The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by psskvpjb, 2021-03-30 02:40:49

RU2 - Vermaat,_Sebok,_Freund,_Campbell

RU2 - Vermaat,_Sebok,_Freund,_Campbell

560 Chapter 12  Working in the Enterprise

BTW Expert Systems  An expert system is an information system that captures and stores
the knowledge of human experts and then imitates human reasoning and decision ­making
Technology Innovator (Figure 12-6). Expert systems consist of two main components: a knowledge base and
Discover More: Visit this ­inference rules. A knowledge base is the combined subject knowledge and experiences of
chapter’s free resources the human experts. The inference rules are a set of logical judgments that are applied to the
to learn about Ray knowledge base each time a user describes a situation to the expert system.
Kurzweil (technology
inventor and futurist). Expert systems help all levels of users make decisions. Enterprises employ expert systems in

a variety of roles, such as answering customer questions, training new employees, and analyz-

ing data. Expert systems also successfully have resolved such diverse problems as diagnosing

i­llnesses, searching for oil, and making soup.

Internet Research

What are recent
developments in artificial
intelligence?

Search for: artificial
intelligence applications

Figure 12-6  This company’s restaurant advisor expert system recommends a restaurant based on
a user’s answers to specific questions.

Courtesy of Exsys

Consider This
How do expert systems relate to artificial intelligence?
Expert systems are a component of artificial intelligence. Artificial intelligence (AI) is the ­application
of human intelligence to computers. Artificial intelligence technology senses a person’s actions and,
based on logical assumptions and prior experience, takes the appropriate action to complete the task.
Artificial ­intelligence has a variety of capabilities, including speech recognition, logical reasoning, and

­ creative responses.

Mini Feature 12-1: Information Literacy

To adequately manage information, you should know how to use the five components of
information literacy and also know the steps in effective research and composition. Read
Mini Feature 12-1 to learn about information literacy.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 561

Mini Feature 12-1

Information Literacy u­ nderstanding how data is gathered and presented in © Dragana Gerasimoski /
graphs, charts, and other visuals and how to interpret ­Shutterstock.com
Managing the vast amount of information inundating and verify information presented in media.
us daily can be an overwhelming task, not only for © Pertusinas / Shutterstock.com
those involved in technology careers, but also for any • Traditional literacy: Individuals who can read and
digital citizen. This twenty-first century skill set, called ­understand a variety of documents are likely to complete © Temych / Shutterstock.com
information literacy, prepares students, employees, and their educations, obtain employment, and participate
citizens to manage information so that they can be in community groups. They also need to think critically
knowledgeable decision makers. about the material they have read and to e­ xpress their
thoughts by writing and speaking coherently.
Defining Information Literacy
Steps in Effective Research and Composition
More than 25 years ago, the American Library
Association was the first organization to recognize the Locating appropriate material, organizing these
importance of information literate citizens. As the web sources, and producing the final document require effort
and the Internet became a mainstay in education, busi- and careful thought. The following paragraphs discuss
ness, and home environments, experts realized that the steps you should take when crafting research, thinking
traditional basic literacy skills of reading, writing, and critically, and drafting strategies:
arithmetic were insufficient for living a productive life.
According to the Association of College & Research • Establish an appropriate topic. Identify the purpose
Libraries, also needed are lifelong skills “to locate, and audience. Determine an effective method of com-
­evaluate, and use effectively the needed information.” municating the information, such as a written paper,
oral presentation, or blog. Explore and narrow the
Information Literacy Components topic so that it is manageable within time and logistical
constraints. Determine the audience’s familiarity with
An individual’s quality of existence depends upon the topic and the need to find reference materials.
obtaining quality information. Information literate peo-
ple know how to locate meaningful sources that can be • Identify sources. Determine where to locate
used to solve problems, make decisions, and set goals. e­ lectronic and print resources, including web-
The following five categories are recognized as integral sites, media, databases, and printed materials.
literacy components: Differentiate between primary and secondary
sources, popular and scholarly articles, and
• Digital literacy: Using computers, mobile devices, current and historical materials.
the Internet, and related technologies effectively is a
necessity in business and society. Also important is • Evaluate materials. Analyze the sources to
an understanding of the general concerns of having determine reliability, accuracy, timeliness, and
computers in the world, including their integration bias. Compare the materials to determine if
in employment and education and their effects on the authors agree or disagree with topics.
national and personal security.
• Create the final work. Organize and
• Library instruction: Undergraduates rarely seek the integrate the source material using direct
help of librarians when performing academic research. quotations, paraphrases, and summaries.
This lack of help may be due, in part, to the fact that Document the work to credit sources and
the students misunderstand the role of the reference avoid plagiarism. Integrate photos, charts,
librarian. Information literate individuals use the librar- and graphs when necessary to clarify the
ians’ expertise in locating relevant sources. They also message. Use the writing process to ­create,
understand the necessity of using citations, how infor- review, revise, and proofread.
mation is cataloged and organized, search strategies,
and the process of locating and evaluating resources. Discover More: Visit this chapter’s free resources
to learn more about information literacy components
• Media literacy: Skills needed to understand how mass and the steps in effective research and composition.
communication and popular culture affect learning and
entertainment include the ability to evaluate and ­analyze   Consider This: Test your skills at effective
how music, film, video, television, and other nonprint research by examining a website for a vehicle you
media are used effectively to persuade and inform. would consider purchasing. Describe the photos, colors,
placement of objects, and description. Who is the
• Numerical literacy: The ability to use basic math intended audience? Is any information missing from the
skills and interpret data is essential to ­solving p­ roblems website? What message is the company attempting to
and communicating information. Also i­mportant are send? Do you think the message achieves its purpose?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

562 Chapter 12  Working in the Enterprise

now You should know
Be sure you understand the material presented in the section titled Information Systems in the Enterprise as it
relates to the chapter objectives.
Now you should know…
• Whether information is valuable (Objective 1)
• Which enterprise information systems you have used (Objective 2)
• How you can be information literate (Objective 3)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

BTW Technology Careers

New Technologies With billions of dollars in annual revenue, the technology industry is a major source of career
As new technologies opportunities worldwide. This industry has created thousands of high-tech career opportuni-
and trends emerge, you ties, even in organizations whose primary business is not technology-related. As technology
should stay informed changes, so do the available careers and requirements. New careers are available in social media
about them to ensure and mobile technologies that did not exist a few years ago. For this reason, you should stay up to
your relevance in the date with technology developments.
technology market.

General Business and Government Organizations and Their IT Departments

Business and government organizations of all sizes use a variety of computers, mobile devices,

and other technology. Most use networks to ensure seamless communications among employees,

vendors, and customers. They

also use webpages, email, mobile

apps, online social networks,

and more to communicate with

the public.

Larger organizations use

­computers and other technology

to answer and route phone calls,

process orders, update inventory,

and manage accounts receiv-

able, accounts payable, billing,

and payroll activities. Many use

mobile devices, web conferenc-

ing, and VPNs (virtual private

networks) to stay connected

with employees who work in

other locations or who tele-

commute (Figure 12-7). Read

How To 12-1 for tips related

to setting up a home office for

telecommuting. Read Ethics &

Issues 12-1 to consider whether

­telecommuting is good or bad

Figure 12-7  Some organizations allow employees to telecommute. for business.

© Goodluz / Shutterstock.com

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 563

How To 12-1 • Make sure your office has a comfortable • Use a headset with your phone to
desk and chair. Although it may be tempt- m­ inimize background noise.
Set Up Your Home Office ing to sit on your couch with your laptop
for Telecommuting while you work, having a professional • Obtain supplies that typically are found in
Telecommuting mutually benefits ­employers workspace will increase productivity. an office setting, such as writing utensils,
and employees. Employers do not have to paper, tape, a stapler, paper clips, and
pay for the physical infrastructure (includ- • Consider acquiring additional furniture, sticky notes.
ing office space and parking) for the such as a file cabinet and bookshelf, espe-
employee, and telecommuters often work cially if you plan to store files and books • If your employer does not provide a
more hours than those who physically for reference. computer for your use, make sure your
­commute to an office. Employees benefit computer is sufficiently equipped to
from not having to commute and from • If required, verify your office has a complete your job tasks. Make sure you
­having a comfortable work environment. ­sufficient Internet connection. If you are also have accessories, such as USB flash
The following guidelines describe how to using a wired connection, one should be drives and other external storage media,
set up your home office for telecommuting: available near your desk. If you are using if necessary.
a wireless network, make sure the signal
• Choose a location in your home that is free strength is sufficient in your office. • Consider obtaining an all-in-one printer that
from noise and distractions. If your home can print scan, copy, and fax (if necessary),
is occupied by others during the hours you • Make sure the office has a phone to as well as extra printer cartridges.
plan to telecommute, your office should be place and receive calls. If you will be
located away from potentially noisy areas. r­elying on a mobile phone, verify your   Consider This: What other ­equipment,
For example, an office next to a room phone can receive a strong signal and supplies, and furniture would you ­prefer
where someone else is watching television has a c­ onveniently located charger and to have in an office from where you
may not be an ideal choice. power outlet. t­ elecommute?

Ethics & Issues 12-1 office gossip and politics. Many feel that Many experienced workers agree that
they could not be as dedicated to their telecommuting cannot replace valuable
Is Telecommuting Good or Bad jobs without telecommuting because face-to-face time with coworkers, vendors,
for Business? of the flexible hours and closeness to and customers. Some workers fear
Studies show that nearly 80 percent of home. Others feel that trusted employees telecommuting because they feel that
­workers dream of leaving the confines of an should have the privilege if they earn it. the lack of a personal relationship with
office to work from the comfort of home, Companies benefit by saving on resources, managers puts them at the top of the list
at least part of the time. Although employ- such as office space. for downsizing.
ees may view working from home as an
ideal ­situation, some bosses do not agree. Opponents claim that some lack the Consider This: Is telecommuting good
An Internet CEO, for example, made news self-discipline to work remotely. Employees or bad for business? Why? Are some
when she reviewed data such as employees’ may be distracted more easily without b­ usinesses or positions better suited for
s­ign-ins to the company’s VPN (virtual private direct management supervision. Some telecommuting? If so, which ones? Do
n­ etwork) and discovered that many employ- workers have difficulty setting appropriate some people lack the self-discipline to be
ees were not working during company hours. boundaries regarding childcare or other p­ roductive while telecommuting? If so,
As a result, the CEO made the decision to family obligations. Additionally, productivity how should managers determine whether
end telecommuting at her company. actually may decrease if employees stagger to allow this practice and who may
work hours to fit their schedule, limiting times ­participate?
Supporters cite reduced pollution and when employees can schedule meetings.
commuting time. Other benefits include
increased productivity due to lack of

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

564 Chapter 12  Working in the Enterprise

BTW Most medium and large businesses and government organizations have an IT (information
t­echnology) department. IT staff are responsible for ensuring that all the computer operations,
Technology Innovator mobile devices, and networks run smoothly. They also determine when and if the organiza-
Discover More: Visit this tion requires new hardware, mobile devices, or software. Usually, these jobs are divided into the
chapter’s free resources ­following areas:
to learn about Meg
Whitman (technology • Management — directs the planning, research, development, evaluation, and integration of
business executive). technology.

• Research and software development — analyzes, designs, develops, and implements new
information technology and maintains and improves existing systems.

• Technical support services — evaluates and integrates new technologies, administers the
organization’s data resources, and supports the centralized computer operating system and servers.

• Operations — operates the centralized computer equipment and administers the network,
including both data and voice communications.

• Training/Support — teaches employees how to use components of the information system or
answers specific user questions.

• Information security services — develops and enforces policies that are designed to safeguard
an organization’s data and information from unauthorized users.

• Marketing/Strategy — directs and implements Internet and social media marketing, and
manages customer relationships.

Technology Equipment

The technology equipment field consists of manufacturers and distributors of ­computers,
mobile devices, and other hardware, such as magnetic and optical drives, monitors, ­printers,
and communications and networking devices. In addition to the companies that make
­end-user ­equipment, thousands of companies manufacture components used inside a com-

puter or mobile device, such as chips, motherboards, cables and
connectors, and power ­supplies.

Available careers in this field include positions with ­companies
that design, manufacture, and produce computers and input,
o­ utput, communications, mobile, and networking devices. Careers
include designing and fabricating chips, testing internal com-
ponents (Figure 12-8), assembling computers and devices, and
­packing finished products.

Discover More: Visit this chapter’s free resources to learn
about technology equipment manufacturers.

Figure 12-8  This lab technician tests internal computer Software and Apps
components.
The software and apps field consists of companies that develop,
© iStockPhoto / anyaivanova manufacture, and support a wide range of software and apps
for computers, the web, and mobile devices. Some companies
specialize in a particular type, such as productivity software or
tools, or focus on a device type. Other companies — especially
larger firms, such as Microsoft — produce and sell many types of
s­ oftware that work with both computers and mobile devices and
may use Internet services to sync data among devices or provide
­collaborative features.

Some employees develop desktop, web, and mobile apps, such
as productivity software, games, simulations, and more; ­others
develop operating systems and related tools. Read Secure IT 12-2
to consider how unlicensed software affects software ­publishers.

Discover More: Visit this chapter’s free resources to learn
about leading software companies.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 565

Secure It 12-2 criminal and civil penalties up to $150,000 Along with the risk of facing litigation,
for each illegal copy. It is important, people and businesses using unlicensed
Using Unlicensed Software Is a Crime therefore, to understand when software can software risk data theft and unauthorized
be copied legally. In most circumstances, the access to their information because
Software publishers own the copyright to software owner can make one copy of the they are not receiving program updates
their products. These companies are on the software for backup purposes. Many people and patches that could prevent hacking
lookout for copies of their software that make multiple copies, however, either to attempts. If people discover unlicensed
have been duplicated, distributed, or used share or to sell. Often the sharing is done software being used on a computer at
without their permission. The pirated soft- online. In one survey, more than 50 percent work or at school, the best practice is to
ware denies these publishers revenue they of students and 25 percent of instructors report this situation to managers or IT
would have earned from sales, which they admitted that they have copied or would authorities. The Business Software Alliance
could have used to produce new products copy software illegally. encourages people to call its hotline
and improve current products. A recent and promises to keep the information
Business Software Alliance (BSA) Global People and companies copy software confidential.
Software Survey revealed that 43 percent illegally for a variety of reasons, insisting
of all software has been installed without that software prices are too high, that   Consider This: What penalties should
proper licensing, including one in five software often is copied for educational be imposed for using unlicensed software?
pieces in the United States. This software is or other altruistic purposes, that copied Why? Can you counter the reasons people
valued at more than $62 billion. software makes people more productive, give for copying software illegally? How?
that no restrictions should be placed on Would you copy software illegally, even if
Software may be considered unlicensed the use of software after it is purchased, your boss told you to copy it? Why or why
in a number of circumstances: it could have and that software copying is a widespread not? Should software vendors be allowed
been downloaded illegally from file-sharing practice. They also may not be aware that to probe your computer secretly for illegally
websites, it could have an expired license, or their actions are illegal, but ignorance is installed software? Why or why not?
it could be installed on multiple computers not an excuse for illegal actions.
when the license specifies use on only one
computer. Using unlicensed software violates
copyright laws and is subject to serious

Technology Service and Repair

The technology service and repair field provides preventive
m­ aintenance, component installation, and repair services to
­customers (Figure 12-9). Some technology service technicians
­possess g­ eneral knowledge that enables them to work with a variety
of devices from different manufacturers. Other technicians receive
training and ­certifications directly from manufacturers to specialize
in devices from that manufacturer. This work is best suited for those
individuals who like to troubleshoot and solve problems and who have
a strong ­background in electronics.

Many technology equipment manufacturers include diagnostic
software with their computers and devices that assists technicians
in identifying problems. Today’s technology also allows technicians
to diagnose and repair software problems from a remote location;
that is, the technician accesses the user’s hard drive or smartphone
from a different location. Read Ethics & Issues 12-2 to consider the
trustworthiness of computer repair services.

Figure 12-9  This repair technician is replacing a
laptop hard drive.

© iStockPhoto / theJIPEN

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

566 Chapter 12  Working in the Enterprise

Ethics & Issues 12-2 to their jobs. Information systems at many computer or device to an IT or computer
government agencies and some organizations repair technician. You may assume that
Can You Trust Data Recovery or log all access to sensitive information. In these professionals likely will follow ethical
Computer Repair Services? some high-profile cases, organizations fired guidelines. It can be difficult, however, to
While doing legitimate data recovery and or suspended workers after log information repair the effects of unauthorized access, use,
device support tasks, IT workers and com- proved they violated policies. or distribution of your data.
puter repair technicians often have access
to confidential information. Most often In one state, the law requires computer Consider This: What should the
you need to provide your password and repair technicians who review or analyze c­ onsequences be for IT or computer repair
access to your network, computer, or device data to have a private investigator license. technicians who access unauthorized
during service. In doing so, you also give The law implies that the technician is data? Why? Would licensing and requiring
access to financial information, confidential performing an investigation, in a sense, when ­training lessen the impact of unauthor-
records, email and other communications, business managers and parents hire them ized access? Why or why not? How can
and ­passwords. The result could be leaked to analyze the computer usage habits of you ­protect your data when repairing or
­information or identity theft. employees or children. ­servicing your computer or device?

IT workers often sign agreements with Privacy experts recommend backing up
organizations stating that they will not and wiping all data before turning over your
access any information that is not critical

Technology Sales

Technology salespeople must possess a general understanding of technology and a specific

knowledge of the product they are selling. Strong people skills are important, including a

keen listening ability and superior verbal communications. Technology salespeople ­generally

d­ etermine buyers’ needs and direct buyers toward devices, computers, and apps that meet

their needs.

Some salespeople work

directly for technology equip-

ment manufacturers, mobile

device manufacturers, or soft-

ware manufacturers. Others

work for resellers, including

retailers that sell personal

computer products. The

technology salesperson in a

retail store often is a suitable

entry-level job for students

working toward a certificate

or degree in computer-related

fields (Figure 12-10). Before

consulting the opinion of a

salesperson, be sure to inde-

pendently research the prod-

uct so that you can better

determine whether answers to

your ­questions are unbiased.

