mail private? E-mails are not categorize e-mails, and identify contents
private. In fact, the information in e-mail is later on after the e-mail has been read.
no more private than a postcard. E-mails can One problem with e-mail is that the
be easily viewed by others, either by being meaning within the message often can be
printed out or forwarded, so you never misinterpreted. Therefore, some means of
know who eventually could read your conveying emotion (when necessary) can
e-mail. Also, most e-mail is not encrypted, be helpful. Often smilies—simple strings
so you should never use e-mail to send of characters that reflect facial expressions—
personal or sensitive information such as can help reflect the writer’s emotions.
bank account numbers or Social Security Use them sparingly to retain their
numbers. Doing so could lead to identity effectiveness. Finally, include a signature
theft. Employers have access to e-mail sent line with your basic contact or corporate
from the workplace, so use caution when information.
putting negative or controversial content in What do I need to send and
an e-mail. It could come back to haunt you. receive e-mail? All you need to send
Finally, remember that even after you’ve and receive e-mail is a computer, an Internet
deleted a message, it doesn’t really vanish. connection, and an e-mail account. Each
Many Internet service providers and compa- component, however, entails additional con-
nies archive e-mail, which can then be siderations, which will be addressed later in
accessed or subpoenaed in the event of a the chapter. Although it’s most common to
lawsuit or investigation. send and receive e-mail from your com-
How do I write a good e-mail? puter, today many e-mail messages are
E-mail between friends does not have to exchanged wirelessly among smartphones
follow any specific guidelines and can be as and other portable devices.
casual as your IM or texting exchanges. But Are there different types of e-mail
when you send e-mail for professional accounts? Many people have more than
reasons, like at your job, then you should one e-mail account. You may have a personal
be aware of proper e-mail etiquette. account, a work account, and an account you
Following good e-mail etiquette maintains use when filling out forms on the Internet. To

Figure 3.3
You can organize your
e-mail and assign
messages to topic-
specific folders.

E-mails can be
organized by status,
sender, date, or
category.

Inbox can be divided


Bold indicates unread messages; into folders.
number indicates number of
unread messages.

96 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Creating a Web- installed, Web-based e-mail accounts make
SOUND your e-mail accessible from any computer as
BYTE Based E-mail
long as you can access the Internet. No spe-
Account
cial e-mail client software is necessary. Even
In this Sound Byte, you’ll see a step-by-step demon- if you use a client-based account, having a
stration that explains how to create a free Yahoo! Web- secondary Web-based e-mail account, such
based e-mail account. You’ll also learn the options as Yahoo! or Gmail, also provides you with a
available with such accounts. more consistent e-mail address. Your other
e-mail accounts and addresses may change
when you switch ISPs or change employers,
so having a consistent e-mail address is
important.
read, send, and organize your e-mail, you Why would I need a client-based
can use an e-mail client. E-mail clients such e-mail program? One of the benefits of
as Microsoft Outlook are software programs using a client-based e-mail program such as
running on your computer that access your Microsoft Outlook is that you can download
Internet service provider (ISP), which acts your e-mail from many different e-mail
like an electronic post office. However, with accounts so that it all can be accessed in one
these e-mail clients, you are able to view location. In addition, client e-mail programs
your e-mail only from a computer on which offer several features to help you manage
the e-mail client program is installed, which and organize your e-mail and coordinate
can be less than convenient if you travel or e-mail with your calendar, tasks, and contact
want to view your e-mail when you’re away lists. As you can see in Figure 3.3, you can
from that computer. organize your e-mail by task, sender, or
Today, most high-speed providers and priority, or you can file your messages to
ISPs offer the services of a Web-based e-mail designated folders within your inbox. Some
client so that users can look at their e-mail Web-based e-mail systems such as Yahoo!
directly from the Web. Web-based e-mail feature many of the same organizational
uses the Internet as the e-mail client. Free tools, but client-based programs are gener-
e-mail accounts such as Yahoo! Mail, ally more fully featured.
Hotmail, or Gmail are Web-based e-mail
clients. Some e-mail providers—AOL, for
example—offer both client-based and
Instant Messaging
Web-based access to e-mail. What is instant messaging? Instant
What are the advantages of a Web- messaging (IM) services are programs that
based e-mail account? Unlike client- enable you to communicate in real time with
based e-mail, which is accessible only from a others who are online (see Figure 3.4).
computer on which the e-mail client is Although IM is most often used for casual

Figure 3.4
Instant messaging
services such as
Facebook Chat enable
you to have real-time
online conversations.

Communicating Through the Internet: E-Mail and Other Technologies 97


groups. Many IM services offer
chat services so you can speak with
your buddies if you have a micro-
phone and speakers. A webcam
allows you to see them as you chat.

Group Communication
What kinds of online group
communication exist? E-mail
and IM allow you to chat with one
or a few people that you know
personally. Sites such as Facebook,
which are certainly the most com-
mon form of group communication
Figure 3.5 on the Internet, further connect you to
Google Groups is a convenient means to join a group your circle of friends and family. Sometimes,
or to create your own. however, you might want to connect with
others who share your interests but who you
might not know personally. You can com-
conversations between friends, many busi- municate and interact online with people
nesses use IM as a means of quick and in- who share similar interests through chat
stant communication between co-workers. rooms, newsgroups, and Internet Relay Chat
AOL’s AIM has been one of the most pop- (IRC).
ular instant messaging services. Facebook A chat room, such as those found at
Chat, ICQ, Yahoo!, Google, and Windows icq.com/icqchat, is a form of synchronous
Live Messenger also host popular instant- communication in which online conversa-
messaging services. Most of these services tions occur in real time and are visible to
are proprietary, meaning you can chat only everyone in the chat room. Usually, chat
with those who share the same IM service. rooms are organized around a specific
But there are universal chat services such as theme or topic. Wireclub (wireclub.com) has
Trillian, Pidgin, and Digsby that allow users a variety of chat rooms to suit every interest.
of all the popular IMs to chat with each A newsgroup is similar to a discussion
other regardless of the service they use. group or forum in which people create
Meebo is a new Web-based universal chat threads (conversations). In a thread, a news-
service that lets you communicate with group member posts messages and reads
users on a variety of IM services from any and replies to messages from other members
computer anywhere. No software download of the newsgroup. Google Groups is a great
is required because it’s Web-based. source for various newsgroups. Google
How do I keep track of my IM Groups (see Figure 3.5) allows you to join a
contacts? When you use IM, you set up group or create your own. Internet Relay
a list of contacts, often called a buddy list. To Chat (IRC) is primarily a means of synchro-
communicate (or chat) with someone from nous group communication used in discus-
your buddy list, that person must be online sion forums. Trillion, Pidgin, and XChat are
at the same time as you are. When someone popular IRC clients, and ChatZilla is a Fire-
wants to chat with you, a window pops fox add-on; Mibbit is a Web-based client.
open with his or her message. If it’s not Social networking is another popular
convenient to chat at that time, you can close means of communicating with many people,
or ignore the message. Some programs such which we will discuss in the Web 2.0 section
as Yahoo! and AOL’s AIM offer stealth next.
settings so that you can appear offline to Are there rules for group commu-
certain buddies. nications? General rules of etiquette,
If you want to chat with more than one often referred to as netiquette, exist across
person, you can hold simultaneous individ- chat rooms and other online forums, includ-
ual conversations, or if you all want to chat ing obvious standards of behavior such as
together, you can create custom IM chat introducing yourself when you enter the

98 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
room and specifically addressing the person and communicative nature of Web 2.0 appli-
to whom you are talking. Chat room users cations. Other Web-based productivity
also are expected to refrain from swearing, applications will be discussed in Chapter 4.
name-calling, and using explicit or preju-
diced language, and they are not allowed to
harass other participants. In addition, chat Social Networking
room users cannot post the same text repeat-
edly with the intent to disrupt the chat, a be- What is social networking? Social
havior called flooding. Similarly, users networking is a means by which people use
shouldn’t type in all capital letters, because the Internet to communicate and share infor-
this is interpreted as shouting. mation among their immediate friends, and
meet and connect with others through com-
mon interests, experiences, and friends (see
Web 2.0 Figure 3.7). Social networking services such
as Facebook (facebook.com) and MySpace
Technologies: (myspace.com) have become amazingly pop-
Collaborating and ular because they provide ways for members
Communicating to communicate with their friends in a vari-
ety of means such as by voice, chat, instant
Through the Internet message, and videoconference so that mem-
Over time, our use of the Internet has bers don’t need separate communication
evolved from passively using Web content accounts. These services were first accepted
created for us to actively creating, sharing, broadly among the younger, nonprofessional
and collaborating on our own Web content. population, but now many adults create
Web 2.0 describes an evolved type of Web their own social networking profiles on
interactions between people, software, and Facebook and MySpace. In fact, the largest
data. It can be classified as the social Web, increase of Facebook users in 2009 was
in which the user is also a participant. adults aged 55 and over, with a growth rate
Additionally, Web 2.0 describes a trend of of nearly 925%! Ning (ning.com) is a social
new applications to combine the functional- networking site that allows you to create
ity of multiple applications. Hundreds of your own network around your own com-
companies now exist to help us share, mon topic or join a social networking group
recommend, collaborate, create, and social- that has already been formed.
ize (see Figure 3.6). The following discus- Is social networking just for
sions focus more on the social, collaborative, fun? Networking has long been a means

Figure 3.6
Hundreds of companies
and Web sites make up
the Web 2.0 landscape,
which helps us share,
recommend, collaborate,
create, and socialize.

Web 2.0 Technologies: Collaborating and Communicating Through the Internet 99


a b

Figure 3.7 of creating links between you and your


Social networking sites friends—and their friends and acquain-
are popular places for tances. Traditionally, networking has been
people to keep up with and there might be some images that you
helpful in the business community for the
friends and learn more don’t want distributed. Additionally, many
about the people they purposes of finding and filling open job
employers use social networks as another
meet. positions as well as finding clients. The
means of gaining information about a
Internet, with its speedy connections and
potential job candidate before granting an
instantaneous means of communicating,
interview or extending a job offer. The
facilitates such business networking as well
responsibility for your content rests with
as promoting more socially based networks.
you. Make sure your profile, images, and
The professional, business-oriented online
site content project an image that accurately
networks such as LinkedIn® (linkedin.com)
represents you.
are helpful for members seeking to find
potential clients, business opportunities,
jobs, or job candidates. Like a true business Weblogs (Blogs) and Video Logs
network, LinkedIn® helps you meet other
professionals through the people you know.
(Vlogs)
Are there precautions I should What is a blog? A weblog, or blog, is a
take with my social networking personal log or journal posted on the Web.
content? When social networking sites The beauty of blogs is that they are simple to
first became popular, there was huge concern create, manage, and read. Anyone can create
over privacy issues, especially for young a blog, and there are millions of blogs avail-
teenagers who put personal information on able to read, follow, and comment on.
their pages without considering the possibil- Several key characteristics define a blog.
ity of that information being misused by a Blogs are generally written by a single au-
stalker or identity thief. Although those thor and are arranged as a listing of entries
concerns still exist, many of the most popu- on a single page, with the most recent blog
lar social networking sites have improved (entry) appearing at the top of the list. In ad-
their privacy policies, thereby reducing, but dition, blogs are public. Blogs have search-
not eliminating, such concerns. Still, users able and organized content, making them
must be cautious about the type of content user friendly. They are accessible from
they post on these sites. For example, think anywhere using a Web browser.
before you add information like “your The traditional form of a blog is primarily
mother’s maiden name” or “your first pet’s text-based but may also include images and
name” because these are often security ques- audio. A video log (vlog or video blog) is a
tions that are used to verify your identity.
Social networking sites are a great way to
SOUND
exchange photos, but again, use caution BYTE Blogging
when posting images. Although privacy set-
tings may offer some comfort, some images
may be available for view through search In this Sound Byte, you’ll see why blogs are one of
engines and may not require site registration today’s most popular publishing mediums. You’ll also
to be viewed. Online images may become learn how to create and publish your own blog.
public property and subject to reproduction,

100 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
personal journal that uses video as the pri-
mary content. It can also contain text, im-
ages, and audio. Vlogs quickly are becoming
a highly popular means of personal expres-
sion, and many can be found by searching
the most popular video-sharing site today,
YouTube (youtube.com). Software such as
Vlog It! makes adding video content to your
blog easy, although you can easily upload
unedited video straight from your com-
puter, video camera, or cell phone. Blinkx
(blinkx.com) is a video search engine that
helps you sift through all the video posted
on the Web (see Figure 3.8).
Why would I want to create a
blog? Many people use blogs as a sort of
personal scrapbook. Whenever the urge
strikes, they just write a stream-of-
consciousness flow of thoughts or a report wordpress.com. You can add other features Figure 3.8
of their daily activities. Many blogs, to your blog such as pictures or subpages. Video logs use video in
however, focus on a particular topic. For Another alternative is to host your blog addition to text, images,
example, themovieblog.com contains yourself. Hosting your own blog requires and audio. Blinkx is a
reviews and opinions about movies, and that you have your own Web site and a URL video search engine that
engadget.com (see Figure 3.9) is a blog that so that people can access it. helps you sift through the
increasing number of
devotes itself to discussing techno-gadgets. Are there problems with blogs? vlogs.
Many corporations, such as WalMart and The popularity of blogs has brought about a
Best Buy, have blogs written by employees. new problem: spam blogs (splogs), which
Blogcatalog (blogcatalog.com) and Bloghub are artificially created blog sites filled with
(bloghub.com) are two of many blog direc- fake articles or stolen text (a tactic known as
tories that can help you find blogs that best blog scraping). Splogs, which contain links to
fit your interests. other sites associated with the splog’s
How do I create a blog? It is easy to creator, have the intention of either increas-
write and maintain a blog, and many Web ing traffic to, or increasing search engine
sites provide the necessary tools for you rankings for, these usually disreputable or
to create your own. Two sites that offer useless Web sites. Although not terribly
free blog hosting are blogger.com and bad, splogs are another unwanted form of

a b Figure 3.9
(a) Some blogs, like this
one from engadget.com,
are set up as online re-
views organized by
category. (b) Alternatively,
they can appear as
personal journals that
record a blogger’s
thoughts, viewpoints, and
feelings in reverse
chronological order.

Web 2.0 Technologies: Collaborating and Communicating Through the Internet 101
content that continues to grow like weeds online courses. Wikis are also becoming pop-
on the Web. ular tools for business collaboration. Rather
than passing documents back and forth via
Wikis e-mail and losing track of which updated
version is the most recent, wikis allow all
What are wikis? Unlike traditional Web who have access to the wiki page to post
content, which the viewer of the site cannot their ideas and modify the content of just one
change, a wiki is a type of Web site that document. A history of all changes is kept so
allows users to change its content by users can revert to earlier versions if desired.
adding, removing, or editing the content These same collaborative efforts extend to
(see Figure 3.10). Wikis add the extra benefit user manuals. One site, wikiHow (wikihow.
of tracking revisions so that past versions org), is an online project that uses both wikis
can be easily accessed at any time by any and the collaborative process to build a
reader. Like blogs, wikis can be used to large, online how-to manual. Blender
express thoughts and opinions about certain (blender.org), an open source software
topics. Unlike blogs, wikis can be edited application for 3D modeling, uses
and therefore can present an emergent MediaWiki, a more feature-rich wiki
“common” opinion rather than the implementation product, to provide users
individual opinion of the initial writer. with documentation, help with game
The popular collaborative online encyclo- development and 3D modeling, and
pedia Wikipedia (wikipedia.org) uses wiki tutorials for Blender software.
technology so that the content can be How accurate is Web content that
updated continually. Some Web-based anyone can change? The idea behind
Figure 3.10 document products, such as Google Docs content that is managed and edited by many
(docs.google.com), have wiki-like features users, such as that found in large public
Rather than collaborating
by exchanging e-mails to promote online collaboration. wikis such as Wikipedia, is that the group
and attachments—and What are wikis used for? Wikis will keep the content valid. Those challeng-
potentially losing track of provide an excellent source for collaborative ing the validity of publicly editable wikis
the most recent version writing, both in and out of the classroom.
of a document—different
argue that the content cannot be trusted
Wiki technology is currently incorporated in because wikis are easily tampered with,
users can collaborate on
a wiki page. course management systems such as Black- whereas supporters argue that the commu-
board, to encourage collaborative learning in nity of users can quickly catch erroneous
content and correct it.
Project Home In late 2005, Wikipedia content was
Week 7: Publicity Law
9/17/12 – 9/23/12
measured for accuracy in its scientific con-
tent and was found to be as accurate as the
9/18/12
Elijah provides initial text Mackenzie-Jordan Law Associates has a significant number Encyclopedia Britannica. Nonetheless, free and
(in black) of celebrity clients. One of the most important aspects of
our legal counsel to these individuals is to help protect the
easy access to edit pages also can lead to im-
use of their images and likenesses. proper manipulation, which results in tighter
Sometimes this is referred to as the right of publicity. This
right is a valuable asset because there are endless licensing access controls. To thwart malicious editing
opportunities that can be quite lucrative.
Some states have a publicity law that protects a celebrity’s
of the wiki content, for example, users who
image and likeness for 100 years, but as yet that law has want editing privileges are required to regis-
not been enacted in the state of Texas.
ter. Citizendium (citizendium.org), another
9/19/12 Jordan includes
The merchandising of celebrity images has become a huge additional text open wiki encyclopedia, requires contribu-
source of income for many celebrities as well as others. (shaded yellow) tors to provide real names and sign an ethics
In recent years, legal disputes have resulted from artists
and illustrators manipulating celebrity images. pledge, and all postings are monitored.
In the past, courts have typically protected the First
Amendment rights of artists in these cases. But recently
there have been a few cases where celebrities have been
allowed to sue creators of fictional works for the violation of Podcasts and Webcasts
the right of publicity.
The right of publicity is intended to prevent others from
capitalizing on a celebrity’s fame. Many people in the
What is a podcast? A podcast is a clip
entertainment industry are fearful that unauthorized of audio or video content that is broadcast
biographies, docudramas, and celebrity spoofs and satires
will no longer be protected. Many entertainment lawyers say over the Internet using compressed audio
a celebrity’s right to publicity is intended solely for ads and
merchandise, not for literary works.
and video files such as MP3s and MP4s. This
content might include radio shows, audio-
books, magazines, and even educational
Stephanie removes text programs. The word podcast is a combina-
(shaded with green and
shown with strikethrough) tion of broadcasting and iPod—not because

102 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
you have to use an iPod but because iPods BITS
are the most popular form of portable media AND Can Blogging Get You in Trouble?
player (PMP) and because people download BYTES
audio files to listen to on their iPods. How-
ever, you don’t have to listen to podcasts on It’s true: Bloggers have been fired from their jobs and, in some instances, even
a portable media player. You can listen to imprisoned because of the content of their blogs. Generally, the content may include
podcasts on your computer or even on a negative discussion about the blogger’s job, employer, or colleagues, or perhaps inap-
smartphone as long as the device can play propriate content about the blogger. Because blogs are on the Internet, anyone can
the content. To listen to a podcast on your find and read them, including bosses, college administrators, potential employers,
computer, you’ll need a media player such friends, relatives, neighbors, and colleagues. Therefore, illegal and socially unaccept-
as iTunes or Windows Media Player. If you able content should not be included in blogs. Bloggers who post negative or inappro-
want to enjoy a video podcast on your PMP, priate content should be prepared for the consequences.
you need to make sure your mobile device
can play video as well as audio files.
So what makes podcasting differ-
ent from just listening to an audio programs that go out and grab the latest
file on the computer or a PMP? The updates of Web material according to your
difference is that podcasts are files that come specifications. They are available for all
to you through syndication so you do not major operating systems as well as some
have to search for them. Perhaps you are mobile devices such as smartphones.
used to getting your news from a certain Where can I find podcasts?
Web site, but the only way you can deter- Podcasts can be found all over the Web.
mine that new content has been added is to Most newspapers, TV news organizations,
go to the site and look for the newly added and radio sites offer podcasts of their pro-
information. In contrast, if you subscribe to grams. Although many podcasts are news
podcasts, when the content changes, it is related, many podcasts offer more entertain-
brought to you. Some podcasts provide the ing and informative content. The television
opportunities for listeners to submit ques- network ABC, for example, offers podcasts
tions or even take listener’s calls live. What’s of some of its most popular TV shows, such
more, if you have several favorite Web sites, as Grey’s Anatomy and Lost. Sites such as
rather than indi- Yoga Today
vidually check- offer extensive
ing the content, yoga classes.
you can collect Many schools
all the site up- are beginning
dates in one to recognize
place. Podcasts this format
are possible be- as a way to sup-
cause of RSS ply students with
technology, course content
which makes it updates, and
more efficient for instructors
you to gather up- create podcasts
dates to your fa- of their
vorite content. lectures.
What is iTunes
RSS? Really (itunes.com),
Simple Syndica- Figure 3.11 Podcast Alley
tion (RSS) is an Podcasts are available in a wide variety of topics and content. (podcastalley.com),
XML-based Web sites such as podcast.com allow you to add your own and Podcast.com
format that podcast to their directories. (podcast.com) are
facilitates the aggregators as
delivery of frequent content updates on Web well as great directories of podcasts,
pages. Using RSS, Web content can be for- organized by genre, to help you easily
matted in such a way that aggregators can locate podcasts of most interest to you (see
find it and download only the new content to Figure 3.11). If there is a particular topic
your computer. Aggregators are software for which you’d like to hear a podcast,

Web 2.0 Technologies: Collaborating and Communicating Through the Internet 103
TRENDS
IN IT Computers in Society—The Internet Makes Business Startups Affordable

You, as well as many of your classmates, wear flip-flops year round— manufacturers of all sorts of products located in many different countries.
even in winter—and you think that flip-flops in school colors would be And many manufacturers are happy to work with you to custom design
an extremely popular product. Your school’s bookstore carries everything your product. So if you find a flip-flop style you like, you probably can get it
else with the school’s colors and logo, just not flip-flops. You have asked customized with your school colors.
your friends and several classmates, and most of them indicated they But what happens if the bookstore doesn’t want to sell your flip-
would buy flip-flops in the school’s colors. So what do you do next? How flops? You can always set up a Web site to sell them yourself. But you’ll
do you move from product concept to actually selling your physical probably need help with Web site design, company logo design, and Web
product? programming to construct the site if you don’t already have these skills.
Before the advent of the Internet and e-commerce, it would have been Fortunately, you can tap the global marketplace for skilled professionals
much more difficult and expensive to get your product produced and by using sites such as guru.com or elance.com (see Figure 3.13). These
distributed. First, you would have needed to find someone
with industrial design experience to design your flip-flops.
Then, to make the flip-flops, you would have had to find a
manufacturer, which likely required a high minimum order
(maybe tens of thousands of pairs of flip-flops). You also
would have needed a package design, marketing
brochures, company logo (and other branding devices), a
storage facility, and more. Finally, the largest hurdle would
have been convincing a brick-and-mortar retailer, such as
your campus bookstore, to carry your product.
Fortunately, the Internet brings the power of the global
economy right to your door. For product design and
manufacturing, you can visit a site like Alibaba.com
(see Figure 3.12), which helps entrepreneurs locate

Figure 3.12
A search for men’s flip-flops on Alibaba.com reveals
almost 2,500 suppliers with minimum order quantities
as low as 1,000 units.

Podscope (podscope.com) is a podcast- If you want to make a video podcast, you


specific search engine that searches podcasts also need a Web camera (webcam) or
for specific words or phrases and then dis- video camera. Additional software may
plays the results with audio clips. YouTube be needed to edit the digital audio and
is also becoming a popular source of RSS video content. After the podcast content has
feeds for video content. been recorded and edited, it needs to be
Can I create my own podcast? exported to MP3 format. Sound-editing
It is simple to create audio content that software, such as the freeware program
can be delivered to the Web and then Audacity, can be used to record and edit
listened to by people all over the world. audio files and then export them to MP3
In fact, you could become a radio broad- format. The last steps involve creating an
caster overnight. Although high-end equip- RSS feed and then uploading the content to
ment always will produce a more the Web.
sophisticated output, you really need What’s a webcast? A webcast is the
only the most basic equipment to make broadcast of audio or video content over the
your own podcast. Internet. Unlike podcasts that are prere-
To record the content, at the minimum corded and made available for download,
you need a computer with a microphone. most webcasts are live or one-time events.

104 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Figure 3.13
Need to design a package? Many freelancers at Elance.com are ready to help!

sites help you locate freelance professionals to work on projects for you. them? If your parent’s basement isn’t large enough, you can outsource
You can create a description of the job you need done (say, logo design for warehousing and order fulfillment to Amazon.com. Fulfillment by Amazon
a flip-flop company), post it on the site, and invite freelancers to bid on is a service in which Amazon (for a fee) will warehouse your inventory and
your job. You can contact freelancers that look promising, review samples then package and ship it when customer orders are received. Orders do
of their work, and decide on someone who can help you—and at a com- not have to come through Amazon’s site (although that is an option); you
petitive price. After your Web site is designed and up and running, you can can just provide ordering information to Amazon that is collected on your
place your business on social networking sites, such as Facebook, to help site, and Amazon will take care of all the tedious work.
potential customers discover your product and spread the word about your Although there is always a cost to starting up a business, up-front
great flip-flops. You probably already have lots of friends on Facebook who costs are much lower when you take advantage of the global marketplace
attend your school and would be good potential customers. and Internet tools. So take that brilliant idea you have and turn it into a
If you aren’t selling your flip-flops in a physical store, where will you business today!
store them, and who will package and ship them when customers buy

Webcasts are not updated automatically, but


some, such as Microsoft’s On-Demand
Webcasts, are RSS feeds. Webcasts use a
special kind of media technology that con-
tinuously feeds the audio and video content,
which facilitates the viewing and download-
ing process of large audio and video files.
Webcasts can include noninteractive content
such as simulcasts of radio or TV broadcasts.
More recent webcasts invite interactive re-
sponses from the viewing or listening audi-
ence. For example, ORLive.com provides
surgical webcasts that demonstrate the latest
surgical innovations and techniques (see
Figure 3.14). Webcasts also are used in the
Figure 3.14
corporate world to broadcast annual meet-
ings and in the educational arena to transmit ORLive provides webcasts that demonstrate the latest
surgical techniques.
seminars.

Web 2.0 Technologies: Collaborating and Communicating Through the Internet 105
BITS hour-long live concerts). In addition to
AND What’s Everyone Twittering About? movies, you can watch live or prerecorded
BYTES television broadcasts, movie trailers, and
sporting events. Hulu.com is a great Web
Twitter (twitter.com) is a social networking and microblogging service that enables site where you can find popular TV shows
you to exchange short text messages in real time with your friends or “followers” (see and movies.
Figure 3.15). It lets you specify which Twitter users you want to follow so you can read What are streaming audio and
their messages in one place. All you need is a device (such as your computer or mo- video? Because of the large file sizes of
bile device) connected to the Internet. media content, watching video files such as
Twitter messages, called tweets, are limited to 140 characters, so comments ex- movies or TV shows, listening to live audio
changed in Twitter are short and simple. While Twitter works well among close-knit broadcasting, and playing online games
groups for messages such is possible because of streaming media.
as “Joe and I are going to Streaming audio continuously feeds an
Murphy’s Café. See you audio file to your browser so you avoid hav-
there,” it can also be used ing to wait for the entire file to download
to gain a sense of the completely before listening to it. Likewise,
“pulse” of what the general streaming video continuously feeds a video
public is talking about file to your browser so that you can watch
within a broader commu- large files as they download instead of first
nity. Businesses are using having to download the files completely.
Twitter to respond to cus- What kinds of games are played on
tomer queries or to broad- the Web? Streaming audio and video
cast new services or helped to bring popularity to online user
products. Your Twitter ac- interactivity and online gaming. Many game
count tracks the number of Web sites, such as Addicting Games
“followers,” or people who (addictinggames.com), offer thousands of
are paying attention to your free online games in arcade, puzzle, sports,
tweets, and the number of Figure 3.15 shooting, word, and strategy categories.
“friends,” or people you are Twitter is a social networking and microblogging Simple multiplayer games such as backgam-
following. So, “tweet” away service for staying connected to “followers” in mon, chess, and checkers became popular
to stay connected. real time. and offered users the chance to play the
game with others from around the world.
In addition, there are many multiplayer
online games in which play occurs among
hundreds or thousands of other players over
Web Entertainment: the Internet in a persistent (or always-on)
Multimedia and game environment. In these games, you can
interact with other players around the world
Beyond in a meaningful context by trading, chatting,
Internet radio, music files such as MP3 and or playing cooperative or combative
advanced audio coding (AAC), streaming minigames. There are several types of
video, and interactive gaming are all part of a massive multiplayer online role-playing
growing entertainment world available over games (MMORPGs) in which participants
the Internet. What makes the Web appealing assume the role of a fictitious character in a
to many people is its rich multimedia content. virtual game world. World of Warcraft
Multimedia is anything that involves one or (worldofwarcraft.com), shown in Figure 3.16,
more forms of media in addition to text. and Guild Wars (guildwars.com) are
Many types of multimedia are used on among the most popular MMORPGs.
the Web. Graphics (drawings, charts, and Other types of multiplayer online games
photos) are the most basic form of multime- include first-person shooter games such as
dia. Audio files are what give sound to the battlegroundeurope.com, sports games such
Web—the clips of music you hear when you as footballsuperstars.com, and racing games
visit certain Web sites, MP3 files that you such as needforspeed.com. Second Life
download, or live broadcasts you can listen (secondlife.com) can also be considered an
to through Internet radio. Video files on MMORPG, but with its own well-established,
the Web range from the simple (such as in-world virtual economy, it has transcended
short video clips) to the complex (such as into a much bigger concept and function.

106 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Do I need anything besides a
browser to view or hear multimedia
on the Web? Without any additional
software, most graphics on the Web will
appear in your browser. However, to view
and hear some multimedia files—for
example, podcasts, videos on YouTube, and
audio files—you might need a special soft-
ware program called a plug-in (or player).
Figure 3.17 lists the most popular plug-ins.
If you purchased your computer within
the past several years, many plug-ins proba-
bly came preinstalled on your computer. If a
Web site requires a plug-in you don’t have,
then it usually displays a message on the
screen that includes links to a site where you
can download the plug-in free of charge.
For example, to use streaming video on a
Web site, your browser might send you to
adobe.com, where you can download Flash
Player.
Do I need to update players and Depending on your settings, this access hap- Figure 3.16
plug-ins? As with most technological re- pens without asking you for consent to start World of Warcraft is a
sources, improvements and upgrades are the plug-in. Such automatic access can pres- popular massive
multiplayer online role-
available for players and plug-ins, and most ent security risks. To minimize such risks, playing game.
will alert you to check for and download up- update your plug-ins and browser software
grades when they are available. It is best to frequently so that you will have the most
keep the players and plug-ins as current as up-to-date remedies against identified
possible so that you get the full effects of the security flaws.
multimedia running with these players. Is there any way to get multimedia
Are there any risks with using Web content to load faster? When
plug-ins? When a browser requires a you’re on the Internet, your browser keeps
plug-in to display particular Web content, it track of the Web sites you’ve visited so that
usually automatically accesses the plug-in. it can load them faster the next time you

Figure 3.17 POPULAR PLUG-INS AND PLAYERS AND THEIR USES

Plug-In or Player Name Where You Can Get It What It Does


Adobe Reader adobe.com Views and prints portable document format (PDF) files.

Flash Player adobe.com Plays animation and movies through Web browsers.

QuickTime Player apple.com Plays MP3 animation, music, musical instrument digital interface (MIDI),
audio, and video files.

Shockwave Player adobe.com Plays interactive games, multimedia, graphics, and streaming audio and
video on the Web.

Silverlight microsoft.com Similar to Flash. Plays Web-based animations and videos.

Windows Media Player microsoft.com Plays MP3 and WAV files, music files and live audio, and views movies and
live video broadcasts on the Web.

Web Entertainment: Multimedia and Beyond 107


visit them. This cache (temporary storage press the F5 key if you revisit a site in the
place) of the text pages, images, and video same browsing session. All popular Web
files from recently visited Web sites can browsers have an option to clear the Internet
make your Internet surfing more efficient, cache manually, and most have a setting to
but it also can congest your hard drive. Ad- allow you to clear the cache automatically
ditionally, if you don’t have your cache set- every time you exit the browser.
tings to check for updates to the Web page,
your browser may not load the most recent
content. To keep your system running effi- Conducting Business
ciently, delete your temporary Internet cache over the Internet:
periodically. To ensure the most recent Web
site content is displayed, click Refresh or E-Commerce
E-commerce, or electronic commerce, is the
process of conducting business online, such
BITS as through advertising and selling products.
AND Using PayPal for Safe Online A good example of an e-commerce business
BYTES Payments (also called an e-business) is Amazon.com.
The company’s online presence offers cus-
Many people were not initially comfortable buying online from sites such as eBay tomers a convenient way to shop for almost
because the sites required them to exchange personal financial information such as anything. Its success is the result of creative
credit card numbers or banking information with complete strangers. PayPal marketing, an expanding product line, and
(paypal.com) resolved that issue and is now a standard means of online payment reliable customer service and product
exchanges. PayPal also offers buyer protection and dispute resolution services. delivery—all hallmarks of traditional
Here’s how PayPal works (see Figure 3.18): businesses as well.
1. You provide your financial information to PayPal, which stores it on PayPal Are there different types of
servers. e-commerce businesses? Traditional
2. You provide only your PayPal e-mail address to the merchant. stores, those stores with a physical building to
3. The merchant receives payment from PayPal without seeing your financial shop in, which also have an online presence,
information. are referred to as click-and-brick businesses.
These stores, such as Best Buy (bestbuy.com),
PayPal acts as a payment intermediary and allows anyone to pay with credit
and Target (target.com), provide a variety of
cards, bank accounts, or buyer credit without sharing financial information. PayPal is
services on their Web sites. Customers can
owned by eBay, the online auction site.
visit their sites to check the availability of
Google Checkout (checkout.google.com) offers similar services to PayPal,
items or to get store locations and directions.
although there are some subtle differences. For example, you cannot pay directly
Some click-and-bricks allow online purchases
from your bank account with Google Checkout, and only purchases within the U.S.
and in-store pickup and returns.
can be made with Google Checkout. Google Checkout only provides customer support
A significant portion of e-commerce
through forums and e-mail, whereas PayPal has increased its customer service
consists of business-to-consumer (B2C)
considerably, and now you can chat live with PayPal representatives.
transactions—exchanges that take place
between businesses and consumers—such
as the purchases that consumers make at
online stores. There is also a business-to-
business (B2B) portion of e-commerce; this
consists of businesses buying and selling
goods and services to other businesses.
PayPal An example is Omaha Paper Company
(omahapaper.com), which distributes paper
products to other companies. Finally, the
consumer-to-consumer (C2C) portion of
Provide your PayPal securely Merchant receives e-commerce consists of consumers selling
information to stores your payment from
PayPal information PayPal
to each other through online auction and
exchange sites such as eBay (ebay.com) and
Craigslist (craigslist.org).
Figure 3.18
What are the most popular
PayPal is an online payment intermediary, allowing anyone to shop without e-commerce activities? Approxi-
sharing financial information with the seller.
mately $100 billion each year is spent
on goods purchased over the Internet,

108 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
accounting for approximately 25 percent of credentials unsecured. To certify that their
all retail sales. So what is everyone buying online transactions are secure, businesses
online? Consumers now buy books, music hire security companies such as VeriSign.
and videos, movie and event tickets, and But just seeing the VeriSign seal is not al-
toys and games more often online than in re- ways a guarantee that the site is secure be-
tail stores. Travel items such as plane tickets, cause the seal can be copied and pasted onto
hotel reservations, and rental car reserva- virtually any site. Therefore, be sure to check
tions, and even automobile purchases are that the beginning of the URL changes from
also frequently made online. With the ad- “http://” to “https://”—with the “s” stand-
vent of more lenient return policies, online ing for secure socket layer. Another indication
retail sales of clothing and shoes also have that a Web site is secure is the appearance of
increased. Sites such as eBay and Craigslist, a small icon of a closed padlock (in both Mi-
together with payment exchange services crosoft Internet Explorer and Mozilla Fire-
such as PayPal and Google Checkout, are fox), as shown in Figure 3.19. Still, despite
becoming the online equiva- these indications, you also
lent of the weekend yard need to consider the valid-
sale and have dramatically
increased in popularity.
But e-commerce encom-
“ Just how safe
are online
transactions?
ity of the site and place
everything in context.
How else can I shop


passes more than just shop- safely online? To ensure
ping opportunities. Today, that your online shopping
anything you can do inside experience is a safe one, fol-
your bank you can do online, and more than low these guidelines:
50 percent of U.S. households do some form
• Shop at well-known, reputable sites. If
of online banking. Many people use online
you aren’t familiar with a site, then
services to check their account balances, pay
investigate it with the Better Business
bills online, as well as check stock and mu-
Bureau (bbb.org) or at bizrate.com.
tual fund performances. Credit card compa-
When you place an order, print a copy
nies allow you to view, schedule, and pay Figure 3.19
of the order and make sure you receive a
your credit card bill; brokerage houses allow A closed padlock icon,
confirmation number. Make sure the
you to conduct investment activities online. “https” in the URL, and
the VeriSign seal are
indications that the site
is secure.
E-Commerce Safeguards
Just how safe are online http:// changes to https:// Closed padlock icon
transactions? When you buy
something online, you most likely
use a credit card; therefore, the ex-
change of money is done directly
between you and a bank. Because
online shopping eliminates a sales-
clerk or other human intermediary
from the transaction, it can actually
be safer than traditional retail shop- Click padlock to display
ping. Still, because users are told to additional security
information.
be wary of online transactions and
because the integrity of online
transactions is the backbone of
e-commerce, businesses must have
some form of security certification
to give their customers a level of
comfort.
Some sites have created se-
cure logins that you can change VeriSign seal
to before signing in, which is
safer than sending your login

Conducting Business over the Internet: E-Commerce 109


ACTIVE processor such as PayPal or Google
HELP-
Doing Business Checkout. PayPal also offers a security
DESK Online key that provides additional security to
your PayPal account.
In this Active Helpdesk call, you’ll learn about e- • Check the return policy. Print a copy
commerce and what e-commerce safeguards protect and save it. If the site disappears
you when you’re doing business online. overnight, this information may help
you in filing a dispute or reporting a
problem to a site such as the Better
company has a phone number and Business Bureau.
street address in addition to a Web site.
Whether you’re doing business, playing
• Avoid making online transactions
games, or communicating with friends or
when using public computers. Public
colleagues, the Internet makes all of these
computers might have programs that
activities more accessible. The Internet can
track and log your keystrokes, so you do
potentially make these experiences and
not want to use public computers when
activities more enriched as well, although
typing sensitive information such as
you must take cautions for the safest of
credit card numbers or bank account
experiences.
numbers. Public computers might also
have other types spyware installed to
retrieve private information. Similarly, Accessing the Web:
unless you have specific protection on Web Browsers
your own notebook computer, avoid
None of the activities for which we use the
making wireless transactions in public
Web could happen without an important
hotspots.
software application: a Web browser. Recall
• Pay by credit card, not debit card. that a Web browser, or browser, is software
Federal consumer credit laws protect installed on your computer system that
credit card users, but debit card users do allows you to locate, view, and navigate
not have the same level of protection. If the Web. Most browsers in use today are
possible, reserve one credit card for graphical browsers, meaning they can
Internet purchases only; even better, display pictures (graphics) in addition to
use a prepaid credit card that has a text and other forms of multimedia such
small credit limit. For an extra layer of as sound and video.
security, find out if your credit card What are some common Web
company has a service that confirms browsers? Internet Explorer (IE) is the
your identity with an extra password or browser from Microsoft and is included in
code that only you know to use when the Windows operating system. It has been
making an online transaction or offers a the most widely used browser since 1999,
one-time use credit card number. Also, and still enjoys predominant market share,
consider using a third-party payment although its popularity has slipped over
the years. Other browsers, discussed below,
BITS have become popular alternatives to
AND Why Should You Run the Latest Internet Explorer.
BYTES Version of Browser Software? • Firefox is a popular open source
browser from Mozilla (mozilla.org).
When new file formats are developed for the Web, browsers need new plug-ins to dis- Firefox’s popularity continues to
play content properly. Constantly downloading and installing plug-ins can be a tedious increase, capturing approximately
process. Although many Web sites provide links to sites that enable you to download 21.5 percent of the U.S. browser market.
plug-ins, not all do, resulting in frustration when you can’t display the content you Add-ons are available to customize and
want. When new versions of browsers are released, they normally include the latest increase the functionality of Firefox.
versions of popular plug-ins. Corrections of security breaches are typically included in Examples include Video Download
these versions of browser software as well. Therefore, upgrading to the latest version Helper that converts Web videos, like
of your browser software provides for safer, more convenient Web surfing. Fortu- those found on YouTube, to files you can
nately, most updates are free, and you can set most of the popular Web browsers to save, as well as a Facebook toolbar that
notify you when updates are available or to download the updates automatically. integrates Facebook functionality into
your browser. Other handy features

110 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
found in Firefox are spell-checking for
e-mail, blogs, and other Web postings, as
well as Session Restore, which brings
back all your active Web pages if the
browser or system shuts down
unexpectedly.
• Safari is a browser developed by Apple
(apple.com). Although it was created as
the default browser for Macintosh com-
puters and is included with the Mac OS,
a Windows-based version is also avail-
able. Safari has quickly gained public ac-
ceptance, and it now has approximately
an 8 percent share of the U.S. browser
market.
• Google Chrome is the newest browser Figure 3.20
on the market, distributed by Google Google Chrome includes thumbnails of the most
(google.com) (see Figure 3.20). The recently visited Web sites for easy access.
unique features offered by Chrome
include thumbnail access to your most within the same browser window. Rather
recently visited sites from Chrome’s than having to switch among Web pages in
main page and shortcuts to Google several open windows, you can flip between
applications. the tabs in one window. You can even open
What features do browsers offer? several of your favorite Web sites from one
Most browsers’ toolbars provide tabbed folder and choose to display them as tabs.
browsing and Quick Tabs for convenient You may also save a group of tabs as a
navigation and Web page management tools Favorites group, if there are several tabs
(see Figure 3.21). Quick Tabs, in Internet you often open at the same time.
Explorer 7 and higher, shows thumbnail Most browsers also include a built-in
images of all open Web pages in open tabs, search box in which you can designate your
and Google Chrome offers thumbnail im- preferred default search engine and tools for
ages of most recently visited sites on its printing, page formatting, and security
main page. Firefox offers a bookmark tool- settings. For extra browsing privacy, most
bar for quick access to the most frequently browsers also offer a feature, such as
used bookmarked sites. Most of the popular InPrivate Browsing in Microsoft Internet
Web browsers have tabbed browsing in Explorer, that allows users to surf without
which Web pages are loaded in “tabs” leaving a trace.

Figure 3.21
Forward and Tabbed browsing Built-in search Internet Explorer (IE)
Back buttons includes tabbed browsing
Quick Tabs and Quick Tabs. IE has
Tag buttons also reduced the display
of navigation tools to a
simple toolbar and built a
Google search engine
right into the browser.

Opened favorites
center with history

New tab button Streamlined


toolbar

Accessing the Web: Web Browsers 111


Getting Around comprised of several parts that help identify
the Web document for which it stands (see
the Web: URLs, Figure 3.22). The first part of the URL indi-
Hyperlinks, and cates the protocol (set of rules) used to retrieve
Other Tools the specified document. The protocol is gen-
erally followed by a colon, two forward
You gain initial access to a particular Web slashes, www (indicating World Wide Web),
site, which is a collection of Web pages, by and the domain name. (Sometimes the do-
typing its unique address, or Uniform main name is also thought to include the
Resource Locator (URL, pronounced “you- www.) The domain name is also referred to as
are-ell”), in your browser. For example, the the host name. Individual pages within a
URL of the Web site for Popular Web site are further identified after the
Science magazine is http://www. domain name, following another for-
Domain name
popsci.com. By typing this URL ward slash. These are
for Popular Science referred to as the path.
magazine, you con- It should be noted that
nect to the home http://www.nytimes.com/ pages/cartoons
most current browsers
page, or main page, no longer require
of the Web site. you to enter the
Once you are at the Protocol Top-level Path or
domain subdirectory protocol and the
home page, you (TLD) www. Some, like
can move all Firefox, don’t even
around the site by require the domain if it’s a
Figure 3.22
clicking specially .com. But even though these parts of the
The parts of a URL.
formatted pieces of URL are not physically entered, they are
text called hyperlinks. Let’s look at these and still part of each Web site’s URL.
other navigation tools in more detail. What’s the protocol? Most URLs
begin with http, which is short for hypertext
URLs transfer protocol (HTTP). HTTP is the pro-
What do all the parts of the URL tocol that allows files to be transferred from
mean? As noted earlier, a URL is a Web a Web server—a computer that hosts the
site’s address. A Web site is comprised of Web site you are requesting—so that you
many different Web pages, each of which is a can see the Web site on your computer by
separate document with its own unique using a browser.
URL. Like a regular street address, a URL is Another common protocol used to
transfer files over the Internet is file transfer
protocol (FTP). It is used to upload and
COMMON TOP-LEVEL DOMAINS AND THEIR download files from your computer to a
Figure 3.23
AUTHORIZED USERS Web server. FTP files use an FTP file server,
Domain Name Who Can Use It whereas HTTP files use a Web server. To
connect to most FTP servers, you need a
.biz Businesses user ID and a password. FTP addresses, like
.com Originally for commercial sites, but now can be used by
e-mail addresses or URLs, identify one loca-
anyone tion on the Internet. To upload and down-
load files from FTP sites, you can use a Web
.edu Degree-granting institutions browser or file transfer software such as
.gov Local, state, and United States government WS_FTP, Fetch, Filezilla, or WinSCP.
What’s in a domain name? The
.info Information service providers domain name identifies the site’s host, the
.mil United States military location that maintains the computers
that store the Web site files. For example,
.name Individuals berkeley.edu is the domain name for the
.net Originally for networking organizations but no longer University of California at Berkeley.
restricted The suffix in the domain name after the
dot (such as .com or .edu) is called the top-
.org Organizations (often not-for-profits)
level domain. This suffix indicates the kind
of organization to which the host belongs.

112 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
EXAMPLES OF connect you to different Web sites. You can
Figure 3.24
COUNTRY CODES jump from one Web page (the document in-
dicated by the path in the URL), to another
Country Code Country
Web page within the same Web site or navi-
.au Australia gate to another Web site altogether by click-
ing on a specially coded element called a
.ca Canada
hyperlink, as shown in Figure 3.25. Gener-
.jp Japan ally, text that operates as a hyperlink ap-
pears in a different color (often blue) and is
.uk United Kingdom
underlined. Sometimes images also act as
Note: For a full listing of country codes, refer to hyperlinks. When you pass your cursor over
norid.no/domenenavnbaser/domreg.html. a hyperlinked image, for example, a cursor
may change to a hand with a finger pointing
upward. To access the hyperlink, you simply
click the image.
Figure 3.23 lists the most frequently used How do I return to a Web page I’ve
top-level domains. already visited? To retrace your steps,
Each country has its own top-level do- some sites also provide a breadcrumb
main. These are two-letter designations such trail—a list of pages within a Web site
as .za for South Africa and .us for the United you’ve visited. It usually appears at the top
States. A sampling of country codes is of a page. Figure 3.25 shows an example of a
shown in Figure 3.24. Within a country- breadcrumb trail. “Breadcrumbs” get their
specific domain, further subdivisions can be name from the fairy tale “Hansel and Gretel,”
made for regions or states. For instance, the in which the characters drop breadcrumbs
.us domain contains subdomains for each on the trail to find their way out of a forest.
state, using the two-letter abbreviation of By clicking on earlier links in a breadcrumb Figure 3.25
the state. For example, the URL for Pennsyl- trail, you can retrace your steps back to the When you click on a
vania’s Web site is state.pa.us. page on which you started. hyperlink, you jump from
To get back to your original location or one location in a Web site
What’s the information after the to another. When you click
domain name that I sometimes visit a Web page you viewed previously, you on the links in a bread-
see? When the URL is only the domain use the browser’s Back and Forward buttons crumb trail, you can
name (such as nytimes.com), you are re- (see Figure 3.25). To back up more than one navigate your way back
questing a site’s home page. However, through a Web site.
sometimes a forward slash and additional
text follow the domain name, such as in Forward button Breadcrumb trail
nytimes.com/pages/cartoons. The informa-
tion after the slash indicates a particu-
lar file or path (or subdirectory)
within the Web site. The path or sub-
Back button
directory is what identifies each dif-
ferent page within a particular Web
site; it follows the top-level domain
and is preceded by a slash. In Figure
3.22, you would connect to the cartoon
pages on the New York Times site.

Hyperlinks and Beyond


What’s the best way to get around
in a Web site? Unlike text in a book or
a Microsoft Word document, which is
linear (meaning you read it from top
to bottom, left to right, one page after
Hyperlinks
another), the Web is anything but lin-
ear. As its name implies, the Web is a
series of connected paths, or links, that

Getting Around the Web: URLs, Hyperlinks, and Other Tools 113
page, click the down arrow next to the For-
ward button to access a list of most recently SOUND
BYTE Welcome to the Web
visited Web sites. By selecting any one of
these sites in the list, you can return directly
to that page without having to navigate In this Sound Byte, you’ll visit the Web in a series of
through other Web sites and Web pages guided tours of useful Web sites. This tour serves as an
you’ve visited. introductory guide for Web newcomers and is a great
The History list (see Figure 3.25) on your resource for more experienced users.
browser’s toolbar is also a handy feature. The
History list shows all the Web sites and pages
that you’ve visited over a certain period of Favorites and Bookmarks are great for
time. These Web sites are organized accord- quickly locating those sites you use the
ing to date and can go back as far as three most, but they are accessible to you only
weeks. To access the history list in Internet when you are on your own computer.
Explorer, click the down arrow next to the One way to access your Bookmarks and
navigation arrows. On the Firefox toolbar, Favorites from any computer is to use
the history button is the alarm clock icon. MyBookmarks (mybookmarks.com), a free
Internet service that stores your Bookmarks
and Favorites online.
Favorites, Live Bookmarks, What are live bookmarks? The live
bookmark feature of the Firefox browser
and Tagging adds the technology of RSS feeds to book-
What’s the best way to mark a site marking. Because the Web is constantly
so I can return to it later? If you want changing, the site you bookmarked last week
an easy way to return to a specific Web page may subsequently change and add new con-
without having to remember to type in the tent. Traditionally, you would notice the
address, you can use your browser’s change only the next time you visited the site.
Favorites or Bookmarks feature. Internet Ex- With live bookmarks, the content comes to
plorer and Safari call this feature Favorites; you. Instead of constantly checking your fa-
Firefox and Google Chrome call the same vorite Web pages for new content, a live book-
feature a Bookmark. This feature places a mark delivers updates to you as soon as they
marker of the site’s URL in an easily retriev- become available. Live bookmarks are useful
able list in your browser’s toolbar. To organ- if you are interested in the most up-to-date
Figure 3.26 ize the sites into categories, most browsers news stories, sports scores, or stock prices.
Delicious is a social
offer tools to create folders. Most browsers What is social bookmarking?
bookmarking Web site also provide features to export the list of Social bookmarking, also known as
that allows you to bookmarks to a file from which you can im- tagging, lets you store, organize, and man-
organize and share your port to another computer or another browser. age bookmarks (or tags) of Web pages. A so-
favorite Web sites. cial bookmark or tag is a
keyword or term that is
Installed Toolbar
buttons for easy
assigned to a piece of in-
tagging formation such as a Web
page, digital image, or
video. A tag describes the
Number of people
who also
item so that it can be
tagged article found again by browsing
or searching. Tags were
popularized by Web 2.0
Tags created to Web sites such as YouTube
identify article and Flickr.
The social bookmark-
ing Web site Delicious
(delicious.com) gives you
List of all tags
the ability to add tags as
bookmarks to your fa-
vorite Web sites (see
Figure 3.26). The tag can

114 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Figure 3.27
Icons of some popular
be something meaningful to you, or you a structured outline of Web sites organized social bookmarking Web
can select one from a list of suggested tags. by topics and subtopics. Librarians’ Internet sites.
Later, you can go back to Delicious, conduct Index (ipl.org) is a subject directory, and
a search using your tag, and find bookmarks some popular search engines such as Yahoo!
tagged with the same word from everyone also feature directories. If you can’t decide
in your network. You can also see how which search engine is best, then you may
many other Web users tagged the same want to try a metasearch engine.
site. Delicious offers convenient toolbars Metasearch engines, such as Dogpile
for your browsers, and many Web sites (dogpile.com), search other search engines
incorporate bookmarking icons for ease rather than individual Web sites. Figure 3.28
of use. lists search engines and subject directories
Figure 3.27 lists several popular social that are alternatives to Google, Yahoo!, Bing,
bookmarking tag tools. Diigo (diigo.com) and Ask.com.
allows you not only to tag and bookmark
Web sites but also to annotate the pages
Search Engines
with highlights and sticky notes. Through
Diigo, the Web pages can be archived, so How do search engines work? Search
they are always available. Digg (digg.com) engines have three parts. The first part is a
and Newsvine (newsvine.com) offer similar program called a spider. The spider con-
systems for organizing news content. Stum- stantly collects data on the Web, following
bleUpon (stumbleupon.com) is like a per- links in Web sites and reading Web pages.
sonalized search engine and recommends Spiders get their name because they crawl
Web sites based on your personal interests over the Web using multiple “legs” to visit
and preferences, as well as the recommenda- many sites simultaneously. As the spider
tions of people you know or the general collects data, the second part of the search
surfing public. engine, an indexer program, organizes the
data into a large database. When you use a
search engine, you interact with the third
part: the search engine software. This soft-
Searching the Web ware searches the indexed data, pulling out
Effectively relevant information according to your
search. The resulting list appears in your
With its billions of Web pages, the Web Web browser as a list of hits (sites that match
offers visitors access to masses of informa- your search).
tion on virtually any topic. To narrow down Why don’t I get the same results
the quantity of Web information to some- from all search engines? Each search
thing more useful, use a search engine and a engine uses a unique formula, or algorithm,
keyword query. A search engine is a set of to formulate the search and create the result-
programs that searches the Web for ing index of related sites. In addition, search
keywords—specific words you wish to look engines differ in how they rank the search
for (query)—and then returns a list of the results. Most search engines rank their re-
Web sites on which those keywords are sults based on the frequency of the appear-
found. Popular search engines include ance of your queried keywords in Web sites
Google, Yahoo!, Bing, and Ask.com. as well as the location of those words in the
For some searches, you also can search sites. Thus, sites that include the keywords
the Web using a subject directory, which is in their URL or site name most likely appear

Searching the Web Effectively 115


Figure 3.28 POPULAR SEARCH ENGINES AND SUBJECT DIRECTORIES

Search Tools on the Internet


AltaVista altavista.com Keyword search engine

Clusty clusty.com Keyword search engine that groups similar results into clusters

ChaCha chacha.com This site lets you chat with a real live professional guide who helps you
search, and it’s free of charge. Also available by texting your questions to
242242.

CompletePlanet completeplanet.com Deep Web directory that searches databases not normally searched by typical
search engines

Dogpile dogpile.com Metasearch engine that searches Google, Yahoo!, Bing, and Ask

Excite excite.com Portal with keyword search capabilities

InfoMine infomine.com Subject directory of academic resources with keyword search engine
capabilities

Rollyo rollyo.com Short for “Roll Your Own Search Engine.” This site lets you create your own
search engine (searchroll) that searches just the sites you want it to search.

Open Directory Project dmoz.org Subject directory with keyword search capabilities

Stumbleupon stumbleupon.com Lets you rate pages “thumbs up” or “thumbs down.” As it learns your
preferences, your search results improve.

Technorati technorati.com A great search engine for blog content.

Note: For a complete list of search engines, go to searchengineguide.com.

at the top of the hit list. After that, results In addition, search engines differ as to
vary because of differences in each engine’s which sites they search. For instance, Google
proprietary formula. and Ask.com search nearly the entire Web,
whereas specialty search engines search
BITS only sites that are relevant to a particular
AND Searching to Do Good subject. Specialty search engines exist for
BYTES almost every industry or interest. For
example, dailystocks.com is a search engine
There are many volunteer and charitable organizations to participate in, but for most of used primarily by investors that searches for
us it’s hard to incorporate such activities into our daily lives, and it’s equally difficult to corporate information to help them make
contribute financially to them all. Now there is an easy way to “do good” while doing educated decisions. Search Engine Watch
something we all do daily—use a search engine. GoodSearch (goodsearch. com) is a (searchenginewatch.com) has a list of
Yahoo-powered search engine that donates half of its revenues to approved U.S. char- many specialty search engines organized by
ities and schools that users designate. The money GoodSearch donates comes from industry.
the site’s advertisers and amounts to approximately a penny per search. Can I use a search engine to
If you’re a big fan of the SPCA, a local hospital, or the neighborhood public ele- search for images and videos? With
mentary school, check to see if that particular organization has been approved. If so, the increasing popularity of multimedia,
you can add it as your designated charity and start searching. You can easily track search engines such as Google, Ask.com,
how much GoodSearch has raised for your organization. More than 86,000 charitable and Yahoo! have capabilities to search the
organizations are being helped by GoodSearch, but if the organization you are inter- Web for digital images and audio and video
ested in is not on the list, as long as it is a registered U.S. not-for-profit organization, files. YouTube (youtube.com) is one of many
you can apply to have it added. sites that has gained recent popularity
You can also contribute to your favorite charity by shopping online through because of its wealth of video content. In
GoodShop. Instead of going directly to your favorite Web shop, go to Goodshop.com addition to the amusing videos that are
first, find and click through to the store of your choice, and start shopping. Participat- captured in popular news, YouTube contains
ing stores donate up to 30 percent of the purchased amount. So, search and shop instructional and informational videos.
away—and do some good! How can I refine my searches for
better results? When you conduct a

116 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
ACTIVE results about processors from the
HELP-
Getting Around Wired.com Web site. The same method
DESK the Web works for entire classes of sites in a
given top-level domain or country code.
In this Active Helpdesk call, you’ll play the role of a • Use a wild card. The asterisk “*” is a
helpdesk staffer, fielding calls about Web browsers, wild card, or placeholder, feature that is
URLs, and how to use hyperlinks and other tools to get helpful when you need to search with
around the Web. unknown terms. For example, searching
with Congress voted *on the* bill returns
sites that mention how Congress voted
on various bills.
Web search, you may receive a list of hits How else can I customize my
that includes thousands—even millions—of searches? A lot of other specialty
Web pages that have no relevance to the search strategies and services are available.
topic you’re trying to search. Initially, Clicking on the “more” hyperlink in the
Boolean operators were needed to help re- Google search engine, for example, takes
fine a search. Boolean operators are words you to all the various search products
such as AND, NOT, and OR that describe Google offers. Google Scholar searches
the relationships between keywords in a scholarly literature such as peer-reviewed
search. papers, theses, and publications from
Today, most search engines offer an ad- academic organizations. Each search result
vanced search page that provides the same contains bibliographic information as
types of strategies in a well-organized form well. Google Custom Search enables you
(see Figure 3.29). Using the advanced search to create a customized search engine to
form can make your Internet research a lot search only a selected set of sites tailored to
more efficient. With the simple addition of a your specific needs. This specialized search
few words or constraints, you can narrow engine can be added to a Web site or blog,
your search results to a more manageable or designed for a specific organization.
and more meaningful list. Google Book Search enables you to search
Are there other helpful search through the full-text content of millions of
strategies? Instead of using the ad- books. Google News searches through
vanced search form, you can use other thousands of news stories from around
strategies to help refine your searches when the world. Google News can be further Figure 3.29
entering your search phrases: customized to search stories within specific Most search engines have
• Search for a phrase. To search for an categories such as Business or Entertain- an advanced search form
exact phrase, place quotation marks ment, and a News Archives Timeline shows to help you refine your
selected results from relevant time periods searches.
around your keywords. The search en-
gine will look for only those Web sites (see Figure 3.30).
that contain the words in that exact Advanced search tips
order. For example, if you want infor- for additional search
strategies
mation on the movie Lord of the
Rings and you type these words
without quotation marks, your
search results will contain pages
that include either of the words
Lord and Rings, although not neces-
sarily in that order. Typing “Lord of
the Rings” in quotes guarantees
that search results will include this
exact phrase.
• Search within a specific Web site.
To search just a specific Web site,
you can use the search keyword,
then site: followed by the Web site’s
URL. For example, searching with
processor site:wired.com returns

Searching the Web Effectively 117


SOUND Finding Information
BYTE on the Web

In this Sound Byte, you’ll learn how and when to use


search engines and subject directories. Through
guided tours, you’ll learn effective search techniques,
including how to use Boolean operators and
metasearch engines.

4. Audience: For what audience is the site


intended? Ensure that the content, tone,
and style of the site match your needs.
You probably wouldn’t want to use in-
formation from a site geared toward
Figure 3.30
teens if you were writing for adults, nor
The Google News Evaluating Web Sites would you use a site that has a casual
Archives Timeline enables style and tone for serious research.
you to zero in on search How can I make sure a Web site is
results from a specific appropriate to use for research? 5. Links: Are the links available and
period. appropriate? Check out the links pro-
When you’re using the Internet for research,
you shouldn’t assume that everything you vided on the site to determine whether
find is accurate and appropriate to use. Before they are still working and appropriate
you use an Internet resource, consider the for your needs. Don’t assume that the
following. links provided are the only additional
sources of information. Investigate
1. Authority: Who is the author of the other sites on your topic as well. You
article or the sponsor of the site? If the should also be able to find the same
author is well known or the site is information on at least three different
published by a reputable news source Web sites to help verify the information
(such as the New York Times), then you is accurate.
can feel more confident using it as a The answers to these questions will
source than if you are unable to locate help you decide whether you should con-
such information. Note: Some sites sider a Web site to be a good source of
include a page with information about information.
the author or the site’s sponsor.
2. Bias: Is the site biased? The purpose of
many Web sites is to sell products or The Internet and
services or to persuade rather than
inform. These sites, though useful in
How It Works
some situations, present a biased point The Internet is such an integral part of our
of view. Look for sites that offer several lives that it’s hard to imagine life without it.
sets of facts, or consider opinions from Looking forward, our ability to use and
several sources.
3. Relevance: Is the information in the
site current? Material can last a long ACTIVE Using Subject
HELP- Directories and
time on the Web. Some research proj-
DESK
ects (such as historical accounts) de- Search Engines
pend on older records. However, if In this Active Helpdesk call, you’ll play the role of a
you’re writing about cutting-edge tech- helpdesk staffer, fielding calls about how to search the
nologies, you need to look for the most Internet using search engines and subject directories,
recent sources. Therefore, look for a as well as how to use advanced search options to
date on information to make sure it is search the Web more effectively.
current.

118 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
ETHICS Plagiarism and Copyright Violation—
IN IT What Can You Borrow from the Internet?
You’ve no doubt heard of plagiarism—claiming another person’s words ensure your paper doesn’t even have unintended instances of plagia-
as your own. And you’ve probably heard the term copyright violation, rized work.
especially if you’ve been following the music industry’s battle to keep Copyright violation is more serious because it, unlike plagiarism, is
“free” music off the Web. But what constitutes plagiarism, and what con- punishable by law. Copyright law assumes that all original work—
stitutes copyright violation? And what can you borrow from the Web? including text, graphics, software, multimedia, audio and video clips, and
Consider these scenarios: other intellectual property—is copyrighted even if the work does not dis-
1. You find a political cartoon that would be terrific in a PowerPoint play the copyright symbol (©). Copyright violation occurs when you use
presentation you’re creating for your civics class. You copy it into another person’s material for your own personal economic benefit, or
your presentation. when you take away from the economic benefit of the originator. Don’t
2. Your hobby is cooking. You design a Web site that includes videos of assume that by citing a source you’re abiding by copyright laws. In most
you preparing recipes, as well as the recipes themselves. Some of cases, you need to seek and receive written permission from the copy-
these recipes you take from your favorite cookbooks; others you right holder.
get from friends. You don’t cite your sources, nor do you obtain There are exceptions to this rule. For example, there is no copyright on
permission from the originators of the recipes you post to your government documents, so you can download and reproduce material from
Web site. NASA, for example, without violating copyright laws. The British Broadcast-
3. You’re pressed for time and need to do research for a paper due ing Corporation (BBC) is also beginning to digitize and make available its
tomorrow. You find information on an obscure Web site and copy archives of material to the public without copyright restrictions.
it into your paper without documenting the source. Teachers and students receive special consideration regarding
4. You download a song from the Internet and incorporate it into a copyright violations. This special consideration falls under a provision
PowerPoint presentation for a school project. Because you called academic fair use. As long as the material is being used for edu-
figure everyone knows the song, you don’t credit it in your
cational purposes only, limited copying and distribution is allowed. One
sources.
standard applied to academic fair use is the effect the use has on the
Which of the preceding scenarios represent copyright violations? potential market. For example, an instructor could make copies of a
Which represent plagiarism? The distinctions between these scenarios are book chapter and distribute it to her class one time but could not do it
narrow in some cases, but it’s important to understand the differences. on a regular basis or over different semesters because that might affect
As noted earlier, plagiarism occurs when you use someone else’s the potential market or sales of the book. Similarly, a student can in-
ideas or words and represent them as your own. In today’s computer clude a cartoon in a PowerPoint presentation without seeking permis-
society, it’s easy to copy information from the Inter- sion from the artist. However, to avoid plagiarism
net and paste it into a Word document, change a in these situations, you still must credit your
few words, and call it your own. To avoid plagia- sources of information.
rism, use quotation marks around all words you So, do you now know which of the four scenar-
borrow directly, and credit your sources for any ios above are plagiarism or copyright violations?
ideas you paraphrase or borrow. Avoiding plagia- Let’s review them.
rism means properly crediting all information you
obtain from the Internet, including words, ideas, 1. You are not in violation because the use of the
graphics, data, and audio and video clips. cartoon is for educational purposes and falls
Web sites such as turnitin.com (for teachers under the academic fair use provision. You
must still credit the source, however.
and institutions) and WriteCheck.com (specifically
for students), as shown in Figure 3.31, help check 2. If you maintain your Web site for your eco-
nomic benefit, you would be in violation of
for plagiarism violations. WriteCheck.com com-
copyright laws because no credit was given for
pares your document to a database of magazines,
the recipes, and you are presenting them as
newspapers, journals, and books, as well as Web your own.
content and previously submitted student papers. Figure 3.31
3. You are guilty of plagiarism because you
Although some common phrasing may be truly By using WriteCheck.com, students copied content from another source and
coincidental, real and purposeful plagiarism is can compare their work to a database implied it was your own work.
reasonably easy to identify. Students can use of publications to check for unintended 4. Again, because your copying is for a school
WriteCheck.com before submitting an assignment plagiarism. project, you are not in violation because of
to ensure their papers will not be confused with the academic fair use provision. However,
plagiarized work. In most schools, plagiarism is a serious offense, it’s always important to document your
often resulting in a 0 for an assignment, or an F for the class. It’s best to sources.

The Internet and How It Works 119


interact with the Internet and the World 1. When you type the Web site address of
Wide Web will converge even more with our the ski area in your Web browser, your
daily lives. Therefore, it’s important to computer acts as a client computer
understand how the Internet works and the because you are asking for data from
choices available for connecting to it. the ski area’s Web site.
How does the Internet work? 2. Your browser’s request for this data
Computers connected to the Internet travels along several pathways that
communicate with (or “talk” to) each other can be likened to interstate highways.
in turns, just as we do when we ask a The largest and fastest pathways are
question and get an answer. Thus, a com- the main arteries of the Internet,
puter connected to the Internet acts in one called Internet backbones. All interme-
of two ways: it is either a client, a computer diary pathways connect to these
that asks for data, or it is a server, a backbones.
computer that receives the request and
returns the data to the client. Because the 3. Your data flows along the backbone
Internet uses clients and servers, it is and then on to smaller pathways until
referred to as a client/server network. it reaches its destination, which is the
(We’ll discuss such networks in more detail server computer for the ski area’s
in Chapter 7.) Web site.
How do computers talk to each 4. The server computer returns the
other? Suppose you want to access the requested data to your computer using
Web to check out snow conditions at your the most expedient pathway system
favorite ski area. As Figure 3.32 illustrates, (which may be different from the
Figure 3.32 the following events take place: pathway the request took).
How the Internet’s
client/server network
works.

STEP 3:
Server at skislope.com
receives request

National access
(Internet Backbone)
Regional
access
STEP 2:
Request travels to
STEP 1: server through Internet
Client computer requests access companies
access to skislope.com
through browser

STEP 4:
Request travels back to client
computer through Internet
access companies

120 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
5. Your Web browser interprets the data BITS
and displays it on your monitor. AND Citing Web Site Sources
BYTES
How does the data get sent to the
correct computer? Each time you After you’ve evaluated a Web site and determined it to be a credible source of infor-
connect to the Internet, your computer is mation that you will use in a research paper, you will need to list the source in the
assigned a unique identification number. Works Cited section of your paper. There are formal guidelines as to how to cite Web
This number, called an Internet Protocol content. Unlike those for citing books and periodicals, however, these standards are
address (or IP address), is a set of four still being developed. At a minimum, the following components should be included in
numbers separated by periods and com- the citation: author, title of document or publication, date of publication or last revi-
monly referred to as a dotted quad or dotted sion, date accessed and complete URL. Note that URL citations are no longer required
decimal such as 123.45.245.91. IP addresses by the MLA, but if a citation is still desired, it should appear in angle brackets. The fol-
are the means by which all computers lowing are examples of Web citations in both Modern Language Association (MLA)
connected to the Internet identify each and American Psychological Association (APA) style for an article found in
other. Similarly, each Web site is assigned BusinessWeek online:
an IP address that uniquely identifies it.
However, because the long strings of Example of MLA style
numbers that make up IP addresses are Fletcher, D. “How Facebook Is Redefining Privacy.” Time. 20 May 2010. 17 June
difficult for people to remember, Web sites 2010. <http://www.time.com/time/business/article/0,8599,1990582,00.html>
are given text versions of their IP addresses. Example of APA style
So the ski area’s Web site mentioned earlier Fletcher, D. (2010, May 20). How Facebook is redefining privacy. Time. Retrieved from
may have an IP address of 66.117.154.119 http://www.time.com/time/business/article/0,8599,1990582,00.html
and a text name of skislope.com. When
you type “skislope.com” into your browser For further assistance, go to citationmachine.net, which is an interactive tool de-
window, your computer (with its own signed to output citations in proper MLA or APA format, using information you provide
unique IP address) looks for the ski area’s in an online form. The current version of Microsoft Word also includes citation and
IP address (66.117.154.119). Data is bibliography formatting for most of the standard formats, and sites such as Son of
exchanged between the ski area’s Citation Machine (citationmachine.net) and Purdue Online Writing Lab (owl.english.
server computer and your computer purdue.edu) are also available.
using these unique IP addresses.

Connecting to the usually has a data transmission rate of


Internet 256 Kbps (kilobits per second) or greater.
This high rate of access is in contrast to dial-
To take advantage of the resources the Inter- up Internet access, which has a maximum
net offers, you need a means to connect your transmission speed of 56 Kbps.
computer to it. Home users nowadays have What types of broadband are avail-
several connection options available. Origi- able? The standard broadband technolo-
nally, the only means to connect to the Inter- gies in most areas are digital subscriber
net was with a dial-up connection. With line (DSL), which uses a standard phone
dial-up connections, you connect to the In- line to connect your computer to the
ternet using a standard telephone line. How- Internet, and cable, which uses your
ever, dial-up connections are becoming television’s cable service provider to
legacy technology because other, faster con- connect to the Internet. Fiber-optic service,
nection options exist. In many parts of the
world, these faster connections are quickly
becoming the preferred method of connect-
ing to the Internet.
SOUND Connecting to the
BYTE Internet
Broadband Connections In this Sound Byte, you’ll learn the basics of connect-
What is broadband? Broadband, often ing to the Internet from home, including useful infor-
referred to as “high-speed Internet,” refers mation on the various types of Internet connections
to a type of connection that offers a faster and selecting the right ISP.
means to connect to the Internet. Broadband

Connecting to the Internet 121


which uses plastic or glass cables to transfer technology, many areas in the United States,
data at the speed of light, has in the past especially rural ones, still do not have DSL
few years become available as a broadband service available.
service to the home. Satellite broadband What are the limitations to DSL
is mostly used in rural or mountain areas and cable? Although cable and DSL
that cannot get DSL, cable, or fiber-optic speeds are about the same, each has its own
service. particular limitations. DSL signals are sensi-
How does cable work? A cable tive to distance. There is a maximum dis-
Internet connection uses the same tance of about 3 miles between where the
coaxial cable used by cable TV; however, signal originates, called the central office, and
cable TV and cable Internet are separate the customer’s location. The further the con-
services. Cable TV is a one-way service in nection is from the central office, the weaker
which the cable company feeds program- the signal is. Although cable is not limited
ming signals to your television. To bring by distance like DSL, cable services are
two-way Internet connections to homes, shared between users, so in peak usage
cable companies must upgrade their times, cable connection speeds can slow
networks with two-way data transmission down.
capabilities. How does fiber-optic service
How does DSL work? Similar to a work? Fiber-optic service uses fiber-optic
dial-up connection, DSL uses telephone lines, which are strands of optically pure
lines to connect to the Internet. However, glass or plastic that are as thin as a human
unlike dial-up, DSL allows phone and data hair. They are arranged in bundles called
transmission to share the optical cables and transmit
same line, thus eliminating data via light signals over
the need for an additional
phone line. Phone lines are
made of pairs of twisted cop-
“ Fiber-optic long distances. Because
service transfers light travels so quickly, this
technology can bring an
data at the speed enormous amount of data
per wires known as twisted-
pair wiring. The of light. to your home at superfast
bandwidth of the copper
wires is split into three
sections, similar to a three-lane highway
” speeds. When the data
reaches your house, it’s
converted to electrical pulses that
on which only one lane is used to carry transmit digital signals your computer
voice data. DSL uses the remaining two can “read.”
lanes to send and receive data separately at What special equipment do I need
much higher frequencies. Thus, although to hook up to broadband? A broad-
it uses a standard phone line, a DSL band Internet connection requires a modem.
connection is much faster than a dial-up Depending on the type of broadband service
connection. you have, you will have either a cable
Can anyone with a phone line have modem or DSL modem. The modem works
DSL? Having a traditional phone line in to translate the broadband signal into digital
your house doesn’t mean that you have data and back again. With both cable and
access to DSL service. Your local phone DSL services, the modem allows the data to
company must have special DSL technology travel on the unused capacity of the trans-
to offer you the service. Although more mission medium.
phone companies are acquiring DSL For example, a DSL modem (see
Figure 3.33) separates voice signals from
data signals so that they can travel in the
ACTIVE right “lane” on the twisted-pair wiring.
HELP-
Connecting to the Voice data travels at a slower speed than
DESK Internet digital data, which can travel at rates rang-
ing from 500 Kbps to 6,000 Kbps [6 megabits
In this Active Helpdesk call, you’ll play the role of a per second (Mbps)]. Sometimes a DSL filter
helpdesk staffer. You will field calls about various is required in DSL installations. Filters are
options for connecting to the Internet and how to necessary to reduce interference caused
choose an Internet service provider. when the DSL equipment shares the same
lines as the standard phone line. If a filter is

122 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
required, the phone line fits into the filter, networks. The newest wireless access
and the filter plugs into the phone’s wall technology to be deployed for mobile and
jack. stationary broadband
Generally, the modem is located some- access is WiMAX.
where near your computer and is con- WiMAX is designed to
Cable runs to network
nected to an expansion (or interface card extend local WiFi
adapter) card called a networks across
network interface card greater distances,
(NIC), which is located such as across a
inside your computer. campus. Mobile
If you want to share WiMAX is an alter-
your Internet connec- native to cellular
tion with more than transmission of voice
one computer, you will and high-speed data. Even
also need a router. wireless in-flight Internet service
What options is available! Gogo (gogoinflight.
exist when cable Figure 3.33 com) is a wireless broadband
and DSL are not network that provides coverage
You need a special DSL modem to
available? Satellite connect to the Internet using DSL. on participating airlines across the
Internet is another way continental United States, so
to connect to the Inter- when you are cleared to use your
net. Most people portable electronic devices, you
choose satellite Internet when other high- can comfortably access wireless Internet
speed options are unavailable. To take ad- from 35,000 feet.
vantage of satellite Internet, you need a How does one access the Internet
satellite dish, which is placed outside your wirelessly? To access the Internet wire-
home and connected to your computer with lessly, you need to be in a wireless fidelity
coaxial cable, the same type of cable used for (WiFi) hot spot and have the right equip-
cable TV. Data from your computer is trans- ment on your mobile device. Most note-
mitted between your personal satellite dish books, smartphones, game systems, and
and the satellite company’s receiving satel- PMPs sold in the past several years come
lite dish by a satellite that sits in a geosyn- equipped with wireless capability built in,
chronous orbit thousands of miles above but if not, several wireless adapters are
the Earth. available.
For your own personal WiFi, it’s simple to
set up a wireless network at home (see
Chapter 7 for details), and many businesses
Wireless and schools, as well as public places such as
Why is wireless Internet access airports, libraries, bookstores, and restau-
necessary? In our ever-more-mobile rants, offer WiFi. Some public places offer free
lifestyles, accessing the Internet wirelessly WiFi access, but many others require you to
can make our lives more productive, and buy wireless access through a wireless access
perhaps a bit more flexible, allowing us to service plan. For example, McDonald’s pro-
work away from our desks. Students can vides WiFi access through AT&T, Barnes &
use their notebook computers or smart- Noble provides WiFi through T-Mobile, and
phones to send instant messages to each Starbucks uses Boingo for its WiFi access. To
other across campus, and business access these WiFi services, you can pay for a
travelers can quickly grab their e-mail single session or a monthly membership, or
between flights. At home, wireless you can sign up for a longer-term subscrip-
networks allow us to share an Internet tion in which you receive monthly bills.
connection and print from our notebooks WiFi Free Spot (wififreespot.com) and
from any room without having to attach WiFiHotSpotList.com will help you locate
and detach wires. a free hot spot wherever you are planning
In some communities, organizations are to go.
now installing wireless or WiFi networks; If you need to access the Internet
and in some cities and towns, local govern- wirelessly and do not want the hassle of
ments are installing municipal WiFi looking for a WiFi hot spot, you can

Connecting to the Internet 123


DIG
DEEPER
Discovering the Semantic Web

How do we find information on the Web? Generally, we access Google or could enter your preferences into a computerized software agent, which
another search engine, type in the keyword or search phrase, and click would then search the Web for you, find the best option based on your
the search button. As a result, millions of links to Web pages display. At criteria, and place the order. Additionally, the agent would be able to
best, we click on the first several links that seem reasonably relevant to record the financial transaction into your personal bookkeeping software
our search. Rarely, if ever, do we explore all of the links that are found in and arrange for a technician to help install your purchase, if needed.
the search results. The Semantic Web would use software agents that roam from page
Similarly, think about all the other types of data on the Web that we to page, completing sophisticated tasks. These agents would not read
access manually, such as contact information, appointment times, trans- words, look at pictures, and process information as humans do, but
portation schedules, entertainment schedules, medical treatments, and rather would search through metadata. Metadata is machine-readable
store types, locations, and hours. It would seem that computers would be data that describes other data in such a way that the agents can identify
helpful in plugging through all of this Web data, but oddly, that is not the and define what they need to know. Like Web page coding, which is now
case. Web pages are designed for people to read, not for computers to done in HTML, XML, and other formats, metadata would be invisible to
manipulate. Although computers can determine the parts and functional- humans reading pages on the Web but would be clearly visible to com-
ity of Web pages (headers, hyperlinks, etc.), as yet no reliable way exists puters, in essence turning the Web into a giant database.
for computers to process the meaning of the data so that they can use The introduction of eXtensible Markup Language (XML) has helped
the information to see relationships or make decisions. make the user of the Web more of a participant. Web 2.0 technologies
The Semantic Web is an evolving extension of the World Wide Web in such as blogs, wikis, and social networking sites, as well as Web-based
which information is defined in such a way to make it more easily read- applications, are in part possible because of XML’s tagging functionali-
able by computers. Tim Berners-Lee, the inventor of the World Wide Web, ties. RSS feeds also use technologies that are an underlying component
and the implementation of HTTP and HTML, thought up the Semantic of the Semantic Web.
Web. The Semantic Web would build on this type of capability so that each
Right now, search engines function by recognizing keywords such as Web site would have text and pictures (for people to read) and metadata
appointment, dentist, and root canal, but they cannot determine in which (for computers to read) describing the information on the Web (see
office and on what days Dr. Smith works and what his available appoint- Figure 3.35). The metadata would contain all the attributes of the infor-
ment times are. The Semantic Web would enable computers to find and mation, such as condition, price, or schedule availability, in a machine-
manage that type of information and coordinate it with your other sched- readable format. Businesses, services, and software would all use the
ules and preferences. same categorization structures so that similar information would share
Similarly, think about the convenience and efficiency that online the same attributes, ensuring consistency of metadata throughout the
shopping has brought to our lives. Then think about all the time we actu- Web. Then, with Web data properly identified and categorized, computer-
ally spend researching and comparing products, brands, stores, prices, ized agents could read the metadata found on different sites, compare
and shipping options. Ultimately, after all that effort, we make the final the information, and process the information based on user-defined
buying decision and place the order. With the Semantic Web in place, you criteria.

purchase an aircard such as the ones shown


Figure 3.34
in Figure 3.34. Aircards, sometimes referred
Aircards like the ones to as cellular modems, are devices that fit
pictured here fit into the
USB port or PC card slot
either into a USB port or a special slot on
on your netbook or note- the side of a notebook called an Express
book to allow you to surf card slot (also known as a PC card slot). The
the Internet wirelessly aircard enables users to have wireless Inter-
when you don’t have net access with notebooks and netbooks.
access to a WiFi hot spot.
They require a service plan, similar to a cell
phone plan. When considering purchasing
an aircard and service plan, be sure to check
the coverage and costs before deciding,
because they vary among providers.
What are concerns with
wireless? Most public hot spots are
unsecured, so use caution when accessing
the Internet from public locations. Although

124 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
Figure 3.35
I need a dentist
appointment for Web 2.0 technologies
a root canal. enable us to become
creators and users of
Internet content. The
Semantic Web enables
SEARCH: STEP 6: Agent RESULTS:
the computer to add
Dentist
returns list of Dr. Amid, 3/23 2 p.m. context to Web content,
Root canal
Seattle area acceptable results
Dr. Brett, 3/23 4 p.m. providing meaning to
Dr. Slade, 3/24 8 a.m.
As soon as possible and waits for action. information from different
sources.

STEP 1: User
enters search
criteria.

Schema and Ontology Tools

STEP 2: Agent takes search STEP 5: Agent


criteria and adds what is compares and ranks
necessary to refine search. the information.

STEP 3: Agent transfers STEP 4: Web service


task to a specific Web agent collects the
service agent to check information, along with
and compare services. your availability.

Compare services

Although some of the Semantic Web functionalities are beginning to the information currently available on the Web into the type of metadata
emerge in Web 2.0 technologies, the majority of the functionality and im- that computers could recognize. The very grandeur of that task means
plementation of the Semantic Web is still in development. The World that we will not see a fully functional Semantic Web until sometime in the
Wide Web Consortium (W3C), led by Tim Berners-Lee, is the primary distant future. In the meantime, we can continue to benefit from each
organization leading the charge. The greatest challenge is recoding all small step toward that goal.

casually surfing the Internet is fine, it’s best travel over phone lines. The computer on
not to use your credit card, for example, to the other end also must have a modem to
purchase items online from a public hot spot translate (demodulate) the received analog
because your credit card information can be signal back to a digital signal that the receiv-
captured by a lurking identity thief. See ad- ing computer can understand. Modern
ditional information on wireless security in computers generally come with internal
Chapter 7. modems built into the system unit.
What are the advantages and
disadvantages of dial-up? A dial-up
Dial-Up Connections connection is the least costly way to connect
How does a dial-up connection to the Internet. Although slower than broad-
work? A dial-up connection needs only band connections, dial-up connections are
a standard phone line and a modem. The often fine for casual Internet users who do
word modem is short for modulate/demodulate. not need a fast connection. The major down-
A dial-up modem is a device that converts side to dial-up is speed. Dial-up modems
(modulates) the digital signals the computer transfer data at a much slower rate than that
understands into analog signals that can of a basic broadband connection. Although

Connecting to the Internet 125


Figure 3.36 COMPARING CABLE, DSL, AND FIBER-OPTIC INTERNET CONNECTION OPTIONS

DSL Cable Fiber-Optic


Maximum download Average speeds of 1.5 Mbps, with a Average speeds of 5 Mbps, with a Average speeds of 20 Mbps, with a
speeds maximum of 7 Mbps maximum of 30 Mbps maximum speed of 50 Mbps.

Pros Lets you surf the Net and talk on Speeds are not dependent on distance Increased speeds. Service is not shared
the same phone line simultaneously. from central office. or dependent on distance from central
office.

Cons Speed drops as you get farther Line is shared with others in Cost, although this is a diminishing
from phone company’s central neighborhood; speeds may vary due to concern as the technology continues to
office. peak and nonpeak usage. be deployed and accepted.
Not every phone line will work. May require professional installation if Not available in all areas.
cable not already present.

Note: The data transfer rates listed in this table are approximations. As technologies improve, so do data transfer rates.

many Web pages can be sent without graph- data travels between computers. It is also in-
ics as plain text, it still can take a long time formally referred to as connection speed. For
to load a Web page, especially if it contains example, dial-up connections have a maxi-
multimedia, which is the norm for most Web mum data transfer rate of 56 Kbps (56K)
pages today. Similarly, if you visit many while broadband connections can achieve
Web sites at the same time or receive or send data-transfer rates of 10 to 1000 megabits
large files through e-mail, you’ll find that a per second (Mbps). Comparatively, satellite
dial-up connection is especially slow. An- Internet is slower than DSL and cable, and
other disadvantage of dial-up is that when fiber-optic provides the fastest transmission.
you’re on the Internet, you tie up your Finally, you may also need to consider
phone line if you don’t have a separate line. which other services you want bundled into
your payment, such as phone or TV. The
table in Figure 3.36 compares several fea-
Choosing the Right Internet tures of cable, DSL, and fiber-optic service to
help you with your decision.
Connection Option
How do I choose which Internet
connection option is best for me? The Future of the
According to a Federal Communications
Commission report released in early 2010, Internet
more than 75 percent of adults in the United The Internet of the future will have more
States use the Internet, and 65 percent of bandwidth and offer increased services. Be-
adults have home broadband access. De- cause of the prevalence of wireless technolo-
pending on the area in which you live, you gies, the Internet will be more accessible,
might not have a choice as to the type of and we will become more dependent on it.
broadband connection that is available. However, because commerce and com-
Check with your local cable TV provider, munication activities are increasingly domi-
phone company, and satellite TV provider(s) nating the Internet, the concern is that there
to determine what broadband options are will be no bandwidth left for one of the In-
available where you live and what the trans- ternet’s original purposes: exchange of sci-
fer rates are in your area. It might also be entific and academic research. Two major
good to check with your neighbors to see projects currently under way in the United
what kind of broadband connections they States to develop advanced technologies for
use. Speeds vary by neighborhood, some- the Internet are the large scale networking
times exceeding advertised rates, so it’s al- (LSN) program and Internet2.
ways good to check actual experiences. What are the large scale network-
One factor to consider in choosing the ing and Internet2 programs? Out of a
right Internet connection is speed. Data project titled the Next Generation Internet
transfer rate is the measurement of how fast (which ended in 2002), the U.S. government

126 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
created the large scale networking (LSN) BITS
program. Large scale networking’s aim is to AND National Broadband Plan
fund the research and development of BYTES
cutting-edge networking and wireless
technologies and to increase the speed of If the Federal Communications Commission (FCC) has its way, by 2020 nearly 100
networks. million, or 90%, of U.S. homes, as well as schools, hospitals, and government offices,
The Internet2 is a research and develop- will have access to more affordable broadband access of at least 100 Mbps. This
ment consortium of more than three hun- $15.5-billion National Broadband Plan proposes that such universal broadband
dred universities (supported by government access would pave the way for “economic growth, job creation, global competitive-
and industry partners) that seeks to expand ness, and a better way of life.” Universal Internet access can change how education,
the possibilities of the Internet by developing health care, energy, and public safety are delivered and managed.
new Internet technologies and disseminating In addition to ensuring that virtually every American has access to broadband In-
them as rapidly as possible to the rest of the ternet, the plan proposes to ensure that other aspects of Internet usage such as net-
Internet community. Many of the current works, devices, content, and applications are strong and functional. The plan also
technologies of the commercial Internet are proposes to help encourage greater competition in the broadband market, which can
possible because of the research done by the lead to competitive pricing and more innovative products and services among
Internet2 consortium. The Internet2 back- providers. Although the National Broadband Plan is just that—a plan—and is yet to
bone supports extremely high-speed com- be implemented, the prospects of such as plan, and the resulting innovations, is
munications—up to 8.8 gigabits per second intriguing and may make the U.S. a leader in mobile innovation.
(Gbps)—and provides an excellent testing
area for new data transmission technologies.
How else will the Internet become
a more integral part of our lives? As As other less obvious Internet-enabled
this chapter explained, the Internet is al- devices become popular and more accessible
ready an integral part of our lives. It is the to the common consumer, our lives will be-
way we communicate, shop, research, enter- come more Internet dependent. For exam-
tain, and express ourselves. Many of the ple, Internet-enabled appliances and
tools on the Web that have been described in household systems are now available that
this chapter—social networking sites, wikis, allow your home virtually to run itself.
podcasts, and user content databases such Today, there are refrigerators that can
as YouTube (for videos) and Flickr (for monitor their contents and go online to
photos)—are part of a wave of Web-based order more diet soda when they detect that
services that emphasizes online collabora- the supply is getting low. Meanwhile, Inter-
tion and sharing among users. The future net heating and cooling systems can monitor
Internet will continue to evolve with more weather forecasts and order fuel deliveries
Web-based applications driven by user when supplies run low or bad weather is
input, interaction, and content. expected. These appliances will become
In the future, you can expect to use the more widespread as the price of equipment
Internet to assist you with many day-to-day drops.
tasks that you now do manually. No longer The uses of the Internet are limited only
will PCs and mobile devices be our primary by our imaginations and the current con-
access to the Internet. We can already see the straints of technology. At some point, the
convergence of the Internet with telephony, Internet will no longer be a place we “go”
television, and gaming devices. to but an integral part of our lives.

The Future of the Internet 127


three
three summary
chapter

1. What is the origin of the Internet? 4. What are the various kinds of
The Internet is the largest computer network multimedia files found on the Web,
in the world, connecting millions of comput- and what software do I need to use
summary

ers. Government and military officials de- them?


veloped the early Internet as a reliable way The Web is appealing because of its enriched
to communicate in the event of war. Eventu- multimedia content. Multimedia is anything
ally, scientists and educators used the Inter- that involves one or more forms of media in
net to exchange research. Today, we use the addition to text, such as graphics, audio, and
Internet and the Web (which is a part of the video clips. Sometimes you need a special
Internet) to shop, research, communicate, software program called a plug-in (or player)
and entertain ourselves. to view and hear multimedia files. Plug-ins
are often installed in new computers or are
2. How can I communicate through the offered free of charge at manufacturers’
Internet? Web sites.
Communication was one of the reasons the
Internet was developed and is one of the 5. What is e-commerce, and what
primary uses of the Internet today. E-mail e-commerce safeguards protect me
allows users to communicate electronically when I’m online?
without the parties involved being avail-
E-commerce is the business of conducting
able at the same time, whereas instant-
business online. E-commerce includes trans-
messaging services are programs that
actions between businesses (B2B), between
enable you to communicate in real time
consumers (C2C), and between businesses
with others who are online at the same
and consumers (B2C). Because more busi-
time. Other forms of group communication
ness than ever before is conducted online,
include social networking sites, chat rooms,
numerous safeguards have been put in place
newsgroups, and IRC.
to ensure that transactions are protected.
3. How can I communicate and
6. What is a Web browser, and what is a
collaborate using Web 2.0
URL and what are its parts?
technologies?
Once you’re connected to the Internet, in
Web 2.0 is a trend of Web interactions
order to locate, navigate to, and view Web
among people, software, and data. Exam-
pages, you need to install special software
ples of these technologies include blogs,
called a Web browser on your system. The
wikis, and more. Blogs are journal entries
most common Web browsers are Internet
posted to the Web that are generally organ-
Explorer, Firefox, Google Chrome, and Sa-
ized by a topic or area of interest and are
fari. You gain access to a Web site by typing
publicly available. Generally, one person
in its address, called a Uniform Resource
writes the blog, and others can comment on
Locator (URL). A URL is composed of
the journal entries. Video logs are personal
several parts, including the protocol, the
journals that use video as the primary con-
domain, the top-level domain, and paths
tent in addition to text, images, and audio.
(or subdirectories).
Wikis are a type of Web site that allows
users to change content by adding, remov-
ing, or editing it. A wiki is designed to allow 7. How can I use hyperlinks and other
many users to collaborate on the content. tools to get around the Web?
Podcasts are audio or video content that is One unique aspect of the Web is that you
broadcast over the Internet. Users subscribe can jump from place to place by clicking on
to receive updates to podcasts. Social net- specially formatted pieces of text or images
working sites enable users to communicate called hyperlinks. You can also use the Back
and share information with existing friends and Forward buttons, History lists, bread-
as well as to meet and connect with others crumb trails, and Favorites or Bookmarks to
through common interests, experiences, or navigate the Web. Favorites, live bookmarks,
friends. and social bookmarking help you return to

128 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
summary
three three

chapter
specific Web pages without having to type 9. How does data travel on the Internet?
in the URL and help you organize the Web A computer connected to the Internet acts as
content that is most important to you. either a client (a computer that asks for

summary
information) or a server (a computer that
8. How do I search the Internet receives the request and returns the
effectively, and how can I evaluate information to the client). Data travels
Web sites? between clients and servers along a system
A search engine is a set of programs that of communication lines or pathways. The
searches the Web using specific keywords largest and fastest of these pathways is the
you wish to query and then returns a list of Internet backbone. To ensure that data is
the Web sites on which those keywords are sent to the correct computer along the
found. Search engines can be used to search pathways, IP addresses (unique ID
for images, podcasts, and videos in addition numbers) are assigned to all computers
to traditional text-based Web content. A sub- connected to the Internet.
ject directory is a structured outline of Web
sites organized by topic and subtopic. 10. What are my options for connecting
Metasearch engines search other search to the Internet?
engines. Home users have many options for connect-
Not all Web sites are equal, and some are ing to the Internet. A dial-up connection, in
better sources for research than others. To which you connect to the Internet using a
evaluate whether it is appropriate to use a standard phone line, was at one time the
Web site as a resource, determine whether standard way to connect to the Internet.
the author of the site is reputable and Today’s broadband connections are faster
whether the site is intended for your partic- and have made dial-up a legacy connection
ular needs. In addition, make sure that the technology. Broadband connections include
site content is not biased, the information in cable, DSL, and fiber-optic. Satellite is a
the site is current, and all the links on the connection option for those who do not have
site are available and appropriate. If multi- access to faster broadband technologies.
ple sites offer the same content, then it is an- WiFi allows users to connect to the Internet
other indication that the information is wirelessly, but are not as fast as wired
accurate. connections.

129
three
three key terms
chapter

aggregator ............................................................. 103 large scale networking (LSN) ........................... 127


aircard.................................................................... 124 live bookmark...................................................... 114
blog (weblog) ....................................................... 100 multiplayer online games.................................. 106
key terms

Bookmarks............................................................ 114 massive multiplayer online role-playing


Boolean operator ................................................. 117 games (MMORPG).......................................... 106
breadcrumb trail.................................................. 113 metasearch engine............................................... 115
broadband ............................................................ 121 modem................................................................... 122
business-to-business (B2B) ............................... 108 multimedia ........................................................... 106
business-to-consumer (B2C) ............................. 108 multiplayer online game ................................... 106
cable ....................................................................... 121 netiquette.............................................................. 98
chat room .............................................................. 98 network interface card (NIC) ............................ 123
client ...................................................................... 120 newsgroup ............................................................ 98
client/server network.......................................... 120 path (subdirectory).............................................. 113
consumer-to-consumer (C2C) ........................... 108 plug-in (player).................................................... 107
data transfer rate.................................................. 126 podcast .................................................................. 102
dial-up connection .............................................. 121 Really Simple Syndication (RSS) .................... 103
dial-up modem .................................................... 125 satellite Internet .................................................. 123
digital subscriber line (DSL) ............................ 121 search engine ....................................................... 115
domain name ....................................................... 112 server ..................................................................... 120
e-commerce (electronic commerce).................. 108 social bookmarking (tagging)........................... 114
e-mail (electronic mail) ...................................... 95 social networking................................................ 114
e-mail client.......................................................... 97 spider ..................................................................... 115
Express card slot (PC card slot)......................... 124 streaming audio................................................... 106
Favorites................................................................ 114 streaming video ................................................... 106
fiber-optic service ............................................... 121 subject directory .................................................. 115
file transfer protocol (FTP) ................................ 112 top-level domain ................................................. 112
home page............................................................. 112 Uniform Resource Locator (URL) .................... 112
host......................................................................... 112 video log (vlog or video blog)........................... 112
hyperlink .............................................................. 113 Web 2.0 .................................................................. 99
hypertext transfer protocol (HTTP) ................. 112 Web browser (browser) ...................................... 95
instant messaging (IM) ...................................... 97 Web server ............................................................ 112
Internet.................................................................. 94 Web site................................................................. 112
Internet backbone ............................................... 120 webcast.................................................................. 104
Internet Protocol address (IP address) ............ 121 wiki ........................................................................ 102
Internet Relay Chat (IRC).................................. 98 World Wide Web (WWW or the Web) ............. 94
keyword ................................................................ 115

130 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
buzzwords
three three

chapter
Word Bank
• blogs (weblogs) • instant messaging (IM) • Uniform Resource
• Bookmarks • keyword Locators (URLs)

buzzwords
• broadband • podcast • Web 2.0
• DSL • search engine • Web browser
• fiber-optic service • social bookmarking • WiFi
(FiOS) • social networking • wiki
• hyperlink • tag

Instructions: Fill in the blanks using the words from the Word Bank above.

Juan rests his new notebook on his lap and powers it up while waiting for his next class to
begin. Using the (1) __________ access provided by his college, Juan is able to connect to the
Internet wirelessly. Although the school’s wireless access to the Internet is fast, it’s not as
fast as the (2) __________ connection at home, because his parents just switched to
(3) __________, which transfers data at the speed of light.

Knowing he has only a few minutes before class, Juan launches Internet Explorer, the
(4) __________ software from Microsoft that allows him to connect to the Internet. He
quickly goes to Facebook, the (5) __________ site, to catch up on the activities of his friends.
He also reads a few of the updates to the online journal Engadget.com, one of his favorite
(6) __________. He’s glad that the new (7) __________ technologies make such collaboration
possible. Just before class begins, Juan’s friend Marie, who is using her (8) __________ serv-
ice, sees that Juan is available on her buddy list. She sends him a quick, real-time note to let
him know she’ll catch up with him after class.

At home, Juan types in a (9) __________ in Google, the (10) __________, to find Web sites for
a research paper. One of the first sites listed is Wikipedia, the online encyclopedia that takes
advantage of the collaborative nature of (11) __________ technology. Because anyone can
add, change, or edit content on Wikipedia, Juan knows that he can’t rely completely on this
information but finds that it is usually a pretty good starting point for his research. Juan

computer
clicks on a (12) __________, the specially coded text at the bottom of the Wikipedia article,
which links him to another Web site. He adds a (13) __________ with a meaningful keyword
in the (14) __________ site Delicious so he can return to it later. Finally, before going to bed,
Juan listens to a (15) __________ of one of his favorite radio shows that he subscribed to
literate
becoming
recently.

becoming
computer literate
Using key terms from the chapter, write a letter to the owners of your local coffee shop
explaining why they should make it a WiFi hot spot. Include in your letter the advantages
WiFi would bring to the customers and identify some security considerations that
customers need to be aware of.

131
three
three self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which is NOT true about the Internet? 6. What feature is a list of pages you’ve
a. It is the largest computer network visited within a Web site?
in the world. a. Favorites
b. It was created to establish a b. Breadcrumb trail
secure form of military c. Bookmarks
communications. d. History
c. It was developed as a method for 7. Which is NOT part of a search
linking research documents. engine?
d. It was invented as a way for all a. Spider
computers to communicate. b. Indexer program
2. What do you need to read, send, and c. Subject directory
organize e-mail from any computer? d. Search engine software
a. An e-mail client program 8. When using the Internet for research,
b. An e-mail server you
c. An Internet service provider a. can assume that everything you
d. A Web-based e-mail account find is accurate and appropriate.
3. Which is NOT an example of social b. should evaluate sites for bias and
networking? relevance.
a. E-mail c. should use the most current
b. Instant messaging sources.
c. Blogging d. can assume that the links
d. Listserv provided on the site are the only
4. In which way is a blog different from additional sources of information.
a wiki? 9. Which connection type provides the
a. Blogs are used to express opinions. fastest data transmission?
b. Blogs are written by a single a. DSL
author. b. Cable
c. Blogs include images and audio. c. Fiber-optic
d. Blogs are arranged as a listing of d. Satellite
entries. 10. What current program funds the
5. Which is true about plug-ins? research and development of
a. Plugs-ins rarely require updating. cutting-edge networking and wireless
b. Plug-ins track the Web sites technologies?
you’ve visited. a. Large scale networking
c. Plug-ins are necessary for b. Internet2
viewing most Web graphics. c. Web 2.0
d. Plug-ins can present security risks. d. ARPANET

True–False
_____ 1. The information in e-mail is no more private than a postcard.
_____ 2. Consumers buy books, movie tickets, and games more often online than in retail
stores.
_____ 3. The VeriSign seal on a Web site guarantees that the Web site is secure.
_____ 4. Each time you connect to the Internet, your computer is assigned the same IP
address.
_____ 5. Internet connection speeds vary by neighborhood, sometimes exceeding adver-
tised rates.

132 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
making the
three three

chapter
transition to...
next semester
1. Online Support Facilities

transition to...
Your school most likely has many online support facilities. Do you know what they
are? Go to your school’s Web site and search for online support.
a. Is online tutoring available?

next semester
making the
b. Can you reserve a book from the library online?
c. Can you register for classes online?
d. Can you take classes online?
e. Can you buy books online?

2. Plagiarism Policies
Does your school have a plagiarism policy?
a. Search your school’s Web site to find the school’s plagiarism policy. What does it
say?
b. How well do you paraphrase? Find some Web sites that help test or evaluate your
paraphrasing skills.
c. Create an account at Turnitin.com. This Web site checks your written work against
content on the Web and produces an originality report. Submit at least three differ-
ent drafts of your work to Turnitin.com to check for any intended or unintended
cases of plagiarism before submitting your final work for a grade. What were the
results?

3. Searching Beyond Google


While Google is probably your first choice among search engines, there are many other
very good search engines that are good to know about. Conduct searches for inexpen-
sive travel deals for spring break by using the following search engines. Record your
results and a summary of the differences among search engines. Would you choose to
use any of these search engines again? Why or why not?
a. Clusty.com
b. Dogpile.com
c. Rollyo.com

4. Free Speech Online


Leila was suspended from school for several days because her posts on MySpace about
her teacher and a few of her classmates were “vulgar” and “derogatory.” Daniel was
expelled from his school because the picture he posted of himself was in violation of his
school’s code of conduct. Similarly, Bill, a local employer, changed his mind about a job
offer to a recent graduate after seeing questionable content on the candidate’s Facebook
page.
a. Should a person be penalized for his or her content on any Web site?
b. Is the issue denial of free speech or prudent reactions to improper behavior?
c. The Federal Bureau of Investigation (FBI) is working undercover in social network-
ing sites to gather information. What are the benefits and drawbacks of this?

5. Using Web 2.0 in Education


Social networking sites, blogs, and wikis are commonly referred to as Web 2.0 technolo-
gies. Sites that use Web 2.0 offer opportunities for collaboration, creativity, and
enterprise. Describe how Web 2.0 sites such as Wikipedia, YouTube, Delicious, and
Digg might change how you learn and manage information.

133
three
three making the
chapter

transition to...
the workplace the workplace
1. Online Résumé Resources
making the

Using a search engine, locate several Web resources that offer assistance in writing a
transition to...

résumé. For example, the University of Minnesota (umn.edu/ohr/careerdev/resources/


resume) has a résumé tutor that guides you as you write your résumé.
a. What other Web sites can you find that help you write a résumé?
b. Do these sites all offer the same services and have the same features?
2. Online Job Search
After you’ve created a resume, you need to know how to get it to the right people and man-
age the job search process. A wealth of online job search resources is available to help you
with these details. Research the following Web sites and write a brief description of each
that outlines the benefits and role in a job search:
a. LinkedIn.com
b. JibberJobber.com
c. VisualCV.com
d. Monster.com
3. Evaluating Web 2.0 Content
You are aware of the guidelines you should use to evaluate the quality of content on a Web
site, but you find yourself using other kinds of Web content such as blogs, wikis, social net-
working sites, and social bookmarks. Visit http://library.albany.edu/usered/eval/evalweb
and review the new guidelines for evaluating Web content in the 2.0 environment. After re-
viewing the guidelines, describe the guidelines for evaluating Web content in the following:
a. Blogs and wikis
b. Google Scholar (scholar.google.com)
c. California Digital Library (cdlib.org)
d. Twitter (twitter.com)
e. Delicious (delicious.com)
f. Connotea (connotea.org)
4. Internet Connection Option
Now that you’ve graduated, you are planning to move into your first apartment and
leave behind the comforts of broadband access at the residence halls. Evaluate the Internet
options available in your area.
a. Create a table that includes information on broadband services in your area. The table
should include the name of the provider, the cost of the service, information on bundled
services (TV, Internet, phone), and the cost of bundled services.
b. Based on the table you create, write a brief paragraph describing which service you
would choose, and why.
5. Internet Connection Speed
You would like to know how fast your Internet connection speed is. Your co-worker in the
information technology (IT) department recommended that you check out broadband.gov.
a. Test your connection speed. How is the test conducted? What is used to measure the
connection speed?
b. List reasons why you would be interested in measuring your Internet connection speed.
6. Facebook Privacy and Security
Your aunt contacted you last night. Your cousin, who is 14, wants a Facebook account. Your
aunt has heard lots of stories of how difficult it is to protect your privacy on Facebook, and
she wants your advice. Research the privacy and security settings on Facebook and create a
“Users Guide” for your aunt to work through with your cousin. Make sure you include in-
formation on how to remove your cousin from Facebook search results, make contact infor-
mation private, keep friendships private, adjust Wall posting visibility, set up photo album
privacy, customize photo tagging, and explain what personal information should and
should not be included on your cousin’s profile.

134 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
critical thinking
three three

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Social Networking and Society


Social networking seems to have taken over our lives! Almost everyone is on Facebook
and Twitter. But is this a good thing?
a. What advantages and disadvantages does social networking bring to your life?
b. What positive and negative effects has social networking had on society as a whole?
c. How are businesses using social networking?
d. How might you see social networking evolving in the next two or three years?

2. File Swapping Ethics


Downloading free music, movies, and other electronic media from the Internet,
although illegal, still occurs on sites such as BitTorrent.
a. Do you think you should have the ability to download free music files of your
choice? Do you think the musicians who oppose online music sharing have made
valid points?
b. Discuss the differences you see between sharing music files online and sharing CDs
with your friends.
c. The current price to buy a song online is about $1. Is this a fair price? If not, what
price would you consider to be fair?

3. The Power of Google


Google is the largest and most popular search engine on the Internet today. Because of
its size and popularity, some people claim that Google has enormous power to influ-
ence a Web user’s search experience solely by its Web site ranking processes. What do
you think about this potential power? How could it be used in negative or harmful
ways?
a. Some Web sites pay search engines to list them near the top of the results pages.
These sponsors therefore get priority placement. What do you think of this policy?
b. What effect (if any) do you think that Google has on Web site development? For ex-
ample, do you think Web site developers intentionally include frequently searched
words in their pages so that they will appear in more hits lists?
c. When you google someone, you type their name in the Google search box to see
what comes up. What privacy concerns do you think such googling could present?
Have you ever googled yourself or your friends?

4. Internet and Politics


What role has the Internet played in political campaigns? What role will it play in the
future? Do you see the day when voting will happen through the Internet? Why or
why not?

135
three
three team time
chapter

Comparing Internet Search Methods

Problem
team time

With millions of sites on the Internet, finding useful information can be a daunting—and, at
times, impossible—task. However, there are methods to make searching easier, some of
which have been discussed in this chapter. In this Team Time, each team will search for spe-
cific items or pieces of information on the Internet and compare search methodologies.

Process
Split your group into three or more teams, depending on class size. Each group will create a
team wiki using free wiki software such as that found at pbworks.com. To appreciate the
benefits of wiki collaboration fully, each team should have at least five or six members.

1. Each team should come up with a theme for its wiki. Suggestions include the
following:
• Best computer technology Web sites
• Coolest new technology gadgets
• All-time greatest rock ’n’ rollers
• All-time greatest athletes
• Best places to visit in the United States
• Best beaches in the United States
• Best skiing areas in the United States
2. Each student should pick one example to research and then must design a wiki page
highlighting that subject. For example, if the team chose all-time greatest rock ’n’
rollers, one student could select Bruce Springsteen and create a wiki page on Bruce
Springsteen. The wiki page should contain links to other Web sites and, if possible,
images and videos.
3. After the team wikis are created, teams should make their wikis available to the other
teams for comments.

Conclusion
After all the team wikis have been completed and shared, discuss the following with your
class. What is the benefit of using wiki technology to create team pages? How did wikis
help or hinder the team process? What other conclusions can the class draw about using
wiki technology?

136 Chapter 3 Using the Internet: Making the Most of the Web’s Resources
ethics
three three

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an
ethical solution.

Topic: Plagiarism
Plagiarism, or portraying another’s work as your own, has been around for a long while
and extends well beyond the classroom. For example, Nick Simmons, the son of Gene
Simmons (KISS) and a member of A&E’s Family Jewels reality series, created a comic book
series “Incarnate.” Radical Publishing picked up the series but quickly stopped publication
when Internet messages accused the author of copying from other similar series. Similarly,
the Australian band Men at Work was cited for copying a melody from “Kookaburra Sits in
the Old Gum Tree” for its 1980s hit “Down Under” and owes the owner years of royalties.

Research Areas to Consider

• Plagiarism violations
• Comic book series “Incarnate”
• Australian band Men at Work
• Plagiarism consequences

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has violated
plagiarism rules.
2. Team members should write a summary that provides background information for
their character—for example: author, publisher, or arbitrator—and details their charac-
ter’s behaviors to set the stage for the role-playing event. Then team members should
create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the chat room feature of MyITLab, the discussion board feature of Blackboard, or
meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of an argument, while responding in a personally or socially ethical manner, will be an im-
portant skill.

137
T E C H N O L O G Y

y
rit
cu
Se
Computer Abuse

Information Technology

ethics In this Technology in Focus section, we explore what ethics is, how
your personal ethics develop, and how your personal ethics fit
into the world around you. We’ll also examine how technology
and ethics affect each other and how technology can be used
to support ethical conduct. Finally, we’ll examine several key
issues in technology ethics today, including the areas of social
justice, intellectual property rights, privacy, e-commerce, free
speech, and computer abuse.

138
I N F O C U S

People speak of ethics—and the lack of ethics—casually all the


time, but the ethical choices that individuals make are an
extremely serious matter and can have a far-reaching impact. It
is important to have a clear idea of what ethics are, what your
personal ethics are, and how personal ethics fit into the world at
large.

139
ETHICS IN COMPUTING anyone else? Another ethical philosophy is
situational ethics, which states that decision
You just bought a new notebook computer.You making should be based on the circumstances
know you can go to BitTorrent or LimeWire to of a particular situation and not on fixed laws.
download the latest summer blockbuster Many other ethical systems have been pro-
movie and its soundtrack.You also probably posed over time, some of which are defined by
know this is unethical. Although pirating music religious traditions. For example, the expres-
and videos is a valid example of unethical be- sion “Judeo-Christian ethics”refers to the
havior, it has been overused as an illustration of common set of basic values shared across the
the ethical challenges of technology. There is a Jewish and Christian religious traditions.
vast range of ethical issues surrounding tech- These include behaviors such as respecting
nology (as shown in Figure 1), several of which property and relationships, honoring one’s
we will discuss in this section. Many other is- parents, and being kind to others.
sues are discussed in the Ethics in IT sections
of each chapter throughout the book. Are laws established to guide peo-
ple’s ethical actions? Laws are for-
WHAT IS ETHICS? mal, written standards designed to apply to
everyone. Laws are enforced by government
Ethics is the study of the general nature of agencies (such as the police, the Federal Bu-
morals and of the specific moral choices made reau of Investigation, the Food and Drug Ad-
by individuals. Morals involve conforming to ministration, and so on) and interpreted by
established or accepted ideas of right and the courts. It is not possible to pass laws that
wrong (as generally dictated by society), and cover every possible behavior that human be-
are usually viewed as black and white. Ethical ings can engage in. Therefore, societal ethics
issues often involve subtle distinctions, such as provides a general set of unwritten guidelines
the difference between fairness and equity. for people to follow.
Ethical values are the guidelines you use to Rule utilitarianism is an ethical theory that
make decisions each day. For example, the espouses establishing moral guidelines through
person in front of you at the coffee shop drops specific rules.The idea behind this system is that
a dollar on the floor and doesn’t notice it. Do if everyone adheres to the same moral code, so-
you tell him or her about it, or do you pick up ciety as a whole will improve and people will be
the dollar and use it to pay for your coffee? happier. Many societies follow this system in
general terms, including the United States. For
Doesn’t everyone have the same instance, laws against nudity in public places
basic ethics? There are many systems of (except for a few nude beaches) in the United
FIGURE 1 ethical conduct. Relativism is a theory that States help define public nudity as immoral.
Ethics in computing holds that there is no universal moral truth and
covers a wide range that instead there are only beliefs, perspectives, Don’t some people behave unethi-
of areas, not just pri- and values. Everyone has his or her own ideas cally? Although many valid systems of
vacy and security. of right and wrong, and so who are we to judge ethical conduct exist, sometimes people act in
a manner that violates the beliefs they hold or
the beliefs of the ethical system they say they
follow. Unethical behavior can be defined as
not conforming to a set of approved standards
of social or professional behavior. For instance,
using your phone to text message a test
answer to your friend during an exam is
prohibited by many colleges’ rules of student
conduct. This behavior is different from
amoral behavior, in which a person has no
sense of right and wrong and no interest in
the moral consequences of his or her actions.

Is unethical behavior a euphemism


for illegal activity? Unethical behavior
does not have to be illegal. An example of an
unethical but not illegal practice is supermarket

140 TECHNOLOGY IN ACTION


slotting fees. These are fees that some super- such behavior justified
markets charge to produce companies and in this setting? After
product manufacturers for the privilege of all, you do intend to
having their products placed on store shelves. finish that last credit,
This is considered unethical by many people and you would work
because it puts smaller companies, which really hard for this
often don’t have the financial resources to pay company if you were
these fees, at a disadvantage. hired. If you tell the
Not all illegal behavior is unethical. Civil dis- truth and state that you
obedience, which is manifested by intentionally haven’t finished college
refusing to obey certain laws, is used as a form yet, then you might be
of protest to effect change in extreme situations. passed over for the
Gandhi’s nonviolent resistance to the British position. Making this
rule of India, which led to India’s establishment choice is an ethical
as an independent country, is an example of decision (see Figure 2).
civil disobedience. Although the British were
ruling India, is it ever ethical for one country to How do a per-
control another country’s people? son’s ethics develop? Many elements FIGURE 2
contribute to your ethical development (see It would be nice if
Which system of ethics works Figure 3). Naturally, your family has a major there were signposts
best? There is no universal agreement on role in establishing the values you cherish in to ethical conduct,
but the issues are
which is the best system of ethics. Most your own life, and these might include a cul- complex.
societies use a blend of different systems. tural bias toward certain moral positions.Your
Regardless of the ethical system of the religious affiliation is another major influence
society in which you live, all ethical decisions in your ethical life, because most religions
are greatly influenced by personal ethics. have established specific codes of ethical con-
duct. How these sets of ethics interact with the
values of the larger culture is often challeng-
PERSONAL ETHICS ing. Issues such as abortion, the death penalty,
What are personal ethics? Every day and war force confrontations between per- FIGURE 3
you say certain things and take specific actions, sonal ethical systems and the larger society’s Many different forces
and at each point you are making decisions established legal-ethical system. shape your ethical
based on some criterion. It may be that you are worldview.
trying to care for the people around
you, or are trying to eliminate a Family
source of pain or anger in your life.
Your words and actions may also be
driven by a combination of criteria.
As you choose your words and ac-
tions, you are following a set of per-
sonal ethics—a checklist of personal
decisions you have compiled to or- Religion Don’t litter. Experience
ganize your life. Some people have a
clear, well-defined set of principles
they follow. Others’ethics are incon-
Your ethical behavior
sistent or are applied differently in
similar situations.
It can be challenging to adhere to
your own ethical system if the con- Don’t tell lies. Teachers Don’t speed or you’ll
sequences of your decisions today get a ticket.
might lead to an unhappy result for
you in the short term. For instance,
to get the job of your dreams, should
you exaggerate a bit on your résumé
and say you’ve already finished your
Don’t cheat on tests or
college degree, even though you are you’ll fail.
still one credit short? Is this lying? Is

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 141


As you mature, your life experiences also relationships that would merit listing them
affect your personal ethics. Does the behavior in a code of ethics?
you see around you make sense within the 4. Consider “why.” After writing down your
ethical principles that your family, your beliefs, think about why you believe them.
church, or your first-grade teacher taught you? Have you accepted them without investi-
Has your experience led you to abandon some gation? Do they stand up in the context of
ethical rules and adopt others? Have you your real-world experiences? For which of
modified how and when you apply these laws these values would you make short-term
of conduct, depending on what is at stake? sacrifices in order to uphold your beliefs?
What if I’m not sure what my per- 5. Prepare a statement of values. It can be
sonal ethics are? When you have a useful to distill what you have written
clear and firm idea of what values are most into a short list. By having a well-defined
important to you, it may be easier to handle statement of the values you hold most
situations in your professional and your per- important in your own life, which you
sonal life that demand ethical action. Follow can refer to in times of challenge, it will
these steps to help define your personal ethics: be easier for you to make ethical
decisions.
1. Describe yourself. Write down words
that describe who you are, based on how
others view you. Would a friend describe Are there tangible benefits to ethi-
you as honest, or helpful, or kind? cal living? Society has established its
own set of rules of conduct in the form of
2. List your beliefs. Make a list of all the
laws. Ignoring or being inconsistent in follow-
beliefs that influence your decision mak-
ing these principles can surely have an imme-
ing. For example, would you be comfort-
diate impact. Whether it is complying with a
able working as a research assistant in a
law that affects the way your business is run,
lab that infected animals with diseases
or with a law that affects your personal life
and used them for medical research? How
(don’t exceed the speed limit or you’ll receive
important is it to you that you never tell a
a fine), decision-making principles that work
lie? Consider whether your answers to
with society’s legal boundaries can make your
each of these questions are “flexible.”Are
life much simpler.
there situations in which your answers
More and more research is showing the
might change (say, if a friend were ill or in
health benefits of ethical living. When your
FIGURE 4 danger)?
day-to-day decisions are in conflict with the
The field of positive 3. Identify external influences. Consider values you consider most important as a
psychology shows the places where you work and live and human being, you often develop stress and
that living and work- how you relate to the people you see anger. Constant conflict between what you
ing ethically affects during the day. Are there things that you
your happiness. value and what actions you are forced to take
would like to change about these can lead to a variety of types
of mental and physical dam-
age.
Perhaps even happiness
itself is a result of living
ethically (see Figure 4).
Positive psychology is a new
focus in the field of psychol-
ogy. Pioneered by Dr. Martin
Seligman of the University of
Pennsylvania, this field works
to discover the causes of hap-
piness instead of addressing
the treatment of mental dys-
functions. Dr. Seligman’s re-
search has shown that, by
identifying your personal
strengths and values, and
then aligning your life so that

142 TECHNOLOGY IN ACTION


you can apply them every day, you can experi- Airlines objected to photos that she posted of
ence an increase in happiness (and a decrease herself and fellow flight attendants in their
in depression) equivalent to the effects of anti- Delta uniforms. Delta Airlines felt that the
depressant medication and therapy. Thus, find- photos were inappropriate and portrayed
ing a way to identify and then apply your negative images of Delta Airlines employees.
ethics and values to your daily life can have an Another example is Jillian Tomlinson, the
impact on your health and happiness. Australian surgeon who was suspended by
her employer for discussing medical proce-
PERSONAL ETHICS AND dures, her work environment, and fellow em-
ployees, and for posting CAT scans of
YOUR WORLDVIEW patients on her blog (although patient names
How do my personal ethics fit into were not revealed). Therefore, although your
the world at large? All of your actions, ethics might dictate one mode of behavior,
words, and even thoughts are controlled by you need to consider how your employer
your personal ideas of right and wrong. But might view your actions (see Figure 5).
do your ethics shift when you go to work?
Your employer expects you to follow the How does making ethical choices
ethics and rules of conduct that the owner in a business setting differ from
has established for the business. Although making personal ethical choices?
each person at your workplace may be trying Most personal ethical decisions involve few
to follow corporate ethical guidelines, each people, unless the decision results in a signifi-
person will follow them differently based on cant impact on society. When making ethical
his or her personal ethics. Person A may feel choices in the business world, give careful
it is acceptable to tell white lies to get more consideration to the stakeholders of the
funding for his project, whereas Person B business. Stakeholders are those people or
might believe that telling the truth at all entities who are affected by the operations of a
times is the best and only way that she can business. Before making an ethical choice for a
foster the teamwork and cooperation neces- business, you need to consider the effect that
sary to complete a project. choice will have on all of the stakeholders.
This doesn’t mean that individuals need to Typical stakeholders for most businesses are
blindly follow practices they feel are unethical customers, suppliers, employees, investors
or detrimental to society at large. Most (shareholders), financial lenders, and society.
whistle-blowers are people that report busi- For instance, suppose you decide to cut
FIGURE 5
nesses to regulatory agencies for committing costs in your restaurant by hiring undocu-
illegal acts. Other whistle blowers expose un- mented workers. While this might boost Is your boss watching
profits in the short term, the long-term impact you? Does that make
ethical (but still legal) acts by their employers you more or less
by publicizing unethical behavior through var- on stakeholders can be severe. Potential em- inclined to behave
ious media outlets. ployees who are eligible to work in the United ethically?
In summary, when you are working in a
business environment, your ethics are guided
by the ethical principles that are defined by the
business owner or management, but you are
still ultimately guided by your personal ethics.

How do employers affect personal


ethics? Should your employer have con-
trol (or even input) about your conduct out-
side of the office? Do behavior, integrity, and
honesty off the job relate to job performance?
They might. But even if they don’t, your ac-
tions could reflect poorly on your employer
from your employer’s perspective. Consider
Ellen Simonetti, who was fired by Delta Air-
lines for blogging. Even though Ms. Simon-
etti never mentioned Delta Airlines by name
on her blog (“Queen of the Sky: Diary of a
Dysfunctional Flight Attendant”), Delta

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 143


States will be denied jobs. If you are caught Ethical considerations are never black and
using undocumented workers, fines will be white. They are complex, and reasonable
levied against the business, which will cause people can have different yet equally valid
investors to lose money and may affect the views. We present alternative viewpoints in
company’s ability to repay lenders. The nega- each setting for you to consider and discuss.
tive publicity from being caught may cause a Figure 6 summarizes these issues.
downturn in business, which, in turn, might
force layoffs of employees or even closure of USING COMPUTERS TO
the business.Your simple decision on cutting
costs isn’t as simple as it may seem! SUPPORT ETHICAL
CONDUCT
TECHNOLOGY AND Although there are many opportunities to use
ETHICS: HOW ONE computers and the Internet unethically, many
more ways are available to use technology to
AFFECTS THE OTHER support ethical conduct.
In both good and bad ways, technology affects Many charitable organizations use the
our community life, family life, work environ- Internet for fund-raising. When a major earth-
ment, education, and medical research, to quake struck Haiti in 2010, organizations such
name only a few areas of our lives. Because as the Salvation Army (see Figure 7) and other
technology moves faster than rules can be for- charities supporting relief efforts used their
mulated to govern it, how technology is used Web pages to help donors quickly, easily, and
is often left up to the individual and the guid- securely make contributions to aid earthquake
ance of his or her personal ethics. victims. Using technology to garner contribu-
Technology constantly challenges our ethics tions enables charities to raise billions of dol-
as individuals and as a society. In the rest of lars quickly for relief efforts.
this Technology in Focus feature, we will ex- When you spot unethical behavior at your
plore some issues involving the relationship company, you need a fast, secure way to report
between technology and ethics. Specifically, we it to the appropriate members of management.
will examine situations in which ethics and The Sarbanes–Oxley Act requires companies to
technology touch each other: social justice provide mechanisms for employees and third
(whistle-blowing), intellectual property (inter- parties to report complaints, including ethics
national piracy), privacy (personal privacy and violations. These mechanisms are required to
technology), e-commerce (geolocation), provide the employees with anonymity. In
electronic communication issues (free speech), addition, many businesses are using their
and computer abuse (cyberbullying). Web sites to allow whistle-blowers to report

FIGURE 6

Ethics in Computing
TOPIC ETHICAL DISCUSSION DEBATE ISSUE
Social justice Are there limits to whistle-blowing? Does technology provide too easy an
access for whistle-blowing?

Intellectual property Do entire countries support software Can we impose our values and intellectual
piracy? property laws on the world?
Privacy Is personal privacy a casualty of the Should personal privacy be protected?
modern age?
E-commerce Do geolocation devices and Do the benefits of geolocation devices and
applications threaten privacy? applications outweigh the risks?

Electronic communication When does big business limit free Should companies allow the Chinese
speech? government to dictate when to curtail free
speech?

Computer abuse Whose responsibility is it to monitor Should parents bear all the responsibility
cyberbullying? of monitoring cyberbullying, or should it
be in the hands of public officials?

144 TECHNOLOGY IN ACTION


FIGURE 7
company intranet en- Most major charities
sures that employees facilitate donations
have access to infor- through the Internet.
mation whenever they
need it. By using e-
mail, a company can
communicate new
policies, or changes to
existing policies, to
employees quickly and
efficiently.
Throughout your
life, you will encounter
many ethical chal-
lenges relating to in-
formation technology.
Your personal ethics—
combined with the
ethical guidelines your
company provides and
wrongdoing anonymously, replacing previous the general ethical
e-mail and telephone hotline systems, which environment of society—will guide your
did not shield employees from being identified. decisions.
With an electronic system, it is easier for a For further information on ethics, check out
company to sort and classify complaints and the following Web sites:
designate them for appropriate action.
Electronic systems such as intranets and • ethics.csc.ncsu.edu
e-mail are also excellent mechanisms for • ethicscenter.net
informing employees about ethics policies. • business-ethics.com
Storing ethics guidelines electronically on a • business-ethics.org

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 145


Social Justice
Whistle-Blowing with Web 2.0
SUMMARY OF THE ISSUE
In a free democracy, are there still things the public does not have a right to see?
What about military secrets? What about ongoing negotiations with foreign
governments? What access should corporate whistle-blowers have to distributing
the documents and materials they have that allege abuses? Historically, there have
been tight controls over access to the media, and exceptions have been rare. One
famous case is the Pentagon Papers, a 7,000-page U.S. government report on policy
and planning for the Vietnam War. State department official Daniel Ellsberg leaked
the document in 1971, and it was published by The New York Times. A complicated
series of lawsuits was then filed against The New York Times for making the document
public.
With the tools of Web 2.0, the entire model for the distribution of information has
shifted, and now everyone has the ability to create content for the Web. WikiLeaks
(wikileaks.org) is using that ability to make private and public documents available
for viewing. Wikileaks describes itself as “a public service designed to protect
whistle-blowers, journalists, and activists who have sensitive materials to communi-
cate to the public.”Time magazine said of WikiLeaks, “[I]t could become as important
a journalistic tool as the Freedom of Information Act.”
Does society have a responsibility to use technology to help achieve social justice?
Where are the boundaries of that responsibility? One controversial WikiLeaks case
was the leak of a video showing a U.S. Army helicopter strike from 2007 in Baghdad
that claimed the lives of several civilians including two children (see Figure 8). An
Army intelligence analyst delivered the classified combat video to WikiLeaks in 2010.
Another video leaked showed a May 2009 air strike near the Afghanistan village of
Garani that killed nearly 100 civilians, mostly children. The Pentagon had released a
report on that event but refused to show video of the attack to reporters.

QUESTIONS TO THINK ABOUT AND RESEARCH


1. Is the staff of WikiLeaks responsible for the accuracy and quality of the informa-
tion it releases?
2. If information leaked through WikiLeaks leads to the death of an undercover of-
ficer, who is responsible for the consequences of the publication of information?
3. Does providing the public with official Pentagon updates of military missions
mean that video of these events also must be released?
4. How does the meaning of “free speech”change as technology makes distribu-
tion of information universal and immediate? Do protections need to be
modified?

146 TECHNOLOGY IN ACTION


POINT COUNTERPOINT
Technology Provides Access to Technology Should Only Allow
Information Controlled Access to Information
The advocates of WikiLeaks argue that it allows an Critics maintain that the anonymity that WikiLeaks pro-
unprecedented means for those without power to hold vides makes if difficult to check the accuracy of anything
those with power accountable for their actions. reported on the Web site.
1. If information can only be leaked if you happen to 1. The small staff of WikiLeaks cannot verify the accu-
find an interested journalist, is society really racy of each document to the level of professional
protected? journalists.
2. Technology is not responsible for the actions or the 2. If technology is used irresponsibly, it can cause pan-
consequences of the actions of people. ics because the information is available to so many
people so quickly.
3. Technology has provided new tools that expose
cover-ups, corruption, and abuses of power. 3. If each person in an organization can easily leak
confidential information, the integrity of national
security or of corporate security is at risk.

FIGURE 8
What boundaries should there be on the
availability of sensitive information?

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 147


Intellectual Property
International Pirates
SUMMARY OF THE ISSUE
Intellectual property (such as music, writing, and software) is protected by copyright
law. But there have been challenges in enforcing these standards in other countries.
What happens to “fair trade” if some countries refuse to enforce copyright laws?
How should the trade partners of these countries respond?
The Business Software Alliance (BSA) estimated that in 2009, 79 percent of
China’s computers ran on pirated software (see Figure 9). For comparison, the BSA
estimated piracy in Denmark and Sweden at levels of 25 percent. This discrepancy
means that businesses in China do not have to budget for software for operating
systems or for productivity software, and that gives Chinese businesses an immedi-
ate advantage in the international marketplace. Although some companies, like
Microsoft, continue to do business in China despite the piracy, smaller companies
cannot survive. Tom Adams, the chief executive of Rosetta Stone, pulled his company
and its language training software products out of China. “What the Chinese gov-
ernment requires you to do is allow them to host it on their servers,”said Adams.
“We cannot make it in China because they will steal the software.” He described
China as a “kleptocratic society.”
The chief executives of twelve major software companies—Microsoft, Adobe, Au-
todesk, Symantec, and others—have pressured the U.S. administration and lawmak-
ers to put more pressure on China to crack down on illegal copying. With a potential
market of more than 1 billion people, and an increasing number of technologically
hungry purchasers, companies dread the idea of missing out on the Chinese market,
but if China continues to have such disinterest in following international copyright
laws, there may be a migration of foreign business to other Asian countries.
“Intellectual property protection in China is not just lower than other places, it’s
very low, very, very low,”said Steve Ballmer, CEO of Microsoft. “We see better
opportunities in countries like India and Indonesia than China because the intellec-
tual property protection is quite a bit better.”
It is not just China that has weakly enforced copyright laws. U.S. lawmakers re-
cently singled out five countries that are not doing enough to prevent piracy of
music, movies, and software: Canada, China, Mexico, Russia, and Spain. “We are los-
ing billions and billions of dollars because of the lack of intellectual property protec-
tions,”said Senator Orrin Hatch of Utah. “These five countries have been robbing
Americans.” The BSA estimated the loss at more than $51 billion per year, although
there is debate around the exact value.
Most people have had the opportunity to participate in the piracy of copyrighted
materials through illegal peer-to-peer sharing and the use of torrents. Now that behav-
ior is multiplied to the level of nations, and the consequences are still being explored.
QUESTIONS TO THINK ABOUT AND RESEARCH
1. Should a government be penalized for failing to actively enforce the laws they
have within their own country? If so, what should the penalties be, and how
should they be enforced?
2. Does each government have the right to make its own decision on a stand
against piracy?
3. How can other countries respond to international piracy?
4. Does individual piracy have any connection to the enforcement of copyright
laws on an international level?

148 TECHNOLOGY IN ACTION


POINT COUNTERPOINT
International Copyright Protections Global Business Demands
Need to Be Vigorously Enforced Understanding Other Cultures
Artists and software developers depend on the integrity Most countries have laws on their books regarding in-
of the protection of intellectual property, both within tellectual property. It is not the job of the United States
the United States and internationally, to make a fair to tell a foreign government how to conduct internal
profit on their work. affairs.

1. If other countries do not fight piracy, artists and de- 1. The existing laws on intellectual property have
velopers have an unfair advantage in the market- worked to serve the interests of these countries. If
place. U.S. companies do not want to sell to the billion-
person market of China, that is their choice.
2. By allowing massive piracy, these other countries
are stealing from the United States. 2. Piracy exists within the United States, so it is hypo-
critical to be chastising foreign governments for
3. Every country needs to have a common under- software piracy.
standing and enforcement of intellectual property
laws for trade to be fair and beneficial to everyone. 3. Companies can pursue restitution for piracy
through the foreign court systems.

FIGURE 9
The issues of intellectual property play an important
role in international trade.

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 149


Privacy
Does Social Media Erode Personal Privacy?
SUMMARY OF THE ISSUE
Like respect and dignity, privacy is a basic human right. What, exactly, is privacy?
Simply stated, privacy is the right to be left alone to do as one pleases. The idea of
privacy is often associated with hiding something (a behavior, a relationship, or a se-
cret). However, privacy really means not being required to explain your behavior to
others. But social media sites such as Facebook are inherently about sharing infor-
mation with others. Does this mean there is no such thing as personal privacy (see
Figure 10) on social media sites?
Facebook and other social media sites earn revenue by sharing information about
their users with advertisers. This helps businesses target advertisements to individu-
als who might be more interested in their products and services. But social media
sites have recently been criticized for making their privacy policies and controls too
obscure. Champions of personal privacy argue that sites that make information shar-
ing the default option or “opt-out”(that is, users have to make a specific request or
change a specific setting to stop their information from being shared) exposes users
to misuse of their personal details. Also, social media sites often track and store user
actions and preferences (such as “liking”something on Facebook). Personal privacy
advocates are suspicious of how this information is used or to whom it is sold.
Web site owners argue that the entire premise of social media is built on sharing
information, which makes it easy for others to find an individual. Social media
administrators feel that information sharing improves the users’ experience by
tailoring advertisements and offers to their specific interests. And because most
social media sites do not charge users for the service, the owners of the sites need
ways to generate revenue and their most valuable asset is the information that users
provide about themselves.
The large social media sites (such as Facebook) have been responding to concerns
by modifying their privacy settings and making it easier for users to select which
information is shared and with whom. But critics still argue that users do not have
enough control over opting out of sharing information. The control and privacy of
information will continue to be a fine balancing act for the foreseeable future with
companies trying to make money while appeasing the concerns of privacy advocates.
Leaving a trail of electronic breadcrumbs is to a certain extent inevitable. But clean-
ing up or hiding your “trail” is still important to many users, not because they are
trying to hide something but because they just value their basic rights of privacy.

QUESTIONS TO THINK ABOUT AND RESEARCH


1. Should you be able to decide exactly what information on a social networking
site you share with others? Would you be willing to pay for this privilege?
2. Do you know what your privacy settings are on the social media sites you use? Is
there any information being shared publicly that you weren’t aware was being
shared?
3. Should social media sites be allowed to sell information collected on your surf-
ing habits without your permission? Is this practice legal in the United States?
4. Is there any information on sites you use that you want to restrict people from
seeing? Do these sites allow you to restrict the information you with to protect?

150 TECHNOLOGY IN ACTION


POINT COUNTERPOINT
Social Media Sites Should Protect Social Media Sites Are Entitled to
Personal Privacy Freely Share Information
The advocates of protecting privacy in the United States Advocates for unrestricted sharing of information feel
argue that the right to privacy is a basic human right that business concerns outweigh privacy concerns.
that should be afforded to everyone. Personal privacy Social media sites offered free of charge must make
concerns should outweigh the business needs of a cor- money to survive and therefore need to be able to
poration. provide information to third parties to generate
revenue.
1. Social media sites have an inherent duty to protect
the data of their users. 1. The “cost”of using the site is the agreement to
share some of your personal information.
2. If site owners are collecting information by record-
ing users’ surfing habits, they might misuse or lose 2. Users can make their own privacy decisions and
control of the data. choose (opt-out) not to post or share sensitive
information.
3. Default privacy settings should all be opt-out, al-
lowing users the ultimate control over who views 3. In the digital age, loss of a certain amount of privacy
their data. is inevitable.

FIGURE 10
What information are you sharing on Facebook?

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 151


E-Commerce
Geolocation: Marketing Tool or Invasion of Privacy?
SUMMARY OF THE ISSUE
“Where are you?”is the burning social-networking question these days, and your
smartphone probably has the answer. The technology is called geolocation, and most
smartphones have a GPS (global positioning system) chip that uses satellite data or
cell towers to calculate your exact position. Services such as Foursquare, Gowalla,
Brightkite, and Loopt are all hoping that you will use them in the process, so you can
use geolocation to find your friends or let your friends find you. Through the apps,
you can receive recommendations of places to visit or things to do nearby. Some
apps, such as Loopt (see Figure 11) and Gowalla, have created partnerships with
local establishments that generate freebies, special offers, and travel trips. Businesses
are using geolocation apps to promote their products and offer rewards for “check-
ins”to help drive customers to their location.
But the question remains, when you leave your home and announce your
constant whereabouts through tweets and check-ins, do you lose some of your pri-
vacy in exchange for “fun”and “convenience”? Although you can set certain levels
of privacy in the apps, there is still the potential for someone with bad intentions
(stalkers, robbers) to follow your updates. For example, the Web site
PleaseRobMe.com was set up to illustrate how telling the world where you are at
all times may not be such a great idea. After generating much discussion and
awareness, the Web site is no longer active, but the message is clear:

“The danger is publicly telling people where you are. This is because it leaves
one place you’re definitely not . . . home. So . . . on one end we’re leaving lights
on when we’re going on a holiday, and on the other we’re telling everybody on
the Internet we’re not home. It gets even worse if you have ‘friends’ who . . .
enter your address, to tell everyone where they are.Your address . . . on the
Internet . . . Now you know what to do when people reach for their phone as
soon as they enter your home. That’s right, slap them across the face.”

In addition to opening yourself up to potential robbery, geolocation devices also


can track the activities you might not want publicized, and that once documented
can later be used against you.
It wasn’t long ago that we were concerned about using our real names online, but
now we are comfortable with sharing our exact location in a very public way. As
Facebook CEO Mark Zuckerberg said, “People have really gotten comfortable not
only sharing more information and different kinds, but more openly and with more
people.” But does such acceptance justify neglecting to maintain certain levels of pri-
vacy? Again, it seems that technology has moved more quickly than society can ad-
dress the potential risks and dangers.

QUESTIONS TO THINK ABOUT AND RESEARCH


1. Do the benefits of geolocation outweigh the risks?
2. What other devices besides cell phones track and record our movements/loca-
tions as digital records?
3. How have social networks increased the risks of geolocation privacy?
4. What risks does geolocation pose for college students? How can users mitigate
those risks?

152 TECHNOLOGY IN ACTION


POINT COUNTERPOINT
Geolocation Devices Do Not Geolocation Devices Are a Threat
Threaten Privacy to Privacy
The advocates of using geolocation devices with mini- The advocates for tighter privacy controls and aware-
mal concern for threatened privacy are those who ness campaigns about the potential risks of using
believe the social norm has shifted, and people have geolocation devices suggest that the threats are too big
become comfortable with sharing more information. to ignore. Society has become too complacent with
privacy issues.
1. Businesses are adopting geolocation apps as a part
of their social media strategy in order to drive cus- 1. Privacy settings on apps and GPS devices should be
tomers to their business. They would lose revenue if more restrictive to avoid broadcasting one’s location
such activities ceased. and risking personal assault.
2. As the devices and apps become better and more 2. Laws and regulations will need to be created as to
precise, they may become useful as public safety the use and distribution of digital location informa-
and news-gathering devices. tion.

3. Society may need to reevaluate its views about how 3. Consumers need to be educated about geolocation
much privacy is needed to maintain in people’s dig- and the ways it can impact them so that they are
ital lives, as well as assume greater responsibility for able to make informed choices.
making sensible decisions about sharing informa-
tion through the Internet.

FIGURE 11
Geolocation applications help
you find cool places and busi-
nesses. But who do you want to
find you with geolocation?

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 153


Electronic Communication
Does Free Speech Have a Price?
SUMMARY OF THE ISSUE
In early 2006 when Google launched its search engine services in China, it conceded
to Beijing’s demands that it self-censor its search engine, restricting search results for
sensitive information such as the details of the Tiananmen Square protests and of
human rights groups. This decision prompted much discussion, with some con-
demning Google’s decision for putting business profits over basic human rights.
Google justified its actions by stating that a company must operate within the rules
of the market in which it operates and that the benefits of increased access to infor-
mation for people in China “outweighed our discomfort in agreeing to censor some
results.”And, compared to search results from Baidu, the leading Chinese search
engine, Google was not censoring all information. However, in 2010, Google
announced that it was no longer willing to censor search results and moved the site
to Hong Kong where it hopes there will be less censorship. The departure was a
reaction to a sophisticated targeted cyberattack that Google believes was done
to gather information on Chinese human rights activists. Google had about a
35 percent market share.
Microsoft, also in the Chinese market with its new search engine, Bing,
announced in response to Google’s departure, that it had no plans to leave.
Microsoft has only a 1 percent share of the market, so the decision to stay has huge
upside potential. The question remains as to how Microsoft will manage search in-
formation. When Microsoft started in China, searches on controversial topics
weren’t just blocked in China, they were blocked from everyone around the world
(see Figure 12). Microsoft corrected that, but some current searches show that
although they are not censoring as much as Baidu, they are still censoring less than
Google was. Microsoft says it is trying to do the right thing. Before honoring any
censor requests, Microsoft insists that Chinese authorities make legally binding
requests in writing. Microsoft, along with Google and Yahoo!, joined Global Network
Initiative (globalnetworkinitiative.org), a group that has established a code of
conduct for free expression and privacy. The goal of GNI is to help companies do the
right thing under difficult circumstances. However, it’s too early to tell whether
Microsoft will indeed take the high road or succumb to China’s censorship
requirements.

QUESTIONS TO THINK ABOUT AND RESEARCH


1. Will Google’s move from Mainland China to Hong Kong have a major impact on
China’s censorship laws?
2. Will Microsoft’s compliance with censorship laws further Beijing’s cooperation
on combating software piracy in China? Are Microsoft’s financial incentives even
deeper than just Internet market share?
3. Can the U.S. government compel technology companies to take a firmer stance
on free speech in China and elsewhere by instituting criminal charges if U.S.
companies do not take reasonable steps to protect human rights?

154 TECHNOLOGY IN ACTION


POINT COUNTERPOINT
U.S. Companies Should Comply U.S Companies Should Put What
with Local Laws Is Right Ahead of What Is
Those who protest Microsoft’s actions are individuals and Financially Expedient
groups that fight for human rights in many contexts.They Those who are in favor of Google’s actions are believers
feel that Microsoft’s compliant behavior only condones that international corporations should begin to take a
China’s censorship policies and continues to thwart the firm stance against governments that do not promote
effort to promote human rights initiatives in China. basic human rights.
1. Microsoft is sacrificing free speech for business. This 1. China will never change unless there are financial
action violates human rights, international law, and interests to do so.
corporate ethics.
2. Google’s withdrawal from China threatens the
2. Cooperating with China violates human rights. viability of many advertising resellers in China. Will
3. If international businesses can’t stand up to China, this added pressure help or hinder human rights
how will China ever have an incentive to change? efforts?

4. Most other rights hang on the community’s ability 3. Microsoft’s presence, as muted as it is, continues to
to have open discussions. Preventing that from advance the slow progress the Chinese government
happening is a serious assault on human rights. is making toward democracy. U.S. companies can
ethically stay in China if they make an effort to
5. If the policy were to make children work or to kill improve human rights there. U.S. companies
women, would the companies choose not to com- operating in China should agree on guidelines
ply? Are human rights and freedom of speech any that respect human rights.
different?

FIGURE 12
Is free speech possible in countries
(such as China) where information
availability is restricted by law?

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 155


Computer Abuse
Cyberbullying—Who Should Protect Children from Each Other?

SUMMARY OF THE ISSUE


Cyberbullying is just like normal bullying, but it involves the use of digital technolo-
gies such as the Internet, cell phones, or video (see Figure 13). Instead of a bully
chasing someone on the playground at recess, cyberbullying involves minors (chil-
dren) harassing, threatening, humiliating, embarrassing, or tormenting other minors
by means of technology. Cyberbullying is a child-on-child process that might result
in criminal charges depending upon the type of incident.
There are many types of cyberbullying. The main types are as follows:

• Bombarding a victim with harassing instant messages or text messages


• Stealing a password and then using the victim’s account to embarrass the
victim by sending harassing, threatening, or lewd messages while pretending to
be the victim
• Spreading rumors or lies on social networking sites
• Posting embarrassing photos or videos on the Web (such as candid nude shots
taken in a locker room)
• Infecting the victim’s computer with malware, usually to spy on the victim

The effects of cyberbullying can be devastating. For children, their standing in


peer groups is a critical component of their self worth. Adults have freedom in their
lives to change bad situations, such as changing jobs, when they feel their esteem is
under attack. Children often feel powerless because they have such limited options.
Children don’t usually have the option of changing schools without uprooting the
entire family. Aside from developing severe feelings of depression, rage, frustration,
and powerlessness, children have committed suicide over cyberbullying incidents.
Suicide can often be the unfortunate result, as in the case of student and soccer
player Alexis Pilkington who at 17 committed suicide in 2010 after being repeatedly
taunted on social networking sites.
Unfortunately, cyberbullying is often difficult for adults to detect because the bul-
lying often takes place online and anonymously. Signs that a child is victim of cyber-
bullying are often the same signs related to various types of depression. A child may
suddenly lose interest in normal activities, be reluctant to go to school, lose his or her
appetite, have trouble sleeping, appear upset after using the Internet, or experience
unusual mood swings (such as bursting into tears for no apparent reason). Signs that
a child might be perpetrating cyberbullying include excessive Internet use, sending
large volumes of text messages, clearing the computer screen when others enter a
room, or conducting clandestine Internet activities (refusal to say what they are
doing).Vigilance over children’s online activities is obviously key to spotting both
victims and perpetrators of cyberbullying.
But who is responsible for monitoring children? Parents obviously need to protect
their children, but bullying usually doesn’t happen until children are repeatedly
exposed to other groups of children such as in daycare or school. So then, should
teachers and caregivers shoulder the major responsibility for detecting, reporting,
and mitigating cyberbullying? Children often spend more time in school during the
day than they spend under the supervision of their parents. But cyberbullying activi-
ties don’t just take place in school. Most children have access to the Internet at home

156 TECHNOLOGY IN ACTION


and can carry on campaigns of terror from the privacy of their own bedroom (see
Figure 14).
Children themselves could also be made part of the solution. Research shows that
one of the best ways to prevent bullying is to make children aware of what behaviors
constitute bullying and the consequences of their actions.
Although there is currently no federal law prohibiting cyberbullying, sixteen states
have laws that address this issue. Anti-cyberbullying laws tend to place the burden of
detection on the schools. A Massachusetts law passed in 2010 requires school em-
ployees to report bullying when they become aware of it to the school administra-
tion. The law also requires training for school employees in the detection and
prevention of bullying. Most legislatures are reluctant to pass laws that instruct par-
ents on how to raise their children because this tends to raise issues about personal
freedom. Therefore, the focus so far has been primarily on teachers and caregivers
detecting cyberbullying. But a coordinated effort between parents and teachers may
be a better approach.

QUESTIONS TO THINK ABOUT AND RESEARCH


1. What should parents do to protect their children from cyberbullying? How can
parents protect their children when the children are not under their direct
supervision?
2. What level of responsibility should school employees have for protecting chil-
dren from cyberbullying?
3. Should there be federal laws that make cyberbullying a crime? If so, how would
these laws be enforced?
4. What types of education for children would be beneficial in preventing cyberbul-
lying? When should these programs begin, and how often should children be re-
quired to participate?

FIGURE 13
Cyberbullying involves the use of digital
technologies both to bully and dissemi-
nate acts of bullying.

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 157


Computer Abuse
POINT COUNTERPOINT
Parents Must Protect Their Children Schools Must Bear the Major
from Cyberbullying Responsibility for Protecting
Proponents of parental responsibility for detecting and Students from Cyberbullying
preventing cyberbullying feel that it is a personal be- Cyberbullying affects society because it can severely
havior issue. Individuals are responsible for their own damage an individual’s self esteem. Cyberbullying is
behavior as long as it doesn’t harm others. Parents similar to other hate crimes and should enlist public of-
should be allowed to educate their children according ficials (such as educators) in enforcement of the laws.
to their own standards of behavior and preferences in
terms of moral behavior (such as religion). 1. Parents do not supervise their children 24/7 and
therefore require help from other responsible adults
1. Parents are ultimately responsible for protecting to protect their children.
their children.
2. Parents need to be assured that publicly funded in-
2. Bullying is a personal behavior issue, and all deci- stitutions such as schools and libraries are “safe
sions regarding personal freedom and behavior havens”where their children will not be exposed to
should be made by parents. malicious activities.
3. Because educating children about bullying is key to 3. Educators have better skills than most parents for
preventing it, decisions about the content of such teaching children about the serious effects of cyber-
training needs to be controlled by parents. bullying.

FIGURE 14
Cyberbullying should be stopped, but by whom?

158 TECHNOLOGY IN ACTION


Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms
and concepts from this Technology in Focus feature.

1. Which theory states that there is no universal moral c. amoral behavior.


truth? d. unprofessional behavior.
a. Relativism
6. The field of psychology that theorizes that happiness
b. Ethical behavior
results from ethical living is known as
c. Amoral behavior
a. principled psychology.
d. Personal ethics
b. positive psychology.
2. The ethical theory that describe that society as a c. moral psychology.
whole will improve if everyone adheres to the same d. affirmative psychology.
morale code is known as 7. Which system of ethics is most widely agreed upon to
a. rule utilitarianism. be the best system?
b. societal ethics. a. Rule utilitarianism
c. moral prescription. b. Relativism
d. personal ethics. c. Situational ethics
d. There is no universally agreed-upon best system.
3. Which ethical philosophy states that decision making
should be based on the circumstances surrounding a 8. Which is not a tangible benefit of ethical living?
given situation, not fixed laws? a. Improved health
a. Societal ethics b. A simpler lifestyle
b. Judeo-Christian ethics c. Happiness
c. Relativism d. Increased motivation
d. Situational ethics
9. Using your neighbor’s unsecured wireless connection
4. Which of the following statement is false? is an ethical issue of
a. Individuals who apply ethics inconsistently exhibit a. intellectual property.
amoral behavior. b. privacy.
b. All ethical decisions are greatly influenced by c. electronic communication.
personal ethics. d. None of the above.
c. Unethical behavior is not always illegal.
10. Business ethics differs from personal ethics because
d. Life experience affects an individual’s personal
a. ethical choices typically affect many stakeholders
ethics.
rather than a small group.
5. Not conforming to a set of approved ethical standards b. human resources personnel require employees to
is known as sign a code of ethics.
a. societal behavior. c. employees are bound by the ethics of the business.
b. unethical behavior. d. short-term gains can have long-term impacts.

TECHNOLOGY IN FOCUS: INFORMATION TECHNOLOGY ETHICS 159


four
four
chapter

application
software:
programs that let you work and play

objectives
Objectives

After reading this chapter, you should be able to answer the following questions:
1. What’s the difference between application software and system software? (p. 162)
2. What kinds of applications are included in productivity software? (pp. 162–172)
3. What are the different types of multimedia software? (pp. 172–178)
4. What are the different types of entertainment software? (pp. 178–179)
5. What are the different types of drawing software? (p. 180)
6. What kinds of software do small and large businesses use? (pp. 180–184)
7. Where can I go for help when I have a problem with my software? (pp. 184–186)
8. How can I purchase software or get it for free? (pp. 186–192)
9. How do I install, uninstall, and start software? (pp. 193–195)

multimedia resources
multimedia
resources

Active Helpdesk
• Choosing Software (p. 180)
• Buying and Installing Software (p. 193)

Sound Bytes
• Creating Web Queries in Excel 2010 (p. 165)
• Enhancing Photos with Image Editing Software (p. 173)
• Using Speech Recognition Software (p. 174)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? There are millions of
applications, and new ones are developed and released every day. How can you
find the right application to meet your needs? What
are the cool new applications, or
the ones that just don’t work? The editors
and analysts at PC Magazine have put
together AppScout (appscout.com),
which provides reviews of the best
software, Web sites, and Web
applications. AppScout might
be a good place to check first when
you are in need of a new application.

161
The Nuts and Bolts be productive—at home and at work. In
addition, applications are available to
of Software produce and edit media as well as for
A computer without software is like a sand- entertainment. Lastly, there are applications
wich without filling. Although a computer’s that are more applicable to business uses,
hardware is critical, a computer system does whether it’s for a home office, big business,
nothing without software. specialty business, or not-for-profit. In this
What is software? Technically speak- chapter, we look at each of these types in
ing, the term software refers to a set of in- detail, starting with productivity software.
structions that tells the computer what to By no means does this exhaust all the types
do. An instruction set, also called a program, of software that is in use. Other types of
provides a means for us to interact with and software, such as Web browsers, virus
use the computer, even if we lack special- protection, backup and recovery, and utility
ized programming skills. Your computer has software are in use every day. These types
two basic types of software: system software of software are discussed elsewhere in this
and application software. book.
• Application software is the software you
use to do tasks at home, school, and work.
You can do a multitude of things with ap-
plication software, such as writing letters, Productivity Software
sending e-mail, paying taxes, creating for Home and Office
presentations, editing photos, and taking
One reason to have a computer is to make it
an online course, to name a few.
easier to tackle the tasks you have in your
• System software includes software such daily life. Productivity software is all about
as Windows and Mac OS X, which help helping you do that, making it easier to keep
run the computer and coordinate in- your budget, send letters, or keep track of
structions between application software the kids’ school events. It’s safe to say you
and the computer’s hardware devices. regularly use some form of productivity
System software includes the operating software already. Productivity software
system and utility programs (programs includes programs that enable you to per-
in the operating system that help man- form various tasks required at home, school,
age system resources). We discuss sys- and business. This category includes word
tem software in detail in Chapter 5. processing, spreadsheet, presentation, data-
Figure 4.1 shows the various types of base, and personal information manager
application software that you can use to (PIM) programs.
Figure 4.1
Word processing
Application software Spreadsheet
enables computer users Presentation
APPLICATION Productivity Database
to do a variety of tasks. SOFTWARE Personal information manager
Personal finance
Note taking

Image editing
Audio editing
Media
Video editing
Media management

Gaming
Home/Entertainment Education
Drawing

Home business
Business Large business
Specialized business

162 Chapter 4 Application Software: Programs That Let You Work and Play
Word Processing Software BITS
What is the best software to use to
AND Working with Different File Formats
BYTES
create general documents? Most stu-
dents use word processing software to cre- There are lots of great word processing software applications available now. Although
ate and edit documents such as research each program has basic functional similarities, each program has a different file format
papers, letters, and résumés. Because of its that defines the way information is stored in the file, which in turn enables the program
general usefulness, word processing soft- to open and save the file. Some of these formats are shown in the following table.
ware is the most widely used application.
Word processing software has a key advan-
tage over its ancestral counterpart, the type- Microsoft Word 97-2003 .doc
writer: you can make revisions and
Microsoft Word 2007, 2010 .docx
corrections without having to retype an en-
tire document. Instead, you can quickly and Microsoft Works .wps
easily insert, delete, and move pieces of text,
Corel WordPerfect .wpd
as well as move and insert text from one
document into another seamlessly. Microsoft Zoho .sxw
Word and Corel WordPerfect are examples
AbiWord .abw
of popular word processing programs.
Are there free or more affordable Apple iWork Pages .pages
alternatives? If you’re looking for a
OpenOffice.org Writer .odt
more affordable alternative to software such
as Microsoft Word or other Microsoft Office
products, you may want to consider down- So, how easy is it to share documents created in different applications with differ-
loading free open source software. Open ent file formats? It’s not as difficult as you think. Most applications will open docu-
source software is program code that is pub- ments created in another application, and they can also save files in a different format
licly available and has few restrictions. Un- so that they can be opened in another application. So, for example, say you have
like proprietary software, which is neither Microsoft Word 2010 installed on your computer, but your classmate has sent you an
free nor open source, the code can be copied, e-mail with a document he created in OpenOffice.org Writer. Microsoft Word will be
distributed, or changed without the stringent able to open the file, and you will also be able to save it as a Word file. Conversely, if
copyright protections of software products you send your classmate a file you create in Word, he will be able to open it in
you purchase. OpenOffice.org Writer and save it as a Writer document. The open source programs
Writer, a word processing program from and Web-based applications are designed to work with a variety of file formats, so
the OpenOffice.org suite (openoffice.org), there should not be a problem. You can upload almost any type of word processing,
and AbiWord (abiword.com) are gaining in spreadsheet, or presentation file into Google Docs and work with it. Using Google
popularity because they are available as free Docs may actually facilitate sharing files made in dissimilar programs, although you
downloads from the Internet. Both AbiWord may lose some of the features, since Google Docs only has very basic capabilities.
and Writer have many of the same features
as their higher-priced Word and WordPer-
fect competitors, making either a great
choice for cost-conscious consumers. supported from their community of users
Also gaining in popularity are several across Web sites and newsgroups. For more
word processing programs that are Web- information on alternative software, see the
based, such as those found in Google Docs Technology in Focus feature “Computing
(docs.google.com) and Microsoft Office Web Alternatives” on page 252.
Apps. Web-based applications, which was How do I control the way my docu-
discussed in greater detail in Chapter 3, can ments look? An advantage of word pro-
be accessed from any computer that has an cessing software is that you can easily
Internet connection. Web-based applications format, or change the appearance of, your
are great for collaborating and coordinating document. As a result, you can produce pro-
input from a variety of users on a single doc- fessional-looking documents without having
ument. Keep one thing in mind when you to hire a professional. With the extensive for-
choose a free or Web-based software prod- matting options available, you can change
uct: support. Unlike Microsoft Office and fonts, font styles, and sizes; add colors to
other applications, these applications offer text; adjust margins; add borders to portions
little or no formal support. Instead, open of text or entire pages; insert bulleted and
source and Web-based applications are numbered lists; and organize your text into

Productivity Software for Home and Office 163


Formatted
headers

Drop cap

Section headings
Bullets and
numbering

WordArt

Two-column
text

Figure 4.2 columns. You also can insert pictures from styles throughout your document. Figure 4.2
Nearly every word pro- your own files or from a gallery of images shows what a document can look like when
cessing application has and graphics, such as clip art and SmartArt, formatting options found in many word
formatting features to give which are included with the software. You processing applications are incorporated.
your document a profes-
sional look.
also can enhance the look of your document Although many of the open source and
by creating an interesting background or by Web-based applications have great format-
adding a “theme” of coordinated colors and ting capabilities, many are not as fully
featured as the proprietary applications,
such as Microsoft Word.
Designs and other Bibliography tool
visual effects organizes sources
What special tools do word pro-
cessing programs have? You’re
probably familiar with the basic tools
of word processing software. Most
applications come with some form of
spelling and grammar checker and a
thesaurus, for example. Another popular
tool is the search-and-replace tool that
allows you to search for text in your
document and automatically replace it
with other text.
The average user is unaware of many
interesting word processing software
tools. For example, did you know that
you could translate words or phrases into
another language or automatically correct
your spelling as you type? You also can
automatically summarize key points in
a text document, add bibliographical
references, and include illustrations with
different picture styles. Writer, the word
processing program in the OpenOffice.org
Figure 4.3 suite, has many of the same tools you’re
Writer, the word processing program in the OpenOffice.org suite, has many of the used to seeing in Microsoft Word and Corel
same features as Word and WordPerfect. WordPerfect (see Figure 4.3).

164 Chapter 4 Application Software: Programs That Let You Work and Play
Spreadsheet Software
Formula Values Changed value
Why would I need to use spread-
sheet software? Spreadsheet
software—such as Microsoft Excel and
OpenOffice.org Calc—enables you
to do calculations and numerical
analyses easily. You can use Cell
spreadsheet software to track
your expenses and create a sim-
ple budget. You also can use it to
determine how much you should be
paying on your student
loans, car loan, or credit
card bills each month. You Labels
know you should pay more
than the minimum payment
to spend less on interest, but how
much more can you afford to pay,
and for which loan? Spreadsheet
software can help you evaluate differ-
ent scenarios, such as planning the best
payment strategy.
How do I use spreadsheet
software? The basic element in a Inserted row Results of recalculated
Function Formula
spreadsheet program is the worksheet, =SUM(B10:B21) (=B8-B22) formulas
which is a grid consisting of columns
and rows. As shown in Figure 4.4, the
columns and rows form individual Figure 4.4
Figure 4.4, to calculate your average
boxes called cells. Each cell can be identified Spreadsheet software
earned income in September, you
according to its column and row position. enables you to calculate
could use the built-in AVERAGE and manipulate numerical
For example, a cell in column A, row 1 is re-
function, which would look like this: data easily with the use of
ferred to as “cell A1.” You can enter several
=AVERAGE(B4:B7). built-in formulas.
types of data into a cell:
The primary benefit of spreadsheet soft-
• Text: Any combination of letters, num- ware is its ability to recalculate all functions
bers, symbols, and spaces. Text is often and formulas in the spreadsheet automati-
used as labels to identify the contents of cally when values for some of the inputs
a worksheet or chart. change. For example, as shown on the
• Values: Numerical data that represent a spreadsheet on the right side of Figure 4.4,
quantity or an amount and are often the you can insert an additional row (Member-
basis for calculations. ships), change a value (September clothing
• Formulas: Equations that you build expense), and then recalculate the results for
yourself using addition, subtraction, Total Expenses and Net Income without
multiplication, and division, as well as having to redo the worksheet from scratch.
values and cell references. For example, Because automatic recalculation enables
in Figure 4.4, you would type the for- you to see immediately the effects that
mula “=B8-B22” to calculate net income different options have on your spreadsheet,
for September. you can quickly test different assumptions
• Functions: Formulas that are prepro-
grammed into the spreadsheet software. Creating Web
SOUND
Functions help you with calculations BYTE Queries in Excel
ranging from the simple (such as adding 2010
groups of numbers) to the complex
(such as determining monthly loan In this Sound Byte, you’ll learn what Excel Web queries
payments), without you needing to are, as well as how to use them effectively.
know the exact formula. Therefore, in

Productivity Software for Home and Office 165


a
compute the output voltage at a point in an
electrical circuit or to simulate customer
arrival and wait times. In these settings,
c spreadsheet programs can often solve prob-
lems that formerly required custom pro-
gramming. Many spreadsheet applications
also have database capabilities and can sort,
filter, and group data.

Presentation Software
What software do I use to create pre-
in the same analysis. sentations? You’ve probably sat through
This is called a what-if presentations during which the speaker’s
analysis. Look again at topic was displayed in slides projected on a
Figure 4.4 and ask, screen. These presentations can be the most
“What if I add $50 to my basic of outlines, containing only a few
b clothing expense? What words and simple graphics, or elaborate
impact will such an increase have on my multimedia presentations with animated
total budget?” text, graphic objects, and colorful back-
Figure 4.5 grounds. You use presentation software
What kinds of graphs and charts
(a) Column charts show can I create with spreadsheet such as Microsoft PowerPoint,
comparisons. (b) Pie OpenOffice.org Impress, or Zoho Show
software? Sometimes it’s easier to see
charts show how parts
contribute to the whole. the meaning of numerical information when (shown in Figure 4.7) to create these types of
(c) Line charts show it is shown in a graphical format such as a dynamic slide shows. Because these applica-
trends over time. chart. As shown in Figure 4.5, most spread- tions are simple to use, you can produce
sheet applications allow you to create a vari- high-quality presentations without a lot of
ety of charts, including basic column charts, training. With some of the new capabilities
pie charts, and line charts, with or without in PowerPoint 2010, you can embed online
three-dimensional (3D) effects. In addition videos, as well as change the color, add ef-
to these basic charts, you can use stock fects, and even trim video clips without the
charts (for investment analysis) and scatter need for a separate video editing program.
charts (for statistical analysis), or create cus- How do I create a presentation?
tom charts. New in Excel 2010 are Using the basic features included in presen-
sparklines, which are small charts that fit tation software, creating a slide show is sim-
into a single cell. Sparklines (see Figure 4.6) ple. To arrange text and graphics on your
easily show data trends. slides, you can choose from a variety of slide
Are spreadsheets used for any- layouts. These layouts give you the option
thing besides financial analysis? of using a single or double column of bul-
There are so many powerful mathematical leted text, various combinations of bulleted
Figure 4.6 functions built into spreadsheet programs text, and other content such as clip art,
Sparklines, a new feature that they can be used for serious numerical graphs, photos, and even video clips.
for Excel 2010, are tiny analyses or simulations. For example, an You also can lend a theme to your pres-
graphs that fit into a single Excel spreadsheet could be designed to entation by choosing from different design
cell.
templates. You can use animation effects
to control how and when text and other
objects enter and exit each slide. Slide
transitions add different effects as you
move from one slide to the next during
the presentation.

Database Software
How can I use database software?
Database software such as Oracle, MySQL,
Sparklines
and Microsoft Access are powerful

166 Chapter 4 Application Software: Programs That Let You Work and Play
a

applications that allow you to store and or-


ganize data. As mentioned earlier, spread-
sheet applications include database features
and are easy to use for simple database tasks
such as sorting, filtering, and organizing
data. However, you need to use a more ro-
c
bust, fully featured database application to
manage larger and more complicated
groups of data that contain more than one
table; to group, sort, and retrieve data; and
to generate reports.
Traditional databases are organized into
fields, records, and tables, as shown in
Figure 4.8. A field is a data category such as
“First Name,” “Last Name,” or “Street
Address.” A record is a collection of related
fields such as “Douglas Seaver, Printing invoices, and personnel information. Often Figure 4.7
Solutions, 7700 First Avenue, Topeka, KS, that information is available to a home com- Several programs allow
(888) 968-2678.” A table groups related puter user. For example, at Amazon.com you to create presentation
records such as “Sales Contacts.” you can use the company’s Web site to ac- materials: (a) Microsoft
How do you benefit when busi- cess the entire history of all the purchases Office PowerPoint 2010,
nesses use database software? you have made. (b) OpenOffice.org
Impress, and (c) Zoho’s
FedEx, UPS, and other shipping companies Show.
let customers search their online databases Note Taking Software
for tracking numbers, allowing customers to
Is there software to help students
get instant information on the status of
with note taking? Programs are
their packages. Other businesses use
available to help students take notes
databases to keep track of clients, Table
during lectures and organize and

Field Record

Figure 4.8
In databases, information is organized into tables, fields, and records.

Productivity Software for Home and Office 167


BITS lectures can be added. Students can search
AND Make a Winning Presentation for a term across the full set of notebooks
BYTES they have created during the semester,
helping them to find connecting ideas
We’ve all sat through bad presentations. Don’t make your audience sit through among their courses. Because OneNote has
another one! Here are some tips for designing good presentations: co-authoring and version tracking capabili-
1. Color: Avoid using clashing text and background colors. Instead, choose dark ties, it’s also perfect for organizing team and
text on a light background or white text on dark background. other collaborative projects. OneNote 2010
2. Bullets: Use bullets for key points. Limit the number to four to six bulleted incorporates a new Wiki system, which
points per slide. allows individuals to quickly link to another
3. Text: Limit the amount of text on a slide to about six words per bullet point. page within OneNote or a document outside
Avoid full sentences and paragraphs, of OneNote.
4. Images: Images can convey a thought or illustrate a point. Make sure any text Are there free or portable note
over an image can be read easily. Consider using SmartArt diagrams for inter- taking applications? There are several
esting text arrangements. free and online note taking options available
5. Font size and style: Keep the font size large enough to read from the back of to help you take full-blown notes or just jot
the room. Avoid script or fancy font styles. Limit the number to one or two styles down a quick reminder. Some are even
per presentation. available for your smartphone. Evernote
6. Animation and background audio: Keep to a minimum. They can be (evernote.com), for example, allows you to
distracting. take notes via the Web, your phone, or your
computer and then sync your notes between
the Web, your phone, and any computer.
You can save text, audio, and images, as
maintain their lecture notes and the record- well as screen captures, Web pages, and
ings they create from lectures. For example, photos. The beauty of Evernote is that
Microsoft OneNote allows students who everything is searchable. StickyNotes
have Tablet PCs to write their notes directly (sticky-notes.net) are digital equivalents
onto the tablet, using it as an electronic note- to paper sticky notes. These notes can be
book. Students can also use OneNote with a customized, saved, and shared via e-mail,
notebook or desktop computer, and type the and they even have reminders.
information onto the sheets; then the
Figure 4.9 pieces of text can be easily moved around
The Outlook Today feature the page. Notes can also be organized into Personal Information Manager (PIM)
in Microsoft Outlook tabbed sections that provide further help in
includes common PIM Software
features such as a organizing and reorganizing pages. With
one click, Web links can be quickly inte- Which applications should I use to
summary of appointments,
a list of tasks, and the grated and audio or video recordings of manage my time, contact lists, and
number of new e-mail tasks? Most productivity suites contain
messages. some form of personal information
manager (PIM) software such as
Microsoft Outlook or Lotus
Organizer. Chandler
(chandlerproject.org) is another
PIM program that is open source
and, therefore, free. These
programs strive to replace the
management tools found on a
traditional desk—a calendar,
address book, notepad, and to-do
list, for example. Some PIMs
contain e-mail management
features so that you not only can
receive and send e-mail messages
but also organize them into
various folders, prioritize them, and
Task reminder Messages
coordinate them with other activities in
E-mail inbox Calendar items
your calendar (see Figure 4.9).

168 Chapter 4 Application Software: Programs That Let You Work and Play
If you share a network at home or at BITS
work and are using the same PIM software AND Productivity Software Tips
as others on the network, you can use a PIM BYTES
program to check people’s availability be-
and Tricks
fore scheduling meeting times. Whether co- Looking for tips on how to make better use of your productivity software? Some Web
ordinating a team project or a family event, sites send subscribers daily e-mails full of tips, tricks, and shortcuts to their favorite
you can create and electronically assign software programs. Microsoft has actually made its Web site very useful with lots of
tasks to group members by using a PIM. You tips and tricks for its Office applications (office.microsoft.com). The New Paperclip
can even track each person’s progress to (thenewpaperclip.com) sends a free tip each day on Office 2007 and 2010 applica-
ensure that the tasks are finished on time. tions. MakeTechEasier (maketecheasier.com) has tidbits for a variety of applications
Are there Web-based PIM pro- including Windows and Mac products, OpenOffice.org, and cell phone applications.
grams? Many Web-based e-mail clients Also, check out YouTube. Many enthusiasts post quick instructive videos demonstrat-
such as Yahoo!, Google, and AOL have ing useful software tips. For example, there are several videos that show you how to
developed coordinating calendar and embed a YouTube video directly into PowerPoint. To take these YouTube videos on the
contacts programs similar to Microsoft Out- road with you, check out TubeSock (stinkbot.com/Tubesock) to download, convert,
look. Yahoo! includes Notepad for jotting and copy YouTube videos to your personal media player.
down notes and tasks. Google’s calendar
and contacts sync with Outlook so that you
can access your Outlook calendar informa-
tion by logging into Google, giving you • A macro is a small program that groups a
access to your schedule anywhere you have series of commands so they will run as a
access to a computer and an Internet connec- single command. Macros are best used to
tion. AOL’s Instant Messenger, AIM, has automate a routine task or a complex se-
coordinated e-mail, calendar, and contact ries of commands that must be run fre-
functions. quently. For example, a teacher may write
a macro to sort the grades in her grade
book automatically in descending order
Productivity Software Features and to highlight those grades that add up
What tools can help me work more to less than a C average. Every time she
efficiently with productivity adds the results of an assignment or test,
software? Whether you are working on a she can set up the macro to run through
word processing document, spreadsheet, that series of steps automatically.
database, or slide presentation, you can
make use of several tools to increase your
efficiency: Integrated Software Applications
• A wizard is a systematic guide that What’s an integrated software
walks you through the steps necessary application? An integrated software
to complete a complicated task. At each application is a single software program
step, the wizard asks you questions. that incorporates the most commonly used
Based on your responses, the wizard tools of many productivity software pro-
helps you complete that portion of the grams into a single integrated program.
task. When you install software, you are Note that integrated software applications
often guided by a wizard. are not substitutes for the full suite of
• A template is a predesigned form. applications they replace. Generally, because
Templates are included in many produc- they don’t include many of the more com-
tivity applications. They provide the plex features of the individual productivity
basic structure for a particular kind of software applications, they can be thought
document, spreadsheet, or presentation. of as “software lite.” To have access to the
Templates can include specific page full functionality of word processing and
layout designs, formatting and styles spreadsheet software, for example, you
relevant to that particular document, should get the individual applications
and automated tasks (macros). Typical or a suite that includes each of these
templates allow you to lay out a profes- applications.
sional-looking résumé, structure a home Microsoft Works is an example of an
budget, or communicate the results of a integrated software application. This inte-
project in a presentation. grated software application includes word

Productivity Software for Home and Office 169


Software Suites
What’s a software suite? A
software suite is a group of software
programs that have been bundled as a
package. You can buy software suites
for many different categories of soft-
ware, including productivity, graphics,
and virus protection (see Figure 4.10).
There are three primary developers of
productivity software suites: Microsoft,
Corel, and Apple. Microsoft Office 2010
is the leader’s latest release, and Corel
offers two separate suites. WordPerfect
Office X5 has a traditional look and feel
with classic toolbars, while Home Of-
fice sports the new tabbed arrange-
ment of features that first came out
with Microsoft Office 2007. Apple of-
fers productivity software for the Macs
in its iWork suite.
Which applications do pro-
ductivity software suites con-
Figure 4.10
processing, spreadsheet, and database func- tain? Most productivity software suites
Software suites provide contain similar basic components, such as
tionality as well as templates, a calendar, a
users with a cheaper
method of obtaining all of dictionary, and map features. word processing, spreadsheet, presentation,
the software they want to Why would I use an integrated and PIM software. However, depending on
buy in one bundle. software application instead of indi- the version and manufacturer, they may also
vidual stand-alone programs? Inte- include other types of applications, such as
grated software applications are perfect if database programs and desktop publishing
you don’t need the more advanced features software. When you are shopping for soft-
found in the individual full versions of each ware, it can be difficult to figure out which
program. Like stand-alone applications, an bundle is the right one for your needs. For
integrated software program provides tem- example, Microsoft Office 2010 is bundled in
plates for frequently developed documents five different ways; the three bundles that
such as résumés and invoices. An integrated are available for individual purchase are de-
software program is also less expensive than scribed in Figure 4.11. Be sure to research
its individual, fully featured alternatives. If carefully the bundling options for software
you find your needs go beyond the limited you are buying.
capabilities of an integrated program, you What are the advantages of soft-
might want to consider buying the individ- ware suites? Most people buy software
ual programs that meet your particular suites because doing so is cheaper than
requirements or a software suite. buying each program individually. In

Figure 4.11 A SAMPLING OF MICROSOFT OFFICE 2010 SUITES


Application Function Home and Student 2010 Home and Business 2010 Professional 2010
Word Word processing x x x

Excel Spreadsheet x x x

PowerPoint Presentation x x x

Access Database x

Outlook PIM x x

Publisher Desktop publishing x

OneNote Note taking x x x

170 Chapter 4 Application Software: Programs That Let You Work and Play
addition, because the programs bundled in
a software suite come from the same com-
pany, they work well together (that is, they
provide for better integration) and share
common features, toolbars, and menus. For
example, when using applications in the
Microsoft Office suite, you can seamlessly
create a spreadsheet in Excel, import it into
Access, and then link a query created in Ac-
cess to a Word document. It would be much
harder to do the same thing using different
applications from a variety of software de-
velopers. Another example is Apple iWork,
which includes word processing (Pages),
presentation (Keynote), and spreadsheet
(Numbers) applications. Each program can
access and share certain common elements
such as photographs.

Personal Financial Software


What software can I use to prepare
my taxes? Everyone has to deal with
taxes, and having the right computer soft-
ware can make this burden much simpler
and keep it completely under your control.
Tax preparation software such as Intuit
TurboTax and H&R Block At Home enable
you to prepare your state and federal taxes on
your own instead of hiring a professional. Figure 4.12
Both programs offer a complete set of tax
Tax preparation software,
forms and instructions, as well as videos that online payments. The software records all such as Intuit TurboTax,
contain expert advice on how to complete transactions, including online payments, in enables you to prepare
each form. Each company also offers free your checkbook register. In addition, you can and file your taxes using a
Web-based versions for federal forms and assign categories to each transaction and guided, systematic
instructions. In addition, error-checking then use these categories to analyze your process.
features are built into the programs to catch spending patterns. You even can set up a
mistakes. TurboTax also can run a check for budget and review your spending habits.
audit alerts, file your return electronically, Web-based programs such as Mint
and offer financial planning guidance to help (mint.com) and Yodlee MoneyCenter
you effectively plan and manage your (yodlee.com) are rapidly gaining in popu-
financial resources in the following year (see larity (see Figure 4.13). Both are great at ana-
Figure 4.12). Remember, however, that the tax lyzing your spending habits and offering
code changes annually, so you must obtain an advice on how to manage your spending
updated version of the software each year. better. Like some other full-featured applica-
Which software can I use to help tions such as Quicken or Mint (both by In-
keep track of my personal finances? tuit), you can track your investment
Financial planning software helps you man- portfolio as well. Because they are Web-
age your daily finances. Intuit Quicken and based, you can monitor and update your fi-
Microsoft Money are popular examples. Fi- nances from any computer in a private and
nancial planning programs include electronic secure setting. Each product also has ver-
checkbook registers and automatic bill pay- sions of its applications to load on smart-
ment tools. With these features, you can phones, so your information is conveniently
print checks from your computer or pay accessible. Users also have access to a net-
recurring monthly payments, such as rent or work of other users with whom to exchange
student loans, with automatically scheduled tips and advice.

Productivity Software for Home and Office 171


animations, and movies. In this section, we
look at several popular types of multimedia
software, as shown in Figure 4.14.

Digital Image Editing Software


What can I do with a digital image
that I can’t do with a
photograph? Once the image
information is in a digital format (taken with
a digital camera or scanned), you can use it
easily with all your other software. For ex-
ample, you can store a digital picture of each
person in your Outlook contacts list or add a
digital image you captured into a newsletter
you are writing.
Products such as Microsoft Photo Story
Figure 4.13 Financial planning applications also coor-
and Google Picasa, which are both free
Mint.com is an online dinate with tax preparation software.
downloads, make it easy for you to use your
financial management Quicken, for example, integrates seamlessly
tool. An extensive online collection of digital images in new ways. In
with TurboTax, so you never have to go
community provides Photo Story, you can add text, music, and
through your checkbook and bills to find tax
helpful tips and camera movement to create a fully featured
discussions with other deductions, tax-related income, or expenses.
slide show with your images. Using Picasa,
people in similar Many banks and credit card companies also
you can create a poster or several different
situations. offer online services that download a de-
styles of collages from your images.
tailed monthly statement into Quicken.
What software can I use to edit my
Quicken even offers a credit card. All of
photos? As its name implies, image
your purchases are organized into categories
editing software (sometimes called photo
and are downloaded automatically to your
editing software) enables you to edit photo-
Quicken file to streamline your financial
graphs and other images. Image editing
planning and record keeping.
software includes tools for basic modifica-
tions to digital images such as removing
Media Software red-eye; modifying contrast, sharpness, and
for Home color casts; or removing scratches or rips
from scanned images of old photos. Many of
From movies and television to music and
these software packages now also include an
photography, the entertainment world is be-
extensive set of painting tools such as
coming digital. Your computer can help you
brushes, pens, and artistic media (such as
create, organize, and modify digital images,
paints, pastels, and oils) that allow you to
songs, and movies, if you have the right
create realistic-looking images. Often
software. Multimedia software includes
graphic designers use digital photos and
image, video, and audio editing software;
Figure 4.14 images as a basis for their design and then
animation software; and other specialty soft-
There are many varieties modify these images within image editing
ware required to produce computer games,
of graphics and software to create their final products.
multimedia software. Adobe Photoshop and Corel PaintShop
Pro Photo are fully featured image editing
Home Media Digital image editing software applications. They each offer sophisticated
Software tools for tasks like layering images (placing
pictures on top of each other) and masking
Digital audio software images (hiding parts of layers to create effects
such as collages). As shown in Figure 4.15,
these image editing applications offer
Digital video editing software sophisticated tools. Designers use these
more sophisticated tools to create the en-
hanced digital images used commercially in
Media management software logos, advertisements, and on book and CD
covers.

172 Chapter 4 Application Software: Programs That Let You Work and Play
of a professional ath-
lete or other famous
person.
If you want to use
a program that offers
more than basic fea-
tures but is still easy
to use, try Adobe
Photoshop Elements
(see Figure 4.16).
With this program,
you can improve the
color balance of an
image, touch up an
image (by removing
red-eye, for example),
add creative effects to
an image, or group
images together to
create montages. If
you later decide to
upgrade to the
professional Figure 4.16
Figure 4.15
version of Adobe Photoshop, you will Image editing software
With some image editing software, you can take two
already be familiar with the user interface. such as Adobe Photoshop
individual pictures and combine them into one picture.
Elements makes it easy to
create (a) calendars,
(b) greeting cards and
postcards, (c) slide shows.
Can a nonprofessional use image
editing software? Image editing a
programs such as Adobe Photoshop Ele-
ments and Roxio PhotoSuite are geared to- Create with Your Photos
To begin, select what you would like to create.

ward the casual home user. Adobe also b


offers Adobe Photoshop Album Starter Edi-
tion, which is a free download. With these
applications, you can perform the most com-
mon image editing tasks, such as taking out
red-eye and cropping and resizing pictures.
These programs enable you to add creative
effects such as borders and frames. Some in-
clude templates so you can insert your fa-
vorite pictures into preformatted calendar
pages or greeting cards. They may also have
Create a Slide Show
photo fantasy images that let you paste a Create a slide show to showcase your photos with music, text and audio captions.

face from your digital image onto the body


c

Enhancing Photos
SOUND
BYTE with Image Editing
Software
In this Sound Byte, you’ll learn tips and tricks on how
to best use image editing software. You’ll learn how to
remove the red-eye from photos and incorporate
borders, frames, and other enhancements to produce
professional effects. Create a Card
Create a greeting card for holidays, events, and other special occasions.

Media Software for Home 173


DIG
DEEPER
Speech Recognition Software

Speech recognition software (or voice recognition software) trans- contain alternative pronunciations for many words. Each phoneme is
lates your spoken words into typed text. With this software, you can dic- worked on separately; the phonemes are then chained together to form
tate documents and e-mail messages, use voice commands to start and words that are contained in the word list. Because a variety of sounds can
switch between applications, control the operating system, and even surf be put together to form many different words, the software analyzes all
or fill out forms on the Web. Several programs are available for personal the possible values and picks the one value that it determines has the
use, such as Dragon Naturally Speaking, and the technology is being best probability of correctly matching your spoken word. The word is then
used in automobiles, call centers, and even in military aircraft. displayed on the screen or is acted on by the computer as a command.
Microsoft has incorporated a speech recognition system into the Win- However, there are problems with speech recognition software. We
dows operating system. After starting speech recognition (from the Start don’t always speak every word the same way, and accents and regional
menu, type “speech” in the search box and click on “Windows Speech dialects produce great variation in pronunciations. Therefore, speech
Recognition”), the speech recognition toolbar appears and indicates recognition is not perfect and requires training. Training entails getting
whether or not the computer is “listening” for voice input. Just click the the computer to recognize your particular way of speaking by reading
microphone icon to make the computer listen to or ignore voice input. prepared text into the computer so the phoneme database can be ad-
Figure 4.17 shows how you can use the Windows’ speech recognition justed to your specific speech patterns.
functionality to run commands within an application. Another approach to improve speech inconsistencies is to restrict the
Speech recognition software is complicated. As you speak, the soft- word list to a few keywords or phrases, and then have the computer
ware divides each second of your speech into 100 individual samples guess the probability that a certain phrase is being said. This is how cell
(sounds). It then compares these individual sounds with a database phones that respond to voice commands work. The phone doesn’t really
(called a codebook) that contains samples of every sound a human being figure out that you said “call home” by breaking down the phonemes. It
can make. When it finds a match, it gives your voice sound a number that just determines how likely it is that you said “call home” as opposed to
corresponds to the number of the similar sound in the database. “call office.” This reduces the processing power needed as well as the
After your voice sounds are assigned values, these values are chance of mistakes. However, it also restricts the words you can use to
matched with another database containing phonemes for the language achieve the desired results.
being spoken. A phoneme is the smallest phonetic unit that distinguishes Though not perfect, speech recognition software programs can be in-
one word from another. For example, “b” and “m” are both phonemes valuable to individuals who don’t type well or who have physical limita-
that distinguish the words bad and mad from each other in the English tions that prevent them from using a keyboard or mouse. For those
language. Many languages, including English, are made up of thousands whose careers require a lot of typing, using speech recognition software
of different phonemes. Moreover, because of differences in pronuncia- reduces their chances of incurring debilitating repetitive-strain injuries.
tion, some phonemes may actually have several different corresponding In addition, because most people can speak faster than they can write or
matching sounds. type, speech recognition software can help individuals work more effi-
Once all the sounds are assigned to phonemes, word and phrase con- ciently. Doctors are incorporating speech recognition software into their
struction can begin. The phonemes are matched against a word list that practices to create a summary of the visit before the patient leaves the
contains transcriptions of all known words in a particular language. Be- room. This eliminates the need for a dictated summary to be transcribed
cause pronunciation can vary (for example, the word the can be pro- by a separate service, and it increases the physician’s in-office
nounced so that it rhymes with either duh or see), the word list must efficiency.

Using Speech newspapers, and radio shows all can be


SOUND purchased as audio files from sellers such
BYTE Recognition
Software as Audible, Inc. (audible.com). Huge num-
bers of free audio files are also available
In this Sound Byte, you’ll see a demonstration of the through the phenomenon of podcasting, the
speech recognition software included with Windows 7. distribution of audio files such as radio
You’ll also learn how to access and train speech shows and music videos over the Internet.
recognition software so that you can create and edit Offered by subscription, these audio files are
documents without typing.
delivered to your machine free with the
release of each episode. You may also choose
to extract (rip) your CD collection to store on
Digital Audio Software your computer. In addition, with programs
Why would I have digital audio files such as MAGIX Music Maker or Apple
on my computer? Best-selling novels, GarageBand, you can compose your

174 Chapter 4 Application Software: Programs That Let You Work and Play
“Select: What is Identity Theft?”

“Font: Bookman Old Style”

“Font style: Bold Italic”

“Font size: 16”

Figure 4.17
Speech recognition software allows you to create documents using simple voice commands.

Speech recognition software also can help you to be productive during which allows drivers to control mobile phones and digital music players
generally nonproductive times. For example, you can dictate into a digital with voice commands.
recording device while doing other things, such as driving, then download Speech recognition should continue to be incorporated into our daily
the digital file to your computer and let the program type up your words for lives. Aside from the obvious benefits to persons with disabilities, it will
you. Recently, voice recognition technologies have been incorporated into provide continued efficiencies to many others as well.
in-car communication and entertainment systems, such as Ford SYNC,

own songs or soundtracks with virtual CD stores between 10 and 15 songs in


instruments, voice recorders, synthesizers, uncompressed format, but with files in MP3
and special audio effects. You may quickly format, the same CD can store between 100
have several gigabytes of audio files on your and 180 songs. The smaller file size not only
hard drive before you even know it! lets you store and play music in less space,
Why are MP3 files so popular? but also allows quick and easy distribution
MP3, short for MPEG-1 Audio Layer 3, is a over the Internet. You can find hundreds of
type of audio compression format that re- digital audio applications that allow you to
duces the file size of traditional digital audio copy, play, edit, and organize MP3 files, and
files so that they will take up less storage record and distribute your own music on-
capacity. It is also a standard of digital audio line. Ogg Vorbis (or just OGG) is a free, open
compression, which has made it possible to source audio compression format alternative.
transfer and play back music on personal Most digital audio software programs
media players. For example, a typical support one of the following functions.

Media Software for Home 175


Others, such as iTunes, incorporate many of dead air space from the beginning or end of
these capabilities into one multifunctional the song or cutting a portion from the mid-
program: dle. You also can add special sound effects,
such as echo or bass boost, and remove static
• MP3 recording allows you to record
or hiss from your MP3 files. Both of these ap-
directly from streaming audio and other
plications support recording sound files from
software or microphone sources to MP3
a microphone or any source you can connect
format.
through the input line of a sound card.
• CD ripping allows you to copy or ex-
tract CDs and encode to the MP3 format.
• CD burning allows you to create your Digital Video Editing Software
own CDs from your MP3 collection.
• Encoding and decoding is done by What kind of software do I need to
encoders, programs that convert files to edit my digital videos? With the boom
MP3 format at varying levels of quality. of digital camcorders and the improved
Most ripping software has encoders graphics capabilities on home computers,
built in to convert the files directly into many people are experimenting with digital
MP3 format. video editing software. Several video edit-
ing applications are available at a wide
• Format conversion programs allow you
range of prices and capabilities. Although
to convert MP3 files to other digital
the most expensive products (such as Adobe
audio formats such as WAV (short for
Premiere Pro and Final Cut Pro) offer the
Waveform audio format), WMA
widest range of special effects and tools,
(Windows Media Audio), and AIFF
some moderately priced video editing
(Audio Interchange File Format).
programs have enough features to keep the
Can I edit audio files? Audio casual user happy. Microsoft Live Movie
editing software includes tools that make Maker and Apple iMovie have intuitive
editing your audio files as easy as editing drag-and-drop features that make it simple
your text files. Software such as the to create professional-quality movies with
Figure 4.18 open source Audacity (audacity. little or no training (see Figure 4.18).
sourceforge.net) and Sony Sound Forge Pro Microsoft Live Movie Maker
Video editing programs
such as Apple iMovie 10 (sonycreativesoftware.com) enables you (download.live.com/ moviemaker) is a free
make it easy to create and to perform such basic editing tasks as cutting download from Microsoft. Other software
edit movies. developers offer free trial versions so that
you can decide whether their
product meets your needs be-
Video clips in clips pane
fore purchasing it.

