The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Computing Essentials (2017)

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Pusat Sumber Al-Fairuz KVSP2, 2021-08-21 10:46:10

Computing Essentials

Computing Essentials (2017)

Keywords: Computing Essentials

Computing Essentials
2017
ITMaking work for you

• The O’Leary Series

Computing Concepts

• Computing Essentials 2014 Introductory & Complete Editions
• Computing Essentials 2015 Introductory & Complete Editions
• Computing Essentials 2017 (Complete Edition)

Microsoft Office Applications

• Microsoft® Windows 7: A Case Approach
• Microsoft® Office 2013: A Case Approach
• Microsoft® Office Word 2013: A Case Approach Introductory Edition
• Microsoft® Office Excel 2013: A Case Approach Introductory Edition
• Microsoft® Office Access 2013: A Case Approach Introductory Edition
• Microsoft® Office PowerPoint 2013: A Case Approach Introductory Edition

Computing Essentials
2017
ITMaking work for you

Timothy J. O’Leary

Professor Emeritus
Arizona State University

Linda I. O’Leary
Daniel A. O’Leary

PhD
University of California at Santa Cruz

COMPUTING ESSENTIALS 2017 COMPLETE EDITION
Published by McGraw-Hill Education, 2 Penn Plaza, New York, NY 10121. Copyright © 2017 by McGraw-Hill Edu-
cation. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced
or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written
consent of McGraw-Hill Education, including, but not limited to, in any network or other electronic storage or
transmission, or broadcast for distance learning.
Some ancillaries, including electronic and print components, may not be available to customers outside the United
States.
This book is printed on acid-free paper.
1 2 3 4 5 6 7 8 9 0 RMN/RMN 1 0 9 8 7 6
ISBN 978-1-259-56365-2
MHID 1-259-56365-0
ISSN 2158-8805
Senior Vice President, Products & Markets: Kurt L. Strand
Vice President, General Manager, Products & Markets: Michael Ryan
Vice President, Content Design & Delivery: Kimberly Meriwether David
Managing Director: Scott Davidson
Executive Brand Manager: Wyatt Morris
Director, Product Development: Meghan Campbell
Senior Product Developer: Alan Palmer
Executive Marketing Managers: Tiffany Russell, Debbie Clare
Senior Product Developer: Kevin White
Senior Digital Product Analyst: Thuan Vinh
Director, Content Design & Delivery: Terri Schiesl
Program Manager: Mary Conzachi
Content Project Managers: Mary E. Powers (Core), Danielle Clement (Assessment)
Buyer: Susan K. Culbertson
Design: Srdjan Savanovic
Content Licensing Specialists: Carrie Burger (Image), DeAnna Dausener (Text)
Cover Image: © Photosani/Shutterstock
Compositor: SPi Global
Printer: R. R. Donnelley
All credits appearing on page or at the end of the book are considered to be an extension of the copyright page.

The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website does
not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education does not
guarantee the accuracy of the information presented at these sites.
www.mhhe.com

• Dedication

We dedicate this edition to Nicole and Katie—our inspiration.

Brief Contents

1 Information Technology, the Internet, and You  2
2 The Internet, the Web, and Electronic Commerce  26
3 Application Software  60
4 System Software  88
5 The System Unit  114
6 Input and Output  140
7 Secondary Storage  172
8 Communications and Networks  194
9 Privacy, Security, and Ethics  222
10 Information Systems  252
11 Databases  276
12 Systems Analysis and Design  302
13 Programming and Languages  328

The Evolution of the Computer Age  360
The Computer Buyer’s Guide  371
Glossary 375
Index 396

vi

Contents

1 File Transfer Utilities  35
Internet Security Suites  36
INFORMATION TECHNOLOGY, Communication  37
THE INTERNET, AND YOU  2 E-mail  37
Messaging  38
Introduction  4 Social Networking  39
Information Systems  4 Blogs, Microblogs, Webcasts, Podcasts,
People  6 and Wikis  41
Software  7 Search Tools  43
Search Engines  43
System Software  7 Specialized Search Engines  43
Application Software  8 Content Evaluation  43
Electronic Commerce  44
Making IT work for you: Security  45
Cloud Computing  46
Free Antivirus Program  9 The Internet of Things  47
Hardware  10 Careers in IT  48
A Look to the Future: Your Car’s Dashboard
Types of Computers  10 as a Powerful, Internet-Connected Computing
Personal Computer Hardware  11 Device  49
Data  13
Connectivity and the Mobile Internet  14 Visual Summary  50
Careers in IT  15 Key Terms  54
A Look to the Future: Using and Understanding Multiple Choice  55
Information Technology  16 Matching  56
Open-Ended  56
Visual Summary  17 Discussion  57
Key Terms  20 Photo Credits  59
Multiple Choice  21
Matching  22 3
Open-Ended  22
Discussion  23 APPLICATION SOFTWARE  60
Photo Credits  25
Introduction  62
2 Application Software  62

THE INTERNET, THE WEB, User Interface  62
AND ELECTRONIC COMMERCE  26 Common Features  64
General-Purpose Applications  64
Introduction  28 Word Processors  64
The Internet and the Web  28 Spreadsheets  67
Presentation Graphics  69
Making IT work for you: Database Management Systems  70
Specialized Applications  70
Online Entertainment  30 Graphics  70
Internet Access  32 Video Game Design Software  73
Web Authoring Programs  73
Providers  32 Other Specialized Applications  74
Browsers  32 Mobile Apps  74
Web Utilities  34 Apps  74
Plug-ins  34 App Stores  75
Filters  34

vii

Software Suites  76 5
Office Suites  76
Cloud Computing  76 THE SYSTEM UNIT  114
Specialized and Utility Suites  76
Introduction  116
Careers in IT  77 System Unit  116

Making IT work for you: Desktops  116
Laptops  116
Google Docs  78 Tablets  117
Smartphones  118
A Look to the Future: Next-Generation Wearable Computers  118
User Interfaces  79 Components  118
System Board  119
Visual Summary  80 Microprocessor  120
Key Terms  83 Microprocessor Chips  121
Multiple Choice  84 Specialty Processors  121
Matching  85 Memory  122
Open-Ended  85 RAM  122
Discussion  86 ROM  122
Photo Credits  87 Flash Memory  122
Expansion Slots and Cards  123
4 Bus Lines  124
Expansion Buses  124
SYSTEM SOFTWARE  88 Ports  125
Standard Ports  126
Introduction  90 Specialized Ports  126
System Software  90 Cables  126
Operating Systems  91
Making IT work for you:
Functions  91
Features  92 Tv Tuners  127
Categories  93 Power Supply  128
Mobile Operating Systems  94 Electronic Data and Instructions  129
Desktop Operating Systems  95
Windows  95 Numeric Representation  129
Mac OS  95 Character Encoding  129
UNIX and Linux  96 Careers in IT  130
Virtualization  96 A Look to the Future: Chips inside
Utilities  97 Your Brain  131

Making IT work for you: Visual Summary  132
Key Terms  135
Mac OS X Activity Monitor  98 Multiple Choice  136
Matching  137
Windows Utilities  100 Open-Ended  137
Utility Suites  103 Discussion  138
Careers in IT  104 Photo Credits  139
A Look to the Future: Self-Healing Computers
Could Mean an End to Computer Crashes and 6
Performance Problems  105
INPUT AND OUTPUT  140
Visual Summary  106
Key Terms  109 Introduction  142
Multiple Choice  110 What Is Input?  142
Matching  111 Keyboard Entry  142
Open-Ended  111
Discussion  112 Keyboards  143
Photo Credits  113

viii CONTENTS

Pointing Devices  144 7
Mouse  144
Touch Screen  144 SECONDARY STORAGE  172
Game Controllers  144
Stylus  145 Introduction  174
Storage  174
Scanning Devices  145 Hard Disks  175
Optical Scanners  146
Card Readers  146 Internal Hard Disk  176
Bar Code Readers  146 External Hard Drives  176
RFID Readers  147 Performance Enhancements  176
Character and Mark Recognition Solid-State Storage  178
Devices  147 Solid-State Drives  178
Flash Memory Cards  178
Image Capturing Devices  147 USB Drives  178
Digital Cameras  148 Optical Discs  179
Webcams  148 Cloud Storage  180

Audio-Input Devices  148 Making IT work for you:
Voice Recognition Systems  148
Cloud Storage  182
What Is Output?  149 Mass Storage Devices  184
Monitors  149
Enterprise Storage System  184
Features  149 Storage Area Network  185
Flat-Panel Monitors  150 Careers in IT  185
Curved Monitors  150 A Look to the Future:
E-book Readers  150 Next-Generation Storage  186
Other Monitors  151
Visual Summary  187
Making IT work for you: E-Books  152 Key Terms  190
Multiple Choice  190
Printers  153 Matching  191
Features  153 Open-Ended  192
Inkjet Printers  153 Discussion  192
Laser Printers  154 Photo Credits  193
3D Printers  154
Other Printers  154 8

Audio-Output Devices  155 COMMUNICATIONS
Combination Input and Output AND NETWORKS  194
Devices  155
Introduction  196
Headsets  155 Communications  196
Multifunctional Devices  156
Telephones  156 Connectivity  196
Drones  156 The Wireless Revolution  197
Robots  156 Communication Systems  197
Communication Channels  198
Making IT work for you: Skype  157 Physical Connections  198
Wireless Connections  199
Virtual Reality Headgear and Gloves  159 Connection Devices  200
Ergonomics  159 Modems  200
Connection Service  200
Portable Computers  161 Data Transmission  202
Careers in IT  161 Bandwidth  202
A Look to the Future: Augmented Reality Protocols  202
Displays  162

Visual Summary  163
Key Terms  167
Multiple Choice  168
Matching  169
Open-Ended  169
Discussion  170
Photo Credits  171

CONTENTS ix

Making IT work for you: Careers in IT  241
A Look to the Future:
Mobile Internet  203 The End of Anonymity  242
Networks  204
Visual Summary  243
Terms  204 Key Terms  246
Network Types  206 Multiple Choice  247
Matching  248
Local Area Networks  206 Open-Ended  248
Home Networks  206 Discussion  249
Wireless LAN  207 Photo Credits  251
Personal Area Network  207
Metropolitan Area Networks  208 10
Wide Area Networks  208
Network Architecture  208 INFORMATION SYSTEMS  252
Topologies  209
Strategies  210 Introduction  254
Organizational Networks  210 Organizational Information Flow  254
Internet Technologies  211
Network Security  211 Functions  254
Careers in IT  212 Management Levels  256
A Look to the Future: Telepresence Information Flow  257
Lets You Be There without Actually Computer-Based Information
Being There  213 Systems  258
Transaction Processing Systems  259
Visual Summary  214 Management Information Systems  261
Key Terms  217 Decision Support Systems  262
Multiple Choice  218 Executive Support Systems  263
Matching  219 Other Information Systems  265
Open-Ended  219 Expert Systems  266
Discussion  220 Careers in IT  266
Photo Credits  221 A Look to the Future: IBM’s Watson:
The Ultimate Information-Finding
9 Machine  267

