did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781418843724

Discovering Computers: Fundamentals, Third Edition

by ; ;
  • ISBN13:

    9781418843724

  • ISBN10:

    1418843725

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2006-02-09
  • Publisher: Course Technology
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $217.66 Save up to $1.09
  • Buy New
    $216.57
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 24-48 HOURS

Supplemental Materials

What is included with this book?

Summary

This third edition, from the Shelly Cashman Series, covers the same breadth, but with less depth as Discovering Computers 2007: Complete. This title is ideal for a short course on computer concepts or in application software courses. With the Shelly Cashman Series' project-oriented, step-by-step pedagogy, and full-color screenshots, this book includes new exercises, and tools on the Online Companion.

Table of Contents

Introduction to Computersp. 1
A World of Computersp. 2
What is a Computer?p. 3
Data and Informationp. 3
Advantages and Disadvantages of Using Computersp. 4
Looking Ahead: Medical Breakthroughs with Computer Implants, Devicesp. 5
Information Processing Cyclep. 5
The Components of a Computerp. 6
Input Devicesp. 6
Output Devicesp. 7
System Unitp. 7
Storage Devicesp. 7
Communication Devicesp. 8
Networks and the Internetp. 8
Computer Softwarep. 10
System Softwarep. 10
Application Softwarep. 11
Ethics & Issues: Is Computer Gaming More Good than Bad?p. 11
Installing and Running Programsp. 11
Software Developmentp. 12
Categories of Computersp. 13
Personal Computersp. 14
Desktop Computersp. 14
Mobile Computers and Mobile Devicesp. 14
Notebook Computersp. 14
Mobile Devicesp. 15
Game Consolesp. 16
Serversp. 16
Mainframesp. 17
Supercomputersp. 17
Embedded Computersp. 17
Examples of Computer Usagep. 18
Home Userp. 18
Ethics & Issues: Does Internet Dating Really Work?p. 19
Small Office/Home Office Userp. 20
Mobile Userp. 20
Power Userp. 21
Large Business Userp. 21
Computer Applications in Societyp. 22
Looking Ahead: Robots Perform Mundane Tasks, Entertainp. 22
Educationp. 22
Financep. 23
Governmentp. 23
Health Carep. 23
Sciencep. 24
Publishingp. 25
Travelp. 25
Manufacturingp. 25
Chapter Summaryp. 26
Companies on the Cutting Edgep. 27
Dellp. 27
Apple Computerp. 27
Technology Trailblazersp. 27
Bill Gatesp. 27
Anne Mulcahyp. 27
Chapter Reviewp. 28
Key Termsp. 29
Checkpointp. 30
Web Researchp. 31
Learn How Top. 32
Learn It Onlinep. 34
Special Feature: Timeline: Milestones in Computer Historyp. 35
The Internet and World Wide Webp. 49
The Internetp. 50
How the Internet Worksp. 51
Connecting to the Internetp. 51
Access Providersp. 52
How Data Travels the Internetp. 52
Internet Addressesp. 53
The World Wide Webp. 54
Browsing the Webp. 54
Web Addressesp. 56
Navigating Web Pagesp. 57
Looking Ahead: Internet Speeds into the Futurep. 57
Searching for Information on the Webp. 57
Looking Ahead: 3-D Search Engines Get the Picturep. 61
Types of Web Sitesp. 61
Ethics & Issues: Smart Photo Phones - An Invasion of One's Privacy or Public Service?p. 63
Evaluating a Web Sitep. 63
Multimedia on the Webp. 64
Web Publishingp. 66
E-Commercep. 67
Other Internet Servicesp. 68
E-Mailp. 69
FTPp. 71
Newsgroups and Message Boardsp. 71
Mailing Listsp. 71
Chat Roomsp. 71
Instant Messagingp. 72
Internet Telephonyp. 73
Netiquettep. 73
Chapter Summaryp. 74
Ethics & Issues: Should Companies Be Able to Track Your Online Habits?p. 74