Read How To 12-2 to learn

Figure 12-10  A salesperson in an electronics store shows a digital camera to customers. how to evaluate extended

© dotshock / Shutterstock.com w­ arranty options.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 567

How To 12-2 provides may not be worth the cost, so do a repair or replacement of devices that
your research first on the manufacturer’s war- are damaged accidentally. For example,
Evaluate Extended Warranty Options ranty. Do not rely on a salesperson to inform if you drop your phone and the screen
When you purchase electronic devices, such as you of what a manufacturer’s warranty does cracks, accidental damage protection may
computers and mobile devices, retailers and and does not cover. cover the repair. The number of repairs
third-party vendors typically offer an extended or replacements offered through an
warranty on the computer or device. These • Determine an appropriate length for the accidental damage protection plan may
warranties, which are available for a fee, offer extended warranty. For example, if you be limited, so do your research before
services that extend beyond what the device’s believe the device will be used for only three purchasing it.
manufacturer’s warranty covers. For example, years before you will consider replacing it, do
extended warranties may include replacing not purchase an warranty that extends longer • Do not fall for sales tactics. Salespeople often
parts that break after the manufacturer’s war- than three years. earn commission or receive incentives for sell-
ranty expires, accidental damage, or replacing ing extended warranties. For this reason, they
parts that become worn as a result of normal • Compare the cost of the warranty with costs will make every effort to convince you of the
wear and tear. The following guidelines describe associated with repairing or replacing the possibility that something could go wrong.
how to evaluate extended w­ arranty options: device. It may be less expensive to pay for Educating yourself and determining the risk
one or two repairs instead of purchasing an you want to take before purchasing your
• Extended warranties can be offered by extended warranty. device will help you make a more informed
the manufacturer, retailer, or a third party. decision about purchasing an extended
Extended warranties offered by a third party • Carefully research devices before you warranty.
sometimes can be less expensive, but it may purchase them. Read reviews from people
be more difficult to obtain service for your who have purchased the same device, and   Consider This: Have you ever purchased
device. With an extended warranty that is stay away from devices that are prone to an extended warranty? What other factors do
offered by the manufacturer or retailer, it may problems. By purchasing a reliable de­ vice, you you consider when determining whether to
be easier and faster to obtain service. reduce the need for an ­extended warranty. purchase an extended warranty?

• Evaluate the manufacturer’s warranty • Consider purchasing accidental damage
and what it covers. You may find that the protection. This protection offers either
additional coverage an extended warranty

Technology Education, Training, and Support BTW

Schools, colleges, universities, and private companies all need qualified educators to provide Instructors
Your instructors may be
technology-related education and training. The high demand in this field has led to a shortage helpful resources when
you are looking for a
of qualified instructors at the college level as instructors increasingly move to careers in private job. Because of their
professional experience,
industry, which offers the promise of higher pay. they may be able to
connect you with
Corporate trainers teach employees how to use software and apps, design and develop potential employers,
recommend classes you
­systems, write programs, integrate and sync data from apps used on multiple devices, and should take, or suggest
internship opportunities.
­perform other technology-related activities (Figure 12-11). Many large companies use their

own training departments.

Corporations usually require less

educational background for train-

ers than educational institutions

require for instructors.

In a more informal setting, a help

desk specialist answers hardware,

software, and networking ­questions

in person, over the phone, or elec-

tronically via email or a chat room.

Educational requirements for help

desk specialists are less stringent

than they are for other careers

in the technology field. The help Figure 12-11  A corporate trainer shows employees how to use
desk specialist position is an ideal new software.
­entryway into the IT field.
© Jenner / Fotolia

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

568 Chapter 12  Working in the Enterprise

IT Consulting

Technology professionals sometimes become IT consultants after gaining experience in one or
more technology-related areas, such as software development, systems analysis and design, network
configuration, developing mobile devices, using social media, or web development. An IT consultant,
typically hired based on expertise, provides technology services to his or her clients. Large enter-
prises often hire teams of consultants to offer advice about technology-related concerns. IT consul-
tants must possess strong technical skills in their specialized area and must be able to communicate
effectively to clients. Read Ethics & Issues 12-3 to consider the effects of outsourcing IT jobs.

Ethics & Issues 12-3 workers a fair wage and provide benefits. should receive tax breaks. Many argue that
American consumers benefit from the the Unites States should require companies
Is Outsourcing Jobs Wrong? reduced cost of goods. who hire foreign workers to pay a fair salary
Companies have a long history of ­outsourcing, and provide benefits comparable to those for
or relying on outside companies to perform Opponents say that offshoring results in American workers.
certain tasks. Outsourcing enables companies unemployment and harms the economy.
to find workers with specialized experience Others are concerned that sensitive work, such Consider This: Should the government
and to control costs. When a company sends as health record maintenance or weapons limit a company’s ability to outsource
jobs overseas, outsourcing becomes offshoring. manufacturing, could place U.S. citizens at risk. computer jobs to other countries? Why
A skilled computer professional in the United Some experts state that the work done abroad or why not? Should companies receive
States typically commands a higher salary than should be easy to manage and quantifiable in criticism for outsourcing jobs? Why or
an IT worker in other countries. To remain com- order to ensure it meets company standards. why not? What are some possible alter-
petitive, many companies have chosen to send Some companies have received negative natives to outsourcing that would help
computer jobs abroad. press due to inefficiencies in call centers and to keep a company competitive? What
customer support located abroad. steps can people take in their careers to
Proponents say that the United States avoid becoming a victim of outsourcing?
has a long history of outsourcing all types of Government officials and lawmakers Would you pay more money for goods
work when the economics of the situation struggle with policies regarding offshoring, manufactured in the United States? Why
demands it. Companies feel that they have especially with regard to taxing workers. or why not?
a right to choose to send business tasks Politicians debate whether or not companies
abroad if it saves costs. Foreign economies who keep business in the United States
benefit when companies hire and pay

Putting It All Together — Job Titles and Descriptions

The following sections briefly describe some of the more popular technology-related job titles
for several categories of IT careers.

System Development  Careers in system development require you to analyze or create
s­ oftware, apps, databases, websites and web-based development platforms, and networks.
Some careers are listed in Table 12-2.

Table 12-2  System Development Jobs

Job Title Job Description
Cloud Architect Identifies business requirements, strategies, and solutions for cloud storage and services that meet a
company’s goals or needs
Database Designer Specifies the structure, interface, and requirements of a large-scale database; determines security and
permissions for users
Program and App Specifies, designs, implements, tests, and documents programs and apps in a variety of fields, including
Developer robotics, operating systems, animation, and applications
Systems Analyst Works closely with users to analyze their requirements, designs and develops new information systems, and
incorporates new technologies
Systems Programmer Installs and maintains operating system software and provides technical support to the programming staff
Web Designer Designs the layout, navigation, and overall appearance of a website with a focus on user experience; specifies
a website’s appearance using HTML5, JavaScript, CSS, media, and other web design technologies
Web Developer Analyzes, develops, and supports the functionality of a website, including applications that often interact with
databases or other online resources

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 569

Technology Operations  Careers in technology operations require you to have knowledge
about how hardware, software, and networks function. Some careers are listed in Table 12-3.

Table 12-3  Technology Operations Jobs

Job Title Job Description

Computer Technician Installs, maintains, and repairs hardware and servers; installs, upgrades, and
configures software; troubleshoots hardware problems

Help Desk Specialist/ Answers technology-related questions in person, on the phone, or via email or
Help Desk Technician an online chat room

Network Administrator/ Installs, configures, and maintains LANs, WANs, wireless networks, intranets,
Engineer Internet systems, and network software; identifies and resolves connectivity
issues

Technical Project Guides design, development, and maintenance tasks; serves as interface
Manager between programmers/developers and management

Web Marketing and Social Media  Careers in web marketing and social media require BTW
you to be knowledgeable about web-based development platforms, social media apps, and
m­ arketing strategies. Some careers are listed in Table 12-4. Technology Innovator
Discover More: Visit this
Table 12-4 Web Marketing and Social Media Jobs chapter’s free resources
to learn about Salesforce
Job Title Job Description (cloud computing
company known for its
Customer Relationship Integrates apps and data related to customer inquiries, purchases, support CRM software).
Management (CRM) requests, and behaviors in order to provide a complete application that
Specialist manages a company’s relationships with its customers

Internet/Social Media Directs and implements an organization’s use of Internet and social media
Marketing Specialist marketing, including Facebook pages, Twitter feeds, blogs, and online
advertisements

Search Engine Optimization Writes and develops web content and website layouts so that they will appear
(SEO) Expert at the beginning of search results when users search for content

User Experience (UX) Plans and designs software and apps that consider a user’s reaction to a program
Designer and its interface, including its efficiency, its effectiveness, and its ease of use

Data Storage, Retrieval, and Analysis  Careers in data storage and analysis require you to
be knowledgeable about collecting, analyzing, and reporting data from databases or the web.
Some careers are listed in Table 12-5.

Table 12-5 Data Storage, Retrieval, and Analysis Jobs

Job Title Job Description

Data Scientist Uses analytics and other Big Data tools to compile statistics on data that an
organization can use to plan product development or create strategies for
marketing

Database Analyst Uses data modeling techniques and tools to analyze and specify data usage

Database Administrator Creates and maintains the data dictionary; monitors database performance

Digital Forensics Examiner Collects and analyzes evidence found on computers, networks, mobile
devices, and databases

Web Analytics Expert Collects and measures Internet data, such as website traffic patterns and
advertising, and develops reports that recommend strategies to maximize an
organization’s web presence

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

570 Chapter 12  Working in the Enterprise

Information and Systems Security  Careers in information and systems security require
you to be knowledgeable about potential threats to a device or network, including viruses and
hacking. Security specialists need to know the tools and techniques to protect against threats.
Some careers are listed in Table 12-6.

Table 12-6  Information and Systems Security Jobs

Job Title Job Description

Computer Security Specialist/ Responsible for the security of data and information stored on computers
Mobile Security Specialist and mobile devices within an organization

Network Security Configures routers and firewalls; specifies web protocols and enterprise
Administrator technologies

Security Analyst Implements security procedures and methods, looks for flaws in security of
a company’s devices and networks, works with and trains employees at all
levels, and assigns permissions and network settings

Security System Project Develops and maintains programs and tools designed to provide security
Manager to a network

Digital Forensics Analyst Inspects electronic data to recover documents and files from data storage
devices that may have been damaged or deleted, in order to use them as
evidence in a crime investigation

App Development and Mobile Technologies  Careers in app development and mobile
­technologies require you to have knowledge about trends in the desktop and mobile app
m­ arket, as well as the ability to develop secure apps for a variety of computers and mobile
devices. Some careers are listed in Table 12-7.

Table 12-7 App Development and Mobile Technologies Jobs

Job Title Job Description

Desktop or Mobile Converts the system design into the appropriate application development
Application Programmer/ language, such as Visual Basic, Java, C#, and Objective C, and toolkits for
Developer various platforms

Games Designer/Programmer Designs games and translates designs into a program or app using an
appropriate application development language

Mobile Strategist Integrates and expands the company’s initiatives for mobile users

Mobile Technology Expert Develops and directs an organization’s mobile strategy, including
marketing and app development

Mini Feature 12-2: Mobile App Development

When creating mobile apps, selecting a strategy to develop an app is as important as

d­ escribing its capabilities. Read Mini Feature 12-2 to learn about three approaches to

­developing mobile apps.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 571

Mini Feature 12-2

Mobile App Source: © Instagram Courtesy of Neil Litt Mobile Web Apps
Development Source: Instagram Courtesy of Neil Litt
Mobile web apps are actually websites that provide
Developers and technology managers should evaluate a user experience similar to native apps. Developers
several possible approaches for creating mobile apps, write them using standard web technologies including
and make a decision based on both technical and HTML5, CSS, and JavaScript. Mobile web apps are not
business considerations. Should they invest the time deployed to an app store; rather, they are deployed to a
and money it takes to develop high-performing native web server and users access them in a mobile browser.
apps for many different mobile operating systems? Users, therefore, always have access to the most recent
Would they be better off creating mobile web apps, version of an app. Creating a shortcut to the app’s
written using standard web technologies, to run in a website and saving it as an icon or tile on a device’s
mobile browser? Or should they use a hybrid, or mixed, home screen provides easy access to the mobile web
approach that can simplify the development process app. Many mobile web apps have a responsive web
and lower development costs at the expense of a design, so that they will be displayed properly on
p­ ossible inconsistent user experience across platforms? devices with screens of different sizes.

Native Apps Some companies choose to develop mobile web
apps so that they can write one app that works on
A native app is written for mobile devices running a all devices that is not subject to the rules of an app
­particular mobile phone operating system, such as Google’s store. Mobile web apps can access a limited set
Android, Apple’s iOS, or Microsoft’s Windows Phone. They of device features, such as basic gestures, working
offer fast performance and can store data for offline use. offline, tap-to-call, and GPS, but do not have access
Native apps can access all of a device’s content, including to native features, such as the camera, microphone,
its contacts, calendar, and photos, and can interact with accelerometer, and device notifications. For example,
its hardware, including the microphone, camera, or the Instagram mobile web app shown in the figure
accelerometer to measure movement and motion. For to the right runs in a browser and only displays
example, the native Instagram app shown in the figure photos, but does not allow you to take photos
below can access the device’s camera to take photos. using your device’s camera.

Apps developed Hybrid Apps
for a specific mobile
platform or device A hybrid app combines features of native and
generally will not work mobile web apps. Like native apps, hybrid apps are
on another without developed for specific platforms and deployed to
significant modification. an app store. They can access many of a device’s
Creating native apps hardware features, such as its camera. Like mobile
requires programming web apps, they are built with HTML5, CSS, and
languages, presentation JavaScript. Developers use development tools to
technologies, and package this code with a browser and prepare it as
development tools a native app to deploy to popular app stores. In this
particular to each way, hybrid apps are cross-platform, meaning the
platform. same code can run on many mobile platforms. This
approach often saves development time and costs,
After testing to be but may not provide a consistent user experience or
sure it works properly, fast performance on all devices.
developers deploy, or
submit, a native app Discover More: Visit this chapter’s free resources
to an app store for to learn more about development technologies for
approval and distribution. When deploying native apps creating mobile apps.
to Google Play, Apple’s App Store, or the Windows Store,
developers must ensure that their apps follow rules and   Consider This: If an app is available as both
conditions that their publishers issue. For example, apps a mobile web app and in an app store for you to
must run properly, may not contain offensive content, download, which would you be more likely to use?
and should notify the user when requesting the current Why? Suppose you have a great idea for an app,
location or access to information stored on the device. and you raise enough money to hire an experienced
Developers pay an annual fee to publish apps in an app developer to build it for you. Would you ask the
store. The store retains a percentage of the sales price of developer to code it as a web, hybrid, or native app?
any apps sold as a commission. Why? Does your choice depend on the capabilities
and requirements of the app?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

572 Chapter 12  Working in the Enterprise

Now you should know
Be sure you understand the material presented in the section titled Technology Careers as it relates to the chapter objectives.
Now you should know…

• Which technology fields you find interesting (Objective 4)
• Which technology jobs you might like to pursue (Objective 5)
• How mobile apps are developed (Objective 6)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

Technology Certifications

A certification demonstrates your knowledge in a specific area to employers or potential

employers. Organizations often require technology certification to ensure quality standards and

to confirm their workforce remains up to date with respect to technology.

Most certification programs do not require academic

­coursework. Test results alone determine certification.

Few professionals, however, have the experience and

skill set to take a certification exam without preparation.

To assist in preparing for a certification exam, several

training options are available: self-study, online training,

instructor-led training, and web resources. Authorized

testing centers provide most certification exams for a

fee. The exam sponsor’s website t­ypically lists testing

centers near you. On the website, you can schedule and

pay for your exam (Figure 12-12). At a testing center,

you may use a computer to take the examination, or you

may mark your answers on a form that will be read by

a s­canner for grading. You likely will know before you

Figure 12-12  Certification exam sponsors, such as (ISC)2 shown here, leave the testing center whether you passed the examina-
provide ways for you to prepare for exams, register and pay for exams, tion. Some tests are in a multiple-choice format. Others
and more. are skill based. If you do not pass an exam, you may have

Source: (ISC)2 to pay the fee again to retake it.

Obtaining a certification requires time and money. Certifications d­ emonstrate your commitment

BTW to your chosen area. When deciding whether to obtain a certification, consider your long-term
career goals, as well as your current experience. Read evaluations of the certification to determine
Exam Day its value in the industry you have chosen. Examine employment p­ rojections and available job
Before taking a opportunities to determine if it is worth obtaining the certification.
certification exam,
read the instructions Technology certifications are available in many areas, some of which are discussed next.

provided by the testing Application Software Certifications
center to ensure you

bring all necessary Although numerous types of application software exist, several programs have achieved national

supplies, equipment, or recognition for use as business and graphics tools. Most sponsors of application software certifica-
technology. Print a copy tions have a partner training program and encourage computer-training centers to be authorized
of the directions in case training representatives. A popular application software certification includes Microsoft Office
your GPS device or app Specialist, which tests a user’s skills of Microsoft Office programs.
fails. Arrive early and
silence or turn off your As with most other certifications, v­ endor-authorized testing facilities take registrations and

mobile devices. Know administer the certification test. People with the following jobs may be interested in application

approximately how long software certification: • Office managers/workers • Technology teachers
the exam will take so • Corporate trainers
that you can use your
• Help desk specialists • Technology sales representatives
time wisely.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 573

Discover More: Visit this chapter’s free resources to learn more about available application
software certifications.

Data Analysis and Database Certifications BTW

Data analysis certifications focus on the discovery, collection, and analysis of evidence on High-Tech Talk
computers and networks. These certifications often contain the word, forensics, in their title. Discover More: Visit
Database certifications cover the tasks required to support a database management system. If this chapter’s free
you are interested in working with data analysis or database certifications, you also may benefit resources to learn about
from certifications in hardware, networking, programming, and security. bioinformatics (where
biologists use technology
People with the following jobs may be interested in data analysis and database certification: to analyze, store, and
retrieve biological
• Data scientist information).
• Database administrators
• Database analysts
• Digital forensics examiners

Discover More: Visit this chapter’s free resources to learn more about available data analysis
and database certifications.

