The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Computing Essentials 2019 by OLeary (z-lib.org)

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by bm-3533, 2021-10-11 02:20:04

Computing Essentials 2019 by OLeary (z-lib.org)

Computing Essentials 2019 by OLeary (z-lib.org)

Topology: The configuration of a network. The five principal Unicode: A 16-bit code designed to support international
network topologies are ring, bus, star, tree, and mesh. ­languages, like Chinese and Japanese.

Touch pad: Used to control the pointer by moving and Uniform resource locator (URL): For browsers to connect you
t­apping your finger on the surface of a pad. to resources on the web, the location or address of the resources
must be specified. These addresses are called URLs.
Touch screen: Monitor screen allowing actions or commands
to be entered by the touch of a finger. Universal Product Code (UPC): A bar code system that identi-
fies the product to the computer, which has a description and
Tower computer: A desktop system unit placed vertically. the latest price for the product.

Tower unit: See Tower computer. Universal serial bus (USB): Combines with a PCI bus on
the system board to support several external devices without
Track: Closed, concentric ring on a disk on which data is inserting cards for each device. USB buses are used to support
recorded. Each track is divided into sections called sectors. high-speed scanners, printers, and video-capturing devices.

Tracking cookies: See Third-party cookie. Universal serial bus - A (USB-A): The type of USB found on
most laptops and desktops.
Traditional keyboard: Full-sized, rigid, rectangular keyboard
that includes function, navigational, and numeric keys. Universal serial bus - B (USB-B): The type of USB found on
most peripherals.
Transaction processing system (TPS): System that records
day-to-day transactions, such as customer orders, bills, inven- Universal serial bus - C (USB-C): The newest USB type,
tory levels, and production output. The TPS tracks operations expected to replace both USB types A and B.
and creates databases.
Universal serial bus (USB) port: These ports have replaced
Transfer rate: Or transfer speed, is the speed at which serial and parallel ports. They are faster, and one USB port can
modems transmit data, typically measured in bits per be used to connect several devices to the system unit.
second (bps).
UNIX: An operating system originally developed for midrange
Transmission control protocol/Internet protocol (TCP/IP):  computers. It is now important because it can run on many of
TCP/IP is the standard protocol for the Internet. The essential the more powerful personal computers.
features of this protocol involve (1) identifying sending and
receiving devices and (2) reformatting information for transmis- Uplink: To send data to a satellite.
sion across the Internet.
Uploading: Process of transferring information from the
Tree network: Also known as a hierarchical network. A topol- ­computer the user is operating to a remote computer.
ogy in which each device is connected to a central node, either
directly or through one or more other devices. The central node USB drive: The size of a key chain, these hard drives connect
is then connected to two or more subordinate nodes that in to a computer’s USB port enabling a transfer of files.
turn are connected to other subordinate nodes, and so forth,
forming a treelike structure. User: Any individual who uses a computer. See also End user.

Trojan horse: Program that is not a virus but is a carrier of User interface: Means by which users interact with applica-
virus(es). The most common Trojan horses appear as free com- tion programs and hardware. A window is displayed with infor-
puter games, screen savers, or antivirus programs. Once down- mation for the user to enter or choose, and that is how users
loaded they locate and disable existing virus protection and communicate with the program.
then deposit the virus.
Utility: Performs specific tasks related to managing computer
Troubleshooting program: A utility program that recognizes resources or files. Norton Utility for virus control and system
and corrects computer-related problems before they become maintenance is a good example of a utility. Also known as ser-
serious. Also called diagnostic program. vice programs.

Tweet: A twitter message. Utility suite: A program that combines several utilities in one
package to improve system performance.
Twisted-pair cable: Cable consisting of pairs of copper wire
that are twisted together. v

Twitter: The most popular microblogging site that enables you Vector illustration: See Vector image.
to add new content from your browser, instant messaging appli-
cation, or even a mobile phone. Vector image: Graphics file made up of a collection of objects
such as lines, rectangles, and ovals. Vector images are more
Two-in-one laptop: Laptop that includes a touch screen and flexible than bitmaps because they are defined by mathemati-
the ability to fold flat like a tablet computer. It offers the advan- cal equations so they can be stretched and resized. Illustration
tages of a laptop with the convenience of a tablet. programs create and manipulate vector graphics. Also known
as vector illustrations.
u
Very high level languages: Task-oriented languages that
Ultra-high-definition television (UHDTV): Delivers a much require little special training on the part of the user.
clearer and more detailed wide-screen picture than regular
HDTV. VGA (Video Graphic Adapter) port: A type of port that pro-
vides a connection to an analog monitor.
Ultrabook: A very portable laptop that is lighter and thinner
with a longer battery life than other laptops. Video editor: Program for editing videos to enhance their
quality and appearance.
Ultraportable: See Ultrabook.

376 GLOSSARY

Video game design software: Program for organizing and pro- Web 1.0: The first generation of the web, which focused on
viding guidance for the entire game design process, including linking existing information.
character development and environmental design.
Web 2.0: The second generation of the web, which evolved to
Videoconferencing system: Computer system that allows support more dynamic content creation and social interaction.
people located at various geographic locations to have in-person
meetings. Web 3.0: The third generation of the web, which focuses on
computer-generated information requiring less human interac-
Virtual keyboard: Displays an image of a keyboard on a tion to locate and to integrate information.
touch-screen device. The screen functions as the actual input
device, which is why the keyboard is considered virtual. Web auction: Similar to traditional auctions except that all
transactions occur over the web; buyers and sellers seldom meet
Virtual machine: A software implementation of a computer face to face.
that executes programs like a physical computer.
Web authoring: Creating a website.
Virtual memory: Feature of an operating system that
increases the amount of memory available to run programs. Web authoring program: Word processing program for gen-
With large programs, parts are stored on a secondary device erating web pages. Also called HTML editor or web page editor.
like your hard disk. Then each part is read in RAM only when Widely used web authoring programs include Adobe Dream-
needed. weaver and Microsoft FrontPage.

Virtual private network (VPN): Creates a secure private con- Web-based e-mail system: An e-mail system that does not
nection between a remote user and an organization’s internal require an e-mail program to be installed on your computer.
network. Special VPN protocols create the equivalent of a
dedicated line between a user’s home or laptop computer and a Web-based file transfer services: A type of file transfer ser-
company server. vice that uses a web browser to upload and download files,
allowing you to copy files to and from your computer across the
Virtual reality (VR): Interactive sensory equipment (head- Internet.
mounted display and controller) allowing users to experience
alternative realities generated in 3D by a computer, thus imitat- Web bug: Program hidden in the HTML code for a web page
ing the physical world. or e-mail message as a graphical image. Web bugs can migrate
whenever a user visits a website containing a web bug or opens
Virtual reality controller: A device that provides input to a infected e-mail. They collect information on the users and
virtual reality environment about a user’s hand movements. report back to a predefined server.

Virtualization: A process that allows a single physical com- Web log: A type of personal website where articles are regu-
puter to support multiple operating systems that operate larly posted.
independently.
Web page: Browsers interpret HTML documents to display
Virtualization software: Software that creates virtual web pages.
machines.
Web page editor: See Web authoring program.
Virus: Hidden instructions that migrate through networks
and operating systems and become embedded in different Web suffix: Identifies type of organization in a URL.
programs. They may be designed to destroy data or simply to
display messages. Web utilities: Specialized utility programs making the Inter-
net and the web easier and safer. Some examples are plug-ins
Voice recognition system: Using a microphone, sound card, that operate as part of a browser and filters that block access
and specialty software, the user can operate a computer and and monitor use of selected websites.
create documents using voice commands.
Webcam: Specialized digital video camera for capturing
Voiceband: Bandwidth of a standard telephone line. Also images and broadcasting to the Internet.
known as low bandwidth.
Webcast: An Internet delivery medium that uses streaming
VR: See Virtual reality. technology, in which audio and video files are continuously
downloaded to a computer while the user is listening to and/or
w viewing the file content.

WAN: See Wide area network. Webmail: E-mail that uses a webmail client.

Wand reader: Special-purpose handheld device used to read Webmail client: A special program that runs on an e-mail pro-
OCR characters. vider’s computer that supports webmail.

Warm boot: Restarting your computer while the computer is Webmaster: Develops and maintains websites and web
already on and the power is not turned off. resources.

Wearable device: A type of mobile computer such as Apple’s Wheel button: Some mice have a wheel button that can be
Watch that contains an embedded computer chip. Also known rotated to scroll through information displayed on the monitor.
as a wearable device.
Wide area network (WAN): Countrywide and worldwide
Web: Prior to the introduction of the web in 1992, the Inter- networks that use microwave relays and satellites to reach users
net was all text. The web made it possible to provide a multi- over long distances.
media interface that includes graphics, animations, sound, and
video. Wi-Fi (wireless fidelity): Wireless standard also known as
802.11, used to connect computers to each other and to the
Internet.