Window used to
view or edit movie clips

Movie clips display


in clip viewer

Trans icon controls


transition effects
between clips

176 Chapter 4 Application Software: Programs That Let You Work and Play
Does video editing
software support all
kinds of video files?
Video files come in a num-
ber of formats such as flash
video (FLV for YouTube), Album covers flow by in
MPEG-1, MPEG-2, and a smooth display
MPEG-4, VCD, SVCD,
DVD, AVI, WMV, MOV and
even AVCHD. AVCHD (Ad-
vanced Video Coding High
Definition) is a format for
high-definition video. Many
of the affordable video Smart playlists select
editing software packages song lists based on
support most types of criteria you specify
video files.
For more information on
video editing software, see
the section “Digital Video”
on page 386 of Chapter 8.
In what format are
the videos I watch on
my portable media player? Videos that Figure 4.19
can be watched on portable media players, and even export the files to a database or Software programs such
such as the fifth-generation iPod and iPod spreadsheet application for further manipu- as iTunes help you
Touch, are in the MP4 (MPEG-4) video for- lation. Then you can burn the songs to a CD, manage all the music files
mat. This format stores digital audio and and the program will print liner notes that on your computer. You can
sort, filter, and search
digital video streams, as well as other items, you can place inside the CD case. your collection by artist,
such as text for subtitles and still images. Are there Web-based programs album, or category, and
Similar to the MP3 format, MP4 compresses available to edit, share, and store my you can create playlists.
the audio and video content into a more photos? One great advantage of taking
manageable file size. Most MP4 files have digital images is that you can easily share
the file extension .mp4. However, Apple has the images via the Internet. Initially, we had
created other MPEG-4 extensions to identify to send images as e-mail attachments—and
specific content such as .m4b, which is often our exuberance in sending several images at
used to identify audio book and podcast the same time often clogged someone’s
files, and .m4r, which is used to identify inbox. Several online photo sharing and
ringtone files for the iPhone. photo storing sites, such as Snapfish
(snapfish.com), Kodak (kodak.com), and
Shutterfly (shutterfly.com), enable you to
Media Management Software upload your digital images from your com-
How do I manage the audio, video, puter, create photo albums, and share them
and image files on my system? with friends and family. These sites offer
Many people add hundreds or even thou- printing and card-making services as well.
sands of files to their systems by purchasing Flickr (flickr.com) is probably one of the
music and downloading images and video. best of these online photo management and
Your hard drive is a convenient place to photo sharing applications. It lets you
store all your music and images, but only if organize your images and then share them
you can find what you’re looking for! publicly with millions of users, or just with
Software such as Windows Media Player, your closest friends and family. Discussion
Winamp, and Apple iTunes allows you to boards are available so that groups can
organize audio and video files so that you exchange comments about the images, just as
can sort, filter, and search your music you would if you were passing them around
collection by artist, album, or category (see the dinner table. In addition, taking advan-
Figure 4.19). Using these programs, you can tage of online mapping technologies, Flickr
manage individual tracks, generate playlists, enables you to link your images to a map so

Media Software for Home 177


that you can show exactly where you took ory (RAM), and hard drive capacity to run
the images or see where others took theirs. the program. Because games often push the
Google Picasa (picasa.google.com) is an- limit of sound and video quality, be sure
other popular application in the online your system has the appropriate sound
photo editing, storing, and sharing field. Pi- cards, video cards, speakers, monitor, and
casa helps you send images to your friends, CD or DVD drives.
your mobile devices, or your blog by auto- Some gaming software may require a spe-
matically resizing a huge 12-megapixel cial controller. Some games, such as Steel
image to a more manageable size for elec- Battalion, Rock Band, and many games in the
tronic transmission. With Picasa, you can Nintendo Wii system, are sold with their
then attach the image to an outgoing e-mail own specialized controllers (see Figure 4.20).
message, or transfer the image directly to These controllers also can be adapted to
your blog or to a mobile device such as an your computer. Complex programs can ben-
iPod or smartphone. efit from configurable wireless controllers
such as the Cyborg Evo.
Software Fun How do I tell what computer
games are appropriate for a certain
for Home user? The Entertainment Software
As the term implies, entertainment soft- Rating Board (ESRB) is a self-regulatory
ware is designed to provide users with body established in 1994 by the Entertain-
thrills, chills, and all-out fun! Computer ment Software Association (esrb.org). The
games make up the vast majority of enter- ESRB’s rating system helps consumers
tainment software. These digital games choose the computer and video games that
began with Pong, Pac-Man, and Donkey are right for their families by providing in-
Kong, and have evolved to include many formation about game content so they can
different categories, including action, driv- make informed purchasing decisions. ESRB
ing, puzzles, role-playing, card-playing, ratings have two parts: rating symbols that
sports, strategy, and simulation games. suggest age appropriateness, and content
Entertainment software also includes other descriptors that indicate elements in a game
types of computer applications, such as that may have triggered a particular rating
virtual reality programs that turn artificial or be of interest or concern. It’s important to
environments into a realistic experience. check both the rating symbol (on the front of
the game box) and the content descriptors
Figure 4.20 Gaming Software (on the back of the game box). The rating
symbols currently in use by the ESRB in-
Computer controllers can Do I need special equipment to run
be specialized. Rock Band clude E (Everyone), T (Teens), M (Mature),
entertainment software? As with any
controllers include a and AO (Adult Only).
software, you need to make sure your
guitar, a drum set, and a Can I make video games? Now
microphone. system has enough processing power, mem-
that video games represent an industry with
revenue of more than $20 billion each year,
designing and creating video games is
emerging as a desirable career opportunity.
Professionally created video games involve
artistic storytelling and design, as well as
sophisticated programming. Major produc-
tion houses such as Electronic Arts use
applications that are not easily available to
the casual home enthusiast. However, you
can use the editors and game engines avail-
able for games such as EverQuest, Oblivion,
and Unreal Tournament to create custom lev-
els and characters or to extend the game.
If you want to try your hand at creating
your own video games, multimedia applica-
tions such as Adobe Flash and RPG Maker
VX provide the tools you need to explore
game design and creation. The program

178 Chapter 4 Application Software: Programs That Let You Work and Play
GameMaker (yoyogames.com) is a free prod- high winds. Consequently, users of these
uct that allows you to build a game without training programs are more likely to take
any programming; key elements of the new risks and learn from their mistakes—some-
game creation are dragged and dropped into thing they could not afford to do in real life.
place. Alice (alice.org) is another free envi- Simulated training programs also help pre-
ronment to check out. It lets you easily create vent costly errors. Should something go
3D animations and simple games and in- awry, the only cost of the error is restarting
cludes the actual Sims characters! the simulation program.
Do I need special software to take
courses online? As long as you have a
Educational Software compatible Web browser, online classes will
What kinds of educational applica- be accessible to you. Depending on the con-
tions are there? Although a multitude tent and course materials, however, you
of educational software products are geared may need a password or special plug-ins to
toward the younger set, software developers view certain videos or demos.
have by no means ignored adult markets. In Taking classes over the Internet is rapidly
addition to all the products relating to the becoming a popular method of learning be-
younger audience, there are software prod- cause it offers greater schedule flexibility for
ucts that teach users new skills such as typ- busy students. Although some courses are run
ing, languages, cooking, and playing the from an individually developed Web site,
guitar. Preparation software for students many online courses are run using course
who will be taking the SAT, GMAT, LSAT, management software such as Blackboard, Figure 4.21
and MCAT exams is also popular. In addi- Moodle, and Angel. These programs provide Course management
tion, there are many computer and online traditional classroom tools such as calendars software such as
brain training games and programs designed and grade books over the Internet (see Blackboard provides a
to improve the health and function of our Figure 4.21). Special areas are available for method for doing
traditional classroom
brains. Lumosity (lumosity.com) is one such students and professors to exchange ideas and tasks, such as participat-
site that has a specific “workout” program. information through the use of chat rooms, ing in discussions and
Brain Age2 (brainage.com) has software for discussion forums, and e-mail. Other areas are taking tests, in an online
the Nintendo DS and is designed for players environment.
of all ages.
What types of programs
are available to train you to
use software or special ma-
chines? Many programs pro-
vide tutorials for popular
computer applications. These pro-
grams use illustrated systematic
instructions to guide users
through unfamiliar skills. Some
training programs, known as
simulation programs, allow users
to experience or control the soft-
ware as if it were the actual soft-
ware or an actual event. Such
simulation programs include
commercial and military flight
training, surgical instrument
training, and machine operation
training. Often these simulators
can be delivered locally on CD or
DVD or over the Internet.
One benefit of these simulated
training programs is that they
safely allow users to experience
potentially dangerous situations
such as flying a helicopter during

Software Fun for Home 179


BITS ACTIVE
AND How to Open the Unknown HELP- Choosing Software
BYTES DESK

Normally, when you double-click a file icon on your desktop, the program that is asso- In this Active Helpdesk call, you’ll play the role of a
ciated with the selected file runs automatically. For example, when you double-click a helpdesk staffer, fielding calls about the different
*.doc or *.docx file, the file will open in Microsoft Word. However, if the file has no kinds of multimedia software, educational and refer-
extension or Windows has no application currently associated with that file type, an ence software, and entertainment software.
“Open with” dialog box appears and asks what program you want to use to open the
file. In other cases, a document may open with a program other than the one you
wanted to use to open it. This is because many applications can open several file
types and the program you expected the file to open in is not currently the program nonphotographic drawings, animations, and
associated with that file type. To assign a program to a file type or to change the illustrations using standard drawing and
program to open a particular file type, follow these instructions: painting tools such as pens, pencils, and
paintbrushes. You also can drag geometric
1. Click the Windows Explorer icon, which is pinned to the Windows 7 taskbar by
objects from a toolbar onto the canvas area
default.
to create images and use paint bucket, eye-
2. Use the search and navigation tools in this folder to locate the file you want to
dropper, and spray can tools to add color
change. (For example, you can search for all Word files by searching for *.doc or
*.docx). Right-click on a file of the correct type, and then either click Open With
and special effects to the drawings.
or point to Open With, and click Choose Default Program. Are there different types of draw-
3. A list of programs installed on your computer will appear. Click the program that
ing software? Drawing software is used
you want to use to open this type of file. Although you can choose to open indi- in both creative and technical drawings.
vidual files with a certain program, normally you would select the “Always use Applications such as Adobe Illustrator in-
the selected program to open this kind of file” check box, and then click OK. clude tools that let you create professional-
quality creative and technical illustrations.
When you double-click that type of file in the future, the file will open in the program
Illustrator’s tools help you create complex
you selected.
designs, such as muscle structures in the
human body, and use special effects, such as
charcoal sketches. Its warping tool allows
available for posting assignments, lectures, you to bend, stretch, and twist portions of
and other pertinent class information. your image or text. Because of its many tools
and features, Illustrator is one of the pre-
ferred drawing software programs of most
Drawing Software graphic artists.
What kind of software should I use There are many software packages to
Figure 4.22
for simple illustrations? Drawing help plan the layout of rooms, homes, and
The drawing program landscapes, such as those offered by Broder-
Visio lets you create dif-
software (or illustration software) lets you
ferent types of diagrams create or edit two-dimensional, line-based bund. Microsoft Visio is a program used to
easily with drag-and-drop drawings. You can use drawing software to create technical drawings, maps, basic block
options. create technical diagrams or original diagrams, networking and engineering
flowcharts, and project schedules, but it can
also be used by the more casual designer.
Visio uses project-related templates with
special objects that you drag onto a canvas.
For example, Visio allows you to quickly
drag and drop objects to create diagrams
like the one shown in Figure 4.22. Visio also
provides mindmapping templates to help
you organize your thoughts and ideas.

Business Software
for Home and Office
With the amount of power available in a typ-
ical home computer, you have more
opportunities than ever to run a business
from your home. No matter what service or

180 Chapter 4 Application Software: Programs That Let You Work and Play
product you provide, there are common shapes, and patterns. You also can import
types of software you’ll want to consider. files into your documents from other
Accounting software will help manage the sources, including elements from other
flow of money, and desktop publishing and software programs (such as a chart from
Web page creation tools will help you market Excel or text from Word) and image files.
and develop your new enterprise. A number You can readily manipulate graphics with
of software packages are designed to organ- tools that crop, flip, or rotate images or
ize and help with the daily operations of a modify the image’s color, shape, and size.
typical business. If you ever plan to run a Desktop publishing programs also include
business from your own home, or even if features that allow you to publish to the
you are just a user of large business products Web.
and services, it is helpful to know what func- What software do I use to create a
tions business software can perform. Web page? Web page authoring soft-
ware allows even the novice to design inter-
esting and interactive Web pages, without
Home Business Software knowing any HyperText Markup Language
Which programs are good for small- (HTML) code. Web page authoring applica-
business owners? If you have a small tions often include wizards, templates, and
business or a hobby that produces income, reference materials to help you easily com-
then you know the importance of keeping plete most Web page authoring tasks. More
good records and tracking your expenses experienced users can take advantage of
and income. Accounting these applications’ advanced


software helps small-busi- features, such as features that
ness owners manage Accounting enable you to add headlines
their finances more effi- software helps and weather information,
ciently by providing tools small-business stock tickers, and maps to
for tracking accounts re- make your Web content cur-
ceivable and accounts owners manage rent, interactive, and interest-
payable. In addition, these their finances ing. Microsoft Expression
applications offer inven- more efficiently. Web and Adobe
tory management, payroll,
and billing tools. Examples of accounting
applications are Intuit QuickBooks and
” Dreamweaver are two of the
programs to which both professionals and
casual page designers turn.
Peachtree by Sage. Both programs include Are there other ways to create
templates for invoices, statements, and fi- Web pages? If you need to produce only
nancial reports so that small-business own- the occasional Web page and do not need a
ers can create common forms and reports. separate page authoring program, you’ll
What software can I use to lay out find that many applications include features
and design newsletters and other that enable you to convert your document
publications? Desktop publishing into a Web page. For example, in some Mi-
(DTP) software allows you to incorporate crosoft Office applications, if you choose to
and arrange graphics and text in your docu- save a file as a Web page, the application
ments in creative ways. Although many will automatically convert the file to a Web-
word processing applications allow you to compatible format.
use some of the features that are hallmarks
of desktop publishing, specialized desktop
publishing software such as QuarkXPress
and Adobe InDesign allows professionals to
Large Business Software
design books and other publications that re- There is an application for almost every as-
quire complex layouts (see Figure 4.23). pect of business. There are specialized pro-
What tools do desktop publishing grams for marketing and sales, finance, point
programs include? Desktop publishing of sale, general productivity, project manage-
programs offer a variety of tools with which ment, security, networking, data manage-
you can format text and graphics. With text ment, e-commerce, and human resources, to
formatting tools, you easily can change the name just a few. In the following sections, we
font, size, and style of your text and arrange discuss some of these specialized programs
text on the page in different columns, from this seemingly endless list.

Business Software for Home and Office 181


Tool palette Style Sheets palette Colors palette

Measurements palette Page Layout palette

Figure 4.23
Major publishing houses What software do businesses use contact information in one central database.
use professional publish- for planning and management? Sales professionals use CRM programs to
ing programs such as Planning is a big part of running a success- get in touch with and follow up with their
QuarkXPress to lay out the
pages of textbooks. ful business. Software programs such as clients. These programs also include tools
Palo Alto Software’s Business Plan Pro that enable businesses to assign quotas and
and Marketing Plan Pro help users write create reports and charts that document and
strategic and development plans for general analyze actual and projected sales data.
business and marketing needs. Another cat- Customer relationship programs coordinate
egory of business planning software is well with PIM software such as Outlook and
project management software, such as can be set up to work with smartphones.
Microsoft Project. This type of software GoldMine from FrontRange Solutions is one
helps project managers create and modify example of a CRM program.
scheduling charts like the one shown in An enterprise resource planning (ERP)
Figure 4.24, which help them plan and track system lets a business consolidate multiple
specific tasks and coordinate personnel systems into one and improve coordination
resources. of these business areas across multiple
Customer relationship management departments. ERP systems are used to
(CRM) software stores sales and client control many “back office” operations

182 Chapter 4 Application Software: Programs That Let You Work and Play
and processing functions such as billing, pro-
duction, inventory management, and human
resources management. These systems are
implemented by third-party vendors and
matched directly to the specific needs of a
company. Oracle and SAP are well-known
companies that sell ERP software.
What software helps business
travelers? Mapping programs such as
DeLorme Street Atlas USA and Microsoft
Streets & Trips are perfect for businesses that
require employees to travel frequently.
These programs provide street maps and
written directions to locations nationwide,
and users can customize maps to include
Figure 4.24
landmarks and other handy traveling sites
such as airports, hotels, and restaurants. A Gantt chart in Microsoft Project gives project managers a visual tool for assigning
personnel and scheduling and managing tasks.
More users now turn to an online mapping
service such as Google Maps, MapQuest,
Yahoo! Maps, or Google Earth than to a pany information or products, handle online
more traditional mapping software program sales, or offer customer service and support.
because the online services are easily acces- Depending on the size of the company and
sible with any Internet connection and are its specific needs, it may use products such
updated more frequently than offline ones. as IBM’s WebSphere, GoEmerchant, and
Mapping programs, which can work in con- ProStores Business from ProStores (an eBay
junction with a global positioning system company). These products offer bundled
(GPS), are available in versions for smart- Web site creation and hosting services,
Figure 4.25
phones and for cars. Such programs help shopping cart setup, and credit card
A geographic information
you navigate unfamiliar territory and are processing services. For larger businesses,
system (GIS) applies
essential for sales representatives or specialized software to handle each geographic data to pro-
delivery-intensive businesses. They are aspect of e-commerce is available; alterna- vide solutions to complex
useful for nonprofessionals traveling to tively, a large business might develop business situations.
unfamiliar locations.
Is mapping software just used to
assist with travel? Travel is only one of
several applications that uses mapping Digital elevation
technologies to assist businesses in making
complex decisions and managing complex
systems. Many companies use a geographic
information system (GIS) to assist with man- Streets
aging, analyzing, and displaying data, most
often in spatial or map form (see
Figure 4.25). These maps are used by power
companies to manage electric grids, by Land use and cover
water distribution companies to manage
water distribution, by shipping and trans-
portation companies to determine the most
efficient routes, and even by school districts Topographic map
to manage the flow of students to the appro-
priate schools. Many of these systems are
complex, proprietary ones such as those pro-
Digital line graph of rivers
duced by ESRI. Google Earth and interactive
maps like Google Maps are simple and free
examples of basic forms of a GIS.
What software is used with
e-commerce? It seems that every busi- Real world
ness has an online presence to display com-

Business Software for Home and Office 183


BITS construction. Engineers use CAD software
AND Need a Way to Share Files? Try PDF to design everything from factory compo-
BYTES nents to bridges. The 3D nature of these
programs allows engineers to rotate their
Say you’ve created a file in Microsoft Excel, but the person to whom you want to send models and make adjustments to their
it doesn’t have Excel, or any spreadsheet software, installed on his computer. Further, designs where necessary, thus eliminating
you do not want the contents of the original file to be changed. What do you do in costly building errors.
these situations? One solution is to create a PDF file. Portable Document Format (PDF) CAD software also is being used in
is a file format you can create with Adobe Acrobat or Cutepdf Writer, a free program conjunction with GPS devices for accurate
available from cutepdf.com. These programs transform any file, regardless of its placement of fiber-optic networks around
application or platform, into a document that can be shared, viewed, and printed by the country. The medical engineering com-
anyone who has Adobe Reader. If you are using Microsoft Office 2010, munity uses CAD to create anatomically ac-
OpenOffice.org, or Corel WordPerfect Office, you can create PDF files easily with a curate solid models of the human anatomy,
built-in feature. Adobe Reader (available from adobe.com.), the program you need to allowing them to develop medical implants
read all PDF files, is a free download. quickly and accurately. The list of CAD
applications keeps growing as more and
more industries realize the benefits CAD can
bring to their product development and
proprietary software tailored to its specific manufacturing processes.
needs. Many graphics, animation, video, and
gaming systems use applications from
Autodesk called Autodesk 3ds Max and Au-
Specialized Business Software todesk Maya to create 3D models with com-
Some applications are tailored to the needs of plex textures and lighting models. Autodesk
a particular company or industry. Software 3ds Max and Autodesk Maya are complex
designed for a specific industry is called and rich programs. A slightly simpler pack-
vertical market software. For example, the age is the open source program Blender
construction industry uses software such as (blender.org.), which is available free of
Sage Master Builder, which features estimat- charge. A simple, Web-based, and fairly full-
ing tools to help construction companies bid featured free 3D modeling application is
on jobs. It also integrates project manage- Google’s SketchUp. SketchUp designs coor-
ment functions and accounting systems that dinate well with other Google applications
are unique to the construction industry. so, for example, you could easily import a
Other examples of vertical market 3D image of a deck you created in SketchUp
software include property management soft- into a Google Earth image of your home.
ware for real estate professionals; ambulance
scheduling and dispatching software for
emergency assistance organizations; and
library automation software that combines Getting Help with
cataloging, circulation, inventory, online cat-
alog searching, and custom report printing. Software
In addition to these specific business If you need help while you are working
applications, which companies can buy off the with software, you can access several differ-
shelf, programs often are custom developed ent resources to find answers to your ques-
to address a company’s specific needs. tions. For general help or information about
What software is used to make 3D a product, many manufacturers’ Web sites
models? Computer-aided design (CAD) offer answers to frequently asked questions
programs are a form of 3D modeling that en- (FAQs).
gineers use to create automated Where can I find help while I’m
designs, technical drawings, and model working in an application? Some pro-
visualizations. Specialized CAD software grams offer online help and support. Online
such as Autodesk’s AutoCAD is used in help may consist of documentation compa-
areas such as architecture, the automotive in- rable to a user’s manual. However, many
dustry, aerospace, and medical engineering. applications’ online help allows you to chat
With CAD software, architects can build over the Internet with an online support
virtual models of their plans and readily team member. Some applications are context
visualize all aspects of design before actual sensitive and offer task-specific help or

184 Chapter 4 Application Software: Programs That Let You Work and Play
TRENDS
IN IT Emerging Technologies: Is It Real or Is It Virtual?

Software can take us beyond what is familiar to us and into alternate accountants offer services to advise “in-world” businesses on finance,
realities. Virtual reality uses software to allow people to interact in a sim- strategic planning, or budget forecasting. There is fertile ground for innova-
ulated three-dimensional environment that users can manipulate and tive and entrepreneurial thinkers both inside and outside Second Life.
explore as if they were in that world. Beyond video games, the applica- Finally, businesses and educational institutions also recognize the
tions of virtual reality are almost endless. Three-dimensional environ- marketing potential in Second Life, and they use the virtual world to test
ments created by computers are getting better and better at helping new ideas. Educational institutions such as Harvard, Princeton, and Ohio
people experience new things or experience familiar things in new ways. University have built virtual campuses with the intention of offering “vir-
Virtual environments are used in military training programs, the tual tours” to prospective students. At these “campuses,” current stu-
space program, and, as discussed in Chapter 1, in the medical field. dents can take courses (see Figure 4.26), participate in student
Studies show that soldiers who have gone through virtual reality (VR) organizations, or meet and collaborate online just as they would if they
training are just as effective as those who have trained in traditional met in the real-world student center.
combat situations. Flight simulators are used by airlines to prepare com- Virtual worlds such as Second Life are innovative ways to hold dis-
mercial pilots to fly in a wide range of flight conditions; the military and tance learning classes. Online classes held in a virtual world environment
NASA also use them. The obvious benefit of simulators and VR is that give students the online convenience of not having to travel to class,
there is little machine or human expense when a mistake is made in vir- while providing a more enjoyable and perhaps even more effective
tual conditions—but there would be in “live” conditions. experience. In a virtual world, students are able to convene in traditional
Engineers and designers are also using virtual reality technologies. classrooms, on sandy Malibu beaches, or in open-air venues—
Car manufacturers build virtual prototypes of new vehicles, test them, environments limited only by the imagination of the instructor and the
and make alterations in design before producing a single physical part. students. Given such enjoyable choices, students might be more inclined
Architects create virtual models of building plans so that clients or poten- to make time to attend classes, thus increasing their productivity and the
tial buyers can “walk through” and get a more realistic idea of what the interactivity of the online classroom.
completed building will be like. Virtual classroom environments may add an additional layer of expe-
Second Life, a virtual world launched in 2003 by Linden Research, rience that students may be able to bring into their professional lives.
Inc., has gained worldwide popularity. Users create avatars, or virtual Seton Hall University, for example, uses Second Life in an emergency
representations of themselves, with which they interact in the virtual preparedness course that allows students to work in simulated cata-
world. Second Life has its own economy, where users have created “in- strophic situations, which would otherwise be difficult to experience in
world” businesses and residents can legally trade in the world’s own the real world.
currency, called Linden dollars. Just as in the real
Second Life has also begun to permeate the world, the virtual world has
outside world.“Outside world” businesses now as- its problems. However, it is
sist and advise “in-world” businesses. For likely that virtual reality
example, real-world programmers build complex and virtual environments
in-world projects for clients such as Dartmouth Col- will continue to find uses in
lege, Major League Baseball, and Lego. Real-world entertainment, education,
distance learning, design,
and manufacturing.

Figure 4.26
Virtual worlds are an innovative way to hold
distance learning classes.

Getting Help with Software 185


environment. In addition, you can purchase
software online, through catalogs, and at
auctions.
Click to open Help window

Software Licenses
Don’t I own the software I buy? Most
people don’t understand that, unlike other
Access Help online or offline items they purchase, the software they buy
doesn’t belong to them. The only thing
they’re actually purchasing is a license that
gives them the right to use the software
for their own purposes as the only user of
that copy. The application is not theirs to
Figure 4.27 lend or copy for installation on another
Microsoft Office gives you screen tips to explain where your cursor is computer, even if it’s another one of their
tips on tasks you’re resting. own machines.
working on and answers In Microsoft Office applications, you will What is a software license? A
specific questions you see a question mark icon on the far top right software license is an agreement between
have about using online you, the user, and the software company.
of the program screen. This icon takes you to
and offline resources.
the main Help interface. Integrated help You accept this agreement before installing
means that the documentation for the the software on your machine. It is a legal
product is built directly into the software so contract that outlines the acceptable uses of
you don’t need to keep track of bulky manu- the program and any actions that violate the
als. You can type your question, search for a agreement. Generally, the agreement will
term, or browse the Help topics (see state who the ultimate owner of the software
Figure 4.27). Like many software packages, is, under what circumstances copies of the
Microsoft Office offers help documentation, software can be made, and whether the
which is installed locally on your machine, software can be installed on any other
and online help resources, which are machine. Finally, the license agreement will
updated continually. state what, if any, warranty comes with the
Finally, the Help menu, found on the software.
menu bar of most applications, lets you Do you always buy just one
choose to search an index or content outline license? Most individuals buy single
to find out the nature of almost any licenses to cover their specific use. These
Microsoft application feature. licenses cannot be shared, and you cannot
Where do I go for tutorials and “extend” the license to install the software
training on an application? If you on more than one of your computers. How-
need help learning how to use a product, ever, Apple also offers a “family license”
the product’s developer may offer online that permits a user to install some of its soft-
tutorials or program tours that show you ware legally on as many as five computers,
how to use the software features. Often you and some versions of Microsoft Office come
can find good tutorials by searching the with three licenses. Businesses and educa-
Internet. MalekTips (malektips.com), for tional institutions often buy multiuser li-
example, includes a vast array of multime- censes that allow more than one person to
dia help files; you can find podcasts for use the software. Some multiuser licenses
applications such as Excel and Photoshop are per-seat and limit the number of users
in iTunes; and even YouTube has some overall, while others, called concurrent
helpful videos. licenses, limit the number of users accessing
the software at any given time.
Does open source software
require a license? As you learned ear-
Buying Software lier, anyone using open source software has
These days, you no longer need to go to a access to the program’s code. Therefore,
computer supply store to buy software. You open source software programs can be
can find software in almost any retail tweaked by another user and redistributed.

186 Chapter 4 Application Software: Programs That Let You Work and Play
ETHICS
IN IT Can I Borrow Software That I Don’t Own?

A computer user who copies an application onto more than one com- and unlicensed software and other files) from the Business Software
puter is participating in software piracy, unless his or her license Alliance Web site (bsa.org/usa). A similar program is available at the
specifically provides for multiple distributions. What many software users Microsoft Web site (microsoft.com/piracy). These programs check the
do not realize, or do not think about, is that when they purchase serial numbers of the software installed on your computer against soft-
software, they are actually purchasing a license to use it, rather than ware manufacturer databases of official licensed copies and known
purchasing the actual software. That license is what tells you how many fraudulent copies. Any suspicious software installations are flagged for
times you can install the software, so it is important to read it. If you your attention.
make more copies of the software than the license permits, you are As of yet, there’s no such thing as an official software police force,
pirating. Historically, the most common way software has been pirated but software piracy is so rampant that the U.S. government is taking
among computer users has been by supplementing each other’s soft- steps to stop piracy worldwide. Efforts to stop groups that reproduce,
ware library by borrowing installation CDs and installing the software on modify, and distribute counterfeit software over the Internet are in full
their own computers. Larger-scale illegal duplication and distribution by force. Software manufacturers also are becoming more aggressive in
counterfeiters are quite common as well. In addition, the Internet pro- programming mechanisms into software to prevent repeated installa-
vides various ways to copy and distribute pirated software illegally. tions. For instance, with many Microsoft products, installation requires
Is it really a big deal to copy a program or two? As reported by the you to activate the serial number of your software with a database main-
Business Software Alliance, 40 percent of all software is pirated. Not only tained at Microsoft. This is different from the traditional “registration”
is pirating software unethical and illegal, but the practice has financial that enrolled you voluntarily and allowed you to be notified of product
impacts on all software consumers. The dollars manufacturers lose updates, for example. Activation is required, and failure to activate your
when software is pirated decreases the amount of money available for serial number or attempting to activate a serial number that has been
further software research and development, while increasing the up- used previously results in the software going into a “reduced functional-
front costs to legitimate consumers. ity mode” after the 50th time you use it. Therefore, without activation,
To determine whether you have a pirated copy of software installed you would not be able to save documents in Office—a strong motivator
on your computer at work or at home, you can download a free copy of to let Microsoft watch how many times you install the software you
GASP (a suite of programs designed to help identify and track licensed purchased!

A free software license, the GNU General Multimedia-enriched computers also may
Public License, is required and grants the offer graphics software or a productivity
recipients the right to modify and redistrib- suite that includes page authoring software.
ute the software. Without such license, the Many new computers also include some
recipient would be in violation of software that is of interest to home users,
copyright laws. This concept of redistribut- such as image editing or financial planning
ing modified open source software under software.
the same terms as the original software is Are there any problems associated
known as copyleft. Thus, all enhancements, with pre-installed software? There is
additions, and other changes to copylefted such generous space on system hard drives
software must also be distributed as free these days that leaving pre-installed applica-
software. tions on a system isn’t problematic from
a storage perspective. However, some
manufacturers can include applications that
they hope you will try, so as to build interest
Pre-Installed Software in their product. Some of these applications,
What application software comes especially virus protection software, are trial
with my computer? Virtually every versions for which a user gets a short-term
new computer comes with an operating sys- temporary software license. When the li-
tem as well as some form of application soft- cense expires, the software disables (but is
ware, although the particular applications still installed), and a permanent license must
depend on the hardware manufacturer and be purchased to reinstate the software. In
computer model. You usually can count on addition, many types of pre-installed pro-
your computer having some form of pro- grams are available free from the Web, so
ductivity software preinstalled, such as Mi- the pre-installation is not an advantage. In
crosoft Works or Corel WordPerfect Office. fact, having so many pre-installed programs

Buying Software 187


on your system can degrade the system per- If my computer crashes, can I get
formance by allocating memory away from the pre-installed software back?
active applications. For notebook comput- Most manufacturers no longer include a
ers, such software can also reduce battery system restore disc. Instead, they use a sep-
life. If you don’t use the software or don’t arate partition on the hard drive that holds
renew the license, then the software just an image, or copy, of the pre-installed soft-
clogs up your system unnecessarily. For this ware. However, it’s not always possible to
reason, this pre-installed software is referred reboot from the partitioned hard drive,
to as bloatware. The best thing to do is to especially when your computer crashes,
delete the programs. so one of the first things you should do
Can I get the manufacturer to after you purchase a new computer is create
uninstall or install software before a restore disc. Generally the manufacturer
shipping? Several years ago, Dell will have placed a utility on your system, or
began to allow buyers of certain computers you can use the utility included in Windows
to decline unwanted bloatware. Dell also 7, to create a restore disc. To create a restore
included an extra uninstall utility disc with Windows 7, click the Start Menu,
program on certain computers to make it select Control Panel, and then select System
easier to remove unwanted software. On & Security. From there, select Backup and
the other hand, if you know you’ll need a Restore, and then click Create a system
particular type of software not offered as repair disc. Next, insert a blank DVD in
standard on your new computer, you may your DVD drive and select the drive. Click
want to see if the computer manufacturer “Create disc.” Once the copy has been
has a special offer that will allow you to made, label the disc and put it away in a
add that particular software at a reduced safe place.
price. Sometimes, initially buying software
through the hardware manufacturer is less
expensive than buying software on the
retail market. This is not always the case,
Web-Based Applications
so do some comparative pricing before Does all application software require
you buy. installation on my computer? Most
application software you acquire, whether
by purchasing a CD or DVD at a retail store
or by downloading the software from a Web
BITS
site, must be installed on your computer be-
AND Getting Rid of the Bloat fore use. There is a relatively new trend of
BYTES
on-demand software deployment, referred
You have a new computer and expect blazing fast speeds. Unfortunately, the manu- to as Software as a Service (SaaS), that
facturer included lots of software that you don’t want or need, and you know it many software developers are taking advan-
degrades performance, and slows down startup and shutdown times. To get rid of tage of. Instead of the traditional model that
bloatware, you can install an application such as PC Decrapifier (pcdecrapifier.com), requires software to be purchased and in-
or if you prefer to do this yourself, consider some of these tips: stalled on individual machines or network
servers, with the SaaS delivery model, the
1. Trial Antivirus Software: While it’s absolutely necessary to have antivirus soft-
application is hosted online by the vendor
ware on your new machine, often, you can transfer the unexpired portion of your
license from your old machine to your new one. If that is the case, uninstall the and made available to the customer over the
trial version immediately, because you will be bombarded with registration Internet. These applications are also referred
prompts once the trial version expires. to as Web-based applications.
2. Toolbars: While toolbars can be useful, you want to select those that are most What kinds of Web-based applica-
useful to you, and having too many can be repetitive. Many computers come tions are available? Along with its re-
with Google or Yahoo! toolbars installed, and possibly others. You can go through lease of Office 2010, Microsoft made
Add and Remove programs to uninstall any unwanted toolbars. available Microsoft Office Web Apps. Office
3. Manufacturer-Specific Software: Some computer manufacturers also install Web Apps are similar to the full-featured in-
their own software. Some of these programs can be useful, while others are stallable versions of Word, Excel, Power-
help features and update reminders, which are also found in your operating Point, and OneNote, but it comes with only
system. You can remove any or all of these support applications, and instead the Home and Insert tabs, and it has fewer
just check the manufacturer’s Web site periodically for any updates or new options (see Figure 4.28).
information. Google Docs (docs.google.com) is a Web-
based suite of productivity software with

188 Chapter 4 Application Software: Programs That Let You Work and Play
word processing, spreadsheet, and presenta-
tion capabilities. Sites such as Zoho
(zoho.com) as shown in Figure 4.29, and
ThinkFree (thinkfree.com) offer Web-based
applications that cover not only word pro-
cessing, presentation, and spreadsheet
needs, but also a wealth of other business
applications such as project management,
3D drawing, and customer relationship
management software. Some other examples
of Web-based applications include Intuit’s
QuickBooks online, Salesforce.com, and
Citrix Online.
What advantages do Web-based
applications have? As long as you have
a Web browser, you can access your files,
which are stored securely online. Although
these free applications are not as fully fea-
tured as their installable counterparts, most
can read and export to many different file
formats and can be used with other software
packages. Besides being able to access
your documents from any computer or
smartphone that has Internet access, Web-
based applications are great for collabora-
tions. You can invite people to share your
files and work together in real time,
watching as others make changes to the
document.
Is all Web-based software free?
Web-based applications are run from
software stored completely on a Web
server instead of your hard drive. Web-
based applications are a reflection of a
movement toward a new software distribu-
tion model.
Although most Web-based software pro-
grams are free, some Web sites charge a fee
for their online products. TurboTax Online
(turbotax.com) is a version of the popular Figure 4.28
tax preparation software that you can access Microsoft Web Apps are
online to prepare your tax returns. While the In addition, they want to encourage you to similar to the full-featured
standard version is free, you’re charged for learn with their product, hoping you’ll be- versions of Word, Excel,
PowerPoint, and OneNote.
the more full-featured product. In addition come a long-term user of their software. Although the Word and
to saving you the hassle of software installa- Therefore, if you’re a student or an educator, Excel Web applications
tion, TurboTax Online stores your informa- you can purchase software that is no differ- have fewer options
tion in a secure location so that you can ent from regularly priced software at prices available, the functionality
retrieve it anytime. that are sometimes substantially less than and user interface are
the same.
general consumer prices.
Campus computer stores and college
bookstores sometimes offer discounted
Discounted Software prices to students and faculty who possess a
Is it possible to buy software at a valid ID. Online software suppliers such as
discount? Software manufacturers un- Journey Education Marketing
derstand that students and educators often (journeyed.com), CampusTech, Inc.
need to use software for short periods of (campustech.com), and Academic Super-
time because of specific classes or projects. store (academicsuperstore.com) also offer

Buying Software 189


retail Web sites such as Microsoft.com and
Amazon.com. You also can use the Internet
to buy software that is custom developed for
your specific needs. Companies such as As-
centix Corporation (ascentix.com) act as in-
termediaries between you (the software
user) and a software developer, who tweaks
open source software code to meet your par-
ticular needs.
When buying software from the Internet,
you should also request that the software be
sent to you on CD or DVD, if this is avail-
able. Without a physical copy of the soft-
ware, it is much more difficult to reinstall
the software if you change computers or if
your hard drive crashes. If a physical copy is
not available, make sure you create a backup
and keep it in a safe place.
Figure 4.29 The Microsoft .NET program
Zoho.com is one of the popular software to students at reduced (microsoft.com/net) offers software over
many emerging Web sites prices. the Internet for all devices—not just
that offers free Web- computers—that have a connection to the
Can I buy used software? Often
based productivity Internet. Therefore, you can download
software. you can buy software through online auc-
tion sites such as eBay. If you do so, be sure software specifically for your smartphone
that you are buying licensed (legal) copies. by using .NET. In addition, if you have a
Computer shows that display state-of-the- Microsoft .NET account (available free of
art computer equipment are generally good charge at the Microsoft Web site), you can
sources for software. However, here, too, connect to any other .NET-connected device.
you must exert a bit of caution to make sure
you are buying licensed copies and not
pirated versions. Freeware and Shareware
Can I buy software directly from
the Internet? As with many other retail Can I get software for free legally?
products, you can buy and download Freeware is any copyrighted software that
software directly from many companies and you can use for free. Plenty of freeware ex-
ists on the Web, ranging from games and
screen savers to business, educational,
graphics, home and hobby, and system util-
BITS ity software programs. To find free software,
AND Applications on the Go—There Is type “freeware” in your search engine. Good
BYTES an App for That sources of a large variety of freeware pro-
grams are Butterscotch (butterscotch.com),
More and more of us carry some kind of mobile digital device that enables us to use shown in Figure 4.30, and Freeware Home
software on the go. We can install productivity, entertainment, communication, and (freewarehome.com).
navigation software on our iPhones, Blackberries, iPods, iPads, and other mobile Although they do not charge a fee, some
devices. Microsoft Office 2010 has modestly featured Web-based Word, Excel, Power- developers release free software and request
Point, and OneNote applications, so you’ll have access to your productivity documents that you mail them a postcard or send them
without having to worry about transferring files from one machine to another. an e-mail message to thank them for their
Although mobile applications have been available for smartphones for a while, they time in developing the software and to
have been limited in scope and content, in addition to being slightly pricey. give them your opinion of it. Such programs
One of the features that makes the iPhone and iPod Touch so popular is their abil- are called postcardware and e-mailware,
ity to run small apps. Many of these applications are fun and free (such as the flash- respectively.
light and Sudoku applications), while others (such as the Tip Calculator, the Another option is to search for an open
Remember the Milk list, or a connection to your online banking files) help you be more source program to fit your needs. Open
productive. The full list of available applications for the iPhone and iPod Touch is avail- source programs are free to use on the con-
able on the iTunes apps store Web site. dition that any changes you make to im-
prove the source code also must be

190 Chapter 4 Application Software: Programs That Let You Work and Play
distributed for free. SourceForge.net
(sourceforge.net) is an excellent site to begin
your hunt for a group that may already have
built a solution that will work for you!
While many legitimate freeware exists,
some unscrupulous people use freeware
to distribute viruses and malware. Be
cautious when installing such programs,
especially if you are unsure of the
provider’s legitimacy.
Can I try new software before it is
really released? Some software devel-
opers offer beta versions of their software
free of charge. A beta version is an applica-
tion that is still under development. By dis-
tributing free beta versions, developers hope
users will report errors, or bugs, they find in
their programs. Many beta versions are avail-
able for a limited trial period, and are used to Figure 4.30
help the developers correct any errors before
Butterscotch.com is a useful site for finding freeware applications and provides
they launch the software on the market. product reviews, tutorials, and related podcasts.
Is it still freeware if I’m asked to
pay for the program after using it for
a while? One model for distributing Can shareware programmers make
software is to run a version free of charge for me pay for their shareware once I
only a limited time. These are fully func- have it? The whole concept of shareware Figure 4.31
tional packages, but they expire if not pur- assumes that users will behave ethically and
Tucows.com is a useful
chased within a certain timeframe. This is abide by the license agreement. However, site for finding shareware
referred to as shareware. Shareware soft- to protect themselves, many developers and freeware applica-
have incorporated code into the program to tions. The site provides
ware is distributed free, but with certain product reviews, hard-
conditions. Sometimes the software is re- stop it from working completely or to alter
ware requirements, and
leased on a trial basis only and must be reg- the output slightly after the trial period
details about the limita-
istered after a certain period of time; in other expires. tions of free versions
cases, no support is available unless the soft- of software.
ware is registered. In some cases, direct pay-
ment to the author is required. Shareware is
not freeware. If you use the software after
the initial trial period is over, then you are
breaking the software license agreement.
Software developers put out shareware
programs to get their products into users’
hands without the added expense and has-
sle of marketing and advertising. Therefore,
quite a few great programs are available as
shareware, and they can compete handily
with programs on retail shelves. For exam-
ple, TechSmith Corporation (techsmith.com)
offers screen capture and desktop recording
applications as shareware, including SnagIt
Screen Capture and Camtasia Studio, a
screen recording and presentation applica-
tion. You can try these products for free for a
30-day period, after which time you must
purchase the software to continue using it.
For a listing of other shareware programs,
visit the CNET site Tucows (tucows.com), as
shown in Figure 4.31.

Buying Software 191


BITS Also, make sure that your virus protection
AND Keeping Your Software Up-to-Date software is up-to-date.
BYTES
Software Versions and System
Bugs in software occur all the time. Software developers are constantly testing their
Requirements
product, even after releasing the software to the retail market, and users report errors
they find. In today’s environment in which security is a large concern, companies test What do the numbers after software
their products for vulnerabilities against hackers and other malicious users. Once a fix names indicate? Software companies
or patch to a bug or vulnerability is created, most software developers will put the change their programs to repair problems
repair in downloadable form on the Internet and make it available at no charge. You (or bugs) or add new or upgraded features.
should check periodically for any software updates or service packs to ensure your Generally, they keep the software program’s
software is up-to-date. For your convenience, many products have an automatic name but add a number to it to indicate that
update feature that downloads and installs updates automatically. it is a different version. Originally, develop-
ers used numbers only to indicate different
software versions (major upgrades) and
releases (minor upgrades). Today, however,
they also use years (such as Microsoft
Office 2010) and letters (such as WordPerfect
Are there risks associated with in- Office X5) to represent version upgrades.
stalling beta versions, freeware, and When is it worth buying a newer
shareware or downloading them version? Although software developers
from the Internet? Not all files avail- suggest otherwise, there is no need to rush
able as shareware and freeware will work on out and buy the latest version of a software
your computer. You easily can crash your program every time one is available. De-
system, and may even need to reinstall your pending on the software, some upgrades
operating system as a result of loading a may not be sufficiently different from the
freeware or shareware program that was not previous version to make it cost-effective for
written for your computer’s operating you to buy the newest version. Unless the
system. upgrade adds features that are important to
Of course, by their very nature, beta you, you may be better off waiting to up-
products are unlikely to be bug free, so you grade every other release. You also should
always run the risk of something going consider whether you use the software fre-
awry with your system. Unless you’re will- quently enough to justify an upgrade and
ing to deal with potential problems, it may whether your current system can handle the
be best to wait until the last beta version is new system requirements of the upgraded
released. By that time, most of the serious version.
bugs will have been worked out. If I have an older version of soft-
As a matter of precaution, you should be ware and someone sends me files
comfortable with the reliability of the from a newer version, can I still open
source before downloading a freeware, them? Software vendors recognize that
shareware, or beta version of software. If it’s people work on different versions of the
a reliable developer whose software you are same software. Vendors, therefore, make
already familiar with, you can be more cer- new versions backward compatible, mean-
tain that a serious bug or virus is not hiding ing that they can recognize (open) files
in the software. However, downloading created with older versions. However, some
software from an unknown source could software programs are not forward
potentially put your system at risk of con- compatible, so older versions cannot
tracting a virus. (We discuss viruses in de- recognize files created on newer versions of
tail in Chapter 9.) the same software.
A good practice to establish before in- How do I know whether the
stalling any software on your system is to software I buy will work on my
use the Windows 7 operating system’s computer? Every software program has
Restore feature and create a restore point. a set of system requirements that specify
That way, if anything goes wrong during the minimum recommended standards for
installation, you can restore your system to the operating system, processor, primary
the way it was before you started. (We dis- memory (RAM), and hard drive capacity.
cuss the System Restore utility in Chapter 5.) Sometimes there are other specifications for

192 Chapter 4 Application Software: Programs That Let You Work and Play
ACTIVE installation disc. Instead, everything you
Buying and need to install and run the downloaded
HELP-
DESK
Installing Software program is contained in one file that has
been compressed (or zipped) to make the
In this Active Helpdesk call, you’ll play the role of a downloading process quicker. For the most
helpdesk staffer, fielding calls about how to best pur- part, these downloaded files unzip or de-
chase software or get it for free, how to install and compress themselves and automatically
uninstall software, and where you can go for help start or launch the setup program. During
when you have a problem with your software. the installation and setup process, these
programs select or create the folder on your
computer’s hard drive in which most of the
program files will be saved. Usually, you
can select a different location if you desire.
the video card, monitor, CD drive, and other Either way, note the name and location of
peripherals. These requirements generally the files, because you may need to access
are printed on the software packaging or are them later.
available at the manufacturer’s Web site. Be- What do I do if the downloaded
fore installing software on your computer, program doesn’t install by
ensure that your system setup meets the itself? Some programs you download do
minimum requirements by having sufficient not automatically install and run on your
storage, memory capacity, and processing computer. Although the compressed files
capabilities. may unzip automatically as part of the
download process, the setup program may
not run without some help from you. In this
Installing, case, you need to locate the files on the hard
Uninstalling, and drive (this is why you must remember the
location of the files) and find the program
Starting Software that is controlling the installation (usually
Before you use your software, you must per- named setup.exe or sometimes install.exe).
manently place it, or install it, on your Files ending with the .exe extension are exe-
system. The installation process will differ cutable files or applications. All the other
slightly depending on whether you’ve files in the folder are support, help, and data
purchased the software from a retail outlet files. Once the setup program begins, you
and have an installation CD or are down- will be prompted to take the actions neces-
loading it from the Internet. Deleting or sary to complete the installation.
uninstalling software from your system re-
quires that you take certain precautions to
ensure you remove all associated programs
as well.
How do I install software? When
you purchase software, the program files
may come on a CD or a DVD. For most pro-
grams created for installation on a PC, an in-
stallation wizard automatically opens when
you insert the disc, as shown in Figure 4.32.
By following the steps indicated by the wiz-
ard, you can install the application on your
system. If the wizard doesn’t open automati-
cally for some reason, the best way to install
the software is to go to the Programs and
Features icon, located on the Control Panel
on the Start menu. This feature locates and
launches the installation wizard.
How is the installation process dif-
ferent for software I download from Figure 4.32
the Web? When you download software Part of the installation process in Windows is a security check to confirm
from the Web, you typically do not get an that the software is from a reliable source.

Installing, Uninstalling, and Starting Software 193


What’s the difference between a the Start menu. Using this icon runs the
custom installation and a full instal- proper cleanup routine to clear out all of the
lation? One of the first steps in the instal- files associated with the application, and
lation wizard asks you to decide between a also restores any settings that have been
full installation and a custom installation. A changed. If you can’t locate the uninstall
full installation will copy all the files and program for a particular application, click
programs from the distribution disc to the the Start menu, click Control Panel, and then
computer’s hard drive. By selecting custom click Programs and Features. This will give
installation, you can decide which features you a list of applications installed on your
you want installed on the hard drive. system; from this list, you can choose which
Installing only the features you know you application you would like to uninstall.
want allows you to save space on your hard Is there a best way to start an
drive. application? The simplest way to start
Can I just delete a program to an application is by clicking its icon in the
uninstall it? An application contains All Programs list found on the Start menu.
many different files—library files, help files, Every program that you install on your sys-
and other text files—in addition to the main tem is listed on the Start menu. However, in
file you use to run the program. By deleting Windows 7, if you find you use only a few
only the main file, or only the icon on your programs often, you can place a shortcut to
desktop, you are not ridding your system of those programs on the taskbar or on your
all the pieces of the program. In addition, desktop. To place a program on the taskbar,
some applications make changes to a variety right-click the program icon on your desk-
of settings, and none of these will be top or right-click the program name on the
restored if you just delete the desktop icon Start menu. From the shortcut menu that is
or remove the main file from your programs displayed, select Pin to Taskbar. Windows
list. then places an icon for this program on the
Some programs place an Uninstall Taskbar (see Figure 4.33a). To uninstall a
Program icon in the main program folder on taskbar or Start menu icon, select remove or

Figure 4.33
For quick access to an
a
application you use often,
you can (a) create short-
cuts on (b) the desktop or b
taskbar.

Arrow indicates
shortcut

Desktop shortcuts can be


created easily Windows 7 taskbar

194 Chapter 4 Application Software: Programs That Let You Work and Play
unpin this program from taskbar or from There is virtually an application for
this list, respectively. almost anything you want or need to do on
To create a shortcut on the desktop, right- your computer, whether it’s work related
click the icon of the desired program, or just for entertainment purposes. And
click Send To, and select Desktop (see there are a variety of types of applications
Figure 4.33b). This places the shortcut icon for almost every application such as
directly on the Desktop. You can identify a proprietary, open source, Web-based,
shortcut icon by the arrow in its lower left freeware, and shareware. Have fun explor-
corner, as shown in Figure 4.31a. ing all the various possibilities!

Installing, Uninstalling, and Starting Software 195


four
four summary
chapter

1. What’s the difference between copying, recording, editing, and organizing


application software and system multimedia files. Because modern users
software? have so many audio, video, and image files,
many software solutions are available for
summary

Application software is the software you


use to do everyday tasks at home, school, organizing and distributing these types of
and work. Application software includes files.
productivity software, such as word pro-
cessing and finance programs; media soft- 4. What are the different types of
ware, such as applications used for image entertainment software?
and video editing; home and entertainment
Beyond the games that most of us are famil-
software, such as games or educational pro-
iar with, entertainment software includes
grams; and business software for small and
virtual reality programs that use special
large businesses. System software is the soft-
equipment to make users feel as though
ware that helps run the computer and coor-
they are actually experiencing the program
dinates instructions between application
in a realistic 3D environment.
software and the computer’s hardware
devices. System software includes the
operating system and utility programs. 5. What are the different types of
drawing software?
2. What kinds of applications are Drawing software includes a wide range of
software programs that help you create and
included in productivity software?
edit simple line-based drawings or create
Productivity software programs include more complex designs for both imaginative
word processing, spreadsheet, presentation, and technical illustrations. Floor plans,
note taking, personal information manager animations, and mind maps are some of
(PIM), and database programs. You use the types of images that can be created.
word processing software to create and edit
written documents. Spreadsheet software
enables you to do calculations and numeri-
6. What kinds of software do small and
cal and what-if analyses easily. Presentation
large businesses use?
software enables you to create slide presen-
tations. Note taking software provides a Many businesses, including home busi-
convenient means to take extensive notes or nesses, use software to help them with
to just jot down a few thoughts. You can finance, accounting, strategic planning,
easily organize and search your notes. PIM marketing, and Web-based tasks common
software helps keep you organized by to most businesses. In addition, businesses
putting a calendar, address book, notepad, may use specialized business software (or
and to-do lists within your computer. vertical market software) that is designed
Database programs are powerful for their specific industry.
applications that allow you to store and
organize data. Individuals can also use
software to help with business-like tasks 7. Where can I go for help when I have a
such as preparing taxes and managing problem with software?
personal finances. Most software programs have a Help menu
built into the program with which you can
search through an index or subject directory
3. What are the different types of to find answers. Some programs group the
multimedia software? most commonly asked questions into a sin-
Multimedia software includes digital image, gle “frequently asked questions” (FAQ)
video, and audio editing software; anima- document. In addition, many free and
tion software; and other specialty software fee-based help and training resources are
required to produce computer games. Many available on the Internet and through
software programs are available for playing, booksellers.

196 Chapter 4 Application Software: Programs That Let You Work and Play
summary
four four

chapter
8. How can I purchase software or get it in the software, or if not included to use the
for free? Add or Remove Program feature that comes
Almost every new computer system comes with the operating system. Most programs

summary
with some form of software to help you ac- are installed using an installation wizard
complish basic tasks. You must purchase all that walks you through the installation.
other software unless it is freeware or open Other software programs may require you
source code, which you can download from to activate the setup program, which then
the Web for free. You can also find special will begin the installation wizard. Using the
software called shareware you can run free Add or Remove Programs feature when
of charge for a test period. Although you can uninstalling a program will help you ensure
find software in many stores, as a student that all additional program files are
you can purchase the same software at a removed from your computer.
reduced price with an academic discount.

9. How do I install, uninstall, and start


software?
When installing and uninstalling software,
it’s best to use the uninstall feature provided

197
four
four key terms
chapter

accounting software ........................................... 181 online mapping service...................................... 183


application software ........................................... 162 open source software.......................................... 163
audio editing software ....................................... 176 personal information manager (PIM)
key terms

beta version .......................................................... 191 software ............................................................. 168


bloatware .............................................................. 188 presentation software......................................... 166
computer-aided design (CAD) ......................... 184 productivity software ......................................... 162
copyleft ................................................................. 187 program ................................................................. 162
course management software ........................... 179 project management software .......................... 182
custom installation.............................................. 194 proprietary software ........................................... 163
customer relationship management shareware.............................................................. 191
(CRM) software ............................................... 182 simulation program ............................................ 179
database software ............................................... 166 software................................................................. 162
desktop publishing (DTP) software................ 181 Software as a Service (SaaS) ............................. 188
digital video editing software .......................... 176 software license ................................................... 186
drawing software (illustration software)........ 180 software piracy .................................................... 187
enterprise resource planning (ERP) software suite....................................................... 170
system ................................................................ 182 speech recognition software
entertainment software ...................................... 178 (voice recognition software) .......................... 174
Entertainment Software Rating Board spreadsheet software .......................................... 165
(ESRB)................................................................ 178 system requirements .......................................... 192
financial planning software.............................. 171 system software ................................................... 162
freeware ................................................................ 190 tax preparation software .................................... 171
full installation .................................................... 194 template ................................................................ 169
image editing software vertical market software .................................... 184
(photo editing software)................................. 172 virtual reality program ....................................... 178
integrated help..................................................... 186 Web-based application....................................... 163
integrated software application ....................... 169 Web page authoring software ........................... 181
macro ..................................................................... 169 wizard.................................................................... 169
mapping program ............................................... 183 word processing software.................................. 163
multimedia software .......................................... 172

198 Chapter 4 Application Software: Programs That Let You Work and Play
buzzwords
four four

chapter
Word Bank
• application software • integrated software • system requirements
• beta version • productivity software • system software

buzzwords
• freeware • shareware • templates
• illustration software • software piracy • Web-based applications
• image editing software • software suite • wizards
• integrated help • spreadsheet • word processing

Instructions: Fill in the blanks using the words from the Word Bank above.

Roxanne is so pumped! Her aunt is upgrading to a newer computer and is giving Roxanne
her old one. Roxanne has just enrolled in college and knows she’s going to need at least
(1) a(n) __________ program to help her write papers and (2) a(n) __________ program to
help her keep track of expenses while she is at school. Because both of these applications
are part of a larger group of applications called (3) __________, she knows she can buy
them as a group. She’s been told that it’s cheaper to buy them as (4) a(n) __________ than to
buy them individually. Because she knows she’ll need the stable, tested versions of the soft-
ware, she cannot get by using (5) a(n) __________ of the program. Roxanne is also aware of
many interesting (6) __________ that are available from the Internet and that she can access
anywhere she has an Internet connection.

As a graduation present, Roxanne received a new digital camera. She needs to install
the (7) __________ that came with her camera to edit and manage her digital pictures.
Although she’s used the software a couple of times on her parents’ computer, she is still
glad for the (8) __________ feature to assist her with specific feature-related questions and
the (9) __________ that provide systematic guides to help her do things.

Roxanne especially likes the decorative preformatted (10) __________ she can use to insert
pictures and make them seem professional. She also knows of some (11) __________ games
she can download without cost from the Internet and other (12) __________ programs that
she could try but eventually pay for. She found some really useful utility programs under

computer
the category of (13) __________ programs, which she can download for no charge and
would like to install and try out. It’s tempting for her to borrow software from her friends,
but she knows that it’s considered (14) __________. She also knows that before installing
any of the programs she must check the (15) __________ to determine if the software is
literate
becoming
compatible with her system as well as whether the system has enough resources to support
the software.

becoming
computer literate
Using key terms from this chapter, write a letter to a new business owner advising them
of the types of software they should get to help them run their company. Make sure you
identify the type of business in the letter, and think of all possible software that would fit
that specific type of business in addition to general business software that most businesses
would require.

199
four
four self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more practice with key
terms and concepts from this chapter.

Multiple Choice
self-test

1. The minimum set of recommended 6. What kind of software is responsible for


standards for a program is known as the back office operations such as billing and
a. operating system. inventory?
b. system requirements. a. Enterprise resource planning
c. setup guide. b. Project management
d. installation specs. c. Business accounting
2. Software that is freely distributed but d. Personal information
comes with conditions is 7. Which of the following is true about open
a. proprietary software. source software?
b. system software. a. The program code is confidential.
c. freeware. b. The program can be changed and
d. shareware. freely distributed.
3. What type of software enables you to c. The program can be freely distributed
easily perform calculations and numerical as long as the program code is not
analyses? changed.
a. Word processing c. Presentation d. The program code is subject to
b. Spreadsheet d. Database copyright protection.
4. Which is NOT an advantage of using a 8. An example of free image editing
software suite? software is
a. The cost is cheaper than buying a. Picasa.
programs individually. b. Illustrator.
b. The programs provide for better c. Photoshop Elements.
integration. d. iMovie
c. The programs integrate easily with 9. Which program incorporates a Wiki
programs from other software suites. system and is good for collaboration?
d. The programs share common features a. Word
such as toolbars. b. EverNote
5. The two primary types of software used c. OneNote
with a computer are d. iWork
a. system software and word processing 10. What is another name for Software as a
software. Service (SaaS)?
b. e-mail software and word processing a. Web-based application
software. b. ERP software
c. application software and system c. Apps
software. d. Software suite
d. Web browser and application software.

True–False
_____ 1. A macro is a small program that groups a series of commands so that they run as a single
command.
_____ 2. When you need help with software, you should use the program’s help features or
manufacturer FAQs, not online help like podcasts or YouTube videos.
_____ 3. System software includes the operating system and utility programs.
_____ 4. An integrated software application is a group of programs bundled as a package.
_____ 5. To remove a program you no longer want, it’s better to delete it than uninstall it.

200 Chapter 4 Application Software: Programs That Let You Work and Play
making the
four four

chapter
transition to...
next semester
1. Picture Perfect

transition to...
You just spent the summer volunteering in a remote village in Africa, and you have tons
of pictures you want to share with friends and family. For your friends, it’s easy to
upload them into Facebook, but you don’t want to give your family access to your

next semester
making the
Facebook account. Research different Web sites that you would consider using to upload
your pictures to show your family. Create a table that lists the different services along
with the pros and cons of each site. Discuss which services you would use and explain
your reasoning.
2. Software Help
Because your friends know you like technology, they always are coming to you for advice
and help with their software. While you don’t mind helping out your friends, there are
some great Web sites that they also can go to. Create a presentation that explains the
various ways they can get free help about all their software questions. Begin the presenta-
tion with a list of FAQs and hyperlink each question to the slide that contains the answer.
3. Upgrading Software
You are trying to decide whether to upgrade some software that you used this past
semester. How do the following items weigh into your decision to upgrade the software
or not?
a. The cost of the upgrade
b. The length of time the upgrade has been available
c. Hardware requirements
d. Features of the upgrade versus the stability of your current system

4. Choices, Choices
There are many word processing software options. Describe the decision process you
would use to choose among a free Web-based word processing application, an open
source word processing application, and a standard packaged application if you are
a. traveling abroad for a semester, visiting 15 different cities, and not carrying a
notebook with you.
b. staying at home for the term and compiling a capstone report using several hundred
researched sources of information.
c. working with three people from other colleges on a joint paper that will be presented
at a conference at the end of the term.

5. Using OneNote
You have been assigned a research paper, which will be very extensive. You are required
to collect information for the paper throughout the semester, so you need a good system
to keep your notes, readings, and data organized. You’ve heard OneNote is a great tool
for just this type of project, but since you have never used the software, you do not know
where to start. Go to Microsoft Online and search on “Templates for OneNote.” Find sev-
eral good templates that will help you get started. What are the features of the templates
you choose? Discuss which template you would most likely use and why.

201
four
four making the
chapter

transition to...
the workplace the workplace
1. Surveying the Competition
making the

You are asked to develop a departmental report that analyzes the key competitors in
transition to...

your market. You will need to take the following steps:


a. Identify the major competitors in your market.
b. Gather information on their companies, their sales, and the features of their
products.
c. Organize your data so it can be easily sorted and filtered.
d. Analyze the trends in the marketplace and predict future direction of growth.
e. Create a final report and presentation to deliver to the department heads.
Identify what software products you would use to complete each of these tasks. How
would you use them, and how would they work together to support your efforts?
2. Sharing Calendars
Microsoft Outlook is a great personal information management tool to organize your
e-mail, tasks, and appointments. But what happens when you try to schedule a
meeting with several people and need to coordinate calendars? It can be a nightmare.
Research how you can share calendars through Google calendars and other online
calendar sharing programs. What are the benefits of these applications? What can be
the areas for concern?
3. Tracking Your Personal Finances
You are finally out on your own—graduated from college and working your first job.
It’s time to track how much you spend versus what you are earning. You really don’t
want to live from paycheck to paycheck, and want to begin a savings plan to build a
rainy-day fund. Investigate online financial planning sites such as mint.com and
yodlee.com and then choose the one that seems best to you. If you can, download a
version of the software for your smartphone. Track your expenses for a few weeks, and
identify areas in which you can cut back on your spending. What are the features of the
software that you like? Discuss how this may or may not help you in your goal to
financial independence.
4. Going Beyond PowerPoint
Your boss is tired of looking at presentations with the same designs and features and
has asked you to research different presentation software packages. In particular, she
has suggested you look into Prezi (prezi.com) and Sliderocket (sliderocket.com). Using
one of these software applications (both have free trials), create a presentation that
compares these two products to Microsoft PowerPoint, Apple Keynote, and
OpenOffice.org Impress.

202 Chapter 4 Application Software: Programs That Let You Work and Play
critical thinking
four four

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Selling After Upgrading


Several years ago you purchased Adobe Acrobat so you could make PDFs and edit and
mark up PDFs. You have since changed computers, and your version of Acrobat is not
compatible with the operating system on your new computer. You are required to
purchase an upgrade of Adobe Acrobat to run on the new machine. Your sister wants
to install the old version of Adobe Acrobat on her computer since you’re not using it
anymore. Do you think this will be legal to do? Why or why not?

2. What’s Your App?


Small applications are being developed every day for smartphones. If you have a
smartphone, what applications are the most useful to you? If you do not, what kind
of app do you think would be the most useful? Describe an app that is currently not
available that would be your “killer app.”

3. Media Management
Less than a decade ago, most home users had few media files on their computer
systems. Today, many users have a library of music, a collection of digitized movies,
personal photo collections, and even a large set of recorded television shows. Examine
three different software packages on the market today for managing these materials.
What features do they need to make the PC the primary entertainment device for a
home? What would make users move their PC from the office into the living room?

4. Software and Microcredit


The 2006 Nobel Peace Prize was awarded to Muhammad Yunus, who created the
Grameen Bank. This bank makes quite small loans to the poor of Bangladesh, without
requiring collateral. Often these loans are smaller than $200, but they allow women to
begin small businesses and climb out of poverty. How has software made the Grameen
Bank productive and able to serve almost 7 million borrowers? What other ways could
software make a difference to the struggling peoples of the world?

5. Software for the Disabled


Think of the various issues people with disabilities have with interacting with the
computer, such as using the mouse, reading the screen, typing on a keyboard, and
listening to audio output. You learned about how speech recognition software can
assist those who cannot use a keyboard. Describe other types of software solutions that
are currently on the market, or that may not be on the market, that you believe would
be useful to those with disabilities. Consider a range of disabilities, including physical
and cognitive disabilities.

203
four
four team time
chapter

Software for Startups


team time

Problem
You and your friends have decided to start Recycle Technology, a not-for-profit organiza-
tion that would recycle and donate used computer equipment. In the first planning session,
the group recognized the need for certain software to help them with various parts of the
business such as tracking inventory, designing notices, mapping addresses for pickup and
delivery, and soliciting residents by phone or e-mail about recycling events, to name a few.

Task
Split your class into as many groups of four or five as possible. Make some groups respon-
sible for just locating free or Web-based software solutions, and other groups responsible
for finding proprietary solutions. Another group could be responsible for finding mobile
app solutions. The groups will present and compare results with each other at the end of
the project.

Process

1. Identify a team leader who will coordinate the project and record and present results.
2. Each team is to identify the various kinds of software that Recycle Technology needs.
Consider software that will be needed for all the various tasks needed to run the
organization such as communication, marketing, tracking, inventory management and
financial.
3. Create a detailed and organized list of required software applications. Depending on
your team, you will either specify proprietary software or open source software.

Conclusion
Most organizations require a variety of software to accomplish different tasks. Compare
your results with those of other team members. Were there applications that you didn’t
think about, but that other members did? How expensive is it to ensure that even the
smallest company has all the software required to carry out daily activities, or can the
needs be met with free, open source products?

204 Chapter 4 Application Software: Programs That Let You Work and Play
ethics
four four

chapter
project

project
ethics
Ethics Project
Ethical conduct is a stream of decisions you make all day long. In this exercise, you will
research and then role-play a complicated ethical situation. The role you play might or
might not match your own personal beliefs; in either case, your research and use of logic
will enable you to represent the view assigned. An arbitrator will watch and comment on
both sides of the arguments, and together the team will agree on an ethical solution.

Topic: Open Source Software


Proprietary software has set restrictions on use and can be very expensive; while
open source software is freely available for users to use as is, or change, improve, and
redistribute. Open source software has become acceptable as a cost-effective alternative to
proprietary software, so much so that it is reported that the increased adoption of open
source software has caused a drop in revenue to the proprietary software industry. But
there is more than just reducing the IT budget that is involved in determining which
software to use.

Research Areas to Consider


• Open source software (Linux, OpenOffice.org suite, and Mozilla.org)
• Proprietary software (Microsoft Windows and Office, Apple Mac OS and iWork)
• Copyright licensing
• Open source development

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone is a proponent
for open source software but is being rebuffed by a someone who feels “you get what
you pay for” and is a big proponent of using proprietary software.
2. Team members should write a summary that provides background information for
their character—for example: open source proponent, proprietary developer, or arbitra-
tor—and details their character’s behaviors to set the stage for the role-playing event.
Then, team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration features of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

205
five
five
chapter

using system
software:
the operating system, utility programs,
and file management
objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What software is included in system software? (pp. 208–209)
2. What are the different kinds of operating systems? (pp. 209–210)
3. What are the most common operating systems? (pp. 210–214)
4. How does the operating system provide a means for users to interact with the
computer? (pp. 214–215)
5. How does the operating system help manage resources such as the processor,
memory, storage, hardware, and peripheral devices? (pp. 215–219)
6. How does the operating system interact with application software? (pp. 220–221)
7. How does the operating system help the computer start up? (pp. 221–224)
8. What are the main desktop and window features? (pp. 224–227)
9. How does the operating system help me keep my computer organized? (pp. 227–232)
10. What utility programs are included in system software, and what do they do?
(pp. 232–241)

multimedia resources
multimedia
resources

Active Helpdesk
• Managing Hardware and Peripheral Devices: The OS (p. 221)
• Starting the Computer: The Boot Process (p. 223)
• Organizing Your Computer: File Management (p. 232)
• Using Utility Programs (p. 237)

Sound Bytes
• Customizing Windows (p. 212)
• File Management (p. 230)
• File Compression (p. 234)
• Hard Disk Anatomy Interactive (p. 239)
• Letting Your Computer Clean Up After Itself (p. 240)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Have you ever wanted to
capture what appears on your monitor screen? You can use the PrtScr
(print screen) key on your keyboard, but that captures the entire screen, and only onto
the clipboard. You then need to crop and save the file for that screen
capture to be useful. There are also screen capture software programs
that you can purchase. However, Windows 7 includes a Snipping
Tool to capture an entire screen image or to take a freeform
or rectangular “snip” of any window or object on the screen.
Once snipped, you can annotate, save, or share
the object. You can find the Snipping Tool by clicking
the Start button, selecting All Programs, and then
opening the Accessories folder. Jing
( jingproject.com), a freeware tool
from TechSmith, not only captures
still screen shots, but also records
video of on-screen action. You
can share Jing files over the
Web, via instant messaging, or
e-mail.

207
System Software Are all operating systems
alike? Although most computer users can
Basics name only a few operating systems, many
As you learned in the last chapter, there are types exist. Some operating systems, such as
two basic types of software on your com- those found in household appliances and car
puter: application software and system soft- engines, don’t require any user intervention
ware. Application software is the software at all. Some are proprietary systems
you use to do everyday tasks at home and at developed specifically for the devices they
work. System software is the set of programs manage. Some operating systems are avail-
that helps run the computer and coordinates able for personal and business use, and other
instructions between application software operating systems coordinate resources for
and the computer’s hardware devices. From many users on a network. These operating
the moment you turn on your computer to systems were traditionally classified into cat-
the time you shut it down, you are interact- egories, depending on the number of users
ing with system software. System software they served (single user or multiple users)
consists of two primary types of programs: and the tasks they performed (single task or
the operating system and utility programs. multitask). However, as devices begin to
What does an operating system converge in their functionalities, and the op-
do? The operating system (OS) is a group erating systems continue to become more
of programs that controls how your com- powerful, the distinction in the traditional
puter system functions. The OS manages the categorization of operating systems begins to
computer’s hardware, including the proces- blur (see Figure 5.1).
sor (also called the central For example, personal


processing unit, or CPU), computers were at one time
memory, and storage de- Every computer run by single-task, single-
vices, as well as peripheral has an operating user operating systems
devices such as the monitor system. such as the Microsoft Disk
and printer. The OS also pro-
vides a consistent means for
software applications to work with the CPU,
and it is responsible for the management,
” Operating System (MS-
DOS). MS-DOS (or DOS)
was the first widely installed operating sys-
tem in personal computers. Compared to the
scheduling, and coordination of tasks as operating systems we are familiar with
well as system maintenance. Your first inter- today, DOS was a highly user-unfriendly
action with the OS is the user interface—the OS. To use it, you needed to type specific
features of the program such as the desktop, commands, and didn’t have the option to
icons, and menus that allow the user to com- click on icons (pictures that represent an ob-
municate with the computer system. ject such as a software application or a file or
System software also includes utility pro- folder) or choose from menus or lists.
grams. A utility program is a small program Eventually, operating systems such as
that performs many of the general house- Apple’s Mac OS and Microsoft’s Windows
keeping tasks for the computer, such as sys- replaced DOS because these systems allowed
tem maintenance and file compression. a single user to multitask, or to perform more
Do all computers have operating than one process at a time. (The Mac and
systems? Every computer, from the Windows operating systems are discussed
smallest notebook to the largest supercom- in more detail later in this chapter.)
puter, has an operating system. Even cell Then, networking capabilities were
phones, game consoles, automobiles, and added to these personal computer operating
some appliances have operating systems. systems to facilitate sharing peripheral
The role of the OS is critical; the computer devices and Internet access among multiple
cannot operate without it. As explained computers at home. These systems, while
more fully in the section of this chapter still traditionally used as single-user, multi-
titled “What the Operating System Does,” task operating systems, technically became
the operating system coordinates the flow multiuser, multitask operating systems
of data and information through the because of their networking capabilities.
computer system by coordinating the Similar transitions are happening with
hardware, software, user interface, mobile devices, as cell phones and PDAs
processor, and system memory. (personal digital assistants) converge to

208 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Figure 5.1
Multitask
Devices no longer fit
neatly into categories of
operating systems, which
traditionally were defined
by the number of users
(single or multiple) and
Home servers Mainframes the number of simultane-
Personal Notebooks
ous tasks the device was
computers and netbooks
able to perform (single or
multiple).

Tablets

Single-user Multiuser

Smartphones

Cameras,
e-book readers
personal media
players

Game consoles

smartphones and incorporate the function- Single-task operating systems, also referred
alities of cameras and personal media to as embedded systems, require
players. Although smartphones were ini- minimal user interaction. The pro-
tially single-task devices, with combined grams are written specifically for the needs
functionalities, the newer devices are begin- of the devices and their functions. Therefore,
ning to add multitasking capabilities. there are no commercially available standard
In the next section, we will look at differ- RTOS software programs. This type of oper-
ent types of operating systems that work ating system is a program with a specific
with a variety of computers. purpose, and it must guarantee certain re-
sponse times for particular computing tasks;
otherwise, the machine is useless. Devices
Types of Operating that must perform regimented tasks or
Systems record precise results—such as measurement
Operating systems can be categorized by the instruments found in the scientific, defense,
type of device in which they are installed, and aerospace industries—require real-time
such as robots and specialized equipment, operating systems. Examples include digital
mainframes and network computers, mobile storage oscilloscopes and the Mars Recon-
devices, and personal computers. naissance Orbiter.
Where else are RTOSs in use
today? You also encounter real-time oper-
Real-Time Operating Systems ating systems in everyday life. They are in
Why do machines with built-in devices such as fuel-injection systems in car
computers need an operating engines, inkjet printers, VoIP phones, and
system? Machinery that is required to some medical devices (see Figure 5.2), as
perform a repetitive series of specific tasks in well as common appliances such as washing
an exact amount of time requires a real-time machines, dryers, and furnaces. Real-time
operating system (RTOS). Real-time operating systems are also found in many

Types of Operating Systems 209


The latest versions of Microsoft Windows
and Mac OS X can be considered network
operating systems; they enable users to set
up networks in homes and small businesses.
(A more complete discussion of Microsoft
Windows and Mac OS can be found in the
“Operating Systems for Personal Comput-
ers” section.) In larger networks, a network
operating system is installed on the server
and manages all user requests, ensuring they
do not interfere with each other. For exam-
ple, on a network where users share a printer,
the printer can produce only one document
at a time. The OS is therefore responsible for
managing all the printer requests and
making sure they are processed one at a time.
Examples of network operating systems
include Linux and UNIX.
What is UNIX? UNIX is a multiuser,
multitask operating system used as a network
operating system, primarily with main-
frames, although it is also often found on PCs.
Developed in 1969 by Ken Thompson and
Dennis Ritchie of AT&T’s Bell Labs, the UNIX
code was initially not proprietary—in other
words, no company owned it. Rather, any
Figure 5.2 types of robotic equipment. Television programmer was allowed to use the code and
stations use robotic cameras with real-time modify it to meet his or her needs. Later,
Devices such as some
cars, washing machines, operating systems that glide across a AT&T licensed the UNIX program code to
VoIP phones, and printers suspended cable system to record sports the Santa Cruz Operation Group. UNIX is a
use real-time operating events from many angles. brand that belongs to the company The Open
systems. What kind of operating system Group, but any vendor that meets testing
controls a simple cell phone? Simple requirements and pays a fee can use the UNIX
cell phones are separate, single-function name. Individual vendors then modify the
devices; they only require operating systems UNIX code to run specifically on their hard-
that perform one task at a time. Cell phones ware. HP/UX from Hewlett-Packard, Solaris
have their own proprietary embedded from Sun, and AIX from IBM are some of the
operating systems. UNIX systems currently available in the
marketplace.
What other kinds of computers
Operating Systems for Networks, require a multiuser operating
system? Large corporations with hun-
Servers, and Mainframes dreds or thousands of employees often use
What kind of operating system do powerful computers known as mainframes.
networks use? A multiuser operating A mainframe is responsible for storing,
system (also known as a network operating managing, and simultaneously processing
system) enables more than one user to ac- data from all users. Mainframe operating
cess the computer system at one time by effi- systems fall into the multiuser category.
ciently handling and prioritizing requests Examples include UNIX and IBM’s IBM i
from multiple users. Networks (groups of and z/OS.
computers connected to each other for the Supercomputers also use multiuser oper-
purposes of communicating and sharing re- ating systems. Scientists and engineers use
sources) require a multiuser operating sys- supercomputers to solve complex problems
tem because many users simultaneously or to perform massive computations. Some
access the server, which is the computer on supercomputers are single computers with
a network that manages network resources multiple processors, whereas others consist
such as printers. of multiple computers that work together.

210 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Operating Systems for Operating Systems for
Mobile Devices Personal Computers
What kind of operating system do What is the Microsoft Windows
smartphones use? A smartphone does operating system? Microsoft Windows
more than let the user make and answer began as an operating environment that
phone calls. It also has productivity features, worked with MS-DOS and incorporated a
in addition to features found on personal user-friendly interface like the one that was
media players and cameras as well as the first introduced with Apple’s operating
ability to connect to the Web. Examples of system. In 1995, Microsoft released
smartphones include BlackBerry devices, Windows 95, a comprehensive update that
Apple’s iPhone, Google Android, and Palm made changes to the user interface and in-
Pre. Initially, although multifunctional, corporated multitasking capabilities.
smartphones were only capable of doing Windows XP was another major update; it
one task at a time. Now most modern smart- provided networking capabilities in its
phones have modest multitasking capabili- consumer editions. The newest release of
ties such as checking e-mail while on a Microsoft’s operating system, Windows 7,
phone call. The most common follows Windows
operating systems Vista, and builds on the
that can be found on security and user inter-
smartphones include face upgrades that the
Symbian by Nokia, Windows Vista release
BlackBerry by RIM, provided. It also gives
Windows Mobile by users with touch-screen
Microsoft, iPhone monitors the ability
OS X by Apple, An- to use touch
droid by Google, commands to scroll,
and webOS by resize windows,
Palm. The newest pan, and zoom.
versions of the What was once
iPhone’s OS X and Figure 5.3 only an operating
the Palm Pre’s Gaming devices such as the Nintendo Wii and PlayStation 3 system on which
webOS enable the have their own system software. only one user
user to run more could perform one
than one applica- task at a time,
tion concurrently. Windows is now a powerful operating
Do gaming consoles and personal system that can support simple networking
media players require an operating tasks. Over time, Windows improvements
system? Gaming systems, like have concentrated on increasing user
Microsoft’s Xbox 360, the Nintendo Wii, and functionality and friendliness, improving
the Sony PlayStation (see Figure 5.3), as well Internet capabilities, and enhancing file
as personal media players like Microsoft’s privacy and security.
Zune, Apple’s iPod, and SanDisk’s Sansa, all What is the difference between
require some form of customized system the various editions of Windows 7
software that is developed specifically for operating systems? With each new
the particular device. The system software version of its operating system, Microsoft
includes system programs—also known as continues to make improvements. However,
firmware—that control the device, as well it’s still not a one-size-fits-all operating sys-
as other programs that come with the per- tem. Windows 7 comes in several editions to
sonal media player or the gaming device. accommodate different users: home users
For example, the programs included with (Starter, Home Basic, Home Premium), busi-
most portable media players allow users to ness users (Professional and Enterprise), and
manage music files on the player and to rip combination users (Ultimate). In addition,
audio CDs. The operating systems on gam- there are 32-bit and 64-bit versions of
ing consoles support Web browsing and file Windows. The 32-bit version is built for
storage of media and photos as well as play- computers that have up to 4 GB of RAM.
ing DVDs and games. For those systems with more than 4 GB of

Types of Operating Systems 211


Figure 5.4 WINDOWS 7 EDITIONS function properly. A utility called Boot
Camp, available with the newest version
Edition Description Mac OS X Snow Leopard, allows you to run
Windows 7 Starter This edition is designed to run on small netbooks and
Windows on a Mac while also running OS X.
is for those users who have basic computing Most application software is also platform
requirements. There is no Aero interface, and only dependent. For example, there are special
32-bit versions are available. Mac versions of Microsoft Office, Adobe
Windows 7 Home Premium This edition incorporates multimedia functions as core
Photoshop Elements, Intuit Quicken, and
components. No extra software is needed to run DVDs other “traditional” PC software applications.
and other audio and video files. Networking as well as Despite their inability to run the same
file and peripheral sharing across PCs are included. software applications, PCs and Macs can be
Windows 7 Professional As its name implies, this edition is aimed at the business
networked so that both types of computers
market but is also appropriate for the advanced home can easily share files and even peripherals,
user. This edition builds on Windows 7 Home Premium such as printers, scanners, and cameras.
and features advanced networking capabilities. Can I have more than one operat-
Windows 7 Ultimate This is the “ultimate” operating system for high-end PC
ing system on my computer? If you
users, gamers, multimedia professionals, and PC are unsure whether you want to upgrade to
enthusiasts. the next edition of your current operating
system, you might want to consider taking
the newest edition for a test drive. Or per-
haps you would like to have a Linux distri-
RAM, a 64-bit version is required. Figure 5.4 bution to work with, in addition to your
outlines the features and benefits of each Windows operating system. Even some Mac
edition of Windows 7. users may want to also run Windows on
What is the Mac Operating their machines. Although it might seem im-
System? In 1984, Mac OS became the possible to run more than one operating sys-
first commercially available operating sys- tem on a single computer, the generous size
tem to incorporate a graphical user interface of the hard drives, in addition to some addi-
(GUI) with user-friendly point-and-click tional software capabilities, enable users to
technology. For more information on Mac do just that: run multiple versions of operat-
OS, see the Technology in Focus feature ing systems on a single machine. In the case
“Computing Alternatives” on page 252. of running two versions of Windows, or a
Does it matter what operating sys- Windows–Linux setup, you just need to sep-
tem is on my computer? The type of arate the hard drive into different sections
processor in the computer determines which (called partitions) and install the second op-
operating system a particular personal com- erating system in the new partition.
puter uses. The combination of operating What is Linux? Linux is an open
system and processor is referred to as a com- source operating system designed for use on
puter’s platform. For example, Microsoft personal computers and as a network oper-
Windows operating systems are designed to ating system. Open source software is freely
coordinate with a series of processors from available for developers to use or modify as
Intel Corporation and Advanced Micro they wish. The Linux operating system is
Devices (AMD), which share the same or simi- based on the central programming code of
lar sets of instructions. Until a few years ago, an operating system, and the rest of the code
the Macintosh operating systems worked is from the GNU (pronounced “g-noo”)
primarily with processors from the Motorola Project and other sources. Linux began in
Corporation and IBM, which were designed
specifically for Apple computers. Now Intel
also makes processors for Apple computers. SOUND Customizing
Yet even if both computers have proces- BYTE Windows
sors from the same manufacturer, the two
operating systems (Windows and Mac OS) In this Sound Byte, you’ll find out how to customize
are not really interchangeable. Without your desktop. You’ll learn how to configure the
using special software, if you attempted to desktop, set up a screen saver, change pointer
load Microsoft Windows on a Mac, for ex- options, customize the Start menu, and manage user
ample, the processor in the Mac would not accounts.
understand the Windows OS and would not

212 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
TRENDS Emerging Technologies: Open Source Software—
IN IT Why Isn’t Everyone Using Linux?
Proprietary software such as Microsoft Windows and Mac OS is devel- market? One reason is that corporations and individuals have grown ac-
oped by corporations and sold for profit. This means that the source customed to one thing that proprietary software makers can provide:
code, the actual lines of instructional code that make the program work, technical support. It is almost impossible to provide technical support for
is not accessible to the general public. Without being able to access the open source software because anyone can freely modify it; thus, there is
source code, it’s difficult for a user to modify the software or see exactly no specific developer to take responsibility for technical support (see
how the program author constructed various parts of the system. Figure 5.5). Similarly, corporations have been reluctant to install open
Restricting access to the source code protects companies from hav- source software extensively because of the cost of the internal staff of
ing their programming ideas stolen, and it prevents customers from programmers that must support it.
using modified versions of the software. However, in the late 1980s, Companies such as Red Hat have been combating this problem. Red
computer specialists became concerned that large software companies Hat offers a free, open source operating system called Fedora. In addi-
(such as Microsoft) were controlling a large portion of market share and tion, Red Hat has modified the original Linux source code and markets a
driving out competitors. They also felt that proprietary software was too version, Red Hat Enterprise Linux, as a proprietary program. Fedora is the
expensive and contained too many bugs (errors). testing ground for what eventually goes into this proprietary program.
These people felt that software Red Hat Enterprise Linux 6 is the cur-
should be developed without a profit rent system on the market, and comes
motive and distributed with its source in versions for servers and desktops.
code free for all to see. The theory was Purchasers of Red Hat Enterprise Linux
that if many computer specialists ex- receive a warranty and technical sup-
amined, improved, and changed the port. Packaging open source software in
source code, a more full-featured, bug- this manner has made its use much
free product would result. Hence, the more attractive to businesses. As a
open source movement was born. result, many Web servers are hosted on
Open source software is freely dis- computers running Linux.
tributed (no royalties accrue to the cre- When will free versions of Linux (or
ators), contains the source code, and another open source operating system)
can in turn be redistributed freely to be the dominant OSs on home comput-
others. Most open source products are ers? The answer is, maybe never. Most
created by teams of programmers and casual computer users won’t feel
are modified (updated) by hundreds of comfortable without technical support;
other programmers around the world. Figure 5.5 therefore, any open source products for
You can download open source prod- Companies like Ubuntu and Xandros provide free (or home use will need to be marketed the
ucts for free from the Internet. Linux is low-cost) Linux software, but users must purchase way Red Hat markets Enterprise Linux.
probably the most widely recognized technical support. In addition, many open source products
name in open source software, but are not easy to maintain.
other products such as MySQL (a database program) and OpenOffice.org However, some companies are making easy-to-use visual interfaces,
(a suite of productivity applications) are also gaining in popularity. such as GNOME and KDE, which work with the Linux operating system. If
So, if an operating system such as Linux is free, why does Windows one of these companies can develop an easy-to-use product and has the
(which users must pay for) have such a huge market share (nearly marketing power to challenge Microsoft, you may see more open source
92 percent), and why does Linux have less than 1 percent of the desktop OSs deployed in the home computer market in the future.

1991 as a part-time project of Finnish univer- anyone, Linux can be tweaked quickly to meet
sity student Linus Torvalds, who wanted virtually any new operating system need. For
to create a free OS to run on his home com- example, only a few weeks were necessary
puter. He posted his OS code to the Web for to get the Linux OS ready for the Intel Xeon
others to use and modify. It has since been processor, a feat unheard of in proprietary
tweaked by scores of programmers as part OS development. Some Linux-based operat-
of the Free Software Foundation GNU ing systems have been modified to run on
Project (gnu.org). iPods and gaming systems. Linux is also
Linux is gaining a reputation as a stable gaining popularity among computer manu-
OS that is not subject to crashes or failures. facturers, which have begun to ship it with
Because the code is open and available to some of their latest PCs.

Types of Operating Systems 213


Where else is Linux nature and must be pur-
used? Android, the new chased. These versions
operating system developed come with support and
by Google, is Linux-based. other features that are
Because the overall size of not generally associ-
Android is much smaller ated with the open
than that of Windows, source Linux. Red Hat
many netbook users has been packaging
choose to use it in place of and selling versions
the factory-installed of Linux since 1994
Windows operating sys- and is probably the
tem (see Figure 5.6). Figure 5.6 best-known Linux
Another Linux-based new- Developed by Google, the new Android operating distributor. For a full
comer to the OS market is system is based on Linux and runs easily on listing and explana-
netbooks.
MeeGo, a joint project be- tion of all Linux dis-
tween Nokia and Intel. tributors, visit Distrowatch
Where can I get Linux? You can (distrowatch.com). For more information on
download open source versions of Linux for Linux, see the Technology in Focus feature
free from the Internet. These free, open “Computing Alternatives” on page 252.
source Linux distributors include Mandriva,
Ubuntu, Fedora, Suse, Debian GNU/Linux,
and Gentoo Linux. However, several ver- What the Operating
sions of Linux are more proprietary in System Does
Figure 5.7 Manages computer hardware
As shown in Figure 5.7, the operating
The operating system is and peripherals. system is like a traffic cop. It coordinates
the traffic cop of your and directs the flow of data and
computer, coordinating its information through the computer system.
many activities and In doing so, the OS performs several specific
devices. functions:
• It provides a way for
the user to interact
with the computer.
• It manages the proces-
sor, or CPU.
• It manages the mem-
ory and storage.
• It manages the com-
puter system’s hard-
ware and peripheral
Provides user Provides a consistent devices.
interface interaction between • It provides a consis-
applications and CPU
The tent means for
Operating software applications
System to work with the CPU.
In this section, we look at each of
these functions in detail.

The User Interface


How does the operating sys-
tem control how I interact
with my computer? The operat-
ing system provides a user interface
Manages memory Manages that enables you to interact with the
and storage processor
computer. As noted earlier, the first

214 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
personal computers had a DOS operating BITS
system with a command-driven interface, as AND A Web-Based Operating System
shown in Figure 5.8. A command-driven in- BYTES
terface is one in which you enter commands
to communicate with the computer system. Now that broadband Internet access is becoming commonplace, the concept of a
The DOS commands were not always easy more universal operating system, called a Web-based OS, is being discussed, and
to understand; as a result, the interface some prototype sites are in their infancy. So what is a Web-based operating system?
proved to be too complicated for the average Actually, the terms Web-based operating environment or portable desktop might be
user. Therefore, PCs were used primarily in more accurate. The concept behind this movement is to make the Web the primary
business and by professional computer application interface through which users can view content, manage data, and use
operators. various services (calendars, e-mail, and picture sharing and storage) on their local
The command-driven interface was later machine and on the Web without noticing any difference between interfaces.
improved by incorporating a menu-driven Currently, most applications we use have been installed on a specific computer
interface, as shown in Figure 5.8. A menu- and can be used only on that computer. A Web-based operating environment would
driven interface is one in which you choose allow users access to applications and content via the Web, regardless of the
commands from menus displayed on the machine they are using. This means business travelers would not need to lug their
screen. Menu-driven interfaces eliminated notebooks everywhere they went. Instead, they would only need to find a computer
the need for users to know every command that had Internet access to be able to work on documents, see their calendar, read
because they could select most of the com- their e-mail, and so on. All of their settings and preferences, even a customized desk-
monly used commands from a menu. top image, as well as working documents, could be stored in an individual Web-based
However, they were still not easy enough account for them to access anywhere and on any machine at any time. Google is the
for most people to use. closest to having a complete Web-based system. Its Google Docs application and
What kind of interface do operating Chrome browser are the initial components of a completely Web-based operating
systems use today? Current personal environment, which is expected to come out by 2011. Because security measures
computer operating systems such as Microsoft have not been completely worked out, it’s advisable that Web-based accounts not be
Windows and Mac OS use a graphical user used to store or manipulate personal or proprietary data and information. For more in-
interface, or GUI (pronounced “gooey”). formation, or to open your own account, check out the Web sites of the current Web-
Unlike the command- and menu-driven based OS innovators, including Google, eyeOS (eyeos.org), and GoGUI (gogui.com).
interfaces used earlier, GUIs display graph-
ics and use the point-and-click technology of
the mouse and cursor, making them much actually allows you to select which interface
more user-friendly. (Windows or Mac) you’d like your system to
Unlike Windows or Mac OS, Linux does have. This means that if you’re using Linux
not have a single default GUI interface. In- for the first time, you don’t have to learn a
stead, users are free to choose among many new interface; you just use the one you’re
commercially available and free interfaces, most comfortable with already.
such as GNOME and KDE, each of which
provides a different look and feel. For exam-
ple, GNOME (pronounced “gah-NOHM”) Processor Management
Why does the operating
system need to manage the
a
processor? When you use your
computer, you are usually asking Figure 5.8
the CPU to perform several tasks at (a) A command-driven
once. For example, you might be interface. (b) A menu-
driven interface.

What the Operating System Does 215


ETHICS
IN IT Sugar—The Sweet OS for Every Child

The Internet is a fantastic tool, but only if you can access it. In an effort to puters and those who don’t) and provide computing resources to every-
give children in developing countries a better opportunity to “learn, one regardless of their financial means.
share, and create,” the One Laptop per Child (OLPC) initiative was The notebook itself is revolutionary in design (see Figure 5.9). Called
founded by Nicholas Negroponte and the XO-1, the notebook is small and has a comfortable, child-sized, built-
other faculty from MIT Media in handle. It also has a tablet-like monitor that
Lab, in conjunction with part- can twist to turn the notebook into an elec-
ners such as Google, AMD, tronic book (e-book) reader, which is critical in
and News Corporation. The areas where books are hard to come by. The
mission of OLPC (laptop.org) outside of the notebook is rugged and child-
is to ensure that all school- friendly. In addition, it is power efficient, run-
aged children in lesser-devel- ning on less than one-tenth the power a
oped communities receive their standard notebook requires. Because access
own personal computers so that to electricity is minimal in many of the pro-
they are no longer excluded from ject’s target areas, the notebook is self-pow-
the educational, economic, and ered by an easy-to-use pull-string.
entertainment benefits that com- At the core of the project is Sugar, the oper-
puters can provide. Laptops have ating system. It is based on open source code
been distributed to children in components from Red Hat’s Fedora version of
areas and countries such as the the Linux operating system, but has a user in-
South Pacific, Uruguay, Mongolia, terface that is completely different from
Nigeria, Ethiopia, and Rwanda. Windows, Mac OS, or Linux. Credit
This ambitious project to de- goes to the developers, who
velop and distribute a low-cost note- really thought about how
book computer (currently, the cost is the users of the notebook
$199) would provide access to electronic would interact with the
textbooks and other learning device. The OLPC notebooks
aids—and eventually the Figure 5.9 will most likely be the first
Internet. The project has The revolutionary design of the XO-1 notebook is rugged yet child-friendly. The computer that many of
expanded to include a wide XO-1 can be easily converted from a traditional notebook to an e-book. It is ex- these children use. Because
variety of professionals from tremely power-efficient but can also be self-powered. children have no idea of
academia, business, the arts, what to do with the machine
and technology. The main thrust of the project is to overcome the so- and may not have anyone to tell them, the user interface was designed to
called digital divide (the gap between people who have access to com- be as intuitive as possible.

printing a Word document, chatting with thing is happening seamlessly. Otherwise,


your friends on Facebook, watching a movie you wouldn’t be able to watch a movie and
using the Blu-ray drive, and working on an print at the same time without experiencing
Excel spreadsheet—all at the same time, or delays in the process.
at least what appears to be at the same time. How exactly does the operating
Although the processor is the powerful system coordinate all the activities?
brain of the computer, processing all of its When you create and print a document in
instructions and performing all of its calcu- Word while also watching a Blu-ray movie,
lations, it needs the OS to arrange for the for example, many different devices in the
execution of all these activities in a system- computer system are involved, including
atic way, creating the appearance that every- your keyboard, mouse, Blu-ray drive, and
thing is happening simultaneously. printer. Every keystroke, every mouse click,
To do so, the operating system assigns a and each signal to the printer and from the
slice of its time to each activity that requires Blu-ray drive creates an action, or event, in
the processor’s attention. The OS must then the respective device (keyboard, mouse,
switch among different processes millions of Blu-ray drive, or printer) to which the oper-
times a second to make it appear that every- ating system responds.

216 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
The operating system focuses on activities a
rather than on applications. When the machine
powers up, the first image is that of the XO
man (an O on top of an X) in the middle of a circle. It is
surrounded by icons that represent home, friends, and
neighborhood. The computer includes a built-in micro-
phone and webcam for children to create their own
multimedia. For example, the multimedia tool allows
children to add music to their drawings. Other activities
include browsing the Internet, chatting, text editing,
and playing games. At the core of each activity is the
ability to collaborate, which facilitates the community
learning experience. To enhance collaboration, the
notebooks are all interconnected in a wireless mesh
network, providing the potential for every activity to be
b
a networked activity. Browsing, for example, would no longer be an iso-
lated, individual activity; it could also be a collaborative group experience
(see Figure 5.10a). Wireless capabilities also help extend the community
beyond its physical borders. These computers make it possible for a child
in Africa, for example, to connect with another child in Europe.
In addition, the operating system uses a journaling technique for ar-
ranging and organizing files (see Figure 5.10b). The file system records
what the child has done (rather than just what the student has saved),
working as a scrapbook of the student’s interactions with the computer as
well as with peers. The journal can be tagged, searched, and sorted in a Figure 5.10
variety of ways.
(a) One student shares a browsing experience with several others.
Another general concept behind the operating system is that children (b) The journaling system chronicles what the student saves as
learn through doing, so the software puts an emphasis on tools for explo- well as the student’s interaction with the machine and with others.
ration and expression, as well as encouraging students to learn by helping
each other. Because Sugar is built on an open source platform, it also en- Discovery 2007 (a version of Linux)—it offers some of the same user-
courages students to explore how it works and to modify the code to meet friendly hardware features as the XO-1 machine does, such as the swivel
their individual preferences. monitor that converts to a tablet PC. Some reviewers and followers of both
The OLPC is not the only organization interested in increasing the reach projects have offered the opinion that the Classmate PC is better suited for
of technology to those in less-developed nations. Intel has gone forward the older student user, whereas the XO-1 laptop is geared toward a
with its own program and produced the Classmate PC. Although the Class- younger, less sophisticated user. With so many children waiting to be ex-
mate PC is more closely aligned with the traditional Windows-based PC posed to technology and to a more fun and intuitive learning process, there
model—it runs on either Windows or the open source OS Mandriva is most likely room in the market for both machines.

Sometimes these events occur sequen- device has its own type of interrupt, which
tially (such as when you type characters one is associated with an interrupt handler, a
at a time), but other events involve two or special numerical code that prioritizes the
more devices working concurrently (such as requests. These requests are placed in the in-
the printer printing while you continue to terrupt table in the computer’s primary
type and watch a movie). Although it looks memory (random access memory, or RAM).
as though the keyboard, Blu-ray drive, and The operating system processes the task as-
printer are working at the same time, in fact, signed a higher priority before processing a
the OS switches back and forth among task that has been assigned a lower priority.
processes, controlling the timing of events This is called preemptive multitasking.
the processor works on. In our example, when it receives the in-
For example, assume you are typing and terrupt from the printer, the operating sys-
want to print a document. When you tell tem pauses the CPU from its typing activity
your computer to print your document, the and from the Blu-ray activity, and puts a
printer generates a unique signal called an “memo” in a special location in RAM called
interrupt that tells the operating system that a stack. The memo is a reminder of what the
it is in need of immediate attention. Every CPU was doing before it started to work on

What the Operating System Does 217


the printer request. The CPU then retrieves involved in determining what operating sys-
the printer request from the interrupt table tem you get, determining the bit-version is
and begins to process it. On completion of important. At the moment, not all applica-
the printer request, the CPU goes back to the tions and devices are compatible with 64-bit
stack, retrieves the memo it placed about the systems. If you purchase a 64-bit system, you
keystroke or Blu-ray activity, and returns to will need to make sure that all your hardware
that task until it is interrupted again, in a and software programs are updated to work
very quick and seamless fashion. well with the 64-bit version of your operating
What happens if there is more system. To assist you in this process, Mi-
than one document waiting to be crosoft has created the Windows 7 Upgrade
printed? The operating system also co- Advisor. This downloadable free program
ordinates multiple activities for peripheral checks to determine whether your computer
devices such as printers. When the processor is compatible in all respects with Windows 7,
receives a request to send information to the including the 64-bit compatibility. If there is
printer, it first checks with the operating incompatibility, Windows 7 allows you the
system to ensure that the printer is not option of running in a compatibility mode to
already in use. If it is, the OS puts the emulate a 32-bit system.
request in another temporary Can my system ever
storage area in RAM, called run out of RAM? RAM
the buffer. The request then
waits in the buffer until the
spooler, a program that
“ You will likely
find that the
amount of RAM
has limited capacity. Like
most users, over time you
will expand how you use
helps coordinate all print jobs your computer by adding
currently being sent to the you once found new software and new pe-
printer, indicates the printer to be sufficient is ripherals. Most computers
is available. If more than one sold for home use have be-
print job is waiting, a line (or
no longer tween 2 and 12 GB of
queue) is formed so that the enough.

RAM. If you have an older
printer can process the re- system with 1 or 2 GB of
quests in order. RAM, it might be sufficient if you’re run-
ning a few programs at the same time. But,
if you start installing and using software
Memory and Storage Management with greater RAM requirements (such as
Why does the operating system have Photoshop), your system might not respond
to manage the computer’s memory? well. For example, if you want to upgrade to
As the operating system coordinates the Windows 7, the minimum requirement for
activities of the processor, it uses RAM as a the operating system using minimal capabil-
temporary storage area for instructions and ities is 1 GB of RAM. Such limited RAM re-
data the processor needs. The processor then quirements are fine if you are using a
accesses these instructions and data from netbook that is running Windows 7 Starter
RAM when it is ready to process them. The edition. However, most other systems that
OS is therefore responsible for coordinating run more robust editions of Windows 7 may
the space allocations in RAM to ensure that be challenged if they have only 1 GB of
there is enough space for all of the pending RAM, especially if you run graphic-
instructions and data. It then clears the intensive programs such as Adobe
items from RAM when the processor no Photoshop, many gaming applications, or
longer needs them. even the latest version of Microsoft Office. If
Does the amount of RAM on a sys- you want to incorporate the translucent
tem control the type of OS I get? Aero user interface themes that are available
Until recently, the maximum amount of in some versions of Windows 7, your system
RAM found on most personal computers should have at least 2 GB of RAM and a
was 4 GB. That was considered a lot! Now, video card with at least 256 MB of RAM.
many personal computer systems that are As you add and upgrade software and in-
reasonably priced provide for 8 GB or more crease your usage of the computer system,
of RAM. Systems that offer 4 GB or more of you will likely find that the amount of RAM
RAM will feature a 64-bit version of you once found to be sufficient is no longer
Windows. Although there are other factors enough.

218 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
What happens if ot
str uctions n recently used
my computer runs d in
an
out of RAM? ta
Da
When there isn’t
enough RAM for the
operating system to
store the required data OS
and instructions, the
RAM
operating system
borrows from the more
spacious hard drive. This
process of optimizing RAM storage by bor- Data now
and instructions needed
rowing hard drive space is called virtual Hard drive’s swap file
memory. As shown in Figure 5.11, when
more RAM is needed, the operating system communication between the hardware
swaps out from RAM the data or instruc- device and the operating system. Because Figure 5.11
tions that have not been recently used and the OS must be able to communicate with Virtual memory borrows
moves them to a temporary storage area on every device in the computer system, the excess storage capacity
the hard drive called the swap file (or page from the hard drive when
device driver translates the device’s special- there is not enough
file). If the data or instructions in the swap ized commands into commands that the capacity in RAM.
file are needed later, the operating system operating system can understand, and vice
swaps them back into active RAM and re- versa. Devices would not function without
places them in the hard drive’s swap file the proper device drivers because the OS
with less active data or instructions. This would not know how to communicate
process of swapping is known as paging. with them.
Can I ever run out of virtual Do I always need to install drivers?
memory? Only a portion of the hard Today, most devices, such as flash drives,
drive is allocated to virtual memory. You can mice, keyboards, and many digital cameras,
manually change this setting to increase the come with the driver already installed in
amount of hard drive space allocated, but Windows. The devices whose drivers are
eventually your computer system will be- included in Windows are called Plug and
come sluggish as it is forced to page more Play devices. Plug and Play (PnP) is a soft-
and more often. This condition of excessive ware and hardware standard that Microsoft
paging is called thrashing. The solution to created with the Windows 95 OS. PnP is
this problem is to increase the amount of designed to facilitate the installation of new
RAM in your system so that it will not be hardware in PCs by including in the OS the
necessary for it to send data and instructions drivers these devices need in order to run.
to virtual memory. Because the OS includes this software,
How does the operating system incorporating a new device into your
manage storage? If it weren’t for the computer system seems automatic. Plug
operating system, the files and applications and Play enables users to plug a new device
you save to the hard drive and other storage into a port on the system unit, turn on the
locations would be an unorganized mess. computer, and immediately play (use) the
Fortunately, the OS has a file-management device. The OS automatically recognizes
system that keeps track of the name and the device and its driver without any further
location of each file you save and the user manipulations of the system.
programs you install. We will talk more What happens if the device is not
about file management later in the chapter. Plug and Play? Some current devices,
such as many types of printers and many
Hardware and Peripheral Device older devices are not Plug and Play. When
you install a non–PnP device, you will be
Management
prompted to insert the driver that was pro-
How does the operating system man- vided with the device. If you obtain a
age the hardware and peripheral non–PnP device secondhand and do not
devices? Each device attached to your receive the device driver, or if you are
computer comes with a special program required to update the device driver, you
called a device driver that facilitates can often download the necessary driver

What the Operating System Does 219


may stop responding,
certain actions may
cause a crash, or the de-
vice or the entire sys-
tem may stop working).
Although this is un-
common, it can happen.
Locate drive in device
list and click for
Fortunately, Windows
device properties has a Roll Back Driver
feature that removes a
newly installed driver,
and replaces it with the
last one that worked, to
Click to revert to remedy the problem
previous driver
Figure 5.12 (see Figure 5.12). Roll
The Roll Back Driver fea- Back Driver is found by
ture in Windows removes accessing the Device
a newly installed driver Manager dialog box under System and
and replaces it with the Maintenance in the Control Panel.
last one that worked.
from the manufacturer’s Web site. You can
>To access the Device also go to Web sites such as DriverZone.com
Manager dialog box, click
(driverzone.com) or Driver Guide
the Start button, Control Software Application Coordination
Panel, Hardware and (driverguide.com) to locate drivers.
Sound Group; then click Can I damage my system by How does the operating system help
the Device Manager link. installing a device driver? Occasion- application software run on the
ally, when you install a driver, your system computer? Application software feeds
may become unstable (that is, programs the CPU the instructions it needs to process
data. These instructions take the form of
computer code. Every computer program,
BITS no matter what its type or manufacturer,
AND
What Do I Do When My needs to interact with the CPU. For pro-
BYTES Computer Freezes? grams to work with the CPU, they must
contain code that the CPU recognizes.
At some point in time, we have all experienced our computers freezing up—nothing Rather than having the same blocks of code
seems to respond to a mouse click or a tap on any keyboard key. What should you do? for similar procedures in each program, the
Try following these steps: operating system includes the blocks of
1. Press Ctrl + Alt and then the Delete key to access the Task Manager. On code—each called an application program-
the Applications tab, close the application that is listed as not responding by ming interface (API)—that application soft-
clicking on the application and then clicking the End Task button. ware needs in order to interact with the OS.
2. If the non-responding application will not close from the Task Manager, press Microsoft DirectX, for example, is a group of
Ctrl + Alt and then Delete again to restart the computer. Restarting the computer multimedia APIs built into the Windows op-
is called a “soft” or “warm” boot. You might also try using the Start menu and erating system that improves graphics and
choosing Restart. sounds when you’re playing games or
3. If the computer will not restart from the Task Manager or from the Start menu, watching video on your PC.
then press the power button one time to try to restart the computer. (Older What are the advantages of using
computers may have a separate Restart button.) APIs? To create applications that can com-
4. If the computer still won’t restart, press and hold down the Power button until municate with the operating system, soft-
the power turns completely off. You may have to hold down the power button ware programmers need only refer to the
for several seconds. API code blocks when they write an applica-
5. Leave the computer turned off for a minute or so to allow all the internal com- tion. They don’t need to include the entire
ponents to shut down completely. Then turn the computer on again. (Powering code sequence in the application. APIs not
the computer on from an off position is called a “cold” or “hard” boot.) only prevent redundancies in software code,
6. If you can reproduce what caused the problem in the first place and are running but also make it easier for software develop-
Windows 7, turn on the Problem Steps Recorder and work through the steps ers to respond to changes in the operating
one more time. This will create documentation that will make your call to tech-
system.
nical support more efficient.
Large software developers such as
Microsoft have many applications under

220 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
ACTIVE Managing Hardware The Boot Process:
HELP- and Peripheral Starting Your
DESK
Devices: The OS Computer
In this Active Helpdesk call, you’ll play the role of a Many things happen quickly between the
helpdesk staffer, fielding calls about how the operating time you turn on the computer and the time
system manages memory, storage, hardware, and pe-
when it is ready for you to start using it. As
ripheral devices.
you learned earlier, all data and instructions
(including the operating system) are stored
in RAM while your computer is on. When
you turn off your computer, RAM is wiped
their corporate umbrella and use the same clean of all its data (including the OS). How
APIs in all or most of their applications. does the computer know what to do when
Because APIs coordinate with the operating you turn it on if there is nothing in RAM? It
system, all applications that have incorpo- runs through a special boot process (or
rated these APIs have similar interface fea- start-up process) to load the operating sys-
tures, such as toolbars and menus. Therefore, tem into RAM. The term boot, from bootstrap
many features of the applications have the loader (a small program used to start a larger
same look. An added benefit to this system program), alludes to the straps of leather,
is that applications sharing these formats called bootstraps, that men used in former
can easily exchange data with each other. As times to help them pull on their boots. This
such, it’s easy to create a chart in Microsoft is the source of the expression “pull oneself
Excel from data in Microsoft Access and in- up by the bootstraps.”
corporate the finished chart into a Microsoft What are the steps involved in the
Word document. boot process? As illustrated in Fig-
ure 5.13, the boot process consists of four
basic steps:
1. The basic input/output system (BIOS) Figure 5.13
is activated by powering on The boot process.
the CPU.

ROM
chip STEP 2: BIOS conducts
power-on self-test.

CPU

STEP 1: CPU activates BIOS.

STEP 3: BIOS loads OS to RAM.

STEP 4: Configuration and


customization settings checked,
and desktop displays.

The Boot Process: Starting Your Computer 221


2. The BIOS checks that all attached de- self-test, or POST. The POST consists of a
vices are in place (called a power-on test on the video card and video memory, a
self-test or POST). BIOS identification process, and a memory
3. The operating system is loaded into test to ensure that memory chips are work-
RAM. ing properly.
The BIOS compares the results of the
4. Configuration and customization set- POST with the various hardware configura-
tings are checked. tions that are permanently stored in CMOS
How can I tell if my computer is (pronounced “see-moss”). CMOS, which
entering the boot process? As the stands for complementary metal-oxide semicon-
computer goes through the boot process in a ductor, is a special kind of memory that uses
Windows operating system, indicator lights almost no power. A little battery provides
on the keyboard and disk drives may illumi- enough power so that the CMOS contents
nate, and the system may emit various will not be lost after the computer is turned
sounds. When you boot up off. CMOS contains infor-
on a PC with Windows or on mation about the system’s


a Mac, you won’t hear any memory, types of disk
beeps or see any keyboard
What’s the first drives, and other essential
lights illuminate, but you thing that input and output hardware
will most likely see the Win- happens after I components. If the results
dows or Mac OS logo dis- of the POST compare favor-
play on the monitor,
turn on my ably to the hardware con-
computer?
indicating the progress of the
start-up process. Once the
boot process has completed these steps, it is
ready to accept commands and data. Let’s
” figurations stored in
CMOS, the boot process
continues. If new hardware has been in-
stalled, this will cause the POST to disagree
look at each of these steps in more detail. with the hardware configurations in
CMOS, and you will be alerted that new
hardware has been detected.
Step 1: Activating BIOS
What’s the first thing that happens Step 3: Loading the Operating System
after I turn on my computer? In the
How does the operating system get
first step of the boot process, the CPU acti-
loaded into RAM? When the previous
vates the basic input/output system (BIOS).
steps are successfully completed, BIOS goes
BIOS (pronounced “bye-OSE”) is a program
through a preconfigured list of devices in its
that manages the exchange of data between
search for the drive that contains the system
the operating system and all the input and
files, which are the main files of the operat-
output devices attached to the system, hence
ing system. When it is located, the operating
its name. BIOS is also responsible for load-
system loads into RAM from its permanent
ing the OS into RAM from its permanent
storage location on the hard drive.
location on the hard drive.
Once the system files are loaded into
BIOS itself is stored on a special read-only
RAM, the kernel (or supervisor program) is
memory (ROM) chip on the motherboard.
loaded. The kernel is the essential compo-
Unlike data stored in RAM, data stored in
nent of the operating system. It is responsi-
ROM is permanent and is not erased when
ble for managing the processor and all other
the power is turned off.
components of the computer system. Be-
cause it stays in RAM the entire time your
Step 2: Performing the computer is powered on, the kernel is said
to be memory resident. Other parts of the
Power-On Self-Test OS that are less critical stay on the hard
How does the computer determine drive and are copied over to RAM on an
whether the hardware is working as-needed basis so that RAM is not entirely
properly? The first job BIOS performs is filled. These programs are referred to as
to ensure that essential peripheral devices nonresident. Once the kernel is loaded, the
are attached and operational. As mentioned operating system takes over control of the
already, this process is called the power-on computer’s functions.

222 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Step 4: Checking Further ACTIVE Starting the
Configurations and Customizations HELP- Computer: The Boot
DESK
When are the other components Process
and configurations of the system In this Active Helpdesk call, you’ll play the role of a
checked? CMOS checks the configura- helpdesk staffer, fielding calls about how the operating
tion of memory and essential peripherals in system helps the computer start up.
the beginning of the boot process. In this last
phase of the boot process, the operating sys-
tem checks the registry for the configuration Fortunately, you have several options for
of other system components. The registry correcting the situation. If you have recently
contains all of the different configurations installed new software or hardware, try
(settings) used by the OS and by other appli- uninstalling it. (Make sure you use the Add
cations. It contains the customized settings or Remove Programs feature in the Control
you put into place, such as mouse speed and Panel to remove the software.) If the prob-
the display settings, as well as instructions lem no longer occurs when rebooting, you
as to which programs should be loaded first. have determined the cause of the problem
Why do I sometimes need to enter a and can reinstall the device or software. If
login name and password at the end the problem does not go away, the first option
of the boot process? In a networked is to restart your computer in Safe mode.
environment, such as that found at most What is Safe mode? Sometimes
colleges, the operating system serves many Windows does not boot properly, and you
users. To determine whether a user is au- end up with a screen that says “Safe Mode”
thorized to use the system (for example, in the corners, as shown in Figure 5.14.
whether a user is a valid student or college (Alternatively, you can boot directly into
employee), authorized users are given a Safe mode by pressing the F8 key during the
login name and password. The verification boot process before the Windows logo
of your login name and password is called appears.) Safe mode is a special diagnostic
authentication. The authentication process mode designed for troubleshooting errors.
blocks unauthorized users from entering When the system is in Safe mode, only
the system. essential devices—such as the mouse, key- Figure 5.14
On your home computer, you also may board, and monitor—function. Even the If there is an error in the
need to input a password to log in to your regular graphics device driver will not boot process, your system
user account on your computer after your be activated in Safe mode. Instead, the might boot into Safe
computer has completely booted up. Even in system runs in the most basic graphics mode. Safe mode offers
functionality that is limited
a home environment, all users with access to mode, eliminating any screen images and but sufficient to allow you
a Windows computer (such as family mem- nonessential icons and resulting in a neutral to perform diagnostic
bers or roommates) can have their own user testing.
accounts. Users can set up a password to
protect their account from being accessed by
another user without permission. For more
information on selecting a good password,
see Chapter 9.
How do I know if the boot process
is successful? The entire boot process
takes only a minute or two to complete. If Desktop wallpaper
the entire system is checked out and loaded image missing
properly, the process completes by display-
ing the restored screen image. The computer
system is now ready to accept your first
Icons not in
command. their usual spot
on the desktop

Handling Errors in the Boot Process Safe Mode displayed


in corners of screen
What should I do if my computer
doesn’t boot properly? Sometimes
problems occur during the boot process.

The Boot Process: Starting Your Computer 223


screen. While in Safe mode, you can use the user cannot do so with the current configu-
Device Manager, a feature in the operating ration. Finally, if all other attempts to reboot
system that lets you view and change the fail, try a System Restore to roll back to a
properties of all devices attached to your past configuration. System Restore is cov-
computer. Safe mode boots Windows with ered in more detail later in the chapter.
only the original Microsoft Windows drivers What should I do if my keyboard or
that are required to boot the computer. another device doesn’t work after I
If Windows detects a problem in the boot boot my computer? Sometimes during
process, it will add Last Known Good Con- the boot process, BIOS skips a device (such
figuration to the Windows Advanced Op- as a keyboard) or improperly identifies it.
Figure 5.15
tions Menu (also accessible by pressing the Your only indication that this sort of prob-
F8 key during the boot process). Every time lem has occurred is that the device won’t
(a) The Windows 7 desk-
top puts the most com-
your computer boots successfully, a configu- respond after the system has been booted.
monly used features of the ration of the boot process is saved. When you When that happens, you can generally
operating system at your choose to boot with the Last Known Good resolve the problem by rebooting. If the
fingertips. (b) Hover your Configuration, the operating system starts problem persists, you may want to check the
mouse on a taskbar icon your computer by using the registry infor- operating system’s Web site for any patches
to show thumbnails of the
open windows of that
mation that was saved during the last shut- (or software fixes) that may resolve the
application; hover over a down. Safe mode and Last Known Good issue. If there are no patches or the problem
thumbnail to display a full Configuration are the two most widely used persists, then you may want to get technical
size image of that window. methods of booting into Windows when a assistance.

Recycle Sticky
The Desktop
Notes and Windows
Features
The desktop is the first inter-
Documents action you have with the op-
erating system and the first
Gadgets image you see on your moni-
Computer
tor. As its name implies, your
computer’s desktop puts at
your fingertips all of the ele-
All Programs
ments necessary for a pro-
ductive work session. They
Taskbar are items that are typically
found on or near the top of a
traditional desk, such as files
and folders.
What are the main features of the
b
Windows desktop and Start
menu? The very nature of a desktop is
that it lets you customize it to meet your in-
dividual needs. As such, the desktop on
your computer may be different from the
“Ghost images”
of other open desktop on your friend’s computer, or even
windows from the desktop of another account user on
the same computer. In recent versions of
Hover over icon Windows, many features that were once
to display
thumbnails of
only found on the desktop have moved to
open windows Hover over
the Start menu, including access to docu-
thumbnail to ments, programs, and computer drives and
display full devices. You can always create shortcuts on
size image
your desktop to these features if you find
that’s more convenient (see Figure 5.15).

224 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
On the desktop you’ll find: folder with subfolders, similar to the
way a traditional filing system is
• Recycle Bin: Location for deleted files
organized.
and folders from the C: drive only.
Deleted files from other locations, such • Computer: Provides easy access to
as your flash drive, do not go to the disk drives and system and network
Recycle Bin; instead, they are perma- devices.
nently deleted. Deleted files in the Recy- • All Programs: In the Start menu, this
cle Bin can be recovered easily before provides access to all programs avail-
the Recycle Bin is emptied. able in the system. To prevent taking
• Gadgets: A gadget is an easy-to-use up valuable screen space, a limited
miniprogram that gives you information number of programs displays. Use
at a glance or quick access to frequently the scrollbar to gain access to programs
used tools including weather informa- not immediately visible. Instant
tion, calendar items, calculators, games, Search can facilitate locating a
photo albums, and system tools. Sticky program.
Notes, in Windows 7, are not a gadget, How does the Mac desktop
but are a convenient accessory that compare with Windows? Although
you can use to jot down notes to yourself. the Mac OS X and the Windows operating
• Taskbar: Displays open and favorite systems are not compatible, they are
applications for easy access. You can extremely similar in terms of functionality.
point to an icon to preview windows As illustrated in Figure 5.16, both
of open files or programs, or move your Windows and Mac operating systems use
mouse over a thumbnail to preview a windows (rectangular boxes that contain
full-screen image. Or right-click an icon programs displayed on the screen), menus
to view a Jump List—the most recently (lists of commands that appear on the
or commonly used files for that screen), and icons (pictures that represent an
application. Finally, you can hover object such as a software application or a file
your mouse over a Taskbar icon to or folder).
display thumbnails of open windows, They both also have streamlined
and then you can hover over a mechanisms to access commonly used
thumbnail to display the contents of applications. Macs feature a Dock and a
that window at full size (all other Dashboard with widgets. A widget is a
apps are temporarily hidden from view). mini-application that enables quick access
to frequently used tools and activities (such
In the Windows 7 Start menu, you’ll find: as stock prices, to-do lists, and games).
The latest version of Windows has a Figure 5.16
• Documents: A convenient organiza-
taskbar with Dock-like capabilities and Although not compatible
tional tool that enables you to keep all
gadgets that provide functionality similar with each other, the
your documents in one place. You can Windows OS and the
to that of the Mac
further organize your Documents Mac OS have many
Widgets (Mac)/ widgets.
similar features.
Gadgets (Windows)

Files

Icons

Windows

Access to
applications

The Desktop and Windows Features 225


How can I see more
Tabs Title bar Minimize button Close button
than one window on
my desktop at a
time? You can easily
arrange the windows
Ribbon on a desktop by ar-
ranging separate
windows so that they
Maximize/ sit next to each other ei-
Restore button
ther horizontally or vertically.
You also can arrange windows
by cascading them so that they
Scrollbar
overlap one another, or you can
simply resize two open win-
dows so that they appear
on the screen at
the same time.
Document Showing win-
view options
dows side by
side or stacked
on top of each
Figure 5.17 other makes accessing two or more active
Most windows in a What are common features of a windows more convenient. To do so, right-
graphical user interface window? As noted earlier, one feature in- click the task bar and select “Show Windows
have the same common troduced in the graphical user interface is Stacked” or “Show Windows Side by Side.”
elements. windows (with a lowercase w), the rectangu- When you want to undo the arrangement,
lar panes on your computer screen that dis- right-click the taskbar again and select “Undo
play applications running on your system. Show Stacked” (or “Side by Side”). To bring a
Most programs have windows that include window back to its full size, click the Restore
toolbars, which have icons (shortcuts to fre- button in the top right corner of the window.
quently used tasks) and scrollbars (bars that Windows 7 introduces the “snap” feature,
appear at the side or bottom of the screen which is another new way to view windows
that control which part of the information is side by side. Simply drag a window to either
displayed on the screen). As shown in the left or right, and Windows will automati-
Figure 5.17, the newer versions of Microsoft cally resize and snap them in place.
Office have begun to organize toolbars into Windows Vista and 7 offer two more
a ribbon interface. The ribbon is further ways to navigate through open windows. To
Figure 5.18 organized into task-specific tabs with rele- see live thumbnail images of open windows,
vant commands. Using the Minimize, press Alt + Tab to access Windows Flip.
The Windows Flip 3D fea-
ture gives you the ability Maximize and Restore, and Close buttons, Pressing the Windows key + Tab initiates the
to move through live you can open, close, and resize windows. Windows Flip 3D feature. You can then
images of open windows. “flip” through open windows in
a stack by using the scroll wheel
on your mouse or the arrow keys
on your keyboard. The open win-
dows appear in a three-dimen-
sional configuration as shown in
Figure 5.18.
Can I move or resize the
windows once they are
tiled? Regardless of whether
the windows are tiled, you can re-
size them and move them around
the desktop. You can reposition
windows on the desktop by using
the mouse to point to the title bar
at the top of the window and,

226 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
while holding down the left mouse button, BITS
drag the window to a different location. To AND Upgrading Your Operating System
resize a window, place your mouse pointer BYTES
over any side or corner of a window until it
changes to a double-headed arrow [D]. You If you have had your computer for a year or two, you may be faced with the decision
can then left-click and drag the window to of whether to upgrade to the newest release version of your operating system (such
the new desired size. Aero Shake is a feature as going from Windows Vista to Windows 7). Here are a few key things to consider
that allows you to grab a window by its title before taking the plunge:
bar and “shake” it to minimize all other • Are there significant features in the new version that will make your life
windows. easier? If the only features the new version offers are ones you don’t need,
why bother upgrading?
• Will your hardware work with the new OS? Check the minimum operating
requirements (required RAM, processor speed, hard drive space, etc.) of the
Organizing Your new version to ensure that your computer can handle the workload of the new
Computer: File software. You will also need to make sure drivers for the new OS are available
for all your hardware devices and peripherals to ensure they will work properly
Management with the new OS. Microsoft has made this easy with Windows Upgrade Advisor.
So far you have learned that the operating The Upgrade Advisor scans your hardware, devices, and installed programs for
system is responsible for managing the compatibility, advises you on how to resolve any issues found, and recommends
processor, memory, storage, and devices, what you should do before upgrading.
and that it provides a mechanism whereby • Is your application software compatible with the new version of the OS?
applications and users can interact with the Usually, application software works fine with a new version of an OS. Some-
computer system. An additional function of times it doesn’t. Check with the software vendors regarding compatibility, espe-
cially if you’re upgrading to a 64-bit system. Windows 7 has a compatibility
an operating system is to enable file man-
feature that allows you to run your software in an earlier version of the operat-
agement, which entails providing organiza- ing system if it is not compatible with Windows 7.
tional structure to the computer’s contents.
• Is your current operating system still supported? When it deploys
The OS allows you to organize the contents new versions of operating systems, the company may stop supporting older
of your computer in a hierarchical directory versions. If your version will not be supported, it’s best to upgrade to a newer
structure that includes files, folders, version.
libraries, and drives. In this section, we Before starting the upgrade, you should back up all your data files so you won’t
discuss how you can use this hierarchical lose anything accidentally during the upgrading process. Backup and Restore in
structure to make your computer more Windows 7 makes this job less of a hassle.
organized and efficient.

Organizing Your Files were all saved in a single folder, regardless


What exactly is a file? Technically, a of where they are actually physically
file is a collection of related pieces of stored.
information stored together for easy refer- How does the operating system
ence. A file in an operating system is a organize files? Windows organizes the
collection of program instructions or data contents of your computer in a hierarchical
that is stored and treated as a single unit. structure comprising drives, folders,
Files can be generated from an application subfolders, and files. The hard drive,
such as a Word document or an Excel represented as the C drive, is where you
workbook. In addition, files can represent permanently store most of your files. Other
an entire application, a Web page, a set of storage devices on your computer are also
sounds, or an image. Files are stored on represented by letters. The A drive has tradi-
the hard drive, a flash drive, or another tionally been reserved for a floppy drive,
permanent storage medium. As the number which you may or may not have installed on
of files you save increases, it becomes more your computer. Any additional drives (such
important to keep them organized in as flash or DVD drives) found on your com-
folders and libraries. A folder is a puter are represented by other letters (D, E,
collection of files. Windows 7 introduces F, and so on).
the concept of libraries. A library is a How is the hard drive organized?
collection that gathers files from different The C drive, or hard drive, is like a large fil-
locations and displays them as if they ing cabinet in which all files are stored. As

Organizing Your Computer: File Management 227


such, the C drive is the top of the filing Explorer is the main tool for finding, view-
structure of the computer system and is ing, and managing the contents of your
referred to as the root directory. All other computer. It shows the location and contents
libraries, folders, and files are organized of every drive, folder, and file. As illustrated
within the root directory. There are areas in in Figure 5.19, Windows Explorer is divided
the root directory that the operating system into two panes, or sections.
has filled with files and folders holding spe- The navigation pane on the left shows the
cial OS files. The programs within these files contents of your computer in a traditional
help run the computer and generally hierarchical tree structure. It displays all the
shouldn’t be accessed. The Windows operat- drives of the system, as well as other com-
ing system creates special folders called monly accessed areas such as the Desktop,
Documents, Pictures, Music, and Videos, Libraries, and Documents, Music, Pictures,
where you may begin to store and organize and Video folders.
your text, image, audio, and video files, re- How should I organize my files?
spectively. However, users do not always Creating folders is the key to organizing
carefully save their files in these special fold- your files because folders keep related docu-
ers. Files are often stored all over the PC in ments together. Again, think of your com-
various folders. For example, picture files puter as a big filing cabinet that is filled with
may not just be stored in the Pictures folder, many folders. Those folders have the capac-
but might also be stored in the temporary ity to hold individual files, or even other
folder, in a separate folder within the Docu- folders that contain individual files. For ex-
ments folder, or even in remote storage, ample, you might create one folder called
making finding all picture files difficult. Classes to hold all of your class work. Inside
Windows 7 tries to remedy this situation the Classes folder, you could create folders
with the use of libraries. Recall, libraries for each of your classes (such as CIS110,
gather files from different locations and dis- MGT111, and HIS112). Inside each of those
play the files as if they were all saved in a folders, you could create subfolders for each
single folder, regardless of where they are class’s assignments, completed homework,
actually physically stored. Some libraries are research, notes, and so on.
created already in Windows, and Windows Grouping related files into folders makes
has defined specific folders to include in it easier for you to identify and find files.
Figure 5.19 each standard library, but users can create Which would be easier—going to the CIS110
Windows Explorer lets you other libraries to meet their special needs, or folder to find a file or searching through the
see the contents of your can modify the standard libraries, adding or hundreds individual files in Documents
computer. deleting folders to meet their needs. hoping to find the right one? Grouping files
>Click the Windows Ex- How can I easily locate and see in a folder also allows you to move them
plorer icon on the taskbar. the contents of my more efficiently, so you can quickly transfer
computer? If you critical files needing frequent backup, for in-
Navigation pane use a Windows stance. Sometimes, it’s not always possible
PC, Windows to put all similar files into one folder. For
File path example, you might have
PowerPoint files stored in
separate folders that corre-
spond to each particular
Files and folders
in CIS110 class. If you want to always
have quick access to your
PowerPoint files, you could
Libraries create a PowerPoint Library
and specify the folders
where the PowerPoint
Music folder
files are located. The
PowerPoint Library would
then gather the PowerPoint
Opened CIS110 files from the different
folder
locations and display them
as if they were all saved in
a single folder.

228 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Viewing and Sorting Files and Folders Sort files and folders
Figure 5.20
by clicking the headers Details view enables you
Are there different ways I can view to sort and list your files in
and sort my files and folders? When a variety of ways to en-
you open any folder in Windows, the tool- able quick access to the
bar at the top displays a Views button. correct file.
Clicking on the Views button offers you dif-
ferent ways to view the folders and files,
which are discussed in more detail below. In
some views, the folders are displayed as
Live Icons, which is a feature that began in
Windows Vista. Live Icons allows you to
preview the actual contents of a specific file
or folder without actually opening the file.
Live Icons can be displayed in a variety
of views.
• Tiles view: Displays files and folders as
icons in list form. Each icon represents
the application associated with the file,
and also includes the name and the size
picture files, or for PowerPoint presenta-
of the file, though the display informa-
tions, because the title slide of the
tion is customizable to include other
presentation will display, making it
data. The Tiles view also displays pic-
easier for you to distinguish among
ture dimensions, a handy feature for
presentations. You may use the scale
Web page developers.
feature to adjust the size of the icons
• Details view: The most interactive view. further. Additionally, a preview pane is Figure 5.21
Files and folders are displayed in list available in this view. It allows you to The Large Icons view is an
form, and the additional file information view the first page of the selected especially good way to
is displayed in columns alongside the document without having to open it display the contents of
name of the file. You can sort and dis- completely (see Figure 5.21). files and folders. The
play the contents of the folder by any of preview pane on the right
For those folders that contain collections enables you to see the
the column headings, so you can sort
of MP3 files, you can download the cover first page of your
the contents alphabetically by name or document without first
of the CD or an image of the artist to display
type, or hierarchically by date last modi- opening it.
on any folder to identify that collection
fied or by file size (see Figure 5.20). >To access Large Icons
further.
• List view: Another display of icons and What’s the best way to search for view, from the command
names that are even smaller than in Tiles bar in any folder dialog
a file? You’ve no doubt saved a file and box, click the Views
view. This is a good view if you have a forgotten where you saved it, or have down- arrow, and then select
lot of content in the folder and need to loaded a file from the Internet and then were Large Icons view. To
see most or all of it at once. not sure where it was saved. What’s the access the Preview Pane,
• Small and Medium Icons views: These click Organize, select
quickest way to find a file? Looking through
Layout, and then Preview
views also display files and folders as every file stored on your computer could Pane.
icons in list form, but the icons are
either small- or medium-sized, respec-
Preview Pane
tively. Additional file information dis- Folders with live allows viewing
plays in a ScreenTip (the text that preview of contents without opening file

appears when you place your cursor


over the file icon).
• Large and Extra Large Icons views:
Large Icons view (see Figure 5.21) shows
the contents of folders as small images.
There is also Extra Large Icons view,
Live preview
which shows folder contents and other of Excel and
icons as even larger images. Large PowerPoint files

Icons and Extra Large Icons views are


the best to use if your folder contains

Organizing Your Computer: File Management 229


and is used to search the contents of current
SOUND folders.
BYTE File Management

In this Sound Byte, you’ll examine the features of file


Naming Files
management and maintenance. You’ll learn the vari- Are there special rules I have to fol-
ous methods of creating folders, how to turn a group low when I name files? Files have
of unorganized files into an organized system of fold- names just like people. The first part of a
ers, and how to maintain your file system. file, or the file name, is similar to your first
name, and is generally the name you assign
to the file when you save it. For example,
“bioreport” may be the name you assign a
take hours, even with a well-organized file- report you have completed for a biology
management system. Fortunately, the newer class.
versions of Windows include Instant Search, In a Windows application, an extension,
a search feature, found on the Start menu, or file type, follows the file name and a
which searches through your hard drive or period or dot (.). Like a last name, this
other storage device (DVD or flash drive) to extension identifies what kind of family of
locate files that match criteria you provide. files the file belongs to, or which application
Your search can be based on a part of the should be used to read the file. For example,
name of the file or just a word or phrase in if “bioreport” is a document created in
the file. You can also narrow your search by Microsoft Works, it has a .wks extension
providing information about the type of file, and its name is “bioreport.wks.” If the
which application was used to create the bioreport file is a Word 2007 document,
file, or even how long ago the file was saved. then it has a .docx extension and its name
(Mac OS Snow Leopard has a similar feature is “bioreport.docx.” Figure 5.22 lists some
called Spotlight, known as Sherlock in ear- common file extensions and the types of
lier versions.) Instant Search can also find documents they indicate.
e-mails based on your criteria. Instant Do I need to know the extension
Search is found in Windows Explorer, too, of a file to save it? As shown in

Figure 5.22 COMMON FILE NAME EXTENSIONS

Extension Type of Document Application


.doc Word processing document Microsoft Word 2003

.docx Word processing document Microsoft Word 2007 and 2010

.wpd Word processing document Corel WordPerfect

.xlsx Spreadsheet Microsoft Excel 2007 and 2010

.accdb Database Microsoft Access 2007 and 2010

.pptx PowerPoint presentation Microsoft PowerPoint 2007 and 2010

.pdf Portable Document Format Adobe Acrobat or Adobe Reader

.rtf Text (Rich Text Format) Any program that can read text documents

.txt Text Any program that can read text documents

.htm or .html HyperText Markup Language for a Web page Any program that can read HTML

.jpg Joint Photographic Experts Group (JPEG) image Most programs capable of displaying images

.gif Graphics Interchange Format (GIF) image Most programs capable of displaying images

.bmp Bitmap image Windows

.zip Compressed file WinZip

230 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
Figure 5.23, when you save a file created in
Figure 5.24 FILE NAMING CONVENTIONS
most applications running under the Win-
dows operating system, you do not need to Mac OS Windows
add the extension to the file name; by de- File and folder name As many as 255 characters* As many as 255 characters
fault, it is added automatically for you. Mac length
and Linux operating systems do not require
file extensions. This is because the informa- Case sensitive? Yes No
tion as to the type of application the com- Forbidden characters Colon (:) ” / \ * ? <> | :
puter should use to open the file is stored
inside the file itself. However, if you’re File extensions needed? No Yes
using these operating systems and will be Path separator Colon (:) \
sending files to Windows users, you should
add an extension to your file name so that *Note: Although Mac OS X supports file names with as many as 255 characters, many applications
Windows can more easily open your files. running on OS X still support only file names with a maximum of 31 characters.
You may need to know the extension of files
created in any of the Office 2007 or 2010 ap-
plications because they have a different file
format than the earlier version. The new rules, which are listed in Figure 5.24.
versions of Office have an x at the end of the Beyond those conventions, it’s important
extension to represent the XLM file format. that you name your files so that you can
For example, files saved in Word 2010 have easily identify them. A file name such as
a .docx file extension, whereas files save in “research.docx” may be descriptive to you
Word 2003 have a .doc file extension. A file if you’re only working on one research
created in Office 2007 or 2010 cannot be read paper. However, if you create other
with an earlier version of Office unless it is research reports later and need to identify
converted or saved in the earlier format. the contents of these files quickly, you’ll
Are there things I shouldn’t do soon wish you had been more descriptive.
when naming my files? Each operating Giving your files names that are more
system has its own naming conventions, or descriptive, such as bioresearch.docx or,
better yet, bio101research.docx, is a
good idea.
Keep in mind, however, that all files must
be uniquely identified, unless they are saved
in different folders or in different locations.
Therefore, although files may share the same
file name (such as “bioreport.docx” or
“bioreport.xlsx”) or share the same exten-
sion (“bioreport.xlsx” or “budget.xlsx”), no
two files stored on the same device and
folder can share both the same file name and
Type file name the same extension.
How can I tell where my files are
saved? When you save a file for the first
time, you give the file a name and designate
where you want to save it. For easy refer-
ence, the operating system includes default
folders where files are saved unless you
specify otherwise. In Windows, the default
folders are “Documents” for files, “Down-
Change file type
loads” for files downloaded from the
Internet, “Music” for audio files, “Pictures”
Figure 5.23 for graphic files, and “Videos” for video
When you save a file in Microsoft Word 2010, you can files. Although you can create your own
select in what format you would like the file to be folders, these default folders are the begin-
saved, such as a format compatible with Word 97-2003. ning of a well-organized system.
>The Save As features are displayed by selecting the You can determine the location of a file by
File tab and then selecting Save As. its file path. The file path starts with the

Organizing Your Computer: File Management 231


ACTIVE Organizing Your within the correct application automatically.
HELP– You can copy a file to another location using
Computer: File
DESK the Copy command. When you copy a file, a
Management duplicate file is created and the original file
In this Active Helpdesk call, you’ll play the role of a remains in its original location. To move a
helpdesk staffer, fielding calls about the desktop, win- file from one location to another, use the
dows features (such as scrollbars and the Minimize Move command. When you move a file, the
and Maximize buttons), and how the operating system original file is deleted from its original
helps keep the computer organized. location.
Where do deleted files go? The
Recycle Bin is a folder on the desktop
where files deleted from the hard drive
drive in which the file is located and
reside until you permanently purge them
includes all folders, subfolders (if any),
from your system. Unfortunately, files
the file name, and the extension. For
deleted from other drives (such as a DVD
example, if you were saving a picture of
drive, flash drive, external hard drive, or
Emily Brontë for a term paper for an English
network drive) do not go to the Recycle
composition course, the file path might
Bin but are deleted from the system imme-
be C:\Users\Username\Documents\
diately. (Mac systems have something sim-
English Comp\Term Paper\Illustrations\
ilar to the Recycle Bin, called Trash, which
EBronte.jpg.
is represented by a wastebasket icon. To
As shown in Figure 5.25, C is the drive on
delete files on a Mac, drag the files to Trash
which the file is stored (in this case, the hard
on the Dock.)
drive), and Documents is the file’s primary
How do I permanently delete files
folder. English Comp, Term Paper, and
from my system? Files in the Recycle
Illustrations are successive subfolders
Bin or Trash are held only until they are
within the Documents main folder. Last is
permanently deleted. To delete your files
the file name, EBronte, separated from the
from the Recycle Bin permanently, select
file extension (in this case, jpg) by a period.
Empty the Recycle Bin after right-clicking
Notice that there are backslash characters
the desktop icon. On Macs, select Empty
(\) in between the drive, primary folder,
Trash from the Finder menu in OS X.
subfolders, and file name. This backslash
character, used by Windows and DOS, is
referred to as a path separator. Mac files Utility Programs
use a colon (:), whereas UNIX and Linux
You have learned that the operating system
files use the forward slash (/) as the path
is the single most essential piece of software
separator.
in your computer system because it coordi-
nates all the system’s activities and provides
a means by which other software applica-
Working with Files tions and users can interact with the system.
How can I move and copy files? However, there is another set of programs
Once you’ve located your file with Windows included in system software. Utility pro-
Explorer, you can perform many other file- grams are small applications that perform
management actions such as opening, copy- special functions.
ing, moving, renaming, and deleting files. Some of these utility programs are incor-
You open a file by double-clicking the file porated into the operating system. For ex-
from its storage location. Based on the file ample, Windows has its own firewall and
extension, the operating system then deter- file-compression utilities. Other utility
mines which application needs to be started programs, such as antivirus and security
to open the requested file and opens the file programs, are so large and require such

Figure 5.25 C:\Users\Username\Documents\English Comp\Term Paper\Illustrations\EBronte.jpg


Understanding file paths.

Drive Primary Folder Subfolders File Name Extension

232 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
frequent updating that they offered as BITS
stand-alone programs or as Web-based serv- AND A File Type for Everyone
ices. Sometimes utility programs, such as BYTES
Norton SystemWorks, are offered as soft-
ware suites, bundled with other useful Imagine you are sending an e-mail to a diverse group of individuals. You are not sure
maintenance and performance-boosting util- what word processing software each of them uses, but you assume that there will be
ities. Still other utilities, like Lavasoft’s Ad- a mix of people who use Word, WordPerfect, and even Writer. How can you be sure
Aware, are offered as freeware or shareware that all users will be able to open the attachment regardless of the program installed
programs and are available as downloads on their computers? Save the file in Rich Text Format (.rtf), Portable Document Format
from the Web. (.pdf), or Text (.txt) format. Rich Text and Text files can be read by any modern word
Figure 5.27 illustrates some of the various processing program, although some formatting may be lost when a document is
types of utility programs available within saved in Text (.txt) format. Anyone can read a PDF file by downloading the Acrobat
the Windows operating system as well as Reader from the Adobe Web site (adobe.com). To save files as RTF, PDF, or TXT files,
those available as stand-alone programs. In simply change the file type when saving your file. In Microsoft Word, for example, you
general, the basic utilities designed to man- can select the file type in the Save As menu shown in Figure 5.26.
age and tune the computer hardware are
incorporated in the operating system. The
stand-alone utility programs typically offer
more features or an easier user interface for
backup, security, diagnostic, or recovery
functions.
In this section, we explore many of the
Change
utility programs you’ll find installed on a file type
Windows 7 operating system. Unless other-
wise noted, you can find these utilities in the
Control Panel or on the Start menu by select-
ing All Programs, Accessories, and then
System Tools. (We also take a brief look at
some Mac utilities.) We will discuss
antivirus and personal firewall utility
Choose appropriate
programs in Chapter 9. file type

Display Utilities
How can I change the appearance of Figure 5.26
my desktop? Personalization, found in By changing a word processing file’s type to PDF, RTF, or TXT (plain text),
Appearance and Personalization on the you can ensure that everyone can read your file, no matter which word
processing program they use.
Control Panel or by right-clicking any area
on the desktop and selecting Personalize,
has all the features you need to change the
appearance of your desktop. It provides dif-
automatically runs a wizard (a step-by-step
ferent options for the desktop background,
guide) that walks you through the
screen savers, and window colors. Although
installation process. If a wizard does not start
Windows comes with many different back-
automatically, you should go to the Pro-
ground themes and screen saver options
grams and Features utility found in the
preinstalled, hundreds of downloadable op-
Programs folder in the Control Panel. This
tions are available on the Web. Just search
prompts the operating system to look for the
for “backgrounds” or “screen savers” on
setup program of the new software and
your favorite search engine to customize
starts the installation wizard.
your desktop.
What is the correct way to
remove unwanted programs from
my system? Some people think that
The Programs and Features Utility deleting a program from the Program
What is the correct way to add new Files folder on the C drive is the best way
programs to the system? When you to remove a program from the system.
install a new program, usually the program However, most programs include support

Utility Programs 233


Figure 5.27 UTILITY PROGRAMS AVAILABLE WITHIN WINDOWS AND AS STAND-ALONE PROGRAMS

Windows Utility Program Stand-Alone Windows Utility Program Function


File Management
Programs and Features Properly installs and uninstalls software

Windows Explorer File Compression WinZip Reduces file size

Windows System Maintenance and Diagnostics

Backup and Disk Imaging Acronis True Image, Norton Ghost, SkyDrive Backs up important information and makes a complete mirror
image of your current computer setup

Disk Cleanup McAfee Total Protection Removes unnecessary files from hard drive

Disk Defragmenter Norton Utilities, iDefrag (for OS X) Arranges files on hard drive in sequential order

Error-checking (previously ScanDisk) Checks hard drive for unnecessary or damaged files

System Restore FarStone Snapshot, Acronis Backup and Restores system to a previous, stable state
Security, Norton Ghost

Task Manager and Resource Monitor Displays performance measures for processes; provides
information on programs and processes running on computer

Task Scheduler Schedules programs to run automatically at prescribed times

files such as a help file, dictionaries, and File Compression Utilities


graphics files that are not located in the
main program folder found in Program What is file compression? A file
Files. Depending on the supporting file’s compression utility is a program that
function, support files can be scattered takes out redundancies in a file to reduce
throughout various folders within the the file size. File compression is helpful
system. You would normally miss these because it makes a large file more compact,
files by deleting only the main program making it easier and faster to send over the
file from the system. By selecting the Internet, upload to a Web page, or save
individual program’s own uninstall onto a disc. As shown in Figure 5.28, Win-
option, or the Windows uninstaller utility dows has built-in compression (or zip) file
found in Programs in the Control Panel, support. There are also several stand-alone
you delete not only the main program file freeware and shareware programs, such as
but also all supporting files and most WinZip (for Windows) and StuffIt (for
registry entries. Windows or Mac), that you can obtain to
compress your files.
BITS How does file compression
AND Need to Recover a Deleted File? work? Most compression programs look
BYTES for repeated patterns of letters and replace
these patterns with a shorter placeholder.
Should you move a file to the Recycle Bin in error, you can immediately restore the The repeated patterns and the associated
deleted file by clicking Restore all Items from the Task pane in the Recycle Bin dialog
box. Once you empty the Recycle Bin, getting the file back is difficult, but perhaps not
impossible. SOUND File Compression
Because you don’t see the file name anymore, it looks as if the file has been erased BYTE
from the hard drive. However, only the reference to the deleted file is deleted permanently,
so the operating system has no easy way to find the file. The file data actually remains on In this Sound Byte, you’ll learn about the advantages of
the hard drive until otherwise written over. For those files that have been deleted for file compression and how to use Windows to com-
awhile, you can use a program such as FarStone’s RestoreIT! or Norton Ghost. However, press and decompress files. This Sound Byte also
the longer you wait to recover a deleted file, the smaller your chances of a full recovery, teaches you how to find and install file compression
because the probability increases that your file has been overwritten by other data. shareware programs.

234 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
placeholder are cataloged
a
and stored temporarily
in a separate file called
the dictionary. For example,
in the following sentence, you
can easily see the repeated
patterns of letters.
The rain in Spain falls
mainly on the plain.
Although this example
contains obvious repeated pat-
terns (ain and the), in a large
document the repeated pat-
terns may be more com-
plex. The compression
b Compression
program’s algorithm reduces file size
(a set of instructions from 1935 KB to
designed to complete a 1453 KB
solution in a step-by-step man-
ner) therefore runs through the file several
Figure 5.28
times to determine the optimal repeated to decompress the file as well (see
patterns to use to obtain the greatest Figure 5.29). (a) File compression is
a built-in utility of the
compression.
Windows operating
How effective are file compression system. (b) Compressing
programs? The effectiveness of file the PowerPoint document
compression—that is, how much a file’s
System Maintenance Utilities reduced the file size from
size is reduced—depends on several factors, Are there any utilities that make my 1,935 KB to 1,453 KB.
including the type and size of the individ- system work faster? Disk Cleanup is >To access the Windows
ual file and the compression method used. a Windows utility that cleans, or removes, file compression utility,
right-click the file or folder
Current compression programs can reduce unnecessary files from your hard drive.
that is to be compressed,
text files by 50 percent or more, depending These include files that have accumulated in select Send to from the
on the file. However, some files, such as the Recycle Bin as well as temporary files, shortcut menu, and then
PDF files, already contain a form of com- which are files created by Windows to store select Compressed
pression, so they do not need to be com- data temporarily when a program is run- (zipped) Folder.
pressed further. Other file types, especially ning. Windows usually deletes these tempo-
some graphics and audio formats, have rary files when you exit the program, but
gone through a compression process that sometimes it forgets to do this, or doesn’t
reduces file size by permanently discarding have time because your system freezes up or
data. For example, image files such as incurs a problem that prevents you from
Joint Photographic Experts Group ( JPEG), properly exiting a program. Disk Cleanup,
Graphics Interchange Format (GIF), and found by clicking the Start button, then se-
Portable Network Graphics (PNG) files lecting All Programs, Accessories folder, and
discard small variations in color that the then the System Tools folder, also removes
human eye may not pick up. Likewise, temporary Internet files (Web pages stored
MP3 files permanently discard sounds that on your hard drive for quick viewing) as
the human ear cannot hear. These graphic well as offline Web pages (pages stored
and audio files do not need further on your computer so you can view them
compression. without being connected to the Internet).
How do I decompress a file I’ve If not deleted periodically, these unneces-
compressed? When you want to sary files can hinder efficient operating
restore the file to its original state, you performance.
need to decompress the file so that the How can I control which files Disk
pieces of file that the compression process Cleanup deletes? When you run Disk
temporarily removed are restored to the Cleanup, the program scans your hard drive
document. Generally, the program you to determine which folders have files that
used to compress the file has the capability can be deleted and calculates the amount of

Utility Programs 235


drive, thereby allowing the OS to work
more efficiently. You can find the Win-
dows Disk Defragmenter utility by click-
ing the Start menu, then All Programs,
Accessories, and then System Tools.
STEP 1: Right-click STEP 2: Select Using the Windows Disk Defragmenter
zipped folder. Extract All… Analyzer feature, you
should check several times
a year to determine
whether your drive needs
to be defragmented. Macs
do not have a defrag utility
built into the system be-
STEP 3: Browse to cause developers thought
storage location. that the file system used by
Mac OS X was so efficient
that defragging the hard
drive would be unneces-
STEP 4: Extracted file
sary. Those users who feel
displays in selected hard drive space that the need to defrag their Mac can use
location. would be freed iDefrag, an external program that can be
Figure 5.29 by doing so. You purchased from Coriolis Systems.
check off which type of How do I diagnose potential errors
The Extraction Wizard in
Windows makes unzipping files you would like to delete, as shown in or damage on my storage devices?
compressed folders and Figure 5.30. Error-checking, once known as ScanDisk, is
files easy. What else can I do if my system a Windows utility that checks for lost files
runs slowly? Over time, as you add and and fragments as well as physical errors on
delete information in a file, the file pieces your hard drive. Lost files and fragments of
are saved in scattered locations on the hard files occur as you save, resave, move, delete,
drive. Locating all the pieces of the file takes and copy files on your hard drive. Some-
extra time, making the operating system less times the system becomes confused, leaving
efficient. Windows Disk Defragmenter references on the file allocation table or
regroups related pieces of files on the hard FAT (an index of all sector numbers in a
table) to files that no longer exist or have
been moved. Physical errors on the hard
drive occur when the mecha-
nism that reads the hard
Total space
drive’s data (which is
to be freed stored as 1s or 0s) can no
longer determine
whether the area holds
a 1 or a 0. These areas
are called bad sectors.
Sometimes Error-
checking can recover
Space freed with the lost data, but
the selections
more often, it deletes
the files that are
Description of
unnecessarily taking
Figure 5.30 up space. Error-check-
folder contents
Using Disk Cleanup will ing also makes a note of
help free space on your any bad sectors so that
hard drive.
the system will not use them again to
>Disk Cleanup is store data.
accessed by clicking
Start, All Programs, Where can I find Error-checking?
Accessories, and then To locate Error-checking, click Computer
System Tools. from the Start menu, right-click the disk

236 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
you want to diagnose, select Properties, BITS
and select Tools. On Macs, you can use the AND Making Tech Support Easier
Disk Utility to test and repair disks. You BYTES
will find Disk Utility in the Utilities folder
in the Applications folder on your Have you ever been frustrated trying to clearly and accurately describe your prob-
hard drive. lem or an error message you have received to a technical support person? Have
How can I check on a program that you had trouble remembering the steps you took to encounter a problem? Or, are
has stopped running? If a program has you on the other side, trying to help via the phone a friend or family member with
stopped working, you can use the Windows their problems? If so, Windows 7 has a cool new feature called Problem Steps
Task Manager utility to check on the pro- Recorder that you can use to capture all your mouse clicks and keystrokes. In ad-
gram or to exit the nonresponsive program. dition to capturing the clicks and keystrokes you make to reproduce the problem
Although you can access Task Manager or error, the Problem Steps Recorder provides screen shots of your actions. The
from the Control Panel, it is more easily captured data is stored in a zipped file. You can then send the zipped file to your
accessible by pressing Ctrl + Alt and then technical support person.
the Delete key or by right-clicking an empty To start Problem Steps Recorder, click Start, type psr.exe in the search box, and
space on the taskbar at the bottom of your press Enter. When Problem Steps Recorder displays, click the Start Record button and
screen. The Applications tab of Task Man- continue the steps to reproduce the problem or error. You can add comments as you
ager lists all programs that you are using go. The end result is a slideshow of all your actions, along with descriptions (in regu-
and indicates whether they are working lar English—not code) of what you did.
properly (running) or have stopped
improperly (not responding). You can
terminate programs that are not respond-
ing by clicking the End Task button in the
dialog box.
If you need outside assistance because of Figure 5.31
a program error, Dr. Watson for Windows, a The Problem Steps Recorder captures the clicks and keystrokes
tool that is included in Microsoft Windows you make to reproduce a problem or error.
XP, and Problem Reports and Solutions, a
tool in Windows Vista and Windows 7,
gather information about the computer
when there is a program error. When an you try to start the application, the sys-
error occurs, these tools automatically tem freezes once again. You uninstall the
create and save a log. The log can then be new program, but your computer contin-
viewed, printed, or delivered electronically ues to freeze after rebooting. What can
to any technical support professional, you do now?
who can then use this information to help The most recent versions of Windows
diagnose the problem. have a utility called System Restore
that lets you roll your system settings
back to a specific date when everything
System Restore and was working properly. A system restore
point, which is a snapshot of your entire
Backup Utilities system’s settings, is made every week
Is there an undo command for the and prior to certain events, such as
system? Say you have just installed a installing or updating software. You
new software program and your computer also can create a custom restore point
freezes. After rebooting the computer, when manually. Should problems occur, if the
computer was running just fine before
you installed new software or a hard-
ACTIVE ware device, you could restore your
Using Utility computer to the settings that were in
HELP-
DESK Programs effect before the software or hardware
installation. System Restore does not
In this Active Helpdesk call, you’ll play the role of a affect your personal data files (such as
helpdesk staffer, fielding calls about the utility pro- Microsoft Word documents, browsing
grams included in system software and what these history, or e-mail), so you won’t lose
programs do. changes made to these files when you
use System Restore.

Utility Programs 237


DIG
DEEPER
How Disk Defragmenter Utilities Work

To understand how disk defragmenter utilities work, you must first saved. In that case, the system writes the added part of the file to the
understand the basics of how a hard disk drive stores files. A hard disk next available location on the disk, and a reference is made in the table
drive is composed of several platters, or round, thin plates of metal, that as to the location of this file fragment. Over time, as files are saved,
are covered with a special magnetic coating that records the data. The deleted, and modified, the bits of information for various files fall out of
platters are about 3.5 inches in diameter and are stacked onto a spin- sequential order and the disk becomes fragmented.
dle. There are usually two or three platters in any hard disk drive, with Disk fragmentation is a problem because the operating system is not
data stored on one or both sides. Data is recorded on hard disks in con- as efficient when a disk is fragmented. It takes longer to locate a whole
centric circles called tracks. Each track is further broken down into pie- file because more of the disk must be searched for the various pieces,
shaped wedges, each called a sector (see Figure 5.32). The data is greatly slowing down the performance of your computer.
further identified by clusters, which are the smallest segments within How can you make the files line up more efficiently on the disk? At
the sectors. this stage, the disk defragmenter utility enters the picture. The defrag-
When you want to save (or write) a file, the bits that make up your menter tool takes the hard drive through a defragmentation process in
file are recorded onto one or more clusters of the drive. To keep track of which pieces of files that are scattered over the disk are placed together
which clusters hold which files, the drive also stores an index of all sec- and arranged sequentially on the hard disk. Also, any unused portions of
tor numbers in a table. To save a file, the computer will look in the table clusters that were too small to save data in before are grouped, increas-
for clusters that are not already being used. It will then record the file in- ing the available storage space on the disk. Figure 5.33 shows before
formation on those clusters. When you open (or read) a file, the and after shots of a fragmented disk that has gone through the defrag-
computer searches through the table for the clusters that hold the mentation process.
desired file and reads that file. Similarly, when you delete a file, you For more about hard disks and defragmenting, be sure to check out
are actually not deleting the file itself, but rather the reference in the Sound Byte “Hard Disk Anatomy Interactive.”
the table to the file.
How does a disk become fragmented? When only part of an older
file is deleted, the deleted section of the file creates a gap in the sector Fragmented files
on disk
of the disk where the data was originally stored. In the same way, when
new information is added to an older file, there may not be space to
save the new information sequentially near where the file was originally Defragmented
files on disk

Track

Sector

Cluster

Figure 5.32 Figure 5.33


On a hard disk platter, data is recorded onto Defragmenting the hard drive arranges file fragments so that they are
tracks, which are further broken down into located next to each other. This makes the hard drive run more
sectors and clusters. efficiently.

How does the computer remember also can create and name your own restore
its previous settings? Every time points at any time. Creating a restore
you start your computer or install a new point is a good idea before making changes
application or driver, Windows automati- to your computer such as installing hard-
cally creates a system restore point. You ware or software. If something goes wrong

238 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
with the installation process,
Windows can reset your system
to the restore point. As shown in
Figure 5.34, Windows includes a
Restore Point Wizard that walks
you through the process of setting
restore points.
How can I protect my data in
the event something malfunc-
tions in my system? When you
use the Windows Backup and
Restore utility (found in the Control
Panel), you can create a duplicate
copy of all the data on your hard
drive (or just the folders and files
you specify) and copy it to another
storage device, such as a DVD or
external hard drive. A backup copy
protects your data in the event your hard
drive fails or files are accidentally erased.
Although you may not need to back up
every file on your computer, you should
back up the files that are most important
to you and keep the backup copy in a safe
location. Mac OS X Snow Leopard includes Figure 5.34
a backup utility called Time Machine that Windows 7 and it won’t reformat your Setting a restore point is
will automatically back up your files to computer; it’s just a means to get to the good practice before
a specified location. Apple also offers installing any hardware
recovery tools that are incorporated into or software.
backup hardware called Time Capsules, Windows. Sometimes your computer
which are wireless devices designed to >The Restore Point Wizard
comes with these repair discs, but often is found by clicking Start,
work with Time Machine and record your they do not. If you do not have a system All Programs, Acces-
backup data. Because Time Machine makes repair disc, you should create one before sories, System Tools. In
a complete image copy of your system, it problems arise. With Windows 7, it is easy the System Tools folder,
can also be used to recover your system in to create a system repair disc. Insert a click System Restore. The
the case of a fatal error. (For more System Restore wizard
blank disc into the DVD drive, click Start, appears, with Restore
information on backing up your files, see and type “System Repair” in the Search Point shown on the first
Chapter 9.) box. Then, click on Create a System Repair page of the Wizard.
If you encounter a non-recoverable Disc, make sure the appropriate drive is
error on a Windows machine that System showing, and click Create disc.
Restore cannot repair, you can recover
Windows from a system repair disc. A sys-
tem repair disc is designed to fix problems
with Windows 7. It will let you boot up
The Task Scheduler Utility
Windows, and then give you options for How can I remember to perform all
repairing your system. It won’t reinstall these maintenance procedures? To
keep your computer system in top shape,
it is important to run some of the utilities
described previously on a routine basis.
SOUND Hard Disk Anatomy Depending on your usage, you may want
BYTE Interactive to defrag your hard drive or clean out tem-
porary Internet files periodically. However,
In this Sound Byte, you’ll watch a series of animations many computer users forget to initiate these
that show various aspects of a hard drive, including tasks. Luckily, the Windows Task Scheduler
the anatomy of a hard drive, how a computer reads utility, shown in Figure 5.35, allows you to
and writes data to a hard drive, and the fragmenting schedule tasks to run automatically at pre-
and defragmenting of a hard drive. determined times, with no additional action
necessary on your part.

Utility Programs 239


Figure 5.35
To keep your machine
running in top shape,
use Task Scheduler to
schedule maintenance
programs to run
automatically at selected
times and days.
>Task Scheduler is found
by clicking Start, All
Programs, Accessories,
and then System Tools.

Accessibility Utilities provides a personalized recommendation


for settings that will help you use your
Are there utilities designed for users computer (see Figure 5.36). Some of these
with special needs? Microsoft Win- features are described below.
dows includes an Ease of Access Center,
which is a centralized location for assistive • High Contrast: Allows you to select a
technology and tools to adjust accessibility color scheme setting in which you can
settings. In the Ease of Access Center, you control the contrast between text and
can find tools to help you adjust the screen background. Because some visually
contrast, magnify the screen image, have impaired individuals find it easier to
screen contents read to you, and display an see white text on a dark background,
on-screen keyboard, as more fully explained there are color schemes that invert
in the following list. If you’re not sure where screen colors.
to start or what settings might help, a ques- • Magnifier: A utility that creates a sepa-
tionnaire asks you about routine tasks and rate window that displays a magnified
portion of the screen. This feature makes
the screen more readable for users who
have impaired vision.
• Narrator: A very basic speech program
SOUND Letting Your
that reads what is on screen, whether it’s
BYTE Computer Clean Up the contents of a window, menu options,
After Itself or text you have typed. The Narrator
In this Sound Byte, you’ll learn how to use the various coordinates with text utilities such as
maintenance utilities within the operating system. In Notepad and WordPad as well as with
addition, you’ll learn how to use Task Scheduler to Internet Explorer, but it may not work
clean up your hard drive automatically. You’ll also learn correctly with other programs. For this
the best times of the day to schedule these mainte- reason, Narrator is not meant for
nance tasks, and why they should be done on a routine individuals who must rely solely on a
basis to make your system more efficient. text-to-speech utility to operate the
computer.

240 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
• On-Screen Keyboard: Displays a BITS
keyboard on the screen. You type by AND Need a System Software Update?
clicking on or hovering over the keys BYTES
with a pointing device (mouse or
trackball) or joystick. This utility, which Bugs, or problems, in software occur all the time. Software developers are constantly
is similar to the Narrator, is not meant testing their products, even after releasing the software to the retail market, and as
for everyday use for individuals with users report errors they find. Windows Update is Microsoft’s service (utility) for updat-
severe disabilities. A separate program ing operating system software. Windows Update automatically notifies Windows
with more functionality is better in those users when updates are available for download. Mac users can update their system
circumstances. with Software Update, found under System Preferences.
• Windows Speech Recognition: An
effective tool that allows you to dictate
text and control your computer by
voice. The Speech Recognition utility is meet your needs. As long as you keep the
in the Ease of Access folder. operating system updated and regularly
Whether you use Windows, OS X, use the available utilities to fine-tune your
Linux, or another operating system, a fully system, you should experience little
featured operating system is available to trouble from your OS.

Magnifier window

On-screen keyboard

Figure 5.36
Microsoft Windows includes an Ease of Access Center to help users with disabilities. It has handy
accessibility features such as a magnifier and an on-screen keyboard.
>The Ease of Access Center is found by clicking Start, All Programs, Accessories, Ease of Access.

Utility Programs 241


five
five summary
chapter

1. What software is included in system user interface (GUI). Unlike the command-
software? and menu-driven interfaces used earlier,
System software is the set of software pro- GUIs display graphics and use the point-
and-click technology of the mouse and cur-
summary

grams that helps run the computer and


coordinates instructions between applica- sor, making the OS more user friendly.
tion software and hardware devices. It Common features of GUIs include windows,
consists of the operating system (OS) and menus, and icons.
utility programs. The OS controls how
your computer system functions. Utility 5. How does the operating system help
programs are programs that perform gen- manage resources such as the
eral housekeeping tasks for the computer,
processor, memory, storage,
such as system maintenance and file
hardware, and peripheral devices?
compression.
When the OS allows you to perform more
than one task at a time, it is multitasking. To
2. What are the different kinds of provide for seamless multitasking, the OS
operating systems? controls the timing of events the processor
Operating systems can be classified into four works on.
categories. Real-time operating systems As the OS coordinates the activities of the
(RTOSs) require no user intervention. They processor, it uses RAM as a temporary
are designed for systems with a specific pur- storage area for instructions and data the
pose and response time (such as robotic processor needs. The OS is therefore respon-
machinery). Smartphones have their own sible for coordinating the space allocations
specific operating systems, the latest of in RAM to ensure that there is enough space
which allow the user to multitask. Current for the waiting instructions and data. If
operating systems for desktops, notebooks, there isn’t sufficient space in RAM for all the
and netbooks have multitasking capabilities, data and instructions, then the OS allocates
as well as networking capabilities. the least necessary files to temporary storage
on the hard drive, called virtual memory.
The OS manages storage by providing a
3. What are the most common operating file-management system that keeps track
systems? of the names and locations of files and
Microsoft Windows is the most popular OS. programs. Programs called device drivers
It has evolved into a powerful multiuser facilitate communication between devices
operating system. The most recent release attached to the computer and the OS. Device
is Windows 7. Another popular OS is the drivers translate the specialized commands
Mac OS, which is designed to work on of devices to commands that the OS can un-
Apple computers. Apple’s most recent derstand and vice versa, enabling the OS to
release, Mac OS X Snow Leopard, is based communicate with every device in the com-
on the UNIX operating system. There are puter system. Device drivers for common
various versions of UNIX on the market, devices are included in the OS software,
although UNIX is most often used on net- whereas other devices come with a device
works. Linux is an open source OS based driver that you must install or download
on UNIX and designed primarily for use on off the Web.
personal computers, although it is often
found as the operating system on servers.
6. How does the operating system
interact with application software?
4. How does the operating system All software applications need to interact
provide a means for users to interact with the CPU. For programs to work with
with the computer? the CPU, they must contain code that the
The operating system provides a user inter- CPU recognizes. Rather than having the
face that enables users to interact with the same blocks of code appear in each applica-
computer. Most OSs today use a graphical tion, the OS includes the blocks of code to

242 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
summary five five

chapter
which software applications refer. These 9. How does the operating system help
blocks of code are called application program- me keep my computer organized?
ming interfaces (APIs). The OS allows you to organize the contents

summary
of your computer in a hierarchical structure
7. How does the operating system help of directories that includes files, folders,
libraries, and drives. Windows Explorer
the computer start up?
helps you manage your files and folders by
When you start your computer, it runs showing the location and contents of every
through a special process called the boot drive, folder, and file on your computer.
process. The boot process consists of four Creating folders is the key to organizing
basic steps: (1) The basic input/output sys- files because folders keep related documents
tem (BIOS) is activated when the user pow- together. Following naming conventions
ers on the CPU. (2) In the POST check, the and using proper file extensions are also
BIOS verifies that all attached devices are in important aspects of file management.
place. (3) The operating system is loaded
into RAM. (4) Configuration and customiza-
tion settings are checked. 10. What utility programs are included
in system software, and what do
8. What are the main desktop and they do?
windows features? Some utility programs are incorporated
into the OS; others are sold as stand-alone
The desktop provides your first interaction
off-the-shelf programs. Common Windows
with the OS and is the first image you see on
utilities include those that enable you to
your monitor once the system has booted
adjust your display, add or remove pro-
up. It provides you with access to your com-
grams, compress files, defragment your
puter’s files, folders, and commonly used
hard drive, clean unnecessary files off
tools and applications. Windows are the rec-
your system, check for lost files and errors,
tangular panes on your screen that display
restore your system to an earlier setting,
applications running on your system. Com-
back up your files, schedule automatic
mon features of windows include toolbars,
tasks, and check on programs that have
scrollbars, and minimize, maximize and
stopped running.
restore, and close buttons.

243
five
five key terms
chapter

application programming interface (API) ...... 220 operating system (OS)........................................ 208
application software ........................................... 208 paging.................................................................... 219
authentication ...................................................... 223 path separator ...................................................... 232
key terms

Backup and Restore utility................................ 239 platform ................................................................ 212


basic input/output system (BIOS) ................... 222 Plug and Play (PnP) ............................................ 219
boot process.......................................................... 221 power-on self-test (POST) ................................. 222
command-driven interface ................................ 215 preemptive multitasking ................................... 217
desktop.................................................................. 224 real-time operating system
device driver......................................................... 219 (RTOS) ............................................................... 209
Device Manager................................................... 224 Recycle Bin ........................................................... 232
directory ................................................................ 227 registry .................................................................. 223
Disk Cleanup ....................................................... 235 ribbon .................................................................... 226
Disk Defragmenter ............................................. 236 root directory........................................................ 228
Error-checking ..................................................... 236 Safe mode ............................................................. 223
event ...................................................................... 216 scrollbar ................................................................ 226
extension (file type) ............................................ 230 sector...................................................................... 238
file .......................................................................... 227 server ..................................................................... 210
file allocation table (FAT) .................................. 236 smartphone........................................................... 211
file compression utility...................................... 234 source code ........................................................... 213
file management.................................................. 227 spooler ................................................................... 218
file name ............................................................... 230 swap file (page file) ............................................ 219
file path ................................................................. 231 system files........................................................... 222
firmware................................................................ 211 System Restore .................................................... 237
folder ..................................................................... 227 system restore point............................................ 237
gadget .................................................................... 225 system software ................................................... 208
graphical user interface (GUI) .......................... 215 taskbar ................................................................... 225
icon......................................................................... 208 Task Manager utility .......................................... 237
interrupt ................................................................ 217 Task Scheduler utility ........................................ 239
interrupt handler................................................. 217 thrashing ............................................................... 219
kernel (supervisor program) ............................. 222 toolbar ................................................................... 226
Last Known Good Configuration .................... 224 track ....................................................................... 238
library .................................................................... 227 UNIX...................................................................... 210
Linux...................................................................... 212 user interface........................................................ 214
Mac OS .................................................................. 212 utility program..................................................... 208
mainframe ............................................................ 210 virtual memory .................................................... 219
menu ...................................................................... 225 widget.................................................................... 225
menu-driven interface........................................ 215 window ................................................................. 225
Microsoft Disk Operating System Windows ............................................................... 211
(MS-DOS) ......................................................... 208 Windows 7 ............................................................ 211
multitask ............................................................... 208 Windows Explorer............................................... 228
multiuser operating system
(network operating system)........................... 210

244 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
buzzwords five five

chapter
Word Bank
• Disk Defragmenter • Linux • Task Scheduler
• Error-checking • Mac OS • tracks

buzzwords
• file compression • platform • utility programs
• file management • system files • Windows
• files • system software • Windows Explorer
• folders • Task Manager • Windows 7

Instructions: Fill in the blanks using the words from the Word Bank above.

Veena was looking into buying a new computer and was trying to decide what
(1) __________ to buy—a PC or a Mac. She had used PCs all her life, so she was more
familiar with the (2) __________ operating system. Still, she liked the way the
(3) __________ looked and was considering switching. Her brother didn’t like either
operating system, so he used (4) __________, a free operating system instead.

After a little research, Veena decided to buy a PC. With it, she got the most recent version
of Windows, (5) __________. She vowed that with this computer, she’d practice better
(6) __________ because she often had a hard time finding files on her old computer. To
view all of the folders on her computer, she opened (7) __________. She made sure that
she gave descriptive names to her (8) __________ and placed them in organized
(9) __________ and libraries.

Veena also decided that with her new computer, she’d pay more attention to the
(10) __________, those little special-function programs that help with maintenance and
repairs. These special-function programs, in addition to the OS, make up the (11) __________.
Veena looked into some of the more frequently used utilities. She thought it would be a
good idea to run the (12) __________ on her hard drive regularly so that all the files lined
up in sequentially ordered (13) __________ and so that it was more efficient. She also
looked into (14) __________ utilities, which would help her reduce the size of her files
when she sent them to others over the Internet. Finally, she decided to use the Windows
(15) __________ utility to schedule tasks automatically so that she wouldn’t forget.

becoming computer
literate
computer literate
Using key terms from the chapter, write a letter to your 14-year-old cousin who just
becoming
received her first computer, explaining the benefits of simple computer maintenance. First,
explain any symptoms her computer may be experiencing (such as a sluggish Internet
connection); then include a set of steps she can follow in setting up a regimen to remedy
each problem. Make sure you explain some of the system utilities described in this chapter,
including but not limited to Disk Defragmenter, Disk Cleanup, and Task Scheduler. Instruct
your cousin on how to create a system repair disc and how to back up her files. Include any
other utilities she might need, and explain why she should have them.

245
five
five self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which is not an example of a smart- 6. The term that defines excessive


phone operating system? swapping of files between RAM and
a. Symbian c. Snow Leopard virtual memory is:
b. Android d. webOS a. thrashing.
2. Which OS does not have a user b. multitasking.
interface that incorporates point-and- c. caching.
click technology? d. paging.
a. Windows 7 c. Linux 7. Which term describes the pictures
b. MS-DOS d. Mac OSX that represent an object such as a
3. Which is the correct order of the boot software application or a folder?
process? a. Icon c. Taskbar
a. Check settings, load BOS into b. Gadget d. Widget
RAM, activate BIOS, conduct POST 8. Which statement about using APIs is
b. Load OS into RAM, check not true?
settings, conduct POST, activate a. APIs prevent redundancies in
BIOS software code.
c. Activate BIOS, conduct POST, b. APIs make it easier for developers
load OS into RAM, check settings to respond to OS changes.
d. Conduct POST, load OS into RAM, c. APIs allow application software
activate BIOS, check settings to interact with the OS.
4. You can determine the location of a d. APIs make it possible to close
file by its non-responding software and
a. name. c. extension. restart the computer.
b. path. d. type. 9. Which utility eliminates the
5. Which is not a function of the inefficiencies of the computer hard
operating system? drive?
a. Providing a means for the user to a. System Restore
interact with the computer b. Disk Defragmenter
b. Enabling the processor to handle c. File Compression
multiple operations, seemingly at d. Disk Cleanup
the same time 10. Which utility is not a system tools
c. Carefully shutting the system utility?
down when RAM limits have a. System Restore
been reached b. Disk Defragmenter
d. Facilitating installation of c. Windows Explorer
peripheral devices with the d. File Compression
inclusion of drivers

True–False
_____ 1. Only personal computers need some form of operating system software.
_____ 2. Symbian OS is a common OS for netbooks.
_____ 3. The type of processor helps to determine which OS a computer uses.
_____ 4. Paging is the process of optimizing RAM storage by borrowing hard drive space.
_____ 5. Windows 7 includes a compatibility feature that allows you to run software that is
not compatible with Windows 7.

246 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
making the
five five

chapter
transition to...
next semester
1. Organizing Your Files

transition to...
Despite all the good advice, you have not taken the time to organize your files on your
computer. Now you have to plow through all your files to find anything, taking up
valuable time. Use the Snipping Tool to show your current organization. Then, using

next semester
making the
the Hierarchy style of a SmartArt graphic, develop a plan that outlines how you’ll set
up libraries, folders, and subfolders for your files.
2. Deciding On a New Computer
Your parents are getting you a new computer. Decide whether you want a desktop,
notebook, or netbook and then describe how the choice may impact the operating
system you get.
a. Research the advantages of Windows, Mac, and Linux operating systems. Which
best fits your needs and why?
b. Research whether you can use multiple operating systems on a single machine.
Why might this be an important feature for you to consider?
c. Research how your smartphone and PMP would sync with the operating system.
d. Explain which system would be most useful to you.

3. Creating a Backup Plan


Your computer just shut down unexpectedly but, fortunately, you were able to get it
back up and running without any loss of data. However, this was too close of a call, so
you decide to back up your precious files once and for all. Research the specific steps
you will need to take to initially create a backup and then maintain a current backup as
your files change. Include in your research what stand-alone programs or operating
system tools you will need to use, as well as any hardware devices or accessories you’ll
require. Then research the process of creating a disk image. What’s the difference
between creating a system backup and a disk image?
4. Upgrading Your OS
You have been hearing great things about the newest release of the Windows operating
system, Windows 7. Your notebook is running Windows XP, and you’d like to upgrade
to Windows 7. Write a brief description of the requirements your notebook must meet
in order to successfully run Windows 7. Does the amount of RAM your system has
make a difference? Should you upgrade or purchase a full version of Windows 7? What
steps will you need to take to install the new operating system onto your computer?
5. Smartphone OS
Your cell phone contract is up in a few weeks, and it’s time to upgrade to a smart-
phone. Which smartphone would you buy, and why? What kind of OS does it have?
What are the benefits and disadvantages of this OS compared to that of other
smartphones? Is the smartphone OS compatible with the OS on your computer?

247
five
five making the
chapter

transition to...
the workplace the workplace
making the

1. Time to Upgrade?
The small company you work for has been using Windows XP since it came out. The IT
transition to...

department decided not to upgrade to Vista, and because Windows XP is still working
well, they are not contemplating an upgrade to Windows 7. However, you have been
hearing lots of good things about Windows 7 and think it would be a good idea to
upgrade. Write a letter to the head of the IT department informing him or her of the
new features of Windows 7 and why they would be beneficial to have. Also, list the
things the IT department should consider before upgrading.
2. Top 5 Utility Programs
Create a list of the top five utilities every computer should have. For each utility, list
one that can be downloaded for free and one that can be purchased. Then, for each
recommendation, include a review of the utility that has been written in the past
6 months—make sure you document your sources. For each utility note whether
you would choose the free utility or the one you have to purchase, and include the
reasons why.
3. Accessibility Features
Windows offers a lot of great accessibility tools for those needing extra assistance.
The vice president for human resources at the company you work for has asked you
to research some stand-alone accessibility programs to determine what else, if
anything, is available. List software that is available to help those who have special
computing needs.
4. Working with More Than One OS
The company you work for, which uses all Windows computers, has just acquired two
other smaller companies, one that uses Macs and the other that uses Linux. Your boss,
the CIO of the company, needs to decide what to do with all the various computer
systems. You have been asked to provide information to your boss so that he can make
an informed decision.
a. What are the advantages and disadvantages of letting the acquired companies
continue using their current systems?
b. What are the advantages and disadvantages of converting all systems to one
common system?
As you research, consider factors such as technical support, training for a new system,
compatibility of files and calendars among all employees in the company, cost of new
hardware, stability of operating systems, needed frequency of upgrades, and software
compatibility.

248 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
critical thinking
five five

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Market Dominance
Microsoft and Apple are large corporations and have control of most of the operating
system markets. While there has been some innovative changes to each of their propri-
etary operating systems, does their size and market dominance prevent more innova-
tion? Why or why not? Linux, as an open source environment, is poised for greater
innovation. Why do you think the Linux operating system doesn’t have a greater
market share?

2. A Web-Based OS
Operating system interfaces have evolved from a text-based console format to the
current graphical user interface. Many believe the OS of the future will be on the cloud
(the Internet) and Web-based. Discuss the implications of this type of operating system.
What would be the advantages and disadvantages of a Web-based operating system?

3. Which Smartphone OS Would You Choose?


In the smartphone market, there are several operating systems such as Android, which
runs on Google’s Nexus One and the Motorola Droid; Apple OS, which runs on the
Apple iPhone; Research in Motion’s Blackberry OS, which runs on Blackberry phones;
and webOS, which runs on the Palm Pre. When selecting a smartphone, explain which
is more important in your decision-making process—the phone or the operating
system?

4. Your Own Gadget?


There are plenty of interesting Windows gadgets available on the Web—some for fun,
some to aid in productivity, some with specific utilitarian roles. Design or describe
what the best gadget for you would be. What features must it have? Why would you
need it?

249
five
five team time
chapter

Choosing the Best OS

Problem
team time

You are the owner of a technology consulting firm. Your current assignments include
advising several start-up clients on their technology requirements. The companies include
a fashion design company, a small financial planning company, and an IT networking firm.
The companies are holding off on buying anything until they hear from you as to the
platform on which their computers should run. Obviously, one of the critical decisions
for each company is the choice of operating system.

Task
Recommend the appropriate operating system for each company.

Process

1. Break up into teams that represent the three primary operating systems: Windows,
Mac, or Linux. (Additional teams could be assigned to consider smartphone operating
systems).
2. As a team, research the pros and cons of your operating system. What features does it
have that would benefit each company? What features does it not have that each com-
pany would need? Why (or why not) would your operating system be the appropriate
choice for each company? Why is your OS better (or worse) than either of the other
options?
3. Develop a presentation that states your position with regard to your operating
system. Your presentation should have a recommendation and include facts to
back it up.
4. As a class, decide which operating system would be the best choice for each
company.

Conclusion
Because the operating system is the most critical piece of software in the computer
system, the selection should not be taken lightly. The OS that is best for a fashion design
agency may not be best for a financial planning firm. An IT networking firm may have
different needs altogether. It is important to make sure you consider all aspects of the
work environment and the type of work that is being done to ensure a good fit.

250 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
ethics
five five

chapter
project

project
ethics
Ethics Project
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an
ethical solution.

Topic: Software Piracy


Software publishers spend millions of dollars developing new products. Illegal copies of
software, including operating system software, rob the developers and their shareholders
of their rightful profits. In addition, some say that pervasive software piracy, especially in
China, could potentially threaten job loss for U.S. software companies. However, some
people believe that when they buy the software, they have the right to distribute their copy
as they like, thus violating the software license agreement they accepted when installing
the software.

Research Areas to Consider


• Software piracy
• Software licensing agreements
• CD piracy
• China antipiracy

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which an individual has been
accused of software piracy.
2. Team members should write a summary that provides background information for
their character—for example, representative of a software developer, public consumer
of the software, or arbitrator—and detail their character’s behaviors to set the stage for
the role-playing event. Then team members should create an outline to use during the
role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the collaboration feature of MyITLab, the discussion board feature of Blackboard,
or meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

251
TECHNOLOGY IN FOCUS

Computing Alternatives
In this Technology in Focus feature, we explore software
and hardware alternatives to working with a PC loaded up
with Microsoft products. The world of computing is much
broader than that, and many of the options we discuss are
less expensive and more flexible. Let’s get started by
looking at alternatives to Microsoft Office products.

252
Application Software common tools needed to communicate using
graphics and diagrams, and Math creates
Alternatives equations and formulas for your documents.
You won’t lose any compatibility with
Corporations such as Microsoft and Apple other software by using OpenOffice; it is
develop proprietary (or commercial) soft- compatible with most programs. This means
ware to be sold for a profit. Opponents of that if your friend uses Microsoft Office and
proprietary software contend that software you send her an OpenOffice file, she can still
should be developed without the profit mo- read it, and you can read all of her Microsoft
tive and that the source code (the actual lines Office files, too. OpenOffice 3 is able to open
of instructional code that make the program Microsoft Office 2007 or 2010 files without the
work) should be made available so that need for a conversion program. Although the
others may modify or improve the software. individual applications in OpenOffice are not
Open source software is freely distributed as fully featured as those in Microsoft Office,
(no royalties accrue to the creators), contains and do not have the ribbon interface found in
the source code, and can in turn be distrib- the newest versions of the Office applica-
uted to others. Therefore, you can download tions, OpenOffice is still a powerful produc-
open source software for free from various tivity software suite, and the price is right.
Web sites, install it on as many computers as One of the biggest advantages of an open
you wish, make changes to the source code if source package like OpenOffice is that an in-
you know how to do this, and redistribute it credible number of people continue to de-
to anyone you wish (as long as you don’t velop for it all the time. This means you have
charge for distributing it). In this section, we a huge library of extensions to select from.
look at some open source software that you These small programs install themselves into
can download and use on your computer. OpenOffice and give you additional func-
For a list of open source resources available tions. For example, one extension allows you
on the Web, visit sourceforge.net. to import and edit PDF files; another allows
Draw to easily create barcodes. The library of
PRODUCTIVITY SOFTWARE extensions includes many hundreds of items
with more being added all the time.
ALTERNATIVES: OPENOFFICE.ORG When you launch OpenOffice (see
As mentioned in Chapter 4, the Figure 1), you can choose a file type from the
OpenOffice.org suite (which we’ll refer to list displayed. Once you select the appropriate
as OpenOffice) is a free suite of productivity file type (such as spreadsheet, presentation,
software programs that provides functional-
ity similar to that of Microsoft Office.
Versions of OpenOffice are available for a
variety of operating systems, including
Windows, Linux, and Mac. Support is
offered in more than 100 languages besides
English, with more being added all the time
by the development community. You can
download the installation file you’ll need to
run OpenOffice at openoffice.org. The mini-
mum system requirements for installing
OpenOffice 3 in a Windows environment are
less than those required for Microsoft Office.
The main components of OpenOffice are
word processing (Writer), spreadsheet
(Calc), presentation (Impress), and database
(Base) programs. These provide functional-
ity similar to that of the Word, Excel,
PowerPoint, and Access applications you FIGURE 1
might be familiar with in Microsoft Office. Starting OpenOffice.org displays a list of file types from which you
The OpenOffice 3 suite also includes addi- can choose to begin working on your project.
tional programs. Draw provides the most

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 253


or text) and click Open, the appropriate appli- documents. Writer’s wizards provide you
cation and a new, blank document will open with several templates you can use to create
so that you can begin working. standard documents such as faxes, agendas,
and letters. Special tools in Writer also allow
Writer you to create bibliographic references,
Writer, the OpenOffice word processing indexes, and tables of contents.
application, is extremely similar in look and When saving a document in Writer, the
feel to Microsoft Word 2003 (see Figure 2). default file format has an .odt extension. By
As is the case in Word, you can easily using the Save As command, you can save
change text appearance in Writer by altering files in other formats, such as various versions
font type, style, alignment, and color. You of Word (.doc and .docx), Pocket Word (.psw)
can also easily insert graphics (pictures or for mobile devices, Rich Text Format (.rtf),
Click to save
as PDF clip art), tables, and hyperlinks into Text (.txt), and HTML Document (.htm). The
handy Export Directly as PDF icon in Writer
allows you to save documents as PDF files.

Calc
Once you open a Calc spreadsheet, you
enter text, numbers, and formulas into the
Formatting
tasks and icons appropriate cells, just as you would in
similar to Word Microsoft Excel. You also can apply a full
range of formatting options (font size, color,
style, and so on) to the cells, making it easy
to create files such as the monthly budget
spreadsheet shown in Figure 3. Built-in
formulas and functions simplify the job of
creating spreadsheets, and Calc’s Function
Wizard guides you through the wide range
of available functions, providing sugges-
tions as to which function to use.
When saving a document in Calc, the
default file format has an .ods extension.
FIGURE 2 You can also save files in other formats, such
Writer provides similar functionality and icons to Microsoft Word. as Excel (.xls and .xlsx) and Pocket Excel
(.pxl) for use on mobile devices. The Export
Directly as PDF icon is also available in Calc.

