Technology In Action Complete / Edition 9

Paperback (Print)
Rent from
(Save 67%)
Est. Return Date: 08/01/2015
Buy Used
Buy Used from
(Save 40%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 98%)
Other sellers (Paperback)
  • All (92) from $1.99   
  • New (4) from $179.18   
  • Used (88) from $1.99   


For introductory courses in computer concepts or computer literacy, often including instruction in Microsoft Office.

A Computer Concepts Text Focused on Today’s Student!

Technology in Action engages students by covering topics in a progressive approach and providing rich companion media.

Read More Show Less

Product Details

  • ISBN-13: 9780132838733
  • Publisher: Prentice Hall
  • Publication date: 2/1/2012
  • Edition number: 9
  • Pages: 736
  • Sales rank: 1,565,606
  • Product dimensions: 8.40 (w) x 10.70 (h) x 1.20 (d)

Meet the Author

Three professors from Montgomery County Community College traveled with the Prentice Hall Information Technology team for over two years to uncover what students and professors today wanted and needed in an Intro to Computer Concepts text. After meeting with more than 1,000 students and instructors they developed Technology in Action. Due to overwhelming success, they recently published Technology in Action 9/e!

Alan D. Evans, M.S., CPA

Alan Evans is currently a faculty member at Moore College of Art and Design and Montgomery County Community College teaching a variety of computer science and business courses. He holds a B.S. in Accounting from Rider University and an M.S. in Information Systems from Drexel University, and he is a certified public accountant. After a successful career in business, Alan finally realized his true calling was education. He has been teaching at the college level since 2000. Alan enjoys giving presentations at technical conferences and meets regularly with computer science faculty and administrators from other colleges to discuss curriculum development and new methods of engaging students.

Kendall E. Martin, Ph.D.
Kendall has been teaching since 1988 at a number of institutions, including Villanova University, DeSales University, Arcadia University, Ursinus College, County College of Morris, and Montgomery County Community College, at both the undergraduate and master’s degree level. Kendall’s education includes a B.S. in Electrical Engineering from the University of Rochester and an M.S. and Ph.D. in Engineering from the University of Pennsylvania. She has industrial experience in research and development environments (AT&T Bell Laboratories) as well as experience from several start-up technology firms. At Ursinus College, Kendall developed a successful faculty training program for distance education instructors, and she makes conference presentations during the year.

Mary Anne Poatsy, MBA, CFP
Mary Anne is an adjunct faculty member at Montgomery County Community College, teaching various computer application and concepts courses in face-to-face and online environments. Mary Anne holds a B.A. in Psychology and Elementary Education from Mount Holyoke College and an MBA in Finance from Northwestern University’s Kellogg Graduate School of Management. Mary Anne has more than nine years of educational experience, ranging from elementary and secondary education to Montgomery County Community College, Muhlenberg College, and Bucks County Community College, as well as training in the professional environment. Prior to teaching, Mary Anne was a vice president at Shearson Lehman Hutton in the Municipal Bond Investment Banking department.

Read More Show Less

Table of Contents

Chapter 1: Using Technology to Change the World
More Than Just a Job
Technology on the World Stage
Political Issues
Human Rights
The Environment
The Digital Divide
ETHICS IN IT: The Digital Divide and the Mobile Bridge
Technology and Our Society
Technology Impacts How We Think
How We Connect
How We Consume
Technology and Your Life
Boost Your Productivity
Be a Savvy Computer User
Prepare for Your Career
Dig Deeper: Making Reality Even More Real

Technology In focus: The History of the PC

Chapter 2: Looking at Computers: Understanding the Parts
Understanding Your Computer
Computers Are Data Processing Devices
Bits and Bytes: The Language of Computers
Types of Computers
Input Devices
Mice and Other Pointing Devices
Touch Screens
Image Input
Sound Input
ETHICS IN IT: What Is Ethical Computing?
Output Devices
Dig Deeper: How Touch Screens Work
Sound Output
Processing and Memory on the Motherboard
Storing Data and Information
Hard Drives
Flash Storage
Optical Storage
Connecting Peripherals to the Computer
High-Speed and Data Transfer Ports
Connectivity and Multimedia Ports
Adding Ports: Expansion Cards and Hubs
Power Controls
Setting It All Up

TRENDS IN IT: Innovations in Printing

Chapter 3: Using the Internet: Making the Most of the Web’s Resources
The Origin of the Internet
The Internet and How It Works
Communicating and Collaborating Through the Internet
Social Networking
Instant Messaging
Weblogs (Blogs) and Video Logs (Vlogs)
Podcasts and Webcasts
Web Entertainment
TRENDS IN IT: The Internet Makes Business Startups Affordable
Conducting Business over the Internet: E-Commerce
E-Commerce Safeguards
Accessing the Web: Web Browsers
Getting Around the Web: URLs, Hyperlinks, and Other Tools
Hyperlinks and Beyond
Favorites, Live Bookmarks, and Tagging
Searching the Web Effectively
Search Engines
Evaluating Web Sites
ETHICS IN IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?
Dig Deeper: Discovering the Semantic Web

