Documente Academic
Documente Profesional
Documente Cultură
2
2
Lesson 1A:
Exploring Computers and Their Uses Overview: Computers in Our World The Computer Defined Computers for Individual Users Desktop Computers Workstations Notebook Computers Tablet PCs Handheld PCs Smart Phones Computers for Organizations Network Servers Mainframe Computers Minicomputers Supercomputers Computers in Society Productivity Tip: Choosing the Right Tool for the Job Why Are Computers So Important? Home Education Small Business Industry Government Health Care Norton Notebook: The Merging of Media and Meaning Lesson 1A Review 3 3 4 5 5 6 6 7 7 7 8 8 9 10 10 11 12 12 14 15 15 16 17 18 18 20
Data Users The Information Processing Cycle Essential Computer Hardware Processing Devices Memory Devices
Random Access Memory Read-Only Memory
25 26 26 27 28 29
29 29
30 31
31 32
Software Brings the Machine to Life System Software Application Software Computer Data At Issue: Computerized Disease Management Computer Users The Users Role Userless Computers Computers In Your Career: Using Computers Outside of the IT Industry Lesson 1B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
32 33 33 34 36 38 38 39 40 42 46 46 47 47 47
48
48
Lesson 1B:
Looking Inside the Computer System Overview: Dissecting the Ultimate Machine The Parts of a Computer System Hardware Software 24 24 25 25 25
Lesson 2A:
Using the Keyboard and Mouse Overview: The Keyboard and Mouse The Keyboard The Standard Keyboard Layout
The Alphanumeric Keys The Modifier Keys
49 49 50 50
50 50
xi
The Numeric Keypad The Function Keys The Cursor-Movement Keys Special-Purpose Keys
51 51 52 52
84 85 85 85
How the Computer Accepts Input from the Keyboard The Mouse Using the Mouse Mouse Button Configurations Variants of the Mouse Trackballs Trackpads Pointers in the Keyboard Productivity Tip: Saving Time With Keyboard Shortcuts Ergonomics and Input Devices Repetitive Stress Injuries Avoiding Keyboard-Related Injuries At Issue: Computer VotingIs It a Good Thing? Lesson 2A Review
53 54 56 58 58 58 59 59 60 60 61 62 62 65
86
86
Lesson 3A:
Video and Sound Overview: Reaching Our Senses with Sight and Sound Monitors CRT Monitors Flat-Panel Monitors Other Types of Monitors Comparing Monitors
Size Resolution Refresh Rate Dot Pitch
87 87 88 89 90 92 93
94 94 95 96
Lesson 2B:
Inputting Data in Other Ways Overview: Options for Every Need and Preference Devices for the Hand Pens Touch Screens Game Controllers Optical Input Devices Bar Code Readers Image Scanners and Optical Character Recognition (OCR) Norton Notebook: Speech Recognition Audiovisual Input Devices Microphones Other Types of Audio Input Video Input Digital Cameras Computers In Your Career: Hardware Technician Lesson 2B Review Chapter Skills Review
xii Contents
68 68 69 69 70 70 71 71 72 74 74 74 76 77 77 78 80 84
Video Cards Ergonomics and Monitors Eyestrain Norton Notebook: Flat Video Is Anything But Electromagnetic Fields Data Projectors Sound Systems Sound Cards Headphones and Headsets At Issue: Call of the Wild: Bioaccoustic Research Lesson 3A Review
Lesson 3B:
Printing Overview: Putting Digital Content in Your Hands Commonly Used Printers Dot Matrix Printers Ink Jet Printers Laser Printers All-in-One Peripherals 107 107 108 108 110 111 112
Comparing Printers High-Quality Printers Photo Printers Productivity Tip: The Care and Feeding of Printers Thermal-Wax Printers Dye-Sublimation Printers Plotters Computers In Your Career: Computer Training Specialist Lesson 3B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
112 113 113 114 114 115 116 116 118 122 122 123 123 123
136 136
136 137 137
Cache Memory Productivity Tip: Do You Need More RAM? Lesson 4A Review
Lesson 4B:
Modern CPUs Overview: The Race for the Desktop A Look inside the Processor Microcomputer Processors Intel Processors Advanced Micro Devices (AMD) Processors Freescale Processors IBM Processors Comparing Processors Norton Notebook: What Is a Computer Chip? RISC Processors Parallel Processing Extending the Processors Power to Other Devices Standard Computer Ports Serial and Parallel Ports Specialized Expansion Ports
SCSI USB IEEE 1394 (FireWire) Musical Instrument Digital Interface (MIDI)
146 146 147 147 148 148 149 149 150 150 151 151 152 152 153 154
154 154 155 155
124
124
Lesson 4A:
Transforming Data into Information Overview: The Difference between Data and Information How Computers Represent Data Number Systems Bits and Bytes Text Codes How Computers Process Data The CPU
The Control Unit The Arithmetic Logic Unit
Expansion Slots and Boards Computers In Your Career: Computer Sales Professional
PC Cards Plug and Play
155 156
156 157
130 131
132 132 132
Lesson 4B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
Contents
Factors Affecting Processing Speed 133 Registers 133 At Issue: Cyborgs Among Us: Wearable Technology 134 Memory and Computing Power 134
164
164
Lesson 5A:
Types of Storage Devices Overview: An Ever-Growing Need Categorizing Storage Devices Magnetic Storage Devices How Data Is Stored on a Disk How Data Is Organized on a Magnetic Disk
Tracks and Sectors
At Issue: Digital Student Portfolios Drive-Interface Standards Enhanced Integrated Drive Electronics (EIDE) Small Computer System Interface (SCSI) USB and FireWire Computers In Your Career: Careers in Outsourcing Lesson 5B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
192 192 193 193 194 194 196 200 200 201 202 202
How the Operating System Finds Data on a Disk Diskettes (Floppy Disks) Hard Disks Removable High-Capacity Magnetic Disks Tape Drives Productivity Tip: Backing Up Your Data Optical Storage Devices CD-ROM DVD-ROM Recordable Optical Technologies Solid-State Storage Devices Flash Memory Norton Notebook: Looking Back, Moving Forward Smart Cards Solid-State Disks Lesson 5A Review
170 171 173 173 174 174 175 176 177 178 179 179 180 180 182 183
204
204
Lesson 6A:
Operating System Basics Overview: The Purpose of Operating Systems Types of Operating Systems Real-Time Operating Systems Single-User/Single-Tasking Operating Systems Single-User/Multitasking Operating Systems Multi-User/Multitasking Operating Systems Providing a User Interface Graphical User Interfaces Command-Line Interfaces Running Programs Sharing Information Productivity Tip: Do-It-Yourself Tech Support Managing Hardware Processing Interrupts Working with Device Drivers Enhancing an OS with Utility Software Backup Utilities Antivirus Firewall Intrusion Detection Screen Savers 205 205 206 206 206 206 207 208 208 211 212 213 214 215 216 216 216 217 217 217 217 217
Lesson 5B:
Measuring and Improving Drive Performance Overview: The Need for Speed Average Access Time Data Transfer Rate Optimizing Disk Performance Cleaning Up Unneeded Files Scanning a Disk for Errors Defragmenting a Disk File Compression 187 187 188 188 189 189 190 190 190
xiv
Contents
218 220
Lesson 6B:
Survey of PC and Network Operating Systems Overview: Operating Systems Yesterday and Today PC Operating Systems DOS Windows NT Workstation Windows 9x Windows 2000 Professional Windows XP The Macintosh Operating System UNIX for the Desktop Linux for the Desktop At Issue: Controlling Computers with the Mind Network Operating Systems Windows NT Server Windows 2000 Server Windows Server 2003 Novell NetWare UNIX for Servers Linux for Servers Embedded Operating Systems Computers In Your Career: Help Desk and Technical Support Specialists Lesson 6B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues 224 224 225 225 225 226 228 228 229 229 229 230 230 231 232 232 232 233 233 233 234 236 240 240 241 241 241
Overview: Sharing Data Anywhere, Anytime The Uses of a Network Simultaneous Access Shared Peripheral Devices Personal Communications Easier Data Backup Common Types of Networks Local Area Networks (LANs) Wide Area Networks (WANs) Hybrid Networks Campus Area Networks (CANs) Metropolitan Area Networks (MANs) Home Area Networks (HANs) Intranets and Extranets How Networks Are Structured Server-Based Networks Client/Server Networks Peer-to-Peer Networks At Issue: Catching Cyberslackers on the Job Network Topologies and Protocols Network Media
Wire-Based Media Wireless Media
243 244 244 245 246 247 248 248 248 248 249 249 249 249 250 250 250 251 252 253 255
255 256
Network Hardware
Network Interface Cards (NICs) Network Linking Devices Cabling Equipment
256
256 256 258
260
261
Lesson 7A Review
263
