Technology In Action Complete, Global Edition

Höfundur Alan Evans; Kendall Martin; Mary Anne Poatsy

Útgefandi Pearson International Content

Snið Page Fidelity

Print ISBN 9781292349626

Útgáfa 16

Höfundarréttur 2020

4.990 kr.

Description

Efnisyfirlit

  • Title Page
  • Copyright Page
  • Contents at a Glance
  • Contents
  • Chapter 1 The Impact of Technology in a Changing World
  • Part 1: Technology in Society
  • Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on nat
  • Technology in a Global Society
  • Impact of Tools of Modern Technology
  • Objective 1.1 Describe various technological tools being used to impact national and global issues.
  • Global Issues
  • Objective 1.2 Describe various global social issues that are being affected by technology.
  • Technology Connects Us with Others
  • Technology Impacts How and Why We Connect and Collaborate
  • Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others
  • Technology Impacts How We Consume
  • Objective 1.4 Summarize how technology has impacted the way we choose and consume products and servi
  • The Importance of Computer Literacy
  • Computer Literacy
  • Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate
  • Helpdesk: Technology Impacts
  • Sound Byte: Virtual Computer Tour
  • Try This: What Does Facebook Know about You?
  • Make This: TOOL: IFTTT.com (If This Then That)
  • Part 2: Emerging Technologies and Ethical Computing
  • Artificial Intelligence
  • Artificial Intelligence Basics
  • Objective 1.6 Describe artificial intelligence systems and explain their main goals.
  • Helpdesk: The Impact of Artificial Intelligence
  • Ethics in IT: Ethics in Computing
  • Working with Artificial Intelligence and Other Information Technologies
  • Technology and Your Career
  • Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in
  • Bits&Bytes: Is It AI or Human? Take a Turing Test!
  • Dig Deeper: XR Extended Reality
  • Ethical Computing
  • Defining Ethics
  • Objective 1.8 Define ethics and examine various ethical systems.
  • Sound Byte: How to Debate Ethical Issues
  • Personal Ethics
  • Objective 1.9 Describe influences on the development of your personal ethics.
  • Ethics and Technology
  • Objective 1.10 Present examples of how technology creates ethical challenges.
  • Solve This: How Technology Is Used on the World Stage and in Your Personal Life
  • Chapter 2 Looking at Computers: Understanding the Parts
  • Part 1: Understanding Digital Components
  • Learning Outcome 2.1 You will be able to describe the devices that make up a computer system.
  • Understanding Your Computer
  • Computers Are Data Processing Devices
  • Objective 2.1 Describe the four main functions of a computer system and how they interact with data
  • Binary: The Language of Computers
  • Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed.
  • Sound Byte: Binary Numbers Interactive
  • Types of Computers
  • Objective 2.3 List common types of computers, and discuss their main features.
  • Active Helpdesk: Understanding Bits and Bytes
  • Bits&Bytes: Today’s Supercomputers: Faster Than Ever
  • Input Devices
  • Physical Keyboards and Touch Screens
  • Objective 2.4 Identify the main types of keyboards and touch screens.
  • Mice and Other Pointing Devices
  • Objective 2.5 Describe the main types of mice and pointing devices.
  • Dig Deeper: How Touch Screens Work
  • Bits&Bytes: Distributed Computing: Putting Your Computer to Work While You Sleep
  • Image, Sound, and Sensor Input
  • Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices.
  • Output Devices
  • Image and Audio Output
  • Objective 2.7 Describe options for outputting images and audio from computing devices.
  • Bits&Bytes: Foldable Phones Are Here
  • Printers
  • Objective 2.8 Describe various types of printers, and explain when you would use them.
  • Bits&Bytes: CPUs That Fight Back
  • Try This: What’s Inside My Computer?
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Processing, Storage, and Connectivity
  • Learning Outcome 2.2 You will be able to describe how computers process and store data and how devic
  • Processing and Memory on the Motherboard
  • The Motherboard and Memory
  • Objective 2.9 Describe the functions of the motherboard and RAM.
  • Sound Byte: Smartphones Are Really Smart
  • Processing
  • Objective 2.10 Explain the main functions of the CPU.
  • Storing Data and Information
  • Storage Options on Computing Devices
  • Objective 2.11 Describe the various means of storing data and information with computing devices.
  • Ethics in IT: What Is Ethical Computing?
  • Trends In IT: Green Computing (Green IT)
