The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by psskvpjb, 2021-03-30 02:40:49

RU2 - Vermaat,_Sebok,_Freund,_Campbell

RU2 - Vermaat,_Sebok,_Freund,_Campbell

422 Chapter 9  Operating Systems

BTW Many software makers provide free downloadable updates, ­sometimes called a service pack, to
users who have registered and/or activated their software. With operating systems, the automatic
Bugs update feature can be configured to alert users when an update is available or to download and
An error in a program install the update automatically. Users without an Internet connection usually can order the
sometimes is called a updates on an optical disc for a minimal shipping fee. Read Secure IT 9-1 for issues related to
bug. automatic updates.

Secure IT 9-1 preparing their income tax returns were computers. Customers were furious about the
unable to print forms when a leading issues, especially because the company made
Automatic Updates — Safe or Not? software company issued an automatic the changes without informing the computer
update one week before the filing deadline. owners. One consequence of the ensuing
Software updates often improve security and In another situation, an automatic update outrage was that many people turned off the
reliability, and they also may add signifi- was installed on all computers — even those automatic update feature, fearing that future
cant features that optimize the computer’s with this feature disabled. The company updates might cause even more ­damage.
performance. In most cases, you have the claimed that the update was harmless
choice either to allow the software to update and was for the benefit of its customers.   Consider This: Is the automatic update
automatically or to assess and then decide Only later did some users realize that this feature enabled or disabled on your c­ omputer?
whether to install each update individu- secret update caused serious problems. One Why? Should software companies be able
ally. Software manufacturers often recom- problem, ironically, was that updates no to send automatic updates to your computer
mend you download and install all available longer could be installed on the affected without your knowledge? Why or why not?
updates when they become available.

The automatic update option occasionally
has caused problems. In one case, people

Providing File, Disk, and System Management Tools

Operating systems often provide users with a variety of tools related to managing a computer,
its devices, or its ­programs. These file, disk, and system management tools were discussed
in Chapter 4 and are summarized in Table 9-1. Read Secure IT 9-2 to learn more about an
operating system’s built-in security tools.

Table 9-1  File, Disk, and System Management Tools

Tool Function

File Manager Performs functions related to displaying files; organizing files in folders; and copying, renaming, deleting,
moving, and sorting files
Search Attempts to locate files on your computer or mobile device based on specified criteria
Image Viewer Displays, copies, and prints the contents of graphics files
Uninstaller Removes a program or app, as well as any associated entries in the system files
Disk Cleanup Searches for and removes unnecessary files
Disk Defragmenter Reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data
more quickly and programs and apps run faster
Screen Saver Causes a display’s screen to show a moving image or blank screen if no keyboard or mouse activity occurs for
a specified time
File Compression Shrinks the size of a file(s)
PC Maintenance Identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability
of improving a computer’s performance
Backup and Restore Copies selected files or the contents of an entire storage medium to another storage location

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 423

Secure IT 9-2 when specific updates were installed. If an spyware and malware detection software
­update caused a problem to occur, a user is ­mandatory to fend off attacks on the
Using and Evaluating an Operating can uninstall these new files. computer or device.
System’s Built-In Security Tools
• Antivirus software: Many ­operating The operating system generally is
Security software must run constantly to systems include antivirus programs that are scheduled to scan and update when the
protect against new viruses and malware updated regularly. Some users mistakenly computer is idle, such as in the middle of the
and spyware attacks. Operating systems can think they should install and run another night. Overall, the security tools should run
include the following security tools: antivirus program simultaneously for more constantly and quietly in the background to
protection. They should not run more ensure a safe computing experience.
• Firewall: Security experts recommend than one antivirus program on a com-
­using a firewall and configuring it to turn puter because multiple programs might   Consider This: Does your operating
on or off automatically. conflict with one another and slow overall system have a firewall and protection against
p­ erformance. spyware and malware? Do updates occur
• Automatic updating: Security updates automatically or manually? Which operating
are issued at least once daily, and other • Spyware and malware detection systems are more susceptible to malware
updates are generated on an as-needed ­software: Sophisticated malware and attacks? Why?
basis. Many people enjoy the conven­ spyware threats are emerging at an
ience offered by allowing these fixes to unparalleled rate, so comprehensive
install automatically instead of continu-
ally checking for new files to download.
Users can view the update history to see

Controlling a Network BTW

Some operating systems are designed to work with a server on a network. These multiuser Guest Account
operating systems allow multiple users to share a printer, Internet access, files, and programs. If you want to provide
someone temporary
Some operating systems have network features built into them. In other cases, the ­operating access to your computer,
system for the network is a set of programs that are separate from the operating system on you can create a secure
the client computers or mobile devices that access the network. When not connected to the guest account that
­network, the client computers use their own operating system. When connected to the network, provides access to basic
the operating system on the network may assume some of the operating system functions on the functions.
c­ lient computers or mobile devices.

The network administrator, the person overseeing network operations, uses the server ­operating
system to add and remove users, computers, and other devices to and from the network. The
network administrator also uses the operating system on the network to configure the network,
install software, and administer network security.

Administering Security Figure 9-13  Most multiuser operating systems allow each user to sign
in, which is the process of entering a user name and a password into the
Network administrators, as well as owners of computer. Single-user operating systems often use a password to lock an
­computers, typically have an administrator account that entire device or computer.
enables them to access all files and programs, install
programs, and specify settings that affect all users on a Source: Microsoft
computer, mobile device, or network. Settings include
creating user accounts and establishing permissions.
These permissions define who can access certain
resources and when they can access those resources.

For each user, the network administrator or
­computer owner establishes a user account. A user
account enables a user to sign in to, or access
resources on, a network or computer (Figure 9-13).
Each user account typically consists of a user name
and password. Recall that a user name, or user ID, is a
unique combination of characters, such as letters of the
alphabet and/or numbers, that identifies a specific user.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

424 Chapter 9  Operating Systems

BTW A password is a private combination of characters associated with the user name that allows
access to certain computer, mobile device, or network resources. Some operating systems allow
Passwords the network administrator to assign passwords to files and commands, restricting access to only
While users type authorized users. Mobile device owners often assign a password to the entire device, restrict-
a password, most ing all access until the correct password is entered. Read Secure IT 1-3 in Chapter 1 for tips on
computers and mobile ­creating strong passwords.
devices hide the actual
password characters by To prevent unauthorized users from accessing computer resources, keep your password
displaying some other c­ onfidential. After entering a user name and/or password, the operating system compares the
characters, such as user’s entry with the authorized user name(s) and password(s). If the entry matches the user
asterisks (*) or dots. name and/or password stored in a file, the operating system grants the user access. If the entry
does not match, the operating system denies access to the user.

The operating system on a network records successful and unsuccessful sign-in attempts in a
file. This allows the network administrator to review who is using or attempting to use the com-
puter. The administrators also use these files to monitor computer usage. Read Ethics & Issues 9-2
to consider who is responsible for operating system security flaws.

Ethics & Issues 9-2 Hackers look for ways to break into a more time looking for potential s­ecurity
computer or mobile device using flaws in flaws, it has less time to spend enhancing
Should Operating System the operating system. An operating system the software. In addition, some of the same
Manufacturers Be Liable for is complex software that includes millions features that enhance an operating system,
Breaches Due to Security Flaws? of lines of code. Developers write code as such as web integration, increase the
If you purchase a household device with a securely as possible, but with the volume software’s vulnerability.
warranty, you can hold the ­manufacturer of code, mistakes are bound to occur. Users
responsible for replacing and fixing it. Some sometimes are unaware of their own role Consider This: Has your computer or
argue that the same product l­iability laws that in infecting their own computer or mobile mobile device become infected with
protect consumers in other industries should device. Perhaps a hacker took advantage of a malware due to a flaw in the operating
apply to software. Users’ devices and data are user with an unsecured Wi-Fi connection, or system? How did you know? What respon-
vulnerable when security flaws exist in operat- the user did not install or enable the latest sibility does a software manufacturer have
ing systems for computers and mobile devices. updates to the operating system. for preventing and fixing operating system
A flaw in an operating system can affect the flaws? Should users expect their software
performance of the computer or mobile device Some argue that making software to be perfect? Why or why not?
and subject data to corruption or unauthorized manufacturers ­responsible for flaws will
use. A user may not even be aware when a inhibit innovation. If a company spends
computer or mobile device is corrupted.

Consider This
What are some alternatives to passwords?
Many computers and mobile devices offer alternatives to setting and entering a password in order to gain access.
Alternatives to passwords include specifying passcodes containing only numeric characters, swiping or touching

areas of the screen in a specified order or pattern, or fingerprint or facial recognition.

Consider This
Do operating systems encrypt data and files?
To protect sensitive data and information further as it travels over a network, the operating system may encrypt
it. Recall that encryption is the process of encoding data and information into an unreadable form. Administrators
can specify that data be encrypted as it travels over a network to prevent unauthorized users from reading the
data. When an authorized user attempts to read the data, it is automatically decrypted, or converted back into a

readable form.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 425

Types of Operating Systems

Many of the first operating systems were device dependent and proprietary. A device-­dependent
program is one that runs only on a specific type or make of computer or mobile device. Proprietary
software is privately owned and limited to a specific vendor or computer or device model.
Some operating systems still are device dependent. The trend today, however, is toward device-­
independent operating systems that run on computers and mobile devices provided by a variety of
manufacturers. The advantage of device-independent operating systems is you can retain existing
applications and data files even if you change computer or mobile device models or vendors.

When you purchase a new computer or mobile device, it typically has an operating system
preinstalled. As new versions of the operating system are released, users often upgrade their
existing computers and mobile devices to incorporate features of the new versions. Some
upgrades are free; some offer an upgrade price that is less than the cost of purchasing the entire
operating system. Read Ethics & Issues 9-3 to consider when you should upgrade.

Discover More: Visit this chapter’s free resources to learn more about device-independent
­operating systems.

Ethics & Issues 9-3 curiosity, or for a desire to Tweet, blog, or are available is prudent. Others are concerned
post on social media his or her experiences. with compatibility issues between syncing the
Should You Be an Early Adopter Manufacturers and developers rely on early new technology with the user’s current devices,
of a New Technology? adopters to provide valuable feedback and data, or apps. Another factor in waiting is
Consumers’ reactions to the release of a new insight into the user experience, as well as that the price of the new technology often
device, program or app, or operating system to help generate excitement. In some cases, drops within a few months of its release.
fall into two camps: those who cannot wait, early adopters receive additional customer Early adopters may have paid more for a less
and those who exercise caution. Early adopters assistance in exchange for feedback. As satisfying experience than those who wait.
is the term given to users who sleep in line on one manufacturer said, the more people
the street outside a store in order to be one who initially use the product, the better the Consider This: Have you ever been an
of the first to own a new device, or those who resulting product will be. early adopter of a new technology? What
stay up until midnight to start the download of was your experience? Will you be an early
a program or app the moment it is released. Critics of early adoption cite security risks adopter in the future? Why or why not?
and usability issues that may be uncovered. Should manufacturers give benefits to early
Some early adopters of new technology Many feel that waiting until the initial reviews, adopters? Why or why not?
do so for the same reasons one might and subsequent patches or updated releases,
purchase a new item of clothing — to
make a statement. Others do so out of

New versions of an operating system ­usually Table 9-2  Examples of
are backward compatible, which means they Operating Systems
r­ ecognize and work with applications written by Category
for an earlier version of the operating system
(or platform). The application, by contrast, Category Name
may or may not be upward compatible, meaning
it may or may not run on new versions of the Desktop Windows
operating system. Server OS X
Mobile UNIX
The three basic categories of operating Linux
systems on computers and mobile devices are Chrome OS
desktop, server, and mobile. Table 9-2 lists
e­ xamples in each of these categories, which Windows Server
are discussed on the ­following pages. Mac OS X Server
UNIX
Linux

Google Android
Apple iOS
Windows Phone

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

426 Chapter 9  Operating Systems

Desktop Operating Systems

Internet Research A desktop operating system, sometimes called a stand-alone operating ­system, is a complete
operating system that works on desktops, laptops, and some tablets. Desktop operating systems
What is the most widely sometimes are called client ­operating systems because they also work in conjunction with a server
used desktop operating operating system. Client operating systems can operate with or without a network.
system?
Examples of the more widely used desktop operating systems are Windows, Mac OS, UNIX,
Search for: desktop os Linux, and Chrome OS.
market share

BTW Windows/Mini Feature 9-1

Networking In the mid-1980s, Microsoft developed its first version of Windows, which provided a
Some desktop operating g­ raphical user interface. Since then, Microsoft continually has updated its Windows operat-
systems include ing system, incorporating innovative features and functions with each subsequent version. In
networking capabilities, a­ ddition to basic capabilities, the latest versions of Windows offer these features:
allowing the home and
small business user to set • Uses tiles to access apps
up a small network. • Includes the desktop interface
• Support for input via touch, mouse, and keyboard
• Email app, calendar app, and browser (Internet Explorer) included
• Photos, files, and settings can sync with OneDrive, Microsoft’s cloud server
• Enhanced security through an antivirus program, firewall, and automatic updates
• Windows Store offers additional applications for purchase

Discover More: Visit this chapter’s free resources to learn more about the Windows Store.
Read Mini Feature 9-1 to learn more about the interface of the Windows operating system.

