Technology In Action Complete / Edition 9

Technology In Action Complete / Edition 9

2.3 3
by Alan Evans, Kendall Martin, Mary Anne Poatsy
     
 

View All Available Formats & Editions

ISBN-10: 0132838737

ISBN-13: 9780132838733

Pub. Date: 02/01/2012

Publisher: Prentice Hall

For introductory courses in computer concepts or computer literacy, often including instruction in Microsoft Office.

A Computer Concepts Text Focused on Today’s Student!

Technology in Action engages students by covering topics in a progressive approach and providing rich companion media.

Overview

For introductory courses in computer concepts or computer literacy, often including instruction in Microsoft Office.

A Computer Concepts Text Focused on Today’s Student!

Technology in Action engages students by covering topics in a progressive approach and providing rich companion media.

Product Details

ISBN-13:
9780132838733
Publisher:
Prentice Hall
Publication date:
02/01/2012
Pages:
736
Product dimensions:
8.40(w) x 10.70(h) x 1.20(d)

Table of Contents

Chapter 1: Using Technology to Change the World
More Than Just a Job
Technology on the World Stage
Political Issues
Human Rights
The Environment
The Digital Divide
ETHICS IN IT: The Digital Divide and the Mobile Bridge
Technology and Our Society
Technology Impacts How We Think
How We Connect
How We Consume
Technology and Your Life
Boost Your Productivity
Be a Savvy Computer User
Prepare for Your Career
Dig Deeper: Making Reality Even More Real

Technology In focus: The History of the PC

Chapter 2: Looking at Computers: Understanding the Parts
Understanding Your Computer
Computers Are Data Processing Devices
Bits and Bytes: The Language of Computers
Types of Computers
Input Devices
Keyboards
Mice and Other Pointing Devices
Touch Screens
Image Input
Sound Input
ETHICS IN IT: What Is Ethical Computing?
Output Devices
Monitors
Printers
Dig Deeper: How Touch Screens Work
Sound Output
Processing and Memory on the Motherboard
Memory
Processing
Storing Data and Information
Hard Drives
Flash Storage
Optical Storage
Connecting Peripherals to the Computer
High-Speed and Data Transfer Ports
Connectivity and Multimedia Ports
Adding Ports: Expansion Cards and Hubs
Power Controls
Setting It All Up

TRENDS IN IT: Innovations in Printing

Chapter 3: Using the Internet: Making the Most of the Web’s Resources
The Origin of the Internet
The Internet and How It Works
Communicating and Collaborating Through the Internet
Social Networking
E-Mail
Instant Messaging
Weblogs (Blogs) and Video Logs (Vlogs)
Wikis
Podcasts and Webcasts
Web Entertainment
TRENDS IN IT: The Internet Makes Business Startups Affordable
Conducting Business over the Internet: E-Commerce
E-Commerce Safeguards
Accessing the Web: Web Browsers
Getting Around the Web: URLs, Hyperlinks, and Other Tools
URLs
Hyperlinks and Beyond
Favorites, Live Bookmarks, and Tagging
Searching the Web Effectively
Search Engines
Evaluating Web Sites
ETHICS IN IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?
Dig Deeper: Discovering the Semantic Web

