Physical view, 266
Picosecond, 115
Picture elements. See Pixels
Picture Password, 224, 235
Pilot approach, 299, 306
Pinterest, 35
Pits, 169, 179
Pixels, 66, 76, 141
Plagiarism, 231, 236
Plagiarists, 231, 236
Planning, 246
Platform scanners, 138, 155
Platters, 167, 178
Plotters, 146, 156
Podcasts, 35–36, 47
Pointer, 56, 75, 86, 99, 273, 282
Pointing devices, 136–137, 154
game controllers, 136, 137, 154
mouse, 136, 154
touch Screen, 136, 154
Popular microprocessors, 115
Pop-ups, 30
Portable computers, 152, 157
Portable languages, 330
Portable scanner, 137, 155
Ports, 108, 119–120, 127
cables, 120, 127
cell phone, 119, 127
DVI, 119–120, 127
Ethernet, 119, 127
FireWire, 120, 127
HDMI, 119, 127
MiniDP/mDP, 119, 127
specialized, 119–120, 127
standard, 119, 127
Thunderbolt, 119, 127
USB-A, 119, 127
USB-B, 119, 127
USB-C, 119, 127
VGA, 119–120, 127
Power supply, 120, 127
units, 108, 120, 127
Preliminary investigation, 292–293, 304
Presentation files, 14, 19
Presentation software, 8, 63, 76
creating presentation, 63
Pretty Good Privacy, 226
Prewritten programs, 314
Primary key, 64, 268, 281
Primary storage, 164, 177
Printers, 144–146, 156
3D, 145, 156
cloud, 145, 156
features, 144, 156
inkjet, 145, 156
laser, 145, 156
plotters, 146, 156
thermal, 146, 156
Privacy, 7, 16, 17, 34, 115, 214, 215, 234
end of anonymity, 233
Google Street View, 215, 216
information reseller’s website, 215
internet and web, 217–220, 234
IT security analysts, 232, 236
large databases, 215–217
laws on, 221
mobile apps, 69
mode, 219, 234
online identity, 220
private networks, 217, 234
Private Browsing, 219, 234
Private networks, 217, 234
Problem and constraint languages. See Fifth-generation language (5GL)
Problem-solving procedure, 314
Procedural languages. See Third-generation languages (3GLs)
Procedures, 4, 5, 17
Processing rights, 271, 282
Processing speeds, 115, 275
Processor, 114, 126
Production, 245, 258
Productivity suites. See Office suites
Profiles, 34, 47
Program, 314, 335
code, 315, 322–323, 328, 336
design, 315, 318–321, 328, 336
documentation, 315, 326, 328, 337
flowcharts, 319
maintenance, 315, 327–328, 338
modules, 318
objectives, 316, 335
specification, 315, 316–317, 328, 335
test, 315, 324–325, 328, 337
Program analysis. See Program specification
Program code, 315, 322–323, 328, 336
Program definition. See Program specification
Program design, 315, 318–321, 328, 336
flowcharts, 319–321, 335, 336
logic structures, 321, 335, 336
pseudocode, 319, 335, 336
top-down, 318, 335, 336
Program documentation, 315, 326, 328, 337
Programmable robot, 334
Program maintenance, 315, 327–328, 338
Programmers. See Software engineers
Programming, 314–315, 335
Programming language, 322, 323, 328, 335, 336
generations of, 330–332, 338
Programs, 4, 17, 18. See also Software
Program specification, 315, 316–317, 328, 335
Program test, 315, 324–325, 328, 337
Project managers, 255, 259
Property, 215, 234
ProQuest Dialog, 277
Protocols, 31, 46, 194–195, 206
feature, 194 Page 388
identification, 194–195
packetization, 195
Prototyping, 301, 307
Proxy server, 202
Pseudocode, 319, 335, 336
Public Wi-Fi, 192
Purchase order, 250
Purchasing, 250, 259
Python, 323
q
QuarkXPress, 66
Query-by-example, 270
Query languages, 331
Quicken Starter Edition, 68
Qustodio Parental Control, 32
QWERTY keyboard, 134
r
Radio frequencies, 198
Radio-frequency identification (RFID) tags, 138–139, 155
RAID. See Redundant arrays of inexpensive disks
Random-access memory (RAM), 12, 18, 116, 117, 126, 164, 170, 177, 179
Ransomware, 222, 235
Ransomware “WannaCry,” 222
Rapid applications development (RAD), 301, 307
Raster images, 66, 76
Reader/sorter, 139
Reading, 164
Read-only memory (ROM), 116, 117, 126, 169, 179
Real-time operating systems (RTOS), 8, 18, 87, 99
Real-time processing, 269, 281
Receiving devices, 187, 188
Record, 267, 281
Records, database, 64
Recycling, 6
Redundant arrays of inexpensive disks (RAID), 168, 175, 178, 179, 228