Hardware Certifications

Hardware certifications vary in scope from a narrow focus with an emphasis on the repair
of a specific device to an integrated hardware solution that addresses a company’s current and
future computing needs. Obtaining an advanced certification in hardware implies that you
have achieved a standard of competence in assessing a company’s hardware needs, and you can
implement solutions to help the company achieve its computing goals. A popular hardware
c­ ertification includes A+, which tests knowledge of computer setup, configuration, maintenance,
troubleshooting, basic networking skills, and system software.

People interested in hardware certifications also may benefit from networking and operating
system software certifications, which are closely tied to advanced hardware knowledge. People
with the following jobs may be interested in hardware certification:

• Cable installation technicians
• Computer repair technicians
• Corporate trainers
• Help desk specialists
• IT consultants
• System engineers and administrators

Discover More: Visit this chapter’s free resources to learn more about available hardware
c­ ertifications.

Networking Certifications

Network expertise is acquired through years of experience and training because so many
variables exist for a total network solution. Obtaining an advanced certification in ­networking
implies that you have achieved a standard of competence, enabling you to address the complex
issues that arise when planning, installing, managing, and troubleshooting a network. Cisco,
Novell, Sun, and others offer certifications that test knowledge of installing, configuring,
o­ perating, and administering networks.

People in the following careers may be interested in network certification:

• Hardware service technicians
• IT consultants
• Network managers
• Network engineers
• System administrators

Discover More: Visit this chapter’s free resources to learn more about available networking
certifications.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

574 Chapter 12  Working in the Enterprise

Operating System Certifications

Several options for various knowledge levels are available to those seeking operating system
certifications. These certifications focus on particular skills of the user, the operator, the system
administrator, and the software engineer. IBM, Microsoft, Novell, RedHat, Sun, and others offer
certifications that test knowledge of their operating systems.

If you are interested in an occupation as an operating system administrator or software
­engineer, you also may benefit from certifications in networking, hardware, and the Internet.
These additional certifications are closely linked to the operating system and serve to broaden
expertise in that area. (Read Secure IT 12-3 to learn about risks associated with users who
make unauthorized modifications to operating systems.) People with the following jobs may be
­interested in a certification in operating systems:

• Hardware technicians
• Help desk specialists
• Network administrators
• IT consultants
• System administrators

Discover More: Visit this chapter’s free resources to learn more about available operating
s­ ystem certifications.

Secure It 12-3 restrictions. This process, called ­jailbreaking, instability, shortened battery life, unreliable
generally refers to ­hacking into Apple’s iPhones voice and data, disruptions of services, and
Risks of Jailbreaking and Rooting and iPads, whereas a similar term, rooting, the inability to apply future software updates.
refers to products ­running Android and other The unauthorized modification violates the
Copyrights protect creators of original works, operating systems. end-user license agreement (EULA), so the
and digital rights management (DRM) strate- device may no longer be covered by the
gies were developed to prevent people from When software developers create apps for manufacturer’s warranty.
pirating the owners’ digital content. (Refer to Apple’s iOS, Apple scrutinizes the software
Chapter 5 for details about copyrights and to ensure it adheres to strict guidelines. This Consider This: Do you know anyone
piracy.) Hardware manufacturers include DRM review process helps maintain integrity and with a jailbroken smartphone or mobile
software on their products to control the apps security. When the phone or mobile device device? Should Apple ease the limitations
and other programs that can be installed. is jailbroken, however, this reliability no that are placed on changing iOS default
When users want to run unapproved apps and longer exists. Apple states that jailbreaking s­ettings or installing apps and other s­oftware
customize their smartphones or mobile devices, causes these issues: security vulnerabilities, from w­ ebsites other than the App Store?
they can make unauthorized modifications to
the operating system and bypass the DRM

BTW Programmer/Developer Certifications

High-Tech Talk Various certifications are available in the programmer/developer area. These certifications
Discover More: Visit this usually are supported with training programs that prepare applicants for the certification test.
chapter’s free resources A popular specific programmer/developer certification includes Google Apps Certified Specialist,
to learn how game which tests a user’s skills of administering, selling, and deploying Google Apps. A more broad
developers create 3-D development certification includes Project Management Professional (PMP), which tests knowledge
graphics, which appear of tasks required during system development.
to have height, width,
and depth, giving If you are interested in developing applications, you also may benefit from certifications in
realistic qualities to networking and web design. These certifications are closely tied to programming and may
objects. broaden employment opportunities. People with the following jobs may be interested in a
p­ rogrammer/developer certification:

• Game developers
• IT consultants
• Mobile application developers
• Project leaders/managers
• Systems analyst
• Web developers

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 575

Discover More: Visit this chapter’s free resources to learn more about available programmer/
developer certifications.

Security Certifications

Security certifications measure a candidate’s ability to identify and control security risks
­associated with any event or action that could cause a loss of or damage to computer ­hardware,
software, data, information, or processing capability. (Read Secure IT 12-4 to ­consider the
effects of inadequately protected customer data.) While some security certifications focus solely
on network and Internet security, others include measures to secure operating systems, applica-
tion programs, and information systems, as well as the physical facility and its people. A popular
specific security certification includes Certified Information Systems Security Professional (CISSP),
which tests in-depth knowledge of access control methods, information systems development,
cryptography, operations security, physical security, and network and Internet security. Some
security certifications relate specifically to the area of digital forensics.

People in the following careers may be interested in security certification:

• Information security officers and managers
• Law enforcement officials
• Military intelligence officers
• Network administrators
• Wireless network administrators
• Network security specialists
• Security administrators

Discover More: Visit this chapter’s free resources to learn more about available security
c­ ertifications.

Secure It 12-4 properly. The group’s members are unknown, schemes to stolen equipment. Cybersecurity
so o­ fficials are unable to hold them respon- risks affect all businesses because criminals
Protecting Customer Data sible for their actions. know how to manipulate technology to
compromise the networks and install
Many for-profit and nonprofit companies and Customers, however, sued the company malware. The U.S. Department of Homeland
organizations have been affected by malware for the breach. One lawsuit stated that the Security, U.S. Secret Service, and the National
intrusions into their point-of-sale systems. company’s lack of encryption and adequate Cybersecurity and Communications Integration
Hackers have broken into retail servers and firewalls makes it responsible for the hackers’ Center work to locate organized criminal
accessed data for millions of credit and actions. Officials agreed, with one stating, “If groups, warn organizations about potential
debit card accounts. In one situation, they you are responsible for so many payment card unauthorized access, and detect intrusions.
broke into a large entertainment company’s details and log-in details, then keeping that They provide information about performing
server, disrupting service to its customers personal data secure has to be your priority.” risk assessments, installing backup systems,
and publishing personal data for millions of Customers held the company responsible for and establishing security policies.
customers, including passwords and possibly the delay in notification. The attack ultimately
credit card information. The breached com- cost the company an estimated $170 million. Consider This: Should hackers be
pany allegedly waited one week to inform Since the breach, the company changed its punished for exposing customer data? Why
customers about the attack. The hackers who user agreement policies. The new policy states or why not? What expectations of security
exposed this company’s data were part of that by agreeing to use its products, users give should customers have when they enter
a well-known activist group that routinely up the right to sue for security breaches. personal data on a website or form? Should
targets large corporations and government companies be able to prevent customers from
agencies to expose data vulnerabilities and to Thousands of other corporate security suing them? Why or why not?
protest policies. The group claimed that the breaches have ranged from email phishing
company had not encrypted the exposed data

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

576 Chapter 12  Working in the Enterprise

BTW Job Searching and Career Planning

Counselors and Alumni Many job opportunities may exist in your industry, so it is important to narrow down the available
If your school has jobs to ones for which you are qualified and in which you are interested. Tools at your disposal
a career center or include the career service department at your school (Figure 12-13), career planning websites, and
alumni network, take online social networks. Read How To 12-3 to learn how to start your job search online.
advantage of these
valuable resources. Whether you are seeking a new job or currently are employed, you may find a career planning
Career counselors and website useful. Career planning websites often allow you to post your resume online or enter
experienced alumni can your resume information in a form at the website for potential employers to review. Many also
help you prepare for offer mobile apps. Examples of popular career planning websites include CareerBuilder, Dice, and
and secure an interview Monster. Use a search engine to locate these career planning websites and their mobile apps.
in your chosen field.
They also might provide Discover More: Visit this chapter’s free resources to learn more about career planning
references to potential ­websites.
employers.

Figure 12-13  A college or university career services website, such as the Illinois
State University one shown here, provides helpful career planning information.

Source: Illinois State University

How to 12-3 2. Follow an organization’s activity on also can use them to research corporate
Facebook, Twitter, LinkedIn, and other work environments, technology news, and
Start Your Job Search Online social media channels. opportunities for professional networking.
Starting your job search online will help you 6. Upload your resume to career planning
locate available jobs and determine whether 3. Research a company’s online activity to websites and job search websites. Create
you are qualified to apply. Performing your become familiar with some of the products, the resume in a word processing program
research online will save time applying and services, and opportunities that they provide. and then save it in the PDF format so that it
interviewing for jobs for which you are not has a consistent appearance when viewed
qualified. The following steps describe how to 4. Visit career services websites hosted by on a variety of computers or mobile devices.
start your job search online. your college or university. These websites
often contain information about career   Consider This: Have you ever searched
1. Begin your job search by reviewing the fairs, resume planning workshops, and for a job online? Why or why not? If so, were
information on online social networks, campus recruitment activities. you successful in finding a job for which you
job search websites, and organizations’ were qualified?
­websites. On these websites, you can learn 5. Consider visiting a career planning
about career opportunities and p­ repare ­website. These websites offer information
for an interview. about available jobs and local salaries. You

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 577

Mini Feature 12-3: Creating a Professional Online Presence BTW

In addition to the information provided in a job application and resume, many employers will Online Social Networks
search the web to learn more about job candidates. For this reason, both beginning and estab- Online social networks
lished technology professionals promote themselves online. Read Mini Feature 12-3 to learn revise their privacy settings
about creating a professional online presence. often. Periodically revisit
your privacy settings on
Mini Feature 12-3 all personal social media
accounts to ensure you
Creating a Professional Using LinkedIn have chosen the most
Online Presence current options that will
LinkedIn is an online social network where secure your privacy.
An understanding of the web, digital media, and professionals, such as Reid Hoffman, founder of
online social networks, such as LinkedIn, is beneficial LinkedIn, can create Source: LinkedIn
in creating your online presence. profiles and connect with
coworkers and industry
Recommended Online Strategies colleagues. LinkedIn uses
the term, contacts, to
A professional online presence that positively describe the individuals in
conveys your accomplishments, skills, interests, your professional network
and personality offers potential employers a more and also stores your
complete picture of you beyond what can be conveyed relationship with each
in a resume. contact in your network.
Read How To 12-4 for
• Register a form of your name as a domain name and steps to create a LinkedIn
host a blog or website at that web address. If your profile.
name is not available or you do not have access to
a web server, include your name as part of the web Use LinkedIn to:
address for your website on a free service, such as
Blogger or WordPress. • Connect with or stay in touch with current and former
coworkers and classmates.
• Avoid informal or humorous names for your account
profiles, blog title, or domain name. • Follow companies on LinkedIn to stay informed of job
openings.
• Include a photo of yourself that presents your
best self. • Use LinkedIn’s employment database to learn about
career opportunities. View the job listing to find
• Use a webcam to create a 30-second video the name of the person who posted the job and to
in which you introduce yourself. In the video, determine the connections between you and those
­summarize your skills and professional interests. members you might want to contact in order to learn
Post the video on YouTube or another video about a company or open jobs.
­sharing site and include a link to it on your blog
or website. • Join groups of people with similar interests or
experiences. For example, your school’s alumni group,
• Upload a PDF file of your resume, and include a link people who work at the same company, people look-
to it on your blog or website. ing to share experiences they had when starting their
own businesses, and people who use specific apps
• Include links to your LinkedIn and Twitter profiles on might be willing to share their expertise.
your blog or website.
• Consider expanding your network by connecting with
• Include links to any other publications, articles, your contacts’ connections. If you invite an extended
videos, or digital content you have created. contact to connect, be sure to include a note that
introduces yourself and indicates your professional
• Create consistent accounts on online social networks. reason for connecting.
Read Ethics & Issues 12-4 to consider ways that
social media can help in your job search. Discover More: Visit this chapter’s free resources
to learn more about maintaining a professional online
• Post appropriate content to your blog, website, or presence and using LinkedIn.
online social networks regularly.
  Consider This: What online resources should you
• Before uploading your resume or publishing your use to create a professional online presence? Why?
blog or website, ask at least two people to proofread What groups or companies should you join or follow
content for any spelling and grammar mistakes. Keep on LinkedIn? What steps will you take to enhance your
the language professional. professional online presence?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

578 Chapter 12  Working in the Enterprise

Ethics & Issues 12-4 activities), but also for reasons to offer the colleagues, and industry contacts. Present
candidate a position. A social media profile consistent information, especially regarding
How Can Social Media Help that presents you as professional and lists education and experience, across all social
Your Job Search? your qualifications can lead an employer to media platforms. Consider using Twitter to
It is no secret that what you do or say put you ahead of others. Employers also use share industry news, to demonstrate not
on social media can affect you in the job social media to determine if a candidate’s only your interest, but your enthusiasm for
search. As previously mentioned, many personality would fit into the corporate the field.
employers check potential employees’ culture.
social media profiles, including Facebook, Consider This: Does your social media
Twitter, Google+, and LinkedIn, as part of Instead of hiding all information behind presence reflect your interest in your
the screening process. You likely are aware privacy settings, employment experts desired field? What changes can you
that you should use privacy settings and to recommend several social media strategies make so that your profile stands out
be careful what you post, but how can you for job seekers. Create a profile that among other job candidates? How does
use social media tools to aid you in your shows an interest in topics relevant to your profile compare to ­others in your
job search? your profession. Use LinkedIn and other industry? What can you gain by using
resources to follow companies and industry social media to network or find industry
Employers not only look for red flags professionals to be aware of events, news, information?
(inappropriate or inflammatory posts, or job openings. Network with students,
typographical errors, poor grammar, or
photos that show unsavory or unethical

How to 12-4 clearly shows your face, and make certain people you may know from a school
you are dressed professionally in the you attended or company for which you
Create a Professional Presence photo. work(ed).
on LinkedIn 6. Ask other members to provide
Building a professional profile and network 3. Include comprehensive information about ­recommendations about your skills.
on LinkedIn can help you locate profession- your work experience, education, and 7. Review your extended contacts (the
als who can introduce you to employees at skills. network of your contacts’ contacts) and
companies where you might like to work. determine whether you should connect
In addition, LinkedIn also helps prospec- 4. If you have any professional publications, directly with any of them.
tive employers locate you. Upon joining websites, or blogs, be sure to list them 8. As your work experience, education, or
LinkedIn, you specify a profile that allows and provide web addresses. skills change, be sure to promptly update
contacts, prospective contacts, and others your LinkedIn profile.
to learn about you. The following steps 5. Build your network on LinkedIn by
describe how to create a professional ­finding other LinkedIn members to add   Consider This: What professional
­presence on LinkedIn. to your network. To see if any of your ­information is, or will you put, in your
current acquaintances are on LinkedIn, LinkedIn profile?
1. Include your full name, and avoid using you can import email addresses from
nicknames. your email address book or import pro-
files of friends from other online social
2. Select and upload a professional photo. networks. LinkedIn also may suggest
Consider using a high-quality photo that

Now you should know 
Be sure you understand the material presented in the sections titled Technology Certifications, and Job Searching
and Career Planning, as it relates to the chapter objectives.
Now you should know . . .

• How you can prepare for a certification (Objective 7)
• Which types of certifications you find interesting (Objective 8)
• How you can begin a job search (Objective 9)
• How you can create a professional online presence (Objective 10)

Discover More: Visit this chapter’s premium content for practice quiz opportunities.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 579

Chapter Summary

This chapter discussed information systems used in an enterprise. It also presented various
­technology career fields and specific technology jobs. It then discussed technology certifications.
Finally, it described how to begin a job search and create a professional online presence.

Discover More: Visit this chapter’s free resources for additional content that accompanies this
chapter and also includes these features: Technology Innovators: Wikimedia Foundation/Jimmy
Wales, Ray Kurzweil, Meg Whitman, and Salesforce; Technology Trends: Crowd Sourcing and
Monitoring Health Status; and High-Tech Talks: 3-D Graphics and Bioinformatics.

Test your knowledge of chapter material by accessing the Study Guide, Flash Cards, and
Practice Test resources from your smartphone, tablet, laptop, or desktop.

Technology @ Work structure before it is built, which can save total cost to build the structure. If, while
time and money during the construction construction is ongoing, a need arises to
Architecture and Design process. This software also eliminates most, modify the building’s design in some way,
While walking down the city street, you if not all, of the manual drafting required. computers can incorporate a change and
stop to admire a new skyscraper with the quickly provide plans for the new design.
most striking architectural features you ever Engineers use computers to determine
have seen. You think to yourself that those the type of foundation required to support The next time you notice a building
responsible for designing the building are the building and its occupants; the heating, under construction, stop to think about how
nothing less than brilliant. While a great ventilating, and air conditioning (HVAC); computers and technology have increased
deal of time is spent by people designing the electrical requirements; and how the the efficiency of the architecture and design
the building, computers and technology also building may withstand external threats, process.
play an important role in making the process such as hurricanes and tornadoes.
more efficient. Today’s tools allow architects   Consider This: How else might
and designers to see exactly what a finished At the conclusion of the architecture and c­ omputers and technology be used in
building will look like before construction design process, contractors can use the a­ rchitecture and design?
even begins. information from computers to estimate the

During the preliminary design process, © LDprod / Shutterstock.com
architects and design firms use CAD
software to design the appearance and
layout of a new building and can provide
clients with a 3-D walk-through of a
building so that they can determine whether
the proposed design will meet their needs.
Later, the program can be used to include
the placement of support beams, walls,
roof shape, and so on, and also conform to
building codes.