BTW Mini Feature 9-1 The Windows interface includes tiles and icons, as
shown in the figure below. You tap or click tiles to run
PC Windows User Interface apps, and double-tap or double-click icons to run apps.
The term, PC, sometimes
is used to describe a The following screens show the components of the When you run an app in Windows, it may appear in an
computer that runs a Windows interface. The Windows ­operating s­ystem sim- on-screen work area app, called the desktop, shown in the
Windows operating plifies the process of working with ­documents and apps second figure in this mini feature. Many Office and Windows
system. by organizing the manner in which you interact with programs, such as Paint, contain common elements.
the computer.

tiles are shortcuts to
apps or other content

Source: Microsoft

icons are shortcuts to
apps or other content

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 427

Recycle Bin is the Quick Access Toolbar Minimize button Maximize button
location for files that provides access reduces window enlarges window to
have been deleted to frequently used to a button on fill screen
commands the taskbar
Close button exits
program

ribbon consists title bar displays Help button opens
of tabs, groups, program and Help window
and commands file name
that provide
access to tasks status bar presents information scroll bar displays
about document, progress of different portions of
pinned apps certain tasks, status of certain document
commands and keys, and
controls for viewing document

Start button provides taskbar displays pinned app Source: Microsoft
menu of tiles and buttons that always are on
icons to run programs taskbar and app buttons for
and apps apps that are running

notification area shows date,
time, and includes buttons to
access options for sound, touch
keyboard, and more

Discover More: Visit this chapter’s free resources features of the Windows interface make it easy to run
to learn about the current Windows version. apps and open documents? Why? How does the ribbon
help make learning a new program easier?
  Consider This: Have you used Windows? If so,
which version? What was your experience? What

Mac OS/Mini Feature 9-2

Since it was released in 1984 with Macintosh computers, Apple’s Macintosh operating system
(Mac OS) has earned a reputation for its ease of use and has been the model for most of the
new GUIs developed for non-Macintosh systems. The latest version, OS X, is a multitasking
o­ perating system available for computers manufactured by Apple. Features of the latest version
of OS X include the following:

• Mail, calendars, contacts, and other items sync with iCloud, Apple’s cloud server
• Communicate and play games with users of mobile devices running Apple’s mobile operating

system (iOS)
• Built-in Facebook and Twitter support allows you to post a status, comments, or files from any app
• Browser (Safari)
• Open multiple desktops at once
• Dictated words convert to text
• Support for Braille displays
• Mac App Store provides access to additional apps and software updates

Discover More: Visit this chapter’s free resources to learn more about the Mac App Store.
Read Mini Feature 9-2 to learn more about the interface of the Mac operating system.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

428 Chapter 9  Operating Systems

Mini Feature 9-2 The OS X user interface begins with the
desktop. Many OS X programs and apps contain
Mac OS User Interface common elements, as shown in the desktop figure
below.
The following screens show the components of the OS X
user interface. Mac OS is installed on Apple c­omputers, You can use the Launchpad to view, organize, and
such as iMacs, MacBook Pros, MacBook Airs, Mac Pros, run apps, as shown in the second figure below.
and Mac minis. The user interface contains components
such as the Dock, icons, and windows.

Apple menu contains menu names click to display
commands that appear on notifications
always are available menu bar

Close button closes Zoom button window title
the window alternates folders can contain
window size files and/or
additional folders
desktop displays Minimize button
items such as minimizes
windows, folders, current window
and icons

OS X desktop

Dock contains icons used to run Source: Apple Inc.
applications, display minimized
windows, and access documents

enter search text
to search for
installed apps

Launchpad appears
when you press the
f4 key

application
icons appear
in Launchpad

first of two pages Source: Apple Inc.
appears

Dock still appears
in Launchpad

Discover More: Visit this chapter’s free resources   Consider This: How is the user interface in
to learn more about the latest version of Mac OS. OS X similar to the Windows user interface? How is
it different?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 429

Unix

UNIX (pronounced YOU-nix) is a multitasking operating system developed in the early BTW
1970s by scientists at Bell Laboratories. Bell Labs (a subsidiary of AT&T) was prohibited from
actively promoting UNIX in the commercial marketplace because of federal regulations. Bell OS X
Labs instead licensed UNIX for a low fee to numerous colleges and universities, where UNIX OS X is a UNIX-based
obtained a wide following. UNIX was implemented on many different types of computers. In operating system.
the 1980s, the source code for UNIX was licensed to many hardware and software companies to
customize for their devices and applications. As a result, several versions of this operating system
exist, each with slightly different features or capabilities.

Today, a version of UNIX is available for most computers of all sizes. Although some versions
of UNIX have a command-line interface, most versions of UNIX offer a graphical user interface
(Figure 9-14). Power users often work with UNIX because of its flexibility and capabilities. An
industry standards organization, The Open Group, now owns UNIX as a trademark.

Figure 9-14  One version of the UNIX operating system. BTW
Technology Innovator
Courtesy of Hewlett-Packard Company Discover More: Visit this
chapter’s free resources
Linux to learn about Linus
Torvalds, the creator of
Linux (pronounced LINN-uks), introduced in 1991, is a popular, multitasking UNIX-based Linux.
operating system that runs on a variety of personal computers, servers, and devices. In addition
to the basic operating system, Linux also includes many free tools and programming languages. BTW
Technology Trend
Linux is not proprietary software like the operating systems discussed thus far. Instead, Linux Discover More: Visit this
is open source software, which means its code is provided for use, modification, and redistribution. chapter’s free resources
Many programmers have donated time to modify and redistribute Linux to make it the most to learn more about
popular UNIX-based operating system. innovations of Linux
powering the Internet
Consider This of Things.

Why use open source software?
Open source software has no restrictions from the copyright holder regarding modification of the software’s internal
instructions and redistribution of the software. Promoters of open source software state two main advantages: users
who modify the software share their improvements with others, and customers can personalize the software to

meet their needs. Read Secure IT 9-3 to consider security issues associated with open and closed source programs.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

430 Chapter 9  Operating Systems

Secure IT 9-3 organizations can distribute and sell their dishonest and anonymous developers can use
versions of Linux, which enables those open source software to create programs that
Open Source or Closed Source — Which without the expertise to modify open source may be or may include malware, cryptography
Is More Secure? software and to benefit from the creative experts emphasize that Linux systems have
Supporters of open source software maintain efforts of the Linux community. fewer reported security exposures than
that this operating system enables develop- Windows-based systems. In general, Linux
ers to create high-quality programs. Source Developers of closed source operating systems do not run antivirus software, but
code, along with any changes, remains pub- systems, on the other hand, refuse to share they do use detection programs that check for
lic, so communities of open source program- some or all of the code. They believe that signs of attacks and probes.
mers can examine, correct, and enhance companies and developers should be able
programs. They also can make changes to control, and profit from, the operating   Consider This: Are the security concerns
immediately when security issues arise. systems they create. Their philosophy may about open source software legitimate? Why
hinder third-party software developers or why not? Why is antivirus software not
Many proponents of open source software who create programs and apps for the needed on Linux-based systems? Does the
use Linux, which is known for its speed and operating system. open source model lead to higher-quality
stability. Of the 500 fastest supercomputers, software? Why or why not?
more than 90 percent use variants of Linux. Fear of viruses and other security concerns
Many of these computers perform high- can lead some to question about whether
performance tasks, including detecting and open source software is worthwhile. While
preventing fraud. Companies and nonprofit

Figure 9-15  A GUI distribution of Linux. Linux is available in a variety of forms, known as
distributions. Some distributions of Linux are com-
Courtesy of KDE mand line. Others are GUI (Figure 9-15). Some
companies market software that runs on their own
distribution of Linux. Many application programs,
tools, and plug-ins have Linux ­distributions.

Users obtain versions of Linux in a variety of ways.
Some download it free from a provider’s website and
create media to install it on a computer, or they cre-
ate a Live CD or Live USB from which to preview it.
Others purchase optical discs from vendors who may
bundle their own software with the operating system
or download it from their websites. Some retailers
will preinstall Linux on a new computer on request.

Discover More: Visit this chapter’s free resources
to learn more about Linux distributions and Live
CDs/Live USBs.

BTW Chrome Os

Technology Innovator Chrome OS, introduced by Google, is a Linux-based operating system designed to work
Discover More: Visit this p­ rimarily with web apps (Figure 9-16). Apps are available through the Chrome Web Store,
chapter’s free resources and data is stored on Google Drive. The only apps typically installed on the computer are the
to learn about Red Hat, Chrome browser, a media player, and a file manager. A specialized laptop that runs Chrome OS
a distributor of Linux. is called a Chromebook, and a specialized desktop that runs Chrome OS is called a Chromebox.
Chromebooks and Chromeboxes typically use SSDs for internal storage. Users also can run
Chrome OS as a virtual machine (which is discussed in the next section).

Because computers running Chrome OS work mostly with web apps, they do not require
as much internal storage capacity as other desktop operating systems discussed in this section.
Their start-up and shutdown time also is considerably less than other desktop operating systems
because Chrome OS uses a streamlined start-up procedure.

Discover More: Visit this chapter’s free resources to learn more about Chromebooks and
Chromeboxes.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 431

Figure 9-16  Chrome OS is a Linux-based operating system by Google.

Courtesy of Volha Kryvets; Source: Google Inc.

Running Multiple Desktop Operating Systems

If you want to run multiple operating systems on the same computer, you could partition the
hard drive or you could create a virtual machine. Partitioning divides a hard drive in separate
logical storage areas (partitions) that appear as distinct drives. When you partition a drive, you
can install a separate operating system in each partition, sometimes called a dual boot. Because
partitioning requires advanced skills, users often opt to create a virtual machine instead. A virtual
machine (VM) is an environment on a computer in which you can install and run an operating
system and programs. VMs enable you to install a second operating system on a computer. Read
How To 9-3 for instructions about creating a virtual machine. Another option for Mac users
who want to run Windows programs is a program called Boot Camp. Read How To 9-4 for
instructions about installing the Windows operating system on a Mac computer.

How to 9-3 2. Run the app and select the option to After you set up the virtual machine, you
c­ reate a new virtual machine. can use the virtual machine any time by
Set Up and Use a Virtual Machine performing the following steps:
A virtual machine enables a computer to run 3. Specify the settings for the new virtual
another operating system in addition to the machine. 1. Run the virtual machine software.
one installed. Various reasons exist for using a 2. Select the virtual machine you want to run.
virtual machine. For example, if you are running 4. If necessary, insert the installation media 3. Tap or click the button to run the virtual
the latest version of Windows on a computer for the operating system you want to run
but require an app that runs only in a previ- in the virtual machine. machine.
ous version of Windows, you might set up a 4. When you are finished using the virtual
virtual machine running the previous version of 5. Run the virtual machine. Follow the steps
Windows so that you can run the desired app. to install the operating system in the machine, shut down the operating system
The computer still will have the latest version of ­virtual machine. similar to how you would shut down your
Windows installed, but you easily will be able to computer.
switch to the previous version when necessary. 6. When the operating system has finished 5. Exit the virtual machine software.
installing, remove the installation media.
To set up a virtual machine, you will need   Consider This: What are some other
the required software, as well as installation 7. While the virtual machine is running, if reasons that might require you to set up and
media for the operating system you want to desired, install any apps you want to run. use a virtual machine on a computer?
install in the virtual machine. The following
steps describe how to set up a virtual machine: 8. When you are finished using the v­ irtual
machine, shut down the operating
1. Obtain and install an app that creates and ­system in the same manner you would
runs virtual machines. shut down your computer.

