Description
Efnisyfirlit
- Title Page
- Copyright
- Pearson’s Commitment to Diversity, Equity, and Inclusion
- Contents at a Glance
- Contents
- Learn Technology by Using Technology in Action 18e
- Instructor Teaching Resources
- Letter from the Authors
- About the Authors
- Acknowledgments
- Don’t just read about technology. Interact with it in MyLab IT
- Chapter 1. The Impact of Technology in a Changing World
- Part 1: Technology in Society
- Learning Outcome 1.1 You will be able to discuss the impact of the tools of modern technology on nat
- Technology in a Global Society
- Impact of Tools of Modern Technology
- Objective 1.1 Describe various technological tools being used to impact national and global issues
- Global Issues
- Objective 1.2 Describe various global social issues that are being affected by technology
- Technology Connects Us with Others
- Technology Impacts How and Why We Connect and Collaborate
- Objective 1.3 Describe how technology is changing how and why we connect and collaborate with others
- Technology Impacts How We Consume
- Objective 1.4 Summarize how technology has impacted the way we choose and consume products and servi
- The Importance of Computer Literacy
- Computer Literacy
- Objective 1.5 Characterize computer literacy and explain why it is important to be computer literate
- Helpdesk: Technology Impacts
- Sound Byte: Virtual Computer Tour
- Try This: Artificially Intelligent Artwork
- Make This: Tool: IFTTT.com (If This Then That)
- Part 2: Artificial Intelligence and Ethical Computing
- Learning Outcome 1.2 You will be able to describe emerging technologies, such as artificial intellig
- Artificial Intelligence
- Artificial Intelligence Basics
- Objective 1.6 Describe artificial intelligence systems and explain their main goals
- Helpdesk: The Impact of Artificial Intelligence
- Bits&Bytes: Hands-On Artificial Intelligence
- Bits&Bytes: Machine Learning to Create New Instruments
- Ethics In It: Ethics in Computing
- Working with Artificial Intelligence and Other Information Technologies
- The Impact of Technology on Your Career
- Objective 1.7 Describe how artificial intelligence and other emerging technologies are important in
- Bits&Bytes: Is It AI or Human? Take a Turing Test!
- Dig Deeper: XR Extended Reality
- Ethical Computing
- Defining Ethics
- Objective 1.8 Define ethics and describe various ethical systems
- Sound Byte: How to Debate Ethical Issues
- Personal Ethics
- Objective 1.9 Describe influences on the development of your personal ethics
- Ethics and Technology
- Objective 1.10 Present examples of how technology creates ethical challenges
- Solve This: How Technology Is Used on the World Stage and in Your Personal Life
- Chapter 2. Looking at Computers: Understanding the Parts
- Part 1: Understanding Digital Components
- Learning Outcome 2.1 You will be able to describe the devices that make up a computer system
- Understanding Your Computer
- Computers Are Data Processing Devices
- Objective 2.1 Describe the four main functions of a computer system and how they interact with data
- Binary: The Language of Computers
- Objective 2.2 Define bits and bytes, and describe how they are measured, used, and processed
- Sound Byte: Binary Numbers Interactive
- Types of Computers
- Objective 2.3 List common types of computers, and discuss their main features
- Active Helpdesk: Understanding Bits and Bytes
- Bits&Bytes: Today’s Supercomputers: Faster Than Ever
- Input Devices
- Physical Keyboards and Touch Screens
- Objective 2.4 Identify the main types of keyboards and touch screens
- Mice and Other Pointing Devices
- Objective 2.5 Describe the main types of mice and pointing devices
- Bits&Bytes: Foldable Glass Is Making Foldable Phones Better!
- Image, Sound, and Sensor Input
- Objective 2.6 Explain how images, sounds, and sensor data are input into computing devices
- Output Devices
- Image and Audio Output
- Objective 2.7 Describe options for outputting images and audio from computing devices
- Bits&Bytes: Teraflops in Your Living Room: Gaming on Overdrive
- Printers
- Objective 2.8 Describe various types of printers, and explain when you would use them
- Bits&Bytes: CPUs That Fight Back
- Try This: What’s Inside My Computer?