Wiki: A website that allows people to fill in missing informa-
tion or correct inaccuracies on it by directly editing the pages.

GLOSSARY 377

Wikipedia: An online encyclopedia, written and edited by Wireless network card: Allows computers to be connected
anyone who wants to contribute. without cables.

WiMax (Worldwide Interoperability for Microwave Wireless network encryption: Restricts access to authorized
Access): Technology that extends Wi-Fi networks to operate users on wireless networks.
over greater distances.
Wireless revolution: A revolution that is expected to dra-
Window: A rectangular area containing a document or matically affect the way we communicate and use computer
message. technology.

Windows: An operating environment extending the capabil- Wireless wide area network (WWAN) modem: See Wireless
ity of DOS. modem.

Windows Mobile 10: A mobile operating system introduced Word: The number of bits (such as 16, 32, or 64) that can be
in 2015 to replace Windows 8. It is able to run many powerful accessed at one time by the CPU.
programs designed for desktop and laptop computers.
Word processor: The computer and the program that allow
Windows 10: OS from 2015 that merged Windows’ desktop you to create, edit, save, and print documents composed of text.
and mobile operating systems. It introduced Cortana, a digital
assistant that can accept commands through text or speech. Worksheet file: Created by electronic spreadsheets to analyze
things like budgets and to predict sales.
Windows RT: A version of Windows 8 designed to run with
tablets using a particular microprocessor from ARM. Worm: Virus that doesn’t attach itself to programs and data-
bases but fills a computer system with self-replicating informa-
Wireless access point: Or base station. The receiver interprets tion, clogging the system so that its operations are slowed or
incoming radio frequencies from a wireless LAN and routes stopped.
communications to the appropriate devices, which could be
separate computers, a shared printer, or a modem. WPA2 (Wi-Fi Protected Access): A secure encryption
protocol.
Wireless charging platform: Recharging device for laptops,
tablets, and wearable computers that does not require a con- Write-once: See Recordable.
necting cable.
WWW (World Wide Web): Provides a multimedia interface
Wireless communication: The revolutionary way we now to the Internet. Also known as the web.
communicate on devices like tablets, smartphones, and wear-
able devices. WYSIWYG (what you see is what you get) editors: Web
authoring programs that build a page without requiring direct
Wireless LAN (WLAN): Uses radio frequencies to connect interaction with the HTML code and then preview the page
computers and other devices. All communications pass through described by the HTML code.
the network’s centrally located wireless receiver or base station
and are routed to the appropriate devices. z

Wireless modem: Typically a small plug-in USB or Express- Zombie: A computer infected by a virus, worm, or Trojan
Card device that provides very portable high-speed connectivity horse that allows it to be remotely controlled for malicious
from virtually anywhere. purposes.

Wireless mouse: See Cordless mouse.

378 GLOSSARY

Subject Index

1G. See First Generation Android, 88, 100
2G. See Second Generation Android iOS, 88
32-bit-word computer, 115 Anonymity
3D printers, 145, 156
3D scanner, 138, 155 end of, 232
3G. See Third-generation mobile telecommunications illusion of, 217, 233
3GLs. See Third-generation languages Anticipating disasters, 224, 226, 228
4G. See Fourth Generation Antispyware, 220, 233
4GLs. See Fourth-generation languages Antivirus programs, 91
5G. See Fifth Generation App stores, 69–70, 77
5GL. See Fifth-generation language Apple, 171
64-bit-word computer, 115 Apple App Store, 69, 70, 77
802.11ac 2.6, 189 Apple FileMaker, 64
802.11ax, 189 Apple Health App, 43, 49
802.11g, 189 Apple iMac, 108
802.11n 600, 189 Apple iMovie, 66, 87
Apple iPhone, 31
a Apple iTunes Music Store, 230
Apple iWork, 70, 72, 73
AC. See Alternating current Apple Keynote, 63, 76
AC adapters, 121, 127 Apple Mail, 37
Access, 215, 233 Apple Numbers, 61, 75
Apple Pages, 58, 75
data dictionary form, 270, 271 Apple Safari, 30
data entry form, 271 Apple Siri, 89, 92
restricting, 228 Apple Watch, 11
speed, 165, 171, 177 Application generators, 332
Accounting, 245, 258 Application generation subsystem, 270, 282
applications, 68 Application programs, 314
area, 249 Application software, 8, 18, 56, 75. See also System
TPS for, 249
Accounts payable, 250, 259 software
Accounts receivable, 250, 259 careers in IT, 71, 77
Accuracy, 40, 48, 215, 233 common features, 58, 75
ACI. See Autonomic computing initiative general-purpose applications, 58–64
Active display area, 142, 156 mobile apps, 68–70
Activity trackers, 112 software suites, 70–71
Ad-Aware, 220 specialized applications, 65–68
Additive manufacturing. See 3D printers user interface, 56–57
Addresses, 31, 37, 48 VR and AR applications in workplace, 74
Adobe Dreamweaver, 67 working together online, 72–73
Adobe Illustrator, 66 Apps, 8, 18, 68–69, 77
Adobe InDesign, 65 AR. See Augmented reality
Adobe Photoshop, 65 Arithmetic operations, 114
Adobe Premier, 66 Arithmetic-logic unit (ALU), 114, 126
ADSL. See Asymmetric digital subscriber line ARPANET. See Advanced Research Project Agency Network
Advance fee loans, 222 ASCII. See American Standard Code for Information
Advanced Research Project Agency Network (ARPANET), 26, 46
Age of Connectivity, 349 Interchange
Agile development, 327–328, 338 Aspect ratio, 142, 156
Aldebaran Robotics, 334 Assembly languages. See Second generation
Alignment, 58 Asymmetric digital subscriber line (ADSL), 191, 206
All-in-one computers, 108, 109 Attachments, 37, 48
Alternating current (AC), 121 Attributes, 267, 275, 281, 283
ALU. See Arithmetic-logic unit Auction fraud, 222
Amazon, 42, 70, 77, 171 Audio-input devices, 140
Amazon’s Alexa, 93 Audio-output devices, 146, 155, 157
Amazon’s Price Check app, 68 Augmented reality (AR), 74, 111, 148
American Standard Code for Information Interchange (ASCII), 123, 127, Authority, 40, 48
Automated design tools, 295
165, 345 Automatic teller machines, 250
Analog, 122, 127 Autonomic computing, 98
Autonomic computing initiative (ACI), 98
signals, 190 AVG, 9

379

b Casual gaming, 110
CDs. See Compact discs
B2B commerce. See Business-to-business commerce Cell towers, 189
B2C commerce. See Business-to-consumer commerce Cells, 189
Backbone, 200, 207 Cellular, 189, 205
Background, 86, 99
Backups, 227 service providers, 191, 206
Censorship, 27
programs, 91, 101 Central processing unit (CPU), 114, 125, 164
Balance sheets, 250 CEO. See Chief executive officer
Bandwidth, 194, 206 Channels
Bar codes, 138, 155
communication, 188
readers, 138–139, 155 physical connections, 188, 205
Base station, 198 wireless connections, 189–190, 205
Baseband, 194, 206 Character, 139, 155, 267, 281
Basic input/output system (BIOS), 117 effects, 58
Batch processing, 268, 281 encoding, 122–123, 127
BD. See Blu-ray discs encoding standards, 123
Beta testing, 325, 337 Chief executive officer (CEO), 247
Big data, 215, 233 Child nodes, 272, 282
Binary system, 122 Chip cards, 138, 155
Bing, 39, 48 Chips, 113, 125, 343, 346
Biometric scanning, 234 carriers, 113, 114
Circle with Disney, 32
devices, 224–225 Cisco TelePresence, 204
BIOS. See Basic input/output system Clarity, 141, 156
Bit, 122 Classes, 275, 283
Bitcoin, 42, 49 Client-based e-mail systems, 37, 48
Bitmap, 65 Client/server networks, 201, 201, 207
BitTorrent, 33, 47 Clients, 43, 49, 195, 206
Blogs, 35, 47, 67 Clock speed, 115, 126
Blu-ray discs (BD), 12, 18, 170, 179 Cloud computing, 15, 19, 42–43, 49, 70, 170–171, 179
Bluetooth, 146, 157, 189, 198, 205 Cloud printers, 145–146, 156
Booting system, 86, 99 Cloud storage, 6, 170, 172–173, 179, 193. See also Solid-state storage
Botnet, 223, 234 Google Drive Docs, 171
Brain–computer interfaces, 124 services, 171
Broadband, 194, 206 Cloud suites, 70, 77
Browser cache. See Temporary Internet files Coaxial cable, 188, 205
Browsers, 30–31, 46 COBOL. See Common Business Oriented Language
Bus. See Bus lines Code review. See Desk checking
Bus lines, 108, 114, 118, 125, 126, 200, 207 Coding, 322, 336
Cold boot, 86
expansion buses, 118–119 Color, 144
Bus network, 200, 207 .com, 31
Bus width, 118 Combination input and output devices, 146, 157
Business directories, 278 drones, 147, 147
Business statistical information, 278 headsets, 146, 146
Business-to-business commerce (B2B commerce), 41, 49 MFD, 147
Business-to-consumer commerce (B2C commerce), 41, 49 robots, 150
Buttons, 56, 75 Combination keys, 135, 154
Commercial database, 277, 278, 283
c Common Business Oriented Language (COBOL), 345
Common data item, 273, 282
C#, 323 Communication(s), 27, 34, 46, 47, 186, 205
C++, 323, 331 blogs, 35
channels, 188–190, 205
code, 322, 323 computer, 186
C2C commerce. See Consumer-to-consumer commerce connection devices, 190–191, 206
Cables, 30, 46, 108, 120, 127 connectivity, 186, 205
data transmission, 194–195, 206
coaxial, 188, 205 devices, 12, 18
fiber-optic, 188, 205 E-mail, 37–38
modem, 190, 206 electronic monitoring, 211
service, 191, 206 GPS, 211
Cache memory, 116, 126 Internet, 34
CAD/CAM systems. See Computer-aided design/computer-aided links, 244
messaging, 38–39
manufacturing systems microblogs, 35
Capacity, 165, 177 Mobile Office, 192–193, 211
Cards, 108 network administrators, 203, 207
and networks, 185, 186
chip, 138, 155
readers, 138, 155
Carpal tunnel syndrome, 151, 157
Cascading style sheets (CSS), 31, 46, 67
CASE tools. See Computer-aided software engineering tools

380 SUBJECT INDEX

networks, 195–197, 199–201, 206, 207 Cordless mouse, 136, 154
organizational networks, 201–203, 207 Corel PaintShop Pro, 65
podcasts, 36 CorelDRAW, 66
social networking, 34–35 CorelDRAW Graphics Suite X6, 70
systems, 187–188, 205 Cortana, 100
telepresence, 204 CPU. See Central processing unit
unauthorized network intrusion, 211 Crackers, 223, 234
webcasts, 36 Credit card, 41, 49
wikis, 36 Credit card fraud, 41
wireless revolution, 187, 205 Crime databases, 280
Compact discs (CDs), 12, 18, 169, 170, 179 CryEngine SD, 67
Company database, 276, 283 Cryptoprocessors, 115, 131
Company database, 278 CSS. See Cascading style sheets
Compatibility, 111 Currency, 40, 48
Compiler, 331 Cyberbullying, 230, 235
“Compute time” flowchart, 321 Cybercrime, 234
Computer age, evolution of, 343 Cylinder, 165, 177
Computer Buyer’s Guide, 354
desktops, 355 d
laptop computers, 354
Smartphones, 354 Dark web, 239
tablets, 354–355 Data, 4, 13, 17, 19, 252, 259, 266, 281
“Computer Class”, 87
Computer Fraud and Abuse Act, 224, 234 administration subsystem, 271, 282
Computer security, 221, 234. See also Security banks. See Commercial database
anticipating disasters, 226 cube, 274, 283
encrypting data, 225–226 definition subsystem, 270, 282
measures to protecting, 224, 228, 234 dictionary, 270
preventing data loss, 227–228 encryption, 225–226, 228
restricting access, 224–225 integrity, 269, 270
Computer-aided design/computer-aided manufacturing systems (CAD/CAM loss prevention, 227–228
maintenance, 270
systems), 255, 256, 259 mining, 278, 283
Computer-aided software engineering tools (CASE tools), 295, 328, 329, 338 redundancy, 269
Computer-based information systems, 248–249. See also Information systems security, 226
Computer(s), 10, 108, 186 storage, 164
warehouse, 278
communications, 186 workers, 255, 259
crime. See Cybercrime Data flow
desktop, 11, 11, 18, 356–357 diagram symbols, 295, 296
ethics, 228, 235. See also Ethics diagrams, 295, 296
hackers, 221 Data manipulation, 222, 234
monitoring software, 219–220, 233 subsystem, 270, 282
networks, 195, 196, 201, 206 Data organization, 267, 281
support specialists, 15, 19, 97, 101 batch processing, 268, 268
technicians, 15, 19, 123, 127 key field, 268
types of, 10–11 logical, 267
viruses, 38, 101 real-time processing, 269, 269
Conceptualization, 275 Data processing systems (DPSs). See Transaction processing systems (TPSs)
Confidentiality, 183. See also Privacy Data transmission, 194, 206
Connected Generation, 343 bandwidth, 194, 206
Connection protocols, 194–195, 206
service, 190–191 specifications, 188
technologies, 30, 46 Database administrators (DBAs), 271, 279, 282
Connection devices, 187, 188, 190, 206. See also Mass storage devices Database management system (DBMS), 8, 64, 76, 251, 270, 282
connection service, 190–191, 206 access data dictionary form, 270, 271
modems, 190, 206 access data entry form, 271, 271
Connectivity, 4, 14–15, 19, 186, 205 department of motor vehicles, 274
Console gaming, 110 engine, 270, 282
Consumer-to-consumer commerce (C2C commerce), 41, 49 hierarchical database, 272–273
Content evaluation, 40, 48 multidimensional database, 274–275
Contextual tabs, 57, 75 network database, 273, 273
Contrast ratios, 142, 156 object-oriented database, 275, 275
Control, 246 organization, 275, 276
unit, 114, 126 relational database, 273–274
Conversation monitoring, 105 structure, 272–276
Conversion. See Systems implementation Databases, 64, 64, 76, 244, 268, 269, 281, 282, 283
Cookies, 218, 233 commercial database, 277
blocking, 219 company database, 276
Copper lines, 190 data organization, 267–269
Coprocessors, 115
Copyright, 228–230, 235

SUBJECT INDEX 381

Databases (Continued) Display screens. See Monitors
DBMS, 270–271 Distributed database, 276–277, 283
DBMS structure, 272–276 Distributed database, 278
distributed database, 276–277 Distributed denial of service (DDoS), 222, 234
files, 13, 19 DNA, 176
individual database, 276 DNS. See Domain name server
manager, 64, 76 Documentation, 315, 326
model, 272 Documents, 58, 87
need for, 270
security, 278–279 creation, 65
strategic uses, 278–279 files, 13, 19
types, 276–278 scanner, 138, 155
uses and issues, 278–279, 283 Domain name, 31
Domain name server (DNS), 194
DBAs. See Database administrators converting text-based addresses to numeric IP addresses, 195
DBMS. See Database management system DoS attack. See Denial of service attack
DC. See Direct current Dot (pixel) pitch, 142, 156
DDoS. See Distributed denial of service dots per inch (dpi), 144, 156
Debts, 250 Double-sided discs. See Optical discs
Debugging, 324, 337 Dow Jones Factiva, 277
DEC. See Digital Equipment Corporation Downlink, 189
Decision making, 244, 246 Downloading, 32
Decision models, 252, 259 dpi. See dots per inch
Decision support system (DSS), 248, 249, 252–255, 259 Drawing programs. See Illustration programs
Demand report, 251, 259 DRM. See Digital rights management
Demodulation, 190 Drones, 147, 157, 215, 239
Demographic data, 278 Dropbox, 171
Denial of service attack (DoS attack), 222, 234 DS3 lines. See T3 lines
Density, 165, 177 DSL modem. See Digital subscriber line modem
Department of Defense, 189 DSS. See Decision support system
Desired output, end user’s sketch of, 316, 317 Dual in-line memory module (DIMM), 116, 126
Desk checking, 324, 337 Duckduckgo, 39, 48
Desktop operating systems, 8, 18, 87, 89, 99, 100. See Stand-alone Duplex printing, 144, 156
DVDs. See Digital versatile discs
operating systems DVI ports. See Digital Video Interface ports
macOS, 89–90, 100
UNIX and Linux, 90, 101 e
virtualization, 90–91, 101
Windows, 89, 100 E-books. See Electronic books
Desktop(s), 86, 86, 99, 108, 125, 355 E-commerce. See Electronic commerce
computers, 11, 18, 356–357 E-ink, 142, 156
publishing programs, 65, 76 E-learning, 27, 46
Device drivers, 84, 99 E-mail. See Electronic mail
Diagnostic programs, 91 E-readers. See Electronic-book readers
Dial-up services, 191, 206 eBay, 41
Dialog boxes, 56, 75, 87 EBCDIC. See Extended Binary Coded Decimal Interchange Code
Dictionary attacks, 224, 234 Eckert Jr, Resper J., 344
Digital cameras, 140, 155 Economic feasibility, 296, 305
Digital cash, 41–42, 49 .edu, 31
providers, 42 Education, 27, 46
Digital electronic signals, 127 Electronic books (E-books), 142, 156
Digital Equipment Corporation (DEC), 346 Electronic commerce (E-commerce), 40, 49, 186
Digital Millennium Copyright Act, 230, 235
Digital news, 35 security, 41–42
Digital paper, 81 Electronic data and instructions, 122
Digital pens, 109
Digital projectors, 143, 156 character encoding, 122–123
Digital rights management (DRM), 228–230, 235 numeric representation, 122
Digital signals, 190 Electronic mail (E-mail), 37–38, 48, 186
Digital subscriber line modem (DSL modem), 30, 46, 190, 206 client, 37
Digital versatile discs (DVDs), 12, 18, 169, 170, 179 encryption, 226, 227
Digital video discs. See Digital versatile discs (DVDs) Electronic Numerical Integrator and Computer (ENIAC), 344
Digital Video Interface ports (DVI ports), 120, 127 Electronic profiles, 215, 233
Digital whiteboards, 143, 156 Electronic Recording Machine Accounting (ERMA), 345
DIMM. See Dual in-line memory module Electronic-book readers (E-readers), 142, 143, 156
Direct approach, 299, 306 Embedded operating systems, 8, 18, 87, 99
Direct current (DC), 121 Employee-monitoring software, 217, 233
Directory server, 196, 206 Encryption, 225, 234, 239–240
Disaster recovery plans, 226 key, 226, 234
Disk caching, 166, 167, 178 End users, 4, 17
Disk Cleanup utility, 95, 101 ENIAC. See Electronic Numerical Integrator and Computer
Disk surface, 166 Enterprise storage system, 174–175, 179
Display, 11, 18 Entertainment, 46

