Technology in Action, Global Edition

Höfundur Alan Evans; Kendall Martin; Mary Anne Poatsy

Útgefandi Pearson International Content

Snið Page Fidelity

Print ISBN 9781292728209

Útgáfa 18

Höfundarréttur 2023

4.990 kr.

Description

Efnisyfirlit

  • Title Page
  • Copyright
  • Pearson’s Commitment to Diversity, Equity, and Inclusion
  • Contents at a Glance
  • Contents
  • Learn Technology by Using Technology in Action 18e
  • Instructor Teaching Resources
  • Letter from the Authors
  • About the Authors
  • Acknowledgments
  • Don’t just read about technology. Interact with it in MyLab IT
  • Chapter 1. The Impact of Technology in a Changing World
  • Part 1: Technology in Society
  • Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on nat
  • Technology in a Global Society
  • Impact of Tools of Modern Technology
  • Objective 1.1 Describe various technological tools being used to impact national and global issues
  • Global Issues
  • Objective 1.2 Describe various global social issues that are being affected by technology
  • Technology Connects Us with Others
  • Technology Impacts How and Why We Connect and Collaborate
  • Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others
  • Technology Impacts How We Consume
  • Objective 1.4 Summarize how technology has impacted the way we choose and consume products and servi
  • The Importance of Computer Literacy
  • Computer Literacy
  • Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate
  • Helpdesk: Technology Impacts
  • Sound Byte: Virtual Computer Tour
  • Try This: Artificially Intelligent Artwork
  • Make This: Tool: IFTTT.com (If This Then That)
  • Part 2: Artificial Intelligence and Ethical Computing
  • Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intellig
  • Artificial Intelligence
  • Artificial Intelligence Basics
  • Objective 1.6 Describe artificial intelligence systems and explain their main goals
  • Helpdesk: The Impact of Artificial Intelligence
  • Bits&Bytes: Hands-On Artificial Intelligence
  • Bits&Bytes: Machine Learning to Create New Instruments
  • Ethics In It: Ethics in Computing
  • Working with Artificial Intelligence and Other Information Technologies
  • The Impact of Technology on Your Career
  • Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in
  • Bits&Bytes: Is It AI or Human? Take a Turing Test!
  • Dig Deeper: XR Extended Reality
  • Ethical Computing
  • Defining Ethics
  • Objective 1.8 Define ethics and describe various ethical systems
  • Sound Byte: How to Debate Ethical Issues
  • Personal Ethics
  • Objective 1.9 Describe influences on the development of your personal ethics
  • Ethics and Technology
  • Objective 1.10 Present examples of how technology creates ethical challenges
  • Solve This: How Technology Is Used on the World Stage and in Your Personal Life
  • Chapter 2. Looking at Computers: Understanding the Parts
  • Part 1: Understanding Digital Components
  • Learning Outcome 2.1 You will be able to describe the devices that make up a computer system
  • Understanding Your Computer
  • Computers Are Data Processing Devices
  • Objective 2.1 Describe the four main functions of a computer system and how they interact with data
  • Binary: The Language of Computers
  • Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed
  • Sound Byte: Binary Numbers Interactive
  • Types of Computers
  • Objective 2.3 List common types of computers, and discuss their main features
  • Active Helpdesk: Understanding Bits and Bytes
  • Bits&Bytes: Today’s Supercomputers: Faster Than Ever
  • Input Devices
  • Physical Keyboards and Touch Screens
  • Objective 2.4 Identify the main types of keyboards and touch screens
  • Mice and Other Pointing Devices
  • Objective 2.5 Describe the main types of mice and pointing devices
  • Bits&Bytes: Foldable Glass Is Making Foldable Phones Better!
  • Image, Sound, and Sensor Input
  • Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices
  • Output Devices
  • Image and Audio Output
  • Objective 2.7 Describe options for outputting images and audio from computing devices
  • Bits&Bytes: Teraflops in Your Living Room: Gaming on Overdrive
  • Printers