PRIVACY, SECURITY, Visual Summary  268
AND ETHICS  222 Key Terms  270
Multiple Choice  271
Introduction  224 Matching  272
People  224 Open-Ended  272
Privacy  224 Discussion  273
Photo Credits  274
Large Databases  225
Private Networks  227 11
The Internet and the Web  227
Online Identity  230 DATABASES  276
Major Laws on Privacy  230
Security  231 Introduction  278
Cybercrime  231 Data  278
Measures to Protect Computer Data Organization  279
Security  235
Ethics  238 Key Field  280
Batch versus Real-Time Processing  280
Making IT Work for You: Databases  281
Need for Databases  282
Cloud-Based Backup  239 Database Management  282

Copyright and Digital Rights
Management  240
Plagiarism  240

x CONTENTS

DBMS Structure  284 Prototyping  315
Hierarchical Database  284 Rapid Applications Development  315
Network Database  285 Careers in IT  316
Relational Database  285 A Look to the Future: The Challenge
Multidimensional Database  286 of Keeping Pace  317
Object-Oriented Database  287
Visual Summary  318
Types of Databases  288 Key Terms  322
Individual  288 Multiple Choice  323
Company  288 Matching  324
Distributed  289 Open-Ended  324
Commercial  289 Discussion  325
Photo Credits  326
Database Uses and Issues  290
Strategic Uses  290 13
Security  290
PROGRAMMING
Careers in IT  291 AND LANGUAGES  328
A Look to the Future:
The Future of Crime Databases  292 Introduction  330
Programs and Programming  330
Visual Summary  293
Key Terms  296 What Is a Program?  330
Multiple Choice  297 What Is Programming?  330
Matching  298 Step 1: Program Specification  332
Open-Ended  298 Program Objectives  332
Discussion  299 Desired Output  332
Photo Credits  301 Input Data  332
Processing Requirements  333
12 Program Specifications Document  333
Step 2: Program Design  334
SYSTEMS ANALYSIS Top-Down Program Design  334
AND DESIGN  302 Pseudocode  335
Flowcharts  335
Introduction  304 Logic Structures  337
Systems Analysis and Design  304 Step 3: Program Code  338
Phase 1: Preliminary Investigation  306 The Good Program  338
Coding  338
Defining the Problem  306 Step 4: Program Test  340
Suggesting Alternative Systems  307 Syntax Errors  340
Preparing a Short Report  307 Logic Errors  340
Phase 2: Systems Analysis  308 Testing Process  340
Gathering Data  308 Step 5: Program Documentation  342
Analyzing the Data  308 Step 6: Program Maintenance  343
Documenting Systems Analysis  310 Operations  343
Phase 3: Systems Design  310 Changing Needs  343
Designing Alternative Systems  310 CASE and OOP  344
Selecting the Best System  311 CASE Tools  344
Writing the Systems Design Report  311 Object-Oriented Software
Phase 4: Systems Development  312 Development  344
Acquiring Software  312 Generations of Programming
Acquiring Hardware  312 Languages  346
Testing the New System  313 Machine Languages: The First
Phase 5: Systems Implementation  313 Generation  346
Types of Conversion  313 Assembly Languages: The Second
Training  314 Generation  346
Phase 6: Systems Maintenance  314 High-Level Procedural Languages: The Third
Prototyping and Rapid Applications Generation  346
Development  315

CONTENTS xi

Task-Oriented Languages: The Fourth The Evolution of the Computer
Generation  347 Age  360
Problem and Constraint Languages: The Fifth
Generation  348 The Computer Buyer’s Guide  371
Careers in IT  349 Glossary  375
A Look to the Future: Your Own Index  396
Programmable Robot  350

Visual Summary  351
Key Terms  355
Multiple Choice  356
Matching  357
Open-Ended  357
Discussion  358
Photo Credits  359

xii CONTENTS

New to Computing Essentials 2017

Every chapter’s Making IT Work for You, Privacy, Ethics, and Environment features have been carefully revaluated,
enhanced, and/or replaced. Additionally, every chapter’s Look to the Future has been revised to show that the
expected breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the
following.

Chapter 1 Revised Figure 1-1 Parts of an Information System to include mobile devices (tablets and smartphones),
Windows 10 operating system, and Office 10
Chapter 2 Added coverage of Microsoft’s new Edge browser, https and MMS (Multimedia Messaging Service)
Expanded coverage of Facebook Messenger, Google Hangouts
Added coverage Instagram, Pinterest, Tumblr, and Vine
Added a major new section on the Internet of Things (IoT)
Chapter 3 Added coverage of video editors and video game design software
Added discussion of game apps including role playing games (RPG)
Expanded Cloud Computing to include Microsoft Office 365 for Office and iPad.
Chapter 4 Expanded coverage of voice recognition and real time operating systems (RTOS)
Undated operating systems to include coverage of Windows 10 and Cortana
Expanded coverage of Mac OS including Yosemite and related system software
Expanded coverage of Chrome OS
Chapter 5 Expanded coverage of laptops to include two-in-one, gaming, and ultrabooks
Expanded coverage of tablets to include keyboard attachments, digital pens, and speech recognition
Added a new major section on Wearable Computers
Expanded and updated ports and cables
Chapter 6 Added coverage of gaming mice, 3D scanners, and smart cards
Expanded coverage of voice recognition systems to include digital assistants (Siri, Cortana, and Google
Now)
Updated resolution standards to include UHD 4K and UHD 5K
Added coverage of UHDTV, 3D UHDTV, digital projectors headsets and headphones
Expanded coverage of drones, robots, and virtual reality
Chapter 7 Reorganized chapter to give more prominence to solid-state storage
Expanded solid-storage, flash memory coverage, and NAS
Chapter 8 Updated Wi-Fi standards to include 802.11ac and 802.11ax
Added cellular as a wireless connection technology including discussion of cells and cell towers
Expanded coverage of LTE as a fourth-generation mobile telecommunication technology
Chapter 9 Added Privacy relating to drones and the Dark Web
Added Ethics boxes relating to the right to be forgotten and net neutrality
Added a Tip on creating strong passwords
Added a new section on security tools including password managers
Chapters 10, New end of chapter case
11, 12, and 13

xiii

Preface

The 20th century brought us the dawn of the digital informa-
tion age and unprecedented changes in information technology.
In fact, the rate of change is clearly increasing. As we begin the
21st century, computer literacy is undoubtedly becoming a prerequisite
in whatever career you choose.

The goal of Computing Essentials is to provide you with the basis for
understanding the concepts necessary for success. Computing Essentials
also endeavors to instill an appreciation for the effect of information
technology on people, privacy, ethics, and our environment and to
give you a basis for building the necessary skill set to succeed in the
21st century.

Times are changing, technology is changing, and this text is changing
too. As students of today, you are different from those of yesterday. You
put much effort toward the things that interest you and the things that
are relevant to you. Your efforts directed at learning application pro-
grams and exploring the web seem, at times, limitless. On the other
hand, it is sometimes difficult to engage in other equally important
t­opics such as personal privacy and technological advances.

At the beginning of each chapter, we carefully layout why and how the
chapter’s content is relevant to your life today and critical to your future.
Within each chapter, we present practical tips related to key concepts
through the demonstration of interesting applications that are relevant
to your lives. Topics presented focus first on outputs rather than pro-
cesses. Then, we discuss the concepts and processes.

Motivation and relevance are the keys. This text has several features
specifically designed to engage and demonstrate the relevance of tech-
nology in your lives. These elements are combined with a thorough
c­ overage of the concepts and sound pedagogical devices.

xiv

Visual Learning

VISUAL CHAPTER OPENERS Revised Pages
Revised Pages

2chapter The Internet, the Web,
and Electronic Commerce

Why should I read this chapter? Each chapter begins with a Why
Should I Read This? feature that
The Internet has changed the world, and will continue to presents a visually engaging and
have an amazing impact on our day-to-day lives. For exam- concise presentation of the chap-
ple, cars promise to soon be able to drive themselves, avoid ter’s relevance to the reader’s
traffic accidents and congestion, and automatically adjust current and future life in the digi-
personal schedules and much more. tal world. Then a list of chapter
learning objectives is presented
This chapter covers the things you need to know to be providing a brief introduction
prepared for this ever-changing digital world, including: to what will be covered in the
• Impact—how Internet technology is changing your chapter.

world.
• Hardware—how to connect your life to the Internet,

including Wi-Fi, smartphones, and tablets.
• Applications—how to get ahead using social network-

ing, streaming technology, and cloud computing.

Learning Objectives

After you have read this chapter, you should be able to:

1 Explain the origins of the Internet and the web.
2 Explain how to access the web using providers and browsers.
3 Compare different web utilities, including plug-ins, filters, file transfer utilities, and Internet secu-

rity suites.
4 Compare different Internet communications, including e-mail, text messaging, instant messaging,

social networking, blogs, microblogs, webcasts, podcasts, and wikis.
5 Describe search tools, including search engines and specialized search engines.
6 Evaluate the accuracy of information presented on the web.
7 Identify electronic commerce, including B2C, C2C, B2B, and security issues.
8 Describe cloud computing, including the three-way interaction of clients, Internet, and service

providers.
9 Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow

everyday objects to send and receive data.