Impress
When you select Presentation from the
OpenOffice start-up interface, a wizard is
displayed that offers you the option of
creating a blank Impress presentation or
building one from supplied templates. The
number of templates shipped with Impress
is smaller than those supplied with
Microsoft PowerPoint. If you are interested
in more templates, be sure to install some of
the extensions available. In addition, you
can also search Google using the keywords
Insert Object toolbar
for creating charts
“OpenOffice.org Impress Templates.” You’ll
find a wide variety of templates for Impress
that others have created and that you can
download free of charge. During the
FIGURE 3 OpenOffice installation you have the option
of installing the Google search bar (Web or
Calc offers many of the same features as Microsoft Excel.
Desktop), making it easy to access while you

254 TECHNOLOGY IN ACTION


Web-Based Alternatives
Open source alternatives to Microsoft Office applications are attractive
e e
fr
because they are free, and they are also convenient because of their
availability. Like most other applications, though, you use these pro-
grams on the computer where you installed them. For the ultimate in
accessibility and transferability, consider using Web-based Office soft-
ware alternatives. You can be productive almost anywhere because you
access these programs from the Internet without having to install the software on your
computer. So if you are at friend’s house, you can still get to your files and use the pro-
gram. Moreover, with Web-based applications you can collaborate on a document online
with others, thus avoiding the coordination mess that generally occurs when transferring
documents among colleagues or classmates via e-mail. As mentioned in Chapter 4, Google
Docs includes Web-based word processing, spreadsheet, and presentation applications.
These applications, while useful for sharing and creating basic documents, lack many of
the more robust features that Microsoft Office and other proprietary programs have.
Zoho (zoho.com) is another great Web-based productivity suite that features project
management software, customer relationship management software, and other business
solutions in addition to the traditional productivity applications. ThinkFree Office Live
(thinkfree.com) is an online productivity suite comprising word processing (ThinkFree
Write), spreadsheets (ThinkFree Calc), and presentations (ThinkFree Show). ThinkFree also
offers ThinkFree Office for desktops and ThinkFree Mobile for smartphones and other
mobile devices. Many of the features are available to you without registering and creating
an account, and Web services are supported in English and many Asian languages. Like
Google and Zoho, ThinkFree applications are fully compatible with Microsoft Office—
including the latest formats—and run on Mac, Windows, and Linux platforms.

are working in any of the OpenOffice components you should download and
applications. install with MySQL are the Database Server
and the Query Browser (see Figure 4). You
Base use the Database Server to
If you want to create or just manipulate data- create tables for your data-
bases, Base enables you to create and modify base and enter your data. Build queries with
tables, forms, queries, and reports by using The Query Browser SQL syntax
wizards, design views, and SQL views. Base
is similar to Microsoft Access and SQL
Server, and it works seamlessly with files
created in most database applications,
although you will need a separate converter
to work with Microsoft Access 2007.
List of database
tables
DATABASE SOFTWARE
ALTERNATIVES: MYSQL
While Base, the OpenOffice database pro-
gram described above, is perfectly func-
Query results
tional, if you’re interested in getting your
hands on a free high-end SQL database ap-
plication, the most popular open source op-
tion is MySQL (mysql.com). Sporting many
of the features contained in SQL Server and
Oracle Database 11g, MySQL is a powerful FIGURE 4
database program you can use to develop
MySQL is a free open source database alternative to Microsoft Access.
serious database applications. The two main

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 255


provides a visual interface for the database previously, OpenOffice includes a program
to display the results of queries you create. called Draw that allows you to create simple
Although it is more difficult to learn and graphs, charts, and diagrams. Another
use than Microsoft Access, many books and option is Dia, a free program that allows you
online tutorials are available to help you get to create Visio-like diagrams and charts (see
MySQL up and running. Figure 5). You can download a Windows-
compatible version of Dia from live.gnome.
org/Dia. The Web site also offers a tutorial to
E-MAIL CLIENT ALTERNATIVE: get you up and running.
THUNDERBIRD Google offers yet another charting option.
SketchUp (sketchup.google.com) is a full-
If you are exploring other choices for
featured 3D modeling software application.
Microsoft Office productivity applications,
SketchUp comes in two versions. SketchUp7
don’t overlook other e-mail clients as
is a free program that you can use to create,
alternatives to Microsoft Outlook. Mozilla
modify, and share 3D models. SketchUp Pro
Thunderbird is an open source e-mail client
7 is more fully featured and is available for
that has many enhancements that allow you
about $500.
to organize e-mail with tagging, folders,
search, and saved search features. The latest
version, Mozilla Thunderbird 3, has new WEB PAGE AUTHORING
features like timeline and filtering tools to SOFTWARE ALTERNATIVES:
help find the exact e-mail quickly. Plenty of SEAMONKEY
add-ons, including a blog editor, calendar,
calculator, and multimedia tools, are Although Microsoft Word and OpenOffice
available from the Mozilla Web site Writer can save documents as HTML files,
(mozilla.org). Thunderbird can run on sometimes you need a more versatile tool
Windows, Mac, and Linux platforms. for creating Web pages, especially for larger
sites with many linked pages. Adobe
Dreamweaver is a popular commercial
DRAWING SOFTWARE package for building Web sites, and Expres-
ALTERNATIVES: DRAW AND DIA sion Web is a Web authoring application that
is complementary to the Microsoft Office
Microsoft Visio is a popular program for 2010 suite. Both of those solutions are pro-
creating flowcharts and diagrams. However, prietary applications that you must pur-
Visio is not inexpensive. As mentioned chase. If you are looking for an open source
alternative, SeaMonkey Composer, part of
the SeaMonkey all-in-one Internet applica-
tion suite (seamonkey-project.org), is a free,
open source WYSIWYG (“what you see is
what you get”) Web authoring application
that is compatible with the Windows, Mac,
and Linux platforms. SeaMonkey Composer
Total Pay = $7.50 * (see Figure 6) supports cascading style
8 + $11.25 * sheets, positioned layers, and dynamic
(Number of Hours image and table resizing. The SeaMonkey
Worked - 8)
suite also includes a Web browser, e-mail
and newsgroup client, and IRC chat.

Total Pay = $7.50 * IMAGE EDITING SOFTWARE


(Number of Hours
Worked) ALTERNATIVES: GIMP
Do you need to create or edit some digital art
but can’t afford a high-end package such as
FIGURE 5
Adobe Photoshop, or even a consumer pack-
age such as Adobe Photoshop Elements?
With Dia, you can create simple flowcharts, which a computer programmer might Download a free copy of GIMP (short for
use in developing algorithms.
GNU Image Manipulation Program) at

256 TECHNOLOGY IN ACTION


gimp.org and you’ll find a set of tools almost
as powerful as Photoshop. GIMP is available
for systems running Windows, Mac, Linux,
and UNIX. Many good tutorials, available at
gimp.org/tutorials, can turn you into an
accomplished user in no time.
Here are some handy things you can do
with GIMP in five minutes or less:
• Crop or change the size of an image Navigation Links
(see Figure 7). Heading 1
• Reduce the file size of an image by
decreasing its quality.
• Fix perspective distortion.
GIMP also enables you to use advanced Paragraph
techniques such as applying image filters,
creating textures and gradients, drawing
digital art, creating animated images
through layer manipulation, and changing
a photo into a painting or sketch. Image

Operating System
Alternatives FIGURE 6

SeaMonkey Composer is an open source Web page authoring program that


Installing open source application software contains many features similar to those of leading commercial packages and is
such as OpenOffice on a Windows machine is available at no cost.
simple. Changing your OS from Windows to
an open source OS such as Linux is a bit more additional level of protection for users of
complex. Why would you want to install public computers. As explained in Chapter 9,
Linux if you already are running Windows? using an open source OS that’s
Because Windows is the most widely installed on a portable flash
used OS, with more than 90 percent of the drive helps reduce your risk of
Change pixel height
market share, it’s a prime target for viruses and width
and other annoyances. From a virus creator
or hacker’s perspective, nuisances that
spread via Windows have the greatest
chance of causing the most aggravation. A
lot of spyware, computer viruses, and other
hacker nuisances are designed to take ad-
vantage of security flaws in Windows. An
open source OS alternative, such as Linux,
that is not as widely used as Windows is less
of a target for these annoyances.
Another reason to install an open source
OS is portability. Depending on which ver-
sion of Linux you use, you may be able to
Select Scale
take it with you on a flash drive and use it on to resize
almost any computer. This portability feature
appeals to people who use many different
computers (such as lab computers at school).
Instead of getting used to a new configura-
tion every time you’re away from your home
computer, wouldn’t it be nice to have the FIGURE 7
same environment you’re used to every-
GIMP is a freely available software application for image editing.
where you go? Such portability also offers an

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 257


Open Source Photography
The Open Source Photography group is dedicated to keeping you informed on all of the
open source tools that make life easier for photographers. They maintain a wiki page at
wiki.osphoto.org with tutorials, reviews, and how-to hints for using open source software
in your photography projects. There are open source options all along the photography
workflow—from image acquisition to processing and editing, printing and displaying,
and archiving and organizing.
At the Open Source Photography wiki site, you’ll see in-
formation on products like F-spot, a personal photo manage-
ment system to help you share and organize your photos.
Inkscape, which is also featured here, is a vector graphics ed-
itor like Adobe Illustrator. Pandora manuals and tutorials are
here as well. Pandora is a plug-in for GIMP that allows you
to create panoramic photos from a series of individual shots.
The OSP wiki site is a one-stop shop for all things photo-
graphic in the open source community.

picking up viruses and malware from public code that provides Linux’s basic functional-
computers. In addition, it enhances privacy, ity) and special modifications to the OS, and
because temporary Internet files are stored may also include additional open source
on the portable device on which the OS is software (such as OpenOffice). Which distro
installed, rather than on the hard drive of the is right for you?
public computer you are using. Lastly, many A good place to start researching distros
users of netbooks, the lightest, smallest is distrowatch.com. This site tracks Linux
category of notebook computers, have opted distros and provides helpful tips for begin-
to install Linux because it takes up less space ners on choosing one. Figure 8 lists some
on the hard drive and runs faster than the popular Linux distros and their home pages.
proprietary software that was installed Before you can decide which distro is
originally by the manufacturer. In the next right for you, there are a few things to con-
section, we explore the different varieties of sider. The overall requirements to run Linux
Linux and explain how to install them. are relatively modest:
• A 1.2 GHz processor
WHICH LINUX TO USE
• 256 MB RAM (light on graphics edition)
Linux is available for download in various up to 1 GB RAM (standard desktop
packages known as distributions, or edition)
distros. Think of distros as being like • 8 GB of hard drive space
different makes and models of cars. Distros
• VGA graphics card capable of 640 ⫻ 480
include the underlying Linux kernel (the
resolution
Just like any other software program,
FIGURE 8 Linux Distributions
however, Linux performs better with a faster
processor and more memory. Depending on
Distro Home Page how much additional software is deployed
in the distro you choose to use, your system
Debian GNU/Linux debian.org
requirements may be higher, and you may
Fedora Core (Red Hat) fedoraproject.org need more hard drive space. Check the
Gentoo Linux gentoo.org specific recommendations for the distro
you’re considering on that distro’s Web site.
Mandriva Linux mandriva.com
PCLinuxOS pclinuxos.com EXPERIMENTING WITH LINUX
Slackware Linux slackware.com
Some Linux distros (such as Ubuntu and
Ubuntu ubuntu.com PCLinuxOS) are designed to run from a

258 TECHNOLOGY IN ACTION


CD/DVD or flash drive. This eliminates the
need to install files on the computer’s hard
drive. Therefore, you can boot up from a
flash drive on an existing Windows PC and
run Linux without disturbing the existing
Windows installation.
Booting your existing computer from a
CD/DVD or flash drive-based version of
Linux is a low-risk way to experiment with
Linux and see how well you like it. Ubuntu, for
example, uses an extremely familiar-looking,
Windows-like desktop. When you access
Ubuntu, you get the Firefox browser as well as
GIMP, OpenOffice, and many other software
packages, including utilities and games.
Figure 9 shows Ubuntu in action. The
computer boots from the Ubuntu disc when
FIGURE 9
it detects it in the optical disc drive. As part
of the installation sequence, Ubuntu auto- The Ubuntu user interface resembles the Windows desktop.
matically detects components of the com-
puter (such as the network card) and
configures Linux to recognize them. You will In addition to all this, Mandriva includes
have no trouble browsing the Internet be- security features. The OS divides security
cause Firefox, a Web browser, is included levels into five rankings that range from
with the Ubuntu distro. You can also save “Poor” to “Paranoid.” Your choice depends
any files you create with the included on how you’re using the system. (Select
OpenOffice suite to a flash drive. “Paranoid” if you’re running business trans-
Mandriva Linux offers several versions of actions through your computer.) You also
its OS. Mandriva Linux 2010 is the com- can set up a simple-to-configure firewall
pany’s most recent and most basic product. called Shorewall to prevent unauthorized
It is free, remains true to the original open Internet users from accessing your personal
source principles, and is installable. Alterna- network.
tively, you can try Mandriva in the “live” If you don’t like Mandriva Linux or
mode, which doesn’t require installation. Ubuntu, head out to distrowatch.com and
Other versions with more features are avail- find another free Linux distro to install. With
able for a fee, including PowerPack 2010 , hundreds of distros available, you’re sure to
which offers a more complete package that find one that fits your needs.
includes added multimedia and gaming soft-
ware. In addition, for a small fee, you can get
Mandriva Flash. Flash is Mandriva’s portable
Hardware
OS option, and is installed on a convenient Alternatives
8 GB flash drive. This portable version does
not make changes on the host computer, so Tired of your Windows-based PC? Is your
you can bring your computer environment old computer too slow for your current needs
anywhere you go. Mandriva Flash takes up and not worth upgrading? If so, you may be
one-quarter of the flash drive, leaving the re- in the market for some new hardware. Before
maining 6 GB free so you can conveniently you head off to the Best Buy for yet another
store and take with you all your office work Windows-based computer, why not consider
and Internet and multimedia files. two alternatives: (1) moving to an Apple plat-
When you install the Mandriva OS, you form or (2) building your own computer.
also get other open source applications, such
as OpenOffice, the Firefox browser, and the APPLE COMPUTERS
KMail e-mail manager, as well as several
multimedia programs including applica- The best way to decide whether a Mac is
tions for managing photo albums and digi- right for you is to get your hands on one and
tal music collections. take it for a test drive. Chances are that

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 259


desktop units sporting fast Intel Core 2
Duo processors with even a quad-core
a b choice, the Intel Core i5.
Some people are switching to
Macs because they love their iPods
so much. Many Apple fans think Macs
are more user-friendly and stylish than their
PC competitors. Professionals such as digital
artists and graphic designers who create or
edit computer images change to Macs
because the applications these users rely
on deliver superior features on the Apple
platform.
c
FIGURE 10 Mac OS X Snow Leopard
(a) The MacBook Air. (b) The MacBook. Many Mac users have switched from
(c) The iMac. Windows because of the operating system,
Mac OS X. The latest version, Snow
Leopard, has many slick and innovative
someone you know has a Mac. Alternatively,
features that are tempting to even the most
your school might have a Mac lab or have
loyal Windows users. If you’ve been using
Macs in the library. If not, then Apple has
Windows for a while, you shouldn’t have
retail stores chock full of employees who
any problem making the transition to Snow
are very happy to let you test out the equip-
Leopard. You’ll notice immediately that the
ment. You also can test Macs at Best Buy.
Mac OS uses the same desktop metaphors as
Be sure to check out the full lineup of Macs
Windows, including icons for folders and a
(see Figure 10). The MacBook Air is Apple’s
Trash Can (similar to a Recycle Bin) to delete
thinnest notebook. It weighs three pounds,
documents. It also includes a window-based
and includes a 13-inch screen and a full-
interface like the one you’re already accus-
sized keyboard. The MacBook weighs in at
tomed to using in Windows.
under five pounds and features the Intel
Like earlier versions of Mac OS, Snow
Core 2 Duo processor and a 13-inch screen.
Leopard is based on the UNIX OS, which is
The iMac line features sleek, space-saving
exceptionally stable and reliable. Aside from
stability, security and safety are great rea-
sons to switch to the Mac OS because it does
not seem as vulnerable as Windows is to the
exploitation of security flaws by hackers.
This doesn’t necessarily mean that the Mac
OS is better constructed than Windows; it
could just be that because Windows has a
lead in market share, it is a more attractive
target for hackers. Regardless of the reason,
you’re probably somewhat less likely to be
inconvenienced by viruses, hacking, and
spyware if you’re running Mac OS. Of
course, you won’t have any better protection
from spam, phishing, or other Internet
scams than you would with Internet Ex-
plorer, so you still need to stay alert. Snow
Leopard offers a 3D desktop environment as
well as an automated backup utility called
FIGURE 11 Time Machine (see Figure 11).
When you boot up a Mac, a program
Time Machine, an automated backup and restore utility, is one of the features in
Mac OS X. called the Finder automatically starts. This
program is like Windows Explorer and con-
>To start Time Machine, open the Dock and click the Time Machine icon.
trols the desktop and the windows with

260 TECHNOLOGY IN ACTION


which you interact. It’s always running
when the Mac is on. With the Quick Look
feature, it is possible for you to view the
contents of a file without ever opening it.
This allows you to flip through multipage
documents, watch videos, and view an en-
tire presentation with just a single click of
the mouse. Spaces is the name of another
feature that helps to keep order when pro-
jects pile up. With Spaces, you can group
your application windows.
Snow Leopard has kept other features
from previous versions, such as Spotlight, a
desktop search feature that allows you to
find anything on your computer from one
spot. The Dashboard and widgets enable
FIGURE 12
you to have easy access to many mini-
applications that allow you to perform The Sidebar holds any folders you specify (such as the PageOneEditing folder
common tasks and get quick access to real- shown here).
time information such as weather, stock >To access the Sidebar, double-click the hard drive icon on the desktop.
prices, and sports updates.
At the top of the desktop is the menu bar.
The options on the menu bar change accord- Configuring a Mac
ing to which program is “active” (that is, In Windows, you make changes to settings
foremost on your screen) at the moment. and preferences through the Control Panel.
When you click the Apple icon in the upper In Mac OS X Snow Leopard, you use System
left corner, a drop-down menu displays, Preferences, which is an option on the Apple
from which you can select several options. menu. Selecting System Preferences from the
The Dock is similar to the Taskbar in Apple menu displays the window shown in
Windows and includes a strip of icons that Figure 13.
displays across the bottom of the desktop.
Each Finder window has an area on the left
known as the Sidebar (see Figure 12). The
Sidebar holds any folders you specify (even
though the icons don’t look like folders). This
makes navigation easier and faster. You can
choose to view the contents of files and folders
in three different views: icon view, list view,
and column view. As shown in Figure 12, the
sidebar shows that the PageOneEditing folder
is selected. The files and subfolders in the
PageOneEditing folder display in the next
two columns. A display window shows a
thumbnail preview of the selected file.
Navigating around a Finder window and
copying and moving files work almost exactly
the same way as they do in Windows.
If you do have some Windows software
you need to run, no worries—Mac OS X lets
you install Windows Vista or 7 and run
them using the built-in utility Boot Camp.
FIGURE 13
With Boot Camp installed, you can fire up
your computer in either Windows or Mac Much like the Control Panel in Windows, the System Preferences window allows
you to customize and configure Mac OS X.
OS X. Other software tools like VMware and
Parallels let you switch between Mac OS X >To get to System Preferences, click the Apple menu icon in the top left corner of
the screen and choose System Preferences.
and Windows without rebooting at all.

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 261


precautions. Snow Leopard comes with a
firewall, but you should take the necessary
steps to configure it properly before
connecting to the Internet for the first time,
Default firewall because the firewall is set, by default, to
allow all incoming connections. As shown
in Figure 14, to block all connections
except those that are critical to your
computer’s operation, select “Allow only
essential services.” If you’d rather set up
your firewall on a per-application basis,
select the Set access for specific services and
applications option.
In addition, hackers may be creating
viruses and other nuisances to exploit
security holes in the Mac OS. Mac users,
like Windows users, should keep their
software up to date with the latest fixes
and software patches by setting their
system to check automatically for software
FIGURE 14 updates on a periodic basis. On Macs, this
Macs have a firewall, but be sure to configure the firewall before you connect to feature is available through the System
the Internet. Preferences window. Figure 15 shows the
>Click on the Security icon under the Personal section of the System Preferences options you should choose to keep the Mac
window. When the Security window opens, click on the Firewall button to display OS up to date. The Check Now button
the Firewall configuration screen. enables you to check for immediate
updates, which is a great thing to do when
you first set up your computer. Then you
Protecting Your Mac can choose to have your computer check for
Although Macs tend to be attacked less updates regularly by scheduling software
frequently by viruses and other hacker updates to run automatically at a time
nuisances than PCs running Windows are, convenient to you. Make sure you choose
you can still be vulnerable if you don’t take to have the updates downloaded
automatically. This feature alerts you when
updates are ready to be installed. In
addition to these precautions, antivirus
software such as Norton is available for
Snow Leopard.

Utility Programs
Just like Windows, the Mac OS contains a
wide variety of utility programs to help
users maintain and evaluate their comput-
ers. In Macs, utility programs are located
in a folder named Utilities within the
Applications folder on the hard drive.
If you’re a Windows user, you know that
the Windows Task Manager utility can help
you determine how your system is perform-
ing. In Macs, a similar utility, shown in
FIGURE 15
Figure 16, is called the Activity Monitor.
It shows what programs (processes) are
Keeping the Mac OS up to date with the latest software fixes and patches greatly
decreases your chances of being inconvenienced by hackers.
currently running and how much memory
they’re using. The CPU, System Memory,
>From the Apple menu, choose System Preferences, and then click Software Update.
Disk Activity, Disk Usage, and Network

262 TECHNOLOGY IN ACTION


buttons indicate the activity in each of these
Running processes and Graphical representation
crucial areas. memory usage displayed of CPU usage
Like the Systems Properties box in Win-
dows, the Mac OS System Profiler shown in
Figure 17 displays all the hardware (and
software) installed in a Mac, including the
type of processor, the amount of RAM in-
stalled, and the amount of VRAM on the
video card.
As you can see, operating a Mac is fairly
simple and is similar to working in the Win-
dows environment. If you need more help
beyond what we provide in this Technology
in Focus feature, there are many books that
will help you make a smooth transition to
using an Apple computer.

DO IT YOURSELF!
There is definitely satisfaction in doing a job
yourself, and building a computer is no dif-
ferent. Of course, building a computer isn’t
for everyone, but for those who enjoy work- CPU display
ing with their hands and don’t mind doing
some up-front research, it can be a reward-
FIGURE 16
ing experience.
Many Web sites can provide guidance for Similar to the Task Manager in Windows, the Activity Monitor analyzes the
building your own Windows-based performance of a Mac.
computer. Tom’s Hardware (tomshardware. >Go to the Utilities folder found in the Applications folder on your hard drive
com/reviews/build-your-own-pc,2601.html) and double-click Activity Monitor to open the utility.
is a good place to start. Just Google “How to
build your own computer” and you’ll find
plenty of online help and advice. To start,
you need a list of parts. Here’s what you’ll
typically need:
1. Case: Make sure the case you buy is an
ATX-style case, which accommodates
the newest motherboards, and that it
includes adequate cooling fans. You’ll
want to decide between a full tower
(about 24 inches tall) or a mid- or mini-
tower. Also, be sure there are enough
drive bays in the case to handle the
hard drive and any other peripheral
drives (CD/DVD, Blu-ray and so on)
you’ll be installing.
2. Motherboard: Make sure that the
motherboard you buy can accommo-
date the CPU you have chosen. Many
motherboards come with integrated FIGURE 17
sound, video, and network capabilities.
The System Profiler is similar to the Systems Properties dialog box in Windows and
These may work fine for you, but be reveals a wealth of information about the hardware and software in the computer.
sure to check that they meet your
>To launch System Profiler, from the Apple menu, click About this Mac, and then
needs. You may want to plug in higher- click the More Info button.
end graphics and sound cards. The

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 263


motherboard needs to have enough PCI videos, get a card with 1 GB or more,
expansion slots for the video and sound depending on your budget. If you will
cards you want to install. Make sure be using a digital LCD monitor or
that your motherboard has at least 4 hooking your gaming system to your
USB ports. Some motherboards now computer, make sure that the video
have USB 3.0 ports as well as the older card has a DVI connection or an HDMI
USB 2.0. port.
3. Processor (CPU): Get the fastest one 8. Sound card: Make sure to get a PCI
you can afford, because it will help to card that is compatible with Sound
extend the life of your computer. Many Blaster (the standard for sound cards).
processors come with a fan installed to
9. Optical drives (CD/DVD, and Blu-
cool the unit; if not, you’ll need to pur-
ray): A CD/DVD drive is necessary for
chase a processor cooling fan.
software installation. You may want to
4. RAM: Check your motherboard specifi- install a Blu-ray drive to view your
cations before buying RAM to ensure favorite movies using high-definition
you buy the correct type and an technology, or a Blu-ray burner to
amount that will fit into the available archive large volumes of data.
slots. In addition, make sure that the
amount of RAM you choose is sup-
ported by your operating system (32 bit In addition to these components, you’ll
vs. 64 bit). need a keyboard, a mouse or other pointing
device, a monitor, and OS software.
5. Hard drive: Some cases now support up
You can buy these components at
to six drives so you may be able to make
reputable Web sites such as Tiger
a few choices here. SSD drives are more
Direct (tigerdirect.com) or NewEgg
expensive, but they are incredibly fast.
(newegg.com). Once you have the
In fact, many home system builders are
components, it is almost as simple as
using SSD drives as the boot drives so
screwing them into the case and connecting
that the system boots in as little as
them properly. Make sure you read all the
10 seconds. The price per gigabyte on
installation instructions that come with
mechanical drives has been rapidly
your components before beginning
coming down in recent years, so
installation. Don’t forget to check YouTube
consider a large-volume drive. For
or the Web sites of component manufactur-
optimal performance, choose a hard
ers for handy how-to videos and step-by-
drive spinning at 7,200 rpm or
step installation guides. Then read a
10,000 rpm.
complete installation tutorial such as the
6. Power supply: Make sure to get a one found at the Tech Report Web site
power supply with adequate wattage to (techreport.com), which provides an excel-
handle the load generated by all of the lent visual guide to assembling a computer.
computer’s components. Don’t forget Now, grab your screwdriver and get
that as time passes you’ll probably be started. You’ll be up and running in no
adding more peripherals and drives to time. The advantages and disadvantages
your system. Be sure to select a power of building your own Windows-based
supply wattage that can support that computer are shown in Figure 18.
growth. As you can see, there are many comput-
7. Video card: Low-end cards with ing options other than a Windows-based
512 MB of video memory are fine for computer running commercial software
normal computer use, but for gaming applications. We hope you spread your
or displaying high-end graphics or wings and try a few of them.

264 TECHNOLOGY IN ACTION


FIGURE 18 Considerations When Building Your Own Computer

Advantages Disadvantages
You get exactly the configuration and features There is no technical support when things go
you want. wrong.
You have the option of using components other You’ll need to examine more complex technical
than those that are used in mass-produced specifications (such as which CPU works with the
computers. motherboard you want), which may overwhelm the
average computer user.
If you succeed, you will get a feeling of You will not necessarily save money.
satisfaction from a job well done.

Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms and concepts from
this Technology in Focus feature.

1. OpenOffice Calc is a 7. Which statement about Linux is FALSE?


a. calculator program. a. Because so many developers contribute to the OS,
b. database program. Linux is a prime target for hackers.
c. Web browser. b. Linux is used on a lot of netbooks because it takes
d. spreadsheet program. up less hard drive space than proprietary software.
c. When stored on a flash drive, Linux provides
2. A free alternative to Adobe Photoshop that can be
greater privacy when surfing the Internet on public
used to edit images is
computers.
a. GIMP. c. SeaMonkey.
d. Some versions of Linux can be stored on a CD and
b. Thunderbird. d. Draw.
used on many different computers.
3. What kind of software can be installed on as many
8. What is NOT necessarily an advantage of building
computers as you wish?
your own computer?
a. Proprietary software c. Apple software
a. Saving money
b. Commercial software d. Open source software
b. Getting the exact configuration you want
4. Which is a popular open source program for creating c. Using components that aren’t mass produced
diagrams and charts? d. Getting the features you want
a. Visio c. SketchUp
9. One popular Linux distro is
b. Dia d. Impress
a. Leopard. c. OpenOffice.
5. What automated backup utility comes with Mac OS b. Base. d. Ubuntu.
Snow Leopard?
10. When building your own computer, make sure the
a. Quick Look c. Dashboard
motherboard
b. Time Machine d. Spotlight
a. has enough PCI expansion slots.
6. By default, files saved in Write use which extension? b. has a processor cooling fan.
a. .txt c. .odt c. can wake up from sleep mode quickly.
b. .docx d. .pdf d. has its own drive bay.

TECHNOLOGY IN FOCUS: COMPUTING ALTERNATIVES 265


six
six
chapter

understanding and
assessing hardware:
evaluating your system

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. How can I determine whether I should upgrade my existing computer or buy a new
one? (pp. 268–272)
2. What does the CPU do, and how can I evaluate its performance? (pp. 272–276)
3. How does memory work in my computer, and how can I evaluate how much memory
I need? (pp. 276–279)
4. What are the computer’s main storage devices, and how can I evaluate whether they
match my needs? (pp. 279–286)
5. What components affect the output of video on my computer, and how can I evaluate
whether they match my needs? (pp. 286–290)
6. What components affect my computer’s sound quality, and how can I evaluate
whether they match my needs? (pp. 290–291)
7. How can I improve the reliability of my system? (pp. 291–294)

multimedia resources
multimedia
resources

Active Helpdesk
• Evaluating Your CPU and RAM (p. 278)
• Evaluating Computer System Components (p. 287)
Sound Bytes
• Using Windows 7 to Evaluate CPU Performance (p. 276)
• Memory Hierarchy Interactive (p. 278)
• Installing RAM (p. 279)
• CD, DVD, and Blu-ray Reading and Writing Interactive (p. 283)
• Installing a Blu-ray Drive (p. 285)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? It used to be that the case
for a desktop computer was just a boring rectangular box—but no longer! Consider
some of the new designs on the market. On the Phobos computer system by
BFG Technologies, the front of the case features a touch-panel LCD that
reports system performance parameters, controls music content, and presents a
summary of storage and memory usage. There is also an integrated iPod/iPhone
docking station on the top of the case. Or consider Falcon NorthWest,
which delivers custom paint jobs on its system cases—images from
its library, your own image, or even a screen from your favorite game.
The Thermaltake Level 10 wins for pure artistry. It isolates
all the major subsections—motherboard, power supply, hard
drives, optical drives—in a separate physical space. Each
section is hinged and can swing open for easy
access. Made of aluminum, the entire case
helps disperse heat . . . and looks cool
doing it!

267
Is It the Computer ing out what you want your ideal computer
to be able to do. You’ll then learn more about
or Me? important components of your computer—
After saving up for a computer, Natalie took its CPU, memory, storage devices, audio and
the leap a couple of years ago and bought a video devices, and ports—and how these
new desktop PC. Now she is wondering components affect your system. Along the
what to do. Her friends with newer comput- way, you’ll find worksheets to help you con-
ers are burning high-def Blu-ray movies duct a system evaluation, and multimedia
they’ve made, and they’re able to wirelessly Sound Bytes that will show you how to in-
connect their phones and synch up music stall various components in your system and
files. They seem to be able to do a hundred increase its reliability. You’ll also learn about
things at once without their computers the various utilities available to help speed
slowing down at all. up and clean up your system. If you don’t
Natalie’s computer can’t do any of these have a computer, this chapter will provide
things—or at least she doesn’t think it can. you with important information you will
Lately it seems to take longer to open files need about computer hardware to make an
and scroll through Web pages. Making mat- informed purchasing decision.
ters worse, her computer freezes often and Is now a good time to buy a new com-
takes a long time to reboot. Now she’s won- puter? There never seems to be a perfect
dering whether she should buy a new com- time to buy. It seems that if you can just wait
puter, but the thought of spending all that a year, computers will inevitably be faster
money again makes her think twice. As she and cost less. Is this actually true?
looks at ads for new computers, she realizes As it turns out, it is true. In fact, a rule of
she doesn’t know what such things as thumb often cited in the computer industry,
“CPU” and “RAM” really are, or how they called Moore’s Law, describes the pace at
affect her system. Meanwhile, she’s heard which CPUs (central processing units)—the
it’s possible to upgrade her computer, but small chips that can be thought of as the
the task seems daunting. How will she “brains” of the computer—improve. Named
know what she needs to do to upgrade, or for Gordon Moore, the cofounder of the
whether it’s even worth it? CPU chip manufacturer Intel, this rule pre-
Are you in the same situation? How well is dicts that the number of transistors inside a
your computer meeting your needs? Do you CPU will increase so fast that CPU capacity
ever wonder whether your computer is fine will double every 18 months. (The number
and you just need more training to get it to of transistors on a CPU chip helps determine
Figure 6.1
work smoothly? Is that true, or do you really how fast it can process data.)
Moore’s Law predicts that
need a more sophisticated computer system? As you can see in Figure 6.1, this rule of
CPUs will continue to get
faster. In this chapter, you’ll learn how to evaluate thumb has held true since 1970, when Moore
Source: Adapted from the
your computer system to determine whether first published his theory. Imagine finding a
Moore’s Law animated demo it is meeting your needs. You’ll start by figur- bank that would agree to treat your money
at Intel.com. in this way. If you put 10 cents in that kind
of savings account in 1965, you would have
Transistors
a balance of more than $100 million today!
10,000,000,000 Moore himself, however, has predicted that
AMD Opteon around the year 2020 CPU chips will be
1,000,000,000
Moore’s Law Intel i7 Processor manufactured in a different way, thus
changing or eliminating the effects of
Intel Pentium 4 Processor 100,000,000
Intel Pentium III Processor Moore’s Law altogether.
Intel Pentium II Processor 10,000,000 In addition to the CPU becoming faster,
Intel Pentium Processor other system components also continue to
Intel 486 Processor
1,000,000 improve dramatically. For example, the
Intel 386 Processor
capacity of memory chips such as dynamic
286
100,000 random access memory (DRAM)—the most
8086
common form of memory found in personal
8080 10,000 computers—increases about 60 percent
8008
4004
1,000 every year. Meanwhile, hard drives have
1970 1975 1980 1985 1990 1995 2000 2005 2010 been growing in storage capacity by some
Intel, Itanium, Pentium, etc. are registered trademarks of the Intel Corporation. 50 percent each year.

268 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


So, with technology advancing so quickly, your computer. For example, do you need to
how do you make sure you have a computer bring your computer to school or work with
that matches your needs? No one wants to you? Do you want to be able to edit digital
buy a new computer every year just to keep photos and video? Do you want to watch
up with technology. Even if money weren’t a and record Blu-ray discs? Or do you mainly
consideration, the time it would take to trans- use your computer for word processing and
fer all of your files and reinstall and reconfig- Internet access? The worksheet in Figure 6.2
ure your software would make buying a new lists a number of ways in which you may
computer every year terribly inefficient. Ex- want to use your computer. In the second
tending the life of a computer column, place a check next
also reduces or postpones the to those computer uses that
environmental and security
concerns involved in the dis-
posal of computers.
“ To determine
your ideal
system, consider or
apply to you. Also, set a
priority of high, medium,
low in the rightmost col-
No one wants to keep umn so that you can deter-
doing costly upgrades that what you want to mine which features are
won’t significantly extend be able to do most important to you.
the life of a system, either. Next, look at the list of
How can you determine if
with your desired uses for your com-
computer.
your system is suitable or if it
just needs to be upgraded?
Moreover, how can you know which is the
better option—upgrading or buying a new
” puter and determine
whether your current sys-
tem can perform these activities. If there are
things it can’t do, you may need to purchase
computer? The first step is figuring out what additional hardware or a new computer. For
you want your computer to do for you. example, if you want to play and burn CDs
and DVDs, all you need is a DVD–RW drive.
However, you need a Blu-ray burner if you
What Is Your Ideal want to burn (record) the higher capacity
Blu-ray discs. Likewise, if you plan to edit
Computer? digital video files or play games that require
As you decide whether your computer suits high video frame rates for smooth in-game
you, it’s important to know exactly what motion and have amazing soundtracks, you
you would want your ideal computer sys- may want to add more memory, upgrade
tem to be able to do. Later, as you perform a your video card, and buy a better set of
system evaluation, you can compare your speakers. Depending on the costs of the in-
existing system to your ideal system. This dividual upgrade components, you may be
will help you determine whether you better off buying a new system.
should purchase hardware components to
add to your system or buy a new system.
But what if I don’t have a com- BITS
puter? Even if you’re a new computer AND Moving to a New Computer Doesn’t
user and are looking to buy your first sys- BYTES Have to Be Painful
tem, you will still need to evaluate what you
want your system to do for you before you Are you ready to buy a new computer but dread the prospect of transferring all your
purchase a computer. Being able to under- files and redoing all of your Windows settings? You could transfer all those files and
stand and evaluate computer systems will settings manually, but Windows stores much information in the registry files, which
make you a more informed buyer. You can be tricky to update. So what do you do? Windows 7 incorporates Windows Easy
should be comfortable answering questions Transfer, which lets you migrate files and settings from a Windows Vista system to a
such as “What kinds of CPUs are there, and Windows 7 system via a network connection by using a flash drive or external hard
how does the CPU affect system perform- drive or using optical media such as a CD or DVD.
ance?” and “How much RAM do I need, Alternatively, other PC migration software is available, such as LapLink’s
and what role will it play in my system?” PCmover, which is designed to make the transition to a new computer easier. For the
It’s important for you to be able to answer latest information on such utilities, search on migration software at PCmag
such questions before you buy a computer. (pcmag.com). You’ll be ready to upgrade painlessly in no time. If you prefer to avoid
How do I know what my ideal sys- the do-it-yourself option, support technicians at retail stores (such as the Geek Squad
tem is? To determine your ideal system, at Best Buy) will often perform the migration for a small charge.
consider what you want to be able to do with

What Is Your Ideal Computer? 269


Figure 6.2 WHAT SHOULD YOUR IDEAL COMPUTER SYSTEM BE ABLE TO DO?

Do You Want Your Can Your System Priority (High,


Computer Uses System to Do This? Do This Now? Medium, Low)
Portability Uses
Be light enough to carry easily
Access the Internet wirelessly

Entertainment Uses
Access the Internet
Play and record CDs and DVDs
Play and record Blu-ray discs
Record and edit digital videos
Record and edit digital music
Edit digital photos
Play graphics-intensive games
Transfer files wirelessly to mobile devices and other computers
Transfer files using flash memory cards
Upload media to social networking sites
Have your peripheral devices work easily and speedily with your computer
Purchase/rent music and videos from the Internet
Talk with friends and family with live video and audio
Use the computer to stream television and movies
Other

Educational Uses
Perform word processing tasks
Use educational software
Access library and newspaper archives
Create multimedia presentations
Create backups of all your files
Record notes with synchronized audio recordings
Other

Business Uses
Create spreadsheets and databases
Work on multiple software applications quickly and simultaneously
Conduct online banking, pay bills online, or prepare your taxes
Conduct online job searches or post résumés
Synchronize your mobile device (smartphone or portable media player)
with your computer
Conduct online meetings with video and audio
Organize business contacts and manage scheduling
Other

270 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


Note that you also may need new soft- How does a notebook compare to
ware and training to use new system a desktop for value? Desktop systems
components. Many computer users forget are invariably a better value than notebooks
to consider the training they’ll need when in terms of computing power gained for
they upgrade their computer. Missing any your dollar. Because of the notebook’s small
one of these pieces might make the differ- footprint (the amount of space it takes up on
ence between your computer enriching the desk), you pay more for each compo-
your life and its becoming another source nent. Each piece has had extra engineering
of stress. time invested to make sure it fits in the
Where do I get the training I need? smallest space. In addition, a desktop sys-
Of course, colleges offer a number of train- tem offers more expandability options. It’s
ing options from full semester classes, to easier to add new ports and devices because
online modules, to weekend courses. In ad- of the amount of room available in the desk-
dition many online tutorials are available for top computer’s design.
most software products. For specific ques- If a large monitor is important, desktops
tions or skills, be sure to check YouTube and have an edge. Although 18-inch screens are
podcast directories. Many valuable series now available on some notebooks, the
exist that answer your questions in step-by- weight of these systems (often more than
step video demonstrations, such as MrExcel 10 pounds) makes them really more of a
or Photoshop Quicktips. Some manufactur- “desktop replacement” than a portable
ers, like Apple, offer classes at their stores computing solution. Light notebooks typi-
for a yearly fee. Training shouldn’t be an cally have 17-inch screens or smaller, while
afterthought. Consider the time and effort inexpensive 23-inch monitors are readily
involved in learning about what you want available for desktop solutions. If you need
your computer to do before you buy a large screen and portability, you may end
hardware or software. If you don’t, you up buying a notebook and a fixed desk
may have a wonderful computer system but monitor to connect to when you are at
lack the skills necessary to take full advan- home, an extra cost.
tage of it. Desktop systems also are more reliable.
Because of the amount of vibration that a
notebook experiences and the added expo-
sure to dust, water, and temperature fluctua-
Choosing Either a tions that portability brings, notebooks often
Desktop or have a shorter lifespan than desktop com-
puters. Manufacturers offer extended war-
Notebook System ranty plans that cover accidental damage
The first step in evaluating your system and unexpected drops; however, such plans
needs is determining whether you want a may be costly.
desktop or a notebook. In this discussion,
we’ll only be considering full-size desktops
and notebooks. If your main need is Internet BITS
connectivity, not processing power, and a AND Taking Your System Out of the Box
small screen and small keyboard are accept- BYTES
able, a netbook may be a workable option.
You just brought your brand-new machine home, and it’s loaded up with all kinds of
Netbooks are discussed in detail in
bloat! Here are two steps you can take right away to have that truly fresh beginning
Chapter 8.
you were hoping for.
To make the best decision, it’s important
to evaluate how and where you will use the 1. Remove the preinstalled trial programs and advertisements installed by most
computer. The main distinction between vendors. A quick way to do this is with the free program PC DeCrapifier. Its
desktops and notebooks is portability. If you wizard walks you through uninstalling the most common annoyances that came
preloaded on your new system.
indicated in the chart in Figure 6.2 that you
need to take your computer with you to 2. Grab the really valuable free software you will want to use. Consider loading
OpenOffice.org, Firefox, iTunes, Picasa, and Gimp. (These packages are
work or school, or even want the flexibility
discussed in more detail in the Technology in Focus section titled “Computing
to move from room to room in your house, a Alternatives.”)
notebook is the best choice. If portability is
not an absolute requirement, you should Now go enjoy your new machine!
consider a desktop.

Choosing Either a Desktop or Notebook System 271


Assessing Your
Hardware: Evaluating
Your System
With a better picture of your ideal computer
system in mind, you can make a more in-
formed assessment of your current com-
puter. To determine whether your computer
system has the right hardware components
to do what you ultimately want it to do, you
need to conduct a system evaluation. To do
this, you look at your computer’s subsys-
tems, see what they do, and check how they
How long will a note- perform. These subsystems include the
book be useful to following:
me? The answer to that • CPU subsystem
question depends on how
• Memory subsystem (the computer’s
easy it is to upgrade your
random access memory, or RAM)
system. Take note of the
maximum amount of memory • Storage subsystem (hard drive and
you can install in your notebook other drives)
because that cannot be changed a • Video subsystem (video card and moni-
Figure 6.3 few years down the road. Internal hard tor)
ExpressCards add func- drives are not easy for novices to install in a • Audio subsystem (sound card and
tionality to your notebook. notebook, but if you have a fast transfer port speakers)
like an external SATA (eSATA) or USB 3.0 • Ports
on your notebook, you can easily add an ex-
ternal hard drive for more storage space. In the rest of this chapter, we will exam-
Notebooks are often equipped with an ine each subsystem. At the end of each
ExpressCard slot. ExpressCard (shown in section, you’ll find a small worksheet you
Figure 6.3) can add a solid state drive (SSD), can use to evaluate each subsystem on your
eSATA and FireWire ports, and other computer. Note: This chapter discusses tools
capabilities to your system. You can add an you can use to assess a Windows-based PC.
ExpressCard that allows you to read flash For information on how to assess a Mac,
memory cards such as CompactFlash, refer to the Technology in Focus feature
Memory Sticks, and Secure Digital cards. As “Computing Alternatives” on page 252.
new types of ports and devices are intro-
duced, like those for the new USB 3.0 stan-
dard, they will be manufactured in Evaluating the CPU
ExpressCard formats so you can make sure
your notebook does not become obsolete
Subsystem
before its time. Figure 6.4 summarizes the Early in the process of determining whether
advantages and disadvantages of each style your computer system adequately meets
of computer. your needs, you’ll want to consider the type

Figure 6.4 DESKTOP VERSUS NOTEBOOK COMPUTERS—WHICH FITS YOU?

Notebooks Desktops
Portable—lightweight, thin Best value: more processing power, memory, and storage
capacity for lower price

Take up less physical space More difficult to steal, less susceptible to damage from
dropping or mishandling

Easier to ship or transport if the system needs repair Easier to expand and upgrade

Smaller video display (17 inches or smaller) Large monitors available (19 inches or larger)

272 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


of processor in your system. As mentioned cycle in more detail in the Technology in
in chapter 2, your computer’s central pro- Focus feature “Under the Hood” on
cessing unit (CPU or processor) is critically page 346.)
important because it processes instructions, What makes one CPU different
performs calculations, manages the flow of from another? The primary distinction
information through a computer system, between CPUs is processing power, which is
and is responsible for turning raw data into determined by a number of factors. One
valuable information through processing such factor is the design of the CPU in terms
operations. The CPU is located on the moth- of the number of cores. A core is a complete
erboard, the pri- processing section from a CPU
mary circuit embedded into one
board of the physical chip.
computer a b In addition to
system. core design,
There are sev- other factors
eral types of differentiate
processors on the CPUs,
market including including
Intel processors how quickly
(such as the Core the processor
family with the i7, can work
i5, i3, and the (called its clock
Centrino line) and Figure 6.5 speed) and the
AMD processors (a) The Intel i7 is the most advanced desktop CPU ever made by amount of imme-
(such as the Intel. (b) The Microsoft Xbox 360 gaming console uses a custom diate access
Athlon and Phe- PowerPC–based CPU to perform 115 billion calculations per memory the CPU
second.
nom). The Intel has (called its
Core i7 is the most cache memory).
advanced desktop CPU ever made by Intel. How will a multiple-core CPU help
Figure 6.5 shows the i7 as well as the three- me? CPUs began to execute more than
core PowerPC processor used in the Mi- one instruction at a time quite a while ago,
crosoft Xbox 360 gaming console, the Xenon. when hyperthreading was introduced.
How does the CPU work? The CPU Hyperthreading provides quicker process-
is comprised of two units: the control unit ing of information by enabling a new set of
and the arithmetic logic unit (ALU). The instructions to start executing before the
control unit coordinates the activities of all previous set has finished. The most recent
the other computer components. The ALU is design innovation for PC processors, an
responsible for performing all the arithmetic improvement upon hyperthreading, is the
calculations (addition, subtraction, multipli- use of multiple cores on one CPU chip. With
cation, and division). The ALU also makes core technology, two or more processors
logic and comparison decisions such as reside on the same chip, enabling the execu-
comparing items to determine if one is tion of two sets of instructions at the same
greater than, less than, equal to, or not equal time. Now applications that are always run-
to another. ning behind the scenes, such as virus protec-
Every time the CPU performs a program tion software and your operating system,
instruction, it goes through the same series can have their own processor, freeing the
of steps. First, it fetches the required piece of other processor to run other applications
data or instruction from RAM, the tempo- such as a Web browser, Word, or iTunes
rary storage location for all the data and in- more efficiently. Figure 6.6 shows these dif-
structions the computer needs while it is ferent approaches.
running. Next, it decodes the instruction In Figure 6.6c, hyperthreading allows two
into something the computer can under- different programs to be processed at one
stand. Once the CPU has decoded the time, but they are sharing the computing
instruction, it executes the instruction and resources of the chip. With multiple cores,
stores the result to RAM before fetching the each program has the full attention of its
next instruction. This process is called a own processing core (see Figure 6.6a and
machine cycle. (We will discuss the machine Figure 6.6b). This results in faster processing

Evaluating the CPU Subsystem 273


There are several levels of cache memory.
These levels are defined by a chip’s proxim-
ity to the CPU. Level 1 cache is a block of
memory that is built onto the CPU chip for
a
the storage of data or commands that have
just been used. Level 2 cache is located on
the CPU chip but is slightly farther away
from the CPU, or it’s on a separate chip next
Four cores
to the CPU and therefore takes somewhat
longer to access. Level 2 cache contains more
storage area than does level 1 cache. In the
same way, some chips continue on to have a
b third cache, Level 3. Again, this level of
cache is slower for the CPU to reach but
larger in size.
Another factor that impacts overall
Two cores
performance is the FSB speed. The
front side bus (FSB) connects the
processor (CPU) in your computer to the
system memory. Think of the front side bus
c as the highway on which data travels be-
tween the CPU and RAM. With a wider
highway, traffic can move faster because
more cars can travel at the same time.
Hyperthreading Consequently, the faster the FSB is, the
faster you can get data to your processor.
Figure 6.6
and smoother multitasking. It is possible to The faster you get data to the processor,
(a) Some Intel processors
design a CPU to have multiple cores and the faster your processor can work on it.
have four cores able to
run four programs simulta- hyperthreading. The Intel i7-980x has six FSB speed is measured in megahertz
neously. (b) Some Intel cores, each one using hyperthreading, so it (MHz). The speed of the front side bus is an
processors have two simulates having twelve processors! important consideration that determines
cores. (c) The Intel How do I pick the fastest proces- CPU performance.
Pentium 4 Hyperthreading
sor? While clock speed is an important Modern processors are defined by the
operates with only one
core but it hyperthreads consideration when determining processor combination of processor speed, front side
(working on two performance, CPU performance also is af- bus speed, and the amount of cache mem-
processes at once). fected by the amount of cache memory and ory. For example, Intel has several processor
the speed of the front side bus (FSB). Cache families, in a range of clock speeds, cache
memory is a form of random access memory memory sizes, and FSB speeds, as shown in
that is more accessible to the CPU than Figure 6.7. Even within one processor fam-
regular RAM. Because of its ready access to ily, there is a variety of choices. For example,
the CPU, cache memory gets data to the the i7-980X processor has six cores, and a 12
CPU for processing much faster than bring- MB cache, whereas the i7-860S processor has
ing the data in from RAM. four cores and an 8 MB L3 cache.

Figure 6.7 PROCESSOR SPECIFICATIONS

Number of Cores Max Clock Speed Max FSB Max L3 Cache


Desktop Processors i3-530 2 2.93 GHz 1333 MHz 4 MB

i5-750 4 2.66 GHz 1333 MHz 8 MB

i7-980X 6 3.30 GHz 1600 MHz 12 MB

Notebook Processors Celeron 585 1 2.16 GHz 666 MHz 1 MB

i5 mobile 520 2 1.07 GHz 1066 MHz 3 MB

i7 mobile 820 4 1.73 GHz 1333 MHz 8 MB

274 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


There are many factors that influence
CPU design, so picking the fastest CPU for
the kind of work you do often involves re-
searching some performance benchmarks.
Benchmarks are measurements used to
compare CPU performance between proces-
sors. Benchmarks are generated by running
software programs specifically designed to
push the limits of CPU performance. Arti-
cles are often published comparing a num-
ber of chips, or complete systems, based on
their benchmark performance. Investigate a
few, like cpubenchmark.net, before you se-
lect the chip that is best for you.
Why are there different CPU
choices for notebooks and CPU shown. For example, the CPU model CPU clock speed
desktops? Both Intel and AMD make CPU illustrated here is the Intel i7,
processors that are specifically designed for version 960.
notebook computers. Notebook processors How can I tell whether my Figure 6.8
not only need to perform quickly and effi- CPU is meeting my needs? As shown The System Properties
ciently, like their desktop counterparts, but in Figure 6.9, several factors determine window identifies which
also need better power savings to improve whether your CPU is meeting your needs. CPU you have, as well as
its speed.
battery life. Processors used in notebooks Even if your CPU meets the minimum
work to combine low power consumption, requirements specified for a particular soft- >Click the Start button and
then click Computer on
to support long battery life, and more flexi- ware application, if you’re running other the right panel of the Start
ble wireless connectivity options. AMD fea- software at the same time (in addition to the menu. On the top toolbar,
tures notebook processors like the Turion X2 operating system, which is always running), click System Properties.
Mobile and the Mobile AMD Sempron, you’ll need to check to see how well the
while Intel has mobile versions of the i5 and CPU is handling the entire load. You can tell
i7 series. whether your CPU speed is limiting your
What CPU does my current com- system performance if you periodically
puter have? You can easily identify the watch how busy it is as you work on your
type of CPU in your current system by ac- computer. Keep in mind that the workload
cessing the System Properties. As shown in your CPU experiences will vary consider-
Figure 6.8, you can view basic information ably depending on what you’re doing. Even
about your computer, including which CPU though it might run Word just fine, it may
is installed in your system as well as its not be able to handle running Word, Photo-
speed. More detailed information, like the shop, iTunes, and IM at the same time. The
FSB speed and the amount of cache memory, percentage of time that your CPU is work-
is not shown in this screen. You can find ing is referred to as CPU usage.
those values by checking the manufacturer’s A utility that measures information such
Web site for the specific model number of as CPU usage and RAM usage is incredibly

Figure 6.9 HOW IS YOUR CPU PERFORMING?

Current System My Ideal System


What is my computer’s CPU speed?

How much cache memory is on the CPU*?

What is the FSB speed*?

What kind of multilevel processing does the CPU have—


multiple cores, hyperthreaded, etc.?

Is the CPU usage value below 90% during most of my daily tasks?

*You can find these by checking the manufacturer’s specifications for your model of CPU.

Evaluating the CPU Subsystem 275


performance. However, upgrading
CPU usage your CPU will affect only the
over time for processing portion of the system
all eight
virtual cores
performance, not how quickly data
can move to or from the CPU.
Your system’s overall performance
depends on many factors, including
the amount of RAM installed as
well as hard drive speed. Therefore,
your selection of a CPU may not
offer significant improvements to
Total RAM your system’s performance if there
installed
is a bottleneck in processing because
of insufficient RAM or hard drive
capacity.

Evaluating RAM: The


Current CPU Percentage of
usage level RAM in use Memory Subsystem
Random access memory (RAM) is your
Figure 6.10 computer’s temporary storage space.
The Performance tab of useful, both for considering whether you Although we refer to RAM as a form of stor-
the Windows Task should upgrade and for investigating if your age, it really is the computer’s short-term
Manager utility shows you computer’s performance suddenly seems to memory. As such, it remembers everything
how busy your CPU that the computer needs to process the data
actually is.
drop off for no apparent reason. On Win-
dows systems, a program called Task Man- into information, such as data that has been
>In an empty area of the entered and software instructions, but only
taskbar, right-click, select
ager gives you easy access to all this data.
Mac OS X has a utility similar to Task Man- when the computer is on. RAM is an exam-
Start Task Manager, and
click the Performance tab. ager called Activity Monitor, which is lo- ple of volatile storage. When the power is
cated in the Utilities folder in your off, the data stored in RAM is cleared out.
Applications folder. This is why, in addition to RAM, systems
To view information on CPU usage, right- always include nonvolatile storage devices
click an empty area of the taskbar, select for permanent storage of instructions and
Start Task Manager, and click the Perfor- data when the computer is powered off.
mance tab, as shown in Figure 6.10. The ROM memory, for example, holds the criti-
CPU Usage graph records your CPU usage cal startup instructions. Hard drives provide
for the past several seconds. (Note: If you the greatest nonvolatile storage capacity in
have multiple cores and hyperthreading, the computer system.
you will see several CPUs listed.) Of course, Why not use a hard drive to store
there will be periodic peaks of high CPU the data and instructions? It’s about
usage, but if you see that your CPU usage one million times faster for the CPU to
levels are greater than 90 percent during retrieve a piece of data from RAM than
most of your work session, a faster CPU will from a hard drive. The time it takes the CPU
contribute a great deal to your system’s per- to retrieve data from RAM is measured in
formance. If you are using the Windows
Sidebar, there is a CPU Meter gadget you Using Windows 7
can add to track both CPU and RAM usage. SOUND
BYTE to Evaluate CPU
To see exactly how to use the Task Manager
Performance
and the Sidebar gadget, watch the Sound
Byte “Using Windows 7 to Evaluate CPU In this Sound Byte, you’ll learn how to use the utilities
Performance.” provided by Windows 7 to evaluate your CPU’s per-
Will improving the performance of formance. You’ll also learn about shareware utilities
the CPU be enough to improve my (software that you can install and try before you
computer’s performance? You may purchase it) that expand on the capabilities the Task
think that if you have the best processor, Manager utility provides.
you will have a system with the best

276 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


nanoseconds (billionths
of seconds), whereas re- Fast access
trieving data from a fast but very little storage
hard drive takes an av- CPU
Registers
erage of 10 milliseconds
(ms), or thousandths of
seconds. Figure 6.11 Level 1 cache
Hard drive
shows the various types
Level 2 cache
of memory and storage
that are distributed Level 3 cache
throughout your system:
CPU registers, cache, RAM Physical RAM
RAM, and hard drive.
Each of these has its Virtual Memory Huge amounts
Hug
own tradeoff of speed of sstorage but
CPU registers Optical Disk slow
slo speeds
vs. price. Because the and L1, L 2 cache Hard Drive
Drives
fastest memory is so
much more expensive,
systems are designed with much less of it. Figure 6.11
This principle is influential in the design of a manufacturer’s Web site. In addition, many A computer system’s
balanced computer system and can have a online RAM resellers, such as Crucial memory has many
tremendous impact on system performance. (crucial.com), can help you determine the different levels, ranging
Are there different types of type of RAM that is compatible with your from the small amounts in
the CPU to the much
RAM? Like most computer components, system by running an automated system
slower but more plentiful
RAM has gone through a series of transi- scan program on your computer. storage of a hard drive.
tions. In current systems, the RAM used How can I tell how much RAM is
most often comes in the form of double data installed in my computer and how
rate 2 (DDR2) memory modules. Double it’s being used? The amount of RAM
data rate 3 memory (DDR3), which has an that is actually sitting on memory modules
even faster data transfer rate, is seen in high- in your computer is your computer’s
performance systems. In older systems, physical memory. The easiest way to see
other types of RAM may have been used, how much RAM you have is to look in the
including dynamic RAM (DRAM), static System Properties window. (On the Mac,
RAM (SRAM), and synchronous DRAM choose the Apple menu and then About This
(SDRAM). RAM appears in the system on Mac.) This is the same tab you looked in to
memory modules (or memory cards), small determine your system’s CPU type and
circuit boards that hold a series of RAM speed, and is shown in Figure 6.8. RAM ca-
chips and fit into special slots on the moth- pacity is measured in gigabytes (GB), and
erboard (see Figure 6.12). Most memory most machines sold today, especially those
modules in today’s systems are called dual running Windows, have at least 2 GB of
inline memory modules (DIMMs). RAM. The computer in Figure 6.10 has Figure 6.12
Types of RAM are slightly different from 12 GB of RAM installed. (a) Memory modules hold
each other in how they function and in the Windows 7 uses a memory-management a series of RAM chips.
speed at which they access memory. On technique known as SuperFetch. SuperFetch (b) This Corsair memory
high-end systems, manufacturers may offer monitors which applications you use the module has an aluminum
plate called a heat sink to
an option to purchase Corsair Dominator cool the chips beneath it.
DDR3 modules. These are tested to high
levels to guarantee optimum performance.
A special heat exchanger is designed into the
a b
RAM module to help it operate at a lower
temperature, making it more stable and
more reliable. All of these factors boost the
performance of the memory and make it
popular with demanding video gamers.
If you’re adding RAM to any system, you
must determine what type your system
needs. Consult your user’s manual or the

Evaluating RAM: The Memory Subsystem 277


ACTIVE SAMPLE RAM
HELP-
Evaluating Your CPU Figure 6.14
ALLOCATION
DESK and RAM
RAM
In this Active Helpdesk call, you’ll play the role of a Application Recommended
helpdesk staffer, fielding calls about what the CPU Windows 7 2,000 MB (or 2 GB)
does and how to evaluate its performance. You’ll also
field calls about how memory works and how to eval- Microsoft Office Professional
2010 512 MB
uate how much memory a computer needs.
Internet Explorer 8 512 MB

iTunes 9 512 MB to 1,000 MB


most and preloads them into your system (1 GB)
memory so that they’ll be ready to go. For
Adobe Photoshop Elements 8 1,000 MB (1 GB)
example, if you have Word running,
Windows 7 stores as much of the informa- Total RAM required to run all 4,536 MB to 5,024
tion related to Word in RAM as it can, programs simultaneously MB (or 4.5 GB to
which speeds up how fast your application 5.0 GB)
responds, because pulling information from
RAM is so much faster than pulling it from
the hard drive. This idea of caching the data As you know from Chapter 5, the operat-
you need in RAM, having it ready to use ing system is the main software application
quickly when it is asked for, is different from that runs the computer. Without it, the
how memory was used in earlier operating computer does not work. At a minimum,
systems. You can watch this work using the system needs enough RAM to run the
the Resource Monitor, which shows in operating system. However, because you
Figure 6.13 how the 12 GB of installed run additional applications, you need to
RAM is being used: 3 GB is running pro- have more RAM than the minimum.
grams, 6 GB is holding cached data and files How much RAM do I need?
ready to be quickly accessed, and 3 GB is Because RAM is the temporary holding
currently unused. space for all the data and instructions that
How much memory does the the computer uses while it’s on, most com-
operating system need to run? The puter users need quite a bit of RAM. In fact,
memory that your operating system uses is systems running all the new features of
referred to as kernel memory. This memory Windows 7 should have a minimum of 1 GB
Figure 6.13 is listed in a separate Kernel Memory table of RAM, but for peak performance, systems
The Resource Monitor’s in the Performance tab. In Figure 6.10, the are recommended to have at least 2 GB of
Memory tab shows a Kernel Memory table tells you that approxi- RAM.
detailed breakdown of
how the computer is
mately 555 MB (total kernel memory) of the To determine how much RAM you need,
using memory. total 12 GB of RAM is being used to run the list all the software applications you might
>In the Resource Monitor,
operating system. be running at one time. Figure 6.14 shows an
click the Memory tab. example of RAM requirements. In this
example, if you are running your operating
system, word processing and spreadsheet
programs, a Web browser, a music player,
and photo editing software simultaneously,
then you will need a minimum of 4.5 GB of
RAM. It’s always best to check the system
requirements of any software program

SOUND Memory Hierarchy


BYTE Interactive

In this Sound Byte, you’ll learn about the different


types of memory used in a computer system.

278 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


before you buy it to make sure your system Figure 6.15 DO YOU NEED TO UPGRADE YOUR RAM?
can handle it. System requirements can be
found on the software packaging or on the Application Current System Ideal System
manufacturer’s Web site.
How much RAM does my system
It’s a good idea to have more than the have?
minimum amount of RAM you need now,
so you can use more programs in the future. What is the maximum amount
Remember, too, that “required” means these of RAM I need for the applications
I currently run?
are the minimum values recommended by
the manufacturers, and having more RAM What is the maximum amount of
often helps programs run more efficiently. RAM the system can hold*?
When upgrading RAM, the rule of thumb is Would I be willing to upgrade to
to buy as much as you can afford but no a 64-bit operating system and
more than your system will handle. 64-bit CPU to support having
4 GB or more of RAM?

*Check the manufacturer’s specifications for your system.


Adding RAM
Is there a limit to how much RAM I
can add to my computer? Every com-
throw away the 512 MB cards you have and
puter has a maximum limit on the amount
purchase four new 1 GB cards, filling the
of RAM it can support. A motherboard is
system up to its capacity of 4 GB.
designed with a specific number of slots into
Review the considerations presented in
which the memory cards fit, and each slot
Figure 6.15 to see if your system could bene-
has a limit on the amount of RAM it can
fit from an upgrade of additional RAM.
hold. To determine your specific system
Is it difficult or expensive to add
limits, check your owner’s manual or the
RAM? Adding RAM to a computer is
manufacturer’s Web site.
fairly easy (see Figure 6.16). RAM comes
In addition, the operating system running
with installation instructions, which you
on your machine imposes its own limit. For
should follow carefully. RAM is also rela-
example, the maximum amount of RAM for
tively inexpensive compared with other sys-
the 32-bit version of Windows 7 is 4 GB,
tem upgrade options. Still, the cost of RAM
while the 64-bit version of Windows 7
fluctuates in the marketplace as much as 400
Ultimate can address up to 192 GB.
percent over time, so if you’re considering
Once you know how much RAM your
adding RAM, you should watch the prices of
computer can support, you can determine
memory in online and print advertisements.
the best configuration of memory modules
Adding RAM to a personal computer is
to achieve the greatest amount of RAM. For
quite simple and relatively inexpensive. You
example, say you have a total of four mem-
simply line up the notches and push in the
ory card slots: two are already filled with
memory module. Just be sure that you’re
512 MB RAM cards and the other two are
adding a memory module that’s compatible
empty. The maximum RAM allowed for
with your computer. For a video demonstra-
your system is 4 GB. This means you can
tion and more details, watch the Sound
buy two more 512 MB RAM modules for the
Byte, “Installing RAM.”
two empty slots, for a total of 2 GB (4 ⫻
512 MB) of RAM. Alternatively, you could
Evaluating the
SOUND
Installing RAM
Storage Subsystem
BYTE
As you’ve learned, there are two ways data
is stored on your computer: temporary stor-
In this Sound Byte, you’ll learn how to select the age and permanent storage. RAM is a form
appropriate type of memory to purchase, how to order of temporary (or volatile) storage. Thus,
memory online, and how to install it yourself. As you’ll anything that resides in RAM is not stored
discover, the procedure is a simple one and can add permanently. It’s critical to have the means
great performance benefits to your system.
to store data and software applications
permanently.

Evaluating the Storage Subsystem 279


1 2

Figure 6.16
Adding RAM to a
computer is quite simple
and relatively inexpensive. Fortunately, several storage options milliseconds—that’s less than one-hun-
exist within every computer system. dredth of a second—are typical. A DVD
Storage devices for a typical personal com- drive can take over 150 milliseconds to ac-
puter include the hard drive, USB flash cess data.
drives, optical drives, and external hard Solid state drives offer even faster access
drives. When you turn off your computer, times. A solid state drive (SSD) uses the
the data that has been written to these same kind of memory that flash drives
devices will be available the next time the use, but whereas flash drives have access
machine is powered on. These devices are times of about 1 ms, SSD drives can reach
therefore referred to as nonvolatile storage data in only a tenth of that time (around
devices. 0.1 ms). Because there are no spinning
platters or motors needed, SSDs run with
no noise, very little heat, and require
The Hard Drive very little power. As the storage capacities
What makes the hard drive the most for SSDs continue to increase and the
popular storage device? With storage prices for SSDs continue to drop, you’ll
capacities exceeding 2 terabytes (TB), a hard start to see them in a wide range of
drive has the largest storage capacity of any systems.
storage device. The hard drive is also a Figure 6.18 provides a listing of the vari-
much more economical device than other ous storage options and compares their
storage options, because it offers the most access times.
gigabytes of storage per dollar. Most system Another key performance specification
units are designed to support more than one for a hard drive is the speed at which it
internal hard drive. The Apple Mac Pro, can transfer data to other computer com-
shown in Figure 6.17, has room for four hard ponents (such as RAM). This speed of
drives. Each one simply slides into place transfer is referred to as data transfer rate.
when you want to upgrade. Depending on the manufacturer, the rate is
Another reason the hard drive is so useful expressed in either megabits or megabytes
for storage is that the hard drive’s access per second.
time, the time it takes a storage device to How is data stored on a hard
locate its stored data and make it available drive? A hard drive is composed of sev-
for processing, is faster than that of other eral coated round, thin plates of metal
permanent storage devices, like optical stacked on a spindle. Each plate is called a
drives. Hard drive access times are meas- platter. When data is saved to a hard drive
ured in milliseconds (ms), meaning thou- platter, a pattern of magnetized spots is
sandths of seconds. For large- capacity created on the iron oxide coating of each
drives, access times of approximately 12–13 platter. When the spots are aligned in one

280 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


Figure 6.17
New 1 TB The Mac Pro allows you to
hard drive slide a new hard drive into
place easily. In all, the
Mac Pro can hold up to
4 hard drives.

direction, they represent a 1; when aligned To determine the storage capacity your
in the other direction, the represent a 0. system needs, calculate the amount of stor-
These 0s and 1s are bits (or binary digits) age required by all the types of files you will
and are the smallest pieces of data that com- be keeping on your system. If you have a
puters can understand. When data stored on large digital music library, that alone could
the hard drive platter is retrieved (or read), require 30 to 50 GB. Do you keep all of your
your computer translates these patterns of photographs on your hard drive? You may
magnetized spots into the data you have need another 40 GB or more for them. If you
saved. store digital video of television shows and
How do I know how much storage movies, that could easily be 100 to 200 GB
capacity I need? Typically, hard drive more, even higher if the videos are all high
capacity is measured in gigabytes (GB), al- definition. Of course, the operating system
though hard drives with capacity in the ter- also requires storage space. The demands on
abytes (TB) are now available. To check how system requirements have grown with new
much total capacity your hard drive has, as versions of operating systems. Windows 7,
well as how much is being used, click the the latest Microsoft operating system, can re-
Start button and select Computer from the quire up to 20 GB of available hard drive ca-
right side of the Start menu. Windows dis- pacity, depending on the configuration.
plays the hard drives, their capacity, and In addition to having space for the oper-
usage information, as seen in Figure 6.19. To ating system, you need enough space to
get a slightly more detailed view, select a store the software applications you use, such
drive; then right-click and choose Properties. as Microsoft Office, music, and games.

Device Figure 6.18


Access times for non-
DVD 150 volatile storage options.

Hard drive 10
1
Flash drive 1
0.1
SSD 0.1

Access Time (ms)

Evaluating the Storage Subsystem 281


Figure 6.21 shows an example of hard drive
requirements for someone storing a few pro-
grams on a hard drive. If you plan to have a
system backup on the same drive, be sure to
budget for that room as well.
How do hard drives compare for
speed? There are several types of hard
drives. Integrated Drive Electronics (IDE),
which is also called parallel advanced technol-
ogy attachment (PATA), is an older style that
uses wide cables to connect the hard drive to
the motherboard. Serial Advanced Technol-
ogy Attachment (Serial ATA) hard drives
use much thinner cables, and can transfer
data more quickly than IDE drives. A slower
drive is fine if you use your computer
primarily for word processing, spreadsheets,
e-mail, and the Internet. However, “power
users” such as graphic designers and soft-
ware developers will benefit from the faster
Serial ATA hard drive.
Another factor that affects a hard drive’s
Figure 6.19 performance is access time (the speed with
In Windows, the free and used capacity of each device in the computer system are
which it locates data for processing). As
shown in the Computer window. The General tab of the Properties dialog box gives noted earlier, access time is measured in mil-
you information that is more detailed. liseconds. The faster the access time the bet-
>To view the Computer window, click Start, and click Computer. To view the pie ter, although many hard drives have similar
chart, right-click the C drive, and select Properties. access times.
The latest and fastest hard drive option is
the solid state drive (SSD). These are popu-
lar in the netbook market because they re-
quire so little power to run and are so cool
BITS and quiet. With access times of merely a
AND HDTV on Your Notebook tenth of a millisecond, SSDs can deliver data
BYTES many times more quickly than mechanical
hard drives. SSD drives as large as 1 TB are
If you are moving through your day with a notebook in tow, why not use it to pull up available, but right now, all SSD drives are
your favorite television shows? There are now several USB devices that allow your still much more expensive than mechanical
notebook or desktop to receive the high-definition television (HDTV) signals whizzing drives. Currently, some machines compro-
by in the airwaves. mise by using an SSD just to hold the oper-
Devices like the Hauppauge HDTV stick (see Figure 6.20) are USB digital TV ating system. This takes advantage of their
tuners. One end plugs into any available USB port. The other end connects to the pro- great speed, making the boot-up time for the
vided digital antenna. Software is included that allows you to schedule shows to system very quick. Watch for further inte-
record onto your hard drive, so your notebook essentially becomes a time-shifting gration of SSD drives into systems as the
digital video recorder. If you are at home, you can remove the an- cost of SSDs continues to drop.
tenna and connect to your home cable television signal. It’s Evaluate hard drive transfer rate when
enough to make you think about buying a larger hard looking for the best performing drive. The
drive on your next computer! data transfer rate is the speed at which a
hard drive can transfer data to other
computer components (such as RAM).
Figure 6.20 Depending on the manufacturer, the rate is
The Hauppauge HDTV expressed in either megabits or megabytes
stick allows you to watch per second. You can compare the average
and record high-definition read and write data transfer rates of hard
television shows on your drives at sites that do performance
computer. benchmarking, like Tom’s Hardware
(tomshardware.com).

282 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


If you are adding an external hard drive Figure 6.21 SAMPLE HARD DRIVE SPACE REQUIREMENTS
to your system, there are two popular ports
to use. Many hard drives use a USB 2.0 port Application Hard Drive Space Required
to connect, which limits the transfer rate
Windows 7 16–20 GB
of data to 400 Mbps. The USB 3.0 standard
has raised that limit to 5 Gbps (5,000 Mbps). MS Office 2007 Professional 3.5 GB
In addition, some computer systems
Adobe Photoshop Elements 8 2 GB
now offer an eSATA port, shown in
Figure 6.22. This is an external SATA port Roxio Easy Media Creator 2010 3 GB installation space and up to several 10’s of GB to
that will connect to some external hard copy BDs or DVDs
drive models. It allows a data transfer rate Total required At least 24.5 GB
of up to 3 Gbps.
Do I want one huge drive or
several smaller drives? It depends on
what is important to you: speed or security.
If you purchase two smaller drives, you can
combine them using RAID technology. in RAID 0. This gives you access to 500 GB
RAID (redundant array of independent of storage and incredibly quick access
disks) is a set of strategies for using more speeds, with very little power consumption
than one drive in a system. RAID 0 and or noise.
RAID 1 are the most popular for consumer
machines.
In RAID 0 configuration, every time data Optical Storage
is written to a hard drive, it is actually Optical drives are disc drives that use a
spread across two physical drives (see laser to store and read data. Data is saved to
Figure 6.23a). The write begins on the a compact disc (CD), digital video disc
first drive, and while the (DVD), or Blu-ray disc
system is waiting for (BDs) within established
that write to be completed, tracks and sectors, just like
the system jumps ahead and on a hard drive. However,
begins to write the next unlike hard drives, which
block of data to the second store their data on magnet-
drive. This makes writing ized platters, optical discs
information to disk almost store data as tiny pits that
twice as fast as using just are burned into the disc by
one hard drive. The down- a high-speed laser. These
side is that if either of these Figure 6.22 pits are extremely small.
disks fail, you lose all your An eSATA port allows you to connect For CDs and DVDs, they
data, because part of each an external hard drive that can transfer are less than 1 micron in di-
file is on each drive. So data at speeds faster than USB 2.0 but ameter, so nearly 1,500 pits
RAID 0 is for those slower than USB 3.0. fit across the top of a pin-
most concerned with head. The pits on a Blu-ray
performance. disc are only 0.15 microns in diameter, more
In RAID 1 configuration, all the data writ- than twice as small as the pits on a DVD. As
ten to one drive is perfectly mirrored and
written to a second drive (see Figure 6.23b).
This provides you a perfect, instant by in-
stant backup of all your work. It also means CD, DVD, and
SOUND
that if you buy two 1 TB drives, you only Blu-ray Reading and
BYTE
have room to store 1TB of data because the Writing Interactive
second 1 TB drive is being used as the
“mirror.” In this Sound Byte, you’ll learn about the process of
RAID 0 and RAID 1 systems are available storing and retrieving data from CD-RW, DVD, and
on many consumer systems and are even Blu-ray discs. You’ll be amazed to see how much pre-
cision engineering is required to burn MP3 files onto
beginning to appear on notebook
a disc.
computers. The Sony Vaio Z is a notebook
available with two 256 GB SSDs, connected

Optical Storage 283


File File
a b

Figure 6.23
(a) RAID 0 speeds up file
read/write time. (b) RAID 1 you can see in Figure 6.24, data is read from you want to be able to use a form of optical
gives you an instant a disc by a laser beam, with the pits and media repetitively, writing and rewriting
backup. nonpits (called lands) translating into the 1s data to it many times, read/writeable
and 0s of the binary code computers under- formats such as CD-RW, DVD-RW, and
stand. CDs and DVDs use a red laser to BD-RE are available.
read and write data. Blu-ray discs get their Do I need separate players and
name because they are read with a blue burners for CD, DVD, and now BD
laser light. All of them collectively are re- formats? Although CDs and DVDs are
ferred to as optical media. based on the same optical technology,
Why can I store data on some CD drives cannot read DVDs. If your
discs but not others? All forms of op- system has only a CD drive, you will
tical media come in prerecorded, recordable, need to add a DVD drive to view DVDs.
and rewritable formats. The prerecorded However, if your system has a DVD drive,
discs—known as CD-ROM, DVD-ROM, that is all you need, even just to listen to
and BD-ROM discs—are read-only optical CDs, because DVD drives can read them.
discs, meaning you can’t save any data Although Blu-ray discs are read with a dif-
onto them. Pre-recorded CDs usually ferent type of laser than CDs and DVDs,
contain audio content, software programs, most Blu-ray players are backward compat-
or games, whereas DVD-ROMs and ible and can play DVDs and CDs. There are
BD-ROMs typically contain movies or different types of optical drives for playing
prerecorded TV shows in regular or high or recording to discs. If you want to record
definition, respectively. Recordable formats to CDs, DVDs, or Blu-ray discs, you need to
such as CD-R, DVD-R, and BD-R allow data make sure your drive is capable of record-
to be written (saved or burned) to them. If ing (or burning) and not just playing.

284 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


Because recording drives are also backward To read information stored on a disc, a laser inside the disk drive sends a
compatible, you do not need separate beam of light through the spinning disc.
burners for each form of media. A DVD
burner will also record CDs, and a Blu-ray
burner will most likely record both CDs and
DVDs (although there may be some
compatibility issues).
Are there different standards of
optical media? Unfortunately, technol- Non-scattered
ogy experts have not agreed on a standard Laser reflected light = 1
beam
DVD format. Currently, there are multiple Laser
recognized formats, DVD-R/RW beam
Scattered
(pronounced “DVD dash”) and reflected light = 0
DVD+R/RW (pronounced “DVD plus”).
DVD-RAM is a third format. You can
record, erase, and rewrite on DVD-RAM, as
you can with the plus and minus formats,
If the light reflected back is If non-scattered light is reflected
but DVD-RAM discs are generally encased scattered in all directions back to the laser (which happens
in a plastic cartridge. Web sites such as (which happens when the laser when the laser hits an area in
Video Help (videohelp.com) list the com- hits a pit), the laser translates which there is no pit), the laser
this into the binary digit 0. translates this into the binary digit 1.
patibility of various DVD players with the
various DVD formats. However, you must
make sure you purchase blank DVD discs
that match the type of drive you own. Most
Spinning disc
new systems come equipped with a DVD
+/– RW drive that supports both the plus
and minus formats.
There were “format wars” like this for
high-definition discs as well. Blu-ray com-
peted against another storage format called
In this way, the laser reads the pits and
HD-DVD (high-definition DVD). Some non-pits as a series of bits (0s and1s),
movie companies would only provide their which the computer can then process.
films on HD discs, while other films were
exclusive to Blu-ray. Different players were Figure 6.24
required to view each kind of disc. In 2008, Data is read from a disc using focused laser light.
HD-DVDs were retired, and HD discs and
players are no longer in production.
Are some CD and DVD drives drive provides a data transfer rate of
faster than others? When you buy an approximately 1.3 MB of data per second,
optical drive, knowing the drive speed is which is roughly equivalent to a CD-ROM
important. Speeds are listed on the device’s speed of 9X. CD and DVD drives are con-
packaging. Record (write) speed is always stantly getting faster. If you’re in the market
listed first, rewrite speed is listed second for a new CD or DVD burner, then you’ll
(except for CD-R drives and DVD-R, which want to investigate the drive speeds on the
cannot rewrite data), and playback speed is market and make sure you get the fastest
listed last. For example, a CD-RW drive one you can afford.
may have speeds of 52X32X52X, meaning Blu-ray drives are the fastest optical
that the device can record data at 52X devices on the market. Blu-ray technology
speed, rewrite data at 32X speed, and play defines 1X speed as 36 MB per second.
back data at 52X speed. For CDs, the X after
each number represents the transfer of
150 KB of data per second. For example, a
SOUND Installing a Blu-ray
BYTE Drive
CD-RW drive with a 52X32X52X rating
records data at 52 times 150 KB per second,
or 7,800 KB per second. In this Sound Byte, you’ll learn how to install a Blu-ray
DVD drives are much faster than CD drive in your computer.
drives. For example, a 1X DVD-ROM

Optical Storage 285


DIG
DEEPER
How a Mechanical Hard Drive Works

The thin metal platters that make up a hard drive are covered with a spe-record (write) the magnetic data to and from the hard drive platter. As
cial magnetic coating that enables the data to be recorded onto one or noted earlier, the average total time it takes for the read/write head to
both sides of the platter. Hard drive manufacturers prepare the disks to locate the data on the platter and return it to the CPU for processing is
hold data through a process called low-level formatting. In this process,called its access time. A new hard drive should have an average access
concentric circles, each called a track, and pie-shaped wedges, each time of approximately 12 ms.
called a sector, are created in the magnetized surface of each platter, Access time is mostly the sum of two factors: seek time and latency.
The time it takes for the read/write heads to move over the surface of the
setting up a gridlike pattern that identifies file locations on the hard drive.
A separate process called high-level formatting establishes the catalog disk, moving to the correct track, is called the seek time. (Sometimes
that the computer uses to keep track of where each file is located on thepeople incorrectly refer to this as access time.) Once the read/write head
hard drive. More detail on this is presented in the Dig Deeper feature locates the correct track, it may need to wait for the correct sector to
“How Disk Defragmenter Utilities Work” on page 238. spin to the read/write head. This waiting time is called latency (or
Hard drive platters spin at a high rate of speed, some as fast as rotational delay ). The faster the platters spin (or the faster the rpm), the
15,000 revolutions per minute (rpm). Sitting between the platters are less time you’ll have to wait for your data to be accessed. Currently, most
special “arms” that contain read/write heads (see Figure 6.25). A hard drives for home systems spin at 7,200 rpm. Some people design
read/write head moves from the outer edge of the spinning platter to their systems to have a faster hard drive run the operating system, such
the center, as frequently as 50 times per second, to retrieve (read) and as the Western Digital Velociraptor, which spins at 10,000 rpm. They then
add a slower drive with greater capacity for storage.
The read/write heads do not touch the platters of the hard
Read/write head drive; rather, they float above them on a thin cushion of air at
Arms a height of 0.5 microinches. As a matter of comparison, a
human hair is 2,000 microinches thick and a particle
of dust is larger than a human hair. Therefore, it’s
critical to keep your hard drive free from all dust
and dirt, because even the smallest particle could
find its way between the read/write head and the
disk platter, causing a head crash—a stoppage of
the hard drive that often results in data loss.
Capacities for hard drives in personal comput-
ers can exceed 2000 GB (2 TB). Increasing the
amount of data stored in a hard drive is achieved
either by adding more platters or by increasing the
Platters amount of data stored on each platter. How tightly
the tracks are placed next to each other, how
tightly spaced the sectors are, and how closely the
bits of data are placed affect the measurement of
the amount of data that can be stored in a specific
Figure 6.25 area of a hard drive platter. Modern technology
The hard drive is a stack of platters enclosed in a sealed case. Special arms fit in continues to increase the standards on all three
between each platter. The read/write heads at the end of each arm read from and levels, enabling massive quantities of data to be
save data to the platters. stored in small places.

Because BD movies require data transfer Evaluating the Video


rates of at least 54 MB per second, most
Blu-ray disc players have a minimum of
Subsystem
2X speeds (72 MB per second). Many units How video is displayed depends on two
are available with 12X speeds. components: your video card and your
So how do my storage devices monitor. It’s important that your system
measure up? The table in Figure 6.26 have the correct monitor and video card to
will help you determine if your computer’s meet your needs. If you are considering
storage subsystem needs upgrading. loading Windows 7 on your system, or

286 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


Figure 6.26 DO YOU WANT TO UPGRADE YOUR STORAGE SUBSYSTEM?

Current System Ideal System


What is my current hard drive capacity?

Do I want to have a very fast startup time (i.e., use an SSD drive for
my operating system)?

Do I want to implement multiple drives in RAID 0 for performance?


Do I want to implement multiple drives in RAID 1 for instant backup?

Do I have a DVD-ROM drive?

Can I burn DVDs (i.e., do I have a DVD-/+RW drive)?

Can I play Blu-ray discs (i.e., do I have a Blu-ray drive)?

Can I burn my own Blu-ray discs (i.e., do I have a Blu-ray burner installed)?

Do I have a working data backup solution such as external backup drives or


remote data storage?

Do I use any portable storage devices such as flash drives or external


hard drives?

using your computer system to display files ACTIVE Evaluating


that have complex graphics, such as videos HELP- Computer System
on Blu-ray or from your camcorder, or even DESK
playing graphics-rich games with a lot of
Components
fast action, you may want to consider In this Active Helpdesk call, you’ll play the role of a
upgrading your video subsystem. helpdesk staffer, fielding calls about the computer’s
storage, video, and audio devices and how to evaluate
Video Cards whether they match your needs, as well as how to
improve the reliability of your system. Figure 6.27
What is a video card? A video card
(or video adapter) is an expansion card Video cards have grown
that is installed inside your system unit to to be highly specialized
subsystems.
translate binary data into the im-
ages you view on your monitor.
Modern video cards like the ones Processor covered Video memory chips
shown in Figure 6.27 and by heat sink and fan

Video memory chip

Video memory chip Clips into motherboard


Connects to
HDMI port to
VGA monitor
digital monitor

S-video port to TV, Digital Video Interface (DVI)


stereo, or VCR port to digital monitor

Evaluating the Video Subsystem 287


Special lighting effects can be achieved
Fan built into with a modern GPU. Designers can now
graphics card change the type of light, the texture, and the
color of objects based on complex interac-
tions. Some GPU designs incorporate
dedicated hardware to allow high-definition
movies to be decoded.
Does the GPU live on the mother-
board or on the video card? Basic
video processing is sometimes integrated
into the motherboard. However, high-end
Figure 6.28 video cards that have their own GPUs are
are extremely separate from the motherboard. These so-
sophisticated. They in- phisticated video cards connect through the
clude ports that allow you ultrafast PCI Express bus. The ATI Radeon
to connect to different video HD 5970, a top-end card, is a multi-GPU
equipment such as the DVI ports card with two GPUs that work together to
for digital LCDs, HDMI ports to con- add even more processing punch. Cards like
nect to high-definition TVs or gaming this one carry their own processing RAM
Figure 6.28 consoles, lower-resolution S-video ports for space, which can range between 512 MB and
connecting your computer to a TV, and 2 GB, depending on the model. Together
Because of the large
amount of graphics Super VGA ports for CRT and analog LCD they provide an unprecedented level of real-
memory and the fast monitors. In addition, video cards include ism and detail in gaming environments.
graphics processing units their own RAM, called video memory. Sev- How can I tell how much memory
on modern video cards, eral standards of video memory are avail- my video card has? Information about
they have their own fan to
able, including graphics double data rate 3 your system’s video card can be found in the
remove heat.
(GDDR3) memory and the newer graphics Advanced Settings of the Screen resolution
double data rate 5 (GDDR5) memory. dialog box. To get to the Screen resolution di-
Because displaying graphics demands a lot alog box, right-click on your desktop and se-
of the CPU, video cards also come with their lect Screen resolution. In the Screen
own graphics processing units (GPUs). resolution dialog box, click the Advanced
When the CPU is asked to process graphics, Settings link. A window will appear that
those tasks are redirected to the GPU, signif- shows you the type of graphics card installed
icantly speeding up graphics processing. in your system, as well as memory informa-
Is a GPU different from a CPU? tion including total available graphics mem-
The graphics processing unit (GPU) ory, dedicated video memory, system video
performs the same kind of computational memory, and shared system memory. The
Figure 6.29
work that a CPU performs. However, a GPU documentation that came with your com-
The graphics processing is specialized to handle 3-D graphics and puter should also contain specifications for
unit (GPU) is specialized
to handle processing of image and video processing with incredible the video card, including the amount of
photos, videos, and video efficiency and speed. Figure 6.29 shows that video memory it has installed.
game images. It frees the the CPU can run much more efficiently when How much memory does my video
CPU to work on other a GPU does all of the graphics computation. card need? The amount of memory your
system demands.

Without an NVIDIA GPU With an NVIDIA GPU

Without a GPU With a GPU

288 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


video card needs depends on what you Figure 6.30 BIT DEPTH AND COLOR QUALITY
want to display on your monitor. If you
work primarily in Microsoft Word and Bit Depth Color Quality Description Number of Colors Displayed
conduct general Web searches, 128 MB is a 4-bit Standard VGA 16
realistic minimum. For the serious gamer, a
512 MB or greater video card is essential, 8-bit 256-color mode 256
although cards with as much as 1 or 2 GB 16-bit High color 65,536
are available in the market and are pre-
ferred. These high-end video cards, which 24-bit True color 16,777,216
have greater amounts of memory, allow 32-bit True color 16,777,216 plus 8 bits to help with
games to generate smoother animations and transparency
more sophisticated shading and texture.
Before purchasing new software, check the video card displays 16 colors, the minimum
specifications to ensure your video card has number of colors your system works with
enough video memory to handle the load. (referred to as Standard VGA). Most video
How many video cards can I add to cards today are 24-bit cards, displaying
a system? For users who are primarily more than 16 million colors. This mode is
doing text processing or spreadsheet work, called true color mode (see Figure 6.30).
one video card is certainly enough. How- The most recent generation of video cards
ever, computer gamers and users of high- can add some great features to your
end visualization software often take computer if you are a TV fan. Multimedia
advantage of the ability to install more than cards such as the ATI All-In-Wonder Radeon
one video card at a time. Two or even three HD 3650 can open a live TV window on
video cards can be used in one system. The your screen, including features such as
two major video card manufacturers, Nvidia picture-in-picture. Using this video card,
and ATI, have each developed their own you can record programs to your hard drive
standards supporting the combining of mul- or pause a live TV broadcast. The card even
tiple video cards. For Nvidia this standard is comes with a wireless remote control.
named SLI and for ATI it is called CrossFire. When is it time to get a new video
When the system is running at very high card? If your monitor takes a while to
video resolutions, such as 1920 ⫻ 1200 or refresh when you are editing photos, surfing
higher, multiple video cards working to- the Web, or playing a graphics-rich game, then
gether provide the ultimate in performance. the video card could be short on memory or
If you are buying a new system and might the GPU is being taxed to beyond its capacity.
be interested in employing multiple video You also may want to upgrade if added
cards, be sure to check whether the mother- features such as television viewing or im-
board supports SLI or CrossFire. porting analog video are important to you.
What else does the video card do? If you want to use multiple monitors at the
The video card also controls the number of same time, you also may need to upgrade Figure 6.31
colors your monitor can display. The num- your video card. Working with multiple
ber of bits the video card uses to represent Cards like the (a) ATI 5870
monitors is a great advantage if you often Eyefinity support (b) six
each pixel (or dot) on the monitor, referred have more than one application running at a monitors, which can be
to as bit depth, defines the color quality of time (see Figure 6.31). ATI has introduced a combined in any way.
the image displayed. The more bits, the
better an image’s color detail. A 4-bit
b
a

Evaluating the Video Subsystem 289


BITS into a household stereo system, or playing
AND 3D Explosions games with sophisticated sound tracks, you
BYTES may want to upgrade your speakers or your
sound card.
Most video games produced since 2007 are now ready to be seen in 3D, but the mar-
ket of 3D monitors has been slow in coming. Currently, several computer monitors
and televisions that support 3D are being released. Most video cards that support at Sound Cards
least two monitors are capable of running 3D imagery. Sony PlayStation has updated
its firmware to support 3D games and movies. So by adding a 3D monitor, and the What does the sound card do? Like a
snazzy glasses that come along, you can move from two dimensions forward into video card, a sound card, is an expansion card
three! that attaches to the motherboard inside your
system unit. Just as the video card enables
your computer to produce images on the
monitor, a sound card enables the computer
to produce sounds. Most systems have a sep-
single card that can support up to six moni- arate sound card, although low-end comput-
tors. “Surround sight” allows you to merge ers often have integrated the job of managing
all six monitors to work as one screen or to sound onto the motherboard itself.
combine them into any subset—for example, Can I hook up a surround-sound
displaying a movie on two combined system to my computer? Many
screens, Excel on one monitor, Word on computers ship with a basic sound card,
another, and a browser spread across the which is often a 3D sound card. The 3D
final two. sound technology advances sound repro-
Review the considerations listed in duction beyond traditional stereo sound
Figure 6.32 to see if it might be time for you (where the human ear perceives sounds as
to upgrade. On a desktop computer, replac- coming from the left or the right of the
ing a video card is fairly simple: just insert performance area) and is better at convinc-
the new video card in the correct expansion ing the human ear that sound is omnidirec-
slot on the motherboard. tional, meaning that you can’t tell from
which direction the sound is coming. This
tends to produce a fuller, richer sound than
Evaluating the Audio stereo sound. However, 3D sound is not
surround sound.
Subsystem What is surround sound
Computers output sound by means of then? Surround sound is a type of audio
speakers (or headphones) and a sound card. processing that makes the listener experi-
For many users, a computer’s preinstalled ence sound as if it were coming from all
speakers and sound card are adequate for directions. The current surround sound
the sounds produced by the computer standard is from Dolby. There are many
itself—the beeps and so on that the formats available, including Dolby Digital
computer makes. However, if you’re EX and Dolby Digital Plus for high-
listening to music, viewing DVDs, hooking definition audio. Dolby TrueHD is the

Figure 6.32 DO YOU NEED TO UPGRADE YOUR VIDEO CARD?

Current System Ideal System


Is my video card able to refresh the screen fast enough for
the videos and games I play?

What is the total amount of video memory on my video card?

How many monitors can this card support?

Can I import video through my video card?

Can I send a cable television signal to my video card?

Does my video card support the highest quality port for my


monitor—DVI? HDMI?

290 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


ETHICS
IN IT Optical Technology: A Free Lunch—Or at Least a Free Copy

Decades ago, when the electronic photocopier made its debut, book every month, and about one-quarter of all Internet users worldwide have
publishers and others who distributed the printed word feared they downloaded a movie from the Internet.
would be put out of business. They were worried that people would no In a separate survey, the Recording Industry Association of America
longer buy books and other printed matter if they could simply copy (RIAA), a trade organization that represents the interests of recording gi-
someone else’s original. Years later, when audiocassette and VCR players ants such as Sony, Capitol Records, and other major producers of musi-
and recorders arrived on the market, those who felt they would be nega- cal entertainment, reported that 23 percent of music fans revealed they
tively affected by these new technologies expressed similar concerns. were buying less music because they could download it or copy a CD-
Now, with the arrival of CD-RW, DVD-RW, and BD-RE technology, the ROM from a friend.
music and entertainment industries are worried because users can copy As you would expect, the music and entertainment industries want to
CDs, DVDs, and Blu-ray discs in a matter of minutes. be fairly compensated for their creative output. They blame the technol-
Although photocopiers and VCRs certainly didn’t put an end to the in- ogy industry for the creation of means by which artists, studios, and the
dustries they affected, some people still say the music and entertainment entertainment industry in general are being “robbed.” Although technol-
industries will take a significant hit with CD-RW, DVD-RW, and BD-RE tech- ogy that readily allows consumers to transfer and copy music and videos
nology. Industry insiders are claiming that these technologies are unethi- exists, the artists who produce these works do not want to be taken ad-
cal, and they’re pressing for increased federal legislation against such vantage of. However, others claim that the technology industry should
copying. It’s not just the CD-RW, DVD-RW, BD-RE technology that’s causing not bear the complete burden of protecting entertainment copyrights.
problems, either, because “copies” are not necessarily of the physical sort. The RIAA sums up the future of this debate nicely: “Goals for the new
Thanks to the Internet, file transfers of copyrighted works—particularly millennium are to work with [the recording] industry and others to enable
music and films—is now commonplace. According to Music United technologies that open up new opportunities but at the same time to pro-
(musicunited.org), more than 243 million files are downloaded illegally tect the rights of artists and copyright owners.”

newest standard. It features high-definition computer? To do so, you need more ports,
and lossless technology, in which no data is which are provided on upgraded sound
lost in the compression process. To create cards like the one shown in Figure 6.34.
surround sound, Dolby takes digital sound With an upgraded sound card, you can
from a medium (such as a DVD-ROM) and connect portable minidisc players, portable
reproduces it in eight channels. Seven chan- media players, portable jukeboxes, head-
nels cover the listening field with placement phones, and CD players to your computer.
to the left front, right front, and center of the Musicians also create music on their com-
audio stage, as well as the left rear and right puters by connecting special devices (such
rear, and then two extra side speakers are as keyboards) directly to sound card ports.
added, as shown in Figure 6.33. The eighth To determine whether your audio subsys-
channel holds extremely low-frequency tem is meeting your needs, review the table
sound data and is sent to a subwoofer, in Figure 6.35.
which can be placed anywhere in the room.
To set up surround sound on your com-
puter, you need two things: a set of Evaluating System
surround-sound speakers and, for the great-
est surround-sound experience, a sound Reliability
card that is Dolby Digital–compatible. Many computer users decide to buy a new
I don’t need surround sound on my system not necessarily because they need a
computer. Why else might I need to faster CPU, more RAM, or a bigger hard
buy an upgraded sound card? Most drive, but because they are experiencing
basic sound cards contain the following problems such as slow performance, freezes,
input and output jacks (or ports): micro- and crashes. Over time, even normal use can
phone in, speaker out, and line in. This al- cause your computer to build up excess files
lows you to hook up a set of stereo speakers and to become internally disorganized. This
and a microphone. But what if you want to excess, clutter, and disorganization can lead
hook up a right and left speaker individu- to deteriorating performance or, far worse,
ally, or attach other audio devices to your system failure. If you think your system is

Evaluating System Reliability 291


unnecessary program and select Delete
Front left Central Front right to remove it from the Startup folder.
speaker speaker speaker Make sure you delete only programs
you are absolutely sure are unneces-
sary. Another way programs sneak their
way in is to load themselves into your
system tray. Keep an eye on how many
icons are in the system tray and unin-
stall any that you do not use frequently.
2. Clear out unnecessary files. Temporary
Internet files can accumulate quickly on
your hard drive, taking up unnecessary
Subwoofer space. Running the Disk Cleanup utility
Computer is a quick and easy way to ensure your
system temporary Internet files don’t take up
precious hard drive space. Likewise,
you should delete any unnecessary files
from your hard drive regularly, because
they can make your hard drive run
more slowly.
3. Run spyware and adware removal pro-
Side grams. These often detect and remove
Side
speaker L speaker R different pests and should be used in
addition to your regular antivirus pack-
age. You can find more details on how
to keep your system safe from spyware,
adware, and viruses in Chapter 9.
4. Run the Disk Defragmenter utility on
your hard drive. When your hard drive
becomes fragmented, its storage capac-
ity is negatively affected. When you
Rear left Rear right defragment (defrag) your hard drive,
speaker speaker files are reorganized, making the hard
drive work more efficiently. For a more
complete discussion of the Disk Defrag-
Figure 6.33
unreliable, see if the problem is one you can menter, refer to Chapter 5.
Dolby Digital 7.1 surround fix before you buy a new machine. Proper
sound gives you better- The utilities that need to be run more
quality audio output. upkeep and maintenance also may
than once, like Disk Cleanup, Disk Defrag-
postpone an expensive system upgrade or
menter, and the antivirus and spyware pro-
replacement.
grams, can be configured to run
What can I do to ensure my system
automatically at any time interval you want.
performs reliably? Here are several
You can set up a sequence of programs to
procedures you can follow to ensure your
run one after the other every evening while
system performs reliably:
you sleep, and wake up each day to a reli-
1. Clean out your Startup folder. Some able, secure system.
programs install themselves into your My system crashes often during
Startup folder and run automatically the day. What can I do? Computer
each time the computer starts up, systems are complex. It’s not unusual to
whether you are using them or not. have your system stop responding occasion-
This unnecessary load uses up RAM, ally. If rebooting the computer doesn’t help,
leaving less for other programs. To min- you’ll need to begin troubleshooting:
imize this problem, check your Startup
folder by clicking Start ⬎ All Programs. 1. Check that you have enough RAM,
Then click on the Startup folder and which you learned how to do in the
make sure all the programs listed are section “Evaluating RAM: The Memory
important to you. Right-click on any Subsystem” earlier in this chapter.

292 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


Systems with insufficient amounts of
RAM often crash.
2. Make sure you have properly installed
any new software or hardware. If
you’re using a Windows system, use
the System Restore utility to “roll
back” the system to a time when it
worked more reli-
ably. (To find
System Re-
store, just type Analog/Digital Output
“restore” into
Line Input Signal
the Start menu
search box.) For Mac
Microphone Input
systems, Mac OS X Time
Machine, shown in Figure 6.36,
Line Output
provides automatic backup and
enables you to look through and restore Rear S
R Speaker
k Output
(if necessary) files, folders, libraries, or
the entire system. FireWire ( IEEE 1394)
3. If you see an error code in Windows,
visit the Microsoft Knowledge Base
(support.microsoft.com), an online to capture the exact steps that lead to it. In Figure 6.34
resource for resolving problems with Windows 7, go to the Start menu and search In addition to improving
Microsoft products. This may help you for “psr.” Run the Problem Steps Recorder sound quality, upgraded
determine what the error code indicates sound cards can provide
and go through the exact actions that create additional ports for your
and how you may be able to solve the the problem you are having. At any particu- audio equipment.
problem. If you don’t find a satisfactory lar step, you can click the Annotate button
answer in the Knowledge Base, try and add a comment about any part of the
copying the entire error message into screen. PSR then produces a documented re-
Google and searching the larger port, complete with images of your screen
community for solutions. and descriptions of each mouse movement
Can my software affect system you made. You can then e-mail this report,
reliability? Having the latest version of which is compressed in the WinZip format,
software products makes your system much to customer support to help technicians re-
more reliable. You should upgrade or solve the problem.
update your operating system, browser How do I know whether updates
software, and application software as often are available for my software? You
as new patches (or updates) are reported for can configure Windows so that it automati-
resolving errors. Sometimes these errors are cally checks for, downloads, and installs any
performance-related; sometimes they are available updates for itself, Internet Ex-
potential system security breaches. plorer, and other Microsoft applications
If you are having a problem that can be such as Microsoft Office. Many other appli-
replicated, use the Problem Steps Recorder cations now also include the ability to check

Figure 6.35 DO YOU NEED TO UPGRADE YOUR AUDIO SUBSYSTEM?

Current System Ideal System


Is the speaker quality high enough for the way I am using my computer?

Is my sound card capable of 3D sound?

Does my sound card support Dolby Digital surround sound?

Do I have 5.1-channel surround sound or 7.1-channel surround sound?

Do I have an HDMI port on the audio card?

Evaluating System Reliability 293


system to determine what upgrades
might be required before you convert to
Windows 7. Be sure to examine the
recommended (not required) specifica-
tions of the new operating system.
2. Reinstall the operating system. As a
last resort, you might need to reinstall
the operating system. To do so, you’ll
want to back up all of your data files
before the installation and be prepared
to reinstall all your software after the
installation. Make sure you have all
of the original discs for the software
installed on your system, along with
the product keys, serial numbers, and
any other activation codes so that you
Figure 6.36 can reinstall them.
for updates. Check under the Help menu of
Mac’s Time Machine the product, and often you will find a Check
restores files, folders, for Updates command.
libraries and, if necessary, Making the Final
What if none of this helps? Is buy-
the entire system. Decision
ing a new system my only option? If
your system is still unreliable after these Now that you have evaluated your com-
changes, then you have two options: puter system, you need to shift to questions
1. Upgrade your operating system to the of value. How closely does your system
latest version. There are substantial come to meeting your needs? How much
increases in reliability with each major would it cost to upgrade the system you
release of a new operating system. have to match what you’d ideally like your
However, upgrading the operating computer to do, not only today but also a
system may require hardware upgrades few years from now? How much would it
such as additional RAM, an updated cost to purchase a new system that meets
graphics processor, and an even larger these specifications?
hard drive. The Microsoft Windows 7 To decide whether upgrading or buying a
Upgrade Advisor (a free download new system has better value for you, you
from (microsoft.com) will scan your need to price both scenarios. Figure 6.37

Figure 6.37 UPGRADE/NEW PURCHASE COMPARISON WORKSHEET

Additional Expense If Not Included


Needs Hardware Upgrade Cost Included on New System? on New System

CPU and Memory Subsystems


CPU upgrade

RAM upgrade

Storage Subsystem
Hard drive upgrade

SSD drive

DVD+/-RW burner
Blu-ray burner

Video and Audio Subsystems


Video card upgrade

Sound card upgrade

294 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


TRENDS
IN IT Computers in Society: How to Donate Your Old Computer Safely

What happened to your last computer? If you threw it away hoping it These programs provide secure hard drive erasures, either of specific
would be safely recycled with your empty water bottles, think again. files on your hard drive or of the entire hard drive.
Mercury in LCD screens, cadmium in batteries and circuit boards, and Keep in mind that even these data erasure programs can’t provide the
flame retardant in plastic housings all are toxic. An alarming, emerging ultimate level in security. Computer forensic specialists or supercyber-
trend is that discarded machines are beginning to create an e-waste criminals can still manage to retrieve some data from your hard drive if
crisis. they have the right tools. The ultimate level of protection comes from de-
Instead of throwing your computer away, you may be able to donate stroying the hard drive altogether. Suggested methods include drilling
it to a nonprofit organization. Many manufacturers, such as Dell, offer re- holes in the hard drive, burning or melting it, or just taking an old-fash-
cycling programs and have formed alliances with nonprofit organizations ioned sledgehammer to it! For large companies that need to upgrade large
to help distribute your old technology to those who need it. Sites like quantities of computers and have the options of destroying or recycling
Computers With Causes (computerswithcauses.org) organize dona- their old computers, the problem becomes much worse. In these cases,
tions of both working and nonworking computers, printers, and mice. You recycling isn’t a good option, and throwing the computers away can create
can also take your computer to an authorized computer recycling center an environmental hazard. Companies such as GigaBiter (gigabiter.com)
in your area (see Figure 6.38). The Telecommunications Industry Associ- eliminate security and environmental risks associated with electronic
ation provides an e-cycling information site you can use to find a local destruction by first delaminating the hard drive and then breaking down
e-cycling center (eiae.org). the computer e-waste into recyclable products. The result of the final step
However, before donating or recycling a computer, make sure you is a sandlike substance that is 100 percent recyclable.
carefully remove all data from your hard drive, or you may end up having
your good deed turn bad by becoming the victim of
identity theft. Credit card numbers, bank information,
Social Security numbers, tax records, passwords, and
personal identification numbers (PINs) are just some of
the types of sensitive information that we casually
record to our computers’ hard drives. Just deleting files
that contain proprietary personal information is not
protection enough. Likewise, reformatting or erasing
your hard drive does not totally remove data, as was
proved by two MIT graduate students. In 2003, they
bought more than 150 used hard drives from various
sources. Although some of the hard drives had been re-
formatted or damaged so the data was supposedly ir-
recoverable, the two students were able to retrieve
medical records, financial information, pornography,
personal e-mails, and more than 5,000 credit card
numbers!
The U.S. Department of Defense suggests a seven-
layer overwrite for a “secure erase.” In other words,
they suggest that you fill your hard drive seven times
over with a random series of 1s and 0s. Fortunately,
several programs exist for PCs running Windows, such Figure 6.38
as Active@ Kill Disk, Eraser, and CyberScrub. Wipe is An electronics scrap recycler “demanufactures” printers, computers, and other
available for Linux, and ShredIt X can be used for OS X. electronics and then resells the usable parts.

provides an upgrade worksheet you can use Would you donate it to a charitable organi-
to evaluate both the upgrade path and the zation? Would you be able to give it to a
new purchase path. Be sure to consider what family member? Purchasing a new system is
benefit you might obtain by having two sys- an important investment of your resources,
tems if you were to buy a new computer. and you want to make a well-reasoned,
Would you have a use for the older system? well-supported decision.

Making the Final Decision 295


six
six summary
chapter

1. How can I determine whether I 4. What are the computer’s main


should upgrade my existing computer storage devices, and how can I
or buy a new one? evaluate whether they match my
summary

To determine whether you need to upgrade needs?


your system or purchase a new one, you Storage devices for a typical computer sys-
need to define your ideal system and what tem may include a hard drive, an SSD drive,
you want it to do. Then you need to perform a flash drive, and CD and DVD drives. Blu-
a system evaluation to assess the subsystems ray drives are gaining in popularity for
in your computer, including the CPU, viewing and burning high-density media.
memory, storage, video, and audio. Finally, When you turn off your computer, the data
you need to determine if it’s economical to stored in these devices remains. These
upgrade, or whether buying a new devices are referred to as nonvolatile storage
computer would be better. devices. Hard drives have the largest stor-
age capacity of any storage device and are
the most economical. Newer SSD drives
2. What does the CPU do, and how can I
have the fastest access time and data
evaluate its performance? transfer rate of all nonvolatile storage
Your computer’s CPU processes instruc- options. CDs and DVDs have capacities
tions, performs calculations, manages the from 700 MB to 17 GB, while Blu-ray discs
flow of information through the computer can hold up to 50 GB. Portable flash drives
system, and is responsible for processing the allow easy transfer of 64 GB or more of
data you input into information. CPU speed data from machine to machine. To deter-
is measured in gigahertz (billions of mine the storage capacity your system
machine cycles per second). You can tell needs, calculate the amount of storage your
whether your CPU is limiting your system software needs to reside on your computer.
performance by watching how busy it is as To add more storage or to provide more
you work on your computer. The percentage functionality for your system, you can
of time that your CPU is working is referred install additional drives, either internally
to as CPU usage, which you can determine or externally.
by checking the Task Manager. Benchmark-
ing software offers direct performance
comparisons of different CPUs.
5. What components affect the output of
video on my computer, and how can
3. How does memory work in my I evaluate whether they match my
computer, and how can I evaluate needs?
how much memory I need?
How video is displayed depends on two
RAM is your computer’s temporary components: your video card and your
memory. It remembers everything that the monitor. A video card translates binary data
computer needs to process data into infor- into the images you see. These cards include
mation. However, it is an example of volatile their own RAM (video memory) as well as
storage. When the power is off, the data ports that allow you to connect to video
stored in RAM is cleared out. The amount of equipment. The amount of video memory
RAM sitting on memory modules in your you need depends on what you want to dis-
computer is your computer’s physical mem- play on the monitor. A more powerful card
ory. The memory your OS uses is kernel will allow you to play graphics-intense
memory. At a minimum, you need enough games and multimedia.
RAM to run the OS plus the software appli-
cations you’re using, plus a bit more to hold
the data you will input.

296 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


summary
six six

chapter
6. What components affect the quality you buy a new system because you think
of sound on my computer, and how yours may be unreliable, make sure the
can I evaluate whether they match problem is not one you can fix. Run a full
my needs? scan with antispyware software. Make sure
Your computer’s sound depends on your you have installed any new software or
speakers and sound card. A sound card hardware properly, check that you have
enables the computer to produce sounds. enough RAM, run system utilities such as
Users upgrade their sound cards to provide Disk Defragmenter and Disk Cleanup, clean
for 3D sound, surround sound, and addi- out your Startup folder, remove unnecessary
tional ports for audio equipment. files from your system, and keep your soft-
ware updated with patches. If you continue
to have troubles with your system, reinstall
7. How can I improve the reliability of or upgrade your OS, and, of course, seek
my system? technical assistance.
Many computer users decide to buy a new
system because they are experiencing prob-
lems with their computer. However, before

297
six
six key terms
chapter

3D sound card ...................................................... 290 kernel memory..................................................... 278


access time ............................................................ 280 latency ................................................................... 286
BD-ROM disc ...................................................... 284 memory module (memory card)....................... 277
key terms

benchmarks .......................................................... 275 Moore’s Law ......................................................... 268


bit depth ............................................................... 289 nonvolatile storage ............................................. 276
Blu-ray disc .......................................................... 283 optical media ....................................................... 284
cache memory ...................................................... 274 physical memory ................................................ 277
clock speed ........................................................... 273 platter .................................................................... 280
core ......................................................................... 273 random access memory (RAM) ........................ 276
CPU usage ............................................................ 275 read/write head.................................................... 286
data transfer rate ................................................. 280 Serial Advanced Technology
DVD-RAM ........................................................... 285 Attachment (SATA) ......................................... 282
DVD-ROM ........................................................... 284 sector...................................................................... 286
DVD-R/RW........................................................... 285 seek time ............................................................... 286
DVD+R/RW ......................................................... 285 solid state drive (SSD) ....................................... 280
external SATA (eSATA) ...................................... 272 sound card ............................................................ 290
ExpressCard.......................................................... 272 surround sound ................................................... 290
front side bus (FSB) ............................................ 274 system evaluation ............................................... 272
graphics processing unit (GPU) ....................... 288 track ....................................................................... 286
hard drive ............................................................. 280 video card (video adapter)................................. 287
head crash ............................................................. 286 video memory ...................................................... 288
hyperthreading .................................................... 273 volatile storage .................................................... 276

298 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


buzzwords
six six

chapter
Word Bank
• access time • express cards • RAM
• Blu-ray disc • front side bus • sound card

buzzwords
• cache memory • GPU • SSD
• CPU usage • hard drive • surround sound
• data transfer rate • memory module • system evaluation
• eSATA • Moore’s law

Instructions: Fill in the blanks using the words from the Word Bank above.

Joe already has a PC but just heard about a great deal on a new one. He decides to perform
a(n) (1) __________ on his computer to see whether he should keep it or buy the new one.
First, he runs the Task Manager in Windows. By doing so, he can check the history of
(2) __________ as he works through his day. Because he is often over 90 percent, he begins to
suspect his system is suffering from too little (3) __________. He has room for an additional
two (4) __________ on his motherboard. Adding memory is something he learned how to do
this semester, but would that be enough to make this machine do all he needs?
He visits the Intel Web site to check two other important factors on his model of CPU: the
amount of (5) __________ memory and the speed of the (6) __________. It looks like the
newer i7 processor would be much faster overall. It seems each generation of processors is
so much faster than the last. That rule, (7) __________, is still holding true!
He continues to evaluate his system by checking out which components he has and which
ones he’ll need. He notes the storage capacity of the (8) __________. Recently, he has been
wishing his system had a(n) (9) __________ port because adding an external hard drive
would give him enough space to start to record HD television shows. As it is, he is running
out of space to store files. But the (10) __________, or the amount of time it takes to retrieve
data from the disk drive, on any mechanical drive is slow compared to the (11) __________ in
the new computer he’s eyeing, which has no moving parts at all. Joe also notes that he is un-
able to do a complete backup of his music library onto optical media now that he has 40 GB
of music data. His current system can’t burn a (12) __________, but the new system could.
The new video card would also include several (13) __________ ports so that six digital
monitors can be connected simultaneously. It would be great if he could take advantage of
the 5.1 (14) __________ that is on the soundtrack of most of the movies he watches on DVD.
He also has a lot of friends who play video games on their computer systems. However, his
current system doesn’t meet the minimum requirements for a video card. Newer cards
have blindingly fast (15) __________, and some cards even have multiple processors. computer
Overall, with prices dropping, it seems like time to go buy that new system!
literate
becoming
becoming
computer literate
Rebecca has already built five or six PCs and tells you she can make a killer desktop system
for you for under $1,300. But you do love the idea of having a light, compact notebook
computer that could travel with you around campus and back and forth to work.
Instructions: Using the preceding scenario, write an e-mail to Rebecca describing to her
what you need in your new system. Examine the specifications for both notebook and
desktop systems in this price range and decide which one is best suited to you. Use key
terms from the chapter and be sure your sentences are grammatically correct and
technically meaningful.

299
six
six self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which statement about notebook 6. What allows two different programs


computers is FALSE? to be processed at one time?
a. Notebooks typically have a a. Hyperthreading
longer lifespan. b. SSD
b. Notebooks are typically less c. Benchmarking
reliable. d. GPU
c. Notebooks can be docked to 7. Which is not a type of memory stored
larger monitors. in your system?
d. Notebook are more difficult to a. RAM
expand or upgrade. b. Cache
2. ROM is classified as what type of c. CPU register
storage? d. ALU
a. Volatile c. Flash 8. The optimal amount of memory for a
b. Nonvolatile d. Cache video card depends on
3. To document a problem you are a. the quality of video you will be
having, you can use watching.
a. Disk Cleanup. b. the resolution of the monitor.
b. Problem Step Recorder. c. the number of monitors you have.
c. PC DeCrapifier. d. All of the above.
d. Resource Monitor. 9. SuperFetch is a memory-management
4. If you want your system to run technique that
reliably, you should a. determines the type of RAM your
a. delete all programs from the system requires.
Startup folder. b. makes the boot-up time for the
b. save all of your temporary system very quick.
Internet files. c. preloads the applications you use
c. install programs in the system most into system memory.
tray. d. defragments the hard drive to
d. defragment the hard drive. increase performance.
5. Which bests describes RAID 0 10. What is the name for the time it takes
technology? a storage device to locate its stored
a. Saved data is spread across two data and make it available for
hard drives. processing?
b. Data is written to one drive and a. Clock speed
mirrored to a second drive. b. Access time
c. RAID 0 allows you to store twice c. Data transfer rate
the data. d. Seek time
d. RAID 0 provides an instant
backup of your work.

True–False
_____ 1. A single CPU can have multiple cores but cannot also use hyperthreading.
_____ 2. The memory that your operating system uses is referred to as kernel memory.
_____ 3. Motherboards are designed with a specific number of memory card slots.
_____ 4. Cache memory is a form of read-only memory that can be accessed more quickly
by the CPU.
_____ 5. Solid state drives are faster than hard drives and eSATA drives.

300 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


making the
six six

chapter
transition to...
next semester
1. Personalize Your System

transition to...
Likely you spend many hours each day working on your computer using it for school,
work, communication, research, and entertainment. Your computer should be a device
that fits you, fits your needs, and expresses who you are.

next semester
making the
a. Begin with the computer’s form. Would you select a notebook or a desktop? What
features determine that decision?
b. Next consider performance. Which type of CPU do you need? How much RAM
should be installed? What kind of hard drive storage would you select? Give
specific price-to-value arguments for each decision.
c. Now consider expandability. If you need this system to last for four years, what
kind of ports and expansion capability are necessary?
d. Finally, consider style. What components or design decisions can you make so that
this system uniquely suits you and represents you?
2. Desktop Replacement
The line between the capabilities of a desktop system and a powerful notebook have
become more and more blurred with the arrival of “desktop replacement” systems.
These systems often have 17-inch, 18-inch, or larger monitors, weigh 10 pounds or more,
and have a battery life of less than two hours. Research the most current entries in the
“desktop replacement” category and evaluate them. What kind of user would find this
an ideal solution? Do you anticipate this category of computer becoming more popular?
3. Go Small or Stay Home
Manufacturers are releasing a number of systems that are trying to capitalize on size—
or the lack of size! Explore some of the small form factor (SFF) computers appearing on
the market.
a. Research the Falcon NorthWest FragBox (falcon-nw.com).
b. Examine the Apple MacMini (apple.com).
c. Compare those systems with the Dell Zino HD (dell.com).
Why are these SFF computers appearing? What role do you see these systems fulfilling?
What kind of performance and hardware would you recommend for such a system?
4. Do-It-Yourself Computer Design
Visit NewEgg (newegg.com) and do a search on “do it yourself”. You will find that NewEgg
has created a number of bundles, which are a set of components that cover the categories
outlined in this chapter: the computer case, processor, RAM, storage, video, and audio.
a. Which system looks like the best match for your needs for school next semester? Why?
b. What is the price difference between building the system and purchasing a similar
unit from a major manufacturer?
c. What skills would you need before you could assemble the computer yourself?
d. What additional components (hardware and software) would you need to complete
the system?
e. What kind of support exists to train you in these skills or to help with questions you
might have along the way?
5. How Does Your System Measure Up?
A number of tools are available to measure your system’s performance. Explore the
following tools and use one to gather data on your current system’s performance.
a. Windows 7 Gadgets: Visit the Windows 7 Personalization Gallery (windows.
microsoft.com) and find gadgets to help you monitor system performance.
b. Windows 7 Resource Monitor: Use the Resource Monitor to collect data on CPU
utilization and memory usage over a typical school day.
c. Benchmarking suites: Examine a sample of consumer benchmarking programs like
the PassMark’s PerformanceTest, Primate Lab’s Geekbench, and Maxon’s
Cinebench. Which subsystems do each of these products evaluate? How do they
present their results? Which seems easiest to use?
301
six
making the
six
chapter

transition to...
the workplace the workplace
1. In the “Real World”
As you move from an educational environment to a business environment, how you use
making the

your computer will inevitably change. Write a description of your ideal computer system
for school and for once you are in the workforce. Defend the position you take with
transition to...

information covered in this chapter. To help you in your decision, fill out the worksheet,
similar to Figure 6.2, that is available on the book’s companion Website
(pearsonhighered.com/techinaction).
2. Judging System Performance
As you learned in this chapter, the Resource Monitor provides a detailed breakdown of how
the computer is using memory at any given time.
a. Open the Resource Monitor, move to the CPU tab, and open the Processes frame. What
is your total CPU Usage? How many “virtual” CPUs does your machine have? Clicking
on any of the column titles sorts that column, so clicking the Average CPU column
shows you the applications currently using most of the CPU resources. What are the top
two most intensive applications?
b. Move to the Memory tab. How much memory is in use? How much is available? Of the
memory available, how much has been preloaded with data and files that Windows
“thinks” you will need soon?
c. Move to the Disk tab. Click on the Processes With Disk Activity panel. Which programs
are making the greatest total demand to read and write to the disk?
3. My Mother(board)
This chapter discussed the qualities of a CPU that are important to consider for system per-
formance. Now examine the features of a motherboard that are critical to the performance
and expandability of a system. Visit NewEgg (newegg.com) and search for “Intel Mother-
boards”; then sort by “Best Rated”.
a. Which model has the best reviews?
b. How many ports and what type of ports does it have?
c. What kind of CPU does it support?
d. What kind of memory does it use, and what is the maximum memory it supports?
e. How many hard drives can it run? Does it support both RAID 0 and RAID 1?
f. Does it have integrated video? Audio?
4. Room to Move
You are responsible for specifying the storage solution for an accounting customer’s com-
puter system. Your customer needs to always have redundancy—that is, multiple copies of
the work they are doing—because of the secure nature of the records they keep and the
length of time they are required to keep records. Prepare a report that describes the type of
hard drive and optical storage you would recommend. Be sure to include performance speci-
fications and price. Devise a list of additional questions you would need to ask your cus-
tomer to be sure they have a system that meets their expectations.
5. A Picture Is Worth a Thousand Words
You work in a financial analysis firm. It is necessary to watch small fluctuations in many
different international monetary funds and markets each day. This data is then fed into your
own prediction software, tied to Excel calculations, and then plotted with three different sta-
tistical analysis packages. What video solution would be ideal for this environment? Would
it require a video card with a single or dual GPU? Multiple video cards? Multiple monitors?
6. Let Me Tell You My Problem
You may be responsible for helping others solve various computer problems. Test out the
Problem Steps Recorder in Windows 7 to see how the program can help you help them.
Click the Start button and search for “psr”. Run the program and click Record. Then just click
between different applications, visit the Control Panel, and add an annotation. Save the file
to your desktop and close the Problem Steps Recorder. View the annotated report. How
could you use the Problem Steps Recorder to describe a problem or to gather information?

302 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


critical thinking
six six

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. And Google Says...


In a presentation in Dublin, Ireland in March 2010, Google sales chief Jim Haley stated
that desktops would be irrelevant in three years (SiliconRepublic.com). Smartphones,
notebooks, and the amount of information available online will converge to create a
different kind of future than what we’ve known, according to Haley. Do you agree?
Why or why not? What impact would that have on the types of hardware and software
that are the most in demand?

2. Emerging Technologies
Touchscreens are now available in a range of sizes, from smartphones to iPads to larger
products like the Microsoft Surface. Windows 7 has integrated support for touchscreens.
“Surround Sight” and 3D monitors are available in increasing numbers. What new
technologies will last and become part of our collective experience? How will these
technologies and devices change entertainment and how people interact with
information? What future technologies that would be on your wish list?

3. The Early Adopter


We are all aware of the technology price curve: when first introduced, products have
the highest prices and the most instability. As these products settle into the market,
they become more reliable and the price falls, sometimes very quickly. People who
make those first release purchases are called early adopters. What are the advantages to
being an early adopter? What are the disadvantages? How do you decide at what point
you should step into the technology price curve for any given product?

4. A Green Machine
Review the impacts of your computer during its entire lifecycle. How do the produc-
tion, transportation, and use of the computer impact the increase of greenhouse gas
emissions? How does the selection of materials and packaging impact the environ-
ment? What restricted substances (like lead, mercury, cadmium, and PVC) are found
in your machine? Could substitute materials be used? How would the ultimate “Green
Machine” be designed?

5. System Longevity
If you purchase a computer system for business purposes, the Internal Revenue Service
(IRS) allows you to depreciate its cost over five years. The IRS considers this a reasonable
estimate of the useful lifetime of a computer system. What do you think most home
users expect in terms of how long their computer systems should last? How does the
purchase of a computer system compare with other major household appliances in
terms of cost, value, benefit, life span, and upgrade potential?

303
six
six team time
chapter

Many Different Computers for Many


Different Needs
team time

Problem
Even within one discipline, there are needs for a variety of types of computing solutions.
Consider the Communications department in a large university. Because it is such an
interdisciplinary area, there are some groups involved in video production, some groups
producing digital music, and some groups responsible for creating scripts and screenplays.
The department as a whole needs to decide on a complete computing strategy.

Process
Split your class into teams.
1. Select one segment of the Communications department that your team will represent:
video production, digital music, or scripting. The video production team requires their
labs to be able to support the recording, editing, and final production and distribution
of digital video. The digital music group wants to establish a collegiate recording
studio (in the model of the Drexel University recording label, Mad Dragon Records).
The scripting group needs to support a collaborative community of writers and
voice-over actors.
2. Analyze the computing needs of that division, with particular focus on how they need
to outfit their computer labs.
3. Price the systems you would recommend and explain how they will be used. What
decisions have you made to guarantee they will still be useful in three years?
4. Write a report that summarizes your findings. Document the resources you used and
generate as much enthusiasm as you can for your recommendations.

Conclusion
The range of available computing solutions has never been so broad. It can be a cause of
confusion for those not educated in technology. But with a firm understanding of the basic
subsystems of computers, it is precisely the pace of change that is exciting. Being able to
evaluate a computer system and match it to the current needs of its users is an important
skill.

304 Chapter 6 Understanding and Assessing Hardware: Evaluating Your System


ethics
six six

chapter
project

project
ethics
Ethics Project
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together the team will agree on an
ethical solution.

Topic: Light Peak


We have seen many dramatic increases in connectivity speed. The USB standard is now in
its third revision, with each being many fold faster than its predecessor. Currently, Intel is
developing a technology named Light Peak that could replace all of the cables you cur-
rently see dangling from computers with one fiber-optic cable—one very fast fiber-optic
cable. This technology will allow for smaller notebook computer designs, because they
won’t need to have a huge set of ports along the side. Intel feels Light Peak could become
the universal port, replacing USB, HDMI, FireWire, DVI, and others. And using Light Peak,
an entire high-definition movie could be transferred in 30 seconds.

Research Areas to Consider


• Durability of fiber-optic cables for consumers
• Protection of intellectual content as transfer speeds increase
• Building consensus in the market for new technologies
• 2009 Nobel Prize for Physics

Process
Divide the class into teams.
1. Research the areas cited above from the perspective of either an Intel engineer working
on Light Peak, a notebook designer, a producer of high-definition videos, or an
arbitrator.
2. Team members should write a summary that provides factual documentation for the
positions and views their character takes around the issue of increasingly high speed
data transfer and intellectual property rights. Then, team members should create an
outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the chat room feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint
presentation for review by the rest of the class, along with the summary and resolution
they developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

305
seven
seven
chapter

networking
connecting computing devices

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What is a network, and what are the advantages/disadvantages of setting up one?
(pp. 309–310)
2. What is the difference between a client/server network and a peer-to-peer network?
(pp. 310–312)
3. What are the main components of every network? (pp. 312–315)
4. Which type of network is most commonly found in the home? (p. 315)
5. What equipment and software do I need to build a network in my home? (pp. 319–322)
6. Besides computers, what other devices would I connect to a home network?
(pp. 322–326)
7. Why are wireless networks more vulnerable than wired networks, and what special
precautions are required to ensure my wireless network is secure? (p. 327)
8. How do I configure the software on my computer and set up other devices to get my
network up and running? (pp. 329–334)
9. What problems might I encounter when setting up a wireless network? (pp. 334–335)

multimedia resources
multimedia
resources

Active Helpdesk
• Understanding Networking (p. 325)

Sound Bytes
• Installing a Home Computer Network (p. 325)
• Securing Wireless Networks (p. 327)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? As you have probably
already experienced, wireless connectivity is not always free. Many businesses, such
as Starbucks, charge customers for each device they want to connect, which
can become expensive for groups of friends trying to surf the Internet while waiting to
catch a flight at the airport. Connectify is free software that takes an existing
Internet connection and turns it into a wireless hotspot. So if you are connected to the
Internet on your notebook, the Connectify software turns your notebook
computer into a wireless hotspot so that you and your friends can connect other
WiFi-enabled devices
such as a cell phone
or gaming system
through the same
Internet connection.
The hotspot you
create features easy
connectivity and
encryption of data for
solid security.

307
Networking connecting to the Internet. A typical family,
like the Diaz family (see Figure 7.1), might
Fundamentals be engaged in the following: Carlos (the fa-
Now that we are into the second decade of ther) is watching a movie, which he down-
the 21st century, most homes have more loaded yesterday on the large-screen HDTV
than one computing device that is capable of in the living room while checking his Gmail

Figure 7.1
By setting up a home network, everyone in the family can connect their computers and others devices whenever
and wherever they desire.

308 Chapter 7 Networking: Connecting Computing Devices


on his smartphone. Camila (the mother) is in PlayStation or a Wii), a digital video
the kitchen fixing lunch while checking the recorder (such as a TiVo), or a communica-
weather forecast and watching YouTube tions device (such as a modem). The main
videos. Antonio, their fifteen-year-old son, is function for most networks is to facilitate
in his bedroom playing an online game with information sharing, but networks provide
his friends (via his PlayStation) and is up- other benefits.
loading a video he made for a class project What are the benefits of
to a Web site at school. Adriana, Antonio’s networks? There are several benefits to
older sister, is in the den using her notebook having computers networked. Most home
computer to finish a report for school. She’s users want a network to facilitate resource
also watching a Blu-ray disc of Avatar, sharing. For example, a network allows you
which is one of her all-time favorite movies. to share the high-speed Internet connection
Grandma Cecilia is in the family room view- coming into your home. Networks also
ing pictures from the family’s last vacation allow you to share peripheral devices, such
and is uploading to Facebook the pictures as printers. Figure 7.2a shows two comput-
that she took of her grandchildren during ers that are not networked. Computer 1 is
their trip to Disneyland last week. And connected to the printer, but Computer 2 is
Angel, the youngest daughter, is playing not. To print files from Computer 2, users
with Sparky in the backyard and uploading have to transfer them using a flash drive or Figure 7.2
video that she took of him with her phone another storage medium to Computer 1, or (a) Computers 1 and 2
so that everyone can see it in the family they have to disconnect the printer from are not networked, and
Computer 2 cannot access
room while they eat lunch. And because Computer 1 and connect it to Computer 2. the printer. (b) Networking
both Carlos and Camila work outside the By networking Computer 1, Computer 2, allows sharing of the
home, they use webcams to monitor activi- printer.
ties in the house, like
ensuring their kids Inkjet printer
arrive home safely a
from school, while
they are at work.
What makes all this
technology transfer
and sharing possi-
ble? A home
network!
What is a
computer net-
work? A com- Printer cable
puter network is Computer 1 Computer 2
simply two or more
computers that are b
connected via soft-
ware and hardware
so that they can
communicate with
each other. You Wireless connection
access networks all
the time whether
you realize it or not.
When you use an
ATM, get gasoline, or
use the Internet (the Computer 1
world’s largest network), Computer 2
you are interacting with a
network. Each device connected to a
network is referred to as a node. A node
can be a computer, a peripheral (such as an
all-in-one printer), a game console (such as a Inkjet printer

Networking Fundamentals 309


and the printer, as shown in Figure 7.2b, networks need to be administered, at least to
both computers can print from the printer some degree. Network administration
without transferring files or attaching the involves tasks such as: 1) installing new
printer to a particular computer. Using a computers and devices, 2) monitoring
wired or wireless network to share a printer the network to ensure it is performing
saves the cost of buying one printer for each efficiently, 3) updating and installing new
computer. software on the network, and 4) configuring,
Besides peripheral and Internet or setting up, proper security for a network.
connections, does networking facili- Fortunately, most home networks do not
tate any other types of resource require a great deal of administration after
sharing? You can also easily share files their initial configuration, and the benefits
between networked computers without of using a network usually outweigh the
having to use portable storage devices such disadvantages.
as flash drives to transfer the files. In
addition, you can set sharing options in
Windows or OS X that allow the user of Network
each computer on the network to access Architectures
files (such as music or videos) stored on
any other computer on the network, as The term network architecture refers to the
shown in Figure 7.3. design of a network. Network architectures
This Windows network has five comput- are classified according to the way in which
ers attached to it. ALAN-DESKTOP, ALAN- they are controlled and the distance between
NOTEBOOK, and PAT-NOTEBOOK are their nodes.
running the Windows operating system. The
two MACBOOKs are running OS X. The
Public folders enable file sharing because Describing Networks Based on
the user of any computer on the network
can access the Public folder’s contents. And
Network Administration
note the final advantage of networking: What different types of control do I
computers running different operating sys- have over my network? A network can
tems (such as Windows and OS X) can com- be administered, or managed, in either of
municate on the same network. two main ways: locally or centrally. Local
Figure 7.3 Are there disadvantages to setting administration means that the configuration
Windows Explorer up a network? Networks involve the and maintenance of the network must be
showing five networked purchase of additional equipment to set performed on each individual computer at-
computers set up for them up, so cost is one disadvantage. Also, tached to the network. A peer-to-peer net-
sharing. work is the most common example of a
locally administered network. Central
administration means that tasks can be per-
formed from one computer and affect the
other computers on the network. The most
common type of centrally administered net-
work is a client/server network.
What is a peer-to-peer network?
In a peer-to-peer (P2P) network, each node
connected to the network can communicate
directly with every other node on the net-
work. Thus, all nodes on this type of
network are peers (equals). When
Shared files on printing, for example, a computer
ALAN-NOTEBOOK
on a P2P network doesn’t have to
go through the computer that’s
Shared files on MACBOOK
connected to the printer. Instead,
it can communicate directly
with the printer. Figure 7.2b,
shown earlier, shows a very
small peer-to-peer network.

310 Chapter 7 Networking: Connecting Computing Devices


an example of a client/server network.
Step 1: When your computer is connected to
Client computer the Internet, it is functioning as a
requests a service.
client computer. When it accesses
the Internet through an In-
ternet service
provider (ISP), your
computer connects
to a server com-
puter maintained by
the ISP. The server
“serves up” re-
sources to your
computer so that
you can interact
Computer Computer with the Internet.
A B Are client/
(client) (server)
server networks
Step 2: ever used as
Server computer home networks? Although
provides service.
client/server networks can be configured
for home use, P2P networks are more often
Figure 7.4 used in the home because they cost less than
client/server networks and are easier to con-
In a client/server network, a computer acts either as a
client making requests for resources or as a server figure and maintain. However, specialized
providing resources. types of servers (such as servers for sharing
files) are now appearing on P2P networks in
the home.
Because they are simple to set up, P2P net- Nowadays, the individuals in most
works are the most common type of home homes are accumulating vast amounts of
network. Very small schools and offices may media files from digital cameras, cam-
also use P2P networks. However, most net- corders, video downloads, and music down-
works that have 10 or more nodes are loads. Because users often want to share this
client/server networks. media, specialized home network servers
What are client/server networks? such as the Acer Aspire easyStore servers
A client/server network contains two differ- featuring Windows Home Server are now
ent types of computers: clients and servers. available for home networks. A home
A client is a computer on which users ac- network server is designed to store media,
complish specific tasks share media across the
(such as construct network, and back up files
spreadsheets) and make on computers connected
specific requests (such as to the network (see
printing a file). The Figure 7.5). All computers
server is the computer connected to the network
that provides information can access the server.
or resources to the client Even though a server
computers on the net- may now be attached to a
work. The server on a home network, that does
client/server network not change the architec-
also provides central ad- ture of a home network
ministration for network from a P2P network to a
functions such as print- client/server network.
ing. Figure 7.4 illustrates Figure 7.5 Except for the specialized
a client/server network functions of the home
At only 8 inches high, the Acer Aspire
in action. easyStore server can perform a variety of network server, all
As you learned in tasks to simplify media management on a network administration
Chapter 3, the Internet is home network. tasks (such as installation

Network Architectures 311


of software and changing of configuration LAN at the east campus to the LAN at the
settings) must still be performed locally, and west campus by telecommunications lines
all the nodes on the network are still peers would allow the users on the two LANs to
to each other. communicate. The two LANs would be de-
scribed as a single WAN.
Are wireless networks that cover
Describing Networks Based large areas like cities considered
WANs? Technically, wireless networks
on Distance like the one deployed in Minneapolis, which
How does the distance between provides Internet access to city residents and
nodes define a network? The distance visitors, are WANs. However, when a net-
between nodes on a network is another way work is designed to provide access to a spe-
to describe a network. A local area network cific geographic area, such as an entire city,
(LAN) is a network in which the nodes are the network is usually called a metropolitan
located within a small geographic area. area network (MAN). Many cities in the
Examples include a network in a computer United States are now deploying MANs to
lab at school or at a fast-food restaurant. A provide Internet access to residents and pro-
home area network (HAN) is a network vide convenience for tourists.
located in a home. HANs are used to
connect all of a home’s digital devices, such
as computers, peripherals, phones, gaming Network
devices, digital video recorders (DVRs), and Components
televisions.
Is it possible to connect LANs? A To function, all networks must include (1) a
wide area network (WAN) is made up of means of connecting the nodes on the net-
LANs connected over long distances. Say a work (cables or wireless technology), (2)
school has two campuses (east and west) lo- special devices that allow the nodes to com-
cated in different towns. Connecting the municate with each other and to send data,
Figure 7.6 and (3) software that allows the network to
Network components. run. We discuss each of these components in
this section (see Figure 7.6).

Networking
software running
on each computer

Computer 2
network node

Printer
network node
Transmission media
(wires or radio waves)
connecting network nodes

Computer 1
network node

External Internal network adapter Router Wireless


network adapter
p (network
( interface card) access point
p

Network adapter attached to or Specialized network navigation


inserted in each network node devices (used on some networks)

312 Chapter 7 Networking: Connecting Computing Devices


Transmission Media always less than or equal to the data transfer
rate. Data transfer rate and throughput are
How are nodes on a network usually measured in megabits per second
connected? All network nodes are (Mbps). (A megabit is 1 million bits.)
connected to each other and to the network Twisted-pair cable, coaxial cable, and wire-
by transmission media. Transmission media less media usually provide enough band-
establishes a communications channel width for most home networks.
between the nodes on a network and can
either be wireless or wired.
Wireless networks use radio waves to con- Network Adapters
nect nodes. With the proliferation of portable
devices being connected to home networks, a How do the different nodes on the
network with at least some wireless connec- network communicate? Network
tivity is preferred in most homes. adapters are devices connected to or in-
Wired networks use various types of stalled in network nodes that enable the
cable (wires) to connect nodes. Twisted-pair nodes to communicate with each other and
cable is made up of copper wires that are to access the network. All desktop and note-
twisted around each other and surrounded book computers (and many peripherals)
by a plastic jacket. Normal telephone cable sold today contain network adapters in-
is a type of twisted-pair cable, although stalled inside the device. This type of adapter
phone cable won’t work for connecting a is referred to as a network interface card
home network and a slightly (NIC). Different NICs are designed to use
different type of twisted-pair different types of transmis-


cable is used. Coaxial cable sion media. Most NICs in-
All computers cluded in computing
consists of a single copper
wire surrounded by layers of sold today devices today are built to
plastic. If you have cable TV, contain network use wireless media but
the cable running into your many can use wired media
adapters. as well. Your notebook
TV or cable box is most
likely coaxial cable. Fiber-
optic cable is made up of plastic or glass
fibers that transmit data at extremely fast to

wireless
wireless
NIC in
computer most likely has a
it
networks
that allows you to connect
(home, school, or the
speeds. Verizon’s FiOS service uses fiber- coffee shop). But most notebooks also have a
optic cable to run very fast data connections port on the side that accommodates cable for
directly up to your home, although fiber- a wired connection to a network.
optic cable is not usually run inside the Why would I ever consider using a
home. On a FiOS network, twisted-pair or wired connection with my notebook
coaxial cable is still used inside the home to computer? Wired connections can some-
transport the network signals. times provide greater throughput than cur-
Does it matter what type of media rent high-speed wireless networks. Here are
you use to transfer data? The media some common reasons why wireless signals
you choose depends on the requirements of may have decreased throughput:
a network’s users. Using wireless media is • Wireless signals are more susceptible to
critical when portable computing devices interference from magnetic and electri-
(such as smartphones) need to be connected cal sources.
to a network. However, higher speed con- • Other wireless networks (such as your
nections (than can be achieved by wireless neighbor’s network) can interfere with
connectivity) are required for certain types the signals on your network.
of network activities, such as downloading • Certain building materials (such as
large files such as movies. Different types of concrete and cinderblock) and metal (a
transmission media transmit data at differ- refrigerator) can decrease throughput.
ent speeds.
• Throughput varies depending on the
Data transfer rate (also called bandwidth)
distance from your networking
is the maximum speed at which data can be
equipment.
transmitted between two nodes on a net-
work. Throughput is the actual speed of Wireless networks usually use specially
data transfer that is achieved. Throughput is coded signals to protect their data whereas

Network Components 313


ETHICS Sharing Your Internet Connection with Your
IN IT Neighbors: Legal? Ethical? Safe?
With the advances in wireless equipment, signals can travel well beyond The next thing you need to consider is whether the shared access
the walls of your home. This makes it possible in an apartment or single should be open to all neighbors, or just to the neighbors that are
family home (where homes are close together) for a group of neighbors contributing to the cost of the Internet connection. You could leave the
to share a wireless signal and potentially save money by splitting the connection open (like the connections at Panera Bread) and let anyone
cost of one Internet connection among them. However, before jumping who finds it log on and surf. You might consider this a very ethical action,
into this venture, you need to weigh a few issues carefully. because you are providing free Internet access for anyone who needs
You probably aren’t legally prohibited from sharing an Internet con- it. You could register your free hot spot with a service like JiWire, and
nection, but you should check on the state and local laws. Most laws are then people would know where it is. However, your neighbors who are
designed to prohibit piggybacking, which is using a network without the helping pay the cost might have a different viewpoint and not want to
account holder’s consent. However, if you are giving neighbors permis- fund free surfing for everyone. Make sure you work this out before
sion to share your connection, you probably don’t violate any piggyback- proceeding.
ing laws. If you are going to host a free and open hot spot, you still need to
Of course, your ISP might not permit you to share your Internet make sure that you set it up safely. You want to maintain a secure net-
access with anyone. You probably have a personal account that is work for you and your neighbors while still allowing the occasional visit-
designed for one household. The terms of your agreement with the Inter- ing surfer to use the connection. There are WiFi sharing services (see
net provider might prohibit you from sharing your connection with people Figure 7.7) such as Fon (fon.com), Whisher (whisher.com, now owned
outside your household. If you aren’t allowed to share the type of account by wifi.com), and WeFi (wefi.com) that can provide you with special
you have now, your ISP probably offers a type of account (such as a small hardware (a router) or software that allows you to configure your hot spot
business account) that will allow you to share a connection, but it will so your network remains secure.
most likely be more expensive. The ISPs know that the more people that While offering free access to anyone will earn you lots of good karma,
share an account, the more likely that account is to use bandwidth; so additional risks exist because you don’t know what mischief or criminal
they price their accounts accordingly. You might be able to share a per- activities someone might engage in while connected to the Internet
sonal account without being detected by your ISP, but that certainly through your account. Think very carefully before you proceed down the
would be unethical because you should be paying for a higher level of sharing path, and make sure you set your hot spot up to protect your
access. Therefore, make sure to check with your ISP to determine that internal network.
you have the right type of account.

Figure 7.7
At Wifi.com you can search and find free hot spots hosted by other Whisher users.

314 Chapter 7 Networking: Connecting Computing Devices


wired connections don’t protect their sig- Networking Software
nals. This process of coding signals can
slightly decrease throughput, although once What software do home networks re-
coded, data travels at usual speeds. quire? Home networks need operating
Therefore, in situations where you want tosystem (OS) software that supports P2P net-
achieve the highest possible throughput working. The Windows, OS X, and Linux
(transferring a large video), you may want tooperating systems all support P2P network-
connect your notebook (or other portable de- ing. You can connect computers running any
vice) to your home network using a wire (at of these OSs to the same home network (we
also cover configuring software for home
least temporarily). We’ll discuss this type of
connection in more depth when we talk about networks later in the chapter).
home Ethernet networks later in this chapter. Is the same software used in
client/server networks? Client/server
networks are controlled by centralized
Network Navigation Devices servers that have specialized network oper-
How is data sent through a ating system (NOS) software installed on
network? Network them. This software handles
navigation devices facili- requests for information, Inter-
tate and control the flow
of data through a net-
work. Data is sent over

Home networks
need
system
operating
software
net access, and the use of
peripherals for the rest of the
network nodes. As opposed to
P2P networks, the nodes on a
transmission media in
client server network do not
bundles. Each bundle is that supports communicate directly with
called a packet. For com-
P2P networking.

puters to communicate, each other but communicate
these packets of data through a server. Communi-
must be able to flow between network cating through a server is more efficient in a
nodes. Network navigation devices, which network with a large number of nodes, but
are themselves nodes on a network, enable requires more complex NOS software than is
the transmission of data between other necessary for P2P networks. Examples of
nodes on the network that contain NICs. NOS software include Windows Server 2008
What network navigation devices R2 and SUSE Linux Enterprise Server.
will I use on my home network? The
two most common navigation devices are
routers and switches. A router transfers Home Ethernet
packets of data between two or more net- Networks
works. For example, if a home network is Now that you understand the basic compo-
connected to the Internet, a router is required nents of a home network, you are probably
to send data between the two networks (the wondering where to start on installing your
home network and the Internet). A switch is home network. In the following sections,
a “traffic cop” on a network. Switches re- we’ll discuss the most common types of net-
ceive data packets and send them to their in- works found in the home and how to get the
tended nodes on the same network (not fastest data transfer rates from your home
between different networks). All routers sold network. We’ll also explore the various
for home use have switches integrated into types of cabling used in wired networks.
them. We discuss routers for home networks
in more detail later in the chapter.
Ethernet Home Networks
SOUND Installing a Home What type of peer-to-peer network
BYTE Computer Network should I install in my home? The vast
majority of home networks are Ethernet net-
Installing a network is relatively easy if you’ve seen works. An Ethernet network is so named
someone else do it. In this Sound Byte, you’ll learn because it uses the Ethernet protocol as the
how to install the hardware and configure Windows for means (or standard) by which the nodes on
a wired or wireless home network. the network communicate. The Ethernet
protocol was developed by the Institute of

Home Ethernet Networks 315


BITS 802.11 standard is also known as WiFi. Four
AND Wake Up Your Computer Remotely standards are currently defined under the
BYTES 802.11 WiFI standard: 802.11a, 802.11b,
802.11g, and 802.11n. Since 802.11n features
Having your computer on a home network with a shared Internet connection makes it the fastest data transfer rates, it is now the
possible to access your computer and its files even when you aren’t at home. But if most desirable choice for home networks.
your computer is asleep, you need some way to “wake it up.” Otherwise, you can’t Devices using older standards (such as
access it through the Internet. Fortunately for Mac users, there is an application called 802.11g) will still work with 802.11n
iNet WOL (Wake on LAN) designed to do this (see Figure 7.8). iNet WOL is compatible networks, but they will operate with slower
with the iPhone, iPod Touch, and iPad. The application allows you to use your portable data transfer rates. This accommodation of
device to wake up your computer via the Internet. Once your computer is awake, you current devices being able to use previously
can then use your remote access software to access it. Think of iNet WOL as an alarm issued standards in addition to the
clock for your computer. current standards is known as backward
compatibility.
How do 802.11n wireless devices
work? Wireless routers and network
adapters contain transceivers. A transceiver
is a device that translates the electronic data
that needs to be sent along the network into
radio waves and then broadcasts these radio
waves to other network nodes. Transceivers
serve a dual function because they also
receive the signals from other network
nodes. Devices that use the 802.11n standard
achieve higher throughput by using a
technology known as Multiple Input
Multiple Output (MIMO).
Devices using wireless standards devel-
oped prior to the 802.11n standard only uti-
lized one antenna for transmitting and
receiving data. Devices that use Multiple
Figure 7.8 Input Multiple Output (MIMO) technology
The application iNet WOL (Wake on LAN) lets you use your iPhone to wake up are designed to use multiple antennas for
your computer from a remote location. transmitting and receiving data. The multi-
ple antennas break the data into multiple
data streams and allow for faster transmis-
sion of the data. 802.11n devices can achieve
throughput of up to 300 Mbps under ideal
Electrical and Electronics Engineers (IEEE). conditions. But as mentioned previously,
This nonprofit group develops many stan- many factors can reduce the throughput of a
dard specifications for electronic data trans- wireless connection.
mission that are adopted throughout the
world. Each standard the IEEE develops is
numbered, with 802.11 (wireless) and 802.3
(wired) being the standards for Ethernet net-
Throughput Speeds
works. The Ethernet protocol makes Ether- How can I tell how fast the wireless
net networks extremely efficient at moving connection to my network is on my
data. Ethernet networks use both wireless computer? You can install various
and wired transmission media. utilities, such as Net Meter (available at
What is the current wireless stan- download.com), on your computer that will
dard for Ethernet networks? The cur- measure your throughput. Net Meter (see
rent standard that governs wireless Figure 7.9) shows you the throughput you
networking for Ethernet networks is the are achieving on your computer’s wireless
802.11n standard, which was ratified in connection to your network over a period of
2009. Establishing standards for networking time. Hopefully, you’ll achieve throughput
is important so that devices from different in the range of 50 to 200 Mbps on your
manufacturers will work well together. The wireless network, which should be sufficient

316 Chapter 7 Networking: Connecting Computing Devices


cable you would con-
sider using in home-
wired Ethernet
networks—Cat 5E, Cat 6,
and Cat 6a—and their
data transfer rates. Al-
though Cat 5E cable is
the cheapest and is suffi-
cient for many home net-
working tasks it was
designed for 100 Mpbs
Figure 7.9 wired Ethernet networks that were popular
Net Meter shows this computer is achieving a rather before gigabit Ethernet networks became the
slow maximum connection of 1.65 mbps on a shared popular standard for home networking.
wireless network at a hotel. Therefore, you should probably not install
Cat 5E cable although it is still available in
for most applications (even watching video). stores. Since Cat 6 cable is designed to
However, if you don’t achieve acceptable achieve data transfer rates that support a gi-
throughput, you might want to consider a gabit Ethernet network, it is probably the
wired Ethernet connection. best choice for home networking cable. Cat
What kind of throughput is achiev- 6a cable is designed for Ultra-Fast Ethernet
able with wired network connec- (10 gigabit Ethernet) networks that run at
tions? Up to one gigabit per second (1,000
Mbps) of throughput is possible using the
gigabit Ethernet standard, which is the most BITS
commonly used wired Ethernet standard AND Blazingly Fast Wireless Connections
deployed in devices designed for home net- BYTES on the Horizon
works. Wired Ethernet networks use cables
to transmit data as opposed to the radio Although most people want wireless connectivity throughout their home, wired
waves used on wireless networks. Because connections still provide the best throughput. But a joint effort between the Wireless
cabling is much less susceptible to interfer- Gigabit Alliance and the WiFi Alliance aims to change this. The next generation of
ence, a wired connection can achieve higher wireless standards is called Wi-Gig and will be designed to provide up to 7 Gbps of
rates of throughput. throughput. This speed will blow away current WiFi standards (with a current theoret-
ical maximum transfer rate of 600 Mbps) and wired gigabit connectivity. Whereas WiFi
currently operates in the 5 GHz and 2.4 GHz bands, Wi-Gig will operate in the 60 GHz
band, which is currently unlicensed by the FCC. This should prevent many of the inter-
Network Cabling ference issues that WiFi users currently experience. But don’t start looking in the
What type of cable do I need to stores for this equipment just yet; this standard will take several years to develop.
connect to a wired Ethernet net-
work? The most popular transmission
media option for wired Ethernet networks is
unshielded twisted-pair (UTP) cable. UTP
cable is composed of four pairs of wires that
are twisted around each other to reduce a
electrical interference. You can buy UTP
cable in varying lengths with RJ-45 connec-
tors (Ethernet connectors) already attached.
RJ-45 connectors resemble standard phone
connectors (called RJ-11 connectors) but are
slightly larger and have contacts for eight
wires (four pairs) instead of four wires (see
Figure 7.10). You must use UTP cable with b
RJ-45 connectors on an Ethernet network
because a phone cable will not work.
Do all wired Ethernet networks Figure 7.10
use the same kind of UTP cable? (a) An RJ-45 (Ethernet) connector, which is used on UTP cables; and (b) a typical
Figure 7.11 lists the three main types of UTP RJ-11 connector, which is used on standard phone cords.

Home Ethernet Networks 317


10 Gbps a rug, for example) to prevent damage to
Data Transfer Rate and higher wires from foot traffic.
How long can an Ethernet cable
1,000 Mbps run be? Regardless of the type of Ether-
(1 Gbps) and net cable you use, runs for UTP cable can’t
higher
exceed 100 meters (328 feet) or the signal
starts to degrade. Even for short cable runs,
100 to you should use continuous lengths of cable.
1,000 Mbps
Although two cables can be spliced together
with a connecting jack, this creates a point of
failure for the cable, because connectors can
Category 5E Category 6 Category 6a loosen in the connecting jack and moisture
(Cat 5E) (Cat 6) (Cat 6a) or dust can accumulate on the contacts.
UTP Cable Category Fortunately, you don’t have to choose
between a wired or a wireless network.
Figure 7.11 Ethernet networks can handle your wired
Data Transfer Rates for speeds as fast as 10 Gbps. Installing a 10 gi- and wireless needs on the same network.
Popular Home Network gabit Ethernet network in the home is prob- This gives you the best of both worlds
Cable Types ably unnecessary because today’s home (portability and high throughput).
applications don’t require this rate of data
transfer
What precautions should I taken
when running UTP cable? UTP cable Wired and Wireless on One Network
is no more difficult to install than normal Can I have wired and wireless nodes
phone cable but there are a few things to on one Ethernet network? Yes, one
avoid. Do not put sharp bends into the cable Ethernet network can support nodes with
when running it around corners because this both wireless and wired connections. Most
Figure 7.12 can damage the copper wires inside and people will want to connect portable devices
Wired and wireless lead to breakage. Also, run the cable around (such as notebooks and smartphones) that
connections in the same the perimeter of the room (instead of under
home network. are constantly being moved around the
home wirelessly to their network. However,
many of the devices that are connected to a
network (such as televisions, DVRs, and
Blu-ray players) usually stay in one location.
Although these devices proba-
bly feature wireless
connectivity also, it
may be desirable to
hook them up to
wired connections to
Wireless take advantage of
DSL/Cable
router
faster throughput
achieved by wired con-
nectivity. Routers sold for
home networks facilitate
Computer in bedroom wired and wireless connec-
with wired connection Notebook on
back porch with tions. Figure 7.12 shows an
wireless connection example of a network with
a wireless/wired router
attached.
Are there other types
of P2P networks that can
be installed in the home?
Non-Ethernet networks in the home
are extremely rare. Because Ethernet
Smartphone in kitchen with HDTV with networks 1) are based on a well-
wireless connection wireless connection established standard, 2) feature easy

318 Chapter 7 Networking: Connecting Computing Devices


set-up, 3) provide good throughput for connection. For an Ethernet network to func-
home networking needs, and (4) are cost tion properly, data must also be transmitted
effective, manufacturers of home network- efficiently around the network. A switch is
ing equipment have overwhelmingly the device that is used on Ethernet networks
embraced Ethernet networks. to route the data between nodes on the same
Does the type of operating system network.
I’m using affect my choice of a home Because both a router and a switch are
networking standard? Windows, OS X, needed on home Ethernet networks, the
and Linux built in P2P networking software manufacturers of home networking equip-
will all support connection to an Ethernet ment make devices that are a combination of
network. Therefore, an Ethernet network is routers and switches. In most instances,
appropriate for all computers using these these devices are called routers or broadband
three operating systems. routers. But despite the name, these devices
do include integrated switches. Although
manufacturers do make routers with only
wired capabilities, for the vast majority of
Home Ethernet home networks, people buy routers with
Equipment wireless capabilities.
By now you should have enough informa- What do switches do on an
tion to decide what nodes on your network Ethernet network? Data is transmitted
need be connected wirelessly and which through the transmission medium of an Eth-
devices would benefit from wired connec- ernet network in packets. Imagine the data
tions. In this section, we’ll explore the packets on an Ethernet network as cars on a
various types of equipment (such as a road. If there were no traffic signals or rules
router) that you need to obtain to configure of the road (such as driving on the right-
your home network. And we’ll explore what hand side), we’d see a lot more collisions
devices your nodes need to contain to between vehicles, and people wouldn’t get
enable them to connect to your network. where they were going as readily (or at all).
Data packets can also suffer collisions. If
data packets collide, the data in them is Figure 7.13
damaged or lost. In either case, the network A simplified explanation is
Routers and Switches: Moving Data doesn’t function efficiently. The routers you that switches (working in
Around Your Network buy for home networks have a switch inte- conjunction with NICs)
grated into them, so you won’t need to buy act like traffic signals or
What equipment do I need for a traffic cops. They enforce
home Ethernet network? Ethernet net- a standalone switch for your home network. the rules of the data road
works need network navigation devices to As shown in Figure 7.13, a switch in an on an Ethernet network
make them work and therefore the first piece Ethernet network acts like a traffic signal (or and help prevent data
a traffic cop) by enforcing the rules of the packets from crashing
of equipment to consider is a router. Recall
into each other.
that routers are designed to transfer packets
of data between two (or more) networks—in
this case, your home network and the In- Switch
ternet. A router is essential on a Data
home network to allow shar- Data packet 3
ing of an Internet packet 2

Data Data
packet 1 packet 4

Home Ethernet Equipment 319


device has less bandwidth than it would
Antenna for wireless have if only six devices were connected to
connections the network).
Does my wireless router support
wired connections? Most home wire-
Ethernet ports for Modem
wired connections port less routers have three or four Ethernet ports
on the back of the router to support wired
connections via twisted-pair cable (see
Figure 7.14). If you have a lot of devices
(such as a game console, HDTV, and a note-
book) in your home that may be used simul-
taneously, you might want to consider
connecting some of them via a wired con-
nection to increase allocated bandwidth to
each wireless device. This will help increase
Figure 7.14 the throughput to each wireless device.
Rear view of typical data road on the transmission media. The If you find that you need additional ports
wireless/wired router. for plugging in wireless connections to your
switch keeps track of the data packets and,
in conjunction with network interface cards, network, you can buy a standalone switch
helps the data packets find their destinations and plug that into one of the ports on your
without running into each other. The switch router. This will give you additional ports
also keeps track of all the nodes on the net- for making wired connections to your net-
work and sends the data packets directly to work. Do not mistakenly buy another router
the node for which they are headed. This (with an embedded switch) and try adding
keeps the network running efficiently. that to your network because the two
In the next section, we’ll explore connect- routers will cause conflicts as they fight for
ing your computing devices to your router. control over network navigation.
Where do I obtain a router for my
home network? You can purchase a
router at any store (such as Best Buy) or
Connecting Devices to Routers online stores (tigerdirect.com, newegg.com)
How many computers and other that carry home networking equipment.
devices can be connected to a router Also, since networks are so common in
in a home network? Most home homes now, many ISPs offer home sub-
wireless routers can support up to scribers a device that combines a broadband
253 wireless connections at the same time. modem and a wireless router. ISPs typically
This number is a theoretical maximum, charge either a one-time or a monthly fee for
however—most home networks probably this combination device. If you already have
have fewer than ten wireless devices broadband access in your home, you at least
connected to the network. But regardless of have a modem. Check with your ISP if you
how few or how many devices your home are not sure whether you also already have a
network has, those wireless devices share device that contains a router.
bandwidth when they are connected to a How do I know if my router sup-
router. Therefore, the more devices actively ports wireless networking? If you do
transmitting data that you connect to a have a router provided by your ISP, make
single router, the smaller the portion of the sure to ask what wireless networking stan-
router’s bandwidth each device receives. dard the router supports. If it does not sup-
To look at this another way, consider you port 802.11n but supports and older
have a pizza which represents your router’s standard such as 802.11g, you should con-
bandwidth. You can cut the pizza into six or sider having your ISP provide you with a
eight pieces (that is, you can connect either new router. You want to have a router that
six or eight devices to the network). If you supports the fastest wireless networking
cut the pizza into eight pieces, each person standard (802.11n) so that you can achieve
who gets a slice receives a smaller portion of the highest possible throughput on your
pizza than they would if you had cut the wireless nodes. If all of your wireless de-
pizza into six pieces. (that is, when you vices have 802.11n network adapters, but
connect eight devices to the network, each your router supports 802.11g, you will not

320 Chapter 7 Networking: Connecting Computing Devices


achieve the best throughput available to
you because 802.11g devices feature
much slower transfer rates than
802.11n devices (about four to
six times slower).
Where do I place the DSL/Cable
router on my modem
network? Your router
should be connected directly
to your broadband modem
(see Figure 7.15). The connec-
tion is usually an Ether-
net cable (Cat 6 cable) Wireless DSL/
running from an Ether- Cable router
net port on your modem
to the modem port on
your router.
Are wireless
routers for Windows
and OS X networks
different? All routers
that support the 802.11n Computer #1
standard should work with
computers running Windows or OS X. All-in-one printer
However, Apple has designed routers that
are optimized for working with Apple
computers. So if you are connecting needs to be entered to configure the router Computer #2
Apple computers to your network, you may (such as whether IP addresses are assigned
dynamically—meaning you are assigned a Figure 7.15
wish to consider using an Apple AirPort
router. (Windows machines can also connect new IP address by your ISP each time you A small network with a
connect to the Internet), contact your ISP wireless router attached.
to the AirPort routers.) The Apple AirPort
Extreme (Figure 7.16) is a good choice for a and ask for guidance.
home network. It supports up to 50 simulta- After ensuring that your router is set up
neous wireless connections and has three properly, you are ready to begin connecting
gigabit Ethernet ports for wired connections. your computing devices to your network.
How do I set up my router so that I You now need to ensure that all your nodes
can use it to connect to the Inter- have the proper equipment to enable them
net? First, contact your ISP and find out to connect to your network.
about any special settings that you may
need to configure your router to work with
your ISP. Next, access your router from In-
ternet Explorer (or another Web browser) by
entering the router’s IP address or default
URL. You can usually find this information
in the documentation that came with the
router. You’ll also need a username and
password to log on to the router. You’ll Ethernet ports for
USB port Modem port
probably find these, too, in the documenta- wired connections
tion that came with the router.
Many routers feature their own wizard
(different from the Windows Networking
wizards) that takes you through special con-
figuration screens. A sample screen from a
router is shown in Figure 7.17. The docu-
mentation that came with your router will
provide a URL to use to log on to the router. Figure 7.16
If you’re unsure of any information that The AirPort Extreme router is often used for home networks with Apple computers.

Home Ethernet Equipment 321


Figure 7.17
Although setups differ
from router to router,
you will need basic
information such as the
URL for router logon
logon information and the
type of IP addressing to
configure the router to
work with your network
and your ISP.
Get logon information
from ISP

Most IP addresses assigned


dynamically

Figure 7.18 Connecting Network Nodes adapters that are compatible with a previous
standard (802.11g or 802.11b) they will be
This Windows device What equipment do my computers able to connect to your 802.11n router.
manager shows a need to communicate with wireless
wireless and a wired However, the throughput will be at the
media on an 802.11n wireless lower 802.11g and b data transfer rates.
network adapter installed
in a notebook. network? Your computers need to have How can I tell what network
wireless network interface cards (NICs) adapters are installed in my com-
>To access Device
Manager: Click the Start installed in them. Notebooks and netbooks puter? To see which network adapter(s)
Button, select Control sold over the last several years most likely are installed in your Windows computer and
Panel, click on the contain 802.11n NICs. For older computers, to check whether the adapter is working,
Hardware and Sound as long as they have wireless Ethernet
Group, then click on you should use the Device Manager utility
Device Manager. program (see Figure 7.18). The installed
adapters will be shown and then you search
for information on the Internet to determine
the adapter’s capability if you aren’t sure
which wireless standard it supports.

Connecting Other
Devices to Networks
Because sharing peripherals is a major bene-
fit of installing a network, many peripheral
devices, such as scanners and printers, now
come with built-in Ethernet adapters. Also,
many home entertainment devices (such as
televisions, Blu-ray players, and gaming
systems), portable devices (such as
smartphones, and iPod Touches and iPads),
and power monitoring devices to reduce
Network adapters energy consumption in the home are also
designed to attach to home networks. Such
devices are usually described as being
“network-ready.”

322 Chapter 7 Networking: Connecting Computing Devices


a b

Ethernet port for


easy connection
to a router

Figure 7.19
(a) The My Book drives
Network-Ready Devices Popular for years on business networks, from Western Digital
NAS devices are now being widely mar- feature NAS devices that
What is a network-ready device? A keted for home networks. You can think of can store 2 TB of data in a
network-ready device (or Internet ready) device the size of a small
them as specialized external hard drives. book. (b) Time Machine
can be connected directly to a router instead NAS devices, like the My Book series from in conjunction with an
of to a computer on the network. Network- Western Digital (see Figure 7.19a), connect external hard drive
ready devices usually contain wireless and/ directly to the network through a router or provides easy backups of
or wired network adapters inside them. A switch. Specialized software can then be Macs on a network.
few devices (such as TiVo or the Xbox 360) installed on computers attached to the
still have external network adapters that network to ensure that all data saved to an
connect to the device via a USB port but individual computer is also stored on the
these eventually should be phased out in NAS as a backup. We’ll discuss backing up
favor of internal adapters. The eventual goal your data in more detail in Chapter 9.
may be to have all electronic devices in your For Apple computers, the Time Capsule is
home be nodes on your network. a wireless router combined with a hard
Why should I connect my peripher- drive for facilitating backups of all comput-
als to my home network? There is ers connected to the network. The Time
an advantage to connecting peripherals Capsule looks very similar to the AirPort
wirelessly to your network. If a printer were router and it works in conjunction with the
connected directly to another computer (via Time Machine backup feature of OS X (see
a cable) on the network instead of being a Figure 7.19b). If you buy a Time Capsule,
node on the network, that computer would you won’t need to buy an AirPort router (or
need to be switched on so other computers other router) as the Time Capsule fulfills this
could access the printer. With a network- function on your network also. When the
ready printer, only the printer needs to be Time Capsule is installed on your network,
powered on for any computer on the net- Macs connected to the network will ask the
work to print to it. user if they want to use the Time Capsule as
What can I attach to my network their source for Time Machine backups. The
to facilitate file sharing and back up Time Capsule is another type of NAS device.
of data? Network attached storage Besides external hard drives, are
(NAS) devices are specialized computing their other NAS devices I could use
devices designed to store and manage your on my network? A more sophisticated
data. People are generating tremendous type of NAS device is a home network
quantities of data today with digital cameras server. Home network servers are special-
and camcorders, as well as buying music ized devices that are designed to provide a
files, and these files need to be stored and specific set of services to computers on a
shared. Although data can always be stored home network. Home servers do not con-
on individual hard drives in computers on a vert a home peer-to-peer network into a
network, NAS devices provide for central- client/server network because these servers
ized data storage and access. only perform only a limited set of functions

Connecting Other Devices to Networks 323


Xbox 360 as long as the Xbox is
also connected to your home
network.

Digital Entertainment Devices


on a Network
Why should I connect my
digital entertainment
devices to my network? The
main reason is to access and share
digital content. When you attach
devices to the Internet, you can
purchase (or even obtain for free)
Figure 7.20 more content for you to enjoy
instead of all the functions performed on such as movies, videos, or music files. You
Windows Home Server client/server networks.
remote access interface. can also use gaming devices to play multi-
Home network servers, like the Acer player games with players all over the
Aspire easyStore server (shown earlier in world. The content you access is either
Figure 7.5), are often configured with downloaded or streamed to your entertain-
Windows Home Server and connect directly ment devices. Viewing Netflix movies
as a node on your network. Home servers delivered over the Internet on your com-
have the functionality of NAS devices and puter is an example of streaming media.
often handle the following tasks: When media is streamed, it is sent directly
• Automatically back up all computers to a device (such as a computer or HDTV)
connected to the network. without being saved to a hard drive. This
• Act as a repository for files to be shared requires a lot of bandwidth so a broadband
across the network (such as music and connection is required to effectively view
video files). streaming media. Media can also be
downloaded (saved) to a hard drive for view-
• Function as an access gateway to allow
ing at a later time. Although the Amazon
any computer on the network to be
Video on Demand service now offers
Figure 7.21
accessed from a remote location via the
streaming movies, they still offer the ability
Internet (see Figure 7.20).
Searching for the right to download content to your computer or
remote? New software And you can access the media stored on your TiVo so you can view it later.
apps make it easy to just your Windows Home Server through your What types of digital entertain-
use your phone instead.
ment devices can I use to view
streaming or downloaded media?
Network-ready televisions and home theater
systems allow for direct connection to your
home network (wireless or wired). These
devices are configured to receive streaming
media directly from the Internet. Waiting for
a DVD to come in the mail from Netflix is so
passé when you can have it available imme-
diately on your television through your
home network!
However, many people prefer to own
media and buy it on permanent formats
such as Blu-ray discs. Blu-ray disc players,
such as the Sony 3D Blu-ray disc players
offer not only high-definition resolution but
also the capability to display 3D video.
These Blu-ray players feature integrated
wireless connectivity for connection to your
network as well as the ability to receive

324 Chapter 7 Networking: Connecting Computing Devices


streaming media from various Internet
providers. You can even view videos from
YouTube and listen to Pandora Internet
Radio right through your Blu-ray player.
In terms of controlling your devices such
as televisions and Blu-ray players, more
companies are developing applications that
enable your handheld devices (such as PSPs
or iPhones) to act as remote controls. The
BD Remote app by Sonoran Blue (see
Figure 7.21) for the iPhone allows you
to control Sony Blu-ray players.
Digital video recorders (DVRs), like the
TiVo Premiere, are often used in the home to
record high-definition television programs.
Connecting your TiVo to your network
makes it possible to receive downloads of
movies directly to your TiVo from services
such as Amazon Video on Demand. And
some home network servers, like the
Hewlett Packard MediaSmart servers, now access music and video files, access photos Figure 7.22
work in conjunction with TiVo devices to stored on your PlayStation, play games, and The TiVo Desktop
provide additional storage for your TiVo browse the Internet. Media is transmitted software facilitates
devices. The TiVo Desktop software (see transfer of recorded
from your PlayStation and displayed on the
Figure 7.22), which you download from shows to portable devices
PSP screen. so you can enjoy your
tivo.com, allows you to transfer content on the go.
shows recorded on your TiVo to your com-
puter or to portable devices such as an iPod,
Specialized Home Networking Devices
iPhone, BlackBerry, or PSP. What if I don’t need the full function-
Can I connect my gaming consoles ality of a PC, but I still want to
to my home net- access Internet
work? Current content? The
gaming systems, launch of the
like the PlaySta- Apple iPad sig-
tion 3, offer much naled a resur-
more than just gence of Internet
games as they appliances. The
can function as a main function of
total entertain- an Internet ap-
ment platform pliance is easy ac-
when connected cess to the
to your network Figure 7.23 Internet, social
(and therefore to The Remote Play feature of the PSP and the PlayStation 3 (PS3) networking sites,
the Internet). The allows users to access PS3 features, like the PlayStation Store, e-mail, video,
directly from their PSP.
PlayStation 3
(PS3) has a built-
in Blu-ray drive and can play Blu-ray discs
as well as DVDs and music files. You can ACTIVE
download movies, games, and videos di-
Understanding
HELP-
rectly to the PlayStation. It can also be used DESK
Networking
to share media across your network and im-
port photos or video from cameras and cam- In this Active Helpdesk call, you’ll play the role of a
corders. And if you have a PSP, you can use helpdesk staffer, fielding calls about home networks—
an application called Remote Play (see their advantages, their main components, and the
Figure 7.23) to access features of your most common types—as well as about wireless
PlayStation from your PSP. You can use the networks and how they are created.
PSP to turn your PlayStation on and off,

Connecting Other Devices to Networks 325


news, and entertainment. These interface, this frame can access photos
devices fall into a category stored on your network or on an online
somewhere between smart- photo-sharing site and display them. You
phones and full-blown comput- can set up an e-mail address for the picture
ers. They are light on frame so that friends and family can e-mail
calculation, but high on easy pictures directly to the frame as soon as
content delivery. Devices such as they are taken. Wouldn’t it be nice to come
the Sony Dash Personal Internet home to new photos of your friend’s trip to
viewer (see Figure 7.24) are pop- Cancun tonight?
ular in kitchens and bedside ta- How can I use my home network
bles where access to Internet to enhance my home security?
radio stations, short videos, and Monitoring cameras, both for indoor and
Figure 7.24 quick information updates (like outdoor use, are now available for the
Quick access to information and enter- Facebook updates and current home and feature wireless connectivity.
tainment is the key feature of Internet weather conditions) are needed. The cameras can connect to your network
appliances. Originally, Internet appliances and be monitored by software like the
Logitech Digital Video Security System
(Figure 7.26). Security monitoring software
allows you to view real-time images from
the cameras at your home. The software
can be configured to alert you via e-mail
or text message when the cameras detect
movement. Some systems also allow you
to receive alerts when there is a lack of
movement. This can be useful for monitor-
ing an aging relative (who may need help
if they stop moving) or for monitoring the
arrival of children coming home from
school at a certain time.

Figure 7.25
Sending pictures directly were marketed toward older computer
to an electronic frame
from your phone is users since these devices feature easy opera-
possible when the frame tion and a shallow learning curve. But the
is connected to your Apple iPad is propelling this category of
network. devices into the hands of much
younger users. We discuss the
Apple iPad in more detail in
Chapter 8.
How can I use my home
network to enhance photo
sharing? Digital picture
frames that display an array of
changing digital photos have be-
come quite popular with the rise
in digital photography. Now digi-
tal picture frames such as the
eStarling TouchConnect (see
Figure 7.25) come with built-in
wireless adapters for easy Figure 7.26
connection to home networks. Logitech security products can help you remotely monitor your home’s
Featuring a touch screen security.

326 Chapter 7 Networking: Connecting Computing Devices


As time goes on, many more types of BITS
entertainment devices and home gadgets AND
Wireless Hot Spots: How to Find
will eventually be connected to your BYTES One on the Go
home network.
Wireless hot spots are places where you can connect to the Internet via a computing
device with wireless networking capability (such as your notebook computer).
Securing Wireless Providers of wireless hot spots may provide free access, or they may charge a fee,
which is usually based on connection time (such as a set fee per hour of access). So
Networks aside from randomly cruising around searching for a place to connect, how do you
All computers that connect to the Internet find out where the hot spots are? Directories have popped up on the Internet to help
(whether or not they are on a network) need you locate hot spots in the areas in which you’ll be traveling. Check out
to be secured from intruders. This is usually JiWire (jiwire.com), WiFi FreeSpot (wififreespot.com), and WiFi Hotspot List
accomplished by using a firewall, which is a (wi-fihotspotlist.com) to locate a hot spot near you.
hardware or software solution that helps
shield your network from prying eyes. We
discuss firewalls at length in Chapter 9.
Wireless networks present special vulnera-
bilities; therefore, you should take addi- movie file while you’re trying to do research
tional specific steps to keep your wireless for a term paper, he’s probably slowing you
network safe. It is important to configure down. In addition, when some less-than-
your network security before setting up honest neighbors discover they can log onto
and connecting all the nodes on your your wireless network, they may cancel their
network. own Internet service to save money by using
Why is a wireless network more yours. Some neighbors might even be
vulnerable than a wired network? computer savvy enough to penetrate your
With a wired network, it is fairly easy to tell unprotected wireless network and steal
if a hacker (someone who breaks into personal information, just as any other
computer systems to create mischief or hackers would.
steal valuable information) is using your In addition, because computer criminal
network. However, wireless 802.11n activities are traceable, hackers love to work
networks have wide ranges that may extend their mischief from public computers (such
outside of your house. This makes it as those in a library or college) so they can’t
possible for a hacker to access your network be identified. If a hacker is sitting in her car
without your knowledge. outside your house and logging on to your
Why should I be worried about wireless network, any cyberattacks she
someone logging onto my wireless launches might be traced back to your IP
network without my permission? address, and you might find law enforce-
Some use of other people’s wireless ment officials knocking on your door.
networks is unintentional. Houses are built How is my wireless network
close together. Apartments are clustered vulnerable? Packets of information on a
even closer together. Wireless signals can wireless network are broadcast through the
easily reach a neighbor’s residence. Most airwaves. Savvy hackers can intercept and
wireless network adapters are set up to decode information from your transmissions
access the strongest wireless network signal that may allow them to bypass any standard
detected. If your router is on the east side of protections, such as a firewall, which you
your house and you and your notebook are have set up on your network. Therefore, to
on the west side, then you may get a
stronger signal from your neighbor’s
wireless network than from your own.
Piggybacking is connecting to a wireless SOUND Securing Wireless
BYTE Networks
network (other than your own) without the
permission of the owner. This practice is
illegal in many jurisdictions but often hap- In this Sound Byte, you’ll learn what “war drivers” are
pens inadvertently between neighbors. and why they could potentially be a threat to your
Your neighbor probably isn’t a hacker, but wireless network. You’ll also learn some simple steps
he might be using a lot of bandwidth—your to secure your wireless network against intruders.
bandwidth! If he’s downloading a massive

Securing Wireless Networks 327


acters that are a combination of
Create and enter unique
SSID here letters, symbols, and numbers.)
4. Turn on security protocols.
Most routers ship with secu-
rity protocols such as Wired
Equivalent Privacy (WEP) or
WiFi Protected Access (WPA).
Both use encryption (a method
of translating your data into
code) to protect data in
your wireless transmis-
Select a security protocol sions. WPA is a much
stronger protocol than
WEP, so enable WPA if you
have it; enable WEP if you
don’t. When you enable these
protocols, you are forced to cre-
Create hard-to-guess ate a security encryption key
passphrase (passphrase). When you attempt to
connect a node to a security-enabled
Figure 7.27
network for the first time, you’ll be re-
secure a wireless network, you should take quired to enter the encryption key. The
By running your router the additional precautions described in the
configuration wizard, you
encryption key or passphrase (see
Sound Byte “Securing Wireless Networks” Figure 7.27) is the code that computers
can configure the security
protocols available on
and as summarized below: on your network need to decrypt (de-
your router and change 1. Change your network name (SSID). code) data transmissions. Without this
the SSID, which helps Each wireless network has its own key, it is extremely difficult, if not im-
protect your wireless
network.
name to identify it, which is known as possible, to decrypt the data transmis-
the service set identifier or SSID. sions from your network. This prevents
Unless you change this name when you unauthorized access to your network
set up your router, the router uses a because hackers won’t know the correct
default network name that all routers key to use. The Windows 7 Connect to
from that manufacturer use (such as a network dialog box shows all
“Wireless” or “Netgear”). Hackers wireless networks within range (see
know the default names and access Figure 7.28a). Clicking on one allows
codes for routers. If you haven’t you to connect to it, or prompts you for
changed the SSID, it’s advertising the more information such as the SSID name
fact that you probably haven’t changed and security key (see Figure 7.28b).
any of the other default settings for 5. Implement media access control. Each
your router, either. network adapter on your network has a
2. Disable SSID broadcast. Most routers unique number (like a serial number)
are set up to broadcast their SSIDs so assigned to it by the manufacturer. This
that other wireless devices can find is called a media access control (MAC)
them. If your router supports disabling address, and it is a number printed
SSID broadcasting, turn it off. This right on the network adapter. Many
makes it more difficult for a hacker to routers allow you to restrict access to
detect your network and nearly the network to only certain MAC
impossible for a neighbor to inadver- addresses. This helps ensure that only
tently connect to your network. authorized devices can connect to your
3. Change the default password on your network.
router. Hackers know the default pass- 6. Limit your signal range. Many routers
words of most routers, and if they can allow you to adjust the transmitting
access your router, they can probably power to low, medium, or high. Cutting
break into your network. Change the down the power to low or medium
password on your router to something could prevent your signal from reach-
hard to guess. (Use at least eight char- ing too far away from your home,

328 Chapter 7 Networking: Connecting Computing Devices


a Figure 7.28
(a) The Windows 7 Con-
nect to a network dialog
box. (b) Manually con-
necting to a wireless net-
work allows you to
establish a connection if
you know the network en-
Currently connected cryption key and the SSID
to Herschell
name.
Requires passphrase to >You can access the
connect Connect to a network
dialog box by right-
clicking the Network
Can connect without Connection icon on the
knowing passphrase taskbar and selecting
Connect to a network
from the shortcut menu.
You can access the
b Manually connect to a
wireless network dialog
box by accessing the
Control Panel, clicking on
Network and Internet,
SSID name you created selecting Network and
Sharing Center, choosing
the Set up a new
Security type you connection or network
selected for router option, and then clicking
on Manually connect to a
wireless network.

Passphrase you
created for router

making it tougher for interlopers to Configuring Software


poach your signal.
for Your Home
7. Apply firmware upgrades. Your router
has read-only memory that has soft-
Network
ware written to it. This software is Once you install the hardware for your net-
known as firmware. As bugs are found work, you need to configure your operating
in the firmware (which hackers might system software for networking on your
exploit), manufacturers issue patches, computers. In this section, you’ll learn how
just as the makers of operating system to do just that using special Windows tools.
software do. Periodically check the Although configuration is different with
manufacturer’s Web site and apply Mac OS X, the setup is quick and easy. Linux
any necessary upgrades to your is the most complex operating system to
firmware. configure for a home network, though the
difficulties are not insurmountable.
If you follow these steps, you will greatly
improve the security of your wireless net-
work. In Chapter 9, we’ll explore many
Windows Configuration
other ways to keep your computer safe from Is configuring software difficult?
malicious individuals on the Internet and Windows makes configuring software
ensure that your digital information is relatively simple if you are using the
secure. same version of Windows on all of your

Configuring Software for Your Home Network 329


computers. The Windows examples in this folder sharing are shown as “on” to enable
section assume you are using Windows 7 on file and printer sharing with other comput-
all of your computers. If you are using previ- ers. From the Network and Sharing Center,
ous versions of Windows, there is plenty of select the option to Set up a new connection
information on the Internet regarding the or network to access the Windows network-
connection of previous versions of Windows ing wizards (see Figure 7.29b).
to a Windows 7 network. In Windows 7, the Select the Connect to the Internet wizard
process of setting up a network is fairly to configure your network to use your
automated by various software wizards. As broadband modem to connect to the Internet
you learned in Chapter 4, a wizard is a utility for the first time. This wizard also config-
program included with soft- ures your wired connec-
ware that you can use to help tions on your network (if
you accomplish a specific
task. You can launch the
Windows wizards from the
Network and Sharing Center,
“ The HomeGroup
feature in
Windows 7
any). On the information
screen (see Figure 7.29c),
enter the access information
provided by your ISP. Enter
which can be accessed via facilitates file a memorable name for your
the Network and Internet network and check the box
group in the Control Panel. and peripheral to allow other people to use
Before running any wizards, sharing. the Internet connection you
you should do the following:
1. Make sure there are network adapters
on each node.
” are establishing. This will
allow all users on the network to use the
same connection.
After running this wizard, run the Set Up
2. For any wired connections, plug all the a Wireless Router wizard to configure your
cables into the router, nodes, and so on. wireless connectivity. If you set up a secured
3. Make sure your broadband modem is wireless network (as detailed in the
connected to your router and that the previous section), use the Manually Connect
modem is connected to the Internet. to a Wireless Network wizard to connect
computers to the secure wireless network.
4. Turn on your equipment in the follow-
What if I don’t have the same ver-
ing order (allowing the modem and the
sion of Windows on all my comput-
router about one minute each to power
ers? Computers with various versions of
up and configure):
Windows can coexist on the same network.
a. your broadband modem, Always set up the computers running the
b. your router, and newest version of Windows first (Windows
7). Then consult the Microsoft web site for
c. all computers and peripherals
guidance on how to proceed for configuring
(printers, scanners, and so on).
computers with previous versions of Win-
Other devices, such a televisions, Blu-ray dows on a Windows 7 network.
players and gaming consoles can be added to How do I differentiate the comput-
the network after configuring the computers. ers on my network? When you set up
By completing these steps, you enable the your Windows computer, you gave it a
wizards to make decisions about how best name. Each computer on a network needs a
to configure your network. After you have name that is different from the names of all
completed these steps, open the Network other computers on the network so that the
and Sharing Center from the Control Panel network can identify it. This unique name
(see Figure 7.29a). You can see the network ensures that the network knows which com-
to which you are currently connected on this puter is requesting services and data and
screen. On the lower portion of the Network can deliver data to the correct computer.
and Sharing Center screen, you can set For ease of file and peripheral sharing,
sharing options for your network. Ensure Windows 7 created a feature known as
that network discovery is shown as “on,” HomeGroup. If you have all Windows 7 com-
because this allows your computer to locate puters on your network, you simply all join
other computers and peripherals on the net- the same HomeGroup. When you set up your
work. You should also verify that the op- first Windows 7 computer on your network,
tions for file and printer sharing and public you can set a password for the HomeGroup.

330 Chapter 7 Networking: Connecting Computing Devices


a

Current network connection


Select to configure
network for first
time

Ensure these options are "On"

Use for initial setup of a network

Use for initial setup of a wireless network

Connect to secure wireless network

Get from your ISP

Name your network

Check this box to share connection

Figure 7.29
(a) The Windows Network and Sharing Center helps you configure your home network. Selecting the appropriate
sharing options allow others to share resources on your computer. (b) Selecting the appropriate option provides
access to wizards that will assist you. (c) Fill in the information provided by your ISP. The wizard will then set up
your connection and connect your computer to the Internet.
>The Windows Network and Sharing Center is found in the Control Panel.

All other computers that subsequently are How do Macs connect wirelessly
added to the network will need the password to networks? Generally, connecting
to join the HomeGroup. When you configure Macs to a wireless network is a much easier
a HomeGroup, you have the option of process than connecting with Windows
deciding what files and peripherals on your computers. You set up the security for a
computer will be shared with other comput- router on a Mac network just as was illus-
ers on the network (see Figure 7.30). trated in the previous section on securing

Configuring Software for Your Home Network 331


be clicked without entering anything in the
password box.
Why don’t some networks appear
as available? But networks with SSID
broadcast turned off will not appear on the
list of available networks. To join one of
these secure networks, click the Other
button on the available wireless network
dialog box. This will cause the Enter the
name of the network dialog box to appear
(see Figure 7.32). Then just enter the SSID
name for your network in the Network
name box and the security passphrase in
the password box. Clicking the join button
will then connect you to the network.
Checking the Remember this network check
box will cause the computer to automati-
cally connect to the network when it is avail-
able (that is, it becomes one of your
preferred networks). You can have multiple
Figure 7.30 preferred networks
your wireless network. such as your home,
The Change HomeGroup
settings screen allows you Therefore, logging your school and local coffee
to configure sharing Mac onto the network shop networks.
options for a particular will require knowing Assuming you
computer. the SSID and its installed and config-
>The Change HomeGroup passphrase. When you ured everything
settings screen can be boot up your Mac, the properly, your home
accessed by clicking the network should now
wireless card should be
Computer link on the Start
menu, then clicking the on by default. The net- be up and running,
HomeGroup icon, and work login screen (see allowing you to share
then clicking the View Figure 7.31) should files, Internet connec-
HomeGroup settings link. appear with a list of tions, and peripherals.
available networks (that You are now ready to
is, the ones the NIC in configure other non-
your Mac can detect). Figure 7.31 computer devices to
The locks next to the The OS X available wireless networks dialog box. connect them to your
network names indicate network.
a secure network, which will require a
password. Enter the password for the
network in the password box and click
the Join button to connect to the network.
Wireless Node Configuration
For unsecure networks, the Join button can How do I hook up devices like a TiVo
or gaming console to my network?
For a wired connection, you would simply
Figure 7.32
plug a cable into the device and your router.
For wireless connections, there is usually a
The OS X secure wireless
networks dialog box.
set of steps to follow in the setup menu for
the device you are configuring. Assuming
you set up a secure wireless network as
described in the security section of this
chapter, you’ll need to know the SSID
name of your network and the security
passphrase. Although each device’s
configuration steps will be slightly different,
eventually, you will get to a screen where
you need to input the SSID name and the

332 Chapter 7 Networking: Connecting Computing Devices


TRENDS
IN IT Careers: Cybercops on the Beat—Computer Security Careers

You probably have a lot of data on your home network such as music and is to prevent either party from later denying having handled the
video files. And you probably generate more data every day. But this data.
pales in comparison to the data generated by most businesses. The vast The Global Information Assurance Certification, or GIAC (giac.org), is
quantities of data on business and government networks also require an industry-recognized certification that provides objective evidence
much higher levels of protection than the data on your home network. (through examinations) that security professionals have mastered key
With billions of dollars spent on e-commerce initiatives every year, com- skills in various aspects of information assurance.
panies have a vested interest in keeping their information technology (IT) What skill sets will be most in demand for security professionals? In
infrastructures humming along. The rise in terrorism has shifted the addition to information assurance technical skills (with an emphasis on
focus slightly—from protecting virtual assets and access, to protecting network engineering and data communications), broad-based business
these plus physical assets and access points. The increased need for experience is also extremely desirable. IT security professionals need to
virtual and physical security measures means there should be a robust understand the key issues of e-commerce and the core areas of their
job market ahead for computer security experts. company’s business (such as marketing, sales, and finance). Under-
The National Security Agency and the Office of Homeland Security standing how a business works is essential to pinpointing and correcting
are both encouraging information security professionals to be proficient security risks that could be detrimental to a company’s bottom line. Be-
in information assurance. As defined by the NSA, information assurance cause of the large number of attacks by hackers, security and forensic
is “the set of measures intended to protect and defend information and skills and related certifications also are in high demand. Working closely
information systems by ensuring their availability, integrity, authentica- with law enforcement officials is essential to rapidly solving and stopping
tion, confidentiality, and non-repudiation. This includes providing for cybercrime.
restoration of information systems by incorporating protection, detection, Another important attribute of security professionals is the ability to
and reaction capabilities.” The five key attributes of secure information lead and motivate teams. Security experts need to work with diverse
systems are as follows: members of the business community, including customers, to forge rela-
1. Availability: The extent to which a data-processing system is able tionships and understanding among diverse groups. Security profession-
to receive and process data. A high degree of availability is usually als must conduct skillful negotiations to ensure that large project
desirable. implementations are not unduly delayed by security initiatives or pushed
2. Integrity: A quality that an information system has if the processing through with inadequate security precautions. Diplomacy is therefore a
of information is logical and accurate and the data is protected sought-after skill.
against unauthorized modifications or destruction. Look for more colleges and universities to roll out security-based de-
3. Authentication: Security measures designed to protect an informa- gree and certificate programs as the demand for security professionals
tion system against acceptance of a fraudulent transmission of increases. These programs will most likely be appropriate for experi-
data by establishing the validity of a data transmission or message, enced networking professionals who are ready to make the move into
or the identity of the sender.
the IT security field. If you’re just starting to prepare for a career, consider
4. Confidentiality: The assurance that information is not disclosed to a degree in network engineering, followed by network security training
unauthorized persons, processes, or devices.
while you’re working at your first job. A degree program that is also
5. Nonrepudiation: A capability of security systems that guarantees designed to prepare you for security certification exams is particularly
that a message or data can be proven to have originated from a
desirable. Networking and security degrees, combined with passing
specific person and was processed by the recipient. The sender of
grades on certification exams, should help you make a smooth transition
the data receives a receipt for the data, and the receiver of the data
gets proof of the sender’s identity. The objective of nonrepudiation into the exciting world of cybersecurity.

passphrase. The Xbox 360 configuration promised you certain speeds of download-
screens are shown in Figure 7.33. ing and uploading data. How can you tell if
Once all your devices are connected to you are getting what was promised? There
your network, you might want to check are numerous sites on the Internet, such as
your Internet connection speed to see what Speedtest.net (see Figure 7.34) and
kind of throughput you are achieving. You broadband.gov, where you can test the
can check your speed on any device on your speed of downloading files to your
network that can access the Internet with a computer and uploading files to other com-
browser. puters. You can then see how your results
How can I test my Internet con- compare to those of other users in your state
nection speed? Your ISP may have and across the United States. Many factors

Configuring Software for Your Home Network 333


a b

Select to enter WPA Network 12.35 PM


Select Wireless Network SSID name Enter the WPA key for the selected network.
Enter security
thelowes
WPA passphrase here
2WIRE531
using keys below
WEP
Specify Unlisted Network LB RB
Cursor
a b c d e f g 1 2 3 Cursor
Create Ad-Hoc Network
h i j k l m n 4 5 6
LT RT
Symbols o p q r s t u 7 8 9 Accents
v w x y z - @ _ 0 .
LS
Caps Y Space x Backspace Done

Back Y Space Cancel


Start Search Select x Backspace Select

Figure 7.33
Xbox 360 wireless can influence your Internet speeds, so be about 350 feet. But as you go farther away
configuration screens. sure to run the test at several different times from your router, the throughput you
(a) The Xbox will detect during the day over the course of a week be- achieve will decrease. Obstacles between
available networks. Select fore complaining to your ISP about not get- wireless nodes also decrease throughput.
the Specify Unlisted ting your promised speed. Walls, floors, and large metal objects are the
Network option to enter
the SSID name of your most common sources of interference with
network. (b) Enter the wireless signals. For example, placing a
security passphrase on
Troubleshooting Network Problems computer with a wireless network adapter
the appropriate security What types of problems can I run next to a refrigerator may prevent the sig-
screen. into when installing wireless nals from reaching the rest of the network.
networks? The maximum range of wire- Similarly, a node that has four walls be-
less devices under the 802.11n standard is tween it and the Internet connection will

Figure 7.34
Speed test showing a download speed of 20.01 megabits, which is extremely fast for a
home Internet connection.