CAD software also allows engineers
in various fields, such as mechanical
and electrical, to design separate layers
in a structure. The software then can
superimpose the designs to check for
interactions and conflicts, such as if a
structural beam in one layer interferes with
a drain in another layer. The CAD software
makes it easy to modify and correct the

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

580 Chapter 12  Working in the Enterprise

STUDENT ASSIGNMENTS Study Guide The Study Guide exercise reinforces material you should know for the chapter exam.

Discover More: Visit this chapter’s premium content to test your knowledge of digital content associated with
this chapter and access the Study Guide resource from your smartphone, tablet, laptop, or desktop.

Instructions: Answer the questions below using the format that helps you remember best or that is required by your instructor. Possible formats
may include one or more of these options: write the answers; create a document that contains the answers; record answers as audio or video using
a webcam, smartphone, or portable media player; post answers on a blog, wiki, or website; or highlight answers in the book/e-book.

1. A(n) _____ system is a set of hardware, software, data, people, 24. Define the roles an IT consultant might fulfill.
and procedures that work together to produce information.
25. Explain issues surrounding outsourcing and offshoring of jobs.
2. List and describe seven criteria that make information valuable.
26. List requirements and available careers for the following areas:
3. Describe how functional units in an enterprise use information system development; technology operations; web marketing and
systems. social media; data storage, retrieval, and analysis; information and
systems security; and app development and mobile technologies.
4. Define the term, enterprise resource planning (ERP). What are
the advantages of ERP? 27. Describe three approaches to developing mobile apps.

5. Explain the uses of and relationship between a document 28. Explain how and why an employee or employer might value or
management system (DMS) and a content management require technology certifications. What options are available to
system (CMS). prepare for a certification exam?

6. Describe security issues surrounding use of a CMS. List uses of 29. Describe the benefits of obtaining an application software
a CMS. certification. List jobs that may require, or jobholders who may
benefit from, obtaining this certification.
7. List transactions that may occur when using a transaction
processing system (TPS). Differentiate between batch and 30. Explain the focus of a data analysis certification. List jobs that
online transaction processing. may require, or jobholders who may benefit from, obtaining
this certification.
8. Define the term, management information system (MIS).
Differentiate among the three types of reports an MIS generates. 31. Explain why an employee might obtain an advanced hardware
certification. _____ is a popular hardware certification.
9. Describe how a decision support system (DSS) is used. OLAP
stands for _____. 32. List jobs that may require, or jobholders who may benefit
from, obtaining a hardware certification.
10. List types of internal and external sources used in a DSS.
33. Explain the expertise necessary to achieve a networking
11. A(n) _____ system is an information system that captures and certification. List jobs that may require, or jobholders who may
stores the knowledge of human experts and then imitates benefit from, obtaining this certification.
human reasoning and decision making. Define the terms,
knowledge base, inference rules, and artificial intelligence (AI). 34. List options that are available for operating system certification.
Name companies that offer operating system certifications.
12. Define the components of information literacy. List steps in
effective research and composition. 35. List jobs that require, or jobholders who may benefit from,
obtaining an operating system certification.
13. List guidelines for setting up your home office for
telecommuting. Explain issues surrounding telecommuting. 36. Explain security issues surrounding jailbreaking and rooting.

14. List and describe the areas typically found in an IT department. 37. List examples of programmer/developer certifications. List
jobs that may require, or jobholders who may benefit from,
15. Describe the technology equipment field, and list possible jobs obtaining this certification.
in this area.
38. Explain what is measured by obtaining a security certification.
16. Explain different types of companies in the software and Name one popular specific security certification.
apps field.
39. Describe how security breaches of customer data might
17. Explain security issues that arise when using unlicensed software. occur. Explain the responsibility of a company to protect its
customer data.
18. Describe the technology service and repair field. Explain how
technicians use diagnostic software. 40. List jobs that may require, or jobholders who may benefit
from, obtaining a security certification.
19. Explain the issues surrounding data recovery and computer
repair services. 41. List steps to start your job search online.

20. List criteria needed to be a technology salesperson. Describe 42. Explain how a job seeker might use a career planning website.
various careers in this field. List examples of popular career planning websites.

21. Explain how to evaluate extended warranty options for 43. List strategies to create a professional online presence. Explain
electronic devices. how professionals use LinkedIn.

22. Describe the role of a corporate trainer. 44. Explain how social media can help your job search.

23. Explain the responsibilities and educational requirements of a 45. List steps to create a professional presence on LinkedIn.
help desk specialist.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 581

You should be able to define the Primary Terms and be familiar with the Secondary Terms listed below. Key Terms STUDENT ASSIGNMENTS

Discover More:  Visit this chapter’s premium content to view definitions for each term and to access the Flash
Cards resource from your smartphone, tablet, laptop, or desktop.

Primary Terms  (shown in bold-black characters in the chapter)

artificial intelligence decision support system help desk specialist/help search engine
(AI) (560) (559) desk technician (569) optimization (SEO)
expert (569)
cloud architect (568) desktop or mobile information system (554)
computer security application programmer/ Internet/social media security analyst (570)
developer (570) security system project
specialist/mobile marketing specialist (569)
security specialist (570) digital forensics analyst IT consultant (568) manager (570)
computer technician (569) (570) management information systems analyst (568)
content management systems programmer
system (CMS) (577) digital forensics examiner system (MIS) (558)
customer relationship (569) mobile strategist (570) (568)
management (CRM) mobile technology expert technical project manager
specialist (569) document management
data scientist (569) system (DMS) (556) (570) (596)
database administrator network administrator/ user experience (UX)
(569) Enterprise Resource
database analyst (569) Planning (ERP) engineer (569) designer (569)
database designer (568) (555) network security web analytics expert

expert system (560) administrator (570) (569)
games designer/ program and app web designer (568)
web developer (568)
programmer (570) developer (568)

Secondary Terms  (shown in italic characters in the chapter)

A+ (573) hybrid app (571) salesforce automation (SFA) (555) technology service and repair
batch processing (558) inference rules (560) software and apps field (564) field (565)
Certified Information Systems information literacy (561) summary report (558)
jailbreaking (574) technology equipment field (564) transaction processing system
Security Professional (CISSP) knowledge base (560) (TPS) (557)
(575) Manufacturing Resource Planning II
computer-aided engineering (CAE)
(555) (MRP II) (555)
computer-aided manufacturing Material Requirements Planning
(CAM) (555)
customer relationship management (MRP) (555)
(CRM) (555) Microsoft Office Specialist (572)
detailed report (558) native app (571)
exception criteria (558) online analytical processing
exception report (558)
Google Apps Certified Specialist (OLAP) (559)
(574) online transaction processing
human resources information system
(HRIS) (555) (OLTP) (558)
Project Management Professional

(574)
rooting (574)

decision support system (559)

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

582 Chapter 12  Working in the Enterprise

STUDENT ASSIGNMENTS Checkpoint The Checkpoint exercises test your knowledge of the chapter concepts. The page number c­ ontaining
the answer appears in parentheses after each exercise. The Consider This exercises challenge your
u­ nderstanding of chapter concepts.

True/False  Discover More: Visit this chapter’s premium content to complete the Checkpoint exercises interactively;
­complete the self-assessment in the Test Prep resource from your smartphone, tablet, laptop, or desktop;
and then take the Practice Test.

Mark T for True and F for False.

1. Accessible information has meaning to the person who receives it. (554)

2. A typical enterprise consists of a wide variety of departments, centers, and divisions — collectively known as
functional units. (554)

3. CMSs are popular in large part because of their ease of use; CMS operators need minimal technical skills. (557)

4. In most circumstances, the licensed software owner can make multiple copies of software, for back up or to
share with other users. (565)

_____ 5. It is good practice to back up and wipe all data before turning over your computer or device to an IT or
computer repair technician. (566)

_____ 6. With third-party extended warranties, it is easier to obtain quick service for your device than returning it to
the retailer. (567)

_____ 7. Educational requirements for help desk specialists are far more stringent than they are for other careers in the
technology field. (567)

_____ 8. Apps developed for a specific mobile platform or device generally work on any other device without any
modification. (571)

_____ 9. Like native apps, hybrid apps are developed for specific platforms and deployed to an app store. (571)

_____ 10. Most professionals have the experience and skill set to take a certification exam without preparation. (572)

_____ 11. Data analysis certifications focus on the discovery, collection, and analysis of evidence on computers and
networks. (573)

_____ 12. Employers often use social media to determine if a candidate’s personality would fit into the corporate culture. (578)

Multiple Choice  Select the best answer.

1. _____ information is arranged to suit the needs of the 5. In an expert system, the _____ is the combined subject

decision maker. (554) knowledge and experiences of the human experts. (560)

a. Verifiable c. Timely a. inference rules c. decision support

b. Organized d. Cost-effective b. artificial system

2. A(n) _____ allows for storage and management of a intelligence (AI) d. knowledge base

company’s documents. (556) 6. Which of the following skills is not necessary for
technology salespeople? (566)
a. CMS c. MRP II a. a general understanding of technology
b. specific knowledge of the product they are selling
b. DMS d. ERP c. testing internal components
d. strong people skills
3. With _____, the computer processes each transaction

as it is entered. (558)

a. batch processing c. rooting

b. inference d. online transaction 7. A(n) _____ is written for mobile devices running a

rules processing particular mobile phone operating system. (571)

4. A(n) _____ report consolidates data usually with totals, a. native app c. DSS
tables, or graphs. (558)
a. detailed b. hybrid app d. expert system
b. summary
c. exception 8. If you are interested in developing applications, you
d. criteria
also may benefit from certifications in _____. (574)

a. hardware c. networking and web

b. operating design

system d. CISSP

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 583

Checkpoint STUDENT ASSIGNMENTS

Matching  Match the terms with their definitions.

_____ 1. MRP (555) a. processing system in which the computer processes each transaction as it is entered

_____ 2. CRM (555) b. application of human intelligence to computers

_____ 3. ERP (555) c. information system that manages information about customers, past purchases,
interests, and the day-to-day interactions
_____ 4. OLTP (558)
d. program that combines features of native and mobile web apps
_____ 5. artificial intelligence
(560) e. process of hacking into iPhones and iPads in order to make unauthorized
modifications to the operating system and bypass DRM restrictions
_____ 6. inference rules (560)
f. broad development certification that tests knowledge of tasks required during
_____ 7. hybrid app (571) system development

_____ 8. A+ (573) g. information systems that monitors and controls inventory, material purchases,
and other processes related to manufacturing operations
_____ 9. jailbreaking (574)
h. hardware certification that tests knowledge of computer setup, configuration,
_____ 10. Project Management maintenance, troubleshooting, basic networking skills, and system software
Professional (574)

i. set of logical judgments that are applied to the knowledge base each time a user
describes a situation to the expert system

j. integration of MRP II with the information flow across an organization to
manage and coordinate the ongoing activities of the enterprise

Consider This  Answer the following questions in the format specified by your instructor.

1. Answer the critical thinking questions posed at the end 15. What are the benefits of telecommuting? (563)
of these elements in this chapter: Ethics & Issues (563,
566, 568, 578), How To ( 563, 567, 576, 578), Mini 16. What are some responsibilities of IT staff? (564)
Features (561, 571, 577), Secure IT (557, 565, 574,
575), and Technology @ Work (579). 17. What careers are available in the technology
equipment field? (564)
2. What elements are contained in an information
system? (554) 18. Under what circumstances is software considered
unlicensed? (565)
3. What are the qualities of valuable information? (554)
19. What individuals might be best suited for a career in
4. What are some common information systems used by the technology service and repair field? (565)
functional units in a typical enterprise? (555)
20. How might your information be compromised if a
5. What are some advantages of ERP? (555) computer repair technician works on your computer
or mobile device? (566)
6. In addition to documents, what other items can be
included in a CMS? (557) 21. What skills must an IT consultant have? (568)

7. What factors make CMSs so popular? (557) 22. What are some disadvantages of offshoring? (568)

8. Who assesses CMS vulnerabilities? ( 557) 23. What knowledge is required to work in a technology
operations job? (569)
9. How does batch processing differ from online
transaction processing (OLTP)? (558) 24. What are some typical rules and conditions developers
must follow in order to deploy an app to an app
10. How do detailed reports, summary reports, and store? (571)
exception reports differ? (558)
25. What are the drawbacks of hybrid apps? (571)
11. What are some examples of internal and external
sources that a decision support system might use? (559) 26. What options are available to help you prepare for a
certification exam? (572)
12. How do enterprises use expert systems? (560)
27. What is meant by the term, rooting? (574)
13. What are some capabilities of artificial intelligence? (560)
28. What issues does jailbreaking cause? (574)
14. What are the five categories recognized as integral
literacy components? (561) 29. What tools can help you search for a job? (576)

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

584 Chapter 12  Working in the Enterprise

STUDENT ASSIGNMENTS Problem Solving The Problem Solving exercises extend your knowledge of chapter concepts by seeking
s­ olutions to practical problems with technology that you may encounter at home, school,
or work. The Collaboration exercise should be completed with a team. 

Instructions: You often can solve problems with technology in multiple ways. Determine a solution to the problems in these exercises by using
one or more resources available to you (such as a computer or mobile device, articles on the web or in print, blogs, podcasts, videos, television, user
guides, other individuals, electronics or computer stores, etc.). Describe your solution, along with the resource(s) used, in the format requested by
your instructor (brief report, presentation, discussion, blog post, video, or other means).

Personal Professional

1. Keywords for Job Search  After taking your thirdSource: (ISC)2 6. Staying Current with Technology  Having accepted
computer class, you realize that you would like to train a job as a computer salesperson, you now realize
people how to use computers and software. You look the importance of staying up to date with the latest
for a job online and are asked to enter some keywords technologies and products. What are three ways that
for your job search. What keywords will you enter to you can stay current in the technology field while
find a job that allows you to train others how to use working full time?
computers and software?
7. Outsourcing IT Positions  As the chief information
2. Online Job Search  Having decided to work in the officer for a large organization, you consider
computer equipment field, you begin your job search outsourcing various positions within your department
online. In addition to looking on job search websites for to save money. What are some types of positions that
available positions, where else might you find job postings? can be outsourced easily? What positions might be
difficult to outsource? Why?
3. Documenting Education and Experience  You are
preparing your resume to submit to a computer service 8. Conducting an Interview  You are preparing to
and repair company. You have studied computer conduct several interviews for candidates applying for
service and repair in various classes and want to a job as a senior systems administrator. What types of
convince your prospective employer that you are the questions will you ask during the interview to determine
best candidate for the job. What might convince the whether they have the experience required to fulfill the
employer to offer you a job? job responsibilities?

4. Contemplating a Job Offer  After graduating from 9. Tough Decision  Two top candidates who applied for a
college with a degree in computer science, you send job within your organization have interviewed well, and
your resume to several companies. Almost immediately, you are having difficulty selecting which candidate should
you receive a job offer as a technical support be offered the job. One candidate has several certifications
representative in a midsized organization. Will you and only two years of job-related experience, while
accept this job offer or wait for additional offers? Why? the other candidate has six years of experience, but no
certifications. What decision will you make, and why?
5. Appropriate Certification  Because you hope to
pursue a career as a system administrator, you would like 10. Training Decision  Your boss has allocated money to
to obtain a certification. allow everyone in the IT department to attend training
Many certifications are related to their job responsibilities. While researching the
available, but you want training available for your job as a system administrator,
to choose the one(s) that you learn that you either can take a semester-long course
will best prepare you at a local university or attend an accelerated one-week,
for your future career. forty-hour training course. At the end of each training
Which certification(s) session, you will be ready to become certified. Which type
will you consider? of training will you choose? Why?

Collaboration

11. Technology in Architecture and Design  As a student in a drafting class, your instructor has challenged you to design
your dream home by using programs and apps wherever possible. Form a team of three people that will determine how to
accomplish this objective. One team member should compare and contrast two programs or apps that can be used to create
a two-dimensional floor plan, another team member should compare and contrast two computer-aided design programs
or apps that can create a more detailed design of the house, and the third team member should compare and contrast two
programs or apps that can assist with other aspects of the design process, such as landscaping and interior design.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 585

The How To: Your Turn exercises present general guidelines for fundamental skills How To: Your Turn STUDENT ASSIGNMENTS
when using a computer or mobile device and then require that you determine how to
apply these general guidelines to a specific program or situation.

Discover More: Visit this chapter’s premium content to challenge yourself with additional
How To: Your Turn exercises, which include App Adventure.