382 SUBJECT INDEX

Entity, 267, 281 security, 171
Environment, 7, 114, 228, 240 servers, 175, 179
transfer utilities, 32, 33, 47
ethics and IT, 240 types, 13
GPS, 211 Filters, 32, 33, 47
recycling computer hardware, 131 Final Fantasy game, 69
Equity, 250 Financial planning suites, 70
Ergonomic(s), 150, 157 Fingerprint, 224–225
keyboard, 151 FiOS. See Fiber-optic service
physical problems, 150 Firewalls, 202, 207, 225, 234, 279, 283
portable computers, 152 FireWire buses, 119, 126
recommendations, 151 FireWire ports, 120, 127
ERMA. See Electronic Recording Machine Accounting First Generation (1G), 330, 343, 344
eSATA ports. See External Serial Advanced Technology Attachment ports mobile telecommunications, 191, 206
ESSs. See Executive support systems First-party cookie, 218
Ethernet, 197. See also Local area networks (LANs) Fitbit, 43, 49
cables, 188, 205 Flash, 117
ports, 120, 127 Flash drives. See Universal serial bus (USB)—drives
Ethics, 7, 16, 27, 108, 188, 214, 220, 228, 235, 239 Flash memory, 116–117, 126, 168, 176
copyright, 228–230, 235 cards, 168, 169, 178
cyberbullying, 230, 235 Flat-panel monitors, 142, 142, 156
DRM, 228–230, 235 Flatbed scanner, 138, 155
electronic monitoring, 211 Flowcharts, 319, 321, 336
encryption, 239–240 for “Compute time on Client A jobs”, 320
end of anonymity, 232 symbols, 319
IT security analysts, 231 Flyer creation, 59, 59
job loss and working conditions, 131 Folder, 87, 99
net neutrality, 240 Foreground, 86, 99
plagiarism, 230–231, 235, 240 FORmula TRANslator (FORTRAN), 344
Exception reports, 251, 259 Fourth Generation (4G), 343, 347
Executive information system (EIS). See Executive support system (ESS) mobile telecommunications, 191, 206
Executive support systems (ESSs), 248, 249, 253–254, 255, 259, 263 Fourth-generation languages (4GLs), 331–332
Expansion buses, 118–119, 126 Free antivirus program, 6, 9
Expansion cards, 117–118, 126 Free online videos, 68
Expansion slots, 108, 117–118, 126 Free webmail service providers, 38
Expert systems, 255, 256, 259 Freedom of Information Act, 217, 233
Extended Binary Coded Decimal Interchange Code (EBCDIC), 123, 127, 165 Friends, 34, 38, 47, 110
External data, 252, 259 FTP. See File transfer protocol
External hard drives, 166, 178 Functions, 85–86, 99
External Serial Advanced Technology Attachment ports (eSATA ports),
g
120, 127
Extranets, 202, 207 Galleries, 58, 75
Eye scanners. See Iris scanners Game controllers, 136, 137, 154
Eyestrain, 150 Gamepads, 136, 154
Games, 110
f Games app, 69
Gaming, 6, 110–111, 131
Facebook, 26, 27, 35, 47, 217
mobile app, 68 console, 110
profile, 34 laptops, 109, 125
mice, 136
Facebook Messenger, 39 Gbps, 190
Facial recognition, 225, 234 GDSS. See Group decision support systems
Fake antivirus software, 222 General ledger, 250, 259
Family Educational Rights and Privacy Act (FERPA), 221, 233 General-purpose applications, 8, 18, 56, 58, 75–76
Femtosecond, 115 DBMS, 64
FERPA. See Family Educational Rights and Privacy Act presentation software, 63
Fiber-optic cable, 188, 205 programs, 70
Fiber-optic service (FiOS), 191, 206 software, 56
Field, 267, 281 spreadsheets, 61–62
Fifth Generation (5G), 343, 349 word processors, 58
Gesture control, 87, 99
mobile telecommunications, 191, 206 GIMP. See GNU Image Manipulation Program
Fifth-generation language (5GL), 332 Global positioning system (GPS), 189, 205, 211
File compression, 167, 178 environment, 190
navigation, 189
programs, 91, 101 GNU Image Manipulation Program (GIMP), 65
File decompression, 167 Goodwill, 41
File transfer, 33 Google, 39, 40, 42, 48, 171
File transfer protocol (FTP), 33, 47 Google Assistant, 26, 89
File(s), 87, 99

decompression, 167, 178
encryption, 226, 227
History utility, 94, 101

SUBJECT INDEX 383

Google Chrome OS, 30, 90, 101, 218 High-frequency transmission cable, 188
Google Cloud Print, 145, 156 High-level procedural languages, 330–331
Google Docs, 58, 70, 72, 73, 75 High-speed Internet wireless technology, 187
Google Drive, 72 Higher level languages, 330
Google Drive Apps, 43, 43 HIPAA. See Health Insurance Portability and Accountability Act
Google Drive Docs, 171, 171 History files, 218, 233
Google Glass, 148 Home network, 199
Google Hangouts, 39 Home networks, 197, 206
Google Now, 140, 155 Hopper, Grace, 344
Google Play, 69, 70, 77 Host, 196, 206
Google Search engine, 26
Google Sheets, 61, 75 operating system, 91, 101
Google Slides, 63, 76 Hotspots, 198
Google Street View, 216 HTML. See Hypertext Markup Language
Google Translate, 7, 140, 149 https. See Hypertext transfer protocol secure
Google Wallet, 41 Hub, 196, 206
Google+, 26, 35, 38, 53 Human resources, 245, 258
.gov, 31 Hyperlinks, 31, 46
GPS. See Global positioning system Hypertext Markup Language (HTML), 31, 46, 67, 76
Gramm-Leach-Bliley Act, 221, 233
Graphical user interface (GUI), 56, 75, 85, 99 editors, 67
Graphics, 65–66 Hypertext transfer protocol secure (https), 31, 194, 206, 226, 234