334 Chapter 7 Networking: Connecting Computing Devices


Bedroom Den Back porch

Wireless
router

Wireless range
extender

Computer A with Computer B with Notebook C with


wireless network adapter wireless range extender wireless network adapter

Figure 7.35
most likely have lower-than-maximum connectivity. As shown Figure 7.35, the note- Because a wireless range
extender is installed in the
throughput. book on the back porch can’t connect to the den, Notebook C on the
What if a node on the network wireless network even though the computer back porch can now
can’t get adequate throughput? in the den can connect to the network. By connect to the wireless
Repositioning the node within the same placing a range extender in the den, where network generated by the
room (sometimes even just a few inches there is still good connectivity to the wireless wireless router in the
bedroom.
from the original position) can often affect network, the wireless signal is amplified and
communication between nodes. If this beamed farther out to the back porch. This
doesn’t work, try moving the device closer improves the otherwise poor connectivity on
to the router or to other rooms in your the back porch and allows computer C to
house. If these solutions don’t work, you make a good connection to the network.
should consider adding a wireless range Hopefully, you’ll now be able connect all
extender to your network. your computing devices to your home net-
A wireless range extender is a device that work and achieve the throughput you need
amplifies your wireless signal to get it out to to move your date efficiently around your
parts of your home that are experiencing poor home network.

Configuring Software for Your Home Network 335


seven
seven summary
chapter

1. What is a network, and what are the 5. What equipment and software do I
advantages/disadvantages of setting need to build a network in my home?
up one? All computing equipment that will connect
summary

A computer network is simply two or to a network has to contain a network


more computers that are connected using adapter. Network adapters allow computers
software and hardware so that they can to communicate (either wired or wirelessly)
communicate. Advantages of networks with network navigation devices such as
include allowing users to (1) share an routers and switches. Wired connections are
Internet connection, (2) share peripheral usually made with Cat 6 twisted pair cable.
devices, and (3) share files. A disadvantage A router is needed to share an Internet
is that the network must be administered. connection as it transmits data between
two networks (the home network and the
Internet).
2. What is the difference between a
client/server network and a peer-to-
peer network? 6. Besides computers, what other
In peer-to-peer networks, each node devices would I connect to a home
connected to the network can communicate network?
directly with every other node instead of Connecting peripherals such as printers
having a separate device exercise central directly to a network allow them to be easily
control over the network. P2P networks are shared by all users on the network.
the most common type of network installed Network-attached storage (NAS) devices
in homes. Most networks that have 10 or allow for the storage and sharing of data
more nodes are client/server networks. A files such as movies and music as well as
client/server network contains two types of providing a central place for file backups.
computers: a client computer on which Connecting digital entertainment devices
users perform specific tasks and a server (such as gaming consoles) provides the
computer that provides resources to the ability to stream movies and other
clients and central control for the network. entertainment directly from the
Internet.
3. What are the main components of
every network?
7. Why are wireless networks more
To function, any network must contain four vulnerable than wired networks, and
components: (1) transmission media (cables
what special precautions are required
or radio waves) to connect and establish
to ensure my wireless network is
communication between nodes, (2) network
adapters that allow the nodes on the secure?
network to communicate, (3) network Wireless networks are even more susceptible
navigation devices (such as routers and to hacking than wired networks because the
switches) that move data around the signals of most wireless networks extend
network, and (4) software that allows the beyond the walls of your home. Neighbors
network to run. may unintentionally (or intentionally)
connect to the Internet through your
wireless connection, and hackers may try
4. Which type of network is most to access it. To prevent unwanted intrusions
commonly found in the home? into your network, you should change the
Ethernet networks are the most common default password on your router to make
networks used in home networking. Most it tougher for hackers to gain access, use a
Ethernet networks use a combination of hard-to-guess SSID (network name), turn
wired and wireless connections depending off SSID broadcasting to make it harder
upon the data throughput required. Wired for outsiders to detect your network, and
connections usually achieve higher through- enable security protocols such as WPA
put than wireless connections. or WEP.

336 Chapter 7 Networking: Connecting Computing Devices


summary
seven seven

chapter
8. How do I configure the software on 9. What problems might I encounter
my computer and set up other when setting up a wireless network?
devices to get my network up and You may not get the throughput you need

summary
running? through a wireless connection and therefore
Windows features software wizards that you may need to consider a wired connec-
facilitate the setup of both wired and tion for certain devices. Distance from the
wireless networks. Plug in the modem, router as well as walls, floors, and large
routers, and all cables, and then switch on metal objects between a device and the
the modem, router, and computers (in that router can interfere with wireless connectiv-
order). Run the wizards, which should ity. Wireless range extenders can amplify
guide you through the process. Make sure signals to improve connectivity in areas of
each computer has a distinct name and poor signal strength.
ensure that all computers are in the same
HomeGroup. Devices such as gaming
consoles each have their own set-up
procedures for connecting to wireless
networks but usually require the same
information as needed for connecting a
computer to a secured wireless network.

337
seven
seven key terms
chapter

802.11 standard (WiFi) ........................................ 316 network-attached storage (NAS)


backward compatibility..................................... 316 device ................................................................. 323
Cat 6 cable............................................................. 317 network architecture........................................... 310
key terms

client ...................................................................... 311 network interface card (NIC) ............................ 313


client/server network.......................................... 311 network navigation device................................ 315
coaxial cable ......................................................... 313 network operating system (NOS) .................... 315
data transfer rate (bandwidth).......................... 313 network-ready device......................................... 323
Ethernet network................................................. 315 node ....................................................................... 309
fiber-optic cable................................................... 313 packet .................................................................... 315
firewall .................................................................. 327 peer-to-peer (P2P) network ............................... 310
firmware................................................................ 329 piggybacking ....................................................... 327
gigabit Ethernet .................................................. 317 router ..................................................................... 315
hacker .................................................................... 327 server ..................................................................... 311
home area network (HAN) ................................ 312 service set identifier (SSID) .............................. 328
home network server.......................................... 311 switch .................................................................... 315
Internet appliance ............................................... 325 throughput............................................................ 313
local area network (LAN) .................................. 312 transceiver ............................................................ 316
media access control (MAC) address............... 328 transmission media............................................. 313
metropolitan area network (MAN).................. 312 twisted-pair cable................................................ 313
Multiple Input Multiple Output (MIMO) .... 316 unshielded twisted-pair (UTP) cable .............. 317
network ................................................................. 309 wide area network (WAN)................................. 312
network adapter .................................................. 313 WiFi........................................................................ 316
network administration ..................................... 310 wireless range extender ..................................... 335

338 Chapter 7 Networking: Connecting Computing Devices


buzzwords
seven seven

chapter
Word Bank
• Cat 6 cable • network adapter(s) • throughput
• client/server • network-ready • twisted pair cable

buzzwords
• data transfer rate • peer-to-peer (P2P) • WAN
• hacker(s) • piggybacking • wired
• home network server • router • wireless
• LAN • switch • wireless range expander

Instructions: Fill in the blanks using the words from the Word Bank above.

Cathi needed to network three computers for herself and her roommates, Sharon and
Emily. She decided that a(n) (1) __________ network was the right type to install in their
dorm suite because a(n) (2) __________ network was too complex. Because they all liked to
stream digital movies from the Internet, they needed high a(n) (3) __________ but doubted
they would achieve the promised (4) __________ in any network they installed. Although
they knew using (5) __________ media would provide the fastest Ethernet networks, they
decided to use (6) __________ media so that they could use their notebooks wherever they
were in their suite. Therefore they needed to buy a(n) (7) __________ with wireless capabil-
ity that would allow them to share the broadband Internet connection that Sharon already
had through a local ISP. This device would also double as a(n) (8) __________, preventing
the need to purchase a separate device. Fortunately, all their computers already had
(9) __________ installed, making it easy to connect the computers to the network. Cathi
knew they would need to purchase some (10) __________ since the Xbox 360 they wanted
to share only had a wired Ethernet adapter in it.

Cathi’s roommate Emily wanted to know if they could hook into the (11) __________, or
small network, that was already deployed for the students in the dorm. This student
network was already hooked into the college’s (12) __________, or large network, which
spanned all three of the college’s campuses. She knew they would need to be careful when
connecting to the network, because some students from the dorm had accidentally been
illegally (13) __________ on a network from the deli across the street. As the connectivity for
notebooks in the lounge at the end of the hall was very poor, they needed to consider

computer
purchasing a(n) (14) __________ to extend the range of the wireless signal. As a final detail,
Emily suggested they get a(n) (15) __________ printer that would plug right into the router
and allow them all to print whenever they needed to do so.
literate
becoming
becoming
computer literate
Your grandmother has moved into a new retirement community. She is sharing a
large living space with three other residents. All four retirees have their own notebook
computers. Your grandmother has asked you to advise her and her roommates on an
appropriate network to install so that they can share an Internet connection, a laser printer,
and movies that they want to stream from Netflix via the Internet. And your grandmother
is an avid photographer and has thousands of digital photographs on her computer. She is
very concerned about forgetting to back up the photographs after she takes new ones and
wants her family to be able to access her photos via the Internet.
Instructions: Using the preceding scenario, draft a networking plan for your
grandmother and her roommates using as many of the keywords from the chapter as you
can. Be sure that your grandmother, who is unfamiliar with many networking terms, can
understand your suggestions.

339
seven
seven self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. All of the following are advantages of c. a wired gigabit Ethernet


installing a home network except connection.
sharing d. a client/server network.
a. peripherals. 6. Wireless range expanders
b. an Internet connection. a. are never used for home
c. files. networks.
d. MAC addresses. b. are not needed with 802.11n
2. Which of the following is not a reason networks.
client/server networks are generally c. improve connectivity in remote
not installed in homes? areas of a home.
a. Client/server networks can’t d. turn devices with wired
handle streaming media, which is connections into wireless
often required in home networks. nodes.
b. Client/server networks are more 7. Two or more networks connected
difficult to install than peer-to- over long geographic distances to
peer networks. form a single network is usually
c. Client/server networks provide referred to as a
more security than is needed for a. LAN. c. HAN.
home networks. b. MAN. d. WAN.
d. Peer-to-peer networks are less 8. The throughput of a network
expensive to install than a. is the same on all Ethernet
client/sever networks. networks.
3. Which of the following is not required b. is usually higher on wireless
on some simple networks? networks.
a. Network adapters c. is the same in all areas covered by
b. Networking software a wireless network.
c. Network navigation devices d. can vary depending upon the
d. Transmission media transmission media used.
4. Which network navigation device is 9. The “name” of a particular wireless
required to move data between two network is known as the
networks? a. NetID. c. SSID.
a. Repeater c. Router b. HAN-ID. d. Wifi-ID.
b. Switch d. Hub 10. The device used to move data around
5. If you need very fast throughput in a a single network is called a
home network, you should use a. gateway.
a. an 802.11n wireless Ethernet b. switch.
connection. c. router.
b. a wired power-line network. d. repeater.

True–False
_____ 1. Actual data throughput is usually higher on wireless networks.
_____ 2. Ethernet networks require each node on the network to be equipped with its own
network adapter.
_____ 3. WEP and WPA are popular wired network security protocols.
_____ 4. MANs cover a larger geographic area than HANs.
_____ 5. 802.11n wireless networks provide faster throughput than wired gigabit Ethernet
networks.

340 Chapter 7 Networking: Connecting Computing Devices


seven
making the seven

chapter
transition to...
next semester
1. Dormitory Networking

transition to...
Mikel, Dylan, Sanjay, and Harrison were sitting in the common room of their campus
suite and complaining about their wireless network. They inherited the equipment from

next semester
the last residents of the suite, and unfortunately their router uses the outdated 802.11g

making the
standard. They all have notebooks that have 802.11n network adapters, but their
throughput is poor. Since they are often all surfing the Internet at the same time and
trying to download movies, their network’s performance has become unacceptable.
Since they all just sold last semester’s books back to the bookstore for a total of
$600, they decided this would be a good time to upgrade their network and peripher-
als. Dylan has an inkjet printer that gobbles up expensive cartridges, and Phil has a
laser printer that just broke. The guys figure one good networked all-in-one printer
should meet their needs since it would also provide them with photocopying capabili-
ties. Mikel is concerned about backups for his computer. His external hard drive fell on
the floor and no longer works reliably. He has a tremendous amount of photos and
schoolwork on his computer that he is concerned about losing if his hard drive fails.
Since the guys don’t know much about networking, the four roommates have asked for
your guidance. Consider the following keeping in mind their $600 budget:
a. Research network-ready laser printers on sites such as hp.com, epson.com, and
brother.com. What network-ready all-in-one printer would you recommend? Why?
b. Research 802.11n wireless routers at sites such as netgear.com, linksys.com, and
dlink.com. What router do you think will meet the roommates’ needs? Why?
c. How would you recommend addressing Dave’s backup concerns? Would you rec-
ommend a NAS device for the network, or do they have enough money left in their
budget for a home network server? Research these devices and make an affordable
recommendation. Check sites such as tigerdirect.com and newegg.com for competi-
tive pricing.

2. Connecting Your Computer to Public Networks


You are working for a local coffee shop that offers free wireless access to customers.
Your supervisor has asked you to create a flyer for patrons that warns them of the
potential dangers of surfing the Internet in public places. Conduct research on the
Internet about using public hot spots to access the Internet. Prepare a flyer that lists
specific steps that customers can take to protect their data when surfing on publicly
accessible networks.
3. Adding a Home Network Server for Backups to Your Network
You know that adding a home network server to your network would facilitate sharing
of your digital media and would make backing up your computers easier. You need to
consider the following questions when selecting an appropriate home network server:
1. What is the volume of shared media that you need to store? (In other words, how
many music files, movies, and other media files do you have?)
2. What are the sizes of the hard drives of the computers on your network (for backup
purposes)? What size hard drive would you need on a home network server to
ensure you could back up all your computers as well as store your shared media?
3. Would you need to access files on the home network server when you are away
from home or allow others (such as your cousins) to access them?
Research home network servers using sites such as hp.com, acer.com, and lenovo.com
or use the term “home server” in a search engine. Select a server that is appropriate for
your home network. Prepare a summary of your findings and include the reasons for
your selection.

341
seven
seven making the
chapter

transition to...
the workplace the workplace
1. Wireless LAN for a Small Business
making the
transition to...

You are working for a local coffee shop. The owner of the shop thinks that adding a
wireless network and providing free Internet access to customers would be a good
way to increase business. The owner has asked you to research this idea and prepare a
report of your findings. Consider the following:
a. Price out business Internet connectivity with local phone and cable providers.
Which vendor provides the most cost effective solution for a coffee shop? Are there
any limitations on bandwidth or the number of people that can access the Internet at
one time through the business account connection?
b. What potential problems could you foresee with providing unrestricted free access
to the Internet? What policies would you suggest to keep people from abusing the
free Internet access? (An example of abuse is someone who sits all day and surfs for
free without purchasing any coffee.)

2. Putting Computers to Work on Research Projects


Most computer CPUs only use a fraction of their computing power most of the time.
Many medical research companies (such as those seeking cures for cancer and AIDS)
could benefit from “borrowing” computer CPU time when computers are not being
used or are being under utilized. Virtual supercomputers (which are really networks of
computers) can be created using software installed on tens of thousands of computers.
This type of computing is also known as grid or distributed computing. These virtual
computing nets can be harnessed to solve complex problems when their owners are
not using their computers. Assume that you are working for a business that has
100 computers and you would like to participate in a grid computing project. Investi-
gate IBM’s Worldwide Community Grid (worldcommunitygrid.org). Prepare a report
for your boss that:
a. Describes the Worldwide Community Grid (WCG) and its objectives
b. Lists current projects that the WCG is working on.
c. Describes the process for installing the WCG software on the company’s computers.
d. Suggests a strategy for publicizing the company’s participation in the WCG project
that will encourage your employer’s customers to participate.

3. Testing Your Internet Connection Speed


Visit speedtest.net and speakeasy.net/speedtest and test the speed of your Internet
connection at your home and in the computer lab at your school. Try to repeat the test
at two different times during the day.
a. What did you find out about download speeds at your home? Are you getting as
much speed as was promised by your ISP? Would this speed be sufficient for a
home-based business? What type of business packages does your ISP offer, and
what speeds could you expect when paying for a business package?
b. How does the connection speed at your school compare to the speed at your home?
Where do you think you should have a faster connection—at your school or at your
home? Why might the connection speed at your school be slower than you think it
should be?

342 Chapter 7 Networking: Connecting Computing Devices


critical thinking
seven seven

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to
develop his theory of relativity. Some ideas are best understood by experimenting with them

questions
critical thinking
in our own minds. The following critical thinking questions are designed to demand your full
attention but require only a comfortable chair—no technology.
1. Protecting Your Wireless Home Network
Many people have installed wireless networks in their homes. Consider the wireless net-
work installed in your home (or in a friend’s home if you don’t have wireless).
a. Is your network set up to provide adequate protection against hackers? If not, what
would you need to do to make it secure?
b. Are there other wireless networks within range of your home? If so, are they set up with
an adequate level of security, or can you connect to them easily? How would you go
about informing your neighbors that their networks are vulnerable?
2. Adding Devices to Your Network
We discussed adding devices other than computers and computer peripherals to your net-
work in this chapter. Consider the following for your home network:
a. Do you currently stream or download movies from Netflix, Amazon Video on Demand,
or another service? If so, is your storage device sufficient or do you need more capacity? If
you don’t currently download this type of entertainment, would your family do so if you
had a device that was attached to your network? What type of device (DVR, home server,
etc.) do you think would be most appropriate for the type of media that you enjoy? How
much media would you need to download and view in a month to make purchasing
equipment worthwhile?
b. Do you have a need for a home security system? Would internal and external cameras be
appropriate for monitoring your home? Are their people in your house (babysitters,
housekeepers, contractors, etc.) on a regular basis that might need monitoring? Would
you monitor these people in real time or make recordings for later review?
3. Evaluating Your Home Networking Needs
You might have a network installed in your home already, or perhaps you are still
considering whether it is necessary to install one. Consider these issues:
a. Who uses computing devices in your home? How many computers (notebooks and
desktops) are currently in your home? Are the computers networked? If not, should they
be networked? What advantages would your family gain by networking its computers?
b. Which computer peripheral devices does your family own? Which family members need
to use which peripherals? Are the peripherals network-ready or are they connected to in-
dividual computers? How easy is it to share these peripherals? Are there peripherals that
your family doesn’t own that would be beneficial? (Make sure to explain why.) How
would you go about connecting new peripherals to your network?
c. Does your home network have network-attached storage or a home server? Would your
family benefit from having this technology on your home network? What types of media
do your family members routinely share? What other types would they share if they had
the means?
4. Sharing a Home Internet Connection
Perhaps you have considered whether sharing a home Internet connection with your neigh-
bors would save you money. Consider the following issues:
a. How many neighbors would be within range (say, within 350 feet of your router) of an
802.11n signal that came from your house or apartment? Do you think your neighbors
would be amenable to sharing the cost of your Internet connection and your bandwidth?
Why or why not?
b. Is it permissible to share an Internet connection with neighbors under your ISP’s terms of
use for the type of connection you purchased? If not, what type of plan would you need to
upgrade to in order to share a connection with your neighbors? Would the increased cost
of upgrading your connection still make it economically feasible to share a connection?

343
seven
seven team time
chapter

Creating a Wireless Network


team time

Problem
Wireless technology is being adopted by leaps and bounds, both in the home and in the
workplace. Offering easy access free of physical tethers to networks seems to be a solution
to many problems. However, wireless computing also has problems, ranging from poor re-
ception to hijackers stealing your bandwidth.

Task
You are volunteering for a charity that installs wireless networks in homes for needy fami-
lies. Many of these installations are done in older homes, and some recipients of the net-
works have reported poor connectivity in certain areas of their residences and extremely
low bandwidth at other times. You have volunteered to research the potential problems and
to suggest solutions to the director of the program.

Process
Break the class into three teams. Each team will be responsible for investigating one of the
following issues:
1. Detecting poor connectivity: Research methods that can be used to find areas of poor
signal strength, including signal sniffing software (netstumbler.com) and handheld
scanning devices such as WiFi Finder (kensington.com). Investigate maximum dis-
tances between access points and network nodes and make appropriate recommenda-
tions. (Equipment manufacturers such as netgear.com and linksys.com provide
guidelines.)
2. Signal boosters: Research ways to increase signal strength in access points, antennae,
and wireless cards. Signal boosters are available for access points. You can purchase or
construct replacement antennae or antenna enhancements. WiFi cards that offer higher
power than conventional cards are now available.
3. Security: “War drivers” (people who cruise neighborhoods looking for open wireless
networks from which to steal bandwidth) may be the cause of the bandwidth issues.
Research appropriate measures to keep wireless network traffic secure from eavesdrop-
ping by hackers. In your investigation, look into the WiFi Protected Access (WPA)
standard developed by the WiFi Alliance. Check out the security section of the
knowledge center on the WiFi Alliance Web site to start (wi-fi.org).
Present your findings to your class and discuss possible causes of and ways to prevent the
problems encountered at the residences. Provide your instructor with a report suitable for
eventual presentation to the CEO of the charity.

Conclusion
As technology improves, wireless connectivity should eventually become the standard
method of communication between networks and network devices. As with any other tech-
nology, security risks exist. Understanding those risks and how to mitigate them will allow
you to participate in the design and deployment of network technology and provide peace
of mind for your network users.

344 Chapter 7 Networking: Connecting Computing Devices


ethics
seven seven

chapter
project

project
ethics
Ethics Project
In this exercise, you will research and then role-play a complicated ethical situation. The role
you play may or may not match your own personal beliefs, but your research and use of logic
will enable you to represent whichever view is assigned. An arbitrator will watch and com-
ment on both sides of the arguments, and together the team will agree on an ethical solution.

Topic: Firing Employees for Expressing Views on Social Media Sites


The largest network, the Internet, provides the capability for vast social interaction. Social
media sites such as Facebook, YouTube, and MySpace, as well as blogs and wikis, give
everyone convenient ways to express their opinions. However, employers often are intoler-
ant of employees who freely express negative opinions or expose inside information about
their employers on social media sites. Given that most jurisdictions in the United States use
the doctrine of employment at-will (that is, employees can be fired at any time for any rea-
son, or even no reason), many employers are quick to discipline or terminate employees
who express opinions with which the company disagrees. When such cases come to court,
the courts often find in favor of the employers. It is clear that individual must exercise ex-
treme care when posting work-related content.

Research Areas to Consider

• Ellen Simonetti and Delta Airlines


• Fired for blogging about work
• Free speech
• Joyce Park or Michael Tunison

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has complained
about an employee blogging about a sensitive workplace issue such as cleanliness at a
food manufacturing facility or employee romances.
2. Team members should write a summary that provides background information for
their character—for example: employee, Human Resources manager, or arbitrator —
and details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

345
Under
the
Hood
346 Technology in Action
S OME PEOPLE ARE DRAWN TO UNDERSTANDING
things in detail, but many folks are happy just to have things work. If
you use a computer, you may not have ever been tempted to “look
under the hood.” However, without understanding the hardware inside,
you’ll be faced with some real limitations. You’ll have to pay a technician to fix or
upgrade your computer. This won’t be as efficient as fine-tuning it yourself, and you
may find yourself buying a new computer sooner than necessary. If you’re preparing
for a career in information technology, understanding computer hardware will affect
the speed and efficiency of the programs you design. And what about all those excit-
ing advances you hear about? How do you evaluate the impact of a new type of
memory or a new processor? A basic appreciation of how a computer system is built
and designed is a good start.
We’ll build on what you’ve learned about computer hardware in other chapters and
go under the hood, looking at the components of your system unit in more detail.
Let’s begin by looking at the building blocks of computers: switches.

Switches
The system unit is the box that contains the a computer does, such as processing data or
central electronic components of the computer. printing a report, is broken down into a series of
But how, exactly, does the computer perform all 0s and 1s. Electrical switches are devices inside
of its tasks? How does it process the data you the computer that can be flipped between these
input? The CPU performs functions like adding, two states: 1 and 0, signifying “on” and “off.”
subtracting, moving data around the system, and Computers use 0s and 1s to process data because
so on using nothing but a large number of on/off they are electronic, digital machines. They only
switches. In fact, a computer system can be understand two states of existence: on and off.
viewed as an enormous collection of on/off Inside a computer these two possibilities, or
switches. states, are represented using the binary switches
(or digits) 1 and 0.
ELECTRICAL SWITCHES You use various forms of switches every day.
Computers work exclusively with numbers, The on/off button on your DVD player is a
not words. To process data into information, mechanical switch: pushed in, it represents the
computers need to work in a language they un- value 1 (on), whereas popped out, it represents
derstand. This language, called binary language, the value 0 (off). Another switch you use
consists of just two numbers: 0 and 1. Everything each day is a water faucet. As shown in Figure 1,

Technology in Focus: Under the Hood 347


shutting off the faucet so that no to use as switching devices in
On
water flows could represent the personal computers because of
value 0, whereas turning it on their size and reliability.
could represent the value 1. Since the introduction of
Computers are built from a ENIAC’s vacuum tubes, two
huge collection of electrical major revolutions have occurred
switches. The history of comput- in the design of switches, and
ers is really a story about creat- consequently computers, to make
ing smaller and faster sets of them smaller and faster: the in-
electrical switches so that more vention of the transistor and the
data can be stored and manipu- fabrication of integrated circuits.
lated quickly. Off

Vacuum Tubes TRANSISTORS


The earliest generation of elec- Transistors are electrical
tronic computers used devices switches that are built out of lay-
called vacuum tubes as switches. ers of a special type of material
Vacuum tubes act as computer called a semiconductor, which is
switches by allowing or blocking any material that can be con-
the flow of electrical current. The trolled to either conduct electric-
problem with vacuum tubes is FIGURE 1 ity or act as an insulator (to
that they take up a lot of space, Water faucets can be used prohibit electricity from passing
as you see in Figure 2. The first to represent binary through). Silicon, which is found
high-speed digital computer, the switches. in common sand, is the semicon-
Electronic Numerical Integrator ductor material used to make
and Computer (ENIAC), was de- transistors.
ployed in 1945. It used nearly By itself, silicon does not con-
18,000 vacuum tubes as switches duct electricity particularly well,
and filled approximately 1,500 square feet of but if specific chemicals are added in a con-
floor space. That’s about one-half the size of trolled way to the silicon, it begins to behave
a standard high school basketball court! In like a switch (see Figure 3). The silicon al-
addition to being large, the vacuum tubes lows electrical current to flow easily when a
produced a lot of heat and burned out fre- certain voltage is applied; otherwise, it pre-
quently. Thus, vacuum tubes are impractical vents electrical current from flowing, thus

FIGURE 2
Computers can be
constructed using vacuum
tubes (see inset). The
difference in size achieved
by moving from tubes to
transistors allowed
computers to become
desktop devices.

348 Technology in Action


Integrated Circuits
Integrated circuits (or chips) are
tiny regions of semiconductor mate-
rial such as silicon that support a
huge number of transistors (see
Figure 4). Along with all the many
Extra electron
transistors, other components critical
free to a circuit board (such as resistors,
capacitors, and diodes) are also lo-
cated on the integrated circuit.
Most integrated circuits are no
more than a quarter inch in size.
Because so many transistors can
fit into such a small area, integrated cir-
cuits have enabled computer designers to
Phosphorus create small yet powerful microprocessors,
atom which are the chips that contain a CPU. The
Intel 4004, the first complete microprocessor
FIGURE 3 to be located on a single integrated circuit,
In “doping,” a phosphorous atom is put in the place was released in 1971, marking the beginning
of a silicon atom. Because phosphorous has five of the true miniaturization of computers. The
electrons instead of four, the extra electron is free Intel 4004 contained slightly more than 2,300
to move around. transistors. Today, more than 2 billion tran-
sistors can be manufactured in a space as
behaving as an on/off switch. This kind of tiny as the nail of your little finger!
behavior is exactly what is needed to store This incredible feat has fueled an industry
digital information, the 0s (off) and 1s (on) in like no other. In 1951, the Univac I computer
binary language. was the size of a large room. The processor
Early transistors were memory unit itself, which
built in separate units as cost more than one million
small metal rods, with each dollars to produce, was
rod acting as a single on/ 14 feet long by 8 feet wide
off switch. These first tran- by 8.5 feet high and could
sistors were much smaller perform about 1,905 opera-
than vacuum tubes, pro- tions per second. Thanks to
duced little heat, and could advances in integrated cir-
quickly be switched from cuits, the IBM PC released
on to off, thereby allowing 30 years later took up just 1
or blocking electrical cur- cubic foot of space, cost
rent. They also were less $3,000, and performed
expensive than vacuum 155,000 times more quickly.
tubes. (For more information
It wasn’t long, however, about computer history,
FIGURE 4
before transistors reached see the Technology in
Integrated circuits use advanced
their limits. Continuing Focus feature “The History
fabrication techniques to fit millions of
advances in technology of the PC” on page 34.)
transistors into a quarter inch of silicon.
began to require more Computers use on/off
This is an integrated circuit with areas
transistors than circuit switches to perform their
marked out in black to show memory
boards could reasonably functions. But how can
units, logic sections, and input/output
handle at the time. Some- these simple switches be
blocks.
thing was needed to pack organized so that they
more transistor capacity let you use a computer to
into a smaller space. Thus, integrated cir- pay your bills online or write an essay? How
cuits, the next technical revolution in can a set of switches describe a number or a
switches, were developed. word, or give a computer the command to

Technology in Focus: Under the Hood 349


SOUND Where Does Binary
BYTE Show Up?

In this Sound Byte, you’ll learn how to use tools to work


with binary, decimal, and hexadecimal numbers. (These
tools come with the Windows operating system.) You’ll
also learn where you might see binary and hexadecimal
values when you use a computer.

perform addition? Recall that to manipulate


the on/off switches, the computer works in
binary language, which uses only two digits,
0 and 1. To understand how a computer
works, let’s first look at the special number-
ing system called the binary number system.

THE BINARY NUMBER


SYSTEM FIGURE 5
A number system is an organized plan for The joke here is that the base ten representation of
representing a number. Although you may 2 is written as 10 in binary.
not realize it, you are already familiar with
one number system. The base 10 number positions: on or off. This numbering system
system, also known as decimal notation, is is referred to as the binary number system.
the system you use to represent all of the The binary number system is also referred
numeric values you use each day. It’s called to as the base 2 number system. Even with just
base 10 because it uses 10 digits, 0 through 9, two digits, the binary number system can still
to represent any value. represent all the values that a base 10 number
To represent a number in base 10, you system can (see Figure 5). Instead of breaking
break the number down into groups of ones, the number down into sets of ones, tens, hun-
tens, hundreds, thousands, and so on. Each dreds, and thousands, as is done in base 10 no-
digit has a place value depending on where it tation, the binary number system describes a
appears in the number. For example, using number as the sum of powers of 2. Binary
base 10, in the whole number 6,954, there are numbers are used to represent every piece of
6 sets of thousands, 9 sets of hundreds, 5 sets data stored in a computer: all of the numbers,
of tens, and 4 sets of ones. Working from right all of the letters, and all of the instructions that
to left, each place in a number represents an the computer uses to execute work.
increasing power of 10, as shown here:
Representing Integers
6,954 = 6 * (1,000) + 9 * (100) + 5 * (10) + 4 * (1) In the base 10 number system, a whole
= 6 * 103 + 9 * 102 + 5 * 101 + 4 * 100 number is represented as the sum of ones,
tens, hundreds, and thousands—that is,
Note that in this equation, the final num- sums of powers of 10. The binary system
ber 1 is represented as 100 because any num- works in the same way, but describes a value
ber raised to the zero power is equal to 1. as the sum of groups of 1s, 2s, 4s, 8s, 16s, 32s,
Anthropologists theorize that humans 64s, etc—that is, powers of 2: 1, 2, 4, 8, 16, 32,
developed a base 10 number system because 64, and so on.
we have 10 fingers. However, computer sys- Let’s look at the number 67. In base 10, the
tems, with their huge collections of on/off number 67 would be six sets of 10s and seven
switches, are not well suited to thinking sets of 1s, as follows:
about numbers in groups of 10. Instead, com-
puters describe a number in powers of 2 be-
Base 10: 67 = 6 * 101 + 7 * 100
cause each switch can be in one of two

350 Technology in Action


One way to figure out how 67 is repre-
sented in base 2 is to find the largest possible SOUND Binary Numbers
power of 2 that could be in the number 67. BYTE Interactive
Two to the eighth power is 256, and there are
no groups of 256 in the number 67. Two to This Sound Byte helps remove the mystery surrounding
the seventh power is 128, but that is bigger binary numbers.You’ll learn about base conversion among
than 67. Two to the sixth power is 64, and decimal, binary, and hexadecimal systems interactively,
there is a group of 64 inside a group of 67. using colors, sounds, and images.

67 has 1 group of 64 That leaves 3 and


3 has 0 groups of 32 and then clicking the View menu to select
0 groups of 16 Programmer. Instead of the default setting of
DEC (decimal), switch to BIN (binary) and
0 groups of 8
enter your calculation.
0 groups of 4 A large integer value becomes a very long
1 group of 2 That leaves 1 and string of 1s and 0s in binary! For conven-
1 has 1 group of 1 And now noth- ience, programmers often use hexadecimal
ing is left notation to make these expressions easier to
use. Hexadecimal is a base 16 number sys-
So, the binary number for 67 is written as
1000011 in base 2:

Base 2: 67 = 64 + 0 + 0 + 0 + 0 + 2 + 1
=(1 * 26) + (0 * 25) + (0 * 24) + (0 * 23) + (0 * 22) + (1 * 21) + (1 * 20)
=(1000011) base 2

It is easier to have a calculator do this for tem, meaning it uses 16 digits to represent
you! Some calculators have a button labeled numbers instead of the 10 digits used in base
DEC (for decimal) and another labeled BIN 10 or the 2 digits used in base 2. The 16 digits
(for binary). Using Windows, you can access it uses are the 10 numeric digits, 0 to 9, plus
the Scientific Calculator that supports six extra symbols: A, B, C, D, E, and F. Each
conversion between decimal (base 10) and of the letters A through F corresponds to a
binary (base 2) by choosing Start, All Pro- numeric value, so that A equals 10, B equals
grams, Accessories; then clicking Calculator; 11, and so on (see Figure 6). Therefore, the

FIGURE 6 Sample Hexadecimal Values

Decimal Number Hexadecimal Value Decimal Number Hexadecimal Value

00 00 08 08

01 01 09 09

02 02 10 A

03 03 11 B

04 04 12 C

05 05 13 D

06 06 14 E

07 07 15 F

Technology in Focus: Under the Hood 351


value 67 in decimal is 1000011 in binary or 43 For example, the binary format for the num-
in hexadecimal notation. It is much easier for ber 2 is two digits (10), whereas the binary
computer scientists to use the two-digit 43 format for the number 10 is four digits
than the seven-digit string 1000011. The Win- (1010). Although binary numbers can have
dows Calculator in Scientific view also can more or fewer than 8 bits, each single alpha-
perform conversions to hexadecimal nota- betic or special character is 1 byte (or 8 bits)
tion. (You can watch a video showing you of data and consists of a unique combination
how to perform conversions between bases of a total of eight 0s and 1s.
using the Windows Calculator in the Sound The ASCII code represents the 26 upper-
Byte titled “Where Does Binary Show Up?”) case letters and 26 lowercase letters used in
the English language, along with many
Representing Characters: ASCII punctuation symbols and other special char-
We have just been converting integers acters, using 8 bits. Figure 7 shows several
from base 10, which we understand, to base 2 examples of ASCII code representation of
(binary state), which the computer under- printable letters and characters.
stands. Similarly, we need a system that con-
verts letters and other symbols that we
understand to a binary state that the com- Representing Characters:
puter understands. To provide a consistent Unicode
means for representing letters and other Because it represents letters and charac-
characters, certain codes dictate how to rep- ters using only 8 bits, the ASCII code can as-
resent characters in binary format. Older sign only 256 (or 28) different codes for
mainframe computers use Extended Binary- unique characters and letters. Although this
Coded Decimal Interchange Code (EBCDIC, is enough to represent English and many
pronounced “Eb-sih-dik”). However, most of other characters found in the world’s lan-
today’s personal computers use the Ameri- guages, ASCII code cannot represent all lan-
can National Standards Institute (ANSI, pro- guages and symbols, because some
nounced “An-see”) standard code, called the languages require more than 256 characters
American Standard Code for Information and letters. Thus, a new encoding scheme,
Interchange (ASCII, pronounced “As-key”), called Unicode, was created. By using 16 bits
to represent each letter or character as an instead of the 8 bits used in ASCII, Unicode
8-bit (or 1-byte) binary code. can represent nearly 1,115,000 code points
Each binary digit is called a bit for short. and currently assigns more than 96,000
Eight binary digits (or bits) combine to create unique character symbols (see Figure 8). The
one byte. We have been converting base 10 first 128 characters of Unicode are identical
numbers to a binary format. In such cases, to ASCII, but because of its depth, Unicode is
the binary format has no standard length. also able to represent the alphabets of all

FIGURE 7 ASCII Standard Code for a Sample of Letters and Characters

ASCII Code Represents This Symbol ASCII Code Represents This Symbol

01000001 A 01100001 a

01000010 B 01100010 b

01000011 C 01100011 c

01011010 Z 00100011 #

00100001 ! 00100100 $

00100010 “ 00100101 %

Note: For the full ASCII table, see asciitable.com.

352 Technology in Action


number, indicating
whether the number
is in the hundreds or
millions, for example.
The standard says to
use the next 23 bits to
store the value of the
number.

Interpretation
All data inside the
computer is stored as
bits. Positive and neg-
ative numbers can be
stored using signed
integer notation, with
the first bit (the sign
bit) indicating the sign
and the rest of the bits
FIGURE 8
indicating the value of
The written languages of the world require thousands of different characters,
the number. Decimal
shown here. Unicode provides a system allowing digital representation of over
numbers are stored
1,100,000 unique characters.
according to the IEEE
floating-point stan-
dard, and letters and
symbols are stored according to the ASCII
modern and historic languages and nota- code or Unicode. All of these different num-
tional systems, including such languages ber systems and codes exist so that comput-
and writing systems as Tibetan, Tagalog, ers can store different types of information in
Japanese, and Canadian Aboriginal syllabics. their on/off switches. No matter what kind
As we continue to become a more global so- of data you input in a computer—a color, a
ciety, it is anticipated that Unicode will re- musical note, or a street address—that data
place ASCII as the standard character will be stored as a string of 1s and 0s. The im-
formatting code. portant lesson is that the interpretation of 0s
and 1s is what matters. The same binary pat-
Representing Decimal Numbers tern could represent a positive number, a
The binary number system also can repre- negative number, a fraction, or a letter.
sent a decimal number. How can a string of How does the computer know which inter-
1s and 0s capture the information in a value pretation to use for the 1s and 0s? When your
such as 99.368? Because every computer brain processes language, it takes the sounds
must store such numbers in the same way, you hear and uses the rules of English, along
the Institute of Electrical and Electronics En- with other clues, to build an interpretation of
gineers (IEEE) has established a standard the sound as a word. If you are in New York
called the floating-point standard that de- City and hear someone shout, “Hey, Lori!” you
scribes how numbers with fractional parts expect someone is saying hello to a friend. If
should be represented in the binary number you are in London and hear the same sound—
system. Using a 32-bit system, we can repre- “Hey! Lorry!”—you jump out of the way be-
sent an incredibly wide range of numbers. cause a truck is coming at you! You knew
The method dictated by the IEEE standard which interpretation to apply to the sound be-
works the same for any number with a deci- cause you had some other information—that
mal point, such as the number –0.75. The first you were in England.
digit, or bit (the sign bit), is used to indicate Likewise, the CPU is designed to under-
whether the number is positive or negative. stand a specific language or set of instruc-
The next eight bits store the magnitude of the tions. Certain instructions tell the CPU to

Technology in Focus: Under the Hood 353


expect a negative number next or to interpret Understanding
the following bit pattern as a character. SOUND
BYTE the
Because of this extra information, the CPU CPU
always knows which interpretation to use
for a series of bits. In this Sound Byte, you’ll take animated tours that
illustrate many of the hardware concepts introduced in

The CPU this chapter. Along the way, you’ll learn about the
machine cycle of the CPU, the movement of data
Machine Cycle between RAM and the CPU, and the hierarchy of the
different types of memory in computer systems.
Any program you run on your computer
is actually a long series of binary code de-
scribing a specific set of commands the CPU addition, subtraction, multiplication, divi-
must perform. These commands may be sion, and other mathematical and logical op-
coming from a user’s actions or may be in- erations at incredible speeds.
structions fed from a program while it exe-
cutes. Each CPU is somewhat different in the 4. STORE: The result is stored in one of
exact steps it follows to perform its tasks, but the registers, special memory storage areas
all CPUs must perform a series of similar built into the CPU, which are the most ex-
general steps. These steps, illustrated in pensive, fastest memory in your computer.
Figure 9, are referred to as a CPU machine The CPU is then ready to fetch the next set of
cycle (or processing cycle). bits encoding the next instruction.
1. FETCH: When any program begins to No matter what program you are running,
run, the 1s and 0s that make up the pro- be it a Web browser or a word processing
gram’s binary code must be “fetched” from program, and no matter how many pro-
their temporary storage location in random grams you are using at one time, the CPU
access memory (RAM) and moved to the performs these four steps over and over at
CPU before they can be executed. incredibly high speeds. Shortly, we’ll look at
each stage in more detail so that you can un-
2. DECODE: Once the program’s binary derstand the complexity of the CPU’s design,
code is in the CPU, it is decoded into the how to compare different CPUs on the mar-
commands the CPU understands. ket, and what enhancements you can expect
3. EXECUTE: Next, the CPU actually per- in CPU designs of the future. But first, let’s
forms the work described in the commands. examine a few of the CPU’s other compo-
RAM
Specialized hardware on the CPU performs nents that help it perform its tasks.

THE SYSTEM CLOCK


CPU To move from one stage of the machine
cycle to the next, the motherboard uses a
Registers
built-in system clock. This internal clock is
Decode actually a special crystal that acts like a
Arithmetic
A r
Fetch Lo
Logic Unit metronome, keeping a steady beat and
(A
(ALU) thereby controlling when the CPU will move
to the next stage of processing.
These steady beats or “ticks” of the system
clock, known as the clock cycle, set the pace
Execute
by which the computer moves from process
Control Unit to process. The pace, known as clock speed,
is measured in hertz (Hz), a unit of measure
Store that describes how many times something
happens per second. Today’s system clocks
are measured in gigahertz (GHz), each of
which represents one billion clock ticks per
FIGURE 9 second. Therefore, in a 3 GHz system, there
The CPU machine cycle. are three billion clock ticks each second.

354 Technology in Action


Computers with older processors would Computer
sometimes need one or more cycles to process SOUND
BYTE Architecture
one instruction. Today, however, CPUs are
Interactive
designed to handle more instructions more
efficiently, and are, therefore, capable of exe- In this Sound Byte, you’ll take animated tours that
cuting more than one instruction per cycle. illustrate many of the hardware concepts introduced in
this chapter. Along the way, you’ll learn about the
THE CONTROL UNIT machine cycle of the CPU, the movement of data
The CPU, like any part of the computer sys- between RAM and the CPU, and the hierarchy of the
tem, is designed from a collection of switches. different types of memory in computer systems.
How can simple on/off switches “remember”
the fetch-decode-execute-store sequence of the
CPU machine cycle? How can they perform
As specific instructions from the program
the work required in each of these stages?
are needed, they are moved from RAM into
The control unit of the CPU manages the
registers (the special storage areas located on
switches inside the CPU. It is programmed
the CPU itself), where they wait to be executed.
by CPU designers to remember the sequence
The CPU’s storage area is not big enough
of processing stages for that CPU and how
to hold everything it needs to process at the
each switch in the CPU should be set (i.e., on
same time. If enough memory were located
or off) for each stage. With each beat of the
on the CPU chip itself, an entire program
system clock, the control unit moves each
could be copied to the CPU from RAM be-
switch to the correct on or off setting and
fore it was executed. This certainly would
then performs the work of that stage.
add to the computer’s speed and efficiency,
Let’s now look at each of the stages in the
because there would be no delay while the
machine cycle in a bit more depth.
CPU stopped processing operations to fetch
STAGE 1: THE FETCH instructions from RAM to the CPU. How-
STAGE ever, including so much memory on a CPU
The data and program instructions the CPU chip would make these chips extremely ex-
needs are stored in different areas in the com- pensive. In addition, CPU design is so com-
puter system. Data and program instructions plex that only a limited amount of storage
move between these areas as they are needed space is available on the CPU itself.
by the CPU for processing. Programs (such as
Microsoft Word) are permanently stored on the Cache Memory
hard drive because it offers nonvolatile stor- The CPU doesn’t actually need to fetch
age, meaning the programs remain stored every instruction from RAM each time it
there even when you turn the power off. How- goes through a cycle. There is another layer
ever, when you launch a program (that is, of storage, called cache memory, that has
when you double-click an icon to execute the even faster access than RAM. The word cache
program), the program, or sometimes only the is derived from the French word cacher,
essential parts of a program, is transferred which means “to hide.” Cache memory con-
from the hard drive into RAM. sists of small blocks of memory located di-
The program moves to RAM because the rectly on and next to the CPU chip. These
CPU can access the data and program instruc- memory blocks are holding places for re-
tions stored in RAM more than one million cently or frequently used instructions or data
times faster than if they are left on the hard that the CPU needs the most. When these in-
drive. In part, this is because RAM is much structions or data are stored in cache mem-
closer to the CPU than the hard drive is. ory, the CPU can retrieve them more quickly
Another reason for the delay in transmission than would be the case if it had to access the
of data and program instructions from the instructions or data in RAM.
hard drive to the CPU is that the hard drive is Taking data you think you’ll be using soon
a mechanical device. The hard drive has read/ and storing it nearby is a simple idea but a
write heads that have to sweep over the spin- powerful one. This is a strategy that shows up
ning platters, which takes time. RAM is faster in other places in your computer system. For
because it’s electronic, not mechanical. example, when you are browsing Web pages,

Technology in Focus: Under the Hood 355


such as Intel’s Core i7 processors, have
CPU chip an additional third level of cache mem-
RAM ory storage called Level 3 cache. On
chips computers with Level 3 cache, the CPU
Level 1 cache
checks this area for instructions and data
Fastt trip after it looks in Level 1 and Level 2 cache,
but before it makes the longer trip to
Registers
Fastest retrieval RAM (see Figure 10). The Level 3 cache
when data is holds between 2 and 12 MB of data. With
Longest trip already in registers
of all
12 MB of Level 3 cache, there is storage
for some entire programs to be trans-
Longer trip
ferred to the CPU for execution.
As an end user of computer pro-
Level 2 cache grams, you do nothing special to use
Level 3 cache cache memory. In fact, you are not even
able to see that caching is being used—
nothing special lights up on your sys-
FIGURE 10 tem unit or keyboard. The advantage of
Modern CPUs have two or more levels of cache memory, which leads to faster having more cache memory is that
CPU processing. you’ll experience better performance be-
cause the CPU won’t have to make the
it takes longer to download images than text. longer trip to RAM to get data and in-
Your browser software automatically stores structions as often. Unfortunately, because it
images on your hard drive so that you don’t is built into the CPU chip or motherboard,
have to wait to download them again if you you can’t upgrade cache; it is part of the origi-
want to go back and view a page you’ve al- nal design of the CPU. Therefore, as with
ready visited. Although this cache of files is RAM, it’s important when buying a computer
not related to the cache storage space de- to consider buying the one, everything else
signed into the CPU chip, the idea is the same. being equal, with the most cache memory.
Modern CPU designs include several
types of cache memory. If the next instruc-
tion to be fetched is not already located in a STAGE 2: THE DECODE
CPU register, instead of looking directly to STAGE
RAM to find it, the CPU first searches Level 1 The main goal of the decode stage is for the
cache. Level 1 cache is a block of memory CPU’s control unit to translate (or decode) the
that is built onto the CPU chip to store data program’s instructions into commands the
or commands that have just been used. CPU can understand. A CPU can understand
If the command is not located in Level 1 only a tiny set of commands. The collection of
cache, the CPU searches Level 2 cache. De- commands a specific CPU can execute is called
pending on the design of the CPU, Level 2 the instruction set for that system. Each CPU
cache is either located on the CPU chip but is has its own unique instruction set. For exam-
slightly farther away from the CPU, or is on a ple, the AMD Phenom II X6 six core processor
separate chip next to the CPU and therefore in a Gamer Mage system from iBuyPower has
takes somewhat longer to access. Level 2 a different instruction set than does the Intel
cache contains more storage area than does Core i5 used in a Dell Inspiron notebook. The
Level 1 cache. For the Intel Core i7, for exam- control unit interprets the code’s bits accord-
ple, the Level 1 cache is 64 kilobytes (KB) and ing to the instruction set the CPU designers
the Level 2 cache is 1 megabytes (MB). laid out for that particular CPU. Based on this
Only if the CPU doesn’t find the next in- process of translation, the control unit then
struction to be fetched in either Level 1 or knows how to set up all the switches on the
Level 2 cache will it make the long journey to CPU so that the proper operation will occur.
RAM to access it. Because humans are the ones who write the
The current direction of processor design is initial instructions, all of the commands in an
toward increasingly large multilevel CPU instruction set are written in a language called
cache structures. Therefore, some newer CPUs, assembly language, which is easier for humans

356 Technology in Action


to work with than binary. Many CPUs have of bits arrive, it knows the work it must do.
similar assembly commands in their instruction Figure 11 shows a few commands in both as-
sets, including the commands listed here: sembly language and machine language.

ADD Add STAGE 3: THE EXECUTE


SUB Subtract
STAGE
The arithmetic logic unit (ALU) is the part
of the CPU designed to perform mathemati-
MUL Multiply
cal operations such as addition, subtraction,
DIV Divide multiplication, and division and to test the
comparison of values such as greater than, less
MOVE Move data to RAM than, and equal to. For example, in calculating
an average, the ALU is where the addition
STORE Move data to a CPU register and division operations would take place.
The ALU also performs logical OR, AND, and
EQU Check if equal NOT operations. For example, in determining
whether a student can graduate, the ALU
would need to ascertain whether the student
CPUs differ in the choice of additional as- had taken all required courses AND obtained
sembly language commands selected for the a passing grade in each of them. The ALU is
instruction set. Each CPU design team works specially designed to execute such calcula-
to develop an instruction set that is both tions flawlessly and with incredible speed.
powerful and speedy. The ALU is fed data from the CPU’s regis-
However, because the CPU knows and ters. The amount of data a CPU can process
recognizes only patterns of 0s and 1s, it can- at a time is based in part on the amount of
not understand assembly language directly, data each register can hold. The number of
so these human-readable instructions are bits a computer can work with at a time is re-
translated into long strings of binary code. ferred to as its word size. Therefore, a 64-bit
The control unit uses these long strings of processor can process more information
binary code called machine language to set faster than a 32-bit processor.
up the hardware in the CPU for the rest of
the operations it needs to perform. Machine STAGE 4: THE STORE
language is a binary code for computer STAGE
instructions, much like the ASCII code is a In the final stage, the result produced by the
binary code for letters and characters. Simi- ALU is stored back in the registers. The instruc-
lar to each letter or character having its own tion itself will explain which register should be
unique combination of 0s and 1s assigned to used to store the answer. Once the entire
it, a CPU has a table of codes consisting of instruction has been completed, the next in-
combinations of 0s and 1s for each of its com- struction will be fetched, and the fetch-decode-
mands. If the CPU sees a particular pattern execute-store sequence will begin again.

FIGURE 11 Representations of Sample CPU Commands

CPU Command in Assembly CPU Command in Machine


Human Language for Language (Language Used by Language (Language Used in
Command Programmers) the CPU’s Instruction Set)

Add ADD 1110 1010

Subtract SUB 0001 0101

Multiply MUL 1111 0000

Divide DIV 0000 1111

Technology in Focus: Under the Hood 357


Making CPUs transistors—more than 18 times the transis-
tor count of the Pentium 4 from the year
Even Faster 2000. Moreover, Intel’s Itanium 9300 flaunts
a whopping 2.3 billion transistors! How
Knowing how to build a CPU that can run much longer can Moore’s prediction hold
faster than the competition can make a com- true? Only time will tell.
pany rich. However, building a faster CPU is Processor manufacturers can increase CPU
not easy. A new product launch must take performance in many different ways. One ap-
into consideration the time it will take to de- proach is to use a technique called pipelining
sign, manufacture, and test that processor. to boost performance. Another approach is to
When the processor finally hits the market, it design the CPU’s instruction set so that it
must be faster than the competition if the contains specialized, faster instructions for
manufacturer hopes to make a profit. To cre- handling multimedia and graphics. In addi-
ate a CPU that will be released 36 months tion, some CPUs, such as Intel’s i7 980X or the
from now, it must be built to perform at least AMD Phenom II x6 processors, now have six
twice as fast as anything currently available. independent processing paths inside, with
Gordon Moore, the cofounder of proces- one CPU chip doing the work of six separate
sor manufacturer Intel, predicted more than CPU units. Some heavy computational prob-
40 years ago that the number of transistors lems are attacked by large numbers of com-
on a processor would double every 18 puters actually clustered together to work at
months. Known as Moore’s Law, this predic- the same time.
tion has been remarkably accurate—but only
with tremendous engineering ingenuity. The
first 8086 chip had only 29,000 transistors PIPELINING
and ran at 5 MHz. Advances in the number As an instruction is processed, the CPU
of transistors on processors through the runs sequentially through the four stages of
1970s, 1980s, and 1990s continued to align processing: fetch, decode, execute, and store.
with Moore’s prediction. Pipelining is a technique that allows the
However, there was a time near the turn CPU to work on more than one instruction
of the 21st century when skeptics questioned (or stage of processing) at a time, thereby
how much longer Moore’s Law would hold boosting CPU performance.
true. These skeptics were proved wrong with For example, without pipelining, it may
the microprocessor’s continued growth in take four clock cycles to complete one in-
power. Today’s Intel i7 chip has 774 million struction (one clock cycle for each of the four

DOES YOUR he history of computing shows us that processing power increases

COMPUTER T tremendously each year. One strategy in use now for continuing that
trend is cluster computing. If one computer is powerful, then two
are twice as powerful—if you can get them to work together. A computing
cluster is a group of computers, connected by specialized clustering software,
NEED MORE that works together to solve complex equations. Most clusters work on
something called the balancing principle, whereby computational work is
POWER? transferred from overloaded (busy) computers in the cluster to computers
that have more computing resources available. Computing clusters, although
TEAM IT UP! not as fast as supercomputers (single computers with extremely high
processing capabilities), can perform computations faster than one computer
working alone and are used for complex calculations such as weather fore-
casting and graphics rendering. You can now rent time on computing clusters
through services like PurePowua (purepowua.com), where you can upload
and remotely control your job from your desktop as it runs on a cluster of
computers.

358 Technology in Action


processing stages). However, with a four- Figure 12a, a non-pipelined instruction takes
stage pipeline, the computer can process four four clock cycles to be completed, whereas in
instructions at the same time. Like an auto- Figure 12b, the four instructions have been
mobile assembly line, instead of waiting for completed in the same time using pipelining.
one car to go completely through each The number of stages in a pipeline de-
process of assembly, painting, and so on, you pends entirely on design decisions. Earlier
can have four cars going through the assem- we analyzed a CPU that went through four
bly line at the same time. When every compo- stages in the execution of an instruction. The
nent of the assembly line is done with its Intel Pentium 4 with hyperthreading fea-
process, the cars all move on to the next stage. tured a 31-stage pipeline, and the PowerPC
Pipelined architectures allow several in- G5 processor used a 10-stage pipeline. Thus,
structions to be processed at the same time. similar to an assembly line, in a 31-stage
The ticks of the system clock (the clock cycle) pipeline, as many as 31 different instructions
indicate when all instructions move to the can be processed at any given time, making
next process. The secret of pipelining is that the processing of information much faster.
the CPU is allowed to be fetching one in- However, because so many aspects of the
struction while it is simultaneously decoding CPU design interact, you cannot predict per-
another, executing a third, storing a fourth, formance based solely on the number of
and so on. Using pipelining, a four-stage stages in a pipeline.
processor can potentially run up to four There is a cost to pipelining a CPU as well.
times faster because some instruction is fin- The CPU must be designed so that each stage
ishing every clock cycle rather than waiting (fetch, decode, execute, and store) is inde-
four cycles for each instruction to finish. In pendent. This means that each stage must be

a Instruction Cycle, Non-Pipelined

Instruction 1 Fetch Decode Execute Store

Instruction 2 Fetch Decode Execute Store

Clock Ticks
0 1 2 3 4 5 6 7

b Instruction Cycle, Pipelined

Instruction 1 Fetch Decode Execute Store

Instruction 2 Fetch Decode Execute Store

Instruction 3 Fetch Decode Execute Store

Instruction 4 Fetch Decode Execute Store

Clock Ticks
0 1 2 3 4 5 6 7
FIGURE 12
Instead of (a) waiting for each instruction to complete, (b) pipelining allows the system to work on more
than one set of instructions at one time.

Technology in Focus: Under the Hood 359


able to run at the same time that the other Jaguar supercomputer has a total of 37,376
three stages are running. This requires more independent processors!
transistors and a more complicated hard- Meanwhile, Intel is promoting a technol-
ware design. ogy called multi-core processing in its Core
processor line of chips. Chips with dual-core
processing capabilities have two separate
SPECIALIZED
parallel processing paths inside them, so
MULTIMEDIA they are almost as fast as two separate CPUs.
INSTRUCTIONS Dual-core processing is especially helpful be-
Each design team that develops a new cause antivirus software and other security
CPU tries to imagine what users’ greatest programs often run in the background as
needs will be in four or five years. Currently, you use your system. A dual-core processor
several processors on the market reflect this enables these multiple applications to exe-
consideration by incorporating specialized cute much more quickly than with tradi-
multimedia instructions into the basic in- tional CPUs. Six-core processors, like the
struction set. Intel i7 Extreme Edition, are appearing in
Hardware engineers have redesigned the high-performance home-based systems now
chip so that the instruction set contains new as well, executing six separate processing
commands that are specially designed to paths.
speed up the work needed for video and Multiprocessor systems are often used
audio processing. For example, Intel has in- when intensive computational problems
tegrated the Streaming Single Instruction need to be solved in such areas as computer
Multiple Data (SIMD) Extensions 3 set of simulations, video production, and graphics
commands into its processor designs, adding processing. Having two processors allows
a special group of 157 commands to the basic the work to be done almost twice as quickly,
instruction set. These multimedia-specific in- but not quite. It is not quite twice as fast be-
structions work to accelerate video, speech, cause the system must do some extra work to
and image processing in the CPU. decide which processor will work on which
part of the problem and to recombine the re-
MULTIPLE PROCESSING sults each CPU produces.
EFFORTS Certain types of problems are well suited
Many high-end server systems employ a to a parallel-processing environment. In
quad processor design that has four com- parallel processing, there is a large network
pletely separate CPU chips on one mother- of computers, with each computer working
board. Often, these server systems can later on a portion of the same problem simultane-
be scaled so that they can accommodate four, ously. To be a good candidate for parallel
six, or even twelve processors. The Cray processing, a problem must be one that can

TODAY’S upercomputers are the biggest and most powerful type of computer.

SUPER- S Scientists and engineers use these computers to solve complex prob-
lems or to perform massive computations. Some supercomputers are
single computers with multiple processors, whereas others consist of multiple
computers that work together.
COMPUTERS: The top spot on the June 2010 Top 500 List was won by the Cray Jaguar.
It operates at a peak of more than 2,300 teraflops (or 2,300 trillion opera-
THE FASTEST tions per second). That’s almost 23,000 times faster than the fastest personal
computer! Second position was the entry from China, the Nebulae.
OF THE FAST Check out the current crop of the world’s fastest supercomputers at the
Top 500 site (top500.org).

360 Technology in Action


be divided into a set of tasks that can be run processing is used in complex weather fore-
simultaneously. So, for example, a problem casting to run calculations over many differ-
where millions of faces are being compared ent regions around the globe; in the airline
with a target image for recognition is easily industry to analyze customer information in
adapted to a parallel setting. The target face an effort to forecast demand; and by the gov-
can be compared at the same time to many ernment in census data compilation.
hundreds of faces. But if the next step of an Thus, what you can continue to expect
algorithm can be started only after the results from CPUs in the future is that they will con-
of the previous step have been computed, tinue to get smaller and faster and consume
parallel processing will present no advan- less power. This fits with the current de-
tages. mands of consumers for more powerful
A simple analogy of parallel processing is portable computing devices.
a laundromat. Instead of taking all day to do At the most basic level of binary 1s and 0s,
five loads of laundry with one machine, you computers are systems of switches that can
can bring all your laundry to a laundromat, accomplish impressive tasks. By understand-
load it into five separate machines, and finish ing the hardware components that make up
it all in approximately the same time it your computer system, you can use your sys-
would have taken you to do just one load on tem more effectively and make better buying
a single machine. In real life, parallel decisions.

Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms
and concepts from this Technology in Focus feature.

1. Which is not a typical use of parallel processing 6. Special areas of memory storage built into the CPU
systems? are known as
a. Computer simulations a. switches. c. registers.
b. Word processing b. semiconductors. d. integrated circuits.
c. Weather modeling
7. Which is the correct set of steps in the machine cycle?
d. Graphics processing
a. Execute, store, fetch, decode
2. What is another name for the base 10 number system? b. Store, fetch, execute, decode
a. Decimal notation c. Decode, execute, fetch, store
b. Binary number system d. Fetch, decode, execute, store
c. Hexadecimal notation
8. All data inside the computer is stored as
d. Integer system
a. bytes. c. switches.
3. Which encoding scheme can represent the alphabets b. bits. d. cache memory.
of all modern and historic languages?
9. Which statement about pipelining is false?
a. Base 2 number system c. ASCII
a. Pipelining boosts CPU performance.
b. Unicode d. Scientific
b. Pipeline design is used in many modern CPUs.
4. Moore’s Law is best described as c. Pipelining requires a less complicated hardware
a. an observation of the rate of increasing transistor design.
density. d. The process allows the computer to process multi-
b. a physical principle. ple instructions simultaneously.
c. a legal construct limiting performance.
10. From fastest to slowest, which is the fastest sequence
d. an advertising campaign by Intel.
of accessing memory?
5. To regulate the internal timing of a computer system, a. RAM, Level 1 cache, Level 2 cache, Level 3 cache
the motherboard uses b. Registers, Level 1 cache, Level 2 cache, RAM
a. a system clock. c. RAM. c. Level 1 cache, Level 2 cache, RAM, registers
b. software simulation. d. a register. d. Level 2 cache, Level 1 cache, registers, RAM

Technology in Focus: Under the Hood 361


eight
eight
chapter

digital lifestyle:
managing digital data and devices

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What are the changes that have brought us a digital lifestyle? (pp. 364–365)
2. How has the move to digital information affected the communication tools important
to both the business world and life outside of work? (p. 366)
3. How do cell phone and smartphone components resemble a traditional computer,
and how do they work? (pp. 366–374)
4. Why would I use VoIP, and what does it offer that is unique? (pp. 374–376)
5. How is digital media different from analog? (p. 377)
6. What can I carry in a portable media player, and how does it store data? (pp. 377–381)
7. What ways are there for me to create and to watch digital video? (pp. 386–391)
8. What changes does ubiquitous computing bring to our lifestyles? (pp. 393–397)

multimedia resources
multimedia
resources

Active Helpdesk
• Keeping Your Data on Hand (p. 376)
• Using Portable Media Players (p. 380)
Sound Bytes
• Smartphones Are Really Smart (p. 369)
• Connecting with Bluetooth (p. 371)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? TiVo is not the only game in
town! PVR (personal video recorder) software is now available, free of charge, for every
style of operating system. Using a PVR, you can record standard or HD television
broadcasts on your hard drive and then watch them when you have the time. Free
programs like XBMC Media Center and MeediOS let you pause and rewind
live TV shows and include features that allow you to automatically detect and skip
commercials. You even have access to a TV listings guide and can schedule
your PVR from any location using the Web.

363
A Digital Lifestyle digital formats. Phone systems and televi-
sion signals are now digital streams of data.
Computers today are central to everyday What is special about digital? Any
life. Which part of your life isn’t touched by kind of information can be digitized (meas-
some sort of computer or digital technol- ured and converted to a stream of numeric
ogy? Computer-like devices (such as smart- values). Consider sound. It is carried to your
phones and iPods) are everywhere. Much ears by sound waves, which are actually
of your entertainment—playing games, patterns of pressure changes in the air.
watching movies and television, and Images are our interpretation of the chang-
downloading songs—is probably delivered ing intensity of light waves around us.
via the Internet. These sound and light waves are called
Do you really understand how all this analog waves or continuous waves. They
digital technology works? Do you know all illustrate the loudness of a sound or the
of your options so you can enjoy the digital brightness of the colors in an image at a
devices you purchase to the fullest extent? given moment in time. They are continuous
In this chapter, we explore the key aspects of signals because you would never have to lift
your digital life—digital communication, your pencil off the page to draw them; they
digital entertainment, and digital mobility— are just long, continuous lines.
and help you understand how the related First-generation recording devices such as
technologies work so you can use them to vinyl records and analog television broad-
your best advantage. casts were designed to reproduce these
When did everything go sound and light waves. A needle in the
“digital”? It used to be that everything groove of a vinyl record vibrates in the same
was analog. Today, no matter what you’re pattern as the original sound wave. Analog
interested in—music, movies, television, television signals are actually waves that tell
radio, stock prices—digital information is an analog TV how to display the same color
the key. All forms of entertainment have mi- and brightness as is seen in the production
grated to the digital domain (see Figure 8.1). studio. However, it’s difficult to describe a
MP3 files encode digital forms of music, and wave, even mathematically. The simplest
digital cameras and video camcorders are sounds, such as that of middle C on a piano,
now commonplace. In Hollywood, some have the simplest shapes, like the one
feature films are now being shot entirely shown in Figure 8.2. However, something
with digital equipment, and many movie like the word hello generates a highly
theaters use digital projection equipment. complex pattern, like the one shown in
Satellite radio systems such as Sirius Satel- Figure 8.2.
lite Radio and HD Radio are broadcast in What advantages do digital for-
mats have over analog ones? Digital
Figure 8.1 ANALOG VERSUS DIGITAL ENTERTAINMENT formats describe signals as long strings of
numbers. This digital representation gives
Analog Digital
us a simple way to describe sound and light
Music Vinyl record albums and CDs and MP3 files waves exactly so that sounds and images
cassette tapes can be reproduced perfectly each time. In
Photography 35-mm single lens reflex Digital cameras, including addition, we already have easy ways to
(SLR) cameras digital SLRs distribute digital information (on CDs and
Photos stored on film Photos stored as digital files DVDs and using e-mail, for example). Thus,
digital information can be reproduced
Video 8-mm, VHS, and Hi8 High Definition Digital video exactly and distributed easily. Both give it
camcorders (DV) camcorders
huge advantages over analog.
Film stored on tapes Film stored as digital files;
distributed on DVD and
How can a sequence of numbers
Blu-ray discs and express complicated analog
streamed shapes? The answer is provided by
something called analog-to-digital conversion.
Radio AM/FM radio HD Radio
In analog-to-digital conversion, the incom-
Sirius/XM Radio ing analog signal is measured many times
Television Conventional broadcast High Definition Digital each second. The strength of the signal at
analog TV television (HDTV) each measurement is recorded as a simple
number. The series of numbers produced by

364 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


a

Middle C

“Hello”

Figure 8.2
the analog-to-digital conversion process media—like photographs, music, and (a) This is an analog wave
gives us the digital form of the wave. video—switched over to a digital standard, showing the simple, pure
Figure 8.3 shows analog and digital versions we began to have products with new sound of a piano playing
of the same wave. In Figure 8.3a, you see the and useful capabilities. Small devices can middle C. (b) This is the
original, continuous analog wave. You could now hold huge collections of a variety of complex wave produced
when a person says
draw that wave without lifting your pencil types of information. We can interact with “Hello.”
from the page. In Figure 8.3b, the wave has our information any time we like, in ways
been digitized and is no longer a single line; that, prior to the conversion to digital
instead, it is represented as a series of points media, had been too expensive or too
or numbers. difficult to learn. The implications of the
How has the change from analog shift to digital media are continually
to digital technologies affected our evolving. Let’s examine the many ways in
lifestyle? When the market for which digital media has already changed
communication devices for entertainment our lifestyles.

Figure 8.3
a Analog Sound Wave b Digitized Sound Wave
(a) A simple analog wave.
(b) A digitized version of
the same wave.

1 5 10 15 20 25 30 35 1 5 10 15 20 25 30 35
TIME TIME

A Digital Lifestyle 365


Digital Telephony: category. A smartphone often requires a data
plan from the cell phone provider. This is
Communicating logical because a smartphone user is likely
with Bits to spend a lot of time accessing the Internet
Communication has changed radically in to upload and download e-mail and data.
the digital age. Chapter 3 discussed the use Some smartphones have enough computing
of wikis, blogs, RSS feeds, and other Web- power to run versions of programs like Mi-
based tools for connecting people and their crosoft Excel and PowerPoint.
ideas. All of these software applications are How do cell phones use digital sig-
dependent on digital information. nals? When you speak into a cell phone,
Hardware devices that support communi- the sound enters the microphone as a sound
cation also have evolved because of digital wave. Because analog sound waves need to
technologies. Telephony, the use of equip- be digitized (that is, converted into a se-
ment to provide voice communications over quence of 1s and 0s that the cell phone’s
a distance, has shifted from an analog processor can understand), an analog-to-
science to a digital one. In this section, we digital converter chip converts your voice’s
examine cell phones, smartphones, and sound waves into digital signals. Next, the
Voice over Internet Protocol (VoIP) devices digital data must be compressed, or
to see how they are changing to meet squeezed, into the smallest possible space so
modern communication needs. that it will transmit more quickly to another
phone. The processor cannot perform the
mathematical operations required at this
stage quickly enough, so a specialized chip
Cell Phones and Smartphones called the digital signal processor is
What are cell phones and smart- included in the cell phone to handle the
phones? The cellular phone (or cell compression work. Finally, the digital data
phone) has evolved from a clunky, boxlike is transmitted as a radio wave through the
device to a compact, fully featured commu- cellular network to the destination phone.
nication and information storage device. When you receive an incoming call, the
Cell phones offer all of the features available digital signal processor decompresses the
on a traditional telephone system, including incoming message. An amplifier boosts the
automatic redial, call timers, and voice mail signal to make it loud enough, and it is then
capabilities. Most cell phones also feature passed on to the speaker.
voice-activated dialing, which is important What’s “cellular” about a cell
for hands-free operation. In addition, many phone? A set of connected “cells” makes
cell phones offer Internet access, text mes- up a cellular network. Each cell is a geo-
saging, personal information management graphic area centered on a base transceiver
(PIM) features, voice recording, GPS serv- station, which is a large communications
ices, and digital image and video capture. tower with antennas, amplifiers, receivers,
The most fully featured and powerful and transmitters. When you place a call on a
cellular phones are found in the smartphone cell phone, a base station picks up the re-
quest for service. The station then passes the
request to a central location called a mobile
BITS Phoning Home—Accessing Your switching center. (The reverse process oc-
AND curs when you receive an incoming call.) A
BYTES
Home Computer from Your Cell
telecommunications company builds its
Phone network by constructing a series of cells
An estimated 1 billion cellular phones that aren’t considered smartphones currently that overlap in an attempt to guarantee that
are deployed. But don’t count your cheap phone out of the running if it doesn’t have its cell phone customers have coverage no
advanced software capabilities. You can still use it to access your home computer re- matter where they are.
motely and retrieve that big presentation you need for this afternoon. Remote access As you move during your phone call, the
services such as GoToMyPC (gotomypc.com) and LogMeIn (logmein.com) can help mobile switching center monitors the
and are free of charge. As long as you have a browser on your cell phone and a data strength of the signal between your cell
plan with your provider, you can access the files on your computer from your phone phone and the closest base station. When the
without installing any software on the cell phone. You may not have to trade in that signal is no longer strong enough between
low-end cell phone yet. Just try getting it to work a little harder! your cell phone and the base station, the
mobile switching center orders the next base

366 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


station to take charge of your call. When
Memory chip
your cell phone “drops out,” it may be be-
cause the distance between base stations
was too great to provide an adequate signal. Speaker
Are cell phones and smartphones
considered computers? Cell phones
and smartphones are so advanced that they
have many of the same components as a
Liquid crystal
computer: a processor (central processing display
unit, or CPU); memory; and input and
output devices, as shown in Figure 8.4.
Cell/smartphones also require their own
operating system (OS) software and have
their own application software. Keypad
What does the processor inside a
cell/smartphone do? Although the CPU
processor inside a cell phone is obviously
not as fast or as high-powered as a processor
in a desktop computer, it is still responsible
for a great number of tasks. The processor
Microphone
coordinates sending all of the data among
the other electronic components inside
the phone. It also runs the cell phone’s
operating system, which provides a user There are several free operating systems Figure 8.4
interface so that you can change phone that a manufacturer can use as a base for its Inside your cell phone,
settings, store information, play games, cell/smartphone operating system. One you’ll find a CPU, a
memory chip, input
and so on. Popular processors for cell/ popular OS is the Symbian, from the Sym- devices such as a
smartphones include the Qualcomm bian Foundation, which transitioned to an microphone and a keypad,
Snapdragon, the Texas Instruments OMAP, open source product in 2010. The Nokia N8 and output devices such
and the Marvell XScale processor. Some is one device running a Symbian OS. as a display screen and a
processors use dual-core processing technol- Another open source project to develop a speaker.
ogy, which is also used in some desktop free cell/smartphone operating system is
processors. Openmoko. The most successful open OS is
When shopping for a new phone, be well the Android collection developed by
prepared. Use published smartphone Google. The goal of open source mobile
benchmarking results to compare perform- operating systems is to leverage the creativ-
ance. These benchmarks are often published ity of many developers in creating great
on the PC Magazine Web site (pcmag.com) or applications and new phone designs.
at Wired (wired.com). Figure 8.5 illustrates some of the different
Is there a standard operating sys- and creative user interfaces featured among
tem for cell phones? Each cell phone cell phone operating systems.
manufacturer makes its own small changes What does the memory chip inside
to the operating system and designs its own a cell phone do? The operating system
user interface. So when moving between dif- and the information you save in your cell
ferent cell phones, you will likely see a dif- phone (such as phone numbers and ad-
ferent set of commands and icons. dresses) need to be stored in memory. The
There are a number of operating systems operating system is stored in read-only
in the cell phone market now. Many smart- memory (ROM) because the phone would
phones use the Windows Mobile operating be useless without that key piece of soft-
system or the newer Windows Phone 7 ware. As you learned earlier, there are two
series. Apple’s iPhone uses a version of kinds of memory used in computers:
the OS X operating system that is used in volatile memory, which requires power to
Apple’s personal computers, while the Palm store data, and nonvolatile memory, which
Pre uses its own Palm-developed webOS. stores data even when the power is turned
These operating systems are required to off. ROM is nonvolatile, or permanent,
translate the user’s commands into memory. This means that when you turn off
instructions for the processor. your phone, the data that is stored in ROM

Digital Telephony: Communicating with Bits 367


b

a c

Figure 8.5
(including the operating system) remains in What input and output devices do
(a) Symbian, (b) Windows
Mobile, and (c) Android memory. cell phones use? The primary input
are all cell/smartphone Other phone data, such as ring tones, is devices for a cell phone are a microphone
operating systems. stored in separate internal memory chips. and a keypad. Some phones, such as the
Full-featured cell phones have as many as Samsung Impression (see Figure 8.7), feature
200 MB of internal memory (with some both a hidden keyboard (to make sending
smartphones carrying 1 GB internally) and e-mail or text messages more efficient) and a
support additional memory through micro touch-sensitive screen. The Apple iPhone
SD flash cards that can store up to 32 GB. uses its touch-sensitive screen to offer a
Micro SD cards are easy to install in a software-based keyboard (see Figure 8.7)
phone, as shown in Figure 8.6, while some that supports more than 40 languages.
models simply have external slots for an Cell phones often include a digital cam-
SD card. You can use that storage for contact era for capturing photos and video. These
data, ring tones, images, songs, videos, cameras are catching up to the quality level
and even software applications such as a of standalone point-and-shoot cameras. For
language translators or video games. Not example, the Droid Incredible offers a high-
Figure 8.6 every smartphone allows memory upgrades quality 8-megapixel (MP) camera with flash
You can insert additional in this way, however. For example, the and video capture, and the Nokia N8 sports
memory by installing a iPhone series does not allow you to add a 12 MP camera with Carl Zeiss lenses. Most
micro SD flash card in a any memory. cameras on cell phones can record video as
smartphone.
well as take still shots. Picture and video
messaging is popular with many smart-
phone users. They can transmit photos and
video files via e-mail, post the files to Web
sites such as Facebook, or send them directly
to other phones.
Cell phone output devices include a
speaker and a liquid crystal display (LCD).
Higher-end models include full-color, high-
resolution LCD screens. Newer on the mar-
ket are OLED (organic light-emitting diode)
displays, which allow very bright, sharp im-
aging and draw less power. High-resolution
displays are becoming increasingly popular
because more people are using their cell
phones to send and receive the digital im-
ages included in multimedia text messages

368 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


a b NBC, CBS, and PBS are testing this
system.
What cell phone and
smartphone software is
available? Most devices come
with a standard collection of soft-
ware such as a to-do list, contact
manager, and calendar. Modified
versions of application software
such as Microsoft Word, Excel,
Outlook, and PowerPoint are
available for some high-end smart-
phones. A variety of games,
tools, and reference applica-
tions are available from nu-
merous software
Figure 8.7 companies. A good source to lo-
cate software applications for your phone is
(a) The Samsung Impression includes a touch screen
and a built-in QWERTY keyboard. (b) The Apple GetJar (getjar.com). Many manufacturers
iPhone has a touch keyboard that supports more than have Web-based software stores, like iTunes
40 languages and a range of character sets. for the Apple iPhone and the BlackBerry
App World for RIM’s BlackBerry devices
and e-mail, and even to watch TV (see
Figure 8.8). Cell phone and cable providers
are teaming up to deliver broadcast TV SOUND
programs directly to cell phones through
Smartphones Are
BYTE Really Smart
services such as Verizon V Cast and
Sprint TV. A developing standard named
Mobile DTV allows cell/smartphones to In this Sound Byte, you’ll learn how to use a smart-
receive free broadcasts from television phone as a powerful tool to communicate, calculate,
and organize your workload.
stations using the Mobile DTV technology.
At the time of this writing, affiliates of

Figure 8.8
The Mobile DTV system
allows local TV stations to
Single frequency broadcast live, digital
network (SFN) content to mobile devices.

Reception Reception with your Reception in


at home notebook your car

Digital Telephony: Communicating with Bits 369


office computer. This process of updating
your data so that the files on your cell phone
and computer are the same is called syncing
or synchronizing. To synchronize your com-
puter and the device, simply place the cell
phone in its cradle (or attach it to the com-
puter via a USB cable) and touch a “sync”
button. This begins the process of data trans-
fer that updates both sets of files to the most
current version.
Microsoft has recognized the vast in-
crease in portable computing devices by in-
tegrating synchronization into the Windows
operating system. The Sync Center (see
Figure 8.11), which is accessed from the
Control Panel, allows you to set up auto-
matic or manual synchronization. Make sure
the device you are trying to set up synchro-
Figure 8.9 (see Figure 8.9). The Android developer nization parameters for is connected to your
The Blackberry App World community has held competitions to spur computer and then launch the Sync Center.
is one of many online the creation of new software applications for Select the Set up new sync partnerships option
stores delivering software Android-based phones. Many software to view available devices and configure their
for smartphones. applications are available for Android synchronization options.
through the Web and the Android Market. Can I transfer files wirelessly?
How do I move music from my Bluetooth technology uses radio waves to
computer to my smartphone? On the transmit data signals over short distances
32 GB micro SD cards available for phones, (approximately 30 feet for Bluetooth 1 and
there is room for thousands of songs, videos, 60 feet for Bluetooth 2 and 3). Bluetooth 3
or data files. You can transfer files between devices are expected to hit the market by
your phone and your computer easily. Some 2011, with throughput about 8 times faster
phones are designed with a flash card that than Bluetooth 2. Most cell phones on the
can be easily removed and slipped directly market today are Bluetooth-enabled,
into a flash card reader on the computer. meaning they include a small Bluetooth
Almost all phones are designed with a chip that allows them to transfer data
USB port. Some have a mini-USB connector, wirelessly to any other Bluetooth-enabled
while other models require a special cable device. One benefit Bluetooth has over
Figure 8.10 to connect the phone to a standard USB infrared, a wireless connection used in
port (see Figure 8.10). Once connected the past, is that a direct line of sight does
A USB data synch cable
connects your cell phone using a USB data cable, your phone will not have to be present between two
to your computer for data appear on your computer like an additional devices for them to communicate. You also
transfer. flash drive, and you can can use Bluetooth to synchronize your
drag and drop files to it. device with your computer. Bluetooth
You can also charge accessories such as earpieces, mice,
your phone keyboards, and even stereo headsets are
through the now available.
USB cable. Is there a way to synchronize to
How do my home computer before I get
I synchro- home? Yes, a number of Web services are
nize a cell now available to synchronize your e-mail,
phone files, contacts, and calendars instantly and
with a wirelessly. These Web services follow the
com- model of “cloud computing,” where
puter? Cell Internet-based services and resources are
phones let you coordi- distributed to users instead of being in-
nate the changes you make stalled as an application on the user’s com-
to your to-do lists, schedules, and puter. Some synchronization services charge
other files with the files on your home or a fee, like MobileMe from Apple. For a

370 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


Figure 8.11
$99 annual fee, you can make sure the same Text Messaging The Windows Sync Center
files are always on your iPhone, your iPad, makes it easy to arrange
your home desktop, and your notebook What is text messaging? Short mes- for synchronization of all
computer. As soon as information is sage service (SMS)—often just called text your mobile devices.
changed on one device, it is automatically messaging—is a technology that allows you >To launch Sync Center,
“pushed” out to all the other devices, updat- to send short text messages (comprising up click the Start button,
ing their files as well. If you lose your to 160 characters) over mobile networks. To select Control Panel, and
send SMS messages from your cell phone, double-click the Sync
iPhone or iPad, MobileMe lets you log in Center icon.
and display its location on a map. You can you use the keypad or a pre-saved template
then set a password and display a message and type your message. You can send SMS
like “Crazy day! Could you please call me messages to other mobile devices or to any
and I’ll come pick this up?” If you really e-mail address. You also can use SMS to
can’t locate the device, you can use send short text messages from your home
MobileMe to remotely wipe all of the data computer to mobile devices such as your
from the device. friend’s cell phone.
There are other providers of wireless How does SMS work? SMS uses the
synchronization for mobile devices. Google cell phone network to transmit messages.
Sync works with iPhones, Blackberry When you send an SMS message, an SMS
phones, Symbian and Windows Mobile calling center receives the message and
devices, and it’s free. All of your Google delivers it to the appropriate mobile device
e-mail, calendar events, and contacts are using something called store-and-forward
automatically backed up online instantly on technology. This technology allows users to
the Google servers. Even the Amazon send SMS messages to any other SMS device
Kindle uses wireless synchronization so that in the world.
if you read a bit further in your e-book on Many SMS fans like text messaging be-
your phone, when you get to your office, cause it allows the receivers to read mes-
the Kindle software on your PC will have sages when it is convenient for them.
automatically updated to bookmark to the Companies now support texting in many
new page you’re on. ways, so for example, your bank may allow
you to text commands to request account
balances or details about your last transac-
tion, and the bank will text the requested
information back to you. As shown in the
SOUND Connecting with table in Figure 8.12, several companies
BYTE Bluetooth provide useful services based on text
messaging.
In this Sound Byte, you’ll learn what freedoms Blue- If you plan to do a lot of texting, check
tooth affords you, how to decide whether you want the phone’s feature list in advance and look
Bluetooth on equipment that you purchase, and how to for a phone with a good text prediction algo-
use Bluetooth devices. rithm. With such an algorithm, typing a sin-
gle letter pulls up a list of popular words

Digital Telephony: Communicating with Bits 371


Figure 8.12 TEXT MESSAGING SERVICES

SMS Code Service Name Web Site Description


466453 (google) Google SMS google.com/sms Obtains information such as addresses, phone numbers, driving directions, sports
scores, and movie listings from the Google search engine.

44636 (4Info) 4INFO 4info.net Similar to Google SMS, but also handles flight information and horoscopes.

242 242 (cha cha) ChaCha chacha.com Human “guides” provide answers to any question in conversational English.

3109043113 411sms 411sms.com Offers address and phone listings, turn-by-turn directions, movie show times, stock
quotes, hot spot locations, dictionary definitions, horoscopes, and foreign language
translations.

beginning with that letter, saving you Internet Connectivity


typing time. For example, the T9 (Text on
9 keys) algorithm also “learns” from your How do I get Internet service for my
usage patterns and displays the most-used smartphone? Just as you have an Inter-
word first. net service provider (ISP) for Internet access
Can I send and receive multimedia for your desktop or notebook computer, you
files using a cell phone? SMS must have a wireless Internet service
technology allows you to send only text provider (or wireless ISP) to connect your
messages. However, an extension of SMS smartphone to the Internet. Phone compa-
called multimedia message service (MMS) nies that provide phone calling plans (such
allows you to send messages that include as T-Mobile, Verizon, and AT&T) usually
text, sound, images, and video clips to double as wireless ISPs. An Internet connec-
other phones or e-mail addresses. MMS tivity plan or text messaging plan is usually
messages actually arrive as a series of known as a data plan. Data charges are sep-
messages; you view the text, then the arate from phone calling charges and are
image, and then the sound, and so on. You provided at rates different from voice calls.
can then choose to save just one part of the Most carriers provide separate plans for dif-
message (such as the image), all of it, or ferent levels of texting usage and for various
none of it. MMS users can subscribe to levels of data transfer to and from Internet
financial, sports, and weather services that sites. Before subscribing to a data plan, you
will “push” information to them, sending should assess your needs: How often do you
it automatically to their phones in MMS download new wallpaper, ring tones, or
format. games? Do you use your smartphone’s
Internet access to download files from
e-mails or from your company Web site?
BITS Begin by estimating how many kilobytes of
AND 411 for Answers data you transfer up and down from the
BYTES Internet each month. Then select a plan that
provides adequate service at a good price.
Most phone services charge as much as $2.00 for a 411 call for information on a At what speed is digital informa-
phone listing or address. Now there is competition. The Google 411 service is a free tion transferred to my smartphone?
way to find out the address of, directions to, or phone number of a business or person. A smartphone connection often is slower
A call to 1-800-GOOG-411 gets you this information at no charge. If you say “text” than the one you have at your home.
into the phone, it kicks back a text message with the address and a map. Although broadband speeds of 50 megabits
If you are looking for a different kind of information, try the ChaCha service. You per second (Mbps) are achievable at home
can either call (1-800-2chacha) or text (242 242) with any kind of question, and real using a cable or fiber-optic connection, your
human “guides” will find the answer and send it back to you. So, answers to ques- smartphone will connect at a much lower
tions like the following are just a free call or text away! speed (see Figure 8.13).
• How many calories are there in a slice of pizza? Providers have introduced many smart-
phones based on two standards that support
• When is American Idol on tonight?
faster data transfer technologies: EDGE
• Is there a way to get acrylic paint out of jeans?
(short for enhanced data rate for global evo-
lution) and 3G. EDGE and 3G have brought

372 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


mobile devices much faster data transfer—as Figure 8.13 CELLULAR CONNECTION SPEEDS
high as 1.4 Mbps (or more) under ideal con-
ditions. If you use a smartphone that sup- Network Availability Connection Speed (Mbps)
ports EDGE or 3G, and have a phone plan Edge 13,000 cities 0.1
6
that allows data transfer, both uploading i- 4 8

nformation (such as e-mail messages that

10
2
Mbps
include photos) and downloading informa-

12
0
tion (such as from a company intranet or the
Internet) can take place much more quickly. 3G 300 major markets 6 0.6–2.3
4 8
Of course if you are in range of a WiFi signal,

10
2
that is going to be a much faster transfer Mbps

12
option. EDGE and 3G have advantages over

0
WiFi, however. They are more reliable and
less susceptible to interference. Moreover, WiFi WiFi hot spots 6 4–5
4 8
you won’t have to hunt for a WiFi hot spot,

10
2
Mbps
because these technologies are used to blan-

12
0
ket major urban areas with connectivity.
4G networks are beginning to be rolled
out across the United States. The promise of 4G Major cities 6 5–12
4 8
4G is incredible: mobile connection speeds

10
2
Mbps
of up to 100 Mbps. Currently, most

12
0
providers can deliver speeds of 3 Mbps to
6 Mbps. The expansion of 4G will usher in
a new generation of mobile devices and Note: Speeds will vary depending on provider and location.
applications that will continue to expand
how we think of mobile computing.
How can I survive when I find I
have no WiFi signal? There are devices
available that will instantly create a mobile tells you there are no available wireless net-
hot spot for you. MiFi (pronounced “my fi”) works as long as you have 3G signal.
devices, like the Verizon model shown in How do smartphones display con-
Figure 8.14, are often available free with a tent from the Internet? On smart-
new account from major Internet providers phones that have a limited amount of screen
like Verizon and Sprint. The MiFi can fit in a space, it is difficult to view Web pages with-
shirt pocket and run for up to four hours on out a great deal of horizontal scrolling. This
a single charge. It connects to the Internet is because most Web sites are designed for
through the 3G wireless phone network and viewing on desktop monitors, which have
then distributes the WiFi signal over an area much wider pixel widths than mobile
of 30 feet. These personal hot spots can then screens. To enhance your Internet browsing
support up to five WiFi- experience on
enabled devices. mobile devices,
An iPhone 3G has special micro-
a similar capability. It browser software
can connect to your runs on your
notebook computer phone.
through wireless Microbrowser
Bluetooth, and software provides
then provide In- a Web browser that
ternet access is optimized to dis-
through the 3G play Web content
network signal. effectively on the
This “Bluetooth smaller screen (see
tethering” Figure 8.15). Popular
makes sure your versions of micro-
computer can Figure 8.14 browser software in-
access the Inter- A MiFi device turns your 3G phone signal into a WiFi con- clude Internet Explorer
net even when it nection for you and four of your friends. Mobile (included with

Digital Telephony: Communicating with Bits 373


BITS “push” technology that delivers your e-mail
AND Make Your Cell Phone Deliver automatically to your phone, whether you
BYTES want it or not. Now many other systems
also offer “push” technology. BlackBerry de-
Carriers offer many additional services for your cell phone. MusicID, for example, al- vices are still an excellent option, but they
lows you to identify a song easily. Just hold your phone close to the radio’s speaker aren’t the only option. With Internet access,
for 15 seconds. You will then receive a text message with the name of the artist and users can always e-mail through Web-based
the song. MusicID has a database of more than 3 million songs, so you can be the first e-mail accounts like Gmail or Yahoo!
to grab those new titles. If checking and sending e-mail while on
Other services can be added to your cell phone plan. For example, you can sub- the go is mission critical for you, check out
scribe to high-definition radio stations over your cell phone. The extra fee allows you smartphones with larger displays and inte-
to stream more than 50 channels of commercial-free digital radio through your grated keyboards that make it easier to read
phone. Many phones are equipped for navigation services such as TeleNav Navigator. and respond to messages.
TeleNav delivers turn-by-turn instructions to you over your phone and displays real-
time traffic information.
Voice over Internet Protocol
Cell phone service is still not 100 percent reli-
able. Dropped calls and poor reception are a
problem in many areas. In addition, the call
the Windows Mobile OS), Safari on the
quality of landline phone service is often su-
iPhone, and Opera Mobile. Opera Mobile
perior to cell phone call quality. Therefore,
uses special small-screen rendering technol-
many people who run home businesses or
ogy to reformat the Web images to fit on
make business calls from their home main-
your smartphone screen, then zooms in with
tain a landline to ensure high voice quality of
a simple tap. For the best Web experience,
calls. In many instances, landline phone
consider a phone that has a large screen,
plans can be cheaper than cell phone plans,
such as the HTC HD2, which boasts a 4.3-
especially for international calls. Therefore,
inch HD touch screen.
you may want to consider a style of landline
More and more Web sites are being cre-
phone service called VoIP (Voice over
ated with content specifically designed for
Internet Protocol).
wireless devices. This specially designed
How is VoIP different from regular
content, which is text based and contains no
telephone service? Voice over Internet
graphics, is written in a format called
Protocol (VoIP) is a form of voice-based
Wireless Markup Language (WML). Con-
Internet communication that turns a stan-
tent is designed so that it fits the smaller dis-
dard Internet connection into a means to
play screens of handheld mobile devices.
place phone calls, including long-distance
Can I keep my e-mail up to date
calls. Traditional telephone communications
using my cell phone? A popular fea-
use analog voice data and telephone connec-
ture of cell phones with Internet access lets
tions. In contrast, VoIP uses technology
users check e-mail. BlackBerry handhelds
similar to that used in e-mail to send your
were the first devices that were optimized to
voice data digitally over the Internet.
check e-mail. BlackBerry pioneered the
What do I need to use VoIP? For
the simplest and least costly VoIP service,
you need speakers, a microphone, an Inter-
net connection, and a VoIP provider (see
Figure 8.16). Depending on the provider you
choose, you also may need to install soft-
ware or a special adapter. Creating a VoIP
account with Skype (skype.com) is similar
to creating an instant messaging (IM)
account. Skype requires that both callers and
receivers have the company’s free software
Figure 8.15 installed on their computers. Another
similarity to IM is that with Skype you can
Microbrowser software for
phones like Opera lets you change your online status, look at your
quickly switch between open contact list, and decide whom you want to
browser windows. talk to. Other VoIP services, such as Vonage

374 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


advantage of VoIP is it’s free or low cost.
Portability is another advantage because all
Computer you need is an Internet connection. With In-
ternet accessibility so abundant, you
can keep in touch with friends and
VoIP
family no matter where you are. As
phone long as you are covered by a WiFi
signal, you can plug in your headset
or IP phone, sign on to your VoIP
service, and make your call.
Although VoIP is affordable and
convenient, it does have drawbacks.
Some people regard sound quality
and reliability issues as VoIP’s
primary disadvantages. Another
drawback is the loss of service if
DSL/Cable power is interrupted. Although
modem
Phone adapter many traditional phones do not
depend on electricity, your Internet
connection and IP phone do. One
serious drawback when VoIP
service was first offered to the pub-
lic was the inability for 911 calls to
be traced back to the caller, unlike
with a traditional phone. The FCC
now requires all VoIP providers to
Computer
provide traceable 911 services.
Phone Another issue with VoIP is
security. Security risks are similar
to the risks associated with e-mail
(such as spam) and fraud (such as
Figure 8.16 when a hacker breaks into a VoIP system to
Depending on your VoIP service, you can hold conver-
sations through a computer, a special VoIP telephone,
or a regular telephone with an adapter. BITS
AND How Do You Find Your WiFi?
(vonage.com), are a bit more complicated to BYTES
set up and are not free. You can use your
own telephone by connecting your phone to Detecting a nearby WiFi signal is important if you are looking for Internet connectivity
a special adapter that the company pro- while you are on the move. Some notebooks have a
vides, or you can buy a special IP phone that built-in WiFi scanner that displays a row of lights
connects to your broadband Internet connec- on the case whenever a WiFi signal is avail-
tion or to a USB port on your computer. able. Keychain fobs that light up when they
One limitation of VoIP used to be that detect WiFi signals in the vicinity are also
when you made a call, you had to be at your available.
computer. WiFi (wireless Internet) IP If you are running Windows 7, the Con-
phones, however, make it possible to place nect to a Network dialog box (accessible from
VoIP calls from any WiFi hot spot location. the Network and Sharing Center) shows the
And there are Skype applications available strength of all wireless networks within range of
for many mobile devices, like the iPhone your computer.
and the Sony PSP. You can use these devices At ThinkGeek (thinkgeek.com), you may find
from any WiFi spot to make free calls to the most easy-to-use WiFi detector ever. The WiFi
other Skype users or make low-cost calls to Detector t-shirt has a logo that lights up to Figure 8.17
non-Skype users. indicate the signal strength of a nearby WiFi The WiFi Detector T-shirt
What are the advantages and dis- network (see Figure 8.17). Find your WiFi and makes a statement—a
advantages of VoIP? For people who look . . . well, look geeky while doing so! geeky statement.
make many long-distance phone calls, the

Digital Telephony: Communicating with Bits 375


make unauthorized calls). These are real viruses ranges from the mildly annoying
risks but they are avoidable if you take (certain features of your phone stop work-
proper precautions. In addition, encryption ing) to the expensive (your phone is used
services (similar to those used with e-mail) without your knowledge to make expensive
that convert data into a form that is not calls).
easily understood by unauthorized people Symantec, McAfee, and F-Secure are the
are being deployed to help protect the very leading companies currently providing an-
nature of calls made over the Internet. tivirus software for mobile devices. Products
Despite these concerns, VoIP continues to are designed for specific cell phone operat-
enjoy explosive growth, and the technology ing systems; for example, Symantec Mobile
will continue to improve. Security for Symbian is designed for cell
What new features come with phones running the Symbian OS. Often
having an Internet-based digital businesses will have their information tech-
phone at home? Once you are using nology department install and configure an
an Internet-based digital antivirus solution like this
phone system, new fea- for all the phones used in the
tures become possible.
You can have your tele-
phone messages automati-
“ How do I keep
my cell/
smartphone
organization. Although
viruses plaguing cell phones
have not yet reached the vol-
cally bundled up as ume of viruses attacking PC
e-mails and sent to your number private? operating systems, with the
account. If you are watch-
ing television and a call
comes in, it can be displayed on the screen
” proliferation of mobile de-
vices it is expected that such
virus attacks will increase. If no antivirus
with caller ID information. Many cable program is available for your phone’s oper-
delivery companies are bundling digital ating system, the best precautions are com-
phone services in for free if you already mon sense ones. Check the phone
purchase cable and television through them, manufacturer’s Web site frequently to see
so the price may be attractive. whether your cell/smartphone needs any
software upgrades that could patch security
holes. In addition, remember that you
Cell Phone/Smartphone Security should not download ring tones, games, or
other software from unfamiliar Web sites.
Can I get a virus on my cell/ How do I keep my cell/smartphone
smartphone? Although viruses can number private? It seems that every
already infect cell phones, manufacturers time you fill out a Web form someone is ask-
and software engineers are bracing them- ing for your phone number. If you are con-
selves for a tidal wave of viruses targeted to cerned about widely distributing your
cell/smartphones. With half of users report- cell/smartphone number and potentially
ing that they send confidential e-mails using inviting lots of unwanted solicitation calls,
their phones and one-third of users indicat- you should consider using a virtual phone
ing that they access bank account or credit number. A virtual phone number is a phone
card information, cell/smartphones are the number you create that can be assigned to
next most likely realm of attack by cyber- ring on existing phone numbers (such as
criminals. The potential of cell/smartphone your cell phone). Companies such as Telu-
sion (tossabledigits.com) provide these vir-
tual numbers. Then, when you are filling out
ACTIVE a registration form for some Web service,
HELP-
Keeping Your Data
on Hand you can input your virtual phone number in
DESK the Web form instead of giving out your
number. When you set up the virtual ac-
In this Active Helpdesk call, you’ll play the role of a
count, you can restrict the hours that you
helpdesk staffer, fielding calls about smartphones—
will receive calls from that number (no more
what you can use them for, what internal components
2 a.m. telemarketing calls), and if you are
and features they have, and how you can synchronize
receiving many unwanted calls, you can
these mobile devices with your computer.
disable the virtual number without affecting
your cell/smartphone service.

376 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


Digital Media and ADC
Information Singer
playing
The entertainment industry has be- music
come an all-digital field. Today,
videos, music, and photographs are Analog wave
created using digital recording de- Digital format
vices, processed using digital soft- 28,36,42,
84,120,126,
ware systems, and delivered over 120,98,98...
digital distribution channels. What Speaker
does this mean for you and your
use of music, photography, and CD or
video? DAC DVD
How is digital media
created? All digital media,
whether an image, a song, or a 28,36,42,
84,120,126,
video, has the same basis— 120,98,98...
digitized information. Figure 8.18
shows the process of creating digital
Figure 8.18
information for a musical selection. This
process is described below: During the complete
sampled at a rate of approximately
recording process,
44,000 times a second. This produces a huge information changes from
1. Playing music creates analog waves.
list of numbers for even a single minute of analog form to digital data
2. A microphone feeds the sound waves a song! and then back again to
into a chip called an analog-to-digital When sounds or image waves are digi- analog sound waves.
converter (ADC) inside the recording tized, it means that analog data is changed
device. into digital data—from a wave into a series
3. The ADC digitizes the waves into a of numbers. The digital data is perfectly
series of numbers. reproducible and can be distributed easily
on CDs and DVDs or through the airwaves.
4. This series of numbers can be recorded
The data also can be easily processed by a
onto CDs and DVDs or sent
computer.
electronically.
5. On the receiving end, a playback device
such as a CD player or DVD player is Digital Music
fed that same series of numbers. Inside
the playback device is a digital-to- How can I carry music files easily?
analog converter (DAC), a chip that Portable media players (PMPs) are small
converts the digital numbers to a portable devices (such as an iPod) that en-
continuous analog wave. able you to carry your MP3 files around
with you. Many PMPs handle video and still
6. That analog wave tells the receiver how
images, as well as music files. Many smart-
to move the speaker cones to reproduce
phones are capable of storing and playing
the original waves, resulting in the
media files, but for the best experience, a
same sound as the original.
dedicated media player, such as a portable
More precisely, the digital wave will be media player, is often the optimal choice be-
close to exact. How accurate it is, or how cause PMPs tend to offer more features and
close the digitized wave is in shape to the storage.
original analog wave, depends on the sam- Depending on the player, you can carry
pling rate of the ADC. The sampling rate several hours of music or video—or possibly
specifies the number of times the analog your entire CD collection—in an incredibly
wave is measured each second. The higher small device. For example, an Apple iPod
the sampling rate, the more accurately the classic with a 160 GB hard drive is 4.1 inches
original wave can be re-created. However, by 2.4 inches (and only 0.41 inch thick), yet
higher sampling rates also produce much it can hold as many as 40,000 songs, or 200
more data, and therefore result in bigger hours of video. The most compact players
files. For example, sound waves on CDs are are slightly larger than a flash drive

Digital Media and Information 377


Figure 8.19 SOME PORTABLE MEDIA PLAYERS AND THEIR CHARACTERISTICS
Built-In Flash Hard Drive Connection to
Media Capacity Memory Capacity Computer Other Features

Sansa Fuze 2000 songs or 24 hours 2 GB to 8 GB None but USB 2.0 port FM radio, voice recorder and
Player of video 16 GB micro available “radio” cards prefilled
SD card with 1000 songs.
supported

Zune HD As many as 16,000 16 to 64 GB None USB 2.0 port or Has HD radio, OLED screen,
songs or 20 hours of HD wireless multitouch navigation.
video

Apple As many as 14,000 8 GB to 64 GB None USB 2.0 port Weighs only 4.05 ounces; flash
iPod songs or 80 hours of memory enables skip-free
touch video playback.

Apple As many as 40,000 None 160 GB USB 2.0 port Has calendar feature that syncs
iPod songs or 200 hours of with Outlook; can serve as a
classic video small, portable hard drive.

Archos 7 As many as 2,000 songs 2 GB to 8 GB None but USB 2.0 port Includes 7⬙ screen display, WiFi,
or 24 hours of video 32 GB and touch screen.
SDHC card
supported

(although they hold far less music than the iTunes Music Store, for example, you
iPod). Figure 8.19 shows several models of receive an .aac format file. AAC files can be
PMPs, all of which connect to computers via played only on iPods but can be converted
USB 2.0 ports. to the more widely used MP3 or Windows
Are all music files MP3 files? The Media Audio (WMA) formats. WMA files
letters at the end of a file name (the file can be played on a wide variety of MP3
extension) indicate how the data in the file is players. Most PMPs that support video
organized. MP3 is the name of just one type playback can play a wide range of video
of file format used to store digital music, but formats.
many others exist, such as AAC and WMA. Are PMP devices the only choice
There are also many video formats such as for portable media management?
DivX, MPEG-4 (which usually has an .mp4 PMP devices are not the only choice for
extension), WMV, and XviD. All file formats portable media management. A number of
compete on sound and video quality and electronic devices now incorporate the
compression, which relates to how small the capability to carry electronic files and play
file can be and still provide high-quality music and video files. Some models of
playback. If you buy a song from the digital cameras, such as the Samsung NV3,

378 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


have support for playing both music and quiet and light, use tiny amounts of power,
videos. Gaming devices such as the Sony and slide into a special slot in the player. If
PlayStation Portable (PSP) allow you to play you’ve ever played a video game on
video games, play music and videos, and PlayStation or Xbox and saved your
browse the Internet. progress to a memory card, then you have
How do I know how much digital used flash memory. Because flash memory is
media a PMP can hold? The number nonvolatile, when you store data on a flash
of songs or hours of video a portable media memory card, you won’t lose it when you
player can hold depends on how much stor- turn off the player. In addition, flash mem-
age space it has. Most PMPs use built-in ory can be erased and rewritten with new
flash memory, a type of nonvolatile mem- data. PMPs use a variety of different types
ory, to store files. Most PMPs that support of flash cards. Check your manual and then
video use a hard drive instead of flash mem- review the coverage on flash media in
ory and can store a much greater amount of Chapter 2 for more details.
music and video. Less expensive PMPs use How do I transfer media files to
flash memory (ranging from 1 GB to 32 GB), my portable media player? All
whereas models that are more expensive use portable media players come with software
built-in hard drives, which provide as much that enables you to transfer audio and video
as 160 GB of storage. Some of the PMPs that files from your computer to the player. As
use flash memory allow you noted earlier, players that
to add storage capacity by hold thousands of songs
purchasing removable flash
memory cards.
Another factor that deter-
“ Audio receivers
now come with a
port to connect a
and hours of video use in-
ternal hard drives to store
the files. For example, de-
mines how much music a vices such as Apple iPods
player can hold is the quality PMP device can hold several gigabytes
of the MP3 music files. The directly. of data. To move large vol-
size of an MP3 file depends
on the digital sampling of the song. The same
song could be sampled at 320 kbps or 64
” umes of data between
your computer and your PMP, you want a
high-speed port. Most PMPs use a USB 2.0
kbps. The size of the song file will be five port, but some players may use FireWire
times larger if it is sampled at 320 kbps rather ports, which provide comparable through-
than the lower sampling rate of 64 kbps. The put. Using a USB 2.0 port, you can transfer
higher the sampling rate, the better quality two dozen MP3 files to the iPod in less than
the sound—but the larger the file size. 10 seconds.
How do you control the size of an What if I want a lot of people to
MP3 file? If you are ripping, or convert- listen to my digital music? PMPs
ing, a song from a CD into a digital MP3 file, are great for individual listening, but to
you can select the sampling rate yourself. You share music from a PMP, you have to con-
decide by considering what quality sound nect it to an alternative device. Many audio
you want, as well as how many songs you receivers now come with a port or a dock
want to fit onto your MP3 player. For exam- so that you can connect a PMP device
ple, if your player had 1 GB of storage and directly to them as another audio input
you have ripped songs at 192 kbps, you could source, like a CD player or a television.
fit about 694 minutes of music onto the Most new cars are equipped with at least an
player. The same 1 GB could store 2,083 min- auxiliary input to the speaker system to
utes of music if it were sampled at 64 kbps. support connecting a PMP; others have a
Whenever you are near your computer, you fully integrated software system that dis-
can connect your player and download a dif- plays and runs the PMP playlists. There are
ferent set of songs, but you always are limited alarm clocks and home speaker docks that
by the amount of storage your player has. can mate with a PMP and broadcast
What if I want to store more music brilliant sound.
or video than the memory on my How did the shift to digital music
PMP allows? Some PMPs allow you to impact the music industry? The ini-
add memory by inserting removable flash tial MP3 craze was fueled by sites such as
memory cards. Flash memory cards are MP3.com, which originally stored its song

Digital Media and Information 379


ACTIVE industry to sue the site for copyright
HELP-
Using Portable infringement, and Napster was closed in
DESK Media Players June 2002. Napster has since reopened as a
music site that sells music downloads and is
In this Active Helpdesk call, you’ll play the role of a sanctioned by the recording industry.
helpdesk staffer, fielding calls about portable media The reaction of the recording industry was
players, what they can carry, and how they store data. to continue to enforce its absolute ownership
over digital forms of its music. The industry
even filed legal actions against individuals
who had downloaded large amounts of
files on a public server with the permission music from Internet sites. This heavy-
of the original artists or recording compa- handed reaction to the new era of digital
nies. Therefore, you were not infringing on a music ultimately backfired and left the
copyright by downloading songs from sites music industry scrambling. Overall music
such as MP3.com (which still exists and now sales in 2009 were about half what they were
provides free music in streaming format). at the industry’s peak. The record industry is
Napster was a file exchange site created still trying to counter losing CD sales to digi-
to correct some of the annoyances found by tal forms of music. The approach they took
users of MP3.com. One such annoyance was early on did not allow them to adapt quickly
the limited availability of popular music in enough to the new business models required
MP3 format. With the MP3 sites, if you by the shift to digital technologies.
found a song you wanted to download, the So if I don’t pay for a music down-
link to the site on which the file was found load, is it illegal? Although you need to
often no longer worked. Napster differed pay for most music you download, some
from MP3.com because songs or locations of artists post songs for free. Business models
songs were not stored in a central public are still evolving as artists and recording
server, but instead were “borrowed” directly companies try to meet audience needs while
from other users’ computers. This process of also protecting their own intellectual prop-
users transferring files between computers is erty rights. Several different approaches
referred to as peer-to-peer (P2P) sharing. exist. One is to deliver something called
Napster also provided a search engine tethered downloads in which you pay for the
dedicated to finding specific MP3 files. music and own it, but are subject to restric-
This direct search and sharing eliminated tions on its use.
the inconvenience of searching links only to Another approach is to offer DRM-free
find them unavailable. music, which is music without any digital
The problem with Napster was that it rights management. These song files can be
was so good at what it did. Napster’s con- moved freely from system to system. For ex-
venient and reliable mechanism to find and ample, Apple’s iTunes store currently sells
download popular songs in MP3 format only DRM-free types of music. A DRM-free
became a huge success. The rapid accept- song can be placed on as many computers
ance and use of Napster—at one point, it or players as you wish. Other sites offer
had nearly 60 million users—led the music subscription services. For a monthly fee,
Napster to Go allows you to download as
BITS many songs as you like to your MP3 player.
AND Trick Out Your iTouch These songs will be usable, however, only as
BYTES long as you are paying the monthly sub-
scription fee.
With more than 1 billion iTouch/iPhone apps downloaded, the App Store is a proven Why buy any music if peer-to-peer
success. Some apps are games, some are just gimmicks, but many are great tools for (P2P) sharing sites are still
a student. iFlipr is an app that connects you to 2.7 million flash cards. You can study operating? When Napster was going
for the MCAT exam or build and share your own custom flash card deck. iHomework through its legal turmoil, other P2P Web
organizes your teacher contact info, due dates for assignments, and research materi- sites were quick to take advantage of a huge
als. iProRecorder lets your iTouch record audio using the mic built into the earphones opportunity. Napster was “easy” to shut
that come with it. Can’t find the app you are dreaming of? The iPhone Developer down because it used a central index server
University program is free and supports students and faculty in designing and coding that queried other Napster computers for
Web apps. requested songs. Current P2P protocols
(such as LimeWire and BearShare) differ

380 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


from Napster in that they do not limit them- sites and by broadcasting in high-definition
selves to sharing only MP3 files. Video files quality.
are obtainable easily on P2P sites. More Another development that competes with
importantly, these sites don’t have a central radio (and television) is podcasting, which
index server. Instead, they operate in a true allows users to download audio and video
P2P sharing environment in which comput- content and then listen to those broadcasts
ers connect directly to other computers. This on their PMPs whenever they want.
makes them a prime source of unwanted Podcasting is paving the way for anyone
viruses and spyware. to create a radio or television show at home
The argument these P2P networks make and distribute it easily to an audience.
to defend their legality is that they do not Using free software such as Audacity
run a central server like the original Napster, (audacity.sourceforge.net) and a
but only facilitate connections between microphone, you can record voice-overs,
users. Therefore, they have no control over sequence songs, and generate special effects
what the users choose to trade. Note that not for your recordings. Loyal fans can use
all P2P file sharing is illegal. For example, it podcasting software such as Juice
is legal to trade photos or movies you have (juicereceiver.sourceforge.net) or iTunes (for
created with other folks over a P2P site. Windows or Mac) to find a podcast’s latest
People who oppose such file-sharing sites episode and automatically transfer it to their
contend that the sites know their users are portable media players. Plugging your iPod
distributing files illegally and breaking into a data port on your computer causes the
copyright laws. Be aware that having illegal iPod to search iTunes for new content from
content on your computer, deliberately or the podcasters you subscribe to and then
by accident, is a criminal offense in many automatically transfers the new files to your
jurisdictions. iPod. Podcasts are easy to subscribe to and
Will PMPs eliminate radio sta- download using iTunes (see Figure 8.20).
tions? Radio stations have always had
certain advantages: early access to new
music, and personalities and conversations
Digital Navigation
that add to the listening experience. How- How has digitized information im-
ever, the Internet allows artists to release pacted navigation? In the last few
new songs to their fans immediately (on years, stand-alone GPS (global positioning
sites such as mp3.com) and without relying system) devices have dropped dramatically
on radio airtime. This opens up new chan- in price and size. Small, handheld units de-
nels for artists to reach an audience and liver turn-by-turn instructions and real-time
changes the amount of power radio stations traffic information. GPS units are available
have in the promotion of music. Many radio with a wide range of features. Figure 8.20
stations have increased listenership by mak- Garmin, for example, offers a wide range iTunes makes it easy to
ing their stations available through Internet of services on its line of GPS units. A Map subscribe to and manage
podcasts.

Subscribe to
new podcast

Video podcast

Download
past episodes

Explicit content
warning

Digital Media and Information 381


Figure 8.21
In addition to the driving mode displays your location and the current How do I get GPS in my car? Most
applications shown, the speed limit on a map that is updated in real automotive companies now offer GPS
Garmin Nuvi series GPS
devices are also able to
time as you drive. When you enter a series systems as installed options in their vehicles.
provide Internet services. of destinations, an optimal route is devel- Of course, GPS navigation can be added to
oped for you. A voice warns you of lane any vehicle using a portable GPS device or a
changes and approaching turns, giving you PDA/smartphone equipped with GPS (see
directions using the actual street name (such Figure 8.21), or by adding GPS software and
as “Turn right on Hancock Avenue”). Lane accessories to your notebook.
Assist flips into a 3D display mode and How does the GPS system
shows you how to navigate through lane work? Built and operated by the U.S. De-
changes in highway merges. If you miss a partment of Defense, the global positioning
turn, the unit automatically recalculates the system is a network of 21 satellites (plus 3
required route and gives you directions to working spares) that constantly orbits the
get back on course. Flip to another screen, Earth. GPS devices use an antenna to pick
and it shows you how far you have to drive up the signals from these satellites and use
to the next gas station, restaurant, or hospi- special software to transform those signals
tal. Some models automatically mark the lo- into latitude and longitude. Using the infor-
cation of your car when you remove them mation obtained from the satellites, GPS de-
from the vehicle, and can give you step-by- vices determine the geographical location
step directions anywhere on the planet to within 3 feet (see
back to your car. Figure 8.22). The exact accuracy depends on
such things as atmospheric conditions, and
interference from obstacles like mountains
or buildings. Because they provide such de-
tailed positioning information, GPS devices
are now used as navigational aids for air-
craft, recreational boats, and automobiles,
and they even come in handheld models
for hikers.
If I don’t have a GPS, how
does the 911 system know
where I am? By the end
of 2005, every cell phone
had to include a GPS chip.
The Federal Communica-
tions Commission (FCC)
mandated this to enable
the complete rollout of the
Enhanced 911 (E911) pro-
Figure 8.22 gram. E911 automatically
GPS computes your gives dispatchers precise lo-
location anywhere on cation information for any
Earth from a system of
orbiting satellites. 911 call. It also means your

382 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


phone records may include this precise numbers that represent the color and
tracking information, which indicates where brightness of millions of points in the
you are when you make a call. image. Unlike traditional cameras, digital
Can I use the GPS chip on a child’s cameras allow you to see your images the
cell phone? Cellular phone providers instant you shoot them. Most camera mod-
offer plans (for a monthly fee) that allow els can now record digital video as well as
you to track where a phone is at any given digital photos.
time via a Web site. For example, AT&T’s How do I select a digital camera?
service Family Maps allows parents to track With hundreds of models to choose from,
all of the phones on their family plan in real where do you begin? The first question to
time. Locations of all phones are displayed answer is whether you want a compact
over the Web on a map, or the service will “point-and-shoot” model camera or a
send an automatic text message alert with more serious digital SLR. The larger
the phone’s location at a specific time each digital SLR cameras allow you to switch
day. So a parent could have a text or e-mail among different lenses and offer features
sent with their daughter’s phone location important to serious amateur and profes-
each day at 3 p.m. to be sure the she made it sional photographers (such as depth-of-field
home from school. The person being tracked previewing). Although having such flexibil-
cannot turn off the service. ity in moving up to a larger zoom lens is a
Do GPS devices carry other infor- great advantage, these cameras are also
mation? Full-featured GPS models such larger, heavier, and use more battery power
as the Garmin Nuvi 705 se- than the tiny point-and-shoot
ries include MP3 players, models. Think about how
audio book players, and the
capability to display photos “ What is smile
shutter?
you will be using your
camera and decide which
and connect to the Internet.
Using Internet services
such as MSN Direct, your GPS can keep
” model will serve you best in
the long run.
Next, you’ll want to evaluate the quality
you informed about the weather, traffic of the camera on a number of levels. One
backups, local movie times, and even local great resource to use is Digital Photography
gas prices. Review (dpreview.com). The site’s camera
reviews evaluate a camera’s construction as
well as its features, image quality, ease of
use, and value for the cost. In addition, the
Digital Photography site provides comparisons to similar camera
What is “analog” photography? models by other manufacturers and feed-
Before digital cameras hit the market, most back from owners of those models. Links are
people used some form of 35-mm single- provided to several resellers, making it easy
lens reflex (SLR) camera. When you take a to compare prices as well.
picture using a traditional SLR camera, a Why not just use the camera on
shutter opens, creating an aperture (a small my cell/smartphone? Many cell/
window in the camera) that allows light to smartphones include a digital camera. These
hit the 35-mm film inside. Chemicals coat- cameras often provide lower resolutions
ing the film react when exposed to light. than stand-alone models and inferior lenses.
Later, additional chemicals develop the Many features that photographers rely on
image on the film, and the image is printed are not often available in the cameras in-
on special light-sensitive paper. A variety cluded on phones, such as different types of
of lenses and processing techniques, autofocus, image stabilization algorithms,
special equipment, and filters are needed to and smile shutter, which waits to take a shot
create printed photos from traditional SLR until your subject is smiling.
cameras. What determines the image quality
What is different about digital of a digital camera? The overall image
photography? Digital cameras do not quality is determined by many factors: the
use film. Instead, they capture images on quality of the lenses used, the file format
electronic sensors called charge-coupled de- and compression used, and the color
vice (CCD) arrays and then convert those management software. Another part of what
images to digital data, long series of determines the image quality of a digital

Digital Media and Information 383


camera is its resolution, or the number of What file formats are used for digi-
data points it records for each image cap- tal images? To fit more photos on the
tured. A digital camera’s resolution is meas- same size of flash memory card, digital
ured in megapixels (MP). The prefix mega is cameras allow you to choose from several
short for millions. The word pixel is short for different file types in order to compress, or
picture element, which is a single dot in a squeeze, the image data into less memory
digital image. Point-and-shoot models typi- space. When you choose to compress your
cally offer resolutions from 10 MP to 15 MP. images, you will lose some of the detail, but
Professional digital SLR cameras, such as in return, you’ll be able to fit more images
the Canon EOS-5D Mark II, can take photos on your flash card. The most common file
at resolutions as high as 21.1 MP, but they types supported by digital cameras are raw
sell for thousands of dollars. Figure 8.23 uncompressed data (RAW) and Joint
shows some popular digital camera models Photographic Experts Group (JPEG). Raw
and the number of pixels they record at their files have different formats and extensions
maximum resolution. depending on the manufacturer of a particu-
If you’re interested in making only 5⬙ ⫻ 7⬙ lar camera. The raw file records all of the
or 8⬙ ⫻ 10⬙ prints, a lower-resolution camera original image information, so it is larger
is fine. However, low-resolution images than a compressed JPEG file. JPEG files can
become grainy and pixelated when pushed be compressed just a bit, keeping most of the
to make larger-size prints. For example, if details, or compressed a great deal, losing
you tried to print an 11⬙ ⫻ 14⬙ enlargement some detail. Most cameras allow you to
from a 2 MP image taken using your cell select from a few different JPEG compres-
phone’s camera, the image would look sion levels.
grainy; you would see individual dots of Often cameras also support a very low-
color instead of a clear, sharp image. The resolution storage option, enabling you to
10 MP to 15 MP cameras on the market create files that you can easily attach to
now have plenty of resolution to guarantee e-mail messages. This low-resolution setting
sharp, detailed images even with enlarge- typically provides images that are not useful
Figure 8.23 ments as big as 11⬙ ⫻ 14⬙. for printing but are so small in size that they
Digital camera are easily e-mailed. Even people who have
resolutions. slow Internet connections are able to quickly
download and view such images on-screen.
How do I move photos to my com-
Panasonic Lumix G2 (12.1 MP)
puter? If you just want to print
your photos, you may not need to
transfer them to your computer.
Many photo printers can make
Kodak V1273 (12 MP)
prints directly from your camera or
from a flash memory card, and
many retailers, like CVS and
Walmart, provide photo printing
Canon EOS 5D
Mark II (21.1 MP) machines that can read directly
from your memory card. How-
ever, transferring the photos to
your computer does allow you
Sony Cybershot to store them and frees your
DSC-T1 (10.2 MP)
flash card for reuse.
Digital cameras have a built-
in USB 2.0 port. Using a USB
2.0 cable, you can connect the
camera to your computer and
copy the converted images as uncom-
Samsung TL225 pressed files or in a compressed for-
DualView (12.2 MP) mat as JPEG files. Another option is to
transfer the flash card from your cam-
era directly to the built-in memory card
reader on your computer. Some camera

384 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


Figure 8.24
models support wireless network connec- handwritten or typed text into electronic
Scanners are available in
tions so that you can transfer the images files. You can then open and edit these con-
a variety of shapes, but all
without the fuss of putting a cable in place. If verted documents with traditional word of them can convert paper
your model doesn’t, you can purchase a processing programs such as Microsoft documents, photo prints,
memory card with built-in WiFi: the Eye-Fi. Word. In addition, many scanners have a and strips of film nega-
Eye-Fi will wirelessly transfer your photos to copy function that allows you to scan and tives into digital data.
Google Picasa, Facebook, or one of 30 other print documents, taking the place of a copy
Web destinations. It will also back up the machine.
photos and videos you take with your cam- How do I print a digital
era to your home computer. And when you image? You can print a digital image
are away from home, Eye-Fi comes with hot using a professional service or your own
spot access so you can upload for free from printer. Most photo printing labs, including
any McDonald’s, Starbucks, hotel, or airport. the film processing departments at stores
Can I make my old photos such as Walmart and Target, offer digital
digital? Obviously, not every document printing services, as do many high-end on-
or image you have is in an electronic form. line processing labs. The paper and ink used
What about all the photographs you have at processing labs are higher quality than
already taken? What about an article from a what is available for home use and produce
magazine or a hand-drawn sketch? How can heavier, glossier prints that won’t fade. You
these be converted into digital format? can send your digital photos directly to local
Digital scanners such as the ones shown merchants such as CVS and Walgreens for
in Figure 8.24 convert paper text and images printing using Windows Live Photo Gallery.
into digital formats. You can place any flat Online services, such as Flickr (flickr.com)
material on the glass surface of the scanner and Shutterfly (shutterfly.com), store your
and convert it into a digital file. Most scan- images and allow you to organize them into
ner software allows you to store the con- photo albums or to create hard-copy prints,
verted images as TIFF files or in compressed mugs, T-shirts, or calendars.
form as JPEG files. Some scanners include Photo printers for home use are available
hardware that allows you to scan film nega- in two technologies: inkjet and dye sublima-
tives or slides as well or even insert a stack tion (see Figure 8.25). The most popular and
of photos to be scanned in sequence. inexpensive ones are inkjet printers. As
Scanner quality is measured by its resolu- noted in Chapter 2, some inkjet printers are
tion, which is given in dots per inch (dpi). capable of printing high-quality color pho-
Most modern scanners can digitize a docu- tos, although they vary in speed and quality.
ment at resolutions as high as 4,800 ⫻ 9,600 Some include a display window so that you
dpi, in either color or grayscale mode. You can review the image as you stand at the
can easily connect a scanner to your com- printer, whereas others are portable, allow-
puter using USB 2.0 or FireWire ports. Scan- ing you to print your photos wherever you
ners also typically come with software that are. Some printers even allow you to crop
supports optical character recognition the image right at the printer without hav-
(OCR). OCR software converts pages of ing to use special image editing software.

Digital Media and Information 385


Figure 8.25
The Sony DPP-F700 is both Unlike inkjet printers, which use an inkjet Digital Video
a 7-inch digital frame and nozzle, dye-sublimation printers produce
a dye sublimation printer. images using a heating element. The heating Where does digital video come from?
With a click of the remote, element passes over a ribbon of translucent Digital video that you watch comes from
you can print the image in several sources, but now people often create
film that has been dyed with bands of colors.
45 seconds. their own digital videos. As a video creator,
Depending on the temperature of the ele-
ment, dyes are vaporized from a solid into a you may purchase dedicated digital
gas. The gas vapors penetrate the photo camcorders to record digital video. Most cell
paper before they cool and return to solid phones can record video, and digital cam-
form, producing glossy, high-quality images. eras take video as well as digital still shots.
If you’re interested in a printer to use for Webcams also work as inexpensive devices
printing only photographs, a dye-sublima- for creating digital video.
tion printer is a good choice. However, some There are many other sources of digital
models print only specific photo sizes, such video available to you now. Television is
as 4⬙ ⫻ 6⬙ prints, so be sure the printer you broadcasting in digitally formatted signals.
buy will fit your long-term needs. The Internet delivers a huge amount of digi-
Transferring images to a printer is similar tal video through Google Video, YouTube,
to transferring them to your computer. If communities like Vimeo (vimeo.com), and
you have a direct-connection camera, you webcasting sites like Ustream (ustream.tv).
can plug the camera directly into the printer Sites like Hulu (hulu.com) rebroadcast
with a cable. Some printers have slots that many current television shows as well as
accept different types of flash memory films and movie trailers. Many pay services
cards. Of course, you also can transfer your are available to deliver digital video to you.
images to the printer from your computer if These include on-demand streaming from
you have stored them there. cable providers, iTunes, Netflix’s Instant
Do I need to print out my photos? Watch films, and Amazon’s Video On
You may decide not to print your photos at Demand download service.
all. As noted earlier, online albums let you How do I record my own digital
share your photos without having to print video? Video equipment for home use
them. There are a number of digital scrap- stores information in a digital video (DV) for-
booking sites that let you electronically de- mat. This allows the cameras to be incredibly
sign scrapbooks. Portable devices, such as small and light. Such cameras don’t require
Apple’s iPod and cell phones, also enable any tapes at all; they store hours of video on
you to carry and display your photos. The built-in hard drives or flash cards. Some
iPod, for example, can be connected to a TV models even record directly to DVD discs.
and deliver slide shows of your photographs, You can easily transfer video files to your
complete with musical soundtracks you have computer and, using video editing software,
selected. As we mentioned in Chapter 7, if edit the video at home, cutting out sections,
you have networked your home, a television resequencing segments, and adding titles.
connected to your network (or to a network- To do the same with analog videotape
enabled device like a PlayStation 3 or a would require expensive and complex
networked Blu-ray player) can display all the audio/video equipment available only in
photos and videos stored on your computer. video production studios. You can save (or

386 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


write) your final product on a CD or DVD
and play it in your home DVD system Effects Transitions Titles Themes
or on your computer. For true
videophiles, cameras and burners
are now available for high- Clip Art
definition video format.
What if I decide to add
some special effects and a
sound track? Video editing soft-
ware presents a storyboard or
timeline with which you can manip-
ulate your video file,
as shown in
Figure 8.26. You can Video track
review your clips
frame by frame or Audio track
trim them at any
point. You can order Music track
each segment on the
timeline in whichever playing together. Finally, you can preview
sequence you like and correct segments for all of these effects in real time. Figure 8.26
color balance, brightness, or contrast. There is a lot to learn about digital video Adobe Premiere Elements
In addition, you can add transitions to editing, and with the number of choices allows you to build a
your video such as those you’re used to see- available, it is easy to be overwhelmed. movie from video clips and
ing on TV—fades to black, dissolves, and so Examine online tutorial resources such as add sound tracks and
special effects.
on. Just select the type of transition you Izzy Video podcasts (izzyvideo.com) to learn
want from the drop-down list and drag that how to make the most impact with the edit-
icon into the timeline where you want the ing and effects you apply to your raw video
transition to occur. footage.
Video editing software also lets you add What kinds of files will I end up
titles, animations, and audio tracks to your with? Once you’re done editing your
video, including background music, sound video file, you can save (or export) it in a
effects, and additional narration. You can variety of formats. Figure 8.27 shows some of
adjust the volume of each audio track to the popular video file formats in use today,
switch from one to the other or have both along with the file extensions they use.

Figure 8.27 TYPICAL FILE FORMATS FOR DIGITAL VIDEO

Format File Extension Notes


QuickTime .mov You can download QuickTime player without charge
.qt from apple.com/quicktime. The pro version allows
you to build your own QuickTime files.

Moving Picture Experts Group (MPEG) .mpg MPEG-4 video standard adopted internationally in
.mpeg 2000; recognized by most video player software.
.mp4

Windows Media Video .wmv Microsoft file format recognized by Windows Media
Player (included with the Windows OS).

Microsoft Video for Windows .avi Microsoft file format recognized by Windows Media
Player (included with the Windows OS).

RealMedia .rm Format from RealNetworks; popular for streaming


video. You can download the player for free at
real.com.

Adobe Flash Video .flv Adobe Flash video format, sometimes embedded in
Shockwave files (*.swf).

Digital Media and Information 387


ETHICS
IN IT Managing Your Copyrights: Copyleft Might Simplify Your Life

So you just returned from your trip to the Grand Canyon and all your Georgia could use one of your photos under this license because it is not
friends are raving about the quality of the photographs you took. You de- profiting from its use.
cide to put the photographs out on Flickr so your friends can see them. Both of these licenses can also be used to cover derivative works. A
You also think that maybe someone might see your photos and want to derivative work is based on the original work (one of your photos) but is
use them in a commercial publication such as a magazine. Because you modified in some way. The ad agency that wants to modify one of your
own the copyright to your photos, you control how they can be used— photos is seeking permission to create a derivative work. If you had used
and you want to protect your rights. You add a disclaimer to Flickr indi- an attribution license, the ad agency could use your work for a derivative
cating that all rights are reserved on your photos. Anyone who wants to purpose, but only if it attributed the original work to you as the author. If
use them will need to contact you and request permission. you had used a noncommercial license, the ad agency could not use your
All of a sudden, you are bombarded by dozens of requests for per- work to make a profit for itself.
mission to use your photographs for all sorts of purposes. A high school The obvious advantage to using these Creative Commons licenses is
student in Illinois wants to feature one of your photos on her travel blog. that people won’t constantly annoy you with permission requests to use
A church in Georgia wants to use a photo for their newsletter to illustrate your work. These licenses explain exactly how you are willing to have
a story about a church member’s trip to Arizona. An advertising agency in your work be used. Also, many advocates of copyleft policies feel that
Seattle wants to modify your sunrise photo by inserting a family on a creativity is encouraged when people are free to modify other people’s
camping trip into the photo. You want to be ethical and protect your own- work instead of worrying about infringing on copyright.
ership rights as well (maybe the ad agency might even pay you!), but Opponents of Creative Commons licenses often complain that these
how are you going to manage all these photo permission requests? licenses have affected their livelihoods. If millions of images are out on
Copyleft, a play on the word copyright, is designed for this situation. Flickr with Creative Commons licenses that permit free commercial use,
Copyleft is a term for various licensing plans that enables copyright hold- professional photographers might have a tougher time selling their work.
ers to grant certain rights to the work while retaining other rights. The Furthermore, Creative Commons licenses are irrevocable. If you make a
GNU General Public License is a popular copyleft license that is used for mistake and select the wrong license for your work, or you later find out
software. For other works, the Creative Commons, a nonprofit organiza- a work is valuable and you’ve already selected a license that allows
tion, has developed a range of licenses that can be used to control rights commercial use, you’re out of luck.
to works. Many people find listings of Creative Commons licenses confusing. If
Creative Commons has various types of licenses available based on there is a Creative Commons disclaimer at the bottom of a group of pho-
the rights you wish to grant. The company provides a simple form to as- tos, does that mean all the photos are available under that license, or just
sist you with selecting the proper license for your work. Creative Com- some of them? What actually constitutes commercial use? Is displaying
mons provides two licenses at creativecommons.org/about/licenses Google Adsense ads on your blog commercial use?
that could simplify your life. An attribution license permits others to copy, Each of us needs to carefully consider the value of our intellectual
distribute, and display your copyrighted work, but only if they give you property and decide how best to conduct our digital livelihood.
credit in the way you specify. Under this license, the high school student Understanding the meaning of copyright, and copyleft, is important both
could use one of your photos as long as he or she gave you credit. so that you respect the rights of others and so that you can simplify your
A noncommercial license allows anyone to copy, distribute, and dis- life in granting permission rights to the works you create.
play your work, but only for noncommercial purposes. The church in

Your choice of file format for your fin- (compression/decompression) is a rule, im-
ished video will depend on what you want plemented in either software or hardware,
to do with your video. For example, the that squeezes the same audio and video in-
QuickTime streaming file format is a great formation into less space. Some information
choice if your file is really large and you will be lost using compression, and there are
plan to post it on the Web. The Microsoft several different codecs to choose from, each
AVI format is a good choice if you’re send- claiming better performance than its com-
ing your file to a wide range of users, be- petitors. Commonly used codecs include
cause it’s extremely popular and is MPEG-4, H.264, and DivX. There is no one
commonly accepted as the standard video codec that is always superior—a codec that
format for the Windows Media Player. works well for a simple interview may not do
You also can try different compression a good job compressing a live-action scene.
choices to see which one does a better job of What if I want a DVD with a menu-
compressing your particular file. A codec ing system? If you want a DVD with a

388 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


menuing system, you can use special DVD
authoring software such as Pinnacle Studio or
Adobe Encore DVD. These DVD software
packages often include preset selections for
producing video for mobile devices (like the
Apple iPod or the Sony PSP). These programs
can also create final DVDs that have animated
menu systems and easy navigation controls,
allowing the viewer to move quickly from
one movie or scene to another. Home DVD
players as well as gaming systems such as
PlayStation and Xbox can read these DVDs.
What is the quickest way to get my Figure 8.28
video out to viewers? Because of the How can I distribute my video to The Flip SlideHD video
popularity of videos on the Web, products the greatest number of viewers? camcorder can capture up
and services are now available that let you Sites like justin.tv or ustream.tv let you to 4 hours HD video and
quickly upload your videos. One such prod- quickly set up to webcast your video as it is quickly post it on Face-
book or YouTube.
uct is the Flip SlideHD video camcorder, captured to a live Internet audience. You can
shown in Figure 8.28. also display an interactive chat next to the
Flip camcorders, which are priced from video feed. Both the chat and the video are
$150, can record 1–4 hours of video depend- captured and archived for viewers who
ing on the model. After recording, simply missed the live broadcast. iTunes offers free
flip out the USB connector and plug it into distribution of video podcasts, so you can
your computer. Flip has built-in software build a following there for your video work.
that lets you transfer the video file directly to Are the television shows and
YouTube or several other sites or e-mail the movies I watch digital? There are a
file. It’s a simple solution that takes advan- number of ways you can create video con-
tage of the easy Web-based distribution of tent yourself; but probably most of the video
video. you consume in a typical week was created
YouTube has a special Mobile Upload by someone else—movie studios, television
Profile that you can set up for your account. studios, or other students. The number of
Once your unique e-mail address has been sources we have for video has increased dra-
assigned, you can submit a video that matically since digital video appeared. Be-
you have on your phone to YouTube by cause the hardware for capturing video and
e-mailing the file to the account address. Of the software for doing professional-level ed-
course, it is illegal for you to upload videos iting have become so inexpensive, there are
you do not own. You also cannot take a few barriers to anyone making video. Fur-
piece of a copyrighted video and post it ther, because the opportunities for distribut-
publicly. The Ethics in IT section in this ing video have broadened so much and
chapter presents several legal and ethical become so instantaneous, there is an ever-
situations that it is important for you to growing market for more video.
be aware of as a content creator in the Is all video digital video now? The
digital age. switch to digital video as a broadcasting
Webcasting, or broadcasting your video medium has happened over the past few
live to an audience, is another option that has years. In June 2009, all television stations
become simpler. Inexpensive webcams (cost- were required to make the move to digital
ing from $25 to $100) can be easily attached signal broadcasting. DTV.gov is a site that
to your desktop or notebook computer. Many keeps consumers current on using conver-
models of monitors have built-in webcams. sion boxes to allow older television sets to
Webcam models that are more expensive operate with the new digital signal.
have motors that allow you to automatically Movie production studios have also been
rotate to track the sound, so you are always moving toward digital video for many
in the frame even if you are moving around years. George Lucas, a great proponent of
the room. Services such as YouTube offer digital technology, filmed Star Wars Episode
Quick Capture buttons, so with one click, II: Attack of the Clones completely in digital
your video can be recorded through your format way back in 2002. It played in a spe-
webcam and delivered to the Internet. cial digital release at digital-ready theaters.

Digital Media and Information 389


And in January 2005, the digital film Rize, by which is over six times as many pixels as
David LaChapelle, premiered at the Sun- standard definition. The aspect ratio used
dance Film Festival. It was streamed from is 16:9, which makes the screen wider,
computers in Oregon to a full-size cinema giving it the same proportions as the rectan-
screen in Park City, Utah, beginning a new gular shape of a movie theater screen (see
age of movie distribution. Figure 8.29). This allows televisions to play
Since the conversion to digital TV movies in the widescreen format that they
signals, are there any more “free” were created for, instead of “letterboxing”
television signals? Digital television the film with black bars on the top and the
signals now flood the air around you and bottom of the screen.
can be picked up by a digital antenna. If you What types of connectivity are pro-
live in an area with good “over-the-air” vided on modern television sets? As
(OTA) reception, you can pick up crisp, video sources have increased, so have the
high-quality digital versions of all the shows number and types of connectors on a televi-
Figure 8.29 on local network affiliates for free. sion. A typical HD set has at least three
How is HD different from “plain” HDMI connectors, allowing game consoles,
(a) Standard definition
television has a more digital? HD stands for high definition. It is Blu-ray players, and cable boxes to be con-
“square” aspect ratio, a standard of digital television signal that nected and produce the highest-quality out-
while (b) high-definition guarantees a specific level of resolution and put. HDMI is a single cable, with just one
television matches the a specific aspect ratio, which is the rectangu- plug, that carries all of the video and all of
16:9 ratio used in the lar shape of the image. A 1080 HD TV dis- the audio information. That means there is
motion picture industry
without resorting to plays 1,920 vertical lines and 1,080 one connector, not three for different parts of
(c) letterboxing. horizontal lines of video on the screen, the video signal and another two for the
stereo sound signals!
Many sets have a built-in SD
a b
card reader. This allows users to
4 16
display slide shows of photo-
graphs captured by their digital
cameras. A PC VGA port is also
included on most sets. This allows
you to feed your computer’s out-
3 9
put video signal directly to the tel-
evision so you can display an
Internet browser or work on your
files on the big screen. Some sets
NTSC HDTV are now incorporating a wireless
Extra image area
network adapter so the set can
c stream video from the Internet with-
out having a separate computer con-
16
nected. Several manufacturers are
offering TV sets that stream Internet con-
tent. Sony Bravia Internet Video link can
deliver content on demand from a num-
ber of free sources (see Figure 8.30), and
the Panasonic Viera Cast feature works
in a similar fashion. Google announced
that it is working with Sony and Logitech
to offer Google TV. Google TV is built
9
into some sets and also available as a set
top box add-on. It allows a single search
utility to check for content on the Inter-
net, on your stored recorded programs,
and on the TV guide listing.
What advantages are there to
watching digital video? Because the
signal can be stored into computer mem-
Letterbox ory as it is delivered, a digital video

390 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


television show can be paused, or can be
rewound in real time. Other information
services can be integrated with the broad-
cast; so if a telephone call came through
during the show, a pop-up could appear
identifying the caller. The Sony Bravia series
of televisions, for example, has Internet
video capabilities that let you select
“widgets” you can position on the screen to
display the latest news, weather, sports, or
other Internet downloads. In the future,
there will be more interactivity integrated
so you can participate in live polls or chats
on-screen as the show is broadcast.
In movie studios, digital video is usher- Figure 8.30
ing in the age of “remixable” films. The Sony Bravia televisions
premium content, like new-release movies,
components of these feature films—from use a wireless network
is offered for a fee. Just one click and you
production footage to soundtrack, dialogue, adapter to stream digital
can instantly watch any offered movie for video from a number of
and sound effects—are available to the
24 hours, with full control—stopping, start- online sources.
audience online, and each person is able to
ing, and rewinding. Other providers, like
interact with and modify the film, creating
Netflix, also offer streaming video content.
a new plotline or a different ending. The
While Netflix’s basic business model is to
MOD Films site (modfilms.com) is one
ship members DVDs physically in the mail,
place where remixers gather.
they now also offer Watch Instantly. Thou-
Can I record the digital video that
sands of movies and TV series are available
comes over my television? There are
with just a click. You can view these shows
a variety of digital video recorders (DVRs)
on a television through any gaming console,
available to record the digital video from
a PC, an iPad, or a specialized device like
your television. These can record in either
the Roku digital video player.
standard or HD quality and store the infor-
Can I get digital video to watch on
mation on a hard drive. Useful features in-
my portable device? Yes. Many DVR
clude being able to record two shows at
units, like TiVo, support software that allows
once, being able to download movie pur-
you to transfer recorded shows to files on
chases or rentals from the Internet directly to
your PC and format them for viewing on an
the DVR unit, and easily moving stored con-
iPod, a PlayStation Portable, or another mo-
tent to a mobile device like an iPod or a
bile device. There are also devices like Sling-
notebook. Using a DVR, you can pause live
box that take the video from your television
TV or set up a schedule to capture every
and broadcast it to you over the Internet.
episode of a series, no matter when it airs.
With Slingbox, you can be in another room,
Models like TiVo even recommend new
or another country, and control and watch
shows you might like based on what you
your home television on your notebook or
have been watching. If you don’t want to
your smartphone (see Figure 8.31).
purchase a DVR or pay the monthly sub-
scription fee for DVR service, you can install
PVR (personal video recording) software on
your computer. When connected to your
cable signal, programs like BeyondTV
(snapstream.com) and SageTV (sagetv.com)
turn your computer itself into a DVR.
How else can I get digital video to
my TV? In addition to the broadcast
content coming in to your TV, there are a
number of streaming sources of digital
video. Cable providers offer a wide range of
on-demand video services. Many older Figure 8.31
films, as well as shows such as exercise Slingbox can send your digital television content to
classes, are offered free of charge. Other your notebook or phone, wherever you may be.

Digital Media and Information 391


Digital Mobility and device. Internet tablets do not offer full-size
keyboards. Netbooks and Internet tablets
Access can carry files, music, and videos as well as
Once you are comfortable with digital com- provide specialized services. Then there is
munication and digital media, you’ll want to the full range of notebooks and tablet com-
be able to communicate and to access your puters, and new blends of various features
music, files, and videos whether you are in are appearing in new devices all the time.
front of a desktop at home or in an airport Figure 8.32 lists the main features of several
while traveling. Access to your digital assets different mobile devices.
is required in a modern business environ- What if I don’t need a phone but
ment and is a great benefit in your personal do need Internet access? Tiny,
life. Earlier chapters discussed expensive lightweight Internet-enabled devices are
solutions like notebook computers; but now appearing that don’t bother to include cell
there is a much wider range of devices that phone features at all. The Nokia N810 Inter-
grant you access to your media and data net tablet series (see Figure 8.33), for example,
wherever you are. uses Skype or Gizmo for voice communica-
tions instead of a cell phone service. It has a
high-resolution screen and WiFi connectivity
Selecting the Right Device so you can stream audio and video, use Web
How do I select the right device for e-mail clients, and access Web sites. It
my needs? There are a wide range of features an RSS reader so you can peruse
computing devices on the market today that the latest from the sites you are following.
give you varying access to digital communi- Memory expands with SD expansion cards.
cation and digital media. A netbook runs a The Sony PlayStation Portable (PSP)
fully featured operating system but weighs can play video games but also includes a
in at 2 pounds or less. An Internet tablet is Web browser, Skype, and an RSS reader.
another type of very light, very portable It uses Sony Memory Sticks to store data

Figure 8.32 MOBILE DEVICES: PRICE, SIZE, WEIGHT, AND CAPABILITIES

Device Relative Price Approximate Size Approximate Weight Standard Capabilities


Cell phone $$ (Includes cost for the 5⬙ ⫻ 2⬙ ⫻ 0.5⬙ 0.25 lb. Voice, e-mail, some
phone, a monthly plan, and application software, and
Internet access) Internet connectivity

PMP $$–$$$ 4⬙ ⫻ 2⬙ ⫻ 0.5⬙ 0.25 lb. or more Storage of digital music,


video, and other digital
files

Smartphone $$–$$$ 4.5⬙ ⫻ 2⬙ ⫻ .75⬙ 0.25 lb. PIM capabilities, access to


application software, and
access to the Internet

Internet tablet $$ 6⬙ ⫻ 3⬙ ⫻ 0.5⬙ 0.5 lb Webcam, GPS, phone


calls using Skype, sharp
resolution, and widescreen
display

Netbook $$$$ 10⬙ ⫻ 7⬙ 1–2 lbs. 8⬙ to 10⬙ screens and run


full-featured operating
systems and applications

Tablet PC $$$$$ 10⬙ ⫻ 8⬙ ⫻ 1⬙ 3 lbs. PIM capabilities, access to


application software,
access to the Internet, and
special handwriting- and
speech-recognition
capabilities

Notebook $$$$–$$$$$ 10⬙ ⫻ 13⬙ ⫻ 2⬙ 5 to 8 lbs. All the capabilities of a


desktop computer plus
portability

392 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


files, videos, music, does not have a fully fea-
and images. The tured operating system,
screen is a 4.3⬙ it can run mobile touch
widescreen design versions of popular
with great clarity Apple software like
and brightness. Pages, Numbers, and
The PSP can even Keynote.
connect over the In- What if all I
ternet to your really need is to
PlayStation 3 system bring my books
at home and with me? For
display the videos avid readers of
or music stored there e-books (books
for you wherever stored as
you are. electronic files),
What if I need a the Amazon Kindle
larger screen and DX or the Sony
Figure 8.33
keyboard? If you re- Reader Digital Book
quire a larger screen and The Nokia N810 series Internet tablet features a could be what you are
touch screen and keypad and is designed primarily
more processing power, for Web surfing and sending e-mail. looking for. These fea-
then look at a category ture internal RAM, but
of emerging computer also support flash
systems known as netbooks. Examples include memory cards for more storage. You can get
the Asus Eee PC and the Dell Inspiron Mini approximately 7,500 turned pages on one
10 (see Figure 8.34). Netbooks pack major charge, so on long plane flights this may be
computing power into a tiny package, and the device you use most. The Apple iPad
manufacturers try to extend battery life as supports reading e-books as well, with the
long as possible. Screen sizes are typically be- Amazon Kindle software app and with
tween 8⬙ to 10⬙, and keyboards are less than Apple’s own iBooks bookstore. The iPad is
full sized. No optical drive is integrated but full color, however, whereas both of the
one can be connected as a separate peripheral other readers display content in shades of
via the USB port. Netbooks often come with a gray. The iPad also supports video viewing,
Windows operating system. Some users opt music, Internet browsing and thousands of
to install a flavor of Linux, however, because apps on its 9.7” multitouch screen (see
Linux requires fewer resources than Figure 8.35).
Windows. Solid-state hard drives are a good
choice for netbooks because they use less Ubiquitous
power and produce
less heat. Many mod-
Computing
els include integrated What is in the fu-
webcams as well as ture for our digital
Bluetooth, so while lifestyles? Mark
netbooks are small Weiser, a researcher at
and light, they still can Xerox’s PARC labora-
serve many functions. tories, has predicted
New tablet entries that “computing will
also fall into this cate- be woven into the
gory. The Apple iPad fabric of everyday
has a touch key- life until it is indis-
board that is tinguishable
almost full size in from it.” This
landscape mode. concept is called
It has a 9.7⬙ multi- ubiquitous
touch screen and computing (or
weighs in at only Figure 8.34 ubicom). More and
1.5 pounds. Al- Subnotebooks like the Asus Eee PC weigh in at less than two more styles of digi-
though the iPad pounds but run fully featured operating systems. tal devices are being

Digital Mobility and Access 393


introduced, but there bottles. WineM can also display which wines
is a second force at are ready to drink, or if any of your friends
work. Digital comput- has a similar wine collection, or if the winery
ing devices are in- is having a sale. It updates information auto-
creasingly embedded matically and will e-mail or text you an alert
in appliances, cloth- when a bottle of wine is removed from the
ing, cars—all the rack.
items we physically How is shopping changing with in-
interact with in our creased access to digital informa-
day. The era of “smart tion? Recent studies show that 93% of
things” is just begin- adults in the U.S. ages 18–29 now have a cell
ning. phone. Combined with the explosion in
How will our popularity of social networking sites, con-
lifestyles change sumers’ experiences are changing. Shopping
as computing now begins with price comparison tools like
becomes every- ShopSavvy and RedLaser. These “location
where and invisi- aware” tools compare prices between
ble? While we can’t nearby stores and then also compare the
predict the future, prices with the best prices available online.
there are trends in de- Once you’ve selected a store, many different
sign that give us hints. mobile apps let you take advantage of mo-
Researchers and in- bile coupons, called mobicoupons. A smart-
ventors like Mike Ku- phone can simply read the barcode on the
niavsky of ThingM item, and then will display a barcode for a
are creating devices coupon. The cashier scans the mobicoupon
that exploit the new right at the register. More and more sites
Figure 8.35 digital nature of our world to make tasks are appearing that offer some type of
The Apple iPad has a easier. The WineM product from ThingM is a mobile coupon, including Zavers, Yowza,
color 9.7” screen and lasts good example (see Figure 8.36). WineM is a mobiOpons, and Cell Fire. Future trends in
more than 10 hours on a
“smart” wine rack. Each bottle is labeled this area include a tighter integration with
single battery charge.
with a radio frequency identification (RFID) the information customer loyalty programs
tag when it is stored by the owner. When it is already store about you. Based on location
time to pick the perfect bottle for dinner, the and your past buying preferences, special-
owner can ask the wine rack to show just the ized coupons could be designed and deliv-
Chardonnay, and LEDs light up just those ered through the mobicoupon system.

Figure 8.36
The smart wine rack uses WineM technology and answers queries from its controller, (a) like “Show me all of the
California wines I have that are ready to drink and under $50 in value.” (b) In response WineM lights up the bottles
that fit the criteria.

394 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


How is marketing changing
because of ubiquitous computing?
New strategies in marketing and communi-
cations are counting on the fact that so many
people have a cell phone with a camera and
Internet access. A new technology from
Microsoft called Microsoft Tag transforms
everyday things in the real world into
live links to online information and
entertainment. From your smartphone,
simply snap a Tag image (see Figure 8.37)
anywhere you see it—on a product, in an
advertisement, on a sign or storefronts—and When you photograph this tag, the image
your phone takes you directly to a display of on the right displays on your phone.
information. It might be a Web site, video, or
a schedule, or a social network. To use Tag
just download the free Tag reader on your where the car is, whether it has been Figure 8.37
Web-enabled camera phone. dropped off at the right location, and how In print advertising,
Marketers also have to be aware of the far it has been driven. The entire process is Microsoft Tag technology
can quickly take a reader
phenomenon of “crowdsourcing”— transparent to City CarShare members. to a display on their cell
checking in with the voice of the crowd. Members have 24/7 access to a vehicle—a phone that includes more
Consumers are using apps like MobileVoice truck, a hybrid, a convertible—when they information and a mobile
to let you check in on what the verdict of the need it, with very little advance notice, for a coupon.
crowd is on the quality of an item. Forward- cost of about $6.00 an hour (gas and insur-
thinking companies are using this input to ance included!).
improve their products and services. Could ubiquitous computing tech-
TaxiHack, for example, allows phone users nology improve the world? The notion
to comment on NYC cab drivers, and AT&T of an instantly connected population is an
has an app to let customers report locations
of coverage gaps.
How will our “ownership” of ob-
jects change with the new access to
information? The evolution of informa-
tion to a digital form is allowing us to
change our relationship to objects. Items like
bicycles and cars can become “subscrip-
tions” instead of large one-time purchases.
Call a Bike is a program run in Germany. At
most major street corners, there is a rack of
Call a Bikes (see Figure 8.38). Place a call to
the phone number printed on the bike, and
it texts you a code you can use to unlock the
bike lock. Ride the bike to where you’re
going. When you arrive, re-lock it. The
amount of time you rode it automatically is
billed (by the minute) to your phone.
City CarShare is another system using the
digital communication of information to
change our lifestyle habits. Many cities, like
San Francisco and Philadelphia, now offer a
City CarShare program. Residents sign up
for the program and receive a key that has
an RFID chip in it. All cars are connected to
a central network. You can open a City
CarShare car and start the engine only when Figure 8.38
your specific key is scheduled to open and Call a Bike uses digital technology to change our lifestyle from one of ownership to
start it. GPS technology is used to track one of “subscription.”

Digital Mobility and Access 395


TRENDS Computers in Society: “Ecosystem” of New
IN IT
Tools—Augmented Reality
We are familiar with digital data—comfortable with carrying around ticket. It then goes out to the Internet to check if the flight is on time or if
music, some files, contact lists, and calendars. But where is your data a gate change has been issued. If it has, the words Delayed: 20 Minutes
when you need it? Today, your information is locked in your cell phone, suddenly appear on the top of the boarding pass (see Figure 8.39a). The
your iPad, or your notebook computer. This mobility is revolutionary com- information is no longer trapped in your mobile device—it is part of your
pared to the access of any prior generations, but it still requires you to environment. Or say you are in a bookstore and select the title Ambient
take out your notebook, open it up, boot it up, and initiate a request for Findability. As you hold the book, its Amazon rating appears on the cover
information. What lies ahead? (see Figure 8.39b). You open to the inside sleeve, and the comments from
The Media Lab of MIT provides some great clues. The Fluid Interfaces readers at Amazon begin to scroll over the page. Then you can tap any
group works to develop new tools to bring our data more directly into the one of those comments for more detail.
physical world. One of the most promising of these new tools is called Sixth Sense is the product of work by Pranav Mistry and his advisor
Sixth Sense. It is a wearable device hanging around your neck consisting Patti Maes. The product can also respond to gestures, so when you
of a camera, a projector, and a mirror that can communicate with the In- make a rectangle with your fingers, it takes a photograph. When you
ternet over wireless Bluetooth via the cell phone in your pocket. What reach your destination, any flat surface such as a wall or table can be
Sixth Sense can do is augment your experience of reality by adding the used to “dump” your photos into a “pile.” Using your hands, you can
information you need as you need it. shuffle the images, or resize or rotate an image. Or draw a watch-sized
Say you are on your way to the airport and pull out your boarding pass. circle on your wrist, and Sixth Sense displays an analog watch face on
Sixth Sense uses pattern recognition to realize you are holding an airline your arm.

a b

Figure 8.39
Sixth Sense recognizes what information you need added to your environment and displays it automatically.

idea that has appealed to futurists through- human rights abuses throughout the world
out time. Writer and futurist Jamais Cascio (witness.org). Their slogan is “See it. Film it.
has presented ideas of how such a setting Change it.” Similar efforts are aimed at docu-
might bring all citizens into a more engaged menting the environmental state of the
role in changing the world. In his TED talk world. Environmental successes can be col-
“The Future We Will Create” (ted.com), Cas- lected together along with evidence to docu-
cio discusses how a smartphone-carrying ment ecological crimes.
population can work to create a better What if each of the cell phones
world—more sustainable, more secure, and distributed around the world had
more desirable. integrated atmospheric sensors?
Having an international population armed Then millions of points around the world
with cameras and a means to quickly distrib- would be “reporting” in on quality of air
ute their video allows the invisible to become and water. And what if these sensors could
visible in many ways (see Figure 8.42). This monitor for flu viruses? Tagged with geo-
transparency can be used to let us see the graphical information, the data could be
consequences of our behavior directly—and combined with maps for easy viewing and
make changes. The Witness Project, founded analysis. Ideas like these are being explored
by Peter Gabriel, uses this strategy to stop by UCLA researcher Dr. Deborah Estrin, the

396 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


In fact your hand is as good a flat surface as any to Sixth Sense (see
Figure 8.40). Need to make a phone call? Sixth Sense will display a
keypad on your palm. Tap out the number on the virtual keypad, and one
touch of the red CALL button that appears on your palm places your call.
The shirt of the person walking toward you will also work as a projec-
tion surface. When a person walks up to us, we don’t often pull out our cell
phone and Google them before speaking, but as a person approaches a
Sixth Sense wearer, it recognizes their face, heads off to their Facebook
page or blog, and scans the most recent entries. It then projects the
keywords that describe the person and their interests on their clothing as
you watch them approach. Currently the Sixth Sense is small but not
very stylish. The product is constructed from off-the-shelf components
costing about $350. Within a few years its inventors believe it can be
produced as a button-sized device, costing less than a cell phone costs
now. You can monitor the progress of this device at pranavmistry.com/
projects/sixthsense.
Figure 8.40 There are a number of iPhone apps available right now that use the
Any surface can become an input device using Sixth Sense. integrated compass and camera of iPhone to add information to your envi-
ronment. BionicEye is a $1 app that “augments” reality. When you point the
camera’s lens at a building, it shows you the nearest
subway lines or restaurants, along with which direc-
tion you need to go in to get there (see Figure 8.41).
This kind of direct integration of digital informa-
tion with the physical world around us is a hallmark
of our digital future. Augmented reality combines the
digital information we have accumulated in an imme-
diate and spontaneous manner. So where will your
new reality take you?

Figure 8.41
Augmented reality apps let you look through
your phone’s camera and see the world with
extra information superimposed.

director of the Center for Embedded


Network Sensing.
There is no exaggerating the range and
severity of problems facing us, from envi-
ronmental threats to dangers brought on by
how we treat each other. Technological ad-
vances, like cell phones equipped with cam-
eras and Internet access, could provide the
means to change the course of our future. It
will be our job to focus the direction of that
change, using it as a response to the chal-
lenging problems facing us.

Figure 8.42
Using mobile devices we could document the environ-
mental dangers and successes around the world.

Digital Mobility and Access 397


eight
eight summary
chapter

1. What are the changes that have work in the same way as in a computer to
brought us a digital lifestyle? process information and support communi-
The increased use of digital information has cations, software applications, and other
services.
summary

led to a period of greater creativity and con-


trol of our data. In a digital format, informa-
tion is easy to carry, manipulate, and 4. Why would I use VoIP, and what does
exchange. This has led to revolutionary
it offer that is unique?
changes in communication, entertainment
media, and mobile computing. VoIP allows inexpensive communication
using a computer or a WiFi-enabled phone.
Because it is based on a digital format for in-
2. How has the move to digital formation, it can support services like auto-
information affected the matic delivery of phone messages to an
communication tools important to e-mail account or texts to a mobile device.
both the business world and life
outside of work? 5. How is digital media different from
The age of digital information has brought analog?
new opportunities and challenges to busi- Digital media is based on a series of numeric
nesses. Some have had to struggle to shift data comprising number values that were
their business models to the new style of in- measured from the original analog wave-
formation. Because information can be form. As a string of numbers, a digital photo
shared so easily, issues of copyright and in- or video file can be easily processed by mod-
tellectual property have become critical. In ern computers.
our personal lives, we see products that
allow us to interact with information in
ways that had been too expensive or 6. What can I carry in a portable media
difficult before. player, and how does it store data?
Most PMPs can store any kind of digital in-
3. How do cell/smartphone components formation—photos, videos, or music files for
example. Some PMPs store data on a hard
resemble a traditional computer, and
drive, while others use flash memory. Some
how do they work?
also allow the amount of memory to be up-
Like a traditional computer, a cell/smart- graded, while others have a fixed amount of
phone has a central processor, memory, and memory.
an operating system. These components

398 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


summary eight eight

chapter
7. What ways are there for me to create 8. What changes does ubiquitous
and to watch digital video? computing bring to our lifestyles?
You can create digital video using any digi- As computers become smaller and less obvi-

summary
tal camera, webcam, or digital camcorder. ous, they will begin to integrate into our life-
Digital editing software allows you to add like appliances rather than be complicated
transitions, effects, and sound tracks. There tools. Ubiquitous computing is beginning to
are a great many sources of digital video, in- allow us to move some objects from an own-
cluding free sources like YouTube and ership model to a subscription service
JustIn, as well as pay-per-view services like model.
Amazon Video On Demand or cable
providers’ streaming video options.

399
eight
eight key terms
chapter

analog .................................................................... 364 multimedia message service (MMS) ............... 372


analog-to-digital converter chip ....................... 366 netbook ................................................................. 392
base transceiver station...................................... 366 peer-to-peer (P2P) sharing ................................. 380
key terms

Bluetooth .............................................................. 370 portable media player (PMP)............................ 377


cellular phone (cell phone)................................ 366 resolution.............................................................. 384
codec ...................................................................... 388 sampling rate ....................................................... 377
copyleft.................................................................. 388 short message service (SMS)............................. 371
data plan ............................................................... 372 smartphone........................................................... 366
derivative work ................................................... 388 syncing (or synchronizing)................................ 370
digital signal processor ...................................... 366 telephony .............................................................. 366
flash memory ....................................................... 379 ubiquitous computing........................................ 393
global positioning system (GPS) ..................... 381 VoIP (Voice over Internet Protocol) ................. 374
Internet tablet ...................................................... 392 wireless Internet service provider
microbrowser ....................................................... 373 (wireless ISP).................................................... 372
mobile switching center..................................... 366 Wireless Markup Language (WML) ................ 374

400 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


buzzwords eight eight

chapter
Word Bank
• analog-to-digital converter • MMS • SMS
• Bluetooth • netbook • synchronize

buzzwords
• cell phone • P2P • telephony
• GPS • PMP • ubiquitous computing
• Internet tablet • sampling rate • VoIP
• microbrowser • smartphone • WML

Instructions: Fill in the blanks using the words from the Word Bank above.

Elizabeth knows that everything seems to be “digital” these days. In the past, she carried a
traditional SLR camera but now she uses her simple (1) __________ to take photos. She
can connect wirelessly to the computer to transfer the images because the phone supports
(2) __________. Sometimes she doesn’t bother to do that because she has already sent a(n)
(3) __________ message to a friend with the image. Her old phone couldn’t do that because
it only supported (4) __________. If she upgraded to a(n) (5) __________, she could actually
make many refinements and edits to the image without transferring it to the computer at all.

Pete is a real fan of technology, and so he has selected a(n) (6) __________ instead of a cell
phone. He’s always near a WiFi signal, so he doesn’t need an actual phone. He doesn’t even
pay for traditional phone service at home, where he uses (7) __________ instead of a
landline. He’s fallen in love with his new device for many reasons. It can give him driving
directions with its built-in (8) __________. The (9) __________ software displays full HTML
Web pages right on the device. To keep this device coordinated with the data on his
computer, he makes sure to (10) __________ the data each night.

Niti can’t quite decide what device will work best for his new life. He’s moving to
California and plans to be outside a lot, so he wants something very light. He thinks the
two-pound (11) __________ might be ideal because he doesn’t really need a full keyboard or
a huge screen. When he’s out biking, he’ll just wear his (12) __________ on his arm to keep
the tunes flowing. He downloads free songs offered by bands that are just starting out from
a(n) (13) __________ site. The songs have a much lower (14) __________ than he usually

computer
demands, but at least they don’t take up much space on his hard drive. He’s heard that
electronics are merging with clothing more and more, so maybe soon (15) __________ will
lead to a T-shirt that can take care of his mobile music needs!

becoming
literate
becoming
computer literate
Instructions: Write a report providing answers to the question posed below, using as
many of the key terms from the chapter as you can. Be sure the sentences are grammatically
and technically correct.

You have a limited budget to spend on technology tools and toys in the years you will be a
student. You are considering communication, entertainment media, and your need to be
able to work and connect with your information when you are not at home. Which digital
media services and products would you definitely invest in? How would you justify their
value? What kinds of services and products would you use that are free or low cost? Has
the migration to a digital lifestyle given you more freedom and creativity or just caused
you more annoyance and expense?

401
eight
eight self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which is not a factor that determines c. Push technology


the quality of images taken with a d. 3G standard
digital camera? 7. Flash memory is a type of
a. Lens quality c. Resolution a. nonvolatile memory.
b. File format d. EyeFi b. hard drive memory.
2. Which is the process of ensuring that c. SSD memory,
two computer devices have the same d. volatile memory.
data? 8. VoIP is phone service that
a. Mapping a. works even when the electricity
b. Standardizing goes out.
c. Synchronizing b. works over an Internet
d. Transferring connection.
3. The operating system of your cell c. requires no special setup for a
phone is stored in secure connection.
a. read-only memory. d. has extremely high quality and is
b. the display. very reliable.
c. the digital signal processor. 9. Which of the following is not true
d. random-access memory. about modern televisions?
4. If you want the lightest, most a. They incorporate wireless
portable computing solution, you connectivity.
would purchase b. They allow other services, like
a. a netbook. caller ID, to be integrated.
b. a tablet PC. c. They can use widgets to display
c. an Internet tablet. sports and news updates.
d. a notebook. d. They run word processing and
5. P2P is an acronym for slide presentation software.
a. packet-to-packet networking. 10. Which service allows you use your
b. peer-to-peer sharing. cell phone to send messages that
c. person-to-person texting. contain images?
d. power-to-power delivery. a. MMS
6. What software makes it possible to b. ISP
view Web pages on a cell phone? c. SMS
a. Microbrowser d. MiFI
b. Extension

True–False
_____ 1. All smartphones allow you to add more memory.
_____ 2. Digital music files must be converted to the MP3 format if they are transferred to a
mobile device.
_____ 3. A codec is the algorithm that compresses and decompresses video files.
_____ 4. If your digital camera doesn’t support wireless connectivity, you can use a
memory card with built-in WiFi.
_____ 5. Some Internet-enabled devices like the Nokia N810 Internet tablet use Skype for
voice communications instead of cell phone service.

402 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


making the
eight eight

chapter
transition to...
next semester
1. Choosing Mobile Devices to Fit Your Needs

transition to...
As a student, which devices discussed in this chapter would have the most immediate
impact on the work you do each day? Which would provide the best value (that is, the
greatest increase in productivity and organization per dollar spent)? Consider the full
range of devices, from cell phones to notebook systems.

next semester
making the
2. Ready... Set... Act!
As a student, you often give presentations or take on student teaching assignments.
What would be the steps for creating a digital video recording of one of your presenta-
tions? What tools would you need to record? What kind of file would you end up pro-
ducing? How would you make a DVD from that? How would you distribute the video
to a live Internet audience?
3. Do You Still Need a Phone?
Explore Skype (skype.com) as an alternative to paid telephone service. What equip-
ment would you need to use Skype as your everyday communication medium? When
would this be useful? What telephone services and features would you lose if you went
to Skype?
4. Choosing the Best Phone
Your friend wants to trim down the number of different devices that she carries. Visit
the most popular cellular providers’ Web sites and research options. Which phone
would you recommend to your friend, and why? Compare at least three different
models of phones and list their price, music storage capacity, built-in memory, and
expandability options.
a. Which of the three models you compared is the best value for your friend?
b. What special features does the phone you chose have? What accessories would you
recommend your friend buy to make the phone more useful?
c. Would you suggest buying a refurbished phone? Why or why not?

5. iTunes U
Download a free copy of iTunes software. In the iTunes Store, explore the iTunes U
podcast directory, which contains free audio and video lectures published by major
universities.
a. Look for the MIT Open Courseware video podcasts. How many lectures are
available from MIT (Massachusetts Institute of Technology)?
b. If each lecture were 90 minutes on average and approximately 200 MB in size, how
much storage would it take to save all of the video lectures in every course
published by MIT?
c. Is there a mobile device that can store and play that much content? What devices
could store the lectures from all of the courses in mathematics offered by MIT Open
Courseware?

403
making the
eight
eight
chapter

transition to...
the workplace the workplace
1. Corporate Mobile Communications Needs
making the

Imagine your company is boosting its sales force and looking to the future of mobile
transition to...

technology. Your manager has asked you to research the following issues surrounding
mobile communications for the company:
a. Do mobile communication devices present increased security risks? What would
happen if you left a cell phone at a meeting and a competitor picked it up? Are there
ways to protect your data on mobile devices?
b. Can viruses attack cell phones? Is there any special software on the market to pro-
tect mobile devices from viruses? How much would it cost to equip 20 devices with
virus protection?
c. Is there a role for mobile communication devices even if employees don’t leave the
building? Which devices would be important for a company to consider for use
within corporate offices? Are there software solutions that would work as well?
d. Should employees be allowed to use smartphones provided by the company for
personal use even though files related to personal use might eat up potentially valu-
able memory and space? What restrictions should be put on personal use to protect
the privacy of proprietary company information contained on the devices?

2. 4G Communications
The most recent generation of telecommunications (nicknamed “4G” for fourth genera-
tion) allows the speed of cellular network transmissions to hit 3-6 Mbps. How does that
compare to dial-up and broadband access over wired networks? What implications
does it have for information access and e-commerce? What download speed would be
ideal? Upload speed? How would it change how you communicate?
3. Subscription versus Ownership
Consider the examples of Call-a-Bike and CarShare. Are there other businesses you can
identify that would be able to take advantage of digital information and become sub-
scription services instead of vendors of a physical product? What are the advantages to
the consumer of subscription over ownership? What are the drawbacks?
4. Too Much Media?
Imagine you are a manager of 18 employees, all of whom work with constant Internet
access. As a manager, what concerns might you have about their use of corporate band-
width to download and view media files? Do you think it would benefit your business
to block any MP3 file transfers? Should you put in place a block to prevent access to
sites that store huge numbers of streaming videos? As a manager, are there concerns
you might have if employees have digital cameras on their cell phones? Would your
answers be different in an academic setting?
5. Mobile Devices on the Highway
Mobile devices used in vehicles are becoming the norm in today’s society. Consider the
following:
a. Several car manufacturers provide Bluetooth option packages for their vehicles.
What advantages are there to having Bluetooth connectivity in your car? Are there
any disadvantages?
b. Examine the Microsoft Sync software package. List the features and services it pro-
vides. If you were a salesperson with a territory that you covered by car, how would
Sync help you?

404 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


critical thinking
eight eight

chapter
questions

Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Digital Entertainment
Can you name a style of media that has not made the shift to digital? What advantages
does digital photography offer? Digital video? What disadvantages come along with a
digital format for entertainment media? Has the growth in digital media promoted an
increased understanding between people or has it created more isolation?

2. The Ultimate Style


As ubiquitous computing continues to evolve, devices become lighter and smaller, and
we are beginning to see a convergence of computing and clothing.
a. What would the ultimate convergent mobile clothing be for you? Is there a limit in
weight, size, or complexity?
b. Can you imagine uses for technology in fashion that would support better health?
Better social relationships? A richer intellectual life?
c. What other applications can you think of for a device like Sixth Sense? What kind of
information needs to be displayed in our environment to be helpful?

3. Ubiquitous Means Everywhere


As we continue to see computing power distributed throughout all of our environ-
ment, there are shifts happening in how we relate to objects, how we shop, and how
marketing is done. Consider three other areas of our lives—professional sports, buying
a house, and staying healthy. How will ubiquitous computing change those activities?
How would just knowing that every participant has a smartphone change the activity?

4. Too Much Information?


Consider the following questions:
a. Your rent a car that has a GPS installed. After you return it, the rental company uses
the GPS data to determine whether you have driven the car at speeds above the
speed limit. They then issue fines for violations of the rental contract. Does this lead
to safer highways? Is it an infringement of your privacy?
b. Would you agree to insert a GPS-enabled tracking chip into your pet? Your child?
What legislation do you think should be required regarding use of the tracking data
from your phone records? Would you be willing to sell that information to market-
ing agencies? Should that data be available to the government if you were suspected
of a crime?

5. Electronic Publishing
Explore the specifications of the Sony Portable Reader, the Barnes & Noble NOOK, the
Amazon Kindle, and the Apple iPad. How would your study habits change if your
textbooks were only delivered to you in electronic format on one of these devices?
What unique advantages would there be? What disadvantages would there be? How
would using such a device compare with just receiving the book as an electronic file,
such as a PDF document, to your notebook computer?

405
eight
eight team time
chapter

Convergence? Any Time Soon?

Problem
team time

There are so many different mobile devices saturating the market that many people are left
in a state of confusion. Either they are buying too many devices and not using them, or
they are refusing to buy anything because of the dilemma of too many choices.

Task
Each team will assign a member to become the expert resource in one of the digital areas
presented in this chapter: digital communication, digital media, or digital mobility. For
each scenario described by a client, the group will select the minimum set of devices that
would support and enhance the client’s life.

Process
1. Consider the following three clients:
• A retired couple who now travel for pleasure a great deal. They want to be involved
in their grandchildren’s lives and will need support for their health and personal
care as they age.
• A young family with two children, two working parents, and a tight budget.
• A couple in which each individual is a physician and both adore technology.
2. Make two recommendations for your client in terms of digital technologies that will
enhance their business or their lifestyle. Discuss the advantages and disadvantages of
each technology. Consider value, reliability, computing needs, training needed and
communication needs, as well as expandability for the future.
3. As a group, prepare a final report that considers the costs, availability, and unique
features of the recommendations you have made for each client.
4. Bring the research materials from the individual team meetings to class. Looking at the
clients’ needs, make final decisions as to which digital technologies are best suited for
each client.

Conclusion
Digital information has allowed the development of a new style of living, both at home
and at work. With so many digital solutions on the market today, recommending digital
communication, media management, and mobility options needs to focus on converging to
the minimum set of tools that will enhance life without adding complication to it.

406 Chapter 8 Digital Lifestyle: Managing Digital Data and Devices


ethics
eight eight

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together the team will agree on an
ethical solution.

Topic: When Everyone Has a Voice


In the near future much of the world’s population could be equipped with Internet-ready
camera phones. Sensors on these phones could report location, measure for viruses, and
compute pollution indexes, while the cameras could be used to document a range of
human behavior. This could create changes in political movements, art, and culture as
everyone’s experience is documented and shared.

Research Areas to Consider


• Ted.com
• Mobilebehavior.com
• Witness project
• Center for Embedded Network Sensing

Process
Divide the class into teams.
1. Research the sources cited above and devise a scenario in which mobile access could
make an impact politically or environmentally.
2. Team members should write a summary that provides background information for
their character—for example: business owner, politician, reporter, and arbitrator—and
details their character’s behaviors to set the stage for the role-playing event. Then, team
members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

407
chapter
nine nine
securing your
system
protecting your digital data and devices

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. From which types of viruses do I need to protect my computer? (pp. 411–414)
2. What can I do to protect my computer from viruses? (pp. 414–417)
3. How can hackers attack my computing devices, and what harm can they cause?
(pp. 417–421)
4. What is a firewall, and how does it keep my computer safe from hackers? (pp. 421–425)
5. How do I create secure passwords and manage all of my passwords? (pp. 425–428)
6. How can I surf the Internet anonymously and use biometric authentication devices to
protect my data? (pp. 428–429)
7. How do I manage online annoyances such as spyware and spam? (pp. 429–434)
8. What data do I need to back up, and what are the best methods for doing so?
(pp. 435–438)
9. What is social engineering, and how do I avoid falling prey to phishing and hoaxes?
(pp. 438–441)
10. How do I protect my physical computing assets from environmental hazards, power
surges, and theft? (pp. 441–445)

multimedia resources
multimedia
resources

Active Helpdesk
• Avoiding Computer Viruses (p. 414)
• Understanding Firewalls (p. 421)

Sound Bytes
• Protecting Your Computer (p. 416)
• Installing a Personal Firewall (p. 424)
• Surge Protectors (p. 443)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Protect your surfing like a
pro. When you use public hotspots to surf, your Internet activity is subject
to snooping by prying eyes. Hotspot Shield (hotspotshield.com) is a free
software utility that ensures all of your data is transmitted across the
Internet through a virtual private network (VPN). A VPN is a secure Internet pathway
that large corporations use to protect sensitive data. Using the VPN shields
your data, such as information in forms you fill
out, credit card data, instant messages, and Web
browsing activities, from prying eyes. So install
Hotspot Shield today and increase your
level of protection.

409
Keeping Your spam, a recent survey by the Messaging
Anti-Abuse Working Group (MAAWG)
Data Safe found that half of e-mail users in North
The media is full of stories about malicious American and Europe have opened spam.
computer programs damaging computers, And the MAAWG discovered that 46 per-
criminals stealing people’s identities online, cent of people who opened spam did so
and attacks on corporate Web sites that have intentionally—out of idle curiosity, to follow
brought major corporations to a standstill. links to unsubscribe to unwanted e-mails
These are examples of cybercrime, which is (which only brings more spam), or because
defined as any criminal action perpetrated they are interested in the product being
primarily through the use of a computer. touted. Clearly, we are often our own worst
The existence of cybercrime means that com- enemies!
puter users must take precautions to protect Are computer viruses a type of
themselves (see Figure 9.1). cybercrime? A computer virus is a
Who perpetrates computer program that
computer crimes? attaches itself to another
Cybercriminals are indi- computer program
viduals who use comput- (known as the host pro-
ers, networks, and the gram) and attempts to
Internet to perpetrate spread to other comput-
crime. Anyone with a ers when files are ex-
computer and the where- changed. Creating and
withal to arm him- or disseminating computer
herself with the appropri- viruses is one of the most
ate knowledge can be a widespread types of
cybercriminal. cybercrimes. Tens of
What kinds of thousands of new viruses
cybercrimes are or modified versions of
conducted over the old viruses are released
Internet? The Internet each year. Some viruses
Crime Complaint Center cause only minor annoy-
(IC3) is a partnership be- ances, while others cause
tween the Federal Bureau destruction of data.
of Investigation (FBI) and Many viruses are now
the National White designed to gather sensi-
Figure 9.1
Collar Crime Center tive information such as
(NW3C). In 2009, the lat- Cybercrimes, including virus attacks, are a credit card numbers. The
est year for which data is serious problem for Web surfers. Conficker virus was the
available, IC3 processed most widespread in 2009
more than 336,000 complaints related to and infected millions of computers in a few
Internet crime, an increase of 22 percent weeks of its release, which illustrates how
over 2008. Many complaints were fraud serious a threat a virus can pose to your dig-
related, such as auction fraud, nondelivery ital security. You need to make sure your
of ordered items, credit and debit card data is protected from viruses and other
fraud, and advanced fee scams. Complaints malicious software attacks.
not related to fraud still pertained to serious Does cybercrime include the theft
issues such as computer intrusions, unso- of computing devices? Although
licited e-mail, and child pornography. Much theft of computer equipment is not classified
of the credit card fraud was perpetrated as a cybercrime (rather, it is considered
when credit card numbers were stolen by larceny), the theft of notebook computers,
criminals tricking people into revealing sen- cell phones, iPods, and other portable
sitive information or by computer programs computing devices is on the rise. The resale
that gather credit card data. value for used electronic equipment is
With all the news coverage about high, which contributes to demand for
cybercrimes, aren’t people being stolen merchandise. The ease with which
more cautious? Unfortunately, they are equipment can be sold online also fuels this
not. Although most people are aware of problem.

410 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
In this chapter, we discuss serious threats virus infection, as is e-mail, although
to your digital security (such as computer many people have misconceptions about
viruses and other activities of cybercrimi- how e-mail infection occurs. Just opening an
nals), less serious annoyances (such as spy- e-mail message will not usually infect your
ware and spam), and good security practices computer with a virus, although some new
to keep yourself from undermining your viruses are launched when viewed in the
digital security. We also discuss methods for preview pane of your e-mail software.
protecting your digital assets from attacks Downloading or running a file that is
and damage. attached to the e-mail is a common way that
your computer becomes infected. Thus, be
extremely wary of e-mail attachments,
Computer Threats: especially if you don’t know the sender.
Figure 9.2 illustrates the steps by which
Computer Viruses computer viruses are often passed from one
Computer viruses are threatening because computer to the next:
they are engineered to evade detection. 1. An individual writes a virus program
Viruses normally attempt to hide within the disguised as a music file of a popular
code of a host program to avoid detection. music group’s new hit song and posts
And viruses are not just limited to comput- it to a file sharing site.
ers. Any computing device such as a smart-
2. Unsuspecting Bill downloads the
phone, notebook, netbook, or iPad can be
“music file” and infects his computer.
infected with a virus. Even
your car, which now con- 3. Bill sends his cousin Fred an


tains embedded computer e-mail with the infected
systems, could catch a virus,
Viruses are not “music file” and contami-
especially if it connects to just limited to nates Fred’s computer.
the Internet for software computers. 4. Fred saves the MP3 file to a
updates.
What do computer
viruses do? A computer virus’s main
” flash drive and
then copies it to his
work computer and infects that ma-
purpose is to replicate itself and copy its chine as well.
code into as many other files as possible.
5. Everyone who copies files from
Although virus replication can slow down
Fred’s infected computer at work, or
networks, it is not usually the main threat.
whose computer is networked to
The majority of viruses have secondary
Fred’s computer, risks spreading the
objectives or side effects, ranging from dis-
virus.
playing annoying messages on the computer
screen to destroying files or the contents of
entire hard drives. Because computer
viruses cause disruption to computer sys-
Types of Viruses
tems, including data destruction and infor- Although thousands of computer viruses
mation theft, virus creation and deployment and variants exist, they can be grouped into
is a form of cybercrime. six broad categories based on their behavior
How does my computer catch a and method of transmission.
virus? If your computer is exposed to a
file infected with a virus, the virus will try to Boot-Sector Viruses
copy itself and infect a file on your com- What are boot-sector viruses? A
puter. If you never expose your computer to boot-sector virus replicates itself into a
new files, then it will not become infected. hard drive’s master boot record. The
However, this would be the equivalent of a master boot record is a program that
human being living in a bubble to avoid executes whenever a computer boots up,
catching viruses from other people—quite ensuring that the virus will be loaded into
impractical. memory immediately, even before some
Downloading infected audio and video virus protection programs can load.
files from peer-to-peer file sharing sites is a Boot-sector viruses are often transmitted
major source of virus infections. Shared by a flash drive left in a USB port. When
flash drives are also a common source of the computer boots up with the flash drive

Computer Threats: Computer Viruses 411


Step 1: Virus creation. Step 2: Initial virus infection.

Hacker’s computer

File sharing server Bill’s computer

Step 3: Virus spreads


to another computer.
Coworker’s computer

Fred’s work computer

Step 4: Virus spreads


Coworker’s computer
to work computer.

Step 5: Other computers


susceptible to infection. Fred’s home computer

Figure 9.2
Computer viruses are
connected, the computer tries to launch a computers. The effects of logic bombs and
passed from one unsus-
pecting user to the next. master boot record from the flash drive, time bombs range from the display of
which is usually the trigger for the virus to annoying messages on the screen to
infect the hard drive. reformatting of the hard drive, which
causes complete data loss.
Logic Bombs and Time Bombs
What is a logic bomb? A logic bomb Worms
is a virus that is triggered when certain What is a worm? A worm is slightly dif-
logical conditions are met—such as ferent from a virus in that a worm attempts
opening a file or starting a program a to travel between systems through network
certain number of times. A time bomb is a connections to spread an infection. A virus
virus that is triggered by the passage of infects a host file and waits until that file is
time or on a certain date. For example, the executed on another computer to replicate.
Michelangelo virus was a famous time A worm, however, works independently of
bomb that was set to trigger every year on host file execution and is much more active
March 6, Michelangelo’s birthday. The in spreading itself. When the Conficker
BlackWorm virus (otherwise known as worm broke out, it quickly infected an
Kama Sutra, Mywife, or CME-24), another estimated 9 million to 15 million individual
time bomb, spreads through e-mail computers. This worm spread through
attachments. Opening the attachment vulnerabilities in the Windows code and
infects the computer, and on the third compromised computers by disabling cer-
day of every month, the virus seeks out tain software services and utility programs
and deletes certain file types (such as (such as Windows Update). Fortunately, it is
executable or .EXE files) on Windows easy to protect yourself from most worms.