Regional manager, 251
Relation, 273, 282
Relational database, 273–274, 282
Relational organization, 276
Repetition logic structure, 321, 336
Repetitive strain injury (RSI), 151, 157
Report creation, 60
Research, 245, 258
Resolution, 141, 144, 156
standards, 141
Restricting access, 224–226
Rewritable discs, 170, 179
RFID reader, 139, 155. See also Radio-frequency identification (RFID) tags
Ribbon GUI, 57, 75
Ribbons, 57, 75
Ring network, 200, 207
Robot network, 223, 235
Robots, 150, 157
Rogue Wi-Fi hotspots, 223–224, 235
Role playing game (RPG), 69, 77
Router, 196, 206
RPG. See Role playing game
RTOS. See Real-time operating systems
s
Sales order processing, 250, 259
Satellite, 189, 205, 206
Satellite connection services, 191
Scanners, 138, 155. See also Optical scanners
Scanning devices, 137–139, 155
bar code readers, 138, 155
card readers, 138, 155
character and mark recognition devices, 139, 155
optical scanners, 137–138, 155
RFID readers, 138–139, 155
Schema, 270
SD card, 117, 126
Search engines, 39, 48
Searching, for information, 27, 46
Search programs, 91, 94, 101
Search services, 39, 48
Search tools, 39–40
Secondary storage, 12, 18, 164, 177
cloud storage, 170–171
devices, 164, 177
hard disks, 12, 167–168
mass storage devices, 174–175
next-generation storage, 176
optical discs, 12, 169–170
solid-state storage, 12, 165–166
Second generation (2G), 330, 343, 345
mobile telecommunications, 191, 206
Sectors, 167, 178
Secure file transfer protocol (SFTP), 33, 47
Security, 16, 41, 49, 214, 221, 235, 270, 278–279, 283
cybercrime, 221–222, 235
data, 228
end of anonymity, 233
IT security analysts, 232, 236
malicious hardware, 223–224, 235
malicious software, 223, 235
measures to protecting computer security, 224–228, 235
physical, 228
social engineering, 223, 235
suites, 225, 235
and technology, 229
Selection logic structure, 321, 336
Semiconductor, 113, 125
Sending devices, 187, 188
Sequential logic structure, 321, 336
Servers, 10, 18, 196, 206. See also Midrange computers
Service providers, 43
SFTP. See Secure file transfer protocol
Shared laser printers, 145, 156
Share settings, 34, 47
Sharing, 270
Shopping, 27
Shopping apps, 68
Signature, 38, 48
Silicon chip, 113, 125
Siri, 26, 91, 92, 140, 155
Six-phase systems life cycle, 291
Slots, 113–114, 125
Smart homes, 45
Smartphones, 11, 18, 108, 109, 112, 125, 152, 354, 356. See also Mobile
bar code reader, 138
Smartwatches, 112, 125
Smith, David L., 350
SMS (short message service), 36, 48. See also Text messaging
Social engineering, 223, 235
Social media, 29
Social networking, 34–35, 47, 68, 216
Sockets, 113, 125
Software, 4, 5, 7–8, 16, 17, 18
application. See Application software
environment/platform, 88, 99
piracy, 230, 236
presentation, 8
suites, 70, 77
system. See System software
updates, 327, 338
Software development, 314, 315, 335. See also Programming
Software development life cycle (SDLC), 314–315, 327
Software engineers, 15, 19, 71, 78, 315, 326, 333, 337, 338
Solaris, 201
Solid-state drives (SSDs), 165, 177
Solid-state storage, 12, 18, 165–166, 177
flash memory cards, 166, 177
internal drive, 165
USB drives, 166, 177
Sony PlayStation 4, 110
Source code, 331
Spam, 38, 48
Spam blockers/filters, 38, 48
Speakers, 146, 157
Specialized applications, 8, 18, 56, 65–68
graphics programs, 65–66, 76
video game design software, 66–67, 76
web authoring programs, 67, 76
Specialized ports, 119–120
Specialized suites, 70, 77
Specialty processors, 115, 126
Speed, 144
Spell checker, 58, 59
Spiders, 39, 48
Spotify, 28, 68, 77
Spreading inaccurate information, 216–217
Spreading information without personal consent, 216
Spreadsheets, 8, 61–62, 75
flyer, creation of, 59
report, creation of, 60
sales forecast, creation of, 61
Sprint, 30
Spy removal programs, 220, 234
Spyware, 219, 234
SSDs. See Solid-state drives
Stand-alone operating systems, 8, 18, 87, 99
Standard ports, 119, 120
Star network, 200, 207
