Professional Documents
Culture Documents
TECHNOLOGY IN ACTION
Improving Results
A proven way to help individual students achieve the ALAN EVANS
goals that educators set for their course.
KENDALL MARTIN
MARY ANNE POATSY
Engaging Experiences
Dynamic, engaging experiences that personalize
and activate learning for each student.
An Experienced Partner
From Pearson, a long-term partner with a true grasp
of the subject, excellent content, and an eye on the
future of education.
COMPLETE
www.pearsonhighered.com
14E
ISBN-13: 978-0-13-460822-8
ISBN-10: 0-13-460822-4
9 0 0 0 0
EVANS
9 780134 608228 MARTIN
POATSY
Power Management and Ergonomics................................................................................................................. 70
Power Controls and Power Management............................................................................................................. 70
Objective 2.13 Describe how to manage power consumption on computing devices.
Bits&Bytes: Save Power and Avoid Eyestrain: Use Blackle.............................................................................. 72
Setting It All Up: Ergonomics................................................................................................................................ 73
Objective 2.14 Define ergonomics, and discuss the ideal physical setup for using computing devices.
Solve This: Technology Wish List..................................................................................................................... 83
Chapter 3
Using the Internet: Making the Most of the Web’s Resources..................................... 84
Part 1: Collaborating and Working on the Web.................................................................................................................. 86
Learning Outcome 3.1 You will be able to explain how the Internet works and how it is used for collaboration,
communication, commerce, and entertainment purposes.
The Internet and How It Works............................................................................................................................ 86
The Origin of the Internet...................................................................................................................................... 86
Objective 3.1 Describe how the Internet got its start.
How the Internet Works........................................................................................................................................ 88
Objective 3.2 Explain how data travels on the Internet.
Collaborating and Communicating on the Web.................................................................................................. 89
Collaborating with Web Technologies................................................................................................................... 89
Objective 3.3 Evaluate the tools and technologies used to collaborate on the web.
Bits&Bytes: Useful Wikis.................................................................................................................................. 91
Sound Byte: Blogging......................................................................................................................................................... 91
Communicating over the Web.............................................................................................................................. 94
Objective 3.4 Summarize the technologies used to communicate over the web.
Conducting Business on the Web........................................................................................................................ 97
Conducting Business Online................................................................................................................................. 97
Objective 3.5 Describe how business is conducted using the Internet.
Dig Deeper: How Cloud Computing Works...................................................................................................... 98
Bits&Bytes: Looking for Extra Money? Try a Side Hustle................................................................................. 99
E-Commerce Safeguards..................................................................................................................................... 99
Objective 3.6 Summarize precautions you should take when doing business online.
Helpdesk: Doing Business Online...................................................................................................................................... 100
Bits&Bytes: Making Safe Mobile and Online Payments.................................................................................. 101
Try This: Use OneDrive to Store and Share Your Files in the Cloud................................................................. 103
Make This: MAKE: A Web-Capable App......................................................................................................... 104
Part 2: Using the Web Effectively....................................................................................................................................... 105
Learning Outcome 3.2 You will be able to describe the tools and techniques required to navigate and search the web.
Accessing and Moving Around the Web........................................................................................................... 105
Web Browsers.................................................................................................................................................... 105
Objective 3.7 Explain what web browsers are, and describe their common features.
URLs, Protocols, and Domain Names................................................................................................................ 107
Objective 3.8 Explain what a URL is, and discuss its main parts.
Navigating the Web............................................................................................................................................ 108
Objective 3.9 Describe tools used to navigate the web.
Bits&Bytes: Maintain Your Privacy While Searching the Web......................................................................... 109
Searching the Web Effectively............................................................................................................................ 110
Using Search Engines........................................................................................................................................ 110
Objective 3.10 Describe the types of tools used to search the web, and summarize strategies used to refine search results.
Helpdesk: Getting Around the Web.................................................................................................................................... 110
vi Contents
Chapter 4
Application Software: Programs That Let You Work and Play.............................. 126
Part 1: Accessing, Using, and Managing Software........................................................................................................... 128
Learning Outcome 4.1 You will be able to explain the ways to access and use software and describe how to best manage
your software.
Software Basics................................................................................................................................................... 128
Application vs. System Software......................................................................................................................... 128
Objective 4.1 Compare application software and system software.
Distributing Software.......................................................................................................................................... 128
Objective 4.2 Explain the differences between commercial software and open source software, and describe models for
software distribution.
Bits&Bytes: Finding Alternative Software....................................................................................................... 129
Managing Your Software.................................................................................................................................... 129
Purchasing Software.......................................................................................................................................... 129
Objective 4.3 Explain the different options for purchasing software.
Trends in It: Mobile Payment Apps: The Power of M-Commerce.................................................................. 130
Helpdesk: Buying and Installing Software........................................................................................................................... 131
Installing and Uninstalling Software..................................................................................................................... 131
Objective 4.4 Describe how to install and uninstall software.
Bits&Bytes: Ridding Your Computer of “Bloat”.............................................................................................. 131
Upgrading Software........................................................................................................................................... 132
Objective 4.5 Explain the considerations around the decision to upgrade your software.
Dig Deeper: How Number Systems Work...................................................................................................... 132
Sound Byte: Where Does Binary Show Up?...................................................................................................................... 133
Software Licenses.............................................................................................................................................. 134
Objective 4.6 Explain how software licenses function.