  • Objective 2.8 Describe various types of printers, and explain when you would use them
  • Bits&Bytes: CPUs That Fight Back
  • Try This: What’s Inside My Computer?
  • Make This: Tool: App Inventor 2
  • Part 2: Processing, Storage, and Connectivity
  • Learning Outcome 2.2 You will be able to describe how computers process and store data and how devic
  • Processing and Memory on the Motherboard
  • The Motherboard and Memory
  • Objective 2.9 Describe the functions of the motherboard and RAM
  • Sound Byte: Smartphones Are Really Smart
  • Processing
  • Objective 2.10 Explain the main functions of the CPU
  • Storing Data and Information
  • Storage Options on Computing Devices
  • Objective 2.11 Describe the various means of storing data and information with computing devices
  • Ethics In It: What Is Ethical Computing?
  • Trends In It: Green Computing (Green IT)
  • Connecting Peripherals to the Computer
  • Computer Ports
  • Objective 2.12 Describe common types of ports used today
  • Helpdesk: Exploring Storage Devices and Ports
  • Power Management and Ergonomics
  • Power Controls and Power Management
  • Objective 2.13 Describe how to manage power consumption on computing devices
  • Bits&Bytes: Smart Coral Reefs
  • Dig Deeper: Building Your Own Gaming Computer
  • Setting It All Up: Ergonomics
  • Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices
  • Solve This with Excel: Technology Wish List
  • Chapter 3. Using the Internet: Making the Most of the Web’s Resources
  • Part 1: Collaborating and Working on the Web
  • Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for colla
  • The Internet and How It Works
  • The Origin of the Internet
  • Objective 3.1 Describe how the Internet got its start
  • How the Internet Works
  • Objective 3.2 Explain how data travels on the Internet
  • Collaborating and Communicating on the Web
  • Mass Communication and Collaboration
  • Objective 3.3 Evaluate the tools and technologies used to communicate and collaborate with large gro
  • Bits&Bytes: Social Media Influencers
  • Sound Byte: Blogging
  • Personal Communication on the Web
  • Objective 3.4 Summarize the technologies used for personal communications over the web
  • Conducting Business on the Web
  • Being Productive with Cloud Technologies
  • Objective 3.5 Describe how cloud technologies are used to create, store, and share files
  • Dig Deeper: Artificial Intelligence and Cloud Computing
  • Conducting Business Online
  • Objective 3.6 Describe how business is conducted using the Internet
  • Bits&Bytes: Looking for Extra Money? Try a Side Hustle
  • E-Commerce Safeguards
  • Objective 3.7 Summarize precautions you should take when doing business online
  • Helpdesk: Doing Business Online
  • Bits&Bytes: Bitcoin: A Form of Virtual Currency
  • Try This: Use OneDrive to Store and Share Your Files in the Cloud
  • Make This: Tool: App Inventor 2
  • Part 2: Using the Web Effectively
  • Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and
  • Accessing and Moving Around the Web
  • Web Browsers
  • Objective 3.8 Explain what web browsers are and describe their common features
  • URLs, Protocols, and Domain Names
  • Objective 3.9 Explain what a URL is and discuss its main parts
  • Navigating the Web
  • Objective 3.10 Describe tools used to navigate the web
  • Searching the Web Effectively
  • Using Search Engines
  • Objective 3.11 Describe the types of tools used to search the web and summarize strategies used to r
  • Bits&Bytes: Maintain Your Privacy While Searching the Web
  • Sound Byte: Finding Information on the Web
  • Evaluating Websites
  • Objective 3.12 Describe how to evaluate a website to ensure it is appropriate to use for research pu
  • Helpdesk: Evaluating Websites
  • Trends In It: Linked Data and the Semantic Web
  • Using the Web Ethically
  • Ethical Issues on the Internet
  • Objective 3.13 Demonstrate an understanding of Internet-related ethical issues
  • Bits&Bytes: Did He Really Say That?
  • Using the Internet Ethically
  • Objective 3.14 Demonstrate an ability to conduct yourself on the Internet in an ethical manner
  • Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare?
