66
CHAPTER 1 CHAPTER 1 Becoming Fluent with Computers and the Internet Becoming Fluent with Computers and the Internet Introducing Computers and the Internet The Need for Computer Fluency What Is a Computer, Anyway? Introducing Hardware: The Computer’s Physical Components Becoming Fluent with Computers and the Internet Becoming Fluent with Computers and the Internet cont. cont. Introducing Software: Telling the Computer What to Do System Software Application Software The Internet Introducing Computers and The Internet Introducing Computers and The Internet Activities that involve computers Role of computers in our personal lives Fundamental concepts Hardware vs. software The Need for Computer Fluency The Need for Computer Fluency What is computer fluency? How can you become computer fluent? Why are computer-fluent people better at gauging the true level of risk of a virus? What Is a Computer, Anyway? What Is a Computer, Anyway? Understanding the Computer: Basic Definitions Input Processing Output Storage Page 1 of 66

CHAPTER 1 - Laurentian€¦  · Web viewData Bus Width and Word Size. What’s on the Motherboard? cont. Control Unit cont. ... MUDs (Multi-user-dungeons) Chapter Summary. Introducing

  • Upload
    vantu

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

CHAPTER 1CHAPTER 1Becoming Fluent with Computers and the InternetBecoming Fluent with Computers and the Internet Introducing Computers and the Internet The Need for Computer Fluency What Is a Computer, Anyway? Introducing Hardware: The Computer’s Physical ComponentsBecoming Fluent with Computers and the Internet cont.Becoming Fluent with Computers and the Internet cont. Introducing Software: Telling the Computer What to Do System Software Application Software The InternetIntroducing Computers and The InternetIntroducing Computers and The Internet Activities that involve computers Role of computers in our personal lives Fundamental concepts Hardware vs. softwareThe Need for Computer FluencyThe Need for Computer Fluency What is computer fluency? How can you become computer fluent? Why are computer-fluent people better at gauging the true level of risk of a virus?What Is a Computer, Anyway?What Is a Computer, Anyway? Understanding the Computer: Basic Definitions Input Processing Output Storage

What is a Computer, Anyway? cont.What is a Computer, Anyway? cont. What Computers Can’t Do (Yet) Currents: Roll Over Beethoven What Computers Can’t Do (Yet) Currents: Roll Over Beethoven

What is a Computer, Anyway? cont.What is a Computer, Anyway? cont. The Information Processing Cycle in Action: Batch vs. Interactive Processing

Page 1 of 53

So What? Don’t Let Hardware Scare You Take Ethics Seriously - Very Seriously Recognize the Risks of Using Flawed SoftwareWhat is a Computer, Anyway? cont. What is a Computer, Anyway? cont. Impacts: Automated Highway Systems: The Right Road? Computer Systems Hardware SoftwareIntroducing Hardware: The Computer’s Physical Introducing Hardware: The Computer’s Physical ComponentsComponents Input: Getting Data Into the Computer Processing: Transferring Data into InformationIntroducing Hardware: The Computer’s Physical Introducing Hardware: The Computer’s Physical Components cont.Components cont. Output: Displaying the Information Storage: Holding Programs and Data for Future UseIntroducing Hardware: The Computer’s Physical Introducing Hardware: The Computer’s Physical Components cont.Components cont. Communications Devices Why are communications devices necessary? What is a computer network? What is a local area network (LAN)?Introducing Hardware: The Computer’s Physical Introducing Hardware: The Computer’s Physical Components cont.Components cont. Types of Computers Computers for Individuals Computers for OrganizationsIntroducing Software: Telling the Computer What to DoIntroducing Software: Telling the Computer What to Do Creating Software Using Software Types of SoftwareSystem SoftwareSystem Software Operating system (OS) System UtilitiesApplication SoftwareApplication Software

Page 2 of 53

Packaged vs. Custom Software Office ApplicationsThe InternetThe Internet Electronic mail (e-mail) World Wide Web (WWW) File Transfer Protocol (FTP) Instant messaging (AOL) Peer-to-peer (P2P) networks Electronic commerceChapter SummaryChapter Summary Introducing Computers and the Internet The Need for Computer Fluency What Is a Computer, Anyway? Introducing Hardware: the Computer’s Physical Components

Chapter Summary cont.Chapter Summary cont. Introducing Software: Telling the Computer What to Do System Software Application Software The Internet

CHAPTER 2CHAPTER 2Inside the System UnitInside the System Unit Describing Hardware Performance Introducing the System Unit What’s on the Motherboard? What’s on the Outside of the Box? How Computers Represent DataDescribing Hardware PerformanceDescribing Hardware Performance Bits and Bytes Bit

Page 3 of 53

Byte Thousands, Millions, and MoreIntroducing the System UnitIntroducing the System Unit Inside the System Unit Motherboard Power Supply Cooling Fan Speaker Drive BaysWhat’s on the Motherboard?What’s on the Motherboard? System Clock The Microprocessor Processor Slots and Sockets Instruction SetWhat’s on the Motherboard? cont.What’s on the Motherboard? cont. Control Unit Arithmetic-Logic Unit (ALO) Registers Compatibility Data Bus Width and Word SizeWhat’s on the Motherboard? cont.What’s on the Motherboard? cont. Control Unit cont. Operations per Cycle CISC and RISC Math Coprocessors Popular MicroprocessorsWhat’s on the Motherboard? cont.What’s on the Motherboard? cont. Memory Volatile vs. Nonvolatile Memory ROM (Read Only Memory) CMOS

What’s on the Motherboard? cont.What’s on the Motherboard? cont. Memory cont. RAM (Random-Access Memory) Cache Memory Chipset Input/Output (I./O) Buses

Page 4 of 53

What’s on the Outside of the Box?What’s on the Outside of the Box? Power Switch Connectors Serial Port Parallel Port Universal Serial Bus (USB) PortWhat’s on the Outside of the Box? cont.What’s on the Outside of the Box? cont. Connectors cont. 1394 Port (FireWire) IrDA Port Monitor ConnectorWhat’s on the Outside of the Box? cont.What’s on the Outside of the Box? cont. Additional Ports and Connectors Telephone Connector Network Connector PC Card slots Sound card connectors TV/sound capture board connectors Front PanelHow Computers Represent Data How Computers Represent Data Digital vs. Analog Representation Numbering Systems Representing Numbers Representing Very Large and Very Small NumbersHow Computers Represent Data cont. How Computers Represent Data cont. Representing Characters ASCII and EBCDIC Unicode Parity Impacts: Babbage’s FollyChapter SummaryChapter Summary Describing Hardware Performance Introducing the System Unit What’s on the Motherboard? What’s on the Outside of the Box? How Computers Represent Data

Page 5 of 53

CHAPTER 3CHAPTER 3Storing Data: Electronic Filing CabinetsStoring Data: Electronic Filing Cabinets Memory vs. Storage Types of Storage Devices The Storage Hierarchy Floppy Disks and Floppy Disk Drives Hard DisksStoring Data: Electronic Filing Cabinets cont.Storing Data: Electronic Filing Cabinets cont. Magnetic Tape: Still Useful CD-ROM Discs and Drives DVD-ROM Discs and Drives Storage HorizonsMemory vs. StorageMemory vs. Storage Why Is Storage Necessary? Non-volatile; retains data when computer is off Cheaper than memory

