Chapter 1: Using Technology to Change the World |
More Than Just a Job |
Technology on the World Stage |
Political Issues |
Human Rights |
The Environment |
The Digital Divide |
ETHICS IN IT: The Digital Divide and the Mobile Bridge |
Technology and Our Society |
Technology Impacts How We Think |
How We Connect |
How We Consume |
Technology and Your Life |
Boost Your Productivity |
Be a Savvy Computer User |
Prepare for Your Career |
Dig Deeper: Making Reality Even More Real |
Technology In focus: The History of the PC |
Chapter 2: Looking at Computers: Understanding the Parts |
Understanding Your Computer |
Computers Are Data Processing Devices |
Bits and Bytes: The Language of Computers |
Types of Computers |
Input Devices |
Keyboards |
Mice and Other Pointing Devices |
Touch Screens |
Image Input |
Sound Input |
ETHICS IN IT: What Is Ethical Computing? |
Output Devices |
Monitors |
Printers |
Dig Deeper: How Touch Screens Work |
Sound Output |
Processing and Memory on the Motherboard |
Memory |
Processing |
Storing Data and Information |
Hard Drives |
Flash Storage |
Optical Storage |
Connecting Peripherals to the Computer |
High-Speed and Data Transfer Ports |
Connectivity and Multimedia Ports |
Adding Ports: Expansion Cards and Hubs |
Power Controls |
Setting It All Up |
TRENDS IN IT: Innovations in Printing |
Chapter 3: Using the Internet: Making the Most of the Web’s Resources |
The Origin of the Internet |
The Internet and How It Works |
Communicating and Collaborating Through the Internet |
Social Networking |
E-Mail |
Instant Messaging |
Weblogs (Blogs) and Video Logs (Vlogs) |
Wikis |
Podcasts and Webcasts |
Web Entertainment |
TRENDS IN IT: The Internet Makes Business Startups Affordable |
Conducting Business over the Internet: E-Commerce |
E-Commerce Safeguards |
Accessing the Web: Web Browsers |
Getting Around the Web: URLs, Hyperlinks, and Other Tools |
URLs |
Hyperlinks and Beyond |
Favorites, Live Bookmarks, and Tagging |
Searching the Web Effectively |
Search Engines |
Evaluating Web Sites |
ETHICS IN IT: Plagiarism and Copyright Violation: What Can You Borrow from the Internet? |
Dig Deeper: Discovering the Semantic Web |
Technology In focus: Information Technology Ethics |
Chapter 4: Application Software: Programs That Let You Work and Play |
The Nuts and Bolts of Software |
Web-Based Applications |
Productivity Software for Home and Office |
Word Processing Software |
Spreadsheet Software |
Presentation Software |
Database Software |
Note Taking Software |
Personal Information Manager (PIM) Software |
Productivity Software Features |
Software Suites |
Personal Financial Software |
Business Software for Home and Office |
Home Business Software |
Large Business Software |
Specialized Business Software |
Media Software for Home |
Digital Image Editing Software |
Digital Audio Software |
Dig Deeper: How Cloud Computing Works |
Digital Video Editing Software |
Media Management Software |
Software for Home |
Gaming Software |
Educational Software |
Drawing Software |
TRENDS IN IT: “There’s an App for That!” |
Buying Software |
Software Licenses |
ETHICS IN IT: Can I Borrow Software That I Don’t Own? |
Pre-Installed Software |
Discounted Software |
Freeware and Shareware |
Software Versions and System Requirements |
Installing, Uninstalling, and Starting Software |
Getting Help with Software |
|
Chapter 5: Using System Software: The Operating System, Utility Programs, and File Management |
System Software Basics |
Types of Operating Systems |
Real-Time Operating Systems |
Operating Systems for Networks, Servers, and Mainframes |
Operating Systems for Mobile Devices |
Operating Systems for Personal Computers |
What the Operating System Does |
The User Interface |
TRENDS IN IT: Open Source Software: Why Isn’t Everyone Using Linux? |
Processor Management |
ETHICS IN IT: Sugar: The Sweet OS for Every Child |
Memory and Storage Management |
Hardware and Peripheral Device Management |
Software Application Coordination |
The Boot Process: Starting Your Computer |
Step : Activating BIOS |
Step : Performing the Power-On Self-Test |
Step : Loading the Operating System |
Step : Checking Further Configurations and Customizations |
Handling Errors in the Boot Process |
The Desktop and Window Features |
Organizing Your Computer: File Management |
Organizing Your Files |
Viewing and Sorting Files and Folders |
Naming Files |
Working with Files |
Utility Programs |
Display Utilities |
The Programs and Features Utility |
File Compression Utilities |
System Maintenance Utilities |
System Restore and Backup Utilities |
Dig Deeper: How Disk Defragmenter Utilities Work |
The Task Scheduler Utility |
Accessibility Utilities |
Technology In focus: Computing Alternatives |
|
Chapter 6: Understanding and Assessing Hardware: Evaluating Your System |
Your Ideal Computer |
Evaluating the CPU Subsystem |
Evaluating the Memory Subsystem: RAM |
Adding RAM |
Evaluating the Storage Subsystem |
Hard Drive |
Optical Storage |
Dig Deeper: How a Mechanical Hard Drive Works |
Evaluating the Video Subsystem |
Video Cards |
Evaluating the Audio Subsystem |
Sound Card |
Evaluating System Reliability |
ETHICS IN IT: Free (as in Speech, not Beer) |
Making the Final Decision |
TRENDS IN IT: Thunderbolt |
|
Chapter 7: Networking: Connecting Computing Devices |
Networking Fundamentals |
Network Architectures |
Describing Networks Based on Network Administration |
Describing Networks Based on Distance |
Network Components |
Transmission Media |
Network Adapters |
ETHICS IN IT: Sharing Your Internet Connection with Your Neighbors: Legal? |
Ethical? Safe? |
Network Navigation Devices |
Networking Software |
Connecting to the Internet |
Broadband Connections |
Dial-Up Connections |
Choosing the Right Internet Connection Option |
Home Networks |
Ethernet Home Networks |
Home Network Cabling |
Wired and Wireless on One Network |
Configuring Home Network Equipment |
Routers and Switches: Moving Data Around Your Network |
Connecting Devices to Routers |
Securing Wireless Networks |
Connecting Devices to Networks |
Connecting Computers |
Network-Ready Devices |
Digital Entertainment Devices on a Network |
Specialized Home Networking Devices |
Configuring Software for Your Home Network |
Windows Configuration |
TRENDS IN IT: Where Should You Stone Your Files? The Cloud is Calling |
Wireless Node Configuration and Testing |
Troubleshooting Network Problems |
Technology In focus: Under the Hood |
|
Chapter 8: Digital Lifestyle: Managing Digital Data and Devices |
A Digital Lifestyle |
Digital Telephony |
Cell Phones and Smartphones |
How Cellular Works |
Cell Phone Components |
Synchronizing |
Text Messaging |
Mobile Internet |
Cell Phone/Smartphone Security |
Voice over Internet Protocol |
Digital Media and Information |
Digital Publishing |
Digital Music |
Digital Photography |
Digital Video |
ETHICS IN IT: Managing Your Copyrights: Copyleft Might Simplify Your Life |
Digital Navigation |
Digital Convergence |
TRENDS IN IT: Near Field Communication |
|
Chapter 9: Securing Your System: Protecting Your Digital Data and Devices |
Cybercrime |
Computer Threats: Computer Viruses |
Types of Viruses |
Virus Classifications |
Computer Safeguard: Antivirus Software and Software Updates |
Computer Threats: Hackers |
Restricting Access to Your Digital Assets |
Dig Deeper: Computer Forensics: How It Works |
Managing Online Annoyances |
Protecting Yourself from Yourself! |
Protecting Your Physical Computing Assets |
Technology In focus: Careers in IT |
|
Chapter 10: Behind the Scenes: Software Programming |
Understanding Software Programming |
The Life Cycle of an Information System |
System Development Life Cycle |
ETHICS IN IT: When Software Runs Amok |
The Life Cycle of a Program |
Describing the Problem: The Problem Statement |
Making a Plan: Algorithm Development |
Developing the Algorithm: Decision Making and Design |
Top-Down Design |
Object-Oriented Analysis |
Writing Program Code |
Coding: Speaking the Language of the Computer |
What happens first when you write a program? |
Dig Deeper: The Building Blocks of Programming Languages: |
Syntax, Keywords, Data Types, and Operators |
Compilation |
Coding Tools: Integrated Development Environments |
Debugging: Getting Rid of Errors |
Finishing the Project: Testing and Documentation |
Programming Languages: Many Languages for Many Projects |
Selecting the Right Language |
Building Applications |
Visual Basic |
C and C++ |
Java and C# |
Objective C |
Building Web Applications |
Scripting Languages for the Web |
ASP, JSP, and PHP |
Flash and XML |
Building Mobile Applications |
The Next Great Language |
TRENDS IN IT: Emerging Technologies: Unite All Your |
Video Game Design Tools |
|
Chapter 11: Behind the Scenes: Databases and Information Systems |
Life Without Databases |
Database Building Blocks |
Advantages of Using Databases |
Database Terminology |
Fields |
Records and Tables |
Primary Keys |
Database Types |
Relational Databases |
Object-Oriented Databases |
Multidimensional Databases |
Database Management Systems: Basic Operations |
Creating Databases and Entering Data |
Inputting Data |
Data Validation |
Viewing and Sorting Data |
Dig Deeper: Structured Query Language (SQL) |
Extracting or Querying Data |
Outputting Data |
Relational Database Operations |
Normalization of Data |
TRENDS IN IT: Computers in Society: User-Populated Databases |
Data Storage |
Data Warehouses |
TRENDS IN IT: Emerging Technologies: Can Your Business Partner |
Deliver the Goods? Enhanced Databases Can Help You Decide! |
Populating Data Warehouses |
Data Staging |
Data Marts |
Managing Data: Information and Business Intelligence Systems |
Office Support Systems |
Transaction-Processing Systems |
Management Information Systems |
Decision Support Systems |
Internal and External Data Sources |
Model Management Systems |
Knowledge-Based Systems |
Enterprise Resource Planning Systems |
Data Mining |
ETHICS IN IT: Data, Data Everywhere–But Is It Protected? |
|
Chapter 12: Behind the Scenes: Networking and Security in the Business World |
Networking Advantages |
Client/Server Networks |
Classifications of Client/Server Networks: LANs, WANs, MANs, and PANs |
Servers |
Print Servers |
Application Servers |
Database Servers |
E-Mail Servers |
Communications Servers |
Web Servers and Cloud Servers |
TRENDS IN IT: Virtualization: Making Servers Work Harder |
Network Topologies |
Bus Topology |
Ring Topology |
Star Topology |
Comparing Topologies |
Transmission Media |
Wired Transmission Media |
Twisted-Pair Cable |
Coaxial Cable |
Fiber-Optic Cable |
Wireless Media Options |
Comparing Transmission Media |
Network Operating Systems |
Network Adapters |
Network Navigation Devices |
MAC Addresses |
Switches and Bridges |
Routers |
Network Security for Client/Server Networks |
Authentication |
Access Privileges |
Physical Protection Measures |
Firewalls |
|
Chapter 13: Behind the Scenes: How the Internet Works |
The Management of the Internet |
Internet Networking |
Internet Networking |
Connecting to the Internet |
The Network Model of the Internet |
Data Transmission and Protocols |
Packett Switching |
TCP/IP |
Internet Identity |
IP Addresses |
DIG DEEPER: Making the Connection-Connection-Oriented Versus Connectionless Protocols |
Domain Names |
HTTP, HTML, and Other Web Building Blocks |
Web Browser Security Protocols |
HTML/XHTML |
XML |
Common Gateway Interface |
Dynamic HTML |
Client-Side Applications |
Communications over the Internet |
E-Mail |
ETHICS IN IT: Web Browsing: Not as Private as You May Think |
E-Mail Security: Encryption and Specialized Software |
Instant Messaging |
TRENDS IN IT: Crowdsourcing: Harnessinf the Power of Social Networks |
Voice over Internet Protocol (VoIP) |
Glossary |
Index |