Computing Essentials
2017
ITMaking work for you
• The O’Leary Series
Computing Concepts
• Computing Essentials 2014 Introductory & Complete Editions
• Computing Essentials 2015 Introductory & Complete Editions
• Computing Essentials 2017 (Complete Edition)
Microsoft Office Applications
• Microsoft® Windows 7: A Case Approach
• Microsoft® Office 2013: A Case Approach
• Microsoft® Office Word 2013: A Case Approach Introductory Edition
• Microsoft® Office Excel 2013: A Case Approach Introductory Edition
• Microsoft® Office Access 2013: A Case Approach Introductory Edition
• Microsoft® Office PowerPoint 2013: A Case Approach Introductory Edition
Computing Essentials
2017
ITMaking work for you
Timothy J. O’Leary
Professor Emeritus
Arizona State University
Linda I. O’Leary
Daniel A. O’Leary
PhD
University of California at Santa Cruz
COMPUTING ESSENTIALS 2017 COMPLETE EDITION
Published by McGraw-Hill Education, 2 Penn Plaza, New York, NY 10121. Copyright © 2017 by McGraw-Hill Edu-
cation. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced
or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written
consent of McGraw-Hill Education, including, but not limited to, in any network or other electronic storage or
transmission, or broadcast for distance learning.
Some ancillaries, including electronic and print components, may not be available to customers outside the United
States.
This book is printed on acid-free paper.
1 2 3 4 5 6 7 8 9 0 RMN/RMN 1 0 9 8 7 6
ISBN 978-1-259-56365-2
MHID 1-259-56365-0
ISSN 2158-8805
Senior Vice President, Products & Markets: Kurt L. Strand
Vice President, General Manager, Products & Markets: Michael Ryan
Vice President, Content Design & Delivery: Kimberly Meriwether David
Managing Director: Scott Davidson
Executive Brand Manager: Wyatt Morris
Director, Product Development: Meghan Campbell
Senior Product Developer: Alan Palmer
Executive Marketing Managers: Tiffany Russell, Debbie Clare
Senior Product Developer: Kevin White
Senior Digital Product Analyst: Thuan Vinh
Director, Content Design & Delivery: Terri Schiesl
Program Manager: Mary Conzachi
Content Project Managers: Mary E. Powers (Core), Danielle Clement (Assessment)
Buyer: Susan K. Culbertson
Design: Srdjan Savanovic
Content Licensing Specialists: Carrie Burger (Image), DeAnna Dausener (Text)
Cover Image: © Photosani/Shutterstock
Compositor: SPi Global
Printer: R. R. Donnelley
All credits appearing on page or at the end of the book are considered to be an extension of the copyright page.
The Internet addresses listed in the text were accurate at the time of publication. The inclusion of a website does
not indicate an endorsement by the authors or McGraw-Hill Education, and McGraw-Hill Education does not
guarantee the accuracy of the information presented at these sites.
www.mhhe.com
• Dedication
We dedicate this edition to Nicole and Katie—our inspiration.
Brief Contents
1 Information Technology, the Internet, and You 2
2 The Internet, the Web, and Electronic Commerce 26
3 Application Software 60
4 System Software 88
5 The System Unit 114
6 Input and Output 140
7 Secondary Storage 172
8 Communications and Networks 194
9 Privacy, Security, and Ethics 222
10 Information Systems 252
11 Databases 276
12 Systems Analysis and Design 302
13 Programming and Languages 328
The Evolution of the Computer Age 360
The Computer Buyer’s Guide 371
Glossary 375
Index 396
vi
Contents
1 File Transfer Utilities 35
Internet Security Suites 36
INFORMATION TECHNOLOGY, Communication 37
THE INTERNET, AND YOU 2 E-mail 37
Messaging 38
Introduction 4 Social Networking 39
Information Systems 4 Blogs, Microblogs, Webcasts, Podcasts,
People 6 and Wikis 41
Software 7 Search Tools 43
Search Engines 43
System Software 7 Specialized Search Engines 43
Application Software 8 Content Evaluation 43
Electronic Commerce 44
Making IT work for you: Security 45
Cloud Computing 46
Free Antivirus Program 9 The Internet of Things 47
Hardware 10 Careers in IT 48
A Look to the Future: Your Car’s Dashboard
Types of Computers 10 as a Powerful, Internet-Connected Computing
Personal Computer Hardware 11 Device 49
Data 13
Connectivity and the Mobile Internet 14 Visual Summary 50
Careers in IT 15 Key Terms 54
A Look to the Future: Using and Understanding Multiple Choice 55
Information Technology 16 Matching 56
Open-Ended 56
Visual Summary 17 Discussion 57
Key Terms 20 Photo Credits 59
Multiple Choice 21
Matching 22 3
Open-Ended 22
Discussion 23 APPLICATION SOFTWARE 60
Photo Credits 25
Introduction 62
2 Application Software 62
THE INTERNET, THE WEB, User Interface 62
AND ELECTRONIC COMMERCE 26 Common Features 64
General-Purpose Applications 64
Introduction 28 Word Processors 64
The Internet and the Web 28 Spreadsheets 67
Presentation Graphics 69
Making IT work for you: Database Management Systems 70
Specialized Applications 70
Online Entertainment 30 Graphics 70
Internet Access 32 Video Game Design Software 73
Web Authoring Programs 73
Providers 32 Other Specialized Applications 74
Browsers 32 Mobile Apps 74
Web Utilities 34 Apps 74
Plug-ins 34 App Stores 75
Filters 34
vii
Software Suites 76 5
Office Suites 76
Cloud Computing 76 THE SYSTEM UNIT 114
Specialized and Utility Suites 76
Introduction 116
Careers in IT 77 System Unit 116
Making IT work for you: Desktops 116
Laptops 116
Google Docs 78 Tablets 117
Smartphones 118
A Look to the Future: Next-Generation Wearable Computers 118
User Interfaces 79 Components 118
System Board 119
Visual Summary 80 Microprocessor 120
Key Terms 83 Microprocessor Chips 121
Multiple Choice 84 Specialty Processors 121
Matching 85 Memory 122
Open-Ended 85 RAM 122
Discussion 86 ROM 122
Photo Credits 87 Flash Memory 122
Expansion Slots and Cards 123
4 Bus Lines 124
Expansion Buses 124
SYSTEM SOFTWARE 88 Ports 125
Standard Ports 126
Introduction 90 Specialized Ports 126
System Software 90 Cables 126
Operating Systems 91
Making IT work for you:
Functions 91
Features 92 Tv Tuners 127
Categories 93 Power Supply 128
Mobile Operating Systems 94 Electronic Data and Instructions 129
Desktop Operating Systems 95
Windows 95 Numeric Representation 129
Mac OS 95 Character Encoding 129
UNIX and Linux 96 Careers in IT 130
Virtualization 96 A Look to the Future: Chips inside
Utilities 97 Your Brain 131
Making IT work for you: Visual Summary 132
Key Terms 135
Mac OS X Activity Monitor 98 Multiple Choice 136
Matching 137
Windows Utilities 100 Open-Ended 137
Utility Suites 103 Discussion 138
Careers in IT 104 Photo Credits 139
A Look to the Future: Self-Healing Computers
Could Mean an End to Computer Crashes and 6
Performance Problems 105
INPUT AND OUTPUT 140
Visual Summary 106
Key Terms 109 Introduction 142
Multiple Choice 110 What Is Input? 142
Matching 111 Keyboard Entry 142
Open-Ended 111
Discussion 112 Keyboards 143
Photo Credits 113
viii CONTENTS
Pointing Devices 144 7
Mouse 144
Touch Screen 144 SECONDARY STORAGE 172
Game Controllers 144
Stylus 145 Introduction 174
Storage 174
Scanning Devices 145 Hard Disks 175
Optical Scanners 146
Card Readers 146 Internal Hard Disk 176
Bar Code Readers 146 External Hard Drives 176
RFID Readers 147 Performance Enhancements 176
Character and Mark Recognition Solid-State Storage 178
Devices 147 Solid-State Drives 178
Flash Memory Cards 178
Image Capturing Devices 147 USB Drives 178
Digital Cameras 148 Optical Discs 179
Webcams 148 Cloud Storage 180
Audio-Input Devices 148 Making IT work for you:
Voice Recognition Systems 148
Cloud Storage 182
What Is Output? 149 Mass Storage Devices 184
Monitors 149
Enterprise Storage System 184
Features 149 Storage Area Network 185
Flat-Panel Monitors 150 Careers in IT 185
Curved Monitors 150 A Look to the Future:
E-book Readers 150 Next-Generation Storage 186
Other Monitors 151
Visual Summary 187
Making IT work for you: E-Books 152 Key Terms 190
Multiple Choice 190
Printers 153 Matching 191
Features 153 Open-Ended 192
Inkjet Printers 153 Discussion 192
Laser Printers 154 Photo Credits 193
3D Printers 154
Other Printers 154 8
Audio-Output Devices 155 COMMUNICATIONS
Combination Input and Output AND NETWORKS 194
Devices 155
Introduction 196
Headsets 155 Communications 196
Multifunctional Devices 156
Telephones 156 Connectivity 196
Drones 156 The Wireless Revolution 197
Robots 156 Communication Systems 197
Communication Channels 198
Making IT work for you: Skype 157 Physical Connections 198
Wireless Connections 199
Virtual Reality Headgear and Gloves 159 Connection Devices 200
Ergonomics 159 Modems 200
Connection Service 200
Portable Computers 161 Data Transmission 202
Careers in IT 161 Bandwidth 202
A Look to the Future: Augmented Reality Protocols 202
Displays 162
Visual Summary 163
Key Terms 167
Multiple Choice 168
Matching 169
Open-Ended 169
Discussion 170
Photo Credits 171
CONTENTS ix
Making IT work for you: Careers in IT 241
A Look to the Future:
Mobile Internet 203 The End of Anonymity 242
Networks 204
Visual Summary 243
Terms 204 Key Terms 246
Network Types 206 Multiple Choice 247
Matching 248
Local Area Networks 206 Open-Ended 248
Home Networks 206 Discussion 249
Wireless LAN 207 Photo Credits 251
Personal Area Network 207
Metropolitan Area Networks 208 10
Wide Area Networks 208
Network Architecture 208 INFORMATION SYSTEMS 252
Topologies 209
Strategies 210 Introduction 254
Organizational Networks 210 Organizational Information Flow 254
Internet Technologies 211
Network Security 211 Functions 254
Careers in IT 212 Management Levels 256
A Look to the Future: Telepresence Information Flow 257
Lets You Be There without Actually Computer-Based Information
Being There 213 Systems 258
Transaction Processing Systems 259
Visual Summary 214 Management Information Systems 261
Key Terms 217 Decision Support Systems 262
Multiple Choice 218 Executive Support Systems 263
Matching 219 Other Information Systems 265
Open-Ended 219 Expert Systems 266
Discussion 220 Careers in IT 266
Photo Credits 221 A Look to the Future: IBM’s Watson:
The Ultimate Information-Finding
9 Machine 267
PRIVACY, SECURITY, Visual Summary 268
AND ETHICS 222 Key Terms 270
Multiple Choice 271
Introduction 224 Matching 272
People 224 Open-Ended 272
Privacy 224 Discussion 273
Photo Credits 274
Large Databases 225
Private Networks 227 11
The Internet and the Web 227
Online Identity 230 DATABASES 276
Major Laws on Privacy 230
Security 231 Introduction 278
Cybercrime 231 Data 278
Measures to Protect Computer Data Organization 279
Security 235
Ethics 238 Key Field 280
Batch versus Real-Time Processing 280
Making IT Work for You: Databases 281
Need for Databases 282
Cloud-Based Backup 239 Database Management 282
Copyright and Digital Rights
Management 240
Plagiarism 240
x CONTENTS
DBMS Structure 284 Prototyping 315
Hierarchical Database 284 Rapid Applications Development 315
Network Database 285 Careers in IT 316
Relational Database 285 A Look to the Future: The Challenge
Multidimensional Database 286 of Keeping Pace 317
Object-Oriented Database 287
Visual Summary 318
Types of Databases 288 Key Terms 322
Individual 288 Multiple Choice 323
Company 288 Matching 324
Distributed 289 Open-Ended 324
Commercial 289 Discussion 325
Photo Credits 326
Database Uses and Issues 290
Strategic Uses 290 13
Security 290
PROGRAMMING
Careers in IT 291 AND LANGUAGES 328
A Look to the Future:
The Future of Crime Databases 292 Introduction 330
Programs and Programming 330
Visual Summary 293
Key Terms 296 What Is a Program? 330
Multiple Choice 297 What Is Programming? 330
Matching 298 Step 1: Program Specification 332
Open-Ended 298 Program Objectives 332
Discussion 299 Desired Output 332
Photo Credits 301 Input Data 332
Processing Requirements 333
12 Program Specifications Document 333
Step 2: Program Design 334
SYSTEMS ANALYSIS Top-Down Program Design 334
AND DESIGN 302 Pseudocode 335
Flowcharts 335
Introduction 304 Logic Structures 337
Systems Analysis and Design 304 Step 3: Program Code 338
Phase 1: Preliminary Investigation 306 The Good Program 338
Coding 338
Defining the Problem 306 Step 4: Program Test 340
Suggesting Alternative Systems 307 Syntax Errors 340
Preparing a Short Report 307 Logic Errors 340
Phase 2: Systems Analysis 308 Testing Process 340
Gathering Data 308 Step 5: Program Documentation 342
Analyzing the Data 308 Step 6: Program Maintenance 343
Documenting Systems Analysis 310 Operations 343
Phase 3: Systems Design 310 Changing Needs 343
Designing Alternative Systems 310 CASE and OOP 344
Selecting the Best System 311 CASE Tools 344
Writing the Systems Design Report 311 Object-Oriented Software
Phase 4: Systems Development 312 Development 344
Acquiring Software 312 Generations of Programming
Acquiring Hardware 312 Languages 346
Testing the New System 313 Machine Languages: The First
Phase 5: Systems Implementation 313 Generation 346
Types of Conversion 313 Assembly Languages: The Second
Training 314 Generation 346
Phase 6: Systems Maintenance 314 High-Level Procedural Languages: The Third
Prototyping and Rapid Applications Generation 346
Development 315
CONTENTS xi
Task-Oriented Languages: The Fourth The Evolution of the Computer
Generation 347 Age 360
Problem and Constraint Languages: The Fifth
Generation 348 The Computer Buyer’s Guide 371
Careers in IT 349 Glossary 375
A Look to the Future: Your Own Index 396
Programmable Robot 350
Visual Summary 351
Key Terms 355
Multiple Choice 356
Matching 357
Open-Ended 357
Discussion 358
Photo Credits 359
xii CONTENTS
New to Computing Essentials 2017
Every chapter’s Making IT Work for You, Privacy, Ethics, and Environment features have been carefully revaluated,
enhanced, and/or replaced. Additionally, every chapter’s Look to the Future has been revised to show that the
expected breakthroughs of tomorrow are rooted in today’s advances. More specific new coverage includes the
following.
Chapter 1 Revised Figure 1-1 Parts of an Information System to include mobile devices (tablets and smartphones),
Windows 10 operating system, and Office 10
Chapter 2 Added coverage of Microsoft’s new Edge browser, https and MMS (Multimedia Messaging Service)
Expanded coverage of Facebook Messenger, Google Hangouts
Added coverage Instagram, Pinterest, Tumblr, and Vine
Added a major new section on the Internet of Things (IoT)
Chapter 3 Added coverage of video editors and video game design software
Added discussion of game apps including role playing games (RPG)
Expanded Cloud Computing to include Microsoft Office 365 for Office and iPad.
Chapter 4 Expanded coverage of voice recognition and real time operating systems (RTOS)
Undated operating systems to include coverage of Windows 10 and Cortana
Expanded coverage of Mac OS including Yosemite and related system software
Expanded coverage of Chrome OS
Chapter 5 Expanded coverage of laptops to include two-in-one, gaming, and ultrabooks
Expanded coverage of tablets to include keyboard attachments, digital pens, and speech recognition
Added a new major section on Wearable Computers
Expanded and updated ports and cables
Chapter 6 Added coverage of gaming mice, 3D scanners, and smart cards
Expanded coverage of voice recognition systems to include digital assistants (Siri, Cortana, and Google
Now)
Updated resolution standards to include UHD 4K and UHD 5K
Added coverage of UHDTV, 3D UHDTV, digital projectors headsets and headphones
Expanded coverage of drones, robots, and virtual reality
Chapter 7 Reorganized chapter to give more prominence to solid-state storage
Expanded solid-storage, flash memory coverage, and NAS
Chapter 8 Updated Wi-Fi standards to include 802.11ac and 802.11ax
Added cellular as a wireless connection technology including discussion of cells and cell towers
Expanded coverage of LTE as a fourth-generation mobile telecommunication technology
Chapter 9 Added Privacy relating to drones and the Dark Web
Added Ethics boxes relating to the right to be forgotten and net neutrality
Added a Tip on creating strong passwords
Added a new section on security tools including password managers
Chapters 10, New end of chapter case
11, 12, and 13
xiii
Preface
The 20th century brought us the dawn of the digital informa-
tion age and unprecedented changes in information technology.
In fact, the rate of change is clearly increasing. As we begin the
21st century, computer literacy is undoubtedly becoming a prerequisite
in whatever career you choose.
The goal of Computing Essentials is to provide you with the basis for
understanding the concepts necessary for success. Computing Essentials
also endeavors to instill an appreciation for the effect of information
technology on people, privacy, ethics, and our environment and to
give you a basis for building the necessary skill set to succeed in the
21st century.
Times are changing, technology is changing, and this text is changing
too. As students of today, you are different from those of yesterday. You
put much effort toward the things that interest you and the things that
are relevant to you. Your efforts directed at learning application pro-
grams and exploring the web seem, at times, limitless. On the other
hand, it is sometimes difficult to engage in other equally important
topics such as personal privacy and technological advances.
At the beginning of each chapter, we carefully layout why and how the
chapter’s content is relevant to your life today and critical to your future.
Within each chapter, we present practical tips related to key concepts
through the demonstration of interesting applications that are relevant
to your lives. Topics presented focus first on outputs rather than pro-
cesses. Then, we discuss the concepts and processes.
Motivation and relevance are the keys. This text has several features
specifically designed to engage and demonstrate the relevance of tech-
nology in your lives. These elements are combined with a thorough
c overage of the concepts and sound pedagogical devices.
xiv
Visual Learning
VISUAL CHAPTER OPENERS Revised Pages
Revised Pages
2chapter The Internet, the Web,
and Electronic Commerce
Why should I read this chapter? Each chapter begins with a Why
Should I Read This? feature that
The Internet has changed the world, and will continue to presents a visually engaging and
have an amazing impact on our day-to-day lives. For exam- concise presentation of the chap-
ple, cars promise to soon be able to drive themselves, avoid ter’s relevance to the reader’s
traffic accidents and congestion, and automatically adjust current and future life in the digi-
personal schedules and much more. tal world. Then a list of chapter
learning objectives is presented
This chapter covers the things you need to know to be providing a brief introduction
prepared for this ever-changing digital world, including: to what will be covered in the
• Impact—how Internet technology is changing your chapter.
world.
• Hardware—how to connect your life to the Internet,
including Wi-Fi, smartphones, and tablets.
• Applications—how to get ahead using social network-
ing, streaming technology, and cloud computing.
Learning Objectives
After you have read this chapter, you should be able to:
1 Explain the origins of the Internet and the web.
2 Explain how to access the web using providers and browsers.
3 Compare different web utilities, including plug-ins, filters, file transfer utilities, and Internet secu-
rity suites.
4 Compare different Internet communications, including e-mail, text messaging, instant messaging,
social networking, blogs, microblogs, webcasts, podcasts, and wikis.
5 Describe search tools, including search engines and specialized search engines.
6 Evaluate the accuracy of information presented on the web.
7 Identify electronic commerce, including B2C, C2C, B2B, and security issues.
8 Describe cloud computing, including the three-way interaction of clients, Internet, and service
providers.
9 Discuss the Internet of Things (IoT) and the continuing development of the Internet to allow
everyday objects to send and receive data.
26 10/15/15 05:14 PM ole63650_ch02_026-059.indd 27 27
ole63650_ch02_026-059.indd 26 10/15/15 05:14 PM
VISUAL SUMMARIES Revised Pages Revised Pages
Visual summaries appear at the VISUAL SUMMARY The Internet, the Web, and Electronic Commerce To efficiently and effectively use computers, you need to be aware of resources available on the Internet and web, to be
end of every chapter and sum- able to access these resources, to effectively communicate electronically, to efficiently locate information, to understand
marize major concepts covered electronic commerce, and to use web utilities.
throughout the chapter. Like the
chapter openers, these summaries WEB UTILITIES COMMUNICATION
use graphics to reinforce key
concepts in an engaging and INTERNET AND WEB INTERNET ACCESS
meaningful way.
Internet Once connected to the Internet, your computer seemingly Web utilities are specialized utility programs that make E-mail
Launched in 1969 with ARPANET, the Internet consists becomes an extension of a giant computer that branches using the Internet and the web easier and safer. E-mail (electronic mail) is the transmission of electronic
of the actual physical network. all over the world. messages. There are two basic types of e-mail systems:
plug-ins • Client-based e-mail systems use e-mail clients
Web providers Plug-ins are automatically loaded and operate as part of a
Introduced in 1991 the web (World Wide Web, WWW) Internet service providers are connected to the Internet, browser. Many websites require specific plug-ins to fully installed on your computer.
provides a multimedia interface to Internet resources. Three providing a path for individuals to access the Internet. experience their content. Some plug-ins are included in • Web-based e-mail systems use webmail clients located
generations: Web 1.0 (existing information), Web 2.0 (con- Connection technologies include DSL, cable, and wire- many of today’s browsers; others must be installed.
tent creation and social interaction), and Web 3.0 (automatic less modems. on the e-mail provider’s computer. This is known as
personalized content). Filters webmail.
browsers Filters are used by parents and organizations to block cer-
Common Uses Browsers provide access to web resources. Some related tain sites and to monitor use of the Internet and the web. A typical e-mail has three basic elements: header
The most common uses of the Internet and the web terms are (including address, subject, and perhaps attachment),
include • URLs—locations or addresses to web resources; two File Transfer Utilities message, and signature.