  • Connecting Peripherals to the Computer
  • Computer Ports
  • Objective 2.12 Describe common types of ports used today.
  • Helpdesk: Exploring Storage Devices and Ports
  • Power Management and Ergonomics
  • Power Controls and Power Management
  • Objective 2.13 Describe how to manage power consumption on computing devices.
  • Setting It All Up: Ergonomics
  • Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
  • Bits&Bytes: Coming Soon: USB 4 and DisplayPort 2
  • Solve This: Technology Wish List
  • Chapter 3 Using the Internet: Making the Most of the Web’s Resources
  • Part 1: Collaborating and Working on the Web
  • Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for colla
  • The Internet and How It Works
  • The Origin of the Internet
  • Objective 3.1 Describe how the Internet got its start.
  • How the Internet Works
  • Objective 3.2 Explain how data travels on the Internet.
  • Collaborating and Communicating on the Web
  • Collaborating with Web Technologies
  • Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
  • Bits&Bytes: Secure Messaging Apps
  • Sound Byte: Blogging
  • Communicating over the Web
  • Objective 3.4 Summarize the technologies used to communicate over the web.
  • Conducting Business on the Web
  • Conducting Business Online
  • Objective 3.5 Describe how business is conducted using the Internet.
  • E-Commerce Safeguards
  • Objective 3.6 Summarize precautions you should take when doing business online.
  • Dig Deeper: How Cloud Computing Works
  • Bits&Bytes: Looking for Extra Money? Try a Side Hustle
  • Helpdesk: Doing Business Online
  • Bits&Bytes: Bitcoin: A Form of Virtual Currency
  • Try This: Use OneDrive to Store and Share Your Files in the Cloud
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Using the Web Effectively
  • Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and
  • Accessing and Moving Around the Web
  • Web Browsers
  • Objective 3.7 Explain what web browsers are, and describe their common features.
  • URLs, Protocols, and Domain Names
  • Objective 3.8 Explain what a URL is and discuss its main parts.
  • Navigating the Web
  • Objective 3.9 Describe tools used to navigate the web.
  • Bits&Bytes: Maintain Your Privacy While Searching the Web
  • Searching the Web Effectively
  • Using Search Engines
  • Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to
  • Bits&Bytes: Digital Assistants and Predictive Search
  • Sound Byte: Finding Information on the Web
  • Evaluating Websites
  • Objective 3.11 Describe how to evaluate a website to ensure it is appropriate to use for research pu
  • Helpdesk: Evaluating Websites
  • Trends In IT: Linked Data and the Semantic Web
  • Bits&Bytes: Why Isn’t Wikipedia Good to Use as a Source for a Research Paper?
  • Using the Web Ethically
  • Digital Activism
  • Objective 3.12 Demonstrate an understanding of the ethical issues regarding digital activism.
  • Geolocation
  • Objective 3.13 Demonstrate an understanding of the ethical issues regarding location tracking applic
  • Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare?
  • Ethics in IT: Cyber Harassment
  • Solve This: Create a Report: Conducting Research on the Web
  • Chapter 4 Application Software: Programs That Let You Work and Play
  • Part 1: Accessing, Using, and Managing Software
  • Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe ho
  • Software Basics
  • Application vs. System Software
  • Objective 4.1 Compare application software and system software.
  • Distributing Software
  • Objective 4.2 Explain the differences between commercial software and open source software and descr
  • Bits&Bytes: Finding Alternative Software
  • Managing Your Software
  • Purchasing Software
  • Objective 4.3 Explain the different options for purchasing software.
  • Trends In IT: Mobile Payment Apps: The Power of M-Commerce
  • Helpdesk: Buying and Installing Software
  • Installing and Uninstalling Software
  • Objective 4.4 Describe how to install and uninstall software.
  • Bits&Bytes: Ridding Your Computer of “Bloat”
  • Upgrading Software
  • Objective 4.5 Explain the considerations around the decision to upgrade your software.
  • Dig Deeper: How Number Systems Work
  • Software Licenses
  • Objective 4.6 Explain how software licenses function.
  • Sound Byte: Where Does Binary Show Up?
  • Ethics in IT: Can I Install Software That I Don’t Own?
  • Try This: Citing Website Sources
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Application Software
  • Learning Outcome 4.2 Describe the different types of application software used for productivity and
  • Productivity and Business Software