Companies on the Cutting Edgep. 75
Googlep. 75
Yahoo!p. 75
Technology Trailblazersp. 75
Tim Berners-Leep. 75
Meg Whitmanp. 75
Chapter Reviewp. 76
Key Termsp. 77
Checkpointp. 78
Web Researchp. 79
Learn How Top. 80
Learn It Onlinep. 82
Special Feature: Making Use of the Webp. 83
Application Softwarep. 99
Application Softwarep. 100
The Role of System Softwarep. 101
Working with Application Softwarep. 102
Looking Ahead: User Interfaces of the Futurep. 103
Business Softwarep. 104
Word Processing Softwarep. 105
Developing a Documentp. 106
Spreadsheet Softwarep. 107
Database Softwarep. 108
Presentation Graphics Softwarep. 109
Note Taking Softwarep. 110
Personal Information Manager Softwarep. 110
PDA Business Softwarep. 110
Software Suitep. 110
Project Management Softwarep. 111
Accounting Softwarep. 111
Document Management Softwarep. 111
Enterprise Computing Softwarep. 112
Graphics and Multimedia Softwarep. 112
Computer-Aided Designp. 113
Desktop Publishing Software (for the Professional)p. 113
Paint/Image Editing Software (for the Professional)p. 113
Video and Audio Editing Software (for the Professional)p. 114
Ethics & Issues: What Should Be Done to Prevent Music and Video File Sharing?p. 114
Multimedia Authoring Softwarep. 114
Web Page Authoring Softwarep. 114
Software for Home, Personal, and Educational Usep. 115
Software Suite (for Personal Use)p. 116
Personal Finance Softwarep. 116
Legal Softwarep. 117
Tax Preparation Softwarep. 117
Desktop Publishing Software (for Personal Use)p. 117
Paint/Image Editing Software (for Personal Use)p. 118
Clip Art/Image Galleryp. 118
Video and Audio Editing Software (for Personal Use)p. 119
Home Design/Landscaping Softwarep. 119
Educational and Reference Softwarep. 119
Entertainment Softwarep. 120
Application Software for Communicationsp. 120
Ethics & Issues: Should Companies Monitor Employees' E-Mail?p. 120
Looking Ahead: Driving Down the Web Highwayp. 121
Popular Stand-Alone Utility Programsp. 122
Learning Aids and Support Tools for Application Softwarep. 122
Web-Based Trainingp. 123
Chapter Summaryp. 124
Ethics & Issues: Copying Software - A Computer Crime!p. 124
Companies on the Cutting Edgep. 125
Adobe Systemsp. 125
Microsoftp. 125
Technology Trailblazersp. 125
Dan Bricklinp. 125
Masayoshi Sonp. 125
Chapter Reviewp. 126
Key Termsp. 127
Checkpointp. 128
Web Researchp. 129
Learn How Top. 130
Learn It Onlinep. 132
The Components of the System Unitp. 133
The System Unitp. 134
The Motherboardp. 136
Processorp. 137
The Control Unitp. 137
The Arithmetic Logic Unitp. 137
Machine Cyclep. 138
The System Clockp. 138
Looking Ahead: Countries Seek Computer Speed Supremacyp. 139
Comparison of Personal Computer Processorsp. 139
Buying a Personal Computerp. 139
Ethics & Issues: Discarded Computer Parts: Whose Problem Is It?p. 139
Data Representationp. 140
Memoryp. 142
Bytes and Addressable Memoryp. 142
Memory Sizesp. 142
Types of Memoryp. 142
RAMp. 143
Ethics & Issues: How Much Should You Pay for a Computer?p. 144
Cachep. 144
ROMp. 145
Flash Memoryp. 145
CMOSp. 146
Memory Access Timesp. 146
Expansion Slots and Adapter Cardsp. 147
PC Cards, Flash Memory Cards, and USB Flash Drivesp. 147
Ports and Connectorsp. 148
Serial Portsp. 149
Parallel Portsp. 149
USB Portsp. 149
FireWire Portsp. 150
Special Purpose Portsp. 150
Busesp. 151
Baysp. 151
Power Supplyp. 152
Mobile Computers and Devicesp. 152
Looking Ahead: DNA Computer Works to Fight Cancerp. 153