Ethics in It: Can I Borrow Software That I Don’t Own?.................................................................................. 135
Try This: Citing Website Sources.................................................................................................................... 137
Make This: MAKE: A More Powerful App........................................................................................................ 138
Part 2: Application Software.............................................................................................................................................. 139
Learning Outcome 4.2 Describe the different types of application software used for productivity and multimedia.
Productivity and Business Software.................................................................................................................. 139
Productivity Software.......................................................................................................................................... 139
Contents vii
Chapter 5
System Software: The Operating System, Utility Programs, and
File Management..................................................................................................... 164
Part 1: Understanding System Software........................................................................................................................... 166
Learning Outcome 5.1 You will be able to explain the types and functions of operating systems and explain the
steps in the boot process.
Operating System Fundamentals....................................................................................................................... 166
Operating System Basics................................................................................................................................... 166
Objective 5.1 Discuss the functions of the operating system.
Operating Systems for Personal Use.................................................................................................................. 167
Objective 5.2 Explain the most common operating systems for personal use.
Bits&Bytes: Why Isn’t Everyone Using Linux?................................................................................................ 168
Bits&Bytes: Use Cortana to Find Your Files................................................................................................... 169
Operating Systems for Machinery, Networks, and Business............................................................................... 169
Objective 5.3 Explain the different kinds of operating systems for machines, networks, and business.
Ethics in It: The Great Debate: Is macOS Safer Than Windows?................................................................... 171
What the Operating System Does...................................................................................................................... 172
The User Interface.............................................................................................................................................. 172
Objective 5.4 Explain how the operating system provides a means for users to interact with the computer.
Hardware Coordination....................................................................................................................................... 173
Objective 5.5 Explain how the operating system helps manage hardware such as the processor, memory, storage,
and peripheral devices.
Sound Byte: Using Windows to Evaluate CPU Performance.............................................................................................. 173
Software Application Coordination...................................................................................................................... 175
Objective 5.6 Explain how the operating system interacts with application software.
Trends in It: Are Personal Computers Becoming More Human?................................................................... 176
Starting Your Computer...................................................................................................................................... 177
The Boot Process............................................................................................................................................... 177
viii Contents
Chapter 6
Understanding and Assessing Hardware: Evaluating Your System..................... 206
Part 1: Evaluating Key Subsystems................................................................................................................................... 208
Learning Outcome 6.1 You will be able to evaluate your computer system’s hardware functioning, including the
CPU and memory subsystems.
Your Ideal Computing Device............................................................................................................................. 208
Moore’s Law....................................................................................................................................................... 208
Objective 6.1 Describe the changes in CPU performance over the past several decades.
Selecting a Computing Device............................................................................................................................ 209
Objective 6.2 Compare and contrast a variety of computing devices.
Evaluating the CPU Subsystem.......................................................................................................................... 211
How the CPU Works.......................................................................................................................................... 211
Objective 6.3 Describe how a CPU is designed and how it operates.
Bits&Bytes: Liquid Cooling............................................................................................................................ 215
Measuring CPU Performance............................................................................................................................. 215
Objective 6.4 Describe tools used to measure and evaluate CPU performance.
Dig Deeper: The Machine Cycle..................................................................................................................... 217
Evaluating the Memory Subsystem................................................................................................................... 218
Random Access Memory................................................................................................................................... 218
Objective 6.5 Discuss how RAM is used in a computer system.
Adding RAM....................................................................................................................................................... 220
Objective 6.6 Evaluate whether adding RAM to a system is desirable.
Helpdesk: Evaluating Your CPU and RAM.......................................................................................................................... 220
Contents ix
Chapter 7
Networking: Connecting Computing Devices........................................................ 248
Part 1: How Networks Function......................................................................................................................................... 250
Learning Outcome 7.1 You will be able to explain the basics of networking, including the components needed to
create a network, and describe the different ways a network can connect to the Internet.
Networking Fundamentals.................................................................................................................................. 250
Understanding Networks.................................................................................................................................... 250
Objective 7.1 Explain computer networks and their pros and cons.
Helpdesk: Understanding Networking................................................................................................................................ 251
Network Architectures........................................................................................................................................ 252
Network Designs................................................................................................................................................ 252
Objective 7.2 Explain the different ways networks are defined.
Bits&Bytes: The Rise of Wearable Technology............................................................................................... 254
Network Components......................................................................................................................................... 255
Transmission Media............................................................................................................................................ 255
Objective 7.3 Describe the types of transmission media used in networks.
Sound Byte: Setting Up a Home Computer Network......................................................................................................... 255
Basic Network Hardware.................................................................................................................................... 258
Objective 7.4 Describe the basic hardware devices necessary for networks.
x Contents
Chapter 8
Managing a Digital Lifestyle: Media and Ethics.................................................... 286
Part 1: The Impact of Digital Information......................................................................................................................... 288
Learning Outcome 8.1 You will be able to describe the nature of digital signals and how digital technology is used to
produce and distribute digital texts, music, and video.
Digital Basics....................................................................................................................................................... 288
Digital Convergence........................................................................................................................................... 288
Objective 8.1 Describe how digital convergence has evolved.
Digital vs. Analog................................................................................................................................................ 289
Objective 8.2 Explain the differences between digital and analog signals.
Digital Publishing................................................................................................................................................. 291
E-Readers.......................................................................................................................................................... 291
Objective 8.3 Describe the different types of e-readers.