  • Ethics In It: Cyber Harassment
  • Solve This: Effective Internet Research
  • Chapter 4. Application Software: Programs That Let You Work and Play
  • Part 1: Accessing, Using, and Managing Software
  • Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe ho
  • Software Basics
  • Types of Software
  • Objective 4.1 Compare application and system software and describe the different types of applicatio
  • Purchasing Software
  • Objective 4.2 Explain the different options for purchasing software
  • Bits&Bytes: Useful Apps to Help you Focus while Working or Learning Remotely
  • Trends In It: Artificial Intelligence in Health Care
  • Managing Your Software
  • Installing and Uninstalling Software
  • Objective 4.3 Describe how to install and uninstall software
  • Helpdesk: Buying and Installing Software
  • Bits&Bytes: Ridding Your Computer of Bloat
  • Upgrading Software
  • Objective 4.4 Explain the considerations around the decision to upgrade your software
  • Dig Deeper: How Number Systems Work
  • Software Licenses
  • Objective 4.5 Explain how software licenses function
  • Sound Byte: Where Does Binary Show Up?
  • Ethics In It: Can I Use Software on My Device When I Don’t Own the License?
  • Try This: Citing Website Sources
  • Make This: Tool: App Inventor 2
  • Part 2: Application Software
  • Learning Outcome 4.2 Describe the different types of application software used for productivity and
  • Productivity and Business Software
  • Productivity Software
  • Objective 4.6 Categorize the types of application software used to enhance productivity and describe
  • Bits&Bytes: Productivity Software Tips and Tricks
  • Bits&Bytes: How to Open Unknown File Types
  • Bits&Bytes: Going Beyond PowerPoint
  • Sound Byte: Programming for End Users
  • Business Software
  • Objective 4.7 Summarize the types of software that small and large businesses use
  • Multimedia and Educational Software
  • Multimedia Software
  • Objective 4.8 Describe the uses and features of multimedia software
  • Bits&Bytes: Scalable Vector Graphics: Text-Based Images
  • Audio Software
  • Objective 4.9 Describe the uses and features of audio software
  • Helpdesk: Choosing Software
  • App Creation Software
  • Objective 4.10 Describe the features of app creation software
  • Bits&Bytes: Mirror, Mirror . . .
  • Educational and Reference Software
  • Objective 4.11 Categorize educational and reference software and explain their features
  • Solve This with Excel: Computer and Information Technology Jobs Outlook
  • Chapter 5. System Software: The Operating System, Utility Programs, and File Management
  • Part 1: Understanding System Software
  • Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and ex
  • Operating System Fundamentals
  • Operating System Basics
  • Objective 5.1 Discuss the functions of the operating system
  • Operating Systems for Personal Use
  • Objective 5.2 Explain the most popular operating systems for personal use
  • Bits&Bytes: Taking Control Remotely
  • Operating Systems for Machinery, Networks, and Business
  • Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business
  • Ethics In It: The Great Debate: Is macOS Safer Than Windows?
  • What the Operating System Does
  • The User Interface
  • Objective 5.4 Explain how the operating system provides a means for users to interact with the compu
  • Hardware Coordination
  • Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory,
  • Sound Byte: Using Windows Task Manager to Evaluate System Performance
  • Software Application Coordination
  • Objective 5.6 Explain how the operating system interacts with application software
  • Trends In It: Ethical Hacking
  • Starting Your Computer
  • The Boot Process
  • Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors
  • Helpdesk: Starting the Computer: The Boot Process
  • Try This: Using Virtual Desktops in Windows
  • Make This: Tool: App Inventor 2
  • Part 2: Using System Software
  • Learning Outcome 5.2 You will be able to describe how to use system software, including the user int
  • The Windows Interface
  • Using Windows 11
  • Objective 5.8 Describe the main features of the Windows interface
