30.00$
Table of Contents
Contents
Chapter 1
Using Technology to Change the World
How Will You Put Technology in Action?
Technology on the World Stage
Political Issues
Other Global Issues
Technology and Our Society
Technology Impacts How We Think
Technology Impacts How We Connect
Technology Impacts How We Consume
Try This: Skyping Around the World
How Will Technology Improve Your Life?
Technology at Home
Technology and Your Career
Retail: Working in a Data Mine
Arts: Ink, Paints, and a Laptop?
Education: Teaching and Learning
Law Enforcement: Put Down That Mouse–You’re Under Arrest!
Medicine: The Chip Within
DIG DEEPER: Making Reality Even More Real
Science: Simulating Reality
Psychology: You Should Smile Now
Chapter 2
Looking at Computers: Understanding the Parts
Understanding Digital Components
Understanding Your Computer
Computers Are Data Processing Devices
Bits and Bytes: The Language of Computers
Types of Computers
Input Devices
Keyboards
Mice and Other Pointing Devices
Touch Screens
Image Input
DIG DEEPER: How Touch Screens Work
Sound Input
Ethics in IT: What Is Ethical Computing?
Output Devices
Monitors
Printers
Sound Output
Try This: What’s Inside My Computer?
Processing, Storage, and Connectivity
Processing and Memory on the Motherboard
Memory
Processing
Storing Data and Information
Hard Drives
Flash Storage
Optical Storage
Connecting Peripherals to the Computer
High-Speed and Data Transfer Ports
Connectivity and Multimedia Ports
Adding Ports: Expansion Cards and Hubs
Power Controls
Setting It All Up
TRENDS in IT: Innovations in Printing
Chapter 3
Using the Internet: Making the Most of the Web’s Resources
Working and Playing on the Web
The Internet and How It Works
The Origin of the Internet
How the Internet Works
Communicating and Collaborating on the Web
Social Networking
Instant Messaging
Wikis
Blogs
Podcasts and Webcasts
Web Entertainment
Conducting Business Over the Internet: E-commerce
E-commerce Safeguards
Try This: Create a SkyDrive Account and Store and Share Your
Files in the Cloud
Using the Web Effectively
Accessing and Moving Around the Web
Web Browsers
URLs, Protocols, and Domain Names
Hyperlinks and Beyond
Favorites, Live Bookmarks, and Tagging
DIG DEEPER: Discovering the Semantic Web
TRENDS in IT: Doing Business on a Shoestring–Thanks to the Internet
Searching the Web Effectively
Using Search Engines Effectively
Evaluating Websites
Ethics in IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?
Technology in Focus
The History of the Personal Computer
Chapter 4
Application Software: Programs That Let You Work and Play
Programs That Let You Work
The Nuts and Bolts of Software
TRENDS in IT: Mobile Commerce: What Have You Bought with Your Phone Lately?
Productivity and Business Software
Buying Productivity Software
Word Processing Software
Spreadsheet Software
Presentation Software
Database Software
Note-Taking Software
Personal Information Manager Software
Microsoft Office Productivity Software Features
Personal Financial Software
Small Business Software
Software for Large and Specialized Businesses
Try This: Citing Website Sources
Programs That Let You Play
Multimedia and Entertainment Software
Digital Image- and Video-Editing Software
Digital Audio Software
Media Management Software
DIG DEEPER: How Cloud Computing Works
Gaming Software
Educational and Reference Software
Drawing Software
Managing Your Software
Getting Software
Software Licenses
Getting the Right Software for Your System
Installing and Uninstalling Software
Ethics in IT: Can I Borrow Software That I Don’t Own?
Chapter 5
System Software: The Operating System, Utility Programs, and File Management
Understanding System Software
Operating System Fundamentals
Real-Time Operating Systems
Operating Systems for Networks, Servers, and Mainframes
Operating Systems for Mobile Devices
Operating Systems for Personal Computers
What the Operating System Does
The User Interface
Processor Management
Memory and Storage Management
Ethics in IT: Sugar: The Sweet OS for Every Child
Hardware and Peripheral Device Management
Software Application Coordination
The Boot Process: Starting Your Computer
Step 1: Activating BIOS
Step 2: Performing the Power-On Self-Test
Step 3: Loading the OS
Step 4: Checking Further Configurations and Customizations 1
Handling Errors in the Boot Process
Try This: Adding Icons to the Start Screen in Windows 8
Using System Software
The Windows Interface
TRENDS in IT: Open Source Software: Why Isn’t Everyone Using Linux?
