The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by psskvpjb, 2021-03-30 02:40:49

RU2 - Vermaat,_Sebok,_Freund,_Campbell

RU2 - Vermaat,_Sebok,_Freund,_Campbell

New to this Edition

Discovering Computers builds upon its proven structure and pedagogy and with this edition provides:
• An Introductory chapter with information to provide you with the best possible start to the class and to
using the textbook.
• A Timeline feature showcasing important milestones throughout Information Technology history.
• An integrated approach to cloud computing and search skills reflected in all chapter content for
greater currency.
• Career information is included to make the chapter concepts personal and relevant.

Go Digital with Cengage Learning! CourseNotes: Technology in a
Flash!
CourseMate
CourseNotes 6 panel reference cards deliver key
Cengage Learning’s CourseMate with MindTap Reader concepts and tips in a handy, easy-to-use format!
brings course concepts to life with interactive learning, With all the essential information in one place,
study, and exam preparation tools. CourseMate can you can use CourseNotes as:
be used alongside the printed text or as a stand-alone
digital solution for your course. CourseMate gives you • A reference guide to complete homework
access to: assignments

• Video Tutorials that provide software application • A study tool to prepare for quizzes and exams
training, tips, techniques, and best practices for • A skills refresher after course completion
learning
For a complete list of available CourseNotes,
• Practice Quizzes for reinforcement and please visit www.cengagebrain.com.
assessment of concepts learned

• Learning Activities to help you practice and
prepare for exams.

Engaging. Trackable. Affordable. Mastering File Management: 978-1-133-18810-0
Be a Mobile User: Your Guide to the iPod, iPhone, and iPad: 978-1-133-18910-7
MindTap Protect Your Computer: 978-1-133-18925-1

Cengage Learning’s MindTap offers:
• Personalized, fully online digital learning platform
• Authoritative Cengage Learning content,
assignments, and services
• Coursework configuration options to enhance the
curriculum.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering
Computers

Tools, Apps, Devices, and the Impact of
Technology

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Dedication

With heartfelt thanks to my husband, Bill, and children, Jackie and Ricky … for their endless support, devotion, assistance,
understanding, and patience during my work on this and all other projects throughout my career. I love you all dearly.

Thanks also to Sue, Steve, Jennifer, and Mark. It’s a pleasure to work with such a dedicated team.

— Misty E. Vermaat

Thanks to my family and friends for their support, encouragement, and patience. Special acknowledgement goes to my
mother, Mandy, and to my professors at Purdue University, especially James Quasney, Ralph Webb, and Daniel Yovich, who
taught me that keeping a positive mental attitude and striving for excellence are the keys to success.

— Susan L. Sebok

For my wife, Traci, and my children, Maddy and Sam, whose support and love are incredibly motivating. Thanks to my
parents for their endless encouragement, and to Linda Linardos, who was instrumental in starting my writing career.

— Steven M. Freund

I would like to thank Mike, Emma, and Lucy for their support and inspiration, and Maggie for providing welcome
distractions. Special thanks to my parents for being terrific role models.

— Jennifer T. Campbell

Thanks to my family and friends for their encouragement, and to my colleagues and students at Bentley University for
their helpful feedback, which guided my contributions to this book. Thanks to Bentley University for providing me with an
environment to learn and teach new technology.

— Mark Frydenberg

The author team also would like to thank our developmental editor, Lyn Markowicz, whose patience, attention
to detail, and determination contributed in so many meaningful ways to this project.

We dedicate this book to the memory of Thomas J. Cashman (4/29/32 – 1/7/15). As one of the founders of the
Shelly Cashman Series, Tom partnered with Gary Shelly to write and publish their first computer education
textbook in 1969, revolutionizing the introductory computing course and changing the path of computing
course materials. From 1969 through his retirement in 2008, Tom served as educator, author, leader,
and inspiration to his fellow authors and Shelly Cashman Series team members. His mark on the series
and the introductory computing market is indelible and he will be both remembered and missed.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Tools,Apps, Devices, and
the Impact of Technology

Computers 2016

Vermaat | Sebok | Freund | campbell | frydenberg

Shelly Cashman Series®

Australia • Brazil • Mexico • Singapore • United Kingdom • United States

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.

Important Notice: Media content referenced within the product description or the product
text may not be available in the eBook version.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers: Tools, Apps, Devices, © 2016 Cengage Learning
and the Impact of Technology
Misty E. Vermaat WCN: 02-200-203
Susan L. Sebok
Steven M. Freund ALL RIGHTS RESERVED. No part of this work covered by the copyright herein
Jennifer T. Campbell may be reproduced, transmitted, stored or used in any form or by any means
Mark Frydenberg graphic, electronic, or mechanical, including but not limited to photocopying,
recording, scanning, digitizing, taping, Web distribution, information networks,
Product Director: Kathleen McMahon or information storage and retrieval systems, except as permitted under
Section 107 or 108 of the 1976 United States Copyright Act, without the prior
Product Manager: Amanda Lyons written permission of the publisher.

Managing Developer: Emma Newsom For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706
Associate Content Developer:
Crystal Parenteau For permission to use material from this text or product,
submit all requests online at cengage.com/permissions
Marketing Manager: Kristie Clark
Further permissions questions can be emailed to
Marketing Coordinator: William Guiliani [email protected]

Manufacturing Planner: Julio Esperas Library of Congress Control Number: 2014955985
ISBN-13: 978-1-305-39185-7
Senior Content Project Manager:
Matthew Hutchinson Cengage Learning
20 Channel Center Street
Development Editor: Lyn Markowicz Boston, MA 02210
USA
Researcher: F. William Vermaat
Cengage Learning is a leading provider of customized learning solutions with
Management Services: Lumina Datamatics, Inc. office locations around the globe, including Singapore, the United Kingdom,
Australia, Mexico, Brazil and Japan. Locate your local office at:
Art Director: Jackie Bates, GEX international.cengage.com/region

Text Design: Joel Sadagursky Cengage Learning products are represented in Canada by Nelson Education, Ltd.

Cover Design: Lisa Kuhn, Curio Press, LLC

Cover Photo: © iStock.com/audioundwerbung

Illustrator: Lumina Datamatics, Inc.

Compositor: Lumina Datamatics, Inc.

Printer: RRD Menasha

Purchase any of our products at your local college bookstore or at our
p­ referred online store at www.cengagebrain.com

Printed in the United States of America
Print Number: 01 Print Year: 2014

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

vv

Discovering Computers

Tools, Apps, Devices, and the Impact of Technology

Table of Contents at a Glance Chapter 8

Intro Chapter Digital Storage: Preserving
Succeeding in this Course: Content Locally and on the Cloud. . . . 367
Tips and Pointers. . . . . . . . . . . . . . . . . . I-1

Chapter 1 Chapter 9

Introducing Today’s Technologies: Operating Systems: Managing,
­Computers, Devices, and the Web. . . . . . 1 Coordinating, and Monitoring
Resources. . . . . . . . . . . . . . . . . . . . . . . . . . 409
Chapter 2
Chapter 10
Connecting and Communicating
Online: The Internet, Websites, Communicating Digital Content:
and Media . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Wired and Wireless Networks
and Devices. . . . . . . . . . . . . . . . . . . . . . . . 449
Chapter 3
Chapter 11
Computers and Mobile Devices:
Evaluating Options for Home Building Solutions: Database,
and Work . . . . . . . . . . . . . . . . . . . . . . . . . .107 System, and Application
Development Tools . . . . . . . . . . . . . . . . . 497
Chapter 4
Chapter 12
Programs and Apps: Productivity,
Graphics, Security, and Working in The Enterprise: Systems,
Other Tools . . . . . . . . . . . . . . . . . . . . . . . . 157 Certifications, and Careers. . . . . . . . . . . 551

Chapter 5 Appendix A: Technology
Acronyms . . . . . . . . . . . . APP 1
Digital Security, Ethics, and
Privacy: Threats, Issues, Appendix    B: Troubleshooting
and Defenses. . . . . . . . . . . . . . . . . . . . . . . 211 Computer and Mobile
Device Problems. . . . . . APP 5
Technology Timeline . . . . . . . . . . . . . . . . 261
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . IND 1
Chapter 6

Computing Components: Processors,
Memory, the Cloud, and More. . . . . . . . 275

Chapter 7

Input and Output: Extending
Capabilities of Computers
and Mobile Devices. . . . . . . . . . . . . . . . . 317

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

vi

Discovering Computers

Tools, Apps, Devices, and the Impact of Technology

Table of Contents

Intro Chapter I-1 Installing and Running Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Developing Programs and Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Succeeding in this Course: Tips Communications and Networks . . . . . . . . . . . . . . . . . . . . . . . . . 30
and Pointers Wired and Wireless Communications. . . . . . . . . . . . . . . . . . . . . . . . 31
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1 Technology Uses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Browsing the Web. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1 Government. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Book and Online Content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-2 Finance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Purchasing the Right Computer . . . . . . . . . . . . . . . . . . . . . . . . . I-5 Retail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Step 1: Choose the Computer Type . . . . . . . . . . . . . . . . . . . . . . . . . I-5 Entertainment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Step 2: Choose the Operating System . . . . . . . . . . . . . . . . . . . . . . . I-7 Health Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Step 3: Choose Configuration Options. . . . . . . . . . . . . . . . . . . . . . I-10 Science. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Step 4: Choose the Purchasing Option. . . . . . . . . . . . . . . . . . . . . . I-11 Travel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
STUDENT ASSIGNMENTS: • How To: Your Turn Publishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
• Internet Research. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-12 – I-14 Manufacturing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Technology Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
1CHAPTER Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Introducing Today’s Technologies: • Problem Solving • How To: Your Turn • Internet Research
­Computers, Devices, and the Web • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 – 54

1

Today’s Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2CHAPTER 55
Computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Laptops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Connecting and Communicating
Tablets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Online: The Internet, Websites,
Desktops and All-in-Ones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 and Media
Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Mobile and Game Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 The Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Smartphones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Evolution of the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Digital Cameras. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Connecting to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Portable and Digital Media Players . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Internet Service Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
E-Book Readers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 How Data Travels the Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Wearable Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 IP Addresses and Domain Names. . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Game Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 The World Wide Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Data and Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Navigating the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Web Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Web Apps and Mobile Apps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Memory and Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Types of Websites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
The Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Search Engines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Web Searching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Informational and Research. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Online Social Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Media Sharing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Internet Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Bookmarking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Digital Security and Privacy. . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 News, Weather, Sports, and Other Mass Media. . . . . . . . . . . . . . . . 76
Viruses and Other Malware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Educational . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Privacy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Business, Governmental, and Organizational. . . . . . . . . . . . . . . . . . 77
Health Concerns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Blogs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Environmental Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Wikis and Collaboration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Programs and Apps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Health and Fitness. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Science.­ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Contents vii

Entertainment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Port Replicators and Docking Stations. . . . . . . . . . . . . . . . . . . . . . 136
Banking and Finance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Wireless Device Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Travel and Tourism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Protecting Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Hardware Theft and Vandalism . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Retail and Auctions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Hardware Failure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Careers and Employment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Health Concerns of Using Technology . . . . . . . . . . . . . . . . . . 142
E-Commerce. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Repetitive Strain Injuries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Portals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Other Physical Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Content Aggregation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Behavioral Health Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Website Creation and Management . . . . . . . . . . . . . . . . . . . . . . . . 84 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145
Digital Media on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Graphics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 • Problem Solving • How To: Your Turn • Internet Research
Audio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 – 156
Video. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Plug-Ins. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 4CHAPTER 157
Other Internet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Email. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Programs and Apps: Productivity,
Email Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Graphics, Security, and
Internet Messaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Other Tools
Chat Rooms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Online Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Programs and Apps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Role of the Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
FTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Obtaining Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Netiquette. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Installing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Categories of Programs and Apps . . . . . . . . . . . . . . . . . . . . . . . . . 163
STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint Productivity Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
• Problem Solving • How To: Your Turn • Internet Research Developing Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
• Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 – 106 Word Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Presentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
3CHAPTER Spreadsheet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Computers and Mobile Devices: Note Taking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Evaluating Options for Home Calendar and Contact Management . . . . . . . . . . . . . . . . . . . . . . . 171
and Work 107 Software Suite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Project Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Computers and Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . 108 Accounting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Mobile Computers and Desktops. . . . . . . . . . . . . . . . . . . . . . . . 108 Personal Finance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Laptops, Tablets, and Other Mobile Computers . . . . . . . . . . . . . . . 111 Legal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Handheld Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Tax Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Desktops and All-in-Ones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Document Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Enterprise Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Graphics and Media Applications . . . . . . . . . . . . . . . . . . . . . . . 179
Point-of-Sale Terminals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Computer-Aided Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
ATMs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Desktop Publishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Self-Service Kiosks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Paint/Image Editing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Supercomputers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Photo Editing and Photo Management . . . . . . . . . . . . . . . . . . . . . 181
Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Video and Audio Editing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Multimedia and Website Authoring. . . . . . . . . . . . . . . . . . . . . . . . 184
Smartphones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Media Player . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Digital Cameras. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Disc Burning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Portable and Digital Media Players . . . . . . . . . . . . . . . . . . . . . . . . 127 Personal Interest Applications . . . . . . . . . . . . . . . . . . . . . . . . 185
E-Book Readers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Communications Applications. . . . . . . . . . . . . . . . . . . . . . . . . . 188
Wearable Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Security Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Game Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Personal Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Embedded Computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Antivirus Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Putting It All Together . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Spyware, Adware, and Other Malware Removers. . . . . . . . . . . . . . 192
Ports and Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Internet Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
USB Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 File, Disk, and System Management Tools. . . . . . . . . . . . . . . . 194
File Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

v iii Contents  Discovering Computers

Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .249
Image Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Uninstaller. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 • Problem Solving • How To: Your Turn • Internet Research
Disk Cleanup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 – 260
Disk Defragmenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Screen Saver. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Technology Timeline. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
File Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
PC Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 6CHAPTER 275
Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199 Computing Components:
STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint Processors, Memory, the Cloud,
• Problem Solving • How To: Your Turn • Internet Research and More
• Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 – 210

5CHAPTER 211 Inside the Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
The Motherboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Digital Security, Ethics, and Processors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Privacy: Threats, Issues, The Control Unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
and Defenses The Arithmetic Logic Unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Machine Cycle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Digital Security Risks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Cybercrime. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 The System Clock. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Internet and Network Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . 215 Personal Computer and Mobile Device Processors. . . . . . . . . . . . . 283
Malware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Processor Cooling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Botnets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Mini Feature 6-1: The Internet of Things. . . . . . . . . . . . . . . . . . . . . 284
Denial of Service Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Back Doors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Mini Feature 6-2: Cloud Computing Services . . . . . . . . . . . . . . . . . 287
Spoofing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Data Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Safeguards against Internet and Network Attacks . . . . . . . . . . . . . 218 Bits and Bytes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Firewalls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Coding Schemes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Unauthorized Access and Use. . . . . . . . . . . . . . . . . . . . . . . . . . 221 Memory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Safeguards against Unauthorized Access and Use . . . . . . . . . . . . . 221 Bytes and Addressable Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Access Controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Types of Memory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
User Names and Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 RAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
Possessed Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Biometric Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 ROM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Two-Step Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Flash Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Digital Forensics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 CMOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Software Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Memory Access Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Safeguards against Software Theft. . . . . . . . . . . . . . . . . . . . . . . . . 228 Adapters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Information Theft. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Adapter Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Safeguards against Information Theft . . . . . . . . . . . . . . . . . . . . . . 229 USB Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Buses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Digital Signatures and Certificates . . . . . . . . . . . . . . . . . . . . . . . . . 231 Bus Width. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Hardware Theft, Vandalism, and Failure. . . . . . . . . . . . . . . . . 233 Types of Buses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Backing Up — The Ultimate Safeguard . . . . . . . . . . . . . . . . . . 233 Power Supply and Batteries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Mini Feature 6-3: Proper Care for Computers
Ethics and Society. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 and Mobile Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Information Accuracy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305
Intellectual Property Rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Codes of Conduct. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 • Problem Solving • How To: Your Turn • Internet Research
Green Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 – 316
Information Privacy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Electronic Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 7CHAPTER 317
Cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Input and Output: Extending
Spyware and Adware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Capabilities of Computers
Social Engineering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 and Mobile Devices
Privacy Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Employee Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 What Is Input? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Content Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Keyboards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Types of Keyboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Contents ix

Pointing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 Storage Access Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Mouse. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 Mini Feature 8-1: Media Sharing. . . . . . . . . . . . . . . . . . . . . . . . . . 371
Touchpad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Hard Drives. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Trackball. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Hard Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Touch Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Ssds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
Mini Feature 7-1: Touch Input . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 External Hard Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Pen Input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Raid. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Stylus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Portable Flash Memory Storage. . . . . . . . . . . . . . . . . . . . . . . . 381
Digital Pen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Memory Cards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Graphics Tablet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Usb Flash Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Motion, Voice, and Video Input. . . . . . . . . . . . . . . . . . . . . . . . . . 328 Cloud Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Mini Feature 7-2: Motion Input . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Mini Feature 8-2: Services Offered by Cloud Storage Providers. . . 384
Voice and Audio Input. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Optical Discs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Mini Feature 7-3: Digital Video Technology . . . . . . . . . . . . . . . . . . 330 Characteristics of Optical Discs . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
Webcams and Integrated DV Cameras. . . . . . . . . . . . . . . . . . . . . . 332 CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Scanners and Reading Devices. . . . . . . . . . . . . . . . . . . . . . . . . . 334 DVDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Optical Scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Enterprise Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Optical Readers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 RAID. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Bar Code Readers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 NAS and SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
RFID Readers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Magnetic Tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Magstripe Readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Other Types of Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
MICR Readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 Magnetic Stripe Cards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Data Collection Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 Smart Cards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
What Is Output? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 RFID Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Displays. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Nfc Chips and Tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Display Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Mini Feature 8-3: Backup Plans. . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Display Quality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .397
DTVs and Smart TVs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 • Problem Solving • How To: Your Turn • Internet Research
Nonimpact Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 – 408
Ink-Jet Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Photo Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 9CHAPTER
Laser Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
All-in-One Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 Operating Systems: Managing,
3-D Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 Coordinating, and Monitoring
Thermal Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 Resources 409
Mobile Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Label Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Plotters and Large-Format Printers. . . . . . . . . . . . . . . . . . . . . . . . . 350 Operating System Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Impact Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Starting Computers and Mobile Devices . . . . . . . . . . . . . . . . . . . . 412
Other Output Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Shutting Down Computers and Mobile Devices . . . . . . . . . . . . . . . 413
Speakers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Providing a User Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Headphones and Earbuds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 Managing Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Data Projectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 Managing Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Interactive Whiteboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Coordinating Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418
Force-Feedback Game Controllers and Tactile Output. . . . . . . . . . 353 Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
Assistive Technology Input and Output. . . . . . . . . . . . . . . . . . 353 Monitoring Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .355 Establishing an Internet Connection . . . . . . . . . . . . . . . . . . . . . . . 420
STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint Updating Operating System Software . . . . . . . . . . . . . . . . . . . . . . 421
• Problem Solving • How To: Your Turn • Internet Research Providing File, Disk, and System Management Tools . . . . . . . . . . . 422
• Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 – 366 Controlling a Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Administering Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
8CHAPTER 367 Types of Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Desktop Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
DIGITAL STORAGE: Preserving Windows/Mini Feature 9-1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Content Locally and on the Cloud Mac OS/Mini Feature 9-2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Storage Capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Chrome Os. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Storage versus Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Running Multiple Desktop Operating Systems . . . . . . . . . . . . . . . . 431