  • Bits&Bytes: Smartphone and OS Integration
  • File Management
  • Organizing Your Files
  • Objective 5.9 Summarize how the operating system helps keep your computer organized and manages file
  • Bits&Bytes: Manage Files in macOS
  • Bits&Bytes: Save Files in the Cloud
  • Helpdesk: Organizing Your Computer: File Management
  • Utility Programs
  • Windows Administrative Utilities
  • Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide acc
  • Sound Byte: Hard Disk Anatomy
  • Dig Deeper: Windows Tricks and Shortcuts
  • Solve This: Operating Systems: Analyzing Market Share
  • Chapter 6. Understanding and Assessing Hardware: Evaluating Your System
  • Part 1: Evaluating Key Subsystems
  • Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, inc
  • Your Ideal Computing Device
  • Moore’s Law
  • Objective 6.1 Describe the changes in CPU performance over the past several decades
  • Selecting a Computing Device
  • Objective 6.2 Compare and contrast a variety of computing devices
  • Evaluating the CPU Subsystem
  • How the CPU Works
  • Objective 6.3 Describe how a CPU is designed and how it operates
  • Measuring CPU Performance
  • Objective 6.4 Describe tools used to measure and evaluate CPU performance
  • Bits&Bytes: Liquid Cooling
  • Evaluating the Memory Subsystem
  • Random Access Memory
  • Objective 6.5 Discuss how RAM is used in a computer system
  • Helpdesk: Evaluating Your CPU and RAM
  • Adding RAM
  • Objective 6.6 Evaluate whether adding RAM to a system is desirable
  • Sound Byte: Installing RAM
  • Bits&Bytes: Your Next Job Might Be Totally VR!
  • Try This: Measure Your System Performance
  • Make This: Tool: App Inventor 2
  • Part 2: Evaluating Other Subsystems and Making a Decision
  • Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media
  • Evaluating the Storage Subsystem
  • Types of Storage Drives
  • Objective 6.7 Classify and describe the major types of nonvolatile storage drives
  • Sound Byte: Installing an SSD Drive
  • Storage Needs
  • Objective 6.8 Evaluate the amount and type of storage needed for a system
  • Bits&Bytes: Intel’s EVO Platform: What Exactly Does It Mean?
  • Evaluating the Media Subsystems
  • Video Cards
  • Objective 6.9 Describe the features of video cards
  • Bits&Bytes: How Hot Is My GPU?
  • Bits&Bytes: Multiple Devices Made Easy: macOS Universal Control
  • Trends In It: Thunderbolt and USB Ports: Which Ones Do I Need?
  • Sound Cards
  • Objective 6.10 Describe the features of sound cards
  • Helpdesk: Evaluating Computer System Components
  • Evaluating System Reliability and Moving On
  • Maintaining System Reliability
  • Objective 6.11 Describe steps you can take to optimize your system’s reliability
  • Getting Rid of Your Old Computer
  • Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer
  • Ethics In It: Bridging the Digital Divide: Hardware for the Masses
  • Solve This with Excel: Laptop Alternatives
  • Chapter 7. Networking: Connecting Computing Devices
  • Part 1: How Networks Function
  • Learning Outcome 7.1 You will be able to explain the basics of networking, including the components
  • Networking Fundamentals
  • Understanding Networks
  • Objective 7.1 Describe networks and their pros and cons
  • Helpdesk: Understanding Networking
  • Network Architectures
  • Network Designs
  • Objective 7.2 Explain the different ways networks are defined
  • Dig Deeper: P2P Blockchain Networks
  • Bits&Bytes: Watch Out for WiGig and HaLow
  • Network Components
  • Transmission Media
  • Objective 7.3 Describe the types of transmission media used in networks
  • Basic Network Hardware
  • Objective 7.4 Describe the basic hardware devices necessary for networks
  • Sound Byte: Installing a Home Computer Network
  • Network Software
  • Objective 7.5 Describe the type of software necessary for networks
  • Connecting to the Internet
  • Broadband Internet Connections
  • Objective 7.6 Summarize the broadband options available to access the Internet
  • Bits&Bytes: Who’s Not on Broadband?
  • Wireless Internet Access
  • Objective 7.7 Summarize how to access the Internet wirelessly
  • Bits&Bytes: Net Neutrality: The Debate Continues