Organizing Your Computer: File Management
Organizing Your Files
Viewing and Sorting Files and Folders
Naming Files
Working with Files
Utility Programs
Display Utilities
The Programs and Features Utility
File Compression Utilities
System Maintenance Utilities
System Restore and Backup Utilities
DIG DEEPER: How Disk Defragmenter Utilities Work
Accessibility Utilities
Technology in Focus
Information Technology Ethics
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System
Evaluating Key Subsystems
Your Ideal Computer
Evaluating the CPU Subsystem
How the CPU Works
CPU Factors
Measuring the CPU
Evaluating the Memory Subsystem
The RAM in Your System
Adding RAM
Evaluating the Storage Subsystem
Mechanical Hard Drives
Solid State Drives
DIG DEEPER: How a Mechanical Hard Drive Works
Optical Drives
Your Storage Capacity and Needs
Try This: Measure Your System Performance
Evaluating Other Subsystems and Making a Decision
Evaluating the Video Subsystem
Video Cards
TRENDS in IT: Thunderbolt: The New Standard for Data Transfer
Evaluating the Audio Subsystem
Evaluating System Reliability
Making a Final Decision
Getting Rid of Your Old Computer
Ethics in IT: Free Hardware for All
Chapter 7
Networking: Connecting Computing Devices
How Networks Function
Networking Fundamentals
Network Architectures
Network Architectures Defined by Distance
Network Architectures Defined by Levels of Administration
Ethernet Protocols
Network Components
Transmission Media
Basic Network Hardware
Network Software
Connecting to the Internet
Wired Broadband Internet Connections
Wireless Internet Access
Dial-Up Connections
Try This: Testing Your Wired and Wireless Internet Connection Speeds
Your Home Network
Installing and Configuring Home Networks
Planning Your Home Network
Connecting Devices to a Router
Network-Attached Storage Devices
TRENDS in IT: Where Should You Store Your Files? The Cloud Is Calling!
Home Network Servers
Digital Entertainment Devices on a Network
Specialized Home-Networking Devices
Configuring Software for Your Home Network
Troubleshooting Wireless Network Problems
Ethics in IT: Sharing Your Internet Connection with Your Neighbors: Legal? Ethical? Safe?
Securing Wireless Networks
Technology in Focus
Under the Hood
Chapter 8
Digital Devices and Media: Managing a Digital Lifestyle
Mobile Devices
Digital Convergence
Telephony: Smartphones and Beyond
Smartphone Basics
Smartphone Components
How Cell Phone Technology Works
Synchronizing
Text Messaging
Mobile Internet
Smartphone Security
VoIP
Smartphone GPS
TRENDS in IT: NFC Chips: Do You Have a Digital Wallet?
Tablets, Netbooks, and Ultrabooks
Tablets
Netbooks
Ultrabooks
Making a Choice
Try This: Creating and Publishing a Movie
The Digital Information Age
Digital Defined
Digital Media
Digital Publishing
Digital Music
DIG DEEPER: The Shift to Digital Music: A Bumpy Ride
Digital Photography
Digital Video
Ethics in IT: Managing Your Copyrights: Copyleft Might Simplify Your Life
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices
Major Threats to Your Digital Asset
Cybercrime and Identity Theft
Computer Viruses
Catching a Virus
Boot-Sector Viruses
Logic Bombs and Time Bombs
Worms
Script and Macro Viruses
E-Mail Viruses
Encryption Viruses
Additional Virus Classifications
Virus Symptoms
Preventing Virus Infections
Antivirus Software
Software Updates
Understanding Hackers
Problems Hackers Can Cause
Trojan Horses and Rootkits
Denial-of-Service Attacks
How Hackers Gain Computer Access
Restricting Access to Your Digital Assets
Firewalls
Types of Firewalls
How Firewalls Work
Knowing Your Computer Is Secure
Password Protection and Password Management
Creating Passwords
Managing Your Passwords
Anonymous Web Surfing: Hiding from Prying Eyes
Biometric Authentication Devices
Try This: Testing Your Network Security
Protecting Your Digital Property from Yourself
Managing Online Annoyances
Malware: Adware and Spyware
Ethics in IT: You’re Being Watched … But Are You Aware You’re Being Watched?