cards, 117, 126 i
coprocessor, 115, 126
programs, 76 IBM, 42, 98, 344, 346, 348
suites, 70 Blue Gene supercomputer, 10
Graphics processing unit (GPU). See Graphics—coprocessor Watson, 257
Grayscale, 144, 156
Grid charts, 295, 305 Icons, 56, 86, 99
Group decision support systems (GDSS), 253, 259 Identification, 194–195
Groups, 34, 47 Identity theft, 221, 222, 234, 263
Guest operating system, 91, 101 IDS. See Intrusion detection systems
GUI. See Graphical user interface IF-THEN-ELSE structure. See Selection logic structure
IFPS. See Interactive financial planning system
h Illusion of anonymity, 217, 233
Illustration programs, 66, 76
HAMR. See Heat-assisted magnetic recording IM. See Instant messaging
Handwriting recognition software, 137, 154 Image capturing devices, 139–140
Haptic technology, 204 Image editing, 81
Hard disks, 12, 18, 165, 177
software, 66
drives, 113 Image editors, 65, 76
external hard drives, 166, 178 Immersive experience, 147
internal hard disk, 166, 177 Incognito Mode, 218
performance enhancements, 166–167, 178 Income statements, 250
Hardware, 4, 10, 16, 17 Individual database, 276, 283
personal computer hardware, 11–12 Individual database, 278
types of computers, 10–11 Indy games, 111
HD 720, 142 Infected USB flash drives, 224, 234
HD 1080, 142 Information, 4, 17
HDMI ports. See High Definition Multimedia Interface ports
Head crash, 166, 177 brokers, 215, 233
Head-mounted displays, 148–149 flow, 247, 258
Headache, 150 resellers, 215, 216, 233
Header, 37, 48 utilities. See Commercial database
Headphones, 146, 157 workers, 255, 259
Headsets, 146, 157 Information systems, 4–5, 17, 244, 254, 259, 290
Health Insurance Portability and Accountability Act (HIPAA), 221, 233 computer-based information systems, 248–249
HealthWise, 247 DSS, 252–253, 259
Group, 244, 246 ESSs, 253–254, 259, 263
monthly sales and production reports, 251 expert systems, 256
Heat-assisted magnetic recording (HAMR), 176 IBM’s Watson, 257
Help, 87, 99 managers, 256
Hexadecimal system (hex), 122 MIS, 251, 259
hi-def. See High-definition organizational information flow, 244–248, 258
Hidden costs, 111 TPS, 249–250, 259
Hierarchical database, 272–273, 282 Information technology (IT), 7, 17
Hierarchical network. See Tree network connectivity and mobile Internet, 14–15
Hierarchical organization, 276 data, 13
High Definition Multimedia Interface ports (HDMI ports), 120, 127 environmental ethics and, 240
High-definition (hi-def), 170, 179 free antivirus program, 9
future trends, 16
384 SUBJECT INDEX hardware, 10–13
information systems, 4–5

people, 6–7 JavaScript, 31, 46, 323
software, 7–8 Joysticks, 136, 154
Infrared, 190, 205
Inkjet printers, 145, 145, 156 k
Inkscape, 66
Input, 134, 154. See also Output Kaspersky Anti-Virus, 220
audio-input devices, 140 Key, 226
character and mark recognition devices, 139 Key field, 268, 281
data, 316, 317 Keyboard, 11, 18, 134, 135, 154
devices, 11, 18, 108, 110
devices, 134, 154 attachments, 109
image capturing devices, 139–140 entry, 134–135
keyboard entry, 134–135 Keyloggers, 220, 233
pointing devices, 136–137 Knowledge base, 256, 259
RFID reader, 139 Knowledge work systems (KWSs), 255, 259
scanning devices, 137–139 Knowledge workers, 255, 259
Instagram, 35 Knowledge-based systems. See Expert systems
Instant messaging (IM), 38, 48
Integrated circuit (IC). See Chips l
Integrated Circuit Age, 346
Intelsat. See International Telecommunications Satellite Consortium Lands, 169, 179
Interactive financial planning system (IFPS), 331 Language translators, 84, 99
Interactive whiteboards. See Digital whiteboards LANs. See Local area networks
Internal data, 252, 259 Laptops, 108–109, 125, 152, 355
Internal hard disk, 166, 177
International Telecommunications Satellite Consortium (Intelsat), 189 computers, 11, 18, 354
Internet, 4, 12, 14, 16, 17, 26, 32, 43, 49, 170–171, 186, 217–220, keyboards, 135, 154
Large databases, 215–217
233, 244 Large-scale integration (LSI), 347
access, 30, 46 Laser printers, 145, 156
browser Safari, 90 Laws on privacy, 221, 233
browsers, 30–31 LCD. See Liquid crystal display
cloud computing, 42–43 LED. See Light-emitting diode
communication, 34–39 Less data redundancy, 270
computer taking wheel, 45 LexisNexis, 277
e-commerce, 40–42 Light-emitting diode (LED), 142, 156
internet access, 30 Line-of-sight communication, 189, 190
IoT, 43 LinkedIn, 35, 47
online entertainment, 28–29 Links, 31, 46
providers, 30 Linux, 87, 90, 101, 201
scams, 222, 234 Liquid crystal display (LCD), 142, 156
search tools, 39–40 Local area networks (LANs), 197, 198, 199,
security suite, 33, 47
technologies, 201–202, 207 206, 347
and web, 26–27, 46 adapter, 196
Internet of Things (IoT), 15, 19, 43, 49, 112, 153 Location, 31
Internet protocol address (IP address), 194, 206, 217 from GPS-enabled smartphones, 215
Internet scam, 222 Logic errors, 324, 337
Internet security suite, 33 Logic structures, 321, 336
Internet service providers (ISPs), 30, 38, 190, 222 Logical operations, 114
Interpreter, 331 Logical view, 266
Intranet, 201–202, 207 Long Term Evolution (LTE), 191, 206
Intrusion detection systems (IDS), 203, 207 Long-range planning, 246
Intuit QuickBooks, 68 Loop. See Repetition logic structure
Inventory, 250, 259 Low bandwidth. See Voiceband
control systems, 250 LSI. See Large-scale integration
iOS. See iPhone OS LTE. See Long Term Evolution
IoT. See Internet of Things
IP address. See Internet protocol address m
iPhone OS (iOS), 88, 100
iPod, 36 Mac operating systems, 167
Iris scanners, 224–225 Machine languages. See First generation
iRobot, 334 macOS, 8, 89–90, 100
ISPs. See Internet service providers macOS High Sierra, 90
IT. See Information technology macOS running Windows 10, 91
Iteration. See Repetition logic structure macOS Sierra, 89, 100
macOS X, 89, 100
j macOS X Server, 201
Magnetic card reader, 138, 155
Jacquard, Joseph Marie, 343 Magnetic disks, 165, 176
Java, 323 Magnetic storage methods, 176
Magnetic-ink character recognition (MICR), 139, 155

SUBJECT INDEX 385

Mainboard. See System board Microsoft Story Remix, 66
Mainframe computers, 10, 18 Microsoft Windows 10, 91, 225
Maintenance programmer, 327 Microsoft Windows operating systems, 56, 86
Malicious hardware, 234 Microsoft Word, 58
Malicious programs, 8, 223 Microsoft Xbox One, 110
Malicious software, 234 Microwave, 189, 205
Malware, 223, 234
MAN. See Metropolitan area network dish, 189
Management information system (MIS), 248, 249, 251, 254, 255, 259 transmissions, 190
Middle level management, 258
report, 251 Middle management, 246
Management levels, 246, 247, 258 Middle managers, 251
MANs. See Metropolitan area networks Middle-level managers, 247, 258
Manual testing, 325, 337 MIDI ports. See Musical instrument digital interface ports
Many-to-many relationship, 273, 282 Midrange computers, 10, 18
Mark recognition devices, 139, 155 .mil, 31
Marketing, 245, 258 Mini DisplayPort (MiniDP), 120, 127
Mass storage, 174, 179 Mini notebooks. See Ultrabooks
Mass storage devices, 174, 179. See also Connection devices Mini tablets, 109, 109, 125
MiniDP. See Mini DisplayPort
enterprise storage system, 174–175, 179 MIS. See Management information system
SAN, 175, 179 Mistaken identity, 217, 233
Mauchly, John W., 344 MLCs. See Multilevel cells
MaxiCode, 138, 155 MMS. See Multimedia messaging service
MB. See Megabytes Mobile
Mbps, 190 browsers, 31, 46
Mbps. See Megabits per second computers, 11
McAfee Family Protection, 32 computing, 185
McAfee’s Internet Security, 33 devices, 8
mDP. See Mini DisplayPort (MiniDP) gaming, 110
Media, 165, 177 hotspot device, 192
Media player, 36 OS, 88, 100
Medium band, 194, 206 tools, 73
Megabits, 190 Mobile applications (Mobile apps), 8, 18, 56, 68–70, 77
Megabits per second (Mbps), 190, 206 Mobile apps. See Mobile applications
Megabytes (MB), 169 Mobile Internet, 14–15, 19
Memory, 11, 18, 108, 116, 117, 126, 144 Mobile Office, 6
capacity, 116, 116 Modem. See Modulator-demodulator
flash memory, 116–117 Modulation, 190
RAM, 116 Modulator-demodulator (Modem), 12, 18, 190, 191, 206
ROM, 116 Modules, 318
Menu bar, 56, 75 Moneytree Software’s TOTAL Planning Suite, 70
Menus, 56, 75, 87, 99 Monitor, 11, 18
Mesh network, 200, 207 Monitoring content, 53
Message, 37, 48 Monitors, 141, 143, 156
Messaging, 38–39 e-readers, 142, 143
Methods, 275, 283 features, 141–142
Metropolitan area networks (MANs), 198–199, 206 flat-panel, 142, 142
MFD. See Multifunctional devices resolution, 142
MICR. See Magnetic-ink character recognition Motherboard. See System board
Microblogs, 35, 47 Motion-sensing devices, 136, 154
Microprocessor, 114, 126 Mouse, 11, 18, 136, 154
chips, 115, 126 optical, 136, 154
specialty processors, 115 pointer, 136, 154
Microprocessor Age, 347 Mozilla Firefox, 30
Microprocessors, 11, 18, 113, 126 Multicore processors, 115, 126
Microsecond, 115 Multidimensional data model, 274
Microsoft, 171 Multidimensional database, 274–275, 283
Microsoft Access, 64 Multidimensional organization, 276
Microsoft Cortana monitors, 93 Multifunctional devices (MFD), 147, 157
Microsoft Edge, 30 Multilevel cells (MLCs), 176
Microsoft Excel, 61, 75 Multimedia messaging service (MMS), 38
Microsoft Expression Web, 67 Multitasking, 86, 99
Microsoft HoloLens, 148, 148 Multitouch screens, 136, 136
Microsoft Office, 70 Music app, 68
Microsoft Office365, 70, 72, 72 Musical instrument digital interface ports (MIDI ports), 120, 127
Microsoft OneDrive, 173
Microsoft Outlook, 37 n
Microsoft Power Point, 63, 76
Microsoft Project, 68, 255 Nanosecond, 115
Microsoft Publisher, 65 Nao robots, 334
Microsoft search engine, 31

386 SUBJECT INDEX

NAS. See Network attached storage entertainment, 27, 28–29, 53
National Highway Traffic Safety Administration (NHTSA), 45 identity, 220, 233
Natural languages, 332 music, 28
Neck pain, 150 office suites, 6, 70, 81
Net Nanny, 32 processing. See Real-time processing
Net neutrality, 230, 240 registration systems, 250
.net, 31 storage. See Cloud storage
Netflix, 31, 68 OOP. See Object-oriented programming
Network, 14 Open source, 90, 101
OpenOffice, 70
administrator, 15, 19, 196, 206 OpenOffice Base, 64
architecture, 199–203, 207 OpenOffice Calc, 61, 75
communications and, 185, 186, 195, 206 OpenOffice Impress, 63, 76
computer network, 196, 206 OpenOffice Writer, 58, 75
database, 273, 273, 282 Operating systems (OS), 8, 18, 84, 85, 99
electronic monitoring, 211 categories, 87–88
gateway, 197 features, 86–87
GPS, 211 functions, 85–86
network administrators, 203, 207 power management, 105
organizational networks, 201–203, 207 Operational feasibility, 297, 305
server, 87, 99 Operational models, 253
strategies, 199 Operational support systems, 259
telepresence, 204 Operators, 326, 337
terms, 195–197 Optical carrier lines (OC lines), 190, 206
topology, 199 Optical discs, 12, 18, 169–170, 179
types, 197–199, 206 drive, 169, 179
unauthorized network intrusion, 211 Optical mouse, 136, 154
Network adapter cards. See Network interface cards (NIC) Optical scanners, 137–138, 155
Network attached storage (NAS), 175, 179 Optical-character recognition (OCR), 139, 155
Network interface cards (NIC), 117–118, 126, 196, 206 Optical-mark recognition (OMR), 139, 155
Network operating systems (NOS), 8, 18, 87, 99, 196, 206 .org, 31
Network organization, 276 Organic light-emitting diode (OLED), 142, 156
Neuromorphic chip, 98 Organization chart, 294, 305
News feeds, 29, 34, 47 Organizational cloud storage, 175, 179
Newspapers, 34 Organizational information flow, 244, 258
Next-generation storage, 176 functions, 244–246, 258
NHTSA. See National Highway Traffic Safety Administration information flow, 247, 258
NIC. See Network interface cards management levels, 246, 258
Nigerian Scam, 222 Organizational networks, 201, 207
Nintendo Switch, 110 Internet technologies, 201–202, 207
Nodes, 195, 206, 272, 282 network security, 202–203, 207
Norton AntiVirus, 91 Organizations, 16
Norton Internet Security Suite, 70 OS. See Operating systems
Norton Online Family, 32 Output, 141, 156. See also Input
Norton SystemWorks, 70 audio-output devices, 146
NOS. See Network operating systems devices, 11, 18, 108, 141, 156
Notebook computers. See Laptop computers monitors, 141–143
Numeric representation, 122, 127 printers, 144–146

o p

OASs. See Office automation systems P2P network. See Peer-to-peer network
Object code, 331 Packaged programs. See Prewritten programs
Object-oriented database, 275, 283 Packetization, 195
Object-oriented organization, 276 Packets, 195, 206
Object-oriented programming (OOP), 328, 329, 338 Page layout programs, 65, 76
Object-oriented software development, 329, 338 Pages, 34, 47
Objectivity, 40, 48 PAN. See Personal area network
Objects, 275, 283, 338 Pandora, 28, 68, 77, 230, 235
OC lines. See Optical carrier lines Parallel approach, 299, 306
OCR. See Optical-character recognition Parallel processing, 115, 126
Oculous Touch, 149, 149 Parent node, 272, 282
Office automation systems (OASs), 255, 259 Password managers, 225, 234
Office for iPad, 70, 71 Passwords, 224, 234
Office software suites. See Office suites Patches, 327, 338
Office suites, 70, 77 Paychecks, 250
OLED. See Organic light-emitting diode PayPal, 42
OMR. See Optical-mark recognition Payroll, 250, 259
One-to-many relationship, 272, 282 PCI Express (PCIe), 119, 126
Online, 27 PCIe. See PCI Express

books, 28 SUBJECT INDEX 387

PCs. See Personal computers laser, 145
Peer-to-peer network (P2P network), 201, 207 3D printers, 145, 145
People, 4, 6–7, 17, 214 Privacy, 7, 16, 34, 115, 214, 233, 239
Performance enhancements, 166–167, 178 cryptoprocessors, 131
Periodic evaluation, 300, 307 dark web, 239
Periodic reports, 251, 259 drones, 239
Personal area network (PAN), 198, 199, 206 end of anonymity, 232
Personal computers (PCs), 11, 18, 108, 125, 197 Google Street View, 216
information reseller’s website, 215
database. See Individual database internet and web, 217–220, 233
gaming, 111 IT security analysts, 231
hardware, 11–13 large databases, 215–217, 233
Personal consent, spreading information without, 216 laws on, 221, 233
Personal financial applications, 68 mobile apps, 69
Personal hotspot, 192 mode, 218, 233
Personal laser printers, 145, 156 online identity, 220, 233
Personal security, 221 private networks, 217, 233
Personalized buying guide, 355 social networking, 239
desktop computers, 356–357 unauthorized network intrusion, 211
laptops, 355 Private Browsing, 218, 233
smartphones, 356 Private networks, 217, 233
tablet computers, 356 extranet, 202, 207
Phased approach, 300, 306 intranet, 201–202, 207
Phishing, 223, 234 Problem and constraint languages. See Fifth-generation
Photo editors. See Image editors
PHP, 31, 46 language (5GL)
Physical connections, 188, 205 Problem-solving procedure, 314
Physical security, 226 Procedural languages. See Third-generation languages (3GLs)
Physical view, 266 Procedures, 4, 17
Picosecond, 115 Processing rights, 271, 282
Picture elements. See Pixels Processing speeds, 115, 275
Picture Password, 224, 234 Processor, 114
Pilot approach, 299, 306 Production, 245, 258
Pinterest, 35 Productivity suites. See Office suites
Pits, 169, 179 Profiles, 34, 47
Pixels, 65, 141, 156 Program, 4, 7, 17, 314, 335
Plagiarism, 230–231, 235, 240
Plagiarists, 231, 235 code, 315, 322, 323, 336
Planning, 246 coder. See Application generators
Platform scanners, 138, 155 documentation, 315, 326, 337
Platters, 165 flowcharts, 319
PlayStation 4 (PS4), 149 maintenance, 315, 327, 328, 338
Plotters, 146, 156 modules, 318
Podcasts, 36, 47 test, 315, 324, 325, 337
Pointer, 56, 75, 86, 99, 273, 282 Program analysis. See Program specification
Pointing devices, 136–137, 154 Program definition. See Program specification
Pop-ups, 30 Program design, 315, 318, 336
Popular microprocessors, 115 flowcharts, 319–321
Portable computers, 152, 157 logic structures, 321
Portable languages, 330 pseudocode, 319
Portable scanner, 138, 155 top-down, 318, 318
Ports, 108, 119, 127 Program specification, 315, 316, 317, 335
cables, 120 Programmable robot, 334
specialized ports, 120 Programmers. See Software—engineers
standard ports, 120 Programming, 314, 315
Power supply, 121 Programming language, 322, 323, 328, 335, 336
units, 108, 121, 127 generations, 330–332, 338
Preliminary investigation, 291–293, 304, 307 Project management software, 68
Presentation files, 13, 19 Project managers, 255, 259
Presentation software, 8, 63, 76 Property, 215, 233
analyzing data, 62 ProQuest Dialog, 277
creating presentation, 63 Protocols, 31, 194, 206
programs, 63 feature, 194
Pretty Good Privacy, 226 identification, 194–195
Prewritten programs, 314 packetization, 195
Prezi, 63, 76 Prototyping, 301, 301, 307
Primary key. See Key field Providers, 30, 46
Primary storage, 164, 177 Proxy server, 202, 207
Printers, 144, 145–146, 156. See also Scanning devices PS4. See PlayStation 4
features, 144 Pseudocode, 319, 319, 336
inkjet, 145, 145 Public Internet, 201
Public Wi-Fi, 192
388 SUBJECT INDEX