Storage, 164–165, 177
devices, 165, 177
next-generation, 176
Storage area network (SAN), 175, 179
Storage management programs, 91, 95, 101
Strategic models, 252, 259
Strategic uses, 278, 283
Strategy, 201, 207
Structured programming techniques, 318
Structured programs, 322, 336
Structured query language (SQL), 270, 331
Stylus, 136, 154
Subject, 37, 48 Page 389
Subscription services, 28
Supercomputers, 10, 18
Supervisors, 246, 258
Supervisory managers, 248
Surgical robot, 150
Swift, 323
Switch, 196, 206
Symantec Norton Family Premier, 32
Symantec Norton Internet Security, 33
Symantec Norton Utilities, 70
Syntax errors, 324, 325, 335, 337
System, 290, 304
analysts, 291, 302, 304, 307
audit, 300, 307
buses, 118, 126
design, 291, 296–297, 304, 305
design report, 297, 305
development, 291, 298–299, 306
flowcharts, 295, 305
flowcharts symbols, 295
implementation, 291, 299–300, 306
life cycle, 291, 300, 301, 304
maintenance, 291, 300, 307
System board, 108, 113–114, 125
System chassis. See System unit
Systems analysis, 290–291, 294–296, 304, 305
analyzing data, 294–295
documenting, 296
gathering data, 294
one step in defining problems, 293
preliminary investigation, 292–293, 304
prototyping, 301, 307
RAD, 301, 307
report, 296, 305
systems design, 296–297, 305
systems development, 298–299, 306
systems implementation, 299–300, 306
systems maintenance, 300, 307
testing system, 300
Systems maintenance, 300, 307
System software, 7–8, 18, 56, 84–85, 99, 252, 259
device drivers, 84
language translator, 84
operating systems. See Operating systems
utilities, 84, 91–97
System unit, 11–12, 18, 108–109, 112–113, 125
brain-computer interfaces, 124
bus lines, 118, 126
components, 112, 125
computer technicians, 123, 127
desktops, 109, 125
electronic data and instructions, 121–122, 127
expansion cards and slots, 117–118, 126
gaming, 110–111
laptops, 109, 125
memory, 116–117, 126
microprocessor, 114–115, 126
ports, 119–120, 127
power supply, 120, 127
smartphones, 108, 125
system board, 113–114, 125
tablets, 108–109, 125
wearable computers, 112, 125
t
T1 lines, 190, 206
T3 lines, 190, 206
Tables, 64, 267, 281
Tablet computers. See Tablets
Tablet hunch, 152
Tablets, 11, 18, 108–109, 125, 152, 354–355, 356
mini, 109, 125
Tabs, 57, 75, 87, 99
Tactical models, 253, 259
Task-oriented languages. See Fourth-generation languages (4GLs)
Tbps, 190
Technical feasibility, 297, 305
Technical writer, 15, 19, 152, 157
Technology, 214
Telephone lines, 189, 205
Templates, 63
Temporary Internet files, 218, 234
Temporary storage, 12, 116
Testing process, 324–325, 337
Tethering, 192
Text databases, 278
Text entries, 61
Texting. See Text messaging
Text messaging, 36, 48, 186
Thermal printers, 146, 156
Third generation (3G), 343, 346
mobile telecommunications, 191, 206
Third-generation languages (3GLs), 330–331
Third-party cookie, 218
Thunderbolt ports, 119, 127
TLD. See Top-level domain
T-Mobile, 30
Toggle keys, 135, 154
Toolbars, 56, 57, 75
Top-down analysis method, 294–295, 305
Top-down program design, 318, 335, 336
Top-level domain (TLD), 31, 46
Top-level executives, 253
Top-level managers, 247, 258
Top management, 246
Topologies, 200, 207
Torvalds, Linus, 349
Touch pad, 136, 154
Touch screen, 136, 154
Tower computer, 109, 125
Tower unit, 109
TPS. See Transaction processing system
Tracking cookies, 218
Tracks, 167, 178
Traditional graphical user interface, 57
Traditional keyboards, 135, 154
Traditional laptop, 355
Transaction processing system (TPS), 248, 249–250, 252, 254, 255, 259
Transfer rate, 190, 206
Transistor Age, 345
Transmission control protocol/Internet protocol (TCP/IP), 194, 206
Tree network, 200, 207
Trojan horses, 223, 235
Troubleshooting program, 91, 101
Tumblr, 35
Turnitin website, 232
Tweets, 35, 47
Twisted-pair cable, 189, 205
Twitter, 27, 29, 35, 47
Two-in-one laptops, 109, 125
u
UHD 4K, 141
UHD 8K, 141
UHD BD. See Ultra HD Blu-rays discs
Ultrabooks, 109, 125, 355