  • Productivity Software
  • Objective 4.7 Categorize the types of application software used to enhance productivity and describe
  • Bits&Bytes: Productivity Software Tips and Tricks
  • Bits&Bytes: How to Open Unknown File Types
  • Bits&Bytes: Going Beyond PowerPoint
  • Sound Byte: Programming for End Users
  • Business Software
  • Objective 4.8 Summarize the types of software that large and small businesses use.
  • Bits&Bytes: Need to Work as a Team? Try These Collaboration Tools
  • Multimedia and Educational Software
  • Digital Multimedia Software
  • Objective 4.9 Describe the uses and features of digital multimedia software.
  • Digital Audio Software
  • Objective 4.10 Describe the uses and features of digital audio software.
  • Helpdesk: Choosing Software
  • App Creation Software
  • Objective 4.11 Describe the features of app creation software.
  • Bits&Bytes: Mirror, Mirror . . .
  • Educational and Reference Software
  • Objective 4.12 Categorize educational and reference software and explain their features.
  • Solve This: Analyzing Benchmark Data
  • Chapter 5 System Software: The Operating System, Utility Programs, and File Management
  • Part 1: Understanding System Software
  • Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and ex
  • Operating System Fundamentals
  • Operating System Basics
  • Objective 5.1 Discuss the functions of the operating system.
  • Operating Systems for Personal Use
  • Objective 5.2 Explain the most popular operating systems for personal use.
  • Bits&Bytes: Quick Assist
  • Bits&Bytes: Operating Systems for the Smart Home
  • Operating Systems for Machinery, Networks, and Business
  • Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
  • Ethics in IT: The Great Debate: Is macOS Safer Than Windows?
  • What the Operating System Does
  • The User Interface
  • Objective 5.4 Explain how the operating system provides a means for users to interact with the compu
  • Hardware Coordination
  • Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory,
  • Sound Byte: Using Windows Task Manager to Evaluate System Performance
  • Software Application Coordination
  • Objective 5.6 Explain how the operating system interacts with application software.
  • Trends In IT: Are Personal Computers Becoming More Human?
  • Starting Your Computer
  • The Boot Process
  • Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors
  • Helpdesk: Starting the Computer: The Boot Process
  • Try This: Using Virtual Desktops in Windows 10
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Using System Software
  • Learning Outcome 5.2 You will be able to describe how to use system software, including the user int
  • The Windows Interface
  • Using Windows 10
  • Objective 5.8 Describe the main features of the Windows interface.
  • Bits&Bytes: Snip and Sketch
  • File Management
  • Organizing Your Files
  • Objective 5.9 Summarize how the operating system helps keep your computer organized and manages file
  • Bits&Bytes: Save Files in the Cloud
  • Bits&Bytes: Using Storage Sense
  • Helpdesk: Organizing Your Computer: File Management
  • Utility Programs
  • Windows Administrative Utilities
  • Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide acc
  • Dig Deeper: How Disk Defragmenting Utilities Work
  • Sound Byte: Hard Disk Anatomy
  • Solve This: Operating Systems: Analyzing Market Share
  • Chapter 6 Understanding and Assessing Hardware: Evaluating Your System
  • Part 1: Evaluating Key Subsystems
  • Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, inc
  • Your Ideal Computing Device
  • Moore’s Law
  • Objective 6.1 Describe the changes in CPU performance over the past several decades.
  • Selecting a Computing Device
  • Objective 6.2 Compare and contrast a variety of computing devices.
  • Evaluating the CPU Subsystem
  • How the CPU Works
  • Objective 6.3 Describe how a CPU is designed and how it operates.
  • Bits&Bytes: Liquid Cooling
  • Measuring CPU Performance
  • Objective 6.4 Describe tools used to measure and evaluate CPU performance.
  • Dig Deeper: The Machine Cycle
  • Evaluating the Memory Subsystem
  • Random Access Memory
  • Objective 6.5 Discuss how RAM is used in a computer system.
  • Adding RAM
  • Objective 6.6 Evaluate whether adding RAM to a system is desirable.
  • Helpdesk: Evaluating Your CPU and RAM
  • Sound Byte: Installing RAM
  • Try This: Measure Your System Performance
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Evaluating Other Subsystems and Making a Decision
  • Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media
  • Evaluating the Storage Subsystem
  • Types of Storage Drives