9. Exit the virtual machine software.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

432 Chapter 9  Operating Systems

How to 9-4 3. Click the search result for the Boot Camp b.  Complete the steps described in the
Assistant application. Windows installation process.
Use Boot Camp to Install the Windows
Operating System on a Mac 4. When the Boot Camp Assistant runs, 6.  When the installation is complete and
If you are using an Apple computer, such read the introduction and then click the Windows starts, if necessary, enter your
as an iMac or MacBook Pro, you may Continue button. user name and password to sign in to
encounter instances where you need to Windows.
run apps in the Windows operating system. 5. Next, you create a partition, which is a
Newer versions of Mac OS enable you to section of storage or memory reserved If you want to switch between Mac OS
install Windows on a computer using a for a specific program or application. and Windows, press and hold the option
program called Boot Camp. The following Partitions enable a single drive to be key on the keyboard while turning on or
steps describe how to use Boot Camp to treated as multiple drives. Follow the restarting the computer. When the list of
install the Windows operating system on remaining steps to create a Windows operating systems is displayed, select the
a Mac: p­ artition and install Windows: operating system you want to run.

1. Obtain the installation media for the a.  Specify the amount of disk space to use   Consider This: What apps might
v­ ersion of Windows you want to install. for the Windows partition. The partition s­omeone want to run in Windows that are
should be large enough to store all unavailable in Mac OS? How does Boot
2. Use the operating system’s search f­eature operating system files, apps you want Camp differ from a virtual machine?
to locate the Boot Camp Assistant to run in Windows, and any files you
a­ pplication. (Hint: Use the search text, want to store using Windows.
boot camp.)

Now You Should Know
Be sure you understand the material presented in the last four sections in Operating System Functions and the
s­ections titled Types of Operating Systems and Desktop Operating Systems, as it relates to the chapter objectives.
Now you should know …

• How to update your operating system and tools (Objective 5)
• How you can use an operating system to control a network or administer security (Objective 6)
• Which desktop operating system is best suited to your needs (Objective 7)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

Server Operating Systems

BTW A server operating system is a multiuser operating system that organizes and coordinates how
multiple users access and share resources on a network. Client computers on a network rely on
Multipurpose OS server(s) for access to resources.
Operating systems, such
as UNIX and Linux, that Many of the desktop operating systems discussed in the previous section function as clients
function as both desktop and work in conjunction with a server operating system. Although desktop operating systems
and server operating may include networking capability, server operating systems are designed specifically to sup-
systems sometimes are port all sizes of networks, including medium- to large-sized businesses and web servers. Server
called multipurpose operating systems can handle high numbers of transactions, support large-scale messaging and
operating systems. ­communications, and have enhanced security and backup capabilities.

BTW Many also support virtualization. Recall that virtualization is the practice of sharing or ­pooling
computing resources, such as servers or storage devices. Through virtualization, for example,
High-Tech Talk server operating systems can separate a physical server into several virtual servers. Each virtual
Discover More: Visit this server then can perform independent, separate functions.
chapter’s free resources
to learn more about Examples of server operating systems include the following:
virtualization.
• Windows Server: Developed by Microsoft, Windows Server enables organizations to manage
applications and websites on-site and/or on the cloud.

• OS X Server: Developed by Apple, OS X Server enables organizations to collaborate, share
files, host websites and mail servers, and more on Mac computers and iOS devices.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 433

• UNIX: Capable of handling a high volume of transactions in a multiuser environment and Internet Research
working with multiple processors, UNIX often is used on web servers.
What is the most widely
• Linux: Because it provides a secure, stable multiuser environment, Linux often is used on web used server operating
servers and on supercomputers. system?

Discover More: Visit this chapter’s free resources to learn more about the latest versions of Search for: server os market
Windows Server and OS X Server. share

Mobile Operating Systems BTW

The operating system on mobile devices and many consumer electronics is called a mobile Technology Innovators
operating system and resides on firmware. Mobile operating systems typically include or Discover More: Visit this
­support the following: calendar and contact management, text messaging, email, touch screens, chapter’s free resources
accelerometer (so that you can rotate the display), digital cameras, media players, speech recog- to learn about the
nition, GPS navigation, a variety of third-party apps, a browser, and wireless connectivity, such as products and services of
cellular, Wi-Fi, and Bluetooth. Read Ethics & Issues 9-4 to consider the privacy of text m­ essages. Sun and IBM.

Ethics & Issues 9-4 employees may believe they have the rights of can purchase their own mobile devices for
privacy and self-expression when they use a personal use. Critics state that employees have
Should Text Messages Sent by company-issued mobile device for personal use. a reasonable expectation of privacy. Supporters
Employees Be Private? The issue is complicated further when companies of the decision argue that employers own
When an employer asks a worker to disclose employ BYOD (bring your own device) policies. the devices because they provide the devices
work-related text messages, is the employee When an employee uses a personal device for and pay for the service for the employee. They
legally required to reveal all messages, even per- business-related communications, it is unclear claim, therefore, that employers have a right to
sonal ones? Is the employer liable for d­ amages who owns the communications, and who takes view the content of all text messages.
caused by inappropriate messages sent by an responsibility for any misuse. Read Secure IT 9-4
employee? for security issues associated with BYOD. Consider This: Should text messages sent
by employees be private? Why or why not?
Many companies provide employees with The U.S. Supreme Court ruled that an How can employers impose policies ­regarding
mobile devices, such as smartphones, for work employer can read workers’ text messages on text messages sent on company-issued
communications. Employers typically create company-owned devices if the employer has mobile devices? Should employers be able to
acceptable use policies. These policies address reason to believe the text messages violate access work-related c­ ommunications on an
ownership of electronic communications, workplace rules. The Court held that employees employee-owned device? Why or why not?
including email messages, voice mail messages,
and text messages. Regardless of the policy,

Secure IT 9-4 Companies need to educate employees • Requiring that nonemployees, such as
on mobile device management (MDM). One ­family members who use the device, will
BYOD Security Issues point they need employees to know is that not access work data
phishing scams abound in email messages,
Effective BYOD (bring your own device) ­policies text messages, Facebook posts, and Tweets. • Following procedures when an employee
can lead to many benefits for businesses, but Other security measures to emphasize are the resigns or is terminated
they also give rise to many issues that affect need to use strong passwords, to not reveal
information security and data protection. these passwords to other employees, and to • Alerting management immediately when
When employees bring their smartphones, avoid apps that collect information about the device is lost or stolen
tablets, and laptops into the workplaces, the the user, especially those that monitor the
companies surrender much control over this employee’s location and shopping habits.   Consider This: Do you or people you
hardware compared to devices they own. know work at a business that allow employees
BYOD policies should be developed that to bring their own devices to work? If so, do
One of the biggest problems is that address technical, legal, and human resources these businesses have a BYOD policy? If so,
employees can carry their devices everywhere issues. The language in these policies should how were the policy’s terms communicated?
outside of work. If these devices are lost or cover these topics: For example, were they explained verbally and
stolen, the company’s sensitive information can available in written form?
land in the hands of criminals. Many of these • Ensuring that work data will not be merged
allegedly lost devices are sold on online auctions with the employee’s personal data
and other services websites, even if the original
owners have wiped their devices remotely.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

434 Chapter 9  Operating Systems

Internet Research Popular mobile operating systems include Android, iOS, and Windows Phone. The following
What is the most widely used sections discuss each of these operating systems.
mobile operating system?
Consider This
Search for: mobile os Do other mobile operating systems exist?
market share Yes. Several other mobile operating systems exist, although they are not as widely used as Android, iOS, and
Windows Phone. For example, the Blackberry operating system is a proprietary mobile operating system that runs
BTW on Blackberry smartphones and Blackberry tablets. Firefox OS is a Linux-based open source operating system that
runs on smartphones and tablets developed by Mozilla. Fire OS is a Linux-based operating system for Amazon
Android Releases
Google names its Android K indle tablets and Amazon Fire Phones. Several phones also run a version of Linux.
releases alphabetically
after sweet treats, Android tablet Android
such as Gingerbread,
Honeycomb, Ice Cream Android is an open source, Linux-based mobile operating system
Sandwich, Jelly Bean, designed by Google for smartphones and tablets (Figure 9-17). A vari-
Key Lime Pie, KitKat, and ety of manufacturers produce devices that run the Android operating
Lollipop. system, adding their own interface elements and bundled software. As
a result, an Android smartphone manufactured by Samsung may have
Android phone different user interface features from one manufactured by Google.

Features unique to recent versions of the Android operating system
include the following:

•  G oogle Play app store provides access to apps, songs, books, and
movies.

•  Google Drive provides access to email, contacts, calendar, photos,
files, and more.

•  Face recognition or fingerprint scanner can unlock the device.
•  S hare contacts and other information by touching two devices

together (using NFC technology).
•  Speech output assists users with vision impairments.
•  Voice recognition capability enables users to speak instructions.
•  Built-in heart rate monitor works with phone apps.

Figure 9-17  An Android phone and tablet. Discover More: Visit this chapter’s free resources to learn more about
the Android operating system.
© iStockPhoto / deepblue4you; Courtesy of Sony Corporation
ios
iOS tablet
iOS (originally called iPhone OS), developed by Apple, is a ­proprietary mobile
iOS phone operating ­system specifically made for Apple’s mobile devices (Figure 9-18).
Supported devices include the iPhone, iPod Touch, and iPad. Features unique to
recent versions of the iOS operating system include the following:

•  S iri, a voice recognition app, enables you to speak instructions or
questions to which it takes actions or responds with speech output.

•  A pple Pay provides a centralized, secure location for credit and debit
cards, coupons, boarding passes, loyalty cards, and mobile payment
accounts.

•  iCloud enables you to sync mail, calendars, contacts, and other items.
•  i Tunes Store provides access to music, books, podcasts, ringtones, and

movies.
•  Integrates with iPod to play music, video, and other media.
•  I mproves connectivity with other devices running the Mac operating system.
•  Mac App Store provides access to additional apps and software updates.

Figure 9-18  An iOS phone and tablet. Discover More: Visit this chapter’s free resources to learn more about the
iOS operating system.
© iStockPhoto / cotesebastien

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 435

Windows Phone Figure 9-19  A Windows Phone.

Windows Phone, developed by Microsoft, is a proprietary Courtesy of Microsoft
mobile ­operating system that runs on some smartphones
(Figure 9-19). Features unique to recent versions of the
Windows Phone operating system include the following:

• Sync photos, files, and settings with OneDrive.
• Use your phone as a remote control for your television.
• Access a global catalog of music, videos, or podcasts, or listen

to iTunes music.
• Geofencing enables your phone to send or receive

notification when you enter or exit a geographic location.
(Read Ethics & Issues 8-2 in Chapter 8 for other uses of
geofencing.)
• Windows Phone Store provides access to additional apps and
software updates.
• Wallet app provides a centralized location for coupons, credit
cards, loyalty cards, and memberships in a single, easily
accessible location.

Discover More: Visit this chapter’s free resources to learn
more about the Windows Phone operating system.

Mini Feature 9-3: Mobile versus Desktop Operating Systems

While mobile and desktop operating systems share many ­similarities, they also have

­differences designed for their operating environment. Read Mini Feature 9-3 for a ­comparison

of mobile and desktop operating systems.

Mini Feature 9-3 Historically, the two types of operating systems BTW
have had different uses and capabilities. The
Mobile versus Desktop differences are due in part to the disparity in screen Technology Trend
Operating Systems size, keyboards, and processing power. Because of Discover More: Visit this
convergence, as well as the increased reliance on chapter’s free resources
An operating system has the same role, whether for mobile devices for communications and productivity, to learn more about
a desktop or mobile device. It manages operations the use and function of mobile and desktop operating mobile versus desktop
and provides a user interface. Because of this shared systems are becoming more similar. The prevalence operating system usage.
role, many similarities exist between the functions of of web apps and cloud storage services enables
desktop and mobile operating systems. From a user’s users to access the same programs and files they
perspective, operating systems enable you to work with work with on their desktop from a mobile device.
apps and to monitor and maintain the functions of the Some developers now create operating systems that
computer or device. Typical functions included in mobile share code and have common features, regardless of
operating systems include the following: whether they are installed on a computer or mobile
• Main areas, such as a desktop or home screen, device. Features, such as tiles and icons (typically used
in mobile devices), make the transition between using
e­ nable you to access and organize apps a mobile device and computer easier. For example,
mobile device operating systems include capabilities
• Methods to return to the main area quickly that allow users to take advantage of the touch
screen displays. As more computer desktop monitors
• The ability to organize the app icons or tiles in the today are touch enabled, computer users can take
main areas easily by moving them to pages or folders advantage of this feature.
or by adding them to menus
Many differences exist in the way a user interacts
• System tools, such as to manage battery power and with a mobile operating system.
Internet connections

• Options for security settings

Whether you are purchasing a computer or mobile
device, the choice of an operating system plays an
important role.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

436 Chapter 9  Operating Systems Source: Google Inc. •  A desktop operating system may use menus,
Source: Google Inc. ­windows, and bars to run apps and to access
Source: SAMSUNG features within apps. On a desktop, you can
Source: SAMSUNG run multiple programs simultaneously and
seamlessly due to the large screen and the use
of pointing devices. This feature makes desktops
more relevant than mobile operating systems to
productivity and multitasking.