Ultra HD Blu-rays (UHD BD) discs, 169, 179
Ultraportables. See Ultrabooks
Unicode, 122, 127
binary codes, 165
Uniform resource locators (URLs), 31, 46
United Parcel Service (UPS), 138
UNIVAC, 344
Universal Product Codes (UPCs), 138, 155
Universal serial bus (USB), 118, 119, 120, 126, 127
drives, 166, 177
UNIX, 87, 90, 101
Unmanned aerial vehicles (UAV), 147, 157
UPCs. See Universal Product Codes
Upgrades, 111
Uplink, 189
Uploading, 32, 47 Page 390
URLs. See Uniform resource locators
USB. See Universal serial bus
USB drives, 166
User interface, 56–58, 75, 85, 99
graphical. See Graphical user interface
Users, 252, 259, 326, 337
Utilities, 8, 18, 84, 91–97, 99, 101
operating system, 94–96, 101
virtual assistant, 92–93
Utility suites, 70, 77, 97, 101
v
Vacuum Tube Age, 344
Vector illustrations/images, 66, 76
Venmo, 41
Verizon, 30
Video apps, 68
Videoconferencing, 186, 193
Videoconferencing systems, 255, 259
Video editors, 65, 76
Video game design software, 66–67, 76
Video Graphics Adapter (VGA) ports, 119–120, 127
Virtual assistants, 91, 101
Virtualization, 90–91, 101
Virtualization software, 91, 101
Virtual keyboards, 135, 154
Virtual machines, 91, 101
Virtual memory, 116, 126
Virtual private networks (VPNs), 203, 207, 227, 235
Virtual reality (VR), 74, 147, 157
head-mounted displays and controllers, 147, 157
Viruses, 8, 38, 48, 97, 101, 223, 235
tracking, 226
VMware (virtual machine program), 91, 101
Voice assist tools, 85, 99
Voiceband, 194
Voice recognition systems, 140, 155
Volatile storage, 116
VR. See Virtual reality
VR controllers, 147
VR head-mounted displays, 147
w
WAN. See Wide area network (WAN)
Wand readers, 138, 155
Warm boot, 86, 99
Watson (supercomputer), 257
Wearable computers, 11, 18, 112, 125
Wearable devices. See Wearable computers
Web, 14, 16, 19, 26–27, 46, 217–220, 234, 349
Web 1.0, 26
Web 2.0, 26, 35
Web 3.0, 26, 27
application, 44, 49
Web 4.0, 26, 45
Web auctions, 40
Web authoring, 67, 76
Web authoring programs, 67, 76
Web-based e-mail systems, 38, 48
Web-based file transfer services, 32, 47
Web bugs, 219
Webcams, 140, 155
Web databases, 278
Webmail, 38, 48
Webmail client, 38
Webmasters, 15, 19, 44, 49
Web page, 31, 46
Web page editors, 67, 76
Website encryption, 227
Web suffix, 31, 46
Web utilities, 32–33, 47
What-if analysis, 62
WhatsApp, 37
Wheel button, 136, 154
Wide area networks (WANs), 199, 206
Widely used programming languages, 271, 322, 323, 336
Wi-Fi Protected Access (WPA2), 228, 235
Wi-Fi standards, 189
Wikipedia, 36, 47
Wikis, 36, 47
Windows, 56, 75, 87, 89, 99, 100
backup programs, 96
search program, 94
storage management programs, 95
Windows 10, 8, 89, 91, 100
Windows Defender, 220
Windows key, 135
Windows operating systems, 86
Windows Photo Gallery, 66
Windows Server, 87, 201
WinZip, 168
Wired channels, 197
Wired networks, 185
Wireless
keyboard, 355
modem, 136, 154
mouse, 136, 154
Wireless access point, 198, 206
Wireless adapter, 198
Wireless channels, 197
Wireless charging platform, 120, 121, 127
Wireless communications, 187
devices, 14–15
Wireless connections, 188–189, 205
Wireless fidelity (Wi-Fi), 188, 205
public, 192
Wireless local area network (WLAN), 198, 199, 206
Wireless modems, 30, 46
Wireless network cards, 118, 126
Wireless network encryption, 228
Wireless networks, 185
Wireless revolution, 15, 19, 187, 205
Wireless technology, 187
Wireless wide area network (WWAN) modem, 190, 206
WLAN. See Wireless local area network
Word, 115
Word processors, 8, 58–60, 75
Workbook, 62
Worksheet files, 14, 19
Worksheets, 61
name, 62
Worldwide Interoperability for Microwave Access (WiMax), 189, 205
World Wide Web (WWW), 26, 46. See also Web
Worms, 223, 235
Wozniak, Steve, 347
WQXGA, 141
Write-once discs, 170, 179
Writing, 164
WWW. See World Wide Web
WYSIWYG (what you see is what you get) editors, 67, 76
y
Yahoo!, 39, 48, 349
Yahoo! Mail, 38
Yoga mats, 244, 245, 250
YouTube, 68, 77
z
Zombies, 223, 235
Zuckerberg, Mark, 351