Technology In focus: Information Technology Ethics

Chapter 4: Application Software: Programs That Let You Work and Play
The Nuts and Bolts of Software
Web-Based Applications
Productivity Software for Home and Office
Word Processing Software
Spreadsheet Software
Presentation Software
Database Software
Note Taking Software
Personal Information Manager (PIM) Software
Productivity Software Features
Software Suites
Personal Financial Software
Business Software for Home and Office
Home Business Software
Large Business Software
Specialized Business Software
Media Software for Home
Digital Image Editing Software
Digital Audio Software
Dig Deeper: How Cloud Computing Works
Digital Video Editing Software
Media Management Software
Software for Home
Gaming Software
Educational Software
Drawing Software
TRENDS IN IT: “There’s an App for That!”
Buying Software
Software Licenses
ETHICS IN IT: Can I Borrow Software That I Don’t Own?
Pre-Installed Software
Discounted Software
Freeware and Shareware
Software Versions and System Requirements
Installing, Uninstalling, and Starting Software
Getting Help with Software
Chapter 5: Using System Software: The Operating System, Utility Programs, and File Management
System Software Basics
Types of Operating Systems
Real-Time Operating Systems
Operating Systems for Networks, Servers, and Mainframes
Operating Systems for Mobile Devices
Operating Systems for Personal Computers
What the Operating System Does
The User Interface
TRENDS IN IT: Open Source Software: Why Isn’t Everyone Using Linux?
Processor Management
ETHICS IN IT: Sugar: The Sweet OS for Every Child
Memory and Storage Management
Hardware and Peripheral Device Management
Software Application Coordination
The Boot Process: Starting Your Computer
Step : Activating BIOS
Step : Performing the Power-On Self-Test
Step : Loading the Operating System
Step : Checking Further Configurations and Customizations
Handling Errors in the Boot Process
The Desktop and Window Features
Organizing Your Computer: File Management
Organizing Your Files
Viewing and Sorting Files and Folders
Naming Files
Working with Files
Utility Programs
Display Utilities
The Programs and Features Utility
File Compression Utilities
System Maintenance Utilities
System Restore and Backup Utilities
Dig Deeper: How Disk Defragmenter Utilities Work
The Task Scheduler Utility
Accessibility Utilities
Technology In focus: Computing Alternatives
Chapter 6: Understanding and Assessing Hardware: Evaluating Your System
Your Ideal Computer
Evaluating the CPU Subsystem
Evaluating the Memory Subsystem: RAM
Adding RAM
Evaluating the Storage Subsystem
Hard Drive
Optical Storage
Dig Deeper: How a Mechanical Hard Drive Works
Evaluating the Video Subsystem
Video Cards
Evaluating the Audio Subsystem
Sound Card
Evaluating System Reliability
ETHICS IN IT: Free (as in Speech, not Beer)
Making the Final Decision
TRENDS IN IT: Thunderbolt
Chapter 7: Networking: Connecting Computing Devices
Networking Fundamentals
Network Architectures
Describing Networks Based on Network Administration
Describing Networks Based on Distance
Network Components
Transmission Media
Network Adapters
ETHICS IN IT: Sharing Your Internet Connection with Your Neighbors: Legal?
Ethical? Safe?
Network Navigation Devices
Networking Software
Connecting to the Internet
Broadband Connections
Dial-Up Connections
Choosing the Right Internet Connection Option
Home Networks
Ethernet Home Networks
Home Network Cabling
Wired and Wireless on One Network
Configuring Home Network Equipment
Routers and Switches: Moving Data Around Your Network
Connecting Devices to Routers
Securing Wireless Networks
Connecting Devices to Networks
Connecting Computers
Network-Ready Devices
Digital Entertainment Devices on a Network
Specialized Home Networking Devices
Configuring Software for Your Home Network
Windows Configuration
TRENDS IN IT: Where Should You Stone Your Files? The Cloud is Calling
Wireless Node Configuration and Testing
Troubleshooting Network Problems
Technology In focus: Under the Hood
Chapter 8: Digital Lifestyle: Managing Digital Data and Devices
A Digital Lifestyle
Digital Telephony
Cell Phones and Smartphones
How Cellular Works
Cell Phone Components
Text Messaging
Mobile Internet
Cell Phone/Smartphone Security
Voice over Internet Protocol
Digital Media and Information
Digital Publishing
Digital Music
Digital Photography
Digital Video
ETHICS IN IT: Managing Your Copyrights: Copyleft Might Simplify Your Life
Digital Navigation
Digital Convergence
TRENDS IN IT: Near Field Communication
Chapter 9: Securing Your System: Protecting Your Digital Data and Devices
Computer Threats: Computer Viruses
Types of Viruses
Virus Classifications
Computer Safeguard: Antivirus Software and Software Updates
Computer Threats: Hackers
Restricting Access to Your Digital Assets