Spam
Cookies
DIG DEEPER: Computer Forensics: How It Works
Keeping Your Data Safe
Protecting Your Personal Information
Backing Up Your Data
Social Engineering
Phishing and Pharming
Scareware
TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches
Protecting Your Physical Computing Assets
Environmental Factors
Power Surges
Deterring Theft
Keep Them Safe: Alarms
Keeping Mobile Device Data Secure
Software Alerts and Data Wipes
Technology in Focus
Careers in IT
Chapter 10
Behind the Scenes: Software Programming
Understanding Software Programming
The Importance of Programming
The Life Cycle of an Information System 4
The System Development Life Cycle
Ethics in IT: When Software Runs Awry
The Life Cycle of a Program
Describing the Problem: The Problem Statement
Making a Plan: Algorithm Development
Developing the Algorithm: Decision Making and Design
Top-Down Design
Object-Oriented Analysis
Coding: Speaking the Language of the Computer
DIG DEEPER: The Building Blocks of Programming Languages:
Syntax, Keywords, Data Types, and Operators
Compilation
Coding Tools: Integrated Development Environments
Debugging: Getting Rid of Errors
Testing and Documentation: Finishing the Project
Try This: Programming with Corona
Programming Languages
Many Languages for Many Projects
Selecting the Right Language
Exploring Programming Languages
Visual Basic
C and C++
Java and C#
Objective C
HTML
JavaScript and VBScript
ASP, JSP, and PHP
Flash, AJAX, and XML
Mobile Applications
TRENDS in IT: Emerging Technologies: Unite All Your Video
Game Design Tools
The Next Great Language
Chapter 11
Behind the Scenes: Databases and
Information Systems
Database Basics
Database Building Blocks
Databases versus Lists
Advantages of Using Databases
Database Management Systems
Database Terminology
Planning and Creating the Database
Using Primary Keys
Database Types
Relational Databases
Object-Oriented Databases
Multidimensional Databases
TRENDS in IT: Computers in Society: User-Populated Databases
Database Functions
Inputting Data
Data Validation
Viewing and Sorting Data
Extracting or Querying Data
DIG DEEPER: Structured Query Language (SQL)
Outputting Data
Try This: Using Excel’s Database Functions
How Businesses Use Databases
Data Warehousing and Storage
Data Warehouses
Populating Data Warehouses
Data Staging
Data Marts
TRENDS in IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!
Business Intelligence Systems
Office Support Systems
Transaction-Processing Systems
Management Information Systems
Decision Support Systems
Enterprise Resource Planning Systems
Data Mining
Ethics in IT: Data, Data Everywhere–But Is It Protected?
Chapter 12
Behind the Scenes: Networking and Security in the Business World
Client/Server Networks and Typologies
Client/Server Network Basics
Networking Advantages
Comparing Client/Server and Peer-to-Peer Networks
Types of Client/Server Networks
Servers
Authentication and File Servers
Print Servers
Application Servers
Database Servers
E-mail Servers
Communications Servers
Web Servers and Cloud Servers
TRENDS in IT: Virtualization: Making Servers Work Harder
Network Topologies
Bus Topology
Ring Topology
Star Topology
Comparing Topologies
Try This: Sharing Folders on a Home Network
Setting Up Business Networks
Transmission Media
Wired Transmission Media
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Wireless Media Options
Comparing Transmission Media
Network Adapters
Network Navigation Devices
MAC Addresses
Switches and Bridges
Routers
DIG DEEPER: The OSI Model: Defining Protocol Standards
Network Operating Systems
Client/Server Network Security
Authentication
Access Privileges
Physical Protection Measures
Firewalls
Ethics in IT: How Should Companies Handle Data Breaches?
Chapter 13
Behind the Scenes: How the Internet Works 548
Inner Workings of the Internet
The Management of the Internet
Internet Networking
Internet Data Routes
The Network Model of the Internet
Data Transmission and Protocols
Circuit Switching
Packet Switching
TCP/IP
Internet Identity: IP Addresses and Domain Names
IP Addresses
DIG DEEPER: Connection-Oriented Versus Connectionless Protocols
Domain Names
Try This: Ping Me
Coding and Communicating on the Internet
HTML, XML, and Other Web Building Blocks
HTML
XML
Web Browser Protocols
Server-Side Applications
Client-Side Applications
Communications Over the Internet
E-mail Security: Encryption
Ethics in IT: Web Browsing: Not as Private as You May Think
Instant Messaging
TRENDS in IT: Crowdsourcing: Harnessing the Power of Social Networks
Glossary
Index
***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Test Bank in e-version of the following book***
Technology In Action, Complete, 10th Edition PDF Manual Solutions , PDF Technology In Action, Complete, 10th Edition , Fast Download Technology In Action, Complete, 10th Edition , Alan Evans, Montgomery County Community College Kendall Martin, Montgomery County Community College Mary Anne Poatsy, Montgomery County Community College,Category : Higher Education
0 commentaires:
Enregistrer un commentaire