  • Objective 6.7 Classify and describe the major types of nonvolatile storage drives.
  • Sound Byte: Installing an SSD Drive
  • Dig Deeper: How Storage Devices Work
  • Storage Needs
  • Objective 6.8 Evaluate the amount and type of storage needed for a system.
  • Bits&Bytes: How Hot Is My GPU?
  • Evaluating the Media Subsystems
  • Video Cards
  • Objective 6.9 Describe the features of video cards.
  • Bits&Bytes: Make Your Tablet a Second Monitor
  • Trends In IT: USB 3.2 C Ports: One Port to Rule Them All!
  • Sound Cards
  • Objective 6.10 Describe the features of sound cards.
  • Helpdesk: Evaluating Computer System Components
  • Evaluating System Reliability and Moving On
  • Maintaining System Reliability
  • Objective 6.11 Describe steps you can take to optimize your system’s reliability.
  • Getting Rid of Your Old Computer
  • Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer.
  • Ethics in IT: Free Hardware for All
  • Solve This: Laptop Alternatives
  • Chapter 7 Networking: Connecting Computing Devices
  • Part 1: How Networks Function
  • Learning Outcome 7.1 You will be able to explain the basics of networking, including the components
  • Networking Fundamentals
  • Understanding Networks
  • Objective 7.1 Describe computer networks and their pros and cons.
  • Helpdesk: Understanding Networking
  • Network Architectures
  • Network Designs
  • Objective 7.2 Explain the different ways networks are defined.
  • Dig Deeper: P2P File Sharing
  • Network Components
  • Transmission Media
  • Objective 7.3 Describe the types of transmission media used in networks.
  • Sound Byte: Installing a Home Computer Network
  • Basic Network Hardware
  • Objective 7.4 Describe the basic hardware devices necessary for networks.
  • Network Software
  • Objective 7.5 Describe the type of software necessary for networks.
  • Trends In IT: How Smart Is Your Home?
  • Connecting to the Internet
  • Broadband Internet Connections
  • Objective 7.6 Summarize the broadband options available to access the Internet.
  • Bits&Bytes: Net Neutrality
  • Bits&Bytes: Who’s Not on Broadband?
  • Wireless Internet Access
  • Objective 7.7 Summarize how to access the Internet wirelessly.
  • Try This: Testing Your Internet Connection Speed
  • Make This: TOOL: Ping and Telnet
  • Part 2: Your Home Network
  • Learning Outcome 7.2 You will be able to describe what is necessary to install and configure a home
  • Installing and Configuring Home Networks
  • Planning Your Home Network
  • Objective 7.8 Explain what should be considered before creating a home network.
  • Bits&Bytes: Power Your Devices—Wirelessly
  • Connecting Devices to a Network
  • Objective 7.9 Describe how to set up a home network.
  • Bits&Bytes: Mesh Networks: An Emerging Alternative
  • Bits&Bytes: Analyzing Network Problems
  • Managing and Securing Wireless Networks
  • Troubleshooting Wireless Network Problems
  • Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them.
  • Securing Wireless Networks
  • Objective 7.11 Describe how to secure wireless home networks.
  • Sound Byte: Securing Wireless Networks
  • Helpdesk: Managing and Securing Your Wireless Network
  • Solve This: Home Networking Guide
  • Chapter 8 Managing Your Digital Lifestyle: Challenges and Ethics
  • Part 1: The Impact of Digital Information
  • Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technol
  • Digital Basics
  • Digital Convergence and the Internet of Things
  • Objective 8.1 Describe how digital convergence and the Internet of Things have evolved.
  • Digital versus Analog
  • Objective 8.2 Explain the differences between digital and analog signals.
  • Digital Publishing
  • e-Readers
  • Objective 8.3 Describe the different types of e-readers.
  • Using e-Texts
  • Objective 8.4 Explain how to purchase, borrow, and publish e-texts.
  • Helpdesk: Managing Digital Media
  • Digital Music
  • Creating and Storing Digital Music
  • Objective 8.5 Describe how digital music is created and stored.
  • Distributing Digital Music
  • Objective 8.6 Summarize how to listen to and publish digital music.
  • Digital Media
  • Digital Photography
  • Objective 8.7 Explain how best to create, print, and share digital photos.
  • Sound Byte: Enhancing Photos with Image-Editing Software
  • Digital Video
  • Objective 8.8 Describe how to create, edit, and distribute digital video.
  • Trends In IT: Digital Asset Managers Needed!
  • Managing Your Digital Lifestyle
  • Digital Challenges and Dilemmas
  • Objective 8.9 Discuss the challenges in managing an active digital lifestyle.
  • Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?