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x Contents  Discovering Computers

Server Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432 Communications Satellite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Mobile Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .485
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
ios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434 • Problem Solving • How To: Your Turn • Internet Research
Windows Phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 – 496
Mini Feature 9-3: Mobile versus Desktop Operating Systems . . . . 435
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .437 11CHAPTER 497
STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
• Problem Solving • How To: Your Turn • Internet Research Building Solutions: Database,
• Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 – 448 System, and Application
Development Tools
10CHAPTER

Communicating Digital Content: 449 Databases, Data, and Information . . . . . . . . . . . . . . . . . . . . . . 498
Wired and Wireless Networks The Hierarchy of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
and Devices File Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Validating Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450 File Processing Systems and Databases. . . . . . . . . . . . . . . . . . 504
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 File Processing Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
LANs, MANs, WANs, and PANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 The Database Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Network Architectures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456 Mini Feature 11-1: Web Databases . . . . . . . . . . . . . . . . . . . . . . . . 506
Communications Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Types of Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Mini Feature 10-1: Mobile Communications . . . . . . . . . . . . . . . . . 457 Mini Feature 11-2: Big Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Network Communications Standards and Protocols . . . . . 459 Database Management Systems . . . . . . . . . . . . . . . . . . . . . . . . 510
Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 Data Dictionary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Token Ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 File Retrieval and Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . 511
TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Data Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513
Wi-Fi. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 Backup and Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
LTE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 System Development. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Bluetooth/Mini Feature 10-2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 System Development Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . 517
UWB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464 Who Participates in System Development? . . . . . . . . . . . . . . . . . . 517
IrDA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Project Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517
RFID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Feasibility Assessment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Communications Lines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Data and Information Gathering Techniques. . . . . . . . . . . . . . . . . 520
Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Planning Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
DSL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Analysis Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521
ISDN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Design Phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523
FTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Implementation Phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
T-Carrier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 Support and Security Phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 Application Development Languages and Tools . . . . . . . . . . 527
Communications Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 Procedural Languages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
Digital Modems: Cable, DSL, and ISDN. . . . . . . . . . . . . . . . . . . . . . 468 Object-Oriented Programming Languages and Application
Wireless Modems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469 Development Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530
Wireless Access Points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470 Other Languages and Application Development Tools . . . . . . . . . . . . . . . . 532
Routers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471 Web Development. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Network Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472 Mini Feature 11-3: Web Application Development . . . . . . . . . . . . . . . . . . . 536
Hubs and Switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .539
Home Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Mini Feature 10-3: Planning and Designing Your • Problem Solving • How To: Your Turn • Internet Research
Home Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540 – 550
Transmission Media. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
Physical Transmission Media . . . . . . . . . . . . . . . . . . . . . . . . . . 477 12CHAPTER
Twisted-Pair Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Coaxial Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478 Working in the Enterprise:
Fiber-Optic Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478 Systems, Certifications, and
Wireless Transmission Media . . . . . . . . . . . . . . . . . . . . . . . . . . 478 Careers 551
Infrared . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Broadcast Radio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 The Technology Industry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552
Cellular Radio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 Information Systems in the Enterprise. . . . . . . . . . . . . . . . . . 554
Microwaves. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Contents xi

Functional Units. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 Data Analysis and Database Certifications. . . . . . . . . . . . . . . . . . . 573
Enterprise Resource Planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 Hardware Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Document Management Systems. . . . . . . . . . . . . . . . . . . . . . . . . . 556 Networking Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Content Management Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 557 Operating System Certifications. . . . . . . . . . . . . . . . . . . . . . . . . . . 574
Other Enterprise-Wide Information Systems . . . . . . . . . . . . . . . . . 557 Programmer/Developer Certifications . . . . . . . . . . . . . . . . . . . . . . 574
Mini Feature 12-1: Information Literacy. . . . . . . . . . . . . . . . . . . . . 560 Security Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
Technology Careers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562 Job Searching and Career Planning. . . . . . . . . . . . . . . . . . . . 576
General Business and Government Organizations Mini Feature 12-3: Creating a Professional Online
and Their IT Departments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562 Presence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Technology Equipment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .579
Software and Apps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564 STUDENT ASSIGNMENTS: Study Guide • Key Terms • Checkpoint
Technology Service and Repair. . . . . . . . . . . . . . . . . . . . . . . . . . . . 565 • Problem Solving • How To: Your Turn • Internet Research
Technology Sales. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566 • Critical Thinking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580 – 590
Technology Education, Training, and Support. . . . . . . . . . . . . . . . . 567
IT Consulting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568 Appendix A: Technology Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . APP 1
Putting It All Together — Job Titles and Descriptions. . . . . . . . . . . 568
Mini Feature 12-2: Mobile App Development. . . . . . . . . . . . . . . . . 570 Appendix B: Troubleshooting Computer and Mobile
Technology Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572 Device Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . APP 5
Application Software Certifications. . . . . . . . . . . . . . . . . . . . . . . . 572
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IND 1

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x ii Contents  Discovering Computers

Table of Boxed Elements

ETHICS & ISSUES BOXES Chapter 8

Chapter 1 8-1: Is Government Search and Seizure of Computers Ethical?. . . . . . . . . 374
8-2: Are Businesses Vulnerable when Employees Use Their Own
1-1: Should It Be Legal to Use a Hands-Free Device while Driving?. . . . . . . . 8
1-2: S hould You Be Required to Obtain Permission before Devices to Access Company Data?. . . . . . . . . . . . . . . . . . . . . . . . . . . 389
8-3: Should Manufacturers Be Required to Close Back Doors
Posting Photos of Others? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1-3: Would You Connect to an Unsecured Network? . . . . . . . . . . . . . . . . . 33 after Product Development? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
1-4: S hould Wikis Be Allowed as Valid Sources 8-4: How Much Data Should Companies Be Required to Keep?. . . . . . . . . 396

for Academic Research? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Chapter 9
1-5: S hould Employees Be Held Accountable for Their
9-1: S hould Manufacturers Include Extra Programs in Operating
Online Social Network Posts? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Systems for Computers and Mobile Devices?. . . . . . . . . . . . . . . . . . . 421

Chapter 2 9-2: Should Operating System Manufacturers Be Liable for
Breaches Due to Security Flaws? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
2-1: Should Cybersquatters Be Prosecuted? . . . . . . . . . . . . . . . . . . . . . . . 64
2-2: Should Apps Be Allowed to Track Your Location? . . . . . . . . . . . . . . . . 70 9-3: Should You Be an Early Adopter of a New Technology? . . . . . . . . . . . 425
2-3: Is it Ethical to Use a Fake Name or ID on a Website?. . . . . . . . . . . . . 77 9-4: Should Text Messages Sent by Employees Be Private?. . . . . . . . . . . . 433
2-4: Who Is Responsible for Monitoring Cyberbullying?. . . . . . . . . . . . . . . 94
Chapter 10
Chapter 3
10-1: Would You Use a BAN to Monitor Medical Data? . . . . . . . . . . . . . . . 456
3-1: What Punishment for Webcam Spying Is Appropriate? . . . . . . . . . . . 111 10-2: Do the Benefits of Telemedicine Outweigh the Risks?. . . . . . . . . . . . 459
3-2: Should Recycling of Electronics Be Made Easier?. . . . . . . . . . . . . . . 122 10-3: Should ISPs Be Allowed to Control Your Internet Usage?. . . . . . . . . 477
3-3: Are Fitness Video Games and Apps Qualified 10-4: S hould Phone Companies Be Allowed to Force Customers

to Provide Medical Advice?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132 to Switch from Landlines to Mobile Phones? . . . . . . . . . . . . . . . . . . 481
3-4: Does In-Vehicle Technology Foster a False Sense of Security?. . . . . . .133
Chapter 11
Chapter 4
11-1: Should Companies Inform Consumers about How
4-1: W hat Can Schools and Employers Do to Prevent Collected Data Is Used? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Internet Plagiarism? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165
11-2: D oes the Use of Criminal Databases Help or Hinder Investigations?. . . . 505
4-2: Should an Attorney Review Documents Created 11-3: W hat Should the Consequences Be If a User Accidentally
with Legal Software? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
Accesses Confidential Data? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
4-3: Is It Ethical to Alter Digital Photos? . . . . . . . . . . . . . . . . . . . . . . . . .183 11-4: Should Colleges Teach Hacking? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528
4-4: S hould Your Email Provider Be Allowed
Chapter 12
to Read or Scan Your Email?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
12-1: Is Telecommuting Good or Bad for Business?. . . . . . . . . . . . . . . . . . 563
Chapter 5 12-2: Can You Trust Data Recovery or Computer Repair Services? . . . . . . . 566
12-3: Is Outsourcing Jobs Wrong?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
5-1: How Should Cybercriminals Be Punished?. . . . . . . . . . . . . . . . . . . . 214 12-4: How Can Social Media Help Your Job Search? . . . . . . . . . . . . . . . . . 578
5-2: Who Is Responsible for Data Left on the Cloud? . . . . . . . . . . . . . . . .233
5-3: Do You Have the Right to be Digitally Forgotten? . . . . . . . . . . . . . . .247 HOW TO BOXES
5-4: D oes Content Filtering in a Public Library Violate
Chapter 1
First Amendment Rights?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
1-1: Interact with a Touch Screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Chapter 6 1-2: Protect Your Hearing when Using Earbuds or Headphones . . . . . . . . . 16
1-3: Perform a Basic Web Search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6-1: Does the Internet of Things Discriminate?. . . . . . . . . . . . . . . . . . . . . . 286 1-4: Locate, Install, and Run Programs and Mobile Apps . . . . . . . . . . . . . . 29
6-2: Should Companies Reveal Which Products They Manufacture
Chapter 2
Using Fair Trade Practices?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
6-3: Should Manufacturers Eliminate Proprietary Connectors? . . . . . . . . . 299 2-1: Register a Domain Name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
6-4: Should Businesses Be Allowed to Make Policies Regarding Customer 2-2: Tag Digital Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
2-3: Download Digital Media from Online Services. . . . . . . . . . . . . . . . . . 87
Mobile Phone Use?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 2-4: Set Up a Personal VoIP Service and Make a Call . . . . . . . . . . . . . . . . 92

Chapter 7 Chapter 3

7-1: Should a Vehicle Be Able to Prevent User Input on a Mobile 3-1: Pair Bluetooth Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Device while the Vehicle is in Motion?. . . . . . . . . . . . . . . . . . . . . . . . 326 3-2: Connect Your Phone to a Wi-Fi Network

7-2: Is It More Efficient to Take Notes by Hand or with a Digital Device?. . . . . 327 to Save Data Charges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
7-3: Should We Be Concerned with Hardware Radiation?. . . . . . . . . . . . . 344
7-4: Who Should Pay for Assistive Technologies? . . . . . . . . . . . . . . . . . . . . 354

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Contents xiii

3-3: Evaluate Surge Protectors and UPSs . . . . . . . . . . . . . . . . . . . . . . . . 141 Chapter 12
3-4: Evaluate Earbuds and Headphones. . . . . . . . . . . . . . . . . . . . . . . . . 143
12-1: Set Up Your Home Office for Telecommuting. . . . . . . . . . . . . . . . . . . 563
Chapter 4 12-2: Evaluate Extended Warranty Options. . . . . . . . . . . . . . . . . . . . . . . . 567
12-3: Start Your Job Search Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
4-1: Manage a Project Using Project Management Software . . . . . . . . . . 173 12-4: Create a Professional Presence on LinkedIn. . . . . . . . . . . . . . . . . . . 578
4-2: Edit and Share Photos . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
4-3: Use Features in Voice Command Personal Assistant HOW TO: YOUR TURN ASSIGNMENTS

and Mobile Search Apps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186 Intro Chapter
4-4: Uninstall a Program or Remove an App. . . . . . . . . . . . . . . . . . . . . . 196
I-1: Get the Most out of Your Book. . . . . . . . . . . . . . . . . . . . . . . . . . . . i-12
Chapter 5 I-2: Access This Book’s Free Resources . . . . . . . . . . . . . . . . . . . . . . . . . . i-13
I-3: Sign Up for a Microsoft Account. . . . . . . . . . . . . . . . . . . . . . . . . . . i-13
5-1: Determine If an Email Message Has Been Spoofed. . . . . . . . . . . . . . 218
5-2: Set Up a Personal Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Chapter 1
5-3: Secure Your Wireless Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . .236
5-4: Protect against a Phishing Scam . . . . . . . . . . . . . . . . . . . . . . . . . . .245 1-1: C reate a Facebook Account, Find the Discovering
Computers Facebook Page, and Like It . . . . . . . . . . . . . . . . . . . . . . . 49
Chapter 6
1-2: Create a Twitter Account, Find the Discovering
6-1: Select the Right Processor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Computers Twitter Account, and Follow It . . . . . . . . . . . . . . . . . . . . . 49
6-2: Determine Memory Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
6-3: Install Memory Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 1-3: Connect to a Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
6-4: Determine Which Ports You Need on a Computer or 1-4: Manage Your Calendar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
1-5: Back Up Photos from a Phone or Tablet. . . . . . . . . . . . . . . . . . . . . . . 51
Mobile Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
6-5: Protect and Replace Screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Chapter 2

Chapter 7 2-1: Determine Your IP (Internet Protocol) Address . . . . . . . . . . . . . . . . . 101
2-2: Participate in an Online Auction . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
7-1: Set Up and Use Webcams and Integrated DV Cameras. . . . . . . . . . . . 332 2-3: View and Manage Data Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
7-2: Connect a Laptop to an External Display . . . . . . . . . . . . . . . . . . . . . . 341 2-4: Search for a Job Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
7-3: Show Media on a Smart TV from Your Computer or Device . . . . . . . . 343 2-5: S end Email Messages Using Various Email
7-4: Print from a Smartphone or Tablet . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Programs and Web Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Chapter 8
Chapter 3
8-1: Defragment a Hard Disk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
8-2: Transfer Files from One Internal Hard Drive to Another. . . . . . . . . . . . 377 3-1: Synchronize a Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151
8-3: S elect a Cloud Storage Provider and Decide What to 3-2: Find, Download, and Read an E-Book on an

Upload to the Cloud. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 E-Book Reader. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151
8-4: Clean an Optical Disc and Fix Scratches. . . . . . . . . . . . . . . . . . . . . . . 387 3-3: Manage Power for Mobile Computers and Devices. . . . . . . . . . . . . . 152
3-4: Use Your Mobile Device Ergonomically . . . . . . . . . . . . . . . . . . . . . . 153
Chapter 9 3-5: T ransfer Media from a Mobile Device to

9-1: Remove a Program or App . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 a Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
9-2: Find the Latest Drivers for Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
9-3: Set Up and Use a Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 Chapter 4
9-4: U se Boot Camp to Install the Windows Operating System
4-1: Obtain Help about Programs and Apps . . . . . . . . . . . . . . . . . . . . . . 205
on a Mac. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432 4-2: Compress/Uncompress Files and Folders . . . . . . . . . . . . . . . . . . . . . 205
4-3: View Current Virus Threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Chapter 10 4-4: Back Up Your Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206
4-5: Share your Online Calendar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
10-1: Add a Computer or Mobile Device to a Wi-Fi Network. . . . . . . . . . . 455
10-2: Use Your Phone as a Mobile Hot Spot. . . . . . . . . . . . . . . . . . . . . . . . 470 Chapter 5
10-3: Strengthen Your Wireless Signal. . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
10-4: Create a Home Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 5-1: Evaluating Your Electronic Profile . . . . . . . . . . . . . . . . . . . . . . . . . . 255
10-5: Add a Wireless Printer to a Home/Small Office Network. . . . . . . . . . 479 5-2: Update Virus Definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256
5-3: Determine Whether a Computer or Mobile Device
Chapter 11
Is Secured Properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
11-1: Import Spreadsheet Data into a Database and Export Database 5-4: Clear Your Browsing History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Data to a Spreadsheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511 5-5: Configure a Browser’s Cookie Settings . . . . . . . . . . . . . . . . . . . . . . 257

11-2: Secure and Maintain a Database . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 Chapter 6
11-3: D etermine Which Object-Oriented Programming
6-1: Conserve Battery Life of Mobile Computers and Devices. . . . . . . . . . 311
Language or Application Development Tool to Use. . . . . . . . . . . . . . 530 6-2: Locate a Lost Mobile Computer or Device. . . . . . . . . . . . . . . . . . . . . . 311
11-4: Publish a Webpage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 6-3: Run Diagnostic Tools and Check for Computer Hardware Errors. . . . . 312

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x iv Contents  Discovering Computers

6-4: Determine How Much Memory Is Being Used on Your Chapter 3
Computer or Mobile Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
3-1: Avoid Malware Infections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110
6-5: Check Your Computer’s Hardware Configuration . . . . . . . . . . . . . . . . 313 3-2: ATM Safety. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
3-3: Safe Mobile Device Use in Public Areas. . . . . . . . . . . . . . . . . . . . . . 125
Chapter 7 3-4: Public USB Charging Stations — Safe or Not?. . . . . . . . . . . . . . . . . 136

7-1: Work with QR Codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Chapter 4
7-2: Record and Edit a Video. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
7-3: Save as or Print to a PDF File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 4-1: Safe Downloading Websites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
7-4: Take Screenshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 4-2: Using Personal Finance Apps Safely. . . . . . . . . . . . . . . . . . . . . . . . .174
7-5: Share a Photo or Video from Your Mobile Device with 4-3: Avoiding Risks Using Payment Apps . . . . . . . . . . . . . . . . . . . . . . . . 179
4-4: Recognizing Virus Hoaxes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192
an Online Social Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 4-5: Malware Risks to Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Chapter 8 Chapter 5

8-1: Determine Your Device’s Storage Capacity. . . . . . . . . . . . . . . . . . . . . 403 5-1: Play It Safe to Avoid Online Gaming Risks. . . . . . . . . . . . . . . . . . . . 216
8-2: Organize Files on a Storage Device Using Folders. . . . . . . . . . . . . . . . 403 5-2: Protection from Viruses and Other Malware. . . . . . . . . . . . . . . . . . .219
8-3: Copy Individual Files to Another Storage Device, and 5-3: Safely Use a Password Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . 223
5-4: Risks Associated with Inaccurate Data. . . . . . . . . . . . . . . . . . . . . . .240
Copy Files to Cloud Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
8-4: Manage Space on a Storage Device. . . . . . . . . . . . . . . . . . . . . . . . . . 405 Chapter 6