Putting It All Togetherp. 154
Keeping Your Computer Cleanp. 155
Chapter Summaryp. 156
Companies on the Cutting Edgep. 157
AMDp. 157
Intelp. 157
Technology Trailblazersp. 157
Jack Kilbyp. 157
Gordon Moorep. 157
Chapter Reviewp. 158
Key Termsp. 159
Checkpointp. 160
Web Researchp. 161
Learn How Top. 162
Learn It Onlinep. 164
Input and Outputp. 165
What Is Input?p. 166
Keyboard and Pointing Devicesp. 167
The Keyboardp. 168
Mousep. 169
Ethics & Issues: Should the Government Set Computer Use Standards?p. 169
Trackballp. 170
Touchpadp. 170
Pointing Stickp. 170
Joystick and Wheelp. 171
Audio Player Control Padp. 171
Gamepadp. 171
Light Penp. 171
Touch Screenp. 171
Pen Inputp. 172
Other Types of Inputp. 173
Looking Ahead: Wearable Computers Make Performance Statementp. 173
Voice Inputp. 173
Input for PDAs, Smart Phones, and Tablet PCsp. 174
Digital Camerasp. 175
Video Inputp. 176
Scanners and Reading Devicesp. 177
Ethics & Issues: Scanner Errors at the Checkout Counter?p. 178
Looking Ahead: RFID Sensors Simplify, Monitor Tasksp. 179
Terminalsp. 180
Biometric Inputp. 181
What Is Output?p. 182
Display Devicesp. 183
LCD Monitors and Screensp. 184
Plasma Monitorsp. 185
CRT Monitorsp. 186
Printersp. 187
Producing Printed Outputp. 188
Nonimpact Printersp. 189
Ink-Jet Printersp. 189
Ethics & Issues: Is It Ethical to Refill an Ink-Jet Cartridge?p. 190
Photo Printersp. 190
Laser Printersp. 190
Thermal Printersp. 191
Mobile Printersp. 192
Plotters and Large-Format Printersp. 192
Impact Printersp. 192
Other Output Devicesp. 193
Speakers, Headphones, and Earphonesp. 193
Fax Machines and Fax Modemsp. 194
MultiFunction Peripheralsp. 194
Data Projectorsp. 195
Looking Ahead: Digital Cinema Just the Right Picturep. 195
Putting It All Togetherp. 196
Input and Output Devices for Physically Challenged Usersp. 197
Ethics & Issues: Should Web Sites Be Held Accountable for Accessibility Levels for Physically Challenged People?p. 197
Chapter Summaryp. 198
Companies on the Cutting Edgep. 199
Logitechp. 199
Hewlett-Packardp. 199
Technology Trailblazersp. 199
Douglas Engelbartp. 199
Donna Dubinskyp. 199
Chapter Reviewp. 200
Key Termsp. 202
Checkpointp. 203
Web Researchp. 204
Learn How Top. 205
Learn It Onlinep. 207
Special Feature: Digital Imaging and Video Technologyp. 208
Storagep. 219
Storagep. 220
Magnetic Disksp. 222
Hard Disksp. 223
Looking Ahead: Heat Increases Disk Capacityp. 223
Floppy Disksp. 228
Zip Disksp. 228
Optical Discsp. 229
CD-ROMsp. 231
CD-Rs and CD-RWsp. 232
Ethics & Issues: Is It Ethical to Use Pirated CDs or DVDs?p. 233
DVD-ROMsp. 233
Looking Ahead: Next-Generation DVDs a Burning Questionp. 233
Recordable and Rewritable DVDsp. 234
Tapep. 234
PC Cardsp. 235
Miniature Mobile Storage Mediap. 235
Flash Memory Cardsp. 236
USB Flash Drivesp. 236
Smart Cardsp. 237
Ethics & Issues: Should the World Become a Cashless Society?p. 237
Microfilm and Microfichep. 238
Enterprise Storagep. 238
Putting It All Togetherp. 239
Ethics & Issues: Who Should Be Looking at Your Medical Records?p. 239
Chapter Summaryp. 240
Companies on the Cutting Edgep. 241
Maxtorp. 241
SanDisk Corporationp. 241
Technology Trailblazersp. 241
Al Shugartp. 241
Mark Deanp. 241
Chapter Reviewp. 242
Key Termsp. 243
Checkpointp. 244
Web Researchp. 245
Learn How Top. 246
Learn It Onlinep. 248
Operating Systems and Utility Programsp. 249
System Softwarep. 250
Operating Systemsp. 251
Operating System Functionsp. 252
Starting a Computerp. 252
Providing a User Interfacep. 253