  • Bits&Bytes: The Rise of Wearable Technology
  • Bits&Bytes: Goodbye Net Neutrality. . .Hello Bandwidth Throttling
  • Try This: Creating and Publishing a Movie
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Ethical Issues of Living in the Digital Age
  • Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways
  • Protection of Digital Property
  • Intellectual Property
  • Objective 8.10 Describe the various types of intellectual property.
  • Copyright Basics
  • Objective 8.11 Explain how copyright is obtained and the rights granted to the owners.
  • Helpdesk: Understanding Intellectual Property and Copyright
  • Copyright Infringement
  • Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe si
  • Bits&Bytes: Software Piracy: It’s More Than Just Downloading and Copying
  • Bits&Bytes: Your Tax Dollars at Work: Free Media without Permission!
  • Living Ethically in the Digital Era
  • Plagiarism
  • Objective 8.13 Explain plagiarism and strategies for avoiding it.
  • Hoaxes and Digital Manipulation
  • Objective 8.14 Describe hoaxes and digital manipulation.
  • Sound Byte: Plagiarism and Intellectual Property
  • Protecting Your Online Reputation
  • Objective 8.15 Describe what comprises your online reputation and how to protect it.
  • Bits&Bytes: Celebrity Photographic Rights
  • Ethics in IT: Acceptable Use Policies: What You Can and Can’t Do
  • Solve This: Intellectual Property and Copyright Basics
  • Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
  • Part 1: Threats to Your Digital Assets
  • Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and
  • Identity Theft and Hackers
  • Identity Theft
  • Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpe
  • Hacking
  • Objective 9.2 Describe the different types of hackers and the tools they use.
  • Bits&Bytes: Next Generation White Hat Hackers
  • Computer Viruses
  • Virus Basics
  • Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing
  • Sound Byte: Protecting Your Computer
  • Types of Viruses
  • Objective 9.4 List the different categories of computer viruses, and describe their behaviors.
  • Online Annoyances and Social Engineering
  • Online Annoyances
  • Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security.
  • Social Engineering
  • Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey t
  • Bits&Bytes: I Received a Data Breach Letter . . . Now What?
  • Ethics in IT: You’re Being Watched . . . But Are You Aware You’re Being Watched?
  • Helpdesk: Threats to Your Digital Life
  • Trends In IT: Spear Phishing: The Bane of Data Breaches
  • Try This: Testing Your Network Security
  • Make This: App Inventor 2 or Thunkable
  • Part 2: Protecting Your Digital Property
  • Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and
  • Restricting Access to Your Digital Assets
  • Firewalls
  • Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers.
  • Preventing Virus Infections
  • Objective 9.8 Explain how to protect your computer from virus infection.
  • Helpdesk: Understanding Firewalls
  • Authentication: Passwords and Biometrics
  • Objective 9.9 Describe how passwords and biometric characteristics can be used for user authenticati
  • Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots
  • Anonymous Web Surfing: Hiding from Prying Eyes
  • Objective 9.10 Describe ways to surf the Web anonymously.
  • Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords!
  • Keeping Your Data Safe
  • Protecting Your Personal Information
  • Objective 9.11 Describe the types of information you should never share online.
  • Sound Byte: Managing Computer Security with Windows Tools
  • Backing Up Your Data
  • Objective 9.12 List the various types of backups you can perform on your computing devices, and expl
  • Protecting Your Physical Computing Assets
  • Environmental Factors and Power Surges
  • Objective 9.13 Explain the negative effects environment and power surges can have on computing devic
  • Preventing and Handling Theft
  • Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the pr
  • Dig Deeper: Computer Forensics: How It Works
  • Solve This: Computer Security
  • Chapter 10 Behind the Scenes: Software Programming
  • Part 1: Understanding Programming
  • Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify
  • Life Cycle of an Information System
  • The Importance of Programming
  • Objective 10.1 Describe the importance of programming to both software developers and users.
  • System Development Life Cycle
  • Objective 10.2 Summarize the stages of the system development life cycle.
  • Bits&Bytes: The Agile Scrum
  • Life Cycle of a Program
  • The Program Development Life Cycle