412 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Installing antivirus software, which is soft- BITS
ware specifically designed to detect viruses CAPTCHA: Keeping Web Sites Safe
AND
and protect your computer and files from BYTES From Bots
harm, is a good start. You also should apply
software patches (updates issued by the Automated programs called bots (or Web robots) are used to make tasks easier on the
manufacturers of software such as Windows Internet. Search engines use bots in a technique called spidering to search and index
that repairs known security problems) to Web pages. Unfortunately, bots can also be used for malicious or illegal purposes be-
your computer whenever they are issued. cause these bots can perform some computing tasks much faster than humans. For
We discuss protective measures later in the example, bots can be used on ticket ordering sites to try to buy large blocks of high-
chapter. demand concert tickets or to make repeated entries into contests in attempts to
increase the chances of winning sweepstakes or prizes. Frequently, bots are used to
Script and Macro Viruses post spam in the comments sections of blogs. Fortunately, Web site owners can eas-
What are script and macro viruses? ily deploy software known as a CAPTCHA program (see Figure 9.3) to prevent such
Some viruses are hidden on Web sites in the bot activities.
form of scripts. A script is a series of com- CAPTCHA (Completely Automated Public Turing Test to Tell Computers and
mands—actually, a miniprogram—that is Humans Apart) programs generate distorted text and require that it be typed into a
executed without your knowledge. Scripts box. Because bots can’t yet be programmed to read distorted text, which most people
are often used to perform useful, legitimate usually can, the CAPTCHA program is used to verify that a human is performing what-
functions on Web sites such as collecting ever task is being tested. The program helps Web site owners defend against all types
name and address information from cus- of automated scams. If you want to try integrating a CAPTCHA program into your Web
tomers. However, some scripts are mali- site (to protect your e-mail address), go to recaptcha.net, which offers free CAPTCHA
cious. For example, say you receive an tools to help you protect your data.
e-mail encouraging you to visit a Web site
full of useful programs and information.
When you click a link to display a video on
the Web site you were directed to, a script
runs that infects your computer with a virus
without your knowledge
A macro virus is a virus that attaches
itself to a document (such as a Word or Excel
file) that uses macros. A macro is a short
series of commands that usually automates Figure 9.3
repetitive tasks. However, macro languages
CAPTCHA programs like this one verify that a human, not a bot
are now so sophisticated that viruses can be being used for malicious purposes, is performing the requested
written with them. The Melissa virus be- task.
came the first major macro virus to cause
problems worldwide.
The Melissa virus was also the first prac-
tical example of an e-mail virus. E-mail your files unusable. You then receive a mes-
viruses use the address book in the victim’s sage that asks you to send money to an ac-
e-mail system to distribute the virus. Any- count if you want to receive the program to
one opening an infected document triggered decrypt your files. The flaw with this type of
the virus, which infected other Word docu- virus, which keeps it from being widespread,
ments on the victim’s computer. Once trig- is that law enforcement officials can trace the
gered, the Melissa virus sent itself to the first payments to an account and may possibly be
50 people in the address book on the in- able to catch the perpetrators. Still, we see
fected computer. This helped ensure that these types of viruses from time to time.
Melissa became one of the most widely dis-
tributed viruses ever released. Virus Classifications
Encryption Viruses How else are viruses classified?
What are encryption viruses? When Viruses can also be classified by the methods
encryption viruses infect your computer, they take to avoid detection by antivirus
they run a program that searches for com- software:
mon types of data files (such as Microsoft • A polymorphic virus changes its own
Word and Excel files) and compresses them code (or periodically rewrites itself) to
using a complex encryption key that renders avoid detection. Most polymorphic

Computer Threats: Computer Viruses 413


BITS Computer Safeguard:
AND Virus Symptoms Antivirus Software
BYTES
and Software
If your computer displays any of the following symptoms, it may be infected with a Updates
virus:
Certain viruses merely present minor an-
1. Existing program icons or files suddenly disappear. (Viruses often delete specific noyances, such as randomly sending an am-
file types or programs.)
bulance graphic across the bottom of the
2. Changes appear in your browser. If you start your browser and it takes you to an screen, as is the case with the Red Cross
unusual home page (one you didn’t set) or it has new toolbars, then you may
virus. Other viruses can significantly slow
have a virus.
down a computer or network, or destroy
3. Odd messages, pop-ups, or images are displayed on the screen or strange
key files or the contents of entire hard
music or sounds play.
drives. The best defense against viruses is
4. Data files become corrupt. Although files become corrupt for many reasons, a
to install antivirus software. Symantec,
virus is one cause.
Kaspersky, AVG, and McAfee are among the
5. Programs don’t work properly. This could be caused by either a corrupted file or
companies that offer highly rated antivirus
a virus.
software packages.
6. Your system slows down or takes a long time to boot up.
Although you can buy stand-alone an-
If you think you have a virus, boot up your computer with an antivirus software CD tivirus software, antivirus protection is in-
in your DVD/CD drive. This allows you to run the antivirus software before potential cluded in comprehensive Internet security
viruses load on the computer. Are you looking for free antivirus software? Consider packages such as Norton Internet Security,
downloading AVG Anti-Virus Free Edition (free.avg.com) or Microsoft Security Essen- Kaspersky Internet Security, or McAfee Total
tials (microsoft.com/security_essentials). Protection. These software packages will
help protect you from other threats as well
as from computer viruses.
viruses infect a particular type of file
(.EXE files, for example).
• A multipartite virus is designed to Antivirus Software
infect multiple file types in an effort
to fool the antivirus software that is How often do I need to run antivirus
looking for it. software? Although antivirus software is
designed to detect suspicious activity on
• Stealth viruses temporarily erase their
your computer at all times, you should run
code from the files where they reside
an active virus scan on your entire system at
and then hide in the active memory of
least once a week. By doing so, all files on
the computer. This helps them avoid
your computer will be checked for unde-
detection if only the hard drive is being
tected viruses. Because these checks take
searched for viruses. Fortunately,
time, you can configure the software to run
current antivirus software scans mem-
them automatically when you aren’t using
ory as well as the hard drive.
your system—for example, late at night (see
Given the creativity of virus program- Figure 9.4). Alternatively, if you suspect a
mers, you can be sure we’ll see other types problem, you can launch a scan and have it
of viruses emerge in the future. In the next run immediately.
section, we discuss preventing virus How does antivirus software
infections. work? Most antivirus software looks
for virus signatures in files. A virus
signature is a portion of the virus code
ACTIVE that is unique to a particular computer
HELP-
Avoiding Computer
Viruses virus. Antivirus software scans files for
DESK
these signatures and thereby identifies
infected files and the type of virus that is
In this Active Helpdesk call, you’ll play the role of a
infecting them.
helpdesk staffer, fielding calls about different types of
The antivirus software scans files when
viruses and what users should do to protect their
they’re opened or executed. If it detects a
computer from them.
virus signature or suspicious activity (such
as the launch of an unknown macro), it

414 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
stops the execution of the file and virus and
notifies you that it has detected a virus. It Click to display Click to
also places the virus in a secure area on dialog box schedule a scan
your hard drive so that it won’t spread
infection to other files. This procedure is
known as quarantining. Usually the
antivirus software then gives you the
choice of deleting or repairing the
infected file. Unfortunately, antivirus
programs can’t always fix infected files to
make them usable again. You should
keep backup copies of critical files so Click to launch
scan immediately
that you can restore them in case a virus
damages them irreparably.
Most antivirus software will also at-
tempt to prevent infection by inoculating
key files on your computer. In
inoculation, the antivirus software
records key attributes about files on your
computer (such as file size and date created) programs from loading and will allow you Figure 9.4
and keeps these statistics in a safe place on to run the antivirus software directly from In Norton Internet Secu-
your hard drive. When scanning for viruses, your disk drive. If the software does detect rity, complete virus scans
can be set up to run auto-
the antivirus software compares the files to viruses, you may want to research them
matically. This computer
the attributes it previously recorded to help further to determine whether your antivirus will be scanned every
detect attempts by virus programs to modify software will eradicate them completely or Tuesday at 8 P.M.
your files. whether you will need to take additional
Does antivirus software always manual steps to eliminate the virus. Most
stop viruses? Antivirus software catches antivirus company Web sites, such as the
known viruses effectively. Unfortunately, Symantec site (symantec.com), contain
new viruses are written all the time. To com- archives of information on viruses and pro-
bat unknown viruses, modern antivirus pro- vide step-by-step solutions for removing
grams search for suspicious virus-like viruses.
activities as well as virus signatures. How-
ever, virus authors know how antivirus soft-
ware works. They take special measures to Click to check
for updates
disguise their virus code and hide the effects
of a virus until just the right moment. This
helps ensure that the virus spreads faster and
farther. Thus, your computer can be attacked
by a virus that your antivirus software
doesn’t recognize. To minimize this risk,
you should keep your antivirus software
up to date.
How do I make sure my antivirus
software is up to date? Most antivirus
programs have an automatic update
feature that downloads updates for virus
signature files every time you go online (see
Figure 9.5).
What should I do if I think my com-
puter is infected with a virus? Boot
up your computer using the antivirus instal-
lation disc. (Note: If you download your
antivirus software from the Internet, it is a
good idea to copy your antivirus software Figure 9.5
to a DVD in case you have problems in the Antivirus software, such as Norton Internet Security, provides for automatic updates
future.) This should prevent most virus to the software installed on the computer.

Computer Safeguard: Antivirus Software and Software Updates 415


a shared computer, such as one in a
computer lab at school, be sure you
don’t select any features that remember
your password or connect you auto-
matically. The next person who uses the
Best choices for secure computer might be able to connect to
communications the instant messaging service with your
screen name (or your Facebook ac-
count) and impersonate you.

Do not activate these


options Software Updates
Is there anything else I should do to
protect my system? Many viruses
exploit weaknesses in operating systems.
Malicious Web sites can be set up to attack
your computer by downloading harmful
software onto your computer. According to
Figure 9.6 research conducted by Google, this type of
When you use instant Are instant messenger programs attack, known as a drive-by download, is
messenger programs, safe from virus attacks? Virus attacks common and affects almost 1 in 1,000 Web
check all of the and other forms of malicious hacking can be pages. To combat these threats, make sure
preference screens for perpetrated via instant messenger (IM) pro- your antivirus software and your operating
appropriate settings. system are up to date and contain the latest
grams such as Google Talk, Skype, Facebook
Chat, and iChat. Even if you have antivirus security patches. You can update your
protection installed, people still could con- Windows operating system with an auto-
tact you for the purposes of trying to trick matic update utility called Windows Update.
you into revealing sensitive information. When you enable automatic updates, your
Therefore, you should try to hide your in- computer searches for updates on the
stant messaging activity from everyone ex- Microsoft Web site every time it connects to
cept people you know. To keep your IM the Internet. OS X has a similar utility for
sessions safe, follow these precautions: gathering updates.
Do updates only happen automati-
1. Allow contact only from users on your cally? Although many people decide to
Buddy or Friends List. This prevents receive updates automatically, there are
you from being annoyed by unknown several options you can choose from in
parties. On Facebook, you should re- Windows, as shown in Figure 9.7. The fol-
strict your profile information to be lowing options are noteworthy.
viewed only by friends and only accept
friend requests from people you know • Option 1: Install updates automatically.
and trust. On the settings screen for your Selecting this option will automatically
IM program (Figure 9.6), select Allow download and install updates at a time
only users on my Buddy List. And, of you have specified. We strongly recom-
course, don’t put anyone you don’t mend that you select this option.
know and trust on your buddy list. • Option 2: Download updates but let me
2. Never automatically accept transfers choose whether to install them.
of data. Although video IMs and file Although this option automatically
transfers are potentially useful for
swapping files over IM (see Figure 9.6),
they are a common way of transmitting SOUND Protecting Your
malicious files, which can then infect BYTE Computer
your computer with viruses. Enabling
auto-acceptance of data transfers is In this Sound Byte, you’ll learn how to use a variety of
never a good idea. tools to protect your computer, including antivirus soft-
3. Avoid using instant messaging pro- ware and Windows utilities.
grams on public computers. If you use

416 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
downloads updates, they are not in-
stalled until you instruct Windows to
install them. We don’t usually recom-
mend this option because you may Option 1
forget to install important updates.
• Option 3: Check for updates but let me Option 2
choose whether to download and in-
stall them. This is an appropriate choice
Option 3
if you have low bandwidth Internet ac-
cess. Because downloads over dial-up
can take a long time due to low band- Option 4
width, you need to control when down-
loads will occur so they don’t interrupt Option 5
your workflow.
• Option 4: Give me recommended up-
dates. This option ensures you receive
recommended (optional) updates as
well as critical (necessary) updates. Figure 9.7
• Option 5: Microsoft Update, This option black hats.) Regardless of the hackers’ opin- The Windows Update
ensures you receive updates for other ions, the laws in the United States and in screen makes it easy for
Microsoft products besides Windows many other countries consider any unautho- users to configure
rized access to computer systems a crime. Windows to update itself.
(such as Microsoft Office).
What about the teenage hackers >To enable automatic
In the next section, we explore another who are caught every so often? updates, click Start, select
major threat to your digital security— These amateur hackers are often referred to Control Panel, select
hackers. System and Security, click
as script kiddies. Script kiddies don’t create the Windows Update link,
the programs they use to hack into com- and then click the Change
puter systems; instead, they use tools cre- Settings link.
Computer Threats: ated by skilled hackers that enable unskilled
Hackers novices to wreak the same havoc as profes-
sional hackers.
Although there is a great deal of disagree- Fortunately, because the users of these
ment as to what a hacker actually is (espe- programs are amateurs, they’re usually not
cially among hackers themselves), a hacker proficient at covering their electronic tracks.
is most commonly defined as anyone who Therefore, it’s relatively easy for law en-
unlawfully breaks into a computer system— forcement officials to track them down and
either an individual computer or a network prosecute them. Script kiddies nevertheless
(see Figure 9.8). can cause a lot of disruption and damage to
Are there different kinds of hack- computers, networks, and Web sites.
ers? Some hackers are offended by being Why would a hacker be interested
labeled as criminals and therefore attempt to in breaking into my home computer?
classify different types of hackers. A hacker Some hackers just like to snoop. They enjoy
who breaks into systems just for the the challenge of breaking into systems and
challenge of it (and who doesn’t wish to seeing what information they can find. Other
steal or wreak havoc on the systems) may hackers are hobbyists seeking information
refer to him- or herself as a white-hat about a particular topic wherever they can
hacker. These individuals tout themselves find it. Because many people keep propri-
as experts who are performing a needed etary business information on their home
service for society by helping companies computers, hackers bent on industrial espi-
uncover the vulnerabilities in their systems. onage may break into home computers. For
White-hat hackers look down on those other hackers, hacking is a way to pass time.
hackers who use their knowledge to destroy
information or for illegal gain. A term for
these more villainous hackers is black-hat
What Hackers Steal
hacker. (The terms white hat and black hat are Could a hacker steal my credit card
references to old Western movies in which the number? If you perform financial transac-
heroes wore white hats and the outlaws wore tions online, such as banking or buying

Computer Threats: Hackers 417


networks (covered in
Chapter 7). A hacker might
sit in a coffee shop con-
nected to a wireless net-
work and run a packet
sniffer to capture data from
other patrons who are
using the wireless network.
This makes it easy for hack-
ers to intercept and read
sensitive information trans-
mitted without encryption,
such as credit card numbers
or the contents of e-mails.
What do hackers do
with the information
they “sniff”? Once a
hacker has your credit card
information, he or she can
either use it to purchase
items illegally or sell the
number to someone who
will. If a hacker steals the
login ID and password to
an account where you have
Figure 9.8 goods and services, then you probably do so your credit card information stored (such as
Although they do not using a credit (or debit) card. Credit card eBay or Amazon), he or she can also use
necessarily destroy and bank account information can thus your account to purchase items and have
civilization, hackers can
cause problems for reside on your hard drive and may be them shipped to him- or herself instead of
corporations and detectable by a hacker. Also, many sites to you. If hackers can gather enough infor-
individuals alike. require you to provide a login ID and mation in conjunction with your credit card
password to gain access. Even if this data is information, they may be able to commit
not stored on your computer, a hacker may identity theft. Identity theft is characterized
be able to capture it when you’re online by by someone using personal information
using a packet sniffer or a keylogger (a pro- about you (such as your name, address, or
gram that captures all keystrokes made on a Social Security number) to assume your
computer). identity for the purpose of defrauding
What’s a packet sniffer? Data trav- others.
els through the Internet in small pieces, each Although this sounds scary, you can eas-
called a packet. The packets are identified ily protect yourself from packet sniffing by
with an IP address, in part to help identify installing a firewall (which we discuss later
the computer to which they are being sent. in this chapter) and using data encryption
Once the packets reach their destination, on a wireless network (which was covered
they are reassembled into cohesive mes- in Chapter 7).
sages. A packet sniffer is a computer pro-
gram deployed by hackers that looks at (or
sniffs) each packet as it travels on the
Trojan Horses
Internet—not just those that are addressed Besides stealing information,
to a particular computer, but all packets. what other problems can hackers
Some packet sniffers are configured to cap- cause if they break into my
ture all the packets into memory, whereas computer? Hackers often use individu-
others capture only packets that contain spe- als’ computers as a staging area for mischief.
cific content (such as credit card numbers). To commit widespread computer attacks, for
Wireless networks can be particularly vul- example, hackers need to control many
nerable to this type of exploitation because computers at the same time. To this end,
many people do not enable encryption of hackers often use Trojan horses to install
data when they set up their wireless other programs on computers. A Trojan

418 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
horse is a program that appears to be Denial of Service Attacks
something useful or desirable (like a game
or a screen saver), but while it runs does What are denial-of-service attacks?
something malicious in the background In a denial-of-service (DoS) attack, legiti-
without your knowledge. The term Trojan mate users are denied access to a computer
horse derives from Greek mythology and system because a hacker is repeatedly
refers to the wooden horse that the Greeks making requests of that computer system
used to sneak into the city of Troy and through a computer he or she has taken over
conquer it. Therefore, computer as a zombie. A computer can handle only a
programs that contain a hidden (and usually certain number of requests for information at
dreadful) “surprise” are referred to as one time. When it is flooded with requests in
Trojan horses. a denial-of-service attack, it shuts down and
What damage can Trojan horses refuses to answer any requests for informa-
do? Often, the malicious activity perpe- tion, even if the requests are from a legitimate
trated by a Trojan horse program is the user. Thus, the computer is so busy respond-
installation of a backdoor program that ing to the bogus requests for information that
allows hackers to take almost complete con- authorized users can’t gain access.
trol of your computer without your knowl- Couldn’t a DoS attack be traced by
edge. Using a backdoor program, hackers to the computer that launched it?
can access and delete all the files on your Launching a DoS attack on a computer
computer, send e-mail, run programs, and system from a single computer is easy to
do just about anything else you can do trace. Therefore, most savvy hackers use a
with your computer. A computer that a distributed denial-of-service (DDoS)
hacker controls in this manner is referred to attack, which launches DoS attacks
as a zombie. Zombies are often used to from more than one zombie (sometimes
launch denial-of-service attacks on other thousands of zombies) at the same time.
computers. Figure 9.9 illustrates how a DDoS attack

Figure 9.9
Zombie computers are
Hacker launches DDoS by used to facilitate a
activating zombies (red lines) distributed denial-of-
service (DDoS) attack.

Hacker’s
computer

Academic Government
computer computer
(zombie) (zombie)

Home
computer
(zombie)

ISP
Corporate computer
computer (zombie)
(zombie)

Zombie computers attack


target system (blue lines)
Victim of DDoS

Computer Threats: Hackers 419


works. A hacker creates many zombies and How Hackers Gain Access
coordinates them so that they begin sending
bogus requests to the same computer at the How exactly does a hacker gain ac-
same time. Administrators of the victim cess to a computer? Hackers can gain
computer often have a great deal of diffi- access to computers directly or indirectly.
culty stopping the attack because it comes Direct access involves sitting down at a
from so many computers. Often the attacks computer and installing hacking software. It
are coordinated automatically by botnets. is unlikely that such an attack would occur
A botnet is a large group of software in your home. However, to deter unautho-
programs (called robots or bots) that runs rized use, you may want to lock the room
autonomously on zombie computers. Some that your computer is in or remove key com-
botnets have been known to span 1.5 million ponents (such as the power cord) when
computers. strangers such as repair personnel are in
DDoS attacks are a serious problem. In your house and may be unobserved for peri-
April 2009, the International Federation of ods of time. You might also set up your com-
the Phonographic Industry (IFPI) and Mo- puter so that it requires a password for a
tion Picture Association of America (MPAA) user to gain access to your desktop.
Web sites were subjected to DDoS attacks in The most likely method a hacker will use
protest of the conviction of the owners of to access a computer is to enter indirectly
The Pirate Bay (a notorious file-sharing site) through its Internet connection. When con-
on charges of assisting in copyright infringe- nected to the Internet, your computer is po-
ment. In August 2009, social networking tentially open to attack by hackers. Many
sites including Twitter and Facebook were people forget that their Internet connection
subjected to a DDoS attack that was appar- is a two-way street. Not only can you access
ently aimed at a blogger. Twitter and Face- the Internet but also people on the Internet
book users experienced problems accessing can access your computer.
the sites for hours during the attack. Because Think of the computer as a house. Com-
many Web sites receive revenue from users, mon sense tells you to lock your doors and
either directly (such as via subscriptions to windows to deter theft when you aren’t
online games) or indirectly (such as when home. Hooking your computer up to the In-
Web surfers click on advertisements), DDoS ternet is like leaving the front door to your
attacks can be financially distressing for the house wide open. Anyone passing by can
owners of the affected Web sites. access your computer and poke around for
valuables. Your computer obviously doesn’t
BITS have doors and windows like a house, but it
Prevention of Identity Theft . . . does have logical ports.
AND
BYTES Don’t Overlook Photocopiers! What are logical ports? Logical
ports are virtual—that is, not physical—
We are constantly bombarded with identity theft warnings regarding suspicious communications gateways or paths that
e-mail, phishing sites, and telephone scams. Many people are unaware that photo- allow a computer to organize requests for
copiers, too, present a risk of identity theft. This is because most photocopiers manu- information (such as Web page downloads
factured today contain hard drives, just as computers do. Documents are scanned, or e-mail routing) from other networks or
stored on the hard drive, and then printed by the copier. So, unless the copier has computers. Unlike physical ports (USB,
been specially configured to have the hard drive overwritten to destroy data or to use FireWire, and so on), you can’t see or touch
encryption, copies of your tax return may be lurking on the public copier at your local a logical port; it is part of a computer’s inter-
library or copy shop that you used before you mailed your return to the Internal nal organization.
Revenue Service. A clever hacker could retrieve a wealth of potential information off Logical ports are numbered and assigned
just one public copy machine. to specific services. For instance, logical port
So what should you do to protect yourself? Ask the local copy shop or public 80 is designated for hypertext transfer proto-
library, or the IT department at your office, about the security measures it has set up col (HTTP), the main communications pro-
on its copiers before you use them to copy sensitive documents. If you are buying a tocol (or standard) for the World Wide Web.
copier for your business, investigate security options that are available to protect your Thus, all requests for information from your
employees. For small copying jobs (such as your tax return), consider buying an all- browser to the Web flow through logical
in-one device (combining a printer, copier, scanner, and fax machine) for your port 80. E-mail messages sent by simple mail
home office because you can more easily keep that machine protected from wily transfer protocol (SMTP), the protocol used
hackers. for sending e-mail on the Internet, are
routed through logical port 25. Open logical

420 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
ports, like open windows in a home, invite probably sufficient, you should consider in-
intruders, as illustrated in Figure 9.10. stalling both for maximum protection.
Unless you take precautions to restrict What software firewalls are
access to your logical ports, other people on there? Most current operating sys-
the Internet may be able to access your tems include reliable firewalls. Many
computer through them. security suites
Fortunately, you can thwart most hacking such as Norton
problems by installing a firewall. Internet Security,
McAfee Internet FTP (Port 21) YOUR DNS (Port 53)
Security, and COMPUTER
Restricting Access to ZoneAlarm Inter-
Your Digital Assets net Security Suite
also include fire-
Keeping hackers at bay is often just a matter wall software. HTTP (Port 80)
of keeping them out. This can be achieved Although the fire- E-mail (Port 25) Telnet (Port 23)
either by preventing them from accessing walls that come
your computer (usually through your Inter- with Windows 7
net connection), by protecting your digital and OS X will pro-
information in such a way that it can’t be tect your computer,
accessed (with passwords, for example), or firewalls included
by hiding your activities from prying eyes. in security suites
In the next section, we explore strategies for often come with
protecting access to your digital assets and additional features such as WEB SITE REQUEST
keeping your Internet surfing activities from monitoring systems that alert
being seen by the wrong people. you if your computer is under attack. Figure 9.10
If you are using a security suite (say, for Open logical ports are an
virus protection and parental controls) that invitation to hackers.
Firewalls includes a firewall, you should disable the
A firewall is a program or hardware device firewall that came with your operating sys-
designed to protect computers from hackers. tem. Two firewalls running at the same time
A firewall specifically designed for home can conflict with each other and can cause
networks is called a personal firewall. your computer to slow down or freeze up.
Personal firewalls are made to be easy to What are hardware firewalls? You
install. By using a personal firewall, you can can also buy and configure hardware fire-
close open logical ports to invaders and wall devices. Many routers sold for home
potentially make your computer invisible to networks include firewall protection. Just
other computers on the Internet. like software firewalls, the setup for hard-
Firewalls are named after a housing ware firewalls is designed for novices, and
construction feature. When houses were first the default configuration on most routers
being packed densely into cities, they were keeps unused logical ports closed. Docu-
attached to each other with common walls. mentation accompanying routers can assist
Fire was a huge hazard because wood burns users with more experience in adjusting the
readily. An entire neighborhood could be settings to allow access to specific ports if
lost in a single fire. Thus, builders started needed.
building common walls of nonflammable or
slow-burning material to stop, or at least
slow, the spread of fire. These came to be
known as firewalls. ACTIVE
HELP-
Understanding
DESK Firewalls
Types of Firewalls
In this Active Helpdesk call, you’ll play the role of a
What kinds of firewalls are there? As helpdesk staffer, fielding calls about how hackers can
noted earlier, firewalls can be configured attack networks and what harm they can cause, as
using either software or hardware devices. well as what a firewall does to keep a computer safe
Although installing either a software or a from hackers.
hardware firewall on your home network is

Restricting Access to Your Digital Assets 421


DIG
DEEPER
How Firewalls Work

Firewalls are designed to restrict access to a network and its comput- get to the correct address. This is similar to the way addresses work on a
ers. Firewalls protect you in two major ways: by blocking access to conventional letter. A unique street address (such as 123 Main St., Any-
logical ports and by keeping your computer’s network address secure. where, CA 99999) is placed on the envelope, and the postal service routes
To block access to logical ports, firewalls examine data packets that it to its correct destination. Without such addressing, data packets, like let-
your computer sends and receives. Data packets contain information ters, would not reach their intended recipients.
such as the address of the sending and receiving computers and the log- IP addresses are assigned in a procedure known as dynamic
ical port the packet will use. Firewalls can be configured so that they fil- addressing when users log on to their Internet service provider (ISP), as
ter out packets sent to specific logical ports. This process is referred to shown in Figure 9.11). The dynamic host configuration protocol (DHCP)
as packet filtering. server assigns IP addresses out of a pool of available IP addresses
For example, file transfer protocol (FTP) programs are a typical way in licensed to the ISP in this manner:
which hackers access a computer. Hackers can disguise their requests 1. When you connect to your ISP, your computer requests an IP address.
for information as legitimate packets that appear to be FTP requests 2. The ISP’s DHCP server consults its list of available IP addresses
authorized by your computer. If a firewall is configured to ignore all and selects one.
incoming packets that request access to port 21 (the port designated for 3. The selected IP address is communi-
FTP traffic), no FTP requests will get through to your computer. This cated to your computer. The address
ABC Company.com
process is referred to as logical port blocking. remains in force for as long as you
If port 21 were a window at your home, you Step 4 are connected to the ISP.
would probably lock it so 4. Once on the Internet, your Web
that a burglar couldn’t get browser requests access to ABC
in. If you needed port 21 for Company’s Web site.
a legitimate purpose, you 5. The ABC Company server consults
Step 6
could instruct the firewall to Step 5 an IP address listing and determines
allow access to that port for that the IP address of your computer
a specified period of time or is assigned to your ISP. It then for-
by a certain user. wards the requested information to
Your Step 1 the ISP’s router.
For the Internet to share computer
information seamlessly, data Step 2 6. The ISP knows to whom it assigned
packets must have a way STEP 3 the IP address and, therefore, routes
IP Address the requested information to your
of getting to their correct ISP
128.15.9.21 ISP’s pool of computer.
locations. Therefore, every DHCP server
assigned IP addresses
computer connected to the Because hackers use IP addresses to
Internet has a unique address Figure 9.11 find victims and come back to their com-
called an Internet Protocol How dynamic addressing works. puters for more mischief, frequently
address (or IP address). As switching IP addresses helps make users
noted earlier, data packets contain the IP address of the computer to which less vulnerable to attacks. Periodically switching off your modem and
they are being sent. Routing servers on the Internet make sure the packets rebooting it will cause a different IP address to be assigned dynamically

Knowing Your Computer Is Secure your system is probably not vulnerable to


attack. Figure 9.13 shows the results screen
How can I tell if my computer is at from a ShieldsUP port probe test, which
risk? For peace of mind (and to ensure checks which logical ports in your computer
that your firewall setup was successful), you are vulnerable. This test was run on a
can visit several Web sites that offer free computer connected to the Internet with no
services that test your computer’s vulnera- firewall installed. Ports reported as closed
bility. One popular site is Gibson Research or in stealth mode are safe from attack.
(grc.com). The company’s ShieldsUP and Ports reported as open (such as port 1025)
LeakTest programs are free, easy to run, and are subject to exploitation by hackers.
can pinpoint security vulnerabilities in a Installation of a hardware or software
system that is connected to the Internet. If firewall should close any open ports.
you get a clean report from these programs,

422 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Step 1 Step 2

Step 4 Step 3
Router IP address:
111.22.3.44

ABC Company
Your computer’s internal Web server
IP address: 192.11.4.123

to your modem by your ISP. This tends to


Figure 9.12
enhance your security.
However, because many broadband users Network address
translation in action.
leave their modems on for long periods of time
(consecutive days or weeks), their IP addresses tend to Hacker
change less frequently than those of dial-up users. This is similar to hav-
ing an IP address assigned by static addressing. In static addressing,
your IP address is always the same and is assigned by your ISP. This
process is often used by businesses who are hosting a Web site. When a external IP address (in this example, 111.22.3.44). The internal IP
broadband user has a static address, the user is more vulnerable to hack- address of your computer (assigned by NAT) is not revealed to
ers because the hackers have a more permanent IP address with which to computers outside your network.
locate the computer. It also makes it easier for hackers to make repeated 3. The ABC Company Web server processes the request and sends the
visits to a computer. data back to the router’s external IP address (111.22.3.44). This is
To combat the problems associated with static addressing, firewalls the IP address the ISP assigned to your router, and it can be detected
use a process called network address translation (NAT) to assign inter- by other users on the Internet.
nal IP addresses on a network. These internal IP addresses are only shared 4. The router then passes the requested data to the IP address of the
with devices that are part of the network, so the addresses are safe from computer that requested it (in this example, 192.11.4.123).
hackers. Figure 9.12 shows how NAT works. Your computer’s internal IP The router’s IP address is assigned by your ISP. Only the router’s exter-
address is assigned to your computer by the router. This IP address is used nal IP address can be detected by other users on the Internet. For hackers
only on the internal network and therefore cannot be detected by other to access your computer, they must know your computer’s internal IP
Internet users. Here’s how it works: address. With a NAT-capable router/firewall installed on your network,
1. Your computer’s Web browser requests access to the ABC Company’s hackers are unable to access the internal IP address assigned to your
Web site. This request travels through the router, which is configured computer, so your computer is safe.
as a firewall. You can use NAT in your home by purchasing a hardware firewall with
2. The router forwards the browser request to the ABC Company Web NAT capabilities. As noted earlier, many routers sold for home use are also
server and directs that server to send the data back to the router’s configured as firewalls, and many feature NAT as well.

Figure 9.13
ShieldsUP common ports
test results.

Ports safe from attack

Port subject to attack

Restricting Access to Your Digital Assets 423


Figure 9.14 COMMON LOGICAL PORTS (names, contact information, and meet-
ing notes) that might be valuable to a
Port Number Protocol Using the Port business competitor. Unfortunately,
Bluesnarfing is relatively easy (and
21 FTP (file transfer protocol) control
cheap) because a lot of Bluesnarfing
23 Telnet (unencrypted text communications) software is available on the Internet. A
twist on this attack is Car Whisperer
25 SMTP (simple mail transfer protocol)
software, which is specifically designed
53 DNS (domain name system) to eavesdrop on conversations taking
place in your car when you are using a
80 HTTP (hypertext transfer protocol)
hands-free device (such as a cell phone
443 HTTPS [HTTP protocol with transport layer security (TLS) encryption] or GPS).
• Although much more difficult and
expensive to execute, Bluebugging
presents more serious dangers. The
What if I don’t get a clean report process involves a hacker actually
from the testing program? If the test- taking control of a Bluetooth-enabled
ing program detects potential vulnerabilities device. Once a hacker gains control of
and you don’t have a firewall, you should the device, he or she can make phone
install one as soon as possible. If the firewall calls, establish Internet connections,
is already configured and common ports read phonebook entries, set call for-
(such as those shown in Figure 9.14) are warding, or send, receive, and read
identified as being vulnerable, consult your short message service (SMS) messages.
firewall documentation for instructions on Bluebugging is a major risk in
how to close or restrict access to those ports. Europe because Bluetooth and SMS are
wildly popular there, but the rise of
Bluetooth usage in the United States is
making it a risk here as well. Many
Preventing Bluetooth Attacks Europeans use their phones to make
What are the security vulnerabilities micropayments (small purchases from
of Bluetooth devices? Bluetooth is a merchants that eventually appear on
transmission medium for exchanging data their cell phone bill) by a process known
wirelessly over short distances. Most smart- as reverse SMS. If a hacker Bluebugs
phones are Bluetooth enabled. Although your phone, he or she could potentially
progress is being made, Bluetooth hardware send payments to fake accounts he or
and software still are riddled with security she controls, using reverse SMS.
holes, especially on smartphones. If you
have a Bluetooth-enabled device, you are How can I protect myself from
susceptible to two severe types of mischief: Bluetooth attacks? Most devices with
bluesnarfing and bluebugging. Bluetooth capability give you the option of
making your device invisible to unautho-
• Bluesnarfing involves exploiting a flaw rized Bluetooth devices. This does not affect
in the Bluetooth access software for the your ability to use two Bluetooth devices
purpose of accessing a Bluetooth device you own together (such as a wireless head-
and stealing the information contained set paired with a phone). When you pair
on it. Think how much valuable infor- your headset with your phone, the headset
mation is contained on your smartphone (which has a unique serial number) becomes
an authorized Bluetooth device for your
phone. Moreover, by making your device
SOUND Installing a Personal invisible to unauthorized devices (such as
BYTE Firewall hackers’ headsets), you prevent hackers
from connecting to your equipment (your
Firewalls provide excellent protection against hackers phone) because their headsets are not
on a home network. In this Sound Byte, you’ll learn authorized devices for your phone. When
how to install and configure software firewalls to vulnerabilities are discovered, cell phone
protect your computer. manufacturers issue software patches.
Antivirus software is also available for

424 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
mobile devices, so you may wish to pur- • Ideally, it should be a combination of
chase this for your phone. You must ensure several words with strategically placed
that you update the software in your mobile uppercase characters.
devices just as you do your computer’s OS • Your password should not be easily
and antivirus software. For more informa- associated with you (such as your birth
tion on securing your Bluetooth devices, go date, the name of your pet, or your
to the Bluetooth technology Web site nickname).
(bluetomorrow.com). • Use a different password for each
system or Web site you need to access.
This prevents access to other accounts
Password Protection and Password
you maintain if one of your passwords
Management is discovered.
Passwords, used in conjunction with login • Never tell anyone your password or
IDs, are the major way we restrict access to write it down in a place where others
computers, networks, and online accounts. might see it.
You no doubt have many passwords that • Change your password on a regular
you need to remember to access your digital basis (say, every month) and change it
life. However, creating strong passwords— sooner if you think someone may
ones that are difficult for hackers to guess— know it.
is an essential piece of security that
individuals sometimes overlook. Password Figure 9.15 shows some possible pass-
cracking programs have become more words and explains why they are strong or
sophisticated lately. In fact, some commonly weak candidates.
available programs, such as John the Ripper, How can I check the strength of
can test more than 1 million password my passwords? You can use online
combinations per second! Creating a secure password strength testers, such as The
password is therefore more important Password Meter (passwordmeter.com) or
than ever. Microsoft’s test (microsoft.com/protect/
Many people use extremely weak pass- yourself/password/checker.mspx), to
words. The Imperva Application Defense
Center (a computer security research organi-
zation) conducted a review of 32 million
passwords that were used at the Web site BITS
rockyou.com. More than 345,000 people AND Connecting to Wireless Networks on
were using “12345,” “123456,” or BYTES the Road? Beware of “Evil Twins”!
“123456789” as their password. And almost
62,000 people were using “password”! When you are at the airport or coffee shop, you may need to connect to a wireless
Passwords such as these are extremely easy network and check your e-mail. You switch on your notebook, and the wireless net-
for hackers to crack. work adapter finds a network called “free wifi” or “airport wireless.” You connect,
enter your credit card information to pay for your airtime, and start merrily surfing
Creating Passwords away. Three days later, your credit card company calls asking about the $2,400 big-
What constitutes a strong password? screen TV you just bought at the local electronics store and the $3,200 of power tools
Strong passwords are difficult for someone charged at the home improvement store. You didn’t make either of these purchases;
to guess. They should not contain easily you probably fell prey to an “evil twin” wireless hotspot.
deduced components related to your life Hackers know the areas where people are likely to seek access to wireless net-
such as parts of your name, your pet’s name, works. They will often set up their own wireless networks in these areas with sound-
your street address, or your telephone alike names to lure unsuspecting Web surfers and get them to enter credit card
number. To create strong passwords, follow information to gain access. Other times these “evil twins” offer free Internet access,
the basic guidelines shown here: and the hackers monitor traffic looking for sensitive information they can use.
• Your password should contain at least So how can you protect yourself? Check with authorized personnel at places
14 characters and include numbers, where you will be connecting to hotspots to determine the names of the legitimate
symbols, and upper- and lowercase hotspots. If you run across “free” access to a hotspot that isn’t provided by a legiti-
letters. mate merchant, then you are better off not connecting at all because you can’t be
sure your information won’t be used against you or that malicious files won’t be
• Your password should not be a single
downloaded to your computer.
word or any word found in the
dictionary.

Restricting Access to Your Digital Assets 425


Figure 9.15 STRONG AND WEAK PASSWORD CANDIDATES

Strong Password Reason


L8t2meGaNDalf351 Uses letters and numbers to come up with memorable phrase “Late to me” and adds it to a character name from
Lord of the Rings plus a random number.
IwaLR8384GdY First initials of first line of Green Day song I Walk a Lonely Road plus a random number and an abbreviation for
Green Day.

P1zzA244WaterShiPDowN Easily remembered word with mix of alphanumeric characters and upper- and lowercase letters, your locker
number at your gym, plus the title of a book that you like (with upper- and lowercase letters).

S0da&ICB3N&J3RRY Mix of numbers, symbols, and letters. Stands for soda and ice cream and the names of famous ice cream makers
with the number 3 instead of the letter E.

Weak Password Reason


Jsmith Combination of first initial and last name.

4smithkids Even though this has alphanumeric combination, it is too descriptive of a family.

Brown5512 Last name and last four digits of phone number are easily decoded.

123MainSt A street address is an easily decoded password.

evaluate your passwords (see Figure 9.16). a challenge, you should use password-
The Password Meter provides guidelines for management tools, as described in the next
good passwords and shows you how inte- section, to make the process easier to handle.
grating various elements (such as symbols) If you have trouble thinking of secure pass-
affects the strength score for your password. words, there are many password generators
You should make sure you change your available for free, such as Perfect Passwords
passwords on a regular basis (such as (grc.com/passwords.htm) and the Bytes
monthly or quarterly). Your school or your Interactive Password Generator
employer probably requires you to change (goodpassword.com).
your password regularly. This is also a good Can I use a password to restrict
idea for your personal passwords. You access to my computer? Windows
Figure 9.16 should also not use the same password for has built-in password protection for files as
The Password Meter every account that you have. Because well as the entire desktop. If your computer
objectively evaluates your remembering constantly changing strong is set up for multiple users with password
passwords. passwords for numerous accounts can be protection, the Windows login screen re-
quires you to enter a password to gain ac-
cess to the desktop. You are also asked to
enter a password hint to remind you in case
Enter password you forget your password. The computer
can be set to default back to the Welcome
screen after it is idle for a set period of time.
This forces a user to reenter a password to
regain access to the computer. If someone
attempts to log on to your computer without
your password, that person won’t be able to
gain access. It is an especially good idea to
use passwords on notebook computers or
any computer that may be unattended for
periods of time. Figure 9.17 shows the
Control Panel screen used to set up a pass-
Password strength
word on a user account.
There are two types of users in Windows:
administrators and standard users. Setting
up a password on a standard user account

426 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
prevents other standard users from
being able to access that user’s files.
However, users with administrator Enter strong password
privileges can still see your files if you
are a standard user. So be aware that
your files may not be safe from all
prying eyes!

Managing Your Passwords


How can I remember all of my
Create password hint
complex passwords? Good secu-
rity practices suggest that you have
different passwords for different Web
sites that you access and that you
change your passwords frequently.
The problem with well-constructed
passwords is that they can be hard to
remember. Fortunately, password-manage- example, to set up the password manager in Figure 9.17
ment tools are now widely available. This Firefox, from the Tools menu, select Options, Windows provides
takes the worry out of forgetting passwords and then click the Security icon (the closed additional security for
because the password-management soft- padlock) shown in Figure 9.18. In the Pass- your files by locking
unauthorized users out of
ware does the remembering for you. words section, check Remember passwords your account.
Where can I obtain password- for sites to have Firefox remember pass-
>Click Start, click Control
management software? Most current words when you log onto Web sites. Check Panel, click User
Internet security suites and Web browsers Use a master password, which causes a Accounts and Family
make it easy to keep track of passwords by dialog box to appear, and enter a well- Safety, click
providing password-management tools. For designed, secure password. The next time UserAccounts, and then
click Create a Password
for your account.

a b

Click to set or change


master password

Check these
Click and enter
master password

Click to display Saved


Passwords dialog box

Figure 9.18
(a) The security tab in the Firefox browser options screen provides access to password-management tools. (b) The
Firefox Saved Passwords dialog box displays all sites for which login information is saved.
>From the Tools menu, select Options. In the Options dialog box, click the Show Passwords button.

Restricting Access to Your Digital Assets 427


you go to a Web site that requires a login, What tools can I use to protect
Firefox will display a dialog box prompting myself when using public comput-
you to have Firefox remember the login ers? The current versions of Google
name and password for this site. Then, Chrome, Firefox, and Internet Explorer in-
when you return to the site and select a clude privacy tools that help you surf the In-
login option, enter the master password and ternet anonymously. Google Chrome’s
the Firefox Password Manager will fill in the Incognito feature allows you to open a spe-
login and password information for you. cial version of the Google browser window.
You also can see a list of sites maintained When surfing in this window, records of
by the Firefox Password Manager by Web sites you visit and files you download
clicking the Show Passwords button, which do not appear in the Web browser’s history
displays the Saved Passwords dialog box files. Furthermore, any temporary files that
(see Figure 9.18). Passwords for each site were generated in that browsing session are
are displayed after you click the Show deleted when you exit the Incognito win-
Passwords button and enter the master dow. The InPrivate Browsing feature of In-
password. ternet Explorer and the Private Browsing
Even though you only need to remember feature of Firefox offer similar security
the master password, features.
you still need to make Portable privacy devices, such as the
sure that it is a secure IronKey (ironkey.com) shown in
password (according Figure 9.19, provide an even
to the rules we dis- higher level of surfing
cussed earlier) and that privacy. Simply plug
you change it on a regular the device into an
basis. Password managers are available USB port on
useful on the machine that you use on the machine on which
a regular basis. However, if you you will be working.
Figure 9.19
need to access your accounts All sensitive Internet
from another computer (such as Portable privacy devices help to protect files, such as cookies,
your privacy when you work on comput-
one at school), you will still need ers away from your home or office. Internet history, and
to know the individual pass- browser caches, will
words for each site you wish to be stored on the pri-
access. vacy device, not on the computer you are
So start using secure passwords and let using. Privacy devices such as these often
your browser (on your main computer) come preloaded with software designed to
relieve you of the problem of trying to shield your IP address from prying eyes,
remember them all. making it difficult (if not impossible) for
hackers to tell where you are surfing on the
Internet. These privacy devices also have
Anonymous Web Surfing: Hiding from password-management tools that store all of
your login information and encrypt it so it
Prying Eyes will be safe if your privacy device falls into
Should I be concerned about surfing someone else’s hands.
the Internet on shared or public Another free practical solution is to take
computers? If you use shared computers the Linux OS with you on a flash drive and
in public places such as libraries, coffee avoid using the public computer’s operating
shops, or college student unions, you should system. The interfaces of many Linux builds,
be concerned about a subsequent user of a such as Ubuntu (see Figure 9.20), look almost
computer spying on your surfing habits. exactly like Windows and are easy to use.
You never know what nefarious tools have There are several advantages to using a
been installed by hackers on a public com- Linux-based operating system on a public
puter. When you browse the Internet, traces computer. First, your risk of picking up
of your activity are left behind on that com- viruses and other malicious programs is sig-
puter, often as temporary files. A wily nificantly reduced because booting a public
hacker can glean sensitive information long computer from a flash drive completely
after you have finished your latte and your eliminates any interaction with the public
surfing session. computer’s operating system. This, in turn,

428 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
that reads a unique personal
characteristic such as a fingerprint
or the iris pattern in your eye
and converts its pattern to a
digital code. When you use the
device, your pattern is read and
compared to the one stored on the
computer. Only users having an
exact fingerprint or iris pattern
match are allowed to access the
computer.
Because no two people have the
same biometric characteristics (fin-
gerprints and iris patterns are
unique), these devices provide a
high level of security. They also
eliminate the human error that can
occur in password protection. You
might forget your password, but
you won’t forget to bring your fin-
Figure 9.20 gerprint to the computer! Some
notebooks feature built-in fingerprint
Ubuntu is a version of Linux that has a Windows-like
interface and familiar browser tools like Firefox. readers, and companies like SecuGen
produce computer mice and keyboards (see
significantly reduces the chance that your Figure 9.21) that include built-in fingerprint
flash drive will become infected by any readers. Other biometric devices, which
malware running on the public computer. include voice authentication and face
Next, virus and hacking attacks against pattern–recognition systems, are now
Linux are far less likely than attacks against widely offered in notebook computers.
Windows. Because Windows has more than Make sure to utilize some (or all) of these
90 percent of the operating system market, methods to keep your activities from prying
people who write malware tend to target eyes and to restrict access to your digital
Windows systems. Finally, when you run information.
software from your own storage medium
(flash drive), you avoid reading and writing
to the hard disk of the public computer. This Managing Online Figure 9.21
(a) The SecuGen
significantly enhances your privacy because Annoyances OptiMouse Plus is a two-
you don’t leave traces of your activity button mouse with a scroll
Surfing the Web, sending and receiving
behind. wheel that includes a
e-mail, and chatting online have become a
Pendrivelinux.com (pendrivelinux.com) digital fingerprint reader.
common part of most of our lives. Unfortu- (b) The SecuGen
is an excellent resource that offers many dif-
nately, the Web has become fertile ground Keyboard Plus features a
ferent versions of Linux for download and
fingerprint reader.
includes step-by-step instructions on how
to install them on your flash drive.
If you are a Mac user, there is
an option for you, too! The gOS
a b
version of Linux provides a close
approximation of OS X, so you
can feel right at home.

Biometric Authentication
Devices
Besides passwords, how else can I Fingerprint
reader Fingerprint
restrict the use of my computer? A reader
biometric authentication device is a device

Managing Online Annoyances 429


for people who want to advertise their prod- originating site. For example, your account
ucts, track our Web browsing behaviors, balance may pop up on your bank’s Web
or even con people into revealing personal site. Fortunately, because Web browsers
information. In this section, we’ll look at such as Firefox, Safari, and Internet Explorer
ways in which you can manage, if not avoid, have pop-up blockers built into their
these and other online headaches. browsers, the occurrence of annoying pop-
ups has been greatly reduced. You can ac-
cess the pop-up blocker settings in your
browser (see Figure 9.22) and add Web sites
Malware, Adware, and Spyware for which you will allow pop-ups. When-
What is malware? Malware is software ever a pop-up is blocked, the browser dis-
that has a malicious intent (hence the prefix plays an information bar at the top of the
mal). There are browser window or
three primary plays a sound to
forms of malware: alert you. If you feel
adware, spyware, the pop-up is legiti-
and viruses (which mate, you can then
we have already choose to accept it.
discussed). Adware Add sites here What is spy-
and spyware are ware? Spyware is
not physically de- an unwanted piggy-
structive like Will permit back program that
viruses and worms, pop-ups from usually downloads
which can destroy these sites with other software
data. Known collec- you want to install
tively as grayware, from the Internet. It
most are intrusive, Level of blocking
runs in the back-
annoying, or objec- ground of your sys-
tionable online pro- tem. Without your
grams that are knowledge, spy-
downloaded to ware transmits in-
your computer formation about
when you install or you, such as your
use other online Internet surfing
Figure 9.22
content such as a habits, to the owner
freeware program, Internet Explorer’s Pop-up Blocker Settings dialog box. of the program so
game, or utility. >Pop-up Blocker is found in the Tools menu on the Internet that the information
What is ad- Explorer toolbar. can be used for mar-
ware? Adware is keting purposes.
software that displays sponsored advertise- Many spyware programs use tracking cook-
ments in a section of your browser window ies (small text files stored on your computer)
or as a pop-up ad box. It is considered a to collect information, whereas others are
legitimate (though sometimes annoying) disguised as benign programs that are really
means of generating revenue for those malicious programs (such as Trojan horses).
developers who do not charge for their One type of spyware program known as a
software or information. Pop-up windows keystroke logger monitors keystrokes with
(small boxes that open up automatically on the intent of stealing passwords, login IDs,
your screen) have been referred to as the or credit card information.
billboards of the Internet because they Can I prevent spyware? Many
appear and display advertisements or other Internet security suites now include antispy-
promotional information when you install ware software. However, you can also
freeware programs or access certain Web obtain stand-alone spyware removal
sites. At one point, these pop-up windows software and run it on your computer to
were so common that they were incredibly delete unwanted spyware. Because there are
irritating and annoying. so many variants of spyware, your Internet
Some pop-ups, however, are legitimate security software may not detect all types
and increase the functionality of the that attempt to install themselves on your

430 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
ETHICS
IN IT Big Brother Is Watching . . . But Should He Be Allowed to Do So?

Think you aren’t being closely watched by your employer? Think again! A responsibility (and a legal one as well, depending on the jurisdiction) not
survey of employers by the American Management Association and the to place monitoring devices in sensitive locations such as bathrooms and
ePolicy Institute revealed that, of the employers surveyed: dressing areas. However, in many states, the employer does not need to
• 73 percent monitored e-mail messages inform the employees in advance that they are being monitored. Consci-
• 66 percent monitored Web surfing entious employers include monitoring disclosures in published employee
• 48 percent monitored activities using video surveillance policies to avoid confusion and conflict.
• 45 percent monitored keystrokes and keyboard time Employers use a variety of software programs to monitor employee
• 43 percent monitored computer files in some other fashion computer usage. Certain software packages keep track of every Web site
There is a high probability that you are being monitored while you you visit and the duration of your stay. Checking the baseball scores might
work and when you access the Internet via your employer’s Internet con- take only three seconds and go unnoticed, but spending two hours updat-
nection (see Figure 9.23). ing your fantasy football team may be flagged. Keystroke loggers were
The two most frequently cited reasons for employee monitoring are originally used to monitor performance for people with input-intensive
to prevent theft and to measure productivity. Monitoring for theft isn’t jobs like clerks and secretaries. Now these programs have the potential to
new, because monitoring cameras have been around for years, and be used to invade your privacy because they can record everything you
productivity monitoring has been a consistent process for assembly line type, even that nasty e-mail about the boss that you decided to delete!
workers for decades. However, the Internet has led to a new type of Computer software can also be used to monitor the contents of your
productivity drain that is of concern to employers: Cyberloafing, or hard drive, so you don’t want to collect 4,823 illegal MP3 files on your
cyberslacking, means doing anything with a computer, while you are work computer. Some programs even track how long your computer is
being paid to do your job, that is not an approved function of your job. idle, which can give your manager a good idea of whether you were
Examples of cyberloafing activities are playing games, reading personal working or taking a three-hour lunch.
e-mail, checking sports scores, watching videos, and buying personal- Since your employer might not tell you that your computer use is
use products on e-commerce sites. Estimates of business productivity being monitored, you should assume that anything you do on your com-
losses due to cyberloafing top $50 billion annually. pany-provided computer is subject to scrutiny. If you need to do personal
Like most other Americans, you probably feel you have a right to pri- work on your lunch hour or other breaks, you may be able to use your per-
vacy in the workplace. Unfortunately, the laws in the United States don’t sonal notebook computer to avoid the monitoring. Check with your
support a worker’s right to privacy. Laws such as the 1986 Electronic employer to be sure you can connect personal computers to the corporate
Communications Privacy Act (ECPA), which prohibits unauthorized moni- network or Internet connection. Note that courts in some jurisdictions
toring of electronic communications, have been interpreted by the courts have ruled that e-mails sent from third-party systems, such as Yahoo! and
in favor of employers. The bottom line is that employers who pay for Gmail, are subject to monitoring if they are sent from employer-provided
equipment and software have the legal right to monitor their usage. computer systems. Instant messaging is also subject to monitoring.
But just because an action is legal doesn’t mean it is ethical. It is dif- People who monitor employees have a duty to protect their right to
ficult to argue that an employer doesn’t have the right to take measures privacy and not to disclose any information that they may inadvertently
to prevent theft and detect low productivity. The ethical issue here is see during the course of monitoring. The acceptable computer use poli-
whether or not the employees are made aware of monitoring policies. An cies at most companies include guidelines for network administrators
ethical employer should treat employees with respect and dignity and and other people who have high levels of access to sensitive information.
inform employees of any monitoring. Employers have an ethical When monitoring employees’ work habits, management must ensure
that compliance with the policies is tested periodically. Periodic reviews
of procedures and compliance help ensure that established company
policies are working as designed. An ethical employer strives to prevent
misuse of personal data and accidental data loss. However, you can’t al-
ways be certain that everyone who monitors you will behave ethically.
Therefore, you need to think very carefully about exactly what personal
tasks you are willing to risk engaging in on company computer systems.
So, do your employers have an ethical right to monitor your activi-
ties? Certainly, they have a right to ensure they are getting a fair day’s
work from you, just as you have an ethical obligation to provide a fair
effort for a fair wage. However, employers should also be willing to
respect the privacy rights of their employees and treat them as profes-
sionals, unless there is some indication of wrongdoing. Because employ-
ers may have a legal right to monitor you in the workplace, you should
work under the assumption that everything you do on your work com-
Figure 9.23 puter is subject to scrutiny and behave accordingly. Do your online shop-
Big Brother might really be watching you at work. ping at home!

Managing Online Annoyances 431


anything online, open an online account, or
participate in a social network such as
Facebook, your e-mail address eventually
will appear on one of the lists that
spammers get.
One way to avoid spam in your primary
account is to create a free Web-based
e-mail address that you
use only when you fill
out forms or purchase
items on the Web. For
example, both Windows
Live Mail and Yahoo!
a
allow you to set up free
e-mail accounts. If your
free Web-based e-mail
account is saturated with
spam, then you can
abandon that account with
little inconvenience. It’s
much less convenient to
Figure 9.24 abandon your primary
After performing a routine e-mail address.
scan of a computer, Another way to avoid
(a) Ad-Aware and
spam is to filter it. A spam
(b) Spybot each return a
log of problems found on b
filter is an option you can
the system. select in your e-mail
account that places known
or suspected spam messages into a folder
computer. Therefore, it is a good idea to
other than your inbox. Most Web-based
install one or two additional stand-alone
e-mail services, such as Office Live Mail and
antispyware programs on your computer.
Yahoo!, offer spam filters (see Figure 9.25).
Because new spyware is created all the
Files perceived to be spam are segregated
time, you should update and run your
in a special folder (often named “Spam”
spyware removal software regularly.
or “Junk Mail”). Microsoft Outlook also
Windows comes with a program called
features a spam filter. Third-party
Windows Defender, which scans your
programs that provide some control over
system for spyware and other potentially
spam include SPAMfighter and Cactus
unwanted software. Malwarebytes Anti-
Spam Filter, both of which can be obtained
Malware, Ad-Aware, and Spybot–Search &
at download.com.
Destroy (all available from download.com)
How do spam filters work? Spam
are other programs that are easy to install
filters and filtering software can catch as
and update. Figure 9.24 shows an example
much as 95 percent of spam by checking
of Ad-Aware and Spybot in action. They
incoming e-mail subject headers and
detect unwanted programs and allow you
senders’ addresses against databases of
to delete the offending software easily.
known spam. Spam filters also check your
e-mail for frequently used spam patterns
and keywords (such as “for free” and “over
Spam 21”). E-mail that the filter identifies as spam
How can I best avoid spam? does not go into your inbox but rather to a
Companies that send out spam—unwanted folder set up for spam. Spam filters aren’t
or junk e-mail—find your e-mail address perfect, and you should check the spam
either from a list they purchase or with soft- folder before deleting its contents because
ware that looks for e-mail addresses on the legitimate e-mail might end up there by
Internet. (Unsolicited instant messages are mistake. Most programs provide you with a
also a form of spam, called spim.) If you’ve tool to reclassify e-mails that have been
used your e-mail address to purchase misidentified as spam.

432 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Click to reclassify
messages that
aren’t spam

Spam folder

Figure 9.25
How else can I prevent spam? information to determine the traffic flowing In Yahoo! Mail, messages
There are several additional ways you can through their Web site and the effectiveness identified as spam are
directed into a folder
prevent spam. of their marketing strategy and placement
called “Spam” for review
1. Before registering on a Web site, read its on Web sites. By tracking such information, and deletion.
privacy policy to see how it uses your cookies enable companies to identify differ-
e-mail address. Don’t give the site per- ent users’ preferences.
mission to pass on your e-mail address Can companies get my personal
to third parties. information when I visit their
sites? Cookies do not go through your
2. Don’t reply to spam to remove yourself hard drive in search of personal information
from the spam list. By replying, you are such as passwords or financial data. The
confirming that your e-mail address is only personal information a cookie obtains
active. Instead of stopping spam, you is the information you supply when you fill
may receive more. out forms online.
3. Subscribe to an e-mail forwarding Do privacy risks exist with cook-
service such as Emailias (emailias.com) ies? Some sites sell the personal informa-
or Sneakemail.com (sneakemail.com). tion their cookies collect to Web advertisers
These services screen your e-mail mes- who are building huge databases of con-
sages, forwarding only those messages sumer preferences and habits, collecting per-
you designate as being okay to accept. sonal and business information such as
phone numbers, credit reports, and the like.
The main concern is that advertisers will use
this information indiscriminately, thus infil-
Cookies trating your privacy. And you may feel your
What are cookies? Cookies (also privacy is being violated by tracking cookies
known as tracking cookies) are small text files that monitor where you go on a Web site.
that some Web sites automatically store on Should I delete cookies from my
your computer’s hard drive when you visit hard drive? Because cookies pose no se-
them. When you log on to a Web site that curity threat (it is virtually impossible to
uses cookies, a cookie file assigns an ID hide a virus or malicious software program
number to your computer. The unique ID is in a cookie), take up little room on your hard
intended to make your return visit to a Web drive, and offer you small conveniences on
site more efficient and better geared to your return visits to Web sites, there is no great
interests. The next time you log on to that reason to delete them. Deleting your cookie
site, the site marks your visit and keeps files could actually cause you the inconven-
track of it in its database. ience of reentering data you have already
What do Web sites do with cookie entered into Web site forms. However, if
information? Cookies can provide Web you’re uncomfortable with the accessibility
sites with information about your browsing of your personal information, you can peri-
habits, such as the ads you’ve opened, the odically delete cookies or configure your
products you’ve looked at, and the time and browser to block certain types of cookies, as
duration of your visits. Companies use this shown in Figure 9.26. Software such as

Managing Online Annoyances 433


life. Con artists and scammers take advan-
tage of people’s tendency to reveal informa-
tion freely to compromise their privacy and
commit theft.
In this section, we discuss ways to keep
your data safe from damage (either acciden-
tal or intentional) and to keep unscrupulous
individuals from tricking you into revealing
sensitive information.

Protecting Your Personal Information


If a complete stranger walked up to you on
the street and asked you for your address
and phone number, would you give it to
them? Of course you wouldn’t! But many
people are much less careful when it comes
to sharing sensitive information online. And
often people inadvertently share informa-
tion that they really only intended to share
with their friends. With cybercrimes like
identify theft rampant, you need to take
steps to protect your personal information.
Figure 9.26 What information should I never
Tools are available, either Cookie Pal (kburra.com) also can help you share on Web sites? Your Social
through your browser monitor cookies. Security number, phone number, and street
(Internet Explorer is address are three key pieces of information
shown here) or as that identity thieves need to steal an
separate applications, to Protecting
distinguish between
identity. This information should never
cookies you want to keep Yourself . . . from be shared in a public area on any Web site.
and cookies you don’t Many sites, such as Facebook, ask for
want on your system. Yourself! other potentially sensitive information when
>On the Internet Explorer People are often too trusting or just plain you sign up. This information might include
menu toolbar, click Tools, careless when it comes to protecting private your real name, e-mail address, birth date,
and then click Internet information about themselves or their zip code, and gender. After you register,
Options. The cookie
settings are on the
digital data. When was the last time you cre- social networking sites then encourage you
Privacy tab. ated a copy of your digital data (such as the to add profile details such as your school,
thousands of photographs you have stored your employer, your personal interests
on your hard drive)? The hard drive in your and hobbies, and who your friends are.
computer is likely to fail at some point, Although it is fine to share this information
which may render all the data on it useless. with people you know, you need to be
What strategy do you have in place to pro- careful that your information isn’t visible to
tect your data from damage? everyone.
If you have a Facebook or Twitter ac- How can I tell who can see my
count, you are probably constantly revealing information in a social network?
information about your likes and dislikes, Social networking sites, like Facebook, make
such as what movie you saw this weekend privacy settings available in their account
or the presents you received for your birth- menus. If you have never changed your
day. You might even be revealing informa- privacy settings in Facebook, you are proba-
tion about where you live. Have you ever bly sharing information more widely than
filled out an online form to enter a contest? you should. Since Facebook is designed to
Have you ever applied for a customer loy- foster social interaction, the default privacy
alty card at your local supermarket or elec- settings make it easy to search for people.
tronics store? Think about how much Someone with nefarious intentions could
information you voluntarily give up all the glean quite a bit of information from your
time in the course of running your digital Facebook profile, including your contact

434 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
information, which they might use to a
trick you into revealing other infor-
mation that would lead to them steal-
ing your identity.
Information used in
How can I protect my information identity theft should be
on Facebook? To begin, you need to kept very private. This
change your privacy settings from some of should be changed!
the default options. On the upper right-
hand side of the Facebook page, click Ac-
count and then click Privacy Settings. On
the Privacy Settings page, select Profile In-
formation to display the screen shown in
Figure 9.27a. It’s a good idea to set most of
the options on this screen to Only Friends b
because, presumably, you are only friending
people you trust. Restrict contact settings
The other screen you need to address is to Only Me or Only Friends.
Contact Information Privacy Settings (see
Figure 9.27b), which you can also reach
from the Privacy Settings page. Restricting
this information only to friends or to your-
self is imperative. You don’t want scammers
contacting you via phone and trying to trick
you into revealing sensitive information. So
use discretion and keep your information as
private as possible. Figure 9.27
your computer is located. You wouldn’t
You should review the
want a fire or a flood destroying the back- (a) Profile Information and
ups along with the original data. Removable (b) Contact Information
Backing Up Your Data storage media, such as external hard drives, privacy settings in
How might I damage the data on my DVDs, and flash drives have been popular Facebook to ensure you
computer? The data on your computer choices for backing up files because they aren’t sharing too much
information.
faces three major threats: unauthorized hold a lot of data and can be transported
access, tampering, and destruction. As noted easily.
earlier, a hacker can gain access to your What types of files do I need to
computer and steal or alter your data. How- back up? Two types of files need
ever, a more likely scenario is that you will backups—program files and data files.
lose your data unintentionally. You may ac- A program file is used to install software
cidentally delete files. You may drop your and usually comes on CDs or DVDs or is
notebook on the ground, causing the hard downloaded from the Web. If any programs
drive to break, resulting in complete data came preinstalled in your computer, then
loss. A virus from an e-mail attachment you you may have received a CD or DVD that
opened may destroy your original file. Your contains the original program. As long as
house or dorm may catch fire and destroy you have the original media in a safe place,
your computer. Because many of these you shouldn’t need to back up these files. If
possibilities are beyond your control, you you have downloaded a program file from
should have a strategy for backing up your the Internet, however, you should make a
files, which is especially important if you copy of the program installation files on a
are running a small business. (The backup removable storage device as a backup. If
strategy for small businesses is quite similar you didn’t receive discs for installed
to the procedures recommended for programs with your computer, then see the
individuals.) next section for suggested strategies for
What exactly is meant by “backing backing up your entire computer.
up data”? Backups are copies of files that A data file is a file you have created or
you can use to replace the originals if they purchased. Data files include such files as
are lost or damaged. To be truly secure, research papers, spreadsheets, music files,
backups must be stored away from where movies, contact lists, address books, e-mail

Protecting Yourself . . . from Yourself! 435


archives, and your Favorites list from your backup of your entire system on a weekly
browser. basis.
Are there different ways to back To make backups easier, store all your
up my files? Even with modest use, your data files in one folder on your hard drive.
files change. To back them up, you can per- For example, in Windows and most other
form an incremental backup. operating systems, on your hard drive you
An incremental backup (or partial will find a folder called Documents. You can
backup) involves backing up only files that create subfolders (such as History Home-
have changed or been created since the last work, Music Files, and so on) within the
backup was performed. Many of the key Documents folder. If you store all your data
documents that you want to protect change under one main folder on your hard drive,
only periodically: monthly banking state- you simply configure your backup software
ments, yearly tax returns, to back up that folder and
weekly employee payment all subfolders beneath it.
records, or daily work docu-
ments. Using backup soft-
ware that has an option for
“How often should
I back up my
files?
Where do the back-
ups of my files
reside? This location is
incremental backups will
save a tremendous amount
of time because backing up
files that haven’t changed is redundant.
” a decision that you need to
make. You have three main
choices:

An image backup (or system backup) 1. Online sites. In essence, online storage
means that all system, application, and data is like using the Internet as an alterna-
files are backed up, not just the files that tive to a portable storage device (such
changed. While incremental backups are as an external hard drive or flash
more efficient, an image backup ensures you drive). The beauty of online storage is
capture changes to application files, such as that your data is available anywhere
automatic software updates, that an incre- you are; you do not need to be at your
mental backup might not capture. The idea computer or have to lug around your
of imaging is to make an exact copy of the external hard drive to access the infor-
setup of your computer so that in the event mation. More important, because the
of a total hard drive failure, you could copy information is stored online, it is in a
the image to a new hard drive and have secure, remote location, so data is much
your computer configured exactly the way it less vulnerable to all the potential dis-
was before the crash. This is a quick way to asters (such as a flood) that could harm
get up and running again. data stored in your computer or exter-
How often should I back up my nal hard drive. If you are taking advan-
files? You should back up your data files tage of one of these free online storage
frequently. How frequently depends on how services, selectivity is the key because
much work you cannot afford to lose. You of cost. Although you might have hun-
should always back up data files when you dreds of gigabytes of data sitting on
make changes to them, especially if those your computer, perhaps you only need
changes involve hours of work. It may not to store several gigabytes online so that
seem important to back up your history they are always available.
term paper file when you finish it, but do A convenient free storage option for
you really want to do all that work again if Windows users is Windows Live
your computer crashes before you have a SkyDrive (skydrive.live.com), which
chance to turn in your paper? provides 25 GB of storage space. For
Because your program and operating sys- non-Windows users or those needing
tem files don’t change as often as your data even more storage space, check out
files, you can perform image backups on a ADrive (adrive.com) and its 50 GB of
less frequent basis. Most backup software free storage! Fee-based plans at ADrive
can be configured to do backups automati- give users access to tools that allow
cally so you don’t forget to perform them. them to schedule automatic backups of
You might consider scheduling backups of files and folders. However, image
your data files on a daily basis and an image backups probably won’t fit within the

436 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
storage limits offered by free providers. sharing files. Both NAS devices and
For a fee, companies such as Iron home servers are easy to configure and
Mountain (backup.ironmountain.com) are very useful if you have multiple
and IBackup (ibackup.com) provide computers within a single household
larger storage capacity. that need backing up.
If you store a backup of your entire
system on the Internet, then you won’t How do I actually perform a file
need to buy an additional hard drive backup? Windows 7 includes the Backup
for backups. This method also takes the and Restore utility, which provides a quick
worry out of finding a safe place to and easy way to schedule file backups,
keep your backups because they’re restore files from backups, or perform image
always stored in an area far away from (system) backups. You can access Backup and
your computer (on the backup com- Restore from the Control Panel. Before start-
pany’s server). However, the yearly fees ing this utility, make sure your external hard
can be expensive, so a cheaper option drive or NAS device is connected to your
may be to buy an external hard drive. computer or network and is powered on.
When you start the Backup and Restore
2. Local drives. External hard drives are
utility for the first time, no backups will
popular options for performing back- Figure 9.28
have ever been configured. Select the Set up
ups of data files and for complete
backup option to launch the Set up backup The Windows 7 Backup
image backups. Affordable external and Restore utility.
dialog box (see Figure 9.28a) and display a
drives are available with capacities of (a) Select your backup
list of available backup devices. Select a de-
3 TB or more. These drives are usually destination. (b) Choose
vice and click Next to proceed. On the next locations to back up.
connected to a single computer and
screen, you have the option to let Windows (c) Review your scheduled
often come with their own backup soft-
choose what to back up or to choose for backups, restore files,
ware (although you could still use the and start wizards for
backup software included with your system image and repair
operating system). Although conven- disc creation.
ient and inexpensive, using external
hard drives for backups still presents a

the dilemma of keeping the hard drive


in a safe location. You need to keep the
hard drive connected to your computer
to perform scheduled backups, but for
ultimate safety the hard drive should be
stored in a location separate from the
computer in case of catastrophic events,
such as a fire. Therefore, using an exter-
nal hard drive for backups is best done
in conjunction with an online backup b
strategy for added safety.
3. Network-attached storage devices and
home servers. Manufacturers such as
HP, Seagate, and Buffalo Technology
now make network-attached storage
(NAS) devices and servers designed for
home networks. The NAS devices are
essentially large hard drives that are
connected to a network of computers
instead of one computer, and they can
be used to back up multiple computers c
simultaneously. Home servers are not
really servers like those found in
client/server networks. Home servers
act as high-capacity NAS devices for
automatically backing up data and

Protecting Yourself . . . from Yourself! 437


yourself what you want to back up. If you administrators to determine how often
select the Let me choose option, the screen they’re backed up and how you would go
shown in Figure 9.28b displays. You can about requesting that files be restored from
then click the appropriate check boxes to se- the backup media if they’re damaged or
lect the libraries you wish to back up. Click deleted. But don’t rely on these network
Next to proceed. On the following screen, backups to bail you out if your data files are
you can review your settings and set up a lost or damaged. It may take days for the
schedule for the backups. When you click network administrators to get around to
the Save settings and exit button, you are re- restoring your files. It is better to keep back-
turned to the Back up or restore your files ups of your data files yourself (especially
screen (see Figure 9.28c), which now shows homework and project files) so that you can
the scheduled backup. You can also choose immediately restore them. Buy a large-ca-
to restore backed-up files you have backed pacity flash drive and carry it with you!
up from this screen.
From the Back up or restore your files
screen, you also have two other options. If Social Engineering: Fooling the
you click the Create a system image link,
you will be walked through a series of steps
Unwary
to configure an image backup of your sys- What is social engineering? Social
tem. The Create a system repair disc link engineering is any technique that uses
helps you create a DVD social skills to generate
repair disc that can be used human interaction that
to boot your computer in
case of a serious Windows
error. This disc is also used

Should I back up
files on my
school’s
entices individuals to
reveal sensitive informa-
tion. Social engineering
when you need to restore often doesn’t involve the
network?
your computer from an
image backup, so it is a
good idea to create the
repair disc before you
” use of a computer or
face-to-face interaction.
For example, telephone
scams are a common form of social
begin using your computer heavily. engineering because it is often easier to
For Mac OS X users, backups are very manipulate someone when you don’t have
easy to configure. The Time Machine feature to look at them.
(in Mac OS X Leopard and subsequent ver- How does social engineering
sions) detects when an external hard drive is work? Most social engineering schemes
connected to the computer or a NAS device use a pretext to lure their victims. Pretexting
is connected to your network. You are then involves creating a scenario that sounds le-
asked if you want this to be your backup gitimate enough that someone will trust
drive. If you answer yes, all of your files (in- you. For example, you might receive a
cluding operating system files) are automat- phone call during which the caller says he is
ically backed up to the external drive or from the bank and that someone tried to use
NAS device. You even have the option to go your account without authorization. The
back in time and see what your computer caller then tells you he needs to confirm a
looked like on a specific date. This is very few personal details such as your birth date,
handy for recovering a file that you wish Social Security number, bank account num-
you hadn’t deleted. ber, and whatever other information he can
No matter what backup strategy you get out of you. The information he obtains
choose, be sure to perform them on a can then be used to empty your bank
regular basis because nearly everyone has account or commit some other form of
need to access backup files at one time or fraud. Often pretexting is used to gain ac-
another. cess to corporate computer networks. People
Should I back up my files that are will sometimes call random extensions in a
stored on my school’s network? large business, claiming to be from technical
Most likely, if you’re allowed to store files support. Eventually, the caller will find
on your school’s network, these files someone who has a problem and is happy
are backed up on a regular basis. You that someone is willing to help. The scam
should check with your school’s network artist will then elicit information such as

438 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
TRENDS Computers in Society: Identity Theft—Is There More Than One
IN IT of You Out There?
You’ve no doubt heard of identity theft. A thief steals your name, address, write bad checks and not pay the credit card bills, which will ruin your
Social Security number, bank account and credit card information and credit rating.
runs up debts in your name. This leaves you holding the bag, and you’re Even worse, the identity thieves may counterfeit debit cards or
hounded by creditors collecting on the fraudulent debts. It sounds horri- checks for your legitimate accounts and empty them of funds. They
ble—and it is. In fact, one of the authors of this textbook had his identity might even take out a mortgage in your name and then disappear with
stolen and spent about 50 hours filing police reports, talking to credit the proceeds, leaving you with the debt.
agencies, closing bogus accounts, and convincing companies that the Although foolproof protection methods don’t exist, there are precau-
$25,000 of debt run up on six phony credit card accounts was done by tions that will help you minimize your risk. You should never reveal your
an identity thief. Many victims of identity theft spend months (or even password or your PIN code to anyone or place it in an easy-to-find loca-
years) trying to repair their credit and eliminate fraudulent debts. Worse tion. Also, never reveal personal information unless you’re sure that a le-
yet, if an identity thief uses your identity to obtain medical services at a gitimate reason exists for a business to know the information, and you
hospital, you may be denied coverage at a later date because the thief’s can confirm you’re actually dealing with a legitimate representative
treatment has exceeded the limit of covered services on your policy. (don’t fall for phishing schemes). If someone calls or e-mails asking you
Stories of identity thieves—such as the New York man accused of for personal information, decline and call the company with which you
stealing more than 30,000 identities—abound in the media and should opened your account.
serve to make the public wary. However, many media pundits would Obviously, you should create secure passwords for your online
have you believe that the only way your identity can be stolen is by a accounts. When shopping online, be wary of unfamiliar merchants that
computer. This is simply not true. The Federal Trade Commission you can’t contact through a mailing address or phone number, or busi-
(ftc.gov) has identified other methods thieves use to obtain others’ per- nesses whose prices are too good to be true. These can be attempts to
sonal information. These include (1) stealing purses and wallets, in which collect your personal information for use in fraudulent schemes.
people often keep unnecessary valuable personal information such as If you have been the victim of identity theft, most states now allow
their ATM PIN codes; (2) stealing mail or looking through trash for bank you to freeze your credit history so that no new accounts can be opened
statements and credit card bills, which provide valuable personal infor- until you lift the credit freeze. Even if you live in a state where you can’t
mation; and (3) posing as bank or credit card company representatives freeze your account, you can still place an extended fraud alert on your
and tricking people into revealing sensitive information over the phone. credit history for seven years, which also warns merchants that they
Obviously, you’re at risk from online attacks, too, such as phishing. should check with you (at your home address or phone number) before
Once identity thieves obtain your personal information, they can use it in opening an account in your name.
many different ways. Identity thieves often request a change of address Using common sense and keeping personal information in the hands
for your credit card bill or bank statement. By the time you realize that of as few people as possible are the best defenses against identity theft.
you aren’t receiving your statements, the thieves have rung up bogus For additional tips on preventing identity theft or for procedures to follow
charges on your account or emptied your bank account. The thieves can if you are a victim, check out the Identity Theft Resource Center
open new credit card and bank accounts in your name. They then will (idtheftcenter.org).

logins and passwords from the victim as scammer has created. Once the e-mail recipi-
part of the process for “solving the prob- ent confirms his or her personal informa-
lem.” The most common form of pretexting tion, the scammers capture it and can begin
in cyberspace is phishing. using it.
Is pharming a type of phishing
Phishing and Pharming scam? Pharming is much more insidious
How are phishing schemes con- than phishing. Phishing requires a positive
ducted? Phishing (pronounced “fish- action by the person being scammed, such
ing”) lures Internet users to reveal personal as going to a Web site mentioned in an
information such as credit card numbers, e-mail and typing in your bank account
Social Security numbers, or other sensitive information. Pharming is when malicious
information that could lead to identity theft. code is planted on your computer that alters
The scammers send e-mail messages that your browser’s ability to find Web
look like they are from a legitimate business addresses. Users are directed to bogus
such as an online bank. The e-mail states Web sites even when they enter the correct
that the recipient needs to update or confirm address of the real Web site or follow a
his or her account information. When the bookmark that they previously had estab-
recipient clicks the provided link, he or she lished for the Web site. So instead of ending
goes to a Web site. The site looks like a legit- up at your bank’s Web site when you type in
imate site but is really a fraudulent copy the its address, you end up at a fake Web site

Protecting Yourself . . . from Yourself! 439


that looks like your bank’s site but is ex- Managing Computer
pressly set up for the purpose of gathering SOUND
BYTE Security with
information.
Windows Tools
How can I avoid being caught by
phishing and pharming scams? You In this Sound Byte, you’ll take animated tours that
should never reply directly to any e-mail illustrate many of the hardware concepts introduced in
asking you for personal information. Never this chapter. Along the way, you’ll learn about the
click on a link in an e-mail to go to a Web machine cycle of the CPU, the movement of data
site. Instead, type the Web site address in the between RAM and the CPU, and the hierarchy of the
browser. Check with the company asking for different types of memory in computer systems.
the information and only give the informa-
tion if you are certain it is needed.
Also, never give personal information shop online. Although it sounds impossible,
over the Internet unless you know the site is credit card providers such as Citibank are
secure. Look for the closed padlock, https, or offering services such as “Virtual Account
a certification seal such as VeriSign to help Numbers” for their customers. Before pur-
reassure you that the site is secure. The latest chasing a product online, you visit an online
versions of Firefox, Chrome, and Internet site, where you are assigned a new virtual
Explorer have phishing filters built in, so account number each time you visit. This
each time you access a Web site, the phish- number looks like a regular credit card
ing filter checks for the site’s legitimacy and number and is tied to your real credit card
warns you of possible Web forgeries. Finally, account. However, the virtual account
make sure you have Internet security soft- number can be used only once. That means
ware installed on your computer and that it that if the number is stolen, it’s no good to
is constantly being updated. Most Internet thieves. They can’t use the virtual account
security packages can detect and prevent number, because you’ve already used it.
pharming attacks. The major Internet secu-
rity packages—for example, McAfee and Hoaxes
Norton (see Figure 9.29)—also offer phishing- What is a hoax? A hoax is an attempt to
Figure 9.29 protection tools. When you have the Norton make someone believe something that is
Toolbar displayed in your browser, you are untrue. Hoaxes target a large audience and
Not sure whether you are
on the Amazon Web site constantly informed about the legitimacy of are generally perpetrated as practical jokes,
or a cleverly disguised the site you are visiting. instruments of social change (which poke
phishing site? Norton Site Another way to protect yourself is never fun at an established norm in an effort to
Safety reassures you that to use your credit card number when you change it), or merely ways to waste people’s
all is well. valuable time. Although there are hoax Web
sites such as Pacific Northwest Tree Octopus
(zapatopi.net/treeoctopus), most cyberspace
hoaxes are perpetrated by e-mail.
Why do people concoct e-mail
hoaxes? As opposed to garnering finan-
cial rewards (like in a phishing fraud), the
motives of e-mail hoax creators can be more
complex. Many people start an e-mail hoax
just for the challenge of seeing if their “brain-
child” can be spread globally. Other hoaxes
start as innocent practical jokes between
friends that take on lives of their own via the
fast communication available on the Internet.
Many hoaxes become so well known that
they are accepted by society as true events
even though they are false. Once this hap-
pens to a hoax, it becomes known as an
urban legend. An example is the phony story
about the man who woke up in a bathtub full
of ice water and found he had had his kidney
stolen. Hoaxes may be compared to acts of

440 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
real-world vandalism like graffiti. Graffiti Environmental Factors
artists “make their mark” on the world, phys-
Why is the environment critical to
ically; hoaxers may consider they are making
the operation of my computer equip-
a similar mark when a bogus e-mail they
ment? Computers are delicate devices and
have created becomes widespread.
can be damaged by the adverse effects of
Sometimes hoaxes are based on misinfor-
abuse or a poor environment. Sudden move-
mation or are a way to vent frustration. An e-
ments (such as a fall) can damage your note-
mail hoax that reappears every time there is a
book computer or mobile device’s internal
spike in gasoline prices is the Gas Boycott
components. You should make sure that your
(Gas War) hoax. To boost the scheme’s credi-
computer sits on a flat, level surface, and, if it
bility, the e-mail touts it as having been in-
is a notebook, carry it in a padded case to pro-
vented by reputable businesspeople. The
tect it. If you do drop your computer, have it
e-mail explains how boycotting certain gaso-
professionally tested by a computer repair fa-
line companies will drive the price of gaso-
cility to check for any hidden damage.
line down and urges recipients of the e-mail
Electronic components do not like
to join the fight. The originator of this hoax
excessive heat or excessive cold. Unfortu-
was probably frustrated by high gas prices
nately, computers generate a lot of heat, which
and, armed with a poor understanding of
is why they have fans to cool their internal
economics, distributed this brainstorm. Un-
components. Make sure that you place your
fortunately, this tactic can have no effect on
desktop computer where the fan’s input vents
gasoline prices because it only shifts demand
(usually found on the rear of the system unit)
for gasoline from certain oil companies to
are unblocked so that air can flow inside. Chill
other sources. Because it does not reduce the
mats that contain cooling fans and sit under-
overall demand for gasoline, the price of gas
neath notebook computers are useful acces-
will not decline. Did you receive this e-mail
sories for dissipating heat. And don’t leave
and think it sounded like a plausible idea?
computing devices in a car during especially
How many people did you forward it to?
hot or cold weather because components can
How can I tell if an e-mail is a
be damaged by extreme temperatures. Natu-
hoax? Sometimes it is difficult to separate
rally, a fan drawing air into a computer also
fact from fiction. Many hoax e-mails are well
draws in dust and other particles, which can
written and crafted in such a way that they
wreak havoc on your system. Therefore, keep
sound very real. Before using the Forward
the room in which your computer is located as
button and sending an e-mail to all your
clean as possible. Even in a clean room, the
friends, check it out at one of the many
fan ducts can become packed with dust, so
Web sites that keep track of and expose
vacuum it periodically to keep a clear airflow
e-mail hoaxes. Check sites such as Snopes
into your computer. Finally, because food Figure 9.30
(snopes.com), Hoax-Slayer (hoax-slayer.com,
crumbs and liquid can damage keyboards and Sites like Hoax-Slayer
shown in Figure 9.30), or TruthOrFiction.com
other computer components, consume food help you research
(truthorfiction.com). These sites are search- potential hoaxes.
and beverages away from your computer.
able, so you can enter a few keywords from
an e-mail you suspect may be a hoax and
quickly find similar e-mails and explanations
of whether they are true or false. Checking
out e-mails before forwarding them on to
friends, family, and co-workers will save
other people’s time and help end the spread
of these time wasters.

Protecting Your
Physical Computing
Assets
Your computer isn’t useful to you if it is dam-
aged. Therefore, it’s essential to select and en-
sure a safe environment for it. This includes
protecting it from environmental factors,
power surges, power outages, and theft.

Protecting Your Physical Computing Assets 441


devices plugged into the surge protector.
Metal-oxide varistors (MOVs) After a major surge, the surge
bleed off excess current
protector will no longer
function and must be
replaced.
Over time, the MOVs lose
their ability to bleed off excess
current, which is why you should re-
place your surge protectors every two to
three years. Buy a surge protector that in-
Fuse blows during cludes indicator lights. Indicator lights illu-
major surges minate when the surge protector is no
longer functioning properly. (Don’t be
fooled by old surge protectors—although
Figure 9.31
they can still function as multiple-outlet
Anatomy of a surge
power strips, they deliver power to your
protector. Power Surges equipment without protecting it.) A power
What is a power surge? Power surges surge could ruin your computer and other
occur when electrical current is supplied in devices if you don’t protect them. At $20 to
excess of normal voltage (120 volts in the $40, a quality surge protector is an excellent
United States). Old or faulty wiring, investment.
downed power lines, malfunctions at elec- Besides my computer, what other
tric company substations, and lightning devices need to be connected to a
strikes can all cause power surges. A surge surge protector? All electronic devices
protector is a device that protects your com- in the home that have solid state compo-
puter against power surges (see Figure nents, such as TVs, stereos,
9.31). To use a surge protector, you simply printers, and phones, should be
plug your electrical devices connected to a surge protector.
into the outlets of the surge Printers and other computer
protector, which in turn peripherals all require
plugs into the wall. protection. However, it
How do surge pro- can be inconvenient to
tectors work? Surge use individual surge
protectors contain two protectors on every-
components that are used thing. A more practical
to protect the equipment method is to install a
that is connected to them. whole-house surge pro-
Metal-oxide varistors tector (see Figure 9.32).
(MOVs) bleed off excess Whole-house surge pro-
current during minor tectors function like
surges and feed it to the other surge protectors,
ground wire, where it but they protect all
harmlessly dissipates. electrical devices in the
The MOVs can do this Surge protector
house. Typically, you
while still allowing will need an electrician
normal current to pass to install a whole-house
through the devices surge protector, which
plugged into the surge Figure 9.32 will cost $200 to $300
protector. Because the A whole-house surge protector usually is (installed).
ground wire is critical installed at the breaker panel or near the electric Is my equipment
meter.
to this process, it is im- 100 percent safe
portant to plug the when plugged into a
surge protector into a grounded (typically, surge protector? Surge protectors won’t
three-prong) power outlet. necessarily guard against all surges. Light-
During major surges that overwhelm the ning strikes can generate such high voltages
MOVs, a fuse inside the surge protector that they can overwhelm a surge protector.
blows, which stops the flow of current to all As tedious as it sounds, unplugging

442 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
computers and peripherals during an When you leave your notebook, you use a
electrical storm is the only way to achieve small device called a key fob activator or
absolute protection. punch in a code to activate the alarm. If
How can I prevent my computers your notebook is moved while the alarm
from losing power during a power is activated, it emits a wailing 100-decibel
outage? Computers can develop sound. The fact that the alarm is visible
software glitches caused by a loss of acts as an additional theft deterrent, just
power if not shut down properly. Mission- like a “Beware of Dog” sign in a
critical computers such as Web front yard.
servers often are
protected by an Locks and
uninterruptible Surrounds
power supply How can I
(UPS), as shown in lock up a
Figure 9.33, which is a notebook
device that contains computer?
surge protection Chaining a note-
equipment and a large book to your work
battery. When power is surface can be
interrupted (such as another effective way
during a blackout), the to prevent theft. As
UPS continues to send Figure 9.33 shown in Figure 9.35, a
power to the attached A UPS device should not be mistaken for a fat special locking mecha-
computer from its bat- surge protector! nism is attached to the
tery. Depending on the notebook (some note-
battery capacity, you have between about books are even manufactured with locking
20 minutes and 3 hours to save your work ports), and a hardened steel cable is con-
and shut down your computer properly. nected to the locking mechanism. The other
end of the cable is looped around something
large and heavy, such as a desk. The cable
Deterring Theft lock requires the use of a key or combination
Because they are portable, notebooks are to free the notebook. You should consider
easy targets for thieves. Even though they taking a cable lock with you when traveling
are not considered portable, desktop to help deter theft from hotel rooms.
computers are also subject to theft. Three Software Alerts
approaches to deterring computer theft
How can my computer alert me when
include alarming them, locking them down,
it is stolen? You’ve probably heard of
or installing devices that alert you (or
LoJack, the theft-tracking device used in Figure 9.34
destroy data) when the computer is stolen.
cars. Car owners install a LoJack transmitter A notebook alarm sends
Alarms somewhere in their vehicle. If the vehicle is out an ear-piercing sound
stolen, police activate the transmitter and if your notebook is moved
What type of alarm can I install on before you deactivate the
use its signal to locate the car. Similar
my notebook computer? To prevent alarm.
your notebook from being stolen, you can
attach a motion alarm to it (see Figure 9.34).

SOUND
BYTE Surge Protectors Alarm

In this Sound Byte, you’ll learn about the major fea-


tures of surge protectors and how they work. You’ll
also learn about the key factors you need to consider
before buying a surge protector, and you’ll see how
easy it is to install one.

Protecting Your Physical Computing Assets 443


that will assist authorities in locating and re-
trieving the stolen computer.
What if the thieves find the track-
ing software and delete it? The files
and directories holding the software are not
visible to thieves looking for such software,
so they probably won’t know the software is
there. Furthermore, the tracking software is
written in such a way that even if the thieves
tried to reformat the hard drive, it would de-
tect the reformat and hide the software code
in a safe place in memory or on the hard
drive. (Some sectors of a hard drive are not
rewritten during most reformattings.) That
way, it can reinstall itself after the reformat-
ting is completed.
Are there ways to protect data
Figure 9.35 contained on mobile devices?
Cable locks are an Smartphones can be vulnerable to unautho-
effective deterrent systems now exist for computers. Tracking rized access if they are left unattended or
to theft.
software such as Computrace LoJack for are stolen. Although some devices offer
Laptops (absolute.com), PC PhoneHome, basic protection features (such as password
and Mac PhoneHome (pcphonehome.com) protection), sensitive business information
enables the computer to alert authorities to often requires an additional level of protec-
the computer’s location if it is stolen. This tion. Security software such as TealLock
software can be installed in either notebook from TealPoint Software (tealpoint.com)
or desktop computers. offers additional protection features such
To enable your computer to help with its as data encryption and protection against
own recovery, install the tracking software attempts to break into a device through
on your hard drive. The software contacts a “brute force” attacks (running a program
server at the software manufacturer’s Web to guess all possible passwords). Most
site each time you connect to the Internet. If programs feature optional data self-destruct
your computer is stolen, you notify the soft- modes (sometimes known as bomb soft-
ware manufacturer. The software manufac- ware) that destroy data on both internal
turer instructs your computer to transmit memory and external data cards if repeated
tracking information (such as an IP address) attempts are made to crack passwords.

444 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
Figure 9.36 COMPUTER SECURITY CHECKLIST

Yes No
Virus and Spyware Protection
Is antivirus and antispyware software installed on all your computers?

Is the antivirus and antispyware software configured to update itself automatically and regularly?

Is the software set to scan your computer on a regular basis (at least weekly) for viruses and spyware?

Firewall
Do all your computers have firewall software installed and activated before connecting to the Internet?

Is your router also able to function as a hardware firewall?

Have you tested your firewall security by using the free software available at grc.com?

Wireless Security (see Chapter 7 for additional details)


Have you changed the default password for your router?

Have you changed the name (SSID) of your network and turned off SSID broadcasting?

Have you enabled WPA or WEP encryption for your network?

Software Updates
Have you configured your operating systems (Windows, OS X) to install new software patches and updates automatically?
Is other software installed on your computer (such as Microsoft Office) configured for automatic updates?

Is the Web browser you are using the latest version?

How can I ensure that I’ve covered access will be secure and free from
all aspects of protecting my problems.
computer? The checklist in Figure 9.36 Taking a few precautions regarding your
is a guide to ensure you didn’t miss any data security can provide huge benefits such
critical aspects of security. If you’ve as peace of mind and the avoidance of time
addressed all of these issues, then you can spent correcting problems. So enjoy your
feel reasonably confident that your Internet computing experiences, but do so safely.

Protecting Your Physical Computing Assets 445


nine
nine summary
chapter

1. From which types of viruses do I 5. How do I create secure passwords


need to protect my computer? and manage all of my passwords?
A computer virus is a program that attaches Secure passwords contain a mixture of
summary

itself to another program and attempts to upper- and lowercase letters, numbers, and
spread to other computers when files are ex- symbols, and are at least 14 characters long.
changed. Computer viruses can be grouped Passwords should not contain words that
into five categories: (1) boot-sector viruses, are in the dictionary or easy-to-guess per-
(2) logic bombs and time bombs, (3) worms, sonal information (like your pet’s name).
(4) scripts and macros, and (5) encryption Online password checkers can be used to
viruses. Once run, they perform their evaluate the strength of your passwords.
malicious duties in the background and are Utilities built into Web browsers and Inter-
often invisible to the user. net security software can be used to manage
your passwords and alleviate the need to re-
member numerous complex passwords.
2. What can I do to protect my computer
from viruses?
The best defense against viruses is to install 6. How can I surf the Internet
antivirus software. You should update the anonymously and use biometric
software on a regular basis and configure it authentication devices to protect my
to examine all e-mail attachments for data?
viruses. You should periodically run a The current versions of the popular
complete virus scan on your computer to browsers include tools (such as Chrome’s
ensure that no viruses have made it onto Incognito feature) that hide your surfing ac-
your hard drive. tivities by not recording Web sites that you
visit, or files that you download, in your
browser’s history files. Biometric authentica-
3. How can hackers attack my
tion devices use a physical attribute (such as
computing devices, and what harm
a fingerprint) that is not easily duplicated to
can they cause? control access to data files or computing de-
A hacker is defined as anyone who breaks vices. Some notebooks today feature finger-
into a computer system unlawfully. Hackers print readers and facial recognition software
can use software to break into almost any to control access.
computer connected to the Internet (unless
proper precautions are taken). Once hackers
gain access to a computer, they can poten- 7. How do I manage online annoyances
tially (1) steal personal or other important such as spyware and spam?
information, (2) damage and destroy data, The Web is filled with annoyances such as
or (3) use the computer to attack other spam, pop-ups, cookies, spyware, and scams
computers. such as phishing that make surfing the Web
frustrating and sometimes dangerous. Soft-
ware tools help to prevent or reduce spam,
4. What is a firewall, and how does it
adware, and spyware, while exercising cau-
keep my computer safe from tion can prevent serious harm caused by
hackers? phishing, pharming, and other Internet
Firewalls are software programs or hard- scams and hoaxes.
ware devices designed to keep computers
safe from hackers. By using a personal fire-
wall, you can close open logical ports to in-
vaders and potentially make your computer
invisible to other computers on the Internet.

446 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
summary
nine nine

chapter
8. What data do I need to back up, and appears to be legitimate (such as a bank site)
what are the best methods for doing but is specifically designed to capture per-
so? sonal information for committing fraud. To

summary
Data files created by you (such as Word and avoid phishing scams, you should never
Excel files) or purchased by you (such as reply directly to any e-mail asking you for
music files) need to be backed up in case personal information, and never click on a
they are inadvertently deleted or damaged. link in an e-mail to go to a Web site. You can
Application software (such as Microsoft research topics you believe to be hoaxes at
Office) may need to be reinstalled if files are sites such as Snopes (snopes.com).
damaged, so backups (usually the DVDs or
CDs the application came on) must be
10. How do I protect my physical
maintained. Web sites such as Adrive and
Skydrive are great for backing up individual computing assets from environmental
files. External hard drives are popular hazards, power surges, and theft?
choices for holding image backups of your Computing devices should be kept in clean
entire system. Windows 7 and OS X contain environments free from dust and other
solid backup tools that help automate particulates and should not be exposed to
backup tasks. extreme temperatures (either hot or cold).
You should protect all electronic devices
from power surges by hooking them up
9. What is social engineering, and how through surge protectors, which will
do I avoid falling prey to phishing and protect them from most electrical surges
hoaxes? that could damage the devices. Notebook
Social engineering schemes use human in- computers can be protected from theft
teraction, deception, and trickery to fool either by attaching alarms to them or by
people into revealing sensitive information installing software that will help recover
such as credit card numbers and passwords. the computer, if stolen, by reporting the
Phishing schemes usually involve e-mails computer’s whereabouts when it is
that direct the unwary to a Web site that connected to the Internet.

447
nine
nine key terms
chapter

adware ................................................................... 430 malware................................................................. 430


antivirus software ............................................... 413 master boot record .............................................. 411
backdoor program............................................... 419 multipartite virus ................................................ 414
key terms

backup ................................................................... 435 network address translation (NAT) ................. 423


biometric authentication device....................... 429 packet .................................................................... 418
black-hat hacker .................................................. 417 packet filtering .................................................... 422
bomb software ..................................................... 444 packet sniffer ....................................................... 418
boot-sector virus .................................................. 411 personal firewall ................................................. 421
botnet..................................................................... 420 pharming .............................................................. 439
cookie .................................................................... 433 phishing ................................................................ 439
cybercrime ............................................................ 410 polymorphic virus............................................... 413
cybercriminal ....................................................... 410 pretexting.............................................................. 438
cyberloafing ......................................................... 431 program file.......................................................... 435
data file ................................................................. 435 quarantining ........................................................ 415
denial-of-service (DoS) attack .......................... 419 script ...................................................................... 413
distributed denial-of-service script kiddy .......................................................... 417
(DDoS) attack ................................................... 419 social engineering ............................................... 438
drive-by download ............................................. 416 spam....................................................................... 432
dynamic addressing............................................ 422 spam filter............................................................. 432
e-mail virus........................................................... 413 spyware ................................................................. 430
encryption virus .................................................. 413 static addressing .................................................. 423
firewall .................................................................. 421 stealth virus .......................................................... 414
hacker .................................................................... 417 surge protector ..................................................... 442
hoax........................................................................ 440 time bomb............................................................. 412
identity theft ........................................................ 418 Trojan horse.......................................................... 418
image backup (system backup) ........................ 436 uninterruptible power supply
incremental backup (partial backup) .............. 436 (UPS) .................................................................. 443
inoculation............................................................ 415 urban legend ........................................................ 440
Internet protocol address (IP address) ............ 422 virus ....................................................................... 410
keystroke logger .................................................. 430 virus signature ..................................................... 414
logic bomb ............................................................ 412 white-hat hacker.................................................. 417
logical port............................................................ 420 whole-house surge protector............................. 442
logical port blocking........................................... 422 worm...................................................................... 412
macro virus ........................................................... 413 zombie ................................................................... 419

448 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
buzzwords
nine nine

chapter
Word Bank
• adware • hacker(s) • social engineering
• antivirus software • identity theft • spyware

buzzwords
• backup(s) • keystroke logger(s) • surge protector
• distributed denial-of- • logical port(s) • virus
service (DDoS) • phishing • zombie(s)
• firewall

Instructions: Fill in the blanks using the words from the Word Bank above.

Emily learned a lot about computer security in her computer literacy class. She already
knew it was important to exercise caution when using the Internet because she had been
the victim of (1) __________, which destroyed her credit rating. A(n) (2) __________ had
obtained her credit card information by posing as an employee of her bank, using a
method known as (3) __________. In her class, Emily learned that hackers could install
(4) __________, a type of software that will capture everything she types, to steal her
personal information. And one of Emily’s classmates received a (5) __________ e-mail that
directed her to a fake Web site that looked like her bank’s Web site and resulted in her bank
account information being stolen. The computers in the lab at school had just been cleaned
of (6) __________ software that was displaying annoying pop-up advertisements. The
computer technician who fixed this problem indicated that (7) __________ software, which
was monitoring computer user activity, was often inadvertently installed on lab computers
by students downloading files.

Emily found out that her router could be configured as a(n) (8) __________ to repel
malicious hacking mischief. Turning off the unused (9) __________ would repel most
attacks on her home network. With this protection, it was unlikely that a hacker would turn
her PC into a(n) (10) __________ to launch (11) __________ attacks. However, after the scare
with the Conficker (12) __________, Emily was careful to warn her family not to open files
from untrusted sources. She also made sure all of the computers in her home had
(13) __________ installed to protect them from viruses. For extra security, Emily installed
an external hard drive so that she could create (14) __________ of her data files, and she

computer
replaced her power strip with a(n) (15) __________ to make sure power spikes didn’t ruin
her computer after all of the other precautions she’d taken.
literate
becoming
computer literate becoming
While attending college, you are working at a company that manufactures industrial
adhesives. Recently, the company computers have been behaving strangely and running
slowly. Your investigation revealed that although antivirus software was initially installed
on the company computers, the subscriptions have lapsed and the software is out of date. It
also appears that no antispyware software was ever deployed. Your boss heard that you are
taking a computer course and has asked you to run a seminar to educate management
about the potential problems and solutions.

Instructions: Using the preceding scenario, draft an antivirus and antispyware plan for
the company using as many of the keywords from the chapter as you can. Be sure that the
company managers, who are unfamiliar with many computer terms, can understand the
report.

449
nine
nine self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Computer viruses that hide in mem- to perpetrate DoS attacks are


ory to escape detection are known as known as
a. logic bombs. a. Trojan horses.
b. Trojan horses. b. backdoor programs.
c. stealth viruses. c. zombie webs.
d. multipartite viruses. d. botnets.
2. Viruses that that feature a series of 7. When hackers use many zombie com-
commands hidden on a web site are puters to launch an attack on another
called computer or Web site, the attack is
a. boot-sector viruses. known as a
b. script viruses. a. zombie infestation.
c. polymorphic viruses. b. distributed denial-of-service
d. time bombs. attack.
3. Antivirus software segregates c. phishing attack.
infected files to prevent further d. pharming plague.
spread in a process known as 8. Which are the virtual pathways into a
a. inoculation. c. disinfection. computer that firewalls close?
b. quarantine. d. eradication. a. Packet gateways
4. Hackers without sophisticated b. IP addresses
computer knowledge who use tools c. Logical ports
developed by others to break into d. Data paths
systems are called 9. Programs that download to your
a. black-hat hackers. computer, usually without your
b. script kiddies. knowledge, for the purpose of collect-
c. amateur hackers. ing information, is a type of cyberan-
d. white-hat hackers. noyance known as
5. Which are programs that pretend to a. pharmware.
be a useful program but do some- b. adware.
thing malicious on your computer? c. spyware.
a. Trojan horses d. bloatware.
b. Backdoor programs 10. A backup of the entire contents of
c. Zombies your hard drive is knows as
d. Spyware a. a system backup.
6. Large groups of software programs b. an incremental backup.
that run automatically on many c. an image backup.
computers at the same time often d. an incremental backup.

True–False
_____ 1. An incremental backup back ups all files on your computer in a specified location.
_____ 2. Even a properly installed surge protector may fail to protect a computer from all
power surges.
_____ 3. Phishing is a form of social engineering.
_____ 4. When malicious code is planted on your computer that interferes with your
browser’s ability to find Web addresses, it is known as phishing.
_____ 5. If a password includes numbers, symbols, and upper- and lowercase letters, it is
considered to be a strong password.

450 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
making the
nine nine

chapter
transition to...
next semester
1. Backup Procedures

transition to...
After reading this chapter, you know you should have a good backup strategy in place
for your key data. Consider the following and prepare answers in an appropriate
format as directed by your instructor.

next semester
making the
a. How often do you back up critical data files such as homework files? What type of
device do you use for backing up files? Where do you store the backups to ensure
they won’t be destroyed if a major disaster (such as a fire) destroys your computer?
Do you use online sites for file backups?
b. List the applications (such as Microsoft Office) that are currently installed on your
computer. Where is the media (DVDs) for your application software stored? For any
software you purchased in an Internet download, have you burned a copy of the
installation files to DVD in case you need to reinstall the software?
c. Have you ever made an image backup of your entire system? If so, what software
do you use for image backups, and where are the image backups stored? If not,
research image backup software on the Internet and find an appropriate package to
use. Will you need to purchase an additional backup device to hold your image
backup or does your current device have room for an image backup? If you need a
new device, find one on the Internet that is appropriate. What is the total cost of the
software and hardware you will need to implement your image backup strategy?

2. Connecting Your Computer to Public Networks


In the course of your education, you are constantly connecting your notebook to vari-
ous wireless public networks such as those in the school library and neighborhood cof-
fee shop. As you know from reading this chapter, you are more vulnerable to hackers
when connected to a wireless network in a public place. Conduct research on the Inter-
net about surfing at public hot spots and prepare a list of sensible precautions for you
and your classmates to take when surfing on an open network.
3. Botnet Awareness
Botnets are serious computer infestations that affect large numbers of computers at one
time. Still, many students are unaware of this threat even as botnets strike college
campuses. Using the Internet, research botnets and prepare a short flyer for your fellow
students that explains the threats posed by botnets and software that can be used to
detect botnets.
4. Internet Security Suites
Full-featured Internet security suites offer comprehensive protection for your
computer. But how do you know which suite meets your needs? Research the features
of three Internet security suites such as Norton Internet Security, AVG Internet Security,
Kaspersky Internet Security, Trend Micro Internet Security, or McAfee Internet Security.
Prepare a document for your instructor comparing the features and prices of each
security suite for a home with four computers. Explain which security suite you would
choose for your home and why you would choose it.

451
nine
nine making the
chapter

transition to...
the workplace the workplace
1. File Backup Strategies
making the

Your employer was recently the victim of a break-in, and all three dozen of its
computers were stolen. Your company lost invaluable data because there was no
transition to...

comprehensive backup strategy in place for its computers. Your boss has asked you to
prepare a report outlining a new file backup plan for the company. While preparing
your report, consider the following:
a. How often should computer data be backed up? Should full backups or incremental
backups be performed? Are image backups necessary?
b. Eighteen employees have notebook computers that they take off company premises.
How will backups for notebooks be handled?
c. Research companies that provide online backup solutions for businesses. Which one
provides the most cost effective solution for backing up three dozen computers?
Can backups be performed automatically as employees change data files?
2. Securing Customer Data
Many corporations are collecting vast amounts of sensitive data (such as credit card
numbers, birth dates, etc.) about their customers. Assume you are working for a business
that accepts orders for merchandise through a Web site. Answer the following questions:
a. What types of information should you collect from your customers? What informa-
tion couldn’t you justify collecting from your customers using a valid business
reason (i.e., Social Security number)?
b. Your company would like to send e-mails to customers on their birthdays, offering
them a special discount on merchandise purchased within one week of their birth-
day. How would you explain to customers why you are collecting their birth dates,
and what measures would you need to take to keep this data secure?
c. How would you ensure that information shared with third parties (such as delivery
companies) is kept secure?
d. If your computer system was compromised and customer data was stolen, what
would you say to customers regarding the loss of their personal data? What steps
would you recommend your customers take to prevent identity theft due to your
losing control of their data?
3. Is Your Computer Vulnerable?
Visit Gibson Research (grc.com) and run the company’s ShieldsUP and LeakTest
programs on your personal computer.
a. Did your computer get a clean report? If not, what potential vulnerabilities did the
testing programs detect? If ports were shown as being vulnerable, research what
these ports do and explain what steps you will take to protect them.
b. A properly configured firewall protects your computer from port vulnerabilities.
Use the Internet to research firewall products and find three free firewall products.
Which one appears to provide the best protection?
c. Besides adding a firewall to your system, what other measures should you take to
protect your system from exploitation by hackers?
4. Computer Security Careers
Computer security professionals are among the highest paid employees in information
technology organizations. Using employment sites such as Monster.com,
computerjobs.com, and dice.com, research computer security jobs available in the state
where your school is located (try searching “computer security”). Select three entry-
level computer security jobs from different employers and prepare a document com-
paring the following: What are the educational requirements for computer security
jobs? What job skills are required? How much prior work experience are firms looking
for? Are programming skills required? With cloud computing becoming more popular,
how will that affect the outlook for computer security jobs?

452 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
critical thinking
nine nine

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Protecting Your Home Network
Many people have networks in their homes. Consider the network installed in your
home (or in a friend’s home if you don’t have a network).
a. Is your network set up to provide adequate protection against hackers? If not, what
would you need to do to make it secure?
b. Are the computers on your home network protected against viruses and malware?
What software do you use for protection and how often is it updated? Have you
ever had problems from a virus or spyware infestation? If so, how did you resolve
the problem?
2. Password Protection
You know from reading this chapter that secure passwords are essential to protecting
your digital information. Consider the following:
a. How many online accounts do you have that have passwords? List them. Are the
passwords for these accounts secure, based on the suggestions proposed in this
chapter? Do you change your passwords on a regular basis?
b. How do you keep track of all of your passwords? Do you use password-management
software? If so, what product are you using? How often do you change your master
password? If you don’t use password-management software, what methodology do
you use for remembering and tracking your passwords?
3. Shouldn’t Protection Be Included?
The Uniform Commercial Code, which governs business in every state except
Louisiana, covers the implied warranty of merchantability. This warranty’s basic
premise is that a company selling goods guarantees that their products will do what
they are designed to do (i.e., a car will transport you from place to place) and that there
are no significant defects in the product. But computers are routinely sold with only
trial versions of antimalware software.
a. Does the failure of OS manufacturers to include antimalware tools constitute a
breach of the implied warranty of merchantability? Why or why not? Microsoft does
have an antimalware product (Security Essentials), but it requires a separate
download. Should Microsoft be required to include Security Essentials as part of
the Windows product?
b. Computer hardware manufacturers don’t make OS software, but they sell comput-
ers that would be unusable without an OS. What responsibility do they have in
regard to providing antimalware protection to their customers?
4. Restricting Information to Keep You Safe
Many countries, such as China, have laws that control the content of the Internet and
restrict their citizens’ access to information. The United States, with the exception of
specific areas such as cyberbullying and pornography, does not currently take steps to
restrict its citizens’ access to the Internet. Unfortunately, this freedom of information
does carry some cost because some information on the Web can be potentially danger-
ous to the general public.
a. Do you think the U.S. government should censor information on the Web, such as
instructions for making weapons, to protect the general public? Why or why not? If
you think there should be some censorship, do you think such a law would violate
the First Amendment right to free speech? Explain your answer.
b. Would you be willing to live with a lower level of information access to increase
your sense of well being? What topics do you feel would make you feel more secure
if they were censored?
453
nine
nine team time
chapter

Protecting Your Local Real Estate Office


team time

Problem
Computer networks with high-speed connections to the Internet are common in most busi-
nesses today. However, along with easy access to computing devices and the Web comes
the danger of theft of digital assets.

Task
A recent graduate of your school has opened a 15-person real estate office in a neighboring
town. He approached your instructor for help in ensuring that his computers are ade-
quately protected from viruses, malware, and hackers. Because he is currently low on
funds, he is hoping that there may be free software available that can adequately shield his
company from harm.

Process
Break the class into three teams. Each team will be responsible for investigating one of the
following issues:
1. Firewalls. Research free firewall software and locate at least three software options that
can be deployed at the business. Be sure to concentrate on software that is easy to con-
figure and requires little or no user interaction to be effective.
2. Antivirus software. Research alternatives that can be used to protect the computers in
the office from virus infection. Find at least three alternatives and support your recom-
mendations with reviews (from publications such as PC Magazine or Consumer Reports)
that evaluate the free packages and compare them to commercial solutions.
3. Antimalware software. Research free packages that will offer protection from malware.
Locate at least three alternatives and determine whether the recommended software
can be updated automatically. (Many free versions require manual updates.) Most com-
panies that provide free malware protection also offer commercial packages (for a fee)
that provide automatic updates. You may need to recommend that the company pur-
chase software to ensure that a minimum of employee intervention is needed to keep
the software up to date.
Present your findings to your class and discuss the pros and cons of free and commercial
software. Provide your instructor with a report suitable for eventual presentation to the
owner of the real estate office.

Conclusion
With the proliferation of viruses and malware, it is essential to protect business (and home)
computers and networks from destruction and disruption. Free alternatives might work,
but you should ensure that you have done adequate research to determine the best possible
protection solution for your particular situation.

454 Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
ethics
nine nine

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an ethi-
cal solution.

Topic: Content Control (Censorship) to Protect Children


Many parents use Web filtering software (also known as content-control software) to pro-
tect their children from objectionable content on the Internet. However, the software is also
widely used in libraries, schools, and other public places where people other than parents
are making decisions about what information to restricted. In 2000, the U.S. federal govern-
ment began requiring libraries to use content filtering software as a condition to receiving
federal funds under the provisions of the Children’s Internet Protection Act (CIPA).
Libraries that don’t receive federal funds still do not have to install filtering software unless
their state (like Virginia in 2007) passes laws requiring them to do so to receive state fund-
ing. Upon installation of the software, it is up to the library administrators to decide what
content is restricted (as guided by the provisions of laws such as CIPA). Therefore, content
restriction can vary widely from library to library.

Research Areas to Consider

• United States Supreme Court case United States v. American Library Association (2003)
• Content-filtering software and First Amendment rights
• Violating children’s free speech rights
• Children’s Internet Protection Act (CIPA)

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which parents have complained
about their child not being able to access a certain Web site needed for school research.
2. Team members should write a summary that provides background information for
their character—for example, parent, library administrator, and arbitrator—and details
their character’s behaviors to set the stage for the role-playing event. Then, team mem-
bers should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the chat room feature of MyITLab, the discussion board feature of Blackboard, or
meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

455
t’s hard to imagine an occupation in which

I computers are not used in some fashion.


Even such previously low-tech industries as
waste disposal and fast food use computers to
manage inventories and order commodities. In
this Technology in Focus feature, we explore
various information technology (IT) career paths
open to you.

456 Technology in Action


What to Consider First: past several years. In 2010, computer science
enrollment was up another 5.5% per the Web
Job Outlook site Ars Technica. This marks a reversal of a
If you want to investigate a career with comput- trend that developed mainly because of the
ers, the first question you probably have is, “Will intense media discussion about the demise of
I be able to get a job?” With all the media reports Internet start-up companies in the early 2000s.
surrounding the loss of IT jobs to other countries, Because of low enrollment during the past
many people think the boom in computer-related decade, shortages of computing professionals in
jobs is over. However, current projections by the the United States are projected over the next 5 to
U.S. Department of Labor’s Bureau of Labor 10 years. In terms of job outlook, this is a perfect
Statistics report that 2 out of the top 15 fastest- time to consider an IT career.
growing occupations from 2008 through 2018 are Regardless of whether you choose to pursue a
still in computer fields (see Figure 1). Recently, career in IT, you should visit the Bureau of
CNBC rated the top 10 best jobs in the United Labor Statistics site (bls.gov). One of the site’s
States; software engineers came in at number 2, most useful features is the Occupational Outlook
and computer systems analysts were number 3! Handbook. Aside from projecting job growth in
A recent survey by MSNBC showed that various career fields, it describes typical tasks
prospects for college graduates were improving that workers perform, the amount of training
especially in the fields of accounting, engineer- and education needed, and salary estimates.
ing, mathematics, and computer science. In the global economy in which we now
After years of declining enrollment, students operate, job outlook also includes the risk of jobs
pursuing computer science degrees are continu- being outsourced, possibly to other countries (a
ing to increase extending trends seen over the process known as offshoring). Outsourcing is a
process whereby a business hires a third-party
firm to provide business services (such as
customer-support call centers) that were previ-
ously handled by in-house employees. Offshoring
occurs when the outsourcing firm is located (or
uses employees) outside the United States. India
was the first country to offer its workforce and
infrastructure for offshoring, and countries such
as China, Romania, and other former Eastern Bloc
countries now vie for a piece of the action. The big
lure of outsourcing and offshoring is cost savings:
The outsourcing firm can do the work more
cheaply than in-house employees can. Consider-
ing that the standard of living and salaries are
much lower in many countries than they are in the
United States, offshoring is an attractive option for
many U.S. employers. It may also be faster to hire
outside assistance if a business does not already
employ workers with the required skill set.
However, outsourcing and offshoring do not
always deliver the vast cost savings that chief
executive officers (CEOs) envision. TPI, a global
sourcing advisory firm, conducted a survey that
showed that the average cost savings from
outsourcing was only 15 percent. Furthermore,
other less-tangible factors can outweigh the cost
savings from outsourcing. Some helpdesk jobs are
being brought back to the United States because
companies have experienced a backlash from

Technology in Focus: Careers in IT 457


FIGURE 1 According to the Bureau of Labor Statistics, huge growth is expected in two
categories of high-paying computer occupations.
Occupations with the Fastest Growth

Number of Education/
Percent new jobs Wages (May training
Occupations change (in thousands) 2008 median) category

Biomedical engineers 72 11.6 $ 77,400 Bachelor’s degree

Network systems and data 53 155.8 71,100 Bachelor’s degree


communications analysts

Home health aides 50 460.9 20,460 Short-term on-


the-job training

Personal and home care aides 46 375.8 19,180 Short-term on-


the-job training

Financial examiners 41 11.1 70,930 Bachelor’s degree

Medical scientists, except 40 44.2 72,590 Doctoral degree


epidemiologists

Physician assistants 39 29.2 81,230 Master’s degree

Skin care specialists 38 14.7 28,730 Postsecondary


vocational award

Biochemists and biophysicists 37 8.7 82,840 Doctoral degree

Athletic trainers 37 6.0 39,640 Bachelor’s degree

Physical therapist aides 36 16.7 23,760 Short-term on-


the-job training

Dental hygienists 36 62.9 66,570 Associate degree

Veterinary technologists and 36 28.5 28,900 Associate degree


technicians

Dental assistants 36 105.6 32,380 Moderate-term


on-the-job
training

Computer software engineers, 34 175.1 85,430 Bachelor’s degree


applications

consumers who have had difficulty understand- participants had “negative experiences” with
ing the employees with foreign accents who staff overseas outsourcing. And a survey in CFO
the support lines. Communications problems can magazine indicated that 22 percent of CFOs were
arise between internal and external employees, planning to increase their outsourcing within
for example, and cultural differences between the the United States. Although outsourcing and
home country and the country doing the off- offshoring won’t be going away, companies are
shoring can result in software code that needs ex- approaching it with more caution and looking
tensive rework by in-house employees to make it more to U.S. companies to provide resources.
usable. Data also can be less secure in an external So, what IT jobs will be staying in the United
environment, or during the transfer between the States? According to InformationWeek magazine,
company and an external vendor. A study by De- most of the jobs in these three categories
loitte Consulting found that 70 percent of survey (see Figure 2) will stay put:

458 Technology in Action


FIGURE 2 Jobs That Should Remain Onshore

Customer Interaction Software and Systems Hardware/Networking

Web application developers Business process analysts Network security

Web interface designers Application developers (when Network installation technicians


customer interaction is critical)

Database and data warehouse Project managers (for systems with Network administrators
designers/developers customers and business users (engineers)
who are located predominantly in
the United States)

Customer relationship Wireless infrastructure managers


management (CRM) analysts and technicians

Enterprise resource planning Disaster recovery planners and


(ERP) implementation specialists responders

1. Customer interaction: Jobs that require di- the size of an employer and its geographic
rect input from customers or that involve location are also factors. Large companies
systems with which customers interface tend to pay more, so if you’re pursuing a
daily. high salary, set your sights on a large corpo-
2. Enablers: Jobs that involve getting key ration. But remember that making a lot of
business projects accomplished, often money isn’t everything—be sure to con-
requiring technical skills beyond the realm sider other quality-of-life issues such as job
of IT and good people skills. satisfaction.

3. Infrastructure jobs: Jobs that are funda- 2. Gender bias: Many women view IT
mental to moving and storing the informa- departments as Dilbert-like microcosms
tion that U.S.–based employees need to do of antisocial geeks and don’t feel they
their jobs. would fit in. Unfortunately, some mostly
male IT departments do suffer from
varying degrees of gender bias. Although
Common Myths About some women may thrive on the challenge
IT Careers of enlightening these male enclaves and
bringing them into the 21st century,
Many people have misconceptions about pursu- others find it difficult to work in such
ing a career in IT that scare them away from environments.
considering a career in computing or convince
3. Location: In this case, location refers to
them to pursue a computing career for the
the setting in which you work. IT jobs can
wrong reasons. Review the myths listed in the
be office based, field based, project based,
boxed feature shown on the next page. Do you
or home based. Not every situation is
share any of these misconceptions?
perfect for every individual. Figure 3
summarizes the major job types and their
Is an IT Career Right locations.
for Me? 4. Changing nature of the work: In IT, the
playing field is always changing. New soft-
A career in IT can be a difficult path. Before ware and hardware are constantly being
preparing yourself for such a career, consider the developed. It’s almost a full-time job to
following. keep your skills up to date. You can expect
1. Salary range: What affects your salary in to spend a lot of time in training and self-
an IT position? Your skill set and your study trying to learn new systems and
experience level are obvious answers, but techniques.

Technology in Focus: Careers in IT 459


COMMON MYTHS ABOUT IT CAREERS
MYTH 1: Getting an information technology with other workers, often in team settings. People skills
degree means you’re going to be rich. Computer- are important, even when you work with computers.
related careers often offer high salaries, but choosing
MYTH 5: Mathematically impaired people need
a computer career isn’t a guarantee you’ll get a high-
not apply. It is true that a career in programming in-
paying job. Just as in other professions, you probably
volves a fair bit of math, but even if you’re not mathe-
will need years of training and on-the-job experience
matically inclined, you can explore other IT careers. IT
to earn a high salary. However, starting salaries in
employers also value such attributes as teamwork, cre-
certain IT professions are robust.
ativity, leadership ability, and artistic style.
MYTH 2: You have three professional certifica- MYTH 6: Working in IT means working for a
tions—so you’re ready to work. Many freshly
computer company or in an IT department. Comput-
minted technical school graduates sporting IT certifica-
ers and information systems are used across all industries
tions feel ready to jump into a job. However, employers
and in most job functions. For example, as an accounting
routinely cite experience as being more desirable than
major, if you minor in IT, employers may be more willing
certification. Experience earned through an internship
to consider hiring you because working in accounting
or a part-time job will make you much more marketable
today means constantly interfacing with management
when your certification program is complete.
information systems and manipulating data.
MYTH 3: Women are at a disadvantage in an IT MYTH 7: All of the jobs are going offshore.
career. Currently, women make up less than 20 per-
Although many IT jobs have been lost to international
cent of the IT workforce and about 4 percent of
competition over the past decade, most networking,
senior-level IT positions (per the Anita Borg Institute).
analyst (business, systems, and database) and creative
This presents a huge opportunity for women who have
(digital media creation and game development) jobs
IT skills because many IT departments are actively
have stayed in the United States. As demand for IT
seeking to diversify their workforces. In addition, al-
professionals has increased overseas, foreign wages
though a salary gender gap (the difference between
have been driven up, making offshoring of jobs less
what men and women earn for performing the same
attractive. The bottom line is that plenty of IT jobs
job) exists in IT careers, it’s smaller than in many other
remain in the United States.
professions.
MYTH 4: People skills don’t matter in IT jobs. Resolving myths is an important step toward con-
Despite what many people think, IT professionals are sidering a job in IT. However, you need to consider
not locked in lightless cubicles, basking in the glow of other issues related to IT careers before you decide
their monitors. Most IT jobs require constant interaction to pursue a particular path.

FIGURE 3 Where Do You Want to Work?

Type of Job Location and Hours Special Considerations


Office based Report for work to the same location each May require working beyond
day and interact with the same people on “normal” working hours
a regular basis
May also require workers to be on
Requires regular hours of attendance call 24/7
(such as 9 A.M. to 5 P.M.)

Field based Travel from place to place as needed and Involve a great deal of travel and
perform short-term jobs at each location the ability to work independently

Project based Work at client sites on specific projects for Can be especially attractive to
extended periods of time (weeks or months) individuals who like workplace
situations that vary on a regular
Examples: contractors and consultants basis
Home based Work from home Involve very little day-to-day
(telecommuting) supervision and require an
individual who is self-disciplined

460 Technology in Action


HOW MUCH WILL I EARN?
ike many other professionals, IT employees FIGURE 4

L can earn a very good living. Although starting


salaries for some IT positions (computer
desktop support and helpdesk analysts) are in the
The salary wizard at Salary.com is easy to tailor to your location
and company size.

modest range ($38,000 to $42,000), starting salaries


for students with bachelor’s degrees in information
technology are fairly robust. CNBC recently
profiled the 10 best jobs in the United States.
Coming in at second and third place were software
engineer (median salary $79,780) and computer
systems analyst with median salaries of $79,780
and $69,760 respectively.
IT salaries vary widely, depending on experi-
ence level, the geographic location of the job, and
the size of the employer. To obtain the most accu-
rate information, research salaries yourself. Job
posting sites such as Monster.com can provide
guidance, but Salary.com provides a wizard to help
you determine what IT professionals in your area
are making compared with national averages.
Figure 4 shows that for an entry-level programming
position in Portland, Oregon, you could expect to Hundreds of IT job titles are listed so that you can
earn a median salary of between $42,500 and fine-tune your search to the specific job in which
$57,000 depending on the size of the company. you’re interested.

5. Stress: Whereas the average American The good news is that despite the stress (see
works 42 hours a week, a survey by Figure 5) and changing nature of the IT environ-
InformationWeek shows that the average IT ment, most computing skills are portable from
staff person works 45 hours a week and is industry to industry. A networking job in the
on call for another 24 hours. On-call time clothing manufacturing industry uses the same
(hours an employee must be available to primary skill set as a networking job for a
work in the event of a problem) has been
increasing in recent
years because more
IT systems (such as Te
xt
e-commerce systems) co cu s fr g
tin eed
s
ne mpl stom om 6 rke nt n ge
w a a
require 24/7 We nin ers 3
i M me p a
bs ga rt b
pa We ay
availability. ite bo
de ut de ew Frid
sig n by
n

Sa
les
r Sc s
so ly
rvi er ott golf taff a
u pe uart ort s
the al outi t an
d
FIGURE 5 q
S s rep
y!
ir s c ng nua
e
ale an’t in
ed t l
ne udge erda s r ac
Stress comes from multiple b est ep ce
ort ss
y
s
directions in IT jobs.

Technology in Focus: Careers in IT 461


MATCHING A CAREER TO YOUR SKILLS
re you unsure about what career you

A would like to pursue? There are many


online tools such as the Skill Profiler
from America’s Career InfoNet
(careerinfonet.org) that can help you iden-
tify careers based on your skills. This tool
asks you to identify your skills (see Figure 6)
in seven categories and then rate your skills
in each area you selected. The program then
compiles a skills profile for you and suggests
job titles for you to explore.
FIGURE 6
“Basic Skills” is one of seven categories on the Skills Pro-
filer, a survey that you can complete to help you assess
which career paths match your talents.

supermarket chain. Therefore, if something dis- Working in Development and


astrous happens to the industry you’re in, you Integration
should be able to switch to another industry Two distinct paths exist in this division: Web
with little trouble. development and systems development. Because
everything involves the Web today, there is often
What Realm of IT Should a great deal of overlap between these paths.

I Work In?
Web Development
Figure 7 provides an organizational chart for a
When most people think of Web development
modern IT department that should help you un-
careers, they usually equate them with being a
derstand the careers currently available and how
webmaster. However, today’s webmasters usu-
they interrelate. The chief information officer
ally are supervisors with responsibility for cer-
(CIO) has overall responsibility for the develop-
tain aspects of Web development. At smaller
ment, implementation, and maintenance of in-
companies, they may also be responsible for
formation systems and infrastructure. Usually
tasks that the other individuals in a Web devel-
the CIO reports to the chief operating officer
opment group usually do:
(COO).
The responsibilities below the CIO are gener- • Web content creators generate the words
ally grouped into two units: development and and images that appear on the Web. Journal-
integration (responsible for the development of ists, other writers, editors, and marketing
systems and Web sites) and technical services personnel prepare an enormous amount of
(responsible for the day-to-day operations of the Web content, whereas video producers,
company’s information infrastructure and graphic designers, and animators create
network, including all hardware and software Web-based multimedia. Interface designers
deployed). work with graphic designers and animators
In large organizations, responsibilities are to create a look and feel for the site and
distinct and jobs are defined more narrowly. In make it easy to navigate. Content creators
medium-sized organizations, there can be over- have a thorough understanding of their
lap between position responsibilities. At a small own fields as well as HTML/XHTML, PHP,
shop, you might be the network administrator, and JavaScript. They also need to be familiar
database administrator, computer support with the capabilities and limitations of
technician, and helpdesk analyst all at the same modern Web development tools so that
time. Let’s look at the typical jobs found in each they know what the Web publishers can
department. accomplish.

462 Technology in Action


Chief Information Officer

Director of Director of
Development Technical
& Integration Services

Manager of Manager of Manager of Manager of


Web Systems Information Support
Development Development Systems Services

Manager of Manager of
Manager of Network Help Desk
Webmaster(s) Systems Project
Programming Administrator(s) Manager
Analysis Management

Web Senior Database


Senior Project Help Desk
Programmer(s) Systems Administrator(s)
Programmer(s) Manager(s) Analyst(s)
Analyst(s)

Graphic Junior Web Server Computer


Junior
Designer(s) Systems Administrator(s) Support
Programmer(s)
Analyst(s) Technician(s)

Interface Telecommunications
Designer(s) Technical Technician(s)
Writer(s)

Web Content
Creator(s) Database
Developer(s) Java, JavaScript, ASP, PHP, and PERL) and
development environments such as the
Customer Microsoft .NET Framework.
Interaction
Technician(s) • Customer interaction technicians provide
feedback to a Web site’s customers. Major job
Social
responsibilities include answering e-mail,
Media sending requested information, funneling
Director questions to appropriate personnel (technical
support, sales, and so on), and providing sug-
FIGURE 7 gestions to Web publishers for site improve-
This is a typical structure for an IT department at a large ments. Extensive customer service training is
corporation. essential to work effectively in this area.
• Social media directors are responsible for
directing the strategy of the company on all
• Web publishers build Web pages to deploy social media sites where the company
the materials that the content creators maintains a presence. Often supervising
develop. They wield the software tools customer interaction technicians, these peo-
(such as Adobe Dreamweaver and Microsoft ple make sure that customers have a quality
Expression) that develop the Web pages and experience while interacting with company
create links to databases (using products employees and customers on sites such as
such as Oracle and SQL Server) to keep Facebook, Twitter, and MySpace. Respond-
information flowing between users and ing to comments left on sites, developing
Web pages. They must possess a solid promotional strategies, and designing
understanding of client- and server-side functionality of the company’s social media
Web languages (HTML/XHTML, XML, sites are common job responsibilities.

Technology in Focus: Careers in IT 463


FIGURE 8
As you can see, it takes a team to create and maintain a Web site.

Interface designers
create navigation Content creators
schemes generate text

Graphic designers
create art

As you can see in Figure 8, many different mixture of systems development, program-
people can work on the same Web site. The ming, and business courses.
education required varies widely for these jobs. • Programmers participate in the SDLC, at-
Web programming jobs often require a four-year tending meetings to document user needs
college degree in computer science, whereas and working closely with systems analysts
graphic designers often are hired with two-year during the design phase. Programmers need
art degrees. excellent written communication skills be-
cause they often generate detailed systems
documentation for end-user training pur-
Systems Development poses. Because programming languages are
Ask most people what systems developers do mathematically based, it is essential for pro-
and they will answer, “programming.” How- grammers to have strong math skills and an
ever, programming is only one aspect of systems ability to think logically. Programmers
development. Because large projects involve should also be proficient at more than one
many people, there are many job opportunities programming language. A four-year degree
in systems development. An explanation of each is usually required for entry-level program-
key area follows. ming positions.
• Systems analysts spend most of their time • Project managers usually have years of ex-
in the beginning stages of the system devel- perience as programmers or systems ana-
opment life cycle (SDLC). They talk with lysts. This job is part of a career path upward
end users to gather information about from entry-level programming and systems
problems and existing information systems. analyst jobs. Project managers manage the
They document systems and propose overall systems development process:
solutions to problems. Having good people assigning staff, budgeting, reporting to
skills is essential to success as a systems ana- management, coaching team members, and
lyst. In addition, systems analysts work with ensuring deadlines are met. Project man-
programmers during the development agers need excellent time management skills
phase to design appropriate programs to because they are pulled in several directions
solve the problem at hand. Therefore, many at once. Many project managers obtain mas-
organizations insist on hiring systems ana- ter’s degrees to supplement their undergrad-
lysts who have both solid business back- uate degrees in computer science or MIS.
grounds and previous programming
In addition to these key players, the following
experience (at least at a basic level). For
people are also involved in the systems develop-
entry-level jobs, a four-year degree is usu-
ment process:
ally required. Many colleges and universi-
ties offer degrees in management • Technical writers generate systems
information systems (MIS) that include a documentation for end users and for

464 Technology in Action


programmers who may make modifications a programmer also acting as a systems analyst).
to the system in the future. The majority of these jobs require four-year
• Network engineers help the programmers college degrees in computer science or
and analysts design compatible systems, be- management information systems. As shown in
cause many systems are required to run in Figure 9, team members work together to build
certain environments (UNIX or Windows, a system.
for instance) and must work well in conjunc- It is important to emphasize that all systems
tion with other programs. development careers are stressful. Deadlines are
• Database developers design and build data- tight for development projects, especially if they
bases to support the software systems being involve getting a new product to market ahead
developed. of the competition. Nevertheless, if you enjoy
challenges and can endure a fast-paced,
Large development projects may have all of dynamic environment, there should be plenty of
these team members on the project. Smaller proj- opportunities for good systems developers in
ects may require an overlap of positions (such as the decade ahead.

FIGURE 9
This is a flowchart of a ticket ordering system. Each member of the systems development team performs functions critical to the development
process (as shown in the red boxes).

Database
developers
design
Customer orders tickets databases
on Web site

Payments transferred to
bank account

Data
Ticket transferred
Billing
Ordering Database
Database

Tickets
Clerk verifies order accuracy
printed
and payment

Systems analysts
interview users
to document
procedures Tickets Clerk reviews tickets
and mails

Computer
programmers
generate code to
process and record
transactions

Technology in Focus: Careers in IT 465


GET IN THE GAME: CAREERS IN GAME DEVELOPMENT
he video gaming industry in the United States Max, Autodesk Maya, NewTek LightWave 3D, Adobe

T has surpassed the earning power of the


Hollywood movie industry. In 2009, U.S. con-
sumers bought almost $20
Photoshop, and Adobe Flash. Programmers are then
responsible for coding the scenarios developed by
these designers. Using
billion worth of video games languages such as C, C++,
and accessories, whereas Assembly, and Java,
Hollywood took in just over programmers build the
$10 billion. Although some game and ensure that it
aspects of game develop- plays accurately.
ment, such as scenery de- Aside from program-
sign and certain aspects of mers and designers, play
programming, are being testers and quality assur-
sent offshore, the majority of ance professionals play the
game development requires games with the intent of
a creative team whose mem- breaking them or discover-
bers need to work in close ing bugs within the game
proximity to each other. interfaces or worlds. Play
Therefore, it is anticipated testing is an essential part
that most game develop- of the game development
ment jobs will stay in the process because it assists
United States. Consoles designers in determining
such as the Xbox 360 and which aspects of the game
the PlayStation 3 generate FIGURE 10 are most intriguing to play-
demand for large-scale Although Puzzle Pirates involves pirating activities, all major aspects of ers and which parts of the
games, but the popularity of the game are displayed as puzzles with no violence, making it suitable game need to be repaired
mobile devices such as for children. Check it out at www.puzzlepirates.com. or enhanced.
phones, iPads, and netbooks No matter what job you
is driving demand for lower- may pursue in the realm of
end, casual game applications. Casual games are gaming, you will need to have a two- or four-year col-
games that can be played relatively quickly, often lege degree. If you’re interested in gaming, then look
puzzle games. Demand for family-friendly games for a school with a solid animation or 3D art program
without violence, sex, and profanity is on the rise (see or a computer game programming curriculum.
Figure 10). With all this demand, there are many Programming requires a strong background in
opportunities for careers in game development. mathematics and physics to enable you to realistically
Game development jobs usually are split along two program environments that mimic the real world.
paths: designers and programmers. Game designers Proficiency with mathematics (especially geometry)
tend to be artistic and are responsible for creating 2D also helps with design careers. For more information
and 3D art, game interfaces, video sequences, special on gaming careers, check out the International Game
effects, game levels, and scenarios. Game designers Developers Association site (igda.org) and Game
must master software packages such as Autodesk 3ds Career Guide (gamecareerguide.com).

Working in Technical Services equipment and users is required on a regular


Technical services jobs are vital to keeping IT basis. The two major categories of technical
systems running. The people in these jobs services careers are information systems and
install and maintain the infrastructure behind support services.
the IT systems and work with end users to make
sure they can interact with the systems effec- Information Systems
tively. These also are the least likely IT jobs to be The information systems department keeps the
outsourced because hands-on work with networks and telecommunications up and

466 Technology in Action


FIGURE 11 e-mail and solve problems
At smaller companies, you may be fixing a user’s computer in the morning, installing for customers or employees,
and configuring a new network operating system in the afternoon, and troubleshoot- either remotely or in person.
ing a wiring problem (shown here) in the evening. Often helpdesk personnel are
called upon to train users on
the latest software and
hardware.
• Computer support technicians
go to a user’s physical location
and fix software and hardware
problems. They also often have
to chase down and repair
faults in the network
infrastructure.
As important as these people
are, they often receive a great
deal of abuse by angry users
whose computers are not work-
ing. When working in support
services, you need to be patient
and not be overly sensitive to
insults!
Technical services jobs often require two-year
running at all times. Within the department, college degrees or training at trade schools or
you’ll find a variety of positions. technical institutes. At smaller companies, job
• Network administrators (sometimes called duties tend to overlap between the helpdesk and
network engineers) install and configure technician jobs. These jobs are in demand. A
servers, design and plan networks, and test survey of more than 1,400 chief information
new networking equipment (see Figure 11). officers sponsored by Robert Half Technology
identified network administration, desktop
• Database administrators (DBAs) install and
support and Windows administration as the top
configure database servers and ensure that
skills needed by U.S. IT departments.
the servers provide an adequate level of ac-
cess to all users.
• Web server administrators install, config- How Should I Prepare
ure, and maintain Web servers and ensure
that the company maintains Internet connec- for a Job in IT?
tivity at all times. A job in IT requires a robust skill set and formal
• Telecommunications technicians oversee training and preparation. Most employers today
the communications infrastructure, includ- have an entry-level requirement of a college
ing training employees to use telecommuni- degree, a technical institute diploma, appropri-
cations equipment. They are often on call ate professional certifications, experience in the
24 hours a day. field, or a combination of these. How can you
prepare for a job in IT?
1. Get educated. Two- and four-year colleges
Support Services and universities normally offer three
As a member of the support services team, you
degrees to prepare students for IT careers:
interface with users (external customers or
computer science, MIS, and information
employees) and troubleshoot their computer
technology (although titles vary).
problems. These positions include the
Alternatives to colleges and universities
following:
are privately licensed technical (or trade)
• Helpdesk analysts staff the phones, schools. Generally, these programs focus on
respond to Internet live chat, or respond to building skill sets rapidly and qualifying

Technology in Focus: Careers in IT 467


SO YOU WANT TO BE A NETWORK ADMINISTRATOR?
ou know that network administrators are the running cable, and installing wireless media devices.

Y people who design, install, and maintain the


network equipment and infrastructure. But
what exactly do they do?
Installing and configuring security devices and
software are also critical jobs.
When equipment and cables break, network
Network administrators are involved in every stage administrators must locate the source of the trouble
of network planning and deployment. They decide and fix the problem. They also obtain and install
what equipment to buy and what type of media to use, updates to network software, and evaluate new
and they determine the correct topology for the net- equipment to determine whether the network should
work. They also often develop policies regarding net- be upgraded. In addition, they monitor the network
work usage, security measures, and hardware and performance to ensure that users’ needs are met.
software standards. Because of the importance of the Internet to most
After the planning is complete, network administra- organizations, network administrators ensure that the
tors help install the network (either by supervising Internet connection is maintained at all times, which
third-party contractors or by doing the work them- usually is a high priority on their to-do list. Finally,
selves). Typical installation tasks include configuring network administrators plan disaster recovery strategies
and installing client computers and peripherals, (such as what to do if a fire destroys the server room).

for a job in a specific field. The main advan- 3. Get experience. In addition to education,
tage of technical schools is that their employers want you to have experience,
programs usually take less time to complete even for entry-level jobs. While you’re still
than college degrees. However, to have a completing your education, consider get-
realistic chance of employment in IT fields ting an internship or part-time job in your
other than networking or Web develop- field of study. Many colleges will help you
ment, you should attend a degree-granting find internships and allow you to earn
college or university. credit toward your degree through intern-
2. Investigate professional certifications. ship programs.
Certifications attempt to provide a consis- 4. Do research. Find out as much as you can
tent method of measuring skill levels in about the company and the industry it is in
specific areas of IT. Hundreds of IT certifi- before going on an interview. Start with the
cations are available, most of which you get company’s Web site and then expand your
by passing a written exam. Software and search to business and trade publications
hardware vendors (such as Microsoft and such as Business Week and CIO magazines.
Cisco) and professional organizations (such
as the Computing Technology Industry
Association) often establish certification How Do I Find a Job
standards. Visit microsoft.com, cisco.com, in IT?
comptia.org, and sun.com for more
information on certifications. Training for a career is not useful unless you can
find a job at the end of your training. Here are
Employees with certifications generally some tips on getting a job.
earn more than employees who aren’t certi-
fied. However, most employers don’t view a 1. Visit your school’s placement office. Many
certification as a substitute for a college de- employers recruit at schools, and most
gree or a trade school program. You should schools maintain a placement office to help
think of certifications as an extra edge be- students find jobs. Employees in the place-
yond your formal education that will make ment office can help you with résumé prepa-
you more attractive to employers. To ensure ration and interviewing skills, and provide
you’re pursuing the right certifications, ask you with leads for internships and jobs.
employers which certifications they respect, 2. Visit online employment sites. Most IT
or explore online job sites to see which certi- jobs are advertised online at sites such as
fications are listed as desirable or required. Monster.com and Dice.com. Most of these

468 Technology in Action


FIGURE 12 postings detail the skill sets
Employment sites such as Dice.com enable you to search for specific jobs within a defined employers require. Focusing
geographic area. on coursework that will pro-
vide you with desirable skill
sets will make you more
marketable.
3. Start networking. Many jobs
Try a variety of terms are never advertised but in-
for best results stead are filled by word of
mouth. Seek out contacts in
your field and discuss job
prospects with them. Find
out what skills you need,
and ask them to recommend
others in the industry with
whom you can speak. Pro-
fessional organizations such
as the Association for Com-
puting Machinery (ACM)
offer one way to network.
sites allow you to store your resume online, These organizations often
and Dice (see Figure 12) allows employees have chapters on college campuses and offer
to browse resumes to find qualified em- reduced membership rates for students.
ployees. The contacts you make there could lead
Other sites also offer career resources, to your next job. Local user groups that are
including computerjobs.com, jobcircle. made up of working professionals with
com, techcareers.com, justtechjobs.com, similar interests (such as Microsoft pro-
linkedin.com, computerwork.com, grammers or Linux administrators) also are
careerbuilder.com, and gamasutra.com. good sources of contacts. Figure 13 lists
Begin looking at job postings on these sites major professional organizations you
early in your education, because these job should consider investigating.

FIGURE 13 Professional Organizations

Organization Name Purpose Web Site

Association for Computing Oldest scientific computing society. Maintains acm.org


Machinery (ACM) a strong focus on programming and systems
development.

Association for Information Organization of professionals who work in aisnet.org


Systems (AIS) academia and specialize in information
systems.

Association of Information Heavy focus on IT education and development aitp.org


Technology Professionals (AITP) of seminars and learning materials.

Institute of Electrical and Provides leadership and sets engineering ieee.org


Electronics Engineers (IEEE) standards for all types of network computing
devices and protocols.

Information Systems Security Not-for-profit, international organization of issa.org


Association (ISSA) information security professionals and
practitioners.

Technology in Focus: Careers in IT 469


FIGURE 14 Resources for Women in IT

Organization Name Purpose Web Site


Anita Borg Institute for Women Organization whose aim is to “increase the anitaborg.org
and Technology impact of women on all aspects of technology.”

Association for Women in A not-for-profit organization dedicated to awc-hq.org


Computing (AWC) promoting the advancement of women in
computing professions.

Center for Women and Established at the University of Maryland, umbc.edu/cwit


Information Technology (CWIT) Baltimore County (UMBC), the organization is
dedicated to providing global leadership in
achieving women’s full participation in all aspects
of IT.

Diversity/Careers in Engineering An online magazine whose articles cover career diversitycareers.com


& Information Technology issues focused on technical professionals who are
members of minority groups, women, or people
with disabilities.

Women in Technology A global trade association for tech-savvy, witi.com


International (WITI) professional women.

If you are a woman and are thinking opportunities. For example, Google pro-
about pursuing an IT career, there are many vides searchable job listings by geographic
resources and groups that cater to female IT location (see Figure 15). Check the sites of
professionals and students. The oldest and companies in which you are interested and
best-known organization is the Association then do a search on the sites for job open-
for Women in Computing, founded in 1978. ings or, if provided, click their Employment
Figure 14 provides a list of resources to in- links.
vestigate. The outlook for IT jobs should continue to be
4. Check corporate Web sites for jobs. positive in the future. We wish you luck with
Many corporate Web sites list current job your education and job search.

FIGURE 15
Corporate Web sites often list available jobs. The Google site arranges jobs by location and then by broad
categories to help you zero in on the right job.

470 Technology in Action


Multiple Choice
Instructions: Answer the multiple-choice questions below for more practice with key terms and concepts from
this Technology in Focus feature.

1. The individuals responsible for making a Web site 6. Which of the following statement about IT careers is
easy to navigate are referred to as true?
a. network engineers. a. IT employers typically prefer certification to
b. graphic designers. experience.
c. Web programmers. b. Women who have IT skills have limited
d. interface designers. opportunities.
c. Most IT jobs are being moved offshore.
2. What type of job involves a great deal of travel and
d. IT jobs require frequent interaction with others.
the ability to work independently?
a. Field based 7. Which task is not typically performed by a network
b. Project based administrator?
c. Office based a. Developing network usage policies
d. Home based b. Installing networks
c. Planning for disaster recovery
3. Which position is not typically a part of the informa-
d. Web site programming
tion systems department?
a. Helpdesk analysts 8. Social media directors are the people who are respon-
b. Telecommunications technicians sible for
c. Network administrators a. orchestrating the company strategy in online
d. Web server administrators venues.
b. providing feedback to Web site customers.
4. Outsourcing is thought to be an attractive option for
c. creating the look and feel of a Web site.
many companies because of
d. deploying the materials prepared by content
a. the emphasis on employee training.
creators.
b. the cost savings that can be realized.
c. increased data security. 9. The oldest scientific computing organization is the
d. the opportunity to experience new cultures and a. Institute of Electrical and Electronics Engineers.
ideas. b. Association for Computing Machinery.
c. Information Systems Security association.
5. Which role best describes those employees who
d. Association for Women in Computing.
design solutions to problems?
a. Project managers 10. Which position is part of the Web development
b. Network engineers department?
c. Systems analysts a. Systems analyst c. Programmer
d. Database developers b. Web content creator d. Technical writer

Technology in Focus: Careers in IT 471


ten
ten
chapter

behind the scenes:


building applications

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What is a system development life cycle, and what are the phases in the
cycle? (pp. 474–476)
2. What is the life cycle of a program? (p. 478)
3. What role does a problem statement play in programming? (pp. 478–480)
4. How do programmers create algorithms? (pp. 480–486)
5. How do programmers move from algorithm to code, and in what categories of lan-
guage might they code? (pp. 486–487)
6. How does a programmer move from code in a programming language to the 1s and
0s the CPU can understand? (pp. 487–493)
7. How is a program tested? (pp. 493–494)
8. What steps are involved in completing the program? (pp. 494–495)
9. How do programmers select the right programming language for a specific
task? (pp. 495–502)
10. What are the most popular programming languages for Windows and Web
applications? (pp. 502–505)

multimedia resources
multimedia
resources

Active Helpdesk
• Understanding Software Programming (p. 495)
• Selecting the Right Programming Language (p. 497)

Sound Bytes
• Programming for End Users (p. 479)
• Looping Around the IDE (p. 493)
• 3D Programming the Easy Way (p. 503)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Microsoft has a tool to
make gaming programming simpler for all of us. The tool is called XNA Game
Studio. This platform uses the C# programming language to develop video games
for both Windows and the Xbox 360 game system. When the game is complete, the
“developer” can distribute his or her creation to other players using the Xbox
Live network. Windows Phone 7, the operating system for Windows-based mobile
devices like the Microsoft Zune, now also supports XNA. So you can open up the
Platformer Starter Kit and start creating your own 2D game in an afternoon!
Tour the XNA Creators Club (creators.xna.com/en-US) to see the types
of games players from all over the world have created!

473
Understanding Understanding programming is therefore
an important piece of getting the most out of
Software your computer system. If you plan to use
Programming only off-the-shelf (existing) software, having
Every day we face a wide array of tasks. a basic knowledge of programming enables
Some tasks are complex and need a human you to understand how application software
touch; some require creative thought and is constructed and to add features that sup-
high-level organization. However, some port your personal needs. If you plan to cre-
tasks are routine, such as alphabetizing a ate custom applications from scratch, having
huge collection of invoices. Tasks that are a detailed knowledge of programming will
repetitive, work with electronic information, be critical to the successful completion of
and follow a series of clear steps are candi- your projects. In this chapter, we explore the
dates for automation with computers. stages of program development and survey
Why would I ever need to create a the most popular programming languages.
program? Well-designed computer pro-
grams already exist for many tasks. For ex-
ample, if you want to write a research paper,
The Life Cycle of an
Microsoft Word allows you to do just that. Information System
The program has already been designed to Generally speaking, a system is a collection
translate the tasks you want to accomplish of pieces working together to achieve a com-
into computer instructions. To do your mon goal. Your body, for example, is a sys-
work, you need only be familiar with the in- tem of muscles, organs, and other organized
terface of Word; you do not have to create a groups of cells working together. The college
program yourself. you attend is a system, too, in which admin-
However, for users who cannot find an istrators, faculty, students, and maintenance
existing software product to personnel work together. An
accomplish a task, program-
ming is mandatory. For ex-
ample, imagine that a
medical company comes up

Why do I need to
know some
programming?
information system in-
cludes data, people, proce-
dures, hardware, and


software. You interact
with a new smart bandage with information systems
that is designed to transmit all the time, whether you
medical information about a wound directly are at a grocery store, bank, or restaurant. In
to a diagnostic computer. (These devices are any of these instances, the parts of the sys-
currently under development.) No existing tem work together toward a similar goal. Be-
software product on the market is designed cause teams of individuals are required to
to accumulate and relay information in just develop such systems, they need to follow
this manner. Therefore, a team of software an organized process (set of steps) to ensure
programmers will have to create smart- that development proceeds in an orderly
bandage software. fashion.
If I’m not going to be a program- This set of steps is usually referred to as
mer, why do I need to know some the system development life cycle (SDLC).
programming? Even if you’ll never cre- Systems theory came long before program-
ate a program of your own, knowing the ba- ming: Everything is a part of something
sics of computer programming is still larger and something smaller. If you change
helpful. For example, most modern software one part of a system, other parts of the sys-
applications enable you to customize and tem also change. In this section, we provide
automate various features by using custom- you with an overview of systems develop-
built miniprograms called macros. By creat- ment and show you how programming fits
ing macros, you can ask the computer to into the cycle.
execute a complicated sequence of steps
with a single command. Understanding how
to program macros enables you to add cus-
System Development Life Cycle
tom commands to Word or Excel, for exam- Why do I need a process to develop
ple, and lets you automate frequently a system? To create a modern software
performed tasks, providing a huge boost package, an entire team of people is needed,
to your productivity. and a systematic approach is necessary.

474 Chapter 10 Behind the Scenes: Building Applications


Those programs are generally far more com- Figure 10.1
Problem/
plex than the ones you would write yourself, Opportunity Each step of the system
and they require many phases to make the Identification development life cycle
product complete and marketable. They must be completed before
you can progress to the
need to be available for multiple operating
next.
systems, work over networked environ-
Analysis
ments, and be free of errors and well sup-
ported. Therefore, a process often referred
to as the system development life cycle (SDLC)
is used.
What steps constitute the SDLC? Design
There are six steps in a common SDLC but that
model, as shown in Figure 10.1. This system doesn’t
is sometimes referred to as a “waterfall” sys- mean that the Development
tem because each step is dependent on the company has the &
previous step being completed first. A brief technical expertise Documentation
synopsis of each step follows. or the financial or op-
erational resources to
Testing
1. Problem and Opportunity Identifica- develop it. Similarly, there &
tion: Corporations are always attempt- may not be enough time to Installation
ing to break into new markets, develop develop the product fully.
new sources of customers, or launch Assuming the project is feasi-
new products. For example, when the ble, the analysis team studies the Maintenance
&
founders of eBay developed the idea of current system (if there is one) and de- Evaluation
an online auction community, they fines the user requirements of the pro-
needed a system that could serve cus- posed system. Finally, the analysts
tomers and allow them to interact with recommend a solution or plan of action,
each other. At other times, systems de- and the process moves to the design
velopment is driven by a company’s phase.
desire to serve its existing customers 3. Design: Before a house is built, blue-
more efficiently or to respond to prob- prints are developed so that the work-
lems with a current system. For exam- ers have a plan to follow. The design
ple, when traditional brick-and-mortar phase of the SDLC has the same objec-
businesses want to launch e-commerce tive: generating a detailed plan for pro-
sites, they need to develop systems for grammers to follow. The current and
customers to purchase products. proposed systems are documented
Whether solving an existing problem using flowcharts and data-flow dia-
or exploiting an opportunity, corpora- grams. Flowcharts are visual diagrams
tions usually generate more ideas for of a process, including the decisions
systems than they have the time and that need to be made along the way.
money to implement. Large corporations Data-flow diagrams trace all data in an
typically form a development steering information system from the point at
committee to evaluate systems develop- which data enters the system to its final
ment proposals. The committee reviews resting place (storage or output). The
ideas and decides which projects to take data-flow diagram in Figure 10.2 shows
forward based on available resources the flow of concert ticket information.
such as personnel and funding. The ultimate goal of the design
2. Analysis: In this phase, analysts ex- phase with respect to system software
plore in depth the problem to be solved development is to design a system that
and develop a program specification. details the software, inputs and out-
The program specification is a clear puts, backups and controls, and pro-
statement of the goals and objectives of cessing requirements of the problem. It
the project. It is also at this stage that is also in this phase that the “make or
the first feasibility assessment is per- buy” decision is made. Once the system
formed. The feasibility assessment de- plan is designed, a company evaluates
termines whether the project should go existing software packages (off-the-shelf
forward. You might have a great idea, software) to determine whether it needs

The Life Cycle of an Information System 475


Figure 10.2
Concert Hall
Data-flow diagrams illus- Concert
Ticket
trate the way the data Attendee
Agent
travels in a system. Here
the diagram documents
the top-level view of a tick- Ticket Request Ticketing Information
eting information system. Ticket
More detailed diagrams for Reservation
each portion of the system System
Customer Ticket Information Customer Preferences
would show other informa-
tion being tracked, such
as customer name and Customer
payment information. Ticket
Information

Concert
Hall

to develop a new piece of software or life cycle (PDLC), described in detail in


can buy something already on the mar- the rest of the chapter.
ket and adapt it to fit its needs. For in- 5. Testing and Installation: The next step
stance, if it wants to start an online in the SDLC is testing the program to
auction site to compete with eBay, it ensure it works properly and then in-
might not have to build its own system. stalling the program so that it can be
Numerous online auction software used.
packages are for sale. If the company
cannot find an existing package that 6. Maintenance and Evaluation: Once the
will work, then it would have to de- system is installed, its performance
velop its own system. Alternatively, it must be monitored to determine
could outsource (hire someone outside whether it is still meeting the needs of
the corporation) to develop the pro- the end users. Bugs (errors) that were
gram it needs. not detected in the testing phase but
that the users discover subsequently
4. Development and Documentation: It is must be corrected. Additional enhance-
during this phase that actual program- ments that users request are evaluated
ming takes place. This phase is also the so that appropriate program modifica-
first part of the program development tions can be made.
The waterfall model is an idealized view of
BITS software development. Most developers fol-
AND The More Minds the Better low some variation of it, however. For
BYTES example, a design team may “spiral,” so
a group that is supporting the work of
In each phase of software program creation, a style of interaction named joint another group will work concurrently with
application development (JAD) is useful in creating successful, flexible results. JAD that group on development. (This contrasts
is popular because it helps designers adapt to changes in program specifications with workflows in which the groups work in-
quickly. In JAD, the customer is intimately involved in the project right from the dependently, one after the other.) Often there
beginning. Slow communication and lengthy feedback time make the traditional is a “backflow” up the waterfall, because
development process extremely time consuming. In JAD “workshops,” there are no even well-designed projects can require re-
communication delays. Such workshops usually include end users, developers, sub- design and specification changes midstream.
ject experts, observers (such as senior managers), and a facilitator. The facilitator Some people criticize the waterfall model
enforces the rules of the meeting to make sure all voices are heard and agreement for taking too long to provide actual working
is reached as quickly as possible. Also called accelerated design or facilitated team software to the client. This may contribute to
techniques, JAD’s goal is to improve design quality by fostering clear communica- scope creep, an ever-changing set of requests
tion. For more details, refer to the articles located on The Facilitator Web site from the clients for additional features as
(thefacilitator.com/htdocs/article11.html). they wait longer and longer to see a working
prototype. Other developmental models are

476 Chapter 10 Behind the Scenes: Building Applications


ETHICS
IN IT When Software Kills

Building a software application is a process that involves many people Although the basic mistakes involved poor software engineering prac-
and requires many decisions. But what happens when the released tices, many different factors explained the full set of accidents including:
product is defective—tragically defective?
• Simple programming errors
The most infamous example of this was the computerized radiation
• Inadequate safety engineering
therapy machine called the Therac-25 (see Figure 10.3). Between June
• Poor human–computer interaction design
1985 and January 1987, six known accidents in the United States and
Canada led to massive radiation overdoses by the Therac-25, resulting in • Too little focus on safety by the manufacturing organization
the death of three patients and serious injuries to three others. This error • Inadequate reporting structure at the company level and as
has been described as the worst series of radiation accidents in the his- required by the U.S. government
tory of medical accelerators. In events such as this one, who should be held responsible for produc-
The software was responsible for monitoring the machine’s status, ing defective software? Is it the corporate management that did not insti-
accepting input about the treatment desired, and setting the machine up tute a defined software process? Is it the production managers, who
for treatment. It turned on the beam in response to an operator com- forced tight schedules that demanded risky software engineering prac-
mand and turned off the beam when treatment was completed, when an tices? What about the software engineers who wrote the defective code?
operator commanded it, or when a malfunction was detected. The very first article of the code of ethics of the Institute of Electrical and
In the first accident, a 61-year-old woman was receiving follow-up Electronic Engineers (IEEE) states, “[We] accept responsibility in making
radiation after surgery for breast cancer. When the machine turned on, engineering decisions consistent with the safety, health, and welfare of the
she said that she felt a “tremendous force of heat . . . this red-hot sensa- public, and to disclose promptly factors that might endanger the public or
tion.” When the technician came in and the patient said that she had the environment.” What about users of the software? Can they be held
been burned, the technician replied that it was not possible. The patient responsible for accidents? What if they made changes to the system?
went home but was soon in so much pain that she went to the local hos- The Association for Computing Machinery (ACM) and the IEEE have
pital. Hospital staff determined that the patient was experiencing a nor- established eight principles for ethical software engineering practices:
mal reaction to the radiation therapy and advised her to continue
1. Public: Software engineers shall act consistently with the public
treatments.
interest.
Although the therapeutic dose was expected to be about 200 rads, it
2. Client and Employer: Software engineers shall act in a manner
was later estimated that the patient had received one or two doses of ra-
that is in the best interests of their client and employer consistent
diation in the 15,000- to 20,000-rad range (doses of 1,000 rads can be with the public interest.
fatal). The hospital explained that part of the confusion happened be-
3. Product: Software engineers shall ensure that their products and
cause staff members had never seen a radiation overdose of that magni- related modifications meet the highest professional standards
tude before. Eventually the patient lost her breast, lost the use of her possible.
shoulder and arm, and was in constant pain. 4. Judgment: Software engineers shall main-
Other patients had similar incidents, some dying tain integrity and independence in their
as a result of complications from the error in the professional judgment.
dosage. 5. Management: Software engineering man-
In the years since these accidents, much agers and leaders shall subscribe to and
analysis has been done to see how the tragedy promote an ethical approach to the man-
could have been avoided. One notable item is that agement of software development and
remarkably little software documentation was maintenance.
produced by the two manufacturing companies 6. Profession: Software engineers shall
involved during development. A memo by the advance the integrity and reputation of
Food and Drug Administration reviewing the inci- the profession consistent with the public
dent said, “Unfortunately, the company response interest.
also seems to point out an apparent lack of docu- 7. Colleagues: Software engineers shall be
mentation on software specifications and a soft- fair to and supportive of their colleagues.
ware test plan.” 8. Self: Software engineers shall participate in
In addition, testing was not done in a rigorous lifelong learning regarding the practice of
manner. A “small amount” of software testing was their profession and shall promote an ethical
approach to the practice of the profession.
done on a simulator, but most testing was done at
the system level rather than by examining soft- Figure 10.3 Only through constant vigilance on the part
ware and hardware separately. It appears that The Therac-25 incident reminds us of the of each software programmer, manager, and
machine and software testing was minimal, with responsibilities incumbent on program- testing professional will situations such as the
most effort directed at the integrated system test. mers, system designers, and system users. Therac-25 be prevented.

The Life Cycle of an Information System 477


being used in the industry to address these The steps are known as an algorithm.
issues (see the Bits and Bytes sidebar, “The At this stage, the algorithm is written in
More Minds the Better” on page 476.) natural, ordinary language (such as
English).
The Life Cycle of a 3. Coding: The algorithm is then trans-
lated into programming code, a lan-
Program guage that is friendlier to humans than
Programming often begins with nothing the 1s and 0s that the CPU speaks but is
more than a problem or a request, such as still highly structured. By coding the al-
“We can’t get our budget reports out on gorithm, programmers must think in
time,” or “Can you tell me how many trans- terms of the operations that a CPU can
fer students have applied to our college?” perform.
When problems or requests such as these 4. Debugging: The code then goes
arise, someone realizes that computer pro- through a process of debugging in
grams could solve these problems more effi- which the programmers find and repair
ciently and reliably than the procedures any known errors in the code.
currently in place. A proposal will be devel-
oped for a system to solve this problem and, 5. Finishing the Project: The software is
as you recall from the earlier section, pro- tested by both the programming team
gramming is part of the development stage and the people who will use the pro-
for the overall project. gram. The results of the entire project
What is programming? Once a proj- are documented for the users and the
Figure 10.4 ect has been deemed feasible and a plan is in development team. Finally, users are
place, the work of programming begins. trained so that they can use the
The stages followed by
each programming project Programming is the process of translating a program efficiently.
from conception to final task into a series of commands a computer Figure 10.4 illustrates the steps of a
deployment are collec- will use to perform that task. It involves
tively referred to as the program’s life cycle.
program development life identifying which parts of a task a computer Now that you have an overview of the
cycle. can perform, describing those tasks in a process involved in developing a program,
highly specific and complete manner, let’s look at each step in more detail.
Program Development Life Cycle and, finally, translating this descrip-
tion into the language spoken by the
Step 1: computer’s central processing unit Describing the Problem:
Describing the Problem
(The Problem Statement)
(CPU). The Problem Statement
How do programmers tackle
a programming project? Just as The problem statement is the starting point
an information system has a develop- of programming work. It is a clear descrip-
Step 2: ment life cycle, each programming tion of what tasks the computer program
Making a Plan project follows several stages from must accomplish and how the program will
(Algorithm Development) execute these tasks and respond to unusual
conception to final deployment. This
process, described below, is some- situations. Programmers develop problem
times referred to as the program de- statements so that they can better under-
Step 3: velopment life cycle (PDLC). stand the goals of their programming efforts.
Coding What kind of problems can com-
(Speaking the Language 1. Describing the Problem: First, puter programs solve? Not every
of the Computer) programmers must develop a problem is well suited to a computerized so-
complete description of the prob- lution. The strengths of computing machines
lem. The problem statement iden- are that they are fast and work without
Step 4:
tifies the task to be automated error. Unlike humans, computers don’t in-
Debugging and describes how the software troduce mistakes because they’re tired or
(Getting Rid of Errors) program will behave. stressed. Thus, as mentioned earlier, tasks
2. Making a Plan: The problem that are repetitive, work with electronic in-
statement is next translated into a formation, and follow a series of clear steps
Step 5: set of specific, sequential steps are good candidates for computerization.
Finishing the Project that describe exactly what the This might sound as if computers only
(Testing and Documentation)
computer program must do to help us with the dullest and most simplistic
complete the work. tasks. However, many sophisticated problems

478 Chapter 10 Behind the Scenes: Building Applications


can be broken down into a series of easily parking garage. Your salary is $7.50 per hour
computerized tasks. For example, for an eight-hour shift, but if you work more
pharmaceutical companies design drugs than eight hours a day, you will get time and
using complex computer programs that a half, which is $11.25 per hour, for the over-
model molecules. Using time work. To determine how
simulation software to much money you make in
perform “dry” chemistry,
chemists can quickly
“create” new drugs and
“ Users
understand the
any given day, you could
multiply this in your mind,
write it on a piece of paper,
determine whether they will jobs they want or use a calculator; alterna-
have the desired pharmaco- done, but not the tively, you could create a
logical effects. Scientists programming simple computer program
then select the most promis- to do the work for you. In
behind them.
ing choices and begin to test
those compounds in the
“wet” laboratory.
Still, computers cannot
” this example, what are the
three elements of the prob-
lem statement?
1. Data (Input): The data you have at the
yet act with intuition or be spontaneously
beginning of the problem, which is the
creative. They can attack highly challenging
number of hours you worked and the
problems such as making weather predic-
pay rate.
tions or playing chess, but only in a manner
that takes advantage of what computers do 2. Information (Output): The information
best—making fast, reliable computations. you need to have at the end of the prob-
How do programmers create prob- lem, which is your total pay for the day.
lem statements? Most computer users 3. Method (Process): The set of steps that
understand what jobs (or problems) they will take you from your input to an out-
want to computerize but not the details of put. In this case, the computer program
the programming process. Therefore, the would check if you worked more than
goal in creating a useful problem statement eight hours. (That is important because
is to have programmers interact with users it determines if you are paid overtime.)
to describe three things relevant to creating If you did not work overtime, then the
a useful program: data, information, and output would be $7.50 multiplied by
method. the total number of hours you worked
1. Data is the raw input that users have at ($60.00 for eight hours). If you did work
the start of the job. It will be fed into the overtime, then the program would cal-
program. culate your pay as eight hours at $7.50
per hour for the regular part of your
2. Information is the result, or output, shift, plus an additional $11.25 multi-
that the users require at the end of the plied by the number of overtime hours
job. The program produces this infor- you worked. This processing thereby
mation from data. transforms your input into your desired
3. Method, described precisely, is the output.
process of how the program converts
the inputs into the correct outputs. How do programmers handle bad
inputs? In the problem statement, pro-
For example, say you want to compute grammers also must describe what the pro-
how much money you’ll earn working at a gram should do if the input data is invalid
or just gibberish. (Users do make mistakes.)
This part of the problem statement is re-
SOUND Programming for
BYTE ferred to as error handling. The problem
End Users statement also includes a testing plan that
lists specific input numbers the program
In this Sound Byte, you’ll be guided through the creation would typically expect the user to enter. It
of a macro in the Microsoft Office 2010 suite. You’ll then lists the precise output values that a
learn how Office enables you to program with macros perfect program would return for those
to customize and extend the capabilities it offers.
input values. Later, in a testing process, pro-
grammers use the input and output data

The Life Cycle of a Program 479


Figure 10.5 COMPLETE PROBLEM STATEMENT FOR PARKING GARAGE EXAMPLE
Problem Statement
Program Goal Compute the total pay for a fixed number of hours worked at a parking garage.

Input Number of hours worked (a positive number)

Output Total pay earned (a positive number)

Process Total pay earned is computed as $7.50 per hour for the first 8 hours worked each day. Any hours worked beyond the first 8 are
calculated at $11.25 per hour.

Error Handling The input (number of hours worked) must be a positive real number. If it is a negative number or other unacceptable character, the
program will force the user to re-enter the information.

Testing Plan Input Output Notes


8 8*7.50 Testing positive input

3 3*7.50 Testing positive input

12 8*7.50 ⫹ 4*11.25 Testing overtime input

⫺6 Error message/ask user to re-enter value Handling error

values from the testing plan to determine Is there a standard format for a
whether the program they created works in problem statement? Most companies
the way it should. (We discuss the testing (and instructors) have their own format
process later in this chapter.) for documenting a problem statement.
Does the testing plan cover every However, all problem statements include
possible use of the program? The the same basic components: the data that
testing plan cannot list every input that the is expected to be provided (inputs), the
program could ever encounter. Instead, pro- information that is expected to be produced
grammers work with users to identify the (outputs), the rules for transforming the
categories of inputs that will be encoun- input into output (processing), an
tered, find a typical example of each input explanation of how the program will
category, and specify what kind of output respond if users enter data that doesn’t
must be generated. In the preceding parking make sense (error handling), and a testing
garage pay example, the error-handling plan. Figure 10.5 shows a sample problem
process would describe what the program statement for our parking garage
would do if you happened to enter “-8” (or example.
any other nonsense character) for the num-
ber of hours you worked. The error han-
dling would specify whether the program Making a Plan: Algorithm
would return a negative value, prompt you Development
to re-enter the input, or yell at you and shut
down (well, maybe not exactly). We could Once programmers understand exactly what
expect three categories of inputs in the park- the program must do and have created the
ing garage example. The user might enter: final problem statement, they can begin
developing a detailed algorithm, a set of
• A negative number for hours worked specific, sequential steps that describe in
that day natural language exactly what the computer
• A positive number equal to or less than program must do to complete its task. Let’s
eight look at some ways in which programmers
• A positive number greater than eight design and test algorithms.
Do algorithms appear only in
The testing plan would describe how the programming? Although the term
error would be managed or how the output algorithm may sound like it would fall only
would be generated for each input category. under the domain of computing, you design

480 Chapter 10 Behind the Scenes: Building Applications


and execute algorithms (or problem-solving to accomplish these tasks. This algorithm
procedures) in your daily life. For example, lays out a specific plan that encapsulates all
say you are planning your morning. You of the choices you need to make in the
know you need to (1) get gas for your car, course of completing a particular task and
(2) swing past the café and pick up a mocha shows the specific sequence in which these
latté, and (3) stop by the bookstore and buy tasks will occur. At any point in the morn-
a textbook before your 9 A.M. accounting lec- ing, you could gather your current data
ture. You quickly think over the costs and (your inputs)—“I have $20 and my Visa
decide it will take $80 to buy all three. In card, but the ATM machine is down”—and
what order will you accomplish all these the algorithm would tell you unambigu-
tasks? How do you decide? Should you try ously what your next step should be.
to minimize the distance you’ll travel or the What are the limitations of algo-
time you’ll spend driving? What happens if rithms? The deterministic nature of an al-
you forget your credit card? gorithm enables us to describe it completely
Figure 10.6 presents an algorithm you on a simple piece of paper. An algorithm is a
could develop to make decisions about how series of steps that is completely known: At
each point we know exactly what step to
take next. However, not all problems can be
described as a fixed sequence of predeter-
mined steps; some involve random and un-
Wake up predictable events. For example, although
the program that computes your parking
garage take-home pay each day works flaw-
lessly, programs that predict stock prices are
often wrong because many random events
Check wallet
for $ (inputs), such as a flood in Costa Rica or a
shipping delay in California, can change the
outcomes (outputs).
How do programmers represent an
algorithm? Programmers have several
Do I have visual tools at their disposal to help them
> $80? document the decision points and flow of
Yes
es No
their algorithm.
Flowcharts provide a visual representa-
Yes Do I have tion of the patterns the algorithm comprises.
Head off a credit card
to café with me? Figure 10.6 presents an example of a flow-
chart used to depict the flow of an algo-
rithm. Specific shape symbols indicate
No
program behaviors and decision types.
Go get gas Diamonds indicate that a yes/no decision
Yes Go to the ATM will be performed, and rectangles indicate
for cash
an instruction to follow. Figure 10.7 lists
additional flowcharting symbols and
explains what they indicate.
Buy textbook Many software packages make it easy for
at bookstore
programmers to create and modify flow-
Did I get $80
from the ATM? charts. Microsoft Visio is one popular flow-
charting program.
Go to Pseudocode is a text-based approach to
accounting No documenting an algorithm. In pseudocode,
lecture words describe the actions that the algo-
rithm will take. Pseudocode is organized
Figure 10.6 like an outline, with differing levels of in-
dentation to indicate the flow of actions
An algorithm you might use to plan your morning would
include several steps that encapsulate all of the deci- within the program. There is no standard set
sions you might need to make and show the specific of vocabulary for pseudocode. Programmers
sequence in which these steps would occur. use a combination of common words in their

The Life Cycle of a Program 481


Figure 10.7 BI
BINARY DECISION
Standard symbols used in y
A yes/no question will be asked here
flowcharts.
Diamond

PROCESS
P
Series
S of steps of work will be done here
Rectangle

INPUT/OUTPUT
IN
Data
D will be read (input) or printed (output)
Parallelogram
am

Oval TERMINATE
Seen at the beginning or end of the program

Directed Line DIRECTION OF FLOW


Shows the path to follow to the next executable instruction

natural language and the special words that action first, that action second, another action
are commands in the programming lan- third, and so on. However, only the simplest
guage they are using. algorithms execute the same series of actions
every time they run.
Figure 10.8 Developing an Algorithm: Decision Problems that are more complex involve
Decision points force the choices and, therefore, cannot follow a se-
program to travel down
Making and Design quential list of steps to generate the correct
one branch of the algo- How do program- output. Instead, the list of steps created for
rithm or another.
mers develop an complex problems includes decision points,
Ask for # of
algorithm? When places where the program must choose from
Hours Worked programmers develop an array of different actions based on the
an algorithm, they con- value of its current inputs. For example, a
vert the problem binary decision (shown in a flowchart as a
statement into a list diamond) will have two possible paths that
Read # of of steps (or actions) can be taken, depending on the value of the
Hours Worked the program will take. inputs. Programmers convert a problem into
For simple problems, an algorithm by listing the sequence of ac-
Decision point this list is straightfor- tions that must be taken and recognizing the
ward: The program places where decisions must be made.
completes this In our parking garage example, if the
Is Number number of hours you worked in a given day
Yes of Hours Worked No
<= 8?
is eight or less, the program performs one
Program executes Program executes simple calculation: It multiplies the number
one set of steps if different set of
answer is Yes steps if answer of hours worked by $7.50. If you worked
is No more than eight hours in a day, then the
program takes a different path and per-
Total Pay = forms a different calculation, as shown in
Total Pay =
$7.50 * Number
$7.50 * 8 + $11.25 * Figure 10.8.
(Number of Hours
of Hours Worked
Worked – 8)
What kinds of decision points are
there? Two main types of decisions
change the flow of an algorithm. One deci-
sion point that appears often in algorithms
Done Done is like a “fork in the road” or a branch. Such
decision points are called binary decisions

482 Chapter 10 Behind the Scenes: Building Applications


because they can be answered in one of only 3. Compute the pay earned that day.
two ways: yes (true) or no (false). For exam- 4. Add that day’s pay to the total pay for
ple, the answer to the question, “Did you the week.
work at most eight hours today?” (Is num-
ber of hours worked <⫽ 8 hours?), shown in On Tuesday, the algorithm would loop
Figure 10.8, is a binary decision because the back, repeating the same sequence of steps it
answer can be only yes or no. The result of performed on Monday, adding the amount
the decision determines which path the al- you earned on Tuesday to the Total Pay
gorithm follows. If the answer is yes, the amount. The algorithm would continue to
program follows one sequence of steps; if perform this loop for each day (seven times)
the answer is no, it follows a different path. until it hits Monday again. At that point, the
A second decision point that often ap- decision “Are we still in the same week?”
pears in algorithms is a repeating loop. In a would become false. The program would
loop, a question is asked, and if the answer stop, calculate the total pay for the entire
is yes, a set of actions is performed. Once the week of work, and print the weekly pay-
set of actions has finished, the question is check. As you can see, there are three impor-
asked again, creating a loop. As long as the tant features to look for in a loop:
answer to the question is yes, the algorithm
1. A beginning point, or initial value. In
continues to loop around and repeat the
our example, the Total Pay for the week
same set of actions. When the answer to the
starts at an initial value of $0.00.
question is no, the algorithm breaks free of
the looping and moves on to the first step 2. A set of actions that will be performed.
that follows the loop. In our example, the algorithm com-
In our parking garage example, the algo- putes the daily pay each time it passes
rithm would require a loop if you wanted to through the loop.
compute the total pay you earned in a full 3. A check to see whether the loop is
week of work rather than in just a single day. completed, or a test condition. In our
For each day of the week, you would want to example, the algorithm should run the
perform the same set of steps. Figure 10.9 loop seven times, no more and no
shows how the idea of looping would be fewer.
useful in this part of our parking garage pro-
gram. On Monday, the program would set Almost every higher-level programming
the Total Pay value to $0.00. It would then language supports both making binary
perform the following set of steps: yes/no decisions and handling repeating
loops. Control structures is the general term
1. Read the number of hours worked that used for keywords in a programming lan-
day. guage that allow the programmer to control
2. Determine whether you qualified for (redirect) the flow of the program based on a
overtime pay. decision.

Start on Monday Figure 10.9


Start with Total Pay for Week = 0.00 Initial value
In this example of a loop,
we stay in the loop until
Test condition the test condition is no
longer true. We then
Are we still in the same week? No break free from the loop
If test
condition passes, If test condition and move on to the next
loop continues Yes fails, break out of step in the algorithm,
loop and move which is outside of the
to next step loop.
Calculate Pay for the Day

Calculate Total Pay for Week So Far

Update
Bump to Next Day

Print Weekly Paycheck

The Life Cycle of a Program 483


How do programmers create algo- they are at the level of commands that most
rithms for specific tasks? It’s difficult programming languages support (that is,
for human beings to force their problem- they tell the computer to print and read
solving skills into the highly structured, de- statements). Therefore, the operation Get
tailed algorithms that computing machines Input has been converted to an algorithm.
require. Therefore, several different method- Next, we move to the second high-level
ologies have been developed to support pro- task, Process Data, and break it into sub-
grammers, including top-down design and tasks. In this case, we need to determine
object-oriented analysis. whether overtime hours were worked and
compute the pay accordingly. We continue
Top-Down Design to apply top-down design on all tasks until
we can no longer break tasks into subtasks,
What is top-down design? Top-down as shown in Figure 10.10c.
design is a systematic approach in which a
problem is broken into a series of high-level
tasks. In top-down design, programmers Object-Oriented Analysis
apply the same strategy repeatedly, breaking What is object-oriented analysis? A
each task into successively more detailed very different approach to generating an
subtasks. They continue until they have a se- algorithm is object-oriented analysis. With
quence of steps that are close to the types of object-oriented analysis, programmers first
commands allowed by the programming identify all of the categories of inputs that
language they will use for coding. (Previous are part of the problem the program is
coding experience helps programmers know trying to solve. These categories are called
the appropriate level of detail to specify in an classes. For example, the classes in our
algorithm generated by top-down design.) parking garage example might include a
How is top-down design used in TimeCard class and an Employee class.
programming? Let’s consider our park- Classes are further defined by informa-
ing garage example again. Initially, top- tion (data) and actions (methods or
down design would identify three behaviors) associated with the class. For ex-
high-level tasks: Get Input, Process Data, ample, data for an Employee would include
and Output Results (see Figure 10.10a). a Name, Address, and Social Security Num-
Applying top-down design to the first ber, whereas the methods for the Employee
operation, Get Input, we’d produce the would be GoToWork(), LeaveWork(), or
more detailed sequence of steps shown in CollectPay(). Think of classes as the things
Figure 10.10b: Announce Program, Give around you in your world—books, ac-
Users Instructions, and Read the Input counts, shopping carts. The data of the class
NumberHoursWorkedToday. When we try describes the class, so classes are often char-
to refine each of these steps, we find that acterized as nouns, whereas methods are

Figure 10.10 a b c
In this figure, (a) a top-
down design is applied to Announce Program
the highest level of task Give Users Instructions
in our parking garage GET INPUT
example, (b) the tasks are Read the Input
further refined into sub- NumberHoursWorkedToday
tasks, and (c) subtasks are
refined into a sequence if (NumberHoursWorkedToday <= 8)
of instructions—an Determine if They Qualify Pay = $7.50 * NumberHoursWorkedToday
algorithm. PROCESS for Overtime
DATA else
Compute Pay Pay = $7.50 * 8 +
$11.25 * (NumberHoursWorkedToday – 8)

Print TotalPay
OUTPUT
RESULTS

484 Chapter 10 Behind the Scenes: Building Applications


often characterized as verbs—the ways that
EMPLOYEE CLASS
the class acts and communicates with other
classes. Figure 10.11 shows the data and NAME
methods the Employee class would contain. ADDRESS
In the object-oriented approach, program- Data
SOCIAL SECURITY #
(Information)
mers identify and define each class, as well as PAY GRADE
their data and methods. Programmers then TOTAL PAY
determine how classes interact with each
other. For example, when an Employee does GoToWork()
GoToWork(), the Employee class must “talk” Methods
LeaveWork()
to the TimeCard class and punch in for the (Actions)
CollectPay()
day, setting the StartTime on the TimeCard.
Programmers may need to create several
different examples of a class. Each of
these examples is an object. In
Figure 10.11, John Doe, Jane John Doe Jane Doe Bill McGillicutty
Objects 1313 Mockingbird 1060 West Addison 0 Freedom Square
Doe, and Bill McGillicutty are (Specific 011-11-0000 999-09-0909 123-45-6789
each Employee objects (spe- Employees) 5 10 4
cific examples of the Em- $25.32 $57.33 $39.80
ployee class). Each object from
Employee1 Employee2 Employee3
a given class is described by the same
pieces of data and has the same methods; Figure 10.11
for example, John, Jane, and Bill are all Em- class is called the derived class, as illus-
The Employee class in-
ployees and can use the GoToWork, Leave- trated in Figure 10.12. You can compare this cludes the complete set
Work, and CollectPay methods. However, with making cookies. For example, you have of information (data) and
because John and Jane have different pay a basic recipe for sugar cookies (base class: actions (methods or
grades (PayGrade 5 and PayGrade 10, re- sugar cookies). However, in your family, behaviors) that describe
some people like chocolate-flavored sugar an Employee.
spectively), and because they all have differ-
ent Social Security numbers, they are all cookies (derived class: chocolate cookies),
unique objects. and others like almond-flavored sugar cook-
Why would a developer select the ies (derived class: almond cookies). All the
Figure 10.12
object-oriented approach over top- cookies share the attributes of the basic
sugar cookie. However, instead of creating In object-oriented pro-
down design? Object-oriented analysis gramming (OOP), a single
forces programmers to think in general two entirely new recipes—one for chocolate base class—for example,
terms about their problem, which tends to cookies and one for almond cookies—the Shape—helps you quickly
lead to more general and reusable solutions. two varieties inherit the basic sugar cookie create many additional
An important aspect of object-oriented (base class) recipe; the recipe is then cus- derived classes, such as
design is that it leads to reusability. tomized to make the chocolate- and almond- Polygon and Ellipse.
Because object-oriented design flavored sugar cookies (derived classes).
generates a family of classes for each
project, programmers can easily
reuse existing classes from other Is a type of Shape
projects, enabling them to produce Triangle Is a type of
new code quickly.
To take advantage of reuse, pro- Polygon Is a type of
grammers must study the relation-
ships between objects. Hierarchies of
objects can be built quickly in object- Ellipse
oriented languages using the mecha- Is a type of
nism of inheritance. Inheritance
means that a new class can automati- Is a type of
cally pick up all of the data and
methods of an existing class, and Is a type of
Square Rectangle
then extend and customize those to
Circle
fit its own specific needs.
The original class is called the
base class, and the new, modified

The Life Cycle of a Program 485


With the object-oriented approach, the How exactly do programmers move
majority of design time is spent in identify- from algorithm to code? Once
ing the classes required to solve the prob- programmers have an algorithm, in the
lem, modeling them as data and methods, form of either a flowchart or a series of
and thinking about what relationships they pseudocode statements, they scan the
need to be able to have with each other. algorithm and identify the key pieces of in-
Constructing the algorithm becomes a formation it uses to make decisions. What
process of enabling the objects to interact. steps are required for the calculation of new
information? What is the exact sequence of
the steps? Are there points where decisions
Coding: Speaking the Language of have to be made? What kinds of decisions
are made? Are there places where the same
the Computer steps are repeated several times? Once
Once programmers create an algorithm, the programmer identifies the required
they select the best programming language information and the flow of how it will be
for the problem and then translate the algo- changed by each step of the algorithm, he or
rithm into that language. she can begin converting the algorithm into
How is a person’s idea translated computer code in a specific programming
into CPU instructions? Translating an language.
algorithm into a programming language is
the act of coding. Programming languages Categories of Programming
are (somewhat!) readable by humans but Languages
then are translated into patterns of 1s and 0s What exactly is a programming
to be understood by the CPU. language? A programming language is a
Although programming languages free kind of “code” for the set of instructions the
programmers from having to think in CPU knows how to perform. Computer pro-
binary language (the 1s and 0s that gramming languages use special words and
computers understand), they still force strict rules so programmers can control the
programmers to translate the ideas of the CPU without having to know all of its hard-
algorithm into a highly precise format. ware details.
Programming languages are quite limited, What kinds of programming
allowing programmers to use only a few languages are there? Programming
specific words while still demanding a languages are classified in several major
consistent structure. groupings, sometimes referred to as
generations. With each generation in lan-
guage development, programmers have
been relieved of more of the burden of keep-
BITS My Algorithm Can Beat Your ing track of what the hardware requires. The
AND earliest languages—assembly language and
BYTES Algorithm! machine languages—required the program-
mer to know a great deal about how the
Programming became a competitive sport with the advent of LEGO MINDSTORMS. computer was constructed internally and
The First Lego League conducts a programming competition each year using the how it stored data. Programming is becom-
LEGO MINDSTORMS series of LEGO kits. These kits include gears, wheels, motors, ing easier as languages continue to become
and a motorized, programmable LEGO “brick” that contains a microprocessor. more closely matched to how humans think
Sensors feed the robots information such as sounds, images, and temperatures. about problems.
Teams then use ROBOLAB software to develop programs and send them to the brick’s How have modern programming
microprocessor. You can try out this software in a small demo at the ROBOLAB site languages evolved? A first-generation
(robolabonline.com). The unit can be told to turn the motor on or off, switch the language (1GL) is the actual machine lan-
direction of a wheel’s rotation, or turn on sensors to measure temperature or light guage of a CPU, the sequence of bits (1s and
levels. The ROBOLAB software even allows beginning programmers to drag and drop 0s) that the CPU understands. A second-
elements such as “if” statements and loops. Synthesizing their understanding of generation language (2GL) is also known as
motors and their talent for logical thinking, teams design robots that can travel an assembly language. Assembly languages
through mazes, cross bridges, and deliver packages—whatever tasks the LEGO allow programmers to write their programs
League has come up with for that year’s tournament (usfirst.org/firstlegoleague/ using a set of short, English-like commands
community/homepage.html). that speak directly to the CPU and give the
programmer direct control of hardware

486 Chapter 10 Behind the Scenes: Building Applications


resources. A third-generation language (3GL) answers by repeatedly applying the principles
uses symbols and commands to help pro- of logic, instead of by following a systematic
grammers tell the computer what to do. This algorithm that the programmer provided.
makes 3GL languages easier for humans to Figure 10.13 shows small code samples of
read and remember. Most programming lan- each generation of language.
guages today, including BASIC, FORTRAN, Do programmers have to use a
COBOL, C/C++, and Java, are considered higher-level programming language
third generation. to solve a problem with a computer?
Structured Query Language (SQL) is a No, experienced programmers sometimes
database programming language that is an write a program directly in the CPU’s assem-
example of a fourth-generation language bly language. However, the main advantage
(4GL). Many other database query lan- of higher-level programming languages—C
guages and report generators are also 4GLs. or Java, for example—is that they allow pro-
The following single SQL command would grammers to think in terms of the problem
check a huge table of data on the employees they are solving rather than worrying about
and build a new table showing all those em- the internal design and specific instructions
ployees who worked overtime: available for a given CPU. In addition,
higher-level programming languages have
SELECT * EMPLOYEES WHERE
the capability to produce a program easily
"TotalHours" TOTAL MORE THAN 8
that will run on differently configured CPUs.
But programmers must always work For example, if programmers wrote directly
from algorithms, correct? Not if they are in the assembly language for an Intel i7 CPU,
using a fifth-generation language (5GL). then they would have to rewrite the program
Fifth-generation languages are considered completely if they wanted it to run on a Sun
the most “natural” of languages. In a 5GL, a workstation with the UltraSPARC CPU.
problem is presented as a series of facts or Thus, higher-level programming languages
constraints instead of as a specific algorithm. offer portability—the capability to move a
The system of facts can then be queried completed solution easily from one type of
(asked) questions. PROLOG (PROgramming computer to another.
LOGic) is an example of a 5GL. A PROLOG
program could be a list of family relation-
ships and rules such as “Mike is Sally’s Creating Code: Writing the Program
brother. A brother and a sister have the same What happens first when you write a
mother and father.” Once a user has program? All of the inputs a program
amassed a huge collection of facts and rules, receives and all of the outputs the program
she can ask for a list of all Mike’s cousins, produces need to be stored in the computer’s
for example. PROLOG would find the RAM while the program is running. Each

SAMPLE CODE FOR DIFFERENT LANGUAGE LEVELS


Figure 10.13
AND GENERATIONS

Level Generation Example Sample Code


Low 1GL Machine Bits describe the commands to the CPU
1110 0101 1001 1111 0000 1011 1110 0110

2GL Assembly Words describe the commands to the CPU


ADD Register 3, Register 4, Register 5

High 3GL FORTRAN, BASIC, C, Java Symbols describe the commands to the CPU
Total Pay ⫽ Pay ⫹ Overtime Pay

4GL SQL More powerful commands allow complex work to be done


in a single sentence
SELECT isbn, title, price, price*0.06 AS sales_tax
FROM books WHERE price>100.00 ORDER BY title;

Natural 5GL PROLOG Programmers can build applications without specifying an


algorithm. Find all the people who are Mike’s cousins as:
?-cousin (Mike, family)

The Life Cycle of a Program 487


DIG The Building Blocks of Programming Languages:
DEEPER
Syntax, Keywords, Data Types, and Operators
Programming languages are evolving constantly. New languages emerge Loops are likewise translated from algorithm to code by using the ap-
every year, and existing languages change dramatically. Therefore, it propriate keyword from the language. For example, in the programming
would be extremely difficult and time consuming for programmers to language Visual Basic, programmers use the keywords For and Next to
learn every programming language. However, all languages have several implement a loop. After the keyword For, an input or output item is given
common elements: rules of syntax, a set of keywords, a group of sup- a starting value. Then the statements, or “sentences,” in the body of the
ported data types, and a set of allowed operators. By learning these four loop are executed. When the command Next is run, the program returns
concepts, a programmer will be better equipped to approach any new to the For statement and increments the value of the input or output item
language. by 1. It then tests that the value is still inside the range given. If it is, the
The transition from a well-designed algorithm to working code re- body of the loop is executed again. This continues until the value of the
quires a clear understanding of the rules (syntax) of the programming input or output item is outside the range listed. The loop is then ended,
language being used. Syntax is an agreed-upon set of rules defining and the statement that follows the loop is run. If we think back to the
how a language must be structured. The English language has a syntax parking garage example, the following lines of Visual Basic code loop to
that defines which symbols are words (for example, poodle is a word but
oodlep is not) and what order words and symbols (such as semicolons
and commas) must follow. Algorithm Flowchart
Likewise, all programming languages have a formal syntax that pro-
grammers must follow when creating code statements, which are sen-
tences in a code. Syntax errors are violations of the strict, precise set of
Is Hours
rules that defines the language. In a programming language, even mis- Yes No
Worked
placing a single comma or using a lowercase letter where a capital letter <= 8?
is required will generate a syntax error and make the program unusable.
Keywords are a set of words that have predefined meanings for a
particular language. Keywords translate the flow of the algorithm into the Pay =
Pay = ($7.50 * 8) + $11.25 *
structured code of the programming language. For example, when the $7.50 * Hours Worked (Hours Worked – 8)
algorithm indicates a decision point—a location where a binary decision
must be made—the programmer translates that binary decision into the
appropriate keyword or keywords from the language.
To illustrate further, in the programming language C++, the binary C++ if (HoursWorked <= 8)
decision asking whether you worked enough hours to qualify for over- Code Pay = 7.50 * HoursWorked;
time pay would use the keywords if else. At this point in the code, the else
program can follow one of two paths: If you indicated through your input Pay = (7.50 * 8) + (HoursWorked – 8) * 11.25;
that you worked fewer than or equal to eight hours, it takes one path; if
not (else), it follows another. Figure 10.14 shows the binary decision in Figure 10.14
the algorithm and the lines of C++ code for this decision using the if else The binary decision in the algorithm has been converted into C++
keywords. code.

input and each output item that the pro- asks for enough RAM storage space to hold
gram manipulates, also known as a an integer. After the RAM space is found, it
variable, needs to be announced early in the is reserved. As long as the program is run-
program so that memory space can be set ning, these RAM cells will be saved for the
aside. A variable declaration tells the oper- Day variable, and no other program can use
ating system that the program needs to allo- that memory until the program ends. From
cate storage space in RAM. The following that point on, when the program encounters
line of code is a variable declaration in the the symbol Day, it will access the memory it
language Java: reserved as Day and find the integer stored
int Day; there.
The following line of C++ code asks that
This variable’s name is Day. The “int” that
a decimal number (represented by the key-
precedes the Day variable indicates that this
word float) be stored in RAM:
variable will always be an integer (a whole
number such as 15 or –4). This statement float TotalPay;

488 Chapter 10 Behind the Scenes: Building Applications


sum up the total pay for the entire week. In this statement, the starting the language so that they can assign the most appropriate data type for
value of the input item Day is 1, and the program loops until Day equals 7: each input and output value, without wasting memory space.
For Day = 1 to 7 Operators are the coding symbols that represent the fundamental
Total Pay = Total Pay + Pay; actions of the language. Each programming language has its own set of
Next Day operators. Many languages include common algebraic operators such as
⫹, –, *, and / to represent the mathematical operations of addition, sub-
Often, a quick overview of a language’s keywords can reveal the
traction, multiplication, and division, respectively. Some languages, how-
unique focus of that language. For example, the language C++ includes
ever, introduce new symbols as operators. The language A Programmer’s
the keywords public, private, and protected, which indicate that the lan-
Language (APL) was designed to solve multidimensional mathematical
guage includes a mechanism for controlling security. Although people who
problems. APL includes less familiar operators such as rho, sigma, and
are new to a language might not immediately understand how these key-
iota, each representing a complex mathematical operation. Because it
words are used, examining the keywords of a language you are learning
contains many specialized operators, APL requires programmers to use a
will often tell you what special features the language has and will help you
special keyboard (see Figure 10.15).
ask important questions about it.
Programming languages sometimes include other unique operators.
Each time programmers want to store data in their program, they must
The C++ operator >>, for example, is used to tell the computer to read
ask the operating system for storage space at a random access memory
data from the keyboard or from a file. The C++ operator && is used to tell
(RAM) location. Data types describe the kind of data that is being stored at
the computer to check whether two statements are both true. “Is your age
the memory location. Each programming language has its own data types
greater than 20 AND less than 30?” is a question that requires the use of
(although there is some degree of overlap among languages). For example,
the && operator.
C++ includes data types that represent integers, real numbers, characters,
In the following C++ code, several operators are being used. The > op-
and Boolean (true–false) values. These C++ data types show up in code
erator checks whether the number of hours worked is greater than 0. The
statements as int for integer, float for real numbers, char for characters,
&& operator checks that the number of hours worked is simultaneously
and bool for Boolean values.
positive AND less than or equal to 8. If that happens, then the ⫽ operator
Because it takes more room to store a real number such as 18,743.23
sets the output Pay to equal the number of hours paid at $7.50 per hour:
than it does to store the integer 1, programmers use data types in their
code to indicate to the operating system how much memory it needs to al- if (Hours > 0 && Hours <= 8)
locate. Programmers must be familiar with all of the data types available in Pay = Hours * 7.50;
Knowing operators such as these, as well as the other common ele-
ments described earlier, helps programmers learn new programming
APL keyboard languages.

