Technology in Action, Introductory / Edition 10

Paperback (Print)
Rent
Rent from BN.com
$18.07
(Save 87%)
Est. Return Date: 11/15/2014
Buy Used
Buy Used from BN.com
$99.03
(Save 28%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $3.89
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (30) from $3.89   
  • New (7) from $75.97   
  • Used (23) from $3.89   

Overview

For introductory courses in computer concepts, digital literacy, or computer literacy, often including instruction in Microsoft Office.

Explore, discover, and experience technology with the completely revised and visually enhanced Technology in Action - the book that uses technology to teach technology!

The Tenth Edition of Technology in Action is an extensive revision that brings the content fully in line with 21st century technology and students. The content has been updated and revised, the structure has been finely tuned, Part breaks added at logical stopping points in each chapter, and Windows 8 coverage is included.

Read More Show Less

Product Details

  • ISBN-13: 9780133141023
  • Publisher: Prentice Hall
  • Publication date: 1/24/2013
  • Edition description: Older Edition
  • Edition number: 10
  • Pages: 464
  • Sales rank: 252,926
  • Product dimensions: 8.40 (w) x 10.70 (h) x 0.80 (d)

Meet the Author

Three professors from Montgomery County Community College traveled with the Prentice Hall Information Technology team for over two years to uncover what students and professors today wanted and needed in an Intro to Computer Concepts text. After meeting with more than 1,000 students and instructors they developed Technology in Action. Due to overwhelming success, they recently published Technology in Action 10/e!

Alan D. Evans, M.S., CPA

Alan Evans is currently a faculty member at Moore College of Art and Design and Montgomery County Community College teaching a variety of computer science and business courses. He holds a B.S. in Accounting from Rider University and an M.S. in Information Systems from Drexel University, and he is a certified public accountant. After a successful career in business, Alan finally realized his true calling was education. He has been teaching at the college level since 2000. Alan enjoys giving presentations at technical conferences and meets regularly with computer science faculty and administrators from other colleges to discuss curriculum development and new methods of engaging students.

Kendall E. Martin, Ph.D.
Kendall has been teaching since 1988 at a number of institutions, including Villanova University, DeSales University, Arcadia University, Ursinus College, County College of Morris, and Montgomery County Community College, at both the undergraduate and master’s degree level. Kendall’s education includes a B.S. in Electrical Engineering from the University of Rochester and an M.S. and Ph.D. in Engineering from the University of Pennsylvania. She has industrial experience in research and development environments (AT&T Bell Laboratories) as well as experience from several start-up technology firms. At Ursinus College, Kendall developed a successful faculty training program for distance education instructors, and she makes conference presentations during the year.

Mary Anne Poatsy, MBA, CFP
Mary Anne is an adjunct faculty member at Montgomery County Community College, teaching various computer application and concepts courses in face-to-face and online environments. Mary Anne holds a B.A. in Psychology and Elementary Education from Mount Holyoke College and an MBA in Finance from Northwestern University’s Kellogg Graduate School of Management. Mary Anne has more than nine years of educational experience, ranging from elementary and secondary education to Montgomery County Community College, Muhlenberg College, and Bucks County Community College, as well as training in the professional environment. Prior to teaching, Mary Anne was a vice president at Shearson Lehman Hutton in the Municipal Bond Investment Banking department.

Read More Show Less

Table of Contents

Contents

Chapter 1

Using Technology to Change the World

How Will You Put Technology in Action?

Technology on the World Stage

Political Issues

Other Global Issues

Technology and Our Society

Technology Impacts How We Think

Technology Impacts How We Connect

Technology Impacts How We Consume

Try This: Skyping Around the World

How Will Technology Improve Your Life?

Technology at Home

Technology and Your Career

Retail: Working in a Data Mine

Arts: Ink, Paints, and a Laptop?

Education: Teaching and Learning

Law Enforcement: Put Down That Mouse—You’re Under Arrest!

Medicine: The Chip Within

DIG DEEPER: Making Reality Even More Real

Science: Simulating Reality

Psychology: You Should Smile Now

Chapter 2

Looking at Computers: Understanding the Parts

Understanding Digital Components

Understanding Your Computer

Computers Are Data Processing Devices

Bits and Bytes: The Language of Computers

Types of Computers

Input Devices

Keyboards

Mice and Other Pointing Devices

Touch Screens

Image Input

DIG DEEPER: How Touch Screens Work

Sound Input

Ethics in IT: What Is Ethical Computing?

Output Devices

Monitors

Printers

Sound Output

Try This: What’s Inside My Computer?

Processing, Storage, and Connectivity

Processing and Memory on the Motherboard

Memory

Processing

Storing Data and Information

Hard Drives

Flash Storage

Optical Storage

Connecting Peripherals to the Computer

High-Speed and Data Transfer Ports

Connectivity and Multimedia Ports

Adding Ports: Expansion Cards and Hubs

Power Controls

Setting It All Up

TRENDS in IT: Innovations in Printing

Chapter 3

Using the Internet: Making the Most of the Web’s Resources

Working and Playing on the Web

The Internet and How It Works

The Origin of the Internet

How the Internet Works

Communicating and Collaborating on the Web

Social Networking

E-Mail

Instant Messaging

Wikis

Blogs

Podcasts and Webcasts

Web Entertainment

Conducting Business Over the Internet: E-commerce

E-commerce Safeguards

Try This: Create a SkyDrive Account and Store and Share Your

Files in the Cloud

Using the Web Effectively

Accessing and Moving Around the Web

Web Browsers

URLs, Protocols, and Domain Names

Hyperlinks and Beyond

Favorites, Live Bookmarks, and Tagging

DIG DEEPER: Discovering the Semantic Web

TRENDS in IT: Doing Business on a Shoestring—Thanks to the Internet

Searching the Web Effectively

Using Search Engines Effectively

Evaluating Websites

Ethics in IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet?

Technology in Focus

The History of the Personal Computer

Chapter 4

Application Software: Programs That Let You Work and Play

Programs That Let You Work

The Nuts and Bolts of Software

TRENDS in IT: Mobile Commerce: What Have You Bought with Your Phone Lately?

Productivity and Business Software

Buying Productivity Software

Word Processing Software

Spreadsheet Software

Presentation Software

Database Software

Note-Taking Software

Personal Information Manager Software

Microsoft Office Productivity Software Features

Personal Financial Software

Small Business Software

Software for Large and Specialized Businesses

Try This: Citing Website Sources

Programs That Let You Play

Multimedia and Entertainment Software

Digital Image- and Video-Editing Software

Digital Audio Software

Media Management Software

DIG DEEPER: How Cloud Computing Works

Gaming Software

Educational and Reference Software

Drawing Software

Managing Your Software

Getting Software

Software Licenses

Getting the Right Software for Your System

Installing and Uninstalling Software

Ethics in IT: Can I Borrow Software That I Don’t Own?

Chapter 5

System Software: The Operating System, Utility Programs, and File Management

Understanding System Software

Operating System Fundamentals

Real-Time Operating Systems

Operating Systems for Networks, Servers, and Mainframes

Operating Systems for Mobile Devices

Operating Systems for Personal Computers

What the Operating System Does

The User Interface

Processor Management

Memory and Storage Management

Ethics in IT: Sugar: The Sweet OS for Every Child

Hardware and Peripheral Device Management

Software Application Coordination

The Boot Process: Starting Your Computer

Step 1: Activating BIOS

Step 2: Performing the Power-On Self-Test

Step 3: Loading the OS

Step 4: Checking Further Configurations and Customizations 1

Handling Errors in the Boot Process

Try This: Adding Icons to the Start Screen in Windows 8

Using System Software

The Windows Interface

TRENDS in IT: Open Source Software: Why Isn’t Everyone Using Linux?

Organizing Your Computer: File Management

Organizing Your Files

Viewing and Sorting Files and Folders

Naming Files

Working with Files

Utility Programs

Display Utilities

The Programs and Features Utility

File Compression Utilities

System Maintenance Utilities

System Restore and Backup Utilities

DIG DEEPER: How Disk Defragmenter Utilities Work

Accessibility Utilities

Technology in Focus

Information Technology Ethics

Chapter 6

Understanding and Assessing Hardware: Evaluating Your System

Evaluating Key Subsystems

Your Ideal Computer

Evaluating the CPU Subsystem

How the CPU Works

CPU Factors

Measuring the CPU

Evaluating the Memory Subsystem

The RAM in Your System

Adding RAM

Evaluating the Storage Subsystem

Mechanical Hard Drives

Solid State Drives

DIG DEEPER: How a Mechanical Hard Drive Works

Optical Drives

Your Storage Capacity and Needs

Try This: Measure Your System Performance

Evaluating Other Subsystems and Making a Decision

Evaluating the Video Subsystem

Video Cards

TRENDS in IT: Thunderbolt: The New Standard for Data Transfer

Evaluating the Audio Subsystem

Evaluating System Reliability

Making a Final Decision

Getting Rid of Your Old Computer

Ethics in IT: Free Hardware for All

Chapter 7

Networking: Connecting Computing Devices

How Networks Function

Networking Fundamentals

Network Architectures

Network Architectures Defined by Distance

Network Architectures Defined by Levels of Administration

Ethernet Protocols

Network Components

Transmission Media

Basic Network Hardware

Network Software

Connecting to the Internet

Wired Broadband Internet Connections

Wireless Internet Access

Dial-Up Connections

Try This: Testing Your Wired and Wireless Internet Connection Speeds

Your Home Network

Installing and Configuring Home Networks

Planning Your Home Network

Connecting Devices to a Router

Network-Attached Storage Devices

TRENDS in IT: Where Should You Store Your Files? The Cloud Is Calling!

Home Network Servers

Digital Entertainment Devices on a Network

Specialized Home-Networking Devices

Configuring Software for Your Home Network

Troubleshooting Wireless Network Problems

Ethics in IT: Sharing Your Internet Connection with Your Neighbors: Legal? Ethical? Safe?

Securing Wireless Networks

Technology in Focus

Under the Hood

Chapter 8

Digital Devices and Media: Managing a Digital Lifestyle

Mobile Devices

Digital Convergence

Telephony: Smartphones and Beyond

Smartphone Basics

Smartphone Components

How Cell Phone Technology Works

Synchronizing

Text Messaging

Mobile Internet

Smartphone Security

VoIP

Smartphone GPS

TRENDS in IT: NFC Chips: Do You Have a Digital Wallet?

Tablets, Netbooks, and Ultrabooks

Tablets

Netbooks

Ultrabooks

Making a Choice

Try This: Creating and Publishing a Movie

The Digital Information Age

Digital Defined

Digital Media

Digital Publishing

Digital Music

DIG DEEPER: The Shift to Digital Music: A Bumpy Ride

Digital Photography

Digital Video

Ethics in IT: Managing Your Copyrights: Copyleft Might Simplify Your Life

Chapter 9

Securing Your System: Protecting Your Digital Data and Devices

Major Threats to Your Digital Asset

Cybercrime and Identity Theft

Computer Viruses

Catching a Virus

Boot-Sector Viruses

Logic Bombs and Time Bombs

Worms

Script and Macro Viruses

E-Mail Viruses

Encryption Viruses

Additional Virus Classifications

Virus Symptoms

Preventing Virus Infections

Antivirus Software

Software Updates

Understanding Hackers

Problems Hackers Can Cause

Trojan Horses and Rootkits

Denial-of-Service Attacks

How Hackers Gain Computer Access

Restricting Access to Your Digital Assets

Firewalls

Types of Firewalls

How Firewalls Work

Knowing Your Computer Is Secure

Password Protection and Password Management

Creating Passwords

Managing Your Passwords

Anonymous Web Surfing: Hiding from Prying Eyes

Biometric Authentication Devices

Try This: Testing Your Network Security

Protecting Your Digital Property from Yourself

Managing Online Annoyances

Malware: Adware and Spyware

Ethics in IT: You’re Being Watched … But Are You Aware You’re Being Watched?

Spam

Cookies

DIG DEEPER: Computer Forensics: How It Works

Keeping Your Data Safe

Protecting Your Personal Information

Backing Up Your Data

Social Engineering

Phishing and Pharming

Scareware

TRENDS in IT: Computers in Society: Spear Phishing: The Bane of Data Breaches

Protecting Your Physical Computing Assets

Environmental Factors

Power Surges

Deterring Theft

Keep Them Safe: Alarms

Keeping Mobile Device Data Secure

Software Alerts and Data Wipes

Technology in Focus

Careers in IT

Glossary

Index

Read More Show Less

Customer Reviews

Average Rating 1
( 2 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(2)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)