Technology In focus: Information Technology Ethics

Chapter 4: Application Software: Programs That Let You Work and Play
The Nuts and Bolts of Software
Web-Based Applications
Productivity Software for Home and Office
Word Processing Software
Spreadsheet Software
Presentation Software
Database Software
Note Taking Software
Personal Information Manager (PIM) Software
Productivity Software Features
Software Suites
Personal Financial Software
Business Software for Home and Office
Home Business Software
Large Business Software
Specialized Business Software
Media Software for Home
Digital Image Editing Software
Digital Audio Software
Dig Deeper: How Cloud Computing Works
Digital Video Editing Software
Media Management Software
Software for Home
Gaming Software
Educational Software
Drawing Software
TRENDS IN IT: “There’s an App for That!”
Buying Software
Software Licenses
ETHICS IN IT: Can I Borrow Software That I Don’t Own?
Pre-Installed Software
Discounted Software
Freeware and Shareware
Software Versions and System Requirements
Installing, Uninstalling, and Starting Software
Getting Help with Software
Chapter 5: Using System Software: The Operating System, Utility Programs, and File Management
System Software Basics
Types of Operating Systems
Real-Time Operating Systems
Operating Systems for Networks, Servers, and Mainframes
Operating Systems for Mobile Devices
Operating Systems for Personal Computers
What the Operating System Does
The User Interface
TRENDS IN IT: Open Source Software: Why Isn’t Everyone Using Linux?
Processor Management
ETHICS IN IT: Sugar: The Sweet OS for Every Child
Memory and Storage Management
Hardware and Peripheral Device Management
Software Application Coordination
The Boot Process: Starting Your Computer
Step : Activating BIOS
Step : Performing the Power-On Self-Test
Step : Loading the Operating System
Step : Checking Further Configurations and Customizations
Handling Errors in the Boot Process
The Desktop and Window Features
Organizing Your Computer: File Management
Organizing Your Files
Viewing and Sorting Files and Folders
Naming Files
Working with Files
Utility Programs
Display Utilities
The Programs and Features Utility
File Compression Utilities
System Maintenance Utilities
System Restore and Backup Utilities
Dig Deeper: How Disk Defragmenter Utilities Work
The Task Scheduler Utility
Accessibility Utilities
Technology In focus: Computing Alternatives
Chapter 6: Understanding and Assessing Hardware: Evaluating Your System
Your Ideal Computer
Evaluating the CPU Subsystem
Evaluating the Memory Subsystem: RAM
Adding RAM
Evaluating the Storage Subsystem
Hard Drive
Optical Storage
Dig Deeper: How a Mechanical Hard Drive Works
Evaluating the Video Subsystem
Video Cards
Evaluating the Audio Subsystem
Sound Card
Evaluating System Reliability
ETHICS IN IT: Free (as in Speech, not Beer)
Making the Final Decision
TRENDS IN IT: Thunderbolt
Chapter 7: Networking: Connecting Computing Devices
Networking Fundamentals
Network Architectures
Describing Networks Based on Network Administration
Describing Networks Based on Distance
Network Components
Transmission Media
Network Adapters
ETHICS IN IT: Sharing Your Internet Connection with Your Neighbors: Legal?
Ethical? Safe?
Network Navigation Devices
Networking Software
Connecting to the Internet
Broadband Connections
Dial-Up Connections
Choosing the Right Internet Connection Option
Home Networks
Ethernet Home Networks
Home Network Cabling
Wired and Wireless on One Network
Configuring Home Network Equipment
Routers and Switches: Moving Data Around Your Network
Connecting Devices to Routers
Securing Wireless Networks
Connecting Devices to Networks
Connecting Computers
Network-Ready Devices
Digital Entertainment Devices on a Network
Specialized Home Networking Devices
Configuring Software for Your Home Network
Windows Configuration
TRENDS IN IT: Where Should You Stone Your Files? The Cloud is Calling
Wireless Node Configuration and Testing
Troubleshooting Network Problems
Technology In focus: Under the Hood
Chapter 8: Digital Lifestyle: Managing Digital Data and Devices
A Digital Lifestyle
Digital Telephony
Cell Phones and Smartphones
How Cellular Works
Cell Phone Components
Synchronizing
Text Messaging
Mobile Internet
Cell Phone/Smartphone Security
Voice over Internet Protocol
Digital Media and Information
Digital Publishing
Digital Music
Digital Photography
Digital Video
ETHICS IN IT: Managing Your Copyrights: Copyleft Might Simplify Your Life
Digital Navigation
Digital Convergence
TRENDS IN IT: Near Field Communication
Chapter 9: Securing Your System: Protecting Your Digital Data and Devices
Cybercrime
Computer Threats: Computer Viruses
Types of Viruses
Virus Classifications
Computer Safeguard: Antivirus Software and Software Updates
Computer Threats: Hackers
Restricting Access to Your Digital Assets
Dig Deeper: Computer Forensics: How It Works
Managing Online Annoyances
Protecting Yourself from Yourself!
Protecting Your Physical Computing Assets
Technology In focus: Careers in IT
Chapter 10: Behind the Scenes: Software Programming
Understanding Software Programming
The Life Cycle of an Information System
System Development Life Cycle
ETHICS IN IT: When Software Runs Amok
The Life Cycle of a Program
Describing the Problem: The Problem Statement
Making a Plan: Algorithm Development
Developing the Algorithm: Decision Making and Design
Top-Down Design
Object-Oriented Analysis
Writing Program Code
Coding: Speaking the Language of the Computer
What happens first when you write a program?
Dig Deeper: The Building Blocks of Programming Languages:
Syntax, Keywords, Data Types, and Operators
Compilation
Coding Tools: Integrated Development Environments
Debugging: Getting Rid of Errors
Finishing the Project: Testing and Documentation
Programming Languages: Many Languages for Many Projects
Selecting the Right Language
Building Applications
Visual Basic
C and C++
Java and C#
Objective C
Building Web Applications
Scripting Languages for the Web
ASP, JSP, and PHP
Flash and XML
Building Mobile Applications
The Next Great Language
TRENDS IN IT: Emerging Technologies: Unite All Your
Video Game Design Tools
Chapter 11: Behind the Scenes: Databases and Information Systems
Life Without Databases
Database Building Blocks
Advantages of Using Databases
Database Terminology
Fields
Records and Tables
Primary Keys
Database Types
Relational Databases
Object-Oriented Databases
Multidimensional Databases
Database Management Systems: Basic Operations
Creating Databases and Entering Data
Inputting Data
Data Validation
Viewing and Sorting Data
Dig Deeper: Structured Query Language (SQL)
Extracting or Querying Data
Outputting Data
Relational Database Operations
Normalization of Data
TRENDS IN IT: Computers in Society: User-Populated Databases
Data Storage
Data Warehouses
TRENDS IN IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!
Populating Data Warehouses
Data Staging
Data Marts
Managing Data: Information and Business Intelligence Systems
Office Support Systems
Transaction-Processing Systems
Management Information Systems
Decision Support Systems
Internal and External Data Sources
Model Management Systems
Knowledge-Based Systems
Enterprise Resource Planning Systems
Data Mining
ETHICS IN IT: Data, Data Everywhere–But Is It Protected?
Chapter 12: Behind the Scenes: Networking and Security in the Business World
Networking Advantages
Client/Server Networks
Classifications of Client/Server Networks: LANs, WANs, MANs, and PANs
Servers
Print Servers
Application Servers
Database Servers
E-Mail Servers
Communications Servers
Web Servers and Cloud Servers
TRENDS IN IT: Virtualization: Making Servers Work Harder
Network Topologies
Bus Topology
Ring Topology
Star Topology
Comparing Topologies
Transmission Media
Wired Transmission Media
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Wireless Media Options
Comparing Transmission Media
Network Operating Systems
Network Adapters
Network Navigation Devices
MAC Addresses
Switches and Bridges
Routers
Network Security for Client/Server Networks
Authentication
Access Privileges
Physical Protection Measures
Firewalls
Chapter 13: Behind the Scenes: How the Internet Works
The Management of the Internet
Internet Networking
Internet Networking
Connecting to the Internet
The Network Model of the Internet
Data Transmission and Protocols
Packett Switching
TCP/IP
Internet Identity
IP Addresses
DIG DEEPER: Making the Connection-Connection-Oriented Versus Connectionless Protocols
Domain Names
HTTP, HTML, and Other Web Building Blocks
Web Browser Security Protocols
HTML/XHTML
XML
Common Gateway Interface
Dynamic HTML
Client-Side Applications
Communications over the Internet
E-Mail
ETHICS IN IT: Web Browsing: Not as Private as You May Think
E-Mail Security: Encryption and Specialized Software
Instant Messaging
TRENDS IN IT: Crowdsourcing: Harnessinf the Power of Social Networks
Voice over Internet Protocol (VoIP)
Glossary
Index

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Technology In Action Complete 2.3 out of 5 based on 0 ratings. 3 reviews.
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Anonymous More than 1 year ago
but if you have an online class associated with the textbook you need an access code and no where does it say, for the rental or full book, that you will or will not get an access code. I found out the hard way that you don't receive an access code with the rental. If you don't need the access code, then its a great choice.