26 10/15/15 05:14 PM ole63650_ch02_026-059.indd 27 27

ole63650_ch02_026-059.indd 26 10/15/15 05:14 PM

VISUAL SUMMARIES Revised Pages Revised Pages

Visual summaries appear at the VISUAL SUMMARY The Internet, the Web, and Electronic Commerce To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be
end of every chapter and sum- able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand
marize major concepts covered electronic commerce, and to use web utilities.
throughout the chapter. Like the
chapter openers, these summaries WEB UTILITIES COMMUNICATION
use graphics to reinforce key
concepts in an engaging and INTERNET AND WEB INTERNET ACCESS
meaningful way.
Internet Once connected to the Internet, your computer seemingly Web utilities are specialized utility programs that make E-mail
Launched in 1969 with ARPANET, the Internet consists becomes an extension of a giant computer that branches using the Internet and the web easier and safer. E-mail (electronic mail) is the transmission of electronic
of the actual physical network. all over the world. messages. There are two basic types of e-mail systems:
plug-ins • Client-based e-mail systems use e-mail clients
Web providers Plug-ins are automatically loaded and operate as part of a
Introduced in 1991 the web (World Wide Web, WWW) Internet service providers are connected to the Internet, browser. Many websites require specific plug-ins to fully installed on your computer.
provides a multimedia interface to Internet resources. Three providing a path for individuals to access the Internet. experience their content. Some plug-ins are included in • Web-based e-mail systems use webmail clients located
generations: Web 1.0 (existing information), Web 2.0 (con- Connection technologies include DSL, cable, and wire- many of today’s browsers; others must be installed.
tent creation and social interaction), and Web 3.0 (automatic less modems. on the e-mail provider’s computer. This is known as
personalized content). Filters webmail.
browsers Filters are used by parents and organizations to block cer-
Common Uses Browsers provide access to web resources. Some related tain sites and to monitor use of the Internet and the web. A typical e-mail has three basic elements: header
The most common uses of the Internet and the web terms are (including address, subject, and perhaps attachment),
include • URLs—locations or addresses to web resources; two File Transfer Utilities message, and signature.
• Communication—the most popular Internet activity. File transfer utilities copy files to (downloading) and from
• Shopping—one of the fastest-growing Internet parts are protocol and domain name; top-level domain (uploading) your computer. There are three types: user name top-level domain
(TLD) or web suffix identifies type of organization. • File transfer protocol (FTP) and secure file transfer
activities. • HTML—commands to display web pages; hyperlinks [email protected]
• Searching—access libraries and local, national, and (links) are connections. protocol (SFTP) allow you to efficiently copy files
Technologies providing interactive, animated websites across the Internet. domain name
international news. include cascading style sheets, or CSS (to control the • BitTorrent distributes file transfers across many differ-
• Education—e-learning or taking online courses. appearance of web pages); JavaScript (to trigger interac- ent computers. Spam is unwanted and unsolicited e-mail that may
• Entertainment—music, movies, magazines, and com- tive features); AJAX (to create quick response interactive • Web-based file transfer services make use of a web include a computer virus or destructive programs often
websites; and applets (to display graphics, provide inter- browser to upload and download files. attached to unsolicited e-mail. Spam blockers, also known as
puter games. active games, and more). spam filters, are programs that identify and eliminate spam.
Mobile browsers run on portable devices. Internet Security Suite
An Internet security suite is a collection of utility pro- messaging
grams designed to protect your privacy and security on While e-mail is the most widely used, there are two other
the Internet. messaging systems:
• Text messaging, also known as texting and SMS (short

message service), is a process of sending short electronic
messages typically less than 160 characters. Texting while
driving is very dangerous and illegal in several states.
• Instant messaging (IM)—supports live communication
between friends. Most instant messaging programs
also include videoconferencing features, file sharing,
and remote assistance.

50 ChApTEr 2 ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 51

ole63650_ch02_026-059.indd 50 10/15/15 05:14 PM ole63650_ch02_026-059.indd 51 10/15/15 05:14 PM

xv

Unique Content

MAKING IT WORK FOR YOU Special-interest topics are presented in the Mak-
ing IT Work for You section found within nearly
Revised Pages every chapter. These topics include Installing a Free
Antivirus Program, Online Entertainment, Google
ITMaking work for you Docs, Skype, and Cloud Storage.

FREE ANTIVIRUS PROGRAM

Have you or someone you know had a slower computing experience due to a spyware infection? Even
worse, perhaps a malicious piece of software stole crucial, personal information or caused a total system
failure. Most of these problems can be averted by having an up-to-date antivirus program running in your
computer’s memory at all times. This exercise shows you how to download and install a free antivirus pro-
gram if your computer does not yet have one. (Please note that the web is continually changing, and some
of the specifics presented below may have changed.)

getting Started First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to
completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free
antivirus program:

•1 Visit http://free.avg.com and click the Download button. You will be asked to confirm that you want the free
edition and then redirected to a download site.

•2 run the installation file and follow the prompts.
•3 Select basic protection if you are asked which product you would like to install.

using AVg Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.

•1 click Scan now to run a full scan on
your computer.

•2 Just to the right of that, click the
button with the white cog to see the
scan options where you can set a
schedule for automated scans.

•3 click the back arrow to reach the
main screen, where you can click
various elements of the program to
configure them. for example, clicking
Web will allow you to turn on a
feature that detects cookies that may
be used to track your online activity.

9

ole63650_ch01_002-025.indd 9 10/12/15 11:07 AM PRIVACY, ETHICS, AND ENVIRONMENTRev.ConfirmingPages

Nearly every chapter has a Privacy box located in privacy
the margin adjacent to the coverage of related tech-
nologies. Topics include protecting personal infor- Did you know that one type of
mation when using a free Wi-Fi network or when specialty processor is devoted
disposing of an outdated computer. exclusively to protecting your
privacy? Called cryptoproces-
sors, these microchips perform
encoding and decoding of data
faster and more securely than
a CPU. These specialized chips
exist in ATMs, TV set-top boxes,
and smartcards.

Figure 5-10 chip mounted onto a chip carrier

Nearly every chapter has an Ethics box located in ethics networking card plugs into a slot on the system board to provide a connection to a
the margin adjacent to the coverage of related tech- local area network.
nologies. Topics include proper disposal of older Because labor costs are • Connecting lines called bus lines provide pathways that support communication
CRT monitors, empty inkjet cartridges, and old much lower in China, many among the various electronic components that are either located on the system
computers. computers and peripherals are board or attached to the system board.
manufactured there. While this Generally, the system board found on a desktop is larger than that found on a lap-
has resulted in the loss of jobs top, and much larger than one found on a tablet, smartphone, or wearable computer.
elsewhere, it has improved the Although these system boards vary in size, they nevertheless all perform the same
standard of living for millions function of communicating between the components of the personal computer.
of Chinese. Unfortunately,
their working conditions are concept check
considered to be very poor. Do
you think consumers have an What is the system board, and what does it do?
ethical responsibility regarding Define and describe sockets, slots, and bus lines.
where and/or how products are What are chips? How are chips attached to the system board?
manufactured?

Microprocessor

Nearly every chapter has an Environment box environment In most personal computer systems, the central processing unit (CPU) or processor
located in the margin adjacent to the coverage of is contained on a single chip called the microprocessor. The microprocessor is the
related technologies. Topics include plagiarism of Have you ever wondered “brains” of the computer system. It has two basic components: the control unit and the
online materials, editing images to promote a partic- what you should do with your arithmetic-logic unit.
ular message, and the use of monitoring software. old computers equipment?
Consider donating them to • Control unit: The control unit tells the rest of the computer system how to carry
xvi charitable organizations that out a program’s instructions. It directs the movement of electronic signals between
work with local schools and memory, which temporarily holds data, instructions, and processed information,
low-income families. Or, recycle and the arithmetic-logic unit. It also directs these control signals between the CPU
them. Many computer retailers and input and output devices.
and local government agencies
accept recycled equipment. • Arithmetic-logic unit: The arithmetic-logic unit, usually called the ALU, performs
two types of operations: arithmetic and logical. Arithmetic operations are the
fundamental math operations: addition, subtraction, multiplication, and division.
Logical operations consist of comparisons such as whether one item is equal to
(=), less than (<), or greater than (>) the other.

120 chapter 5

Untitled-2 120 12/01/15 12:32 PM

Unique End-of-Chapter
Discussion Materials

MAKING IT WORK FOR YOU Revised Pages

Making IT Work for You discussion questions are carefully DISCUSSION
integrated with the chapter’s Making IT Work for You top-
ics. The questions facilitate in-class discussion or written Respond to each of the following questions.
assignments focusing on applying specific technologies into
a student’s day-to-day life. They are designed to expand a 1 Making IT Work for You: ONLINE ENTERTAINMENT
student’s awareness of technology applications.
Review the Making IT Work for You: Online Entertainment on pages 30–31, and then respond to the
PRIVACY following: (a) Do you currently have a subscription to Netflix, Hulu Plus, or another service that allows
you to stream movies and TV
Privacy discussion questions are carefully integrated with shows? If so, which ones? If
the chapter’s marginal Privacy box. The questions facilitate not, do you plan on using one in
in-class discussion or written assignments focusing on the future? Why or why not? (b)
critical privacy issues. They are designed to develop a What device do you use most
student’s ability to think critically and communicate often to watch video content
effectively. from the web? Would you con-
sider purchasing a dedicated
Revised Pages streaming device such as the
Roku? Why or why not? (c)
ETHICS Could ever see yourself cancel-
ing or “cutting the cord” from
your current cable or satellite
service? Why or why not?

2 Privacy: SOCIAL NETWORKING

When a Facebook friend posts a picture, video, or text
that includes you, who can view that post? Review the
Privacy box on page 40, and respond to the following:
(a) Who should be responsible for ensuring privacy on
social networking sites? Defend your position. (b) Do
you think that most people are aware of their privacy
settings on Facebook? Have you ever checked your
settings? Why or why not? (c) Investigate and then
summarize the default security settings for a social
networking website such as Facebook or Google+.

ChApTEr 2 57

Ethics discussion questions areole63650_ch02_026-059.indd 57 carefully integrated with 10/15/15 05:14 PM
the chapter’s marginal Ethics boxes. The questions facili-
3 Ethics: FILTERING AND MONITORING tate in-class discussion or written assignments focusing on
ethical issues relating to technology. They are designed to
Parents can use content filters develop a student’s ability to think critically and communi-
and monitoring software to cate effectively.
restrict or monitor their child’s
Internet behavior. Review the ENVIRONMENT
Ethics box on page 35, and
respond to the following: (a) Is Environment discussion questions are carefully integrated
it ethical for parents to filter with the chapter’s marginal Environment boxes. The ques-
or monitor Internet content tions facilitate in-class discussion or written assignments
for their children? Does your focusing on environmental issues relating to technology.
answer depend on the age of They are designed to develop a student’s ability to think
the child? Defend your position. critically and communicate effectively.
(b) Should parents inform their
children that Internet activity
is being filtered or monitored?
Why or why not? (c) Do you feel
that filtering or monitoring soft-
ware is the best way to protect
children? Defend your position.

4 Environment: E-MAIL

Review the Environment box on page 37, and then respond to the following: (a) When it comes to sending
letters, holiday cards, and invitations to friends and family, do you mostly use e-mail or postal mail? What
are your reasons for choos-
ing one over the other? (b) Are
there any situations where you
feel that using e-mail would be
inappropriate? (c) Have you
signed up for paperless billing
from your financial institutions
and utility companies? Why or
why not? (d) Go through all the
paper mail you have received in
the last week or two. Is there
anything there that you could
receive via e-mail or view on the
web? If so, list a few examples.

58 ChApTEr 2 10/15/15 05:14 PM xvii

ole63650_ch02_026-059.indd 58

Reinforcing Key • Shopping is one of the fastest-growing Internet applications. You can window
shop, look for the latest fashions, search for bargains, and make purchases.
CONCEPT CHECKS
• Searching for information has never been more convenient. You can access some
of the world’s largest libraries directly from your home computer. You can find the

Conceptslatest local, national, and international news.
• Education or e-learning is another rapidly emerging web application. You can take
classes on almost any subject. There are courses just for fun, and there are courses
for high school, college, and graduate school credit. Some cost nothing to take and
others cost a lot.
• Entertainment options are nearly endless. You can find music, movies, magazines,
and computer games. You will find live concerts, movie previews, book clubs, and
interactive live games. To learn more about online entertainment, see Making IT
Work for You: Online Entertainment on pages 30–31.