Figure 10.15
APL requires programmers to use
an APL keyboard that includes
the many specialized operators in
the language.

This line asks the operating system to Comments are written into the code in plain
find and reserve enough storage space for English. The compiler, a program that trans-
one real number. It then associates the sym- lates codes into binary 1s and 0s, just ignores
bol TotalPay with the address of the mem- comments. Comments are intended to be
ory cell where that value will be stored. read only by human programmers. Lan-
Can programmers leave notes to guages provide a special symbol or keyword
themselves inside a program? to indicate the beginning of a comment. In
Programmers often insert a comment (or C++, the symbol // at the beginning of a
remark) into program code to explain the line indicates that the rest of the line is a
purpose of a section of code, to indicate the comment. In Visual Basic, a single apostro-
date they wrote the program, or to include phe or the keyword REM, short for remark,
other important information about the code does the same thing.
so that fellow programmers can more easily What would completed code for a
understand and update it should the origi- program look like? Figure 10.16, pres-
nal programmer no longer be available. ents a completed C++ program for our

The Life Cycle of a Program 489


Comments (green)

Step 1:
Declare variables Keywords (blue)

Step 2:
Create loop

Step 3:
Collect input data

Step 4:
Check for errors

Commands (black)
Loop

Step 5:
Process data

Step 6:
Update variables

Figure 10.16
A complete C++ program
that solves the parking parking garage example. We’ll discuss later The next section (step 3) collects the input
garage pay problem. how you would actually enter this program data from the user. The program then checks
on your system. This program, which is writ- that the user entered a reasonable value
ten in a top-down style, does not make use (step 4). In this case, a positive number for
of objects. Each statement in the program is hours worked must be entered. Next, the
executed sequentially (that is, in order from program processes the data (step 5). If the
the first statement to the last) unless the pro- user worked eight or fewer hours, he or she
gram encounters a keyword that changes the is paid at the rate of $7.50, whereas hours
flow. In the figure, the program begins by de- exceeding eight are paid at $11.25.
claring the variables needed to store the pro- The final statement (step 6) updates the
gram’s inputs and outputs in RAM (step 1). value of the TotalPay variable. The last
Next, the for keyword begins a looping pat- bracket indicates that the program has
tern (step 2). All of the steps between the reached the end of a loop. The program will
very first bracket ({) and the last one (}) will repeat the loop to collect and process the in-
be repeated seven times to gather the total formation for the next day. When the seventh
pay for each day of the week. day of data has been processed, the Day

490 Chapter 10 Behind the Scenes: Building Applications


variable will be bumped up to the next Compilation
value, 8. This causes the program to fail the How does a programmer move from
test (Day <⫽ 7?). At that point, the program code in a programming language to
exits the loop, prints the results, and quits. the 1s and 0s the CPU can under-
Are there ways in which program- stand? Compilation is the process by
mers can make their code more use- which code is converted into machine
ful for the future? One aspect of language—the language the CPU can
converting an algorithm into good code is understand. A compiler is a program
the programmer’s ability to design general that understands both the syntax of the
code that can adapt easily to new settings. programming language and the exact
Sections of code that will be used repeatedly, structure of the CPU and its machine
with only slight modification, can be pack- language. It can “read” the source code,
aged into reusable “containers” or compo- which comprises the instructions program-
nents. Depending on the language, these mers have written in the higher-level lan-
reusable components are referred to as guage, and translate the source code directly
functions, methods, procedures, subroutines, into machine language—the binary patterns
modules, or packages. that will execute commands on the CPU.
In our program, we could create a func- You can learn more about the details of the
tion that implements the overtime pay rule. binary number system in the “Under the
As it stands in Figure 10.16, the code works Hood” Technology in Focus section.
only in situations in which the hourly pay is Each programming language has its own
exactly $7.50 and the bonus pay is exactly compiler. It is a program that you purchase
$11.25. However, if we rewrote this part of and install just like any other software on
the processing rules as a function, we could your system. Separate versions of the com-
have code that would work for any base pay piler are required if you want to compile
rate and any overtime rate. If the base pay code that will run on separate processor
rate or overtime rate changed, the function types. One version of a compiler would cre-
would use whichever values it was given as ate finished programs for a Sun UltraSPARC
input to compute the output pay variable. processor, for example, and another version
Such a function, as shown in Figure 10.17, of the compiler would create programs for
may be reused in many settings without an Intel i7 CPU.
changing any of the code.

Figure 10.17
A function is a reusable
Inputs Function Output
component that can be
used in different settings.
Hours
Compute
Base Pay Rate Pay
Pay
Overtime Rate

We can use the ComputePay function again and again in programs:

Brett Hours Base pay Overtime pay


BrettsPay = ComputePay(40, 7.50, 11.25);
40 $7.50 $11.25

MarinasPay = ComputePay(20, 10.50, 15.75); Marina Hours Base pay Overtime pay
20 $10.50 $15.75

The Life Cycle of a Program 491


At this stage, programmers finally have an interpreter. For development environ-
produced an executable program, the bi- ments in which many changes are still being
nary sequence that instructs the CPU to run made to the code, interpreters have an ad-
their code. Executable programs cannot be vantage because programmers do not have
read by human eyes because they are pure to wait for the entire program to be recom-
binary codes. They are stored as *.exe or piled each time they make a change. With
*.com files on Windows systems. interpreters, programmers can immediately
Does every programming language see the results of their program changes as
have a compiler? Some programming they are making them.
languages do not have a compiler, but use an
interpreter instead. An interpreter translates
the source code into an intermediate form, Coding Tools: Integrated
line by line. Each line is then executed as it is Development Environments
translated. The compilation process takes Are there any tools that make the
longer than the interpretation process because coding process easier? Modern pro-
in compilation all of the lines of source code gramming is supported by a collection of
are translated into machine language before tools that make the writing and testing of soft-
any lines are executed. However, the finished ware easier. Compiler products feature an
Figure 10.18 compiled program runs faster than an inter- integrated development environment (IDE),
The IDE for Microsoft preted program because the interpreter is con- a developmental tool that helps programmers
Visual C++ helps the pro- stantly translating and executing as it goes. write, compile, and test their programs. As is
grammer when he or she If producing the fastest executable pro- the case with compilers, every language has
is entering the code and
when logical errors are
gram is important, programmers will choose its own specific IDE. Figure 10.18 shows the
found. a language that uses a compiler instead of IDE for Microsoft Visual Studio using C++.

Color coding

Values of variables

Watch values of expressions

492 Chapter 10 Behind the Scenes: Building Applications


item in the list, the editor jumps to the line
SOUND Looping Around of code that contains the error, enabling the
BYTE the IDE programmer to repair syntax errors quickly.

In this Sound Byte, you’ll work in the Microsoft Visual Debugging: Getting Rid of Errors
Studio integrated development environment (IDE) with
the C++ programming language and examine how the Once the program has compiled without
basic control structures of programming languages do syntax errors, it has met all of the syntax
their work. rules of the language. However, this doesn’t
mean that the program behaves in a logical
way or that it appropriately addresses the
task the algorithm described. If program-
How does an IDE help program- mers made errors in the strategy used in the
mers when they are typing the algorithm or in how they translated the al-
code? The IDE includes tools that sup- gorithm to code, problems will occur. The
port programmers at every step of the cod- process of running the program over and
ing process. Code editing is the step in over to find errors and to make sure the pro-
which a programmer physically types the gram behaves in the way it should is termed
code into the computer. An IDE includes an debugging (see Figure 10.19).
editor, a special tool that helps program- How do programmers know
mers as they enter the code, highlighting whether there is anything wrong
keywords and alerting them to typos. Mod- with their program? At this point in the
ern IDE editors also automatically indent process, the testing plan that was docu-
the code correctly, align sections of code ap- mented as part of the problem statement be-
propriately, and apply color to code com- comes critically important to programmers.
ments to remind programmers that these The testing plan clearly lists input and out-
lines will not be executed as code. In addi- put values, showing how the users expect
tion, IDEs provide help files that document the program to behave in each input situa-
and provide examples of the proper use of tion. It is important that the testing plan
keywords and operators. contain enough specific examples to test
How does the IDE help program- every part of the program.
mers after code editing is In the parking garage problem, we want
finished? Editing is complete when the to make sure the program calculates the cor-
entire program has been keyed into the edi- rect pay for a day when you worked eight or
tor. At that time, the programmer clicks a fewer hours and for a day when you worked
button in the IDE, and the compilation more than eight hours. Each of these input
process begins. A pop-up window shows values forces the program to make different
how the compilation is progressing, which decisions in its processing path (the sequence
line is currently being compiled, how many of steps that turns inputs into outputs). To be
syntax errors have been identified, and how certain the program works as intended, pro-
many warnings have been generated. A grammers try every possible path.
warning is a suggestion from the compiler For example, once we can successfully
that the code might not work in the way the compile the example code for the parking
programmer intended, although there is no
Figure 10.19
formal syntax error on the line.
As mentioned earlier, a syntax error is a Debugging—the process
of correcting errors in a
violation of the strict, precise set of rules that program—combines logic
define the language. Programmers create with an understanding of
syntax errors when they misspell keywords the problem to be solved.
(such as typing BEEGIN instead of BEGIN)
or use an operator incorrectly (such as typ-
ing x ⫽ y ⫹⫹ 2 instead of x ⫽ y ⫹ 2). Once
compilation is finished, the IDE presents all
of the syntax errors in one list. The program-
mer can then click any item in the list to see
a detailed explanation of the type of error.
When the programmer double-clicks an

The Life Cycle of a Program 493


garage problem, we can begin to use our accidentally write code for a loop that loops
testing plan. The testing plan indicates one time too many or one time too few. This
that an input of 3 for NumberHours can lead to a problem such as dividing a
WorkedToday must produce an output of number by zero, a big “no-no” mathemati-
Pay ⫽ 3 * $7.50 ⫽ $22.50. In testing, we run cally! That kind of forbidden operation gen-
the program and make sure that an input erates a runtime error message.
value of 3 yields an output value of $22.50. Are there tools that help program-
To check that the processing path involving mers find logic errors? Most IDEs in-
overtime is correct, we input a value of 12 clude a tool called a debugger that helps
hours. That input must produce Pay ⫽ 8 * programmers dissect a program as it runs.
$7.50 ⫹ (12 ⫺ 8) * $11.25 ⫽ $105.00. The debugger pauses the program while it is
A complete testing plan includes sample executing and allows the programmer to ex-
inputs that exercise all of the error handling amine the values of all the variables. The
required as well as all of the processing programmer can then run the program in
paths. Therefore, we would also want to slow motion, moving it forward just one line
check how the program behaves when at a time. Working through the program in
NumberHoursWorkedToday is entered as –2. this way lets the programmer see the exact
If the testing plan reveals errors, sequence of steps being executed and the
why does the program compile? The outcome of each calculation. He or she can
compiler itself is a program. It cannot think then isolate the precise place in which a logi-
through code or decide whether what the cal error occurs, correct the error, and recom-
programmer wrote is logical. The compiler pile the program.
only can make sure that the specific rules of
the language are followed, that all of the
keywords are spelled correctly, and that the Finishing the Project: Testing and
operators being used are meaningful to that
language.
Documentation
For example, if in the parking garage prob- Once debugging has detected all of the run-
lem we happened to type the if statement as time errors in the code, it is time for users to
if (NumberHoursWorkedToday > 88) test the program. This process is called
//Use the Overtime Pay rule internal testing. In internal testing, a group
within the software company uses the pro-
instead of
gram in every way it can imagine—includ-
if (NumberHoursWorkedToday > 8) ing how it was intended to be used and in
//Use the Overtime Pay rule, ways only new users may think up. The in-
the compiler would not see a problem. It ternal testing group makes sure the program
doesn’t seem strange to the compiler that behaves as described in the original testing
you only get overtime after working plan. Any differences in how the program
88 hours a day. These logical errors in the responds are reported back to the program-
problem are caught only when the program ming team, which makes the final revisions
executes. Another kind of error caught when and updates to the code.
the program executes is a runtime error. The next round of testing is external test-
For example, it is easy for a programmer to ing. In this testing round, people like the
ones that eventually will purchase and use
the software must work with it to determine
whether it matches their original vision.
BITS What other testing does the code
AND Many Languages on Display undergo? Before its final commercial re-
BYTES lease, software is often provided free or at a
reduced cost in a beta version to certain test
At the 99 Bottles of Beer site 99-bottles-of-beer.net, you can find a simple program sites or to interested users. By providing
that displays the lyrics to the song 99 Bottles of Beer on the Wall. If you have ever sat users with a beta version of software, pro-
through round after round of this song on a long school bus trip, you know how repet- grammers can collect information about the
itive it is. That means the code to write this song can take advantage of looping state- remaining errors in the code and make a final
ments. This site presents the program in more than 1,300 different languages. Take a round of revisions before officially releasing
tour and see how much variety there is in programming! the program. Often, popular software pack-
ages like Microsoft Windows and Microsoft

494 Chapter 10 Behind the Scenes: Building Applications


Office are available for free beta download ACTIVE Understanding
for months before the official public release. HELP-
What happens if problems are
Software
DESK
found after beta testing? The manu- Programming
facturer will make changes before releasing In this Active Helpdesk call, you’ll play the role of a
the product to other manufacturers, for in- helpdesk staffer, fielding calls about the life cycle of a
stallation on new machines for example. program, the role a problem statement plays in pro-
That point in the release cycle is called RTM gramming, how programmers create algorithms and
(or release to manufacturers). After the move from algorithm to code to the 1s and 0s a CPU
RTM is issued, the product is in GA (or can understand, and the steps involved in completing
the program.
general availability) and can be purchased
by the public.
Users often uncover problems in a pro-
gram even after its commercial release to the
public. These problems are addressed with be simple to expand later when the demands
the publication of software updates or on the system change. They also want it to be
service packs. Users can download these completed on time and for the minimum
software modules to repair errors identified possible cost, and to use the smallest amount
in the program code. For example, the origi- of system resources possible.
nal Windows Vista operating system had a Because it will always be difficult to bal-
revision released as Service Pack 1 that ance these conflicting goals, a wide variety of
added many bug fixes and security fixes and programming languages has been developed.
extended its compatibility so that instead of Earlier in the chapter, you learned about the
working with 40,000 devices, it could inter- five main categories (generations) of pro-
act effectively with more than 80,000 devices. gramming languages. In this section, we dis-
After testing, is the project cuss the specific programming languages that
finished? Once testing is completed, but are members of these different generations.
before the product is offi- Although programming lan-
cially released, the work of guages often share many
documentation is still
ahead. At this point, techni-
cal writers create internal
“ What
programming
common characteristics,
each language has specific
traits that allow it to be the
documentation for the pro- languages are best fit for certain types of
gram that describes the de- popular today? projects. Sometimes a lan-
velopment and technical
details, how the code
works, and how the user in-
” guage builds a loyal follow-
ing, and that pushes a
programmer to apply the
teracts with the program. In addition, the same language to every situation.
technical publishing department produces The ability to understand enough about
all of the necessary user documentation that each language to match it to the appropriate
will be distributed to the program users. style of problem is an exceptionally power-
User training begins once the software is ful skill for programmers.
distributed. Software trainers take the soft- What languages are popular
ware to the user community and teach oth- today? There are far too many languages
ers how to use it efficiently. for one person to become expert at them all,
but understanding the range of languages
and how they relate to one another is espe-
cially useful. One quick way to determine
Programming which languages are popular is to examine
Languages: Many job postings for programmers. As of this
Languages for Many writing, the languages most in demand in-
clude C/C++ and Java. In specific indus-
Projects tries, certain languages tend to dominate the
In any programming endeavor, program- work. In the banking and insurance indus-
mers want to create a solution that meets tries, for example, the programming lan-
several competing objectives. They want the guage COBOL is still common, although
software to run quickly and reliably and to most other industries rarely use it any more.

Programming Languages: Many Languages for Many Projects 495


Figure 10.21 pokes fun at one stereotype
C⫹⫹
about learning to program, the experience
C has become much more manageable in re-
Java cent years.
PHP
Perl Selecting the Right Language
Visual Basic How do programmers know which
Python language to select for a specific
JavaScript project? A programming team considers
C# several factors before selecting the language
Shell it will use for a specific project.
Ruby • Space available: Not all languages
Delphi produce code that takes up the same
SQL
amount of space. Therefore, the target
language should be well matched to the
D
amount of space available for the final
Actionscript
program. For example, if the program
Lua will be embedded in a chip for use in a
Pascal cell phone, then it is important for the lan-
2500000 5000000 7500000 10000000 guage to create space-efficient programs.
Numbers of Users • Speed required: Although poorly writ-
ten code executes inefficiently in any
Figure 10.20 language, some languages can execute
When attacking a prob- more quickly than others can. Some
lem, you can choose from The Web site Langpop.com uses a number projects require a focus on speed rather
many different program- of different techniques to get a feel for which than size. These projects require a lan-
ming languages. This languages are popular in the software in-
chart from langpop.com guage that produces code that executes
dustry at the moment (see Figure 10.20). in the fastest possible time.
shows how popular cer-
tain languages are right How do I know which language • Organizational resources available:
now. to study first? A good introductory Another consideration is the resources
programming course will emphasize many available in a manager’s group or
skills and techniques that will carry over organization. Selecting a language
from one language to another. You should that is easy to use and will be easy to
find a course that emphasizes design, maintain if there is a turnover in
algorithm development, debugging programmers is an important consider-
techniques, and project management. All of ation. Managers also may factor in the
these aspects of programming will help you existing pool of talent available for the
in any language environment. Pascal is the project. Having to train five program-
only modern language that was specifically mers to tackle a project in a new
designed as a teaching language, but it is no language would have significant disad-
longer often taught at the college level. vantages over allowing them to work
Many colleges and universities have opted in a familiar language.
to have students begin with Java or C++.
• Type of target application: Certain
How does anyone learn so many
languages are customized to support
languages? Professional programmers
a specific environment (UNIX or
can work in a great number of different lan-
Windows, for instance). Knowing which
guages. They become proficient at learning
languages are most commonly used for
new languages because they have become
which environments can be helpful.
familiar with the basic components, dis-
cussed in this chapter’s Dig Deeper feature,
that are common to all languages: syntax,
Windows Applications
keywords, operators, and data types. The What languages do programmers
Bits and Bytes piece “Many Languages on use if they want to build a Windows
Display” earlier in this chapter directs you application? Software programs that run
to a site that displays an old song in more under the Windows OS are extremely popu-
than 1,300 different languages. Although lar. These programs often have a number of

496 Chapter 10 Behind the Scenes: Building Applications


common features—scroll bars, title bars, text ACTIVE Selecting the Right
boxes, buttons, and expanding or collapsing HELP-
menus, to name a few. Several languages in-
Programming
DESK
clude customized controls that make it easy Language
for programmers to include these features in In this Active Helpdesk call, you’ll play the role of a
their programs. helpdesk staffer, fielding calls about how program-
Can I just point and click to create mers select the right programming language for a
a Windows application? In languages specific task and what the most popular Windows and
that support Windows programming, pro- Web applications are.
grammers can use the mouse to lay out on
the screen where the scroll bars and buttons
will be in the application. The code needed been around for quite some time, it doesn’t
to explain this to the computer is then writ- necessarily work for all environments and
ten automatically when the programmer instances. Programmers often like to build a
says the layout is complete. This is referred prototype, or small model, of their program
to as visual programming, and it helps pro- at the beginning of a large project.
grammers produce a final application much Although an entire project may not be fin-
more quickly. In this section, we’ll discuss a ished for several months, it can be useful to
few languages that are used to develop Win- have a simple shell or skeleton of what the
dows applications and that take advantage final program will look like to help with de-
of visual programming. sign. Prototyping is a form of rapid applica-
tion development (RAD), an alternative to
the waterfall approach of systems develop-
Visual Basic ment described at the beginning of this
What if programmers want to have a chapter. Instead of developing detailed sys-
model of their program before it’s tem documents before they produce the sys-
fully developed? Earlier in the chapter, tem, developers create a prototype first, then
you read about how information systems are generate system documents as they use and
developed through the system development remodel the product.
life cycle (SDLC). Although the SDLC has Prototypes for Windows applications are
often coded in Microsoft Visual Basic (VB),
a powerful programming language used to
build a wide range of Windows applica-
tions. One strength of VB is its simple, quick
interface, which is easy for a programmer to
learn and use. It has grown from its roots in
the language BASIC (short for Beginner’s
All-purpose Symbolic Instruction Code) to
become a sophisticated and full-featured
object-oriented language. It is often used in
the creation of graphical user interfaces for
Windows.
Visual Basic 2010 is the current version
of Visual Basic and is designed for building
object-oriented applications for Windows, the
Web, and mobile devices. Figure 10.22 shows
how the interface of Visual Basic makes it
easy to drag and drop entire programming
components into an application. Visual Basic
2010 provides a multitude of features that
are new or an improvement on the previous
versions. These changes make development
with Visual Basic easier and produce more
Figure 10.21 efficient code than with any earlier version.
This poster mocks the image of a harsh, difficult road Visual Basic 2010 and the .NET Framework
to learning programming. Modern tools allow program- are both part of Visual Studio 2010, which
ming to be fun to learn. provides a complete set of developer tools.

Programming Languages: Many Languages for Many Projects 497


Figure 10.22 C and C++
The Toolbox in Visual What languages do programmers use
Basic 2010 allows the pro- if the problem requires a lot of
grammer to drag and drop
any of these items into a “number crunching”? A Windows ap-
program. plication that demands raw processing
power to execute difficult repetitive numeri-
cal calculations is
most often a candi-
date for C/C++. For
example, applica-
tions that simulate
human cells and
drug interactions
have to solve elabo-
rate mathematical
equations many
thousands of times
each second, and are,
therefore, excellent
candidates for pro-
gramming using
C/C++. Several com-
panies sell C/C++ compilers equipped with
a design environment that makes Windows
programming as visual as with VB.
Why was the C language devel-
oped? The predecessor of C++, C, was
originally developed for system program-
How does the Microsoft .NET mers. It was defined by Brian Kernighan
Framework help programmers? Too and Dennis Ritchie of AT&T Bell Laborato-
often, computer systems cannot exchange in- ries in 1978 as a language that would make
formation—perhaps because they have dif- accessing the operating system easier. It pro-
ferent operating systems or use different vides higher-level programming language
rules for packaging data. The Microsoft .NET features (such as if statements and for loops)
(pronounced “dot net”) Framework is a soft- but still allows programmers to manipulate
ware development environment designed to the system memory and CPU registers di-
let Web sites “talk” to each other easily. The rectly. This mix of high- and low-level access
.NET Framework introduces Web services, makes C highly attractive to “power” pro-
which provide a standard way for software grammers. Most modern operating systems
to interact. A Web service is a program that a (Windows Vista, Windows 7, Mac OS X, and
Web site uses to make information available Linux) were written in C.
to other Web sites. For example, your Web The C++ language takes C to an object-
site could use the Google Web service to oriented level. Bjarne Stroustrup, the devel-
search for information or to check the oper of C++, used all of the same symbols
spelling of a word. The Google Web service and keywords as C, but he extended the lan-
returns the requested information to your guage with additional keywords, better
program in a standard package that you then security, and more support for the reuse of
decode. Before Web services, programs existing code through object-oriented
needed a human being to submit a search to design.
Google and read over the results. Now the Are C and C++ natural choices
programs themselves can do this. when I’m looking to learn my first
The power of .NET and Web services will language? Neither C nor C++ was in-
continue to grow as more companies make tended as a teaching language. The notation
some or all of their data available this way. and compactness of these languages make
The VB.NET programming tool has many them relatively difficult to master. They are
supports for the Visual Basic programmer in demand in industry, however, because
who is interested in using Web services. C/C++ can produce fast-running code that

498 Chapter 10 Behind the Scenes: Building Applications


iMac

4A
E 65
FF O
Compiled
once
Java into byte
code code

.....

FF
for (i = 1; i < 20; i++)
..... FF O

O
{ E 65

E
FF OE 4A

65
System.out.println(i);

4A
} 65 4A
.....
.....

uses a small amount of memory. Program-


mers often choose to learn C/C++ because PDA
their basic components (operators, data
types, and keywords) are common to many
other languages.

Java and C#
What language do programmers
PC running Windows
use for applications that need to
collect information from networked Figure 10.23
computers? Imagine that an insurance neutral. This means that Java code needs to Java programs can be
company with many locations wants a be compiled only once, after which it can compiled once and run on
run on many CPUs (see Figure 10.23). The many different platforms.
program that will run each night and will
communicate with networked computers Java program does not care which CPU,
in many offices around the country, collect- operating system, or user interface is
ing policy changes and updates from that
day’s business and updating the company’s
main records. The team that writes this BITS
program would want to use a language AND Really Want to Learn? Work for Free!
that already provides support for network BYTES
communications.
Java would be a good choice. James The open source software movement is a grassroots collection of developers who
Gosling of Sun Microsystems introduced believe that software projects can be managed start to finish by groups of individuals
Java in the early 1990s. It quickly became instead of companies. Open source software is developed and maintained at no
popular because its object-oriented model charge by groups of people who are brought together by common interests such
enables Java programmers to benefit from as photo editing. When completed, the software product and its source code are
its large set of existing classes. For example, distributed free of charge.
a Java programmer could begin to use the The development, testing, and maintenance of the open source code are managed
existing “network connection” class with lit- through resources such as SourceForge (sourceforge.net), a development Web site
tle attention to the details of how that code that hosts more than 100,000 programs. To support development of open source
itself was implemented. Classes exist for projects, SourceForge provides services to its more than 1 million users in support of
many graphical objects, such as windows their development of projects. For example, version control tools allow specific ver-
and scroll bars, and for network objects such sions of a project to be “checked in” or “checked out,” as in a library, allowing many
as connections to remote machines. Observ- people to work on the project at the same time. Communication tools and publicity
ing Java’s success, Microsoft released a lan- tools are also provided to help the project succeed in reaching its audience.
guage named C# (pronounced “see sharp”) Most types of software in the marketplace have an open source equivalent. (See
that competes with Java. the Technology in Focus section called “Computing Alternatives” on page 252 for
Can a Java application work on more information.) If you are looking to learn about software development by doing it,
any type of computer? An attractive investigate SourceForge and volunteer for a project!
feature of Java is that it is architecture

Programming Languages: Many Languages for Many Projects 499


running on the machine on which it lands. such as Learn the Net (learnthenet.com),
This is possible because the target computer Web Monkey (webmonkey.com), and the
runs a Java Virtual Machine (VM), software World Wide Web Consortium (w3c.org).
that can explain to the Java program how These sites include lists of the major tags
to function on any specific system. A Java that can be used to create HTML and
VM installed with Microsoft Internet XHTML documents.
Explorer, for example, allows Internet Are there tools that help program-
Explorer to execute any Java applet (small mers write in HTML and XHTML?
Java-based program) it encounters on the Several different programs are available to
Internet. Although Java code does not assist in the generation of HTML and
perform as fast as C++, the advantage of XHTML. Adobe Dreamweaver and Mi-
needing to compile only once before it can crosoft Expression Web present Web page
be distributed to any system is extremely designers with an interface that is similar to
important. a word processing program. Web designers
can quickly insert text, images, and hyper-
links, as shown in Figure 10.24. The program
Web Applications: HTML/XHTML automatically inserts the corresponding
HTML or XHTML tags. For simple, static
and Beyond (nonchanging) Web pages, no programming
What is the most basic language for is required.
developing Web applications? A doc-
ument that will be presented on the Web
must be written using special symbols called
tags. Tags control how a Web browser will
Scripting Languages for the Web
display the text, images, and other content Which programming languages do
tagged in the HyperText Markup Language programmers use to make complex
(HTML) or eXtensible HyperText Markup Web pages? To make their Web pages
Language (XHTML). Although knowledge more visually appealing and interactive,
of HTML or XHTML is required to program programmers use scripting languages to add
for the Web, they are not in themselves pro- more power and flexibility to their HTML
gramming languages. HTML and XHTML code. A scripting language is a simple pro-
are just series of tags that modify the display gramming language that is limited to per-
of text. HTML was the original standard forming a set of specialized tasks. Scripts
defining these tags. XHTML is a newer stan- allow decisions to be made and calculations
dard that corrects some of the inconsisten- to be performed. Several popular scripting
cies found in HTML. To see more detail of languages work well with HTML, including
HTML/XHTML tags, flip to the JavaScript, VBScript, and PHP (Hypertext
“HTML/XHTML” section in Chapter 13 Preprocessor).
Figure 10.24 (page 621). Many good HTML and XHTML JavaScript is a scripting language that is
Adobe Dreamweaver is a tutorials are available on the Web at sites often used to add interactivity to Web pages.
popular tool for creating JavaScript is not as fully featured as Java,
Web pages. but its syntax, keywords, data types, and
operators are subsets of Java’s. In addition,
JavaScript has a set of classes that represent
the objects often used on Web pages: but-
tons, check boxes, and drop-down lists.
The JavaScript button class, for example,
describes a button with a name and a
type—for example, whether it is a regular
button or a Submit or Reset button. The lan-
guage includes behaviors, such as click (),
and can respond to user actions. For exam-
ple, when a user moves his or her mouse
over a button and clicks to select it, the but-
ton “knows” the user is there and jumps in
and performs a special action (such as play-
ing a sound).

500 Chapter 10 Behind the Scenes: Building Applications


STEP 1: User requests STEP 2: Server sends request STEP 3: Database computer
information on red bikes. to database computer. returns list.

12345
45678
98764
54321
11223
22334

Customer’s ABC Bike Company ABC Bike Company


computer server database

STEP 4: Server’s ASP program writes HTML page.

Figure 10.25
An online store is an
Are there other scripting lan- the content displayed based on the user’s example of the three-tier
guages besides JavaScript? feedback. For example, as shown in Fig- client/server type of Inter-
Programmers who are more familiar with ure 10.25, the ABC online store’s Web page net application.
Visual Basic than Java or C++ often use will collect a customer bicycle inquiry for
VBScript, a subset of Visual Basic, to intro- red bikes. It then asks ABC’s main server for
duce dynamic decision making into Web a list of red bicycles sold by the company.
pages. Dynamic decision making means An ASP program running on the server
that the page can decide how to display it- creates a new HTML/XHTML page and
self based on the choices the reader makes. delivers that to the user’s browser, telling
PHP, discussed below, is another scripting the customer what red bicycles (including
language that has become extremely popu- details such as model and size) are currently
lar. It is a free, open source product that runs sold by ABC.
very efficiently on multiple platforms, in- Thus, ASP programs can have HTML/
cluding Windows, UNIX, and Linux. XHTML code as their output. They use what
the user has told them (via the list boxes,
check boxes, and buttons on the page) to
ASP, JSP, and PHP
make decisions. Based on those results, the
How are interactive Web pages built? ASP program decides what HTML/XHTML
To build Web sites with interactive capabili- to write. A small example of ASP writing its
ties, programmers use Active Server Pages own HTML/XHTML code is shown in
(ASP), Java Server Pages (JSP), or the Figure 10.26.
scripting language PHP (Hypertext Pre-
processor) to adapt the HTML or XHTML
page to the user’s selections. The user Flash and XML
supplies information that is translated into What if a programmer wants to cre-
a request by the main computer at the com- ate a Web page that includes sophis-
pany that owns the Web site, often using a ticated animation? Many Web sites
database query language such as SQL. feature elaborate animations that interact
Scripting code in ASP, JSP, or PHP controls with visitors. These sites include buttons and
the automatic writing of the custom HTML/ hyperlinks, along with animation effects.
XHTML page that is returned to the user’s These components can be designed with
computer. Adobe Flash, a software product for devel-
What does additional programming oping Web-based multimedia. Flash includes
bring to a Web page? The most ad- its own programming language, named
vanced Web pages interact with the user, ActionScript, which is similar to JavaScript
collecting information and then customizing in its keywords, operators, and classes.

Programming Languages: Many Languages for Many Projects 501


Figure 10.26
An ASP program can
a
(a) write HTML/XHTML Uses For loops
code as its (b) output. This
image illustrates how the
HTML/XHTML page would
(c) show up in a browser.

Writes five different HTML statements


with a different number for font size
b

HTML document is
program output

HTML document output in


Web browser

Microsoft has unveiled a competing transfer the key information on its page to
product named SilverLight that supports the another site.
development of rich multimedia and inter- Without XML, a Web site that wanted to
active Web applications. Other advances, look up current stock pricing information at
like the collection of technologies referred to another site would have to retrieve the
as AJAX (Asynchronous JavaScript And HTML/XHTML page, sort through the for-
XML), allow the creation of Web applica- matting information, and try to recognize
tions that can update information on a page which text on the page identified the data
without requiring the user to do a page re- needed. With XML, groups can agree on
fresh or leave the page. By using existing standard systems of tags that represent im-
technologies to do more processing in the portant data elements. For example, the
browser, users have a more responsive expe- XML tags <stock> and</stock> might de-
rience. limit key stock quote information. Mathe-
Is HTML/XHTML the only markup maticians have created a standardized set of
language for the Web? When Web XML tags named MathML for their work,
sites communicate with humans, HTML/ and biometrics groups are developing an
XHTML work well because the formatting XML standard to describe and exchange
they control is important. People respond data such as DNA and face scans. We dis-
immediately to the visual styling of textual cuss HTML/XHTML and XML in more
information; its layout, color, size, and font detail in Chapter 13.
design all help to transfer the message of the Figure 10.27 shows a table of popular pro-
page to the reader. When computers want to gramming tools with their features and the
communicate with each other, however, all typical settings in which they are used.
of these qualities just get in the way. A third
markup language, called eXtensible
Markup Language (XML), enables design-
The Next Great Language
ers to define their own data-based tags, What will be the next great lan-
making it much easier for a Web site to guage? It is never easy to predict which

502 Chapter 10 Behind the Scenes: Building Applications


Figure 10.27 POPULAR PROGRAMMING TOOLS

Programming Language Features Typical Setting


C/C++ and C# Can create compact code that executes quickly Used in industrial applications such as banking and
Provides high- and low-level access engineering

Objective C Has a framework for writing iTouch/iPhone/ Used to create applications for Mac OS X and Apple
iPad applications mobile devices

Flash ActionScript Is similar in syntax to JavaScript but customized Used to control Flash animations
for the Flash animation environment

Microsoft SilverLight Is a competitor to Adobe Flash, and supports Used to deliver audio and video to Web pages
rich multimedia capabilities

Java Is architecture neutral Used to create applets that can be delivered over the Web
Is object-oriented

JavaScript Is similar in syntax to Java Creates code that lives on the client machine and supports
Has classes that represent buttons, drop-down interaction with Web pages
lists, and other Web page components

VBScript Is similar in syntax to Visual Basic Creates code that lives on the client machine and adds
Has classes that represent buttons, drop-down interaction to Web pages
lists, and other Web page components

Visual Basic Is easy to learn and use Used in prototype development


Is object-oriented Used to design graphical user interfaces
Has a drag-and-drop interface

Web Technologies

ASP, JSP, PHP Has a set of rules and standards that allow Controls the automated writing of HTML pages
Web sites to create their own HTML
code based on user actions

HTML/XHTML Provide a set of tags that control the display Control layout and style of information presented
of text on a Web page on a Web page

XML Enables users to define their own tags Used in the construction of Web services
Facilitates exchange of information between
Web sites

AJAX Uses a combination of existing technologies like Creates Web sites that can update without the user refreshing
JavaScript, CSS, and XML the page

language will become the next “great” lan- amount of time needed to compile a
guage. For example, as the popularity of completed project will also grow. It is not
Apple’s mobile devices increases, program- uncommon for a large project to require
ming for the iPhone, iTouch, and iPad is be-
coming much more popular. The language
required to develop these application is a
SOUND 3D Programming
BYTE the Easy Way
flavor of object-oriented C known as
Objective C. Objective C has been used to de-
In this Sound Byte, you’ll create a three-dimensional
velop applications for Mac OS X for quite a game using the visual drag-and-drop interface pro-
few years but is seeing a huge increase in in- vided by Alice, a free software package. This program
terest with the explosion of new devices. teaches all the concepts of programming with none of
Software experts predict that as software the pain of learning syntax.
projects continue to grow in size, the

Programming Languages: Many Languages for Many Projects 503


TRENDS
IN IT Emerging Technologies: Will It Blend? Writing Your First Video
Game in Blender
Blender is a free, open source application that supports home video Blender) and a blog of everything Blender at blendernation.com. In
game production by combining many tools into one package. Blender addition, YouTube has numerous video tutorials on working with Blender,
gives you what you need for each stage of beginning 3D video game and libraries of Blender routines and objects are freely distributed on the
development, allowing you to create three-dimensional objects with Internet.
textures and move them around a 3D world with realistic physics. If you are interested in video game development, three-dimensional
First, Blender allows you to construct three-dimensional models (see art, or just creating animations, download Blender and realize the power
Figure 10.28). Meshes are used to begin any model and can be cus- of the open source software movement.
tomized to represent any 3D shape or object. You can add specific tex-
tures and shading to make the model more realistic. Blender then allows
you to animate the object. That animation can be saved as a movie or
connected to specific control keys or movements. You can also play a
complete video game within Blender by using the built-in game engine.
Finally, Blender incorporates a physics engine that understands basic
concepts such as particle collisions and gravity modeling. This is useful,
for example, when a game character tosses a plasma grenade toward a
target!
The programming rules used to describe object behavior in the game
are made simpler by Blender’s Logic Bricks. For example, using Logic
Bricks you can, in just a few clicks, create a rule that makes one object
disappear when it collides with another. You can also use Logic Bricks to
map key movements to control objects or cameras in the environment.
Blender is available as a free download (blender.org). You will also
find an active community to support you as you learn. The Blender Foun-
dation is involved in releasing games to the public that were developed
for free using Blender. These open source games include titles such as
Yo! Frankie and Apricot. These are available for anyone to learn from and
reuse. Figure 10.28
Many resources are available for Blender, including free books such Blender allows you to design 3D models, animate them, and apply
as Blender 3D: Noob to Pro on Wiki Books (en.wikibooks.org/wiki/ real physics to create playable video games.

30 minutes or more to compile. Interpreted each language a “personality,” illustrates


languages, however, have virtually no com- that idea in lighthearted fashion.
pile time because compilation occurs while Forcing a language to be so general that
the code is being edited. As projects get it can work for any task also forces it to
larger, the capability to be compiled instan- include components that make it slower to
taneously will become even more important. compile, produce larger final executables,
Thus, interpreted languages such as Python, and require more memory to run. Having a
Ruby, and Smalltalk could become more im- variety of languages and mapping a prob-
portant in the coming years. lem to the best language creates the most
Will all languages someday con- efficient software solutions.
verge into one? Certain characteristics So what do I do if I want to learn
of modern programming languages corre- languages that will be relevant in the
spond well with how programmers actually future? No particular set of languages is
think. These traits support good program- best to learn, and there is no one best se-
ming practices and are emerging as common quence in which to learn them. The Associa-
features of most modern programming lan- tion for Computing Machinery (acm.org),
guages. The object-oriented paradigm is one encourages educators to teach a core set of
example. Both Visual Basic and COBOL mathematical and programming skills and
have moved toward supporting objects. concepts, but school and university depart-
There will always be a variety of ments are free to offer a variety of languages.
programming languages, however. Fig- When you are selecting which program-
ure 10.29, in which the artist tries to give ming languages to study, some geographical

504 Chapter 10 Behind the Scenes: Building Applications


Figure 10.29
There will always be a variety of languages, each with its own personality.

and industry-related considerations come (computerjobs.com) to identify languages in


into play. For example, in an area in which a demand in your area.
large number of pharmaceutical companies Whether or not you pursue a career in
exist, there may be a demand for Massachu- programming, having an understanding of
setts General Hospital Utility Multi- how software is created will help you in
Programming System (MUMPS). This many IT careers. Software is the set of
language is often used to build clinical data- instructions that allows us to make use of
bases, an important task in the pharmaceuti- our hardware. Programming skills give
cal industry. Review the advertisements for you the power to understand, create, and
programmers in area newspapers and customize a computer system.
investigate resources such as ComputerJobs

Programming Languages: Many Languages for Many Projects 505


ten
ten summary
chapter

1. What is a system development life the input data that users will have at the
cycle, and what are the phases in the start of the job, the output that the program
cycle? will produce, and the exact processing that
converts these inputs to outputs. In addi-
summary

An information system includes data, peo-


ple, procedures, hardware, and software. tion, the problem statement identifies poten-
Teams of individuals are required to de- tial errors and plans to address these errors.
velop systems. Those teams need to follow
an organized process (or set of steps) to 4. How do programmers create
ensure that development proceeds in an algorithms?
orderly fashion. This set of steps is usually For simple problems, programmers create
referred to as the system development life an algorithm by converting a problem state-
cycle (SDLC). There are six steps in the ment into a list of steps (or actions) the pro-
SDLC waterfall model discussed earlier in gram will take. For more complex problems,
this chapter: (1) A problem or opportunity is programmers must identify where decision
identified. (2) The problem is analyzed, and points occur in the list of steps. Some deci-
a program specification document is created sions are yes/no (binary), whereas others
to outline the project objectives. (3) A create a repeating action (loop). Algorithms
detailed plan for programmers to follow are documented in the form of a flowchart
is designed using flowcharts and data-flow or in pseudocode. Programmers use either
diagrams. (4) Using this plan, the program top-down or object-oriented analysis to
is developed and documented. (5) The produce the algorithm.
program is tested to ensure that it works
properly and is installed so that it can be
5. How do programmers move from
used. (6) Ongoing maintenance and
algorithm to code, and in what
evaluation ensure a working product.
categories of language might they
2. What is the life cycle of a program? code?
Each programming project follows several Computer code uses special words and strict
stages from conception to final deployment. rules to enable programmers to control the
The problem statement identifies the task to CPU without having to know all of its hard-
be computerized and describes how the soft- ware details. Programming languages are
ware program will behave. An algorithm is classified in several major groupings, some-
developed that specifies the sequence of times referred to as generations, with the first
steps that the program must take to com- generation being machine language—the bi-
plete the work. The algorithm is then trans- nary code of 1s and 0s that the computer un-
lated into highly structured programming derstands. Assembly language is the next
code. The code goes through the processes generation; it uses short, English-like com-
of debugging, in which the programmers mands that speak directly to the CPU and
find and repair any errors in the code; test- give the programmer direct control of hard-
ing by the programming team; and further ware resources. Each successive generation
testing by the people who will use the pro- in language development has relieved pro-
gram. The results of the entire project are grammers of some of the burden of keeping
documented for the users and the develop- track of what the hardware requires and
ment team. Finally, users are trained so that more closely matches how humans think
they can use the program efficiently. about problems.

3. What role does a problem statement 6. How does a programmer move from
play in programming? code in a programming language
The problem statement is an explicit to the 1s and 0s the CPU can
description of what tasks the computer understand?
program must accomplish and how the Compilation is the process by which code is
program will execute these tasks and converted into machine language, the lan-
respond to unusual situations. It describes guage the CPU can understand. A compiler

506 Chapter 10 Behind the Scenes: Building Applications


summary
ten ten

chapter
is a program that understands both the syn- training, which begins once the software is
tax of the programming language and the distributed, teaches the user community
exact structure of the CPU and its machine how to use the software efficiently.

summary
language. It can translate the instructions
written by programmers in the higher-level 9. How do programmers select the right
language into machine language, the binary programming language for a specific
patterns that will execute commands on the task?
CPU. Each programming language has its A programming team reviews several con-
own compiler. Separate versions are required siderations before selecting the language.
to compile code that will run on each differ- First, certain languages are best used with
ent type of processor. certain problems. Second, the target lan-
guage should be well matched to the
7. How is a program tested? amount of space available for the final pro-
If programmers make errors in the algo- gram. Third, some projects require the selec-
rithm or in translating the algorithm to code, tion of a language that can produce code
problems will occur. Programmers debug that executes in the fastest possible time.
the program by running it constantly to find Finally, selecting a language with which the
errors and to make sure the program be- programmers are familiar is also helpful.
haves in the way it should. Once debugging
has detected all the code errors, users, both 10. What are the most popular
within the company and outside the com- programming applications for
pany, test the program in every way they Windows and Web applications?
can imagine—both as it was intended to be
used and in ways only new users may think Visual Basic, C/C++, and Java are languages
up. Before its commercial release, software is that enable programmers to include
often provided at a reduced cost or no cost Windows control features such as scroll
in a beta version to certain test sites or to in- bars, title bars, text boxes, buttons, and
terested users for a last round of testing. expanding and collapsing menus. Program-
mers use HTML/XHTML tags to structure
for Web pages. For more complex Web
8. What steps are involved in
development, scripting programs such as
completing the program?
JavaScript and VBScript are popular. Web
Once testing is complete, technical writers page animations are done with ASP, JSP,
create internal documentation for the pro- PHP, Flash, and XML.
gram and external documentation that will
be provided to users of the program. User

507
ten
ten key terms
chapter

AJAX (Asynchronous Javascript And XML).. 502 interpreter ............................................................. 492


ActionScript ......................................................... 501 Java......................................................................... 499
Active Server Page (ASP)................................... 501 Java applet ............................................................ 500
Adobe Flash ......................................................... 501 Java Server Page (JSP) ........................................ 501
key terms

algorithm .............................................................. 478 JavaScript.............................................................. 500


assembly language.............................................. 486 keyword ................................................................ 488
base class............................................................... 485 logical error .......................................................... 494
beta version .......................................................... 494 loop ........................................................................ 483
binary decision .................................................... 482 machine language ............................................... 486
C ............................................................................. 498 method (or behavior).......................................... 479
C++......................................................................... 498 Next........................................................................ 488
C#............................................................................ 499 object ..................................................................... 485
class........................................................................ 484 object-oriented analysis..................................... 485
code editing .......................................................... 493 operator ................................................................. 489
coding .................................................................... 486 Pascal ..................................................................... 496
comment (or remark) .......................................... 489 PHP (Hypertext Preprocessor) .......................... 501
compilation .......................................................... 491 portability ............................................................. 478
compiler ................................................................ 491 problem statement .............................................. 478
control structure .................................................. 483 program development life cycle
data......................................................................... 479 (PDLC) ............................................................... 478
data type................................................................ 489 programming ....................................................... 478
data-flow diagram............................................... 475 programming language...................................... 486
debugger ............................................................... 494 prototype............................................................... 497
debugging............................................................. 493 pseudocode........................................................... 481
decision point ...................................................... 482 rapid application development (RAD) ........... 497
derived class......................................................... 485 release to manufacturers (RTM)....................... 495
documentation ..................................................... 495 reusability............................................................. 485
dynamic decision making ................................. 501 runtime error ........................................................ 494
editor...................................................................... 493 scripting language............................................... 500
error handling ...................................................... 479 second-generation language (2GL).................. 486
executable program............................................. 492 software update (service pack) ......................... 495
eXtensible Markup Language (XML).............. 502 source code ........................................................... 491
eXtensible HyperText Markup Language statement............................................................... 488
(XHTML) ........................................................... 500 Structured Query Language (SQL) .................. 487
fifth-generation language (5GL) ...................... 487 syntax..................................................................... 488
first-generation language (1GL) ....................... 486 syntax error........................................................... 493
flowchart ............................................................... 475 system development life cycle
For .......................................................................... 488 (SDLC) ............................................................... 474
fourth-generation language (4GL) ................... 487 test condition........................................................ 483
general availability (GA) ................................... 495 testing plan........................................................... 479
HyperText Markup Language (HTML)........... 500 third-generation language (3GL) ..................... 487
if else ..................................................................... 488 top-down design ................................................. 484
Information .......................................................... 479 variable.................................................................. 488
information system............................................. 474 variable declaration ............................................ 488
inheritance............................................................ 485 VBScript................................................................ 501
initial value .......................................................... 483 visual programming ........................................... 497
integrated development environment Visual Basic (VB)................................................. 497
(IDE)................................................................... 492 Web service........................................................... 498

508 Chapter 10 Behind the Scenes: Building Applications


buzzwords
ten ten

chapter
Word Bank
• algorithm • documentation • object-oriented
• beta version • HTML/XHTML • problem statement

buzzwords
• C/C++ • inheritance • testing plan
• classes • interpreter • top-down
• compiler • JavaScript • Visual Basic
• debugger • machine language

Instructions: Fill in the blanks using the words from the Word Bank above.

Things are not running smoothly at the Whizgig factory. We need to keep track of how
many Whizgigs are made every hour and how many are defective. We begin by calling in
the programming team to work with users. Together team members begin to build a soft-
ware solution by creating a(n) (1) __________. All of the input and output information
required is identified as well as the (2) __________, which lists specific examples of what
outputs the program will produce for certain inputs. The team then begins to design the
(3) __________ by listing all the tasks and subtasks required to complete the job. This
approach is called (4) __________ design.

An alternative to this design method is the (5) __________ design model, which develops
the program based on objects. Objects that have similar attributes and behaviors can be
grouped into (6) __________. The benefit of using this type of design approach is that objects
and classes can be reused easily in other programs. If necessary, new classes can be made
by first “borrowing” the attributes of an existing class and then adding differentiating
attributes. This concept is known as (7) __________.

To select the best language for this problem, the team considers the resources at Whizgig.
Although many of the programmers know the visual programming language of
(8) __________, the most important factors for this application will be how fast it runs,
so the language (9) __________ is selected. Once Whizgig has started to take off, the plan is
to expand into a strong Web presence. Then there will be a round of hiring programmers
who know (10) __________. For now, the program to track production and quality control
has been written in programming language; the (11) __________ translates it to

computer
(12) __________, or the binary code that the CPU understands. After that step, the program
is ready to be tested.

The (13) __________ helps identify errors in the program code. Then the programmers put
literate
becoming
together the necessary (14) __________ that explains the program and how to use it.
However, because this is a program that is to be used internally, the program does not need
to go through a test of the (15) __________ by a group of potential outside users.

becoming
computer literate
Your new manager wants to design and deploy an iPad application to collect marketing
information about potential customers. She wants to gather data and analyze it in one
report, which can be shipped to the marketing department.

Instructions: Write a memo to the manager describing what will have to be considered in
the creation of this project. Write the memo using as many of the key terms from the
chapter as you can. Consider what languages will need to be used, and what features will
be critical to the application’s success.
509
ten
ten self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. In the SDLC, which is the phase in 6. A yes/no decision point in an algo-


which the program specification is rithm is called
developed? a. a loop.
a. Problem and opportunity b. a binary decision.
identification c. a test condition.
b. Analysis d. a control structure.
c. Design 7. In object-oriented analysis, classes are
d. Development and documentation defined by their
2. The step of the SDLC in which the a. objects and data.
“make or buy” decision is made is the b. data and methods.
a. problem and opportunity phase. c. operators and objects.
b. analysis phase. d. behaviors and keywords.
c. design phase. 8. Which is NOT an advantage of Java?
d. development and document a. Java is architecture neutral.
phase. b. Java needs to compile only once
3. The steps that describe exactly what prior to distribution.
the computer program must do to c. Java supports network
complete the work is communications.
a. a debugger. d. Java performs faster than C⫹⫹.
b. a problem statement. 9. Which is TRUE about XML?
c. an algorithm. a. XML supports the development
d. the SDLC. of rich multimedia.
4. What do companies provide to repair b. XML makes it possible to update
code errors for a program that has Web pages without refreshing.
been released to the public? c. XML enables designers to define
a. Beta versions their own data-based tags.
b. Service packs d. XML has classes that represent
c. Documentation updates drop-down lists and other Web
d. Maintenance programs elements.
5. Which language is best for executing 10. Which helps programmers write,
numerically intensive calculations? compile, and test programs?
a. C/C⫹⫹ a. IDE
b. Objective C b. RAD
c. Java c. JAD
d. ASP d. PDLC

True–False
_____ 1. When producing the fastest executable program is essential, programmers use a
language with an interpreter.
_____ 2. Companies release service packs to repair problems after software has been made
commercially available.
_____ 3. Comments that programmers insert to explain the purpose of the code are written
in binary.
_____ 4. Each step of the SDLC must be completed before moving on to the next.
_____ 5. Programmers often use ActionScript to code prototypes for Windows applications.

510 Chapter 10 Behind the Scenes: Building Applications


making the
ten ten

chapter
transition to...
next semester

transition to...
1. Learning to Program
Research the core programming sequence at the college you are attending.
a. What languages does the core sequence cover? Are there any introductory courses

next Semester
that use languages with less syntax, like Alice or Visual Logic?

making the
b. How do the languages in the programming sequence reflect the popularity of the
languages used in today’s workplace?
c. How many sections of each of the classes are offered?
d. What can you infer about the percentage of students that stay in the programming
track over time?
e. What does that result mean to the future of your community and your country?

2. Learn and Earn


Investigate summer internship positions for student programmers. Be sure to check
into companies like FogCreek, university programs like the University of Pennsylva-
nia’s SUNFEST, and sites like onedayoneinternship.com. What is the common set
of requirements? What kind of projects do interns produce? What internships are
available in your local area?
3. A Ruby, a Perl, and a Python
Perl is an especially useful and convenient language to use for specific types of pro-
gramming problems. Ruby and Python are other programming languages, each with
their own specific advantages. Research Ruby, Perl, and Python, and identify the key
features of these languages. Determine which programming situations call for using
Ruby and which would be best suited for Perl or Python.
4. Deal or No Deal
There is a famous mathematical game named Googol, invented by Martin Gardner in
his column in Scientific American in 1960. The rules are as follows: Player 1 writes 10 dif-
ferent numbers on cards, and the cards are turned face down and shuffled. Player 2
flips the cards over one by one until he decides to stop. Player 2 wins if the number on
the last opened card is the largest of all the cards; otherwise Player 1 wins. There is a
mathematical strategy that gives Player 2 the best chance of winning, but without using
any mathematics, think about the game and describe what rule you would use to de-
cide when to stop flipping cards.
5. Reuse, Reuse, Reuse
One key to being an efficient programmer is to reuse code. Programmers often use col-
lections of prewritten code modules named application programming interfaces (APIs)
to add functionality to their program with very little work. Research the set of APIs
available from Google by visiting Google Code and the API Code Playground.

511
ten
ten making the
chapter

transition to...
the workplace
1. Programming Is Not Just for Programmers
the workplace
making the

Think about the range of jobs at the place where you currently work.
a. How many of the employees use computers?
transition to...

b. How many individuals create macros, scripts, or shortcuts for doing their work in a
faster, more automated fashion?
c. How many people actually program in a modern programming language?

2. Algorithm Design
Identify the most commonly performed task at your place of business. Think of a way
to document it as an algorithm. Then study it to see if you can find a way to make it
even more efficient. A small improvement to the most often performed task means big
productivity gains. Review the Jolt Award winners at joltawards.com to see examples
of the kinds of efficiencies that have been introduced in the software field this year to
boost productivity.
3. Choosing the Best Language
Using resources from the Web, determine which programming languages would be
best to learn if you were going to program for the following industries:
a. Animated movies
b. Computer games for mobile devices and Web deployment
c. Database management
d. Robotics

4. Software Development . . . in PowerPoint?


The tool MockApp (mockapp.com/download) is a template for the presentation tools
PowerPoint or Keynote. It provides an interface that allows you to drag and drop all of
the visual components of an iPhone, iTouch, or iPad application onto a simulated
screen. You can link button clicks and other interactions from one screen to the next
and create a “working” simulation or prototype of a new iPhone, iTouch, or iPad
application. Investigate this tool using either PowerPoint or Keynote. Design an iPhone
application that would be useful for you or successful in the marketplace.
5. Accessibility
Web designers and programmers can take specific steps to allow visually impaired
users to access Web sites more easily. Examine the information on accessibility at
Adobe’s Accessibility Resource Center (adobe.com). What does accessibility mean in a
software context? Explore the details of existing assistive technologies, such as screen
readers. What are the legal requirements with which Web sites must comply in order to
meet the needs of persons with disabilities? Why is maximizing accessibility important
to everyone?

512 Chapter 10 Behind the Scenes: Building Applications


critical thinking
ten ten

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Using Data and Methods


Think about what classes would be important in modeling a band that is about to go on
a national concert tour. The band already has a Web site, a presence on Twitter and
Facebook, and a local following at area clubs. The band signed a new manager last
year, and the members have all been with the group for awhile now. They hope to get
on bills with other independent-label bands. What data and methods would each class
need? How would the classes be related to each other?

2. Class Hierarchy
A common test for deciding the structure of a class hierarchy is the “is a” versus “has
a” test. For example, a motorcycle “has a” sidecar, so Sidecar would be a data field of a
Motorcycle object. However, a motorcycle “is a” kind of vehicle, so Motorcycle would
be a subclass of the base class Vehicle. Use the “is a” versus “has a” test to decide how a
class structure could be created for computer peripherals. For example, consider that
printers are a type of peripheral and there are laser printers, inkjet printers, 3D printers,
color printers, black-and-white printers, and thermal printers. Work to separate the
unique features into objects and to extract the most common features into higher-level
classes.

3. First Programming Languages


By watching children learn language, we know that language acquisition is much eas-
ier at an early age. What if learning a programming language works the same way?
What kinds of learning strategies would make a young child curious about program-
ming? What kinds of games would illustrate developing algorithms?

4. Something for Nothing


The open source software movement depends on the participation of a number of peo-
ple from all over the world. Some individuals donate time by writing code; others do
testing or documentation. Projects are then made available free to users. Does the open
source movement threaten or strengthen the software industry? Could it replace the ex-
isting business model for distributing software? Are there any benefits to working for
free and giving your intellectual property away?

5. Language Popularity
At the site Langpop.com, results of many different surveys are combined to decide
which programming languages are the most popular today. Where would you go to
conduct a survey on which programming languages are popular? What individuals
would you survey? How would you expect their answers to differ from one another?

513
ten
ten team time
chapter

Working Together for Change

Problem
team time

You and your team have just been selected to write a software program that tells a vending
machine how to make proper change from the bills or coins the customer inserts. The pro-
gram needs to deliver the smallest possible amount of coins for each transaction.

Task
Divide the class into three teams: Algorithm Design, Coding, and Testing. The responsibili-
ties of each team are outlined as follows.

Process

1. The Algorithm Design team must develop two documents. The first document should
present the problem as a top-down design sequence of steps. The second document
should use object-oriented analysis to identify the key objects in the problem. Each
object needs to be represented as data and behaviors. Inheritance relationships between
objects should be noted as well. You can use flowcharts to document your results.
Consider using a product such as Microsoft Visio or the open source program Dia
to create a visual representation of your objects and their relationships to each other.
2. The Coding team needs to decide which programming language would be most appro-
priate for the project. This program needs to be fast and take up only a small amount of
memory. Use the Web to collect information about the language you select and be sure
you have enough information to defend your selection.
You may also consider using a product such as Visual Logic to try to develop the
code for a prototype of the system. (VisualLogic.org offers a free demo version.) This
language, based on Visual Basic, allows you to write code free from many constraints
of syntax. Programs in Visual Logic look like flowcharts but actually execute!
3. The Testing team must create a testing plan for the program. What set of inputs would
you test with to be sure the program is completely accurate? Develop a table listing
combinations of inputs and correct outputs.
4. As a group, discuss how each team would communicate its results to the other teams.
Once one team has completed its work, are the team members finished or do they need
to interact with the other teams? How would the tools of a site such as SourceForge
(sourceforge.net) help your development team across the life of the project?

Conclusion
Any modern programming project requires programming teams to produce an accurate
and efficient solution to a problem. The interaction of the team members within the team as
well as with the other teams is vital to successful programming.

514 Chapter 10 Behind the Scenes: Building Applications


ethics
ten ten

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The role
you play may or may not match your own personal beliefs, but your research and use of logic
will enable you to represent whichever view is assigned. An arbitrator will watch and com-
ment on both sides of the arguments, and together the team will agree on an ethical solution.

Topic: Software That Kills


Re-examine the Ethics in IT section on page 477 of this chapter about the Therac-25 inci-
dent. The error-prone software remained on the market was for more than 18 months be-
fore the problem was recognized, acknowledged, and solved. During that time six people
were killed or badly harmed. Does this situation indicate criminal conduct? Is this a situa-
tion that needs to be resolved in civil court, for monetary damages, but does not constitute
a criminal act? Should this incident be seen as an example of the price society pays for
using complex technology and no blame should be assigned?

Research Areas to Consider


• Therac-25 case resolution
• 2010 Toyota recalls for unanticipated acceleration
• Software errors in avionic software systems
• ACM Ethical Guidelines

Process
Divide the class into teams.
1. Research the areas cited above from the perspective of one of the following people:
a software developer, the injured or noninjured patients, and the arbitrator.
2. Team members should write a summary that provides factual support for their charac-
ter’s position regarding the fair and ethical design of medical equipment and a policy
for handling fair restitution for injured patients. Then, team members should create an
outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
using the collaboration features of MyITLab, the discussion board feature of Black-
board, or meeting in person.
4. Team members should present their case to the class or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

515
eleven
eleven
chapter

behind the scenes:


databases and information systems

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What is a database, and why is it beneficial to use databases? (pp. 518–520)
2. What components make up a database? (pp. 520–524)
3. What types of databases are there? (pp. 524–526)
4. What do database management systems do? (pp. 526–534)
5. How do relational databases organize and manipulate data? (pp. 534–539)
6. What are data warehouses and data marts, and how are they used? (pp. 539–542)
7. What is an information system, and what types of information systems are used in
business? (pp. 542–549)
8. What is data mining, and how does it work? (pp. 549–551)

multimedia resources
multimedia
resources

Active Helpdesk
• Understanding Database Management Systems (p. 525)
• Using Databases (p. 527)
• Data Warehouses, Data Marts, and Information Systems (p. 550)
Sound Bytes
• Creating an Access 2010 Database (p. 532)
• Improving an Access 2010 Database (p. 538)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Most useful sites on the
Internet have databases integrated into them (or are actually databases themselves).
One popular example is Twitter. But with the millions of Twitter users Tweeting
about all sorts of different things, how can you find Twitter users that generate Tweets
about subjects that fit your interests?
Justtweetit.com is a database
of Twitter users that groups users
by logical topics of interest. Are you an artist interested in following
what other artists are Tweeting about? Just click on the Artists link to find more than
250 active Twitter users who discuss art. What if you regularly Tweet on a topic, such
as fashion or video gaming, and want to have more potential
followers find you? You can easily
add yourself to
the Justtweetit
directory in the
most appropriate of
the hundreds of
categories featured on the
site. So start finding more
relevant Tweets today!

517
Life Without next to that entry and then you have the
choice of hiding all information from
Databases that friend or hiding all information from all
A database is a collection of related data that friends related to the application (Mafia
can be easily stored, sorted, organized, and Wars). When you choose to hide items on
queried. By creating an organized structure your feed in this manner, you are actually
for data, we hope to make data more mean- instructing the database to filter out infor-
ingful and therefore more useful. In other mation that is not useful to you.
words, we are attempting to turn data into Or, suppose you are looking for a new
information. But why should you learn netbook computer. When you search for
about databases? netbooks on the Best Buy site (see
Although you may never be called upon Figure 11.1), you get results showing more
to construct a database, you probably use than 50 different products. Perhaps you are
databases every day. For example, you on a limited budget, so you select an option
might search a database in an attempt to to sort the products with the lowest price
extract relevant information. A key attribute first. But maybe you are also interested in
of databases is that information can be seeing netbooks that many other people
filtered so that you only see the information have purchased. You then have the option of
you really want. Understanding how data- re-sorting the products by how well they
bases work and what you can do with a sell. Sorting data by criteria you specify is
database will help you use them more effec- also a very useful aspect of databases.
tively. Let’s look at two examples. Filtering and sorting information to
Have you checked Facebook today? If so, enhance its usefulness to you are just two
you used a database even though you prob- useful aspects of databases. In the rest of this
ably didn’t realize it. When you load your chapter, you’ll learn about the inner work-
Facebook page, you see a news feed of items ings of databases and other ways that they
your friends have posted on their Facebook can be used to provide relevant information
pages. Facebook is using your list of friends quickly and easily.
to comb through their databases to Should I use databases for manag-
Figure 11.1 provide you with what it thinks is relevant ing all types of data? Not every
On Best Buy’s site, sorting information—in other words, what your situation in which related data needs to be
results of a product friends are saying today. turned into organized information demands
search gives you Now suppose the top entry on your the complexity of a database. For simple
information that is more news feed is yet another post related to a tasks, lists are adequate. Often, word pro-
useful. You can also
further filter the data such game you don’t play (like Mafia Wars or cessing or spreadsheet software works for
as restricting your results Farmville). You can click on the Hide button creating simple lists. A table you create in
to one manufacturer. Microsoft Word can serve as a list, as can a
spreadsheet you create in Microsoft Excel.
Figure 11.2 shows a simple “Books to
Buy” list you might create in Excel before
beginning college. This list works well
because it is simple and suited to just one
purpose: to provide you with a list of the
Click to sort data books you need to buy for a particular
semester. If all the information that needed
to be tracked were as simple as the informa-
tion in Figure 11.2, there would be no need
for databases.
When is a list not appropriate? If
complex information needs to be organized
or more than one person needs access to it, a
list is not an efficient solution. For example,
Other data filters
when you enrolled in college, you provided
information about yourself to a number of
people. This information included your
name, your address, the classes you wished
to take, and the meal plan you selected. Your

518 Chapter 11 Behind the Scenes: Databases and Information Systems


In addition, correct
data can be entered
into a list but in an
inconsistent format.
Look at students
Jennifer Evans and
Donald Lopez in
Figure 11.3a. Both are
Figure 11.2 registered for PSY
A simple list created as a spreadsheet in Microsoft 110, but two different course names appear:
Excel or as a table in Microsoft Word is often sufficient Intro to Psychology and Intro to Psych. Are
to organize simple tasks. these the same course? Which name is the
correct one? Confusion arises when data is
inconsistently entered. Establishing data
school also tracks other information about consistency is difficult to do with a list.
you, such as your residence hall address. Aside from data redundancy and
Consider the two lists shown in Figure 11.3. inconsistency, are there any other
Figure 11.3a is a list the registrar’s office problems with using lists instead of
uses to keep track of students, the classes databases? What if someone accidentally
they are taking, and the meal plan they se- entered Jennifer Evans’s enrollment data
lected. Figure 11.3b is a list the residence hall twice in the list in Figure 11.3a? Any reports
manager uses to track where students are (such as student bills) that are generated
housed. based on this list will be inaccurate because of
What’s the problem with having the duplicate data. For example, Jennifer
two lists? First, there is a great deal of would be sent two separate bills for her
duplicated data between the two lists in classes, resulting in confusion and headaches.
Figure 11.3. For example, each time Donald In Figure 11.3a, each student has selected Figure 11.3
Lopez registers for a class, his name and one of the college’s meal plans, and this data (a) A class registration list
address are entered. He needs to provide must be entered into each row. What if and (b) a list of residence
hall assignments are two
the same data to the residence hall manager someone enters a nonexistent meal plan in lists that a college might
when he receives his residence hall one of the rows pertaining to Donald Lopez? create to keep track of
assignment. This data redundancy, though student information.
not a problem in the small lists in
Figure 11.3, can be problematic when a a
college or university has 10,000 stu-
dents. Imagine the time wasted by
entering data multiple times, semester
after semester. Imagine, too, the
increased likelihood that someone will
make a mistake.
Second, each time the information in
the list changes, multiple lists must be
updated. If Li Chan moves, his data
will need to be updated in all the lists
that contain his address. It would be
easy to overlook one or more lists or
even one or more rows in the same list.
This would lead to a state of data
inconsistency. It would not be
possible to tell easily which data was
b
correct. In addition, notice that Jennifer
Evans’s last record in Figure 11.3a
contains a different street address than
that shown in her other records. It’s
impossible to tell which address is
correct, again resulting in data
inconsistency.

Life Without Databases 519


This is not only wrong, but also can be con- online database (called Yahoo! People
fusing to anyone viewing the list. With a list, Search) that helps users find a person’s
anything can be entered in a row or column, street address or e-mail address. Media
even if that information is incorrect. providers such as Netflix, which rents DVDs
In addition, information can be organized and streams video content to consumers,
in many ways. Consider the list of residence store subscribers’ mailing addresses and
hall assignments in Figure 11.3b, which is payment information in a database. In this
organized alphabetically by last name. This section, we explore the advantages of using
works well for the accounting clerk, who databases as well as the terminology data-
needs to generate bills for student housing. bases use to categorize data.
However, for the residence manager who
wants to see which residence hall rooms are
still vacant, it would be more useful to have
the data organized by residence hall and
Advantages of Using Databases
room number. Reorganizing multiple lists in How do databases make our lives
this way can be labor intensive. easier? Without databases, you could not
A final problem with lists is how to han- store and retrieve large quantities of infor-
dle incomplete data. In Figure 11.3a, Diane mation easily. Consider airline reservation
Coyle has enrolled in the col- systems. Thousands of peo-
lege but has not yet selected ple fly across the United
a meal plan or registered for
courses. Her known infor-
mation has been entered, but
it’s impossible to tell by
“ How do
databases make
information
States on any given day.
Without a database, it
would be extremely diffi-
cult to keep track of such a
looking at her record large number of airline
whether data relating to her
sharing reservations. In addition,
possible?

course registrations and although you can look up
meal plans is available and information fairly quickly
just was not entered, or is in a list, even extremely
truly missing. large electronic databases can provide the
Can’t I just exercise caution and information you request in seconds. Data-
set rules for updating lists? Carefully bases provide three main advantages: They
following the rules when you update a list enable information sharing, they promote
like the ones shown in Figure 11.3 can ad- data integrity, and they allow the flexible
dress many of the problems mentioned, but use of data.
there is still room for error. Being careful How do databases make informa-
does not avoid the most pressing problems tion sharing possible? Consider stu-
of lists: (1) the inability of the data to be dent records at a college. As noted earlier,
shared and (2) data redundancy. Even if you without databases, financial aid, admissions,
could surmount all of these problems, you and student housing would all need their
cannot easily change a list to accommodate own student lists (files). The information in
the disparate needs of many users. these lists might not match because each
How can I solve the problems as- department would maintain its own records.
sociated with lists? For single topics, a If a change had to be made in a student’s
list is sufficient. However, for any complex address, all three lists (the financial aid file,
data that needs to be organized or shared, the admissions file, and the student housing
using a database is the most practical and file) would have to be changed.
efficient way to avoid the pitfalls associated As shown in Figure 11.4, with a database
with using lists. only one file is maintained, which reduces
the possibility of errors when data is entered
or updated. It also increases efficiency, be-
Database Building cause there are no files to reconcile with
each other. A database therefore provides for
Blocks data centralization. There is no need for
Almost any kind of data that needs organi- multiple lists. Each department that needs to
zation and analysis can be put into a data- use student information accesses it from the
base. For example, Yahoo! maintains an same set of data.

520 Chapter 11 Behind the Scenes: Databases and Information Systems


How do databases
promote data in-
tegrity? Data integrity Financial Aid Office
means that the data con-
tained in the database is
accurate and reliable.
Data centralization goes
a long way toward ensur-
ing data integrity. Instead
of being in multiple lists A teacher enters
that have to be main- student grades
tained, your name and Student Registration
address information is Student financial aid
records are updated
maintained in only one
place. If you move, your
address must be changed
only once. Student
How do databases Information
Database
provide flexibility?
Another significant
advantage of databases is
that they are flexibly Student Housing Office
organized, enabling you
to reorganize the infor- more complex to con-
mation they contain in a struct and administer
variety of ways to suit than lists. They also can A student registers for
the needs of the moment. be time-consuming and classes and checks
Think back to the earlier expensive to set up. Great her grades
example regarding lists. care must be exercised in Figure 11.4
The registrar and hous- the design of databases to Using a database lets data
ing manager need to see ensure they will function as be centralized, so that
different information. A student is assigned intended. Although aver- only one copy of relevant
With a list, you can organize to a residence hall age individuals can design small data must be maintained.
information in only one way. If databases, it is helpful to have an All database users
therefore access the
information is in a database, the registrar experienced database administrator (or same up-to-date
can easily view just the information she database designer), an individual trained in information.
needs (such as the courses the student is the design and building of databases, to as-
taking). Likewise, the housing manager can sist with the construction of large databases.
easily view just the information she needs Data privacy concerns also arise when
(such as the residence hall to which the using databases. Think about how much
student is assigned). information you’ve provided to your school.
Data flexibility also makes information The school probably has records of your
dissemination tasks easier. Suppose your Social Security number, birth date, address,
school wants to send out a mailing about a and credit card information. These are
new course to all business majors. Having things an identity thief would love to get
the contact information of students available their hands on. For this reason, many
in a database makes it easy to merge the colleges and universities no longer use
data, using an application such as Microsoft Social Security numbers as student identifi-
Word, and create personalized letters and cation (ID) numbers. Instead, they create a
address labels. Obviously, this would be unique student ID number when you
much faster than generating these items register, which helps protect your Social
manually, and the results should contain Security number from falling into the wrong
fewer errors. Thus, databases can manage hands. Despite the increased complexity
larger amounts of data and process that data of databases and the issues surrounding
more efficiently. privacy, however, the advantages of data-
Are there any disadvantages asso- bases far outweigh the administrative
ciated with databases? Databases are disadvantages.

Database Building Blocks 521


Li Chan’s contact information The column City Class Code
and class registration information represents one field is a
constitute one record in this database field name

Figure 11.5
In a database, a category
of information is stored in
Database Terminology class registration list shown in Figure 11.5.
a field. A group of related
Each field is identified by a field name, which
How is data stored in a is a way of describing the field. Class Code is
fields is called a record,
database? Understanding how data- a field name in the class registration list data-
and a group of related
records is called a table bases store information requires knowing base in Figure 11.5. In a database, fields have
(or file). This is a table that the unique terminology developed to de- other characteristics to describe them, includ-
contains records for all scribe databases. As shown in Figure 11.5,
students registered for
ing field data types and field size.
databases have three main components: What are data types? When fields
classes in the current
fields, records, and tables (or files). are created in the database, the user assigns
semester.
those fields a data type (or field type). The
Fields data type indicates what type of data can be
What is a field? A database stores each stored in the field.
category of information in a field. Fields are Common data types are listed and illus-
displayed in columns. The city where a stu- trated in Figure 11.6 and described in the
dent lives can be found in the City field in the remainder of this section.

Figure 11.6 COMMON DATA TYPES AND ILLUSTRATIVE DATA


Data Type Used to Store Examples
Text Alphabetic or alphanumeric data Mirabel
CIS 110

Numeric Numbers 256


1.347
$5,600

Computational Computational formulas Credit hours ⫻ per-credit tuition charges

Date Dates in standard date notation 4/15/2014

Memo Long blocks of text Four score and seven years ago, our fathers brought forth on this continent a
new nation, conceived in liberty, and dedicated to the proposition that all men
are created equal.

Object Multimedia files or documents MP3 file


AVI file

Hyperlink A hyperlink to a Web page pearsonhighered.com/techinaction

522 Chapter 11 Behind the Scenes: Databases and Information Systems


• A text field can hold any combination the data it contains. If you define a field size
of alphanumeric data (letters or of 50, space is reserved for 50 characters in
numbers), but is most often used to that field, whether or not all 50 characters are
hold words. Although text fields can used. Therefore, if you know that a character
contain numbers (such as telephone field will have a maximum of two characters,
numbers), they are stored as text defining the field size as 50 wastes space and
and therefore cannot be used in makes the files unnecessarily large. This can
calculations. cause decreased database performance,
• A numeric field stores numbers. Unlike especially in large databases.
values in text fields, values in numeric
fields can be used to perform calcula- Records and Tables
tions. For instance, the numbers stored
What are records and tables in data-
in numeric fields can be used to calcu-
bases? A group of related fields is
late tuition owed.
called a record. For example, a student’s
• A computational field (or computed name, address, and class registration
field) is a numeric field that stores the information comprise a record. A group of
contents of a calculation, which is gener- related records is called a table (or file).
ated with a formula in the numeric field. Tables usually are organized by a
This is similar to a formula computation
common subject. Figure 11.5 shows a table
in a spreadsheet cell.
that contains records for all students
• A date field holds data such as birth- registered for classes in the current
days and due dates. semester.
• A memo field is like a text field but can
hold long pieces of text. For example, a
paragraph describing your high school Primary Keys
achievements would be stored in a
Can fields have the same values in
memo field.
the same table? Yes, they can. It is pos-
• An object field holds items such as
sible that two students may live in the same
pictures, video clips, or documents. town or have the same last name. However,
• A hyperlink field stores hyperlinks to to keep records distinct, each record must
Web pages. have one field that has a value unique to
that record. This unique field is called a
What is meant by field size? Field primary key or a key field. For example, as Figure 11.7
size defines the maximum number of shown in Figure 11.7, in student records, the
Unique student ID
characters or numbers that a field can hold. primary key is the student ID number (field numbers make ideal
If a numeric field has a size of 5, it can hold a name SID#). Establishing a primary key and primary keys because
number as high as 99999. As a rule, you ensuring that it is unique make it impossible even students with the
should tailor the field size to the length of to duplicate records. same name won’t
have the same ID number.

Same name, different


primary keys

Database Building Blocks 523


What makes a good primary often use these numbers to track individuals
key? We already have many numbers that and their transactions.
follow us through our lives that make excel- Primary keys don’t have to be numbers
lent primary keys. In the past, Social Secu- that already represent something. For exam-
rity numbers were often selected as primary ple, when you place an order with
keys in databases containing data about in- Amazon.com, your transaction gets a
dividuals. More recently, concerns about unique order number. This number is the
identity theft have led many businesses to Amazon database’s primary key. You refer
abandon Social Security numbers as the pri- to this number when checking your order
mary means of identifying individuals. Dri- status, returning merchandise, and so on. It
ver’s license numbers are unique within a is essential to have a unique number for
particular state, as are the license plate num- each order because it would be difficult to
bers on cars. State government agencies keep track of it without one.

BITS Music Database Helps You Find Database Types


AND
BYTES New Music Many different types of electronic databases
have been used since the invention of
You probably have hundreds of songs that you listen to regularly. Wouldn’t it be great the computer. The three major types of
if you could receive music recommendations based on the common attributes of databases currently in use are relational,
music you already enjoy, instead of random comments from your friends or less reli- object-oriented, and multidimensional. Of
able data such as buying patterns? these three, relational databases have the
The Music Genome Project provides such recommendations by analyzing songs largest market share, but the market share of
and categorizing them in a database according to almost 400 different attributes, multidimensional databases is growing at a
such as “breathy female lead vocalist” or “club rap roots.” Pandora Internet Radio fast pace.
(pandora.com) currently uses the Music Genome Project to provide music to listen-
ers based on their music preferences.
With Pandora, you can create radio stations that play music based on facts you Relational Databases
provide, called seeds. Seeds can be either song titles or the names of musical artists.
What is a relational database? A
So, if you enjoy music from Train (see Figure 11.8) or like the song “Bulletproof” (by
relational database organizes data in table
La Roux), you would enter these as seeds for a Pandora station. Pandora then would
format by logically grouping similar data
play music with attributes similar to the seeds you provided. You can’t control which
into a relation (a table that contains related
songs will play, because they are served up randomly, but they will likely be songs you
data). As discussed earlier, each record in a
will enjoy, even if you have never heard them before.
database table is assigned a primary key to
ensure that the record is unique. In relational
databases, tables are logically linked to each
other by including their primary keys in
other tables with related information.
For example, at your college, a database
about students would have a table with stu-
dent contact information (name, address,
and phone number) and another table with
class registration information (class number
and meeting times). These two tables would
be linked by a primary key such as a student
ID number. Data types common in relational
databases are text, numeric, and date, al-
though relational databases can possess
other data types.
Who invented the relational data-
base? E. F. Codd first significantly de-
fined the relational model in 1970. Since
then, much research and development have
Figure 11.8
been done on the relational database model,
A Pandora radio “station” set up based on a seed for the group Train. and the model has proven to be extremely
reliable for storing and manipulating data.

524 Chapter 11 Behind the Scenes: Databases and Information Systems


Object-Oriented Databases ACTIVE Understanding
HELP- Database
What is an object-oriented database?
DESK Management
An object-oriented database stores data in
objects, rather than in tables. The models on Systems
which these databases are formed derive
In this Active Helpdesk call, you’ll play the role of a
from the object-oriented programming para-
helpdesk staffer, fielding calls about database
digm, discussed in Chapter 10, which was
management systems, what they do, and how people
catching on in the programming community
can use them.
in the late 1980s. Objects contain not only
data, but also methods for processing or
manipulating that data. This allows object-
oriented databases to store more types of many respects to SQL (structured query
data than relational databases and to access language), a standard language used to con-
that data faster. struct queries to extract data from databases.
For example, a “student” object that
contains data about the courses a student is
taking might also store the instructions for Multidimensional Databases
generating a bill for the student based on his
or her course load. Because object-oriented What is a multidimensional data-
databases store the instructions for doing base? A multidimensional database
computations in the same place as they store stores data in more than two dimensions.
the data, they can usually process requests This distinguishes it from a relational data-
for information faster than can relational base, which stores data in two-dimensional
databases (which would only store the tables. Multidimensional databases organize
student information). data in a cube format. Each data cube has a
Why would I use an object- measure attribute, which is the main type of
oriented database? Whereas relational data that the cube is tracking. Other
databases excel in the storage of structured elements of the cube are known as feature
(analytical) data (such as “Bill” or “345”), attributes, which all describe the measure
object-oriented databases are more adept at attribute in some meaningful way. For
handling unstructured data. Unstructured example, sales of automobiles (measure
data includes nontraditional data such as attribute) could be categorized by various
audio clips (including MP3 files), video dimensions such as region, automobile
clips, pictures, and extremely large docu- color, automobile model, time period (such Figure 11.9
ments. Data of this type is known as a as current month), or salesperson—all fea-
Multidimensional
binary large object (BLOB) because it is ture attributes (see Figure 11.9). In addition, databases describe
actually encoded in binary form. the database could be constructed to define data in at least three
Object-oriented databases are based on different levels within a particular dimensions.
complex models for manipulating data. feature attribute (such as state and
Autos
These models are much more complex than town within a region).
What are the advantages lA lB lC lD lE
relational database models. Because busi- de de de de de
of multidimensional data- o o o o o
nesses today need to store a greater variety M M M M M
of data, object-oriented databases are be- bases? The two main
coming more popular. Many relational data- advantages of multidi-
base systems have been expanded to include mensional databases
object-oriented components. For a business are that they can
to use its data in an object-oriented data- easily be
base, it needs to undergo a costly conversion
process. However, once this initial cost is May
overcome, the faster access and reusability
of the database objects can provide advan- June
Months

Northern
tages for large businesses.
Object-oriented databases also need to use July Southern
a query language to access and manage data.
n

Eastern
io

Many object-oriented databases use object August


eg
R

query language (OQL), which is similar in Western

Database Types 525


customized to provide information to a vari- Therefore, you must create a description of
ety of users (based on their need), and they the data. This description is contained in the
can process data much faster than pure rela- database’s files and is referred to as the data
tional databases can. The need for processing dictionary or the database schema. The data
speed is especially critical when deploying a dictionary defines the name, data type, and
large database that will be accessed via the length of each field in the database. Describ-
Internet. Therefore, large databases such as ing the data helps to categorize and analyze
eBay that are accessed by many users needing it and sets parameters for entering valid data
to view data in different ways are usually into the database (such as a 10-digit number
designed as multidimensional databases. in a phone number field).
Oracle Corporation has slowly morphed its How do I know what fields are
tried-and-true relational database into a needed in my database? Careful plan-
multidimensional database in response to ning is required to identify each distinct piece
customer demand. This was of data you need to capture.


primarily in response to cus- Each field should describe a
tomers who were using an Or- Each field unique piece of data and
acle database for applications should describe should never combine two
deployed on the Web and a unique piece separate pieces of data.
needed better ways of storing For example, for student
of data.
and accessing image, audio,
and video files. With multidi-
mensional databases such as the current
Oracle Database 11g, businesses do not have
” registration at a college,
capturing the student’s
name, street address, city, state, and zip code
is important. But should a student’s name be
to abandon the proven relational database placed in one field or two? Because first and
model, because multidimensional databases last names are separate pieces of data, you
are based on proven relational database would want to create a separate field for
theory. each. For instance, suppose you wish to
send an e-mail message to students address-
ing all of them by their first names (such as
Database “Dear Susan”). If Susan’s first and last
Management names are in the same field in the database,
it will be difficult to extract just her first
Systems: Basic name for the salutation.
Operations What does a data dictionary look
Databases are created and managed using a like, and how do I create one? In
database management system (DBMS). A Microsoft Access, the data dictionary is
DBMS is specially designed application soft- called the Field Properties box. Figure 11.10a
ware (such as Oracle Database or Microsoft shows the Field Properties box for a database
Access) that interacts with the user, other table in Access. The first step in creating an
applications, and the database to capture entry in the data dictionary is to create a field
and analyze data. The four main operations name. Field names should be unique within
of a DBMS are a table. In the table in Figure 11.10a, the field
name State is used to store the abbreviation
1. Creating databases and entering data. for the state where the student lives.
2. Viewing (or browsing) and sorting Second, you must define a data type for
data. each field. For the State field, you use a text
3. Querying (extracting) data. data type because names are expressed
using characters. Third, you should set a
4. Outputting data. maximum field size (in this case, two
In the next section, we look at each of characters) for the field. Data in the field
these operations in detail. can be shorter than the maximum but can
never exceed it. Sometimes the field name
may not be meaningful to the user of the
Creating Databases and Entering Data database even though it makes sense to the
How do I create a database with a designer. The Caption value allows you to
DBMS? To create a database with a DBMS, display a name of your choice on forms and
you must first define the data to be captured. reports.

526 Chapter 11 Behind the Scenes: Databases and Information Systems


a

Properties of highlighted field


display below

Field size set to 2

Displays instead of field name

Default value for State field

Figure 11.10
Finally, you can set a default value for a add additional fields as needed but this does (a) The Field Properties
field. A default value is the value the not negate the need for proper planning and box, shown for the
Student Information table
database uses for the field unless the user design of a database. You will need to popu- in an Access database,
enters another value. Though not appropri- late (enter data into) into any new fields that represents the database’s
ate for first names, because they vary are added to your database. This could be data dictionary. (b) The
widely, default values are useful for field difficult if you suddenly need to add a Birth Student Information table,
data that is frequently the same. For exam- Date field to a database that already con- ready for data input,
results from setting up
ple, setting a default value for a State field tains records for 10,000 individuals. If you the data dictionary in
saves users from having to enter it for each plan to use the Birth Date field to analyze Figure 11.10a.
student if most students live in one state. the data, you need to have a plan for accu-
You need to repeat these steps for each mulating birth dates to ensure the complete-
field in the table. When completed, the re- ness of the data.
sulting Student Information table, shown in
Figure 11.10b, is ready for data entry. Inputting Data
The attributes (such as data type and field
How do I get data into the database?
size) shown in Figure 11.10a and 11.10b are
After you create a data dictionary for each
metadata: data that describes other data.
table (or file) in the database and establish
Metadata is an integral part of the data dic-
tionary. You need to build the data diction-
ary for each table you will use in a database ACTIVE
before you enter data into the database. This HELP- Using Databases
also has the benefit of forcing you to con- DESK
sider up front the data you need to capture
and the metadata that describes it. In this Active Helpdesk call, you’ll play the role of a
What happens if I forget to define helpdesk staffer, fielding calls about databases, their
a field in the data dictionary or if I benefits, their components, and how relational data-
want to add another one later? bases organize and manipulate data.
Databases are extremely flexible. You can

Database Management Systems: Basic Operations 527


the data dictionary. Nonconforming data is
flagged (either on-screen or in a report) so
Blank box for data entry that you can modify the data to fit the data-
base’s format.
How can I make manual entry into
a database more convenient? For
small databases, or databases in which no
electronic information is to be imported, you
can create an input form to speed data entry.
An input form provides a view of the data
fields to be filled, with appropriate labels to
assist database users in populating the data-
base. Figure 11.11 shows an example of an
Notes for users input form for the Student Information table
shown in Figure 11.10. Each field has a label
that indicates the data to be placed in the
field. The data is represented by blank
Figure 11.11
the fields you want the database to contain, boxes. Notes have been added to the form
The input form used for you can begin creating individual records in to guide the users.
entering data into the
the database. There’s an old-fashioned way
Student Information table.
to get data into these records: you can key it
directly into the database. However, today, a Data Validation
great deal of data already exists in some type How can I ensure that only valid data
of electronic format (such as word processing is entered into the database? One
documents and spreadsheets). Fortunately, feature of most DBMSs is the capability to
most databases can import data electroni- perform data validation. Validation is the
cally from other application files, which can process of ensuring that data entered into
save an enormous amount of keying. the database is correct (or at least reason-
Figure 11.12 When importing data, most databases able) and complete. When you registered for
A validation rule set to usually apply filters to the data to determine college, for example, the admissions clerk
restrict rates of pay to a that it is in the correct format as defined by most likely asked you for your phone num-
certain range.
ber. A phone number in the United States
usually comprises 10 digits formatted in
the following fashion: (610) 555-1234. A
validation rule is set up in the student
database to alert the user if a clearly wrong
entry, such as “Joh-nSm-ythe” or “2345,” is
entered in the phone number field instead of
a valid 10-digit phone number.
Validation rules are generally defined as
part of the data dictionary. Violations of vali-
dation rules usually result in an error mes-
sage being displayed on the screen so that
the error can be addressed. Common types
of validation checks include range, com-
pleteness, consistency, and alphabetic and
numeric checks.
How does a range check work? A
range check ensures that the data entered
into the database falls within a certain range
of numbers. For instance, rates of pay for
Validation rule restricts entries student jobs usually fall within a certain
range. Therefore, in a student pay database,
you could set a field constraint (a property
that must be satisfied for an entry to be ac-
cepted into the field) to restrict pay rates to a
range you define.

528 Chapter 11 Behind the Scenes: Databases and Information Systems


fields to see if these values
are reasonable. For exam-
ple, your birth date and the
Required field date you enrolled in school
are often in a college’s data-
base. It is not possible for
you to have enrolled in
college before you were
born. Further, most college
students are at least
16 years old. Therefore, a
consistency check on these
Error message fields might ensure that
your birth date is at least
16 or more years before the
date when you enrolled in
college.
How are alphabetic
Figure 11.13 and numeric checks used? You may
A database completeness check, like this one shown want to restrict fields to only alphabetic or
for Amazon, ensures that all fields defined as numerical data (such as for names and stu-
“required” have data in them. dent ID numbers). An alphabetic check con-
firms that only textual characters (such as
“Gwen”) are entered in a field. A numeric
check confirms that only numbers are
Figure 11.12 shows how you set up a entered in the field. With these checks in
range check in a data dictionary (in the place, “St3v3” would not be accepted as a
Field Properties box) for an Access first name or a zip code. Figure 11.14 shows
database. A validation rule restricts the how you can set such checks and customize
entries for the Rate of Pay field to amounts error messages in Access.
between $7.25 (minimum rate of pay) and
$20.00 (the maximum rate of pay for
students at the college). If users tried to
enter a rate of pay less than $7.25 or greater
than $20.00, they would be notified of an
invalid range error and the input would not
be accepted.
What does a completeness check
accomplish? If you have ever bought
anything online, you have probably
encountered error messages generated
by completeness checks. In database
systems, fields can be defined as
“required,” meaning data must be entered
into them. A completeness check, such as Validation rule requires
alpha characters
the one shown in Figure 11.13, ensures
that all fields defined as “required” have
data entered into them. When a user
submits this form, the database performs Error message displays
a completeness check and, in this case, for invalid entry
notices that the required “Address Line 1”
field was left blank. An error message Field must contain data
then displays to alert the user of the
omission.
What is the function of a consis- Figure 11.14
tency check? A consistency check Although several types of validation rules have been activated here, you
compares the values of data in two or more probably wouldn’t find it necessary to use all of them at once.

Database Management Systems: Basic Operations 529


DIG
DEEPER
Structured Query Language (SQL)

To extract records from a database, you use a query language. Almost all a commercial database product in 1979. It has been the unofficial stan-
relational and object relational databases today use structured query dard language for relational databases since then.
language, or SQL. Oracle, Microsoft SQL Server, Microsoft Access, IBM SQL uses relational algebra to extract data from databases.
DB2, and MySQL are examples of popular databases that use SQL. Relational algebra is the use of English-like expressions that have vari-
When relational databases were first developed in the early 1970s, ables and operations, much like algebraic equations. Variables include
each DBMS software product contained its own query language. This table names, field names, or selection criteria for the data you wish to
meant that database administrators had to learn a new language display. Operations include directions such as select (which enables you
whenever they worked with a different DBMS. The early query lan- to pick variable names), from (which tells the database which table to
guages were mathematically based and often difficult to master. E. F. use), and where (which enables you to specify selection criteria). The two
Codd, who has been called the father of relational databases, proposed most common queries used to extract data using relational algebra are
a standardized query language when he worked at IBM in the select queries and join queries.
mid-1970s. A select query displays a subset of data from a table (or tables) based
The original language was called SEQUEL, short for structured on the criteria you specify. A typical select query has the following format:
English query language. The idea was to make queries easy by using
English language–like sentence structure. Database software designers SELECT (Field Name 1, Field Name 2,...)
enthusiastically accepted the concept, developing a modified version of FROM (Table Name)
the original SEQUEL language, named SQL. Oracle first introduced SQL in WHERE (Selection Criteria)

a
aapplied to

aapplied to
this table

this table
Query

Query
th

th

SELECT First Name, Last Name, Telephone SELECT First Name, Last Name, Telephone
FROM Student Information Table FROM Student Information Table
WHERE State = MA
this output
put
ut
Produces
es
es

this output
put
Produces
es
es

b
c

Figure 11.15
When the query on the left is applied to the (a) Student Information table, it restricts the output to (b) only a phone list.
The query on the right, which uses a WHERE statement, further restricts the phone list to (c) only students from
Massachusetts.

530 Chapter 11 Behind the Scenes: Databases and Information Systems


The first line of the query contains variables for the field names you but the contents of the State field are not required to be displayed in the
want to display. The FROM statement enables you to specify the table query results. This explains why the output shown in Figure 11.15c
name from which the data will be retrieved. The last line (the WHERE state- doesn’t show the State field.
ment) is used only when you wish to specify which records need to be dis- When you want to extract data that is in two or more tables, you use
played (such as all students with GPAs greater than 3.2). If you wish to a join query. The query actually links (or joins) the two tables using the
display all the rows (records) in the table, then you do not use the WHERE common field in both tables and extracts the relevant data from each. The
statement. (See Figure 11.15.) format for a simple join query for two tables is as follows:
Suppose you want to create a telephone list that includes all students SELECT (Field Name 1, Field Name 2)
from the Student Information table in Figure 11.15a. The SQL query you FROM (Table 1 Name, Table 2 Name)
would send to the database would look like this:
WHERE (Table 1 Name. Common Field Name = Table 2 Name. Common
SELECT (First Name, Last Name, Telephone) Field Name)
FROM (Student Information Table) AND (Selection Criteria)
Figure 11.15b shows the output from this query. Notice how similar this is to a select query, although the FROM state-
What if you want a phone list that only shows students from ment must now contain two table names. In a join query, the WHERE state-
Massachusetts? In that case, you would add a WHERE statement to the ment is split into two parts. In the first part (right after WHERE), the relation
query as follows: between the two tables is defined by identifying the common fields be-
SELECT (First Name, Last Name, Telephone) tween the tables. The second part of the statement (after AND) is where
the selection criteria are defined.
FROM (Student Information Table)
The AND means that both parts of the statement must be true for the
WHERE (State ⫽ MA)
query to produce results (i.e., the two related fields must exist and the se-
This query restricts the output to students who live in Massachusetts, lection criteria must be valid). Figure 11.16 illustrates using a join query for
as shown in Figure 11.15c. Notice that the State field in the Student Infor- the Student Information and Roster Master tables to produce a class roster
mation table can be used by the query (in this case, as a limiting criterion), for students.

Data drawn from


appropriate table

SELECT First Name, Last Name, Class Code


FROM Student Information Table, Roster
Master Table
WHERE Student Information Table.SID# =
Roster Master Table.Student ID#

Tables and All tables to be joined


field name are identified in this
(separated by part of the query
a period) of the Output that
common field results from
are identified executing
for each table this query

Figure 11.16
This join query will display a student roster for each student in the Student Information table. Notice that the
WHERE statement creates the join by defining the common fields (in this case SID # and Student ID#) in each table.

Database Management Systems: Basic Operations 531


additional course for
Click to sort highlighted column the current semester, the
a
admissions clerk would
browse the roster database
to determine which courses
you are already taking.
However, browsing
through a large database
is time consuming unless
the records are in an
order that makes your
task easy.
How can I reorder
records in a database?
You can easily sort a
database into the order that
b you need. Sorting a
database involves organizing it in a new
fashion. Figure 11.17a shows an Access
data table in which the records were input
in no particular order. By highlighting a
column (in this case Last Name) and then
clicking the Sort Ascending button, the
database displays the records in alphabetical
order by last name, as shown in
Figure 11.17b.
What if I want to find a particular
piece of data in a database?
Browsing records works for small databases,
but if the amount of data you are managing
Figure 11.17 is small, then you probably will just
(a) Shown is an unsorted table. Notice that the Last Name column is selected maintain it in a list anyway. To find data in
(highlighted) for sorting. Selecting the highlighted sorting option (Ascending) a large database quickly and efficiently,
produces the sorted output (b) with the records sorted in ascending alphabetical
order by last name. you need to be able to request only the
data you are seeking. Therefore, database
management systems let you query the
The field properties table for the State data to enable you to find what you’re
field in Access is shown in Figure 11.14. looking for.
The expression “Like??” tells Access to
restrict entries for the State field to two
alphabetic characters. Selecting “Yes” for Extracting or Querying Data
the required attribute means that Access
will not allow the field to be left blank. What is a query? A query is a question
Error messages that display when or inquiry. A database query is a question
validation checks fail can be customized
by the user.

SOUND Creating an Access


Viewing and Sorting Data BYTE 2010 Database
How can I view the data in a data-
base? Displaying the tables on-screen In this Sound Byte, you’ll learn how to create an
and browsing through the data (viewing Access database to catalog a collection of CDs and
records) is an option with most databases. In DVDs. The Sound Byte will take you through a system-
many instances you’ll only want to view atic process that will result in a fully functional small
the data, not display the entire table. For database.
example, if you want to register for an

532 Chapter 11 Behind the Scenes: Databases and Information Systems


you ask the database so that it provides and creates the appropriate SQL commands
you with the records you wish to view. behind the scenes.
When you query a database, you instruct However, you may want to create your
it to search for a particular piece of data, own SQL queries in Access, modify
such as a student’s grade point average existing queries at the SQL language level,
(GPA). Queries also enable you to have or view the SQL code that the wizard cre-
the database select and display records ated. To do so, open a query and select SQL
that match certain criteria, such as all of View from the View drop-down box on the
the students who have GPAs of 3.2 or Ribbon. This displays the SQL code that
higher. makes up the query. Figure 11.19 shows the
Is querying a database as simple SQL code that the query in Figure 11.18
as just asking the proper question? created.
All modern DBMSs contain a query
language that the software uses to retrieve
and display records. A query language Outputting Data
consists of its own vocabulary and sentence
structure, which you use to frame the How do I get data out of a database?
requests. Query languages are similar to The most common form of output for any
full-blown programming languages but are database is a viewable (or printable) elec-
usually much easier to learn. The most tronic report. Businesses routinely summa-
popular query language today is structured rize the data within their databases and
query language, or SQL (pronounced compile summary data reports. For instance, Figure 11.18
at the end of each semester your school (a) The Simple Query
“sequel”). Wizard displays all fields
Do I have to learn a query lan- generates a grade report for you that shows
available in your table so
guage to develop queries for my the classes you took and the grades you that you can select the
database? Modern database systems received. ones you need. (b) This
provide wizards to information is displayed
when you run the query
guide you through defined in (a).
the process of creat- a

ing queries. Figure


11.18 shows an exam-
ple of an Access wizard
being used to create a
query. Highlighting
an available field
and then clicking the
arrow button adds
the field to the selected Fields displayed by the query
fields list. Selected
fields display in
the query. Highlighting
a field on the selected
fields list and clicking
Arrow button
the back arrow
removes the field from Back arrow
the list. The wizard
speeds up the process of
creating queries, and
also removes the b
need to learn a query language.
The Query Wizard can be found on the
Create tab, in the Macros & Code group.
Click Query Wizard and select Simple
Query Wizard. When you use the Simple
Query Wizard, you’re actually using SQL
commands without realizing it. The Simple
Query Wizard takes the criteria you specify

Database Management Systems: Basic Operations 533


relationships are established among tables in
these databases.

Figure 11.19 Relational Database


The SQL View window shows the SQL code that the wizard created for the query in Operations
Figure 11.18. Although it is a relatively simple SELECT statement, it is much easier to
create with the wizard. As explained earlier, relational databases
operate by organizing data into various
tables based on logical groupings. For
Can I transfer data from a data- example, all student address and contact
base to another software applica- information (phone numbers, e-mail
tion? Database systems also can be used addresses, and so on) would be grouped
to export data to other applications. Export- into one table. Because not all of the data in
ing data involves putting it into an elec- a relational database is stored in the same
tronic file in a format that another table, a methodology must be implemented
application can understand. For example, to link data between tables.
the query shown in the wizard in Figure In relational databases, a link between
11.18 may be used to generate a list of recipi- tables that defines how the data is related is
ents for a form letter. In that case, the query referred to as a relationship. To establish a
output would be directed to a file that could relationship between two tables, both tables
be easily imported into Microsoft Word so must have a common field (or column).
that the data could be used in a mail merge Common fields contain the same data
process to generate letters. (such as student ID numbers), as shown in
In the next section, we look at the opera- Figure 11.21. The fields do not have to have
tion of relational databases and explore how the same field name as long as they contain
the same data.
Relationships in databases can take three
forms: one-to-one, one-to-many, or many-to-
many. A one-to-one relationship indicates
BITS iTunes Smart Playlists—They’re that for each record in a table there is only
AND
BYTES Just Queries! one corresponding record in a related table.
For example, a parking space can be occupied
Ever built a smart playlist in iTunes? If so, you’ve created a database query. iTunes
by only one car at a time, so a table that links
is just a relational database that manages your media. A smart playlist (see
assigned parking spaces to a table of faculty
Figure 11.20) allows you to define multiple criteria to create a playlist. Say you want
members (who are assigned parking spaces)
all songs in the genre Celtic, except for the artist Allison Barber and the album
would have a one-to-one relationship.
Scythian Live. When you define these criteria as “match all” in the smart playlist
One-to-many relationships occur most
creation window, you will get a smart playlist that contains the music you want. You
frequently in relational databases. A one-to-
have built a query that tells iTunes exactly what music to extract from the database
many relationship is characterized by a
and include in your playlist.
record in one table (such as the student in-
formation table in Figure 11.21). There is
only one instance of a student ID in the Stu-
dent Information table, but there can be
many instances of the same student ID in
the Master Roster table. Students can regis-
ter for many classes, but each registration
record can relate to only one student.
A many-to-many relationship is charac-
terized by records in one table being related
to multiple records in a second table and
vice versa. For instance, a table of students
could be related to a table of student
Figure 11.20
employers. The employers could employ
The iTunes smart playlist creation box. many students, and students could work for
more than one employer.

534 Chapter 11 Behind the Scenes: Databases and Information Systems


Normalization a

of Data
How do I decide
which tables I need
and what data to
put in them? You
create database tables
(or files) for two reasons:
to hold unique data about Common field in each table
a person or thing and to
describe unique events or b

transactions. In databases, the goal


is to reduce data redundancy by
recording data only once. This process
is called normalization of the data. Yet
the tables must still work well enough
together to enable you to retrieve the
data when you need it. Tables should
be grouped using logical data that can
be identified uniquely.
Let’s look at an example. In Figure 11.22,
the Class Registration—Fall table contains a
great deal of data about individual
students and their course registration.
However, each table in a relational database
should contain a related group of data on a
Figure 11.21
single topic. There are two distinct topics
in this list: student contact information and (a) The Student Information table and (b) the Roster Master table share the common
field of student ID number. This allows a relationship to be established between the
student registration information. Therefore,
two tables.
this list needs to be divided into two tables
so that the distinct data (contact data and
registration data) can be categorized duplicated in this table. Normalizing the
appropriately. Data about each student is data eliminates this duplication.

Figure 11.22
The column headings in blue are related to student contact data, whereas the column headings in red relate
to enrollment information. To construct an efficient database, these topics should be contained in separate
tables.

Relational Database Operations 535


TRENDS Computers in Society: User-Populated Databases
IN IT

Web 2.0 applications are mostly about enhancing communications and up their ratings by using shill reviewers. And Yelp actively markets to
encouraging making it easy for users to create and disseminate their businesses to pay for placement of ads on their site that some users may
own content. So if you have a database that needs populating, why not mistake for unsponsored reviews. An alternative to Yelp that addresses
seek help from the Web community to populate it, especially if it is de- these concerns is Angie’s list.
signed as a resource for the masses. Angie’s List (angieslist.com) has the same basic premise as Yelp: to
The economy in the United States is largely a service-based econ- have individuals recommend businesses based on their experiences.
omy. Businesses based in the U.S. tend to provide services to individuals However, whereas Yelp derives its revenue from advertising, Angie’s List
or other businesses as the business climate has shifted away from man- is a subscription service. Members pay a monthly fee to access the
ufacturing. Everyone needs haircuts and health care services, and many reviews on Angie’s list. So what do you get for your fees that you don’t
Americans love to eat out. But how do you find reliable service providers get on Yelp? Angie’s List does not permit anonymous reviews. This is a
and good restaurants? Recommendations from friends and family are re- big benefit for business owners because it makes it easier to contact
liable, but what if no one in your circle of acquaintances knows of a good dissatisfied customers and try to resolve issues. Angie’s list also has a
personal trainer or a great dentist? Why shouldn’t the Internet be used to verification process with reviewers to ensure that businesses do not
harness the power of millions of people’s experiences to recommend re- report on themselves. And businesses do not pay to advertise on
liable service providers? Two companies that have successfully plunged Angie’s list; they make the list only when they are reviewed by a
into this arena are Yelp and Angie’s List. consumer.
Yelp (yelp.com) was conceived as the “yellow pages” for the 21st cen- Both Yelp and Angie’s List are searchable databases just like the
tury. Yelp is free to use, and anyone can write a review of a business and other examples in this chapter. But whereas most companies usually
post it to the site. The site has more than 11 million reviews of all types of populate databases with data that they generate or collect themselves,
businesses. Users can easily search the site, find service providers in their these Web sites rely on users to create their content. The databases still
geographic area, and see what ratings (both good and bad) consumers need to be well designed to capture this content, and there needs to be
gave them. Thinking about going to a Chinese restaurant in the Minneapo- processes in place to review the data entered for appropriateness.
lis area that you have never visited (see Figure 11.23)? A quick search on For instance, both Yelp and Angie’s List would want to delete reviews
Yelp found 149 restaurants that fit this broad criteria. Surely you’ll be able that contained racist comments or hate speech, for example. By
to find one that fits your budget and that other people enjoyed visiting. harnessing the power of large groups of users to populate a database,
However, Yelp.com is not without its critics. Because Yelp allows the database owners can reap the rewards of saving time, effort, and
anonymous posting, some people are afraid that businesses may try to money.

Figure 11.23
Yelp’s database is populated with reviews created by users.

536 Chapter 11 Behind the Scenes: Databases and Information Systems


The Student Informa-
tion table in Figure 11.24
organizes all of the stu-
dent contact information
found in Figure 11.22, into
a separate table. Notice
that the information for
each student needs to be Figure 11.24
shown only once, instead of multiple times
and the student’s ID number. This approach Student contact data is
(as in the list in the figure). The unique pri- grouped in the Student
greatly minimizes duplicate data.
mary key for this table is the student’s ID
How do I get the data in the tables Information table and
number. Student information might be needs to be entered only
to work together now that it is split
needed in a variety of instances and by a va- once for each student.
up? The entire premise behind relational The primary key for each
riety of departments, but it needs to reside
databases is that relationships are estab- record is a unique student
only in this one database table, which many ID number.
lished among the tables to allow the data
departments of the school can share.
to be shared. As noted earlier, to establish
Next, we could put the registration data
a relationship between two tables, the
found in Figure 11.22 for each student in a
separate table, as shown in Figure 11.25.
There is no need to repeat student name and
address data in this table. Instead, each stu-
dent can be identified by
his or her student ID
number. However, there Student ID# not unique
are problems with this
table. Each class name
and class code has to be repeated Duplicate data
for every student taking the course,
Also, there is no unique field that can be
used as a primary key for this table. Student
ID # cannot be used because it will be
entered on multiple records when a student
enrolls in more than one course. This
presents another opportunity to normalize
the data further. Figure 11.25
What can be done to fix the table Although it contains related data (registration information), this table still contains a
in Figure 11.25? In Figure 11.25, we great deal of duplicate data and no usable primary key.
have identified more data that should be
grouped logically into another separate
table: class code and class name. Therefore,
we should create another table for just this
information. This enables us to avoid
repeating class names and codes.
Figure 11.26 shows the Course master
table. Note that the class code is unique for
every course and acts as a primary key in
this table.
To solve the other problems with the table
in Figure 11.25, we need a way to identify
uniquely each student registered for a spe-
cific course. This can be solved by creating a
course registration number that will be
unique and assigned by the database as Figure 11.26
records are entered. Figure 11.27 shows the
Related information about courses (class code, class
resulting Roster master table. Only three name, and the credits for the class) is grouped
fields are needed: the registration code num- logically in one table. The unique class code is the
ber (the unique primary key), the class code, primary key.

Relational Database Operations 537


relationship cannot be established between
SOUND Improving an Access tables.
BYTE 2010 Database How do I ensure that a foreign key
field contains a valid primary key
In this Sound Byte, you’ll learn how to create input from the related table? To apply this
forms, queries, and reports to simplify maintenance of restraint, when defining a relationship in a
your CD and DVD database. You’ll follow along step by database, you have the option of enforcing
step, using Microsoft Access wizards to create and referential integrity for that relationship.
modify queries to suit your needs. Referential integrity means that for each
value in the foreign key of one table, there is
a corresponding value in the primary key of
the related table.
tables must have a common field (column). For instance, if you attempt to enter a
This usually involves the primary keys of record in the Roster Master table with an
a table. SID# of 156784522 and referential integrity is
For instance, to track registrations by being enforced, the database checks to
student in the Roster master table in ensure that a record with SID# 156784522
Figure 11.27, the student ID number is the exists in the Student Information table. If
logical piece of data to use. The student ID the corresponding record does not exist,
number is the primary key in the Student then an error message displays. Establishing
Information table in Figure 11.24; however, referential integrity between two tables
in the Roster master table, the student ID helps prevent inconsistent data from being
number is called a foreign key—the pri- entered.
mary key of another table that is included Who manages the data in a data-
for purposes of establishing relationships base? All of the data that is collected in
with that other table. Figure 11.28 shows the databases needs to be stored and managed.
relationships that exist among the Course Database administrators (DBAs) are the IT
Master, Roster Master, and Student Informa- professionals responsible for designing, con-
tion tables. Join lines indicate established structing, and maintaining databases. They
relationships between tables. Tables must review and manage data on an ongoing
contain fields with common data; this estab- basis to ensure data is flowing smoothly in
lishes relationships between them. Notice and out of the database. Figure 11.29 shows
that foreign keys in related tables do not a view of the MySQL Enterprise Dashboard
have to have the same field names as the screen, a tool that is used primarily by
primary keys in the other table; they merely DBAs when reviewing the performance of
have to contain the same data. Relationships a database. Database administrators can
among tables can be established whenever monitor table usage and CPU utilization to
you need them. help determine if database performance is
Because relationships are vital to the acceptable.
operation of the database, it is important to
ensure that there are no inconsistencies in
the data entered in the common fields of
two tables. Each foreign key (Student ID#
in the Roster master table in Figure 11.27)
entered into a table must be a valid
primary key from the related table
(SID# from the Student Information table
in Figure 11.24).
For instance, if 392135684 is not a
valid student ID number for any student
listed in the Student Information table,
then it should not be entered into the
Roster master table. Each entry in the
Roster master table must correspond to a
student (linked by his or her SID#) in the Figure 11.27
Student Information table. If this require- The Roster master table shows only pertinent data
ment is not applied to foreign keys, then a related to a student’s registration.

538 Chapter 11 Behind the Scenes: Databases and Information Systems


For instance, the order
database at Amazon.com
contains such informa-
tion about book orders as
the buyer’s name,
address, and payment in-
formation, and the
book’s name. However,
Join lines the order database does
not contain information
on inventory levels of
books, nor does it list
suppliers from which
out-of-stock books can be
obtained. Data ware-
Foreign houses, therefore, consol-
key idate information from
(Student ID#)
must contain
disparate sources to pres-
valid values ent an enterprise-wide
drawn from the view of business opera-
primary
key (SID#) tions.
Is data in a data
warehouse organized
the same way as in a
Figure 11.28 normal database? Data in the data
The Relationships screen in Microsoft Access visually warehouse is organized by subject. Most
represents the relationships established between databases focus on one specific operational
tables. aspect of business operations. For example,
insurance companies sell many types of in-
surance, such as life, automobile, and home-
In the next section, we explore the types owners’ insurance. Different divisions of the
of systems where databases are typically insurance company are responsible for each
used today. type of insurance and track the policies they

Data Storage
At the simplest level, data is stored in a sin-
gle database on a database server, and you
retrieve the data as needed. This works fine
for small databases and simple enterprises
where all of the data you are interested in is
in a single database. Problems can arise,
however, when the data you need is in mul-
tiple places. Large storage repositories called
data warehouses and data marts help solve this
problem.

Data Warehouses
What is a data warehouse? A data
warehouse is a large-scale electronic reposi-
tory of data that contains and organizes all
the data related to an organization in one
place. Individual databases contain a wealth
of information, but each database’s informa- Figure 11.29
tion usually pertains to one topic. The Enterprise Dashboard in MySQL helps DBAs review database performance.

Relational Database Operations 539


TRENDS Emerging Technologies: Can Your Business Partner Deliver
IN IT the Goods? Enhanced Databases Can Help You Decide!
You watch a weather forecast on television to gain information about the There is a wealth of information online, provided by various sources,
weather. The weather forecaster tells you that it will be sunny. When you which you can use to evaluate potential suppliers before you use them.
get out of your car to go to class, rain is pouring down. Yes, you gathered However, it can be difficult for an individual to tell if the data has been al-
relevant information. Too bad that it was inaccurate information! tered or falsified. Panjiva.com is a Web site that also has a searchable
Data and information stored in databases can be just as unhelpful as database of suppliers. However, the founders of Panjiva decided to make
an inaccurate weather forecast if the information is incorrect or dis- their database different. They gather data that indicates reliability of sup-
torted. Although a poor weather report is probably nothing more to you pliers from sources such as government agencies, independent certifica-
than an inconvenience, accurate data in business is mission critical. tion companies, nonprofit organizations, and customers.
Businesses rely on information in databases every day just to accom- Using the reliability information, Panjiva then creates ratings for com-
plish even routine tasks. panies (on a scale of 1 to 100) based on specific business performance
Developed to respond to business needs, Alibaba.com is one of the criteria such as number of shipments to the U.S. market, their environ-
world’s largest online business-to-business databases. Alibaba.com mental record, and their capability to deliver shipments within promised
specializes in matching suppliers with buyers for all types of manufac- time frames. Subscribers to Panjiva’s database (companies such as The
tured goods and raw materials. With the global nature of business, data- Home Depot) can then feel more comfortable about doing business with
bases such as those maintained by Alibaba.com are essential tools that suppliers that Panjiva has rated for reliability.
assist businesspeople in managing their global business. Figure 11.30 Databases with enhanced information are the wave of the future in
shows a search for cotton fabric supplies in mainland China. You could the business world. So, before you make that next crucial business deci-
also google Chinese fabric manufacturers, and would probably find many sion, ask yourself how much you really know about your prospective
leads. The information in the leads available online may be factually cor- business partner. If you don’t know enough, then find a database that
rect, but how do you determine how reliable these suppliers are? can make you feel more at ease.

Figure 11.30
Using the database on Alibaba.com, a search for cotton fabric suppliers in China results in more
than 200 pages of links to vendors selling some type of cotton cloth.

sell in different databases (one for automo- Automobile Policy Sales database captures
bile insurance policy sales and one for life information about driving accident history,
insurance policy sales, for example), as car model, and the age and gender of the
shown in Figure 11.31. drivers because this information is pertinent
These databases capture specific to the pricing of car insurance policies.
information about each type of policy. The The Life Insurance Policy Sales database

540 Chapter 11 Behind the Scenes: Databases and Information Systems


captures information about the age and Data Collection
gender of the policyholder and notes from Customers
whether he or she smokes, but it does not
include details about cars or driving records. Model
However, data on total policies sold (and of Auto
the resulting revenue generated) is critical to Operational Data
Database Warehouse
the management of the insurance company
Driver Age
no matter what type of policy is involved. and Gender
Therefore, an insurance company’s data Automobile
Policy
warehouse would have a subject called Sales
Policy Sales Subject (see Figure 11.28) that Driver
Accident
would contain information about all policies History
sold throughout the company. The Policy Policy
Sales Subject is a database that contains Sales
Auto Subject
information from the other databases the Policy Cost
company maintains. However, all data in
the Policy Sales Subject database is specifi-
cally related to policy sales. Policyholder
From the Policy Sales Subject database, it Age
is easy for managers to produce comprehen- Total Policy
sive reports such as the Total Policy Sales Sales Report
Report, as shown in Figure 11.31, which can Smoker?
contain information pertaining to all policy Life
sales. Insurance Management
Policy Sales Reporting
Are data warehouses much larger Policyholder
than conventional databases? Data Gender
warehouses, like conventional warehouses,
are vast repositories of information. The Life Policy
data contained within them is not opera- Cost
tional in nature, but rather archival. Data
warehouse data is time-variant data,
meaning it doesn’t all pertain to one period Figure 11.31
in time. Internal data sources are obvious. Sales, Data from individual
The warehouse contains current values, billing, inventory, and customer databases databases is drawn
such as amounts due from customers, as all provide a wealth of information. How- together under appropri-
well as historical data. If you want to ever, internal information is not contained ate subject headings in
examine the buying habits of a certain type a data warehouse.
exclusively in databases. Spreadsheets and
Managers can then
of customer, then you need data about both other ad hoc analysis tools may contain data produce comprehensive
current and prior purchases. Having time- that needs to be loaded into the warehouse. reports that would be
variant data in the warehouse enables you External data sources include vendors impossible to create from
to analyze the past, examine the present in and suppliers that often provide data re- the individual databases.
light of historical data, and make projections garding product specifications, shipment
about the future. methods and dates, electronic billing infor-
mation, and so on. In addition, a virtual
wealth of customer (or potential customer)
information is available by monitoring the
Populating Data Warehouses clickstream of the company Web site.
How are data warehouses populated What is a clickstream, and why is
with data? Source data for data ware- it important? Companies can use soft-
houses can come from three places: ware on their Web sites to capture informa-
tion about each click that users make as they
• Internal sources (such as company data- navigate through the site. This information
bases). is referred to as clickstream data. Monitor-
• External sources (suppliers, vendors, ing the clickstream helps managers assess
and so on). the effectiveness of a Web site. Using
• Customers or visitors to a company’s clickstream data capture tools, a company
Web site. can determine which pages users visit most

Relational Database Operations 541


BITS nature and complexity of the source data de-
AND CRM Tools Go Online termine the complexity of the data staging
BYTES process.
Once the data is stored in the data
Even small businesses harness the power of databases to manage their customers. warehouse, how can it be extracted
Customer Relationship Management (CRM) software contains sophisticated data- and used? Managers can query the data
bases that are designed to manage and track all interactions with customers. Among warehouse in much the same way you
other things, CRM software can 1) help sales people manage their customer interac- would query an Access database. However,
tions, 2) provide communication paths for customers to solicit service and support, because there is more data in the warehouse,
and 3) use analytical tools to identify the best prospects for marketing efforts based much more flexible tools are needed to per-
on customer interests and interactions with the company. Previously, CRM software form such queries. Online analytical pro-
was installed on salespeople’s notebook computers or on servers at a company’s cessing (OLAP) software provides
home office. But with the widespread availability of wireless connections, some CRM standardized tools for viewing and manipu-
products are now offered only online. lating data in a data warehouse. The key fea-
Zoho CRM is part of the online suite of free (and low-priced) tools offered by ture of OLAP tools is that they enable
Zoho.com. For a small business just getting started, Zoho CRM offers a free account flexible views of the data, which the soft-
for up to three users. Even though it is free, the software offers powerful features ware user can easily change.
such as sales force automation (tracking customer leads and contacts), marketing
automation (e-mail advertising campaigns), and customer support tracking and
personal organization tools (calendars, to-do lists, call logging). And as the business Data Marts
grows, additional users can be added for a reasonable monthly fee. The database is
stored totally online by Zoho, so it frees up a small business owner from the worries Is finding the right data in a huge
of database maintenance and backup. So look for online databases that can meet data warehouse difficult? Looking for
your small business needs and reduce your costs. the data you need in a data warehouse can
be daunting when there are terabytes of
data. Therefore, small slices of the data
warehouse, each called a data mart are often
created. Whereas data warehouses have an
often, how long users stay on each page, enterprise-wide depth, the information in
which sites directed users to the company data marts pertains to a single department.
site, and the user demographics. Such data For instance, if you work in the sales de-
can provide valuable clues to what a com- partment, you need accurate sales-related
pany needs to improve on its site to stimu- information at your fingertips—and you do
late sales. not want to wade through customer service
data, accounts payable data, and product
shipping data to get it. Therefore, a data
Data Staging mart that contains information relevant only
to the sales department can be created to
Does all source data fit into the make the task of finding this data easier. An
warehouse? No two source databases overview of the data-warehousing process is
are the same. Although two databases might illustrated in Figure 11.32. Data staging is
contain similar information (such as cus- vital because different data must be ex-
tomer names and addresses), the format of tracted and then reformatted to fit the data
the data is most likely different in each data- structure defined in the data warehouse’s
base. Therefore, source data must be DBMS. Data can be extracted using power-
“staged” before entering the data ware- ful OLAP query tools, or it can be stored in
house. Data staging consists of three steps: specialized data marts for use by specific
1. Extraction of the data from source data- employee groups.
bases
2. Transformation (reformatting) of the
data Managing Data:
3. Storage of the data in the warehouse Information Systems
Many different software programs and Making intelligent decisions about develop-
procedures may have to be created to extract ing new products, creating marketing
the data from varied sources and to reformat strategies, and buying raw materials
it for storage in the data warehouse. The requires timely, accurate information. An

542 Chapter 11 Behind the Scenes: Databases and Information Systems


Figure 11.32
Source Data Web Users
(Internal & External An overview of the data
Sources) warehouse process.

Supplier
Database
OLAP
Query

Customer Information
Order Clickstream Data
Systems
Database (To Extract Data)
Data
Extraction
Billing
Database Data Data Marts
Warehouse
DBMS
Sales
Department
Data Staging Data Mart
Data
Extraction

Data Customer
Reformatting Reformatted Service
Data Stored Data Mart

information system is a software-based


Data Acquisition
solution used to gather and analyze infor-
mation. A system that delivers up-to-the- Tele-Salesperson Supplier Shipments Online Shopping
minute sales data on books to the computer
of Amazon.com’s president is one example
of an information system. Databases, data
warehouses, and data marts are integral
parts of information systems because they
store the information that makes informa-
tion systems functional.
All information systems perform similar
functions, including acquiring data, process- Information Storage
ing that data into information, storing the
Data Processing
data, and providing the user with a number Procedures
of output options with which to make the
information meaningful and useful (see
Figure 11.33). Most information systems fall Output Methods
Information
Retrieval and
into one of five categories: (1) office support Dissemination
Online Data Retrieval Reports
systems, (2) transaction-processing systems,
(3) management information systems,
(4) decision support systems, and (5) enter-
prise resource planning (ERP) systems. Each
type of system almost always involves the
use of one or more databases.

Office Support Systems


Figure 11.33
What does an office support system All information systems perform similar functions, including acquiring data, process-
accomplish? An office support sys- ing that data into information, storing the data, and providing the user with a number
tem (OSS) is designed to improve of output options with which to make the information meaningful and useful.

Managing Data: Information Systems 543


communications and assist employees in Transaction-Processing Systems
accomplishing their daily tasks. Microsoft
Office is an example of an OSS because it What is a transaction-processing
assists employees with routine tasks such system? A transaction-processing
as maintaining an employee phone list in system (TPS) keeps track of everyday busi-
Excel, designing a sales presentation in ness activities. For example, at your college,
PowerPoint, and writing customer letters transactions that occur frequently include
using Word. registering students for classes, accepting
Modern OSSs include software tools with tuition payments, mailing advertisements,
which you are probably familiar, including and printing course catalogs. Your college
e-mail, word processing, spreadsheet, data- has TPSs in place to track these types of
base, and presentation programs. Office sup- activities.
port systems have their roots in manual, When computers were introduced to the
paper-based systems that were developed business world, they often were first put to
before computers. After all, maintaining a work hosting TPSs. Computers were much
company phone listing was necessary long faster at processing large chunks of data
Figure 11.34 than previous manual systems had been.
before computers were invented. A paper
TPSs help capture and Imagine having clerks type up tuition in-
track critical business
listing of employee phone extensions typed
by an administrative assistant is an example voices for each student at a 10,000–student
information needed for
successful completion of an early OSS. A modern OSS might pub- university. Obviously, a computer can print
of business transactions lish this directory on the company’s intranet invoices much quicker from a database.
such as selling (its internal network). How do transactions enter a TPS?
merchandise over the Transactions can be entered manually or
telephone. electronically. When you call a company and
order a sweater, for example, the call taker
enters your data into a TPS. When you pur-
chase gasoline at a pay-at-the-pump termi-
nal, the pump captures your credit card data
and transmits it to a TPS, which automati-
cally records a sale (gallons of gasoline and
dollar value). Transactions are processed
either in batches or in real time. Various
Step 2: Clerk
takes order.
departments in an organization then access
Step 1: Consumer places a
the TPSs to extract the information they
telephone order for clothing. need to process additional transactions, as
shown in Figure 11.34.
Details of Order:
Item # What is batch processing? Batch
Quantity processing means that transaction data is
Price accumulated until a certain point is reached,
Telephone Delivery Address
Order
and then several transactions are processed
Step 3: Order
Transaction details entered
all at once. Batch processing is appropriate
Processing into TPS. for activities that are not time sensitive, such
System
as developing a mailing list to mail out the
new course catalogs that students have re-
quested. The college could print a mailing
label each time someone requests a catalog,
but it is more efficient to batch the requests
and process them all at once when the
catalogs are ready to be addressed.
How does real-time processing
work? For most activities, processing and
recording transactions in a TPS occur in real
Step 4: Shipping time. Real-time processing means that the
department extracts database is queried and updated while the
information to transaction is taking place. For instance,
Step 5: Billing department process order.
extracts information to
when you register for classes, the registra-
process customer payment. tion clerk checks to make sure seats are still

544 Chapter 11 Behind the Scenes: Databases and Information Systems


a

Figure 11.35
available for the classes you want and who registered for classes each day. The three types of
immediately records your registration in the Figure 11.35a shows an example of a detail management information
class. This online transaction processing report on daily enrollment. system reports are
(a) detail report,
(OLTP) ensures that the data in the TPS is as Going beyond the detail reports provided
(b) summary report, and
current as possible. by TPSs, MISs provide summary reports (c) exception report.
and exception reports. A summary report
provides a consolidated picture of detailed
Management Information Systems data. These reports usually include some
calculation (totals) or visual displays of
What is a management information information (such as charts and graphs).
system? A management information Figure 11.35b shows an example of a
system (MIS) provides timely and accurate summary report displaying total daily
information that enables managers to make enrollment.
critical business decisions. MISs were a di- An exception report shows conditions
rect outgrowth of TPSs. Managers quickly that are unusual or that need attention by
realized that the data contained in TPSs users of the system. The registrar at your
could be an extremely powerful tool only if college may get an exception report when all
the information could be organized and out- sections of a course are full, indicating that it
put in a useful form. Today’s MISs are often may be time to schedule additional sections.
built in as a feature of TPSs. Figure 11.35c shows an example of such an
What does an MIS provide that a exception report.
TPS does not? The original TPSs were
usually designed to output detail reports. A
detail report provides a list of the transac-
tions that occurred during a certain time pe-
Decision Support Systems
riod. For example, during registration What is a decision support system?
periods at your school, the registrar might A decision support system (DSS) is
receive a detail report that lists the students designed to help managers develop

Managing Data: Information Systems 545


Internal & External Decision
Data Sources Support System

Internal
Models
Internal Data
Management
Current Model
Systems
Sales Management
(Databases, Data
Data System
Marts, Data
Warehouses) External
Models

Current
Customer
Demographics
Knowledge- User
Based Interface
Systems System
Purchased
Customer
List

Figure 11.36
Major components of a
solutions for specific problems. A DSS for
DSS. Through the user a marketing department might provide
interface, models are statistical information on customer attrib-
analyzed and manipulated utes (such as income levels, buying patterns,
to provide information on and so on) that would assist managers in
which management
decisions are based.
making decisions regarding advertising
data about customers, ordering patterns,
strategy. A DSS not only uses data from
inventory levels, and so on. An external
databases and data warehouses, but also en-
data source is any source not owned by the
ables users to add their own insights and
company that owns the DSS, such as cus-
experiences and apply them to the solution.
tomer demographic data purchased from
What does a decision support sys-
third parties, mailing lists, or statistics
tem look like? Database management
compiled by the federal government.
systems, while playing an integral part of a
Internal and external data sources provide a
DSS, are supplemented by additional soft-
stream of data that is integrated into the
ware systems in a DSS. In a DSS, the user
DSS for analysis.
interface provides the means of interaction
between the user and the system. An effec-
tive user interface must be easy to learn. The
other major components of a DSS are inter- Model Management Systems
nal and external data sources, model man- What function does a model manage-
agement systems, and knowledge-based ment system perform? A model
systems. As shown in Figure 11.36, all of management system is software that assists
these systems work together to provide the in building management models in DSSs. A
user of the DSS with a broad base of infor- management model is an analysis tool that,
mation on which to base decisions. through the use of internal and external
data, provides a view of a particular busi-
ness situation for the purposes of decision
Internal and External Data Sources making. Models can be built to describe any
What are internal and external data business situation, such as the classroom
sources for decision support sys- space requirements for next semester or a
tems? Data can be fed into the DSS from listing of alternative satellite campus
a variety of sources. Internal data sources locations.
are maintained by the same company that Internal models (such as a spreadsheet
operates the DSS. For example, internal that shows current classroom use on a
TPSs can provide a wealth of statistical college campus) are developed inside an

546 Chapter 11 Behind the Scenes: Databases and Information Systems


organization. External models (such as patterns of a human brain because scientists
statistics about populations of students at still do not fully understand how humans
two-year colleges in the United States) are store and integrate knowledge and experi-
purchased from third parties. Model man- ences to form human intelligence.
agement systems typically contain financial How does a knowledge-based sys-
and statistical analysis tools used to analyze tem help in the decision-making
the data provided by models or to create process? Databases and the models pro-
additional models. vided by model management systems tend
to be extremely analytical and mathematical
in nature. If we relied solely on databases
and models to make decisions, then the an-
Knowledge-Based Systems swers would be derived with a “yes or no”
What is a knowledge-based system, mentality, allowing no room for human
and how is it used in decision sup- thought. Fortunately, human users are in-
port systems? A knowledge-based volved in these types of systems, providing
system provides additional intelligence that an opportunity to inject human judgment
supplements the user’s own intellect and and experience into the decision-making
makes the DSS more effective. It can be an process.
expert system that tries to replicate the The knowledge-based system also pro-
decision-making processes of human vides an opportunity to introduce experi-
experts to solve specific ence into the mix.
problems. For example, an Knowledge-based systems
expert system might be
designed to take the place
of a physician in a remote
“ All knowledge-
based systems
fall under the
support the concept of
fuzzy logic. Normal logic is
highly rigid: If “x” hap-
location such as a scientific pens, then “y” will happen.
base in Antarctica. A physi- science of Fuzzy logic enables the
cian expert system would artificial interjection of experiential
ask the patient about symp- learning into the equation
intelligence.
toms just as a live physician
would, and the system
would make a diagnosis based on the
algorithms programmed into it.
” by considering probabili-
ties. Whereas an algorithm
in a database has to be specific, an algorithm
in a knowledge-based system could state
Another type of knowledge-based system that if “x” happens, 70 percent of the time
is a natural language processing (NLP) sys- “y” will happen.
tem. NLP systems enable users to communi- For instance, managers at Amazon.com
cate with computer systems using a natural would find it extremely helpful if their DSSs
spoken or written language instead of using informed them that 40 percent of customers
a computer programming language. Indi- who bought a certain book also bought the
viduals with disabilities who cannot use a sequel. This could suggest that designing a
keyboard benefit greatly from NLP systems discount program for sequels bought with
because they can just speak to the computer the original book might spur sales. Fuzzy
and have it understand what they are saying logic enables a system to be more flexible
without using specific computer commands. and to consider a wider range of possibili-
Using an NLP system can simplify the user ties than would conventional algorithmic
interface, making it much more efficient and thinking.
user friendly. The speech-recognition feature
of Microsoft Windows is a type of NLP
system. Enterprise Resource Planning
All knowledge-based systems fall under
the science of artificial intelligence.
Systems
Artificial intelligence (AI) is the branch of What is an enterprise? An enterprise
computer science that deals with the at- is any business entity, large or small. It could
tempt to create computers that think like hu- be the pizza shop on the corner or a Fortune
mans. To date, no computers have been 500 manufacturer of sports apparel. All
constructed that can replicate the thinking businesses have data and information to

Managing Data: Information Systems 547


ETHICS
IN IT Data, Data Everywhere—But Who Is Viewing It and Why?

As databases have become commonplace, an ever-increasing amount of data might be used. In October 2004, a firefighter was arrested after his
information about you and your habits has gone into various databases. supermarket purchase records revealed he had purchased the same type
Every time you purchase something with a credit card, there is a record of fire starters used in an arson case. After three months, the charges were
of that transaction, and both the merchant from whom you purchased dropped when another person pleaded guilty to committing the arson.
the item and the credit card company have information about your buy- Financial information isn’t the only sensitive information that is
ing habits (see Figure 11.37). tracked. The majority of physicians and hospitals in the United States
Have you used a toll service that allows you to pay your tolls electroni- track medical records in electronic databases. Your entire prescription
cally by just driving through a history (and hence hints about
lane without stopping? Toll your medical history) is in a
records are routinely subpoe- database at the local phar-
naed in court cases.Toll records macy. Have you applied for in-
were used in an Illinois court by surance lately? Your doctor
a husband in a divorce case to was probably able to provide
prove his wife was rarely home (with your permission, of
and therefore unfit for custody course) your entire medical
of their son. All banking trans- history to the insurance com-
actions are handled by comput- pany with a few clicks of a
ers (and hence databases) in mouse. All of the data that ex-
the United States, and there is a ists in the world around us
high probability that your em- should give us pause, and we
ployer is electronically transfer- need to stop and consider the
ring your pay to your bank by ethical implications of the elec-
direct deposit. If you engage in tronic society we live in.
online banking and bill paying,
yet another electronic trail of Data Convergence—The
your financial life is being gen- Figure 11.37 Perfect Storm of Privacy
erated in databases. Invasion?
Workmen disassembling a house reveal the contents hidden inside. This is
Do you think you can avoid a metaphor for the erosion of our privacy rights. If our personal information Discrete pieces of data, such as
scrutiny by paying cash? Not if is in multiple databases and viewable by many people, is the information that you filled your gas tank last
you are a member of a frequent still private? Thursday or bought a copy of
shopper “club” (a popular pro- War and Peace last month,
motion used by supermarkets and drug stores) and provide the checkout don’t mean much in and of themselves. However, with so much data in
clerk with your personal information in exchange for coupons or a few electronic form, it is getting much easier to combine data from various
dollars off your purchases. Remember, you never can be sure of how this data sources and build a powerful profile of an individual to which

manage, and large, complex organizations For instance, human resource functions
can benefit from managing that information (such as the management of hiring, firing,
with a central piece of software. promotions, and benefits) and accounting
What does an enterprise resource functions (such as payroll) are often the first
planning system do? An enterprise processes integrated into an ERP system.
resource planning (ERP) system is a Historically, human resource records and
broad-based software system that integrates accounting records were kept in separate
multiple data sources and ties together the databases, but having the information reside
various processes of an enterprise to enable in one database makes the management and
information to flow more smoothly. ERP paying of employees more streamlined. If
systems use a common database to store and manufacturing operations were then inte-
integrate information. This enables the infor- grated into the ERP system, the data that was
mation to be used across multiple areas of already in place regarding the employees and
an enterprise. payroll could be easily used for determining

548 Chapter 11 Behind the Scenes: Databases and Information Systems


data-mining techniques can be applied. For instance, suppose a marketing large-screen TV, you may need to give a clerk your address and
company purchased data about your buying habits from your credit card zip code. Similarly, disclosing medical information to key people
company and the supermarket, pharmacy, and bookstore where you shop. (such as your pharmacist) may be important to receiving good
In addition, the marketing company purchased information about you from care and therefore is extremely important to you. If you don’t see
the company where you bought your lawn mower (it got that from your the advantage, then ask more questions or don’t reveal the
information.
credit card information). What information did the lawn mower company
have about you? The personal information you gave when you filled out • How will the information gathered be protected once it has been
obtained? Ask about data protection policies before you give
your warranty card online (household income, age, whether you rent or own
information. Most Web sites provide access to their data protection
your home, and so on)! By combining all of this information into one data-
policies—readily available through clickable links or pop-up boxes—
base, the marketing company is able to build an extremely detailed picture when they ask for information. If an organization doesn’t have a data
of who you are. protection policy, then be wary of giving them sensitive information
For example, based on your purchases at the pharmacy, a marketing unless there is a compelling advantage to doing so (such as receiving
company might determine that there are both males (shaving gel) and fe- good medical care). Data protection doesn’t just refer to keeping data
males (cosmetics) living in your home. It also might notice that you have secure. It also means restricting access to the data to employees of
been buying pregnancy test kits once a month for 18 months and conclude the organization that need to use that data. A shipping clerk might
you are trying to have a baby (and not having much luck, by the way). By need to see your address, for example, but doesn’t need to see your
your address and the car you drive (you had charges on your credit card at credit card information.
a Lexus dealer), the company estimated that you have a household income • Will the information collected be used for purposes other than
of more than $100,000 per year, making you affluent. It also noticed you the purpose for which it was originally collected? This might be
shop at many stores that feature outdoor apparel and sports equipment covered in a data protection policy. If it isn’t, then ask about it. Will
your information be sold to other companies? Will it be used for mar-
and recently bought a mountain bike, so the company has concluded that
keting other products to you?
you have an active lifestyle. Based on this analysis, you start receiving mail
and phone solicitations for canoes, baby clothing, fertility treatments, and
• Could the information asked for be used for identity theft? Iden-
tity thieves usually need your Social Security number and your birth
plasma TVs. Just because this type of analysis can be done, should we be
date to open credit card accounts in your name. Be especially wary
doing it? Do you want people marketing to you based on sensitive personal when asked for this information, and make sure there is a legitimate
information? Where does marketing stop and invasion of privacy begin? need for this information. Most organizations and businesses are
shying away from using Social Security numbers to track customers
What Can You Do? because of the risk of identity theft.
Providing information and having it recorded in databases are part of our • Are organizations that already have your data safeguarding it?
way of life now. Because refusing to give information out at all is bound to Don’t just consider new requests for information. Think about organi-
be impractical, you should ask the following questions related to data you zations, such as banks, that already have your information and moni-
are providing: tor their performance. Have they been in the news lately because of
a major data breach (inadvertently exposing information to inappro-
• For what purpose is the data being gathered? When the clerk at priate or unauthorized individuals)? You might want to consider
the electronics superstore asks for your zip code, ask why she wants switching institutions if yours has a poor record of data security.
it. (It is probably for some marketing purpose).
• Are the reasons for gathering the data legitimate or important to Think carefully before providing information and be vigilant about mon-
you? When you purchase a DVD, is asking for your zip code really itoring your data when you can. It may make the difference between inva-
a legitimate request? However, to validate the warranty on a sion of privacy and peace of mind.

the cost of running an assembly line (because activities of a multinational corporation


the workers on the assembly line get paid) or without one.
for scheduling workers to run the assembly
line. The objective of ERP systems is to accu-
mulate all information relevant to running a
business in a central location and make it Data Mining
readily available to whoever needs that Just because you have captured data in an
information to make decisions. organized fashion and have stored it in a
Almost all Fortune 500 companies have format that seems to make sense doesn’t
implemented ERP systems, and many mean that an analysis of the data will
medium-sized companies are implementing automatically reveal everything you need
them also. Although the corner pizza shop to know. Trends can sometimes be hard to
probably does not need an ERP system, it spot if the data is not organized or analyzed
would be difficult to coordinate the in a particular way. To make data work

Data Mining 549


ACTIVE • Estimation: When managers classify
Data Warehouses,
HELP- data, the record either fits the classifica-
Data Marts, and tion criteria or it doesn’t. Estimation
DESK
Information Systems enables managers to assign a value to
In this Active Helpdesk call, you’ll play the role of a data based on some criterion. For exam-
helpdesk staffer, fielding calls about data ware- ple, assume a bank wants to send out
houses, data marts, and information systems. credit card offers to people who are
likely to be granted a credit card. The
bank may run the customers’ data
through a program that assigns them a
harder, companies employ data-mining score based on where they live, their
techniques. household income, and their average
Data mining is the process by which bank balance. This provides managers
great amounts of data are analyzed and with an estimate of the most likely
investigated. The objective is to spot signifi- credit card prospects so that they can
cant patterns or trends within the data that include them in the mailing.
would otherwise not be obvious. For in-
• Affinity grouping (or association
stance, through mining student enrollment
rules): When mining data, managers
data, a school may discover that 40 percent
also can determine which data goes
of new nursing degree students are Latino.
together. In other words, they can apply
Why do businesses mine their
affinity grouping or association rules to
data? The main reason businesses mine
the data. For example, suppose analysis
data is to understand their customers better.
of a sales database indicates that two
If a company can better understand the
items are bought together 70 percent of
types of customers who buy its products
the time. Based on this data, managers
and can learn what motivates their cus-
might decide that these items should be
tomers to do so, it can market effectively by
pictured on the same page in their next
concentrating its efforts on the populations
mail-order catalog.
that are most likely to buy.
How do businesses • Clustering: Clustering
mine their data? Data
mining enables managers to
sift through data in several
“ Often, the
purpose of data
mining is to
involves organizing data
into similar subgroups, or
clusters. It is different from
classification in that there
ways. Each method produces
different information that are no predefined classes.
describe data The data-mining software
managers can then base their
decisions on. Managers make so that makes the decision about
their data meaningful managers can what to group, and it is up
through the following to managers to determine
visualize it.
activities:

• Classification: To analyze data, man-


agers need to classify it. Therefore, be-
” whether the clusters are
meaningful. For example,
the data-mining software may identify
clusters of customers with similar buying
fore mining, managers define data patterns. Further analysis of the clusters
classes that they think will be helpful in may reveal that certain socioeconomic
spotting trends. They then apply these groups have similar buying patterns.
class definitions to all unclassified data • Description and visualization: Often,
to prepare it for analysis. For example, the purpose of data mining is merely to
“good credit risk” and “bad credit risk” describe data so that managers can
are two data classes that managers visualize it. Sometimes having a clear
could establish to determine whether to picture of what is going on with the data
grant mortgages to applicants. Man- helps people to interpret it in new and
agers would then identify factors (such different ways. For example, if large
as credit history and yearly income) that amounts of data revealed that left-
they could use to classify applicants as handed males who live in suburban
good or bad risks. environments never take automotive

550 Chapter 11 Behind the Scenes: Databases and Information Systems


technology courses, it would most purchase with other products. The store
likely spark a heated discussion about then places these products close to each
the reasons why. It would certainly other so that shoppers can find them easily.
provide plenty of opportunities for For instance, if analysis shows that people
additional study on the part of often buy coffee with breakfast cereal, it
psychologists, sociologists, and college makes sense to place these items in the same
administrators! aisle.
As the human race continues to accumu-
You may have noticed that products are late data, the development of faster and
frequently moved around in supermarkets. bigger databases will be a necessity. You can
This is usually the result of data mining. expect to interact with more and more
With electronic scanning of bar codes, each databases every year, even if you don’t
customer’s purchase is recorded in a data- realize you are doing so. While you may
base. By classifying the data and using clus- never have to create a database, understand-
ter analysis, supermarket managers can ing how databases work will enable you to
determine which products people usually interact with them more effectively.

Data Mining 551


eleven
eleven summary
chapter

1. What is a database, and why is it Object-oriented databases store data in


beneficial to use databases? objects, not in tables. The objects also
Databases are electronic collections of contain instructions about how the data is
to be manipulated or processed. Multidi-
summary

related data that can be organized so that it


is more easily accessed and manipulated. mensional databases represent data in three-
Properly designed databases cut down on dimensional cubes to enable faster retrieval
data redundancy and duplicate data by of information from the database.
ensuring relevant data is recorded in only
one place. This also helps eliminate data 4. What do database management
inconsistency, which comes from having
systems do?
different data about the same transaction
recorded in two different places. When Database management systems (DBMSs) are
databases are used, multiple users can share specially designed applications (such as
and access information at the same time. Oracle or Microsoft Access) that interact
Databases are used any time complex with the user, other applications, and the
information needs to be organized or more database itself to capture and analyze data.
than one person needs to access it. In these The main operations of a DBMS are creating
cases, lists (which are used to keep track of databases, entering data, viewing (or brows-
simple information) are no longer efficient. ing) data, sorting (or indexing) data, extract-
ing (or querying) data, and outputting data.
A query language is used to extract records
2. What components make up a from a database. Almost all relational data-
database? bases today use structured query language,
The three main components of a database or SQL. However, most DBMSs include
are fields, records, and tables. A category of wizards that enable you to query the
information in a database is stored in a field. database without learning a query language.
Each field is identified by a field name, The most common form of output for any
which is a way of describing the field. Fields database is a printed report.
are assigned a data type that indicates what
type of data can be stored in the field. 5. How do relational databases organize
Common data types include text, numeric,
and manipulate data?
computational, date, memo, object, and
hyperlink. A group of related fields is a Relational databases operate by organizing
record. A group of related records is a table data into various tables based on logical
or file. To keep records distinct, each record groupings. Because not all of the data in a
must have one field that has a value unique relational database is stored in the same
to that record. This unique field is a primary table, a methodology must be implemented
key (or a key field). to link data between tables. In relational
databases, the links between tables that
define how the data is related are referred to
3. What types of databases are there? as relationships. To establish a relationship
The three major types of databases currently between two tables, both tables must have a
in use are relational, object-oriented, and common field (or column). Once linked,
multidimensional. Relational databases are information can be drawn from multiple
characterized by two-dimensional tables of tables through the use of queries (for on-
data in which a common field is maintained screen viewing of data) or report generators
in each of two tables and the information (used to produce printed reports).
in the tables is linked by this field.

552 Chapter 11 Behind the Scenes: Databases and Information Systems


summary
eleven eleven

chapter
6. What are data warehouses and data in accomplishing their day-to-day tasks and
marts, and how are they used? improve communications. A transaction-
A data warehouse is a large-scale electronic processing system (TPS) is a system that is

summary
repository of data that contains and organ- used to keep track of everyday business
izes in one place all the relevant data related activities. A management information
to an organization. Data warehouses often system (MIS) provides timely and accurate
contain information from multiple data- information that enables managers to make
bases. Because it can be difficult to find critical business decisions. A decision sup-
information in a large data warehouse, small port system (DSS) is a system designed to
slices of the data warehouse called data marts help managers develop solutions for specific
are often created. The information in data problems. An enterprise resource planning
marts pertains to a single department within (ERP) system is a large software system that
the organization, for example. Data gathers information from all parts of a busi-
warehouses and data marts consolidate ness and integrates it to make it readily
information from a wide variety of sources available for decision making.
to provide comprehensive pictures of
operations or transactions within a business. 8. What is data mining, and how does it
work?
7. What is an information system, and Data mining is the process by which large
what types of information systems amounts of data are analyzed to spot other-
are used in business? wise hidden trends. Through processes such
Information systems are software-based as classification, estimation, affinity group-
solutions that are used to gather and analyze ing, clustering, and description (visualiza-
information. Information systems fall into tion), data is organized so that it provides
one of five categories. An office support sys- meaningful information that can be used by
tem (OSS) is designed to assist employees managers to identify business trends.

553
eleven
eleven key terms
chapter

alphabetic check .................................................. 529 input form............................................................. 528


artificial intelligence (AI) .................................. 547 join query ............................................................. 531
batch processing .................................................. 544 knowledge-based system .................................. 547
key terms

binary large object (BLOB)................................ 525 management information system (MIS)......... 545
browsing ............................................................... 532 many-to-many relationship............................... 534
clickstream data................................................... 541 memo field ........................................................... 523
completeness check ............................................ 529 metadata................................................................ 527
computational field (computed field)............. 523 model management system............................... 546
consistency check ................................................ 529 multidimensional database............................... 525
data centralization............................................... 521 natural language processing
data dictionary (database schema)................... 526 (NLP) system .................................................... 547
data inconsistency............................................... 519 normalization....................................................... 535
data integrity ........................................................ 521 numeric check ...................................................... 529
data field ............................................................... 523 numeric field........................................................ 523
data mart ............................................................... 542 object field............................................................ 523
data mining .......................................................... 550 object-oriented database.................................... 525
data redundancy .................................................. 519 object query language (OQL) ........................... 525
data staging .......................................................... 542 office support system (OSS) ............................. 543
data type (field type) .......................................... 522 one-to-many relationship .................................. 534
data warehouse .................................................... 539 one-to-one relationship...................................... 534
database ................................................................ 518 online transaction processing (OLTP)............. 545
database administrator primary key (key field) ...................................... 523
(database designer) ......................................... 521 query...................................................................... 532
database management system query language .................................................... 533
(DBMS).............................................................. 526 range check........................................................... 528
database query..................................................... 532 real-time processing............................................ 544
date field ............................................................... 523 record ..................................................................... 523
decision support system (DSS) ........................ 545 referential integrity............................................. 538
default value ........................................................ 527 relation .................................................................. 524
detail report .......................................................... 545 relational algebra ................................................ 530
enterprise resource planning relational database .............................................. 524
(ERP) system..................................................... 548 relationship .......................................................... 534
exception report................................................... 545 select query........................................................... 530
expert system ....................................................... 547 sort.......................................................................... 532
export ..................................................................... 534 structured (analytical) data................................ 525
external data source ............................................ 546 structured query language (SQL)..................... 530
field........................................................................ 522 summary report ................................................... 545
field constraint..................................................... 528 table (file) ............................................................. 523
field name............................................................. 522 text field ................................................................ 523
field size................................................................ 523 time-variant data ................................................. 541
foreign key ........................................................... 538 transaction-processing system (TPS)............... 544
fuzzy logic ............................................................ 547 unstructured data ................................................ 525
hyperlink field..................................................... 523 validation.............................................................. 528
information system............................................. 543 validation rule ..................................................... 528

554 Chapter 11 Behind the Scenes: Databases and Information Systems


buzzwords
eleven eleven

chapter
Word Bank
• data dictionary • memo field • structured query language
• data inconsistency • metadata (SQL)

buzzwords
• data mining • numeric field • table
• data warehouse • object field • text field
• decision support system • primary key • transaction-processing
system (TPS)
• field • relational algebra
• join query • select query

Instructions: Fill in the blanks using the words from the Word Bank above.

When constructing a database (1) __________, it is important to ensure each record is identi-
fied uniquely. A(n) (2) __________ should be established as a unique field that will be in-
cluded with each record. In a database, numbers such as 1234 are normally stored in a(n)
(3) __________, but they also could be stored in a(n) (4) __________ if calculations do not
need to be performed on the number. Extremely lengthy textual data is stored in a(n)
(5) __________, whereas video files are appropriately stored in a(n) (6) __________. The
(7) __________ fully describes each field in the database and its attributes. Data used to
describe other data in this manner is referred to as (8) __________.

Queries are used to prepare data for viewing or printing. A(n) (9) __________ usually
displays requested information from only one table. For displaying related information
that is stored in multiple tables, a(n) (10) __________ must be used. The most popular query
language in use today is (11) __________. Queries generated by this language make use of
English-language statements driven by the mathematical principles of (12) __________.

When individual databases are not sufficient to maintain all the data that needs to be
tracked, a(n) (13) __________ should be created. Databases are often key components of
(14) __________, which record routine business activities. A(n) (15) __________ utilizes
databases and other related systems to assist management with building business models
and making critical decisions.

computer
becoming
computer literate
literate
Everyone loves the handbags that your best friend, Linh, makes, and she has decided to
start selling them to the general public. Linh has a few existing customers already (mostly
becoming
family and friends), but she plans to put her work in a few art shows, make some deals
with area stores to feature it, and sell it online at Etsy.com. Keeping track of all this
information is going to be important, but she is not computer literate.

Linh has approached you to be her database consultant and to design a database for her
new business. Write a proposal that outlines what you intend to do for your friend. What
kind of database will you create? What kind of information will your friend need in the
database to run her business? How should that information be organized? Can the
database be created and stored online so that Linh can access it from her phone? As her
business grows, how do you imagine the database will grow with the business?

555
eleven
eleven self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Having the different birthdates for 6. A(n) __________ database organizes


the same person on two different lists data in a cube format.
is an example of a. relational
a. data redundancy. b. object-oriented
b. data inconsistency. c. rectangular
c. data disparity. d. multidimensional
d. data duplication errors. 7. Which is NOT one of the four main
2. Which of the following is NOT one of operations of a DBMS?
the three main advantages of using a. Consolidating data
databases? b. Entering data
a. Promotion of data integrity. c. Sorting data
b. Data can be easily shared. d. Querying data
c. Elimination of data recording 8. Comparing data values to ensure rea-
errors. sonableness is an example of a(n)
d. Flexible use of data. a. alphabetic check.
3. A group of related fields in a b. completeness check.
relational database is called a c. range check.
a. primary key. c. record. d. consistency check.
b. field string. d. table.
9. A data system that is a subset of a
4. An example of a good primary key larger system is known as (a)n
is a(n) a. data mart.
a. order number. b. office support system.
b. person’s first name combined c. data warehouse.
with their last name. d. transaction-processing system.
c. name of a pet.
10. An electronic system used to keep
d. street address.
track of everyday business activities
5. A primary key is an example of a(n)
a. should always contain only a. transaction-processing system.
numbers. b. decision support system.
b. is always unique for each record c. expert system.
in a database. d. knowledge-based system.
c. does not have to be unique for
every record in a database.
d. is only used in object-oriented
databases.

True–False
_____ 1. A query is used to transfer information into a database.
_____ 2. Completeness checks ensure that only reasonable data values are entered into a
database.
_____ 3. Reducing incorrect or incomplete data by recording data in only one place is called
data optimization.
_____ 4. An expert system attempts to replicate the decisions made by a live person.
_____ 5. Data mining cannot be used to spot customer trends.

556 Chapter 11 Behind the Scenes: Databases and Information Systems


making the
eleven eleven

chapter
transition to...
next semester
1. Understanding Database Design

transition to...
Go out to ebay.com and look at some items that are for sale. eBay uses a very sophisti-
cated database to process transactions. But every good database starts with good
design by creating a field for each unique piece of data. List as many fields as you can

next semester
making the
identify used to record information for an item for sale on eBay. Assign each field you
identify a data type and suggest a reasonable field length.
2. Privacy Settings on Facebook
Facebook is a large database. It is important to protect personal information that is
contained in a database, and with Facebook you are responsible for making decisions
about sharing your information. The owners of Facebook are constantly tweaking the
privacy settings on the site. If you have not checked your privacy settings lately, you
may not be aware of the personal information that you are sharing with anyone who
can access Facebook.
a. Log in to your Facebook account and access your privacy settings. Which informa-
tion about you is accessible to everyone? Is any of your information only visible to
your friends? What types of information is viewable by friends of your friends?
b. Did any of the privacy settings surprise you? Which privacy settings do you think
you need to change? Why? If you don’t think any changes to your setting are
necessary, explain why you feel secure with your current privacy settings.

3. Designing Your Own Database


Suppose you wish to create a database to facilitate the buying and selling of used
textbooks for students at your campus. Determine the following:
a. What fields do you need in your database for identifying and categorizing the
books? What would be a good primary key to use for the “book inventory” table?
Why would it be a good primary key?
b. What fields do you need to capture information about the customers (students) who
are buying the books? What would be the primary key of the “customer” table?
Why would it be a good primary key?
c. Design a table that tracks the selling transactions. What fields from the other two
tables would need to be included in the “sales transaction” table? Justify your
answer.

4. Comparing Databases
Amazon.com and eCampus.com are two sites students frequently use to buy
textbooks. On both sites you interact with a database to search for and purchase your
textbooks. Visit both sites and search for several textbooks such as the ones you are
using this semester. Compare your experiences on both sites. Consider the following
(and make sure you fully explain each answer):
a. Which site is easier to use?
b. Which site offers better options for refining the results of your search (query) for a
textbook?
c. What fields did you search on to find your textbooks? Would searching on another
field have produced more accurate results?
d. What enhancements would you suggest the owners of both sites to improve your
shopping experience?

557
eleven
eleven making the
chapter

transition to...
the workplace the workplace
1. Data Marts
You are a summer intern in the information technology group of a regional chain of
making the

sandwich shops. The company has been in business for fifteen years and operates 200
locations in eight states. The 200 locations are organized into five regions (A, B, C, D,
transition to...

and E) of 40 stores each. Regional managers are responsible for inventory management,
procurement of inventory, sales, and marketing for their particular region. The com-
pany has been processing all transactions electronically (with customers and suppliers),
and it has captured all the data in a large data warehouse. Unfortunately, the regional
managers are complaining that there is now so much information in the data ware-
house that it has become somewhat difficult to sort through it and extract meaningful
data. You have just been placed on the team that will be designing a new data strategy
for the company.
a. Setting up data marts would probably help with the accessibility of information.
What type of data marts would you suggest setting up for this company? Make sure
you explain who will benefit from the data marts you suggest.
b. For the data marts you identified in the previous question, list the data that should
be stored in each data mart and explain how the regional managers could make use
of that information to manage their group of stores.

2. Creating a Data Access Policy


You have an internship in the information technology department at the regional office
of Mammoth Insurance Company, which sells automobile, life, and medical insurance.
Colossal Insurance Company, one of your firm’s competitors, was recently raked over
the coals in the news media because a few employees were looking up medical records
of insurance customers for the purpose of developing a mailing list for people with cer-
tain illnesses. The employees were then using the list to market a new mail-order pre-
scription drug Web site (owned by the employees, not Colossal) directly to Colossal’s
customers. Many customers were upset by the solicitations, which they viewed as an
invasion of their privacy. The Colossal employees contended that no one ever told them
they couldn’t use the company records for this purpose.
The CIO of Mammoth wants to ensure that such a controversy doesn’t happen to
her company. She has asked your supervisor (who in turn drafted you to help) to
prepare a data access policy for Mammoth. Prepare a draft of the policy and consider
the following:
a. Who should have access to the medical information of insurance company
customers? The insurance underwriters (the people who approve or disapprove
policies) need the information. Does anyone else?
b. Should marketing personnel be granted access to medical and driving records for
the purposes of marketing Mammoth’s products? If so, who should approve the
access? Should customers be informed before conducting marketing campaigns
using their “sensitive” information? Who should be responsible for notifying
customers?
c. Describe the types of uses of customer information that would be deemed inappro-
priate by the company. What should the penalties be for violating the policy?

558 Chapter 11 Behind the Scenes: Databases and Information Systems


critical thinking
eleven eleven

chapter
questions

Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Database Privacy Policies


Most likely you have provided quite a bit of personal information to various
companies when you became their customer. Companies have an ethical responsibility
to protect sensitive data obtained from customers. Consider the following:
a. Think about a retailer (such as Walmart) that you have done business with recently.
What personal information did you provide to that retailer? What personal informa-
tion should a company be precluded from disclosing to others? What information does
the company have of yours that you don’t care if they share with (or sell to) other
companies?
b. Most retailers have privacy policies that describe how your information will be used
and safeguarded. Have you ever read a privacy policy from a retailer that you have
done business with? If so, summarize the provisions of the policy. If not, review a
privacy policy from a major online retailer and summarize its provisions. In your
opinion, is the privacy policy you reviewed sufficient to protect your sensitive data?

2. Social Security Database


The U.S. Social Security Administration (SSA) maintains a large database containing a
great deal of information on the personal income of individuals. The information in this
database could be easily sorted and categorized by attributes such as geographic loca-
tion and age. This information would be of great value to marketing professionals for
targeting marketing programs to consumers. Currently, the SSA is prohibited from sell-
ing this information to third parties. However, the SSA and other government agencies
face increasing pressure to find ways to generate revenue or decrease expenses.
a. Do you favor a change in the laws that would permit the SSA to sell names and
addresses with household income information to third parties? Why or why not?
b. Would it be acceptable for the SSA to sell income information to marketing firms if it
did not include personal information, but only included income statistics for certain
geographic areas? How is this better (or worse) than selling personal information?
c. How would you feel about the SSA marketing financial products (such as invest-
ment opportunities and retirement plans) directly to consumers? Would this be a
conflict of interest with the SSA’s main mission, which is the collection of retirement
taxes and the provision of old-age pensions?

3. Information About You


There are many databases such as 411.com and spokeo.com on the Web, and some of
them probably contain your personal information. Using Google (or other search
engines), perform a Web search on your name. Because many people have the same
name, you may need to use some other identifying attributes (such as your address,
employer, high school attended, and so on) to ensure that the search returns results
about you. Consider the following:
a. What information did you find about yourself? What was the most surprising piece
of information you located?
b. Did you find enough information about yourself to enable a criminal to steal your
identity?
c. Repeat this same exercise but instead use the name of one of your friends. What
obligation do you have to your friend to inform him or her of any potentially
sensitive information you located?

559
eleven
eleven team time
chapter

Redesigning Facebook

Problem
team time

Facebook is the most popular social media site. But as with any product, there is always
room for improvement. Facebook management has made decisions about what data they
require from users who create Facebook accounts. They also have set up specific areas to
display what management considers to be pertinent information on a user’s main Facebook
page. But perhaps you as a user would have designed Facebook differently.

Task
Your class has volunteered to work as a focus group for Facebook as part of a nationwide
project to assess the usefulness of the information gathered by Facebook. Users often
provide unique perspectives, and they should be consulted whenever possible during
the design, implementation, and updates of Web sites. As heavy users of Facebook,
management feels that student input is invaluable to ensuring currency and usability of
its features.

Process
Divide the class into small groups.
1. Your group members should examine their individual Facebook accounts. If anyone in
your group does not have a Facebook account, they should set one up. If you all have
Facebook accounts, you might want to consider going through the process of setting up
an account to reacquaint yourselves with the information that is required (or can be
entered) when a Facebook account is first set up. Pay particular attention to the profile
area of your account. What fields in the profile do you consider to be most useful?
Which fields do you think are totally unnecessary and could be eliminated? What fields
are missing from the profile that you think would be useful to you and your friends?
2. Investigate your account settings and application settings paying particular attention to
items that are displayed on the main page of your account. What changes would you
make to these settings? Are options missing that you would find helpful to configuring
your Facebook page?
3. Present your group’s findings to the class. Compare your suggestions to those of other
groups. Be sure to think about the needs of other groups of users (such as your parents
or your grandparents) because they probably use Facebook in ways that you might not.
4. Prepare a list of recommendations for improvements to the current Facebook home
page and settings pages. Clearly indicate how the proposed changes will benefit both
users and the management of Facebook (retaining users, being able to better target
advertising to users, and so on).

Conclusion
Facebook will most likely experience competition in the future from other social network-
ing sites that will want to poach its huge base of users. To remain competitive, Facebook
needs to consider the input of users like you to ensure that it delivers a cutting-edge
product that delivers the features its customers want and need. Facebook’s best chance
of remaining on top of the social media heap is to be sensitive to the needs of its current
users.

560 Chapter 11 Behind the Scenes: Databases and Information Systems


ethics
eleven eleven

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator will
watch and comment on both sides of the arguments, and together the team will agree on an
ethical solution.

Topic: Private Information on Public Databases


As more tasks in our lives are conducted online, there is a tremendous amount of data that
is accumulated about us in online databases. Unfortunately, much of this material is
accessible in databases that are searchable by anyone with Internet access or to anyone
willing to pay a small fee. Web sites such as Spokeo.com and 411.com comb through
publicly accessible databases such as social networking sites (Facebook or MySpace), online
phone books, business sites where you have accounts (Yahoo! or MSN), and government
(federal, state, and local) Web sites to compile information on individuals. There is
probably a lot of information available about you available on sites such as these that could
expose you to risks such as identify theft.

Research Areas to Consider


• Electronic information privacy
• Electronic privacy information center (epic.org)
• Protecting your online privacy
• Protecting yourself on Facebook

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which someone has complained
about a Web site (such as spokeo.com) providing information that lead to their identity
being stolen.
2. Team members should write a summary that provides background information for
their character—for example: victim of identity theft, Web site owner, or arbitrator—
and details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

561
chapter
twelve twelve
behind the scenes:
networking and security
in the business world

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. What are the advantages of a business network? (p. 564)
2. How does a client/server network differ from a peer-to-peer network? (pp. 565–566)
3. What are the different classifications of client/server networks? (pp. 566–569)
4. What components are needed to construct a client/server network? (pp. 569–570)
5. What do the various types of servers do? (pp. 570–572)
6. What are the various network topologies (layouts), and why is network topology
important in planning a network? (pp. 572–578)
7. What types of transmission media are used in client/server networks? (pp. 578–583)
8. What software needs to run on computers attached to a client/server network, and
how does this software control network communications? (pp. 583–584)
9. How do network adapters enable computers to participate in a client/server
network? (pp. 584–586)
10. What devices assist in moving data around a client/server network? (pp. 586–588)
11. What measures are employed to keep large networks secure? (pp. 588–595)

multimedia resources
multimedia
resources

Active Helpdesk
• Using Servers (p. 572)
• Selecting a Network Topology and Cable (p. 577)
• Selecting Network Navigation Devices (p. 589)
Sound Bytes
• Network Topology and Navigation Devices (p. 574)
• What’s My IP Address? (And Other Interesting Facts about Networks) (p. 586)
• A Day in the Life of a Network Technician (p. 589)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Planning a meeting
with classmates to work on a group project can be difficult. E-mail is
not an efficient planning tool because it is difficult to coordinate numerous messages.
Even using threaded message postings on Facebook can be cumbersome. A simple
free tool that solves this problem is Doodle (doodle.com).
With Doodle, you can quickly set up a grid with possible meeting dates and
times. You then provide the URL of the meeting poll to the other members of the
group. As members come to the meeting site, they enter their names and indicate their
availability for various meeting times (yes, no, or maybe) as indicated by
the colors green, red, and yellow. Doodle then provides a visual summary
of all input from the group so you can easily select a meeting time
that works for the majority of the participants.
So stop tearing your hair out about get-
ting your group together and use Doodle to simplify your
planning!

563
Networking You probably have a printer hooked up
to your home computer. Think about
Advantages how often it sits idle. Compound that
You learned about peer-to-peer networks in by having 20 students in a lab, all with
Chapter 7, and we’ll expand your knowl- their own printers. Having 20 printers
edge of networks in this chapter. Recall that sitting idle 95 percent of the time is a
a network is a group of two or more com- tremendous waste of money. Installing
puters (or nodes) that are configured to a network that enables one printer
share information and resources such as (working most of the time) to serve
printers, files, and databases. Essentially, all 20 students saves money.
a network enables computers and other • Networks facilitate knowledge
devices to communicate with each other. sharing. The databases you learned
But why do we network computers? Home about in Chapter 11 become especially
networks enable users to share an Internet powerful when deployed on a network.
connection, share peripherals, and share Networked databases can serve the
media. Businesses, such as your college or needs of many people at one time and
an insurance company, also gain advantages increase the availability of data. Your
from deploying networks. college’s databases are much more use-
What advantages do businesses ful when all college employees can look
gain from networks? Large business up student records at the same time.
networks provide advantages similar to • Networks enable software sharing.
those of home networks, and therefore have Installing a new version of software on
advantages over individual stand-alone everyone’s desktop in a college with
computers: 500 employees can be time consuming.
• Networks increase productivity. However, if the computers are net-
Computers are powerful stand-alone worked, all employees can access the
resources. However, to increase produc- same copy of a program from the server.
tivity, people need to be able to share Although the college must still purchase
data and peripherals with co-workers a software license for each employee,
and communicate with them efficiently. with a network it can avoid having to
Without a network, only one person at a install the program on every computer.
time can access information because it This also saves space on individual
resides on a single computer. Informa- computers, because the software doesn’t
tion sharing is therefore the largest reside on every computer.
benefit gained by installing a network. • Networks facilitate Internet connectiv-
ity. Most college students need to con-
• Networks enable expensive resources
nect to the Internet to complete class
to be shared. Networks enable people to
work. Providing each computer on a
share peripherals such as printers, elimi-
network with its own dedicated connec-
nating the need for duplicate devices.
tion to the Internet is costly. Through a
network, large groups of computers can
BITS share one Internet connection, reducing
AND Print Documents Anywhere . . . Internet connectivity expenses.
BYTES From Your Phone! • Networks enable enhanced communi-
cation. Social networking tools, e-mail,
You have plenty of information on your smartphone, but what do you do when you and instant messaging are extremely
need print something and you’re nowhere near your printer? Using a free software powerful applications when deployed
program called PrinterShare (printeranywhere.com), you can print a document from on a network (especially one that is con-
your smartphone to any local WiFi connected printer. nected to the Internet). College students
The PrinterShare software helps your smartphone detect nearby printers con- can easily exchange information with
nected via a WiFi connection (such as a printer in the business center at your hotel) each other and their professors, and can
and print documents (such as your boarding pass for an airline fight) from your phone share valuable data by transferring files
to that printer. PrinterShare also works on smartphones such as the iPhone or phones to other users.
using the Android operating system. Check it out for yourself—it could save you some
Are there disadvantages to using
aggravation in the future.
networks? Because business (or college)
networks are often complex, additional

564 Chapter 12 Behind the Scenes: Networking and Security in the Business World
personnel are usually required to maintain this hardly would be efficient. You would be
them. These people, called network admin- floundering around in the kitchen with
istrators, have training in computer and other customers as they try to cook their
peripheral maintenance and repair, net- own meals. If the manager assigns
working design, and the installation of specialized tasks to a fast-food cook (the
networking software. server), many customers (clients) can be
Another disadvantage is that operating served efficiently at the same time. This is
a network requires special equipment and how servers work: One server can provide
software. However, most companies feel services efficiently to a large number of
that the cost savings of peripheral sharing clients at one time.
and the ability to give employees simultane- Does my home network have a
ous access to information outweigh the costs server? Your home P2P network does not
associated with network administrators and need a server. Peer-to-peer networks, which
equipment. are typically set up in homes or very small
Aside from the smallest networks, such as businesses, do not require servers (although
peer-to-peer networks, which are typically some home networks now have specialized
used in homes and small businesses, the media servers for sharing media) to function
majority of computer networks are based on efficiently. In these networks, computers
the client/server model of computing. act as both clients and servers when
appropriate.
When shouldn’t a peer-to-peer
Client/Server network be used? P2P networks
become difficult to administer when they
Networks are expanded beyond 10 users. Each indi-
As you’ve learned, a server is a computer vidual computer may require updating if
that both stores and shares resources on a there are changes to the network, which
network, whereas a client is a computer that is not efficient with large numbers of
requests those resources. A client/server net- computers. In addition, security can’t be
work (also called a server-based network) implemented centrally on a P2P network but
contains servers as well as client computers. instead must be handled by each individual
The inclusion of servers is what differenti- user. Client/server networks contain at least Figure 12.1
ates a client/server network from a typical Basic client/server
peer-to-peer (P2P) network. Each node interaction.
connected to a P2P network can communi-
cate directly with every other node on the Step 1: Client computer
network instead of having a separate requests service from
device exercise control over the network. server computer.
Figure 12.1 illustrates the client/server
relationship.
The main advantage of a client/ What are the names of
server relationship is that it makes data the customers who bought
flow more efficiently than in peer-to- more than 500 television
sets this month?
peer networks. Servers can respond to
requests from a large number of clients
Query submitted
at the same time. In addition, from client
servers can be configured to
perform specific tasks (such Answer provided
by server
as handling e-mail or data-
base requests) efficiently.
Say you are hungry and go Mega-Discount Appliances
Wall-To-Wall Televisions, Inc.
to a fast-food restaurant. In Computer A
Televisions-R-Us
(client) Computer B
your role as the customer or-
(server)
dering food, you are the client
making a request. The cook, in the role of
the server, responds to the request and pre- Step 2: Server computer
provides requested
pares the meal. Certainly, you could go to service to client computer.
the restaurant and cook your own meal, but

Client/Server Networks 565


Cable
Wireless
connection

High-speed
communications line

Client Computer #1 Server

Switch

Laser printer

increased workload. Installing addi-


tional servers on a network is rela-
Client Computer #3
tively simple and can usually be done
Client Computer #2 without disrupting services for exist-
ing users.
Figure 12.2 one server that provides shared resources In addition, peer-to-peer networks are
This small client/server and services (including security) to the client decentralized. This means that users are re-
network enables users to computers that request them. sponsible for creating their own data back-
share a printer and an
Internet connection. In addition, client/server networks move ups and for providing security for their
data more efficiently than P2P networks, computers. In client/server networks, all
making them appropriate for large numbers clients connect to a server that performs tasks
of users. For example, Figure 12.2 shows a for them. Therefore, client/server networks
small client/server arrangement. The server are said to be centralized. Many tasks that
in this figure provides printing and Internet individual users must handle on a P2P net-
connection services for all the client comput- work can be handled centrally at the server.
ers connected to the network. The server For instance, data files are normally
is performing tasks that would need to be stored on the server. Therefore, backups for
done by the client computers in a P2P net- all users on a college’s network can be per-
work. This frees resources on the client formed by merely backing up all the files on
computers for more efficiently performing the server. Security, too, can be exercised
processor-intensive tasks such as viewing a over the server instead of on each user’s
movie or playing video games. computer; this way, the server, not the indi-
Besides having a centralized vidual user, coordinates data security.
server, what makes a client/server
network different from a peer-to-
peer network? The main difference is
that client/server networks have increased Classifications
scalability. Scalability means that more of Client/Server
users can be added easily without affecting Networks: LANs,
the performance of the other network nodes
(computers or peripherals). Because servers WANs, and MANs
handle the bulk of tasks performed on the Networks are generally classified according
network (printing, Internet access, and so to their size and the distance between the
on), it is easy to accommodate more users by physical parts of the network. Four popular
installing additional servers to help with the classifications are local area networks, wide

566 Chapter 12 Behind the Scenes: Networking and Security in the Business World
area networks, metropolitan area networks, Figure 12.3 shows an example of what part
and personal area networks. of the ABC Shoe Company WAN might
A local area network (LAN) is a (gener- look like.
ally small) group of computers and periph- Sometimes government organizations or
erals linked together over a relatively small civic groups establish WANs to link users in
geographic area. The computer lab at your a specific geographic area (such as within a
school or the network serving the floor of city or county). This special type of WAN
the office building where you work is pro- is known as a metropolitan area network
bably a LAN. (MAN). San Diego’s Traffic Management
Wide area networks (WANs) comprise Center (TMC) uses a MAN to analyze traffic
large numbers of users over a wider physi- patterns. You can check out the traffic maps
cal area or separate LANs that are miles they generate at dot.ca.gov/sdtraffic.
apart. For example, a large college campus What sort of network connects
might have a WAN that spans all of its lec- devices such as smartphones and
ture halls, residence halls, and administra- Bluetooth headsets? A personal area Figure 12.3
tive offices. network (PAN) is a network used to connect A WAN comprises
Corporations often use WANs to connect wireless devices (such as Bluetooth-enabled several LANs in different
two or more geographically distant devices) that are in close proximity to each geographic locations
branches. For example, ABC Shoe Company other. (Bluetooth technology uses radio connected by telecommu-
nications media. Satellite
has manufacturing plants and administra- waves to transmit data over short distances.) communication is often
tive offices all over the globe. The LAN at PANs are wireless and work within the used to transmit data over
each ABC Shoe Company of- long distances.
fice is connected to other
ABC Shoe Company Microwaves Microwaves
LANs, forming a
global ABC Shoe
Company WAN.

High-speed High-speed
Communications Communications
Line Satellite Line

Microwave Tower Microwave Tower

Modem Modem

Wireless
Client Computer
connection
Client Computer

Server Server

Client Computer Client Computer


Printer Printer
LAN at LAN at
ABC Shoe Company ABC Shoe Company
Beaverton, Oregon Hilversum, Netherlands

Classifications of Client/Server Networks: LANs, WANs, and MANs 567


BITS Internet. An intranet is not accessible by
AND
PAN Clothing—Organization and unauthorized individuals; a firewall protects
BYTES Power for Portable Gear it from unauthorized access through the
Internet.
Now that people carry so many portable computing devices, clothing designers are One of the first main uses of intranets
starting to offer clothing that facilitates the storage, transportation, charging, and net- was to run groupware (software that enables
working of their digital gadgets. The Scottevest (see Figure 12.4a) is one of a line of users to share and collaborate on docu-
vests and jackets designed to hold iPods, smartphones, and even iPads. It also features ments). One example, Lotus Notes, facili-
a built-in PAN to help maintain connectivity of your devices. And because all the tates information sharing and solving
devices in your PAN need power, accessories such as the Voltaic Backpack (see problems through brainstorming. Most
Figure 12.4b) help recharge your digital devices using renewable energy sources. So groupware programs also support messag-
don’t forget to consider the perfect fashion accessory for your latest digital acquisition! ing and group calendaring. Now, many
organizations supplant groupware
applications by deploying Web 2.0 tools
a b
such as blogs, wikis, and social networks
on an intranet.
An area of an intranet that only certain
corporations or individuals can access is
called an extranet. The owner of an extranet
decides who will be permitted to access it.
For example, a company’s customers and
suppliers may be permitted to access infor-
mation on the company’s extranet. Extranets
are useful for enabling electronic data inter-
change (EDI). EDI allows the exchange of
large amounts of business data (such as or-
ders for merchandise) in a standardized
electronic format. Other uses of extranets in-
clude providing access to catalogs and in-
Figure 12.4 ventory databases and sharing information
among partners or industry trade groups.
(a) Shown here with an X-ray, the Scottevest has a convenient
spot for all of your gadgets. (b) The Voltaic Backpack recharges What security tools do intranets
your mobile devices using solar cells. and extranets use? Because of security
concerns, intranets and extranets often use
virtual private networks to keep information
secure. A virtual private network (VPN)
personal operating space of an individual, uses the public Internet communications in-
which is generally defined to be within frastructure to build a secure, private net-
30 feet (or 10 meters) of one’s body. Today, work among various locations. Although
PANs free you from having wires running to WANs can be set up using private leased
and from the devices you’re using. One day, communications lines, these lines are expen-
though, PANs may use your body to trans- sive and tend to increase in price as the dis-
mit and receive signals. tance between points increases. VPNs use
What other sort of networks do special security technologies and protocols
businesses use? An intranet is a pri- that enhance security, enabling data to tra-
vate network set up by an entity (such as a verse the Internet as securely as if it were on
business, charity, or government organiza- a private leased line. Installing and configur-
tion) that is used exclusively by a select ing a VPN requires special hardware such
group of individuals (employees, customers, as VPN-optimized routers and firewalls. In
suppliers, volunteers, supporters, etc.). It addition, VPN software must be installed
can facilitate information sharing, database on users’ PCs.
access, group scheduling, videoconferenc- The main technology for achieving a VPN
ing, and other employee collaborations. is, in fact, called tunneling. In tunneling, data
Intranets are usually deployed using Trans- packets are placed inside other data packets.
mission Control Protocol/Internet Protocol The format of these external data packets is
(TCP/IP), which is discussed in Chapter 13, encrypted and is understood only by the
networks and generally include links to the sending and receiving hardware, which is

568 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Denver, CO
branch office
LAN VPN secure
Data tunnel through
VPN enabled flow the Internet
router
Phoenix, AZ
VPN enabled branch office
router LAN
Wireless Data
connection flow
Switch

Switch

Computer #1
Computer #3 Computer #4
Computer #2

known as a tunnel interface. The hard-


ware is optimized to seek efficient routes of
transmission through the Internet. This pro- Computer #6
vides a high level of security and makes in- Computer #5
formation much more difficult to intercept
and decrypt. • Transmission media: Data needs a way Figure 12.5
Imagine you have to deliver a message to to flow between clients and servers on Local area networks
a branch office. You could have one of your networks. Therefore, an appropriate (LANs) in different cities
employees drive to the other office and type of transmission media (cable or can communicate se-
deliver the message. But suppose he has to curely over the Internet
wireless communications technology)
using VPN technology.
go through a bad neighborhood or has never based on the network topology is
been to the office before? The messenger needed. Client/server networks use
could be waylaid by a carjacker or become a wider variety of cable types than
hopelessly lost. Using a VPN (as shown in do simpler P2P networks. Although
Figure 12.5) is the equivalent of hiring a business networks also feature wireless
limousine and an armed guard to drive your connectivity, they tend to use a lot more
employee through a private tunnel directly to cabling than home networks. Cabling
the destination. Of course, a VPN avoids the is used to achieve higher throughput
enormous cost associated with this method! because many network nodes tend to
stay in fixed locations (such as an
employee’s cubicle).
Constructing Client/ • Network operating system (NOS)
Server Networks software: All client/server networks
Client/server networks have many of the require network operating system
same components that P2P networks do, as (NOS) software, which is specialized
well as some components specific to client/ software that is installed on servers
server networks: and client computers and enables the
network to function. Most modern
• Server: Unlike peer-to-peer networks, operating systems (such as Windows 7
client/server networks contain at least and Mac OS X) include the software
one computer that functions solely as a computers need to function as clients
server. on a network.
• Network topology: Because client/ • Network adapter: As is the case with
server networks are more complex than peer-to-peer networks, all nodes on the
peer-to-peer networks, the layout and network must contain adapters (net-
structure of the network, which is called work interface cards). These adapters
the network topology, must be carefully enable a computer (or peripheral) to
planned. communicate with the network using

Constructing Client/Server Networks 569


Network interface card Network interface card
(NIC) (NIC)
Installed in each Installed in server
client

Client Computer #3 Cable


(transmission media)

Switch Server
(Network navigation device)
Client Computer #2

Network operating software Network operating


Often included in operating software
Client Computer #1 system software for client computers Installed on server
Figure 12.6
The basic components of a common data communication lan- What types of servers are found on
a typical client/server guage, or protocol. larger client/server networks? A
network.
• Network navigation device: Because dedicated server is a server used to fulfill
of the complexity of client/server net- one specific function, such as handling
works, specialized network navigation e-mail. When more users are added to a
devices (such as routers, switches, and network, dedicated servers are also added
bridges) are needed to move data sig- to reduce the load on the main server. Once
nals around the network. dedicated servers are deployed, the original
server can become merely an authentication
Figure 12.6 shows the components of a
server or a file server.
simple client/server network. In the follow-
What are authentication and file
ing sections, we will explore each compo-
servers? An authentication server is a
nent in more detail.
server that keeps track of who is logging on
to the network and which services on the
network are available to each user. Authenti-
Servers cation servers also act as overseers for the
Servers are the workhorses of the client/ network. They manage and coordinate the
server network. They interface with many services provided by any other dedicated
different network users and assist them with servers located on the network. A file server
a variety of tasks. The number and types of is a server that stores and manages files for
servers on a client/server network depend network users. On the network at your
on the network’s size and workload. Small workplace or school, you may be provided
networks (such as the one pictured in with space on a file server to store files you
Figure 12.2) would have just one server to create.
handle all server functions, such as file What functions do dedicated
storage, delivery of applications to the servers handle? Any task that is
clients, printing, and so on. repetitive or demands a lot of time from

570 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Wireless
connection

Laser printer 1

Print server

Client Computer #1

Database server
Wireless
access point Switch Laser printer 2

Web server
Client Computer #2 Authentication/
file server
Communication
server

Application
Client Computer #3 server E-mail server

Figure 12.7
a computer’s processor (CPU) is a good request) from a client computer, it puts the job This is a typical large-
candidate to relegate to a dedicated server. into a print queue on the print server. Nor- scale client/server
Common types of dedicated servers are mally, each printer on a network has its own network with several
dedicated servers
print servers, application servers, database uniquely named print queue. Jobs receive a
installed.
servers, e-mail servers, communications number when they enter the queue and go to
servers, and Web servers. Servers are con- the printer in the order in which they were
nected to a client/server network so that all received. Print queues thus function like the
client computers that need to use their serv- “take a number” machines at a supermarket
ices can access them, as shown in Figure 12.7. deli. Thus, print servers organize print jobs
into an orderly sequence to make printing
Print Servers more efficient on a shared printer. Another
useful aspect of print servers is that network
How does a print server function? administrators can set them to prioritize print
Printing is a function that takes a large quan- jobs. Different users and types of print jobs
tity of CPU time and that most people do can be assigned different priorities so higher-
quite often. Print servers manage all client- priority jobs will be printed first. For instance,
requested printing jobs for all printers on a in a company in which documents are
network, which helps client computers to printed on demand for clients, you would
complete more productive work by relieving want these print jobs to take precedence over
them of printing duties. When you tell your routine employee correspondence.
computer to print a document, it passes off
the task to the print server. This frees the
CPU on your computer to do other jobs.
How does the printer know which
Application Servers
documents to print? A print queue is What function does an application
a software holding area for print jobs. When server perform? In many networks,
the print server receives a job (a printing all users run the same application software

Servers 571
(such as Microsoft Office) on their comput- goes to the e-mail server, which then
ers. In a network of thousands of personal handles the routing and delivery of your
computers, installing application software message. The e-mail server functions much
on each individual computer is time con- like a postal carrier, who picks up your mail
suming. An application server acts as a and sees that it finds its way to the correct
repository for application software. destination.
When a client computer connects to the
network and requests an application, the
application server delivers the software to Communications Servers
the client computer. Because the software
does not reside on the client computer itself, What types of communications does
this eases the task of installation and a communications server handle? A
upgrading. The application needs to be communications server handles all commu-
installed or upgraded only on the applica- nications between the network and other
tion server, not on each network client. networks, including managing Internet con-
nectivity. All requests for information from
the Internet and all messages being sent
through the Internet pass through the com-
Database Servers munications server. Because Internet traffic
What does a database server do? As is substantial at most organizations, the
its name implies, a database server provides communications server has a heavy
client computers with access to information workload.
stored in databases. Often, many people The communications server often is the
need to access a database at the same time. only device on the network connected to the
For example, multiple college advisers can Internet. E-mail servers, Web servers, and
serve students at the same time because other devices needing to communicate with
the advisers all have access to the student the Internet usually route all their traffic
information database. This is made possible through the communications server. Provid-
because the database resides on a database ing a single point of contact with the outside
server that each adviser’s computer can world makes it easier to secure the network
access through the network. If the database from hackers.
were on a stand-alone computer instead of a
network, only one adviser could use it at a
time, making the process of serving students Web Servers
terribly inefficient.
What function does a Web server
perform? A Web server is used to host a
Web site so it will be available through the
E-Mail Servers Internet. Web servers run specialized soft-
How is e-mail handled on a large ware such as Apache HTTP Server (open
client/server network? The volume source server software) and Microsoft Inter-
of e-mail on a large network could quickly net Information Services (IIS) that enable
overwhelm a server that was attempting to them to host Web pages. Not every large
handle other functions as well. The sole network has a Web server. Many colleges
function of an e-mail server is to process and businesses use a third-party Web host-
and deliver incoming and outgoing e-mail. ing company to host their Web sites instead.
On a network with an e-mail server, when
you send an e-mail from your computer, it
Network Topologies
ACTIVE Just as buildings have different floor plans
HELP- Using Servers depending on their uses, networks have dif-
DESK ferent blueprints denoting their layout.
Network topology refers to the physical or log-
In this Active Helpdesk call, you’ll play the role of a ical arrangement of computers, transmission
helpdesk staffer, fielding calls about various types of media (cable), and other network compo-
servers and client/server software. nents. Physical topology refers to the layout
of the “real” components of the network,

572 Chapter 12 Behind the Scenes: Networking and Security in the Business World
A cable break here
cuts off Computer #1 and
Computer #2 from
peripherals

Computer #4

Computer #1

Computer #3
Terminator
Terminator

Scanner

Computer #2 Laser printer

Figure 12.8

whereas logical topology refers to the virtual A linear bus topology.


Bus Topology
connections among network nodes. Logical
topologies usually are determined by What does a bus topology look
network protocols instead of the physical like? In a bus (or linear bus) topology,
layout of the network or the paths electrical all computers are connected in sequence
signals follow on the network. on a single cable, as shown in Figure 12.8.
Because networks have different uses, not This topology was deployed most often in
all networks have the same topology. For peer-to-peer networks (not client/server
example, assume that your class has to send networks). It has largely become legacy
a message to the class next door. You decide technology due to the decreased cost of Eth-
to arrange your class in a straight line from ernet networks (which use a star topology)
your classroom to the other classroom. Each and because a bus topology is not designed
student will whisper the message to the next to easily support wireless connections. How-
student in the line until the message is even- ever, bus topologies are still found in some
tually passed to a student in the other class- manufacturing facilities when connecting
room. The arrangement of the students in a groups of computer-controlled machines.
straight line is the topology. The passing of Each computer on the bus network can
the message from student to student using communicate directly with every other
the English language is the protocol. computer on the network. Data collisions,
In this section, we will explore the most which happen when two computers send
common network topologies (bus, ring, and data at the same time and the sets of data
star) and discuss when each topology is collide somewhere in the media, are a prob-
used. As you’ll see, the type of network lem on all networks. When data collides, it is
topology used is important because it can often lost or irreparably damaged. A limita-
affect a network’s performance and scalabil- tion of bus networks is that data collisions
ity. Knowing how the basic topologies work, can occur fairly easily because a bus net-
and the strengths and weaknesses of each work is essentially comprised of one main
one, will help you understand why particu- communication medium (a single cable).
lar network topologies were chosen on the Think of a data collision as having a
networks you use. group of three people (e.g., Emily, Reesa,

Network Topologies 573


Network Topology addressed to it (here, the print job your com-
SOUND puter just sent), it pulls the data off the net-
BYTE and Navigation
work and executes the job.
Devices
The devices (nodes) attached to a bus
In this Sound Byte, you’ll learn about common network network do nothing to move data along
topologies, the types of networks they are used with, the network. This makes a bus network a
and various network navigation devices. passive topology. The data travels the entire
length of the medium and is received by all
network devices. The ends of the cable in a
bus network are capped off by terminators
and Luis) sitting in a room having a conver- (as shown in Figure 12.8). A terminator is a
sation. For the conversation to be effective, device that absorbs a signal so that it is not
only one person can speak at a time; other- reflected back onto parts of the network that
wise, they would not be able to hear and have already received it.
understand each other. Therefore, if Emily is What are the advantages and
speaking, Reesa and Luis must wait until disadvantages of bus networks? The
she finishes before presenting their ideas, simplicity and low cost of bus network
and so on. topology were the major reasons it was
Because two signals transmitted at the deployed most often in P2P networks. The
same time on a bus network may cause a major disadvantage is that if there is a break
data collision, an access method has to in the cable, the bus network is effectively
be established to control disrupted because some
which computer is allowed to computers are cut off
use the transmission media at
a certain time. Computers on a
bus network behave like a
“ What are the
advantages and
from others on the net-
work. Only one computer
can communicate at a
disadvantages of time, so adding a large
group of people having a con-
versation. The computers bus networks? number of nodes to a bus
“listen” to the network data
traffic on the media. When no other com-
puter is transmitting data (that is, when the
” network limits perform-
ance and causes delays in sending data.
Because Ethernet networks don’t suffer
“conversation” stops), the computer knows from these limitations, you rarely see bus
it is allowed to transmit data on the media. topologies today.
This means of taking turns “talking” pre-
vents data collisions.
How does data get from point to
Ring Topology
point on a bus network? When it is What does a ring topology look like?
safe to send data (that is, when no other Not surprisingly, given its name, the com-
computers are transmitting data), the puters and peripherals in a ring (or loop)
sending computer broadcasts the data onto topology are laid out in a configuration
the media. The data is broadcast throughout resembling a circle, as shown in Figure 12.9.
the network to all devices connected to the Data flows around the circle from device to
network. The data is broken into small device in one direction only. Because data is
segments, each called a packet. Each packet passed using a special data packet called a
contains the address of the computer or token, this type of topology is commonly
peripheral device to which it is being sent. called a token-ring topology. The original
Each computer or device connected to the token-ring networks could achieve a data
network listens for data that contains its transfer rate (bandwidth) of either 4 Mbps
address. When it “hears” data addressed or 16 Mbps, but more recent token technolo-
to it, it takes the data off the media and gies can deliver speeds as high as 100 Mbps.
processes it. How does a token move data
For example, say your computer needs to around a ring? A token is passed from
print something on the printer attached to computer to computer around the ring until
the network. Your computer “listens” to the it is grabbed by a computer that needs to
network to ensure no other nodes are trans- transmit data. The computer “holds onto”
mitting. It then sends the print job out onto the token until it has finished transmitting
the network. When the printer “hears” a job data. Only one computer on the ring can

574 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Step 1: Token travels
around ring until a computer
needs to transmit data.

Computer #1
Computer #4

Step 2: Computer #2 needs


to print and grabs token.

Token Ring Step 4: Cable break stops


movement of token and
data transmission.

Computer #2

Computer #3

Step 3: Computer #2
completes transmission and
releases token.

“hold” the token at a time, and usually only Scanner


Printer
one token exists on each ring.
If a node (a computer or device) has data on the ring. Large ring networks have the Figure 12.9
to send, such as a document that needs to capability to use multiple tokens to help A ring topology.
go to the printer, it waits for the token to be move more data faster.
passed to it. The node then takes the token Is a ring topology better than a
out of circulation and sends the data to its bus topology? A ring topology provides
destination. When the receiving node re- a fairer allocation of network resources than
ceives a complete transmission of the data does a bus topology. By using a token, a ring
(in this example, when the document is network enables all nodes on the network
received by the printer), it transmits an to have an equal chance to send data. One
acknowledgment to the sending node. The “chatty” node cannot monopolize the net-
sending node then generates a new token work bandwidth as easily as in a bus topol-
and starts it going around the ring again. ogy because it must pass the token on after
This is called the token method and is the sending a batch of data. In addition, a ring
access method ring networks use to avoid topology’s performance will remain accept-
data collisions. able even with large numbers of users.
A ring topology is an active topology, One disadvantage of a ring network is
which means that nodes participate in mov- that if one computer fails, it can bring the en-
ing data through the network. Each node tire network to a halt because that computer
on the network is responsible for retransmit- is unavailable to retransmit tokens and data.
ting the token or the data to the next node Another disadvantage is that problems in the

Network Topologies 575


ring can be hard for network administrators more detail later in this chapter.) The only
to find. It’s easier to expand a ring topology drawback is that if the switch fails, the net-
than a bus topology, but adding a node to a work no longer functions. However, it is rel-
ring does cause the ring to cease to function atively easy to replace a switch.
while the node is installed. Many star networks use the Ethernet pro-
tocol. Networks using the Ethernet protocol
are by far the most common type of network
in use today.
Star Topology A topology is a physical design of a net-
What is the layout for a star work, whereas a protocol is a set of rules for
topology? A star topology is the most exchanging communication. Although many
widely deployed client/server network lay- people think that Ethernet is a type of net-
out today because it offers the most flexibil- work topology, it is actually a communica-
ity for a low price. In a star topology, the tions protocol. Therefore, an Ethernet
nodes connect to a central communications network could be set up using a bus, a ring,
device called a switch in a pattern resem- or a star topology. Most computers sold
bling a star, as shown in Figure 12.10. The today are equipped with 1-gigabit wired
switch receives a signal from the sending network adapters. For businesses that need
node and retransmits it to the node on the even more speed, the 10-gigabit standard
network that needs to receive the signal. supports a transfer rate of up to 10 Gbps,
Each network node picks up only the trans- but the equipment supporting this standard
Figure 12.10 missions addressed to it. Because the switch is still relatively expensive and therefore
In a star topology, network retransmits data signals, a star topology is small businesses do not use it unless very
nodes are connected an active topology. (We discuss switches in high bandwidth is required.
through a central switch.

Printer
Server

Computer #6
Computer #1

A cable break here means


Computer #1 cannot communicate
with the network. However,
all other computers and devices
can still communicate with
each other. Switch
Computer #5

Computer #4
Computer #2 Computer #3

576 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Collision
Detected
Signal #1

Signal #4
Step 1: When two nodes
Computer Computer Computer Computer transmit simultaneous data
#1 #2 #3 #4 signals, a data collision occurs
and is detected.
ion!
Collis
Signal #1 Signal #4
Jam Signal

Jam Signal

Jam Signal
Jam Signal
Sent
Computer Computer Computer Computer
#1 #2 #3 #4 Step 2: The detecting
node sends a jam signal.

Jam Signal Jam Signal Jam Signal


Retransmit

Retransmit
Signal #1

Signal #4
Step 3: The two nodes
that sent simultaneous data
Computer Computer Computer Computer
#1 #2 #3 #4 signals retransmit their signals
after a random amount of time.

14 nanoseconds later 18 nanoseconds later

Figure 12.11
How do computers on a star net- transmit data. All devices on the network
Avoiding data collisions
work avoid data collisions? Because have the same right (that is, they have
on an Ethernet network.
most star networks are Ethernet networks, multiple access) to transmit data when they
they use the method used on all Ethernet deem it safe. It is therefore possible for two
networks to avoid data collisions: CSMA/ devices to begin transmitting data signals at
CD (short for carrier sense multiple access the same time. If this happens, the two
with collision detection). With CSMA/CD, signals collide.
a node connected to the network uses carrier What happens when the signals
sense (that is, it “listens”) to verify that no collide? As shown in Figure 12.11, when
other nodes are currently transmitting two nodes (Computer 1 and Computer 4)
data signals. If the node doesn’t hear any begin transmitting data signals at the same
other signals, it assumes that it is safe to time, signals collide, and a node on the net-
work (Computer 3) detects the collision
ACTIVE Selecting a (Step 1). That node (Computer 3) then sends
HELP- a special signal called a jam signal to all net-
Network Topology
DESK work nodes, alerting them that a collision
and Cable has occurred (Step 2). The original nodes
In this Active Helpdesk call, you’ll play the role of a (Computer 1 and Computer 4) then stop
Helpdesk staffer, fielding calls about how a client/ transmitting and wait a random amount of
server network differs from a peer-to-peer network, time before retransmitting their data signals
the different classifications of client/server networks, (Step 3). The wait times need to be random;
various network topologies, and the types of trans- otherwise, both nodes would start retrans-
mission media used in client/server networks.
mitting at the same time and another colli-
sion would occur.

Network Topologies 577


What are the advantages and mainly because large networks are con-
disadvantages of a star topology? stantly adding new users. The ability to add
The main reason a star topology generally is new users simply—by installing a new
considered to be superior to a ring topology switch—without affecting users already on
is that if one computer on a star topology the network is the deciding factor. The net-
fails, it doesn’t affect the rest of the network. works you’ll encounter at school and in the
This is extremely important in a large net- workplace will almost certainly be laid out
work in which having one disabled computer in a star topology. Bus topologies have be-
affect the operations of several hundred other come all but extinct now that most home
computers would be unacceptable. networks utilize a star topology. Ring
Another advantage is that it is easy to topologies are still popular in certain busi-
add nodes to star networks. Furthermore, nesses where fair allocation of network ac-
performance remains acceptable even with cess is a major requirement of the network.
large numbers of users. In addition, central- Can topologies be combined
izing communications through a switch within a single network? Because each
makes troubleshooting and repairs on star topology has its own unique advantages,
networks easier for network technicians. topologies are often combined to construct
Technicians can usually pinpoint a commu- business networks. Combining multiple
nications problem just by examining the topologies into one network is known as
switch, as opposed to searching for a partic- constructing a hybrid topology. For in-
ular length of cable that broke in a ring stance, fair allocation of resources may be
network. critical for reservation clerks at an airline
The disadvantage of star networks used (thereby requiring a ring network), but the
to be cost. Because of the complexity of the airline’s purchasing department may require
layout of star networks, they require more a star topology. One disadvantage of hybrid
cable and used to be more expensive than topologies is that hardware changes must
bus or ring networks. Because the price of usually be made to switch a node from one
cable has fallen, this has ceased to be a bar- topology to another.
rier in most cases.

Transmission Media
Comparing Topologies A variety of building materials are available
Which topology is the best one? for constructing a house; the ones chosen
Figure 12.12 lists the advantages and disad- will depend on the needs of the builder.
vantages of bus, ring, and star topologies. Similarly, when building a network, net-
Star topologies are the most common, work engineers can use different types of

Figure 12.12 ADVANTAGES AND DISADVANTAGES OF BUS, RING, AND STAR TOPOLOGIES

Topology Advantages Disadvantages


Bus It uses a minimal amount of cable. Breaks in the cable can disable the network.
Installation is easy, reliable, and inexpensive. Large numbers of users will greatly decrease performance because
of high volumes of data traffic.
Ring Allocates access to the network fairly. Adding or removing nodes disables the network.
Performance remains acceptable even with large numbers Failure of one computer can bring down the entire network.
of users. Problems in data transmission can sometimes be difficult to find.
Star Failure of one computer does not affect other computers on Requires more cable (and possibly higher installation costs) than a
the network. bus or ring topology.
Centralized design simplifies troubleshooting and The switch is a single point of failure. If it fails, all computers
repairs. connected to that switch are affected.
High scalability: adding computers or groups of computers as
needed is easy.
Performance remains acceptable even with large numbers
of users.

578 Chapter 12 Behind the Scenes: Networking and Security in the Business World
media. Transmission media, whether for and so on. The bend radius of the cable
wired or wireless communications technol- defines how many degrees a cable can
ogy, comprise the routes data takes to flow be bent in a one-foot segment before it is
between devices on the network. Without damaged. If many corners need to be
transmission media, network devices would navigated when installing a network,
be unable to communicate. network engineers use cabling with a
Why are wired connections used in high bend radius.
business networks? Wired connections • Cable cost: The cost per foot of different
are popular in business networks because types and grades of cable varies widely.
wired connections generally provide higher Cable selection may have to be made
throughput than wireless connections. based on cost if adequate funds are not
And although most home users purchase available for the optimal type of cabling.
notebooks instead of desktop computers, • Installation costs: Certain types of cable
desktop computers still provide more com- (such as twisted pair) are easy and inex-
puting power for less money than note- pensive to install. Fiber-optic cable
books, which makes desktop computers requires special training and equipment
popular choices for business networks. to install, which increases the installa-
Because desktops aren’t moved around, tion costs.
they are usually connected to a network
• Susceptibility to interference: Signals
with a wired connection.
traveling down a cable are subject to
two types of interference. Electromag-
Wired Transmission Media netic interference (EMI), which is caused
when the cable is exposed to strong
What types of cable are commonly electromagnetic fields, can distort or
used for networks? Most home net- degrade signals on the cable. Fluores-
works use twisted-pair cable as wired trans- cent lights and machinery with motors
mission media. For business networks, the or transformers are the most common
three main cable types that are used today sources of EMI emissions. Cable
are twisted pair, coaxial, and fiber optic. signals also can be disrupted by radio
What are the important factors in frequency interference (RFI), which is
choosing a cable type? Although each
cable type is different, the same criteria
always need to be considered when choos- BITS
ing a cable type: AND ViFi—WiFi for Those on the Move!
BYTES
• Maximum run length: Each type of
cable has a maximum run length over With the proliferation of portable computing devices, demand for connectivity is
which signals sent across it can be increasing exponentially. To meet the demand, technologies such as WiFi are now
“heard” by devices connected to it. deployed even in moving vehicles. Numerous cities in the United States, including San
Therefore, when designing a network, Francisco, California; Cincinnati, Ohio; and Austin, Texas offer WiFi connectivity on city
network engineers must accurately buses. Initiatives like Aspirnaut, in Kentucky, provide rural children with school bus
measure the distances between devices rides in excess of one hour with free WiFi access and computing devices to use while
to ensure that they select an appropriate riding the bus. However, WiFi connectivity is tricky to achieve while on the move
cable. because you can connect to only one wireless access point at a time, and the access
• Bandwidth: As you learned in earlier points have limited range. As you drive along and get out of range, you need to
chapters, bandwidth is the amount of change to other access points. As you switch from one access point to another,
data that can be transmitted across a connectivity speeds drop dramatically or connectivity is lost altogether.
transmission medium in a certain A joint initiative among the University of Massachusetts, the University of Wash-
amount of time. Each cable is different ington, and Microsoft may be close to solving the problem. They have developed a
and is rated by the maximum band- new technology called Vehicle WiFi (ViFi) that allows a device to connect to more than
width it can support. Bandwidth is one access point at the same time. The software your device runs determines which
measured in bits per second, which rep- access point has the best signal strength and sends data packets through it. By con-
resents how many bits of data can be necting with multiple access points at once, it makes switching from point to point
transmitted along the cable each second. less likely to sever your Internet connection. Perhaps you’ll be able to take advantage
• Bend radius (flexibility): When in- of ViFi in the next new car you buy, and your passengers can surf effortlessly while
stalling cable, it is often necessary to you whiz along at 55 miles per hour!
bend the cable around corners, surfaces,

Transmission Media 579


usually caused by broadcast sources shows illustrations of both types of twisted-
(television and radio signals) located pair cable. Because of its lower price, UTP is
near the network. Cable types are rated more widely used, unless significant sources
as to how well they resist interference. of interference must be overcome (such as in
• Signal transmission methods: Both a production environment where machines
coaxial cable and twisted-pair cable create magnetic fields).
send electrical impulses down conduc- What types of UTP cable are
tive material to transmit data signals. available? There are different standard
Fiber-optic cable transmits data signals categories of UTP cable from which to
as pulses of light. choose. The two most common types of
UTP cable used in business networks today
In the sections that follow, we will discuss are Category 6 (Cat 6) and Category 6a
the characteristics of each of the three major (Cat 6a). Cat 6 cable can handle a
types of cable. We will also discuss the use bandwidth of 1 gigabit per second (Gbps),
of wireless media as an alternative to cable. whereas Cat 6a can handle a bandwidth
of 10 Gbps.
Twisted-Pair Cable Unless severe budget constraints are in
What does twisted-pair cable look place, network engineers usually install the
like? Twisted-pair cable should be famil- highest-bandwidth cable possible because
iar to you because the telephone cable (or reinstalling cable later (which often requires
wire) in your home is one type of twisted- tearing up walls and ceilings) can be very
pair cable. Twisted-pair cable consists of expensive. Therefore, new cable installed
pairs of copper wires twisted around each on business networks will usually be Cat
other and covered by a protective sheath 6a cable. Home networks that use twisted-
(jacket). The twists are important because pair cable generally use Cat 6 cable
they cause the magnetic fields that form because it’s less expensive and most
around the copper wires to intermingle, home networks don’t need 10 Gbps of
which makes them less susceptible to out- throughput.
side interference. The twists also reduce the
amount of crosstalk interference (the ten-
dency of signals on one wire to interfere Coaxial Cable
with signals on a wire next to it). What does coaxial cable look like?
If the twisted-pair cable contains a layer Coaxial cable should be familiar to you if
of foil shielding to reduce interference, it is you have cable television, because most
known as shielded twisted-pair (STP) cable television installers use coaxial cable.
Figure 12.13 cable. If it does not contain a layer of foil Coaxial cable (as shown in Figure 12.14)
shielding, it is known as unshielded consists of four main components:
Anatomy of (a) unshielded
twisted-pair (UTP) cable twisted-pair (UTP) cable. This type is more 1. The core (usually copper) is in the very
and (b) shielded twisted- susceptible to interference. Figure 12.13 center and is used for transmitting the
pair (STP) cable. signal.
2. A solid layer of nonconductive insu-
Twisted pairs
lating material (usually a hard, thick
of copper
p wires plastic) surrounds the core.
3. A layer of braided metal
a Protective shielding covers the insu-
sheath lation to reduce interfer-
ence with signals
traveling in the core.
b
Twisted pairs 4. An external
of copper wires jacket of light-
weight plastic
covers the inter-
Protective nal cable compo-
sheath Foil
shielding nents to protect
them from
damage.

580 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Although coaxial cable used to be the
most widely used cable in business net-
Plastic Plastic
works, advances in twisted-pair cable jacket insulation
shielding and transmission speeds, as well
as twisted pair’s lower cost, have reduced
the popularity of coaxial cable. However, Copper
core
coaxial cable is still used in some manufac-
turing facilities where machinery creates Braided metal
for shielding
heavy electrical interference.

Fiber-Optic Cable
What does fiber-optic cable look Figure 12.14
like? As shown in Figure 12.15, the core of Coaxial cable consists of
fiber-optic cable is comprised of a glass (or media are usually add-ons that extend or four main components:
plastic) fiber (or a bundle of fibers) through improve access to a wired network. In the the core, an insulated
corporate environment, wireless access is covering, a braided metal
which the data is transmitted. A protective shielding, and a plastic
layer of glass or plastic cladding is wrapped often provided to give employees a wider
jacket.
around the core to protect it. Finally, for ad- working area. For instance, if conference
ditional protection, an outer jacket (sheath) rooms offer wireless access, employees can
is added, often made of a durable material bring their notebooks (laptops) to meetings
such as Kevlar (the substance used to make and gain access to the network during the
bulletproof meeting. However,
vests). Data trans- when they go back
missions can pass Optical to their offices,
through fiber- glass fiber they may connect
optic cable in to the network
only one direc- through a wired
Protective
tion. Therefore, at sheath connection. Accord-
least two cores ingly, corporate
are located in networks are often
Glass or plastic
most fiber-optic cladding a combination of
cables to enable wired and wireless
transmission of media.
Figure 12.15 Are there
data in both
Fiber-optic cable is made up of a glass or plastic fiber standards defined
directions. (or a bundle of fibers), a glass or plastic cladding, and
How does for wireless
a protective sheath.
fiber-optic communication?
cable differ Wireless devices must
from twisted-pair and coaxial cable? use the same communications standard to
As we noted earlier, the main difference communicate with each other. Wireless net-
between fiber-optic cable and other types works in the United States are currently
of cable is the method of signal transmis- based on the 802.11 standard, also known as
sion. Twisted-pair and coaxial cable use WiFi, established by the Institute of Electri-
copper wire to conduct electrical impulses. cal and Electronics Engineers (IEEE). Wire-
In a fiber-optic cable, electrical data signals less devices attached to networks using the
from network devices (client computers, 802.11 standard communicate with each
peripherals, and so on) are converted to other using radio waves.
light pulses before they are transmitted.
Because EMI and RFI do not affect light
waves, fiber-optic cable is virtually immune
to interference.
Comparing Transmission Media
So who decides which medium is
best for client/server networks?
Wireless Media Options Network engineers specialize in the design
What wireless media options are and deployment of networks and are re-
there? Although the word wireless sponsible for selecting network topology
implies “no wires,” in businesses, wireless and media types. Their decision as to which

Transmission Media 581


DIG
DEEPER
The OSI Model: Defining Protocol Standards

The Institute of Electrical and Electronics Engineers (IEEE) has taken the • Session layer: Sets up a virtual (not physical) connection between
lead in establishing recognized worldwide networking protocols, includ- the sending and receiving devices. It then manages the communi-
ing a standard of communications called the Open Systems Interconnec- cation between the two. In our e-mail example, the session layer
tion (OSI) reference model. The OSI model, which has been adopted as a would set up the parameters for the communications session be-
standard throughout the computing world, provides the protocol guide- tween your computer and the Internet service provider (ISP) where
lines for all modern networks. All modern network operating system your friend has her e-mail account. The session layer then tracks
the transmission of the e-mail until it is satisfied that all the data in
(NOS) protocols are designed to interact in accordance with the stan-
the e-mail was received at your friend’s ISP.
dards set out in the OSI model.
• Transport layer: Breaks up the data into packets and sequences
The OSI model divides communications tasks into seven distinct
them appropriately. It also handles acknowledgment of packets
processes called layers. Each layer of an OSI network has a specific func-
(that is, it determines whether the packets were received at their
tion and knows how to communicate with the layers above and below it. destination) and decides whether packets need to be sent again.
Figure 12.16 shows the layers of the OSI model and their functions. In our e-mail example, the transport layer breaks up your e-mail
This layering approach makes communications more efficient be- message into packets and sends them to the network layer,
cause specialized pieces of the NOS perform specific tasks. The layering making sure that all the packets reach their destination.
approach is akin to assembly-line manufacturing. Producing thousands of • Network layer: Determines where to send the packets on the net-
cars per day would be difficult if one person had to build a car on his or work and identifies the best way to route them there. In our e-mail
her own. However, by splitting up the work of assembling a car into spe- example, the network layer examines the address on the packets
cialized tasks (such as installing the engine or bolting on the bumpers) (the address of your friend’s ISP) and determines how to route the
and assigning them to people who perform exceptionally well at certain packets so they get to your ISP and can ultimately get to the
tasks, greater efficiency is achieved. This is how the OSI layers work. By receiving computer.
handling specialized tasks and communicating only with the layers above • Data link layer: Responsible for assembling the data packets into
and below them, OSI layers make communications more efficient. frames (a type of data packet that holds more data), addressing the
Let’s look at how each OSI layer functions by following an e-mail you frames, and delivering them to the physical layer so they can be sent
on their way. It is the equivalent of a postal worker who reads the
create and send to your friend:
address on a piece of mail and makes sure it is sent to the proper
• Application layer: Handles all interaction between the application recipient. In our e-mail example, the data link layer assembles the
software and the network. It translates the data from the application e-mail data packets into frames, which are addressed with appropri-
into a format that the presentation layer can understand. For exam- ate routing information that it receives from the network layer.
ple, when you send an e-mail, the application layer takes the e-mail
• Physical layer: Takes care of delivering the data. It converts the
message you created in Microsoft Outlook, translates it into a format
data into a signal and transmits it over the network so that it can
your network can understand, and passes it to the presentation layer.
reach its intended address. In our e-mail example, the physical
• Presentation layer: Reformats the data so that the session layer can layer sends the data over the Internet to its ultimate destination
understand it. It also handles data encryption (changing the data into (your friend’s ISP).
a format that makes it harder to intercept and read the message) and
compression, if required. In our e-mail example, the presentation By following standardized protocols set forth by the OSI model, NOS
layer notices that you selected an encryption option for the e-mail software can communicate happily with the computers and peripherals
message and encrypts the data before sending it to the session layer. attached to the network as well as with other networks.

Figure 12.16 LAYERS OF THE OSI MODEL AND THEIR FUNCTIONS

Application layer Handles all interfaces between the application software and the network
Translates user information into a format the presentation layer can understand

Presentation layer Reformats data so that the session layer can understand it
Compresses and encrypts data

Session layer Sets up a virtual (not physical) connection between the sending and receiving devices
Manages communications sessions

Transport layer Creates packets and handles packet acknowledgment

Network layer Determines where to send the packets on the network

Data link layer Assembles the data into frames, addresses them, and sends them to the physical layer for delivery

Physical layer Transmits (delivers) data on the network so it can reach its intended address

582 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Figure 12.17 CHARACTERISTICS OF MAJOR CABLE TYPES

Cable Characteristics Twisted Pair (Cat 6) Twisted Pair (Cat 6a) Fiber-Optic
Maximum run length 328 feet (100 m) 328 feet (100 m) Up to 62 miles (100 km)
Bandwidth Up to 1 Gbps Up to 10 Gbps 10 to 40 Gbps
Bend radius (flexibility) No limit No limit 30 degrees/foot
Cable cost Extremely low Low High
Installation cost Extremely low Extremely low Most expensive because of installation training required
Susceptibility to interference High High None (not susceptible to EMI or RFI)

transmission medium a network will use is R2, Linux, UNIX, and Novell SUSE Linux
based on the topology selected, the length Enterprise.
of the cable runs needed, the amount of Do peer-to-peer networks need
interference present, and the need for special NOS software? The software
wireless connectivity. Coaxial cable has that P2P networks require is built into the
been made largely obsolete by advances Windows and Macintosh operating systems.
in twisted-pair cabling throughput and Therefore, if you have a simple P2P net-
decreases in its cost. work, there is no need to purchase special-
Figure 12.17 compares the attributes of ized NOS software. When a peer-to-peer
the major cable types. Most large networks network won’t suffice (such as in a network
have a mix of media. For example, fiber- with more than 10 computers), you can’t
optic cable may be appropriate for the por- use the networking software included in
tion of the network that traverses the factory Windows and Mac OS X. Instead, you will
floor, where interference from magnetic need to purchase additional NOS software.
fields is significant. However, unshielded How does NOS software differ
twisted-pair cable may work fine in the from operating system software?
general office area. Wireless media may be Operating system (OS) software is designed
required in conference rooms and other to facilitate communication between the
areas where employees are likely to connect software and hardware components of your
their notebooks or where it is impractical computer. NOS software is specifically de-
or expensive to run cable. signed to provide server services, network
communications, management of network
peripherals, and storage. To provide network
Network Operating communications, the client computer must
run a small part of the NOS in addition to
Systems the OS. Windows 7 is an OS and is installed
Merely using media to connect computers on home computers. As noted above, be-
and peripherals does not create a client/ cause it also has some NOS functionality,
server network. Special software known as a client computers (in a client/server network)
network operating system (NOS) needs to that have Windows 7 installed as the OS do
be installed on each client computer and not need an additional NOS. Windows
server connected to the network to provide Server 2008 R2 is a NOS that is deployed on
the services necessary for them to communi- servers in a client/server network.
cate. Many modern operating systems, such How does the NOS control network
as Windows 7 and Mac OS X, include NOS communications? Each NOS has its
client software as part of the basic installa- own proprietary communications language,
tion. However, if your operating system file-management structure, and device-
does not include NOS client software, it management structure. The NOS also sets
must be installed on each client. The NOS and controls the protocols (rules) for all
provides a set of common rules (a protocol) devices wishing to communicate on the
that controls communication among devices network. Many different proprietary
on the network. The major NOSs on the networking protocols exist, such as Novell
market today include Windows Server 2008 Internetwork Packet Exchange (IPX),

Network Operating Systems 583


Microsoft NetBIOS Extended User Interface Network adapters are devices that perform
(NetBEUI), and the Apple File Protocol specific tasks to enable computers to com-
(AFP). These protocols were developed for a municate on a network. Most network
specific vendor’s operating system. For ex- adapters are installed inside computers and
ample, IPX was developed for networks peripherals. These adapters are referred to
running the Novell NOS. Proprietary proto- as network interface cards (NICs).
cols such as these do not work with another What do network adapters
vendor’s NOS. do? Network adapters perform three criti-
However, because the Internet uses an cal functions:
open protocol (called TCP/IP) for communi-
1. They generate high-powered signals
cations, many corporate networks use TCP/
to enable network transmissions. Digi-
IP as their standard networking protocol re-
tal signals generated inside the com-
gardless of the manufacturer of their NOS.
puter are fairly low powered and
All modern NOSs support TCP/IP. (We dis-
would not travel well on network
cuss TCP/IP in more detail in Chapter 13.)
media (cable or wireless technology)
Can a network use two different
without network adapters. Network
NOSs? Many large corporate networks
adapters convert the signals from inside
use several different NOSs at the same time.
the computer to higher-powered sig-
This is because different NOSs provide dif-
nals that have no trouble traversing the
ferent features, some of which are more use-
network media.
ful in certain situations than others are. For
instance, although the employees of a corpo- 2. They are responsible for breaking the
ration may be using a Microsoft Windows data into packets and preparing the
environment for their desktops and e-mail, packets for transmission across the
the file servers and Web servers may be run- network. They also are responsible for
ning a Linux NOS. receiving incoming data packets and, in
Because NOSs use different internal soft- accordance with networking protocols
ware languages to communicate, one NOS (rules), reconstructing them, as shown
can’t communicate directly with another. in Figure 12.18.
However, if both NOSs are using the same 3. They act as gatekeepers for informa-
protocol (such as TCP/IP), they can pass in- tion flowing to and from the client
formation between the networks and it can computer. Much like a security guard
be interpreted by the receiving network. in a gated community, a network
Figure 12.18
adapter is responsible for permitting or
A NIC is responsible for
breaking down data into denying access to the client computer
packets, preparing Network Adapters (the community) and controlling the
packets for transmission, As we noted in Chapter 7, client computers flow of data (visitors).
receiving incoming
data packets, and and peripherals need an interface to connect You should note that there will not
reconstructing them. with and communicate on the network. always be the same number of response

Step 1: You request information Request


from network database. Step 2: NIC breaks request into packet
packages and sends packets #1 Server
to server.
Request
packet
#2
Response
packet Request
#1 packet
Network interface #3
card
Response
Your computer packet
(client) #2
Step 4: NIC reassembles response
packets and displays information
on your screen. Step 3: Server executes request, assembles response
into package, and sends packets to client.

584 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Smartphone
with wireless NIC

Desktop computer Notebook computer


with wireless NIC
Cat 6 cable Radio waves

Switch

Wireless access point

Server

Figure 12.19
This small corporate
packets as there are request packets. The points. A wireless access point (WAP) gives network has an added
number of packets depends on the volume wireless devices a sending and receiving wireless access point.
of the data being sent. A simple response connection point to the network.
may have less data than a complex one. Figure 12.19 shows an example of a typi-
Are there different types of cal corporate network with a wireless access
network adapters? Although there are point. The access point is connected to the
different types of network adapters, almost wired network through a conventional
without exception, Ethernet (either wired or cable. When a notebook (or other device
wireless) is the standard communications with a wireless NIC) is powered on near a
protocol used on most client/server net- wireless access point, it establishes a con-
works. Therefore, the adapter cards that nection with the access point using radio
ship with computers today are Ethernet waves. Many devices can communicate
compliant. The majority of Ethernet with the network through a single wireless
adapters provide connection ports that ac- access point.
cept RJ-45 (Ethernet) connector plugs for Do network adapters require
connection to twisted-pair cable. However, software? Because the network adapter
adapters that provide other types of connec- is responsible for communications between
tors for direct connections to other types of the client computer and the network, it
network media (such as fiber-optic cables) needs to speak the same language as the net-
are available. work’s special operating system software.
Do wireless networks require Therefore, special communications software
network adapters? Most corporate net- called a device driver is installed on all client
works are not entirely wireless, but they do computers in the client/server network.
provide wireless connectivity to some com- Device drivers enable the network adapter
puters and to portable devices such as to communicate with the server’s operating
smartphones. A computer that connects to system and with the operating system of the
the network using wireless access needs to computer in which the adapter is installed.
have a special network adapter card, called What are my options if I’m not
a wireless network interface card (wireless located in range of a wireless
NIC), installed in the system unit. Notebook network? You can bring your own
computers and other portable computing wireless network with you! Most cellular
devices contain wireless NICs. To allow telephone companies, such as AT&T and
wireless connections, the network must be Sprint, offer broadband PC adapters for
fitted with devices called wireless access your notebook that will keep you connected

Network Adapters 585


(for a fee, of course). A PC adapter plugs Are MAC addresses the same as IP
into a USB port on your notebook and addresses? MAC addresses and Internet
enables it to send and receive data using Protocol (IP) addresses are not the same
your cellular provider’s wireless network. thing. A MAC address is used for identifica-
Broadband download speeds now can tion purposes internally on a network, which
reach more than 50 Mbps with 4G networks, is similar to giving people different names to
making this a viable option if you need to differentiate them. An IP address is the ad-
ensure you have connectivity everywhere dress external entities use to communicate
you go—or virtually everywhere. Check with your network and is similar to your
with the cellular provider to ensure they home street address. Think of it this way: The
have coverage in most places you will postal carrier delivers a package (data packet)
travel through. to your dorm building based on its street
address (IP address). The dorm’s mail clerk
delivers the package to your room because it
Network Navigation has your name on it (MAC address) and not
Devices that of your neighbor. Both pieces of informa-
tion are necessary to ensure that the package
To flow through a network, data is broken (or data) reaches its destination.
into small segments called packets. Data How does a data packet get a MAC
packets are like postal letters. They don’t get address? Data packets are not necessar-
to their destinations without some help. In ily sent alone. Sometimes groups of data
this section, we explore the various conven- packets are sent together in a group called a
tions and devices that help speed data pack- frame. A frame is a container that can hold
ets on their way through the network. multiple data packets. This is similar to
placing several letters going to the same
postal address in a big envelope. While the
MAC Addresses data packets are being assembled into
frames, the NOS software assigns the
How do data packets know where to
appropriate MAC address to the frame. The
go on the network? Each network
NOS keeps track of all devices and their
adapter has a physical address similar to a
addresses on the network. Much like a letter
serial number on an appliance. This is called
that is entrusted to the postal service, the
a media access control (MAC) address, and
frame is delivered to the MAC address that
it is made up of six two-position characters
the NOS assigned to the frame.
such as 01:40:87:44:79:A5. (Don’t confuse this
What delivers the frames to the
MAC with the Apple computers of the same
correct device on the network? In a
name.) The first three sets of characters (in
small bus network, frames just bounce along
this case, 01:40:87) specify the manufacturer
the wire until the correct client computer
of the network adapter, whereas the second
notices the frame is addressed to it and pulls
set of characters (in this case, 44:79:A5)
the signal off the wire. This is inefficient in a
makes up a unique address. Because all
larger network. Therefore, many types of
MAC addresses must be unique, there is an
devices have been developed to deliver data
IEEE committee responsible for allocating
to its destination efficiently. These devices
blocks of numbers to network adapter
are designed to route signals and exchange
manufacturers.
data with other networks.
Are MAC addresses useful for
What’s My IP anything besides identifying a partic-
SOUND ular network device? On networks
BYTE Address? (And Other
with wireless capabilities, MAC addresses
Interesting Facts
can be used to enhance network security.
about Networks) Most wireless routers and access points can
In this Sound Byte, you’ll learn how to determine your be used to filter MAC addresses and elimi-
IP address, which is commonly required to set up nate addresses of unauthorized devices.
online gaming. You’ll also explore several Web sites Because each MAC address is unique, you
that can reveal interesting information about your can input a list of authorized MAC
connection to the Internet. addresses into the router. If someone who
is using an unauthorized network adapter

586 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Message for
Computer #3

Switch

Server
Computer #1

Broadcast of
message for
Computer #3

Computer #2
Computer #4

Computer #3

Figure 12.20
(one with an unauthorized MAC address) grows in size, performance can decline be- Switches rebroadcast
attempts to connect to the network, he or cause many devices compete for transmission messages—but only to
she will be unable to make a connection. Al- time on the network media. To solve this the devices to which the
though it would be impractical for a large problem, a network can be broken into multi- messages are addressed.
organization, in which employees constantly ple segments known as collision domains. A
are being hired and leaving, MAC address bridge is a device that is used to send data
filtering is a useful security tool on home between these different collision domains. A
networks and small business networks. bridge sends data between collision domains,
depending on where the recipient device is
located, as indicated in Figure 12.21. Signals
Switches and Bridges received by the bridge from collision domain
Which devices are used to route A are forwarded to collision domain B only if
signals through a single network? the destination computer is located in that do-
Switches and bridges are used to send data main. Most home networks contain only one
on a specific route through the network. A segment and therefore do not require bridges.
switch makes decisions, based on the MAC
address of the data, as to where the data is
to be sent and directs it to the appropriate
network node. This improves network effi-
Routers
ciency by helping to ensure that each node What device does a network use to
receives only the data intended for it. move data to another network?
Do all networks need a switch? Whereas switches and bridges perform their
Switches are needed on Ethernet networks functions within a single network, a router
whether installed in the home or a business. is designed to send information between
Routers sold for home use have switches two networks. To accomplish this, the router
built into them. Figure 12.20 shows a switch must look at higher-level network addresses
being used to rebroadcast a message. (such as IP addresses), not MAC addresses.
Are switches sufficient for moving When the router notices data with an
data efficiently across all sizes of address that does not belong to a device on
networks? When a corporate network the network from which it originated, it

Network Navigation Devices 587


Bridge

Collision Domain A Collision Domain B

Signal to Computer #2 not


passed on to Collision Domain B Signal to
Computer #4

Signal to Signal to
Computer #4 Computer #4
Switch
S must be Switch
Signal to
Computer #2 passed to
Collision
Domain B

Signal to
Computer #4

Computer #1 Computer #4

Computer #2 Computer #3

Figure 12.21
Bridges are devices used sends the data to another network to which mistakes, malicious human activity, and
to send data between it is attached (or out onto the Internet). natural events and disasters.
different network
collision domains. • Human errors and mistakes: Everyone
makes mistakes. For example, the clerk
Network Security processing your tuition payment could
accidentally delete your records. A
for Client/Server member of the computer support staff
Networks could mistakenly install an old database
A major advantage that client/server net- on top of the current one. Even physical
works have over peer-to-peer networks is accidents fall into this category; for ex-
that they offer a higher level of security. ample, someone could lose control of a
With client/server networks, users can be car and drive it through the wall of the
required to enter a user ID and a password main server room.
to gain access to the network. The security • Malicious human activity: Malicious
can be centrally administered by network actions can be perpetrated by current
administrators, freeing individual users of employees, former employees, or third
the responsibility of maintaining their own parties. For example, a disgruntled em-
data security (as they must do on a peer-to- ployee could introduce a virus to the
peer network). network. A hacker could break into the
In the next section, we will explore the student database server to steal credit
challenges network administrators face in card records. A former employee who
keeping a client/server network secure. We feels he or she was unjustly fired could
use a college network as our example, but deliberately destroy data.
note that the same principles apply to all • Natural events and disasters: Some
client/server networks. events—such as broken water pipes or
What sources of security threats fire, or disasters such as hurricanes, floods,
do all network administrators need earthquakes, and other acts of nature—are
to watch for? Threats can be classified beyond human control. All can lead to the
into three main groups: human errors and inadvertent destruction of data.

588 Chapter 12 Behind the Scenes: Networking and Security in the Business World
ACTIVE because the ID was generated by a network
HELP-
Selecting Network administrator when you became a student.
DESK Navigation Devices Can hackers use my account to
log on to the network? If a hacker
In this Active Helpdesk call, you’ll play the role of a knows your user ID and password, he or she
Helpdesk staffer, fielding calls about how network can log on and impersonate you. (Imperson-
adapters enable computers to participate in a client/ ation can also happen if you fail to log out of
server network and what devices assist in moving a terminal on the college network and some-
data around a client/server network. one comes along and uses your account.)
Sometimes network user IDs are easy to fig-
ure out because they have a certain pattern
(such as your last name and the first initial
Who and what does a college net- of your first name). If a hacker can deduce
work need to be secure against? A your user ID, he might use a software pro-
college network, like any network, is vulner- gram that tries millions of combinations of
able to unauthorized users and manipula- letters and numbers as your password in an
tion or misuse of the data contained on it. attempt to access your account. Attempting
The person who sat next to you last semes- to access an account by repeatedly trying
ter in English class—and failed—may be in- different passwords is known as a brute
terested in changing his or her grade to an force attack. To prevent these attacks from
A. Hackers may be interested in the finan- succeeding, network administrators often
cial and personal information (such as Social configure accounts so that they will disable
Security numbers and credit card numbers) themselves after a set number of logon at-
stored in college financial office databases tempts using invalid passwords have been
on the network. Thus, one of the network made. If a network account isn’t set to dis-
administrator’s key functions is to keep net- able itself after a small number of incorrect
work data secure. passwords is tried, a brute force attack may
eventually succeed.

Authentication
Access Privileges
How does a college ensure that only
authorized users access its net- How can I gain access to everything
work? Authentication is the process on the college network? The simple
whereby users prove they have authoriza- answer is that you can’t! When your account
tion to use a computer network. The type of was set up, certain access privileges were
authentication most people are familiar with granted to indicate which systems you were
consists of providing a user ID and pass- allowed to use. For example, your access
word. However, authentication can also be privileges probably include the ability to
achieved through the use of biometric de- access the Internet. You also might have
vices (discussed later in this chapter) and access privileges to view your transcript and
through possessed objects. A possessed grades online, depending on the sophistica-
object is any object that a user carries to tion of your college network. However, you
identify himself and that grants him access definitely were not granted access to the
to a computer system or computer facility. grade reporting system, because this would
Examples include identification badges, enable you to change your grades. Likewise,
magnetic key cards, and smart keys (similar
to flash drives). A Day in the Life
How do most colleges handle au- SOUND
BYTE of a Network
thentication on their networks? As Technician
mentioned earlier, to gain access to a typical
college client/server network, you have to In this Sound Byte, you’ll learn firsthand about the
go through authentication by entering a user exciting, fast-paced job of a computer technician.
ID and a password. By correctly inputting Interviews with actual network technicians and tours
your ID and password, you prove who you of networking facilities will provide you with a deeper
are to the network and show that you have appreciation for the complexities of the job.
authorized access. The access is authorized

Network Security for Client/Server Networks 589


TRENDS
IN IT RFID—Friend or Foe?

Bought anything at WalMart or Best Buy lately? If so, there is a good and, ultimately, increased sales because the product is on the shelf when
chance that you brought home a radio frequency identification tag you go to buy it.
(RFID tag) with your purchase. Originally, RFID tags were used to keep Retailers also can use the product serial number information, which
track of cattle, but now they’ve moved into the retail sector to keep track can be embedded in tags, to speed repair or return service. This process
of products. What are RFID tags, how did they end up in retail stores, and is shown in Figure 12.22. As merchandise equipped with RFID tags en-
why should you care about them? ters the warehouse, the tags are scanned, and the inventory database is
RFID tags can look like stickers or labels, or like the thin plastic wrist- updated. When merchandise is moved to the sales floor, scanning up-
bands you get when you check into a hospital. The tags are attached to dates the inventory database again for the new stock location. One last
batches of merchandise (usually cases or pallets), and all tags contain a scan occurs when customers purchase items, which triggers the stock
microchip that holds a unique sequence of numbers used to identify the ordering system to place another order with a supplier if inventory is too
product to which it is attached. The tags also contain a tiny antenna that low.
broadcasts information about the merchandise, such as its date of man- RFID can provide huge benefits for consumers. Imagine if all prod-
ufacture or price. Think of RFID tags as the next generation of UPC codes. ucts in your local grocery store had RFID tags. When you entered the
Two types of tags are in use: active and passive. Active tags are store and grabbed a shopping cart, you could swipe your credit card
equipped with a battery and constantly transmit information. Passive through a reader on the cart. After you finished shopping, you could just
tags don’t have their own power source but instead get their energy from walk out the door, at which time an RFID reader would take an inventory
tag readers. Passive tags are more common because they are cheaper. of the contents of your cart and charge your credit card for what you pur-
Tag readers are devices that scan the information on the tags as the tags chased. No more waiting in checkout lines! This streamlining of payment
are passed by the reader. They do this through antennas that generate could result in lower costs for consumers. After you got home, if your re-
magnetic fields, which the passive tags sense. In response, the passive frigerator was equipped with RFID equipment, it could scan your pur-
tags transmit their product code to the tag reader. The reader then sends chases and keep track of your groceries, including expiration dates. Your
the digital information to a computer network, and most likely into a refrigerator might contact your smartphone (via the Internet) and let you
database. know that your milk was out of date so you could buy more on the way
So how do RFID tags help retailers? For large retailers, inventory can home. Now that’s a smart fridge!
be daunting to manage. Retailers such as WalMart have tens of thou- All this convenience could come with a price. There is concern that
sands of suppliers sending hundreds of thousands of products to their people might gather information about consumers’ buying habits without
warehouses and stores. The use of RFID tagging allows the recording of their knowledge, similar to the concerns people have about spyware on
inventory receipts and shipments to stores to be largely automated, re- computers today, because the RFID tags would be operational outside of
sulting in fewer mistakes, fewer instances of merchandise being lost and the retail store. For example, someone could sit in the parking lot with a
forgotten in the warehouse, and tighter control over stock levels. This tag reader and detect exactly what you had purchased as you pushed
helps retailers and their suppliers ensure that the correct inventory levels your shopping cart by his or her car. If this person were from a compet-
are maintained at all times, resulting in fewer shortages of merchandise ing retailer, this information could be especially valuable to that

you did not receive access to the financial Aside from improper access, how
systems; otherwise, you might be able to else do data theft and destruction
change your account, indicating that your occur? Data storage devices are becom-
bill was paid when it had not been. ing smaller even as their capacities are in-
How does restricting access creasing. One problem that devices such as
privileges protect a network? flash drives pose is theft of data or intellec-
Because network access accounts are tual property. Because these devices are so
centrally administered on the authentication portable and have such large memory ca-
server, it is easy for the network administra- pacity, it is easy for a disgruntled employee
tor to set up accounts for new students and to walk out the front door with stacks of
grant them access only to the systems and valuable documents tucked in his or her
software they need. The centralized nature pants pocket. Industrial espionage has never
of the creation of access accounts and the been easier—and no spy cameras are
ability to restrict access to certain areas of needed!
the client/server network make it more se- Flash drives can also introduce viruses or
cure than a peer-to-peer network. If you other malicious programs to a network,
shouldn’t go somewhere (such as into the either intentionally or unintentionally. Just
files that record student grades), you can’t Secure Network Technologies, a security
get there on your school network! consulting firm, decided to test a client’s

590 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Truck Warehouse Sales Floor Customer
Pallets of merchandise
being unloaded
at the dock

Data being scanned Data being scanned Data being scanned as


as boxes go into the as boxes go into the customers take boxes
warehouse retail space out to their cars

Figure 12.22
RFID tags are scanned multiple times at a retail store.

company. Alternatively, this person could be from a government enforce- Many consumers resent any potential invasion of their privacy. There-
ment agency trying to determine whether underage consumers were pur- fore, retailers will need to educate consumers about RFID tags and their
chasing alcoholic beverages. Some pundits have speculated that if the benefits. Retailers also will need to ensure that consumers have the option
tags had a long enough range, thieves could drive by houses and scan for to deactivate or remove tags to protect their privacy.
desirable items to steal, such as large-screen TVs. However, this is unlikely
given the state of current RFID technology.

security procedures by leaving 20 flash educate employees to the dangers posed by


drives at random locations around the portable media devices and other untrusted
client’s office. By the end of the day, employ- media. Second, create policies regulating the
ees had picked up 15 of the flash drives and use of media in the workplace. Third, install
plugged them into computers on the com- security measures such as personal firewalls
pany network. The flash drives contained a or antivirus software on all computers in the
simple program to display images as well as company. The firewalls should be able to
a Trojan horse program. While the employ- prevent malicious programs from running,
ees were viewing the images, the Trojan even if they are introduced to a computer
horse program enabled the consultants to via a flash drive. Last, lock down and moni-
access the company network (if they wanted tor the use of USB devices. Although
to do so) and steal or compromise data. It Microsoft networking software allows
isn’t hard to imagine hackers leaving flash network administrators to shut off access to
drives around your company that could the USB ports on computers, this prevents
act as “skeleton keys” to your company’s employees from using flash drives and other
network. USB devices for legitimate purposes.
How should network administra- Other software products, such as
tors protect their networks from DeviceLock and Safend, can be deployed
portable storage devices? First, on a network to provide options such as

Network Security for Client/Server Networks 591


ETHICS Network Technicians’ Access to Networks—Who Is Watching
IN IT
the Watchers?
According to Salary.com, the majority of employers report monitoring installed when the notebooks were issued to the students. Despite some
their employees in some fashion. The monitoring of phone calls, e-mail, students and parents complaining about the potential for invasion of pri-
and Internet usage by employers is legal in almost all jurisdictions in the vacy (after they became aware of the software), the school administra-
United States even if employees are not told they are being monitored. tors did not lay down strict guidelines for use of the software. When a
Employers that suspect employees are goofing off can install spyware to student was disciplined for behavior that occurred off of school property,
monitor employee computer keystrokes and keep track of Web sites which was supported by a picture taken from the webcam on his com-
visited, down to the individual computer level. Naturally, network admin- puter, his parents filed a lawsuit alleging invasion of privacy. Subsequent
istrators are often involved in employee monitoring. investigation revealed that the software had been used numerous times
Consider the case of Vernon Blake, a system administrator at the by network administrators to capture images of students even when the
Alabama Department of Transportation. His boss was constantly playing computers were not reported missing or stolen. It appears the use of the
computer games at work. This was common knowledge, yet no action software was left up to the discretion of the network administrators
was taken. Vernon installed software on his boss’s computer and cap- instead of being delineated in a written policy.
tured screen images that verified the boss was playing solitaire about So who is in charge of monitoring network administrators so that
70 percent of the time. When Blake reported the results to manage- they don’t abuse their access to sensitive information or fail to exercise
ment, the boss was reprimanded and Blake was fired! The company proper safeguards over sensitive data? Savvy companies put written
cited Blake’s lack of authority or permission to install the monitoring policies in place for employees regarding computer usage. These poli-
software. cies need to include guidelines for network administrators who have
Or consider the spying scandal in Lower Merion School District in higher levels of access than normal employees do. Procedures for safe-
Pennsylvania. In the spring of 2010, it came to light that software that guarding data and guidelines for investigating employee misuse of com-
was installed on notebook computers (provided to students by the school puters must be clearly explained, and management needs to periodically
district) was being used by network administrators to capture photos review the activities of the network administrators to ensure compliance
through the computers’ webcams and to capture students’ on-screen with polices. Although all employees need to follow approved company
activities. The software was only supposed to be activated when a procedures regarding computer usage, it is especially important to en-
student reported the notebook stolen, and the parents and students were sure that employees with high levels of access and critical security re-
not sufficiently notified as to the capabilities of the tracking software sponsibilities are adhering to company guidelines.

detailed security policies. Such products can closets, safe from anyone who might tamper
also monitor USB device connections and with them in an attempt to sabotage the net-
track which users have connected devices to work or breach its security.
the network (including devices other than As shown in Figure 12.23, access to sensi-
flash drives). tive areas must be controlled. Many different
Don’t forget to inform the employees that devices can be used to control access. An
their use of these devices is being moni- access card reader is a relatively cheap de-
tored. That alone will be enough to scare vice that reads information from a magnetic
many employees from connecting untrusted strip on the back of a credit card–like access
devices to the network. card (such as your student ID card). The card
reader, which can control the lock on a door,
is programmed to admit only authorized
personnel to the area. Card readers are easily
Physical Protection Measures programmed by adding authorized ID card
Can any physical measures be taken numbers, employee numbers, and so on.
to protect a network? Restricting Biometric authentication devices are be-
physical access to servers and other sensi- coming more popular, although they are still
tive equipment is critical to protecting the prohibitively costly for many organizations,
network. Where are the servers that power especially colleges. A biometric authentica-
your college network? They are most likely tion device uses some unique characteristic
behind locked doors to which only author- of human biology to identify authorized
ized personnel have access. Do you see any users. Some devices read fingerprints or
routers or switches lying about in computer palm prints when you place your hand on a
labs? Of course you don’t. These devices are scanning pad. Other devices shine a beam of
securely tucked away in ceilings, walls, or laser light into your eye and read the unique

592 Chapter 12 Behind the Scenes: Networking and Security in the Business World
IT
Manager's Biometric
Office Authentication
Device

Biometric
Authentication
Device
Wiring
Closet

General IT
Office Area
Server Room

Biometric
Authentication
Device

Access Figure 12.23


Card
patterns of your retina to identify you. Facial Reader Access card readers can
recognition systems store unique characteris- be used to limit access to
tics of an individual’s face for later compari- semisensitive areas such
son and identification. All of these devices have fooled biometric fingerprint readers by as the IT office. Higher-
security areas, such as
are programmable. When an authorized indi- using fingers made out of modeling clay, the server room, may
vidual uses a device for the first time, his or using the fingers of cadavers, or having deserve the additional
her fingerprints, face patterns, or retinal pat- unauthorized persons breathe on the sensor, protection that biometric
terns are scanned and stored in a database. which makes the previous user’s fingerprint authentication devices
Financial institutions and retail stores are visible. (Fingers leave an oily residue behind offer.
considering using such devices to attempt to when they touch a surface.) Research insti-
eliminate the growing fraud problems of tutions, such as Clarkson University in New
identity theft and counterfeiting of credit York, are designing next-generation finger-
and debit cards. If fingerprint authorization print readers that are much more difficult to
were required at the supermarket to make a fool. These will use specially designed algo-
purchase, a thief who stole your wallet and rithms that will detect moisture patterns on
attempted to use your credit card would be a person’s fingers. Another approach may
unsuccessful. involve readers that detect an electrical
The biometric devices currently on the current when a finger touches the reader,
market don’t always function as intended. which is possible because the human body
Facial recognition and retinal scanning conducts electrical current. Future retinal
systems can sometimes be fooled by pictures readers may check whether a person blinks
or videos of an authorized user. Researchers (or his or her pupils contract) when a bright

Network Security for Client/Server Networks 593


light shines on him or her. Suffice it to say, checked to ensure they are either from or
these devices have a way to go before they addressed to a legitimate IP address on the
are foolproof. network. If the addresses are not valid
addresses on the network, the firewall
discards them.
Firewalls What other security measures
Is the college Internet connection does the firewall on a client/server
vulnerable to hackers? Just like a network use? To increase security even
home network, a college network that is further, most large networks add a bastion
connected to the Internet can create an host, which is a heavily secured server
attractive nuisance. A college network will located on a special perimeter network
most likely have a high-bandwidth connec- between the company’s secure internal
tion to the Internet that will attract hackers. network and the firewall. A bastion host
For this reason, a well-defended college gets its name from the fortified towers
network, just like a well-defended (called bastions), located along the outer
home network, includes a firewall. Firewalls walls of medieval castles, which were
can be comprised of software or hardware, specifically designed to defend the castles
and many sophisticated firewalls include against attackers.
both. Routers are often equipped to act as To external computers, the bastion host
hardware firewalls. gives the appearance of being the internal
Does the firewall on my college’s network server. Hackers can waste a lot of
network work the same way as a time and energy attacking the bastion host.
personal firewall installed on a home However, even if a hacker breaches the bas-
network does? Although the firewall at tion host server, the internal network is not
your school may contain a few extra security vulnerable because the bastion host is not on
options, making it even harder to breach the internal network. Moreover, during the
than a personal firewall, the school’s firewall time the hackers spend trying to penetrate
works on the same basic the bastion host, network


principles as a home net- administrators can detect
work. At a minimum, most Firewalls can be and thwart their attacks.
firewalls work as packet comprised of Bastion hosts are often
screeners. Packet screening software or configured as proxy servers.
involves examining incom- A proxy server acts as a go-
ing data packets to ensure hardware, and between, connecting comput-
that they originated from many ers on the internal network
or are authorized by valid sophisticated with those on the external
users on the internal net- network (the Internet). All re-
work. The router is the firewalls include quests from the internal net-
device that performs the both. work for Internet services are
packet screening. Unautho-
rized or suspect packets are discarded by the
firewall before they reach the network.
” directed through the proxy
server. Similarly, all incoming requests from
the Internet must pass through the proxy
Packet screening also can be configured server. It is much easier for network
for outgoing data to ensure that requests for administrators to maintain adequate
information to the Internet are from legiti- security on one server than it is to ensure that
mate users. This helps detect Trojan horse security is maintained on hundreds or thou-
programs that may have been installed by sands of computers in a college network.
hackers. As you learned in Chapter 9, Trojan Figure 12.24 shows a network secured by a
horses masquerade as harmless programs firewall, a bastion host, and a screening
but have a more sinister purpose. They often router.
try to disguise where they are sending data Now that you know a bit more about
from by using bogus IP addresses on the business network computing, you should
packets the programs send instead of using be able to comfortably navigate the
an authorized IP address belonging to the network at your college or your place of
network. employment and understand why certain
If packet screening is working, packets security measures have been taken to
going into and out of the network are protect network data.

594 Chapter 12 Behind the Scenes: Networking and Security in the Business World
Firewall

Packets
to/from the
Internet
Accepted
packets
from
authorized
users Perimeter Network

Rejected
packets from
unauthorized Authorized
users requests for Secure Internal Network
Internet services

Valid Internet
services

External screening router


External screening routers examine
all incoming and outgoing packets
to/from the Internet. Only packets Bastion host
to/from authorized internal users & proxy server
are permitted into the perimeter The bastion
network. Packets from host/proxy server Computer #1
acts as the single Internal
unauthorized users are rejected.
point of contact for screening
all incoming and router
outgoing Internet Internal screening
traffic. Even if this routers can be set to
server is breached, only allow certain
because it is not types of Internet
located on the services (such as
internal network, e-mail and Web
the computers browsing) and to
on the internal reject all other
network are still requests.
secure.

Computer #2

Figure 12.24
A typical college network firewall layout.

Network Security for Client/Server Networks 595


twelve
twelve summary
chapter

1. What are the advantages of a 4. What components are needed to


business network? construct a client/server network?
A network enables employees to communi- Client/server networks have many of the
summary

cate with each other more easily, even over same components of peer-to-peer networks
large distances. Networks also enable as well as some components specific to
resources, such as printers, to be shared, client/server networks, including servers,
avoiding the cost of providing these a network topology, transmission media,
resources to individual employees. Software network operating system (NOS)
can be deployed from a network server, software, network adapters, and network
thereby reducing the costs of installation navigation devices.
on each user’s computer. Finally, networks
enable employees to share an Internet
connection, avoiding the cost of providing 5. What do the various types of servers
each employee with a dedicated Internet do?
connection. Dedicated servers are used on large net-
works to increase efficiency. Authentication
2. How does a client/server network servers control access to the network and
ensure that only authorized users can log
differ from a peer-to-peer network?
on. File servers provide storage and man-
A client/server network requires at least one agement of user files. Print servers manage
server to be attached to the network. The and control all printing jobs initiated on a
server coordinates functions such as file network. Application servers provide access
sharing and printing. In a peer-to-peer to application software (such as Microsoft
network, each node connected to the net- Office). Database servers store database files
work can communicate directly with every and provide access to users who need the
other node on the network. In a client/ information in the databases. E-mail servers
server network, a separate device (the control all incoming and outgoing e-mail
server) exercises control over the network. traffic. Communications servers are used to
Data flows more efficiently in client/server control the flow of information from the
networks than in peer-to-peer networks. In internal network to outside networks (such
addition, client/server networks have as the Internet). Web servers are used to host
increased scalability, meaning users can be a Web site.
added to the network easily.

3. What are the different classifications 6. What are the various network
of client/server networks? topologies (layouts), and why is
Local area networks (LANs) are small network topology important in
groups of computers (as few as two) and planning a network?
peripherals linked together over a small In a bus topology, all nodes are connected to
geographic area. A group of computers on a single linear cable. Ring topologies are
the floor of the office building where you made up of nodes arranged roughly in a
work is most likely a LAN. Wide area circle. The data flows from node to node in a
networks (WANs) comprise large numbers specific order. In a star topology, nodes are
of users (or of separate LANs) that are miles connected to a central communication
apart and linked together. Corporations device (a switch) and branch out like points
often use WANs to connect two or more of a star. A hybrid topology blends two or
branches (such as an office in California and more topologies in one network. Each
one in Ohio). Sometimes government organ- topology has its own advantages and
izations or civic groups establish WANs to disadvantages. Topology selection depends
link users in a specific geographic area (such on two main factors: (1) the network budget,
as within a city or county). These special and (2) the specific needs of network users
WANs are known as metropolitan area (such as speed or fair allocation of
networks (MANs). resources).

596 Chapter 12 Behind the Scenes: Networking and Security in the Business World
summary twelve twelve

chapter
7. What types of transmission media are Second, it breaks the data generated by
used in client/server networks? the computer into packets and packages
In addition to wireless media, three main them for transmission across the network

summary
cable types are used: twisted-pair cable, media. Last, it acts as a gatekeeper to
coaxial cable, and fiber-optic cable. Twisted- control the flow of data to and from the
pair cable consists of four pairs of wires computer.
twisted around each other to reduce
interference. Coaxial cable is the same type 10. What devices assist in moving data
of cable used by your cable TV company to
around a client/server network?
run a signal into your house. Fiber-optic
cable uses bundles of glass or plastic fiber to Switches are devices that read the addresses
send signals using light waves. It provides of data packets and retransmit a signal to its
the largest bandwidth but is expensive and destination instead of to every device con-
difficult to install. Wireless media uses radio nected to the switch. Bridges are devices
waves to send data between nodes on a used to send data between two different
network. segments (collision domains) of the same
network. Routers are used to route data
between two different networks (such as be-
8. What software needs to run on tween a corporate network and the Internet).
computers attached to a client/server
network, and how does this software
control network communications? 11. What measures are employed to keep
large networks secure?
Network operating system (NOS) software
needs to be installed on each computer and Access to most networks requires authenti-
server connected to a client/server network cation procedures (such as having users
to provide the services necessary for the enter a user ID and password) to ensure that
devices to communicate. The NOS provides only authorized users access the network.
a set of common rules (called a protocol) that The system administrator defines access
controls communication between devices on privileges for users so that they can access
the network. only specific files. Network equipment is
physically secured behind locked doors,
which are often protected by biometric au-
9. How do network adapters enable thentication devices. Biometric devices, such
computers to participate in a as fingerprint and palm readers, use unique
client/server network? physical characteristics of individuals for
Without a network adapter, a computer identification purposes. Firewalls are
could not communicate on a network. A employed to keep hackers from attacking
network adapter provides three critical networks through Internet connections.
functions. First, it takes low-power data Packet screeners review traffic going to and
signals generated by the computer and from the network to ascertain whether the
converts them into higher-powered signals communication was generated by a
that can traverse network media easily. legitimate user.

597
twelve
twelve key terms
chapter

802.11 standard (WiFi) ........................................ 581 network ................................................................. 564


access card reader ................................................ 592 network adapter .................................................. 584
access method ...................................................... 574 network administrator ....................................... 565
key terms

active topology..................................................... 575 network navigation device................................ 570


application server................................................ 572 network operating system (NOS) .................... 583
authentication ...................................................... 589 network topology ................................................ 569
authentication server .......................................... 570 packet .................................................................... 574
bandwidth ............................................................ 579 packet screening .................................................. 594
bastion host .......................................................... 594 passive topology.................................................. 574
biometric authentication device....................... 592 personal area network (PAN)............................ 567
bridge .................................................................... 587 possessed object .................................................. 589
brute force attack................................................. 589 print queue ........................................................... 571
bus (linear bus) topology................................... 573 print server ........................................................... 571
centralized ............................................................ 566 protocol ................................................................. 576
client ...................................................................... 565 proxy server .......................................................... 594
client/server network radio frequency identification tag
(server-based network)................................... 565 (RFID tag).......................................................... 590
coaxial cable ......................................................... 580 ring (loop) topology............................................ 574
communications server ...................................... 572 router ..................................................................... 587
CSMA/CD............................................................. 577 scalability.............................................................. 566
data collision ........................................................ 573 server ..................................................................... 569
data transfer rate.................................................. 574 shielded twisted-pair (STP) cable.................... 580
database server .................................................... 572 star topology......................................................... 576
decentralized........................................................ 566 switch .................................................................... 587
dedicated server................................................... 570 terminator ............................................................. 574
device driver......................................................... 585 token ...................................................................... 574
e-mail server......................................................... 572 token method ....................................................... 575
extranet.................................................................. 568 transmission media............................................. 579
fiber-optic cable................................................... 581 twisted-pair cable................................................ 580
file server .............................................................. 570 unshielded twisted-pair (UTP) cable .............. 580
frame...................................................................... 586 virtual private network (VPN).......................... 568
hybrid topology................................................... 578 Web server ............................................................ 572
intranet .................................................................. 568 wide area network (WAN)................................. 567
jam signal ............................................................. 577 wireless access point (WAP).............................. 585
local area network (LAN) .................................. 567 wireless media ..................................................... 581
media access control (MAC) address............... 586 wireless network interface card
metropolitan area network (MAN).................. 567 (wireless NIC) .................................................. 585

598 Chapter 12 Behind the Scenes: Networking and Security in the Business World
buzzwords twelve twelve

chapter
Word Bank
• application server • file server • scalable
• bastion host • LAN • star

buzzwords
• bridges • network administrator • switches
• bus • packet screener • twisted pair
• database server • packets • WAN
• fiber-optic • router • wireless access points

Instructions: Fill in the blanks using the words from the Word Bank above.

As a(n) (1) __________ Susan’s first task was to configure her college’s new network. Be-
cause the college had campuses in three different towns, she knew it would be necessary to
configure the network as a(n) (2) __________ . However, to handle all of the wireless devices
the students carried, (3) __________ would need to be installed throughout the buildings.
Software would need to be shared among 500 employees, so a robust (4) __________ would
be a necessity. Because the college was experiencing rapid growth, the network would have
to be highly (5) __________ , which would require the selection of a(n) (6) __________
topology instead of a(n) (7) __________ topology, which would only work for a very small
network.
The transfer of large files by the digital media department would mean that using
(8) __________ cabling would be an absolute necessity in the fine arts building, whereas (9)
__________ cabling would be sufficient for other areas of the campus. Because the college
had experienced hacking on its old network, Susan insisted that a(n) (10) __________ be
installed to bolster the network defenses further by filtering unauthorized transmissions of
data. Combined with a(n) (11) __________ installed as part of the perimeter network, she felt
they would be adequately protected from wily hackers.
(12) __________ would be necessary to shift data (13) __________ between collision domains
on the network. For transferring data from the network to the Internet, a(n) (14) __________
would need to be installed. If a star topology was to be used, many (15) __________ would
need to be deployed to handle all 500 network users.

becoming computer
literate
computer literate becoming
Ginormous State University is constructing a new building to house its Fine Arts and
Digital Media programs. The digital media students and faculty work primarily on the first
floor of the building at fixed workstations but need to transfer extremely large media files
among various workspaces. The rest of the Fine Arts faculty can teach on any of the three
floors in the building and need to access the network from wherever they may be teaching.
Students will also need connectivity to the campus network and the Internet from any
point in the building.

Instructions: Draft a memo (with supporting diagrams, if necessary) that details how to
deploy network connectivity in the 25 classrooms, 12 faculty offices, and the common
areas of the building. Justify the network topology you select, explain your choice of
transmission media, and indicate the device(s) needed to connect the computers to the
existing campus network.

599
twelve
twelve self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more prac-
tice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which of the following is not an ad- 6. Which type of network topology


vantage of installing a client/server favors equal access among nodes?
network in a college? a. Star c. Ring
a. Increased scalability b. Ethernet d. Bus
b. Decentralization of network 7. Fiber-optic cable most likely would
security protection be used in a corporate network
c. Sharing of files and data when
d. Sharing of peripherals a. cost is more important than speed.
2. Which is not a reason why client b. electrical or magnetic interference
server networks are usually installed is not present.
in large businesses? c. short cable runs are required.
a. Peripherals can’t be shared on d. speed is more important than
peer-to-peer networks. cost.
b. Dedicated servers make large 8. NOS software is
networks more efficient. a. needed on all computers in a
c. Client/server networks are more client/server networks.
scalable than peer-to-peer b. needed only on the servers in a
networks. client/server network.
d. Client/server networks feature c. needed only on client computers
centralized security. in a client/server network.
3. When networks are deployed at two d. needed only when configuring a
college campuses 30 miles apart, the network in a ring topology.
networks would be classified as a 9. On client server networks, switches
a. WAN. c. PAN. a. transfer data between two
b. MAN. d. LAN. networks.
4. Which of the following is not neces- b. route date between two collision
sary in every client/server network? domains on a single network.
a. Network adapters c. move data efficiently from node
b. Database server to node on the network.
c. Transmission media d. necessary only in networks using
d. NOS software the ring topology.
5. To provide for sharing of an Internet 10. Providing adequate security on a
connection, which server would a corporate network involves all of
corporate network include? these issues, except
a. Database a. authentication.
b. Authentication b. packet screening.
c. Communications c. deploying a bastion host.
d. Application d. installing NOS blocking software.

True–False
_____ 1. Bridges are used to route data between two or more network collision domains.
_____ 2. Two different types of network topologies can be deployed on the same network.
_____ 3. Twisted pair cable is never susceptible to magnetic interference.
_____ 4. Client/server networks are less scalable than peer-to-peer networks.
_____ 5. A communication server is used to control access on a client/server network.

600 Chapter 12 Behind the Scenes: Networking and Security in the Business World
making the
twelve twelve

chapter
transition to...
next semester

transition to...
1. A Truly Wireless Campus
Most schools have wireless networks now, but these are mainly for the convenience
of the students. School employees are often still tied down to desktop computers with
wired connections. The primary reason for this is cost as desktop computers are

next semester
making the
cheaper than notebooks (for the same amount of computing power), and computers
that stay in one place put don’t require as much maintenance and repair. Assuming
your school can afford to begin transitioning to providing all employees with notebook
computers (or other wireless computing devices), draft a plan that identifies the
following:
a. Which two departments should be converted to wireless first?
b. What benefits will the employees in these departments gain from wireless connec-
tivity?
c. How will wireless devices allow these employees to better serve or interact with the
students?
d. What guidelines should the school establish for use of the computers when they are
off campus?
e. What precautions should the school take to help recover the computers in the event
they are lost or stolen?

2. Faster Networking for the Multimedia Department


Currently, the multimedia department at your school provides twenty Mac desktop
computers in a wired Ethernet network for students to use to develop their multimedia
projects. The lab uses one switch to connect all the computers, and the cabling is Cat 6
cable. The students are complaining about data transfers taking a long time on the
network. In this chapter, we mentioned 10 Gigabit networks, which are used to provide
extremely fast wired throughput. Research 10 Gigabit network equipment. Write a
proposal to explain how to convert the Mac network to a 10 Gigabit network. Make
sure to fully explain what equipment and cabling will be required and how much each
component of the new network will cost.
3. Establishing a Business Network
You and three of your friends have a brilliant idea for a new line of clothing to be
marketed to college students. All four of you attend colleges in different states. You
want to set up a secure network for swapping your designs and other business ideas
while you develop the business. Ultimately, you might establish a manufacturing
facility/sales office in each town where you all currently go to college. Therefore, you
will eventually need networks in your businesses in four varied geographic locations.
Research ISPs that operate in multiple states and find one that you think can support
your business networking needs. Consider using VPNs for increased security. How
much will it cost you to establish connectivity in a secure environment for four point-
to-point connections so that you and your business partners can communicate in the
planning stages of your venture? When you establish the offices, how much will it
cost to connect four networks (in different states) with twenty nodes at each network?
What speed of data lines will you need to use between the offices?

601
twelve
twelve making the
chapter

transition to...
the workplace the workplace
1. Network Topology in the Workplace
You are interning at a small manufacturing company that is currently building a
new manufacturing facility. All of the main manufacturing machines are computer-
transition to...
making the

controlled and need to be connected to the client/server network in the administrative


offices. Equal access for nodes on the factory floor is not an issue as the machinery will
communicate infrequently with the network. The machinery generates a lot of electrical
interference and wireless signals do not travel well on the factory floor due to the
presence of metal beams. Consider the following:
a. What type of topology would you recommend for the factory network? Why?
b. What type of cabling would be appropriate to use in the factory portion of the
network? Why?
c. What type of navigation device(s) would be required to enable the factory network
to communicate with the administrative office network?

2. Transitioning to a Client/Server Network


The owner of the company for which you work announces that the company will be
hiring another 50 workers over the next six months. Currently, your peer-to-peer
network is adequately handling the needs of the 10 employees who now work at the
company. However, you know that adding 50 more employees to the network would
overload it.
a. Write a memo explaining why a switch to a client/server network would be appro-
priate. Be sure to explain which topology you think would be best to install.
b. In the memo, estimate the costs of constructing a 60-person client/server network,
including the costs of one server, cabling, desktop computers for the 50 new
employees, and switches. Use resources such as dell.com and hp.com to design
the network and price its components.

3. Authentication on a Client/Server Network


Authentication with logon ids and passwords is only secure if the logon ids are difficult
to deduce and the passwords are secure. The company you work for establishes all
logon ids as the first initial of the given name and the full surname of the employees
(i.e., John Smith would have the logon id jsmith). Passwords can be as few as four
letters or numbers and never have to be changed. You know from your coursework at
school that these are inadequate security procedures. Research password security on
the Internet and draft a memo for upper management that addresses the following:
a. Suggest a new scheme for creating logon ids that would be difficult for a hacker to
ascertain.
b. What length of passwords would you recommend? What combination of letters,
numbers, and other symbols should they include?
c. How often would you recommend that employees be required to change their
passwords? Would employees ever be allowed to repeat previous passwords?

602 Chapter 12 Behind the Scenes: Networking and Security in the Business World
critical thinking
twelve twelve

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.
1. Biomentric Access on Campus
Biometric security devices are still expensive. But there are usually parts of any
organization that need to be more secure than others, and you can often justify the cost
of these devices for certain areas. Consider the following organizations and prepare a
paper discussing in which areas of the business they could most benefit from installing
biometric security devices:
a. Financial institution (bank)
b. Public university that conducts scientific research
c. Pharmaceutical company
2. Monitoring Computer Usage in the Workplace
Software tools for monitoring computer usage are readily available on the Internet,
often for free (such as Best Free Keylogger). In most jurisdictions, it is legal for employ-
ers to install monitoring software on computer equipment they provide to employees.
It is usually illegal for employees to install monitoring software on computers owned
by their employers for purposes of monitoring computer usage of co-workers or
bosses. The Ethics in IT feature “Who’s Watching the Watchers” earlier in this chapter
described the story of a man who was fired for installing monitoring software on his
boss’s computer even though he proved the boss was goofing off most of the time. Do
you think this double standard is fair? What circumstances do you think would justify
an employee monitoring other employers or their boss’s computer usage? Whose
approval should be sought before employees embarked on computer usage monitor-
ing? Should whistleblowers have the right to conduct computer usage monitoring?
Please fully explain your answers.
3. Acceptable-Use Internet Policies
Most schools have drafted acceptable-use policies for computers and Internet access to
inform students and employees of the approved uses of college computing assets.
Consider these areas of a potential college policy:
a. Should employees be allowed to use their computers and Internet access for
personal tasks (such as checking non–college-related e-mail, accessing Facebook, or
playing games)? If so, how much time per day is reasonable for employees to spend
on personal tasks?
b. Should student computer and Internet usage be monitored to ensure compliance
with the personal use policies? Should the college inform students that they are
being monitored? What should the penalties be for violating these policies?
c. Many colleges block access to Web sites that enable students to participate in
potentially illegal activities such as downloading music, gambling, or viewing
pornography. Should colleges have the right to block students’ access to these Web
sites when they are on campus? Why or why not?
4. Wireless Network Layout
You are working for a local outlet of a national sandwich franchise (such as Subway).
Now that most customers have portable devices with wireless access, they have come to
expect connectivity while they eat. Management has asked you to survey customers to
determine their needs. Draft a survey for your boss that helps determine the following:
a. Should access be free? If access is not free, how much would customers pay?
b. What types of applications would the customers access while in the shop?
c. How important is WiFi access to their dining experience?
603
twelve
twelve team time
chapter

Wireless Coverage on Campus


team time

Problem
As wireless devices become more prevalent, increased demands for wireless access will be
placed on networks. Although many schools already deploy adequate wireless access, there
is room for improvement of coverage in some areas.

Task
As part of a task force studying proposed technology improvements at your school, you
and your classmates have been requested to investigate the efficiency of the wireless cover-
age at your school. Before presenting your findings to the task force, your group needs to
fine-tune its recommendations.

Process
Divide the class into small teams.
1. Explore the areas of your campus where students congregate to socialize or engage in
research. Determine if these areas are covered by wireless Internet access and the speed
(802.11g or 802.11n) at which connections are offered. This may require interviewing
your school’s network manager. You can also test the throughput with your notebook
computer. First, install free connection speed monitoring software such as Net Meter or
BitMeter 2 (both available at download.cnet.com). Next, test the upload and download
speeds for areas of your school covered by wireless technology (such as the library) by
connecting to the Internet in various locations. Make sure you connect in several differ-
ent parts of the campus as speeds many vary significantly from location to location.
2. Present your findings to your class. Lead a discussion with the other students and
solicit feedback as to their experiences with wireless connectivity on the campus. In
which areas of the campus do you feel wireless technology should be improved? Are
there parts of the campus that are not covered by wireless technology that you feel
should feature it? What other technologies should be deployed that would benefit
student learning?
3. Prepare a report for the task force that includes your suggestions for improvements
and upgrades to the wireless network on your campus. If possible, address options
for wireless connectivity when students are off campus for field trips, seminars, and
so on.

Conclusion
Being tied down to a wired computer terminal just doesn’t cut it in the 21st century.
Although wireless technology can be difficult and expensive to deploy in some instances
(such as in old campus buildings), today’s students will continue to demand the portable,
high-speed connections that they need to function effectively. Someday we’ll probably
wonder why we even bothered with wired connections at all!

604 Chapter 12 Behind the Scenes: Networking and Security in the Business World
ethics
twelve twelve

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play might or might not match your own personal beliefs; in either case, your
research and use of logic will enable you to represent the view assigned. An arbitrator
will watch and comment on both sides of the arguments, and together the team will agree
on an ethical solution.

Topic: Piggybacking on Wireless Networks


Piggybacking occurs when people use a wireless network without the permission of the
owner. Although piggybacking is illegal in many jurisdictions, it is often hard to detect.
Piggybacking often happens inadvertently when people trying to connect to their own
home network accidentally connect to their neighbor’s wireless network. With the prolifer-
ation of wireless networks, many businesses have set up networks for their customers.
However, because of the close proximity of many businesses to each other in areas such as
shopping centers, the potential for inadvertent (or intentional) piggybacking of wireless
networks exists. Also, sharing wireless connections between two entities (whether they be
two households or two businesses) may violate the terms of service of the Internet Service
Provider. And although wireless networks can be secured, it is often easier on the
customers to leave them completely open, which can encourage piggybacking.

Research Areas to Consider


• Detecting wireless piggybacking
• Piggybacking laws (legality of piggybacking)
• Securing wireless networks

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which the owner of a coffee shop
at a shopping center has accused the proprietor of the sandwich shop next door of encour-
aging the sandwich shop’s patrons to piggyback on the coffee shop’s wireless network.
2. Team members should write a summary that provides background information for
their character—for example: coffee shop owner, sandwich shop owner, and mall man-
ager (arbitrator)—and details their character’s behaviors to set the stage for the role-
playing event. Then, team members should create an outline to use during the
role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the collaboration feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an im-
portant skill.

605
chapter
thirteenthirteen
behind the scenes:
how the internet works

objectives
objectives

After reading this chapter, you should be able to answer the following questions:
1. Who owns, manages, and pays for the Internet? (p. 608)
2. How do the Internet’s networking components interact? (pp. 608–611)
3. What data transmissions and protocols does the Internet use? (pp. 611–613)
4. Why are IP addresses and domain names important for Internet communications?
(pp. 613–619)
5. What are FTP and Telnet, and how do you use them? (pp. 619–620)
6. What are HTML/XHTML and XML used for? (pp. 620–626)
7. How do e-mail, instant messaging, and Voice over Internet Protocol work, and how is
information using these technologies kept secure? (pp. 626–634)
8. How do businesses use the Internet to reduce computing costs? (pp. 634–635)

multimedia resources
multimedia
resources

Active Helpdesk
• Understanding IP Addresses, Domain Names, and Protocols (p. 615)
• Keeping E-Mail Secure (p. 628)

Sound Bytes
• Creating Web Pages with HTML (p. 622)

Companion Website
The Companion Website includes a variety of additional materials to help you review and learn
more about the topics in this chapter. Go to: pearsonhighered.com/techinaction
how cool

is this?
how cool is this? Do you have several
e-mail accounts that need checking, such as your school e-mail account, which has
directives from your instructor, and your personal e-mail account, which receives
messages from friends and family? Do you have accounts on
multiple social networking sites, such as Facebook and MySpace? Are half of your
friends using AOL Instant Messenger while the other half uses Yahoo! Instant
Messenger? Keeping up with your online social life can be challenging.
Digsby is a free tool that consolidates all of your online communications into a
single application. You just enter all the login information for your social networking,
e-mail, and IM accounts into the Digsby setup screen. Then, whenever you run
Digsby, it logs into all your accounts and checks for updates. You can easily
see all of your friends who are online, regardless of the IM service they use. You can
also easily view the status of your
Facebook page and
see all activity at a glance.
Clicking on any activity
shown, such as a new e-mail
received, takes you to a browser
window for the relevant application
so you can take appropriate action.
Digsby makes managing your
digital life a snap no matter how
many different applications you
need to use!

607
The Management Many of the functions handled by these
nonprofit groups were previously handled
of the Internet by U.S. government contractors because the
The Internet is the largest network that you Internet developed out of a defense project.
use. To keep a massive network like the However, because the Internet now serves
Internet functioning at peak efficiency, it the global community, not just the United
must be governed and regulated. However, States, assigning responsibilities to organiza-
no single entity is in charge of the Internet. tions with global membership is helping to
In addition, new uses are created every day speed the Internet’s internationalization.
by a variety of individuals and companies. Through close collaboration among the or-
Who owns the Internet? Even ganizations listed in Figure 13.1 (and a few
though the U.S. government funded the others such as the Internet Network Infor-
development of the technologies that mation Center and the Internet Research
spawned the Internet, no one really owns it. Task Force), the Internet’s vast collection of
The particular local networks that constitute users and networks is managed.
the Internet are all owned by different enti- Who pays for the Internet? You do!
ties, including individuals, universities, gov- The National Science Foundation (NSF),
ernment agencies, and private companies. which is a U.S. government–funded agency,
Government entities such as the National still pays for a large portion of the Internet’s
Science Foundation (NSF) and the National infrastructure and funds research and devel-
Aeronautics and Space Administration opment for new technologies. The primary
(NASA), as well as many large, privately source of NSF funding is your tax dollars.
held companies, own pieces of the commu- Originally, U.S. taxpayers footed the entire
nications infrastructure (the high-speed data bill for the Internet, but as the Internet grew
lines that transport data between networks) and organizations were formed to manage it,
that makes the Internet work. businesses, universities, and other countries
Does anyone manage the Internet? began paying for Internet infrastructure and
Because the individual networks that partic- development. And, of course, the fees you
ipate in the Internet are owned by several pay to your ISP for Internet access also con-
different entities, the Internet would cease to tribute to defraying the costs of the Internet.
function without some sort of organization.
Therefore, several nonprofit organizations
and user groups, each with a specialized
purpose, are responsible for its manage-
Internet Networking
ment. Figure 13.1 shows the major organiza- The Internet’s response to our requests for
tions that play a role in the governance and information seems almost magical at times.
development of the Internet. By simply entering a URL in your browser

Figure 13.1 MAJOR ORGANIZATIONS IN INTERNET GOVERNANCE AND DEVELOPMENT


Organization Purpose Web Address
Internet Society (ISOC) Professional membership society comprising more than 100 organizations and more isoc.org
than 28,000 individual members in more than 180 countries. Provides leadership for
the orderly growth and development of the Internet.

Internet Engineering A subgroup of ISOC made up of individuals and organizations that research new ietf.org
Task Force (IETF) technologies for the Internet that will improve its capabilities or keep the
infrastructure functioning smoothly.

Internet Architecture Board (IAB) Technical advisory group to the ISOC and a committee of the IETF. Provides direction iab.org
for the maintenance and development of the protocols that are used on the Internet.

Internet Corporation for Organization responsible for management of the Internet’s domain name system icann.org
Assigned Names and Numbers (DNS) and the allocation of IP addresses.
(ICANN)

World Wide Web Consortium of more than 330 member organizations that sets standards and w3.org
Consortium (W3C) develops protocols for the Web.

608 Chapter 13 Behind the Scenes: How the Internet Works


or going to a search engine and entering a
search topic, you can summon up informa-
tion that is stored on servers around the
world. However, there is no magic involved,
just a series of communication transactions
that enable the Internet to function as a
global network. In this section, we explore
the various networks that make up the
Internet, explain how to connect to them,
and examine the workings of Internet data
communications.

Connecting to the Internet


How are computers connected to the
Internet? A “network of networks,” the
Internet is similar to the highway system in
the United States. The top level of the high-
way system consists of interstate highways Figure 13.2
such as I-95, which runs up and down the When you connect to the
East Coast; I-80, which runs from the with OC-192 lines, AT&T has begun to use
Internet at home, work, or
Northeast to the West Coast; and I-5, which OC-768 connections in its Internet backbone school, you most likely
runs north and south along the West Coast. network. connect through interme-
These are the fastest and largest roadways. The bandwidth of the connections be- diate or local ISPs. Just
tween ISPs and end users depends on the as regional and local high-
Regional highways connect to the interstate ways connect to the inter-
highways, and local roads connect to the amount of data traffic required. Whereas
state highways, local and
regional highways. your home might connect to the Internet regional ISPs connect to
As shown in Figure 13.2, the main paths with DSL, cable, or even fiber-optic lines, the Internet backbone.
of the Internet, along which data travels the volume of Internet traffic at your college The 1s and 0s on the road
probably requires it to use at least T-3 lines here represent data flow
the fastest, are known collectively as the on the Internet.
Internet backbone. Analogous to the inter- or even an OC line to move data to the
state highway system, the Internet backbone school’s ISP. Large companies usually must
is a collection of large national and interna- connect to their ISPs using high-throughput
tional networks, most of which are owned OC lines.
by commercial, educational, or government How are the ISPs connected to
organizations (such as NASA). These back- each other? The points of connection
bone providers, which are required to between ISPs were once known as network
connect to other backbone providers, have access points (NAPs). Network access points
the fastest high-speed connections. At were designed to move large amounts of
the time this was written, the large U.S.
companies that provided backbone
connectivity included Verizon Business, SPEED AND CONFIGU-
Figure 13.3
AT&T, Sprint, and Qwest. RATION OF OC LINES
How do the ISPs that form the
Internet backbone communicate? OC-1 0.052 Gbps
Backbone ISPs initially connected with T OC-3 0.155 Gbps
lines. A T line carried digital data over
twisted-pair wires. T-1 lines, which were the OC-12 0.622 Gbps
first to be used, transmit data at a through- OC-24 1.244 Gbps
put rate of 1.544 Mbps. T-3 lines, which were
OC-48 2.488 Gbps
developed later, transmit data at 45 Mbps.
Today, a backbone is typically a high-speed OC-96 4.976 Gbps
fiber-optic line, designated as an optical
OC-192 9.953 Gbps
carrier (OC) line. OC lines come in a variety
of speeds, as shown in Figure 13.3. Although OC-768 39.813 Gbps
most large ISPs connect to the Internet

Internet Networking 609


Point of presence (POP)

High-speed
connection
Your teacher’s
home computer

Dial-up
connection Networking devices

Your ISP
High-speed
connection

Your neighbor’s
computer services and other computers, known as
servers, provide those services to the clients.
Your computer In the case of the Internet, the clients are
Figure 13.4 devices such as computers, netbooks, and
Home users connect to data quickly between networks. They smartphones that use browsers (or other
their ISPs through a single allowed the early Internet, which began as a interfaces) to request services such as Web
point of presence that can government-funded academic experiment, pages. Various types of servers from which
handle many simultaneous to grow into the modern Internet of many clients can request services are deployed
connections.
commercial companies working together— (installed) on the networks that make up
the Internet that we all know and use today. the Internet:
Now, private-sector companies make up the
Internet system, and the data-exchange • Web server: Computer that runs special-
mechanism is known as an Internet exchange ized operating systems, enabling it to
point (IXP). A typical IXP is made up of one host (provide Web space for) Web pages
or more network switches to which ISPs and other information and provide
connect. As you’ll recall from Chapter 7, requested Web pages to clients.
switches are devices that send data on a • Commerce server: Computer that hosts
specific route through a network. By con- software that enables users to purchase
necting directly to each other through IXPs, goods and services over the Web. These
networks can reduce their costs and servers generally use special security
improve the speed and efficiency with protocols to protect sensitive informa-
which data is exchanged. tion (such as credit card numbers) from
How do individuals connect to an being intercepted.
ISP? Whether they dial up through a con- • File server: Computer that is deployed
ventional modem or connect through high- to provide remote storage space or to act
speed access (such as cable or fiber), as a storehouse for files that users can
individual Internet users enter an ISP through download. Google Docs, Flickr, and
a point of presence (POP), which is a bank Delicious offer online storage services
of modems, servers, routers, and switches for productivity documents, pictures,
(shown in Figure 13.4) through which many and Web pages, respectively.
users can connect to an ISP simultaneously. Do all Internet connections
ISPs maintain multiple POPs throughout the take place in a client/server
geographic area they serve. mode? Certain services on the Internet
operate in a peer-to-peer (P2P) mode, as
depicted in Figure 13.5. For example,
The Network Model of the Internet BitTorrent (bittorrent.com) is a popular file-
What type of network model does sharing service through which Internet users
the Internet use? The majority of can exchange files. BitTorrent and other file-
Internet communications follows the sharing services require the user’s computer
client/server model of network communica- to act as both a client and a server. When
tions, which we defined in earlier chapters requesting files from another user, the com-
as one in which client computers request puter behaves like a client. It switches to

610 Chapter 13 Behind the Scenes: How the Internet Works


Tracker

Seeds Seeds Seeds Seeds Seeds Seeds Seeds Seeds

37% 100% 18% 65%


6 % 13% 100% 49% 33%
of file of file of file of file of file of file of file of file

Swarm

server mode when it Figure 13.5


provides a file stored on its File-sharing services in
system to another computer. The Your computer action.
following steps are illustrated in
Figure 13.5:
Data Transmission
1. Your computer, acting as a client, runs
the BitTorrent software (which you
and Protocols
downloaded from BitTorrent’s Web Just like any other network, the Internet
site). Using this software, you follows standard protocols to send informa-
request access to a particular file. tion between computers. A computer
Your computer transmits this request protocol is a set of rules for exchanging
to a BitTorrent tracking server electronic information. If the Internet is the
(tracker). information superhighway, then protocols
2. The BitTorrent tracker makes your are the rules of the road.
computer aware of other users running Why were Internet protocols
BitTorrent software who have pieces of developed? To accomplish the early
the file (called seeds). goals of the Internet, protocols needed to
be written and agreed upon by users. Each
3. Your computer determines that a group protocol had to be an open system, meaning
of users (called a swarm) has seeds for its design would be made public for access
the file you need. Acting as a client, by any interested party. This was in direct
your computer requests the file from opposition to the proprietary system
the computers in the swarm. (private system) model that was the norm
4. Computers in the swarm, acting as at the time.
servers, then transmit pieces of the file As we mentioned in earlier chapters,
to your computer. At the same time, the when common communication protocols
tracker might identify your computer (rules) are followed, networks can commu-
as having a file another computer needs nicate even if they have different topologies,
and assigns your computer to a swarm. transmission media, or operating systems.
Your computer would then act as a The idea of an open system protocol is that
server when delivering that file to the anyone can use it on his or her computer
computer that requested it. system and be able to communicate with

Data Transmission and Protocols 611


any other computer using the same protocol. one called a packet or a data packet) that are
The biggest Internet tasks—communicating, sent over various routes at the same time.
collaborating, creating content, seeking in- When the packets reach their destination,
formation, and shopping—are all executed they are reassembled by the receiving com-
the same way on any system that is follow- puter. This technology resulted from one of
ing accepted Internet protocols. the original goals of creating the Internet: If
Were there problems developing Internet nodes are disabled or destroyed
an open system Internet protocol? (such as through an act of warfare or terror-
Agreeing on common standards was ism), the data can travel an alternate route
relatively easy. The tough part was develop- to its destination.
ing a new method of communication What information does a packet
because the technology available in the contain? Packet contents vary, depend-
1960s—circuit switching—was inefficient ing on the protocol being followed. At a
for computer communication. Circuit minimum, all packets must contain (1) an
switching has been used since the early days address to which the packet is being sent;
of the telephone for establishing communi- (2) the address from where the packet origi-
cation. In circuit switching, a dedicated con- nates; (3) reassembling instructions, if the
nection is formed between two points (such original data was split between packets; and
as two people on tele- (4) the data that is being
phones), and the connec- transmitted.
tion remains active for the
duration of the transmis-
sion. This method of com-
“Packet switching is Sending a packet is
like sending a letter.
the communications Assume you are sending
methodology that
munication is extremely a large amount of infor-
important when communi- makes computer mation in written for-
cations must be received in mat from your home in
the order in which they are
communication Philadelphia to your
efficient.
sent (again, like telephone
conversations).
When applied to computers, however,
circuit switching is inefficient. Computers
” aunt in San Diego. The
information is too large
to fit in one small envelope, so you mail
three different envelopes to your aunt.
process communication in bursts. As a Each envelope includes your aunt’s address,
computer processor performs the operations a return address (your address), and the
necessary to complete a task, it transmits information being sent inside it. The pages
data in a group (or burst). The processor of the letters in each envelope are numbered
then begins working on its next task and so that your aunt will know in which order
ceases to communicate with output devices to read them.
or other networks until it is ready to trans- Each envelope may not find its way to
mit data in the next burst. Circuit switching San Diego by the same route. However, even
is inefficient for computers because the if the letters are routed through different
circuit either would have to remain open post offices, they will all eventually arrive
(and therefore unavailable to any other in your aunt’s mailbox. Your aunt will then
system) with long periods of inactivity reassemble the message (put the pages of
or would have to be reestablished for the letters in order) and read it. The process
each burst. of sending a message through the Internet
works in much the same way. This process
is illustrated in Figure 13.6, which traces an
e-mail message sent from a computer in
Packet Switching Philadelphia to a computer in San Diego.
If they can’t use circuit switching, Why do packets take different
what do computers use to communi- routes, and how do they decide
cate? Packet switching is the communi- which route to use? The routers that
cations methodology that makes computer connect ISPs with each other monitor traffic
communication efficient. Packet switching and decide on the most efficient route for
doesn’t require a dedicated communications packets to take to their destination. The
circuit to be maintained. With packet switch- router works in the same way as a police
ing, data is broken into smaller chunks (each officer does during a traffic jam. When

612 Chapter 13 Behind the Scenes: How the Internet Works


E-mail to your aunt
broken into packets
by your computer

Your ISP in PA
Packet 1
ISP in
MN

Packet 2

Your computer
in Philadelphia
Packet 3
ISP in
NC
ISP
in ISP in
E-mail to your aunt OR
reconstructed by NJ
her computer

Packet 1
ISP in
FL

Packet 2

ISP in
Your aunt’s Your aunt’s TX
ISP in CA Figure 13.6
computer Packet 3
in San Diego Each packet can follow
its own route to its final
routes are clogged with traffic, police offi- The IP is like a postal worker who takes a destination. Sequential
cers are deployed in areas of congestion, letter (a packet of information) that was numbering of packets
ensures they are
directing drivers to alternate routes to mailed (created by the sending computer) reassembled in the
their destinations. and sends it on to another post office correct order at their
(router), which in turn routes it to the destination.
addressee (the receiving computer). The
TCP/IP postal worker never knows whether the
recipient actually receives the letter. The only
What protocol does the Internet use thing the postal worker knows is that the
for transmitting data? Although many letter was handed off to an appropriate
protocols are available on the Internet, the post office that will assist in completing
main suite of protocols used is TCP/IP. The the delivery of the letter.
suite is named after the original two proto-
cols that were developed for the Internet:
the Transmission Control Protocol (TCP) IP Addresses and
and the Internet Protocol (IP). Although
most people think that the TCP/IP suite
Domain Names
consists of only two protocols, it actually Each computer, server, or device (such as a
comprises many interrelated protocols router) connected to the Internet is required
(covered later in this chapter), the most to have a unique identification number.
important of which are listed in Figure 13.7. However, because humans are better at
Which particular protocol actually remembering and working with words
sends the information? The Internet than with numbers, the numeric IP
Protocol (IP) is responsible for sending the addresses were given more “human,”
information from one computer to another. word-based addresses.

IP Addresses and Domain Names 613


Figure 13.7 TCP/IP PROTOCOL SUITE—MAIN PROTOCOLS The numeric zip code is the unique postal
identification for a specific geographic area.
Internet Protocol (IP) Sends data between computers on the Internet.
Zip codes are regulated by the U.S. Postal
Transmission control Prepares data for transmission and provides for error Service. Similarly, IP addresses must be reg-
protocol (TCP) checking and resending of lost data. istered with the Internet Corporation for
Assigned Names and Numbers (ICANN)
User datagram protocol (UDP) Prepares data for transmission; lacks resending
capabilities. to ensure they are unique and have not been
assigned to other users. The ICANN is
File transfer protocol (FTP) Enables files to be downloaded to a computer or responsible for allocating IP addresses to
uploaded to other computers. network administrators, just as the U.S.
Telnet Enables user to log in to a remote computer and work Postal Service is responsible for assigning
on it as if sitting in front of it. zip codes to geographic areas.
What does an IP address look
HyperText Transfer Protocol Transfers HyperText Markup Language (HTML) data like? A typical IP address is expressed as
(HTTP) and Secure HTTP from servers to browsers. S-HTTP is an encrypted
(S-HTTP) protocol for secure transmissions. follows:
197.169.73.63
Simple mail transfer protocol Used for transmission of e-mail messages across the
(SMTP) Internet. An IP address expressed this way is called
a dotted decimal number (also known as a
dotted quad). However, recall that comput-
ers work with binary numbers. The same IP
IP Addresses address in binary form is as follows:
11000101.10101001.01001001.00111111
What is an IP address? You will
recall from Chapter 3 that an IP address is Each of the 4 numbers in a dotted decimal
a unique identification number that number is referred to as an octet. This is
defines each computer, service, or other because each number would have 8 posi-
device that connects to the Internet. IP tions when shown in binary form. Because
addresses fulfill the same function as street 32 positions are available for IP address
addresses. For example, to send a letter to values (4 octets with 8 positions each), IP
Carlos Mendoza’s house in Walla Walla, addresses are considered 32-bit numbers. A
Washington, you have to know his position is filled either by a 1 or a 0, result-
address. Carlos might live at 123 Main ing in 256 (28) possible values for each octet.
Street, which is not a unique address Values start at 0 (not 1); therefore, each octet
(many towns have a Main Street); but can have a value from 0 to 255. The entire
123 Main Street, Walla Walla, WA 99362 32-bit address can represent 4,294,967,296
is unique. values (or 232), which are quite a few
Internet addresses!
Will we ever run out of IP
addresses? When the original IP
BITS addressing scheme, Internet Protocol
AND What’s Your IP Address? version 4 (IPv4), was created in the early
BYTES 1980s, no one foresaw the explosive growth
of the Internet in the 1990s. Four billion val-
Curious as to what your IP address is? Just go to a Web site such as What Is ues for an address field seemed like enough
My IP (whatismyip.com) or IP Chicken (ipchicken.com). Figure 13.8 displays to last forever. However, as the Internet
the output from What Is My IP, which shows the IP address your PC is currently grew, it quickly became apparent that we
using. were going to run out of IP addresses.
Because the unique IP addressing system
described earlier offers only a fixed number
of IP addresses, a different addressing
scheme known as classless interdomain
routing (CIDR), pronounced “cider,” was
developed. CIDR, or supernetting, allows a
Figure 13.8 single IP address to represent several unique
Some Web sites, such as WhatIsMyIP.com, determine your IP address IP addresses by adding a network prefix (a
for you. slash and a number) to the end of the last
octet. The network prefix identifies how many

614 Chapter 13 Behind the Scenes: How the Internet Works


of the possible 32 bits in a traditional IP ad-
dress are to be used as the unique identifier,
leaving the remaining bits to identify the
Day 1 Connecting to ISP
specific host. For example, in the IP address
206.13.01.48/25, “/25” is the network prefix.
It indicates that the first 25 bits are used as
the unique network identifier; the remaining
7 bits identify the specific host site.
Are there other Internet address-
ing systems? Internet Protocol version
6 (IPv6) is an IP addressing scheme devel-
oped by the Internet Engineering Task Force Connected,
(IETF) to make IP addresses longer, thereby Your computer your IP is ... Your ISP
192.168.1.2
providing more available IP addresses. IPv6
uses 8 groups of 16-bit numbers, referred to as
hexadecimal notation (hex for short), which
you learned about in the Technology in Focus
piece titled “Under the Hood.” An IPv6
address would have the following format:
0000:0000:0000:0000:0000:0000:0000:0000
Day 2 Connecting to ISP
Hex addressing provides a much larger
field size, which will enable a much larger
number of IP addresses (approximately 340
followed by 36 zeros). This should provide a
virtually unlimited supply of IP addresses
and will allow many different kinds of non-
PC devices such as cell phones and home
appliances to join the Internet more easily in
the future. Companies and government Connected,
your IP is ...
agencies are starting to replace their net- Your computer Your ISP
192.168.8.7
working equipment with equipment that
Figure 13.9
can handle the IPv6 protocol.
protocol suite. DHCP takes a pool of IP Dynamic IP addressing
How does my computer get an IP
changes your IP address
address? You learned in Chapter 7 that addresses and shares them with hosts on the every time you connect to
IP addresses are assigned either statically or network on an as-needed basis. ISPs don’t the Internet.
dynamically. Static addressing means that need to maintain a pool of IP addresses for
the IP address for a computer never changes all of their subscribers because not everyone
and is most likely assigned manually by a is logged on to the Internet at one time.
network administrator or ISP. Dynamic Thus, when a user logs on to an ISP’s server,
addressing, in which your computer is the DHCP server assigns that user an IP
assigned an address from an available address for the duration of the session.
pool of IP addresses, is more common. Similarly, when you log on to your com-
A connection to an ISP could use either puter at work in the morning, DHCP
method. If your ISP uses static addressing, assigns an IP address to your computer.
then you were assigned an IP address
when you applied for your service and ACTIVE
had to configure your computer manually
Understanding
HELP-
to use that address. More often, though, an DESK IP Addresses,
ISP assigns a computer a temporary Domain Names,
(dynamic) IP address, as shown in and Protocols
Figure 13.9. In this Active Helpdesk call, you’ll play the role of a
How exactly are dynamic helpdesk staffer, fielding calls about which data
addresses assigned? Dynamic transmissions and protocols the Internet uses, and
addressing is normally handled by the why IP addresses and domain names are important for
dynamic host configuration protocol Internet communications.
(DHCP), which belongs to the TCP/IP

IP Addresses and Domain Names 615


DIG Making the Connection—Connection-Oriented
DEEPER Versus Connectionless Protocols
The Internet Protocol is responsible only for sending packets on their TCP is a connection-oriented protocol, whereas UDP is a connectionless
way. The packets are created by either the TCP or the user datagram protocol.
protocol (UDP). You don’t decide whether to use TCP or UDP. The choice A connection-oriented protocol requires two computers to ex-
of protocol is made for you by the developers of the computer programs change control packets, thereby setting up the parameters of the data-
you are using or by the other protocols (such as those listed in exchange session, before sending packets that contain data. This process
Figure 13.7) that interact with your data packet. is referred to as handshaking. TCP uses a process called a three-way
As explained earlier, data transmission between computers is highly handshake to establish a connection, as shown in Figure 13.10a.
efficient if connections do not need to be established (as in circuit Perhaps you need to report sales figures to your home office. You phone
switching). However, there are benefits to maintaining a connection, the sales manager and tell him or her that you are ready to report your
such as reduced data loss. The difference between TCP and UDP is that figures. The sales manager then prepares to receive the information by

STEP 1:
“Hello, Shigeru. Are you ready
for the figures?”

STEP 2:
“Let me grab a pencil.
Okay, I'm all set.”

STEP 3: Home office,


Sales representative in Great. The estimated total Tokyo, Japan
Hamburg, Germany project cost is $4.3 million … ”

STEP 1:
I want to send e-mail.

STEP 2:
Okay, I'm ready to receive.

STEP 3:
Here's the e-mail
message for Aunt Sally.
Your computer Your ISP’s server

Figure 13.10
(a) Colleagues in Hamburg and Tokyo establish communication using a three-way handshake. (b) Here, two
computers establish communication the same way.

These temporary IP addresses may or may dynamic addressing provides a more secure
not be the same from session to session. environment by keeping hackers out of com-
What are the benefits of dynamic puter systems. Imagine how hard it would
addressing? Although having a static be for burglars to find your home if you
address would seem to be convenient, changed your address every day!

616 Chapter 13 Behind the Scenes: How the Internet Works


getting a pencil and a piece of paper. By confirming that he or she is ready A connectionless protocol does not require any type of connection
and by your beginning to report the figures, a three-way (three-step) hand- to be established or maintained between two computers that are
shaking process is completed. exchanging information. Just like a letter that is mailed, the data pack-
Your computer does the same thing when it sends an e-mail through ets are sent without notifying the receiving computer or receiving any
your ISP, as shown in Figure 13.10b. It establishes a connection to the ISP acknowledgment that the data was received. UDP is the Internet’s connec-
and announces it has e-mail to send. The ISP server responds that it is tionless protocol.
ready to receive the e-mail. Your computer then acknowledges the ready Besides establishing a connection, TCP provides for reliable data trans-
state of the server and begins to transmit the e-mail. fer. Reliable data transfer means that the application that uses TCP can
rely on this protocol to deliver all the data packets to
the receiver free from errors and in the correct
Sending computer Receiving computer order. TCP achieves reliable data transfer by using
acknowledgments and providing for the retransmis-
sion of data, as shown in Figure 13.11.
Assume that two systems, X and Y, have estab-
lished a connection. When Y receives a data packet
that it can read from X, it sends back a positive
acknowledgment (ACK). If X does not receive an
ACK in an appropriate period of time, it resends the
packet. If the packet is unreadable (damaged in
transit), then Y sends a negative acknowledgment
Packet 1 Packet 1 received (NAK) to X, indicating the packet was not received
and readable.
ACK sent. in understandable form. X then retransmits that
packet. Acknowledgments ensure that the receiver
ACK for packet 1 has received a complete set of data packets. If a
received. Need to send ACK 1
packet is unable to get through after being resent
next packet.
several times, the user is generally presented with
an error message indicating the communications
Packet 2 received were unsuccessful.
Packet 2 and unreadable. You may wonder why you wouldn’t always want
NAK sent.
to use a protocol that provides for reliable data
transfer. On the Internet, speed is often more impor-
NAK for packet 2 tant than accuracy. For certain applications (such as
received. Must resend NAK 2
packet 2. e-mail), it’s critically important that your message
be delivered completely and accurately. For stream-
Packet 2
resend
ing multimedia, it’s not always important to have
Packet 2 received every frame delivered accurately because most
and readable.
ACK sent. streaming media formats provide for correction of
errors caused by data loss. It is, however, extremely
ACK 2
lost in important for streaming media to be delivered at a
ACK for packet 2 transit high rate of speed. Otherwise, playback quality can
never received. Must be affected. Therefore, a protocol such as TCP,
resend packet 2.
which uses handshakes and acknowledgments,
would probably not be appropriate for transmitting a
Packet 2 already
movie trailer over the Internet whereas the Real-
Packet 2 received. Resend
resend ACK for packet 2. time Transport Protocol (RTP) would be better.

Figure 13.11
Packet acknowledgment in action.

Domain Names addresses and other numbers. However,


humans remember names better than they
I’ve been on the Internet, so why remember strings of numbers. (Would you
have I never seen IP addresses? rather call your friend 1476288 or Sanjay?)
Computers are fantastic at relating to IP When the Web was being formed, a naming

IP Addresses and Domain Names 617


system was necessary so people could work Who controls domain name regis-
with names instead of numbers. Hence, tration? ICANN assigns companies
domain names were born. or organizations to manage domain name
As you learned in Chapter 3, a domain registration. Because names can’t be
name is simply a name that takes the place duplicated within a top-level domain, one
of an IP address, making it easier for people company is assigned to oversee each TLD
to remember. You’ve most likely visited and maintain a listing of all registered do-
Yahoo! (yahoo.com). Yahoo.com is a domain mains. VeriSign is the current ICANN-
name. The server where Yahoo!’s main Web accredited domain name registrar for the
site is deployed has an IP address (such as .com and .net domains. VeriSign provides a
69.147.125.65), but it’s much easier for you database that lists all the registered .com and
to remember to tell your browser to go to .net domains and their contact information.
Yahoo.com than it is to recall the ten-digit IP However, for simplicity you can look up any
address. .com or .net domain at the Network
How are domains organized? Solutions Web site (networksolutions.com)
Domains are organized by level. As you’ll to see if it is registered and who owns it.
recall from Chapter 3, the portion of the Country-specific domains such as .nz for
domain name after the dot is the top-level New Zealand and .sg for Singapore are
domain (TLD). In the .com domain are controlled by groups in those countries.
popular sites such as Amazon You can find a complete list of country-
(amazon.com), Google (google.com), and code top-level domains on the Internet
Microsoft (microsoft.com). The TLDs are Assigned Numbers Authority Web site
standardized pools (such as .com and .org) (iana.org).
that have been established by ICANN.
(Refer back to Figure 3.23 in Chapter 3
for a list of the TLDs that are currently DNS Servers
approved and in use.) Within each top-level
domain are many second-level How does my computer know the IP
domains. A second-level domain needs to address of another computer? Say
be unique within its own top-level domain you want to get to Yahoo.com. To do so, you
but not necessarily unique to all top-level type the URL—“yahoo.com”—into your
domains. For example, Mycoolsite.com and browser’s address box. However, the URL is
Mycoolsite.org could be registered as not important to your computer; only the IP
separate domain names. address of the computer hosting the Yahoo!
site is. When you enter the URL in your
browser, your computer must convert the
URL to an IP address. To do this, your
computer consults a database that is
BITS maintained on a DNS (domain name
AND How to Register a Domain Name system) server that functions like a phone
BYTES book for the Internet.
Your ISP’s Web server has a default
Would you like to create a Web site with your own domain name—for example, DNS server (one that is convenient to
me.com? The process of creating your own Web site is straightforward, but finding a contact) that it goes to when it needs to
name that you like and that is available may be difficult. translate a URL to an IP address
The first thing you need to do is to create a list of domain names that are accept- (illustrated in Figure 13.12). It uses the
able to you. If you are creating the Web site for business purposes, then you might following steps:
want to keep search strategies in mind. With your list of acceptable domain names in
1. Your browser requests information
hand, go to Whois.net (whois.net) to determine if your preferred name has already
from ABC.com.
been taken. If the search results indicate that there is no match, then the name is
available. If the name is already taken, try making small variations to that name. 2. Your ISP doesn’t know the address of
After you find a name you like that’s available, find an official Internet registrar ABC.com, so it requests the address
(InterNIC has a link to the Accredited Registrar Directory). Registrars offer a variety of from its default DNS server.
services for a range of prices, so compare prices among the registrars that offer the 3. The default DNS server doesn’t know
services you want. Once you provide the registrar with their required information, the IP address of ABC.com either, so it
you’ve got yourself a Web domain ready for building your site. queries the root server of the .com
domain.

618 Chapter 13 Behind the Scenes: How the Internet Works


STEP 1: Request STEP 2: Request IP address STEP 3: Request IP address
from ABC.com. from DNS server. from root server.

Your computer Your ISP’s Your ISP’s default Root server for
Web server DNS server .com domain

STEP 6: Computer routes STEP 5: DNS server stores


STEP 4: Root server
request to correct IP address and passes
provides IP address.
IP address. it along.

Figure 13.12
4. The root server provides the default File Transfer Protocol DNS servers in action.
DNS server with the appropriate IP
address of ABC.com. How does FTP work? The file transfer
protocol (FTP) enables users to share files
5. The default DNS server stores the cor- that reside on local computers with remote
rect IP address for ABC.com for future computers. If you’re attempting to down-
reference and returns it to your ISP’s load files to your local computer using FTP,
Web server. the FTP client application (most likely a Web
6. Your computer then routes its request browser) first establishes a TCP session
to ABC.com and stores the IP address with the remote computer. FTP provides for
in cache for later use. authentication and password protection, so
you may be required to log in to an FTP site
Your ISP or network administrator de-
with a username and password.
fines the default DNS server. If the default
Can you upload files with
DNS server does not have an entry for the
FTP? Most FTP sites allow you to upload
domain name you requested, then it queries
files. To do so, you either need a browser
another DNS server.
that handles FTP transfers (current versions
If all else fails, your ISP’s Web server will
of Internet Explorer and Firefox do), or you
contact one of the 13 root DNS servers
need to obtain an FTP client application.
maintained throughout the Internet. Each
Many FTP client programs are available as
root DNS server knows the location of all
freeware or shareware. Searching on the
the DNS servers that contain the master
term “FTP” on Download.com (download.
listings for an entire top-level domain.
com) will produce a list of programs from
Your default DNS server receives the infor-
which to choose. FileZilla (filezilla-project.
mation from the master DNS server (say,
org) is an open source FTP program that is
for the .com domain). It then stores that
available free of charge.
information in its cache for future use and
communicates the appropriate IP address to
your computer. Telnet
What is Telnet? Telnet is both a protocol
Other Protocols: for connecting to a remote computer and a
TCP/IP service that runs on a remote com-
FTP and Telnet puter to make it accessible to other comput-
The TCP/IP protocol suite contains ers. At colleges, students sometimes use
numerous protocols, although some of Telnet to connect to mainframe computers
them are used infrequently. Two of the or servers from their personal computers.
more commonly used protocols on the The Telnet client application, which runs on
Internet are the file transfer protocol your personal computer, connects to the
and Telnet. Telnet server application, which runs on a

Other Protocols: FTP and Telnet 619


BITS a remote computer, type “open” and the host
AND What Is an Internet Cache? name (or IP address) of the remote computer
BYTES and follow the logon instructions. (These vary
from system to system.)
Your Internet cache is a section of your hard drive that stores information, such as IP
addresses and frequently accessed Web pages, that you may need again. However,
caching of domain name addresses also takes place in DNS servers. This helps speed HTTP, HTML, and
up Internet access time because a DNS server doesn’t have to query master DNS Other Web Jargon
servers for TLDs constantly. However, caches have limited storage space, so entries
Although most people think that the Inter-
are held in the cache only for a fixed period of time and then are deleted. The time
net and the Web are the same thing, the
component associated with cache retention is known as the time to live (TTL). With-
World Wide Web (WWW or the Web) is
out caches, surfing the Internet would take a lot longer.
actually a grouping of protocols and
Beware—you can’t always tell whether your browser is loading the current ver-
software that resides on the Internet. The
sion of a page from the Web or a copy from your Internet cache. If a Web site contains
Web provides an engaging interface for
time-sensitive information (such as a snow day alert on a college Web site), clicking
exchanging graphics, video, animations, and
the browser’s refresh button will ensure that the most current copy of the page loads
other multimedia over the Internet. One
into your browser.
other aspect that distinguishes the Web from
the Internet is the Web’s use of special lan-
guages such as HTML (HyperText Markup
Language) and protocols such as HTTP
remote computer. Telnet enables you to take (HyperText Transfer Protocol), which facilitate
control of a remote computer (the server) communication between computers using
with your computer (the client) and manip- different system and application software.
ulate files and data on the server as if the
server were your own computer.
How do you use Telnet? To establish
a Telnet session, you need to know the domain
HTTP and SSL
name or IP address of the computer to be Which Internet protocol does a
connected to using Telnet. In addition, logon browser use to send requests? The
information (ID and password) is generally HyperText Transfer Protocol (HTTP) was
required. With Windows, you also need to created especially for the transfer of hyper-
turn on the Telnet feature. To do so, click the text documents across the Internet.
Start button in the taskbar, select Control Hypertext documents are documents in
Panel, and then select Programs and Features. which text is linked to other documents or
In the Programs and Features group, select media (such as video clips, pictures, and so
the option to turn Windows features on or off. on). Clicking a specific piece of text (called a
In the list of features, click Telnet Client and hyperlink) that has been linked elsewhere
then click OK. After Telnet has been config- takes you to the linked file.
ured in Windows, click the Start button and When the browser sends a request,
enter “telnet” in the quick search box. You does it do anything to make the
should see the window shown in Figure 13.13. information secure? As you read in
Typing “?/” at the command prompt displays Chapter 3, some Web sites require extra
the available Telnet commands. To connect to layers of security to ensure that banking or

Figure 13.13
This Telnet command
window shows available
commands.

620 Chapter 13 Behind the Scenes: How the Internet Works


purchasing transactions can be done safely browser should cease applying italics to the
and without personal and financial informa- text. Note that multiple tags can be combined
tion being mishandled. Commerce servers in a single element such as the following:
use security protocols to protect sensitive <b><i>This should be bolded and
information from interception by hackers. italicized.</i></b>
HyperText Transfer Protocol Secure
The browser would display this element as
(HTTPS) is actually a combination of the
HTTP protocol and a network security proto- This should be bolded and
col (usually SSL or TLS). HTTPS ensures data italicized.
is sent securely over the Web. Transport layer Obviously, the <b> tag indicates bolding.
security (TLS) and the secure sockets layer Tags for creating hyperlinks appear as
(SSL) are two protocols that provide data in- follows:
tegrity and security for transmissions over the <a href=”http://www.
Internet. Online shopping sites frequently use pearsonhighered.com”>Pearson
HTTPS to safeguard credit card information. Higher Education</a>
Online banking sites and other Web sites that
The code <a href=”http://www.
require user authentication beyond just a sim-
pearsonhighered.com”> defines the
ple user ID and password also use HTTPS.
link’s destination. The <a> tag is the anchor
tag and creates a link to another resource on
HTML/XHTML the Web (denoted by the href attribute), such
as an HTML page, an image, or a sound. In
How are Web pages formatted? Web
this case, the link is to the pearsonhighered.
pages are text documents that are formatted
com Web page. The text between the open
using HTML or XHTML. Style sheets
and close of the anchor tag (Pearson Higher
(described in more detail later in this chapter)
Education) is the link label. The link label is
provide developers an easier way to update
the text (or image) that is displayed on the
and revise Web pages. Although XHTML is
Web page as clickable text for the hyperlink.
the development environment of choice for
Can you see the HTML/XHTML
Web developers today, many people still refer
coding of a Web page? HTML/
to Web site formatting as “HTML tagging.”
XHTML documents are merely text docu-
HTML and XHTML are not programming
ments with tags applied to them. If you want
languages; rather, they are sets of rules for
to look at the HTML/XHTML coding behind
marking up blocks of text so that a browser
your favorite Web page, just right-click any-
knows how to display them. Blocks of text in
where on the page, select View Source from
HTML/XHTML documents are surrounded
the shortcut menu, and the HTML/XHTML
by pairs of HTML tags (such as <b> and Figure 13.14
code for that page will be displayed, as
</b>, which indicate bolding). HTML tags Viewing the source code
shown in Figure 13.14. Alternatively, you
surround and define HTML content. Each of a Web site.
pair of tags and the text between
them are collectively referred to
as an element. The elements are
interpreted by the browser, and
appropriate effects are applied to
the text. The following is an ele-
ment from an HTML/XHTML
document:
<i>This should be
italicized.</i>
The browser would display
this element as:
This should be
italicized.
The first tag, <i>, tells the
browser that the text following it
should be italicized. The ending
</i> tag indicates that the

HTTP, HTML, and Other Web Jargon 621


describe the data contained within them.
SOUND Creating Web Pages Here’s how our data might look in XML:
BYTE with HTML <credit_card_number>
1234567890123456
Creating simple Web pages using Microsoft Word is rel- </credit_card_number>
atively easy. In this Sound Byte, you’ll learn the basics <price>12.95</price>
of Web page creation by setting up a Web site featuring
<zip_code>19422</zip_code>
a student résumé.
We have created the tags we need for data
capture. Our XML specification provides a
tag called “credit card number” that is used
can select View Source in Internet Explorer
exclusively for credit card data.
(or View Page Source in Firefox) from the
How has XML influenced other
browser menu. For more information on
Web page developments? XML has
how to build Web pages, see the Sound Byte
spawned quite a few custom packages for
“Creating Web Pages with HTML.”
specific communities. For example, Mathe-
matical Markup Language (MathML) is an
XML XML-based markup language that is used to
describe mathematical symbols and formu-
How is XML different from HTML/ las so that they can be presented in a famil-
XHTML? As you learned in Chapter 10, iar way in Web documents. Wireless
the eXtensible Markup Language (XML) Markup Language (WML) uses XML to
describes the content in terms of what data output Web resources on mobile devices;
is being described rather than how it is to be MusicXML is used to create and publish
displayed. Instead of being locked into musical scores online; and GraphML is an
standard tags and formats for data, users can XML-based format for creating graphs.
build their own markup languages to accom- These are just a few of the many examples
modate particular data formats and needs. that illustrate the goal of XML—information
For example, three pieces of typical infor- exchange standards that can be easily con-
mation that need to be captured for an structed and customized to serve a growing
e-commerce transaction are a credit card variety of online applications.
number, a price, and a zip code. In HTML/
XHTML, the paragraph tags (<p> and </p>)
are used to define text and numeric The Common Gateway Interface
elements. Almost any text or graphic can fall
Can you use HTML/XHTML to make a
between these tags and be treated as a para-
Web page interactive? Because
graph. Therefore, in our example, the HTML/
HTML/XHTML was originally designed
XHTML code would appear as follows:
to link text documents, HTML/XHTML
<p>1234567890123456</p> by itself can’t do all the amazing things we
(credit card number) expect modern Web pages to do. As we
<p>12.95</p> (price) mentioned earlier, HTML and XHTML are
<p>19422</p> (zip code) not programming languages; rather, they are
The browser will interpret the data con- sets of tags that determine how text is dis-
tained within the <p> and </p> tags as sep- played and where elements are placed. For-
arate paragraphs. However, the paragraph tunately, the limitations of HTML/XHTML
tags tell us nothing about the data contained were recognized early, and the common
within them. Without the labels (which are gateway interface (CGI) was developed.
not part of the HTML/XHTML code), we Most browser requests merely result in a
may not realize what data was contained file such as the eBay home page (eBay.com)
within. In addition, tags don’t provide any being displayed in your browser. Displaying
methodology for data validation. Credit card a file is fine if you’re just going to be reading
numbers are usually 16 numbers long, but text. However, to make a Web site interac-
any length of data may be inserted between tive, you may need to run a program to
<p> and </p> tags. How would we know if perform a certain action (such as gathering a
the credit card number was a valid length? name and address and adding them to a
The answer lies in creating tags that are database). The common gateway interface
specific to the task at hand and that actually (CGI) provides a methodology by which

622 Chapter 13 Behind the Scenes: How the Internet Works


your browser can request that a program file may call a script file (perhaps called
be executed (run) instead of just being deliv- “mailinglist.pl”) from the cgi-bin directory
ered to the browser. This enables functional- on the Web server hosting the site (step 2).
ity beyond the simple display of information. This file generates a form that is sent to your
CGI files can be created in almost any browser. The form includes fields for a name
programming language, and the programs and e-mail address and a button that says
created are often referred to as CGI scripts. “Submit” (step 3). After the user fills in the
Common languages that are used to create fields and clicks the Submit button, the
CGI scripts are Perl, C, and C++. Because pro- mailinglist.pl program sends the information
gramming languages are extremely power- back to the server. The server then records
ful, almost any task can be accomplished by the information in a database (step 4).
writing a CGI script. You have probably en-
countered CGI scripts on Web pages without
realizing it. Have you ever left an entry in a Dynamic HTML
guest book on a Web page? Have you used a
search engine to create a customized results Can Web pages be made more inter-
page based on keywords you entered? Have active without accessing Web
you filled out a form in which you asked to servers? Dynamic HTML (DHTML) is a
be added to a mailing list? All of these tasks combination of technologies—HTML/
are commonly done using CGI scripts. XHTML, cascading style sheets (explained
How are CGI programs executed? later in this chapter), and JavaScript—that is
On most Web servers, a directory called used to create lively and interactive Web
cgi-bin is created by the network adminis- sites. Recall that the Web is based on a
trator who configures the Web server. All client/server network. Once a Web server
CGI scripts are placed into this directory. processes a Web page and sends the page to
The Web server knows that all files in this the computer that requested it (the client),
directory are not just to be read and sent but the receiving computer cannot get any new
also need to be run. Because this type of data from the server unless a new request is
program runs on the Web server rather than made. If interactivity is required on a Web
inside your browser, it is referred to as a page, this exchange of data between the
server-side program. client and server can make the interactivity
For instance, a button on a Web site may inefficient and slow. DHTML technologies
say “Click Here to Join Mailing List” (see allow a Web page to change after it has been Figure 13.15
step 1 in Figure 13.15). Clicking the button loaded. Change generally occurs in response Information flow when a
CGI program is run.

STEP 1: You want to join XYZ’s mailing list. You click


a button on their Web site labeled “Click Here to Join
Mailing List.”

STEP 2: Clicking the button tells the XYZ.com


server to execute a CGI program (called mailinglist.pl)
located in the cgi-bin directory on the server.

STEP 3: The server executes the CGI program


mailinglist.pl, which generates a form that is sent
to your browser.

Your computer XYZ.com server

STEP 4: You enter your mailing list information and


click the “Submit” button on the mailing list form.
This sends your information back to the server.
The server saves your information into its database.

HTTP, HTML, and Other Web Jargon 623


to such user actions as clicking a mouse or declares an area as a header. Similarly, <p>
mousing over objects on a page. DHTML says, “This is a paragraph,” and <table>
brings special effects to otherwise static Web says, “This is a table.” In addition to tags
pages without requiring users to download defining certain areas as headers, para-
and install plug-ins or other special software. graphs, or tables, Web developers needed
AJAX is the acronym for a newer group additional tags to indicate how each header,
of technologies that facilitates the creation of paragraph, or table would be formatted and
Web applications. These technologies can displayed. Although this system worked for
update information on the page without re- a while, as more and more tags and attrib-
quiring the user to do a page refresh or leave utes were created it became increasingly dif-
the page. AJAX does not actually require the ficult to manage the differences between
use of JavaScript or XML (even though they content and presentation layout.
are in the name) but can use a variety of To solve this problem, cascading style
Web programming techniques and lan- sheets were created. A cascading style sheet
guages. JavaScript and XML are frequently (CSS) is a list of statements (also known as
used by AJAX Web developers. rules) that defines in one single location how
What is JavaScript? JavaScript is the to display HTML/XHTML elements. Style
most commonly used scripting language for rules enable a Web developer to define a
creating DHTML effects. It was developed style for each HTML/XHTML element and
through the joint efforts of Netscape and Sun apply it to multiple elements on as many
Microsystems, two software development Web pages as needed. Essentially, a template
companies. JavaScript is often confused with is created upon which the formatting for
the Java programming language because of many Web pages within a site will be based.
the similarity in their names. However, Thus, when a global change is neces-
though they share some common sary, the developer only needs to
elements, the two languages change the style on the style sheet
function quite differently. (template); all the elements in the
Pure HTML/XHTML Web document are then up-
; }
san
s-s
eri
f;
”);
3px gif
: 1 na, rm.
documents don’t re- T FOR
M */
f ont
- s ize
dated automatically (see
i a l,
v e rda
E 6 E5; s/sh
t
a d efo

TAC on
{ ar #E7 ”pic
CON butt 3px
spond to user input. /*
•su
bmi
t
ONT
{ F grou
: 1 -col
nd Figure 13.16).
or: url(
age
-im ft;
:
}
f orm back und l e id;
With JavaScript, though,
o
•sh
ad e
kg
bac -ali
t
tex H: 2
r
gn: ;
For example, a Web
X
00P 000
0
1px
sol

T #00
WID ER:
HTML/XHTML docu- BOR
D
page has an <H1> head- , ,s
asnasn-sse-
fr
rsie
; if
;

;f”
”g)i
);
annaa .rgimf.
rdda
ments can be made respon- ing tag, and all <H1>
1x3 p xarai
i
ra a
l
r
lro:
l,, v
: #
veer

#EE77E
E66E

(”
E5
p
”p
;;
5
ii
s/
cctt ss/
hsada
h efdoe
rfmo

T:3p urrll(
F:ON 1 -cloo

sive to mouse clicks and xta


•rteea
r{eaF tags in the Web page are
kbgr
ndo
O{NT kugrnodu-c -iamgaeg:
aco
rodu-
bac bgarcokugn i:gnl
nidm
: elf
e: u

etf;t;

e xt a k ln }}

typing. For example, formatted with a white


t c - a
g X ;
• ba exli
t P
5X0; iidd;;
tt-a : 02P X; ssool
tex WHI:DT2H5 51P3X5P; 01p 1pxx
T T:3 00
WID HHETI:GH1 0#0000000

JavaScript is often used to background and an or-


G R :
0
HEI BEORR:DE#
D
BOR }
ri f;

validate the information you ange border. Before CSS,


OR:
000
#00 ;
PX
0;
7E6
: E rdana
E5;
, s
ans
-se

COL : 200 color ve


input in a Web form (for if you wanted to change
{ T H d - l ,
own WID groun ria
opd k x a
•dr bac : 12p
T
FON
example, to make sure you the border color from
filled in all required fields). orange to yellow, you had
When JavaScript code to change the back-
Figure 13.16
is embedded in an ground color of every
Cascading style sheets allow for the creation
HTML/XHMTL docu- <H1> tag. With CSS, the
of formatting templates. Just as all the pages
ment, it is downloaded of this book have a similar look and feel, one change from orange to
to the browser with the style sheet can control the formatting of many yellow only needs to
HTML/XHTML page. Web pages. happen once on the style
All actions dictated by sheet; all the <H1> tags
the embedded JavaScript commands are exe- on the Web pages then update to yellow
cuted on the client computer (the one with the without individual changes.
browser). Without JavaScript and other script- Where does the cascading come
ing languages, Web pages would be lifeless. in? In Web documents, there are different
How can you easily change the layers of styles: external, embedded, and
formatting of HTML/XHTML inline. Therefore, it’s possible that different
elements? In addition to the HTML/ rules can be created for the same type of
XHTML formatting tags described earlier, element. In other words, in an external style
some tags describe areas of a Web page. This sheet, there might be a rule that defines the
helps with layout. For example, the tag <h1> background color for all paragraphs as blue.

624 Chapter 13 Behind the Scenes: How the Internet Works


Somewhere else, in an embedded style sheet, efficient to run programs on your computer
a rule for background color for paragraphs (the client). Therefore, client-side programs
might be white; and in an inline style sheet, were created. A client-side program is a
the background color might be light pink. computer program that runs on the client
Eventually, all these style sheets must be computer and requires no interaction with a
merged to form one style sheet for the docu- Web server. Client-side programs are fast
ment. This creates conflicts among rules. and efficient because they run on your desk-
Therefore, rules are assigned weights so that top and don’t depend on data going back
when the rules are collected and merged, the and forth to the Web server. Two main types
rule or style with a higher weight overrides of client-side methods exist. The first in-
the rule or style with a lower weight. This volves embedding programming language
hierarchy of competing styles creates a code directly within the HTML or XHTML
“cascade” of styles ranked according to code of a Web page using an HTML/
their assigned weights. XHTML embedded scripting language.
How are the individual components The most popular embedded language is
of a Web page organized? Just as cas- JavaScript, which is used extensively in
cading style sheets organize and combine the dynamic HTML files.
attributes of objects on a Web page, DHTML The second type of client-side program is
uses the document object model (DOM) to an applet, a small application that resides on
organize the objects and page elements. The a server. When requested, a compiled ver-
document object model defines every item sion of the program is downloaded to the
on a Web page—including graphics, tables, client computer and run there. The Java lan-
and headers—as an object. Then with DOM, guage is the most common language used to
similar to CSS, Web developers can easily create applets for use in browsers. The ap-
change the look and feel of these objects. plets can be requested from the server when
a Web page is loaded; they will run once
they’re downloaded to the client computer.
Client-Side Applications Although the user can experience some
delay in functionality while waiting for the
Aside from CGI scripts, are there
Java applet to download to the client, once the
other ways to make a Web site inter-
applet arrives, it can execute all its functions
active? Sometimes running programs on
without further communication with the
the server is not optimal. Server-side pro-
server. Games are often sent to your browser
gram execution can require many communi-
as applets. As an example, in Figure 13.17 Figure 13.17
cation sessions between the client and the
your browser makes contact with a game Deployment of a Java
server to achieve the goal. Often it is more
applet on a computer.

STEP 1: Request from browser for game.

STEP 2: Java applet code sent to your computer.

Your computer ArcadePod.com server

Computer executes Java applet


code and game displays.

HTTP, HTML, and Other Web Jargon 625


ETHICS
IN IT Web Browsing—Not as Private as You May Think

Keeping track of where you have been on the Internet can be quite a hacker places where you have financial resources (such as banks) and
challenge. Think about how many Web sites you visited today or when help direct them to Web sites where they can attempt to access your ac-
you were researching that paper for your history class last week. Can counts. Many people would feel that their privacy was severely violated if
you remember all the sites you visited? Probably not—most of us don’t their entire Web browsing history were seen by a stranger even if that
have total recall. person didn’t use that information in a malicious way.
Fortunately, tools built into browser software help us remember the So where does convenience stop and privacy start? This is one of the
sites we visit. For example, in Internet Explorer and Firefox, the history thorny ethical dilemmas that we face in today’s wired world. Having a
feature tracks all the sites visited over a period of time using the same browser history is extremely convenient when you can’t remember the
browser on the same computer. If you have a Google account and use name of a cool site you visited last week. But having a list of all the sites
the Google Toolbar (an add-on for the Internet Explorer and Firefox you visited could be downright embarrassing if your boss looked through
browsers), the Google Web History feature tracks your entire browsing them and found out you were surfing the “jobs available” section of a
history regardless of what computer you may be using (as long as you competitor’s Web site. Do you really want the next person to use the
are logged into your Google account and use the toolbar). But how computer in the lab at school to know what you were shopping for on the
private is your browsing history? Internet?
Most individuals in our society value privacy, which simply stated is Although users can erase browser histories and Google Web History,
the right to be left alone and unobserved to do as you please. But having this is not automatic and requires user intervention. The current ver-
your browsing habits recorded by the software you are using is tanta- sions of the popular browsers contain features called InPrivate Brows-
mount to having someone looking over your shoulder and watching ing (Internet Explorer) and Private Browsing (Firefox) that allow you to
exactly what you are doing. Did you browse to a site today that you surf the Web without the browser retaining your history. But again, you
wouldn’t want your parents, teacher, or boss to know about? If you must invoke these features to take advantage of them. Are you going to
haven’t cleared the history file in your browser, anyone could easily call remember to do so every time you need to keep your browsing private?
up the history in your browser and find out (see Figure 13.18)! Fortunately, Firefox allows you to make Private Browsing the default for
Google Web History is even more of a conundrum. Your entire brows- all your browsing sessions.
ing history is potentially contained in your Google file for all computers Should the makers of browser software and add-on tools be required
that you use (at home, school, and work). If you are browsing the Web at to remind users periodically to purge their browsing history? Should the
the local coffee shop and have not taken measures to secure your data surfing tools that enhance privacy be automatically invoked by default so
transmissions on your notebook, any hacker could potentially intercept people won’t forget to use them? Where does convenience end and
and gain access to your entire browsing history. This could reveal to a privacy begin? What do you think?

Figure 13.18
Nothing embarrassing in this Firefox Web history. But what’s lurking in your browser’s history?

on the game site ArcadePod.com Communications


(arcadepod.com) and makes your request to
play a game (step 1). The Web server returns over the Internet
the Java applet (step 2) that contains all the A new communications revolution was
code to run the game on your computer. started when Internet use began to explode
Your computer executes the applet code, in the mid-1990s. The volume of Internet
and the game runs on your computer. e-mail is growing exponentially every month.

626 Chapter 13 Behind the Scenes: How the Internet Works


Unfortunately, it is estimated that 97 per- BITS
cent of it is spam. Instant messaging is a AND
Are Old Web Pages Really
major method of communication, and the BYTES Gone Forever?
popularity of Voice over Internet Protocol is
also on the rise. In the following sections, Have you ever tried to find a site you’ve visited on the Web only to find it no longer ex-
we explore all of these communications ists? Have you ever discovered that information you wanted to access has been re-
media in more detail and show you how to moved from a site? Is the information lost forever? Groups such as the Internet
keep your information exchanges efficient Archive (archive.org) are trying to prevent the loss of information on the Internet as a
and secure. result of Web site updates or the discontinuance of a site. Since 1996, the Internet
Archive has been collecting information from the Web and preserving it. Visit the In-
ternet Archive site and use the “Wayback Machine” to visit archived versions of Web
sites from times past. Want to see how Yahoo! has changed since 1996? Just type the
E-Mail URL into the Wayback Machine engine and you’ll see links to snapshots of Yahoo! at
Who invented e-mail? In 1971, Ray various points in time. So next time you try to access a site that is no longer there,
Tomlinson, a computer engineer who check the Wayback Machine—all may not be lost.
worked on the development of the ARPANET
(the precursor to the Internet) for the U.S.
government, created e-mail. E-mail grew
from a simple program that Tomlinson
wrote to enable computer users to leave text servers—specialized computers whose sole
messages for each other on a single machine. function is to store, process, and send e-mail.
The logical extension of this was sending Where are e-mail servers
text messages between machines on the located? If your ISP provides you with
Internet. Tomlinson created the convention an e-mail account, it runs an e-mail server
of using the @ sign to distinguish between that uses SMTP. For example, as shown in
the mailbox name and the destination Figure 13.19, say you are sending an e-mail
computer. E-mail became the most popular message to your friend Cheyenne. Cheyenne
application on ARPANET; by 1973, it uses Verizon.net as her ISP. Therefore,
accounted for 75 percent of all data traffic. your e-mail to her is addressed to
How does e-mail travel the [email protected].
Internet? Just like other kinds of data When you send the e-mail message,
that flow along the Internet, e-mail has its your ISP’s Web e-mail server receives it.
own protocol. The simple mail transfer The e-mail server reads the domain name
protocol (SMTP) is responsible for sending (verizon.net) and communicates with a
e-mail along the Internet to its destination. DNS server to determine the location of
As in most other Internet applications, juno.com. Once the address is located, the
e-mail is a client/server application. To send e-mail message is forwarded to verizon.net
an e-mail message, you will need some form through the Internet and arrives at a mail
of e-mail software to compose the document server maintained by Cheyenne’s ISP. The
as well as to include an attachment such as a e-mail is then stored on Cheyenne’s ISP’s
spreadsheet or photograph. Popular client- e-mail server. The next time Cheyenne logs
based e-mail software (software that needs on to her ISP and checks her mail, she will
to be installed on your computer) includes receive your message.
Microsoft Outlook and Mozilla Thunder- If e-mail was designed for text
bird, as well as Web-based e-mail software messages, why are we able to send
such as the increasingly popular Yahoo!, files as attachments? SMTP was
Hotmail, and Gmail. designed to handle text messages. When the
As you read in Chapter 3, client-based need arose to send files by e-mail (in the
software is installed on your computer, and early 1970s), a program had to be created to
all of its functions are supported and run convert binary files to text. The text that
from your computer. Web-based software is represented the file was appended to the end
launched from a Web site; the programs and of the e-mail message. When the e-mail ar-
features are stored on the Web and are acces- rived at its destination, the recipient had to
sible anywhere you have access to an Internet run another program to translate the text
connection. No matter which type of client back into a binary file. Uuencode and uude-
software you use, on the way to its destina- code were the two most popular programs
tion your mail will pass through e-mail used for encoding and decoding binary files.

Communications over the Internet 627


STEP 1: You send STEP 2: Your ISP’s
an e-mail message to e-mail server consults
your friend Cheyenne. the DNS server for
Cheyenne’s domain
address.
Your computer
Your ISP’s DNS server
e-mail serverr
(SMTP) STEP 3: The DNS server
provides the domain IP address.

STEP 4: The e-mail server


forwards your e-mail through
the Internet to Cheyenne’s ISP’s
Web server.

Cheyenne’s ISP’s
e-mail server STEP 5: The next
(SMTP) time Cheyenne
checks her e-mail, unintended parties because
she gets your e-mail.
it’s sent in plain text. Addition-
ally, copies of your e-mail mes-
Cheyenne’s
computer
sages may exist (temporarily or
permanently) on numerous
This was fine in the early days of the servers as the messages make their way
Internet when most users were computer through the Internet. To protect your sensi-
scientists. However, when the Internet tive e-mail messages, encryption practices
started to become popular (in the early are used.
Figure 13.19
1990s), it became apparent that a simpler How do you encrypt e-mail?
A sample route an e-mail methodology was needed for sending and Encryption refers to the process of coding
takes on the Internet.
receiving files. The multipurpose Internet your e-mail so that only the person with
mail extensions (MIME) specification was the key to the code (the intended recipient)
introduced in 1991 to simplify attachments can decode (or decipher) and read the
to e-mail messages. All e-mail client soft- message. Secret codes for messages can
ware now uses this protocol to attach files. be traced almost to the dawn of written
E-mail is still sent as text, but the e-mail language. The military and government
client using the MIME protocol now han- espionage agencies are big users of codes
dles the encoding and decoding for the and ciphers. The trick is making the coding
users. For instance, in Yahoo! mail, on the system easy enough to use that everyone
Attach Files screen you merely browse to who needs to communicate with you can
the file you want to attach (located some- do so.
where on a storage device), select the file, There are two basic types of encryption:
and click the Attach Files button. The private key and public key. In private-key
Yahoo! e-mail client transparently encodes encryption, only the two parties involved in
and decodes the file for transmission
and receipt.
ACTIVE Keeping E-Mail
HELP- Secure
E-Mail Security: Encryption and DESK
Specialized Software
In this Active Helpdesk call, you’ll play the role of a
If e-mail is sent in regular text, can helpdesk staffer, fielding calls about how e-mail works
other people read my mail? E-mail and how messages are kept secure.
is highly susceptible to being read by

628 Chapter 13 Behind the Scenes: How the Internet Works


sending the message have the code. This provide a private key for you and a public
could be a simple shift code where letters of key for the rest of the world.
the alphabet are shifted to a new position What does a key look like? A key
(see Figure 13.20). For example, in a two- is a binary number. Keys vary in length,
position right-shift code, the letter a depending on how secure they need to be.
becomes c, b becomes d, and so on. Alterna- A 10-bit key has 10 positions and might look
tively, it could be a like this:
more complex sub-
1001101011
stitution code (a = h, A=C N=P
b = r, c = g, etc.). The B=D O=Q Longer keys are
main problem with C = E P = R more secure be-
D=F Q=S The word C O M P U T E R
private-key encryp- using the two-position code cause they have
E=G R=T
tion is key security. F=H S=U
at the left now becomes: more values that are
If someone steals a G=I T=V possible. A 10-bit
copy of the code or H=J U=W EQORWVGT key provides 1,024
is savvy about de- I = K V = X different possible
J=L W=Y This is difficult to interpret
coding, the code is without the code key at the left. values, whereas a
K=M X=Z
broken. L=N Y=A
40-bit key allows
In public-key M=O Z=B for 1,099,511,627,776
encryption, two possible values. The
keys, known as a key and the mes-
key pair, are cre- Figure 13.20 sage are run
ated. You use one through a complex
Writing the word “COMPUTER” using a two-position right-
key for coding and shift encryption code. algorithm in the
the other for decod- encryption program
ing. The key for (such as PGP) that
coding is generally distributed as a public converts the message into unrecognizable
key. You can place this key on your Web code. Each key turns the message into a
site, for instance. Anyone wishing to send different code.
you a message can then download your
public key and code the message using
your public key.
When you receive the message, you use BITS
your private key to decode it. You are the AND
Random Numbers: The Lifeblood
only one who ever possesses the private key, BYTES of Encryption
and therefore it is highly secure. The keys
are generated in such a way that they can E-mail encryption, SSL encryption, and just about anything we do to achieve privacy
work only with each other. The private key on the Internet requires random numbers. Encryption is accomplished using random
is generated first. The public key is then number sequences, which are sequences of numbers in which no patterns can be rec-
generated using a complex mathematical ognized. Even for an e-commerce transaction (say, buying a book from Amazon.com)
formula, often using values from the private that uses SSL encryption to encode your credit card number, as many as 368 bits of
key. The computations are so complex that random data might be needed. Only 128 bits are needed for the encryption key, but
they are considered unbreakable. Both keys other random data is needed to create authentication codes and to prevent replay at-
are necessary to decode a message. If one tacks. Replay attacks occur when hackers attempt to copy packets traveling across
key is lost, the other key cannot be used by the Internet and extract data (such as encryption codes) from them. The hackers then
itself. can replay (reuse) the data to gain access to networks or transactions.
What type of encryption is used on So where do all these random numbers come from? Generating true random
the Internet? Public-key encryption is sequences is more difficult than it sounds. However, in 1996, Landon Noll and two
the most commonly used encryption on the colleagues came up with a system called LavaRnd that used Lava Lite lamps
Internet. Tried-and-true public-key packages (lavalamp.com) to generate random numbers. The lamps have since been replaced
such as Pretty Good Privacy (PGP) are with another random source: a webcam with the lens cap still on. The webcam emits
available for download at sites such as “thermal noise,” which is then digitized and run through a mathematical algorithm
Download.com (download.com), and that generates the number set and strips out any sections that are predictable. This
you can usually use them free of charge service is open source, unpatented, and license free, so anyone can set up a server
(although there are now commercial and generate much-needed random numbers. For more information, check out the
versions of PGP). After obtaining the PGP LavaRnd site (lavarnd.org).
software, you can generate key pairs to

Communications over the Internet 629


TRENDS
IN IT
Emerging Technologies—The Evolving Internet

The Internet and the ways we use it are constantly evolving. In the Many businesses harness the power of their customers (and poten-
1990s, most home users connected to the Internet with a dial-up tial customers) by using the Internet to take advantage of a new tech-
modem. Fiber-optic technology, once available only for corporate and nique known as crowdsourcing. When you crowdsource, you take a
urban America, today reaches many homes in suburban and rural areas task that an employee or a contractor usually performs and instead out-
and provides lightning-fast Internet connections. But this wired technol- source that task to a large group of people, usually via the Internet. In
ogy does not address the growing demand for wireless connectivity that this way, you can have many individuals work on a task to take advan-
is accessible everywhere. Web 2.0 tools—such as social networking tage of aggregated brainpower. Or you can aggregate and analyze the
sites like Facebook and MySpace, blogs, wikis, and video sharing results of feedback from the crowdsourcers to make informed business
sites like YouTube—are changing the way individuals and businesses decisions. Two companies that exemplify the crowdsourcing model of
use the Internet. Let’s look at a few emerging trends in both of these customer-driven merchandise buying are Threadless.com and
areas. ModCloth.com.
Threadless is a T-shirt company, but what makes Threadless stand
WiMAX—Spreading the Signal Far and Wide out from the hundreds of other T-shirt companies on the Web is that they
Because of the rise in portable computing devices, people want Internet invite artists and designers to submit designs for T-shirts as part of an
access wherever they go. A wireless alternative to standard WiFi connec- ongoing contest. Threadless posts submitted designs on the site and
tions is WiMAX (short for worldwide interoperability for microwave ac- then lets anyone who visits the site vote on the best designs. The
cess). Instead of the 300 feet of connectivity that WiFi offers, WiMAX has a designs with the most votes get made into shirts and offered for
range of as far as 31 miles, and its transmission speed can run up to 72 sale (see Figure 13.21), and the designers of shirts that get printed win a
Mbps, making it much faster than current cable or DSL connections. The
WiMAX Forum, a nonprofit group consisting mainly of WiMAX providers
and component suppliers, reports there are more than
550 WiMAX networks deployed in 147 countries, and now
providers such as Clear are deploying WiMAX networks in
large cities throughout the United States. Clear offers mo-
bile access over a large area, freeing you from needing to
find a hot spot to connect. Your next provider of Internet
services may well be a company that offers WiMAX wire-
less connectivity.

Crowdsourcing—Harnessing the Power of Social


Networks
Starting and running a small business involves a fair
amount of risk, especially when running a merchandising
business. Deciding what products to buy and resell to
customers is tricky. Will your customers purchase the
products you think are so wonderful? Will they buy them
quickly enough so that you can free up your cash to pur-
chase more inventory? What quantities should you
stock? If you’re an entrepreneur, you usually have to Figure 13.21
make these decisions yourself. Wouldn’t it be better to let Threadless shirts such as A Simple Plan (based on the classic game Space In-
your customers tell you what to sell? vaders) were voted on by customers before being offered for sale (crowdsourcing).

Is a private key really secure? be totally resistant to brute force attacks


Because of the complexity of the algorithms and were the norm for encryption. How-
used to generate key pairs, it is impossible ever, in 1995, a French programmer used a
to deduce the private key from the public unique algorithm of his own and 120 work-
key. However, that doesn’t mean your coded stations simultaneously to attempt to break
message can’t be cracked. As you learned in a 40-bit key. He succeeded in just eight
Chapter 12, a brute force attack occurs when days. Since then, 128-bit keys have become
hackers try every possible key combination the standard. Even using supercomputers,
to decode a message. This type of attack no one has yet cracked a 128-bit key. It is
can enable hackers to deduce the key and believed that even with the most powerful
decode the message. computers in use today, it would take
What is considered a safe key? In hundreds of billions of years to crack a
the early 1990s, 40-bit keys were thought to 128-bit key.

630 Chapter 13 Behind the Scenes: How the Internet Works


Pick It! is a yes
vote to stock the
item

Post it on
Facebook for
your friends

Make comments
or suggestions

Figure 13.22
Customers vote and comment on products that ModCloth.com is thinking about stocking.

cash prize of $2,500. Because potential customers have already indicated about the items, which range from humorous to constructive. ModCloth
their interest in a particular design by voting on it, Threadless can be fairly also provides links so that voters can easily share items with their friends
confident that the designs they print will sell briskly. on social networks like Facebook and Twitter. Constructive ideas from
ModCloth is a company founded in 2002 by two high-school students potential customers can be sent back to designers who might make sug-
who were just 17 years old! They started selling only vintage clothing but gested alterations to items before ModCloth orders them. When ModCloth
then expanded to offer vintage-inspired designs by Indie designers. When orders a popular item, customers who indicated they liked it can be con-
ordering clothing from designers, there is usually a minimum order quan- tacted via e-mail to stimulate sales.
tity that often exceeds 100 pieces. Although the buyers for ModCloth feel So don’t let all those customers that have friended you on your com-
they have a good eye for what their customers like, it is still risky for a pany’s Facebook page sit idle. Put them to work helping you make your
small business to order large quantities of items because they may take a business more profitable! And thanks to WiMAX, you soon should be able
long time to sell. to communicate with your customers from wherever you happen to be
ModCloth started its Be the Buyer program to involve customers in the standing.
buying process. They post clothing they are considering buying on the Look for these and other Internet-related trends coming soon to com-
ModCloth site, and then customers vote to either “Pick It” (stock the item) puters near you.
or “Skip It,” as shown in Figure 13.22. Customers can post comments

What is an easy way for me to try How do businesses protect e-mail?


encrypted e-mail? Many e-mail serv- Encryption doesn’t solve the other problems
ices offer built-in encryption, and they associated with e-mail. Messages leave a
mostly market toward businesses. However, trail as they travel over the Internet, and
Hushmail (hushmail.com) and Comodo copies of messages can exist on servers for
SecureEmail (comodo.com) offer free ver- long periods of time. In addition, immediate
sions of their secure e-mail to individuals. reading of sensitive documents is often
You can sign up on their Web sites and essential, but encryption software doesn’t
experiment with sending encrypted e-mail. provide a means for confirming that your
And you don’t need to abandon your messages have been delivered. To combat
current e-mail accounts—just use your these issues, companies including Securus
secure account when you require secure Systems Ltd. (safemessage.com) have devel-
communications. oped secure data transmission software that

Communications over the Internet 631


works outside of the conventional SMTP happen at the same time rather than lagging
mail servers. Let’s look at Securus Systems’ by minutes or hours. Instant messaging
product, SafeMessage. requires the use of a client program that
How is SafeMessage software connects to an instant messaging service.
used? Parties who wish to send or receive AOL Instant Messenger (AIM), ICQ, Yahoo!
secure messages install the SafeMessage Messenger, and Windows Live Messenger
software. When messages are to be sent, a are the top four instant messaging services
secure point-to-point connection is estab- in use today. No matter which one you
lished between the sender’s and the recipi- choose, you need to have the appropriate
ent’s e-mail boxes. Instead of SMTP, client software installed on your computer.
proprietary protocols (protocols developed How does instant messaging
and owned by specific companies) with work? The client software running on
encryption are used to send the messages. your computer makes a connection with the
Additional options are provided such as chat server using your Internet connection,
delivery confirmation, message shredding as shown in Figure 13.23. Once contact is
(destruction of messages on command), and established, you can log in to the server with
the ability to have messages erase your name and password. (You can sign up
themselves after a set period of time. for a free account the first time you connect.)
Although this type of software is not free, it The client software provides the server
is catching on in those sections of the busi- with connection information (such as the IP
ness community where fear of industrial address) for your computer. The server then
espionage is high. consults the list of contacts (“Buddies” or
friends) that you have previously estab-
lished in your account and checks to see if
Instant Messaging any of your contacts are online (step 1). If
What do you need to run instant any are, the server sends a message back to
messaging? As we explained in your client providing the necessary connec-
Chapter 3, instant messaging is the act of tion information (the IP addresses) for your
communicating over the Internet with one friends who are online (step 2). You can now
or more people in real time. It differs from click your friends’ names to establish a chat
e-mail in that conversations are able to session with them (step 3).
Figure 13.23
How an instant messag-
ing program works. STEP 1: Contact chat server to see
who is online.

Your computer STEP 2: IP addresses of your buddies


running instant sent to your computer.
messaging
client software
Chat server
for chatting

STEP 3: Chat with your buddy


commences via his IP address.

Your buddy’s
computer running the
same instant messaging
client software
for chatting

632 Chapter 13 Behind the Scenes: How the Internet Works


Because both your computer and your make free long-distance phone calls. If you
friend’s computer have the connection infor- have friends and relatives that live a long-
mation (the IP addresses) for each other, the distance phone call away from you, then
server isn’t involved in the chat session. you need to know more about VoIP.
Chatting takes place directly between the What’s so good about VoIP? From
two computers over the Internet. a user’s perspective, the true advantage is
Is sending an instant message that the service is cheaper than conventional
secure? Most instant messaging services phone service or, in some instances, is free.
do not use a high level of encryption for Even some cell phones are VoIP-enabled and
their messages—if they bother to use can make calls through available wireless
encryption at all. In addition to viruses, networks (although this usually still counts
worms, and hacking threats, instant messag- as used minutes for the month).
ing systems are vulnerable to eavesdrop- How does VoIP work? From a user’s
ping, in which someone using a packet perspective, there is little difference between
sniffer “listens in” on IM conversations. VoIP and traditional phone service (see
Although several measures are under way Figure 13.24), although the technology be-
to increase the security of this method of hind the wires and devices is a bit different.
real-time communication, major vulnerabili- As explained in Chapter 3, VoIP is a method
ties still exist. And employers can install of taking analog voice signals that normally
monitoring software to record instant mes- travel telephone wires and turning them
sage sessions. Therefore, it is not a good idea into digital data that can be transmitted over
to send sensitive information using instant the Internet. Like e-mail, VoIP uses packet
messaging because it is susceptible to inter- switching as the method of transferring
ception and possible misuse by hackers. data. Unlike circuit switching (the method
Also, your company may be monitoring and used with traditional phone calls), when a
logging instant message sessions. VoIP call is made, the transmission lines are
only used when the two computers are
communicating, thus allowing the comput-
Voice over Internet Protocol (VoIP) ers to accept and process other information.
What is Voice over Internet Protocol? Because digital data is far more efficient than
Voice over Internet Protocol (VoIP) turns a analog data with respect to size, transmis-
standard Internet connection into a way to sion speed, and compression capabilities,

Figure 13.24 CONVENTIONAL AND VoIP CALLING COMPARED

Conventional Telephone Call VoIP Telephone Call


1. Pick up the phone and wait for a dial tone to signal that you are 1. Pick up the phone, which sends a signal to the computer or telephone
connected to the local office of your telephone carrier. adapter. The computer sends a dial tone, indicating that you have a
connection to the Internet.

2. Dial the number of your friend’s phone. 2. Dial the number of your friend’s phone. The tones are converted into
digital data.

3. The call is routed through the switch at your local carrier, passing 3. As long as the phone number is in a valid format, your VoIP company
through several switches along the way. will translate the phone number into an IP address and then connects
to the receiving device.

4. The phone at the other end rings, and your friend answers the call. 4. The signal “asks” the receiving device to ring, and your friend answers
the call.

5. When the call is answered, a circuit is opened. 5. When your friend picks up the phone, each computer knows to expect
packets of data from the other computer.

6. As you talk, the circuit remains open. No other data can be 6. As you talk, the packets of data are sent over the same Internet
transmitted over the phone line during this time. A busy signal infrastructure as e-mail or a Web page. The digital data is translated
occurs if someone else tries to call. into analog audio signals so that you and your friend can understand
each other.

7. When you hang up, the circuit is closed, enabling another call to 7. When you hang up, the session is terminated.
come in.

Communications over the Internet 633


VoIP’s long-term advantage is that it will be computing services yourself because many
able to handle more phone calls at the same Web 2.0 applications (such as blogs, wikis,
time. Although today’s traditional phone and social networks) and Web-based e-mail
calls have increased efficiency and reduced (such as Yahoo! or Gmail) are provided to
costs since they were first invented, there is you via cloud computing.
considerable room for improvement com- Why would a company need cloud
pared to how digital data (such as e-mail) is computing? Amazon.com needs the
transmitted. computing power of many computers
How are VoIP security issues being (servers) to manage the millions of products
handled? Because VoIP technology is the company offers and handle the tens of
similar to that of e-mail, VoIP is vulnerable thousands of orders it receives and delivers
to some of the same threats. However, the each day. Amazon has made a significant
use of encryption methodologies, updated investment in computer hardware, software,
antivirus software, firewalls, and antispam and human programming talent to build a
tools helps cut down on VoIP’s security comprehensive e-commerce system to
vulnerabilities. acquire, sell, and deliver products. If you
were going to start a business that required
a sophisticated inventory system such as the
one Amazon uses to manage its stock, you
Using the Internet to would need a rather large pile of cash to
Deliver Computer purchase the equipment, software, and labor
needed to develop your own product
Services tracking system.
Businesses are taking advantage of the Certain companies, like Amazon, that
Internet in some fairly obvious ways, such have already made the investment in their
as the explosion in e-commerce over the last systems have now started to offer services
decade. In addition, businesses are using the via cloud computing to other companies.
Internet in ways that are transparent (invisi- Under the Amazon Elastic Compute Cloud
ble) to the end user and that result in consid- (Amazon EC2), Amazon offers other compa-
erable cost savings and increases in business nies (for a fee, of course) the capability to
efficiencies. use its proven systems and technology to
What is cloud computing? The In- host computer applications that those other
ternet is often represented in diagrams as a companies require. This means that compa-
picture of a cloud. Cloud computing refers nies can have Amazon set up and maintain
to using the Internet to deliver business servers for them that can be accessed via the
services online that were previously deliv- Internet. The companies pay Amazon only
ered locally by company-owned IT depart- for the storage and processing capacity that
ments. You have probably used cloud they use.

Figure 13.25
Jamglue uses Amazon.com’s cloud computing services to process music mixes for its users.

634 Chapter 13 Behind the Scenes: How the Internet Works


Imagine that you wanted to start a com- Fourth of July to handle a large increase in
pany to sell shoes online. Instead of hiring orders pertaining to that holiday. The fire-
an entire IT department and investing tens works company could then scale back its
of thousands of dollars in software and processing capacity on July 5. Furthermore,
hardware, you could lease server space from a start-up business that might not have the
Amazon’s computing services. Your com- capability to raise large amounts of capital
puting systems would then be deployed can often save significant amounts of money
on hardware and software maintained by by paying for just the computing power it
Amazon, and your computer services would needs, instead of installing a large data
be delivered in the “cloud” (via the Internet). processing center early on.
It would be much more cost effective for One example of a company that relies on
your company to use Amazon’s proven cloud computing is Jamglue (jamglue.com).
systems and technology because Amazon Jamglue is a Web site that allows users to
can add servers to its network to meet your upload music or sound tracks and then
computing needs for a mix them with other
fraction of the cost of tracks that have been
building your own system.
You still would need expe-
rienced IT talent to cus-
“ Security is one of
the main concerns
related to using
uploaded or mixed by
other users (see Figure
13.25). Processing the
tomize the delivery of mixes requires a lot of
services for your employ- cloud computing computing power, and
ees and customers and to services. Jamglue uses Amazon
connect your employees’
computers to Amazon’s
servers. However, you would need signifi-
” EC2 services to process
user data.
Is it safe to rely on other
cantly fewer people than you would need to companies to process sensitive
build and maintain your own complex sys- data? Security is one of the main concerns
tem. related to using cloud computing services.
What types of businesses can Running your own IT department requires
benefit the most from cloud careful consideration of how to protect and
computing? Businesses that need to safeguard data. When you turn over pro-
process large amounts of data every once in cessing to a third party, it’s important to
a while can significantly reduce costs by carefully investigate the security and backup
using cloud computing. Instead of investing capabilities of the cloud computing service
in large amounts of equipment and software provider to determine if their procedures
that it will use only infrequently, a company meet your requirement for data security.
can rent as much computing power as it Security measures for all forms of com-
needs at specific times. Businesses that tend munication technologies are constantly
to be busy during certain months or seasons being evaluated. It is important for all users
of the year are also good candidates. For of Internet technologies to understand
example, a company that makes fireworks that threats to our security and privacy
might want to acquire more computing are real but controllable with the proper
power during the months that lead up to the precautions.

Using the Internet to Deliver Computer Services 635


thirteen
thirteen summary
chapter

1. Who owns, manages, and pays for the 4. Why are IP addresses and domain
Internet? names important for Internet
Management of the Internet is carried out communications?
summary

by several nonprofit organizations and An IP address is a unique number assigned


user groups such as the Internet Society to all computers connected to the Internet.
(ISOC), the Internet Engineering Task The IP address is necessary so that packets
Force (IETF), the Internet Architecture of data can be sent to a particular location
Board (IAB), the Internet Corporation for (computer) on the Internet. A domain name
Assigned Names and Numbers (ICANN), is merely a name that stands for a certain IP
and the World Wide Web Consortium address and makes it easier for people to
(W3C). Each group has different responsi- remember it. For example, MyWebPage.com
bilities and tasks. Currently, the U.S. is a domain name and is much easier to re-
government (and subsequently the U.S. member than the IP address 124.53.111.14.
taxpayer) funds a majority of the DNS servers act as the phone books of the
Internet’s costs. Internet. They enable your computer to find
out the IP address of a domain by looking
2. How do the Internet’s networking up its corresponding domain name (which
components interact? you typed into your browser).
Individual computers or networks connect
to the Internet using Internet service 5. What are FTP and Telnet, and how
providers (ISPs). These providers vary in do you use them?
size and work like the physical highway The file transfer protocol (FTP) enables users
system. The largest paths, along which to share files that reside on local computers
data travels the most efficiently and with remote computers. Current versions of
quickly, make up the Internet backbone. browsers enable you to connect to FTP sites
Homes and all but the largest businesses on the Internet to facilitate downloading or
connect to the Internet through these re- uploading files to and from FTP sites. Telnet
gional or local connections, which then is both a protocol for connecting to a remote
connect to the Internet through the entities computer and a TCP/IP service that runs on
that make up the Internet backbone. The a remote computer to make it accessible to
largest businesses, educational centers, and other computers. Telnet enables you to take
some government agencies such as NASA control of a remote computer (the server)
make up the Internet backbone. with your computer (the client) and manip-
ulate files and data on the server as if you
3. What data transmissions and were sitting in front of that server.
protocols does the Internet use?
Data is transmitted along the Internet 6. What are HTML/XHTML and XML
using packet switching. Data is broken used for?
up into discrete units known as packets, The HyperText Markup Language (HTML)
which can take independent routes to the is a set of rules for marking up blocks of text
destination before being reassembled. so that a browser knows how to display
Although many protocols are available them. Most Web pages are generated with at
on the Internet, the main suite of protocols least some HTML code. Blocks of text in
used to move information over the Internet HTML documents are surrounded by a pair
is TCP/IP. The suite is named after the of tags (such as <b> and </b> to indicate
original two protocols that were developed bolding). These tags and the text between
for the Internet: the Transmission Control them are referred to as elements. By examin-
Protocol (TCP) and the Internet Protocol ing the elements, your browser determines
(IP). Whereas TCP is responsible for how to display them on your computer
preparing data for transmission, IP screen. Because HTML was not designed for
actually sends data between computers information exchange, eXtensible Markup
on the Internet. Language (XML) was created. Instead of

636 Chapter 13 Behind the Scenes: How the Internet Works


summary thirteen thirteen

chapter
locking users into standard tags and formats for the recipients of the e-mail you send.
for data, XML enables users to create their Encryption software, such as Pretty Good
own markup languages to accommodate Privacy (PGP), is used to code messages so

summary
particular data formats and needs. XML is that they can be decoded only by the
used extensively in e-commerce for ex- authorized recipients.
changing data between corporations.
8. How do businesses use the Internet
7. How do e-mail, instant messaging, to reduce computing costs?
and Voice over Internet Protocol Many businesses are taking advantage of
work, and how is information using cloud computing to reduce costs. Cloud com-
these technologies kept secure? puting refers to business services provided
Simple mail transfer protocol (SMTP) is the online by other companies and delivered to
protocol responsible for sending e-mail over a customer through the Internet. These
the Internet. As is true of most other Internet services were formerly delivered locally by
applications, e-mail is a client/server appli- company-owned IT departments. A
cation. E-mail passes through e-mail servers company might use Amazon.com’s cloud
whose functions are to store, process, and computing servers, for example, to store
send e-mail to its ultimate destination. ISPs their data instead of purchasing and
and portals such as Yahoo! maintain e-mail installing their own servers. Cloud
servers to provide e-mail functionality to computing initiatives, while cost effective,
their customers. Your ISP’s e-mail server generate data security concerns because a
uses DNS servers to locate the IP addresses third party is managing sensitive data.

637
thirteen
thirteen key terms
chapter

AJAX ...................................................................... 624 Internet Corporation for Assigned Names


applet...................................................................... 625 and Numbers (ICANN)..................................... 614
cascading style sheets (CSS)................................. 624 Internet exchange point (IXP) ............................. 610
key terms

CGI script .............................................................. 623 Internet Protocol (IP)............................................ 613


cgi-bin..................................................................... 623 Internet Protocol version 4 (IPv4) ....................... 614
circuit switching .................................................... 612 Internet Protocol version 6 (IPv6) ....................... 615
classless interdomain routing (CIDR) ................. 614 IP address .............................................................. 614
client/server model ................................................ 610 key pair .................................................................. 629
client-side program ............................................... 625 multipurpose Internet mail
cloud computing .................................................... 634 extensions (MIME)............................................ 628
commerce server ................................................... 610 negative acknowledgment (NAK) ........................ 617
common gateway interface (CGI)........................ 622 network prefix ....................................................... 614
computer protocol ................................................. 611 octet ........................................................................ 614
connectionless protocol ......................................... 617 open system............................................................ 611
connection-oriented protocol ............................... 616 optical carrier (OC) line ....................................... 609
crowdsourcing ....................................................... 630 packet (data packet).............................................. 612
document object model (DOM) ........................... 625 packet switching .................................................... 612
domain name ......................................................... 618 point of presence (POP)........................................ 610
domain name system (DNS) server ..................... 618 positive acknowledgment (ACK) ......................... 617
dotted decimal number (dotted quad)................. 614 Pretty Good Privacy (PGP).................................. 629
dynamic addressing .............................................. 615 private key ............................................................. 629
dynamic host configuration private-key encryption.......................................... 628
protocol (DHCP)................................................ 615 proprietary system ................................................ 611
dynamic HTML (DHTML).................................. 623 public key............................................................... 629
element ................................................................... 621 public-key encryption ........................................... 629
e-mail server .......................................................... 627 root DNS server..................................................... 619
encryption .............................................................. 628 second-level domain .............................................. 618
file server................................................................ 610 secure sockets layer (SSL) .................................... 621
file transfer protocol (FTP) .................................. 619 server-side program .............................................. 623
handshaking .......................................................... 616 simple mail transfer protocol (SMTP) ................ 627
hexadecimal notation ............................................ 615 static addressing .................................................... 615
HTML tag .............................................................. 621 switch...................................................................... 610
HTML/XHTML embedded scripting T line....................................................................... 609
language.............................................................. 625 TCP/IP ................................................................... 613
hypertext ................................................................ 620 Telnet ...................................................................... 619
HyperText Transfer Protocol (HTTP)................. 620 three-way handshake ............................................ 616
HyperText Transfer Protocol Transmission Control Protocol (TCP) ................ 613
Secure (HTTPS)................................................. 621 transport layer security (TLS)............................. 621
Internet backbone ................................................. 609 user datagram protocol (UDP) ............................ 616
Internet cache ........................................................ 620 Web server ............................................................. 610

638 Chapter 13 Behind the Scenes: How the Internet Works


buzzwords
thirteen thirteen

chapter
Word Bank
• affective computing • HTTP • point of presence
• AJAX • ICANN • public-key encryption

buzzwords
• applet • Internet backbone • SMTP
• circuit switching • IP address • SSL
• DNS server • OC line • TCP/IP
• FTP • packet switching
• HTML tags • PGP

Instructions: Fill in the blanks using the words from the Word Bank above.
As a network administrator, Patricia knows that she can count on the organization
(1) __________ to ensure that she has an appropriate range of IP addresses for her work site.
Her high-speed connection to her company’s ISP was vital to providing the connectivity her
employees need to get their jobs done. Recently, the company moved up from a DSL connec-
tion to a(n) (2) __________ because of the high volume of Internet traffic it was generating.
Patricia hopes the government will continue to fund projects to continue research to improve
the Internet (3) __________, the main highway to the Internet, and other vital technologies.
But Patricia has indulged in enough daydreaming. It is time to ensure that the Internet
connection to the bank of modems, or (4) __________, provided by the ISP her company is
using is fully functional before the majority of the employees arrive for work. Because
Patricia’s company sends a tremendous amount of e-mail, old-fashioned (5) __________
technology would never have sufficed for sending messages. Fortunately, the Internet employs
(6) __________ to enable messages to be sent over widely varying routes. Of course, she knows
that the main suite of protocols that controls Internet data traffic is called (7) __________.
After ensuring that all is functional, Patricia begins to assist the Web development team with
Web page creation. To provide robust interaction with company databases, (8) __________ is
being used to code Web pages for the corporate Web site instead of HTML, which requires de-
velopers to use a standard set of (9) _________. Unsure of her instructions, she e-mails the direc-
tor of Web development for clarification, knowing that the (10) __________ protocol will ensure
that the e-mail is delivered to the director at the company’s office in the United Kingdom.
Requiring secure communications, she encrypts the e-mail using a(n) (11) __________
algorithm, knowing that the director can retrieve Patricia’s key from her personal Web site.

computer
After reading the director’s response to her e-mail, she quickly writes a Java (12) __________
to produce an interactive form to collect customer information. Using the (13) __________
protocol, Patricia posts her Web page to the corporate site. Of course, users will view the
Web page using the (14) __________ protocol. Because the Web page contains potentially
sensitive information, Patricia makes sure to use the (15) __________ protocol to provide
literate
added security for the data.
becoming
becoming
computer literate
While attending college, you are working at Shoe Station, a small retailer of children’s and
women’s footwear. The owner has charged your supervisor with establishing a Web presence
for the company by developing a company Web site and establishing online communications
with international suppliers. Your supervisor has asked you to help draft a memo to the CEO
that sets forth the technologies the company should deploy to create an Internet presence.

Instructions: Draft a memo for your boss that details the benefits of connecting the
company to the Internet. Make sure to suggest which types of Internet connections will be
appropriate and which type of ISP will be needed. Use as many of the keywords from the
chapter as you can, and ensure that the report will be understandable by managers who
may be unfamiliar with computers or the Internet.
639
thirteen
thirteen self-test
chapter

Instructions: Answer the multiple-choice and true–false questions below for more
practice with key terms and concepts from this chapter.

Multiple Choice
self-test

1. Which is a common protocol used on 7. Individuals connect to the Internet


the Internet? using
a. DNS c. XHTML a. points of presence.
b. IP d. PGP b. network access points
2. Data is sent over the Internet using c. Internet exchange points.
a. circuit switching. d. Web servers.
b. protocol switching. 8. Encryption of Internet e-mail
c. DNS switching. a. requires the use of specially
d. packet switching. designed client software.
3. A numeric IP address is usually b. is built into the SMTP protocol.
represented by an alphanumeric c. is built into most Web-based
a. URL. e-mail.
b. SMTP. d. is prohibited by the Department
c. routing address. of Homeland Security.
d. DNS address. 9. For what is PGP used?
4. IP addresses that are assigned by an a. Creating a secure connection
ISP and do not change over long between client and server
periods of time are b. Loading Web pages into a
a. called static. browser
b. more secure. c. Encrypting e-mail messages
c. called dynamic. d. Uploading files to the Internet
d. volatile. 10. Which is a key component of cloud
computing?
5. Which is the primary Internet proto-
col used for viewing Web pages? a. Increase in IT employee
headcount
a. JavaScript
b. Decreased computing start-up
b. Telnet
costs
c. HTTP
c. Delivery of offline computing
d. TCP/IP
services
6. What makes interactivity on the Web d. Difficulty in increasing
possible? computing capacity
a. HTML c. FTP
b. CGI d. XML

True–False
_____ 1. The costs associated with running the Internet are paid primarily through ISPs
collecting fees from customers and from funding by U.S. government agencies.
_____ 2. VoIP uses packet switching technology.
_____ 3. A computer needs the XML address to locate a Web page accurately.
_____ 4. The main suite of protocols used on the Internet is TCP/FTP.
_____ 5. Instant messages are generally secure because most instant-messaging software
provides for encryption of messages.

640 Chapter 13 Behind the Scenes: How the Internet Works


making the
thirteen thirteen

chapter
transition to...
next semester
1. Creating a Web Site

transition to...
As president of your school’s Phi Beta Lambda (PBL) club, you would like to build a
mailing list for your quarterly newsletter. You also would like to ensure that the
newsletter is available on the college’s Web site. When you visit the college Web

next semester
making the
developer, she asks you the following questions:
a. What data will you require all online subscribers to provide?
b. What optional data would you like subscribers to provide?
c. Will an e-mail address be provided to potential subscribers if they wish to make
inquiries? If so, who will be reviewing and responding to these e-mails? How
quickly will you be answering these e-mails?
2. Creating a Wiki Site: Issue 1
Your sociology instructor has asked your group to design a wiki site about preventing
identity theft. The site will include textual and graphic information about identity theft
as well as an interactive quiz. The wiki will be open for anyone to edit (just like
Wikipedia), and it is hoped that other students will contribute to the site. The following
issues need to be addressed:
a. Which wiki hosting service will you use to host the site? Why do you think this is
appropriate?
b. What name would you choose for the site? What URL would you choose for the site?
c. How would you publicize the site so that other students at your school can find it?
d. Who will be responsible for monitoring and editing the site? What types of content
would you remove from the site?
3. Creating a Wiki Site: Issue 2
You have been asked to assist your psychology professor in creating a wiki for her stu-
dents. The wiki will be used by the students to develop an online study guide for the
Introduction to Psychology class. Investigate the following two options and explain
which option you will recommend and why:
a. Most schools provide course management software (CMS) such as Blackboard or
Moodle to facilitate communication between faculty and students. Most CMS sys-
tems have the ability to host wikis. What CMS software does your school use? Is the
wiki feature available? How much storage space is provided for wiki pages? Can
the wiki be rolled over to the next semester so future classes can work on it?
b. Many sites host wikis free of charge, including PBworks (pbworks.com), Wikidot
(wikidot.com), and Wikispaces (wikispaces.com). Investigate at least two free wiki
services and compare their features. Include the following items and any other
features that would be useful to your professor:
• Limitations on number of users that can participate in a single wiki
• Amount of disk storage space
• Restrictions on file uploads, including file size and number of files
• Membership restrictions (e.g., can the wiki be private or editable only by members?)
• Notification features (e.g., can members be notified of updates by e-mail or RSS feed?)
4. Securing Your E-mail Communications
You have a brilliant idea for a new business and will begin developing it with several
friends next semester. To help ensure no one steals your idea before you launch the
business, you decide that encrypting your e-mail communications related to the busi-
ness would be a good idea. Investigate the free secure e-mail products Hushmail
(hushmail.com), S-Mail secure email (s-mail.com), and Comodo SecureEmail
(comodo.com). Prepare a report for your friends that compares the features of these
e-mail products and justifies the decision to use the e-mail package you chose.

641
thirteen
thirteen making the
chapter

transition to...
1. Web Site Privacy Issues the workplace
Your employer, a distributor of high-end stereo equipment, recently discovered that an
the workplace
employee was using his Facebook account to post disparaging remarks about the com-
pany president. The employee was fired and has now lodged a wrongful discharge
making the

lawsuit against your employer. You don’t feel comfortable with the way this employee
was treated, and you are wondering if your employer’s firing of the employee was
transition to...

legal. Investigate the following and prepare a narrative for your instructor:
a. Is the state in which you go to school an “employment-at-will” state? If so, generally
an employee can be fired for almost any reason at any time as long as the firing does
not violate another employment law (such as the Civil Rights Act). Should an
employer have the right to fire a person for expressing an opinion about his or her
boss or company on a social networking site?
b. Have employers been successful in terminating employees for making disparaging
comments on social networking sites, wikis, and blogs? Research the case of Ellen
Simonetti, whose firing over her blog posts is one of the most famous cases in this
area. In your opinion, was Ms. Simonetti treated fairly? What kind of policy should
an employer have to warn employees about the potential consequences of their
actions on social networking sites?
c. If you were running a small business and you found out that one of your
employees was disparaging you or the business on a public Web site, what
would you do about it?

2. Creating an Online Presence for a Business


You work at a local coffee shop that offers live music on the weekends. Your boss has
asked you to help the coffee shop enhance its Web presence to better connect with
customers. The shop currently has a Web site but does not have pages on any social
networking sites. Consider the following:
a. On which social networking sites would you create a page for the coffee shop? Why?
b. What types of information would you post on the social network pages for the
coffee shop? What strategies would you use to make customers aware of the coffee
shop’s social networking sites?
c. What information would you solicit from customers who joined the coffee shop’s
social networking sites? How could you use the customers to help develop new
products or services for the business?

3. “Googling”
At your company, someone was just fired because sensitive information related to a
company product was associated with the person’s name on the Internet. Discretion
being the better part of valor, you decide to do a search for your name on the Web
using a search engine such as Google (google.com) just to see what is out there. Prepare
a report on what you found. Your report should answer the following questions:
a. Did you find any accurate information about yourself (such as your home page URL
or résumé)? Did you find any erroneous information that you need to correct?
b. Did you find Web sites or information about other people with the same name as
you? Could any of that information be damaging to your reputation if someone
thought the other person was you? If so, provide examples.
c. Is there information that you found about yourself or others that you think should
never be available on the Internet? Provide examples and an explanation of why
you feel certain information should not be available.
d. Is there any information on social networking sites, such as MySpace
(myspace.com) or Facebook (facebook.com), that could be damaging to you if an
employer or school administrator were to see it?

642 Chapter 13 Behind the Scenes: How the Internet Works


critical thinking
thirteen thirteen

chapter
questions
Instructions: Albert Einstein used Gedankenexperiments, or critical thinking questions, to

questions
critical thinking
develop his theory of relativity. Some ideas are best understood by experimenting with
them in our own minds. The following critical thinking questions are designed to demand
your full attention but require only a comfortable chair—no technology.

1. Domain Names
Domain names often spark fierce controversy between competing companies. Legal
wrangling over the rights to attractive names such as Buynow.com and Lowprices.com
can generate large fees for attorneys. Meanwhile, some famous individuals such as
Julia Roberts have had to fight for the right to own domains based on their own names.
a. Should everyone be entitled to a Web site in a certain domain (say, .com) that con-
tains their own name? How would you handle disputes by people who have the
exact same name (say, two people named John Smith)?
b. Cybersquatting is registering a domain name (say, Coke.net) just for the purpose
of selling it to the organization that may benefit from it the most (in this case, the
Coca-Cola Company). Is cybersquatting ethical? Why or why not? Is cybersquatting
legal in the United States?
c. Typosquatting is related to cybersquatting. People often register domain names that
they think are common misspellings of well known Web sites (such as gooogle.com
or googgle.com). They then place Web pages at these addresses with clickable ad-
vertisements on them so they can potentially earn revenue when people mistype
URLs into their browsers. Is typosquatting legal in the United States? Is typosquat-
ting ethical? Why or why not?

2. Illegal File Sharing Among Students


The College Opportunity and Affordability Act, passed by Congress in 2008, almost
included a provision requiring colleges to monitor and punish students who were
illegally swapping or downloading copyrighted material such as music or movies.
a. As a condition to receiving federal funding, should colleges be required to prevent
students from illegally downloading or sharing material? Why or why not?
b. What measures has your school taken to prevent the illegal downloading of media?
Are these measures effective? What other actions would you recommend your
school take?

3. Encryption of E-mail
a. Do you currently encrypt your personal e-mail? Why or why not? If you are sending
business-related e-mail, do you think you should use encrypted e-mail? Explain
your answers.
b. Do you think your school should provide encrypted e-mail for student use? If a
problem arises, such as a student accusing another student of sexual harassment,
do you think the software used for encryption should have code that enables school
administrators able to break the encryption? Explain your answers.
c. Should all U.S. government agencies be required to use encrypted e-mail? What
agencies should be required to use encrypted e-mail? Are there agencies that would
never need to use encrypted e-mail? Explain your answers.

643
thirteen
thirteen team time
chapter

Creating a Business Web Presence

Problem
team time

In today’s fast-paced business environment, establishing a Web presence for a new business
is critical. Having a Web site that is designed around the needs of customers is essential if a
business is to compete in the 21st century. In this Team Time, you’ll research Web hosting
options and providers for a start-up company.

Task
Your group has just received a request from a friend who is starting a new apparel com-
pany called Trendz. It will sell clothing designed by young, urban artists and will target
active young adults who are skateboarders and snowboarders. Your friend wants to sell
the clothing over the Internet and needs your group’s advice as to where to deploy a
Web site and what features to offer.

Process
Break the class into small teams of three or four students. Each team should prepare a
report as follows:
1. Determine an appropriate domain name for the Trendz Web site. Make sure that the
Web address you propose is available by using a Whois service such as whois.net.
2. Select a company that can cost effectively register the domain name you have chosen
and host the Web site. Investigate companies such as Network Solutions, 1and1.com,
Go Daddy, Tucows, and Yahoo!. You might also want to consider free hosting solutions
from Google or Microsoft Office Live.
3. Investigate options such as PayPal, Google Checkout, Authorize.net, or Cyber Source
and determine a provider for collecting payments from customers. Make sure to
consider fixed monthly fees charged as well as per transaction fees.
4. Determine what shopping cart software will be necessary to manage customer orders.
Volusion, Fortune 3, CS-Cart, and Early Impact are examples of companies that offer
possible solutions.
5. Develop a PowerPoint presentation to summarize your findings and present your
proposed solution to the class.

