did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781418860554

Understanding Computers: Today and Tomorrow, 11th Edition, Comprehensive

by
  • ISBN13:

    9781418860554

  • ISBN10:

    1418860557

  • Edition: 11th
  • Format: Paperback
  • Copyright: 2006-03-08
  • Publisher: Course Technology
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $197.00

Summary

Understanding Computers: Today and Tomorrow gives a classic, well-rounded introduction to computer concepts with a modern twist! Known for its readability and breadth of topics covered, this book will ensure that you have the comprehensive, current knowledge of computer concepts and issues needed to succeed in our technocentric society. This 11th Edition offers exciting new features and updates to make its content more approachable and meaningful.

Table of Contents

Preface iii
MODULE Introduction 2
Introduction to the World of Computers
4(48)
Overview
5(1)
Computers in Your Life
6(5)
Why Learn About Computers?
6(1)
Computers in the Home
7(1)
Computers in Education
7(1)
Computers in the Workplace
8(2)
Computers on the Go
10(1)
What Is a Computer and What Does It Do?
11(9)
Data vs. Information
12(1)
Computers Then and Now
12(3)
Hardware
15(1)
Software
16(3)
Computer Users and Professionals
19(1)
Computers to Fit Every Need
20(10)
Mobile Devices
20(1)
Personal Computers
21(7)
Midrange Servers
28(1)
Mainframe Computers
28(1)
Supercomputers
28(2)
Computer Networks and the Internet
30(8)
What Are the Internet and the World Wide Web?
31(1)
Accessing a Network or the Internet
31(4)
Surfing the Web
35(1)
Searching the Web
36(1)
E-Mail
37(1)
Computers and Society
38(14)
Benefits of a Computer-Oriented Society
38(1)
Risks of a Computer-Oriented Society
39(1)
Differences in Online Communications
40(1)
The Anonymity Factor
41(1)
Information Integrity
41(1)
Summary
42(2)
Review Activities
44(2)
Projects
46(3)
Web Activities
49(1)
Expert Insight on Personal Computers
50(2)
MODULE Hardware
52(128)
The System Unit: Processing and Memory
54(42)
Overview
55(1)
Data and Program Representation
55(7)
Digital Data Representation
55(1)
Representing Numerical Data: The Binary Numbering System
56(1)
Coding Systems for Text-Based Data
57(1)
Coding Systems for Other Types of Data
58(3)
Representing Programs: Machine Language
61(1)
Inside the System Unit
62(13)
The Motherboard
63(1)
The CPU
63(4)
Memory
67(2)
Fans, Heat Sinks, and Other Cooling Components
69(1)
Expansion Slots and Cards
69(1)
Buses
70(2)
Ports
72(3)
How the CPU Works
75(6)
Typical CPU Components
75(3)
The System Clock and the Machine Cycle
78(3)
Making Computers Faster and Better Now and in the Future
81(15)
Improving the Performance of Your System Today
81(2)
Strategies for Making Faster and Better Computers
83(3)
Future Trends
86(2)
Summary
88(2)
Review Activities
90(2)
Projects
92(3)
Web Activities
95(1)
Storage
96(36)
Overview
97(1)
Storage Systems Characteristics
97(3)
Storage Devices and Storage Media
97(1)
Volatility
98(1)
Random vs. Sequential Access
98(1)
Logical vs. Physical Representation
99(1)
Magnetic Disks vs. Optical Discs
100(1)
Magnetic Disk Systems
100(9)
Floppy Disks and Drives
100(2)
Hard Disk Drives
102(6)
High-Capacity Removable Magnetic Disks and Cartridges
108(109)
Optical Disc Systems
109(5)
Read-Only Discs: CD-ROM and DVD-ROM Discs
110(2)
Recordable Discs: CD-R, DVD-R, DVD+R, and DVD+R DL Discs
112(1)
Rewritable Discs: CD-RW, DVD-RW, DVD+RW, DVD-RAM, and Blue Laser Discs
112(2)
Flash Memory Systems
114(3)
Flash Memory Media
115(1)
Flash Memory Drives
116(1)
Other Types of Storage Systems
117(5)
Remote Storage Systems
117(2)
Smart Cards
119(1)
Holographic Storage
120(1)
Storage Systems for Large Computer Systems and Networks
120(2)
Magnetic Tape Systems
122(1)
Comparing Storage Alternatives
122(10)
Summary
124(2)
Review Activities
126(2)
Projects
128(3)
Web Activities
131(1)
Input and Output
132(48)
Overview
133(1)
Keyboards
133(2)
Pointing Devices
135(6)
The Mouse
135(2)
Electronic Pens
137(2)
Touch Screens
139(1)
Other Pointing Devices
139(2)
Scanners, Readers, and Digital Cameras
141(11)
Scanners
141(3)
Readers
144(5)
Digital Cameras
149(3)
Audio Input
152(2)
Voice Input Systems
152(1)
Music Input Systems
153(1)
Display Devices
154(9)
Display Device Characteristics
154(6)
Flat-Panel Display Technologies
160(2)
Data and Multimedia Projectors
162(1)
Printers
163(5)
Printer Characteristics
163(2)
Laser Printers
165(1)
Ink-Jet Printers
165(1)
Special-Purpose Printers
166(2)
Multifunction Devices
168(1)
Audio Output
168(12)
Summary
170(2)
Review Activities
172(2)
Projects
174(3)
Web Activities
177(1)
Expert Insight on Hardware
178(2)
MODULE Software
180(84)
System Software: Operating Systems and Utility Programs
182(38)
Overview
183(1)
System Software vs. Application Software
183(1)
The Operating System
184(10)
Functions of an Operating System
185(3)
Processing Techniques for Increased Efficiency
188(3)
Differences Among Operating Systems
191(3)
Operating Systems for Desktop PCs and Servers
194(7)
DOS
194(1)
Windows
194(4)
Mac OS
198(1)
UNIX
199(1)
Linux
199(2)
NetWare
201(1)
Solaris
201(1)
Operating Systems for Handheld PCs and Mobile Devices
201(3)
Embedded and Mobile Versions of Windows
201(2)
Palm OS
203(1)
Embedded Linux
203(1)
Symbian OS
204(1)
Operating Systems for Larger Computers
204(1)
Utility Programs
204(7)
File Management Programs
206(2)
Search Tools
208(1)
Diagnostic and Disk Management Programs
208(1)
File Compression Programs
208(1)
Uninstall Utilities
209(1)
Backup and Recovery Utilities
210(1)
Antivirus, Antispyware, Firewalls, and Other Security Programs
210(1)
The Future of Operating Systems
211(9)
Summary
212(2)
Review Activities
214(2)
Projects
216(3)
Web Activities
219(1)
Application Software
220(44)
Overview
221(1)
The Basics of Application Software
221(11)
Software Ownership Rights
221(3)
Installed vs. Web-Based Software
224(3)
Software Suites
227(1)
Desktop vs. Mobile Software
228(1)
Common Software Commands
229(3)
Word Processing Concepts
232(4)
What Is Word Processing?
232(1)
Creating a Word Processing Document
233(1)
Tables, Graphics, and Templates
234(1)
Word Processing and the Web
235(1)
Spreadsheet Concepts
236(3)
What Is a Spreadsheet?
236(1)
Creating a Spreadsheet
236(3)
Charts and What-If Analysis
239(1)
Spreadsheets and the Web
239(1)
Database Concepts
239(4)
What Is a Database
240(1)
Creating a Database
241(1)
Queries and Reports
242(1)
Databases and the Web
243(1)
Presentation Graphics Concepts
243(3)
What Is a Presentation Graphic?
243(1)
Creating a Presentation
244(1)
Finishing a Presentation
245(1)
Presentation Graphics and the Web
246(1)
Graphics and Multimedia Concepts
246(5)
Graphics Software
246(2)
Audio Editing Software
248(1)
Video Editing and DVD Authoring Software
248(1)
CD and DVD Burning Software
249(1)
Media Players
249(1)
Graphics, Multimedia, and the Web
249(2)
Other Types of Application Software
251(13)
Desktop and Personal Publishing Software
252(1)
Educational, Entertainment, and Reference Software
252(1)
Accounting and Personal Finance Software
252(1)
CAD and Other Types of Design Software
252(1)
Project Management and Collaboration Software
253(1)
Note Taking and Personal Productivity Software
253(1)
Summary
254(2)
Review Activities
256(2)
Projects
258(3)
Web Activities
