did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780131878860

Technology In Action, Complete

by ; ;
  • ISBN13:

    9780131878860

  • ISBN10:

    0131878867

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2007-01-01
  • Publisher: Prentice Hall
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $112.66

Summary

For introductory courses in computer concepts or computer literacy often including instruction in Microsoft Office. & A Computer Concepts Text Focused on Today& rs" s Student! & Technology in Action engages students by combining& a unique teaching approach with rich companion media.

Author Biography

Mary Anne Poatsy is an adjunct faculty member at Montgomery County Community College. Kendall Martin has been teaching since 1988 at a number of institutions, including Villanova University, DeSales University, Arcadia University, Ursinus College, County College of Morris, and Montgomery County Community College, at both the undergraduate and master's degree level. Alan Evans is currently the director of computer science for Montgomery County Community College.

Table of Contents

Why Computers Matter to You: Becoming Computer Fluent
2(38)
Becoming a Savvy Computer User and Consumer
4(1)
Being Prepared for Your Career
5(12)
Computers in Business: Working in a Data Mine?
6(1)
Computers in Retail: Let Me Look That Up for You
6(1)
Computers in Shipping: UPS Data on the Go
7(1)
Computers in the Arts: Shall We Dance?
7(2)
Computers in the Medical Field: Fact or Science Fiction?
9(1)
Computers in Law Enforcement: Put Down That Mouse---You're Under Arrest!
10(2)
Computers in the Legal Fields: Welcome to the Virtual Courtroom
12(1)
Computers in Education: And on the Left, You See the Mona Lisa
12(2)
Computers and the Sciences: Programming the Perfect Storm
14(1)
Computers in Sports: Bend Your Elbow Another Two Degrees?
15(1)
Computer Gaming Careers: Now Bigger Than Hollywood!
16(1)
Computers at Home: Just Program It and Forget It
16(1)
Getting Ready for the Technology of Tomorrow
17(3)
Nanoscience: The Next ``Big'' Thing
17(1)
Biomedical Chip Implants: Combining Humans with Machines?
18(1)
Artificial Intelligence: Will Computers Become Human?
19(1)
Understanding the Challenges Facing a Digital Society
20(2)
Trends in It: Ethics: Knowledge Is Power: Bridging the Digital Divide
21(1)
Becoming Computer Fluent
22(18)
Computers Are Data Processing Devices
22(1)
Bits and Bytes: The Language of Computers
22(2)
Computer Hardware
24(1)
Computer Software
25(1)
Computer Platforms: PCs and MACs
26(1)
Specialty Computers
26(2)
Dig Deeper: What Can You Do with a Digital Home?
28(12)
Looking at Computers: Understanding the Parts
40(48)
Your Computer's Hardware
42(1)
Input Devices
42(6)
Keyboards
42(3)
Mice and Other Pointing Devices
45(2)
Inputting Sound
47(1)
Output Devices
48(6)
Monitors
48(2)
Printers
50(3)
Dig Deeper: How Ink-Jet and Laser Printers Work
53(1)
Outputting Sound
54(1)
The System Unit
54(8)
On the Front Panel
55(3)
On the Back
58(2)
Inside the System Unit
60(2)
Setting It All Up: Ergonomics
62(26)
Trends in It: Emerging Technologies: Tomorrow's Displays
64(12)
Technology in Focus: The History of the PC
76(12)
Using the Internet: Making the Most of the Web's Resources
88(42)
Internet Basics
90(6)
The Origin of the Internet
90(1)
The Web Versus the Internet
90(1)
The Internet's Clients and Servers
91(1)
Connecting to the Internet
92(1)
Dial-Up Connections
92(1)
Broadband Connections
93(3)
Choosing the Right Internet Connection Option
96(1)
Finding an Internet Service Provider
96(1)
Choosing an ISP
97(1)
Navigating the Web: Web Browsers
97(1)
Getting Around the Web: URLs, Hyperlinks, and Other Tools
98(4)
URLs
99(1)
Hyperlinks and Beyond
100(1)
Favorites and Bookmarks
100(1)
Tabbed Browsing
101(1)
Searching the Web: Search Engines and Subject Directories
102(5)
Search Engines
102(2)
Dig Deeper: Refining Your Web Searches: Boolean Operators
104(2)
Subject Directories
106(1)
Evaluating Web Sites
106(1)
Communicating Through the Internet: E-Mail and Other Technologies
107(4)
E-Mail
107(1)
Weblogs (Blogs)
108(1)
Chat Rooms
109(1)
Instant Messaging
110(1)
Newsgroups
110(1)
Listservs
111(1)
Managing Online Annoyances
111(5)
Pop-Ups
112(1)
Cookies
113(1)
Spyware
113(1)
Phishing and Internet Hoaxes
114(1)
Trends in It: Ethics: What Can You Borrow from the Internet?
115(1)
Conducting Business Over the Internet: E-Commerce
116(1)
E-Commerce Safeguards
116(1)
Web Entertainment: Multimedia and Beyond
117(2)
The Future of the Internet
119(11)
Application Software: Programs That Let You Work and Play
130(60)
The Nuts and Bolts of Software
132(1)
Productivity Software
132(11)
Word Processing Software
132(2)
Spreadsheet Software
134(2)
Presentation Software
136(1)
Database Software
137(1)
Personal Information Manager (PIM) Software
137(1)
Productivity Software Tools
138(1)
Integrated Software Applications vs. Software Suites
138(2)
Dig Deeper: Speech-Recognition Software
140(3)
Financial and Business-Related Software
143(3)
Personal Financial Software
143(2)
General Business Software
145(1)
Specialized Business Software
146(1)
Graphics and Multimedia Software
146(5)
Desktop Publishing Software
146(1)
Image-Editing Software
147(1)
Drawing Software
148(1)
Computer-Aided Design Software
149(1)
Video-Editing Software
149(1)
Web Page Authoring Software
150(1)
Educational and Reference Software
151(1)
Educational Software
151(1)
Reference Software
152(1)
Entertainment Software
152(2)
Digital Audio Software
154(1)
Communications Software
154(2)
Trends in It: Emerging Technologies: Is It Real or Is It Virtual?
155(1)
Getting Help with Software
156(1)
Buying Software
157(3)
Standard Software
157(1)
Discounted Software
158(1)
Freeware and Shareware
158(2)
Software Versions and Systems Requirements
160(1)
Installing/Uninstalling and Opening Software
160(30)
Trends In It: Ethics: Can I Borrow Software That I Don't Own?
163(11)
Technology in Focus: Digital Entertainment
174(16)
Using System Software: The Operating System, Utility Programs, and File Management
190(44)
System Software Basics
192(1)
Operating System Categories
192(2)
Real-Time Operating Systems
193(1)
Single-User Operating Systems
193(1)
Multiuser Operating Systems
194(1)
Desktop Operating Systems
194(4)
Microsoft Windows
195(1)
Mac OS
196(1)
Unix
196(1)
Linux
196(1)
Trends In It: Emerging Technologies: Open-Source Software---Why Isn't Everyone Using Linux?
197(1)
What the Operating System Does
198(5)
The User Interface
199(1)
Processor Management
200(1)
Memory and Storage Management
201(1)
Hardware and Peripheral Device Management
201(1)
Software Application Coordination
202(1)
The Boot Process: Starting Your Computer
203(4)
Step 1: Activating BIOS
204(1)
Step 2: Performing the Power-On Self-Test
204(1)
Step 3: Loading the Operating System
204(1)
Step 4: Checking Further Configurations and Customizations
205(1)
Handling Errors in the Boot Process