Chapter 9 6-1: Securing Computers and Mobile Devices . . . . . . . . . . . . . . . . . . . . . . 279
6-2: Chip Implants Secure Animals’ Identity. . . . . . . . . . . . . . . . . . . . . . . . 280
9-1: Determine Your Operating System Version. . . . . . . . . . . . . . . . . . . . . 443 6-3: Does the Internet of Things Encroach on Privacy? . . . . . . . . . . . . . . . 286
9-2: Search for Files on a Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 6-4: Wiping Mobile Phone Memory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
9-3: Personalize Your Operating Environment . . . . . . . . . . . . . . . . . . . . . . 444 6-5: Plug and Play Security Flaws. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
9-4: Configure Accessibility Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
9-5: Add Users to an Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Chapter 7

Chapter 10 7-1: Keyboard Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
7-2: Digital Video Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
10-1: Evaluate Internet Access Plans. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 7-3: Safely Scanning QR Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
10-2: Locate Hot Spots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 7-4: Protecting Credit Cards from Scanning Devices . . . . . . . . . . . . . . . . . 337
10-3: Test Your Internet Speed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
10-4: C onnect Your Computer and Mobile Device via Bluetooth Chapter 8

and Exchange Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 8-1: Encrypting Data and Files on Storage Devices . . . . . . . . . . . . . . . . . . 379
8-2: Safely Remove Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Chapter 11 8-3: Using Credit Cards Safely. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
8-4: Keeping NFC Transactions Safe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
11-1: Obtain and Verify the Accuracy of a Credit Report . . . . . . . . . . . . . . 545
11-2: Use a Research Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Chapter 9
11-3: Protect Your Data If Your Device Is Lost or Stolen . . . . . . . . . . . . . . . 546
11-4: Create and View a Text File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 9-1: Automatic Updates — Safe or Not?. . . . . . . . . . . . . . . . . . . . . . . . . . 422
9-2: Using and Evaluating an Operating System’s
Chapter 12
Built-In Security Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
12-1: Conduct an Effective Interview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 9-3: Open Source or Closed Source — Which Is More Secure? . . . . . . . . . 430
12-2: Create a Video Resume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586 9-4: BYOD Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
12-3: Create an Online Survey. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Chapter 10
SECURE IT BOXES
10-1: Monitoring Network Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Chapter 1 10-2: Preventing Bluebugging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
10-3: Detecting an Intruder Accessing Your Wireless Home Network. . . . . 474
1-1: Backing Up Computers and Mobile Devices . . . . . . . . . . . . . . . . . . . 19 10-4: Fake Cell Towers Are Tracking Devices. . . . . . . . . . . . . . . . . . . . . . . . 480
1-2: Protection from Viruses and Other Malware. . . . . . . . . . . . . . . . . . . 25
1-3: Creating Strong Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Chapter 11
1-4: Shopping Safely Online . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
11-1: Recovering from Identity Theft. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Chapter 2 11-2: Security Issues Arising from Outsourcing . . . . . . . . . . . . . . . . . . . . . 522
11-3: Technology Security Plan Components. . . . . . . . . . . . . . . . . . . . . . . 527
2-1: Using Public Wi-Fi Hot Spots Safely . . . . . . . . . . . . . . . . . . . . . . . . . 59 11-4: Protection from Macro Viruses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
2-2: Safe Browsing Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
2-3: P rivacy and Security Risks with Online Social Networks . . . . . . . . . . . 74
2-4: Protecting Yourself from Identity Theft . . . . . . . . . . . . . . . . . . . . . . . 80

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Contents xv

Chapter 12 Chapter 6: Media Sharing
Chapter 7: Travel and Tourism
12-1: How Secure Are Content Management Systems? . . . . . . . . . . . . . . . 557 Chapter 8: Reference and Information
12-2: Using Unlicensed Software Is a Crime. . . . . . . . . . . . . . . . . . . . . . . . 565 Chapter 9: Mapping
12-3: Risks of Jailbreaking and Rooting . . . . . . . . . . . . . . . . . . . . . . . . . . . 574 Chapter 10: Streaming Audio and Video
12-4: Protecting Customer Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575 Chapter 11: Scanning
Chapter 12: Banking and Finance
TECHNOLOGY @ WORK BOXES
TECHNOLOGY INNOVATOR
Chapter 1: Health Care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Chapter 2: Transportation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Chapter 1: Apple  • Facebook  • Microsoft  • Twitter
Chapter 3: Energy Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Chapter 2: Arianna Huffington  • LinkedIn  • Tim Berners-Lee  • Yahoo!
Chapter 4: Entertainment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Chapter 5: National and Local Security. . . . . . . . . . . . . . . . . . . . . . . . . . 249 Chapter 3: Dell/Michael Dell  • Nintendo  • Samsung  • Sony
Chapter 6: Publishing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Chapter 7: Finance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Chapter 4: Adobe Systems  • Dan Bricklin  • eBay/PayPal  • Google/Sergey Brin/
Chapter 8: Automotive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Larry Page
Chapter 9: Meteorology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Chapter 10: Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485 Chapter 5: AVG  • Intel Security  • LoJack  • Symantec
Chapter 11: Sports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539 Chapter 6: Intel and Gordon Moore  • AMD  • Nvidia  • VMWare
Chapter 12: Architecture and Design. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Chapter 7: Logitech  • QR Code Inventors  • HP
DISCOVER MORE ONLINE WITH THESE FREE RESOURCES
Chapter 8: Pinterest/Ben Silbermann  • Seagate/Al Shugart  • SanDisk  •
High-Tech Talk Articles Amazon/Jeff Bezos

Chapter 1: Neural Networks  • Triangulation Chapter 9: Linus Torvalds  • Red Hat  • Sun  • IBM
Chapter 2: DNS Servers  • IP Addresses
Chapter 3: Touch Screen Technology  • Voice Recognition Technology Chapter 10: Robert Metcalfe  • AT&T and Verizon  • Cisco
Chapter 4: Compression Algorithms  • Filtering Data
Chapter 11: E. F. Codd  • Oracle/Larry Ellison  • Lenovo  •
Chapter 5: Digital Forensics  • Encryption Algorithms
Electronic Arts
Chapter 6: Coding Schemes and Number Systems  • How Data Is
Written To RAM Chapter 12: Wikimedia Foundation/Jimmy Wales  • Ray Kurzweil •
Meg Whitman  • Salesforce
Chapter 7: Biometric Input  • How 3-D Printers Work
Chapter 8: How Data Is Recovered  • RAID Levels Technology Trend
Chapter 9: Benchmarking  • Virtualization
Chapter 10: Network Topologies: Star, Bus, Ring  • OSI Reference Model Chapter 1: MOOCs  • QR Codes in the Medical Field
Chapter 2: Responsive Web Design  • Uses of Bookmarking Sites
Chapter 11: T ypes of Databases, Database Design, and the Normalization Chapter 3: Bitcoin  • Volunteer Computing
Chapter 4: Evernote  • Instagram  • iTunes U
­Process  • Process and Object Modeling  • Programming Logic Chapter 5: Cloud Security  • Uses of Face Recognition Technology
Chapter 12: 3-D Graphics  • Bioinformatics Chapter 6: Medical Robotics  • Self-Driving Cars
Chapter 7: Drones  • Assistive Technologies
HOW TO: YOUR TURN ASSIGNMENTS – APP ADVENTURES
Chapter 8: Digitizing Nondigital Media  • Digitizing Media with R­ ECAPTCHAs
Chapter 1: Health  • Fitness Chapter 9: Linux Powering the Internet of Things  • Mobile versus D­ esktop
Chapter 2: Messaging Apps
Chapter 3: News  • Sports  • Weather O­ perating System Usage
Chapter 4: Office (Email, Calendar, To-Do Lists)
Chapter 5: Retail Chapter 10: Wireless Charging  • Geocaching

Chapter 11: Forensic Databases  • Custom Crime Fighting Software •
Programs behind Mars Rover

Chapter 12: Crowd Sourcing   • Monitoring Health Status

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x vi Preface  Discovering Computers

Preface

The Shelly Cashman Series® offers the finest textbooks or in combination with an applications, Internet, or pro-
in computer education. We are proud of the fact that the gramming textbook in a full-semester i­ntroductory tech-
previous seventeen editions of this textbook have been the nology course. No experience with c­ omputers is assumed.
most widely used in computer education. With this edition The objectives of this offering are to:
of Discovering Computers, we have implemented signifi-
cant improvements based on current computer trends and • Present the most-up-to-date technology in an
comments made by instructors and students. Discovering e­ ver-changing discipline
Computers: Tools, Apps, Devices, and the Impact of Technology
­continues with the innovation, quality, and reliability you • Give readers an in-depth understanding of why
have come to expect from the Shelly Cashman Series. ­computers are essential in business and society

In Discovering Computers: Tools, Apps, Devices, and the Impact • Teach the fundamentals of and terms associated with
of Technology you will find an educationally sound, highly computers and mobile devices, the Internet, programs
visual, interactive, and easy-to-follow pedagogy that, with and apps, and digital safety and security
the help of animated figures, relevant video, and interactive
activities in the e-book, presents an in-depth treatment • Present the material in a visually appealing, interactive,
of introductory computer subjects. Readers will finish the and exciting manner that motivates readers to learn
course with a solid understanding of computers, how to use
computers, and how to access information on the web. • Provide exercises, assignments, and interactive
learning activities that allow readers to learn by
Objectives of this Text, eReader, actually using computers, mobile devices, and
and CourseMate Web site the Internet

Discovering Computers: Tools, Apps, Devices, and the Impact • Present strategies for purchasing desktop computers,
of Technology is intended for use as a s­tand-alone solution mobile computers, and mobile devices

• Provide additional learning materials and
reinforcement online

• Offer distance-education providers a textbook with
a meaningful and exercise-rich digital learning
­experience

Hallmarks of Discovering step-by-step presentation, which simplifies the more
Computers complex technology concepts. Pictures and drawings
reflect the latest trends in computer technology.
To date, more than six million readers have learned about
computers using Discovering Computers. With the online Latest Technologies and Terms
integration and interactivity, step-by-step visual drawings
and photographs, unparalleled currency, and the Shelly The technologies and terms readers see in Discovering
and Cashman touch, this book will make your computer Computers are those they will encounter when they start
concepts course exciting and dynamic. Hallmarks of Shelly using computers and mobile devices personally and
Cashman Series Discovering Computers include: professionally. Only the latest applications are shown
throughout the book.
A Proven Pedagogy
Web Integrated
Careful explanations of complex concepts, educationally-
sound elements, and reinforcement highlight this proven This book uses the web as a major learning tool. The
method of presentation. purpose of integrating the web into the book is to
(1) offer students additional information and currency
A Visually Appealing Book that Maintains on important topics; (2) use its interactive capabilities
Student Interest to offer creative reinforcement; (3) make available
alternative learning techniques with games and quizzes;
The latest technology, photos, drawings, and text are
combined artfully to produce a visually appealing and
e­ asy-to-understand book. Many of the figures include a ­

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Preface xvii

Distinguishing Features • Balanced Presentation.  The print book provides
s­ tudents with what they need to know to be successful
Discovering Computers: Tools, Apps, Devices, and the Impact digital citizens in the classroom and beyond. Online
of Technology includes a variety of compelling features, resources address timely content and expand on the
­certain to engage and challenge students, making learning print text with content appropriate for Information
with Discovering Computers an enriched experience. These Technology majors. Readers can choose to utilize
­compelling features include: this digital-only content, empowering each to fit
the content to their specific needs and goals for the
• Introducing Today’s Technologies.  This new course.
i­ntroductory chapter details how to succeed in this
course by setting the stage for the rich resources • Thematic Approach.   Chapter boxes, marginal
­available in the text and online to support learning. e­ lements, and accompanying online content are linked
by common themes to facilitate class discussions and
• Technology Timeline.  This engaging visual provides help students make connections. These connections
milestones in technology history. shed light on the integral role technology plays in
­business and society.
• Cloud and Skills Coverage.  An integrated approach
to cloud computing and search skills appears through- • Media Engagement.  Enrichment content is
out the text shows how to apply these concepts to a­ vailable online to enhance student knowledge and
learning. understanding through additional free resources
and premium content. Developed by the authors,
• Career Coverage.  Career information is ­covered, this content provides deeper understanding and
including using social media to jumpstart your ­encourages learning by doing, as well as offering
­technology career. p­ ractical skill development.

• Discover More Online.  Free resources and p­ remium • Reinforcement and Support. End-of-chapter
content include currency updates and additional de- student assignments, along with the accompanying
tailed topical content. CourseMate website, offer students an exceptional
learning solution in addition to significant practice
• Strong Content.  Based on market research, opportunities in the form of study guide materi-
a­ ssessment of organization of each chapter’s con- als, flash cards, practice tests and critical thinking
tent, Discovering Computers has been restructured and ­opportunities.
r­ eorganized to improve retention of material and
promote transference of knowledge. The text’s visually
engaging presentation showcases current technology
as well as course fundamentals in order to reinforce
classroom and real-world applications.

(4) underscore the relevance of the web as a fundamental information they learn. End-of-chapter student
information tool that can be used in all facets of society; assignments include the following:
(5) introduce students to web-based research; and
(6) offer instructors the opportunity to organize and • Study Guide exercises reinforce material for the exams
administer their traditional campus-based or distance- • Key Terms page reviews chapter terms
education-based courses on the web using various • Checkpoint exercises test knowledge of chapter
learning management systems.
c­ oncepts
Extensive End-of-Chapter Student Assignments • How To: Your Turn exercises require that students

A notable strength of Discovering Computers is the learn new practical skills
extensive student assignments and activities at the end • Problem Solving exercises require that students seek
of each chapter. Well-structured student assignments
can make the difference between students merely solutions to practical technology problems
participating in a class and students retaining the • Internet Research exercises require that students

search for information on the web
• Critical Thinking exercises challenge student

a­ ssessment and decision-making skills

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x viii Preface  Discovering Computers

Instructor Resources These interactive activities are captured within the
CourseMate EngagementTracker, making it easy to assess
The Instructor Resources include both teaching and students’ retention of concepts.
t­ esting aids.
MindTap
Instructor’s Manual  Includes lecture notes summarizing
the chapter sections, figures and boxed elements found Typical courses often require students to juggle a variety of
in every chapter, teacher tips, classroom activities, lab print and digital resources, as well as an array of platforms,
­activities, and quick quizzes in Microsoft Word files. access codes, logins, and homework systems. Now all of
those resources are available in one personal learning expe-
cmenogradgeiesobcrnoalivinne.ceroamt Syllabus Customizable rience called MindTap. MindTap is a cloud-based, inter-
sample syllabi that cover poli- active, customizable, and complete online course. More
Discovering Computers 2016 cies, assignments, exams, and than an e-book, and different than a learning management
other course information. system, each MindTap course is built upon authoritative
Cengage learning content, accessible anytime, anywhere.
vermaat Discovering Tools,Apps, Devices, and Solutions to Exercises 
sebok the Impact of Technology Includes solutions for all Additional Online Material
freund e­ nd-of-chapter student
Computers 2016 assignments. SAM: Skills Assessment Manager
campbell
frydenberg PowerPoint Presentations  Get workplace-ready with SAM, the m­ arket-leading
A one-­click-per-slide presen- proficiency-based assessment and training solution for
vermaat | sebok | freund | campbell | frydenberg tation system that provides Microsoft Office! SAM’s active, hands-on environment
PowerPoint slides for every helps students master Microsoft Office skills and computer
30/12/14 8:50 PM subject in each chapter. concepts that are essential to academic and career success,
delivering the most comprehensive online learning solu-
Test Bank and Test Engine  Cengage Learning Testing tion for your course.
Powered by Cognero is a flexible, online system that
allows you to author, edit, and manage test bank content Through skill-based assessments, interactive
from multiple Cengage Learning solutions and to create trainings, business-centric projects, and comprehensive
multiple test versions. It works on any operating system remediation, SAM engages students in mastering the
or browser with no special installs or downloads needed, latest Microsoft Office programs on their own, giving
allowing you to create tests from anywhere with Internet instructors more time to focus on teaching. Computer
access. Multi-language support, an equation editor and concepts labs supplement instruction of important
unlimited metadata help ensure your tests are complete technology-related topics and issues through engaging
and compliant, and it enables you to import and export simulations and interactive, auto-graded assessments. With
content into other systems. The Discovering Computers enhancements, including streamlined course setup, more
Test Bank includes multiple for every chapter, featuring robust grading and reporting features, and the integration
objective-based and critical thinking question types, and of fully interactive MindTap Readers containing Cengage
including page number references and figure references as Learning’s premier textbook content, SAM provides the
appropriate. best teaching and learning solution for your course.

Free Resources  Available on the student companion CourseCasts: Learning on the Go
website accessed via www.cengagebrain.com, additional
free resources for each chapter allow students to dis- Always available… always relevant  Our fast-paced
cover more materials and deeper content online to enrich world is driven by technology. You know because you
­learning. are an active participant — always on the go, always
keeping up with technological trends, and always learn-
Computer Concepts CourseMate ing new ways to embrace technology to power your
life. Let CourseCasts, hosted by Ken Baldauf of Florida
The Computer Concepts CourseMate for Discovering State University, be your guide to weekly updates in this
Computers is the most expansive digital website for any ­ever-changing space. These timely, relevant podcasts are
c­ omputer concepts text in the market today. The content produced weekly and are available for download at http://
in the CourseMate solution is integrated into each page of coursecasts.course.com or directly from iTunes (search by
the text, giving students easy access to current information CourseCasts). CourseCasts are a perfect solution to getting
on important topics, reinforcements activities, and students (and even instructors) to learn on the go!
a­ lternative learning techniques.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Preface xix

Visual Walkthrough of the Book

Current. Relevant. Innovative.

