2003
The National Cenrer for Supercomputing Applications Apple introduces the Power Macintosh G5, a 64-bit
announces that Mike Showcrman and Craig Steffen ere* processor.
ated a supercomputer based on 70 Sony PlayStation 2
gaming systems. The supercomputercost about 550,000 In a continuing attempt to control file sharing, thc
to build, uses the Linux operating system and a Hewlett- Recording Industry Association of America begins suing
Packard high-speed switch, and can perform 6.5 billion individuals who share files.
mathematical operations per second.
Apple opens an online music store, iTunes, offering
Thc Slammer worm does over S i billion in damage more than 200,000 titles at $0.99 each.
and demonstrates that no network is truly secure.
Wi-Fi (Wireless Fidelity) or 802.1 lb/g comes to thc
Lindows explodes across the globe with severalcoun consumer market with hot spots springing up both in
home networking and in some commercial locations
tries opting for this powerful and inexpensive alternative such as Starbucks. W ith this new technology comes thc
to high-priced proprietary software.
new technique called Wwar driving," where individuals
Microsoft releases Office 2003, thc latest in thc Of drive around in automobiles with laptop computers
looking for wireless networks that w ill allow them
fice suite scries. access.
Intel and AMD release 64-bit processors targeted for
thc home computer market.
Tf 7O
©
556 Appendix 0
Urheberrechtlich geschutztes Material
Appendix E— Self-Check Answers
Chapter 1, Lesson A, Chapter4, Lesson B, Chapter8, Lesson A, Chapter 11, Lesson B,
page 10 page 151 page 393 page 428
1. C 1. C 1. B 1. A
2. A 2. 8 2. A 2. C
3. B 3. 8 3. C 3. B
Chapter 1, Lesson B, Chapter 5, Lesson A, Chapter8, Lesson B, Chapter 12, Lesson A,
page 36 page 175 page 315 page 448
1, e 1. C 1. B 1. C
2. A 2. A 2. A 2. A
3. C 3. B 3. C 3. B
Chapter 2, Lesson A, Chapter 5, Lesson B, Chapter9, Lesson A, Chapter 12, Lesson B,
page 113 page 192 page 335 page 465
1. B 1. C 1. C 1. 8
2. A 2. A 2. A 2. A
3. B 3. B 3. B 3. C
Chapter 2, Lesson B, Chapter6, Lesson A, Chapter 9, Lesson B, Chapter 13, Lesson A,
page 73 page 212 page 350 page 488
1. B 1. B 1. C 1. B
2. A 2. A 2. A 2. C
3. B 3. B 3. B 3. A
Chapter 3, Lesson A, Chapter 6, Lesson B, Chapter 10, Lesson A, Chapter 13, Lesson B,
page 99 page 231 page 370 page 508
1. C 1. B 1. B 1. C
2. A 2. A 2. A 2. A
3. B 3. B 3. C 3. B
Chapter3, Lesson B, Chapter 7, Lesson A, Chapter 10, Lesson B,
page 113 page 252 page 391
1. B 1. B 1. B
2. A 2. A 2. A
3. B 3. C 3. B
Chapter 4, Lesson A, Chapter 7, Lesson B, Chapter 11, Lesson A,
page 134 page 270 page 406
1. B 1. A 1. C
2. A 2. A 2. B
3. C 3. C 3. A
! 558 Appendix E
Glossary
Numerals Advanced Micro Devices (AMD) A chip manufacturer that
makes processors for PC-compatible computers,
10Bas«-T See Ethernet.
adware See spywore.
100Base-T See Fast Ethernet.
AGP See Accelerated Graphics Port.
3-D modeling software Graphics software used to create elec
tronic models of three-dimensionalobjects. algorithm A set of ordered steps or procedures necessary to
solve a problem.
3GL See third-generation language.
all-in-one peripheral A device that combines the functions of
4GL Seefourth-generation language. printing, scanning, copying, and faxing. All-in-one peripherals
can be based on either laser or ink jet printing technology and
5GL Seefifth-generation language. may operate in black and white, color, or both.
802.11b A wireless networking standard that describes specifi alphanumeric field See textfield.
cations for data transmission speeds up to 11 Mbps.
alphanumeric keys On a computer keyboard, the keys that in
802.1lg A wireless networking standard that describes specifi clude the letters of the alphabet numerals, and commonly used
cations for data transmission speeds of 20 Mbpsand higher. symbols.
A ALU See arithmetic logic unit.
Accelerated Graphics Port (AGP) bus A bus standard that in* always-on connection An Internet connection that is always
corporates a special architecture that allows the video card to ac active, as long as the computer is running. Cable modemand DSL
cess the system's RAH directly, greatly speeding up graphics connections are examples of always-on connections.
performance. Most new computers feature AGP graphics capabili
ties in addition to a PCI system bus and an expansion bus. AMD See Advanced M ao Devices.
acceptance testing Testing performed during the development American Standard Code for Information Interchange An
phase of the systems development life cycle. In acceptance test eight-bit binary code developed by the American National Stan
ing. end users work with the installed system to ensure that it dards Institute (ANSI) to represent symbolic, numeric, and al
meets their criteria. phanumeric characters. The ASCII character set is the most
commonly used character set in PCs.
Access A database management program,
anonymous FTP archive An FTPsite with files available to the
activate (1) Toinitiate a command or load a program into general public The usertypes the word 'anonymous* as the ac
memory and begin using it (2) Tochoose; for example, you can count name in order to access the files,
activate a resource by choosing its icon, toolbar button, or file
name. anti-adware utility See anti-spyvrare utility.
active matrix LCD A liquid crystal display (ICO) technology antiglare screen A device that fits over a computer monitor
that assigns a transistor to each pixelin a flat-panel monitor, and reduces glare from light reflecting off the screen,
improving display quality and eliminating the 'submarining* ef
fect produced by sometypes of flat-panel monitors. Also called a anti-spyware utility A program that can locate and remove
thin-fitm transistor (TFT) display. spyware programs from a user's computer. Some anti-spyware
utilities can “immunize" a computer against known types of spy-
Active Server Pages (ASP) A specialized Web-scripting lan ware. to prevent them from infecting the system,
guage that enables a Web page to access and draw data from
databases. antivirus utility A program that scans a computer's disks and
memory for viruses; when it detects viruses, it removes them.
active window On the computer screen, the window in which Some antivirus programs can help the user recover data and pro
the user's next action will occur. The active window's title bar is gram files that have been damaged by a virus and can actively
highlighted, while the title bars of inactive windows appear scan files as they are being copied from a disk or downloaded
dimmed. from the Internet.
adapter See expansion board. Apache HTTPServer A Web server product developed by the
Apache Group. A robust and commercial-grade Web server that is
address book A database that stores information about people, maintained and improved upon as free, open-source software.
such as their names, addresses, phone numbers, e-mail addresses, Apache is the most popular Web server and runs on UNIX, Linux,
and other details. Commonly part of a personal information man and Windows servers.
agement or e-mail program.
APIPA See automaticprivate IP address.
address bus A set of wires connecting the computer's CPU and
RAM, across which memoryaddresses are transmitted. applet A small program that can be run from within a Web
page. Many Web-based applets are written in the Java program
Address Resolution Protocol (ARP) A specialized protocol ming language.
that resolves logical IP addresses into physical addresses.
ADSL See Asynchronous DSL
Glossary !
Urheberrechtlich geschutztes
basic rate ISDN See basic rate integrated services digital search engine. These operators are commonly used in standard
network database queries.
batch (.bat) file An executable file that can be used to auto boot Tostart a computer. The term comes firom the expression
mate common or repetitive tasks. A batch file is a simple pro ‘pulling oneselfup by one's own bootstraps.'
gram that consists ofan unformatted text file containing one or
more commands. If you type a batch file's name in at a command boot sector The portion of a disk that contains the master
prompt youroperating system will execute the commands in the boot record—a programthat runs when the computer is first
file. A batch file can have a .com extensions instead of a .bat started and determines whetherthe disk has the basic operating
extension. system components required to run successfully,
billions of instructions per second (BtPS) A common unit of bottom-up design A design method in which system details
measure when gauging the performance of a computer's are developed first, followed by major functions or processes,
processor.
bps See bits persecond.
binary field A database field that stores binary objects (such
as clip art photographs, screen images, formatted text, sound branch One of several directions that flows from a condition
objects, and video clips) or OLE objects (such as charts or work statement orfunction call within a sequence structure.
sheets created with a spreadsheet or word processor),
BRI See basic rote integrated services digital network.
binary Urge object (BLOB) (1) A graphic image file such as
clip art a photograph, a screen image, formatted text a sound brick-and-mortar store A business, such as a retail store, that
object, or a video dip. (2) An OLE object such as a chart or has a physical location but does not have an online presence
worksheet created with a spreadsheet or word processor; fre such as a Web site.
quently used with object-oriented databases,
bridge A device that connects two LANs and controls data Row
binary number system A system for representing the two pos between them.
sible states of electrical switches, which are on and off. (The bi
nary numbersystem is also known as base 2.) The binary number broadband Oescribes a high-speed network connection or data
system gets its namefrom the fact that it includes only two connection to the Internet. Toqualify as broadband, a connec
numbers: 0 and 1. In computer storage and memorysystems, the tion must transmit data fosterthan is possible with a dial-up
numeral 0 represents off and a 1 represents on. connection through a standard modemand telephone line. Cable
modemsand DSL are common examples of broadband Internet
BIOS See basic input output system. connections,
BIPS See billions of instructions persecond. browser See browser.
bit Thesmallest unit of data that can be used by a computer, buddy list A list of people who can participate in chats, using
represented by a I or a 0. instant messaging software.
bitmap A binary representation of an image in which each part buffer A dedicated space in memoryor on a disk that tem
of the image, such as a pixel is represented by one or morebits porarily stores data until it is needed by a program. Once the
in a coordinate system. Also called a raster. data has been used, it is deleted from thc buffer,
bits per second (bps) A measureof data transmission speed. bug An errorin a computer program,
This unit maybe used to measure the data transmission rate of a
specific device—such as a modemor disk drive—or for the compo bus The path between components of a computer. The bus's
nents of a network. May be modified as kilobits persecond (Kbps), width determines the speed at which data is transmitted. When
megabits persecond (Mbps), or gigabits per second (Cbps). used alone, the term commonly refers to a computer's data bus.
BLOB See binary large object. bus topology A network topology in which all network nodes
and peripheraldevices are attached to a single conduit
block A contiguous series of characters, words, sentences, or
paragraphs in a word processing document. This term is also business logic The process executed by one computer in a
sometimes used to describe a range of cells in a spreadsheet. three-tierdistributed application This process can include deter
Oncea block of text or cells has been selected, the user can per mining what data is needed from a database, the best wayto
form manydifferent actions on it, such as moving, formatting, or connectto the database, and other tasks,
deleting.
bustness-to-buslness (B2B) transaction A transaction (such
BMP Abbreviation for bitmap. BMP is a graphic-file format na as the placing of an order or the paying of an invoice) conducted
tive to Windows and OS/2. BMP is widely used on PCs for icons by two businesses. A B2B transaction can be conducted in many
and wallpaper. ways, with orwithout the use of computers, but the term B28 is
commonly used to describe transactions that occur online or
board See expansion board. through a private corporate network such as an extranet,
Boolean field See logicalfield. business-to-consumer (B2C) transaction A transaction (such
as the ordering of a product or the paying ofa bill) conductcd
Boolean operator Specialwords—such as ANO, OR, and NOT— between an individualconsumer and a business. A B2C
that can be used to modify a keyword search in a Web-based transaction can be conducted in many ways, w’th or without the
use of computers, but the term B2C is commonly used to describe
transactions that occur via the Internet.
Glossary 561
dip art Predrawn or photographed graphic images that are disc read-only memory (CD-ROM). As the device's name implies,
available for use by anyone. Some clip art is available through li you cannot change the information on the disc, just as you can
censing. some through purchase, and some for free. not record over an audio CO. Standard compact discs can store
either 650 MB or 700 MB of computer data, or 70 minutes or 80
Clipboard A holding area maintained by the operating system minutes ofaudio data.
in memory. The Clipboard is used for storing text graphics,
sound, video, or other data that has been copied or cut from a compact disc read-only memory (CD-ROM) The most common
document. After data has been placed in the Clipboard, it can be type of optical storage medium. In CD-ROM, data is written in a
inserted from the Clipboard into other documents, in the same series of lands and pits on the surface of a compact disc (CD),
application, or in a different application, which can be read by a laser in a CD-ROMdrive,
dock cycle In a processor, the amount of time required to turn compatible Describes the capability of one type of hardware,
a transistor off and backon again. Also called a tick. A processor software, or data file to work with another. See also
can execute an instruction in a given numberof dock cycles, so incompatible.
as a computer's clock speed (the numberof dock cycles it gener
ates persecond) increases, so does the numberof instructions it compiler A programthat translates a file of program source
can cany out each second. cod? into machine language.
dock speed A measureof a processor's operating speed, cur Complex Instruction Set Computing (CISC) Oescribes a
rently measured in megahertz (MHz, or millions of cycles per type of processor designed to handle large and comprehensive
second) or gigahertz (GHz, or billions of cycles per second). instruction sets. CISC processors are commonly used in IBM-
A computer's operating speed is based on the numberof dock compatible PCs.
cydes, or ticks, it generates per second. Forexample, if a com
puter's dock speed is 800 MHz, it “ticks’ 800 million times per computer An electronic device used to process data, convert
second. ing the data into information that is useful to people,
duster On a magnetic disk (such as a hard disk), a group of computer-aided design (CAD) Software used to create com
sectors that are treated as a single data-storage unit Thenum plex two- or three-dimensional moJels of buildings and products,
ber of sectors per disk can vary, depending on the type of disk including architectural, engineering, and mechanical designs,
and the mannerIn which it is formatted,
computer-aided software engineering (CASE) Software used
coaxial cable (coax) A cable composed of a single conductive to develop information systems. CASE automates the analysis, de
wire wrapped in a conductive wire mesh shield with an insulator sign, programming, and documentation tasks,
in between.
computer-generated imaging (CGI) Theprocess of using pow
code The instructions or statements that are the basis of a erfulcomputers and spedal graphics, animation, and composit
computer program. ing software to cieatc digital special effects or unique images.
CGI is frequently used In filmmaking, game design, animation,
color monitor A computer monitorwhose screen can display and multimedia design.
data in color. A color monitor's capabilities are based on a vari
ety of factors. Current high-resclution color monitors can display computer system A four-part system that consists of hardware,
motethan 16 million colors, but they also can be set to display software, data, and a user.
as few as 16colors or varying shadesof gray,
conditional statement A feature of selection structure pro
command An instruction issued to the computer. Theuser can gramming that directs program flow by branching to one part
issue commands, usually by choosing from a menu, clicking an of the programor another depending on the results of a
on-screen tool or icon, or pressing a combination of keys. Appli comparison.
cation programs and the operating system also issue commands
to the computer. configure Toadapt a computer to a specific need by selecting
from a range of hardware or software options. Configuration may
command-line Interface A user interface that enables the user include installing new or replacement hardware or software or
to interad with the software by typing strings of characters at a changing settings in existing hardware or software.
prompt.
contact Information Oata that can l*lp communicate with in
command prompt See prompt. dividuals or businesses, such as names, mailing addresses, phone
numbers, e-mail addresses, and other details. This kind of infor
commercial software Software that a manufacturer makes mation is often stored and managed in special software, such as
available for purchase. The consumer usually pays for a license to contact-management software, personal information managers, or
use the software, instead of purchasing the software itself, e-mail programs.
communications device An input/output device used to con contact-management software See personal information
nect one computer to anotherto share hardware and information. manager.
This family of devices includes modems and network interface
cards. contact manager See personal information manager.
compact disc (CO) A type of opticalstorage medium, identical context menu In Windows 95 and later operating systems, a
to audio CDs. The type of CDused in computers is called compact brief menuthat appears when the userright-dicks certain items.
G lossary 563
database A collection of related data organized with a specific desktop computer A full-size personal computer whose system
structure. unit is designed to sit on top of a desk or table; such computers
are not considered to be portable. Onevariation ofthe desktop
database management system (DBMS) A computer program model is the tourermodeL whose system unit can stand upright
used to manage the storage, organization, processing, and re* on the door.
trieval of data in a database.
development phase Phase 3 of the systems development life
datagram The term for data packets when traversing the Inter* cycle, in which programmerscreate or customize software to fit
net. A datagram (or packet) is a piece of a larger message that the needs of an organization, technicaldocumentation is pre
has been broken up for transmission over the Internet. pared, and software testing is begun.
date field A database field that stores a date. device Anyelectronic component attached to or part of a com
puter; hardware.
DB2 An enterprise-level database management system, devel
oped and sold by IBM Corp. DHCP See Dynamic Host ControlProtocol.