Instructions: You often can complete tasks using technology in multiple ways. Figure out how to perform the tasks described in these exercises by
using one or more resources available to you (such as a computer or mobile device, articles on the web or in print, online or program help, user guides,
blogs, podcasts, videos, other individuals, trial and error, etc.). Summarize your ‘how to’ steps, along with the resource(s) used, in the format requested
by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1 Conduct an Effective Interview c. Pay attention carefully, with your ears and your
eyes. What you hear normally is most important,
Gathering information is an important task, whether but body language and other movements often
you are trying to assess whether a job candidate would convey information as well. Concentrate on the
be a good fit for an open position, or if you need to interviewee — expect that you will make much
gather feedback about a new system you are develop- more eye contact with the person than he or
ing. An important means of gathering information is she will with you. Allow silences to linger — the
the personal interview. Interviews must be thorough normal impulse in a conversation is to fill the
and comprehensive. Prior to conducting an inter- silence quickly; in an interview, however, if you are
view, you must determine that an interview is the quiet, the person being interviewed might think of
best means for obtaining the information you seek. additional information.
You have learned a variety of ways to obtain informa-
tion, and you should use each of them appropriately. d. As you listen, concentrate on the interviewee.
Because an interview may interrupt a person’s ­schedule When points are being made, do not take notes
and takes time, you must be sure the information because that will distract from what the person
gained in the interview justifies this interruption. Once is saying; stay focused. Once the information has
you have determined you should conduct an interview been conveyed, jot down a note so that you will
to gather information, plan to ask questions that will remember.
generate useful answers. The following steps guide you
through the process of conducting an interview that e. Throughout the interview, offer reinforcing
ultimately will generate useful answers. comments, such as, “The way I understand what
a. Your questions should directly address the goals you just said is …” Make sure when you leave the
interview that no misunderstandings exist between
of the interview. Do not expect the person being you and the person you interviewed.
interviewed to provide a tutorial. Your questions
must generate answers that supply you with the f. Before you conclude the interview, be sure all your
information you need to make a decision. goals have been met. You may not have another
b. Your questions should be thought-provoking. In opportunity to interview the person, so ensure
general, do not ask questions requiring a yes or you have asked sufficient questions to gain the
no answer. Your questions should not lead the information you need to make a decision.
interviewee to an answer — rather, the questions
should be open-ended and allow the person to g. After the interview, it is recommended you send a
develop the answer. As an interviewer, never argue follow-up email message or letter to the person you
with the person being interviewed, do not suggest interviewed to review the information you learned.
answers or give opinions, ask straightforward This message or letter should invite the interviewee
questions rather than compound questions, never to correct any errors you made in summing up
assign blame for any circumstance that might come your findings. In addition, for all the people you
up in the interview, and never interrupt while the interview, keep a record of the time and place of
person is talking. Finally, you, as the interviewer, the interview. In this way, if any questions arise
should not talk much. Remember, you are regarding the interview, you will have a record.
conducting the interview to gain information, and
it is the person you are interviewing who has that Interviewing Online
information. Let him or her talk.
If you are not in the same physical location as the people
you want to interview, it may be better to conduct the
interview online. If you plan to conduct the interview
online, consider the following advice:

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

586 Chapter 12  Working in the Enterprise

STUDENT ASSIGNMENTS How To: Your Turn b. Prepare your script. Before you start recording, write
and memorize the words you will say in the video.
• Plug in the computer or device so that you do not The video should be no longer than one minute,
have to rely on battery power. If you must rely on so write your script accordingly. Remember — you
battery power, be sure that the battery is fully charged. are trying to impress your potential employer.

• Use a wired Internet connection, rather than c. Set the stage. The lighting and image in the video
connecting to a wireless network, to minimize the risk are critical to making a professional-appearing
of losing Internet connectivity during the interview. video. You should use adequate light so that the
video is clear. Generally, you should arrange the
• Select a location for the video call that has a neutral camera for a head-and-shoulders shot.
background and is free from distractions.
d. Practice. You must practice your presentation in
• Know how to initiate or receive a video call. front of the camera. You can record and play back
• Exit your email, chat, and other unnecessary your practice recordings until you feel confident
about your presentation.
applications during the interview so that you
are not distracted or interrupted by alerts and e. Dress for the part. When on camera, the impression
notification messages. you make will be influenced by your attire and your
• Test the videoconferencing software in advance to personal grooming. You should dress as if you were
ensure the configuration works. doing a live interview.
• Adjust the microphone, webcam, and speakers before
the actual interview to ensure optimum call quality. f. Record the video. Your video should be no longer
• Practice switching between the videoconferencing than one minute, but you might want to divide it
app’s chat window and your desktop or a browser into segments. For example, you could separate
window, in case you want to share a link, send a file, your statement about why you want to work
or type a message during the interview. for a company from your statement about your
• Keep your eyes focused on the webcam so that you educational background.
will appear attentive.
Capture the Video
Exercises
After you have recorded the video on a video camera,
1. Think about the last time you were involved in an attach the video camera to the computer or insert the
interview (either as an interviewer or an interviewee). memory card from the camera into the computer and
What types of questions were you asked? Do you feel then complete the following steps:
the questions solicited useful answers? a. Run a program or app to capture the video.
b. Select the option to import a video from the location
2. If you were to interview a candidate for a technology-
related position, what types of questions would you ask? on which it was stored.
c. If necessary, navigate to the location of and select
3. What advantages do open-ended questions have? When
might a question requiring a brief answer be appropriate? the video to import.
d. Specify a name to identify the imported video.
2 Create a Video Resume e. Start the import process. This process may take
Resumes are used to inform potential employers about
your experience, education, qualifications, and other several minutes to complete.
important information. When using job search services f. When the import process is complete, display the
on the web, such as Monster, CareerBuilder, and Dice,
you often will submit your resume ­electronically. contents from the camera and verify the video has
A video resume contains a video of you speaking to imported correctly.
your potential employer, explaining your interest in
the job and why you think you are the best qualified Edit the Video
candidate. The following steps guide you through the
process of creating a video resume. After recording the video, you normally should edit it and
save it in a format that can be placed in your resume. To
Record the Video dit the video, complete the following steps:
a. Import the video clip(s) that will comprise
When you record the video resume, you must be aware of
several important elements: your video resume into a new project in
a. Make sure you have access to a computer with a the program or app you are using to create
your video.
webcam. Alternatively, you can record the video b. If you are working with multiple video clips,
with a more sophisticated camera. arrange them in the correct order.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 587

c. View the video clips in the order you desire to How To: Your Turn STUDENT ASSIGNMENTS
make sure the transition from one video clip to the
next is not obvious. If it is obvious, you either can Exercises
use editing features in the program or app to make
the transition less obvious, or you may need to 1. What type of information would you include in your
record one or more video clips again. video resume?

d. Review the audio quality to make sure it is clear 2. Compare and contrast three programs or apps that can
and that the volume is adequate. If necessary, use edit a video. Which one do you like the most? Why?
editing features in the program or app to reduce or Which one do you like the least? Why?
eliminate background noise.
3 Create an Online Survey
e. Avoid using special effects, such as sound effects, If you want to collect information from a group of
transitions, or other visual effects. The purpose of people, one way is to use an online survey. Online sur-
the video resume is to advertise you as a potential veys can be sent to many individuals across the globe,
employee, so do not include anything that may allowing you to collect responses in a timely manner.
distract from that. Multiple web apps exist that allow you to create and
distribute online surveys either for free or for a fee.
f. After you have edited the video, play the video from Each web app has slightly different features, so evalu-
beginning to end to make sure you are pleased with it. ate various options before deciding which one to use.
The following steps guide you through the process of
g. Save, but do not close, the project. creating an online survey.
h. Export the video to an appropriate format. Because a. Navigate to the website you want to use to create
the online survey.
you will be distributing this resume and possibly b. If necessary, create an account on the website
publishing it on the web, use a format that is hosting the web app.
of acceptable quality but does not generate an c. Select the option to create a new survey.
excessively large file. d. Enter a descriptive title for the survey.
e. Add the appropriate instructions to the survey.
Share Your Resume f. Add the questions to your survey. This includes:
• Choosing the correct question type
Now that you have edited your resume and exported • Entering a descriptive question
it, you are ready to share your video resume with • If necessary, specifying the answer choices
potential employers. • Selecting whether the question is required
• Specifying whether certain answers should
Saving in a Document prompt additional questions to appear
a. Open the document on your computer. g. Save the survey.
b. Use the commands in the word processing program h. Test the survey to make sure it functions as
intended.
to insert the video resume at the desired location. i. Distribute the survey to intended recipients.
c. Verify the video plays properly. j. When the due date for the survey passes, collect the
d. Save the document. survey results.
e. Open the document on another computer and
Exercises
make sure the video plays properly.
1. What are at least three reasons you might need to
Saving on the Web distribute an online survey in your desired field?
a. Connect to your web hosting company.
b. Upload the video to the folder that contains your 2. Compare and contrast at least three online tools that
can create and distribute surveys. Which one was your
website’s files. favorite? Why? Which one was your least favorite?
c. Modify the webpage that you want to include the Why? What are the differences between their free and
fee-based accounts?
video resume. You either can update the webpage so
that the video plays on the page itself, or so that the
webpage visitor has to tap or click a link to open
and play the video in a new window.
d. Save the changes to the webpage.
e. Run a browser, navigate to the webpage containing
the video resume, and make sure the video resume
plays as intended. You should test your video
resume from multiple computers and devices using
multiple browsers.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

588 Chapter 12  Working in the Enterprise

STUDENT ASSIGNMENTS Internet Research The Internet Research exercises broaden your understanding of chapter concepts by
requiring that you search for information on the web.

Discover More: Visit this chapter’s premium content to challenge yourself with additional
Internet Research exercises, which include Search Sleuth, Green Computing, Ethics in Action,
You Review It, and Exploring Technology Careers.

Instructions: Use a search engine or another search tool to locate the information requested or answers to questions presented in the exercises.
Describe your findings, along with the search term(s) you used and your web source(s), in the format requested by your instructor (brief report,
­presentation, discussion, blog post, video, or other means).

1 Making Use of the Web (b) Use at least two employment websites to search
for three job openings in your field. Which ­positions
Careers and Employment are available? What are their salaries, locations,
r­ equired education and experience, and job descrip-
It is a good idea to acquire information before ­graduation tions? Can job seekers post a resume? Are company
about the industry in which you would like to work. profiles and salary comparison available? Do these
While your teachers provide valuable training and websites have mobile apps?
knowledge to prepare you for a career, they rarely
teach you how to begin a job search. You can broaden 2 Social Media
your horizon by searching online for career information Companies have created policies that employees
and job openings. must follow when participating in social media and
online social networks. Intel, for example, considers
Career websites provide details about training and participation in social media to be an opportunity, not
education requirements, employment outlook, industry a right, and requires its employees to disclose their
trends, and salary data. They also offer advice on writ- identity, protect the company’s confidential and classi-
ing a cover letter and resume, applying for jobs online, fied information, and use common sense when writing
networking, and preparing for an interview. When you and airing opinions. Apple employees are urged to use
are offered a job, turn to these websites to obtain in- good judgment when using online social networks and
dustry salary comparisons and negotiation techniques. are barred from discussing the company on their own
websites and from commenting on or posting mes-
Job seekers can search employment websites, such as sages regarding the company and its products on any
CareerBuilder, Dice, and Monster, for specific posi- related websites.
tion openings worldwide. The jobs can be sorted by Research This: Locate at least two corporate p­ olicies
category, industry, location, date posted, job title, and for social media participation and summarize the
keywords. Some websites list job fairs and separate the ­requirements. Do you agree with the companies’
listings by categories, such as entry level, part time, guidelines? Are the policies too lenient or too strict?
summer, and temporary. What actions are taken if an employee fails to abide by
the policies? In what ways may policies differ among
various fields, such as in health care and education?

Source: CareerBuilder 3 Search Skills

Research This: (a) Visit at least two career ­websites Using the Web for Research
and review the resources. What type of career advice
is given? Are aptitude tests available? What tools A search engine may provide targeted results from
are provided to manage a job search, such as tips news websites, blogs, corporate websites, and other
for ­writing a cover letter and resume, job search sources. In addition, research websites, digital libraries,
mistakes to avoid, search strategies, and online and specialized search engines can provide valuable
s­ ocial network tips? information when using the web for research.

Your college or university library’s website may list
links to online journals, magazines, films, and books
that will be helpful resources. It may make available
links to online research databases, such as Gartner,
Factiva, L­ exisNexis, and ProQuest, that offer IT

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Systems, Certifications, and Careers  Chapter 12 589

p­ rofessionals’ press releases, analysis, and case studies Internet Research STUDENT ASSIGNMENTS
about c­ ompanies, technologies, and industries. These
s­ ources often present valuable background informa- Kaspersky Security estimates that more than ­one-half
tion, and they offer IT professionals relevant business of the security threats can originate from Java flaws.
i­nformation to guide their decision-making. Oracle, the company that develops Java, issues
patches to address known security vulnerabilities, but
Academic search engines, such as Google Scholar, the Department of Homeland Security and other
and digital libraries, such as JSTOR (Journal Storage), experts recommend not using Java until it is needed
provide access to academic journals and conference in b­ rowsers because new attacks may occur in the
publications that can be useful when doing academic popular ­programming language.
research. Navigating to these websites from campus
may give you additional access to online research Research This: Locate at least two articles discussing
d­ atabases to which your library has a paid subscription. Java security flaws. How do Oracle and other com-
panies inform users about the need to obtain updates
to fix security holes? How many devices worldwide
have Java installed? How can users discover if Java is
installed on their computer or mobile device and, if it
is, learn how to uninstall it?

Source: Gartner 5 Cloud Services

Research This: Complete these tasks and report Enterprise Software Apps
your findings. (1) Use your school library’s website to
find articles in online newspapers about information Many companies make use of enterprise software apps
l­iteracy. (2) Use a research database available from your to manage customer relationship management (CRM)
school library’s website to find an article about the and Enterprise Resource Planning (ERP). The rise of
fastest-growing IT careers. (3) Use a research database cloud computing in the enterprise has resulted in these
available from your school library’s website to find an and other enterprise software apps being hosted and
article about a company or technology discussed in managed on the cloud, rather than being purchased
this chapter. (4) Use Google Scholar or JSTOR to find and installed in house. Software as a service (SaaS),
a recent scholarly publication about rapid application a service of cloud computing, provides the delivery
development. of software applications that are stored and deployed
from servers on the Internet.
4 Security
Microsoft, Apple, Facebook, and Twitter are among Enterprise software applications are popular SaaS
the technology companies that have experienced ­offerings because IT departments do not need to i­nstall
a series of attacks exploiting security flaws in the the software or manage the servers on which they run;
Java plug-in for browsers. These security intrusions instead, they can concentrate on configuring and speci-
appear to have originated from hackers in China, fying the services that these apps provide. Their "pay
Russia, or Eastern Europe who were attempting to as you go" model, where customers are charged only
obtain the companies’ intellectual property, sensi- for the capabilities they use, make SaaS apps attractive
tive data, and users’ personal information. The from a financial perspective. Users always interact with
cyberthieves bypassed Java’s built-in protections and the most up-to-date version, and because the apps are
installed malware on the compromised computers. accessed in a browser, it is easy to maintain the app
across large organizations.

Research This: (1) Read about Salesforce, a pioneer
in cloud-based CRM applications. What services does
Salesforce provide? Find a case study about Salesforce,
and describe how Salesforce’s cloud solutions met
one of its customer’s needs. (2) Read about enterprise
SaaS offerings to manage business operations and
customer relations. Select or compare cloud services
from ­companies such as SAP, Microsoft, and Oracle,
and prepare a summary of their offerings. What are
advantages and disadvantages to companies running
these apps on the cloud?

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

590 Chapter 12  Working in the Enterprise

Critical Thinking The Critical Thinking exercises challenge your assessment and decision-making skills by
­presenting real-world situations associated with chapter concepts. The Collaboration
e­ xercise should be completed with a team.
STUDENT ASSIGNMENTS
Instructions: Evaluate the situations below, using personal experiences and one or more resources available to you (such as articles on the web or in
© iStockPhoto / theJIPENprint, blogs, podcasts, videos, television, user guides, other individuals, electronics or computer stores, etc.). Perform the tasks requested in each exercise
and share your deliverables in the format requested by your instructor (brief report, presentation, discussion, blog post, video, or other means).

1. Offshoring and Outsourcing ­reviews to determine what features customers might
The consulting company where you work as a find valuable. List common features of the most
systems analyst has refused to use offshoring, claiming h­ ighly-rated apps. What skills, hardware, and soft-
management prefers to employ homeland citizens. The ware are necessary to develop this type of app? What
company’s competitors have been using offshoring resources might your company have to purchase or
for some time. Your company’s management team use to ­develop the app? Research mobile app develop-
wants to discuss outsourcing the company’s accounting ment jobs on an employment website to find examples
system to an overseas firm. of requirements for this type of job. What certifica-
Do This: Research laws, guidelines, and ­opinions tions might you look for when hiring a mobile app
­regarding outsourcing. Address the following ­developer?
q­ uestions: Do you think systems should be developed
­entirely overseas? Why or why not? What are the 3. Case Study
m­ ajor advantages and disadvantages of developing Amateur Sports League  You are the new manager
s­ ystems offshore? What security issues exist when for a nonprofit amateur soccer league. Several
using offshore developments? Does the United States employees of the league have expressed interest in
have an obligation to help with employment overseas telecommuting a few days per week. You need to
or in developing nations? Why or why not? What present a telecommuting proposal for the next meeting
factors should a company consider when determining of the board of directors.
whether to use offshore developers? Do This: Research benefits and disadvantages
of a­ llowing telecommuting. List requirements for
2. Mobile App Development e­ mployees to be able to work from home, including
Your company creates digital quizzes and study guides types of I­ nternet a­ ccess and hardware. Discuss secu-
for nursing students. Currently you deliver these rity i­ssues with allowing employees to telecommute.
quizzes and other materials through a subscription- How can you address security concerns? List guide-
based website. Customers have been asking for an app lines employees should f­ollow when working from
that is optimized for smartphones and tablets. You home. Should you implement a method for evaluating
have been asked to gather necessary information to employee efficiency or productivity when telecommut-
start the project. ing? Why or why not? How would you assess i­ndividual
Do This: Determine which type of mobile app might employee performance? What jobs are better suited to
be best suited to this type of product and explain why. telecommuting? Why? Would you recommend that the
Research other quiz and study guide apps. Read user league allow telecommuting? Why or why not?

Collaboration

4. Job Search  You work in the human resources department of a network security company.
You currently have several openings for positions, including a network administrator, a security
expert, and a help desk technician.
Do This: Form a three-member team and have each team member choose a different p­ osition.
As a team, discuss any common requirements or background necessary for all of the positions
based on the type of company. Each team member should list the educational background,
available certifications, and other requirements for the position. Find listings for available jobs
in your area. What responsibilities are listed for the position? What salary i­nformation can
you locate? Create a list of information potential employees should have as part of their online
profile. As a team, meet to discuss and compile your findings.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Appendix A APP 1

Technology Acronyms

Acronym Description Page Acronym Description Page
1G first generation 481 C2C consumer-to-consumer 82
2G second generation 481 CA certificate authority 231
3-D three-dimensional 15 CAD computer-aided design 164
3G third generation 481 CAE computer-assisted engineering 555
3GPP Third Generation Partnership Project 462 CAM computer-aided manufacturing 40
4G fourth generation 481 CAPTCHA Completely Automated Public 224
4GL fourth-generation language 532 Turing test to tell Computers and
5G fifth generation 481 CATV Humans Apart 466
AC alternating current 301 CBT cable television 184
ACPA Anticybersquatting Consumer 64 cc computer-based training 103
Protection Act CCFL carbon copy 341
ADA Americans with Disabilities Act 353 ccTLD cold cathode fluorescent lamp 63
ADSL asymmetric digital subscriber line 467 CD country code top-level domain 18
AI artificial intelligence 560 CDMA compact disc 481
AIO all-in-one 114 CDP Code Division Multiple Access 234
ALU arithmetic logic unit 281 CD-R continuous data protection 388
AMOLED active-matrix OLED 342 CD-ROM CD-recordable 388
ANSI American National Standards Institute 459 CD-RW CD-read-only memory 388
API application programming interface 549 CERT/CC CD-rewritable 219
ARPA Advanced Research Projects Agency 56 Computer Emergency Response Team
ASCII American Standard Code for 289 CF Coordination Center 381
Information Interchange CIPA CompactFlash 247
ATC advanced transfer cache 294 CISSP Children’s Internet Protection Act 575
ATM automated teller machine 118 Certified Information Systems Security
ATM Asynchronous Transfer Mode 468 CMOS Professional 296
AUP acceptable use policy 106 complementary metal-oxide
B2B business-to-business 82 CMS ­semiconductor 557
B2C business-to-consumer 82 COPPA content management system 246
BAN body area network 456 Children’s Online Privacy
bcc blind carbon copy 103 CPC Protection Act 548
BD Blu-ray Disc 389 CPI cost per click 548
BLOB binary large object 501 CPU cost per impression 110
BMP bitmap 86 CRM central processing unit 287
BSA Business Software Alliance 228 CRT customer relationship management 344
BSB backside bus 300 CSA cathode-ray tube 232
BSN body sensor network 456 CSC Cloud Security Alliance 124
BTW by the way CSI common short code 295
BYOD bring your own device 94 CSO Cellular Seizure Investigation 527
35 chief security officer

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

APP 2 Appendix A: Technology Acronyms

Acronym Description Page Acronym Description Page
CSS cascading style sheets 537 eSATA external SATA 380
CTIA Cellular Telecommunications Industry 315 EULA end-user license agreement 163
Association EVDO Evolution Data Optimized 481
CTS carpal tunnel syndrome 142 FAQ frequently asked questions 94
CVS computer vision syndrome 143 FC Fibre Channel 390
DaaS data as a service 155 FCC Federal Communications 315
DBA database administrator 510 Commission
DBMS database management system 498 FDDI Fiber Distributed Data Interface 477
DC direct current 301 FERPA Family Educational Rights and 163
DDoS distributed DoS 217 Privacy Act
DDR SDRAM Double Data Rate SDRAM 292 FIP Fair Information Practices 502
DIMM dual inline memory module 293 FLA Fair Labor Association 295
DLP digital light processing 352 FOIA Freedom of Information Act 246
DMCA Digital Millennium Copyright Act 246 fps frames per second 331
DMS document management system 556 FSB front side bus 300
DNS domain name system FTP File Transfer Protocol 24
DOE Department of Energy 64 FTTB Fiber to the Building 467
DoS denial of service 241 FTTH Fiber to the Home 467
dpi dots per inch 217 FTTP Fiber to the Premises 59
DRAM dynamic RAM 346 FWIW for what it’s worth 94
DRM digital rights management 292 FYI for your information 94
DSL Digital Subscriber Line 240 GB gigabyte 61
DSS decision support system 59 GBps gigabytes per second 371
DTP desktop publishing 559 GHz gigahertz 283
DTV digital television 180 GIF Graphics Interchange Format
DV digital video 343 GPRS General Packet Radio Service 86
DVD digital versatile disc or digital 330 GPS global positioning system 481
video disc GPU graphics processing unit 70
DVD+R DVD-recordable 18 GSM Global System for Mobile 342
DVD+RAM DVD-random access memory Communications 481
DVD+RW DVD-rewritable 388 GUI graphical user interface
DVD-R DVD-recordable 388 HDD hard disk drive 414
DVD-ROM DVD-read-only memory 388 HDMI High-Definition Media Interface 373
DVD-RW DVD-rewritable 388 HDTV high-definition television 343
DVI Digital Video Interface 388 HIPAA Health Insurance Portability and 15
DVR digital video recorder 388 Accountability Act 246
EB exabyte 135 HRIS human resources information
ECPA Electronic Communications 474 system 555
Privacy Act 370 HTML Hypertext Markup Language
EDGE Enhanced Data GSM Environment 246 http Hypertext Transfer Protocol 535
EDI electronic data interchange HVAC heating, ventilating, and air 69
EFT electronic funds transfer 481 ­conditioning 579
EIDE Enhanced Integrated Drive Electronics 453 IaaS infrastructure as a service
EPA Environmental Protection Agency 453 ICANN Internet Corporation for Assigned 53
ERP Enterprise Resource Planning 380 Names and Numbers 63
241 ID identification
555 222

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Appendix A: Technology Acronyms APP 3

Acronym Description Page Acronym Description Page
IDE integrated development environment 530 MICR magnetic-ink character recognition 338
IDEA Individuals with Disabilities 354 MIS management information system 558
Education Act MMS multimedia message service 124
IEC International Electronics Commission 299 MP megapixels 127
IEEE Institute of Electrical and Electronics 138 MRP Material Requirements Planning 555
Engineers MRP II Manufacturing Resource Planning II 555
IMDb Internet Movie Database 548 ms millisecond 296
IMEI International Mobile Equipment 315 MTSO mobile telephone switching office 480
Identity NAS network attached storage 390
IMHO in my humble opinion 94 NFC near field communications 138
IMSI International Mobile Subscriber 480 NIC network interface card 472
Identity ns nanosecond 296
IoT Internet of Things 284 NSA National Security Agency 480
IP Internet Protocol 62 NUI natural user interface 414
IP intellectual property 240 OCIA Office of Cyber and Infrastructure 365
IPO initial public offering 396 Analysis
IR infrared 465 OCR optical character recognition 334
IrDA Infrared Data Association 465 OEM original equipment manufacturer 421
IROC2 Institute for Responsible Online and 246 OLAP online analytical processing 559
Cell-Phone Communication OLED organic LED 342
ISDN Integrated Services Digital Network 467 OLTP online transaction processing 558
ISP Internet service provider 20 OMR optical mark recognition 335
IT information technology 310 OODB object-oriented database 508
JAD joint-application design 520 OOP object-oriented programming 530
JOBS Jumpstart Our Business Startup 396 OS operating system 410
JPEG Joint Photographic Experts Group 86 P2P peer-to-peer 457
KB kilobyte 370 PaaS platform as a service 288
KBps kilobytes per second 371 PAN personal area network 455
L1 Level 1 294 PATRIOT Provide Appropriate Tools Required to 246
L2 Level 2 294 Intercept and Obstruct Terrorism
L3 Level 3 294 PB petabyte 370
LAN local area network 453 PC personal computer 4
LCD liquid crystal display 341 PDF Portable Document Format 86
LED light-emitting diode 341 PERT Program Evaluation and Review
LTE Long Term Evolution 462 Technique 518
M2 Memory Stick Micro 381 PIN personal identification number
M2M machine-to-machine 133 PMP Project Management Professional 118
MAC Media Access Control 236 PNG Portable Network Graphics 574
Mac OS Macintosh operating system 427 POS point of sale 86
MAN metropolitan area network 455 PPC pay per click 118
MB megabyte 61 ppm pages per minute 548
MBAN medical body area network 456 ps picosecond 345
MBps megabytes per second 371 PUE power usage effectiveness 296
MDM mobile device management 433 QBE query by example 241
MFP multifunction printer 349 512

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

APP 4 Appendix A: Technology Acronyms

Acronym Description Page Acronym Description Page
QR quick response 178 TFT thin-film transistor 342
RAD rapid application development 530 TIFF Tagged Image File Format 86
RAID redundant array of independent disks 380 TLD top-level domain 63
RAM random access memory 290 TPS transaction processing system 557
RDRAM Rambus DRAM 292 TTFN ta-ta for now 94
RFI request for information 523 TYVM thank you very much 94
RFID radio frequency identification 465 UI user interface 414
RFP request for proposal 523 UMB Ultra Mobile Broadband 481
RFQ request for quotation 523 UMTS Universal Mobile Telecommunications 481
ROI return on investment 519 System
ROM read-only memory 294 UPC Universal Product Code 335
rpm revolutions per minute 375 UPS uninterruptible power supply 115
RSI repetitive strain injury 142 URL Uniform Resource Locator 68
RSS Really Simple Syndication 536 USB Universal Serial Bus 17
RTOS real-time operating system 436 US-CERT United States Computer Emergency 557
RWD responsive web design 84 Readiness Team
SaaS software as a service 105 USPS United States Postal Service 335
SAN storage area network 391 UV ultraviolet 344
SAS serial-attached SCSI 380 UWB ultra-wideband 463
SATA Serial Advanced Technology 380 VAN value-added network 453
Attachment VAR value-added reseller 523
SCSI Small Computer System Interface 380 VM virtual machine 431
SDHC Secure Digital High Capacity 381 VoIP Voice over Internet Protocol 24
SDLC system development life cycle 515 VPE visual programming environment 532
SDRAM Synchronous DRAM 292 VPN virtual private network 230
SDXC Secure Digital Expanded Capacity 381 VR virtual reality 87
SEC Securities and Exchange Committee 295 W3C World Wide Web Consortium 58
SecaaS security as a service 259 WAN wide area network 455
SFA salesforce automation 555 WAP wireless access point 236
SFTP secure file transfer protocol 534 WBT web-based training 184
SIMM single inline memory module 293 Wi-Fi wireless fidelity
SLR single-lens reflex 125 WiMAX Worldwide Interoperability for 59
SMM Sustainable Materials Management 122 Microwave Access 463
SMS short message service 124 WLAN wireless local area network
SOX Sarbanes-Oxley 396 WML wireless markup language 454
SQL Structured Query Language 512 WORM write once, read many 536
SRAM static RAM 292 WPA2 Wi-Fi Protected Access 2 388
SSD solid-state drive WWW World Wide Web 236
SSID service set identifier 17 XML Extensible Markup Language 65
TB terabyte 236 YB yottabyte 536
Tbps trillion bits per second 290 ZB zettabyte 370
TCP/IP Transmission Control Protocol/Internet 479 μs microsecond 370
Protocol 461 296

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Appendix B APP 5

Troubleshooting Computer
and Mobile Device Problems

While using a computer or mobile device, at some point you probably will experience
a ­technology problem that requires troubleshooting. Technology problems that remain
u­ nresolved may impact your ability to use your device. This appendix identifies some c­ ommon
problems you might experience with computers and mobile devices; it also includes some
suggestions for correcting these problems. If the recommended solutions in the table below
do not solve your problem, or you are uncomfortable performing any of the recommended
actions, contact a repair professional (independent computer repair company, technical support
­department at your job or academic institution, or computer or mobile device manufacturer) for
additional options.

This appendix also might assist you with completing some of the Problem Solving e­ xercises
found at the end of each chapter in this textbook. Table 1 contains possible solutions for
­problems that might occur on your computer or mobile device.

Note: The following steps are suggestions; they are not comprehensive solutions. When
­working with a computer or mobile device, follow all necessary safety precautions before
­implementing any of these recommended solutions. Contact a professional if you require
a­ dditional information.

Table 1  Problems and Recommended Solutions

Problem Desktop Laptop Tablet Phone Recommended Solution(s)
The computer might be in sleep or hibernate mode;
Computer or device does not ✓ ✓ ✓ to wake up the computer, try pressing a key on the
keyboard, pressing the power button, or tapping the
turn on. touch screen if applicable.
Make sure power cables are plugged securely into
✓ the wall and the back of the computer.
✓✓✓ Make sure the battery is charged if the computer or
device is not connected to an external power source.
Battery does not hold a ✓✓✓✓ If the battery is charged, connect the external AC
charge. ✓✓✓ adapter and attempt to turn on the computer or
device. If the computer or device still does not turn
Computer issues a series of ✓ ✓ on, the problem may be with the computer or device.
beeps when turned on. If none of the above options resolves the issue, the
power supply or AC adapter might be experiencing
problems; contact a professional for assistance.
Verify the AC adapter used to charge the battery is
working properly. If the mobile computer or device
can run from the AC adapter without a battery
installed, the AC adapter most likely is working
properly.
If the AC adapter works, it may be time to replace
the ­battery.
Refer to your computer’s documentation to determine
what the beeps indicate, as the computer hardware
may be ­experiencing a problem.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

APP 6 Appendix B: Troubleshooting Computer and Mobile Device Problems

Problem Desktop Laptop Tablet Phone Recommended Solution(s)
Computer or device turns on, ✓ ✓ ✓ ✓
but operating system does Disconnect all nonessential peripheral devices,
not run. ✓ remove all storage media, and then restart the
computer or device.
Monitor does not display ✓ ✓ Restart the computer or device; if the problem
anything. persists, the operating system might need to be
restored. If restoring the operating system does not
Screen does not display ✓✓ work, the hard drive might be failing.
anything.
Verify the monitor is turned on.
Keyboard or mouse does not ✓ ✓ ✓ Verify the video cable is connected securely to the
computer and monitor.
work. Make sure the power cables are plugged securely
into the wall and the back of the monitor.
Wet keyboard no longer ✓ Make sure the monitor is set to the correct input
works. ✓✓ source.
Speakers do not work. ✓✓✓ Restart the computer.
If you have access to a spare monitor, see if that
✓✓ monitor will work. If so, your original monitor might
be faulty. If not, the problem may be with your
Hard drive makes noise. ✓✓ computer’s hardware or software configuration.

Restart the device.
Make sure the device is plugged in or the battery is
sufficiently charged.

Verify the keyboard and mouse are connected
properly to the computer or device.
If the keyboard and mouse are wireless, make sure
they are turned on and contain new batteries.
If the keyboard and mouse are wireless, attempt
to pair them again with the computer or wireless
receiver. Read How To 3-1 for more information.
If you have access to a spare keyboard or mouse, see
if it will work. If so, your original keyboard or mouse
might be faulty. If not, the problem may be with your
computer’s hardware or software configuration.
Make sure the touchpad is not disabled.

Turn the keyboard upside down to drain the liquid,
dab wet areas with a cotton swab, and allow the
keyboard to dry.

Verify that headphones or earbuds are not
connected.
Make sure the volume is not muted and is turned up
on the computer or mobile device.
Verify the speakers are turned on.
Make sure the speakers are connected properly to
the computer.
If necessary, verify the speakers are plugged in to an
external power source.

If the computer is not positioned on a flat surface,
move it to a flat surface.
If the problem persists, contact a professional.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Appendix B: Troubleshooting Computer and Mobile Device Problems APP 7

Problem Desktop Laptop Tablet Phone Recommended Solution(s)
Fan contains built-up dust/ ✓✓ ✓
does not work. If possible, open the system unit and use a can of
✓ compressed air to blow the dust from the fan and
✓ ✓ away from the system unit.
Remove obvious obstructions that might be
Computer or device is too ✓ ✓ preventing the fan from functioning.
hot. Verify the fan is connected properly to the motherboard.
If the fan still does not work, it may need to be replaced.

✓ Verify the fan or vents are not obstructed. If the fan
or vents are obstructed, use a can of compressed air
Cannot read from optical ✓ ✓ to blow the dust from the fan or vent and away from
disc. the computer or device or remove other obstructions.
Purchase a cooling pad that rests below the laptop
External drive (USB flash ✓ ✓ ✓ and protects it from overheating.
drive, optical disc drive, or
external hard drive) is not Exit apps running in the background.
recognized. Search for and follow instructions how to clear the
Program or app does not ✓ ✓ ✓ tablet or phone’s cache memory.
run. Run an app to monitor the tablet’s or phone’s
battery performance, and exit apps that require a
Computer or device displays ✓ ✓ ✓ lot of battery power.
Decrease the brightness of the display.
symptoms of a virus or other
malware. Clean the optical disc and try reading from it again.
Try reading from another optical disc. If the second
optical disc works, the original disc is faulty.
If the second disc does not work, the problem may
be with the optical disc drive.

Remove the drive and insert it into a different USB
port, if available.
Remove the drive, restart the computer, and insert
the drive again.
Try connecting the drive to a different computer. If
you still cannot read from the drive, it may be faulty.

Restart the computer or device and try running the
program or app again.
If feasible, uninstall the program or app, reinstall it, and
then try running it again. If the problem persists, the
problem may be with the operating system’s configuration.

Make sure your antivirus software is up to date and
then disconnect the computer or device from the
network and run antivirus software to attempt to
remove the malware. Continue running scans until
no threats are detected and then reconnect the
computer to the network.
If you do not have antivirus software installed, obtain and
install a reputable antivirus program or app and then scan
your computer in an attempt to remove the malware. You
should have only one antivirus program or app installed
on your computer or mobile device at one time.
If you are unable to remove the malware, take your
computer to a professional who may be able to
remove the malicious program or app.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

APP 8 Appendix B: Troubleshooting Computer and Mobile Device Problems

Problem Desktop Laptop Tablet Phone Recommended Solution(s)
Computer or device ✓ ✓ ✓ Defragment the hard disk.
is experiencing slow ✓ ✓ ✓ Uninstall programs and apps that you do not need.
performance. ✓ Verify your computer or device meets the minimum
✓ system requirements for the operating system and
Screen is damaged physically. ✓ ✓ ✓ software you are running.
✓ If possible, purchase and install additional memory
Touch screen does not ✓✓✓ ✓ (RAM).
respond. ✓
Contact a professional to replace the screen; if the
Computer or device is wet. ✓✓ computer or device is covered under a warranty, the
repair may be free.
Computer or device does ✓ ✓ ✓ Replacing a broken screen on a computer or device
not connect to a wireless might be more costly than replacing the computer
network. or device; consider your options before replacing the
screen.
Computer or device cannot ✓ ✓ ✓
Clean the touch screen.
synchronize with Bluetooth Restart the computer or device.
accessories.
Turn off the computer or device, remove the battery,
Device continuously has poor ✓ and dry off visible water with a cloth. Fill a plastic
cell phone reception. bag or box with rice, submerge the computer
or device and battery into the rice so that it is
surrounded completely, and then do not turn on the
computer or device for at least 24 hours.
If the computer or device does not work after it is
dry, contact a professional for your options.