Contents xi
Chapter 9
Securing Your System: Protecting Your Digital Data and Devices........................ 332
Part 1: Threats to Your Digital Assets................................................................................................................................ 334
xii Contents
Contents xiii
Chapter 10
Behind the Scenes: Software Programming.......................................................... 380
Part 1: Understanding Programming................................................................................................................................ 382
Learning Outcome 10.1 You will be able to describe the life cycle of a software project and identify the stages in the
program development life cycle.
Life Cycle of an Information System.................................................................................................................. 382
Importance of Programming............................................................................................................................... 382
Objective 10.1 Describe the importance of programming to both software developers and users.
System Development Life Cycle......................................................................................................................... 382
Objective 10.2 Summarize the stages of the system development life cycle (SDLC).
Bits&Bytes: Let Them See Your Work............................................................................................................ 384
Life Cycle of a Program....................................................................................................................................... 384
The Program Development Life Cycle................................................................................................................. 384
Objective 10.3 Define programming and list the steps in the program development life cycle (PDLC).
The Problem Statement...................................................................................................................................... 385
Objective 10.4 Describe how programmers construct a complete problem statement from a description of a task.
Sound Byte: Using the Arduino Microcontroller.................................................................................................................. 385
Helpdesk: Understanding Software Programming.............................................................................................................. 386
Algorithm Development...................................................................................................................................... 387
Objective 10.5 Explain how programmers use flow control and design methodologies when developing algorithms.
Bits&Bytes: Hackathons................................................................................................................................ 390
Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and
Operators...................................................................................................................................................... 392
Coding............................................................................................................................................................... 392
Objective 10.6 Discuss the categories of programming languages and the roles of the compiler and the integrated
development environment (IDE) in coding.
Debugging......................................................................................................................................................... 399
Objective 10.7 Identify the role of debugging in program development.
Bits&Bytes: Many Languages on Display....................................................................................................... 400
Testing and Documentation................................................................................................................................ 400
Objective 10.8 Explain the importance of testing and documentation in program development.
Try This: Programming with Corona................................................................................................................ 402
Make This: MAKE: A Notepad........................................................................................................................ 403
Part 2: Programming Languages....................................................................................................................................... 404
Learning Outcome 10.2 You will understand the factors programmers consider when selecting an appropriate
programming language for a specific problem and will be familiar with some modern programming languages.
Many Programming Languages......................................................................................................................... 404
Need for Diverse Languages.............................................................................................................................. 404
Objective 10.9 Discuss the driving factors behind the popularity of various programming languages.
Sound Byte: Programming with the Processing Language................................................................................................ 404
Selecting the Right Language............................................................................................................................. 405
Objective 10.10 Summarize the considerations in identifying an appropriate programming language for a specific setting.
Bits&Bytes: Coding for Zombies.................................................................................................................... 405
Ethics in It: When Software Runs Awry......................................................................................................... 406
Exploring Programming Languages.................................................................................................................. 407
Tour of Modern Languages................................................................................................................................. 407
xiv Contents
Chapter 11
Behind the Scenes: Databases and Information Systems.................................... 424
Part 1: Database Fundamentals......................................................................................................................................... 426
Learning Outcome 11.1 You will be able to explain the basics of databases, including the most common types of
databases and the functions and components of relational databases in particular.
Database Advantages......................................................................................................................................... 426
The Need for Databases..................................................................................................................................... 426
Objective 11.1 Explain what a database is and why databases are useful.
Helpdesk: Using Databases............................................................................................................................................... 428
Advantages of Using Databases......................................................................................................................... 429
Objective 11.2 Discuss the benefits of using a database.
Database Types................................................................................................................................................... 430
Relational Databases.......................................................................................................................................... 431
Objective 11.3 Describe features of relational databases.
Object-Oriented Databases................................................................................................................................ 432
Objective 11.4 Describe features of object-oriented databases.
Multidimensional Databases............................................................................................................................... 432
Objective 11.5 Describe features of multidimensional databases.
Trends in It: Emerging Technologies: Can Your Business Partner Deliver the Goods? Enhanced Databases
Can Help You Decide!................................................................................................................................... 433
Database Basics.................................................................................................................................................. 433
Database Components and Functions................................................................................................................ 433
Objective 11.6 Describe how relational databases organize and define data.
Sound Byte: Creating and Querying an Access Database................................................................................ 437
Bits&Bytes: Music Streaming Services Use Databases.................................................................................. 437
Inputting and Managing Data.............................................................................................................................. 438
Objective 11.7 Describe how data is inputted and managed in a database.
Dig Deeper: Structured Query Language (SQL).............................................................................................. 443
Bits&Bytes: Data Dashboards: Useful Visualization Tools............................................................................... 445
Try This: Using Excel’s Database Functions.................................................................................................... 447
Make This: MAKE: A Family Shopping List...................................................................................................... 448
Part 2: How Businesses Use Databases............................................................................................................................ 449
Learning Outcome 11.2 You will be able to explain how businesses use data warehouses, data marts, and data
mining to manage data and how business information systems and business intelligence are used to make business
decisions.
Data Warehousing and Storage......................................................................................................................... 449
Data Warehouses and Data Marts...................................................................................................................... 449
Objective 11.8 Explain what data warehouses and data marts are and how they are used.
Bits&Bytes: Data Warehouses Are Going to the Cloud.................................................................................. 451
Data Mining........................................................................................................................................................ 451
Objective 11.9 Describe data mining and how it works.