The first step to using the Internet and the web is to get connected, or to gain access
to the Internet.

Located at points throughout each chap- concept check
ter, the Concept Check cues you to note
which topics have been covered and to What is the difference between the Internet and the web?
self-test your understanding of the Describe how the Internet and the web started. What are the three web generations?
material presented. List and describe five of the most common uses of the Internet and the web.

Revised Pages

ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 29

KEY TERMS KEY TERMS

address (33, 37) message (37) Throughoutole63650_ch02_026-059.indd 29 the text, the most important terms 10/15/15 05:14 PM
Advanced Research Project Agency microblog (41) are presented in bold and are defined within the Revised Pages
MMS (multimedia messaging text. You will also find a list of key terms at the end
Network (ARPANET) (28) of each chapter and in the glossary at the end of
AJAX (33) service) (38) the book.
applets (33) mobile browser (33)
attachment (37) online (28) MULTIPLE CHOICE
BitTorrent (35) plug-in (34)
blog (41) podcast (42) Circle the correct answer.
browser (32) protocol (33)
business-to-business (B2B) (45) search engine (43) 1. The network that connects computers all over the world.
business-to-consumer (B2C) (44) search service (43)
cable (32) secure file transfer protocol (SFTP) (35) a. ARPANET c. LAN
cascading style sheets (CSS) (33) signature (37) b. Internet d. web
Circles (40) SMS (short messaging service) (38)
client-based e-mail system (38) social networking (39)
cloud computing (46) spam (38)
consumer-to-consumer (C2C) (44) spam blocker (38)
digital cash (45) spam filter (38)
domain name (33) specialized search engine (43)
downloading (35) spider (43)
DSL (32) streaming (41)
e-commerce (44) subject (37)
e-learning (29) texting (38)
electronic commerce (44) text messaging (38)
electronic mail (37) top-level domain (TLD) (33)
e-mail (37) tweet (41)
e-mail client (38) Twitter (41)
Facebook (39) uniform resource locator (URL) (33)
Facebook groups (40) uploading (35)
Facebook Pages (40) virus (38)
Facebook Profile (40) web (28)
file transfer protocol (FTP) (35) Web 1.0 (28)
filter (34) Web 2.0 (28)
friend (39) Web 3.0 (28)
Google+ (40) web auction (44)
Google Plus (40) web-based e-mail system (38)
Hangouts (40) web-based file transfer services (35)
header (37) webcasts (41)
hit (43) web log (41)
hyperlink (33) webmail (38)
Hypertext Markup Language (HTML) (33) webmail client (38)
instant messaging (IM) (39) webmaster (48)
Internet (28) web page (33)
Internet of Things (IoT) (47) web suffix (33)
Internet security suite (36) web utility (34)
Internet service provider (ISP) (32) wiki (42)
JavaScript (33) Wikipedia (42)
link (33) wireless modem (32)
LinkedIn (40) World Wide Web (28)
location (33) WWW (28)

54 ChApTEr 2 2. The rules for exchanging data between computers.

a. DSL c. web
b. protocols d. WWW

3. Using file transfer utility software, you can copy files to your computer from specially
configured servers on the Internet. This is called:

ole63650_ch02_026-059.indd 54 10/15/15 05:14 PM a. downloading c. blogging
b. filtering d. uploading
CHAPTER REVIEW
4. Communities of individuals who share a common interest typically create Facebook:

a. clients c. Pages
b. groups d. Profiles

5. Type of e-mail account that does not require an e-mail program to be installed on a
user’s computer is:

Following the Visual Summary, the chapter review includes a. blog-based c. utility-based
material designed to review and reinforce chapter content. It b. client-based d. web-based
includes a key terms list that reiterates the terms presented
6. The most popular microblogging site:

a. LinkedIn c. Twitter
b. Google+ d. Wikipedia

7. Using a keyword, a search engine returns a list of related sites known as:

a. blogs c. podcasts
b. hits d. strikes

in the chapter, multiple-choice questions to help test your 8. This is the Internet’s equivalent to traditional cash.
understanding of information presented in the chapter,
matching exercises to test your recall of terminology pre- a. digital cash c. ftp
b. e-commerce d. Internet dollars

9. The continuing Internet development that allows objects to send and receive data over
the Internet.

a. HTML c. search engines
b. IoT d. Web 2.0

sented in the chapter, and open-ended questions or state- 10. Three basic components to cloud computing are clients, Internet, and _____.
ments to help review your understanding of the key concepts
a. CSS c. streaming
b. service providers d. Web 3.0

presented in the chapter.

xviii ChApTEr 2 55

ole63650_ch02_026-059.indd 55 10/15/15 05:14 PM

The Future of Information Technology

CAREERS IN IT

Revised Pages

• File servers—dedicated computers with very large storage capacities that provide Some of the fastest-growing career opportunities are in
users access to fast storage and retrieval of data. information technology. Each chapter highlights one of
the most promising careers in IT by presenting job titles,
• Network attached storage (NAS)—a type of file server designed for homes and responsibilities, educational requirements, and ­salary
small businesses. NAS is less expensive, easier to set up, and easier to manage ranges. Among the careers covered are webmaster, soft-
than most file servers. However, it does not include powerful management tools ware engineer, and database administrator. You will learn
and features found in many large-scale file servers. how the material you are studying relates directly to a
potential career path.
• RAID systems—larger versions of the specialized devices discussed earlier in this
chapter that enhance organizational security by constantly making backup copies Revised Pages
of files moving across the organization’s networks.
A LOOK TO THE FUTURE
• Organizational cloud storage—high-speed Internet connection to a dedicated
remote storage facility. These facilities contain banks of file servers to offer enor-
mous amounts of storage.

Storage Area network
A recent mass storage development is storage area network (SAN) systems. SAN is
an architecture to link remote computer storage devices, such as enterprise storage
systems, to computers such that the devices are as available as locally attached drives.
In a SAN system, the user’s computer provides the file system for storing data, but the
SAN provides the disk space for data.

The key to a SAN is a high-speed network, connecting individual computers to
mass storage devices. Special file systems prevent simultaneous users from interfering
with each other. SANs provide the ability to house data in remote locations and still
allow efficient and secure access.

concept check

Define mass storage and mass storage devices.
What is an enterprise storage system?
What is a storage area network system?

Careers in IT Disaster recovery specialists are responsible for recovering systems and
data after a disaster strikes an organization. In addition, they often cre-
now that you’ve learned about secondary ate plans to prevent and prepare for such disasters. A crucial part of
that plan is to use storage devices and media in order to ensure that all
“ storage, let me tell you a little bit about my company data is backed up and, in some cases, stored off-site.
”career as a disaster recovery specialist.
Employers typically look for candidates with a bachelor’s or associ-
ate’s degree in information systems or computer science. Experience
in this field is usually required, and additional skills in the areas of net-
working, security, and database administration are desirable. Disaster
recovery specialists should possess good communication skills and be
able to handle high-stress situations.

Disaster recovery specialists can expect to earn an annual salary of
$70,000 to $88,000. Opportunities for advancement typically include
upper-management positions. With so many types of threats facing
organizations, demand for these types of specialists is expected to grow.

SecOndAry StOrAge 185

A LOOK TO THE FUTUREole63650_ch07_172-193.indd 185 10/30/15 07:39 PM Your Car’s dashboard as a powerful, already paying for an online streaming video service to give
Internet-Connected Computing device their children access to this enormous library of cartoons
Each chapter concludes with a brief discussion of and movies right in the vehicle. In fact, with a tabletlike inter-
a recent technological advancement related to the Do you often wish that you could shop online or make din- face, your child can choose from a preset selection of mov-
chapter material, reinforcing the importance of stay- ner plans while your car drove itself? Would you like your ies or educational games, depending on his or her mood.
ing informed. car to use the Internet to suggest a better route, or stream
a music list tailored to your likes? A computer located within Now, such a tool at your fingertips has the risk of becom-
the vehicle already governs many of your car’s functions. That ing a distraction while you’re driving. There is no question
computer is responsible for various safety and diagnostic fea- that safety features must be built in to prevent accidents
tures. Recently, cars have begun offering Internet access for from occurring. Luckily, there is already a piece of technol-
driving directions, streaming audio, and cell phone connectiv- ogy that prevents the driver from ever having to touch the
ity. In the future, cars will drive themselves and seamlessly dashboard: voice recognition.
integrate into our digital lives. Technology has been making
better cars, and will continue to evolve to improve our lives as In the same way that Apple’s “Siri” has revolutionized the
we look to the future. way individuals interact with their iPhones, similar systems are
installed in the new dashboards. Drivers simply speak their
Apple and Google have cre-
ated partnerships with auto- commands to get the informa-
mobile manufacturers to place tion they need and to use the
iPad or Android devices into vehicle’s controls. Furthermore,
the center of a vehicle’s main this computer system uses exist-
console. Cars can connect to ing technologies that recognize
Wi-Fi access points or 4G net- and speak English to the user.
works to reach the Internet as This will allow the driver to hear
the modern smartphone does. e-mail messages, social network
These developments allow your updates, and today’s news and
vehicle to provide many ser- weather while driving to work.
vices that normally require a
smartphone but in a safer and Some companies have already
more integrated manner. taken steps in implementing this
technology. Ford uses voice rec-
One of the immediate benefits involves quick access ognition in some of its vehicles
to information. Drivers get real-time traffic data, weather, with a feature called Sync with MyFord Touch. Audi has
store hours, and much more. Also available is access to all added 3G connectivity in its new A7 model. However, the
the apps that you expect to have. One example is the Pan- real breakthroughs will come when you can drive in safety
dora service, which allows you to stream free, ad-supported while being as productive as when you are on your laptop.
music from stations you create yourself. Why pay for satel- Advances in dictation software will one day allow users to
lite radio or listen to stations that you don’t enjoy when you easily dictate e-mail responses. Changes in sensors and
can access your favorite online music services right from automated driving will allow users to devote less attention
your dashboard? Another benefit is the entertainment of to driving and more to getting things done. Google and Mer-
your passengers or children. Some vehicles include screens cedes are currently testing self-driving cars, and they may
that face the back seats, allowing parents to play DVDs for be available in the next ten years. When it does, do you see
their children. Internet-connected vehicles allow individuals yourself paying for this upgrade in your next car? Would
you be comfortable allowing a car to drive itself while you
worked on your laptop or tablet?