DBMS See database managementsystem. dial-up connection An Internet connection between a client
computer and an Internet service provider's (ISP's) server com
OOOSattack See distributed denialof service attack. puter, which takes place over a standard telephone line, using a
standard modem. Such connections ate called "dial-up* because
debugging The process of tracking down and conecting errors the client computer's modem must dial a telephone number in or
(called bugs) in a software program. der to connect to the ISP's server computer,
decimal numbersystem The system that uses 10digits to rep dialog box A special-purpose window that appears when the
resent numbers; also called base 20. user issues certain commands in a programor graphical operating
system. A dialog boxgets its name from the 'dialog*' it conducts
decision support system (DSS) A specialized application used with the useras the program seeks the information it needs to
to collect and report certain types of business data, which can be perform a task.
used to aid managers in the decision-making process,
digital Theuse of the numerals 1and 0 (digits) to express data
decision tree A graphical representation of the events and ac in a computer. Thecomputer recognizes the numeral 1as an "on”
tions that can occur in a programor information system under state of a transistor, whereas a 0 represents an •'off state,
different conditions.
digital camera A camera that converts light intensities into
decoding (1) In a machine cyde. the step in which the control digital data. Digitalcameras are used to record images that can
unit breaks down a command into instructions that correspond be viewed and edited on a computer,
to the CPU’s instruction set (2) During file compression, the
process of reinserting bits stripped awayduring encoding. digital light processing (D IP) A technology used in some
types of digital projectors to project bright crisp images. DIP
dedicated media Media (such as cables or wireless links) devices use a special microchip, called a digital mkrominor
that are specifically set up for use in a network, device, that uses mirrors to control the image display. DLP pro*
jectors can display dear images in normal lighting conditions.
defragmentation The process of locating file fragments (parts
of a file that are stored in noncontiguous sectors) on the surface digital pen See pen.
of a magnetic disk, then storing them in contiguous sectors. This
process can help optimize a disk's performance by allowing it to Digital Subscriber Line (DSL) A form of digital telephone ser
locate and load files in less time. vice used to transmit voice and data signals. There are several
varieties of OSl technology, which include Asymmetrical DSL,
degaussing The process of disrupting a magnetic field. If a High bit-rate DSL, and others.
floppy disk become degaussed, for example, the data stored on it
can be corrupted or destroyed. Digital Video Disc (DVD) A hlgh-density optical medium capa
ble of storing a full-length movie on a single disc the size of a
density A measure ofthe quality of a magnetic disk's surface. standard compact disc (CD). Unlike a standard CD, which stores
The higher a disk's density, the more data the disk can store, data on only one side, a DVD-format disc stores data on both
sides. Using compression technologies and very fine data areas
description field See memofield. on the disc's surface, newer-generation DVOs can store several gi
gabytes of data.
deselect The opposite of select. In manyapplications, the user
can select or highlight blocks of text or objects for editing. By Digital Video Dlsc-RAM (DVD-RAM) A type oropticaldevice
clicking the mousein a different location or pressing a cursor- that allows users to record, erase, and re-record data on a special
movement key. the user removes the highlighting and the text or disc. Using video editing software, you can record your own digi
objects are no longerselected. tized videos onto a DVD-RAMdisc, then play them back in any
DVD player. (However, special encoding makes it impossible to
desktop In a computer operating system, a graphical work copy movies from commercial DVDonto a OVD-RAMdisc.) OVD*
space in which all of the computer's available resources (such as RAM drives can read DVDs. DVD-Rdiscs. CD-R discs, CD-RWdiscs,
files, programs, printers, Internet tools, and utilities) can be eas and standard CDs.
ily accessed by the user. In such systems, the desktop is a col
ored background on which the user sees small pictures, called
icons. The user accesses various resources by choosing icons on
the desktop.
Glossary 565
digitize Toconvert an image or a sound into a series of binary DIP See digital light processing.
numbers (Is and Os) that can be stored in a computer.
DNS See domain name system.
DIMM See DualIn-Line Memory Module.
docking station A baseinto which a portable computer can be
direct attached storage (OAS) A storage device that is at* inserted, essentially converting the portable computer into a
tached directly to a computer and that depends on the com desktop system. A docking station may provide connections to a
puter's processor. full-size monitor, keyboard, and mouse, as well as additional de
vices such as speakers or a digital video camera.
Director A multimedia authoring program, developed by Macro
media, Inc. document A computer file consisting of a compilation of one
or more kinds of data. There are many types, including text docu
directory Seefolder. ments. spreadsheets, graphics files, and so on. A document,
which a user can open and use, is different from a program file,
disconnected datasets Information that is temporarily copied which is required by a software program to operate.
Froma central database to a user's computer and resides on the
user's system only foi as long as the user needs it During that document area In many software applications, the portion of
time, the connection with the database is broken. the program's interface in which the active document appears. In
this partof the interface, the user can work directly with the
disk A storage medium commonly used in computers. Twotypes documentand its contents. Also called document window.
of disks are used: magnetic disks, which store data as charged
particles on the disk's surface; and opticaldiscs, which use lasers document format In productivity applications, a setting that
to read data embossed on thc disc in a series of lands and pits, affects the appearance of the entire document, such as page size,
page orientation, and the presence of headers or footers.
disk controller A device that connects a disk drive to the com
puter's bus, enabling the drive to exchange data with other de document window See document area.
vices.
domain name A name given to a computer and its peripherals
disk defragmenter A utility program that locates the pieces of connected to the Internet that identifies the type of organiza
fragmented files saved in noncontiguous sectors on a magnetic tion using the computer. Examples of domain names are .com for
disk and rearranges them so they are stored in contiguous sec* commercial enterprises and .edu for schools. Also called top-level
tors. Defragmenting a disk can improve its performance because domom.
the operating system can locate data more efficiently.
domain name system (DNS) A naming system used for com
disk drive A storage device that holds, spins, reads data from, puters on the Internet This system provides an individual name
and writes data to a disk. (representing the organization using the computer) and a domain
name, which classifies the type of organization.
disk optimization Oneor more disk-management procedures
that can improve a disk's performance. Disk optimization proce dot matrix printer A type of impact printer that creates char
dures include defragmentation, deletion of unneeded files, com acters on a page by using small pins to strike an inked ribbon,
pression, and others. pressing Ink onto the paper. Thearrangement of pins in the print
head creates a matrix of dots—hence the device's name,
diskette A removable magnetic disk encased in a plastic sleeve.
Also calledfloppy dbk orfloppy. dot pitch The distance between phosphor dots on a monitor.
Thehvghest-resolutfon monitors have the smallest dot pitch,
diskette drive A device that holds a removable floppy disk
when in use; read/write heads read and write data to the dots per inch (dpi) A measure of resolution commonly applied
diskette. to printers, scanners, and other devices that input or output text
or images. The moredots per inch, the higher the resolution. For
display adapter See video cord. example, if a printer has a resolution of 600 dpi, it can print 600
dots across and 600 down in a one-inch square, for a total of
distributed application A programthat is divided into parts, 360,000 dots in one square inch.
each of which executes on a different computer. In essence, the
program's execution is distributed across multiple systems, double-click Toselect an object or activate a command on the
screen by pointing to an object (such as an icon) and pressing
distributed computing A system configuration in which two or and releasing the mouse button twice in quick succession,
more computers in a network share applications, storage, and
processing power. Also called distributed processing. download Toretrieve a file from a remote computer. The oppo
site of upload.
distributed denial of service (DDOS) attack A type of hacking
attack in which a hackerhides malicious code on the PCs of many dpi See dots per inch.
victims. This code may enable the hacker to take over the in
fected PCs, or simply use them to send requests to a Web server. drag To move an object on the screen by pointing to the ob
If the hacker controls enough PCs. and can get them to send ject pressing the primary mouse button, and holding down the
enough requests to the targeted Web server, thc server essen button while dragging the object to a new location,
tially becomesjammed with requests and stops working,
drag and drop To move text or graphics from one pait of the
distributed processing See distributed computing. document to another by selecting the desired information.
OLL See dynamic link libraryfile.
566 Glossary
encryption The process of encoding and decoding data, making Extended ASCII An extension of the ASCII character set which
it useless to any system that cannot decode (decrypt) it specifies the characters for values from 128to 255. These char
acters include punctuation marks, pronunciation symbols, and
Enhanced Integrated Drive Electronics (EIDE) An enhanced graphical symbols.
version of the IDE interface.
Extended Binary Coded Decimal Interchange Code (EBCDIC)
enterprise directory A collection of data about the users of a An eight-bitcodethat defines 256 symbols. It is still used in
network and the computer resources of the network. This data IBM mainframe and midrange systems, but it is rarely encoun
base typically (s managed by the network operating system, tered in personal computers.
which resides on a network server.
Extensible Hypertext Markup Language (XHTML) An out
enterprise software Software that is used by hundreds or thou growth of HTML, XHTML is a superset of the HTML commands, in
sandsof people at the same time, or that handles millions of cluding the capabilities of HTMLand adding to them. XHTML
records, or both. allows for the execution of programs written in Extensible Markup
Language (XML) and it is itself extensible, meaning that it allows
enterprise storage A large-scale system of data storage, con for new commands and features to be added.
nected to the computersystem of a large organization,
Extensible Markup Language (XML) An outgrowth of HTML, it
enterprise system A very large-scale computersystem, such as is a markuplanguage that allows data to be stored in a human-
one used by a large organization. readable format Thelanguage also allows users to create unique
tags or otherelements.
ergonomics The study of the physical relationship between
people and their toots. In the world of computing, ergonomics Extensible Markup Language Mobile Profile (XHTML MP) A
seeks to help people use computers correctlyto avoid physical new development environment formerly known as Wireless
problems such as fatigue, eyestrain, and repetitive stress injuries. Markup Language (WML) used to create documentsthat can be
viewed by handheld devices such as Web-enabled cell phones,
error-correction protocol A standard for correcting errors that PDAs, and even digital pagers.
occur when static interferes with data transmitted via modems
over telephone lines. Extensible Stylesheet Language (XSL) An XML technology
that allows XML documents to be formatted for display in HTML-
Ethernet The most common network protocol. Also called based browsers.
lOBase-T,
extension point A device that allows a greater numberof users
Event Viewer In later versions of Windows, a program that to access a wireless network,
records certain conditions, such as errors, and creates a log that
is usable by the system's user or administrator, external cache See Level-2 codit.
executable (.exe, .com) file The core program file responsible external modem A communications device used to modulate
for launching software. data signals. This type of device is described as "external1' be
cause it Is housed outside the computer and connected to the
execute Totoad and carry out a programor a specific set of in computerthrough a serial port and to the telephone system with
structions. Executing is also called running. a standard telephonejack.
execution cycle The second portion of the machine cycle, extract Touncompress one or more compressed files that have
which is the series of steps a CPU takes when executing an in been stored together in an archive file.
struction. During the execution cycle, the CPU actually carries
out the instruction by converting ft Into microcode. In some extranet A network connection that enables external users to
cases, the CPU may be required to store the results of an Instruc access a portion of an organization's internal network, usually via
tion in memory; if so. this occurs during the execution cycle. an Internet connection. External users have access to specific
parts of the internal network but are forbidden to access other
exit condition In programming, a condition that must be met areas, which are protected by firewalls,
in order for a loop to stop repeating.
eyestrain Fatigue of the eyes, caused by staring at a fixed ob
expansion board A device that enables the userto configure or ject for too long. Extended computer use can lead to eyestrain.
customize a computer to perform specific tasks or to enhance
performance. An expansion board—also called a cord, adopter. or F
board—contains a special set of chips and circuitry that add
functionality to the computer. An expansion board may be in Fair Credit Reporting Act A federal law (enacted in 1970) that
stalled to add fax/modem capabilities to the computer, for exam mandates that personal information assembled by credit report
ple, or to provide sound or video-editing capabilities, ing agencies must be accurate, fair, and private. It allows indi
viduals to review and update their credit record as well as
expansion stot The area of the motherboard into which expan dispute the entries.
sion boards are inserted, connecting them to the PCs bus.
FAQ Seefrequently asked questions.
expert system An information system in which decision-mak-
ing processes are automated. A highly detailed database is ac Fast Ethernet A networking technology, also called 100Base-T,
cessed by an inference engine, which is capable of forming an that uses the same network cabling scheme as Ethernet but uses
intelligent response to a query.
568 Glossary
different network interface cards to achieve data transfer speeds Financial Modernization Act of 1999 A federal law that re
of up to 100Mbps. quires companies to give consumers notice oftheir privacy and
information-sharing practices.
FAT Seefile allocation table.
firewall An antipiracy method for protecting networks. A fire
fault tolerance The ability of a computer system to continue wall permits access to public sections of the network while pro
functioning, even after a major component has failed, tecting proprietary areas.
fax modem A modem that can emulate a fax machine, FireWire S*e IEEE 1394.
fetching The first step of the CPI/s instruction cycle, during first-generation language A term applied to machine lan
which the control unit retrieves (or fetches) a command or data guages, which were the earliest and crudest programming lan
from the computer's memory. guages used with personal computers,
fiber-optic cable A thin strand of glass wrapped in a protec first-party cookie A cookie placed on a user's computer by the
tive coating. Fiber-optic cable transfers data by means of pulsat Web site he or she is cunentiy viewing. First-party cookies are
ing beams of light persistent and usually store preferences the user has set for view
ing the site. Some first-party cookies store information that can
field Thesmallest unit of data in a database; used to group personally identify the user.
each piece or item of data into a specific category. Fields are
arranged in a column and titled by the user, Flash A developmenttool for creating very sophisticated Web
pages; it can include moving graphics, animation, sound, and in
fifth-generation language (5GL) A high-level programming teractivity.
language that theoretically would use artificial Intelligence tech
niques to create software, based on the programmer'sdescription flash memory A special type of memory chip that combines
ofthe program. the best features of RAMand ROM. Like RAM, flash memorylets a
user or programaccess data randomly. Also like RAH, flash mem
file A set of related computer data (used by a person) or pro ory lets the user overwrite any or all of Its contents at any time.
gram instructions (used by an application or operating system) Like ROM, flash memoryis nonvolatile, so it retains data even
that has been given a name. when power is off.
file allocation table (FAT) In a diskette or hard disk, a log flash memory drive A small-format storage device that uses
created during the logical formatting process that records Uie flash memoryto hold data. This highly portable storage device is
location of each file and the status of each sector on the disk. smallenough to be carried on a keychain.
file compression See dato compression. fUt-file database A database file consisting ofa single data
table that is not linked to any othertables.
file compression utility See data compression utility.
flat-panel display A thin, lightweight monitor used in laptop
file format A standardized method of encoding data for and notebook computers. Most flat-panel displays use LCOtech
storage. nology.
file server Thecentral computer of a network; used for shared floppy See diskette.
storage. A server maystore software applications, databases, and
data files for the network's users. Depending on the way a server floppy disk See diskette.
is used, it also may be called a network server, application server.
or server. flowchart A diagram of the program controlflow.
file server network A hierarchical network strategy in which folder A tool fororganizing data stored on a disk. A foldercon
the server is used to store and forward files to the nodes. Each tains a list of files and other folders stored on the disk. A disk
node runs its own applications. can hold many folders, which can in tum store manyfiles and
other folders. Also called a directory.
file system In an operating system, a logical method for man
aging the storage of data on a disk's surface. font A family of alphanumeric characters, symbols, and punctu
ation marksthat share the same design. Modem applications pro
file transfer The process of sending a file from one computer vide manydifferent fonts and enable users to use different fonts
to another by modem or across a network. See also download and in the same document. Also catled a typeface.
upbad.
form A custom screen created in a database managementsys
file transfer protocol (FTP) A set of roles that dictate the for tem (DBMS) for displaying and entering data related to a single
mat in which data is sent from one computer to another. database record.
filter (1) A DBMS tool that enables the user to establish condi format (1) As relating to magneticstorage devices, the layout
tions for selecting and displaying a subset of records that meet of tracks and sectors in which data is stored. (2) In productivity
those criteria. (2) In an e-mail program, a tool that allows the applications, a setting that affects the appearance of a document
userto decide hew messages are handled. For example, you can or part of a document
create a filter that automatically deletes messages from a certain
sender or that stores certain messages 1na specific folder. In formatting (1) The process of magnetically mapping a disk
e-mail programs, a Alter also may be called a rule. with a series of tracks and sectors where data will be stored. Also
Glossary 569
IDE See integrated development environment. color of the background, the user's name, and so on. Initializa
tion files help programs start running or they contain informa
Identity (ID ) theft A type of crime in which a thief uses some tion that programs can use as they run.
one else’s identity to obtain money or conduct business transac
tions. This crime usually involves the theft of the victim's initializing Seeformatting.
personal information, such as a Social Security number, credit
card number, or bank account information. ink jet printer A type of nonimpact printer that produces im
ages by spraying ink onto the page.
IEEE 1394 An expansion bustechnology that supports data-
transfer rates of up to *00 Mbps. Also called FireWire. input device Computer hardware that accepts data and instruc
tions from the user. Examples of input devices include the key
IETF See Internet Engineering Taskforce. board, mouse, joystick, pen, trackball scanner, bar code reader,
microphone, and touch screen.
I6ES See In itial Graphics Exchange Specifications.
input/output (I/O) Communications between the user and the
US See Internet Information Server. computer or between hardware componentsthat result in the
transferof data.
IN See instont messaging.
input/output (I/O) device A device that performs both input
Image scanner An input device that digitizes printed images. and output functions. Modemsand network interface cards are
Sensorsdetermine the intensity of light reflected from the page, examples of input/output devices.
and the light intensities are converted to digital data that can be
viewed and manipulated by the computer. Sometimes called sim Input-processlng-output (IPO ) chart A programming tool
ply a scanner. used in the planning of a softwaredevelopment project, an IPO
chart contains three columnsthat list the program's required in
IMAP4 See Internet Nail Access Protocol Version 4. puts, processes, and outputs,
impact printer A type of printer that creates images by strik insertion point See cursor.
ing an inked ribbon, pressing ink from the ribbon onto a piece of
paper. Examples of impact printers are dot-matrix printers and installation testing During the development phase of the sys
line printers. tems development life cycle (S01C), the installation of a new sys
tem in a test environment where it is tested by the business,
implementation phase Phase 4 of the systems development
life cycle. In this phase, new software and hardware ate installed instant messaging (1M) Chat software that enables users to
In the user environment, training is offered, and system testing set up buddy lists and open a window to 'chat” when anyone on
is completed. the list is online
Incompatible The opposite of compatible. Describes the inabil instruction A command that the computer must execute so
ity of one type of hardware, software, or data file to work with that a specific action can be carried out.
another.
instruction cycle Thefirst portion of the machine cycle, which
Industry Standard Architecture (ISA ) bus A PCbus standard is the series ofsteps a CPU takes when executing an instruction.
developed by IBM, extending the bus to 16 bits. An ISA bus can During the instruction cycle, the CPU's control unit fetches a
access 6-bit and 16-bit devices. commandor data from the computer's memory, enabling the CPU
to executean instruction. The control unit then decodes the
inference engine Software used with an expert system to ex command so it can be executed.
amine data with respect to the knowledge base and to select an
appropriate response. instruction set Machine language instructions that define all
the operations a CPU can perform.
information processing cycle Theset ofsteps a computer fol
lows to receive data, process the data according to instructions integrated development environment (ID E) A programming
from a program, display the resulting information to the user, tool that provides the programmer with all of the tools needed to
and store the results. develop applications in one program; most commonly used with
3Gts and 4GLs.
Information system A mechanism that helps people collect,
store, organize, and use information. An information system does integrated pointing device A pointing device built into the
not necessarily include computers; however, a computeris an im computer's keyboard; consists ofa smalljoystick positioned near
portant part of an information system. the middle of the keyboard, typically between the g and h keys.
Thejoystick is controlled with either forefinger. Two buttons that
Information Systems department The people in an organiza perform the same function as mouse buttons arejust beneath the
tion responsible for designing, developing, implementing, and spacebar and are pressed with the thumb. One type of integrated
maintaining the systems necessaryto manage information for pointing device, developed by IBM, is called TrackPoint.
all levels of the organization.