Verify you are within range of a wireless access point.
Make sure the information to connect to the wireless
network is configured properly on the computer or
device.
Make sure the wireless capability on the computer or
device is turned on.

Verify the Bluetooth device is turned on.
Verify the Bluetooth functionality on your computer
or device is enabled.
Verify the computer or device has been paired
properly with the accessory. Read How To 3-1 for
more information.
Make sure the Bluetooth device is charged.

Restart the device.
If you have a protective case, remove the case to see
if reception improves.
If you are using the device inside a building, try
moving closer to a window or open doorway.
Contact your wireless carrier for additional
suggestions.

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 1

Index

1G (first generation of cellular transmissions): First activity tracker, 130
generation of cellular transmissions., 481
ADA: Law that requires any company with 15 or more
2G (second generation of cellular transmissions): employees to make reasonable attempts to accommo-
Second generation of cellular transmissions., 481 date the needs of physically challenged w­ orkers., 353.
See also Americans with Disabilities Act
3-D printer: Printer that uses a process called additive
manufacturing to create an object by adding material adapter board: A circuit board that enhances the func-
to a three-dimensional object, one horizontal layer at a tions of a component of a desktop or server system
time. (Or) Printer that can print solid objects such as unit and/or provides connections to peripheral
clothing, prosthetics, eyewear, implants, toys, parts, devices., 297. See also adapter card; expansion card
prototypes, and more., 15, 349
adapter card: A circuit board that enhances the functions
3G (third generation of cellular transmissions): Third of a component of a desktop or server system unit and/
generation of cellular transmissions., 481 or provides connections to peripheral devices.,
297–298. See also adapter board; expansion card
4G (fourth generation of cellular transmissions):
Fourth generation of cellular transmissions., 481 adapters, 297–299

4GL: A nonprocedural language that enables users and address book, 74
programmers to access data in a database., 532. See also
fourth-generation language address: Unique number that identifies the location of a
byte in memory., 290
5G (fifth generation of cellular transmissions): Fifth
generation of cellular transmissions., 481 administrator account: Type of account typically held
by computer owners or network administrators that
802.11: A series of network standards that specifies how enables them to access all files and programs, install
two wireless devices communicate over the air with programs, and specify settings that affect all users on a
each other., 462 computer, mobile device, or network., 423

A Adobe Reader, 88, 177

acceptable use policy (AUP): Outlines the activities for ADSL: A type of DSL that supports faster downstream
which a computer and network may and may not be rates than upstream rates., 467. See also asymmetric
used., 231 digital subscriber line

acceptance test: Test performed by end users during the Advanced Research Projects Agency (ARPA), 56
program development life cycle that checks the new
system to ensure that it works with actual data., 525 advanced transfer cache: Type of L2 cache built directly
on the processor chip, which increases processor
access control: A security measure that defines who can speed., 294. See also ATC
access a computer, device, or network, when they can
access it, and what actions they can take while access- adware: A program that displays an online advertisement
ing it., 222 in a banner or pop-up window on webpages, email, or
other Internet services., 192, 215, 245
accessories, gaming, 11
access time: The amount of time it takes a storage device adware remover: A program that detects and deletes
adware., 192
(1) to locate an item on a storage medium or (2) to
deliver an item from memory to the processor., 296, 371 agriculture, technology and, 485
accounting software: An application that helps busi-
nesses of all sizes record and report their financial A1: Hardware certification that tests knowledge of computer
transactions., 173 setup, configuration, maintenance, troubleshooting, basic
active-matrix: LCD display technology that uses a sepa- networking skills, and system software., 573
rate transistor to apply charges to each liquid crystal
cell and, thus, displays high-quality color that is AI, 560
­viewable from all angles., 342. See also TFT
air gestures: Gestures made by moving your body or a
handheld input device through the air., 328

all-in-one desktop: Desktop that does not have a tower
and instead houses the screen and system unit in the
same case., 114

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 2 Index

all-in-one printer: A single device that looks like a app: Program designed to make users more productive
printer or a copy machine but provides the and/or assist them with personal tasks., 27, 158
f­unctionality of a printer, scanner, copy machine, and
perhaps a fax machine., 349. See also multifunction Apple computers, 27
printer (MFP) Apple’s iOS, 27
Apple’s Mac OS, 27
alphabetic check: Validity check that ensures that users application: Programs designed to make users more
enter only alphabetic data into a field., 503
productive and/or assist them with personal tasks.,
alphanumeric characters: Letters and numbers., 289 27, 158
ALU: Component of the processor that performs arith- application development languages, 527–538
application development tool, 527
metic, comparison, and other operations., 281. See also application generators, 532
arithmetic logic unit applications
alumni network, 576 categories of (table), 27, 164
Amazon’s storefront, 81 developing, 29
Americans with Disabilities Act: Law that requires any downloading safely, 162
company with 15 or more employees to make reasona- graphics and media, 179–185
ble attempts to accommodate the needs of physically help systems, 205
challenged workers., 353. See also ADA installing, 29
AMOLED (active-matrix OLED): Screens that use vs. software suites, 172
both active-matrix and OLED technologies, tracking your location, 70
c­ ombining the benefits of high-quality viewing from application server, 116
all angles with lower power consumption., 342 apps
analog: Continuous (wave form) signals., 288 fitness videos, apps as medical advice, 132
analysis phase: Step in the system development life cycle fraudulent, 174
during which two major activities are performed: help systems, 205
(1) conduct a preliminary investigation and (2) perform payment, 179
detailed analysis., 521 and programs, 26–30
Android: An open source, Linux-based mobile operating removing, 195
system designed by Google for smartphones and architecture and design, technology and, 578
t­ ablets., 434 archival backup: Backup method that provides the best
Animal’s identity security, chip implantation, 280 protection against data loss because it copies all
animation: The appearance of motion created by ­program and data files., 396. See also full backup
d­ isplaying a series of still images in sequence., 86 arithmetic logic unit: Component of the processor that
anonymous FTP: File transfer method whereby anyone performs arithmetic, comparison, and other ­
can transfer some, if not all, available files., 92 operations., 281. See also ALU
Anticybersquatting Consumer Protection Act arithmetic operations: Operations that involve basic
(ACPA): Legislation whose goal is to protect trade- calculations such as addition, subtraction, multiplica-
mark owners from being forced to pay a cybersquatter tion, and division., 281
for a domain name that includes their trademark. ARPANET: Agency of the U.S. Department of Defense
ACPA for short., 64 whose goal was to build a network that (1) allowed
anti-spam program: A filtering program that attempts to scientists at different physical locations to share
remove spam before it reaches your inbox or forum., 193 information and work together on military and
antistatic wristband: Bracelet designed to protect elec- scientific projects and (2) could function even if part of
tronics from an electrostatic discharge by preventing a the network was disabled or destroyed by a disaster
buildup of static electricity on a user., 304 such as a nuclear attack. Short for Advanced Research
antivirus program: Software that protects a computer Projects Agency., 56
against viruses by identifying and removing any com-
puter viruses found in memory, on storage media, or
on incoming files., 25, 110, 191, 218
antivirus software, 423

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 3

artificial intelligence: The application of human intelli- automated teller machine (ATM), 118
gence to computers., 560. See also AI automatic update: Feature can be configured to

ASCII: American Standard Code for Information download and install updates automatically.(or) Feature
Interchange; the most widely used coding scheme to that regularly provides new features or corrections to
represent a set of characters., 289 the program., 163, 421, 423
security and, 422
aspect ratio: A display’s width relative to its height., 343 automobiles, and embedded computers, 132
ASP.NET: A web application framework that provides the AutoSave feature, 166

tools necessary for the creation of dynamic w­ ebsites., 532 B
asset tags, 279
assistive technology, 353–354 back door: A program or set of instructions in a program
asterisk (*), search engine operator, 72 that allows users to bypass security controls when
asymmetric digital subscriber line: A type of DSL that accessing a program, computer, or network., 217, 393

supports faster downstream rates than upstream rates., back end: An application that supports a front-end
467. See also ADSL p­ rogram., 505
asymmetric key encryption: Encryption method that
uses two encryption keys: a public key and a private background: Programs that are running, but not in use.,
key., 230. See also public key encryption 415
Asynchronous Transfer Mode (ATM): Short for
Asynchronous Transfer Mode; a service that carries backing up
voice, data, video, and media at very high speeds., 468 computers, mobile devices, 19
ATC: Type of L2 cache built directly on the processor regularly, 25, 233
chip, which increases processor speed., 294. See also
advanced transfer cache backlight: Light source in a display that often uses
Athletics, motion input in, 329 CCFL (cold cathode fluorescent lamp) or LED (light-
ATM: A self-service banking terminal that connects to a emitting diode) technology., 341
host computer through a network. Short for automated
teller machine., 118 backside bus: Bus that connects the processor to cache.,
ATM (Asynchronous Transfer Mode): Short for 300. See also BSB
Asynchronous Transfer Mode; a service that carries
voice, data, video, and media at very high speeds, 468 backup: A duplicate of content on a storage medium that
ATOM: Specification that content aggregators use to you can use in case the original is lost, damaged, or
distribute content to subscribers., 536 destroyed., 233, 422
at symbol (@), 89
auction websites, 81–82 various methods (table), 234
audio: Music, speech, or any other sound., 86 backup plans, 19, 235, 395–396
output, 340 backups, 18
streaming, 187 backup server, 116
audio editing software: An application that enables backup tool: A program that allows users to copy, or back
users to modify audio clips, produce studio-quality
soundtracks, and add audio to video clips., 183 up, selected files or the contents of an entire s­torage
audio input: The process of entering any sound into medium to another storage location, such as another
the computer such as speech, music, and sound hard disk, optical disc, USB flash drive, or cloud
effects., 330 storage., 198
audit trail: Electronic file that records both successful backward compatible: Term used to refer to a
and unsuccessful access attempts., 222 ­program’s or device’s capability of supporting older
AUP: Outlines the activities for which a computer and programs or devices, as well as newer programs or
network may and may not be used., 231. See also devices., 136, 425
acceptable use policy backward recovery: Recovery technique where the
DBMS uses the log to undo any changes made to
the database during a certain period., 515. See also
­rollback
balance board: Game controller that is shaped like a
weight scale and contains sensors that measure a game
player’s balance and weight., 132

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 4 Index

BAN: A type of PAN that wireless connects sensors worn Blackberry operating system: A proprietary mobile
by, carried by, implanted in, or attached to a human operating system that runs on Blackberry smartphones
body., 456. See also body area network and Blackberry tablets., 434

bandwidth: The amount of data, instructions, and blackout: A complete power failure., 140
i­nformation that can travel over transmission media.,
61, 476 blade server: A server in the form of a single circuit
board, or blade., 116
bar code: An identification code that consists of either a
set of vertical lines and spaces of different widths or a bloatware: Additional programs and apps included with
two-dimensional pattern of dots, squares, and other an operating system., 421
images., 335
BLOB: Binary large object., 501
bar code reader: An input device that uses laser beams
to read bar codes on products., 118, 335. See also bar blog: An informal website consisting of time-stamped
code scanner articles, or posts, in a diary or journal format, usually
listed in reverse chronological order. Short for weblog.,
bar code scanner: An optical reader that uses laser 24, 39, 78
beams to read bar codes., 335. See also bar code
reader blogger, 78

batch processing: Processing technique in which the blogging, 188
computer collects data over time and processes all
transactions later, as a group., 558 blogosphere: The worldwide collection of blogs., 78

Batteries, 301–304 blog software: Software needed to create/maintain a
blog., 188
batteries for mobile computers, 113
Bluebugging: Security risk that occurs when cyberthieves
behavioral health risks with using technology, 144 exploit Bluetooth devices that have been paired., 464

benchmark test: Test that measures the performance of Bluetooth: Wireless communication technology that
hardware or software., 524 uses short-range radio signals to transmit data between
two Bluetooth-enabled computers or devices to com-
Berners-Lee, Tim, 63 municate with each other., 32, 137, 463–464

Big Data: Large-scale data sets that require advanced Bluetooth printing: Printing that occurs when a com-
technologies beyond the capabilities of typical database puter or other device transmits output to a printer via
software, to gather, store, process, retrieve, or analyze., radio waves., 345
508
Bluetooth wireless port adapter: Adapter that will
characteristics of, 509 ­convert an existing USB port into a Bluetooth port., 137

data visualization, 509 Blu-ray: A more expensive DVD format that has a higher
capacity and better quality than standard DVDs, espe-
sources and uses of, 509 cially for high-definition audio and video., 388

binary digit: The smallest unit of data the computer can BMP graphics format, 86
process., 288. See also bit
body area network: A type of PAN that wirelessly con-
binary system: Number system that has just two unique nects sensors worn by, carried by, implanted in, or
digits, 0 and 1, called bits., 288 attached to a human body. Sometimes called a body
sensor network (BSN)., 456. See also BAN
biometric device: Device that authenticates a person’s
identity by translating a personal characteristic, such as body sensor network (BSN), 456
a fingerprint, into a digital code that is compared with
a digital code stored in a computer verifying a physical bookmarking site: A website that enables members to
or behavioral characteristic., 224 organize, tag, and share links to media and other
online content., 75
biometric payment: Payment method where the
c­ ustomer’s fingerprint is read by a fingerprint reader bookmarks: Links to preferred websites., 67. See also
that is linked to a payment method such as a checking favorites
account or credit card., 226
Boolean: Data type consisting of Yes or No, or True or
bitmaps, 86 False, values., 501

bit: The smallest unit of data the computer can process. Boot Camp: Apple program that enables you to install
Short for binary digit., 288. See also binary digit Windows on an Apple computer., 432

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 5

boot disk: Removable media, such as a CD or USB flash BSB: Bus that connects the processor to cache., 300. See
drive, that contains only the necessary operating sys- also backside bus
tem files required to start the computer., 413
buffer: Segment of memory or storage in which items
boot drive: The drive from which your personal com- are placed while waiting to be transferred from an
puter starts., 413 input device or to an output device., 418

booting: The process of starting or restarting a computer bug: Error in a program., 421
or mobile device., 413
building automation systems, 145
boot sector viruses, 190
burning: The process of writing on an optical disc., 388
bot: A program that performs a repetitive task on a net-
work., 216 bus: Electrical channel that transfers electronic bits inter-
nally within the circuitry of a computer, allowing the
botnet: A group of compromised computers or mobile devices both inside and attached to the system unit to
devices connected to a network such as the Internet communicate with each other., 299–300
that are used to attack other networks, usually for
nefarious purposes., 216. See also zombie army bus width, 300

Braille printer, 354 speed measurement, 300

brightness: Term used to describe how light or dark a types of, 300
photo appears., 182
Busey bank, 79
broadband: Internet connection with fast data-transfer
speeds and an always-on connection. (or) Transmission business
media that transmits multiple signals simultaneously,
58, 476 uses of online social networks, 73

broadband Internet, 60 websites, 77

broadband modem: A communications device that sends business networks, 33
and receives data and information to and from a digital
line., 468. See also digital modem Business Software Alliance (BSA): Alliance formed by
major worldwide software companies to promote
broadband router: A device that performs the functions understanding of software piracy., 228
of a router and also a broadband modem., 471
business-to-business (B2B) e-commerce: E-commerce
broadband wireless router: A device that performs the transaction that occurs when businesses provide goods
functions of a router, a wireless access point, and a and services to other businesses, such as online adver-
cable or DSL modem., 472 tising, recruiting, credit, sales, market research, techni-
cal support, and training., 82
broadcast radio: A wireless transmission medium that
distributes radio signals through the air over long dis- business-to-consumer (B2C) e-commerce:
tances such as between cities, regions, and countries E-commerce action that involves the sale of goods and
and short distances, such as within an office or home., services to the general public, such as at a shopping
479 website., 82

brownout: A prolonged (more than a minute) undervolt- bus width: The size of a bus, which determines the
age., 140 number of bits that a computer can transmit at one
time., 300
browser: Software that enables users with an Internet
connection to access and view webpages on computers buyer’s guides
or mobile devices., 21, 65
for desktops, 115
configuring, 67
for mobile computers, 113
displaying webpages using, 64
for mobile devices, 128–129
browsing
BYOD (bring your own device) strategies, 389, 433
communications applications, 188
byte (character): Eight bits grouped together as a unit.,
safe techniques, 66 61, 288, 290

browsing history: A list of all websites you have visited C
over a period of time., 257
cable Internet service: Broadband Internet access
­provided through the cable television network via
a cable modem., 59, 466, 467

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 6 Index

cable modem: A broadband modem that sends and CD-R: CD-recordable; optical disc on which users can
receives digital data over the CATV network., 469 write once, but not erase, their own items, such as text,
graphics, and audio., 388
cache: Area of memory that stores the contents of
f­requently used data or instructions., 66, 293–294 CD-ROM: CD-read-only memory; type of optical disc
that users can read but not write on (record) or erase.,
CAD (computer-aided design), 180 388

calendar and contact management software: An appli- CD-RW: CD-rewritable; erasable multisession disc users
cation that helps you organize your calendar, keep can write on multiple times., 388
track of contacts, and share this information with other
devices or users., 171 CDs as optical discs, 18

calls, making VoIP, 92 cellular radio: A form of broadcast radio that is in wide
use for mobile communications, specifically wireless
candela: The standard unit of luminous intensity., 342 modems and mobile phones., 480