•  A mobile operating system typically has one
program running at a time, although others
may be running in the ­background. Quick
movements and ­gestures are often all that
you need to perform tasks on a mobile device.
­Mobile operating systems use technologies
such as cellular, Bluetooth, Wi-Fi, GPS, and
NFC to communicate with other devices and
to connect to the Internet. Mobile devices also
typically include cameras, video cameras, voice
recorders, and sometimes speech recognition.

Discover More: Visit this chapter’s free
resources to learn more about mobile and
desktop operating systems.

  Consider This: What similarities have you
noticed between mobile and desktop operating
systems? What differences have you noticed
between mobile and desktop operating systems?
What features work better with a mobile versus
a desktop operating system? Why? Is the
convergence trend beneficial or should each
device type take advantage of its strengths? Why?

Consider This
Do embedded computers use mobile operating systems?
Typically, an embedded computer uses an embedded operating system, sometimes called a real-time operating
system (RTOS). Examples of products that use embedded operating systems include digital cameras, ATMs,
digital photo frames, HDTV receivers, fuel pumps, ticket machines, process controllers, robotics, and automobile
components. Embedded operating systems often perform a single task, usually without requiring input from a user.

S everal embedded operating systems are available, each intended for various uses.

Now You Should Know
Be sure you understand the material presented in the sections titled Server Operating Systems and Mobile
Operating Systems, as it relates to the chapter objectives.
Now you should know …

• When you might use a server operating system (Objective 8)
• Which mobile operating system you would prefer to use (Objective 9)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 437

Chapter Summary

This chapter discussed the functions common to most operating systems: starting and shutting
down computers and mobile devices, providing a user interface, managing programs, manag-
ing memory, coordinating tasks, configuring devices, monitoring performance, establishing an
Internet connection, updating operating system software, providing file, system, and disk man-
agement tools, controlling a network, and administering security. It also presented a variety of
desktop operating systems, server operating systems, and mobile operating systems.

Discover More: Visit this chapter’s free resources for additional content that accompanies
this chapter and also includes these features: Technology Innovators: Linus Torvalds, Red Hat,
Sun, and IBM; Technology Trends: Linux Powering the Internet of Things and Mobile versus
Desktop Operating System Usage; and High-Tech Talks: Benchmarking and Virtualization.

Test your knowledge of chapter material by accessing the Study Guide, Flash Cards, and
Practice Test apps that run on your smartphone, tablet, laptop, or desktop.

Technology @ Work

Meteorology broadcast automatically to weather radios News and weather stations have weather
With the television tuned to the local weather and apps only in areas that may be affected. apps and also post their weather forecasts
station, you anxiously are awaiting to see online. In fact, several websites have
the projected path of a hurricane in the In addition to computers helping us stay interactive radars that allow visitors to zoom
tropics. Having experienced hurricanes in safe during severe storms, they also assist in and view how weather is affecting their
the past, you rely heavily on the accuracy of with day-to-day weather forecasting. Several immediate neighborhood.
weather forecasts so that you can prepare years ago, meteorologists could predict
adequately if a storm travels through the the weather for only a few days into the The meteorology field has made
area. Technology allows meteorologists to future. Beyond that point, the forecast was significant advancements because of
better estimate the severity and path of very uncertain. Meteorologists presently computer technologies. Weather forecasts
storms, enabling people to make potentially are able to predict the weather, including are more accurate, which not only helps us
life-saving preparations. temperature and chance of precipitation, prepare on land, but also helps to protect
one week or more into the future with those traveling by air or by sea.
The National Hurricane Center uses much greater accuracy because computers
powerful computers to generate multiple create models using historical weather data   Consider This: In what other ways do
computer models to determine a storm’s and behavior to predict the future path of computers and technology play a role in the
path. These models consider factors such as various weather systems. meteorology field?
the storm’s current strength, the effects of
nearby weather systems, the storm’s central National Oceanographic and Atmospheric Administration
pressure, and whether the storm may travel
over land. These models also may consider
previous storms that traveled a similar path.
While these models are not 100 percent
accurate, they do ensure that everyone who
may be affected by the storm has enough
time to prepare.

Violent, rotating thunderstorms potentially
can spawn tornadoes, which sometimes
cause catastrophic damage. For this reason,
it is important for everyone to watch
or listen closely to the weather during
the storm. Meteorologists can monitor
weather systems on multiple radars and
send additional severe weather warnings
automatically to weather radios and apps.
Technology enables these messages to be

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

438 Chapter 9  Operating Systems

STUDENT ASSIGNMENTS Study Guide The Study Guide exercise reinforces material you should know for the chapter exam.

Discover More: Visit this chapter’s premium content to test your knowledge of digital content associated with
this chapter and access the Study Guide resource from your smartphone, tablet, laptop, or desktop.

Instructions: Answer the questions below using the format that helps you remember best or that is required by your instructor. Possible formats
may include one or more of these options: write the answers; create a document that contains the answers; record answers as audio or video using
a webcam, smartphone, or portable media player; post answers on a blog, wiki, or website; or highlight answers in the book/e-book.

1. Define the term, operating system. List the functions of an 25. Explain the use of permissions on a network.
operating system.
26. Explain issues surrounding responsibility for operating system
2. Define the term, firmware. Name another term for an security flaws.
operating system.
27. List alternatives to using passwords.
3. List methods to start a computer or device.
28. Explain how an operating system uses encryption.
4. Identify the five steps in the start-up process.
29. Differentiate between device-dependent and
5. The _____ is the core of an operating system. Differentiate device-independent programs.
between resident and nonresident, with respect to memory.
30. Define these terms: proprietary software, backward
6. Explain the role of a boot drive. compatible, and upward compatible.

7. List reasons why users might shut down computers or mobile 31. Explain issues surrounding being an early adopter of a new
devices regularly. Differentiate between sleep mode and technology.
hibernate mode.
32. List two other names for a desktop operating system.
8. Define the term, user interface. Distinguish between GUI,
natural-user, and command-line interfaces. 33. Identify features of Windows. Define the term, desktop, with
respect to Windows and Mac OS.
9. Define the terms, foreground and background, in a
multitasking operating system. 34. The term, _____, sometimes is used to describe a computer
that runs a Windows operating system.
10. List steps for removing a program or app.
35. Identify features of OS. You can use the _____ to view,
11. Describe how a computer manages memory. Define the term, organize, and run apps.
virtual memory.
36. Describe uses and features of the UNIX operating system.
12. The technique of swapping items between memory and
storage is called _____. 37. Define the term, open source software. _____ is an example
of an open source operating system.
13. Explain what occurs during thrashing, and list steps to prevent it.
38. Explain the issues surrounding open source versus closed
14. List actions you should take if a mobile device displays a source operating systems.
message that it is running low on memory.
39. Identify features of Chrome OS.
15. Explain how a computer coordinates tasks. Define these
terms: buffer, spooling, and queue. 40. Identify reasons to use a virtual machine. List steps for setting
up a virtual machine.
16. Describe the role of a driver. Explain how to find the latest
drivers for a device. 41. List steps for using Boot Camp to install the Windows
operating system on a Mac computer.
17. Describe the role of a performance monitor.
42. Describe a server operating system. List examples of server
18. Explain how an operating system establishes an Internet connection. operating systems.

19. Explain the issues surrounding an operating system’s inclusion 43. Identify common features of mobile operating systems.
of additional software.
44. Explain issues surrounding ownership of text messages sent
20. Identify changes that may be made to an operating system using company-issued devices.
during an automatic update. List security concerns regarding
automatic updates. 45. Explain security concerns regarding BYOD policies.

21. List file and disk management tools, and describe the function 46. Differentiate among the features of the Android, iOS, and
of each. Windows Phone mobile operating systems.

22. List and describe security tools used by operating systems. 47. List differences and similarities between how a user interacts
with mobile versus desktop operating systems.
23. Describe the role of a network administrator.
48. Describe how embedded computers use operating systems.
24. Explain the capabilities of administrator and user accounts on
a network. 49. Explain how the meteorology industry uses technology.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 439

You should be able to define the Primary Terms and be familiar with the Secondary Terms listed below. Key Terms STUDENT ASSIGNMENTS

Discover More: Visit this chapter’s premium content to view definitions for each term and to access the Flash
Cards resource from your smartphone, tablet, laptop, or desktop.

Primary Terms  (shown in bold-black characters in the chapter)

Android (434) iOS (434) OS X (427) UNIX (429)
automatic Linux (429) password (424) user interface
mobile operating performance
update (421) (UI) (414)
boot drive (413) system (433) monitor (420) user name (423)
Chrome OS (430) natural user interface queue (418) virtual memory (417)
desktop operating server operating Windows Phone (435)
(NUI) (414)
system (426) operating system system (432) spooling (418)
driver (419) sign in (423) stand-alone operating system (426)
(OS) (410) status bar (427)
swap file (418)
Secondary Terms  (shown in italic characters in the chapter) taskbar (427)
The Open Group (429)
administrator account (423) Google Drive (434) permissions (423) thrashing (418)
background (415) Google Play (434) platform (412) tiles (426)
backup and restore (422) graphical user interface Plug and Play (419) touch user interface (414)
backward compatible (425) print spooler (418) uninstaller (422)
Blackberry operating system (434) (GUI) (414) proprietary software (425) upward compatible (425)
bloatware (421) hibernate mode (413) real-time operating system (RTOS) virtual machine (VM) (431)
Boot Camp (432) iCloud (427) virtualization (432)
boot disk (413) icons (426) (436) Wallet (435)
booting (413) image viewer (422) recovery media (413) warm boot (413)
buffer (418) Internet Explorer (426) Recycle Bin (427) Windows Phone Store (435)
bug (422) iTunes Store (434) ribbon (427)
Chromebook (430) kernel (412) Safari (427) Source: Microsoft
Chromebox (430) Live CD (413) screen saver (422)
client operating systems (426) Live USB (413) scroll bars (427)
cold boot (413) Macintosh operating system search (422)
command language (415) service pack (422)
command-line interface (414) (MAC OS) (427) Siri (434)
cross-platform application (412) memory resident (413) sleep mode (413)
desktop (428) mobile device management
device driver (419) sign in (423)
device-dependent (425) (MDM) (433)
device-independent (425) multipurpose operating
disk cleanup (422)
disk defragmenter (422) systems (432)
Dock (428) multitasking (415)
encryption (424) multiuser (416)
file compression (422) network administrator
file manager (422)
Fire OS (434) (423)
Firefox OS (434) nonresident (413)
firmware (410) OneDrive (426)
foreground (415) open source software

(429)
page (418)
paging (418)
partitioning (431)
PC maintenance (422)

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

440 Chapter 9  Operating Systems

STUDENT ASSIGNMENTS Checkpoint The Checkpoint exercises test your knowledge of the chapter concepts. The page number ­containing
the answer appears in parentheses after each exercise. The Consider This exercises challenge your
­understanding of chapter concepts.

Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises interactively;
­complete the self-assessment in the Test Prep resource from your smartphone, tablet, laptop, or desktop; and
then take the Practice Test.

True/False  Mark T for True and F for False.