Integrated services digital network (ISON) A digital telecom
IN I file See initialization file. munications standard that replaces analog transmissions and
transmits voice, video, and data.
In itial Graphics Exchange Specifications (ICES) One of a few
universal file formats for vector graphics, Intel A leading manufacturer of microprocessors. Intel invented
the first microprocessor, which was used in electronic calculators.
initialization (.in i) file A file containing configuration infor
mation, such as the size and starting point of a window, the
572 Glossary
joint requirements planning (JR P) A process—often used Level-1 (L I) cache A type of cache memory built directly into
during the requirements planning phase of the rapid application the microprocessor. Also called on-boardcache.
development (RAD) systems development cycle—to identify high-
level, strategic management requirements. At the heart ofJRP Levtl-2 (L2) ache A type of cache memorythat is external to
are highly structured workshops in which senior managers partici the microprocessor but is positioned between the CPU and RAH.
pate in defining the goalsand strategy of the organization and Also called externalcache.
defining the goals and priorities of the new system,
Level-3 (13) cache A type of cache memorythat is built into
joystick An input device used to controlthe movement of on the computer's motherboaid.
screen components; typically used in video games.
Lightweight Directory Access Protocol (LDAP) A set of proto
JPEG See Joint Photographic Experts Croupformat. cols used for accessing information directories such as e-mail
names and addresses stored on a mail server. The advantages of
JR P Seejoint requirements planning. LDAP are that it is veiy fast, it is simpler, and it is constructed to
work with TCP/IP. LDAP eventually should make it possible for al
K mostany application running on virtually any computer platform
to obtain directoiy information such as e-mail addresses.
KB See kilobyte.
line conditioner A device that protects hardware from electri
keyboard The most common input device, used to enter letters, cal surges and line noise.
numbers, symbols, punctuation, and commands into the com
puter. Computer keyboards typically include numeric, alphanu line noise Powerdisturbances that can be caused by high-de-
meric, cursor-movement, modifier, and function keys, as well as mandelectrical equipmentsuch as air conditioners,
other special keys.
line printer A type of impact printer that uses a special, wide
keyboard buffer A part of memorythat receives and stores the print head to print an entire line of characters at one time.
scan codes from the keyboard controller until the programcan
accept them. link See hypertext link.
keyboard controller A chip within the keyboard or the com Linux A freely available version of the UNIX operating system.
puter that receives the keystroke and generates the scan code, Developed by a worldwide cooperative of programmers in the
1990s, Linux is a feature-rich. 32-bit, multiuser, multiprocessor
keyboarding Touchtyping using a computer keyboard. operating system that runs on virtually any hardware platform.
keyword A term or phrase used as the basis for a search when liquid crystal disptay (LCD) monitor A flat-panel monitor on
looking for information on the World Wide Web. which an image is created when the liquid ciystal becomes
charged; used primarily In notebook computers,
kilobyte (KB) Equivalent to 1,024 bytes; a common measure of
data storage. liststrv An e-mailserver that contains a list of namesand en
ables users to communicate with others on the list in an ongoing
knowledge base A highly specialized database used with an discussion.
expert system to intelligently produce solutions,
local area network (LAN) A system of PCs located relatively
knowledge discovery Describes a type of database utility de near to one another and connected by wire or a wireless link. A
signed to analy2e data and report useful information. LAN permits simultaneous access to data and resources, enhances
personal communication, and simplifies backup procedures.
L
local bus An internal system bus that runs between compo
11 cache See levet-1 cache. nents on the motherboard.
12 cache See Level-2 cache. logic error A bug in which the code directs the computer to
performa task incorrectly.
13 cache See Level-3 cache.
logical field A database field that stores only one of two val
label Descriptive text used in a spreadsheet cell to describe the ues: yes or no, true or false, on or off, and so on. Also called a
data in a column or row. Boolean field .
LAN See local area network. logical formatting An operating system function in which
tracks and sectors are mapped on the surface of a disk. This map
land A flat area on the metal surface of a optical disc that ping creates the master boot record, FAT, root folder (also called
reflects the laser light into the sensor of an optical disc drive. the root directory), and the data area. Also called softformatting
See also pit. and low-levelformatting.
laptop computer See notebook computer. logical operation Oneof the two types of operations a com
puter can perform. Logical operations usually involve making a
laser printer A quiet, fast printerthat produces high-quality comparison, such as determining whethertwo values are equaL
output. A laser beamfocused on an electrostatic drum creates an Sec also arithmeticoperation.
image to which powdered toner adheres, and that image is trans
ferred to paper.
LCD monitor See liquid crystal disptay monitor.
LDAP See Lightweight Directory Access Protocol.
574 Glossary
.NET A development environment that combines several pro page, and laser printers, which use heat to adhere particles of
gramming languages, including Visual Basic C++. Cff. and J#. Us toner to specific points on the page.
ing .NET, developers can mite programs for Windows, the World
Wide Web, and PocketPC nonvolatile Thetendency for memoryto retain data even when
the computer is turned off (as is the case with ROM).
.NET Framework A set of technologies that support Web-based
applications, large databases, e-commerceservers, and distrib NOS See network operating system.
uted applications.
notebook computer A small, portable computer with an at
Netscape Fast Track A popular Web server program, developed tached flat screen; typically powered by battery or ACand weigh
by Netscape Communications. ing less than 10 pounds. Notebook computers commonly provide
most of the same features found in full-size desktop computers,
network (1) A system of interconnected computers that com including a color monitor, a fast processor, a modem, and ade
municate with one another and share applications, data, and quate RAM and storage for business-class software applications.
hardware components. (2) The act of connecting computers to Also called laptop computer.
gether in order to permitthe transfer of data and programs be
tween users. ns See nanosecond.
network attached storage (NAS) A large, dedicated storage NSFnet Acronym for National Science Foundation Network. A
device that is attached directly to a network ratherthan being network developed bythe National Science Foundation (NSF)
partof a server. to accommodate the many users attempting to access the five
academic research centers created by the NSF.
network interface card (NIC) A circuit board that controls the
exchange of data over a network. n-tier application A distributed database application that is
divided among morethan three computers.
network news transfer protocol (NNTP) A set of rules that
enable news servers to exchange articles with other news servers, numeric field A database field that stores numeric characters.
network operating system (NOS) A group of programs that numeric keypad The part of a keyboard that looks and works
manage the resources on a network, like a calculator keypad; it has 10digits and mathematical opera
tors.
network operations center (HOC) A professionally managed
facility that houses high-volume Web servers. o
network protocol A set of standards used for network commu object In object-oriented programming, a data item and its as
nications. sociated characteristics, attributes, and procedures. An object's
characteristics define the type of object—for example, whether it
network server Seefile server. is text a sound, a graphic or video. Attributes might be color,
size, style, and so on. A procedure refers to the processing or
network storage Refers to one or moreshared storage devices handling associated with the object
attached to a network.
object code The executable file in machine language that is
network version An application program especially desfgned to the output of a compiler.
work within a network environment Users access the software
from a shared storage device. object embedding The process of integrating a copy of data
from one application into another, as from a spreadsheet to a
news A public bulletin board service on the Internet* organized word processor. The data retains the formatting applied to it in
into discussion groups representing specific topics of interest, the originalapplication, but its relationship with the original file
is destroyed.
news server A host computer that exchanges articles with
other Internet servers. object linking The process of integrating a copy of data from
one application into anotherso that the data retains a link to
newsgroup An electronic storage space where users can post the originaldocument Thereafter, a change in the originaldocu
messages to other users, carry on extended conversations, and ment also appears in the linked data in the second application.
trade information.
Object Linking and Embedding (OLE) A Windows feature that
newsreader A software program that enables the user to post combines object embedding and linking functions. OLE allows the
and read articles in an Internet newsgroup. user to construct a document containing data from a single point
in time or one in which the data is constantly updated.
NIC See network interface card.
object-oriented programming (OOP) A programming technol
NNTP See network news transferprotocol. ogy that makes use of reusable, modularcomponents, called ob
jects.
NNTP server Another name for news servers using the network
news transfer protocot object-oriented systems analysis (OOSA) A systems develop
ment methodology.
NOC See network operations center.
OCR See optical characterrecognition.
node An individual computer that is connected to a network,
nonimpact printer A type of printer that creates images on pa
per without striking the page in any way. Two common examples
are inkjet printers, which spray tiny droplets ofink onto the
Glossary 5771
parallel processing Theuse of multiple processors to run a peer-to-peer (P2P) network A network environment in which
program. By harnessing multiple processors, which share the pro* alt nodes on the network have equal access to at least some of
cessing workload, the system can handle a much greater How of the resources on all other nodes.
data, complete moretasks in a shorter period of time, and deal
with the demands of many input and output de/ices. Also called peer*to*peer (P2P) service A special type of connection pro
multiprocessing (H P) or symmetric multiprocessing (SMP). vided via the Internet which allows connected client computers
to communicate and exchange data directly instead of using
passive matrix LCO Liquid ciystal display technology used for server computers.
flat-panel monitors; it relies on a grid of transistors arranged by
rows and columns. In a passive matrix LCD, the color displayed pen An input device that allows the user to write directly on or
by each pixel is determined by the electricity coming from the point at a special pad or the screen of a pen-based computer,
transistors at the end of the row and the top of the column, such as a PDA. Also called a stylus.
password A word or code used as a security checkpoint by an Peripheral Component Interconnect (PC I) bus A PC bus stan*
individual computer system or a network to verify the user's dard developed by Intel' it supplies a high-speed data path be
Identity. tween the CPU and peripheral devices.
password capture A technique used by hackers and identity Pert A scripting language commonly used in the development
thieves to learn passwords or other personal information from a ofWeb-based applications.
victim. In password capture, the thief listens to or records tele
phone conversations or intercepts network transmissions in persistent cookie A cookie that remains on the user's hard
hopes of gathering the right information. disk after the current browsing session is ended. Persistent cook
ies are usually set to ‘expire* on a certain date; until then, they
password guessing A technique used by hackers and identity remain active.
thieves to learn passwords or other personal information from a
victim. In password guessing, the thief attempts to log into a personal computer (PC) The most common type of computer
network or Web site by guessing the victim's password. found in an office, classroom, or home. ThePC is designed to fit
on a desk and be used by one person at a lime; also called a mi
password sharing A technique used by hackers and identity crocomputer.
thieves to learn passwords or other personal information from a
victim. In password sharing, the victim unwittingly gives his or personal digital assistant (PDA) A very small portable com
her password to the thief by writing it down in a conspicuous puter designed to be held in one hand; used to perform specific
place or telling it to someone else. tasks, such as creating limited spreadsheets or storing phone
numbers.
Paste command An application command that copies data from
the Clipboard and places it in the document at the position of personal information manager (PIM ) A software program used
the insertion point Data in the Clipboard can be pasted into for collecting and refining information about people, schedules,
multiple places in one document, multiple documents, and docu and tasks. PlMs are also called contact-manogemenl software or
ments in different applications. contact managers, because these programs are used primarily for
managing information about people the user commonlycontacts.
payload In a packet the actual data being transmitted across
a network or over telephone lines. Also refers to the executable phishing A technique used by hackers and identity thieves to
portion of a computer virus or the output produced by a virus. learn passwords and other important information fromvictims.
In phishing, the thief contacts victims via phone or e-mail pre
PC See personalcomputer. tending to be a legitimate business such as a bank, then asks the
victim for private information.
PC Card A specialized expansion card the size of a credit card;
It fits into a computer and is used to connect new components. photo-editing program A multimedia software tool used to
make modifications, including adjusting contrastand sharpness,
PC DOS A version of the disk operating system marketed by IBM to digital photographic images.
Corp.
photo printer A special color printer used for outputting
PC-to-TVconverter A hardware device that converts a com photo-quality images. These printers are typically used to print
puter's digital video signals into analog signals for display on a images captured with a digital camera or an image scanner.
standard television screen.
PhotoCD A special optical disc technology, developed by Ko
PC video camera A small video camera that connects to a spe dak. for digitizing and storing standard film-based photographs.
cial video card on a PC. When used with videoconferencing soft
ware, a PCvideo camera enables users to capture full-motion photorealistic Describes computer-generated images that are
video images, save them to disk, edit them, and transmit them to lifelike in appearance and not obviously models.
other users across a network or the Internet.
PICT Abbreviation for picture. A graphics file format developed
PCI See Peripheral Component Interconnect bus. for and commonly used on the Macintosh platform, but seldom
used on the PC platform.
PDA See personaldigital assistant.
PIM See personal information manager.
G lossary 579
print head In impact printers, a device that strikes an inked publish See post.
ribbon, pressing ink onto the paperto create characters or
graphics. Q
print server A special network server that is devoted to manag QBE See Query by example.
ing printing tasks for multiple users. A print servermakes it easy
for many users to share a single printer. query In a database managementsystem (OBMS), a search
question that instructs the program to locate records that meet
printer An output device that produces a hard copyon paper. specific criteria.
Two types are impact and nonimpact.
query by example (QBE) In a database management system
Privacy Actof 1974 A federal law that restricts federal agen (OBMS). a toolthat accepts a query from a user and then creates
cies from sharing information about individuals without their the SQL code to locate data requested by the query. QBE enables
written consent the user to query a database without understanding SQL
private IP address An IP address that is reserved for use by a Quick Launch bar A customizable area of the Windows taskbar
specific organization's computer. that lets you launch programs with a single dick.
processing A complex procedure by which a computer trans R
forms raw data into useful information,
RAD See rapid application development.
processor See centralprocessing unit (CPU) .
RAID 0 A data storage technology (also called striping) that
program (1) A set of instructions or code to be executed by the provides the user with rapid access by spreading data across sev
CPU; designed to help users solve problems 01 perform tasks. Also eral disks in a disk array. Striping alone, however, does not pro
called software. (2) To create a computer program. The process of vide redundancy. If one of the disks in a striped array fails, the
computer programming is also called software development. data is lost.
program control flow The order in which a program's state RAID 1 A data storage technology (also called mirroring) in
ments are executed when the program is run. which data is written to two or more disks simultaneously, pro
viding a complete copy of all the information on multiple drives
programmable read-only memory (PROM) A type of computer in the event one drive should fail. This improves reliability and
chip whose contents cannot be changed. PROM chips are often availability, and if one disk fails, the mirrored disk continues to
found on hard drives and printers. They contain the instructions function, thus maintaining reliability and availability.
that power the devices. These instructions, once set never need
to be changed. RAID 4 A data storage technology (also called striping-witfh
parity) in which data from each file is spread over multiple disks.
programmer The person responsible for creating a computer It provides the speed of striping with the safety of redundancy
program, including writing new code and analyzing and modify because the system stores parity information that can be used
ing existing code. to reconstruct data if a disk drive fails. Such arrays also provide
error-checking.
programming language A higher-level language than machine
code for writing programs. Programming languages use variations RAM See random access memory.
of basic English.
random access memory (RAM) A computer's volatile or tem
PROM See programmable reod-ontymemory. porary memoiy, which exists as chips on the motherboard near
the CPU. RAM stores data and programs while they ate being used
prompt In a command-line interface, the on-screen location and requires a power source to maintain its integrity.
where the user types commands. A prompt usually provides a
blinking cursor to indicate where commandscan be typed. Also random access storage device A storage device that can locate
called a commandprompt. data at any point on the storage medium without going through
all the data up to that point. Floppy disks, hard disks, and opti
protocol A set of rules and procedures that determine how a cal discs are examples of random access storage devices.
computer system receives and transmits data,
rapid application development (RAD) A method used in sys
prototype A working system model used to clarify and refine tems development that allows for fast creation of computer sys
system requirements. tems and applications in an organization.
pseudocode “Fake' code; a text version of the program control raster See bitmap.
flow; similar to the program code but lacking the exact syntax
and details. read/write head The magnetic device within the disk drive
that reads, records, and erases data on the disk’s surface. A
public domain software Software that is freely available to read/write head contains an etcctromagnetthat alters the polar
anyone, free of charge. Generally, users can modify the source ity of magnetic particles on the storage medium. Mostdisk drives
code of public domain software. have one read/write head for each side of each disk in the drive.
public IP address An IP address that is available for use by any
computer on the Internet
public record A legal document such as driving records or mar
riage licenses, that is available for viewing by anyone.
Glossary 581
read-only memory (ROM) A permanent, or nonvolatile, mem* Right to Financial Privacy Act of 1978 A federallaw that re
cry chip used to store instructions and data, including the com quires companies to give consumers notice oftheir privacy and
puter's startup instructions. information-sharing practices.
real-time application An application that responds to certain ting topology A network topology in which network nodes are
inputs extremely quickly—thousandths or millionths of a second connected in a circular configuration. Each node examines the
(milliseconds or microseconds, respectively). Real-time applica data sent through the ring and passes on data not addressed
tions are needed to run medical diagnostics equipment, life-sup- to it.
port systems, machinery, scientific instruments, and industrial
systems. RISC See Reduced Instruction Set Computing.
real-time operating system An operating system designed to ROM See read-only memory.
support real-time applications.
root folder The top-level folder on a disk. This primary folder
record A database row composed of related fields; a collection contains all other folders and subfolders stored on the disk. Also
of records makes up the database. called the root directory, or sometimesjust the root,
Reduced Instruction Set Computing (RISC) Refers to a type router A computer device that stores the addressing informa
of microprocessor design that uses a simplified instruction set; it tion of each computer on each LAN or WAN; it uses this informa
uses fewer instructions of constant size, each of which can be ex tion to transfer data along the most efficient path between
ecuted quickly. nodes of a LAN or WAN.
redundant array of independent disks (RAID) a storage sys RSI See repetitive stress injury.
tem that links any numberof disk drives (a disk array) so that
they act as a single disk. This Is done for better performance rule Seefitter.
and/or redundancy.
ruler An on-screen tool in a word processor's document win
refresh rate The number of times per second that each pixel on dow. The ruler shows the position of lines, tab stops, margins,
the computer screen is scanned; measured in hertz (Hz), and other parts of the document
register High-speed memorylocations built directly into the run See execute.
A lii and used to hold instructions and data currently being
processed. s
relational database A database structure capablc of Unking ta SAN See storage area network.
bles; a collection of tables that share at least one common field.
scalability A program's capability to adjust to changes In
Remote Access VPN Special networking software that allows a scale—the number of users it must support or the numbers of
user to create a secure connection to a private network via the tasks it must perform.