Bits&Bytes: Hadoop: How Big Data Is Being Managed................................................................................. 453
Ethics in It: Data, Data Everywhere, but Is It Protected?................................................................................ 454
Contents xv
Chapter 12
Behind the Scenes: Networking and Security in the Business World........................470
Part 1: Client/Server Networks and Topologies................................................................................................................ 472
Learning Outcome 12.1 You will be able to describe common types of client/server networks, servers found on
them, and network topologies used to construct them.
Client/Server Network Basics............................................................................................................................ 472
Networking Advantages..................................................................................................................................... 472
Objective 12.1 List the advantages for businesses of installing a network.
Comparing Client/Server and Peer-to-Peer Networks......................................................................................... 473
Objective 12.2 Explain the differences between a client/server network and a peer-to-peer network.
Types of Client/Server Networks......................................................................................................................... 474
Objective 12.3 Describe the common types of client/server networks as well as other networks businesses use.
Bits&Bytes: Your Car Has a Network—So Can It Be Hacked?....................................................................... 477
Servers and Network Topologies....................................................................................................................... 478
Servers............................................................................................................................................................... 478
Objective 12.4 List the common types of servers found on client/server networks.
Helpdesk: Using Servers.................................................................................................................................................... 479
Trends in It: Virtualization: Making Servers Work Harder............................................................................... 480
Network Topologies............................................................................................................................................ 481
Objective 12.5 Describe the common types of network topologies and the advantages and disadvantages of each one.
Sound Byte: Network Topology and Navigation Devices.................................................................................................... 483
Try This: Sharing Folders on a Home Network Using Windows....................................................................... 488
Make This: MAKE: An App That Shares.......................................................................................................... 489
Part 2: Setting Up Business Networks.............................................................................................................................. 490
Learning Outcome 12.2 You will be able to describe transmission media, network operating system software, and
network navigation devices and explain major threats to network security and how to mitigate them.
Transmission Media............................................................................................................................................ 490
Wired and Wireless Transmission Media............................................................................................................. 490
Objective 12.6 Describe the types of wired and wireless transmission media used in networks.
Bits&Bytes: Go Green with Mobile Apps........................................................................................................ 492
Network Adapters and Navigation Devices...................................................................................................... 492
Network Adapters.............................................................................................................................................. 492
Objective 12.7 Describe how network adapters help data move around a network.
MAC Addresses................................................................................................................................................. 494
Objective 12.8 Define MAC addresses, and explain how they are used to move data around a network.
Switches, Bridges, and Routers......................................................................................................................... 495
Objective 12.9 List the various network navigation devices, and explain how they help route data through networks.
Network Operating Systems and Network Security........................................................................................ 496
Network Operating Systems............................................................................................................................... 497
Objective 12.10 Explain why network operating systems are necessary for networks to function.
Bits&Bytes: Forget Software as a Service—Lighting as a Service Can Really Save Money............................. 497
Client/Server Network Security........................................................................................................................... 498
xvi Contents
Chapter 13
Behind the Scenes: How the Internet Works......................................................... 512
Part 1: Inner Workings of the Internet.............................................................................................................................. 514
Learning Outcome 13.1 You will be able to explain how the Internet is managed and the details of how data is
transmitted across the Internet.
Internet Management and Networking.............................................................................................................. 514
Management...................................................................................................................................................... 514
Objective 13.1 Describe the management of the Internet.
Networking Components.................................................................................................................................... 515
Objective 13.2 Explain how the Internet’s networking components interact.
Data Transmission.............................................................................................................................................. 516
Objective 13.3 List and describe the Internet protocols used for data transmission.
Bits&Bytes: A Free Cloud-Based Server for You............................................................................................ 516
Internet Identity.................................................................................................................................................... 519
IP Addresses...................................................................................................................................................... 519
Objective 13.4 Explain how each device connected to the Internet is assigned a unique address.
Helpdesk: Understanding IP Addresses, Domain Names, and Protocols........................................................................... 519
Bits&Bytes: What’s Your IP Address?............................................................................................................ 520
Bits&Bytes: Internet of Things Goes Shopping.............................................................................................. 520
Sound Byte: Creating Web Pages with Squarespace........................................................................................................ 521
Dig Deeper: Connection-Oriented Versus Connectionless Protocols.............................................................. 522
Domain Names.................................................................................................................................................. 523
Objective 13.5 Discuss how a numeric IP address is changed into a readable name.
Bits&Bytes: Server in the Cloud..................................................................................................................... 524
Try This: Ping Me............................................................................................................................................ 527
Make This: TOOL: AI Web.............................................................................................................................. 528
Part 2: Coding and Communicating on the Internet........................................................................................................ 529
Learning Outcome 13.2 You will be able to describe the web technologies used to develop web applications.
Web Technologies............................................................................................................................................... 529
Web Development.............................................................................................................................................. 529
Objective 13.6 Compare and contrast a variety of web development languages.
Bits&Bytes: CodePen: An Editing Community for Web Designers.................................................................. 530
Sound Byte: Client-Side Web Page Development.............................................................................................................. 533
Application Architecture...................................................................................................................................... 533
Objective 13.7 Compare and contrast server-side and client-side application software.
Bits&Bytes: Free Code Camp........................................................................................................................ 535
Communications over the Internet.................................................................................................................... 535
Types of Internet Communication....................................................................................................................... 535
Objective 13.8 Discuss the mechanisms for communicating via e-mail and instant messaging.
Bits&Bytes: Google Inbox.............................................................................................................................. 537
Encryption.......................................................................................................................................................... 538
Objective 13.9 Explain how data encryption improves security.
Contents xvii
Appendix A
The History of the Personal Computer.................................................................. A-1
Appendix B
Careers in IT.............................................................................................................B-1
Glossary........................................................................................................................................................................ G-1
Index............................................................................................................................................................................... I-1
xviii Contents
For my wife, Patricia, whose patience, understanding, and support continue to make this work possible …
especially when I stay up past midnight writing! And to my parents, Jackie and Dean, who taught me the
best way to achieve your goals is to constantly strive to improve yourself through education.
Alan Evans
For all the teachers, mentors, and gurus who have popped in and out of my life.
Kendall Martin
For my husband, Ted, who unselfishly continues to take on more than his fair share to support me
throughout this process, and for my children, Laura, Carolyn, and Teddy, whose encouragement and love
have been inspiring.
Mary Anne Poatsy
Acknowledgments
First, we would like to thank our students. We constantly learn from them while teaching, and they are a continu-
al source of inspiration and new ideas.
We could not have written this book without the loving support of our families. Our spouses and children made
sacrifices (mostly in time not spent with us) to permit us to make this dream into a reality.
Although working with the entire team at Pearson has been a truly enjoyable experience, a few individuals
deserve special mention. The constant support and encouragement we receive from Jenifer Niles, Executive
Portfolio Product Manager, and Andrew Gilfillan, VP, Editorial Director, continually make this book grow and
change. Our heartfelt thanks go to Shannon LeMay-Finn, our Developmental Editor. Her creativity, drive, and
management skills helped make this book a reality. We also would like to extend our appreciation to Pearson
Content Producers, particularly Laura Burgess, and the vendor teams, who work tirelessly to ensure that our
book is published on time and looks fabulous. The timelines are always short, the art is complex, and there
are many people with whom they have to coordinate tasks. But they make it look easy! We’d like to extend
our thanks to the media and MyITLab team—Eric Hakanson and John Cassar—for all of their hard work and
dedication.
There are many people whom we do not meet in person—Amanda Losonsky, Ekta Naik, Becca Lowe,
and Heather Darby—at Pearson and elsewhere who make significant contributions by designing the book,
illustrating, composing the pages, producing multimedia, and securing permissions. We thank them all.
And finally, we would like to thank the reviewers and the many others who contribute their time, ideas, and
talents to this project. We appreciate their time and energy, as their comments help us turn out a better product
each edition. A special thanks goes to Rick Wolff, a wonderfully talented infographic designer who helped by
creating new infographics for this edition of the text.
xx Acknowledgments
Explore the Hallmarks and New Features of Technology in Action, 14th Edition
Instruction: Engage all types of learners with a Annotated Instructor Chapter Tabs provide teaching tips,
variety of instructional resources homework and assessment suggestions, brief overviews of
each chapter’s Try This, Make This, and Solve This
• Pearson Text 2.0 students interact with the learning
exercises, as well as select Sound Byte talking points and
resources directly and receive immediate feedback.
ethics debate starters.
• Chapter Overview Videos provide students with a quick
look at what they will learn in the chapter. Practice: Hands-on resources and simulations
• PowerPoint and Audio Presentations can be used in allow students to demonstrate understanding
class for lecture or assigned to students, particularly online • Try This Projects are hands-on projects students complete
students, for instruction and review. to practice and demonstrate proficiency with important
• TechBytes Weekly is a weekly newsfeed that keeps your topics. Each project is accompanied by a how-to video.
course current by providing interesting and relevant news • Solve This! Projects put the concepts students are
items and ready-to-use discussion questions. learning into action through real-world problem solving
• Make This! Projects provide activities where students build using Microsoft Word, Access, and Excel. Grader versions
programs that run on their mobile devices. Most of the of some of these projects are in MyITLab.
chapters use App Inventor to build Android apps that can • Helpdesks are interactive lessons based on chapter
be installed on any Android device or emulated for students objectives. Students play the role of a helpdesk staffer
using iOS devices. Each project includes instructions and a assisting customers via a live chat, decision-based
how-to video. simulation.
• Learning Outcomes and Learning Objectives have been • Two new Sound Bytes on Squarespace and CodePen have
revised. been added.
• Throughout the chapter, text, figures, and photos have • A new Bits&Bytes on free cloud-based servers has
been updated. been added.
• New content on plagiarism and ethical computing has • A new Bits&Bytes on CodePen has been added.
been added. • Coverage of the ethical debate on federal agencies
• New content on intellectual property and copyright has forcing corporations to break encryption schemes has
been added. been added.
Chapter 9
• Learning Outcomes and Learning Objectives have been
revised.
Topic Sequence
Concepts are covered in a progressive manner between chapters to mirror the typical student learning experience.
End of Chapter Quiz Step 1 Click the add pictures or video button. In the
dialog box that displays, browse to where your
that you’ve recorded with the built-in
camera, or clips on the Internet.
(From Ezvid Inc. Copyright © by Ezvid Inc. Used by permission of Ezvid Inc.)
Enter title
For a quick review to see what you’ve learned, answer the following questions. Submit the quiz as requested by your (From Ezvid Inc. Copyright © by Ezvid Inc. Used by permission of Select category
instructor. If you are using MyITLab, the quiz is also available there. Ezvid Inc.)
b. byte d. scanner.
c. integrated circuit 8. printers work by spraying tiny drops of ink
d. megabyte onto paper.
Solve This
3. A(n) is a laptop computer that can convert a. Laser
into a tablet-like device.
5.
d. virtual
All of the following are sensors found in certain
smartphones EXCEPT
a.
b.
display screen
hard drive each part of the chapter.
c. WiFi adapter
a. hygrometer. d. Bluetooth adapter
b. accelerometer.
c. magnetometer.
d. barometer.
Solve This MyITLab ®
grader
5. The “brain” of the computer is the CPU. • Use Find and Replace • Insert a Hyperlink
multiple choice • Format Bulleted Lists • Add Sources
1. Which is NOT an event associated with the beginning 4. Which of the following would be best for synchronous
• Insert SmartArt • Insert Citations and Bibliography
of the Internet? text-based communication?
a. The U.S. Department of Defense creates ARPA. a. e-mail
Instructions:
b. TCP/IP protocol was developed that allowed b. texting
different computers to communicate with each 1. Start Word. Open TIACh03_Start and save it as TIACh03_LastFirst, using your last and first names.
other. c. blogging
2. Using Find and Replace, find all instances of metasearch and replace them with meta-search.
80 Chapter 2 Looking at Computers: Understanding the Parts c. Amazon.com was one of the first websites on the d. instant messaging 3. At the blank paragraph after the end of the second paragraph of text under Alternative Search Engines, insert a Vertical
Internet. Box List SmartArt graphic. Open the text pane, if necessary. With the cursor active in the first bullet, type Google
5. Which of the following would be an example of a C2C
Scholar. (Do not include the period.) Press Enter, press Tab, and then type Searches scholarly literature. (Do not include
d. The first e-mail program was written by Ray business?
the period.)
Tomlinson.
a. BestBuy
Repeat these steps to add the following information for the next two bullets:
2. In an Internet exchange of data, which type of b. Target Dogpile
computer asks for data?
c. Etsy Meta-search engine that searches Google, Yahoo!, and Bing
a. client Specialty Search Engines
d. Google
b. requester Search only sites that are relevant to a topic or industry
c. server a. Hint: To insert a SmartArt graphic, on the Insert tab, in the Illustrations group, click SmartArt.
d. servicer 4. Change the SmartArt graphic colors to Colorful—Accent Colors. Move the Google Scholar box and bullet point to the bot-
with video, audio, or MyITLab Go to MyITLab to take an autograded version of the Check Your Understandingthe role of a helpdesk Author: Kapoun, Jim
Name of Web Page: Five criteria for evaluating web pages
Name of Website: Olin & Uris Libraries, Cornell University
review and to find all media resources for the chapter.
questions about
URL: http://guides.library.cornell.edu/evaluating_Web_pages
7. In the Evaluating Websites section, create a bulleted list with the five points beginning with Authority, Bias or Objectivity, Rel-
TechBytes Weekly Go to TechBytes Weekly for current technology news and discussion questions!
evance, Audience, and Coverage. Use a checkmark as the bullet point.
technology.
8. Press Ctrl+End to go to the end of the document, press Enter twice, and then insert a Works Cited Bibliography. Change
the citation style to APA Sixth Edition.
9. Save the document, and then close Word.
10. Submit the document as directed.
Supervisor available
Chapter Review 125
102 Chapter 3 Using the Internet: Making the Most of the Web’s Resources to assist students.
MyITLab xxix
xxx MyITLab
Provided for each chapter are guides that can be printed and inserted in your copy of the text. Sample contents are
shown below.
classroom or in online classes, including: (located on the IRC) Consider using the PowerPoint presentation as a lecture guide, weaving it
throughout the entire class. You can also customize it with additional art images
from the IRC.
preparation for the next chapter, including: sites as appropriate to use for research. As you run the Helpdesk, have a browser
open so that you can expand on what’s discussed.
3
Chapter Assessment
• Helpdesks
Chapter Assessment
Check Your Understanding with Multiple Choice Questions, Chapter
Summary and Key Terms, Chapter Quiz, Team Time Project, Ethics Project,
Solve This Project
• Blackboard What were the features they most remember, and why? How much did the system
cost? How big was the monitor? How much memory did it include? Which of
these technologies are now considered to be legacy technologies?
• WebCT Assessment
• TestGen Test Bank
(located on the IRC)
To test student comprehension, use the Test Bank questions for Chapter 3 general
content. You can include questions from the Helpdesk and Sound Byte Test Banks,
as well. This week, design the quiz as a timed, one-attempt quiz with some essay
On the Ethics tab, you will find the following: If you take the time to build a website, you want customers to find it. Since many people find
websites by using search engines, you want your website to rise to the top when searches are
conducted. Search engine optimization (SEO) is using certain techniques and technologies
that make search engines rank your site high on their results list when customers or potential
OPPOSING VIEWPOINTS TABLE: Outlines ethics topics customers do a search for your kind of business. Increasing your search engine rankings is not
that easy, so most companies incorporate some search engine optimization strategies as a way to
help bring customers in through the Internet. Some practices are more ethical than others. Do
that you can use to debate in the classroom. ethics matter with SEO strategies?
Conduct a debate or discussion using the opposing viewpoints in the table below. Keywords have
been supplied to help you search the Internet for more information on the topic.
KEYWORDS: Provides you with additional words with
which to search the Internet for more information related to Proponents of SEO Opponents of SEO
Strategies Argue Strategies Argue
the ethics topic. Exploiting SEO strategies can attract more users Instituting practices such as stuffing lots of
to your website. key words into the site’s content may turn off
users of the site once they do arrive there.
As long as the strategy meets the intent of the Poorly executed SEO strategies can lead
search engine guidelines, it’s okay to push the to long-term harm to a business’s online
boundaries. presence by reducing overall traffic flow.
Just get people to the site by any means at all; Manipulating small quirks in search engine
then you can deliver an ethical representation of strategies shifts the efforts of your company
your product. from a basic focus on quality.
search: Keywords
engine optimization, white hat SEO, black hat SEO, grey hat SEO, SEO
code of ethics
Complete, 14/E
ALAN EVANS
KENDALL MARTIN
MARY ANNE POATSY
Alan Evans
Kendall Martin
Mary Anne Poatsy
ISBN-10: 0134608224
ISBN-13: 9780134608228
Contact your local Pearson sales rep to learn more about the Technology in Action instructional system.
I see increasing reason to believe that the view formed some time
back as to the origin of the Makonde bush is the correct one. I have
no doubt that it is not a natural product, but the result of human
occupation. Those parts of the high country where man—as a very
slight amount of practice enables the eye to perceive at once—has not
yet penetrated with axe and hoe, are still occupied by a splendid
timber forest quite able to sustain a comparison with our mixed
forests in Germany. But wherever man has once built his hut or tilled
his field, this horrible bush springs up. Every phase of this process
may be seen in the course of a couple of hours’ walk along the main
road. From the bush to right or left, one hears the sound of the axe—
not from one spot only, but from several directions at once. A few
steps further on, we can see what is taking place. The brush has been
cut down and piled up in heaps to the height of a yard or more,
between which the trunks of the large trees stand up like the last
pillars of a magnificent ruined building. These, too, present a
melancholy spectacle: the destructive Makonde have ringed them—
cut a broad strip of bark all round to ensure their dying off—and also
piled up pyramids of brush round them. Father and son, mother and
son-in-law, are chopping away perseveringly in the background—too
busy, almost, to look round at the white stranger, who usually excites
so much interest. If you pass by the same place a week later, the piles
of brushwood have disappeared and a thick layer of ashes has taken
the place of the green forest. The large trees stretch their
smouldering trunks and branches in dumb accusation to heaven—if
they have not already fallen and been more or less reduced to ashes,
perhaps only showing as a white stripe on the dark ground.
This work of destruction is carried out by the Makonde alike on the
virgin forest and on the bush which has sprung up on sites already
cultivated and deserted. In the second case they are saved the trouble
of burning the large trees, these being entirely absent in the
secondary bush.
After burning this piece of forest ground and loosening it with the
hoe, the native sows his corn and plants his vegetables. All over the
country, he goes in for bed-culture, which requires, and, in fact,
receives, the most careful attention. Weeds are nowhere tolerated in
the south of German East Africa. The crops may fail on the plains,
where droughts are frequent, but never on the plateau with its
abundant rains and heavy dews. Its fortunate inhabitants even have
the satisfaction of seeing the proud Wayao and Wamakua working
for them as labourers, driven by hunger to serve where they were
accustomed to rule.
But the light, sandy soil is soon exhausted, and would yield no
harvest the second year if cultivated twice running. This fact has
been familiar to the native for ages; consequently he provides in
time, and, while his crop is growing, prepares the next plot with axe
and firebrand. Next year he plants this with his various crops and
lets the first piece lie fallow. For a short time it remains waste and
desolate; then nature steps in to repair the destruction wrought by
man; a thousand new growths spring out of the exhausted soil, and
even the old stumps put forth fresh shoots. Next year the new growth
is up to one’s knees, and in a few years more it is that terrible,
impenetrable bush, which maintains its position till the black
occupier of the land has made the round of all the available sites and
come back to his starting point.
The Makonde are, body and soul, so to speak, one with this bush.
According to my Yao informants, indeed, their name means nothing
else but “bush people.” Their own tradition says that they have been
settled up here for a very long time, but to my surprise they laid great
stress on an original immigration. Their old homes were in the
south-east, near Mikindani and the mouth of the Rovuma, whence
their peaceful forefathers were driven by the continual raids of the
Sakalavas from Madagascar and the warlike Shirazis[47] of the coast,
to take refuge on the almost inaccessible plateau. I have studied
African ethnology for twenty years, but the fact that changes of
population in this apparently quiet and peaceable corner of the earth
could have been occasioned by outside enterprises taking place on
the high seas, was completely new to me. It is, no doubt, however,
correct.
The charming tribal legend of the Makonde—besides informing us
of other interesting matters—explains why they have to live in the
thickest of the bush and a long way from the edge of the plateau,
instead of making their permanent homes beside the purling brooks
and springs of the low country.
“The place where the tribe originated is Mahuta, on the southern
side of the plateau towards the Rovuma, where of old time there was
nothing but thick bush. Out of this bush came a man who never
washed himself or shaved his head, and who ate and drank but little.
He went out and made a human figure from the wood of a tree
growing in the open country, which he took home to his abode in the
bush and there set it upright. In the night this image came to life and
was a woman. The man and woman went down together to the
Rovuma to wash themselves. Here the woman gave birth to a still-
born child. They left that place and passed over the high land into the
valley of the Mbemkuru, where the woman had another child, which
was also born dead. Then they returned to the high bush country of
Mahuta, where the third child was born, which lived and grew up. In
course of time, the couple had many more children, and called
themselves Wamatanda. These were the ancestral stock of the
Makonde, also called Wamakonde,[48] i.e., aborigines. Their
forefather, the man from the bush, gave his children the command to
bury their dead upright, in memory of the mother of their race who
was cut out of wood and awoke to life when standing upright. He also
warned them against settling in the valleys and near large streams,
for sickness and death dwelt there. They were to make it a rule to
have their huts at least an hour’s walk from the nearest watering-
place; then their children would thrive and escape illness.”
The explanation of the name Makonde given by my informants is
somewhat different from that contained in the above legend, which I
extract from a little book (small, but packed with information), by
Pater Adams, entitled Lindi und sein Hinterland. Otherwise, my
results agree exactly with the statements of the legend. Washing?
Hapana—there is no such thing. Why should they do so? As it is, the
supply of water scarcely suffices for cooking and drinking; other
people do not wash, so why should the Makonde distinguish himself
by such needless eccentricity? As for shaving the head, the short,
woolly crop scarcely needs it,[49] so the second ancestral precept is
likewise easy enough to follow. Beyond this, however, there is
nothing ridiculous in the ancestor’s advice. I have obtained from
various local artists a fairly large number of figures carved in wood,
ranging from fifteen to twenty-three inches in height, and
representing women belonging to the great group of the Mavia,
Makonde, and Matambwe tribes. The carving is remarkably well
done and renders the female type with great accuracy, especially the
keloid ornamentation, to be described later on. As to the object and
meaning of their works the sculptors either could or (more probably)
would tell me nothing, and I was forced to content myself with the
scanty information vouchsafed by one man, who said that the figures
were merely intended to represent the nembo—the artificial
deformations of pelele, ear-discs, and keloids. The legend recorded
by Pater Adams places these figures in a new light. They must surely
be more than mere dolls; and we may even venture to assume that
they are—though the majority of present-day Makonde are probably
unaware of the fact—representations of the tribal ancestress.
The references in the legend to the descent from Mahuta to the
Rovuma, and to a journey across the highlands into the Mbekuru
valley, undoubtedly indicate the previous history of the tribe, the
travels of the ancestral pair typifying the migrations of their
descendants. The descent to the neighbouring Rovuma valley, with
its extraordinary fertility and great abundance of game, is intelligible
at a glance—but the crossing of the Lukuledi depression, the ascent
to the Rondo Plateau and the descent to the Mbemkuru, also lie
within the bounds of probability, for all these districts have exactly
the same character as the extreme south. Now, however, comes a
point of especial interest for our bacteriological age. The primitive
Makonde did not enjoy their lives in the marshy river-valleys.
Disease raged among them, and many died. It was only after they
had returned to their original home near Mahuta, that the health
conditions of these people improved. We are very apt to think of the
African as a stupid person whose ignorance of nature is only equalled
by his fear of it, and who looks on all mishaps as caused by evil
spirits and malignant natural powers. It is much more correct to
assume in this case that the people very early learnt to distinguish
districts infested with malaria from those where it is absent.
This knowledge is crystallized in the
ancestral warning against settling in the
valleys and near the great waters, the
dwelling-places of disease and death. At the
same time, for security against the hostile
Mavia south of the Rovuma, it was enacted
that every settlement must be not less than a
certain distance from the southern edge of the
plateau. Such in fact is their mode of life at the
present day. It is not such a bad one, and
certainly they are both safer and more
comfortable than the Makua, the recent
intruders from the south, who have made USUAL METHOD OF
good their footing on the western edge of the CLOSING HUT-DOOR
plateau, extending over a fairly wide belt of
country. Neither Makua nor Makonde show in their dwellings
anything of the size and comeliness of the Yao houses in the plain,
especially at Masasi, Chingulungulu and Zuza’s. Jumbe Chauro, a
Makonde hamlet not far from Newala, on the road to Mahuta, is the
most important settlement of the tribe I have yet seen, and has fairly
spacious huts. But how slovenly is their construction compared with
the palatial residences of the elephant-hunters living in the plain.
The roofs are still more untidy than in the general run of huts during
the dry season, the walls show here and there the scanty beginnings
or the lamentable remains of the mud plastering, and the interior is a
veritable dog-kennel; dirt, dust and disorder everywhere. A few huts
only show any attempt at division into rooms, and this consists
merely of very roughly-made bamboo partitions. In one point alone
have I noticed any indication of progress—in the method of fastening
the door. Houses all over the south are secured in a simple but
ingenious manner. The door consists of a set of stout pieces of wood
or bamboo, tied with bark-string to two cross-pieces, and moving in
two grooves round one of the door-posts, so as to open inwards. If
the owner wishes to leave home, he takes two logs as thick as a man’s
upper arm and about a yard long. One of these is placed obliquely
against the middle of the door from the inside, so as to form an angle
of from 60° to 75° with the ground. He then places the second piece
horizontally across the first, pressing it downward with all his might.
It is kept in place by two strong posts planted in the ground a few
inches inside the door. This fastening is absolutely safe, but of course
cannot be applied to both doors at once, otherwise how could the
owner leave or enter his house? I have not yet succeeded in finding
out how the back door is fastened.