did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780619162016

Computers And Technology In A Changing Society, 1st Edition

by
  • ISBN13:

    9780619162016

  • ISBN10:

    0619162015

  • Format: Paperback
  • Copyright: 2002-12-31
  • Publisher: Course Technology
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $87.95
We're Sorry.
No Options Available at This Time.

Table of Contents

Preface iii
Introduction to Computers and Technology
2(34)
Overview
3(1)
Computers in Your Life
4(3)
Why Learn About Computers?
4(1)
How Are Computers Used Today?
4(1)
At Home
4(1)
In Education
5(1)
In the Workplace
6(1)
On the Go
6(1)
What Is a Computer?
7(13)
Computers Then and Now
8(1)
Pre-Computers and Early Computers (before Approximately 1945)
9(1)
First Generation (Approximately 1946--1957)
9(1)
Second Generation (Approximately 1958--1963)
9(1)
Third Generation (Approximately 1964-1970)
9(1)
Fourth Generation (Approximately 1971--present)
10(1)
Fifth Generation (Now and the Future)
10(1)
Hardware
10(1)
Input Devices
11(1)
Processing Devices
11(1)
Output Devices
12(1)
Storage Devices
12(1)
Communications Devices
13(1)
Software
13(1)
Operating Systems
13(1)
Application Software
13(2)
Programming, Markup, and Scripting Languages
15(2)
Computer Networks and the Internet
17(3)
Basic Types of Computers
20(4)
Mobile Communications Devices
21(1)
Personal Computers
21(1)
Desktop and Portable PCs
21(2)
Network Computers, Thin Clients, and Internet Appliances
23(1)
Midrange Servers
23(1)
Mainframe Computers
24(1)
Supercomputers
24(1)
Computers, Technology, and Society
24(4)
Benefits of a Computer-Oriented Society
25(1)
Risks of a Computer-Oriented Society
25(3)
Summary
28(2)
Balancing Act---New Technology: Benefits vs. Risks
30(1)
Key Terms
31(1)
Self-Quiz
32(1)
Projects
33
CHAPTER BOXES
Trends In...Personal Biometrics
12(6)
A Closer Look At...College Portals
18(8)
How To...Buy and Set Up a New PC
26(10)
A Closer Look at Hardware and Software
36(36)
Overview
37(1)
Data, Information, and Data Representation
38(1)
Data vs. Information
38(1)
Bits, Bytes, and Coding Systems
38(1)
Bits
38(1)
Bytes
38(1)
Coding Systems
38(1)
Input Hardware
39(7)
Keyboards
39(1)
Pointing Devices
39(1)
The Mouse
40(1)
Electronic Pens
41(2)
Other Pointing Devices
43(1)
Scanners and Digital Cameras
43(1)
Scanners
43(3)
Digital Cameras
46(1)
Other Input Devices
46(1)
Processing Hardware and Other Hardware inside the System Unit
46(3)
The Motherboard
46(1)
The Central Processing Unit (CPU)
47(1)
Memory
48(1)
Output Hardware
49(3)
Monitors and Other Display Devices
49(1)
Printers
50(1)
Ink-Jet Printers
50(1)
Laser Printers
51(1)
Other Output Devices
51(1)
Storage Hardware
52(6)
Storage System Characteristics
52(1)
Storage Medium vs. Storage Device
52(1)
Magnetic Disks vs. Optical Discs
53(1)
Removable Media vs. Fixed Media
53(1)
Floppy Disks
53(1)
CDs and DVDs
54(1)
Read-Only Discs: CD-ROMs and DVD-ROMs
54(1)
Recordable Discs: CD-Rs and DVD-Rs
55(1)
Rewritable Discs: CD-RW and DVD+RW
55(1)
Miniature Discs
55(1)
Other Removable Media
56(1)
High-Capacity Removable Disks
56(1)
Flash Memory Media
56(1)
Smart Cards
56(1)
Hard Drives
57(1)
Remote Storage Systems
57(1)
Choosing among Storage Alternatives
58(1)
Communications Hardware
58(1)
Software Basics
59(5)
What Are Files and Folders?
59(1)
Starting a Program
59(1)
The User Interface
60(1)
Common Software Commands
61(3)
Summary
64(2)
Balancing Act---Open Source Software: Will It Promote or Hinder Software Development?
66(1)
Key Terms
67(1)
Self-Quiz
68(1)
Projects
69
CHAPTER BOXES
A Closer Look At...Wired Doctors
42(3)
Trends In...Smart Bar Codes
45(17)
How to...Manage Your Files
62(10)
A Quick Tour of Cyberspace
72(42)
Overview
73(1)
What Are the Internet and World Wide Web?
74(3)
The Internet
74(1)
The World Wide Web
74(1)
Internet Addresses
74(1)
IP Addresses and Domain Names
75(1)
Uniform Resource Locators (URLs)
75(1)
E-Mail Addresses
76(1)
Pronouncing Internet Addresses
77(1)
What Can the Internet Be Used For?
77(11)
Information Publishing/Information Retrieval
77(2)
E-Mail and Other Types of Online Communications
79(2)
Online Shopping and E-Commerce
81(1)
Online Shopping
81(1)
Online Auctions
82(1)
Online Banking
82(1)
Online Investing
82(2)
Entertainment
84(1)
Online Music
84(1)
Online TV and Videos
85(1)
Online Gaming
86(1)
Web-Based Training and Distance Learning
86(1)
Telecommuting
87(1)
How Can I Access and Use the Internet?
88(12)
Types of Internet Connections
89(1)
Dial-Up Connections
89(2)
Direct Connections
91(1)
Selecting an ISP and Setting Up Your PC
92(1)
Surfing the Web
93(2)
Using URLs and Hyperlinks
95(2)
Using Bookmarks and the History List
97(1)
Sending and Receiving E-Mail
98(1)
Sending E-mail
98(1)
Receiving E-mail
98(2)
Societal Implications of Cyberspace
100(6)
Security
100(1)
Privacy
100(1)
Differences in Online Communication
100(2)
The Anonymity Factor
102(1)
Information Integrity
103(3)
Summary
106(2)
Balancing Act--Real Self vs. Virtual Self
108(1)
Key Terms
109(1)
Self-Quiz
110(1)
Projects
111
CHAPTER BOXES
A Closer Look At...Online Voting
83(7)
Trends In...Smart Appliances
90(14)
How to...Search the Web
104(10)
Computers and Security
114(44)
Overview
115(1)
Security Concerns
116(11)
Hardware Theft, Damage, and System Failure
116(1)
Hardware Theft
116(1)
Hardware Damage
116(1)
System Failure and Other Types of Disasters
116(1)
Unauthorized Access and Use
117(1)
Hacking
117(1)
Interception of Communications and Transmissions
118(1)
Computer Sabotage
119(1)
Computer Viruses and Other Types of Malware
119(2)
Denial of Service Attacks
121(1)
Data or Program Alteration
122(1)
Online Theft, Fraud, and Other Dot Cons
122(1)
Identity Theft
122(1)
Theft of Data, Information, and Other Resources
123(1)
Online Auction Fraud
124(1)
Internet Offer Scams
124(1)
Software Piracy and Digital Counterfeiting
125(1)
Software Piracy
125(1)
Digital Counterfeiting
125(1)
Personal Safety Issues
126(1)
Cyberstalking
126(1)
Online Pornography
126(1)
Security Safeguards
127(19)
Protection against Hardware Theft, Damage, and Failure
127(1)
Door and Computer Equipment Locks
127(1)
Proper Hardware Care
128(1)
Backups and Disaster Preparedness
129(2)
Protection against Unauthorized Access and Use
131(1)
Possessed Knowledge Systems
131(1)
Possessed Object Systems
132(1)
Biometric Systems
132(2)
Firewalls and Other Crime-Prevention Software
134(2)
Protection against Interception of Data and Communications
136(1)
Secure Web Servers
136(1)
E-Mail and File Encryption
136(3)
Digital Signatures
139(1)
Digital Certificates
139(1)
Virtual Private Networks (VPNs)
140(1)
Protection against Computer Viruses and Other Types of Sabotage
140(2)
Protection against Online Theft, Fraud, and Other Dot Cons
142(1)
Protecting against Identity Theft
142(1)
Protecting against Online Auction Fraud and Other Dot Cons
142(1)
Protection against Software Piracy and Digital Counterfeiting
143(1)
Education, Holograms, and Other Anti-Piracy Tools
143(1)
Preventing Digital Counterfeiting
144(1)
Protection against Cyberstalking and Other Personal Safety Concerns
145(1)
Safety Tips for Adults
145(1)
Safety Tips for Children
145(1)
Protection against Security Breaches by Employees
145(1)
Screen Potential New Hires Carefully
145(1)
Watch for Disgruntled Employees and Ex-Employees
145(1)
Develop Policies and Controls
146(1)
Ask Business Partners to Review their Security
146(1)
Computer Crime Legislation
146(4)
Summary
150(2)
Balancing Act---Security vs. Personal Freedom
152(1)
Key Terms
153(1)
Self-Quiz
154(1)
Projects
155
CHAPTER BOXES
Trends In...Smart Cards on Campus
133(2)
A Closer Look At...Biometrics and Crime Prevention
135(13)
How to...Protect Your PC
148(10)
Computers and Privacy
158(36)
Overview
159(1)
Privacy Concerns
160(14)
Web Browsing Privacy
160(1)
Cookies
160(3)
Web Bugs
163(1)
Spyware
163(1)
E-mail Privacy
164(1)
Databases and Electronic Profiling
164(3)
Spam and Other Marketing Activities
167(1)
Electronic Surveillance and Monitoring
168(1)
Computer Monitoring Software
168(3)
Employee Monitoring
171(1)
Video Surveillance
172(1)
Presence Technology
172(2)
Privacy Safeguards
174(8)
Protection of Web Browsing and E-mail Privacy
174(1)
Cookie, Spyware, and Web Bug Control
174(1)
Anonymous Web Browsing
175(1)
E-mail Privacy Protection
176(1)
Protection of Personal Information
176(1)
Safeguard Your E-mail Address
176(1)
Be Cautious of Revealing Personal Information
177(1)
Dealing with Spam and Other Marketing Activities
178(3)
Filtering Out Objectionable Content
181(1)
Protection of Workplace Privacy
181(1)
Employee Policies
182(1)
Separate Business and Personal Activities
182(1)
Privacy Legislation
182(4)
Summary
186(2)
Balancing Act---Personal Privacy vs. the Government's Right to Know
188(1)
Key Terms
189(1)
Self-Quiz
190(1)
Projects
191
CHAPTER BOXES
A Closer Look At...The FBI's Carnivore Program
170(9)
Trends In...Digital Identification
179(5)
How To...Encrypt E-mail Messages and Files
184(10)
Ethics and Intellectual Property Rights
194(32)
Overview
195(1)
What Are Intellectual Property Rights?
196(4)
Copyrights
196(1)
Trademarks
197(2)
Patents
199(1)
What Are Ethics?
200(14)
Ethical Use of Copyrighted Material
200(1)
Software
200(3)
Books and Web-Based Articles
203(1)
Music
204(2)
Movies
206(1)
Ethical Use of Resources and Information
207(1)
Ethical Use of School or Company Resources
207(1)
Ethical Use of Employee and Customer Information
208(1)
Cheating and Falsifying Information
208(1)
Computer Hoaxes and Digital Manipulation
209(1)
Computer Hoaxes
210(1)
Digital Manipulation
210(1)
Ethical Business Practices and Decision-Making
211(1)
Fraudulent Reporting and Other Scandalous Activities
211(1)
Ethically Questionable Products or Services
212(1)
Vaporware and Other Ethically Questionable Misinformation
212(1)
Workplace Monitoring
213(1)
Cultural Considerations
213(1)
Related Legislation
214(4)
Summary
218(2)
Balancing Act---Government Protection vs. Government Censorship
220(1)
Key Terms
221(1)
Self-Quiz
222(1)
Projects
223
CHAPTER BOXES
Trends In...Peer-to-Peer File Sharing
198(7)
A Closer Look At...Digital Copy Protection
205(11)
How To...Create Legal Data or Music CDs
216(10)
Health, Access, and the Environment
226(32)
Overview
227(1)
Staying Healthy at Home and on the Job
228(9)
Physical Health
228(1)
What Is Ergonomics?
228(1)
Workspace Design
228(3)
Ergonomic Hardware
231(1)
Good User Habits and Precautions
232(1)
Emotional Health
233(1)
Stress of Ever-Changing Technology
233(2)
Impact of Our 24/7 Society
235(1)
Information Overload
235(1)
Burnout
236(1)
Computer and Internet Addiction
236(1)
Is There Equal Access to Technology?
237(7)
The Digital Divide
237(1)
The U.S. Digital Divide
238(1)
The Global Digital Divide
239(2)
Assistive Technology
241(1)
Assistive Input Devices
241(1)
Assistive Output Devices
242(1)
Impact on Web Page Design
243(1)
Environmental Concerns
244(6)
Green Computing
244(1)
Recycling and Disposal of Computing Equipment
245(5)
Summary
250(2)
Balancing Act---Internet Access: Luxury or Necessity?
252(1)
Key Terms
253(1)
Self-Quiz
254(1)
Projects
255
CHAPTER BOXES
A Closer Look At...The Dot Com Fallout
234(12)
Trends In...Electronic Paper
246(2)
How To...Use the Windows Accessibility Options
248(10)
Emerging Technologies
258(31)
Overview
259(1)
The PC of the Future
260(4)
Nanotechnology
260(1)
Quantum and Optical Computers
261(1)
Quantum Computers
261(1)
Optical Computers
262(1)
Holographic and Multilayer Storage
262(1)
Greener Hardware
263(1)
Artificial Intelligence (AI)
264(6)
What Is Artificial Intelligence?
264(1)
AI Applications
264(1)
Intelligent Agents
265(1)
Natural Language Systems
265(1)
Expert Systems
266(2)
Neural Networks
268(1)
Robotics
269(1)
Virtual Reality (VR)
270(2)
What Is Virtual Reality?
270(1)
VR Applications
270(2)
Technological Advances in Medicine
272(3)
Electronic Implants
272(1)
Robot-Assisted Surgery
273(1)
Telemedicine
273(2)
Technological Advances in the Military
275(2)
Smart Guns, Bullets, and Bombs
275(1)
Surveillance Tools
276(1)
Improved Uniforms and Gear
276(1)
Societal Implications of Emerging Technology
277(3)
Summary
280(2)
Balancing Act---Ubiquitous Computing vs. Big Brother
282(1)
Key Terms
283(1)
Self-Quiz
284(1)
Projects
285
CHAPTER BOXES
Trends In...Wearable PCs
261(7)
A Closer Look At...Animated Anchors
268(10)
How To...Download and Install New Browser Plug-ins
278(11)
Answers to Self-Quiz 289(1)
Credits 290(2)
Glossary/Index 292

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program