  • Objective 10.3 Define programming and list the steps in the program development life cycle.
  • The Problem Statement
  • Objective 10.4 Describe how programmers construct a complete problem statement from a description of
  • Sound Byte: Using the Arduino Microcontroller
  • Helpdesk: Understanding Software Programming
  • Algorithm Development
  • Objective 10.5 Explain how programmers use flow control and design methodologies when developing alg
  • Bits&Bytes: Coding with a Purpose
  • Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operator
  • Coding
  • Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the
  • Debugging
  • Objective 10.7 Identify the role of debugging in program development.
  • Bits&Bytes: Many Languages on Display
  • Testing and Documentation
  • Objective 10.8 Explain the importance of testing and documentation in program development.
  • Try This: Programming with Corona
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Programming Languages
  • Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropr
  • Many Programming Languages
  • Need for Diverse Languages
  • Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
  • Sound Byte: Programming with the Processing Language
  • Selecting the Right Language
  • Objective 10.10 Summarize the considerations in identifying an appropriate programming language for
  • Bits&Bytes: Learn to Code for Free at freeCodeCamp
  • Ethics in IT: When Software Runs Awry
  • Exploring Programming Languages
  • Tour of Modern Languages
  • Objective 10.11 Compare and contrast modern programming languages.
  • Bits&Bytes: Your Software Portfolio
  • Trends In IT: Emerging Technologies: Unite All Your Video Game Design Tools
  • Future of Programming Languages
  • Objective 10.12 State key principles in the development of future programming languages.
  • Helpdesk: A Variety of Programming Languages
  • Solve This: Time Sheets
  • Chapter 11 Behind the Scenes: Databases and Information Systems
  • Part 1: Database Fundamentals
  • Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common
  • The Need for Databases
  • Database Basics
  • Objective 11.1 Explain what a database is and why databases are useful.
  • Database Types
  • Flat Databases
  • Objective 11.2 Describe features of flat databases.
  • Relational Databases
  • Objective 11.3 Describe features of relational databases.
  • Bits&Bytes: Normal Forms
  • Object-Oriented Databases
  • Objective 11.4 Describe features of object-oriented databases.
  • Multidimensional Databases
  • Objective 11.5 Describe features of multidimensional databases.
  • Helpdesk: Using Databases
  • NoSQL Databases
  • Objective 11.6 Describe how Web 2.0 data is managed in a database.
  • Using Databases
  • Relational Database Components and Functions
  • Objective 11.7 Describe how relational databases organize and define data.
  • Sound Byte: Creating and Querying an Access Database
  • Bits&Bytes: Music Streaming Services Use Databases
  • Inputting and Managing Data
  • Objective 11.8 Describe how data is inputted and managed in a database.
  • Dig Deeper: Structured Query Language (SQL)
  • Bits&Bytes: Data Dashboards: Useful Visualization Tools
  • Try This: Using Excel’s Database Functions
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: How Businesses Use Databases
  • Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, an
  • Data Warehousing and Storage
  • Data Warehouses and Data Marts
  • Objective 11.9 Explain what data warehouses and data marts are and how they are used.
  • Helpdesk: How Businesses Use Databases
  • Bits&Bytes: Data Warehouses Are Going to the Cloud
  • Data Mining
  • Objective 11.10 Describe data mining and how it works.
  • Bits&Bytes: Hadoop: How Big Data Is Being Managed
  • Ethics in IT: Data, Data Everywhere—But Is It Protected?
  • Using Databases to Make Business Decisions
  • Business Information Systems
  • Objective 11.11 Describe the main types of business information systems and how they are used by bus
  • Sound Byte: Analyzing Data with Microsoft Power BI Suite
  • Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web
  • Trends In IT: Mobile Business Intelligence
  • Solve This: College Database
  • Chapter 12 Behind the Scenes: Networking and Security in the Business World
  • Part 1: Client/Server Networks and Topologies
  • Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers f
  • Client/Server Network Basics
  • Networking Advantages
  • Objective 12.1 List the advantages for businesses of installing a network.
  • Comparing Client/Server and Peer-to-Peer Networks
  • Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
  • Types of Client/Server Networks
  • Objective 12.3 Describe the common types of client/server networks as well as other networks busines
  • Bits&Bytes: Make Your Browser Protect You!
  • Servers and Network Topologies
  • Servers
  • Objective 12.4 List the common types of servers found on client/server networks.
  • Helpdesk: Using Servers
  • Trends In IT: Virtualization: Making Servers Work Harder
  • Network Topologies
  • Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages
  • Sound Byte: Network Topology and Navigation Devices
  • Try This: Sharing Printers on a Network Using Windows
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Setting Up Business Networks
  • Learning Outcome 12.2 You will be able to describe transmission media, network operating system soft
  • Transmission Media
  • Wired and Wireless Transmission Media
  • Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
  • Bits&Bytes: Guidance on Green Computing
  • Network Adapters and Navigation Devices
  • Network Adapters
  • Objective 12.7 Describe how network adapters help data move around a network.
  • MAC Addresses
  • Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
  • Switches, Bridges, and Routers
  • Objective 12.9 List the various network navigation devices, and explain how they help route data thr
  • Helpdesk: Transmission Media and Network Adapters
  • Network Operating Systems and Network Security
  • Network Operating Systems
  • Objective 12.10 Explain why network operating systems are necessary for networks to function.
  • Bits&Bytes: Extending Smart Homes: Smart Yards Coming Soon!
  • Client/Server Network Security
  • Objective 12.11 List major security threats to networks, and explain how network administrators miti
  • Dig Deeper: The OSI Model: Defining Protocol Standards
  • Sound Byte: A Day in the Life of a Network Technician
  • Ethics in IT: How Should Companies Handle Data Breaches?
  • Bits&Bytes: Logging in? Try Finger Vein Recognition
  • Solve This: Cyber-Security Flyer and Mail Merge
  • Chapter 13 Behind the Scenes: How the Internet Works
  • Part 1: Inner Workings of the Internet
  • Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how
  • Internet Management and Networking
  • Management
  • Objective 13.1 Describe the management of the Internet.
  • Networking Components
  • Objective 13.2 Explain how the Internet’s networking components interact.
  • Data Transmission
  • Objective 13.3 List and describe the Internet protocols used for data transmission.
  • Bits&Bytes: A Free Cloud-Based Server for You
  • Internet Identity
  • IP Addresses
  • Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
  • Helpdesk: Understanding IP Addresses, Domain Names, and Protocols
  • Bits&Bytes: What’s Your IP Address?
  • Bits&Bytes: Amazing Applications of IoT
  • Sound Byte: Creating Web Pages with Squarespace
  • Dig Deeper: Connection-Oriented Versus Connectionless Protocols
  • Domain Names
  • Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
  • Bits&Bytes: Scale Up for Success
  • Try This: Ping Me
  • Make This: TOOL: App Inventor 2 or Thunkable
  • Part 2: Coding and Communicating on the Internet
  • Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applicat
  • Web Technologies
  • Web Development
  • Objective 13.6 Compare and contrast a variety of web development languages.
  • Bits&Bytes: CodePen: An Editing Community for Web Designers
  • Application Architecture
  • Objective 13.7 Compare and contrast server-side and client-side application software.
  • Sound Byte: Client-Side Web Page Development
  • Bits&Bytes: Repl It
  • Communications over the Internet
  • Types of Internet Communication
  • Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
  • Bits&Bytes: AI and Your Inbox
  • Encryption
  • Objective 13.9 Explain how data encryption improves security.
  • Bits&Bytes: Numbers: We Wouldn’t Have Encryption Without Them!
  • Ethics in IT: Do We Really Want Strong Encryption?
  • Helpdesk: Keeping E-Mail Secure
  • Trends In IT: Cognitive Computing
  • Solve This: Creating an HTML Document
  • Appendix A The History of the Personal Computer
  • Appendix B Careers in IT
  • Glossary
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • Z
  • Index
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
Show More

Additional information

Veldu vöru

Rafbók til eignar, Leiga á rafbók í 180 daga, Leiga á rafbók í 365 daga, Leiga á rafbók í 90 daga

Reviews

There are no reviews yet.

Be the first to review “Technology In Action Complete, Global Edition”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð