did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781418843700

Discovering Computers 2007: A Gateway to Information, Web Enhanced-Complete

by ; ;
  • ISBN13:

    9781418843700

  • ISBN10:

    1418843709

  • Format: Paperback
  • Copyright: 2006-02-10
  • Publisher: Cengage Learning
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $198.95

Summary

Provides a current and thorough introduction to computers by integrating usage of the World Wide Web with the printed text. Updated for currency, this Shelly Cashman Series text offers a complete solution to successfully teach students basic computer concepts with new exercises, case studies, and online tools on the Online Companion.

Table of Contents

Introduction to Computers
2(50)
A World Of Computers
4(2)
What Is A Computer?
6(1)
Data and Information
6(1)
Information Processing Cycle
6(1)
The Components Of A Computer
7(2)
Input Devices
7(1)
Output Devices
8(1)
System Unit
8(1)
Storage Devices
8(1)
Communication Devices
9(1)
Advantages And Disadvantages Of Using Comptuers
9(1)
Looking Ahead: Meical Breakthroughs With Computer Implant Devices
9(1)
Ethics & Issues: Who Is Responsible for Identity Theft?
10(1)
Network And The Internet
11(3)
The Internet
12(2)
Ethics & Issues: Who Is Responsible for the Accuracy of Web Pages?
14(1)
Computer Software
15(1)
System Software
15(1)
Application Software
16(1)
Ethics & Issues: Is Computer Gaming More Good than Bad?
16(2)
Installing and Running Programs
17(1)
Software Development
18(1)
Categories Of Computers
18(1)
Personal Computers
19(1)
Desktop Computers
20(1)
Mobile Computers
20(3)
Notebook Computers
20(1)
Mobile Devices
21(2)
Servers
23(1)
Mainframes
23(1)
Supercomputers
23(1)
Embedded Computers
24(1)
Elements Of An Information System
25(1)
Examples Of Computer Usage
26(1)
Home User
26(1)
Ethics & Issues: Does Internet Dating Readly Work?
27(5)
Small Office/Home User
28(1)
Mobile User
29(1)
Power User
29(1)
Large Business User
30(1)
Putting It All Together
31(1)
Computer Applications In Society
32(1)
Looking Ahead: Robots Perform Mundane Tasks, Entertain
32(5)
Education
32(1)
Finance
32(1)
Government
33(1)
Health Care
34(1)
Science
34(1)
Publishing
35(1)
Travel
36(1)
Manufacturing
36(1)
Chapter Summary
37(1)
High-Tech Talk
38(1)
Analog versus Digital: Making the Conversion
38(1)
Companies On The Cutting Edge
39(1)
Dell
39(1)
Apple Computer
39(1)
Technology Trailblazers
39(1)
Bill Gates
39(1)
Anne Mulcahy
39(1)
Chapter Review
40(2)
Key Terms
42(1)
Checkpoint
43(3)
Learn It Online
46(2)
Learn How To
48(2)
Web Research
50(1)
Case Studies
51(1)
Speical Future Time Line 2007
52
The Internet and World Wide Web
66
The Internet
6
History Of The Internet
68
Looking Ahead: Internet Speeds into the Future
70
How The Internet Works
70
Connecting to the Internet
70
Access Providers
71
How Data Travels the Internet
71
Internet Addresses
72
The World Wide Web
73
Browsing the Web
75
Web Addresses
75
Navigating Web Pages
76
Searching for Information on the Web
77
Looking Ahead: 3-D Search Engines Get the Picture
81
Types of Web Sites
82
Looking & Issues: Is the Internet as Good as the Classroom?
82
Evaluating a Web Site
84
Multimedia on the Web
85
Web Publishing
89
E-Commerce
91
Ethics & Issues: Should All Sales on the Internet Be Taxed?
92
Other Internet Services
92
E-Mail
92
Ethics & Issues: E-mail: Irritant or Liberator?
94
FTP
96
Newsgroups and Message Boards
96
Mailing Lists
97
Chat Rooms
98
Instant Messaging
98
Internet Telephony
99
Netiquette
100
Chapter Summary
101
Ethics & Issues: Should Companies Be Able to Track Your Online Habits?
101
High-Tech Talk
102
A Computer's Internet Protocol (IP) Address
102
Companies On The Cutting Edge
103
Google
103
Yahoo!
103
Technology Trailblazers
103
Tim Berners-Lee
103
Meg Whitman
103
Chapter Review
104
Key Terms
106
Checkpoint
107
Learn It Online
110
Learn How To
112
Web Research
114
Case Studies
115
Special Feature Making Use Of The Web
116
Application Software
132
Application Software
134
The Role of System Software
135
Working with Application Software
136
Looking Ahead: User Interfaces of the Future
137
Business Software
138
Word Processing Software
138
Developing a Document
141
Ethics & Issues: How Should Schools Deal with Internet Plagianism?
141
Spreadsheet Software
142
Database Software
145
Presentation Graphics Software
146
Note Taking Software
147
Personal Information Manager Software
148
PDA Business Software
148
Software Suite
148
Project Management Software
149
Accounting Software
149
Document Management Software
150
Enterprise Computing Software
150
Graphics And Multimedia Software
151
Computer-Aided Design
151
Desktop Publishing Software (for the Professional)
152
Paint/Image Editing Software (for the Professional)
152
Ethics & Issues: Atering Digital Photographs - Art or Fraud?
153
Video and Audio Editing Software (for the Professional)
153
Multimedia Authoring Software
154
Web Page Authoring Software
154
Software For Home, Personal, And Educational Use
155
Software Suite (for Personal Use)
156
Personal Finance Software
156
Legal Software
157
Tax Preparation Software
157
Desktop Publishing Software (for Personal Use)
158
Paint/Image Editing Software (for Personal Use)
158
Photo Editing Software
159
Clip Art/Image Gallery
159
Video and Audio Editing Software (for Personal Use)
159
Home Design/Landscaping Software
160
Reference and Educational Software
160
Entertainment Software
160
Application Software For Communications
161
Ethics & Issues: Should Companies Monitor Empoyees' E-Mail?
161
Popular Utility Programs
162
Application Software On The Web
163
Looking Ahead: Driving Down the Web Highway
163
Application Service Providers
164
Learning Aids And Support Tools For Application Software
164
Web-Based Training
166
Chapter Summary
167
Ethics & Issues: Copying Software - A Computer Crimal
167
High-Tech Talk
168
Computer Viruses: Delivery, Infection, and Avoidance
168
Companies On The Cutting Edge
169
Adobe Systems
169
Microsoft
169
Technology Trailblazers
169
Dan Bricklin
169
Masayoshi Son
169
Chapter Review
170
Key Terms
172
Checkpoint
173
Learn It Online
176
Learn How To
178
Web Research
180
Case Studies
181
The Components of the System Unit
182
The System Unit
184
The Motherboard
186
Processor
187
The Control Unit
187
Ethics & Issues: Can Compouters Think?
187
The Arithmetic Logic Unit
188
Machine Cycle
188
Registers
189
The System Clock
189
Looking Ahead: Countries Seek Computing Speed Supremacy
190
Comparison of Personal Computer Processors
190
Buying a Personal Computer
192
Heat Sinks, Head Pipes, and Liquid Cooling
193
Ethics & Issues: Discarded Computer Parts: Whose Problem Is It?
193
Parallel Processing
194
Data Representation
194
Memory
197
Bytes and Addressable Memory
197
Memory Sizes
197
Types of Memory
197
RAM
198
Ethics & Issues: How Much Should You Pay for a Computer?
200
Cache
201
ROM
201
Flash Memory
202
CMOS
203
Memory Access Times
203
Expansion Slots And Adapter Cards
204
PC Cards, Flash Memory Cards, and USB Flash Drives
205
Ports And Connectors
206
Serial Ports
207
Parallel Ports
208
USB Ports
208
FireWire Ports
209
Special Purpose Ports
209
BUSES
211
Expansion Bus
212
Bays
212
Power Supply
213
Mobile Computers And Devices
213
Ethics & Issues: Should Smart Shoes Be Banned from Competitive Events?
214
Looking Ahead: DNA Computer Works to Fight Cancer
215
Putting It All Together
215
Keeping Your Computer Clean
216
Chapter Summary
217
High-Tech Talk
218
Random Access Memory (RAM): The Genius of Memory
218
Companies On The Cutting Edge
219
AMD
219
Intel
219
Technology Trailblazers
219
Jack Kilby
219
Gordon Moore
219
Chapter Review
220
Key Terms
222
Checkpoint
223
Learn It Online
226
Learn How To
228
Web Research
230
Case Studies
231
Input
232
What Is Input?
234
What Are Input Devices?
236
The Keyboard
236
Ethics & Issues: Keyboard Monitoring - Privacy Risk?
237
Keyboard Connections
238
Keyboard Ergonomics
238
Pointing Devices
239
Mouse
239
Mouse Types
239
Using a Mouse
240
Ethics & Issues: Should the Government Set Computer Use Standards?
241
Other Pointing Devices
241
Trackball
241
Touchpad
241
Pointing Stick
242
Joystick and Wheel
242
Audio Player Control Pad
242
Game Pad
242
Light Pen
242
Touch Screen
243
Pen Input
243
Voice Input
245
Audio Input
246
Input For Pdas, Smart Phones, And Tablet Pcs
247
Pdas
247
Smart Phones
248
Tablet PCs
249
Ethics & Issues: Should Taking on a Cellular phone While Driving Be Illegal?
249
Digital Cameras
250
Digital Camera Quality
252
Video Input
253
PC Video Cameras
253
Web Cams
254
Ethics & Issues: Should Cameras Be Abel to Monitor Your Every Move?
254
Video Conferencing
254
Scanners And Reading Devices
255
Optical Scanners
255
Optical Readers
257
Bar Code Readers
258
Ethics & Issues: Scanner Errors at the Checkout Counter?
258
RFID Readers
259
Ethics & Issues: Ready for RFID?
259
Looking Ahead: RFID Sensors Simplify, Monitor Tasks
259
Magnetic Stripe Card Readers
260
MICR Readers
260
Data Collection Devices
261
Terminals
261
Point-of-Sale Terminals
261
Automated Teller Machines
262
Biometric Input
262
Putting It All Together
265
Input Devices For Physically Challenged Users
266
Chapter Summary
267
Looking Ahead: Wearable Computers Make Performance Statement
267
High-Tech Talk
268
Biometrics: Personalized Security
268
Companies On The Cutting Edge
269
Logitech
269
Palm
269
Technology Trailblazers
269
Charles Walton
269
Douglas Englebart
269
Chapter Review
270
Key Terms
272
Checkpoint
273
Learn It Online
276
Learn How To
278
Web Research
280
Case Studies
281
Special Feature Personal Mobile Devices
282
Output
298
What Is Output?
300
Display Devices
302
Flat-Panel Displays
302
LCD Monitors and Screens
302
LCD Technology
304
Looking Ahead: Rollable Displays Lack and Roll
304
LCD Quality
304
Graphics Chips, Ports, and LCD Monitors
305
Plasma Monitors
306
Televisions
306
Crt Monitors
307
Quality of a CRT Monitor
308
Graphics Chips and CRT Monitors
308
Printers
310
Producing Printed Output
311
Nonimpact Printers
312
Ink-Jet Printers
312
Ethics & Issues: Is It Ethical to Refill an Ink-Jet Cartridge?