Internet.
scanner See image scanner.
repeat rate A keyboard setting that determines how rapidly the
character is typed and how long an alphanumeric key must be screen saver A utility program that displays moving images on
held down before the character will be repeated, the screen if no input is received for several minutes; originally
developed to preventan image from being burned into the
repetition structure A control structure in which a condition is scrccn.
checked and a loop is executed based on the resultof the condi
tion. Also called looping structure. scroll To move through an entire document in relation to the
document window in order to see parts of the document not cur
repetitive stress injury (R SI) An injury to some part of the rently visible on screen.
body caused by continuous movement. Computer-related injuries
include strain to the wrist, neck, and back, scroti bar A vertical or horizontal bar displayed along the side
or bottom of a document window that enables the user to scroll
report A database product that displays data to satisfy a spe horizontally or vertically through a document by clicking an ar
cific set of search criteria presented in a predefined layout, row or dragging a boxwithin the scroll bar.
which is designed by the user.
SCSI See Small ComputerSystem Interface.
resolution Ihe degree of sharpness of an image, determined by
the numberof pixels on a screen; expressed as a matrix, SOLC See systems development life cycle.
resolver A network device that converts logical IP addresses SOSL See Synchronous DSL.
into physical addresses.
search engine A Web site that uses powerful data-searching
restore To replace a damaged or missing file on a hard disk techniques to help the user locate Web sites containing specific
with a copy from a backup. types of content or information.
right-click To use the right mouse button of a two-button second-generation language Refers to assembly language,
mouse to select an object or command on the screen. which is slightly more advanced and English-like than machine
languages (which are considered first-generation languages).
S82 Glossary
Urheberrechtlich gescl
second-level domain (SLD) A domain namegiven to an orga shortcut Any means that enables the userto quickly execute an
nization. In the URL www.government.org, for example, govern action or issue a command. Onthe Windows desktop, for exam
ment is the second-level domain. ple, icons serve as shortcuts by allowing you to quickly launch
programs. Within programs, you may be able to click buttons or
secondary e-mail account A backupe-mail account that can press specific keys to quickly perform tasks; these buttons and
be used as a collection place for spamand other unwanted e-mail keystrokes are also shortcuts,
messages.
shortcut menu See contextmenu.
sector A segment or division of a track on a disk.
shoulder surfing A method used by hackers and identity
Secure Hypertext Transfer Protocol (HTTPS) An Internet pro thieves to (earn passwords and other personal information from
tocol used to encrypt individual pieces of data transmitted be their victims, in shoulder surfing, the thief watches as the victim
tween a user's computer and a Web server, making the data enters a password or other information at a computer, ATM,
unusable to anyone who does not have a key to the encryption phone, or other device.
method.
S-HTTP See Secure Hypertext TransferProtocol.
secure sockets layer (SSL) An Internet protocol that can be
used to enaypt any amount ofdata sent over the Internet be SIN M See Single In-line Memoiy Module.
tween a client computer and a host computer.
Simple MallTransfer Protocol (SMTP) A common protocolfor
secure Web page A Web page that uses one or more encryption sending e-mail between servers on the Internet. It also often is
technologies to encode data received from and sent to the user, used for sending e-mail from an e-mailclient to a server.
seek time See average access time. Single In-Line Memory Module (SIMM) Onetype of circuit
board containing memorychips.
select (1) To highlight a block of text (in a word processor) or
range (in a spreadsheet), so the user can perform one or more single-user/multitasking operating system An operating sys
editing operations on it (2) Toclick once on an icon. tem that supports only one user at a time, but allows the user to
perform multiple tasks simultaneously, such as running several
selection structure A control structure built around a condi programs at the same time. Examples include Windows and the
tional statement Macintosh operating system.
sequence structure A type of control structure in which a single-user/single-tasking operating system An operating
computer executes lines of code in the order in which they are system that supports only one user at a time and allows the user
written. to perform only one task at a time. Examples include MS-DOSand
some operating systems designed for useon handheld computers,
sequential access device A storage device that must search a
storage medium from beginning to end in order to find the data site license An agreement in which an organization purchases
that is needed. Such devices cannot access data randomly. A tape the right to use a program on a limited number of machines. The
drive is an example of a sequential access device. total cost is less than would be required if individual copies of
the software were purchased for all users,
serial interface A channel through which data bits flow one at
a time. Serial interfaces are used primarily to connect a mouseor site-to-site VPN A special type of networking software that
a communications device to the computer. Also called a serial can be used to connect two networks together in a secure man
port. ner. Both networks may be part of the same private intranet or
they may be networks of partner companies participating in an
serial port See serial interface. extranet.
server SeefHe server. SLD See second-leveldomain.
session cookie A cookie that remains on the user's hard disk slide An individual graphic that is part of a presentation. Slides
only during a Web-browsing session. The cookie is deleted when are created and edited in presentation programs.
the session ends. Also called a transient cookie.
Small ComputerSystem Interface (SCSI) A high-speed inter
shadow mask In a cathode ray tube (CRT) monitor, a fine mesh face that extends the busoutside the computer, permitting the
madeof metal fitted to the shape and size of the screen. The addition of more peripheral devices than normally could be con
holes in the shadow mask’s mesh are used to align the electron nected using the available expansion slots.
beams to ensure that they strike the correct phosphor doL In
most shadow masks, these holes are arranged in triangles, smaU outline DIMM (SO-DIMM) A small-formal memorychip
found in portable computers.
shareware Software that can be used without paying a fee or
registering for a specified time period. After that time, the user smart card A plastic card—about the same size as a standard
is obligated to purchase and/or registerthe product. credit card—that contains a small chip that stores data. Using a
special device, called a smart card reader, the user can read data
shell Refers to a GUI environment that can run on top of a from the card, add new data, or revise existing data,
command-lineoperating system, such as Linux or UNIX,
smart card reader A device that can read data from or write
shopping cart At many e-commerce Web sites, a feature that data to a smartcard.
lets the shopper store, review, and edit items to be purchased
before checking out.
Glossary 563
USA Patriot Act A federal law (enacted in 2001) that extends viewing angle The widest angle from which a display monitor's
the authority of law enforcement and intelligence agencies in image can be seen clearly. Generally speaking, cathode ray tube
monitoring private communications and access to your personal (CRT) monitors provide a wider viewing angle than Uquid crystal
information. display (LCD) monitors do.
USB See Universal Serial Bus. viewing area The actual portion of a computer monitorthat
displays an image.
us«r The person who inputs and analyzes data using a com
puter; the computer's operator. virtual memory Space on a computers hard drive that acts as
a backup to system RAM. Programs can store instructions or data
User Datagram Protocol (UDP) A transport protocol that Is in virtual memorythat is not needed immediately; when an in
sometimes used instead of the more common TCP (Transport Con struction or data is needed, it can quickly be moved into RAM.
trol Protocol) for sending messages across a network, where the processor can access it.
user ID See user name. virtual private network Technologies that allow data to be ex
changed securely and privately over a public network, such as the
user Interface Theon-screen elements that enable the user to Internet.
interact with the software.
virus A parasitic programthat infects another legitimate pro
user name A code that identifies the user to the system; often gram. sometimes called the host. ToInfect the host program, the
the user's M l name, a shortened version of the user's name, or virus modifies the host so that it contains a copy of the vims,
the user's e-mail name. Also called a userID.
virus definition A database of information aboutspecific
user session The period during which a user interacts with a viruses that enables an antivirus program to detect and eradicate
terminal server, using a shared program on a network. viruses. Also called a virus pattern.
utility A software program that may be used to enhance the virus pattern See virus definition.
functionality of an operating system. Examples of utility software
are disk defragmenters and screen savers. Voice over Internet Protocol (VoIP) A protocolthat allows
voice data to travel over the Internet
V
voice recognition See speech recognition.
value A numericalentry in a spreadsheet—representing cur
rency, a percentage, a date, a time, a fraction, and so on—that VoIP See tWice over Internet Protocol.
can be used in calculations.
volatile Thetendency for memoryto lose data when the com
vector A mathematical equation that describes the position of puter is turned off, as is the case with RAM.
a line.
VPC Acronym for virtual private connection. See virtualprivate
very small aperture terminal (VSAT) An earth-based commu network.
nications station that allows an individualor organization to
connect to the Internet via satellite. VPN See virtualprivate network.
V6A See Video Graphics Array. VRAM See video RAM.
video capture card A specialized expansion board that enables VSAT See very smotl aperture terminal.
the user to connect video devices—such as VCRs and cam
corders—to the PC. This enables the userto transfer images from vulnerability Any aspect of a system that is open to harm. For
the video equipment to the PC, and vice versa. Manyvideo cards example, if a computer does not have antivirus software, this is a
enable the user to edit digitized video and to record the edited vulnerability because the system can easily become infected by a
images on videotape. virus.
video card A circuit board attached to the motherboard that W
contains the memory and other circuitry necessary to send infor
mation to the monitor for display on screen. This controllerde WAN See wide area network.
termines the refresh rate, resolution, and numberof colors that
can be displayed. Also callcd thc disptay adopter. WAP See wireless access point.
Video Graphics Array (VGA) An IBM video display standard ca war driving The act of searching an area covered by a Wi-Fi
pable of displaying resolutions of 640 ■<480, with 16 colors. network to locate spots where wireless Internet access is avail
able.
video RAM (VRAM) Memoryon the video controller (sometimes
called dual-ported memory) that can send a screen of data to the Web browser A programthat enables the user to view Web
monitor while receiving the next data set. pages, navigate Web sites, and move from one Web site to an
other. Also called a browser.
videoconference A live, real-timevideo communications ses
sion involving two or more people using computers, video cam Web bug A GIF-format graphic file, placed In a Web page or
eras. telecommunications and videoconferencing software. HTMl-format e-mail message, that can be used to track a per
son's online activities. Web bugsare commonly considered to be
a form of spyware.
588 Glossary
Urheberrechtlich gesct
Chapter 6 TIMELINE
p. 231 both PhotocourtesyofNeuralSignals, Inc; 6B.10 p. 544*1965Computer HistoryMuseum; p. 544*1970 Lucent
palmOne, Zire, Tungsten,Treo, logos, stylizations,anddesign Technologies Inc/Bell Labs; p. 544-1971 Photo courtesyof
marksassociatedwith all the preceding, andtrade dress IntelCorporation; p. 545*1972 W. Cody/Corbiv p. 545*1973
associatedwith palmOne, Inc.'s products, are amongthe Courtesy IBM; p. 545*1974 PhotocourtesyofIntel Corporation;
trademarksor registeredtrademarksownedbyorexclusively p. 546*1975,1976 Computer HistoryMuseum; p. 546*1977
licensed to palmOne. Inc; p. 23S top Photographers Courtesy AppleInc; p.547-1978 Photocourtesyof Intel
Choice/GettyImages; p. 235 bottom Jose Luis Pelaez/Corbis. Corporation; p. 547-1980 left CourtesyMicrosoft* P. 547*1980
right Boxshotof Lotus 1*2*3(copyright 1980) IBM Corporation.
Chapter 7 Usedwith permission of IBM Corporation. Lotus and 1*2*3are
trademarks of IBM Corporation.; p. 548*1981 top Computer
7A.1 Christian Hoehn/GettyImages; 7A.17, 7A.18,7A.19, History Museum: p. 548*1981 bottom Courtesyof IBM Corporate
7A.21 Aaron Haupt; 7A.22, 7A.23 PhotocourtesyofLlnksys; Archives; p. 548-1982 Photocourtesy Hewlett-Packard;
7A.26 CourtesyTrippLite; p.261 CourtesySymantec; 7B.1 Javier p. 549*1983 PhotocourtesyHewlett-Packard; 1984 Paul
Pierfni/Corbts; 7B.3 CourtesyU.S. Robotics; 7B.4 CourtesyZoom Sakuma/APWide World; 1985 left CourtesyMicrosoft* 1985
Technologies; 7B.5 CourtesyIBM; 7B.9 Photocourtesyof right Photocourtesy Hewlett-Packard; 1986,1987 left Courtesy
Linksys; 78.10 D*LinkSystems, Inc.; p. 271 EpsonAmerica, Inc; ofIBM CorporateArchives; 1987right CourtesyApple Inc.;
p. 277Jim Craigmyle/Corbis. 1988Shahn Kermani/GettyImages; 1989 left Photo courtesyof
IntelCorporation; 1969 right DonnaCoveny/MITNews; 1990
Chapter 8 left CourtesyMicrosoft* 1990rightCourtesyIBM; 1991 left
PaulSakuma/APWideWorld; 1991 right CourtesyofAppleInc;
8A.1 Bettmann/Corbis; 8A.2 Salus, CASTINGTHE NET: FROM 1992 CourtesyIBM; 1993 left CourtesyNationalCenter for
ARPANETTOINTERNET ANDBEYOND, p. 300. • 1995Addison-
Wesley Publishing CompanyInc Reprinted by permissionof SupercomutingApplications andthe Board ofTrusteesofthe
Pearson Education, Inc Publishing as Pearson Addison Wesley.; University ofIllinois.; 1993 right Reproducedwith Permissionof
p. 305top Dennis Degnan/Corbis; 8B.1 Courtesy Research in Motorola, Inc; 1994 bottom REDHATis a registered trademark
Motion. of Red Hat Inc.; 1995left CourtesyMicrosoft; 1995 right
eBay"* is a trademarkof eBay Inc; 1996 left Amanita Pictures;
Chapter9 1996right PaulSakuma/APWideWorld; 1997 left Photo
courtesyof Intel Corporation; 1997 right 1998 left Amanita
9A.1 MichaelNewman/Photoedit; 9A.3 Courtesy3Com; 9B.2 Pictures; 1998 right 1999 Aaron Haupt* 2000 left Amanita
DiMaggio/Kalish/Corbis; 9B.3 DavidYoungWolff/Photoedit: Pictures; 2000 center PhotocourtesyAMD2004; 2000 right
9B.12 WalterHodges/Corbis;9B.14John Henley/Corbis. PhotocourtesyofIntel Corporation; 2001 left Courtesy
Microsoft* 2001 centerCourtesyApple, Inc; 2001 rightAPWide
Chapter 10 World; 2002 top SteveChenn/Corbis; 2002 bottom left Courtesy
Handspring. palmOne, Zire, Tungsten,Treo, logos, stylizations,
10A^4, p. 393 topMarkBurnett* 10B.5 Amanita Pictures; anddesign marksassociatedwith all the preceding, andtrade
10B.il RF/Corbis; 10B.14 Kobal collection; 10B.15 Aaron dressassociatedwith palmOne. Inc's products, are amongthe
Haupt* p.520 DougMartin. trademarksor registeredtrademarksowned byorexclusively
licensed to palmOne, Inc; 2002 center Denis Pbroy/APWide
Chapter 11 World; 2002 bottom right OpenOffice.org; 2003 le ftc Robin
Scholtz; 2003 rightCourtesyApple, Inc; 2005 Photocourtesy
p. 431 Charles Gupton/Corbis. of Nokia.
Chapter 13
13A.1 VCl/GettyImages; 13A.2 MichaelS. Yamashita/Corbis:
13A.4 Kevin R. Monis/Corbis; 13A.5 ChuckSavage/Corbis;
13A.7 RF/Corbii; 13A.12 CourtesyAmerican PowerConversion;
13A.13 CourtesyComputerProducts, Inc; 13A.15
RF/Comstock/GettyImages; 13B.1 SpencerGant/Photoedit;
138.13 PhotocourtesyofLinksys; 13B.17 Propertyof Fellowes;
13B.18,138.19 DavidYoungWolff/Photoedit* p. 507 Photodisc
Red/GettyImages; p. 511 PaulSakuma/APWideWorld.