Page 6 of 53

Storage devices hold more data Essential during system startup Input role during application startup Used in SavingTypes of Storage DevicesTypes of Storage Devices Read/Write vs. Read Only Media Sequential vs. Random-Access Storage Technologies: Magnetic and Optical The Storage HierarchyThe Storage Hierarchy Three Locations: Online (hard disk) Near-Online (floppy) Offline (magnetic tape) Capacity of Storage Devices Speed of Storage Devices (Access Time)Floppy Disks and Floppy Disk DrivesFloppy Disks and Floppy Disk Drives What Does “Floppy” Mean? Storage Capacity of Floppy Disks Protecting Your Data Floppy Disk DrivesFloppy Disks and Floppy Disk Drives cont.Floppy Disks and Floppy Disk Drives cont. How Floppy Drives Work Formatting: Preparing Disks for Use Beyond the Floppy: High-Capacity Disks and DrivesHard DisksHard Disks Why are Hard Disks Needed? How Hard Disks Work Factors Affecting Hard Disk Performance Hard Disk InterfacesHard Disks cont.Hard Disks cont. Disk Caches: Improving a Hard Disk’s Performance Hard Disk Longevity RAID Removable Hard DisksMagnetic Tape: Still UsefulMagnetic Tape: Still Useful Popular in 1960s Store large amounts of data

Page 7 of 53

Not frequently accessedCD-ROM Discs and DrivesCD-ROM Discs and Drives CD-R and CD-WR Discs and Recorders Currents: Decaying DataDVD-ROM Discs and DrivesDVD-ROM Discs and Drives DVD-ROM DVD-RAM More Optical Storage TechnologiesStorage HorizonsStorage Horizons FMD-ROM Solid State Storage Devices PC Cards Flash Memory cards Smart CardsStorage Horizons cont.Storage Horizons cont. Enterprise Storage Systems Impacts: The Humane Genome Project: Storing Humanity’s Biological “Fingerprint”Chapter SummaryChapter Summary Memory vs. Storage Types of Storage Devices The Storage Hierarchy Floppy Disks and Floppy Disk Drives Hard DisksChapter Summary cont.Chapter Summary cont. Magnetic Tape: Still Useful CD-ROM Discs and Drives DVD-ROM Discs and Drives Storage Horizons

Page 8 of 53

CHAPTER 4CHAPTER 4Buying and Upgrading Your Computer SystemBuying and Upgrading Your Computer System Get Started the Right Way Anticipate Your Software Needs Choose the Right Hardware Get the Right PrinterBuying and Upgrading Your Computer System cont.Buying and Upgrading Your Computer System cont. Shop Wisely Caring for Your Computer System Upgrading Your SystemGet Started the Right WayGet Started the Right Way Notebook or Desktop? Mac or PC? Top-of-the-Line or Bargain Bin Special?Anticipate Your Software NeedsAnticipate Your Software Needs Research Visit the Computer Lab Ask for Advice Interview People in Your Chosen CareerChoose the Right HardwareChoose the Right Hardware Processors Memory

Page 9 of 53

RAM Secondary CacheChoose the Right Hardware cont. Choose the Right Hardware cont. Hard Disks Video Cards and Monitors Modems Network CardsChoose the Right Hardware cont. Choose the Right Hardware cont. Sound Keyboard and Mouse Uninterruptible Power Supply (UPS)Get the Right PrinterGet the Right Printer Cost Speed (ppm) Color Ink-jet Monochrome Laser Color Laser MultifunctionShop WiselyShop Wisely Buying Used Equipment Name-Brand Windows PCs Generic Windows PCs Building Your Own Windows PCCaring for Your Computer SystemCaring for Your Computer System A Few Tips: Use a Surge Protector Use a Separate Outlet Have Sufficient Air CirculationCaring for Your Computer System cont.Caring for Your Computer System cont. A Few Tips cont.: Turn Off Power Before Adding or Removing Cables Keep Food and Beverages Away Use Proper Shut-down ProceduresCaring for Your Computer System cont.Caring for Your Computer System cont. A Few Tips cont.: Run a Disk Defragmentation Regularly Run a Virus Checker Regularly Keep Your Computer Clean

Page 10 of 53

Upgrading Your SystemUpgrading Your System Removing the Cover Adding Expansion Boards Upgrading Memory Replacing the CoverChapter SummaryChapter Summary Get Started the Right Way Anticipate Your Software Needs Choose the Right Hardware Get the Right PrinterChapter Summary cont.Chapter Summary cont. Shop Wisely Caring for Your Computer System Upgrading Your System

Page 11 of 53

CHAPTER 4 SPOTLIGHTCHAPTER 4 SPOTLIGHTBuying and Upgrading Your Computer SystemBuying and Upgrading Your Computer System Get Started the Right Way Anticipate Your Software Needs Choose the Right Hardware Get the Right PrinterBuying and Upgrading Your Computer System cont.Buying and Upgrading Your Computer System cont. Shop Wisely Caring for Your Computer System Upgrading Your SystemBuying and Upgrading Your Computer System cont.Buying and Upgrading Your Computer System cont. Do I need a Computer What will I do with it What do I expect from this Computer Who will use this Computer Will it be networked Wireless?? When will I graduate??? My budget???Get Started the Right WayGet Started the Right Way Notebook or Desktop? Mac or PC? Top-of-the-Line or Bargain Bin Special?Anticipate Your Software NeedsAnticipate Your Software Needs Research (CAD???) Visit the Computer Lab Ask for Advice Interview People in Your Chosen Career, (with students from a year ago)Choose the Right HardwareChoose the Right Hardware Processors (Clock speed) < …> Pentium @ 600 MHz Celron @ 650 MHz ADM Athlon @1000 MHZ

Page 12 of 53

Memory RAM (512) Secondary Cache ???Choose the Right Hardware cont. Choose the Right Hardware cont. Hard Disks Video Cards and Monitors (Super Video Graphics array -standard) (VRAM – 8 MB) Modems (56 Kbps) (High speed Lines) Network Cards (NIC)Choose the Right Hardware cont. Choose the Right Hardware cont. Sound (wave table Synthesis Card) Keyboard and Mouse Uninterruptible Power Supply (UPS) ($200.00v or so)Get the Right PrinterGet the Right Printer Cost Speed (ppm) Color Ink-jet Monochrome Laser Color Laser MultifunctionShop WiselyShop Wisely Buying Used Equipment (Be Careful) Name-Brand Windows PCs Generic Windows PCs Building Your Own Windows PCCaring for Your Computer SystemCaring for Your Computer System A Few Tips: Use a Surge Protector Use a Separate Outlet Have Sufficient Air CirculationCaring for Your Computer System cont.Caring for Your Computer System cont. A Few Tips cont.: Turn Off Power Before Adding or Removing Cables Keep Food and Beverages Away Use Proper Shut-down ProceduresCaring for Your Computer System cont.Caring for Your Computer System cont. A Few Tips cont.:

Page 13 of 53

Run a Disk Defragmentation Regularly Run a Virus Checker Regularly Keep Your Computer CleanUpgrading Your SystemUpgrading Your System Removing the Cover Adding Expansion Boards Upgrading Memory Replacing the CoverChapter SummaryChapter Summary Get Started the Right Way Anticipate Your Software Needs Choose the Right Hardware Get the Right PrinterChapter Summary cont.Chapter Summary cont. Shop Wisely Caring for Your Computer System Upgrading Your System

CHAPTER 5 SPOTLIGHTCHAPTER 5 SPOTLIGHTDoing the Right ThingDoing the Right Thing

Page 14 of 53

Avoiding Computer-Related Legal Problems Introducing Ethics Computer Ethics for Computer Users Computer Ethics for Computer ProfessionalsAvoiding Computer-Related Legal ProblemsAvoiding Computer-Related Legal Problems Plagiarism Software Policy Copyright InfringementIntroducing EthicsIntroducing Ethics Moral Dilemmas Ethical Principles Thinking Through Moral DilemmasComputer Ethics for Computer UsersComputer Ethics for Computer Users Respecting Yourself Respecting Others Respecting Academic IntegrityComputer Ethics for Computer Users cont.Computer Ethics for Computer Users cont. Ten Commandments for Computer Ethics NetiquetteComputer Ethics for Computer ProfessionalsComputer Ethics for Computer Professionals Safety First Additional Ethical Responsibilities Competence Responsibility IntegrityComputer Ethics for Computer Professionals cont.Computer Ethics for Computer Professionals cont. The ACM Code of Conduct Programmer Liability Computer Ethics in Business Whistle-BlowingChapter SummaryChapter Summary Avoiding Computer-Related Legal Problems Introducing Ethics Computer Ethics for Computer Users Computer Ethics for Computer Professionals

Page 15 of 53

CHAPTER 6CHAPTER 6Application Software: Essentials for Knowledge WorkersApplication Software: Essentials for Knowledge Workers Horizontal

Word processing / Excel Vertical Applications

Medical / restaurants Types of Application Software

Word / Excel / Powerpoint System Requirements

Minimum requiremnets –Ram / CD drive etc. Commercial Programs, Shareware, and Freeware

Software piracy

Page 16 of 53

Horizontal versus Vertical ApplicationsHorizontal versus Vertical Applications Custom software In house softwareTypes of Application SoftwareTypes of Application Software Personal productivity programs Multimedia and graphics software Programs for using the Internet Programs for home, educational marketSystem RequirementsSystem Requirements For example: Pentium microprocessor CD-ROM drive 16 MB RAM 125 MB free hard disk spaceCommercial Programs, Shareware, and FreewareCommercial Programs, Shareware, and Freeware Commercial software Shareware FreewareSoftware LicensesSoftware Licenses Impacts: Software Piracy: “Warez” Can Get You Into Big TroubleDistribution MethodsDistribution Methods Similar to shareware, freeware Internet Delivering Product UpdatesDocumentationDocumentation Tutorials Reference manuals Help screensSoftware VersionsSoftware Versions Use of numbers to represent Latest Version Maintenance Release Year of product’s releaseInstallationInstallation

Page 17 of 53

Why is installation important? When is decompression necessary? What does uninstall mean?RegistrationRegistration When is registration necessary? Why is registration necessary? Advantages of registering

Visual Metaphors: Working in Familiar WaysVisual Metaphors: Working in Familiar Ways Successful programs simulate what we’re accustomed to: Word Processing programs Spreadsheets Presentation graphics Personal finance programs

Integrated Programs and Suites: The All-in-One ApproachIntegrated Programs and Suites: The All-in-One Approach Standalone programs Integrated programs Software suites (office suites) Object linking and embedding (OLE)

Using Application SoftwareUsing Application Software Currents: Living the Easy Life Installing Applications Launching Applications Understanding the Application’s Window Title BarUsing Application Software cont.Using Application Software cont. Window Controls Window Borders Menu Bar Toolbar

Using Application Software cont.Using Application Software cont. Application Workspace Scroll bars, scroll boxes and scroll arrows Status bar Getting Help

Page 18 of 53

Using Application Software cont.Using Application Software cont. Understanding Menus File Edit View Tools HelpUsing Application Software cont. Using Application Software cont. Choosing Preferences Using Popup Menus Using Wizards Creating New DocumentsUsing Application Software cont. Using Application Software cont. Opening an Existing Account Saving Your Work Exiting the Application Shutting Down Your SystemWeb Integration: A New Way to Get the Word OutWeb Integration: A New Way to Get the Word Out Why save in HTML? Why save in ASCII?Chapter SummaryChapter Summary Horizontal versus Vertical Applications Types of Application Software System Requirements Commercial Programs, Shareware, and FreewareChapter Summary cont.Chapter Summary cont. Software Licenses Distribution Methods Documentation Software VersionsChapter Summary cont.Chapter Summary cont. Installation Registration Visual Metaphors: Working in Familiar WaysChapter Summary cont.Chapter Summary cont. Integrated Programs and Suites: The All-in-One Approach

Page 19 of 53

Using Application Software Web Integration: A New Way to Get the Word Out

CHAPTER 6 SPOTLIGHTCHAPTER 6 SPOTLIGHTMultimedia & Virtual RealityMultimedia & Virtual Reality Introducing Multimedia Multimedia Resources: Introducing the Cast Multimedia Authoring Systems: Writing the ScriptMultimedia & Virtual Reality cont.Multimedia & Virtual Reality cont. Virtual Reality: Toward the Holodeck? Computer GamesIntroducing MultimediaIntroducing Multimedia Multimedia Hardware Involves two or more media – text , sound or graphics Multimedia Applications MS-Word with PowerPoint PowerPoint with graphics Etc.Multimedia Resources: Introducing the CastMultimedia Resources: Introducing the Cast Compression and Decompression (Codecs) Working with digitized files, computers can work with art, photographs, videos and sounds. Paint Programs Create bit-mapped graphics, composed of tiny dots each corresponding to one pixel. Image Editors Sophisticated version of Paint Programs – Adobe Photoshop

Page 20 of 53

Multimedia Resources: Introducing the Cast cont.Multimedia Resources: Introducing the Cast cont. Drawing Programs PaintBrush / CAD Animation Programs Actually still images view at high rate of speed, creates an illusion of movement. 3-D Rendering Programs Actually light falling on an object from many directionsMultimedia Resources: Introducing the Cast cont.Multimedia Resources: Introducing the Cast cont. Video Editors Modification of digitized videos Moving Pictures Experts Group (MPEG) QuickTime (Developed by MAC plays full screen / audio)

Multimedia Resources: Introducing the Cast cont.Multimedia Resources: Introducing the Cast cont. Audio Software MP3 Sun/Net (AU) Sounds WAV Sounds Streaming AudioMultimedia Authoring Systems: Writing the ScriptMultimedia Authoring Systems: Writing the Script Authoring Tools Scripting Language Plug-in Program Synchronized Multimedia Integration Language (SMIL)Virtual Reality: Toward the Holodeck?Virtual Reality: Toward the Holodeck? Enhancing the Immersive Experience: VR Hardware Bringing VR to the Internet: VRML Virtual Reality Modeling Language Practical Applications of VRComputer GamesComputer Games The VR Factor Too Much violence? MUDs (Multi-user-dungeons)Chapter SummaryChapter Summary Introducing Multimedia Multimedia Resources: Introducing the Cast Multimedia Authoring Systems: Writing the Script

Page 21 of 53

Chapter Summary cont.Chapter Summary cont. Virtual Reality: Toward the Holodeck? Computer Games

CHAPTER 7CHAPTER 7The Internet: The Network of NetworksThe Internet: The Network of Networks Introducing the Internet: The Network of Networks Internet Software: Clients and Servers Exploring Internet ServicesThe Internet: The Network of Networks cont.The Internet: The Network of Networks cont. How the Internet Works: A Geography of Cyberspace Intranets: Using TCP/IP Inside the Enterprise The Future of the Internet

Introducing the Internet: The Network of NetworksIntroducing the Internet: The Network of Networks A Galactic Network Globally interconnected network Interoperability Opportunity contact any machine (Mac, IBM, UNIX Windows PCs etc. Leave the Lower Layers to the LANs and WANs (Internet Protocols)

Introducing the Internet: The Network of Networks cont.Introducing the Internet: The Network of Networks cont. The Internet versus Online Services The Internet’s History The Importance of Communication and Socializing From ARPANET to Internet The Rise of a New Mass MediumInternet Software: Clients and ServersInternet Software: Clients and Servers Terminology Internet service (work with many types of computers) Client Server

Page 22 of 53

Exploring Internet ServicesExploring Internet Services Electronic Mail (E-Mail): Staying in Touch Currents: SPAM The World Wide Web: Accessing Information FTP: Transferring FilesExploring Internet Services cont.Exploring Internet Services cont. Usenet: Joining Online Discussions Standard newsgroups (High quality discussions) Alt newsgroups (Anyone can create newsgroup) Biz newsgroups (Commercial use)

Exploring Internet Services cont.Exploring Internet Services cont. IRC: Text Chatting in Real Time (Internet Relay Chat) –join chat groups Instant Messaging (E-Mail) Internet Telephony: Real-Time Voice and Video(Phone from computer to computer)How the Internet Works: A Geography of CyberspaceHow the Internet Works: A Geography of Cyberspace Configuring Your Computer for Internet Access (TCP/IP- Transmission Control Protocol and Internet protocol) Accessing the Internet Shell access (Modem and a phone line) Dial-up access with Point-to-Point protocol (PPP)How the Internet Works: A Geography of Cyberspace How the Internet Works: A Geography of Cyberspace cont.cont. Accessing the Internet cont. Digital Subscriber Line (DSL)(High Speed) Cable and satellite access (offer much faster access) LAN accessHow the Internet Works: A Geography of Cyberspace How the Internet Works: A Geography of Cyberspace cont.cont. Internet Service Providers (ISPs) Backbones (connection from you to a larger region) The Internet Protocols (TCP/IP) Internet Protocol (IP) (defines addresses) Transmission Control Protocol (TCP) (How one computer connects to another)How the Internet Works: A Geography of Cyberspace How the Internet Works: A Geography of Cyberspace cont.cont.

Page 23 of 53

The Domain Name System gov edu org mil com netIntranets: Using TCP/IP Inside the EnterpriseIntranets: Using TCP/IP Inside the Enterprise Terminology Intranet (Local) Firewall ((unwanted access)The Future of the InternetThe Future of the Internet More Internet Addresses More Bandwidth Impacts: Is the Internet Bad for Your Mental Health?Chapter SummaryChapter Summary Introducing the Internet: The Network of Networks Internet Software: Clients and Servers Exploring Internet ServicesChapter Summary cont.Chapter Summary cont. How the Internet Works: A Geography of Cyberspace Intranets: Using TCP/IP Inside the Enterprise The Future of the Internet

CHAPTER 7 SPOTLIGHTCHAPTER 7 SPOTLIGHTPage 24 of 53

Using E-mailUsing E-mail E-mail Fundamentals Introducing E-mail Clients Composing, Receiving, and Forwarding E-mail Managing E-mailUsing E-mail cont.Using E-mail cont. Mailing Lists Using E-mail ResponsiblyE-mail FundamentalsE-mail Fundamentals E-mail Servers and Clients E-mail Address Mail Box – your name @ - separator Server address - Server E-mail Protocols SMTP – Simple Mail transport ProtocolIntroducing E-mail ClientsIntroducing E-mail Clients Getting an Account Setting Up Your E-mail Client POP3 or IMAP server (Domain Name for incoming mail) SMTP server (Domain name that sends out)

Introducing E-mail Clients cont.Introducing E-mail Clients cont. Setting Up Your E-mail Client cont. Your e-mail address Your e-mail password Your nameIntroducing E-mail Clients cont.Introducing E-mail Clients cont. Exploring Your E-mail Client’s Window Folder List Message list Message WindowComposing, Receiving, and Forwarding E-mailComposing, Receiving, and Forwarding E-mail Logging on to the Mail Server Receiving E-mail Replying Directly to the Author Replying to AllComposing, Receiving, and Forwarding E-mail cont.Composing, Receiving, and Forwarding E-mail cont. Composing E-mail

Page 25 of 53

Digital Signature (www.verisign.com) Encryption Priority Forwarding E-mailComposing, Receiving, and Forwarding E-mail cont.Composing, Receiving, and Forwarding E-mail cont. Receiving Attachments:Beware! Sending Attachments: Be Courteous E-mail TipsManaging E-mailManaging E-mail Organizing Your Mail Filtering Incoming MailMailing ListsMailing Lists Subscribing to a Mailing List Participating in a Mailing List UnsubscribingUsing E-mail ResponsiblyUsing E-mail Responsibly Using E-mail at Work Backup tapes Additional Risks How to Stay Out of TroubleChapter SummaryChapter Summary E-mail Fundamentals Introducing E-mail Clients Composing, Receiving, and Forwarding E-mail

Chapter Summary cont.Chapter Summary cont. Managing E-mail Mailing Lists Using E-mail Responsibly

CHAPTER 8CHAPTER 8The World Wide Web and E-CommerceThe World Wide Web and E-Commerce Welcome to the Web Browsing the Web Finding Information on the Web

Page 26 of 53

Search Techniques Evaluating the Information You’ve Found Electronic CommerceWelcome to the WebWelcome to the Web The Hypertext Concept Web Browsers and Web Servers Web Browsers Web ServersWelcome to the Web cont.Welcome to the Web cont. Web Addresses (URLs) Protocol Server Path Resource NameWelcome to the Web cont.Welcome to the Web cont. Web Protocols Web Page Design ToolsBrowsing the WebBrowsing the Web Exploring Your Browser’s Window Navigation buttons Address toolbar Program icon Status barBrowsing the Web cont.Browsing the Web cont. Default Start Page Accessing Web Pages Click a hyperlink Type a URL in the Address box or Location box Click a button on the Links toolbarBrowsing the Web cont.Browsing the Web cont. Using the Back and Forward Buttons Using Navigation Aids History List Favorites and BookmarksFinding Information on the WebFinding Information on the Web Understanding Information Discovery Tools Subject Guides

Page 27 of 53

Search Engines Specialized Search EnginesSearch TechniquesSearch Techniques Inclusion and Exclusion WildcardsSearch Techniques cont.Search Techniques cont. Phrase and Boolean Searches The AND, OR and NOT Operators The NEAR Operator Using ParenthesesEvaluating the Information You’ve FoundEvaluating the Information You’ve Found Rules for Critically Evaluating Web Pages Locating Material in Published Works Currents: Pioneers of the WebEvaluating the Information You’ve Found cont.Evaluating the Information You’ve Found cont. Authoritative Sources Online Christian Sciences Monitor Time Magazine Scientific American

Electronic CommerceElectronic Commerce Business-to-Business E-Commerce Online Shopping Impacts: Online Grocery Shopping – Can

It Succeed?Electronic Commerce cont.Electronic Commerce cont. Secure Electronic Transactions (SET) Online Banking Online Stock TradingChapter SummaryChapter Summary Welcome to the Web Browsing the Web Finding Information on the Web Search Techniques Evaluating the Information You’ve Found Electronic Commerce

Page 28 of 53

CHAPTER 8 SPOTLIGHTCHAPTER 8 SPOTLIGHTCreating a Web PageCreating a Web Page The Web Publishing Process Defining Your Purpose Defining Your Audience: Who’s Reading Your Page?Creating a Web Page cont.Creating a Web Page cont. Introducing HTML Making Design Decisions Creating Your Page Testing Your PageCreating a Web Page cont.Creating a Web Page cont. Publishing Your Page Web Publishing Horizons

Page 29 of 53

XML: The Web’s Next LanguageThe Web Publishing ProcessThe Web Publishing Process Define Your Purpose Define Your Audience Choose an HTML Editor Make Design DecisionsThe Web Publishing Process cont.The Web Publishing Process cont. Create Your Page Test Your Page Publish Your PageDefining Your PurposeDefining Your Purpose Publish Your Page Making Friends Making a PointDefining Your Purpose cont.Defining Your Purpose cont. Collecting Links Recruiting Members for a Campus Organization Publishing Your RésuméDefining Your Audience: Who’s Reading Your Page?Defining Your Audience: Who’s Reading Your Page? Audience Affects: What You Say How You Say It How Your Page Will LookIntroducing HTMLIntroducing HTML Content vs. Structure Structure vs. Presentation HTML Markup vs. Word Processing FormatsIntroducing HTML cont.Introducing HTML cont. Introducing HTML Elements Block Elements Inline Elements Components Start Tag Element Name

Introducing HTML cont.Introducing HTML cont. Components cont. Attributes Value

Page 30 of 53

Content End TagIntroducing HTML cont.Introducing HTML cont. <h2> align =“center” This is the element’s content </h2>Introducing HTML cont.Introducing HTML cont. Tools for Creating HTML Text Editors Word Processing Programs HTML Editors WYSIWYG Editors Site ManagersMaking Design DecisionsMaking Design Decisions Single Page vs. Several Pages Background ThemeCreating Your PageCreating Your Page Choosing Your HTML Editor Entering the Global Structure Defining the HeadCreating Your Page cont.Creating Your Page cont. Creating the Body Adding a Background Color or Graphic Adding Headings Adding TextCreating Your Page cont.Creating Your Page cont. Creating the Body cont. Adding a Bulleted List Adding Character Emphasis Signing Your PageCreating Your Page cont.Creating Your Page cont. Adding Hyperlinks Absolute Hyperlinks Relative URLs Mailto URLs Adding ImagesTesting Your PageTesting Your Page

Page 31 of 53

Typo Missing Bracket Missing Slash Mark Missing End Tag Missing Quotation MarkPublishing Your PagePublishing Your Page College Computer or Commercial ISP Server Computer Account Upload InstructionsWeb Publishing HorizonsWeb Publishing Horizons Learning More HTML Graphics Positioning Tables FramesWeb Publishing Horizons cont.Web Publishing Horizons cont. Learning More HTML cont. Forms Scripts MultimediaXML: The Web’s Next LanguageXML: The Web’s Next Language Introducing XML How XML Works Introducing XHTMLChapter SummaryChapter Summary The Web Publishing Process Defining Your Purpose Defining Your Audience: Who’s Reading Your Page? Introducing HTML Making Design DecisionsChapter Summary cont.Chapter Summary cont. Creating Your Page Testing Your Page Publishing Your Page Web Publishing Horizons XML: The Web’s Next Language

Page 32 of 53

Chapter 9Chapter 9Telecommunications: Exchanging Data Via the Telecommunications: Exchanging Data Via the Telephone SystemTelephone System Understanding the Telephone System Modems: From Digital to Analog and Back Digital Telephony: Living with Twisted Pair Alternatives to Digital Telephony Convergence: Is It a Phone or a Computer?Understanding the Telephone System Understanding the Telephone System How do you use telecommunications? What are some limits to using the telephone system? Analog vs. digital serviceUnderstanding the Telephone System Understanding the Telephone System Quality of Service Local Exchange Carriers (LECs) Long-Distance Transmission Media Copper wireUnderstanding the Telephone System cont.Understanding the Telephone System cont. Fiber-optic cables Microwaves Satellites Currents: Universal Service: The End of an Era?

Page 33 of 53

Understanding the Telephone System cont. Understanding the Telephone System cont. Standards and Regulations Standards Universal Service Common Carrier Immunity DeregulationUnderstanding the Telephone System cont. Understanding the Telephone System cont. More Ways to Access the System Private Branch Exchange (PBX) Cellular Telephones Leased LinesModems: From Digital to Analog and BackModems: From Digital to Analog and Back The PTSN in Perspective How Modems Work Modulation vs. demodulation Internal vs. external modemModems: From Digital to Analog and Back cont. Modems: From Digital to Analog and Back cont. Asynchronous Communication Synchronous vs. asynchronous communication Modulation Protocols Data transfer rate Measured in bits per second (bps)Digital Telephony: Living with Twisted PairDigital Telephony: Living with Twisted Pair Fax How does facsimile transmission (FAX) work? What does a fax modem do? BandwidthDigital Telephony: Living with Twisted Pair cont.Digital Telephony: Living with Twisted Pair cont. Last Mile Technologies Integrated Services Digital Network (ISDN) Basic Rate ISDN (BRI) Primary Rate ISDN (PRI) Broadband ISDN (BISDN) Digital Subscriber Line (DSL) SONETAlternatives to Digital TelephonyAlternatives to Digital Telephony Direct Broadcast Satellite Cable Modems Electrical Power Systems

Page 34 of 53

Impacts: The Digital Divide: It Isn’t All Black and WhiteConvergence: Is It a Phone or a Computer?Convergence: Is It a Phone or a Computer? The Everything PC TV Internet Set-Tops Personal Communication Service (PCS) Internet Telephony Internet FaxingChapter SummaryChapter Summary Understanding the Telephone System Modems: From Digital to Analog and Back Digital Telephony: Living with Twisted Pair Alternatives to Digital Telephony Convergence: Is It a Phone or a Computer?

Page 35 of 53

CHAPTER 10CHAPTER 10Networks: Superhighways for Digital InformationNetworks: Superhighways for Digital Information Introducing Computer Networks: Synergy at Work Network Fundamentals Local Area Networks (LANs): Limited Reach, Fast Connections Wide Area Networks (WANs): Long-Haul CarriersIntroducing Computer Networks: Synergy at WorkIntroducing Computer Networks: Synergy at Work What Is a Computer Network? Types of Computer Networks: LANs and WANs Local Area Network Metropolitan Area Network Wide Area NetworkIntroducing Computer Networks: Synergy at Work cont.Introducing Computer Networks: Synergy at Work cont. Networking Synergies in a Nutshell Reducing Hardware Costs Enabling Shared Applications Building Massive Information Resources Connecting People

Network FundamentalsNetwork Fundamentals Physical Media Switching and Routing Techniques Circuit Switching Packet Switching Which Is Best?

Network Fundamentals cont.Network Fundamentals cont. Protocols Network Layers The Protocol StackLocal Area Networks (LANs): Limited Reach, Fast Local Area Networks (LANs): Limited Reach, Fast ConnectionsConnections Networking Hardware: Network Interface Cards (NICs) Networking Software Peer-to-Peer Networks Client/Server Networks

Page 36 of 53

Local Area Networks (LANs): Limited Reach, Fast Local Area Networks (LANs): Limited Reach, Fast Connections cont.Connections cont. Media Twisted Pair Coaxial Cable Fiber-Optic Cable Infrared Radio

Local Area Networks (LANs): Limited Reach, Fast Local Area Networks (LANs): Limited Reach, Fast Connections cont.Connections cont. LAN Topologies LAN TechnologiesLocal Area Networks (LANs): Limited Reach, Fast Local Area Networks (LANs): Limited Reach, Fast Connections cont.Connections cont. LAN Protocols AppleTalk IPX/SPX NetBEUI TCP/IPWide Area Networks (WANs): Long-Haul CarriersWide Area Networks (WANs): Long-Haul Carriers Currents: Connecting the Navajo Nation How WANs Work Point of Presence (POP) BackbonesWide Area Networks (WANs): Long-Haul Carriers cont.Wide Area Networks (WANs): Long-Haul Carriers cont. How WANs Are Organized WAN Protocols Impacts: The PARC MysteryWide Area Networks (WANs): Long-Haul Carriers cont.Wide Area Networks (WANs): Long-Haul Carriers cont. WAN Applications LAN-to-LAN Connections Transaction Acquisition Electronic Data Interchange (EDI)Chapter SummaryChapter Summary Introducing Computer Networks: Synergy at Work Network Fundamentals Local Area Networks (LANs): Limited Reach, Fast Connections Wide Area Networks (WANs): Long-Haul Carriers

Page 37 of 53

CHAPTER 11CHAPTER 11Networks: Privacy and EncryptionNetworks: Privacy and Encryption Privacy vs. Encryption Privacy in Cyberspace Protecting Privacy: Basic Principles AnonymityNetworks: Privacy and Encryption cont.Networks: Privacy and Encryption cont. How Is Technology Eroding Privacy and Anonymity? Is Self-Regulation Sufficient? Privacy at Work

Page 38 of 53

The Encryption DebatePrivacy vs. EncryptionPrivacy vs. Encryption Terminology Privacy EncryptionPrivacy in CyberspacePrivacy in Cyberspace The Problem: Collection of Information Without Consent The Internet FactorProtecting Privacy: Basic PrinciplesProtecting Privacy: Basic Principles European Union privacy rights Fair Credit Reporting Act (FCRA) Federal and State lawsAnonymityAnonymity Terminology Anonymity Defamation LibelHow Is Technology Eroding Privacy and Anonymity?How Is Technology Eroding Privacy and Anonymity? Cookies Global Unique Identifiers (GUIDS)Is Self-Regulation Sufficient?Is Self-Regulation Sufficient? Is technology posing a threat to privacy? Should industry be free to regulate itself? How effective are “privacy policy” pages?Privacy at WorkPrivacy at Work Following the Rules Telephone E-Mail Monitoring and Recording Protecting Your Privacy OnlineThe Encryption DebateThe Encryption Debate Encryption Basics The Problem of Key Interception Public Key EncryptionThe Encryption Debate cont.The Encryption Debate cont. Key Length Public Key Encryption Algorithms

Page 39 of 53

Digital Signatures and CertificatesThe Encryption Debate cont.The Encryption Debate cont. Toward a Public Key Infrastructure (PKI) Public Security Issues of Strong Encryption Currents: Navajo Code TalkersChapter SummaryChapter Summary Privacy vs. Encryption Privacy in Cyberspace Protecting Privacy: Basic Principles AnonymityChapter Summary cont.Chapter Summary cont. How Is Technology Eroding Privacy and Anonymity? Is Self-Regulation Sufficient? Privacy at Work The Encryption Debate

CHAPTER 12CHAPTER 12Computer Crime and SecurityComputer Crime and Security Scope of the Problem Computer Crime and Cybercrime: Tools and Techniques Meet the Attackers What’s at Stake? Playing it SafeScope of the ProblemScope of the Problem Terminology Computer Security Risk Computer Crimes Cybercrime CyberlawComputer Crime and Cybercrime: Tools and TechniquesComputer Crime and Cybercrime: Tools and Techniques Tricks for Obtaining Passwords Password Guessing Shoulder Surfing

Page 40 of 53

Packet SniffersComputer Crime and Cybercrime: Tools and Techniques Computer Crime and Cybercrime: Tools and Techniques cont.cont. Tricks for Obtaining Passwords cont. Dumpster Diving Social Engineering Superuser StatusComputer Crime and Cybercrime: Tools and Techniques Computer Crime and Cybercrime: Tools and Techniques cont.cont. Currents: Tracking an Intruder Salami Shaving and Data Diddling ForgeryComputer Crime and Cybercrime: Tools and Techniques Computer Crime and Cybercrime: Tools and Techniques cont.cont. Security Loophole Detection Programs Computer Viruses More Rogue ProgramsMeet the AttackersMeet the Attackers Crackers, Cyber Gangs, and Virus Authors Disgruntled Employees SpiesMeet the Attackers cont.Meet the Attackers cont. Swindlers Rip and Tear Pumping and Dumping Bogus GoodsMeet the Attackers cont.Meet the Attackers cont. Shills Cyberstalkers and Sexual Predators Information WarfareWhat’s at Stake?What’s at Stake? Consumption of Staff Time Downtime Fraud and TheftWhat’s at Stake? cont.What’s at Stake? cont. Adverse Publicity

Page 41 of 53

Vandalism Character AssassinationWhat’s at Stake? cont.What’s at Stake? cont. Loss of Privacy Risks to Public Safety Denial of Service (DoS)Playing it SafePlaying it Safe Protecting Computers from Power-Related Problems Controlling Access Using FirewallsPlaying it Safe cont.Playing it Safe cont. Using Encryption Using Antivirus Programs Backing up DataPlaying it Safe cont.Playing it Safe cont. Avoiding Scams Preventing Cyberstalkers Impacts: Parry Aftab’s CyberangelsChapter SummaryChapter Summary Scope of the Problem Computer Crime and Cybercrime: Tools and Techniques Meet the Attackers What’s at Stake? Playing it Safe

Page 42 of 53

CHAPTER 13CHAPTER 13Databases and Information SystemsDatabases and Information Systems Database Concepts: The Essentials The Hierarchy of Data Introducing Database Management Systems (DBMS)Databases and Information SystemsDatabases and Information Systems Types of Database Programs Client/Server Database Systems The Internet Connection: Going Public with Data

Databases and Information Systems cont.Databases and Information Systems cont. Information Systems: Tools for Global Competitiveness Computerized Information Systems (CIS): Serving an Organization’s Needs Understanding Complex Organizations: The Power Pyramid

Databases and Information Systems cont.Databases and Information Systems cont. Chain of Command Characteristics of Valuable Information Computers in the Retail SectorDatabase Concepts: The EssentialsDatabase Concepts: The Essentials Terminology Database Database programs Information Information systems Database management systems (DBMS)The Hierarchy of DataThe Hierarchy of Data

Page 43 of 53

Terminology Bit Field Record Data fileIntroducing Database Management Systems (DBMS)Introducing Database Management Systems (DBMS) Data Integrity Data Independence Avoidance of Data Redundancy Data Security Data MaintenanceTypes of Database ProgramsTypes of Database Programs File Management Programs Database Management Systems Data Warehousing and Data Mining Currents: Mining the DataClient/Server Database SystemsClient/Server Database Systems Terminology Database server Client/Server Query languageThe Internet Connection: Going Public with DataThe Internet Connection: Going Public with Data What is the latest trend in database software? What can it allow customers to do? What kind of hardware is involved?Information Systems: Tools for Global CompetitivenessInformation Systems: Tools for Global Competitiveness What do smart businesses consider information systems? What can information systems enable a company to do?Computerized Information Systems (CIS): Serving an Computerized Information Systems (CIS): Serving an Organization’s NeedsOrganization’s Needs Terminology System System life cycleComputerized Information Systems (CIS): Serving an Computerized Information Systems (CIS): Serving an Organization’s Needs cont.Organization’s Needs cont. Computerized information system (CIS)

Page 44 of 53

Provides essential services Collects critical data Includes data, etc.Understanding Complex Organizations: The Power Understanding Complex Organizations: The Power PyramidPyramid Functional Divisions of an Organization Finance Marketing and sales Human resources Operations Information systemsChain of CommandChain of Command Senior management Middle management Operational managementChain of Command cont.Chain of Command cont. Management functions Planning Organizing Leading ControllingCharacteristics of Valuable InformationCharacteristics of Valuable Information Accessible Accurate Complete Economical RelevantCharacteristics of Valuable Information cont.Characteristics of Valuable Information cont. Reliable Secure Simple Timely VerifiableCharacteristics of Valuable Information cont.Characteristics of Valuable Information cont. Techniques of Information Reduction Control MethodsInformation Systems in Organizations: A SurveyInformation Systems in Organizations: A Survey Transaction Processing System (TPS) Management Information System (MIS)

Page 45 of 53

Decision Support System (DSS)Information Systems in Organizations: A Survey cont.Information Systems in Organizations: A Survey cont. Executive Information System (EIS) Expert System Knowledge Management SystemInformation Systems in Organizations: A Survey cont.Information Systems in Organizations: A Survey cont. Computer-Supported Cooperative Work (CSCW) Workflow Automation Business Process Reengineering (BPR)Computers in the Retail SectorComputers in the Retail Sector At the Checkout Stand Impacts: Retail the Wal-Mart WayChapter SummaryChapter Summary Database Concepts: The Essentials The Hierarchy of Data Introducing Database Management Systems (DBMS)Chapter Summary cont.Chapter Summary cont. Types of Database Programs Client/Server Database Systems The Internet Connection: Going Public with DataChapter Summary cont.Chapter Summary cont. Information Systems: Tools for Global Competitiveness Computerized Information Systems (CIS): Serving an Organization’s Needs Understanding Complex Organizations: The Power PyramidChapter Summary cont.Chapter Summary cont. Chain of Command Characteristics of Valuable Information Information Systems in Organizations: A Survey Computers in the Retail Sector

CHAPTER 14CHAPTER 14Page 46 of 53

Systems Analysis and DesignSystems Analysis and Design Systems Analysts: Communication Counts The Systems Development Life Cycle (SDLC): A Problem Solving Approach Phase 1: Identifying the Problem and OpportunitiesSystems Analysis and Design cont.Systems Analysis and Design cont. Phase 2: Analyzing and Documenting the Existing Information System Phase 3: Designing the System Phase 4: Implementing the System Phase 5: Supporting the SystemSystems Analysts: Communication CountsSystems Analysts: Communication Counts Definition Role InteractionThe Systems Development Life Cycle (SDLC): A Problem The Systems Development Life Cycle (SDLC): A Problem Solving ApproachSolving Approach The Five Phases of SDLCThe Systems Development Life Cycle (SDLC): A Problem The Systems Development Life Cycle (SDLC): A Problem Solving Approach cont.Solving Approach cont. Avoiding Mistakes User Involvement is Crucial A Problem-Solving Approach Works Best Good Project Management Skills are NeededThe Systems Development Life Cycle (SDLC): A Problem The Systems Development Life Cycle (SDLC): A Problem Solving Approach cont.Solving Approach cont. Avoiding Mistakes cont. Documentation is Required Use Checkpoints to Make Sure the Project’s On Track Design for Growth and ChangeThe Systems Development Life Cycle (SDLC): A Problem The Systems Development Life Cycle (SDLC): A Problem Solving Approach cont.Solving Approach cont. The Waterfall Model Impacts: TelemedicinePhase 1: Identifying the Problem and OpportunitiesPhase 1: Identifying the Problem and Opportunities Recognizing the Need for the System Defining the Problem Identifying Opportunities

Page 47 of 53

Developing a PlanPhase 1: Identifying the Problem and Opportunities cont.Phase 1: Identifying the Problem and Opportunities cont. Determining Feasibility Preparing the Project Proposal Currents: The U.S. Air Traffic Control System: Is It Safe to Fly?Phase 2: Analyzing and Documenting the Existing Phase 2: Analyzing and Documenting the Existing Information System Information System Analyzing the Existing System Determining the New System’s RequirementsPhase 3: Designing the SystemPhase 3: Designing the System How Will the System Work? What Are the Logical Requirements?Phase 3: Designing the System cont.Phase 3: Designing the System cont. Describing the New Information System Entity-Relationship Diagram Data Flow Diagram Dictionaries Recent Improvements to the Design PhasePhase 4: Implementing the SystemPhase 4: Implementing the System Deciding to Build or Buy Developing the Software TestingPhase 4: Implementing the System cont.Phase 4: Implementing the System cont. Training Converting SystemsPhase 5: Supporting the SystemPhase 5: Supporting the System Post-Implementation System Review Correcting Errors and Making ChangesChapter SummaryChapter Summary Systems Analysts: Communication Counts The Systems Development Life Cycle (SDLC): A Problem Solving Approach Phase 1: Identifying the Problem and OpportunitiesChapter Summary cont.Chapter Summary cont. Phase 2: Analyzing and Documenting the Existing Information System Phase 3: Designing the System

Page 48 of 53

Phase 4: Implementing the System Phase 5: Supporting the System

CHAPTER 15CHAPTER 15Programming Languages and Program DevelopmentProgramming Languages and Program Development First-Generation Languages: 1s and 0s Second-Generation Languages: A Little Easier

Programming Languages and Program DevelopmentProgramming Languages and Program Development Third-Generation Languages: Programming Comes of Age Fourth-Generation Languages: Getting Away from Procedure

Programming Languages and Program Development cont.Programming Languages and Program Development cont. Object-Oriented Programming: A Revolution in the Making? A Guide to Programming Languages: One Size Doesn’t Fit All Introducing the Program Development Life Cycle (PDLC)

Page 49 of 53

First-Generation Languages: 1s and 0sFirst-Generation Languages: 1s and 0s Terminology Machine Language Machine-dependentSecond-Generation Languages: A Little EasierSecond-Generation Languages: A Little Easier Terminology Assembly Language Low-level Language Mnemonics Source CodeThird-Generation Languages: Programming Comes of AgeThird-Generation Languages: Programming Comes of Age Compilers and Interpreters Spaghetti Code and the Great Software Crisis Structured Programming Languages Modular Programming LanguagesFourth-Generation Languages: Getting Away from Fourth-Generation Languages: Getting Away from ProcedureProcedure Terminology Report Generators Query Languages Structured Query Language (SQL) Natural LanguageObject-Oriented Programming: A Revolution in the Object-Oriented Programming: A Revolution in the Making?Making? Eliminating the Program Versus Data Discrimination What Is An Object? ClassesObject-Oriented Programming: A Revolution in the Object-Oriented Programming: A Revolution in the Making? cont.Making? cont. Inheritance Rapid Application Development (RAD) Middleware (Objects Across the Enterprise)A Guide to Programming Languages: One Size Doesn’t Fit A Guide to Programming Languages: One Size Doesn’t Fit AllAll COBOL and Fortran: For Some People, Retro Rules! COBOL

Page 50 of 53

FortranA Guide to Programming Languages: One Size Doesn’t Fit A Guide to Programming Languages: One Size Doesn’t Fit All cont.All cont. Structured and Modular Languages Ada Visual BasicA Guide to Programming Languages: One Size Doesn’t Fit A Guide to Programming Languages: One Size Doesn’t Fit All cont.All cont. Object-Oriented (OO) Languages Smalltalk C and C++ Java JavaScript (ECMAScript)A Guide to Programming Languages: One Size Doesn’t Fit A Guide to Programming Languages: One Size Doesn’t Fit All cont.All cont. Currents: PostScript and the Desktop Publishing RevolutionIntroducing the Program Development Life Cycle (PDLC)Introducing the Program Development Life Cycle (PDLC) Phase 1: Defining the Problem Phase 2: Designing the Program Top-Down Program Design Structured Design

Introducing the Program Development Life Cycle (PDLC) Introducing the Program Development Life Cycle (PDLC) cont.cont. Developing an Algorithm Program Design Tools Impacts: An Issue of Timing Phase 3: Coding the Program

Introducing the Program Development Life Cycle (PDLC) Introducing the Program Development Life Cycle (PDLC) cont.cont. Phase 4: Testing and Debugging the Program Phase 5: Formalizing the Solution Phase 6: Implementing and Maintaining

the ProgramChapter SummaryChapter Summary

Page 51 of 53

First-Generation Languages: 1s and 0s Second-Generation Languages: A Little Easier Third-Generation Languages:

Programming Comes of Age Fourth-Generation Languages: Getting Away from ProcedureChapter Summary cont.Chapter Summary cont. Object-Oriented Programming: A Revolution in the Making? A Guide to Programming Languages: One Size Doesn’t Fit All Introducing the Program Development

Life Cycle (PDLC)

CHAPTER 16CHAPTER 16Careers and CertificationCareers and Certification Traditional Information Technology (IT) Career Paths New Information Technology (IT) Career Paths New Technologies, New Jobs The Effect of Computers on Overall EmploymentTraditional Information Technology (IT) Career PathsTraditional Information Technology (IT) Career Paths Training for Traditional IT Careers Computer Science Computer Information SystemsTraditional Information Technology (IT) Career Paths cont.Traditional Information Technology (IT) Career Paths cont. Training for Traditional IT Careers cont. Systems Engineering Electrical EngineeringTraditional Information Technology (IT) Career Paths cont.Traditional Information Technology (IT) Career Paths cont. Traditional Methods of Continuing Education Training Seminars Computer Magazines, Newspapers, JournalsTraditional Information Technology (IT) Career Paths cont.Traditional Information Technology (IT) Career Paths cont. Traditional Methods of Continuing Education cont. Conferences and Shows Professional Organizations Jobs for Nondegreed IT WorkersNew Information Technology (IT) Career PathsNew Information Technology (IT) Career Paths Sought-After Business Skills Teamwork

Page 52 of 53

Project Management Communication Business SavvyNew Information Technology (IT) Career PathsNew Information Technology (IT) Career Paths Sought-After Technology Skills Networking Microsoft Windows XP UNIX TCP/IP Oracle C++ Microsoft Visual BASIC Currents: Job Searching on the InternetNew Information Technology (IT) Career Paths cont.New Information Technology (IT) Career Paths cont. Sought-After Technology Skills Networking Microsoft Windows XP UNIX TCP/IPNew Information Technology (IT) Career Paths cont.New Information Technology (IT) Career Paths cont. Sought-After Technology Skills cont. Oracle C++ Microsoft Visual BASIC Currents: Job Searching on the InternetNew Technologies, New JobsNew Technologies, New Jobs Certification Benefits of Certification Risks of CertificationThe Effect of Computers on Overall EmploymentThe Effect of Computers on Overall Employment Terminology Impacts: Is There an Acute Shortage of IT Workers – Or Just Rampant Age Discrimination?Chapter SummaryChapter Summary Traditional Information Technology (IT) Career Paths New Information Technology (IT) Career Paths New Technologies, New Jobs The Effect of Computers on Overall Employment

Page 53 of 53