1 2 Chapter 1 Introducing Today’s Technologies

IntroducIng today’s technologIes: Technology © iStockPhoto / scanrail Objectives
computers, devices, and the Web provides access to
the digital world After completing this chapter, you will be able to:
“I use computers, mobile devices, and the web to do homework, look up around you. 1 Differentiate among laptops, tablets, desktops, and servers
information, check email, play games, post updates, talk to friends, upload photos, 2 Describe the purpose and uses of smartphones, digital cameras, portable and digital media players,
sync music, and so much more! I feel comfortable using technology. What more do I
need to know?” e-book readers, wearable devices, and game devices
While you may be familiar with some of the content in this chapter, do you know 3 Describe the relationship between data and information
how to . . . 4 Briefly explain various input options (keyboards, pointing devices, voice and video input, and scanners),
• Use a touch screen?
• Configure social media privacy settings to prevent others from posting unauthorized output options (printers, displays, and speakers), and storage options (hard disks, solid-state drives, USB
flash drives, memory cards, optical discs, and cloud storage)
photos of you? 5 Differentiate the web from the Internet, and describe the relationship among the web, webpages,
• Ease eyestrain while working on a computer or mobile device? websites, and web servers
• Protect your hearing when using earbuds or headphones? 6 Explain the purpose of a browser, a search engine, and an online social network
• Back up computers and mobile devices? 7 Briefly describe digital security risks associated with viruses and other malware, privacy, your health,
• Perform a web search? and the environment
• Sync computers and mobile devices? 8 Differentiate between an operating system and applications
• Protect your computer from viruses and other malware? 9 Differentiate between wired and wireless network technologies, and identify reasons individuals
• Shop safely online? and businesses use networks
• Create a strong password? 10 Discuss how society uses technology in education, government, finance, retail, entertainment, health
• ‘Like’ the Discovering Computers page on Facebook and ‘follow’ it on Twitter? care, science, travel, publishing, and manufacturing
• Connect to a wireless network? 11 Identify technology used by home users, small/home office users, mobile users, power users,
In this chapter, you will discover how to perform these tasks along with much more information essential to this course. and enterprise users
For additional content available that accompanies this chapter, visit the free resources and premium content. Refer to
the Preface and the Intro chapter for information about how to access these and other additional instructor-assigned Today’s Technology Computers, Devices, and the Web Chapter 1 5
support materials.
In the course of a day, you may . . . complete a homework assignment and watch a streaming
© iStockPhoto / scanrail; © iStockphoto / Stephen Krow; Source: Apple, Inc.; © iStockphoto / video using your laptop, flip through news headlines and make dinner reservations using your
Moncherie; © iStockPhoto / MileA; Courtesy of Epson America, Inc.; © Dmitry Rukhlenko / Photos.com tablet, search for directions and the local weather forecast while listening to music on your
smartphone, edit a video on a desktop computer, and share photos online from your digital
C8827_ch01.indd 1 camera with family and friends. These and many other technologies are an integral part of
everyday life: at school, at home, and at work (Figure 1-1).
Chapter Opener
familiarize students with the Technology can enable you to more efficiently and effectively access and search for
material in each chapter. information; share personal ideas, photos, and videos with friends, family, and others;
communicate with and meet other people; manage finances; shop for goods and services;
play games or access other sources of entertainment; keep your life and activities organized;
and complete business activities. People who can accomplish these types of tasks using
technology often are said to be tech savvy.

Because technology changes, you must keep up with the changes to remain digitally literate.
Digital literacy involves having a current knowledge and understanding of computers, mobile
devices, the web, and related technologies. This book presents the knowledge you need to be
digitally literate today.

As you read this first chapter, keep in mind it is an overview. Most of the terms and concepts
introduced in this chapter will be discussed in more depth later in the book.

01/12/14 6:00 PM C8827_ch01.indd 2 How To 1-1

Interact with a Touch Screen
You usually can interact with a touch screen using gestures. A gesture is a motion you make on a touch screen with the tip of one
or more fingers or your hand. Touch screens are convenient because they do not require a separate device for input. Tablets and
smartphones typically have touch screens.

The table below p01re/1s2e/1n4ts6:c01oPmMmon ways to interact with a touch screen.

Touch Screen Gestures

Motion Description Common Uses

Tap Quickly touch and release one finger one time Activate a link (built-in connection)
Press a button
Run a program or app

How To Double-tap Quickly touch and release one finger two times Run a program or app
features enable readers to learn Zoom in (show a smaller area on the screen, so that
new practical skills. contents appear larger) at the location of the double-tap

Press and hold Press and hold one finger to cause an action to Display a shortcut menu (immediate access to allowable
Drag, or slide occur, or until an action occurs actions)
Activate a mode enabling you to move an item with one
finger to a new location

Press and hold one finger on an object and then Move an item around the screen
move the finger to the new location
Scroll

Swipe Press and hold one finger and then move the Scroll
Stretch finger horizontally or vertically on the screen Display a bar that contains commands on an edge of
Pinch Move two fingers apart the screen

Zoom in (show a smaller area on the screen, so that
contents appear larger)

Move two fingers together Zoom out (show a larger area on the screen, so that
contents appear smaller)

Consider This Consider This: In addition to the motions listed in the table, what other motions do you think a touch screen should support?
features provide readers with © Cengage Learning
critical thinking opportunities.
ConSiDer THiS internet research
What is a virtual keyboard?
If a slate tablet has no keyboard, how do you type on it?
You can use your fingers to press keys on a keyboard that appears on the screen, called an on-screen keyboard, or Search for: virtual keyboard
you can purchase a separate physical keyboard that attaches to or wirelessly communicates with the tablet. You
also may be able to speak into the tablet, and your spoken words will translate to typed text.

C8827_ch01.indd 5 01/12/14 5:58 PM

Mini Features Computers, Devices, and the Web Chapter 1 11
throughout the text explore
­various real world topics to Mini Feature 1-1 Home Automation
deepen concept understanding.
Gaming and Digital New home builders and existing homeowners are
Home integrating features that automate a wide variety of © DavidEwingPhotography /
tasks, save time and money, and enhance the overall Shutterstock.com; © Poulsons
Academic researchers developed the first video games at-home environment. Photography / Shutterstock.com;
in the 1950s as part of their studies of artificial © Anthony Berenyi /
intelligence and simulations, and their work was • Lighting: Controlling lighting is one of the more Shutterstock.com
applied and expanded commercially to early home common uses of technology in the home. Remotes
consoles and arcade games. The concept of home auto- turn light fixtures on and off, and motion sensors © iStockphoto / Christian J.
mation can be traced back to 1898 when Nikola Tesla turn on lights when a car or a visitor approaches the Stewart; © Mmaxer / Shutterstock.
invented the first remote control. The following sections driveway or walkway. com; © iStockphoto / Nastco;
describe how these two technologies are used today. © ESPN; © Cengage Learning
• Thermostats: Programmable thermostats adjust to
Gaming seasonal needs and can be set to control temperatures
in individual rooms. Homeowners can use their smart-
Video gamers spend billions of dollars each year phones to monitor heating and cooling systems, adjust
making the most of their downtime with game consoles temperatures, and manage energy consumption.
and devices, with an estimated 5 billion people world-
wide playing at least 45 hours per week. The popularity • Appliances: Smart appliances, such as dishwashers,
is due, in large part, to the social aspect of gathering can be programmed to run at nonpeak electrical
families and friends to play together as a group or times. Coffeemakers can turn on at set times and
online with each other and those around the world. The shut off if an overheating coffeepot has been left on
wide variety of categories offers a gaming experience accidentally. Refrigerators can track expiration
for practically everyone in genres such as adventure, dates and create shopping lists.
education, fitness, puzzles, sports, role-playing, and
simulation. • Security: Security systems can detect
break-ins at doors and heat from
• Obtaining Games: Gamers have several options fires, and they can send text and
available for locating games. For tablets and smart- email messages to alert a
phones, they can download games from an app store to homeowner when someone
a mobile computer or device. For game consoles, they has entered or left the home.
can purchase or rent discs or other media that contain Surveillance cameras keep a
games; download or transfer them from online stores; or watchful eye on the premises and
sign up for cloud services that stream or transfer games interior rooms; homeowners can view the
on demand. images on televisions and computers within the
house or on a webpage when they are away from
• Accessories and Input Techniques: The more home, as shown in the figure.
popular game consoles work with a wide variety
of accessories and input techniques for directing • Remotes: Many people are turning to
movements and actions of on-screen players and using their smartphones and tablets to
objects. They include gamepads, voice commands, control all the devices in the room.
and fitness accessories, some of which are shown Users enjoy the convenience of cus-
here. Although many games are played using a tomizing apps to operate their tele-
controller, several systems operate by allowing the vision, DVR, and security system
player to be the controller. and to perform other functions
anywhere in the home.
© iStockphoto /
Florea Marius Catalin; Discover More: Visit this
© iStockphoto / chapter’s free resources to
Brandon Alms; learn more about game genres,
© iStockphoto / Lee game controllers, remotes, programmable
Pettet; © iStockphoto / thermostats, smart appliances, security systems, and
Craig Veltri; © Courtesy vacuum systems.
of DDR Game
Consider This: How has your life become more
efficient, safe, and enjoyable by using home automation
and entertainment features? What are the advantages of
playing games, and do they outweigh the disadvantages?

C8827_ch01.indd 11 01/12/14 5:59 PM

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x x Preface  Discovering Computers

Secure IT Computers, Devices, and the Web Chapter 1 37
features allow students to
broaden their knowledge SeCure IT 1-4 met rigorous standards. Some unscrupulous • Check website details. Locate the
with details regarding merchants, however, will place the seals on business’s privacy policy to learn how your
security issues they will Shopping Safely Online their websites even if they have not been information will be stored. Also, look for
face. approved. To check a seal’s legitimacy, tap phone numbers, physical addresses, and
Browsing electronic storefronts and making or click the logo and be certain you are email addresses to contact the vendor if
online purchases can be convenient and directed to the issuing agency’s website to questions arise about damaged goods or
economical, but the experience can be a verify the seal is valid. billing discrepancies.
disaster if you encounter unscrupulous ven-
dors. These tips can help you enjoy a safe • Create a strong password and • Beware of requests to supply
and productive online shopping trip. password questions. If the merchant further information. After you have
requires you to create a user name and pass- placed an order, you may receive an
• Read customer reviews. Shoppers word, be certain to develop a long, complex email message asking you to confirm
frequently post comments about merchan- password with at least eight characters the transaction or to supply additional
dise quality, pricing, and shipping. Their that include letters, numbers, and special account information. A reputable busi-
evaluations may help you decide whether a characters. (Refer to Secure IT 1-3 earlier ness will not solicit these requests, so do
company is legitimate. Be aware, however, in this chapter for guidance on creating a not reply to the message.
that the Federal Trade Commission has strong password.) The website also may ask
sued companies for posting false positive for answers to security questions; if so, do Consider This: Have you made online
reviews and that some companies remove not supply information that hackers could purchases? If so, have you followed the pre-
negative comments. Make it a habit to rate locate easily, such as your high school, place cautions listed here? How will you change
merchants as often as possible so that oth- of birth, or family members’ or pets’ names. your activities the next time you shop online?
ers can learn from your experiences.

• Look for seals of approval. Online
businesses can display seals if they have

Purchasing from an Online Retailer

Step 1 Step 2 Step 3
The customer The customer The customer enters
displays collects payment information
the online purchases in on a secure website.
retailer’s a shopping cart. The online retailer
storefront. sends nancial
information to a bank.
Step 5
The online retailer’s web server Step 4
sends con rmation to the customer, The bank performs
processes the order, and then sends security checks and
it to the ful llment center. sends authorization
back to the online
retailer.

Figure 1-35 This

figure shows the

steps involved when

a customer purchases

from an online By The Way (BTW)
marginal elements assist
retailer. readers in broadening their
knowledge.
© Comstock Images / Photos. Computers, Devices, and the Web Chapter 1 23
com; © iStockphoto / Mark
Evans; © iStockphoto /

AndyL; © iStockphoto /

Mlenny Photography;

Step 6 Step 7 OnlineSThteeSpoord8ceir ais ldeNliveertedwtoothreks © Oleksiy Mark / Photos.com; BTW
The ful llment center packages the While the order travels to the customer, © Oleksiy Mark / Shutterstock.
order, prepares it for shipment, and com.; © iStockphoto / Ed
then sends a report to the server where shipping information is posted on the web. iinsteAitrnsedoontdcnuoulosliscsinetuinogremmnseecea(nsroF,thomwiatogcnhmiudaoahcrlmukeenlnnado1yiewct-botyl2emewd9trpgeoo)uqe.truesPrkierhroce,oaedrparipleust.lotahrceLsHOaoteiiekldranlvsrdeaenilencdniinnoan;gtlePae©e;iem©r rsiskSae ooiitgnScsoetscitco;saskic©alp,k hlpniCodhneetonoettegwoa/tas/wog,erosktrionkrgsieisnsit,cepl,uhisdoeatoFwsa,ecmbesbuitoseioctk,h,aaTntdwenivtcitdeoeru,orasangwdeistLhminoektmhedebrIenrr.seg-
records are updated. Technology Innovators
Discover More: Visit
C8827_ch01.indd 37 this chapter’s free

Some online social networks have no specialized audience; others are more focused. A photo shar- resources to learn
ing site, for example, is a specific type of online social network that allows users to create an online more about Facebook
photo album and store and share their digital photos. Similarly, a video sharing site is a type of online and its founder, Mark
social network that enables users to store and share their personal videos. Read Ethics & Issues 1-2 Zuckerberg, and Twitter.

to consider whether you should be required to obta01in/12p/1e4rm5:5i7ssPiMon before posting photos of others.

Discovering Computers
Facebook page

post presents
current events and
technology news

Ethics & Issues Figure 1-29 When Facebook users ‘like’ this Discovering Computers Facebook page, posts from the
boxes raise controversial, Discovering Computers page will appear on their own personal pages. As a student in this class, you should
computer-related ­topics, ‘like’ the Discovering Computers page so that you easily can keep up to date with relevant technology
c­ hallenging readers to changes and events in the computing industry. If you do not have a Facebook account, use a search engine
carefully consider general to search for the text, discovering computers facebook, to display the page in a browser.
concerns of computers
in society. Source: Facebook

EthiCs & issuEs 1-2 photos in which others tag you. The person photos shared online. Or, they simply may find
posting the photo still can upload the photo, the photo unflattering. A poll by Sophos stated
Should You Be Required to Obtain but your tag will not be associated with the that 80 percent of respondents consider
Permission before Posting Photos photo until you approve it. Facebook also asking before posting a photo to be common
of Others? allows you to report a photo as abusive if courtesy. Eight percent of respondents felt that
Your friends and followers on online social you feel it portrays you negatively or if the it should be illegal to do so.
networks instantly can view photos you post. person who posted it refuses to remove it
If others appear in the photo and you post it upon request. Facebook’s own Statement of Consider This: Is it ever acceptable to post
without their permission, they might feel you Rights and Responsibilities states that “You photos of others without permission? Why
have violated their privacy. Tagging people in a will not tag users . . . without their consent.” or why not? Has someone posted or tagged
photo may create a link to their social network you in a photo that you did not want others
profiles, exposing their identity. Depending on People may not want photos of themselves to see? How did you handle the situation?
your privacy settings, your friends’ contacts can posted for a variety reasons. They may have If asked to remove a photo or tag, would
view a photo you post and/or share the photo professional contacts as friends on their online you respect the person’s feelings and honor
without your permission. social network and do not want to show the request? What restrictions and policies
themselves in a personal setting. Others may should online social networks have about
You may be able to adjust tagging rules not be concerned with personal photos of posting photos of others?
in the privacy settings of your online social themselves but do not want their children’s
network account. For example, you can use
Facebook’s privacy settings to approve all

C8827_ch01.indd 23 01/12/14 5:54 PM

Now You Should Know Computers, Devices, and the Web Chapter 1 43
feature provides assessment opportunity and integrates directly
to chapter learning objectives to assess learning outcomes. noW you should knoW
Be sure you understand the material presented in the sections titled Communications and Networks, Technology
Chapter Summary Uses, and Technology Users, as it relates to the chapter objectives.
allows another review of materials presented in the Now you should know . . .
chapter to reinforce learning and provide additional
self-assessment opportunities. • When you might use wired and wireless communications, and why you would use a network (Objective 9)
• How you would use technology in education, government, finance, retail, entertainment, health care, science,
Technology @ Work
features put chapter information to practical travel, publishing, and manufacturing (Objective 10)
use and provide context within students’ lives. • What types of hardware, software, and communications you could use at home, school, and work (Objective 11)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

Chapter Summary

Chapter 1 introduced you to basic computer concepts. You learned about laptops, tablets,
desktops, servers, smartphones, digital cameras, portable media players, e-book readers, and
game devices. The chapter introduced various methods for input, output, memory, and storage.
It discussed the Internet, browsing and searching the web, and online social networks. Next,
the chapter introduced digital security and safety risks and precautions, along with various types
of programs, applications, communications, and networks. The many different uses of technol-
ogy applications in society also were presented, along with types of users. This chapter is an
overview. Many of the terms and concepts introduced will be discussed further in later chapters.

Discover More: Visit this book’s free resources for additional content that accompanies
this chapter and also includes these features: Technology Innovators: Facebook/Mark Zuckerberg,
Twitter, Microsoft/Bill Gates, and Apple/Steve Jobs/Steve Wozniak; Technology Trends: MOOCs
and QR Codes in the Medical Field; and High-Tech Talks: Triangulation and Neural Networks.

Test your knowledge of chapter material by accessing the Study Guide, Flash Cards, and Practice
Test resources from your smartphone, tablet, laptop, or desktop.

TeChnology @ Work

Health Care About 30 minutes later, a technician calls electronically.
You are out running on a beautiful day, your name and escorts you to the radiology
tracking your route and distance using a department for your CT scan. As she is The hospital
health and fitness app on a smartphone. While performing the scan, a computer records
running, you accidentally step on uneven the images that later will be reviewed by a bills your
pavement and suffer an injury that requires a physician. When the CT scan is complete, you
trip to an emergency room. Upon check-in, the return to the waiting room until a physician insurance
employee at the front desk uses a tablet to reviews the results. Once she receives
record your personal data and symptoms. She the results and reviews them, a hospital company
also uses the tablet to verify that your insur- employee takes you to a consultation room.
ance coverage is current and informs you of electronically.
your co-payment amount. After waiting several The physician informs you that other than a
minutes, a triage nurse takes your temperature few bumps and bruises, she believes that you If you owe
and blood pressure and then asks a series of have sustained no permanent damage and
questions about your symptoms. The nurse prescribes medication to help ease the pain. a balance © Shutterstock / Image Point Fr
also records this data in a tablet and asks you She then returns to a computer at the nurses’
to remain in the waiting room until someone station and adds her diagnosis to the database after the insurance company pays its portion,
from the radiology department is available to that stores your medical records. She also
perform a CT scan. The radiology department sends your prescription electronically to the a computer at the hospital will generate a bill
is located in a different area of the hospital, hospital’s pharmacy. Once discharged, you visit
so the technicians watch a computer screen the cashier to pay the bill. You then use a tablet that will be mailed to you. After purchasing
that displays a list of patients who currently to sign an electronic version of your discharge
are waiting for their services. paperwork so that the hospital can store it your medication and leaving the hospital, you

realize that despite the hospital being busy,

computers decreased the time of your visit by

automating processes that otherwise would

have been performed manually and reduced

possible errors by storing all of your personal

information centrally.

Consider This: How else might
computers and technology be used in the
health care industry?

C8827_ch01.indd 43 01/12/14 4:03 PM

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Preface xxi

End-of-Chapter Student Assignments

Study Guide 44 Chapter 1 Introducing Today’s Technologies STUDENT ASSIGNMENTS
materials reinforce chapter content.
STUDENT ASSIGNMENTS Study Guide The Study Guide exercise reinforces material you should know for the chapter exam.

Discover More: Visit this chapter’s premium content to test your knowledge of digital content associated with this
chapter and access the Study Guide resource from your smartphone, tablet, laptop, or desktop.

Instructions: Answer the questions below using the format that helps you remember best or that is required by your instructor. Possible formats
may include one or more of these options: write the answers; create a document that contains the answers; record answers as audio or video using
a webcam, smartphone, or portable media player; post answers on a blog, wiki, or website; or highlight answers in the book/e-book.

1. Define the term, digital literacy. 24. What is a browser? Describe the purpose of a search engine.

2. Define the terms, computer, hardware, and user. 25. Explain the purpose of an online social network.

3. Differentiate between a PC and a mobile computer. A laptop 26. Differentiate between the services and uses of Facebook,
also is known as a(n) ___ computer. Twitter, and LinkedIn.

4. Describe the characteristics and features of a tablet. List 27. List services of the Internet that facilitate communications.
several touch screen gestures.
28. Define the term, malware. List ways you can protect yourself
5. Explain the difference between a desktop and an all-in-one. from malware.
What additional meaning does the term, desktop, sometimes
have? 29. What privacy risks are involved with using technology? List
guidelines for creating a strong password.
6. Define the term, server. What services does a server provide?
30. Explain physical and behavioral health risks associated with
7. Explain whether or not a mobile device is a computer. using computers.

8. List characteristics of a smartphone. 31. Describe strategies that support green computing.

9. Differentiate among voice, text, picture, and video messages. 32. Define the term, software. Software also is called a(n) ___.

10. Describe the purpose of these mobile devices: digital cameras, 33. Define the term, operating system. List popular operating
portable and digital media players, e-book readers, wearable systems for computers and mobile devices.
devices, and game devices.
34. Differentiate between desktop, web, and mobile apps.
11. Describe the trend of digital device convergence and how it
applies to mobile devices. 35. List the steps involved in installing programs.

12. Describe uses of technology in home automation. 36. Explain how to locate, install, and run programs. What is the
role of a software developer?
46 Chapter 1 Introducing Today’s Technologies 13. Differentiate between data and information. Give an example
of each. 37. Define the term, communications device. List examples of
STUDENT ASSIGNMENTS Checkpoint The Checkpoint exercises test your knowledge of the chapter concepts. The page number containing the wireless communications technologies.
answer appears in parentheses after each exercise. The Consider This exercises challenge your under- 14. Define the terms, input and output. List several types of input
standing of chapter concepts. devices and output devices. 38. Define the term, hot spot. Give two examples and describe
how each is used.
Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises interactively; complete 15. Describe the purpose of a pointing device. Give an example.
the self-assessment in the Test Prep resource from your smartphone, tablet, laptop, or desktop; and then take the 39. Describe how homes and businesses use networks.
Practice Test. 16. List the hardware you can use to input and view output for
voice and video. 40. Identify issues surrounding accessing an unsecured network.
True/False Mark T for True and F for False.
17. Differentiate between memory and storage. 41. Explain what occurs when you synchronize computers and
1. Electronic components in computers process data using instructions, which are the steps that tell the mobile devices.
computer how to perform a particular task. (4) 18. A computer keeps data, instructions, and information on ___
media. Give some examples. 42. List ways that schools use technology to enhance education.
2. An all-in-one contains a separate tower. (6)
3. Smartphones typically communicate wirelessly with other devices or computers. (7) 19. Define the term, cloud storage. Describe the types of services 43. Identify how the following industries use technology:
4. Data conveys meaning to users, and information is a collection of unprocessed items, which can include text, offered by cloud storage providers. government, financial, retail, entertainment, health care,
science, travel, publishing, and manufacturing.
numbers, images, audio, and video. (12) 20. Describe components of a backup plan. How do backup plans
5. A headset is a type of input device. (14) for mobile devices and personal computers differ? 44. Describe how you might use blogs, wikis, and podcasts to
6. A scanner is a light-sensing output device. (14) publish content.
21. Describe the Internet. Identify reasons people use the Internet.
45. Differentiate among the following technology user types:
22. Differentiate between the web and the Internet. home user, small/home office user, mobile user, power user,
and enterprise user.
23. The ___ consists of a worldwide collection of electronic
documents. What is each electronic document called? 46. Describe how technology is used in the health care industry.

7. Although some forms of memory are permanent, most memory keeps data and instructions temporarily, C8827_ch01.indd 44 01/12/14 5:51 PM
meaning its contents are erased when the computer is turned off. (16)

8. A solid-state drive contains one or more inflexible, circular platters that use magnetic particles to store data,
instructions, and information. (17)

9. The terms, web and Internet, are interchangeable. (21)

10. One way to protect your computer from malware is to scan any removable media before using it. (25)

11. Operating systems are a widely recognized example of system software. (26)
12. You usually do not need to install web apps before you can run them. (28)

Multiple Choice Select the best answer.

1. A(n) is any hardware component that allows 5. A computer that delivers requested webpages to your

you to enter data and instructions into a computer or computer or mobile device is a(n) . (21)

mobile device. (12) a. VoIP computer c. FTP device

a. output device c. input device b. web server d. hard drive

b. communications d. display 6. A is software that enables users with an

device Internet connection to access and view webpages

2. Which of the following is not an example of an output on a computer or mobile device. (21)

device? (14) a. search engine c. browser

a. scanner c. display b. wiki d. digital media player

b. printer d. speaker 7. uses short-range radio signals to enable

3. consists of electronic components that store computers and devices to communicate with each

instructions waiting to be executed and the data other. (32)

needed by those instructions. (16) a. Cellular radio c. Wi-Fi

a. Storage c. Solid-state drives b. Bluetooth d. A hot spot

b. Cloud storage d. Memory 8. A(n) is a collaborative website that allows users

4. is an Internet service that provides remote to create, add to, modify, or delete the content via 48 Chapter 1 Introducing Today’s Technologies

storage to computer users. (18) their browser. (40) Problem Solving The Problem Solving exercises extend your knowledge of chapter concepts by seeking
solutions to practical problems with technology that you may encounter at home, school,
a. Smart TV c. Solid-state drive a. podcast c. online social or work. The Collaboration exercise should be completed with a team.

b. Cloud storage (SSD) b. blog network STUDENT ASSIGNMENTS Instructions: You often can solve problems with technology in multiple ways. Determine a solution to the problems in these exercises by using
one or more resources available to you (such as a computer or mobile device, articles on the web or in print, blogs, podcasts, videos, television, user
d. Bluetooth d. wiki guides, other individuals, electronics or computer stores, etc.). Describe your solution, along with the resource(s) used, in the format requested by
your instructor (brief report, presentation, discussion, blog post, video, or other means).

C8827_ch01.indd 46 01/12/14 5:48 PM Personal Professional

Checkpoint 1. Shopping for Software You are shopping for software 6. Discarding Old Computer Equipment Your
activities provide multiple-choice, true/ that will assist you with your home’s interior design. The company has given you a new laptop to replace your
false, matching, and consider this package for the program you would like to purchase current, outdated desktop. Because of the negative
exercises to reinforce understanding of states that it was designed for the most recent version environmental impact of discarding the old computer in
the topics presented in the chapter. of Windows, but an older version is installed on your the trash, your supervisor asked you to suggest options
computer. How can you determine whether the program for its disposal. How will you respond?
Problem Solving will run on your computer?
activities call on students to 7. Dead Battery While traveling for business, you
relate concepts to their own 2. Bad Directions You are driving to your friend’s house realize that you forgot to bring the battery charger
lives, both personally and and are using your smartphone for directions. While for your laptop. Knowing that you need to use the
p­ rofessionally, as well as provide approaching your destination, you realize that your laptop to give a presentation tomorrow, what steps
a collaboration opportunity. smartphone app instructed you to turn the wrong way will you take tonight to make sure you have enough
on your friend’s street. How could this have happened? battery power?

3. Bank Account Postings While reviewing your 8. Cannot Share Photos You are attempting to send
checking account balance online, you notice that debit photos of a house for sale in an email message to your
card purchases have not posted to your account for real estate partner. Each time you attempt to send
the past several days. Because you use online banking the email message, you receive an automatic response
to balance your account, you become concerned about stating that the files are too large. What are your next
your unknown account balance. What steps will you steps?
take to correct this situation?
9. Incorrect Sign-In Credentials Upon returning to
4. Trial Expired You have been using an app on your the office from a well-deserved two-week vacation,
mobile device for a 30-day trial period. Now that the 30 you turn on your computer. When you enter your
days have expired, the app is requesting that you to pay user name and password, an error message appears
to continue accessing your data. What are your stating that your password is incorrect. What are
next steps? What steps could you have taken to your next steps?
preserve your data before the trial period expired?
10. Synchronization Error You added appointments
5. Problematic Camera After charging your to the calendar on your computer, but these
digital camera battery overnight, you insert the appointments are not synchronizing with your
battery and turn on the camera only to find smartphone. Your calendar has synchronized with your
that it is reporting a low battery. Seconds later, smartphone in the past, but it has stopped working
the camera shuts off automatically. What might without explanation. What are your next steps?
be wrong?

Collaboration

11. Technology in Health Care Your primary care physician is moving from a shared office so that he can open his
own practice. He mentioned that he would like to use technology in his office that not only will improve the patient
experience, but also make his job easier. Form a team of three people to determine the types of technology your
doctor can use in his new office. One team member should research ways that technology can help improve patient
check-in and billing. Another team member should research the types of technology your doctor can use while he is
working with patients, and the third team member should research any additional technology that can be used in the
office to improve the patient experience. Compile your findings in a report and submit it to your instructor.

C8827_ch01.indd 48 01/12/14 5:47 PM

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

x xii Preface  Discovering Computers

Computers, Devices, and the Web Chapter 1 49 How To: Your Turn
activities enable readers to learn and to
STUDENT ASSIGNMENTS The How To: Your Turn exercises present general guidelines for fundamental skills How To: Your Turn STUDENT ASSIGNMENTS reinforce new practical skills with personally
when using a computer or mobile device and then require that you determine how to meaningful and applicable exercises.
apply these general guidelines to a specific program or situation.

Discover More: Visit this chapter’s premium content to challenge yourself with additional
How To: Your Turn exercises, which include App Adventure.

Instructions: You often can complete tasks using technology in multiple ways. Figure out how to perform the tasks described in these exercises
by using one or more resources available to you (such as a computer or mobile device, articles on the web or in print, online or program help, user
guides, blogs, podcasts, videos, other individuals, trial and error, etc.). Summarize your ‘how to’ steps, along with the resource(s) used, in the format
requested by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1 Create a Facebook Account, Source: Facebook
Find the Discovering
Computers Facebook Page, 2 Create a Twitter Account, Find the 52 Chapter 1 Introducing Today’s Technologies
and Like It
The Discovering Computers Discovering Computers Twitter Account, STUDENT ASSIGNMENTS Internet Research The Internet Research exercises broaden your understanding of chapter concepts by
Facebook page contains links requiring that you search for information on the web.
to current events and other and Follow It
technology news, as well as relat- Discover More: Visit this chapter’s premium content to challenge yourself with additional
ing the links to content in this The Discovering Computers Twitter account Internet Research exercises, which include Search Sleuth, Green Computing, Ethics in Action,
book. The following steps guide contains links to current events and other technology You Review It, and Exploring Technology Careers.
you through the process of sign- news, as well as how it relates to the content in this
ing up for a Facebook account, textbook. The following steps guide you through the Instructions: Use a search engine or another search tool to locate the information requested or answers to questions presented in the exercises.
navigating to the Discovering process of signing up for a Twitter account, navigat- Describe your findings, along with the search term(s) you used and your web source(s), in the format requested by your instructor (brief report,
Computers Facebook page, and ing to the Discovering Computers Twitter account, presentation, discussion, blog post, video, or other means).
liking the page. and following it.
a. Run a browser and then navigate a. Run a browser and then navigate to 1 Making Use of the Web 2 Social Media
to www.facebook.com.
b. Follow the steps on the Facebook webpage to www.twitter.com. Informational and Research Online social networks are a central communications
sign up for a new account. If you already have an b. Follow the steps on the Twitter webpage to sign up tool and the primary source of news and information
account, enter your sign-in information and sign in Informational and research websites contain factual for many people. Historians place the birth of online
to your Facebook account. for a new account. If you already have an account, information and include reference works such as social networking with the BBS (Bulletin Board
c. Search for the Discovering Computers Facebook enter your sign-in information and sign in to your libraries, encyclopedias, dictionaries, directories, and System), where users communicated with a central
page using the search text, Discovering Twitter account. guides. More than 2.4 billion people worldwide use the computer and sent messages to other BBS members
Computers. c. Search for the Discovering Computers Twitter Internet, and Google is one of the websites they visit and also downloaded files and games. The next phase
d. Select the Discovering Computers Product/Service account using the search text, DiscoveringComp. most often. Google reports that people perform more of online social networks evolved when CompuServe,
in the search results. d. Select Shelly Cashman @DiscoveringComp in the than 100 billion searches every month using its Google AOL (America Online), and Prodigy were among the
e. Tap or click the Like button to like the page. search results. Search. In How To 1 in the Succeeding in this Course services linking people with similar interests. Today’s
f. If your screen displays a Follow button, tap or e. Tap or click the Follow button to follow the chapter at the beginning of this book and How To 1-3 online social networks share many of the same basic
click it to see information from the Discovering account. in this chapter, you learned how to use a browser to principles by allowing members to communicate
Computers Facebook page in your news feed. f. View the posts and tap or click links on the page display a webpage on a computer or mobile device and common interests, play games, and share photos, vid-
g. View the posts and tap or click links on the page that are of interest to you. to perform a basic web search using a search engine. eos, and music. Some of these online social networks
that are of interest to you. g. When you are finished, sign out of Twitter. are for personal use, while others are for entrepre-
h. When you are finished, sign out of Facebook. Research This: Using a browser and search engine, neurs, business owners, and professionals to share
find the answers to the following questions. (1) Search job-related topics.
Exercises for the top five informational websites and top five
research websites. What types of information or re- Research This: Compare the features of the top
1. Summarize the process you use to sign up for or sign search does each present? What search text did you use? personal online social networks, and create a table
in to your Facebook account. (2) Visit Google’s website and locate the company’s early listing the number of active members in the United
philosophy: “Ten things we know to be true.” What are States and worldwide, the number of years the sites
2. Which links on the Discovering Computers Facebook five of these values? What is the goal of the “Made with have existed, the more popular features, and the
page are of interest to you? Why? Code” initiative? (3) Visit the Engadget website and read amount of content, such as photos, news stories,
at least three reviews of tablets. Create a table listing and links, that is shared each month. What types of
3. Browse Facebook and find at least three other the product name, price, battery life, pros, and cons. advertisements are featured in each of these sites?
Facebook pages that are of interest to you. Which (4) Locate articles about using hands-free devices for Which sites are marketed toward younger and older
pages have you found, and why do you like them? conversations while driving. Which states have passed users? Then, research the online social networks used
legislation to restrict drivers’ use of hands-free devices for business. How does their content differ from that
C8827_ch01.indd 49 01/12/14 5:43 PM while driving? Describe the features found in the sophis- found on the personal online social networks? How
ticated hands-free system of one of this year’s vehicles. many companies use these sites as a recruiting tool?
Internet Research How many native languages are supported? How are
exercises require follow-up research on the web professionals using these websites to find potential
and suggest writing a short article or presenting clients and business partners?
the findings of the research to the class.

3 Search Skills

Critical Thinking 54 Chapter 1 Introducing Today’s Technologies Selecting Search Terms
activities provide opportunities Search text that you send to a search engine, such
for creative solutions to these STUDENT ASSIGNMENTS Critical Thinking The Critical Thinking exercises challenge your assessment and decision-making skills by as Google, Bing, or Yahoo!, impacts the quality of
thought-provoking activities pre- presenting real-world situations associated with chapter concepts. The CSooulrlcae:bGooroagtleioInnc. your search results. Rather than typing a long ques-
sented in each chapter. The Critical exercise should be completed with a team. tion in the search box, you may improve your results
Thinking exercises are constructed if you select the question’s most important words as
for class discussion, presentation, your search text. For example, instead of typing the
and independent research. The
Collaboration exercise is designed Instructions: Evaluate the situations below, using personal experiences and one or more resources available to you (such as articles on the web or in
for a team environment.
print, blogs, podcasts, videos, television, user guides, other individuals, electronics or computer stores, etc.). Perform the tasks requested in each exer-

cise and share your deliverables in the format requested by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1. Reactions to Software Problems C8827_ch01.indd 52 01/12/14 4:16 PM

existing computer or device to save energy? Use the

People who use computers and mobile devices web to locate articles that recommend energy-efficient

sometimes experience problems with software, including products and that provide tips about additional ways to

operating systems, desktop apps, web apps, and mobile save energy.

apps. Problems range from not being able to install or 3. Case Study
download the program or app to a computer or mobile
device, to a program or an app producing unanticipated Amateur Sports League You are the new manager
results. Depending on the situation, these problems for a nonprofit amateur soccer league. The previous
can result in user stress. Many people believe reactions manager tracked all of the data on paper. You realize that
to software problems tend to be more extreme than using technology will increase your efficiency and enable
reactions to problems with other tools. you to communicate better with the board of directors,
coaches, and players. At the board’s next meeting, you
Do This: Evaluate situations in which you have seen will share ideas of how you will use technology.
people react to program and app problems on their
computers and mobile devices. Discuss how these users Do This: To prepare for the meeting, you compile the
can reduce their frustration when dealing with such following: differences between input and output, a list
problems. Have you ever been frustrated by problems of the types of data you can use as input, and a list of the
with a program or an app? How did you react? What types of information you can produce as output. You in-
did you do to solve the problem? clude the types of computers, mobile devices, and other
technologies you will use to enter data and produce the

2. Energy Efficiency information. Incorporate your own experiences and user

Increases in energy prices lead many individuals to reviews of the devices. Compile your findings.

look at purchasing energy-efficient computers and

devices. Energy-efficient models often look and

perform similarly to equivalent computers or devices

that use more energy.

Do This: Find two computers or devices of identi-

cal configuration, where the only difference is energy

consumption. How much energy does the energy-

efficient model save? Are energy-efficient computers

and devices more or less expensive? Will the difference

in cost (if any) affect your purchasing decision? How

else might you be able to change your settings on your

Source: © Cengage Learning

Collaboration

4. Recommending Technology Solutions People use computers and mobile devices in a variety of fields, including
travel, manufacturing, and more. Although the way people use computers and mobile devices varies, each use involves
hardware, programs and apps, and some type of communications method, such as the Internet or cellular network.
Do This: Form a three-member team and choose a field in which you all are interested. Assign one member to
investigate hardware, another to investigate programs and apps, and the third member to investigate communica-
tions methods used in the field. Locate user reviews and articles by industry experts. Each team member should
develop a list of related items that may be used. After the investigation, create a hypothetical business or organization
in the field. Recommend specific hardware, programs or apps, and communications capabilities that would be best
for the network or organization. Include comparisons of specific items, as well as costs. Be sure to summarize your
investigations, describe the hypothetical business or organization, and outline and support your recommendations.

C8827_ch01.indd 54 01/12/14 5:25 PM

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Discovering Computers  Preface xxiii

Visual Walkthrough of the Computer Concepts
­CourseMate, MindTap, and Free Resources

CourseMate
Introduce the most current technology
into the classroom with the Computer
Concepts CourseMate. An integrated
MindTap eReader and a wide range
of online learning games, quizzes,
practice tests, and web links expand
on the topics covered in the text with
h­ ands-on reinforcement. Visit www
.cengagebrain.com to register your
access code and access your course
and the premium resources assigned
by your instructor.

Engagement Tracker
Engagement Tracker makes ­assessing
students easy by tracking student
p­ rogress on the interactive activities.
Clear and visual reports illustrate the
class progress as a whole.

MindTap
MindTap is a personalized
­teaching experience with
relevant assignments that guide
students to analyze, apply, and
improve thinking, allowing you
to measure skills and outcomes
with ease.

Free Resources on
C­ engageBrain
Start with ­locating D­ iscovering
Computers on www.­cengagebrain
.com in order to access the free
resources found on the student
resources page.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Succeeding in This Course: Intro
Tips and Pointers

You can improve
your digital literacy
by reading this
book and accessing
its associated online
content.

Introduction

This introductory chapter is designed to prepare you to succeed in this course. It
begins with a discussion of browsing the web, followed by overview of the book and
its associated additional online content, which familiarizes you with the meanings of
references and symbols that appear throughout the book. Next is a brief buyer’s guide
that you can use to purchase a desktop, laptop, or tablet for use during the semester.
Finally is an abbreviated set of exercises designed to acquaint you with the resources
you will be expected to use in Chapter 1.

Keep in mind that this chapter uses a variety of terms that are described in more
depth in Chapter 1 and throughout the book. These terms also are defined in this
book’s index. If you need additional information about a particular topic, refer to the
appropriate chapter.

Browsing the Web

Each chapter in this book contains topics, elements, and assignments that presume
you already know how to use a browser. As you may know, a browser is software that
enables you to access and view webpages on a computer or mobile device that has an
Internet connection. Some widely used browsers include Internet Explorer, Firefox,
Safari, and Chrome. Read How To 1 for instructions about using a browser to display
a webpage on a computer or mobile device.

© iStockPhoto / alengo

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

I-2 Intro Chapter Succeeding in This Course

How To 1 3. In the address bar, type the web address your finger across a touch screen or by
of the webpage you want to visit and using a pointing device, such as a mouse,
Use a Browser to Display a Webpage then press the enter key or tap or click the to drag the scroll bar.
The following steps describe how to use Go (or similar) button to display the web- 5. Tap or click links on the webpage to
a browser to display a webpage on a page. For example, www.cengagebrain. ­navigate to the link’s destination.
­computer or mobile device: com is a valid web address, which displays
the CengageBrain webpage shown in the   Consider This: What should you do if
1. Run a browser. (Chapter 1 discusses figure below. (Chapter 2 discusses the the web address you enter does not display a
­running programs and apps.) components of a web address.) webpage or you receive an error message?

2. If necessary, tap or click the address bar 4. If necessary, scroll to view the entire Close button
to select it and any previously displayed w­ ebpage. You can scroll either by sliding
web address it may contain. (A web
address is a unique address that identifies
a webpage.)

address bar browser webpage appears
in display area

Back button

links
scroll bar

© Cengage Learning

Consider This
What does the    icon mean that appears in the book?
This icon denotes that the questions or exercises that follow require critical thinking. Your instructor may assign or

e xpect you to discuss in class any of these questions that appear throughout the chapters.

Book and Online Content

As a student in this course, you should be aware that the material located in the pages of
this book includes content you should know to be successful as a student and as a digital
­citizen. Other content is available online only as free resources or premium content. The free
resources are available at no additional cost with your book purchase, whereas the p­ remium
content may or may not have been included with your purchase, as determined by your
instructor. Please see the preface or your instructor for details related to the location of the
free resources and the premium content, as well as information about purchasing the premium
content, if desired.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Tips paonstdprPesoeinntsters  Intro Chapter  I-3

current events and

Free Resources  The free resources, which are available online, present (1) up-to-datetcehnology news
­content including current s­tatistics, trends, models, products, programs, apps, etc., (2) content
that elaborates on essential material in the book, or (3) content required for those students
majoring in the information technology or computer science fields. When free resources are
available for a topic in this book, they will be identified in one of two ways:

(a)  F  ree resources icon (  ): These icons precede chapter boxed elements to indicate that

­additional material is available in the free resources. The chapter boxed elements that may

have associated free resources include the following (Figure 1):
&FDiigsIcusorsevue1eri-sn2g9 When Facebook users ‘like’ this Discovering Computers Facebook page, posts from the
• Ethics Computers page will appear on their own personal pages. As a student in this class, you should

• How To‘like’ the Discovering Computers page so that you easily can keep up to date with relevant technology
• Secure cIhTanges and events in the computing industry. If you do not have a Facebook account, use a search engine
• TechnotSlooougrsceey:aF@racchebWofoookr rtkhe text, discovering computers facebook, to display the page in a browser.

free resources icon EthiCs & issuEs 1-2 photos in which others tag you. The person photos shared online. Or, they simply may
precedes boxed posting the photo still can upload the photo, the photo unflattering. A poll by Sophos st
element title Should You Be Required to Obtain but your tag will not be associated with the that 80 percent of respondents consider
Permission before Posting Photos photo until you approve it. Facebook also asking before posting a photo to be comm
of Others? allows you to report a photo as abusive if courtesy. Eight percent of respondents felt
Your friends and followers on online social you feel it portrays you negatively or if the it should be illegal to do so.
networks instantly can view photos you post. person who posted it refuses to remove it
If others appear in the photo and you post it upon request. Facebook’s own Statement of Consider This: Is it ever acceptable to p
without their permission, they might feel you Rights and Responsibilities states that “You photos of others without permission? W
have violated their privacy. Tagging people in a will not tag users . . . without their consent.” or why not? Has someone posted or tag
photo may create a link to their social network you in a photo that you did not want ot
profiles, exposing their identity. Depending on People may not want photos of themselves to see? How did you handle the situatio
your privacy settings, your friends’ contacts can posted for a variety reasons. They may have If asked to remove a photo or tag, woul
view a photo you post and/or share the photo professional contacts as friends on their online you respect the person’s feelings and ho
without your permission. social network and do not want to show the request? What restrictions and polic
themselves in a personal setting. Others may should online social networks have abou
You may be able to adjust tagging rules not be concerned with personal photos of posting photos of others?
in the privacy settings of your online social themselves but do not want their children’s
network account. For example, you can use
Facebook’s privacy settings to approve all

Figure 1  When you see the    icon to the left of a boxed element title or the phrase, it means you can
find additional related online material in the free resources.

(b) D iscover More reference: These references within the text and in the margins briefly BTW 0
C8827_ci­hd01e.inndtdify23the type of material you will find in the free resources. The Discover More
22 Chaptee­­rrel1efemrIeennntrctosedsuthcaianptgpmeToaadryawyh’siatThveeicnha­ntsohslooegcpiieaastreadgrfarepehsreosfotuerxcteisninthcleucdheatphteerfo(Flloigwuirneg2: ). The marginal Table of Boxed Elements
For a complete list of
• HigWh-eTbeScheaTrcahlking every print and online
• TechnAoplorigmyarIynrneaosvoanttohrat people use the web is to search for specific information, including text, boxed element in this
• Techphnootloos,gmyuTsirce, anndd videos. The first step in successful searching is to identify the main idea or book, see the Table of
Boxed Elements in the
concept in the topic about which you are seeking information. Determine any synonyms, alter- preface.
nate spellings, or variant word forms for the topic. Then, use a search engine, such as Google,
Discover More to help you locate the information. A search engine is software that finds websites, webpages,
reference images, videos, news, maps, and other information related to a specific topic. Read How To 1-3
for instructions about how to perform a basic web search using a search engine on a computer
or mobile device.

Discover More: Visit this chapter’s free resources to learn more about search engines.

How To 1-3

PTuheseer fafoo rslmleoawracinhBgaessntcFigceoiipgnWnseuetdorebeennsScta2erit acbhorecmaWhhtpouhwwteeitrnlolodyr oireucsteyeo3tuh. eeBaTiacitDnpchgeoeisrsssrecctalthoircoeckvhYemtaherhenaoMgStoieen!aroeris,carehoelarbricynrohaexhfteaoehnnorged.ecintnofhermce.eneet,otyripteesmoeuarcn5e.ssSsbyeocyoarrtoruhclpelhctrsthaeeerxanmotrucshifguuihgenmgntdeghsienctaieosod,enntda.artpicethionorrtenc.lsiauckll,tsthraeenldadetstehireeddnonline
mobile device to perform a basic web
the desired search text in the Search box. tap or click a search result to display the
search:
The more descriptive the search text, the corresponding webpage.

1. Run a browsEedri.toC(riFoapolyrrreivginihetsw2t0rhu1as6cdCteieoenmngeasdgeothLnaetaarnnyinsgu.pAprllesRsiegdhctsoRneteaesnsetiredvoerdeis.tMnwoatyimllnaobtteerbieatlcolyoplaoifefcdea,ctstctehanetnhoevede,rdoalreldsleuiaprrelnidcinatgseede,xaiprnecrwhiehnoclee.oC6rei.nngpTaagoret.rLDeeuateurntrionngeltreoecstertorhvneeics rtshiegehartisrg,chshtotmoreeresthmuiroldtvsep,aartdtaydpictiooonntraelncctlomincatkeynbt eatsaunpyprteimsseediffsroumbsethqeueenBtoroigkhatsndre/ostrriecCtihoanpsterer(qsu).ire it.

disaster if you encounter unscrupulous ven- or click the logo and be certain you are email addresses to contact the vendor if

dors. These tips can help you enjoy a safe directed to the issuing agency’s website to questions arise about damaged goods or

•an dIR-ep4arodd ucucItsnivttoermooneClrihnreaepvshtieeowprpsi.nSSguhctorcpipep.eerdsing in Th•is verify the seal is valid. and billing discrepancies.
CCroeuartseea strong password • Beware of requests to supply

frequently post comments about merchan- password questions. If the merchant further information. After you have

dstcehuovisaaemetdlupqtachauotneaimoylFintpeisysda,lmeneprigreaaiicsyltiiTnfmhrogaeard,lptpaeeon.yCsodBtoueisnmhdagmiewpfciapasieaaPdlirssnecsneireog,stecwni.ihpmgevToohh,hinwsetiaeriumitsteieehirmvvieseeen,rnr,fCaatodsor.dncWietteiaohnrtpwcnnheehtaodqan aasrutsrldatwiipr,ne­eTceobrtcxsselreehtuedrymsdceroy.weecuo(irpRiiutlttuseaehroemtirfenteascemr,ktrtrecostlnaeia,ooundanotneSesmudwettvmaceeelouublecniogrtseodetphherngstrIeia,Tsectnraleh1aonaoarn-mndv3erfgtaeass,e,ccipoatacwlheenoaurcrlahdmbisrieapcilrpplcetealeehssfxrsodi-screoasanivgtcaoneilnateppepahmcelidatbeccssacols,tteeiiurolwnodanmonrietaltnselhnnicanslnhihiscofosnaotaartiegrdbolnmsle,enoecorianea,olonitsycgkricykooi,tetlionuounit.uythgdmsAoreuweyasuprsoleyieepluipwlarrlneyeutrbiotcqtntaeeeauhdicribnevodialasdeegnicttdefstaibioe,dinrnuvmnxsitseotapiiifl-eodiernoida-l
reviews and that some compainniesorneemoovfetwo waiynst:his chapter for guidance on creating a not reply to the message.

• bemnLroeuesgsoricacnkahteinavfsonesleetrcsasosracnemsaamfnorlosfedtmneiostnpfsy.loaaaMsupyrpapsekoerxeasopslvisietbarialfilee(.thanhsOa)coe nbe y•­Piw tlisnith. hnridatAtaeeothivmncoeraaiatimhttusee-smaottchicoiaaonttneaoslfnvtdootdofeircrdotdbnapaneistitrrneutgoteshiipesowpcm,p:aaonoelsVyisrrniauslsiyfilwnam,et(formso woeurrsicdcslmeytho.o)c)ham:nuuaTterhTisetroisteemcynyehneowbqteustaheuesrnraiabeeshntirss’mitihecgioticoealhrauaoncpatskvdsnliece;saoehtsoriisfsonl’ptmsaocsnhorbola,a,eetulypmdocelldfoaaeeobsacsdkl.eseleotptcwerheriancpymuoapuguunirtuctre(dihCFmoraeanocirsfgtsniescigvutssloiia?uirstndintereIeetfedsde3rsstn)oshTha:ot,ehen.hrmiTensda?:evehxoeHHtoetayohtfvoicwmeuthhreywafeooepyiulllolltmeoeuymwmorosauerheeddeoncleehpttchomasooenntnemlgpiolnneirnpeetesl-e?x
figures in the book.

• Drag-and-drop activities: Practice these interactive activities to test your knowledge of a

concept in a table or figure.

• Study Guide, Flash Cards, and Practice Test resources: Prepare for quizzes and exams by
Purchasing from an Online Reviteawilienrg the material from your smartphone, tablet, laptop, or desktop.

Step 1 Step 2 Step 3
The customer The customer The customer enters
displays collects payment information
the online purchases in on a secure website.
retailer’s a shopping cart. The online retailer
storefront. sends nancial
information to a bank.

Step 5 Step 4 premium content icon
The online retailer’s web server The bank performs
sends con rmation to the customer, security checks and
processes the order, and then sends sends authorization
it to the ful llment center. back to the online
retailer.

Step 6 Step 7 Step 8 Figure 1-35 This
The ful llment center packages the While the order travels to the customer, The order is delivered to the
order, prepares it for shipment, and shipping information is posted on the web. customer, who may be required figure shows the
then sends a report to the server where to sign a handheld computer or
records are updated. document to acknowledge receipt. steps involved when

a customer purchases

from an online

retailer.

© Comstock Images / Photos.
com; © iStockphoto / Mark
Evans; © iStockphoto /
AndyL; © iStockphoto /
Mlenny Photography;
© Oleksiy Mark / Photos.com;
© Oleksiy Mark / Shutterstock.
com.; © iStockphoto / Ed
Hidden; © iStockphoto /
Oksana Perkins; © Cengage
Learning; © iStockphoto /
stevecoleimages

Figure 3  When you see the   icon, it means you can find additional, related online chapter resources in

the premium content.

indd 37 (b) Discover More reference: These references within the text briefly identify the type of 01/12/14 7:38 PM
­material you will find in the premium content. Resources available as premium content
include p­ ractice quizzes, study guide questions for material presented in the free resources,
Key Terms and Checkpoint activities, additional How To: Your Turn and Internet Research
exercises, and more.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Tips and Pointers  Intro Chapter  I-5

Purchasing the Right Computer

As a student in a technology course, you might be thinking of purchasing a desktop, laptop, or
tablet to help you with this course and future courses in your academic career. In addition to the
information in this section, consider speaking with your instructors, as well as an academic advi-
sor, to see if they have any specific recommendations for computers or mobile devices you might
use in the courses you plan to take. If your academic institution has a store that sells computers,
it also might have specific computer or mobile device recommendations, as well as a student
discount program. Make sure the computer or mobile device you purchase is capable of running
the software that you will need for your classes.

Step 1: Choose the Computer Type

Laptops, tablets, and desktops each serve a different purpose. It is important that you choose
the type of computer best suited to your needs. This section briefly describes and identifies some
of the pros and cons associated with each type of computer. See Chapter 3 for a more thorough
discussion of computer types.

Laptops  A laptop is a thin, lightweight mobile computer with a screen in its lid and a
­keyboard in its base (Figure 4). Users who need or want to be able carry a computer from
place to place may choose a laptop.

traditional laptop ultrathin laptop

Figure 4  Two different types of laptops.

© Sergey Peterman / Shutterstock.com; © iStockphoto / Skip Odonnel; Source: Microsoft; Apple, Inc.

PROS

• Portable
• Uses less electricity than a desktop
• Contains a battery that can last at least several hours without being plugged in to an external

power source
• Often more powerful than a tablet
• Contains several different types of ports
• All required components housed in a single unit (i.e., compact keyboard, touchpad, screen,

speakers, etc.)
• Can support more types of external devices than tablets (i.e., full-sized keyboard, mouse,

microphone, monitor, printer, scanner, webcam, speakers, etc.)
• Supports programs and apps specifically designed for desktops and laptops
• Can connect to a large monitor

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

I-6 Intro Chapter Succeeding in This Course

CONS

•  Might not be as powerful as high-end desktops
•  May not support as much memory and hard drive space as desktops
•  Contains fewer ports than desktops
•  May support fewer external devices than desktops
•  Not as easy for a user to upgrade or repair as desktops
•  May not be as portable as tablets

Tablets  A tablet is a thin, lightweight mobile computer that has a touch screen (Figure 5).
Users who do not need the power of a laptop but require a portable computer for basic tasks
may choose a tablet.

PROS

•  More portable than laptops
•  Lightweight (most tablets weigh less than two pounds)
•  Use less electricity than a desktop
• Battery life often is superior to laptops
• All required components housed in a single unit (touch screen, speakers, etc.)
• Can connect a removable keyboard
• Use thousands of free and fee-based apps
• Often are easier to use than desktops and laptops
• Built-in memory card slots can increase storage capacity

Figure 5  One type of tablet.

© iStockphoto / franckreporter CONS

• Not as powerful as desktops and laptops
• Hardware cannot be upgraded
• Typically do not support the same types of apps as desktops and laptops
• Have limited multitasking capabilities
• More susceptible to damage because they frequently are moved from place to place
• Because a touch screen is the primary form of input, it may be difficult to enter large amounts

of text on a tablet (unless an external keyboard is connected)
• Lack surface to rest wrists and arms, so ergonomic problems may develop

Desktops  A desktop is a computer designed to be in a stationary location, where all of its
components fit on or under a desk or table (Figure 6). Users who may prefer desktops include
those with basic home or office computing needs who do not require the portability of a mobile
computer or those with high-end computing needs, such as 3-D gaming or HD video editing.

desktop with tower

all-in-one

Figure 6  Two different types of desktops.