Purchase order, 250 SAN. See Storage area network
Purchasing, 250, 259 Satellite, 189, 205
Python, 323
connection services, 191, 206
q Scanner. See Optical scanners
Scanning devices, 137, 155. See also Printers
QuarkXPress, 65
Query languages, 331 bar code readers, 138–139
Query-by-example, 270, 282 card readers, 138
Quicken Starter Edition, 68 optical scanners, 137–138
Qustodio Parental Control, 32 Schema, 270
QWERTY keyboard, 134 SD cards, 118
SDLC. See Software development life cycle
r Search engines, 39, 48
Search services, 39, 48
RAD. See Rapid applications development Search tools, 39–40, 48
Radio frequencies, 198 Searching for information, 27, 46
Radio-frequency identification reader (RFID reader), 139, 155 Second Generation (2G), 330, 343, 345
RAID. See Redundant arrays of inexpensive disks mobile telecommunications, 191, 206
RAM. See Random-access memory Secondary storage, 12, 18, 163–165, 177
Random-access memory (RAM), 11, 18, 116, 117, 126, 164, 170, 177, 179 cloud storage, 170–173, 179
Ransomware, 222, 234 devices, 164, 177
Ransomware “WannaCry”, 222 disaster recovery specialists, 175, 179
Rapid applications development (RAD), 301, 307 hard disks, 165–167, 177
Raster images, 65 mass storage devices, 174–175, 179
Read-only discs, 170, 179 media, 165
Read-only memory (ROM), 116, 117, 126, 170, 179 next-generation storage, 176
Reader/sorter, 139 optical discs, 169–170, 179
Reading, 164 solid-state storage, 168–169, 178
Real-time operating systems (RTOS). See Embedded operating systems Sectors, 165, 177
Real-time processing, 269, 281 Secure file transfer protocol (SFTP), 33, 47
Receiving devices, 187, 188 Security, 16, 41–42, 49, 214, 221, 270, 278–279, 283
Record, 267, 281 cybercrime, 221–222, 234
Recordable (R), 170, 179 end of anonymity, 232
Recycling computer hardware, 131 IT security analysts, 231
Redundant arrays of inexpensive disks (RAID), 167, 175, 178, 179, 227 malicious hardware, 223–224, 234
Regional manager, 251 malicious software, 223, 234
Relation, 273, 282 measures to protecting computer security, 224–228, 234
Relational database, 273–274, 282 network, 202–203, 207
Relational organization, 276 social engineering, 223, 234
Repetition logic structure, 321, 321, 336 suites, 225, 234
Repetitive strain injury (RSI), 150–151, 157 and technology, 229, 239
Report creation, 60, 60 Selection logic structure, 321, 336
Research, 245, 258 Self-driving cars, 45
Resolution, 141, 156 Semiconductor. See Chips
Sending devices, 187, 188
standards, 142 Sequential logic structure, 321, 321, 336
Resolution, 144, 156 Server, 195, 206
Resources management, 85 Servers. See Midrange computers
Restricting access, 224–225 Service providers, 43, 49
Rewritable discs (RW discs), 170, 179 SFTP. See Secure file transfer protocol
RFID reader. See Radio-frequency identification reader Share settings, 34, 47
Ribbon GUI, 57, 75 Shared laser printers, 145, 156
Ribbons, 57, 75 Sharing, 270
Ring network, 200, 207 Shopping, 27, 46
Robot network, 223, 234 Shopping apps, 68
Robots, 150, 157 Short message service (SMS). See Text messaging
Rogue Wi-Fi Hotspots, 223–224, 234 Signature, 37, 48
Role playing game (RPG), 69, 77 Silicon chip. See Chips
ROM. See Read-only memory Siri, 26, 89, 91, 92, 93, 100, 105, 140, 155
Router, 196, 206 Six-phase systems life cycle, 291, 291
RPG. See Role playing game Slots, 113–114, 125
RSI. See Repetitive strain injury Smartphones, 8, 11, 18, 38, 108, 112, 125, 152, 354, 356
RW discs. See Rewritable discs bar code reader, 139, 139
operating systems, 89
s tracking, 81
Smartwatches, 112
SAE. See Society of Automotive Engineers Social engineering, 234
Sales forecast creation, 61, 61 Social media, 29
Sales order processing, 250, 259 Social networking, 34–35, 47, 53, 68, 216, 239
Society of Automotive Engineers (SAE), 45
Sockets, 113, 125

SUBJECT INDEX 389

Software, 4, 7, 16–18 Symantec’s Norton Internet Security, 33
application, 8 Syntax errors, 324, 325, 337
development. See Programming System, 290, 304
engineers, 15, 19, 71, 77, 315, 326, 337, 338
environment, 87, 99 analysts, 291, 302, 304
piracy, 228, 235 audit, 300, 307
platform, 87, 99 board, 113–114, 125
suites, 70–71, 77 buses, 118, 126
system, 7–8 design report, 297, 305
updates, 327, 338 design, 291, 296, 297, 305, 307
development, 291, 298–299, 306, 307
Software development life cycle (SDLC), 314 flowchart symbols, 295, 295
Solaris, 201 flowcharts, 295, 305
Solid-state drives (SSDs), 168, 178 implementation, 291, 299–300, 306, 307
Solid-state storage, 12, 168, 178. See also Cloud storage life cycle, 291, 300, 301, 304
maintenance, 291, 300, 307
flash memory cards, 168, 169, 178 System chassis. See System unit
SSDs, 168, 178 System software, 7–8, 18, 56, 84, 85, 99, 252, 259. See also Application
USB drives, 168, 169, 178
Solid-state storage. See Flash memory software
Sony PlayStation 4, 110 careers in IT, 97, 101
Source code, 331 desktop operating systems, 89–91
Spam, 38, 48 future trend, 98
Spam blockers, 38 mobile operating systems, 88
Spam filters. See Spam blockers operating systems, 85–88
Speakers, 146, 157 utilities, 91–97
Specialized applications, 8, 18, 56, 65, 68, 76 System unit, 11, 12, 18, 108, 125
graphics, 65–66 brain–computer interfaces, 124
video game design software, 67 bus lines, 118–119
web authoring programs, 67 components, 112, 125
Specialized ports, 120, 127 computer technicians, 123
Specialized search engines, 39–40, 48 desktops, 108
Specialized suites, 70, 77 electronic data and instructions, 122–123
Specialty processors, 115, 126 expansion slots and cards, 117–118
Speech recognition, 109 gaming, 110–111
Speed, 144 laptops, 108–109
Spiders, 39, 48 memory, 116–117
Spotify, 28, 68, 77 microprocessor, 114–115
Spreading inaccurate information, 217 ports, 119–120
Spreading information without personal consent, 216 power supply, 121
Spreadsheets, 61, 75 Smartphones, 112
creating Flyer, 59, 59 system board, 113–114
creating report, 60, 60 tablets, 109
creating sales forecast, 61, 61 wearable computers, 112
Spreadsheets, 8 Systems analysis, 290, 291, 294–296, 304, 305, 307
Spy removal programs, 220, 233 analyzing data, 294–295
Spyware, 219, 233 documenting, 296
SQL. See Structured query language gathering data, 294
SSDs. See Solid-state drives one step in defining problems, 293
Standard ports, 120, 127 preliminary investigation, 292–293
Star network, 200, 207 prototyping, 301
Storage, 164, 177 RAD, 301
devices, 165, 177 report, 296, 305
utility, 96, 101 systems design, 296, 297
Storage area network (SAN), 175, 179 systems development, 298–299
Strategic models, 252 systems implementation, 299–300
Strategic planning. See Long-range planning systems maintenance, 300
Strategic support systems, 259 testing system, 299, 299
Strategic uses, 278–279, 283
Strategy, 201, 207 t
Streaming technology, 36, 47
Structured programming techniques, 318 T1 lines, 190, 206
Structured programs, 322 T3 lines, 190, 206
Structured query language (SQL), 270, 282, 331 Table, 267, 281
Stylus, 137, 154 Tablet computers. See Tablets
Subject, 37, 48 Tablet hunch, 152
Supercomputers, 10, 18 Tablets, 11, 18, 56, 75, 87, 108, 109, 125, 152, 354–355, 356
Supervisors, 246, 258 Tabs. See Tablets
Supervisory managers, 248 Tactical models, 253
Surgical robot, 150, 150 Tactical planning. See Planning
Swift, 323 Tactical support systems, 259
Switch, 196, 206 Task-oriented languages. See Fourth-generation languages (4GLs)