  • Try This: Testing Your Internet Connection Speed
  • Make This: Tool: Ping and Telnet
  • Part 2: Your Home Network
  • Learning Outcome 7.2 You will be able to describe what is necessary to evaluate a home network and h
  • Evaluating Home Networks
  • Evaluating Your Home Network
  • Objective 7.8 Explain what should be considered when evaluating a home network
  • Bits&Bytes: Power Your Devices—Wirelessly
  • Devices on a Home Network
  • Objective 7.9 Describe how a home network is set up
  • Trends In It: A Common Protocol for Your Smart Home Devices
  • Managing and Securing Wireless Networks
  • Troubleshooting Wireless Network Problems
  • Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them
  • Bits&Bytes: Analyzing Network Problems
  • Securing Wireless Networks
  • Objective 7.11 Describe how to secure wireless home networks
  • Sound Byte: Securing Wireless Networks
  • Helpdesk: Managing and Securing Your Wireless Network
  • Solve This with Word: Home Networking Guide
  • Chapter 8. Managing Your Digital Lifestyle: Challenges and Ethics
  • Part 1: The Impact of Digital Information
  • Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technol
  • Digital Basics
  • Digital Convergence and the Internet of Things
  • Objective 8.1 Describe how digital convergence and the Internet of Things have evolved
  • Digital versus Analog
  • Objective 8.2 Explain the differences between digital and analog signals
  • Digital Publishing
  • E-readers
  • Objective 8.3 Describe the different types of e-readers
  • Borrowing and Publishing e-Books
  • Objective 8.4 Explain how to borrow and publish e-books
  • Helpdesk: Managing Digital Media
  • Bits&Bytes: Libraries versus Publishers: Battle over Digital Books
  • Digital Music
  • Creating and Storing Digital Music
  • Objective 8.5 Describe how digital music is created and stored
  • Distributing Digital Music
  • Objective 8.6 Summarize how to listen to and publish digital music
  • Digital Media
  • Digital Photography
  • Objective 8.7 Explain how best to create, print, and share digital photos
  • Sound Byte: Enhancing Photos with Image-Editing Software
  • Digital Video
  • Objective 8.8 Describe how to create, edit, and distribute digital video and establish an online dig
  • Bits&Bytes: Becoming a Social Media Influencer
  • Trends In It: Digital Asset Managers Needed!
  • Managing Your Digital Lifestyle
  • Digital Challenges and Dilemmas
  • Objective 8.9 Discuss the challenges in managing an active digital lifestyle
  • Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?
  • Bits&Bytes: Novel Approach: Using Copyrighted Music to Prevent Video Uploads
  • Try This: Creating and Publishing a Movie
  • Make This: Tool: App Inventor 2
  • Part 2: Ethical Issues of Living in the Digital Age
  • Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways
  • Protection of Digital Property
  • Intellectual Property
  • Objective 8.10 Describe the various types of intellectual property
  • Copyright Basics
  • Objective 8.11 Explain how copyright is obtained and the rights granted to the owners
  • Helpdesk: Understanding Intellectual Property and Copyright
  • Copyright Infringement
  • Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe si
  • Bits&Bytes: Your Tax Dollars at Work: Free Media Without Permission!
  • Bits&Bytes: Fair Use Applies to Educational Music Videos . . . or Does It?
  • Living Ethically in the Digital Era
  • Plagiarism
  • Objective 8.13 Explain plagiarism and strategies for avoiding it
  • Sound Byte: Plagiarism and Intellectual Property
  • Hoaxes and Digital Manipulation
  • Objective 8.14 Describe hoaxes and digital manipulation
  • Protecting Your Online Reputation
  • Objective 8.15 Describe what comprises your online reputation and how to protect it
  • Bits&Bytes: Celebrity Photographic Rights
  • Ethics In It: Acceptable Use Policies: What You Can and Can’t Do
  • Solve This with Powerpoint: Intellectual Property and Copyright Basics
  • Chapter 9. Securing Your System: Protecting Your Digital Data and Devices
  • Part 1: Threats to Your Digital Assets
  • Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and
  • Identity Theft and Hackers
  • Identity Theft
  • Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpe
  • Hacking
  • Objective 9.2 Describe the different types of hackers and the tools they use
  • Bits&Bytes: Weaponization of DDoS Attacks
  • Computer Viruses
  • Virus Basics
  • Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing
  • Sound Byte: Protecting Your Computer
  • Types of Viruses
  • Objective 9.4 List the different categories of computer viruses, and describe their behaviors
  • Online Annoyances and Social Engineering
  • Online Annoyances
  • Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security
  • Social Engineering
  • Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey t
  • Bits&Bytes: A Site I Use Was Breached . . . Now What?
  • Ethics In It: Working from Home . . . and Being Watched from Home
  • Ransomware and Scareware
  • Helpdesk: Threats to Your Digital Life
  • Trends In It: Spear Phishing: The Bane of Data Breaches
  • Try This: Testing Your Network Security
  • Make This: App Inventor 2
  • Part 2: Protecting Your Digital Property
  • Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and
  • Restricting Access to Your Digital Assets
  • Firewalls
  • Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers
  • Preventing Virus Infections
  • Objective 9.8 Explain how to protect your computer from virus infection
  • Helpdesk: Understanding Firewalls
  • Authentication: Passwords and Biometrics
  • Objective 9.9 Describe how passwords and biometric characteristics can be used for user authenticati
  • Bits&Bytes: BitLocker Encryption from Windows
  • Anonymous Web Surfing: Hiding from Prying Eyes
  • Objective 9.10 Describe ways to surf the web anonymously
  • Bits&Bytes: Browser Safety Check
  • Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords!
  • Keeping Your Data Safe
  • Protecting Your Personal Information
  • Objective 9.11 Describe the types of information you should never share online
  • Sound Byte: Managing Computer Security with Windows Tools
  • Backing Up Your Data
  • Objective 9.12 List the various types of backups you can perform on your computing devices, and expl
  • Protecting Your Physical Computing Assets
  • Environmental Factors and Power Surges
  • Objective 9.13 Explain the negative effects environment and power surges can have on computing devic
  • Preventing and Handling Theft
  • Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the pr
  • Dig Deeper: Digital Forensics: How It Works
  • Solve This: Computer Security
  • Chapter 10. Behind the Scenes: Software Programming
  • Part 1: Understanding Programming
  • Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify
  • Life Cycle of an Information System
  • The Importance of Programming
  • Objective 10.1 Describe the importance of programming to both software developers and users
  • System Development Life Cycle
  • Objective 10.2 Summarize the stages of the system development life cycle
  • Bits&Bytes: Many Paths to a Tech Career
  • Life Cycle of a Program
  • The Program Development Life Cycle
  • Objective 10.3 Define programming and list the steps in the program development life cycle
  • The Problem Statement
  • Objective 10.4 Describe how programmers construct a complete problem statement from a description of
  • Sound Byte: Using the Arduino Microcontroller
  • Helpdesk: Understanding Software Programming
  • Algorithm Development
  • Objective 10.5 Explain how programmers use flow control and design methodologies when developing alg
  • Bits&Bytes: Build a Coding Portfolio
  • Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operator
  • Coding
  • Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the
  • Debugging
  • Objective 10.7 Identify the role of debugging in program development
  • Bits&Bytes: Coding with a Purpose
  • Testing and Documentation
  • Objective 10.8 Explain the importance of testing and documentation in program development
  • Try This: Programming with Corona Solar2D
  • Make This: Tool: App Inventor 2
  • Part 2: Programming Languages
  • Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropr
  • Many Programming Languages
  • Need for Diverse Languages