261(1)
Expert Insight on Software
262(2)
MODULE Networks and the Internet
264(144)
Computer Networks
266(44)
Overview
267(1)
What Is a Network?
267(1)
Networking and Communications Applications
268(9)
Mobile Phones
268(1)
Paging and Messaging
269(1)
Global Positioning Systems (GPSs)
270(1)
Monitoring Systems
270(2)
Satellite Radio
272(1)
Videoconferencing
272(1)
Collaborative Computing
273(1)
Telecommuting
274(1)
Digital Data Distribution
274(2)
Telemedicine
276(1)
Types of Networks
277(4)
Network Topologies
277(1)
Network Architectures
278(1)
LANs, WANs, and Other Types of Networks
279(2)
How Does Data Travel Over a Network?
281(7)
Data Transmission Characteristics
281(2)
Wired vs. Wireless Connections
283(1)
Wired Network Transmission Media
284(2)
Wireless Network Transmission Media
286(2)
Communications Protocols
288(9)
Ethernet
289(1)
Token Ring
290(1)
Wi-Fi (802.11)
291(1)
Mesh Networks, WiMAX, Mobile-Fi, and xMax
292(1)
Bluetooth and Ultra Wideband (UWB)
293(1)
TCP/IP and Wireless Application Protocol (WAP)
294(3)
Phoneline and Powerline Networks
297(1)
Networking Hardware
297(13)
Network Adapters
297(1)
Modems
298(2)
Hubs, Switches, and Other Networking Hardware
300(2)
Summary
302(2)
Review Activities
304(2)
Project
306(3)
Web Activities
309(1)
The Internet and World Wide Web
310(52)
Overview
311(1)
Evolution of the Internet
311(7)
From Arpanet to Internet2
312(2)
The Internet Community Today
314(3)
Myths About the Internet
317(1)
Getting Set Up to Use the Internet
318(7)
Type of Device
318(1)
Type of Connection and Internet Access
319(4)
Selecting an ISP and Setting Up Your PC
323(2)
Searching the Internet
325(7)
Search Sites
326(2)
Search Strategies
328(2)
Evaluating Search Results
330(1)
Citing Internet Resources
331(1)
Beyond Browsing and E-Mail
332(15)
Discussion Groups, Instant Messaging, and Other Types of Online Communications
332(2)
Online Shopping and Investing
334(3)
Online Entertainment
337(3)
Peer-to-Peer File Sharing
340(1)
Online News and Research
340(4)
Online Education and Writing
344(3)
Censorship and Privacy Issues
347(6)
Censorship
347(2)
Web Browsing Privacy
349(4)
E-Mail Privacy
353(1)
The Future of the Internet
353(9)
Summary
354(2)
Review Activities
356(2)
Projects
358(3)
Web Activities
361(1)
Network and Internet Security
362(46)
Overview
363(1)
Why Be Concerned About Network and Internet Security?
363(1)
Unauthorized Access, Unauthorized Use, and Computer Sabotage
364(8)
Hacking
364(3)
Interception of Communications
367(1)
Computer Sabotage
367(5)
Protecting Against Unauthorized Access, Unauthorized Use, and Computer Sabotage
372(11)
Access Control Systems
372(4)
Firewalls and Antivirus Software
376(2)
Encryption and Other Security Tools
378(4)
Take Caution with Employees
382(1)
Online Theft, Fraud, and Other Dot Cons
383(6)
Theft of Data, Information, and Other Resources
384(1)
Identity Theft
384(1)
Online Auction Fraud
385(1)
Internet Scams, Spoofing, and Phishing
386(2)
Spyware
388(1)
Protecting Against Online Theft, Fraud, and Other Dot Cons
389(6)
Protecting Against Identity Theft
389(2)
Protecting Against Other Dot Cons
391(1)
Protecting Against Spyware
392(1)
Using Digital Signatures and Digital Certificates
393(2)
Personal Safety Issues
395(1)
Cyberstalking
395(1)
Online Pornography
395(1)
Protecting Against Cyberstalking and Other Personal Safety Concerns
396(1)
Safety Tips for Adults
396(1)
Safety Tips for Children
396(1)
Network and Internet Security Legislation
396(12)
Summary
398(2)
Review Activities
400(2)
Projects
402(3)
Web Activities
405(1)
Expert Insight on Networks and the Internet
406(2)
MODULE Web Applications
408(76)
Multimedia and the Web
410(38)
Overview
411(1)
What Is Web-Based Multimedia?
411(3)
Web-Based Multimedia Applications
411(2)
Advantages and Disadvantages of Using Web-Based Multimedia
413(1)
Multimedia Elements
414(7)
Text
414(1)
Graphics
415(3)
Animation
418(2)
Audio
420(1)
Video
420(1)
Multimedia Web Site Design
421(8)
Basic Design Principles
421(2)
Determining the Intended Audience and Objectives
423(1)
Using Flowcharts, Page Layouts, and Storyboards
424(2)
Navigational Design Considerations
426(2)
Access Considerations
428(1)
Multimedia Web Site Development
429(9)
Creating the Multimedia Elements
430(1)
Creating the Web Site
430(7)
Testing, Publishing, and Maintaining the Site
437(1)
The Future of Web-Based Multimedia
438(10)
Summary
440(2)
Review Activities
442(2)
Projects
444(3)
Web Activities
447(1)
E-Commerce
448(36)
Overview
449(1)
What Is E-Commerce?
449(5)
Advantages of E-Commerce
450(2)
Disadvantages of E-Commerce
452(2)
Types of E-Commerce Web Sites
454(2)
Manufacturer and E-Tailer Web Sites
454(1)
Brokerage Sites
454(2)
E-Commerce Business Models
456(3)
Business to Consumer (B2C)
456(2)
Business to Business (B2B)
458(1)
Consumer to Consumer (C2C)
458(1)
Business to Government (B2G)
458(1)
Intermediary Hubs
459(1)
Implementing Web-Based E-Commerce
459(14)
Step 1: Select Appropriate Business Models and Types of Web Sites
460(1)
Step 2: Select the Desired E-Commerce Applications
460(1)
Step 3: Develop Procedures for Handling Electronic Financial Transactions
461(6)
Step 4: Design and Develop an Effective Web Site
467(1)
Step 5: Implement Appropriate Sales and Marketing Strategies
468(5)
Security Issues
473(11)
Summary
474(2)
Review Activities
476(2)
Projects
478(3)
Web Activities
481(1)
Expert Insight on Web-Based Multimedia and E-Commerce
482(2)
MODULE Systems
484(132)
Information Systems and System Development
486(44)
Overview
487(1)
What Is an Information System?
487(1)
Who Uses Information Systems?
488(1)
Executive Management
489(1)
Middle Management
489(1)
Operational Management
489(1)
Nonmanagement Workers
489(1)
Types of Information Systems
489(19)
Office Systems
491(1)
Transaction Processing Systems
492(3)
Management Information Systems (MISs)
495(1)
Decision Support Systems (DSSs)
495(1)
Geographic Information Systems (GISs)
496(1)
Enterprise-Wide and Inter-Enterprise Systems
496(5)
Design and Manufacturing Systems
501(1)
Artificial Intelligence Systems
502(6)
Responsibility for System Development
508(3)
The Information Systems Department
508(2)
Outsourcing Companies
510(1)
The System Development Life Cycle (SDLC)
511(9)
Preliminary Investigation
512(1)
System Analysis
513(2)
System Design
515(1)
System Acquisition
516(2)
System Implementation
518(2)
System Maintenance
520(1)
Approaches to System Development
520(10)
The Traditional Approach
520(1)
Prototyping
521(1)
End-User Development
521(1)
Summary
522(2)
Review Activities
524(2)
Projects
526(3)
Web Activities
529(1)
Program Development and Programming Languages
530(44)
Overview
531(1)
Approaches to Program Design and Development
531(3)
Structured Programming
531(1)
Object-Oriented Programming (OOP)
532(1)
Aspect-Oriented Programming (AOP)
533(1)
The Program Development Life Cycle (PDLC)
534(17)
Problem Analysis
534(1)
Program Design
535(7)
Program Coding
542(3)
Program Debugging and Testing
545(5)
Program Implementation and Maintenance
550(1)
Tools for Facilitating Program Development
551(2)
Application Lifecycle Management (ALM) Tools
551(1)
Application Generators
552(1)
Software-Asset Management Tools
553(498)
Device Software Development Tools
553(1)
Programming Languages
553(21)
What Is a Programming Language?
552(2)
Categories of Programming Languages
554(2)
Popular Programming Languages
556(10)
Summary
566(2)
Review Activities
568(2)
Projects
570(3)
Web Activities
573(1)
Databases and Database Management Systems
574(42)
Overview
575(1)
What Is a Database?
575(6)
Relational Databases: A Simple Example
576(2)
Individuals Involved with a Database Management System
578(1)
The Evolution of Databases
578(1)
Advantages and Disadvantages of the Database Approach
579(2)
Data Concepts and Characteristics
581(8)
Data Hierarchy
581(1)
Entity Relationships
581(1)
Data Definition
582(2)
The Data Dictionary
584(1)
Data Integrity, Security, and Privacy
584(4)
Data Organization
588(1)
Database Classifications
589(2)
Single-User vs. Multiuser Database Systems
589(1)
Client-Server Database Systems
590(1)
N-Tier Database Systems
590(1)
Centralized vs. Distributed Database Systems
591(1)
In-Memory Databases
591(1)
Database Models
591(10)
The Hierarchical and Network Database Models
593(1)
The Relational Database Model
593(6)
The Object-Oriented Database Model
599(2)
Multidimensional Databases
601(1)
Databases and the Web
601(15)
Examples of Web Databases in Use
601(4)
How Web Databases Work
605(1)
Summary
606(2)
Review Activities
608(2)
Projects
610(3)
Web Activities
613(1)
Expert Insight on Systems
614(2)
MODULE Computers and Society
616
Computer Security and Privacy
618(40)
Overview
619(1)
Why Be Concerned About Computer Security?
619(1)
Hardware Loss, Damage, and System Failure
620(7)
Hardware Loss
620(1)
Hardware Damage
620(1)
System Failure and Other Disasters
620(1)
Protecting Against Hardware Loss, Damage, and System Failure
621(6)
Software Piracy and Digital Counterfeiting
627(3)
Software Piracy
627(1)
Digital Counterfeiting
628(1)
Protecting Against Software Piracy and Digital Counterfeiting
629(1)
Why Be Concerned About Information Privacy?
630(1)
Databases, Electronic Profiling, Spam, and Other Marketing Activities
631(9)
Databases and Electronic Profiling
631(3)
Spam and Other Marketing Activities
634(2)
Protecting the Privacy of Personal Information
636(4)
Electronic Surveillance and Monitoring
640(8)
Computer Monitoring Software
640(1)
Video Surveillance
641(2)
Employee Monitoring
643(3)
Presence Technology
646(1)
Protecting Personal and Workplace Privacy
647(1)
Computer Security and Privacy Legislation
648(10)
Summary
650(2)
Review Activities
652(2)
Projects
654(3)
Web Activities
657(1)
Intellectual Property Rights, Ethics, Health, Access, and the Environment
658
Overview
659(1)
Intellectual Property Rights
659(4)
Copyrights
659(2)
Trademarks
661(1)
Patents
662(1)
Ethics
663(12)
Ethical Use of Copyrighted Material
664(2)
Ethical Use of Resources and Information
666(3)
Computer Hoaxes and Digital Manipulation
669(2)
Ethical Business Practices and Decision Making
671(4)
Computers and Health
675(7)
Physical Health
675(4)
Emotional Health
679(3)
Access to Technology
682(7)
The Digital Divide
683(3)
Assistive Technology
686(3)
Environmental Concerns
689(4)
Green Computing
689(1)
Recycling and Disposal of Computing Equipment
690(3)
Related Legislation
693
Summary
694(2)
Review Activities
696(2)
Projects
698(3)
Web Activities
701(1)
Expert Insight on Computers and Society
702
References and Resources Guide
1(1)
Computer History Timeline
2(6)
Coding Charts
8(2)
ASCII and EBCDIC
8(1)
Unicode
9(1)
Guide to Buying a PC
10(5)
Analyzing Needs
10(1)
Listing Alternatives
11(2)
System Troubleshooting and Upgrading
13(2)
E-Mail Fundamentals
15(2)
Sending E-Mail
15(1)
Receiving E-Mail
15(1)
Managing E-Mail
15(2)
Answers to Self-Quiz
17
Credits 1(1)
Glossary/Index 1

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program