Managing Programsp. 253
Managing Memoryp. 255
Scheduling Jobsp. 255
Configuring Devicesp. 256
Establishing an Internet Connectionp. 256
Monitoring Performancep. 257
Providing File Management and Other Utilitiesp. 257
Ethics & Issues: Who Is Responsible for Operating System Security?p. 257
Controlling a Networkp. 257
Administering Securityp. 258
Operating System Utility Programsp. 259
File Managerp. 259
Image Viewerp. 259
Personal Firewallp. 260
Uninstallerp. 260
Disk Scannerp. 260
Disk Defragmenterp. 261
Diagnostic Utilityp. 261
Backup Utilityp. 261
Screen Saverp. 261
Types of Operating Systemsp. 262
Stand-Alone Operating Systemsp. 262
DOSp. 262
Windows XPp. 262
Windows Vistap. 263
Mac OS Xp. 264
UNIXp. 264
Linuxp. 265
Looking Ahead: The Future of Linuxp. 265
Ethics & Issues: Closed Source vs. Open Source Operating Systemsp. 265
Network Operating Systemsp. 266
Embedded Operating Systemsp. 266
Stand-Alone Utility Programsp. 267
Antivirus Programsp. 267
Spyware Removersp. 268
Internet Filtersp. 268
File Compressionp. 269
File Conversionp. 269
CD/DVD Burningp. 269
Personal Computer Maintenancep. 270
Chapter Summaryp. 270
Companies on the Cutting Edgep. 271
Red Hatp. 271
Symbianp. 271
Technology Trailblazersp. 271
Alan Kayp. 271
Linus Torvaldsp. 271
Chapter Reviewp. 272
Key Termsp. 273
Checkpointp. 274
Web Researchp. 275
Learn How Top. 276
Learn It Onlinep. 278
Special Feature: Buyer's Guide: How to Purchase A Personal Computerp. 279
Communications and Networksp. 295
Communicationsp. 296
Uses of Computer Communicationsp. 297
Internet, Web, E-Mail, Instant Messaging, Chat Rooms, Newsgroups, Internet Telephony, FTP, Web Folders, Video Conferencing, and Faxp. 298
Wireless Messaging Servicesp. 298
Ethics & Issues: High-Tech Cheating via Wireless Messaging Servicesp. 299
Wireless Internet Access Pointsp. 300
Cybercafesp. 301
Global Positioning Systemp. 301
Collaborationp. 302
Groupwarep. 302
Voice Mailp. 302
Web Servicesp. 302
Networksp. 303
LANs, MANs, and WANsp. 303
Network Architecturesp. 305
Network Topologiesp. 306
Intranetsp. 307
Network Communications Standardsp. 308
Communications Softwarep. 310
Ethics & Issues: Should Libraries Be Required to Hand Over Web Browser Logs to the Government?p. 310
Communications Over the Telephone Networkp. 310
Dial-Up Linesp. 311
Dedicated Linesp. 311
Communications Devicesp. 312
Dial-Up Modemsp. 313
ISDN and DSL Modemsp. 314
Cable Modemsp. 314
Wireless Modemsp. 314
Network Cardsp. 315
Wireless Access Pointsp. 315
Routersp. 315
Home Networksp. 316
Wired Home Networksp. 316
Wireless Home Networksp. 316
Communications Channelp. 317
Looking Ahead: Tech Firms Supporting Broadband over Power Lines (BPL)p. 319
Physical Transmission Mediap. 319
Twisted-Pair Cablep. 319
Coaxial Cablep. 320
Fiber-Optic Cablep. 320
Wireless Transmission Mediap. 320
Infraredp. 321
Broadcast Radiop. 321
Cellular Radiop. 321
Microwavesp. 321
Communications Satellitep. 321
Looking Ahead: Europe Develops Satellite Navigation Systemp. 322
Chapter Summaryp. 322
Companies on the Cutting Edgep. 323
Cisco Systemsp. 323
Qualcommp. 323
Technology Trailblazersp. 323
Robert Metcalfep. 323
Patricia Russop. 323
Chapter Reviewp. 324
Key Termsp. 325
Checkpointp. 326
Web Researchp. 327
Learn How Top. 328
Learn It Onlinep. 330
Database Managementp. 331
Databases, Data, and Informationp. 332
Data Integrityp. 333
Qualities of Valuable Informationp. 334
The Hierarchy of Datap. 334
Charactersp. 335
Fieldsp. 335