  • Objective 10.9 Discuss the driving factors behind the popularity of various programming languages
  • Sound Byte: Programming with the Processing Language
  • Selecting the Right Language
  • Objective 10.10 Summarize the considerations in identifying an appropriate programming language for
  • Bits&Bytes: Learn Programming with Patch Cords
  • Ethics In It: When Software Runs Awry
  • Exploring Programming Languages
  • Tour of Modern Languages
  • Objective 10.11 Compare and contrast modern programming languages
  • Bits&Bytes: Repl.It
  • Trends In It: Emerging Technologies: Unite All Your Video Game Design Tools
  • Future of Programming Languages
  • Objective 10.12 State key principles in the development of future programming languages
  • Helpdesk: A Variety of Programming Languages
  • Solve This: Time Sheets
  • Chapter 11. Behind the Scenes: Databases and Information Systems
  • Part 1: Database Fundamentals
  • Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common
  • The Need for Databases
  • Database Basics
  • Objective 11.1 Explain what a database is and why databases are useful
  • Database Types
  • Flat Databases
  • Objective 11.2 Describe features of flat databases
  • Relational Databases
  • Objective 11.3 Describe features of relational databases
  • Bits&Bytes: Normal Forms
  • Helpdesk: Using Databases
  • Object-Oriented Databases
  • Objective 11.4 Describe features of object-oriented databases
  • Bits&Bytes: Use a Graph Database to Track Social Network Data
  • Multidimensional Databases
  • Objective 11.5 Describe features of multidimensional databases
  • NoSQL Databases
  • Objective 11.6 Describe how dynamic, web-created data is managed in a database
  • Bits&Bytes: No-Code and Low-Code Databases
  • Using Databases
  • Relational Database Components and Functions
  • Objective 11.7 Describe how relational databases organize and define data
  • Sound Byte: Creating and Querying an Access Database
  • Bits&Bytes: Music Streaming Services Use Databases
  • Inputting and Managing Data
  • Objective 11.8 Describe how data is inputted and managed in a database
  • Dig Deeper: Structured Query Language (SQL)
  • Try This: Using Excel’s Database Functions
  • Make This: Tool: App Inventor 2
  • Part 2: How Businesses Use Databases
  • Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, an
  • Data Warehousing and Storage
  • Data Warehouses and Data Marts
  • Objective 11.9 Explain what data warehouses and data marts are and how they are used
  • Helpdesk: How Businesses Use Databases
  • Bits&Bytes: Data Dashboards: Useful Visualization Tools
  • Data Mining
  • Objective 11.10 Describe data mining and how it works
  • Bits&Bytes: Hadoop: How Big Data Is Being Managed
  • Ethics In It: Data, Data Everywhere—But Is It Protected?
  • Using Databases to Make Business Decisions
  • Business Information Systems
  • Objective 11.11 Describe the main types of business information systems and how they are used by bus
  • Sound Byte: Analyzing Data with Microsoft Power BI Suite
  • Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web
  • Trends In It: Mobile Business Intelligence
  • Solve This: College Database
  • Chapter 12. Behind the Scenes: Networking and Security in the Business World
  • Part 1: Client/Server Networks and Topologies
  • Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers f
  • Client/Server Network Basics
  • Networking Advantages
  • Objective 12.1 List the advantages for businesses of installing a network
  • Comparing Client/Server and Peer-to-Peer Networks
  • Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network
  • Types of Client/Server Networks
  • Objective 12.3 Describe the common types of client/server networks as well as other networks busines
  • Bits&Bytes: Do Free VPNs Protect You Adequately?
  • Servers and Network Topologies
  • Servers
  • Objective 12.4 List the common types of servers found on client/server networks
  • Helpdesk: Using Servers
  • Trends In It: Protecting Privacy in Your Home Office
  • Network Topologies
  • Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages
  • Sound Byte: Network Topology and Navigation Devices
  • Try This: Fixing “No Internet Access” in Windows
  • Make This: Tool: App Inventor 2
  • Part 2: Setting Up Business Networks
  • Learning Outcome 12.2 You will be able to describe transmission media, network operating system soft
  • Transmission Media
  • Wired and Wireless Transmission Media
  • Objective 12.6 Describe the types of wired and wireless transmission media used in networks
  • Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots
  • Network Adapters and Navigation Devices
  • Network Adapters
  • Objective 12.7 Describe how network adapters help data move around a network
  • MAC Addresses
  • Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network
  • Switches, Bridges, and Routers
  • Objective 12.9 List the various network navigation devices, and explain how they help route data thr
  • Helpdesk: Transmission Media and Network Adapters
  • Network Operating Systems and Network Security
  • Network Operating Systems
  • Objective 12.10 Explain why network operating systems are necessary for networks to function
  • Bits&Bytes: Amazon Sidewalk: Extending Your Reach Outside Your Home
  • Dig Deeper: Intent-Based Networking (IBN): Networks That Think for Themselves
  • Client/Server Network Security
  • Objective 12.11 List major security threats to networks, and explain how network administrators miti
  • Sound Byte: A Day in the Life of a Network Technician
  • Ethics In It: How Should Companies Handle Data Breaches?
  • Bits&Bytes: Logging On? Try Finger Vein Recognition
  • Solve This with Word: Cyber-Security Flyer and Mail Merge
  • Chapter 13. Behind the Scenes: How the Internet Works
  • Part 1: Inner Workings of the Internet
  • Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how
  • Internet Management and Networking
  • Management
  • Objective 13.1 Describe the management of the Internet
  • Networking Components
  • Objective 13.2 Explain how the Internet’s networking components interact
  • Data Transmission
  • Objective 13.3 List and describe the Internet protocols used for data transmission
  • Bits&Bytes: A Free Cloud-Based Server for You
  • Bits&Bytes: Packet Analysis
  • Internet Identity
  • IP Addresses
  • Objective 13.4 Explain how each device connected to the Internet is assigned a unique address
  • Bits&Bytes: What’s Your IP Address?
  • Helpdesk: Understanding IP Addresses, Domain Names, and Protocols
  • Bits&Bytes: Amazing Applications of IoT
  • Sound Byte: Creating Web Pages with Squarespace
  • Dig Deeper: Connection-Oriented Versus Connectionless Protocols
  • Domain Names
  • Objective 13.5 Discuss how a numeric IP address is changed into a readable name
  • Try This: Ping Me
  • Make This: Tool: App Inventor 2
  • Part 2: Coding and Communicating on the Internet
  • Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applicat
  • Web Technologies
  • Web Development
  • Objective 13.6 Compare and contrast a variety of web development languages
  • Bits&Bytes: CodePen: An Editing Community for Web Designers
  • Application Architecture
  • Objective 13.7 Compare and contrast server-side and client-side application software
  • Sound Byte: Client-Side Web Page Development
  • Bits&Bytes: Editors for Web Development
  • Communications over the Internet
  • Types of Internet Communication
  • Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging
  • Bits&Bytes: AI and Your Inbox
  • Encryption
  • Objective 13.9 Explain how data encryption improves security
  • Bits&Bytes: Random Numbers: We Wouldn’t Have Encryption Without Them!
  • Helpdesk: Keeping E-Mail Secure
  • Ethics In It: Do We Really Want Strong Encryption?
  • Trends In It: Cognitive Computing
  • Solve This: Creating an HTML Document
  • Appendix A: The History of the Personal Computer
  • Appendix B: Careers in IT
  • Glossary
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • Z
  • Index
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
Show More

Additional information

Veldu vöru

Leiga á rafbók í 180 daga, Rafbók til eignar, Leiga á rafbók í 365 daga, Leiga á rafbók í 90 daga

Reviews

There are no reviews yet.

Be the first to review “Technology in Action, Global Edition”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð