did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780619267674

Computers And Technology In A Changing Society

by
  • ISBN13:

    9780619267674

  • ISBN10:

    0619267674

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2004-12-20
  • Publisher: Cengage Learning
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $151.95

Summary

This text provides a concise introduction to computer concepts as well as covering timely societal issues that accompany their use.

Table of Contents

Preface iii
Introduction to Computers and Technology
Overview
3(1)
Computers in Your Life
4(1)
Why Learn About Computers?
4(1)
How Are Computers Used Today?
4(4)
At Home
4(1)
In Education
5(1)
In the Workplace
6(1)
On the Go
7(1)
What is a Computer?
8(1)
Computers Then and Now
9(2)
Precomputers and Early Computers (Before Approximately 1945)
9(1)
First-Generation Computers (Approximately 1946--1957)
9(1)
Second-Generation Computers (Approximately 1958--1963)
10(1)
Third-Generation Computers (Approximately 1964--1970)
10(1)
Fourth-Generation Computers (Approximately 1971--present)
11(1)
Fifth-Generation Computers (Now and the Future)
11(1)
Hardware
11(3)
Input Devices
11(1)
Processing Devices
11(1)
Output Devices
12(1)
Storage Devices and Storage Media
12(1)
Communications Devices
12(2)
Software
14(3)
System Software
14(1)
Application Software
14(2)
Programming, Markup, and Scripting Languages
16(1)
Computer Networks and the Internet
17(2)
Basic Types of Computers
19(1)
Mobile Devices
20(1)
Personal Computers
20(4)
Desktop PCs
20(2)
Portable PCs
22(2)
Thin Clients and Internet Appliances
24(1)
Midrange Servers
24(1)
Mainframe Computers
25(1)
Supercomputers
25(1)
Computers, Technology, and Society
26(1)
Benefits of a Computer-Oriented Society
27(1)
Risks of a Computer-Oriented Society
27(3)
Summary
30(2)
Key Terms
32(1)
Self-Quiz
33(1)
Discussion Question
33(1)
Balancing Act---New Technology: Benefits Vs. Risks
34(1)
Projects
35(4)
A Closer Look at Hardware and Software
Overview
39(1)
Data, Information, and Data Representation
40(1)
Data vs. Information
40(1)
Bits, Bytes, and Coding Systems
40(1)
Bits
40(1)
Bytes
40(1)
Coding Systems
40(1)
Input Hardware
41(1)
Keyboards
41(1)
Pointing Devices
42(2)
The Mouse
42(1)
Electronic Pens
42(2)
Touch Screens and Other Pointing Devices
44(1)
Scanners, Readers, and Digital Cameras
44(3)
Scanners and Readers
44(3)
Digital Cameras
47(1)
Other Input Devices
47(1)
Processing Hardware and Other Hardware Inside the System Unit
48(1)
The Motherboard
48(1)
The Central Processing Unit (CPU)
49(1)
Memory
50(1)
Output Hardware
51(1)
Display Devices
51(1)
Printers
52(1)
Ink-Jet Printers
52(1)
Laser Printers
52(1)
Special Purpose Printers
53(1)
Other Output Devices
53(2)
Storage Hardware
55(1)
Storage System Characteristics
55(1)
Storage Devices and Storage Media
55(1)
Magnetic Disks and Optical Discs
55(1)
Floppy Disks
55(1)
CDs and DVDs
56(2)
Read-Only Discs: CD-ROM and DVD-ROM Discs
57(1)
Recordable Discs: CD-R, DVD-R, and DVD+R Discs
57(1)
Rewritable Discs: CD-RW, DVD-RW, DVD+RW, DVD-RAM, and Blue-Laser Discs
58(1)
Flash Memory Media
58(1)
Other Removable Media
59(1)
High-Capacity Removable Disks
59(1)
Smart Cards
59(1)
Hard Drives
60(1)
Remote Storage Systems
61(1)
Choosing Among Storage Alternatives
61(1)
Communications Hardware
61(1)
Software Basics
62(1)
Starting a Computer: The Boot Process
63(1)
The User Interface
64(1)
Starting a Program
64(1)
What Are Files and Folders?
65(1)
Common Software Commands
65(3)
Summary
68(2)
Key Terms
70(1)
Self-Quiz
71(1)
Discussion Question
71(1)
Balancing Act---Open Source Software: Will it Promote or Hinder Software Development?
72(1)
Projects
73(4)
A Quick Tour of Cyberspace
Overview
77(1)
What are the Internet and the World Wide Web?
78(1)
The Internet
78(1)
The World Wide Web
78(1)
Internet Addresses
79(2)
IP Addresses and Domain Names
79(1)
Uniform Resource Locators (URLs)
80(1)
E-Mail Addresses
80(1)
Pronouncing Internet Addresses
81(1)
Accessing and Using the Internet and the World Wide Web
81(1)
Types of Internet Connections
82(4)
Dial-Up Connections
82(1)
Direct Connections
83(3)
Selecting an ISP and Setting Up Your PC
86(1)
Selecting an ISP
86(1)
Setting Up Your System
87(1)
Surfing the Web
87(3)
Using URLs and Hyperlinks
88(1)
Using Favorites and the History List
89(1)
Searching the Web
90(1)
Using E-Mail and Other Types of Online Communications
90(5)
Sending E-Mail
93(1)
Retrieving E-Mail
93(1)
Managing E-Mail
93(1)
Web-Based E-Mail
93(1)
Discussion Groups, Chat, Instant Messaging, and More
94(1)
Beyond Browsing and E-Mail
95(1)
Online Shopping and Other Types of Online Financial Transactions
95(4)
Online Shopping
95(2)
Online Auctions
97(2)
Online Banking
99(1)
Online Investing
99(1)
Online Entertainment
99(2)
Online Music
99(1)
Online TV and Videos
100(1)
Online Gaming
101(1)
Online Education
101(3)
Web-Based Training and Distance Learning
102(1)
Online Testing
103(1)
Online Writing
103(1)
Societal Implications of Cyberspace
104(1)
Security
104(1)
Privacy
105(1)
Differences in Online Communications
105(1)
The Anonymity Factor
106(1)
Information Integrity
107(3)
Summary
110(2)
Key Terms
112(1)
Self-Quiz
113(1)
Discussion Question
113(1)
Balancing Act---Real Self Vs. Virtual Self
114(1)
Projects
115(4)
Computers and Security
Overview
119(1)
Why Be Concerned About Computer Security?
120(1)
Unauthorized Access and Use, and Computer Sabotage
120(1)
Hacking
121(1)
Interception of Communications
122(1)
Computer Sabotage
122(5)
Computer Viruses and Other Types of Malware
122(3)
Denial of Service Attacks
125(1)
Data or Program Alteration
126(1)
Protecting Against Unauthorized Access and Use, and Computer Sabotage
127(8)
Possessed Knowledge Access Systems
127(1)
Possessed Object Access Systems
128(1)
Biometric Access Systems
128(1)
Firewalls and Antivirus Software
129(2)
E-Mail and File Encryption
131(3)
Secure Web Servers
134(1)
Virtual Private Networks (VPNs)
134(1)
Wi-Fi Security
134(1)
Online Theft, Fraud, and Other Dot Cons
135(1)
Theft of Data, Information, and Other Resources
135(1)
Identity Theft
135(1)
Online Auction Fraud
136(1)
Internet Scams, Spoofing, and Phishing
137(1)
Protecting Against Online Theft, Fraud, and Other Dot Cons
138(4)
Protecting Against Identity Theft
138(1)
Protecting Against Online Auction Fraud and Other Dot Cons
139(1)
Using Digital Signatures and Digital Certificates
140(2)
Hardware Theft, Damage, and System Failure
142(1)
Hardware Theft
142(1)
Hardware Damage
142(1)
System Failure and Other Disasters
142(1)
Protecting Against Hardware Theft, Damage, and System Failure
142(4)
Door and Computer Equipment Locks
142(1)
Proper Hardware Care
143(1)
Backups and Disaster Preparedness
144(2)
Software Piracy and Digital Counterfeiting
146(1)
Software Piracy
146(1)
Digital Counterfeiting
146(1)
Protecting Against Software Piracy and Digital Counterfeiting
147(1)
Education, Holograms, and Other Antipiracy Tools
147(1)
Digital Counterfeiting Preventions
147(1)
Personal Safety Issues
148(1)
Cyberstalking
148(1)
Online Pornography
149(1)
Protecting Against Cyberstalking and Other Personal Safety Concerns
149(1)
Safety Tips for Adults
149(1)
Safety Tips for Children
150(1)
Computer Security Legislation
150(4)
Summary
154(2)
Key Terms
156(1)
Self-Quiz
157(1)
Discussion Question
157(1)
Balancing Act---Security Vs. Personal Freedom
158(1)
Projects
159(4)
Computers and Privacy
Overview
163(1)
Why Be Concerned About Privacy?
164(1)
Web-Browsing and E-Mail Privacy
164(1)
Cookies
164(4)
Web Bugs and Spyware
168(1)
Web Bugs
168(1)
Spyware
168(1)
E-Mail Privacy
169(1)
Protecting Web-Browsing and E-Mail Privacy
170(3)
Cookie, Spyware, and Web Bug Control
170(2)
Anonymous Web Browsing
172(1)
E-Mail Privacy Protection
172(1)
Databases, Electronic Profiling, Spam, and Other Marketing Activities
173(1)
Databases and Electronic Profiling
173(1)
Spam and Other Marketing Activities
174(2)
Protecting the Privacy of Personal Information
176(5)
Safeguard Your E-Mail Address
176(1)
Be Cautious of Revealing Personal Information
177(1)
Use Filters
178(2)
Opt Out
180(1)
Properly Dispose of Hardware
181(1)
Electronic Surveillance and Monitoring
181(1)
Computer Monitoring Software
181(3)
Video Surveillance
184(2)
Employee Monitoring
186(1)
Presence Technology
187(1)
Protecting Personal and Workplace Privacy
188(1)
The Employer's Responsibilities
189(1)
The Employee's Responsibilities
189(1)
Privacy Legislation
189(5)
Summary
194(2)
Key Terms
196(1)
Self-Quiz
197(1)
Discussion Question
197(1)
Balancing Act---Personal Privacy Vs. The Government's Right to Know
198(1)
Projects
199(4)
Ethics and Intellectual Property Rights
Overview
203(1)
What are Intellectual Property Rights?
204(1)
Copyrights
204(2)
Trademarks
206(1)
Patents
207(1)
What are Ethics?
207(1)
Ethical Use of Copyrighted Material
208(1)
Software
208(3)
Commercial Software
209(1)
Shareware
210(1)
Freeware
210(1)
Public Domain Software
210(1)
Books and Web-Based Articles
211(1)
Music
212(1)
Movies
212(2)
Ethical Use of Resources and Information
214(1)
School or Company Resources
214(1)
Employee and Customer Information
215(1)
Cheating and Falsifying Information
216(1)
Computer Hoaxes and Digital Manipulation
217(1)
Computer Hoaxes
217(1)
Digital Manipulation
218(1)
Ethical Business Practices and Decision Making
219(1)
Ethically Questionable Products or Services
219(1)
Vaporware
220(1)
Fraudulent Reporting and Other Scandalous Activities
220(1)
Workplace Monitoring
221(1)
Cultural Considerations
221(1)
Related Legislation
222(4)
Summary
226(2)
Key Terms
228(1)
Self-Quiz
229(1)
Discussion Question
229(1)
Balancing Act---Government Protection Vs. Government Censorship
230(1)
Projects
231(4)
Health, Access, and the Environment
Overview
235(1)
Staying Healthy at Home and on the Job
236(1)
Physical Health
236(4)
What Is Ergonomics?
236(1)
Workspace Design
236(3)
Ergonomic Hardware
239(1)
Good User Habits and Precautions
239(1)
Emotional Health
240(5)
Stress of Ever-Changing Technology
241(1)
Impact of Our 24/7 Society
241(1)
Information Overload
242(1)
Burnout
242(1)
Computer and Internet Addiction
243(2)
Is There Equal Access to Technology?
245(1)
The Digital Divide
245(3)
The U.S. Digital Divide
245(2)
The Global Digital Divide
247(1)
Assistive Technology
248(3)
Assistive Input Devices
248(1)
Assistive Output Devices
249(1)
Impact on Web Page Design
250(1)
Environmental Concerns
251(1)
Green Computing
252(2)
Recycling and Disposal of Computing Equipment
254(4)
Summary
258(2)
Key Terms
260(1)
Self-Quiz
261(1)
Discussion Question
261(1)
Balancing Act---Internet Access: Luxury or Necessity?
262(1)
Projects
263(4)
Emerging Technologies
Overview
267(1)
The PC of the Future
268(1)
Emerging Hardware
268(4)
Emerging Input Devices
268(1)
Emerging Processing Technologies
269(1)
Emerging Output Devices
269(1)
Emerging Storage Devices
270(1)
Greener Hardware
271(1)
Nanotechnology
272(1)
Quantum and Optical Computers
272(1)
Quantum Computing
273(1)
Optical Computing
273(1)
Emerging Internet and Networking Technologies
273(1)
Improvements to the Internet Infrastructure
274(1)
Wireless Networking Improvements
274(1)
Broadband over Power Lines (BPL)
274(1)
Artificial Intelligence (AI)
275(1)
What Is Artificial Intelligence?
275(1)
AI Applications
276(3)
Intelligent Agents
276(1)
Expert Systems
277(1)
Neural Networks
277(1)
Robotics
277(2)
Virtual Reality (VR)
279(1)
What Is Virtual Reality?
279(1)
VR Applications
279(1)
Technological Advances in Medicine
280(1)
Bionics, Electronic Monitoring, and Electronic Implants
280(1)
Robot-Assisted Surgery and Telemedicine
281(2)
Technological Advances in the Military
283(1)
Improvements in Military Equipment
283(1)
Improved Surveillance Tools
284(1)
Societal Implications of Emerging Technology
285(3)
Summary
288(2)
Key Terms
290(1)
Self-Quiz
291(1)
Discussion Question
291(1)
Balancing Act---Ubiquitous Computing Vs. Big Brother
292(1)
Projects
293(4)
Answers to Self-Quiz 297(1)
Credits 298(2)
Glossary/Index 300

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program