MoviesOnline: Information Systems ole63650_ch02_026-059.indd 49 49

Alice's First Assignment 10/15/15 05:14 PM
Bob: Oh, hi Alice . . . come on in! I know that we were scheduled for an
orientation meeting this morning. But I'm afraid that will have to wait. There is an Found in Connect for Computing Essentials 2017,
Important fire to put out today. Let me introduce you to one of your coworkers. Using IT at MoviesOnline—A Case Study of a fictitious
This is Jamal. organization provides an up-close look at what you
might expect to find on the job in the real world. You
Alice and Jamal exchange hellos and Bob motions Alice to take one of the chairs will follow Alice, a recent college graduate hired as a
across from his desk as he speaks. marketing analyst, as she navigates her way through
accounting, marketing, production, human resources,
“She said she was concerned about how our and research, gathering and processing data to help
members were connecting to our Web site.” manage and accelerate the growth of the three-year-
old company.
Bob: I just came back from a meeting with Carol,
our CEO. While we were discussing the Monthly
Membership Report, she said she was concerned
about how our members were connecting to our
Web site. This really caught me off guard! Our
membership growth has exceeded projections and
I had assumed that our meeting was to discuss
how to handle all the new members. She
requested that her Morning Report be modified to
include the percentage of our customers who use
mobile devices, and she wants us to analyze the
changes in laptop and desktop customers versus
mobile device customers over the past year.

Bob: Jamal, here is the Monthly Membership Report. I'd like you to review it and
then create two profiles. One profile will describe our members who use computers,
such as laptops and desktops. The other profile will be for our members who use mobile
devices, such as cell phones and tablets.. I’m interested in any differences or unique
characteristics you can uncover.

Bob removes the cover page, hands the rest of the report to Jamal, and hands the
cover page to Alice.

xix

®

Required=Results

McGraw-Hill Connect®
Learn Without Limits

Connect is a teaching and learning platform that
is proven to deliver better results for students and
instructors.

Connect empowers students by continually
adapting to deliver precisely what they need, when
they need it, and how they need it, so your class
time is more engaging and effective.

88% of instructors who use Connect Using Connect improves passing rates
require it; instructor satisfaction increases by 10.8% and retention by 16.4%.

by 38% when Connect is required.

Analytics Students can view
their results for any
Connect Insight®
Connect course.
Connect Insight is Connect’s new one-of-a-kind visual
analytics dashboard—now available for both instructors
and students—that provides at-a-glance information
regarding student performance, which is immediately actionable. By presenting
assignment, assessment, and topical performance results together with a
time metric that is easily visible for aggregate or individual results, Connect
Insight gives the user the ability to take a just-in-time approach to teaching and
learning, which was never before available. Connect Insight presents data that
empowers students and helps instructors improve class performance in a way
that is efficient and effective.

Mobile

Connect’s new, intuitive mobile interface gives students and instructors
flexible and convenient, anytime–anywhere access to all components of
the Connect platform.

Adaptive THE FIRST AND ONLY
ADAPTIVE READING
More students earn A’s and EXPERIENCE DESIGNED
B’s when they use McGraw-Hill TO TRANSFORM THE
Education Adaptive products. WAY STUDENTS READ

SmartBook®

Proven to help students improve grades and study more
efficiently, SmartBook contains the same content within
the print book, but actively tailors that content to the
needs of the individual. SmartBook’s adaptive technology
provides precise, personalized instruction on what the
student should do next, guiding the student to master
and remember key concepts, targeting gaps in knowledge
and offering customized feedback, and driving the student
toward comprehension and retention of the subject matter.
Available on smartphones and tablets, SmartBook puts
learning at the student’s fingertips—anywhere, anytime.

Over 4 billion questions have been
answered, making McGraw-Hill

Education products more intelligent,
reliable, and precise.

Support Materials in Connect

The Instructor’s Manual offers lecture outlines with teaching notes and figure refer-
ences. It provides definitions of key terms and solutions to the end-of-chapter mate-
rial, including multiple-choice, matching, and open-ended questions.
The PowerPoint slides are designed to provide instructors with a comprehensive
resource for lecture use. The slides include a review of key terms and topics, as well as
artwork taken from the text to further explain concepts covered in each chapter.
The testbank contains over 2,200 questions categorized by level of learning (defini-
tion, concept, and application). This is the same learning scheme that is introduced in
the text to provide a valuable testing and reinforcement tool. Text page references have
been provided for all questions, including a level-of-difficulty rating.

xxii

SIMNET ONLINE TRAINING AND ASSESSMENT
FOR OFFICE APPLICATIONS

SIMnet™ Online provides a way for you to test students’ software skills in a sim-
ulated environment. SIMnet provides flexibility for you in your applications course
by offering:
• Pretesting options
• Posttesting options
• Course placement testing
• Diagnostic capabilities to reinforce skills
• Web delivery of tests
• Learning verification reports
For more information on skills assessment software, please contact your local sales
representative, or visit us at www.simnetkeepitsimple.com.

xxiii

Acknowledgments

A special thank-you goes to the professors who took time Kathleen Morris
out of their busy schedules to provide us with the feed- University of Alabama
back necessary to develop the 2017 edition of this text. Katherine Oser
The following professors offered valuable suggestions on Central Texas College
revising the text: Debra Luna
El Paso Community College
Brenda Nickel Brenda McFarland
Moraine Park Technical College Asheville-Buncombe Technical Community College
Pamela Silvers Jennifer Krou
Asheville-Buncombe Technical Community College Texas State University
Natalie Cooper Mark Jackson
Madisonville Community College Columbus State Community College
Melissa Nemeth Kamal Kakish
IU Kelley School of Business Indianapolis Georgia Gwinnett College
Kate LeGrand Joshua Cuneo
Broward College Georgia Gwinnett College
Tiffany Ford
Ozarks Technical Community College Our sincere thanks also go to Laurie Zouharis at Suffolk
Laurence Hitterdale College for revising probes for LearnSmart; to Brenda
Glendale Community College Nielsen at Mesa Community College for revising the
Paulette Comet Instructor’s Manual, and online quizzes; to Rose Marie
Community College of Baltimore County Kuebbing for revising the testbank; and to Rachelle Hall
Lacey Lormand at Glendale Community College for revising the Power-
University of Louisiana at Lafayette Point presentations to accompany this text.

xxiv

About the Authors

Tim and Linda O’Leary live in the American Southwest
and spend much of their time engaging instructors and
students in conversation about learning. In fact, they have
been talking about learning for over 25 years. Something in
those early conversations convinced them to write a book,
to bring their interest in the learning process to the printed
page. Now, they are joined by their son Dan O’Leary as a
coauthor. Dan has recently completed his PhD in Electri-
cal Engineering with significant experience in teaching and
consulting in information technology.

The O’Leary’s form a unique team blending experience and youth. Tim has
taught courses at Stark Technical College in Canton, Ohio, and at Roches-
ter Institute of Technology in upstate New York, and is currently a professor
emeritus at Arizona State University. Linda offered her expertise at ASU for
several years as an academic advisor. She also presented and developed mate-
rials for major corporations such as Motorola, Intel, Honeywell, and AT&T,
as well as various community colleges in the Phoenix area. Dan has taught
at the University of California at Santa Cruz, developed energy-related labs
at NASA, and worked as a database administrator and as a consultant in
information systems.

Tim, Linda, and Dan have talked to and taught numerous students, all of
them with a desire to learn something about computers and applications that
make their lives easier, more interesting, and more productive.

Each new edition of an O’Leary text, supplement, or learning aid has ben-
efited from these students and their instructors who daily stand in front of
them (or over their shoulders).

xxv

1chapter Information Technology,
the Internet, and You

2

Why should I read this chapter?

The future of computers and digital technology promises exciting chal-
lenges and opportunities. Powerful software and hardware systems are
changing the way people and organizations interact in their daily life
and on the Internet.

This chapter introduces you to the skills and concepts you need to
be prepared for this ever-changing digital world, including:
• Information systems—how the critical parts of technology interact.
• Efficiency and effectiveness—how to maximize the use of

technology.
• Privacy, ethics, and environment—how to integrate technology

with people.
• Connectivity and cloud computing—how the Internet, web, and the

wireless revolution are changing how we communicate and interact.

Learning Objectives

After you have read this chapter, you should be able to:
1 Explain the parts of an information system: people, procedures, software, hardware, data, and the

Internet.
2 Distinguish between system software and application software.
3 Differentiate between the three kinds of system software programs.
4 Define and compare general-purpose, specialized, and mobile applications.
5 Identify the four types of computers and the five types of personal computers.
6 Describe the different types of computer hardware, including the system unit, input, output,

s­ torage, and communication devices.
7 Define data and describe document, worksheet, database, and presentation files.
8 Explain computer connectivity, the wireless revolution, the Internet, cloud computing, and loT.

3

Introduction The purpose of this book is to help you become a highly
efficient and effective computer user. This includes
“Welcome to Computing Essentials. I’m Alan and I work in informa- how to use (1) apps and application software; (2) all
tion technology. On the following pages, we’ll be discussing some types of computer hardware including mobile devices
of the most exciting new developments in computer technology like smartphones, tablets, and laptops; and (3) the Inter-
including smartphones, tablet computers, and cloud computing. net. Becoming a highly efficient and effective computer
Let me begin in this chapter by giving you an overview of the book user also requires a full understanding of the potential
”and showing you some of its special features. impact of technology on privacy and the environment as
well as the role of personal and organizational ethics.

To effectively and efficiently use computers, you need
to know the parts of an information system: people, pro-
cedures, software, hardware, data, and the Internet. You
also need to understand the wireless revolution, the
mobile Internet, and the web and to recognize the role
of information technology in your personal and profes-
sional life.

Information Systems

When you think of a personal computer, perhaps you think of just the equipment
itself. That is, you think of the screen or the keyboard. Yet, there is more to it than
that. The way to think about a personal computer is as part of an information system.
An information system has several parts: people, procedures, software, hardware, data,
and the Internet. (See Figure 1-1.)

• People: It is easy to overlook people as one of the parts of an information system.
Yet this is what personal computers are all about—making people, end users like
you, more productive.

• Procedures: The rules or guidelines for people to follow when using software,
hardware, and data are procedures. These procedures are typically documented
in manuals written by computer specialists. Software and hardware manufactur-
ers provide manuals with their products. These manuals are provided in either
printed or electronic form.

• Software: A program consists of the step-by-step instructions that tell the com-
puter how to do its work. Software is another name for a program or programs.
The purpose of software is to convert data (unprocessed facts) into information
(processed facts). For example, a payroll program would instruct the computer to
take the number of hours you worked in a week (data) and multiply it by your pay
rate (data) to determine how much you are paid for the week (information).

• Hardware: The equipment that processes the data to create information is called
hardware. It includes smartphones, tablets, keyboards, mice, displays, system
units, and other devices. Hardware is controlled by software.

• Data: The raw, unprocessed facts, including text, numbers, images, and sounds,
are called data. Processed data yields information. Using the previous example of
a payroll program, the data (number of hours worked and pay rate) is processed
(multiplied) to yield information (weekly pay).

• Internet: Almost all information systems provide a way to connect to other people
and computers, typically using the Internet. This connectivity greatly expands the
capability and usefulness of information systems.

4 chapter 1

People
are end users who use computers
to make themselves more productive.

Software
provides step-by step instructions
for computer hardware.

Procedures
specify rules or guidelines
for computer operations.

Hardware Data
includes keyboard, mouse, consists of unprocessed facts including text,
display, system unit, tablets, numbers, images, and sounds.
smartphones, and other devices.
Figure 1-1  Parts of an information
Internet system
allows computers to connect Information Technology, the Internet, and You 5
to people and other
computers.

concept check

What are the parts of an information system?
What is a program?
What is the difference between data and information?

environment People

Did you know that over 10 People are surely the most important part of any information system. Our lives are
million tons of material was touched every day by computers and information systems. Many times the contact
diverted from landfills last year is direct and obvious,
alone as a result of recycling such as when we create
efforts? This success is largely documents using a word
due to voluntary participation processing program or
of people across the country, when we connect to the
who have made “reduce, Internet. (See Figure 1-2.)
reuse, and recycle” a personal Other times, the contact
commitment. This includes is not as obvious.
recycling old computers, cell Throughout this book
phones, printers, and displays. you will find a variety of fea-
Your participation in recycling tures designed to help you
means fewer one-use products, become an efficient and
cleaner water, and cleaner air. effective end user. These
But recycling may someday pay features include Making
off financially too. Many now IT Work for You, Tips, Pri-
see waste as a resource, and vacy, Environment, Ethics,
one that we shouldn’t squander and Careers in IT. Figure 1-2  People and computers
by filling up the garbage can
instead of the recycling bin. • Making IT Work for You. Throughout this book you will find Making IT Work for
Imagine a future where the You features that present numerous interesting and practical IT applications. For
garbage collector drops off a just a few of the Making IT Work for You topics, see Figure 1-3.
check for your contributions to
going green. • Tips. We all can benefit from a few tips or suggestions. Throughout this book
you will find numerous tips to make your computing safer, more efficient, and
more effective. These tips range from the basics of keeping your computer system

Application Description
Free Antivirus Program Protect your computer by installing and using a free antivirus
Online Entertainment program. See page 9.
Google Docs Use your computer to watch your favorite television programs,
Skype movies, and other video content. See page 30.
Cloud Storage Create, collaborate, and access documents from almost
anywhere with a free online office suite. See page 78.
Visit face to face with friends and family located almost
anywhere at little or no cost. See page 157.
Send large files using a free tool and the cloud. See page 182.

Figure 1-3  Making IT Work for You applications

6 chapter 1

running smoothly to how to protect Are you getting the most out of your computer? Here are tips
your privacy while surfing the web. For just a few of the tips to make your computing safer, more
a p­ artial list of the tips presented in the efficient, and more effective.
­following chapters, see Figure 1-4.
• Privacy. One of the most critical issues 1 Low battery. Do you find that your laptop’s battery keeps its charge for
today is how to protect the privacy of our
personal information. Throughout this less time than it used to? Here are some ways to make your battery last
book you will find Privacy boxes in the longer. See page 128.
margin that present information about
protecting our privacy. 2 Language translation. Have you had trouble communicating with someone
• Environment. Today it is more impor-
tant than ever that we be aware of our who does not speak English? If so, Google Translate may be just what you
impact on the environment. In this chap- need. See page 148.
ter and the following ones, you will find
Environment boxes in the margin that 3 Lost files. Have you ever accidentally deleted or lost important files from
p­ resent important relevant environmental
information. your flash drive? Here are a few suggestions that might help. See page 178.
• Ethics. Most people agree that we should
behave ethically. That is, we should follow 4 Protecting your identity. Identity theft is a growing problem and can be

financially devastating if you are a victim. Some steps to protect your
identity are on page 233.

5 Wireless networks. Do you use your laptop to connect to wireless

networks at school, coffee shops, airports, or hotels? If so, it is important
to use caution to protect your computer and your privacy. A few
suggestions are on page 208.

a system of moral principles that direct Figure 1-4  Selected tips
our everyday lives. However, for any given
circumstance, people often do not agree
on the ethics of the situation. Throughout this book you will find numerous Ethics
boxes posing a variety of different ethical/unethical situations for your consideration.

• Careers in IT. One of the most important decisions of your life is to decide upon
your life’s work or career. Perhaps you are planning to be a writer, an artist, or an
engineer. Or you might become a professional in information technology (IT).
Each of the following chapters highlights a specific career in information technol-
ogy. This feature provides job descriptions, projected employment demands, edu-
cational requirements, current salary ranges, and advancement opportunities.

concept check

Which part of an information system is the most important?
Describe the Making IT Work for You, Tips, and Privacy features.
Describe the Environment, Ethics, and Careers in IT features.

Software

Software, as we mentioned, is another name for programs. Programs are the
instructions that tell the computer how to process data into the form you want.
In most cases, the words software and programs are interchangeable. There are two
major kinds of software: system software and application software. You can think of
application software as the kind you use. Think of system software as the kind the
­computer uses.
System Software
The user interacts primarily with application software. System software enables the
application software to interact with the computer hardware. System software is
“background” software that helps the computer manage its own internal resources.

Information Technology, the Internet, and You 7

Figure 1-5  Windows 10 Figure 1-6  Mac OS X

Figure 1-7  General-purpose System software is not a single program. Rather, it is a collection of programs,
applications including the following:
8 chapter 1 • Operating systems are programs that coordinate computer resources, provide an

interface between users and the computer, and run applications. Smartphones,
tablets, and many other mobile devices use embedded operating systems, also
known as real-time operating systems (RTOS). Desktop computers use stand-
alone operating systems like Windows 10 or Mac OS. (See Figures 1-5 and 1-6.)
Networks use network operating systems (NOS).
• Utilities perform specific tasks related to managing computer resources. One of the
most essential utility programs that every computer system should have is an antivirus
program. These programs protect your computer system from viruses or malicious
programs that are all too often deposited onto your computer from the Internet. These
programs can damage software and hardware, as well as c­ ompromise the security and
privacy of your personal data. If your computer does not have an antivirus program
installed on it, you need to get one. To see how you can install a free antivirus program
on your computer, see Making IT Work for You: Free Antivirus Program on page 9.
Application Software
Application software might be described as end user software. Three types of applica-
tion software are general-purpose, specialized, and apps.
General-purpose applications are widely used in nearly all career areas. They are
the kinds of programs you have to know to be considered an efficient and effective
end user. Some of the best known are presented in Figure 1-7.
Specialized applications include thousands of other programs that are more nar-
rowly focused on specific disciplines and occupations. Two of the best known are
graphics and web authoring programs.
Mobile apps, also known as mobile applications or simply apps, are small pro-
grams primarily designed for mobile devices such as smartphones and for tablet com-
puters. There are over half a million apps. The most popular mobile apps are for social
networking, playing games, and downloading music and videos.

Type Description
Browsers Connect to websites and display web pages
Word processors Prepare written documents
Spreadsheets Analyze and summarize numerical data
Database management systems Organize and manage data and information
Presentation graphics Communicate a message or persuade other people

Making IT work for you

FREE ANTIVIRUS PROGRAM

Have you or someone you know had a slower computing experience due to a spyware infection? Even
worse, perhaps a malicious piece of software stole crucial, personal information or caused a total system
failure. Most of these problems can be averted by having an up-to-date antivirus program running in your
computer’s memory at all times. This exercise shows you how to download and install a free antivirus pro-
gram if your computer does not yet have one. (Please note that the web is continually changing, and some
of the specifics presented below may have changed.)

Getting Started  First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to
completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free
antivirus program:

• 1 Visit http://free.avg.com and click the Download button. You will be asked to confirm that you want the free
edition and then redirected to a download site.

• 2 Run the installation file and follow the prompts.
• 3 Select basic protection if you are asked which product you would like to install.

Using AVG  Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.

• 1 Click Scan now to run a full scan on
your computer.

• 2 Just to the right of that, click the
button with the white cog to see the
scan options where you can set a
schedule for automated scans.

• 3 Click the back arrow to reach the
main screen, where you can click
various elements of the program to
configure them. For example, clicking
Web will allow you to turn on a
feature that detects cookies that may
be used to track your online activity.

9

concept check

Describe the two major kinds of software.
Describe two types of system software programs.
Define and compare general-purpose applications, specialized applications, and
mobile apps.

Hardware

Computers are electronic devices that can follow instructions to accept input, process
that input, and produce information. This book focuses principally on personal com-
puters. However, it is almost certain that you will come in contact, at least indirectly,
with other types of computers.
Types of Computers
There are four types of computers: supercomputers, mainframe computers, midrange
computers, and personal computers.
• Supercomputers are the most powerful type of computer. These machines are spe-

cial, high-capacity computers used by very large organizations. Supercomputers
are typically used to process massive amounts of data. For example, they are used
to analyze and predict worldwide weather patterns. IBM’s Blue Gene supercom-
puter is one of the fastest computers in the world. (See Figure 1-8.)
• Mainframe computers occupy specially wired, air-conditioned rooms. Although
not nearly as powerful as supercomputers, mainframe computers are capable of
great processing speeds and data storage. For example, insurance companies use
mainframes to process information about millions of policyholders.
• Midrange computers, also referred to as servers, are computers with processing
capabilities less powerful than a mainframe computer yet more powerful than a

Figure 1-8  Supercomputer
10 chapter 1

Figure 1-9  Desktop Figure 1-10  Laptop

personal computer. Originally used by medium-size companies or departments of Figure 1-11  Tablet
large companies to support their processing needs, today midrange computers are
most widely used to support or serve end users for such specific needs as retriev-
ing data from a database or supplying access to application software.
• Personal computers, also known as PCs, are the least powerful, yet the most widely
used and fastest-growing type of computer. There are five types of personal com-
puters: desktops, laptops, tablets, smartphones, and wearables. Desktop ­computers are
small enough to fit on top of or alongside a desk yet are too big to carry around.
(See Figure 1-9.) Laptop computers, also known as n­ otebook c­ omputers, are por-
table and lightweight and fit into most briefcases. (See Figure 1-10.) Tablets, also
known as tablet computers, are smaller, lighter, and generally less powerful than
laptops. Like a laptop, tablets have a flat screen but typically do not have a stan-
dard keyboard. (See Figure 1-11.) Instead, tablets typically use a virtual keyboard
that appears on the screen and is touch-sensitive.
Smartphones are the most widely used handheld computers. Smartphones are
cell phones with wireless connections to the Internet and processing capabilities.
(See F­ igure 1-12.) Other mobile computers include wearable devices like Apple’s
watch. (See Figure 1-13.)

Personal Computer Hardware Figure 1-12  Smartphone
Hardware for a personal computer system consists of a variety of different devices. Figure 1-13  Wearable
This physical equipment falls into four basic categories: system unit, input/output,
secondary storage, and communication. Because we discuss hardware in detail later
in this book, here we will present just a quick overview of the four basic categories.

• System unit: The system unit is a container that houses most of the electronic
components that make up a computer system. Two important components of the
system unit are microprocessors and memory. (See Figure 1-14.) The microprocessor
controls and manipulates data to produce information. Memory is a holding area
for data, instructions, and information. One type, random-access memory (RAM),
holds the program and data that is currently being processed. This type of mem-
ory is sometimes referred to as temporary storage because its contents will typically
be lost if the electric power to the computer is disrupted.

• Input/output: Input devices translate data and programs that humans can under-
stand into a form that the computer can process. The most common input devices
are the keyboard and the mouse. Output devices translate the processed informa-
tion from the computer into a form that humans can understand. The most com-
mon output device is the display, also known as a monitor.

Information Technology, the Internet, and You 11

Microprocessor
Memory

Figure 1-14  System unit

Figure 1-15  Solid-state storage • Secondary storage: Unlike memory, secondary storage holds data and programs
even after electric power to the computer system has been turned off. The most
important kinds of secondary media are hard disks, solid-state storage, and optical discs.
Hard disks are typically used to store programs and very large data files. Using
rigid metallic platters and read/write heads that move across the platters, data and
information are stored using magnetic charges on the disk’s surface. In contrast,
solid-state storage does not have any moving parts, is more reliable, and requires
less power. It saves data and information electronically similar to RAM except that
it is not volatile. (See Figure 1-15.) Optical discs use laser technology to store data
and programs. Three types of optical discs are compact discs (CDs), digital versa-
tile (or video) discs (DVDs), and Blu-ray discs (BD).

• Communication: At one time, it was uncommon for a personal computer system to
communicate with other computer systems. Now, using communication devices, a
personal computer routinely communicates with other computer systems located as
near as the next office or as far away as halfway around the world, using the Inter-
net. A modem is a widely used communication device that modifies audio, video,
and other types of data into a form that can be transmitted across the Internet.

concept check

What are the four types of computers?
Describe the five types of personal computers.
Describe the four basic categories of personal computer hardware.

12 chapter 1

Presentation

Database

Worksheet

Document

Figure 1-16  Four types of files: document, worksheet, database, and presentation

Data

Data is raw, unprocessed facts, including text, numbers, images, and sounds. As we
mentioned earlier, processed data becomes information. When stored electronically in
files, data can be used directly as input for the system unit.

Four common types of files (see Figure 1-16) are
• Document files, created by word processors to save documents such as memos,

term papers, and letters.
• Worksheet files, created by electronic spreadsheets to analyze things like budgets

and to predict sales.
• Database files, typically created by database management programs to contain

highly structured and organized data. For example, an employee database file
might contain all the workers’ names, Social Security numbers, job titles, and
other related pieces of information.
• Presentation files, created by presentation graphics programs to save presentation
materials. For example, a file might contain audience handouts, speaker notes,
and electronic slides.

Information Technology, the Internet, and You 13

Figure 1-17  Wireless communication devices

Connectivity and the Mobile Internet

Connectivity is the capability of your personal computer to share information with
other computers. Central to the concept of connectivity is the network. A network
is a communications system connecting two or more computers. The largest network
in the world is the Internet. It is like a giant highway that connects you to millions
of other people and organizations located throughout the world. The web provides a
multimedia interface to the numerous resources available on the Internet.

The Internet has driven the evolution of computers and their impact on our daily
lives. In fact, the rate of technological change is accelerating at an ever faster pace.
Along with the Internet, three things that are driving the impact of technology on our
lives are cloud computing, wireless communication, and the Internet of Things.

14 chapter 1

• Cloud computing uses the Internet and the web to shift many computer activities
from a user’s computer to computers on the Internet. Rather than relying solely on
their computer, users can now use the Internet to connect to the cloud and access
more powerful computers, software, and storage.

• Wireless communication has changed the way we communicate with one another.
The rapid development and widespread use of wireless communication devices like
tablets, smartphones, and wearable devices has led many experts to predict that
wireless applications are just the beginning of the wireless revolution, a revolution
that will dramatically affect the way we communicate and use computer technology.

• The Internet of Things (IoT) is the continuing development of the Internet that
allows everyday objects embedded with electronic devices to send and receive
data over the Internet. It promises to connect all types of devices from computers
to smartphones to watches to any number of everyday devices.
Wireless communication, cloud computing, and IoT are driving the mobile Internet.

They promise to continue to dramatically affect the entire computer industry and how
you and I will interact with computers and other devices. Each will be discussed in
detail in the following chapters. For just a few of these mobile devices, see Figure 1-17.

concept check

Define data. List four common types of files.
Define connectivity and networks.
What is cloud computing? Wireless revolution? IoT?

Careers in IT As mentioned previously, each of the following chapters highlights a
specific career in information technology. Each provides specific job
“Now that you know the basic outline and descriptions, salary ranges, advancement opportunities, and more. For
important features of this book, I’d like to talk a partial list of these careers, see Figure 1-18.
”about some of the most exciting and well-paid
careers in information technology.

Career Description
Webmaster Develops and maintains websites and web
Software engineer resources. See page 48.
Computer support specialist Analyzes users’ needs and creates
Computer technician application software. See page 77.
Technical writer Provides technical support to customers
and other users. See page 104.
Network administrator Repairs and installs computer components
and systems. See page 130.
Prepares instruction manuals, technical
reports, and other scientific or technical
documents. See page 161.
Creates and maintains computer networks.
See page 212.

Figure 1-18  Careers in information technology

Information Technology, the Internet, and You 15

A LOOK TO THE FUTURE

Using and Understanding Information need to know about hardware. For those considering the
Technology purchase of a computer, an appendix—The Computer Buy-
er’s Guide—is provided at the end of this book. This guide
The purpose of this book is to help you use and understand provides a very concise comparison of desktops, laptops,
information technology. We want to help you become profi- tablets, and smartphones.
cient and to provide you with a foundation of knowledge so
that you can understand how technology is being used today Privacy, Security, and Ethics
and anticipate how technology will be used in the future.
This will enable you to benefit from six important information What about people? Experts agree that we as a society must
technology developments. be careful about the potential of technology to negatively
affect our lives. Specifically, we need to be aware of how
The Internet and the Web technology can impact our personal privacy and our environ-
ment. Also, we need to understand the role and the impor-
The Internet and the web are considered to be the two most impor- tance of organizational and personal ethics. These critical
tant technologies for the 21st century. Understanding how to effi- issues are integrated in every chapter of this book as well as
ciently and effectively use the Internet
to browse, communicate, and locate extensively covered in Chapter 9.
information is an essential skill. These
issues are presented in Chapter 2, Organizations
The Internet, the Web, and Electronic
Commerce. Almost all organizations rely on the
quality and flexibility of their infor-
Powerful Software mation systems to stay competitive.
As a member or employee of an
The software that is now a­vailable organization, you will undoubtedly
can do an ­extraordinary number be involved in these information sys-
of tasks and help you in an endless tems. In order to use, develop, mod-
number of ways. You can create ify, and maintain these systems, you
p­ rofessional-looking documents, ana- need to understand the basic con-
lyze massive amounts of data, create cepts of information systems and
dynamic multimedia web pages, and know how to safely, efficiently, and
much more. Today’s employers are effectively use computers. These
expecting the people they hire to be concepts are covered throughout
able to effectively and efficiently use this book.
a variety of different types of software. General-purpose, spe-
cialized, and mobile applications are presented in Chapter 3. Changing Times
System software is presented in Chapter 4.
Are the times changing any faster now than they ever
Powerful Hardware have? Almost everyone thinks so. Whatever the answer,
it is clear we live in a fast-paced age. The Evolution of the
Personal computers are now much more powerful than they Computer Age section presented at the end of this book
used to be. Smartphones, tablets, and communication tech- tracks the major developments since computers were first
nologies such as wireless networks are dramatically chang- introduced.
ing the ways to connect to other computers, networks, and
the Internet. However, despite the rapid change of specific After reading this book, you will be in a very favorable
equipment, their essential features remain unchanged. To position compared with many other people in industry today.
become an efficient and effective end user, you should focus You will learn not only the basics of hardware, software, con-
on these features. Chapters 5 through 8 explain what you nectivity, the Internet, and the web but also the most cur-
rent technology. You will be able to use these tools to your
advantage.

16

VISUAL SUMMARY Information Technology, the Internet, and You

INFORMATION SYSTEMS PEOPLE

The way to think about a personal computer is to realize People are the most important part of an information sys-
that it is one part of an information system. There are sev- tem. This book contains several features to demonstrate
eral parts of an information system: how people just like you use computers. These features
include the following:
• People are an essential part of the system. The pur-
• Making IT Work for You presents several interesting
pose of information systems is to make people, or end
users like you, more productive. and practical applications. Topics include using digital
video editing and locating job opportunities.
• Procedures are rules or guidelines to follow when
• Tips offer a variety of suggestions on such practical
using software, hardware, and data. They are typi-
cally documented in manuals written by computer matters as how to improve slow computer perfor-
professionals. mance and how to protect your privacy while on the
web.
• Software (programs) provides step-by-step instruc-
• Privacy marginal boxes discuss threats to your per-
tions to control the computer to convert data into
information. sonal privacy and suggest ways to protect yourself.

• Hardware consists of the physical equipment. It is • Environment boxes discuss important and relevant

controlled by software and processes data to create environmental issues. The impact of computers and
information. other technologies is more critical today than ever
before.
• Data consists of unprocessed facts including text,
• Ethics boxes pose a variety of different ethical/unethi-
numbers, images, and sound. Information is data that
has been processed by the computer. cal situations for your consideration.

• The Internet allows computers to connect and share • Careers in IT presents job descriptions, employment

information. demands, educational requirements, salary ranges,
To efficiently and effectively use the computer, you need and advancement opportunities.
to understand information technology (IT), including
software, hardware, data, and connectivity.

Information Technology, the Internet, and You 17

To efficiently and effectively use computers, you need to understand the basic parts of an information system: people,
procedures, software, hardware, data, and connectivity. You also need to understand the Internet and the web and to
recognize the role of technology in your professional and personal life.

SOFTWARE HARDWARE

Software, or programs, consists of system and application Hardware consists of electronic devices that can follow
software. instructions to accept input, process the input, and pro-
duce information.
System Software
System software enables application software to interact Types of Computers
with computer hardware. Supercomputer, mainframe, midrange (server), and personal
• Operating systems coordinate resources, provide computers (PCs) are four types of computers. Personal com-
puters can be desktop, laptop (notebook computer), tablet,
an interface, and run applications. Three types are smartphone, and wearable.
embedded (real-time, RTOS), stand-alone, and
network (NOS). Personal Computer Hardware
There are four basic categories of hardware devices.
• Utilities perform specific tasks to manage computer • System unit contains electronic circuitry, including

resources. microprocessors and memory. Random-access
memory (RAM) holds the program and data currently
Application Software being processed.
Application software includes general-purpose, special-
ized, and mobile applications. • Input/output devices are translators between humans
• General purpose—widely used in nearly all career
and computers. Input devices include the keyboard
areas; programs include browsers, word processors, and mouse. The most common output device is the
spreadsheets, database management systems, and pre- computer display (monitor).
sentation graphics.
• Secondary storage holds data and programs. Typical
• Specialized—focus more on specific disciplines and
media include hard disks, solid-state storage, and
occupations; programs include graphics and web optical discs (CD, DVD, and Blu-ray).
authoring.
• Communication devices allow personal computers to
• Apps (mobile apps, mobile applications)—designed
communicate with other computer systems. Modems
for mobile devices; most popular are for text mes- modify audio, video, and other types of data for trans-
saging, Internet browsing, and connecting to social mission across the Internet.
networks.

18 chapter 1

DATA CONNECTIVITY AND MOBILE
INTERNET
Data is the raw unprocessed facts about something. Com-
mon file types include Connectivity describes the ability of end users to use
resources well beyond their desktops. Central to the
• Document files created by word processors. concept of connectivity is the network or communication
system connecting two or more computers. The Internet
• Worksheet files created by spreadsheet programs. is the world’s largest computer network. The web
provides a multimedia interface to resources available on
the Internet.

Along with the Internet, three other things are driving
the impact of technology:

• Cloud computing uses the Internet and the web to

shift many computer activities from a user’s computer
to computers on the Internet.

• Wireless revolution has changed the way we commu-

nicate and use computer technology. Wireless devices
include tablets, smartphones, and watches.

• The Internet of Things (IoT) is the continuing devel-

opment of the Internet that allows everyday objects
embedded with electronic devices to send and receive
data over the Internet.

CAREERS in IT

• Database files created by database management Career Description
Webmaster Develops and maintains websites and web
programs. resources. See page 48.
Software Analyzes users’ needs and creates
• Presentation files created by presentation graphics engineer application software. See page 77.
Computer Provides technical support to customers and
programs. support other users. See page 104.
specialist
Computer Repairs and installs computer components
technician and systems. See page 130.
Technical Prepares instruction manuals, technical
writer reports, and other scientific or technical
documents. See page 161.
Network Creates and maintains computer networks.
administrator See page 212.

Information Technology, the Internet, and You 19

KEY TERMS mouse (11)
network (14)
application software (8) network operating systems (NOS) (8)
apps (8) notebook computer (11)
Blu-ray disc (BD) (12) operating system (8)
cloud computing (15) optical disc (12)
communication device (12) output device (11)
compact disc (CD) (12) PC (11)
connectivity (4, 14) people (4)
data (4) personal computer (11)
database file (13) presentation file (13)
desktop computer (11) procedures (4)
digital versatile disc (DVD) (12) program (4)
digital video disc (DVD) (12) random-access memory (RAM) (11)
display (12) real-time operating system (RTOS) (8)
document file (13) secondary storage (12)
embedded operating systems (RTOS) (8) server (10)
end user (4) smartphone (11)
general-purpose application (8) software (4)
hard disk (12) solid-state storage (12)
hardware (4) specialized application (8)
information (4) stand-alone operating system (8)
information system (4) supercomputer (10)
information technology (IT) (7) system software (7)
input device (11) system unit (11)
Internet (14) tablet (11)
IoT (Internet of Things) (15) tablet computer (11)
keyboard (11) utility (8)
laptop computer (11) virus (8)
mainframe computer (10) wearable device (11)
memory (11) web (14)
microprocessor (11) wireless communication (15)
midrange computer (10) wireless revolution (15)
mobile app (application) (8) worksheet file (13)
modem (12)
monitor (11)

20 chapter 1

MULTIPLE CHOICE

Circle the letter of the correct answer.

1. The keyboard, mouse, display, and system unit are:

a. hardware c. storage devices
b. output devices d. software

2. Programs that coordinate computer resources, provide an interface, and run applica-
tions are known as:

a. application programs c. storage systems
b. operating systems d. utility programs

3. A browser is an example of a: c. system application
a. general-purpose application d. utility program
b. specialized program

4. Although not as powerful as a supercomputer, this type of computer is capable of great
processing speeds and data storage.

a. mainframe c. laptop
b. midrange d. tablet

5. Apple’s Watch is what type of computer?

a. laptop c. tablet
b. smartphone d. wearable

6. RAM is a type of:

a. computer c. network
b. memory d. secondary storage

7. Unlike memory, this type of storage holds data and programs even after electric power
to the computer system has been turned off.

a. primary c. ROM
b. RAM d. secondary

8. The type of file created by word processors, for example, memos, term papers, and
letters.

a. database c. presentation
b. document d. worksheet

9. Uses the Internet and the web to shift many computer activities from a user’s computer
to computers on the Internet.

a. cloud computing c. network
b. high definition d. solid-state storage

10. The largest network in the world is [the]:

a. Facebook c. supercomputer
b. Internet d. web

chapter 1 21

MATCHING

Match each numbered item with the most closely related lettered item. Write your answers
in the spaces provided.

a. desktop 1. Consists of the step-by-step instructions that tell the
b. modem computer how to do its work.
c. network
d. output 2. Another name for a program.
e. presentation 3. Enables the application software to interact with
f. program
g. software the computer hardware.
h. solid-state 4. Type of computer that is small enough to fit on top
i. system software
j. system unit of or alongside a desk yet is too big to carry around.
5. A container that houses most of the electronic com-

ponents that make up a computer system.
6. Devices that translate the processed information

from the computer into a form that humans can
understand.
7. Unlike hard disks, this type of storage does not have
any moving parts, is more reliable, and requires less
power.
8. The most widely used communication device.
9. A type of a file that might contain, for example,
audience handouts, speaker notes, and electronic
slides.
10. A communications system connecting two or more
computers.

OPEN-ENDED

On a separate sheet of paper, respond to each question or statement.

1. Explain the parts of an information system. What part do people play in this system?
2. What is system software? What kinds of programs are included in system software?
3. Define and compare general-purpose applications, specialized applications, and apps.

Describe some different types of general-purpose applications. Describe some types of
specialized applications.
4. Describe the different types of computers. What is the most common type? What are
the types of personal computers?
5. What is connectivity? What is a computer network? What are the Internet and the web?
What are cloud computing, the wireless revolution, and IoT?

22 chapter 1

DISCUSSION

Respond to each of the following questions.

1 Making IT Work for You

Making it a habit of keeping current with technology applications can be a key to your success. Numerous
full-page spreads identified as Making IT Work for You are presented in the following chapters. These
sections address some of today’s most interesting and useful applications. They include online entertain-
ment in Chapter 2, Skype in Chapter 6, and cloud storage in Chapter 7. Select one that you find the most
interesting, and then respond
to the following: (a) Why did
you select this application? (b)
Have you used this application?
If so, when and how? If not, do
you plan to in the near future?
(c) Go to the chapter containing
your selected application, and
locate the application’s Mak-
ing IT Work for You coverage.
Review and briefly describe its
contents. (d) Did you find the
coverage useful? Why or why
not?

2 Privacy

Privacy is one of the most critical issues facing society today. Numerous Privacy boxes appear in the
margins of the upcoming chapters presenting a variety of privacy issues. These issues include apps that
track smartphone and tablet user locations without their knowledge or consent in Chapter 3, access by
government and organization networks to obtain unauthorized detailed personal information in Chapter
8, and protection of personal privacy while using social networking sites such as Facebook in Chap-
ter 9. Select one that you find
the most interesting, and then
respond to the following: (a)
Why did you select this issue?
(b) Do you have knowledge of
or experience with the issue? If
so, describe your knowledge or
experience. If not, do you con-
sider the issue to be important
for protecting your privacy?
(c) Go to the chapter contain-
ing your selected issue, locate
the Privacy box, read it, and
describe its contents. (d) Did
you find the coverage thought-
provoking? Why or why not?

chapter 1 23

3 Environment

Almost everyone agrees that protecting our environment today is more important than ever before.
Numerous Environment boxes appear in the margins of the upcoming chapters. These boxes present a
variety of environmental topics including e-mail benefits in Chapter 2, operating systems reducing energy
consumption in Chapter 4, and recycling old inkjet cartridges in Chapter 6. Select one that you find
the most interesting, and then
respond to the following: (a)
Why did you select this topic?
(b) Do you have knowledge of
or experience with the topic? If
so, describe your knowledge or
experience. If not, do you con-
sider the topic to be important
for protecting the environment?
(c) Go to the chapter containing
your selected topic, locate the
Environment box, read it, and
describe its contents. (d) Did
you find the coverage thought-
provoking? Why or why not?

4 Ethics

Computer ethics are guidelines for the morally acceptable use of computers in our society. Numerous
Ethics boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These
issues include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized
monitoring or eavesdropping of
Internet activity in Chapter 8.
Select one issue that you find
the most interesting, and then
respond to the following: (a)
Why did you select this issue?
(b) Do you have knowledge of
or experience with the issue?
If so, describe your knowledge
or experience. If not, do you
consider the issue critical for
individuals or organizations? (c)
Go to the chapter containing
your selected issue, locate the
Ethics box, read it, and describe
its contents. (d) Did you find the
coverage thought-provoking?
Why or why not?

24 chapter 1

PHOTO CREDITS

CHAPTER 1

Opener: © Carol and Mike Werner/Alamy; p. 3, 16: © Simone Brandt/Alamy RF; p. 4, 15, 17 (left): © Inti St.
Clair/Taxi/Getty Images; 1-1 (people), p. 17 (left): © Image Source, all rights reserved, RF; 1-1 (procedures),
(data), 1-5, 1-16, p. 18 (left), 19: Microsoft product/screen shot(s) reprinted with permission from Microsoft
Corporation; 1-1 (Office): Used with permission from Microsoft; 1-1 (Windows): © McGraw-Hill Education/Aaron
Roeth, photographer; 1-1 (phone and tablet), 1-11, 1-12, p. 18 (right): © Stanca Sanda/Alamy; 1-1 (desktop), 1-9:
© Maxim Kazmin/Getty Images RF; 1-1 (internet): © liangpv/iStock Vectors/Getty Images RF; 1-2, p. 17 (right):
© Fancy Photography/Veer RF; 1-6: Djaypro screen shot copyright © Algoriddim.com. Used with permission; p. 9:
Copyright © AVG Technologies, used with permission; 1-8: © Everett Collection Historical/Alamy; 1-10: © David
Vernon/Getty Images RF; 1-13: © PG Pictures/Alamy; 1-14: © Willis Technology; 1-15: © Bob Dormon/theregister.
co.uk; 1-17 (top-left): BlackBerry®, RIM®, Research In Motion® and related trademarks, names and logos are
the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the
world. Used under license from Research In Motion Limited; 1-17 (top-right): © Lenovo, used with permission;
1-17 (bottom-left): Source: Duncan Hull/Flickr/CC; 1-17 (bottom-middle): © IanDagnall Computing/Alamy; 1-17
(bottom-right): © T3 Magazine/Contributor via Getty Images; p. 23 (top): The Skype name, associated trade marks
and logos and the “S” logo are trade marks of Skype or related entities, © 2015 Skype and/or Microsoft; p. 23
(bottom): Brenden Smialowski/AFP/Getty Images; p. 24 (top): © 2015 Hewlett Packard; p. 24 (bottom): © 2015
Electronic Frontier Foundation.

chapter 1 25


Click to View FlipBook Version