C11: An object-oriented programming language devel- Cellular Seizure Investigation stick: Device used by
oped in the 1980s by Bjarne Sroustrup at Bell cyberthieves to download sensitive data from phones
Laboratories that is an extension of the C program- and other mobile devices., 295. See also CSI stick
ming language., 531
central processing unit (CPU): The electronic compo-
capacity: The number of bytes (characters) a storage nent of a computer that interprets and carries out the
medium can hold., 370 basic instructions that operate a computer., 110, 280.
See also processor
capping: ISP practice of providing a certain amount of
data at the optimal speed; once the customer used his CERT/CC, 219
or her allotted amount, Internet access is restricted,
slowed, or incurs additional costs., 477 certificate authority: Online providers that issue digital
certificates., 231
CAPTCHA: A program developed at Carnegie Mellon
University that displays an image containing a series of Certified Information Systems Security Professional:
distorted characters for a user to identify and enter in Security certification that tests in-depth knowledge of
order to verify that user input is from humans and not access control methods, information systems develop-
computer programs. Short for Completely Automated ment, cryptography, operations security, physical secu-
Public Turing test to tell Computers and Humans rity, and network and Internet security., 575. See also
Apart., 224 CISSP

Carbonite, 234 CF: A type of memory card., 381. See also
CompactFlash
card reader/writer: A device that reads from and writes
on memory cards, 381 change management: Process of recognizing when a
change in a project has occurred, taking actions to
career counselors, 576 react to the change, and planning for opportunities
because of the change., 519
career planning, 576
character: A number, letter, punctuation mark, or other
career websites, 82 symbol that is represented by a single byte in the
ASCII coding scheme., 500
carpal tunnel syndrome (CTS), 142
charge-coupled device (CCD), 126
cascading style sheets: Technology used for web apps
that describes the design and appearance of informa- chassis: The case that contains and protects the mother-
tion on a webpage., 536, 538. See also CSS board, hard drive, memory, and other electronic com-
ponents of the computer from damage., 276. See also
cases System unit

of computer, 276–278 chat: A real-time typed conversation that takes place on a
computer or mobile device with many other online
of mobile device, 276–278 users., 91, 188

C : A widely used procedural language developed in the chat room: A location on an Internet server that permits
early 1970s by Dennis Ritchie at Bell Laboratories that users to chat with others who are online at the same
originally was designed for writing system software., 528 time., 31, 91

ccTLD: A two-letter country code in a web address., 63 check digit, 503

CDP: Backup method in which all data is backed up
whenever a change is made., 234. See also continuous
data protection

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 7

Children’s Internet Protection Act (CIPA), 248 cloud backup: Backup method in which files are backed
up to the cloud as they change., 234
child: Term used in three-generation backups to refer to
the most recent copy of the file., 234 cloud computing: An environment of virtual servers that
house and provide access to resources users access
chip: A small piece of semiconducting material, usually through the Internet., 121, 287–288
silicon, on which integrated circuits are etched., 278
cloud data privacy, 232
chip card: An alternative to a magnetic stripe card, stores
data on an integrated circuit embedded in the card., cloud storage: An Internet service that provides remote
393. See also smart card storage to computer users., 18, 34, 69, 234, 383–385

Chromebook: A specialized laptop that runs Chrome advantages of, 384
OS., 430
selecting provider, 385
Chromebox: A specialized desktop that runs Chrome
OS., 430 services, by providers, 384–385

Chrome: Google’s browser., 67 upload files, 385

Chrome OS: Google’s Linux-based operating system CMOS: Complementary metal-oxide semiconductor;
designed to work primarily with web apps., 430 technology used by some RAM chips, flash memory
chips, and other types of memory chips that provides
ciphertext: Encrypted (scrambled) data., 230 high speeds and consumes little power by using battery
power to retain information even when the power to a
CISSP: Security certification that tests in-depth knowl- computer is off., 296
edge of access control methods, information systems
development, cryptography, operations security, physi- coaxial cable: Physical transmission media that consists
cal security, and network and Internet security., 575. of a single copper wire surrounded by at least three
See also Certified Information Systems Security layers: (1) an insulating material, (2) a woven or
Professional braided metal, and (3) a plastic outer coating., 478. See
also coax
classic programming languages, 532
coax: Physical transmission media that consists of a single
click, 13 copper wire surrounded by at least three layers: (1) an
insulating material, (2) a woven or braided metal, and
clickjacking: Scam in which an object that can be clicked (3) a plastic outer coating., 478. See also coaxial cable
on a website, such as a button, image, or link, contains
a malicious program., 245 code of conduct: A written guidelines that helps
determine whether a specific action is ethical/unethical
client operating systems: Desktop operating systems that or allowed/not allowed., 241
work in conjunction with a server operating system., 426
code: The program that contains the language instruc-
client/server network: Network in which one or more tions, or code, to be converted to machine language.,
computers act as a server, and the other computers on 529. See also source program
the network request services from the server., 456
coding schemes, 289–290
clients: The other computers and mobile devices on a
network that rely on the server for its resources., 456 cold boot: The process of starting a computer or
mobile device from a state when it is powered off
clip art: A collection of drawings, photos, and other c­ ompletely., 413
images., 166
collaborative databases: Web databases where users
clip art/image gallery: A collection of clip art and store and share photos, videos, recordings, and other
p­ hotos., 166 personal media with other registered users., 506

clipboard: A temporary storage location., 165 command: An instruction that causes a program or app
to perform a specific action., 318
clock cycle: Each tick of the system clock., 283
command language: The set of commands used to
clock speed: The pace of the system clock., 283, 300 c­ ontrol actions in a command-line interface., 415

closed source operating systems command-line interface: User interface in which users
type commands represented by short keywords or
security of, 430 abbreviations or press special keys on the keyboard to
enter data and instructions., 414–415
cloud architect: Employee who identifies business
requirements, strategies, and solutions for cloud
storage and services that meet a company’s goals or
needs., 687

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 8 Index

common short code (CSC): A four- or five-digit comparison operations: Operations that involve com-
number assigned to a specific content or mobile paring one data item with another to determine
service provider, sometimes followed by the whether the first item is greater than, equal to, or less
message., 124 than the other item., 281

communications compiler: Separate program that converts an entire
source program into machine language before execut-
applications, 28 ing it., 529

applications (table), 188 completeness check: Validity check that verifies that a
required field contains data., 503
digital, 93, 450–451
composite key: Primary key that consists of multiple
netiquette guidelines for online, 94 fields., 501

use of technologies (table), 31 compressed files, 86

communications channel: Transmission media on which compressing files, folders, 198
data, instructions, or information travel in a communi-
cations system., 450 compress: To decrease a file or photo’s file size., 182

communications device: Hardware capable of computer: An electronic device, operating under the
transferring items from computers and devices to control of instructions stored in its own memory, that
transmission media and vice versa., 31, 468 can accept data (input), process the data according to
specified rules, produce information (output), and store
cable modem, 469 the information for future use., 4, 108

digital modems, 468 computer-aided design: A type of application that
assists professionals and designers in creating engineer-
DSL modem, 469 ing, architectural, and scientific designs and models.
CAD for short., 180
hubs and switches, 473
computer-aided engineering: Information system that
ISDN modem, 469 aids in the development and testing of product designs,
and often includes CAD (computer-aided design)., 555.
network cards, 472–473 See also CAE

routers, 471–472 computer-aided manufacturing (CAM): The use of
computers to assist with manufacturing processes such
wireless access points, 470 as fabrication and assembly; CAM for short., 40, 555

wireless modem, 469 computer: An electronic device, operating under the
control of instructions stored in its own memory, that
communications lines can accept data (input), process the data according to
specified rules, produce information (output), and store
ATM, 468 the information for future use.

cable, 466 application, stopped responding, 418

DSL, 467 backing up, 19, 233–234

FTTP, 467 buyer’s guide for desktops, 115

ISDN, 467 buyer’s guide for mobile computers, 113

T-carrier line, 468 care for, 302–303

communications satellite: A space station that receives cases for, 276–278
microwave signals from an earth-based station,
amplifies (strengthens) the signals, and broadcasts the categories of (table), 134
signals back over a wide area to any number of earth-
based stations., 482 connecting peripheral devices, accessories to, 136

communications software: Programs and apps that easing eyestrain using, 143
(1) help users establish a connection to another com-
puter, mobile device, or network; (2) manage the trans- entering data and instructions in, 319
mission of data, instructions, and information; and (3)
provide an interface for users to communicate with external music devices connection, 330
one another., 457
media on smart TV from, 343
CompactFlash: A type of memory card., 381. See also CF
memory card slots, 381
compact keyboard: Keyboard that is smaller than a
standard keyboard and usually does not include the
numeric keypad., 321

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 9

mobile, 108–115 consumer electronics, and embedded computers, 132

and mobile devices, 7, 108 consumer-to-consumer (C2C) e-commerce:
E-commerce transaction that occurs when one con-
ports for, 297 sumer sells directly to another, such as in an online
auction., 82
recycling, refurbishing, 242
contact management software: Folder used in email
removing programs and apps, 416 programs that contains a list of names, addresses,
phone numbers, email addresses, and other details
search and seize, government, 374 about people with whom you communicate., 171

securing, 279 contacts folder: Folder used in email programs that con-
tains a list of names, addresses, phone numbers, email
synchronizing your, 34 addresses, and other details about people with whom
you communicate., 89
transferring photos from mobile devices to, 153
content aggregation, 83
and transportation, 95
content filtering: The process of restricting access to
unauthorized access and use, 221–227 certain material., 247

computer-based training (CBT): A type of education in content management system (CMS): System that
which students learn by using and completing exercises enables and manages the publishing, modification,
with instructional software., 184 organization, and access of various forms of documents
and other files, including media and webpages, on a
computer crime: Any illegal act involving the use of a network or the web. (or) A program that assists you
computer or related devices., 212 with creating, editing, and hosting content on a
website., 84, 557
Computer Emergency Response Team Coordination
Center (CERT/CC): A federally funded Internet continuous backup: A backup plan in which changes are
security research and development center., 219 backed up as they are made., 515

computer ethics: The moral guidelines that govern the continuous data protection (CDP): Backup method in
use of computers, mobile devices, and information sys- which all data is backed up whenever a change is
tems., 238 made., 234. See also CDP

computer repair services, 566 contrast ratio: The difference in light intensity between
the brightest white and darkest black that can be
computer security specialist: Employee who is ­produced on a display., 342
r­ esponsible for the security of data and information
stored on computers and mobile devices within contrast: The difference in appearance between light and
an organization. See also Mobile security dark areas of a photo., 182
specialist, 570
controller: A special-purpose chip and electronic circuits
computer technician: Employee who installs, maintains, that control the transfer of data, instructions, and
and repairs hardware and servers; installs, upgrades, information from a drive to and from the system bus
and configures software; troubleshoots hardware and other components in the computer. Formerly
p­ roblems., 569 called a disk controller., 380

computer vision syndrome: Technology-related health control unit: The component of the processor that
condition that affects eyesight., 143. See also CVS directs and coordinates most of the operations in the
computer., 281
conferencing software: Software that includes tools that
enable users to share documents via online meetings convenience applications, 186
and communicate with other connected users., 520
convertible tablet: A tablet that has a screen in its lid
confidential data, access of, 514 and a keyboard in its base, with the lid and base con-
nected by a swivel-type hinge., 112
connecting
cookie: A small text file that a web server stores on your
peripheral devices, accessories to computers, 136 computer., 192, 243

phones to Wi-Fi networks, 138 cooling pad: Pad that rests below a laptop and protects
the computer from overheating and also the user’s lap
connections, ports and, 134–138 from excessive heat., 284

connector: Device that joins a cable to a port., 135

popular (table)., 135

consistency check: Validity check that tests the data in two
or more associated fields to ensure that the relationship is
logical and their data is in the correct format., 503

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

IND 10 Index

copying CSS: Technology used for web apps that describes the
design and appearance of information on a webpage.,
media from websites, 38 536, 538. See also cascading style sheets

copyright: Exclusive rights given to authors, artists, and CT scans, 43
other creators of original work to duplicate, publish,
and sell their materials., 240 curation website, 83

cost/benefit feasibility: Test that measures whether the cursor: A symbol on the screen, usually a blinking verti-
lifetime benefits of the proposed information system cal bar, that indicates where the next character you
will be greater than its lifetime costs., 519. See also eco- type will appear., 320. See also insertion point
nomic feasibility
customer data protection, 575
CPU: The electronic component of a computer that
interprets and carries out the basic instructions that customer relationship management: Information system
operate a computer. Short for central processing unit., that manages information about customers, past pur-
110. See also processor chases, interests, and the day-to-day interactions, such as
phone calls, email messages, web communications, and
cracker: Someone who accesses a computer or network Internet messaging sessions., 555. See also CRM
illegally with the intent of destroying data, stealing
information, or other malicious action., 214 customer relationship management specialist:
Employee who integrates apps and data related to
create: Process in project development during which you c­ ustomer inquiries, purchases, support requests, and
enter text or numbers, insert images, and perform behaviors in order to provide a complete application
other tasks using a variety of input methods, such as that manages a company’s relationships with its
keyboard, a mouse, touch, or voice., 165 c­ ustomers. See also CRM specialist, 569

Creative Commons: Nonprofit organization that customer service software, 177
provides several standard licensing options that
owners of creative works may specify when custom software: Software that performs functions spe-
granting permission for others to use their digital cific to a business or industry., 161
content., 372
CVS: Technology-related health condition that affects
credit cards eyesight., 143. See also computer vision syndrome

protection, 337 cyberbullying: Harassment using technology., 94

safely using, 394 cybercrime: Online or Internet-based illegal acts such as
distributing malicious software or committing identity
and signature verification system, 225 theft., 212

crimeware: Software used by cybercriminals., 212 cyberextortionist: Someone who demands payment to
stop an attack on an organization’s technology infra-
criminal databases, 505 structure., 214

CRM: Information system that manages information cyberforensics: The discovery, collection, and analysis of
about customers, past purchases, interests, and the day- evidence found on computers and networks., 227. See
to-day interactions, such as phone calls, email mes- also digital forensics
sages, web communications, and Internet messaging
sessions., 555. See also Customer relationship cybersquatters, 64
m­ anagement
cyberterrorist: Someone who uses the Internet or network
CRM specialist: Employee who integrates apps and data to destroy or damage computers for political reasons., 214
related to customer inquiries, purchases, support
requests, and behaviors in order to provide a complete cyberwarfare: A cybercrime attack whose goal ranges
application that manages a company’s relationships from disabling a government’s computer network to
with its customers. See also Customer relationship crippling a country., 214
management specialist, 577
cypher: A set of steps that can convert readable plaintext
crop: To remove unwanted areas of a photo., 182 into unreadable ciphertext., 230. See also encryption
algorithm
cross-platform application: An application that runs the
same on multiple operating systems., 412 D

CSI stick: Device used by cyberthieves to download sen- DaaS : Cloud computing service that allows users and
sitive data from phones and other mobile devices., 295. applications to access a company’s data., 288. See also
See also cellular seizure investigation stick data as a service

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

Index IND 11

dance pad: Technology-related health condition that database server: Dedicated server that stores and
affects eyesight., 131. See also computer vision p­ rovides access to a database., 116, 506

data database software: An application that allows users to
create, access, and manage a database., 170, 498
common data types, 501
data collection device: Reading device that obtains data
file maintenance, 502 directly at the location where the transaction or event
takes place., 338
hierarchy of, 500–501
data dictionary: A DBMS element that contains data
validating, 503 about each file in a database and each field in those
files., 510. See also repository
data: A collection of unprocessed items, which can
include text, numbers, images, audio, and video., data entry form: A window on the screen that provides
12, 318 areas for entering or modifying data in a database.,
512. See also form
how travels on Internet, 62
data file: A collection of related records stored on a stor-
usage examples (table), 61 age medium such as a hard drive or on cloud storage;
often simply called a file., 501
data as a service: Cloud computing service that allows
users and applications to access a company’s data., 288. data model: Rules and standards that define how users
See also DaaS view the organization of the data in a database., 508

data scientist: Employee who uses analytics and other data plans, mobile device, 458
Big Data tools to compile statistics on data that an
organization can use to plan product development or data projector: A device that projects the text and
create strategies for marketing., 569 images displaying on a computer or mobile device
screen and projects the images on a larger screen so
database: A collection of data organized in a manner that that an audience can see the image clearly., 352
allows access, retrieval, and use of that data., 170, 498
data representation, 288–290
maintaining, 513
bits and bytes, 288
securing, 513
coding schemes, 289–290
database administrator: Person in an organization who
is responsible for managing and coordinating all data- data security, 513–514
base activities, including development, maintenance,
and permissions., 510, 569. See also DBA data transfer rates, 460, 479

database analyst: Employee who uses data modeling data type: Specifies the kind of data a field in a database
techniques and tools to analyze and specify data can contain and how the field is used., 500
usage., 569
data visualization, 509
database approach, 504–505
data warehouse: Huge database that stores and manages
advantages of, 505–506 the data required to analyze historical and current
transactions., 508
disadvantages of, 506
DBA: Person in an organization who is responsible for
types of, 508 managing and coordinating all database activities,
including development, maintenance, and permissions.,
database data, import/export of, 511 510. See also database administrator

database designer: Employee who specifies the s­tructure, DBMS: Software that allows users to create a computer-
interface, and requirements of a large-scale database; ized database; add, modify, and delete data in the data-
determines security and permissions for users., 568 base; sort and retrieve data from the database; and
create forms and reports from the data in the database.,
database management system: Software that allows 498. See also database management system
users to create a computerized database; add, modify,
and delete data in the database; sort and retrieve data DDoS attack: Type of DoS attack in which a zombie
from the database; and create forms and reports from army is used to attack computers or computer net-
the data in the database., 498. See also DBMS works., 217. See also distributed DoS attack

backup and recovery, 515 decision support system (DSS): Information system
that helps users analyze information and make deci-
data dictionary and, 510 sions; DSS for short., 559

data security and, 513–514

file retrieval and maintenance, 511–513

Copyright 2016 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.


Click to View FlipBook Version