_____ 1. An operating system must reside inside a computer or mobile device; that is, it cannot run from a USB flash
drive or other external drives. (410)

_____ 2. The kernel is nonresident, which means it remains in memory while the computer or mobile device is
running. (413)

_____ 3. A user interface controls how you enter data and instructions and how information is displayed on the
screen. (414)

_____ 4. Most users today work with a command-line interface. (414)

_____ 5. Most operating systems today are multitasking. (415)

_____ 6. The area of the hard drive used for virtual memory is called a swap file. (418)

_____ 7. Each device connected to a computer requires its own specific driver. (419)

_____ 8. Hackers often look for ways to break into a computer or device using flaws in the operating system. (424)

_____ 9. Many of the first operating systems were device dependent and proprietary. (425)

_____ 10. An upward compatible application means it can recognize and work with applications written for an earlier
version of the operating system. (425)

_____ 11. Linux is proprietary software. (429)

_____ 12. Operating systems that function as both desktop and server operating systems sometimes are called
multipurpose operating systems. (432)

Multiple Choice  Select the best answer. 5. With _____, the operating system allocates a
portion of a storage medium to function as additional
1. A _____ application is an application that runs the RAM. (417)
a. Live USB
same on multiple operating systems. (412) b. a natural user interface
c. virtual memory
a. cross-platform c. device driver d. spooling

b. stand-alone d. multitasking

2. Placing a computer in _____ mode saves any open

documents and running programs or apps to an 6. The technique of swapping items between memory

internal hard drive before power is removed from the and storage is called _____. (418)

computer or device. (413) a. thrashing c. spooling

a. sleep c. kernel b. paging d. buffering

b. hibernate d. NUI 7. In Windows, a _____ is a shortcut to apps or other

3. With a _____ interface, users interact with the content. (426)
software through ordinary, intuitive behavior. (414)
a. command-line interface a. tile c. ribbon
b. proprietary software
c. natural user interface b. Launchpad d. Recycle Bin
d. graphical user interface
8. A _____ is a multiuser operating system that organizes
4. A _____operating system allows two or more programs and coordinates how multiple users access and share
resources on a network. (432)
or apps to reside in memory at the same time. (415) a. stand-alone operating system
b. server operating system
a. foreground c. multiuser c. virtual machine
d. multipurpose operating system
b. background d. multitasking

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 441

Checkpoint STUDENT ASSIGNMENTS

Matching  Match the terms with their definitions.

_____ 1. firmware (410) a. operating system problem that occurs when it spends much of its time paging,
instead of executing application software
_____ 2. command language
(415) b. small program that tells the operating system how to communicate with a specific
device
_____ 3. thrashing (418)
c. Windows term for a shortcut to an app or other content
_____ 4. buffer (418)
d. software that is privately owned and limited to a specific vendor or computer or
_____ 5. driver (419) device model

_____ 6. bloatware (421) e. ROM chips or flash memory chips that store permanent instructions

_____ 7. proprietary software f. operating system that runs on computers and mobile devices provided by a
(425) variety of manufacturers

_____ 8. device-independent g. software whose code is provided for use, modification, and redistribution
(425)
h. additional programs and apps included with operating systems, usually for profit
_____ 9. icons (426)
i. segment of memory or storage in which items are placed while waiting to be
_____ 10. open source transferred from an input device or to an output device
software (429)
j. set of commands used to control actions performed in a command-line interface

Consider This  Answer the following questions in the format specified by your instructor.

1. Answer the critical thinking questions posed at the 15. What is meant by the term, swap file? (418)
end of these elements in this chapter: Ethics & Issues
(421, 424, 425, 433), How To (416, 419, 431, 432), 16. What remedies can you try if your computer or
Mini Features (426, 428, 435), Secure IT (422, 423, application runs sluggishly? (418)
430, 433), and Technology @ Work (437).
17. What is a buffer? (418)
2. What is the role of the operating system? (410)
18. In a multiuser operating system, are tasks processed on
3. What does firmware do? (410) a first-come, first-served basis? Why or why not? (418)

4. What is a platform? (412) 19. Why do some users object to bloatware? (421)

5. What is a cross-platform application? (412) 20. What is a service pack? (422)

6. What does the kernel do? (412) 21. How do users without an Internet connection obtain
updates? (422)
7. How do resident and nonresident memory differ? (413)
22. What built-in security tools are included in most
8. What does the word, live, signify when used to operating systems? (422)
describe a type of media (i.e., Live USB or Live
CD)? (413) 23. What duties does a network administrator
perform? (423)
9. What is the difference between a cold and warm
boot? (413) 24. What is the advantage of device-independent
operating systems? (425)
10. How does sleep mode differ from hibernate
mode? (413) 25. What are some widely used desktop operating
systems? (426)
11. Why do some users find command-line interfaces
difficult to use? (415) 26. How are tiles used in the Windows user interface? (426)

12. What is the role of virtual memory? (417) 27. What elements are contained in the OS Dock? (428)

13. In terms of speed, how does virtual memory compare 28. Why do computers running Chrome OS require less
with RAM? (417) internal storage capacity than those running other
desktop operating systems? (430)
14. What does it mean when an operating system is
thrashing? (418) 29. What are some popular mobile operating
systems? (434)

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

STUDENT ASSIGNMENTS 442 Chapter 9  Operating Systems

Problem Solving The Problem Solving exercises extend your knowledge of chapter concepts by seeking solutions
to practical problems with technology that you may encounter at home, school, or work. The
Collaboration exercise should be completed with a team.

Instructions: You often can solve problems with technology in multiple ways. Determine a solution to the problems in these exercises by using
one or more resources available to you (such as a computer or mobile device, articles on the web or in print, blogs, podcasts, videos, television, user
guides, other individuals, electronics or computer stores, etc.). Describe your solution, along with the resource(s) used, in the format requested by
your instructor (brief report, presentation, discussion, blog post, video, or other means).

Personal Professional

1. Difficulty Signing In to Operating System  You 6. Virtual Machine Error  You use virtual machines
are attempting to sign in to your operating system, but on your office computer so that you can run and test
you receive an error message stating that you have software in multiple operating system versions. When
entered an invalid password. What are your next you attempt to run one of the virtual machines, you
steps? receive an error message that the virtual machine already
is running. You are certain that the virtual machine is not
2. Missing Customization Settings  When you sign running. What steps can you take to correct the problem?
in to your operating system, your customized desktop
background does not appear. Instead, the operating 7. Missing Files and Settings  When you sign in to
system displays the default desktop background. What various computers at work with the credentials assigned
might have happened? by your IT department, you typically see all your files.
When you recently signed in to the computer in your
3. Incompatible Program  You have upgraded to the office, however, you were unable to view your files.
latest version of an operating system on your computer. What are your next steps?
After the upgrade, you realize that programs that used
to run without issue now do not run. What are your 8. Faulty Update  Your computer is set to install
next steps? updates for the operating system, programs, and apps
automatically. You have learned through your company’s
4. Insufficient Access  You are attempting to install a IT department that a recent operating system update
program on your computer and a dialog box appears causes a problem to occur with a program you use
informing you that you have regularly. What are your next steps?
insufficient privileges to install the
program. What might be wrong? 9. Mobile Device Operating System Upgrade  A
notification appears on your mobile phone stating that
Source: Google Inc. 5.  Software Update Issues  You an operating system upgrade has been downloaded and
have heard that new software is ready to install. Your company has provided the mobile
updates are available for your phone to you for work-related business, and you are
operating system, but when the hesitant to install the upgrade. What are your next steps?
operating system checks for
updates, it shows that no updates 10. Slow System Performance  Your office computer
are available. Why might this be has been running slow lately, and you are attempting to
the case? determine the cause. What steps can you take to determine
what might be slowing your computer’s performance?

Collaboration

11. Technology in Meteorology  Your environmental sciences instructor is teaching a lesson about how technology
has advanced the meteorology field. Form a team of three people to prepare a brief report about how technology and
meteorology are connected. One team member should research how meteorologists predicted weather patterns before
computer use became mainstream. Another team member should create a timeline illustrating when and how technology
was introduced to the meteorology field, and the third team member should research the technology required for a
typical news station to forecast and present the weather.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 443

The How To: Your Turn exercises present general guidelines for fundamental skills How To: Your Turn STUDENT ASSIGNMENTS
when using a computer or mobile device and then require that you determine how to
apply these general guidelines to a specific program or situation.

Discover More: Visit this chapter’s premium content to challenge yourself with additional
How To: Your Turn exercises, which include App Adventure.

Instructions: You often can complete tasks using technology in multiple ways. Figure out how to perform the tasks described in these exercises
by using one or more resources available to you (such as a computer or mobile device, articles on the web or in print, online or program help, user
guides, blogs, podcasts, videos, other individuals, trial and error, etc.). Summarize your ‘how to’ steps, along with the resource(s) used, in the format
requested by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1 Determine Your Operating System Version Exercises

Companies such as Microsoft, Apple, and Google release 1. What operating system are you running?
new versions of operating systems periodically. Software 2. W hat are some other reasons why you might need to
and drivers sometimes are designed for specific oper-
ating system versions, which means you may need to know the operating system version on your computer
determine your operating system version so that you can or mobile device?
obtain the proper software. The following steps describe 3. What might happen if you attempt to install a program or
how to determine your operating system version. app that is not designed for your operating system version?
a. If necessary, turn on your computer or mobile device
2 Search for Files on a Computer
and, if necessary, sign in to the operating system. Advances in technology enable users to store a large
Some operating systems will display the version number of files, such as documents, photos, videos,
when they run. If the operating system version is not and music, on their computers. Users store contacts,
displayed, continue following these steps. appointments, email messages, and other informa-
b. If you are using a Mac computer, click the command tion on mobile devices to retrieve at a later time. With
on the Apple menu to display information about all the information you can store on computers and
the computer to determine the operating system mobile devices, it sometimes can be difficult to locate
version. If you are running an operating system an item you need to access. Today’s operating systems
other than Mac OS, continue following these steps. contain a search tool that provides an easy way to
c. Display the control panel or settings for your locate files stored on a computer or mobile device. To
computer or mobile device. search for an item on a computer or mobile device, you
d. N avigate to and then tap or click the command to should know information about the item for which you
display system information about the computer or are searching. The following steps guide you through
device, and then locate the operating system version. the process of searching a computer or mobile device.
a. If necessary, run the search tool on your computer
or mobile device. If you are using a mobile device,
such as a smartphone or tablet, you may be able to
access the search tool by pressing a search button
on the phone or tablet.

Source: Google, Inc.
Courtesy of Volha Kryvets; Source: Google Inc.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

444 Chapter 9  Operating Systems

STUDENT ASSIGNMENTS How To: Your Turn so before completing this step. Download only an
image that is not protected by copyright.
b. If you remember all or part of the name of the file e. N avigate to the location of the image to use as the
for which you are searching, enter all or part of the desktop background and then select the image to
file name in the search box. set it as your desktop background.
f.  Navigate to the screen saver settings and then
c. Tap or click the search button to display the search select the desired screen saver. If necessary, set the
results. Depending upon the number of files and desired preferences for the screen saver.
folders on your computer or mobile device, it may g.  Navigate to the sound settings.
take several minutes for search results to appear. h.  Select the event for which you want to assign or
change the sound.
d. If no search results are displayed, consider searching i.  Select the sound you want to play. If you are not
again and entering less information in the search box. using one of the operating system’s prerecorded
sounds, navigate to the location of the sound you
e. When you locate the file for which you are want to use and then select the sound.
searching, you can open it either by tapping, j.  If necessary, save the changes and close the control
double-tapping, or double-clicking the file. The panel, settings, or system preferences.
method you should use to open the file will depend
on the operating system you are using. Exercises

Exercises 1. What image are you currently using as your desktop
background or wallpaper?
1. Have you used the search tool on your computer? If
so, what files were you attempting to locate? If not, do 2. Do you have a screen saver configured on your
you think the search tool will be helpful to you? computer or mobile device? If so, what does it look like?

2. Have you used the search tool on a mobile device? 3. What other personalization settings do you customize?
What were you attempting to locate?
4 Configure Accessibility Settings
3. In addition to searching for files, what other items Many modern operating systems allow users to
might the search tool locate? ­configure accessibility settings to make it easier for
some individuals to interact with them. Accessibility
3 Personalize Your Operating features can perform functions such as enhancing
the contrast between colors on the display device,
Environment n­ arrating text that is displayed on the screen, and
a­ llowing the user to control the pointer using keys on
When you purchase a new computer

or mobile device, the first task you

might want to complete is to per-

sonalize the operating environment

to suit your tastes. For example, you

might want to have your favorite

sports team’s logo as your desktop

background, a screen saver consist-

ing of a slide show containing photos

of your recent vacation, or specific

sounds that play when certain events

occur. The following steps guide you

through the process of personalizing

your operating environment.

a. If necessary, sign in to your

operating system. Courtesy of KDE

b. Display your operating system’s

control panel, settings, or system preferences.

c. Tap or click the option to modify the display settings

and then navigate to the specific setting to change

the desktop background (the desktop background

also may be referred to as wallpaper).

d. Tap or click the option to locate the image to use

as your desktop background. If you are planning to

download an image from the web, you should do

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 445

How To: Your Turn STUDENT ASSIGNMENTS

Source: Microsoft 5 Add Users to an Operating System
If you share your computer with others, you can add
the keyboard. The following steps guide you through more user accounts to the operating system. When
the process of configuring accessibility settings. users sign in to their accounts, they can customize
a. If necessary, sign in to the operating system. their settings and store files in locations that may not
b. Display your operating system’s control panel, be accessible to other users on the computer. The
f­ollowing steps guide you through the process of
settings, or system preferences. ­adding users to an operating system.
c. Tap or click the command to display accessibility a.  Sign in to a user account that has administrative
p­ rivileges; that is the user account should have the
settings. ­capability to perform functions such as adding users.
d. Select the accessibility setting you want to b.  Display the operating system settings.
c.  Tap or click the option to display user accounts.
configure, and specify your desired settings. d.  Tap or click the option to add a new user account.
e. Repeat the previous step for all remaining e.  Specify the options for the new user account:
• Enter a name to identify the user account.
accessibility settings you want to configure. • Specify a default password for the user account.
f. When you have finished configuring the • Select the type of user account (administrative,
standard, etc.). You should create user accounts
accessibility settings, save your changes and then with administrative access only if you want the
close the window containing the control panel, user to be able to perform tasks such as change
settings, or system preferences. computer settings; add or remove programs and
g. If you no longer require the accessibility settings, apps; and add, modify, or remove a user account.
display your operating system’s control panel, • If necessary, set parental controls for the user
settings, or system preferences, display the setting account.
you want to disable, and then disable the setting. f. Save the settings for the new user account.
g. Sign out of the existing user account.
Exercises h. Sign in to the newly created user account and make
sure everything works as intended.
1. Accessibility settings are not only for people with
impairments; these settings can make it easier for Exercises
anyone to use a computer. Can you think of any
accessibility settings that you might consider using to 1. Do you have multiple user accounts on your
make it easier to interact with the computer? computer? Why or why not?

2. Which third-party programs can provide additional 2. Do you think it is a good idea for students in a school
features for accessibility? computer lab to have administrative access to the
computers? Why or why not?
3. Do you feel that the accessibility features in your
computer or mobile device’s operating system are 3. What types of parental controls can you enable using
sufficient? Why or why not? your operating system? Do you think these controls
are relevant only to parents, or can you determine
other people who might benefit from using parental
controls? What parental controls might those other
people use, and why?

Source: Microsoft

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

446 Chapter 9  Operating Systems

STUDENT ASSIGNMENTS Internet Research The Internet Research exercises broaden your understanding of chapter concepts by
requiring that you search for information on the web.

Discover More: Visit this chapter’s premium content to challenge yourself with additional
Internet Research exercises, which include Search Sleuth, Green Computing, Ethics in Action,
You Review It, and Exploring Technology Careers.

Instructions: Use a search engine or another search tool to locate the information requested or answers to questions presented in the exercises.
Describe your findings, along with the search term(s) you used and your web source(s), in the format requested by your instructor (brief report,
presentation, discussion, blog post, video, or other means).

1 Making Use of the Web retirement accounts, and mobile banking apps?
What fees are charged for these services? Which
Banking and Finance bank has the highest money market and certificate
of deposit rates?
Managing money and making wise investments and
are among the most important skills consumers need (b) Visit two financial websites, such as Yahoo!
to master. Abundant advice is available on a variety of Finance, that feature information about managing
banking and financial websites. More than 80 percent personal credit and debt. Read two stories discuss-
of Americans who manage household finances have ing student loans, credit card debt, overspending, or
enrolled in online banking programs, and 20 percent retirement planning. According to these articles, what
have used a banking app on their smartphones or mistakes do people make managing their money?
mobile devices. Whether their financial institutions Who are the economic professionals writing or being
are a retail bank, a virtual bank, or a credit union, they quoted in the articles? What advice is given that can
enjoy the convenience of monitoring account bal- help you handle your expenses?
ances, depositing checks, transferring funds, receiving
text message alerts, and paying bills. 2 Social Media
Operating systems constantly evolve as developers
Personal finance websites provide information on add new features, fix security issues, and modify func-
portfolio management, tax preparation, real estate tions. Computer and mobile device users need to stay
­investing, mortgage rates, retirement planning, credit abreast of these changes, especially when the updates
card and student loan advice, and a host of other lifestyle affect performance and safety. Many blogs feature
and educational topics. Also available are calculators to content about operating systems. Their posts cover
help make saving, spending, and real estate d­ ecisions. industry news, photos, product reviews, previews of
Business finance websites include market data, company forthcoming software and hardware, and management
earnings, interest rates, and corporate news. changes. Most of these blogs are unofficial, meaning
that the writers are not necessarily employees of the
Research This: (a) Visit two online banking companies that develop the operating systems. The
websites: one for a financial institution that has a bloggers generally have extensive
physical presence in your community and another experience in the technology field
that is virtual. Compare the services and featured and desire to share their expertise
products. For ­example, do they offer bill payment, with others.
Research This: Search online
for a blog that tracks f­eatures or
updates to a mobile, desktop, or
other operating system that you
use or about which you would like
more information. Report the web
address of the blog, along with
a summary of the most recent
blog post.

Source: Yahoo

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Managing, Coordinating, and Monitoring Resources  Chapter 9 447

Internet Research STUDENT ASSIGNMENTS

3 Search Skills drive; and (4) audio files of Windows operating system
Video, Audio, and Voice Search ­start-up sounds.
A video search allows you to locate video files posted
or shared online. Tap or click the Videos link on a Create a document containing the web address
search engine’s home page and then type the search of each audio or video clip and the name or web
text. For example, type the search text, linux tutorial, ­address of the website on which it appears. Watch or
in the search box to find videos for learning about listen to comments on how accurately they reflect your
Linux. You can narrow your results by specifying addi- search text.
tional conditions. These may include length (in min-
utes), time taken (such as past day, week, or month), 4 Security
quality, popularity (based on number of views), and An operating system should include antivirus and
source (YouTube or other websites). s­ pyware and malware detection software to fend
To search for audio files, type the search text, off intrusions. The use of this security software is
a­ udio search, in a search engine’s search box and discussed in Secure IT 9-2 in this chapter. Major
look for a search engine that specializes in finding companies that provide this software often include
audio clips, streaming audio, and other audio files. information on their websites about recently discov-
Alternatively, visit a website for sharing audio and ered virus threats and hoaxes. They also track sched-
music files, and search that site directly. For example, uled virus payload strikes and map global and regional
type the search text, ios podcast, in an audio shar- virus attacks.
ing site’s search box to find podcasts about Apple’s Research This: Visit at least two virus protection
mobile operating system. ­websites to obtain virus information. When were the
Some search apps allow you to speak your search latest active threats discovered and updated? What
text. For example, using Google, tap or click the are their names and risk levels? When is the next virus
­microphone button in the search box or say the payload strike scheduled? What type of malware is
phrase, “ok google” to activate voice search and then spreading via mobile device use? Which virus removal
speak your question. The app will convert your speech tools and resources are available?
to text and provide the search results.
5 Cloud Services
Source: SoundCloud Cloud Development Platforms (PaaS)
Developers have many choices for the programming
Research This: Using a search app that accepts languages, operating systems, databases, and tools
voice input, either speak the search text or find an they use to create apps hosted on the cloud. Microsoft
audio sharing site in which to type search text to find Azure, Amazon Web Services, and Google App
podcasts, audio files, or videos about these topics: (1) a Engine are providers of platform as a service (PaaS),
video about how to manage security settings on your a service of cloud computing that delivers tools for
computer posted within the past month; (2) a video developing, testing, and deploying apps on the cloud.
tutorial about how to use the Mac Finder, shorter A PaaS provider manages the computing resources
than four minutes in length; (3) a video that was not required to run apps on the cloud so that developers
posted on YouTube, describing how to partition a hard can concentrate on writing the code, logic, interfaces,
and operations of the software.
Research This: (1) Read a customer case study
about Microsoft Azure, Amazon Web Services, or
Google App Engine. In what industry is the customer
­involved? What was the challenge for which the
c­ ustomer was seeking a PaaS solution? How did this
solution meet their needs? (2) Research one of these
PaaS providers. Which operating systems and devel-
opment tools does it support? How does it support
scalability when additional computing resources are
required? What pricing model is in place?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

448 Chapter 9  Operating Systems

STUDENT ASSIGNMENTS Critical Thinking The Critical Thinking exercises challenge your assessment and decision-making skills by
p­ resenting real-world situations associated with chapter concepts. The Collaboration
e­ xercise should be completed with a team.

Instructions: Evaluate the situations below, using personal experiences and one or more resources available to you (such as articles on the web or in
print, blogs, podcasts, videos, television, user guides, other individuals, electronics or computer stores, etc.). Perform the tasks requested in each exercise
and share your deliverables in the format requested by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1. Using Operating System Tools using the Internet, he first would like you to install a
program(s) designed to protect his computers from
You are the office manager at a social media consulting various security threats.

business. The office recently upgraded and replaced Do This: Use the web to find answers to the
­following questions. What types of security threats
several computers. You now are running the latest exist on the Internet that could impact his business?
What types of security measures should he use?
version of Windows on all of your computers. Your boss Evaluate two programs that provide a comprehensive
security solution. What are the programs’ functions?
asks you to explore the various tools that are included What are their costs? Do the services charge subscrip-
tion fees in order to receive automatic updates? Which
with the operating system and to evaluate any additional would you recommend? Why?

needs you might have. 3. Case Study
Amateur Sports League  You are the new manager
Do This: Use the web to learn more about the for a nonprofit amateur soccer league. The board of
directors has asked you to recommend options for
­following Windows operating system tools: firewalls, m­ obile operating systems for the new smartphones
they would like to purchase.
automatic updates, and software that scans for Do This: Select two mobile operating systems to
explore (such as Android, iOS, and Windows Phone).
viruses, spyware, and other malware. Read reviews by Use the web to find industry experts’ recommenda-
tions and user reviews for each operating system.
industry experts and users. Analyze the advantages ­Include the different device types for which each is
available. Examine differences in security, features,
and disadvantages of using built-in operating system speed, and reliability. What security concerns ­exist?
What security features enable you to protect the
tools. Do any built-in operating system tools present smartphone and its data? Which mobile operating
system offers the best features? Which is considered
security concerns? If so, faster and/or more reliable? Your office computers
run the Mac OS operating system. Do compatibility
what would you recom- issues exist with any of the mobile operating sys-
tems? If so, what are the issues? Can you find solu-
mend? E­ xplore alterna- tions that would ­enable you to sync data? Compile
your findings.
tives for each of the tools,

and determine whether

you should disable the

Windows tool and if any

Source: Microsoft risks exist. Compile your
findings.

2. Complete Security Solutions
Your neighbor started a new construction business.
He would like to hire you to set up his new computers.
His business will use the Internet to communicate
with clients via email, store backups of data, and access
cloud-based accounting software. The office will include
two networked computers, which will share a printer
and an Internet connection. In addition, he will use a
tablet so that he can access the cloud-based accounting
software using Wi-Fi. Because of security concerns with

Collaboration

4. Desktop Operating Systems  You are an analyst for a large manufacturer of laundry soaps. The company currently
uses an early version of the Windows operating system on its 5,000 desktops. This year, the company plans to upgrade
the operating system and, if necessary, its desktops. The company asks your team to compare the latest versions of the
Windows, Mac OS, and Linux operating systems.
Do This: Form a three-member team and assign each member an operating system. Each member should use the
web to develop a feature/benefit analysis and answer the following questions. What is the initial cost of the o­ perating
system per computer? What are the memory and storage requirements? Will the operating system require the com-
pany to purchase new computers? Which is best at protecting against viruses, spam, and spyware? Which support
touch input? As a team, compile your findings and share your recommendation with the class.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Communicating Digital Content: 10
Wired and Wireless Networks and Devices

A variety of
media are used
for worldwide
communications.

“I use my smartphone to make phone calls, send text messages, video chat with
family and friends, listen to voice mail messages, and navigate using a GPS app. At
home, I have a broadband Internet connection, and I access the Internet wirelessly
at local hot spots and on campus. What more could I learn about communications
and networks?”

While you may be familiar with some of the content in this chapter, do you know
how to . . .

• Add a computer or mobile device to a network?
• Determine if you should use a BAN to monitor medical data?
• Use mobile communications?
• Evaluate the risks and benefits of telemedicine?
• Use Bluetooth technology?
• Prevent Bluebugging?
• Use an NFC tag?
• Use your smartphone as a mobile hot spot?
• Strengthen a wireless signal?
• Detect an intruder accessing your wireless signal?
• Plan and design a home network?
• Add a wireless printer to a network?
• Describe how fake cell towers are intercepting calls?

In this chapter, you will discover how to perform these tasks along with much more information essential to this course.
For additional content available that accompanies this chapter, visit the free resources and premium content. Refer to
the Preface and the Intro chapter for information about how to access these and other additional instructor-assigned
support materials.

© iStockPhoto / Vertigo3d; © Ruslan Kudrin / Shutterstock.com; © Mmaxer / Shutterstock.com; © Pablo Eder /
Shutterstock.com; Courtesy of Verizon ­Wireless; Natalia Siverina / Shutterstock.com

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

450 Chapter 10  Communicating Digital Content

© iStockPhoto / Vertigo3d Objectives

After completing this chapter, you will be able to:

1 Discuss the purpose of components required for successful communications (sending device,
communications device, transmission media, and receiving device) and identify various sending and
receiving devices

2 Differentiate among LANs, MANs, WANs, and PANs
3 Differentiate between client/server and peer-to-peer networks
4 Explain the purpose of communications software
5 Describe various network communications standards and protocols: Ethernet, token ring, TCP/IP, Wi-Fi,

Bluetooth, UWB, IrDA, RFID, NFC, and LTE
6 Describe various types of communications lines: cable, DSL, ISDN, FTTP, T-carrier, and ATM
7 Describe commonly used communications devices: broadband modems, wireless modems, wireless access

points, routers, network cards, and hubs and switches
8 Discuss ways to set up and configure a home network
9 Differentiate among physical transmission media: twisted-pair cable, coaxial cable, and fiber-optic cable
10 Differentiate among wireless transmission media: infrared, broadcast radio, cellular radio, microwaves, and

communications satellite

Communications

The process in which two or more computers or devices transfer data, instructions, and
i­nformation is known as digital communications. Today, even the smallest computers and
devices can communicate directly with one another, with hundreds of computers on a corporate
n­ etwork, or with millions of other computers around the globe — often via the Internet.

Figure 10-1 shows a sample communications system. Some communications involve cables
and wires; others are sent wirelessly through the air. For successful communications, you need
the following:

• A sending device that initiates an instruction to transmit data, instructions, or information
• A communications device that connects the sending device to transmission media
• Transmission media, or a communications channel, on which the data, instructions, or

information travel
• A communications device that connects the transmission media to a receiving device
• A receiving device that accepts the transmission of data, instructions, or information

As shown in Figure 10-1, all types of computers and mobile devices serve as sending and
receiving devices in a communications system. This includes servers, desktops, laptops,
tablets, smartphones, portable media players, handheld game devices, and GPS receivers.
Communications devices, such as modems, wireless access points, and routers, connect
transmission media to a sending or receiving device. Transmission media can be wired or
­wireless.

This chapter presents types of networks, along with various types of communications lines and
devices, and transmission media.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Wired and Wireless Networks and Devices  Chapter 10 451

Communications System

(b) (c)
(a)

(h)

(g) (d)
(f) (e)

Figure 10-1  A simplified example of a communications system. Some devices that serve as sending and receiving devices are (a) servers,
(b) desktops, (c) laptops, (d) tablets, (e) smartphones and headsets, (f) portable media players, (g) handheld game devices, and (h) GPS
receivers in vehicles. Transmission media consist of phone and power lines, cable television and other underground lines, microwave
stations, and satellites.

© iStockPhoto / Chesky_W; © iStockPhoto / scanrail; © iStockPhoto / ayo888; © iStockPhoto / rasslava; © iStockPhoto / Sergey_Peterman; © iStockPhoto / Jiradelta; © mart / Shutterstock.com;
© algre / Fotolia; © iStockPhoto / AnthonyRosenberg; © iStockPhoto / Bet_Noire; © iStockPhoto / OJ_Berlin; © SeanPavonePhoto / Fotolia; © Sam Spiro / Fotolia; © Alfonso de Tomas /
Shutterstock.com; © Mmaxer / Shutterstock.com; © SSSCCC / Shutterstock.com; © Cengage Learning

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

452 Chapter 10  Communicating Digital Content

Networks

As discussed in Chapter 1, a network is a collection of computers and devices connected
together via communications devices and transmission media. A network can be internal to an
organization or span the world by connecting to the Internet. Many home and business users
create a network to facilitate communications, share hardware, share data and information, share
software, and transfer funds (Figure 10-2):
• Facilitate communications. Using a network, people communicate efficiently and easily

via email, Internet messaging, chat rooms, blogs, wikis, online social networks, video
calls, online meetings, videoconferences, VoIP, text messaging, and more. Some of these
communications occur within an internal network. Other times, they occur globally over the
Internet.
• Share hardware. Each computer or device on a network can be provided access to hardware
on the network. For example, each computer and mobile device user can access a printer on
the network, as they need it. Thus, home and business users create networks to save money on
hardware expenses.

Reasons to Use a Network

facilitate
communications

transfer
funds

share
hardware

share share data
software and information

Figure 10-2  Networks facilitate communications; enable sharing of hardware, data and information, and software; and provide a means
for transferring funds.

Courtesy of Apple Inc.; © YanLev / Shutterstock.com; © Sergey Peterman / Shutterstock.com; © Kitch Bain / Shutterstock.com; © Oleksiy Mark / Shutterstock.com; © iStockphoto / 123render;
© Cengage Learning

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Wired and Wireless Networks and Devices  Chapter 10 453

• Share data and information. Any authorized user can access data and information stored on BTW
a network. A large company, for example, might have a database of customer information. Any Sharing Network
authorized employee can access the database using a computer or mobile device connected to Software
the network. When you use a network
Most businesses use a standard, such as EDI (electronic data interchange), that defines how to share software, you
­business documents travel across transmission media. For example, businesses use EDI to send sometimes have to install
bids and proposals, place and track orders, and send invoices. the software on your
computer, and a server
• Share software. Users connected to a network can access software on the network. To on the network manages
support multiple users’ software access, vendors often sell versions of their software designed the licenses.
to run on a network or as a web app on the Internet. These network and Internet subscription
versions usually cost less than buying individual copies of the software for each computer. The Internet Research
license fees for these programs typically are based on the number of users or the number of How do you physically
computers or mobile devices attached to the network. transfer files without a
network connection?
• Transfer funds. Electronic funds transfer (EFT) allows users connected to a network to Search for: sneakernet
exchange money from one account to another via transmission media. Both businesses and
consumers use EFT. Examples include wire transfers, use of credit cards and debit cards,
direct deposit of funds into bank accounts, online banking, and online bill payment.

Instead of using the Internet or investing in and administering an internal network, some
companies hire a value-added network provider for network functions. A value-added network
(VAN) provider is a third-party business that provides networking services such as EDI services,
secure data and information transfer, storage, or email. Some VANs, such as PayPal, charge an
annual or monthly fee; others charge by the service used.

Discover More: Visit this chapter’s free resources to learn more about sharing hardware, data,
and information.

Consider This

What is an intranet?
Recognizing the efficiency and power of the Internet, many organizations apply Internet and web technologies to
their internal networks. An intranet (intra means within) is an internal network that uses Internet technologies.
Intranets generally make company information accessible to employees and facilitate collaboration within an
organization. Files on an intranet generally are not accessible from the Internet.

One or more servers on an intranet host an organization’s internal webpages, applications, email messages, files,
and more. Users locate information, access resources, and update content on an intranet using methods similar
to those used on the Internet. A company hosts its intranet on servers different from those used to host its public
webpages, apps, and files.

Sometimes a company uses an extranet (extra means outside or beyond), which allows customers or suppliers to
access part of its intranet. Package shipping companies, for example, allow customers to access their intranet via an

e xtranet to print air bills, schedule pickups, and track shipped packages as the packages travel to their destinations.

LANs, MANs, WANs, and PANs

Networks usually are classified as a local area network, metropolitan area network, wide area
network, or personal area network. The main difference among these classifications is their area
of coverage.

LAN  A local area network (LAN) is a network that connects computers and devices in a
limited geographical area, such as a home, school, office building (Figure 10-3), or closely
positioned group of buildings. Each computer or device on the network, called a node, often
shares resources, such as printers, large hard drives, and programs. Often, the nodes are
c­ onnected via cables.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

454 Chapter 10  Communicating Digital Content

customer service of ces

marketing department of ces
nodes

Figure 10-3 Computers servers for local area network
and devices on different
floors access the
same LAN in an office
building. Computers and
devices on the network
often are identified as
nodes.

© Xtuv Photography / Shutterstock
.com; © Cengage Learning

A wireless LAN (WLAN) is a LAN that uses no physical wires. Computers and devices that
access a wireless LAN must have built-in wireless capability or the appropriate wireless network
card, USB adapter, or other wireless device. A WLAN may communicate with a wired LAN for
access to its resources, such as software, hardware, and the Internet (Figure 10-4). Read How To
10-1 for instructions about adding mobile computers or devices to wireless networks.

Figure 10-4 Computers wireless access point Internet
is center of
and mobile devices
wireless network
on a WLAN may wired network

communicate via a high-speed Internet connection

wireless access point

with a wired LAN to

access its hardware,

software, Internet

connection, and other

resources.

© iStockphoto / Stephen Krow;
© Oleksiy Mark / Shutterstock.
com; © iStockphoto / ­123render;
© iStockphoto / pictafolio;
© ­iStockphoto / Moncherie;
© ­Natalia Siverina / S­ hutterstock.
com; © Ruslan Kudrin /
­Shutterstock.com; © Cengage
Learning

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Wired and Wireless Networks and Devices  Chapter 10 455

How To 10-1 3. If necessary, display the list of available connected to Wi-Fi network
Wi-Fi networks that are in range of the
Add a Computer or Mobile Device to a mobile computer or device. Source: Google, Inc.
Wi-Fi Network
If you are using a mobile computer or 4. Select the Wi-Fi network to which you
device, such as a tablet or smartphone, want to connect.
in a location that has a Wi-Fi network,
you might want to add the device to the 5. If necessary, enter the required password
n­ etwork. When a mobile device is c­ onnected for the network.
to a Wi-Fi network, you not only can
­transfer data and information more quickly, 6. If desired, disconnect from the
but you also might save charges imposed mobile n­ etwork so that your device
by a mobile service provider if you subscribe ­communicates using only the Wi-Fi
to a mobile data plan. The f­ollowing steps ­network.
describe how to add a mobile computer or
device to a Wi-Fi network: 7. Run a browser and navigate to
a w­ ebpage to verify that the device
1. Obtain the necessary network information is ­connected to the network
required to connect. This might include properly.
the network’s SSID and password. Read
How To 5-3 in Chapter 5 for additional   Consider This: What other
­information about SSIDs. ­reasons might you have for wanting to
­connect a mobile ­computer or device to a
2. If necessary, enable the device’s capability Wi-Fi network?
of connecting to Wi-Fi networks.

MAN  A metropolitan area network (MAN) is cellular communications satellite
a high-speed network that connects local area connection
networks in a metropolitan area, such as a city
or town, and handles the bulk of communica- main of ce phone
tions activity across that region. A MAN typi- server network
cally includes one or more LANs, but covers a
smaller geographic area than a WAN. ISP

A MAN usually is managed by a c­ onsortium Internet branch of ce branch of ce
of users or by a single network provider that branch of ce
sells the service to the users. Local and state telecommuting
governments, for example, regulate some employee
MANs. Phone companies, cable television
­providers, and other organizations provide mobile employee
users with connections to the MAN.
international of ce
WAN  A wide area network (WAN) is a
­network that covers a large geographic area Figure 10-5  A simplified example of a WAN.
(such as a city, country, or the world) using
a variety of wired and wireless transmission © Maksim Toome / Shutterstock.com; © Paul Matthew Photography / Shutterstock.com; © imging / Shutterstock
media (Figure 10-5). A WAN can be one large .com; © Vtls / Shutterstock.com; © iStockphoto / Oleksiy Mark; © iStockphoto / cotesebastien; © Mmaxer /
network or can consist of multiple LANs con- S­ hutterstock.com; © Cengage Learning
nected together. The Internet is the world’s
largest WAN.

PAN  A personal area network (PAN)
is a network that connects computers and
devices in an individual’s workspace using
wired and wireless technology. Devices

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

456 Chapter 10  Communicating Digital Content

BTW include ­smartphones, digital cameras, printers, and more. A PAN may connect devices
through a router using network cables or directly using special USB cables. PANs also may
High-Tech Talk use Bluetooth or Wi-Fi technology. A body area network (BAN), sometimes called a body
Discover More: Visit this ­sensor network (BSN), is a type of PAN that wirelessly connects sensors worn by, carried by,
chapter’s free resources implanted in, or attached to a human body. Read Ethics & Issues 10-1 to consider how BANs
to learn about the star, are used to monitor medical data.
bus, and ring network
topologies.

Ethics & Issues 10-1 with asthma or other similar conditions can intercept vital signs and other personal
perform regular daily activities while wearing data during transfer, violating a patient’s
Would You Use a BAN to Monitor the device. If it collects any unusual data, confidentiality. Privacy advocates also
Medical Data? the patient can receive medical resources have concerns about nonmedical uses of
By wearing, carrying, implanting, or immediately. First responders also use these BANs. The FCC (Federal Communications
­attaching small devices to a person’s body, devices. A fire chief, for example, can monitor Commission) controls the registration of
medical professionals can track vital signs firefighters’ body temperature and oxygen MBANs (medical BANs). The FCC regulates
and monitor heart rhythms, breathing rates, levels as they battle a fire. the radio frequency in which an MBAN can
and much more via a BAN, which uses low- transmit data. Some types of MBANs are
powered sensors to collect data. The BAN The disadvantages of BANs include data restricted to be used only within a licensed
sends the collected data wirelessly to an validity and security. What happens if a medical facility.
Internet-connected device, which relays the device stops working or its data becomes
data to a medical data server. In some cases, corrupt? Serious health complications Consider This: Should insurance
the data transmits directly to emergency could result if the patient is not monitoring ­companies be required to pay for BANs?
­services. Some devices also automatically conditions via another technique. For Why or why not? Would you use a BAN for
can dispense medications based on the example, devices that administer medication a medical condition? Why or why not?
data collected. could cause an overdose or underdose if
not working properly. Medical data is highly
Because of these devices, a patient may sensitive. An unscrupulous individual could
not have to visit a medical facility to receive
treatment. Heart patients, diabetics, or those

Network Architectures

client The configuration of computers, devices, and media on a ­network

client is sometimes called the ­network architecture. Two examples of ­network
architectures are client/server or peer-to-peer.

server Client/Server  On a client/server network, one or more
client ­computers act as a server, and the other computers on the network
request services from the server (Figure 10-6). A server, sometimes
printer called a host computer, controls access to the hardware, software,
and other resources on the network and provides a centralized
Figure 10-6  As illustrated by the communications storage area for programs, data, and information. The clients
in this simplified diagram, on a client/server network, are other computers and mobile devices on the network that rely
one or more computers act as a server, and the client on the server for its resources. For example, a server might store
computers and mobile devices access the server(s). an organization’s email messages. Clients on the network, which
Connections can be wired or wireless and may occur include any users’ connected computers or mobile devices, access
through a communications device. email messages on the server. Both wired and wireless networks
can be ­configured as a client/server network.
© iStockphoto / Oleksiy Mark; © iStockphoto / Stephen Krow; © Oleksiy
Mark / Shutterstock.com; © Mr.Reborn55 / Shutterstock.com; © iStockphoto / Although it can connect a smaller number of computers, a client/
luismmolina; © Cengage Learning
server network architecture typically provides an efficient means to

connect 10 or more computers. Most client/server networks require

a person to serve as a network administrator because of the large size

of the network.

As discussed in Chapter 3, some servers are dedicated servers

that perform a specific task. For example, a network server man-

ages ­network traffic (activity), and a web server delivers requested

­webpages to computers or mobile devices.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Wired and Wireless Networks and Devices  Chapter 10 457

Peer-to-Peer  A peer-to-peer (P2P) network is a simple,

inexpensive network architecture that typically connects

fewer than 10 computers. Each computer or mobile

device, called a peer, has equal responsibilities and capa-

bilities, sharing hardware (such as a printer), data, or

information with other computers and mobile devices

on the peer-to-peer network (Figure 10-7). ­Peer-to-peer

­networks allow users to share resources and files located

on their computers and to access shared resources

found on other computers on the network. Peer-to-peer

­networks do not have a common file server. Instead, all

computers can use any of the resources available on other

computers on the network. For example, you might set up

a P2P network between an Android tablet and a Windows

laptop so that they can share files using Bluetooth or so

that you can print from the tablet to a printer accessible Figure 10-7  As illustrated by the communications in this
to all devices on the network. Both wired and wireless simplified diagram, each computer or mobile device on a P2P
networks can be configured as a peer-to-peer network. network shares its hardware and software with other computers

P2P networks are ideal for very small businesses and and mobile devices on the network. Connections can be wired or
home users. Some operating systems include a P2P wireless and may occur through a communications device.
n­ etworking tool that allows users to set up a peer-to-peer
© Alex Staroseltsev / Shutterstock.com; © iStockphoto / 123render; © Sergey Peterman /
Shutterstock.com; © Oleksiy Mark / Shutterstock.com; Source: Microsoft; © Cengage Learning

network. Many businesses also see an advantage to using

P2P. That is, companies and employees can exchange files using P2P, freeing the company from

m­ aintaining a network server for this purpose. Business-to-business e-commerce websites find

that P2P easily allows buyers and sellers to share company information such as product databases.

Consider This Internet Research

What is P2P file sharing? Why have some file sharing
P2P file sharing, sometimes called a file sharing network, describes a network configuration on which users access networks been shut down?
one another’s hard drives and exchange files directly via a file sharing program. As more users connect to the
network, each user has access to shared files on other users’ hard drives. When users sign out of the network, Search for: file sharing
others no longer have access to their hard drives. network shutdown

Discover More: Visit this chapter’s free resources to learn more about file sharing programs.

Communications Software

Communications software consists of programs and apps that (1) help users establish a Internet Research
c­ onnection to another computer, mobile device, or network; (2) manage the transmission of
data, instructions, and information; and (3) provide an interface for users to communicate with What are examples of
one another. The first two often are provided by or included as tools with an operating system apps that provide free text
or bundled with a communications device. The third is provided by applications such as email, messaging services?
FTP, browser, discussion boards, chat rooms, Internet messaging, videoconferencing, and VoIP.
Search for: free text
Sometimes, communications devices are preprogrammed to accomplish communications messages
tasks. Some routers, for example, contain firmware for various protocols. Other communica-
tions devices require separate communications software to ensure proper transmission of data.
Communications software works with the network standards and protocols (presented in a later
section) to ensure data moves through the network or the Internet correctly.

Mini Feature 10-1: Mobile Communications

Users often communicate with one another via mobile computers and devices. Read Mini
Feature 10-1 to learn about communications options for mobile devices and associated data plans.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

458 Chapter 10  Communicating Digital Content

Mini Feature 10-1

Mobile Communications Voice and Video Calling

After visiting your parents for the weekend, you receive VoIP services, such as Skype and FaceTime, also
an email message from your mom asking about your trip ­provide voice and video calling services over the
home. You respond that it was fine and that you were Internet. These often are much less expensive than
able to send text messages over the Internet to your sister making phone calls over a mobile service provider’s
because the bus had a Wi-Fi connection. Meanwhile, your network. It also is possible to make calls from a VoIP
roommate sends you a text message with directions to the program to a mobile or landline phone. Voice and
restaurant where you are meeting for dinner. That night, you video calling require large amounts of bandwidth. As a
chat on Facebook with a classmate about your homework result, some carriers prohibit the use of calling services
and catch up on your friends’ updates. You see your brother over their networks, requiring users to connect via
is online, so you invite him to a video call where you talk Wi-Fi to make these calls. Read Ethics & Issues 10-2 to
about the ball game streaming on your phone. From email consider video calling and other issues associated with
and text messages to voice and video calls, computers and ­communications technologies and medical care.
mobile devices offer many ways to communicate.

Email is best for sharing longer, detailed messages.
For shorter or time-sensitive messages, consider using
the following forms of immediate communications.

Text/Picture/Video Messaging © radub85 / Fotolia

Text, picture, and video messages often take the place Data Plans
of phone conversations among many people, who find
exchanging these messages to be less intrusive and more Your mobile device’s data plan enables you to
efficient than voice conversations. SMS (short message access the Internet through your mobile service
service) text messages are messages of 300 or fewer p­ rovider’s network when Wi-Fi is not available.
characters sent from one user to another through a Without a data plan, you must use Wi-Fi or a wired
mobile service provider’s cell phone tower. With MMS connection to access the Internet on your computer or
(multimedia message service), users also can send and mobile device. Some mobile service providers offer an
receive photos, videos, and audio files. Occasional users unlimited data plan for your device, while many offer
might subscribe to a text-messaging plan, where provid- limited data plans. If you exceed your data limit in a
ers charge a small fee for each message sent or received. given month, additional fees apply. By monitoring your
In contrast, avid users, who send frequent text, picture, or data usage to see how much you use on average over
video messages, might subscribe to an unlimited plan. To a few months, you can decide on the best plan for
avoid paying fees to mobile service providers for sending you. Some carriers offer a shared data plan that pro-
text messages, some people opt for free messaging apps vides an allotted amount of data to be shared across
and services available via third-party providers. These several smartphones, tablets, laptops, gaming devices,
services send messages over the Internet rather than and mobile hot spots. Using Wi-Fi when available to
a provider’s network. Some of these services are free access the Internet will save on data usage charges if
when both parties subscribe. Free messaging apps often you have a limited data plan.
include advertising content alongside the messages.
Discover More: Visit this chapter’s free resources
Internet Messaging to learn more about mobile communications,
messaging, and voice and video calling.
With Internet messaging services, you can send text
or media messages in real time to other online users. To   Consider This: Think about how you use different
access an Internet messaging service, you need the ser- forms of mobile communications to share information
vice’s desktop, web, or mobile app, and an Internet con- or communicate with your family, friends, or coworkers
nection on your computer or mobile device. Users with as part of your daily routine. For what purposes do
accounts on multiple Internet messaging services often you generally send email messages or text messages?
use an Internet messaging aggregator app to manage After exchanging text messages, when might you
contact lists and chat on different Internet messaging make a phone call or use VoIP service to talk in real
networks simultaneously. time? Under what circumstances is each form of
communication most efficient?
Some providers allow you to merge your text/­
picture/video (SMS and MMS) and Internet messages so
that you can see messages of both types from the same
contact in a single conversation.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Wired and Wireless Networks and Devices  Chapter 10 459

Ethics & Issues 10-2 patients in remote areas, or those who an allergic reaction, a medical professional
are unable to leave their home safely. The is not on hand to give treatment, causing
Do the Benefits of Telemedicine Mayo Clinic is testing in-office kiosks which delays. Insurance companies may require
Outweigh the Risks? enable employees to videoconference with a physicians to have medical licenses in the
After your doctor asks you several q­ uestions, medical professional to diagnose minor health state where the patient resides in order to
she gives you a diagnosis and sends conditions without the employee having to cover the expenses. Privacy advocates warn
a prescription to your local pharmacy leave work. Another benefit of telemedicine is that hackers can access shared data or spy
­electronically. Instead of walking out of in cases where spread of infectious disease is on videoconferences between doctors and
the exam room, you turn off your tablet’s a concern. patients.
webcam, receiving medical care without
leaving your home. Telemedicine is the use Some healthcare experts state that the Consider This: Have you ever used
of communications and information technol- cost of the equipment and time spent telemedicine to communicate with your
ogy to provide and assist with medical care. training healthcare professionals outweighs healthcare provider? Why or why not?
Patients use telemedicine to communicate the benefits. The inability of healthcare Would you use a kiosk at your workplace to
with a doctor, nurse, or pharmacist from their professionals to perform hands-on tasks, communicate with a healthcare provider?
home or workplace. Healthcare professionals such as take a temperature or examine Why or why not? Is it practical to relay on
­benefit from collaborating and consulting the patient’s ears or throat, can lead to telemedicine to provide care to people in
with specialized physicians in other locations. misdiagnosis or an incomplete exam. If a remote areas? Why or why not?
patient requires immediate care, such as for
Proponents of telemedicine state that
its use can provide healthcare access to

Now you should know
Be sure you understand the material presented in the sections titled Communications, Networks, and
Communications Software, as it relates to the chapter objectives.
Now you should know . . .

• When you are using a sending device, a communications device, transmission media, and a receiving device
(Objective 1)

• When you might use a LAN, MAN, WAN, and PAN (Objective 2)
• Why you would use a client/server or a P2P network (Objective 3)
• Why you would use communications software and what types of mobile communications you might use

(­Objective 4)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

Network Communications Standards and Protocols

Today’s networks connect terminals, devices, and computers from many different manufacturers BTW
across many types of networks. For the different devices on various types of networks to be able
to communicate, the network must use similar techniques of moving data through the network High-Tech Talk
from one application to another. Discover More: Visit this
chapter’s free resources
To alleviate the problems of incompatibility and ensure that hardware and software to learn about the OSI
c­ omponents can be integrated into any network, various organizations such as ANSI reference model.
(American National Standards Institute) and IEEE (Institute of Electrical and Electronics
Engineers) propose, develop, and approve network standards. A network standard defines
guidelines that specify the way computers access the medium to which they are connected,
the type(s) of medium used, the speeds used on different types of networks, and the type(s)

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.


Click to View FlipBook Version