Lesson 7B:
Data Communications Overview: The Local and Global Reach of Networks Data Communications with Standard Telephone Lines and Modems Modems Uses for a Modem Productivity Tip: The Telecommuters Checklist Using Digital Data Connections Broadband Connections
Contents
242
242
Lesson 7A:
Networking Basics 243
Wireless Networks Wireless: 802.11 Wireless Access Point Wireless Adapter Computers In Your Career: Careers in Networking Lesson 7B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
274 275 275 275 276 278 282 282 283 283 283
Getting Help with Your Browser Searching the Web Using a Directory Using a Search Engine
Using Boolean Operators in Your Searches Using Advanced Search Options
Productivity Tip: Evaluating the Reliability of Search Results and Web Sites Using a Metasearch Engine Sponsored versus Nonsponsored Links Using Site-Specific Search Tools Lesson 8A Review
Lesson 8B:
E-Mail and Other Internet Services Overview: Communicating Through the Internet Using E-Mail Understanding E-Mail
E-Mail Addresses Listserv Systems
284
284
Lesson 8A:
The Internet and the World Wide Web Overview: What Is the Internet? The Internets History The Beginning: A Network of Networks Today: Still Growing The Internets Major Services Understanding the World Wide Web How the Web Works Web Browsers and HTML Tags URLs Helper Applications and Multimedia Content Norton Notebook: Internet Time Travel: The Wayback Machine Using Your Browser and the World Wide Web Launching Your Browser Navigating the Web
Using URLs Using Hyperlinks Using the Browsers Navigation Tools
Using an E-Mail Program 285 285 286 286 287 288 288 289 290 291 292 294 295 296 296
296 297 298 Creating a Message Receiving and Reading a Message
314
314 315
At Issue: Stomping Out Spam Using Web-Based E-Mail Services More Features of the Internet News FTP Internet Relay Chat (IRC) and Web-Based Chat Instant Messaging Online Services Peer-to-Peer Services Computers In Your Career: Documentation and Online Help System Designer Lesson 8B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
316 317 317 317 319 320 321 321 322 322 324 328 328 329 329 329
298
330
330
Security Lesson 9B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
Lesson 9A:
Connecting to the Internet Overview: Joining the Internet Phenomenon Connecting to the Internet through Wires Dial-up Connections High-Speed Broadband Connections
Integrated Services Digital Network (IDSN) Service Digital Subscriber Line (DSL) Services Cable Modem Service
362
362
Lesson 10A:
Productivity Software Overview: Software to Accomplish the Work of Life Acquiring Software Commercial Software Freeware and Public Domain Software Open-Source Software Word Processing Programs The Word Processors Interface Entering and Editing Text Formatting Text Spreadsheet Programs The Spreadsheets Interface Entering Data in a Worksheet Presentation Programs At Issue: Who Really Owns the Software on Your PC? The Presentation Programs Interface Creating a Presentation Presenting Slide Shows Productivity Tip: Automating Your Work with Macros Personal Information Managers Lesson 10A Review 363 363 364 364 364 365 365 366 366 367 368 368 369 371 372 372 374 375 376 376 379
How PC Applications Access the Internet Connecting to the Internet Wirelessly Wireless WAN (WWAN) Connections At Issue: On the Beat with Techno-Cops Satellite Services WLAN Connections Productivity Tip: Sharing an Internet Connection Lesson 9A Review
Lesson 9B:
Doing Business in the Online World Overview: Commerce on the World Wide Web E-Commerce at the Consumer Level Online Shopping
Online Stores versus Physical Locations Using Online Catalogs Paying for Purchases Getting Customer Service
349
350 350
E-Commerce at the Business Level Business-to-Business (B2B) Transactions Intranets and Extranets Norton Notebook: Business, the Internet and Everything Telecommuters Computers In Your Career: Career Opportunities and the Internet
Lesson 10B:
Graphics and Multimedia Overview: Graphics, Graphics Everywhere Understanding Graphics File Formats
Contents
Bitmap and Vector Graphics File Formats and Compatibility Issues Getting Images into Your Computer Graphics Software Paint Programs Draw Programs Photo-Editing Programs Computer-Aided Design Programs 3-D and Animation Software Norton Notebook: Why Own When You Can Rent? Multimedia Basics Computers In Your Career: Careers in Multimedia Lesson 10B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
384 384 386 386 387 387 387 388 389 390 390 392 394 397 397 397 398 398
At Issue: Play Ball! Baseball Enters the Information Age Lesson 11A Review
414 416
Lesson 11B:
Survey of Database Systems Overview: When Applications Grow Huge Enterprise Software Meeting the Needs of Many Users Databases at Work Databases in Business Databases on the Internet Databases for Individuals Productivity Tip: Database Macros Common Corporate Database Management Systems Oracle DB2 SQL Server MySQL Computers In Your Career: Database Careers Lesson 11B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues 420 420 421 421 423 423 425 425 426 428 428 429 429 429 430 432 436 436 436 437 437
400
400
Lesson 11A:
Database Management Systems Overview: The Mother of All Computer Applications Databases and Database Management Systems The Database
Flat-File and Relational Database Structures
The DBMS Norton Notebook: Data Warehouses Working with a Database Creating Database Tables
Understanding Field Types Entering Data in a Table
438
438
Lesson 12A:
Creating Computer Programs Overview: What Is a Computer Program? What Is a Computer Program? Hardware/Software Interaction Code Machine Code Programming Languages 439 439 440 441 441 442 442
xviii
Contents
Compilers and Interpreters Planning a Computer Program How Programs Solve Problems Program Control Flow Algorithms Heuristics Productivity Tip: Finding Faster Algorithms Structured and Object-Oriented Programming Programming Structures At Issue: Hot and Oh-So-Cool: Technology Forecasts the Weather Object-Oriented Programming Lesson 12A Review
443 444 445 445 445 446 448 448 449 450 450 452
Chapter Contents
476
Lesson 13A:
Understanding the Need for Security Measures Overview: The Need for Computer Security Basic Security Concepts Threats Degrees of Harm Countermeasures Threats to Users Identity Theft Loss of Privacy
Public Records on the Internet Internet Monitoring, Profiling, and Spying
Lesson 12B:
Programming Languages and the Programming Process Overview: The Keys to Successful Programming The Evolution of Programming Languages Categories of Programming Languages Machine and Assembly Languages Higher-Level Languages
Third-Generation Languages Fourth-Generation Languages Fifth-Generation Languages
481
481 482 482
World Wide Web Development Languages Scripting Languages The Systems Development Life Cycle for Programming Norton Notebook: Artificial Intelligence: Will Computers Ever Think? Computers In Your Career: Careers in Programming Lesson 12B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues
461 464 465 466 468 470 474 474 475 475 475
Spam Computer-Related Injuries Threats to Hardware Power-Related Threats Theft and Vandalism Natural Disasters Productivity Tip: Keeping Your PC Up to Date Threats to Data Malware, Viruses, and Malicious Programs Cybercrime
Hacking Common Hacking Methods
483 484 484 485 485 486 486 488 488 488
489 489
Lesson 13B:
Taking Protective Measures Overview: Keeping Your System Safe Protecting Yourself Avoiding Identity Theft
Managing Your Papers Guarding Personal Information Contents
CHAPTER 13:: Protecting Your Privacy, Your Computer, and Your Data 476
499
Lesson 13B Review Chapter Skills Review Chapter Labs Discussion Questions Research and Report Ethical Issues Appendix A: Creating Your Own Web Page Appendix B: Buying Your First Computer Appendix C: Computer Viruses Appendix D: History of Microcomputers Appendix E: Self-Check Answers Glossary Photo Credits Index
512 516 516 516 517 517 518 526 532 538 558 559 591 593
499
499 500
501
501 502
Evading Spam Keeping Your Data Secure Restricting Access to Your System
Limiting Physical Access Using a Firewall
Backing Up Data Norton Notebook: Nexus: Converging Technologies Safeguarding Your Hardware Using Automated Warnings Handling Storage Media Storing Computer Equipment Keeping Your Computer Clean Computers In Your Career: Computer Scientist
xx
Contents