- Make This: Tool: App Inventor 2
- Part 2: Processing, Storage, and Connectivity
- Learning Outcome 2.2 You will be able to describe how computers process and store data and how devic
- Processing and Memory on the Motherboard
- The Motherboard and Memory
- Objective 2.9 Describe the functions of the motherboard and RAM
- Sound Byte: Smartphones Are Really Smart
- Processing
- Objective 2.10 Explain the main functions of the CPU
- Storing Data and Information
- Storage Options on Computing Devices
- Objective 2.11 Describe the various means of storing data and information with computing devices
- Ethics In It: What Is Ethical Computing?
- Trends In It: Green Computing (Green IT)
- Connecting Peripherals to the Computer
- Computer Ports
- Objective 2.12 Describe common types of ports used today
- Helpdesk: Exploring Storage Devices and Ports
- Power Management and Ergonomics
- Power Controls and Power Management
- Objective 2.13 Describe how to manage power consumption on computing devices
- Bits&Bytes: Smart Coral Reefs
- Dig Deeper: Building Your Own Gaming Computer
- Setting It All Up: Ergonomics
- Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices
- Solve This with Excel: Technology Wish List
- Chapter 3. Using the Internet: Making the Most of the Web’s Resources
- Part 1: Collaborating and Working on the Web
- Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for colla
- The Internet and How It Works
- The Origin of the Internet
- Objective 3.1 Describe how the Internet got its start
- How the Internet Works
- Objective 3.2 Explain how data travels on the Internet
- Collaborating and Communicating on the Web
- Mass Communication and Collaboration
- Objective 3.3 Evaluate the tools and technologies used to communicate and collaborate with large gro
- Bits&Bytes: Social Media Influencers
- Sound Byte: Blogging
- Personal Communication on the Web
- Objective 3.4 Summarize the technologies used for personal communications over the web
- Conducting Business on the Web
- Being Productive with Cloud Technologies
- Objective 3.5 Describe how cloud technologies are used to create, store, and share files
- Dig Deeper: Artificial Intelligence and Cloud Computing
- Conducting Business Online
- Objective 3.6 Describe how business is conducted using the Internet
- Bits&Bytes: Looking for Extra Money? Try a Side Hustle
- E-Commerce Safeguards
- Objective 3.7 Summarize precautions you should take when doing business online
- Helpdesk: Doing Business Online
- Bits&Bytes: Bitcoin: A Form of Virtual Currency
- Try This: Use OneDrive to Store and Share Your Files in the Cloud
- Make This: Tool: App Inventor 2
- Part 2: Using the Web Effectively
- Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and
- Accessing and Moving Around the Web
- Web Browsers
- Objective 3.8 Explain what web browsers are and describe their common features
- URLs, Protocols, and Domain Names
- Objective 3.9 Explain what a URL is and discuss its main parts
- Navigating the Web
- Objective 3.10 Describe tools used to navigate the web
- Searching the Web Effectively
- Using Search Engines
- Objective 3.11 Describe the types of tools used to search the web and summarize strategies used to r
- Bits&Bytes: Maintain Your Privacy While Searching the Web
- Sound Byte: Finding Information on the Web
- Evaluating Websites
- Objective 3.12 Describe how to evaluate a website to ensure it is appropriate to use for research pu
- Helpdesk: Evaluating Websites
- Trends In It: Linked Data and the Semantic Web
- Using the Web Ethically
- Ethical Issues on the Internet
- Objective 3.13 Demonstrate an understanding of Internet-related ethical issues
- Bits&Bytes: Did He Really Say That?
- Using the Internet Ethically
- Objective 3.14 Demonstrate an ability to conduct yourself on the Internet in an ethical manner
- Bits&Bytes: Human-Implanted Data Chips: Protection or Invasive Nightmare?
- Ethics In It: Cyber Harassment
- Solve This: Effective Internet Research
- Chapter 4. Application Software: Programs That Let You Work and Play
- Part 1: Accessing, Using, and Managing Software
- Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe ho
- Software Basics
- Types of Software
- Objective 4.1 Compare application and system software and describe the different types of applicatio
- Purchasing Software
- Objective 4.2 Explain the different options for purchasing software
- Bits&Bytes: Useful Apps to Help you Focus while Working or Learning Remotely
- Trends In It: Artificial Intelligence in Health Care
- Managing Your Software
- Installing and Uninstalling Software
- Objective 4.3 Describe how to install and uninstall software
- Helpdesk: Buying and Installing Software
- Bits&Bytes: Ridding Your Computer of Bloat
- Upgrading Software
- Objective 4.4 Explain the considerations around the decision to upgrade your software
- Dig Deeper: How Number Systems Work
- Software Licenses
- Objective 4.5 Explain how software licenses function
- Sound Byte: Where Does Binary Show Up?
- Ethics In It: Can I Use Software on My Device When I Don’t Own the License?
- Try This: Citing Website Sources
- Make This: Tool: App Inventor 2
- Part 2: Application Software
- Learning Outcome 4.2 Describe the different types of application software used for productivity and
- Productivity and Business Software
- Productivity Software
- Objective 4.6 Categorize the types of application software used to enhance productivity and describe
- Bits&Bytes: Productivity Software Tips and Tricks
- Bits&Bytes: How to Open Unknown File Types
- Bits&Bytes: Going Beyond PowerPoint
- Sound Byte: Programming for End Users
- Business Software
- Objective 4.7 Summarize the types of software that small and large businesses use
- Multimedia and Educational Software
- Multimedia Software
- Objective 4.8 Describe the uses and features of multimedia software
- Bits&Bytes: Scalable Vector Graphics: Text-Based Images
- Audio Software
- Objective 4.9 Describe the uses and features of audio software
- Helpdesk: Choosing Software
- App Creation Software
- Objective 4.10 Describe the features of app creation software
- Bits&Bytes: Mirror, Mirror . . .
- Educational and Reference Software
- Objective 4.11 Categorize educational and reference software and explain their features
- Solve This with Excel: Computer and Information Technology Jobs Outlook
- Chapter 5. System Software: The Operating System, Utility Programs, and File Management
- Part 1: Understanding System Software
- Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and ex
- Operating System Fundamentals
- Operating System Basics
- Objective 5.1 Discuss the functions of the operating system
- Operating Systems for Personal Use
- Objective 5.2 Explain the most popular operating systems for personal use
- Bits&Bytes: Taking Control Remotely
- Operating Systems for Machinery, Networks, and Business
- Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business
- Ethics In It: The Great Debate: Is macOS Safer Than Windows?
- What the Operating System Does
- The User Interface
- Objective 5.4 Explain how the operating system provides a means for users to interact with the compu
- Hardware Coordination
- Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory,
- Sound Byte: Using Windows Task Manager to Evaluate System Performance
- Software Application Coordination
- Objective 5.6 Explain how the operating system interacts with application software
- Trends In It: Ethical Hacking
- Starting Your Computer
- The Boot Process
- Objective 5.7 Discuss the process the operating system uses to start up the computer and how errors
- Helpdesk: Starting the Computer: The Boot Process
- Try This: Using Virtual Desktops in Windows
- Make This: Tool: App Inventor 2
- Part 2: Using System Software
- Learning Outcome 5.2 You will be able to describe how to use system software, including the user int
- The Windows Interface
- Using Windows 11
- Objective 5.8 Describe the main features of the Windows interface
- Bits&Bytes: Smartphone and OS Integration
- File Management
- Organizing Your Files
- Objective 5.9 Summarize how the operating system helps keep your computer organized and manages file
- Bits&Bytes: Manage Files in macOS
- Bits&Bytes: Save Files in the Cloud
- Helpdesk: Organizing Your Computer: File Management
- Utility Programs
- Windows Administrative Utilities
- Objective 5.10 Outline the tools used to enhance system productivity, back up files, and provide acc
- Sound Byte: Hard Disk Anatomy
- Dig Deeper: Windows Tricks and Shortcuts
- Solve This: Operating Systems: Analyzing Market Share
- Chapter 6. Understanding and Assessing Hardware: Evaluating Your System
- Part 1: Evaluating Key Subsystems
- Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, inc
- Your Ideal Computing Device
- Moore’s Law
- Objective 6.1 Describe the changes in CPU performance over the past several decades
- Selecting a Computing Device
- Objective 6.2 Compare and contrast a variety of computing devices
- Evaluating the CPU Subsystem
- How the CPU Works
- Objective 6.3 Describe how a CPU is designed and how it operates
- Measuring CPU Performance
- Objective 6.4 Describe tools used to measure and evaluate CPU performance
- Bits&Bytes: Liquid Cooling
- Evaluating the Memory Subsystem
- Random Access Memory
- Objective 6.5 Discuss how RAM is used in a computer system
- Helpdesk: Evaluating Your CPU and RAM
- Adding RAM
- Objective 6.6 Evaluate whether adding RAM to a system is desirable
- Sound Byte: Installing RAM
- Bits&Bytes: Your Next Job Might Be Totally VR!
- Try This: Measure Your System Performance
- Make This: Tool: App Inventor 2
- Part 2: Evaluating Other Subsystems and Making a Decision
- Learning Outcome 6.2 You will be able to evaluate your computer system’s storage subsystem, media
- Evaluating the Storage Subsystem
- Types of Storage Drives
- Objective 6.7 Classify and describe the major types of nonvolatile storage drives
- Sound Byte: Installing an SSD Drive
- Storage Needs
- Objective 6.8 Evaluate the amount and type of storage needed for a system
- Bits&Bytes: Intel’s EVO Platform: What Exactly Does It Mean?
- Evaluating the Media Subsystems
- Video Cards
- Objective 6.9 Describe the features of video cards
- Bits&Bytes: How Hot Is My GPU?
- Bits&Bytes: Multiple Devices Made Easy: macOS Universal Control
- Trends In It: Thunderbolt and USB Ports: Which Ones Do I Need?
- Sound Cards
- Objective 6.10 Describe the features of sound cards
- Helpdesk: Evaluating Computer System Components
- Evaluating System Reliability and Moving On
- Maintaining System Reliability
- Objective 6.11 Describe steps you can take to optimize your system’s reliability
- Getting Rid of Your Old Computer
- Objective 6.12 Discuss how to recycle, donate, or dispose of an older computer
- Ethics In It: Bridging the Digital Divide: Hardware for the Masses
- Solve This with Excel: Laptop Alternatives
- Chapter 7. Networking: Connecting Computing Devices
- Part 1: How Networks Function
- Learning Outcome 7.1 You will be able to explain the basics of networking, including the components
- Networking Fundamentals
- Understanding Networks
- Objective 7.1 Describe networks and their pros and cons
- Helpdesk: Understanding Networking
- Network Architectures
- Network Designs
- Objective 7.2 Explain the different ways networks are defined
- Dig Deeper: P2P Blockchain Networks
- Bits&Bytes: Watch Out for WiGig and HaLow
- Network Components
- Transmission Media
- Objective 7.3 Describe the types of transmission media used in networks
- Basic Network Hardware
- Objective 7.4 Describe the basic hardware devices necessary for networks
- Sound Byte: Installing a Home Computer Network
- Network Software
- Objective 7.5 Describe the type of software necessary for networks
- Connecting to the Internet
- Broadband Internet Connections
- Objective 7.6 Summarize the broadband options available to access the Internet
- Bits&Bytes: Who’s Not on Broadband?
- Wireless Internet Access
- Objective 7.7 Summarize how to access the Internet wirelessly
- Bits&Bytes: Net Neutrality: The Debate Continues
- Try This: Testing Your Internet Connection Speed
- Make This: Tool: Ping and Telnet
- Part 2: Your Home Network
- Learning Outcome 7.2 You will be able to describe what is necessary to evaluate a home network and h
- Evaluating Home Networks
- Evaluating Your Home Network
- Objective 7.8 Explain what should be considered when evaluating a home network
- Bits&Bytes: Power Your Devices—Wirelessly
- Devices on a Home Network
- Objective 7.9 Describe how a home network is set up
- Trends In It: A Common Protocol for Your Smart Home Devices
- Managing and Securing Wireless Networks
- Troubleshooting Wireless Network Problems
- Objective 7.10 Describe the potential problems with wireless networks and the means to avoid them
- Bits&Bytes: Analyzing Network Problems
- Securing Wireless Networks
- Objective 7.11 Describe how to secure wireless home networks
- Sound Byte: Securing Wireless Networks
- Helpdesk: Managing and Securing Your Wireless Network
- Solve This with Word: Home Networking Guide
- Chapter 8. Managing Your Digital Lifestyle: Challenges and Ethics
- Part 1: The Impact of Digital Information
- Learning Outcome 8.1 You will be able to describe the nature of digital signals; how digital technol
- Digital Basics
- Digital Convergence and the Internet of Things
- Objective 8.1 Describe how digital convergence and the Internet of Things have evolved
- Digital versus Analog
- Objective 8.2 Explain the differences between digital and analog signals
- Digital Publishing
- E-readers
- Objective 8.3 Describe the different types of e-readers
- Borrowing and Publishing e-Books
- Objective 8.4 Explain how to borrow and publish e-books
- Helpdesk: Managing Digital Media
- Bits&Bytes: Libraries versus Publishers: Battle over Digital Books
- Digital Music
- Creating and Storing Digital Music
- Objective 8.5 Describe how digital music is created and stored
- Distributing Digital Music
- Objective 8.6 Summarize how to listen to and publish digital music
- Digital Media
- Digital Photography
- Objective 8.7 Explain how best to create, print, and share digital photos
- Sound Byte: Enhancing Photos with Image-Editing Software
- Digital Video
- Objective 8.8 Describe how to create, edit, and distribute digital video and establish an online dig
- Bits&Bytes: Becoming a Social Media Influencer
- Trends In It: Digital Asset Managers Needed!
- Managing Your Digital Lifestyle
- Digital Challenges and Dilemmas
- Objective 8.9 Discuss the challenges in managing an active digital lifestyle
- Dig Deeper: Deep Web versus Dark Web: Are There Places You Shouldn’t Go?
- Bits&Bytes: Novel Approach: Using Copyrighted Music to Prevent Video Uploads
- Try This: Creating and Publishing a Movie
- Make This: Tool: App Inventor 2
- Part 2: Ethical Issues of Living in the Digital Age
- Learning Outcome 8.2 You will be able to describe how to respect digital property and use it in ways
- Protection of Digital Property
- Intellectual Property
- Objective 8.10 Describe the various types of intellectual property
- Copyright Basics
- Objective 8.11 Explain how copyright is obtained and the rights granted to the owners
- Helpdesk: Understanding Intellectual Property and Copyright
- Copyright Infringement
- Objective 8.12 Explain copyright infringement, summarize the potential consequences, and describe si
- Bits&Bytes: Your Tax Dollars at Work: Free Media Without Permission!
- Bits&Bytes: Fair Use Applies to Educational Music Videos . . . or Does It?
- Living Ethically in the Digital Era
- Plagiarism
- Objective 8.13 Explain plagiarism and strategies for avoiding it
- Sound Byte: Plagiarism and Intellectual Property
- Hoaxes and Digital Manipulation
- Objective 8.14 Describe hoaxes and digital manipulation
- Protecting Your Online Reputation
- Objective 8.15 Describe what comprises your online reputation and how to protect it
- Bits&Bytes: Celebrity Photographic Rights
- Ethics In It: Acceptable Use Policies: What You Can and Can’t Do
- Solve This with Powerpoint: Intellectual Property and Copyright Basics
- Chapter 9. Securing Your System: Protecting Your Digital Data and Devices
- Part 1: Threats to Your Digital Assets
- Learning Outcome 9.1 You will be able to describe hackers, viruses, and other online annoyances and
- Identity Theft and Hackers
- Identity Theft
- Objective 9.1 Describe how identity theft is committed and the types of scams identity thieves perpe
- Hacking
- Objective 9.2 Describe the different types of hackers and the tools they use
- Bits&Bytes: Weaponization of DDoS Attacks
- Computer Viruses
- Virus Basics
- Objective 9.3 Explain what a computer virus is, why it is a threat to your security, how a computing
- Sound Byte: Protecting Your Computer
- Types of Viruses
- Objective 9.4 List the different categories of computer viruses, and describe their behaviors
- Online Annoyances and Social Engineering
- Online Annoyances
- Objective 9.5 Explain what malware, spam, and cookies are and how they impact your security
- Social Engineering
- Objective 9.6 Describe social engineering techniques, and explain strategies to avoid falling prey t
- Bits&Bytes: A Site I Use Was Breached . . . Now What?
- Ethics In It: Working from Home . . . and Being Watched from Home
- Ransomware and Scareware
- Helpdesk: Threats to Your Digital Life
- Trends In It: Spear Phishing: The Bane of Data Breaches
- Try This: Testing Your Network Security
- Make This: App Inventor 2
- Part 2: Protecting Your Digital Property
- Learning Outcome 9.2 Describe various ways to protect your digital property and data from theft and
- Restricting Access to Your Digital Assets
- Firewalls
- Objective 9.7 Explain what a firewall is and how a firewall protects your computer from hackers
- Preventing Virus Infections
- Objective 9.8 Explain how to protect your computer from virus infection
- Helpdesk: Understanding Firewalls
- Authentication: Passwords and Biometrics
- Objective 9.9 Describe how passwords and biometric characteristics can be used for user authenticati
- Bits&Bytes: BitLocker Encryption from Windows
- Anonymous Web Surfing: Hiding from Prying Eyes
- Objective 9.10 Describe ways to surf the web anonymously
- Bits&Bytes: Browser Safety Check
- Bits&Bytes: Multi-Factor Authentication: Don’t Rely Solely on Passwords!
- Keeping Your Data Safe
- Protecting Your Personal Information
- Objective 9.11 Describe the types of information you should never share online
- Sound Byte: Managing Computer Security with Windows Tools
- Backing Up Your Data
- Objective 9.12 List the various types of backups you can perform on your computing devices, and expl
- Protecting Your Physical Computing Assets
- Environmental Factors and Power Surges
- Objective 9.13 Explain the negative effects environment and power surges can have on computing devic
- Preventing and Handling Theft
- Objective 9.14 Describe the major concerns when a device is stolen and strategies for solving the pr
- Dig Deeper: Digital Forensics: How It Works
- Solve This: Computer Security
- Chapter 10. Behind the Scenes: Software Programming
- Part 1: Understanding Programming
- Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify
- Life Cycle of an Information System
- The Importance of Programming
- Objective 10.1 Describe the importance of programming to both software developers and users
- System Development Life Cycle
- Objective 10.2 Summarize the stages of the system development life cycle
- Bits&Bytes: Many Paths to a Tech Career
- Life Cycle of a Program
- The Program Development Life Cycle
- Objective 10.3 Define programming and list the steps in the program development life cycle
- The Problem Statement
- Objective 10.4 Describe how programmers construct a complete problem statement from a description of
- Sound Byte: Using the Arduino Microcontroller
- Helpdesk: Understanding Software Programming
- Algorithm Development
- Objective 10.5 Explain how programmers use flow control and design methodologies when developing alg
- Bits&Bytes: Build a Coding Portfolio
- Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operator
- Coding
- Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the
- Debugging
- Objective 10.7 Identify the role of debugging in program development
- Bits&Bytes: Coding with a Purpose
- Testing and Documentation
- Objective 10.8 Explain the importance of testing and documentation in program development
- Try This: Programming with Corona Solar2D
- Make This: Tool: App Inventor 2
- Part 2: Programming Languages
- Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropr
- Many Programming Languages
- Need for Diverse Languages
- Objective 10.9 Discuss the driving factors behind the popularity of various programming languages
- Sound Byte: Programming with the Processing Language
- Selecting the Right Language
- Objective 10.10 Summarize the considerations in identifying an appropriate programming language for
- Bits&Bytes: Learn Programming with Patch Cords
- Ethics In It: When Software Runs Awry
- Exploring Programming Languages
- Tour of Modern Languages
- Objective 10.11 Compare and contrast modern programming languages
- Bits&Bytes: Repl.It
- Trends In It: Emerging Technologies: Unite All Your Video Game Design Tools
- Future of Programming Languages
- Objective 10.12 State key principles in the development of future programming languages
- Helpdesk: A Variety of Programming Languages
- Solve This: Time Sheets
- Chapter 11. Behind the Scenes: Databases and Information Systems
- Part 1: Database Fundamentals
- Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common
- The Need for Databases
- Database Basics
- Objective 11.1 Explain what a database is and why databases are useful
- Database Types
- Flat Databases
- Objective 11.2 Describe features of flat databases
- Relational Databases
- Objective 11.3 Describe features of relational databases
- Bits&Bytes: Normal Forms
- Helpdesk: Using Databases
- Object-Oriented Databases
- Objective 11.4 Describe features of object-oriented databases
- Bits&Bytes: Use a Graph Database to Track Social Network Data
- Multidimensional Databases
- Objective 11.5 Describe features of multidimensional databases
- NoSQL Databases
- Objective 11.6 Describe how dynamic, web-created data is managed in a database
- Bits&Bytes: No-Code and Low-Code Databases
- Using Databases
- Relational Database Components and Functions
- Objective 11.7 Describe how relational databases organize and define data
- Sound Byte: Creating and Querying an Access Database
- Bits&Bytes: Music Streaming Services Use Databases
- Inputting and Managing Data
- Objective 11.8 Describe how data is inputted and managed in a database
- Dig Deeper: Structured Query Language (SQL)
- Try This: Using Excel’s Database Functions
- Make This: Tool: App Inventor 2
- Part 2: How Businesses Use Databases
- Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, an
- Data Warehousing and Storage
- Data Warehouses and Data Marts
- Objective 11.9 Explain what data warehouses and data marts are and how they are used
- Helpdesk: How Businesses Use Databases
- Bits&Bytes: Data Dashboards: Useful Visualization Tools
- Data Mining
- Objective 11.10 Describe data mining and how it works
- Bits&Bytes: Hadoop: How Big Data Is Being Managed
- Ethics In It: Data, Data Everywhere—But Is It Protected?
- Using Databases to Make Business Decisions
- Business Information Systems
- Objective 11.11 Describe the main types of business information systems and how they are used by bus
- Sound Byte: Analyzing Data with Microsoft Power BI Suite
- Bits&Bytes: Virtual Agents: Expert Systems Replace People on the Web
- Trends In It: Mobile Business Intelligence
- Solve This: College Database
- Chapter 12. Behind the Scenes: Networking and Security in the Business World
- Part 1: Client/Server Networks and Topologies
- Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers f
- Client/Server Network Basics
- Networking Advantages
- Objective 12.1 List the advantages for businesses of installing a network
- Comparing Client/Server and Peer-to-Peer Networks
- Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network
- Types of Client/Server Networks
- Objective 12.3 Describe the common types of client/server networks as well as other networks busines
- Bits&Bytes: Do Free VPNs Protect You Adequately?
- Servers and Network Topologies
- Servers
- Objective 12.4 List the common types of servers found on client/server networks
- Helpdesk: Using Servers
- Trends In It: Protecting Privacy in Your Home Office
- Network Topologies
- Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages
- Sound Byte: Network Topology and Navigation Devices
- Try This: Fixing “No Internet Access” in Windows
- Make This: Tool: App Inventor 2
- Part 2: Setting Up Business Networks
- Learning Outcome 12.2 You will be able to describe transmission media, network operating system soft
- Transmission Media
- Wired and Wireless Transmission Media
- Objective 12.6 Describe the types of wired and wireless transmission media used in networks
- Bits&Bytes: CAPTCHA: Keeping Websites Safe from Bots
- Network Adapters and Navigation Devices
- Network Adapters
- Objective 12.7 Describe how network adapters help data move around a network
- MAC Addresses
- Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network
- Switches, Bridges, and Routers
- Objective 12.9 List the various network navigation devices, and explain how they help route data thr
- Helpdesk: Transmission Media and Network Adapters
- Network Operating Systems and Network Security
- Network Operating Systems
- Objective 12.10 Explain why network operating systems are necessary for networks to function
- Bits&Bytes: Amazon Sidewalk: Extending Your Reach Outside Your Home
- Dig Deeper: Intent-Based Networking (IBN): Networks That Think for Themselves
- Client/Server Network Security
- Objective 12.11 List major security threats to networks, and explain how network administrators miti
- Sound Byte: A Day in the Life of a Network Technician
- Ethics In It: How Should Companies Handle Data Breaches?
- Bits&Bytes: Logging On? Try Finger Vein Recognition
- Solve This with Word: Cyber-Security Flyer and Mail Merge
- Chapter 13. Behind the Scenes: How the Internet Works
- Part 1: Inner Workings of the Internet
- Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how
- Internet Management and Networking
- Management
- Objective 13.1 Describe the management of the Internet
- Networking Components
- Objective 13.2 Explain how the Internet’s networking components interact
- Data Transmission
- Objective 13.3 List and describe the Internet protocols used for data transmission
- Bits&Bytes: A Free Cloud-Based Server for You
- Bits&Bytes: Packet Analysis
- Internet Identity
- IP Addresses
- Objective 13.4 Explain how each device connected to the Internet is assigned a unique address
- Bits&Bytes: What’s Your IP Address?
- Helpdesk: Understanding IP Addresses, Domain Names, and Protocols
- Bits&Bytes: Amazing Applications of IoT
- Sound Byte: Creating Web Pages with Squarespace
- Dig Deeper: Connection-Oriented Versus Connectionless Protocols
- Domain Names
- Objective 13.5 Discuss how a numeric IP address is changed into a readable name
- Try This: Ping Me
- Make This: Tool: App Inventor 2
- Part 2: Coding and Communicating on the Internet
- Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applicat
- Web Technologies
- Web Development
- Objective 13.6 Compare and contrast a variety of web development languages
- Bits&Bytes: CodePen: An Editing Community for Web Designers
- Application Architecture
- Objective 13.7 Compare and contrast server-side and client-side application software
- Sound Byte: Client-Side Web Page Development
- Bits&Bytes: Editors for Web Development
- Communications over the Internet
- Types of Internet Communication
- Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging
- Bits&Bytes: AI and Your Inbox
- Encryption
- Objective 13.9 Explain how data encryption improves security
- Bits&Bytes: Random Numbers: We Wouldn’t Have Encryption Without Them!
- Helpdesk: Keeping E-Mail Secure
- Ethics In It: Do We Really Want Strong Encryption?
- Trends In It: Cognitive Computing
- Solve This: Creating an HTML Document
- Appendix A: The History of the Personal Computer
- Appendix B: Careers in IT
- Glossary
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- Z
- Index
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- X
- Y
- Z
Reviews
There are no reviews yet.