592 Credits
Index
Symbols and Numbers Apple I computer. 540 Barry's Clipart Server, web sites. 520
Apple II computer. 540 basic input output system
.NET Framework, function of, 232 applets. 460
.NET programming language. 460-461 application servers, 245 (BIOS), 112
lOBase-T, Ethernets and, 259 application software, review questions basic rate integrated services
100Base-T, Ethernets and, 259
3-0animation software. 389-390 and, 379-382 digital network. 222
3-D modeling programs. 389 applications batch (.bat) files. 441
802.11b. wireless networks, 225 Bellmac-32. 541
802.1lg. wireless networks, 225 distributed applications, 212 Berners-lee. Tim, 294. 546
real-time applications, 2126 Best Buy, web sites, 349
A_Backup utility, 2IZ Archie, websearches and, 320
Aberdeen Group, spam statistics and, 316 architecture, processors and, 141 billions of instructions persecond
Accelerated Graphics Port (AGP) bus. 112 archive files, 191 (BIPS), 111
accounting programs, QuickBooks. 16 arithmetic logic units, HQ
active matrix LCDtechnology. 92 articles, newsgroups and, 318 Bimodal viruses, 534
Active Server Pages (ASP). 465 Artificial Intelligence. 466-467 binary fields, 408
active windows. 209 ethical issues and. 475 binary large objects (BLOBs), 408
ActiveX programming language. 460 ASCII Codes, 129 binary numbersystems, 122
adapters, expansion boards. 155 assemblers, 458 Bioacoustics Research Program
address boob. 378 assembly languages, 458-459
address bus, 112 Asynchronous OSL (ADSL). 313 (BRP), 102-103
Advanced Micro Devices (AMD) asynchronous transfer mode (ATM). 224 Bipartite viruses. 534
Athlon processors. 149 (BitMaP) format 3B5
processors, i£& 554 audio bitmapped images. 384
Advanced Research Projects Agency headphones. 102 bitmaps. Standard Formats for Bitmap
headsets, 103
(ARPA). 286 overview and, 82 Graphics, 385-386
adware, security and. 482 sound cards, 100-101 bits, 12Z
airbrush tools, repairing a scratched image sound systems, 10Q-1Q3 bits per second (bps), 268
streaming audio, 291 blocks, definition of, 362
with, 388 audio input, other types of, 26 blogs, 552
algorithms, 445,448-449 Audio-conferencing, 246 Bloodhound Heuristics, 447
audiovisual input devices. 74-76 Blu-Ray laser drives, 181
complexity of, 448 review questions and, 80-85 blueprints, construction
intractable problems and. 449 authoring environments. 461
tractable and. 448-449 AutoCAD. 3-Dprojects, 542 ocuments. 388
all-in-one peripherals, 112-113 automatic vehicle location (AVL) boards, expansion boards, 155
Allen. Paul 540-541 Bombs. 534
alphanumeric keys, keyboards and. 50 software, 312 bookmarks. 297-298
ALTkey, keyboard shortcuts, 60 automobiles, on-board computer Boolean operators, 302-303
Altair 880, 540
AltiGen, 156 system, IS Google, 304
always-on connections. 505 Automotive mechanics, computer bootsector viruses, 534
AMD processors, 149 boot sectors, 120
American National Standards Institute systemsand. 41 booting, 120
autonomous acoustic recording Brain Communicator, 210
(ANSI). 193 branching structures. See selection
American Standard Codefor Information devices, 102
average access time, drive structures
Interchange (ASCII), 128 brick-and-mortarstores. 142
analog systems, 4 performance, 188 bridges, definition of, 252
AngelFire. web sites, 524 broadband connections. 222*
Animators, careers in multimedia, 393 B
anonymous FTParchives, 319 sharing and, 340
anti-adware utilities, 502 backbones, networking and. 287 browsers. 290-291
anti-spam lam. web sites, 484 backing up your data. 17.4=175
anti-spyware utilities, 502 backup utility, 212 closing and, 298
antiglare screens, 28 band printers. 109 getting help with browsers, 299
antivirus programs, 447 Bank of America, web sites. 350 launch your browser, 296
antivirus utility, 212 banking using browsers in World Wide
online banking and finance, 349-350 Web. 295=299
online services and, 15 using navigation tools, 298
bar code readers, 21 using site-specific search took, 302
Barty, Mark, 234 buddy list instant messaging and, 321
buffers, keyboard buffer, 54
Bundled hardware, 530
Bureau of Labor Statistics
computer support specialists. 215
Index 593
8schut2tes
Bureau of Labor Statistics—cone. central processing unit (CPU), 2& computer programs. See also software
Income of computer scientists and. CERTCoordination Center, viruses and, 536
511 Changing Your PCs Operating algorithms, 445
Internet careers and. 354-355 antivirus programs, 447
multimedia employment. 393 System, 218-212 batch (.bat) files, 441
networking statistics and. 221 channels, discussionsgroups and. 321 code. 441-442
sales earnings and. 152 character formatting. 362
technical writers and, 323 characters per second (cps), printers code branches. 449
compilers. 443
bus, definition of. 135 and, 109 definition of. 440-441
bus standards. 122 chat. Internet relay chat (IRC), 320 development life cycles, 465-468
bus topology network, 254 chat rooms, 321 dynamic link library (.dll) files, 440
Bush, Vannevar, 4
business, e-commerce and, 350-35* chips executable (.exe) files, 440
business logic, 421 making of, 150 exit conditions, 450
business programmers, <69 flowchart algorithms, 445-446
business-to-business (B2B) universal asynchronous receiver- help (.hip, .chm) files, 440
transmitter (UART), 152 heuristics, 446-447
transactions, 350-351 initialization (.In i) files, 440
business-to-consumer (B2C) circuit boards, processing devices, 2fl input-processing-output (IPO)
transactions, online shopping click-and-mortar stores, 347 charts, 444
and, 346 client/server networks, 250-251 interpreters, 443-444
bytes
data abd, 121 clip art. 386 interrupts, 441
definition of, 23 loops, 450
Clipboards, 215 machine codes. 442
c definition of, 213 object-oriented programming
Cprogramming language, 459 clock cycles, 136 (OOP). 449-451
C++programming language, 459 overview of, 439
cable modem services, 273-274. 334 clock speeds, 136 planning and. 444
cabling equipment. 258-26Q clocks, internal, 136 program control flow, 445
cache memoiy, l3fl Cluster Viruses. 534 programming, 442
caches programming languages, 442-443
clusters, & 120
Level-1 (11) caches, 133 CMYK color process, 110 pseudocode. 444
(12) caches. 132 repetition structures. 450
CNet web sites, 397
Level-3 (13) caches. 133 CHETShopper, web sites, 528 review questions and, 452-455
CAD programs, construction selection structures, 449-450
CNN. web sites. 223.302 sequence structures, 449
documents, 388 Coalition of EssentialSchools (CES), source codes, 442
cameras, digital 22=28 structured programming, 448-449
campus area networks (CAN). ZM student portfolios. 192 computer scientists, 510-511
CAN-SPAMAct Of 2003, 484 coaxial cables. 255 computer skills, ethical issues and, 4Z
Canvas Systems, Zfl codes computer systems
cards computerized disease
ASCII Codes. 129
expansion boards, 155 Extended Binary Coded Decimal management 36
PC Cards, l&fi data and, 25=26
careers in outsourcing, 134=335 Interchange Code. 122 dissecting the ultimate machine. 24
carpal tunnel syndrome, 61-6? text codes, 127-12B information processing cycle. 26-27
Case, Jennifer, 430-431 Input and Output Devices, 30-31
cathode ray tube (CRT), £3 color monitors. B9-Q0 memoiy devices, 29
CD-Recordable (CD-R) drive, 32,12& parts of, 25-26
CD-ReWritable (CD-RW) discs, 32 dot pitch and, 96 review of, 42-4S
CD-Rewritable (CD-RW) drives. lZfi columns, in databases, 404 software and, 25
CD-ROMdrives, 22 command-line interfaces, 211-212 users and, 26
CD-ROMs, 176-177 commercialsoftware, 364 computer training specialists, 116-117
Cedant Web Hosting, web sites, 524 common buses, performance specifications computer users, 3B-3Q
cell addresses, 369-370
cell pointers, 359 of, na installing software, 38
cells. 369 maintaining the system, 39
graphics and, 2ZQ Common User Access (CUA), 60 managing files, 39
running programs. 39
594 Index Communications OecencyAct 549 setting upthe system, 3&
communications devices, 31
Compact Disc Read-Only Memory
(CD-ROM). 32
compact discs (CDs). 22
Compaq Portable computer, 543
compilers, 443
complex instruction set computing (CISC)
processor. 150
CompTIA. 430-431
computer data. 34-35
Computer Emergency Response Team
(CERT), web sites, 492
Ur tfes
Computer-aided design (CAD) computers—cont. Courier services, 41
programs. 388-389 network servers, B=9 CPU
Notebook computers. 5=2
computer-generated animation, 390 Online shopping for. 531 billions of instructions persecond
computer-generated imaging (CGI), 389 online spying tools, 481 (BIPS), 131
computer-related ailments, 484 organizations and. 8-10
overview of, 2 bus speed vs. CPU speed, 136
computerviruses PCor Madntosh?, 529 cache memoryand, 138
categories of. 534 personal digital assistant (PDA), Z decoding and, 131
definition of. 532-533 productivity tips and. 12 definition of, 130
effects of, 533-534 representation of data and, 126-128 executing and. 131
resource forstudy and, 15 factors affecting processing speed, 133
computerized disease management, 25 review questions and, 20-23 fetching and. 131
computerizedvoting, 62-63 shopping for, 526-528 overview of. 146
computers small business and, 15-16 performance spedfications and, 150
society and. 11=18 storing and. 131
accepting input from the speech recognition and. 74-73 creating
keyboard, 53-54 standard computer ports, 152 charts in PowerPoint, 375
storage needs and, 529 macrosand. 326
career uses and, 322-323 storing computer equipment, 509-510 presentation programs and. 374-375
careers in multimedia, 392 Supercomputers, 10-11 creativePOST Inc.. 392
careen in outsourcing, 194-195 tablet PCs, Z credit reports. 499
complex hardware configurations. 13 To Bundle or Not to 8undle?, 530 Critical Infrastructure Protection Board
computer-based phone systems, 156 trust issues and spam. 316
computer training specialists, tifi- iiy userless computers. 39 (CIPB). 492
computerized voting, 62-63 using outside ofthe IT industry. 40-41 CRT monitors. fiq-Qfl
Controlling Computers with the warranty and, 530
Why Own When You Can shadow masks. 90
Mind, 230-231 Rent?, 390-391 cursor-movement keys, 52
cost of, 528 workstations and, 6 cursors. 52
customer service support, 219 customer relationship management (CRM)
definition of, 4 Computing Keynotes, 518-525, 526-531,
designing multimedia products, 13 532-584 software, 234
desktop computers, 5=5 customer service resources.
Desktop or Portable?, 529 Additional Resources on Web
Desktop Publishing application, 13 Design. 524-525 e-commerce, 349
customer service support, 219
drive-interface standards, 192-194 building your web page. 521-522
education and, 15 finding graphics online. 520-521 networking and. 226
factors affecting processing speed, 133 hosting services, 523-524 Cutcommands. 214
getting images into your Intellectual Property Rights. 525 cybercrimc. 488
linking sites to web pages, 522-523
computer, 386 publishing your web site, 524-525 COSt of, 489 *
government use and, 12 selecting a template, 521 cyberslacking
Graphics-Intensive applications, 13 CondtNet, 451
Handheld personalcomputers, 2 conditional statements, 449 catching 'cyberslackers' on the
Health Careand. ia-19 Confudan Etext Project, web sites, 294 job. 252-253
construction documents, blueprints, 388
Help Desk and TechnicalSupport Construction managers. 41 Packet sniffers. 253
Specialists, contact information, 324 proxyservers. 253
contact-managementsoftware. 322 surveillance software. 253
history of microcomputers. 538-557 contact managers, 326 web filters and, 253
home use and. ia-is context menu, 209 cyberterrorism, 492
impact of otherinventions and. 11 control units. 130 Cyborgs Among Us: Wearable
importance of, 12=14 cookies. 348. 481-482. 501=502
individual users and. 5=B cookie-management utility. 502 Technology, m - ire
industry and, 16 manually deleting and. 502
internal clods. 135 Copy commands. 214 D
keepingyourcomputer dean, 509-510 corporate networks, servers and. 9
Keeping Your PC Up to Date, 486-487 counter fields, 408-409 data. 13
laptop computers, &=2 countermeasures, security and, 478 AMOprocessors, 149
Mainframe computers, 9-10 ASCII Codes. 129
memoiy and computing backing up. 174-175. 504-505
binary numbersystems. 122
power. 134=135 bits. 122
midrange computers. 10 bytes. 122
minicomputers, 10 categorizing storage devices. 166
mobile computers. Z computer data, 34-35
monitors and, 88-96 computer processing and, 12B-133
Index 595
data—cont. database management system dBASE database system. 428
computer representation of. 126-128 (DBMS), m 353-354 decimal numbersystems, 126
current Intel processors, 148=148 Decision Trees. 466-467
data compression. 100-191 overview of, 401 decoding, 122
decimal numbersystems. lZ t review questions dedicated media, 268
defragmentation utility, 19Q
definition of, 25 and. 417-419,433-437 degaussing, magnetic media and, 509
easier data backup, 142 density, disks and, 122
entering data in worksheets, 262 databases, 402-404 Departmentof Defense Advanced Research
in baseball 414-415
execution cycles, 121 binary fields. 408 Projects Agency (ARPA), 286
extracting compressed files, 121 deselecting text 262
input device overview, 68 binary large objects (BLOBs), 408 designing multimedia products. 12
instruction cycles. I l l desktop computers,
in businesses. 423-425
limiting physicalaccess t o, 504-505 careers and, 430*431 system unit and, 6
machine cycles, 130-131 columns and. 404 desktop context menu. Windows XP, 209
magnetic storage devices, 166-173 counter fields and, 408-409 Desktop Publishing application, 12
microcomputer processors, 147-HB device drivers, 216
data entry, 409 dial-up connections, 322
millions of instructions per second data mining. 424-425
sharing and, 341
(MIPS), 121 date fields, 408 Dialog boxes, definition of, 211
numbersystemsand. 126-127 DB2, 429 Diebold Election Systems, 62
definition of. 402 digital cameras, 20. 72=78
optical storage devices. 175-179 description fields, 409 digital light processing (DLP)
optimizing disk performance. 169-191 disconnected datasets, 422-423
technology, 100
overview of. 125 field types. 407-409 digital pens, tablet PCsand. 2
processors and, 147-150 digital student portfolios. io?-iQ3
random access memory (RAM), 23 fields, 403.404 digital subscriber line
review questions and, filters, 410
flat-file structure, 405 (DSL), 272-273. 333-334
Serial and Parallel Ports. 153-154 forms, 403, 409*410 Digital systems, £
solid-state storage devices, 179-182 interfaces, 406 digital telephone lines, 271-274
text codes. 127-128 Internet, 425
knowledge discovery, 424-425 asynchronous transfer mode
uninstalling programs. ISO (ATM), 224
logical fields, 408
universal asynchronous receiver- macros, 426-427 cable modem services, 273-274
transmitter (UART), 152 memo fields, 409 using digital data
MySQL. 429
data areas, 170 numeric fields, 408 connections, 271-274
Oracle, 428 digital video cameras, 386
data bus, 126 personal. 425-426, 428 Digital Video Disc (DVD). 22
Accelerated Graphics Port (AGP) query by example (QBE), 413 Digital Video/Versatile Disc (OVD)
bus, 132 querying, 412-413 technology. 550
Industry Standard Architecture (ISA) record sorting, 410-411 digitizing, sound cards and, 25
Director, 463-464
bus, 132 records. 403-404 directories
local bus, 122 relational structure, 405
PCCard bus. 12fi reportgeneration. 413 definition of, 116
performance specifications of. 128 reports. 403 enterprise directory. 222
Peripheral Component Interconnect rows. 404 search tools, 229
using and, 301
(PCI) bus. 122 scalability, 429 disconnected datasets, 422-423
Universal Serial Bus (USB). 122 sorting records. 410-411 disk controllers. 192
Disk Defragmenter, 190-191
data communications SQL Servers, 429 disk drives. 21
modemsand telephone lines. 268-270 table creation, 407 disk optimization, 189-191
overview and. 262 table view, 409-410 disk optimization toots, 182
review questions and, ? 7 B - ?B i disk storage, 166-167
tables, 403 diskette drives. 21
using digital data text fields, 408 maximum access time, 122
connections, ??i-?71 time fields. 408 diskettes. 171-172
traffic. 422 magnetic storage devices. 171-172
data communications managers, 222 viewing tables, 409-410
data compression, 190-191 datagrams, definition of. 254 schut;
data-conferencing, ?46-247
data diddling. 489 datasheets, 375
data mining. 424-42$ date fields, 408
data processing, 401 dates, spreadsheets and, 22&
data projectors. lflft. 375 DB2database system, 429
data transfer rates, 133, 188-189
data warehouses, 406-407
596 Index
disks drives—corrt. e-mail programs,
defragmentation utility, ISO sequentialaccess devices. 125 eBay, online shopping and, 248
density and, 122 smallcomputer system interface Edison, Thomas, 18
file allocation table (FAT), 1ZQ (SCSI), 193-194 editing
Tape drives, 174-17S
hard disks. 122 drag-and-dropediting and, 5Z
hot-swappable hard disks, 122 dual in-line memoiy module (DIMM) entering and editing text, 366-367
removable high-capacity chips. 122 education, computers and, 15
EISA (Extended Industry Standard
disks. 172-174 dual-scan LCDtechnology, matrix screens
scanning disks for errors, 121) and. 21 Architecture). 545
solid-state disks (SSO). 122 Electroluminescentdisplays (ElDs), 22
distributed applications, 222,421 dumb terminals, 9 electromagnetic fields (EMFs), 28=22
distributed computing. dumpster diving, security and, 479 electron guns
distributed denial of service (DDOS) Duron processors. 1A9
DVD-RAMdrives. 122 refresh rate and. 2 i
attack, 489 DVD-Recordable (DVD-R) drives, 128 scanning pattern of, 20
Do-It-Yourself Tech Support, ?14-?1S DVD-ROMs, 177-178 electronic commerce (e-commerce),
docking stations. Notebook OXF(Data Exchange Format), 385
dye-sublimatkn (dye-sub) printers, 115 overview. 345
computers. Z dynamic addressing, 258 Electronic Communications Privacy Act
document areas, 268 Dynamic Most Control Protocol
document formatting, 368 (1986), 500
document windows, 366 (DHCP), 258 electronic document management
documents dynamic link library (.dli) files, 440
(EDM). 421-422
definition of, 2Z E embedded operating systems, 233-234
entering and editing text. 366-367 encryption, security and, 355
managing your papers. 438 e-commerce Enhanced integrated drive electronics
Oogpile business level and. 350-354
metasearch engines and. 305 (EIDE), 122
web sites, 306 business-to-business (B2B) enhancing an OS with utility software.
DOS (disk operating system), 225 transactions. 35Q-3S1
dot matrix printers, lQfi-iM Enkeboll Designs. 40
dot pitch, color monitors and. 95 career opportunities and the Enriquez, Richard, 40
dots per inch (dpi), printing and. 112 Internet, 354-355 enterprise directory. 222
downloading files, 22Q Enterprise Hardware Sales. 152
consumer levels and. 346-350 enterprise software, 420-423
draw programs, vector-based graphics customer service resources. 349 enterprise systems, 421
programs, 387 online banking and finance, 349-350 entertainment programmers, 469
Online shopping. 343-350 Epson, MX-BQdot-matrix printer, 541
Dreamweaver, 463 paying for purchases. 348
Oreamweaver MX. web sites, 518 review questions and. 356-361 ergonomics
drive-interface standards, 192-194 shopping carts, 248 definition of. 60
drive performance using online catalogs. 247-348 electromagnetic fields (EMFs), 98=29
e-mail eyestrain and. 97-oa
average access time, 188 address books, 228 keyboards and. 53
cleaning up unneeded files. 189-190 creating a new e-mailmessage, monitors and. 92=29
data transfer rate, 188-189 padded wrist support 53
optimizing disk performance, 189-121 314=215
overview and. 182 definition of. 212 error-correction protocols, 259
drivers e-mail programs. 212-215 errors
device drivers. 215 networks and, 245
maintaining your driven. 115 productivity tips and, 12 customer service support 212
drives receiving and reading a message. scanning disks for errors, 120
Blu-Ray laser drives, 181 essential computer hardware, 27-22
CD-Recordable (CD-R) drives, 128 315-316 Ethernets
CD-ReWritable (CD-RW) drives. 128 software and Internet connections, 14 definition of, 252
disk optimization, mo-ioi spam and, 316. 556 Fast Ethernets. 2&S
DVD-RAMdrives. 129 viruses. 534 Gigabit Ethernets. 259
DVO-Recordable (DVD-R) drives. 128 Web-based e-mailservices, 212 Ethical Issues
e-mail addresses, 313-314 artificial intelligence. 153
Enhanced integrated drive electronics Ustserv systems, 214 artificial intelligence systems, 475
(EIDE), 123 post office protocol (POP), 214 computer piracy and. 475
protecting and. 500 computer skills and, 42
flash memoiy drives, 129 e-mail clients, 312 computer storage devices, 252
integrated drive electronics (IDE), 133 e-mail Help, 215 direct-maiketing lists, 437
SCSIdrive interfaces, ISA government databases and, 437
hacking and, 283
Index 597
Ethical Issues—cont. file systems, 120 Freescale Semiconductor, Inc.. 142
input devices and, 85
Internet addiction ard. 123 file transfer protocol (FTP), 319-320 freeware. 366
frequently asked questions (FAQs). 215
Internet and. 329 files
Online masquerading and. 360 newsgroups and. 318
operating systems (OS). 241 archive files, 121 FrontPage. web sites, 518
piracy and. S17
processors. 163 cleaning up unneeded files, 189-190 FTP client software, 319
security and, 517 FTP servers. 319
software programs. 398 definition of, 32 function keys. 51-52. 60
telecommuters and, 283
unneeded printouts. 123 downloading files. 27Q G
war riding and, 360
Event Viewer, u s extracting compressed files, 121 game controllers. ZD
file compression, 190-191 game pads. Z1
executable (.exe) files, 440 Gates. 8ilL 540-541
executing, CPU and, 131 temporary (temp) files, 182 gateways, definition of, 25Z
execution cycles, 131 GetDataBack, shareware programs, 365
expansion (wards, 155-156 uploading files, 220 Gigabit Ethernets. 252
expansion slots, 155-156 filters gigabytes (GB), 29
Extended ASCII, 128 Gigahertz (GHz), 136* 13&
Extended Binary Coded Decimal in databases, 410 The GIMP, web sites, 518
global information technology, health
Interchange Code, 127 definition of. 503
Extensible HTML (XHTML), 462 finance, online banking and finance. care, 36
Extensible Markup Language (XML), 462 GoLive CS, web sites, 518
Extensible Markup Language Mobile Profile 349-350 Google
Financial Modernization Act of 1999. 500
(XHTML MP), 462-463 firewall switch routers, 225 Boolean operators. 304
Extensible Style Sheet language firewall utility, 212 Help links a t 304
firewalls, 505 search tools. 300
(XSL). 462 governments, use of computers and. 12
extension points. 225 security and, 261 (Graphic Interchange Format) GIF
external modems, 269 FireWire. 12L 124
extracting, compressed files. 191 Fireworks MX web sites. 518 format 385
Extranets, 3S1-352. first-generation languages, 459 graphical user interface (GUI). 203-211
graphics
networks and. 249 First-party cookies, 501
eyestrain, ergonomics and. 97-98 Flash. 463 ceils and. 320
clip art 386
F flash memoiy. 132 computer-generated animation. 390
flash memory drives. 122 computer-generated imaging
Fair Credit Reporting Act (1970), 500 flat-file database structure. 405
Fast Ethernets. 252 flat-panel display monitors. 88 (CGI). 389
FAT32. Windows 25 and. 1Z1 flat-panel monitors, 90-91 finding graphics online. 520-521
fax modems. 262 flatbed scanners. 23 getting images into your
faxes, productivity tips and. 12 floppy disks, 31
faxing alternatives, 221 computer, 386
Federal Trade Commission (FTC), spam magnetic storage devices, 171-122 importing graphics and, 519-520
magnetism and, 508-509 overview of, 383
issues and, H Z flowchart algorithms. 445-446 photo-editing programs, 387-388
feedback systems, 467 folders, root folders. 120 photo manipulation programs. 388
Fernandez, B ill 538 fonts, definition of. 362 review questions and. 394-398
fetching. 111 formatting selecting a graphic to insert into a
Fiber-optic cables, 255-256 character formatting. 142
fields, in databases. 403-404. 407-409 document formatting. 368 slide, 375
fifth-generation languages (SGLs). 461 logical formatting. 1ZQ Standard Formats for Bitmap
Fite Allocation Table (FAT), 170.1Z1 paragraph formatting, 368
file compression. 190-191 formatting disks, 168 Graphics, 385-386
file formats, compatibility issues and, formatting text 367-368 using hypeitinked graphics on a
forms. 409
364-385 in databases, 403. 410 Web page, 228
File-Infecting Viruses, 534 opt-out options, 500 vector graphics. 384
file server networks. 250 formula bars, 369 graphics file formats, 384-385
file servers, 244 fortruiis. spreadsheets and. 3Z0 graphics software, 386-390
FortuneCity, web sites. 524 history of, 383
fourth-generation languages Graphics-Intensive applications. 13
(46Ls), 460 Grayscale monitors. 68
fragmentation, data and. 120 Gutenberg Project, web sites, 294
frames, 374, 389
Free Servers, websites, 524
Freedom of Information Act, 500
Freescale processors, 112
598 Index
H Help window, Internet Explorer and, 229 image scanners. 22
Heitz (Hz), 136 images, getting images Into your
hackers
fighting hackers and. 260-261 refresh rate and. 25 computer. 386
firewalls and. 261 heuristics, 146-447, 467 Impact printers. 108
Internet Service Providers (ISP). 241 high-<apacity floppy disk drives, 123 industry, computers and, 16
passwords and, 261 high-level languages. 458 Industry Association of America
Plug Windows' Security Holes. 261 High-Performance File System
(P.IAA). 554
hacking (HPFS). 121
cost of, <89 high-quality printers, m - ii6 Industry Standard Architecture
cyberterrorism, 492 high-speed memory locations, (ISA) bus, 132
distributed denial of service (DDOS)
attack. 489 registers and, 130 information processing cycle, 26-27
Ethical Issues and. 283 Hitachi wearable PC unit 135
IP spoofing, 490 Hoff, Ted, 537 parts of, 2&
phishing and, 490 homearea networks (HAN), 262 Information Security Management
security. <89 host definition of, 286
social engineering and. 490 hosting services. 523-524 Act of 2002, 492
Hosting.Com, web sites, 524 Information Systems (IS ) Managers, 222
Handheld personal computers, 2 hosts, finding a host for web sites. 523 initial public offerings of stock
handheld scanners. Z2 hot-swappable hard disks. 123
hard disks. 31* 122 Hotmail composing a message in, 318 (IPOs), 352
HTML (hypertext markuplanguage). 289 initialization (.in i) files. 440
backing up and. 219 HTMLbrowsers, using in initializing disks, 16B
handling storage media. 508-509 InkJet printers. 110
parts of, 123 World Wide Web, 295-299 Input and Output Devices, 30=31
reformatting and. 219 HTML tags. 220=221 input devices
hardware HTTP(hypertext transfer protocol). 289
antivirus utility, 212 hubs, definition of. 252 audiovisual inputdevices. 74-76
backup utility. 212 Hybrid Networks. 248-249 game controllers. 20
Bundled hardware. 530 HyperCard, 545 overview of, 68
device drivers, 216 hyperlinks, 222=298 Pen-based systems. 69
enhancing an OS with utility stylus, 69
as part of web pages, 222 touch screens. 20
software. linking sites to web pages, 522-523
essential computer hardware. 22=32 hypertext links, 289 input/output (I/O) device, 9
interrupt requests (IRQs), 216 HyperText Markup Language input-processing-output (IPO) charts, 444
Managing Hardware, 215-216 instant messaging (IM ), 321
microprocessors. 28 (HTML). 461-462 instruction cycles, 131
network hardware, 256-262 dynamic, 464
processing devices and, 28 static, 464 instruction sets. 130
safeguarding your hardware, 508-510 Hypertext Preprocessor (PHP). 465 Instructional Designers, careers in
threats to hardware. 484-487 Hypertext systems. 289
hardware technicians, 78-79 multimedia. 393
careers and, 195 I integrated development environment
headers, definition of. 253
headphones. 1Q2 IBM enhanced keyboard. SO (IDE). 460
headsets, 1Q3 IBM-PCAT. 543 integrated drive electronics (IDE). 193
Health Care, 18=19 IBM-PC XT. 543 integrated pointing device. 58-59
global information technology, 36 IBM processors. 149 integrated services digital network
Help IBM's ThinkPad computers. TrackPoint
E-Mail Help. 215 (ISDN), 22L 333
Help Deskand Technical Support pointing device, 68 Intel
icons. 2fl£
Specialists, 234-23S Identity (ID ) theft. 479-480, 498 80386 processorand. 544
80486 chip, 546
Technicalsupport specialists. 235 guarding personal information, 499 8080chip and, 539
help (.hip, .chm) files, 440 managing your papers, 498 current Intel processors, 148-149
Help Desk and Technical Support IEEE 1394,122. 191 MMX technology. 550
IEEE 1394 (FireWire), 155 Pentium in process or, 552
Specialists, 234-235 IEEE 1394 (FireWire) ports. 138 Pentium Pro microprocessor, 549
Help page. Targets Web site, 349 IGES (Initial Graphics Exchange Intel Corporation. 162
Help systems, getting help with Intel processors, 148
Specification), 385 Intellectual Property Rights, 525
browsers, 229 iMac. release of, 551 intelligent smartcards. 180
image quality, printing and, 112 intelligent terminals. 2
Interactive Scriptwriters, careers in
multimedia, 393
interactivity, definition of. 392
Interface Designers, careers in
multimedia, 393
Index 599
internal modems, 263 Internet Archive, web sites, 235 knowledge bases, 215.
Internal Revenue Service, computer Internet monitoring, 481 knowledge discovery, 424
Internet relay chat (IRQ , 320 Koenig, Karen, 116
technology and, 1Z Internet security, 217-218 Kosoff, Jon, 354
Internet
screen savers. 217-218 L
Adyanced Research Projects Agency Internet service provider (ISP), 288
LLBean, web sites, 346
(ARPA), 286 security and, 261 labels, 363
always-on connections. 505 internetworking, process of, 26Z
Asynchronous OSL (ADSL), 332 interpreters, 443-444 worksheets and. 321
broadband connections, 332-333 interrupt requests (IRQs), 216. IAN technology. 540
cable modem services, 334 Intranets. 242, 351-352. lands, data storage, 126
career opportunities and the laptop computers. 6=Z
interface of. 353 large-Format monitors, 375
Internet, 354-355 intrusion detection software. 212 laser printers. H I
chat rooms and, 321 IP spoofing, 490
communicating through the. 112 iPod, release of, 554 text output quality, 103
crawlers. 425 IPX/SPX protocol, 262 LaserJet User printers, 544
databases on, 425 Launch, web sites, 233
dial-up connections. 232 J tgvet-l (L I) caches. 133
Digital Subscriber Line (DSL). 333-334 Level-2 (12) caches. 133
Jackson, ThomasPenfidd, 553 Level-3 (13) caches. 133
e-mail software and Internet Java programming language, 459-460 license agreements, modifications
connections, 14 JavaScript, 464-465
Jenny Craig Inc., 354 and, 373
features of, 317-323 Jensen, Mark, 322 lifeKasters Online. 32
File transfer protocol (FTP), 319-320 jet printers, using a search engine, 301 LifeMasters program, disease
Jobs, Steve, 540, 545
growth of, 2S L $47 (Joint Photographic Experts Group) JPEC management 36
instant messaging (IH ), 321 line conditioners, security, 485
format 385 line noise, security. 485
Internet addiction and, 123 Joke programs, 534 line printers. 109
Internet newsgroups, 317-318 joysticks, 2Q, ZD (inks. Unking sites to web pages. 522-523
Jupiterimages, web sites. 520 Linux
Internet relay chat (IRQ , 220
major services and, 2BB K network operating systems (NOS). 233
modems and telephone lines, 268-270 with an optional GUI desktop. 230
network news transfer protocol Kennedy, PhiUip, 230 Linux for the Desktop, 223
Kcrio Winroute Pro. 21Z The Linux Gazette, web sites. 240
(NNTP), 318 Kernighan. Brian, 539 Linux Online, web sites, 240
newsreader programs and, 318 keyboard buffer, 54 Linux Planet, web sites. 300
Norton online web sites, i keyboard controller, 53 liquid crystal display (LCD) monitors, 31
online services, 321-322 keyboard-related injuries, 62=63 Listserv systems. 314
online services for banks, 15 keyboard shortcuts, 60 local area networks (LAN), 2£fi
Online shopping, 343-3SO keyboarding, typing and. 50 local bus, 137
overview of, 285. 331 keyboards, 30 logic errors, 467
PCApplications accessing Use logicalfields. 406
alphanumeric keys and. 50 logical formatting. 120
Internet, 334-335 cursor-moveme nt keys, 52 logicaloperations, data and. 130
Peer-to-peer (P2P) services, 322-323 cursors and. 52 LookSmart home page, 300
reliability ofsearch results, 304 Ergonomicsand. 63 looping structures. See repetition
resource for study and. 15 function keys, 51-52
review questions modifier keys. 50-51 structures
numeric keypad, 51 loops. 450
and. 308-311. 324-329. 342-344 overview and. 49 Lotus Approach, 404
satellite services, 336-337 repeat rates and, 54 Lotus Development Corporation, 541
search engines. 425 review questions and, 65-67 LView Pro. web sites, 518
Sharing an Internet special-purpose keys, 52-S3 Lycos home page, 202
standard keyboard layout. 50
Connection, 340-341 keyword search, 300 M
kilo bytes (KB), 23
Synchronous OSL (SOSL), 333 knowledge*based systems, 467 machine code, 442
trust issues and spam, 316 machine cycles, 130-131
using advanced search
options, 3Q1-306
using sitc-specific search tools, 342
Web-based e-mail services, 312
neb sites for. 266
wireless local area network
(WLAN), 338
wireless wide area networks
(WWANs), 335-336
600 Index
machine languages, 458-459 memory—cont. modems—cont.
small outline DIMM (SO-DIMM) data communications and. 268-27Q
Macintosh computers, compatability chips, 122
and. 530 virtual memory, 135. i l l digital subscriber line (DSL), 222=223
volatile memoiy, 122 error-correction protocols, 269
Macintosh operating systems external modems, 269
(Mac OS). 228-220 memory chips, 122
memoiy devices, computer systems fax modems. 262
macros faxing alternatives. 221
Automating YourWork with Macros. and. 22
376-377 menu bars, 269, 32$ internal modems. 269
creating and, 3Z6 menus, definition of, 21Q service accounts. 221
definition of, 226 Merholz, Peter. 552 uses for. 220
shortcuts and, 61 Meiriam-Webster, web sites. 424 using digital data connections,
viruses, 534-535 mesh topology, 254
metaseaich engines, 306 ?7 l- ??4
maqnetic disks
data storage and. 168-169 Metcalfe. Bob. 539,541 wireless communications, 2Z1
storage and. 21 metropolitan area networks (MAN), 242 modifier keys. 50=51
microcodes, 120 monitors, 30, S3
magnetic storage devices, 166-174 microcomputer processors, 147-i^a
CD-ROMs. 176-177 antiglare screens and, 26
disk storage and, 166-167 microcomputers. 5 color monitors. 89* 30
history of. 538-557 comparing and. 93-96
diskettes, 171-172 CRT monitors, 89-90
DVD-ROMs, 177-178 microphones. 74-75.1QQ electromagnetic fields (EMFs), 98-99
file allocation table (FAT), 1Z0 microprocessors. 22
high-capacity floppy disk Microsoft, releases Windows U L 545 ergonomics and, 97-9Q
Microsoft Access. 422. 426-427 flat-panel display monitors, 8&
drives, 173 Microsoft Corporation, web sites, 307. 240 flat-panel monitors, 90-91
hot-swappable hard disks, 122 Microsoft Excel Grayscale monitors, 88
operating system finding data on Large-Format monitors, 375
interface of, 362 liquid crystal display (LCD)
disks. 1Z0 protecting a documentin, 505
magnetic storage disks, removable high- MicrosoftInternet Explorer, 523 monitors, 21
configuring the Google toolbar in, 502 other types of, 22
capacity disks. 173-174 Cookie-control settings in, 501
Microsoft Messenger. 382 plasma monitors, 375
Magnetic yoke. 89 resolution and, 21
magnetism, floppy disks and, 508-509 Microsoft Office User Specialist
(MOUS), 116 review questions and, i(V.-iQ6
mail servers, 11£ size and, 91
Mainframe computers, 9-10 Microsoft Outlook. 212 Monochrome monitors. 8&
contact information and. 2ZB
input/output (I/O) device, 3 e-mail filters and, 504 Mosaic 220
malware, security and, 488 creation of, 548
Mamma, web sites. 206 Microsoft PowerPoint, 322
massively parallel processing (MPP). 406 Microsoft Typography, web sites, 397 motherboards, processing devices, 28
McAfee VirusScan, web sites. 486.536 Microsoft Visio. 210 mouse
McDowell, Douglas, 468-469 Microsoft Word
McGill University, ftp sites and, 220 double-dicking and, 52
mechanical mouse. 55 character-formatting tools in, 368 drag-and-dropediting and, 5Z
megabytes (MB), 22 interface of, 362 integrated pointing device, 59-60
Megahertz (MHz), 136-128 shortcut keys and, 61 mechanical mouse, 56
memofields, 409 Microsoft Word 2003. dip art mouse pointer. 51
optical mouse. 55
memoiy, 121=132 collection, 386
basic input output system (BIOS), 122 midrange computers. 10 outputdevices. 20
cache memory. 123 military, computer technology and. 12 overview and. 19
dual in-line memoiy module (DIMM) Millennium Bug, 552
chips, 122 millions of instructions per second pointing and, 56
factors affecting processing speed, 132 review questions and, 65-6?
Flash memoiy, 132 (MIPS), 121 right-clicking and, 222
memoiyand computing milliseconds (ms), storage time, lfifi single-clicking and. 293
power, 1U-13S minicomputers. 10 trackballs, 294-295
MIT, web sites, 225 trackpads and, 225
nonvolatile memory. l±. 131-132 MMXtechnology. 550 . using, 56
poweron self test (POST). 122 mobile computers, Z variants of, 5&
programmable read only memory modems wheel mouse and, 52
mouse button configurations, 56
(PROM). 122 cable modemservices, 272-274
read-only memory (ROM), 122 mouse pointer. 51
MSNTechnology, web sites. 528
multi-user/multitasking operating
systems. 207
Index 601
Urheberrechtlich geschutztes
multimedia network access servers. See VPN servers Peer-to-peer (P2P) services. 322
basics or, 390-392 network administrators, 222 print servers and. 246
careers in multimedia, 392 protocols and. 261-262
computer-generated animation. 390 careers and. 195 review questions
computer-generated imaging network hardware, 256^262
(CGI), 389 and. 263-266.
getting imagesinto your cabling equipment 258-260
computer, 386 network linking devices. 256-258 server-based networks, 250
graphics file formats, 384-385 network interface cards (NICs). 3L 256 shared peripheraldevices, 245-246
overview of, 383 network linking devices, 256-258 simultaneousaccess and. 244-245
photo-editing programs. 387-388 network news transfer protocol site licenses. 245
photo manipulation programs, 388 (NNTP). 318 structure of. 250-251
review questions and. 394-398 network operating systems teleconferences. 246
Standard Formats for Bitmap Token Rings. 260-261
Graphics, 385-386 (NOS), 230-233 topologies and protocols. 253-262
vector graphics, 384 Linux, 223 twisted-pair cables, 255
Novell NetWare, 232-233
multimedia developers, Internet careers UNIX for Servers, 233 uses of, 244=248
and, 355 Videoconferencing, 246
Windows 2000 Server, 232
Multipartite viruses. 534 Windows NTServer, 231 Voice over Internet Protocol
multiprocessing (MP) systems, lif l (VoIP), 242
multitasking. I l l WindowsServer 2003,232
multitasking features, operating systems network servers. 8-9. 244 wide area networks (WAN), 248
wire-based media.