205(2)
The Desktop and Windows Features
207(2)
Organizing Your Computer: File Management
209(5)
Organizing Your Files
209(2)
Viewing and Sorting Files and Folders
211(1)
Naming Files
212(2)
Working With Files
214(1)
Utility Programs
214(20)
Display Utilities
216(1)
The Add or Remove Programs Utility
216(1)
File Compression Utilities
217(1)
System Maintenance Utilities
218(1)
System Restore and Backup Utilities
219(1)
Dig Deeper: How Disk Defragmenter Utilities Work
220(2)
The Task Scheduler Utility
222(1)
Accessibility Utilities
222(12)
Understanding and Assessing Hardware: Evaluating Your System
234(56)
To Buy or to Upgrade: That Is the Question
236(1)
What Is Your Ideal Computer?
237(1)
Assessing Your Hardware: Evaluating Your System
238(1)
Evaluating the CPU Subsystem
239(3)
Upgrading Your CPU
240(2)
Evaluating RAM: The Memory Subsystem
242(3)
Virtual Memory
243(1)
Adding RAM
244(1)
Evaluating the Storage Subsystem
245(7)
The Hard Disk Drive
245(1)
Dig Deeper: How a Hard Disk Drive Works
246(2)
Portable Storage Options: The Floppy and Beyond
248(4)
Upgrading Your Storage Subsystem
252(1)
Evaluating the Video Subsystem
252(4)
Video Cards
252(1)
Trends In It: Ethics: CD and DVD Technology: A Free Lunch---or at Least a Free Copy
253(1)
Monitors
254(2)
Evaluating the Audio Subsystem
256(2)
Speakers
256(1)
Sound Cards
256(2)
Evaluating Port Connectivity
258(4)
Adding Ports: Expansion Cards and Hubs
260(2)
Evaluating System Reliability
262(2)
Trends In It: Computers in Society: How to Donate Your Old Computer Safely
263(1)
Making the Final Decision
264(26)
Technology in Focus: Computing Alternatives
276(14)
Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses
290(44)
Networking Fundamentals
292(1)
Network Architectures
293(1)
Describing Networks Based on Network Control
293(1)
Describing Networks Based on Distance
294(1)
Network Components
294(2)
Transmission Media
294(1)
Network Adapters
295(1)
Network Navigation Devices
295(1)
Networking Software
295(1)
Types of Peer-to-Peer Networks
296(8)
Wired Ethernet Networks
296(4)
Wireless Ethernet Networks
300(2)
Power-Line Networks
302(1)
Phoneline Networks
303(1)
Choosing a Peer-to-Peer Network
304(1)
Configuring Software for Your Home Network
305(3)
Trends In It: Emerging Technologies: Grid Computing: Fighting Bioterrorism with Your Computer
308(1)
Keeping Your Home Computer Safe
308(1)
Computer Threats: Hackers
309(5)
What Hackers Steal
310(1)
Trojan Horses
310(1)
Trends In It: Computers In Society: Identity Theft: Is There More Than One You Out There?
311(1)
Denial of Service Attacks
311(1)
How Hackers Gain Access
312(2)
Computer Safeguards: Firewalls
314(3)
Dig Deeper: How Firewalls Work
314(2)
Types of Firewalls
316(1)
Is Your Computer Secure?
316(1)
Securing Wireless Networks
317(1)
Computer Threats: Computer Viruses
318(3)
Types of Viruses
320(1)
Virus Classifications
321(1)
Computer Safeguards: Antivirus Software
321(13)
Other Security Measures
322(1)
Trends in It: Careers: Cybercops on the Beat: Computer Security Careers
323(11)
Mobile Computing: Keeping Your Data on Hand
334(52)
Mobile Computing: Is It Right for You?
336(2)
Mobile Device Limitations
336(2)
Mobile Computing Devices
338(1)
Paging Devices
338(1)
Cellular Phones
339(4)
Cell Phone Hardware
339(2)
How Cell Phones Work
341(1)
Cell Phone Features: Text Messaging
341(1)
Cell Phone Internet Connectivity
342(1)
MP3 Players
343(5)
MP3 Hardware
345(1)
MP3 Flash Memory and File Transfer
345(1)
MP3 Ethical Issues: Napster and Beyond
346(1)
Trends In It: Emerging Technologies: Why Carry Your Data When You Can Wear It?
347(1)
Personal Digital Assistants (PDAs)
348(6)
PDA Hardware
348(1)
PDA Operating Systems
349(1)
PDA Memory and Storage
350(1)
PDA File Transfer and Synchronization
351(1)
PDA Internet Connectivity
352(1)
PDA Software and Accessories
353(1)
PDA or Cell Phone?
353(1)
Dig Deeper: The Power of GPS
354(1)
Tablet PCs
354(5)
Tablet PC Hardware
356(1)
Tablet Software
357(1)
Tablet or PDA?
357(1)
Trends In It: Ubiquitous Networking: Wherever You Go, There You Are
358(1)
Laptops
359(27)
Laptop Hardware
359(1)
Laptop Operating Systems and Ports
359(1)
Laptop Batteries and Accessories
360(1)
Laptop or Desktop?
361(1)
Trends In It: Emerging Technologies: Nanotubes: The Next Big Thing Is Pretty Darn Small!
362(12)
Technology in Focus: Protecting Your Computer and Backing Up Your Data
374(12)
Behind the Scenes: A Closer Look at System Hardware
386(32)
Digital Data: Switches and Bits
388(5)
Electronic Switches
388(1)
The Binary Number System
389(2)
Dig Deeper: Advanced Binary and Hexadecimal Notations
391(2)
The CPU: Processing Digital Information
393(6)
The CPU Machine Cycle
395(1)
Stage 1: The Fetch Stage
396(1)
Stage 2: The Decode Stage
397(1)
Stage 3: The Execute Stage
398(1)
Stage 4: The Store Stage
398(1)
Trends In It: Emerging Technologies: Printable Processors: The Ultimate in Flexibility
399(1)
RAM: The Next Level of Temporary Storage
399(2)
Types of RAM
400(1)
Buses: The CPU's Data Highway
401(2)
Making Computers Even Faster: Advanced CPU Designs
403(15)
Pipelining
404(1)
Specialized Multimedia Instructions
405(1)
Multiple Processing Efforts
406(1)
Trends in It: Emerging Technologies: Computer Technology Changing the Face of Medicine
407(11)
Behind the Scenes: Software Programming
418(44)
The Life Cycle of an Information System
420(3)
System Development Life Cycle
420(2)
Trends In It: Careers: Considering a Career in Systems Development?
422(1)
The Life Cycle of a Program
423(1)
Describing the Problem: The Problem Statement
424(2)
Making a Plan: Algorithm Development
426(5)
Developing an Algorithm: Decision Making and Design
426(3)
Top-Down Design
429(1)
Object-Oriented Analysis
430(1)
Coding: Speaking the Language of the Computer
431(8)
Categories of Programming Languages
432(1)
Creating Code: Writing the Program
433(1)
Dig Deeper: The Building Blocks of Programming Languages: Syntax, Keywords, Data Types, and Operators
434(4)
Compilation
438(1)
Coding Tools: Integrated Development Environments
438(1)
Debugging: Getting Rid of Errors
439(1)
Finishing the Project: Testing and Documentation
440(1)
Programming Languages: Many Languages for Many Projects
441(21)
Selecting the Right Language
442(1)
Windows Applications
442(3)
Web Applications: HTML/XHTML and Beyond
445(4)
The Next Great Language
449(2)
Trends In It: Computers in Society: Alice: Making Programming Fun and Approachable
451(11)
Behind the Scenes: Databases and Information Systems
462(42)
Life Without Databases
464(1)
Database Building Blocks
465(5)
Advantages of Using Databases
466(1)
Database Terminology
467(2)
Primary Keys
469(1)
Database Types
470(1)
Relational Databases
470(1)
Object-Oriented Databases
470(1)
Object-Relational Databases
470(1)
Database Management Systems: Basic Operations
471(9)
Creating Databases and Entering Data
471(2)
Input Forms
473(1)
Data Validation
473(2)
Viewing and Sorting Data
475(1)
Dig Deeper: Structured Query Language (SQL)
476(2)
Extracting or Querying Data
478(1)
Trends in It: Computers in Society: Can a Database Catch a Criminal?
479(1)
Outputting Data
480(1)
Relational Database Operations
480(3)
Normalization of Data
480(3)
Data Storage
483(3)
Data Warehouses
483(1)
Trends In It: Computers in Society: Need Cash? Use Databases to Find Your Property
484(1)
Populating Data Warehouses
485(1)
Data Staging
486(1)
Data Marts
486(1)
Managing Data: Information Systems
486(5)
Office Support Systems
487(1)
Transaction Processing Systems
488(1)
Management Information Systems
489(1)
Decision Support Systems
489(1)
Internal and External Data Sources
490(1)
Model Management Systems
490(1)
Knowledge-Based Systems
491(1)
Data Mining
491(13)
Trends In It: Emerging Technologies: Web Portal Enables Krispy Kreme to Manage Its Dough . . . Without Going Nuts!
492(12)
Behind the Scenes: Networking and Security
504(42)
Networking Advantages
506(1)
Client/Server Networks
506(2)
Classifications of Client/Server Networks: LANs, WANs, and MANs
508(2)
Constructing Client/Server Networks
510(1)
Servers
511(2)
Print Servers
512(1)
Application Servers
512(1)
Database Servers
512(1)
E-Mail Servers
512(1)
Communications Servers
512(1)
Web Servers
513(1)
Network Topologies
513(5)
Bus Topology
513(1)
Ring Topology
514(2)
Star Topology
516(2)
Comparing Topologies
518(1)
Transmission Media
518(4)
Wired Transmission Media
519(2)
Wireless Media Options
521(1)
Comparing Transmission Media
521(1)
Network Operating Systems
522(3)
Trends In It: Emerging Technologies: Virtual Network Computing Is Here and It's Free
523(1)
Dig Deeper: The OSI Model: Defining Protocol Standards
524(1)
Network Adapters
525(2)
Network Navigation Devices
527(3)
MAC Addresses
527(1)
Repeaters and Hubs
528(1)
Switches and Bridges
528(1)
Routers
528(2)
Network Security
530(16)
Authentication
530(1)
Access Privileges
530(1)
Physical Protection Measures
530(2)
Trends In It: Emerging Technologies: Wi-Fi Phones Keep Doctors and Nurses Connected
532(1)
Firewalls
533(2)
Trends In It: Computers in Society: What's Shakin'? California Maintains a Reliable Network to Respond to Earthquake Emergencies
535(11)
Behind the Scenes: The Internet: How It Works
546(55)
The Management of the Internet
548(1)
Internet Networking
548(5)
Connecting Internet Service Providers
549(1)
T Lines
550(1)
Network Access Points
550(2)
Points of Presence
552(1)
The Network Model of the Internet
552(1)
Data Transmission and Protocols
553(2)
Packet Switching
554(1)
TCP/IP
555(1)
IP Addresses and Domain Names
555(5)
Domain Names
557(1)
DNS Servers
557(1)
Dig Deeper: Making the Connection: Connection-Oriented Versus Connectionless Protocols
558(2)
Other Protocols: FTP and Telnet
560(1)
HTTP, HTML, and Beyond
561(5)
HTTP and SSL
562(1)
HTML/XHTML
562(1)
The Common Gateway Interface
563(1)
Client-Side Applications
564(1)
XML
565(1)
Communications Over the Internet
566(35)
Trends In It: Careers: If You Build It, Will They Come? Web Development and Design Careers
567(1)
E-mail
567(2)
Trends In It: Computers in Society: Have You Ever Used an Extranet or a Virtual Private Network?
569(1)
E-Mail Security: Encryption and Specialized Software
570(2)
Instant Messaging
572(2)
Trends In It: Emerging Technologies: The Evolving Internet
574(12)
Technology in Focus: Careers in IT
586(15)
Glossary 601(20)
Index 621(20)
Credits 641

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program