Recordsp. 336
Filesp. 336
Ethics & Issues: Are Portable Storage Devices a Threat to Businesses?p. 336
Maintaining Datap. 336
Adding Recordsp. 336
Changing Recordsp. 338
Deleting Recordsp. 338
Validating Datap. 339
File Processing Versus Databasesp. 340
File Processing Systemsp. 341
The Database Approachp. 341
Database Management Systemsp. 343
Data Dictionaryp. 343
File Retrieval and Maintenancep. 344
Looking Ahead: WinFS Offers Improved File Organizing Systemp. 345
Backup and Recoveryp. 346
Data Securityp. 346
Ethics & Issues: Who Should Be Granted Access to Student Records?p. 346
Relational, Object-Oriented, and Multidimensional Databasesp. 347
Relational Databasesp. 347
Object-Oriented Databasesp. 349
Multidimensional Databasesp. 349
Web Databasesp. 350
Ethics & Issues: Can the Government Be Trusted with Personal Data?p. 346
Database Administrationp. 351
Database Design Guidelinesp. 351
Role of the Database Analysts and Administratorsp. 351
Role of the Employee as Userp. 351
Chapter Summaryp. 352
Looking Ahead: Preserving Electronic Files for Future Generationsp. 352
Companies on the Cutting Edgep. 353
Oraclep. 353
Sybasep. 353
Technology Trailblazersp. 353
E. F. Coddp. 353
Larry Ellisonp. 353
Chapter Reviewp. 354
Key Termsp. 355
Checkpointp. 356
Web Researchp. 357
Learn How Top. 358
Learn It Onlinep. 360
Computer Security, Ethics, and Privacyp. 361
Computer Security Risksp. 362
Internet and Network Attacksp. 364
Computer Viruses, Worms, and Trojan Horsesp. 364
Safeguards against Computer Viruses, Worms, and Trojan Horsesp. 365
Denial of Service Attacksp. 367
Back Doorsp. 367
Spoofingp. 367
Safeguards against DoS Attacks, Back Doors, and IP Spoofingp. 367
Firewallsp. 367
Intrusion Detection Softwarep. 368
Unauthorized Access and Usep. 368
Safeguards against Unauthorized Access and Usep. 368
Identifying and Authenticating Usersp. 368
Looking Ahead: Three-Dimensional Facial Recognition Software - A Step Forward for Securityp. 370
Hardware Theft and Vandalismp. 371
Safeguards against Hardware Theft and Vandalismp. 371
Software Theftp. 372
Safeguards against Software Theftp. 372
Information Theftp. 373
Safeguards against Information Theftp. 373
Encryptionp. 373
System Failurep. 374
Safeguards against System Failurep. 374
Backing Up - The Ultimate Safeguardp. 375
Wireless Securityp. 375
Ethics and Societyp. 376
Information Accuracyp. 377
Intellectual Property Rightsp. 378
Ethics & Issues: Who Should Control the Content of Your CDs and DVDs?p. 379
Information Privacyp. 379
Electronic Profilesp. 380
Cookiesp. 380
Spyware and Adwarep. 381
Ethics & Issues: Should Spyware Be Legal?p. 381
Phishingp. 381
Spamp. 382
Privacy Lawsp. 382
Socail Engineeringp. 384
Employee Monitoringp. 384
Content Filteringp. 384
Computer Forensicsp. 385
Looking Ahead: Computer Knowledge Assessment Using Brain Fingerprintingp. 385
Health Concerns of Computer Usep. 385
Computers and Health Risksp. 385
Ergonomics and Workplace Designp. 386
Computer Addictionp. 387
Green Computingp. 387
Chapter Summaryp. 388
Companies on the Cutting Edgep. 389
McAfeep. 389
Symantecp. 389
Technology Trailblazersp. 389
Donn Parkerp. 389
Clifford Stollp. 389
Chapter Reviewp. 390
Key Termsp. 391
Checkpointp. 392
Web Researchp. 393
Learn How Top. 394
Learn It Onlinep. 396
Special Feature: Digital Entertainmentp. 397
Information System Development and Programming Languagesp. 405
The System Development Cyclep. 406
Who Participates in the System Development Cycle?p. 407
Looking Ahead: Computer Systems Design and the Futurep. 408
Project Managementp. 408
Feasibility Assessmentp. 409
Documentationp. 409
Data and Information Gathering Techniquesp. 410
Ethics & Issues: Do You Work Harder When Someone Is Watching?p. 410
What Initiates the System Development Cycle?p. 410
Ethics & Issues: How Should Employers Combat Poor E-Mail Writing Skills?p. 411
Web Stop Cafe - A Case Studyp. 412
Planning Phasep. 412
Planning at Web Stop Cafep. 413
Analysis Phasep. 413
Preliminary Investigation at Web Stop Cafep. 414
Detailed Analysis at Web Stop Cafep. 416
Design Phasep. 416
Hardware Acquisition at Web Stop Cafep. 418
Detailed Design at Web Stop Cafep. 420
Implementation Phasep. 420
Looking Ahead: Putting Vista to the Testp. 420
Implementation at Web Stop Cafep. 421
Operation, Support, and Security Phasep. 422
Operation, Support, and Security at Web Stop Cafep. 422
Programming Languagesp. 423
Low-Level Languagesp. 424
Procedural Languagesp. 425
Object-Oriented Programming Languages and Program Development Toolsp. 427
Other Programming Languagesp. 430
Classic Programming Languagesp. 431
Other Program Development Toolsp. 431
Ethics & Issues: Should All Students Be Required to Learn Computer Programming?p. 432
Web Page Developmentp. 433
Multimedia Program Developmentp. 437
The Program Development Cyclep. 438
Ethics & Issues: Who Is Responsible for Bugs?p. 439
What Initiates the Program Development Cycle?p. 439
Looking Ahead: Robotic Vehicles Move Forwardp. 439
Control Structuresp. 440
Chapter Summaryp. 442
Companies on the Cutting Edgep. 443
Computer Associatesp. 443
Electronic Artsp. 443
Technology Trailblazersp. 443
Grace Hopperp. 443
James Goslingp. 443
Chapter Reviewp. 444
Key Termsp. 445
Checkpointp. 446
Web Researchp. 447
Learn How Top. 448
Learn It Onlinep. 450
Enterprise Computingp. 451
What Is Enterprise Computing?p. 452
Organizational Structure of an Enterprisep. 454
Looking Ahead: The CEO of the Futurep. 455
Levels of Usersp. 455
How Managers Use Informationp. 456
Information Systems in the Enterprisep. 456
Information Systems within Functional Unitsp. 457
General Purpose Information Systemsp. 461
Integrated Information Systemsp. 465
Enterprise-Wide Technologiesp. 467
Portalsp. 467
EDIp. 468
Data Warehousesp. 468
Extranetsp. 469
Web Servicesp. 469
Workflowp. 469
Virtual Private Networkp. 470
E-Commercep. 470
E-Retailingp. 470
Ethics & Issues: Would You Buy Merchandise Online?p. 471
Financep. 472
Healthp. 472
Ethics & Issues: Would You Trust an Online Medical Diagnosis?p. 472
Entertainment and Mediap. 472
Travelp. 473
Other Business Servicesp. 473
Enterprise Hardwarep. 474
RAIDp. 474
Network Attached Storage and Storage Area Networksp. 474
Enterprise Storage Systemsp. 476
Ethics & Issues: How Much Data Should Companies Be Required to Keep?p. 476
Blade Serversp. 477
High-Availability Systemsp. 477
Scalabilityp. 477
Utility and Grid Computingp. 478
Looking Ahead: The Future of Grid Computingp. 478
Interoperabilityp. 478
Backup Procedures and Securityp. 478
Disaster Recovery Planp. 479
Chapter Summaryp. 480
Companies on the Cutting Edgep. 481
SAPp. 481
IBMp. 481
Technology Trailblazersp. 481
Mark Hurdp. 481
Jim Clarkp. 481
Chapter Reviewp. 482
Key Termsp. 483
Checkpointp. 484
Web Researchp. 485
Learn How Top. 486
Learn It Onlinep. 488
Quiz Yourself Answersp. 1
Glossary/Indexp. 1
Photo Credits
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program