Dig Deeper: Computer Forensics: How It Works
Managing Online Annoyances
Protecting Yourself from Yourself!
Protecting Your Physical Computing Assets
Technology In focus: Careers in IT
Chapter 10: Behind the Scenes: Software Programming
Understanding Software Programming
The Life Cycle of an Information System
System Development Life Cycle
ETHICS IN IT: When Software Runs Amok
The Life Cycle of a Program
Describing the Problem: The Problem Statement
Making a Plan: Algorithm Development
Developing the Algorithm: Decision Making and Design
Top-Down Design
Object-Oriented Analysis
Writing Program Code
Coding: Speaking the Language of the Computer
What happens first when you write a program?
Dig Deeper: The Building Blocks of Programming Languages:
Syntax, Keywords, Data Types, and Operators
Coding Tools: Integrated Development Environments
Debugging: Getting Rid of Errors
Finishing the Project: Testing and Documentation
Programming Languages: Many Languages for Many Projects
Selecting the Right Language
Building Applications
Visual Basic
C and C++
Java and C#
Objective C
Building Web Applications
Scripting Languages for the Web
Flash and XML
Building Mobile Applications
The Next Great Language
TRENDS IN IT: Emerging Technologies: Unite All Your
Video Game Design Tools
Chapter 11: Behind the Scenes: Databases and Information Systems
Life Without Databases
Database Building Blocks
Advantages of Using Databases
Database Terminology
Records and Tables
Primary Keys
Database Types
Relational Databases
Object-Oriented Databases
Multidimensional Databases
Database Management Systems: Basic Operations
Creating Databases and Entering Data
Inputting Data
Data Validation
Viewing and Sorting Data
Dig Deeper: Structured Query Language (SQL)
Extracting or Querying Data
Outputting Data
Relational Database Operations
Normalization of Data
TRENDS IN IT: Computers in Society: User-Populated Databases
Data Storage
Data Warehouses
TRENDS IN IT: Emerging Technologies: Can Your Business Partner
Deliver the Goods? Enhanced Databases Can Help You Decide!
Populating Data Warehouses
Data Staging
Data Marts
Managing Data: Information and Business Intelligence Systems
Office Support Systems
Transaction-Processing Systems
Management Information Systems
Decision Support Systems
Internal and External Data Sources
Model Management Systems
Knowledge-Based Systems
Enterprise Resource Planning Systems
Data Mining
ETHICS IN IT: Data, Data Everywhere–But Is It Protected?
Chapter 12: Behind the Scenes: Networking and Security in the Business World
Networking Advantages
Client/Server Networks
Classifications of Client/Server Networks: LANs, WANs, MANs, and PANs
Print Servers
Application Servers
Database Servers
E-Mail Servers
Communications Servers
Web Servers and Cloud Servers
TRENDS IN IT: Virtualization: Making Servers Work Harder
Network Topologies
Bus Topology
Ring Topology
Star Topology
Comparing Topologies
Transmission Media
Wired Transmission Media
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Wireless Media Options
Comparing Transmission Media
Network Operating Systems
Network Adapters
Network Navigation Devices
MAC Addresses
Switches and Bridges
Network Security for Client/Server Networks
Access Privileges
Physical Protection Measures
Chapter 13: Behind the Scenes: How the Internet Works
The Management of the Internet
Internet Networking
Internet Networking
Connecting to the Internet
The Network Model of the Internet
Data Transmission and Protocols
Packett Switching
Internet Identity
IP Addresses
DIG DEEPER: Making the Connection-Connection-Oriented Versus Connectionless Protocols
Domain Names
HTTP, HTML, and Other Web Building Blocks
Web Browser Security Protocols
Common Gateway Interface
Dynamic HTML
Client-Side Applications
Communications over the Internet
ETHICS IN IT: Web Browsing: Not as Private as You May Think
E-Mail Security: Encryption and Specialized Software
Instant Messaging
TRENDS IN IT: Crowdsourcing: Harnessinf the Power of Social Networks
Voice over Internet Protocol (VoIP)
Read More Show Less

Customer Reviews

Average Rating 2.5
( 3 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 3 Customer Reviews
  • Anonymous

    Posted September 17, 2012

    A good idea

    but if you have an online class associated with the textbook you need an access code and no where does it say, for the rental or full book, that you will or will not get an access code. I found out the hard way that you don't receive an access code with the rental. If you don't need the access code, then its a great choice.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 21, 2013

    No text was provided for this review.

  • Anonymous

    Posted August 20, 2014

    No text was provided for this review.

Sort by: Showing all of 3 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)