4176
4176
com
https://ebookluna.com/product/ebook-pdf-technology-in-
action-introductory-15th-edition-by-alan-evans/
OR CLICK HERE
DOWLOAD NOW
https://ebookluna.com/product/ebook-pdf-technology-in-action-
complete-12th-edition-by-alan-evans/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-technology-in-action-
complete-16th-edition-by-alan-evans/
ebookluna.com
https://ebookluna.com/product/technology-in-action-complete-15th-
edition-ebook-pdf/
ebookluna.com
https://ebookluna.com/product/original-pdf-technology-in-action-
complete-15th-edition/
ebookluna.com
(eBook PDF) Technology In Action Complete, Global Edition
15th Edition
https://ebookluna.com/product/ebook-pdf-technology-in-action-complete-
global-edition-15th-edition/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-technology-in-action-
complete-13th-edition/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-technology-in-action-
complete-14th-edition/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-introductory-algebra-5th-
edition-by-alan-s-tussy/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-contracts-law-in-action-
volume-1-the-introductory-course-4th-edition/
ebookluna.com
'
INTRODUCTORY
ALAN EVANS
KENDALL MARTIN
MARY ANNE POATSY
Power Management and Ergonomics ................................................................................................................ 70
Power Controls and Power Management. ............................................................................................................ 70
Objective 2.13 Describe how to manage power consumption on computing devices.
BITS&BYTES: Sleep Better and Avoid Eyestrain: Use Less Blue Light ................... ............................................. 72
Setting It All Up: Ergonomics ................................. .............................................................................................. 73
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
SOLVE THIS: Technology Wish List .................................................................................................................... 83
Chapter 3
Using the Internet: Making the Most of the Web's Resources .................................... 84
Part 1: Collaborating and Working on the Web ................................................................................................................. 86
Leaming Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works............................................................................................................................ 86
The Origin of the Internet ..................................................................................................................................... 86
Objective 3.1 Describe how the Internet got its start.
How the Internet Works ....................................................................................................................................... 88
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web................................................................................................. 89
Collaborating with Web Technologies .................................................................................................................. 89
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
BITS&BYTES: Secure Messaging Apps ................................................... ........................................................... 9 1
SOUND BYTE: Slogging ........................................................................................................................................................ 9 1
Communicating over the Web ............................................................................................................................. 94
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web ....................................................................................................................... 97
Conducting Business Online ................................................................................................................................ 97
Objective 3.5 Describe how business is conducted using the Internet.
DIG DEEPER: How Cloud Computing Works .......... ........ ................ ................... ................ ...... ............. ............. 98
BITS&BYTES: Looking for Extra Money? Try a Side Hustle ................................. ...................... ................ .......... 99
E-commerce Safeguards .................................................................................................................................... 99
Objective 3.6 Summarize precautions you should take when doing business online.
HELPDESK: Doing Business Online ..................................................................................................................................... 100
BITS&BYTES: Bitcoin: A Form of Virtual Currency ........... ...................................... ........................................... 10 1
T RY TH IS: Use OneDrive to Store and Share Your Files in the Cloud .. ................... ................... ............. ........... 103
MAKE THIS: MAKE: A Web-Capable App ............... ........ ................ ................... ................ ...... ............. ........... 104
Part 2: Using tile Web Effectively ...................................................................................................................................... 105
Leaming Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and M oving Around the Web .......................................................................................................... 10·5
Web Browsers ................................................................................................................................................... 105
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names................................................................................................................ 107
Objective 3.8 Explain what a URL is, and discuss its mcnn parts.
Navigating the Web ........................................................................................................................................... 108
Objective 3.9 Describe tools used to navigate the web.
BITS&BYTES: Maintain Your Privacy While Searching the Web ........ ...................... ................ ........................... 109
Searching the Web Effectively ........................................................................................................................... 11O
Using Search Engines ....................................................................................................................................... 11 0
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.
vi Contents
BITS&BYTES: Digital Assistants and Predictive Search ..................................................................................... 11 1
Evaluating Websites ........................................................................................................................................... 113
Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research purposes.
SOUND BYTE: Finding Information on the Web .................................................................................................................... 113
HELPDESK: Evaluating Websites ......................................................................................................................................... 113
TRENDS IN IT: Linked Data and the Semantic Web ......................................................................................... 114
BITS&BYTES: Why Isn't Wikipedia Good to Use as a Source for a Research Paper? ....................................... 11 5
Using the Web Ethically ..................................................................................................................................... 115
Digital Activism .................................................................................................................................................. 115
Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
Geolocation ....................................................................................................................................................... 11 6
Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applications and devices.
BITS&BYTES: Human-Implanted Data Chips: Protection or Invasive Nightmare? ................................................ 117
ETHICS IN IT: Cyber Harassment ..................................................................................................................... 118
SOLVE THI S: Create a Report: Conducting Research on the Web .................................................................... 125
Chapter 4
Application Software: Programs That Let You Work an d Play ............................. 126
Part 1: Accessing, Using, and Managing Software .......................................................................................................... 128
Leaming Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage
your software.
~e>ft\\l'are 13asics .................................................................................................................................................. 12fl
Application vs. System Software ........................................................................................................................ 128
Objective 4.1 Compare application software and system software.
Distributing Software ......................................................................................................................................... 128
Objective 4.2 Explain the differences between commercial software and open source software, and describe models for
software distribution.
BITS&BYTES: Finding Alternative Software ....................................................................................................... 129
M anaging Your Software .................................................................................................................................... 129
Purchasing Software ......................................................................................................................................... 129
Objective 4.3 Explain the different options for purchasing software.
TRENDS IN IT: Mobile Payment Apps: The Power of M-Commerce ................................................................. 130
HELPDESK: Buying and Installing Software .......................................................................................................................... 131
Installing and Uninstalling Software .................................................................................................................... 131
Objective 4.4 Describe how to install and uninstall software.
BITS&BYTES: Ridding Your Computer of "Bloat" .............................................................................................. 131
Upgrading Software........................................................................................................................................... 132
Objective 4.5 Explain the considerations around the decision to upgrade your software.
DIG DEEPER: How Number Systems Work ...................................................................................................... 132
SOUND BYTE: Where Does Binary Show Up? ..................................................................................................................... 133
Software Licenses ............................................................................................................................................. 134
Objective 4.6 Explain how software licenses function.
ETHICS IN IT: Can I Borrow Software That I Don't Own? ................................................................................. 135
TRY THIS: Citing Website Sources ................................................................................................................... 137
MAKE THIS: MAKE: A More Powerful App ....................................................................................................... 138
Part 2: Application Software ............................................................................................................................................. 139
Leaming Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Busines.s Software ................................................................................................................. 139
Productivity Software ......................................................................................................................................... 139
Objective 4.7 Categorize the types of application software used to enhance productivity, and describe their uses and features.
Contents vii
BITS&BYTES: Productivity Software Tips and Tricks ......................................................................................... 139
BITS&BYTES: How to Open Unknown File Types ............................................................................................. 140
BITS&BYTES: Going Beyond PowerPoint ......................................................................................................... 144
SOUND BYTE: Programming for End Users ......................................................................................................................... 146
Business Software ............................................................................................................................................. 148
Objective 4.8 Summarize the types of software that large and small businesses use.
BITS&BYTES: Need to Work as a Team? Try These Collaboration Tools ........................................................... 150
Multimedia and Educational S.o ftware.............................................................................................................. 150
Digital Multimedia Software ............................................................................................................................... 150
Objective 4.9 Describe the uses and features of digital multimedia software.
Digital Audio Software ....................................................................................................................................... 152
Objective 4.10 Describe the uses and features of digital audio software.
HELPDESK: Choosing Software ........................................................................................................................................... 153
App Creation Software ...................................................................................................................................... 154
Objective 4.11 Describe the features of app creation software.
BITS&BYTES: Mirror, Mirror . .. .......................................................................................................................... 155
Educational and Reference Software ................................................................................................................. 155
Objective 4.12 Categorize educational and reference software, and explain their features.
SOLVE THIS: Analyzing Benchmark Data ......................................................................................................... 163
Chapter 5
System Software: The Operatin g System, Utility Programs, and
F'il~ 1'11:cl.Ilcl~~lll~Ilt .••••..•••..•••..•••...••...••.••.•.••.••••.••••..•••..••.•.••.•.••.. .••.. ...••...••.. .••.. .•••. .••• 1.E5'1
Part 1: Understanding System Software .......................................................................................................................... 166
Leaming Outcome 5.1 You will be able to explain the types and functions of operating systems and exp lain the
steps in the boot process.
Operating System Fundamentals ...................................................................................................................... 166
Operating System Basics .................................................................................................................................. 166
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use.................................................................................................................. 167
Objective 5.2 Explain the most common operating systems for personal use.
BITS&BYTES: Why Isn't Everyone Using Linux? ............................................................................................... 168
BITS&BYTES: Operating Systems for the Home ............................................................................................... 169
Operating Systems for Machinery, Networks, and Business .............................................................................. 169
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
ETHICS IN IT: The Great Debate: Is macOS Safer Than Windows? .................................................................. 171
What the Operating System Does ..................................................................................................................... 172
The User Interface ............................................................................................................................................. 172
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination...................................................................................................................................... 173
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage,
and peripheral devices.
SOUND BYTE: Using Windows Task Manager to Evaluate System Performance .................................................................. 173
Software Application Coord ination ..................................................................................................................... 175
Objective 5.6 Explain how the operating system interacts with application software.
TRENDS IN IT: Are Personal Computers Becoming More Human? .................................................................. 176
Starting Your Computer ..................................................................................................................................... 177
The Boot Process .............................................................................................................................................. 177
Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors in the boot
process are handled.
viii Contents
HELPDESK: Starting the Computer: The Boot Process ........................................................................................................ 179
TRY THIS: Using Virtual Desktops in Windows 10............................................................................................. 182
MAKE THIS: MAKE: A Notification Alert ............................................................................................................ 183
Part 2: Using System Softwa.re ......................................................................................................................................... 184-
Leaming Outcome 5.2 You will be able to describe how to use system software, including the user interlace, file
management capabilitie.s, and utility programs.
"J"tlE! \1\/ir,cie>'ltl~ lritE!rfclC:E! ••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.•• 1 ~~
Using Windows 10 ............................................................................................................................................ 184
Objective 5.8 Describe the main features of the Windows interface.
BITS&BYTES: The Snipping Tool ...................................................................................................................... 185
F=ilE! PJlclllcl~E!l11E!:11t •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• 18'7
Organizing Your Files ......................................................................................................................................... 187
Objective 5.9 Summarize how the operating system helps keep your computer organized and manages files and folders.
BITS&BYTES: Save Files in the Cloud .............................................................................................................. 189
BITS&BYTES: Tips for Organizing Your Files ..................................................................................................... 190
HELPDESK: Organizing Your Computer: File Management. .................................................................................................. 19 1
lJt ilit}' f>rogrart1s .................................................................................................................................................. 1!1:3
Windows Administrative Utilities......................................................................................................................... 194
Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide accessibility.
DIG DEEPER: How Disk Defragmenting Utilities Work ...................................................................................... 196
SOUND BYTE: Hard Disk Anatomy ...................................................................................................................................... 196
SOLVE THIS: Mobile Operating Systems: Changing Market Share .................................................................... 205
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System .................... 206
Part 1: Evaluating Key Subsystems .................................................................................................................................. 208
Leaming Outcome 6.1 You will be able to evaluate your computer syst em 's hardware funct i oning, including the
CPU and memory subsystems.
Your Ideal Cort1put ing Device ............................................................................................................................ 208
Moore's Law ..................................................................................................................................................... 208
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device ........................................................................................................................... 209
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating t he Cf>U Subsystert1 ......................................................................................................................... 211
How the CPU Works ......................................................................................................................................... 21 1
Objective 6.3 Describe how a CPU is designed and how it operates.
BITS&BYTES: Liquid Cooling ........................................................................................................................... 21 5
Measuring CPU Performance ............................................................................................................................ 21 5
Object ive 6.4 Describe tools used to measure and evaluate CPU performance.
DIG DEEPER: The Machine Cycle .................................................................................................................... 21 7
Evaluating the Memory Subsystem .................................................................................................................. 218
Random Access Memory .................................................................................................................................. 218
Object ive 6.5 Discuss how RAM is used in a computer system.
Adding RAM ...................................................................................................................................................... 220
Object ive 6.6 Evaluate whether adding RAM to a system is desirable.
HELPDESK: Evaluating Your CPU and RAM ......................................................................................................................... 220
SOUND BYTE: Installing RAM .............................................................................................................................................. 221
Contents ix
TRY THIS: Measure Your System Performance ................................................................................................. 223
MAKE THIS: MAKE: A Location-Aware App ..................................................................................................... 224
Part 2: Evaluating Other Subsystems and Making a Decision ....................................................................................... 225
Leaming Outcome 6.2 You will be able to evaluate your computer system's st orage subsystem, media subsyst em,
and reliability and decide whether to purchase a new system or upgrade an existing one.
Evaluating the Storage Subsystem ................................................................................................................... 225
Types of Storage Drives ..................................................................................................................................... 225
Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
SOUND BYTE: Installing an SSD Drive ................................................................................................................................. 226
DIG DEEPER: How Storage Devices Work ....................................................................................................... 227
Storage Needs .................................................................................................................................................. 228
Objective 6.8 Evaluate the amount and type of storage needed for a system.
BITS&BYTES: How Much Storage to Buy? ....................................................................................................... 230
Evaluating the M edia Subsystems .................................................................................................................... 231
Video Cards ...................................................................................................................................................... 231
Objective 6.9 Describe the features of video cards.
BITS&BYTES: Graphics Cards with SSD on Board ........................................................................................... 233
TRENDS IN IT: USS 3 .1 and USB-C ................................................................................................................ 234
Sound Cards ..................................................................................................................................................... 235
Objective 6.10 Describe the features of sound cards.
HELPDESK: Evaluating Computer System Components ...................................................................................................... 235
Chapter 7
Networking: Connecting Computin g Devices ....................................................... 248
li<>iAT 1'l~t"'1<>rlt£S ~11c:ti<>J1 ........................................................................................................................................ :Z~C>
J)c:ll't 1.:
Leaming Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals ................................................................................................................................. 250
Understanding Networks ................................................................................................................................... 250
Objective 7.1 Describe computer networks and their pros and cons.
H ELPDESK: Understanding Networking ............................................................................................................................... 251
x Contents
TRENDS IN IT: How Smart Is Your Home? .................................................................................................... ... 260
Connecting to the Internet................................................................................................................................. 260
Broadband Internet Connections ....................................................................................................................... 260
Objective 7.6 Summarize the broadband options available to access the Internet.
Wireless Internet Access.................................................................................................................................... 262
Objective 7.7 Summarize how to access the Internet wirelessly.
BITS&BYTES: Net Neutrality ............................................................................................................................. 262
BITS&BYTES: 5G Is Coming- ls It Worth the Wait? ......................................................................................... 263
BITS&BYTES: Is Dial-Up Still an Option? .......................................................................................................... 264
ETHICS IN IT: Ethical Challenges of the Internet of Things ................................................................................ 264
TRY THIS: Testing Your Internet Connection Speed .......................................................................................... 266
MAKE THIS: MAKE: Networked Devices .......................................................................................................... 267
l'c:1rt :Z: "ir<>11r li<>IllE! ?tlE!tiAT<>rlc ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• :Z~
Leaming Outcome 7 .2 You will be able to describe what is necessary to install and configure a home network and
how to manage and secure a w ireless netw ork.
In.s talling and Configuring Home Networks ..................................................................................................... 268
Planning Your Home Network ............................................................................................................................ 268
Objective 7.8 Explain what should be considered before creating a home network.
Connecting Devices to a Network ...................................................................................................................... 269
Objective 7.9 Describe how to set up a home network.
BITS&BYTES: Mesh Networks: An Emerging Alternative .................................................................................. 270
BITS&BYTES: Analyzing Network Problems ..................................................................................................... 273
Configuring Software for Your Home Network ................................................................................................... 273
Objective 7.10 Summarize how to configure home network software.
DIG DEEPER: P2P File Sharing ........................................................................................................................ 275
Managing and Securing Wi reles.s Networks .................................................................................................... 275
Troubleshooting Wireless Network Problems ..................................................................................................... 275
Objective 7.11 Describe the potential problems with wireless networks and means to avoid them.
Securing Wireless Networks .............................................................................................................................. 276
Objective 7.12 Describe how to secure wireless home networks.
SOUND BYTE: Securing Wireless Networks ......................................................................................................................... 278
HELPDESK: Managing and Securing Your Wireless Network ..................................................................................... 278
SOLVE THI S: Home Networking Guide ............................................................................................................. 285
Chapter 8
Man aging a Digital Lifestyle: Media an d Ethics ................................................... 286
Part 1: The Impact of Digital Information ........................................................................................................................ 288
Leaming Outcome 8.1 You will be able to describe the nature of digital signals and how digit al technology is used to
produce and dist ribute digit al texts, music, and video.
C>igital Elasics ...................................................................................................................................................... 288
Digital Convergence .......................................................................................................................................... 288
Objective 8.1 Describe how digital convergence has evolved.
Digital vs. Analog ............................................................................................................................................... 289
Objective 8.2 Explain the differences between digital and analog signals.
C>igitc1I f>ulJlistiin g ................................................................................................................................................ 2!11
E-Readers ......................................................................................................................................................... 29 1
Objective 8.3 Describe the different types of e-readers.
Using e-Texts ..................................................................................................................................................... 292
Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
HELPDESK: Managing Digital Media .................................................................................................................................... 292
Contents xi
[)ig itctl ~ LJ~ic:: .••.•.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.•• ~~:3
Creating and Storing Digital Music ..................................................................................................................... 293
Objective 8.5 Describe how digital music is created and stored.
BITS&BYTES: Digital Music Creation ................................................................................................................ 295
Distributing Digital Music ................................................................................................................................... 295
Object ive 8.6 Summarize how to listen to and publish digital music.
BITS&BYTES: Need Money for Your Band? Try Crowdfunding ......................................................................... 296
[)ig itc1:I ~ E!:clic1 .••...••.••...••.••.•.••.••.••••.••.••...••.••.•.••.••.••••.••.••...••.••.•.••.••.••••.••.••••.••.••...••.••.•.••.••.••••.••.••...••.••.•.••.••.••••.•• ~~«;
Digital Photography ........................................................................................................................................... 296
Object ive 8.7 Explain how best to create, print, and share digital photos.
BITS&BYTES: Photo Edit on Your Phone .......................................................................................................... 298
SOUND BYTE: Enhancing Photos with Image-Editing Software ........................................................................................... 298
Digital Video ...................................................................................................................................................... 299
Object ive 8.8 Describe how to create, edit, and distribute digital video.
BITS&BYTES: Fly-By Drone Video .................................................................................................................... 300
TRENDS IN IT: Digital Asset Managers Needed! .............................................................................................. 302
TRY TH IS: Creating and Publishing a Movie ........................................................................ ...... ............. ........... 304
MAKE THIS: MAKE: A Video-Playing App ....... ......................................................................... ................ ........ 305
Part 2: Ethical Issues of Living in the Digital Age ........................................................................................................... 306
Leaming Outcome 8.2 You will be able to describe how to respect digital property and use it in w ays that maintain your
digital reputation.
J>re>tf:!:c::tie>r, C>f C>ig itcl.l F>r<>l)e rt}r .••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.•• :3()45
Intellectual Property ........................................................................................................................................... 306
Objective 8.9 Describe the various types of intellectual property.
Copyright Basics ............................................................................................................................................... 307
Objective 8.10 Explain how copyright is obtained and the rights granted to the owners.
HELPDESK: Understanding Intellectual Property and Copyright ........................................................................................... 309
Copyright Infringement ...................................................................................................................................... 310
Objective 8.11 Explain copyright infringement, summarize the potential consequences, and describe situations in which you
can legally use copyrighted material.
BITS&BYTES: Software Piracy: It's More Than Just Downloading and Copying .. ................ ...... ............. ... ........ 3 12
BITS&BYTES: Your Tax Dollars at Work: Free Media without Permission! ............ ...................... ................ ........ 3 14
Living Ethic::c1lly in the Dig itc1:I E.rc1 ....................................................................................................................... :315
Plagiarism .......................................................................................................................................................... 3 15
Objective 8.12 Explain plagiarism and strategies for avoiding it.
Hoaxes and Digital Manipulation ........................................................................................................................ 317
Objective 8.13 Describe hoaxes and digital manipulation.
SOUND BYTE: Plagiarism and Intellectual Property .............................................................................................................. 317
Protecting Your Online Reputation ..................................................................................................................... 320
Objective 8.14 Describe what comprises your onli ne reputation and how to protect it.
BITS&BYTES: Celebrity Photographic Rights .................................................................................................... 322
ETHICS IN IT: Acceptable Use Policies: What You Can and Can 't Do................. ................ ...... ............. ........... 323
SOLVE THIS: Intellectual Property and Copyright Basics ... ..................... ................................. ........................ 331
Chapter 9
Securing Your System: Protectin g Your Digita l Data an d Devices ....................... 332
Part 1: Th.reats to Your Digital Assets ............................................................................................................................... 334
Leaming Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and the threats
they pose to your digital security.
lcler,tit}r "J"lle~ c1:ncl tic1c::l<E!:r~ •.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.•• :3:3~
xii Contents
Identity Theft ..................................................................................................................................................... 335
Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate.
Hacking ............................................................................................................................................................. 335
Objective 9.2 Describe the different types of hackers and the tools they use.
BITS&BYTES: Hacking for Security .................................................................................................................. 336
C::e>rtlJJlJtE!r "irlJses .••.•.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.••.•.••.••.••••.••.••.•.••.••.•.••.•• 33!:t
Virus Basics ....................................................................................................................................................... 339
Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing device catches a virus,
and the symptoms it may display.
SOUND BYTE: Protecting Your Computer ............................................................................................................................ 340
Types of Viruses ................................................................................................................................................ 341
Objective 9.4 Ust the different categories of computer viruses, and describe their behaviors.
O nline Annoyances and Social Engineering .................................................................................................... 343
Online Annoyances ............................................................................................................................................ 343
Objective 9.5 Explain what ma/ware, spam, and cookies are and how they impact your security.
Social Engineering ............................................................................................................................................. 346
Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey to them.
BITS&BYTES: I Received a Data Breach Letter ... Now What? ............................................................... ........ 346
Scareware ......................................................................................................................................................... 34 7
ETHICS IN IT: You're Being Watched . . . But Are You Aware You're Being Watched? .............................................348
HELPDESK: Threats to Your Digital Life ...................... ........ ...................... ........ ........ ...................................... ........ 348
TRENDS IN IT: Spear Phishing: The Bane of Data Breaches .............................. ... ................................ ... ..... ... 349
TRY TH IS: Testing Your Network Security ............. ........ ...................... ................ ...................................... ........ 351
MAKE THIS: MAKE: A Password Generator ................. ................... ................... ................... ................... ........ 352
Part 2: Protecting Your Digital Property ............................................................................................................................ 353
Leaming Outcome 9.2 Describe various ways to protect your digital property and data from theft and corruption.
Restricting Acces.s to Your Digita l Assets........................................................................................................ 353
Firewalls ............................................................................................................................................................ 353
Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
HELPDESK: Understanding Firewalls ................................................................................................................................... 355
Preventing Virus Infections ................................................................................................................................. 355
Objective 9.8 Explain how to protect your computer from virus infection.
Authentication: Passwords and Biometrics ........................................................................................................ 358
Objective 9.9 Describe how passwords and biometric characteristics can be used for user authentication.
BITS&BYTES: CAPTC HA: Keeping Websites Safe from Bots ............................. ...................................... ........ 359
Anonymous Web Surfing: Hiding from Prying Eyes .............................................. ...................................... ........ 361
Objective 9.10 Describe ways to surf the web anonymously.
BITS&BYTES: Multi-Factor Authentication: Don't Rely Solely on Passwords! ...... ................................... ... ..... ... 363
Keeping Your Data Safe ..................................................................................................................................... 363
Protecting Your Personal Information ................................................................................................................. 363
Objective 9.11 Describe the types of infonnation you should never share online.
SOUND BYTE: Managing Computer Security with Windows Tools ....................................................................................... 363
Backing Up Your Data ....................................................................................................................................... 364
Objective 9.12 Ust the various types of backups you can perfonn on your computing devices, and explain the various places
you can store backup files.
Protecting Your Physical Computing Assets ................................................................................................... 368
Environmental Factors and Power Surges .......................................................................................................... 368
Objective 9.13 Explain the negative effects environment and power surges can have on computing devices.
Preventing and Handling Theft ........................................................................................................................... 368
Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the problems.
DIG DEEPER: Computer Forensics: How It Works ............................................. ...................................... ........ 370
SOLVE THIS: Computer Security ...................................................................................................................... 379
Contents xiii
Chapter 10
Beh ind the Scenes: Software Programming .......................................................... 380
Part 1: Understanding Programming ............................................................................................................................... 382
Leaming Outcome 10.1 You w ill be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System ................................................................................................................. 382
Importance of Programming .............................................................................................................................. 382
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle ........................................................................................................................ 382
Objective 10.2 Summarize the stages of the system development life cycle (SDLC).
BITS&BYTES: Let Them See Your Work ........................................................................................................... 384
l..ife Cyc=le of a J>re>~ram...................................................................................................................................... ~4
The Program Development Life Cycle ................................................................................................................ 384
Objective 10.3 Define programming and list the steps in the program development life cycle (PDLC).
The Problem Statement ..................................................................................................................................... 385
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
SOUND BYTE: Using the Arduino Microcontroller................................................................................................................. 385
HELPDESK: Understanding Software Programming ............................................................................................................. 386
Algorithm Development ..................................................................................................................................... 387
Objective 10.5 Explain how programmers use flow control and design methodologies when developing alg orithms.
BITS&BYTES: Hackathons ............................................................................................................................... 390
DIG DEEPER: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and
Operators ..................................................................................................................................................... 392
Coding .............................................................................................................................................................. 392
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment (/OE) in coding.
Debugging ........................................................................................................................................................ 399
Objective 10.7 Identify the role of debugging in program development.
BITS&BYTES: Many Languages on Display ...................................................................................................... 400
Testing and Documentation ............................................................................................................................... 400
Objective 10.8 Explain the importance of testing and documentation in program development.
TRY TH IS: Programming with Corona............................................................................................................... 402
MAKE THIS: MAKE: A Notepad ....................................................................................................................... 403
Part 2: Progra.m ming Languages ...................................................................................................................................... 404
Leaming Outcome 10.2 You will understand the factors programmers consider when selecting an appro priat e
programming language for a specific problem and w ill be familiar w ith some modem programming languages.
Many Programming Languages ........................................................................................................................ 404
Need for Diverse Languages ............................................................................................................................. 404
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
SOUND BYTE: Programming with the Processing Language ................................................................................................ 404
Selecting the Right Language ............................................................................................................................ 405
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
BITS&BYTES: Coding for Zombies ................................................................................................................... 405
ETHICS IN IT: When Software Runs Awry ........................................................................................................ 406
Exploring Programming Languages ................................................................................................................. 407
Tour of Modern Languages ................................................................................................................................ 407
Objective 10.11 Compare and contrast modem programming languages.
BITS&BYTES: Your Software Portfolio .............................................................................................................. 41 1
TRENDS IN IT: Emerging Technologies: Unite All Your Video Game Design Tools ............................................. 41 5
Future of Programming Languages .................................................................................................................... 415
Objective 10.12 State key principles in the development of future programming languages.
xiv Contents
H ELPDESK: A Variety of Programming Languages ............................................................................................................... 4 16
SOLVE T HIS: Time Sheets ................................................................................................................................ 423
Chapter 11
Behind the Scenes: Databases and Information Systems ................................... 424
Part 1: Database Fundamentals ........................................................................................................................................ 426
Leaming Outcome 11.1 You w ill be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
Database Ad·v antages ........................................................................................................................................ 426
The Need for Databases.................................................................................................................................... 426
Objective 11 .1 Explain what a database is and why databases are useful.
HELPDESK: Using Databases .............................................................................................................................................. 428
Advantages of Using Databases ........................................................................................................................ 429
Objective 11.2 Discuss the benefits of using a database.
Datc1base -i-~IJeS .................................................................................................................................................. 4:3()
Relational Databases ......................................................................................................................................... 431
Objective 11.3 Describe features of relational databases.
Object-Oriented Databases ............................................................................................................................... 432
Objective 11 .4 Describe features of object-oriented databases.
Multidimensional Databases .............................................................................................................................. 432
Objective 11.5 Describe features of multidimensional databases.
TRENDS IN IT: Emerging Technologies: Can Your Business Partner Deliver the Goods? Enhanced
Databases Can Help You Decide! ................................................................................................................. 433
C>c1tc11Jc1se Bc1sic:s ................................................................................................................................................. 4:3:3
Database Components and Functions ............................................................................................................... 433
Objective 11 .6 Describe how relational databases organize and define data.
SOUND BYTE: Creating and Querying an Access Database ............................................................................... 437
BITS&BYTES: Music Streaming Services Use Databases ................................................................................. 437
Inputting and Managing Data ............................................................................................................................. 438
Objective 11 .7 Describe how data is inputted and managed in a database.
DIG DEEPER: Structured Query Language (SQL) ............................................................................................. 443
BITS&BYTES: Data Dashboards: Useful Visualization Tools .............................................................................. 445
TRY TH IS: Using Excel's Database Functions ................................................................................................... 447
MAKE THIS: MAKE: A Family Shopping List ..................................................................................................... 448
Part 2: How Businesses Use Databases ........................................................................................................................... 449
Leaming Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data
m ining to manage data and how business infonnation systems and business intelligence are used to make business
decisions.
C>c1tc1 Wc1rehousing c1nd Storage ........................................................................................................................ 449
Data Warehouses and Data Marts ..................................................................................................................... 449
Objective 11 .8 Explain what data warehouses and data marts are and how they are used.
HELPDESK: How Businesses Use Databases...................................................................................................................... 449
BITS&BYTES: Data Warehouses Are Going to the Cloud .................................................................................. 451
Data Mining ....................................................................................................................................................... 451
Objective 11 .9 Describe data mining and how it works.
BITS&BYTES: Hadoop: How Big Data Is Being Managed ................................................................................ 453
ETHICS IN IT: Data, Data Everywhere, but Is It Protected? ............................................................................... 454
Using Dc1tc11Jc1ses to Make Bu.siness Dec:isions ............................................................................................... 455
Business Information Systems ........................................................................................................................... 455
Objective 11.10 Describe the main types of business information systems and how they are used by business managers.
Contents xv
BITS&BYTES: Virtual Agents: Expert Systems Replace People on the Web ...................................................... 456
SOUND BYTE: Analyzing Data with Microsoft Power Bl Suite ............................................................................................... 460
TRENDS IN IT: Mobile Business Intelligence ..................................................................................................... 461
SOLVE THIS: College Database ........................................................................................................................ 469
Chapter 12
Behind the Scenes: Networking and Security in the Business World ........................ 470
Part 1: Client/Server Networks and Topologies ............................................................................................................... 472
Leaming Out come 12.1 You w ill be able to describe common types of client/s erver networks, servers found on
them, and network topologies used to construct them.
Client/Server Network Basics ........................................................................................................................... 472
Networking Advantages .................................................................................................................................... 472
Objective 12.1 Ust the advantages for businesses of installing a network.
Comparing ClienVServer and Peer-to-Peer Networks ........................................................................................ 473
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of ClienVServer Networks ........................................................................................................................ 474
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
BITS&BYTES: Your Car Network Can Be Hacked ............................................................................................. 477
Servers and Network Topologies ...................................................................................................................... 478
Servers .............................................................................................................................................................. 478
Objective 12.4 Ust the common types of servers found on client/server networks.
HELPDESK: Using Servers ................................................................................................................................................... 479
TRENDS IN IT: Virtualization: Making Servers Work Harder .............................................................................. 480
Network Topologies ........................................................................................................................................... 481
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
SOUND BYTE: Network Topology and Navigation Devices ................................................................................................... 483
TRY THIS: Sharing Folders on a Home Network Using Window s ...................................................................... 488
MAKE THIS: MAKE: An App That Shares ......................................................................................................... 489
Part 2: Setting Up Business Netw'Orks ............................................................................................................................. 490
Leaming Outcome 12.2 You will be able to describe transmission media, network operating syst em software, and
network navigation devices and exp lain maj or threats to network security and how to mitigate them.
Transmis.sion Media............................................................................................................................................ 490
Wired and Wireless Transmission Media ............................................................................................................ 490
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
BITS&BYTES: Go Green with Mobile Apps ....................................................................................................... 492
Network Adapters and Navigation Devices ..................................................................................................... 492
Network Adapters ............................................................................................................................................. 492
Objective 12.7 Describe how network adapters help data move around a network.
MAC Add resses ................................................................................................................................................ 494
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers ......................................................................................................................... 495
Objective 12.9 Ust the various network navig ation devices, and explain how they help route data through networks.
HELPDESK: Transmission Media and Network Adapters ...................................................................................................... 496
Network Operating Systems and Network Security ....................................................................................... 496
Network Operating Systems .............................................................................................................................. 497
Objective 12.10 Explain why network operating systems are necessary for networks to function.
BITS&BYTES: Smart Lighting for Smart Homes ............................................................................................... 497
Client/Server Network Security .......................................................................................................................... 498
Objective 12.11 Ust major security threats to networks, and explain how network administrators mitigate these threats.
DIG DEEPER: The OSI Model: Defining Protocol Standards ............................................................................. 499
SOUND BYTE: A Day in the Life of a Network Technician ..................................................................................................... 500
xvi Contents
ETHICS IN IT: How Should Companies Handle Data Breaches? ................................................................... ... 502
BITS&BYTES: Are Your Photos Helping Criminals Target You? ......................................................................... 503
SOLVE THIS: Cyber Security Flyer and Mail Merge ........................................................................................... 5 11
Chapter 13
Behind the Scene s: How the Internet Works ........................................................ 512
Part 1: Inner Workings of the Internet ............................................................................................................................. 514
Leaming Outcome 13.1 You w ill be able to explain how the Internet is managed and the detail s of how data is
transmitted across the Internet.
Internet Management and Networking............................................................................................................. 514
Management ..................................................................................................................................................... 5 14
Objective 13.1 Describe the management of the Internet.
Networking Components ................................................................................................................................... 515
Objective 13.2 Explain how the Internet's networking components interact.
Data Transmission ............................................................................................................................................. 516
Objective 13.3 Ust and describe the Internet protocols used for data transmission.
BITS&BYTES: A Free Cloud-Based Server for You ........................................................................................... 5 16
Internet lcfe ntit}'................................................................................................................................................... 51!:t
IP Addresses ..................................................................................................................................................... 5 19
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
HELPDESK: Understanding IP Addresses, Domain Names, and Protocols........................................................................... 519
Contents xvii
TRENDS IN IT: Cognitive Computing ............................................................................................................... 541
SOLVE THIS: Creating an HTML Document. ..................................................................................................... 549
Appendix A
Th e History of the Person al Computer.................................................................. A-1
Appendix B
Careers in IT ............................................................................................................ B-1
Glossary ....................................................................................................................................................................... G-1
xviii Contents
Alan Evans, MS, CPA
[email protected]
Alan is currently a faculty member at Moore College of Art and Design and
Montgomery County Community College, teaching a variety of computer science
and business courses. He holds a BS in accounting from Rider University and
an MS in infonnation systems from Drexel University, and he is a certified public
accountant. After a successful career in business, A lan finally realized that his
true calling is education. He has been teaching at the college level since 2000. Alan enjoys attending
technical conferences and exploring new methods of engaging students.
Mary Anne has been in teaching since 1997, ranging from elementary and secondary education to
Montgomery County Com munity College, Gwynedd-Mercy College, Muhlenberg College, and Bucks
County Com munity College, as well as training in the professional environment. Before teaching,
she was a vice president at Shearson Lehman Hutton in the Municipal Bond Investment Banking
Departm ent.
Foulis, D., Glasgow. Lect. Path. Roy. Inf. Med. School; M.D.
Held a License for Vivisection at Glasgow Royal Infirmary Medical
School in 1881. Certificate dispensing with obligation to kill, 1881.
No experiments returned.