Conclusion
E-commerce Web sites are relatively easy to deploy using the vast array of tools available
on the Internet today. Substantial growth of new small businesses is expected in the United
States over the next several decades. Therefore, you may soon be in a position where you
will need to set up an e-commerce solution for friends, family, or an employer.

644 Chapter 13 Behind the Scenes: How the Internet Works


ethics
thirteen thirteen

chapter
project
Ethics Project

project
ethics
In this exercise, you will research and then role-play a complicated ethical situation. The
role you play may or may not match your own personal beliefs, but your research and use
of logic will enable you to represent whichever view is assigned. An arbitrator will watch
and comment on both sides of the arguments, and together the team will agree on an
ethical solution.

Topic: Privacy at School


Many Americans consider privacy to be a fundamental and unalienable right even though
privacy is not specifically spelled out as a right in the U.S. Constitution or the Bill of Rights.
Parents seem especially concerned about protecting their children’s privacy rights. With the
widespread use of technology, infringing on personal privacy rights has become easier,
even if it is often done innocently or inadvertently.
School administrators are quickly learning that they need to craft policies that set
appropriate boundaries and guidelines for monitoring students. Should school districts be
allowed to monitor students? Should school districts be required to inform students and
parents of any monitoring takes place?

Research Areas to Consider


• Lower Merion school district in Pennsylvania uses webcams to monitors students in their
homes.
• School district in California uses RFID chips to take attendance.
• The Family Educational Rights and Privacy Act (FERPA)

Process
Divide the class into teams.
1. Research the areas cited above and devise a scenario in which a school district has
been monitoring students without their knowledge and has potentially violated their
privacy.
2. Team members should write a summary that provides background information for
their character—for example: student or parent, school official, and arbitrator—and
details their character’s behaviors to set the stage for the role-playing event. Then,
team members should create an outline to use during the role-playing event.
3. Team members should arrange a mutually convenient time to meet for the exchange,
either using the chat room feature of MyITLab, the discussion board feature of
Blackboard, or meeting in person.
4. Team members should present their case to the class, or submit a PowerPoint presenta-
tion for review by the rest of the class, along with the summary and resolution they
developed.

Conclusion
As technology becomes ever more prevalent and integrated into our lives, more and more
ethical dilemmas will present themselves. Being able to understand and evaluate both sides
of the argument, while responding in a personally or socially ethical manner, will be an
important skill.

645
This page intentionally left blank
eighth

EDITION
EIGHTH
Glossary
8
3D sound card An expansion card that en- affective computing A type of computing presentations, editing photos, taking an on-
ables a computer to produce sounds that that relates to emotion or deliberately tries line course, and playing games.
are omnidirectional or three dimensional. to influence emotion.
artificial intelligence (AI) The science that
802.11 standard A wireless standard aggregator A software program that goes attempts to produce computers that display
established in 1997 by the Institute of out and grabs the latest update of Web ma- the same type of reasoning and intelligence
Electrical and Electronics Engineers; also terial (usually podcasts) according to your that humans do.
known as WiFi (short for Wireless Fidelity), specifications.
aspect ratio The width-to-height propor-
it enables wireless network devices to
aircard A device that enables users to have tion of a monitor.
work seamlessly with other networks and
devices. wireless Internet access with mobile devices
assembly language A language that
such as PDAs and notebooks.
enables programmers to write their pro-
A AJAX A collection of technologies that
allows the creation of Web applications that
grams using a set of short, English-like
commands that speak directly to the
access card reader A device that reads can update information on a page without central processing unit (CPU) and give
information from a magnetic strip on the requiring the user to do a page refresh or the programmer very direct control of
back of a credit card–like access card (such as leave the page. hardware resources.
a student ID card); card readers are easily audio editing software Programs that per-
algorithm A set of specific, sequential steps
programmed by adding authorized ID card form basic editing tasks on audio files such
that describe in natural language exactly
numbers, Social Security numbers, and so on. as cutting dead air space from the
what a computer program must do to com-
access method A program or hardware plete its task. beginning or end of a song or cutting a
mechanism that controls which computer is portion from the middle.
all-in-one computer A desktop system unit
allowed to use the transmission media in a authentication The process of
that houses the computer’s processor, mem-
network at a certain time. identifying a computer user, based on a
ory, and monitor in a single unit.
access time The time it takes a storage login or username and password. The
all-in-one printer See multifunction printer. computer system determines whether
device to locate its stored data.
the computer user is authorized and what
alphabetic check Confirms that only
accounting software An application level of access is to be granted on the
textual characters are entered in a database
program that helps business owners network.
field.
manage their finances more efficiently by
providing tools for tracking accounting authentication server A server that keeps
analog Waves that illustrate the loudness
transactions such as sales, accounts receiv- track of who is logging on to the network
of a sound or the brightness of the colors in
able, inventory purchases, and accounts and which services on the network are
an image at a given moment in time.
payable. available to each user.
analog-to-digital converter chip Converts
ActionScript A programming language in- analog signals into digital signals.
cluded in Flash; similar to JavaScript in its
keywords, operators, and classes. antivirus software Software that is specifi- B
cally designed to detect viruses and protect
Active Server Pages (ASP) A scripting backdoor program A program that enables
a computer and files from harm.
environment in which users combine a hacker to take complete control of a com-
HyperText Markup Language (HTML), applet A small program designed to be run puter without the legitimate user’s knowl-
scripts, and reusable Microsoft ActiveX from within another application. Java ap- edge or permission.
server components to create dynamically plets are often run on your computer by
backup A backup is a copy of computer
generated Web pages. your browser through the Java Virtual
files that you can use to replace the origi-
Machine (an application built into current
active topology A network topology in nals if they are lost or damaged.
browsers).
which each node on the network is respon-
Backup and Restore utility A Windows
sible for retransmitting the token, or the application programming interface (API)
utility (found in the Control Panel) that
data, to other nodes. A block of code in the operating system
allows the user to create a duplicate copy of
that software applications need to interact
Adobe Flash A software product for all the data on a hard drive (or just the fold-
with.
developing Web-based multimedia. ers and files the user specifies) and copy it
application server A server that acts as a to another storage device, such as a DVD or
adware A program that downloads on external hard drive.
repository for application software.
your computer when you install a freeware
program, game, or utility. Generally, application software The set of programs backward compatibility The accommoda-
adware enables sponsored advertisements on a computer that helps a user carry out tion of current devices being able to use
to appear in a section of your browser tasks such as word processing, sending previously issued software standards in ad-
window or as a pop-up ad box. e-mail, balancing a budget, creating dition to the current standards.

647
eighth
EDITION
EIGHTH
8
bandwidth (data transfer rate) The maxi- bit depth The number of bits a video card bridge A network device that is used to
mum speed at which data can be transmit- uses to store data about each pixel on the send data between two different local area
ted between two nodes on a network; monitor. networks (LANs) or two segments of the
usually measured in megabits per second same LAN.
black-hat hacker A hacker who uses his
(Mbps). See also data transfer rate.
knowledge to destroy information or for brightness A measure of the greatest
base class The original object class from illegal gain. amount of light showing when a monitor is
which other classes derive. displaying pure white; measured as cande-
bloatware The pre-installed software (often
las per square meter (cd/m2) or nits.
base transceiver station A large communi- trial versions) on a new computer.
cations tower with antennas, amplifiers, broadband A high-speed Internet connec-
and receivers/transmitters. BLOB See binary large object.
tion such as cable, satellite, or digital sub-
blog See Web log. scriber line (DSL).
basic input/output system (BIOS) A pro-
gram that manages the data between a Blu-ray disc A method of optical storage browser See Web browser.
computer’s operating system and all the for digital data, developed for storing high-
input and output devices attached to browsing (1) The process of viewing
definition media. It has the largest storage
the computer; also responsible for loading database records. (2) The process of
capacity of all optical storage options.
the operating system (OS) from its perma- “surfing” the Web.
nent location on the hard drive to random Bluetooth technology A type of wireless
brute force attack An attack delivered by
access memory (RAM). technology that uses radio waves to trans-
specialized hacking software that tries
mit data over short distances (approxi-
bastion host A heavily secured server lo- many combinations of letters, numbers, and
mately 30 feet for Bluetooth 1 and 60 feet
cated on a special perimeter network be- pieces of a user ID in an attempt to discover
for Bluetooth 2). Often used to connect pe-
tween a company’s secure internal network a user password.
ripherals such as printers and keyboards to
and its firewall. computers or headsets to cell phones. bus (linear bus) topology A system of
batch processing The process of accumu- networking connections in which all
bomb software Software that destroys data
lating transaction data until a certain point devices are connected to a central cable
on a computing device if someone continu-
is reached, then processing those transac- called the bus (or backbone).
ally tries to access information by guessing
tions all at once. the password. business-to-business (B2B) E-commerce
BD-ROM disc BD-ROM is defined as transactions between businesses.
bookmark A feature in some browsers that
BluRay Disc Read Only Memory. BD-ROM places a marker of a Web site’s Uniform Re- business-to-consumer (B2C) E-commerce
is an optical disc storage media format for source Locator (URL) in an easily retriev- transactions between businesses and
high-definition video and data storage. able list. (Bookmarks are called Favorites in consumers.
benchmark A measurement used in Microsoft Internet Explorer.)
byte Eight binary digits (bits).
comparing software and hardware per-
Boolean operator A word used to refine
formance. Benchmarks are created using
logical searches. For Internet searches,
software applications that are specifically
designed to push the limits of computer
the words AND, NOT, and OR describe the
relationships between keywords in the
C
performance.
search.
C The predecessor language of C⫹⫹;
binary decision A decision point that can developed originally for system program-
boot process The process for loading the
be answered in one of only two ways: yes mers by Brian Kernighan and Dennis
operating system (OS) into random access
(true) or no (false). Ritchie of AT&T Bell Laboratories in 1978.
memory (RAM) when the computer is
binary digit (bit) A digit that corresponds to turned on. It provides higher-level programming
the on and off states of a computer’s switches. language features (such as if statements
boot-sector virus A virus that replicates and for loops) but still allows programmers
A bit contains a value of either 0 or 1.
itself into the master boot record of a flash to manipulate the system memory and
binary language The language computers drive or hard drive. central processing unit (CPU) registers
use to process data into information, con- directly.
sisting of only the values 0 and 1. botnet A large group of software applica-
tions (called robots or bots) that runs without C# A programming language released
binary large object (BLOB) In databases, a user intervention on a large number of by Microsoft to compete with Java.
type of object that holds extremely large computers. Pronounced see sharp.
chunks of data in binary form; this data is
usually video clips, pictures, or audio clips. breadcrumb list A list that shows the Cⴙⴙ The successor language to C. Devel-
hierarchy of previously viewed Web pages oped by Bjarne Stroustrup, C⫹⫹ uses all of
biometric authentication device A device within the Web site that you are currently the same symbols and keywords as C but
that uses some unique characteristic of visiting. Shown at the top of some Web extends the language with additional key-
human biology to identify authorized users. pages, it aids Web site navigation. words, better security, and more support for

648 Technology in Action


eighth

EDITION
EIGHTH
8
the reuse of existing code through object- circuit switching A method of communica- amount of audio and video information
oriented design. tion in which a dedicated connection is into less space.
formed between two points (such as two
cable A type of broadband Internet connec- code editing The step in which program-
people on telephones) and the connection
tion that uses a television’s cable service mers actually type code into the
remains active for the duration of the
provider to connect to the Internet. computer.
transmission.
cache memory Small blocks of memory, lo- coding The process of translating an algo-
class A collection of descriptive variables
cated directly on and next to the central rithm into a programming language.
and active functions that together define a
processing unit (CPU) chip, that act as
set of common properties. Actual examples cold boot The process of starting a com-
holding places for recently or frequently
of the class are known as objects. puter from a powered-down or off state.
used instructions or data that the CPU
accesses the most. When these instructions classless interdomain routing (CIDR) Pro- command-driven interface Interface be-
or data are stored in cache memory, the nounced “cider,” this is an addressing tween user and computer in which the user
CPU can more quickly retrieve them than scheme that allows a single IP address to enters commands to communicate with the
if it had to access the instructions or data represent several unique IP addresses by computer system.
from random access memory (RAM). adding a network prefix (a slash and a
number) to the end of the last octet; also comment (remark) A plain English
cascading style sheets (CSS) A list of state- notation inserted into program code for
known as supernetting.
ments (also known as rules) that define in documentation. The comment is not ever
one single location how HTML/XHTML el- clickstream data Information captured seen by the compiler.
ements are to be displayed. about each click that users make as they
commerce server A computer that hosts
navigate a Web site.
Cat 6 cable A UTP cable type that provides software that enables consumers to pur-
more than 1 GB of throughput. client A computer that requests informa- chase goods and services over the Web.
tion from a server in a client/server net- These servers generally use special security
cellular phone (cell phone) A telephone
work (such as your computer when you are protocols to protect sensitive information
that operates over a wireless network. Cell
connected to the Internet). (such as credit card numbers) from being
phones can also offer Internet access, text
intercepted.
messaging, personal information manage- client/server model A way of describing
ment (PIM) features, and more. typical network functions. Client computers Common Gateway Interface (CGI)
(such as your desktop PC) request services, Provides a methodology by which a
central processing unit (CPU or and servers provide (“serve up”) those browser can request that a program file be
processor) The part of the system unit of services to the clients. executed (or run) instead of just being de-
a computer that is responsible for data livered to the browser.
processing (the “brains” of the computer); client/server network A network, consist-
it is the largest and most important chip in ing of client and server computers, in which communications server A server that
the computer. The CPU controls all the the clients make requests of the server and handles all communications between the
functions performed by the computer’s the server returns the response. network and other networks, including
other components and processes all the managing Internet connectivity.
client/server network (server-based net-
commands issued to it by software
work) A type of network that uses servers compact disc (CD) A method of optical
instructions.
to deliver services to computers that are re- storage for digital data; originally devel-
centralized A type of network design in questing them (clients). oped for storing digital audio.
which users are not responsible for creating compilation The process by which code is
client-side program A computer program
their own data backups or providing secu- converted into machine language, or the
that runs on the client computer and re-
rity for their computers; instead, those tasks language the central processing unit (CPU)
quires no interaction with a Web server.
are handled by a centralized server, soft- can understand.
ware, and a system administrator. clock speed The steady and constant pace
at which a computer goes through machine compiler The program that understands
CGI script A computer program that con- both the syntax of the programming lan-
cycles, measured in hertz (Hz).
forms to the Common Gateway Interface guage and the exact structure of the central
(CGI) specification, which provides a cloud computing The process of using the processing unit (CPU) and its machine lan-
method for sending data between end users Internet to deliver business, entertainment, guage. It can “read” the source code and
(browser users) and Web servers. or other services that were previously deliv- translate the source code directly into ma-
ered by conventional means. chine language.
cgi-bin A directory where Common Gate-
way Interface (CGI) scripts are normally coaxial cable A single copper wire sur- completeness check A process that ensures
placed. rounded by layers of plastic insulation and that all database fields defined as
sheathing; used mainly in cable television “required” have data entered into them.
chat room An area on the Web where peo- and cable Internet service.
ple come together to communicate online. computational field (computed field) A
The conversations are in real time and are codec A rule, implemented in either soft- numeric field in a database that is filled as
visible to everyone in the chat room. ware or hardware, which squeezes a given the result of a computation.

Glossary 649
eighth
EDITION
EIGHTH
8
computer A data-processing device that cookie A small text file that some Web sites
gathers, processes, outputs, and stores data automatically store on a client computer’s
D
and information. hard drive when a user visits the site.
data Numbers, words, pictures, or
computer forensics The application of copyleft A simplified licensing scheme that sounds that represent facts, figures, or
computer systems and techniques to enables copyright holders to grant certain ideas.
gather potential legal evidence; a law rights to a work while retaining other rights.
data centralization Having all data in one
enforcement specialty used to fight
core A complete processing section from a central location (usually a database). Data
high-tech crime.
CPU, embedded into one physical chip. centralization helps ensure data integrity by
computer literate Being familiar enough requiring data to be updated only in one
course management software A program place if the data changes.
with computers that you understand their
that provides traditional classroom tools,
capabilities and limitations and know how
such as calendars and grade books, data collision When two computers send
to use them.
over the Internet, as well as areas for stu- data at the same time and the sets of data
computer protocol A set of rules for dents to exchange ideas and information collide somewhere in the media.
accomplishing electronic information in chat rooms, discussion forums, and
data dictionary (database schema) A file
exchange. If the Internet is the information e-mail.
that defines the name, data type, and length
superhighway, then protocols are the driv-
CPU usage The percentage of time a of each field in the database.
ing rules.
central processing unit (CPU) is working.
data file File that contains stored data.
computer-aided design (CAD) A 3D mod-
crowdsourcing The process of taking a task
eling program used to create automated de- data-flow diagram A design that traces all
that an employee or a contractor usually
signs, technical drawings, and model data in an information system from the
performs (such as product design) and in-
visualizations. point at which data enters the system to its
stead outsourcing that task to a large group
final destination (storage or output).
connectionless protocol A protocol that a of people, usually via the Internet.
host computer can use to send data over data inconsistency Any difference in data
CSMA/CD A method of data collision in lists caused when data exists in multiple
the network without establishing a direct
detection in which a node connected to the lists and not all lists are updated when a
connection with any specific recipient
network listens (that is, has carrier sense) piece of data changes.
computer.
to determine that no other nodes are cur-
connection-oriented protocol A protocol rently transmitting data signals; short for data integrity The process of ensuring that
that requires two computers to exchange Carrier Sense Multiple Access with data contained in a database is accurate and
control packets, which set up the parame- Collision Detection. reliable.
ters of the data exchange session, before data mart Small slices of a data warehouse.
cursor control key A set of controls on
sending packets that contain data.
standard keyboards that moves the cursor data plan A connectivity plan or text mes-
connectivity port A port that enables the (the flashing symbol on the monitor that in- saging plan in which data charges are sepa-
computer (or other device) to be connected dicates where the next character will be in- rate from cell phone calling charges and are
to other devices or systems such as net- serted); also known as an arrow key. provided at rates different from those for
works, modems, and the Internet. voice calls.
custom installation The process of in-
consistency check The process of compar- stalling only those features of a software data redundancy When the same data
ing the value of data in a database field program that a user wants on the hard exists in more than one place in a database.
against established parameters to determine drive.
data staging A three-step process: extract-
whether the value is reasonable. customer relationship management (CRM) ing data from source databases, transform-
consumer-to-consumer (C2C) E-commerce software A business program used for stor- ing (reformatting) the data, and storing the
transactions between consumers through ing sales and client contact information in data in a data warehouse.
online sites such as eBay.com. one central database.
data transfer rate (bandwidth) The maxi-
contrast ratio A measure of the difference in cybercrime Any criminal action perpe- mum speed at which data can be transmitted
light intensity between the brightest white trated primarily through the use of a between two nodes on a network; usually
and the darkest black colors that a monitor computer. measured in megabits per second (Mbps).
can produce. If the contrast ratio is too low, cybercriminal An individual who uses data type (field type) An attribute of a data
colors tend to fade when the brightness is computers, networks, and the Internet to field that determines what type of data can
adjusted to a high or low setting. perpetrate crime. be stored in the database field or memory
location.
control structure The general term used for cyberloafing Doing anything with a
keywords in a programming language that computer that is unrelated to a job (such data warehouse A large-scale electronic
allow the programmer to control, or redi- as playing video games), while one is repository of data that contains and organ-
rect, the flow of the program based on a de- supposed to be working. Also called izes in one place all the data related to an
cision. cyberslacking. organization.

650 Technology in Action


eighth

EDITION
EIGHTH
8
database A collection of related data that denial of service (DoS) attack An attack and knowledge computers and the Internet
can be easily stored, sorted, organized, and that occurs when legitimate users are de- offer and those who do not.
queried. nied access to a computer system because a
hacker is repeatedly making requests of that digital home A home that has a com-
database administrator (database puter(s) and other digital devices that are
computer system that tie up its resources
designer) An individual trained in the all connected to a home network.
and deny legitimate users access.
design, construction, and maintenance of
databases. derivative work Intellectual property that digital signal processor A specialized chip
is based on an original work but is modified that processes digital information and
database designer See database administrator. transmits signals very quickly.
in some way.
database management system (DBMS) digital subscriber line (DSL) A type of
derived class A class created based on a
A type of specially designed application connection that uses telephone lines to con-
previously existing class (i.e., a base class).
software (such as Oracle or Microsoft Ac- nect to the Internet and that allows both
Derived classes inherit all of the member
cess) that interacts with the user, other ap- phone and data transmissions to share the
variables and methods of the base class
plications, and the database to capture and same line.
from which they are derived.
analyze data.
desktop As its name implies, the com- digital video disc (DVD) A method of op-
database query An inquiry the user poses tical storage for digital data that has greater
puter’s desktop puts at your fingertips all
to a database to extract a meaningful subset storage capacity than compact discs.
of the elements necessary for a productive
of data.
work session and that are typically found digital video editing software A program
database server A server that provides on or near the top of a traditional desk, for editing digital video.
client computers with access to information such as files and folders.
stored in a database. digital video interface (DVI) Video inter-
desktop computer A computer that is face technology that newer LCD monitors,
database software An electronic filing sys- intended for use at a single location. A as well as other multimedia devices such as
tem best used for larger and more compli- desktop computer consists of a case that televisions, DVD players, and projectors,
cated groups of data that require more than houses the main components of the com- use to connect to a PC.
one table and the ability to group, sort, and puter, plus peripheral devices.
retrieve data and generate reports. directory A hierarchical structure that
desktop publishing (DTP) software
include files, folders, and drives used to
date field A field in a database that holds Programs for incorporating and arranging
create a more organized and efficient
date data such as birthdays, due dates, and graphics and text to produce creative
computer.
so on. documents.
Disk Cleanup A Windows utility that
debugger A tool that helps programmers detail report A report generated with data removes unnecessary files from the hard
step through a program as it runs to locate from a database that shows the individual drive.
errors. transactions that occurred during a certain
time period. disk defragmenter A utility that regroups
debugging The process of repeatedly run- related pieces of files on the hard drive,
ning a program to find errors and to make device driver Software that facilitates the enabling faster retrieval of the data.
sure the program behaves in the way it communication between a device and the
should. operating system. distributed denial of service (DDoS) at-
tack An automated attack that is launched
decentralized A type of network in which Device Manager A feature in the Windows from more than one zombie computer at the
users are responsible for creating their own operating system that lets individuals view same time.
data backups and for providing security for and change the properties of all hardware
devices attached to the computer. Document Object Model (DOM) A means
their computers.
to organize objects and page elements
decision point A point at which a com- dial-up connection A connection to the In- in a Web page. DOM defines every item on
puter program must choose from a set of ternet using a standard telephone line. a Web page, such as graphics, tables, and
different actions based on the value of its dial-up modem A device that converts headers, as an object.
current inputs. (modulates) the digital signals the com- documentation A description of the
decision support system (DSS) A system puter understands to analog signals development and technical details of a
designed to help managers develop solu- that can travel over phone lines. The com- computer program, including how the code
tions for specific problems. puter on the other end also must have a works and how the user interacts with the
modem to translate (demodulate) the re- program.
dedicated server A server used to fulfill one ceived analog signal back to a digital signal
specific function (such as handling e-mail). that the receiving computer can domain name A part of a Uniform
understand. Resource Locator (URL). Domain names
default value The value a database will use consist of two parts: the site’s host and a
for a field unless the user enters another digital divide The discrepancy between suffix that indicates the type of organiza-
value. those who have access to the opportunities tion. (Example: popsci.com)

Glossary 651
eighth
EDITION
EIGHTH
8
Domain Name System (DNS) server A dynamic RAM (DRAM) The most basic Entertainment Software Rating Board
server that contains location information for type of random access memory (RAM); (ESRB) A self-regulatory body established
domains on the Internet and functions like used in older systems or in systems for in 1994 by the Entertainment Software As-
a phone book for the Internet. which cost is an important factor. DRAM sociation that rates computer and video
offers access times on the order of 60 games according to the age appropriateness
dotted decimal number (dotted quad) One
nanoseconds. of content.
of the numbers in an Internet Protocol (IP)
address. ergonomics How a user sets up his or her
drawing software (illustration software) E computer and other equipment to minimize
risk of injury or discomfort.
Programs for creating or editing two-
dimensional line-based drawings. e-commerce (electric commerce) The error handling In programming, the
process of conducting business online for instructions that a program runs if the
drive bay A special shelf inside a computer purposes ranging from fund-raising to ad- input data is incorrect or another error is
that is designed to hold storage devices. vertising to selling products. encountered.
drive-by download The use of malicious e-mail (electronic mail) Internet-based Error-Checking A Windows utility that
software to attack your computer by down- communication in which senders and recip- checks for lost files and fragments as well as
loading harmful programs onto your com- ients correspond. physical errors on a hard drive.
puter, without your knowledge, while you
are surfing a Web site. e-mail client A software program that runs Ethernet network A network that uses the
on a computer and is used to send and re- Ethernet protocol as the means (or stan-
DVD-RAM One of three competing ceive e-mail through the ISP’s server. dard) by which the nodes on the network
technologies for rewritable DVDs.
e-mail server A server that processes and communicate.
DVD-ROM DVD format in which data can delivers incoming and outgoing e-mail. Ethernet port A port that is slightly larger
only be read and not written.
e-mail virus A virus transmitted by than a standard phone jack and transfers
DVD-R/RW One of two recognized DVD e-mail that often uses the address book in data at speeds of up to 10,000 Mbps; used to
formats that enable you to read, record (R), the victim’s e-mail system to distribute connect a computer to a DSL or cable
and rewrite (RW) data on the disc. itself. modem or a network.

DVDⴙR/RW One of two recognized DVD editor A tool that helps programmers as event The result of an action, such as a key-
formats that enables you to both read, they enter code, highlighting keywords and stroke, mouse click, or signal to the printer,
record (R), and rewrite (RW) data on the alerting the programmers to typos. in the respective device (keyboard, mouse,
disc. or printer) to which the operating system
element The tags and the text between the responds.
dynamic addressing The process of tags in HyperText Markup Language
assigning Internet Protocol (IP) addresses (HTML). exception report A report that shows con-
when users log on using their Internet ditions that are unusual or that need atten-
service provider (ISP). The computer is embedded computer A specially designed tion by users of a system.
assigned an address from an available pool computer chip that resides inside another
device, such as a car. These self-contained executable program The binary sequence
of IP addresses.
computer devices have their own program- (code) that instructs the central processing
dynamic decision making A mechanism ming and typically neither receive input unit (CPU) to perform certain calculations.
that allows a Web page to decide how to from users nor interact with other expansion card (adapter card) A circuit
display itself, based on the choices the systems. board with specific functions that augment
reader makes as he or she looks at the page.
encryption The process of encoding data the computer’s basic functions and provide
Dynamic Host Configuration Protocol (ciphering) so that only the person with a connections to other devices; examples in-
(DHCP) The protocol that handles dy- corresponding decryption key (the in- clude the sound card and the video card.
namic addressing. Part of the Transmission tended recipient) can decode (or decipher) expert system A system designed to repli-
Control Protocol/Internet Protocol and read the message. cate the decision-making processes of
(TCP/IP) protocol suite, DHCP takes a pool
encryption virus A malicious program that human experts to solve specific problems.
of IP addresses and shares them with hosts
on the network on an as-needed basis. searches for common data files and com- export The process of putting data into an
presses them into a file using a complex en- electronic file in a format that another appli-
Dynamic HyperText Markup Language cryption key, thereby rendering the files cation can understand.
(DHTML or dynamic HTML) A combina- unusable.
tion of Web development technologies Extensible HyperText Markup Language
including HTML, cascading style sheets, and entertainment software Programs de- (XHTML) A standard established by the
a scripting language that are used to add in- signed to provide users with entertainment. World Wide Web Consortium (W3C) that
teractivity to a Web site after the Web site has Computer games make up the vast majority combines elements from both Extensible
been loaded onto the client computer. of entertainment software. Markup Language (XML) and

652 Technology in Action


eighth

EDITION
EIGHTH
8
HyperText Markup Language (HTML). field name An identifying name assigned FireWire 800 One of the fastest ports avail-
XHTML has much more stringent to each field in a database. able, moving data at 800 Mbps.
rules than HTML does regarding
field size The maximum number of firmware System software that controls
tagging.
characters (or numbers) that a field in a hardware devices.
Extensible Markup Language (XML) A database can contain.
first-generation language (1GL) The actual
language that enables designers to define
fifth-generation language (5GL) A machine language of a central processing
their own tags, making it much easier to
computer language that uses natural lan- unit (CPU); the sequence of bits—1s and
transfer data between Web sites and Web
guage processing or expert systems to 0s—that the CPU understands.
servers.
make the programming experience
better matched to human thinking flash drive A drive that plugs into a uni-
extension (file type) In a file name, the
processes. versal serial bus (USB) port on a computer
three letters that follow the user-supplied
and stores data digitally. Also called USB
file name after the dot (.); the extension
file A collection of related pieces of infor- drive, jump drive, or thumb drive.
identifies what kind of family of files the
mation stored together for easy reference; in
file belongs to, or which application should flash memory Portable, nonvolatile
database terminology, a file or table is a
be used to read the file. memory.
group of related records.
external data source Any source not flash memory card A form of portable stor-
file allocation table (FAT) An index of all
owned by the company that owns a deci- age; this removable memory card is often
sector numbers that the hard drive stores in
sion support system, such as customer de- used in digital cameras, portable media play-
a table to keep track of which sectors hold
mographic data purchased from third ers, and personal digital assistants (PDAs).
which files.
parties.
file compression utility A program that flat-panel monitor A type of monitor that
external hard drive An internal hard drive is lighter and more energy-efficient than a
takes out redundancies in a file to reduce
that is enclosed in a protective case to make CRT monitor; often used with portable
the file size.
it portable; the drive is connected to the computers such as notebooks.
computer with a data transfer cable and is file management The process by which hu-
often used to back up data. mans or computer software provide flowchart A visual representation of the
organizational structure to a computer’s patterns an algorithm comprises.
external SATA See eSata. contents. folder A collection of files stored on a com-
extranet The portion of a company’s in- file name The first part of the label applied puter.
tranet that is used to share business infor- to a file; it is generally the name a user as-
mation with business partners such as For Keyword in Visual Basic used with the
signs to the file when saving it. Next keyword to implement a loop.
vendors, suppliers, and customers.
file path The exact location of a file, foreign key The primary key of another
starting with the drive in which the file is database table that is included for purposes
F located, and including all folders, subfold- of establishing relationships with another
ers (if any), the file name, and the table.
Favorites A feature in Microsoft Internet extension. (Example: C:\Users\username\
Explorer that places a marker of a Web Documents\Illustrations\EBronte.jpg) fourth-generation language (4GL) A
site’s Uniform Resource Locator (URL) in sophisticated level of programming
an easily retrievable list in the browser’s file server A computer deployed to pro- language such as a report generator or
toolbar. (Called Bookmarks in some vide remote storage space or to act as a database query language.
browsers.) repository for files that users can access.
frame A container designed to hold
fiber-optic cable A cable that transmits File Transfer Protocol (FTP) A protocol multiple data packets.
data at close to the speed of light along used to upload and download files from
glass or plastic fibers. one computer to another over the Internet. freeware Any copyrighted software that
can be used for free.
Fiber-Optic Service (FiOS) Internet access financial planning software Programs for
that is enabled by transmitting data at the managing finances, such as Intuit’s Quicken front side bus (FSB) See local bus.
speed of light through glass or plastic and Microsoft Money, which include elec-
full installation The process of installing
fibers. tronic checkbook registers and automatic
all the files and programs from the
bill payment tools.
field A field where a category of informa- distribution CD to the computer’s
tion in a database is stored. Fields are dis- firewall A software program or hardware hard drive.
played in columns. device designed to prevent unauthorized
fuzzy logic A type of logic that allows
access to computers or networks.
field constraint Any property that must be the interjection of experiential learning
satisfied for an entry to be accepted into the FireWire 400 (IEEE 1394) An interface port into an equation by considering
database field. that transfers data at 400 Mbps. probabilities.

Glossary 653
eighth
EDITION
EIGHTH
8
G hibernate A power-management mode
that saves the current state of the current
HyperText Transfer Protocol (HTTP) The
protocol that allows files to be transferred
system to the computer’s hard drive. from a Web server so that you can see
gadget A mini-application that runs on the
them on your computer by using a
desktop, offering easy access to a frequently high-definition multimedia interface
browser.
used tool such as weather or a calendar (HDMI) A compact audio–video interface
item. standard that carries both high-definition HyperText Transfer Protocol Secure
video and uncompressed digital audio. (HTTPS) A combination of the HTTP pro-
gateway See wireless router.
tocol and a network security protocol (usu-
hoax An e-mail message or Web site that
gigabit Ethernet The most commonly used ally SSL or TLS) that ensure data is sent
contains information that is untrue, and is
wired Ethernet standard deployed in de- securely over the Web.
published with the purpose of deceiving
vices designed for home networks which
others. hyperthreading A technology that permits
provides bandwidth of up to 1 Gbps.
quicker processing of information by en-
home area network (HAN) A network
gigabyte (GB) About a billion bytes. abling a new set of instructions to start
located in a home that is used to connect all
executing before the previous set has
gigahertz (GHz) One billion hertz. of its digital devices.
finished.
Global Positioning System (GPS) A home network server A device designed to
system of 21 satellites (plus 3 working store media, share media across the net-
spares), built and operated by the U.S. work, and back up files on computers con- I
military, that constantly orbit the earth. nected to a home network.
They provide information to GPS-capable icon A picture on a computer display
home page The main or opening page of a that represents an object such as a software
devices to pinpoint locations on the earth.
Web site. application or a file or folder.
graphical user interface (GUI) Unlike the
host The portion of a domain name that identity theft The process by which
command- and menu-driven interfaces
identifies who maintains a given Web site. someone uses personal information about
used in earlier software, GUIs display
For example, berkeley.edu is the domain someone else (such as the victim’s name,
graphics and use the point-and-click
name for the University of California at address, and Social Security number) to
technology of the mouse and cursor,
Berkeley, which maintains that site. assume the victim’s identity for the purpose
making them much more user-friendly.
HTML tag The bracketed information that of defrauding others.
graphics processing unit (GPU) A special-
surrounds elements of a Web page in order if else In the programming language C⫹⫹,
ized logic chip that is dedicated to quickly
to convey information about them and de- keywords for a binary decision within an
displaying and calculating visual data such
fine how their content is to be displayed. algorithm.
as shadows, textures, and luminosity.
HTML/XHTML embedded scripting lan- image backup A copy of an entire
guage A client-side method of embedding computer system, created for restoration
H programming language code directly within purposes.
the HTML/XHTML code of a Web page.
hacker Anyone who unlawfully breaks image editing software (photo editing
into a computer system (whether an indi- hybrid topology A topology comprised of software) Programs for editing photo-
vidual computer or a network). several topologies and combined into one graphs and other images.
network.
handshaking The process of two comput- impact printer A printer that has tiny
ers exchanging control packets that set up hyperlink A type of specially coded text hammer-like keys that strike the paper
the parameters of a data exchange. that, when clicked, enables a user to jump through an inked ribbon, thus making a
from one location, or Web page, to another mark on the paper. The most common
hard drive A device that holds all perma- within a Web site or to another Web site impact printer is the dot-matrix printer.
nently stored programs and data; can be altogether.
located inside the system unit or attached incremental backup A type of backup
to the system unit via a USB port. hyperlink field A field in a database that that only backs up files that have
stores hyperlinks to Web pages. changed since the last time those files
hardware Any part of the computer you were backed up.
can physically touch. hypertext Text that is linked to other
documents or media (such as video clips or information Data that has been
head crash Impact of read/write head pictures). organized or presented in a meaningful
against magnetic platter of the hard drive; fashion.
often results in data loss. HyperText Markup Language (HTML) A
set of rules for marking up blocks of text so information system A system that includes
hexadecimal notation A number system that a Web browser knows how to display data, people, procedures, hardware, and
that uses 16 digits to represent numbers; them. It uses a series of tags that defines the software and that is used to gather and ana-
also called a base 16 number system. display of text on a Web page. lyze information.

654 Technology in Action


eighth

EDITION
EIGHTH
8
information technology (IT) The set of Internet Corporation for Assigned Names IP address See Internet Protocol address.
techniques used in processing and retriev- and Numbers (ICANN) The organization
ing information. responsible for allocating IP addresses to
inheritance The ability of a new class of
network administrators to ensure they are J
unique and have not been assigned to other
objects to pick up all of the data and meth- jam signal A special signal sent to all net-
users.
ods of an existing class automatically and work nodes, alerting them that a data colli-
then extend and customize those to fit its Internet exchange point A device that al- sion has occurred.
own specific needs. lows different Internet service providers to
exchange information between networks. Java A platform-independent program-
initial value A beginning point in a loop. ming language that Sun Microsystems in-
Internet Explorer (IE) A popular graphical troduced in the early 1990s. It quickly
inkjet printer A nonimpact printer that browser from Microsoft Corporation for dis-
sprays tiny drops of ink onto paper. became popular because its object-oriented
playing different Web sites, or locations, on model enables Java programmers to benefit
inoculation A process used by antivirus the Web; it can display pictures (graphics) in from its set of existing classes.
software; compares old and current quali- addition to text, as well as other forms of
ties of files to detect viral activity. multimedia such as sound and video. Java applet A small Java-based program.

Internet Protocol (IP) A protocol for send- Java Server Pages (JSP) An extension of
input device A hardware device used to
ing data between computers on the the Java servlet technology with dynamic
enter, or input, data (text, images, and
Internet. scripting capability.
sounds) and instructions (user responses
and commands) into a computer. Some Internet Protocol address (IP address) The JavaScript A scripting language often used
input devices are keyboards and mice. means by which all computers connected to to add interactivity to Web pages.
the Internet identify each other. It consists JavaScript is not as fully featured as Java,
input form A form that provides a view
of a unique set of four numbers separated but its syntax, keywords, data types, and
of the data fields to be filled in a database,
by dots such as 123.45.178.91. operators are a subset of Java’s.
with appropriate labels to assist database
users in populating the database. Internet Protocol version 4 (IPv4) The join query A database query that links (or
original IP addressing scheme. joins) two database tables using a common
instant messaging (IM) A program that en-
field in both tables and extracts the relevant
ables users to communicate online in real Internet Protocol version 6 (IPv6) A pro- data from each.
time with others who are also online. posed IP addressing scheme that makes IP
addresses longer, thereby providing more
integrated development environment
available IP addresses. It uses eight groups
(IDE) A development tool that helps pro-
of 16-bit numbers. K
grammers write, compile, and test their
programs. Internet Relay Chat (IRC) A means of syn- kernel (supervisor program) The essential
chronous group communication used in component of the operating system that is
integrated help Documentation for a responsible for managing the processor and
discussion forums.
software product that is built directly into all other components of the computer sys-
the software. Internet tablet A very light, portable tem. Because it stays in random access
computing device without a keyboard. memory (RAM) the entire time the com-
integrated software application A single
software program that incorporates the interpreter A software program that trans- puter is powered on, the kernel is called
most commonly used tools of many pro- lates source code into an intermediate form memory resident.
ductivity software programs. line by line. Each line is then executed as it kernel memory The memory that the com-
is translated. puter’s operating system uses.
internal hard drive A hard drive that is in-
stalled inside the system unit. interrupt A signal that tells the operating key pair A public and a private key
system that it is in need of immediate used for coding and decoding encrypted
Internet A network of networks that is the attention. messages.
largest network in the world, connecting
millions of computers from more than one interrupt handler A special numerical code keyboard A hardware device used to enter
hundred countries. that prioritizes requests from various devices. typed data and commands into a computer.
These requests then are placed in the interrupt
Internet backbone The main pathway of table in the computer’s primary memory. keystroke logger A type of spyware pro-
high-speed communications lines over gram that monitors keystrokes with the
which all Internet traffic flows. intranet A private corporate network that intent of stealing passwords, login IDs, or
is used exclusively by company employees credit card information.
Internet cache A section of your hard drive to facilitate information sharing, database
that stores information that you may need access, group scheduling, videoconferenc- keyword (1) A specific word a user wishes
again for surfing (such as IP addresses and ing, and other employee and customer to query (or look for) in an Internet search.
frequently accessed Web pages). collaborations. (2) A specific word that has a predefined

Glossary 655
eighth
EDITION
EIGHTH
8
meaning in a particular programming local area network (LAN) A network in users simultaneously and executes many
language. which the nodes are located within a small different programs at the same time.
geographic area.
kilobyte (KB) A unit of computer storage malware Software that is intended to
equal to approximately one thousand bytes. logic bomb A computer virus that runs render a system temporarily or perma-
when a certain set of conditions is met, such nently useless or to penetrate a computer
knowledge-based system A support as when specific dates are keyed off the system completely for purposes of informa-
system that provides additional intelligence computer’s internal clock. tion gathering. Examples include spyware,
that supplements the user’s own intellect
viruses, worms, and Trojan horses.
and makes a decision support system (DSS) logical error A mistake in the design and
more effective. planning of the algorithm itself rather than management information system (MIS) A
in the use of syntax in the coding. system that provides timely and accurate
information that enables managers to make
L logical port A virtual communications
gateway or path that enables a computer to critical business decisions.
large-scale networking (LSN) A program organize requests for information (such as many-to-many relationship A database re-
created by the U.S. government, the objec- Web page downloads and e-mail routing) lationship in which one record in a database
tive of which is to fund the research and from other networks or computers. table (A) can have many related records in
development of cutting-edge networking logical port blocking A condition in which another table (B), and any record in table B
technologies. Major goals of the program a firewall is configured to ignore all incom- can have many related records in table A.
are the development of enhanced wireless ing packets that request access to a certain
technologies and increased network mapping program Software that
port so that no unwanted requests will get provides street maps and written directions
throughput. through to the computer. to locations.
laser printer A nonimpact printer known loop An algorithm that performs a
for quick and quiet production and high- master boot record (MBR) A small
repeating set of actions. A logical yes/no program that runs whenever a computer
quality printouts. expression is evaluated. As long as the boots up.
Last Known Good Configuration A Win- expression evaluates to TRUE (yes), the
dows feature that starts the computer by algorithm will perform the same set media access control (MAC) address A
using the registry information that was of actions and continue to loop around. physical address, similar to a serial number
saved during the last shutdown. When the answer to the question is on an appliance, that is assigned to each
FALSE (no), the algorithm breaks free network adapter; it is made up of six 2-digit
latency The process that occurs after the of the looping structure and moves on to characters such as 01:40:87:44:79:A5.
read/write head of the hard drive locates the next step.
the correct track, and then waits for the cor- megabyte (MB) A unit of computer
rect sector to spin to the read/write head. storage equal to approximately 1 million
bytes.
legacy technology Comprises computing
devices, software, or peripherals that use
M megahertz (MHz) A measure of processing
techniques, parts, and methods from Mac OS The first commercially available speed equal to 1 million hertz.
an earlier time that are no longer operating system to incorporate a graphical memo field A text field in a database that
popular. user interface (GUI) with user-friendly is used to hold long pieces of text.
point-and-click technology.
library In Windows 7, a folder that is used
memory module (memory card) A small
to display files from different locations as if machine language A set of instructions circuit board that holds a series of random
they were all saved in a single folder, re- executed directly by the central processing access memory (RAM) chips.
gardless of where they are actually stored in unit (CPU).
the file hierarchy. menu A list of commands that displays on
macro A small program that groups a series the screen.
Linux An open source operating system of commands to run as a single command.
based on UNIX. Because of the stable na- menu-driven interface A user interface in
ture of this operating system, it is often macro virus A virus that is distributed by which the user chooses a command from
used on Web servers. hiding it inside a macro. menus displayed on the screen.
liquid crystal display (LCD) The massive multiplayer online role-playing metadata Data that describes other data.
technology used in flat-panel computer games (MMORPG) A gaming environ-
monitors. ment in which thousands of participants in- metasearch engine A metasearch engine,
teract in a virtual game world by assuming such as Dogpile, searches other search en-
live bookmark A bookmark that delivers roles of fictitious characters. gines rather than individual Web sites.
updates to you as soon as they become
available, using Really Simple Syndication mainframe A large, expensive computer method (behavior) An action associated
(RSS). that supports hundreds or thousands of with a class of objects.

656 Technology in Action


eighth

EDITION
EIGHTH
8
metropolitan area network (MAN) A wide multimedia Anything that involves one or natural language processing (NLP) system
area network (WAN) that links users in a more forms of media plus text. A system that enables users to communi-
specific geographic area (such as within a cate with computer systems using a natural
multimedia message service (MMS) An
city or county). spoken or written language as opposed to
extension of short message service (SMS)
using computer programming languages.
microbrowser Software that makes it that enables messages that include text,
possible to access the Internet from a sound, images, and video clips to be sent negative acknowledgment (NAK) What
PDA/smartphone. from a cell phone or PDA to other phones computer Y sends to computer X if a packet
or e-mail addresses. is unreadable, indicating the packet was not
microphone (mic) A device that allows you
received in understandable form.
to capture sound waves, such as those cre- multimedia software Programs that
ated by your voice, and transfer them to include image, video, and audio editing netbook A computing device that runs a
digital format on your computer. software, animation software, and other full-featured operating system but weighs
specialty software required to produce two pounds or less.
Microsoft Disk Operating System (MS- computer games, animations, and movies.
DOS) A single-user, single-task operating netiquette The general rules of etiquette
system created by Microsoft. MS-DOS was multipartite virus Literally meaning “mul- for Internet chat rooms and other online
the first widely installed operating system tipart” virus; a type of computer virus that communication.
in personal computers. attempts to infect both the boot sector and
network A group of two or more comput-
executable files at the same time.
mobile switching center A central location ers (or nodes) that are configured to share
that receives cell phone requests for service multiplayer online game An online game information and resources such as printers,
from a base station. in which play occurs among hundreds or files, and databases.
thousands of other players over the Internet
model management system A type of soft- network adapter A device that enables the
in a persistent or ever-on game environ-
ware that assists in building management computer (or peripheral) to communicate
ment. In some games, players can interact
models in decision support systems (DSSs). with the network using a common data
with other players through trading, chat-
communication language, or protocol.
modem A communication device that ting, or playing cooperative or combative
works to translate digital data into an ana- mini-games. network address translation (NAT) A
log signal and back again. process that firewalls use to assign internal
Multiple Input Multiple Output (MIMO)
Internet Protocol (IP) addresses on a
modem card An expansion card that pro- A design in newer routers that provides for
network.
vides the computer with a connection to the faster wireless data transmission by utiliz-
Internet via conventional phone lines. ing more than one antenna to transmit and network administrator Someone who
receive data. has training in computer and peripheral
modem port A port that uses a traditional maintenance and repair, network design,
telephone signal to connect a computer to multipurpose Internet mail extensions
and the installation of network software;
the Internet. (MIME) A specification that was intro-
installs new equipment, configures comput-
duced in 1991 to simplify attachments to
monitor (display screen) A common out- ers for users, repairs equipment, and
e-mail messages. All e-mail client software
put device that displays text, graphics, and assigns network access to users.
now uses this protocol for attaching files.
video as soft copies (copies that can be seen network architecture The design of a com-
only on screen). multitask The ability of an operating system
puter network; includes both physical and
to perform more than one process at a time.
Moore’s Law A prediction, named after logical design.
Gordon Moore, the cofounder of Intel; multiuser operating system (network
network-attached storage (NAS) device A
states that the number of transistors on a operating system) An operating system
specialized computing device designed to
CPU chip will double every two years. (OS) that enables more than one user to
store and manage network data.
access the computer system at one time by
motherboard A special circuit board in the efficiently juggling all the requests from network interface card (NIC) An expan-
system unit that contains the central pro- multiple users. sion card that enables a computer to connect
cessing unit (CPU), the memory (RAM) other computers or to a cable modem to
chips, and the slots available for expansion facilitate a high-speed Internet connection.
cards; all of the other boards (video cards,
sound cards, and so on) connect to it to N network navigation device A device on a
receive power and to communicate. network such as a router, hub, and switch
nanoscience The study of molecules and that moves data signals around the
mouse A hardware device used to enter user nanostructures whose size ranges from 1 to network.
responses and commands into a computer. 100 nanometers (one billionth of a meter).
network operating system (NOS) Software
multidimensional database A database nanotechnology The science of using that handles requests for information,
that stores data in multiple dimensions and nanostructures to build devices on an ex- Internet access, and the use of peripherals
is organized in a cube format. tremely small scale. for the rest of the network nodes.

Glossary 657
eighth
EDITION
EIGHTH
8
network prefix The part of a network object-oriented analysis An approach management of hardware, peripherals, and
address under the CIDR IP addressing to software design that differs from the software.
scheme. It consists of a slash and a number traditional “top-down” design. In object-
operator Any of the coding symbols that
added to the end of the last octet in an IP oriented (OO) analysis, programmers first
represent the fundamental actions of a
address. identify all of the classes (collections of data
computer language.
and methods) that are required to describe
network topology The layout and struc-
completely the problem the program is optical carrier line See OC (optical carrier)
ture of the network.
trying to solve. line.
network-ready device A device (such as
object-oriented database A database that optical drive A hardware device that
a printer or external hard drive) that can be
stores data in objects, not in tables. uses lasers or light to read from, and
attached directly to a network instead of
maybe even write to, CDs, DVDs, or
needing to attach to a computer on the object query language (OQL) A query lan-
Blu-ray discs.
network. guage that is used to extract information
from an object-oriented database. optical media Portable storage devices,
newsgroup A method of communication,
octet Eight bits. For example, each of the such as CDs, DVDs, and Blu-ray discs, that
similar to a discussion group or forum, in
four numbers in the dotted decimal nota- use a laser to read and write data.
which people create threads, or conversa-
tions. In a thread, a newsgroup member tion of an Internet Protocol (IP) address is optical mouse A mouse that uses an
will post messages and read and reply to represented by an octet. internal sensor or laser to control the
messages from other members of the mouse’s movement. The sensor sends
office support system (OSS) A system
newsgroup. signals to the computer, telling it where
(such as Microsoft Office) designed to assist
employees in accomplishing their day-to- to move the pointer on the screen.
Next In the Visual Basic programming lan-
guage, the keyword used to implement a day tasks and to improve communications. organic light-emitting diode (OLED) dis-
loop. play A display that uses organic com-
offshore The process of sending jobs for-
merly performed in the U.S. to other pounds to produce light when exposed to
node A device connected to a network such
countries. an electric current. Unlike LCDs, OLEDs do
as a computer, a peripheral (such as a
not require a backlight to function and
printer), or a communications device (such
one-to-many relationship A database rela- therefore draw less power and have a
as a modem).
tionship in which one record in a data table much thinner display, sometimes as thin
nonimpact printer A printer that sprays can have many related records in another as 3 mm.
ink or uses laser beams to make marks on data table.
output device A device that sends
the paper. The most common nonimpact
one-to-one relationship A database rela- processed data and information out of a
printers are inkjet and laser printers.
tionship in which one record in a data table computer in the form of text, pictures
nonvolatile storage Permanent storage, as has only one related record in another data (graphics), sounds (audio), or video.
in read-only memory (ROM). table.

normalization The process of recording online mapping service An alternative to


data only once in a database to reduce data more traditional mapping software pro-
grams; easily accessible with any Internet
P
redundancy.
connection and updated more frequently P2P network See peer-to-peer network.
notebook computer A small, compact than offline services. Examples include
portable computer. MapQuest, Yahoo! Maps, Google Maps, P2P sharing See peer-to-peer sharing.

numeric check A data validation routine and Google Earth. packet (data packet) A small segment of
that confirms that only numbers are entered online transaction processing (OLTP) The data that is bundled for sending over trans-
in a database field. immediate processing of user requests or mission media. Each packet contains the ad-
transactions. dress of the computer or peripheral device
numeric field A field in a database that to which it is being sent.
stores numbers. open source software Program code made
publicly available for free; it can be copied, packet filtering A feature found in fire-
distributed, or changed without the strin- walls that filters out unwanted data packets
O gent copyright protections of proprietary sent to specific logical ports.
software products.
object A variable in a program that is an packet screening A process that involves
example of a class. Each object in a specific open system A system whose designs examining incoming data packets to ensure
class is constructed from similar data and are public, enabling access by any inter- they originated from, or are authorized by,
methods. ested party. valid users on the internal network.

object field A field in a database that holds operating system (OS) The system soft- packet sniffer A program that looks at
objects such as pictures, video clips, or en- ware that controls the way in which a com- (sniffs) each data packet as it travels on the
tire documents. puter system functions, including the Internet.

658 Technology in Action


eighth

EDITION
EIGHTH
8
packet switching A communications Outlook or Lotus Organizer that strive to podcast A clip of audio or video content
methodology in which data is broken into replace the various management tools that is broadcast over the Internet using
small chunks (called packets) and sent over found on a traditional desk such as a compressed audio or video files in formats
various routes at the same time. When the calendar, address book, notepad, and such as MP3.
packets reach their destination, they are re- to-do lists.
point of presence (POP) A bank of
assembled by the receiving computer.
pharming Planting malicious code on a modems through which many users can
paging The process of swapping data or in- computer that alters the browser’s ability to connect to an Internet service provider (ISP)
structions that have been placed in the find Web addresses and directs users to simultaneously.
swap file for later use back into active ran- bogus Web sites.
polymorphic virus A virus that changes its
dom access memory (RAM). The contents
phishing The process of sending e-mail virus signature (the binary pattern that
of the hard drive’s swap file then become
messages to lure Internet users into reveal- makes the virus identifiable) every time it
less active data or instructions.
ing personal information such as credit card infects a new file. This makes it more diffi-
Pascal The only modern computer lan- or Social Security numbers or other sensi- cult for antivirus programs to detect the
guage that was specifically designed as a tive information that could lead to identity virus.
teaching language; it is seldom taught now theft.
port An interface through which external
at the college level.
PHP (Hypertext Preprocessor) A scripting devices are connected to the computer.
passive topology When data merely trav- language used to produce dynamic Web
portability The capability to move a
els the entire length of the communications pages.
completed solution easily from one type of
medium and is received by all network
physical memory The amount of random computer to another.
devices.
access memory (RAM) that is installed in a
portable media player (PMP) A small
path (subdirectory) The information after computer.
portable device (such as an iPod) that
the slash indicates a particular file or path
piggybacking The process of connecting to enables you to carry your MP3s or other
(or subdirectory) within the Web site.
a wireless network without the permission media files around with you.
path separator The backslash mark (\) of the owner of the network. positive acknowledgment (ACK) What
used by Microsoft Windows and DOS in file computer Y sends when it receives a data
names. Mac files use a colon (:), and UNIX pixel A single point that creates the images
on a computer monitor. Pixels are packet that it can read from computer X.
and Linux use the forward slash (/) as the
path separator. illuminated by an electron beam that passes possessed object Any object that a user
rapidly back and forth across the back of carries to identify him- or herself and that
patient simulator A computer-controlled the screen so that the pixels appear to glow grants the user access to a computer system
mannequin that simulates human body continuously. or computer facility.
functions and reactions. Patient simulators
are used in training doctors, nurses, and platform The combination of a computer’s power supply A power supply regulates
emergency services personnel by simulat- operating system and processor. The two the wall voltage to the voltages required by
ing dangerous situations that would put most common platform types are the PC computer chips; it is housed inside the
live patients at risk. and the Apple Macintosh. system unit.

peer-to-peer (P2P) network A network in platter A thin, round, metallic storage plate power-on self-test (POST) The first job the
which each node connected to the network stacked onto the hard drive spindle. basic input/output system (BIOS) per-
can communicate directly with every other player See plug-in. forms, ensuring that essential peripheral
node on the network. devices are attached and operational. This
plotter A large printer that uses a computer- process consists of a test on the video card
peer-to-peer (P2P) sharing The process of controlled pen to produce oversize pictures and video memory, a BIOS identification
users transferring files between computers. that require precise continuous lines to be process (during which the BIOS version,
peripheral device A device such as a moni- drawn, such as maps and architectural manufacturer, and data are displayed
tor, printer, or keyboard that connects to the plans. on the monitor), and a memory test to
system unit through ports. ensure memory chips are working
Plug and Play (PnP) The technology that
properly.
enables the operating system, once it is
personal area network (PAN) A network
booted up, to recognize automatically any preemptive multitasking When the oper-
used to connect wireless devices (such as
new peripherals and configure them to ating system processes the task assigned a
Bluetooth-enabled devices) in close proxim-
work with the system. higher priority before processing a task that
ity to each other.
has been assigned a lower priority.
plug-in (player) A small software program
personal firewall A firewall specifically
that “plugs in” to a Web browser to enable presentation software An application
designed for home networks.
a specific function—for example, to view program for creating dynamic slide shows
personal information manager (PIM) and hear certain multimedia files on the such as Microsoft PowerPoint or Apple
software Programs such as Microsoft Web. Keynote.

Glossary 659
eighth
EDITION
EIGHTH
8
pretexting The act of creating an invented programming The process of translating a recipient decodes the message with a
scenario (the pretext) to convince someone task into a series of commands a computer private key.
to divulge information. will use to perform that task.
Pretty Good Privacy (PGP) A popular programming language A kind of “code”
for the set of instructions the central pro-
Q
public-key encryption package.
cessing unit (CPU) knows how to perform. quarantining The placement (by antivirus
primary key (key field) The unique field
software) of a computer virus in a secure
that each database record in a table must projector A device that can project images
area on the hard drive so that it won’t
have. from your computer onto a wall or viewing
spread infection to other files.
screen.
print queue A software holding area for
query The process of requesting informa-
printing jobs. project management software An applica-
tion from a database.
tion program, such as Microsoft Project, that
print server A server that manages all helps project managers generate charts and query language A language used to
client-requested printing jobs for all print- tables used to manage aspects of a project. retrieve and display records. A query
ers on the network.
language consists of its own vocabulary
protocol (1) A set of rules for exchanging
printer A common output device that and sentence structure, used to frame the
data and communication. (2) The first part
creates tangible or hard copies of text and requests.
of the Uniform Resource Locator (URL)
graphics.
indicating the set of rules used to retrieve QWERTY keyboard A keyboard that gets
private key One-half of a pair of binary the specified document. The protocol is its name from the first six letters on the top-
files that is needed to decrypt an encrypted generally followed by a colon; two forward left row of alphabetic keys on the keyboard.
message. The private key is kept only by slashes; www (indicating World Wide Web);
the individual who created the key pair and and then the domain name.
is never distributed to anyone else. The
prototype A small model of a computer
R
private key is used to decrypt messages
program, often built at the beginning of a radio frequency identification tag (RFID
created with the corresponding public key.
large project. tag) A tag that looks like a sticker or label,
private-key encryption A procedure in is attached to a batch of merchandise, and
proprietary software Custom software ap-
which only the two parties involved in contains a microchip that holds a unique
plication that is owned and controlled by
sending a message have the code. This sequence of numbers used to identify the
the company that created it.
could be a simple shift code where letters product to which it is attached.
of the alphabet are shifted to a new proprietary system A software product
position. random access memory (RAM) The
whose code is not generally available (is
computer’s temporary storage space or
problem statement A clear description of kept private) and that is generally devel-
short-term memory. It is located in a set of
which tasks the computer program must oped and marketed by a single company.
chips on the system unit’s motherboard,
accomplish and how the program will exe- proxy server Acts as a go-between for com- and its capacity is measured in megabytes
cute these tasks and respond to unusual puters on the internal network and the ex- or gigabytes.
situations. It is the starting point of pro- ternal network (the Internet).
gramming work. range check A type of data validation used
pseudocode A text-based approach to doc- in databases to ensure that a value entered
processing Manipulating or organizing umenting an algorithm. falls within a specified range (such as re-
data into information. quiring a person’s age to fall in a range of
public domain The status of software (or
productivity software Programs that en- between 1 and 120).
other created works) that are not protected
able a user to perform various tasks gener-
by copyright. rapid application development (RAD) A
ally required in home, school, and business.
method of system development in which
Examples include word processing, spread- public key One-half of a pair of binary files
developers create a prototype first, generat-
sheet, presentation, personal information that is needed to decrypt an encrypted mes-
ing system documents as they use and
management (PIM), and database programs. sage. After creating the keys, the user dis-
remodel the product.
tributes the public key to anyone he wishes
program A series of instructions to be fol-
to send him encrypted messages. A mes- read/write head The mechanism that re-
lowed by a computer to accomplish a task.
sage encrypted with a public key can be un- trieves (reads) and records (writes) the
program development life cycle (PDLC) A encrypted only using the corresponding magnetic data to and from a data disk. They
number of stages, from conception to final private key. move from the outer edge of the spinning
deployment, which a programming project platters to the center, up to 50 times per
follows. public-key encryption A procedure in
second.
which the key for coding is generally dis-
program file A file that is used in the run- tributed as a public key that may be placed read-only memory (ROM) A set of
ning of software programs and does not on a Web site. Anyone wishing to send a memory chips, located on the motherboard,
store data. message codes it using the public key. The which stores data and instructions that

660 Technology in Action


eighth

EDITION
EIGHTH
8
cannot be changed or erased; it holds all the the smoother moving images will appear script kiddy An amateur hacker who lacks
instructions the computer needs to start up. on the monitor. sophisticated computer skills. These individ-
uals are typically teenagers, who don’t create
real-time operating system (RTOS) A pro- reusability The ability to reuse existing
programs used to hack into computer systems
gram with a specific purpose that must classes of objects from other projects, en-
but instead use tools created by skilled hack-
guarantee certain response times for partic- abling programmers to produce new code
ers that enable unskilled novices to wreak the
ular computing tasks, or else the machine’s quickly.
same havoc as professional hackers.
application is useless. Real-time operating
ribbon A group of icons collected for easy
systems are found in many types of robotic scripting language A simple programming
access.
equipment. language that is limited to performing a
ring (loop) topology A network configura- specific set of specialized tasks.
real-time processing The process of
tion in which the computers and peripher-
updating a database (or information scrollbar On the desktop, the bar that
als are laid out in a configuration
system) immediately as changes are made. appears at the side or bottom of the window
resembling a circle. Data flows around the
and controls which part of the information
Really Simple Syndication (RSS) circle from device to device in one direction
is displayed on the screen.
technology An XML-based format that al- only.
lows frequent updates of content on the search engine A set of programs that
World Wide Web. root directory The top level of the filing
searches the Web for specific words (or key-
structure in a computer system. In Win-
words) you wish to query (or look for) and
record A collection of related fields in a dows computers, the root directory of the
then returns a list of the Web sites on which
database. hard drive is represented as C:\.
those keywords are found.
Recycle Bin A folder on a Windows desk- root DNS server A group of servers main-
second-generation language (2GL) Also
top in which deleted files from the hard tained throughout the Internet to which ISP
known as an assembly language. Second-
drive are held until permanently purged Web servers connect to locate the master
generation languages deal directly with
from the system. listings for an entire top-level domain.
system hardware but provide acronyms
referential integrity For each value in the router A device that routes packets of data that are easier for human programmers to
foreign key of one table, there is a corre- between two or more networks. work with.
sponding value in the primary key of the
runtime error An error in the problem second-level domain A domain that falls
related table.
logic that is only caught when the program within top-level domains of the Internet.
register A special memory storage area executes. Each second-level domain needs to be
built into the central processing unit (CPU). unique within that particular domain but
not necessarily unique to all top-level
registry A portion of the hard drive con-
taining all the different configurations
S domains.

(settings) used by the Windows operating sector A section of a hard drive platter,
Safe mode A special diagnostic mode de-
system (OS) as well as by other wedge-shaped from the center of the platter
signed for troubleshooting errors that occur
applications. to the edge.
during the boot process.
relation A database table that contains re- Secure Sockets Layer (SSL) A protocol that
sampling rate The number of times per
lated data. provides for the encryption of data trans-
second a signal is measured and converted
mitted using the Internet. The current ver-
relational algebra The use of English-like to a digital value. Sampling rates are meas-
sions of all major Web browsers support
expressions that have variables and opera- ured in kilobits per second.
SSL.
tions, much like algebraic equations. satellite Internet A way to connect to the
seek time The time it takes for the hard
relational database A database that organ- Internet using a small satellite dish, which
drive’s read/write heads to move over the
izes data in table format by logically group- is placed outside the home and is connected
surface of the disk, between tracks, to the
ing similar data into relations (or tables) to a computer with coaxial cable. The
correct track.
that contain related data. satellite company then sends the data to a
satellite orbiting the Earth. The satellite, in select query A query that displays a subset
relationship In relational databases, the turn, sends the data back to the satellite of data from a table based on the criteria the
link between tables that defines how the dish and to the computer. user specifies.
data are related.
scalability The ability to easily add more Serial Advanced Technology Attachment
resolution The clearness or sharpness of an users to a network without affecting the (Serial ATA) A type of hard drive that uses
image, which is controlled by the number of performance of the other network nodes much thinner cables, and can transfer data
pixels displayed on the screen. (computers or peripherals). more quickly, than IDE drives.
response time The measurement (in mil- script A list of commands (mini-programs server A computer that provides
liseconds) of the time it takes for a pixel to or macros) that can be executed on a com- resources to other computers on a
change color; the lower the response time, puter without user interaction. network.

Glossary 661
eighth
EDITION
EIGHTH
8
server-side program A program that is run software license An agreement between spyware An unwanted piggyback program
on a Web server as opposed to inside a Web the user and the software developer that that downloads with the software you want
browser. must be accepted before installing the to install from the Internet and then runs in
software on a computer. the background of your system.
service set identifier (SSID) A network
name that wireless routers use to identify software piracy Violating a software li- star topology An active topology (meaning
themselves. cense agreement by copying an application that data is retransmitted) in which the
onto more computers than the license nodes connect to a central communications
shareware Software that enables users to
agreement permits. device called a switch. The switch receives a
“test” the software by running it for a lim-
signal from the sending node and retrans-
ited time free of charge. software suite A collection of software pro- mits it to the node that should receive it.
grams that have been bundled together as a
shielded twisted pair (STP) cable Twisted
package. statement A sentence in programming
pair cable that contains a layer of foil
code.
shielding to reduce interference. software update (service pack) A down-
loadable software module that repairs static addressing A means of assigning an
short message service (SMS) Technology
errors identified in commercial program Internet Protocol (IP) address that never
that enables short text messages (up to 160
code. changes and is most likely assigned manu-
characters) to be sent over mobile networks.
ally by a network administrator.
solid state drive (SSD) A drive that uses
simple mail transfer protocol (SMTP) A stealth virus A virus that temporarily
the same kind of memory that flash drives
protocol for sending e-mail along the Inter- erases its code from the files where it re-
use, but can reach data in only a tenth of the
net to its destination. sides and hides in the active memory of the
time a flash drive requires.
simulation software Software, often used computer.
for training purposes, which allows the user sort (index) The process of organizing a
database into a particular order. streaming audio Technology that
to experience or control an event as if it is
enables audio files to be fed to a browser
reality. sound card An expansion card that at- continuously. This lets users avoid
sleep mode A low-power mode for elec- taches to the motherboard inside the system having to download an entire file before
tronic devices such as computers that unit and that enables the computer to pro- listening.
saves electric power consumption and duce sounds by providing a connection for
the speakers and microphone. streaming video Technology that enables
saves your computer settings where you
video files to be fed to a browser continu-
left off. When the computer is “woken
source code The instructions programmers ously. This lets users avoid having to
up,” you can resume working more
write in a higher-level language. download the entire file before viewing.
quickly than when cold booting the
computer. spam Unwanted or junk e-mail. structured (analytical) data Data that can
be identified and classified as discrete bits
smartphone A device that combines the spam filter An option you can select in of information (such as a name or phone
functionality of a cell phone, a PMP, and a your e-mail account that places known or number). Unstructured data includes non-
PDA into one unit. suspected spam messages into a folder traditional data such as audio clips (includ-
other than your inbox. ing MP3 files), video clips, and pictures that
social bookmark (tag) A keyword or term
that Internet users assign to a Web resource speaker An output device for sound. must be viewed in their entirety rather than
such as a Web page, digital image, or video. in discrete segments.
speech-recognition software (voice-
social engineering Any technique that recognition software) Software that structured query language (SQL) The
uses social skills to generate human interac- translates spoken words into typed text. most popular database query language
tion for the purpose of enticing individuals today.
to reveal sensitive information. spider A program that constantly collects
information on the Web, following links in stylus A pen-shaped device used to tap or
social networking A means by which peo- Web sites and reading Web pages. Spiders write on touch-sensitive screens.
ple use the Internet to communicate and get their name because they crawl over the subject directory A structured outline of
share information among their immediate Web using multiple “legs” to visit many Web sites organized by topics and
friends, and meet and connect with others sites simultaneously. subtopics.
through common interests, experiences, and
friends. spooler A program that helps coordinate summary report A report that summarizes
all print jobs being sent to the printer at the data in some fashion (such as a total of the
software The set of computer programs or same time. day’s concession sales at an amusement
instructions that tells the computer what to park). Also known as a summary data
do and enables it to perform different tasks. spreadsheet software An application pro-
report.
gram such as Microsoft Excel or Lotus 1-2-3
Software as a Service (SaaS) Software that that enables a user to do calculations and supercomputer A specially designed
is delivered on demand over the Internet. numerical analyses easily. computer that can perform complex

662 Technology in Action


eighth

EDITION
EIGHTH
8
calculations extremely rapidly; used in situ- system file Any of the main files of an tax preparation software An application
ations in which complex models requiring operating system. program, such as Intuit’s TurboTax or H&R
intensive mathematical calculations are Block’s TaxCut, for preparing state and fed-
needed (such as weather forecasting or system requirements The set of minimum eral taxes. Each program offers a complete
atomic energy research). storage, memory capacity, and processing set of tax forms and instructions as well as
standards recommended by the software expert advice on how to complete each
surge protector A device that protects com- manufacturer to ensure proper operation of form.
puters and other electronic devices from a software application.
power surges. TCP/IP The main suite of protocols used
System Restore A utility in Windows that on the Internet.
surround sound A type of audio restores system settings to a specific previ-
processing that makes the listener experi- ous date when everything was working telephony The use of equipment to pro-
ence sound as if it were coming from all properly. vide voice communications over a distance.
directions.
system restore point In Windows, a snap- Telnet A network protocol used primarily
surround-sound speakers Speaker systems shot of your entire system’s settings used on the Internet for connecting to a remote
set up in such a way that they surround an for restoring your system to a prior point in computer to make it accessible to other
entire area (and the people in it) with time. computers.
sound.
system software The set of programs that template A form included in many produc-
S-video (super video) A type of technology enables a computer’s hardware devices and tivity applications that provides the basic
used to transmit video signals; used on application software to work together; it structure for a particular kind of document,
newer LCD monitors, as well as other mul- includes the operating system and utility spreadsheet, or presentation.
timedia devices such as televisions, DVD programs.
terabyte 1,099,511,627,776 bytes or 240
players, and projectors.
system unit The metal or plastic case bytes.
swap file (page file) A temporary storage that holds all the physical parts of the com-
terminator A device that absorbs a signal
area on the hard drive where the operating puter together, including the computer’s
so that it is not reflected back onto parts of
system “swaps out” or moves the data or processor (its brains), its memory, and the
the network that have already received it.
instructions from random access memory many circuit boards that help the computer
(RAM) that have not recently been used. function. test condition A check to see whether a
This process takes place when more RAM loop is completed.
space is needed.
switch A device for transmitting data on a
T testing plan In the problem statement, a
plan that lists specific input numbers that
network. A switch makes decisions, based the program would typically expect the
T line A high-speed fiber-optic communi-
on the media access control (MAC) address user to enter. It then lists the precise output
cations line that is designed to provide
of the data, as to where the data is to be values that a perfect program would return
much higher throughput than conventional
sent. for those input values.
voice (telephone) and data (DSL or cable)
syncing (or synchronizing) The process of lines. text field A database field that can hold
updating data on portable devices (such as any combination of alphanumeric data
table In database terminology, a group of
a cell phone or iPod) and computer so that (letters or numbers) and is most often used
related records. Also called a file.
they contain the same data. to hold text.
Tablet PC A notebook computer designed thermal printer A printer that works either
syntax An agreed-upon set of rules defin- specifically to work with handwriting
ing how a programming language must be by melting wax-based ink onto ordinary
recognition technology. paper (in a process called thermal wax trans-
structured.
Task Manager utility A Windows utility fer printing) or by burning dots onto spe-
syntax error An error that violates the that shows programs currently running cially coated paper (in a process called direct
strict, precise set of rules that defines a and permits you to exit nonresponsive thermal printing).
programming language. programs when you click End Task. third-generation language (3GL, or high-
system development life cycle (SDLC) An Task Scheduler utility A Windows level language) A computer language that
organized process (or set of steps) for devel- utility that enables you to schedule tasks uses symbols and commands to help pro-
oping an information processing system. to run automatically at predetermined grammers tell the computer what to do.
times with no interaction necessary on thrashing A condition of excessive paging
system evaluation The process of looking
your part. in which the operating system becomes
at a computer’s subsystems, what they do,
and how they perform to determine taskbar In later versions of Windows sluggish.
whether the computer system has the right operating systems, a feature that displays three-way handshake A process used by
hardware components to do what the user open and favorite applications for easy the Transmission Control Protocol (TCP) to
ultimately wants it to do. access. establish a connection.

Glossary 663
eighth
EDITION
EIGHTH
8
throughput The actual speed of data trans- transmission media The radio waves or urban legend A hoax that becomes so well
fer that is achieved. It is usually less than cable that transport data on a network. known that it is accepted by society as true
the data transfer rate and is measured in even though it is false. Also known as an
Transport Layer Security (TLS) A protocol
megabits per second (Mbps). urban myth.
that provides data integrity and security for
time bomb A virus that is triggered by the transmissions over the Internet. USB 2.0 port An external bus that supports a
passage of time or on a certain date. data throughput of 480 Mbps; these buses are
Trojan horse A computer program that
backward compatible with buses using the
time-variant data Data that doesn’t all per- appears to be something useful or desirable
original universal serial bus (USB) standard.
tain to one period in time—for example, (such as a game or a screen saver), but at
data in a data warehouse. the same time does something malicious User Datagram Protocol (UDP) A protocol
in the background without the user’s that prepares data for transmission but that
token method The access method that ring
knowledge. has no resending capabilities.
networks use to avoid data collisions.
twisted pair cable Cables made of copper user interface Part of the operating system
toolbar A group of icons collected for easy
wires that are twisted around each other that enables individuals to interact with the
access.
and are surrounded by a plastic jacket (such computer.
top-down design A systematic approach in as traditional home phone wire).
utility program A small program that
which a programming problem is broken
performs many of the general housekeep-
down into a series of high-level tasks.
ing tasks for the computer, such as system
top-level domain (TLD) The suffix, often U maintenance and file compression.
of three letters, in the domain name (such as
ubiquitous computing The condition in
.com or .edu) that indicates the kind of
which computing is so woven into the
organization the host is.
fabric of everyday life that it becomes indis-
touch screen A type of monitor (or display tinguishable from it. V
in a notebook or PDA) that accepts input
Uniform Resource Locator (URL) A Web validation The process of ensuring that
from a user touching the screen.
site’s unique address; an example is data entered into a database is correct (or at
touchpad A small, touch-sensitive screen at microsoft.com. least reasonable) and complete.
the base of a notebook keyboard. To use the
touchpad, you simply move your finger uninterruptible power supply (UPS) A de- validation rule A rule that is set up in a
across the pad to direct the cursor. vice designed to power a computer from database to alert the user to possible wrong
large batteries for a brief period during a entries.
track A concentric circle that serves as a loss of electrical power.
storage area on a hard drive platter. variable A name or symbol that stands for
universal serial bus (USB) port A port that a value.
trackball mouse A mouse with a rollerball can connect a wide variety of peripheral de-
on top instead of on the bottom. Because variable declaration A line of program-
vices to the computer, including keyboards,
you move the trackball with your fingers, it ming code that alerts the operating system
printers, mice, smartphones, PDAs, flash
doesn’t require much wrist motion, so it’s that the program needs to allocate storage
drives, and digital cameras.
considered healthier for your wrists than a space in random access memory (RAM) for
traditional mouse. UNIX An operating system originally con- the variable.
ceived in 1969 by Ken Thompson and Den-
trackpoint device A small, joystick-like VBScript A subset of Visual Basic; also
nis Ritchie of AT&T’s Bell Labs. In 1974, the
nub that enables you to move the cursor used to introduce interactivity to Web
UNIX code was rewritten in the standard
with the tip of your finger. pages.
programming language C. Today there are
transaction processing system (TPS) A various commercial versions of UNIX. vertical market software Software that is
system used to keep track of everyday developed for and customized to a specific
unshielded twisted pair (UTP) cable The
business activities (such as sales of industry’s needs (such as a wood inventory
most popular transmission media option
products). system for a sawmill) as opposed to
for Ethernet networks. UTP cable is com-
software that is useful across a range of
transceiver In a wireless network, a device posed of four pairs of wires that are twisted
industries (such as word processing
that translates the electronic data that needs around each other to reduce electrical
software).
to be sent along the network into radio interference.
waves and then broadcasts these video blog See video log.
unstructured data Nontraditional database
radio waves to other network nodes.
data such as audio clips (including MP3 video card (video adapter) An expansion
Transmission Control Protocol (TCP) A files), video clips, pictures, and extremely card that is installed inside a system unit to
protocol that prepares data for transmission large documents. Data of this type is known translate binary data (the 1s and 0s the com-
and provides for error checking and resend- as a binary large object (BLOB) because it is puter uses) into the images viewed on the
ing lost data. actually encoded in binary form. monitor.

664 Technology in Action


eighth

EDITION
EIGHTH
8
video graphics array (VGA) port A port to
which a CRT monitor connects.
W WiFi (Wireless Fidelity) The 802.11 stan-
dard for wireless data transmissions estab-
lished by the Institute of Electrical and
video log (vlog or video blog) A personal warm boot The process of restarting the
Electronics Engineers (IEEE).
online journal that uses video as the pri- system while it’s powered on.
mary content in addition to text, images, wiki A type of Web site that allows anyone
Web 2.0 Tools and Web-based services that
and audio. visiting the site to change its content by
emphasize online collaboration and sharing
adding, removing, or editing the content.
video memory RAM that is included as among users.
part of a video card. window In a graphical user interface, a rec-
Web browser (browser) Software installed
tangular box that contains programs dis-
viewing angle Measured in degrees, this on a computer system that allows individuals
played on the screen.
tells how far you can move to the side of (or to locate, view, and navigate the Web.
above or below) the monitor before the Windows An operating system by Mi-
Web page authoring software Programs
image quality degrades to unacceptable crosoft that incorporates a user-friendly,
you can use to design interactive Web pages
levels. graphical interface.
without knowing any HyperText Markup
virtual memory The space on the hard Language (HTML) code. Windows 7 Microsoft operating system that
drive where the operating system builds upon the security and user interface
Web server A computer running a special-
stores data if there isn’t enough random upgrades that the Windows Vista release
ized operating system that enables it to host
access memory (RAM) to hold all of provided, and gives users with touch-screen
Web pages (and other information) and
the programs you’re currently trying monitors the ability to use touch commands
provide requested Web pages to clients.
to run. to scroll, resize windows, pan, and zoom.
Web service A program used by a Web site
virtual private network (VPN) A network Windows Explorer The main tool for
to make information available to other Web
that uses public communication pathways finding, viewing, and managing the con-
sites.
(usually the Internet) to provide branch of- tents of your computer by showing the
fices or employees who are not at the office Web site A location on the Web. location and contents of every drive, folder,
with secure access to the company network. and file.
Web-based application software A pro-
VPNs maintain privacy by using secure gram that is hosted on a Web site and does wireless access point (WAP) A device simi-
data communication protocols. not require installation on the computer. lar to a switch in an Ethernet network. It
virtual reality program Software that turns takes the place of a wireless network adapter
webcam A small camera that sits on top of
an artificial environment into a realistic and helps relay data between network
a computer monitor (connected to the com-
experience. nodes.
puter by a cable) or is built into a notebook
computer and is usually used to transfer Wireless Application Protocol (WAP) The
virus A computer program that attaches it-
live video. standard that dictates how handheld devices
self to another computer program (known
will access information on the Internet.
as the host program) and attempts to webcast The broadcast of audio or video
spread itself to other computers when files content over the Internet. Unlike a podcast, wireless Internet service provider
are exchanged. a webcast is not updated automatically. (wireless ISP) An ISP that provides
service to wireless devices such as
virus signature A portion of the virus code white-hat hacker A hacker who breaks
PDA/smartphones.
that is unique to a particular computer into systems just for the challenge of it (and
virus and makes it identifiable by antivirus who doesn’t wish to steal or wreak havoc Wireless Markup Language (WML) A for-
software. on the systems). Such hackers tout them- mat for writing content viewed on a cellular
selves as experts who are performing a phone or personal digital assistant (PDA)
Visual Basic (VB) A programming needed service for society by helping that is text-based and contains no
language used to build a wide range of companies realize the vulnerabilities that graphics.
Windows applications quickly. exist in their systems.
wireless media Communications media
visual programming A technique for whole-house surge protector A surge that do not use cables but instead rely on
automatically writing code when the pro- protector that is installed on (or near) the radio waves to communicate.
grammer says the layout is complete. It breaker panel of a home and protects all
helps programmers produce a final applica- wireless network interface card (wireless
electronic devices in the home from power
tion much more quickly. NIC) A card installed in a system that con-
surges.
nects with wireless access points on the net-
VoIP (Voice over Internet Protocol). wide area network (WAN) A network work.
made up of local area networks (LANs)
volatile storage Temporary storage, such wireless range extender A device that am-
connected over long distances.
as in random access memory (RAM). When plifies your wireless signal to get it out to
the power is off, the data in volatile storage widget A mini-application developed for parts of your home that are experiencing
is cleared out. the Macintosh platform. poor connectivity.

Glossary 665
eighth
EDITION
EIGHTH
8
wizard A step-by-step guide that walks Internet are (1) its use of common commu- worm A program that attempts to travel be-
you through the necessary steps to com- nication protocols (such as Transmission tween systems through network connec-
plete a complicated task. Control Protocol/Internet Protocol, or tions to spread infections. Worms can run
TCP/IP) and special languages (such as the independently of host file execution and are
word processing software Programs
HyperText Markup Language, or HTML) active in spreading themselves.
used to create and edit written
that enable different computers to talk to
documents such as papers, letters, and
résumés.
each other and display information in
compatible formats; and (2) its use of spe-
Z
World Wide Web (WWW or Web) The cial links (called hyperlinks) that enable
zombie A computer that is controlled by a
part of the Internet used the most. What users to jump from one place to another
hacker who uses it to launch attacks on
distinguishes the Web from the rest of the in the Web.
other computer systems.

666 Technology in Action


eighth

EDITION
EIGHTH
Index
8
1GL (first-generation Adobe Premiere Pro Apple iPhone, 57, 211, 369, 373 Assembly language, 356–357, 486,
language), 486 (software), 176 Apple iPod (personal media 487. see also Programming
2GL (second-generation Adobe Reader (software), 107, 184 player), 103, 211, 378, 381 languages
language), 486 ADrive (online storage), 436 Apple iPod Touch (personal Association for Computing
3D sound card, 290 Advanced Research Projects media player), 57, 378 Machinery (ACM), 469,
3ds Max (software), 184 Agency Network Apple iWork, 171 477, 504
3G networks, 372–373 (ARPANET), 94 Apple Magic Mouse, 56 Association for Information
3GL (third-generation Adware, 430 Applet, 500, 625 Systems (AIS), 469
language), 487 Adware removal programs, 292 Application layer, 582 Association for Information
4G networks, 373, 586 Affective computing, 21 Application programming Technology Professionals
4GL (fourth-generation AFP (Apple File Protocol), 584 interface (API), 220–221 (AITP), 469
language), 487 Aggregators, 103 Application servers, 571–572 Association for Women in
4INFO, 372 Agriculture, and computers, 14 Application software, see also Computing (AWC), 470
5GL (fifth-generation AIFF files, 176 Open source software Asus Eee PC netbook, 393
language), 487 Aiken, Howard, 43 business software, 180–184 Asynchronous JavaScript and
32-bit systems, 218 Aircards, 124 buying, 186–187 XML (AJAX), 502, 503, 624
40-bit keys, 629–630 AirPort Extreme router, 321 database software, 166–167 Atanasoff, John, 43
64-bit systems, 218 AJAX (Asynchronous JavaScript defined, 50, 162 Atanasoff-Berry Computer, 43
128-bit keys, 630 and XML), 502, 503, 624 digital audio software, 174–176 Athlon processors, 273
411sms, 372 Alarms, 443 digital image editing software, Atlanta Ballet, 8
802.11 standard, 316 Algorithms, 478, 480–482 172–173 Attribute license, 388
802.11g standard, 320, 322, 581 Alibaba.com, 104, 540 digital video editing software, Audacity (audio software),
802.11n standard, 316, Alice (game design software), 179 176–177 176, 381
320–322, 334 Allen, Paul, 35, 39 drawing software, 180 Audible.com, 174
802.3 standard, 316 All-in-one computers, 50 educational software, 179–180 Augmented reality, 396–397
All-in-one printers, 63 entertainment software, 178 Authentication servers, 570–571
Alphabetic check, 529 gaming software, 178–179 Autodesk 3ds Max (software), 184
A Altair 8800 computer, 35 help with, 184–186 Autodesk AutoCAD
A Programmer’s Language AltaVista (search engine), 115–116 integrated, 169–170 (software), 184
(APL), 490 Alto (personal computer), 40, 41 integrated help, 186 Autodesk Maya (software), 184
AAC files, 378 Amazon Elastic Compute Cloud media management software, Automotive technology, 14–15
AbiWord (word processing (Amazon EC2), 634 177–178 AVI files, 387
software), 163 Amazon Kindle, 371, 393 note taking software, 166–167
Academic fair use, 118 Amazon Video Demand, 325 personal financial software,
Academic Superstore, 189 Amazon.com, 105, 108, 524 171–172 B
.accdb (file name extension), 230 AMD processors, 273 personal information B2B (business-to-business)
Accelerated design, 476 American Psychological management software, e-commerce, 108
Access card reader, 592, 593 Association (APA), 121 168–169 B2C (business-to-consumer)
Access method (bus American Standard for preinstalled, 187–188 e-commerce, 108
network), 574 Information Interchange presentation software, 166 Babbage, Charles, 42
Accounting software, 181 (ASCII), 352 productivity software, Back injury, 79
Acer Aspire easyStore server, Amyotrophic lateral sclerosis 162, 169 Backdoor programs, 419
311, 324 (ALS), 15 spreadsheet software, 165–166 Backup and Restore utility, 239,
ACK (positive Analog waves, 364, 365 suites, 170–171 437–438
acknowledgment), 617 Analog-to-digital conversion, tutorials, 186 Backups, see also Storage devices
ActionScript, 501, 503 364–365 Web-based, 188–189 Backup and Restore utility,
Active Server Pages (ASP), Analog-to-digital converter chip, word processing software, 437–438
501, 503 366, 377 163–164 data files, 435–436
Active topology, 575 Analytical data, 525 AppScout (Web site), 161 defined, 435
Active@ Kill Disk (program), 295 Analytical Engine, 42 ArcadePod.com, 626 files on school’s network, 438
Adams, Tom, 148 Android (operating system), 211, Archos 7 (personal media frequency, 436
Adapter cards, 67 214, 367 player), 378 home servers, 437
Ad-Aware, 432 Android Market, 370 Arithmetic logic unit (ALU), 357 image, 436
Addicting Games, 106 Angel (educational software), 179 Armed Services Vocational incremental, 436
Administrator account, 426–427 Animators, 462 Aptitude Battery local drives, 437
Adobe Acrobat (software), 184 Anita Borg Institute for Women (ASVAB), 12 network-attached storage
Adobe Dreamweaver (software), and Technology, 470 ARPANET (Advanced Research devices, 437
181, 256, 500 Antivirus software, 413, 414–416 Projects Agency online sites, 436–437
Adobe Encore (video AOL Instant Messenger, 632 Network), 94 partial, 436
software), 389 Apache HTTP Server, 572 Arrow key, 54 program files, 435
Adobe Flash Video format, 178, APL (A Programmer’s Artificial language (AI), 547 system, 436
387, 501 Language), 489 Arts, and computers, 8–9 Time Machine, 438
Adobe Illustrator (software), 180 Apple AirPort Extreme router, 321 Ascentix Corporation, 190 Backward compatibility, 316
Adobe InDesign (software), 181 Apple computers, 36. see also Mac ASCII (American Standard Baidu (Web site), 154
Adobe Photoshop Album Starter computers Code for Information Balancing principle, 358
Edition, 173 Apple File Protocol (AFP), 584 Interchange), 350 Ballmer, Steve, 148
Adobe Photoshop Elements Apple GarageBand, 174 ASP (Active Server Pages), Bandwidth, 313
(software), 173 Apple iMovie, 176 501, 503 Base (Open Office), 255
Adobe Photoshop (software), 172 Apple iPad, 57, 325, 393–394 Aspect ratio, 61 Base 2 number system, 350

667
eighth
EDITION
EIGHTH
8
Base 10 number system, 350 Blu-ray, 13, 70–71, 283–285 C⫹⫹ programming language, size, weight and
Base transceiver station, 366 .bmp (file name extension), 230 498–499, 503 capabilities, 392
Basic input/output system Bomb software, 444 Cable Internet, 121–122, 126 software, 369–370
(BIOS), 222 Bookmarks feature (browser), 114 Cables, 317–318 synchronization services,
BASIC programming language, Boolean operators, 117 Cache, 108 Web-based, 370–372
38, 487 Boot Camp utility (Mac OS X), Cache memory, 273, 274, 355–356 synchronizing with
Bastion host, 594 212, 261 Cactus Spam Filter, 432 computers, 370
Batch processing, 544 Boot process Cailliau, Robert, 95 virtual phone number, 376
Battlegroundeurope.com activating BIOS in, 222 Calc (OpenOffice), 253 viruses, 376
(multiplayer online checking configurations and Call a Bike program, 395 wireless file transfer, 370
game), 106 customizations in, 223 Camcorders, 57–59 Cellular modems, 124
BD Remote app, 325 defined, 221 Cameras, see Digital cameras Center for Women and
BD-ROM discs, 284 handling errors in, 223–224 CampusTech, 189 Information Technology
BearShare (software), 380–381 loading the operating system Camtasia Studio, 191 (CWIT), 470
Beginners All-Purpose Symbolic in, 222 Canon EOS 5D Mark II Central office, 122
Instruction Code (BASIC), 39 login name, 223 camera, 384 Central processing unit, see CPU
Behaviors, 484 password, 223 CAPTCHA program, 413 (central processing unit)
Bell Telephone Laboratories, 44 performing power-on self-test Car Whisperer (software), 424 Cerf, Vinton, 94
Berners-Lee, Tim, 95 in, 222 Careers Certifications, 468
Best Buy, 108 Safe mode, 223–224 computers in CGI (common gateway interface),
Beta version, 191, 494–495 steps in, 221–222 agriculture, 14 622–623
Better Business Bureau (BBB), 109 Boot-sector viruses, 411–412 arts, 8–9 CGI scripts, 623
BeyondTV, 391 Botnet, 420 automotive technology, 14–15 ChaCha (text messaging service),
Binary decisions, 482–483 Bots, 413, 420 business, 7–8 372
Binary digit, 49 Brain Age2 (program), 179 education, 9–11 Chair, 78
Binary language, 49 BrainGate Neutral Interface, 15 law enforcement, 11 Chandler (personal information
Binary large object (BLOB), 525 Breadcrumb links, 113–114 medicine, 15–18 management software), 168
Binary number system Breaks, taking, 78 military, 12–13 Charge-coupled device (CCD)
ASCII codes, 352 Bricklin, Dan, 39, 40 nanotechnology, 20 arrays, 383
decimal numbers, 352–353 Bridges, 587 package tracking, 7–8 Chat rooms, 98
defined, 350 Brightness, 61 psychology, 21–22 ChatZilla (online communication
integer representation, 350–352 Broadband connection, retail, 6–7 tool), 98
interpretation, 353–354 121–123 science, 18–19 China
Unicode, 352–353 Browsers, 95, 110–111 sports science, 19–20 free speech in, 154–155
Bing (search engine), 115–116 Buddy list, 98, 632 video game design, 9 intellectual property protection
Bioengineering Institute, 16 Buffalo Technology, 437 in information technology in, 148
Biomedical chip implants, 17–18 Buffer, 218 common myths, 459–460 Chrome (browser), 111, 428
Biometric authentication device, Bugs, 476 finding jobs in, 468–470 CIDR (classless interdomain
429, 592–593 Build-your-own computer information systems, 466–467 routing), 614
Bistable screens, 80–81 advantages and disadvantages job outlook, 457–459 Circuit switching, 612
Bit, 49, 352 of, 25 preparing for, 467–468 Citizendium (online
BitTorrent (file-sharing service), case, 263 resources for women in, 470 encyclopedia), 102
610–611 hard drives, 264 salaries, 461 City CarShare program, 395
Bizrate.com, 109 motherboard, 263–264 support services, 467 Clark, Jim, 41
Black Worm virus, 412 optical drive, 264 systems development, 464–466 Classless interdomain routing
Blackberry, 211, 374 power supply, 264 types of, 460 (CIDR), 614
Blackberry App World, 369, 370 processor, 264 web development, 462–464 Click-and-brick business, 108
Blackboard (educational random access memory, 264 Cascading style sheet (CSS), Clickstream data, 541–542
software), 9, 102, 179 sound card, 264 624–625 Client-based e-mail, 97
Black-hat hackers, 417 video card, 264 Cascio, Jamais, 396 Clients, 120
Blender (3D modeling software), Bus topology, 573–574, 578 Case, 263 Client/server networks
102, 184, 504 Business Cat 6 cable, 317, 580 access privileges, 589–592
Blinkx (video search engine), 101 and computers, 7–8 Cat 6a cable, 580 authentication, 589
Bloatware, 188 software for, 180–184 CD players and recorders, 13 classifications, 566–569
BLOB (binary large object), 525 Business Software Alliance (BSA), CD-ROM discs, 284 components of, 569–570
Blog scraping, 101 148–149, 187 Cell phones defined, 120, 311, 565–570
Blogcatalog (blog directory), 101 Business-to-business (B2B) accessing home computer firewalls, 594
Blogger.com, 101 e-commerce, 108 from, 366 network security for, 588–595
Bloghub (blog directory), 101 Business-to-consumer (B2C) atmospheric sensors, 396–397 vs. peer-to-peer networks,
Blogs, 100–102, 143 e-commerce, 108 cameras, 383 565–566
Bluebugging, 424 Butterscotch.com, 190, 191 checking e-mail with, 374 physical protection measures,
Bluesnarfing, 424 Bytes, 49, 352 components of, 367 592–594
Bluetooth digital signal processing, 366 scalability, 566
attacks, 423–424 Client-side program, 625
overview, 8 C features, 366
input and output devices, Clip-on microphones, 59
printers, 63 C programming language, 487, 367–368 Clock cycle, 354
tethering, 373 498–499, 503 keeping number private, 376 Clock speed, 273, 354
transferring files with, 370 C# programming language, operating systems, 367 Close-talk microphones, 59
in virtual keyboard, 52 499–500, 503 processor functions in, 367 Cloud computing, 370, 634–635

668 Technology in Action


eighth

EDITION
EIGHTH
8
Cluster computing, 358 careers, 6–7 CompuTrace LoJack for CSMA/CD (carrier sense multiple
Clusty (search engine), in careers Laptops, 444 access with collision
115–116 agriculture, 14 Concurrent licenses, 186 detection), 577
CME-24 virus, 412 arts, 8–9 Conficker virus, 410, 412 CSS (cascading style sheet),
Coaxial cables, 313, 580–581 automotive technology, 14–15 Connection speed, 126 624–625
Codd, E.F., 524 business, 7–8 Connectionless protocol, 617 Cursor control key, 54
Code editing, 493 education, 9–11 Connection-oriented protocol, Custom installation, 194
Coding, 478, 486–493. see also law enforcement, 11 616–617 Customer interaction
Programming medicine, 15–18 Connectivity ports, 73 technicians, 463
Cold boot, 75, 220 military, 12–13 Consistency check, 529 Customer relationship
College networks nanotechnology, 20 Consumer-to-consumer (C2C) management (CRM)
access privileges, 589–592 package tracking, 7–8 e-commerce, 108 analysts, 459
authentication, 589 psychology, 21–22 Contrast ratio, 61 Customer relationship
firewalls, 594, 595 retail, 6–7 Control (Ctrl) key, 53 management (CRM)
network security for, science, 18–19 Control Program for software, 182, 542
588–595 sports science, 19–20 Microcomputers (CP/IM), 39 Cutepdf Writer (software), 184
physical protection measures, video game design, 9 Control structures, 483 Cyberbullying, 156–158
592–594 data processing, 48–49 Control unit, 354–355 Cybercrime, 410
Colleges, 467–468 defined, 48 Cookie Pal (software), 434 Cybercriminals, 410
.com domain, 618 do-it-yourself, 263–265 Cookies, 433–434 Cyberloafing, 431
Comments (programming), 489 educational uses, 270 Copyleft, 187, 388 CyberScrub, 295
Commerce server, 610 entertainment uses, 270 Copyright, 118, 148–149, 388 Cyberslacking, 431
Commodore PET computer, 37 ethics and, 144–145 Corel PaintShop Pro Photo, 172
Common gateway interface evaluating Country codes, 113
(CGI), 622–623 audio subsystem, 290–291 Course management D
Communication CPU subsystem, 272–276 software, 179 Dailystocks.com, 116
cell phones, 366–371 desktop vs. notebook system, CPU (central processing unit) Dane-Elec Digital Pen, 57
digital telephony, 366–376 271–272 in automobiles, 14–15 Dashboard (Mac OS X), 225, 261
ethics and, 144, 154–155 memory subsystem, 276–279 benchmarks, 274 Data
over Internet optical storage, 283–286 cache memory, 273, 274, 355–356 clickstream, 541–542
e-mail, 95–97, 627–632 storage subsystem, 279–283 clock cycle, 354 defined, 48, 479
group communication, system reliability, 291–294 clock speed, 273, 354 exporting, 534
98–99 upgrading vs. buying new cores, 68 extracting, 532–533
instant messaging, 97–98, system, 294–296 defined, 68 information systems, 542–549
632–633 video subsystem, 286–290 evaluating, 272 inputting, 527–528
Voice over Internet Protocol, first-generation, 44 front side bus, 69, 274 metadata, 527
374, 376, 633–634 fourth-generation, 44–45 vs. graphics processing unit, 288 normalization of, 535–538
smartphones, 366–371 hardware alternatives to how it works, 273 object-oriented analysis, 484
text messaging, 371–372 Microsoft products, 259–263 machine cycle outputting, 533–534
Communications servers, 572 history of control unit, 354 querying, 532–533
Comodo SecurEMail, 631 BASIC programming decode stage, 356–357 sorting, 532
Compact disc (CD), 70–71, language, 39 defined, 354 validating, 528–532
283–285 early computers, 42–45 execute stage, 357 viewing, 532
CompactFlash card, 71 early PCs, 35–38 fetch stage, 354 Data centralization, 521
Compilation, 491–492 graphical user interface, store stage, 357 Data collision, 577
Compiler, 43, 489, 491–492 40–41 system clock, 354 Data convergence, 548–549
Complementary metal-oxide Internet, 41–42 Moore’s Law, 268 Data dictionary, 526
semiconductor (CMOS), 222 operating systems, 39 multimedia-specific Data files, 435–436
Completeness check, 529 pre-PC computers, 43–47 instructions, 360 Data inconsistency, 519
CompletePlanet (search engine), software applications, 39–40 multiple processing, 360–361 Data link layer, 582
115–116 ideal system, 269–271 multiple-core, 273–274 Data marts, 542
Computational field, 522, 523 parts of for notebook computers, 275 Data mining, 6–7, 549–551
Computer abuse, 156–158 hardware overview, 50 performance of, 68, 275–276 Data packet, see Packet
Computer forensics, 11 input devices, 51–60 pipelining, 358–359 Data plan, 372
Computer literate, 4 motherboard, 67–69 processing power, 68–69, 273 Data redundancy, 519
Computer protocol, 611 output devices, 60–67 selecting, 264 Data staging, 542
Computer security, see Security for storing data and speed, 68 Data storage, 539
Computer support information, 69–71 types of, 273 Data transfer ports, 72–73
technicians, 467 platform, 212 Craigslist, 109 Data transfer rate, 126, 280,
Computer threats, see Threats, portability uses, 270 Crashes, troubleshooting, 313, 574
computer second-generation, 44 292–293 Data types, 489, 522
Computer-aided design (CAD) starting, 221–224 Cray Jaguar supercomputer, 360 Data warehouses, 539–542
software, 184 system evaluation, 272 Creative Commons licenses, 388 Database administrators, 467,
ComputerJobs.com, 505 third-generation, 44 Credit card, 110 521, 538
Computers turning on and off, 75 Credit card fraud, 439 Database designers/developers,
accessing from cell phone, 366 types of, 50–51 Credit card numbers, 459, 465, 521
all-in-one, 50 wise use of, 4–5 417–418, 440 Database management system
building own, 263–265 Computers With Causes, 295 CrossFire, 289 (DBMS), 526–534
business uses, 270 Computing cluster, 358 Crowdsourcing, 395, 630 Database query, 532–533

Index 669
eighth
EDITION
EIGHTH
8
Database schema, 526 Digital cinema, 389–390 DIMMs (dual inline memory DVI (digital video interface),
Database software, 166–167 Digital divide, 22 modules), 277 73–74
Databases, see also Information Digital entertainment Direct thermal printing, 64 Dvorak keyboard, 52
systems vs. analog entertainment, 364 Discounted software, 189–190 DVR (digital video recorder), 13,
advantages of, 520–522 devices, 324–325 Disk Cleanup (Windows utility), 325, 391
creating, 526–527 Digital home, 12–13 235–236, 292 Dye-sublimation printers, 385
defined, 518 Digital image editing software, Disk Defragmenter (Windows Dynamic addressing, 422, 615–616
disadvantages of, 521 172–173 Utility), 236, 238, 292 Dynamic decision making, 501
entering data into, 527–528 Digital lifestyle, 364–365 Disk II, 39 Dynamic host configuration
exporting data, 534 Digital media Display screens, see monitors protocol (DHCP), 615
extracting or querying data, creating, 377 Display utilities, 233 Dynamic HTML, 623–624
532–533 music, 377–380 Distrowatch.com, 258 Dynamic RAM (DRAM), 277
fields in, 522–523 navigation, 381–383 Dmoz.org, 115–116
lists, 518–520 photography, 383–386 DNS (domain name system)
multidimensional databases, video, 386–391 server, 618–619 E
525–526 Digital music .doc (file name extension), 230 Ease of Access Center (Windows
object-oriented databases, 525 copyright, 380 Dock (Mac), 225 utility), 240–241
outputting data, 533–534 downloading, 380 Document object model EB (Exabyte), 49
primary keys in, 523–524 DRM-free, 380 (DOM), 625 eBay, 109
records in, 523 formats, 378 Documentation, 495 EBCDIC (Extended Binary Coded
relational databases, 524, portable media players, 377–378 Documents, 225 Decimal Interchange
534–542 ripping, 379 .docx (file name extension), 230 Code), 352
servers, 572 tethered downloads, 380 Dogpile (search engine), 115–116 E-book reader, 393
tables in, 523 Digital navigation, 381–383 Dolby Digital sound, 290–291 Eckert, J. Presper, 44
types of, 524–526 Digital pen, 57 DOM (document object E-commerce, 104–105, 108–110,
validating, 528–532 Digital photography model), 625 144, 152–153
viewing and sorting data, 532 vs. analog photography, 383 Domain name system (DNS) E-commerce software, 183–184
Data-flow diagrams, 475–476 file formats, 384 server, 618–619 E-cycling, 295
Date field, 522, 523 making old photos digital, 385 Domain names, 112–113, 627–628 EDGE, 372–373
DDR2 (double data rate) moving photos to computer, Donating computers, 295 EDI (electronic data
memory, 277 57–59, 384–385 Doodle, 563 interchange), 568
Debugger, 494 printing digital images, Doping, 349 Editor (tool), 493
Debugging, 478, 493–494 385–386 Dot matrix printers, 62 Education, and computers, 9–11
Decimal notation, 350 resolution, 383–384 Dotted decimal number, 614 Ekman, Paul, 11
Decimal numbers, 352–353 Digital Photography Review, 383 Dotted quad, 614 Elance.com, 104–105
Decision points, 482–483 Digital printing services, 385 Double data rate (DDR2) Electrical switches, 347–348
Decision support system (DSS), Digital rights management memory, 277 Electronic Arts, 178
545–546 (DRM), 380 Download.com, 432, 619, 629 Electronic Communications
Dedicated servers, 570–571 Digital scanners, 385 Downloads, 23 Privacy Act (ECPA), 431
Delicious (social bookmarking Digital signal processor, 366 Dr. Watson for Windows Electronic data interchange
site), 114–115 Digital society, challenges to, (program), 237 (EDI), 568
DeLorme Street Atlas USA, 183 22–23 DRAM (dynamic RAM), 277 Electronic Numerical Integrator
Delta Airlines, 143 Digital subscriber line (DSL), Drawing software, 180 and Computer (ENIAC),
Denial-of-service attacks, 419–420 121–122, 126 Dreamweaver (software), 181, 44, 348
Derivative works, 388 Digital telephony 256, 500 Electronic pen, 51
Desktop, 224–225 defined, 366 Drive bays, 69 Electronic throttle control system
Desktop computers Internet connectivity, 372–374 Drivers, 219–220 (ETCS-I), 14–15
defined, 50 text messaging, 371–372 DRM-free music, 380 E-mail
vs. notebook computers, 271, Voice over Internet Protocol, Droid Incredible, 369 account types, 96
272 374–376 Drones, 13, 14 checking with cell phone, 374
Desktop microphones, 59 Digital television, 390 DSL (digital subscriber line), client-based, 97
Details view, 229 Digital video 121–122, 126 employer monitoring of, 23
Device drivers, 585 advantages, 390–391 DSS (decision support system), encryption, 628–632
Device Manager, 224, 322 editing, 387 545–546 history, 627
DeviceLock (software), 591 menuing system, 388–389 DTV.org, 389 hoaxes, 440–441
DHCP (dynamic host sources, 386, 389 Dual inline memory modules overview, 95–96
configuration protocol), 615 uploading, 389 (DIMMs), 277 privacy issues, 96
Dia (drawing software), 256 watching on portable device, Dual-core processing, 360 protocol, 627
Dial-up connection, 125–126 391 DVD (digital video disk) sending and receiving, 96
Dice.com, 468–469 webcasting, 389 capacity, 70–71 viruses, 413
Difference Engine, 42 Digital video disk, see DVD file formats, 285, 387–388 Web-based, 97, 432
Digital art, 8–9 Digital video editing players and burners, 284–285 writing, 96
Digital audio software, 174–176 software, 176 read only memory, 284 E-mail clients, 96
Digital cameras Digital video interface (DVI), recording to, 386–387 E-mail servers, 572, 627
file formats, 384 73–74 DVD players and recorders, 13 E-mailware, 190
moving photos to computer, Digital video recorder (DVR), 13, DVD+R/RW, 285 Embedded computers, 51
57–59, 384–385 325, 391 DVD-RAM, 285 Embedded systems, 209
resolution, 383–384 Digsby (online communication DVD-ROM discs, 284 Emotional-social prosthesis
selecting, 383 tool), 98, 607 DVD-R/RW, 285 (ESP), 21

670 Technology in Action


eighth

EDITION
EIGHTH
8
Employee monitoring, 431 Expansion cards and hubs, 74–75 Firewalls, 327 connecting to computers, 74
Encore (video software), 389 Express card slot, 124 for client/server networks, 594 connecting to home
Encryption, e-mail, 628–632 ExpressCard, 272 for college networks, 595 networks, 325
Encryption viruses, 413 Expression Web, 256 hardware, 421 operating system for, 211
Engadget.com, 101 Extended Binary Coded how it works, 422 Gaming software, 178–179
Enhanced 911 program, 382 Decimal Interchange Code personal, 421 Garmin Nuvi series GPS
Enterprise, 547 (EBCDIC), 352 software, 421 device, 382
Enterprise resource planning Extensible HyperText Markup FireWire 400, 72–73 Gas Boycott (Gas War) hoax,
(ERP) specialists, 459 Language (XHTML), 500, FireWire 800, 72–73 440–441
Enterprise resource planning 501–502, 503, 621–622, 624 FireWire 3200, 73 Gates, Bill, 35, 39
(ERP) system, 182–183, Extensible Markup Language Firmware, 329 GB (gigabyte), 49
547–549 (XML), 502, 503, 622 First-generation computers, 44 General availability (GA), 495
Entertainment projectors, 62 External data sources, 546 First-generation language, 486 Geographic information system
Entertainment software External drive bays, 69 Flash, 501 (GIS), 183
defined, 178 External hard drives, 70, 437 Flash ActionScript, 503 Geolocation, 152–153
drawing software, 180 External SATA (eSATA), 272 Flash drive, 71 GetJar (Web site), 369
educational software, 179–180 Extra Large Icons view, 229 Flash memory, 379 GIAC (Global Information
gaming software, 178–179 Extranets, 568 Flash memory card, 71 Assurance Certification), 333
Entertainment Software Rating Eye-Fi, 385 Flash Player, 107 Gibson Research, 422
Board (ESRB), 178 Flash Video format, 178, 387, 501 GIF files, 230, 235
Environment, effect on Flat-panel monitor, see LCDs Gigabater (e-cycling service), 295
computer, 441 F Flexible keyboard, 52 Gigabit Ethernet, 317
Eraser (program), 295 Facebook (social networking site), Flexible OLED (FOLED), 80–81 Gigabyte (GB), 49
Ergodex D1 keyboard, 52, 53 99, 420, 434–435, 518 Flickr (Web site), 177, 385 GIMP, 256–257
Ergonomics Facebook Chat, 97, 416 Flip SlideHD video GIS (geographic information
avoiding injuries, 77–78 Facilitated team techniques, 476 camcorder, 389 system), 183
chair, 78 Family license, 186 Floating-point standard, 353 Global Information Assurance
defined, 77 Family Maps service, 382 Flooding, 98–99 Certification (GIAC), 333
lighting, 78 Favorites feature (browser), 114 Floppy disk drives, 69 Global Network Initiative
mobile devices, 79 Federal Bureau of Investigation Flowcharts, 475, 481–482 (GNI), 154
monitor positioning, 78 (FBI), 11, 410 Fluid Interfaces group (Media Gmail, 97
ERP (enterprise resource Federal Trade Commission, 439 Lab), 396 GNI (Global Network
planning) specialists, 459 Fedora (operating system), 213 FLV files, 387 Initiative), 154
ERP (enterprise resource Fiber-optic cable, 313, 581 FOLED (Flexible OLED), 80–81 GNOME, 215
planning) system, 182–183, Fiber-optic service, 121–122, 126 Fon.com, 314 GNU General Public License, 187
547–549 Field constraint, 529 Footballsuperstars.com GNU Project, 212, 213
Error handling, 479–480 Field type, 522 (multiplayer online GoEmerchant, 183
Error-checking, 236–237 Field-based IT job, 460 game), 106 Gogo (in-flight Internet
eSATA (external SATA), 272 Fields, 522–523 Foreign keys, 538 service), 123
eStarling TouchConnect, 326 Fifth-generation language, 487 Forensics, computer, 11 GoldMine (customer relationship
Ethernet network, 315–316 File compression, 234–235 FORTRAN, 487 management software), 183
Ethernet port, 73 File servers, 610 Fourth-generation computers, GoodSearch (search engine),
Ethical computing, 58 File Transfer Protocol (FTP), 44–45 115–116
Ethics 112, 619 Fourth-generation language, 487 GoodShop.com, 115–116
computers and, 144–145 Files Frames, 586 Google (search engine), 154–155
cyberbullying and, 156–158 backing up, 239 Frankston, Bob, 39, 40 Google Android (operating
defined, 140 copying, 232 Freeware, 190–191 system), 211, 214, 367
e-commerce and, 152–153 decompressing, 235 Freeware Home (Web site), 190 Google Book Search, 117
electronic communication and, defined, 227 French Institute of Computer Google Checkout, 108, 109
154–155 deleted, location of, 232 Science, 21 Google Chrome (browser),
geolocation and, 152–153 deleted, recovering, 234 Front side bus (FSB), 69, 274 111, 428
intellectual property and, deleting, 232 FrontRange Solutions, 182 Google Docs, 102, 163, 188–189
148–149 deleting permanently, 232 F-Secure, 376 Google Earth, 183
personal, 141–144 extensions, 230 FTP (File Transfer Protocol), Google Groups, 98
privacy and, 150–151 locating, 228 112, 619 Google Maps, 183
social justice and, 146–147 moving, 232 Full installation, 194 Google News, 117
social networking and, naming, 230–231 Function keys, 53 Google News Archives Timeline,
150–151 organizing, 227, 228 Functions (programming), 491 117–118
technology and, 144 saved, locating, 231 Fuzzy logic, 547 Google Picasa, 172, 178
European Organization for searching for, 229 Google Scholar, 117
Nuclear Research, 95 viewing, 229 Google SMS, 372
Events, 216–217 FileZilla, 619 G Google Talk, 416
Evernote, 168 Final Cut Pro (program), 176 GA (general availability), 495 Google Video, 386
Exabyte (EB), 49 Finder utility (Mac OS X), 261 Gabriel, Peter, 396 Google Web History, 626
Excel (program), 40 Fingerprint reader, 429 Gadgets, 225 GoogleSync, 371
Excite (search engine), 115–116 FiOS service, 313 Game controllers, 56, 178 Gorgon Stare (software), 13
Executable program, 492 Firefox (browser), 110–111 Game developers, 466 Gosling, James, 499
Executive computer, 38 Firefox Password Manager, GameMaker (software), 179 GoToMyPC (remote access
Expansion cards, 67 427–428 Gaming consoles service), 366

Index 671
eighth
EDITION
EIGHTH
8
GPS (global positioning system) Hewlett Packard MediaSmart
in automobiles, 382 servers, 325 I overview, 542–543
transaction-processing systems,
on child’s cell phone, 383 Hexadecimal notation, 615 IAB (Internet Architecture Board), 544–545
enhanced 911 feature, 382 Hibernation mode, 76 608 Information Systems Security
features, 383 High-definition multimedia IANA (Internet Assigned Association (ISSA), 469
how it works, 382 interface (HDMI), 74 Numbers Authority), 618 Information technology (IT)
overview, 381–382 High-definition television iBackup (online backup), 437 common myths, 459–460
package tracking with, 8 (HDTV), 390 IBM (International Business defined, 6
privacy and, 152–153 High-definition TVs, 13 Machines), 38, 43 finding jobs in, 468–470
Graphic designers, 462 High-level formatting, 286 iBooks bookstore, 393 information systems, 466–467
Graphical user interface (GUI), High-speed ports, 72–73 IC3 (Internet Crime Complaint job outlook, 457–459
40–41, 214–215 History list, 113–114 Center), 410 preparing for, 467–468
Graphics processing units Hitachi ␮-chip, 18 ICANN (Internet Corporation for resources for women in, 470
(GPUs), 288 Hoaxes, 440–441 Assigned Names and salaries, 461
Grayware, 430 Hoax-Slayer (Web site), 441 Numbers), 608, 614 support services, 467
Group communication, 98–99 Hollerith, Herman, 42–43 iChat, 416 systems development, 464–466
GUI (graphical user interface), Hollerith Tabulating Machine, Icons, 226 types of, 460
40–41, 214–215 42–43 ICQ, 98, 632 Web development, 462–464
Guild Wars (multiplayer online Home area network (HAN), 312 IDE (integrated development Infrared scanners, 8
game), 106 Home business software, 180 environment), 492–493 Inheritance, 485
Guru.com, 104 Home network server, 311, iDefrag, 236 Initial value, 483
323–324 Identity theft, 418 Injuries, avoiding, 77–78
Home networks IEEE (Institute of Electrical and Inkjet printers, 62–63, 65
H cabling, 317–318 Electronics Engineers), InPrivate Browsing (Internet
H&R Block At Home (tax configuring software for, 469, 477 Explorer), 428, 626
preparation 329–335 IETF (Internet Engineering Task Input devices. see also Output
software), 171 digital entertainment devices, Force), 608 devices
Hackers, 4, 417–421 324–325 iFlipr (app), 380 defined, 51
HAN (home area network), 312 digital home, 308–309 iHomework (app), 380 game controllers, 56
Handheld devices equipment, 319–322 IIS (Internet Information image input, 57–59
ergonomics, 79 Ethernet networks, 315–316 Services), 572 keyboard, 51
Internet-enabled, 392–393 for home security, 326 Illustration software, 180 microphone, 59
keyboard, 393 operating system for, 319 Illustrator (software), 180 mouse, 51, 54–56
operating systems for, 211 photo sharing on, 326 iMac computers, 260 for people with disabilities,
screen, 393 securing, 327–329 Image backup, 436 59–60
selecting, 392 wired and wireless nodes, 318 Image editing software, 172–173 sound input, 59
size, weight and Home page, 112 Image input, 57–59 stylus, 51
capabilities, 392 Home security, 326 iMovie, 176 touch screens, 56–57
Handshaking, 616–617 Home servers, 437 Impact printers, 62 touchpad, 55
Hard boot, 220 Home-based IT job, 460 Imperva Application Defense trackpoint device, 55
Hard drives Homebrew Computing Club, Center, 425 web cam, 57–59
access time, 280 35–36 Implantable chip, 17–18 Input form, 528
data transfer rate, 280 Hopper, Green, 43 Impress (OpenOffice), 253–255 Inputs, 479–480
defragmenting, 236, 238 Host name, 112 Incognito feature (Google Installation wizard, 233
erasing, securely, 295 Host program, 410 Chrome), 428 Install.exe, 193
error-checking, 236–237 Hot spots, 123, 373 Incremental backups, 436 Instant messaging (IM), 97–98,
external, 70 Hotmail, 97 InDesign (software), 181 416, 632–633
how it works, 280–281, 286 .html (file name extension), 230 IndustryMastes.com, 10f Institute of Electrical and
internal, 69, 70f HTML (HyperText Markup iNet WOL (Wake on LAN), 316 Electronics Engineers (IEEE),
organizing files, 227–228 Language), 181, 500–503, InfoMine (search engine), 115–116 469, 477
overview, 69–70 621–622, 624 Information, 48, 479 Integers, 350–352
RAID, 283, 284f HTTP (HyperText Transfer Information assurance, 333 Integrated circuits, 44, 349–350
vs. RAM, 276–277 Protocol), 112, 420, 614, Information systems, see also Integrated development
SATA, 282 620–621 Databases environment (IDE), 492–493
selecting, 264 HTTPS (HyperText Transfer careers in, 466–467 Integrated help, 186
solid state drive, 71 Protocol Secure), 621 decision support system, Integrated software application,
storage capacity, 280–281 Hulu.com, 106, 386 545–546 169–170
Hardware, 50 Hushmail, 631 defined, 542–543 Integrated video card, 288
Hardware firewalls, 421 Hyperlink field, 522, 523 enterprise resource planning Intel Core i7, 45, 273
Harvard Mark I, 43 Hyperlinks, 113–114, 620 system, 547–549 Intel Corp., 44–45
Hatch, Orin, 148 Hypertext documents, 620 external data sources, 546 Intel Pentium 4 processor, 359
Hauppage HDTV stick, 282 HyperText Markup Language internal data sources, 546 Intel processors, 273
HDMI (high-definition (HTML), 181, 500–503, knowledge-based systems, 547 Intellectual property, 144, 148–149
multimedia interface), 74 621–622, 624 management information Interactive Body, 9
HDTV (high-definition HyperText Transfer Protocol system, 545 Interface designers, 462
television), 390 (HTTP), 112, 420, 614, model management system, Internal data sources, 546
Head crash, 286 620–621 546–547 Internal drive bays, 69
Hearing damage, 79 HyperText Transfer Protocol office support systems, Internal hard drive, 69, 70f
Helpdesk analysts, 467 Secure (HTTPS), 621 543–544 Internal testing, 494–495

672 Technology in Action


eighth

EDITION
EIGHTH
8
International Business Machines Internet Corporation for Assigned
(IBM), 38, 43 Names and Numbers J L
Internet (ICANN), 608, 614 Jacquard, Joseph, 42 LaChapelle, David, 390
anonymous surfing, 428–429 Internet Crime Complaint Center Jacquard loom, 42 Langpop.com, 496
browsers, 110–111 (IC3), 410 JAD (joint application Languages, programming, see
client-side applications, 625–626 Internet Engineering Task Force development), 476 Programming languages
common gateway interface, (IETF), 608 Jam signal, 577 LANs (local area networks),
622–623 Internet exchange point (IXP), 610 Jamglue, 634, 635 312, 567
communication over Internet Explorer, 41, 110 Java applet, 500, 625 Lap injuries, 79
e-mail, 95–97, 627–632 Internet Explorer Mobile, 373–374 Java programming language, 487, Large Icons view, 229
group communication, 98–99 Internet Information Services 499–500, 503 Large scale networking (LSN), 127
instant messaging, 97–98, (IIS), 572 Java Server Pages (JSP), 501, 503 Laser printers, 63, 65
632–633 Internet Packet Exchange (IPX), Java Virtual Machine, 500 Last Know Good
Voice over Internet Protocol, 583–584 JavaScript, 500–501, 503, 624 Configuration, 224
633–634 Internet Protocol (IP), 614 Jing (screen capture software), 207 Lavalier microphones, 59
conducting business over, Internet Protocol (IP) addresses, Jobs, Steve, 35–36, 41 LavaRnd, 629
104–105, 108–110 121, 422, 586, 614–616 Join query, 531 Law enforcement, 11
connecting to, 121–126, 608–610 Internet Protocol version 4 Joint application development LCDs (liquid crystal displays)
broadband, 121–123 (IPv4), 614 (JAD), 476 aspect ratio, 61
dial-up, 125–126 Internet Protocol version 6 Journey Education Marketing, 189 brightness, 61
wireless, 123–125 (IPv6), 615 JPEG files, 230, 235, 384 built-in features, 62
connection speed, 126 Internet Relay Chat (IRC), 98 JSP (Java Server Pages), 501, 503 contrast ratio, 61
creation of, 94 Internet service providers (ISPs), Juice (podcasting software), 381 how it works, 60
data transmission and protocols, 97, 609–610 Juilliard School of Music, 8 overview, 60
611–613 Internet Society (ISOC), 608 Jump drive, 71 response time, 61
delivering computer services Internet tablet, 392 Justtweetit.com, 517 screen resolution, 61
through, 634–635 Internet2, 127 viewing angle, 61
DNS servers, 618–619 Internet-ready digital LeakTest program, 422
domain names, 112–113, television, 13 K Learn the Net (web site), 500
627–628 Interpreter, 492 Kahn, Robert, 94 Legacy technology, 60
dynamic HTML, 623–624 Interrupt, 217 Kama Sutra virus, 412, 422 Level 1 cache, 356
e-commerce, 104–105, 108–110 Interrupt handler, 217 KB (kilobyte), 49 Level 2 cache, 356
emerging technologies, 630 Intranets, 568 KDE, 215 Level 3 cache, 356
entertainment on, 106–108 Intuit QuickBooks, 181 Kernel, 222 Lighting, adequate, 78
FTP, 112, 619 Intuit Quicken, 171–172 Kernel memory, 278 Linear bus topology,
future of, 126–127 IP (Internet Protocol), 614 Key field, 523–524 573–574
growth of, 95 IP (Internet Protocol) addresses, Key fob activator, 443 Linux operating system
history, 41–42, 94 121, 422, 586, 614–616 Keyboard, see also Input devices advantages of, 257–258
how it works, 118–121 iPad, 57, 325, 393–394 Control (Ctrl) key, 53 distributions, 214, 258
HTML, 621–622 iPhone, 57, 211, 369 cursor control key, 54 Mandriva, 259
HTTP, 112, 620–621 iPhone Developer University defined, 51 online security, 428–429
invention of, 94 program, 380 Dvorak, 52 overview, 212–214
inventors of, 94 iPhone OSX, 211 flexible, 52 system requirements, 258
IP addresses, 121, 614–616 iPod (personal media player), 103, function keys, 53 Ubuntu, 259
management of, 608 211, 378, 381 gaming, 52 Liquid crystal display monitor,
mobile, 372–374 iPod Touch (personal media keystroke shortcuts, 54 see LCDs
multimedia content, 106–108 player), 57, 378 multimedia and Internet Lisa (personal computer), 40–41
network model of, 610–611 iProRecorder (app), 380 keys, 54 List view, 229
searching, 115–117 IPv4 (Internet Protocol notebook, 52 Live Bookmarks feature
SSL, 621 version 4), 614 numeric keypad, 53 (Firefox), 114
Telnet, 619–620 IPv6 (Internet Protocol for people with disabilities, Local area network (LAN),
using, 4 version 6), 615 59–60 312, 567
Web 2.0 technologies IPX (Internet Packet Exchange), QWERTY, 52 Locks, 443
blogs, 100–102 583–584 toggle keys, 54 Logic bombs, 412
podcasts, 102–104 IRC (Internet Relay Chat), 98 virtual laser, 52, 53 Logical errors, 494
social networking, 99–100 Iron Mountain (online Windows key, 54 Logical port blocking, 422
video logs, 100–102 backup), 437 wireless, 54 Logical ports, 420–421, 424
webcasts, 104–105 IronKey (portable privacy Keys, 629 Logical topologies, 572–573
wikis, 102 device), 428 Keywords (programming LogiTech Digital Video Security
Web entertainment, 106–108 ISOC (Internet Society), 608 language), 488 System, 326
WIMAX, 630 ISPs (Internet service providers), Kilby, Jack, 44 LogMeIn (remote access
XML, 622 97, 609–610 Kildall, Gary, 39 service), 366
Internet appliance, 325–326 ISSA (Information Systems Kilobyte (KB), 49 LoJack transmitter, 443–444
Internet Architecture Board Security Association), 469 Kindle, 371, 393 Loop (programming), 483
(IAB), 608 IT, see Information technology Knowledge-based Loop topology, 574
Internet Assigned Numbers iTunes, 103, 177, 369, 378, systems, 547 Lotus 1-2-3, 40
Authority (IANA), 618 381, 534 Kodak V1273 camera, 384 Lou Gehrig’s disease, 15
Internet backbones, 120, 609 iWork, 171 Kodak.com, 177 Lovelace, Ada, 42
Internet cache, 620 IXP (Internet exchange point), 610 Koratich, Michael, 8 Low-level formatting, 286

Index 673
eighth
EDITION
EIGHTH
8
LSN (large scale networking), 127 Media Center, 13 Microsoft Streets & Trips, 183 viewing angle, 61
Lucas, George, 389–390 Media computer, 12 Microsoft Tag, 395 wearable screens, 81
Lumosity, 179 Media Lab, 396 Microsoft Visio, 180 Monster.com, 461, 468
Luxeed Dynamic Pixel LED Media management software, Microsoft Windows operating Moodle (educational software),
Keyboard, 47 177–178 system, see Windows 9, 179
MediaWiki, 102 MiFi, 373 Moonbase Alpha (game), 15
Medicine, and computers, 15–18 Military, and computers, 12–13 Moore, Gordon, 268
M Medium Icons view, 229 MIME (multipurpose Internet Moore’s Law, 268
MAC (media access control) Meebo (online communication mail extensions), 628 Mosaic browser, 41, 95
address, 328, 586–587 tool), 98 MIMO (Multiple Input Multiple Motherboard, 67–69, 263–264
Mac computers, 41 MeediOS (software), 363 Output), 316 Motorola, 44–45
buying, 259–260 MeeGo (operating system), 214 Mint.com, 171–172 Mouse
configuring, 261 Megabyte (MB), 49 MIS (management information customizable buttons, 56
desktop, 225 Melissa virus, 413 system), 545 defined, 51
operating system for, 212, Memo field, 522, 523 MIT (Massachusetts Institute of file storage feature, 56
260–261 Memory Technology), 18 magnifier feature, 56
protecting, 262 management, 218–219 MIT Media Lab, 21 multitouch, 56
utility programs, 262–263 minimum requirements, 218 MITS (Micro Instrumentation and optical, 54–55
Mac PhoneHome, 444 random access, 67–68 Telemetry Systems), 35 trackball, 55
MacBook Air computer, 260 read-only, 68 MLA (Modern Language Web search feature, 56
Machine language, 357, 487 Memory cards, 67, 277 Association), 121 wireless, 55–56
Macintosh computers, see Mac Memory modules, 277 MMORPG (massive multiplayer MOV files, 387
computers Memory Stick, 71 online role-playing Mozilla Thunderbird (e-mail
Macro viruses, 413 Menus, 225 games), 106 client), 256
Macros, 169, 474 Messaging Anti-Abuse Working MMS (multimedia message MP3 files, 175–176, 235, 378
Magic Mouse, 56 Group (MAAWG), 410 service), 372 MP3.com, 379–380
MAGIX Music Maker Metadata, 527 Mobile coupons MP4 files, 176, 387
(software), 174 Metal-oxide varistors (mobicoupons), 394 MPEG files, 387
Magnifier (Windows utility), 240 (MOVs), 442 Mobile devices MPG files, 387
Mainframe computers, Methods, 484 ergonomics, 79 MS-DOS (Microsoft Disk
50–51, 210 Methods (programming), 491 Internet-enabled, 392–393 Operating System), 39, 208
MakeTechEasier, 169 Metropolitan area network keyboard, 393 Multi-core processing, 360–361
MalekTips, 186 (MAN), 312, 567 operating systems for, 211 Multidimensional databases,
Malware, 430 Mibbit (online communication screen, 393 525–526
Malwarebytes Anti-Malware, 432 tool), 98 selecting, 392 Multimedia content, 106–108
Management information system Michelangelo virus, 412 size, weight and Multimedia message service
(MIS), 545 Micro Instrumentation and capabilities, 392 (MMS), 372
Mandriva Flash (portable Telemetry Systems Mobile DTV, 369 Multimedia ports, 73–74
operating system), 259 (MITS), 35 Mobile Internet, 372–374 Multimedia software
Mandriva Linux (operating Micro SD cards, 370 Mobile switching center, 366 defined, 172
system), 259 Microbrowser, 373–374 Mobile WiMAX, 123 digital audio software, 174–176
MANs (metropolitan area Microchip implants, 17–18 MobileMe, 370–371 digital image editing software,
networks), 312, 567 Microexpression Training Tool, 11 MobileVoice, 395 172–173
Many-to-many relationship, 534 Microexpressions, 11 MOD Films, 391 digital video editing software,
Mapping programs, 183 Microphones, 59–60 ModCloth.com, 630–631 176–177
MapQuest, 183 Microprocessors, 44–45, 349 Model management system, media management software,
MAR (Microsoft Authorized Microsoft, 39, 154–155 546–547 177–178
Refurbisher), 22 Microsoft Authorized Refurbisher Modem, 125 speech recognition software, 174
Marketing, 395 (MAR), 22 Modem card, 67 voice recognition software, 174
Massachusetts General Hospital Microsoft Disk Operating System Modern Language Association Multimedia tours, 9–10
Utility Multi-Programming (MS-DOS), 39, 208 (MLA), 121 Multipartite virus, 414
System (MUMPS), 505 Microsoft Excel (program), 40 Modules (programming), 491 Multiplayer online games, 106
Massachusetts Institute of Microsoft Expression Web, 181 MoGo Mouse, 56 Multiple Input Multiple Output
Technology (MIT), 18 Microsoft Internet Information MoMA (Museum of Modern (MIMO), 316
Massive multiplayer online Services (IIS), 572 Art), 10 Multipurpose Internet mail
role-playing games Microsoft Knowledge Base, 293 Money, Microsoft (program), extensions (MIME), 628
(MMORPGs), 106 Microsoft Live Movie Maker, 176 171–172 Multitouch mouse, 56
Master boot record, 411 Microsoft Money (program), Monitors Multiuser operating system, 210
Mathematical Markup Language 171–172 bistable screens, 81 MUMPS (Massachusetts General
(MathML), 622 Microsoft .NET Framework, cathode ray tube, 60 Hospital Utility Multi-
Mauchly, John W., 44 190, 498 cleaning, 61 Programming System), 505
MaxiCode smart label, 8 Microsoft Office 2010, 170 contrast ratio, 61 Museum of Modern Art
Maya (software), 184 Microsoft Office Web Apps, defined, 60 (MoMA), 10
McAffee, 376 188, 189 flexible OLED, 80–81 Museums, 9–10
McAffee Internet Security Microsoft On-Demand Webcasts, how it works, 60 Music, see Digital music
(software), 421 105 liquid crystal display, 60–62 Music Genome Project, 524
Media, see Digital media Microsoft Outlook (application), organic light-emitting diode, 80 MusicID, 374
Media access control (MAC) 97, 169, 432 positioning, 78 MySpace (social networking
address, 328, 586–587 Microsoft Photo Story, 172 screen size, 61 site), 99

674 Technology in Action


eighth

EDITION
EIGHTH
8
MySQL, 255–256 Network operating system (NOS), Norton Internet Security, 415, 421 database software, 255–256
Myvu (personal media viewer 210, 315, 569, 583–584 NOS (network operating system), drawing software, 256
display), 81 Network prefix, 614 210, 315, 569, 583–584 e-mail client, 256
Mywife virus, 412 Network Solutions, 618 Note taking software, 166–167 image editing, 256–257
Network topologies Notebook computers license, 186–187
active, 575 defined, 50 Linux operating system, 213
N bus, 573–574 vs. desktop computers, 271, 272 overview, 163
NAK (negative comparison of, 578 size, weight and productivity software, 253–255
acknowledgment), 617 defined, 569, 572 capabilities, 392 web page authoring, 256
Nanoprobes, 20 physical, 572 touchpad, 55 Open system, 611
Nanoscience, 20 ring, 574–576 trackpoint device, 55 Open Systems Interconnection
Nanostructures, 20 star, 575–578 upgrading, 272 (OSI), 582
Nanotechnology, 20 Network-attached storage (NAS) NSA (National Security OpenOffice
Nanowires, 21 devices, 323, 437 Agency), 333 Base, 255
Napster, 380–381 Networking software, 315 NSF (National Science Calc, 253
Narrator (Windows utility), 240 Network-ready device, 323–324 Foundation), 608 Impress, 253–255
NAS (network-attached storage) Networks Number system, 350 overview, 163, 253–254
devices, 323, 437 advantages of, 564 Numeric check, 529 Writer, 253
NAT (network address architectures, 310–312 Numeric field, 522, 523 Opera Mobile, 374
translation), 423 benefits of, 309–310 Numeric keypad, 53 Operating systems
National Broadband Plan, 127 client/server networks, 311, NW3C (National White Collar alternatives, 257–259
National Center for 565–570 Crime Center), 410 boot process, 221–224
Supercomputing components, 312–315 categories, 208
Applications, 18, 95 configuring software for, for cell phones and
National Center for the Analysis 329–332 O smartphones, 367
of Violent Crime, 11 defined, 309 Object field, 522, 523 defined, 50, 208
National Highway Traffic Safety for digital entertainment, 13 Object query language (OQL), 525 desktop, 224–227
Association (NHTSA), 15 disadvantages of, 310, 564–565 Objective C, 503 file management, 227–232
National Science Foundation equipment, 319–320 Object-oriented analysis, 484–486 functions of, 208, 214–221
(NSF), 608 home networks, 308–309 Object-oriented databases, 525 for gaming consoles, 211
National Security Agency local area network, 312 Occupations, with fastest hardware and peripheral device
(NSA), 333 logical, 572–573 growth, 458 management, 219–220
National Severe Storms Lab, 18 metropolitan area network, 312 Octet, 420 history, 39
National White Collar Crime network adapters, 313–315 Office 2010, 170 Linux, 212–214
Center (NW3C), 410 operating systems for, 318, Office support systems (OSS), loading, 222
Natural language processing 583–584 543–544 Mac, 212
(NLP), 547 peer-to-peer (P2P) networks, Office Web Apps, 188, 189 Mac OS X Snow Leopard,
Navigation, digital, 381–383 310–311 Office-based IT job, 460 260–261
Navigation devices, network, 315, resource sharing, 310 Offshoring, 9, 457–458 mainframe, 210
570, 586–588 securing wireless networks, 328 Ogg Vorbis format, 175 memory and storage
Nebulae supercomputer, 360 transmission media, 313, Ohio State University, 21 management, 218–219
Neck injury, 79 578–583 OLED (organic light-emitting for mobile devices, 211
Needforspeed.com (multiplayer troubleshooting, 334–335 diode) displays, 80 multiuser, 210
online game), 106 wide area network, 312 OLED (organic light-emitting for networks, 210, 318
Negative acknowledgment wireless node configuration, diode) TVs, 13 organizing files, 227
(NAK), 617 332–334 Omaha Paper Company, 108 for personal computers, 211–214
.NET Framework, 190, 498 New Paperclip, 169 Omnidirectional microphones, 59 for personal media players, 211
Net Meter, 316 Newsgroups, 98 One Laptop per Child processor management, 215–218
NetBios Extended User Interface Newsvine (social bookmarking (OLPC), 216 RAM, amount being used, 278
(NetBEUI), 584 site), 115 OneNote (note taking real-time, 209–210
Netbook, 50, 392 Next Generation Internet, 126–127 software), 168 running more than one on a
Netflix, 324, 386, 391 NeXT operating system, 95 One-to-many relationship, 534 single computer, 212
Netiquette, 98–99 NHTSA (National Highway One-to-one relationship, 534 for smartphones, 211
NetMeter, 316 Traffic Safety Online analytical processing software application
Netscape, 41–42 Association), 15 (OLAP), 542 coordination, 220–221
Network adapters, 13, 313–315, NIC (network interface card), 67, Online backups, 436–437 Sugar, 216–217
569–570, 584–586 122, 322, 584, 585 Online employment sites, 468–469 types of, 209–214
Network address translation Ning (social networking site), 99 Online mapping, 183 upgrading, 227, 294
(NAT), 423 Nintendo Wii, 211 Online payments, 108, 109 user interface, 214–215
Network administration, 310 NLP (natural language Online photo management, utility programs, 232–241
Network administrators, 467, processing), 547 177–178 Web-based, 215
502, 565 Node, 309 Online shopping, 109 Windows, 211–212
Network cabling, 317–318 Nokia N810 Internet tablet, Online transaction processing windows, 224–227
Network engineers, 465, 467 392–393 (OLTP), 545 Operators (programming
Network interface card (NIC), 67, Noncommercial license, 388 On-Screen Keyboard (Windows language), 489
122, 322, 584 Nonimpact printers, 62 utility), 241 Optical cables, 122
Network layer, 582 Nonresident programs, 222 Open Directory Project, 115–116 Optical carrier (OC) line, 609
Network navigation devices, 315, Nonvolatile memory, 367 Open source software, see also Optical character recognition
570, 586–588 Normalization, 535–538 Application software (OCR), 385

Index 675
eighth
EDITION
EIGHTH
8
Optical drive restricting computer access Plagiarism, 118 Printers, 385–386
defined, 283 with, 426–427 Platform, 212 all-in-one, 63
how it works, 283–284 strength testers, 425–426 Play testing, 466 color output, 64–66
players and burners, 284–285 strong, 425–426 Plotters, 63–64 cost of consumables, 64–66
read only memory, 284 weak, 426 Plug and Play (PnP), 219 dot matrix, 62
selecting, 264 PATA (parallel advanced Plug-ins, 106 impact, 62
speed, 285–286 technology attachment) PNG files, 235 inkjet, 62–63, 65
standards, 285 drives, 282 PnP (Plug and Play), 219 laser, 63, 65
Optical mouse, 55 Patient simulator, 16 Podcast Alley, 103 maintaining, 68
Optical storage, 70–71 PayPal, 108, 109 Podcast.com, 103 nonimpact, 62
OQL (object query language), 525 PB (petabyte), 49 Podcasting, 381 paper, 66
.org domain, 618 PC Card slot, 124 Podcasts, 102–104, 174 resolution, 64
Organic light-emitting diode PC Decrapifier, 188 Podscope, 104 speed, 64
(OLED) displays, 80 PC PhoneHome, 444 Point of presence (POP), 610 thermal, 64
Organic light-emitting diode PDF files, 184, 230 Point-and-shoot cameras, use and cost, 64–66
(OLED) TVs, 13 Peachtree (accounting 383–384 wireless, 63
ORLive.com, 105 software), 181 Polymorphic virus, 413–414 Privacy
Osborne computer, 37–38 Peer-to-peer (P2P) networks, Pompeii ruins, digital recreation ethics and, 144
OSI (Open Systems 310–311, 565–566 of, 19 protecting, 4
Interconnection), 582 Peer-to-peer (P2P) sharing, POP (point of presence), 610 social media and, 150–151
Outlook (application), 97, 169, 432 380–381 Pop-up windows, 430 Private Browsing (Firefox),
Output devices, see also Input Pendrivelinux.com, 429 Portable document format (PDF), 428, 626
devices Pentagon Papers, 146 184, 230 Private key, 629
monitors, 60–62 Peripheral devices, 50, 71–75 Portable media players Private-key encryption, 628–629
printers, 62–66 Personal area network (PAN), capacity, 377–378, 379 Problem Steps Recorder
sound output, 66 567–568 defined, 377 (Windows 7), 237
speakers, 66 Personal ethics, 141–144 docks, 379 Procedures (programming), 491
Outputs, 479–480 Personal financial software, features, 378 Process, 479–480
Outsourcing, 457–458 171–172 flash memory, 379 Processor, see CPU (central
Personal firewalls, 421 listening to podcasts on, 103 processing unit)
Personal information, 434–435 size, weight and Processor management, 215–218
P Personal information capabilities, 392 Productivity software, see also
P2P (peer-to-peer) networks, management (PIM) software, transferring files to, 379 Software
310–311, 565–566 168–169 video formats for, 176 database software, 166–167
P2P (peer-to-peer) sharing, Personal video recorder Ports defined, 162
380–381 (PVR), 363 connectivity, 73 features, 169
Packages (programming), 491 Personalization window, 233 data transfer, 72–73 integrated software application,
Packet, 315, 418, 574, 612 Petabyte (PB), 49 defined, 71–72 169–170
Packet filtering, 422 PGP (Pretty Good Privacy), 629 Ethernet port, 73 note taking software,
Packet screening, 594 Pharming, 439–440 expansion cards and hubs, 167–168
Packet sniffer, 418 Phenom processors, 273 74–75 personal financial software,
Packet switching, 612 Phishing, 439–440 FireWire 400, 72–73 171–172
Packets, 586 Photo Story, 172 FireWire 800, 72–73 personal information
Page file, 219 Photocopiers, 420 multimedia, 73–74 management software, 168
Palm Pre, 211 Photography, see Digital parallel, 72 presentation software, 166
Palo Alto Research Center photography serial, 72 spreadsheet software,
(PARC), 40 Photoshop (software), 172 USB, 72 165–166
Palo Alto Software, 182 Photoshop Album Starter video graphics array, 73–74 word processing software,
Panasonic Lumix G2 camera, 384 Edition, 173 Positive acknowledgment 163–165
Pandora Internet Radio, 524 Photoshop Elements (ACK), 617 Professional certifications, 468
Panjiva.com (Web site), 540 (software), 173 Positive psychology, 142 Professional organizations, 469
Parallel advanced technology PHP Hypertext Processor, 501 PositiveUD, 18 Program, 162
attachment (PATA) Physical layer, 582 POST (power-on self-test), 222 Program development life cycle
drives, 282 Physical memory, 277 Postcardware, 190 (PDLC), 478
Parallel ports, 72 Physical topology, 572 Power controls, 75–77 Program files, 435
Parallel processing, 360–361 Physiome Project, 16 Power supply, 75, 264 Programmers, 464
PARC (Palo Alto Research Pidgin (online communication Power surges, 442 Programming
Center), 40 tool), 98 Power-on self-test (POST), 222 algorithm development,
Partial backups, 436 Piggybacking, 327 PowerPC G5 processor, 359 480–482
Partitions, 212 PIM (personal information .pptx (file name extension), 230 coding, 485–493
Pascal, 496 management) software, Preemptive multitasking, compilation, 491–492
Pascal, Blaise, 42 168–169 216–217 debugging, 493–494
Pascalene calculator, 42 Pinnacle Studio (video Preinstalled software, 187–188 decision making and design,
Password Meter, 425–426 software), 389 Presentation layer, 582 482–486
Password-management tools, Pipelining, 358–359 Presentation software, 166 defined, 478
427–428 Pirate Bay, 420 Pretexting, 438–439 documentation, 495
Passwords PirePowua (cluster computing Pretty Good Privacy (PGP), 629 life cycle of information system,
creating, 425 service), 358 Primary keys, 523–524 474–478
managing, 427–428 Placement office, 468 Print servers, 571 life cycle of program, 478

676 Technology in Action


eighth

EDITION
EIGHTH
8
overview, 484
problem statement, 478–480 R RM files, 387
Roberts, Ed, 35
SDLC (system development life
cycle), 474–478
system development life cycle, Rabbit (robot), 22 ROBOLAB (software), 486 SDRAM (Synchronous
474–478 Radio frequency identification Robotic surgery, 16–17 DRAM), 277
testing, 494–495 (RFID) tags, 14, 590–591 Robots, 420 Seagate, 437
visual, 497 RadioShack TRS-80 computer, 37 Roku (digital video player), 391 SeaMonkey Composer (web page
Programming languages RAID (redundant array of Roll Back driver feature authoring software), 256
categories, 486–487 independent disks), 283, 284f (Windows), 220 Search Engine Guide (Web
defined, 486 RAM (random access memory) Rollyo (search engine), 115–116 site), 43
future of, 502–505 adding, 279, 280 ROM (read-only memory), 68, Search Engine Watch, 116
generations, 486–487 amount being used, 277–278 284, 367–368 Search engines
overview, 495–496 amount being used by operating Root directory, 229 algorithms, 115–116
portability, 487 system, 278 Root DNS server, 619 customizing searches, 117
selecting, 496 amount installed, 277–278 Rosetta Stone, 148 for images and videos, 116
for Web applications, 500–502 vs. hard drive, 276–277 Router overview, 115
for Windows applications, management by operating buying, 320 strategies, 117
496–500 system, 218 connecting devices to, 320–322 Second Life (multiplayer online
PROgramming LOGic minimum requirements, 218 defined, 315 game), 106, 185
(PROLOG), 487 overview, 67–68 setting up, 321 Second-generation computers, 44
Programs required, 278–279 wired connections, 320 Second-generation language, 486
deleting, 194, 233–234 selecting, 264 wireless networking support, Second-level domain, 618
downloading, 193 types of, 277 320–321 Sector (hard drive), 238, 286
installing, 193, 233 Range check, 528–529 Routers, 587–588 SecuGen, 429
starting, 194–195 Rapid application Roxio PhotoSuite, 173 Secure HTTP (S-HTTP), 614
uninstalling, 194 development, 497 RPG Maker VX, 178 Secure socket layer (SSL), 109, 621
Programs and Features utility, Raw files, 384 RSI (repetitive strain injury), 78, Security
233–234 Reader, Adobe (software), 79 anonymous Web surfing,
Project management software, 182 107, 184 RSS (Really Simple Syndication), 428–429
Project managers, 464 Read-only memory (ROM), 68, 103 checklist, 444
Project-based IT job, 460 284, 367–368 .rtf (file name extension), 230 firewalls, 421–422
Projectors, 62 Really Simple Syndication RTM (release to manufacturers), password protection and
PROLOG (PROgramming (RSS), 103 495 management, 425–428
LOGic), 487 RealMedia format, 387 RTOS (real-time operating testing, 422–424
Proprietary software, 163 Real-time operating system system), 209–210 Security monitoring software, 326
Proprietary system, 611 (RTOS), 209–210 Rule utilitarianism, 140 Securus Systems Ltd., 631–632
ProStores Business, 183 Real-time processing, 544–545 Runtime errors, 494 Seeds, 524, 611
Protocol, 576 Records, 523 Seek time, 286
Prototype, 497 Recycle Bin, 225, 232, 234 Select query, 530
Proxy server, 594 Recycling computers, 295 S Semantic Web, 124, 125
PS3 (Sony PlayStation 3), 325 Red Hat Linux, 213 SaaS (Software as a Service), 188 Semiconductor, 348
Pseudocodes, 481–482 RedLaser (price comparison Safari (browser), 111, 374 Sensors, 14–15
PSP (Sony PlayStation Portable), tool), 394 Safe mode, 223–224 SEQUEL (Structured English
379, 392–393 Referential integrity, 538 Safeend (software), 591–592 Query Language), 530
Psychology, 21–22 Relation, 524 SafeMessage (software), 631–632 Serial ATA (SATA) drives, 282
Public domain, 16 Relational algebra, 530 Sage Master Builder Serial ports, 72
Public key, 629 Relational databases, 524, 534–542 (software), 184 Server-based networks, see
Public-key encryption, 629 Relationship, 534 SageTV, 391 client/server networks
Push technology, 374 Relativism, 140 Salaries, 461 Servers
PVR (personal video Release to manufacturers Salary.com, 461, 502 application, 571–572
recorder), 363 (RTM), 495 Sampling rate, 377 authentication, 570–571
Remark (programming), 490 Samsung Impression, 369 in client/server networks, 569
Remington Rand, 44 Samsung NV3 (camera), 378–379 communications, 572
Q Remote Play, 325 Samsung TL225 DualView database, 572
QDOS (Quick and Dirty Repetitive strain injury (RSI), camera, 384 dedicated, 570–571
Operating System), 39 78, 79 Sansa (personal media player), defined, 120, 311
QT files, 387 Resolution, 383–384 211, 378 e-mail, 572
Quad processor design, 360 Response time, 61 Sarbanes-Oxley Act, 144 print, 571
Quarantining, 415 Restart command, 76–77 SATA (Serial ATA) drives, 282 quad processor design, 360
QuarkXPress (software), 181 Restore disc, 188 Satellite Internet, 123 Web, 572
Query, 532–533 Restore points, 192 Scalability, 566 Server-side program, 623
Query language, 533 Retail, 6–7 ScanDisk, 236–237 Service packs, 495
Query Wizard, 533 Retail industry, 6–7 Scanners, 385 Service set identifier (SSID), 328
Quick Tabs (Internet Reverse SMS, 424 Scottevest jacket, 568 Session layer, 582
Explorer), 111 Ribbon interface, 226 Screen capture, 207 Set of actions, 483
QuickBooks, 181 Ring topology, 574–576, 578 Screen resolution, 61 Setup.exe, 193
Quicken, 171–172 Ripping, 174, 379 Script kiddies, 417 Shareware, 191
QuickTime format, 387 Risks, 4 Script viruses, 413 Shielded twisted-pair (STP)
QuickTime Player, 107 Rize (digital film), 390 Scripting languages, 500–502 cable, 580
QWERTY keyboard, 52 RJ-45 connectors, 317 Scroll bars, 226 ShieldsUP program, 422–423

Index 677
eighth
EDITION
EIGHTH
8
Shockwave Player, 107 Social media directors, 463 Spotlight (Mac OS X), 261 Synchronous DRAM
Shopping, 394 Social networking, 99–100, Spreadsheet software, 165–166 (SDRAM), 277
ShopSavvy (price comparison 150–151, 434–435 Sprint TV, 369 Syntax, 488
tool), 394 Social Web, 99 Spybot-Search & Destroy Syntax errors, 493
Short messaging service (SMS), Societal ethics, 140 program, 432 System backup, 436
371–372, 424 Soft boot, 220 Spyware, 430 System clock, 354
Shoulder injury, 79 Software, see also Application Spyware removal programs, 292, System development life cycle
ShredIt X (program), 295 software; Open source 430–432 (SDLC), 474–478
S-HTTP (Secure HTTP), 614 software SQL (Structured Query System evaluation
Shutterfly (Web site), 385 beta version, 494–495 Language), 487, 530 audio subsystem, 290–291
Silicon, 348 business software, 181–184 SSD (solid state drive), 71, CPU subsystem, 272–276
Silverlight, 107, 502, 503 buying, 186–187 280, 282 defined, 272
SIMD (Streaming Single defined, 5, 162 SSID (service-set identifier), 328 desktop vs. notebook system,
Instruction Multiple discounted, 189–190 SSL (secure socket layer), 109, 621 271–272
Data), 360 entertainment software, 178–180 Stack, 217 memory subsystem, 276–279
Simonetti, Ellen, 143 freeware, 190–191 Stakeholders, 143 optical storage, 283–286
Simple mail transfer protocol help with, 184–186 Star Office System, 40 storage subsystem, 279–283
(SMTP), 420, 614, 627 installing, 193–194 Star topology, 576–578 system reliability, 291–294
Simulation programs, 179 multimedia software, 172–178 Start menu, 224–225 upgrading vs. buying new
Simulations, 18–19 preinstalled, 187–188 Statements (programming system, 294–296
Single-lens reflex (SLR) productivity software, 162–172 language), 488 video subsystem, 286–290
cameras, 383 shareware, 190–191 Static addressing, 423, 615 System maintenance utilities,
Situational ethics, 140 starting application, 194–195 Stealth viruses, 414 235–237
Sixth Sense, 396–397 suite, 170–171 Storage devices System restore point, 237
SketchUp (3D modeling system requirements, 192–193 capacities, 71 System Restore utility,
software), 184, 256 tutorials, 186 flash storage, 71 237–239, 293
SkyDrive, 436 uninstalling, 194 hard drives, 69–70, 280–283 System software, see also
Skype, 374, 416 updating, 293–294 optical storage, 70–71, 283–286 Operating systems; Utility
Sleep mode, 76 versions, 192 overview, 279–280 programs
SLI standard, 289 Software alerts, 443–444 upgrading, 287 boot process, 221–224
Slingbox, 391 Software as a Service (SaaS), 188 Store-and-forward technology, defined, 50, 162
SLR (single-lens reflex) Software firewalls, 421 371–372 desktop, 224–227
cameras, 383 Software license, 186 STP (shielded twisted-pair) operating system, 208–220
Small Icons view, 229 Software piracy, 187 cable, 580 windows, 224–227
Smart label, 7 Software updates, 416–417, 495 Streaming audio, 106 System unit, 67
Smart playlists (iTunes), 534 Solid state drive (SSD), 71, Streaming Single Instruction Systems analysts, 464
Smartphones 280, 282 Multiple Data (SIMD), 360 Systems development, 464–466
Bluetooth attacks, 424–425 Sonoran Blue, 325 Streaming video, 106, 324
cameras, 383 Sony Bravia television, 391 Streets & Trips, 183
components of, 367 Sony Cybershot DSC-T1 Structured data, 525 T
data plan, 372 camera, 384 Structured English Query T line, 609
data transfer rate, 372–373 Sony Dash Personal Internet Language (SEQUEL), 530 Tables, 523
displaying content from the Viewer, 326 Structured Query Language Tablet PCs, 50, 56–57, 392
Internet, 373–374 Sony DPP-F700 digital (SQL), 487, 530 Tabulating Machine Company,
features, 366 frame/printer, 386 StumbleUpon (search engine), 42–43
Internet connectivity, 372–374 Sony PlayStation, 211 115–116 Tags, 500
keeping number private, 376 Sony PlayStation 3 (PS3), 325 Stylus, 50, 51 Target, 108, 385
microbrowser, 373–374 Sony PlayStation Portable (PSP), Subdirectory, 113 Task Manager utility, 237
operating system for, 211 379, 392–393 Subroutines (programming), 491 Task Scheduler, 239, 240f
processor functions in, 367 Sony Reader Digital Book, 393 Sugar (operating system), Taskbar, 225
size, weight and Sony Sound Forge Pro, 176 216–217 Tax preparation software, 171
capabilities, 392 Sound cards, 67, 264, 290–291 Summary report, 545 TaxiHack, 395
software, 369–370 Sound input, 59 Supercomputers, 51, 210, 360 TCP (Transmission Control
transferring files from computer Sound output, 66 Supervisor program, 222 Protocol), 614
to, 370 Source code, 213, 491 Support services, 467 TCP/IP (Transmission Control
virtual phone number, 376 SourceForge.net, 190–191, 499 Surge protector, 442–443 Protocol/Internet
viruses, 376 Spaces (Mac OS X), 261 Surround sight, 290 Protocol), 613
SMS (short messaging service), Spam, 5, 23, 410, 432–433 Surround-sound speakers, 66, TealLock (software), 444
371–372, 424 Spam blogs, 101 290–291 TealPoint Software, 444
SMTP (Simple Mail Transfer Spam filter, 432 Surveillance cameras, 22–23 Technical services, 466
Protocol), 420, 614, 627 SPAMfighter, 432 S-video (super video) port, 74 Technical writers, 464–465
SnagIt Screen Capture, 191 Speakers, 66 Swap file, 219 Technorati (search engine),
Snapfish (Web site), 177 Speech recognition software, Swarm, 611 115–116
Snipping Tool, 207 174, 175 Switch (star topology), 576 TechSmith Corporation, 191, 207
Snopes (Web site), 441 Speech Recognition Utility, 241 Switches, 315, 319–320, Techsoup (web site), 22
Snow Leopard (Mac OS X), 261 Spidering, 413 347–348, 587 Telecommunication
Social bookmarking, 114–115 Spim, 432 Symantec, 376, 415 technicians, 467
Social engineering, 438–439 Splogs, 101 Symbian OS, 367, 376 Telecommuting, 460
Social justice, 144, 146 Sports science, 19–20 Sync Center, 370 TeleNav Navigator, 374

678 Technology in Action


eighth

EDITION
EIGHTH
8
Telephony, 366 Tomlinson, Jillian, 143
telephony, digital Tomlinson, Ray, 627 U Variable declaration, 488
Variables, 488
defined, 366 Toolbars, 226 UAVs (unmanned aerial vehicles), VBScript, 501, 503
Internet connectivity, 372–374 Top-down design, 484 13, 14 Vehicle WiFi (ViFi), 579
text messaging, 371–372 Top-level domain, 112, 618 Ubiquitous computing (ubicom), VeriChip, 18
Voice over Internet Protocol, Torvalds, Linus, 213 393–397 VeriSign, 109, 440, 618
374–376 Touch screens, 56–57 Ubuntu (operating system), Verizon V Cast, 369
Television Touchpad, 55 259, 429 Vertical market software, 184
connecting to computers, 74 TPI (outsourcing advisory UDP (user diagram protocol), 616 VGA (Video Graphics Array) port,
digital, 390 firm), 457 Unethical behavior, 140–141 73–74
Telnet, 614, 619–620 TPS (transaction-processing Unicode, 352–353 Video, digital
Telussion, 376 system), 544–545 Unidirectional microphones, 59 advantages, 390–391
Templates, 169 Track (hard drive), 238, 286 Uniform Resource Locator editing, 387
Terabyte (TB), 49 Trackball mouse, 55 (URL), 112 menuing system, 388–389
Test conditions, 483 Tracking cookies, 433–434 Uninstalling programs, 194 sources, 386, 389
Testing (programming), 494–495 Trackpoint device, 55 Uninterruptible power supply uploading, 389
Testing plan, 479–480 Training, 271 (UPS), 443 watching on portable
Tethered downloads, 380 Transaction-processing system United Parcel Service (UPS), 7–8 device, 391
Text field, 522, 523 (TPS), 544–545 UNIVAC (Universal Automatic webcasting, 389
Theft, 410 Transceiver, 316 Computer), 44, 349–350 Video capture, 57–59
Theft prevention Transistor, 44 Universal Automatic Computer Video cards
alarms, 443 Transistors, 348–350 (UNIVAC), 44, 349–350 defined, 287–288
locks and surrounds, 443 Transmission Control Protocol Universal remote, 13 functions of, 289
software alerts, 443–444 (TCP), 614 Universities, 467–468 graphics processing unit, 288
Themovieblog.com, 101 Transmission Control University of Michigan, 21 integrated, 288
Therac-25, 477 Protocol/Internet Protocol UNIX, 210 on motherboard, 67
Thermal bubble inkjet printer, 65 (TCP/IP), 613 Unmanned aerial vehicles multiple, 289
Thermal printers, 64 Transmission media (UAVs), 13, 14 selecting, 264
Thermal wax printing, 64 in client/server networks, 569 Unshielded twisted-pair (UTP) upgrading, 289–290
ThingM, 394 coaxial cables, 580–581 cable, 317, 318, 580 video memory, 288–289
ThinkFree Office Live, 189, 255 comparison of, 581–583 Unstructured data, 525 Video game design, 9
ThinkGeek (Web site), 375 defined, 313, 579 Updates, 293–294 Video game developers, 466
Third-generation computers, 44 fiber-optic cable, 581 UPS (uninterruptible power Video game industry, 9, 178, 466
Third-generation language, 487 overview, 578–579 supply), 443 Video graphics array (VGA) port,
Threadless.com, 630 twisted-pair cable, 580 UPS (United Parcel Service), 7–8 73–74
Threats, computer types of, 313 Urban legend, 440 Video logs (vlogs), 100–102
denial-of-service attacks, wired, 578–581 URL (Uniform Resource Video memory, 287
419–420 wireless, 581 Locator), 112 Video producers, 462
hackers, 417–418 Transport layer, 582 U.S. Olympic Training Center, 19 Videoconferencing, 58–59
malware, 430 Transport layer security USB data cable, 370 Viewing angle, 61
pharming, 439–440 (TLS), 621 USB drives, 71 ViFi (Vehicle WiFi), 579
phishing, 439–440 Transportation Security USB ports, 72 Vimeo (Web site), 386
spam, 432–433 Administration (TSA), 11 Used software, 190 Virtual account numbers, 440
spyware, 430–432 Trillian (online communication User diagram protocol (UDP), 616 Virtual Lab, 15
Trojan horses, 418–419 tool), 98 User interface, 214–215 Virtual laser keyboard, 52, 53
viruses, 411–414 Trojan horses, 418–419, 591 Ustream (Web site), 386 Virtual memory, 219
Three-way handshake, TruthOrFiction.com, 441 Utilities (Mac OS X), 262–263 Virtual phone number, 376
616–617 TSA (Transportation Security Utility programs Virtual private network (VPN),
Throughput, 313 Administration), 11 accessibility, 240–241 568–569
Throughput speeds, 316–317 TTL (time to live), 620 Backup and Restore utility, 239 Virtual reality programs, 178, 185
Thumb drives, 71 TubeSock, 169 defined, 208 Virtual tours, 9–10
Thunderbird (e-mail Tucows.com, 191 display, 233 Viruses
program), 256 Tuner, 13 Ease of Access Center, 240–241 avoiding, 4
Ticket ordering system, 465 Tunnel interface, 569 file compression, 234–235 boot-sector, 411–412
TIFF files, 385 Tunneling, 568–569 for Mac computers, 262–263 on cell/smartphones, 376
Tiles view, 229 TurboTax (tax preparation Programs and Features utility, classifications, 413–414
Time bombs, 412 software), 171 233–234 defined, 410
Time Capsule wireless router, TurboTax Online, 189 system maintenance, 235–237 e-mail viruses, 413
239, 323 Turing, Alan, 44 System Restore, 237–239 encryption viruses, 413
Time Machine (Mac OS X), 239, Turing Machine, 44 Task Scheduler, 239, 240 from flash drives, 591
261, 438 Turning on and off, 75 UTP (unshielded twisted-pair) host program, 410
Time to live (TTL), 620 Turnitin.com, 118 cable, 317, 318, 580 infection by, 410, 412
Time-variant data, 541 Tutorials, 186 Utterback, Camille, 9 macro, 413
TiVo Premiere, 325 TV tuner, 13 multipartite, 414
TLS (transport layer Tweets, 106 polymorphic, 413–414
security), 621 Twisted-pair cables, 313, 580 V purpose of, 410
Toggle keys, 54 Twisted-pair wiring, 122 Vacuum tubes, 348 quarantining, 415
Token method, 575 Twitter, 106, 420, 517 Validation, 528–532 script, 413
Token-ring topology, 574 .txt (file name extension), 230 Validation rule, 528 signature, 414

Index 679
eighth
EDITION
EIGHTH
8
Viruses (Continued) Web development, 462–464 Windows Word for MS-DOS, 40
stealth, 414 Web galleries, 8 arranging on desktop, 226 Word processing software,
symptoms of infection, 414 Web interface designers, 459 defined, 225 163–164
time bombs, 412 Web master, 462 moving, 226–227 WordPerfect, 40
types of, 411–413 Web Monkey (web site), 500 resizing, 226–227 Wordpress.com, 101
worms, 412–413 Web pages Windows 7 operating system, WordStar, 40
Visicalc, 39 History list, 114 211–212 World of Warcraft (multiplayer
Visio, 180 hyperlinks, 113–114 Windows 95 operating system, 41 online game), 106
Visual Basic, 497–498, 503 visited, returning to, 113–114 Windows desktop, 224–225 World Wide Web, 4, 94–95, 112. see
Visual programming, 497 Web publishers, 463 Windows Explorer, 228 also Internet
Vlog It!, 101 Web robots, 413 Windows key (keyboard), 54 World Wide Web Consortium,
Vlogs (video logs), 100–102 Web server, 112, 572, 610 Windows Live Mail, 432 500, 608
Voice recognition Web server administrators, 467 Windows Live Messenger, 98, 632 World Wind, 15
software, 174 Web service, 498 Windows Live Photo Gallery, 385 Worms, 412–413
VoIP (Voice over Internet Web sites, 95, 112, 118. see also Windows Media Center, 13 Wozniak, Steve, 35–36
Protocol) Internet Windows Media Player, 177 WPA (WiFi Protected Access), 328
advantages and disadvantages Web-based applications, 163, Windows Media Video .wpd (file name extension), 230
of, 375–376 188–189, 255 format, 387 WriteCheck.com, 118
vs. conventional telephone Web-based e-mail, 97, 432 Windows Mobile, 211 Writer (OpenOffice), 163, 253
call, 633 Web-based operating system, 215 Windows Mobile operating
defined, 274 Web-based software, 255 system, 367
how it works, 633–634 Webcams, 23 Windows Phone 7, 367 X
new features, 376 Webcasts, 104–106, 389 WineM, 394 XBMC Media Center
requirements, 374–375 Weblogs (blogs), 100–102 Wipe (program), 295 (software), 363
security of, 634 WebOS, 211, 367 Wireclub, 98 Xbox 360, 211, 334
Volatile memory, 367 WebSphere, 183 Wired Equivalent Privacy XChat (online communication
Volatile storage, 67, 276 WeFi.com, 314 (WEP), 328 tool), 98
Voltaic Backpack, 568 WEP (Wired Equivalent Wired transmission media, Xerox, 40–41
Vonage, 374–375 Privacy), 328 578–581 XHTML (eXtensible HyperText
VPN (virtual private network), Western Digital My Book, 323 Wireless access points Markup Language), 500,
568–569 What-if analysis, 166 (WAPs), 585 501–502, 503, 621–622, 624
Whisher, 314 Wireless Fidelity, see WiFi .xlsx (file name extension), 230
Whistle-blowers, 143, 146 Wireless Internet, 123–125
W White-hat hackers, 417 Wireless Internet service provider
XML (eXtensible Markup
Language), 502, 503, 622
Walgreens, 385 Whole-house surge (wireless ISP), 372 XNA Game Studio, 473
Walmart, 385 protectors, 442 Wireless keyboards, 54
WAN (wide area network), Wide area network (WAN), Wireless Markup Language
312, 567
WAPs (wireless access
312, 567
Widgets, 225
(WML), 374, 622
Wireless media, 581
Y
points), 585 WiFi (Wireless Fidelity) Wireless microphones, 59 Yahoo! (search engine), 115
Warm boot, 76, 220 hot spots, 123–124 Wireless mouse, 55–56 Yahoo! Mail, 97, 432
WAV files, 176 mobile hot spots, 373 Wireless network interface card Yahoo! Maps, 183
Wearable screens, 81 sharing Internet connection, 314 (wireless NIC), 585 Yahoo! Messenger, 98, 632
Web, 4, 94–95, 112 sharing services, 314 Wireless networks Yodlee MoneyCenter, 171
Web 2.0 technologies, see also standards, 316, 581 securing, 327–329 YouTube, 101, 116, 386, 389
Internet WiFi Detector T-shirt, 375 standards, 316
blogs, 100–102 WiFi Free Spot, 123 throughput speeds, 316–317
defined, 99 WiFi IP phones, 375 Wireless printers, 63 Z
podcasts, 102–104 WiFi printers, 63 Wireless range extender, 335 Z1 mechanical calculator, 43
social networking, 99–100 WiFi Protected Access WITI (Women in Technology Zetabyte (ZB), 49
video logs, 100–102 (WPA), 328 International), 470 .zip (file name extension), 230
webcasts, 104–106 Wifi.com, 314 Witness Project, 396 Zip disk drive, 69
whistle-blowing and, 146 WiFiHotSpotList.com, 123 Wizard, 169 Zirko, Steven, 11
wikis, 102 WikiHow, 102 WMA files, 176, 378 Zoho (Web site), 189, 190, 255, 542
Web application developers, 459 WikiLeaks, 146–147 WML (Wireless Markup Zombies, 419
Web applications, 500 Wikipedia (online Language), 374, 622 ZoneAlarm Internet Security
Web browsers, 95, encyclopedia), 102 WMV files, 387 Suite, 421
110–111, 626 Wikis, 102 Women in Technology Zune (personal media player),
Web cam, 57–59 WiMAX, 123, 630 International (WITI), 470 211, 378
Web content creators, 462 Winamp, 177 Wonderwall projector, 62 Zuse, Konrad, 43

680 Technology in Action


eighth

EDITION
EIGHTH
Credits
8
Cover photo Dieter Matthes\AGE Fotostock Figure 1.12 Polhemus/Fast Scan
America, Inc. Figure 1.12b Paul Ekman Group, LLC.
Figure 1.13 © Digital Art/CORBIS All Rights
Reserved
Chapter 1 Figure 1.13a Paul Ekman Group, LLC.
Figure 1.1 The Dell logo is a trademark of Figure 1.14 Tom Pantages
Dell Inc.
Figure 1.16a Stocktrek Images/Getty Images
Figure 1.1b2 Logitech Inc.
Figure 1.16b Lefteris Pitarakis\AP Wide World
Figure 1.1b3 Belkin International, Inc. Photos
Figure 1.2 www.CartoonStock.com Figure 1.17 © Schlegelmilch/CORBIS All Rights
Figure 1.3a The Dell logo is a trademark of Reserved
Dell Inc. Figure 1.19a Ed Pfueller/Columbia Daily
Figure 1.3b PRNewsFoto/D-Link Systems\ Tribune/AP Photo
D-Link Systems, Inc. Figure 1.19b Photo courtesy of METI © METI
Figure 1.3c Handout/MCT\Newscom Figure 1.20a © 2008 Intuitive Surgical, Inc.
Figure 1.3d Motorola\Motorola PCS/CSG Figure 1.20b © 2008 Intuitive Surgical, Inc.
Figure 1.3e Belkin International, Inc. Figure 1.21 Courtesy of Dr. Peter Fromherz/Max
Planck Insitute of Biochemistry
Figure 1.3e-1 ExpressCard - PCMCIA
Figure 1.22a Shawn K Kelly PhD
Figure 1.3g Apple Computer, Inc.
Figure 1.22b Shawn K Kelly PhD
Figure 1.4a Simon Krzic\Shutterstock
Figure 1.23 Reuters/Eriko Sugita\Landov Media
Figure 1.4b Mclek\Shutterstock
Figure 1.23a Steve Bloom Images\Alamy Images
Figure 1.4c Richard Peterson\Shutterstock
Figure 1.23b NOAA\Public Domain
Figure 1.4d Dmitriy Shironosov\Shutterstock
Figure 1.25 Media from the Discovery Channel’s
Figure 1.4e Saleeee\Shutterstock Pompeii: The Last Day, courtesy of
Figure 1.4f yuyangc\Shutterstock Crew Creative, Ltd.
Figure 1.4g Dimitrije Paunovic\Shutterstock Figure 1.26a Interactive Sports Technologies
Figure 1.5a Editorial Image; LLC\Alamy Images Figure 1.26b Interactive Sports Technologies
Figure 1.5b United Parcel Service - DO NOT Figure 1.27 Mazur Group
USE!! Figure 1.28 AP Wide World Photos
Figure 1.5c Mary Kate Denny\PhotoEdit Inc. Figure 1.30a SparkFun Electronics
Figure 1.7 Peter Schaaf Figure 1.30b © (Photographer)/CORBIS All Rights
Figure 1.8a Camille Utterback, “Untitled 5”, from Reserved
the “External Measures” series. Photo Figure 1.31 Gerald Herbert\AP Wide World
by Peter Harris, © 2007 Photos
Figure 1.8b Camille Utterback, “Untitled 5”, from
the “External Measures” series. Image
courtesy of the artist. TECHNOLOGY IN FOCUS:
Figure 1.8c Camille Utterback, “Untitled 5”, from The History of the PC
the “External Measures” series. Image Chapter SuperStock\Jupiter Images
courtesy of the artist. opener a
Figure 1.11a Apple Computer, Inc. Chapter Courtesy of Apple Computer, Inc.
Figure 1.11b Moeskau Photography opener b

681
eighth
EDITION
EIGHTH
8
Figure 1 Heinz Nixdorf Musuemsforum\AP Figure 2.12 Newton Peripherals, LLC
Wide World Photos Figure 2.14 Hewlett-Packard Company
Figure 2a Getty Images Figure 2.15 EPOS
Figure 2b © Roger Ressmeyer/CORBIS All Figure 2.16a Courtesy of Sony Electronics Inc.
Rights Reserved
Figure 2.16b Fancy/Veer\Corbis RF
Figure 3 SSPL\The Image Works
Figure 2.17 Bennet\The Christian Science
Figure 4 Roger Ressmeyer\CORBIS- NY Publishing Society
Figure 6 Jerry Mason/SPL\Photo Researchers, Figure 2.18 Blue Microphones
Inc.
Figure 2.19 © Owen Franken/Corbis
Figure 7 Photo Courtesy of The Computer
History Museum Figure 2.22b PRNewsFoto/NEC Solutions
(America) Inc.\AP Wide World
Figure 8 Photo Courtesy of The Computer Photos
History Museum
Figure 2.23 Canon U.S.A., Inc.
Figure 9 Roberto Brosan\Time Inc. Magazine
Figure 2.24 Courtesy Xerox Corporation
Figure 10 © Doug Wilson/CORBIS All Rights
Reserved Figure 2.26 Photo courtesy of XEROX Corporate
Public Relations.
Figure 11 Daniel Bricklin
Figure 2.27 Extech Instruments Corporation
Figure 13 Photo Courtesy of The Computer
History Museum Figure 2.29 © 2008 XFXForce.com

Figure 14 SSPL\The Image Works Figure 2.31 Hugh Threlfall\Alamy Images

Figure 15 ©Historical Picture Archive/CORBIS Figure 2.31b Lenovo, Inc.

Figure 16 Photo Courtesy of The Computer Figure 2.32b Photo courtesy of Iomega
History Museum Corporation

Figure 17 Photo Courtesy of The Computer Figure 2.32c Courtesy Western Digital Corporation
History Museum Figure 2.33a Rafael Angel Irusta Machin\Alamy
Figure 18 Ames Laboratory Images Royalty Free

Figure 19 U.S. Naval Historical Center Figure 2.33b Handout/KRT\Newscom


Photography Figure 2.33c Copyright 2008 Mimoco. COURTESY
Figure 20 Photo Courtesy of The Computer OF LUCASFILM LTD. TM & ©
History Museum Lucasfilm Ltd. All rights reserved.
Used under authorization.
Figure 21 Courtesy of Intel Corporation Unauthorized duplication is a
violation of applicable law.
Chapter 2 Figure 2.34a D. Hurst\Alamy Images Royalty
Free
Figure 2.3 Apple Computer, Inc. Figure 2.34b Courtesy Western Digital Corporation
Figure 2.5 Wacom Technology Corporation Figure 2.34c Christophe Testi\Shutterstock
Figure 2.6 Logitech Inc. Figure 2.34d Sony Electronics, Inc.\Newscom
Figure 2.7 Alan Ford\Alamy Images Figure 2.34e Olaf Jansen\Alamy Images
Figure 2.8a Martin Meissner\AP Wide World Figure 2.34f Studio 101\Alamy Images Royalty
Photos Free
Figure 2.8b Ergodex Figure 2.34g Studio 101\Alamy Images Royalty
Figure 2.11 Lenovo, Inc. Free

682 Technology in Action


eighth

EDITION
EIGHTH
8
Figure 2.34h Samsung Electronics America, Inc. TECHNOLOGY IN FOCUS:
Figure 2.34i Silicon Power Computer and Ethics
Communicatons
Chapter sjlocke\iStockphoto.com
Figure 2.35a David A. Tietz opener
Figure 2.35b Hewlett Packard HP 1 Figure 2 © Anton Seleznev/Courtesy of
Figure 2.36 Phil Burton\Alamy Images www.istockphoto.com
Figure 2.37 David A. Tietz Figure 5 Cartoon Stock
Figure 2.38 Editorial Image, LLC\Alamy Images Figure 11 Michael D Brown\Shutterstock
Royalty Free
Figure 2.38a Tim Arbaev\Shutterstock
Figure 2.38b Szymon Apanowicz\Shutterstock
Chapter 4
Figure 2.40 Syd M Johnson\The Image Works
Chapter Brent Walker\Shutterstock
Figure 2.42a Artur Synenko\Shutterstock
opener
Figure 2.43 Look Twice\Alamy Images
Figure 4.10b Avanquest North America Inc.
Figure 2.46 ROBYN BECK/AFP/Getty
Figure 4.10d Corel
Images\Newscom
Figure 4.20 PhotoEdit Inc.
Figure 2.47 Courtesy of Sony Electronics Inc.
Figure 4.26a Second Life is a trademark of Linden
Figure 2.48 Tom Theobald\Alamy Images
Research, Inc. Certain materials have
been reproduced with the permission
of Linden Research, Inc.
Chapter 3 Figure 4.26b Second Life is a trademark of Linden
Research, Inc. Certain materials have
Chapter Lukiyanova Natalia/
been reproduced with the permission
opener frenta\Shutterstock
of Linden Research, Inc.
Figure 3.1 Apple Computer, Inc.
Figure 4.26c Second Life is a trademark of Linden
Figure 3.10a jeny\Shutterstock Research, Inc. Certain materials have
Figure 3.10b Supri Suharjoto\Shutterstock been reproduced with the permission
of Linden Research, Inc.
Figure 3.10c AVAVA\Shutterstock
Figure 3.10R1 Monkey Business Images
\Shutterstock
Figure 3.10R2 Jaimie Duplass\Shutterstock Chapter 5
Figure 3.15 Daniel Heghton\
Chapter siloto\Shutterstock
Alamy Images
opener
Figure 3.16 Newscom
Figure 5.7c B. O’Kane\Alamy Images
Figure 3.18a Cecilia Lim H M\Shutterstock
Figure 5.9 fuseproject
Figure 3.18b Tatiana Popova\Shutterstock
Figure 3.33 Courtesy of www.istockphoto.com
Figure 3.34a Sierra Wireless, Inc. TECHNOLOGY IN FOCUS:
Figure 3.34b Sierra Wireless, Inc. Computing Alternatives
Figure 3.35a William Casey\Shutterstock Figure 5.UN1 Marilyn Conway/Photographer’s
Figure 3.35b Tomasz Sz.\Shutterstock Choice/Getty Images

Credits 683
eighth
EDITION
EIGHTH
8
Chapter 6 TECHNOLOGY IN FOCUS:
Under the Hood
Chapter Falcon Northwest
opener 2 Chapter Verity Smith\Jupiter Images
opener PictureArts Corporation/Brand X
Chapter Ramsom Koay
Royalty Free
opener 3
Figure 2a © CORBIS
Figure 6.3a David A. Tietz
Figure 6.3b David A. Tietz
Figure 6.5a Courtesy of Intel Corporation Chapter 8
Figure 6.5b Courtesy of International Business Chapter grzym\Shutterstock
Machines Corporation. Unauthorized opener
use not permitted./IBM Figure 8.6 David Young-Wolff\PhotoEdit Inc.
Figure 6.6a Courtesy of Intel Corporation Figure 8.7b MWW Group
Figure 6.6b Courtesy of Intel Corporation Figure 8.8a Koksharov Dmitry\Shutterstock
Figure 6.6c Courtesy of Intel Corporation Figure 8.17 ThinkGeek Inc.
Figure 6.12a Hugh Threlfall\Alamy Images Figure 8.19a SanDisk and Sanza FUZE are
Figure 6.12b Corsair trademarks of SANDISK Corporation
Figure 6.16a Editorial Image\Alamy Images Figure 8.19c Courtesy of Apple
Figure 6.16b Editorial Image\Alamy Images Figure 8.19d Apple Computer, Inc.
Figure 6.17 Brian Moeskau\Moeskau Photography Figure 8.19e Archos, Inc.
Figure 6.17a Moeskau Photography Figure 8.24 NeatReceipts®
Figure 6.17b Moeskau Photography Figure 8.28 Pure Digital Technologies Inc
Figure 6.17c Moeskau Photography Figure 8.31 Sling Media, Inc.
Figure 6.22b Editorial Image LLC Figure 8.33 Nokia
Figure 6.27 PRNewsFoto/NVIDIA Figure 8.38 Superbass\Wikipedia, The Free
Corporation\AP Wide World Photos Encyclopedia
Figure 6.28 Nvidia Figure 8.42a Len Green\Shutterstock
Figure 6.31a Advanced Micro Devices Figure 8.42b Pedro Salaverria\Shutterstock
Figure 6.33 Photo courtesy of Creative Labs, Inc.
Sound Blaster and Audigy are
registered trademarks of Chapter 9
CreativeTechnology Ltd. in the United
States and other countries. Chapter Robert F. Balazik\Shutterstock
opener
Figure 6.36 Eduardo Contreras/San Diego
Union-Tribune/ZUMA Figure 9.1 Mauro Bighin\Shutterstock
Press\Newscom Figure 9.8 Kevin Siers. © 2000 The Charlotte
Observer. KING FEATURES
SYNDICATE

Chapter 7 TECHNOLOGY IN FOCUS:


Chapter valdis torms\Shutterstock Careers in IT
opener Chapter Carol and Mike Werner\Alamy
Figure 7.14 Norman Chan \Shutterstock opener Images

684 Technology in Action


eighth

EDITION
EIGHTH
8
Figure 2a Clive Streeter © Dorling Kindersley, Figure 11.32a AVAVA\Shutterstock
Courtesy of The Science Museum, Figure 11.32b Jace Tan\Shutterstock
London
Figure 11.33 Michael Jung\Shutterstock
Figure 5b Jenn Mackenzie\Shutterstock
Figure 11.33b Sean Prior\Shutterstock
Figure 5c Stephen Coburn\Shutterstock
Figure 11.33c Sean Prior\Shutterstock
Figure 5d wavebreakmedia ltd\Shutterstock
Figure 11.33d Raisa Kanareva\Shutterstock
Figure 5a photobank.ch \Shutterstock
Figure 11.34a Dash\Shutterstock
Figure 5e © Mark A. Johnson/CORBIS All Rights
Reserved Figure 11.34b Monjey Business Images\Shutterstock

Figure 9a Supri Suharjoto\Shutterstock Figure 11.34c Craig Hill\Shutterstock

Figure 9b zimmylws\Shutterstock Figure 11.34d Fillip Fuxa\Shutterstock

Figure 9c Andresr\Shutterstock
Figure 11 Arthur Kwiatkowski\
iStockphoto.com
Chapter 12
Chapter HomeStudio\Shutterstock
opener
Chapter 10
Figure 10.3 PHOTOTAKE Inc.\Alamy Images
Chapter 13
Figure 10.19 Daft_Lion_Studio\iStockphoto.com
Chapter dotSyntax, LLC
Figure 10.21 © CORBIS All Rights Reserved
opener
Figure 10.28 Stichting Blender
Figure 13.10a Rob Marmion\Shutterstock
Figure 10.29 Luis Guillermo Restrepo Rivas
Figure 13.10b Tan Kian Khoon\Shutterstock
Figure 13.21 © Brendan McDermid/epa/CORBIS
Chapter 11 All Rights Reserved

Chapter John Schwegel/Alamy Figure 13.23 Thomas Peter Voss\Shutterstock


opener Figure UN.1 Bernhard Richter\Shutterstock
Figure 11.4a Sean Prior\Shutterstock Figure UN.2 Simone van den Berg\Shutterstock
Figure 11.4b Tan Klan Khoon\Shutterstock Figure UN.3 ampyang\Shutterstock
Figure 11.4c AVAVA\Shutterstock Figure UN.4 Adl\Shutterstock
Figure 11.4d Monkey Business Images\Shutterstock Figure UN.5 Lisa F. Young\Shutterstock

Credits 685
This page intentionally left blank
SINGLE PC LICENSE AGREEMENT AND LIMITED WARRANTY

READ THIS LICENSE CAREFULLY BEFORE OPENING THIS PACKAGE. BY OPENING THIS PACKAGE, YOU ARE AGREEING
TO THE TERMS AND CONDITIONS OF THIS LICENSE. IF YOU DO NOT AGREE, DO NOT OPEN THE PACKAGE. PROMPTLY
RETURN THE UNOPENED PACKAGE AND ALL ACCOMPANYING ITEMS TO THE PLACE YOU OBTAINED THEM. THESE
TERMS APPLY TO ALL LICENSED SOFTWARE ON THE DISK EXCEPT THAT THE TERMS FOR USE OF ANY SHAREWARE OR
FREEWARE ON THE DISKETTES ARE AS SET FORTH IN THE ELECTRONIC LICENSE LOCATED ON THE DISK:

1. GRANT OF LICENSE and OWNERSHIP: The enclosed computer programs (“Software”) are licensed, not sold, to you by Prentice-Hall,
Inc. (“We” or the “Company”) and in consideration of your purchase or adoption of the accompanying Company textbooks and/or other
materials, and your agreement to these terms. We reserve any rights not granted to you. You own only the disk(s) but we and/or our
licensors own the Software itself. This license allows you to use and display your copy of the Software on a single computer (i.e., with a
single CPU) at a single location for academic use only, so long as you comply with the terms of this Agreement. You may make one copy
for back up, or transfer your copy to another CPU, provided that the Software is usable on only one computer.

2. RESTRICTIONS: You may not transfer or distribute the Software or documentation to anyone else. Except for backup, you may not
copy the documentation or the Software. You may not network the Software or otherwise use it on more than one computer or computer
terminal at the same time. You may not reverse engineer, disassemble, decompile, modify, adapt, translate, or create derivative works
based on the Software or the Documentation. You may be held legally responsible for any copying or copyright infringement which is
caused by your failure to abide by the terms of these restrictions.

3. TERMINATION: This license is effective until terminated. This license will terminate automatically without notice from the Company if
you fail to comply with any provisions or limitations of this license. Upon termination, you shall destroy the Documentation and all copies
of the Software. All provisions of this Agreement as to limitation and disclaimer of warranties, limitation of liability, remedies or damages,
and our ownership rights shall survive termination.

4. DISCLAIMER OF WARRANTY: THE COMPANY AND ITS LICENSORS MAKE NO WARRANTIES ABOUT THE SOFTWARE,
WHICH IS PROVIDED “AS-IS.” IF THE DISK IS DEFECTIVE IN MATERIALS OR WORKMANSHIP, YOUR ONLY REMEDY IS TO
RETURN IT TO THE COMPANY WITHIN 30 DAYS FOR REPLACEMENT UNLESS THE COMPANY DETERMINES IN GOOD FAITH
THAT THE DISK HAS BEEN MISUSED OR IMPROPERLY INSTALLED, REPAIRED, ALTERED OR DAMAGED. THE COMPANY DIS-
CLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE COMPANY DOES NOT WARRANT, GUARANTEE OR
MAKE ANY REPRESENTATION REGARDING THE ACCURACY, RELIABILITY, CURRENTNESS, USE, OR RESULTS OF USE, OF
THE SOFTWARE.

5. LIMITATION OF REMEDIES AND DAMAGES: IN NO EVENT, SHALL THE COMPANY OR ITS EMPLOYEES, AGENTS, LICENSORS
OR CONTRACTORS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
OR IN CONNECTION WITH THIS LICENSE OR THE SOFTWARE, INCLUDING, WITHOUT LIMITATION, LOSS OF USE, LOSS OF
DATA, LOSS OF INCOME OR PROFIT, OR OTHER LOSSES SUSTAINED AS A RESULT OF INJURY TO ANY PERSON, OR LOSS OF OR
DAMAGE TO PROPERTY, OR CLAIMS OF THIRD PARTIES, EVEN IF THE COMPANY OR AN AUTHORIZED REPRESENTATIVE OF
THE COMPANY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS DO NOT ALLOW THE
LIMITATION OF DAMAGES IN CERTAIN CIRCUMSTANCES, SO THE ABOVE LIMITATIONS MAY NOT ALWAYS APPLY.

6. GENERAL: THIS AGREEMENT SHALL BE CONSTRUED IN ACCORDANCE WITH THE LAWS OF THE UNITED STATES OF
AMERICA AND THE STATE OF NEW YORK, APPLICABLE TO CONTRACTS MADE IN NEW YORK, AND SHALL BENEFIT THE
COMPANY, ITS AFFILIATES AND ASSIGNEES. This Agreement is the complete and exclusive statement of the agreement between you
and the Company and supersedes all proposals, prior agreements, oral or written, and any other communications between you and the
company or any of its representatives relating to the subject matter. If you are a U.S. Government user, this Software is licensed with
“restricted rights” as set forth in subparagraphs (a)-(d) of the Commercial Computer-Restricted Rights clause at FAR 52.227-19 or in
subparagraphs (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, and similar clauses, as
applicable.

Should you have any questions concerning this agreement or if you wish to contact the Company for any reason, please contact in writing:
Multimedia Production, Higher Education Division, Prentice-Hall, Inc., 1 Lake Street, Upper Saddle River NJ 07458.

Please see the Read Me file in the root directory of this CD or visit www.pearsonhighered.com/skills for detailed system requirements.

PLAYING ACTIVE HELPDESKS IN WINDOWS VISTA AND WINDOWS 7:


In order to play the Active Helpdesks in Windows Vista and Windows 7, you will need to disable Protected Mode in Internet Explorer.
To do so, please follow these instructions:

1. Open Internet Explorer


2. Click Tools
3. Select Internet Options
4. Select the Security Tab
5. Uncheck the “Enable Protected Mode” box
6. Restart Internet Explorer

You might also like