390 SUBJECT INDEX

Tbps, 190 Unity development kit, 67
TCP /IP. See Transmission control protocol/Internet protocol UNIVAC, 344
Technical feasibility, 297, 305 Universal Product Codes (UPCs), 138, 155
Technical writer, 15, 19, 152 Universal serial bus (USB), 119, 120
Technology, 214
Telephone lines, 188, 205 drives, 168, 169, 178
Temporary Internet files, 218, 233 ports, 120, 126, 127
Temporary storage, 11, 116 UNIX, 87, 90, 101
Tesla’s autopilot system, 45 Unmanned aerial vehicles (UAV). See Drones
Testing process, 324–325, 325, 337 UPCs. See Universal Product Codes
Tethering, 192 Upgrades, 111
Text databases, 278 Uplink, 189
Text messaging, 38, 48, 186 Uploading, 32
Texting. See Text messaging UPS. See United Parcel Service
Thermal printers, 146, 156 URLs. See Uniform resource locators
Third Generation, 343, 346 USB. See Universal serial bus
Third-generation languages (3GLs), 330 User interface, 56–57, 75, 85
Third-generation mobile telecommunications (3G), 191, 206 Users, 252, 259, 326, 337
Third-party cookie, 218 Utilities, 8, 18, 84, 91, 99, 101
Thumb keyboards, 135, 154 utility suites, 70, 77, 97, 101
Thunderbolt ports, 120, 127 virtual assistants, 92–93
TLD. See Top-level domain Windows utilities, 94–96, 101
Toggle keys, 135, 154
Toolbars, 56, 75 v
Top level management, 258
Top management, 246 Vacuum Tube Age, 344
Top-down analysis method, 294, 305 Vector illustrations. See Vector images
Top-down program design, 318, 336 Vector images, 66, 76
Top-level domain (TLD), 31, 46 Venmo, 42
Top-level executives, 253 VGA. See Video Graphics Adapter
Top-level managers, 247, 258 Video app, 68
Topologies, 200, 207 Video conferencing, 193
Touch pad, 136, 154 Video editors, 66, 76
Touch screen, 136, 154 Video game design software, 67, 76
Tower computer, 108 Video Graphics Adapter (VGA), 120, 127
Tower unit, 108, 109 Videoconferencing, 186
TPS. See Transaction processing system Videoconferencing systems, 255, 259
Tracking cookies, 218 Vine, 35
Tracks, 165, 177 Virtual assistants, 91, 92–93, 105
Traditional graphical user interface, 57 Virtual keyboards, 135, 154
Traditional keyboard, 135, 154 Virtual machines, 91, 101
Traditional laptop, 355 Virtual memory, 116, 126
Transaction processing system (TPS), 248, 249–250, 254, 255, 259 Virtual private networks (VPNs), 203, 207, 226, 234
Transfer rate, 190, 206 Virtual reality (VR), 74, 148, 157
Transistor Age, 345
Transmission control protocol/Internet protocol (TCP /IP), head-mounted displays and controllers, 147
Virtualization, 90–91, 101
194, 206 Virtualization software, 91, 101
Tree network, 200, 207 Viruses, 8, 38, 223, 234
Trojan horses, 223, 234
Troubleshooting, 91, 101 tracking, 226
Tumblr, 35 Voice assist, 92
Turnitin website, 231, 231 Voice recognition systems, 140, 155
Twisted-pair cable, 188, 205 Voiceband, 194, 206
Twitter, 35, 47 Volatile storage, 116
Two-in-one laptops, 109, 125 VPNs. See Virtual private networks
VR. See Virtual reality
u
w
uBid, 41
UHD 4K, 142 Wand readers, 138, 139, 155
UHD 8K, 142 WANs. See Wide area networks
UHDTV. See Ultra-high-definition television Warm boot, 86
Ultra-high-definition television (UHDTV), 143, 156 Watch OS, 87
Ultrabooks, 109, 125, 355 Watson (supercomputer), 257
Ultraportables. See Ultrabooks Wearable computers, 11, 18, 108, 112, 125
Unauthorized network intrusion, 211 Wearable devices. See Wearable computers
Unicode, 123, 127 Web, 16, 26–27, 39, 46, 217–220, 233. See also Internet
Web 1.0, 26, 46
binary codes, 165 Web 2.0, 26, 46
Uniform resource locators (URLs), 31, 46 Web 3.0, 26, 27, 46
United Parcel Service (UPS), 138 Web 3.0 application, 43

SUBJECT INDEX 391

Web auctions, 41 Wireless charging platform, 121, 127
Web authoring programs, 67, 76 Wireless communication devices, 14, 15
Web bugs, 219 Wireless communications, 187
Web databases, 278 Wireless connections, 189–190, 205
Web page editors, 67, 76 Wireless fidelity (Wi-Fi), 189, 205
Web pages, 46
Web suffix. See Top-level domain (TLD) public, 192
Web utilities, 32–33, 47 Wireless keyboard, 109, 355
Web-based e-mail systems, 37, 48 Wireless local area network (WLAN), 198, 199, 206
Web-based file transfer services, 32, 47 Wireless local area network, 198
Webcams, 140, 155 Wireless modems, 30, 46, 190, 206
Webcasts, 36, 47 Wireless mouse. See Cordless mouse
Webmail, 37 Wireless network cards, 118, 126
Webmail client, 37 Wireless network encryption, 226
Webmasters, 15, 19, 44, 49 Wireless networks, 16, 185
Webroot SecureAnywhere AntiVirus, 91 Wireless revolution, 19, 187, 205
Website encryption, 226 Wireless technology, 187
What you see is what you get editors (WYSIWYG editors), 67, 76 Wireless wide area network modem (WWAN modem).
What-if analysis, 62
WhatsApp, 39 See Wireless modem
Wheel button, 136 WLAN. See Wireless local area network
Wi-Fi. See Wireless fidelity Word, 115, 126
Wi-Fi access points, 45 Word processors, 8, 58, 75
Wi-Fi Protected Access (WPA2), 226, 234 Workbook, 62
Wi-Fi standards, 189 Worksheet, 13, 61
Wide area networks (WANs), 199, 206 Worksheet files, 13, 19
Widely used programming languages, 271, 322, 323, 336 World Wide Web (WWW). See Web
Wikipedia, 36, 48 Worldwide Interoperability for Microwave Access (WiMax),
Wikis, 36, 48
WiMax. See Worldwide Interoperability for Microwave Access 189, 205
Window, 56, 75 Worms, 223, 234
Windows, 87, 89, 99, 100 WPA2. See Wi-Fi Protected Access
Windows 10 Mobile, 88, 100 WQXGA, 142
Windows 10, 8, 89, 89, 100 Write-once discs, 170, 179
Writing, 164
macOS running Windows 10, 91 WYSIWYG editors. see What you see is what you get editors
Windows Defender, 220
Windows File History, 97 y
Windows key, 135
Windows operating systems, 56, 86, 167 Yahoo!, 39, 48, 349
Windows Phone, 88 Yahoo!Mail, 38
Windows Photo Gallery, 65 Yoga mats, 244, 245, 250
Windows Server, 87, 201 Yosemite, 91
Windows utilities, 94–96, 101 YouTube, 36
WinZip, 167 YouTube app, 77
Wired channels, 197
Wired networks, 185 z
Wireless access point, 198
Wireless adapter, 198 .zip file, 91
Wireless channels, 197 Zoho, 70
Zombies, 223, 234

392 SUBJECT INDEX


Click to View FlipBook Version