(OS). 204 networkversions, 245 wireless networks, 256. 274-276
Muri, Scott. 123 networking, &
Musical Instrument Digital Interface wireless NIC, 256
careers in, 276-277 Neural interface devices (NIDs), 230
(MIDI), 26 customer service support 276 NeuralSignals. Inc., 230
Musical Instrument Digital Interface NewConnection Wizard, Windows
data communications managers, 2ZZ
(MIDI) port. 155 Information Systems (IS) XP, 332
MX-80 dot-matrix printer. 541 New Technology File System
Managers. 222
MySQLdatabase system, 429 (NTFS). 121
internetworking and, 282 news servers, definition of, 318
N Newsgroups, 155
overview of, 243
n-tier applications, 421 networks frequently asked questions
nanoseconds (ns), storage time. 128 (FAQ), 318
Napster. 554 application servers, 245
National Center for Supercomputing Audio-conferencing, 246 Internet newsgroups. 312=318
subscribing to. 319
Applications (NCSA), 290*548 backbone of, 282 threads and, 319
bask rate Integrated services digital newsreader programs, 318
National Football League (NFL), web Newton MessagePad, 548
sites, 292 network. 221 Nicely. Thomas, 548
beginnings or. 288 Nodes, 250
National Information Assurance Training bus topology network. 254
and Education, web sites, 492 campus area networks (CAN), 249 nonimpactprinters, 1Q8
client/server networks. nonvolatile memory. 131.132
National Science Foundation (NSF). Northrop Grumman Mission Systems
creation of Internet. 28fi common types of, 24B
(NGMS), 332
National Science Foundation Network corporate networks. 9 Norton AntiVirus, 447
(NSFNET), 546 > data-conferencing, 246-247
setting options in, 536
Natural Site, and Civil Disasters, distributed computing. 252-253 Norton Notebook
security, 547 Dynamic Host Control Protocol
Artificial Intelligence, 466-467
natural and man-made disasters. (DHCP). 258 Business, the Internet and
security, 486-487 easier data backup, 242
Extranets and. 243 Everything, mi-3%2
navigating the Web. 296-298 file server networks. 250 Changing Your PCs Operating
Navigator SJIW eb browser. 551
NetBIOS/NetBEUI protocol 262 homearea networks (HAN). 249 System. 218=219
NetObjects Fusion, web sites, 518 hybrid networks. 248-249 Data Warehouses. 406-407
Netscape Communications, 548-549 integrated services digital network fighting hackers and, 260-261
flat screens and. QB-QQ
web sites, 3Q7 (ISDN). 222 Internet Time Travel 294-295
Intranets and. 249 Looking Back, Moving
local area networks (LAN), 248
Forward, 180-181
media and, 255
metropolitan area networks (MAN). 249
network interface cards (NIC), 255
peer-to-peer networks, 251
602 Index
Norton Notebook—(ont. operating systems (OS)—cont. payloads, definition of, 254
PCOperating Systems. 225-220 PCApplications, accessing the
Merging ofMedia and Meaning. 18
Nexus: converging real-time operating systems, 206 Internet, 334-335
review questions PCCardbus, 138
technologies, 507-508
speech recognition, H-75 and. 220-223. 236-241 PCCards. 15fi
What Is a ComputerChip?, 150-151 running programs, PCconvertible, laptop computers, 544
WhyOwnWhenYou Can Rent?, 390 sharing information. 213-214 PChardwaresales, 156
Norton online websites, 4 single-user/multitasking PCMagazine, web sites, 528, 240
Notebookcomputers, 6-7 PCoperating systems, 225-229
docking stations, Z operating systems, 206-207
Novell NetWare, 232-233 single-user single-tasking operating DOS(disk operating system), 225
Macintosh operating systems (Mac
NSFnet. 282 systems, 205
NTFS5, Windows 2000andXP. I l l types of, ?QA-2Qft OS). 223
numbersystems. i?6-i?7 user interfaces. 203-212 networkoperating system
opt-outoptions, 500
numeric fields. 408 optical character precognition (OCR) (NOS). 230-233
numeric keypad, 51 Windows 9x, ??*-???
software. Z2 Windows NTWorkstation. 225-226
O optical input devices. 71-24
optical mouse, 55 Windows 2000Professional 228
Object Unking and Embedding optical storage devices. IL 1&&. 115=123 WindowsXP. 228
(OLE), 214-215 PC-to-TVconverters. 375
DVD-Recordable (DVD-R) drives. 12B PCvideo camera, 22
object-oriented programming PhotoCOsystems, 128 PCWorld, websites. 528
(OOP), 449-451 peer-to-peernetworks, 251
recordable optical distributed computing. 252-253
attributes, 451 technologies. i7ft-i?q Peer-to-peer (P2P) services, 322-323
encapsulation, 451 Pen-basedsystems, input devices, 63
objects. 450 optimizingdisk performance, 183=131
Odom. Barbara, ISA Oracle database system, 428 Pentium in processor, 552
Office 2003. release of, 556 OSX. release of, 554
Online HelpSystem Designer. 322-323 Osborne. Adam. 542 Peripheral Component Interconnect (PCI)
online services. 321-322 Outlook Express, create a newe-mail bus. 132
exchanging e-mailmessagesand, 323
Online shopping, 343-350 messagein. 3U-*is Persistent cookies. 501
online stores, vs. physical locations. 342 personal databases. 425-426, 428
open-sourcesoftware, 365 output devices, 30-31 personal digital assistant (PDA), 2*233
OpenOffice.org, websites. 145 outsourcing, careers in. 194-105 personal information managers (PIMs),
operating system programmers, 469
operating systems(OS) P 376-377.402
changingyour PCs operating phishing, hacking and. 490
Packet sniffers, cyberslacking. 263 phonemes, speech-recognition
system, 218-219 packets, definition of, 351
command-lineinterfaces, 211-212 padded wrist support, ergonomics software. 26
embedded operating systems, 233-234 Phosphordots, 83
and, 112 photo-editing programs, 387-388
enhancing an OSwith utility software, page-white displays, 146 photo manipulation programs. 388
216-21? PageMakerprogram, 544 photo printers, 113
pages per minute (ppm), printing, 165 PhotoCOsystems, 1Z8
ethicalissues, 241 paint programs, bitmap-basedgraphics photorealistic scenes, graphics and. 389
finding data on disks, 120 (PICTure) format. 385
graphical user interface programs, 22Z PIMs (personal information
PaintShop Pro, 104, 324
(GUI), 708-211 managers). 402
Macintoshoperating systems web sites, 34 pipelining. 131
Palm OS, 294 piracy
OS). 228-229 PalmPiloL 549
Managing Hardware. 215-216 paperjams, 163 ethical issues and. 475
multi-user/multitasking operating paper-white displays, software piracy. 322, 490-491
paragraph formatting, 308 pits, data storage, 126
systems. 202 parallel ports, 2i3-?u pixels, 89-92. 2L 384
multitasking features, 20fi parallel processing, i5 i-is? plain old telephone systems (POTS), 268
network operating system passive matrix LCD, monitorsand. 92 plasma displays, monitors and, 92, 375
passwordcapture, 490 plasmamonitors, 22. 375
(NOS), 230=233 passwordguessing, 489
Object Linking and Embedding Passwordsharing, 489 platform independence. 428
passwords, securityand, 261 plotters, roller plotters, 115
(OLE). Paste commands, 214 Plug and Play technology. 157-158
overview of. 205. 224
Plumer. Mike, 155
Index 603
Urhe
Pocket PCOS, 235 printers—conf. Productivity Tip
pointers, 208 MX-&0dot-matrix printer, 541 Automating YourWork with Macros,
pointing device, mouseand. 54 376-377
nonimpact printers. 108
points, 25Z paperjams and. 115 backing upyour data, 174-175
polarized, storage disks and. 162 photo printers, 113 Care and feeding of Printers. 114-115
police, computet technology and, 12 print heads. 108
Polymorphic viruses, 534 review questions and, 118-123 database macros. 428-427
POP servers, 114 OoYou Need More RAM?, 140
roller plotters, 115
pop-up blockers, 502 thermal-wax printers, 114-115 Do-It-Yourself TechSupport,
pop-upwindows. 502 Finding FasterAlgorithms, 448-449
toner and. I l l Keeping Your PC Up to Oate, 486-487
porting, 459 using a search engine, 301 reliability ofsearch results, 204
ports printing Sharing an Internet
dots per inch (dpi). U2
IEEE 1394 (FireWire), 1SS Connection, 340-341
image quality and. 112
IEEE 1394 (FireWire) ports, 138 overview of, 102 Telecommuter's Checklist, 270-271
Musical Instrument Digital Interface pages per minute (ppm), U2 Using Remote Online Help, 214
privacy profiling, security, 481
(MIDI) port, 155 keeping marketers at bay, 499-500 program, definition of, 25
Serialand Parallel Ports, 153-154 knowing your legal rights, 500-501
specialized expansion ports, 154-155 program controlRow, 445
standard computer ports, 152 opt-outoptions. 500 programmable read only memoiy
Universal Serial Bus (USB) protecting your privacy, 499-501
(PROM). 122
ports. 154=155 Privacy Act of 1974, 500 Programmer/Software Designer. 393
postoffice protocol (POP), 114 processing devices, 28 programmers, careers and, 125,355
PostScript systems. 193-194. 544 programming
central processing unit (CPU), 28
Power Macintosh, 548 circuit boards, 2ft bugs, 467
Power Macintosh 65, release of, 556 motherboards, 28 debugging, 467
processing speed, factors affecting. 133
power on self test (POST), 122 processors development phase, 466-467
power-related threats, security, 485 Advanced Micro Devices (AMD) implementation, 468
PowerBooks. 547 processors, 148 logic errors, 467
PowerPoint, 374 Athlon processors. 142
comparing and, ISO-151 maintenance, 468
creating a chart in, 375 complex instruction set computing needs anaylsis, 465
Practical Extraction and Reporting programdesign, 465
(CISC) processor, 150 syntax errors, 467
Language (Pert), 465 current Intel processors, 148 programming languages, 442
piesentation programs, 371-275 Duron processors, 142 Active Server Pages (ASP), 465
extending power to other ActiveX, 460
creating a presentation, 374-375
devices, 152-155 assemblers, 458
interface and, 372-373 Freescale processors, 142
Presentation software, 35 IBM processors, 142 assembly languages. 458-459
primarye-mailaccounts, security and, 502 Intel processois, 148 authoring environments, 461
print heads, 108 looking inside and, 147-1SQ
print servers, 245 massively parallel processing C, 459
C~. 459
printers, 2Q (MPP) computers. 152 categories of, 457-458
all-in-one peripherals, 112=113 microcomputer processois. 147-148 Director, 463-464
multiprocessing (MP) systems, 150 Dreamweaver, 463
band printers, 1Q9 overview of, 528
Care and Feeding of Printers. 114-115 parallel processing, 151-152 Extensible HTML (XHTML), 462
characters per second (cps), 109 reduced instruction set computing
commonly used printers, toa-n? Extensible Markup Language
comparing and. 112-113 (RISC) processor, ISO (XML). 462
review questions and, 158-163
cost and, 112 RISC processors, 150 Extensible Markup Language Mobile
cost of operation. 112 symmetric multiprocessing (SMP), 152
dot matrix printers. 108-109 Profile (XHTML MP). 462-463
dye*sublimation (dye-sub) web sites, 528 Extensible Style Sheet Language
productivity software
printers, 115 (XSL). 462
high-quality printers, 113-116 overview of, 363 fifth-generation languages (5GLs), 461
impact printers. 1Q& review questions and, 379-382 first-generation languages, 459
inkjet printers. 110 Flash. 463
laser printers. 111 fourth-generation languages
LaserJet laser printers, 544
(4GLs), 460
line printers, IQS high-level languages, 458
maintaining yourdrivers, 115 HyperText Markup Language
(HTML). 461-462
604 Index
programming languages—eont. Quick launch bars. 2129 roller plotters, 116
QuickBooks, accounting programs, 16 rootfolders, 120
Hypertext Preprocessor (PHP), <65 routers, definition of, 262
integrated development environment QuickTime, web sites, 292 rows, in databases, 404
QuickTime player, 397 rulers, 366
(IDE). 460 rules-based systems, 467
Java, 459-460 R running programs. 212-213
JavaScript, 464-465
logic errors, 467 RAIDO s
machine languages. 458-459 RAID 1
.NET, 460-461 RAID 4 sales, computer sales, 156-157
portability, 459 RAH
Practical Extraction and Reporting satellite servers, very smallaperture
cache memoryand, 128 terminal (VSAT), 338
language (Pert), 465 choosing computers and, 526
review questions and, 473-475 DoYou Need More RAM?, 140 satellite services. 336-337
scripting languages, 464-465 memoryand computing scalability, 429
second-generation languages, 459 scanners, 20, 386
Sun Studio One. 461 power, 134-135
syntax, 457 synchronous dynamic RAM flatbed scanners, 22
handheld scanners. 71
syntax errors. 467 (SORAM), 162 image scanners, 21
third-generation languages (3GL). 459 random access memory(RAM). 29 scanning disks for errors, 190
World Wide Web development random access storage devices. 168 scientific programmers, 468
raster, bitmap images. 384 screen savers. 217-218
languages. 461-465 RAVEN, software applications and, 102 definition of, 505
programs read-only memory (ROM), 22.122 scripting languages, 464-465
read/write heads, magnetic storage scroll bars. 209. 366
3-D modeling programs, 389 SCSI drive interfaces. 194
Computer-aided design (CAO) and, 21 Seagate Technology. In c. IBS
Real Networks, Inc., 176. 397 search engines, 299-30Q. 425
programs, 388-389 real-time applications, 206 Boolean operators, 3Q2-3Q3
firewall programs. 505 real-time operating systems. 206 jet printers and, 301
Joke programs. 534 RealOne Player, 126 metasearch engines, 306
photo-editing programs. 387-388 recordable opticaltechnologies. 178-179 reliability of search results, 204
photo manipulation programs, 388 records, in databases, 403-404 using advanced search options,
presentation programs, 371-375 Records ManagementSystem Aided
Red Hat Certified Engineer (RHCE) 303-306
Dispatch (CAO). 226 search tools
program, 220 Red Hat Certified Engineer (RHCE)
running programs, 212-213 Directories, 299
shareware programs, 364 program. 220 Google, 300
spreadsheet programs, 165 Red Hat Linux. 548 keyword search, 300
stand-alone programs, 264 reduced instruction set computing (RISC) search engines, 209-300
uninstalling programs, 190
word processing programs, 365-368 processor. 96 using site-specific search tools, 307
redundant array of independent disks second-generation languages, 459
prompts, 211 secondary e-mail accounts, security, 502
protective measures, security overview (RAID), 354 sectors, 168-169
refresh rate, electron guns and, 96
and,497 registers. 123-124 COROMsand, 122
protocols. 261-262 high-speed memorylocations, 120 magnetic disks and, 1ZZ
relationaldatabase structure, 405 Secure HTTP(S-HTTP), 480
error-correction protocols. 269 removable high-capacity disks, 173-174 Secure Sockets Layer (SSL), 35S, 480
IPX/SPX protocol. 262 repeat rates, keyboards and. 64 security
NetBIOS/NetBEUI protocol. 262 repetition structures, 450 adware. 482
TCP/IP protocol 262 repetitive stress injuries (RSIs). 61-62 backing up data. 504-505
topologies and protocols. 253-262 reports, in databases. 403 computer-related ailments. <84
proxy servers, cyberslacking. 252 RFID (Radio Frequency Identification) cookies. 481-482. 501-502
Prudential Financial websites, 361 countermeasures and, 478
pseudocode, 444 tags, 557 credit reports. 499
public domain software, 364-365 Right to Financial Privacy Act of cybercrime, 483
public records, security and, 480 cyberterrorism. 492
Public Recordson the Internet 480-481 1978,500 data diddling. 489
publishing, self-publishing, IS ring topology, 26& degrees of harm and. 478
RISC processors, 160
Q Ritchie. Dennis. 538-539
Robertson. Michael 556
G-DOS. 541 robotic surgicaldevices, IS
query byexample (QBE), 413
Index 605
Urheberrechtlich geschut
security—cont. Self-Garbling viruses, 534 slides —cont
single-screen images, 222
distributed denial of service (DDOS) self-publishing, IS
sequence structure. 449 small business, computers and. 15-16
attack. 489 Small ComputerSystem Interface (SCSI),
firewalls and, 261. 505 sequentialaccess devices, 125
hacking. 489 serialports, 153-154 155.132=134
handling storage media. 503*509 server-based networks, 250 small outline OIMM (SO-DIMM)
server farms, 8
Identity (10) theft 479-480,498 chips, 122
Internet monitoring, 481 servers smart cards, 180
application servers, 245
Internet security, ?i7-?m corporate networks and, 9 intelligent smart cards, 180
solid-state storage devices, 180
Internet Sen/ice Providers (ISP). 261 file servers, 244 smart phones, &
keeping your computer clean. 509-510 FTPservers. 319 snagging, security and, 479
mailservers. 314 snail mail 376
keeping your data secure. 503r506 network news transfer protocol sniffing, hacking methods. 489
knowing your legal rights, 500-501 social engineering
line conditioners, 485 (NNTP), 318
network servers, 8-9. 244 hacking and. 490
line noise, 485 security and, 480
loss of Privacy. 480-481 newsservers, 318
sockets. 334
malware and, 488 POP servers, 214 software. 32-35.439. See also computer
Natural. Site, and Civil Disasters. 487 print servers and, 246
naturaland man*made proxy servers, 253 programs
terminal servers, 202 3-D animation software, 389-390
disasters. 486-487 commercial software, 264
online spying tools. 481 UNIX for servers, 222 contact-managementsoftware. 222
overview and. 477 service accounts, 221 customer relationship management
Session cookies. M l
password capture. 490 (CRM) software, 234
password guessing, 489 shadow masks. CRT monitors,
password sharing, 489 shared peripheral devices. 2*5-246 definition of, 25
shareware programs. 364 freeware, 364
passwords and, 261
Plug Windows' Security Holes. 261 shells, definition of, 223 FTPclient software. 319
power-related threats. 485 shielded twisted-pair (STP) wires. 265 graphics software. 386-390
profiling. 481 shopping carts. 348 intrusion detection software, 212
online spying tools, 481
protecting your privacy. 499-501 SHORTCUT key, 51-53
Public Records on the shortcut keys, MicrosoftWord and. 61 open-source software. 265
shortcut menu, 202 optical character precognition (OCR)
Internet 480-481 shortcuts, 208
restricting access to your system. software, 22
Function keys. 60
504-505 Presentation software. 35
review questions keyboard shortcuts. 60 public domain software, 364-365
macros and, 61 software suites, 264
and, 493-496. 512-517 Start menu. 209 surveillance software, 251
safeguarding your hardware. 508-510 shouldersurfing, security and, 479 vector-based software, 384
screen savers, 217-218 Showerman, Mike, 556
secure sockets layer (SSL) Who Really Oatis the Software on Your
Simpson, Corby, 392 PC?. 372-373
technology, 355
Single Edge Contact (SEC) cartridge, 550 Word processing software, 14
software piracy, 490-491 Single in-line memorymodules software applications, acquiring
spam, 483-484
spam blockers, 503 (SIMMs), 122 and, 364=265
single-user/multitasking operating software license, 322
Spoof, 484 software piracy, 222.490-491
spying, 481 systems, 206-207 software programs
single-usersingle-tasking operating
spyware. 482. 5Q1-502 overview of, 439
storing computer equipment 509-510 systems, 20fi review questions and, 452-455
surge suppressors. 485 software sates, 152
site licenses. 245 software suites. 364
theft and vandalism, 485-486 Slammerworm, 556 solid-state disks (SSO), 182
threats to hardware, 484-487 slide shows solid-state storage, 166
using automated warnings, 508 solid-state storage devices, 179-162
war driving, 339 presentation of, 375 flash memory drives. 123
Web bugs. 482 presentation software, 35 smart cards. 160
slides solid-state disks (SSO). 182
Web pages and. 354-355
Wire Equivalent Privacy (WEP). 339 adding text to a slide, 374
Selecky. Christobel, 32 choosing a layout for a new slide, 374
selection structures, 449
selecting a graphic to insert into a
Self-Encrypting viruses. 534 slide, 375
606 Index
sojnd. overview and, 82 storage devices—ow . tables, in databases, 403,407
sound cards, 74-75. 1QQ-1Q1 formatting disks, 168 tablet PCs, 2
initializing disks, 16S
sound producers, 393 magnetic storage, 166 digital pens and, 2
sound systems, 100-103 magnetic storage devices, 166-1 ZA
source codes, 442 operating system finding data on stylus and, Z
(Tagged Image File Format) TIFF
compilers, 443 disks. 120
interpreters. 443-444 optical storage, 166 format, 385
optical storage devices, 17S-179 Tape drives, 174-175
spam. 556 overview of, 165 task switching, 210
e-mail and, 116 review questions taskbars, 209
evading spam and, so?-5Q3 TCP/IP protocol. 262
security, 483-484 and. Ifilz lfifi, 196=201 technical support, frequently asked
statistics and, H i solid-state storage. 166
solid-state storage devices. 179-182 questions (FAQs), 215
spam blockers, SOI storage media. 166 technical support specialists, 215
spawn, 294 stored cookies. 501 technical writers. Bureau of Labor
special-purpose keys. 52-53 storing. CPU and, H I
streaming audio, 293 Statistics and, 321
specialized expansion ports, 154-155 streaming media, web sites, 293 Techno-Cops, computer-aided
Specialty Hardware Sales. liZ streaming video. 293
speech recognition, 74-75 Structured English QUEry Language dispatch,
sponsored links, 306-307 TelecommunicationsSales. 152
(SEQUEL), 412 telecommuters. 152-153
spoofing structured programming. 448-449 Telecommuter's Checklist. 270-271
IP spoofing. 490 Structured Query Language (SQL), 412 teleconferences, 246
security, 484 stylus templates, 374
spreadsheet formulas, 321 input devices, 69 selecting a template, 521
spreadsheet programs, 169 tablet PCs. 2 temporary (temp) files, 122
spreadsheets submarining, monitors and, 92 Tendu, 414-415
subscribe, newsgroups and. 318 terabytes (TB), 29
dates and, 320 Sun Studio One. 461 terminal clients, 202
formulas and, 120 Sun Ultra workstation, S49 terminalservers, 202
values and, 370 SuperVGA (SVGA) standard, monitor terminals
spying, security, 481
Spyware, 5Q1=5QZ resolution and. 95 dumb terminals, 9
Supercomputers. 10-11 intelligent terminals, 9
anti-spyware utilities. 502 surge suppressors, security. 485 terminators, network devices and. 254.
security, 482 surveillance software, cyberslacking text
SQL Server database system. 429 adding text to a slide, 374
Stallman, Richard. 543 and. 251 deselecting text. 162
stand-alone programs, 366 swap ins. 115 entering and editing text. 366-367
Standard Formats for Bitmap swap outs. 115 formatting text 367-3&a
switches, definition of. 252 text boxes. 374
Graphics, 385-386 Symantec, web sites. 486 text codes.
star topology, 254 Symbian, operating systems. 235 text fields. 408
START button, 209 symmetrical multiprocessing TFTdisplays, monitors and, 92
STARTkey, 51=51 theft and vandalism, security, 485-486
(SMP), 15?. 406 thermal-wax printers, 114-115
Start menu, 203 Synchronous OSL (SDSL), 111
shortcuts, 209 synchronous dynamic RAM (SORAM), 182 third-generation languages (3GL), 459
syntax errors. 467 third-party cookies. 501
start page, web pages, 296 system calls, 212 Thompson. Ken, 538
status bars. 166 system docks, 116 threads, H I
Stealth Viruses, 534 system operators, discussion groups
Steffen, Craig. 556 linked artides and, 318
and. 322 newsgroups and, 319
storage system units, desktop computers and. 6 threats, security and, 478
handling storage media. 508-509 systems development life cycle. 465 threats to hardware, 484-487
magnetic disks, 11
optical storage. 32 data flow diagrams, 483 three-tier applications, 421
decision tree, 483 throughput, data transfer rate, 188
Units of Measure for Computer tiers, 421
Memory, 22 T time fields, 408
title bars. 209
storage devices. 31-32 T3 lines. 222 Token Rings. 260-261. 543
categorizing and, 166-174 tokens, definition of. 254
toner, printers and. i l l
diskstorage and, 166-167
drive-interface standards, 192=194 Index 607
ethical issues and. 202
flash memorydrives. 129
schutzles Mi
toolbars. 209. 366 utilities—cont. vision, eyestrain and, 151-152
tools backup utility, 212 Vista Development, 86
enhancing an OSwith utility Visual Designers, careers in
airbrush tool 388 software, 216-217
disk optimization tools. 189 firewall utility. 212 multimedia, 333
Voice overInternet Protocol (VoIP), 345
EventViewer, 508 V voice recognition, 122
TopHosts.com. web sites, 524 volatile memoiy, 122
topologies and protocols, 253-262 values, spreadsheets and, 31Q voting
vandalism, security, 546-547
bus topology network. 254 vector-based graphics programs, draw computerized voting, 116-117
mesh topolc-gy. 254 Diebold Election Systems, 116
programs. 322 VPN servers, 467
ring topology. 254 vector graphics, 324 vulnerability, security and, 539
star topology. 254 vectors, definition of. 324
touch screens. 1L ZQ Versadex Computer Aided Dispatch W
touchpads, 3D
tower designs, desktop computers and, 6 (CAO), 388 wardriving, security. 339
trackballs. & very small aperture terminal (VSAT), 390 watercolors, paint programs. 387
trackpads. 52 video wearable computers, 134
TrackPoints. 60 Weather Channel, web sites, 223
tracks, 168-169 digital student portfolios. WeatherLabs, Inc., 450-451
transient cookies, 501 overview and, 141 Web-based chat 320-321
transistors, 125,14L15Q PCvideo camera. 111 Web-bated e-mailservices, 312
Trojan horse attacks, security streaming video, 52 Web browsers. 220=221
video capture cards, 131 Web bugs
and. 488, 534 Webcamsystems. 131
trust, issues of spam, 316 video capture cards, 131 anti-spyware utilities, 502
twisted-pair cables, 255 video cards. 150-151. 123 security, 482
two-tier applications, 421 video controllers, 151 Web Design, tips for, 523
Video Graphics Array (VGA), monitor Web designers, Internet careers and, 355
Type styles. 362 webfilters, cyberslacking and, 253
resolution and. 142. 591 Web Masters, Internet careers and, 355
u video input capabilities, 131 Web pages
Videoconferencing. 344 building your site, 521-522
Unicode Worldwide Character videographer, 333 hypertinks and, 297-298
Standard, 128 viewing angle, monitors and, 145 hypertext links and, 2&2
virtual memory, 125, 201 importing graphics and, 519-520
uninstalling programs, 120 virtual private networks (VPNs), 466-467 linking sites to web pages. 522-523
universalasynchronous receiver- Virtual Reality Modeling language planning your site or page, 519
publishing the page. 220
transmitter (UART), 152 (VRML), 522 security and. 354-355
UniversalSerial Bus (USB) viruses start page. 296
using hyperlinked graphics on a Web
ports, liL 154-155. 192.124 Bimodal viruses, 581
UNIX for Servers, 223 Bipartite viruses, 581 page, 228
UNIX for the Desktop. 222 Boot Sector Viruses, 581 Web programmers. 469
UNIX operating system, 538 categories of, 581 web sites
unsolicited commercial e-mail (UCE). 483 ClusterViruses, 581
unsponsored links, 306-3Q7 definition of, 579-580, 579 Additional Resources on Web Design,
uploading files. 220 E-mailviruses, 581 524-525
N URLs (uniform resource locators), 221.-2.92 effects of, 580-581, 580
File-Infecting Viruses, 581 AngclFire, 524
World Wide Web and, 296-298 Macro viruses, 581, 582 anti-spam laws, 484
U.S. Census Bureau, computertechnology Millennium Bug, 552 Bank of America, 350
Multipartite viruses, 581 Barry's ClipartServer, 520
and, 12 Polymorphic viruses, 581 Best Buy, 349
USA PATRIOTACT, 500-501 Preventing Infection. 581-582 CedantWeb Hosting, 524
Usenet Domains, 318 security and. 549 CNet. 397
user interfaces, 2Q8-212 Self-Encrypting viruses, 581 CNETShopper, 528
Seir-GarbUng viruses, 581 CNN, 221 302
graphicaluser interface Stealth Vituses. 581 Confucian Etext Project, 294
(GUI), 208=211 Y2K bug. 553 creating web sites and. 525
VisiCalc. spreadsheet programs, 541
user names, e-mailaddresses, 111-314
user sessions, 202
useriess computers, 19
users, computer systems and, 26
utilities
A_Backup utility, 212
antivirus utility, 212
608 Index
web sites—cont. Wi-Fi (Wireless Fidelity), 556 Wireless Markup Language (WML)—cont.
definition of, 289 Wi-Fi Protected Access (WPA). 339 Extensible Markup Language Mobile
Dogpile, 206 wide area networks (WAN). 248 Profile (XHTML MP)
Dreamweaver MX. 518 Wide Ultra 2 SCSI interface, 194
examples of, 2£0, 292 windows, 209 wireless networks, 256. 274-276
finding a host for, 523 wireless NIC, 258
Fireworks MX, 518 active windows, 202 wireless wide area network
FortuneCity, 524 documentwindows, 388
Free Servers, 524 Windows, operating systems and. 33 (WWAN), 335-336
Freescale Semiconductor, Inc.. 142 Windows 9x, 228-227 word processing programs, 365-368
FrontPage, 518 Windows 25 Word processing software, 34
FTP support for. 320 32-bit applications, 222 word processors, interface of, 388
TheGIMP, 518 release of, 226 word size, 134
GoliveCS, 518 workbooks, 389
Gutenberg Project 294 Windows 28,221 worksheets, 389
history of Internet and, 288 Windows 98 Active Desktop, 222
Kosting.Com, 524 Windows 98 operating system, 551 entering data in. 382
Intellectual Property Rights, S25 Windows 2000, release of, 553 labels and, 321
Internet Archive, 295 Windows 2000Professional, 228 workstations, 6
Jupiterimages, 520 Windows 2000Server, 232 World Wide Web
Ll.Bean, 34S Windows CE .NET, 234 creation of, 546
Launch, 293 (Windows Enhanced Metafile) EMF development languages. 461-465
The LinuxGazette, 240 launch your browser, 296
Linux Online. 240 format 365 navigating the Web. 296-298
Linux Planet 248 Windows Me (Millennium Edition), 222 programmers, 469
LView Pro. 518 Windows Media Player 9, 228. 397 reliability of search results, 304
Mamma, 306 Windows NTServer, 221 review questions, 308-311
McAfee VirusScan, 486, 536 Windows NTWorkstation, 225-226 searching the Web, 299
Microsoft Corporation, 22L 240 Windows Paint 387 sponsored links, 306-307
Microsoft Typography. 397 Windows Server 2003, 232 trust issues and spam, 318
MIT. 295 Windows Update service, web sites. 115 understanding of, 288-295
MSNTechnology, 528 WindowsXP. 228 URLs and, 296-298
web sites—cont. using advanced search options,
National Football League (NFL). 291 activating the firewall in, 506
National Information Assurance Add or Remove Programs utility, 190 303-306
Training and, 492 advanced mobile computing, 228 using browsersand, 295-299
NetObjects Fusion, 518 advanced networking and using site-specific search took, 302
Netscape Communications, 302 Web-based e-mailservices, 312
Norton online, 4 communications, 228 worms, 534-535
OpenOffice.org, 385 desktop context menu, 209 security and. 468
Disk Defragmenter, 191 Slammer worm, 556
PaintShop Pro, 518 EventViewer, 508 viruses and. 545
PC Magazine, 528, 24Q folder listing in, 120 Wozniak, Steve, 538,540
NewConnection Wizard, 332
PC World. 528 release of, 553 X
processors, 528 using the backup utility in, 507
Prudential Financial, 351 Windows XP Command Prompt, 212 X-Cleaner, cleaning spyware, 483
publishing your web site, 524-525 Windows XP Embedded, 233-234 Xbase, 412-413
QuickTime, 293 Windows XP GUI. taskbars and, 208 Xerox Star computer, 542
streaming media. 293 Windows XP Media Center Edition, 228 XML (extensible Markup Language). 555
Symantec 486 Windows XP Professional 296
TopHosts.com, 524 Winsock. 334 Y
viruses and, 536 Interface applications. 335
WeatherChannel, 293 WinZip file compression utility, 121 Y2K bug, 553
Windows Update service, 115 wire-based media. 255-256 Yahoo!, advanced search form, 305
ZDNet, 307, 397 Wire Equivalent Privacy (WEP). 339 Yother, Andy, 28
Webste^s Dictionary, web sites, 423 Young. Michael, 510
Westinghouse, George. 18 wireless access points (WAP), 225
wireless adaptercards. 225 Z
wireless local area network (WLAN), 338
Wireless Markup Language (WML). See ZDNet. web sites, 22L 397
Index 609
IT Tools and Applications by Taxali 0-07-053509*4 Rs. 250*
* Systematic and step-by-step exposure to DOS, Windows 2000, Word 2000, Excel 2000
and PowerPoint 2000.
* Excellent learning aids with Learning objectives, Tips, Notes. Caution, More Information
boxes.
* Designed for the course on IT Tools and Applications offered to students taking the
DOEACC 'O' and ‘A’ level certificate examinations.
Using Information Technology, 5thEd. (Complete Version) by Williams 0-07-049545-9 Rs. 295*
• Covers the fundamental computing concepts that are part of the digital age.
• Includes concepts of software, hardware, data, people, and procedures.
• The text centers on educating today’s technology consumer, using themes of ethics, the
Internet, and communications.
• Demonstrates how the changing world of technology influences our lives and the
decisions we make.
Office XP: The Complete Reference (With CD) by Nelson 0-07-044723-3 Rs. 595*
• Work and communicate more effectively with help from this trusted reference.
• Execute word processing, spreadsheets, multimedia presentations, Internet and e-mail
functions, publishing to the Web. small business programs and more.
• Comprehensive coverage helps new users pick up the basics.
• Existing users can find upgrade specifics all neatly organized so that everyone can quickly
locate exactly the information they need.
’Prices as on June 24.2005. Prices are subject to change without notice.
The McGraw-HillCompanies
Sixth Edition
INTRODUCTION TO kT
COMPUTERS NORTON
START YOUR CAREER WITH NORTON
A trusted name in Information Technology, Peter Norton has been synonymous with
computers for nearly two decades.The unparalleled success of this series has led to the
Indian Adaptation of the 6th Edition of this book -part of the trilogy that also includes
Computing Fundamentals and Essential Concepts. It has brought together what can
only be described as some of the leading educating resources for faculty and students
alike.
Updated W ith: Key Features:
♦New chapter on Information Security ♦Web integrated text and a new
-critical to today's systems and the design with enhanced illustrations
Internet.
♦Self-check questions with answers
♦New coverage ofdatabase
management systems including ♦ Norton Online Notes
overviews ofOracle,IBM DB2,mySQL
and Microsoft SQL Server. ♦Norton Notebooks,Productivity Tips,
Computers In YourCareerand At
♦Expanded coverage ofNetworking Issue articles
and Internet technologies.
♦ End-of-Chapter material including
Lesson Quizzes,Internet Labs,Ethical
Questions and Research and Report
Activities
♦ Selfassessments to reinforce main concepts
♦ Dedicated web site: httpMighered.mcgraw-hiil.com/sites/0070S93744
Vtfirus a t ; www, onmcjrawtvil com
ZS8»*L3i 17«-0.0?-OM37x-S
ISBtt-LO i 0- 07- 05137W-K
Tata McGraw-Hill
Urheberrechtlich geschutztes Material