• Communication—the most popular Internet activity. File transfer utilities copy files to (downloading) and from
• Shopping—one of the fastest-growing Internet parts are protocol and domain name; top-level domain (uploading) your computer. There are three types: user name top-level domain
(TLD) or web suffix identifies type of organization. • File transfer protocol (FTP) and secure file transfer
activities. • HTML—commands to display web pages; hyperlinks [email protected]
• Searching—access libraries and local, national, and (links) are connections. protocol (SFTP) allow you to efficiently copy files
Technologies providing interactive, animated websites across the Internet. domain name
international news. include cascading style sheets, or CSS (to control the • BitTorrent distributes file transfers across many differ-
• Education—e-learning or taking online courses. appearance of web pages); JavaScript (to trigger interac- ent computers. Spam is unwanted and unsolicited e-mail that may
• Entertainment—music, movies, magazines, and com- tive features); AJAX (to create quick response interactive • Web-based file transfer services make use of a web include a computer virus or destructive programs often
websites; and applets (to display graphics, provide inter- browser to upload and download files. attached to unsolicited e-mail. Spam blockers, also known as
puter games. active games, and more). spam filters, are programs that identify and eliminate spam.
Mobile browsers run on portable devices. Internet Security Suite
An Internet security suite is a collection of utility pro- messaging
grams designed to protect your privacy and security on While e-mail is the most widely used, there are two other
the Internet. messaging systems:
• Text messaging, also known as texting and SMS (short
message service), is a process of sending short electronic
messages typically less than 160 characters. Texting while
driving is very dangerous and illegal in several states.
• Instant messaging (IM)—supports live communication
between friends. Most instant messaging programs
also include videoconferencing features, file sharing,
and remote assistance.
50 ChApTEr 2 ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 51
ole63650_ch02_026-059.indd 50 10/15/15 05:14 PM ole63650_ch02_026-059.indd 51 10/15/15 05:14 PM
xv
Unique Content
MAKING IT WORK FOR YOU Special-interest topics are presented in the Mak-
ing IT Work for You section found within nearly
Revised Pages every chapter. These topics include Installing a Free
Antivirus Program, Online Entertainment, Google
ITMaking work for you Docs, Skype, and Cloud Storage.
FREE ANTIVIRUS PROGRAM
Have you or someone you know had a slower computing experience due to a spyware infection? Even
worse, perhaps a malicious piece of software stole crucial, personal information or caused a total system
failure. Most of these problems can be averted by having an up-to-date antivirus program running in your
computer’s memory at all times. This exercise shows you how to download and install a free antivirus pro-
gram if your computer does not yet have one. (Please note that the web is continually changing, and some
of the specifics presented below may have changed.)
getting Started First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to
completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free
antivirus program:
•1 Visit http://free.avg.com and click the Download button. You will be asked to confirm that you want the free
edition and then redirected to a download site.
•2 run the installation file and follow the prompts.
•3 Select basic protection if you are asked which product you would like to install.
using AVg Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.
•1 click Scan now to run a full scan on
your computer.
•2 Just to the right of that, click the
button with the white cog to see the
scan options where you can set a
schedule for automated scans.
•3 click the back arrow to reach the
main screen, where you can click
various elements of the program to
configure them. for example, clicking
Web will allow you to turn on a
feature that detects cookies that may
be used to track your online activity.
9
ole63650_ch01_002-025.indd 9 10/12/15 11:07 AM PRIVACY, ETHICS, AND ENVIRONMENTRev.ConfirmingPages
Nearly every chapter has a Privacy box located in privacy
the margin adjacent to the coverage of related tech-
nologies. Topics include protecting personal infor- Did you know that one type of
mation when using a free Wi-Fi network or when specialty processor is devoted
disposing of an outdated computer. exclusively to protecting your
privacy? Called cryptoproces-
sors, these microchips perform
encoding and decoding of data
faster and more securely than
a CPU. These specialized chips
exist in ATMs, TV set-top boxes,
and smartcards.
Figure 5-10 chip mounted onto a chip carrier
Nearly every chapter has an Ethics box located in ethics networking card plugs into a slot on the system board to provide a connection to a
the margin adjacent to the coverage of related tech- local area network.
nologies. Topics include proper disposal of older Because labor costs are • Connecting lines called bus lines provide pathways that support communication
CRT monitors, empty inkjet cartridges, and old much lower in China, many among the various electronic components that are either located on the system
computers. computers and peripherals are board or attached to the system board.
manufactured there. While this Generally, the system board found on a desktop is larger than that found on a lap-
has resulted in the loss of jobs top, and much larger than one found on a tablet, smartphone, or wearable computer.
elsewhere, it has improved the Although these system boards vary in size, they nevertheless all perform the same
standard of living for millions function of communicating between the components of the personal computer.
of Chinese. Unfortunately,
their working conditions are concept check
considered to be very poor. Do
you think consumers have an What is the system board, and what does it do?
ethical responsibility regarding Define and describe sockets, slots, and bus lines.
where and/or how products are What are chips? How are chips attached to the system board?
manufactured?
Microprocessor
Nearly every chapter has an Environment box environment In most personal computer systems, the central processing unit (CPU) or processor
located in the margin adjacent to the coverage of is contained on a single chip called the microprocessor. The microprocessor is the
related technologies. Topics include plagiarism of Have you ever wondered “brains” of the computer system. It has two basic components: the control unit and the
online materials, editing images to promote a partic- what you should do with your arithmetic-logic unit.
ular message, and the use of monitoring software. old computers equipment?
Consider donating them to • Control unit: The control unit tells the rest of the computer system how to carry
xvi charitable organizations that out a program’s instructions. It directs the movement of electronic signals between
work with local schools and memory, which temporarily holds data, instructions, and processed information,
low-income families. Or, recycle and the arithmetic-logic unit. It also directs these control signals between the CPU
them. Many computer retailers and input and output devices.
and local government agencies
accept recycled equipment. • Arithmetic-logic unit: The arithmetic-logic unit, usually called the ALU, performs
two types of operations: arithmetic and logical. Arithmetic operations are the
fundamental math operations: addition, subtraction, multiplication, and division.
Logical operations consist of comparisons such as whether one item is equal to
(=), less than (<), or greater than (>) the other.
120 chapter 5
Untitled-2 120 12/01/15 12:32 PM
Unique End-of-Chapter
Discussion Materials
MAKING IT WORK FOR YOU Revised Pages
Making IT Work for You discussion questions are carefully DISCUSSION
integrated with the chapter’s Making IT Work for You top-
ics. The questions facilitate in-class discussion or written Respond to each of the following questions.
assignments focusing on applying specific technologies into
a student’s day-to-day life. They are designed to expand a 1 Making IT Work for You: ONLINE ENTERTAINMENT
student’s awareness of technology applications.
Review the Making IT Work for You: Online Entertainment on pages 30–31, and then respond to the
PRIVACY following: (a) Do you currently have a subscription to Netflix, Hulu Plus, or another service that allows
you to stream movies and TV
Privacy discussion questions are carefully integrated with shows? If so, which ones? If
the chapter’s marginal Privacy box. The questions facilitate not, do you plan on using one in
in-class discussion or written assignments focusing on the future? Why or why not? (b)
critical privacy issues. They are designed to develop a What device do you use most
student’s ability to think critically and communicate often to watch video content
effectively. from the web? Would you con-
sider purchasing a dedicated
Revised Pages streaming device such as the
Roku? Why or why not? (c)
ETHICS Could ever see yourself cancel-
ing or “cutting the cord” from
your current cable or satellite
service? Why or why not?
2 Privacy: SOCIAL NETWORKING
When a Facebook friend posts a picture, video, or text
that includes you, who can view that post? Review the
Privacy box on page 40, and respond to the following:
(a) Who should be responsible for ensuring privacy on
social networking sites? Defend your position. (b) Do
you think that most people are aware of their privacy
settings on Facebook? Have you ever checked your
settings? Why or why not? (c) Investigate and then
summarize the default security settings for a social
networking website such as Facebook or Google+.
ChApTEr 2 57
Ethics discussion questions areole63650_ch02_026-059.indd 57 carefully integrated with 10/15/15 05:14 PM
the chapter’s marginal Ethics boxes. The questions facili-
3 Ethics: FILTERING AND MONITORING tate in-class discussion or written assignments focusing on
ethical issues relating to technology. They are designed to
Parents can use content filters develop a student’s ability to think critically and communi-
and monitoring software to cate effectively.
restrict or monitor their child’s
Internet behavior. Review the ENVIRONMENT
Ethics box on page 35, and
respond to the following: (a) Is Environment discussion questions are carefully integrated
it ethical for parents to filter with the chapter’s marginal Environment boxes. The ques-
or monitor Internet content tions facilitate in-class discussion or written assignments
for their children? Does your focusing on environmental issues relating to technology.
answer depend on the age of They are designed to develop a student’s ability to think
the child? Defend your position. critically and communicate effectively.
(b) Should parents inform their
children that Internet activity
is being filtered or monitored?
Why or why not? (c) Do you feel
that filtering or monitoring soft-
ware is the best way to protect
children? Defend your position.
4 Environment: E-MAIL
Review the Environment box on page 37, and then respond to the following: (a) When it comes to sending
letters, holiday cards, and invitations to friends and family, do you mostly use e-mail or postal mail? What
are your reasons for choos-
ing one over the other? (b) Are
there any situations where you
feel that using e-mail would be
inappropriate? (c) Have you
signed up for paperless billing
from your financial institutions
and utility companies? Why or
why not? (d) Go through all the
paper mail you have received in
the last week or two. Is there
anything there that you could
receive via e-mail or view on the
web? If so, list a few examples.
58 ChApTEr 2 10/15/15 05:14 PM xvii
ole63650_ch02_026-059.indd 58
Reinforcing Key • Shopping is one of the fastest-growing Internet applications. You can window
shop, look for the latest fashions, search for bargains, and make purchases.
CONCEPT CHECKS
• Searching for information has never been more convenient. You can access some
of the world’s largest libraries directly from your home computer. You can find the
Conceptslatest local, national, and international news.
• Education or e-learning is another rapidly emerging web application. You can take
classes on almost any subject. There are courses just for fun, and there are courses
for high school, college, and graduate school credit. Some cost nothing to take and
others cost a lot.
• Entertainment options are nearly endless. You can find music, movies, magazines,
and computer games. You will find live concerts, movie previews, book clubs, and
interactive live games. To learn more about online entertainment, see Making IT
Work for You: Online Entertainment on pages 30–31.
The first step to using the Internet and the web is to get connected, or to gain access
to the Internet.
Located at points throughout each chap- concept check
ter, the Concept Check cues you to note
which topics have been covered and to What is the difference between the Internet and the web?
self-test your understanding of the Describe how the Internet and the web started. What are the three web generations?
material presented. List and describe five of the most common uses of the Internet and the web.
Revised Pages
ThE InTErnET, ThE WEb, And ELECTrOnIC COmmErCE 29
KEY TERMS KEY TERMS
address (33, 37) message (37) Throughoutole63650_ch02_026-059.indd 29 the text, the most important terms 10/15/15 05:14 PM
Advanced Research Project Agency microblog (41) are presented in bold and are defined within the Revised Pages
MMS (multimedia messaging text. You will also find a list of key terms at the end
Network (ARPANET) (28) of each chapter and in the glossary at the end of
AJAX (33) service) (38) the book.
applets (33) mobile browser (33)
attachment (37) online (28) MULTIPLE CHOICE
BitTorrent (35) plug-in (34)
blog (41) podcast (42) Circle the correct answer.
browser (32) protocol (33)
business-to-business (B2B) (45) search engine (43) 1. The network that connects computers all over the world.
business-to-consumer (B2C) (44) search service (43)
cable (32) secure file transfer protocol (SFTP) (35) a. ARPANET c. LAN
cascading style sheets (CSS) (33) signature (37) b. Internet d. web
Circles (40) SMS (short messaging service) (38)
client-based e-mail system (38) social networking (39)
cloud computing (46) spam (38)
consumer-to-consumer (C2C) (44) spam blocker (38)
digital cash (45) spam filter (38)
domain name (33) specialized search engine (43)
downloading (35) spider (43)
DSL (32) streaming (41)
e-commerce (44) subject (37)
e-learning (29) texting (38)
electronic commerce (44) text messaging (38)
electronic mail (37) top-level domain (TLD) (33)
e-mail (37) tweet (41)
e-mail client (38) Twitter (41)
Facebook (39) uniform resource locator (URL) (33)
Facebook groups (40) uploading (35)
Facebook Pages (40) virus (38)
Facebook Profile (40) web (28)
file transfer protocol (FTP) (35) Web 1.0 (28)
filter (34) Web 2.0 (28)
friend (39) Web 3.0 (28)
Google+ (40) web auction (44)
Google Plus (40) web-based e-mail system (38)
Hangouts (40) web-based file transfer services (35)
header (37) webcasts (41)
hit (43) web log (41)
hyperlink (33) webmail (38)
Hypertext Markup Language (HTML) (33) webmail client (38)
instant messaging (IM) (39) webmaster (48)
Internet (28) web page (33)
Internet of Things (IoT) (47) web suffix (33)
Internet security suite (36) web utility (34)
Internet service provider (ISP) (32) wiki (42)
JavaScript (33) Wikipedia (42)
link (33) wireless modem (32)
LinkedIn (40) World Wide Web (28)
location (33) WWW (28)
54 ChApTEr 2 2. The rules for exchanging data between computers.
a. DSL c. web
b. protocols d. WWW
3. Using file transfer utility software, you can copy files to your computer from specially
configured servers on the Internet. This is called:
ole63650_ch02_026-059.indd 54 10/15/15 05:14 PM a. downloading c. blogging
b. filtering d. uploading
CHAPTER REVIEW
4. Communities of individuals who share a common interest typically create Facebook:
a. clients c. Pages
b. groups d. Profiles
5. Type of e-mail account that does not require an e-mail program to be installed on a
user’s computer is:
Following the Visual Summary, the chapter review includes a. blog-based c. utility-based
material designed to review and reinforce chapter content. It b. client-based d. web-based
includes a key terms list that reiterates the terms presented
6. The most popular microblogging site:
a. LinkedIn c. Twitter
b. Google+ d. Wikipedia
7. Using a keyword, a search engine returns a list of related sites known as:
a. blogs c. podcasts
b. hits d. strikes
in the chapter, multiple-choice questions to help test your 8. This is the Internet’s equivalent to traditional cash.
understanding of information presented in the chapter,
matching exercises to test your recall of terminology pre- a. digital cash c. ftp
b. e-commerce d. Internet dollars
9. The continuing Internet development that allows objects to send and receive data over
the Internet.
a. HTML c. search engines
b. IoT d. Web 2.0
sented in the chapter, and open-ended questions or state- 10. Three basic components to cloud computing are clients, Internet, and _____.
ments to help review your understanding of the key concepts
a. CSS c. streaming
b. service providers d. Web 3.0
presented in the chapter.
xviii ChApTEr 2 55
ole63650_ch02_026-059.indd 55 10/15/15 05:14 PM
The Future of Information Technology
CAREERS IN IT
Revised Pages
• File servers—dedicated computers with very large storage capacities that provide Some of the fastest-growing career opportunities are in
users access to fast storage and retrieval of data. information technology. Each chapter highlights one of
the most promising careers in IT by presenting job titles,
• Network attached storage (NAS)—a type of file server designed for homes and responsibilities, educational requirements, and salary
small businesses. NAS is less expensive, easier to set up, and easier to manage ranges. Among the careers covered are webmaster, soft-
than most file servers. However, it does not include powerful management tools ware engineer, and database administrator. You will learn
and features found in many large-scale file servers. how the material you are studying relates directly to a
potential career path.
• RAID systems—larger versions of the specialized devices discussed earlier in this
chapter that enhance organizational security by constantly making backup copies Revised Pages
of files moving across the organization’s networks.
A LOOK TO THE FUTURE
• Organizational cloud storage—high-speed Internet connection to a dedicated
remote storage facility. These facilities contain banks of file servers to offer enor-
mous amounts of storage.
Storage Area network
A recent mass storage development is storage area network (SAN) systems. SAN is
an architecture to link remote computer storage devices, such as enterprise storage
systems, to computers such that the devices are as available as locally attached drives.
In a SAN system, the user’s computer provides the file system for storing data, but the
SAN provides the disk space for data.
The key to a SAN is a high-speed network, connecting individual computers to
mass storage devices. Special file systems prevent simultaneous users from interfering
with each other. SANs provide the ability to house data in remote locations and still
allow efficient and secure access.
concept check
Define mass storage and mass storage devices.
What is an enterprise storage system?
What is a storage area network system?
Careers in IT Disaster recovery specialists are responsible for recovering systems and
data after a disaster strikes an organization. In addition, they often cre-
now that you’ve learned about secondary ate plans to prevent and prepare for such disasters. A crucial part of
that plan is to use storage devices and media in order to ensure that all
“ storage, let me tell you a little bit about my company data is backed up and, in some cases, stored off-site.
”career as a disaster recovery specialist.
Employers typically look for candidates with a bachelor’s or associ-
ate’s degree in information systems or computer science. Experience
in this field is usually required, and additional skills in the areas of net-
working, security, and database administration are desirable. Disaster
recovery specialists should possess good communication skills and be
able to handle high-stress situations.
Disaster recovery specialists can expect to earn an annual salary of
$70,000 to $88,000. Opportunities for advancement typically include
upper-management positions. With so many types of threats facing
organizations, demand for these types of specialists is expected to grow.
SecOndAry StOrAge 185
A LOOK TO THE FUTUREole63650_ch07_172-193.indd 185 10/30/15 07:39 PM Your Car’s dashboard as a powerful, already paying for an online streaming video service to give
Internet-Connected Computing device their children access to this enormous library of cartoons
Each chapter concludes with a brief discussion of and movies right in the vehicle. In fact, with a tabletlike inter-
a recent technological advancement related to the Do you often wish that you could shop online or make din- face, your child can choose from a preset selection of mov-
chapter material, reinforcing the importance of stay- ner plans while your car drove itself? Would you like your ies or educational games, depending on his or her mood.
ing informed. car to use the Internet to suggest a better route, or stream
a music list tailored to your likes? A computer located within Now, such a tool at your fingertips has the risk of becom-
the vehicle already governs many of your car’s functions. That ing a distraction while you’re driving. There is no question
computer is responsible for various safety and diagnostic fea- that safety features must be built in to prevent accidents
tures. Recently, cars have begun offering Internet access for from occurring. Luckily, there is already a piece of technol-
driving directions, streaming audio, and cell phone connectiv- ogy that prevents the driver from ever having to touch the
ity. In the future, cars will drive themselves and seamlessly dashboard: voice recognition.
integrate into our digital lives. Technology has been making
better cars, and will continue to evolve to improve our lives as In the same way that Apple’s “Siri” has revolutionized the
we look to the future. way individuals interact with their iPhones, similar systems are
installed in the new dashboards. Drivers simply speak their
Apple and Google have cre-
ated partnerships with auto- commands to get the informa-
mobile manufacturers to place tion they need and to use the
iPad or Android devices into vehicle’s controls. Furthermore,
the center of a vehicle’s main this computer system uses exist-
console. Cars can connect to ing technologies that recognize
Wi-Fi access points or 4G net- and speak English to the user.
works to reach the Internet as This will allow the driver to hear
the modern smartphone does. e-mail messages, social network
These developments allow your updates, and today’s news and
vehicle to provide many ser- weather while driving to work.
vices that normally require a
smartphone but in a safer and Some companies have already
more integrated manner. taken steps in implementing this
technology. Ford uses voice rec-
One of the immediate benefits involves quick access ognition in some of its vehicles
to information. Drivers get real-time traffic data, weather, with a feature called Sync with MyFord Touch. Audi has
store hours, and much more. Also available is access to all added 3G connectivity in its new A7 model. However, the
the apps that you expect to have. One example is the Pan- real breakthroughs will come when you can drive in safety
dora service, which allows you to stream free, ad-supported while being as productive as when you are on your laptop.
music from stations you create yourself. Why pay for satel- Advances in dictation software will one day allow users to
lite radio or listen to stations that you don’t enjoy when you easily dictate e-mail responses. Changes in sensors and
can access your favorite online music services right from automated driving will allow users to devote less attention
your dashboard? Another benefit is the entertainment of to driving and more to getting things done. Google and Mer-
your passengers or children. Some vehicles include screens cedes are currently testing self-driving cars, and they may
that face the back seats, allowing parents to play DVDs for be available in the next ten years. When it does, do you see
their children. Internet-connected vehicles allow individuals yourself paying for this upgrade in your next car? Would
you be comfortable allowing a car to drive itself while you
worked on your laptop or tablet?
MoviesOnline: Information Systems ole63650_ch02_026-059.indd 49 49
Alice's First Assignment 10/15/15 05:14 PM
Bob: Oh, hi Alice . . . come on in! I know that we were scheduled for an
orientation meeting this morning. But I'm afraid that will have to wait. There is an Found in Connect for Computing Essentials 2017,
Important fire to put out today. Let me introduce you to one of your coworkers. Using IT at MoviesOnline—A Case Study of a fictitious
This is Jamal. organization provides an up-close look at what you
might expect to find on the job in the real world. You
Alice and Jamal exchange hellos and Bob motions Alice to take one of the chairs will follow Alice, a recent college graduate hired as a
across from his desk as he speaks. marketing analyst, as she navigates her way through
accounting, marketing, production, human resources,
“She said she was concerned about how our and research, gathering and processing data to help
members were connecting to our Web site.” manage and accelerate the growth of the three-year-
old company.
Bob: I just came back from a meeting with Carol,
our CEO. While we were discussing the Monthly
Membership Report, she said she was concerned
about how our members were connecting to our
Web site. This really caught me off guard! Our
membership growth has exceeded projections and
I had assumed that our meeting was to discuss
how to handle all the new members. She
requested that her Morning Report be modified to
include the percentage of our customers who use
mobile devices, and she wants us to analyze the
changes in laptop and desktop customers versus
mobile device customers over the past year.
Bob: Jamal, here is the Monthly Membership Report. I'd like you to review it and
then create two profiles. One profile will describe our members who use computers,
such as laptops and desktops. The other profile will be for our members who use mobile
devices, such as cell phones and tablets.. I’m interested in any differences or unique
characteristics you can uncover.
Bob removes the cover page, hands the rest of the report to Jamal, and hands the
cover page to Alice.
xix
®
Required=Results
McGraw-Hill Connect®
Learn Without Limits
Connect is a teaching and learning platform that
is proven to deliver better results for students and
instructors.
Connect empowers students by continually
adapting to deliver precisely what they need, when
they need it, and how they need it, so your class
time is more engaging and effective.
88% of instructors who use Connect Using Connect improves passing rates
require it; instructor satisfaction increases by 10.8% and retention by 16.4%.
by 38% when Connect is required.
Analytics Students can view
their results for any
Connect Insight®
Connect course.
Connect Insight is Connect’s new one-of-a-kind visual
analytics dashboard—now available for both instructors
and students—that provides at-a-glance information
regarding student performance, which is immediately actionable. By presenting
assignment, assessment, and topical performance results together with a
time metric that is easily visible for aggregate or individual results, Connect
Insight gives the user the ability to take a just-in-time approach to teaching and
learning, which was never before available. Connect Insight presents data that
empowers students and helps instructors improve class performance in a way
that is efficient and effective.
Mobile
Connect’s new, intuitive mobile interface gives students and instructors
flexible and convenient, anytime–anywhere access to all components of
the Connect platform.
Adaptive THE FIRST AND ONLY
ADAPTIVE READING
More students earn A’s and EXPERIENCE DESIGNED
B’s when they use McGraw-Hill TO TRANSFORM THE
Education Adaptive products. WAY STUDENTS READ
SmartBook®
Proven to help students improve grades and study more
efficiently, SmartBook contains the same content within
the print book, but actively tailors that content to the
needs of the individual. SmartBook’s adaptive technology
provides precise, personalized instruction on what the
student should do next, guiding the student to master
and remember key concepts, targeting gaps in knowledge
and offering customized feedback, and driving the student
toward comprehension and retention of the subject matter.
Available on smartphones and tablets, SmartBook puts
learning at the student’s fingertips—anywhere, anytime.
Over 4 billion questions have been
answered, making McGraw-Hill
Education products more intelligent,
reliable, and precise.
Support Materials in Connect
The Instructor’s Manual offers lecture outlines with teaching notes and figure refer-
ences. It provides definitions of key terms and solutions to the end-of-chapter mate-
rial, including multiple-choice, matching, and open-ended questions.
The PowerPoint slides are designed to provide instructors with a comprehensive
resource for lecture use. The slides include a review of key terms and topics, as well as
artwork taken from the text to further explain concepts covered in each chapter.
The testbank contains over 2,200 questions categorized by level of learning (defini-
tion, concept, and application). This is the same learning scheme that is introduced in
the text to provide a valuable testing and reinforcement tool. Text page references have
been provided for all questions, including a level-of-difficulty rating.
xxii
SIMNET ONLINE TRAINING AND ASSESSMENT
FOR OFFICE APPLICATIONS
SIMnet™ Online provides a way for you to test students’ software skills in a sim-
ulated environment. SIMnet provides flexibility for you in your applications course
by offering:
• Pretesting options
• Posttesting options
• Course placement testing
• Diagnostic capabilities to reinforce skills
• Web delivery of tests
• Learning verification reports
For more information on skills assessment software, please contact your local sales
representative, or visit us at www.simnetkeepitsimple.com.
xxiii
Acknowledgments
A special thank-you goes to the professors who took time Kathleen Morris
out of their busy schedules to provide us with the feed- University of Alabama
back necessary to develop the 2017 edition of this text. Katherine Oser
The following professors offered valuable suggestions on Central Texas College
revising the text: Debra Luna
El Paso Community College
Brenda Nickel Brenda McFarland
Moraine Park Technical College Asheville-Buncombe Technical Community College
Pamela Silvers Jennifer Krou
Asheville-Buncombe Technical Community College Texas State University
Natalie Cooper Mark Jackson
Madisonville Community College Columbus State Community College
Melissa Nemeth Kamal Kakish
IU Kelley School of Business Indianapolis Georgia Gwinnett College
Kate LeGrand Joshua Cuneo
Broward College Georgia Gwinnett College
Tiffany Ford
Ozarks Technical Community College Our sincere thanks also go to Laurie Zouharis at Suffolk
Laurence Hitterdale College for revising probes for LearnSmart; to Brenda
Glendale Community College Nielsen at Mesa Community College for revising the
Paulette Comet Instructor’s Manual, and online quizzes; to Rose Marie
Community College of Baltimore County Kuebbing for revising the testbank; and to Rachelle Hall
Lacey Lormand at Glendale Community College for revising the Power-
University of Louisiana at Lafayette Point presentations to accompany this text.
xxiv
About the Authors
Tim and Linda O’Leary live in the American Southwest
and spend much of their time engaging instructors and
students in conversation about learning. In fact, they have
been talking about learning for over 25 years. Something in
those early conversations convinced them to write a book,
to bring their interest in the learning process to the printed
page. Now, they are joined by their son Dan O’Leary as a
coauthor. Dan has recently completed his PhD in Electri-
cal Engineering with significant experience in teaching and
consulting in information technology.
The O’Leary’s form a unique team blending experience and youth. Tim has
taught courses at Stark Technical College in Canton, Ohio, and at Roches-
ter Institute of Technology in upstate New York, and is currently a professor
emeritus at Arizona State University. Linda offered her expertise at ASU for
several years as an academic advisor. She also presented and developed mate-
rials for major corporations such as Motorola, Intel, Honeywell, and AT&T,
as well as various community colleges in the Phoenix area. Dan has taught
at the University of California at Santa Cruz, developed energy-related labs
at NASA, and worked as a database administrator and as a consultant in
information systems.
Tim, Linda, and Dan have talked to and taught numerous students, all of
them with a desire to learn something about computers and applications that
make their lives easier, more interesting, and more productive.
Each new edition of an O’Leary text, supplement, or learning aid has ben-
efited from these students and their instructors who daily stand in front of
them (or over their shoulders).
xxv
1chapter Information Technology,
the Internet, and You
2
Why should I read this chapter?
The future of computers and digital technology promises exciting chal-
lenges and opportunities. Powerful software and hardware systems are
changing the way people and organizations interact in their daily life
and on the Internet.
This chapter introduces you to the skills and concepts you need to
be prepared for this ever-changing digital world, including:
• Information systems—how the critical parts of technology interact.
• Efficiency and effectiveness—how to maximize the use of
technology.
• Privacy, ethics, and environment—how to integrate technology
with people.
• Connectivity and cloud computing—how the Internet, web, and the
wireless revolution are changing how we communicate and interact.
Learning Objectives
After you have read this chapter, you should be able to:
1 Explain the parts of an information system: people, procedures, software, hardware, data, and the
Internet.
2 Distinguish between system software and application software.
3 Differentiate between the three kinds of system software programs.
4 Define and compare general-purpose, specialized, and mobile applications.
5 Identify the four types of computers and the five types of personal computers.
6 Describe the different types of computer hardware, including the system unit, input, output,
s torage, and communication devices.
7 Define data and describe document, worksheet, database, and presentation files.
8 Explain computer connectivity, the wireless revolution, the Internet, cloud computing, and loT.
3
Introduction The purpose of this book is to help you become a highly
efficient and effective computer user. This includes
“Welcome to Computing Essentials. I’m Alan and I work in informa- how to use (1) apps and application software; (2) all
tion technology. On the following pages, we’ll be discussing some types of computer hardware including mobile devices
of the most exciting new developments in computer technology like smartphones, tablets, and laptops; and (3) the Inter-
including smartphones, tablet computers, and cloud computing. net. Becoming a highly efficient and effective computer
Let me begin in this chapter by giving you an overview of the book user also requires a full understanding of the potential
”and showing you some of its special features. impact of technology on privacy and the environment as
well as the role of personal and organizational ethics.
To effectively and efficiently use computers, you need
to know the parts of an information system: people, pro-
cedures, software, hardware, data, and the Internet. You
also need to understand the wireless revolution, the
mobile Internet, and the web and to recognize the role
of information technology in your personal and profes-
sional life.
Information Systems
When you think of a personal computer, perhaps you think of just the equipment
itself. That is, you think of the screen or the keyboard. Yet, there is more to it than
that. The way to think about a personal computer is as part of an information system.
An information system has several parts: people, procedures, software, hardware, data,
and the Internet. (See Figure 1-1.)
• People: It is easy to overlook people as one of the parts of an information system.
Yet this is what personal computers are all about—making people, end users like
you, more productive.
• Procedures: The rules or guidelines for people to follow when using software,
hardware, and data are procedures. These procedures are typically documented
in manuals written by computer specialists. Software and hardware manufactur-
ers provide manuals with their products. These manuals are provided in either
printed or electronic form.
• Software: A program consists of the step-by-step instructions that tell the com-
puter how to do its work. Software is another name for a program or programs.
The purpose of software is to convert data (unprocessed facts) into information
(processed facts). For example, a payroll program would instruct the computer to
take the number of hours you worked in a week (data) and multiply it by your pay
rate (data) to determine how much you are paid for the week (information).
• Hardware: The equipment that processes the data to create information is called
hardware. It includes smartphones, tablets, keyboards, mice, displays, system
units, and other devices. Hardware is controlled by software.
• Data: The raw, unprocessed facts, including text, numbers, images, and sounds,
are called data. Processed data yields information. Using the previous example of
a payroll program, the data (number of hours worked and pay rate) is processed
(multiplied) to yield information (weekly pay).
• Internet: Almost all information systems provide a way to connect to other people
and computers, typically using the Internet. This connectivity greatly expands the
capability and usefulness of information systems.
4 chapter 1
People
are end users who use computers
to make themselves more productive.
Software
provides step-by step instructions
for computer hardware.
Procedures
specify rules or guidelines
for computer operations.
Hardware Data
includes keyboard, mouse, consists of unprocessed facts including text,
display, system unit, tablets, numbers, images, and sounds.
smartphones, and other devices.
Figure 1-1 Parts of an information
Internet system
allows computers to connect Information Technology, the Internet, and You 5
to people and other
computers.
concept check
What are the parts of an information system?
What is a program?
What is the difference between data and information?
environment People
Did you know that over 10 People are surely the most important part of any information system. Our lives are
million tons of material was touched every day by computers and information systems. Many times the contact
diverted from landfills last year is direct and obvious,
alone as a result of recycling such as when we create
efforts? This success is largely documents using a word
due to voluntary participation processing program or
of people across the country, when we connect to the
who have made “reduce, Internet. (See Figure 1-2.)
reuse, and recycle” a personal Other times, the contact
commitment. This includes is not as obvious.
recycling old computers, cell Throughout this book
phones, printers, and displays. you will find a variety of fea-
Your participation in recycling tures designed to help you
means fewer one-use products, become an efficient and
cleaner water, and cleaner air. effective end user. These
But recycling may someday pay features include Making
off financially too. Many now IT Work for You, Tips, Pri-
see waste as a resource, and vacy, Environment, Ethics,
one that we shouldn’t squander and Careers in IT. Figure 1-2 People and computers
by filling up the garbage can
instead of the recycling bin. • Making IT Work for You. Throughout this book you will find Making IT Work for
Imagine a future where the You features that present numerous interesting and practical IT applications. For
garbage collector drops off a just a few of the Making IT Work for You topics, see Figure 1-3.
check for your contributions to
going green. • Tips. We all can benefit from a few tips or suggestions. Throughout this book
you will find numerous tips to make your computing safer, more efficient, and
more effective. These tips range from the basics of keeping your computer system
Application Description
Free Antivirus Program Protect your computer by installing and using a free antivirus
Online Entertainment program. See page 9.
Google Docs Use your computer to watch your favorite television programs,
Skype movies, and other video content. See page 30.
Cloud Storage Create, collaborate, and access documents from almost
anywhere with a free online office suite. See page 78.
Visit face to face with friends and family located almost
anywhere at little or no cost. See page 157.
Send large files using a free tool and the cloud. See page 182.
Figure 1-3 Making IT Work for You applications
6 chapter 1
running smoothly to how to protect Are you getting the most out of your computer? Here are tips
your privacy while surfing the web. For just a few of the tips to make your computing safer, more
a p artial list of the tips presented in the efficient, and more effective.
following chapters, see Figure 1-4.
• Privacy. One of the most critical issues 1 Low battery. Do you find that your laptop’s battery keeps its charge for
today is how to protect the privacy of our
personal information. Throughout this less time than it used to? Here are some ways to make your battery last
book you will find Privacy boxes in the longer. See page 128.
margin that present information about
protecting our privacy. 2 Language translation. Have you had trouble communicating with someone
• Environment. Today it is more impor-
tant than ever that we be aware of our who does not speak English? If so, Google Translate may be just what you
impact on the environment. In this chap- need. See page 148.
ter and the following ones, you will find
Environment boxes in the margin that 3 Lost files. Have you ever accidentally deleted or lost important files from
p resent important relevant environmental
information. your flash drive? Here are a few suggestions that might help. See page 178.
• Ethics. Most people agree that we should
behave ethically. That is, we should follow 4 Protecting your identity. Identity theft is a growing problem and can be
financially devastating if you are a victim. Some steps to protect your
identity are on page 233.
5 Wireless networks. Do you use your laptop to connect to wireless
networks at school, coffee shops, airports, or hotels? If so, it is important
to use caution to protect your computer and your privacy. A few
suggestions are on page 208.
a system of moral principles that direct Figure 1-4 Selected tips
our everyday lives. However, for any given
circumstance, people often do not agree
on the ethics of the situation. Throughout this book you will find numerous Ethics
boxes posing a variety of different ethical/unethical situations for your consideration.
• Careers in IT. One of the most important decisions of your life is to decide upon
your life’s work or career. Perhaps you are planning to be a writer, an artist, or an
engineer. Or you might become a professional in information technology (IT).
Each of the following chapters highlights a specific career in information technol-
ogy. This feature provides job descriptions, projected employment demands, edu-
cational requirements, current salary ranges, and advancement opportunities.
concept check
Which part of an information system is the most important?
Describe the Making IT Work for You, Tips, and Privacy features.
Describe the Environment, Ethics, and Careers in IT features.
Software
Software, as we mentioned, is another name for programs. Programs are the
instructions that tell the computer how to process data into the form you want.
In most cases, the words software and programs are interchangeable. There are two
major kinds of software: system software and application software. You can think of
application software as the kind you use. Think of system software as the kind the
computer uses.
System Software
The user interacts primarily with application software. System software enables the
application software to interact with the computer hardware. System software is
“background” software that helps the computer manage its own internal resources.
Information Technology, the Internet, and You 7
Figure 1-5 Windows 10 Figure 1-6 Mac OS X
Figure 1-7 General-purpose System software is not a single program. Rather, it is a collection of programs,
applications including the following:
8 chapter 1 • Operating systems are programs that coordinate computer resources, provide an
interface between users and the computer, and run applications. Smartphones,
tablets, and many other mobile devices use embedded operating systems, also
known as real-time operating systems (RTOS). Desktop computers use stand-
alone operating systems like Windows 10 or Mac OS. (See Figures 1-5 and 1-6.)
Networks use network operating systems (NOS).
• Utilities perform specific tasks related to managing computer resources. One of the
most essential utility programs that every computer system should have is an antivirus
program. These programs protect your computer system from viruses or malicious
programs that are all too often deposited onto your computer from the Internet. These
programs can damage software and hardware, as well as c ompromise the security and
privacy of your personal data. If your computer does not have an antivirus program
installed on it, you need to get one. To see how you can install a free antivirus program
on your computer, see Making IT Work for You: Free Antivirus Program on page 9.
Application Software
Application software might be described as end user software. Three types of applica-
tion software are general-purpose, specialized, and apps.
General-purpose applications are widely used in nearly all career areas. They are
the kinds of programs you have to know to be considered an efficient and effective
end user. Some of the best known are presented in Figure 1-7.
Specialized applications include thousands of other programs that are more nar-
rowly focused on specific disciplines and occupations. Two of the best known are
graphics and web authoring programs.
Mobile apps, also known as mobile applications or simply apps, are small pro-
grams primarily designed for mobile devices such as smartphones and for tablet com-
puters. There are over half a million apps. The most popular mobile apps are for social
networking, playing games, and downloading music and videos.
Type Description
Browsers Connect to websites and display web pages
Word processors Prepare written documents
Spreadsheets Analyze and summarize numerical data
Database management systems Organize and manage data and information
Presentation graphics Communicate a message or persuade other people
Making IT work for you
FREE ANTIVIRUS PROGRAM
Have you or someone you know had a slower computing experience due to a spyware infection? Even
worse, perhaps a malicious piece of software stole crucial, personal information or caused a total system
failure. Most of these problems can be averted by having an up-to-date antivirus program running in your
computer’s memory at all times. This exercise shows you how to download and install a free antivirus pro-
gram if your computer does not yet have one. (Please note that the web is continually changing, and some
of the specifics presented below may have changed.)
Getting Started First, make sure your computer does not have an antivirus or security suite running. If it does, be sure to
completely uninstall that program, even if the subscription is expired. Now, follow these steps to install AVG, a popular, free
antivirus program:
• 1 Visit http://free.avg.com and click the Download button. You will be asked to confirm that you want the free
edition and then redirected to a download site.
• 2 Run the installation file and follow the prompts.
• 3 Select basic protection if you are asked which product you would like to install.
Using AVG Generally speaking, your antivirus program watches your system for malware and updates itself automatically.
However, you can always download updates manually, set a schedule for full-system scans, and change basic settings for vari-
ous components of the software.
• 1 Click Scan now to run a full scan on
your computer.
• 2 Just to the right of that, click the
button with the white cog to see the
scan options where you can set a
schedule for automated scans.
• 3 Click the back arrow to reach the
main screen, where you can click
various elements of the program to
configure them. For example, clicking
Web will allow you to turn on a
feature that detects cookies that may
be used to track your online activity.
9
concept check
Describe the two major kinds of software.
Describe two types of system software programs.
Define and compare general-purpose applications, specialized applications, and
mobile apps.
Hardware
Computers are electronic devices that can follow instructions to accept input, process
that input, and produce information. This book focuses principally on personal com-
puters. However, it is almost certain that you will come in contact, at least indirectly,
with other types of computers.
Types of Computers
There are four types of computers: supercomputers, mainframe computers, midrange
computers, and personal computers.
• Supercomputers are the most powerful type of computer. These machines are spe-
cial, high-capacity computers used by very large organizations. Supercomputers
are typically used to process massive amounts of data. For example, they are used
to analyze and predict worldwide weather patterns. IBM’s Blue Gene supercom-
puter is one of the fastest computers in the world. (See Figure 1-8.)
• Mainframe computers occupy specially wired, air-conditioned rooms. Although
not nearly as powerful as supercomputers, mainframe computers are capable of
great processing speeds and data storage. For example, insurance companies use
mainframes to process information about millions of policyholders.
• Midrange computers, also referred to as servers, are computers with processing
capabilities less powerful than a mainframe computer yet more powerful than a
Figure 1-8 Supercomputer
10 chapter 1
Figure 1-9 Desktop Figure 1-10 Laptop
personal computer. Originally used by medium-size companies or departments of Figure 1-11 Tablet
large companies to support their processing needs, today midrange computers are
most widely used to support or serve end users for such specific needs as retriev-
ing data from a database or supplying access to application software.
• Personal computers, also known as PCs, are the least powerful, yet the most widely
used and fastest-growing type of computer. There are five types of personal com-
puters: desktops, laptops, tablets, smartphones, and wearables. Desktop computers are
small enough to fit on top of or alongside a desk yet are too big to carry around.
(See Figure 1-9.) Laptop computers, also known as n otebook c omputers, are por-
table and lightweight and fit into most briefcases. (See Figure 1-10.) Tablets, also
known as tablet computers, are smaller, lighter, and generally less powerful than
laptops. Like a laptop, tablets have a flat screen but typically do not have a stan-
dard keyboard. (See Figure 1-11.) Instead, tablets typically use a virtual keyboard
that appears on the screen and is touch-sensitive.
Smartphones are the most widely used handheld computers. Smartphones are
cell phones with wireless connections to the Internet and processing capabilities.
(See F igure 1-12.) Other mobile computers include wearable devices like Apple’s
watch. (See Figure 1-13.)
Personal Computer Hardware Figure 1-12 Smartphone
Hardware for a personal computer system consists of a variety of different devices. Figure 1-13 Wearable
This physical equipment falls into four basic categories: system unit, input/output,
secondary storage, and communication. Because we discuss hardware in detail later
in this book, here we will present just a quick overview of the four basic categories.
• System unit: The system unit is a container that houses most of the electronic
components that make up a computer system. Two important components of the
system unit are microprocessors and memory. (See Figure 1-14.) The microprocessor
controls and manipulates data to produce information. Memory is a holding area
for data, instructions, and information. One type, random-access memory (RAM),
holds the program and data that is currently being processed. This type of mem-
ory is sometimes referred to as temporary storage because its contents will typically
be lost if the electric power to the computer is disrupted.
• Input/output: Input devices translate data and programs that humans can under-
stand into a form that the computer can process. The most common input devices
are the keyboard and the mouse. Output devices translate the processed informa-
tion from the computer into a form that humans can understand. The most com-
mon output device is the display, also known as a monitor.
Information Technology, the Internet, and You 11
Microprocessor
Memory
Figure 1-14 System unit
Figure 1-15 Solid-state storage • Secondary storage: Unlike memory, secondary storage holds data and programs
even after electric power to the computer system has been turned off. The most
important kinds of secondary media are hard disks, solid-state storage, and optical discs.
Hard disks are typically used to store programs and very large data files. Using
rigid metallic platters and read/write heads that move across the platters, data and
information are stored using magnetic charges on the disk’s surface. In contrast,
solid-state storage does not have any moving parts, is more reliable, and requires
less power. It saves data and information electronically similar to RAM except that
it is not volatile. (See Figure 1-15.) Optical discs use laser technology to store data
and programs. Three types of optical discs are compact discs (CDs), digital versa-
tile (or video) discs (DVDs), and Blu-ray discs (BD).
• Communication: At one time, it was uncommon for a personal computer system to
communicate with other computer systems. Now, using communication devices, a
personal computer routinely communicates with other computer systems located as
near as the next office or as far away as halfway around the world, using the Inter-
net. A modem is a widely used communication device that modifies audio, video,
and other types of data into a form that can be transmitted across the Internet.
concept check
What are the four types of computers?
Describe the five types of personal computers.
Describe the four basic categories of personal computer hardware.
12 chapter 1
Presentation
Database
Worksheet
Document
Figure 1-16 Four types of files: document, worksheet, database, and presentation
Data
Data is raw, unprocessed facts, including text, numbers, images, and sounds. As we
mentioned earlier, processed data becomes information. When stored electronically in
files, data can be used directly as input for the system unit.
Four common types of files (see Figure 1-16) are
• Document files, created by word processors to save documents such as memos,
term papers, and letters.
• Worksheet files, created by electronic spreadsheets to analyze things like budgets
and to predict sales.
• Database files, typically created by database management programs to contain
highly structured and organized data. For example, an employee database file
might contain all the workers’ names, Social Security numbers, job titles, and
other related pieces of information.
• Presentation files, created by presentation graphics programs to save presentation
materials. For example, a file might contain audience handouts, speaker notes,
and electronic slides.
Information Technology, the Internet, and You 13
Figure 1-17 Wireless communication devices
Connectivity and the Mobile Internet
Connectivity is the capability of your personal computer to share information with
other computers. Central to the concept of connectivity is the network. A network
is a communications system connecting two or more computers. The largest network
in the world is the Internet. It is like a giant highway that connects you to millions
of other people and organizations located throughout the world. The web provides a
multimedia interface to the numerous resources available on the Internet.
The Internet has driven the evolution of computers and their impact on our daily
lives. In fact, the rate of technological change is accelerating at an ever faster pace.
Along with the Internet, three things that are driving the impact of technology on our
lives are cloud computing, wireless communication, and the Internet of Things.
14 chapter 1
• Cloud computing uses the Internet and the web to shift many computer activities
from a user’s computer to computers on the Internet. Rather than relying solely on
their computer, users can now use the Internet to connect to the cloud and access
more powerful computers, software, and storage.
• Wireless communication has changed the way we communicate with one another.
The rapid development and widespread use of wireless communication devices like
tablets, smartphones, and wearable devices has led many experts to predict that
wireless applications are just the beginning of the wireless revolution, a revolution
that will dramatically affect the way we communicate and use computer technology.
• The Internet of Things (IoT) is the continuing development of the Internet that
allows everyday objects embedded with electronic devices to send and receive
data over the Internet. It promises to connect all types of devices from computers
to smartphones to watches to any number of everyday devices.
Wireless communication, cloud computing, and IoT are driving the mobile Internet.
They promise to continue to dramatically affect the entire computer industry and how
you and I will interact with computers and other devices. Each will be discussed in
detail in the following chapters. For just a few of these mobile devices, see Figure 1-17.
concept check
Define data. List four common types of files.
Define connectivity and networks.
What is cloud computing? Wireless revolution? IoT?
Careers in IT As mentioned previously, each of the following chapters highlights a
specific career in information technology. Each provides specific job
“Now that you know the basic outline and descriptions, salary ranges, advancement opportunities, and more. For
important features of this book, I’d like to talk a partial list of these careers, see Figure 1-18.
”about some of the most exciting and well-paid
careers in information technology.
Career Description
Webmaster Develops and maintains websites and web
Software engineer resources. See page 48.
Computer support specialist Analyzes users’ needs and creates
Computer technician application software. See page 77.
Technical writer Provides technical support to customers
and other users. See page 104.
Network administrator Repairs and installs computer components
and systems. See page 130.
Prepares instruction manuals, technical
reports, and other scientific or technical
documents. See page 161.
Creates and maintains computer networks.
See page 212.
Figure 1-18 Careers in information technology
Information Technology, the Internet, and You 15
A LOOK TO THE FUTURE
Using and Understanding Information need to know about hardware. For those considering the
Technology purchase of a computer, an appendix—The Computer Buy-
er’s Guide—is provided at the end of this book. This guide
The purpose of this book is to help you use and understand provides a very concise comparison of desktops, laptops,
information technology. We want to help you become profi- tablets, and smartphones.
cient and to provide you with a foundation of knowledge so
that you can understand how technology is being used today Privacy, Security, and Ethics
and anticipate how technology will be used in the future.
This will enable you to benefit from six important information What about people? Experts agree that we as a society must
technology developments. be careful about the potential of technology to negatively
affect our lives. Specifically, we need to be aware of how
The Internet and the Web technology can impact our personal privacy and our environ-
ment. Also, we need to understand the role and the impor-
The Internet and the web are considered to be the two most impor- tance of organizational and personal ethics. These critical
tant technologies for the 21st century. Understanding how to effi- issues are integrated in every chapter of this book as well as
ciently and effectively use the Internet
to browse, communicate, and locate extensively covered in Chapter 9.
information is an essential skill. These
issues are presented in Chapter 2, Organizations
The Internet, the Web, and Electronic
Commerce. Almost all organizations rely on the
quality and flexibility of their infor-
Powerful Software mation systems to stay competitive.
As a member or employee of an
The software that is now available organization, you will undoubtedly
can do an extraordinary number be involved in these information sys-
of tasks and help you in an endless tems. In order to use, develop, mod-
number of ways. You can create ify, and maintain these systems, you
p rofessional-looking documents, ana- need to understand the basic con-
lyze massive amounts of data, create cepts of information systems and
dynamic multimedia web pages, and know how to safely, efficiently, and
much more. Today’s employers are effectively use computers. These
expecting the people they hire to be concepts are covered throughout
able to effectively and efficiently use this book.
a variety of different types of software. General-purpose, spe-
cialized, and mobile applications are presented in Chapter 3. Changing Times
System software is presented in Chapter 4.
Are the times changing any faster now than they ever
Powerful Hardware have? Almost everyone thinks so. Whatever the answer,
it is clear we live in a fast-paced age. The Evolution of the
Personal computers are now much more powerful than they Computer Age section presented at the end of this book
used to be. Smartphones, tablets, and communication tech- tracks the major developments since computers were first
nologies such as wireless networks are dramatically chang- introduced.
ing the ways to connect to other computers, networks, and
the Internet. However, despite the rapid change of specific After reading this book, you will be in a very favorable
equipment, their essential features remain unchanged. To position compared with many other people in industry today.
become an efficient and effective end user, you should focus You will learn not only the basics of hardware, software, con-
on these features. Chapters 5 through 8 explain what you nectivity, the Internet, and the web but also the most cur-
rent technology. You will be able to use these tools to your
advantage.
16
VISUAL SUMMARY Information Technology, the Internet, and You
INFORMATION SYSTEMS PEOPLE
The way to think about a personal computer is to realize People are the most important part of an information sys-
that it is one part of an information system. There are sev- tem. This book contains several features to demonstrate
eral parts of an information system: how people just like you use computers. These features
include the following:
• People are an essential part of the system. The pur-
• Making IT Work for You presents several interesting
pose of information systems is to make people, or end
users like you, more productive. and practical applications. Topics include using digital
video editing and locating job opportunities.
• Procedures are rules or guidelines to follow when
• Tips offer a variety of suggestions on such practical
using software, hardware, and data. They are typi-
cally documented in manuals written by computer matters as how to improve slow computer perfor-
professionals. mance and how to protect your privacy while on the
web.
• Software (programs) provides step-by-step instruc-
• Privacy marginal boxes discuss threats to your per-
tions to control the computer to convert data into
information. sonal privacy and suggest ways to protect yourself.
• Hardware consists of the physical equipment. It is • Environment boxes discuss important and relevant
controlled by software and processes data to create environmental issues. The impact of computers and
information. other technologies is more critical today than ever
before.
• Data consists of unprocessed facts including text,
• Ethics boxes pose a variety of different ethical/unethi-
numbers, images, and sound. Information is data that
has been processed by the computer. cal situations for your consideration.
• The Internet allows computers to connect and share • Careers in IT presents job descriptions, employment
information. demands, educational requirements, salary ranges,
To efficiently and effectively use the computer, you need and advancement opportunities.
to understand information technology (IT), including
software, hardware, data, and connectivity.
Information Technology, the Internet, and You 17
To efficiently and effectively use computers, you need to understand the basic parts of an information system: people,
procedures, software, hardware, data, and connectivity. You also need to understand the Internet and the web and to
recognize the role of technology in your professional and personal life.
SOFTWARE HARDWARE
Software, or programs, consists of system and application Hardware consists of electronic devices that can follow
software. instructions to accept input, process the input, and pro-
duce information.
System Software
System software enables application software to interact Types of Computers
with computer hardware. Supercomputer, mainframe, midrange (server), and personal
• Operating systems coordinate resources, provide computers (PCs) are four types of computers. Personal com-
puters can be desktop, laptop (notebook computer), tablet,
an interface, and run applications. Three types are smartphone, and wearable.
embedded (real-time, RTOS), stand-alone, and
network (NOS). Personal Computer Hardware
There are four basic categories of hardware devices.
• Utilities perform specific tasks to manage computer • System unit contains electronic circuitry, including
resources. microprocessors and memory. Random-access
memory (RAM) holds the program and data currently
Application Software being processed.
Application software includes general-purpose, special-
ized, and mobile applications. • Input/output devices are translators between humans
• General purpose—widely used in nearly all career
and computers. Input devices include the keyboard
areas; programs include browsers, word processors, and mouse. The most common output device is the
spreadsheets, database management systems, and pre- computer display (monitor).
sentation graphics.
• Secondary storage holds data and programs. Typical
• Specialized—focus more on specific disciplines and
media include hard disks, solid-state storage, and
occupations; programs include graphics and web optical discs (CD, DVD, and Blu-ray).
authoring.
• Communication devices allow personal computers to
• Apps (mobile apps, mobile applications)—designed
communicate with other computer systems. Modems
for mobile devices; most popular are for text mes- modify audio, video, and other types of data for trans-
saging, Internet browsing, and connecting to social mission across the Internet.
networks.
18 chapter 1
DATA CONNECTIVITY AND MOBILE
INTERNET
Data is the raw unprocessed facts about something. Com-
mon file types include Connectivity describes the ability of end users to use
resources well beyond their desktops. Central to the
• Document files created by word processors. concept of connectivity is the network or communication
system connecting two or more computers. The Internet
• Worksheet files created by spreadsheet programs. is the world’s largest computer network. The web
provides a multimedia interface to resources available on
the Internet.
Along with the Internet, three other things are driving
the impact of technology:
• Cloud computing uses the Internet and the web to
shift many computer activities from a user’s computer
to computers on the Internet.
• Wireless revolution has changed the way we commu-
nicate and use computer technology. Wireless devices
include tablets, smartphones, and watches.
• The Internet of Things (IoT) is the continuing devel-
opment of the Internet that allows everyday objects
embedded with electronic devices to send and receive
data over the Internet.
CAREERS in IT
• Database files created by database management Career Description
Webmaster Develops and maintains websites and web
programs. resources. See page 48.
Software Analyzes users’ needs and creates
• Presentation files created by presentation graphics engineer application software. See page 77.
Computer Provides technical support to customers and
programs. support other users. See page 104.
specialist
Computer Repairs and installs computer components
technician and systems. See page 130.
Technical Prepares instruction manuals, technical
writer reports, and other scientific or technical
documents. See page 161.
Network Creates and maintains computer networks.
administrator See page 212.
Information Technology, the Internet, and You 19
KEY TERMS mouse (11)
network (14)
application software (8) network operating systems (NOS) (8)
apps (8) notebook computer (11)
Blu-ray disc (BD) (12) operating system (8)
cloud computing (15) optical disc (12)
communication device (12) output device (11)
compact disc (CD) (12) PC (11)
connectivity (4, 14) people (4)
data (4) personal computer (11)
database file (13) presentation file (13)
desktop computer (11) procedures (4)
digital versatile disc (DVD) (12) program (4)
digital video disc (DVD) (12) random-access memory (RAM) (11)
display (12) real-time operating system (RTOS) (8)
document file (13) secondary storage (12)
embedded operating systems (RTOS) (8) server (10)
end user (4) smartphone (11)
general-purpose application (8) software (4)
hard disk (12) solid-state storage (12)
hardware (4) specialized application (8)
information (4) stand-alone operating system (8)
information system (4) supercomputer (10)
information technology (IT) (7) system software (7)
input device (11) system unit (11)
Internet (14) tablet (11)
IoT (Internet of Things) (15) tablet computer (11)
keyboard (11) utility (8)
laptop computer (11) virus (8)
mainframe computer (10) wearable device (11)
memory (11) web (14)
microprocessor (11) wireless communication (15)
midrange computer (10) wireless revolution (15)
mobile app (application) (8) worksheet file (13)
modem (12)
monitor (11)
20 chapter 1
MULTIPLE CHOICE
Circle the letter of the correct answer.
1. The keyboard, mouse, display, and system unit are:
a. hardware c. storage devices
b. output devices d. software
2. Programs that coordinate computer resources, provide an interface, and run applica-
tions are known as:
a. application programs c. storage systems
b. operating systems d. utility programs
3. A browser is an example of a: c. system application
a. general-purpose application d. utility program
b. specialized program
4. Although not as powerful as a supercomputer, this type of computer is capable of great
processing speeds and data storage.
a. mainframe c. laptop
b. midrange d. tablet
5. Apple’s Watch is what type of computer?
a. laptop c. tablet
b. smartphone d. wearable
6. RAM is a type of:
a. computer c. network
b. memory d. secondary storage
7. Unlike memory, this type of storage holds data and programs even after electric power
to the computer system has been turned off.
a. primary c. ROM
b. RAM d. secondary
8. The type of file created by word processors, for example, memos, term papers, and
letters.
a. database c. presentation
b. document d. worksheet
9. Uses the Internet and the web to shift many computer activities from a user’s computer
to computers on the Internet.
a. cloud computing c. network
b. high definition d. solid-state storage
10. The largest network in the world is [the]:
a. Facebook c. supercomputer
b. Internet d. web
chapter 1 21
MATCHING
Match each numbered item with the most closely related lettered item. Write your answers
in the spaces provided.
a. desktop 1. Consists of the step-by-step instructions that tell the
b. modem computer how to do its work.
c. network
d. output 2. Another name for a program.
e. presentation 3. Enables the application software to interact with
f. program
g. software the computer hardware.
h. solid-state 4. Type of computer that is small enough to fit on top
i. system software
j. system unit of or alongside a desk yet is too big to carry around.
5. A container that houses most of the electronic com-
ponents that make up a computer system.
6. Devices that translate the processed information
from the computer into a form that humans can
understand.
7. Unlike hard disks, this type of storage does not have
any moving parts, is more reliable, and requires less
power.
8. The most widely used communication device.
9. A type of a file that might contain, for example,
audience handouts, speaker notes, and electronic
slides.
10. A communications system connecting two or more
computers.
OPEN-ENDED
On a separate sheet of paper, respond to each question or statement.
1. Explain the parts of an information system. What part do people play in this system?
2. What is system software? What kinds of programs are included in system software?
3. Define and compare general-purpose applications, specialized applications, and apps.
Describe some different types of general-purpose applications. Describe some types of
specialized applications.
4. Describe the different types of computers. What is the most common type? What are
the types of personal computers?
5. What is connectivity? What is a computer network? What are the Internet and the web?
What are cloud computing, the wireless revolution, and IoT?
22 chapter 1
DISCUSSION
Respond to each of the following questions.
1 Making IT Work for You
Making it a habit of keeping current with technology applications can be a key to your success. Numerous
full-page spreads identified as Making IT Work for You are presented in the following chapters. These
sections address some of today’s most interesting and useful applications. They include online entertain-
ment in Chapter 2, Skype in Chapter 6, and cloud storage in Chapter 7. Select one that you find the most
interesting, and then respond
to the following: (a) Why did
you select this application? (b)
Have you used this application?
If so, when and how? If not, do
you plan to in the near future?
(c) Go to the chapter containing
your selected application, and
locate the application’s Mak-
ing IT Work for You coverage.
Review and briefly describe its
contents. (d) Did you find the
coverage useful? Why or why
not?
2 Privacy
Privacy is one of the most critical issues facing society today. Numerous Privacy boxes appear in the
margins of the upcoming chapters presenting a variety of privacy issues. These issues include apps that
track smartphone and tablet user locations without their knowledge or consent in Chapter 3, access by
government and organization networks to obtain unauthorized detailed personal information in Chapter
8, and protection of personal privacy while using social networking sites such as Facebook in Chap-
ter 9. Select one that you find
the most interesting, and then
respond to the following: (a)
Why did you select this issue?
(b) Do you have knowledge of
or experience with the issue? If
so, describe your knowledge or
experience. If not, do you con-
sider the issue to be important
for protecting your privacy?
(c) Go to the chapter contain-
ing your selected issue, locate
the Privacy box, read it, and
describe its contents. (d) Did
you find the coverage thought-
provoking? Why or why not?
chapter 1 23
3 Environment
Almost everyone agrees that protecting our environment today is more important than ever before.
Numerous Environment boxes appear in the margins of the upcoming chapters. These boxes present a
variety of environmental topics including e-mail benefits in Chapter 2, operating systems reducing energy
consumption in Chapter 4, and recycling old inkjet cartridges in Chapter 6. Select one that you find
the most interesting, and then
respond to the following: (a)
Why did you select this topic?
(b) Do you have knowledge of
or experience with the topic? If
so, describe your knowledge or
experience. If not, do you con-
sider the topic to be important
for protecting the environment?
(c) Go to the chapter containing
your selected topic, locate the
Environment box, read it, and
describe its contents. (d) Did
you find the coverage thought-
provoking? Why or why not?
4 Ethics
Computer ethics are guidelines for the morally acceptable use of computers in our society. Numerous
Ethics boxes appear in the margins of the upcoming chapters presenting a variety of ethical issues. These
issues include image editing in Chapter 3, unauthorized use of webcams in Chapter 6, and unauthorized
monitoring or eavesdropping of
Internet activity in Chapter 8.
Select one issue that you find
the most interesting, and then
respond to the following: (a)
Why did you select this issue?
(b) Do you have knowledge of
or experience with the issue?
If so, describe your knowledge
or experience. If not, do you
consider the issue critical for
individuals or organizations? (c)
Go to the chapter containing
your selected issue, locate the
Ethics box, read it, and describe
its contents. (d) Did you find the
coverage thought-provoking?
Why or why not?
24 chapter 1
PHOTO CREDITS
CHAPTER 1
Opener: © Carol and Mike Werner/Alamy; p. 3, 16: © Simone Brandt/Alamy RF; p. 4, 15, 17 (left): © Inti St.
Clair/Taxi/Getty Images; 1-1 (people), p. 17 (left): © Image Source, all rights reserved, RF; 1-1 (procedures),
(data), 1-5, 1-16, p. 18 (left), 19: Microsoft product/screen shot(s) reprinted with permission from Microsoft
Corporation; 1-1 (Office): Used with permission from Microsoft; 1-1 (Windows): © McGraw-Hill Education/Aaron
Roeth, photographer; 1-1 (phone and tablet), 1-11, 1-12, p. 18 (right): © Stanca Sanda/Alamy; 1-1 (desktop), 1-9:
© Maxim Kazmin/Getty Images RF; 1-1 (internet): © liangpv/iStock Vectors/Getty Images RF; 1-2, p. 17 (right):
© Fancy Photography/Veer RF; 1-6: Djaypro screen shot copyright © Algoriddim.com. Used with permission; p. 9:
Copyright © AVG Technologies, used with permission; 1-8: © Everett Collection Historical/Alamy; 1-10: © David
Vernon/Getty Images RF; 1-13: © PG Pictures/Alamy; 1-14: © Willis Technology; 1-15: © Bob Dormon/theregister.
co.uk; 1-17 (top-left): BlackBerry®, RIM®, Research In Motion® and related trademarks, names and logos are
the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the
world. Used under license from Research In Motion Limited; 1-17 (top-right): © Lenovo, used with permission;
1-17 (bottom-left): Source: Duncan Hull/Flickr/CC; 1-17 (bottom-middle): © IanDagnall Computing/Alamy; 1-17
(bottom-right): © T3 Magazine/Contributor via Getty Images; p. 23 (top): The Skype name, associated trade marks
and logos and the “S” logo are trade marks of Skype or related entities, © 2015 Skype and/or Microsoft; p. 23
(bottom): Brenden Smialowski/AFP/Getty Images; p. 24 (top): © 2015 Hewlett Packard; p. 24 (bottom): © 2015
Electronic Frontier Foundation.
chapter 1 25