You are on page 1of 26

USING INFORMATION TECHNOLOGY

A Practical Introduction to Computers & Communications

I
. I

Brian K. Williams
Stacey C. Sawyer

oo. oo. aa oo. oo. 3 0

Seventh Edition

McGRAW-HILL INTERNATIONAL EDITION


Information You Can Use:
Practical Topics for the Practical Reader
EXPERIENCE BOXES
Better Organization & Time How to Buy a Laptop, 238 Preventing Your Identity from
Management: Dealing with the Good Habits: Protecting Your Getting Stolen, 453
Information Deluge in College- Computer System, Your Data, & Student Use of Computers: Some
& in Life, 38 Your Health, 296 Controversies, 493
Web Research, Term Papers, & Virtual Meetings: Linking Up Critical Thinking Tools, 532
Plagiarism, 104 Electronically, 357
The Mysteries of Tech Support, 176 The 11 Always On" Generation, 400

PRACTICAL ACTION BOXES


Managing Your E-Mail, 19 Help in Building Your Web Ways to Minimize Virus
Looking for an Internet Access Page, 174 Attacks, 348
Provider: Questions to Ask at the Preventing Problems from Too Much Online Viewing & Sharing of
Beginning, 60 or Too Little Electrical Power to Digital Photos, 383
Evaluating & Sourcing Information Your Computer, 203 Buying the Right HDTV, 390
Found on the Web, 78 Starting Over with Your Hard Drive: Storing Your Stuff: How Long Will
Serious Web Search Techniques, 80 Erasing, Reformatting, & Digitized Data Last? 415
Tips for Fighting Spam, 100 Reloading, 233 Is the Boss Watching You? Trust in
Tips for Avoiding Spyware, 103 Buying a Printer, 286 the Workplace, 477
Utility Programs, 125 Telecommuting & Telework: The When the Internet Isn't Productive:
Get a PC or Get a Mac? Dealing Nontraditional Workplace, 327 Online Addiction & Other Time
with Security Issues, 140 Wasters, 489

SURVIVAL TIPS
Hardware Info, 27 Try Before You Buy, 175 Do I Have to Print the Whole
Recycling Old PCs 3 7 Decimal to Binary Conversion, 197 Thing? 284
Broadband: Riskier for Security, 56 Bay Access, 201 Digital Subscriptions, 285
Connection Speeds, 5 7 What RAM for Your PC? 210 Customize Your Sounds, 288
Some Free ISPs, 58 Need More RAM? 210 Pagers Help the Deaf, 33 7
Do Horne Pages Endure' 66 Powered versus Unpowered USB Cellphone Minutes, 338
Urban Legends & Lies on the Hubs, 216 Keep Antivirus Software
Internet, 75 Are Your PC's USB Ports 1.1 or Updated, 346
Accessing E-Mail While Traveling 2.0? 216 PC Firewalls, 350
Abroad, 86 When to Remove a Floppy Disk XP Firewall, 351
Look for the Padlock Icon, 99 from a Drive, 221 Security for Your Wi-Fi, 355
Control Those Cookies! 102 Backing Up on Zip, 222 Reformat Your Memory Card to
New Software & Compatibility, Data Recovery, 224 Avoid Losing Your Photos, 382
120 CD Read, Write, & Rewrite Guard Your Social Security
Is Your Password Guessable? 124 Speeds, 226 Number, 411
Update Your Drivers, 124 Did You Back Up Your Files? 227 Some Records Have to Be
What to Set Up First? 125 What's the Life Span of Storage Hardcopy, 412
Free Antivirus Software, 127 Media? 231 Is It True? 467
Temp File Removal, 130 How Do I use the Prnt Scrn Keeping Track of Your
Don't Trash Those Icons, 134 Key? 256 Cellphone, 4 71
Getting Help, 135 Setting Mouse Properties, 259 Reporting Software Pirates, 471
Service Packs 1 & 2, 138 Games & Wireless Input, 262 Fraud Baiters, 473
Two Versions of Windows XP, 139 Can Your PC Connect Your New Deal with Secure Websites, 478
XP Installation, 139 Scanner? 266 Alleviating Info-Mania, 485
When Several Word Documents Are Your Choice: More Colors or More
Open, 155 Resolution? 272
Compressing Web & Audio Buying a Flat Panel, 281
Files, 171 Buying a New Monitor? 281
Praise from Reviewers for This Edition
"Williams-Sawyer .. . is the most readable textbook that deals w ith computer
t erminology in a m eaningful way without getting into tech jargon. The con-
cepts are clearly present ed and the [photos], illustrations, and graphi cs
becom e part of the reading and enhance the ability of the reader to compre-
hend the material. ... I think the level of difficulty is perfect. I find very few
students, even interna tional students, who h ave difficulty comprehending
the book. "
-Beverly Bohn, Park University, Parkville, Missoini
" [UIT is] geared toward a generation that grew up with computers but never
thought about how th ey work. Should appeal t o a younger audience."
- Leleh Kalantari, Western Illinois University, Macomb
"The treatment of MP3 players, satellite radio, digital photography, SDTV,
HDTV, and cellphones [in Chapter 7, the new Personal Technology chapter]
will enhance m y classes."
- Charles Brown, Plymouth State University, New Hampshire
"I really liked th e fact that you updated the text with item s that would be
important to students when th ey are looking to purchase a PC."
-Stephanie Anderson, Southwesterp Community College, Creston, Iowa
"I like the authors' writing style very much. I fo und it to be almost con ver-
sational, which is good, in my opinion . ... I truly looked for unclear areas
and did not find any at all. "
-Laurie Eakins, East Carolina Un iversity, Grnenville, Nmth Carolin a
"I like how [the writing] is personalized. It seems as if the writer is speak-
ing directly to the student-not the normal textbook emphasis."
-Tammy Potter, Western Kentuclzy Community & Technical College,
Paducah
"[The authors'] writing style is clear and concise. [They have] taken some very
technical topics and explained them in everyday langu age while not 'dumb-
ing down ' the material. The text flows smoothly. The inclusion of quotes
from real people lends a conversational tone to the chapter [Chapter 6], mak-
ing it easier to read and comprehend."
-RobeTt Caruso, Santa Rosa funim College, California
"The level of difficulty is perfect for an intro level computer applications
course taught at a 2- or 4-year college."
-Tami Cotler, Siena College, Loudonville, N ew York
"Chapter 2 is written in a readable, m otivating style. I found it to be con-
cise, and introducing t opics in a proper sequence, defining terms accurately
and effectively. I found m yself thinking of topics to be added, and then
THERE THEY WERE!"
- Mik e Michaelson, Palomar College, San Marcos, California
"Strong writing style. This chapter [Chapter 8] was extrem ely thorough . And
covered many subj ects in depth . ... Writing style has always been quite clear
and concise with these tw o authors."
-Rebecca Mundy, UCLA and University of Southern California
"As a user of the sixth edition already, I find that the authors have the right
level of difficulty presented for an introductory computer course."
-Terry Matejka , Adelphi University, Garden City, New York o
"I think the writing style is good and will work well with the students."
-Michelle Parker, Indiana Pmdue Univasity, Fort Wayn e
"This text is written at a level that is fine for most of my students. I have
many students for whom English is a second language. These students may
have difficulty with certain phrasing .... As I read this chapter [Chapter 3],
however, I found very little that I thought might cause confusion, even for
those ESL students .... I have selected previous editions of this text in large
part because it is very 'readable.'"
-Valerie Anderson, Marymount College, Palos Vades, California

Praise for Previous Editions


"Williams and Sawyer do a consistently good job of explaining material. Th e
graphics and examples are well done."
- David Burris, Sam Hou ston State University, Huntsville, Texas
"Practicality is in the title of the book and is definitely practiced in each
chapter. Readability means clear writing, and that is also evident in the text."
-Nancy Webb, San Fran cisco City College
"The practical approach to information technology, along with the book's
superior readability, make this a strong text . The book's emphasis on being
current and a three-level learning system are great."
-DeLyse Totten, Portland Community College, Oregon
"I would rate the writing style as superior to the book I am currently u sing
and most of the books I have reviewed . . .. I found this book much easier to
read th an most books on the market. "
-Susan Fry, Boise State Univasity, Idaho
"The easy-to-understand way of speaking to the readers is excellent. You
put computer terminology into an easily understandable way to read. It's
excellent ."
-Ralph Caputo, Manhattan College, New York
"The major difference that I notice between your text and other texts is the
informal tone of the writing. This is one of the main reasons we adopted
your book-the colloquial feel."
-Todd McL eod, Fresno City College, California
"[Th e text] is written in a clear and non-threatening manner, keeping the
student's interest through the use of real, colorful anecdotes and interesting
observations. The authors' emphasis on the practical in the early chapters
gets the students' interest by centering on real-life questions that would face
everyone purchasing a n ew personal computer."
-Donald Robertson, Florida Community College-[acksonville
"I enjoyed the writing style. It was clear and casual, without trivializing. I
think the exam ples and explanations of Williams and Sawyer are excellent."

-
C/)
Ill -Martha Tillman, College of San Mateo, California
0 "Ethics topics are far superior to many other textbooks."
;,
0
-Maryann Dorn, Southern Illinois University
"[The critical thinking emphasis is important because] the facts will change,
the underlying concepts will not. Students need to know what the technol-
ogy is capable of and what is not possible . .. "
-Toseph DeLibero, Arizona State University
Seventh Edition

Using
lnformation
Technology
A Practical lntroduction to
Computers & Communications

Brian K. Williams

Stacey C. Sawyer

rD McGraw-Hill
t!a Irwin
Boston Burr Ridge, IL Du buque, IA Madison , WI New York San Francisco St. Louis
Bangkok Bogota Caracas Kuala Lumpur Lisbon London Madrid Mexico City
Milan Montreal New Delhi Santiago Seoul Singapore Sydney Taipei Toronto
The McGraw·Hill Companies •.

rB McGraw-Hill
tIBfil Irwin
USING INFORMATION TECHNOLOGY:
A PRACTICAL INTRODUCTION TO COMPUTERS & COMMUNICATIONS
Published by McGraw-Hill/Irwin, a business unit of T he McGraw-Hill Companies, Inc., 122 1
Avenue of th e Americas, New York, NY, 10020. Copyright © 2007 by The McGraw-Hill
Companies, Inc. All rights reserved. No part of this publication may be reproduced or di stributed
in any form or by an y means, or stored in a database or retrieval system, witho ut the prior w ritten
co nsent of The McGraw-Hill Companies, lnc., including, but not lim ited to, in an y networ k or
oth er electronic storage or tran smission, or broadcast for distance lea rnin g.
Some ancillaries, including elec tronic and print components, may not be ava il able to customers
outside th e United States.
This book is printed on acid-free paper.
I 2 3 4 5 6 7 8 9 0 QPD/ QPD 0 9 8 7 6

ISBN-13: 978-0-07- 110768-6


ISBN-IO 0-07-110768-1

www. mhh e.co m


Brief Contents
1 INTRODUCTION TO INFORMATION TECHNOLOGY: Your Digital World 1

2 THE INTERNET & THE WORLD WIDE WEB: Exploring Cyberspace 49

3 SOFTWARE: Tools for Productivity & Creativity 117

4 HARDWARE: THE CPU & STORAGE: How to Choose a Multimedia


Computer System 189

5 HARDWARE: INPUT & OUTPUT: Taking Charge of Computing & Communications 251

6 COMMUNICATIONS, NETWORKS, & SAFEGUARDS: The Wired & Wireless World 309

7 PERSONAL TECHNOLOGY: The Future Is You 367

8 DATABASES & INFORMATION SYSTEMS: Digital Engines for Today's Economy 408

9 THE CHALLENGES OF THE DIGITAL AGE: Society & Information


Technology Today 463
10 SYSTEMS ANALYSIS & PROGRAMMING: Software Development, Programming,
& Languages 497

...c
0
...0
Cl
;:
m

0
To the lnstructor
Introduction: Teaching the "Always On" Generation
If there is anything we have learned from our 25 years of writing computer
concepts books, it is this: th e landscape of computer education can change
quickly, and it's our responsibility to try to anticipate it.
USING INFORMATION TECHNOLOGY's First Edition was the first
text to fores ee and define the impact of digital convergence-the fusion of
computers and communications-as the n ew and broader foundation for th e
computer concepts course. UIT's Fourth Edition was the first text to
acknowledge the n ew priorities imposed by the internet and World Wide
Web and bring discussion of them from late in the course to n ear the begin-
ning (to Chapter 2).
Now, with this Seventh Edition we address another paradigm change:
because of the mobility and hybridization of digital devices, an "Always On"
generation of students has come of age that's at ease with digital technology
but- and it's an important "but" - not always savvy about computer
processes, possibilities, and liabilities. This development imposes additional
challenges on professors: instructors are expected to make the course inter-
esting and challenging to students already at least somewhat familiar with
information technology but with widely varying levels of computer sophis-
tication.

What's New m the Seventh Edition


To address these challenges, this edition includes the following new features:

1. Now a 10-chapter book. By making judicious cuts and combining


topics, we have reduced chapters to make the book a better fit for
many instructors and students, without sacrificing much in the way
of coverage. (Changes are shown on page viii.)
2. New chapter on personal technology. This brand-new chapter
(Chapter 7) describes fast-changing personal technologies- from
podcasting to smartphones-and their effects.
3. More "What's in it for me?" student questions: More "I" and "me"
questions, of the type students ask, have been added-and answered
in the book.
4. Expanded coverage of communications: Because the subject of
communications and networks has exploded, we have greatly
increased topic coverage- on everything from Bluetooth to ZigBee,
from EV-DO to Z-Wave (Chapters 2, 6).
5. More on computer self-defense: Computer threats have soared. We
help readers stay safe by explaining spoofing, phishing, pharming,
and other evils, all the way to online bullies, botnets, and zombies
(Chapters 2, 6, 9).
Addressing Instructors' Two Most Important Challenges
As we embark on our twelfth year of publica tion , we are extrem ely pleased
Quotes at the continued reception to U SING INFOR M ATI ON TEC H NO L OGY,
VVhat instructors say which has been used by well more than a half million students and adopted
is the most signifi- by instructors in over 700 schools. One reason for this enthusias tic response
cant challenge in m ay be that we've tried hard to address professo rs ' n eeds. We've often asked
teaching this course instructors-in reviews, surveys, and fo cus groups-"What is your most sig-
nificant challenge in teaching this course?"
"Keeping the stu-
dents interest ed."
-Evelyn Lulis, The First Most Frequent Answer: "Trying to Make the
DePaul University Course Interesting and Challenging"
" Keeping a w ide One professor at a state university seem s to speak for m os t when she says :
variety of students "Making th e co urse interes ting and challenging." Others echo h er with
on the same page. " remarks such as " Keeping students interes ted in the material enough to
-Don ald Robertson, study" and "Keeping the students engaged wh o know som e, but not all, of
Florida Community the m aterial. " Said one professor, "Many students take the course because
College-Jacksonville they must, instead of because th e m aterial interests them. " Another speaks
ab out the need to address a "variety of skill/ kn owledge levels while keeping
th e course challenging and interes ting"- which brings us to the second
response.

The Second Most Frequent Answer: "Trying to


"This will always Teach to Students with a Variety of Computer
be a difficult course
Backgrounds"
to teach, since the
students in any The m ost significant challenge in teaching this course "is trying to provide
given class com e m aterial to the varied levels of students in the class," says an instructor at
from very different a large Midwestern university. Another says the course gets students from
backgrounds and all backgrounds, ranging fro m "Which button do you push on the m ouse?"
have vastly different to "Already built and maintain a web page with html. " Says a third, "mixed-
levels of computer ability classes [make] it difficult to appeal to all students at the sam e time."
expertise." And a fourth: "How do you keep the 'techies' interes ted without losing the
-Laurie Eakins, beginners?"
East Carolina As authors, we find inform ation technology tremendously exciting, but we
University recognize that m any students take the course reluctantly. And we also rec-
ognize that many students com e to the subj ec t with attitudes ranging fro m
complete apathy and unfamiliarity to a high degree of experience and tech-
nical unders tanding.
To address the problem of motivating the unmotivated and teaching to a
disparity of backgrounds, U IT offers unequaled treatment of the fo llowing:

1. Practicality
2. Readability
3. Currentness
4. Three-level critical thinking system.

We explain these fea tures on the following pages.


Sixth & Seventh Editions of UIT Compared
This edition constitutes a major revision of UIT. The Sixth and Seventh editions are compared below.

UIT Sixth Edition (2005) UIT Seventh Edition (2007)

1. Introduction to Information Technology


..
1. Introduction to Information Technology
New section : "How Becoming Computer Savvy Benefits You"
New section (moved from old Chap. 10): "Information Technology & You r Life"
(effects on ed ucation , ca reers , etc.)

2. The Internet & the World Wide Web


.
2. The Internet & the World Wide Web
More on web portals , search engines, audio & video searching, desktop search ,

. tagging, Vo IP, blogging, RSS, podcasting.


New section: "The Intrusive Internet: Snooping, Spamming , Spoofing, Phishing,
Pharming, Cookies, & Spyware"

...
3. Application Software 3. Software
Two former software chapters combined into one.
System software now discussed before appl ication software.
History of DOS & Windows reduced. Updates on Apple and Windows OSs .

4. System Software

5. Hardware: The CPU & Storage


.
4. Hardware: The CPU & Storage
Updates on chips , cache, hard-disk controllers , Blu-ray, smart cards, multicore
processors.

6. Hardware: Input & Output


.
5. Hardware: Input & Output
More on specialty keyboards, flat-panel display, digital cameras .

7. Telecommunications
.
6. Communications , Networks, & Safeguards
New section (moved from old Chap. 9 and expanded): "Cyberthreats , Hackers, &

.. Safeguards"
Moved compression/decompression to Chap. 8 .

.Moved smart TV to Chap. 7 .


Resequenced discussion of networks, added material (HANs, PANs) , more on

..
firewalls.
Added material on Ethernet, Home PNA, HomePlug .
Discussion of GPR S, EDGE, EV-DO, UMTS, WiMax, Bluetooth 2.0, Ultra

.Wideband , Wireless USB, lnsteon , ZigBee, Z-Wave , more on Wi-Fi.


Reduced/removed discussion of line configu rations, transmission mode,
multiplexing, OSI.

.
7. Personal Technology-BRAND NEW CHAPTER!
Discussion of MP3 players; satellite, hi-def, internet rad ios; point-and-shoot & SLR
digital cameras; PDAs and tablet PCs; DTV, HDTV, SDTV; smartphones (SMS,

. ringtones, TV & video, etc.); videogame systems.


Box on "Always On" generation .

8. Files, Databases, & E-Commerce


.
8. Databases & Information Systems
Combined databases and e-commerce from old Chap. 8, information systems

...
from old Chap. 11 , and expert systems and Al from old Chap. 10.
Moved "Concerns about Accuracy & Privacy" to Chap. 9 .
Slightly reduced material on databases and MIS .
Resequenced section on computer-based information systems .

9. The Challenges of the Digital Age


..
9. The Challenges of the Digital Age
Section from old Chap. 8: "Truth Issues: Manipulating Digital Data"

.. New material on Evil Twin attack, zombies, botnets, blackmai l, crashing internet.
Revision of section on computer criminals, adding terrorists, corporate spies, etc .
New section : "Protecting Children: Pornography, Sexual Predators, & Online Bullies"

10. The Promises of the Digital Age Old Chap . 10 topics moved to Chaps. 1 and 8.

11. Information Systems Old Chap. 11 topics moved to Chaps. 8 and 10.

QI
Appendix A: Software Development
.
10. Systems Analysis & Programming
Combined systems from old Chap. 11 with programming & languages from old
u App . A.
...
IC

f
a.
Feature #1: Emphasis on Practicality
This popular feature received overwhelming acceptance by both students and
Quote instructors in past editions. Practical advice, of the sort found in computer
About UIT's m agazines, newspaper technology sections, and gen eral-int erest computer
practicality books, is expressed not only in the text but also in the following:
"The practical
approach to The Experience Box
information
Appearing at the end of each chapter, the Experien ce Box is option al mate-
technology, along
rial that m ay be assigned at the instructor's discretion. However, students
with the book's
will find the subj ects covered are of immediate value. Examples: "Web
superior readability,
Research, Term Papers,
make this a strong
& Plagiarism." "The
text. "
Mysteries of Tech Sup-
-DeLyse Totten,
port. " "How to Buy a
Portland Community
Laptop." "Preventing
College, Oregon
Your Identity from
Getting Stolen." "Vir-
Experience Box
Web Research, Term Papers, & Plagiarism
tual Meetings: Linking
Up Electronically. "
No matter how much students may database of papers over time so that students can't recycle
New to this edition: be able lo rationalize cheating in col· work previously handed in by others. On e system can lock on
lege-for example, trying to pass off someone to a stolen phrase as short as eight words. lt can also identify
"Th e 'Always On' per as their own (plagiarism)- ignorance of the copied material even if it has been changed slightly from
Generation."

See the list of Practical Action Box


Experience Boxes and
Practical Action Boxes This box consists of optional m at erial on practical matters. Examples: "Seri-
on the inside front ou s Web Search Techniques." "Preventing Problems from Too Much or Too
cover. Little Power to Your Computer." "Wh en th e Internet Isn 't Productive:
Online Addiction &
Other Timewasters. "
New to this edition:
"Evaluating & Sourc-
ing Information Found PRACTICAL ACTION
on the Web." "Tips for Tips for Avoiding Spyware
Fighting Spam." "Tips
You may not be able to completely avoid spyware, When you install their software, you might be asked to
for Avoiding Spyware." but doing the following may help: agree to certain conditions. If you simply click ·1 agree-
without reading the fine print, you may be authorizing
"Utility Programs." 1oosy about free downloadings, as from Grokster and
e careful about free and illegal downloads: Be
installation of spyware. -People have gotten in the habit
of clicking next, next, next, wi thout reading" when they
"Get a PC or Get a 1ows. 1.zaa, or illegal downloads of songs, movies, or TV
Often they use a form of spyware. File-sharing install softwa re, says a manager at McAfee Inc .• which
67
Mac? D ealing with ograms, which are popular with students, often con- tracks spywa re and viruses.

Security Issues. " "H elp


in Building Your Web Page." "Starting Over with Your Hard Drive: Erasing,
Reformatting, & Reloading." "Buying a Printer." "Telecommuting & Tele-
work: The Nontraditional Workplace." "Ways to Minimize Virus Attacks."
" H ow to D eal with Passwords." " Online Viewing & Sharing of Digital
Photos." "Buying the Right HDTV. "

See th e list of Survival Survival Tips


Survival T ip
Tips on th e inside front Look for the Padlock Icon
In the m argins throughout we present utilitarian
cover.
Survival Tips to aid exploration of infotech. To avoid having people spying
New to this edition: Examples: "Test the Speed on you when you are send ing
information over the web, use a
of Your Internet Connection." " Some Free ISPs. "
secure connection. This is indi -
"Do Home Pages Endure?" "Look for the Padlock cated at the bottom of your
Icon. " "Keeping Windows Security Features browser window by an icon that
Updated. " "New Software & Compatibility. " looks like a padlock or key.
"Where Do I Get a Boot Disk? " "Is Your Password
Guessable?" "Update Your Drivers. " "Service
Packs 1 & 2." "Two Versions of Windows XP."
0
"Compressing Web &. Audio Files." "Try Before You Buy." "Setting Mouse
Quote Properties." "Digital Subscriptions." "Cellphone Minutes." "Reformat Your
About UJT's Mernory Card to Avoid Losing Your Photos." "Keeping Track of Your Cell-
practicaUty phone." "Fraud Baiters." "Alleviating Info-Mania."
"The authors'
emphasis on the How to Understand a Computer Ad
practical in the
In the hardware chapters (Chapters 4 and 5), we explain important concepts
early chapters gets
by showing students how to understand the hardware components in a hypo-
the students' interest
thetical PC ad (seep. 195).
by centering on
real-life questions
that would face
everyone purchasing
a new personal • 7-Bay Mid-Tower Case
c01nputer." • Intel Pentium 4 Processor 2.80 GH z
- Donald Robertson, • 5 12 MB 533 MH z DDR2 SDRAM
• I MB L2 Cache
Florida Community
• 6 USB 2.0 Ports
College-Jacksonville • 56 Kbps Intern al Modem
• 3D AGP Graphics Card (64 MB )
• Sound Blaster Digital Sound Card
• 160 GB SATA 7200 RPM Hard Dri ve
• 24X DVD/CD-RW Combo Dri ve
• I04-Key board
• Mi crosoft lntelliMouse
• 17" Flat Panel Di splay
• HP Business Inkj et I000 Printer

Details of thi s ad are


ex pl ained throu ghout
this chapter and the nex t.
See the little magnifying
glass: ~

Feature #2: Emphasis on Readability & Reinforcement


for Learning
We offer the following features for reinforcing student learning:
Quotes
About UIT's Interesting Writing
readability
Where is it written that textbooks have to be boring? Can't a text have per-
"Well written and sonality?
great for an Actually, studies have found that textbooks written in an imaginative style
[introductory] text. I significantly improve students' ability to retain information. Both instructors
believe all audiences and students have commented on the distinctiveness of the writing in this
should be able to book. We employ a number of journalistic devices-colorful anecdotes, short
follow the text." biographical sketches, interesting observations in direct quotes-to make the
-Norman Hahn, material as interesting as possible. We also use real anecdotes and examples
Thomas Nelson rather than fictionalized ones.
Community College Finally, unlike most computer concepts books, we provide references for our
sources- 991 references in the back of the book, 40% of them from the year
"The writing
preceding publication. We see no reason why introductory computer books
style . . . is very user
shouldn't practice good scholarship by revealing their sources of information.
friendly."
And we see no reason why good scholarship can't go hand in hand with good
-Pamela Luckett,
writing. That is, scholarship need not m ean stuffiness.
Barry University
0
Key Terms AND Definitions Emphasized
About UIT's
readability To h elp readers avoid any confusion about which terms are important and
what they actually m ean, we print each key term in bold italic underscore
"Very well organized and its definiti on in boldface. Example (from Chapter 1): "Data consists of
and clearly raw facts and figures that are processed into information. "
presented."
-Yaping Gao,
Material in Easily Manageable Portions
College of Mount
St. Joseph Major ideas are presented in bite-size form, with generous use of advance
organizers, bulleted lists, and new paragraphing when a new idea is intro-
"Easy to follow." duced. Most sentences have been kept short, the majority not exceeding
-Hossein Bidgoli, 22-25 words in length.
California State
University,
Bakersfield "What's in It for Me?" Questions-to Help Students
Read with Purpose
"D efinitely written
We have crafted the learning objectives as Key Questions to h elp readers
in an easy-to-
focus on essentials. These are expressed as "I" and " me" questions, of the
understand
type students ask.
viewpoint."
New to this edition! We h ave also added more "I" and "me" questions
- Jerry Matejka,
fo llowing both first-level and second-level h eadings throughout the book . (To
Adelphi University
save space, these replace the QuickChecks used in prior editions.)
"I enjoyed the
writing style." Summary of Terms and Why They're Important
- Fillmore Guinn,
Odessa College Each chapter ends with a Summary of important terms, with an explanation
of what they are and why they are important. The terms are accompanied,
when appropriate, by a picture. Each concept or term is also given a cross-
reference page number that refers the reader to the main discussion within
the text.

Eight Timelines to Provide Historical Perspective


Some instructors like to see coverage of the history of computing. N ot wish-
ing to add grea tly to the length of the book, we decided on a student-friendly
approach: the presentation of eight pictorial timelines showing the most sig-
nificant historical IT events. These tim elines, which occur in most chapters,
appear along the bottom page m argin. Each timeline repeats certain "bench-
m ark " events to keep students oriented, but each one is modified to feature
the landmark discoveries and inventions appropriate to the different chapter
material. Ex amples: In Chapter 2, about the internet, the tim eline features
See timelines beginning innovations in telecommunications, the internet, and the World Wide Web
on pp. 14, 50, 162, 192, (see below) .
258, 310, 4 16, 522

reverts releases surpasses membership Swiss online


to research Internet 1 billion surpasses election ; flash hosts on
project; Explorer; indexab le 28 million; mobs start in internet
internet 56 K pages: Napster New York City
now in com- modem 93,047,785 goes to court
mercial invented ; hosts on

8 ~r
hands ; the cable internet
Vatican modem
goes online introduced;
12,88 1,000
hosts on
internet
(488,000
domains)
0
See Ethics examples Emphasis Throughout on Ethics
on pp. 37, 91, 99,
Many texts discuss ethics in isolation, usually in one of the final chapters .
236, 276, 319, 348,
We believe this topic is too important to be treated last or lightly, and users
448, 449, 465, 480
have agreed. Thus, we cover ethical matters throughout the book, as indi-
cated by the icon shown at right. Example: We discuss such
all-important questions as copying of internet files, online ~ ! ., '-' ·'
plagiarism, privacy, computer crime, and netiquette.

Emphasis Throughout on Security


In the post 9-11 era, security concerns are of gravest importance. Although
we devote several pages (in Chapters 2, 6, and 9) to security matters, we also
reinforce student awareness by highlighting with page-margin Security icons
See Security icons instances of security-related material throughout the book. Example: On
on pp. 37, 99, 277, p. 99, we use the icon shown at right to highlight the advice
291, 341 , 344, 468 that one should pretend that every email message one sends SECURITY
"is a postcard that can be read by anyone."

Feature #3: Currentness


Reviewers have applauded previous editions of UIT for being more up to date
About UIT's than other texts. For example, we have traditionally ended n1any chapters
currentness with a forward-looking section that offers a preview of technologies to
come-some of which are realized even as students are using the book.
"Very knowledge- Arn.ong the new topics and terms covered in this edition are: Abilene,
able, very good adware, AMD Athlon 64 X2, Apple video iPod, black-hat ha ckers, blog-
research." osphere, Bluetooth 2.0, Blu-ray, botnet, browser hiiacl<ers, business-to-
-Maryann Dorn, consumer (B2C) systems, consumer-to-consumer (C2C) systems, contactless
Southern Illinois smart cards, cyberbullies, cyberterrorists, desktop earch engines, Desl<-
University topLX, downloaded rington es, EDGE, employee internet management (EIM)
software, entei-tainment PCs, EV-DO, EV-DV, Evil Twin attach, exabytes,
Fibre Channel, foldab le PDA l<eyboards, GPRS, hacktivists, high-definition
radio, home area networks, home automation n etworks, home networks,
Hom ePlug, Hom ePNA, hotspots, !CANN 2.0, In steon, Intel Itanium 2 Mon-
tecito, Intel Pentium EE 840, Int ernet Protocol Television, internet radio,
IrDA ports, key loggers, k eyword index, L3 cache, Linspire, Macintosh OS
X Tiger, malware, mash-ups, megapixels, mesh technologies, micropay-
m ents, Microsoft Xbox 360, MIMO, moblogs, MP3 players, multicore proces-
sm s, national ID card, National LamdaRail, Nintendo Revolution, one-hand
PDA l<eyboards, online sexual predators, perpendicular recording teclmol-
ogy, personal area n etworl<s, pharming, phishing, podcasting, point-and-
shoot digital camera s, polymer memmy, pornography, Powei-PC chips, RSS
aggregators, satellite radio, search hiiackers, Short Mess age Sei-vice, SLR dig-
ital cameras, smart TVs, smartphones, Sony PlayStation 3, spoofing, spy-
ware, subiect directory, Symbian OS, tagging, text m essaging, thrill-seekeT
hackers, UltraCard, ultra wideband, UMTS, vblogs, videogame ratings, VoIP
phoning, web-based email, white-hat ha ckers, WiMa x, Windows Media
Pla yer 10 Mobile, Windows Vi sta, wireless USB, Xen, ZigBee, zombies,
Z-Wave.

-
0
IC
Q)

""
See inside bacl< "Morelnfo!" Icons Help Students
cover for pages on
which Moreln fo !
Find Their Own Answers to info!
Questions
icons appear. Fi nd ing Wi- Fi Hot Spo ts
In addition, we have taken the notion of cur- www. wififreespot com/
rentness to another level through the use of the www.wifihotspotlist.com/
"Morelnfo!" feature to encourage students to www.wifinder.com/
obtain their own updates about material. Exam-
ples: "Finding Wi-Fi Hot Spots ." "Finding ISPs."
"Do Home Pages Endure? " " Do You Need to
Know HTML to Build a Website?" "Urban Leg-
ends & Lies on the Internet. " "Blog Search Engines." "Some Online Com-
munities. " "Links to Security Software." "Where to Learn More about Free-
ware & Shareware." "More about Watermarks." See the pages listed on the
inside back cover.

Feature #4: Three- Level System to Help Students Think


Critically about Information Technology
This feature, which has been in place for the preceding three editions, has
About UIT's critical been warmly received. More and more instructors seem to hav e become
thinking emphasis familiar w ith Benjamin Bloom's Taxonomy of Educational Objectives,
describing a hierarchy of six critical-thinking skills: (a) two lower-order
"[It J is very skills-m em mization and comprehension; and (b) four higher-order skills-
important because application, analysis, synthesis, and evaluation. Drawing on our experience
it helps students in writing books to guide students to college success, we have implemented
comprehend and Bloom's ideas in a three-stage pedagogical approach, u sing the following hier-
make sound archical approach in the Chapter Review at the end of every chapter:
decisions."
-Maryann Dorn,
Southern Illinois Stage 1 Learning-Memorization: "I Can Recognize
University and Recall Information"
"A critical thinking Using self-test questions, multiple-choice questions, and true/false questions,
emphasis is very we enable students to test how well they recall basic terms and concepts.
important because
... it represents a Stage 2 Learning-Comprehension: "I Can Recall
higher level of Information in My Own Terms and Explain It
understanding." to a Friend"
-Evelyn Lulis,
DePaul University Using open-ended short-answer questions, we enable students to re-express
terms and concepts in their own words.

Stage 3 Learning-Applying, Analyzing, Synthesizing,


Evaluating: "I Can Apply What I've Learned, Relate
These Ideas to Other Concepts, Build on Other
Knowledge, and Use All These Thinking Skills to
Form a Judgment"
In this part of the Chapter Review, we ask students to put the ideas into
effect using the activities described. The purpose is to h elp students take pos-
session of the concepts, make them their own, and apply them realistically
to their own ideas. Our web exercises are also intended to spur discussion
in classroom and other contexts. Examples: "Using Text M essaging in Emer-
u
gencies." "What 's Wrong with Using Supermarket Loyalty Cards?" "Are You
in the Homeland Security Database?" ..
a.
Resources for Instructors
Because of the extensive text revisions, the supplem ents have been exten-
sively revised as well. Two key supplements-the Instructor's Manual and
the Testbank- were done by the authors, Stacey Sawyer and Brian Williams,
and were carefully checked for accuracy.

Instructor's Manual
The electronic Instructor's Manual, available as part of the Instructor's
Resource CD, helps instructors to create effective lectures. The Instructor's
Manual is easy to navigate and simple to understand. Each chapter contains
a chapter overview, a lecture outline, teaching tips, additional information,
and answers to end-of-chapter questions and exercises.

Testbank
The Testbank format allows instructors to effectively pinpoint areas of con-
tent within each chapter on which to test students. The test questions include
learning level, answers, and text page numbers.

EZ Test
McGraw-Hill's EZ Test is a flexible and easy-to-use electronic testing program.
The program allows instructors to create tests from book-specific items. It
accommodates a wide range of question types and instructors may add their
own questions. Multiple versions of the test can be created, and any test can
be exported for use with course managem ent system s such as WebCT, Black-
board, or PageOut. EZ Test Online is a new service and gives you a place to
easily administer your EZ Test-created exams and quizzes online. The program
is available for Windows and Macintosh environments.

PowerPoint Presentation
The PowerPoint presentation includes additional material that expands on
important topics from the text, allowing instructors to create interesting and
engaging classroom presentations. Each chapter of the presentation includes
illustrations to enable instructors to emphasize important concepts in m em-
orable ways.

Figures from the Book


All photos, illustrations, screenshots, and tables are available electronically
for u se in presentations, transparencies, or handouts.

Online Learning Center


(www.mhhe.com /uitle} Designed to provide students with additional learning
opportunities, the website includes PowerPoint presentations for each chapter.
For the convenience of instructors, all Instructor's Resource CD material is
available for download.
Digital Solutions to Help You Manage Your Course

PageOut
PageOut is our Course Web Site Development Center and offers a syllabus
page, URL, McGraw-Hill Online Learning Center content, online exercises
and quizzes, gradebook, discussion board, and an area for student web pages.
PageOut requires no prior knowledge of HTML, no long hours of coding,
and a way for course coordinators and professors to provide a full-course web-
site. PageOut offers a series of templates-simply fill them out with your
course information and click on one of 16 designs. The process takes under
an hour and leaves you with a professionally designed website. We'll even
get you started with sample websites, or enter your syllabus for you! Page-
Out is so straightforward and intuitive, it's little wonder why over 12,000
college professors are using it. For more information, visit the PageOut web-
site at www.pageout.net
The Online Learning Center can be delivered through any of these plat-
forms:

• Blackboard.com
• WebCT (a product of Universal Learning Technology)

Web CT and Blackboard Partnerships


McGraw-Hill has partnerships with WebCT and Blackboard to make it even
easier to take your course online and have McGraw-Hill content delivered
through the leading internet-based learning tools for higher education.
McGraw-Hill has the following service agreements with WebCT and
Blackboard:

• SimNet Concepts: This is the TOTAL solution for training and assess-
ment in computer concepts. SimNet Concepts offers a unique,
graphic-intensive environment for assessing student understanding of
computer concepts. It includes interactive labs for 77 different com-
puter concepts and 160 corresponding assessment questions. The con-
tent menus parallel the contents of the McGraw-Hill text being used
for the class, so that students can cover topics for each chapter of the
text you are using.
SimNet Concepts also offers the only truly integrated learning and
assessment program available today. After a student has completed
any SimNet Concepts Exam, he or she can simply click on one but-
ton to have SimNet assemble a custom menu that covers just those
concepts that the student answered incorrectly or did not attempt.
These custom lessons can be saved to disk and loaded at any time for
review.
Assessment Remediation records and reports what the student did
incorrectly for each question on an exam that was answered incorrectly.

-..
(J
re

""
Acknowledgments
Two names are on the front of this book, but a great many others are impor-
tant contributors to its development. First, we wish to thank our sponsoring
editor, Paul Ducham, for his support during this fast-moving revision process.
Thanks also go to our marketing champion, Sankha Basu, for his enthusiasm
and ideas. Trina Hauger deserves our special thanks for her help with the
supplements program. Everyone in production provided support and direc-
tion: Christine Vaughan, Shesha Bolisetty, and Artemio Ortiz. We also thank
our media technology producers, Rose Range and Victor Chiu, for helping us
develop an outstanding Instructor's Resource Kit.
Outside McGraw-Hill we were fortunate to have the services of the devel-
opment house Content Connections, with David Brake and Jenn Erickson.
Brian Kaspar helped on the Instructor's Manual. Scott Wallace provided cre-
ative ideas for early Chapter Review exercises. Photo researcher Judy Mason,
copyeditor Sue Gottfried, proofreader Martha Ghent, and indexer Jam es
Minkin all gave us valuable assistance. Thanks also to all the extremely
knowledgeable and hard-working professionals at TechBooks/GTS who pro-
vided so many of the prepress services.
Finally, we are gra teful to the following reviewers for helping to make this
the most market-driven book possible.
Stephanie Anderson N onnan P. Hahn
Southwestern Community College, Thoma s Nelson Community College,
Creston, Iowa Hampton , ViTginia
Valerie Anderson Laleh Kalantari
Marymount College, Palos Verde s, Western Illinois University, Macomb
California Gina Long
Hossein Bidgoli Southwestern Community College,
California State University, Creston, Iowa
Bal< ersfield Pamela Luckett
Beverly Bohn Barry University, Miami Shores,
Parl< University, Parkville, Missouri Florida
Charles Brown Thomas Martin
Plymouth State College, Plymouth, Shasta College, Redding, California
New Hampshire Jerry Matejka
Robert Caruso Adelphi Uni versity, Garden City,
Santa Rosa Junior College, Santa New Yorl<
Rosa, California Jennifer Merritt
Jami Cotler Parl< University, Parkville, Missouri
Siena College, Loudonville, Mike Michaelson
New York Palomar College, San Marcos,
Laura A. Eakins California
East Carolina University, Cindy Minor
Greenville, North Carolina John A. Logan College, Carterville,
Janos Fustos Illinois
Metropolitan State College, Denver
..Cl)

c
41
Yaping Gao
College of Mount St. Joseph,
Rebecca Mundy
University of California, Los
Angeles, and University of Southern
E Cincinnati California
,,41
m
David German Kathleen Murray
'i0 Cena Caso Community College, Drexel University, Philadelphia
c Bishop, California Michelle Parker
.:it.
(,)
<( Fillmore Guinn Indiana Purdue University, Fort
Odessa College, Odessa, Texas Wayne
Tammy Potter Anita Whitehill
West Kentucky Community & Tech- Foothill College, Los Altos Hills,
nical College, Paducah California
Morgan Shepherd Alfred Zimermann
University of Colorado at Colorado Hawai'i Pacific University, Honolulu
Springs
Contents
1.5 Understanding Your Computer: How
Chapter 1 Can You Customize (or Build) Your Own
INTRODUCTION TO INFORMATION PC? 24
TECHNOLOGY: YOUR DIGITAL How Computers Work: Three Key Concepts 24
WORLD Pretending to Order (or Build) a Custom-Built
Desktop Computer: Basic Knowledge of How a
1.1 The Practical User: How Becoming Computer Works 27
Computer Savvy Benefits You 3 Input Hardware: Keyboard & Mouse 27
1.2 Information Technology & Your Life: Processing & Memory Hardware: Inside the
The Future Now 4 System_ Cabinet 28
Storage Hardware: Floppy Drive, Hard Drive, &
The Two Parts of IT: Computers &
CD/DVD Drive 30
Communications 4
Output Hardware: Video & Sound Cards,
Education: The Promise of More Interactive &
Monitor, Speakers, & Printer 31
Individualized Learning 5
Communications Hardware: Modem 32
Health: High Tech for Wellness 6
Software 32
Money: Toward the Cashless Society 8
Is Getting a Custom-Built PC Worth the
Leisure: Infotech in Entertainment &
Effort? 33
the Arts 9
Government & Electronic Democracy: 1.6 Where Is Information Technology
Participating in the Civic Realm 10 Headed? 34
Jobs & Careers 11 Three Directions of Computer Development:
1.3 lnfotech Is All Pervasive: Miniaturization, Speed, & Affordability 34
Cellphones, Email, the Internet, & the E- Three Directions of Communications
World 13 Development: Connectivity, Interactivity, &
Multimedia 35
The Telephone Grows Up 14
When Computers & Conmrnnications Combine:
"You 've Got Mail!" Email's Mass Impact 15 Convergence, Portability, & Personalization 35
The Internet, the World Wide Web, & the "E" Also Stands for Ethics 37
"Plumbing of Cyberspace" 16
Better Organization & Time
College Students & the E-World 18 Management: Dealing with the Information
Managing Your Deluge in College- & in Life 38
Email 19
1.4 The "All-Purpose Machine": The
Varieties of Computers 20
All Computers, Great & Small: The Categories Chapter 2
of Machines 20
THE INTERNET & THE WORLD WIDE
Supercomputers 21 WEB: EXPLORING CYBERSPACE 49
Mainframe Computers 22
Workstations 22
..
Ill
Microcomputers 22
2.1 Connecting to the Internet:
Narrowband, Broadband, & Access
..
c
a>
c
0
Microcontrollers 23
Servers 24
Providers 52
Narrowband (Dial-Up) Modem: Low Speed but
(,)
Inexpensive & Widely Available 53
High-Speed Phone Lines: More Expensive but N ewsgroups- for Online Typed Discussions on
Available in Most Cities 55 Specific Topics 88
Problem for Telephone Internet Connections : Listservs: Email-Based Discussion Groups 90
The Last Mile 56 Real-Time Chat-Typed Discussions Among
Cable Modem.: Close Cmnpetitor to DSL 56 Online Participants 90
Satellite Wireless Connections 5 7 N etiquette: Appropriate Online Behavior 91
Other Wireless Connections: Wi-Fi &. 3G 58 2.5 The Online Gold Mine: Telephony,
Internet Access Providers: Three Kinds 58 Multimedia, Webcasting, Biogs,
Looking fm an E-Commerce, & Other Resources 92
Intern et Access Provider: Questions to As]{ at
Telephony: The Internet Telephone &.
the Beginning 60
Videophone 92
2.2 How Does the Internet Work? 60 Multimedia on the Web 93
Internet Connections: POPs, NAPs, Backbone, &. The Web Automatically Comes to You:
Internet2 61 Webcasting, Blogging, &. Podcasting 95
Internet Communications: Protocols, Packets, &. E-Commerce: B2B Commerce, Online Finance,
Addresses 62 Auctions, &. Job Hunting 97
Who Runs the Internet? 63 Relationships: Online Matchmaking 98
2.3 The World Wide Web 64 2.6 The Intrusive Internet: Snooping,
Spamming, Spoofing, Phishing, Pharming,
The Face of the Web: Browsers, Websites, &. Cookies, & Spyware 98
Web Pages 64
How the Browser Finds Things: URLs 66 Snooping on Your Email: Your Messages Are
Open to Anyon e 99
The Nuts &. Bolts of the Web: HTML &.
Hyperlinks 68 Spam: Electronic Junk Mail 99
Using Your Browser to Get around the Web 69 Tips for Fighting
Spam 100
Web Portals: Starting Points for Finding
Information 73 Spoofing, Phishing, &. Pharming: Phony Email
Senders &. Websites 101
Search Services &. Search Engines, &. How
They Work 74 Cookies: Convenience or Hindrance? 101
Four Web Search Tools : Keyword Indexes, Spyware-Adware, Browser &. Search Hijackers,
Subject Directories, Metasearch Engines, &. &. Key Loggers: Intruders to Track Your Habits
Specialized Search Engines 75 &. Steal Your Data 102
Smart Searching: Three General Strategies 76 Tips fm Avoiding
Spywarn 103
Multimedia Search Tools: Image, Audio, &. Video
Searching 77 Web Research, Term Papers,
& Plagiarism 104
Bo Serious Web Semch
Techniques 78
Desktop Search: Tools for Searching Your
Computer's Hard Disk 79
Evaluating & Sourcing Chapter 3
In formation Found on the Web 80 SOFfWARE: TOOLS FOR
Tagging: Saving Links for Easier Retrieval PRODUCTIVITY & CREATIVITY 117
Later 81
2.4 Email & Other Ways of 3.1 System Software: The Power Behind
Communicating over the Net 81 the Power 118
Two Ways to Send &. Receive Email 81 3 .2 The Operating System: What It
How to Use Email 83 Does 119
Sorting Your Email 85 Booting 120 ...c
Ill

Attachments 85 CPU Management 121


Instant Messaging 86
...cdi
File Management 121 0
FTP-for Copying All the Free Files You (J
Task Management 122
Want 88 Security Man agem ent 124
3.3 Other System Software: Device 3.10 Specialty Software 163
Drivers & Utility Programs 124
Presentation Graphics Software 163
Device Drivers: Running Peripheral Financial Software 166
Hardware 124 Desktop Publishing 168
Utilities: Service Programs 124 Drawing & Painting Programs 170
Utility Programs 125 Video/Audio Editing Software 171
3.4 Common Features of the User Multimedia Authoring Software 173
Interface 127 Animation Software 1 72
Using Keyboard & Mouse 127 Web Page Design Software 173
The GUI: The Graphical User Interface 130 Help in Building Your
The Help Command 134 Web Page 174
Project Managernent Software 174
3.5 Common Operating Systems 135
Computer-Aided Design 175
Macintosh Operating System 136 The Mysteries of Tech
Microsoft Windows 13 7 Support 176
Network Operating Systems: N etWare, Windows
NT/2000/2003, Microsoft.NET, Unix, &
Linux 139
Get a PC or Get a
Chapter 4
Mac! Dealing with Security Issues 140 HARDWARE: THE CPU & STORAGE:
Operating Systems for Handhelds: Palm OS HOW TO CHOOSE A MULTIMEDIA
& Windows CE/Pocket PC/Windows COMPUTER SYSTEM 189
CE. NET 143
3.6 Application Software: Getting 4.1 Microchips, Miniaturization, &
Started 145 Mobility 190

Application Software: For Sale, for Free, or for From Vacuum Tubes to Transistors to
Rent? 145 Microchips 190
Tutorials & Documentation 147 Miniaturization Miracles: Microchips,
Microprocessors, & Micromachines 192
A Few Facts about Files & the Usefulness of
Importing & Exporting 148 Mobility 192
Types of Application Software 148 Choosing an Inexpensive Personal Computer:
Understanding Cornputer Ads 194
3. 7 Word Processing 149
4.2 The System Unit: The Basics 194
Creating Documents 150
The Binary System: Using On/Off Electrical
Editing Documents 150
States to Represent Data & Instructions 195
Formatting Documents with the Help of
The Parity Bit 198
Templates & Wizards 153
Machine Language 199
Output Options: Printing, Faxing, or Emailing
Documents 155 The Computer Case: Bays, Buttons, &
Boards 199
Saving Documents 155
Power Supply 201
Tracking Changes & Inserting
Comments 155 The Motherboard & the Microprocessor Chip 202
Web Document Creation 155 Pi-eventing Problems
from Too Much or Too Little Electrical Power to
3.8 Spreadsheets 156 Your Computer 203
The Basics: How Spreadsheets Work 156 Processing Speeds: From Megahertz to
Analytical Graphics: Creating Charts 158 Picoseconds 206

..
Ill 3.9 Database Software 159 4.3 More on the System Unit 207

..
c
41
c
The Benefits of Database Software 159 How the Processor or CPU Works: Control Unit,
ALU, Registers, & Buses 207
0
(.)
The Basics: How Databases Work 160
How Memory Works: RAM, ROM, CMOS, &
Personal Information Managers 162
Flash 209
How Cache Works 211 5.4 Input & Output Technology & Quality
Other Methods of Speeding Up Processing 212 of Life: Health & Ergonomics 289
Ports & Cables 2 13 H ealth Matters 289
Expandability: Buses & Cards 217 Ergonomics : D esign with People in Mind 29 1
4.4 Secondary Storage 220 5.5 The Future of Input & Output 291
Floppy Disks & Zip Disks 221 Toward More
Input from Remote Locations 292
Hard Disks 222 Toward More
Source Data Automation 292
Optical Disks: CDs & DVDs 225 Toward More
Output in Remote Locations 294
Magnetic Tape 229 Towa rd More
Realistic Output 294
Smart Cards 230 Good Habits: Prntecting
Flash Memory 23 1 Yom Computer System, Yam Data, & Yom
Online Secondary Storage 232 Health 296
4.5 Future Developments in Processing
& Storage 232
Starting Over with
Your Hard Drive: Erasing, Refonnatting, & Chapter 6
Reloading 233 COMMUNICATIONS, NETWORKS, &
Future Developments in Processing 235 SAFEGUARDS: THE WIRED &
Fu ture Developments in Secondary Storage 236 WIRELESS WORLD 309
How to Buy a
Notebool< 238 6.1 From the Analog to the
Digital Age 311
The Digital Basis of Computers: Electrical
Signals as Discontinuous Bursts 3 11
Chapter 5 The Analog Basis of Life: Electrical Signals as
Continuous Waves 3 12
HARDWARE: INPUT & OUTPUT:
Purpose of the Dial-Up Modem: Converting
TAKING CHARGE OF COMPUTING & Digital Signals to Analog Signals & Back 3 13
COMMUNICATIONS 251
Converting Reality to Digital Form 314
5.1 Input & Output 253 6.2 Networks 315

5.2 Input Hardware 254 The Benefits of N etworks 3 16


Types of Networks: WANs, MANs, LANs,
Keyboards 254
HANs, PANs, & Others 3 16
Pointing Devices 258
H ow Networks Are Structured: Client/Server &
Scanning & Reading Devices 265 Peer-to-Peer 3 18
Audio-Input D evices 270 Intranets, Extranets, & VPNs 3 19
Webcams & Video-Input Cards 271 Components of a Network 320
Digital Cameras 2 71 N etwork Topologies: Bus, Ring, & Star 322
Speech-Recognition Systems 274 Two Ways to Prevent Messages from Colliding:
Sensors 275 Ethernet & Token Ring 324
Radio-Frequency Identification Tags 276
6.3 Wired Communications Media 325
Human-Biology-Input Devices 277
Wired Communications M edia: Wires &
5.3 Output Hardware 277 Cables 325
Traditional Softcopy Output: Display Wired Communications M edia for Homes:
Screens 278 Ethernet, H om ePNA, & HomePlug 326
Traditional Hardcopy Output: Printers 282 Telecommuting & ...c
PTinteT 286
Buying a Teleworl{: The Nontraditional Worl{pla ce 327
6.4 Wireless Communications Media 328
.
c
0
()
Mixed Output: Sound, Voice, & Video 288
The Elec trom.agn etic Spectrum, the Radio-
Frequency (RF) Spectrum, & Bandwidth 328
Four Types of Wireless Communications Internet Radio 3 78
Media 330 Podcasting 3 78
Long-Distance Wireless: One-Way
7 .4 Digital Cameras: Changing
Communication 333
Photography 379
Long-Distance Wireless: Two-Way
Communication 33 7 How Digital Cameras Work 3 79
Short-Range Wireless: Two-Way Online Viewing &
Communications 340 Sharing of Digital Photos 383
The Societal Effects of Digital Cameras 385
6.5 Cyber Threats, Hackers, &
Safeguards 344 7 .5 Personal Digital Assistants &
Tablet PCs 385
Cyber Threats: Denial-of-Service Attacks,
Worms, Viruses, &. Trojan Horses 344 How a PDA Works 386
Some Cyber Villains: Hackers &. Crackers 348 The Future of PDAs 387
Ways to Minimize Tablet PCs 387
Virus Attacl<s 348
7 .6 The New Television 387
Online Safety: Antivirus Software, Firewalls,
Passwords, Biometric Authentication, &. Interactive, Personalized, Internet, &. Smart TVs
Encryption 350 &. Entertainment PCs 388
B How to Deal with Three Kinds of Television: DTV, HDTV,
Passwords 352 SDTV 388
ion Bo Buying the Right
6.6 The Future of Communications 355
HDTV 390
Satellite-Based Systems 355 The Societal Effects of the New TV 390
Beyond 3G to 4G 355
7.7 Smartphones: More Than Talk 391
Photonics: Optical Technologies at Warp
Speed 355 How a Mobile Phone Works 391
Software-Defined Radio 356 Smartphone Services 391
A New Way to Compute: The Grid 356 The Societal Effects of Cellphones 397
Virtual Meetings: Linl<ing 7.8 Videogame Systems: The Ultimate
Up Electronically 357 Convergence Machine? 397
Microsoft's Xbox 360 398
Sony's PlayStation 3 399
Nintendo's Revolution 399
Chapter 7 The Results of Personal Technology: The
PERSONAL TECHNOLOGY: THE "Always On" Generation 399
FUTURE IS YOU 367 The "Always On "
Generation 400
7 .1 Convergence, Portability, &
Personalization 368
Convergence 369
Portability 3 70 Chapter 8
Personalization 3 71 DATABASES & INFORMATION
Popular Personal Technologies 3 72 SYSTEMS: DIGITAL ENGINES FOR
7 .2 MP3 Players 372 TODAY'S ECONOMY 407

How MP3 Players Work 3 72


8.1 Managing Files: Basic Concepts 408
The Societal Effects of MP3 Players 3 74
! Using MP3 Players in College 374 How Data Is Organized: The Data Storage
c Hierarchy 409
~ 7.3 High-Tech Radio: Satellite, High· The Key Field 410
a
0
Definition, & Internet 375
Types of Files: Program Files &. Data Files 4 11
Satellite Radio 3 75 Compression &. Decompression: Putting More
@ High-Definition Radio 377 Data in Less Space 412
8.2 Database Management Systems 412 8.8 The Ethics of Using Databases:
Concerns about Privacy & Identity
The Benefits of Database Management
Theft 449
Systems 414
Three Database Components 414 The Threat to Privacy 450
Storing Your Stuff: Identity Theft 452
How Long Will Digitized Data LasU 415 Preventing Your Identity
The Database Administrat or 4 16 from Getting Stolen 453
8.3 Database Models 416
Hierarchical Database 417
Network Database 418
Relational Database 419
Chapter 9
THE CHALLENGES OF THE DIGITAL
Object-Oriented Database 422
AGE: SOCIETY & INFORMATION
Multidimensional Database 422
TECHNOLOGY TODAY 463
8.4 Data Mining 424
The Process of Data Mining 424 9.1 Truth Issues: Manipulating Digital
Data 465
Some Applications of Data Mining 426
8.5 Databases & the Digital Economy:
Manipulation of Sound 465
E-Business & E-commerce 427 Manipulation of Photos 465
Manipulation of Video & Television 467
E-Commerce: Online Buying & Selling 427
Accuracy & Com pleten ess 46 7
Types of E-Commerce Systems: B2B, B2C, &
C2C 429 9.2 Security Issues: Threats to
Computers & Communications
8.6 Information Systems in Organizations: Systems 468
Using Databases to Help Make
Decisions 431 Errors & Accidents 468
The Qualities of Good Information 431 Natural Hazards 470
Computer Crirnes 471
Information Flow within an Organization:
Horizontally between Departments & Vertically Computer Crimin als 4 75
between Management Levels 432 Is the Boss Watching
Computer-Based Information Systems 435 Youi Trnst in the Workplace 477
Office Information Systems 435 9.3 Security: Safeguarding Computers &
Transaction Processing Systems 435 Communications 4 78
Management Information Systems 436 Deterrents to Computer Crime 478
Decision Support Systems 43 7 Iden tifica ti on & Access 4 79
Executive Support Systems 438 Encryption 480
Expert Syst ems 439 Protec tion of Software & Data 481
8. 7 Artificial Intelligence 439 Disaster-Recovery Plans 481
Expert Systems 440 9.4 Quality-of-Life Issues: The
Natural Language Processing 442 Environment, Mental Health, Child
Protection, & the Workplace 482
Intelligent Agents 442
Pattern Recogni tion 442 Environmental Problems 482
Fuzzy Logic 442 Mental-Health Problems 484
Virtual Reality & Simulation Devices 443 Protecting Children: Pornography, Sexual
Robo tics 443 Predators, & Online Bullies 485
Two Approaches to Artificial Intelligence: Weak Workplace Problem.s: Impediments to
Productivity 487 ..
ell
versus Strong AI 446
Artificial Life, the Turing Test, &
AI Ethics 448
When the In ternet Isn 't
Productive: Online Addiction & Oth eT Time
..
c
41
c
0
WasteTS 489 u
9.5 Economic & Political Issues: 10.3 Five Generations of Programming
Employment & the Haves/Have-Nots 490 Languages 515
Technology, the Job Killer? 490 First Generation: Machine Langu age 517
Gap between Rich &. Poor 491 Second Generation: Assembly Language 517
Whom Does the Internet Serve? 491 Third Generation: High-Level or Procedural
In a World of Breakneck Change, Can You Still Languages 519
Thrive? 492 Fourth Generation: Very-High-Level or Problem-
Student Use of Computers: Oriented Languages 520
Some Controversies 493 Fifth Generation: Natural Languages 522
10.4 Programming Languages Used
Today 522

Chapter 10 FORTRAN: The Language of Mathematics &. the


First High-Level Language 522
SYSTEMS ANALYSIS & COBOL: The Language of Business 523
PROGRAMMING: SOFTWARE BASIC: The Easy Language 524
DEVELOPMENT, PROGRAMMING, & Pascal: The Simple Language 524
LANGUAGES 497 C: For Portability &. Scientific Use 525
LISP: For Artificial Intelligence Programs 525
10.1 Systems Development:
The Six Phases of Systems Analysis 10.5 Object-Oriented & Visual
& Design 498 Programming 525

The Purpose of a System 498 Object-Oriented Programming: Block by


Block 526
Getting the Project Going: How It Starts, Who's
Involved 499 Three Important Concepts of OOP 526
The Six Phases of Systems Analysis Visual Programming: The Example of Visual
&. Design 499 BASIC 528
The First Phase: Conduct a Preliminary 10.6 Markup & Scripting Languages 528
Investigation 500
HTML: For Creating 2-D Web Documents
The Second Phase: Do an Analysis of the & Links 529
System 500
VRML: For Creating 3 -D Web Pages 529
The Third Phase: Design the System 502
XML: For Making the Web Work Better 530
The Fourth Phase: Develop the System 503
JavaScript: For Dynamic Web Pages 530
The Fifth Phase: Implement the System 504
ActiveX: For Creating Interactive Web
The Sixth Phase: Maintain the System 505 Pages 531
10.2 Programming: A Five-Step Perl: For CGI Scripts 531
Procedure 505 Critical Thinking Tools 532
The First Step: Clarify the Programming
Needs 506 Notes 541
The Second Step: Design the Program 507 Credits 552
The Third Step: Code the Program 513 Index I-1
The Fourth Step: Test the Program 514
The Fifth Step: Document & Maintain the
Program 514

...,
..
c
QI
c
0
u

You might also like