© iStockphoto / Oleksiy Mark; Source: Microsoft; © iStockphoto / hocus-focus; Apple, Inc.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Tips and Pointers  Intro Chapter  I-7

PROS

• Often more powerful than laptops and tablets
• Can connect to one or more large monitor(s)
• Contain several different types of ports or multiple duplicate ports
• Can accommodate more types of external devices than laptops and tablets (i.e., keyboard,

mouse, microphone, monitor, printer, scanner, webcam, speakers, etc.)
• Often support more memory and hard drive capacity than laptops and tablets
• Support programs and apps specifically designed for desktops and laptops
• Relatively easy for a user to upgrade and repair

CONS

• Require several external, separate components, such as a keyboard, mouse, speakers, and
sometimes the monitor

• High-end models can be more expensive than laptops and tablets
• Cannot run apps designed for mobile device operating systems, such as Android and iOS

Most students will find that a laptop or desktop is most suitable for their coursework or for
gaming. In addition, they might choose a tablet to carry with them at other times because tablets
are ideal for everyday tasks, such as searching the web, checking email messages, participating in
video calls, and reading e-books.

Step 2: Choose the Operating System

An operating system is software (a program) that coordinates all the activities among
­computer components. Multiple operating systems exist for each type of device (Table 1).
Deciding which operating system is best for you will be the next step in determining the specific
brand of computer that ultimately meets your needs.

Certain courses may require specific applications (apps), and those applications may be
a­ vailable only on a specific operating system. For example, a course that teaches digital
media might require an application that is available only for Mac OS. Table 2 illustrates the
various categories of programs and apps. This section outlines the more common operat-
ing systems for each type of device. See Chapter 4 for a more thorough discussion of an
­operating system.

Table 1  Examples of Operating Systems
by Category

Category Name

Desktop Windows

OS X

UNIX

Linux

Chrome OS

Mobile Google Android

Apple iOS

Windows Phone

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

I-8 Intro Chapter Succeeding in This Course

Table 2  Categories of Programs and Apps

Category Sample Uses for Students

Communications View course websites.
Communicate via email with instructors and other students.
Send and receive files.
Facilitate and participate in online meetings with instructors and other students.

File, Disk, and System Management Organize personal and school-related files.
Copy and move files.
Search for files.

Graphics and Media Create digital media, such as images and movies.
View multimedia course content, such as online lectures.

Personal Interest Perform research using content from dictionaries, encyclopedias, etc.
Learn through tutors and prepare for tests.

Productivity Create research papers and other documents.
Develop presentations to use in classes.
Organize your academic and personal schedule.

Security Protect your computer and schoolwork from viruses and other malicious software.

Laptops and Desktops  The two primary operating systems available on laptops and
d­ esktops are Windows (shown in Figure 7) and Mac OS (shown in Figure 8). While other
operating systems, such as UNIX, Linux, and Chrome OS also are available, Windows and
Mac OS are the most common. Some computers can run multiple operating systems. For
example, Apple computers can run Windows and Linux in addition to Mac OS. Windows and
Mac OS each offer a unique user experience; the best way to determine which one you are
most comfortable with is to try using each one. Most stores that sell laptops and desktops will
have some working models that you can evaluate. Make sure the operating system you decide
to use also is capable of running the programs and apps required for your courses.

Figure 7  Windows operating system.

Source: Microsoft

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Tips and Pointers  Intro Chapter  I-9

Figure 8  Mac OS operating system.

Source: Apple, Inc.

Tablets  Tablets often include one of three operating systems: Android (Figure 9), iOS
(Figure 10), or Windows (Figure 11). While Android and iOS are the most popular o­ perating
systems on tablets, the Windows operating system is increasing in popularity. Determine
the types of apps you wish to use on the tablet and then determine which operating systems
s­upport those apps.

If you want your tablet to synchronize seamlessly with other computers and devices, such as
a laptop, desktop, or smartphone, consider an operating system that is compatible with your
other computer or device. For example, if you have an Android phone, you might prefer the
Android operating system for your tablet. If you use an iPhone or iPod Touch, you might prefer
the iOS operating system for your tablet.

Figure 9  Tablet running Figure 10  Tablet running iOS Figure 11  Tablet running Windows operating system.
Android operating system. operating system.
© Pieter Beens / Shutterstock.com
© iStockphoto / PetkoDanov © iStockphoto / Hocus Focus Studio

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

I-10 Intro Chapter Succeeding in This Course

Step 3: Choose Configuration Options

The final step in choosing the best laptop, tablet, or desktop to meet your needs is to choose
the specific configuration details. For example, you may have to choose the size of the display,
amount of memory, storage capacity, and processor speed.

Display Screen Size  Display screens for computers are available in a variety of sizes (Figure 12).
A laptop’s screen typically can range from 11 to 17 inches, and a tablet’s screen generally is between
7 and 12 inches. If you purchase a laptop or tablet, a smaller screen size will make the device lighter
and more portable. For example, laptops with screens exceeding 15 inches typically are much
heavier, which makes them less convenient to transport. Desktops often use a monitor as their dis-
play, with the size of screens on these monitors r­anging from 13 inches to more than 30 inches.

If you primarily will be sending and receiving email messages, creating and editing documents
using a word processing app, and browsing the web, a device with a smaller screen should meet
your needs. If you require a larger screen to work with large documents or display multiple
windows simultaneously, or if you want to experience less eyestrain with the contents appearing
larger on the screen, consider a desktop or laptop display with a larger screen size. If you require
touch functionality (and the operating system you plan to use supports it), purchase a screen that
supports touch input. In addition, if you decide to purchase a laptop or desktop, you usually can
connect a second monitor.

monitor display

laptop display

Figure 12  A variety of digital camera
displays. display

© cobalt88 / Shutterstock.com;
© Pawel Gaul / Photos.com

Memory  The amount of memory (RAM) installed in your laptop, tablet, or desktop will
help determine the types of programs and apps that can run on the computer, as well as how
many programs and apps can run simultaneously (Figure 13). If you are purchasing a lap-
top or desktop, review the system requirements for the programs and apps you plan to use,
and make sure to purchase a computer with enough memory to meet those system require-
ments. For example, if the operating system you plan to use requires at least 4 GB (gigabytes)
of memory, and you plan to use a word processing app that requires 4 GB of memory, you
should purchase a laptop or desktop with at least 8 GB of memory. It is recommended that
you purchase a computer with slightly more memory than you need at the present time.
This enables you to use multiple programs and apps simultaneously and also accommodates
p­ rograms and apps you might install and use at a later time.

Figure 13  Memory modules contain memory chips.

© TerryM / Shutterstock.com

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Tips and Pointers  Intro Chapter  I-11

Storage Capacity and Media  Laptops, tablets, desktops are available with hard disk
various storage capacities. The higher the storage capacity, the more data
and information you can keep on the computer or device. To determine the SSD
ideal storage capacity, add together the amount of storage space required for
all the programs and apps you want to use. In addition, estimate the amount Figure 14  Two different types of storage
of space you might need to store the files you create. If you are planning devices.
to store digital media, such as audio, photos, and videos, make sure the
­storage device has sufficient space for those files as well. Try not to purchase © Andresr / Shutterstock.com; © roadk / Shutterstock.com
a device with exactly the amount of storage space you anticipate needing.
Always purchase more than you need so that you do not risk running out
of space.

In addition to determining sufficient storage capacity for your needs,
two main types of primary storage devices from which you may be able to
choose include a hard disk (also called a hard drive) or an SSD (solid-state
drive) (Figure 14). Hard disks use magnetic particles to store data, instruc-
tions, and information on one or more inflexible, circular platters. SSDs are
flash memory storage devices that contain their own processors to manage
their storage. Hard disks often are less expensive than SSDs and offer greater
­storage capacities. SSDs, however, are faster than hard disks and may be less
susceptible to failure.

Processor Speed  If you are purchasing a laptop or desktop, you probably
will have to ­determine the processor that will best meet your needs. Many
different brands and models of processors are available (Figure 15). Review
the system requirements for the programs and apps you want to run to deter-
mine the ­processor best suited to your needs. Because a variety of brands and
models of processors exist, you may find it difficult to decide which one to
purchase. When you are shopping for your laptop, tablet, or desktop, ask a
sales associate to explain the differences among the various processors so that
you can make an informed decision.

Step 4: Choose the Purchasing Option Figure 15  Processor that might be found in
a computer or device.
You can purchase new computers and mobile devices in physical stores as
well as from online retailers. Each purchasing option has advantages and dis- Courtesy of Intel Corporation
advantages, and it is important to consider these before making a purchasing
decision. If, after reading this section, you still do not have a strong preference
to purchase from a physical store or an online retailer, compare costs from each
for a computer with an identical or similar configuration.

Physical Stores  A variety of computers and mobile devices are available for sale at physical
stores. While physical stores offer the convenience of being able to shop for and bring home a
computer or mobile device the same day, they have a limited inventory and available configu-
ration options. Computers and mobile devices in retail stores are prebuilt and often cannot be
customized at the store. For example, if you evaluate the various computers at a physical store
and see a laptop you are considering, that laptop may be available in only one configuration. If
you want to make changes to the hardware configuration (such as adding a larger hard drive),
that would need to be done by a third party after you make the purchase. Some computer and
mobile device manufacturers may void their warranty if a third party upgrades your computer
or mobile device after the purchase has been made, so be sure to purchase a computer that
adequately meets your needs.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

I-12 Intro Chapter Succeeding in This Course

Online Retailers  Unlike physical stores, online retailers may offer greater configuration
options for a computer or mobile device you are considering purchasing. For example, you
may be able to completely customize a computer by choosing the exact processor, memory,
and hard drive capacity. Online retailers also may offer prebuilt options, so consider the cost
difference between purchasing a prebuilt computer and a customized computer with similar
specifications. You may find that purchasing a prebuilt computer with a configuration slightly
better than one you customized is less expensive. Prebuilt computers often may be less expen-
sive because they are mass produced. If you purchase a computer from an online retailer, how-
ever, you will not be able to see the computer and evaluate it before purchase. In addition, it
may take several days to several weeks before computers and mobile devices purchased from
online retailers may arrive on your doorstep. If you receive the computer or mobile device
and do not like it, returning or exchanging it may not be as easy as if you were to purchase it
in a physical store.

How To: Your Turn The How To: Your Turn exercises present general guidelines for fundamental skills when
using a computer or mobile device and then require that you determine how to apply
these general guidelines to a specific program or situation.

Instructions: You often can complete tasks using technology in multiple ways. Figure out how to perform the tasks described in these exercises
by using one or more resources available to you (such as a computer or mobile device, articles on the web or in print, online or program help, user
guides, blogs, podcasts, videos, other individuals, trial and error, etc.). Summarize your ‘how to’ steps, along with the resource(s) used, in the format
requested by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1 Get the Most out of Your Book appear in shaded boxes with orange borders at the
top and bottom. These boxes contain information
Unlike many traditional textbooks, this book about security concerns and helpful safety and
­contains a variety of elements to help enrich your security tips that are related to the surrounding
understanding of the concepts taught in the text. chapter content. Answer the question(s) at the
These elements include steps that teach you how to bottom of the Secure IT box.
perform real-world tasks, current issues related to d. Locate and read an Ethics & Issues box in
technology, and a variety of information to keep you Chapter 1 (or other chapter of your choice).
secure while interacting with computers and mobile Ethics & Issues boxes appear in shaded boxes with
devices. The following steps guide you through the orange borders at the top and bottom. These boxes
process of navigating this book and getting the most contain information about current, relative ethical
out of it. issues and present multiple sides of the issue.
a. Locate and read a How To box in Chapter 1 (or Answer the question(s) at the bottom of the Ethics &
Issues box.
other chapter of your choice). How To boxes e. Locate and read a Mini Feature in Chapter 1 (or
appear in shaded boxes with orange borders at other chapter of your choice). Mini Features are
the top and bottom. These boxes teach you one page in length and present interesting concepts
how to perform real-world tasks that are related that are related to the surrounding chapter text.
to the surrounding chapter content. Answer Answer the question(s) at the bottom of the Mini
the question(s) at the bottom of the How Feature.
To box. f. Locate and read a BTW element (BTW stands for
b. Locate and read a Consider This box in “by the way”). BTW elements provide extra tidbits
Chapter 1 (or other chapter of your choice). of information related to the chapter text and also
Consider This boxes are identified by a green may reference additional online content.
border at the top and bottom. These boxes contain g. Locate and read an Internet Research element.
common questions and answers that are related These elements provide suggested search keywords
to the surrounding chapter content and often to help you use a search engine to locate current
promote critical thinking. information about the surrounding chapter text.
c. Locate and read a Secure IT box in Chapter 1 (or
other chapter of your choice). Secure IT boxes

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Tips and Pointers  Intro Chapter  I-13

How To: Your Turn STUDENT ASSIGNMENTS

h. Locate and read the Technology @ Work box 3. Do you feel the free resources will be useful to
in Chapter 1 (or other chapter of your choice). you and further enhance your understanding of
Technology @ Work boxes are identified by computers and other technology? Why or why not?
purple borders at the top and bottom and provide
information about how technology is used in 3 Sign Up for a Microsoft Account
various industries. Answer the question(s) at the A Microsoft account provides access to resources to
bottom of the Technology @ Work box. several Microsoft services. These services include
access to resources, such as a free email account,
Exercises cloud storage, a location to store information about
your contacts, and an online calendar. You will need a
1. What type of box or element described above is your Microsoft account to complete some of the exercises
favorite? Why? Which one is your least favorite? Why? in this book. The following steps guide you through
the process of signing up for a Microsoft account.
2. Describe ways that each type of box and element in a. Run a browser and navigate to www.outlook.com.
the chapter can help enhance your understanding of b. Tap or click the link and then follow the on-screen
the chapter contents. instructions to sign up for a free Microsoft account.
c. Browse the resources available to you in your
3. Review the topics of the boxes in Chapter 1 (or other Microsoft account.
chapter of your choice). Which one is of most interest d. If assigned by your instructor, compose and send a
to you? Why? new email message from your Microsoft account to
your instructor stating that you have signed up for
2 Access This Book’s Free Resources a Microsoft account successfully.
e. Add your instructor’s contact information. Next,
This book’s free resources contain a wealth of add contact information for at least three more
information that extends beyond what you learn by people.
reading this book. The free resources also contain f. Add your birthday to the calendar.
additional information about current technology g. Edit your Microsoft account profile to add more
developments and content required for those students contact and work information.
majoring in the information technology or computer
science fields. Exercises

You can access the free resources at the web address 1. If necessary, navigate to and view your new outlook
of www.cengagebrain.com. Once the book’s free .com email account. What are some ways to prevent
resources are displayed, select Chapter 1 to view junk email messages using the mail settings? What is
the resources associated with that chapter. View the junk email?
resources available with another chapter and notice
the similarities between the types of content offered in 2. What is OneDrive? How much space do you have
Chapter 1 and the other chapter you chose. available on OneDrive to post files?

Exercises 3. How can you see yourself using the various features in
your newly created Microsoft account?
1. What exact steps did you take to access the free
resources?

2. List and describe the different types of content
present in the Chapter 1 free resources.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

I-14 Intro Chapter Succeeding in This Course

STUDENT ASSIGNMENTS Internet Research The Internet Research exercises broaden your understanding of chapter concepts by
requiring that you search for information on the web.

Instructions: Use a search engine or another search tool to locate the information requested or answers to questions presented in the exercises.
Describe your findings, along with the search term(s) you used and your web source(s), in the format requested by your instructor (brief report,
presentation, discussion, blog post, video, or other means).

1 Social Media Research This: Select any e-book to display on your
You likely have heard and seen the phrases, “Like us on computer or mobile device. Type a significant word from
Facebook” and “Follow us on Twitter.” Facebook and the title as your search text. Use the e-book reader’s search
Twitter are two websites that advertisers, organizations, feature to answer these questions: (1) Where on the
celebrities, and many groups use to promote and share screen, and in what format, does the e-book reader display
their products, causes, events, and interests. Millions of peo- search results? (2) What information do search results in-
ple have accounts on Facebook, Twitter, and many other clude to help you find the result you are seeking? (3) How
websites known collectively as online social networks. You do you navigate from one occurrence of the search term
will learn about social media throughout this book and, in to the next? (3) How does the e-book display your search
Chapter 1, will learn how to create Facebook and Twitter text within the book so that you can locate it easily?
accounts. You then will view information on these websites
and realize that social media can engage and connect the If you are reading the Discovering Computers e-book,
online social network community members effectively. display it on your computer or mobile device. Enter
Research This: If you are signed in to your Facebook appropriate search text into the search box for the
account, sign out. Run a browser and then navigate to ­Discovering Computers e-book reader to search for answers
www.facebook.com. What information is required to to each of these questions: (1) How many times does the
sign up for an account? Why does Facebook require a word, Twitter, appear in Chapter 1? (2) Complete the
birthdate? Locate and then tap or click the About link. sentence in Chapter 1 that begins, “Most e-book reader
How many ‘likes’ does Facebook have? What is the models have…” (3) What sentence contains the first
content of the first post on this page? How many people ­occurrence of the word, laptop, in Chapter 1?
‘liked’ this first post, and how many people replied to it?
If you are signed in to your Twitter account, sign If you read both the Discovering Computers e-book
out. Navigate to www.twitter.com. Describe the con- and another e-book, compare the experience using
tents of the cover photos. Tap or click the About link both e-book readers. Which features are common to
at the bottom of the page and read the information. both? What differences did you notice?
What is the content of the three most recent Tweets?
3 Security
2 Search Skills The buyer’s guide in this introductory chapter provides
Searching in an E-Book information you can use to purchase a laptop, tablet, or
One advantage that e-books have over printed books is desktop. No matter which operating system you choose
that you can search the text to locate specific content eas- and how you configure the computer or device, you need
ily. To search within an e-book, locate its search box, often to protect your investment from security risks. You will
identified by a ‘Search inside this book’ (or similar) label. learn about these unwelcome intrusions, called malware,
Type the word or phrase for which to search, and tap or in Chapter 1 and throughout this book, but it is important
click a search button. The search button usually contains to obtain malware protection when, or soon after, you
the word Search or the word Go, or displays a magnify- purchase the computer or mobile device. You also should
ing glass icon. The reader will highlight or provide a list install the latest updates.
of occurrences where the search text appears within the Research This: Visit a physical electronics store or
e-book. You often can jump directly to the page where the view online retailers’ websites to learn about software
word or phrase appears or tap or click buttons labeled Next that helps prevent malware from infecting computers.
or Previous (or displaying forward- and backward-pointing Read the packaging or the product details or talk to
arrow icons) to navigate through the occurrences. Within employees to determine the names of three programs
the text, the key words appear highlighted. recommended or rated highly. What protections against
A search box also may include options for narrowing Internet threats are offered? For example, do they safe-
down search results, such as limiting search results to a par- guard your photos, music, and financial data, include up-
ticular chapter. When you type a page number in a search dates and backup tasks, and offer parental controls? What
box, some e-book readers will navigate to the location in is the cost, if any, of these programs and the updates? Do
the e-book corresponding to that page in the printed book. computer or mobile device manufacturers include this
software with the original purchase? Which operating
system is required? How much memory is required?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Introducing Today’s Technologies: 1
Computers, Devices, and the Web

Technology
provides access to
the digital world
around you.

“I use computers, mobile devices, and the web to do homework, look up
information, check email, play games, post updates, talk to friends, upload photos,
sync music, and so much more! I feel comfortable using technology. What more do I
need to know?”

While you may be familiar with some of the content in this chapter, do you know
how to . . .

• Use a touch screen?
• Configure social media privacy settings to prevent others from posting unauthorized

photos of you?
• Ease eyestrain while working on a computer or mobile device?
• Protect your hearing when using earbuds or headphones?
• Back up computers and mobile devices?
• Perform a web search?
• Sync computers and mobile devices?
• Protect your computer from viruses and other malware?
• Shop safely online?
• Create a strong password?
• ‘Like’ the Discovering Computers page on Facebook and ‘follow’ it on Twitter?
• Connect to a wireless network?

In this chapter, you will discover how to perform these tasks along with much more information essential to this course.
For additional content available that accompanies this chapter, visit the free resources and premium content. Refer to
the Preface and the Intro chapter for information about how to access these and other additional instructor-assigned
support materials.

© iStockPhoto / scanrail; © iStockphoto / Stephen Krow; Source: Apple, Inc.; © iStockphoto /
Moncherie; © iStockPhoto / MileA; Courtesy of Epson America, Inc.; © Dmitry Rukhlenko / Photos.com

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).

Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

2 Chapter 1  Introducing Today’s Technologies

© iStockPhoto / scanrail Objectives

After completing this chapter, you will be able to:

1 Differentiate among laptops, tablets, desktops, and servers
2 Describe the purpose and uses of smartphones, digital cameras, portable and digital media players,

e-book readers, wearable devices, and game devices
3 Describe the relationship between data and information
4 Briefly explain various input options (keyboards, pointing devices, voice and video input, and scanners),

output options (printers, displays, and speakers), and storage options (hard disks, solid-state drives, USB
flash drives, memory cards, optical discs, and cloud storage)
5 Differentiate the web from the Internet, and describe the relationship among the web, webpages,
websites, and web servers
6 Explain the purpose of a browser, a search engine, and an online social network
7 Briefly describe digital security risks associated with viruses and other malware, privacy, your health,
and the environment
8 Differentiate between an operating system and applications
9 Differentiate between wired and wireless network technologies, and identify reasons individuals
and businesses use networks
10 Discuss how society uses technology in education, government, finance, retail, entertainment, health
care, science, travel, publishing, and manufacturing
11 Identify technology used by home users, small/home office users, mobile users, power users,
and enterprise users

Today’s Technology

In the course of a day, you may . . . complete a homework assignment and watch a streaming
video using your laptop, flip through news headlines and make dinner reservations using your
tablet, search for directions and the local weather forecast while listening to music on your
smartphone, edit a video on a desktop computer, and share photos online from your digital
­camera with family and friends. These and many other technologies are an integral part of
everyday life: at school, at home, and at work (Figure 1-1).

Technology can enable you to more efficiently and effectively access and search for
­information; share personal ideas, photos, and videos with friends, family, and others;
communicate with and meet other people; manage finances; shop for goods and services;
play games or access other sources of entertainment; keep your life and activities organized;
and complete business activities. People who can accomplish these types of tasks using
technology often are said to be tech savvy.

Because technology changes, you must keep up with the changes to remain digitally literate.
Digital literacy involves having a current knowledge and understanding of computers, mobile
devices, the web, and related technologies. This book presents the knowledge you need to be
digitally literate today.

As you read this first chapter, keep in mind it is an overview. Most of the terms and concepts
introduced in this chapter will be discussed in more depth later in the book.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Computers, Devices, and the Web  Chapter 1 3

photo email messaging wireless
shopping connection

games Internet
wireless
maps
connection
video chat calendar
weather
camera Internet
email
photo
social
media
video

music

wireless
connection

messaging shopping social media

Figure 1-1  People use a variety of computers, mobile devices, and apps everyday.

© iStockPhoto / bo1982; © iStockPhoto / michaeljung; © iStockPhoto / vgajic; © Fotolia / vadymvdrobot; © iStockPhoto / PeopleImages

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

4 Chapter 1  Introducing Today’s Technologies

Computers

A computer is an electronic device, operating under the control of instructions stored in its

own memory, that can accept data (input), process the data according to specified rules, produce

information (output), and store the information for future use. Computers contain many electric,

electronic, and mechanical components known as hardware.

Electronic components in computers process data using instructions, which are the steps that

tell the computer how to perform a particular task. A collection of related instructions organized

for a common purpose is referred to as software or a program. Using software, you can complete

a variety of activities, such as search for information, type a paper, balance a budget, create a

­presentation, or play a game.

BTW One popular category of computer is the personal computer. A personal computer (PC) is a

Free Resources computer that can perform all of its input, processing, output, and storage activities by itself
For information about
how to access this and is intended to be used by one person at a time. Most personal computers today also can
book’s free resources
(which are indicated by c­ ommunicate with other computers and devices.
the Discover More text
or icons beside titles) Types of personal computers include laptops, tablets, and desktops, with the first two
and other additional
instructor-assigned s­ ometimes called mobile computers. A mobile computer is a portable personal computer,
support material, refer to
the Intro chapter and the designed so that a user can carry it from place to place. A user is anyone who interacts with a
Preface.
computer or mobile device, or utilizes the information it generates.

Discover More: Visit this chapter’s free

resources to learn more about electronic

­components and circuitry of a computer.

Laptops screen

A laptop, also called a notebook computer,

is a thin, lightweight mobile computer with keyboard
a screen in its lid and a keyboard in its base

(Figure 1-2). Designed to fit on your lap and

for easy transport, most laptops weigh up to

7 pounds (varying by manufacturer and speci- hinges
fications). A laptop that is less than one inch

thick and weighs about three pounds or less Figure 1-2  A typical laptop has a keyboard in the
sometimes is referred to as an ultrathin laptop. base and a screen in the lid, with the lid attaching to
Most laptops can operate on batteries or a the base with hinges.
power supply or both.
© iStockphoto / Stephen Krow

Tablets

Usually smaller than a laptop but larger
than a phone, a tablet is a thin, lighter-weight
mobile computer that has a touch screen (read
How To 1-1 for ways to interact with a touch
screen). A popular style of tablet is the slate,
which does not contain a physical keyboard
(Figure 1-3). Like laptops, tablets run on bat-
teries or a power supply or both; however,
batteries in a tablet typically last longer than
those in laptops.

Figure 1-3  A slate tablet.

© iStockphoto / franckreporter

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Computers, Devices, and the Web  Chapter 1 5

How To 1-1

Interact with a Touch Screen
You usually can interact with a touch screen using gestures. A gesture is a motion you make on a touch screen with the tip of one
or more fingers or your hand. Touch screens are convenient because they do not require a separate device for input. Tablets and
­smartphones typically have touch screens.

The table below presents common ways to interact with a touch screen.

Touch Screen Gestures

Motion Description Common Uses
Tap Quickly touch and release one finger one time
Activate a link (built-in connection)
Press a button
Run a program or app

Double-tap Quickly touch and release one finger two times Run a program or app
Zoom in (show a smaller area on the screen, so that
contents appear larger) at the location of the double-tap

Press and hold Press and hold one finger to cause an action to Display a shortcut menu (immediate access to allowable
Drag, or slide occur, or until an action occurs actions)
Activate a mode enabling you to move an item with one
finger to a new location

Press and hold one finger on an object and then Move an item around the screen
move the finger to the new location
Scroll

Swipe Press and hold one finger and then move the Scroll
Stretch finger horizontally or vertically on the screen Display a bar that contains commands on an edge of
Pinch Move two fingers apart the screen

Zoom in (show a smaller area on the screen, so that
contents appear larger)

Move two fingers together Zoom out (show a larger area on the screen, so that
contents appear smaller)

  Consider This: In addition to the motions listed in the table, what other motions do you think a touch screen should support?

© Cengage Learning

Consider This Internet Research
What is a virtual keyboard?
If a slate tablet has no keyboard, how do you type on it?
You can use your fingers to press keys on a keyboard that appears on the screen, called an on-screen keyboard, or Search for: virtual keyboard
you can purchase a separate physical keyboard that attaches to or wirelessly communicates with the tablet. You

a lso may be able to speak into the tablet, and your spoken words will translate to typed text.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

6 Chapter 1  Introducing Today’s Technologies

BTW Desktops and All-in-Ones

Desktop A desktop, or desktop computer, is a personal computer designed to be in a stationary
The term, desktop, also ­location, where all of its components fit on or under a desk or table. On many desktops, the
sometimes is used to screen is housed in a display device (or simply display) that is separate from a tower, which
refer to an on-screen is a case that contains the processing circuitry (Figure 1-4a). Another type of desktop called
work area on laptops, an all-in-one does not contain a tower and instead uses the same case to house the display
tablets, and desktops. and the processing circuitry (Figure 1-4b). Some desktops and all-in-ones have displays that
­support touch.

display tower

(b) all-in-one

(a)

Figure 1-4  Some desktops have a separate tower; all-in-ones do not.

© iStockphoto / Oleksiy Mark; Source: Microsoft; © iStockphoto / hocus-focus; Apple, Inc.

Consider This

Which type of computer — laptop, tablet, or desktop — is best?
It depends on your needs. Because laptops can be as powerful as the average desktop, more people today choose
laptops over desktops so that they have the added benefit of portability. Tablets are ideal for those not needing
the power of a laptop or for searching for information, communicating with others, and taking notes in lectures, at
meetings, conferences, and other forums where a laptop is not practical. Desktops and all-in-ones often have larger
displays than laptops or tablets, which make them well suited for developing software, editing large documents, or
creating images and videos.

BTW Servers
Online
When a computer or A server is a computer dedicated to providing one or more services
device connects to a to other computers or devices on a network. A network is a collection
network, it is said to be of computers and devices connected together, often wirelessly. Services
online. provided by servers include storing content and controlling access to
hardware, software, and other resources on a network.
Figure 1-5  A server
provides services to A server can support from two to several thousand connected
other computers or computers and devices at the same time. Servers are available in a
devices on a network. variety of sizes and types for both small and large business applica-
tions (Figure 1-5). Smaller applications, such as at home, sometimes
© iStockPhoto / GuidoVrola use a high-end desktop as a server. Larger corporate, government,
and web applications use powerful, expensive servers to support
their daily operations.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Computers, Devices, and the Web  Chapter 1 7

Mobile and Game Devices

A mobile device is a computing device small enough to hold in your hand. Because of their
reduced size, the screens on mobile devices are small — often between 3 and 5 inches.

Some mobile devices are Internet capable, meaning that they can connect to the Internet
wirelessly. You often can exchange information between the Internet and a mobile device or
between a computer or network and a mobile device. Popular types of mobile devices are smart-
phones, digital cameras, portable and digital media players, e-book readers, and wearable devices.

Consider This
Are mobile devices computers?
The mobile devices discussed in this section can be categorized as computers because they operate under the
control of instructions stored in their own memory, can accept data, process the data according to specified rules,

produce or display information, and store the information for future use.  

Smartphones Internet Research
What are some app stores?
A smartphone is an Internet-capable phone that usually also includes a calendar, an address
book, a calculator, a notepad, games, and several other apps (which are programs on the smart- Search for: popular app
phone). Other apps are available through an app store that typically is associated with the phone. stores

Smartphones typically communicate wirelessly with other devices or computers. With most
smartphone models, you also can listen to music, take photos, and record videos.

Many smartphones have touch screens. Instead of or in addition to a touch screen, some
smartphones have a keyboard that slides in and out from behind the phone (Figure 1-6). Others
have built-in mini keyboards or keypads that contain both numbers and letters. Some are called
a phablet because they combine the features of a smartphone with a tablet.

slide out Figure 1-6 
keyboard Smartphones may have
a touch screen and/or a
touch screen slide out keyboard.

Instead of calling someone’s phone to talk, you can send messages to others by pressing © iStockphoto / Moncherie;
images on an on-screen keyboard on the phone, keys on the phone’s mini keyboard, or buttons © iStockPhoto / scanrail
on the phone’s keypad. Four popular types of messages that you can send with smartphones
include voice messages, text messages, picture messages, and video messages. BTW
• A voice mail message is a short audio recording sent to or from a smartphone or other mobile Messaging Services
Mobile service providers
device. may charge additional
• A text message is a short note, typically fewer than 300 characters, sent to or from fees for sending text,
picture, or video
a smartphone or other mobile device. messages, depending on
• A picture message is a photo or other image, sometimes along with sound and text, sent the messaging plan.

to or from a smartphone or other mobile device.
• A video message is a short video clip, usually about 30 seconds, sent to or from a smartphone

or other mobile device.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

8 Chapter 1  Introducing Today’s Technologies

Read Ethics & Issues 1-1 to consider whether it should be legal to use a hands-free device,
such as a smartphone, while driving.

Ethics & Issues 1-1 Association) conducted a study to measure while driving. Lawmakers are attempting to
the mental effect of using hands-free regulate “distracted driving” caused by using
Should It Be Legal to Use a Hands-Free devices while driving. The conclusions hands-free devices. One issue that remains
Device while Driving? indicated that drivers using hands-free unclear is whether law enforcement has a
Your new vehicle includes a sophisticated devices are distracted, miss visual clues, and right to look at a user’s devices to determine
hands-free system that enables you to connect have slower reaction times. The report also whether they were used illegally.
a mobile device to the vehicle’s sound system. stated that 3000 fatalities occur each year
In addition to making phone calls without due to the use of hands-free devices. Consider This: Do you think the govern-
holding your device, you also can use this ment should be able to establish rules
technology to read and respond to email mes- Critics say that using a hands-free device about hands-free device usage while
sages or to update your Facebook status using gives people a false sense of security. Others driving? Why or why not? Do you believe
speech-to-text, which converts your spoken claim that drivers can be just as easily you are distracted if you use hands-free
words to text. Is this technology safe to use? distracted if they are discussing business or devices while driving? Why or why not?
emotional matters with passengers in the Do you think auto manufacturers should
The debate about hands-free device vehicle. Some states have outlawed any continue to put hands-free device technol-
safety elicits different points of view from use of mobile phones while driving; others ogy in vehicles? Why or why not?
vehicle insurance companies, consumer require drivers to use hands-free devices
safety groups, and the telecommunications
industry. AAA (American Automobile

Digital Cameras

A digital camera is a device that allows you to take photos and store the photographed

images digitally (Figure 1-7). A smart digital camera also can communicate wirelessly with other

devices and include apps similar to those on

a smartphone. Many mobile computers and

devices, such as tablets and smartphones,

include at least one integrated digital camera.

Digital cameras typically allow you to review,

and sometimes modify, images while they are

in the camera. You also can transfer images

from a digital camera to a computer or device,

so that you can review, modify, share, organize,

Figure 1-7  With a digital camera, you can view photographed images or print the images. Digital cameras often can

immediately through a small screen on the camera to see if the photo is worth connect to or communicate wirelessly with a
keeping. computer, a Smart TV (discussed later in the
chapter), a printer, or the Internet, enabling
Source: Samsung

Internet Research you to access the photos on the camera without using a cable. Some also can record videos. Many
digital cameras also have built-in GPS (discussed later in this chapter), giving them the capability
What is a digital SLR to record the exact location where a photo was taken and store these details with the photo.
camera?

Search for: digital slr camera Portable and Digital Media Players

A portable media player is a mobile device on which you can store, organize, and play or
view digital media (Figure 1-8). Digital media includes music, photos, and videos. Thus, portable
media players enable you to listen to music, view photos, and watch videos, movies, and televi-
sion shows. With most, you transfer the digital media from a computer or the web, if the device
is Internet capable, to the portable media player. Some enable you to play the media while it
streams, that is, while it transfers to the player.

Portable media players usually require a set of earbuds, which are small speakers that rest
inside each ear canal. Some portable media player models have a touch screen, while others have
a pad that you operate with a thumb or finger, so that you can navigate through digital media,

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Computers, Devices, and the Web  Chapter 1 9

adjust volume, and customize settings. Some portable media players also offer a calendar, address Internet Research
book, games, and other apps (discussed later in this chapter).
What are popular digital
Portable media players are a mobile type of digital media player. A digital media player or media players?
streaming media player is a device, typically used in a home, that streams digital media from a
computer or network to a television, projector, or some other entertainment device. Search for: digital media
players

portable media player

earbuds digital media player

Figure 1-8  Portable media players, such as the iPod shown here, typically include a set of
earbuds. Digital media players stream media to a home entertainment device.

© iStockphoto / Sebastien Cote; © iStockPhoto / marvinh

E-Book Readers Figure 1-9  An e-book
reader.
An e-book reader (short for electronic book reader), or e-reader, is a mobile device
that is used primarily for reading e-books (Figure 1-9). An e-book, or digital book, is an © iStockPhoto
electronic version of a printed book, readable on computers and other digital devices. In
addition to books, you typically can purchase and read other forms of digital media such
as newspapers and ­magazines.

Most e-book reader models have a touch screen, and some are Internet capable. These
devices usually are smaller than tablets but larger than smartphones.

Wearable Devices

A wearable device or wearable is a small, mobile computing consumer device
designed to be worn (Figure 1-10). These devices often communicate with a mobile
device or ­computer.

Wearable devices include activity trackers, smartwatches, and smartglasses.
Activity trackers monitor heart rate, measure pulse, count steps, and track sleep
patterns. In addition to keeping time, a smartwatch can communicate with a smart-
phone to make and answer phone calls, read and send messages, access the web,
play music, work with apps, such as fitness trackers and GPS, and more. With smartglasses, a
user looks into an eyeglass-type device to view information or take photos and videos that are
p­ rojected to a miniature screen in the user’s field of vision.

activity tracker smartwatch Figure 1-10  Activity
trackers, smartwatches,
smartglasses and smartglasses
are popular types of
wearable devices.

© iStockPhoto / MileA;
© iStockPhoto / scanrail;
© iStockPhoto / ferrantraite

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.


Click to View FlipBook Version