314
Photo Printers
314
Ethics & Issues: Who Is Responsble for Stopping Counterfeting?
315
Laser Printers
315
Thermal Printers
317
Mobile Printers
317
Label and Postage Printers
318
Plotters and Large-Format Printers
318
Impact Printers
318
Speakers, Headphones, And Earphones
320
Ethics & Issues: Is the Use of Digital Audio Books and E-Books Fair to All Students?
321
Other Output Devices
322
Fax Machines and Fax Modems
322
Multi-Function Peripherals
323
Data Projectors
323
Looking ahead: Digital Cinema just the right picture
324
Force-Feedback Joysticks and Wheels
324
Putting it all Together
325
Output Devices for Physically Challenged Users
326
Ethics & Issues: Should Web Sites Be Held Accountable for Accessibility Levels for Psysically Challenged People?
327
Chapter Summary
327
High-Tech Talk
328
Sound Cards: Bringing Your Computer to Life
328
Companies on the Cutting Edge
329
Hewlett-Packard
329
ViewSonic
329
Technology Trailblazers
329
Steve Jobs
329
Donna Dubinsky
329
Chapter Review
330
Key Terms
332
Checkpoint
333
Learn It Online
336
Learn How To
338
Web Research
340
Case Studies
341
Special Feature Digital Imaging and Video Technology
342
Storage
352
Storage
354
Magnetic Disks
357
Hard Disks
358
Floppy Disks
364
Zip Disks
365
Looking Ahead: Heat Increases Disk Capacity
359
Optical Discs
366
Care of Optical Discs
368
Types of Optical Discs
368
CD-ROMs
369
Ethics & Issues: Does Music Sharing Harm CD Sales?
369
CD-Rs and CD-RWs
371
Ethics & Issues: Is It Ethical to Use Pirated CDs or DVDs?
371
DVD-ROMs
372
Looking Ahead: Next-Generation DVDs a Burning Question
373
Recordable and Rewritable DVDs
373
Tape
374
PC Cards
374
Miniature Mobile Storage Media
375
Flash Memory Cards
376
USB Flash Drives
377
Smart Cards
378
Ethics & Issues: Should the World Become a Cashless Society?
378
Microfilm and Microfiche
379
Enterprise Storage
379
Putting it all Together
380
Chapter Summary
381
Ethics & Issues: Who Should Be Looking at Your Medical Records?
381
High-Tech Talk
382
Disk Formatting and File Systems
382
Companies on the Cutting Edge
383
Maxtor
383
SanDisk Corporation
383
Technology Trailblazers
383
Al Shugart
383
Mark Dean
383
Chapter Review
384
Key Terms
386
Checkpoint
387
Learn It Online
390
Learn How To
392
Web Research
394
Case Studies
395
Operating Systems and Utility Programs
396
System Software
398
Operating Systems
398
Operating System Functions
400
Starting a Computer
400
Providing a User Interface
402
Managing Programs
403
Managing Memory
405
Scheduling Jobs
406
Configuring Devices
407
Establishing a Connection
409
Monitoring Performance
409
Ethics & Issues: What Should Be in an Operating System?
409
Providing File Management and Other Utilities
410
Ethics & Issues: Who is Responsible for Operating System Security?
410
Controlling a Network
410
Administering Security
410
Operating System Utility Programs
411
File Manager
412
Image Viewer
412
Personal Firewall
413
Uninstaller
413
Disk Scanner
414
Disk Defragmenter
414
Diagnostic Utility
414
Backup Utility
415
Screen Saver
415
Types of Operating Systems
415
Ethics & Issues: Should Software Manufactures Be Liable for Defective Software?
416
Stand-Alone Operating Systems
416
DOS
417
Windows XP
417
Windows Vista
419
Mac OS X
420
UNIX
420
Linux
421
Ethics & Issues: Closed Source vs. Open Source Operating Systems
421
Looking Ahead: The Future of Linux
421
Network Operating Systems
422
NetWare
422
Windows Server 2003
422
UNIX
423
Linux
423
Solaris
423
Embedded Operating Systems
423
Windows CE
423
Windows Mobile
424
Palm OS
424
Embedded Linux
425
Symbian OS
425
Stand-Alone Utility Programs
425
Antivirus Programs
425
Spyware Removers
426
Internet Filters
426
File Conversion
427
File Compression
427
CD/DVD Burning
428
Personal Computer Maintenance
428
Chapter Summary
429
Looking Ahead: Online Operating Systems Proposed
429
High-Tech Talk
430
Companies on the Cutting Edge
431
Red Hat
431
Symbian
431
Technology Trailblazers
431
Alan Kay
431
Linus Torvalds
431
Chapter Review
432
Key Terms
434
Checkpoint
435
Learn It Online
438
Learn How To
440
Web Research
442
Case Studies
443
Special Feature Buyer's Guide 2007
444
Communications and Networks
458
Communications
460
Uses of Computer Communications
462
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Fax
462
Wireless Messaging Services
462
Ethics & Issues: Should Cell Phones Be Banned in Public Places?
462
Ethics & Issues: High-Tech Cheating via Wireless Messaging Services
464
Public Internet Access Points
464
Cybercafes
465
Global Positioning System
466
Collaboration
467
Groupware
468
Voice Mail
468
Web Services
468
Networks
469
LANs, MANs, and WANs
470
Network Architectures
472
Network Topologies
474
Intranets
475
Network Communications Standards
476
Ethernet
476
Token Ring
476
TCP/IP
477
802.11 (Wi-Fi)
478
Bluetooth
478
IrDA
478
RFID
479
WiMax
479
WAP
480
Communications Software
480
Ethics & Issues: Should Libraries Be Required to Hand Over Web Browser Logs to the Government?
480
Communications over the Telephone Network
481
Dial-Up Lines
481
Dedicated Lines
482
ISDN Lines
482
DSL
482
T-Carrier Lines
483
ATM
483
Communications Devices
484
Dial-Up Modems
485
ISDN and DSL Modems
485
Cable Modems
485
Wireless Modems
486
Network Cards
486
Wireless Access Points
487
Routers
488
Connecting Networks
488
Home Networks
489
Wired Home Networks
489
Wireless Home Networks
490
Communications Channel
491
Looking Ahead: Tech Firms Supporting Broadband over Power Lines (BPL)
492
Physical Transmission Media
492
Twisted-Pair Cable
493
Coaxial Cable
493
Fiber-Optic Cable
493
Wireless Transmission Media
494
Ethics & Issues: Is It Ethical to Steal Your Neighbors Wireless Internet Service?
494
Infrared
494
Broadcast Radio
494
Cellular Radio
494
Microwaves
495
Communications Satellite
496
Looking Ahead: Europe Develops Satellite Navigation System
496
Chapter Summary
497
High-Tech Talk
498
OSI Reference Model: The Driving Force Behind Network Communications
498
Companies on the Cutting Edge
499
Cisco Systems
499
Qualcomm
499
Technology Trailblazers
499
Robert Metcalfe
499
Patricia Russo
499
Chapter Review
500
Key Terms
502
Checkpoint
503
Learn It Online
506
Learn How To
508
Web Research
510
Case Studies
511
Database Management
512
Databases, Data and Information
514
Data Integrity
516
Qualities of Valuable Information
516
The Hierarchy of Data
517
Characters
518
Fields
518
Records
519
Files
519
Ethics & Issues: Is a National Identification Card Necessary for the Security of the Nation?
519
Maintaining Data
520
Adding Records
520
Changing Records
521
Deleting Records
522
Validating Data
522
File Processing Versus Databases
524
File Processing Systems
524
The Database Approach
524
Ethics & Issues: Should States Share Criminal Databases?
525
Database Management Systems
526
Data Dictionary
527
File Retrieval and Maintenance
528
Looking Ahead: WinFS Offers Improved File Organizing System
528
Data Security
530
Ethics & Issues: Who Should Be Granted Access to Student Records?
531
Backup and Recovery
531
Relational, Object-Oriented, and Multidimensional Databases
532
Relational Databases
533
Object-Oriented Databases
534
Multidimensional Databases
535
Web Databases
536
Ethics & issues: Can the Government Be Trusted with Personal Data?
537
Database Administration
537
Database Design Guidelines
537
Role of the Database Anaylsts and Administrators
538
Role of the Employee as User
538
Chapter Summary
539
Looking Ahead: Preserving Electronic Files for Future Generations
539
High-Tech Talk
540
Ensure Consistency of your Data with Normalization
540
Companies on the Cutting Edge
541
Oracle
541
Sybase
541
Technology Trailblazers
541
E. F. Codd
541
Larry Ellison
541
Chapter Review
542
Key Terms
544
Checkpoint
545
Learn It Online
548
Learn How To
550
Web Research
552
Case Studies
553
Computer Security, Ethics, and Privacy
554
Computer Security Risks
556
Internet and Network Attacks
558
Computer Viruses, Worms, and Trojan Horses
558
Ethics & Issues: How Should Virsus Authors Be Punished?
558
Safeguards against Computer Viruses, Worms, and Trojan Horses
560
Denial of Service Attacks
562
Back Doors
562
Spoofing
563
Safeguards against DoS Attacks, Back Doors, and IP Spoofing
563
Firewalls
563
Intrusion Detection Software
564
Honeypots
564
Unauthorized Access and Use
564
Safeguards against Unauthorized Access and Use
565
Identifying and Authenticating Users
565
Ethics & Issues: Should Schools Use Biometric Devices?
568
Looking Ahead: Three-Dimensional Facial Recognition Software - A Step Forward for Security
568
Hardware Theft and Vandalism
569
Safeguards against Hardware Theft and Vandalism
569
Software Theft
570
Safeguards against Software Theft
570
Information Theft
571
Safeguards against Information Theft
572
Encryption
572
System Failure
574
Safeguards against System Failure
574
Backing Up - The Ultimate Safeguard
576
Wireless Security
576
Ethics and Society
578
Information Accuracy
579
Intellectual Property Rights
579
Ethics & Issues: Who Should Control the Content of Your CDs and DVDs?
580
Codes of Conduct
580
Information Privacy
580
Electronic Profiles
581
Cookies
582
Spyware and Adware
583
Ethics & Issues: Should Spyware Be Legal?
583
Spam
584
Ethics & Issues: Who Should Protect You from Identity Theft?
584
Phishing
584
Privacy Laws
585
Employee Monitoring
586
Content Filtering
586
Computer Forensics
587
Looking Ahead: Computer Knowledge Assessment Using Brain Fingerprinting
587
Health Concerns of Computer Use
587
Computers and Health Risks
587
Ergonomics and Workplace Design
589
Computer Addiction
589
Green Computing
590
Chapter Summary
591
High-Tech Talk
592
The Key(s) to Making Encryption Work
592
Companies on the Cutting Edge
593
McAfee
593
Symantec
593
Technology Trailblazers
593
Donn Parker
593
Cliff Stoll
593
Chapter Review
594
Key Terms
596
Checkpoint
597
Learn It Online
600
Learn How To
602
Web Research
604
Case Studies
605
Spcial Features Computer Forensics
606
Information System Development
618
What is the System Development Cycle?
620
Phases in the System Development Cycle
620
Guidelines for System Development
621
Who Participates in the System Development Cycle?
622
Looking Ahead: Computer Systems Design and the Future
623
Project Management
623
Feasibility Assessment
625
Documentation
625
Data and Information Gathering Techniques
625
Ethics & Issues: Do You Work Harder When Someone Is Watching?
626
What Initiates the System Development Cycle?
626
Ethics & Issues: How Should Employers Combat Poor E-Mail Writing Skills?
627
Web Stop Cafe - A Case Study
628
Planning Phase
629
Planning at Web Stop Cafe
629
Analysis Phase
630
The Preliminary Investigation
630
Preliminary Investigation at Web Stop Cafe
631
Detailed Analysis
631
Process Modeling
632
Object Modeling
635
The System Proposal
636
Ethics & Issues: Does Keeping Up with Technology Provide a Strategic Advantage?
637
Detailed Analysis at Web Stop Cafe
638
Design Phase
639
Acquiring Necessary Hardware and Software
639
Identifying Technical Specifications
639
Soliciting Vendor Proposals
639
Testing and Evaluating Vendor Proposals
640
Making a Decision
640
Hardware Acquisition at Web Stop Cafe
641
Detailed Design
641
Prototyping
642
CASE Tools
642
Quality Review Techniques
643
Detailed Design at Web Stop Cafe
643
Implementation Phase
643
Develop Programs
643
Install and Test the New System
644
Looking Ahead: Putting Vista to the Test
644
Train Users
644
Convert to the New System
644
Implementation at Web Stop Cafe
645
Ethics & Issues: What Type of System Conversion Is Best?
645
Operation, Support, and Security Phase
646
Developing a Computer Security Plan
646
Support at Web Stop Cafe
647
Chapter Summary
647
High-Tech Talk
648
Benchmarking: Testing Performance through Calculations
648
Companies on the Cutting Edge
649
Computer Associates
649
Zebra Technologies
649
Technology Trailblazers
649
Ed Yourdon
649
Tom DeMarco
649
Chapter Review
650
Key Terms
652
Checkpoint
653
Learn It Online
656
Learn How To
658
Web Research
660
Case Studies
661
Programming Languages and Program Development
662
Computer Programs and Programming Languages
664
Low-Level Languages
665
Procedural Languages
66
COBOL
668
C
668
Object-Oriented Programming Languages
669
Java
669
C++
670
C#
670
Visual Studio 2005
670
Delphi
672
PowerBuilder
673
Visual Programming Languages
673
Other Programming Languages
674
RPG
674
4GLs
674
Classic Programming Languages
675
Looking Ahead: The Future of Programming Languages
675
Other Program Development Tools
676
Application Generators
676
Macros
676
Ethics & Issues: Should All Students Be Required to Learn Computer Programming?
677
Web Page Development
678
HTML
678
Scripts, Applets, Servlets, and ActiveX Controls
679
Scripting Languages
680
Dynamic HTML
682
XHTML, XML, and WML
682
Ajax
683
Web Page Authoring Software
683
Ethics & Issues: Should A Web Page Author Know HTML?
683
Multimedia Program Development
684
The Program Development Cycle
685
What Initiates the Program Development Cycle?
685
Looking Ahead: Robotic Vehicles Move Forward
686
Step 1 - Analyze Requirements
686
Step 2 - Design Solution
687
Structured Design
687
Object-Oriented Design
688
Control Structures
688
Design Tools
690
Step 3 - Validate Design
693
Step 4 - Implement Design
693
Ethics & Issues: Should Programmers Be Able to Copy Another Program's User Interface?
694
Extreme Programming
695
Step 5 - Test Solution
695
Ethics & Issues: Who is Responsible for Bugs?
696
Step 6 - Document Solution
696
Chapter Summary
697
High-Tech Talk
698
Structuring Data for the Web Using XML
698
Companies on the Cutting Edge
699
Electronic Arts
699
Sun Microsystems
699
Technology Trailblazers
699
Grace Hopper
699
James Gosling
699
Chapter Review
700
Key Terms
702
Checkpoint
703
Learn It Online
706
Learn How To
708
Web Research
710
Case Studies
711
Enterprise Computing
712
What is Enterprise Computing?
714
Organizational Structure of an Enterprise
716
Levels of Users
717
Looking Ahead: The CEO of the Future
718
How Managers Use Information
718
Information Systems in the Enterprise
720
Information Systems within Functional Units
720
General Purpose Information Systems
725
Integrated Information Systems
730
Ethics & Issues: Should Companies Share Customer Information?
730
Enterprise-Wide Technologies
733
Portals
733
Data Warehouses
734
EDI
735
Extranets
735
Web Services
735
Document Management Systems
736
Workflow
736
Virtual Private Network
736
E-Commerce
737
E-Retailing
737
Ethics & Issues: Would You Buy Merchandise Online?
738
Finance
738
Travel
739
Entertainment and Media
739
Ethics & Issues: Would You Trust an Online Medical Diagnosis?
739
Health
739
Other Business Services
740
Enterprise Hardware
741
RAID
741
Network Attached Storage and Storage Area Networks
742
Enterprise Storage Systems
743
Ethics & Issues: How Much Data Should Companies Be Required to Keep?
743
Blade Servers
744
Thin Clients
744
High-Availability Systems
745
Scalability
745
Utility and Grid Computing
745
Looking Ahead: The Future of Grid Computing
746
Interoperability
746
Backup Procedures
746
Disaster Recovery Plan
747
Chapter Summary
749
High-Tech Talk
750
Neural Networks: Learning from Experience
750
Companies on the Cutting Edge
751
SAP
751
IBM
751
Technology Trailblazers
751
Mark Hurd
751
Jim Clark
751
Chapter Review
752
Key Terms
754
Checkpoint
755
Learn It Online
758
Learn How To
760
Web Research
762
Case Studies
763
Special Feature Enterprise Order Processing: A Case Study
764
Computer Careers and Certification
774
The Computer Industry
776
Ethics & Issues: Outsourcing Computer Jobs - A Threat to American Workers?
777
Careers in the Computer Industry
778
General Business and Government Organizations and Their IT Departments
778
Looking Ahead: Tomorrow's Jobs in Information Technology
779
Computer Equipment Field
782
Ethics & Issues: Should Work Visas Be Issued to Foreign IT Workers?
782
Computer Software Field
782
Computer Service and Repair Field
783
Computer Sales
783
Computer Education and Training Field
784
IT Consulting
784
Preparing for a Career in the Computer Industry
785
Attending a Trade School
785
Attending a College or University
786
Ethics & Issues: Should Colleges Teach Students How to Create Computer Virses?
787
Searching for Computer-Related Jobs
787
Planning for Career Development
789
Professional Organizations
789
Looking Ahead: Women Connect Professionally Online
789
Professional Growth and Continuing Education
790
Computer Publications and Web Sites
791
Certification
792
Certification Benefits
792
Choosing a Certification
794
Preparing for Certification
794
Certification Examinations
795
A Guide to Certification
796
Ethics & Issues: Should Lifetime Certification Be Grand for Computer Professionals?
796
Application Software Certifications
796
Operating System Certifications
797
Programming/Developer Certifications
797
Hardware Certifications
798
Networking Certifications
798
Computer Forensics Certifications
799
Security Certifications
799
Internet Certifications
800
Database System Certifications
800
Chapter Summary
801
High-Tech Talk
802
Companies on the Cutting Edge
803
Monster
803
ZDNet
803
Technology Trailblazers
803
Steve Ballmer
803
Steve Wozniak
803
Chapter Review
804
Key Terms
806
Checkpoint
807
Learn It Online
810
Learn How To
812
Web Research
814
Case Studies
815
Special Feature Digital Entertainment
816
Appendix A: Coding Schemes and Number Systems 1
Appendix B: Quiz Yourself Answers 5
Appendix C: Computer Acronyms 13

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program